1*e018180dSDominic Spill /* packet-btsm.c
2*e018180dSDominic Spill * Routines for Bluetooth Low Energy Security Manager dissection
3*e018180dSDominic Spill * Copyright 2013, Mike Ryan, mikeryan /at/ isecpartners /dot/ com
4*e018180dSDominic Spill *
5*e018180dSDominic Spill * Wireshark - Network traffic analyzer
6*e018180dSDominic Spill * By Gerald Combs <[email protected]>
7*e018180dSDominic Spill * Copyright 1998 Gerald Combs
8*e018180dSDominic Spill *
9*e018180dSDominic Spill * This program is free software; you can redistribute it and/or
10*e018180dSDominic Spill * modify it under the terms of the GNU General Public License
11*e018180dSDominic Spill * as published by the Free Software Foundation; either version 2
12*e018180dSDominic Spill * of the License, or (at your option) any later version.
13*e018180dSDominic Spill *
14*e018180dSDominic Spill * This program is distributed in the hope that it will be useful,
15*e018180dSDominic Spill * but WITHOUT ANY WARRANTY; without even the implied warranty of
16*e018180dSDominic Spill * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17*e018180dSDominic Spill * GNU General Public License for more details.
18*e018180dSDominic Spill *
19*e018180dSDominic Spill * You should have received a copy of the GNU General Public License
20*e018180dSDominic Spill * along with this program; if not, write to the Free Software
21*e018180dSDominic Spill * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
22*e018180dSDominic Spill */
23*e018180dSDominic Spill
24*e018180dSDominic Spill #ifdef HAVE_CONFIG_H
25*e018180dSDominic Spill # include "config.h"
26*e018180dSDominic Spill #endif
27*e018180dSDominic Spill
28*e018180dSDominic Spill #include <wireshark/config.h> /* needed for epan/gcc-4.x */
29*e018180dSDominic Spill #include <epan/packet.h>
30*e018180dSDominic Spill #include <epan/prefs.h>
31*e018180dSDominic Spill
32*e018180dSDominic Spill #define BTL2CAP_FIXED_CID_BTSM 0x0006
33*e018180dSDominic Spill
34*e018180dSDominic Spill /* initialize the protocol and registered fields */
35*e018180dSDominic Spill static int proto_btsm = -1;
36*e018180dSDominic Spill static int hf_btsm_command = -1;
37*e018180dSDominic Spill static int hf_btsm_pairing_request_io_capability = -1;
38*e018180dSDominic Spill static int hf_btsm_pairing_request_oob_data = -1;
39*e018180dSDominic Spill static int hf_btsm_pairing_request_auth_req = -1;
40*e018180dSDominic Spill static int hf_btsm_pairing_request_reserved = -1;
41*e018180dSDominic Spill static int hf_btsm_pairing_request_mitm = -1;
42*e018180dSDominic Spill static int hf_btsm_pairing_request_bonding_flags = -1;
43*e018180dSDominic Spill static int hf_btsm_pairing_request_max_key_size = -1;
44*e018180dSDominic Spill static int hf_btsm_pairing_request_initiator_key_distribution = -1;
45*e018180dSDominic Spill static int hf_btsm_pairing_request_responder_key_distribution = -1;
46*e018180dSDominic Spill static int hf_btsm_pairing_response_io_capability = -1;
47*e018180dSDominic Spill static int hf_btsm_pairing_response_oob_data = -1;
48*e018180dSDominic Spill static int hf_btsm_pairing_response_auth_req = -1;
