diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
commit | e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch) | |
tree | 68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-mle.c | |
parent | Initial commit. (diff) | |
download | wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip |
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-mle.c')
-rw-r--r-- | epan/dissectors/packet-mle.c | 2022 |
1 files changed, 2022 insertions, 0 deletions
diff --git a/epan/dissectors/packet-mle.c b/epan/dissectors/packet-mle.c new file mode 100644 index 00000000..790e7de8 --- /dev/null +++ b/epan/dissectors/packet-mle.c @@ -0,0 +1,2022 @@ +/* packet-mle.c + * Routines for MLE packet dissection + * + * Colin O'Flynn <coflynn@newae.com> + * + * The entire security section of this is lifted from the IEEE 802.15.4 + * dissectory, as this is done the same way. Should eventually make the + * two use some common functions or something. But that section is: + * By Owen Kirby <osk@exegin.com> + * Copyright 2007 Exegin Technologies Limited + * + * Thread parts added by Robert Cragie <robert.cragie@arm.com> + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 1998 Gerald Combs + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#include "config.h" + +#include <math.h> +#include <epan/packet.h> +#include <epan/conversation.h> +#include <epan/proto_data.h> +#include <epan/wmem_scopes.h> +#include <epan/expert.h> +#include <epan/prefs.h> +#include <epan/strutil.h> +#include <epan/to_str.h> +#include "packet-ieee802154.h" +#include "packet-mle.h" + +#define MLE_32768_TO_NSEC_FACTOR ((double)30517.578125) + +/* Forward declarations */ +void proto_register_mle(void); +void proto_reg_handoff_mle(void); + +static int proto_mle = -1; +static int proto_ieee802154 = -1; /* cache 802.15.4 protocol ID */ + +/* Registered fields for Auxiliary Security Header */ +static int hf_mle_security_suite = -1; +static int hf_mle_mic = -1; + +static int hf_mle_command = -1; +static int hf_mle_tlv = -1; +static int hf_mle_tlv_type = -1; +static int hf_mle_tlv_length = -1; +static int hf_mle_tlv_source_addr = -1; +static int hf_mle_tlv_mode_device_type = -1; +static int hf_mle_tlv_mode_idle_rx = -1; +static int hf_mle_tlv_mode_sec_data_req = -1; +static int hf_mle_tlv_mode_nwk_data = -1; +static int hf_mle_tlv_timeout = -1; +static int hf_mle_tlv_challenge = -1; +static int hf_mle_tlv_response = -1; +static int hf_mle_tlv_ll_frm_cntr = -1; +static int hf_mle_tlv_lqi_c = -1; +static int hf_mle_tlv_lqi_size = -1; +static int hf_mle_tlv_neighbor = -1; +static int hf_mle_tlv_neighbor_flagI = -1; +static int hf_mle_tlv_neighbor_flagO = -1; +static int hf_mle_tlv_neighbor_flagP = -1; +static int hf_mle_tlv_neighbor_idr = -1; +static int hf_mle_tlv_neighbor_addr = -1; +static int hf_mle_tlv_network_param_id = -1; +static int hf_mle_tlv_network_delay = -1; +static int hf_mle_tlv_network_channel = -1; +static int hf_mle_tlv_network_pan_id = -1; +static int hf_mle_tlv_network_pmt_join = -1; +static int hf_mle_tlv_network_bcn_payload = -1; +static int hf_mle_tlv_network_unknown = -1; +static int hf_mle_tlv_mle_frm_cntr = -1; +static int hf_mle_tlv_unknown = -1; +static int hf_mle_tlv_route64_id_seq = -1; +static int hf_mle_tlv_route64_id_mask = -1; +static int hf_mle_tlv_route64_entry = -1; +static int hf_mle_tlv_route64_nbr_out = -1; +static int hf_mle_tlv_route64_nbr_in = -1; +static int hf_mle_tlv_route64_cost = -1; +#if 0 +static int hf_mle_tlv_route64_unknown = -1; +#endif +static int hf_mle_tlv_addr16 = -1; +static int hf_mle_tlv_leader_data_partition_id = -1; +static int hf_mle_tlv_leader_data_weighting = -1; +static int hf_mle_tlv_leader_data_version = -1; +static int hf_mle_tlv_leader_data_stable_version = -1; +static int hf_mle_tlv_leader_data_router_id = -1; +#if 0 +static int hf_mle_tlv_network_data = -1; +#endif +static int hf_mle_tlv_scan_mask_r = -1; +static int hf_mle_tlv_scan_mask_e = -1; +static int hf_mle_tlv_conn_flags = -1; +static int hf_mle_tlv_conn_flags_pp = -1; +static int hf_mle_tlv_conn_lq3 = -1; +static int hf_mle_tlv_conn_lq2 = -1; +static int hf_mle_tlv_conn_lq1 = -1; +static int hf_mle_tlv_conn_leader_cost = -1; +static int hf_mle_tlv_conn_id_seq = -1; +static int hf_mle_tlv_conn_active_rtrs = -1; +static int hf_mle_tlv_conn_sed_buf_size = -1; +static int hf_mle_tlv_conn_sed_dgram_cnt = -1; +static int hf_mle_tlv_link_margin = -1; +static int hf_mle_tlv_status = -1; +static int hf_mle_tlv_version = -1; +static int hf_mle_tlv_addr_reg_entry = -1; +static int hf_mle_tlv_addr_reg_iid_type = -1; +static int hf_mle_tlv_addr_reg_cid = -1; +static int hf_mle_tlv_addr_reg_iid = -1; +static int hf_mle_tlv_addr_reg_ipv6 = -1; +#if 0 +static int hf_mle_tlv_hold_time = -1; +#endif +static int hf_mle_tlv_channel_page = -1; /* v1.1-draft-2 */ +static int hf_mle_tlv_channel = -1; /* v1.1-draft-2 */ +static int hf_mle_tlv_pan_id = -1; /* v1.1-draft-2 */ +static int hf_mle_tlv_active_tstamp = -1; /* SPEC-472 */ +static int hf_mle_tlv_pending_tstamp = -1; /* SPEC-472 */ +#if 0 +static int hf_mle_tlv_active_op_dataset = -1; /* SPEC-472 */ +static int hf_mle_tlv_pending_op_dataset = -1; /* SPEC-472 */ +#endif + +static gint ett_mle = -1; +static gint ett_mle_tlv = -1; +static gint ett_mle_neighbor = -1; +static gint ett_mle_router = -1; +static gint ett_mle_addr_reg = -1; +static gint ett_mle_conn_flg = -1; +static gint ett_mle_thread_nwd = -1; +static gint ett_mle_auxiliary_security = -1; +static gint ett_mle_aux_sec_control = -1; +static gint ett_mle_aux_sec_key_id = -1; + +static expert_field ei_mle_cbc_mac_failed = EI_INIT; +static expert_field ei_mle_packet_too_small = EI_INIT; +static expert_field ei_mle_no_key = EI_INIT; +static expert_field ei_mle_decrypt_failed = EI_INIT; +static expert_field ei_mle_mic_check_failed = EI_INIT; +static expert_field ei_mle_tlv_length_failed = EI_INIT; +static expert_field ei_mle_len_size_mismatch = EI_INIT; + +static dissector_handle_t mle_handle; +static dissector_handle_t thread_nwd_handle; +static dissector_handle_t thread_mc_handle; + +#define UDP_PORT_MLE_RANGE "19788" /* IANA registered */ + +/* boolean value set if the MIC must be ok before payload is dissected */ +static gboolean mle_mic_ok = FALSE; + +static wmem_tree_t* mle_key_hash_handlers; + +static const value_string mle_sec_suite_names[] = { + { 0, "802.15.4 Security" }, + { 255, "No Security" }, + { 0, NULL } +}; + +static const value_string mle_status_tlv_enums[] = { + { 1, "Error" }, + { 2, "Duplicate Address Detected" }, + { 0, NULL } +}; + +static const value_string mle_conn_tlv_flags_pp_enums[] = { + { 1, "High" }, + { 0, "Medium" }, + { -1, "Low" }, + { 0, NULL } +}; + +#define MLE_CMD_REQUEST 0 +#define MLE_CMD_ACCEPT 1 +#define MLE_CMD_ACCEPTREQ 2 +#define MLE_CMD_REJECT 3 +#define MLE_CMD_ADVERTISE 4 +#define MLE_CMD_UPDATE 5 +#define MLE_CMD_UPDATE_REQUEST 6 +#define MLE_CMD_DATA_REQUEST 7 +#define MLE_CMD_DATA_RESPONSE 8 +#define MLE_CMD_PARENT_REQUEST 9 +#define MLE_CMD_PARENT_RESPONSE 10 +#define MLE_CMD_CHILD_ID_REQUEST 11 +#define MLE_CMD_CHILD_ID_RESPONSE 12 +#define MLE_CMD_CHILD_UPDATE_REQUEST 13 +#define MLE_CMD_CHILD_UPDATE_RESPONSE 14 +#define MLE_CMD_ANNOUNCE 15 +#define MLE_CMD_DISCOVERY_REQUEST 16 +#define MLE_CMD_DISCOVERY_RESPONSE 17 + +static const value_string mle_command_vals[] = { + { MLE_CMD_REQUEST, "Link Request" }, + { MLE_CMD_ACCEPT, "Link Accept" }, + { MLE_CMD_ACCEPTREQ, "Link Accept and Request" }, + { MLE_CMD_REJECT, "Link Reject" }, + { MLE_CMD_ADVERTISE, "Advertisement" }, + { MLE_CMD_UPDATE, "Update" }, + { MLE_CMD_UPDATE_REQUEST, "Update Request" }, + { MLE_CMD_DATA_REQUEST, "Data Request" }, + { MLE_CMD_DATA_RESPONSE, "Data Response" }, + { MLE_CMD_PARENT_REQUEST, "Parent Request" }, + { MLE_CMD_PARENT_RESPONSE, "Parent Response" }, + { MLE_CMD_CHILD_ID_REQUEST, "Child ID Request" }, + { MLE_CMD_CHILD_ID_RESPONSE, "Child ID Response" }, + { MLE_CMD_CHILD_UPDATE_REQUEST, "Child Update Request" }, + { MLE_CMD_CHILD_UPDATE_RESPONSE, "Child Update Response" }, + { MLE_CMD_ANNOUNCE, "Announce" }, + { MLE_CMD_DISCOVERY_REQUEST, "Discovery Request" }, + { MLE_CMD_DISCOVERY_RESPONSE, "Discovery Response" }, + { 0, NULL} +}; + +#define MLE_TLV_SOURCE_ADDRESS 0 +#define MLE_TLV_MODE 1 /* Modified in Ch04_Mesh Link Establishment */ +#define MLE_TLV_TIMEOUT 2 +#define MLE_TLV_CHALLENGE 3 +#define MLE_TLV_RESPONSE 4 +#define MLE_TLV_LINK_LAYER_FRAME_COUNTER 5 +#define MLE_TLV_LINK_QUALITY 6 +#define MLE_TLV_NETWORK_PARAMETER 7 +#define MLE_TLV_MLE_FRAME_COUNTER 8 +#define MLE_TLV_ROUTE64 9 /* Defined in Ch05_Network Layer v1.1-rc1 */ +#define MLE_TLV_ADDRESS16 10 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_LEADER_DATA 11 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_NETWORK_DATA 12 /* Defined in Ch05_Network Layer v1.1-rc1 */ +#define MLE_TLV_TLV_REQUEST 13 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_SCAN_MASK 14 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_CONNECTIVITY 15 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_LINK_MARGIN 16 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_STATUS 17 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_VERSION 18 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_ADDRESS_REGISTRATION 19 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_CHANNEL 20 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_PAN_ID 21 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_ACTIVE_TSTAMP 22 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_PENDING_TSTAMP 23 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_ACTIVE_OP_DATASET 24 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_PENDING_OP_DATASET 25 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ +#define MLE_TLV_THREAD_DISCOVERY 26 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */ + +static const value_string mle_tlv_vals[] = { + { MLE_TLV_SOURCE_ADDRESS, "Source Address" }, + { MLE_TLV_MODE, "Mode" }, + { MLE_TLV_TIMEOUT, "Timeout" }, + { MLE_TLV_CHALLENGE, "Challenge" }, + { MLE_TLV_RESPONSE, "Response" }, + { MLE_TLV_LINK_LAYER_FRAME_COUNTER, "Link Layer Frame Counter"}, + { MLE_TLV_LINK_QUALITY, "Link Quality"}, + { MLE_TLV_NETWORK_PARAMETER, "Network Parameter"}, + { MLE_TLV_MLE_FRAME_COUNTER, "MLE Frame Counter"}, + { MLE_TLV_ROUTE64, "Route64"}, + { MLE_TLV_ADDRESS16, "Address16"}, + { MLE_TLV_LEADER_DATA, "Leader Data"}, + { MLE_TLV_NETWORK_DATA, "Network Data"}, + { MLE_TLV_TLV_REQUEST, "TLV Request"}, + { MLE_TLV_SCAN_MASK, "Scan Mask"}, + { MLE_TLV_CONNECTIVITY, "Connectivity"}, + { MLE_TLV_LINK_MARGIN, "Link Margin"}, + { MLE_TLV_STATUS, "Status"}, + { MLE_TLV_VERSION, "Version"}, + { MLE_TLV_ADDRESS_REGISTRATION, "Address Registration"}, + { MLE_TLV_CHANNEL, "Channel"}, + { MLE_TLV_PAN_ID, "PAN ID"}, + { MLE_TLV_ACTIVE_TSTAMP, "Active Timestamp"}, + { MLE_TLV_PENDING_TSTAMP, "Pending Timestamp"}, + { MLE_TLV_ACTIVE_OP_DATASET, "Active Operational Dataset"}, + { MLE_TLV_PENDING_OP_DATASET, "Pending Operational Dataset"}, + { MLE_TLV_THREAD_DISCOVERY, "Thread Discovery"}, + { 0, NULL} +}; + +#define LQI_FLAGS_C 0x80 +#define LQI_FLAGS_SIZE 0x0F + +#define NEIGHBOR_FLAG_I 0x80 +#define NEIGHBOR_FLAG_O 0x40 +#define NEIGHBOR_FLAG_P 0x20 + +#define NETWORK_PARAM_ID_CHANNEL 0 +#define NETWORK_PARAM_ID_PAN_ID 1 +#define NETWORK_PARAM_ID_PERMIT_JOIN 2 +#define NETWORK_PARAM_ID_BCN_PAYLOAD 3 + +static const value_string mle_tlv_nwk_param_vals[] = { + { NETWORK_PARAM_ID_CHANNEL, "Channel" }, + { NETWORK_PARAM_ID_PAN_ID, "PAN ID" }, + { NETWORK_PARAM_ID_PERMIT_JOIN, "Permit Join" }, + { NETWORK_PARAM_ID_BCN_PAYLOAD, "Beacon Payload" }, + { 0, NULL} +}; + +static const true_false_string mle_tlv_mode_device_type = { + "FFD", + "RFD" +}; +static const true_false_string mle_tlv_mode_nwk_data = { + "Full", + "Stable" +}; +static const true_false_string mle_tlv_addr_reg_iid_type = { + "Compressed", + "Full" +}; + +#define ROUTE_TBL_OUT_MASK 0xC0 +#define ROUTE_TBL_IN_MASK 0x30 +#define ROUTE_TBL_COST_MASK 0x0F + +#define SCAN_MASK_R_MASK 0x80 +#define SCAN_MASK_D_MASK 0x40 + +#define CONN_MASK_FLAGS_PP_MASK 0xC0 + +#define ADDR_REG_MASK_IID_TYPE_MASK 0x80 +#define ADDR_REG_MASK_CID_MASK 0x0F + +#define MLE_CMD_CINFO_SEC_DATA_REQ 0x04 +#define MLE_CMD_CINFO_NWK_DATA 0x01 + +/*FUNCTION:------------------------------------------------------ + * NAME + * dissect_mle_decrypt + * DESCRIPTION + * MLE dissector. + * PARAMETERS + * tvbuff_t *tvb - IEEE 802.15.4 packet. + * packet_info * pinfo - Packet info structure. + * guint offset - Offset where the ciphertext 'c' starts. + * ieee802154_packet *packet - IEEE 802.15.4 packet information. + * ws_decrypt_status *status - status of decryption returned through here on failure. + * RETURNS + * tvbuff_t * - Decrypted payload. + *--------------------------------------------------------------- + */ +static tvbuff_t * +dissect_mle_decrypt(tvbuff_t * tvb, + guint offset, + packet_info * pinfo, + ieee802154_packet * packet, + ieee802154_decrypt_info_t* decrypt_info) +{ + tvbuff_t * ptext_tvb; + gboolean have_mic = FALSE; + guint64 srcAddr; + unsigned char tmp[16]; + guint M; + gint captured_len; + gint reported_len; + + *decrypt_info->rx_mic_length = 0; + memset(decrypt_info->rx_mic, 0, 16); + + /* Get the captured and on-the-wire length of the payload. */ + if (packet->security_level > 0) { + M = IEEE802154_MIC_LENGTH(packet->security_level); + } + else { + M = 0; + } + + reported_len = tvb_reported_length_remaining(tvb, offset) - M; + if (reported_len < 0) { + *decrypt_info->status = DECRYPT_PACKET_TOO_SMALL; + return NULL; + } + /* Check if the payload is truncated. */ + if (tvb_bytes_exist(tvb, offset, reported_len)) { + captured_len = reported_len; + } + else { + captured_len = tvb_captured_length_remaining(tvb, offset); + } + + if (packet->security_level > 0) { + /* Check if the MIC is present in the captured data. */ + have_mic = tvb_bytes_exist(tvb, offset + reported_len, M); + if (have_mic) { + tvb_memcpy(tvb, decrypt_info->rx_mic, offset + reported_len, M); + } + } + + /*===================================================== + * Key Lookup - Need to find the appropriate key. + *===================================================== + */ + if (packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) { + /* The source EUI-64 is included in the headers. */ + srcAddr = packet->src64; /* GUINT64_SWAP_LE_BE(packet->src64); */ + } + else { + /* Lookup failed. */ + *decrypt_info->status = DECRYPT_PACKET_NO_EXT_SRC_ADDR; + return NULL; + } + + /*===================================================== + * CCM* - CTR mode payload encryption + *===================================================== + */ + /* Create the CCM* initial block for decryption (Adata=0, M=0, counter=0). */ + ccm_init_block(tmp, FALSE, 0, srcAddr, packet->frame_counter, packet->security_level, 0, NULL); + + /* Decrypt the ciphertext, and place the plaintext in a new tvb. */ + if (IEEE802154_IS_ENCRYPTED(packet->security_level) && captured_len) { + gchar *text; + + /* + * Make a copy of the ciphertext in heap memory. + * + * We will decrypt the message in-place and then use the buffer as the + * real data for the new tvb. + */ + text = (gchar *)tvb_memdup(pinfo->pool, tvb, offset, captured_len); + + /* Perform CTR-mode transformation. Try both the likely key and the alternate key */ + if (!ccm_ctr_encrypt(decrypt_info->key, tmp, decrypt_info->rx_mic, text, captured_len)) { + *decrypt_info->status = DECRYPT_PACKET_DECRYPT_FAILED; + return NULL; + } + + /* Create a tvbuff for the plaintext. */ + ptext_tvb = tvb_new_real_data((const guint8 *)text, captured_len, reported_len); + tvb_set_child_real_data_tvbuff(tvb, ptext_tvb); + add_new_data_source(pinfo, ptext_tvb, "Decrypted MLE payload"); + *decrypt_info->status = DECRYPT_PACKET_SUCCEEDED; + } + /* There is no ciphertext. Wrap the plaintext in a new tvb. */ + else { + /* Decrypt the MIC (if present). */ + if (have_mic) { + if (!ccm_ctr_encrypt(decrypt_info->key, tmp, decrypt_info->rx_mic, NULL, 0)) { + *decrypt_info->status = DECRYPT_PACKET_DECRYPT_FAILED; + return NULL; + } + } + + /* Create a tvbuff for the plaintext. This might result in a zero-length tvbuff. */ + ptext_tvb = tvb_new_subset_length_caplen(tvb, offset, captured_len, reported_len); + *decrypt_info->status = DECRYPT_PACKET_SUCCEEDED; + } + + /*===================================================== + * CCM* - CBC-mode message authentication + *===================================================== + */ + /* We can only verify the message if the MIC wasn't truncated. */ + if (have_mic) { + unsigned char dec_mic[16]; + guint l_m = captured_len; + guint l_a; + guint8 d_a[256]; + + DISSECTOR_ASSERT(pinfo->src.len == 16); + DISSECTOR_ASSERT(pinfo->dst.len == 16); + memcpy(d_a, pinfo->src.data, pinfo->src.len); + memcpy(d_a+16, pinfo->dst.data, pinfo->dst.len); + + tvb_memcpy(tvb, d_a+32, decrypt_info->aux_offset, decrypt_info->aux_length); + l_a = 32 + decrypt_info->aux_length; + + /* Adjust the lengths of the plantext and additional data if unencrypted. */ + if (!IEEE802154_IS_ENCRYPTED(packet->security_level)) { + l_a += l_m; + l_m = 0; + } + + /* Create the CCM* initial block for authentication (Adata!=0, M!=0, counter=l(m)). */ + ccm_init_block(tmp, TRUE, M, srcAddr, packet->frame_counter, packet->security_level, l_m, NULL); + + /* Compute CBC-MAC authentication tag. */ + /* + * And yes, despite the warning in tvbuff.h, I think tvb_get_ptr is the + * right function here since either A) the payload wasn't encrypted, in + * which case l_m is zero, or B) the payload was encrypted, and the tvb + * already points to contiguous memory, since we just allocated it in + * decryption phase. + */ + if (!ccm_cbc_mac(decrypt_info->key, tmp, d_a, l_a, tvb_get_ptr(ptext_tvb, 0, l_m), l_m, dec_mic)) { + *decrypt_info->status = DECRYPT_PACKET_MIC_CHECK_FAILED; + } + /* Compare the received MIC with the one we generated. */ + else if (memcmp(decrypt_info->rx_mic, dec_mic, M) != 0) { + *decrypt_info->status = DECRYPT_PACKET_MIC_CHECK_FAILED; + } + } + + *decrypt_info->rx_mic_length = M; + + /* Done! */ + return ptext_tvb; +} /* dissect_mle_decrypt */ + +void register_mle_key_hash_handler(guint hash_identifier, ieee802154_set_key_func key_func) +{ + /* Ensure no duplication */ + DISSECTOR_ASSERT(wmem_tree_lookup32(mle_key_hash_handlers, hash_identifier) == NULL); + + wmem_tree_insert32(mle_key_hash_handlers, hash_identifier, (void*)key_func); +} + +/* Set MLE key function. */ +static guint ieee802154_set_mle_key(ieee802154_packet *packet, unsigned char *key, unsigned char *alt_key, ieee802154_key_t *uat_key) +{ + ieee802154_set_key_func func = (ieee802154_set_key_func)wmem_tree_lookup32(mle_key_hash_handlers, uat_key->hash_type); + + if (func != NULL) + return func(packet, key, alt_key, uat_key); + + /* Right now, KEY_HASH_NONE and KEY_HASH_ZIP are not registered because they + work with this "default" behavior */ + if (packet->key_index == uat_key->key_index) + { + memcpy(key, uat_key->key, IEEE802154_CIPHER_SIZE); + return 1; + } + + return 0; +} + +static int +dissect_mle(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_) +{ + tvbuff_t *volatile payload_tvb = NULL; + proto_tree *volatile mle_tree = NULL; + proto_item *volatile proto_root = NULL; + + guint offset = 0; + guint aux_header_offset = 0; + ieee802154_decrypt_status status; + + proto_item *ti; + proto_item *mic_item = NULL; + proto_tree *header_tree = NULL; + guint8 security_suite; + guint aux_length = 0; + ieee802154_packet *packet; + ieee802154_packet *original_packet; + ieee802154_decrypt_info_t decrypt_info; + ieee802154_hints_t *ieee_hints; + gboolean mic_ok=TRUE; + + unsigned char rx_mic[16]; + unsigned int rx_mic_len = 0; + + guint8 cmd; + guint8 tlv_type, tlv_len; + proto_tree *tlv_tree; + + ieee_hints = (ieee802154_hints_t *)p_get_proto_data(wmem_file_scope(), pinfo, proto_ieee802154, 0); + if (ieee_hints == NULL) { + /* For now, MLE only supported with IEEE802.15.4 as an underlying layer */ + return 0; + } + original_packet = (ieee802154_packet *)ieee_hints->packet; + + packet = wmem_new0(pinfo->pool, ieee802154_packet); + + /* Copy IEEE 802.15.4 Source Address */ + packet->src_addr_mode = original_packet->src_addr_mode; + if (packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) { + packet->src64 = original_packet->src64; + } else { + packet->src16 = original_packet->src16; + } + + /* Copy IEEE 802.15.4 Source PAN ID */ + packet->src_pan = original_packet->src_pan; + + col_set_str(pinfo->cinfo, COL_PROTOCOL, "MLE"); + col_clear(pinfo->cinfo, COL_INFO); + + /* Create the protocol tree. */ + proto_root = proto_tree_add_item(tree, proto_mle, tvb, 0, tvb_reported_length(tvb), ENC_NA); + mle_tree = proto_item_add_subtree(proto_root, ett_mle); + + /* Parse the security suite field. */ + /* Security Suite Field */ + security_suite = tvb_get_guint8(tvb, offset); + proto_tree_add_item(mle_tree, hf_mle_security_suite, tvb, offset, 