summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-pa-hbbackup.c
blob: b51bca5fcf08d70e793f5e28c28540bbadf567bb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
/* packet-hbbak.c
 * Routines for ethertype 0x8988 Paloalto heartbeat backup traffic via mgmt
 *
 * Copyright 2020 Joerg Mayer (see AUTHORS file)
 *
 * Wireshark - Network traffic analyzer
 * By Gerald Combs <gerald@wireshark.org>
 * Copyright 1998 Gerald Combs
 *
 * SPDX-License-Identifier: GPL-2.0-or-later
 */

/* 2do:
 * - Find out the meaning of the 6 bytes header: timestamp?
 * - Handle trailer bytes correctly
 */

#include "config.h"

#include <epan/packet.h>
#include <epan/etypes.h>

void proto_reg_handoff_hbbak(void);
void proto_register_hbbak(void);

#define PROTO_SHORT_NAME "PA-HB-Bak"
#define PROTO_LONG_NAME "Palo Alto Heartbeat Backup"

#define HBBAK_SIZE 8

static int proto_hbbak = -1;
static int hf_hbbak_unknown1 = -1;
static int hf_hbbak_etype_outer = -1;
static int hf_hbbak_trailer = -1;

static gint ett_hbbak = -1;

static dissector_handle_t hbbak_handle;
static dissector_handle_t ethertype_handle;

static int
dissect_hbbak(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
	proto_tree *ti, *hbbak_tree;
	int offset = 0;
	guint16 eth_type_outer;
	ethertype_data_t ethertype_data;

	col_set_str(pinfo->cinfo, COL_PROTOCOL, PROTO_SHORT_NAME);
	col_clear(pinfo->cinfo, COL_INFO);
	col_add_fstr(pinfo->cinfo, COL_INFO, PROTO_LONG_NAME);

	hbbak_tree = NULL;
	ti = proto_tree_add_item(tree, proto_hbbak, tvb, offset, HBBAK_SIZE, ENC_NA);
	hbbak_tree = proto_item_add_subtree(ti, ett_hbbak);

	proto_tree_add_item(hbbak_tree, hf_hbbak_unknown1, tvb, offset, 6, ENC_NA);
	offset += 6;
	eth_type_outer = tvb_get_ntohs(tvb, offset);
	proto_tree_add_uint(hbbak_tree, hf_hbbak_etype_outer, tvb,
			    offset, 2, eth_type_outer);

	ethertype_data.etype = eth_type_outer;
	ethertype_data.payload_offset = HBBAK_SIZE;
	ethertype_data.fh_tree = hbbak_tree;
	ethertype_data.trailer_id = hf_hbbak_trailer;
	ethertype_data.fcs_len = 0;

	call_dissector_with_data(ethertype_handle, tvb, pinfo, tree, &ethertype_data);

	return tvb_captured_length(tvb);
}

void
proto_register_hbbak(void)
{
	static hf_register_info hf[] = {
		{ &hf_hbbak_unknown1,
		{ "Unknown1", "hbbak.unknown1", FT_BYTES, BASE_NONE, NULL,
			0x0, NULL, HFILL }},

		{ &hf_hbbak_etype_outer,
		{ "Type", "hbbak.etype", FT_UINT16, BASE_HEX, VALS(etype_vals),
			0x0, NULL, HFILL }},

		{ &hf_hbbak_trailer,
		{ "Trailer", "hbbak.trailer", FT_BYTES, BASE_NONE, NULL,
			0x0, NULL, HFILL }},

	};

	static gint *ett[] = {
		&ett_hbbak,
	};

	proto_hbbak = proto_register_protocol(PROTO_LONG_NAME, PROTO_LONG_NAME, "hbbak");
	proto_register_field_array(proto_hbbak, hf, array_length(hf));
	proto_register_subtree_array(ett, array_length(ett));
	hbbak_handle = register_dissector("hbbak", dissect_hbbak, proto_hbbak);
}

void
proto_reg_handoff_hbbak(void)
{

	ethertype_handle = find_dissector_add_dependency("ethertype", proto_hbbak);

	dissector_add_uint("ethertype", ETHERTYPE_PA_HBBACKUP, hbbak_handle);
}

/*
 * Editor modelines  -  https://www.wireshark.org/tools/modelines.html
 *
 * Local variables:
 * c-basic-offset: 8
 * tab-width: 8
 * indent-tabs-mode: t
 * End:
 *
 * vi: set shiftwidth=8 tabstop=8 noexpandtab:
 * :indentSize=8:tabSize=8:noTabs=false:
 */