aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-osi.c
diff options
context:
space:
mode:
authorGilbert Ramirez <gram@alumni.rice.edu>2004-07-18 18:06:47 +0000
committerGilbert Ramirez <gram@alumni.rice.edu>2004-07-18 18:06:47 +0000
commit669db206cb1f270046ad400fff7655e20c63e723 (patch)
tree4eff24a2e16c8963e497e1fc575f35e6af59bd26 /epan/dissectors/packet-osi.c
parentae46c27a38700af669ef907491081f09df6f6b2c (diff)
Move dissectors to epan/dissectors directory.
Also move ncp222.py, x11-fields, process-x11-fields.pl, make-reg-dotc, and make-reg-dotc.py. Adjust #include lines in files that include packet-*.h files. svn path=/trunk/; revision=11410
Diffstat (limited to 'epan/dissectors/packet-osi.c')
-rw-r--r--epan/dissectors/packet-osi.c305
1 files changed, 305 insertions, 0 deletions
diff --git a/epan/dissectors/packet-osi.c b/epan/dissectors/packet-osi.c
new file mode 100644
index 0000000000..6afbc80adf
--- /dev/null
+++ b/epan/dissectors/packet-osi.c
@@ -0,0 +1,305 @@
+/* packet-osi.c
+ * Routines for ISO/OSI network and transport protocol packet disassembly
+ * Main entrance point and common functions
+ *
+ * $Id$
+ * Laurent Deniel <laurent.deniel@free.fr>
+ * Ralf Schneider <Ralf.Schneider@t-online.de>
+ *
+ * Ethereal - Network traffic analyzer
+ * By Gerald Combs <gerald@ethereal.com>
+ * Copyright 1998 Gerald Combs
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ */
+
+#ifdef HAVE_CONFIG_H
+# include "config.h"
+#endif
+
+#include <stdio.h>
+#include <string.h>
+#include <ctype.h>
+#include <glib.h>
+#include <epan/packet.h>
+#include "llcsaps.h"
+#include "aftypes.h"
+#include "nlpid.h"
+#include "ppptypes.h"
+#include "chdlctypes.h"
+#include "packet-osi.h"
+#include "packet-isis.h"
+#include "packet-esis.h"
+
+
+cksum_status_t
+calc_checksum( tvbuff_t *tvb, int offset, guint len, guint checksum) {
+ const gchar *buffer;
+ guint available_len;
+ const guint8 *p;
+ guint32 c0, c1;
+ guint seglen;
+ guint i;
+
+ if ( 0 == checksum )
+ return( NO_CKSUM );
+
+ available_len = tvb_length_remaining( tvb, offset );
+ if ( available_len < len )
+ return( DATA_MISSING );
+
+ buffer = tvb_get_ptr( tvb, offset, len );
+
+ /*
+ * The maximum values of c0 and c1 will occur if all bytes have the
+ * value 255; if so, then c0 will be len*255 and c1 will be
+ * (len*255 + (len-1)*255 + ... + 255), which is
+ * (len + (len - 1) + ... + 1)*255, or 255*(len*(len + 1))/2.
+ * This means it can overflow if "len" is 5804 or greater.
+ *
+ * (A+B) mod 255 = ((A mod 255) + (B mod 255) mod 255, so
+ * we can solve this by taking c0 and c1 mod 255 every
+ * 5803 bytes.
