diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-09-19 04:14:33 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-09-19 04:14:33 +0000 |
commit | 9f153fbfec0fb9c9ce38e749a7c6f4a5e115d4e9 (patch) | |
tree | 2784370cda9bbf2da9114d70f05399c0b229d28c /epan/dissectors/packet-c1222.c | |
parent | Adding debian version 4.2.6-1. (diff) | |
download | wireshark-9f153fbfec0fb9c9ce38e749a7c6f4a5e115d4e9.tar.xz wireshark-9f153fbfec0fb9c9ce38e749a7c6f4a5e115d4e9.zip |
Merging upstream version 4.4.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-c1222.c')
-rw-r--r-- | epan/dissectors/packet-c1222.c | 577 |
1 files changed, 289 insertions, 288 deletions
diff --git a/epan/dissectors/packet-c1222.c b/epan/dissectors/packet-c1222.c index 533988fe..fb2a9f4d 100644 --- a/epan/dissectors/packet-c1222.c +++ b/epan/dissectors/packet-c1222.c @@ -1,7 +1,7 @@ /* Do not modify this file. Changes will be overwritten. */ /* Generated automatically by the ASN.1 to Wireshark dissector compiler */ /* packet-c1222.c */ -/* asn2wrs.py -b -L -p c1222 -c ./c1222.cnf -s ./packet-c1222-template -D . -O ../.. c1222.asn */ +/* asn2wrs.py -b -q -L -p c1222 -c ./c1222.cnf -s ./packet-c1222-template -D . -O ../.. c1222.asn */ /* packet-c1222.c * Routines for ANSI C12.22 packet dissection @@ -24,6 +24,7 @@ #include <epan/uat.h> #include <epan/oids.h> #include <wsutil/eax.h> +#include <wsutil/array.h> #include "packet-ber.h" #include "packet-tcp.h" #include "packet-c1222.h" @@ -42,8 +43,8 @@ #define C1222_EPSEM_FLAG_RESPONSE_CONTROL 0x03 #define C1222_PROCEDURE_RESPONSE 0xf000 -#define C1222_PROCEDURE_MFG 0x800 -#define C1222_PROCEDURE_NUMBER 0x7ff +#define C1222_PROCEDURE_MFG 0x0800 +#define C1222_PROCEDURE_NUMBER 0x07ff /* if the packet is encrypted, it can be * good, bad, or simply not checked @@ -71,46 +72,46 @@ void proto_register_c1222(void); -static dissector_handle_t c1222_handle=NULL; -static dissector_handle_t c1222_udp_handle=NULL; +static dissector_handle_t c1222_handle; +static dissector_handle_t c1222_udp_handle; /* Initialize the protocol and registered fields */ -static int proto_c1222 = -1; - -static int hf_c1222_MESSAGE_PDU = -1; /* MESSAGE */ -static int hf_c1222_aSO_context = -1; /* ASO_qualifier */ -static int hf_c1222_called_AP_title = -1; /* Called_AP_title */ -static int hf_c1222_called_AP_invocation_id = -1; /* Called_AP_invocation_id */ -static int hf_c1222_calling_AP_title = -1; /* Calling_AP_title */ -static int hf_c1222_calling_AE_qualifier = -1; /* Calling_AE_qualifier */ -static int hf_c1222_calling_AP_invocation_id = -1; /* Calling_AP_invocation_id */ -static int hf_c1222_mechanism_name = -1; /* Mechanism_name */ -static int hf_c1222_calling_authentication_value = -1; /* Calling_authentication_value */ -static int hf_c1222_user_information = -1; /* User_information */ -static int hf_c1222_called_ap_title_abs = -1; /* OBJECT_IDENTIFIER */ -static int hf_c1222_called_ap_title_rel = -1; /* RELATIVE_OID */ -static int hf_c1222_calling_ap_title_abs = -1; /* OBJECT_IDENTIFIER */ -static int hf_c1222_calling_ap_title_rel = -1; /* RELATIVE_OID */ -static int hf_c1222_calling_authentication_value_indirect = -1; /* INTEGER */ -static int hf_c1222_calling_authentication_value_encoding = -1; /* Authentication_value_encoding */ -static int hf_c1222_calling_authentication_value_single_asn1 = -1; /* Calling_authentication_value_single_asn1 */ -static int hf_c1222_calling_authentication_value_octet_aligned = -1; /* OCTET_STRING */ -static int hf_c1222_calling_authentication_value_c1222 = -1; /* Calling_authentication_value_c1222 */ -static int hf_c1222_calling_authentication_value_c1221 = -1; /* Calling_authentication_value_c1221 */ -static int hf_c1222_key_id_element = -1; /* Key_id_element */ -static int hf_c1222_iv_element = -1; /* Iv_element */ -static int hf_c1222_c1221_auth_identification = -1; /* OCTET_STRING_SIZE_CONSTR001 */ -static int hf_c1222_c1221_auth_request = -1; /* OCTET_STRING_SIZE_1_255 */ -static int hf_c1222_c1221_auth_response = -1; /* OCTET_STRING_SIZE_CONSTR002 */ +static int proto_c1222; + +static int hf_c1222_MESSAGE_PDU; /* MESSAGE */ +static int hf_c1222_aSO_context; /* ASO_qualifier */ +static int hf_c1222_called_AP_title; /* Called_AP_title */ +static int hf_c1222_called_AP_invocation_id; /* Called_AP_invocation_id */ +static int hf_c1222_calling_AP_title; /* Calling_AP_title */ +static int hf_c1222_calling_AE_qualifier; /* Calling_AE_qualifier */ +static int hf_c1222_calling_AP_invocation_id; /* Calling_AP_invocation_id */ +static int hf_c1222_mechanism_name; /* Mechanism_name */ +static int hf_c1222_calling_authentication_value; /* Calling_authentication_value */ +static int hf_c1222_user_information; /* User_information */ +static int hf_c1222_called_ap_title_abs; /* OBJECT_IDENTIFIER */ +static int hf_c1222_called_ap_title_rel; /* RELATIVE_OID */ +static int hf_c1222_calling_ap_title_abs; /* OBJECT_IDENTIFIER */ +static int hf_c1222_calling_ap_title_rel; /* RELATIVE_OID */ +static int hf_c1222_calling_authentication_value_indirect; /* INTEGER */ +static int