1, ENC_NA); + offset++; + + aux_header_offset = offset; + + /* Security material present if security suite = 0 */ + if (security_suite == 0) { + dissect_ieee802154_aux_sec_header_and_key(tvb, pinfo, mle_tree, packet, &offset); + aux_length = offset-aux_header_offset; + } else { + packet->security_level = SECURITY_LEVEL_NONE; + } + + decrypt_info.key_number = 0; + + /* Add additional fields for security level > SECURITY_LEVEL_NONE */ + if (packet->security_level > SECURITY_LEVEL_NONE) { + + /* Pass to decryption process */ + decrypt_info.rx_mic = rx_mic; + decrypt_info.rx_mic_length = &rx_mic_len; + decrypt_info.aux_offset = aux_header_offset; + decrypt_info.aux_length = aux_length; + decrypt_info.status = &status; + decrypt_info.key = NULL; /* payload function will fill that in */ + + payload_tvb = decrypt_ieee802154_payload(tvb, offset, pinfo, header_tree, packet, &decrypt_info, + ieee802154_set_mle_key, dissect_mle_decrypt); + if (status == DECRYPT_PACKET_MIC_CHECK_FAILED) + expert_add_info(pinfo, proto_root, &ei_mle_cbc_mac_failed); + + /* MIC */ + if (rx_mic_len) { + mic_item = proto_tree_add_bytes(header_tree, hf_mle_mic, tvb, 0, rx_mic_len, rx_mic); + proto_item_set_generated(mic_item); + } + } else { + status = DECRYPT_NOT_ENCRYPTED; + } + + /* Get the unencrypted data if decryption failed. */ + if (!payload_tvb) { + /* Deal with possible truncation and the FCS field at the end. */ + gint reported_len = tvb_reported_length_remaining(tvb, offset); + gint captured_len = tvb_captured_length_remaining(tvb, offset); + if (reported_len < captured_len) captured_len = reported_len; + payload_tvb = tvb_new_subset_length_caplen(tvb, offset, captured_len, reported_len); + } + + /* Display the reason for failure, and abort if the error was fatal. */ + switch (status) { + case DECRYPT_PACKET_SUCCEEDED: + /* No problem. */ + proto_item_append_text(mic_item, " [correct (key no. %d)]", decrypt_info.key_number); + break; + + case DECRYPT_PACKET_TOO_SMALL: + expert_add_info(pinfo, proto_root, &ei_mle_packet_too_small); + call_data_dissector(payload_tvb, pinfo, tree); + return tvb_captured_length(tvb); + + case DECRYPT_PACKET_NO_KEY: + expert_add_info(pinfo, proto_root, &ei_mle_no_key); + call_data_dissector(payload_tvb, pinfo, tree); + return tvb_captured_length(tvb); + + case DECRYPT_PACKET_DECRYPT_FAILED: + expert_add_info(pinfo, proto_root, &ei_mle_decrypt_failed); + call_data_dissector(payload_tvb, pinfo, tree); + return tvb_captured_length(tvb); + + case DECRYPT_PACKET_MIC_CHECK_FAILED: + expert_add_info(pinfo, proto_root, &ei_mle_mic_check_failed); + proto_item_append_text(mic_item, " [incorrect]"); + /* + * Abort only if the payload was encrypted, in which case we + * probably didn't decrypt the packet right (eg: wrong key). + */ + if (IEEE802154_IS_ENCRYPTED(packet->security_level)) { + mic_ok = FALSE; + } + break; + case DECRYPT_NOT_ENCRYPTED: + default: + break; + } + /* This can cause a lot of problems so remove it by default */ + if (!mic_ok && mle_mic_ok) { + call_data_dissector(payload_tvb, pinfo, tree); + col_add_fstr(pinfo->cinfo, COL_INFO, "MIC Failed"); + return tvb_captured_length(tvb); + } + + /***** NEW CODE HERE ****/ + /* If we're good, carry on and display the MLE payload */ + offset = 0; + + /* MLE Command */ + proto_tree_add_item(mle_tree, hf_mle_command, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + + cmd = tvb_get_guint8(payload_tvb, offset); + col_add_str(pinfo->cinfo, COL_INFO, val_to_str(cmd, mle_command_vals, "Unknown (%x)")); + + offset++; + + /* MLE TLVs */ + while (tvb_offset_exists(payload_tvb, offset)) { + + /* Get the length ahead of time to pass to next function so we can highlight + proper amount of bytes */ + tlv_len = tvb_get_guint8(payload_tvb, offset+1); + + ti = proto_tree_add_item(mle_tree, hf_mle_tlv, payload_tvb, offset, tlv_len+2, ENC_NA); + tlv_tree = proto_item_add_subtree(ti, ett_mle_tlv); + + /* Type */ + proto_tree_add_item(tlv_tree, hf_mle_tlv_type, payload_tvb, offset, 1, ENC_NA); + tlv_type = tvb_get_guint8(payload_tvb, offset); + offset++; + + /* Add value name to value root label */ + proto_item_append_text(ti, " (%s", val_to_str(tlv_type, mle_tlv_vals, "Unknown (%d)")); + + /* Length */ + proto_tree_add_item(tlv_tree, hf_mle_tlv_length, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + + switch(tlv_type){ + case MLE_TLV_SOURCE_ADDRESS: + { + gboolean haveShortTLV = FALSE; + guint16 shortAddr = 0; + + if (!((tlv_len == 2) || (tlv_len == 8))) { + /* TLV Length must be 2 or 8 */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + offset += tlv_len; + } else { + if (tlv_len == 2) { + haveShortTLV = TRUE; + shortAddr = tvb_get_ntohs(payload_tvb, offset); + } + + proto_tree_add_item(tlv_tree, hf_mle_tlv_source_addr, payload_tvb, offset, tlv_len, ENC_NA); + proto_item_append_text(ti, " = "); + while (tlv_len) { + guint8 addr; + addr = tvb_get_guint8(payload_tvb, offset); + proto_item_append_text(ti, "%02x", addr); + if (--tlv_len) { + proto_item_append_text(ti, ":"); + } + offset++; + } + if ((original_packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) && haveShortTLV) { + /* Source TLV: use this to update src/long mapping */ + ieee802154_addr_update(&ieee802154_map, shortAddr, original_packet->src_pan, original_packet->src64, pinfo->current_proto, pinfo->fd->num); + } + } + proto_item_append_text(ti, ")"); + } + break; + + case MLE_TLV_MODE: + if (tlv_len == 1) { + guint8 capability; + + capability = tvb_get_guint8(payload_tvb, offset); + proto_item_append_text(ti, " = %02x)", capability); + /* Get and display capability info. (blatantly plagiarised from packet-ieee802154.c */ + proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_nwk_data, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_device_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_sec_data_req, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_idle_rx, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + } + else { + /* TLV Length must be 1 */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } + offset += tlv_len; + break; + + case MLE_TLV_TIMEOUT: + if (tlv_len != 4) { + /* TLV Length must be 4 */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + guint32 to_data = 0; + proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_timeout, payload_tvb, offset, 4, ENC_BIG_ENDIAN, &to_data); + proto_item_append_text(ti, " = %d", (guint16)to_data); + } + proto_item_append_text(ti, ")"); + offset += tlv_len; + break; + + case MLE_TLV_CHALLENGE: + proto_tree_add_item(tlv_tree, hf_mle_tlv_challenge, payload_tvb, offset, tlv_len, ENC_NA); + proto_item_append_text(ti, " = %s)", tvb_bytes_to_str(pinfo->pool, payload_tvb, offset, tlv_len)); + offset += tlv_len; + break; + + case MLE_TLV_RESPONSE: + proto_tree_add_item(tlv_tree, hf_mle_tlv_response, payload_tvb, offset, tlv_len, ENC_NA); + proto_item_append_text(ti, " = %s)", tvb_bytes_to_str(pinfo->pool, payload_tvb, offset, tlv_len)); + offset += tlv_len; + break; + + case MLE_TLV_LINK_LAYER_FRAME_COUNTER: + case MLE_TLV_MLE_FRAME_COUNTER: + if (tlv_len != 4) { + /* TLV Length must be 4 */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + guint32 cntr; + + if (tlv_type == MLE_TLV_LINK_LAYER_FRAME_COUNTER) { + proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_ll_frm_cntr, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN, &cntr); + } else { + proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_mle_frm_cntr, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN, &cntr); + } + proto_item_append_text(ti, " = %u", cntr); + } + proto_item_append_text(ti, ")"); + offset += tlv_len; + break; + + case MLE_TLV_LINK_QUALITY: + { + guint numNeighbors; + guint8 size = tvb_get_guint8(payload_tvb, offset) & LQI_FLAGS_SIZE; + proto_tree *neig_tree; + proto_tree_add_item(tlv_tree, hf_mle_tlv_lqi_c, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(tlv_tree, hf_mle_tlv_lqi_size, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + + if ((tlv_len - 1) % (size + 3)) { + expert_add_info(pinfo, proto_root, &ei_mle_len_size_mismatch); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + numNeighbors = 0; + } else { + numNeighbors = (tlv_len - 1) / (size + 3); + } + + if (numNeighbors == 0) { + proto_item_append_text(ti, ")"); + } else if (numNeighbors == 1) { + proto_item_append_text(ti, ": 1 Neighbor)"); + } else { + proto_item_append_text(ti, ": %d Neighbors)", numNeighbors); + } + + /* Add subtrees */ + + //Size is off by 1 + size++; + + while (numNeighbors) { + ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_neighbor, payload_tvb, offset, size+2, ENC_NA); + neig_tree = proto_item_add_subtree(ti, ett_mle_neighbor); + + proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagI, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagO, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagP, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + + proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_idr, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + + proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_addr, payload_tvb, offset,size, ENC_NA); + offset += size; + + numNeighbors--; + } + } + break; + + case MLE_TLV_NETWORK_PARAMETER: + { + guint8 param_id = tvb_get_guint8(payload_tvb, offset); + + proto_item_append_text(ti, " = %s)", val_to_str(param_id, mle_tlv_nwk_param_vals, "Unknown (%d)")); + + proto_tree_add_item(tlv_tree, hf_mle_tlv_network_param_id, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_network_delay, payload_tvb, offset, 4, ENC_BIG_ENDIAN); + offset += 4; + + switch (param_id) { + case NETWORK_PARAM_ID_CHANNEL: + proto_tree_add_item(tlv_tree, hf_mle_tlv_network_channel, payload_tvb, offset, 2, ENC_BIG_ENDIAN); + offset += 2; + break; + case NETWORK_PARAM_ID_PAN_ID: + proto_tree_add_item(tlv_tree, hf_mle_tlv_network_pan_id, payload_tvb, offset, 2, ENC_BIG_ENDIAN); + offset += 2; + break; + case NETWORK_PARAM_ID_PERMIT_JOIN: + proto_tree_add_item(tlv_tree, hf_mle_tlv_network_pmt_join, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + break; + case NETWORK_PARAM_ID_BCN_PAYLOAD: + proto_tree_add_item(tlv_tree, hf_mle_tlv_network_bcn_payload, payload_tvb, offset, tlv_len-5, ENC_NA); + offset += tlv_len-5; + break; + default: + proto_tree_add_item(tlv_tree, hf_mle_tlv_network_unknown, payload_tvb, offset, tlv_len-5, ENC_NA); + offset += tlv_len-5; + break; + } + } + break; + + case MLE_TLV_ROUTE64: + { + proto_tree *rtr_tree; + guint i, j; + guint8 count; + guint64 id_mask, test_mask; + + proto_item_append_text(ti, ")"); + proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_id_seq, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + + /* Count number of table entries */ + count = 0; + for (i = 0; i < 8; i++) { /* TODO magic - number of routers/8 */ + guint8 id_mask_octet = tvb_get_guint8(payload_tvb, offset + i); + for (j = 0; j < 8; j++) { + if (id_mask_octet & (1 << j)) { + count++; + } + } + } + + /* + * | | | | | | | | | | |1|1|1|1|1|1|...|6| + * |0|1|2|3|4|5|6|7|8|9|0|1|2|3|4|5|...|3| + * --------------------------------------- + * |1|0|1|1|1|0|0|0|1|1|0|0|0|1|0|1|... + * + * is sent as 0xb8, 0xc5 + * and represents table entry for routers 0, 2, 3, 4, 8, 9, 13, 15... + */ + /* Get the ID mask as a 64-bit number (BE) */ + id_mask = tvb_get_ntoh64(payload_tvb, offset); + + /* Just show the string of octets - best representation for a bit mask */ + proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_id_mask, payload_tvb, offset, 8, ENC_NA); + offset += 8; + + if (count != (tlv_len - 9)) + { + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + offset += (tlv_len - 9); + } else { + /* Add subtrees */ + for (i = 0; i < count; i++) { + /* Find first bit set */ + for (j = 0, test_mask = (G_GUINT64_CONSTANT(1) << 63); test_mask != 1; test_mask >>= 1, j++) { + if (test_mask & id_mask) { + id_mask &= ~test_mask; + break; + } + } + ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_entry, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_item_append_text(ti, " (%d)", j); + rtr_tree = proto_item_add_subtree(ti, ett_mle_router); + + proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_nbr_out, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_nbr_in, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_cost, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + } + } + } + break; + + case MLE_TLV_ADDRESS16: + if (tlv_len != 2) { + /* TLV Length must be 2 */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + guint16 addr16 = tvb_get_ntohs(payload_tvb, offset); + proto_item_append_text(ti, " = "); + { + guint8 a16_len = 2; /* Fix it at 2 */ + guint stroffset = offset; + + while (a16_len) { + guint8 a16_data; + a16_data = tvb_get_guint8(payload_tvb, stroffset); + proto_item_append_text(ti, "%02x", a16_data); + if (--a16_len) { + proto_item_append_text(ti, ":"); + } + stroffset++; + } + } + proto_tree_add_item(tlv_tree, hf_mle_tlv_addr16, payload_tvb, offset, 2, ENC_NA); + if (original_packet->dst_addr_mode == IEEE802154_FCF_ADDR_EXT) { + /* Allocated Address16 TLV: use this to update dst/long mapping */ + ieee802154_addr_update(&ieee802154_map, addr16, original_packet->dst_pan, original_packet->dst64, pinfo->current_proto, pinfo->fd->num); + } + } + proto_item_append_text(ti, ")"); + offset += tlv_len; + break; + + case MLE_TLV_LEADER_DATA: + proto_item_append_text(ti, ")"); + if (tlv_len != 8) { + /* TLV Length must be 8 */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + offset += tlv_len; + } else { + proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_partition_id, payload_tvb, offset, 4, ENC_BIG_ENDIAN); + offset += 4; + proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_weighting, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_version, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_stable_version, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_router_id, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + } + break; + + case MLE_TLV_NETWORK_DATA: + { + tvbuff_t *sub_tvb; + proto_item_append_text(ti, ")"); + if (tlv_len > 0) { + sub_tvb = tvb_new_subset_length(payload_tvb, offset, tlv_len); + call_dissector(thread_nwd_handle, sub_tvb, pinfo, tlv_tree); + } + offset += tlv_len; + } + break; + + case MLE_TLV_ACTIVE_OP_DATASET: + case MLE_TLV_PENDING_OP_DATASET: + case MLE_TLV_THREAD_DISCOVERY: + { + tvbuff_t *sub_tvb; + proto_item_append_text(ti, ")"); + if (tlv_len > 0) { + sub_tvb = tvb_new_subset_length(payload_tvb, offset, tlv_len); + call_dissector(thread_mc_handle, sub_tvb, pinfo, tlv_tree); + } + offset += tlv_len; + } + break; + + case MLE_TLV_TLV_REQUEST: + proto_item_append_text(ti, ")"); + while (tlv_len) { + proto_tree_add_item(tlv_tree, hf_mle_tlv_type, payload_tvb, offset, 1, ENC_NA); + offset++; + tlv_len--; + } + break; + + case MLE_TLV_SCAN_MASK: + if (tlv_len != 1) { + /* TLV Length must be 1 */ + proto_item_append_text(ti, ")"); + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + guint8 mask; + + mask = tvb_get_guint8(payload_tvb, offset); + proto_item_append_text(ti, " = %02x)", mask); + proto_tree_add_item(tlv_tree, hf_mle_tlv_scan_mask_r, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(tlv_tree, hf_mle_tlv_scan_mask_e, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + } + offset += tlv_len; + break; + + case MLE_TLV_CONNECTIVITY: + proto_item_append_text(ti, ")"); + if ((tlv_len == 7) || (tlv_len == 10)) { + proto_tree *fl_tree; + + ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_flags, payload_tvb, offset, 1, ENC_NA); + fl_tree = proto_item_add_subtree(ti, ett_mle_conn_flg); + proto_tree_add_item(fl_tree, hf_mle_tlv_conn_flags_pp, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq3, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq2, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq1, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_leader_cost, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_id_seq, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_active_rtrs, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + if (tlv_len == 10) { + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_sed_buf_size, payload_tvb, offset, 2, ENC_BIG_ENDIAN); + offset += 2; + proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_sed_dgram_cnt, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + } + } else { + /* TLV Length must be 7 (old style) or 10 */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + offset += tlv_len; + } + break; + + case MLE_TLV_LINK_MARGIN: + if (tlv_len != 1) { + /* TLV Length must be 1 */ + proto_item_append_text(ti, ")"); + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + guint8 link_margin; + + link_margin = tvb_get_guint8(payload_tvb, offset); + proto_item_append_text(ti, " = %udB)", link_margin); + proto_tree_add_item(tlv_tree, hf_mle_tlv_link_margin, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN); + } + offset += tlv_len; + break; + + case MLE_TLV_STATUS: + if (tlv_len != 1) { + /* TLV Length must be 1 */ + proto_item_append_text(ti, ")"); + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + guint8 stat; + + stat = tvb_get_guint8(payload_tvb, offset); + proto_item_append_text(ti, " = %d)", stat); + proto_tree_add_item(tlv_tree, hf_mle_tlv_status, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN); + } + offset += tlv_len; + break; + + case MLE_TLV_VERSION: + if (tlv_len != 2) { + /* TLV Length must be 2 */ + proto_item_append_text(ti, ")"); + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + guint16 version; + + version = tvb_get_ntohs(payload_tvb, offset); + proto_item_append_text(ti, " = %d)", version); + proto_tree_add_item(tlv_tree, hf_mle_tlv_version, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN); + } + offset += tlv_len; + break; + + case MLE_TLV_ADDRESS_REGISTRATION: + { + guint8 iid_type, i; + guint8 entries = 0; + gint16 check_len = tlv_len; + guint check_offset = offset; + + /* Check consistency of entries */ + while (check_len > 0) { + guint8 ar_len; + + iid_type = tvb_get_guint8(payload_tvb, check_offset); + if (iid_type & ADDR_REG_MASK_IID_TYPE_MASK) { + ar_len = 9; + } else { + ar_len = 17; + } + check_offset += ar_len; + check_len -= ar_len; + entries++; + } + + proto_item_append_text(ti, ")"); + if (check_len != 0) { + /* Not an integer number of entries */ + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + offset += tlv_len; + } else { + for (i = 0; i < entries; i++) { + proto_tree *ar_tree; + + ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_addr_reg_entry, payload_tvb, offset, 1, ENC_NA); + ar_tree = proto_item_add_subtree(ti, ett_mle_addr_reg); + iid_type = tvb_get_guint8(payload_tvb, offset); + if (iid_type & ADDR_REG_MASK_IID_TYPE_MASK) { + proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_cid, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid, payload_tvb, offset, 8, ENC_NA); + offset += 8; + } else { + proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + offset++; + proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_ipv6, payload_tvb, offset, 16, ENC_NA); + offset += 16; + } + } + } + } + break; + + case MLE_TLV_CHANNEL: + { + proto_item_append_text(ti, ")"); + + /* Check length is consistent */ + if (tlv_len != 3) { + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + /* Channel page */ + proto_tree_add_item(tlv_tree, hf_mle_tlv_channel_page, payload_tvb, offset, 1, ENC_BIG_ENDIAN); + /* Channel */ + proto_tree_add_item(tlv_tree, hf_mle_tlv_channel, payload_tvb, offset+1, 2, ENC_BIG_ENDIAN); + } + offset += tlv_len; + } + break; + + case MLE_TLV_PAN_ID: + { + proto_item_append_text(ti, ")"); + + /* Check length is consistent */ + if (tlv_len != 2) { + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + /* PAN ID */ + proto_tree_add_item(tlv_tree, hf_mle_tlv_pan_id, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN); + } + offset += tlv_len; + } + break; + + case MLE_TLV_ACTIVE_TSTAMP: + case MLE_TLV_PENDING_TSTAMP: + { + nstime_t timestamp; + + proto_item_append_text(ti, ")"); + + if (tlv_len != 8) { + expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + } else { + /* Fill in the nstime_t structure */ + timestamp.secs = (time_t)tvb_get_ntoh48(payload_tvb, offset); + timestamp.nsecs = (int)lround((double)(tvb_get_ntohs(payload_tvb, offset + 6) >> 1) * MLE_32768_TO_NSEC_FACTOR); + if (tlv_type == MLE_TLV_ACTIVE_TSTAMP) { + proto_tree_add_time(tlv_tree, hf_mle_tlv_active_tstamp, payload_tvb, offset, 8, ×tamp); + } else { + proto_tree_add_time(tlv_tree, hf_mle_tlv_pending_tstamp, payload_tvb, offset, 8, ×tamp); + } + } + offset += tlv_len; + } + break; + + default: + proto_item_append_text(ti, ")"); + proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA); + offset += tlv_len; + } + } + + return tvb_captured_length(tvb); +} + +void +proto_register_mle(void) +{ + static hf_register_info hf[] = { + + /* Auxiliary