summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-mle.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-mle.c
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-mle.c')
-rw-r--r--epan/dissectors/packet-mle.c2022
1 files changed, 2022 insertions, 0 deletions
diff --git a/epan/dissectors/packet-mle.c b/epan/dissectors/packet-mle.c
new file mode 100644
index 00000000..790e7de8
--- /dev/null
+++ b/epan/dissectors/packet-mle.c
@@ -0,0 +1,2022 @@
+/* packet-mle.c
+ * Routines for MLE packet dissection
+ *
+ * Colin O'Flynn <coflynn@newae.com>
+ *
+ * The entire security section of this is lifted from the IEEE 802.15.4
+ * dissectory, as this is done the same way. Should eventually make the
+ * two use some common functions or something. But that section is:
+ * By Owen Kirby <osk@exegin.com>
+ * Copyright 2007 Exegin Technologies Limited
+ *
+ * Thread parts added by Robert Cragie <robert.cragie@arm.com>
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "config.h"
+
+#include <math.h>
+#include <epan/packet.h>
+#include <epan/conversation.h>
+#include <epan/proto_data.h>
+#include <epan/wmem_scopes.h>
+#include <epan/expert.h>
+#include <epan/prefs.h>
+#include <epan/strutil.h>
+#include <epan/to_str.h>
+#include "packet-ieee802154.h"
+#include "packet-mle.h"
+
+#define MLE_32768_TO_NSEC_FACTOR ((double)30517.578125)
+
+/* Forward declarations */
+void proto_register_mle(void);
+void proto_reg_handoff_mle(void);
+
+static int proto_mle = -1;
+static int proto_ieee802154 = -1; /* cache 802.15.4 protocol ID */
+
+/* Registered fields for Auxiliary Security Header */
+static int hf_mle_security_suite = -1;
+static int hf_mle_mic = -1;
+
+static int hf_mle_command = -1;
+static int hf_mle_tlv = -1;
+static int hf_mle_tlv_type = -1;
+static int hf_mle_tlv_length = -1;
+static int hf_mle_tlv_source_addr = -1;
+static int hf_mle_tlv_mode_device_type = -1;
+static int hf_mle_tlv_mode_idle_rx = -1;
+static int hf_mle_tlv_mode_sec_data_req = -1;
+static int hf_mle_tlv_mode_nwk_data = -1;
+static int hf_mle_tlv_timeout = -1;
+static int hf_mle_tlv_challenge = -1;
+static int hf_mle_tlv_response = -1;
+static int hf_mle_tlv_ll_frm_cntr = -1;
+static int hf_mle_tlv_lqi_c = -1;
+static int hf_mle_tlv_lqi_size = -1;
+static int hf_mle_tlv_neighbor = -1;
+static int hf_mle_tlv_neighbor_flagI = -1;
+static int hf_mle_tlv_neighbor_flagO = -1;
+static int hf_mle_tlv_neighbor_flagP = -1;
+static int hf_mle_tlv_neighbor_idr = -1;
+static int hf_mle_tlv_neighbor_addr = -1;
+static int hf_mle_tlv_network_param_id = -1;
+static int hf_mle_tlv_network_delay = -1;
+static int hf_mle_tlv_network_channel = -1;
+static int hf_mle_tlv_network_pan_id = -1;
+static int hf_mle_tlv_network_pmt_join = -1;
+static int hf_mle_tlv_network_bcn_payload = -1;
+static int hf_mle_tlv_network_unknown = -1;
+static int hf_mle_tlv_mle_frm_cntr = -1;
+static int hf_mle_tlv_unknown = -1;
+static int hf_mle_tlv_route64_id_seq = -1;
+static int hf_mle_tlv_route64_id_mask = -1;
+static int hf_mle_tlv_route64_entry = -1;
+static int hf_mle_tlv_route64_nbr_out = -1;
+static int hf_mle_tlv_route64_nbr_in = -1;
+static int hf_mle_tlv_route64_cost = -1;
+#if 0
+static int hf_mle_tlv_route64_unknown = -1;
+#endif
+static int hf_mle_tlv_addr16 = -1;
+static int hf_mle_tlv_leader_data_partition_id = -1;
+static int hf_mle_tlv_leader_data_weighting = -1;
+static int hf_mle_tlv_leader_data_version = -1;
+static int hf_mle_tlv_leader_data_stable_version = -1;
+static int hf_mle_tlv_leader_data_router_id = -1;
+#if 0
+static int hf_mle_tlv_network_data = -1;
+#endif
+static int hf_mle_tlv_scan_mask_r = -1;
+static int hf_mle_tlv_scan_mask_e = -1;
+static int hf_mle_tlv_conn_flags = -1;
+static int hf_mle_tlv_conn_flags_pp = -1;
+static int hf_mle_tlv_conn_lq3 = -1;
+static int hf_mle_tlv_conn_lq2 = -1;
+static int hf_mle_tlv_conn_lq1 = -1;
+static int hf_mle_tlv_conn_leader_cost = -1;
+static int hf_mle_tlv_conn_id_seq = -1;
+static int hf_mle_tlv_conn_active_rtrs = -1;
+static int hf_mle_tlv_conn_sed_buf_size = -1;
+static int hf_mle_tlv_conn_sed_dgram_cnt = -1;
+static int hf_mle_tlv_link_margin = -1;
+static int hf_mle_tlv_status = -1;
+static int hf_mle_tlv_version = -1;
+static int hf_mle_tlv_addr_reg_entry = -1;
+static int hf_mle_tlv_addr_reg_iid_type = -1;
+static int hf_mle_tlv_addr_reg_cid = -1;
+static int hf_mle_tlv_addr_reg_iid = -1;
+static int hf_mle_tlv_addr_reg_ipv6 = -1;
+#if 0
+static int hf_mle_tlv_hold_time = -1;
+#endif
+static int hf_mle_tlv_channel_page = -1; /* v1.1-draft-2 */
+static int hf_mle_tlv_channel = -1; /* v1.1-draft-2 */
+static int hf_mle_tlv_pan_id = -1; /* v1.1-draft-2 */
+static int hf_mle_tlv_active_tstamp = -1; /* SPEC-472 */
+static int hf_mle_tlv_pending_tstamp = -1; /* SPEC-472 */
+#if 0
+static int hf_mle_tlv_active_op_dataset = -1; /* SPEC-472 */
+static int hf_mle_tlv_pending_op_dataset = -1; /* SPEC-472 */
+#endif
+
+static gint ett_mle = -1;
+static gint ett_mle_tlv = -1;
+static gint ett_mle_neighbor = -1;
+static gint ett_mle_router = -1;
+static gint ett_mle_addr_reg = -1;
+static gint ett_mle_conn_flg = -1;
+static gint ett_mle_thread_nwd = -1;
+static gint ett_mle_auxiliary_security = -1;
+static gint ett_mle_aux_sec_control = -1;
+static gint ett_mle_aux_sec_key_id = -1;
+
+static expert_field ei_mle_cbc_mac_failed = EI_INIT;
+static expert_field ei_mle_packet_too_small = EI_INIT;
+static expert_field ei_mle_no_key = EI_INIT;
+static expert_field ei_mle_decrypt_failed = EI_INIT;
+static expert_field ei_mle_mic_check_failed = EI_INIT;
+static expert_field ei_mle_tlv_length_failed = EI_INIT;
+static expert_field ei_mle_len_size_mismatch = EI_INIT;
+
+static dissector_handle_t mle_handle;
+static dissector_handle_t thread_nwd_handle;
+static dissector_handle_t thread_mc_handle;
+
+#define UDP_PORT_MLE_RANGE "19788" /* IANA registered */
+
+/* boolean value set if the MIC must be ok before payload is dissected */
+static gboolean mle_mic_ok = FALSE;
+
+static wmem_tree_t* mle_key_hash_handlers;
+
+static const value_string mle_sec_suite_names[] = {
