2 * Routines for RADIUS packet disassembly
3 * Copyright 1999 Johan Feyaerts
5 * RFC 2865, RFC 2866, RFC 2867, RFC 2868, RFC 2869
7 * $Id: packet-radius.c,v 1.49 2002/02/26 11:55:37 guy Exp $
9 * Ethereal - Network traffic analyzer
10 * By Gerald Combs <gerald@ethereal.com>
11 * Copyright 1998 Gerald Combs
13 * This program is free software; you can redistribute it and/or
14 * modify it under the terms of the GNU General Public License
15 * as published by the Free Software Foundation; either version 2
16 * of the License, or (at your option) any later version.
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software
25 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
32 #ifdef HAVE_SYS_TYPES_H
33 # include <sys/types.h>
36 #ifdef HAVE_NETINET_IN_H
37 #include <netinet/in.h>
46 #include <epan/packet.h>
47 #include <epan/resolv.h>
49 static int proto_radius = -1;
50 static int hf_radius_length = -1;
51 static int hf_radius_code = -1;
52 static int hf_radius_id =-1;
54 static gint ett_radius = -1;
55 static gint ett_radius_avp = -1;
56 static gint ett_radius_eap = -1;
58 static dissector_handle_t eap_fragment_handle;
60 #define UDP_PORT_RADIUS 1645
61 #define UDP_PORT_RADIUS_NEW 1812
62 #define UDP_PORT_RADACCT 1646
63 #define UDP_PORT_RADACCT_NEW 1813
65 typedef struct _e_radiushdr {
71 typedef struct _e_avphdr {
76 typedef struct _value_value_pair {
81 #define RADIUS_ACCESS_REQUEST 1
82 #define RADIUS_ACCESS_ACCEPT 2
83 #define RADIUS_ACCESS_REJECT 3
84 #define RADIUS_ACCOUNTING_REQUEST 4
85 #define RADIUS_ACCOUNTING_RESPONSE 5
86 #define RADIUS_ACCESS_CHALLENGE 11
87 #define RADIUS_STATUS_SERVER 12
88 #define RADIUS_STATUS_CLIENT 13
89 #define RADIUS_RESERVED 255
91 #define RD_TP_USER_NAME 1
92 #define RD_TP_USER_PASSWORD 2
93 #define RD_TP_CHAP_PASSWORD 3
94 #define RD_TP_NAS_IP_ADDRESS 4
95 #define RD_TP_NAS_PORT 5
96 #define RD_TP_SERVICE_TYPE 6
97 #define RD_TP_FRAMED_PROTOCOL 7
98 #define RD_TP_FRAMED_IP_ADDRESS 8
99 #define RD_TP_FRAMED_IP_NETMASK 9
100 #define RD_TP_FRAMED_ROUTING 10
101 #define RD_TP_FILTER_ID 11
102 #define RD_TP_FRAMED_MTU 12
103 #define RD_TP_FRAMED_COMPRESSION 13
104 #define RD_TP_LOGIN_IP_HOST 14
105 #define RD_TP_LOGIN_SERVICE 15
106 #define RD_TP_LOGIN_TCP_PORT 16
107 #define RD_TP_UNASSIGNED 17
108 #define RD_TP_REPLY_MESSAGE 18
109 #define RD_TP_CALLBACK_NUMBER 19
110 #define RD_TP_CALLBACK_ID 20
111 #define RD_TP_UNASSIGNED2 21
112 #define RD_TP_FRAMED_ROUTE 22
113 #define RD_TP_FRAMED_IPX_NETWORK 23
114 #define RD_TP_STATE 24
115 #define RD_TP_CLASS 25
116 #define RD_TP_VENDOR_SPECIFIC 26
117 #define RD_TP_SESSION_TIMEOUT 27
118 #define RD_TP_IDLE_TIMEOUT 28
119 #define RD_TP_TERMINATING_ACTION 29
120 #define RD_TP_CALLED_STATION_ID 30
121 #define RD_TP_CALLING_STATION_ID 31
122 #define RD_TP_NAS_IDENTIFIER 32
123 #define RD_TP_PROXY_STATE 33
124 #define RD_TP_LOGIN_LAT_SERVICE 34
125 #define RD_TP_LOGIN_LAT_NODE 35
126 #define RD_TP_LOGIN_LAT_GROUP 36
127 #define RD_TP_FRAMED_APPLETALK_LINK 37
128 #define RD_TP_FRAMED_APPLETALK_NETWORK 38
129 #define RD_TP_FRAMED_APPLETALK_ZONE 39
130 #define RD_TP_ACCT_STATUS_TYPE 40
131 #define RD_TP_ACCT_DELAY_TIME 41
132 #define RD_TP_ACCT_INPUT_OCTETS 42
133 #define RD_TP_ACCT_OUTPUT_OCTETS 43
134 #define RD_TP_ACCT_SESSION_ID 44
135 #define RD_TP_ACCT_AUTHENTIC 45
136 #define RD_TP_ACCT_SESSION_TIME 46
137 #define RD_TP_ACCT_INPUT_PACKETS 47
138 #define RD_TP_ACCT_OUTPUT_PACKETS 48
139 #define RD_TP_ACCT_TERMINATE_CAUSE 49
140 #define RD_TP_ACCT_MULTI_SESSION_ID 50
141 #define RD_TP_ACCT_LINK_COUNT 51
142 #define RD_TP_ACCT_INPUT_GIGAWORDS 52
143 #define RD_TP_ACCT_OUTPUT_GIGAWORDS 53
145 #define RD_TP_EVENT_TIMESTAMP 55
147 #define RD_TP_CHAP_CHALLENGE 60
148 #define RD_TP_NAS_PORT_TYPE 61
149 #define RD_TP_PORT_LIMIT 62
150 #define RD_TP_LOGIN_LAT_PORT 63
151 #define RD_TP_TUNNEL_TYPE 64
152 #define RD_TP_TUNNEL_MEDIUM_TYPE 65
153 #define RD_TP_TUNNEL_CLIENT_ENDPOINT 66
154 #define RD_TP_TUNNEL_SERVER_ENDPOINT 67
155 #define RD_TP_TUNNEL_CONNECTION 68
156 #define RD_TP_TUNNEL_PASSWORD 69
157 #define RD_TP_ARAP_PASSWORD 70
158 #define RD_TP_ARAP_FEATURES 71
