tvb_get_nstringz() needs to terminate a string with a NUL if the
[metze/wireshark/wip.git] / packet-radius.c
1 /* packet-radius.c
2  * Routines for RADIUS packet disassembly
3  * Copyright 1999 Johan Feyaerts
4  *
5  * RFC 2865, RFC 2866, RFC 2867, RFC 2868, RFC 2869
6  *
7  * $Id: packet-radius.c,v 1.49 2002/02/26 11:55:37 guy Exp $
8  *
9  * Ethereal - Network traffic analyzer
10  * By Gerald Combs <gerald@ethereal.com>
11  * Copyright 1998 Gerald Combs
12  *
13  * This program is free software; you can redistribute it and/or
14  * modify it under the terms of the GNU General Public License
15  * as published by the Free Software Foundation; either version 2
16  * of the License, or (at your option) any later version.
17  *
18  * This program is distributed in the hope that it will be useful,
19  * but WITHOUT ANY WARRANTY; without even the implied warranty of
20  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
21  * GNU General Public License for more details.
22  *
23  * You should have received a copy of the GNU General Public License
24  * along with this program; if not, write to the Free Software
25  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
26  */
27
28 #ifdef HAVE_CONFIG_H
29 #include "config.h"
30 #endif
31
32 #ifdef HAVE_SYS_TYPES_H
33 # include <sys/types.h>
34 #endif
35
36 #ifdef HAVE_NETINET_IN_H
37 #include <netinet/in.h>
38 #endif
39
40 #include <stdio.h>
41 #include <stdlib.h>
42 #include <string.h>
43 #include <ctype.h>
44 #include <glib.h>
45 #include <time.h>
46 #include <epan/packet.h>
47 #include <epan/resolv.h>
48
49 static int proto_radius = -1;
50 static int hf_radius_length = -1;
51 static int hf_radius_code = -1;
52 static int hf_radius_id =-1;
53
54 static gint ett_radius = -1;
55 static gint ett_radius_avp = -1;
56 static gint ett_radius_eap = -1;
57
58 static dissector_handle_t eap_fragment_handle;
59
60 #define UDP_PORT_RADIUS         1645
61 #define UDP_PORT_RADIUS_NEW     1812
62 #define UDP_PORT_RADACCT        1646
63 #define UDP_PORT_RADACCT_NEW    1813
64
65 typedef struct _e_radiushdr {
66         guint8 rh_code;
67         guint8 rh_ident;
68         guint16 rh_pktlength;
69 } e_radiushdr;
70
71 typedef struct _e_avphdr {
72         guint8 avp_type;
73         guint8 avp_length;
74 } e_avphdr;
75
76 typedef struct _value_value_pair {
77         guint16 val1;
78         guint16 val2;
79 } value_value_pair;
80
81 #define RADIUS_ACCESS_REQUEST 1
82 #define RADIUS_ACCESS_ACCEPT  2
83 #define RADIUS_ACCESS_REJECT  3
84 #define RADIUS_ACCOUNTING_REQUEST 4
85 #define RADIUS_ACCOUNTING_RESPONSE 5
86 #define RADIUS_ACCESS_CHALLENGE 11
87 #define RADIUS_STATUS_SERVER 12
88 #define RADIUS_STATUS_CLIENT 13
89 #define RADIUS_RESERVED 255
90
91 #define RD_TP_USER_NAME 1
92 #define RD_TP_USER_PASSWORD 2
93 #define RD_TP_CHAP_PASSWORD 3
94 #define RD_TP_NAS_IP_ADDRESS 4
95 #define RD_TP_NAS_PORT 5
96 #define RD_TP_SERVICE_TYPE 6
97 #define RD_TP_FRAMED_PROTOCOL 7
98 #define RD_TP_FRAMED_IP_ADDRESS 8
99 #define RD_TP_FRAMED_IP_NETMASK 9
100 #define RD_TP_FRAMED_ROUTING 10
101 #define RD_TP_FILTER_ID 11
102 #define RD_TP_FRAMED_MTU 12
103 #define RD_TP_FRAMED_COMPRESSION 13
104 #define RD_TP_LOGIN_IP_HOST 14
105 #define RD_TP_LOGIN_SERVICE 15
106 #define RD_TP_LOGIN_TCP_PORT 16
107 #define RD_TP_UNASSIGNED 17
108 #define RD_TP_REPLY_MESSAGE 18
109 #define RD_TP_CALLBACK_NUMBER 19
110 #define RD_TP_CALLBACK_ID 20
111 #define RD_TP_UNASSIGNED2 21
112 #define RD_TP_FRAMED_ROUTE 22
113 #define RD_TP_FRAMED_IPX_NETWORK 23
114 #define RD_TP_STATE 24
115 #define RD_TP_CLASS 25
116 #define RD_TP_VENDOR_SPECIFIC 26
117 #define RD_TP_SESSION_TIMEOUT 27
118 #define RD_TP_IDLE_TIMEOUT 28
119 #define RD_TP_TERMINATING_ACTION 29
120 #define RD_TP_CALLED_STATION_ID 30
121 #define RD_TP_CALLING_STATION_ID 31
122 #define RD_TP_NAS_IDENTIFIER 32
123 #define RD_TP_PROXY_STATE 33
124 #define RD_TP_LOGIN_LAT_SERVICE 34
125 #define RD_TP_LOGIN_LAT_NODE 35
126 #define RD_TP_LOGIN_LAT_GROUP 36
127 #define RD_TP_FRAMED_APPLETALK_LINK 37
128 #define RD_TP_FRAMED_APPLETALK_NETWORK 38
129 #define RD_TP_FRAMED_APPLETALK_ZONE 39
130 #define RD_TP_ACCT_STATUS_TYPE 40
131 #define RD_TP_ACCT_DELAY_TIME 41
132 #define RD_TP_ACCT_INPUT_OCTETS 42
