/* packet-h235.c * Routines for H.235 packet dissection * 2004 Tomas Kukosa * * Wireshark - Network traffic analyzer * By Gerald Combs * Copyright 1998 Gerald Combs * * SPDX-License-Identifier: GPL-2.0-or-later */ #include "config.h" #include #include #include #include #include "packet-per.h" #include "packet-h235.h" #include "packet-h225.h" #define PNAME "H235-SECURITY-MESSAGES" #define PSNAME "H.235" #define PFNAME "h235" #define OID_MIKEY "0.0.8.235.0.3.76" #define OID_MIKEY_PS "0.0.8.235.0.3.72" #define OID_MIKEY_DHHMAC "0.0.8.235.0.3.73" #define OID_MIKEY_PK_SIGN "0.0.8.235.0.3.74" #define OID_MIKEY_DH_SIGN "0.0.8.235.0.3.75" #define OID_TG "0.0.8.235.0.3.70" #define OID_SG "0.0.8.235.0.3.71" void proto_register_h235(void); void proto_reg_handoff_h235(void); /* Initialize the protocol and registered fields */ static int proto_h235; #include "packet-h235-hf.c" /* Initialize the subtree pointers */ #include "packet-h235-ett.c" static int dissect_xxx_ToBeSigned(tvbuff_t *tvb, int offset, asn1_ctx_t *actx, proto_tree *tree, int hf_index _U_) { dissect_per_not_decoded_yet(tree, actx->pinfo, tvb, "ToBeSigned"); return offset; } #include "packet-h235-fn.c" /*--- proto_register_h235 ----------------------------------------------*/ void proto_register_h235(void) { /* List of fields */ static hf_register_info hf[] = { #include "packet-h235-hfarr.c" }; /* List of subtrees */ static int *ett[] = { #include "packet-h235-ettarr.c" }; /* Register protocol */ proto_h235 = proto_register_protocol(PNAME, PSNAME, PFNAME); /* Register fields and subtrees */ proto_register_field_array(proto_h235, hf, array_length(hf)); proto_register_subtree_array(ett, array_length(ett)); /* OID names */ /* H.235.1, Chapter 15, Table 3 */ /* A */ oid_add_from_string("all fields in RAS/CS","0.0.8.235.0.1.1"); oid_add_from_string("all fields in RAS/CS","0.0.8.235.0.2.1"); /* T */ oid_add_from_string("ClearToken","0.0.8.235.0.1.5"); oid_add_from_string("ClearToken","0.0.8.235.0.2.5"); /* U */ oid_add_from_string("HMAC-SHA1-96","0.0.8.235.0.1.6"); oid_add_from_string("HMAC-SHA1-96","0.0.8.235.0.2.6"); /* H.235.7, Chapter 5, Table 1 */ oid_add_from_string("MIKEY", OID_MIKEY); oid_add_from_string("MIKEY-PS", OID_MIKEY_PS); oid_add_from_string("MIKEY-DHHMAC", OID_MIKEY_DHHMAC); oid_add_from_string("MIKEY-PK-SIGN", OID_MIKEY_PK_SIGN); oid_add_from_string("MIKEY-DH-SIGN", OID_MIKEY_DH_SIGN); /* H.235.7, Chapter 8.5 */ oid_add_from_string("TG",OID_TG); /* H.235.7, Chapter 9.5 */ oid_add_from_string("SG",OID_SG); /* H.235.8, Chapter 4.2, Table 2 */ oid_add_from_string("AES_CM_128_HMAC_SHA1_80","0.0.8.235.0.4.91"); oid_add_from_string("AES_CM_128_HMAC_SHA1_32","0.0.8.235.0.4.92"); oid_add_from_string("F8_128_HMAC_SHA1_80","0.0.8.235.0.4.93"); } /*--- proto_reg_handoff_h235 -------------------------------------------*/ void proto_reg_handoff_h235(void) { dissector_handle_t mikey_handle; mikey_handle = find_dissector("mikey"); /* H.235.7, Chapter 7.1, MIKEY operation at "session level" */ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY "/nonCollapsing/0", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PS "/nonCollapsing/0", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DHHMAC "/nonCollapsing/0", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PK_SIGN "/nonCollapsing/0", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DH_SIGN "/nonCollapsing/0", mikey_handle); dissector_add_string("h245.gef.content", "EncryptionSync/0", mikey_handle); /* H.235.7, Chapter 7.2, MIKEY operation at "media level" */ dissector_add_string("h245.gef.content", "EncryptionSync/76", mikey_handle); dissector_add_string("h245.gef.content", "EncryptionSync/72", mikey_handle); dissector_add_string("h245.gef.content", "EncryptionSync/73", mikey_handle); dissector_add_string("h245.gef.content", "EncryptionSync/74", mikey_handle); dissector_add_string("h245.gef.content", "EncryptionSync/75", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY "/nonCollapsing/76", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PS "/nonCollapsing/72", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DHHMAC "/nonCollapsing/73", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PK_SIGN "/nonCollapsing/74", mikey_handle); dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DH_SIGN "/nonCollapsing/75", mikey_handle); /* H.235.8, Chapter 4.1.2, SrtpCryptoCapability transport */ dissector_add_string("h245.gef.content", "GenericCapability/0.0.8.235.0.4.90/nonCollapsingRaw", create_dissector_handle(dissect_SrtpCryptoCapability_PDU, proto_h235)); }