49*e018180dSDominic Spill static int hf_btsm_pairing_response_reserved = -1;
50*e018180dSDominic Spill static int hf_btsm_pairing_response_mitm = -1;
51*e018180dSDominic Spill static int hf_btsm_pairing_response_bonding_flags = -1;
52*e018180dSDominic Spill static int hf_btsm_pairing_response_max_key_size = -1;
53*e018180dSDominic Spill static int hf_btsm_pairing_response_initiator_key_distribution = -1;
54*e018180dSDominic Spill static int hf_btsm_pairing_response_responder_key_distribution = -1;
55*e018180dSDominic Spill static int hf_btsm_pairing_confirm_confirm = -1;
56*e018180dSDominic Spill static int hf_btsm_pairing_random_random = -1;
57*e018180dSDominic Spill static int hf_btsm_encryption_info_ltk = -1;
58*e018180dSDominic Spill
59*e018180dSDominic Spill static const value_string commands[] = {
60*e018180dSDominic Spill { 0x00, "Reserved" },
61*e018180dSDominic Spill { 0x01, "Pairing Request" },
62*e018180dSDominic Spill { 0x02, "Pairing Response" },
63*e018180dSDominic Spill { 0x03, "Pairing Confirm" },
64*e018180dSDominic Spill { 0x04, "Pairing Random" },
65*e018180dSDominic Spill { 0x05, "Pairing Failed" },
66*e018180dSDominic Spill { 0x06, "Encryption Information" },
67*e018180dSDominic Spill { 0x07, "Master Identification" },
68*e018180dSDominic Spill { 0x08, "Identity Information" },
69*e018180dSDominic Spill { 0x09, "Identity Address Information" },
70*e018180dSDominic Spill { 0x0A, "Signing Information" },
71*e018180dSDominic Spill { 0x0B, "Security Request" },
72*e018180dSDominic Spill { 0, NULL }
73*e018180dSDominic Spill };
74*e018180dSDominic Spill
75*e018180dSDominic Spill static const value_string io_capability[] = {
76*e018180dSDominic Spill { 0x00, "DisplayOnly" },
77*e018180dSDominic Spill { 0x01, "DisplayYesNo" },
78*e018180dSDominic Spill { 0x02, "KeyboardOnly" },
79*e018180dSDominic Spill { 0x03, "NoInputOutput" },
80*e018180dSDominic Spill { 0x04, "KeyboardDisplay" },
81*e018180dSDominic Spill { 0, NULL }
82*e018180dSDominic Spill };
83*e018180dSDominic Spill
84*e018180dSDominic Spill static const value_string oob_data[] = {
85*e018180dSDominic Spill { 0x00, "OOB Authentication data not present" },
86*e018180dSDominic Spill { 0x01, "OOB Authentication data from remote device present" },
87*e018180dSDominic Spill { 0, NULL }
88*e018180dSDominic Spill };
89*e018180dSDominic Spill
90*e018180dSDominic Spill static const value_string bonding_flags[] = {
91*e018180dSDominic Spill { 0x0, "No Bonding" },
92*e018180dSDominic Spill { 0x1, "Bonding" },
93*e018180dSDominic Spill { 0, NULL },
94*e018180dSDominic Spill };
95*e018180dSDominic Spill
96*e018180dSDominic Spill /* initialize the subtree pointers */
97*e018180dSDominic Spill static gint ett_btsm = -1;
98*e018180dSDominic Spill static gint ett_auth_req = -1;
99*e018180dSDominic Spill
100*e018180dSDominic Spill static void
dissect_pairing_request(tvbuff_t * tvb,proto_tree * tree)101*e018180dSDominic Spill dissect_pairing_request(tvbuff_t *tvb, proto_tree *tree)
102*e018180dSDominic Spill {
103*e018180dSDominic Spill proto_item *auth_req_item;
104*e018180dSDominic Spill proto_tree *auth_req_tree;
105*e018180dSDominic Spill
