2 * Routines for ACAP packet dissection
3 * Copyright 2003, Brad Hards <bradh@frogmouth.net>
4 * Heavily based in packet-imap.c, Copyright 1999, Richard Sharpe <rsharpe@ns.aus.com>
6 * $Id: packet-acap.c,v 1.1 2003/03/25 22:30:19 guy Exp $
8 * Ethereal - Network traffic analyzer
9 * By Gerald Combs <gerald@ethereal.com>
10 * Copyright 1998 Gerald Combs
12 * Copied from packet-imap.c
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License
16 * as published by the Free Software Foundation; either version 2
17 * of the License, or (at your option) any later version.
19 * This program is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
24 * You should have received a copy of the GNU General Public License
25 * along with this program; if not, write to the Free Software
26 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
37 #include <epan/packet.h>
38 #include <epan/strutil.h>
40 static int proto_acap = -1;
41 static int hf_acap_response = -1;
42 static int hf_acap_request = -1;
44 static gint ett_acap = -1;
46 #define TCP_PORT_ACAP 674
49 dissect_acap(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
52 proto_tree *acap_tree, *ti;
58 const guchar *next_token;
60 if (check_col(pinfo->cinfo, COL_PROTOCOL))
61 col_set_str(pinfo->cinfo, COL_PROTOCOL, "ACAP");
64 * Find the end of the first line.
66 * Note that "tvb_find_line_end()" will return a value that is
67 * not longer than what's in the buffer, so the "tvb_get_ptr()"
68 * call won't throw an exception.
70 linelen = tvb_find_line_end(tvb, offset, -1, &next_offset, FALSE);
71 line = tvb_get_ptr(tvb, offset, linelen);
73 if (pinfo->match_port == pinfo->destport)
78 if (check_col(pinfo->cinfo, COL_INFO)) {
80 * Put the first line from the buffer into the summary
81 * (but leave out the line terminator).
83 col_add_fstr(pinfo->cinfo, COL_INFO, "%s: %s",
84 is_request ? "Request" : "Response",
85 format_text(line, linelen));
89 ti = proto_tree_add_item(tree, proto_acap, tvb, offset, -1,
91 acap_tree = proto_item_add_subtree(ti, ett_acap);
94 proto_tree_add_boolean_hidden(acap_tree,
95 hf_acap_request, tvb, 0, 0, TRUE);
97 proto_tree_add_boolean_hidden(acap_tree,
98 hf_acap_response, tvb, 0, 0, TRUE);
102 * Show the first line as tags + requests or replies.
106 * Extract the first token, and, if there is a first
107 * token, add it as the request or reply tag.
109 tokenlen = get_token_len(line, line + linelen, &next_token);
112 proto_tree_add_text(acap_tree, tvb, offset,
113 tokenlen, "Request Tag: %s",
114 format_text(line, tokenlen));
116 proto_tree_add_text(acap_tree, tvb, offset,
117 tokenlen, "Response Tag: %s",
118 format_text(line, tokenlen));
120 offset += next_token - line;
121 linelen -= next_token - line;
126 * Add the rest of the line as request or reply data.
130 proto_tree_add_text(acap_tree, tvb, offset,
131 linelen, "Request: %s",
132 format_text(line, linelen));
134 proto_tree_add_text(acap_tree, tvb, offset,
135 linelen, "Response: %s",
136 format_text(line, linelen));
141 * XXX - show the rest of the frame; this requires that
142 * we handle literals, quoted strings, continuation
145 * This involves a state machine, and attaching
146 * state information to the packets.
152 proto_register_acap(void)
154 static hf_register_info hf[] = {
156 { "Response", "acap.response",
157 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
158 "TRUE if ACAP response", HFILL }},
161 { "Request", "acap.request",
162 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
163 "TRUE if ACAP request", HFILL }}
165 static gint *ett[] = {
169 proto_acap = proto_register_protocol("Application Configuration Access Protocol",
171 proto_register_field_array(proto_acap, hf, array_length(hf));
172 proto_register_subtree_array(ett, array_length(ett));
176 proto_reg_handoff_acap(void)
178 dissector_handle_t acap_handle;
180 acap_handle = create_dissector_handle(dissect_acap, proto_acap);
181 dissector_add("tcp.port", TCP_PORT_ACAP, acap_handle);