summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-edonkey.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-edonkey.c
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-edonkey.c')
-rw-r--r--epan/dissectors/packet-edonkey.c3419
1 files changed, 3419 insertions, 0 deletions
diff --git a/epan/dissectors/packet-edonkey.c b/epan/dissectors/packet-edonkey.c
new file mode 100644
index 00000000..3cb1a64f
--- /dev/null
+++ b/epan/dissectors/packet-edonkey.c
@@ -0,0 +1,3419 @@
+/* packet-edonkey.c
+ * Routines for edonkey dissection
+ * Copyright 2003, Xuan Zhang <xz@aemail4u.com>
+ * Copyright 2007, Stefano Picerno <stefano.picerno@gmail.com>
+ * Copyright 2008, Stefan Monhof <stefan.monhof@stud.uni-due.de>
+ *
+ * eDonkey dissector based on protocol descriptions from mldonkey:
+ * ftp://ftp.chatnfiles.com/gnu-mirror/savannah/files/mldonkey/docs/Edonkey-Overnet/edonkey-protocol.txt
+ * ftp://ftp.chatnfiles.com/gnu-mirror/savannah/files/mldonkey/docs/Edonkey-Overnet/overnet-protocol.txt
+ *
+ * Kademlia dissector based on source code inspection of aMule 2.1.3 and eMule 0.48a
+ * Modified and added on the basis of information and names from the eMule 0.50 source code
+ * found at http://www.emule-project.net
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "config.h"
+
+#include <stdlib.h>
+
+#include <epan/packet.h>
+#include <epan/prefs.h>
+#include <epan/expert.h>
+#include "packet-edonkey.h"
+#include "packet-tcp.h"
+
+void proto_reg_handoff_edonkey(void);
+
+static dissector_handle_t edonkey_tcp_handle;
+static dissector_handle_t edonkey_udp_handle;
+
+static int proto_edonkey = -1;
+
+static int hf_edonkey_message = -1;
+static int hf_edonkey_protocol = -1;
+static int hf_edonkey_message_length = -1;
+static int hf_edonkey_message_type = -1;
+static int hf_edonkey_client_hash = -1;
+static int hf_edonkey_server_hash = -1;
+static int hf_edonkey_file_hash = -1;
+static int hf_edonkey_client_id = -1;
+static int hf_edonkey_metatag_namesize = -1;
+static int hf_edonkey_metatag_type = -1;
+static int hf_edonkey_metatag = -1;
+static int hf_edonkey_metatag_name = -1;
+static int hf_edonkey_metatag_id = -1;
+static int hf_edonkey_ip = -1;
+static int hf_edonkey_port = -1;
+static int hf_edonkey_hash = -1;
+static int hf_edonkey_part_count = -1;
+static int hf_edonkey_file_status = -1;
+static int hf_edonkey_directory = -1;
+static int hf_edonkey_string = -1;
+static int hf_edonkey_string_length = -1;
+static int hf_edonkey_fileinfo = -1;
+static int hf_edonkey_clientinfo = -1;
+static int hf_edonkey_serverinfo = -1;
+static int hf_emule_aich_partnum = -1;
+static int hf_emule_aich_root_hash = -1;
+static int hf_emule_aich_hash_entry = -1;
+static int hf_emule_aich_hash_id = -1;
+static int hf_emule_aich_hash = -1;
+static int hf_emule_multipacket_entry = -1;
+static int hf_emule_multipacket_opcode = -1;
+static int hf_emule_source_count = -1;
+static int hf_emule_zlib = -1;
+static int hf_emule_public_key = -1;
+static int hf_emule_signature = -1;
+static int hf_emule_sourceOBFU = -1;
+static int hf_overnet_peer = -1;
+
+static int hf_edonkey_unparsed_data_length = -1;
+static int hf_kademlia = -1;
+static int hf_kademlia_search_condition = -1;
+static int hf_kademlia_search_condition_argument_uint32 = -1;
+static int hf_kademlia_search_condition_argument_uint64 = -1;
+/* static int hf_kademlia_unparsed_data_length = -1; */
+static int hf_kademlia_peer = -1;
+static int hf_kademlia_peer_id = -1;
+static int hf_kademlia_hash = -1;
+static int hf_kademlia_file_id = -1;
+static int hf_kademlia_keyword_hash = -1;
+static int hf_kademlia_recipients_id = -1;
+static int hf_kademlia_sender_id = -1;
+static int hf_kademlia_target_id = -1;
+static int hf_kademlia_distance = -1;
+static int hf_kademlia_version = -1;
+static int hf_kademlia_peertype = -1;
+static int hf_kademlia_tag_float = -1;
+static int hf_kademlia_tag_uint64 = -1;
+static int hf_kademlia_tag_uint32 = -1;
+static int hf_kademlia_tag_ipv4 = -1;
+static int hf_kademlia_tag_uint16 = -1;
+static int hf_kademlia_tag_uint8 = -1;
+static int hf_kademlia_tag_hash = -1;
+static int hf_kademlia_tag_bsob = -1;
+static int hf_kademlia_tag_string = -1;
+static int hf_kademlia_udp_port = -1;
+static int hf_kademlia_tcp_port = -1;
+static int hf_kademlia_ip = -1;
+static int hf_kademlia_tag_name = -1;
+static int hf_kademlia_tag_name_length = -1;
+static int hf_kademlia_tag_type = -1;
+static int hf_kademlia_request_type = -1;
+static int hf_kademlia_search_expression_type = -1;
+static int hf_kademlia_search_bool_op = -1;
+
+/* Generated from convert_proto_tree_add_text.pl */
+static int hf_edonkey_list_size = -1;
+static int hf_edonkey_meta_tag_value_revision = -1;
+static int hf_edonkey_meta_tag_value_uint = -1;
+static int hf_edonkey_boolean_array_length = -1;
+static int hf_edonkey_blob_length = -1;
+static int hf_edonkey_kademlia_string = -1;
+static int hf_emule_public_key_length = -1;
+static int hf_emule_signature_length = -1;
+static int hf_edonkey_obfuscation_settings = -1;
+static int hf_edonkey_start_offset = -1;
+static int hf_edonkey_start_offset_64 = -1;
+static int hf_edonkey_end_offset = -1;
+static int hf_edonkey_end_offset_64 = -1;
+static int hf_edonkey_emule_file_length = -1;
+static int hf_edonkey_overnet_peer_type = -1;
+static int hf_edonkey_more_search_file_results = -1;
+static int hf_edonkey_file_size = -1;
+static int hf_edonkey_large_file_size = -1;
+static int hf_edonkey_number_of_users = -1;
+static int hf_edonkey_number_of_files = -1;
+static int hf_edonkey_message_data = -1;
+static int hf_edonkey_emule_version = -1;
+static int hf_edonkey_emule_queue_ranking = -1;
+static int hf_edonkey_emule_ident_state = -1;
+static int hf_edonkey_emule_rndchallenge = -1;
+static int hf_edonkey_emule_sig_ip_used = -1;
+static int hf_edonkey_packed_length = -1;
+static int hf_edonkey_compressed_message_data = -1;
+static int hf_edonkey_challenge = -1;
+static int hf_edonkey_max_number_of_users = -1;
+static int hf_edonkey_search_type = -1;
+static int hf_edonkey_search_range_min = -1;
+static int hf_edonkey_search_range_max = -1;
+static int hf_edonkey_kademlia_uload = -1;
+static int hf_edonkey_kademlia_start_position = -1;
+static int hf_edonkey_kademlia_filesize = -1;
+static int hf_edonkey_kademlia_restrictive = -1;
+static int hf_edonkey_broken_compressed_data = -1;
+static int hf_edonkey_search_limit = -1;
+static int hf_edonkey_search_limit_type = -1;
+static int hf_edonkey_search_ops = -1;
+static int hf_edonkey_user_hash_length = -1;
+
+static gint ett_kademlia_tag = -1;
+static gint ett_edonkey_listitem = -1;
+static gint ett_kademlia_search_expression = -1;
+static gint ett_edonkey = -1;
+static gint ett_edonkey_message = -1;
+static gint ett_edonkey_metatag = -1;
+static gint ett_edonkey_search = -1;
+static gint ett_edonkey_fileinfo = -1;
+static gint ett_edonkey_serverinfo = -1;
+static gint ett_edonkey_clientinfo = -1;
+static gint ett_emule_aichhash = -1;
+static gint ett_emule_multipacket = -1;
+static gint ett_emule_zlib = -1;
+static gint ett_overnet_peer = -1;
+static gint ett_emule_sourceOBFU = -1;
+
+static expert_field ei_kademlia_tag_type = EI_INIT;
+static expert_field ei_kademlia_search_expression_type = EI_INIT;
+
+#define EDONKEY_TCP_PORT_RANGE "4661-4663" /* Not IANA registered */
+#define EDONKEY_UDP_PORT_RANGE "4665,4672" /* Not IANA registered */
+
+/* desegmentation of eDonkey over TCP */
+static gboolean edonkey_desegment = TRUE;
+
+static const value_string kademlia_msgs[] = {
+ { KADEMLIA2_BOOTSTRAP_REQ ,"KADEMLIA2_BOOTSTRAP_REQ" },
+ { KADEMLIA2_BOOTSTRAP_RES ,"KADEMLIA2_BOOTSTRAP_RES" },
+ { KADEMLIA2_HELLO_REQ ,"KADEMLIA2_HELLO_REQ" },
+ { KADEMLIA2_HELLO_RES ,"KADEMLIA2_HELLO_RES" },
+ { KADEMLIA2_PUBLISH_KEY_REQ ,"KADEMLIA2_PUBLISH_KEY_REQ" },
+ { KADEMLIA2_PUBLISH_NOTES_REQ ,"KADEMLIA2_PUBLISH_NOTES_REQ" },
+ { KADEMLIA2_PUBLISH_RES ,"KADEMLIA2_PUBLISH_RES" },
+ { KADEMLIA2_PUBLISH_SOURCE_REQ ,"KADEMLIA2_PUBLISH_SOURCE_REQ" },
+ { KADEMLIA2_REQ ,"KADEMLIA2_REQ" },
+ { KADEMLIA2_RES ,"KADEMLIA2_RES" },
+ { KADEMLIA2_SEARCH_KEY_REQ ,"KADEMLIA2_SEARCH_KEY_REQ" },
+ { KADEMLIA2_SEARCH_NOTES_REQ ,"KADEMLIA2_SEARCH_NOTES_REQ" },
+ { KADEMLIA2_SEARCH_RES ,"KADEMLIA2_SEARCH_RES" },
+ { KADEMLIA2_SEARCH_SOURCE_REQ ,"KADEMLIA2_SEARCH_SOURCE_REQ" },
+ { KADEMLIA_BOOTSTRAP_REQ ,"KADEMLIA_BOOTSTRAP_REQ" },
+ { KADEMLIA_BOOTSTRAP_RES ,"KADEMLIA_BOOTSTRAP_RES" },
+ { KADEMLIA_CALLBACK_REQ ,"KADEMLIA_CALLBACK_REQ" },
+ { KADEMLIA_FINDBUDDY_REQ ,"KADEMLIA_FINDBUDDY_REQ" },
+ { KADEMLIA_FINDBUDDY_RES ,"KADEMLIA_FINDBUDDY_RES" },
+ { KADEMLIA_FIREWALLED_ACK_RES ,"KADEMLIA_FIREWALLED_ACK_RES" },
+ { KADEMLIA_FIREWALLED_REQ ,"KADEMLIA_FIREWALLED_REQ" },
+ { KADEMLIA_FIREWALLED_RES ,"KADEMLIA_FIREWALLED_RES" },
+ { KADEMLIA_HELLO_REQ ,"KADEMLIA_HELLO_REQ" },
+ { KADEMLIA_HELLO_RES ,"KADEMLIA_HELLO_RES" },
+ { KADEMLIA_PUBLISH_NOTES_REQ ,"KADEMLIA_PUBLISH_NOTES_REQ" },
+ { KADEMLIA_PUBLISH_NOTES_RES ,"KADEMLIA_PUBLISH_NOTES_RES" },
+ { KADEMLIA_PUBLISH_REQ ,"KADEMLIA_PUBLISH_REQ" },
+ { KADEMLIA_PUBLISH_RES ,"KADEMLIA_PUBLISH_RES" },
+ { KADEMLIA_REQ ,"KADEMLIA_REQ" },
+ { KADEMLIA_RES ,"KADEMLIA_RES" },
+ { KADEMLIA_SEARCH_NOTES_REQ ,"KADEMLIA_SEARCH_NOTES_REQ" },
+ { KADEMLIA_SEARCH_NOTES_RES ,"KADEMLIA_SEARCH_NOTES_RES" },
+ { KADEMLIA_SEARCH_REQ ,"KADEMLIA_SEARCH_REQ" },
+ { KADEMLIA_SEARCH_RES ,"KADEMLIA_SEARCH_RES" },
+ { 0, NULL }
+};
+
+static const value_string kademlia_tag_types[] = {
+ { KADEMLIA_TAGTYPE_HASH ,"TAGTYPE_HASH" },
+ { KADEMLIA_TAGTYPE_STRING ,"TAGTYPE_STRING" },
+ { KADEMLIA_TAGTYPE_UINT32 ,"TAGTYPE_UINT32" },
+ { KADEMLIA_TAGTYPE_FLOAT32 ,"TAGTYPE_FLOAT32" },
+ { KADEMLIA_TAGTYPE_BOOL ,"TAGTYPE_BOOL" },
+ { KADEMLIA_TAGTYPE_BOOLARRAY ,"TAGTYPE_BOOLARRAY" },
+ { KADEMLIA_TAGTYPE_BLOB ,"TAGTYPE_BLOB" },
+ { KADEMLIA_TAGTYPE_UINT16 ,"TAGTYPE_UINT16" },
+ { KADEMLIA_TAGTYPE_UINT8 ,"TAGTYPE_UINT8" },
+ { KADEMLIA_TAGTYPE_BSOB ,"TAGTYPE_BSOB" },
+ { KADEMLIA_TAGTYPE_UINT64 ,"TAGTYPE_UINT64" },
+
+ { KADEMLIA_TAGTYPE_STR1 ,"TAGTYPE_STR1" },
+ { KADEMLIA_TAGTYPE_STR2 ,"TAGTYPE_STR2" },
+ { KADEMLIA_TAGTYPE_STR3 ,"TAGTYPE_STR3" },
+ { KADEMLIA_TAGTYPE_STR4 ,"TAGTYPE_STR4" },
+ { KADEMLIA_TAGTYPE_STR5 ,"TAGTYPE_STR5" },
+ { KADEMLIA_TAGTYPE_STR6 ,"TAGTYPE_STR6" },
+ { KADEMLIA_TAGTYPE_STR7 ,"TAGTYPE_STR7" },
+ { KADEMLIA_TAGTYPE_STR8 ,"TAGTYPE_STR8" },
+ { KADEMLIA_TAGTYPE_STR9 ,"TAGTYPE_STR9" },
+ { KADEMLIA_TAGTYPE_STR10 ,"TAGTYPE_STR10" },
+ { KADEMLIA_TAGTYPE_STR11 ,"TAGTYPE_STR11" },
+ { KADEMLIA_TAGTYPE_STR12 ,"TAGTYPE_STR12" },
+ { KADEMLIA_TAGTYPE_STR13 ,"TAGTYPE_STR13" },
+ { KADEMLIA_TAGTYPE_STR14 ,"TAGTYPE_STR14" },
+ { KADEMLIA_TAGTYPE_STR15 ,"TAGTYPE_STR15" },
+ { KADEMLIA_TAGTYPE_STR16 ,"TAGTYPE_STR16" },
+ { KADEMLIA_TAGTYPE_STR17 ,"TAGTYPE_STR17" },
+ { KADEMLIA_TAGTYPE_STR18 ,"TAGTYPE_STR18" },
+ { KADEMLIA_TAGTYPE_STR19 ,"TAGTYPE_STR19" },
+ { KADEMLIA_TAGTYPE_STR20 ,"TAGTYPE_STR20" },
+ { KADEMLIA_TAGTYPE_STR21 ,"TAGTYPE_STR21" },
+ { KADEMLIA_TAGTYPE_STR22 ,"TAGTYPE_STR22" },
+ { 0, NULL }
+};
+
+static const value_string kademlia_tags[] = {
+ { KADEMLIA_TAG_BUDDYHASH ,"TAG_BUDDYHASH" },
+ { KADEMLIA_TAG_CLIENTLOWID ,"TAG_CLIENTLOWID" },
+ { KADEMLIA_TAG_COLLECTION ,"TAG_COLLECTION" },
+ { KADEMLIA_TAG_COPIED ,"TAG_COPIED" },
+ { KADEMLIA_TAG_DESCRIPTION ,"TAG_DESCRIPTION" },
+ { KADEMLIA_TAG_ENCRYPTION ,"TAG_ENCRYPTION" },
+ { KADEMLIA_TAG_FAIL ,"TAG_FAIL" },
+ { KADEMLIA_TAG_FILECOMMENT ,"TAG_FILECOMMENT" },
+ { KADEMLIA_TAG_FILE_COUNT ,"TAG_FILE_COUNT" },
+ { KADEMLIA_TAG_FILEFORMAT ,"TAG_FILEFORMAT" },
+ { KADEMLIA_TAG_FILENAME ,"TAG_FILENAME" },
+ { KADEMLIA_TAG_FILERATING ,"TAG_FILERATING" },
+ { KADEMLIA_TAG_FILESIZE_HI ,"TAG_FILESIZE_HI" },
+ { KADEMLIA_TAG_FILESIZE ,"TAG_FILESIZE" },
+ { KADEMLIA_TAG_FILETYPE ,"TAG_FILETYPE" },
+ { KADEMLIA_TAG_GAP_END ,"TAG_GAP_END" },
+ { KADEMLIA_TAG_GAP_START ,"TAG_GAP_START" },
+ { KADEMLIA_TAG_IP_ADDRESS ,"TAG_IP_ADDRESS" },
+ { KADEMLIA_TAG_MEDIA_ALBUM ,"TAG_MEDIA_ALBUM" },
+ { KADEMLIA_TAG_MEDIA_ARTIST ,"TAG_MEDIA_ARTIST" },
+ { KADEMLIA_TAG_MEDIA_BITRATE ,"TAG_MEDIA_BITRATE"},
+ { KADEMLIA_TAG_MEDIA_CODEC ,"TAG_MEDIA_CODEC" },
+ { KADEMLIA_TAG_MEDIA_LENGTH ,"TAG_MEDIA_LENGTH" },
+ { KADEMLIA_TAG_MEDIA_TITLE ,"TAG_MEDIA_TITLE" },
+ { KADEMLIA_TAG_PART_HASH ,"TAG_PART_HASH" },
+ { KADEMLIA_TAG_PART_PATH ,"TAG_PART_PATH" },
+ { KADEMLIA_TAG_PARTS ,"TAG_PARTS" },
+ { KADEMLIA_TAG_PERMISSIONS ,"TAG_PERMISSIONS" },
+ { KADEMLIA_TAG_PING ,"TAG_PING" },
+ { KADEMLIA_TAG_PORT ,"TAG_PORT" },
+ { KADEMLIA_TAG_PREFERENCE ,"TAG_PREFERENCE" },
+ { KADEMLIA_TAG_PRIORITY ,"TAG_PRIORITY" },
+ { KADEMLIA_TAG_QTIME ,"TAG_QTIME" },
+ { KADEMLIA_TAG_SERVERIP ,"TAG_SERVERIP" },
+ { KADEMLIA_TAG_SERVERPORT ,"TAG_SERVERPORT" },
+ { KADEMLIA_TAG_SOURCEIP ,"TAG_SOURCEIP" },
+ { KADEMLIA_TAG_SOURCEPORT ,"TAG_SOURCEPORT" },
+ { KADEMLIA_TAG_SOURCES ,"TAG_SOURCES" },
+ { KADEMLIA_TAG_SOURCETYPE ,"TAG_SOURCETYPE" },
+ { KADEMLIA_TAG_SOURCEUPORT ,"TAG_SOURCEUPORT" },
+ { KADEMLIA_TAG_STATUS ,"TAG_STATUS" },
+ { KADEMLIA_TAG_TEMPFILE ,"TAG_TEMPFILE" },
+ { KADEMLIA_TAG_USER_COUNT ,"TAG_USER_COUNT" },
+ { KADEMLIA_TAG_VERSION ,"TAG_VERSION" },
+
+ { 0, NULL }
+};
+
+static const value_string edonkey_protocols[] = {
+ { EDONKEY_PROTO_EDONKEY, "eDonkey" },
+ { EDONKEY_PROTO_EMULE_EXT, "eMule Extensions" },
