summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-aruba-ubt.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-aruba-ubt.c
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-aruba-ubt.c')
-rw-r--r--epan/dissectors/packet-aruba-ubt.c1364
1 files changed, 1364 insertions, 0 deletions
diff --git a/epan/dissectors/packet-aruba-ubt.c b/epan/dissectors/packet-aruba-ubt.c
new file mode 100644
index 0000000..480688d
--- /dev/null
+++ b/epan/dissectors/packet-aruba-ubt.c
@@ -0,0 +1,1364 @@
+/* packet-aruba-ubt.c
+ * Routines for Aruba UBT dissection
+ *
+ * Real name of UBT : User Based Tunneling
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+ /* header files */
+#include "config.h"
+#include <epan/packet.h>
+#include <epan/prefs.h>
+#include <epan/expert.h>
+#include <epan/addr_resolv.h>
+
+/* This is not IANA assigned nor registered */
+#define PORT_UBT 15560
+
+void proto_register_ubt(void);
+void proto_reg_handoff_ubt(void);
+
+/* declaring dissector handle */
+static dissector_handle_t ubt_handle;
+
+/* Initialize the protocol and registered fields */
+static int proto_ubt = -1;
+static int hf_ubt_packet_len = -1;
+static int hf_ubt_msg_type = -1;
+static int hf_ubt_tlv_header = -1;
+static int hf_ubt_tlv = -1;
+static int hf_ubt_type = -1;
+static int hf_ubt_length = -1;
+static int hf_ubt_switch_seqno = -1;
+static int hf_ubt_switch_macaddr = -1;
+
+/* for data attributes */
+static int hf_ubt_dt_unknown = -1;
+static int hf_ubt_dt_grekey = -1;
+static int hf_ubt_dt_firmwareversion = -1;
+static int hf_ubt_dt_userkey = -1;
+static int hf_ubt_dt_sacmode = -1;
+static int hf_ubt_dt_sacipv4 = -1;
+static int hf_ubt_dt_sacipv6 = -1;
+static int hf_ubt_dt_heartbeattimeout = -1;
+static int hf_ubt_dt_usermac = -1;
+static int hf_ubt_dt_uservlan = -1;
+static int hf_ubt_dt_flags = -1;
+
+/* for ip attributes */
+static int hf_ubt_ip_type = -1;
+static int hf_ubt_ip_padding = -1;
+static int hf_ubt_ip_unassigned = -1;
+
+/* for switch & user flags */
+static int hf_ubt_switch_flags_bcmctoucast = -1;
+static int hf_ubt_user_flags_tag = -1;
+static int hf_ubt_user_flags_auth = -1;
+static int hf_ubt_user_flags_bcmctoucast = -1;
+static int hf_ubt_user_flags_dormant = -1;
+static int hf_ubt_user_flags_uback = -1;
+
+static int hf_ubt_dt_tunnelmtu = -1;
+static int hf_ubt_dt_userrole = -1;
+static int hf_ubt_dt_reasoncode = -1;
+static int hf_ubt_dt_nodelist = -1;
+static int hf_ubt_dt_clustername = -1;
+static int hf_ubt_dt_clusterenabled = -1;
+static int hf_ubt_dt_ssacindex = -1;
+static int hf_ubt_dt_reserved = -1;
+static int hf_ubt_dt_uaccount = -1;
+static int hf_ubt_dt_uaciplist = -1;
+static int hf_ubt_dt_uacipv4 = -1;
+static int hf_ubt_dt_uacipv6 = -1;
+static int hf_ubt_dt_bucketmap = -1;
+static int hf_ubt_dt_timestamp = -1;
+static int hf_ubt_dt_identifier = -1;
+
+/* for active map arrays */
+static int hf_ubt_dt_activemap1 = -1;
+static int hf_ubt_dt_activemap2 = -1;
+static int hf_ubt_dt_activemap3 = -1;
+static int hf_ubt_dt_activemap4 = -1;
+static int hf_ubt_dt_activemap5 = -1;
+static int hf_ubt_dt_activemap6 = -1;
+static int hf_ubt_dt_activemap7 = -1;
+static int hf_ubt_dt_activemap8 = -1;
+
+/* for standby map arrays */
+static int hf_ubt_dt_standbymap1 = -1;
+static int hf_ubt_dt_standbymap2 = -1;
+static int hf_ubt_dt_standbymap3 = -1;
+static int hf_ubt_dt_standbymap4 = -1;
+static int hf_ubt_dt_standbymap5 = -1;
+static int hf_ubt_dt_standbymap6 = -1;
+static int hf_ubt_dt_standbymap7 = -1;
+static int hf_ubt_dt_standbymap8 = -1;
+
+/* for l2conn arrays */
+static int hf_ubt_dt_l2conn1 = -1;
+static int hf_ubt_dt_l2conn2 = -1;
+static int hf_ubt_dt_l2conn3 = -1;
+static int hf_ubt_dt_l2conn4 = -1;
+static int hf_ubt_dt_l2conn5 = -1;
+static int hf_ubt_dt_l2conn6 = -1;
+static int hf_ubt_dt_l2conn7 = -1;
+static int hf_ubt_dt_l2conn8 = -1;
+
+static int hf_ubt_dt_status = -1;
+static int hf_ubt_dt_mcastkey = -1;
+static int hf_ubt_dt_serveripv4 = -1;
+static int hf_ubt_dt_serveripv6 = -1;
+static int hf_ubt_dt_userauthmethod = -1;
+static int hf_ubt_dt_username = -1;
+static int hf_ubt_dt_userportname = -1;
+static int hf_ubt_dt_switchname = -1;
+static int hf_ubt_dt_silentclientvlans = -1;
+static int hf_ubt_dt_silentclientvlan = -1;
+static int hf_ubt_dt_maxmsgs = -1;
+
+static expert_field ei_ubt_unknown = EI_INIT;
+
+/* Initialize the subtree pointers */
+static gint ett_ubt = -1;
+static gint ett_ubt_tlv = -1;
+static gint ett_ubt_flags = -1;
+
+/* Definition of different sizes and counts used throughout the program */
+#define PAPI_PACKET_SIZE 76
+#define SIZE_AT_DEST_PORT 16
+#define SIZE_AT_SRC_PORT 18
+#define PACKET_LENGTH_SIZE 4
+#define MESSAGE_TYPE_SIZE 4
+#define MAC_ADDR_SIZE 6
+#define SEQ_NO_SIZE 4
+#define TYPE_SIZE 1
+#define LENGTH_SIZE 2
+#define CLUSTER_NAME_SIZE 32
+#define CLUSTER_ENABLED 1
+#define SSAC_INDEX 1
+#define RESERVED_COUNT 1
+#define UAC_COUNT_SIZE 1
+#define UAC_MAX_COUNT 12
+#define IP_SIZE 20
+#define TIMESTAMP_SIZE 8
+#define IDENTIFIER_SIZE 33
+#define MAP_SIZE 256
+#define MAP_SUBSET_SIZE 32
+#define MAP_ARRAY_SIZE 8
+#define INCREMENT_SIZE 2
+#define TYPE_IPV4 0x02
+#define TYPE_IPV6 0x0a
+#define TYPE_NOT_ASSIGNED 0x0
+#define AUTH_METHOD_8021X 2
+#define AUTH_METHOD_WEB 3
+#define AUTH_METHOD_MAC 4
+#define AUTH_METHOD_LMA 6
+