+ { 0, "802.15.4 Security" },
+ { 255, "No Security" },
+ { 0, NULL }
+};
+
+static const value_string mle_status_tlv_enums[] = {
+ { 1, "Error" },
+ { 2, "Duplicate Address Detected" },
+ { 0, NULL }
+};
+
+static const value_string mle_conn_tlv_flags_pp_enums[] = {
+ { 1, "High" },
+ { 0, "Medium" },
+ { -1, "Low" },
+ { 0, NULL }
+};
+
+#define MLE_CMD_REQUEST 0
+#define MLE_CMD_ACCEPT 1
+#define MLE_CMD_ACCEPTREQ 2
+#define MLE_CMD_REJECT 3
+#define MLE_CMD_ADVERTISE 4
+#define MLE_CMD_UPDATE 5
+#define MLE_CMD_UPDATE_REQUEST 6
+#define MLE_CMD_DATA_REQUEST 7
+#define MLE_CMD_DATA_RESPONSE 8
+#define MLE_CMD_PARENT_REQUEST 9
+#define MLE_CMD_PARENT_RESPONSE 10
+#define MLE_CMD_CHILD_ID_REQUEST 11
+#define MLE_CMD_CHILD_ID_RESPONSE 12
+#define MLE_CMD_CHILD_UPDATE_REQUEST 13
+#define MLE_CMD_CHILD_UPDATE_RESPONSE 14
+#define MLE_CMD_ANNOUNCE 15
+#define MLE_CMD_DISCOVERY_REQUEST 16
+#define MLE_CMD_DISCOVERY_RESPONSE 17
+
+static const value_string mle_command_vals[] = {
+ { MLE_CMD_REQUEST, "Link Request" },
+ { MLE_CMD_ACCEPT, "Link Accept" },
+ { MLE_CMD_ACCEPTREQ, "Link Accept and Request" },
+ { MLE_CMD_REJECT, "Link Reject" },
+ { MLE_CMD_ADVERTISE, "Advertisement" },
+ { MLE_CMD_UPDATE, "Update" },
+ { MLE_CMD_UPDATE_REQUEST, "Update Request" },
+ { MLE_CMD_DATA_REQUEST, "Data Request" },
+ { MLE_CMD_DATA_RESPONSE, "Data Response" },
+ { MLE_CMD_PARENT_REQUEST, "Parent Request" },
+ { MLE_CMD_PARENT_RESPONSE, "Parent Response" },
+ { MLE_CMD_CHILD_ID_REQUEST, "Child ID Request" },
+ { MLE_CMD_CHILD_ID_RESPONSE, "Child ID Response" },
+ { MLE_CMD_CHILD_UPDATE_REQUEST, "Child Update Request" },
+ { MLE_CMD_CHILD_UPDATE_RESPONSE, "Child Update Response" },
+ { MLE_CMD_ANNOUNCE, "Announce" },
+ { MLE_CMD_DISCOVERY_REQUEST, "Discovery Request" },
+ { MLE_CMD_DISCOVERY_RESPONSE, "Discovery Response" },
+ { 0, NULL}
+};
+
+#define MLE_TLV_SOURCE_ADDRESS 0
+#define MLE_TLV_MODE 1 /* Modified in Ch04_Mesh Link Establishment */
+#define MLE_TLV_TIMEOUT 2
+#define MLE_TLV_CHALLENGE 3
+#define MLE_TLV_RESPONSE 4
+#define MLE_TLV_LINK_LAYER_FRAME_COUNTER 5
+#define MLE_TLV_LINK_QUALITY 6
+#define MLE_TLV_NETWORK_PARAMETER 7
+#define MLE_TLV_MLE_FRAME_COUNTER 8
+#define MLE_TLV_ROUTE64 9 /* Defined in Ch05_Network Layer v1.1-rc1 */
+#define MLE_TLV_ADDRESS16 10 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_LEADER_DATA 11 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_NETWORK_DATA 12 /* Defined in Ch05_Network Layer v1.1-rc1 */
+#define MLE_TLV_TLV_REQUEST 13 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_SCAN_MASK 14 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_CONNECTIVITY 15 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_LINK_MARGIN 16 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_STATUS 17 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_VERSION 18 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_ADDRESS_REGISTRATION 19 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_CHANNEL 20 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_PAN_ID 21 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_ACTIVE_TSTAMP 22 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_PENDING_TSTAMP 23 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_ACTIVE_OP_DATASET 24 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_PENDING_OP_DATASET 25 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+#define MLE_TLV_THREAD_DISCOVERY 26 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
+
+static const value_string mle_tlv_vals[] = {
+ { MLE_TLV_SOURCE_ADDRESS, "Source Address" },
+ { MLE_TLV_MODE, "Mode" },
+ { MLE_TLV_TIMEOUT, "Timeout" },
+ { MLE_TLV_CHALLENGE, "Challenge" },
+ { MLE_TLV_RESPONSE, "Response" },
+ { MLE_TLV_LINK_LAYER_FRAME_COUNTER, "Link Layer Frame Counter"},
+ { MLE_TLV_LINK_QUALITY, "Link Quality"},
+ { MLE_TLV_NETWORK_PARAMETER, "Network Parameter"},
+ { MLE_TLV_MLE_FRAME_COUNTER, "MLE Frame Counter"},
+ { MLE_TLV_ROUTE64, "Route64"},
+ { MLE_TLV_ADDRESS16, "Address16"},
+ { MLE_TLV_LEADER_DATA, "Leader Data"},
+ { MLE_TLV_NETWORK_DATA, "Network Data"},
+ { MLE_TLV_TLV_REQUEST, "TLV Request"},
+ { MLE_TLV_SCAN_MASK, "Scan Mask"},
+ { MLE_TLV_CONNECTIVITY, "Connectivity"},
+ { MLE_TLV_LINK_MARGIN, "Link Margin"},
+ { MLE_TLV_STATUS, "Status"},
+ { MLE_TLV_VERSION, "Version"},
+ { MLE_TLV_ADDRESS_REGISTRATION, "Address Registration"},
+ { MLE_TLV_CHANNEL, "Channel"},
+ { MLE_TLV_PAN_ID, "PAN ID"},
+ { MLE_TLV_ACTIVE_TSTAMP, "Active Timestamp"},
+ { MLE_TLV_PENDING_TSTAMP, "Pending Timestamp"},
+ { MLE_TLV_ACTIVE_OP_DATASET, "Active Operational Dataset"},
+ { MLE_TLV_PENDING_OP_DATASET, "Pending Operational Dataset"},
+ { MLE_TLV_THREAD_DISCOVERY, "Thread Discovery"},
+ { 0, NULL}
+};
+
+#define LQI_FLAGS_C 0x80
+#define LQI_FLAGS_SIZE 0x0F
+
+#define NEIGHBOR_FLAG_I 0x80
+#define NEIGHBOR_FLAG_O 0x40
+#define NEIGHBOR_FLAG_P 0x20
+
+#define NETWORK_PARAM_ID_CHANNEL 0
+#define NETWORK_PARAM_ID_PAN_ID 1
+#define NETWORK_PARAM_ID_PERMIT_JOIN 2
+#define NETWORK_PARAM_ID_BCN_PAYLOAD 3
+
+static const value_string mle_tlv_nwk_param_vals[] = {
+ { NETWORK_PARAM_ID_CHANNEL, "Channel" },
+ { NETWORK_PARAM_ID_PAN_ID, "PAN ID" },
+ { NETWORK_PARAM_ID_PERMIT_JOIN, "Permit Join" },
+ { NETWORK_PARAM_ID_BCN_PAYLOAD, "Beacon Payload" },
+ { 0, NULL}
+};
+
+static const true_false_string mle_tlv_mode_device_type = {
+ "FFD",
+ "RFD"
+};
+static const true_false_string mle_tlv_mode_nwk_data = {
+ "Full",
+ "Stable"
+};
+static const true_false_string mle_tlv_addr_reg_iid_type = {
+ "Compressed",
+ "Full"
+};
+
+#define ROUTE_TBL_OUT_MASK 0xC0
+#define ROUTE_TBL_IN_MASK 0x30
+#define ROUTE_TBL_COST_MASK 0x0F
+
+#define SCAN_MASK_R_MASK 0x80
+#define SCAN_MASK_D_MASK 0x40
+
+#define CONN_MASK_FLAGS_PP_MASK 0xC0
+
+#define ADDR_REG_MASK_IID_TYPE_MASK 0x80
+#define ADDR_REG_MASK_CID_MASK 0x0F
+
+#define MLE_CMD_CINFO_SEC_DATA_REQ 0x04
+#define MLE_CMD_CINFO_NWK_DATA 0x01
+
+/*FUNCTION:------------------------------------------------------
+ * NAME
+ * dissect_mle_decrypt
+ * DESCRIPTION
+ * MLE dissector.