hf_c1222_calling_authentication_value_encoding; /* Authentication_value_encoding */ +static int hf_c1222_calling_authentication_value_single_asn1; /* Calling_authentication_value_single_asn1 */ +static int hf_c1222_calling_authentication_value_octet_aligned; /* OCTET_STRING */ +static int hf_c1222_calling_authentication_value_c1222; /* Calling_authentication_value_c1222 */ +static int hf_c1222_calling_authentication_value_c1221; /* Calling_authentication_value_c1221 */ +static int hf_c1222_key_id_element; /* Key_id_element */ +static int hf_c1222_iv_element; /* Iv_element */ +static int hf_c1222_c1221_auth_identification; /* OCTET_STRING_SIZE_CONSTR001 */ +static int hf_c1222_c1221_auth_request; /* OCTET_STRING_SIZE_1_255 */ +static int hf_c1222_c1221_auth_response; /* OCTET_STRING_SIZE_CONSTR002 */ /* These are the EPSEM pieces */ /* first, the flag components */ -static int hf_c1222_epsem_flags = -1; -static int hf_c1222_epsem_flags_reserved = -1; -static int hf_c1222_epsem_flags_recovery = -1; -static int hf_c1222_epsem_flags_proxy = -1; -static int hf_c1222_epsem_flags_ed_class = -1; -static int hf_c1222_epsem_flags_security_modes = -1; -static int hf_c1222_epsem_flags_response_control = -1; +static int hf_c1222_epsem_flags; +static int hf_c1222_epsem_flags_reserved; +static int hf_c1222_epsem_flags_recovery; +static int hf_c1222_epsem_flags_proxy; +static int hf_c1222_epsem_flags_ed_class; +static int hf_c1222_epsem_flags_security_modes; +static int hf_c1222_epsem_flags_response_control; /* and the structure of the flag components */ static int * const c1222_flags[] = { &hf_c1222_epsem_flags_reserved, @@ -122,119 +123,119 @@ static int * const c1222_flags[] = { NULL }; /* next the optional ed_class */ -static int hf_c1222_epsem_ed_class = -1; +static int hf_c1222_epsem_ed_class; /* now the aggregate epsem */ -static int hf_c1222_epsem_total = -1; +static int hf_c1222_epsem_total; /* generic command */ -static int hf_c1222_cmd = -1; -static int hf_c1222_err = -1; -static int hf_c1222_data = -1; +static int hf_c1222_cmd; +static int hf_c1222_err; +static int hf_c1222_data; /* individual epsem fields */ -static int hf_c1222_logon_id = -1; -static int hf_c1222_logon_user = -1; -static int hf_c1222_security_password = -1; -static int hf_c1222_auth_len = -1; -static int hf_c1222_auth_data = -1; -static int hf_c1222_read_table = -1; -static int hf_c1222_read_offset = -1; -static int hf_c1222_read_count = -1; -static int hf_c1222_write_table = -1; -static int hf_c1222_write_offset = -1; -static int hf_c1222_write_size = -1; -static int hf_c1222_write_data = -1; -static int hf_c1222_procedure_response = -1; -static int hf_c1222_procedure_mfg = -1; -static int hf_c1222_procedure_num = -1; -static int hf_c1222_procedure_sequence = -1; -static int hf_c1222_write_chksum = -1; -static int hf_c1222_write_chksum_status = -1; -static int hf_c1222_wait_secs = -1; -static int hf_c1222_neg_pkt_size = -1; -static int hf_c1222_neg_nbr_pkts = -1; -static int hf_c1222_timing_setup_traffic = -1; -static int hf_c1222_timing_setup_inter_char = -1; -static int hf_c1222_timing_setup_resp_to = -1; -static int hf_c1222_timing_setup_nbr_retries = -1; +static int hf_c1222_logon_id; +static int hf_c1222_logon_user; +static int hf_c1222_security_password; +static int hf_c1222_auth_len; +static int hf_c1222_auth_data; +static int hf_c1222_read_table; +static int hf_c1222_read_offset; +static int hf_c1222_read_count; +static int hf_c1222_write_table; +static int hf_c1222_write_offset; +static int hf_c1222_write_size; +static int hf_c1222_write_data; +static int hf_c1222_procedure_response; +static int hf_c1222_procedure_mfg; +static int hf_c1222_procedure_num; +static int hf_c1222_procedure_sequence; +static int hf_c1222_write_chksum; +static int hf_c1222_write_chksum_status; +static int hf_c1222_wait_secs; +static int hf_c1222_neg_pkt_size; +static int hf_c1222_neg_nbr_pkts; +static int hf_c1222_timing_setup_traffic; +static int hf_c1222_timing_setup_inter_char; +static int hf_c1222_timing_setup_resp_to; +static int hf_c1222_timing_setup_nbr_retries; /* the MAC */ -static int hf_c1222_epsem_mac = -1; +static int hf_c1222_epsem_mac; /* crypto result flags */ -static int hf_c1222_epsem_crypto_good = -1; -static int hf_c1222_epsem_crypto_bad = -1; +static int hf_c1222_epsem_crypto_good; +static int hf_c1222_epsem_crypto_bad; /* Initialize the subtree pointers */ -static int ett_c1222 = -1; -static int ett_c1222_epsem = -1; -static int ett_c1222_flags = -1; -static int ett_c1222_crypto = -1; -static int ett_c1222_cmd = -1; +static int ett_c1222; +static int ett_c1222_epsem; +static int ett_c1222_flags; +static int ett_c1222_crypto; +static int ett_c1222_cmd; /* these pointers are for the header elements that may be needed to verify the crypto */ -static guint8 *aSO_context = NULL; -static guint8 *called_AP_title = NULL; -static guint8 *called_AP_invocation_id = NULL; -static guint8 *calling_AE_qualifier = NULL; -static guint8 *calling_AP_invocation_id = NULL; -static guint8 *mechanism_name = NULL; -static guint8 *calling_authentication_value = NULL; -static guint8 *user_information = NULL; -static guint8 *calling_AP_title = NULL; -static guint8 *key_id_element = NULL; -static guint8 *iv_element = NULL; +static uint8_t *aSO_context; +static uint8_t *called_AP_title; +static uint8_t *called_AP_invocation_id; +static uint8_t *calling_AE_qualifier; +static uint8_t *calling_AP_invocation_id; +static uint8_t *mechanism_name; +static uint8_t *calling_authentication_value; +static uint8_t *user_information; +static uint8_t *calling_AP_title; +static uint8_t *key_id_element; +static uint8_t *iv_element; /* these are the related lengths */ -static guint32 aSO_context_len = 0; -static guint32 called_AP_title_len = 0; -static guint32 called_AP_invocation_id_len = 0; -static guint32 calling_AE_qualifier_len = 0; -static guint32 calling_AP_invocation_id_len = 0; -static guint32 mechanism_name_len = 0; -static guint32 calling_authentication_value_len = 0; -static guint32 user_information_len = 0; -static guint32 calling_AP_title_len = 0; -static guint32 key_id_element_len = 0; -static guint32 iv_element_len = 0; +static uint32_t aSO_context_len; +static uint32_t called_AP_title_len; +static uint32_t called_AP_invocation_id_len; +static uint32_t calling_AE_qualifier_len; +static uint32_t calling_AP_invocation_id_len; +static uint32_t mechanism_name_len; +static uint32_t calling_authentication_value_len; +static uint32_t user_information_len; +static uint32_t calling_AP_title_len; +static uint32_t key_id_element_len; +static uint32_t iv_element_len; /* these are the related allocation sizes (which might be different from the lengths) */ -static guint32 aSO_context_allocated = 0; -static guint32 called_AP_title_allocated = 0; -static guint32 called_AP_invocation_id_allocated = 0; -static guint32 calling_AE_qualifier_allocated = 0; -static guint32 calling_AP_invocation_id_allocated = 0; -static guint32 mechanism_name_allocated = 0; -static guint32 calling_authentication_value_allocated = 0; -static guint32 user_information_allocated = 0; -static guint32 calling_AP_title_allocated = 0; -static guint32 key_id_element_allocated = 0; -static guint32 iv_element_allocated = 0; - -static gint ett_c1222_MESSAGE_U = -1; -static gint ett_c1222_Called_AP_title = -1; -static gint ett_c1222_Calling_AP_title = -1; -static gint ett_c1222_Calling_authentication_value_U = -1; -static gint ett_c1222_Authentication_value_encoding = -1; -static gint ett_c1222_Calling_authentication_value_single_asn1 = -1; -static gint ett_c1222_Calling_authentication_value_c1222_U = -1; -static gint ett_c1222_Calling_authentication_value_c1221_U = -1; - -static expert_field ei_c1222_command_truncated = EI_INIT; -static expert_field ei_c1222_bad_checksum = EI_INIT; -static expert_field ei_c1222_epsem_missing = EI_INIT; -static expert_field ei_c1222_epsem_failed_authentication = EI_INIT; -static expert_field ei_c1222_epsem_not_decrypted = EI_INIT; -static expert_field ei_c1222_ed_class_missing = EI_INIT; -static expert_field ei_c1222_epsem_ber_length_error = EI_INIT; -static expert_field ei_c1222_epsem_field_length_error = EI_INIT; -static expert_field ei_c1222_mac_missing = EI_INIT; +static uint32_t aSO_context_allocated; +static uint32_t called_AP_title_allocated; +static uint32_t called_AP_invocation_id_allocated; +static uint32_t calling_AE_qualifier_allocated; +static uint32_t calling_AP_invocation_id_allocated; +static uint32_t mechanism_name_allocated; +static uint32_t calling_authentication_value_allocated; +static uint32_t user_information_allocated; +static uint32_t calling_AP_title_allocated; +static uint32_t key_id_element_allocated; +static uint32_t iv_element_allocated; + +static int ett_c1222_MESSAGE_U; +static int ett_c1222_Called_AP_title; +static int ett_c1222_Calling_AP_title; +static int ett_c1222_Calling_authentication_value_U; +static int ett_c1222_Authentication_value_encoding; +static int ett_c1222_Calling_authentication_value_single_asn1; +static int ett_c1222_Calling_authentication_value_c1222_U; +static int ett_c1222_Calling_authentication_value_c1221_U; + +static expert_field ei_c1222_command_truncated; +static expert_field ei_c1222_bad_checksum; +static expert_field ei_c1222_epsem_missing; +static expert_field ei_c1222_epsem_failed_authentication; +static expert_field ei_c1222_epsem_not_decrypted; +static expert_field ei_c1222_ed_class_missing; +static expert_field ei_c1222_epsem_ber_length_error; +static expert_field ei_c1222_epsem_field_length_error; +static expert_field ei_c1222_mac_missing; /* Preferences */ -static gboolean c1222_desegment = TRUE; -static gboolean c1222_decrypt = TRUE; -static gboolean c1222_big_endian = FALSE; -static const gchar *c1222_baseoid_str = NULL; -static guint8 *c1222_baseoid = NULL; -static guint c1222_baseoid_len = 0; +static bool c1222_desegment = true; +static bool c1222_decrypt = true; +static bool c1222_big_endian; +static const char *c1222_baseoid_str; +static uint8_t *c1222_baseoid; +static unsigned c1222_baseoid_len; /*------------------------------ * Data Structures @@ -332,37 +333,37 @@ static const