1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
|
/* packet-opa-fe.c
* Routines for Omni-Path FE header dissection
* Copyright (c) 2016, Intel Corporation.
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "config.h"
#include <epan/packet.h>
#include <epan/prefs.h>
#include "packet-tls.h"
#include "packet-tcp.h"
void proto_reg_handoff_opa_fe(void);
void proto_register_opa_fe(void);
#define OPA_FE_TCP_RANGE "3245-3248" /* Not IANA registered */
#define OPA_FE_SSL_RANGE "3249-3252"
#define OPA_FE_HEADER_LEN 24
/* Wireshark ID */
static gint proto_opa_fe = -1;
/* Variables to hold expansion values between packets */
static gint ett_fe = -1;
/* SnC Fields */
static gint hf_opa_fe_magicnumber = -1;
static gint hf_opa_fe_length_oob = -1;
static gint hf_opa_fe_headerversion = -1;
static gint hf_opa_fe_length = -1;
static gint hf_opa_fe_Reserved64 = -1;
/* Dissector Declarations */
static dissector_handle_t opa_fe_handle;
static dissector_handle_t opa_mad_handle;
static range_t *global_fe_ssl_range = NULL;
static range_t *fe_ssl_range = NULL;
static guint get_opa_fe_message_len(packet_info *pinfo _U_, tvbuff_t *tvb, int offset, void *data _U_)
{
return tvb_get_ntohl(tvb, offset + 4);
}
static int dissect_opa_fe_message(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
{
gint offset = 0; /* Current Offset */
proto_item *FE_item;
proto_tree *FE_tree;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "Omni-Path");
col_clear(pinfo->cinfo, COL_INFO);
tree = proto_tree_get_root(tree);
FE_item = proto_tree_add_item(tree, proto_opa_fe, tvb, offset, OPA_FE_HEADER_LEN, ENC_NA);
FE_tree = proto_item_add_subtree(FE_item, ett_fe);
proto_tree_add_item(FE_tree, hf_opa_fe_magicnumber, tvb, offset, 4, ENC_BIG_ENDIAN);
offset += 4;
proto_tree_add_item(FE_tree, hf_opa_fe_length_oob, tvb, offset, 4, ENC_BIG_ENDIAN);
offset += 4;
proto_tree_add_item(FE_tree, hf_opa_fe_headerversion, tvb, offset, 4, ENC_BIG_ENDIAN);
offset += 4;
proto_tree_add_item(FE_tree, hf_opa_fe_length, tvb, offset, 4, ENC_BIG_ENDIAN);
offset += 4;
proto_tree_add_item(FE_tree, hf_opa_fe_Reserved64, tvb, offset, 8, ENC_BIG_ENDIAN);
offset += 8;
/* Pass to OPA MAD dissector */
call_dissector(opa_mad_handle, tvb_new_subset_remaining(tvb, offset), pinfo, FE_tree);
return tvb_captured_length(tvb);
}
static int dissect_opa_fe(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
{
tcp_dissect_pdus(tvb, pinfo, tree, TRUE, OPA_FE_HEADER_LEN,
get_opa_fe_message_len, dissect_opa_fe_message, data);
return tvb_reported_length(tvb);
}
static void range_delete_fe_ssl_callback(guint32 port, gpointer ptr _U_)
{
ssl_dissector_delete(port, opa_fe_handle);
}
static void range_add_fe_ssl_callback(guint32 port, gpointer ptr _U_)
{
ssl_dissector_add(port, opa_fe_handle);
}
void proto_register_opa_fe(void)
{
module_t *opa_fe_module;
static hf_register_info hf[] = {
{ &hf_opa_fe_magicnumber, {
"Magic Number", "opa.fe.magicnumber",
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL }
},
{ &hf_opa_fe_length_oob, {
"Length OOB", "opa.fe.lengthoob",
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL }
},
{ &hf_opa_fe_headerversion, {
"Header Version", "opa.fe.headerversion",
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL }
},
{ &hf_opa_fe_length, {
"Length", "opa.fe.length",
FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }
},
{ &hf_opa_fe_Reserved64, {
"Reserved (64 bits)", "opa.fe.reserved64",
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL }
}
};
static gint *ett[] = {
&ett_fe
};
proto_opa_fe = proto_register_protocol("Intel Omni-Path FE Header - Omni-Path Fabric Executive Header", "OPA FE", "opa.fe");
opa_fe_handle = register_dissector("opa.fe", dissect_opa_fe, proto_opa_fe);
proto_register_field_array(proto_opa_fe, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
opa_fe_module = prefs_register_protocol(proto_opa_fe, proto_reg_handoff_opa_fe);
range_convert_str(wmem_epan_scope(), &global_fe_ssl_range, OPA_FE_SSL_RANGE, 65535);
prefs_register_range_preference(opa_fe_module, "tls.port", "SSL/TLS Ports",
"SSL/TLS Ports range",
&global_fe_ssl_range, 65535);
prefs_register_obsolete_preference(opa_fe_module, "ssl.port");
}
void proto_reg_handoff_opa_fe(void)
{
static gboolean initialized = FALSE;
if (!initialized)
{
opa_mad_handle = find_dissector("opa.mad");
dissector_add_uint_range_with_preference("tcp.port", OPA_FE_TCP_RANGE, opa_fe_handle);
initialized = TRUE;
}
range_foreach(fe_ssl_range, range_delete_fe_ssl_callback, NULL);
wmem_free(wmem_epan_scope(), fe_ssl_range);
fe_ssl_range = range_copy(wmem_epan_scope(), global_fe_ssl_range);
range_foreach(fe_ssl_range, range_add_fe_ssl_callback, NULL);
}
/*
* Editor modelines - https://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 4
* tab-width: 8
* indent-tabs-mode: nil
* End:
*
* vi: set shiftwidth=4 tabstop=8 expandtab:
* :indentSize=4:tabSize=8:noTabs=true:
*/
|