+ { EDONKEY_PROTO_EMULE_COMP, "eMule Compressed" },
+ { EDONKEY_PROTO_KADEMLIA, "Kademlia" },
+ { EDONKEY_PROTO_KADEMLIA_COMP, "Kademlia Compressed" },
+ { EDONKEY_PROTO_ADU_KADEMLIA, "KAdu" },
+ { EDONKEY_PROTO_ADU_KADEMLIA_COMP, "KAdu Compressed" },
+ { 0, NULL }
+};
+
+static const value_string edonkey_tcp_msgs[] = {
+ { EDONKEY_MSG_HELLO, "Hello" },
+ { EDONKEY_MSG_BAD_PROTO, "Bad Proto" },
+ { EDONKEY_MSG_GET_SERVER_LIST, "Get Server List" },
+ { EDONKEY_MSG_OFFER_FILES, "Offer Files" },
+ { EDONKEY_MSG_SEARCH_FILES, "Search Files" },
+ { EDONKEY_MSG_DISCONNECT, "Disconnect" },
+ { EDONKEY_MSG_GET_SOURCES, "Get Sources" },
+ { EDONKEY_MSG_GET_SOURCES_OBFU, "Get Sources Obfuscation" },
+ { EDONKEY_MSG_SEARCH_USER, "Search User" },
+ { EDONKEY_MSG_CLIENT_CB_REQ, "Client Callback Request" },
+ { EDONKEY_MSG_MORE_RESULTS, "More Results" },
+ { EDONKEY_MSG_SERVER_LIST, "Server List" },
+ { EDONKEY_MSG_SEARCH_FILE_RESULTS, "Search File Results" },
+ { EDONKEY_MSG_SERVER_STATUS, "Server Status" },
+ { EDONKEY_MSG_SERVER_CB_REQ, "Server Callback Request" },
+ { EDONKEY_MSG_CALLBACK_FAIL, "Callback Fail" },
+ { EDONKEY_MSG_SERVER_MESSAGE, "Server Message" },
+ { EDONKEY_MSG_ID_CHANGE, "ID Change" },
+ { EDONKEY_MSG_SERVER_INFO_DATA, "Server Info Data" },
+ { EDONKEY_MSG_FOUND_SOURCES, "Found Sources" },
+ { EDONKEY_MSG_FOUND_SOURCES_OBFU, "Found Sources Obfuscation"},
+ { EDONKEY_MSG_SEARCH_USER_RESULTS, "Search User Results" },
+ { EDONKEY_MSG_SENDING_PART, "Sending Part" },
+ { EDONKEY_MSG_REQUEST_PARTS, "Request Parts" },
+ { EDONKEY_MSG_NO_SUCH_FILE, "No Such File" },
+ { EDONKEY_MSG_END_OF_DOWNLOAD, "End of Download" },
+ { EDONKEY_MSG_VIEW_FILES, "View Files" },
+ { EDONKEY_MSG_VIEW_FILES_ANSWER, "View Files Answer" },
+ { EDONKEY_MSG_HELLO_ANSWER, "Hello Answer" },
+ { EDONKEY_MSG_NEW_CLIENT_ID, "New Client ID" },
+ { EDONKEY_MSG_CLIENT_MESSAGE, "Client Message" },
+ { EDONKEY_MSG_FILE_STATUS_REQUEST, "File Status Request" },
+ { EDONKEY_MSG_FILE_STATUS, "File Status" },
+ { EDONKEY_MSG_HASHSET_REQUEST, "Hashset Request" },
+ { EDONKEY_MSG_HASHSET_ANSWER, "Hashset Answer" },
+ { EDONKEY_MSG_SLOT_REQUEST, "Slot Request" },
+ { EDONKEY_MSG_SLOT_GIVEN, "Slot Given" },
+ { EDONKEY_MSG_SLOT_RELEASE, "Slot Release" },
+ { EDONKEY_MSG_SLOT_TAKEN, "Slot Taken" },
+ { EDONKEY_MSG_FILE_REQUEST, "File Request" },
+ { EDONKEY_MSG_FILE_REQUEST_ANSWER, "File Request Answer" },
+ { EDONKEY_MSG_GET_SHARED_DIRS, "Get Shared Directories" },
+ { EDONKEY_MSG_GET_SHARED_FILES, "Get Shared Files" },
+ { EDONKEY_MSG_SHARED_DIRS, "Shared Directories" },
+ { EDONKEY_MSG_SHARED_FILES, "Shared Files" },
+ { EDONKEY_MSG_SHARED_DENIED, "Shared Denied" },
+ { 0, NULL }
+};
+
+static const value_string emule_tcp_msgs[] = {
+ { EMULE_MSG_HELLO, "Hello" },
+ { EMULE_MSG_HELLO_ANSWER, "Hello Answer" },
+ { EMULE_MSG_DATA_COMPRESSED, "Data Compressed" },
+ { EMULE_MSG_QUEUE_RANKING, "Queue Ranking" },
+ { EMULE_MSG_FILE_DESC, "File Description" },
+ { EMULE_MSG_SOURCES_REQUEST, "Sources Request" },
+ { EMULE_MSG_SOURCES_ANSWER, "Sources Answer" },
+ { EMULE_MSG_SIGNATURE, "Signature" },
+ { EMULE_MSG_PUBLIC_KEY, "Public Key" },
+ { EMULE_MSG_SEC_IDENT_STATE, "Second Identification State" },
+ { EMULE_MSG_MULTIPACKET, "MultiPacket" },
+ { EMULE_MSG_MULTIPACKET_EXT, "MultiPacketExt" },
+ { EMULE_MSG_MULTIPACKET_ANSWER, "MultiPacket Answer" },
+ { EMULE_MSG_CALLBACK, "Callback" },
+ { EMULE_MSG_AICH_REQUEST, "AICH Hashset Request" },
+ { EMULE_MSG_AICH_ANSWER, "AICH Hashset Answer" },
+ { EMULE_MSG_AICHFILEHASH_ANSWER, "AICH Master Hash Request" },
+ { EMULE_MSG_AICHFILEHASH_REQUEST, "AICH Master Hash Answer" },
+ { EMULE_MSG_DATA_COMPRESSED_64, "Data Compressed (64bit)" },
+ { EMULE_MSG_SENDING_PART_64, "Sending Part (64bit)" },
+ { EMULE_MSG_REQUEST_PARTS_64, "Request Parts (64bit)" },
+ { 0, NULL }
+};
+
+static const value_string edonkey_udp_msgs[] = {
+ { EDONKEY_MSG_UDP_SERVER_STATUS_REQUEST, "Server Status Request" },
+ { EDONKEY_MSG_UDP_SERVER_STATUS, "Server Status" },
+ { EDONKEY_MSG_UDP_SEARCH_FILE, "Search File" },
+ { EDONKEY_MSG_UDP_SEARCH_FILE_RESULTS, "Search File Results" },
+ { EDONKEY_MSG_UDP_GET_SOURCES, "Get Sources" },
+ { EDONKEY_MSG_UDP_FOUND_SOURCES, "Found Sources" },
+ { EDONKEY_MSG_UDP_CALLBACK_REQUEST, "Callback Request" },
+ { EDONKEY_MSG_UDP_CALLBACK_FAIL, "Callback Fail" },
+ { EDONKEY_MSG_UDP_SERVER_LIST, "Server List" },
+ { EDONKEY_MSG_UDP_GET_SERVER_INFO, "Get Server Info" },
+ { EDONKEY_MSG_UDP_SERVER_INFO, "Server Info" },
+ { EDONKEY_MSG_UDP_GET_SERVER_LIST, "Get Server List" },
+
+ /* eMule Extensions */
+ { EMULE_MSG_UDP_REASKFILEPING, "Reask File Ping" },
+ { EMULE_MSG_UDP_REASKACK, "Reask ACK" },
+ { EMULE_MSG_UDP_FILE_NOT_FOUND, "File not found" },
+ { EMULE_MSG_UDP_QUEUE_FULL, "Queue Full" },
+
+ /* Overnet Extensions */
+ { OVERNET_MSG_UDP_CONNECT, "Connect" },
+ { OVERNET_MSG_UDP_CONNECT_REPLY, "Connect Reply" },
+ { OVERNET_MSG_UDP_PUBLICIZE, "Publicize" },
+ { OVERNET_MSG_UDP_PUBLICIZE_ACK, "Publicize ACK" },
+ { OVERNET_MSG_UDP_SEARCH, "Search" },
+ { OVERNET_MSG_UDP_SEARCH_NEXT, "Search Next" },
+ { OVERNET_MSG_UDP_SEARCH_INFO, "Search Info" },
+ { OVERNET_MSG_UDP_SEARCH_RESULT, "Search Result" },
+ { OVERNET_MSG_UDP_SEARCH_END, "Search End" },
+ { OVERNET_MSG_UDP_PUBLISH, "Publish" },
+ { OVERNET_MSG_UDP_PUBLISH_ACK, "Publish ACK" },
+ { OVERNET_MSG_UDP_IDENTIFY_REPLY, "Identify Reply" },
+ { OVERNET_MSG_UDP_IDENTIFY_ACK, "Identify ACK" },
+ { OVERNET_MSG_UDP_FIREWALL_CONNECTION, "Firewall Connection" },
+ { OVERNET_MSG_UDP_FIREWALL_CONNECTION_ACK, "Firewall Connection ACK" },
+ { OVERNET_MSG_UDP_FIREWALL_CONNECTION_NACK, "Firewall Connection NACK" },
+ { OVERNET_MSG_UDP_IP_QUERY, "IP Query" },
+ { OVERNET_MSG_UDP_IP_QUERY_ANSWER, "IP Query Answer" },
+ { OVERNET_MSG_UDP_IP_QUERY_END, "IP Query End" },
+ { OVERNET_MSG_UDP_IDENTIFY, "Identify" },
+ { 0, NULL }
+};
+
+static const value_string edonkey_special_tags[] = {
+ { EDONKEY_STAG_NAME, "Name" },
+ { EDONKEY_STAG_SIZE, "Size" },
+ { EDONKEY_STAG_TYPE, "Type" },
+ { EDONKEY_STAG_FORMAT, "Format" },
+ { EDONKEY_STAG_COLLECTION, "Collection" },
+ { EDONKEY_STAG_PART_PATH, "Part Path" },
+ { EDONKEY_STAG_PART_HASH, "Part Hash" },
+ { EDONKEY_STAG_COPIED, "Copied" },
+ { EDONKEY_STAG_GAP_START, "Gap Start" },
+ { EDONKEY_STAG_GAP_END, "Gap End" },
+ { EDONKEY_STAG_DESCRIPTION, "Description" },
+ { EDONKEY_STAG_PING, "Ping" },
+ { EDONKEY_STAG_FAIL, "Fail" },
+ { EDONKEY_STAG_PREFERENCE, "Preference" },
+ { EDONKEY_STAG_PORT, "Port" },
+ { EDONKEY_STAG_IP, "IP" },
+ { EDONKEY_STAG_VERSION, "Version" },
+ { EDONKEY_STAG_TEMPFILE, "Temporary File" },
+ { EDONKEY_STAG_PRIORITY, "Priority" },
+ { EDONKEY_STAG_STATUS, "Status" },
+ { EDONKEY_STAG_AVAILABILITY, "Availability" },
+ { EDONKEY_STAG_QTIME, "Queue Time" },
+ { EDONKEY_STAG_PARTS, "Parts" },
+ { EDONKEY_STAG_MOD_VERSION, "Mod Version" },
+ { EMULE_STAG_COMPRESSION, "Compression" },
+ { EMULE_STAG_UDP_CLIENT_PORT, "UDP Client Port" },
+ { EMULE_STAG_UDP_VERSION, "UDP Version" },
+ { EMULE_STAG_SOURCE_EXCHANGE, "Source Exchange" },
+ { EMULE_STAG_COMMENTS, "Comments" },
+ { EMULE_STAG_EXTENDED_REQUEST, "Extended Request" },
+ { EMULE_STAG_COMPATIBLE_CLIENT, "Compatible Client" },
+ { EMULE_STAG_COMPLETE_SOURCES, "Complete Sources" },
+ { EMULE_STAG_SIZE_HI, "Size (High Byte)" },
+ { EMULE_STAG_SERVER_VERSION, "Server Version" },
+ { EMULE_STAG_COMPAT_OPTIONS1, "Compatible Options" },
+ { EMULE_STAG_UDPPORTS, "UDP Ports" },
+ { EMULE_STAG_MISCOPTIONS1, "Misc Options 1" },
+ { EMULE_STAG_VERSION, "eMule Version" },
+ { EMULE_STAG_BUDDYIP, "Buddy IP" },
+ { EMULE_STAG_BUDDYUDP, "Buddy UDP" },
+ { EMULE_STAG_MISCOPTIONS2, "Misc Options 2" },
+ { 0, NULL }
+};
+
+static const value_string edonkey_search_type_vals[] = {
+ { EDONKEY_SEARCH_BOOL, "Boolean" },
+ { EDONKEY_SEARCH_NAME, "Name" },
+ { EDONKEY_SEARCH_META, "Metadata" },
+ { EDONKEY_SEARCH_LIMIT, "Limit" },
+ { 0, NULL }
+};
+
+static const value_string edonkey_search_ext_type_vals[] = {
+ { 0, "BoolOp" },
+ { 1, "String" },
+ { 2, "MetaTag" },
+ { 3, "32bitOp" },
+ { 4, "64bitOp" },
+ { 0, NULL }
+};
+
+static const value_string edonkey_search_ops[] = {
+ { EDONKEY_SEARCH_AND, "AND" },
+ { EDONKEY_SEARCH_OR, "OR" },
+ { EDONKEY_SEARCH_ANDNOT, "AND NOT" },
+ { 0, NULL }
+};
+
+static const value_string edonkey_search_conds[] = {
+ { EDONKEY_SEARCH_MIN, "MIN" },
+ { EDONKEY_SEARCH_MAX, "MAX" },
+ { 0, NULL }
+};
+
+static const value_string kademlia_search_conds[] = {
+ { 0, "=" },
+ { 1, ">" },
+ { 2, "<" },
+ { 3, ">=" },
+ { 4, "<=" },
+ { 5, "<>" },
+ { 0, NULL }
+};
+
+static const value_string kademlia_versions[] = {
+ { KADEMLIA_VERSION1_46c, " (eMule <= 0.46c or compatibles)" },
+ { KADEMLIA_VERSION2_47a, " (eMule 0.47a or compatibles)" },
+ { KADEMLIA_VERSION3_47b, " (eMule 0.47b or compatibles)" },
+ { KADEMLIA_VERSION5_48a, " (eMule 0.48a or compatibles)" },
+ { KADEMLIA_VERSION6_49aBETA, " (eMule 0.49aBETA1 or compatibles)" },
+ { KADEMLIA_VERSION7_49a, " (eMule 0.49a or compatibles)" },
+ { 0, NULL }
+};
+
+static const value_string kademlia_parameter[] = {
+ { KADEMLIA_FIND_VALUE, " (Find Value)" },
+ { KADEMLIA_STORE, " (Store)" },
+ { KADEMLIA_FIND_NODE, " (Find Node)" },
+ { 0, NULL }
+};
+
+static const value_string kademlia_tag_sourcetype[] = {
+ { 1, "HighID Source" },
+ { 3, "Firewalled Kad Source" },
+ { 4, ">4GB file HighID Source" },
+ { 5, ">4GB file Firewalled Kad Source" },
+ { 6, "Firewalled Source with Direct Callback (supports >4GB)" },
+ { 0, NULL }
+};
+
+static const value_string kademlia_tag_encryption[] = {
+ { 1, "Supports Crypt Layer" },
+ { 2, "Requests Crypt Layer" },
+ { 3, "Supports & Requests Crypt Layer" },
+ { 4, "Requires Crypt Layer" },
+ { 5, "Supports & Requires Crypt Layer" },
+ { 6, "Requests & Requires Crypt Layer" },
+ { 7, "Supports, Requests & Requires Crypt Layer" },
+ { 8, "Direct UDP Callback" },
+ { 9, "Supports Crypt Layer; Direct UDP Callback" },
+ { 10, "Requests Crypt Layer; Direct UDP Callback" },
+ { 11, "Supports & Requests Crypt Layer; Direct UDP Callback" },
+ { 12, "Requires Crypt Layer; Direct UDP Callback" },
+ { 13, "Supports & Requires Crypt Layer; Direct UDP Callback" },
+ { 14, "Requests & Requires Crypt Layer; Direct UDP Callback" },
+ { 15, "Supports, Requests & Requires Crypt Layer; Direct UDP Callback" },
+ { 0, NULL }
+};
+
+static const range_string emule_ident_state_rvals[] = {
+ { 0, 0, "nothing is needed" },
+ { 1, 1, "signature is needed" },
+ { 2, 255, "public key and signature are needed" },
+ { 0, 0, NULL }
+};
+
+/* Dissects a generic eDonkey list */
+static int dissect_edonkey_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree,
+ int listnum_length, const char* listdesc,
+ int (*item_dissector)(tvbuff_t *, packet_info *, int, proto_tree *))
+{
+ /* <List> ::= <List Size> <Item>* */
+ guint32 listnum, i;
+ proto_tree *subtree;
+ proto_item* ti;
+ proto_item* list_ti;
+ int list_start_offset;
+
+ list_start_offset = offset;
+
+ switch (listnum_length) {
+ case -1:
+ case 1:
+ listnum = tvb_get_guint8(tvb, offset);
+ break;
+
+ case -2:
+ listnum = tvb_get_ntohs(tvb, offset);
+ break;
+
+ case 2:
+ listnum = tvb_get_letohs(tvb, offset);
+ break;
+
+ case 4:
+ listnum = tvb_get_letohl(tvb, offset);
+ break;
+
+ case -4:
+ listnum = tvb_get_ntohl(tvb, offset);
+ break;
+
+ default:
+ /* Not Supported */
+ return offset;
+ }
+ if (listnum_length < 0)
+ listnum_length = -listnum_length;
+
+ /* keep the tree item object, its length will be set at the end of the function */
+ list_ti = proto_tree_add_uint_format(tree, hf_edonkey_list_size, tvb, offset, listnum_length, listnum, "%s List Size: %u", listdesc, listnum);
+
+ offset+= listnum_length;
+
+ for (i=0; i<listnum; i++)
+ {
+ int item_start_offset;
+
+ item_start_offset = offset;
+ subtree = proto_tree_add_subtree_format( tree, tvb, item_start_offset, 1, ett_edonkey_listitem, &ti,
+ "%s[%u/%u]", listdesc, i+1, listnum);
+
+ /* dissect one list element */
+ offset = (*item_dissector)(tvb, pinfo, offset, subtree);
+ /* Set the container node length */
+ proto_item_set_len( ti, offset - item_start_offset );
+ }
+
+ /* Set the container node length */
+ proto_item_set_len(list_ti, offset - list_start_offset );
+ return offset;
+}
+
+static gint lookup_str_index(gchar* str, gint length, const value_string *vs)
+{
+ gint i = 0;
+
+ if (str == NULL) return -1;
+
+ while (vs[i].strptr) {
+ if (g_ascii_strncasecmp(str, vs[i].strptr, length) == 0)
+ return i;
+ i++;
+ }
+
+ return -1;
+}
+
+static guint8 edonkey_metatag_name_get_type(tvbuff_t *tvb, gint start, gint length, guint8 special_tagtype)
+{
+ guint8 *tag_name;
+
+ if (try_val_to_str(special_tagtype, edonkey_special_tags) == NULL) {
+ gint idx;
+ tag_name = tvb_get_string_enc(wmem_packet_scope(), tvb, start, length, ENC_ASCII|ENC_NA);
+ idx = lookup_str_index(tag_name, length, edonkey_special_tags);
+ if (idx < 0)
+ return EDONKEY_STAG_UNKNOWN;
+ else return edonkey_special_tags[idx].value;
+ }
+ else return special_tagtype;
+
+}
+
+static proto_item* edonkey_tree_add_metatag_name(proto_tree *tree, tvbuff_t *tvb,
+ gint start, gint length, guint8 special_tagtype)
+{
+ const gchar *tag_name;
+
+ /*
+ * XXX - what, in the *protocol*, distinguishes integral from string
+ * tag names? Name length > 1 means "string"? Something else?