133 #define RD_TP_ACCT_OUTPUT_OCTETS 43
134 #define RD_TP_ACCT_SESSION_ID 44
135 #define RD_TP_ACCT_AUTHENTIC 45
136 #define RD_TP_ACCT_SESSION_TIME 46
137 #define RD_TP_ACCT_INPUT_PACKETS 47
138 #define RD_TP_ACCT_OUTPUT_PACKETS 48
139 #define RD_TP_ACCT_TERMINATE_CAUSE 49
140 #define RD_TP_ACCT_MULTI_SESSION_ID 50
141 #define RD_TP_ACCT_LINK_COUNT 51
142 #define RD_TP_ACCT_INPUT_GIGAWORDS 52
143 #define RD_TP_ACCT_OUTPUT_GIGAWORDS 53
144 /* 54 Unused */
145 #define RD_TP_EVENT_TIMESTAMP 55
146 /* 56-59 Unused */ 
147 #define RD_TP_CHAP_CHALLENGE 60
148 #define RD_TP_NAS_PORT_TYPE 61
149 #define RD_TP_PORT_LIMIT 62
150 #define RD_TP_LOGIN_LAT_PORT 63
151 #define RD_TP_TUNNEL_TYPE 64
152 #define RD_TP_TUNNEL_MEDIUM_TYPE 65
153 #define RD_TP_TUNNEL_CLIENT_ENDPOINT 66
154 #define RD_TP_TUNNEL_SERVER_ENDPOINT 67
155 #define RD_TP_TUNNEL_CONNECTION 68
156 #define RD_TP_TUNNEL_PASSWORD 69
157 #define RD_TP_ARAP_PASSWORD 70
158 #define RD_TP_ARAP_FEATURES 71
159 #define RD_TP_ARAP_ZONE_ACCESS 72
160 #define RD_TP_ARAP_SECURITY 73
161 #define RD_TP_ARAP_SECURITY_DATA 74
162 #define RD_TP_PASSWORD_RETRY 75
163 #define RD_TP_PROMPT 76
164 #define RD_TP_CONNECT_INFO 77
165 #define RD_TP_CONFIGURATION_TOKEN 78
166 #define RD_TP_EAP_MESSAGE 79
167 #define RD_TP_MESSAGE_AUTHENTICATOR 80
168 #define RD_TP_TUNNEL_PRIVATE_GROUP_ID 81
169 #define RD_TP_TUNNEL_ASSIGNMENT_ID 82
170 #define RD_TP_TUNNEL_TUNNEL_PREFERENCE 83
171 #define RD_TP_TUNNEL_PACKETS_LOST 86
172 #define RD_TP_NAS_PORT_ID 87
173 #define RD_TP_TUNNEL_CLIENT_AUTH_ID 90
174 #define RD_TP_TUNNEL_SERVER_AUTH_ID 91
175 #define RD_TP_ASCEND_MODEM_PORTNO 120
176 #define RD_TP_ASCEND_MODEM_SLOTNO 121
177 #define RD_TP_ASCEND_MULTILINK_ID 187
178 #define RD_TP_ASCEND_NUM_IN_MULTILINK 188
179 #define RD_TP_ASCEND_FIRST_DEST 189
180 #define RD_TP_ASCEND_PRE_INPUT_OCTETS 190
181 #define RD_TP_ASCEND_PRE_OUTPUT_OCTETS 191
182 #define RD_TP_ASCEND_PRE_INPUT_PACKETS 192
183 #define RD_TP_ASCEND_PRE_OUTPUT_PACKETS 193
184 #define RD_TP_ASCEND_MAXIMUM_TIME 194
185 #define RD_TP_ASCEND_DISCONNECT_CAUSE 195
186 #define RD_TP_ASCEND_CONNECT_PROGRESS 196
187 #define RD_TP_ASCEND_DATA_RATE 197
188 #define RD_TP_ASCEND_PRESESSION_TIME 198
189 #define RD_TP_ASCEND_ASSIGN_IP_POOL 218
190 #define RD_TP_ASCEND_XMIT_RATE 255
191
192
193
194
195
196 #define AUTHENTICATOR_LENGTH 16
197 #define RD_HDR_LENGTH 4
198
199
200 #define RADIUS_STRING 1
201 #define RADIUS_BINSTRING 2
202 #define RADIUS_INTEGER4 3
203 #define RADIUS_IP_ADDRESS 4
204 #define RADIUS_SERVICE_TYPE 5
205 #define RADIUS_FRAMED_PROTOCOL 6
206 #define RADIUS_FRAMED_ROUTING 7
207 #define RADIUS_FRAMED_COMPRESSION 8
208 #define RADIUS_LOGIN_SERVICE 9
209 #define RADIUS_UNKNOWN 10
210 #define RADIUS_IPX_ADDRESS 11
211 #define RADIUS_TERMINATING_ACTION 12
212 #define RADIUS_ACCOUNTING_STATUS_TYPE 13
213 #define RADIUS_ACCT_AUTHENTIC 14
214 #define RADIUS_ACCT_TERMINATE_CAUSE 15
215 #define RADIUS_NAS_PORT_TYPE 16
216 #define RADIUS_TUNNEL_TYPE 17
217 #define RADIUS_TUNNEL_MEDIUM_TYPE 18
218 #define RADIUS_STRING_TAGGED 19
219 #define RADIUS_VENDOR_SPECIFIC 20
220 #define RADIUS_TIMESTAMP 21
221 #define RADIUS_INTEGER4_TAGGED 22
222
223 static value_string radius_vals[] = {
224  {RADIUS_ACCESS_REQUEST, "Access Request"},
225  {RADIUS_ACCESS_ACCEPT, "Access Accept"},
226  {RADIUS_ACCESS_REJECT, "Access Reject"},
227  {RADIUS_ACCOUNTING_REQUEST, "Accounting Request"},
228  {RADIUS_ACCOUNTING_RESPONSE, "Accounting Response"},
229  {RADIUS_ACCESS_CHALLENGE, "Access challenge"},
230  {RADIUS_STATUS_SERVER, "StatusServer"},
231  {RADIUS_STATUS_CLIENT, "StatusClient"},
232  {RADIUS_RESERVED, "Reserved"},
233 {0, NULL}};
234
235 static value_string radius_service_type_vals[]=
236 {{1, "Login"},
237 {2, "Framed"},
238 {3, "Callback Login"},
239 {4, "Callback Framed"},
240 {5, "Outbound"},
241 {6, "Administrative"},
242 {7, "NAS Prompt"},
243 {8, "Authenticate Only"},
244 {9, "Callback NAS Prompt"},
245 {10, "Call Check"},
246 {0,NULL}};
247
248 /*
249  * These are SMI Network Management Private Enterprise Codes for
250  * organizations; see
251  *
252  *      http://www.isi.edu/in-notes/iana/assignments/enterprise-numbers
253  *
254  * for a list.