106*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_request_io_capability, tvb, 1, 1, TRUE);
107*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_request_oob_data, tvb, 2, 1, TRUE);
108*e018180dSDominic Spill
109*e018180dSDominic Spill auth_req_item = proto_tree_add_item(tree, hf_btsm_pairing_request_auth_req, tvb, 3, 1, TRUE);
110*e018180dSDominic Spill auth_req_tree = proto_item_add_subtree(auth_req_item, ett_auth_req);
111*e018180dSDominic Spill proto_tree_add_item(auth_req_tree, hf_btsm_pairing_request_reserved, tvb, 3, 1, TRUE);
112*e018180dSDominic Spill proto_tree_add_bits_item(auth_req_tree, hf_btsm_pairing_request_mitm, tvb, 3 * 8 + 5, 1, TRUE);
113*e018180dSDominic Spill proto_tree_add_item(auth_req_tree, hf_btsm_pairing_request_bonding_flags, tvb, 3, 1, TRUE);
114*e018180dSDominic Spill
115*e018180dSDominic Spill // TODO: check that max key size iswithin [7,16]
116*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_request_max_key_size, tvb, 4, 1, TRUE);
117*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_request_initiator_key_distribution, tvb, 5, 1, TRUE);
118*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_request_responder_key_distribution, tvb, 6, 1, TRUE);
119*e018180dSDominic Spill }
120*e018180dSDominic Spill
121*e018180dSDominic Spill static void
dissect_pairing_response(tvbuff_t * tvb,proto_tree * tree)122*e018180dSDominic Spill dissect_pairing_response(tvbuff_t *tvb, proto_tree *tree)
123*e018180dSDominic Spill {
124*e018180dSDominic Spill proto_item *auth_req_item;
125*e018180dSDominic Spill proto_tree *auth_req_tree;
126*e018180dSDominic Spill
127*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_response_io_capability, tvb, 1, 1, TRUE);
128*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_response_oob_data, tvb, 2, 1, TRUE);
129*e018180dSDominic Spill
130*e018180dSDominic Spill auth_req_item = proto_tree_add_item(tree, hf_btsm_pairing_response_auth_req, tvb, 3, 1, TRUE);
131*e018180dSDominic Spill auth_req_tree = proto_item_add_subtree(auth_req_item, ett_auth_req);
132*e018180dSDominic Spill proto_tree_add_item(auth_req_tree, hf_btsm_pairing_response_reserved, tvb, 3, 1, TRUE);
133*e018180dSDominic Spill proto_tree_add_bits_item(auth_req_tree, hf_btsm_pairing_response_mitm, tvb, 3 * 8 + 5, 1, TRUE);
134*e018180dSDominic Spill proto_tree_add_item(auth_req_tree, hf_btsm_pairing_response_bonding_flags, tvb, 3, 1, TRUE);
135*e018180dSDominic Spill
136*e018180dSDominic Spill // TODO: check that max key size iswithin [7,16]
137*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_response_max_key_size, tvb, 4, 1, TRUE);
138*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_response_initiator_key_distribution, tvb, 5, 1, TRUE);
139*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_response_responder_key_distribution, tvb, 6, 1, TRUE);
140*e018180dSDominic Spill }
141*e018180dSDominic Spill
142*e018180dSDominic Spill static void
dissect_pairing_confirm(tvbuff_t * tvb,proto_tree * tree)143*e018180dSDominic Spill dissect_pairing_confirm(tvbuff_t *tvb, proto_tree *tree)
144*e018180dSDominic Spill {
145*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_confirm_confirm, tvb, 1, 16, TRUE);