+ */
+ tag_name = try_val_to_str(special_tagtype, edonkey_special_tags);
+ if (tag_name == NULL) {
+ return proto_tree_add_item(tree, hf_edonkey_metatag_name, tvb, start, length, ENC_ASCII);
+ }
+ else {
+ return proto_tree_add_uint_format(tree, hf_edonkey_metatag_id, tvb, start, length,
+ special_tagtype, "Meta Tag Name: %s (0x%02x)",
+ tag_name, special_tagtype);
+ }
+}
+
+static int dissect_kademlia_search_condition_argument_uint64(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ proto_tree_add_item( tree, hf_kademlia_search_condition_argument_uint64, tvb, offset, 8, ENC_LITTLE_ENDIAN );
+ return offset + 8;
+}
+
+static int dissect_kademlia_search_condition_argument_uint32(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ proto_tree_add_item( tree, hf_kademlia_search_condition_argument_uint32, tvb, offset, 4, ENC_LITTLE_ENDIAN );
+ return offset + 4;
+}
+
+static int dissect_kademlia_search_condition(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree )
+{
+ proto_item * ti;
+ guint16 value = tvb_get_guint8(tvb, offset);
+ ti = proto_tree_add_item( tree, hf_kademlia_search_condition, tvb, offset, 1, ENC_BIG_ENDIAN );
+ proto_item_append_text(ti, " [%s]", val_to_str_const( value, kademlia_search_conds, "Unknown") );
+
+ return offset + 1;
+}
+
+/* Dissects the eDonkey meta tag */
+static int dissect_edonkey_metatag(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Meta Tag> ::= <Tag Type (guint8)> <Tag Name> <Tag> */
+ /* <Tag Name> ::= <Tag Name Size (guint16)> <Special Tag> || <String> */
+ /* <Tag Name> ::= <Special Tag> iff Tag Type had the top bit set */
+ proto_item *ti;
+ proto_tree *metatag_tree;
+ guint8 real_tag_type, tag_type, special_tagtype, trans_tagtype;
+ guint16 tag_name_size, string_length, array_length;
+ guint32 tag_length, blob_length;
+ int tag_offset;
+
+ real_tag_type = tag_type = tvb_get_guint8(tvb, offset);
+ if (tag_type & EDONKEY_MTAG_SHORTNAME) {
+ real_tag_type &= ~EDONKEY_MTAG_SHORTNAME;
+ tag_name_size = 1;
+ special_tagtype = tvb_get_guint8(tvb, offset+1);
+ tag_length = 2;
+ } else {
+ tag_name_size = tvb_get_letohs(tvb, offset+1);
+ special_tagtype = tvb_get_guint8(tvb, offset+3);
+ tag_length = 3 + tag_name_size;
+ }
+
+ tag_offset = offset + tag_length;
+
+ switch (real_tag_type)
+ {
+ case EDONKEY_MTAG_HASH:
+ /* <Tag> ::= HASH */
+ tag_length += 16;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ proto_tree_add_item(metatag_tree, hf_edonkey_hash, tvb, tag_offset, 16, ENC_NA);
+ break;
+
+ case EDONKEY_MTAG_STRING:
+ /* <Tag> ::= <Length (guint16)> <String> */
+ string_length = tvb_get_letohs(tvb, tag_offset);
+ tag_length += 2+string_length;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_string_length, tvb, tag_offset, 2, string_length);
+ proto_tree_add_item(metatag_tree, hf_edonkey_string, tvb, tag_offset+2, string_length, ENC_ASCII);
+ break;
+
+ case EDONKEY_MTAG_DWORD:
+ /* <Tag> ::= guint32 */
+ tag_length += 4;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ trans_tagtype = edonkey_metatag_name_get_type(tvb, offset+3, tag_name_size, special_tagtype);
+ if (trans_tagtype == EDONKEY_STAG_IP) {
+ proto_tree_add_item(metatag_tree, hf_edonkey_ip, tvb, tag_offset, 4, ENC_BIG_ENDIAN);
+ }
+ else if (trans_tagtype == EMULE_STAG_SERVER_VERSION) {
+ proto_tree_add_item(metatag_tree, hf_edonkey_meta_tag_value_revision, tvb, tag_offset, 4, ENC_LITTLE_ENDIAN);
+ }
+ else {
+ proto_tree_add_item(metatag_tree, hf_edonkey_meta_tag_value_uint, tvb, tag_offset, 4, ENC_LITTLE_ENDIAN);
+ }
+ break;
+
+ case EDONKEY_MTAG_FLOAT:
+ /* <Tag> ::= 4 byte float */
+ tag_length += 4;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ break;
+
+ case EDONKEY_MTAG_WORD:
+ /* <Tag> ::= guint16 */
+ tag_length += 2;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+
+ proto_tree_add_item(metatag_tree, hf_edonkey_meta_tag_value_uint, tvb, tag_offset, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case EDONKEY_MTAG_BYTE:
+ /* <Tag> ::= guint8 */
+ tag_length += 1;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ proto_tree_add_item(metatag_tree, hf_edonkey_meta_tag_value_uint, tvb, tag_offset, 1, ENC_NA);
+ break;
+
+ case EDONKEY_MTAG_BOOL:
+ /* <Tag> ::= <Bool (guint8)> */
+ tag_length += 1;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ proto_tree_add_item(metatag_tree, hf_edonkey_meta_tag_value_uint, tvb, tag_offset, 1, ENC_NA);
+ break;
+
+ case EDONKEY_MTAG_BOOL_ARRAY:
+ /* <Tag> ::= <Length (guint16)> <BoolArray> */
+ array_length = tvb_get_letohs(tvb, tag_offset);
+ /*
+ * This is allegedly what the protocol uses, rather than the
+ * correct value of (array_length+7)/8
+ * Therefore an extra unused byte is transmitted if the array
+ * is a multiple of 8 longs.
+ */
+ tag_length += 2+(array_length/8)+1;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ proto_tree_add_item(metatag_tree, hf_edonkey_boolean_array_length, tvb, tag_offset, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case EDONKEY_MTAG_BLOB:
+ /* <Tag> ::= <Length (guint32)> <BLOB> */
+ blob_length = tvb_get_letohl(tvb, tag_offset);
+ tag_length += 4+blob_length;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (tag_type==real_tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ proto_tree_add_item(metatag_tree, hf_edonkey_blob_length, tvb, tag_offset, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case EDONKEY_MTAG_BSOB:
+ /* This is possibly a Binary Small OBject, like a BLOB but with an 8 or 16-bit length field */
+ /* That's a complete guess though, so don't handle it yet. */
+ case EDONKEY_MTAG_UNKNOWN:
+ default:
+ if (real_tag_type>=EDONKEY_MTAG_STR1 && real_tag_type<=EDONKEY_MTAG_STR16) {
+ /* <Tag> ::= <String> */
+ string_length = real_tag_type-EDONKEY_MTAG_STR1+1;
+ tag_length += string_length;
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type);
+ if (real_tag_type==tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ proto_tree_add_item(metatag_tree, hf_edonkey_string, tvb, tag_offset, string_length, ENC_ASCII);
+
+ } else {
+ /* Unknown tag type - actual tag length is also unknown */
+ ti = proto_tree_add_item(tree, hf_edonkey_metatag, tvb, offset, tag_length, ENC_NA);
+ metatag_tree = proto_item_add_subtree(ti, ett_edonkey_metatag);
+ proto_tree_add_uint_format(metatag_tree, hf_edonkey_metatag_type, tvb, offset, 1, tag_type, "Unknown Meta Tag Type (0x%02x)", tag_type);
+ if (real_tag_type==tag_type)
+ proto_tree_add_uint(metatag_tree, hf_edonkey_metatag_namesize, tvb, offset+1, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(metatag_tree, tvb, tag_offset-tag_name_size, tag_name_size, special_tagtype);
+ }
+ break;
+
+ }
+
+ return offset + tag_length;
+}
+
+/* Dissects the eDonkey address */
+static int dissect_edonkey_address(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Address> ::= <IP> <Port> */
+ /* guint32 ip = tvb_get_letohl(tvb, offset);
+ proto_tree_add_ipv4(tree, hf_edonkey_ip, tvb, offset, 4, ip); */
+ proto_tree_add_item(tree, hf_edonkey_ip, tvb, offset, 4, ENC_BIG_ENDIAN);
+ proto_tree_add_item(tree, hf_edonkey_port, tvb, offset+4, 2, ENC_LITTLE_ENDIAN);
+ return offset+6;
+}
+
+
+static int dissect_kademlia_udp_port(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ proto_tree_add_item(tree, hf_kademlia_udp_port, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ return offset +2;
+}
+
+static int dissect_kademlia_tcp_port(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ proto_tree_add_item(tree, hf_kademlia_tcp_port, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ return offset +2;
+}
+
+
+static int dissect_kademlia_ip_address(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ proto_tree_add_item(tree, hf_kademlia_ip, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ return offset + 4;
+}
+
+
+static int dissect_kademlia_address(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Address> ::= <IP> <Port> <Tcp Port>*/
+ offset = dissect_kademlia_ip_address( tvb, pinfo, offset, tree );
+
+ offset = dissect_kademlia_udp_port( tvb, pinfo, offset, tree );
+
+ offset = dissect_kademlia_tcp_port( tvb, pinfo, offset, tree );
+
+ return offset;
+}
+
+static int dissect_kademlia_tagname(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree, const gchar** outputTagName, const gchar** outputExtendedTagName)
+{
+ /* <String> ::= <String length (guint16)> DATA */
+ const gchar * tagname;
+ const gchar * tag_full_name = NULL;
+ guint8 tagname_value;
+ proto_item *ti, *hidden_item;
+
+ guint16 string_length = tvb_get_letohs(tvb, offset);
+
+ proto_tree_add_uint(tree, hf_kademlia_tag_name_length, tvb, offset, 2, string_length);
+
+ hidden_item = proto_tree_add_uint(tree, hf_edonkey_string_length, tvb, offset, 2, string_length);
+ proto_item_set_hidden(hidden_item);
+
+ tagname = tvb_get_string_enc(wmem_packet_scope(), tvb, offset + 2, string_length, ENC_ASCII|ENC_NA);
+
+ tag_full_name = "UnknownTagName";
+
+ if ( tagname && string_length == 1 ) {
+ tagname_value = *(const guint8*)tagname;
+ /* lookup tagname */
+ tag_full_name = val_to_str_const( tagname_value, kademlia_tags, tag_full_name );
+ }
+
+ ti = proto_tree_add_item(tree, hf_kademlia_tag_name, tvb, offset + 2, string_length, ENC_BIG_ENDIAN);
+ proto_item_append_text(ti, " [%s]", tag_full_name);
+
+ if (outputTagName)
+ *outputTagName = tagname;
+
+ if (outputExtendedTagName)
+ *outputExtendedTagName = tag_full_name;
+
+ return offset+2+string_length;
+}
+
+static int dissect_kademlia_string(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <String> ::= <String length (guint16)> DATA */
+ guint16 string_length = tvb_get_letohs(tvb, offset);
+
+ proto_tree_add_uint(tree, hf_edonkey_string_length, tvb, offset, 2, string_length);
+
+ /* TODO: ASCII or UTF-8? */
+ proto_tree_add_item(tree, hf_edonkey_kademlia_string, tvb, offset+2, string_length, ENC_ASCII);
+
+ return offset+2+string_length;
+}
+
+/* Dissects the eDonkey address list */
+static int dissect_edonkey_address_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Address List> ::= <List Size (guint8)> <Address>* */
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 1, "Address", dissect_edonkey_address);
+}
+
+/* Dissects the eDonkey hash */
+static int dissect_edonkey_hash(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <hash> ::= HASH (16 word MD4 digest) */
+ proto_tree_add_item(tree, hf_edonkey_hash, tvb, offset, 16, ENC_NA);
+ return offset+16;
+}
+
+/* Dissects the eDonkey file hash */
+static int dissect_edonkey_file_hash(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <File hash> ::= HASH (16 word MD4 digest) */
+ proto_tree_add_item(tree, hf_edonkey_file_hash, tvb, offset, 16, ENC_NA);
+ return offset+16;
+}
+
+/* Dissects the eMule public key */
+static int dissect_edonkey_public_key(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ guint8 length = tvb_get_guint8(tvb, offset);
+ proto_tree_add_item(tree, hf_emule_public_key_length, tvb, offset, 1, ENC_NA);
+ offset++;
+ proto_tree_add_item(tree, hf_emule_public_key, tvb, offset, length, ENC_NA);
+ return offset + length;
+}
+
+/* Dissects the eMule signature */
+static int dissect_edonkey_signature(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ guint8 length = tvb_get_guint8(tvb, offset);
+ proto_tree_add_item(tree, hf_emule_signature_length, tvb, offset, 1, ENC_NA);
+ offset++;
+ proto_tree_add_item(tree, hf_emule_signature, tvb, offset, length, ENC_NA);
+ return offset + length;
+}
+
+static const char *kademlia_hash(tvbuff_t *tvb, int offset) {
+ guint32 hash[4];
+ int i;
+
+ for (i = 0; i < 4; i++)
+ hash[i] = tvb_get_letohl(tvb, offset + i*4);
+
+ return wmem_strdup_printf(wmem_packet_scope(),
+ "%08X%08X%08X%08X", hash[0], hash[1], hash[2], hash[3]);
+}
+
+static int dissect_kademlia_hash_hidden(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree) {
+ proto_item *hidden_item;
+ const char *hash;
+
+ hash = kademlia_hash(tvb, offset);
+
+ /* <File hash> ::= HASH (16 word MD4 digest) */
+ hidden_item = proto_tree_add_string(tree, hf_kademlia_hash, tvb, offset, 16, hash);
+ proto_item_set_hidden(hidden_item);
+
+ return offset+16;
+}
+
+/* Dissects the Kademlia hash*/
+static int dissect_kademlia_hash(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree, int *value_ptr) {
+ const char *hash;
+
+ hash = kademlia_hash(tvb, offset);
+
+ /* <File hash> ::= HASH (16 word MD4 digest) */
+ proto_tree_add_string(tree, *value_ptr, tvb, offset, 16, hash);
+
+ return dissect_kademlia_hash_hidden(tvb, pinfo, offset, tree);
+}
+
+static int dissect_kademlia_tag_hash_hidden(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree) {
+ proto_item *hidden_item;
+ const char *hash;
+
+ hash = kademlia_hash(tvb, offset);
+
+ /* <File hash> ::= HASH (16 word MD4 digest) */
+ hidden_item = proto_tree_add_string(tree, hf_kademlia_tag_hash, tvb, offset, 16, hash);
+ proto_item_set_hidden(hidden_item);
+
+ return offset+16;
+}
+
+static int dissect_kademlia_tag_hash(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree) {
+ const char *hash;
+
+ hash = kademlia_hash(tvb, offset);
+
+ /* <File hash> ::= HASH (16 word MD4 digest) */
+ proto_tree_add_string(tree, hf_kademlia_hash, tvb, offset, 16, hash);
+ return dissect_kademlia_tag_hash_hidden( tvb, pinfo, offset, tree );
+}
+
+static int dissect_kademlia_tag_bsob(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree, const gchar** string_value )
+{
+ guint16 bsob_length;
+
+ bsob_length = tvb_get_guint8(tvb, offset);
+ *string_value = tvb_bytes_to_str(wmem_packet_scope(), tvb, offset + 1, bsob_length );
+
+ proto_tree_add_item(tree, hf_kademlia_tag_bsob, tvb, offset + 1, bsob_length, ENC_NA);
+ return offset + 1 + bsob_length;
+}
+
+
+static int dissect_kademlia_tag_string(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree, const guint8** string_value)
+{
+ proto_item *hidden_item;
+ guint16 string_length = tvb_get_letohs(tvb, offset);
+
+ hidden_item = proto_tree_add_uint(tree, hf_edonkey_string_length, tvb, offset, 2, string_length);
+ proto_item_set_hidden(hidden_item);
+ hidden_item = proto_tree_add_item_ret_string(tree, hf_edonkey_string, tvb, offset + 2, string_length, ENC_ASCII|ENC_NA, wmem_packet_scope(), string_value);
+ proto_item_set_hidden(hidden_item);
+
+ proto_tree_add_item(tree, hf_kademlia_tag_string, tvb, offset + 2, string_length, ENC_ASCII);
+ return offset + 2 + string_length;
+}
+
+/* Dissects the eDonkey hash list */
+static int dissect_edonkey_hash_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Hash List> ::= <File Hash> <List Size (guint16)> <Hash>* */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "Hash", dissect_edonkey_hash);
+}
+
+/* Dissects the eDonkey meta tag list */
+static int dissect_edonkey_metatag_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Meta Tag List> ::= <List Size (guint32)> <Meta tag>* */
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 4, "Meta Tag", dissect_edonkey_metatag);
+}
+
+/* Dissects the eDonkey String */
+static int dissect_edonkey_string(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <String> ::= <String length (guint16)> DATA */
+ guint16 string_length = tvb_get_letohs(tvb, offset);
+ proto_tree_add_uint(tree, hf_edonkey_string_length, tvb, offset, 2, string_length);
+ proto_tree_add_item(tree, hf_edonkey_string, tvb, offset+2, string_length, ENC_ASCII);
+ return offset+2+string_length;
+}
+
+/* Dissects the eDonkey Directory */
+static int dissect_edonkey_directory(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Directory> ::= <String> */
+ guint16 string_length = tvb_get_letohs(tvb, offset);
+ proto_tree_add_uint(tree, hf_edonkey_string_length, tvb, offset, 2, string_length);
+ proto_tree_add_item(tree, hf_edonkey_directory, tvb, offset+2, string_length, ENC_ASCII);
+ return offset+2+string_length;
+}
+
+/* Dissects the eDonkey Filename */
+static int dissect_edonkey_file_name(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Filename> ::= <String> */
+ return dissect_edonkey_string(tvb, pinfo, offset, tree);
+}
+
+/* Dissects the eDonkey File Status */
+static int dissect_edonkey_file_status(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ guint16 partcount, arrlen;
+
+ /* <File Status> ::= <Part Count> <Part Status> */
+ partcount = tvb_get_letohs(tvb, offset);
+ arrlen = (partcount+7)/8;
+
+ proto_tree_add_uint(tree, hf_edonkey_part_count, tvb, offset, 2, partcount);
+ if (partcount>0) {
+ proto_tree_add_item(tree, hf_edonkey_file_status, tvb, offset+2, arrlen, ENC_NA);
+ }
+ return offset+2+arrlen;
+}
+
+
+/* Dissects the eDonkey directory list */