255  */
256 #define VENDOR_ACC 5
257 #define VENDOR_CISCO 9
258 #define VENDOR_SHIVA 166
259 #define VENDOR_LIVINGSTON 307
260 #define VENDOR_3COM 429
261 #define VENDOR_ASCEND 529
262 #define VENDOR_BAY 1584
263 #define VENDOR_JUNIPER 2636
264 #define VENDOR_COSINE 3085
265 #define VENDOR_UNISPHERE 4874
266
267 static value_string radius_vendor_specific_vendors[]=
268 {{VENDOR_ACC,"ACC"},
269 {VENDOR_CISCO,"Cisco"},
270 {VENDOR_SHIVA,"Shiva"},
271 {VENDOR_LIVINGSTON,"Livingston"},
272 {VENDOR_3COM,"3Com"},
273 {VENDOR_ASCEND,"Ascend"},
274 {VENDOR_BAY,"Bay Networks"},
275 {VENDOR_JUNIPER,"Juniper Networks"},
276 {VENDOR_COSINE,"CoSine Communications"},
277 {VENDOR_UNISPHERE,"Unisphere Networks"},
278 {0,NULL}};
279
280 #define VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME 1
281 #define VENDOR_COSINE_VSA_ENTERPRISE_ID 2
282 #define VENDOR_COSINE_VSA_ADDRESS_POOL_NAME 3
283 #define VENDOR_COSINE_VSA_DS_BYTE 4
284 #define VENDOR_COSINE_VSA_VPI_VCI 5
285 #define VENDOR_COSINE_VSA_DLCI 6
286 #define VENDOR_COSINE_VSA_LNS_IP_ADDRESS 7
287 #define VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID 8
288
289 static value_string radius_vendor_cosine_types[]=
290 {{VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME,"Connection Profile Name"},
291 {VENDOR_COSINE_VSA_ENTERPRISE_ID,"Enterprise ID"},
292 {VENDOR_COSINE_VSA_ADDRESS_POOL_NAME,"Address Pool Name"},
293 {VENDOR_COSINE_VSA_DS_BYTE,"DS Byte"},
294 {VENDOR_COSINE_VSA_VPI_VCI,"VPI/VCI"},
295 {VENDOR_COSINE_VSA_DLCI,"DLCI"},
296 {VENDOR_COSINE_VSA_LNS_IP_ADDRESS,"LNS IP Address"},
297 {VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID,"CLI User Permission ID"},
298 {0,NULL}};
299
300 static value_string radius_framed_protocol_vals[]=
301 {{1, "PPP"},
302 {2, "SLIP"},
303 {3, "Appletalk Remote Access Protocol (ARAP)"},
304 {4, "Gandalf proprietary Singlelink/Multilink Protocol"},
305 {5, "Xylogics proprietary IPX/SLIP"},
306 {6, "X.75 Synchronous"},
307 {256, "Ascend MPP"},
308 {262, "Ascend MP"},
309 {0,NULL}};
310
311 static value_string radius_framed_routing_vals[]=
312 {{1, "Send Routing Packets"},
313 {2, "Listen for routing packets"},
314 {3, "Send and Listen"},
315 {0,"None"},
316 {0,NULL}};
317
318 static value_string radius_framed_compression_vals[]=
319 {{1, "VJ TCP/IP Header Compression"},
320 {2, "IPX Header Compression"},
321 {3, "Stac-LZS compression"},
322 {0, "None"},
323 {0,NULL}};
324
325 static value_string radius_login_service_vals[]=
326 {{1, "Rlogin"},
327 {2, "TCP Clear"},
328 {3, "Portmaster"},
329 {4, "LAT"},
330 {5, "X.25-PAD"},
331 {6, "X.25T3POS"},
332 {8, "TCP Clear Quit"},
333 {0, "Telnet"},
334 {0,NULL}};
335
336 static value_string radius_terminating_action_vals[]=
337 {{1, "RADIUS-Request"},
338 {0, "Default"},
339 {0,NULL}};
340
341 static value_string radius_accounting_status_type_vals[]=
342 {{1, "Start"},
343 {2, "Stop"},
344 {3, "Interim-Update"},
345 {7,"Accounting-On"},
346 {8,"Accounting-Off"},
347 {9, "Tunnel-Start"}, /* Tunnel accounting */
348 {10, "Tunnel-Stop"}, /* Tunnel accounting */
349 {11, "Tunnel-Reject"}, /* Tunnel accounting */
350 {12, "Tunnel-Link-Start"}, /* Tunnel accounting */
351 {13, "Tunnel-Link-Stop"}, /* Tunnel accounting */
352 {14, "Tunnel-Link-Reject"}, /* Tunnel accounting */
353 {0,NULL}};
354
355 static value_string radius_accounting_authentication_vals[]=
356 {{1, "Radius"},
357 {2, "Local"},
358 {3,"Remote"},
359 /* RFC 2866 says 3 is Remote. Is 7 a mistake? */
360 {7,"Remote"},
361 {0,NULL}};
362
363 static value_string radius_acct_terminate_cause_vals[]=
364 {{1, "User Request"},
365 {2, "Lost Carrier"},
366 {3,"Lost Service"},
367 {4, "Idle Timeout"},
368 {5,"Session Timeout"},
369 {6, "Admin Reset"},
370 {7, "Admin Reboot"},
371 {8, "Port Error"},
372 {9, "NAS Error"},
373 {10, "NAS Request"},
374 {11,"NAS Reboot"},
375 {12, "Port Unneeded"},
376 {13, "Port Preempted"},
377 {14,"Port Suspended"},
378 {15,"Service Unavailable"},
379 {16,"Callback"},
380 {17, "User Error"},
381 {18,"Host Request"},
382 {0,NULL}};
383
384 static value_string radius_tunnel_type_vals[]=
385 {{1,"PPTP"},
386 {2,"L2F"},
387 {3,"L2TP"},
388 {4,"ATMP"},
389 {5,"VTP"},
390 {6,"AH"},
391 {7,"IP-IP-Encap"},
392 {8,"MIN-IP-IP"},
393 {9,"ESP"},
394 {10,"GRE"},
395 {11,"DVS"},
396 {12,"IP-IP"},
397 {0,NULL}};
398
399 static value_string radius_tunnel_medium_type_vals[]=
400 {{1,"IPv4"}, 
401 {2,"IPv6"},
402 {3,"NSAP"},
403 {4,"HDLC"},
404 {5,"BBN"},
405 {6,"IEEE-802"},
406 {7,"E-163"},
407 {8,"E-164"},
408 {9,"F-69"},
409 {10,"X-121"},
410 {11,"IPX"},
411 {12,"Appletalk"},
412 {13,"Decnet4"},
413 {14,"Vines"},
414 {15,"E-164-NSAP"},
415 {0,NULL}};
416
417 static value_string radius_nas_port_type_vals[]=
418 {{0, "Async"},
419 {1, "Sync"},
420 {2,"ISDN Sync"},
421 {3, "ISDN Async V.120"},
422 {4,"ISDN Async V.110"},
423 {5, "Virtual"},
424 {6, "PIAFS"},
425 {7, "HDLC Clear Channel"},
426 {8, "X.25"},
427 {9,"X.75"},
428 {10, "G.3 Fax"},
429 {11,"SDSL"},
430 {12, "ADSL-CAP"},
431 {13, "ADSL-DMT"},
432 {14,"IDSL - ISDN"},
433 {15,"Ethernet"},
434 {16,"xDSL"},
435 {17,"Cable"},
436 {18,"Wireless Other"},
437 {19,"Wireless IEEE 802.11"},
438 {0,NULL}};
439
440 static value_value_pair radius_printinfo[] = {
441 { RD_TP_USER_NAME, RADIUS_STRING },
442 { RD_TP_USER_PASSWORD,RADIUS_BINSTRING },
443 { RD_TP_CHAP_PASSWORD, RADIUS_BINSTRING },
444 { RD_TP_NAS_IP_ADDRESS, RADIUS_IP_ADDRESS },
445 { RD_TP_NAS_PORT, RADIUS_INTEGER4},
446 { RD_TP_SERVICE_TYPE, RADIUS_SERVICE_TYPE},
447 { RD_TP_FRAMED_PROTOCOL, RADIUS_FRAMED_PROTOCOL},
448 { RD_TP_FRAMED_IP_ADDRESS, RADIUS_IP_ADDRESS},
449 { RD_TP_FRAMED_IP_NETMASK, RADIUS_IP_ADDRESS},
450 { RD_TP_FRAMED_ROUTING, RADIUS_FRAMED_ROUTING},
451 { RD_TP_FILTER_ID, RADIUS_STRING},
452 { RD_TP_FRAMED_MTU, RADIUS_INTEGER4},
453 { RD_TP_FRAMED_COMPRESSION, RADIUS_FRAMED_COMPRESSION},
454 { RD_TP_LOGIN_IP_HOST, RADIUS_IP_ADDRESS},
455 { RD_TP_LOGIN_SERVICE, RADIUS_LOGIN_SERVICE},
456 { RD_TP_LOGIN_TCP_PORT, RADIUS_INTEGER4},