146*e018180dSDominic Spill }
147*e018180dSDominic Spill
148*e018180dSDominic Spill static void
dissect_pairing_random(tvbuff_t * tvb,proto_tree * tree)149*e018180dSDominic Spill dissect_pairing_random(tvbuff_t *tvb, proto_tree *tree)
150*e018180dSDominic Spill {
151*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_pairing_random_random, tvb, 1, 16, TRUE);
152*e018180dSDominic Spill }
153*e018180dSDominic Spill
154*e018180dSDominic Spill static void
dissect_encryption_info(tvbuff_t * tvb,proto_tree * tree)155*e018180dSDominic Spill dissect_encryption_info(tvbuff_t *tvb, proto_tree *tree)
156*e018180dSDominic Spill {
157*e018180dSDominic Spill proto_tree_add_item(tree, hf_btsm_encryption_info_ltk, tvb, 1, 16, TRUE);
158*e018180dSDominic Spill }
159*e018180dSDominic Spill
160*e018180dSDominic Spill /* dissect a packet */
161*e018180dSDominic Spill static void
dissect_btsm(tvbuff_t * tvb,packet_info * pinfo,proto_tree * tree)162*e018180dSDominic Spill dissect_btsm(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
163*e018180dSDominic Spill {
164*e018180dSDominic Spill proto_item *btsm_item;
165*e018180dSDominic Spill proto_tree *btsm_tree;
166*e018180dSDominic Spill guint8 command;
167*e018180dSDominic Spill
168*e018180dSDominic Spill #if 0
169*e018180dSDominic Spill /* sanity check: length */
170*e018180dSDominic Spill if (tvb_length(tvb) > 0 && tvb_length(tvb) < 9)
171*e018180dSDominic Spill /* bad length: look for a different dissector */
172*e018180dSDominic Spill return 0;
173*e018180dSDominic Spill #endif
174*e018180dSDominic Spill
175*e018180dSDominic Spill /* make entries in protocol column and info column on summary display */
176*e018180dSDominic Spill if (check_col(pinfo->cinfo, COL_PROTOCOL))
177*e018180dSDominic Spill col_set_str(pinfo->cinfo, COL_PROTOCOL, "BTLE Security Manager");
178*e018180dSDominic Spill
179*e018180dSDominic Spill command = tvb_get_guint8(tvb, 0);
180*e018180dSDominic Spill
181*e018180dSDominic Spill /* see if we are being asked for details */
182*e018180dSDominic Spill if (tree) {
183*e018180dSDominic Spill
184*e018180dSDominic Spill /* create display subtree for the protocol */
185*e018180dSDominic Spill btsm_item = proto_tree_add_item(tree, proto_btsm, tvb, 0, tvb_length(tvb), TRUE);
186*e018180dSDominic Spill btsm_tree = proto_item_add_subtree(btsm_item, ett_btsm);
187*e018180dSDominic Spill
188*e018180dSDominic Spill proto_tree_add_item(btsm_tree, hf_btsm_command, tvb, 0, 1, TRUE);
189*e018180dSDominic Spill
190*e018180dSDominic Spill if (check_col(pinfo->cinfo, COL_INFO)) {
191*e018180dSDominic Spill if (command <= 0xb) {
192*e018180dSDominic Spill col_set_str(pinfo->cinfo, COL_INFO, commands[command].strptr);
193*e018180dSDominic Spill } else {
194*e018180dSDominic Spill col_set_str(pinfo->cinfo, COL_INFO, "Unknown");
195*e018180dSDominic Spill }
196*e018180dSDominic Spill }
197*e018180dSDominic Spill
198*e018180dSDominic Spill switch (command) {
199*e018180dSDominic Spill // pairing request
200*e018180dSDominic Spill case (0x1):
201*e018180dSDominic Spill dissect_pairing_request(tvb, btsm_tree);