159 #define RD_TP_ARAP_ZONE_ACCESS 72
160 #define RD_TP_ARAP_SECURITY 73
161 #define RD_TP_ARAP_SECURITY_DATA 74
162 #define RD_TP_PASSWORD_RETRY 75
163 #define RD_TP_PROMPT 76
164 #define RD_TP_CONNECT_INFO 77
165 #define RD_TP_CONFIGURATION_TOKEN 78
166 #define RD_TP_EAP_MESSAGE 79
167 #define RD_TP_MESSAGE_AUTHENTICATOR 80
168 #define RD_TP_TUNNEL_PRIVATE_GROUP_ID 81
169 #define RD_TP_TUNNEL_ASSIGNMENT_ID 82
170 #define RD_TP_TUNNEL_TUNNEL_PREFERENCE 83
171 #define RD_TP_TUNNEL_PACKETS_LOST 86
172 #define RD_TP_NAS_PORT_ID 87
173 #define RD_TP_TUNNEL_CLIENT_AUTH_ID 90
174 #define RD_TP_TUNNEL_SERVER_AUTH_ID 91
175 #define RD_TP_ASCEND_MODEM_PORTNO 120
176 #define RD_TP_ASCEND_MODEM_SLOTNO 121
177 #define RD_TP_ASCEND_MULTILINK_ID 187
178 #define RD_TP_ASCEND_NUM_IN_MULTILINK 188
179 #define RD_TP_ASCEND_FIRST_DEST 189
180 #define RD_TP_ASCEND_PRE_INPUT_OCTETS 190
181 #define RD_TP_ASCEND_PRE_OUTPUT_OCTETS 191
182 #define RD_TP_ASCEND_PRE_INPUT_PACKETS 192
183 #define RD_TP_ASCEND_PRE_OUTPUT_PACKETS 193
184 #define RD_TP_ASCEND_MAXIMUM_TIME 194
185 #define RD_TP_ASCEND_DISCONNECT_CAUSE 195
186 #define RD_TP_ASCEND_CONNECT_PROGRESS 196
187 #define RD_TP_ASCEND_DATA_RATE 197
188 #define RD_TP_ASCEND_PRESESSION_TIME 198
189 #define RD_TP_ASCEND_ASSIGN_IP_POOL 218
190 #define RD_TP_ASCEND_XMIT_RATE 255
196 #define AUTHENTICATOR_LENGTH 16
197 #define RD_HDR_LENGTH 4
200 #define RADIUS_STRING 1
201 #define RADIUS_BINSTRING 2
202 #define RADIUS_INTEGER4 3
203 #define RADIUS_IP_ADDRESS 4
204 #define RADIUS_SERVICE_TYPE 5
205 #define RADIUS_FRAMED_PROTOCOL 6
206 #define RADIUS_FRAMED_ROUTING 7
207 #define RADIUS_FRAMED_COMPRESSION 8
208 #define RADIUS_LOGIN_SERVICE 9
209 #define RADIUS_UNKNOWN 10
210 #define RADIUS_IPX_ADDRESS 11
211 #define RADIUS_TERMINATING_ACTION 12
212 #define RADIUS_ACCOUNTING_STATUS_TYPE 13
213 #define RADIUS_ACCT_AUTHENTIC 14
214 #define RADIUS_ACCT_TERMINATE_CAUSE 15
215 #define RADIUS_NAS_PORT_TYPE 16
216 #define RADIUS_TUNNEL_TYPE 17
217 #define RADIUS_TUNNEL_MEDIUM_TYPE 18
218 #define RADIUS_STRING_TAGGED 19
219 #define RADIUS_VENDOR_SPECIFIC 20
220 #define RADIUS_TIMESTAMP 21
221 #define RADIUS_INTEGER4_TAGGED 22
223 static value_string radius_vals[] = {
224 {RADIUS_ACCESS_REQUEST, "Access Request"},
225 {RADIUS_ACCESS_ACCEPT, "Access Accept"},
226 {RADIUS_ACCESS_REJECT, "Access Reject"},
227 {RADIUS_ACCOUNTING_REQUEST, "Accounting Request"},
228 {RADIUS_ACCOUNTING_RESPONSE, "Accounting Response"},
229 {RADIUS_ACCESS_CHALLENGE, "Access challenge"},
230 {RADIUS_STATUS_SERVER, "StatusServer"},
231 {RADIUS_STATUS_CLIENT, "StatusClient"},
232 {RADIUS_RESERVED, "Reserved"},
235 static value_string radius_service_type_vals[]=
238 {3, "Callback Login"},
239 {4, "Callback Framed"},
241 {6, "Administrative"},
243 {8, "Authenticate Only"},
244 {9, "Callback NAS Prompt"},
249 * These are SMI Network Management Private Enterprise Codes for
252 * http://www.isi.edu/in-notes/iana/assignments/enterprise-numbers
257 #define VENDOR_CISCO 9
258 #define VENDOR_SHIVA 166
259 #define VENDOR_LIVINGSTON 307
260 #define VENDOR_3COM 429
261 #define VENDOR_ASCEND 529
262 #define VENDOR_BAY 1584
263 #define VENDOR_JUNIPER 2636
264 #define VENDOR_COSINE 3085
265 #define VENDOR_UNISPHERE 4874
267 static value_string radius_vendor_specific_vendors[]=
269 {VENDOR_CISCO,"Cisco"},
270 {VENDOR_SHIVA,"Shiva"},
271 {VENDOR_LIVINGSTON,"Livingston"},
272 {VENDOR_3COM,"3Com"},
273 {VENDOR_ASCEND,"Ascend"},
274 {VENDOR_BAY,"Bay Networks"},
275 {VENDOR_JUNIPER,"Juniper Networks"},
276 {VENDOR_COSINE,"CoSine Communications"},
277 {VENDOR_UNISPHERE,"Unisphere Networks"},
280 #define VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME 1
281 #define VENDOR_COSINE_VSA_ENTERPRISE_ID 2
282 #define VENDOR_COSINE_VSA_ADDRESS_POOL_NAME 3
283 #define VENDOR_COSINE_VSA_DS_BYTE 4
284 #define VENDOR_COSINE_VSA_VPI_VCI 5
285 #define VENDOR_COSINE_VSA_DLCI 6
286 #define VENDOR_COSINE_VSA_LNS_IP_ADDRESS 7
287 #define VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID 8
289 static value_string radius_vendor_cosine_types[]=
290 {{VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME,"Connection Profile Name"},