+static const value_string ubt_authmethod_vals[] = {
+ { AUTH_METHOD_8021X, "UB_AUTH_METHOD_8021X" },
+ { AUTH_METHOD_WEB, "UB_AUTH_METHOD_WEB" },
+ { AUTH_METHOD_MAC, "UB_AUTH_METHOD_MAC" },
+ { AUTH_METHOD_LMA, "UB_AUTH_METHOD_LMA" },
+ { 0, NULL }
+};
+
+static const value_string ubt_iptype_vals[] = {
+ { TYPE_IPV4, "IPv4" },
+ { TYPE_IPV6, "IPv6" },
+ { TYPE_NOT_ASSIGNED, "Not Assigned" },
+ { 0, NULL }
+};
+
+/* to enumerate different UBT message types */
+enum messagetype {
+ NotKnown, //Type 0, undefined
+ SwitchBootstrapMessage, //Type 1
+ SwitchBootstrapACK, //Type 2
+ ControllerNodelistMessage, //Type 3
+ ControllerNodelistACK, //Type 4
+ ControllerBucketmapMessage, //Type 5
+ ControllerBucketmapACK, //Type 6
+ SwitchFailoverMessage, //Type 7
+ SwitchFailoverACK, //Type 8
+ SwitchUnbootstrapMessage, //Type 9
+ SwitchUnbootstrapACK, //Type 10
+ UserBootstrapMessage, //Type 11
+ UserBootstrapACK, //Type 12
+ UserUnbootstrapMessage, //Type 13
+ UserUnbootstrapACK, //Type 14
+ SwitchKeepaliveMessage, //Type 15
+ SwitchKeepaliveACK, //Type 16
+ SwitchHeartbeatRequest, //Type 17
+ SwitchHeartbeatACK, //Type 18
+ SwitchSilentVLANMessage, //Type 19
+ SwitchSilentVLANACK //Type 20
+};
+
+static const value_string ubt_msgtype_vals[] = {
+ { SwitchBootstrapMessage, "Switch Bootstrap Message" },
+ { SwitchBootstrapACK, "Switch Bootstrap ACK" },
+ { ControllerNodelistMessage, "Controller Nodelist Message" },
+ { ControllerNodelistACK, "Controller Nodelist ACK" },
+ { ControllerBucketmapMessage, "Controller Bucketmap Message" },
+ { ControllerBucketmapACK, "Controller Bucketmap ACK" },
+ { SwitchFailoverMessage, "Switch Failover Message" },
+ { SwitchFailoverACK, "Switch Failover ACK" },
+ { SwitchUnbootstrapMessage, "Switch Unbootstrap Message" },
+ { SwitchUnbootstrapACK, "Switch Unbootstrap ACK" },
+ { UserBootstrapMessage, "User Bootstrap Message" },
+ { UserBootstrapACK, "User Bootstrap ACK" },
+ { UserUnbootstrapMessage, "User Unbootstrap Message" },
+ { UserUnbootstrapACK, "User Unbootstrap ACK" },
+ { SwitchKeepaliveMessage, "Switch Keepalive Message" },
+ { SwitchKeepaliveACK, "Switch Keepalive ACK" },
+ { SwitchHeartbeatRequest, "Switch Heartbeat Request" },
+ { SwitchHeartbeatACK, "Switch Heartbeat ACK" },
+ { SwitchSilentVLANMessage, "Switch Silent VLAN Message" },
+ { SwitchSilentVLANACK, "Switch Silent VLAN ACK" },
+ { 0, NULL }
+};
+
+/* to enumerate different data attributes */
+enum datatypes {
+ Unknown, //Type 0, undefined
+ GREKey, //Type 1
+ FirmwareVersion, //Type 2
+ UserKey, //Type 3
+ SACMode, //Type 4
+ SACIPAddress, //Type 5
+ HeartbeatTimeout, //Type 6
+ UserMAC, //Type 7
+ UserVLAN, //Type 8
+ Flags, //Type 9
+ TunnelMTU, //Type 10
+ UserRole, //Type 11
+ ReasonCode, //Type 12
+ Nodelist, //Type 13
+ Bucketmap, //Type 14
+ Status, //Type 15
+ MCASTKey, //Type 16
+ ServerIP, //Type 17
+ UserAuthMethod, //Type 18
+ Username, //Type 19
+ UserPortName, //Type 20
+ SwitchName, //Type 21
+ SilentClientVLANs, //Type 22
+ MaxMsgs //Type 23
+};
+
+static const value_string ubt_dttype_vals[] = {
+ { GREKey, "GRE Key" },
+ { FirmwareVersion, "Firmware Version" },
+ { UserKey, "User Key" },
+ { SACMode, "SAC Mode" },
+ { SACIPAddress, "SAC IP Address" },
+ { HeartbeatTimeout, "Heartbeat Timeout" },
+ { UserMAC, "User MAC Address" },
+ { UserVLAN, "User VLAN" },
+ { Flags, "Flags" },
+ { TunnelMTU, "Tunnel MTU" },
+ { UserRole, "User Role" },
+ { ReasonCode, "Reason Code" },
+ { Nodelist, "Node List" },
+ { Bucketmap, "Bucket Map" },
+ { Status, "Status" },
+ { MCASTKey, "MCast Key" },
+ { ServerIP, "Server IP Address" },
+ { UserAuthMethod, "User Auth Method" },
+ { Username, "Username" },
+ { UserPortName, "User Port Name" },
+ { SwitchName, "Switch Name" },
+ { SilentClientVLANs, "Silent Client VLANs" },
+ { MaxMsgs, "Max Messages" },
+ { 0, NULL }
+};
+
+/* main dissector function */
+static int
+dissect_ubt(tvbuff_t* tvb, packet_info* pinfo, proto_tree* tree, void* data _U_)
+{
+ /* declaration of variables used */
+ proto_item* ti, * ubt_msg_type;
+ proto_tree* message_tree, * message_subtree, * message_subtree2, * message_subtree3, * message_subtree4;
+ guint offset_end = 0, msgtype = 0, offset = 0;
+ tvbuff_t* next_tvb;
+
+ /* Setting protocol column to UBT */
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "UBT");
+
+ /* clearing info column */
+ col_clear(pinfo->cinfo, COL_INFO);
+
+ /* setting proto_item & tree to the current offset */
+ ti = proto_tree_add_item(tree, proto_ubt, tvb, offset, -1, ENC_NA);
+
+ /* adding it as a subtree to Wireshark tree */
+ message_tree = proto_item_add_subtree(ti, ett_ubt);
+
+ /* determining packet length & message type */
+ proto_tree_add_item(message_tree, hf_ubt_packet_len, tvb, offset, PACKET_LENGTH_SIZE, ENC_BIG_ENDIAN);
+ offset += PACKET_LENGTH_SIZE;
+ ubt_msg_type = proto_tree_add_item_ret_uint(message_tree, hf_ubt_msg_type, tvb, offset, MESSAGE_TYPE_SIZE, ENC_BIG_ENDIAN, &msgtype);
+
+ proto_item_append_text(ubt_msg_type, "(%s)", val_to_str(msgtype, ubt_msgtype_vals, "Unknown Type (%02d)"));
+ col_append_fstr(pinfo->cinfo, COL_INFO, "%s", val_to_str(msgtype, ubt_msgtype_vals, "Unknown Type (%02d)"));
+
+ offset += MESSAGE_TYPE_SIZE;
+
+ /* Condition to check if Switch MAC address to be added or not */
+ if (msgtype != UserBootstrapACK && msgtype != SwitchKeepaliveACK) {