202*e018180dSDominic Spill break;
203*e018180dSDominic Spill case (0x2):
204*e018180dSDominic Spill dissect_pairing_response(tvb, btsm_tree);
205*e018180dSDominic Spill break;
206*e018180dSDominic Spill case (0x3):
207*e018180dSDominic Spill dissect_pairing_confirm(tvb, btsm_tree);
208*e018180dSDominic Spill break;
209*e018180dSDominic Spill case (0x4):
210*e018180dSDominic Spill dissect_pairing_random(tvb, btsm_tree);
211*e018180dSDominic Spill break;
212*e018180dSDominic Spill case (0x6):
213*e018180dSDominic Spill dissect_encryption_info(tvb, btsm_tree);
214*e018180dSDominic Spill break;
215*e018180dSDominic Spill default:
216*e018180dSDominic Spill break;
217*e018180dSDominic Spill }
218*e018180dSDominic Spill }
219*e018180dSDominic Spill
220*e018180dSDominic Spill return;
221*e018180dSDominic Spill }
222*e018180dSDominic Spill
223*e018180dSDominic Spill void
proto_reg_handoff_btsm(void)224*e018180dSDominic Spill proto_reg_handoff_btsm(void)
225*e018180dSDominic Spill {
226*e018180dSDominic Spill dissector_handle_t btsm_handle;
227*e018180dSDominic Spill
228*e018180dSDominic Spill btsm_handle = find_dissector("btsm");
229*e018180dSDominic Spill dissector_add_uint("btl2cap.cid", BTL2CAP_FIXED_CID_BTSM, btsm_handle);
230*e018180dSDominic Spill }
231*e018180dSDominic Spill
232*e018180dSDominic Spill /* register the protocol with Wireshark */
233*e018180dSDominic Spill void
proto_register_btsm(void)234*e018180dSDominic Spill proto_register_btsm(void)
235*e018180dSDominic Spill {
236*e018180dSDominic Spill
237*e018180dSDominic Spill /* list of fields */
238*e018180dSDominic Spill static hf_register_info hf[] = {
239*e018180dSDominic Spill { &hf_btsm_command,
240*e018180dSDominic Spill { "Command", "btsm.command",
241*e018180dSDominic Spill FT_UINT8, BASE_HEX, VALS(commands), 0x0,
242*e018180dSDominic Spill NULL, HFILL }
243*e018180dSDominic Spill },
244*e018180dSDominic Spill
245*e018180dSDominic Spill // pairing request
246*e018180dSDominic Spill { &hf_btsm_pairing_request_io_capability,
247*e018180dSDominic Spill { "IO Capability", "btsm.pairing_request.io_capability",
248*e018180dSDominic Spill FT_UINT8, BASE_HEX, VALS(io_capability), 0x0,
249*e018180dSDominic Spill NULL, HFILL }
250*e018180dSDominic Spill },
251*e018180dSDominic Spill { &hf_btsm_pairing_request_oob_data,
252*e018180dSDominic Spill { "OOB Data", "btsm.pairing_request.oob_data",
253*e018180dSDominic Spill FT_UINT8, BASE_HEX, VALS(oob_data), 0x0,
254*e018180dSDominic Spill NULL, HFILL }
255*e018180dSDominic Spill },
256*e018180dSDominic Spill { &hf_btsm_pairing_request_auth_req,
257*e018180dSDominic Spill { "AuthReq", "btsm.pairing_request.auth_req",
258*e018180dSDominic Spill FT_UINT8, BASE_HEX, NULL, 0x0,
259*e018180dSDominic Spill NULL, HFILL }
260*e018180dSDominic Spill },
261*e018180dSDominic Spill { &hf_btsm_pairing_request_reserved,
262*e018180dSDominic Spill { "Reserved", "btsm.pairing_request.auth_req.reserved",
263*e018180dSDominic Spill FT_UINT8, BASE_HEX, NULL, 0xf8,
264*e018180dSDominic Spill NULL, HFILL }
265*e018180dSDominic Spill },
266*e018180dSDominic Spill { &hf_btsm_pairing_request_mitm,