291 {VENDOR_COSINE_VSA_ENTERPRISE_ID,"Enterprise ID"},
292 {VENDOR_COSINE_VSA_ADDRESS_POOL_NAME,"Address Pool Name"},
293 {VENDOR_COSINE_VSA_DS_BYTE,"DS Byte"},
294 {VENDOR_COSINE_VSA_VPI_VCI,"VPI/VCI"},
295 {VENDOR_COSINE_VSA_DLCI,"DLCI"},
296 {VENDOR_COSINE_VSA_LNS_IP_ADDRESS,"LNS IP Address"},
297 {VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID,"CLI User Permission ID"},
300 static value_string radius_framed_protocol_vals[]=
303 {3, "Appletalk Remote Access Protocol (ARAP)"},
304 {4, "Gandalf proprietary Singlelink/Multilink Protocol"},
305 {5, "Xylogics proprietary IPX/SLIP"},
306 {6, "X.75 Synchronous"},
311 static value_string radius_framed_routing_vals[]=
312 {{1, "Send Routing Packets"},
313 {2, "Listen for routing packets"},
314 {3, "Send and Listen"},
318 static value_string radius_framed_compression_vals[]=
319 {{1, "VJ TCP/IP Header Compression"},
320 {2, "IPX Header Compression"},
321 {3, "Stac-LZS compression"},
325 static value_string radius_login_service_vals[]=
332 {8, "TCP Clear Quit"},
336 static value_string radius_terminating_action_vals[]=
337 {{1, "RADIUS-Request"},
341 static value_string radius_accounting_status_type_vals[]=
344 {3, "Interim-Update"},
346 {8,"Accounting-Off"},
347 {9, "Tunnel-Start"}, /* Tunnel accounting */
348 {10, "Tunnel-Stop"}, /* Tunnel accounting */
349 {11, "Tunnel-Reject"}, /* Tunnel accounting */
350 {12, "Tunnel-Link-Start"}, /* Tunnel accounting */
351 {13, "Tunnel-Link-Stop"}, /* Tunnel accounting */
352 {14, "Tunnel-Link-Reject"}, /* Tunnel accounting */
355 static value_string radius_accounting_authentication_vals[]=
359 /* RFC 2866 says 3 is Remote. Is 7 a mistake? */
363 static value_string radius_acct_terminate_cause_vals[]=
364 {{1, "User Request"},
368 {5,"Session Timeout"},
375 {12, "Port Unneeded"},
376 {13, "Port Preempted"},
377 {14,"Port Suspended"},
378 {15,"Service Unavailable"},
384 static value_string radius_tunnel_type_vals[]=
399 static value_string radius_tunnel_medium_type_vals[]=
417 static value_string radius_nas_port_type_vals[]=
421 {3, "ISDN Async V.120"},
422 {4,"ISDN Async V.110"},
425 {7, "HDLC Clear Channel"},
436 {18,"Wireless Other"},
437 {19,"Wireless IEEE 802.11"},
440 static value_value_pair radius_printinfo[] = {
441 { RD_TP_USER_NAME, RADIUS_STRING },
442 { RD_TP_USER_PASSWORD,RADIUS_BINSTRING },
443 { RD_TP_CHAP_PASSWORD, RADIUS_BINSTRING },
444 { RD_TP_NAS_IP_ADDRESS, RADIUS_IP_ADDRESS },
445 { RD_TP_NAS_PORT, RADIUS_INTEGER4},
446 { RD_TP_SERVICE_TYPE, RADIUS_SERVICE_TYPE},
447 { RD_TP_FRAMED_PROTOCOL, RADIUS_FRAMED_PROTOCOL},
448 { RD_TP_FRAMED_IP_ADDRESS, RADIUS_IP_ADDRESS},
449 { RD_TP_FRAMED_IP_NETMASK, RADIUS_IP_ADDRESS},
450 { RD_TP_FRAMED_ROUTING, RADIUS_FRAMED_ROUTING},
451 { RD_TP_FILTER_ID, RADIUS_STRING},
452 { RD_TP_FRAMED_MTU, RADIUS_INTEGER4},
453 { RD_TP_FRAMED_COMPRESSION, RADIUS_FRAMED_COMPRESSION},
454 { RD_TP_LOGIN_IP_HOST, RADIUS_IP_ADDRESS},
455 { RD_TP_LOGIN_SERVICE, RADIUS_LOGIN_SERVICE},
456 { RD_TP_LOGIN_TCP_PORT, RADIUS_INTEGER4},
457 { RD_TP_UNASSIGNED, RADIUS_UNKNOWN},
458 { RD_TP_REPLY_MESSAGE, RADIUS_STRING},
459 { RD_TP_CALLBACK_NUMBER, RADIUS_BINSTRING},
460 { RD_TP_CALLBACK_ID, RADIUS_BINSTRING},
461 { RD_TP_UNASSIGNED2, RADIUS_UNKNOWN},
462 { RD_TP_FRAMED_ROUTE, RADIUS_STRING},
463 { RD_TP_FRAMED_IPX_NETWORK, RADIUS_IPX_ADDRESS},
464 { RD_TP_STATE, RADIUS_BINSTRING},
465 { RD_TP_CLASS, RADIUS_BINSTRING},
466 { RD_TP_VENDOR_SPECIFIC, RADIUS_VENDOR_SPECIFIC},
467 { RD_TP_SESSION_TIMEOUT, RADIUS_INTEGER4},
468 { RD_TP_IDLE_TIMEOUT, RADIUS_INTEGER4},
469 { RD_TP_TERMINATING_ACTION, RADIUS_TERMINATING_ACTION},
470 { RD_TP_CALLED_STATION_ID, RADIUS_BINSTRING},
471 { RD_TP_CALLING_STATION_ID, RADIUS_BINSTRING},
472 { RD_TP_NAS_IDENTIFIER, RADIUS_BINSTRING},
473 { RD_TP_PROXY_STATE, RADIUS_BINSTRING},
474 { RD_TP_LOGIN_LAT_SERVICE, RADIUS_BINSTRING},
475 { RD_TP_LOGIN_LAT_NODE, RADIUS_BINSTRING},
476 { RD_TP_LOGIN_LAT_GROUP, RADIUS_BINSTRING},
477 { RD_TP_FRAMED_APPLETALK_LINK, RADIUS_INTEGER4},
478 { RD_TP_FRAMED_APPLETALK_NETWORK, RADIUS_INTEGER4},