+ */
+ p = buffer;
+ c0 = 0;
+ c1 = 0;
+ while (len != 0) {
+ seglen = len;
+ if (seglen > 5803)
+ seglen = 5803;
+ for (i = 0; i < seglen; i++) {
+ c0 = c0 + *(p++);
+ c1 += c0;
+ }
+
+ c0 = c0 % 255;
+ c1 = c1 % 255;
+
+ len -= seglen;
+ }
+ if (c0 != 0 || c1 != 0)
+ return( CKSUM_NOT_OK ); /* XXX - what should the checksum field be? */
+ else
+ return( CKSUM_OK );
+}
+
+
+cksum_status_t
+check_and_get_checksum( tvbuff_t *tvb, int offset, guint len, guint checksum, int offset_check, guint16* result) {
+ const gchar *buffer;
+ guint available_len;
+ const guint8 *p;
+ guint8 discard = 0;
+ guint32 c0, c1, factor;
+ guint seglen, initlen = len;
+ guint i;
+ int block, x, y;
+
+ if ( 0 == checksum )
+ return( NO_CKSUM );
+
+ available_len = tvb_length_remaining( tvb, offset );
+ offset_check -= offset;
+ if ( ( available_len < len ) || ( offset_check < 0 ) || ( (guint)(offset_check+2) > len ) )
+ return( DATA_MISSING );
+
+ buffer = tvb_get_ptr( tvb, offset, len );
+ block = offset_check / 5803;
+
+ /*
+ * The maximum values of c0 and c1 will occur if all bytes have the
+ * value 255; if so, then c0 will be len*255 and c1 will be
+ * (len*255 + (len-1)*255 + ... + 255), which is
+ * (len + (len - 1) + ... + 1)*255, or 255*(len*(len + 1))/2.
+ * This means it can overflow if "len" is 5804 or greater.
+ *
+ * (A+B) mod 255 = ((A mod 255) + (B mod 255) mod 255, so
+ * we can solve this by taking c0 and c1 mod 255 every
+ * 5803 bytes.
+ */
+ p = buffer;
+ c0 = 0;
+ c1 = 0;
+
+ while (len != 0) {
+ seglen = len;
+ if ( block-- == 0 ) {
+ seglen = offset_check % 5803;
+ discard = 1;
+ } else if ( seglen > 5803 )
+ seglen = 5803;
+ for (i = 0; i < seglen; i++) {
+ c0 = c0 + *(p++);
+ c1 += c0;
+ }
+ if ( discard ) {
+ /*
+ * This works even if (offset_check % 5803) == 5802
+ */
+ p += 2;
+ c1 += 2*c0;
+ len -= 2;
+ discard = 0;
+ }
+
+ c0 = c0 % 255;
+ c1 = c1 % 255;
+
+ len -= seglen;
+ }
+
+ factor = ( initlen - offset_check ) * c0;
+ x = factor - c0 - c1;
+ y = c1 - factor - 1;
+
+ /*
+ * This algorithm uses the 8 bits one's complement arithmetic.
+ * Therefore, we must correct an effect produced
+ * by the "standard" arithmetic (two's complement)
+ */
+
+ if (x < 0 ) x--;
+ if (y > 0 ) y++;
+
+ x %= 255;
+ y %= 255;
+
+ if (x == 0) x = 0xFF;
+ if (y == 0) y = 0x01;
+
+ *result = ( x << 8 ) | ( y & 0xFF );
+
+ if (*result != checksum)
+ return( CKSUM_NOT_OK ); /* XXX - what should the checksum field be? */
+ else
+ return( CKSUM_OK );
+}
+
+
+
+/* main entry point */
+
+/*
+ * These assume the NLPID is a secondary protocol identifier, not an
+ * initial protocol identifier.
+ *
+ * This is an issue only if, in any packet where an NLPID appears, it's
+ * an initial protocol identifier *AND* it can have the value 1, which
+ * means T.70 for an IPI and X.29 for an SPI.