Security Header Fields */ + /*----------------------------------*/ + { &hf_mle_security_suite, + { "Security Suite", + "mle.sec_suite", + FT_UINT8, BASE_HEX, VALS(mle_sec_suite_names), 0x0, + "The Security Suite of the frame", + HFILL + } + }, + + { &hf_mle_mic, + { "Decrypted MIC", + "mle.mic", + FT_BYTES, BASE_NONE, NULL, 0x0, + "The decrypted MIC", + HFILL + } + }, + + /*MLE Command*/ + { &hf_mle_command, + { "Command", + "mle.cmd", + FT_UINT8, BASE_DEC, VALS(mle_command_vals), 0x0, + "MLE command type", + HFILL + } + }, + + /* Generic TLV */ + { &hf_mle_tlv, + { "TLV", + "mle.tlv", + FT_NONE, BASE_NONE, NULL, 0x0, + "Type-Length-Value", + HFILL + } + }, + + { &hf_mle_tlv_type, + { "Type", + "mle.tlv.type", + FT_UINT8, BASE_DEC, VALS(mle_tlv_vals), 0x0, + "Type of value", + HFILL + } + }, + + { &hf_mle_tlv_length, + { "Length", + "mle.tlv.len", + FT_UINT8, BASE_DEC, NULL, 0x0, + "Length of value", + HFILL + } + }, + + /* Type-Specific TLV Fields */ + { &hf_mle_tlv_source_addr, + { "Address", + "mle.tlv.source_addr", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Source address", + HFILL + } + }, + + /* Capability Information Fields */ + { &hf_mle_tlv_mode_nwk_data, + { "Network Data", + "mle.tlv.mode.nwk_data", + FT_BOOLEAN, 8, TFS(&mle_tlv_mode_nwk_data), MLE_CMD_CINFO_NWK_DATA, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_mode_device_type, + { "Device Type", + "mle.tlv.mode.device_type", + FT_BOOLEAN, 8, TFS(&mle_tlv_mode_device_type), IEEE802154_CMD_CINFO_DEVICE_TYPE, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_mode_sec_data_req, + { "Secure Data Requests", + "mle.tlv.mode.sec_data_req", + FT_BOOLEAN, 8, NULL, MLE_CMD_CINFO_SEC_DATA_REQ, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_mode_idle_rx, + { "Receive On When Idle", + "mle.tlv.mode.idle_rx", + FT_BOOLEAN, 8, NULL, IEEE802154_CMD_CINFO_IDLE_RX, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_timeout, + { "Timeout", + "mle.tlv.timeout", + FT_UINT32, BASE_DEC, NULL, 0x0, + "Expected interval between transmissions in seconds", + HFILL + } + }, + + { &hf_mle_tlv_challenge, + { "Challenge", + "mle.tlv.challenge", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Challenge to be echoed back", + HFILL + } + }, + + { &hf_mle_tlv_response, + { "Response", + "mle.tlv.response", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Response to a challenge", + HFILL + } + }, + + { &hf_mle_tlv_ll_frm_cntr, + { "Link Layer Frame Counter", + "mle.tlv.ll_frm_cntr", + FT_UINT32, BASE_DEC, NULL, 0x0, + "The Link layer frame counter", + HFILL + } + }, + + { &hf_mle_tlv_mle_frm_cntr, + { "MLE Frame Counter", + "mle.tlv.mle_frm_cntr", + FT_UINT32, BASE_DEC, NULL, 0x0, + "The MLE frame counter", + HFILL + } + }, + + { &hf_mle_tlv_unknown, + { "Unknown", + "mle.tlv.unknown", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Unknown TLV, raw value", + HFILL + } + }, + + { &hf_mle_tlv_lqi_c, + { "Complete Flag", + "mle.tlv.lqi.complete", + FT_BOOLEAN, 8, NULL, LQI_FLAGS_C, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_lqi_size, + { "Address Size", + "mle.tlv.lqi.size", + FT_UINT8, BASE_DEC, NULL, LQI_FLAGS_SIZE, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_neighbor, + { "Neighbor Record", + "mle.tlv.neighbor", + FT_NONE, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_neighbor_flagI, + { "Incoming", + "mle.tlv.neighbor.flagI", + FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_I, + "Set if the sender has configured its link with this neighbor and will accept incoming messages from them.", + HFILL + } + }, + + { &hf_mle_tlv_neighbor_flagO, + { "Outgoing", + "mle.tlv.neighbor.flagO", + FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_O, + "Set if the sender believes that the neighbor has configured its link with the sender and will accept incoming messages from the sender.", + HFILL + } + }, + + { &hf_mle_tlv_neighbor_flagP, + { "Priority", + "mle.tlv.neighbor.flagP", + FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_P, + "Set if the sender expects to use this link for sending messages to this neighbor.", + HFILL + } + }, + + { &hf_mle_tlv_neighbor_idr, + { "Inverse Delivery Ratio", + "mle.tlv.neighbor.idr", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_neighbor_addr, + { "Address", + "mle.tlv.neighbor.addr", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_network_param_id, + { "Parameter ID", + "mle.tlv.network.param_id", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_network_delay, + { "Delay", + "mle.tlv.network.delay", + FT_UINT32, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_network_channel, + { "Channel", + "mle.tlv.network.channel", + FT_UINT16, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_network_pan_id, + { "PAN ID", + "mle.tlv.network.pan_id", + FT_UINT16, BASE_HEX, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_network_pmt_join, + { "Permit Join", + "mle.tlv.network.pmt_join", + FT_BOOLEAN, 8, NULL, 0x1, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_network_bcn_payload, + { "Beacon Payload", + "mle.tlv.network.bcn_payload", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_route64_id_seq, + { "ID Sequence", + "mle.tlv.route64.id_seq", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_route64_id_mask, + { "Assigned Router ID Mask", + "mle.tlv.route64.id_mask", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_route64_entry, + { "Routing Table Entry", + "mle.tlv.route64", + FT_UINT8, BASE_HEX, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_route64_nbr_out, + { "Neighbor Out Link Quality", + "mle.tlv.route64.nbr_out", + FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_OUT_MASK, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_route64_nbr_in, + { "Neighbor In Link Quality", + "mle.tlv.route64.nbr_in", + FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_IN_MASK, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_route64_cost, + { "Router Cost", + "mle.tlv.route64.cost", + FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_COST_MASK, + NULL, + HFILL + } + }, +#if 0 + { &hf_mle_tlv_route64_unknown, + { "(unknown)", + "mle.tlv.route64.unknown", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, +#endif + { &hf_mle_tlv_addr16, + { "Address16", + "mle.tlv.addr16", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_leader_data_partition_id, + { "Partition ID", + "mle.tlv.leader_data.partition_id", + FT_UINT32, BASE_HEX, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_leader_data_weighting, + { "Weighting", + "mle.tlv.leader_data.weighting", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_leader_data_version, + { "Data Version", + "mle.tlv.leader_data.data_version", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_leader_data_stable_version, + { "Stable Data Version", + "mle.tlv.leader_data.stable_data_version", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_leader_data_router_id, + { "Leader Router