457 { RD_TP_UNASSIGNED, RADIUS_UNKNOWN},
458 { RD_TP_REPLY_MESSAGE, RADIUS_STRING},
459 { RD_TP_CALLBACK_NUMBER, RADIUS_BINSTRING},
460 { RD_TP_CALLBACK_ID, RADIUS_BINSTRING},
461 { RD_TP_UNASSIGNED2, RADIUS_UNKNOWN},
462 { RD_TP_FRAMED_ROUTE, RADIUS_STRING},
463 { RD_TP_FRAMED_IPX_NETWORK, RADIUS_IPX_ADDRESS},
464 { RD_TP_STATE, RADIUS_BINSTRING},
465 { RD_TP_CLASS, RADIUS_BINSTRING},
466 { RD_TP_VENDOR_SPECIFIC, RADIUS_VENDOR_SPECIFIC},
467 { RD_TP_SESSION_TIMEOUT, RADIUS_INTEGER4},
468 { RD_TP_IDLE_TIMEOUT, RADIUS_INTEGER4},
469 { RD_TP_TERMINATING_ACTION, RADIUS_TERMINATING_ACTION},
470 { RD_TP_CALLED_STATION_ID, RADIUS_BINSTRING},
471 { RD_TP_CALLING_STATION_ID, RADIUS_BINSTRING},
472 { RD_TP_NAS_IDENTIFIER, RADIUS_BINSTRING},
473 { RD_TP_PROXY_STATE, RADIUS_BINSTRING},
474 { RD_TP_LOGIN_LAT_SERVICE, RADIUS_BINSTRING},
475 { RD_TP_LOGIN_LAT_NODE, RADIUS_BINSTRING},
476 { RD_TP_LOGIN_LAT_GROUP, RADIUS_BINSTRING},
477 { RD_TP_FRAMED_APPLETALK_LINK, RADIUS_INTEGER4},
478 { RD_TP_FRAMED_APPLETALK_NETWORK, RADIUS_INTEGER4},
479 { RD_TP_FRAMED_APPLETALK_ZONE, RADIUS_BINSTRING},
480 { RD_TP_ACCT_STATUS_TYPE, RADIUS_ACCOUNTING_STATUS_TYPE},
481 { RD_TP_ACCT_DELAY_TIME, RADIUS_INTEGER4},
482 { RD_TP_ACCT_INPUT_OCTETS, RADIUS_INTEGER4},
483 { RD_TP_ACCT_OUTPUT_OCTETS, RADIUS_INTEGER4},
484 { RD_TP_ACCT_SESSION_ID, RADIUS_STRING},
485 { RD_TP_ACCT_AUTHENTIC, RADIUS_ACCT_AUTHENTIC},
486 { RD_TP_ACCT_SESSION_TIME, RADIUS_INTEGER4},
487 { RD_TP_ACCT_INPUT_PACKETS, RADIUS_INTEGER4},
488 { RD_TP_ACCT_OUTPUT_PACKETS, RADIUS_INTEGER4},
489 { RD_TP_ACCT_TERMINATE_CAUSE, RADIUS_ACCT_TERMINATE_CAUSE},
490 { RD_TP_ACCT_MULTI_SESSION_ID, RADIUS_STRING},
491 { RD_TP_ACCT_LINK_COUNT, RADIUS_INTEGER4},
492 { RD_TP_ACCT_INPUT_GIGAWORDS, RADIUS_INTEGER4},
493 { RD_TP_ACCT_OUTPUT_GIGAWORDS, RADIUS_INTEGER4},
494 { RD_TP_EVENT_TIMESTAMP, RADIUS_TIMESTAMP},
495 { RD_TP_CHAP_CHALLENGE, RADIUS_BINSTRING},
496 { RD_TP_NAS_PORT_TYPE, RADIUS_NAS_PORT_TYPE},
497 { RD_TP_PORT_LIMIT, RADIUS_INTEGER4},
498 { RD_TP_LOGIN_LAT_PORT, RADIUS_BINSTRING},
499 { RD_TP_TUNNEL_TYPE, RADIUS_TUNNEL_TYPE},
500 { RD_TP_TUNNEL_MEDIUM_TYPE, RADIUS_TUNNEL_MEDIUM_TYPE},
501 { RD_TP_TUNNEL_CLIENT_ENDPOINT, RADIUS_STRING_TAGGED},
502 { RD_TP_TUNNEL_SERVER_ENDPOINT, RADIUS_STRING_TAGGED},
503 { RD_TP_TUNNEL_CONNECTION, RADIUS_BINSTRING},
504 { RD_TP_TUNNEL_PASSWORD, RADIUS_STRING_TAGGED},
505 { RD_TP_ARAP_PASSWORD, RADIUS_BINSTRING},
506 { RD_TP_ARAP_FEATURES, RADIUS_BINSTRING},
507 { RD_TP_ARAP_ZONE_ACCESS, RADIUS_BINSTRING},
508 { RD_TP_ARAP_SECURITY, RADIUS_BINSTRING},
509 { RD_TP_ARAP_SECURITY_DATA, RADIUS_BINSTRING},
510 { RD_TP_PASSWORD_RETRY, RADIUS_BINSTRING},
511 { RD_TP_PROMPT, RADIUS_BINSTRING},
512 { RD_TP_CONNECT_INFO, RADIUS_STRING},
513 { RD_TP_CONFIGURATION_TOKEN, RADIUS_BINSTRING},
514 { RD_TP_EAP_MESSAGE, RADIUS_BINSTRING},
515 { RD_TP_MESSAGE_AUTHENTICATOR, RADIUS_BINSTRING},
516 { RD_TP_TUNNEL_PRIVATE_GROUP_ID, RADIUS_STRING_TAGGED},
517 { RD_TP_TUNNEL_ASSIGNMENT_ID, RADIUS_STRING_TAGGED},
518 { RD_TP_TUNNEL_TUNNEL_PREFERENCE, RADIUS_INTEGER4_TAGGED},
519 { RD_TP_TUNNEL_PACKETS_LOST, RADIUS_INTEGER4},
520 { RD_TP_NAS_PORT_ID, RADIUS_STRING},
521 { RD_TP_TUNNEL_CLIENT_AUTH_ID, RADIUS_STRING_TAGGED},
522 { RD_TP_TUNNEL_SERVER_AUTH_ID, RADIUS_STRING_TAGGED},
523 { RD_TP_ASCEND_MODEM_PORTNO, RADIUS_INTEGER4},
524 { RD_TP_ASCEND_MODEM_SLOTNO, RADIUS_INTEGER4},
525 { RD_TP_ASCEND_MULTILINK_ID, RADIUS_INTEGER4},
526 { RD_TP_ASCEND_NUM_IN_MULTILINK, RADIUS_INTEGER4},
527 { RD_TP_ASCEND_FIRST_DEST, RADIUS_IP_ADDRESS},
528 { RD_TP_ASCEND_PRE_INPUT_OCTETS, RADIUS_INTEGER4},
529 { RD_TP_ASCEND_PRE_OUTPUT_OCTETS, RADIUS_INTEGER4},
530 { RD_TP_ASCEND_PRE_INPUT_PACKETS, RADIUS_INTEGER4},
531 { RD_TP_ASCEND_PRE_OUTPUT_PACKETS, RADIUS_INTEGER4},
532 { RD_TP_ASCEND_MAXIMUM_TIME, RADIUS_INTEGER4},
533 { RD_TP_ASCEND_DISCONNECT_CAUSE, RADIUS_INTEGER4},
534 { RD_TP_ASCEND_CONNECT_PROGRESS, RADIUS_INTEGER4},
535 { RD_TP_ASCEND_DATA_RATE, RADIUS_INTEGER4},
536 { RD_TP_ASCEND_PRESESSION_TIME, RADIUS_INTEGER4},
537 { RD_TP_ASCEND_ASSIGN_IP_POOL, RADIUS_INTEGER4},
538 { RD_TP_ASCEND_XMIT_RATE, RADIUS_INTEGER4},
539 {0,0},
540 };
541
542 static value_string radius_attrib_type_vals[] = {
543 { RD_TP_USER_NAME, "User Name"},
544 { RD_TP_USER_PASSWORD, "User Password"},
545 { RD_TP_CHAP_PASSWORD, "Chap Password"},
546 { RD_TP_NAS_IP_ADDRESS, "NAS IP Address"},
547 { RD_TP_NAS_PORT, "NAS Port"},
548 { RD_TP_SERVICE_TYPE, "Service Type"},
549 { RD_TP_FRAMED_PROTOCOL, "Framed Protocol"},
550 { RD_TP_FRAMED_IP_ADDRESS, "Framed IP Address"},
551 { RD_TP_FRAMED_IP_NETMASK, "Framed IP Netmask"},
552 { RD_TP_FRAMED_ROUTING, "Framed Routing"},
553 { RD_TP_FILTER_ID, "Filter Id"},
554 { RD_TP_FRAMED_MTU, "Framed MTU"},
555 { RD_TP_FRAMED_COMPRESSION, "Framed Compression"},
556 { RD_TP_LOGIN_IP_HOST, "Login IP Host"},
557 { RD_TP_LOGIN_SERVICE, "Login Service"},
558 { RD_TP_LOGIN_TCP_PORT, "Login TCP Port"},
559 { RD_TP_UNASSIGNED, "Unassigned"},
560 { RD_TP_REPLY_MESSAGE, "Reply Message"},
561 { RD_TP_CALLBACK_NUMBER, "Callback Number"},
562 { RD_TP_CALLBACK_ID, "Callback Id"},
563 { RD_TP_UNASSIGNED2, "Unassigned"},
564 { RD_TP_FRAMED_ROUTE, "Framed Route"},
565 { RD_TP_FRAMED_IPX_NETWORK, "Framed IPX network"},
566 { RD_TP_STATE, "State"},
567 { RD_TP_CLASS, "Class"},
568 { RD_TP_VENDOR_SPECIFIC, "Vendor Specific" },
569 { RD_TP_SESSION_TIMEOUT, "Session Timeout"},
570 { RD_TP_IDLE_TIMEOUT, "Idle Timeout"},
571 { RD_TP_TERMINATING_ACTION, "Terminating Action"},
572 { RD_TP_CALLED_STATION_ID, "Called Station Id"},
573 { RD_TP_CALLING_STATION_ID, "Calling Station Id"},
574 { RD_TP_NAS_IDENTIFIER, "NAS identifier"},
575 { RD_TP_PROXY_STATE, "Proxy State"},
576 { RD_TP_LOGIN_LAT_SERVICE, "Login LAT Service"},
577 { RD_TP_LOGIN_LAT_NODE, "Login LAT Node"},
578 { RD_TP_LOGIN_LAT_GROUP, "Login LAT Group"},
579 { RD_TP_FRAMED_APPLETALK_LINK, "Framed Appletalk Link"},
580 { RD_TP_FRAMED_APPLETALK_NETWORK, "Framed Appletalk Network"},