479 { RD_TP_FRAMED_APPLETALK_ZONE, RADIUS_BINSTRING},
480 { RD_TP_ACCT_STATUS_TYPE, RADIUS_ACCOUNTING_STATUS_TYPE},
481 { RD_TP_ACCT_DELAY_TIME, RADIUS_INTEGER4},
482 { RD_TP_ACCT_INPUT_OCTETS, RADIUS_INTEGER4},
483 { RD_TP_ACCT_OUTPUT_OCTETS, RADIUS_INTEGER4},
484 { RD_TP_ACCT_SESSION_ID, RADIUS_STRING},
485 { RD_TP_ACCT_AUTHENTIC, RADIUS_ACCT_AUTHENTIC},
486 { RD_TP_ACCT_SESSION_TIME, RADIUS_INTEGER4},
487 { RD_TP_ACCT_INPUT_PACKETS, RADIUS_INTEGER4},
488 { RD_TP_ACCT_OUTPUT_PACKETS, RADIUS_INTEGER4},
489 { RD_TP_ACCT_TERMINATE_CAUSE, RADIUS_ACCT_TERMINATE_CAUSE},
490 { RD_TP_ACCT_MULTI_SESSION_ID, RADIUS_STRING},
491 { RD_TP_ACCT_LINK_COUNT, RADIUS_INTEGER4},
492 { RD_TP_ACCT_INPUT_GIGAWORDS, RADIUS_INTEGER4},
493 { RD_TP_ACCT_OUTPUT_GIGAWORDS, RADIUS_INTEGER4},
494 { RD_TP_EVENT_TIMESTAMP, RADIUS_TIMESTAMP},
495 { RD_TP_CHAP_CHALLENGE, RADIUS_BINSTRING},
496 { RD_TP_NAS_PORT_TYPE, RADIUS_NAS_PORT_TYPE},
497 { RD_TP_PORT_LIMIT, RADIUS_INTEGER4},
498 { RD_TP_LOGIN_LAT_PORT, RADIUS_BINSTRING},
499 { RD_TP_TUNNEL_TYPE, RADIUS_TUNNEL_TYPE},
500 { RD_TP_TUNNEL_MEDIUM_TYPE, RADIUS_TUNNEL_MEDIUM_TYPE},
501 { RD_TP_TUNNEL_CLIENT_ENDPOINT, RADIUS_STRING_TAGGED},
502 { RD_TP_TUNNEL_SERVER_ENDPOINT, RADIUS_STRING_TAGGED},
503 { RD_TP_TUNNEL_CONNECTION, RADIUS_BINSTRING},
504 { RD_TP_TUNNEL_PASSWORD, RADIUS_STRING_TAGGED},
505 { RD_TP_ARAP_PASSWORD, RADIUS_BINSTRING},
506 { RD_TP_ARAP_FEATURES, RADIUS_BINSTRING},
507 { RD_TP_ARAP_ZONE_ACCESS, RADIUS_BINSTRING},
508 { RD_TP_ARAP_SECURITY, RADIUS_BINSTRING},
509 { RD_TP_ARAP_SECURITY_DATA, RADIUS_BINSTRING},
510 { RD_TP_PASSWORD_RETRY, RADIUS_BINSTRING},
511 { RD_TP_PROMPT, RADIUS_BINSTRING},
512 { RD_TP_CONNECT_INFO, RADIUS_STRING},
513 { RD_TP_CONFIGURATION_TOKEN, RADIUS_BINSTRING},
514 { RD_TP_EAP_MESSAGE, RADIUS_BINSTRING},
515 { RD_TP_MESSAGE_AUTHENTICATOR, RADIUS_BINSTRING},
516 { RD_TP_TUNNEL_PRIVATE_GROUP_ID, RADIUS_STRING_TAGGED},
517 { RD_TP_TUNNEL_ASSIGNMENT_ID, RADIUS_STRING_TAGGED},
518 { RD_TP_TUNNEL_TUNNEL_PREFERENCE, RADIUS_INTEGER4_TAGGED},
519 { RD_TP_TUNNEL_PACKETS_LOST, RADIUS_INTEGER4},
520 { RD_TP_NAS_PORT_ID, RADIUS_STRING},
521 { RD_TP_TUNNEL_CLIENT_AUTH_ID, RADIUS_STRING_TAGGED},
522 { RD_TP_TUNNEL_SERVER_AUTH_ID, RADIUS_STRING_TAGGED},
523 { RD_TP_ASCEND_MODEM_PORTNO, RADIUS_INTEGER4},
524 { RD_TP_ASCEND_MODEM_SLOTNO, RADIUS_INTEGER4},
525 { RD_TP_ASCEND_MULTILINK_ID, RADIUS_INTEGER4},
526 { RD_TP_ASCEND_NUM_IN_MULTILINK, RADIUS_INTEGER4},
527 { RD_TP_ASCEND_FIRST_DEST, RADIUS_IP_ADDRESS},
528 { RD_TP_ASCEND_PRE_INPUT_OCTETS, RADIUS_INTEGER4},
529 { RD_TP_ASCEND_PRE_OUTPUT_OCTETS, RADIUS_INTEGER4},
530 { RD_TP_ASCEND_PRE_INPUT_PACKETS, RADIUS_INTEGER4},
531 { RD_TP_ASCEND_PRE_OUTPUT_PACKETS, RADIUS_INTEGER4},
532 { RD_TP_ASCEND_MAXIMUM_TIME, RADIUS_INTEGER4},
533 { RD_TP_ASCEND_DISCONNECT_CAUSE, RADIUS_INTEGER4},
534 { RD_TP_ASCEND_CONNECT_PROGRESS, RADIUS_INTEGER4},
535 { RD_TP_ASCEND_DATA_RATE, RADIUS_INTEGER4},
536 { RD_TP_ASCEND_PRESESSION_TIME, RADIUS_INTEGER4},
537 { RD_TP_ASCEND_ASSIGN_IP_POOL, RADIUS_INTEGER4},
538 { RD_TP_ASCEND_XMIT_RATE, RADIUS_INTEGER4},
542 static value_string radius_attrib_type_vals[] = {
543 { RD_TP_USER_NAME, "User Name"},
544 { RD_TP_USER_PASSWORD, "User Password"},
545 { RD_TP_CHAP_PASSWORD, "Chap Password"},
546 { RD_TP_NAS_IP_ADDRESS, "NAS IP Address"},
547 { RD_TP_NAS_PORT, "NAS Port"},
548 { RD_TP_SERVICE_TYPE, "Service Type"},
549 { RD_TP_FRAMED_PROTOCOL, "Framed Protocol"},
550 { RD_TP_FRAMED_IP_ADDRESS, "Framed IP Address"},
551 { RD_TP_FRAMED_IP_NETMASK, "Framed IP Netmask"},
552 { RD_TP_FRAMED_ROUTING, "Framed Routing"},
553 { RD_TP_FILTER_ID, "Filter Id"},
554 { RD_TP_FRAMED_MTU, "Framed MTU"},
555 { RD_TP_FRAMED_COMPRESSION, "Framed Compression"},
556 { RD_TP_LOGIN_IP_HOST, "Login IP Host"},
557 { RD_TP_LOGIN_SERVICE, "Login Service"},
558 { RD_TP_LOGIN_TCP_PORT, "Login TCP Port"},
559 { RD_TP_UNASSIGNED, "Unassigned"},
560 { RD_TP_REPLY_MESSAGE, "Reply Message"},
561 { RD_TP_CALLBACK_NUMBER, "Callback Number"},
562 { RD_TP_CALLBACK_ID, "Callback Id"},
563 { RD_TP_UNASSIGNED2, "Unassigned"},
564 { RD_TP_FRAMED_ROUTE, "Framed Route"},
565 { RD_TP_FRAMED_IPX_NETWORK, "Framed IPX network"},
