Attach to all frames containing LEAP messages an indication of the state
[obnox/wireshark/wip.git] / packet-radius.c
1 /* packet-radius.c
2  * Routines for RADIUS packet disassembly
3  * Copyright 1999 Johan Feyaerts
4  *
5  * RFC 2865, RFC 2866, RFC 2867, RFC 2868, RFC 2869
6  *
7  * $Id: packet-radius.c,v 1.51 2002/03/22 11:41:59 guy Exp $
8  *
9  * Ethereal - Network traffic analyzer
10  * By Gerald Combs <gerald@ethereal.com>
11  * Copyright 1998 Gerald Combs
12  *
13  * This program is free software; you can redistribute it and/or
14  * modify it under the terms of the GNU General Public License
15  * as published by the Free Software Foundation; either version 2
16  * of the License, or (at your option) any later version.
17  *
18  * This program is distributed in the hope that it will be useful,
19  * but WITHOUT ANY WARRANTY; without even the implied warranty of
20  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
21  * GNU General Public License for more details.
22  *
23  * You should have received a copy of the GNU General Public License
24  * along with this program; if not, write to the Free Software
25  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
26  */
27
28 #ifdef HAVE_CONFIG_H
29 #include "config.h"
30 #endif
31
32 #ifdef HAVE_SYS_TYPES_H
33 # include <sys/types.h>
34 #endif
35
36 #ifdef HAVE_NETINET_IN_H
37 #include <netinet/in.h>
38 #endif
39
40 #include <stdio.h>
41 #include <stdlib.h>
42 #include <string.h>
43 #include <ctype.h>
44 #include <glib.h>
45 #include <time.h>
46 #include <epan/packet.h>
47 #include <epan/resolv.h>
48
49 static int proto_radius = -1;
50 static int hf_radius_length = -1;
51 static int hf_radius_code = -1;
52 static int hf_radius_id =-1;
53
54 static gint ett_radius = -1;
55 static gint ett_radius_avp = -1;
56 static gint ett_radius_eap = -1;
57
58 static dissector_handle_t eap_fragment_handle;
59
60 #define UDP_PORT_RADIUS         1645
61 #define UDP_PORT_RADIUS_NEW     1812
62 #define UDP_PORT_RADACCT        1646
63 #define UDP_PORT_RADACCT_NEW    1813
64
65 typedef struct _e_radiushdr {
66         guint8 rh_code;
67         guint8 rh_ident;
68         guint16 rh_pktlength;
69 } e_radiushdr;
70
71 typedef struct _e_avphdr {
72         guint8 avp_type;
73         guint8 avp_length;
74 } e_avphdr;
75
76 typedef struct _value_value_pair {
77         guint16 val1;
78         guint16 val2;
79 } value_value_pair;
80
81 #define RADIUS_ACCESS_REQUEST 1
82 #define RADIUS_ACCESS_ACCEPT  2
83 #define RADIUS_ACCESS_REJECT  3
84 #define RADIUS_ACCOUNTING_REQUEST 4
85 #define RADIUS_ACCOUNTING_RESPONSE 5
86 #define RADIUS_ACCESS_CHALLENGE 11
87 #define RADIUS_STATUS_SERVER 12
88 #define RADIUS_STATUS_CLIENT 13
89 #define RADIUS_RESERVED 255
90
91 #define RD_TP_USER_NAME 1
92 #define RD_TP_USER_PASSWORD 2
93 #define RD_TP_CHAP_PASSWORD 3
94 #define RD_TP_NAS_IP_ADDRESS 4
95 #define RD_TP_NAS_PORT 5
96 #define RD_TP_SERVICE_TYPE 6
97 #define RD_TP_FRAMED_PROTOCOL 7
98 #define RD_TP_FRAMED_IP_ADDRESS 8
99 #define RD_TP_FRAMED_IP_NETMASK 9
100 #define RD_TP_FRAMED_ROUTING 10
101 #define RD_TP_FILTER_ID 11
102 #define RD_TP_FRAMED_MTU 12
103 #define RD_TP_FRAMED_COMPRESSION 13
104 #define RD_TP_LOGIN_IP_HOST 14
105 #define RD_TP_LOGIN_SERVICE 15
106 #define RD_TP_LOGIN_TCP_PORT 16
107 #define RD_TP_UNASSIGNED 17
108 #define RD_TP_REPLY_MESSAGE 18
109 #define RD_TP_CALLBACK_NUMBER 19
110 #define RD_TP_CALLBACK_ID 20
111 #define RD_TP_UNASSIGNED2 21
112 #define RD_TP_FRAMED_ROUTE 22
113 #define RD_TP_FRAMED_IPX_NETWORK 23
114 #define RD_TP_STATE 24
115 #define RD_TP_CLASS 25
116 #define RD_TP_VENDOR_SPECIFIC 26
117 #define RD_TP_SESSION_TIMEOUT 27
118 #define RD_TP_IDLE_TIMEOUT 28
119 #define RD_TP_TERMINATING_ACTION 29
120 #define RD_TP_CALLED_STATION_ID 30
121 #define RD_TP_CALLING_STATION_ID 31
122 #define RD_TP_NAS_IDENTIFIER 32
123 #define RD_TP_PROXY_STATE 33
124 #define RD_TP_LOGIN_LAT_SERVICE 34
125 #define RD_TP_LOGIN_LAT_NODE 35
126 #define RD_TP_LOGIN_LAT_GROUP 36
127 #define RD_TP_FRAMED_APPLETALK_LINK 37
128 #define RD_TP_FRAMED_APPLETALK_NETWORK 38
129 #define RD_TP_FRAMED_APPLETALK_ZONE 39
130 #define RD_TP_ACCT_STATUS_TYPE 40
131 #define RD_TP_ACCT_DELAY_TIME 41
132 #define RD_TP_ACCT_INPUT_OCTETS 42
133 #define RD_TP_ACCT_OUTPUT_OCTETS 43
134 #define RD_TP_ACCT_SESSION_ID 44
135 #define RD_TP_ACCT_AUTHENTIC 45
136 #define RD_TP_ACCT_SESSION_TIME 46
137 #define RD_TP_ACCT_INPUT_PACKETS 47
138 #define RD_TP_ACCT_OUTPUT_PACKETS 48
139 #define RD_TP_ACCT_TERMINATE_CAUSE 49
140 #define RD_TP_ACCT_MULTI_SESSION_ID 50
141 #define RD_TP_ACCT_LINK_COUNT 51
142 #define RD_TP_ACCT_INPUT_GIGAWORDS 52
143 #define RD_TP_ACCT_OUTPUT_GIGAWORDS 53
144 /* 54 Unused */
145 #define RD_TP_EVENT_TIMESTAMP 55
146 /* 56-59 Unused */ 
147 #define RD_TP_CHAP_CHALLENGE 60
148 #define RD_TP_NAS_PORT_TYPE 61
149 #define RD_TP_PORT_LIMIT 62
150 #define RD_TP_LOGIN_LAT_PORT 63
151 #define RD_TP_TUNNEL_TYPE 64
152 #define RD_TP_TUNNEL_MEDIUM_TYPE 65
153 #define RD_TP_TUNNEL_CLIENT_ENDPOINT 66
154 #define RD_TP_TUNNEL_SERVER_ENDPOINT 67
155 #define RD_TP_TUNNEL_CONNECTION 68
156 #define RD_TP_TUNNEL_PASSWORD 69
157 #define RD_TP_ARAP_PASSWORD 70
158 #define RD_TP_ARAP_FEATURES 71
159 #define RD_TP_ARAP_ZONE_ACCESS 72
160 #define RD_TP_ARAP_SECURITY 73
161 #define RD_TP_ARAP_SECURITY_DATA 74
162 #define RD_TP_PASSWORD_RETRY 75
163 #define RD_TP_PROMPT 76
164 #define RD_TP_CONNECT_INFO 77
165 #define RD_TP_CONFIGURATION_TOKEN 78
166 #define RD_TP_EAP_MESSAGE 79
167 #define RD_TP_MESSAGE_AUTHENTICATOR 80
168 #define RD_TP_TUNNEL_PRIVATE_GROUP_ID 81
169 #define RD_TP_TUNNEL_ASSIGNMENT_ID 82
170 #define RD_TP_TUNNEL_TUNNEL_PREFERENCE 83
171 #define RD_TP_TUNNEL_PACKETS_LOST 86
172 #define RD_TP_NAS_PORT_ID 87
173 #define RD_TP_TUNNEL_CLIENT_AUTH_ID 90
174 #define RD_TP_TUNNEL_SERVER_AUTH_ID 91
175 #define RD_TP_ASCEND_MODEM_PORTNO 120
176 #define RD_TP_ASCEND_MODEM_SLOTNO 121
177 #define RD_TP_ASCEND_MULTILINK_ID 187