581 { RD_TP_FRAMED_APPLETALK_ZONE, "Framed Appletalk Zone"},
582 { RD_TP_ACCT_STATUS_TYPE, "Acct Status Type"},
583 { RD_TP_ACCT_DELAY_TIME, "Acct Delay Time"},
584 { RD_TP_ACCT_INPUT_OCTETS, "Acct Input Octets"},
585 { RD_TP_ACCT_OUTPUT_OCTETS, "Acct Output Octets"},
586 { RD_TP_ACCT_SESSION_ID, "Acct Session Id"},
587 { RD_TP_ACCT_AUTHENTIC, "Acct Authentic"},
588 { RD_TP_ACCT_SESSION_TIME, "Acct Session Time"},
589 { RD_TP_ACCT_INPUT_PACKETS, "Acct Input Packets"},
590 { RD_TP_ACCT_OUTPUT_PACKETS, "Acct Output Packets"},
591 { RD_TP_ACCT_TERMINATE_CAUSE, "Acct Terminate Cause"},
592 { RD_TP_ACCT_MULTI_SESSION_ID, "Acct Multi Session Id"},
593 { RD_TP_ACCT_LINK_COUNT, "Acct Link Count"},
594 { RD_TP_ACCT_INPUT_GIGAWORDS, "Acct Input Gigawords"},
595 { RD_TP_ACCT_OUTPUT_GIGAWORDS, "Acct Output Gigawords"},
596 { RD_TP_EVENT_TIMESTAMP, "Event Timestamp"},
597 { RD_TP_CHAP_CHALLENGE, "Chap Challenge"},
598 { RD_TP_NAS_PORT_TYPE, "NAS Port Type"},
599 { RD_TP_PORT_LIMIT, "Port Limit"},
600 { RD_TP_LOGIN_LAT_PORT, "Login LAT Port"},
601 { RD_TP_TUNNEL_TYPE, "Tunnel Type"},
602 { RD_TP_TUNNEL_MEDIUM_TYPE, "Tunnel Medium Type"},
603 { RD_TP_TUNNEL_CLIENT_ENDPOINT, "Tunnel Client Endpoint"},
604 { RD_TP_TUNNEL_SERVER_ENDPOINT, "Tunnel Server Endpoint"},
605 { RD_TP_TUNNEL_CONNECTION, "Tunnel Connection"},
606 { RD_TP_TUNNEL_PASSWORD, "Tunnel Password"},
607 { RD_TP_ARAP_PASSWORD, "ARAP-Password"},
608 { RD_TP_ARAP_FEATURES, "ARAP-Features"},
609 { RD_TP_ARAP_ZONE_ACCESS, "ARAP-Zone-Access"},
610 { RD_TP_ARAP_SECURITY, "ARAP-Security"},
611 { RD_TP_ARAP_SECURITY_DATA, "ARAP-Security-Data"},
612 { RD_TP_PASSWORD_RETRY, "Password-Retry"},
613 { RD_TP_PROMPT, "Prompt"},
614 { RD_TP_CONNECT_INFO, "Connect-Info"},
615 { RD_TP_CONFIGURATION_TOKEN, "Configuration-Token"},
616 { RD_TP_EAP_MESSAGE, "EAP-Message"},
617 { RD_TP_MESSAGE_AUTHENTICATOR, "Message Authenticator"},
618 { RD_TP_TUNNEL_PRIVATE_GROUP_ID, "Tunnel Private Group ID"},
619 { RD_TP_TUNNEL_ASSIGNMENT_ID, "Tunnel Assignment ID"},
620 { RD_TP_TUNNEL_TUNNEL_PREFERENCE, "Tunnel Preference"},
621 { RD_TP_TUNNEL_PACKETS_LOST, "Tunnel Packets Lost"},
622 { RD_TP_NAS_PORT_ID, "NAS Port ID"},
623 { RD_TP_TUNNEL_CLIENT_AUTH_ID, "Tunnel Client Auth ID"},
624 { RD_TP_TUNNEL_SERVER_AUTH_ID, "Tunnel Server Auth ID"},
625 { RD_TP_ASCEND_MODEM_PORTNO, "Ascend Modem Port No"},
626 { RD_TP_ASCEND_MODEM_SLOTNO, "Ascend Modem Slot No"},
627 { RD_TP_ASCEND_MULTILINK_ID, "Ascend Multilink ID"},
628 { RD_TP_ASCEND_NUM_IN_MULTILINK, "Ascend Num In Multilink"},
629 { RD_TP_ASCEND_FIRST_DEST, "Ascend First Dest"},
630 { RD_TP_ASCEND_PRE_INPUT_OCTETS, "Ascend Pre Input Octets"},
631 { RD_TP_ASCEND_PRE_OUTPUT_OCTETS, "Ascend Pre Output Octets"},
632 { RD_TP_ASCEND_PRE_INPUT_PACKETS, "Ascend Pre Input Packets"},
633 { RD_TP_ASCEND_PRE_OUTPUT_PACKETS, "Ascend Pre Output Packets"},
634 { RD_TP_ASCEND_MAXIMUM_TIME, "Ascend Maximum Time"},
635 { RD_TP_ASCEND_DISCONNECT_CAUSE, "Ascend Disconnect Cause"},
636 { RD_TP_ASCEND_CONNECT_PROGRESS, "Ascend Connect Progress"},
637 { RD_TP_ASCEND_DATA_RATE, "Ascend Data Rate"},
638 { RD_TP_ASCEND_PRESESSION_TIME, "Ascend PreSession Time"},
639 { RD_TP_ASCEND_ASSIGN_IP_POOL, "Ascend Assign IP Pool"},
640 { RD_TP_ASCEND_XMIT_RATE, "Ascend Xmit Rate"},
641 {0,NULL},
642 };
643
644 guint32 match_numval(guint32 val, const value_value_pair *vs)
645 {
646   guint32 i = 0;
647
648   while (vs[i].val1) {
649     if (vs[i].val1 == val)
650       return(vs[i].val2);
651     i++;
652   }
653
654   return(0);
655 }
656
657 static gchar textbuffer[2000];
658
659 gchar *rdconvertbufftostr(gchar *dest, tvbuff_t *tvb, int offset, int length)
660 {
661 /*converts the raw buffer into printable text */
662         guint32 i;
663         guint32 totlen=0;
664         const guint8 *pd = tvb_get_ptr(tvb, offset, length);
665
666         dest[0]='"';
667         dest[1]=0;
668         totlen=1;
669         for (i=0; i < (guint32)length; i++)
670         {
671                 if( isalnum((int)pd[i])||ispunct((int)pd[i])
672                                 ||((int)pd[i]==' '))            {
673                         dest[totlen]=(gchar)pd[i];
674                         totlen++;
675                 }
676                 else
677                 {
678                         sprintf(&(dest[totlen]), "\\%03u", pd[i]);
679                         totlen=totlen+strlen(&(dest[totlen]));
680                 }
681         }
682         dest[totlen]='"';
683         dest[totlen+1]=0;
684         return dest;
685 }
686
687 gchar *rd_match_strval(guint32 val, const value_string *vs) {
688         return val_to_str(val, vs, "Undefined (%u)");
689 }
690
691 gchar *rd_value_to_str(e_avphdr *avph, tvbuff_t *tvb, int offset)
692 {
693   int print_type;
694   gchar *cont;
695   value_string *valstrarr;
696   guint32 intval;
697   const guint8 *pd;
698   guint8 tag;
699   guint8 vtype;
700   char *rtimestamp;
701   extern char *tzname[2];
702
703 /* prints the values of the attribute value pairs into a text buffer */
704   print_type=match_numval(avph->avp_type,radius_printinfo);
705
706   /* Default begin */
707   strcpy(textbuffer,"Value:");
708   cont=&textbuffer[strlen(textbuffer)];
709   switch(print_type)
710   {
711         case( RADIUS_STRING ):
712         case( RADIUS_BINSTRING ):
713                 rdconvertbufftostr(cont,tvb,offset+2,avph->avp_length-2);
714                 break;
715         case( RADIUS_INTEGER4 ):
716                 sprintf(cont,"%u", tvb_get_ntohl(tvb,offset+2));
717                 break;
718         case( RADIUS_IP_ADDRESS ):
719                 ip_to_str_buf(tvb_get_ptr(tvb,offset+2,4),cont);
720                 break;
721         case( RADIUS_SERVICE_TYPE ):
722                 valstrarr=radius_service_type_vals;
723                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
724                 break;
725         case( RADIUS_FRAMED_PROTOCOL ):