566 { RD_TP_STATE, "State"},
567 { RD_TP_CLASS, "Class"},
568 { RD_TP_VENDOR_SPECIFIC, "Vendor Specific" },
569 { RD_TP_SESSION_TIMEOUT, "Session Timeout"},
570 { RD_TP_IDLE_TIMEOUT, "Idle Timeout"},
571 { RD_TP_TERMINATING_ACTION, "Terminating Action"},
572 { RD_TP_CALLED_STATION_ID, "Called Station Id"},
573 { RD_TP_CALLING_STATION_ID, "Calling Station Id"},
574 { RD_TP_NAS_IDENTIFIER, "NAS identifier"},
575 { RD_TP_PROXY_STATE, "Proxy State"},
576 { RD_TP_LOGIN_LAT_SERVICE, "Login LAT Service"},
577 { RD_TP_LOGIN_LAT_NODE, "Login LAT Node"},
578 { RD_TP_LOGIN_LAT_GROUP, "Login LAT Group"},
579 { RD_TP_FRAMED_APPLETALK_LINK, "Framed Appletalk Link"},
580 { RD_TP_FRAMED_APPLETALK_NETWORK, "Framed Appletalk Network"},
581 { RD_TP_FRAMED_APPLETALK_ZONE, "Framed Appletalk Zone"},
582 { RD_TP_ACCT_STATUS_TYPE, "Acct Status Type"},
583 { RD_TP_ACCT_DELAY_TIME, "Acct Delay Time"},
584 { RD_TP_ACCT_INPUT_OCTETS, "Acct Input Octets"},
585 { RD_TP_ACCT_OUTPUT_OCTETS, "Acct Output Octets"},
586 { RD_TP_ACCT_SESSION_ID, "Acct Session Id"},
587 { RD_TP_ACCT_AUTHENTIC, "Acct Authentic"},
588 { RD_TP_ACCT_SESSION_TIME, "Acct Session Time"},
589 { RD_TP_ACCT_INPUT_PACKETS, "Acct Input Packets"},
590 { RD_TP_ACCT_OUTPUT_PACKETS, "Acct Output Packets"},
591 { RD_TP_ACCT_TERMINATE_CAUSE, "Acct Terminate Cause"},
592 { RD_TP_ACCT_MULTI_SESSION_ID, "Acct Multi Session Id"},
593 { RD_TP_ACCT_LINK_COUNT, "Acct Link Count"},
594 { RD_TP_ACCT_INPUT_GIGAWORDS, "Acct Input Gigawords"},
595 { RD_TP_ACCT_OUTPUT_GIGAWORDS, "Acct Output Gigawords"},
596 { RD_TP_EVENT_TIMESTAMP, "Event Timestamp"},
597 { RD_TP_CHAP_CHALLENGE, "Chap Challenge"},
598 { RD_TP_NAS_PORT_TYPE, "NAS Port Type"},
599 { RD_TP_PORT_LIMIT, "Port Limit"},
600 { RD_TP_LOGIN_LAT_PORT, "Login LAT Port"},
601 { RD_TP_TUNNEL_TYPE, "Tunnel Type"},
602 { RD_TP_TUNNEL_MEDIUM_TYPE, "Tunnel Medium Type"},
603 { RD_TP_TUNNEL_CLIENT_ENDPOINT, "Tunnel Client Endpoint"},
604 { RD_TP_TUNNEL_SERVER_ENDPOINT, "Tunnel Server Endpoint"},
605 { RD_TP_TUNNEL_CONNECTION, "Tunnel Connection"},
606 { RD_TP_TUNNEL_PASSWORD, "Tunnel Password"},
607 { RD_TP_ARAP_PASSWORD, "ARAP-Password"},
608 { RD_TP_ARAP_FEATURES, "ARAP-Features"},
609 { RD_TP_ARAP_ZONE_ACCESS, "ARAP-Zone-Access"},
610 { RD_TP_ARAP_SECURITY, "ARAP-Security"},
611 { RD_TP_ARAP_SECURITY_DATA, "ARAP-Security-Data"},
612 { RD_TP_PASSWORD_RETRY, "Password-Retry"},
613 { RD_TP_PROMPT, "Prompt"},
614 { RD_TP_CONNECT_INFO, "Connect-Info"},
615 { RD_TP_CONFIGURATION_TOKEN, "Configuration-Token"},
616 { RD_TP_EAP_MESSAGE, "EAP-Message"},
617 { RD_TP_MESSAGE_AUTHENTICATOR, "Message Authenticator"},
618 { RD_TP_TUNNEL_PRIVATE_GROUP_ID, "Tunnel Private Group ID"},
619 { RD_TP_TUNNEL_ASSIGNMENT_ID, "Tunnel Assignment ID"},
620 { RD_TP_TUNNEL_TUNNEL_PREFERENCE, "Tunnel Preference"},
621 { RD_TP_TUNNEL_PACKETS_LOST, "Tunnel Packets Lost"},
622 { RD_TP_NAS_PORT_ID, "NAS Port ID"},
623 { RD_TP_TUNNEL_CLIENT_AUTH_ID, "Tunnel Client Auth ID"},
624 { RD_TP_TUNNEL_SERVER_AUTH_ID, "Tunnel Server Auth ID"},
625 { RD_TP_ASCEND_MODEM_PORTNO, "Ascend Modem Port No"},
626 { RD_TP_ASCEND_MODEM_SLOTNO, "Ascend Modem Slot No"},
627 { RD_TP_ASCEND_MULTILINK_ID, "Ascend Multilink ID"},
628 { RD_TP_ASCEND_NUM_IN_MULTILINK, "Ascend Num In Multilink"},
629 { RD_TP_ASCEND_FIRST_DEST, "Ascend First Dest"},
630 { RD_TP_ASCEND_PRE_INPUT_OCTETS, "Ascend Pre Input Octets"},
631 { RD_TP_ASCEND_PRE_OUTPUT_OCTETS, "Ascend Pre Output Octets"},
632 { RD_TP_ASCEND_PRE_INPUT_PACKETS, "Ascend Pre Input Packets"},
633 { RD_TP_ASCEND_PRE_OUTPUT_PACKETS, "Ascend Pre Output Packets"},
634 { RD_TP_ASCEND_MAXIMUM_TIME, "Ascend Maximum Time"},
635 { RD_TP_ASCEND_DISCONNECT_CAUSE, "Ascend Disconnect Cause"},
636 { RD_TP_ASCEND_CONNECT_PROGRESS, "Ascend Connect Progress"},
637 { RD_TP_ASCEND_DATA_RATE, "Ascend Data Rate"},
638 { RD_TP_ASCEND_PRESESSION_TIME, "Ascend PreSession Time"},
639 { RD_TP_ASCEND_ASSIGN_IP_POOL, "Ascend Assign IP Pool"},
640 { RD_TP_ASCEND_XMIT_RATE, "Ascend Xmit Rate"},
644 guint32 match_numval(guint32 val, const value_value_pair *vs)
649 if (vs[i].val1 == val)