+ * PARAMETERS
+ * tvbuff_t *tvb - IEEE 802.15.4 packet.
+ * packet_info * pinfo - Packet info structure.
+ * guint offset - Offset where the ciphertext 'c' starts.
+ * ieee802154_packet *packet - IEEE 802.15.4 packet information.
+ * ws_decrypt_status *status - status of decryption returned through here on failure.
+ * RETURNS
+ * tvbuff_t * - Decrypted payload.
+ *---------------------------------------------------------------
+ */
+static tvbuff_t *
+dissect_mle_decrypt(tvbuff_t * tvb,
+ guint offset,
+ packet_info * pinfo,
+ ieee802154_packet * packet,
+ ieee802154_decrypt_info_t* decrypt_info)
+{
+ tvbuff_t * ptext_tvb;
+ gboolean have_mic = FALSE;
+ guint64 srcAddr;
+ unsigned char tmp[16];
+ guint M;
+ gint captured_len;
+ gint reported_len;
+
+ *decrypt_info->rx_mic_length = 0;
+ memset(decrypt_info->rx_mic, 0, 16);
+
+ /* Get the captured and on-the-wire length of the payload. */
+ if (packet->security_level > 0) {
+ M = IEEE802154_MIC_LENGTH(packet->security_level);
+ }
+ else {
+ M = 0;
+ }
+
+ reported_len = tvb_reported_length_remaining(tvb, offset) - M;
+ if (reported_len < 0) {
+ *decrypt_info->status = DECRYPT_PACKET_TOO_SMALL;
+ return NULL;
+ }
+ /* Check if the payload is truncated. */
+ if (tvb_bytes_exist(tvb, offset, reported_len)) {
+ captured_len = reported_len;
+ }
+ else {
+ captured_len = tvb_captured_length_remaining(tvb, offset);
+ }
+
+ if (packet->security_level > 0) {
+ /* Check if the MIC is present in the captured data. */
+ have_mic = tvb_bytes_exist(tvb, offset + reported_len, M);
+ if (have_mic) {
+ tvb_memcpy(tvb, decrypt_info->rx_mic, offset + reported_len, M);
+ }
+ }
+
+ /*=====================================================
+ * Key Lookup - Need to find the appropriate key.
+ *=====================================================
+ */
+ if (packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) {
+ /* The source EUI-64 is included in the headers. */
+ srcAddr = packet->src64; /* GUINT64_SWAP_LE_BE(packet->src64); */
+ }
+ else {
+ /* Lookup failed. */
+ *decrypt_info->status = DECRYPT_PACKET_NO_EXT_SRC_ADDR;
+ return NULL;
+ }
+
+ /*=====================================================
+ * CCM* - CTR mode payload encryption
+ *=====================================================
+ */
+ /* Create the CCM* initial block for decryption (Adata=0, M=0, counter=0). */
+ ccm_init_block(tmp, FALSE, 0, srcAddr, packet->frame_counter, packet->security_level, 0, NULL);
+
+ /* Decrypt the ciphertext, and place the plaintext in a new tvb. */
+ if (IEEE802154_IS_ENCRYPTED(packet->security_level) && captured_len) {
+ gchar *text;
+
+ /*
+ * Make a copy of the ciphertext in heap memory.
+ *
+ * We will decrypt the message in-place and then use the buffer as the
+ * real data for the new tvb.
+ */
+ text = (gchar *)tvb_memdup(pinfo->pool, tvb, offset, captured_len);
+
+ /* Perform CTR-mode transformation. Try both the likely key and the alternate key */
+ if (!ccm_ctr_encrypt(decrypt_info->key, tmp, decrypt_info->rx_mic, text, captured_len)) {
+ *decrypt_info->status = DECRYPT_PACKET_DECRYPT_FAILED;
+ return NULL;
+ }
+
+ /* Create a tvbuff for the plaintext. */
+ ptext_tvb = tvb_new_real_data((const guint8 *)text, captured_len, reported_len);
+ tvb_set_child_real_data_tvbuff(tvb, ptext_tvb);
+ add_new_data_source(pinfo, ptext_tvb, "Decrypted MLE payload");
+ *decrypt_info->status = DECRYPT_PACKET_SUCCEEDED;
+ }
+ /* There is no ciphertext. Wrap the plaintext in a new tvb. */
+ else {
+ /* Decrypt the MIC (if present). */
+ if (have_mic) {
+ if (!ccm_ctr_encrypt(decrypt_info->key, tmp, decrypt_info->rx_mic, NULL, 0)) {
+ *decrypt_info->status = DECRYPT_PACKET_DECRYPT_FAILED;
+ return NULL;
+ }
+ }
+
+ /* Create a tvbuff for the plaintext. This might result in a zero-length tvbuff. */
+ ptext_tvb = tvb_new_subset_length_caplen(tvb, offset, captured_len, reported_len);
+ *decrypt_info->status = DECRYPT_PACKET_SUCCEEDED;
+ }
+
+ /*=====================================================
+ * CCM* - CBC-mode message authentication
+ *=====================================================
+ */
+ /* We can only verify the message if the MIC wasn't truncated. */
+ if (have_mic) {
+ unsigned char dec_mic[16];
+ guint l_m = captured_len;
+ guint l_a;
+ guint8 d_a[256];
+
+ DISSECTOR_ASSERT(pinfo->src.len == 16);
+ DISSECTOR_ASSERT(pinfo->dst.len == 16);
+ memcpy(d_a, pinfo->src.data, pinfo->src.len);
+ memcpy(d_a+16, pinfo->dst.data, pinfo->dst.len);
+
+ tvb_memcpy(tvb, d_a+32, decrypt_info->aux_offset, decrypt_info->aux_length);
+ l_a = 32 + decrypt_info->aux_length;
+
+ /* Adjust the lengths of the plantext and additional data if unencrypted. */
+ if (!IEEE802154_IS_ENCRYPTED(packet->security_level)) {
+ l_a += l_m;
+ l_m = 0;
+ }
+
+ /* Create the CCM* initial block for authentication (Adata!=0, M!=0, counter=l(m)). */
+ ccm_init_block(tmp, TRUE, M, srcAddr, packet->frame_counter, packet->security_level, l_m, NULL);
+
+ /* Compute CBC-MAC authentication tag. */
+ /*
+ * And yes, despite the warning in tvbuff.h, I think tvb_get_ptr is the
+ * right function here since either A) the payload wasn't encrypted, in
+ * which case l_m is zero, or B) the payload was encrypted, and the tvb
+ * already points to contiguous memory, since we just allocated it in
+ * decryption phase.