726                 valstrarr= radius_framed_protocol_vals;
727                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
728                 break;
729         case( RADIUS_FRAMED_ROUTING ):
730                 valstrarr=radius_framed_routing_vals;
731                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
732                 break;
733         case( RADIUS_FRAMED_COMPRESSION ):
734                 valstrarr=radius_framed_compression_vals;
735                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
736                 break;
737         case( RADIUS_LOGIN_SERVICE ):
738                 valstrarr=radius_login_service_vals;
739                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
740                 break;
741         case( RADIUS_IPX_ADDRESS ):
742                 pd = tvb_get_ptr(tvb,offset+2,4);
743                 sprintf(cont,"%u:%u:%u:%u",(guint8)pd[offset+2],
744                         (guint8)pd[offset+3],(guint8)pd[offset+4],
745                         (guint8)pd[offset+5]);
746         case( RADIUS_TERMINATING_ACTION ):
747                 valstrarr=radius_terminating_action_vals;
748                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
749                 break;
750         case( RADIUS_ACCOUNTING_STATUS_TYPE ):
751                 valstrarr=radius_accounting_status_type_vals;
752                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
753                 break;
754         case( RADIUS_ACCT_AUTHENTIC ):
755                 valstrarr=radius_accounting_authentication_vals;
756                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
757                 break;
758         case( RADIUS_ACCT_TERMINATE_CAUSE ):
759                 valstrarr=radius_acct_terminate_cause_vals;
760                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
761                 break;
762         case( RADIUS_NAS_PORT_TYPE ):
763                 valstrarr=radius_nas_port_type_vals;
764                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
765                 break;
766         case( RADIUS_TUNNEL_TYPE ):
767                 valstrarr=radius_tunnel_type_vals;
768                 /* Tagged ? */
769                 intval = tvb_get_ntohl(tvb,offset+2);
770                 if (intval >> 24) {
771                         sprintf(textbuffer, "Tag:%u, Value:%s",
772                                 intval >> 24,
773                                 rd_match_strval(intval & 0xffffff,valstrarr));
774                         break;
775                 }
776                 strcpy(cont,rd_match_strval(intval,valstrarr));
777                 break;
778         case( RADIUS_TUNNEL_MEDIUM_TYPE ):
779                 valstrarr=radius_tunnel_medium_type_vals;
780                 intval = tvb_get_ntohl(tvb,offset+2);
781                 /* Tagged ? */
782                 if (intval >> 24) {
783                         sprintf(textbuffer, "Tag:%u, Value:%s",
784                                 intval >> 24,
785                                 rd_match_strval(intval & 0xffffff,valstrarr));
786                         break;
787                 }
788                 strcpy(cont,rd_match_strval(intval,valstrarr));
789                 break;
790         case( RADIUS_STRING_TAGGED ):
791                 /* Tagged ? */
792                 tag = tvb_get_guint8(tvb,offset+2);
793                 if (tag <= 0x1f) {
794                         sprintf(textbuffer, "Tag:%u, Value:",
795                                         tag);
796                         cont=&textbuffer[strlen(textbuffer)];   
797                         rdconvertbufftostr(cont,tvb,offset+3,avph->avp_length-3);
798                         break;
799                 }
800                 rdconvertbufftostr(cont,tvb,offset+2,avph->avp_length-2);
801                 break;
802         case ( RADIUS_VENDOR_SPECIFIC ):
803                 valstrarr=radius_vendor_specific_vendors;
804                 sprintf(textbuffer,"Vendor:%s,",
805                         rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
806                 cont=&textbuffer[strlen(textbuffer)];
807                 switch (tvb_get_ntohl(tvb,offset+2)) {
808                 case ( VENDOR_COSINE ):
809                         vtype = tvb_get_guint8(tvb,offset+6);
810                         switch (vtype) {
811                         case ( VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME ):
812                         case ( VENDOR_COSINE_VSA_ENTERPRISE_ID ):
813                         case ( VENDOR_COSINE_VSA_ADDRESS_POOL_NAME ):
814                         case ( VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID ):
815                                 sprintf(cont," Type:%s, Value:",
816                                         rd_match_strval(vtype, radius_vendor_cosine_types));
817                                 cont=&textbuffer[strlen(textbuffer)];
818                                 rdconvertbufftostr(cont,tvb,offset+8,avph->avp_length-8);
819                                 break;
820                         case ( VENDOR_COSINE_VSA_VPI_VCI ):
821                                 sprintf(cont," Type:%s, Value:%u/%u",
822                                         rd_match_strval(vtype, radius_vendor_cosine_types),
823                                         tvb_get_ntohs(tvb,offset+8),
824                                         tvb_get_ntohs(tvb,offset+10));
825                                 break;
826                         case ( VENDOR_COSINE_VSA_DS_BYTE ):
827                         case ( VENDOR_COSINE_VSA_DLCI ):
828                                 sprintf(cont," Type:%s, Value:%u",
829                                         rd_match_strval(vtype, radius_vendor_cosine_types),
830                                         tvb_get_ntohl(tvb,offset+8));
831                                 break;