657 static gchar textbuffer[2000];
659 gchar *rdconvertbufftostr(gchar *dest, tvbuff_t *tvb, int offset, int length)
661 /*converts the raw buffer into printable text */
664 const guint8 *pd = tvb_get_ptr(tvb, offset, length);
669 for (i=0; i < (guint32)length; i++)
671 if( isalnum((int)pd[i])||ispunct((int)pd[i])
672 ||((int)pd[i]==' ')) {
673 dest[totlen]=(gchar)pd[i];
678 sprintf(&(dest[totlen]), "\\%03u", pd[i]);
679 totlen=totlen+strlen(&(dest[totlen]));
687 gchar *rd_match_strval(guint32 val, const value_string *vs) {
688 return val_to_str(val, vs, "Undefined (%u)");
691 gchar *rd_value_to_str(e_avphdr *avph, tvbuff_t *tvb, int offset)
695 value_string *valstrarr;
701 extern char *tzname[2];
703 /* prints the values of the attribute value pairs into a text buffer */
704 print_type=match_numval(avph->avp_type,radius_printinfo);
707 strcpy(textbuffer,"Value:");
708 cont=&textbuffer[strlen(textbuffer)];
711 case( RADIUS_STRING ):
712 case( RADIUS_BINSTRING ):
713 rdconvertbufftostr(cont,tvb,offset+2,avph->avp_length-2);
715 case( RADIUS_INTEGER4 ):
716 sprintf(cont,"%u", tvb_get_ntohl(tvb,offset+2));
718 case( RADIUS_IP_ADDRESS ):
719 ip_to_str_buf(tvb_get_ptr(tvb,offset+2,4),cont);
721 case( RADIUS_SERVICE_TYPE ):
722 valstrarr=radius_service_type_vals;
723 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
725 case( RADIUS_FRAMED_PROTOCOL ):
726 valstrarr= radius_framed_protocol_vals;
727 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
729 case( RADIUS_FRAMED_ROUTING ):
730 valstrarr=radius_framed_routing_vals;
731 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
733 case( RADIUS_FRAMED_COMPRESSION ):
734 valstrarr=radius_framed_compression_vals;
735 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
737 case( RADIUS_LOGIN_SERVICE ):
738 valstrarr=radius_login_service_vals;
739 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
741 case( RADIUS_IPX_ADDRESS ):
742 pd = tvb_get_ptr(tvb,offset+2,4);
743 sprintf(cont,"%u:%u:%u:%u",(guint8)pd[offset+2],
744 (guint8)pd[offset+3],(guint8)pd[offset+4],
745 (guint8)pd[offset+5]);
746 case( RADIUS_TERMINATING_ACTION ):
747 valstrarr=radius_terminating_action_vals;
748 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
750 case( RADIUS_ACCOUNTING_STATUS_TYPE ):
751 valstrarr=radius_accounting_status_type_vals;
752 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
754 case( RADIUS_ACCT_AUTHENTIC ):
755 valstrarr=radius_accounting_authentication_vals;
756 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
758 case( RADIUS_ACCT_TERMINATE_CAUSE ):
759 valstrarr=radius_acct_terminate_cause_vals;
760 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
762 case( RADIUS_NAS_PORT_TYPE ):
763 valstrarr=radius_nas_port_type_vals;
764 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
766 case( RADIUS_TUNNEL_TYPE ):
767 valstrarr=radius_tunnel_type_vals;
769 intval = tvb_get_ntohl(tvb,offset+2);
771 sprintf(textbuffer, "Tag:%u, Value:%s",
773 rd_match_strval(intval & 0xffffff,valstrarr));
776 strcpy(cont,rd_match_strval(intval,valstrarr));
778 case( RADIUS_TUNNEL_MEDIUM_TYPE ):
779 valstrarr=radius_tunnel_medium_type_vals;
780 intval = tvb_get_ntohl(tvb,offset+2);
783 sprintf(textbuffer, "Tag:%u, Value:%s",
785 rd_match_strval(intval & 0xffffff,valstrarr));
788 strcpy(cont,rd_match_strval(intval,valstrarr));
790 case( RADIUS_STRING_TAGGED ):
792 tag = tvb_get_guint8(tvb,offset+2);
794 sprintf(textbuffer, "Tag:%u, Value:",
796 cont=&textbuffer[strlen(textbuffer)];
797 rdconvertbufftostr(cont,tvb,offset+3,avph->avp_length-3);
800 rdconvertbufftostr(cont,tvb,offset+2,avph->avp_length-2);
802 case ( RADIUS_VENDOR_SPECIFIC ):
803 valstrarr=radius_vendor_specific_vendors;
804 sprintf(textbuffer,"Vendor:%s,",
805 rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
806 cont=&textbuffer[strlen(textbuffer)];
807 switch (tvb_get_ntohl(tvb,offset+2)) {
808 case ( VENDOR_COSINE ):
809 vtype = tvb_get_guint8(tvb,offset+6);
811 case ( VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME ):
812 case ( VENDOR_COSINE_VSA_ENTERPRISE_ID ):
813 case ( VENDOR_COSINE_VSA_ADDRESS_POOL_NAME ):
