summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-ansi_tcap.h
blob: bb511cb52e1c36a9bae08a50147a0712b2fa140c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
/* Do not modify this file. Changes will be overwritten.                      */
/* Generated automatically by the ASN.1 to Wireshark dissector compiler       */
/* packet-ansi_tcap.h                                                         */
/* asn2wrs.py -b -q -L -p ansi_tcap -c ./ansi_tcap.cnf -s ./packet-ansi_tcap-template -D . -O ../.. TCAP-Remote-Operations-Information-Objects.asn TCAPPackage.asn */

/* packet-ansi_tcap.h
 *
 * Copyright 2007 Anders Broman <anders.broman@ericsson.com>
 *
 * Wireshark - Network traffic analyzer
 * By Gerald Combs <gerald@wireshark.org>
 * Copyright 1998 Gerald Combs
 *
 * SPDX-License-Identifier: GPL-2.0-or-later
 */


#ifndef PACKET_ANSI_TCAP_H
#define PACKET_ANSI_TCAP_H

#define ANSI_TCAP_CTX_SIGNATURE 0x41544341  /* "ATCA" */

struct ansi_tcap_private_t {
  uint32_t signature;
  bool oid_is_present; /* Is the Application Context Version present */
  const void * objectApplicationId_oid;
  uint32_t session_id;
  void * context;
  char *TransactionID_str;
  struct {  /* "dynamic" data */
    int pdu;
      /*
         1 : invoke,
         2 : returnResult,
         3 : returnError,
         4 : reject
      */
    int OperationCode;
      /*
         0 : national,
         1 : private
      */
    int32_t OperationCode_national;
    int32_t OperationCode_private;
    proto_item *OperationCode_item;
  } d;

};

/*extern void add_ansi_tcap_subdissector(uint32_t ssn, dissector_handle_t dissector);*/


/*extern void delete_ansi_tcap_subdissector(uint32_t ssn, dissector_handle_t dissector);*/


#endif  /* PACKET_ANSI_TCAP_H */