178 #define RD_TP_ASCEND_NUM_IN_MULTILINK 188
179 #define RD_TP_ASCEND_FIRST_DEST 189
180 #define RD_TP_ASCEND_PRE_INPUT_OCTETS 190
181 #define RD_TP_ASCEND_PRE_OUTPUT_OCTETS 191
182 #define RD_TP_ASCEND_PRE_INPUT_PACKETS 192
183 #define RD_TP_ASCEND_PRE_OUTPUT_PACKETS 193
184 #define RD_TP_ASCEND_MAXIMUM_TIME 194
185 #define RD_TP_ASCEND_DISCONNECT_CAUSE 195
186 #define RD_TP_ASCEND_CONNECT_PROGRESS 196
187 #define RD_TP_ASCEND_DATA_RATE 197
188 #define RD_TP_ASCEND_PRESESSION_TIME 198
189 #define RD_TP_ASCEND_ASSIGN_IP_POOL 218
190 #define RD_TP_ASCEND_XMIT_RATE 255
191
192
193
194
195
196 #define AUTHENTICATOR_LENGTH 16
197 #define RD_HDR_LENGTH 4
198
199
200 #define RADIUS_STRING 1
201 #define RADIUS_BINSTRING 2
202 #define RADIUS_INTEGER4 3
203 #define RADIUS_IP_ADDRESS 4
204 #define RADIUS_SERVICE_TYPE 5
205 #define RADIUS_FRAMED_PROTOCOL 6
206 #define RADIUS_FRAMED_ROUTING 7
207 #define RADIUS_FRAMED_COMPRESSION 8
208 #define RADIUS_LOGIN_SERVICE 9
209 #define RADIUS_UNKNOWN 10
210 #define RADIUS_IPX_ADDRESS 11
211 #define RADIUS_TERMINATING_ACTION 12
212 #define RADIUS_ACCOUNTING_STATUS_TYPE 13
213 #define RADIUS_ACCT_AUTHENTIC 14
214 #define RADIUS_ACCT_TERMINATE_CAUSE 15
215 #define RADIUS_NAS_PORT_TYPE 16
216 #define RADIUS_TUNNEL_TYPE 17
217 #define RADIUS_TUNNEL_MEDIUM_TYPE 18
218 #define RADIUS_STRING_TAGGED 19
219 #define RADIUS_VENDOR_SPECIFIC 20
220 #define RADIUS_TIMESTAMP 21
221 #define RADIUS_INTEGER4_TAGGED 22
222
223 static value_string radius_vals[] = {
224  {RADIUS_ACCESS_REQUEST, "Access Request"},
225  {RADIUS_ACCESS_ACCEPT, "Access Accept"},
226  {RADIUS_ACCESS_REJECT, "Access Reject"},
227  {RADIUS_ACCOUNTING_REQUEST, "Accounting Request"},
228  {RADIUS_ACCOUNTING_RESPONSE, "Accounting Response"},
229  {RADIUS_ACCESS_CHALLENGE, "Access challenge"},
230  {RADIUS_STATUS_SERVER, "StatusServer"},
231  {RADIUS_STATUS_CLIENT, "StatusClient"},
232  {RADIUS_RESERVED, "Reserved"},
233 {0, NULL}};
234
235 static value_string radius_service_type_vals[]=
236 {{1, "Login"},
237 {2, "Framed"},
238 {3, "Callback Login"},
239 {4, "Callback Framed"},
240 {5, "Outbound"},
241 {6, "Administrative"},
242 {7, "NAS Prompt"},
243 {8, "Authenticate Only"},
244 {9, "Callback NAS Prompt"},
245 {10, "Call Check"},
246 {0,NULL}};
247
248 /*
249  * These are SMI Network Management Private Enterprise Codes for
250  * organizations; see
251  *
252  *      http://www.isi.edu/in-notes/iana/assignments/enterprise-numbers
253  *
254  * for a list.
255  */
256 #define VENDOR_ACC 5
257 #define VENDOR_CISCO 9
258 #define VENDOR_SHIVA 166
259 #define VENDOR_LIVINGSTON 307
260 #define VENDOR_3COM 429
261 #define VENDOR_ASCEND 529
262 #define VENDOR_BAY 1584
263 #define VENDOR_JUNIPER 2636
264 #define VENDOR_COSINE 3085
265 #define VENDOR_UNISPHERE 4874
266 #define VENDOR_ISSANNI 5948
267
268 static value_string radius_vendor_specific_vendors[]=
269 {{VENDOR_ACC,"ACC"},
270 {VENDOR_CISCO,"Cisco"},
271 {VENDOR_SHIVA,"Shiva"},
272 {VENDOR_LIVINGSTON,"Livingston"},
273 {VENDOR_3COM,"3Com"},
274 {VENDOR_ASCEND,"Ascend"},
275 {VENDOR_BAY,"Bay Networks"},
276 {VENDOR_JUNIPER,"Juniper Networks"},
277 {VENDOR_COSINE,"CoSine Communications"},
278 {VENDOR_UNISPHERE,"Unisphere Networks"},
279 {VENDOR_ISSANNI,"Issanni Communications"},
280 {0,NULL}};
281
282 #define VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME 1
283 #define VENDOR_COSINE_VSA_ENTERPRISE_ID 2
284 #define VENDOR_COSINE_VSA_ADDRESS_POOL_NAME 3
285 #define VENDOR_COSINE_VSA_DS_BYTE 4
286 #define VENDOR_COSINE_VSA_VPI_VCI 5
287 #define VENDOR_COSINE_VSA_DLCI 6
288 #define VENDOR_COSINE_VSA_LNS_IP_ADDRESS 7
289 #define VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID 8
290
291 static value_string radius_vendor_cosine_types[]=
292 {{VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME,"Connection Profile Name"},
293 {VENDOR_COSINE_VSA_ENTERPRISE_ID,"Enterprise ID"},
294 {VENDOR_COSINE_VSA_ADDRESS_POOL_NAME,"Address Pool Name"},
295 {VENDOR_COSINE_VSA_DS_BYTE,"DS Byte"},
296 {VENDOR_COSINE_VSA_VPI_VCI,"VPI/VCI"},
297 {VENDOR_COSINE_VSA_DLCI,"DLCI"},
298 {VENDOR_COSINE_VSA_LNS_IP_ADDRESS,"LNS IP Address"},
299 {VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID,"CLI User Permission ID"},
300 {0,NULL}};
301
302 #define VENDOR_ISSANNI_VSA_SOFTFLOW_TEMPLATE   1
303 #define VENDOR_ISSANNI_VSA_NAT_POOL_NAME       2
304 #define VENDOR_ISSANNI_VSA_VRD                 3
305 #define VENDOR_ISSANNI_VSA_TUNNEL_NAME         4
306 #define VENDOR_ISSANNI_VSA_IP_POOL_NAME        5
307 #define VENDOR_ISSANNI_VSA_PPPOE_URL           6
308 #define VENDOR_ISSANNI_VSA_PPPOE_MOTM          7
309 #define VENDOR_ISSANNI_VSA_SERVICE             8
310 #define VENDOR_ISSANNI_VSA_PRI_DNS             9
311 #define VENDOR_ISSANNI_VSA_SEC_DNS             10
312 #define VENDOR_ISSANNI_VSA_PRI_NBNS            11
313 #define VENDOR_ISSANNI_VSA_SEC_NBNS            12
314 #define VENDOR_ISSANNI_VSA_TRAFFIC_CLASS       13
315 #define VENDOR_ISSANNI_VSA_TUNNEL_TYPE         14
316 #define VENDOR_ISSANNI_VSA_NAT_TYPE            15
317 #define VENDOR_ISSANNI_VSA_QOS_CLASS           16
318 #define VENDOR_ISSANNI_VSA_IFACE_NAME          17
319
320 static value_string radius_vendor_issanni_types[]=
321 {{VENDOR_ISSANNI_VSA_SOFTFLOW_TEMPLATE,"Softflow Template"},
322 {VENDOR_ISSANNI_VSA_NAT_POOL_NAME,"NAT Pool"},
323 {VENDOR_ISSANNI_VSA_VRD,"Virtual Routing Domain"},
324 {VENDOR_ISSANNI_VSA_TUNNEL_NAME,"Tunnel Name"},
325 {VENDOR_ISSANNI_VSA_IP_POOL_NAME,"IP Pool Name"},
326 {VENDOR_ISSANNI_VSA_PPPOE_URL,"PPPoE URL"},
327 {VENDOR_ISSANNI_VSA_PPPOE_MOTM,"PPPoE MOTM"},
328 {VENDOR_ISSANNI_VSA_SERVICE,"PPPoE Service"},
329 {VENDOR_ISSANNI_VSA_PRI_DNS,"Primary DNS"},
330 {VENDOR_ISSANNI_VSA_SEC_DNS,"Secondary DNS"},
331 {VENDOR_ISSANNI_VSA_PRI_NBNS,"Primary NBNS"},
332 {VENDOR_ISSANNI_VSA_SEC_NBNS,"Secondary NBNS"},
333 {VENDOR_ISSANNI_VSA_TRAFFIC_CLASS,"Policing Traffic Class"},
334 {VENDOR_ISSANNI_VSA_TUNNEL_TYPE,"Tunnel Type"},