+ proto_tree_add_item(message_tree, hf_ubt_switch_macaddr, tvb, offset, MAC_ADDR_SIZE, ENC_NA);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " switchmac:%s", tvb_get_ether_name(tvb, offset));
+ offset += MAC_ADDR_SIZE;
+ }
+
+ /* adding Switch Sequence Number to tree */
+ proto_tree_add_item(message_tree, hf_ubt_switch_seqno, tvb, offset, SEQ_NO_SIZE, ENC_NA);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " seq:%d", tvb_get_guint32(tvb, offset, ENC_NA));
+ offset += SEQ_NO_SIZE;
+
+ /* if Switch Keepalive Message type, terminate dissection */
+ if (msgtype == SwitchKeepaliveMessage) {
+ return offset;
+ }
+
+ /* storing length of buffer */
+ offset_end = tvb_reported_length(tvb);
+
+ /* dealing with TLVs */
+ proto_item* tlv_header;
+ tlv_header = proto_tree_add_item(message_tree, hf_ubt_tlv_header, tvb, offset, -1, ENC_NA);
+ message_subtree = proto_item_add_subtree(tlv_header, ett_ubt);
+
+ while (offset < offset_end) {
+
+ /* variable to store T, L, V of TLVs & other data */
+ guint optlen = 0, type = 0, val = 0;
+ proto_item* tlv, * tlv_item, * tlv_item2;
+
+ /* reading type & length of TLVS from stream */
+ type = tvb_get_guint8(tvb, offset);
+ optlen = tvb_get_guint16(tvb, offset + TYPE_SIZE, ENC_BIG_ENDIAN);
+
+ /* Adding TLV items to the tree */
+ tlv = proto_tree_add_item(message_subtree, hf_ubt_tlv, tvb, offset, optlen + TYPE_SIZE + LENGTH_SIZE, ENC_NA);
+ proto_item_append_text(tlv, ": t=%d, l=%d, %s", type, optlen, val_to_str(type, ubt_dttype_vals, "Unknown Type (%02d)"));
+ message_subtree2 = proto_item_add_subtree(tlv, ett_ubt_tlv);
+
+ /* adding type & length to TLV subtree */
+ proto_tree_add_item(message_subtree2, hf_ubt_type, tvb, offset, TYPE_SIZE, ENC_NA);
+ offset += TYPE_SIZE;
+ proto_tree_add_item(message_subtree2, hf_ubt_length, tvb, offset, LENGTH_SIZE, ENC_NA);
+ offset += LENGTH_SIZE;
+
+ /* Different data types */
+ switch (type) {
+
+ case Unknown:/* Unknown, because type 0 is undefined */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_unknown, tvb, offset, optlen, ENC_NA);
+ offset += optlen;
+ break;
+
+ case GREKey:/* Type 1: GRE Key */
+
+ /* adding GRE key as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_grekey, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %#x(%u)", val, val);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " grekey:%u", val);
+ offset += optlen;
+ break;
+
+ case FirmwareVersion:/* Type 2: Firmware version */
+
+ /* adding Firmware version as proto_item to the tree */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_firmwareversion, tvb, offset, optlen, ENC_ASCII);
+ proto_item_append_text(tlv, ": %s", tvb_get_string_enc(pinfo->pool, tvb, offset, optlen, ENC_ASCII));
+ offset += optlen;
+ break;
+
+ case UserKey:/* Type 3: User key */
+
+ /* adding User key as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_userkey, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %#x(%u)", val, val);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " userkey:%u", val);
+ offset += optlen;
+ break;
+
+ case SACMode:/* Type 4: SAC Mode */
+
+ /* adding SAC mode as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_sacmode, tvb, offset, optlen, ENC_NA, &val);
+ proto_item_append_text(tlv, ": %u", val);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " sacMode:%u", val);
+ offset += optlen;
+ break;
+
+ case SACIPAddress:/* Type 5: SAC IP Address */
+
+ /* adding SAC IP Address as proto_item to the tree */
+
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_ip_type, tvb, offset, 2, ENC_BIG_ENDIAN, &val);
+ offset += 2;
+
+ switch (val) {
+
+ case TYPE_IPV6:
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_sacipv6, tvb, offset, IPv6_ADDR_SIZE, ENC_NA);
+ offset += IPv6_ADDR_SIZE;
+ break;
+
+ case TYPE_IPV4:
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_sacipv4, tvb, offset, 4, ENC_BIG_ENDIAN);
+ offset += 4;
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_padding, tvb, offset, 12, ENC_NA);
+ offset += 12;
+ break;
+
+ case TYPE_NOT_ASSIGNED:
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_unassigned, tvb, offset, IP_SIZE - 2, ENC_NA);
+ offset += IP_SIZE - 2;
+ break;
+
+ default:
+ proto_tree_add_expert_format(message_subtree2, pinfo, &ei_ubt_unknown, tvb, offset, IP_SIZE - 2, "Invalid IP Type");
+ offset += IP_SIZE - 2;
+
+ }
+ break;
+
+ case HeartbeatTimeout:/* Type 6: Heartbeat Timeout */
+
+ /* adding Heartbeat timeout as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_heartbeattimeout, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %u", val);
+ offset += optlen;
+ break;
+
+ case UserMAC:/* Type 7: User MAC Address */
+
+ /* adding User MAC address as proto_item to the tree */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_usermac, tvb, offset, optlen, ENC_NA);
+ proto_item_append_text(tlv, ": %s", tvb_get_ether_name(tvb, offset));
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " usermac:%s", tvb_get_ether_name(tvb, offset));
+ offset += optlen;
+ break;
+
+ case UserVLAN:/* Type 8: User VLAN */
+
+ /* adding User VLAN as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_uservlan, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %#x(%u)", val, val);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " vlan:%u", val);