value_string commandnames[] = { /* these are for the key tables */ typedef struct _c1222_uat_data { - guint keynum; - guchar *key; - guint keylen; + unsigned keynum; + unsigned char *key; + unsigned keylen; } c1222_uat_data_t; UAT_HEX_CB_DEF(c1222_users, keynum, c1222_uat_data_t) UAT_BUFFER_CB_DEF(c1222_users, key, c1222_uat_data_t, key, keylen) -static c1222_uat_data_t *c1222_uat_data = NULL; -static guint num_c1222_uat_data = 0; +static c1222_uat_data_t *c1222_uat_data; +static unsigned num_c1222_uat_data; static uat_t *c1222_uat; /* these macros ares used to populate fields needed to verify crypto */ #define FILL_START int length, start_offset = offset; #define FILL_TABLE(fieldname) \ length = offset - start_offset; \ - fieldname = (guint8 *)tvb_memdup(actx->pinfo->pool, tvb, start_offset, length); \ + fieldname = (uint8_t *)tvb_memdup(actx->pinfo->pool, tvb, start_offset, length); \ fieldname##_len = length; \ fieldname##_allocated = length; #define FILL_TABLE_TRUNCATE(fieldname, len) \ length = 1 + 2*(offset - start_offset); \ - fieldname = (guint8 *)tvb_memdup(actx->pinfo->pool, tvb, start_offset, length); \ + fieldname = (uint8_t *)tvb_memdup(actx->pinfo->pool, tvb, start_offset, length); \ fieldname##_len = len; \ fieldname##_allocated = length; #define FILL_TABLE_APTITLE(fieldname) \ length = offset - start_offset; \ - switch (tvb_get_guint8(tvb, start_offset)) { \ + switch (tvb_get_uint8(tvb, start_offset)) { \ case 0x80: /* relative OID */ \ tvb_ensure_bytes_exist(tvb, start_offset, length); \ fieldname##_len = length + c1222_baseoid_len; \ - fieldname = (guint8 *)wmem_alloc(actx->pinfo->pool, fieldname##_len); \ + fieldname = (uint8_t *)wmem_alloc(actx->pinfo->pool, fieldname##_len); \ fieldname##_allocated = fieldname##_len; \ fieldname[0] = 0x06; /* create absolute OID tag */ \ fieldname[1] = (fieldname##_len - 2) & 0xff; \ @@ -371,7 +372,7 @@ static uat_t *c1222_uat; break; \ case 0x06: /* absolute OID */ \ default: \ - fieldname = (guint8 *)tvb_memdup(actx->pinfo->pool, tvb, start_offset, length); \ + fieldname = (uint8_t *)tvb_memdup(actx->pinfo->pool, tvb, start_offset, length); \ fieldname##_len = length; \ fieldname##_allocated = length; \ break; \ @@ -397,12 +398,12 @@ void proto_reg_handoff_c1222(void); * \param len length of data to be checksummed * \returns calculated checksum */ -static guint8 -c1222_cksum(tvbuff_t *tvb, gint offset, int len) +static uint8_t +c1222_cksum(tvbuff_t *tvb, int offset, int len) { - guint8 sum; + uint8_t sum; for (sum = 0; len; offset++, len--) - sum += tvb_get_guint8(tvb, offset); + sum += tvb_get_uint8(tvb, offset); return ~sum + 1; } /** @@ -415,27 +416,27 @@ c1222_cksum(tvbuff_t *tvb, gint offset, int len) * \param offset the offset in the tvb */ static void -parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cmd, guint32 *length, int *offset) +parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cmd, uint32_t *length, int *offset) { - guint16 user_id = 0; - const guint8 *user_name = NULL; - const guint8 *password = NULL; - guint8 auth_len = 0; - gchar *auth_req = NULL; - guint16 table = 0; - guint16 tblsize = 0; - guint16 calcsum = 0; - guint8 wait_seconds = 0; - guint8 proc_seq = 0; + uint16_t user_id = 0; + const uint8_t *user_name = NULL; + const uint8_t *password = NULL; + uint8_t auth_len = 0; + char *auth_req = NULL; + uint16_t table = 0; + uint16_t tblsize = 0; + uint16_t calcsum = 0; + uint8_t wait_seconds = 0; + uint8_t proc_seq = 0; int numrates = 0; - guint16 packet_size; - guint16 procedure_num = 0; - guint8 nbr_packet; + uint16_t packet_size; + uint16_t procedure_num = 0; + uint8_t nbr_packet; /* timing setup parameters */ - guint8 traffic; - guint8 inter_char; - guint8 resp_to; - guint8 nbr_retries; + uint8_t traffic; + uint8_t inter_char; + uint8_t resp_to; + uint8_t nbr_retries; /* special case to simplify handling of Negotiate service */ if ((cmd & 0xF0) == C1222_CMD_NEGOTIATE) { @@ -482,7 +483,7 @@ parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cm break; case C1222_CMD_AUTHENTICATE: if (*length >= 1) { - auth_len = tvb_get_guint8(tvb, *offset); + auth_len = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_auth_len, tvb, *offset, 1, auth_len); *offset += 1; if (*length >= auth_len) { @@ -543,13 +544,13 @@ parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cm *length -= 2; if (*length >= tblsize+1U) { if (table == 7) {/* is it a procedure call? */ - procedure_num = tvb_get_guint16(tvb, *offset, c1222_big_endian ? ENC_BIG_ENDIAN : ENC_LITTLE_ENDIAN); + procedure_num = tvb_get_uint16(tvb, *offset, c1222_big_endian ? ENC_BIG_ENDIAN : ENC_LITTLE_ENDIAN); proto_tree_add_uint(tree, hf_c1222_procedure_response, tvb, *offset, 2, procedure_num); proto_tree_add_uint(tree, hf_c1222_procedure_mfg, tvb, *offset, 2, procedure_num); proto_tree_add_uint(tree, hf_c1222_procedure_num, tvb, *offset, 2, procedure_num); *offset += 2; *length -= 2; - proc_seq = tvb_get_guint8(tvb, *offset); + proc_seq = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_procedure_sequence, tvb, *offset, 1, proc_seq); *offset += 