335 {VENDOR_ISSANNI_VSA_NAT_TYPE,"NAT Type"},
336 {VENDOR_ISSANNI_VSA_QOS_CLASS,"QoS Traffic Class"},
337 {VENDOR_ISSANNI_VSA_IFACE_NAME,"Interface Name"},
338 {0,NULL}};
339
340 static value_string radius_framed_protocol_vals[]=
341 {{1, "PPP"},
342 {2, "SLIP"},
343 {3, "Appletalk Remote Access Protocol (ARAP)"},
344 {4, "Gandalf proprietary Singlelink/Multilink Protocol"},
345 {5, "Xylogics proprietary IPX/SLIP"},
346 {6, "X.75 Synchronous"},
347 {256, "Ascend MPP"},
348 {262, "Ascend MP"},
349 {0,NULL}};
350
351 static value_string radius_framed_routing_vals[]=
352 {{1, "Send Routing Packets"},
353 {2, "Listen for routing packets"},
354 {3, "Send and Listen"},
355 {0,"None"},
356 {0,NULL}};
357
358 static value_string radius_framed_compression_vals[]=
359 {{1, "VJ TCP/IP Header Compression"},
360 {2, "IPX Header Compression"},
361 {3, "Stac-LZS compression"},
362 {0, "None"},
363 {0,NULL}};
364
365 static value_string radius_login_service_vals[]=
366 {{1, "Rlogin"},
367 {2, "TCP Clear"},
368 {3, "Portmaster"},
369 {4, "LAT"},
370 {5, "X.25-PAD"},
371 {6, "X.25T3POS"},
372 {8, "TCP Clear Quit"},
373 {0, "Telnet"},
374 {0,NULL}};
375
376 static value_string radius_terminating_action_vals[]=
377 {{1, "RADIUS-Request"},
378 {0, "Default"},
379 {0,NULL}};
380
381 static value_string radius_accounting_status_type_vals[]=
382 {{1, "Start"},
383 {2, "Stop"},
384 {3, "Interim-Update"},
385 {7,"Accounting-On"},
386 {8,"Accounting-Off"},
387 {9, "Tunnel-Start"}, /* Tunnel accounting */
388 {10, "Tunnel-Stop"}, /* Tunnel accounting */
389 {11, "Tunnel-Reject"}, /* Tunnel accounting */
390 {12, "Tunnel-Link-Start"}, /* Tunnel accounting */
391 {13, "Tunnel-Link-Stop"}, /* Tunnel accounting */
392 {14, "Tunnel-Link-Reject"}, /* Tunnel accounting */
393 {0,NULL}};
394
395 static value_string radius_accounting_authentication_vals[]=
396 {{1, "Radius"},
397 {2, "Local"},
398 {3,"Remote"},
399 /* RFC 2866 says 3 is Remote. Is 7 a mistake? */
400 {7,"Remote"},
401 {0,NULL}};
402
403 static value_string radius_acct_terminate_cause_vals[]=
404 {{1, "User Request"},
405 {2, "Lost Carrier"},
406 {3,"Lost Service"},
407 {4, "Idle Timeout"},
408 {5,"Session Timeout"},
409 {6, "Admin Reset"},
410 {7, "Admin Reboot"},
411 {8, "Port Error"},
412 {9, "NAS Error"},
413 {10, "NAS Request"},
414 {11,"NAS Reboot"},
415 {12, "Port Unneeded"},
416 {13, "Port Preempted"},
417 {14,"Port Suspended"},
418 {15,"Service Unavailable"},
419 {16,"Callback"},
420 {17, "User Error"},
421 {18,"Host Request"},
422 {0,NULL}};
423
424 static value_string radius_tunnel_type_vals[]=
425 {{1,"PPTP"},
426 {2,"L2F"},
427 {3,"L2TP"},
428 {4,"ATMP"},
429 {5,"VTP"},
430 {6,"AH"},
431 {7,"IP-IP-Encap"},
432 {8,"MIN-IP-IP"},
433 {9,"ESP"},
434 {10,"GRE"},
435 {11,"DVS"},
436 {12,"IP-IP"},
437 {0,NULL}};
438
439 static value_string radius_tunnel_medium_type_vals[]=
440 {{1,"IPv4"}, 
441 {2,"IPv6"},
442 {3,"NSAP"},
443 {4,"HDLC"},
444 {5,"BBN"},
445 {6,"IEEE-802"},
446 {7,"E-163"},
447 {8,"E-164"},
448 {9,"F-69"},
449 {10,"X-121"},
450 {11,"IPX"},
451 {12,"Appletalk"},
452 {13,"Decnet4"},
453 {14,"Vines"},
454 {15,"E-164-NSAP"},
455 {0,NULL}};
456
457 static value_string radius_nas_port_type_vals[]=
458 {{0, "Async"},
459 {1, "Sync"},
460 {2,"ISDN Sync"},
461 {3, "ISDN Async V.120"},
462 {4,"ISDN Async V.110"},
463 {5, "Virtual"},
464 {6, "PIAFS"},
465 {7, "HDLC Clear Channel"},
466 {8, "X.25"},
467 {9,"X.75"},
468 {10, "G.3 Fax"},
469 {11,"SDSL"},
470 {12, "ADSL-CAP"},
471 {13, "ADSL-DMT"},
472 {14,"IDSL - ISDN"},
473 {15,"Ethernet"},
474 {16,"xDSL"},
475 {17,"Cable"},
476 {18,"Wireless Other"},
477 {19,"Wireless IEEE 802.11"},
478 {0,NULL}};
479
480 static value_value_pair radius_printinfo[] = {
481 { RD_TP_USER_NAME, RADIUS_STRING },
482 { RD_TP_USER_PASSWORD,RADIUS_BINSTRING },
483 { RD_TP_CHAP_PASSWORD, RADIUS_BINSTRING },
484 { RD_TP_NAS_IP_ADDRESS, RADIUS_IP_ADDRESS },
485 { RD_TP_NAS_PORT, RADIUS_INTEGER4},
486 { RD_TP_SERVICE_TYPE, RADIUS_SERVICE_TYPE},
487 { RD_TP_FRAMED_PROTOCOL, RADIUS_FRAMED_PROTOCOL},
488 { RD_TP_FRAMED_IP_ADDRESS, RADIUS_IP_ADDRESS},
489 { RD_TP_FRAMED_IP_NETMASK, RADIUS_IP_ADDRESS},
490 { RD_TP_FRAMED_ROUTING, RADIUS_FRAMED_ROUTING},
491 { RD_TP_FILTER_ID, RADIUS_STRING},
492 { RD_TP_FRAMED_MTU, RADIUS_INTEGER4},
493 { RD_TP_FRAMED_COMPRESSION, RADIUS_FRAMED_COMPRESSION},
494 { RD_TP_LOGIN_IP_HOST, RADIUS_IP_ADDRESS},
495 { RD_TP_LOGIN_SERVICE, RADIUS_LOGIN_SERVICE},
496 { RD_TP_LOGIN_TCP_PORT, RADIUS_INTEGER4},
497 { RD_TP_UNASSIGNED, RADIUS_UNKNOWN},
498 { RD_TP_REPLY_MESSAGE, RADIUS_STRING},
499 { RD_TP_CALLBACK_NUMBER, RADIUS_BINSTRING},
500 { RD_TP_CALLBACK_ID, RADIUS_BINSTRING},
501 { RD_TP_UNASSIGNED2, RADIUS_UNKNOWN},
502 { RD_TP_FRAMED_ROUTE, RADIUS_STRING},
503 { RD_TP_FRAMED_IPX_NETWORK, RADIUS_IPX_ADDRESS},
504 { RD_TP_STATE, RADIUS_BINSTRING},
505 { RD_TP_CLASS, RADIUS_BINSTRING},
506 { RD_TP_VENDOR_SPECIFIC, RADIUS_VENDOR_SPECIFIC},
507 { RD_TP_SESSION_TIMEOUT, RADIUS_INTEGER4},
508 { RD_TP_IDLE_TIMEOUT, RADIUS_INTEGER4},
509 { RD_TP_TERMINATING_ACTION, RADIUS_TERMINATING_ACTION},
510 { RD_TP_CALLED_STATION_ID, RADIUS_BINSTRING},
511 { RD_TP_CALLING_STATION_ID, RADIUS_BINSTRING},
512 { RD_TP_NAS_IDENTIFIER, RADIUS_BINSTRING},
513 { RD_TP_PROXY_STATE, RADIUS_BINSTRING},
514 { RD_TP_LOGIN_LAT_SERVICE, RADIUS_BINSTRING},
515 { RD_TP_LOGIN_LAT_NODE, RADIUS_BINSTRING},
516 { RD_TP_LOGIN_LAT_GROUP, RADIUS_BINSTRING},
517 { RD_TP_FRAMED_APPLETALK_LINK, RADIUS_INTEGER4},
518 { RD_TP_FRAMED_APPLETALK_NETWORK, RADIUS_INTEGER4},
519 { RD_TP_FRAMED_APPLETALK_ZONE, RADIUS_BINSTRING},
520 { RD_TP_ACCT_STATUS_TYPE, RADIUS_ACCOUNTING_STATUS_TYPE},
521 { RD_TP_ACCT_DELAY_TIME, RADIUS_INTEGER4},
522 { RD_TP_ACCT_INPUT_OCTETS, RADIUS_INTEGER4},
523 { RD_TP_ACCT_OUTPUT_OCTETS, RADIUS_INTEGER4},
524 { RD_TP_ACCT_SESSION_ID, RADIUS_STRING},
525 { RD_TP_ACCT_AUTHENTIC, RADIUS_ACCT_AUTHENTIC},
526 { RD_TP_ACCT_SESSION_TIME, RADIUS_INTEGER4},
527 { RD_TP_ACCT_INPUT_PACKETS, RADIUS_INTEGER4},