+ */
+ if (!ccm_cbc_mac(decrypt_info->key, tmp, d_a, l_a, tvb_get_ptr(ptext_tvb, 0, l_m), l_m, dec_mic)) {
+ *decrypt_info->status = DECRYPT_PACKET_MIC_CHECK_FAILED;
+ }
+ /* Compare the received MIC with the one we generated. */
+ else if (memcmp(decrypt_info->rx_mic, dec_mic, M) != 0) {
+ *decrypt_info->status = DECRYPT_PACKET_MIC_CHECK_FAILED;
+ }
+ }
+
+ *decrypt_info->rx_mic_length = M;
+
+ /* Done! */
+ return ptext_tvb;
+} /* dissect_mle_decrypt */
+
+void register_mle_key_hash_handler(guint hash_identifier, ieee802154_set_key_func key_func)
+{
+ /* Ensure no duplication */
+ DISSECTOR_ASSERT(wmem_tree_lookup32(mle_key_hash_handlers, hash_identifier) == NULL);
+
+ wmem_tree_insert32(mle_key_hash_handlers, hash_identifier, (void*)key_func);
+}
+
+/* Set MLE key function. */
+static guint ieee802154_set_mle_key(ieee802154_packet *packet, unsigned char *key, unsigned char *alt_key, ieee802154_key_t *uat_key)
+{
+ ieee802154_set_key_func func = (ieee802154_set_key_func)wmem_tree_lookup32(mle_key_hash_handlers, uat_key->hash_type);
+
+ if (func != NULL)
+ return func(packet, key, alt_key, uat_key);
+
+ /* Right now, KEY_HASH_NONE and KEY_HASH_ZIP are not registered because they
+ work with this "default" behavior */
+ if (packet->key_index == uat_key->key_index)
+ {
+ memcpy(key, uat_key->key, IEEE802154_CIPHER_SIZE);
+ return 1;
+ }
+
+ return 0;
+}
+
+static int
+dissect_mle(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
+{
+ tvbuff_t *volatile payload_tvb = NULL;
+ proto_tree *volatile mle_tree = NULL;
+ proto_item *volatile proto_root = NULL;
+
+ guint offset = 0;
+ guint aux_header_offset = 0;
+ ieee802154_decrypt_status status;
+
+ proto_item *ti;
+ proto_item *mic_item = NULL;
+ proto_tree *header_tree = NULL;
+ guint8 security_suite;
+ guint aux_length = 0;
+ ieee802154_packet *packet;
+ ieee802154_packet *original_packet;
+ ieee802154_decrypt_info_t decrypt_info;
+ ieee802154_hints_t *ieee_hints;
+ gboolean mic_ok=TRUE;
+
+ unsigned char rx_mic[16];
+ unsigned int rx_mic_len = 0;
+
+ guint8 cmd;
+ guint8 tlv_type, tlv_len;
+ proto_tree *tlv_tree;
+
+ ieee_hints = (ieee802154_hints_t *)p_get_proto_data(wmem_file_scope(), pinfo, proto_ieee802154, 0);
+ if (ieee_hints == NULL) {
+ /* For now, MLE only supported with IEEE802.15.4 as an underlying layer */
+ return 0;
+ }
+ original_packet = (ieee802154_packet *)ieee_hints->packet;
+
+ packet = wmem_new0(pinfo->pool, ieee802154_packet);
+
+ /* Copy IEEE 802.15.4 Source Address */
+ packet->src_addr_mode = original_packet->src_addr_mode;
+ if (packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) {
+ packet->src64 = original_packet->src64;
+ } else {
+ packet->src16 = original_packet->src16;
+ }
+
+ /* Copy IEEE 802.15.4 Source PAN ID */
+ packet->src_pan = original_packet->src_pan;
+
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "MLE");
+ col_clear(pinfo->cinfo, COL_INFO);
+
+ /* Create the protocol tree. */
+ proto_root = proto_tree_add_item(tree, proto_mle, tvb, 0, tvb_reported_length(tvb), ENC_NA);
+ mle_tree = proto_item_add_subtree(proto_root, ett_mle);
+
+ /* Parse the security suite field. */
+ /* Security Suite Field */
+ security_suite = tvb_get_guint8(tvb, offset);
+ proto_tree_add_item(mle_tree, hf_mle_security_suite, tvb, offset, 1, ENC_NA);
+ offset++;
+
+ aux_header_offset = offset;
+
+ /* Security material present if security suite = 0 */
+ if (security_suite == 0) {
+ dissect_ieee802154_aux_sec_header_and_key(tvb, pinfo, mle_tree, packet, &offset);
+ aux_length = offset-aux_header_offset;
+ } else {
+ packet->security_level = SECURITY_LEVEL_NONE;
+ }
+
+ decrypt_info.key_number = 0;
+
+ /* Add additional fields for security level > SECURITY_LEVEL_NONE */
+ if (packet->security_level > SECURITY_LEVEL_NONE) {
+
+ /* Pass to decryption process */
+ decrypt_info.rx_mic = rx_mic;
+ decrypt_info.rx_mic_length = &rx_mic_len;
+ decrypt_info.aux_offset = aux_header_offset;
+ decrypt_info.aux_length = aux_length;
+ decrypt_info.status = &status;
+ decrypt_info.key = NULL; /* payload function will fill that in */
+
+ payload_tvb = decrypt_ieee802154_payload(tvb, offset, pinfo, header_tree, packet, &decrypt_info,
+ ieee802154_set_mle_key, dissect_mle_decrypt);
+ if (status == DECRYPT_PACKET_MIC_CHECK_FAILED)
+ expert_add_info(pinfo, proto_root, &ei_mle_cbc_mac_failed);
+
+ /* MIC */
+ if (rx_mic_len) {
+ mic_item = proto_tree_add_bytes(header_tree, hf_mle_mic, tvb, 0, rx_mic_len, rx_mic);
+ proto_item_set_generated(mic_item);
+ }
+ } else {
+ status = DECRYPT_NOT_ENCRYPTED;
+ }
+
+ /* Get the unencrypted data if decryption failed. */
+ if (!payload_tvb) {
+ /* Deal with possible truncation and the FCS field at the end. */
+ gint reported_len = tvb_reported_length_remaining(tvb, offset);
+ gint captured_len = tvb_captured_length_remaining(tvb, offset);
+ if (reported_len < captured_len) captured_len = reported_len;
+ payload_tvb = tvb_new_subset_length_caplen(tvb, offset, captured_len, reported_len);
+ }
+
+ /* Display the reason for failure, and abort if the error was fatal. */
+ switch (status) {
+ case DECRYPT_PACKET_SUCCEEDED:
+ /* No problem. */
+ proto_item_append_text(mic_item, " [correct (key no. %d)]", decrypt_info.key_number);
+ break;
+
+ case DECRYPT_PACKET_TOO_SMALL:
+ expert_add_info(pinfo, proto_root, &ei_mle_packet_too_small);
+ call_data_dissector(payload_tvb, pinfo, tree);
+ return tvb_captured_length(tvb);
+
+ case DECRYPT_PACKET_NO_KEY:
+ expert_add_info(pinfo, proto_root, &ei_mle_no_key);
+ call_data_dissector(payload_tvb, pinfo, tree);
+ return tvb_captured_length(tvb);
+
+ case DECRYPT_PACKET_DECRYPT_FAILED:
+ expert_add_info(pinfo, proto_root, &ei_mle_decrypt_failed);
+ call_data_dissector(payload_tvb, pinfo, tree);
+ return tvb_captured_length(tvb);
+
+ case DECRYPT_PACKET_MIC_CHECK_FAILED:
+ expert_add_info(pinfo, proto_root, &ei_mle_mic_check_failed);
+ proto_item_append_text(mic_item, " [incorrect]");
+ /*
+ * Abort only if the payload was encrypted, in which case we
+ * probably didn't decrypt the packet right (eg: wrong key).
