/* packet-mpls-psc.c * * Routines for MPLS[-TP] Protection State Coordination (PSC) Protocol: it * should conform to RFC 6378. * * Copyright 2012 _FF_ * * Francesco Fondelli * * Wireshark - Network traffic analyzer * By Gerald Combs * Copyright 1998 Gerald Combs * * SPDX-License-Identifier: GPL-2.0-or-later */ #include "config.h" #include #include "packet-mpls.h" void proto_register_mpls_psc(void); void proto_reg_handoff_mpls_psc(void); static dissector_handle_t mpls_psc_handle; static int proto_mpls_psc; static int ett_mpls_psc; static int hf_mpls_psc_ver; static int hf_mpls_psc_req; static int hf_mpls_psc_pt; static int hf_mpls_psc_rev; static int hf_mpls_psc_fpath; static int hf_mpls_psc_dpath; static int hf_mpls_psc_tlvlen; /* * FF: please keep this list in sync with * http://www.iana.org/assignments/mpls-oam-parameters/mpls-oam-parameters.xml * Registry Name: 'MPLS PSC Request' */ static const range_string mpls_psc_req_rvals[] = { { 0, 0, "No Request" }, { 1, 1, "Do Not Revert" }, { 2, 3, "Unassigned" }, { 4, 4, "Wait to Restore" }, { 5, 5, "Manual Switch" }, { 6, 6, "Unassigned" }, { 7, 7, "Signal Degrade" }, { 8, 9, "Unassigned" }, { 10, 10, "Signal Fail" }, { 11, 11, "Unassigned" }, { 12, 12, "Forced Switch" }, { 13, 13, "Unassigned" }, { 14, 14, "Lockout of protection" }, { 15, 15, "Unassigned" }, { 0, 0, NULL } }; static const value_string mpls_psc_req_short_vals[] = { { 0, "NR" }, { 1, "DNR" }, { 4, "WTR" }, { 5, "MS" }, { 7, "SD" }, { 10, "SF" }, { 12, "FS" }, { 14, "LO" }, { 0, NULL } }; static const range_string mpls_psc_pt_rvals[] = { { 0, 0, "for future extensions" }, { 1, 1, "unidirectional switching using a permanent bridge" }, { 2, 2, "bidirectional switching using a selector bridge" }, { 3, 3, "bidirectional switching using a permanent bridge" }, { 0, 0, NULL } }; static const range_string mpls_psc_rev_rvals[] = { { 0, 0, "non-revertive mode" }, { 1, 1, "revertive mode" }, { 0, 0, NULL } }; static const range_string mpls_psc_fpath_rvals[] = { { 0, 0, "protection" }, { 1, 1, "working" }, { 2, 255, "for future extensions" }, { 0, 0, NULL } }; static const range_string mpls_psc_dpath_rvals[] = { { 0, 0, "protection is not in use" }, { 1, 1, "protection is in use" }, { 2, 255, "for future extensions" }, { 0, 0, NULL } }; static int dissect_mpls_psc(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_) { proto_item *ti; proto_tree *psc_tree; uint32_t offset = 0; uint8_t req; uint8_t fpath; uint8_t path; col_set_str(pinfo->cinfo, COL_PROTOCOL, "PSC"); col_clear(pinfo->cinfo, COL_INFO); /* build cinfo */ req = (tvb_get_uint8(tvb, offset) & 0x3C) >> 2; fpath = tvb_get_uint8(tvb, offset + 2); path = tvb_get_uint8(tvb, offset + 3); col_add_fstr(pinfo->cinfo, COL_INFO, "%s(%u,%u)", val_to_str_const(req, mpls_psc_req_short_vals, "Unknown-Request"), fpath, path); if (!tree) { return tvb_captured_length(tvb); } /* create display subtree for the protocol */ ti = proto_tree_add_item(tree, proto_mpls_psc, tvb, 0, -1, ENC_NA); psc_tree = proto_item_add_subtree(ti, ett_mpls_psc); /* version */ proto_tree_add_item(psc_tree, hf_mpls_psc_ver, tvb, offset, 1, ENC_BIG_ENDIAN); /* request */ proto_tree_add_item(psc_tree, hf_mpls_psc_req, tvb, offset, 1, ENC_BIG_ENDIAN); /* prot type */ proto_tree_add_item(psc_tree, hf_mpls_psc_pt, tvb, offset, 1, ENC_BIG_ENDIAN); offset += 1; /* prot type */ proto_tree_add_item(psc_tree, hf_mpls_psc_rev, tvb, offset, 1, ENC_BIG_ENDIAN); /* skip reserved1 */ offset += 1; /* fpath */ proto_tree_add_item(psc_tree, hf_mpls_psc_fpath, tvb, offset, 1, ENC_BIG_ENDIAN); offset += 1; /* path */ proto_tree_add_item(psc_tree, hf_mpls_psc_dpath, tvb, offset, 1, ENC_BIG_ENDIAN); offset += 1; /* tlv len */ proto_tree_add_item(psc_tree, hf_mpls_psc_tlvlen, tvb, offset, 1, ENC_BIG_ENDIAN); return tvb_captured_length(tvb); } void proto_register_mpls_psc(void) { static hf_register_info hf[] = { { &hf_mpls_psc_ver, { "Version", "mpls_psc.ver", FT_UINT8, BASE_DEC, NULL, 0xC0, NULL, HFILL } }, { &hf_mpls_psc_req, { "Request", "mpls_psc.req", FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_req_rvals), 0x3C, NULL, HFILL } }, { &hf_mpls_psc_pt, { "Protection Type", "mpls_psc.pt", FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_pt_rvals), 0x03, NULL, HFILL } }, { &hf_mpls_psc_rev, { "R", "mpls_psc.rev", FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_rev_rvals), 0x80, NULL, HFILL } }, { &hf_mpls_psc_fpath, { "Fault Path", "mpls_psc.fpath", FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_fpath_rvals), 0x0, NULL, HFILL } }, { &hf_mpls_psc_dpath, { "Data Path", "mpls_psc.dpath", FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_dpath_rvals), 0x0, NULL, HFILL } }, { &hf_mpls_psc_tlvlen, { "TLV Length", "mpls_psc.tlvlen", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL } }, }; static int *ett[] = { &ett_mpls_psc, }; proto_mpls_psc = proto_register_protocol("PSC", "MPLS[-TP] Protection State " "Coordination (PSC) Protocol", "mpls_psc"); proto_register_field_array(proto_mpls_psc, hf, array_length(hf)); proto_register_subtree_array(ett, array_length(ett)); mpls_psc_handle = register_dissector("mpls_psc", dissect_mpls_psc, proto_mpls_psc); } void proto_reg_handoff_mpls_psc(void) { dissector_add_uint("pwach.channel_type", PW_ACH_TYPE_PSC, mpls_psc_handle); } /* * Editor modelines - https://www.wireshark.org/tools/modelines.html * * Local variables: * c-basic-offset: 4 * tab-width: 8 * indent-tabs-mode: nil * End: * * vi: set shiftwidth=4 tabstop=8 expandtab: * :indentSize=4:tabSize=8:noTabs=true: */