ID", + "mle.tlv.leader_data.router_id", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, +#if 0 + { &hf_mle_tlv_network_data, + { "Network Data", + "mle.tlv.network_data", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Network data (opaque data)", + HFILL + } + }, +#endif + { &hf_mle_tlv_scan_mask_r, + { "Router", + "mle.tlv.scan_mask.r", + FT_BOOLEAN, 8, NULL, SCAN_MASK_R_MASK, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_scan_mask_e, + { "End Device", + "mle.tlv.scan_mask.e", + FT_BOOLEAN, 8, NULL, SCAN_MASK_D_MASK, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_flags, + { "Flags", + "mle.tlv.conn.flags", + FT_NONE, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_flags_pp, + { "Parent Priority", + "mle.tlv.conn.flags.pp", + FT_INT8, BASE_DEC, VALS(mle_conn_tlv_flags_pp_enums), CONN_MASK_FLAGS_PP_MASK, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_lq3, + { "Link Quality 3", + "mle.tlv.conn.lq3", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_lq2, + { "Link Quality 2", + "mle.tlv.conn.lq2", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_lq1, + { "Link Quality 1", + "mle.tlv.conn.lq1", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_leader_cost, + { "Leader Cost", + "mle.tlv.conn.leader_cost", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_id_seq, + { "ID Sequence", + "mle.tlv.conn.id_seq", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_active_rtrs, + { "Active Routers", + "mle.tlv.conn.active_rtrs", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_sed_buf_size, + { "SED Buffer Size", + "mle.tlv.conn.sed_buf_size", + FT_UINT16, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_conn_sed_dgram_cnt, + { "SED Datagram Count", + "mle.tlv.conn.sed_dgram_cnt", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_link_margin, + { "Link Margin", + "mle.tlv.link_margin", + FT_UINT8, BASE_DEC, NULL, 0, + "Link margin in dB", + HFILL + } + }, + + { &hf_mle_tlv_status, + { "Status", + "mle.tlv.status", + FT_UINT8, BASE_DEC, VALS(mle_status_tlv_enums), 0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_version, + { "Version", + "mle.tlv.version", + FT_UINT16, BASE_DEC, NULL, 0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_addr_reg_entry, + { "Address Registration Entry", + "mle.tlv.addr_reg", + FT_NONE, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_addr_reg_iid_type, + { "IID type", + "mle.tlv.addr_reg_iid_type", + FT_BOOLEAN, 8, TFS(&mle_tlv_addr_reg_iid_type), ADDR_REG_MASK_IID_TYPE_MASK, + "Context ID", + HFILL + } + }, + + { &hf_mle_tlv_addr_reg_cid, + { "Context ID", + "mle.tlv.addr_reg_cid", + FT_UINT8, BASE_DEC, NULL, ADDR_REG_MASK_CID_MASK, + "6LoWPAN Context ID", + HFILL + } + }, + + { &hf_mle_tlv_addr_reg_iid, + { "IID", + "mle.tlv.addr_reg_iid", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Interface identifier", + HFILL + } + }, + + { &hf_mle_tlv_addr_reg_ipv6, + { "IPv6 Address", + "mle.tlv.addr_reg_ipv6", + FT_IPv6, BASE_NONE, NULL, 0x0, + "IID", + HFILL + } + }, +#if 0 + { &hf_mle_tlv_hold_time, + { "Hold Time", + "mle.tlv.hold_time", + FT_UINT16, BASE_DEC, NULL, 0, + NULL, + HFILL + } + }, +#endif + { &hf_mle_tlv_network_unknown, + { "(unknown)", + "mle.tlv.network.unknown", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_channel_page, + { "Channel Page", + "mle.tlv.channel_page", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_channel, + { "Channel", + "mle.tlv.channel", + FT_UINT16, BASE_DEC, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_pan_id, + { "PAN ID", + "mle.tlv.pan_id", + FT_UINT16, BASE_HEX, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_active_tstamp, + { "Active Timestamp", + "mle.tlv.active_tstamp", + FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0, + NULL, + HFILL + } + }, + + { &hf_mle_tlv_pending_tstamp, + { "Pending Timestamp", + "mle.tlv.pending_tstamp", + FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0, + NULL, + HFILL + } + }, +#if 0 + { &hf_mle_tlv_active_op_dataset, + { "Active Operational Dataset", + "mle.tlv.active_op_dataset", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Thread Active Operational Dataset", + HFILL + } + }, + { &hf_mle_tlv_pending_op_dataset, + { "Pending Operational Dataset", + "mle.tlv.pending_op_dataset", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Thread Pending Operational Dataset", + HFILL + } + }, +#endif + }; + + static gint *ett[] = { + &ett_mle, + &ett_mle_auxiliary_security, + &ett_mle_aux_sec_control, + &ett_mle_aux_sec_key_id, + &ett_mle_tlv, + &ett_mle_neighbor, + &ett_mle_router, + &ett_mle_addr_reg, + &ett_mle_conn_flg, + &ett_mle_thread_nwd +}; + + static ei_register_info ei[] = { + { &ei_mle_cbc_mac_failed, { "mle.cbc_mac_failed", PI_UNDECODED, PI_WARN, "Call to ccm_cbc_mac() failed", EXPFILL }}, + { &ei_mle_packet_too_small, { "mle.packet_too_small", PI_UNDECODED, PI_WARN, "Packet was too small to include the CRC and MIC", EXPFILL }}, + { &ei_mle_no_key, { "mle.no_key", PI_UNDECODED, PI_WARN, "No encryption key set - can't decrypt", EXPFILL }}, + { &ei_mle_decrypt_failed, { "mle.decrypt_failed", PI_UNDECODED, PI_WARN, "Decrypt failed", EXPFILL }}, + { &ei_mle_mic_check_failed, { "mle.mic_check_failed", PI_UNDECODED, PI_WARN, "MIC check failed", EXPFILL }}, + { &ei_mle_tlv_length_failed, { "mle.tlv_length_failed", PI_UNDECODED, PI_WARN, "TLV Length inconsistent", EXPFILL }}, + { &ei_mle_len_size_mismatch, { "mle.len_size_mismatch", PI_UNDECODED, PI_WARN, "TLV Length & Size field disagree", EXPFILL }}, + }; + + module_t *mle_module; + expert_module_t* expert_mle; + + proto_mle = proto_register_protocol("Mesh Link Establishment", "MLE", "mle"); + proto_register_field_array(proto_mle, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + expert_mle = expert_register_protocol(proto_mle); + expert_register_field_array(expert_mle, ei, array_length(ei)); + + mle_handle = register_dissector("mle", dissect_mle, proto_mle); + + mle_module = prefs_register_protocol(proto_mle, NULL); + + prefs_register_bool_preference(mle_module, "meshlink_mic_ok", + "Dissect only good MIC", + "Dissect payload only if MIC is valid.", + &mle_mic_ok); + + /* setup registration for other dissectors to provide mle key hash algorithms */ + mle_key_hash_handlers = wmem_tree_new(wmem_epan_scope()); +} + +void +proto_reg_handoff_mle(void) +{ + thread_nwd_handle = find_dissector_add_dependency("thread_nwd", proto_mle); + thread_mc_handle = find_dissector_add_dependency("thread_meshcop", proto_mle); + + //heur_dissector_add("stun", dissect_embeddedmle_heur, proto_mle); + + dissector_add_uint_range_with_preference("udp.port", UDP_PORT_MLE_RANGE, mle_handle); + + proto_ieee802154 = proto_get_id_by_filter_name(IEEE802154_PROTOABBREV_WPAN); +} + +/* + * Editor modelines - https://www.wireshark.org/tools/modelines.html + * + * Local variables: + * c-basic-offset: 2 + * tab-width: 8 + * indent-tabs-mode: nil + * End: + * + * vi: set shiftwidth=2 tabstop=8 expandtab + * :indentSize=2:tabSize=8:noTabs=true: + */ |