1; *length -= 1; @@ -619,7 +620,7 @@ parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cm break; case C1222_CMD_WAIT: if (*length >= 1) { - wait_seconds = tvb_get_guint8(tvb, *offset); + wait_seconds = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_wait_secs, tvb, *offset, 1, wait_seconds); *offset += 1; *length -= 1; @@ -635,7 +636,7 @@ parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cm proto_tree_add_uint(tree, hf_c1222_neg_pkt_size, tvb, *offset, 2, packet_size); *offset += 2; *length -= 2; - nbr_packet = tvb_get_guint8(tvb, *offset); + nbr_packet = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_neg_nbr_pkts, tvb, *offset, 1, nbr_packet); *offset += 1; *length -= 1; @@ -647,19 +648,19 @@ parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cm break; case C1222_CMD_TIMING_SETUP: if (*length >= 4) { - traffic = tvb_get_guint8(tvb, *offset); + traffic = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_timing_setup_traffic, tvb, *offset, 1, traffic); *offset += 1; *length -= 1; - inter_char = tvb_get_guint8(tvb, *offset); + inter_char = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_timing_setup_inter_char, tvb, *offset, 1, inter_char); *offset += 1; *length -= 1; - resp_to = tvb_get_guint8(tvb, *offset); + resp_to = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_timing_setup_resp_to, tvb, *offset, 1, resp_to); *offset += 1; *length -= 1; - nbr_retries = tvb_get_guint8(tvb, *offset); + nbr_retries = tvb_get_uint8(tvb, *offset); proto_tree_add_uint(tree, hf_c1222_timing_setup_nbr_retries, tvb, *offset, 1, nbr_retries); *offset += 1; *length -= 1; @@ -682,35 +683,35 @@ parse_c1222_detailed(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int cm typedef struct tagTOP_ELEMENT_CONTROL { - /* TRUE if this tag is required */ - gboolean required; - /* TRUE if we must truncate this tag */ - gboolean truncate; + /* true if this tag is required */ + bool required; + /* true if we must truncate this tag */ + bool truncate; /* actual hex value of the tag we're seeking */ - guint8 tag; - /* if TRUE, add tag and length before copying */ - gboolean addtag; + uint8_t tag; + /* if true, add tag and length before copying */ + bool addtag; /* pointer to pointer to memory copy of element */ - guint8 **element; + uint8_t **element; /* pointer to element length */ - guint32 *length; + uint32_t *length; /* pointer to element allocated size */ - guint32 *allocated; + uint32_t *allocated; } TOP_ELEMENT_CONTROL; static const TOP_ELEMENT_CONTROL canonifyTable[] = { - { FALSE, FALSE, 0xA1, TRUE, &aSO_context, &aSO_context_len, &aSO_context_allocated }, - { TRUE , FALSE, 0xA2, TRUE, &called_AP_title, &called_AP_title_len, &called_AP_title_allocated }, - { FALSE, FALSE, 0xA4, TRUE, &called_AP_invocation_id, &called_AP_invocation_id_len, &called_AP_invocation_id_allocated }, - { FALSE, FALSE, 0xA7, TRUE, &calling_AE_qualifier, &calling_AE_qualifier_len, &calling_AE_qualifier_allocated }, - { TRUE, FALSE, 0xA8, TRUE, &calling_AP_invocation_id, &calling_AP_invocation_id_len, &calling_AP_invocation_id_allocated }, - { FALSE, FALSE, 0x8B, TRUE, &mechanism_name, &mechanism_name_len, &mechanism_name_allocated }, - { FALSE, FALSE, 0xAC, TRUE, &calling_authentication_value, &calling_authentication_value_len, &calling_authentication_value_allocated }, - { TRUE , TRUE , 0xBE, TRUE, &user_information, &user_information_len, &user_information_allocated }, - { FALSE, FALSE, 0xA6, TRUE, &calling_AP_title, &calling_AP_title_len, &calling_AP_title_allocated }, - { FALSE, FALSE, 0xAC, FALSE, &key_id_element, &key_id_element_len, &key_id_element_allocated }, - { FALSE, FALSE, 0xAC, FALSE, &iv_element, &iv_element_len, &iv_element_allocated }, - { FALSE, FALSE, 0x0, TRUE, NULL, NULL, NULL } + { false, false, 0xA1, true, &aSO_context, &aSO_context_len, &aSO_context_allocated }, + { true , false, 0xA2, true, &called_AP_title, &called_AP_title_len, &called_AP_title_allocated }, + { false, false, 0xA4, true, &called_AP_invocation_id, &called_AP_invocation_id_len, &called_AP_invocation_id_allocated }, + { false, false, 0xA7, true, &calling_AE_qualifier, &calling_AE_qualifier_len, &calling_AE_qualifier_allocated }, + { true, false, 0xA8, true, &calling_AP_invocation_id, &calling_AP_invocation_id_len, &calling_AP_invocation_id_allocated }, + { false, false, 0x8B, true, &mechanism_name, &mechanism_name_len, &mechanism_name_allocated }, + { false, false, 0xAC, true, &calling_authentication_value, &calling_authentication_value_len, &calling_authentication_value_allocated }, + { true , true , 0xBE, true, &user_information, &user_information_len, &user_information_allocated }, + { false, false, 0xA6, true, &calling_AP_title, &calling_AP_title_len, &calling_AP_title_allocated }, + { false, false, 0xAC, false, &key_id_element, &key_id_element_len, &key_id_element_allocated }, + { false, false, 0xAC, false, &iv_element, &iv_element_len, &iv_element_allocated }, + { false, false, 0x0, true, NULL, NULL, NULL } }; static void @@ -730,10 +731,10 @@ clear_canon(void) * \param n is the length value to be BER encoded * \returns the sized of the encoding */ -static guint32 -get_ber_len_size(guint32 n) +static uint32_t +get_ber_len_size(uint32_t n) { - guint32 len = 1; + uint32_t len = 1; if (n > 0x7f) len++; if (n > 0xff) len++; if (n > 0xffff) len++; @@ -749,7 +750,7 @@ get_ber_len_size(guint32 n) * \returns length of encoded value in bytes */ static int -encode_ber_len(guint8 *ptr, guint32 n, int maxsize) +encode_ber_len(uint8_t *ptr, uint32_t n, int maxsize) { int len = get_ber_len_size(n); if (len > maxsize) return 0; @@ -772,7 +773,7 @@ c1222_uat_data_copy_cb(void *dest, const void *source, size_t len _U_) d->keynum = o->keynum; d->keylen = o->keylen; - d->key = (guchar *)g_memdup2(o->key, o->keylen); + d->key = (unsigned char *)g_memdup2(o->key, o->keylen); return dest; } @@ -782,7 +783,7 @@ c1222_uat_data_copy_cb(void *dest, const void *source, size_t len _U_) * * \param n points to the new record * \param err is updated to point to an error string if needed - * \return FALSE if error; TRUE otherwise + * \return false if error; true otherwise */ static bool c1222_uat_data_update_cb(void* n, char** err) @@ -791,13 +792,13 @@ c1222_uat_data_update_cb(void* n, char** err) if (new_rec->keynum > 0xff) { *err = g_strdup("Invalid key number; must be less than 256"); - return FALSE; + return false; } if (new_rec->keylen != EAX_SIZEOF_KEY) { *err = g_strdup("Invalid key size; must be 16 bytes"); - return FALSE; + return false; } - return TRUE; + return true; } static void @@ -814,20 +815,20 @@ c1222_uat_data_free_cb(void *r) * \param offset points to start of unallocated space in buffer and is updated as we put bytes into buffer * \param buffsize total size of allocated buffer - * \return FALSE if element is required and not present; otherwise TRUE + * \return false if element is required and not present; otherwise true */ -static gboolean -canonify_unencrypted_header(guchar *buff, guint32 *offset, guint32 buffsize) +static bool +canonify_unencrypted_header(unsigned char *buff, uint32_t *offset, uint32_t buffsize) { const TOP_ELEMENT_CONTROL *t = canonifyTable; - guint32 len, allocated; + uint32_t len, allocated; for (t = canonifyTable; t->element != NULL; t++) { len = *(t->length); allocated = *(t->allocated); if (t->required && *(t->element) == NULL) - return FALSE; + return false; if (*(t->element) != NULL) { if (t->addtag) { /* recreate original tag and length */ @@ -840,12 +841,12 @@ canonify_unencrypted_header(guchar *buff, guint32 *offset, guint32 buffsize) /* bail out if the cannonization buffer is too small */ /* this should never happen! */ if (buffsize < *offset + len) { - return FALSE; + return false; } /* bail out if our we're trying to read past the end of our element */ /* the network is always hostile */ if (allocated < len) { - return FALSE; + return false; } memcpy(&buff[*offset], *(t->element), len); (*offset) += len; @@ -854,7 +855,7 @@ canonify_unencrypted_header(guchar *buff, guint32 *offset, guint32 buffsize) } } } - return TRUE; + return true; } /** @@ -862,22 +863,22 @@ canonify_unencrypted_header(guchar *buff, guint32 *offset, guint32 buffsize) * * \param keybuff is updated with a copy of the key data if successful lookup. * \param keyid is the ID number of the desired key - * \returns TRUE if key was found; otherwise FALSE + * \returns true if key was found; otherwise false */ -static gboolean -keylookup(guint8 *keybuff, guint8 keyid) +static bool +keylookup(uint8_t *keybuff, uint8_t keyid) { - guint i; + unsigned i; if (c1222_uat_data == NULL) - return FALSE; + return false; for (i = 0; i < num_c1222_uat_data; i++) { if (c1222_uat_data[i].keynum == keyid) { memcpy(keybuff, c1222_uat_data[i].key, EAX_SIZEOF_KEY); - return TRUE; + return true; } } - return FALSE; + return false; } /** @@ -886,18 +887,18 @@ keylookup(guint8 *keybuff, guint8 keyid) * \param buffer points to a memory copy of the packet to be authenticated/decrypted * and contains the decrypted value on successful return. * \param length lenth of input packet - * \param decrypt TRUE if packet is to be authenticated and decrypted; FALSE if authentication only is requested - * \returns TRUE if the requested operation was successful; otherwise FALSE + * \param decrypt true if packet is to be authenticated and decrypted; false if authentication only is requested + * \returns true if the requested operation was successful; otherwise false */ -static gboolean -decrypt_packet(guchar *buffer, guint32 length, gboolean decrypt) +static bool +decrypt_packet(unsigned char *buffer, uint32_t length, bool decrypt) { #define CANONBUFFSIZE 300U - guchar canonbuff[CANONBUFFSIZE]; - guint8 c1222_key[EAX_SIZEOF_KEY]; - guchar key_id = 0; - guint32 offset = 0; - gboolean status = FALSE; + unsigned char canonbuff[CANONBUFFSIZE]; + uint8_t c1222_key[EAX_SIZEOF_KEY]; + unsigned char key_id = 0; + uint32_t offset = 0; + bool status = false; /* must be at least 4 bytes long to include the MAC */ if (length < 4) @@ -916,11 +917,11 @@ decrypt_packet(guchar *buffer, guint32 length, gboolean decrypt) /* SizeC : Byte length of CipherText buffer. */ /* pMac : Four byte Message Authentication Code. */ /* Mode : Operating mode (See EAX_MODE_xxx). */ -/* RETURNS: TRUE if message has been authenticated. */ -/* FALSE if not authenticated, invalid Mode, or error. */ +/* RETURNS: true if message has been authenticated. */ +/* false if not authenticated, invalid Mode, or error. */ if (offset) { - if (!keylookup((guint8 *)&c1222_key, key_id)) - return FALSE; + if (!keylookup((uint8_t *)&c1222_key, key_id)) + return false; status = Eax_Decrypt(canonbuff, c1222_key, buffer, offset, EAX_SIZEOF_KEY, length-4, (MAC_T *)&buffer[length-4], @@ -934,39 +935,39 @@ decrypt_packet(guchar *buffer, guint32 length, gboolean decrypt) * * \param tvb contains the buffer to be examined * \param offset is the offset within the buffer at which the BER-encoded length begins - * \returns TRUE if a complete, valid BER-encoded length is in the buffer; otherwise FALSE + * \returns true if a complete, valid BER-encoded length is in the buffer; otherwise false */ -static gboolean +static bool ber_len_ok(tvbuff_t *tvb, int offset) { - guint8 ch; + uint8_t ch; if (tvb_offset_exists(tvb, offset)) { - ch = tvb_get_guint8(tvb, offset); + ch = tvb_get_uint8(tvb, offset); offset++; if (!(ch & 0x80)) { - return TRUE; + return true; } else if (tvb_offset_exists(tvb, offset)) { - ch = tvb_get_guint8(tvb, offset); + ch = tvb_get_uint8(tvb, offset); offset++; if (!(ch & 0x80)) { - return TRUE; + return true; } else if (tvb_offset_exists(tvb, offset)) { - ch = tvb_get_guint8(tvb, offset); + ch = tvb_get_uint8(tvb, offset); offset++; if (!(ch & 0x80)) { - return TRUE; + return true; } else if (tvb_offset_exists(tvb, offset)) { - ch = tvb_get_guint8(tvb, offset); + ch = tvb_get_uint8(tvb, offset); /*offset++;*/ if (!(ch & 0x80)) { - return TRUE; + return true; } } } } } - return FALSE; + return false; } /** @@ -979,68 +980,68 @@ ber_len_ok(tvbuff_t *tvb, int offset) * \param tree the tree to append this item to */ static int -dissect_epsem(tvbuff_t *tvb, int offset, guint32 len, packet_info *pinfo, proto_tree *tree) +dissect_epsem(tvbuff_t *tvb, int offset, uint32_t len, packet_info *pinfo, proto_tree *tree) { proto_tree *cmd_tree = NULL; proto_tree *ct = NULL; proto_tree *crypto_tree = NULL; proto_tree *yt = NULL; proto_item *item = NULL; - guint8 flags; + uint8_t flags; int local_offset; - gint len2; + int len2; int cmd_err; bool ind; - guchar *buffer; + unsigned char *buffer; tvbuff_t *epsem_buffer = NULL; - gboolean crypto_good = FALSE; - gboolean crypto_bad = FALSE; - gboolean hasmac = FALSE; - gboolean encrypted = FALSE; + bool crypto_good = false; + bool crypto_bad = false; + bool hasmac = false; + bool encrypted = false; if ((tvb == NULL) && (len == 0)) { expert_add_info(pinfo, tree, &ei_c1222_epsem_missing); return offset; } /* parse the flags byte which is always unencrypted */ - flags = tvb_get_guint8(tvb, offset); + flags = tvb_get_uint8(tvb, offset); proto_tree_add_bitmask(tree, tvb, offset, hf_c1222_epsem_flags, ett_c1222_flags, c1222_flags, ENC_BIG_ENDIAN); offset++; switch ((flags & C1222_EPSEM_FLAG_SECURITY_MODE) >> 2) { case EAX_MODE_CIPHERTEXT_AUTH: /* mode is ciphertext with authentication */ - hasmac = TRUE; + hasmac = true; len2 = tvb_reported_length_remaining(tvb, offset); if (len2 <= 0) return offset; - encrypted = TRUE; + encrypted = true; if (c1222_decrypt) { - buffer = (guchar *)tvb_memdup(pinfo->pool, tvb, offset, len2); - if (!decrypt_packet(buffer, len2, TRUE)) { - crypto_bad = TRUE; + buffer = (unsigned char *)tvb_memdup(pinfo->pool, tvb, offset, len2); + if (!decrypt_packet(buffer, len2, true)) { + crypto_bad = true; } else { epsem_buffer = tvb_new_real_data(buffer, len2, len2); tvb_set_child_real_data_tvbuff(tvb, epsem_buffer); add_new_data_source(pinfo, epsem_buffer, "Decrypted EPSEM Data"); - crypto_good = TRUE; - encrypted = FALSE; + crypto_good = true; + encrypted = false; } } break; case EAX_MODE_CLEARTEXT_AUTH: /* mode is cleartext with authentication */ - hasmac = TRUE; + hasmac = true; len2 = tvb_reported_length_remaining(tvb, offset); if (len2 <= 0) return offset; epsem_buffer = tvb_new_subset_remaining(tvb, offset); - buffer = (guchar *)tvb_memdup(pinfo->pool, tvb, offset, len2); + buffer = (unsigned char *)tvb_memdup(pinfo->pool, tvb, offset, len2); if (c1222_decrypt) { - if (!decrypt_packet(buffer, len2, FALSE)) { - crypto_bad = TRUE; + if (!decrypt_packet(buffer, len2, false)) { + crypto_bad = true; expert_add_info(pinfo, tree, &ei_c1222_epsem_failed_authentication); } else { - crypto_good = TRUE; + crypto_good = true; } } break; @@ -1072,16 +1073,16 @@ dissect_epsem(tvbuff_t *tvb, int offset, guint32 len, packet_info *pinfo, proto_ */ while (tvb_offset_exists(epsem_buffer, local_offset+(hasmac?5:1))) { if (ber_len_ok(epsem_buffer, local_offset)) { - local_offset = dissect_ber_length(pinfo, tree, epsem_buffer, local_offset, (guint32 *)&len2, &ind); + local_offset = dissect_ber_length(pinfo, tree, epsem_buffer, local_offset, (uint32_t *)&len2, &ind); } else { expert_add_info(pinfo, tree, &ei_c1222_epsem_ber_length_error); return offset+len; } if (tvb_offset_exists(epsem_buffer, local_offset+len2-1)) { - cmd_err = tvb_get_guint8(epsem_buffer, local_offset); + cmd_err = tvb_get_uint8(epsem_buffer, local_offset); ct = proto_tree_add_item(tree, hf_c1222_epsem_total, epsem_buffer, local_offset, len2, ENC_NA); cmd_tree = proto_item_add_subtree(ct, ett_c1222_cmd); - parse_c1222_detailed(epsem_buffer, pinfo, cmd_tree, cmd_err, (guint32 *)&len2, &local_offset); + parse_c1222_detailed(epsem_buffer, pinfo, cmd_tree, cmd_err, (uint32_t *)&len2, &local_offset); local_offset += len2; } else { expert_add_info(pinfo, tree, &ei_c1222_epsem_field_length_error); @@ -1319,7 +1320,7 @@ dissect_c1222_Calling_authentication_value_c1222_U(bool implicit_tag _U_, tvbuff static int dissect_c1222_Calling_authentication_value_c1222(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_ber_tagged_type(implicit_tag, actx, tree, tvb, offset, - hf_index, BER_CLASS_CON, 1, TRUE, dissect_c1222_Calling_authentication_value_c1222_U); + hf_index, BER_CLASS_CON, 1, true, dissect_c1222_Calling_authentication_value_c1222_U); return offset; } @@ -1383,7 +1384,7 @@ dissect_c1222_Calling_authentication_value_c1221_U(bool implicit_tag _U_, tvbuff static int dissect_c1222_Calling_authentication_value_c1221(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_ber_tagged_type(implicit_tag, actx, tree, tvb, offset, - hf_index, BER_CLASS_CON, 0, TRUE, dissect_c1222_Calling_authentication_value_c1221_U); + hf_index, BER_CLASS_CON, 0, true, dissect_c1222_Calling_authentication_value_c1221_U); return offset; } @@ -1463,7 +1464,7 @@ static int dissect_c1222_Calling_authentication_value(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { FILL_START; offset = dissect_ber_tagged_type(implicit_tag, actx, tree, tvb, offset, - hf_index, BER_CLASS_CON, 2, TRUE, dissect_c1222_Calling_authentication_value_U); + hf_index, BER_CLASS_CON, 2, true, dissect_c1222_Calling_authentication_value_U); FILL_TABLE(calling_authentication_value); @@ -1475,10 +1476,10 @@ dissect_c1222_Calling_authentication_value(bool implicit_tag _U_, tvbuff_t *tvb static int dissect_c1222_User_information(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { - gint8 end_device_class; + int8_t end_device_class; bool pc, ind; - gint32 tag; - guint32 len; + int32_t tag; + uint32_t len; proto_item *tf = NULL; proto_tree *epsem_tree = NULL; FILL_START; @@ -1530,7 +1531,7 @@ static int dissect_c1222_MESSAGE(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { clear_canon(); offset = dissect_ber_tagged_type(implicit_tag, actx, tree, tvb, offset, - hf_index, BER_CLASS_APP, 0, TRUE, dissect_c1222_MESSAGE_U); + hf_index, BER_CLASS_APP, 0, true, dissect_c1222_MESSAGE_U); return offset; @@ -1541,8 +1542,8 @@ dissect_c1222_MESSAGE(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, static int dissect_MESSAGE_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { int offset = 0; asn1_ctx_t asn1_ctx; - asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); - offset = dissect_c1222_MESSAGE(FALSE, tvb, offset, &asn1_ctx, tree, hf_c1222_MESSAGE_PDU); + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, true, pinfo); + offset = dissect_c1222_MESSAGE(false, tvb, offset, &asn1_ctx, tree, hf_c1222_MESSAGE_PDU); return offset; } @@ -1577,11 +1578,11 @@ dissect_c1222_common(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* * \param offset the offset in the tvb * \returns length of entire C12.22 message */ -static guint +static unsigned get_c1222_message_len(packet_info *pinfo, tvbuff_t *tvb, int offset, void *data _U_) { int orig_offset; - guint length; + unsigned length; bool ind; orig_offset = offset; @@ -1953,7 +1954,7 @@ void proto_register_c1222(void) { }; /* List of subtrees */ - static gint *ett[] = { + static int *ett[] = { &ett_c1222, &ett_c1222_epsem, &ett_c1222_flags, @@ -2021,7 +2022,7 @@ void proto_register_c1222(void) { c1222_uat = uat_new("Decryption Table", sizeof(c1222_uat_data_t), /* record size */ "c1222_decryption_table", /* filename */ - TRUE, /* from_profile */ + true, /* from_profile */ &c1222_uat_data, /* data_ptr */ &num_c1222_uat_data, /* numitems_ptr */ UAT_AFFECTS_DISSECTION, /* affects dissection of packets, but not set of named fields */ @@ -2044,17 +2045,17 @@ void proto_register_c1222(void) { void proto_reg_handoff_c1222(void) { - static gboolean initialized = FALSE; - guint8 *temp = NULL; + static bool initialized = false; + uint8_t *temp = NULL; if( !initialized ) { dissector_add_uint_with_preference("tcp.port", C1222_PORT, c1222_handle); dissector_add_uint_with_preference("udp.port", C1222_PORT, c1222_udp_handle); - initialized = TRUE; + initialized = true; } if (c1222_baseoid_str && (c1222_baseoid_str[0] != '\0') && ((c1222_baseoid_len = oid_string2encoded(NULL, c1222_baseoid_str, &temp)) != 0)) { - c1222_baseoid = (guint8 *)wmem_realloc(wmem_epan_scope(), c1222_baseoid, c1222_baseoid_len); + c1222_baseoid = (uint8_t *)wmem_realloc(wmem_epan_scope(), c1222_baseoid, c1222_baseoid_len); memcpy(c1222_baseoid, temp, c1222_baseoid_len); wmem_free(NULL, temp); } else if (c1222_baseoid) { |