+static int dissect_edonkey_directory_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Directory List> ::= <List Size (guint32)> <Directory>* */
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 4, "Directory", dissect_edonkey_directory);
+}
+
+/* Dissects the eDonkey server hash */
+static int dissect_edonkey_server_hash(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Server hash> ::= HASH (16 word MD4 digest) */
+ proto_tree_add_item(tree, hf_edonkey_server_hash, tvb, offset, 16, ENC_NA);
+ return offset+16;
+}
+
+/* Dissects the eDonkey client hash */
+static int dissect_edonkey_client_hash(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Client hash> ::= HASH (16 word MD4 digest) */
+ proto_tree_add_item(tree, hf_edonkey_client_hash, tvb, offset, 16, ENC_NA);
+ return offset+16;
+}
+
+/* Dissects the eMule sourceOBFU */
+static int dissect_emule_sourceOBFU(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+
+ proto_item *ti;
+ proto_tree *sourceOBFU_tree;
+ guint8 settings = tvb_get_guint8(tvb, offset+6);
+ /* Add subtree for client info */
+ ti = proto_tree_add_item(tree, hf_emule_sourceOBFU, tvb, offset, 7 + ((settings & 0x80) ? 16 : 0), ENC_NA);
+ sourceOBFU_tree = proto_item_add_subtree(ti, ett_emule_sourceOBFU);
+
+ proto_tree_add_item(sourceOBFU_tree, hf_edonkey_ip, tvb, offset, 4, ENC_BIG_ENDIAN);
+ proto_tree_add_item(sourceOBFU_tree, hf_edonkey_port, tvb, offset+4, 2, ENC_LITTLE_ENDIAN);
+ proto_tree_add_item(sourceOBFU_tree, hf_edonkey_obfuscation_settings, tvb, offset+6, 1, ENC_NA);
+ offset += 7;
+ if (settings & 0x80)
+ offset = dissect_edonkey_client_hash(tvb, pinfo, offset, sourceOBFU_tree);
+ return offset;
+}
+
+
+/* Dissects the eMule sourceOBFU list */
+static int dissect_emule_sourceOBFU_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 1, "Sources Obfuscation", dissect_emule_sourceOBFU);
+}
+
+
+/* Dissects the eDonkey client ID */
+static int dissect_edonkey_client_id(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree, gboolean fileinfo)
+{
+ proto_item *ti;
+ /* <Client ID> ::= guint32 */
+ /* guint32 ip = tvb_get_letohl(tvb, offset);
+ proto_tree_add_ipv4(tree, hf_edonkey_client_id, tvb, offset, 4, ip); */
+ ti = proto_tree_add_item(tree, hf_edonkey_client_id, tvb, offset, 4, ENC_BIG_ENDIAN);
+ if (fileinfo) {
+ guint32 ip = tvb_get_letohl(tvb, offset);
+ guint16 port = tvb_get_letohs(tvb, offset+4);
+ if (ip==0xfcfcfcfc && port==0xfcfc) {
+ proto_item_append_text(ti, " (myself, incomplete file)");
+ } else if (ip==0xfbfbfbfb && port==0xfbfb) {
+ proto_item_append_text(ti, " (myself, complete file)");
+ }
+ }
+ return offset+4;
+}
+
+/* Dissects the eDonkey port */
+static int dissect_edonkey_port(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Port> ::= guint16 */
+ proto_tree_add_item(tree, hf_edonkey_port, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ return offset+2;
+}
+
+/* Dissects the eDonkey start offset */
+static int dissect_edonkey_start_offset(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Start Offset> ::= guint32 */
+ proto_tree_add_item(tree, hf_edonkey_start_offset, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ return offset+4;
+}
+
+static int dissect_edonkey_start_offset_64(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Start Offset> ::= guint64 */
+ proto_tree_add_item(tree, hf_edonkey_start_offset_64, tvb, offset, 8, ENC_LITTLE_ENDIAN);
+ return offset+8;
+}
+
+/* Dissects the eDonkey end offset */
+static int dissect_edonkey_end_offset(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <End Offset> ::= guint32 */
+ proto_tree_add_item(tree, hf_edonkey_end_offset, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ return offset+4;
+}
+
+static int dissect_edonkey_end_offset_64(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <End Offset> ::= guint64 */
+ proto_tree_add_item(tree, hf_edonkey_end_offset_64, tvb, offset, 8, ENC_LITTLE_ENDIAN);
+ return offset+8;
+}
+
+/* Dissects the eDonkey client info */
+static int dissect_edonkey_client_info(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Client info> ::= <Client hash> <Client ID> <Port> <Meta tag list> */
+ proto_item *ti;
+ proto_tree *clientinfo_tree;
+ /* Add subtree for client info */
+ ti = proto_tree_add_item(tree, hf_edonkey_clientinfo, tvb, offset, 0, ENC_NA);
+ clientinfo_tree = proto_item_add_subtree(ti, ett_edonkey_clientinfo);
+ offset = dissect_edonkey_client_hash(tvb, pinfo, offset, clientinfo_tree);
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, clientinfo_tree, FALSE);
+ offset = dissect_edonkey_port(tvb, pinfo, offset, clientinfo_tree);
+ offset = dissect_edonkey_metatag_list(tvb, pinfo, offset, clientinfo_tree);
+ return offset;
+}
+
+/* Dissects the eDonkey client info list */
+static int dissect_edonkey_client_info_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Client Info List> ::= <List Size (guint32)> <Client Info>* */
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 4, "Client Info", dissect_edonkey_client_info);
+}
+
+/* Dissects the eDonkey server info */
+static int dissect_edonkey_server_info(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Server info> ::= <Server hash> <Server Address> <Meta tag list> */
+ proto_item *ti;
+ proto_tree *serverinfo_tree;
+ /* Add subtree for server info */
+ ti = proto_tree_add_item(tree, hf_edonkey_serverinfo, tvb, offset, 0, ENC_NA);
+ serverinfo_tree = proto_item_add_subtree(ti, ett_edonkey_serverinfo);
+ offset = dissect_edonkey_server_hash(tvb, pinfo, offset, serverinfo_tree);
+ offset = dissect_edonkey_address(tvb, pinfo, offset, serverinfo_tree);
+ offset = dissect_edonkey_metatag_list(tvb, pinfo, offset, serverinfo_tree);
+ return offset;
+}
+
+/* Dissects the eDonkey file info */
+static int dissect_edonkey_file_info(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <File info> ::= <File hash> <Client ID> <Port> <Meta tag list> */
+ proto_item *ti;
+ proto_tree *fileinfo_tree;
+ int startoff;
+ /* Add subtree for file info */
+ ti = proto_tree_add_item(tree, hf_edonkey_fileinfo, tvb, offset, 0, ENC_NA);
+ startoff = offset;
+ fileinfo_tree = proto_item_add_subtree(ti, ett_edonkey_fileinfo);
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, fileinfo_tree);
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, fileinfo_tree, TRUE);
+ offset = dissect_edonkey_port(tvb, pinfo, offset, fileinfo_tree);
+ offset = dissect_edonkey_metatag_list(tvb, pinfo, offset, fileinfo_tree);
+ proto_item_set_len(ti, offset-startoff);
+ return offset;
+}
+
+/* Dissects the eDonkey file info list */
+static int dissect_edonkey_file_info_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <File Info List> ::= <List Size (guint32)> <File Info>* */
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 4, "File Info", dissect_edonkey_file_info);
+}
+
+
+/* Dissects the eMule address list */
+static int dissect_emule_address_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Address List> ::= <List Size (guint16)> <Address>* */
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "Address", dissect_edonkey_address);
+}
+
+static int dissect_emule_aich_root_hash(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <AICH Root Hash> ::= HASH (20 byte SHA1 digest) */
+ proto_tree_add_item(tree, hf_emule_aich_root_hash, tvb, offset, 20, ENC_NA);
+ return offset + 20;
+}
+
+static int dissect_emule_aich_hash_list_entry(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ guint16 hashid;
+ proto_item *ti;
+ proto_tree *aichhash_tree;
+ /* <AICH Hash List Entry> ::= <AICH Hash ID> <AICH Hash> */
+ ti = proto_tree_add_item(tree, hf_emule_aich_hash_entry, tvb, offset, 22, ENC_NA);
+ aichhash_tree = proto_item_add_subtree(ti, ett_emule_aichhash);
+
+ hashid = tvb_get_letohs(tvb, offset);
+ proto_tree_add_uint(aichhash_tree, hf_emule_aich_hash_id, tvb, offset, 2, hashid);
+ proto_tree_add_item(aichhash_tree, hf_emule_aich_hash, tvb, offset+2, 20, ENC_NA);
+ return offset + 22;
+}
+
+static int dissect_emule_aich_hash_list(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <AICH Hash List> ::= <List Size (guint16)> < <AICH Hash ID> <AICH Hash> >* */
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "AICH Hash", dissect_emule_aich_hash_list_entry);
+}
+
+static int dissect_emule_multipacket(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, int eoffset, proto_tree *tree, int isext)
+{
+ guint8 opcode, nextop;
+ guint16 namelen, partcount, arrlen, oplen;
+ guint32 sourcecount;
+ proto_item *ti;
+ proto_tree *mp_tree;
+
+ /* <MultiPacket> ::= <File Hash> <Opcodes>* */
+ /* <MultiPacketExt> ::= <File Hash> <FileLength> <Opcodes>* */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+
+ if (isext) {
+ proto_tree_add_item(tree, hf_edonkey_emule_file_length, tvb, offset, 8, ENC_LITTLE_ENDIAN);
+ offset += 8;
+ }
+
+ while (offset<eoffset) {
+ opcode = tvb_get_guint8(tvb, offset);
+
+ switch (opcode) {
+ case EDONKEY_MSG_FILE_STATUS_REQUEST:
+ ti = proto_tree_add_item(tree, hf_emule_multipacket_entry, tvb, offset, 1, ENC_NA);
+ mp_tree = proto_item_add_subtree(ti, ett_emule_multipacket);
+
+ proto_tree_add_uint_format(mp_tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "File Status Request (0x%02x)", opcode);
+ offset += 1;
+ break;
+ case EDONKEY_MSG_FILE_REQUEST:
+ partcount = 443; /* Invalid */
+ sourcecount = 65536; /* Out of range */
+ arrlen = 0;
+ oplen = 1;
+
+ if (offset+2<eoffset) {
+ nextop = tvb_get_guint8(tvb, offset+1);
+ if (nextop!=EDONKEY_MSG_FILE_STATUS_REQUEST &&
+ nextop!=EMULE_MSG_SOURCES_REQUEST &&
+ nextop!=EMULE_MSG_AICHFILEHASH_REQUEST) {
+
+ partcount = tvb_get_letohs(tvb, offset+1);
+ if (partcount<=442) {
+ arrlen = (partcount+7)/8;
+ oplen += 2+arrlen;
+
+ if (offset+2+arrlen+2<eoffset) {
+ nextop = tvb_get_guint8(tvb, offset+2+arrlen+1);
+ if (nextop!=EDONKEY_MSG_FILE_STATUS_REQUEST &&
+ nextop!=EMULE_MSG_SOURCES_REQUEST &&
+ nextop!=EMULE_MSG_AICHFILEHASH_REQUEST) {
+
+ sourcecount = tvb_get_letohs(tvb, offset+2+arrlen+1);
+ oplen += 2;
+ }
+ }
+ }
+ }
+ }
+
+ ti = proto_tree_add_item(tree, hf_emule_multipacket_entry, tvb, offset, oplen, ENC_NA);
+ mp_tree = proto_item_add_subtree(ti, ett_emule_multipacket);
+
+ proto_tree_add_uint_format(mp_tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "File Name Request (0x%02x)", opcode);
+ if (partcount<=442) {
+ dissect_edonkey_file_status(tvb, pinfo, offset+1, mp_tree);
+ if (sourcecount<65536) {
+ proto_tree_add_uint(mp_tree, hf_emule_source_count, tvb, offset+3+arrlen, 2, sourcecount);
+ }
+ }
+ offset += oplen;
+ break;
+ case EMULE_MSG_SOURCES_REQUEST:
+ ti = proto_tree_add_item(tree, hf_emule_multipacket_entry, tvb, offset, 1, ENC_NA);
+ mp_tree = proto_item_add_subtree(ti, ett_emule_multipacket);
+
+ proto_tree_add_uint_format(mp_tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "Sources Request (0x%02x)", opcode);
+ offset += 1;
+ break;
+ case EMULE_MSG_AICHFILEHASH_REQUEST:
+ ti = proto_tree_add_item(tree, hf_emule_multipacket_entry, tvb, offset, 1, ENC_NA);
+ mp_tree = proto_item_add_subtree(ti, ett_emule_multipacket);
+
+ proto_tree_add_uint_format(mp_tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "AICH Root Hash Request (0x%02x)", opcode);
+ offset += 1;
+ break;
+
+ case EDONKEY_MSG_FILE_STATUS:
+ partcount = tvb_get_letohs(tvb, offset+1);
+ arrlen = (partcount+7)/8;
+
+ ti = proto_tree_add_item(tree, hf_emule_multipacket_entry, tvb, offset, 3+arrlen, ENC_NA);
+ mp_tree = proto_item_add_subtree(ti, ett_emule_multipacket);
+
+ proto_tree_add_uint_format(mp_tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "File Status (0x%02x)", opcode);
+ offset = dissect_edonkey_file_status(tvb, pinfo, offset+1, mp_tree);
+ break;
+ case EDONKEY_MSG_FILE_REQUEST_ANSWER:
+ namelen = tvb_get_letohs(tvb, offset+1);
+
+ ti = proto_tree_add_item(tree, hf_emule_multipacket_entry, tvb, offset, 3+namelen, ENC_NA);
+ mp_tree = proto_item_add_subtree(ti, ett_emule_multipacket);
+
+ proto_tree_add_uint_format(mp_tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "File Name (0x%02x)", opcode);
+ offset = dissect_edonkey_file_name(tvb, pinfo, offset+1, mp_tree);
+ break;
+ case EMULE_MSG_AICHFILEHASH_ANSWER:
+ ti = proto_tree_add_item(tree, hf_emule_multipacket_entry, tvb, offset, 21, ENC_NA);
+ mp_tree = proto_item_add_subtree(ti, ett_emule_multipacket);
+
+ proto_tree_add_uint_format(mp_tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "AICH Root Hash (0x%02x)", opcode);
+ proto_tree_add_item(mp_tree, hf_emule_aich_root_hash, tvb, offset+1, 20, ENC_NA);
+ offset += 21;
+ break;
+
+ default:
+ /* Unknown opcode means we can't continue parsing the stream */
+ proto_tree_add_uint_format(tree, hf_emule_multipacket_opcode, tvb, offset, 1,
+ opcode, "Unknown MultiPacket opcode (0x%02x)", opcode);
+ return offset+1;
+ }
+ }
+
+ return offset;
+}
+
+/* Dissects the Overnet peer type */
+static int dissect_overnet_peertype(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Peer type> ::= guint8 */
+ proto_tree_add_item(tree, hf_edonkey_overnet_peer_type, tvb, offset, 1, ENC_NA);
+ return offset+1;
+}
+
+/* Dissects the Overnet peer */
+static int dissect_overnet_peer(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Peer> ::= <Hash> <Address> <Peer type> */
+ proto_item *ti;
+ proto_tree *peer_tree;
+ ti = proto_tree_add_item(tree, hf_overnet_peer, tvb, offset, 16 + 6 + 1, ENC_NA);
+ peer_tree = proto_item_add_subtree(ti, ett_overnet_peer);
+ offset = dissect_edonkey_hash(tvb, pinfo, offset, peer_tree);
+ offset = dissect_edonkey_address(tvb, pinfo, offset, peer_tree);
+ offset = dissect_overnet_peertype(tvb, pinfo, offset, peer_tree);
+ return offset;
+}
+
+static int dissect_kademlia_peertype(tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ /* <Peer type> ::= 1bytes */
+ proto_tree_add_item( tree, hf_kademlia_peertype, tvb, offset, 1, ENC_BIG_ENDIAN );
+ return offset + 1;
+}
+
+/* Dissects the Kademlia peer */
+static int dissect_kademlia_peer(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Peer> ::= <Hash> <Address> <Peer type> */
+ proto_item *ti;
+ proto_tree *peer_tree;
+
+ ti = proto_tree_add_item(tree, hf_kademlia_peer, tvb, offset, 16 + 4 + 4 + 1, ENC_NA);
+
+ peer_tree = proto_item_add_subtree(ti, ett_overnet_peer);
+
+ /* 16 */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, peer_tree, &hf_kademlia_peer_id);
+
+ /* 8 ( 4 ip + 2 tcp port + 2 udp port ) */
+ offset = dissect_kademlia_address(tvb, pinfo, offset, peer_tree);
+
+ /* 1 */
+ /* offset = dissect_kademlia_peertype(tvb, pinfo, offset, peer_tree); */
+ proto_tree_add_item(peer_tree, hf_kademlia_version, tvb, offset, 1, ENC_BIG_ENDIAN);
+ return offset + 1;
+}
+
+/* Dissects the Kademlia2 peer */
+static int dissect_kademlia2_peer(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Peer> ::= <Hash> <Address> <Peer type> */
+ proto_item *ti;
+ proto_tree *peer_tree;
+
+ ti = proto_tree_add_item(tree, hf_kademlia_peer, tvb, offset, 16 + 4 + 4 + 1, ENC_NA);
+
+ peer_tree = proto_item_add_subtree(ti, ett_overnet_peer);
+
+ /* 16 */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, peer_tree, &hf_kademlia_peer_id);
+
+ /* 8 ( 4 ip + 2 tcp port + 2 udp port ) */
+ offset = dissect_kademlia_address(tvb, pinfo, offset, peer_tree);
+
+ /* 1 */
+ offset = dissect_kademlia_peertype(tvb, pinfo, offset, peer_tree);
+ return offset;
+}
+
+
+/* Dissects the eDonkey search query */
+static int dissect_edonkey_search_query(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* <Search Query> ::= <Search Type> <Search> */
+ proto_item *ti;
+ proto_tree *search_tree;
+ guint8 search_type, special_tagtype;
+ guint16 tag_name_size, string_length;
+ guint32 search_length;
+ int string_offset, tag_name_offset;
+
+ search_type = tvb_get_guint8(tvb, offset);
+ search_length = 1;
+ ti = proto_tree_add_uint(tree, hf_edonkey_search_type, tvb, offset, 1, search_type);
+
+ switch (search_type)
+ {
+ case EDONKEY_SEARCH_BOOL:
+ /* <Search> ::= <Operator> <Search Query> <Search Query> */
+ search_length += 1;
+
+ /* Add subtree for search entry */
+ proto_item_set_len(ti, search_length);
+ search_tree = proto_item_add_subtree(ti, ett_edonkey_search);
+
+ /* Add query info */
+ proto_tree_add_item(search_tree, hf_edonkey_search_ops, tvb, offset+1, 1, ENC_LITTLE_ENDIAN);
+
+ offset+=2;
+ offset = dissect_edonkey_search_query(tvb, pinfo, offset, search_tree);
+ offset = dissect_edonkey_search_query(tvb, pinfo, offset, search_tree);
+ break;
+
+ case EDONKEY_SEARCH_NAME:
+ /* <Search> ::= <String> */
