/* packet-bpkmreq.c * Routines for Baseline Privacy Key Management Request dissection * Copyright 2002, Anand V. Narwani * * Wireshark - Network traffic analyzer * By Gerald Combs * Copyright 1998 Gerald Combs * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. */ #include "config.h" #include void proto_register_docsis_bpkmreq(void); void proto_reg_handoff_docsis_bpkmreq(void); /* Initialize the protocol and registered fields */ static int proto_docsis_bpkmreq = -1; static int hf_docsis_bpkmreq_code = -1; static int hf_docsis_bpkmreq_length = -1; static int hf_docsis_bpkmreq_ident = -1; static const value_string code_field_vals[] = { { 0, "Reserved"}, { 1, "Reserved"}, { 2, "Reserved"}, { 3, "Reserved"}, { 4, "Auth Request"}, { 5, "Auth Reply"}, { 6, "Auth Reject"}, { 7, "Key Request"}, { 8, "Key Reply"}, { 9, "Key Reject"}, {10, "Auth Invalid"}, {11, "TEK Invalid"}, {12, "Authent Info"}, {13, "Map Request"}, {14, "Map Reply"}, {15, "Map Reject"}, {0, NULL}, }; /* Initialize the subtree pointers */ static gint ett_docsis_bpkmreq = -1; static dissector_handle_t attrs_handle; /* Dissection */ static int dissect_bpkmreq (tvbuff_t * tvb, packet_info * pinfo, proto_tree * tree, void* data _U_) { proto_item *it; proto_tree *bpkmreq_tree; guint8 code; tvbuff_t *attrs_tvb; code = tvb_get_guint8 (tvb, 0); col_add_fstr (pinfo->cinfo, COL_INFO, "BPKM Request (%s)", val_to_str (code, code_field_vals, "%d")); if (tree) { it = proto_tree_add_protocol_format (tree, proto_docsis_bpkmreq, tvb, 0, -1, "BPKM Request Message"); bpkmreq_tree = proto_item_add_subtree (it, ett_docsis_bpkmreq); proto_tree_add_item (bpkmreq_tree, hf_docsis_bpkmreq_code, tvb, 0, 1, ENC_BIG_ENDIAN); proto_tree_add_item (bpkmreq_tree, hf_docsis_bpkmreq_ident, tvb, 1, 1, ENC_BIG_ENDIAN); proto_tree_add_item (bpkmreq_tree, hf_docsis_bpkmreq_length, tvb, 2, 2, ENC_BIG_ENDIAN); } attrs_tvb = tvb_new_subset_remaining (tvb, 4); call_dissector (attrs_handle, attrs_tvb, pinfo, tree); return tvb_captured_length(tvb); } /* Register the protocol with Wireshark */ void proto_register_docsis_bpkmreq (void) { static hf_register_info hf[] = { {&hf_docsis_bpkmreq_code, {"BPKM Code", "docsis_bpkmreq.code", FT_UINT8, BASE_DEC, VALS (code_field_vals), 0x0, "BPKM Request Message", HFILL} }, {&hf_docsis_bpkmreq_ident, {"BPKM Identifier", "docsis_bpkmreq.ident", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL} }, {&hf_docsis_bpkmreq_length, {"BPKM Length", "docsis_bpkmreq.length", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL} }, }; static gint *ett[] = { &ett_docsis_bpkmreq, }; proto_docsis_bpkmreq = proto_register_protocol ("DOCSIS Baseline Privacy Key Management Request", "DOCSIS BPKM-REQ", "docsis_bpkmreq"); proto_register_field_array (proto_docsis_bpkmreq, hf, array_length (hf)); proto_register_subtree_array (ett, array_length (ett)); register_dissector ("docsis_bpkmreq", dissect_bpkmreq, proto_docsis_bpkmreq); } void proto_reg_handoff_docsis_bpkmreq (void) { dissector_handle_t docsis_bpkmreq_handle; docsis_bpkmreq_handle = find_dissector ("docsis_bpkmreq"); attrs_handle = find_dissector ("docsis_bpkmattr"); dissector_add_uint ("docsis_mgmt", 0x0C, docsis_bpkmreq_handle); } /* * Editor modelines - http://www.wireshark.org/tools/modelines.html * * Local Variables: * c-basic-offset: 2 * tab-width: 8 * indent-tabs-mode: nil * End: * * ex: set shiftwidth=2 tabstop=8 expandtab: * :indentSize=2:tabSize=8:noTabs=true: */