832                         case ( VENDOR_COSINE_VSA_LNS_IP_ADDRESS ):
833                                 sprintf(cont," Type:%s, Value:",
834                                         rd_match_strval(vtype, radius_vendor_cosine_types));
835                                 cont=&textbuffer[strlen(textbuffer)];
836                                 ip_to_str_buf(tvb_get_ptr(tvb,offset+8,4),cont);
837                                 break;
838                         default:
839                                 sprintf(cont," Unknown Value Type");
840                                 break;
841                         }
842                         break;
843                 default: 
844                         sprintf(cont, " Value:");
845                         rdconvertbufftostr(cont,tvb,offset+6,avph->avp_length-6);
846                         break;
847                 }
848                 break;
849         case( RADIUS_TIMESTAMP ):
850                 intval=tvb_get_ntohl(tvb,offset+2);
851                 rtimestamp=ctime((time_t*)&intval);
852                 rtimestamp[strlen(rtimestamp)-1]=0;
853                 sprintf(cont,"%d (%s %s)", tvb_get_ntohl(tvb,offset+2), rtimestamp, *tzname);
854                 break;
855         case( RADIUS_INTEGER4_TAGGED ):
856                 intval = tvb_get_ntohl(tvb,offset+2);
857                 /* Tagged ? */
858                 if (intval >> 24) {
859                         sprintf(textbuffer, "Tag:%u, Value:%u",
860                                 intval >> 24,
861                                 intval & 0xffffff);
862                         break;
863                 }
864                 sprintf(cont,"%u", intval);
865                 break;
866         case( RADIUS_UNKNOWN ):
867         default:
868                 strcpy(textbuffer,"Unknown Value Type");
869                 break;
870   }
871   if (cont == textbuffer) {
872         strcpy(cont,"Unknown Value");
873   }
874   return textbuffer;
875 }
876
877
878 void dissect_attribute_value_pairs(tvbuff_t *tvb, int offset,proto_tree *tree,
879                                    int avplength,packet_info *pinfo)
880 {
881 /* adds the attribute value pairs to the tree */
882   e_avphdr avph;
883   gchar *avptpstrval;
884   gchar *valstr;
885   guint8 *reassembled_data = NULL;
886   int reassembled_data_len = 0;
887   int data_needed = 0;
888
889   if (avplength==0)
890   {
891         proto_tree_add_text(tree, tvb,offset,0,"No Attribute Value Pairs Found");
892         return;
893   }
894
895   /*
896    * In case we throw an exception, clean up whatever stuff we've
897    * allocated (if any).
898    */
899   CLEANUP_PUSH(g_free, reassembled_data);
900
901   while (avplength > 0)
902   {
903     tvb_memcpy(tvb,(guint8 *)&avph,offset,sizeof(e_avphdr));
904     avptpstrval = match_strval(avph.avp_type, radius_attrib_type_vals);
905     if (avptpstrval == NULL)
906       avptpstrval = "Unknown Type";
907     if (avph.avp_length < 2) {
908       /*
909        * This AVP is bogus - the length includes the type and length
910        * fields, so it must be >= 2.
911        */
912       proto_tree_add_text(tree, tvb, offset, avph.avp_length,
913         "t:%s(%u) l:%u (length not >= 2)",
914          avptpstrval,avph.avp_type,avph.avp_length);
915       break;
916     }
917
918     if (avph.avp_type == RD_TP_EAP_MESSAGE) {
919       proto_item *ti;
920       proto_tree *eap_tree;
921       gint tvb_len;
922       tvbuff_t *next_tvb;
923       int data_len;
924       int result;
925
926       ti = proto_tree_add_text(tree, tvb,offset,avph.avp_length,"t:%s(%u) l:%u",
927                                avptpstrval,avph.avp_type,avph.avp_length);
928       eap_tree = proto_item_add_subtree(ti, ett_radius_eap);
929       tvb_len = tvb_length_remaining(tvb, offset+2);
930       data_len = avph.avp_length-2;
931       if (data_len < tvb_len)
932         tvb_len = data_len;
933       next_tvb = tvb_new_subset(tvb, offset+2, tvb_len, data_len);
934
935       /*
936        * Set the columns non-writable, so that the packet list
937        * shows this as an RADIUS packet, not as an EAP packet.
938        *
939        * XXX - we'll call the EAP dissector only if we're building
940        * a protocol tree.  The EAP dissector currently saves no state,
941        * and won't be modifying the columns, so that's OK right now,
942        * but it might call the SSL dissector - if that maintains state
943        * needed for dissection, we'll have to arrange that AVPs be
944        * dissected even if we're not building a protocol tree.
945        */
946       col_set_writable(pinfo->cinfo, FALSE);
947
948       /*
949        * RFC 2869 says, in section 5.13, describing the EAP-Message
950        * attribute:
951        *
952        *    The String field contains EAP packets, as defined in [3].  If
953        *    multiple EAP-Message attributes are present in a packet their
954        *    values should be concatenated; this allows EAP packets longer than
955        *    253 octets to be passed by RADIUS.
956        *
957        * Do reassembly of EAP-Message attributes.
958        */
959
960       /* Are we in the process of reassembling? */
961       if (reassembled_data != NULL) {
962         /* Yes - show this as an EAP fragment. */
963         proto_tree_add_text(eap_tree, next_tvb, 0, -1, "EAP fragment");
964
965         /*
966          * Do we have all of the data in this fragment?
967          */
968         if (tvb_len >= data_len) {
969           /*
970            * Yes - add it to the reassembled data.
971            */
972           tvb_memcpy(next_tvb, reassembled_data + reassembled_data_len,
973                      0, data_len);
974           reassembled_data_len += data_len;
975           data_needed -= data_len;
976           if (data_needed <= 0) {
977             /*
978              * We got at least as much data as we needed; we're done
979              * reassembling.