+ */
+const value_string nlpid_vals[] = {
+ { NLPID_NULL, "NULL" },
+ { NLPID_SPI_X_29, "X.29" },
+ { NLPID_X_633, "X.633" },
+ { NLPID_Q_931, "Q.931" },
+ { NLPID_Q_2931, "Q.2931" },
+ { NLPID_Q_2119, "Q.2119" },
+ { NLPID_SNAP, "SNAP" },
+ { NLPID_ISO8473_CLNP, "CLNP" },
+ { NLPID_ISO9542_ESIS, "ESIS" },
+ { NLPID_ISO10589_ISIS, "ISIS" },
+ { NLPID_ISO10747_IDRP, "IDRP" },
+ { NLPID_ISO9542X25_ESIS, "ESIS (X.25)" },
+ { NLPID_ISO10030, "ISO 10030" },
+ { NLPID_ISO11577, "ISO 11577" },
+ { NLPID_COMPRESSED, "Data compression protocol" },
+ { NLPID_IP, "IP" },
+ { NLPID_SNDCF, "SubNetwork Dependent Convergence Function"},
+ { NLPID_IP6, "IPv6" },
+ { NLPID_PPP, "PPP" },
+ { 0, NULL },
+};
+
+static dissector_table_t osinl_subdissector_table;
+static dissector_handle_t data_handle, ppp_handle;
+
+static void dissect_osi(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
+{
+ guint8 nlpid;
+ tvbuff_t *new_tvb;
+
+ pinfo->current_proto = "OSI";
+
+ nlpid = tvb_get_guint8(tvb, 0);
+
+ /* do lookup with the subdissector table */
+ if (dissector_try_port(osinl_subdissector_table, nlpid, tvb, pinfo, tree))
+ return;
+
+ switch (nlpid) {
+
+ /* ESIS (X.25) is not currently decoded */
+
+ case NLPID_ISO9542X25_ESIS:
+ if (check_col(pinfo->cinfo, COL_PROTOCOL)) {
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "ESIS (X.25)");
+ }
+ call_dissector(data_handle,tvb, pinfo, tree);
+ break;
+ case NLPID_ISO10747_IDRP:
+ if (check_col(pinfo->cinfo, COL_PROTOCOL)) {
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "IDRP");
+ }
+ call_dissector(data_handle,tvb, pinfo, tree);
+ break;
+ case NLPID_PPP:
+ /* XXX - we should put the NLPID into the protocol tree.
+ We should also probably have a subdissector table for
+ those protocols whose PDUs *aren't* defined to begin
+ with an NLPID. */
+ new_tvb = tvb_new_subset(tvb, 1, -1, -1);
+ call_dissector(ppp_handle, new_tvb, pinfo, tree);
+ break;
+ default:
+ if (check_col(pinfo->cinfo, COL_PROTOCOL)) {
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "ISO");
+ }
+ if (check_col(pinfo->cinfo, COL_INFO)) {
+ col_add_fstr(pinfo->cinfo, COL_INFO, "Unknown ISO protocol (%02x)", nlpid);
+ }
+ call_dissector(data_handle,tvb, pinfo, tree);
+ break;
+ }
+} /* dissect_osi */
+
+void
+proto_register_osi(void)
+{
+ /* There's no "OSI" protocol *per se*, but we do register a
+ dissector table so various protocols running at the
+ network layer can register themselves. */
+ osinl_subdissector_table = register_dissector_table("osinl",
+ "OSI NLPID", FT_UINT8, BASE_HEX);
+}
+
+void
+proto_reg_handoff_osi(void)
+{
+ dissector_handle_t osi_handle;
+
+ osi_handle = create_dissector_handle(dissect_osi, -1);
+ dissector_add("llc.dsap", SAP_OSINL1, osi_handle);
+ dissector_add("llc.dsap", SAP_OSINL2, osi_handle);
+ dissector_add("llc.dsap", SAP_OSINL3, osi_handle);
+ dissector_add("llc.dsap", SAP_OSINL4, osi_handle);
+ dissector_add("llc.dsap", SAP_OSINL5, osi_handle);
+ dissector_add("ppp.protocol", PPP_OSI, osi_handle);
+ dissector_add("chdlctype", CHDLCTYPE_OSI, osi_handle);
+ dissector_add("null.type", BSD_AF_ISO, osi_handle);
+ dissector_add("gre.proto", SAP_OSINL5, osi_handle);
+ data_handle = find_dissector("data");
+ ppp_handle = find_dissector("ppp");
+}