+ string_offset = offset + search_length;
+ string_length = tvb_get_letohs(tvb, string_offset);
+ search_length += 2+string_length;
+
+ /* Add subtree for search entry */
+ proto_item_set_len(ti, search_length);
+ search_tree = proto_item_add_subtree(ti, ett_edonkey_search);
+
+ /* Add query info */
+ proto_tree_add_uint(search_tree, hf_edonkey_string_length, tvb, string_offset, 2, string_length);
+ proto_tree_add_item(search_tree, hf_edonkey_string, tvb, string_offset+2, string_length, ENC_ASCII);
+ offset += search_length;
+ break;
+
+ case EDONKEY_SEARCH_META:
+ /* <Search> ::= <String> <Meta tag Name> */
+ string_offset = offset + search_length;
+ string_length = tvb_get_letohs(tvb, offset+1);
+ search_length += 2+string_length;
+
+ tag_name_offset = offset + search_length;
+ tag_name_size = tvb_get_letohs(tvb, tag_name_offset);
+ special_tagtype = tvb_get_guint8(tvb, tag_name_offset+2);
+ search_length += 2 + tag_name_size;
+
+ /* Add subtree for search entry */
+ proto_item_set_len(ti, search_length);
+ search_tree = proto_item_add_subtree(ti, ett_edonkey_search);
+
+ /* Add query info */
+ proto_tree_add_uint(search_tree, hf_edonkey_string_length, tvb, string_offset, 2, string_length);
+ proto_tree_add_item(search_tree, hf_edonkey_string, tvb, string_offset+2, string_length, ENC_ASCII);
+ proto_tree_add_uint(search_tree, hf_edonkey_metatag_namesize, tvb, tag_name_offset, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(search_tree, tvb, tag_name_offset+2, tag_name_size, special_tagtype);
+ offset += search_length;
+ break;
+
+ case EDONKEY_SEARCH_LIMIT:
+ /* <Search> ::= <Limit (guint32)> <Minmax> <Meta tag Name> */
+ search_length += 5; /* 4 bytes for the limit, one for the minmax */
+
+ tag_name_offset = offset + search_length;
+ tag_name_size = tvb_get_letohs(tvb, tag_name_offset);
+ special_tagtype = tvb_get_guint8(tvb, tag_name_offset+2);
+ search_length += 2 + tag_name_size;
+
+ /* Add subtree for search entry */
+ proto_item_set_len(ti, search_length);
+ search_tree = proto_item_add_subtree(ti, ett_edonkey_search);
+
+ /* Add query info */
+ proto_tree_add_item(search_tree, hf_edonkey_search_limit, tvb, offset+1, 4, ENC_LITTLE_ENDIAN);
+ proto_tree_add_item(search_tree, hf_edonkey_search_limit_type, tvb, offset+5, 1, ENC_LITTLE_ENDIAN);
+ proto_tree_add_uint(search_tree, hf_edonkey_metatag_namesize, tvb, tag_name_offset, 2, tag_name_size);
+ edonkey_tree_add_metatag_name(search_tree, tvb, tag_name_offset+2, tag_name_size, special_tagtype);
+ offset += search_length;
+ break;
+
+ default:
+ /* Unknown search type - actual search length is also unknown */
+ proto_item_set_len(ti, search_length);
+ offset += search_length;
+ break;
+ }
+
+ return offset;
+}
+
+static void dissect_edonkey_tcp_message(guint8 msg_type,
+ tvbuff_t *tvb, packet_info *pinfo,
+ int offset, int length, proto_tree *tree)
+{
+ int msg_end, bytes_remaining;
+ guint8 helloClient;
+
+ bytes_remaining = tvb_reported_length_remaining(tvb, offset);
+ if ((length < 0) || (length > bytes_remaining)) length = bytes_remaining;
+ if (length <= 0) return;
+
+ msg_end = offset + length;
+
+ switch (msg_type) {
+ case EDONKEY_MSG_HELLO:
+ /* Client to Server: <Client Info> */
+ /* Client to Client: 0x10 <Client Info> <Server address> */
+ /* If Hello is sent to server 0x10 before UserHash is skipped,
+ but UserHash might starts with 0x10. To decrease posibility
+ of mistake, we check also 6th and 15h byte of UserHash -
+ they have constant value. The best way would be to process
+ whole packet to check it. */
+ helloClient = (tvb_get_guint8(tvb, offset) == 0x10 && tvb_get_guint8(tvb, offset + 6) == 0x0E && tvb_get_guint8(tvb, offset + 15) == 0x6F);
+ if (helloClient) {
+ proto_tree_add_uint(tree, hf_edonkey_user_hash_length, tvb, offset, 1, 16);
+ offset += 1;
+ }
+ offset = dissect_edonkey_client_info(tvb, pinfo, offset, tree);
+ if (helloClient) /* User's server ip is sent only to clients. */
+ offset = dissect_edonkey_address(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_HELLO_ANSWER: /* Hello Answer: <Client Info> <Server address> */
+ offset = dissect_edonkey_client_info(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_address(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_SERVER_CB_REQ: /* Server Callback Request: <Client address> */
+ offset = dissect_edonkey_address(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_SERVER_INFO_DATA: /* Server Info Data: <Server Info> */
+ offset = dissect_edonkey_server_info(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_SERVER_LIST: /* Server List: <Address List> */
+ offset = dissect_edonkey_address_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_OFFER_FILES: /* Offer Files: <File info List> */
+ case EDONKEY_MSG_VIEW_FILES_ANSWER: /* View Files Answer: <File info list> */
+ offset = dissect_edonkey_file_info_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_SEARCH_FILE_RESULTS: /* Search File Results: <File Info list> <More> */
+ offset = dissect_edonkey_file_info_list(tvb, pinfo, offset, tree);
+ proto_tree_add_item(tree, hf_edonkey_more_search_file_results, tvb, offset, 1, ENC_NA);
+ break;
+
+ case EDONKEY_MSG_SEARCH_FILES: /* Search File: <Search query> */
+ case EDONKEY_MSG_SEARCH_USER: /* Search User: <Search query> */
+ offset = dissect_edonkey_search_query(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_GET_SOURCES: /* Get Sources: <File Hash> <Size> <Size 64> */
+ case EDONKEY_MSG_GET_SOURCES_OBFU: /* Get Sources: <File Hash> <Size> <Size 64> */
+ {
+ guint32 fileSize;
+ proto_item* ti;
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ fileSize = tvb_get_letohl(tvb, offset);
+ ti = proto_tree_add_uint(tree, hf_edonkey_file_size, tvb, offset, 4, fileSize);
+ offset += 4;
+ /* if fileSize = 0 then 64bit file size comes next */
+ if (fileSize == 0) {
+ proto_item_append_text(ti, " (64bit file size used)");
+ proto_tree_add_item(tree, hf_edonkey_large_file_size, tvb, offset, 8, ENC_LITTLE_ENDIAN);
+ }
+ }
+ break;
+
+ case EDONKEY_MSG_NO_SUCH_FILE: /* No Such File: <File Hash> */
+ case EDONKEY_MSG_END_OF_DOWNLOAD: /* End of Download: <File Hash> */
+ case EDONKEY_MSG_FILE_STATUS_REQUEST: /* File Status Request: <File Hash> */
+ case EDONKEY_MSG_HASHSET_REQUEST: /* Hashset Request: <File Hash> */
+ case EDONKEY_MSG_SLOT_REQUEST: /* Slot Request: <File Hash> */
+ case EDONKEY_MSG_FILE_REQUEST: /* File Request: <File Hash> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_FOUND_SOURCES_OBFU: /* Found Sources: <File Hash> <SourceOBFU List> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_emule_sourceOBFU_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_FOUND_SOURCES: /* Found Sources: <File Hash> <Address List> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_address_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_CLIENT_CB_REQ: /* Client Callback Request: <Client ID> */
+ case EDONKEY_MSG_CALLBACK_FAIL: /* Callback Fail: <Client ID> */
+ case EDONKEY_MSG_ID_CHANGE: /* ID Change: <Client ID> */
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, tree, FALSE);
+ break;
+
+ case EDONKEY_MSG_NEW_CLIENT_ID: /* New Client ID: <Client ID> <Client ID> */
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, tree, FALSE);
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, tree, FALSE);
+ break;
+
+ case EDONKEY_MSG_SERVER_MESSAGE: /* Server Message: <String> */
+ case EDONKEY_MSG_CLIENT_MESSAGE: /* Client Message: <String> */
+ offset = dissect_edonkey_string(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_SERVER_STATUS: /* Server Status: <Nusers> <Nfiles> */
+ proto_tree_add_item(tree, hf_edonkey_number_of_users, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ proto_tree_add_item(tree, hf_edonkey_number_of_files, tvb, offset+4, 4, ENC_LITTLE_ENDIAN);
+ break;
+
+ case EDONKEY_MSG_FILE_STATUS: /* File Status: <File hash> <Part Count> <Part Status>? */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_file_status(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_FILE_REQUEST_ANSWER: /* File Request Answer: <File hash> <File name> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_file_name(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_REQUEST_PARTS: /* Request Parts: <File hash> <Start offset>(3) <End offset>(3) */
+ {
+ int pairs, count;
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ pairs = (msg_end - offset) / 8;
+
+ for (count=0; count < pairs; count++)
+ {
+ offset = dissect_edonkey_start_offset(tvb, pinfo, offset, tree);
+ }
+ for (count=0; count < pairs; count++)
+ {
+ offset = dissect_edonkey_end_offset(tvb, pinfo, offset, tree);
+ }
+ }
+ break;
+
+ case EDONKEY_MSG_SENDING_PART: /* Sending Part: <File hash> <Start offset> <End offset> DATA */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_start_offset(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_end_offset(tvb, pinfo, offset, tree);
+ if (msg_end > offset) {
+ bytes_remaining = msg_end - offset;
+ proto_tree_add_item(tree, hf_edonkey_message_data, tvb, offset, bytes_remaining, ENC_NA);
+ }
+ break;
+
+
+ case EDONKEY_MSG_SEARCH_USER_RESULTS: /* Search User Results: <Client info list> */
+ offset = dissect_edonkey_client_info_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_GET_SHARED_FILES: /* Get Shared Files: <Directory> */
+ offset = dissect_edonkey_directory(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_SHARED_DIRS: /* Shared Dirs: <Directory List> */
+ offset = dissect_edonkey_directory_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_SHARED_FILES: /* Shared Files: <Directory> <File info list> */
+ offset = dissect_edonkey_directory(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_file_info_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_HASHSET_ANSWER: /* Hashset Answer: <Hash List> */
+ offset = dissect_edonkey_hash_list(tvb, pinfo, offset, tree);
+ break;
+
+ default:
+ proto_tree_add_item(tree, hf_edonkey_message_data, tvb, offset, length, ENC_NA);
+ break;
+ }
+
+ if (offset < msg_end) {
+ int extra_bytes = msg_end - offset;
+ /* trailing garbage or broken packet */
+ proto_tree_add_uint_format(tree, hf_edonkey_unparsed_data_length, tvb, offset, extra_bytes, extra_bytes,
+ "Trailing/Undecoded data: %d bytes", extra_bytes );
+ }
+ return;
+}
+
+static void dissect_emule_tcp_message(guint8 msg_type,
+ tvbuff_t *tvb, packet_info *pinfo,
+ int offset, int length, proto_tree *tree)
+{
+ int msg_end, bytes_remaining;
+ guint16 partnum;
+
+ bytes_remaining = tvb_reported_length_remaining(tvb, offset);
+ if ((length < 0) || (length > bytes_remaining)) length = bytes_remaining;
+ if (length <= 0) return;
+
+ msg_end = offset + length;
+
+ switch (msg_type) {
+ case EMULE_MSG_HELLO: /* eMule Info: <eMule Version> <Meta tag list> */
+ case EMULE_MSG_HELLO_ANSWER: /* eMule Info Answer: <eMule Version> <Meta tag list> */
+ proto_tree_add_item(tree, hf_edonkey_emule_version, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ dissect_edonkey_metatag_list(tvb, pinfo, offset+2, tree);
+ break;
+
+ case EMULE_MSG_QUEUE_RANKING: /* eMule Queue Ranking: <eMule Rank (guint16)> */
+ proto_tree_add_item(tree, hf_edonkey_emule_queue_ranking, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case EMULE_MSG_SOURCES_REQUEST: /* Sources Request: <File Hash> */
+ dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ break;
+
+ case EMULE_MSG_SOURCES_ANSWER: /* Sources Answer: <File Hash> <Address List> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ dissect_emule_address_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EMULE_MSG_SEC_IDENT_STATE:
+ proto_tree_add_item(tree, hf_edonkey_emule_ident_state, tvb, offset, 1, ENC_NA);
+ offset++;
+ proto_tree_add_item(tree, hf_edonkey_emule_rndchallenge, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ break;
+
+ case EMULE_MSG_PUBLIC_KEY: /* Public Key: <1byte : len> <len bytes: pubkey> */
+ /* offset =*/ dissect_edonkey_public_key(tvb, pinfo, offset, tree);
+ /* offset = dissect_emule_publickey(tvb, pinfo, offset, tree); */
+ break;
+
+ case EMULE_MSG_SIGNATURE:
+ offset = dissect_edonkey_signature(tvb, pinfo, offset, tree);
+ if (msg_end != offset) {
+ proto_tree_add_item(tree, hf_edonkey_emule_sig_ip_used, tvb, offset, 1, ENC_NA);
+ }
+ break;
+
+
+ /* case EMULE_MSG_SIGNATURE: Public Key: <1byte : len> <len bytes: pubkey> */
+ /* offset = dissect_emule_publickey(tvb, pinfo, offset, tree); */
+ /* break; */
+
+ /* case EMULE_MSG_SECIDENTSTATE: Public Key: <1byte : len> <len bytes: pubkey> */
+ /* offset = dissect_emule_secstate(tvb, pinfo, offset, tree); */
+ /* offset = dissect_emule_challenge(tvb, pinfo, offset, tree); */
+ /* break; */
+
+ case EMULE_MSG_DATA_COMPRESSED: /* Data Compressed: <File Hash> <Start Offset> <Length (guint32)> <DATA> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_start_offset(tvb, pinfo, offset, tree);
+ proto_tree_add_item(tree, hf_edonkey_packed_length, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ offset += 4;
+ if (msg_end > offset) {
+ bytes_remaining = msg_end - offset;
+ proto_tree_add_item(tree, hf_edonkey_compressed_message_data, tvb, offset, bytes_remaining, ENC_NA);
+ }
+ break;
+
+ case EMULE_MSG_DATA_COMPRESSED_64: /* Data Compressed: <File Hash> <Start Offset (guint64)> <Length (guint32)> <DATA> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_start_offset_64(tvb, pinfo, offset, tree);
+ proto_tree_add_item(tree, hf_edonkey_packed_length, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ offset += 4;
+ if (msg_end > offset) {
+ bytes_remaining = msg_end - offset;
+ proto_tree_add_item(tree, hf_edonkey_compressed_message_data, tvb, offset, bytes_remaining, ENC_NA);
+ }
+ break;
+
+ case EMULE_MSG_REQUEST_PARTS_64: /* Request Parts: <File hash> <Start offset>(3) <End offset>(3) */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_start_offset_64(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_start_offset_64(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_start_offset_64(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_end_offset_64(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_end_offset_64(tvb, pinfo, offset, tree);
+ dissect_edonkey_end_offset_64(tvb, pinfo, offset, tree);
+ break;
+
+ case EMULE_MSG_SENDING_PART_64: /* Sending Part: <File hash> <Start offset> <End offset> DATA */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_start_offset_64(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_end_offset_64(tvb, pinfo, offset, tree);
+ if (msg_end > offset) {
+ bytes_remaining = msg_end - offset;
+ proto_tree_add_item(tree, hf_edonkey_message_data, tvb, offset, bytes_remaining, ENC_NA);
+ }
+ break;
+
+ case EMULE_MSG_CALLBACK: /* Callback: < hash ><hash> <uint16> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ /*offset = */dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ /* offset = dissect_edonkey_generic_uint16(tvb, pinfo, offset, tree, "uint16" ); */
+ break;
+
+ case EMULE_MSG_AICH_REQUEST: /* AICH Request: <File Hash> <PartNum> <AICH Hash> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ partnum = tvb_get_letohs(tvb, offset);
+ proto_tree_add_uint(tree, hf_emule_aich_partnum, tvb, offset, 2, partnum);
+ offset += 2;
+ dissect_emule_aich_root_hash(tvb, pinfo, offset, tree);
+ break;
+
+ case EMULE_MSG_AICH_ANSWER: /* AICH Answer: <File Hash> <PartNum> <AICH Hash> <AICH Hash List> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ partnum = tvb_get_letohs(tvb, offset);
+ proto_tree_add_uint(tree, hf_emule_aich_partnum, tvb, offset, 2, partnum);
+ offset += 2;
+ offset = dissect_emule_aich_root_hash(tvb, pinfo, offset, tree);
+ dissect_emule_aich_hash_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EMULE_MSG_MULTIPACKET: /* MultiPacket: <Hash> <Opcodes> */
+ case EMULE_MSG_MULTIPACKET_ANSWER:
+ case EMULE_MSG_MULTIPACKET_EXT: /* MultiPacketExt: <Hash> <FileLength> <Opcodes> */
+ dissect_emule_multipacket(tvb, pinfo, offset, offset+length, tree, msg_type==EMULE_MSG_MULTIPACKET_EXT);
+ break;
+
+ default:
+ dissect_edonkey_tcp_message(msg_type, tvb, pinfo, offset, length, tree);
+ break;
+ }
+ return;
+}
+
+static int dissect_edonkey_udp_message(guint8 msg_type,
+ tvbuff_t *tvb, packet_info *pinfo,
+ int offset, int length, proto_tree *tree)
+{
+ int msg_end, bytes_remaining;
+ guint16 ischal;
+
+ bytes_remaining = tvb_reported_length_remaining(tvb, offset);
+ if ((length < 0) || (length > bytes_remaining)) length = bytes_remaining;
+ if (length <= 0) return offset;
+
+ msg_end = offset + length;
+
+ switch (msg_type) {