+ offset += optlen;
+ break;
+
+ case Flags:/* Type 9: Flags */
+
+ /* adding flags for switch */
+ if (msgtype == SwitchBootstrapMessage) {
+ static int* const ubt_switch_flags[] = {
+ &hf_ubt_switch_flags_bcmctoucast,
+ NULL
+ };
+ proto_tree_add_bitmask_with_flags(message_subtree2, tvb, offset, hf_ubt_dt_flags, ett_ubt_flags, ubt_switch_flags, ENC_BIG_ENDIAN, BMT_NO_APPEND);
+ }
+
+ /* adding flags for user */
+ else if (msgtype == UserBootstrapMessage) {
+ static int* const ubt_user_flags[] = {
+ &hf_ubt_user_flags_tag,
+ &hf_ubt_user_flags_auth,
+ &hf_ubt_user_flags_bcmctoucast,
+ &hf_ubt_user_flags_dormant,
+ &hf_ubt_user_flags_uback,
+ NULL
+ };
+ proto_tree_add_bitmask_with_flags(message_subtree2, tvb, offset, hf_ubt_dt_flags, ett_ubt_flags, ubt_user_flags, ENC_BIG_ENDIAN, BMT_NO_APPEND);
+ }
+
+ val = tvb_get_guint8(tvb, offset);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " flags:%u", val);
+ offset += optlen;
+ break;
+
+ case TunnelMTU:/* Type 10: Tunnel MTU */
+
+ /* adding Tunnel MTU as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_tunnelmtu, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %#x(%u)", val, val);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " mtu:%u", val);
+ offset += optlen;
+ break;
+
+ case UserRole:/* Type 11: User Role */
+
+ /* adding User Role as proto_item to the tree */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_userrole, tvb, offset, optlen, ENC_ASCII);
+ char* userrole = tvb_get_string_enc(pinfo->pool, tvb, offset, optlen, ENC_ASCII);
+ proto_item_append_text(tlv, ": %s", userrole);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " role:%s", userrole);
+ offset += optlen;
+ break;
+
+ case ReasonCode:/* Type 12: Reason Code */
+
+ /* adding Reason Code as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_reasoncode, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %u", val);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " reason:%u", val);
+ offset += optlen;
+ break;
+
+ case Nodelist:/* Type 13: Nodelist */
+
+ /* adding Nodelist as proto_item to the tree */
+ tlv_item = proto_tree_add_item(message_subtree2, hf_ubt_dt_nodelist, tvb, offset, optlen, ENC_NA);
+ message_subtree3 = proto_item_add_subtree(tlv_item, ett_ubt_tlv);
+
+ /* adding name of cluster to tree */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_clustername, tvb, offset, CLUSTER_NAME_SIZE, ENC_ASCII);
+ offset += CLUSTER_NAME_SIZE;
+
+ /* determining if cluster enabled or not */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_clusterenabled, tvb, offset, CLUSTER_ENABLED, ENC_NA);
+ offset += CLUSTER_ENABLED;
+
+ /* adding SSAC index to tree */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_ssacindex, tvb, offset, SSAC_INDEX, ENC_NA);
+ offset += SSAC_INDEX;
+
+ /* adding no of reserved to tree */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_reserved, tvb, offset, RESERVED_COUNT, ENC_NA);
+ offset += RESERVED_COUNT;
+
+ /* adding no of UACs assigned */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_uaccount, tvb, offset, UAC_COUNT_SIZE, ENC_NA);
+ offset += UAC_COUNT_SIZE;
+
+ /* adding list of UAC IPs assigned */
+ for (int i = 0; i < UAC_MAX_COUNT; i++) {
+ tlv_item = proto_tree_add_item(message_subtree3, hf_ubt_dt_uaciplist, tvb, offset, IP_SIZE, ENC_NA);
+ message_subtree4 = proto_item_add_subtree(tlv_item, ett_ubt_tlv);
+ proto_item_append_text(tlv_item, "(%d)", i + 1);
+
+ proto_tree_add_item_ret_uint(message_subtree4, hf_ubt_ip_type, tvb, offset, 2, ENC_BIG_ENDIAN, &val);
+ offset += 2;
+
+ switch (val) {
+
+ case TYPE_IPV6:
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree4, hf_ubt_dt_uacipv6, tvb, offset, IPv6_ADDR_SIZE, ENC_NA);
+ offset += IPv6_ADDR_SIZE;
+ break;
+
+ case TYPE_IPV4:
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree4, hf_ubt_dt_uacipv4, tvb, offset, 4, ENC_BIG_ENDIAN);
+ offset += 4;
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_padding, tvb, offset, 12, ENC_NA);
+ offset += 12;
+ break;
+
+ case TYPE_NOT_ASSIGNED:
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_unassigned, tvb, offset, IP_SIZE - 2, ENC_NA);
+ offset += IP_SIZE - 2;
+ break;
+
+ default:
+ proto_tree_add_expert_format(message_subtree4, pinfo, &ei_ubt_unknown, tvb, offset, IP_SIZE - 2, "Invalid IP Type");
+ offset += IP_SIZE - 2;
+
+ }
+ }
+ break;
+
+ case Bucketmap:/* Type 14: Bucketmap */
+
+ /* adding Bucketmap as proto_item to the tree */
+ tlv_item = proto_tree_add_item(message_subtree2, hf_ubt_dt_bucketmap, tvb, offset, optlen, ENC_NA);
+ message_subtree3 = proto_item_add_subtree(tlv_item, ett_ubt_tlv);
+
+ /* adding timestamp to tree */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_timestamp, tvb, offset, TIMESTAMP_SIZE, ENC_NA);
+ offset += TIMESTAMP_SIZE;
+
+ /* adding identifier string to tree */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_identifier, tvb, offset, IDENTIFIER_SIZE, ENC_ASCII);
+ offset += IDENTIFIER_SIZE;
+
+ /* array to store activemaps in size of 32 */
+ int arr[MAP_ARRAY_SIZE] = { hf_ubt_dt_activemap1 ,hf_ubt_dt_activemap2 ,hf_ubt_dt_activemap3 ,hf_ubt_dt_activemap4 ,hf_ubt_dt_activemap5 ,hf_ubt_dt_activemap6 ,hf_ubt_dt_activemap7 ,hf_ubt_dt_activemap8 };
+ /* adding activemaps of size 32 at a time */
+ for (int i = 0; i < MAP_SIZE; i += MAP_SUBSET_SIZE) {