+ */
+ if (IEEE802154_IS_ENCRYPTED(packet->security_level)) {
+ mic_ok = FALSE;
+ }
+ break;
+ case DECRYPT_NOT_ENCRYPTED:
+ default:
+ break;
+ }
+ /* This can cause a lot of problems so remove it by default */
+ if (!mic_ok && mle_mic_ok) {
+ call_data_dissector(payload_tvb, pinfo, tree);
+ col_add_fstr(pinfo->cinfo, COL_INFO, "MIC Failed");
+ return tvb_captured_length(tvb);
+ }
+
+ /***** NEW CODE HERE ****/
+ /* If we're good, carry on and display the MLE payload */
+ offset = 0;
+
+ /* MLE Command */
+ proto_tree_add_item(mle_tree, hf_mle_command, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+
+ cmd = tvb_get_guint8(payload_tvb, offset);
+ col_add_str(pinfo->cinfo, COL_INFO, val_to_str(cmd, mle_command_vals, "Unknown (%x)"));
+
+ offset++;
+
+ /* MLE TLVs */
+ while (tvb_offset_exists(payload_tvb, offset)) {
+
+ /* Get the length ahead of time to pass to next function so we can highlight
+ proper amount of bytes */
+ tlv_len = tvb_get_guint8(payload_tvb, offset+1);
+
+ ti = proto_tree_add_item(mle_tree, hf_mle_tlv, payload_tvb, offset, tlv_len+2, ENC_NA);
+ tlv_tree = proto_item_add_subtree(ti, ett_mle_tlv);
+
+ /* Type */
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_type, payload_tvb, offset, 1, ENC_NA);
+ tlv_type = tvb_get_guint8(payload_tvb, offset);
+ offset++;
+
+ /* Add value name to value root label */
+ proto_item_append_text(ti, " (%s", val_to_str(tlv_type, mle_tlv_vals, "Unknown (%d)"));
+
+ /* Length */
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_length, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+
+ switch(tlv_type){
+ case MLE_TLV_SOURCE_ADDRESS:
+ {
+ gboolean haveShortTLV = FALSE;
+ guint16 shortAddr = 0;
+
+ if (!((tlv_len == 2) || (tlv_len == 8))) {
+ /* TLV Length must be 2 or 8 */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ offset += tlv_len;
+ } else {
+ if (tlv_len == 2) {
+ haveShortTLV = TRUE;
+ shortAddr = tvb_get_ntohs(payload_tvb, offset);
+ }
+
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_source_addr, payload_tvb, offset, tlv_len, ENC_NA);
+ proto_item_append_text(ti, " = ");
+ while (tlv_len) {
+ guint8 addr;
+ addr = tvb_get_guint8(payload_tvb, offset);
+ proto_item_append_text(ti, "%02x", addr);
+ if (--tlv_len) {
+ proto_item_append_text(ti, ":");
+ }
+ offset++;
+ }
+ if ((original_packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) && haveShortTLV) {
+ /* Source TLV: use this to update src/long mapping */
+ ieee802154_addr_update(&ieee802154_map, shortAddr, original_packet->src_pan, original_packet->src64, pinfo->current_proto, pinfo->fd->num);
+ }
+ }
+ proto_item_append_text(ti, ")");
+ }
+ break;
+
+ case MLE_TLV_MODE:
+ if (tlv_len == 1) {
+ guint8 capability;
+
+ capability = tvb_get_guint8(payload_tvb, offset);
+ proto_item_append_text(ti, " = %02x)", capability);
+ /* Get and display capability info. (blatantly plagiarised from packet-ieee802154.c */
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_nwk_data, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_device_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_sec_data_req, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_idle_rx, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ }
+ else {
+ /* TLV Length must be 1 */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ }
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_TIMEOUT:
+ if (tlv_len != 4) {
+ /* TLV Length must be 4 */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ guint32 to_data = 0;
+ proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_timeout, payload_tvb, offset, 4, ENC_BIG_ENDIAN, &to_data);
+ proto_item_append_text(ti, " = %d", (guint16)to_data);
+ }
+ proto_item_append_text(ti, ")");
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_CHALLENGE:
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_challenge, payload_tvb, offset, tlv_len, ENC_NA);
+ proto_item_append_text(ti, " = %s)", tvb_bytes_to_str(pinfo->pool, payload_tvb, offset, tlv_len));
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_RESPONSE:
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_response, payload_tvb, offset, tlv_len, ENC_NA);
+ proto_item_append_text(ti, " = %s)", tvb_bytes_to_str(pinfo->pool, payload_tvb, offset, tlv_len));
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_LINK_LAYER_FRAME_COUNTER:
+ case MLE_TLV_MLE_FRAME_COUNTER:
+ if (tlv_len != 4) {
+ /* TLV Length must be 4 */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ guint32 cntr;
+
+ if (tlv_type == MLE_TLV_LINK_LAYER_FRAME_COUNTER) {
+ proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_ll_frm_cntr, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN, &cntr);
+ } else {
+ proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_mle_frm_cntr, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN, &cntr);
+ }
+ proto_item_append_text(ti, " = %u", cntr);
+ }
+ proto_item_append_text(ti, ")");
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_LINK_QUALITY:
+ {
+ guint numNeighbors;
+ guint8 size = tvb_get_guint8(payload_tvb, offset) & LQI_FLAGS_SIZE;
+ proto_tree *neig_tree;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_lqi_c, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_lqi_size, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+
+ if ((tlv_len - 1) % (size + 3)) {
+ expert_add_info(pinfo, proto_root, &ei_mle_len_size_mismatch);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ numNeighbors = 0;
+ } else {
+ numNeighbors = (tlv_len - 1) / (size + 3);
+ }
+
+ if (numNeighbors == 0) {
+ proto_item_append_text(ti, ")");
+ } else if (numNeighbors == 1) {
+ proto_item_append_text(ti, ": 1 Neighbor)");
+ } else {
+ proto_item_append_text(ti, ": %d Neighbors)", numNeighbors);
+ }
+
+ /* Add subtrees */
+
+ //Size is off by 1
+ size++;
+
+ while (numNeighbors) {
+ ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_neighbor, payload_tvb, offset, size+2, ENC_NA);
+ neig_tree = proto_item_add_subtree(ti, ett_mle_neighbor);
+
+ proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagI, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagO, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagP, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+
+ proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_idr, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+
+ proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_addr, payload_tvb, offset,size, ENC_NA);
+ offset += size;
+
+ numNeighbors--;
+ }
+ }
+ break;
+
+ case MLE_TLV_NETWORK_PARAMETER:
+ {
+ guint8 param_id = tvb_get_guint8(payload_tvb, offset);
+
+ proto_item_append_text(ti, " = %s)", val_to_str(param_id, mle_tlv_nwk_param_vals, "Unknown (%d)"));
+
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_network_param_id, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_network_delay, payload_tvb, offset, 4, ENC_BIG_ENDIAN);
+ offset += 4;
+
+ switch (param_id) {
+ case NETWORK_PARAM_ID_CHANNEL:
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_network_channel, payload_tvb, offset, 2, ENC_BIG_ENDIAN);
+ offset += 2;
+ break;
+ case NETWORK_PARAM_ID_PAN_ID:
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_network_pan_id, payload_tvb, offset, 2, ENC_BIG_ENDIAN);
+ offset += 2;
+ break;
+ case NETWORK_PARAM_ID_PERMIT_JOIN:
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_network_pmt_join, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ break;
+ case NETWORK_PARAM_ID_BCN_PAYLOAD:
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_network_bcn_payload, payload_tvb, offset, tlv_len-5, ENC_NA);
+ offset += tlv_len-5;
+ break;
+ default:
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_network_unknown, payload_tvb, offset, tlv_len-5, ENC_NA);
+ offset += tlv_len-5;
+ break;
+ }
+ }
+ break;
+
+ case MLE_TLV_ROUTE64:
+ {
+ proto_tree *rtr_tree;
+ guint i, j;
+ guint8 count;
+ guint64 id_mask, test_mask;
+
+ proto_item_append_text(ti, ")");
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_id_seq, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+
+ /* Count number of table entries */
+ count = 0;
+ for (i = 0; i < 8; i++) { /* TODO magic - number of routers/8 */
+ guint8 id_mask_octet = tvb_get_guint8(payload_tvb, offset + i);
+ for (j = 0; j < 8; j++) {
+ if (id_mask_octet & (1 << j)) {
+ count++;
+ }
+ }
+ }
+
+ /*
+ * | | | | | | | | | | |1|1|1|1|1|1|...|6|
+ * |0|1|2|3|4|5|6|7|8|9|0|1|2|3|4|5|...|3|
+ * ---------------------------------------
+ * |1|0|1|1|1|0|0|0|1|1|0|0|0|1|0|1|...
+ *
+ * is sent as 0xb8, 0xc5
+ * and represents table entry for routers 0, 2, 3, 4, 8, 9, 13, 15...
