1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
|
/* packet-h235.c
* Routines for H.235 packet dissection
* 2004 Tomas Kukosa
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "config.h"
#include <epan/packet.h>
#include <epan/oids.h>
#include <epan/asn1.h>
#include "packet-per.h"
#include "packet-h235.h"
#include "packet-h225.h"
#define PNAME "H235-SECURITY-MESSAGES"
#define PSNAME "H.235"
#define PFNAME "h235"
#define OID_MIKEY "0.0.8.235.0.3.76"
#define OID_MIKEY_PS "0.0.8.235.0.3.72"
#define OID_MIKEY_DHHMAC "0.0.8.235.0.3.73"
#define OID_MIKEY_PK_SIGN "0.0.8.235.0.3.74"
#define OID_MIKEY_DH_SIGN "0.0.8.235.0.3.75"
#define OID_TG "0.0.8.235.0.3.70"
#define OID_SG "0.0.8.235.0.3.71"
void proto_register_h235(void);
void proto_reg_handoff_h235(void);
/* Initialize the protocol and registered fields */
static int proto_h235 = -1;
#include "packet-h235-hf.c"
/* Initialize the subtree pointers */
#include "packet-h235-ett.c"
static int
dissect_xxx_ToBeSigned(tvbuff_t *tvb, int offset, asn1_ctx_t *actx, proto_tree *tree, int hf_index _U_) {
dissect_per_not_decoded_yet(tree, actx->pinfo, tvb, "ToBeSigned");
return offset;
}
#include "packet-h235-fn.c"
/*--- proto_register_h235 ----------------------------------------------*/
void proto_register_h235(void) {
/* List of fields */
static hf_register_info hf[] = {
#include "packet-h235-hfarr.c"
};
/* List of subtrees */
static gint *ett[] = {
#include "packet-h235-ettarr.c"
};
/* Register protocol */
proto_h235 = proto_register_protocol(PNAME, PSNAME, PFNAME);
/* Register fields and subtrees */
proto_register_field_array(proto_h235, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
/* OID names */
/* H.235.1, Chapter 15, Table 3 */
/* A */
oid_add_from_string("all fields in RAS/CS","0.0.8.235.0.1.1");
oid_add_from_string("all fields in RAS/CS","0.0.8.235.0.2.1");
/* T */
oid_add_from_string("ClearToken","0.0.8.235.0.1.5");
oid_add_from_string("ClearToken","0.0.8.235.0.2.5");
/* U */
oid_add_from_string("HMAC-SHA1-96","0.0.8.235.0.1.6");
oid_add_from_string("HMAC-SHA1-96","0.0.8.235.0.2.6");
/* H.235.7, Chapter 5, Table 1 */
oid_add_from_string("MIKEY", OID_MIKEY);
oid_add_from_string("MIKEY-PS", OID_MIKEY_PS);
oid_add_from_string("MIKEY-DHHMAC", OID_MIKEY_DHHMAC);
oid_add_from_string("MIKEY-PK-SIGN", OID_MIKEY_PK_SIGN);
oid_add_from_string("MIKEY-DH-SIGN", OID_MIKEY_DH_SIGN);
/* H.235.7, Chapter 8.5 */
oid_add_from_string("TG",OID_TG);
/* H.235.7, Chapter 9.5 */
oid_add_from_string("SG",OID_SG);
/* H.235.8, Chapter 4.2, Table 2 */
oid_add_from_string("AES_CM_128_HMAC_SHA1_80","0.0.8.235.0.4.91");
oid_add_from_string("AES_CM_128_HMAC_SHA1_32","0.0.8.235.0.4.92");
oid_add_from_string("F8_128_HMAC_SHA1_80","0.0.8.235.0.4.93");
}
/*--- proto_reg_handoff_h235 -------------------------------------------*/
void proto_reg_handoff_h235(void) {
dissector_handle_t mikey_handle;
mikey_handle = find_dissector("mikey");
/* H.235.7, Chapter 7.1, MIKEY operation at "session level" */
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY "/nonCollapsing/0", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PS "/nonCollapsing/0", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DHHMAC "/nonCollapsing/0", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PK_SIGN "/nonCollapsing/0", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DH_SIGN "/nonCollapsing/0", mikey_handle);
dissector_add_string("h245.gef.content", "EncryptionSync/0", mikey_handle);
/* H.235.7, Chapter 7.2, MIKEY operation at "media level" */
dissector_add_string("h245.gef.content", "EncryptionSync/76", mikey_handle);
dissector_add_string("h245.gef.content", "EncryptionSync/72", mikey_handle);
dissector_add_string("h245.gef.content", "EncryptionSync/73", mikey_handle);
dissector_add_string("h245.gef.content", "EncryptionSync/74", mikey_handle);
dissector_add_string("h245.gef.content", "EncryptionSync/75", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY "/nonCollapsing/76", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PS "/nonCollapsing/72", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DHHMAC "/nonCollapsing/73", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PK_SIGN "/nonCollapsing/74", mikey_handle);
dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DH_SIGN "/nonCollapsing/75", mikey_handle);
/* H.235.8, Chapter 4.1.2, SrtpCryptoCapability transport */
dissector_add_string("h245.gef.content", "GenericCapability/0.0.8.235.0.4.90/nonCollapsingRaw",
create_dissector_handle(dissect_SrtpCryptoCapability_PDU, proto_h235));
}
|