+ if ((i / MAP_SUBSET_SIZE) == 0) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else if ((i / MAP_SUBSET_SIZE) == 1 || (i / MAP_SUBSET_SIZE) == 2) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else if ((i / MAP_SUBSET_SIZE) == 3) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ offset += 1;
+ for (int j = 1; j < MAP_SUBSET_SIZE; j += 1) {
+ proto_item_append_text(tlv_item2, " %02d", tvb_get_gint8(tvb, offset));
+ offset += 1;
+ }
+ }
+
+ /* array to store standbymaps in size of 32 */
+ int arr2[MAP_ARRAY_SIZE] = { hf_ubt_dt_standbymap1 ,hf_ubt_dt_standbymap2 ,hf_ubt_dt_standbymap3 ,hf_ubt_dt_standbymap4 ,hf_ubt_dt_standbymap5 ,hf_ubt_dt_standbymap6 ,hf_ubt_dt_standbymap7 ,hf_ubt_dt_standbymap8 };
+
+ /* adding standbymaps of size 32 at a time */
+ for (int i = 0; i < MAP_SIZE; i += MAP_SUBSET_SIZE) {
+ if ((i / MAP_SUBSET_SIZE) == 0) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr2[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else if ((i / MAP_SUBSET_SIZE) == 1 || (i / MAP_SUBSET_SIZE) == 2) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr2[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else if ((i / MAP_SUBSET_SIZE) == 3) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr2[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr2[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ offset += 1;
+ for (int j = 1; j < MAP_SUBSET_SIZE; j += 1) {
+ proto_item_append_text(tlv_item2, " %02d", tvb_get_gint8(tvb, offset));
+ offset += 1;
+ }
+ }
+
+ /* array to store l2conn in size of 32 */
+ int arr3[MAP_ARRAY_SIZE] = { hf_ubt_dt_l2conn1 ,hf_ubt_dt_l2conn2 ,hf_ubt_dt_l2conn3 ,hf_ubt_dt_l2conn4 ,hf_ubt_dt_l2conn5 ,hf_ubt_dt_l2conn6 ,hf_ubt_dt_l2conn7 ,hf_ubt_dt_l2conn8 };
+
+ /* adding l2conn of size 32 at a time */
+ for (int i = 0; i < MAP_SIZE; i += MAP_SUBSET_SIZE) {
+ if ((i / MAP_SUBSET_SIZE) == 0) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr3[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else if ((i / MAP_SUBSET_SIZE) == 1 || (i / MAP_SUBSET_SIZE) == 2) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr3[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else if ((i / MAP_SUBSET_SIZE) == 3) {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr3[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ else {
+ tlv_item2 = proto_tree_add_bytes_format_value(message_subtree3, arr3[i / MAP_SUBSET_SIZE], tvb, offset, MAP_SUBSET_SIZE, NULL, " %02d", tvb_get_gint8(tvb, offset));
+ }
+ offset += 1;
+ for (int j = 1; j < MAP_SUBSET_SIZE; j += 1) {
+ proto_item_append_text(tlv_item2, " %02d", tvb_get_gint8(tvb, offset));
+ offset += 1;
+ }
+ }
+
+ /* adding no of UACs assigned */
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_uaccount, tvb, offset, UAC_COUNT_SIZE, ENC_NA);
+ offset += UAC_COUNT_SIZE;
+
+ /* adding list of UAC IPs assigned */
+ for (int i = 0; i < UAC_MAX_COUNT; i++) {
+ tlv_item = proto_tree_add_item(message_subtree3, hf_ubt_dt_uaciplist, tvb, offset, IP_SIZE, ENC_NA);
+ message_subtree4 = proto_item_add_subtree(tlv_item, ett_ubt_tlv);
+ proto_item_append_text(tlv_item, "(%d)", i + 1);
+
+ proto_tree_add_item_ret_uint(message_subtree4, hf_ubt_ip_type, tvb, offset, 2, ENC_BIG_ENDIAN, &val);
+ offset += 2;
+
+ switch (val) {
+
+ case TYPE_IPV6:
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree4, hf_ubt_dt_uacipv6, tvb, offset, IPv6_ADDR_SIZE, ENC_NA);
+ offset += IPv6_ADDR_SIZE;
+ break;
+
+ case TYPE_IPV4:
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree4, hf_ubt_dt_uacipv4, tvb, offset, 4, ENC_BIG_ENDIAN);
+ offset += 4;
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_padding, tvb, offset, 12, ENC_NA);
+ offset += 12;
+ break;
+
+ case TYPE_NOT_ASSIGNED:
+ proto_tree_add_item(message_subtree4, hf_ubt_ip_unassigned, tvb, offset, IP_SIZE - 2, ENC_NA);
+ offset += IP_SIZE - 2;
+ break;
+
+ default:
+ proto_tree_add_expert_format(message_subtree4, pinfo, &ei_ubt_unknown, tvb, offset, IP_SIZE - 2, "Invalid IP Type");
+ offset += IP_SIZE - 2;
+
+ }
+ }
+ break;
+
+ case Status:/* Type 15: Status */
+
+ /* adding Status as proto_item to the tree */
+ proto_tree_add_item_ret_boolean(message_subtree2, hf_ubt_dt_status, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %u(%s)", val, (val == 1) ? "Success" : "Failure");
+ col_append_fstr(pinfo->cinfo, COL_INFO, " status:%02d(%s)", val, (val == 1) ? "Success" : "Failure");
+ offset += optlen;
+ break;
+
+ case MCASTKey:/* Type 16: MCAST Key */
+
+ /* adding MCAST key as proto_item to the tree */
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_mcastkey, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %#x(%u)", val, val);
+
+ /* appending to info column */
+ col_append_fstr(pinfo->cinfo, COL_INFO, " mcastkey:%u", val);
+ offset += optlen;
+ break;
+
+ case ServerIP:/* Type 17: Server IP Address */
+
+ /* adding Server IP Address as proto_item to the tree */
+
+ proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_ip_type, tvb, offset, 2, ENC_BIG_ENDIAN, &val);
+ offset += 2;
+
+ switch (val) {
+
+ case TYPE_IPV6:
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_serveripv6, tvb, offset, IPv6_ADDR_SIZE, ENC_NA);
+ offset += IPv6_ADDR_SIZE;
+ break;
+
+ case TYPE_IPV4:
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_padding, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_serveripv4, tvb, offset, 4, ENC_BIG_ENDIAN);
