1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
|
/* Do not modify this file. Changes will be overwritten. */
/* Generated automatically by the ASN.1 to Wireshark dissector compiler */
/* packet-tcap.h */
/* asn2wrs.py -b -L -p tcap -c ./tcap.cnf -s ./packet-tcap-template -D . -O ../.. tcap.asn UnidialoguePDUs.asn DialoguePDUs.asn */
/* packet-tcap.h
*
* Copyright 2004, Tim Endean <endeant@hotmail.com>
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#ifndef PACKET_tcap_H
#define PACKET_tcap_H
#include "ws_symbol_export.h"
/* TCAP component type */
#define TCAP_COMP_INVOKE 0xa1
#define TCAP_COMP_RRL 0xa2
#define TCAP_COMP_RE 0xa3
#define TCAP_COMP_REJECT 0xa4
#define TCAP_COMP_RRN 0xa7
#define ANSI_TC_INVOKE_L 0xe9
#define ANSI_TC_RRL 0xea
#define ANSI_TC_RE 0xeb
#define ANSI_TC_REJECT 0xec
#define ANSI_TC_INVOKE_N 0xed
#define ANSI_TC_RRN 0xee
#define TCAP_SEQ_TAG 0x30
#define TCAP_SET_TAG 0x31
#define TCAP_INVOKE_ID_TAG 0x02
#define TCAP_LINKED_ID_TAG 0x80
#define TCAP_EOC_LEN 2
#define TCAP_CONSTRUCTOR(TCtag) (TCtag & 0x20)
#define TC_BEGIN 1
#define TC_CONT 2
#define TC_END 3
#define TC_ABORT 4
#define TC_ANSI_ABORT 5
#define TC_ANSI_ALL 6
struct tcap_private_t {
gboolean acv; /* Is the Application Context Version present */
const void * oid;
guint32 session_id;
void * context;
gchar *TransactionID_str;
guint32 src_tid;
guint32 dst_tid;
};
/** @file
* lists and hash tables used in wireshark's tcap dissector
* for calculation of delays in tcap-calls
*/
#define LENGTH_OID 23
struct tcaphash_context_t {
struct tcaphash_context_key_t * key;
guint32 session_id;
guint32 first_frame;
guint32 last_frame;
nstime_t begin_time; /**< time of arrival of TC_BEGIN */
nstime_t end_time; /**< time of closing message */
gboolean responded; /**< true, if request has been responded */
gboolean closed;
gboolean upper_dissector;
gboolean oid_present;
gchar oid[LENGTH_OID+1];
gboolean subdissector_present;
dissector_handle_t subdissector_handle;
void (* callback) (tvbuff_t *,packet_info *, proto_tree *, struct tcaphash_context_t *);
struct tcaphash_begincall_t * begincall;
struct tcaphash_contcall_t * contcall;
struct tcaphash_endcall_t * endcall;
struct tcaphash_ansicall_t * ansicall;
};
struct tcaphash_begincall_t {
struct tcaphash_begin_info_key_t * beginkey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_begincall_t * next_begincall;
struct tcaphash_begincall_t * previous_begincall;
};
struct tcaphash_contcall_t {
struct tcaphash_cont_info_key_t * contkey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_contcall_t * next_contcall;
struct tcaphash_contcall_t * previous_contcall;
};
struct tcaphash_endcall_t {
struct tcaphash_end_info_key_t * endkey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_endcall_t * next_endcall;
struct tcaphash_endcall_t * previous_endcall;
};
struct tcaphash_ansicall_t {
struct tcaphash_ansi_info_key_t * ansikey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_ansicall_t * next_ansicall;
struct tcaphash_ansicall_t * previous_ansicall;
};
/** The Key for the hash table is the TCAP origine transaction identifier
of the TC_BEGIN containing the InitialDP */
struct tcaphash_context_key_t {
guint32 session_id;
};
struct tcaphash_begin_info_key_t {
guint32 hashKey;
guint32 tid;
guint32 pc_hash;
};
struct tcaphash_cont_info_key_t {
guint32 hashKey;
guint32 src_tid;
guint32 dst_tid;
guint32 opc_hash;
guint32 dpc_hash;
};
struct tcaphash_end_info_key_t {
guint32 hashKey;
guint32 tid;
guint32 opc_hash;
guint32 dpc_hash;
};
struct tcaphash_ansi_info_key_t {
guint32 hashKey;
guint32 tid;
guint32 opc_hash;
guint32 dpc_hash;
};
/** List of infos to store for the analyse */
struct tcapsrt_info_t {
guint32 tcap_session_id;
guint32 src_tid;
guint32 dst_tid;
guint8 ope;
};
/**
* Initialize the Message Info used by the main dissector
* Data are linked to a TCAP transaction
*/
struct tcapsrt_info_t * tcapsrt_razinfo(void);
void tcapsrt_close(struct tcaphash_context_t * p_tcaphash_context,
packet_info * pinfo _U_);
/**
* Service Response Time analyze
* Called just after dissector call
* Associate a TCAP context to a tcap session and display session related infomations
* like the first frame, the last, the session duration,
* and a uniq session identifier for the filtering
*
* For ETSI tcap, the TCAP context can be reached through three keys
* - a key (BEGIN) identifying the session according to the tcap source identifier
* - a key (CONT) identifying the established session (src_id and dst_id)
* - a key (END) identifying the session according to the tcap destination identifier
*
* For ANSI tcap, the TCAP context is reached through a uniq key
* - a key (ANSI) identifying the session according to the tcap identifier
*/
struct tcaphash_context_t * tcapsrt_call_matching(tvbuff_t *tvb,
packet_info * pinfo _U_,
proto_tree *tree,
struct tcapsrt_info_t * p_tcap_info);
WS_DLL_PUBLIC gboolean gtcap_StatSRT;
extern gint tcap_standard;
extern const value_string tcap_component_type_str[];
void proto_reg_handoff_tcap(void);
void proto_register_tcap(void);
extern dissector_handle_t get_itu_tcap_subdissector(guint32 ssn);
dissector_handle_t get_ansi_tcap_subdissector(guint32 ssn);
extern void add_ansi_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
WS_DLL_PUBLIC void add_itu_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
extern void delete_ansi_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
WS_DLL_PUBLIC void delete_itu_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
extern void call_tcap_dissector(dissector_handle_t, tvbuff_t*, packet_info*, proto_tree*);
extern const value_string tcap_UniDialoguePDU_vals[];
extern const value_string tcap_DialoguePDU_vals[];
int dissect_tcap_UniDialoguePDU(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_);
int dissect_tcap_DialoguePDU(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_);
#endif /* PACKET_tcap_H */
|