528 { RD_TP_ACCT_OUTPUT_PACKETS, RADIUS_INTEGER4},
529 { RD_TP_ACCT_TERMINATE_CAUSE, RADIUS_ACCT_TERMINATE_CAUSE},
530 { RD_TP_ACCT_MULTI_SESSION_ID, RADIUS_STRING},
531 { RD_TP_ACCT_LINK_COUNT, RADIUS_INTEGER4},
532 { RD_TP_ACCT_INPUT_GIGAWORDS, RADIUS_INTEGER4},
533 { RD_TP_ACCT_OUTPUT_GIGAWORDS, RADIUS_INTEGER4},
534 { RD_TP_EVENT_TIMESTAMP, RADIUS_TIMESTAMP},
535 { RD_TP_CHAP_CHALLENGE, RADIUS_BINSTRING},
536 { RD_TP_NAS_PORT_TYPE, RADIUS_NAS_PORT_TYPE},
537 { RD_TP_PORT_LIMIT, RADIUS_INTEGER4},
538 { RD_TP_LOGIN_LAT_PORT, RADIUS_BINSTRING},
539 { RD_TP_TUNNEL_TYPE, RADIUS_TUNNEL_TYPE},
540 { RD_TP_TUNNEL_MEDIUM_TYPE, RADIUS_TUNNEL_MEDIUM_TYPE},
541 { RD_TP_TUNNEL_CLIENT_ENDPOINT, RADIUS_STRING_TAGGED},
542 { RD_TP_TUNNEL_SERVER_ENDPOINT, RADIUS_STRING_TAGGED},
543 { RD_TP_TUNNEL_CONNECTION, RADIUS_BINSTRING},
544 { RD_TP_TUNNEL_PASSWORD, RADIUS_STRING_TAGGED},
545 { RD_TP_ARAP_PASSWORD, RADIUS_BINSTRING},
546 { RD_TP_ARAP_FEATURES, RADIUS_BINSTRING},
547 { RD_TP_ARAP_ZONE_ACCESS, RADIUS_BINSTRING},
548 { RD_TP_ARAP_SECURITY, RADIUS_BINSTRING},
549 { RD_TP_ARAP_SECURITY_DATA, RADIUS_BINSTRING},
550 { RD_TP_PASSWORD_RETRY, RADIUS_BINSTRING},
551 { RD_TP_PROMPT, RADIUS_BINSTRING},
552 { RD_TP_CONNECT_INFO, RADIUS_STRING},
553 { RD_TP_CONFIGURATION_TOKEN, RADIUS_BINSTRING},
554 { RD_TP_EAP_MESSAGE, RADIUS_BINSTRING},
555 { RD_TP_MESSAGE_AUTHENTICATOR, RADIUS_BINSTRING},
556 { RD_TP_TUNNEL_PRIVATE_GROUP_ID, RADIUS_STRING_TAGGED},
557 { RD_TP_TUNNEL_ASSIGNMENT_ID, RADIUS_STRING_TAGGED},
558 { RD_TP_TUNNEL_TUNNEL_PREFERENCE, RADIUS_INTEGER4_TAGGED},
559 { RD_TP_TUNNEL_PACKETS_LOST, RADIUS_INTEGER4},
560 { RD_TP_NAS_PORT_ID, RADIUS_STRING},
561 { RD_TP_TUNNEL_CLIENT_AUTH_ID, RADIUS_STRING_TAGGED},
562 { RD_TP_TUNNEL_SERVER_AUTH_ID, RADIUS_STRING_TAGGED},
563 { RD_TP_ASCEND_MODEM_PORTNO, RADIUS_INTEGER4},
564 { RD_TP_ASCEND_MODEM_SLOTNO, RADIUS_INTEGER4},
565 { RD_TP_ASCEND_MULTILINK_ID, RADIUS_INTEGER4},
566 { RD_TP_ASCEND_NUM_IN_MULTILINK, RADIUS_INTEGER4},
567 { RD_TP_ASCEND_FIRST_DEST, RADIUS_IP_ADDRESS},
568 { RD_TP_ASCEND_PRE_INPUT_OCTETS, RADIUS_INTEGER4},
569 { RD_TP_ASCEND_PRE_OUTPUT_OCTETS, RADIUS_INTEGER4},
570 { RD_TP_ASCEND_PRE_INPUT_PACKETS, RADIUS_INTEGER4},
571 { RD_TP_ASCEND_PRE_OUTPUT_PACKETS, RADIUS_INTEGER4},
572 { RD_TP_ASCEND_MAXIMUM_TIME, RADIUS_INTEGER4},
573 { RD_TP_ASCEND_DISCONNECT_CAUSE, RADIUS_INTEGER4},
574 { RD_TP_ASCEND_CONNECT_PROGRESS, RADIUS_INTEGER4},
575 { RD_TP_ASCEND_DATA_RATE, RADIUS_INTEGER4},
576 { RD_TP_ASCEND_PRESESSION_TIME, RADIUS_INTEGER4},
577 { RD_TP_ASCEND_ASSIGN_IP_POOL, RADIUS_INTEGER4},
578 { RD_TP_ASCEND_XMIT_RATE, RADIUS_INTEGER4},
579 {0,0},
580 };
581
582 static value_string radius_attrib_type_vals[] = {
583 { RD_TP_USER_NAME, "User Name"},
584 { RD_TP_USER_PASSWORD, "User Password"},
585 { RD_TP_CHAP_PASSWORD, "Chap Password"},
586 { RD_TP_NAS_IP_ADDRESS, "NAS IP Address"},
587 { RD_TP_NAS_PORT, "NAS Port"},
588 { RD_TP_SERVICE_TYPE, "Service Type"},
589 { RD_TP_FRAMED_PROTOCOL, "Framed Protocol"},
590 { RD_TP_FRAMED_IP_ADDRESS, "Framed IP Address"},
591 { RD_TP_FRAMED_IP_NETMASK, "Framed IP Netmask"},
592 { RD_TP_FRAMED_ROUTING, "Framed Routing"},
593 { RD_TP_FILTER_ID, "Filter Id"},
594 { RD_TP_FRAMED_MTU, "Framed MTU"},
595 { RD_TP_FRAMED_COMPRESSION, "Framed Compression"},
596 { RD_TP_LOGIN_IP_HOST, "Login IP Host"},
597 { RD_TP_LOGIN_SERVICE, "Login Service"},
598 { RD_TP_LOGIN_TCP_PORT, "Login TCP Port"},
599 { RD_TP_UNASSIGNED, "Unassigned"},
600 { RD_TP_REPLY_MESSAGE, "Reply Message"},
601 { RD_TP_CALLBACK_NUMBER, "Callback Number"},
602 { RD_TP_CALLBACK_ID, "Callback Id"},
603 { RD_TP_UNASSIGNED2, "Unassigned"},
604 { RD_TP_FRAMED_ROUTE, "Framed Route"},
605 { RD_TP_FRAMED_IPX_NETWORK, "Framed IPX network"},
606 { RD_TP_STATE, "State"},
607 { RD_TP_CLASS, "Class"},
608 { RD_TP_VENDOR_SPECIFIC, "Vendor Specific" },
609 { RD_TP_SESSION_TIMEOUT, "Session Timeout"},
610 { RD_TP_IDLE_TIMEOUT, "Idle Timeout"},
611 { RD_TP_TERMINATING_ACTION, "Terminating Action"},
612 { RD_TP_CALLED_STATION_ID, "Called Station Id"},
613 { RD_TP_CALLING_STATION_ID, "Calling Station Id"},
614 { RD_TP_NAS_IDENTIFIER, "NAS identifier"},
615 { RD_TP_PROXY_STATE, "Proxy State"},
616 { RD_TP_LOGIN_LAT_SERVICE, "Login LAT Service"},
617 { RD_TP_LOGIN_LAT_NODE, "Login LAT Node"},
618 { RD_TP_LOGIN_LAT_GROUP, "Login LAT Group"},
619 { RD_TP_FRAMED_APPLETALK_LINK, "Framed Appletalk Link"},
620 { RD_TP_FRAMED_APPLETALK_NETWORK, "Framed Appletalk Network"},
621 { RD_TP_FRAMED_APPLETALK_ZONE, "Framed Appletalk Zone"},
622 { RD_TP_ACCT_STATUS_TYPE, "Acct Status Type"},
623 { RD_TP_ACCT_DELAY_TIME, "Acct Delay Time"},
624 { RD_TP_ACCT_INPUT_OCTETS, "Acct Input Octets"},
625 { RD_TP_ACCT_OUTPUT_OCTETS, "Acct Output Octets"},
626 { RD_TP_ACCT_SESSION_ID, "Acct Session Id"},
627 { RD_TP_ACCT_AUTHENTIC, "Acct Authentic"},
628 { RD_TP_ACCT_SESSION_TIME, "Acct Session Time"},
629 { RD_TP_ACCT_INPUT_PACKETS, "Acct Input Packets"},
630 { RD_TP_ACCT_OUTPUT_PACKETS, "Acct Output Packets"},
631 { RD_TP_ACCT_TERMINATE_CAUSE, "Acct Terminate Cause"},
632 { RD_TP_ACCT_MULTI_SESSION_ID, "Acct Multi Session Id"},
633 { RD_TP_ACCT_LINK_COUNT, "Acct Link Count"},
634 { RD_TP_ACCT_INPUT_GIGAWORDS, "Acct Input Gigawords"},
635 { RD_TP_ACCT_OUTPUT_GIGAWORDS, "Acct Output Gigawords"},
636 { RD_TP_EVENT_TIMESTAMP, "Event Timestamp"},
637 { RD_TP_CHAP_CHALLENGE, "Chap Challenge"},
638 { RD_TP_NAS_PORT_TYPE, "NAS Port Type"},
639 { RD_TP_PORT_LIMIT, "Port Limit"},
640 { RD_TP_LOGIN_LAT_PORT, "Login LAT Port"},
641 { RD_TP_TUNNEL_TYPE, "Tunnel Type"},
642 { RD_TP_TUNNEL_MEDIUM_TYPE, "Tunnel Medium Type"},
643 { RD_TP_TUNNEL_CLIENT_ENDPOINT, "Tunnel Client Endpoint"},
644 { RD_TP_TUNNEL_SERVER_ENDPOINT, "Tunnel Server Endpoint"},
645 { RD_TP_TUNNEL_CONNECTION, "Tunnel Connection"},
646 { RD_TP_TUNNEL_PASSWORD, "Tunnel Password"},
647 { RD_TP_ARAP_PASSWORD, "ARAP-Password"},
648 { RD_TP_ARAP_FEATURES, "ARAP-Features"},