980              * XXX - what if we got more?
981              */
982
983             /*
984              * Allocate a new tvbuff, referring to the reassembled payload.
985              */
986             next_tvb = tvb_new_real_data(reassembled_data, reassembled_data_len,
987                                          reassembled_data_len);
988
989             /*
990              * We have a tvbuff that refers to this data, so we shouldn't
991              * free this data if we throw an exception; clear
992              * "reassembled_data", so the cleanup handler won't free it.
993              */
994             reassembled_data = NULL;
995             reassembled_data_len = 0;
996             data_needed = 0;
997
998             /*
999              * Arrange that the allocated packet data copy be freed when the
1000              * tvbuff is freed.
1001              */
1002             tvb_set_free_cb(next_tvb, g_free);
1003
1004             /*
1005              * Add the tvbuff to the list of tvbuffs to which the tvbuff we
1006              * were handed refers, so it'll get cleaned up when that tvbuff
1007              * is cleaned up.
1008              */
1009             tvb_set_child_real_data_tvbuff(tvb, next_tvb);
1010
1011             /* Add the defragmented data to the data source list. */
1012             add_new_data_source(pinfo->fd, next_tvb, "Reassembled EAP");
1013
1014             /* Now dissect it. */
1015             call_dissector(eap_fragment_handle, next_tvb, pinfo, eap_tree);
1016           }
1017         }
1018       } else {
1019         /*
1020          * No - hand it to the dissector.
1021          */
1022         result = call_dissector(eap_fragment_handle, next_tvb, pinfo, eap_tree);
1023         if (result < 0) {
1024           /* This is only part of the full EAP packet; start reassembly. */
1025           proto_tree_add_text(eap_tree, next_tvb, 0, -1, "EAP fragment");
1026           reassembled_data_len = data_len;
1027           data_needed = -result;
1028           reassembled_data = g_malloc(reassembled_data_len + data_needed);
1029           tvb_memcpy(next_tvb, reassembled_data, 0, reassembled_data_len);
1030         }
1031       }
1032     } else {
1033       valstr = rd_value_to_str(&avph, tvb, offset);
1034       proto_tree_add_text(tree, tvb,offset,avph.avp_length,
1035                           "t:%s(%u) l:%u, %s",
1036                           avptpstrval,avph.avp_type,avph.avp_length,valstr);
1037     }
1038
1039     offset = offset+avph.avp_length;
1040     avplength = avplength-avph.avp_length;
1041   }
1042
1043   /*
1044    * Call the cleanup handler to free any reassembled data we haven't
1045    * attached to a tvbuff, and pop the handler.
1046    */
1047   CLEANUP_CALL_AND_POP;
1048 }
1049
1050 static void dissect_radius(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
1051 {
1052   proto_tree *radius_tree,*avptree;
1053   proto_item *ti,*avptf;
1054   int rhlength;
1055   int rhcode;
1056   int rhident;
1057   int avplength,hdrlength;
1058   e_radiushdr rh;
1059
1060   gchar *codestrval;
1061
1062   if (check_col(pinfo->cinfo, COL_PROTOCOL))
1063         col_set_str(pinfo->cinfo, COL_PROTOCOL, "RADIUS");
1064   if (check_col(pinfo->cinfo, COL_INFO))
1065         col_clear(pinfo->cinfo, COL_INFO);
1066
1067   tvb_memcpy(tvb,(guint8 *)&rh,0,sizeof(e_radiushdr));
1068
1069   rhcode= (int)rh.rh_code;
1070   rhident= (int)rh.rh_ident;
1071   rhlength= (int)ntohs(rh.rh_pktlength);
1072   codestrval=  match_strval(rhcode,radius_vals);
1073   if (codestrval==NULL)
1074   {
1075         codestrval="Unknown Packet";
1076   }
1077   if (check_col(pinfo->cinfo, COL_INFO))
1078   {
1079         col_add_fstr(pinfo->cinfo,COL_INFO,"%s(%d) (id=%d, l=%d)",
1080                 codestrval, rhcode, rhident, rhlength);
1081   }
1082
1083   if (tree)
1084   {
1085         ti = proto_tree_add_item(tree,proto_radius, tvb, 0, rhlength, FALSE);
1086
1087         radius_tree = proto_item_add_subtree(ti, ett_radius);
1088
1089         proto_tree_add_uint(radius_tree,hf_radius_code, tvb, 0, 1,
1090                 rh.rh_code);
1091         proto_tree_add_uint_format(radius_tree,hf_radius_id, tvb, 1, 1,
1092                 rh.rh_ident, "Packet identifier: 0x%01x (%d)",
1093                         rhident,rhident);         
1094
1095         proto_tree_add_uint(radius_tree, hf_radius_length, tvb,
1096                         2, 2, rhlength);
1097         proto_tree_add_text(radius_tree, tvb, 4,
1098                         AUTHENTICATOR_LENGTH,
1099                          "Authenticator");
1100    
1101         hdrlength=RD_HDR_LENGTH+AUTHENTICATOR_LENGTH;
1102         avplength= rhlength -hdrlength;
1103
1104         if (avplength > 0) {
1105                 /* list the attribute value pairs */
1106
1107                 avptf = proto_tree_add_text(radius_tree,
1108                                 tvb,hdrlength,avplength,
1109                                 "Attribute value pairs");
1110                 avptree = proto_item_add_subtree(avptf, ett_radius_avp);
1111
1112                 if (avptree !=NULL)
1113                 {
1114                         dissect_attribute_value_pairs(tvb, hdrlength,
1115                                 avptree,avplength,pinfo);
1116                 }
1117         }
1118   }
1119 }
1120 /* registration with the filtering engine */
1121 void
1122 proto_register_radius(void)
1123 {
1124         static hf_register_info hf[] = {
1125                 { &hf_radius_code,
1126                 { "Code","radius.code", FT_UINT8, BASE_DEC, VALS(radius_vals), 0x0,
1127                         "", HFILL }},
1128
1129                 { &hf_radius_id,
1130                 { "Identifier", "radius.id", FT_UINT8, BASE_DEC, NULL, 0x0,
1131                         "", HFILL }},
1132
1133                 { &hf_radius_length,
1134                 { "Length","radius.length", FT_UINT16, BASE_DEC, NULL, 0x0,
1135                         "", HFILL }}
1136         };
1137         static gint *ett[] = {
1138                 &ett_radius,
1139                 &ett_radius_avp,
1140                 &ett_radius_eap,
1141         };
1142
1143         proto_radius = proto_register_protocol("Radius Protocol", "RADIUS",
1144             "radius");
1145         proto_register_field_array(proto_radius, hf, array_length(hf));
1146         proto_register_subtree_array(ett, array_length(ett));
1147 }
1148
1149 void
1150 proto_reg_handoff_radius(void)
1151 {
1152         dissector_handle_t radius_handle;
1153
1154         /*
1155          * Get a handle for the EAP fragment dissector.
1156          */
1157         eap_fragment_handle = find_dissector("eap_fragment");
1158
1159         radius_handle = create_dissector_handle(dissect_radius, proto_radius);
1160         dissector_add("udp.port", UDP_PORT_RADIUS, radius_handle);
1161         dissector_add("udp.port", UDP_PORT_RADIUS_NEW, radius_handle);
1162         dissector_add("udp.port", UDP_PORT_RADACCT, radius_handle);
1163         dissector_add("udp.port", UDP_PORT_RADACCT_NEW, radius_handle);
1164 }