814 case ( VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID ):
815 sprintf(cont," Type:%s, Value:",
816 rd_match_strval(vtype, radius_vendor_cosine_types));
817 cont=&textbuffer[strlen(textbuffer)];
818 rdconvertbufftostr(cont,tvb,offset+8,avph->avp_length-8);
820 case ( VENDOR_COSINE_VSA_VPI_VCI ):
821 sprintf(cont," Type:%s, Value:%u/%u",
822 rd_match_strval(vtype, radius_vendor_cosine_types),
823 tvb_get_ntohs(tvb,offset+8),
824 tvb_get_ntohs(tvb,offset+10));
826 case ( VENDOR_COSINE_VSA_DS_BYTE ):
827 case ( VENDOR_COSINE_VSA_DLCI ):
828 sprintf(cont," Type:%s, Value:%u",
829 rd_match_strval(vtype, radius_vendor_cosine_types),
830 tvb_get_ntohl(tvb,offset+8));
832 case ( VENDOR_COSINE_VSA_LNS_IP_ADDRESS ):
833 sprintf(cont," Type:%s, Value:",
834 rd_match_strval(vtype, radius_vendor_cosine_types));
835 cont=&textbuffer[strlen(textbuffer)];
836 ip_to_str_buf(tvb_get_ptr(tvb,offset+8,4),cont);
839 sprintf(cont," Unknown Value Type");
844 sprintf(cont, " Value:");
845 rdconvertbufftostr(cont,tvb,offset+6,avph->avp_length-6);
849 case( RADIUS_TIMESTAMP ):
850 intval=tvb_get_ntohl(tvb,offset+2);
851 rtimestamp=ctime((time_t*)&intval);
852 rtimestamp[strlen(rtimestamp)-1]=0;
853 sprintf(cont,"%d (%s %s)", tvb_get_ntohl(tvb,offset+2), rtimestamp, *tzname);
855 case( RADIUS_INTEGER4_TAGGED ):
856 intval = tvb_get_ntohl(tvb,offset+2);
859 sprintf(textbuffer, "Tag:%u, Value:%u",
864 sprintf(cont,"%u", intval);
866 case( RADIUS_UNKNOWN ):
868 strcpy(textbuffer,"Unknown Value Type");
871 if (cont == textbuffer) {
872 strcpy(cont,"Unknown Value");
878 void dissect_attribute_value_pairs(tvbuff_t *tvb, int offset,proto_tree *tree,
879 int avplength,packet_info *pinfo)
881 /* adds the attribute value pairs to the tree */
885 guint8 *reassembled_data = NULL;
886 int reassembled_data_len = 0;
891 proto_tree_add_text(tree, tvb,offset,0,"No Attribute Value Pairs Found");
896 * In case we throw an exception, clean up whatever stuff we've
897 * allocated (if any).
899 CLEANUP_PUSH(g_free, reassembled_data);
901 while (avplength > 0)
903 tvb_memcpy(tvb,(guint8 *)&avph,offset,sizeof(e_avphdr));
904 avptpstrval = match_strval(avph.avp_type, radius_attrib_type_vals);
905 if (avptpstrval == NULL)
906 avptpstrval = "Unknown Type";
907 if (avph.avp_length < 2) {
909 * This AVP is bogus - the length includes the type and length
910 * fields, so it must be >= 2.
912 proto_tree_add_text(tree, tvb, offset, avph.avp_length,
913 "t:%s(%u) l:%u (length not >= 2)",
914 avptpstrval,avph.avp_type,avph.avp_length);
918 if (avph.avp_type == RD_TP_EAP_MESSAGE) {
920 proto_tree *eap_tree;
926 ti = proto_tree_add_text(tree, tvb,offset,avph.avp_length,"t:%s(%u) l:%u",
927 avptpstrval,avph.avp_type,avph.avp_length);
928 eap_tree = proto_item_add_subtree(ti, ett_radius_eap);
929 tvb_len = tvb_length_remaining(tvb, offset+2);
930 data_len = avph.avp_length-2;
931 if (data_len < tvb_len)
933 next_tvb = tvb_new_subset(tvb, offset+2, tvb_len, data_len);
936 * Set the columns non-writable, so that the packet list
937 * shows this as an RADIUS packet, not as an EAP packet.
939 * XXX - we'll call the EAP dissector only if we're building
940 * a protocol tree. The EAP dissector currently saves no state,
941 * and won't be modifying the columns, so that's OK right now,
942 * but it might call the SSL dissector - if that maintains state
943 * needed for dissection, we'll have to arrange that AVPs be
944 * dissected even if we're not building a protocol tree.
946 col_set_writable(pinfo->cinfo, FALSE);
949 * RFC 2869 says, in section 5.13, describing the EAP-Message
952 * The String field contains EAP packets, as defined in [3]. If
953 * multiple EAP-Message attributes are present in a packet their
954 * values should be concatenated; this allows EAP packets longer than
955 * 253 octets to be passed by RADIUS.
957 * Do reassembly of EAP-Message attributes.
960 /* Are we in the process of reassembling? */
961 if (reassembled_data != NULL) {
962 /* Yes - show this as an EAP fragment. */
963 proto_tree_add_text(eap_tree, next_tvb, 0, -1, "EAP fragment");
966 * Do we have all of the data in this fragment?