+ offset += 4;
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_padding, tvb, offset, 12, ENC_NA);
+ offset += 12;
+ break;
+
+ case TYPE_NOT_ASSIGNED:
+ proto_tree_add_item(message_subtree2, hf_ubt_ip_unassigned, tvb, offset, IP_SIZE - 2, ENC_NA);
+ offset += IP_SIZE - 2;
+ break;
+
+ default:
+ proto_tree_add_expert_format(message_subtree2, pinfo, &ei_ubt_unknown, tvb, offset, IP_SIZE - 2, "Invalid IP Type");
+ offset += IP_SIZE - 2;
+
+ }
+ break;
+
+ case UserAuthMethod:/* Type 18: User Authentication method */
+
+ /* adding User Authentication method as proto_item to the tree */
+ tlv_item = proto_tree_add_item_ret_uint(message_subtree2, hf_ubt_dt_userauthmethod, tvb, offset, optlen, ENC_BIG_ENDIAN, &val);
+ proto_item_append_text(tlv, ": %u(%s)", val, val_to_str(val, ubt_authmethod_vals, "Unknown Type (%02d)"));
+ proto_item_append_text(tlv_item, "(%s)", val_to_str(val, ubt_authmethod_vals, "Unknown Type (%02d)"));
+ offset += optlen;
+ break;
+
+ case Username:/* Type 19: Username */
+
+ /* adding username as proto_item to the tree */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_username, tvb, offset, optlen, ENC_ASCII);
+ proto_item_append_text(tlv, ": %s", tvb_get_string_enc(pinfo->pool, tvb, offset, optlen, ENC_ASCII));
+ offset += optlen;
+ break;
+
+ case UserPortName:/* Type 20: User Port name */
+
+ /* adding user port name as proto_item to the tree */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_userportname, tvb, offset, optlen, ENC_ASCII);
+ proto_item_append_text(tlv, ": %s", tvb_get_string_enc(pinfo->pool, tvb, offset, optlen, ENC_ASCII));
+ offset += optlen;
+ break;
+
+ case SwitchName:/* Type 21: Switch Name */
+
+ /* adding Switch name as proto_item to the tree */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_switchname, tvb, offset, optlen, ENC_ASCII);
+ proto_item_append_text(tlv, ": %s", tvb_get_string_enc(pinfo->pool, tvb, offset, optlen, ENC_ASCII));
+ offset += optlen;
+ break;
+
+ case SilentClientVLANs:/* Type 22: Silent Client VLANs */
+
+ /* adding Silent Client VLANs as proto_item to the tree */
+ tlv_item = proto_tree_add_item(message_subtree2, hf_ubt_dt_silentclientvlans, tvb, offset, optlen, ENC_NA);
+ message_subtree3 = proto_item_add_subtree(tlv_item, ett_ubt_tlv);
+ proto_item_append_text(tlv, ": %u", tvb_get_guint16(tvb, offset, ENC_BIG_ENDIAN));
+
+ /* adding each silent client VLAN assigned */
+ for (int i = 0; i < 200; i++) {
+ proto_tree_add_item(message_subtree3, hf_ubt_dt_silentclientvlan, tvb, offset, 2, ENC_NA);
+ offset += 2;
+ }
+ break;
+
+ case MaxMsgs:/* Type 23: Maximum Messages */
+
+ /* adding Max Msgs as proto_item to the tree */
+ proto_tree_add_item(message_subtree2, hf_ubt_dt_maxmsgs, tvb, offset, optlen, ENC_NA);
+ offset += optlen;
+ break;
+
+ default:
+ proto_tree_add_expert_format(message_subtree2, pinfo, &ei_ubt_unknown, tvb, offset, optlen, "Unknown");
+ offset += optlen;
+ }
+ }
+ next_tvb = tvb_new_subset_remaining(tvb, offset);
+ call_data_dissector(next_tvb, pinfo, tree);
+ return tvb_captured_length(tvb);
+}
+
+/* function to register the protocol & hf values used */
+void
+proto_register_ubt(void)
+{
+
+ /* hf array to store datatypes of different fields */
+ static hf_register_info hf[] = {
+
+ { &hf_ubt_packet_len,/* length of packet/buffer */
+ { "Packet Length", "ubt.packet_len",
+ FT_UINT32, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_tlv_header,/* header for TLV */
+ { "Type-Length-Value", "ubt.tlv_header",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_tlv,/* for each TLV */
+ { "TLV", "ubt.tlv",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_type,/* type of each TLV */
+ { "Type", "ubt.tlv_type",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_length,/* length of each TLV */
+ { "Length", "ubt.tlv_length",
+ FT_UINT16, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_switch_macaddr,/* MAC address of Switch */
+ { "Switch MAC Address", "ubt.switch.mac_addr",
+ FT_ETHER, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_switch_seqno,/* sequence number of Switch */
+ { "Switch Sequence Number", "ubt.switch.seq_number",
+ FT_UINT32, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_msg_type,/* type of UBT message */
+ { "Message Type", "ubt.msg_type",
+ FT_UINT32, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_unknown,/* Unknown data type */
+ { "Unknown Datatype", "ubt.unknown_datatype",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_grekey,/* GRE key */
+ { "GRE Key", "ubt.gre_key",
+ FT_UINT16, BASE_HEX_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_firmwareversion,/* version of the firmware */
+ { "Firmware Version", "ubt.firmware_version",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_userkey,/* userkey */
+ { "User Key", "ubt.user_key",
+ FT_UINT16, BASE_HEX_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_sacmode,/* mode of SAC */
+ { "SAC Mode", "ubt.sac_mode",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_sacipv4,/* IPv4 address of SAC */
+ { "SAC IP Address (IPv4)", "ubt.sac_ipv4",
+ FT_IPv4, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_sacipv6,/* IPv6 address of SAC */
+ { "SAC IP Address (IPv6)", "ubt.sac_ipv6",