649 { RD_TP_ARAP_ZONE_ACCESS, "ARAP-Zone-Access"},
650 { RD_TP_ARAP_SECURITY, "ARAP-Security"},
651 { RD_TP_ARAP_SECURITY_DATA, "ARAP-Security-Data"},
652 { RD_TP_PASSWORD_RETRY, "Password-Retry"},
653 { RD_TP_PROMPT, "Prompt"},
654 { RD_TP_CONNECT_INFO, "Connect-Info"},
655 { RD_TP_CONFIGURATION_TOKEN, "Configuration-Token"},
656 { RD_TP_EAP_MESSAGE, "EAP-Message"},
657 { RD_TP_MESSAGE_AUTHENTICATOR, "Message Authenticator"},
658 { RD_TP_TUNNEL_PRIVATE_GROUP_ID, "Tunnel Private Group ID"},
659 { RD_TP_TUNNEL_ASSIGNMENT_ID, "Tunnel Assignment ID"},
660 { RD_TP_TUNNEL_TUNNEL_PREFERENCE, "Tunnel Preference"},
661 { RD_TP_TUNNEL_PACKETS_LOST, "Tunnel Packets Lost"},
662 { RD_TP_NAS_PORT_ID, "NAS Port ID"},
663 { RD_TP_TUNNEL_CLIENT_AUTH_ID, "Tunnel Client Auth ID"},
664 { RD_TP_TUNNEL_SERVER_AUTH_ID, "Tunnel Server Auth ID"},
665 { RD_TP_ASCEND_MODEM_PORTNO, "Ascend Modem Port No"},
666 { RD_TP_ASCEND_MODEM_SLOTNO, "Ascend Modem Slot No"},
667 { RD_TP_ASCEND_MULTILINK_ID, "Ascend Multilink ID"},
668 { RD_TP_ASCEND_NUM_IN_MULTILINK, "Ascend Num In Multilink"},
669 { RD_TP_ASCEND_FIRST_DEST, "Ascend First Dest"},
670 { RD_TP_ASCEND_PRE_INPUT_OCTETS, "Ascend Pre Input Octets"},
671 { RD_TP_ASCEND_PRE_OUTPUT_OCTETS, "Ascend Pre Output Octets"},
672 { RD_TP_ASCEND_PRE_INPUT_PACKETS, "Ascend Pre Input Packets"},
673 { RD_TP_ASCEND_PRE_OUTPUT_PACKETS, "Ascend Pre Output Packets"},
674 { RD_TP_ASCEND_MAXIMUM_TIME, "Ascend Maximum Time"},
675 { RD_TP_ASCEND_DISCONNECT_CAUSE, "Ascend Disconnect Cause"},
676 { RD_TP_ASCEND_CONNECT_PROGRESS, "Ascend Connect Progress"},
677 { RD_TP_ASCEND_DATA_RATE, "Ascend Data Rate"},
678 { RD_TP_ASCEND_PRESESSION_TIME, "Ascend PreSession Time"},
679 { RD_TP_ASCEND_ASSIGN_IP_POOL, "Ascend Assign IP Pool"},
680 { RD_TP_ASCEND_XMIT_RATE, "Ascend Xmit Rate"},
681 {0,NULL},
682 };
683
684 guint32 match_numval(guint32 val, const value_value_pair *vs)
685 {
686   guint32 i = 0;
687
688   while (vs[i].val1) {
689     if (vs[i].val1 == val)
690       return(vs[i].val2);
691     i++;
692   }
693
694   return(0);
695 }
696
697 static gchar textbuffer[2000];
698
699 gchar *rdconvertbufftostr(gchar *dest, tvbuff_t *tvb, int offset, int length)
700 {
701 /*converts the raw buffer into printable text */
702         guint32 i;
703         guint32 totlen=0;
704         const guint8 *pd = tvb_get_ptr(tvb, offset, length);
705
706         dest[0]='"';
707         dest[1]=0;
708         totlen=1;
709         for (i=0; i < (guint32)length; i++)
710         {
711                 if( isalnum((int)pd[i])||ispunct((int)pd[i])
712                                 ||((int)pd[i]==' '))            {
713                         dest[totlen]=(gchar)pd[i];
714                         totlen++;
715                 }
716                 else
717                 {
718                         sprintf(&(dest[totlen]), "\\%03u", pd[i]);
719                         totlen=totlen+strlen(&(dest[totlen]));
720                 }
721         }
722         dest[totlen]='"';
723         dest[totlen+1]=0;
724         return dest;
725 }
726
727 gchar *rd_match_strval(guint32 val, const value_string *vs) {
728         return val_to_str(val, vs, "Undefined (%u)");
729 }
730
731 gchar *rd_value_to_str(e_avphdr *avph, tvbuff_t *tvb, int offset)
732 {
733   int print_type;
734   gchar *cont;
735   value_string *valstrarr;
736   guint32 intval;
737   const guint8 *pd;
738   guint8 tag;
739   guint8 vtype;
740   char *rtimestamp;
741   extern char *tzname[2];
742
743 /* prints the values of the attribute value pairs into a text buffer */
744   print_type=match_numval(avph->avp_type,radius_printinfo);
745
746   /* Default begin */
747   strcpy(textbuffer,"Value:");
748   cont=&textbuffer[strlen(textbuffer)];
749   switch(print_type)
750   {
751         case( RADIUS_STRING ):
752         case( RADIUS_BINSTRING ):
753                 rdconvertbufftostr(cont,tvb,offset+2,avph->avp_length-2);
754                 break;
755         case( RADIUS_INTEGER4 ):
756                 sprintf(cont,"%u", tvb_get_ntohl(tvb,offset+2));
757                 break;
758         case( RADIUS_IP_ADDRESS ):
759                 ip_to_str_buf(tvb_get_ptr(tvb,offset+2,4),cont);
760                 break;
761         case( RADIUS_SERVICE_TYPE ):
762                 valstrarr=radius_service_type_vals;
763                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
764                 break;
765         case( RADIUS_FRAMED_PROTOCOL ):
766                 valstrarr= radius_framed_protocol_vals;
767                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
768                 break;
769         case( RADIUS_FRAMED_ROUTING ):
770                 valstrarr=radius_framed_routing_vals;
771                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
772                 break;
773         case( RADIUS_FRAMED_COMPRESSION ):
774                 valstrarr=radius_framed_compression_vals;
775                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
776                 break;
777         case( RADIUS_LOGIN_SERVICE ):
778                 valstrarr=radius_login_service_vals;
779                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
780                 break;
781         case( RADIUS_IPX_ADDRESS ):
782                 pd = tvb_get_ptr(tvb,offset+2,4);
783                 sprintf(cont,"%u:%u:%u:%u",(guint8)pd[offset+2],
784                         (guint8)pd[offset+3],(guint8)pd[offset+4],
785                         (guint8)pd[offset+5]);
786         case( RADIUS_TERMINATING_ACTION ):
787                 valstrarr=radius_terminating_action_vals;
788                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
789                 break;
790         case( RADIUS_ACCOUNTING_STATUS_TYPE ):
791                 valstrarr=radius_accounting_status_type_vals;
792                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
793                 break;