+ */
+ /* Get the ID mask as a 64-bit number (BE) */
+ id_mask = tvb_get_ntoh64(payload_tvb, offset);
+
+ /* Just show the string of octets - best representation for a bit mask */
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_id_mask, payload_tvb, offset, 8, ENC_NA);
+ offset += 8;
+
+ if (count != (tlv_len - 9))
+ {
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ offset += (tlv_len - 9);
+ } else {
+ /* Add subtrees */
+ for (i = 0; i < count; i++) {
+ /* Find first bit set */
+ for (j = 0, test_mask = (G_GUINT64_CONSTANT(1) << 63); test_mask != 1; test_mask >>= 1, j++) {
+ if (test_mask & id_mask) {
+ id_mask &= ~test_mask;
+ break;
+ }
+ }
+ ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_entry, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_item_append_text(ti, " (%d)", j);
+ rtr_tree = proto_item_add_subtree(ti, ett_mle_router);
+
+ proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_nbr_out, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_nbr_in, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_cost, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ }
+ }
+ }
+ break;
+
+ case MLE_TLV_ADDRESS16:
+ if (tlv_len != 2) {
+ /* TLV Length must be 2 */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ guint16 addr16 = tvb_get_ntohs(payload_tvb, offset);
+ proto_item_append_text(ti, " = ");
+ {
+ guint8 a16_len = 2; /* Fix it at 2 */
+ guint stroffset = offset;
+
+ while (a16_len) {
+ guint8 a16_data;
+ a16_data = tvb_get_guint8(payload_tvb, stroffset);
+ proto_item_append_text(ti, "%02x", a16_data);
+ if (--a16_len) {
+ proto_item_append_text(ti, ":");
+ }
+ stroffset++;
+ }
+ }
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_addr16, payload_tvb, offset, 2, ENC_NA);
+ if (original_packet->dst_addr_mode == IEEE802154_FCF_ADDR_EXT) {
+ /* Allocated Address16 TLV: use this to update dst/long mapping */
+ ieee802154_addr_update(&ieee802154_map, addr16, original_packet->dst_pan, original_packet->dst64, pinfo->current_proto, pinfo->fd->num);
+ }
+ }
+ proto_item_append_text(ti, ")");
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_LEADER_DATA:
+ proto_item_append_text(ti, ")");
+ if (tlv_len != 8) {
+ /* TLV Length must be 8 */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ offset += tlv_len;
+ } else {
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_partition_id, payload_tvb, offset, 4, ENC_BIG_ENDIAN);
+ offset += 4;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_weighting, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_version, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_stable_version, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_router_id, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ }
+ break;
+
+ case MLE_TLV_NETWORK_DATA:
+ {
+ tvbuff_t *sub_tvb;
+ proto_item_append_text(ti, ")");
+ if (tlv_len > 0) {
+ sub_tvb = tvb_new_subset_length(payload_tvb, offset, tlv_len);
+ call_dissector(thread_nwd_handle, sub_tvb, pinfo, tlv_tree);
+ }
+ offset += tlv_len;
+ }
+ break;
+
+ case MLE_TLV_ACTIVE_OP_DATASET:
+ case MLE_TLV_PENDING_OP_DATASET:
+ case MLE_TLV_THREAD_DISCOVERY:
+ {
+ tvbuff_t *sub_tvb;
+ proto_item_append_text(ti, ")");
+ if (tlv_len > 0) {
+ sub_tvb = tvb_new_subset_length(payload_tvb, offset, tlv_len);
+ call_dissector(thread_mc_handle, sub_tvb, pinfo, tlv_tree);
+ }
+ offset += tlv_len;
+ }
+ break;
+
+ case MLE_TLV_TLV_REQUEST:
+ proto_item_append_text(ti, ")");
+ while (tlv_len) {
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_type, payload_tvb, offset, 1, ENC_NA);
+ offset++;
+ tlv_len--;
+ }
+ break;
+
+ case MLE_TLV_SCAN_MASK:
+ if (tlv_len != 1) {
+ /* TLV Length must be 1 */
+ proto_item_append_text(ti, ")");
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ guint8 mask;
+
+ mask = tvb_get_guint8(payload_tvb, offset);
+ proto_item_append_text(ti, " = %02x)", mask);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_scan_mask_r, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_scan_mask_e, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ }
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_CONNECTIVITY:
+ proto_item_append_text(ti, ")");
+ if ((tlv_len == 7) || (tlv_len == 10)) {
+ proto_tree *fl_tree;
+
+ ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_flags, payload_tvb, offset, 1, ENC_NA);
+ fl_tree = proto_item_add_subtree(ti, ett_mle_conn_flg);
+ proto_tree_add_item(fl_tree, hf_mle_tlv_conn_flags_pp, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq3, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq2, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq1, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_leader_cost, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_id_seq, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_active_rtrs, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ if (tlv_len == 10) {
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_sed_buf_size, payload_tvb, offset, 2, ENC_BIG_ENDIAN);
+ offset += 2;
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_sed_dgram_cnt, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ }
+ } else {
+ /* TLV Length must be 7 (old style) or 10 */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ offset += tlv_len;
+ }
+ break;
+
+ case MLE_TLV_LINK_MARGIN:
+ if (tlv_len != 1) {
+ /* TLV Length must be 1 */
+ proto_item_append_text(ti, ")");
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ guint8 link_margin;
+
+ link_margin = tvb_get_guint8(payload_tvb, offset);
+ proto_item_append_text(ti, " = %udB)", link_margin);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_link_margin, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
+ }
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_STATUS:
+ if (tlv_len != 1) {
+ /* TLV Length must be 1 */
+ proto_item_append_text(ti, ")");
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ guint8 stat;
+
+ stat = tvb_get_guint8(payload_tvb, offset);
+ proto_item_append_text(ti, " = %d)", stat);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_status, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
+ }
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_VERSION:
+ if (tlv_len != 2) {
+ /* TLV Length must be 2 */
+ proto_item_append_text(ti, ")");
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ guint16 version;
+
+ version = tvb_get_ntohs(payload_tvb, offset);
+ proto_item_append_text(ti, " = %d)", version);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_version, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
+ }
+ offset += tlv_len;
+ break;
+
+ case MLE_TLV_ADDRESS_REGISTRATION:
+ {
+ guint8 iid_type, i;
+ guint8 entries = 0;
+ gint16 check_len = tlv_len;
+ guint check_offset = offset;
+
+ /* Check consistency of entries */
+ while (check_len > 0) {
+ guint8 ar_len;
+
+ iid_type = tvb_get_guint8(payload_tvb, check_offset);
+ if (iid_type & ADDR_REG_MASK_IID_TYPE_MASK) {
+ ar_len = 9;
+ } else {
+ ar_len = 17;
+ }
+ check_offset += ar_len;
+ check_len -= ar_len;
+ entries++;
+ }
+
+ proto_item_append_text(ti, ")");
+ if (check_len != 0) {
+ /* Not an integer number of entries */
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ offset += tlv_len;
+ } else {
+ for (i = 0; i < entries; i++) {
+ proto_tree *ar_tree;
+
+ ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_addr_reg_entry, payload_tvb, offset, 1, ENC_NA);
+ ar_tree = proto_item_add_subtree(ti, ett_mle_addr_reg);
+ iid_type = tvb_get_guint8(payload_tvb, offset);
+ if (iid_type & ADDR_REG_MASK_IID_TYPE_MASK) {
+ proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_cid, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid, payload_tvb, offset, 8, ENC_NA);
+ offset += 8;
+ } else {
+ proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ offset++;
+ proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_ipv6, payload_tvb, offset, 16, ENC_NA);
+ offset += 16;
+ }
+ }
+ }
+ }
+ break;
+
+ case MLE_TLV_CHANNEL:
+ {
+ proto_item_append_text(ti, ")");