267*e018180dSDominic Spill { "MITM Protection", "btsm.pairing_request.auth_req.mitm",
268*e018180dSDominic Spill FT_BOOLEAN, BASE_NONE, TFS(&tfs_yes_no), 0x0,
269*e018180dSDominic Spill NULL, HFILL }
270*e018180dSDominic Spill },
271*e018180dSDominic Spill { &hf_btsm_pairing_request_bonding_flags,
272*e018180dSDominic Spill { "Bonding Flags", "btsm.pairing_request.auth_req.bonding_flags",
273*e018180dSDominic Spill FT_UINT8, BASE_HEX, VALS(bonding_flags), 0x3,
274*e018180dSDominic Spill NULL, HFILL }
275*e018180dSDominic Spill },
276*e018180dSDominic Spill { &hf_btsm_pairing_request_max_key_size,
277*e018180dSDominic Spill { "Max Key Size", "btsm.pairing_request.max_key_size",
278*e018180dSDominic Spill FT_UINT8, BASE_DEC, NULL, 0x0,
279*e018180dSDominic Spill NULL, HFILL }
280*e018180dSDominic Spill },
281*e018180dSDominic Spill { &hf_btsm_pairing_request_initiator_key_distribution,
282*e018180dSDominic Spill { "Initiator Key Distribution", "btsm.pairing_request.initiator_key_distribution",
283*e018180dSDominic Spill FT_UINT8, BASE_DEC, NULL, 0x0,
284*e018180dSDominic Spill NULL, HFILL }
285*e018180dSDominic Spill },
286*e018180dSDominic Spill { &hf_btsm_pairing_request_responder_key_distribution,
287*e018180dSDominic Spill { "Responder Key Distribution", "btsm.pairing_request.responder_key_distribution",
288*e018180dSDominic Spill FT_UINT8, BASE_DEC, NULL, 0x0,
289*e018180dSDominic Spill NULL, HFILL }
290*e018180dSDominic Spill },
291*e018180dSDominic Spill
292*e018180dSDominic Spill // pairing response
293*e018180dSDominic Spill { &hf_btsm_pairing_response_io_capability,
294*e018180dSDominic Spill { "IO Capability", "btsm.pairing_response.io_capability",
295*e018180dSDominic Spill FT_UINT8, BASE_HEX, VALS(io_capability), 0x0,
296*e018180dSDominic Spill NULL, HFILL }
297*e018180dSDominic Spill },
298*e018180dSDominic Spill { &hf_btsm_pairing_response_oob_data,
299*e018180dSDominic Spill { "OOB Data", "btsm.pairing_response.oob_data",
300*e018180dSDominic Spill FT_UINT8, BASE_HEX, VALS(oob_data), 0x0,
301*e018180dSDominic Spill NULL, HFILL }
302*e018180dSDominic Spill },
303*e018180dSDominic Spill { &hf_btsm_pairing_response_auth_req,
304*e018180dSDominic Spill { "AuthReq", "btsm.pairing_response.auth_req",
305*e018180dSDominic Spill FT_UINT8, BASE_HEX, NULL, 0x0,
306*e018180dSDominic Spill NULL, HFILL }
307*e018180dSDominic Spill },
308*e018180dSDominic Spill { &hf_btsm_pairing_response_reserved,
309*e018180dSDominic Spill { "Reserved", "btsm.pairing_response.auth_req.reserved",
310*e018180dSDominic Spill FT_UINT8, BASE_HEX, NULL, 0xf8,
311*e018180dSDominic Spill NULL, HFILL }
312*e018180dSDominic Spill },
313*e018180dSDominic Spill { &hf_btsm_pairing_response_mitm,
314*e018180dSDominic Spill { "MITM Protection", "btsm.pairing_response.auth_req.mitm",
315*e018180dSDominic Spill FT_BOOLEAN, BASE_NONE, TFS(&tfs_yes_no), 0x0,
316*e018180dSDominic Spill NULL, HFILL }
317*e018180dSDominic Spill },
318*e018180dSDominic Spill { &hf_btsm_pairing_response_bonding_flags,
319*e018180dSDominic Spill { "Bonding Flags", "btsm.pairing_response.auth_req.bonding_flags",
320*e018180dSDominic Spill FT_UINT8, BASE_HEX, VALS(bonding_flags), 0x3,