794         case( RADIUS_ACCT_AUTHENTIC ):
795                 valstrarr=radius_accounting_authentication_vals;
796                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
797                 break;
798         case( RADIUS_ACCT_TERMINATE_CAUSE ):
799                 valstrarr=radius_acct_terminate_cause_vals;
800                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
801                 break;
802         case( RADIUS_NAS_PORT_TYPE ):
803                 valstrarr=radius_nas_port_type_vals;
804                 strcpy(cont,rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
805                 break;
806         case( RADIUS_TUNNEL_TYPE ):
807                 valstrarr=radius_tunnel_type_vals;
808                 /* Tagged ? */
809                 intval = tvb_get_ntohl(tvb,offset+2);
810                 if (intval >> 24) {
811                         sprintf(textbuffer, "Tag:%u, Value:%s",
812                                 intval >> 24,
813                                 rd_match_strval(intval & 0xffffff,valstrarr));
814                         break;
815                 }
816                 strcpy(cont,rd_match_strval(intval,valstrarr));
817                 break;
818         case( RADIUS_TUNNEL_MEDIUM_TYPE ):
819                 valstrarr=radius_tunnel_medium_type_vals;
820                 intval = tvb_get_ntohl(tvb,offset+2);
821                 /* Tagged ? */
822                 if (intval >> 24) {
823                         sprintf(textbuffer, "Tag:%u, Value:%s",
824                                 intval >> 24,
825                                 rd_match_strval(intval & 0xffffff,valstrarr));
826                         break;
827                 }
828                 strcpy(cont,rd_match_strval(intval,valstrarr));
829                 break;
830         case( RADIUS_STRING_TAGGED ):
831                 /* Tagged ? */
832                 tag = tvb_get_guint8(tvb,offset+2);
833                 if (tag <= 0x1f) {
834                         sprintf(textbuffer, "Tag:%u, Value:",
835                                         tag);
836                         cont=&textbuffer[strlen(textbuffer)];   
837                         rdconvertbufftostr(cont,tvb,offset+3,avph->avp_length-3);
838                         break;
839                 }
840                 rdconvertbufftostr(cont,tvb,offset+2,avph->avp_length-2);
841                 break;
842         case ( RADIUS_VENDOR_SPECIFIC ):
843                 valstrarr=radius_vendor_specific_vendors;
844                 sprintf(textbuffer,"Vendor:%s,",
845                         rd_match_strval(tvb_get_ntohl(tvb,offset+2),valstrarr));
846                 cont=&textbuffer[strlen(textbuffer)];
847                 switch (tvb_get_ntohl(tvb,offset+2)) {
848                 case ( VENDOR_COSINE ):
849                         vtype = tvb_get_guint8(tvb,offset+6);
850                         switch (vtype) {
851                         case ( VENDOR_COSINE_VSA_CONNECION_PROFILE_NAME ):
852                         case ( VENDOR_COSINE_VSA_ENTERPRISE_ID ):
853                         case ( VENDOR_COSINE_VSA_ADDRESS_POOL_NAME ):
854                         case ( VENDOR_COSINE_VSA_CLI_USER_PERMISSION_ID ):
855                                 sprintf(cont," Type:%s, Value:",
856                                         rd_match_strval(vtype, radius_vendor_cosine_types));
857                                 cont=&textbuffer[strlen(textbuffer)];
858                                 rdconvertbufftostr(cont,tvb,offset+8,avph->avp_length-8);
859                                 break;
860                         case ( VENDOR_COSINE_VSA_VPI_VCI ):
861                                 sprintf(cont," Type:%s, Value:%u/%u",
862                                         rd_match_strval(vtype, radius_vendor_cosine_types),
863                                         tvb_get_ntohs(tvb,offset+8),
864                                         tvb_get_ntohs(tvb,offset+10));
865                                 break;
866                         case ( VENDOR_COSINE_VSA_DS_BYTE ):
867                         case ( VENDOR_COSINE_VSA_DLCI ):
868                                 sprintf(cont," Type:%s, Value:%u",
869                                         rd_match_strval(vtype, radius_vendor_cosine_types),
870                                         tvb_get_ntohl(tvb,offset+8));
871                                 break;
872                         case ( VENDOR_COSINE_VSA_LNS_IP_ADDRESS ):
873                                 sprintf(cont," Type:%s, Value:",
874                                         rd_match_strval(vtype, radius_vendor_cosine_types));
875                                 cont=&textbuffer[strlen(textbuffer)];
876                                 ip_to_str_buf(tvb_get_ptr(tvb,offset+8,4),cont);
877                                 break;
878                         default:
879                                 sprintf(cont," Unknown Value Type");
880                                 break;
881                         }
882                         break;
883                 case ( VENDOR_ISSANNI ):
884                         vtype = tvb_get_guint8(tvb,offset+6);
885                         switch (vtype) {
886                         case ( VENDOR_ISSANNI_VSA_SOFTFLOW_TEMPLATE ):
887                         case ( VENDOR_ISSANNI_VSA_NAT_POOL_NAME ):
888                         case ( VENDOR_ISSANNI_VSA_VRD ):
889                         case ( VENDOR_ISSANNI_VSA_TUNNEL_NAME ):
890                         case ( VENDOR_ISSANNI_VSA_IP_POOL_NAME ):
891                         case ( VENDOR_ISSANNI_VSA_PPPOE_URL ):
892                         case ( VENDOR_ISSANNI_VSA_PPPOE_MOTM ):
893                         case ( VENDOR_ISSANNI_VSA_SERVICE ):
894                         case ( VENDOR_ISSANNI_VSA_TRAFFIC_CLASS ):
895                         case ( VENDOR_ISSANNI_VSA_QOS_CLASS ):