+ /* EDonkey UDP Messages */
+ case EDONKEY_MSG_UDP_CALLBACK_REQUEST: /* Callback Request: <Address> <Client ID> */
+ offset = dissect_edonkey_address(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, tree, FALSE);
+ break;
+
+ case EDONKEY_MSG_UDP_CALLBACK_FAIL: /* Callback Fail: <Client ID> */
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, tree, FALSE);
+ break;
+
+ case EDONKEY_MSG_UDP_GET_SERVER_INFO: /* Get Server Info: <Challenge> */
+ if (length>=2) {
+ ischal = tvb_get_letohs(tvb, offset);
+ if (ischal==0xf0ff) {
+ proto_tree_add_item(tree, hf_edonkey_challenge, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ offset += 4;
+ }
+ }
+ break;
+
+ case EDONKEY_MSG_UDP_SERVER_INFO: /* Server Info: <String> <String>*/
+ ischal = tvb_get_letohs(tvb, offset);
+ if (ischal==0xf0ff) {
+ proto_tree_add_item(tree, hf_edonkey_challenge, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ offset = dissect_edonkey_metatag_list(tvb, pinfo, offset+4, tree);
+ } else {
+ offset = dissect_edonkey_string(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_string(tvb, pinfo, offset, tree);
+ }
+ break;
+
+ case EDONKEY_MSG_UDP_SERVER_LIST: /* Server List: <Address List> */
+ offset = dissect_edonkey_address_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_UDP_SEARCH_FILE_RESULTS: /* Search File Result: <File Info> */
+ offset = dissect_edonkey_file_info(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_UDP_SEARCH_FILE: /* Search File: <Search query> */
+ offset = dissect_edonkey_search_query(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_UDP_GET_SOURCES: /* Get Sources: <File Hash> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_UDP_FOUND_SOURCES: /* Found Sources: <File Hash> <Address List> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_address_list(tvb, pinfo, offset, tree);
+ break;
+
+ case EDONKEY_MSG_UDP_SERVER_STATUS_REQUEST: /* Server Status Request: <guint32> */
+ proto_tree_add_item(tree, hf_edonkey_challenge, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ offset += 4;
+ break;
+
+ case EDONKEY_MSG_UDP_SERVER_STATUS: /* Server Status: <guint32> <Nusers> <Nfiles> <Nusersmax> */
+ proto_tree_add_item(tree, hf_edonkey_challenge, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ offset += 4;
+ proto_tree_add_item(tree, hf_edonkey_number_of_users, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ proto_tree_add_item(tree, hf_edonkey_number_of_files, tvb, offset+4, 4, ENC_LITTLE_ENDIAN);
+ offset += 8;
+ if (offset < msg_end) {
+ proto_tree_add_item(tree, hf_edonkey_max_number_of_users, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ offset += 4;
+ }
+ break;
+
+ /* Overnet UDP Messages */
+ case OVERNET_MSG_UDP_CONNECT: /* Connect: <Peer (sender) > */
+ case OVERNET_MSG_UDP_PUBLICIZE: /* Publicize: <Peer (sender) > */
+ offset = dissect_overnet_peer(tvb, pinfo, offset, tree);
+ break;
+
+ case OVERNET_MSG_UDP_CONNECT_REPLY: /* Connect Reply: <guint16 Peer List> */
+ offset = dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "Overnet Peer", dissect_overnet_peer);
+ break;
+
+ case OVERNET_MSG_UDP_SEARCH: /* Search: <search type (guint8)> <Hash> */
+ proto_tree_add_item(tree, hf_edonkey_search_type, tvb, offset, 1, ENC_NA);
+ offset = dissect_edonkey_hash(tvb, pinfo, offset+1, tree);
+ break;
+
+ case OVERNET_MSG_UDP_SEARCH_INFO:
+ /* Search Info: <Hash> <search type (guint8)> <min (guint16)> <max (guint16)>*/
+ offset = dissect_edonkey_hash(tvb, pinfo, offset, tree);
+ proto_tree_add_item(tree, hf_edonkey_search_type, tvb, offset, 1, ENC_NA);
+ proto_tree_add_item(tree, hf_edonkey_search_range_min, tvb, offset+1, 2, ENC_LITTLE_ENDIAN);
+ proto_tree_add_item(tree, hf_edonkey_search_range_max, tvb, offset+3, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case OVERNET_MSG_UDP_SEARCH_NEXT: /* Search Next: <Hash> <guint8 Peer List> */
+ offset = dissect_edonkey_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_list(tvb, pinfo, offset, tree, 1, "Overnet Peer", dissect_overnet_peer);
+ break;
+
+ case OVERNET_MSG_UDP_SEARCH_RESULT: /* Search Result: <Hash> <Hash> <Meta tag List> */
+ case OVERNET_MSG_UDP_PUBLISH: /* Publish: <Hash> <Hash> <Meta tag List> */
+ offset = dissect_edonkey_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_metatag_list(tvb, pinfo, offset, tree);
+ break;
+
+ case OVERNET_MSG_UDP_SEARCH_END: /* Search End: <Hash> */
+ offset = dissect_edonkey_hash(tvb, pinfo, offset, tree);
+ break;
+
+ case OVERNET_MSG_UDP_PUBLISH_ACK: /* Publish ACK: <File Hash> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ break;
+
+ case OVERNET_MSG_UDP_IP_QUERY: /* IP Query: <TCP Port> */
+ proto_tree_add_item(tree, hf_edonkey_port, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case OVERNET_MSG_UDP_IP_QUERY_ANSWER: /* IP Query Answer: <IP> */
+ offset = dissect_edonkey_client_id(tvb, pinfo, offset, tree, FALSE);
+ break;
+
+ case OVERNET_MSG_UDP_IDENTIFY_REPLY: /* Identify Reply: <Contact (sender)> */
+ /* <Contact> ::= <Hash> <Address> */
+ offset = dissect_edonkey_hash(tvb, pinfo, offset, tree);
+ offset = dissect_edonkey_address(tvb, pinfo, offset, tree);
+ break;
+
+ case OVERNET_MSG_UDP_IDENTIFY_ACK: /* Identify Reply: <TCP Port (sender)> */
+ proto_tree_add_item(tree, hf_edonkey_port, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case OVERNET_MSG_UDP_FIREWALL_CONNECTION: /* Firewall Connnection Ack: <Hash> <TCP Port> */
+ offset = dissect_edonkey_client_hash(tvb, pinfo, offset, tree);
+ proto_tree_add_item(tree, hf_edonkey_port, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ break;
+
+ case OVERNET_MSG_UDP_FIREWALL_CONNECTION_ACK: /* Firewall Connnection Ack: <Hash> */
+ case OVERNET_MSG_UDP_FIREWALL_CONNECTION_NACK: /* Firewall Connnection NAck: <Hash> */
+ offset = dissect_edonkey_client_hash(tvb, pinfo, offset, tree);
+ break;
+
+ default:
+ proto_tree_add_item(tree, hf_edonkey_message_data, tvb, offset, length, ENC_NA);
+ offset+=length;
+ break;
+ }
+
+ return offset;
+}
+
+static int dissect_emule_udp_message(guint8 msg_type,
+ tvbuff_t *tvb, packet_info *pinfo,
+ int offset, int length, proto_tree *tree)
+{
+ int msg_end, bytes_remaining;
+
+ bytes_remaining = tvb_reported_length_remaining(tvb, offset);
+ if ((length < 0) || (length > bytes_remaining)) length = bytes_remaining;
+ if (length <= 0) return offset;
+
+ msg_end = offset + length;
+
+ switch (msg_type) {
+ case EMULE_MSG_UDP_REASKFILEPING: /* Reask File Ping: <File Hash> */
+ offset = dissect_edonkey_file_hash(tvb, pinfo, offset, tree);
+ if ( offset + 2 < msg_end ) {
+ /* Udp version > 3 */
+ offset = dissect_edonkey_file_status( tvb, pinfo, offset, tree );
+ }
+
+ if ( msg_end == offset + 2 ) {
+ /* Udp version > 2 */
+ proto_tree_add_item( tree, hf_emule_source_count, tvb, offset, 2, ENC_LITTLE_ENDIAN );
+ offset += 2;
+ }
+ break;
+
+ case EMULE_MSG_UDP_REASKACK: /* Reask ACK: <eMule Rank> */
+ if ( offset + 2 < msg_end ) {
+ /* Udp version > 3 */
+ offset = dissect_edonkey_file_status( tvb, pinfo, offset, tree );
+ }
+
+ proto_tree_add_item(tree, hf_edonkey_emule_queue_ranking, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ offset += 2;
+ break;
+
+ default:
+ offset = dissect_edonkey_udp_message(msg_type, tvb, pinfo, offset, length,tree);
+ break;
+ }
+ return offset;
+}
+
+static int dissect_kademlia_peer_list_2byte(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "Peer", dissect_kademlia_peer );
+}
+
+
+static int dissect_kademlia_peer_list_1byte(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 1, "Peer", dissect_kademlia_peer );
+}
+
+static int dissect_kademlia2_peer_list_2byte(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "Peer", dissect_kademlia2_peer );
+}
+
+static int dissect_kademlia2_peer_list_1byte(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 1, "Peer", dissect_kademlia2_peer );
+}
+
+static int dissect_kademlia_tag(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ guint8 type;
+ guint8 tag_type;
+ const gchar *str_type;
+ proto_item *ti;
+ proto_item* tag_node;
+ proto_tree *subtree;
+ int item_start_offset;
+ proto_item * ti_tagtype;
+
+ item_start_offset = offset;
+ /* tag_node length is adjusted at the end of this function */
+ subtree = proto_tree_add_subtree( tree, tvb, offset, 1, ett_kademlia_tag, &tag_node, "Tag " );
+
+ type = tvb_get_guint8( tvb, offset );
+ str_type = val_to_str_const(type, kademlia_tag_types, "Unknown" );
+
+ ti_tagtype = proto_tree_add_item( subtree, hf_kademlia_tag_type, tvb, offset, 1, ENC_LITTLE_ENDIAN );
+ offset += 1;
+
+ {
+ const gchar *tagname_string;
+ const gchar *tagname_extended_string;
+
+ /* Read tagname */
+ tag_type = tvb_get_guint8( tvb, offset+2 );
+ offset = dissect_kademlia_tagname( tvb, pinfo, offset, subtree, &tagname_string, &tagname_extended_string );
+ if ( strlen( tagname_string ) == 1 ) {
+ const guint8 tagname_guint = *(const guint8*)tagname_string;
+
+ proto_item_append_text( tag_node, " 0x%02X [%s] = ", tagname_guint, tagname_extended_string );
+ }
+ else
+ proto_item_append_text( tag_node, " \"%s\" [%s] = ", tagname_string, tagname_extended_string );
+ }
+
+ /* Switch on type */
+ switch( type )
+ {
+ case KADEMLIA_TAGTYPE_HASH:
+ proto_item_append_text( tag_node, "%s", tvb_bytes_to_str(wmem_packet_scope(), tvb, offset, 16 ));
+ offset = dissect_kademlia_tag_hash( tvb, pinfo, offset, subtree );
+ break;
+ case KADEMLIA_TAGTYPE_STRING:
+ {
+ const guint8* value;
+ offset = dissect_kademlia_tag_string( tvb, pinfo, offset, subtree, &value );
+
+ proto_item_append_text( tag_node, "\"%s\"", value );
+ }
+ break;
+ case KADEMLIA_TAGTYPE_UINT8:
+ {
+ guint8 value;
+ ti = proto_tree_add_item( subtree, hf_kademlia_tag_uint8, tvb, offset, 1, ENC_LITTLE_ENDIAN);
+
+ value = tvb_get_guint8( tvb, offset );
+ proto_item_append_text( tag_node, "%u (0x%02X)", value, value );
+ switch (tag_type) {
+ case KADEMLIA_TAG_SOURCETYPE:
+ {
+ proto_item_append_text(ti," (%s)", val_to_str_const(value, kademlia_tag_sourcetype, "Unknown"));
+ }
+ break;
+ case KADEMLIA_TAG_ENCRYPTION:
+ proto_item_append_text(ti, " (%s)", val_to_str_const(value, kademlia_tag_encryption, "Unknown"));
+ break;
+ }
+ offset += 1;
+ }
+ break;
+ case KADEMLIA_TAGTYPE_UINT16:
+ {
+ guint16 value;
+ proto_tree_add_item( subtree, hf_kademlia_tag_uint16, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+
+ value = tvb_get_letohs( tvb, offset );
+ proto_item_append_text( tag_node, "%u (0x%04X)", value, value );
+
+ offset += 2;
+ }
+ break;
+ case KADEMLIA_TAGTYPE_UINT64:
+ {
+ guint64 value;
+ proto_tree_add_item( subtree, hf_kademlia_tag_uint64, tvb, offset, 8, ENC_LITTLE_ENDIAN);
+
+ value = tvb_get_letoh64( tvb, offset );
+ proto_item_append_text( tag_node, "%" PRIu64 " (0x%08" PRIX64 ")", value, value );
+
+ offset += 8;
+ }
+ break;
+ case KADEMLIA_TAGTYPE_UINT32:
+ {
+ guint32 value;
+ /* show ip as dotted decimal */
+ switch( tag_type) {
+ case KADEMLIA_TAG_SERVERIP:
+ case KADEMLIA_TAG_SOURCEIP:
+ {
+ int ipa = 0, ipb = 0, ipc = 0, ipd = 0;
+ proto_tree_add_item( subtree, hf_kademlia_tag_ipv4, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ value = tvb_get_letohl( tvb, offset );
+ ipa = (value / (256*256*256)) % 256;
+ ipb = (value / (256*256)) % 256;
+ ipc = (value / 256) % 256;
+ ipd = value % 256;
+ proto_item_append_text( tag_node, "%u.%u.%u.%u (0x%02X) ", ipa, ipb, ipc, ipd, value );
+ }
+ break;
+ default:
+ proto_tree_add_item( subtree, hf_kademlia_tag_uint32, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+ value = tvb_get_letohl( tvb, offset );
+ proto_item_append_text( tag_node, "%u (0x%02X) ", value, value );
+ }
+
+ offset += 4;
+ }
+ break;
+ case KADEMLIA_TAGTYPE_FLOAT32:
+ {
+ float value;
+ proto_tree_add_item( subtree, hf_kademlia_tag_float, tvb, offset, 4, ENC_LITTLE_ENDIAN);
+
+ value = tvb_get_letohieee_float( tvb, offset );
+ proto_item_append_text( tag_node, "%f", value );
+
+ offset += 4;
+ }
+ break;
+ case KADEMLIA_TAGTYPE_BSOB:
+ {
+ const gchar* value;
+ offset = dissect_kademlia_tag_bsob( tvb, pinfo, offset, subtree, &value );
+ proto_item_append_text( tag_node, "%s", value );
+ }
+ break;
+ default:
+ expert_add_info_format(pinfo, ti_tagtype, &ei_kademlia_tag_type, "Tag value not decoded for type: 0x%02X", type );
+ }
+
+ proto_item_append_text( tag_node, " (Type: %s)", str_type );
+
+ proto_item_set_len( tag_node, offset - item_start_offset );
+
+ return offset;
+}
+
+static int dissect_kademlia_taglist(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ return dissect_edonkey_list(tvb, pinfo, offset, tree, 1, "Tag", dissect_kademlia_tag );
+}
+
+
+static int dissect_kademlia_publish_req_entry_file(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* Get the hash */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_file_id);
+ /* Read all the kad tags */
+ return dissect_kademlia_taglist( tvb, pinfo, offset, tree );
+}
+
+static int dissect_kademlia_publish_req_entry_peer(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* Get the hash */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_peer_id);
+ /* Read all the kad tags */
+ return dissect_kademlia_taglist( tvb, pinfo, offset, tree );
+}
+
+
+static int dissect_kademlia_search_result(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ /* Get the hash */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_hash);
+ /* Read all the kad tags */
+ return dissect_kademlia_taglist( tvb, pinfo, offset, tree );
+}
+
+static int dissect_kademlia_search_expression_tree(tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ int op, item_start_offset;
+ proto_item* ti;
+
+ item_start_offset = offset;
+ op = tvb_get_guint8(tvb, offset);
+ ti = proto_tree_add_uint(tree, hf_kademlia_search_expression_type, tvb, offset, 1, op);
+ tree = proto_item_add_subtree( ti, ett_kademlia_search_expression );
+ ++offset;
+ switch( op ) {
+ case 0: /* Bool op */
+ proto_tree_add_item(tree, hf_kademlia_search_bool_op, tvb, offset, 1, ENC_NA );
+ ++offset;
+
+ /* Left */
+ offset = dissect_kademlia_search_expression_tree( tvb, pinfo, offset, tree );
+ /* Right */
+ offset = dissect_kademlia_search_expression_tree( tvb, pinfo, offset, tree );
+ break;
+
+ case 1: /* String */
+ offset = dissect_kademlia_string( tvb, pinfo, offset, tree );
+ break;
+ case 2: /* Meta Tag */
+ /* tag value */
+ offset = dissect_edonkey_string( tvb, pinfo, offset, tree );
+ /* tag name */
+ offset = dissect_kademlia_tagname( tvb, pinfo, offset, tree, NULL, NULL );
+ break;
+ case 3: /* Min/Max - 32bit! */
+ offset = dissect_kademlia_search_condition_argument_uint32( tvb, pinfo, offset, tree );
+ offset = dissect_kademlia_search_condition( tvb, pinfo, offset, tree );
+ /* tag name */
+ offset = dissect_kademlia_tagname( tvb, pinfo, offset, tree, NULL, NULL );
+ break;
+ case 8: /* Min/Max - 64bit! */
+ offset = dissect_kademlia_search_condition_argument_uint64( tvb, pinfo, offset, tree );
+ offset = dissect_kademlia_search_condition( tvb, pinfo, offset, tree );
+ /* tag name */
+ offset = dissect_kademlia_tagname( tvb, pinfo, offset, tree, NULL, NULL );
+ break;
+ default:
+ expert_add_info_format(pinfo, ti, &ei_kademlia_search_expression_type, "NOT DECODED op %x", op );
+ }
+ proto_item_set_len( ti, offset - item_start_offset );
+ return offset;
+}
+
+static int dissect_kademlia2_prolog( tvbuff_t *tvb, packet_info *pinfo,
+ int offset, proto_tree *tree)
+{
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_peer_id);
+ offset = dissect_kademlia_tcp_port(tvb, pinfo, offset, tree);
+
+ proto_tree_add_item(tree, hf_kademlia_version, tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+
+ return offset;
+}
+
+static int dissect_kademlia_uload( tvbuff_t *tvb, packet_info *pinfo _U_,
+ int offset, proto_tree *tree)
+{
+ proto_tree_add_item(tree, hf_edonkey_kademlia_uload, tvb, offset, 1, ENC_NA);
+ return offset +1;
+
+}
+static int dissect_kademlia_udp_message(guint8 msg_type,
+ tvbuff_t *tvb, packet_info *pinfo,
+ int offset, int length, proto_tree *tree)
+{
+ int msg_end, bytes_remaining;
+ proto_item *hidden_item;
+
+ bytes_remaining = tvb_reported_length_remaining(tvb, offset);
+ if ((length < 0) || (length > bytes_remaining)) length = bytes_remaining;
+ if (length <= 0) return offset;
+
+ hidden_item = proto_tree_add_item(tree, hf_kademlia, tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_item_set_hidden(hidden_item);
+
+ msg_end = offset + length;
+
+ switch (msg_type) {
+ case KADEMLIA_BOOTSTRAP_REQ:/* <PEER [25]> */
+ case KADEMLIA_HELLO_REQ:
+ case KADEMLIA_HELLO_RES:
+ offset = dissect_kademlia_peer(tvb, pinfo, offset, tree);