321*e018180dSDominic Spill NULL, HFILL }
322*e018180dSDominic Spill },
323*e018180dSDominic Spill { &hf_btsm_pairing_response_max_key_size,
324*e018180dSDominic Spill { "Max Key Size", "btsm.pairing_response.max_key_size",
325*e018180dSDominic Spill FT_UINT8, BASE_DEC, NULL, 0x0,
326*e018180dSDominic Spill NULL, HFILL }
327*e018180dSDominic Spill },
328*e018180dSDominic Spill { &hf_btsm_pairing_response_initiator_key_distribution,
329*e018180dSDominic Spill { "Initiator Key Distribution", "btsm.pairing_response.initiator_key_distribution",
330*e018180dSDominic Spill FT_UINT8, BASE_DEC, NULL, 0x0,
331*e018180dSDominic Spill NULL, HFILL }
332*e018180dSDominic Spill },
333*e018180dSDominic Spill { &hf_btsm_pairing_response_responder_key_distribution,
334*e018180dSDominic Spill { "Responder Key Distribution", "btsm.pairing_response.responder_key_distribution",
335*e018180dSDominic Spill FT_UINT8, BASE_DEC, NULL, 0x0,
336*e018180dSDominic Spill NULL, HFILL }
337*e018180dSDominic Spill },
338*e018180dSDominic Spill
339*e018180dSDominic Spill
340*e018180dSDominic Spill // pairing confirm
341*e018180dSDominic Spill { &hf_btsm_pairing_confirm_confirm,
342*e018180dSDominic Spill { "Confirm", "btsm.pairing_confirm.confirm",
343*e018180dSDominic Spill FT_BYTES, BASE_NONE, NULL, 0x0,
344*e018180dSDominic Spill NULL, HFILL }
345*e018180dSDominic Spill },
346*e018180dSDominic Spill
347*e018180dSDominic Spill // pairing random
348*e018180dSDominic Spill { &hf_btsm_pairing_random_random,
349*e018180dSDominic Spill { "Random", "btsm.pairing_random.random",
350*e018180dSDominic Spill FT_BYTES, BASE_NONE, NULL, 0x0,
351*e018180dSDominic Spill NULL, HFILL }
352*e018180dSDominic Spill },
353*e018180dSDominic Spill
354*e018180dSDominic Spill // encryption info LTK
355*e018180dSDominic Spill { &hf_btsm_encryption_info_ltk,
356*e018180dSDominic Spill { "LTK", "btsm.encryption_info.ltk",
357*e018180dSDominic Spill FT_BYTES, BASE_NONE, NULL, 0x0,
358*e018180dSDominic Spill NULL, HFILL }
359*e018180dSDominic Spill },
360*e018180dSDominic Spill
361*e018180dSDominic Spill };
362*e018180dSDominic Spill
363*e018180dSDominic Spill /* protocol subtree arrays */
364*e018180dSDominic Spill static gint *ett[] = {
365*e018180dSDominic Spill &ett_btsm,
366*e018180dSDominic Spill &ett_auth_req,
367*e018180dSDominic Spill };
368*e018180dSDominic Spill
369*e018180dSDominic Spill /* register the protocol name and description */
370*e018180dSDominic Spill proto_btsm = proto_register_protocol(
371*e018180dSDominic Spill "Bluetooth Low Energy Security Manager", /* full name */
372*e018180dSDominic Spill "BTSM", /* short name */
373*e018180dSDominic Spill "btsm" /* abbreviation (e.g. for filters) */
374*e018180dSDominic Spill );
375*e018180dSDominic Spill
376*e018180dSDominic Spill register_dissector("btsm", dissect_btsm, proto_btsm);
377*e018180dSDominic Spill
378*e018180dSDominic Spill /* register the header fields and subtrees used */
379*e018180dSDominic Spill proto_register_field_array(proto_btsm, hf, array_length(hf));
380*e018180dSDominic Spill proto_register_subtree_array(ett, array_length(ett));
381*e018180dSDominic Spill }
382