896                         case ( VENDOR_ISSANNI_VSA_IFACE_NAME ):
897                                 sprintf(cont," Type:%s, Value:",
898                                         rd_match_strval(vtype, radius_vendor_issanni_types));
899                                 cont=&textbuffer[strlen(textbuffer)];
900                                 rdconvertbufftostr(cont,tvb,offset+8,avph->avp_length-8);
901                                 break;
902                         case ( VENDOR_ISSANNI_VSA_NAT_TYPE ):
903                         case ( VENDOR_ISSANNI_VSA_TUNNEL_TYPE ):
904                                 sprintf(cont," Type:%s, Value:%u",
905                                         rd_match_strval(vtype, radius_vendor_issanni_types),
906                                         tvb_get_ntohl(tvb,offset+8));
907                                 break;
908                         case ( VENDOR_ISSANNI_VSA_PRI_DNS ):
909                         case ( VENDOR_ISSANNI_VSA_SEC_DNS ):
910                         case ( VENDOR_ISSANNI_VSA_PRI_NBNS ):
911                         case ( VENDOR_ISSANNI_VSA_SEC_NBNS ):
912                                 sprintf(cont," Type:%s, Value:",
913                                         rd_match_strval(vtype, radius_vendor_issanni_types));
914                                 cont=&textbuffer[strlen(textbuffer)];
915                                 ip_to_str_buf(tvb_get_ptr(tvb,offset+8,4),cont);
916                                 break;
917                         default:
918                                 sprintf(cont," Unknown Value Type");
919                                 break;
920                         }
921                         break;
922                 default: 
923                         sprintf(cont, " Value:");
924                         rdconvertbufftostr(cont,tvb,offset+6,avph->avp_length-6);
925                         break;
926                 }
927                 break;
928         case( RADIUS_TIMESTAMP ):
929                 intval=tvb_get_ntohl(tvb,offset+2);
930                 rtimestamp=ctime((time_t*)&intval);
931                 rtimestamp[strlen(rtimestamp)-1]=0;
932                 sprintf(cont,"%d (%s %s)", tvb_get_ntohl(tvb,offset+2), rtimestamp, *tzname);
933                 break;
934         case( RADIUS_INTEGER4_TAGGED ):
935                 intval = tvb_get_ntohl(tvb,offset+2);
936                 /* Tagged ? */
937                 if (intval >> 24) {
938                         sprintf(textbuffer, "Tag:%u, Value:%u",
939                                 intval >> 24,
940                                 intval & 0xffffff);
941                         break;
942                 }
943                 sprintf(cont,"%u", intval);
944                 break;
945         case( RADIUS_UNKNOWN ):
946         default:
947                 strcpy(textbuffer,"Unknown Value Type");
948                 break;
949   }
950   if (cont == textbuffer) {
951         strcpy(cont,"Unknown Value");
952   }
953   return textbuffer;
954 }
955
956
957 void dissect_attribute_value_pairs(tvbuff_t *tvb, int offset,proto_tree *tree,
958                                    int avplength,packet_info *pinfo)
959 {
960 /* adds the attribute value pairs to the tree */
961   e_avphdr avph;
962   gchar *avptpstrval;
963   gchar *valstr;
964   guint8 *reassembled_data = NULL;
965   int reassembled_data_len = 0;
966   int data_needed = 0;
967
968   if (avplength==0)
969   {
970     if (tree)
971       proto_tree_add_text(tree, tvb,offset,0,"No Attribute Value Pairs Found");
972     return;
973   }
974
975   /*
976    * In case we throw an exception, clean up whatever stuff we've
977    * allocated (if any).
978    */
979   CLEANUP_PUSH(g_free, reassembled_data);
980
981   while (avplength > 0)
982   {
983     tvb_memcpy(tvb,(guint8 *)&avph,offset,sizeof(e_avphdr));
984     avptpstrval = match_strval(avph.avp_type, radius_attrib_type_vals);
985     if (avptpstrval == NULL)
986       avptpstrval = "Unknown Type";
987     if (avph.avp_length < 2) {
988       /*
989        * This AVP is bogus - the length includes the type and length
990        * fields, so it must be >= 2.
991        */
992       if (tree) {
993         proto_tree_add_text(tree, tvb, offset, avph.avp_length,
994                             "t:%s(%u) l:%u (length not >= 2)",
995                             avptpstrval, avph.avp_type, avph.avp_length);
996       }
997       break;
998     }
999
1000     if (avph.avp_type == RD_TP_EAP_MESSAGE) {
1001       proto_item *ti;
1002       proto_tree *eap_tree = NULL;
1003       gint tvb_len;
1004       tvbuff_t *next_tvb;
1005       int data_len;
1006       int result;
1007
1008       if (tree) {
1009         ti = proto_tree_add_text(tree, tvb, offset, avph.avp_length,
1010                                  "t:%s(%u) l:%u",
1011                                  avptpstrval, avph.avp_type, avph.avp_length);
1012         eap_tree = proto_item_add_subtree(ti, ett_radius_eap);
1013       }
1014       tvb_len = tvb_length_remaining(tvb, offset+2);
1015       data_len = avph.avp_length-2;
1016       if (data_len < tvb_len)
1017         tvb_len = data_len;
1018       next_tvb = tvb_new_subset(tvb, offset+2, tvb_len, data_len);
1019
1020       /*
1021        * Set the columns non-writable, so that the packet list
1022        * shows this as an RADIUS packet, not as an EAP packet.
1023        */
1024       col_set_writable(pinfo->cinfo, FALSE);
1025
1026       /*
1027        * RFC 2869 says, in section 5.13, describing the EAP-Message
1028        * attribute:
1029        *
1030        *    The String field contains EAP packets, as defined in [3].  If
1031        *    multiple EAP-Message attributes are present in a packet their
1032        *    values should be concatenated; this allows EAP packets longer than
1033        *    253 octets to be passed by RADIUS.
1034        *
1035        * Do reassembly of EAP-Message attributes.