+ break;
+ case KADEMLIA2_BOOTSTRAP_REQ:
+ offset = dissect_kademlia2_prolog( tvb, pinfo, offset, tree );
+ break;
+
+ case KADEMLIA2_HELLO_REQ:
+ case KADEMLIA2_HELLO_RES:
+ offset = dissect_kademlia2_prolog( tvb, pinfo, offset, tree );
+ offset = dissect_kademlia_taglist( tvb, pinfo, offset, tree );
+ break;
+ case KADEMLIA_BOOTSTRAP_RES: /* <CNT [2]> <PEER [25]>*(CNT) */
+ offset = dissect_kademlia_peer_list_2byte( tvb, pinfo, offset, tree );
+ break;
+ case KADEMLIA2_BOOTSTRAP_RES:
+ offset = dissect_kademlia2_prolog( tvb, pinfo, offset, tree );
+ offset = dissect_kademlia2_peer_list_2byte( tvb, pinfo, offset, tree );
+ break;
+
+ case KADEMLIA2_SEARCH_SOURCE_REQ:
+ {
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ /* start pos */
+ proto_tree_add_item(tree, hf_edonkey_kademlia_start_position, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ offset +=2;
+ /* filesize */
+ proto_tree_add_item(tree, hf_edonkey_kademlia_filesize, tvb, offset, 8, ENC_LITTLE_ENDIAN);
+ offset +=8;
+ }
+ break;
+
+ case KADEMLIA_SEARCH_NOTES_REQ: /* <HASH (key) [16]> */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_hash);
+ break;
+
+ case KADEMLIA2_SEARCH_KEY_REQ:
+ {
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ /* start pos */
+ proto_tree_add_item(tree, hf_edonkey_kademlia_start_position, tvb, offset, 2, ENC_LITTLE_ENDIAN);
+ offset += 2;
+ }
+ break;
+ case KADEMLIA2_SEARCH_NOTES_REQ:
+
+ case KADEMLIA_PUBLISH_RES:
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ if (offset<msg_end) {
+ offset = dissect_kademlia_uload( tvb, pinfo, offset, tree );
+ }
+ break;
+ case KADEMLIA2_PUBLISH_RES:
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ offset = dissect_kademlia_uload( tvb, pinfo, offset, tree );
+ break;
+
+ case KADEMLIA_REQ: /* <TYPE [1]> <HASH (target) [16]> <HASH (receiver) 16> */
+ case KADEMLIA2_REQ:
+ {
+ int type;
+ guint8 target_id[16];
+ guint8 recipients_id[16];
+ proto_item *ti;
+ int i, j, k, l;
+ char binarray[129];
+
+ type = tvb_get_guint8(tvb, offset);
+ ti = proto_tree_add_uint_format_value(tree, hf_kademlia_request_type, tvb, offset, 1, type, "0x%02x", type );
+ proto_item_append_text(ti, "%s", val_to_str_const(type, kademlia_parameter, " Unknown"));
+ offset +=1;
+
+ /* get target id */
+ for (i=0; i<4; i++) {
+ for (j=3; j>=0; j--) {
+ l = (j+4*i);
+ target_id[l] = tvb_get_guint8(tvb, offset + abs(8*i-(l-3)));
+ }
+ }
+
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+
+ /* get recipient's id */
+ for (i=0; i<4; i++) {
+ for (j=3; j>=0; j--) {
+ l = (j+4*i);
+ recipients_id[l] = tvb_get_guint8(tvb, offset + abs(8*i-(l-3)));
+ }
+ }
+
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_recipients_id);
+
+ /* target_id XOR recipients_id */
+ for (i=0; i<16; i++) {
+ k = 128;
+ l = target_id[i]^recipients_id[i];
+ for(j=8*i; j<8*i+8; j++) {
+ if (l >= k) {
+ binarray[j] = '1';
+ l = l-k;
+ }
+ else
+ binarray[j] = '0';
+ k = k/2;
+ }
+ }
+ binarray[128] = '\0';
+ proto_tree_add_string(tree, hf_kademlia_distance, tvb, offset, 0, binarray);
+ }
+ break;
+
+ case KADEMLIA_RES: /* <HASH (target) [16]> <CNT> <PEER [25]>*(CNT) */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ offset = dissect_kademlia_peer_list_1byte( tvb, pinfo, offset, tree );
+ break;
+ case KADEMLIA2_RES:
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ offset = dissect_kademlia2_peer_list_1byte( tvb, pinfo, offset, tree );
+ break;
+
+ case KADEMLIA_FIREWALLED_RES: /* <IP (sender) [4]> */
+ offset = dissect_kademlia_ip_address( tvb, pinfo, offset, tree );
+ break;
+
+ case KADEMLIA_FIREWALLED_REQ: /* <TCPPORT (sender) [2]> */
+ offset = dissect_kademlia_tcp_port( tvb, pinfo, offset, tree );
+ break;
+ case KADEMLIA_CALLBACK_REQ:
+ case KADEMLIA_FINDBUDDY_REQ:
+ case KADEMLIA_FINDBUDDY_RES:
+ /* buddy id */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_hash);
+ /* userid */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_hash);
+ offset = dissect_kademlia_tcp_port( tvb, pinfo, offset, tree );
+ break;
+ case KADEMLIA2_PUBLISH_SOURCE_REQ:
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_file_id);
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_peer_id);
+ offset = dissect_kademlia_taglist( tvb, pinfo, offset, tree );
+ break;
+ case KADEMLIA_SEARCH_REQ:
+ {
+ int restrictive;
+ /* Target (16bytes) */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ /* Restrictive (1 byte) 0/1 */
+ restrictive = tvb_get_guint8(tvb, offset);
+ proto_tree_add_item(tree, hf_edonkey_kademlia_restrictive, tvb, offset, 1, ENC_NA);
+ offset +=1;
+
+ if ( offset < msg_end && restrictive )
+ offset = dissect_kademlia_search_expression_tree( tvb, pinfo, offset, tree );
+ }
+ break;
+ case KADEMLIA_SEARCH_RES:
+ /* Target */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ /* Results list */
+ offset = dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "Result", dissect_kademlia_search_result );
+ break;
+ case KADEMLIA2_SEARCH_RES:
+ /* Sender */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_sender_id);
+ /* Target */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_target_id);
+ /* Results list */
+ offset = dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "Result", dissect_kademlia_search_result );
+ break;
+ case KADEMLIA2_PUBLISH_KEY_REQ:
+ {
+ /* Keyword Hash */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_keyword_hash);
+ /* Results list */
+ offset = dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "StuffToPublish", dissect_kademlia_publish_req_entry_file );
+ break;
+ }
+ case KADEMLIA_PUBLISH_REQ: /* 0x40 // <HASH (key) [16]> <CNT1 [2]> (<HASH (target) [16]> <CNT2 [2]> <META>*(CNT2))*(CNT1) */
+ {
+ guint8 tagname_value=0, taglist_size, type;
+ int i=1, j=34;
+
+ /* check if TAG_SOURCETYPE is set */
+ taglist_size = tvb_get_guint8(tvb, offset + j);
+ j++;
+
+ while(i <= taglist_size) {
+ type = tvb_get_guint8(tvb, offset + j);
+ j +=3;
+ tagname_value = tvb_get_guint8(tvb, offset + j);
+ if (tagname_value == 0xff)
+ i = taglist_size;
+ j++;
+ switch(type) {
+ case KADEMLIA_TAGTYPE_HASH:
+ j += 16;
+ break;
+ case KADEMLIA_TAGTYPE_STRING:
+ {
+ guint16 string_length = tvb_get_letohs(tvb, offset+j);
+ j += 2 + string_length;
+ break;
+ }
+ case KADEMLIA_TAGTYPE_UINT8:
+ j += 1;
+ break;
+ case KADEMLIA_TAGTYPE_UINT16:
+ j += 2;
+ break;
+ case KADEMLIA_TAGTYPE_UINT32:
+ case KADEMLIA_TAGTYPE_FLOAT32:
+ j += 4;
+ break;
+ case KADEMLIA_TAGTYPE_UINT64:
+ j += 8;
+ break;
+ case KADEMLIA_TAGTYPE_BSOB:
+ {
+ guint16 bsob_length = tvb_get_guint8(tvb, offset);
+ j += 1 + bsob_length;
+ break;
+ }
+ }
+ i++;
+ }
+
+ switch (tagname_value) {
+ case KADEMLIA_TAG_SOURCETYPE:
+ {
+ /* Target */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_file_id);
+ /* Results list */
+ offset = dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "StuffToPublish", dissect_kademlia_publish_req_entry_peer);
+ }
+ break;
+ default:
+ {
+ /* Target */
+ offset = dissect_kademlia_hash(tvb, pinfo, offset, tree, &hf_kademlia_keyword_hash);
+ /* Results list */
+ offset = dissect_edonkey_list(tvb, pinfo, offset, tree, 2, "StuffToPublish", dissect_kademlia_publish_req_entry_file);
+ }
+ }
+ }
+ }
+
+ return offset;
+}
+
+static int dissect_kademlia_udp_compressed_message(guint8 msg_type,
+ tvbuff_t *tvb, packet_info *pinfo,
+ int offset, int length, proto_tree *tree)
+{
+ tvbuff_t *tvbraw = NULL;
+
+
+ tvbraw = tvb_child_uncompress(tvb, tvb, offset, length);
+
+ if (tvbraw) {
+ guint32 raw_length;
+
+ raw_length = tvb_captured_length( tvbraw );
+ add_new_data_source(pinfo, tvbraw, "Decompressed Data");
+
+ dissect_kademlia_udp_message( msg_type, tvbraw, pinfo, 0, raw_length, tree );
+ offset += length;
+ } else {
+ proto_tree_add_item(tree, hf_edonkey_broken_compressed_data, tvb, offset, length, ENC_NA);
+ }
+ return offset;
+}
+
+
+static guint get_edonkey_tcp_pdu_len(packet_info *pinfo _U_, tvbuff_t *tvb,
+ int offset, void *data _U_)
+{
+ guint32 msg_len;
+
+ /*
+ * Get the length of the eDonkey packet.
+ */
+ msg_len = tvb_get_letohl(tvb, offset+1);
+
+ /*
+ * That length doesn't include the header; add that in.
+ * XXX - what if it overflows?
+ */
+ return msg_len + EDONKEY_TCP_HEADER_LENGTH;
+}
+
+static int dissect_edonkey_tcp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
+{
+ proto_item *ti;
+ proto_tree *edonkey_tree, *edonkey_msg_tree = NULL, *emule_zlib_tree = NULL;
+ int offset;
+ guint8 protocol, msg_type;
+ guint32 msg_len;
+ const gchar *protocol_name, *message_name;
+ void (*dissector)(guint8, tvbuff_t*, packet_info*, int, int, proto_tree*);
+ tvbuff_t *tvbraw = NULL;
+
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "eDonkey");
+
+ ti = proto_tree_add_item(tree, proto_edonkey, tvb, 0, -1, ENC_NA);
+ edonkey_tree = proto_item_add_subtree(ti, ett_edonkey);
+
+ offset = 0;
+ protocol = tvb_get_guint8(tvb, offset);
+ msg_len = tvb_get_letohl(tvb, offset+1);
+
+ protocol_name = val_to_str_const(protocol, edonkey_protocols, "Unknown");
+
+ col_append_sep_fstr(pinfo->cinfo, COL_INFO, ", ", "%s TCP", protocol_name);
+
+ /* Add edonkey message tree */
+ if (edonkey_tree) {
+ ti = proto_tree_add_item(edonkey_tree, hf_edonkey_message, tvb,
+ offset, EDONKEY_TCP_HEADER_LENGTH + msg_len, ENC_NA);
+ edonkey_msg_tree = proto_item_add_subtree(ti, ett_edonkey_message);
+
+ proto_tree_add_uint(edonkey_msg_tree, hf_edonkey_protocol, tvb, offset, 1, protocol);
+ proto_tree_add_uint(edonkey_msg_tree, hf_edonkey_message_length, tvb, offset+1, 4, msg_len);
+ }
+
+
+ /* Skip past the EDONKEY Header */
+ offset += EDONKEY_TCP_HEADER_LENGTH;
+
+ msg_type = tvb_get_guint8(tvb, offset);
+ switch (protocol) {
+ case EDONKEY_PROTO_EDONKEY:
+ message_name = val_to_str_const(msg_type, edonkey_tcp_msgs, "Unknown");
+ dissector = dissect_edonkey_tcp_message;
+ break;
+
+ case EDONKEY_PROTO_EMULE_EXT:
+ message_name = val_to_str_const(msg_type, emule_tcp_msgs,
+ val_to_str_const(msg_type, edonkey_tcp_msgs, "Unknown"));
+ dissector = dissect_emule_tcp_message;
+ break;
+
+ case EDONKEY_PROTO_EMULE_COMP:
+ /*
+ * These ought to be exactly the same as standard eDonkey (0xe5) messages,
+ * except that the payload (after the type byte) is a zlib compressed
+ * stream.
+ */
+ message_name = val_to_str_const(msg_type, edonkey_tcp_msgs, "Unknown");
+ tvbraw = tvb_child_uncompress(tvb, tvb, offset+1, msg_len-1);
+ if (tvbraw) {
+ dissector = dissect_edonkey_tcp_message;
+ break;
+ }
+ /* FALL THROUGH */
+ default:
+ message_name = "Unknown";
+ dissector = NULL;
+ break;
+ }
+
+ col_append_fstr(pinfo->cinfo, COL_INFO, ": %s", message_name);
+
+ if (edonkey_msg_tree) {
+ proto_tree_add_uint_format_value(edonkey_msg_tree, hf_edonkey_message_type, tvb, offset, 1, msg_type,
+ "%s (0x%02x)", message_name, msg_type);
+ if (dissector && (msg_len > 1)) {
+ if (!tvbraw) {
+ (*dissector)(msg_type, tvb, pinfo, offset+1, msg_len-1, edonkey_msg_tree);
+ } else {
+ ti = proto_tree_add_item(edonkey_msg_tree, hf_emule_zlib, tvb,
+ offset+1, msg_len-1, ENC_NA);
+ emule_zlib_tree = proto_item_add_subtree(ti, ett_emule_zlib);
+ add_new_data_source(pinfo, tvbraw, "Decompressed Data");
+ (*dissector)(msg_type, tvbraw, pinfo, 0, tvb_captured_length(tvbraw), emule_zlib_tree);
+ }
+ }
+ }
+
+ return tvb_captured_length(tvb);
+}
+
+static int dissect_edonkey_tcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
+{
+ guint8 protocol;
+
+ /* An eDonkey TCP packet is at least 5 bytes long msg type + length */
+ if (!tvb_bytes_exist(tvb, 0, EDONKEY_TCP_HEADER_LENGTH))
+ return 0;
+
+ protocol = tvb_get_guint8(tvb, 0);
+ if (try_val_to_str(protocol, edonkey_protocols) == NULL)
+ return 0; /* Not a known protocol */
+
+ col_clear(pinfo->cinfo, COL_INFO);
+
+ tcp_dissect_pdus(tvb, pinfo, tree, edonkey_desegment,
+ EDONKEY_TCP_HEADER_LENGTH, get_edonkey_tcp_pdu_len,
+ dissect_edonkey_tcp_pdu, data);
+ return tvb_reported_length(tvb);
+}
+
+static int dissect_edonkey_udp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
+{
+ proto_item *ti;
+ proto_tree *edonkey_tree = NULL, *edonkey_msg_tree = NULL;
+ int offset = 0;
+ guint8 protocol, msg_type;
+ const gchar *protocol_name, *message_name;
+
+ /* An eDonkey UDP packet is at least 2 bytes long */
+ if (!tvb_bytes_exist(tvb, 0, EDONKEY_UDP_HEADER_LENGTH))
+ return 0;
+
+ protocol = tvb_get_guint8(tvb, offset);
+ if (try_val_to_str(protocol, edonkey_protocols) == NULL)
+ return 0; /* Not a known protocol */
+
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "eDonkey");
+
+ if (tree) {
+ ti = proto_tree_add_item(tree, proto_edonkey, tvb, 0, -1, ENC_NA);
+ edonkey_tree = proto_item_add_subtree(ti, ett_edonkey);
+ }
+
+ offset = 0;
+ /* eDonkey UDP message - Assume that there is one message per packet */
+ msg_type = tvb_get_guint8(tvb, offset+1);
+ protocol_name = val_to_str_const(protocol, edonkey_protocols, "Unknown");
+
+ if (protocol == EDONKEY_PROTO_KADEMLIA || protocol == EDONKEY_PROTO_KADEMLIA_COMP
+ || protocol == EDONKEY_PROTO_ADU_KADEMLIA || protocol == EDONKEY_PROTO_ADU_KADEMLIA_COMP)
+ message_name = val_to_str_const( msg_type, kademlia_msgs, "Unknown");
+ else
+ message_name = val_to_str_const(msg_type, edonkey_udp_msgs, "Unknown");
+
+ col_add_fstr(pinfo->cinfo, COL_INFO, "%s UDP: %s", protocol_name, message_name);
+
+ if (edonkey_tree) {
+ int remainingLength, extraBytes;
+
+ ti = proto_tree_add_item(edonkey_tree, hf_edonkey_message, tvb, offset, -1, ENC_NA);
+ edonkey_msg_tree = proto_item_add_subtree(ti, ett_edonkey_message);
+
+ proto_tree_add_uint(edonkey_msg_tree, hf_edonkey_protocol, tvb, offset, 1, protocol);
+ proto_tree_add_uint_format_value(edonkey_msg_tree, hf_edonkey_message_type, tvb, offset+1, 1, msg_type,
+ "%s (0x%02x)", message_name, msg_type);
+
+ offset += EDONKEY_UDP_HEADER_LENGTH;
+ remainingLength = tvb_captured_length_remaining( tvb, offset );
+
+ if (remainingLength > 0) {
+ switch (protocol) {
+ case EDONKEY_PROTO_EDONKEY:
+ offset = dissect_edonkey_udp_message(msg_type, tvb, pinfo, offset, remainingLength, edonkey_msg_tree);
+ break;
+
+ case EDONKEY_PROTO_EMULE_EXT:
+ offset = dissect_emule_udp_message(msg_type, tvb, pinfo, offset, remainingLength, edonkey_msg_tree);
+ break;
+
+ case EDONKEY_PROTO_ADU_KADEMLIA:
+ case EDONKEY_PROTO_KADEMLIA:
+ offset = dissect_kademlia_udp_message(msg_type, tvb, pinfo, offset, remainingLength, edonkey_msg_tree);
+ break;
+
+ case EDONKEY_PROTO_ADU_KADEMLIA_COMP:
+ case EDONKEY_PROTO_KADEMLIA_COMP:
+ offset = dissect_kademlia_udp_compressed_message(msg_type, tvb, pinfo, offset, remainingLength, edonkey_msg_tree);
+ break;
+
+ default:
+ break;
+ }
+ }
+
+ extraBytes = tvb_reported_length_remaining( tvb, offset );
+
+ if ( extraBytes > 0 ) {
+ /* trailing garbage or broken packet */
+ proto_tree_add_uint_format(tree, hf_edonkey_unparsed_data_length, tvb, offset, extraBytes, extraBytes,
+ "Trailing/Undecoded data: %d bytes", extraBytes );
+ }
+ }
+
+ return tvb_reported_length(tvb);
+}
+
+static void
+edonkey_fmt_revision(gchar *result, guint32 revision )
+{
+ snprintf( result, ITEM_LABEL_LENGTH, "%u.%u", (guint16)(revision & 0xFFFF), (guint16)(( revision & 0xFFFF0000 ) >> 16) );
+}
+
+void proto_register_edonkey(void) {
+
+ static hf_register_info hf[] = {
+ { &hf_edonkey_message,
+ { "eDonkey Message", "edonkey.message",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_edonkey_protocol,
+ { "Protocol", "edonkey.protocol",
+ FT_UINT8, BASE_HEX, VALS(edonkey_protocols), 0, "eDonkey Protocol", HFILL } },
+ { &hf_edonkey_message_length,
+ { "Message Length", "edonkey.message.length",
+ FT_UINT32, BASE_DEC, NULL, 0, "eDonkey Message Length", HFILL } },
+ { &hf_edonkey_message_type,
+ { "Message Type", "edonkey.message.type",
+ FT_UINT8, BASE_HEX, NULL, 0, "eDonkey Message Type", HFILL } },
+ { &hf_edonkey_client_hash,
+ { "Client Hash", "edonkey.client_hash",
+ FT_BYTES, BASE_NONE, NULL, 0, "eDonkey Client Hash", HFILL } },
+ { &hf_edonkey_server_hash,
+ { "Server Hash", "edonkey.server_hash",
+ FT_BYTES, BASE_NONE, NULL, 0, "eDonkey Server Hash", HFILL } },
+ { &hf_edonkey_file_hash,
+ { "File Hash", "edonkey.file_hash",
+ FT_BYTES, BASE_NONE, NULL, 0, "eDonkey File Hash", HFILL } },
+ { &hf_edonkey_client_id,
+ { "Client ID", "edonkey.clientid",
+ FT_IPv4, BASE_NONE, NULL, 0, "eDonkey Client ID", HFILL } },
+ { &hf_edonkey_ip,
+ { "IP", "edonkey.ip",
+ FT_IPv4, BASE_NONE, NULL, 0, "eDonkey IP", HFILL } },
+ { &hf_edonkey_port,
+ { "Port", "edonkey.port",
+ FT_UINT16, BASE_DEC, NULL, 0, "eDonkey Port", HFILL } },
+ { &hf_edonkey_metatag,