+
+ /* Check length is consistent */
+ if (tlv_len != 3) {
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ /* Channel page */
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_channel_page, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
+ /* Channel */
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_channel, payload_tvb, offset+1, 2, ENC_BIG_ENDIAN);
+ }
+ offset += tlv_len;
+ }
+ break;
+
+ case MLE_TLV_PAN_ID:
+ {
+ proto_item_append_text(ti, ")");
+
+ /* Check length is consistent */
+ if (tlv_len != 2) {
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ /* PAN ID */
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_pan_id, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
+ }
+ offset += tlv_len;
+ }
+ break;
+
+ case MLE_TLV_ACTIVE_TSTAMP:
+ case MLE_TLV_PENDING_TSTAMP:
+ {
+ nstime_t timestamp;
+
+ proto_item_append_text(ti, ")");
+
+ if (tlv_len != 8) {
+ expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ } else {
+ /* Fill in the nstime_t structure */
+ timestamp.secs = (time_t)tvb_get_ntoh48(payload_tvb, offset);
+ timestamp.nsecs = (int)lround((double)(tvb_get_ntohs(payload_tvb, offset + 6) >> 1) * MLE_32768_TO_NSEC_FACTOR);
+ if (tlv_type == MLE_TLV_ACTIVE_TSTAMP) {
+ proto_tree_add_time(tlv_tree, hf_mle_tlv_active_tstamp, payload_tvb, offset, 8, &timestamp);
+ } else {
+ proto_tree_add_time(tlv_tree, hf_mle_tlv_pending_tstamp, payload_tvb, offset, 8, &timestamp);
+ }
+ }
+ offset += tlv_len;
+ }
+ break;
+
+ default:
+ proto_item_append_text(ti, ")");
+ proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
+ offset += tlv_len;
+ }
+ }
+
+ return tvb_captured_length(tvb);
+}
+
+void
+proto_register_mle(void)
+{
+ static hf_register_info hf[] = {
+
+ /* Auxiliary Security Header Fields */
+ /*----------------------------------*/
+ { &hf_mle_security_suite,
+ { "Security Suite",
+ "mle.sec_suite",
+ FT_UINT8, BASE_HEX, VALS(mle_sec_suite_names), 0x0,
+ "The Security Suite of the frame",
+ HFILL
+ }
+ },
+
+ { &hf_mle_mic,
+ { "Decrypted MIC",
+ "mle.mic",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "The decrypted MIC",
+ HFILL
+ }
+ },
+
+ /*MLE Command*/
+ { &hf_mle_command,
+ { "Command",
+ "mle.cmd",
+ FT_UINT8, BASE_DEC, VALS(mle_command_vals), 0x0,
+ "MLE command type",
+ HFILL
+ }
+ },
+
+ /* Generic TLV */
+ { &hf_mle_tlv,
+ { "TLV",
+ "mle.tlv",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ "Type-Length-Value",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_type,
+ { "Type",
+ "mle.tlv.type",
+ FT_UINT8, BASE_DEC, VALS(mle_tlv_vals), 0x0,
+ "Type of value",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_length,
+ { "Length",
+ "mle.tlv.len",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ "Length of value",
+ HFILL
+ }
+ },
+
+ /* Type-Specific TLV Fields */
+ { &hf_mle_tlv_source_addr,
+ { "Address",
+ "mle.tlv.source_addr",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Source address",
+ HFILL
+ }
+ },
+
+ /* Capability Information Fields */
+ { &hf_mle_tlv_mode_nwk_data,
+ { "Network Data",
+ "mle.tlv.mode.nwk_data",
+ FT_BOOLEAN, 8, TFS(&mle_tlv_mode_nwk_data), MLE_CMD_CINFO_NWK_DATA,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_mode_device_type,
+ { "Device Type",
+ "mle.tlv.mode.device_type",
+ FT_BOOLEAN, 8, TFS(&mle_tlv_mode_device_type), IEEE802154_CMD_CINFO_DEVICE_TYPE,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_mode_sec_data_req,
+ { "Secure Data Requests",
+ "mle.tlv.mode.sec_data_req",
+ FT_BOOLEAN, 8, NULL, MLE_CMD_CINFO_SEC_DATA_REQ,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_mode_idle_rx,
+ { "Receive On When Idle",
+ "mle.tlv.mode.idle_rx",
+ FT_BOOLEAN, 8, NULL, IEEE802154_CMD_CINFO_IDLE_RX,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_timeout,
+ { "Timeout",
+ "mle.tlv.timeout",
+ FT_UINT32, BASE_DEC, NULL, 0x0,
+ "Expected interval between transmissions in seconds",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_challenge,
+ { "Challenge",
+ "mle.tlv.challenge",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Challenge to be echoed back",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_response,
+ { "Response",
+ "mle.tlv.response",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Response to a challenge",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_ll_frm_cntr,
+ { "Link Layer Frame Counter",
+ "mle.tlv.ll_frm_cntr",
+ FT_UINT32, BASE_DEC, NULL, 0x0,
+ "The Link layer frame counter",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_mle_frm_cntr,
+ { "MLE Frame Counter",
+ "mle.tlv.mle_frm_cntr",
+ FT_UINT32, BASE_DEC, NULL, 0x0,
+ "The MLE frame counter",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_unknown,
+ { "Unknown",
+ "mle.tlv.unknown",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Unknown TLV, raw value",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_lqi_c,
+ { "Complete Flag",
+ "mle.tlv.lqi.complete",
+ FT_BOOLEAN, 8, NULL, LQI_FLAGS_C,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_lqi_size,
+ { "Address Size",
+ "mle.tlv.lqi.size",
+ FT_UINT8, BASE_DEC, NULL, LQI_FLAGS_SIZE,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_neighbor,
+ { "Neighbor Record",
+ "mle.tlv.neighbor",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_neighbor_flagI,
+ { "Incoming",
+ "mle.tlv.neighbor.flagI",
+ FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_I,
+ "Set if the sender has configured its link with this neighbor and will accept incoming messages from them.",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_neighbor_flagO,
+ { "Outgoing",
+ "mle.tlv.neighbor.flagO",
+ FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_O,
+ "Set if the sender believes that the neighbor has configured its link with the sender and will accept incoming messages from the sender.",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_neighbor_flagP,
+ { "Priority",
+ "mle.tlv.neighbor.flagP",
+ FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_P,
+ "Set if the sender expects to use this link for sending messages to this neighbor.",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_neighbor_idr,
+ { "Inverse Delivery Ratio",
+ "mle.tlv.neighbor.idr",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_neighbor_addr,
+ { "Address",
+ "mle.tlv.neighbor.addr",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_network_param_id,
+ { "Parameter ID",
+ "mle.tlv.network.param_id",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_network_delay,
+ { "Delay",
+ "mle.tlv.network.delay",
+ FT_UINT32, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_network_channel,
+ { "Channel",
+ "mle.tlv.network.channel",
+ FT_UINT16, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_network_pan_id,
+ { "PAN ID",
+ "mle.tlv.network.pan_id",
+ FT_UINT16, BASE_HEX, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_network_pmt_join,
+ { "Permit Join",
+ "mle.tlv.network.pmt_join",
+ FT_BOOLEAN, 8, NULL, 0x1,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_network_bcn_payload,
+ { "Beacon Payload",
+ "mle.tlv.network.bcn_payload",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_route64_id_seq,
+ { "ID Sequence",
+ "mle.tlv.route64.id_seq",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_route64_id_mask,
+ { "Assigned Router ID Mask",
+ "mle.tlv.route64.id_mask",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_route64_entry,
+ { "Routing Table Entry",
+ "mle.tlv.route64",
+ FT_UINT8, BASE_HEX, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_route64_nbr_out,
+ { "Neighbor Out Link Quality",
+ "mle.tlv.route64.nbr_out",
+ FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_OUT_MASK,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_route64_nbr_in,
+ { "Neighbor In Link Quality",
+ "mle.tlv.route64.nbr_in",
+ FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_IN_MASK,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_route64_cost,
+ { "Router Cost",
+ "mle.tlv.route64.cost",
+ FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_COST_MASK,
+ NULL,
+ HFILL
+ }
+ },
+#if 0
+ { &hf_mle_tlv_route64_unknown,
+ { "(unknown)",
+ "mle.tlv.route64.unknown",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+#endif
+ { &hf_mle_tlv_addr16,
+ { "Address16",
+ "mle.tlv.addr16",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_leader_data_partition_id,
+ { "Partition ID",
+ "mle.tlv.leader_data.partition_id",
+ FT_UINT32, BASE_HEX, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_leader_data_weighting,
+ { "Weighting",
+ "mle.tlv.leader_data.weighting",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_leader_data_version,
+ { "Data Version",
+ "mle.tlv.leader_data.data_version",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_leader_data_stable_version,
+ { "Stable Data Version",
+ "mle.tlv.leader_data.stable_data_version",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_leader_data_router_id,
+ { "Leader Router ID",
+ "mle.tlv.leader_data.router_id",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+#if 0
+ { &hf_mle_tlv_network_data,
+ { "Network Data",
+ "mle.tlv.network_data",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Network data (opaque data)",
+ HFILL
+ }
+ },
+#endif
+ { &hf_mle_tlv_scan_mask_r,
+ { "Router",
+ "mle.tlv.scan_mask.r",
+ FT_BOOLEAN, 8, NULL, SCAN_MASK_R_MASK,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_scan_mask_e,
+ { "End Device",
+ "mle.tlv.scan_mask.e",
+ FT_BOOLEAN, 8, NULL, SCAN_MASK_D_MASK,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_flags,
+ { "Flags",
+ "mle.tlv.conn.flags",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_flags_pp,
+ { "Parent Priority",
+ "mle.tlv.conn.flags.pp",
+ FT_INT8, BASE_DEC, VALS(mle_conn_tlv_flags_pp_enums), CONN_MASK_FLAGS_PP_MASK,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_lq3,
+ { "Link Quality 3",
+ "mle.tlv.conn.lq3",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_lq2,
+ { "Link Quality 2",
+ "mle.tlv.conn.lq2",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_lq1,
+ { "Link Quality 1",
+ "mle.tlv.conn.lq1",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_leader_cost,
+ { "Leader Cost",
+ "mle.tlv.conn.leader_cost",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_id_seq,
+ { "ID Sequence",
+ "mle.tlv.conn.id_seq",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_active_rtrs,
+ { "Active Routers",
+ "mle.tlv.conn.active_rtrs",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_sed_buf_size,
+ { "SED Buffer Size",
+ "mle.tlv.conn.sed_buf_size",
+ FT_UINT16, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_conn_sed_dgram_cnt,
+ { "SED Datagram Count",
+ "mle.tlv.conn.sed_dgram_cnt",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_link_margin,
+ { "Link Margin",
+ "mle.tlv.link_margin",
+ FT_UINT8, BASE_DEC, NULL, 0,
+ "Link margin in dB",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_status,
+ { "Status",
+ "mle.tlv.status",
+ FT_UINT8, BASE_DEC, VALS(mle_status_tlv_enums), 0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_version,
+ { "Version",
+ "mle.tlv.version",
+ FT_UINT16, BASE_DEC, NULL, 0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_addr_reg_entry,
+ { "Address Registration Entry",
+ "mle.tlv.addr_reg",
+ FT_NONE, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_addr_reg_iid_type,
+ { "IID type",
+ "mle.tlv.addr_reg_iid_type",
+ FT_BOOLEAN, 8, TFS(&mle_tlv_addr_reg_iid_type), ADDR_REG_MASK_IID_TYPE_MASK,
+ "Context ID",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_addr_reg_cid,
+ { "Context ID",
+ "mle.tlv.addr_reg_cid",
+ FT_UINT8, BASE_DEC, NULL, ADDR_REG_MASK_CID_MASK,
+ "6LoWPAN Context ID",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_addr_reg_iid,
+ { "IID",
+ "mle.tlv.addr_reg_iid",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Interface identifier",
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_addr_reg_ipv6,
+ { "IPv6 Address",
+ "mle.tlv.addr_reg_ipv6",
+ FT_IPv6, BASE_NONE, NULL, 0x0,
+ "IID",
+ HFILL
+ }
+ },
+#if 0
+ { &hf_mle_tlv_hold_time,
+ { "Hold Time",
+ "mle.tlv.hold_time",
+ FT_UINT16, BASE_DEC, NULL, 0,
+ NULL,
+ HFILL
+ }
+ },
+#endif
+ { &hf_mle_tlv_network_unknown,
+ { "(unknown)",
+ "mle.tlv.network.unknown",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_channel_page,
+ { "Channel Page",
+ "mle.tlv.channel_page",
+ FT_UINT8, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_channel,
+ { "Channel",
+ "mle.tlv.channel",
+ FT_UINT16, BASE_DEC, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_pan_id,
+ { "PAN ID",
+ "mle.tlv.pan_id",
+ FT_UINT16, BASE_HEX, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_active_tstamp,
+ { "Active Timestamp",
+ "mle.tlv.active_tstamp",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+
+ { &hf_mle_tlv_pending_tstamp,
+ { "Pending Timestamp",
+ "mle.tlv.pending_tstamp",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0,
+ NULL,
+ HFILL
+ }
+ },
+#if 0
+ { &hf_mle_tlv_active_op_dataset,
+ { "Active Operational Dataset",
+ "mle.tlv.active_op_dataset",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Thread Active Operational Dataset",
+ HFILL
+ }
+ },
+ { &hf_mle_tlv_pending_op_dataset,
+ { "Pending Operational Dataset",
+ "mle.tlv.pending_op_dataset",
+ FT_BYTES, BASE_NONE, NULL, 0x0,
+ "Thread Pending Operational Dataset",
+ HFILL
+ }
+ },
+#endif
+ };
+
+ static gint *ett[] = {
+ &ett_mle,
+ &ett_mle_auxiliary_security,
+ &ett_mle_aux_sec_control,
+ &ett_mle_aux_sec_key_id,
+ &ett_mle_tlv,
+ &ett_mle_neighbor,
+ &ett_mle_router,
+ &ett_mle_addr_reg,
+ &ett_mle_conn_flg,
+ &ett_mle_thread_nwd
+};
+
+ static ei_register_info ei[] = {
+ { &ei_mle_cbc_mac_failed, { "mle.cbc_mac_failed", PI_UNDECODED, PI_WARN, "Call to ccm_cbc_mac() failed", EXPFILL }},
+ { &ei_mle_packet_too_small, { "mle.packet_too_small", PI_UNDECODED, PI_WARN, "Packet was too small to include the CRC and MIC", EXPFILL }},
+ { &ei_mle_no_key, { "mle.no_key", PI_UNDECODED, PI_WARN, "No encryption key set - can't decrypt", EXPFILL }},
+ { &ei_mle_decrypt_failed, { "mle.decrypt_failed", PI_UNDECODED, PI_WARN, "Decrypt failed", EXPFILL }},
+ { &ei_mle_mic_check_failed, { "mle.mic_check_failed", PI_UNDECODED, PI_WARN, "MIC check failed", EXPFILL }},
+ { &ei_mle_tlv_length_failed, { "mle.tlv_length_failed", PI_UNDECODED, PI_WARN, "TLV Length inconsistent", EXPFILL }},
+ { &ei_mle_len_size_mismatch, { "mle.len_size_mismatch", PI_UNDECODED, PI_WARN, "TLV Length & Size field disagree", EXPFILL }},
+ };
+
+ module_t *mle_module;
+ expert_module_t* expert_mle;
+
+ proto_mle = proto_register_protocol("Mesh Link Establishment", "MLE", "mle");
+ proto_register_field_array(proto_mle, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+ expert_mle = expert_register_protocol(proto_mle);
+ expert_register_field_array(expert_mle, ei, array_length(ei));
+
+ mle_handle = register_dissector("mle", dissect_mle, proto_mle);
+
+ mle_module = prefs_register_protocol(proto_mle, NULL);
+
+ prefs_register_bool_preference(mle_module, "meshlink_mic_ok",
+ "Dissect only good MIC",
+ "Dissect payload only if MIC is valid.",
+ &mle_mic_ok);
+
+ /* setup registration for other dissectors to provide mle key hash algorithms */
+ mle_key_hash_handlers = wmem_tree_new(wmem_epan_scope());
+}
+
+void
+proto_reg_handoff_mle(void)
+{
+ thread_nwd_handle = find_dissector_add_dependency("thread_nwd", proto_mle);
+ thread_mc_handle = find_dissector_add_dependency("thread_meshcop", proto_mle);
+
+ //heur_dissector_add("stun", dissect_embeddedmle_heur, proto_mle);
+
+ dissector_add_uint_range_with_preference("udp.port", UDP_PORT_MLE_RANGE, mle_handle);
+
+ proto_ieee802154 = proto_get_id_by_filter_name(IEEE802154_PROTOABBREV_WPAN);
+}
+
+/*
+ * Editor modelines - https://www.wireshark.org/tools/modelines.html
+ *
+ * Local variables:
+ * c-basic-offset: 2
+ * tab-width: 8
+ * indent-tabs-mode: nil
+ * End:
+ *
+ * vi: set shiftwidth=2 tabstop=8 expandtab
+ * :indentSize=2:tabSize=8:noTabs=true:
+ */