+ FT_IPv6, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_heartbeattimeout,/* heartbeat timeout in secs */
+ { "Heartbeat Timeout", "ubt.heartbeat_timeout",
+ FT_UINT16, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_usermac,/* MAC address of User */
+ { "User MAC Address", "ubt.user_macaddress",
+ FT_ETHER, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_uservlan,/* VLAN assigned to user */
+ { "User VLAN", "ubt.user_vlan",
+ FT_UINT16, BASE_HEX_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_ip_type,/* IP type */
+ { "IP Type", "ubt.ip_type",
+ FT_UINT16, BASE_HEX, VALS(ubt_iptype_vals), 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_ip_padding,/* IP Padding */
+ { "IP Padding", "ubt.ip_padding",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_ip_unassigned,/* IP Padding */
+ { "IP Unassigned", "ubt.ip_unassigned",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_flags,/* Flags, both switch & user */
+ { "Flags", "ubt.flags",
+ FT_UINT8, BASE_HEX, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_switch_flags_bcmctoucast,/* switch flag: BCMC to UCAST? */
+ { "SB_FLAGS_CONV_BCMC_TO_UCAST", "ubt.flags.switch.bcmctoucast",
+ FT_BOOLEAN, 8, TFS(&tfs_set_notset), 0x01,
+ NULL, HFILL }
+ },
+ { &hf_ubt_user_flags_tag,/* user flag: Tagged? */
+ { "UB_FLAGS_TAGGED", "ubt.flags.user.tag",
+ FT_BOOLEAN, 8, TFS(&tfs_set_notset), 0x01,
+ NULL, HFILL }
+ },
+ { &hf_ubt_user_flags_auth,/* user flag: Authenticated? */
+ { "UB_FLAGS_IS_AUTHENTICATED", "ubt.flags.user.auth",
+ FT_BOOLEAN, 8, TFS(&tfs_set_notset), 0x02,
+ NULL, HFILL }
+ },
+ { &hf_ubt_user_flags_bcmctoucast,/* user flag: BCMC to UCAST? */
+ { "UB_FLAGS_CONV_BCMC_TO_UCAST", "ubt.flags.user.bcmctoucast",
+ FT_BOOLEAN, 8, TFS(&tfs_set_notset), 0x04,
+ NULL, HFILL }
+ },
+ { &hf_ubt_user_flags_dormant,/* user flag: Dormant? */
+ { "UB_FLAGS_DORMANT", "ubt.flags.user.dormant",
+ FT_BOOLEAN, 8, TFS(&tfs_set_notset), 0x08,
+ NULL, HFILL }
+ },
+ { &hf_ubt_user_flags_uback,/* user flag: UB ACK sent? */
+ { "UB_FLAGS_IS_UB_ACK_SENT", "ubt.flags.user.uback",
+ FT_BOOLEAN, 8, TFS(&tfs_set_notset), 0x10,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_tunnelmtu,/* Tunnel MTU */
+ { "Tunnel MTU", "ubt.tunnel_mtu",
+ FT_UINT16, BASE_HEX_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_userrole,/* role of user */
+ { "User Role", "ubt.user_role",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_reasoncode,/* reason code */
+ { "Reason Code", "ubt.reason_code",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_nodelist,/* nodelist header */
+ { "Node List", "ubt.node_list",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_clustername,/* name of the cluster */
+ { "Cluster Name", "ubt.node_list.cluster_name",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_clusterenabled,/* if cluster enabled or not */
+ { "Cluster Enabled", "ubt.node_list.cluster_enabled",
+ FT_BOOLEAN, 8, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_ssacindex,/* index of SSAC */
+ { "SSAC Index", "ubt.node_list.ssac_index",
+ FT_INT8, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_reserved,/* no of reserved */
+ { "Reserved", "ubt.node_list.reserved",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_uaccount,/* no of UACs assigned */
+ { "UAC Count", "ubt.uac_count",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_uaciplist,/* IP addresses of each UAC */
+ { "UAC IP", "ubt.uac_ip_list",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_uacipv4,/* IPv4 address of UAC */
+ { "UAC IP Address (IPv4)", "ubt.uac_ipv4",
+ FT_IPv4, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_uacipv6,/* IPv6 address of UAC */
+ { "UAC IP Address (IPv6)", "ubt.uac_ipv6",
+ FT_IPv6, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_bucketmap,/* bucketmap header */
+ { "Bucket Map", "ubt.bucket_map",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_timestamp,/* timestamp */
+ { "Timestamp", "ubt.bucket_map.time_stamp",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_identifier,/* identifier string */
+ { "Identifier", "ubt.bucket_map.identifier",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ /* arrays to hold active maps */
+ { &hf_ubt_dt_activemap1,/* array 1 */
+ { "Active Map[0-31]", "ubt.bucket_map.active_map_0-031",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_activemap2,/* array 2 */
+ { "Active Map[32-63]", "ubt.bucket_map.active_map_032-063",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_activemap3,/* array 3 */
+ { "Active Map[64-95]", "ubt.bucket_map.active_map_064-095",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_activemap4,/* array 4 */
+ { "Active Map[96-127]", "ubt.bucket_map.active_map_096-127",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_activemap5,/* array 5 */
+ { "Active Map[128-159]", "ubt.bucket_map.active_map_128-159",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_activemap6,/* array 6 */
+ { "Active Map[160-191]", "ubt.bucket_map.active_map_160-191",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_activemap7,/* array 7 */
+ { "Active Map[192-223]", "ubt.bucket_map.active_map_192-223",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_activemap8,/* array 8 */
+ { "Active Map[224-255]", "ubt.bucket_map.active_map_224-255",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ /* arrays to hold standby maps */