+ { "eDonkey Meta Tag", "edonkey.metatag",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_edonkey_metatag_type,
+ { "Meta Tag Type", "edonkey.metatag.type",
+ FT_UINT8, BASE_HEX, NULL, 0, "eDonkey Meta Tag Type", HFILL } },
+ { &hf_edonkey_metatag_id,
+ { "Meta Tag ID", "edonkey.metatag.id",
+ FT_UINT8, BASE_HEX, NULL, 0, "eDonkey Meta Tag ID", HFILL } },
+ { &hf_edonkey_metatag_name,
+ { "Meta Tag Name", "edonkey.metatag.name",
+ FT_STRING, BASE_NONE, NULL, 0, "eDonkey Meta Tag Name", HFILL } },
+ { &hf_edonkey_metatag_namesize,
+ { "Meta Tag Name Size", "edonkey.metatag.namesize",
+ FT_UINT16, BASE_DEC, NULL, 0, "eDonkey Meta Tag Name Size", HFILL } },
+ { &hf_edonkey_hash,
+ { "Hash", "edonkey.hash",
+ FT_BYTES, BASE_NONE, NULL, 0, "eDonkey Hash", HFILL } },
+ { &hf_edonkey_string,
+ { "String", "edonkey.string",
+ FT_STRING, BASE_NONE, NULL, 0, "eDonkey String", HFILL } },
+ { &hf_edonkey_string_length,
+ { "String Length", "edonkey.string_length",
+ FT_UINT16, BASE_DEC, NULL, 0, "eDonkey String Length", HFILL } },
+ { &hf_edonkey_part_count,
+ { "Part Count", "edonkey.part_count",
+ FT_UINT16, BASE_DEC, NULL, 0, "eDonkey Part Count", HFILL } },
+ { &hf_edonkey_file_status,
+ { "File Status", "edonkey.file_status",
+ FT_BYTES, BASE_NONE, NULL, 0, "eDonkey File Status", HFILL } },
+ { &hf_edonkey_directory,
+ { "Directory", "edonkey.directory",
+ FT_STRING, BASE_NONE, NULL, 0, "eDonkey Directory", HFILL } },
+ { &hf_edonkey_fileinfo,
+ { "eDonkey File Info", "edonkey.fileinfo",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_edonkey_serverinfo,
+ { "eDonkey Server Info", "edonkey.serverinfo",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_edonkey_clientinfo,
+ { "eDonkey Client Info", "edonkey.clientinfo",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_emule_public_key,
+ { "Public Key", "edonkey.emule.public_key",
+ FT_BYTES, BASE_NONE, NULL, 0, "eMule Public Key", HFILL } },
+ { &hf_emule_signature,
+ { "Signature", "edonkey.emule.signature",
+ FT_BYTES, BASE_NONE, NULL, 0, "eMule Signature", HFILL } },
+ { &hf_emule_aich_partnum,
+ { "Part Number", "edonkey.emule.aich_partnum",
+ FT_UINT16, BASE_DEC, NULL, 0, "eMule AICH Part Number", HFILL } },
+ { &hf_emule_aich_root_hash,
+ { "AICH Root Hash", "edonkey.emule.aich_root_hash",
+ FT_BYTES, BASE_NONE, NULL, 0, "eMule AICH Root Hash", HFILL } },
+ { &hf_emule_aich_hash_entry,
+ { "AICH Hash Entry", "edonkey.emule.aich_hash_entry",
+ FT_NONE, BASE_NONE, NULL, 0, "eMule AICH Hash Entry", HFILL } },
+ { &hf_emule_aich_hash_id,
+ { "AICH Hash ID", "edonkey.emule.aich_hash_id",
+ FT_UINT16, BASE_HEX, NULL, 0, "eMule AICH Hash ID", HFILL } },
+ { &hf_emule_aich_hash,
+ { "AICH Hash", "edonkey.emule.aich_hash",
+ FT_BYTES, BASE_NONE, NULL, 0, "eMule AICH Hash", HFILL } },
+ { &hf_emule_multipacket_entry,
+ { "eMule MultiPacket Entry", "edonkey.emule.multipacket_entry",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_emule_multipacket_opcode,
+ { "MultiPacket Opcode", "edonkey.emule.multipacket_opcode",
+ FT_UINT8, BASE_HEX, NULL, 0, "eMule MultiPacket Opcode", HFILL } },
+ { &hf_emule_sourceOBFU,
+ {"Source", "edonkey.source",
+ FT_NONE, BASE_NONE, NULL, 0, "eDonkey File Source", HFILL } },
+ { &hf_emule_source_count,
+ { "Completed Sources Count", "edonkey.emule.source_count",
+ FT_UINT16, BASE_DEC, NULL, 0, "eMule Completed Sources Count", HFILL } },
+ { &hf_emule_zlib,
+ { "Compressed Data", "edonkey.emule.zlib",
+ FT_NONE, BASE_NONE, NULL, 0, "eMule Compressed Data", HFILL } },
+ { &hf_overnet_peer,
+ { "Overnet Peer", "edonkey.overnet.peer",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_kademlia,
+ { "Kademlia Packet", "edonkey.kademlia",
+ FT_UINT8, BASE_HEX, NULL, 0, "Kademlia Packet Type", HFILL } },
+ { &hf_kademlia_peertype,
+ { "Peer Type", "edonkey.kademlia.peer.type",
+ FT_UINT8, BASE_DEC_HEX, NULL, 0, "Kademlia Peer Type", HFILL } },
+ { &hf_kademlia_peer,
+ { "Kademlia Peer", "edonkey.kademlia.peer",
+ FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_kademlia_peer_id,
+ { "Peer ID", "edonkey.kademlia.peer.id",
+ FT_STRING, BASE_NONE, NULL, 0, "Kademlia Peer ID", HFILL } },
+ { &hf_kademlia_hash,
+ { "Kademlia Hash", "edonkey.kademlia.hash",
+ FT_STRING, BASE_NONE, NULL, 0, NULL, HFILL } },
+ { &hf_kademlia_file_id,
+ { "File ID", "edonkey.kademlia.file.id",
+ FT_STRING, BASE_NONE, NULL, 0, "Kademlia File ID", HFILL } },
+ { &hf_kademlia_keyword_hash,
+ { "Keyword Hash", "edonkey.kademlia.keyword.hash",
+ FT_STRING, BASE_NONE, NULL, 0, "Kademlia Keyword Hash", HFILL } },
+ { &hf_kademlia_recipients_id,
+ { "Recipient's ID", "edonkey.kademlia.recipients.id",
+ FT_STRING, BASE_NONE, NULL, 0, "Kademlia Recipient's ID", HFILL } },
+ { &hf_kademlia_sender_id,
+ { "Sender ID", "edonkey.kademlia.sender.id",
+ FT_STRING, BASE_NONE, NULL, 0, "Kademlia Sender ID", HFILL } },
+ { &hf_kademlia_target_id,
+ { "Target ID", "edonkey.kademlia.target.id",
+ FT_STRING, BASE_NONE, NULL, 0, "Kademlia Target ID", HFILL } },
+ { &hf_kademlia_distance,
+ { "XOR Distance", "edonkey.kademlia.distance",
+ FT_STRING, BASE_NONE, NULL, 0, "Kademlia XOR Distance", HFILL } },
+ { &hf_kademlia_version,
+ { "Kad Version", "edonkey.kademlia.version",
+ FT_UINT8, BASE_DEC_HEX, VALS(kademlia_versions), 0, NULL, HFILL } },
+ { &hf_kademlia_tag_float,
+ { "Tag Value (Float)", "edonkey.kademlia.tag.value.float",
+ FT_FLOAT, BASE_NONE, NULL, 0, "Float Tag Value", HFILL } },
+ { &hf_kademlia_tag_uint64,
+ { "Tag Value (UINT64)", "edonkey.kademlia.tag.value.uint64",
+ FT_UINT64, BASE_DEC_HEX, NULL, 0, "UINT64 Tag Value", HFILL } },
+ { &hf_kademlia_tag_uint32,
+ { "Tag Value (UINT32)", "edonkey.kademlia.tag.value.uint32",
+ FT_UINT32, BASE_DEC_HEX, NULL, 0, "UINT32 Tag Value", HFILL } },
+ { &hf_kademlia_tag_ipv4,
+ { "Tag Value (IPv4)", "edonkey.kademlia.tag.value.ipv4",
+ FT_IPv4, BASE_NONE, NULL, 0, "UINT32 Tag Value (IPv4)", HFILL } },
+ { &hf_kademlia_tag_uint16,
+ { "Tag Value (UINT16)", "edonkey.kademlia.tag.value.uint16",
+ FT_UINT16, BASE_DEC_HEX, NULL, 0, "UINT16 Tag Value", HFILL } },
+ { &hf_kademlia_tag_uint8,
+ { "Tag Value (UINT8)", "edonkey.kademlia.tag.value.uint8",
+ FT_UINT8, BASE_DEC_HEX, NULL, 0, "UINT8 Tag Value", HFILL } },
+ { &hf_kademlia_tag_hash,
+ { "Tag Value (HASH)", "edonkey.kademlia.tag.value.hash",
+ FT_STRING, BASE_NONE, NULL, 0, "HASH Tag Value", HFILL } },
+ { &hf_kademlia_tag_string,
+ { "Tag Value (String)", "edonkey.kademlia.tag.value.string",
+ FT_STRING, BASE_NONE, NULL, 0, "String Tag Value", HFILL } },
+ { &hf_kademlia_tag_bsob,
+ { "Tag Value (BSOB)", "edonkey.kademlia.tag.value.bsob",
+ FT_BYTES, BASE_NONE, NULL, 0, "BSOB Tag Value", HFILL } },
+ { &hf_kademlia_udp_port,
+ { "UDP Port", "edonkey.kademlia.udp_port",
+ FT_UINT16, BASE_DEC, NULL, 0, "Kademlia UDP Port", HFILL } },
+ { &hf_kademlia_ip,
+ { "IP", "edonkey.kademlia.ip",
+ FT_IPv4, BASE_NONE, NULL, 0, "eDonkey IP", HFILL } },
+ { &hf_kademlia_tcp_port,
+ { "TCP Port", "edonkey.kademlia.tcp_port",
+ FT_UINT16, BASE_DEC, NULL, 0, "Kademlia TCP Port", HFILL } },
+#if 0
+ { &hf_kademlia_unparsed_data_length,
+ { "Kademlia unparsed data length", "edonkey.kademlia.unparsed",
+ FT_UINT16, BASE_DEC, NULL, 0, "Kademlia trailing data length", HFILL } },
+#endif
+ { &hf_kademlia_tag_name,
+ { "Tag Name", "edonkey.kademlia.tag.name",
+ FT_UINT8, BASE_HEX, NULL, 0, "Kademlia Tag Name String", HFILL } },
+ { &hf_kademlia_tag_name_length,
+ { "Tag Name Length", "edonkey.kademlia.tag.name.length",
+ FT_UINT16, BASE_DEC, NULL, 0, "Kademlia Tag Name String Length", HFILL } },
+ { &hf_kademlia_tag_type,
+ { "Tag Type", "edonkey.kademlia.tag.type",
+ FT_UINT8, BASE_HEX, VALS(kademlia_tag_types), 0, "Kademlia Tag Type", HFILL } },
+ { &hf_kademlia_request_type,
+ { "Request Type", "edonkey.kademlia.request.type",
+ FT_UINT8, BASE_HEX, NULL, 0, "Kademlia Request Type", HFILL } },
+ { &hf_kademlia_search_expression_type,
+ { "SearchExp Type", "edonkey.kademlia.search_expression.type",
+ FT_UINT8, BASE_HEX, VALS(edonkey_search_ext_type_vals), 0, NULL, HFILL } },
+ { &hf_kademlia_search_bool_op,
+ { "Bool op", "edonkey.kademlia.search.bool_op",
+ FT_UINT8, BASE_HEX, VALS(edonkey_search_ops), 0, NULL, HFILL } },
+ { &hf_kademlia_search_condition,
+ { "Search Condition", "edonkey.kademlia.search.condition",
+ FT_UINT8, BASE_HEX, NULL, 0, "Kademlia Search Condition", HFILL } },
+ { &hf_kademlia_search_condition_argument_uint32,
+ { "32bit Argument", "edonkey.kademlia.search.condition.argument.uint32",
+ FT_UINT32, BASE_DEC_HEX, NULL, 0, "Kademlia Search Condition Argument 32bit Value", HFILL } },
+ { &hf_kademlia_search_condition_argument_uint64,
+ { "64bit Argument", "edonkey.kademlia.search.condition.argument.uint64",
+ FT_UINT64, BASE_DEC_HEX, NULL, 0, "Kademlia Search Condition Argument 64bit Value", HFILL } },
+ { &hf_edonkey_unparsed_data_length,
+ { "eDonkey unparsed data length", "edonkey.unparsed",
+ FT_UINT32, BASE_DEC_HEX, NULL, 0, "eDonkey trailing or unparsed data length", HFILL } },
+
+ /* Generated from convert_proto_tree_add_text.pl */
+ { &hf_edonkey_list_size, { "List Size", "edonkey.list_size", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_meta_tag_value_revision, { "Meta Tag Value", "edonkey.meta_tag_value.revision", FT_UINT32, BASE_CUSTOM, CF_FUNC(edonkey_fmt_revision), 0x0, NULL, HFILL }},
+ { &hf_edonkey_meta_tag_value_uint, { "Meta Tag Value", "edonkey.meta_tag_value.uint", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_boolean_array_length, { "Boolean Array Length", "edonkey.boolean_array_length", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_blob_length, { "BLOB Length", "edonkey.blob_length", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_kademlia_string, { "String", "edonkey.kademlia_string", FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+ { &hf_emule_public_key_length, { "Public key length", "edonkey.emule.public_key_length", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_emule_signature_length, { "Signature length", "edonkey.emule.signature_length", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_obfuscation_settings, { "Obfuscation Settings", "edonkey.obfuscation_settings", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_start_offset, { "Start Offset", "edonkey.start_offset", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_start_offset_64, { "Start Offset", "edonkey.start_offset64", FT_UINT64, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_end_offset, { "End Offset", "edonkey.end_offset", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_end_offset_64, { "End Offset", "edonkey.end_offset64", FT_UINT64, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_emule_file_length, { "File Length", "edonkey.emule.file_length", FT_UINT64, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_overnet_peer_type, { "Peer Type", "edonkey.overnet_peer_type", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_more_search_file_results, { "More", "edonkey.more_search_file_results", FT_BOOLEAN, 8, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_file_size, { "File size", "edonkey.file_size", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_large_file_size, { "Large file size", "edonkey.large_file_size", FT_UINT64, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_number_of_users, { "Number of Users", "edonkey.number_of_users", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_number_of_files, { "Number of Files", "edonkey.number_of_files", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_message_data, { "Message Data", "edonkey.message_data", FT_BYTES, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_emule_version, { "Version", "edonkey.emule.version", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_emule_queue_ranking, { "Queue Ranking", "edonkey.emule.queue_ranking", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_emule_ident_state, { "State", "edonkey.emule.state", FT_UINT8, BASE_DEC|BASE_RANGE_STRING, RVALS(emule_ident_state_rvals), 0x0, NULL, HFILL }},
+ { &hf_edonkey_emule_rndchallenge, { "Rndchallenge", "edonkey.emule.rndchallenge", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_emule_sig_ip_used, { "Sig IP Used", "edonkey.emule.sig_ip_used", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_packed_length, { "Packed Length", "edonkey.emule.packed_length", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_compressed_message_data, { "Compressed Message Data", "edonkey.emule.compressed_message_data", FT_BYTES, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_challenge, { "Challenge", "edonkey.challenge", FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_max_number_of_users, { "Max number of Users", "edonkey.max_number_of_users", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_search_type, { "Search Type", "edonkey.search_type", FT_UINT8, BASE_DEC, VALS(edonkey_search_type_vals), 0x0, NULL, HFILL }},
+ { &hf_edonkey_search_range_min, { "Search Range Min", "edonkey.search_range.min", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_search_range_max, { "Search Range Max", "edonkey.search_range.max", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_kademlia_uload, { "uLoad", "edonkey.kademlia_uload", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_kademlia_start_position, { "Start position", "edonkey.kademlia_start_position", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_kademlia_filesize, { "Filesize", "edonkey.kademlia_filesize", FT_UINT64, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_kademlia_restrictive, { "Restrictive", "edonkey.kademlia_restrictive", FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_broken_compressed_data, { "Broken Compressed data", "edonkey.broken_compressed_data", FT_BYTES, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_search_limit, { "Search Limit", "edonkey.search_limit", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_edonkey_search_limit_type, { "Limit Type", "edonkey.search_limit_type", FT_UINT8, BASE_DEC, VALS(edonkey_search_conds), 0x0, NULL, HFILL }},
+ { &hf_edonkey_search_ops, { "Search Operator", "edonkey.search_ops", FT_UINT8, BASE_HEX, VALS(edonkey_search_ops), 0x0, NULL, HFILL }},
+ { &hf_edonkey_user_hash_length, { "User hash length", "edonkey.user_hash_length", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ };
+
+ static gint *ett[] = {
+ &ett_edonkey,
+ &ett_edonkey_message,
+ &ett_edonkey_metatag,
+ &ett_edonkey_search,
+ &ett_edonkey_fileinfo,
+ &ett_edonkey_serverinfo,
+ &ett_edonkey_clientinfo,
+ &ett_emule_aichhash,
+ &ett_emule_multipacket,
+ &ett_emule_zlib,
+ &ett_overnet_peer,
+ &ett_emule_sourceOBFU,
+ &ett_edonkey_listitem,
+ &ett_kademlia_search_expression,
+ &ett_kademlia_tag
+ };
+
+ static ei_register_info ei[] = {
+ { &ei_kademlia_tag_type, { "edonkey.kademlia.tag.type.undecoded", PI_PROTOCOL, PI_WARN, "Tag value not decoded", EXPFILL }},
+ { &ei_kademlia_search_expression_type, { "edonkey.kademlia.search_expression.type.undecoded", PI_UNDECODED, PI_WARN, "NOT DECODED op", EXPFILL }},
+ };
+
+ module_t *edonkey_module;
+ expert_module_t* expert_edonkey;
+
+ proto_edonkey = proto_register_protocol("eDonkey Protocol", "EDONKEY", "edonkey");
+
+ proto_register_field_array(proto_edonkey, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+ expert_edonkey = expert_register_protocol(proto_edonkey);
+ expert_register_field_array(expert_edonkey, ei, array_length(ei));
+
+ edonkey_tcp_handle = register_dissector("edonkey.tcp", dissect_edonkey_tcp, proto_edonkey);
+ edonkey_udp_handle = register_dissector("edonkey.udp", dissect_edonkey_udp, proto_edonkey);
+
+ edonkey_module = prefs_register_protocol(proto_edonkey, NULL);
+ prefs_register_bool_preference(edonkey_module, "desegment",
+ "Reassemble eDonkey messages spanning multiple TCP segments",
+ "Whether the eDonkey dissector should reassemble messages spanning multiple TCP segments."
+ " To use this option, you must also enable \"Allow subdissectors to reassemble TCP streams\" in the TCP protocol settings.",
+ &edonkey_desegment);
+}
+
+void proto_reg_handoff_edonkey(void) {
+
+ dissector_add_uint_range_with_preference("tcp.port", EDONKEY_TCP_PORT_RANGE, edonkey_tcp_handle);
+ dissector_add_uint_range_with_preference("udp.port", EDONKEY_UDP_PORT_RANGE, edonkey_udp_handle);
+}
+
+/*
+ * Editor modelines - https://www.wireshark.org/tools/modelines.html
+ *
+ * Local variables:
+ * c-basic-offset: 4
+ * tab-width: 8
+ * indent-tabs-mode: nil
+ * End:
+ *
+ * vi: set shiftwidth=4 tabstop=8 expandtab:
+ * :indentSize=4:tabSize=8:noTabs=true:
+ */