968 if (tvb_len >= data_len) {
970 * Yes - add it to the reassembled data.
972 tvb_memcpy(next_tvb, reassembled_data + reassembled_data_len,
974 reassembled_data_len += data_len;
975 data_needed -= data_len;
976 if (data_needed <= 0) {
978 * We got at least as much data as we needed; we're done
980 * XXX - what if we got more?
984 * Allocate a new tvbuff, referring to the reassembled payload.
986 next_tvb = tvb_new_real_data(reassembled_data, reassembled_data_len,
987 reassembled_data_len);
990 * We have a tvbuff that refers to this data, so we shouldn't
991 * free this data if we throw an exception; clear
992 * "reassembled_data", so the cleanup handler won't free it.
994 reassembled_data = NULL;
995 reassembled_data_len = 0;
999 * Arrange that the allocated packet data copy be freed when the
1002 tvb_set_free_cb(next_tvb, g_free);
1005 * Add the tvbuff to the list of tvbuffs to which the tvbuff we
1006 * were handed refers, so it'll get cleaned up when that tvbuff
1009 tvb_set_child_real_data_tvbuff(tvb, next_tvb);
1011 /* Add the defragmented data to the data source list. */
1012 add_new_data_source(pinfo->fd, next_tvb, "Reassembled EAP");
1014 /* Now dissect it. */
1015 call_dissector(eap_fragment_handle, next_tvb, pinfo, eap_tree);
1020 * No - hand it to the dissector.
1022 result = call_dissector(eap_fragment_handle, next_tvb, pinfo, eap_tree);
1024 /* This is only part of the full EAP packet; start reassembly. */
1025 proto_tree_add_text(eap_tree, next_tvb, 0, -1, "EAP fragment");
1026 reassembled_data_len = data_len;
1027 data_needed = -result;
1028 reassembled_data = g_malloc(reassembled_data_len + data_needed);
1029 tvb_memcpy(next_tvb, reassembled_data, 0, reassembled_data_len);
1033 valstr = rd_value_to_str(&avph, tvb, offset);
1034 proto_tree_add_text(tree, tvb,offset,avph.avp_length,
1035 "t:%s(%u) l:%u, %s",
1036 avptpstrval,avph.avp_type,avph.avp_length,valstr);
1039 offset = offset+avph.avp_length;
1040 avplength = avplength-avph.avp_length;
1044 * Call the cleanup handler to free any reassembled data we haven't
1045 * attached to a tvbuff, and pop the handler.
1047 CLEANUP_CALL_AND_POP;
1050 static void dissect_radius(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
1052 proto_tree *radius_tree,*avptree;
1053 proto_item *ti,*avptf;
1057 int avplength,hdrlength;
1062 if (check_col(pinfo->cinfo, COL_PROTOCOL))
1063 col_set_str(pinfo->cinfo, COL_PROTOCOL, "RADIUS");
1064 if (check_col(pinfo->cinfo, COL_INFO))
1065 col_clear(pinfo->cinfo, COL_INFO);
1067 tvb_memcpy(tvb,(guint8 *)&rh,0,sizeof(e_radiushdr));
1069 rhcode= (int)rh.rh_code;
1070 rhident= (int)rh.rh_ident;
1071 rhlength= (int)ntohs(rh.rh_pktlength);
1072 codestrval= match_strval(rhcode,radius_vals);
1073 if (codestrval==NULL)
1075 codestrval="Unknown Packet";
1077 if (check_col(pinfo->cinfo, COL_INFO))
1079 col_add_fstr(pinfo->cinfo,COL_INFO,"%s(%d) (id=%d, l=%d)",
1080 codestrval, rhcode, rhident, rhlength);
1085 ti = proto_tree_add_item(tree,proto_radius, tvb, 0, rhlength, FALSE);
1087 radius_tree = proto_item_add_subtree(ti, ett_radius);
1089 proto_tree_add_uint(radius_tree,hf_radius_code, tvb, 0, 1,
1091 proto_tree_add_uint_format(radius_tree,hf_radius_id, tvb, 1, 1,
1092 rh.rh_ident, "Packet identifier: 0x%01x (%d)",
1095 proto_tree_add_uint(radius_tree, hf_radius_length, tvb,
1097 proto_tree_add_text(radius_tree, tvb, 4,
1098 AUTHENTICATOR_LENGTH,
1101 hdrlength=RD_HDR_LENGTH+AUTHENTICATOR_LENGTH;
1102 avplength= rhlength -hdrlength;
1104 if (avplength > 0) {
1105 /* list the attribute value pairs */
1107 avptf = proto_tree_add_text(radius_tree,
1108 tvb,hdrlength,avplength,
1109 "Attribute value pairs");
1110 avptree = proto_item_add_subtree(avptf, ett_radius_avp);
1114 dissect_attribute_value_pairs(tvb, hdrlength,
1115 avptree,avplength,pinfo);
1120 /* registration with the filtering engine */
1122 proto_register_radius(void)
1124 static hf_register_info hf[] = {
1126 { "Code","radius.code", FT_UINT8, BASE_DEC, VALS(radius_vals), 0x0,
1130 { "Identifier", "radius.id", FT_UINT8, BASE_DEC, NULL, 0x0,
1133 { &hf_radius_length,
1134 { "Length","radius.length", FT_UINT16, BASE_DEC, NULL, 0x0,
1137 static gint *ett[] = {
1143 proto_radius = proto_register_protocol("Radius Protocol", "RADIUS",
1145 proto_register_field_array(proto_radius, hf, array_length(hf));
1146 proto_register_subtree_array(ett, array_length(ett));
1150 proto_reg_handoff_radius(void)
1152 dissector_handle_t radius_handle;
1155 * Get a handle for the EAP fragment dissector.
1157 eap_fragment_handle = find_dissector("eap_fragment");
1159 radius_handle = create_dissector_handle(dissect_radius, proto_radius);
1160 dissector_add("udp.port", UDP_PORT_RADIUS, radius_handle);
1161 dissector_add("udp.port", UDP_PORT_RADIUS_NEW, radius_handle);
1162 dissector_add("udp.port", UDP_PORT_RADACCT, radius_handle);
1163 dissector_add("udp.port", UDP_PORT_RADACCT_NEW, radius_handle);