+ { &hf_ubt_dt_standbymap1,/* array 1 */
+ { "Standby Map[0-31]", "ubt.bucket_map.standby_map_0-031",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_standbymap2,/* array 2 */
+ { "Standby Map[32-63]", "ubt.bucket_map.standby_map_032-063",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_standbymap3,/* array 3 */
+ { "Standby Map[64-95]", "ubt.bucket_map.standby_map_064-095",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_standbymap4,/* array 4 */
+ { "Standby Map[96-127]", "ubt.bucket_map.standby_map_096-127",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_standbymap5,/* array 5 */
+ { "Standby Map[128-159]", "ubt.bucket_map.standby_map_128-159",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_standbymap6,/* array 6 */
+ { "Standby Map[160-191]", "ubt.bucket_map.standby_map_160-191",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_standbymap7,/* array 7 */
+ { "Standby Map[192-223]", "ubt.bucket_map.standby_map_192-223",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_standbymap8,/* array 8 */
+ { "Standby Map[224-255]", "ubt.bucket_map.standby_map_224-255",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ /* arrays to hold l2conn */
+ { &hf_ubt_dt_l2conn1,/* array 1 */
+ { "L2Connect[0-31]", "ubt.bucket_map.l2conn_0-031",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_l2conn2,/* array 2 */
+ { "L2Connect[32-63]", "ubt.bucket_map.l2conn_032-063",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_l2conn3,/* array 3 */
+ { "L2Connect[64-95]", "ubt.bucket_map.l2conn_064-095",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_l2conn4,/* array 4 */
+ { "L2Connect[96-127]", "ubt.bucket_map.l2conn_096-127",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_l2conn5,/* array 5 */
+ { "L2Connect[128-159]", "ubt.bucket_map.l2conn_128-159",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_l2conn6,/* array 6 */
+ { "L2Connect[160-191]", "ubt.bucket_map.l2conn_160-191",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_l2conn7,/* array 7 */
+ { "L2Connect[192-223]", "ubt.bucket_map.l2conn_192-223",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+ { &hf_ubt_dt_l2conn8,/* array 8 */
+ { "L2Connect[224-255]", "ubt.bucket_map.l2conn_224-255",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+
+ { &hf_ubt_dt_status,/* status of message */
+ { "Status", "ubt.status",
+ FT_BOOLEAN, 8, TFS(&tfs_success_fail), 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_mcastkey,/* MCAST key used */
+ { "MCAST Key", "ubt.mcast_key",
+ FT_UINT16, BASE_HEX_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_serveripv4,/* IPv4 address of server */
+ { "Server IP Address (IPv4)", "ubt.server_ipaddressv4",
+ FT_IPv4, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_serveripv6,/* IPv6 address of server */
+ { "Server IP Address (IPv6)", "ubt.server_ipaddressv6",
+ FT_IPv6, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_userauthmethod,/* user authentication method used */
+ { "User Auth Method", "ubt.user_authmethod",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_username,/* username */
+ { "Username", "ubt.username",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_userportname,/* Port name of the user */
+ { "User Port Name", "ubt.user_portname",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_switchname,/* name of the switch */
+ { "Switch Name", "ubt.switch_name",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_silentclientvlans,/* Silent Client VLANs header */
+ { "Silent Client VLANs", "ubt.silent_client_vlans",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_silentclientvlan,/* each silent client VLAN assigned */
+ { "Silent Client VLAN", "ubt.silent_client_vlan",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ },
+
+ { &hf_ubt_dt_maxmsgs,/* maximum messages allowed */
+ { "Max Messages", "ubt.max_msgs",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }
+ }
+
+ };
+
+ /* Setup protocol subtree array */
+ static gint* ett[] = {
+ &ett_ubt,
+ &ett_ubt_tlv,
+ &ett_ubt_flags
+ };
+
+ static ei_register_info ei[] = {
+ { &ei_ubt_unknown, {"ubt.unknown", PI_PROTOCOL, PI_WARN, "Unknown", EXPFILL}},
+ };
+
+ /* registering protocol with proto_register_protocol() function */
+ proto_ubt = proto_register_protocol("Aruba UBT", "UBT", "ubt");
+
+ /* registering field array */
+ proto_register_field_array(proto_ubt, hf, array_length(hf));
+
+ /* registering subtree array */
+ proto_register_subtree_array(ett, array_length(ett));
+
+ expert_module_t* expert_ubt;
+
+ /* registering UBT protocol with expert info */
+ expert_ubt = expert_register_protocol(proto_ubt);
+
+ /* registering expert field array for UBT */
+ expert_register_field_array(expert_ubt, ei, array_length(ei));
+
+ /* handling proto_ubt & dissector function using handle */
+ ubt_handle = register_dissector("ubt", dissect_ubt, proto_ubt);
+}
+
+void
+proto_reg_handoff_ubt(void)
+{
+ /* adding port numbers to the handle */
+ dissector_add_uint("papi.port", PORT_UBT, ubt_handle);
+}
+/*
+ * Editor modelines - https://www.wireshark.org/tools/modelines.html
+ *
+ * Local variables:
+ * c-basic-offset: 4
+ * tab-width: 8
+ * indent-tabs-mode: nil
+ * End:
+ *
+ * vi: set shiftwidth=4 tabstop=8 expandtab:
+ * :indentSize=4:tabSize=8:noTabs=true:
+ */