1036        */
1037
1038       /* Are we in the process of reassembling? */
1039       if (reassembled_data != NULL) {
1040         /* Yes - show this as an EAP fragment. */
1041         if (tree)
1042           proto_tree_add_text(eap_tree, next_tvb, 0, -1, "EAP fragment");
1043
1044         /*
1045          * Do we have all of the data in this fragment?
1046          */
1047         if (tvb_len >= data_len) {
1048           /*
1049            * Yes - add it to the reassembled data.
1050            */
1051           tvb_memcpy(next_tvb, reassembled_data + reassembled_data_len,
1052                      0, data_len);
1053           reassembled_data_len += data_len;
1054           data_needed -= data_len;
1055           if (data_needed <= 0) {
1056             /*
1057              * We got at least as much data as we needed; we're done
1058              * reassembling.
1059              * XXX - what if we got more?
1060              */
1061
1062             /*
1063              * Allocate a new tvbuff, referring to the reassembled payload.
1064              */
1065             next_tvb = tvb_new_real_data(reassembled_data, reassembled_data_len,
1066                                          reassembled_data_len);
1067
1068             /*
1069              * We have a tvbuff that refers to this data, so we shouldn't
1070              * free this data if we throw an exception; clear
1071              * "reassembled_data", so the cleanup handler won't free it.
1072              */
1073             reassembled_data = NULL;
1074             reassembled_data_len = 0;
1075             data_needed = 0;
1076
1077             /*
1078              * Arrange that the allocated packet data copy be freed when the
1079              * tvbuff is freed.
1080              */
1081             tvb_set_free_cb(next_tvb, g_free);
1082
1083             /*
1084              * Add the tvbuff to the list of tvbuffs to which the tvbuff we
1085              * were handed refers, so it'll get cleaned up when that tvbuff
1086              * is cleaned up.
1087              */
1088             tvb_set_child_real_data_tvbuff(tvb, next_tvb);
1089
1090             /* Add the defragmented data to the data source list. */
1091             add_new_data_source(pinfo->fd, next_tvb, "Reassembled EAP");
1092
1093             /* Now dissect it. */
1094             call_dissector(eap_fragment_handle, next_tvb, pinfo, eap_tree);
1095           }
1096         }
1097       } else {
1098         /*
1099          * No - hand it to the dissector.
1100          */
1101         result = call_dissector(eap_fragment_handle, next_tvb, pinfo, eap_tree);
1102         if (result < 0) {
1103           /* This is only part of the full EAP packet; start reassembly. */
1104           proto_tree_add_text(eap_tree, next_tvb, 0, -1, "EAP fragment");
1105           reassembled_data_len = data_len;
1106           data_needed = -result;
1107           reassembled_data = g_malloc(reassembled_data_len + data_needed);
1108           tvb_memcpy(next_tvb, reassembled_data, 0, reassembled_data_len);
1109         }
1110       }
1111     } else {
1112       if (tree) {
1113         valstr = rd_value_to_str(&avph, tvb, offset);
1114         proto_tree_add_text(tree, tvb, offset, avph.avp_length,
1115                             "t:%s(%u) l:%u, %s",
1116                             avptpstrval, avph.avp_type, avph.avp_length,
1117                             valstr);
1118       }
1119     }
1120
1121     offset = offset+avph.avp_length;
1122     avplength = avplength-avph.avp_length;
1123   }
1124
1125   /*
1126    * Call the cleanup handler to free any reassembled data we haven't
1127    * attached to a tvbuff, and pop the handler.
1128    */
1129   CLEANUP_CALL_AND_POP;
1130 }
1131
1132 static void dissect_radius(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
1133 {
1134   proto_tree *radius_tree = NULL, *avptree = NULL;
1135   proto_item *ti,*avptf;
1136   int rhlength;
1137   int rhcode;
1138   int rhident;
1139   int avplength,hdrlength;
1140   e_radiushdr rh;
1141
1142   gchar *codestrval;
1143
1144   if (check_col(pinfo->cinfo, COL_PROTOCOL))
1145         col_set_str(pinfo->cinfo, COL_PROTOCOL, "RADIUS");
1146   if (check_col(pinfo->cinfo, COL_INFO))
1147         col_clear(pinfo->cinfo, COL_INFO);
1148
1149   tvb_memcpy(tvb,(guint8 *)&rh,0,sizeof(e_radiushdr));
1150
1151   rhcode= (int)rh.rh_code;
1152   rhident= (int)rh.rh_ident;
1153   rhlength= (int)ntohs(rh.rh_pktlength);
1154   codestrval=  match_strval(rhcode,radius_vals);
1155   if (codestrval==NULL)
1156   {
1157         codestrval="Unknown Packet";
1158   }
1159   if (check_col(pinfo->cinfo, COL_INFO))
1160   {
1161         col_add_fstr(pinfo->cinfo,COL_INFO,"%s(%d) (id=%d, l=%d)",
1162                 codestrval, rhcode, rhident, rhlength);
1163   }
1164
1165   if (tree)
1166   {
1167         ti = proto_tree_add_item(tree,proto_radius, tvb, 0, rhlength, FALSE);
1168
1169         radius_tree = proto_item_add_subtree(ti, ett_radius);
1170
1171         proto_tree_add_uint(radius_tree,hf_radius_code, tvb, 0, 1,
1172                 rh.rh_code);
1173         proto_tree_add_uint_format(radius_tree,hf_radius_id, tvb, 1, 1,
1174                 rh.rh_ident, "Packet identifier: 0x%01x (%d)",
1175                         rhident,rhident);         
1176
1177         proto_tree_add_uint(radius_tree, hf_radius_length, tvb,
1178                         2, 2, rhlength);
1179         proto_tree_add_text(radius_tree, tvb, 4,
1180                         AUTHENTICATOR_LENGTH,
1181                          "Authenticator");
1182   }
1183    
1184   hdrlength=RD_HDR_LENGTH+AUTHENTICATOR_LENGTH;
1185   avplength= rhlength -hdrlength;
1186
1187   if (avplength > 0) {
1188     /* list the attribute value pairs */
1189
1190     if (tree)
1191     {
1192       avptf = proto_tree_add_text(radius_tree,
1193                                   tvb,hdrlength,avplength,
1194                                   "Attribute value pairs");
1195       avptree = proto_item_add_subtree(avptf, ett_radius_avp);
1196     }
1197
1198     dissect_attribute_value_pairs(tvb, hdrlength, avptree, avplength, pinfo);
1199   }
1200 }
1201 /* registration with the filtering engine */
1202 void
1203 proto_register_radius(void)
1204 {
1205         static hf_register_info hf[] = {
1206                 { &hf_radius_code,
1207                 { "Code","radius.code", FT_UINT8, BASE_DEC, VALS(radius_vals), 0x0,
1208                         "", HFILL }},
1209
1210                 { &hf_radius_id,
1211                 { "Identifier", "radius.id", FT_UINT8, BASE_DEC, NULL, 0x0,
1212                         "", HFILL }},
1213
1214                 { &hf_radius_length,
1215                 { "Length","radius.length", FT_UINT16, BASE_DEC, NULL, 0x0,
1216                         "", HFILL }}
1217         };
1218         static gint *ett[] = {
1219                 &ett_radius,
1220                 &ett_radius_avp,
1221                 &ett_radius_eap,
1222         };
1223
1224         proto_radius = proto_register_protocol("Radius Protocol", "RADIUS",
1225             "radius");
1226         proto_register_field_array(proto_radius, hf, array_length(hf));
1227         proto_register_subtree_array(ett, array_length(ett));
1228 }
1229
1230 void
1231 proto_reg_handoff_radius(void)
1232 {
1233         dissector_handle_t radius_handle;
1234
1235         /*
1236          * Get a handle for the EAP fragment dissector.
1237          */
1238         eap_fragment_handle = find_dissector("eap_fragment");
1239
1240         radius_handle = create_dissector_handle(dissect_radius, proto_radius);
1241         dissector_add("udp.port", UDP_PORT_RADIUS, radius_handle);
1242         dissector_add("udp.port", UDP_PORT_RADIUS_NEW, radius_handle);
1243         dissector_add("udp.port", UDP_PORT_RADACCT, radius_handle);
1244         dissector_add("udp.port", UDP_PORT_RADACCT_NEW, radius_handle);
1245 }