1 /* packet-reload-framing.c
2 * Routines for REsource LOcation And Discovery (RELOAD) Framing
3 * Author: Stephane Bryant <sbryant@glycon.org>
4 * Copyright 2010 Stonyfish Inc.
5 *
6 * Wireshark - Network traffic analyzer
7 * By Gerald Combs <gerald@wireshark.org>
8 * Copyright 1998 Gerald Combs
9 *
10 * SPDX-License-Identifier: GPL-2.0-or-later
11 *
12 * Please refer to the following specs for protocol detail:
13 * - draft-ietf-p2psip-base-15
14 * - RFC 6940 (does this incorporate all changes between
15 * draft-ietf-p2psip-base-15 and RFC 6940, if any?)
16 */
17
18 #include "config.h"
19
20 #include <epan/packet.h>
21 #include <epan/expert.h>
22 #include <epan/tap.h>
23 #include <epan/exported_pdu.h>
24 #include "packet-tcp.h"
25
26 void proto_register_reload_framing(void);
27 void proto_reg_handoff_reload_framing(void);
28
29 /* Initialize the protocol and registered fields */
30 static int proto_reload_framing = -1;
31
32 static int hf_reload_framing_type = -1;
33 static int hf_reload_framing_sequence = -1;
34 static int hf_reload_framing_ack_sequence = -1;
35 static int hf_reload_framing_message = -1;
36 static int hf_reload_framing_message_length = -1;
37 static int hf_reload_framing_message_data = -1;
38 static int hf_reload_framing_received = -1;
39 static int hf_reload_framing_parsed_received = -1;
40 static int hf_reload_framing_duplicate = -1;
41 static int hf_reload_framing_response_in = -1;
42 static int hf_reload_framing_response_to = -1;
43 static int hf_reload_framing_time = -1;
44
45 static dissector_handle_t reload_handle;
46
47 static gint exported_pdu_tap = -1;
48
49 /* Structure containing transaction specific information */
50 typedef struct _reload_frame_t {
51 guint32 data_frame;
52 guint32 ack_frame;
53 nstime_t req_time;
54 } reload_frame_t;
55
56 /* Structure containing conversation specific information */
57 typedef struct _reload_frame_conv_info_t {
58 wmem_tree_t *transaction_pdus;
59 } reload_conv_info_t;
60
61
62 /* RELOAD Message classes = (message_code & 0x1) (response = request +1) */
63 #define DATA 128
64 #define ACK 129
65
66
67 /* Initialize the subtree pointers */
68 static gint ett_reload_framing = -1;
69 static gint ett_reload_framing_message = -1;
70 static gint ett_reload_framing_received = -1;
71
72 static expert_field ei_reload_no_dissector = EI_INIT;
73
74 #define UDP_PORT_RELOAD 6084
75 #define TCP_PORT_RELOAD 6084
76
77 #define MIN_HDR_LENGTH 9
78 #define MIN_RELOADDATA_HDR_LENGTH 38
79
80 #define RELOAD_TOKEN 0xd2454c4f
81
82 static const value_string types[] = {
83 {DATA, "DATA"},
84 {ACK, "ACK"},
85 {0x00, NULL}
86 };
87
88 static guint
get_reload_framing_message_length(packet_info * pinfo _U_,tvbuff_t * tvb,int offset,void * data _U_)89 get_reload_framing_message_length(packet_info *pinfo _U_, tvbuff_t *tvb,
90 int offset, void *data _U_)
91 {
92 /* Get the type */
93 guint32 length = 9;
94
95
96 if (tvb_get_guint8(tvb, offset) == DATA) {
97 length = 1 + 4 + 3 + tvb_get_ntoh24(tvb, 1 + 4);
98 }
99
100 return length;
101 }
102
103
104 static int
dissect_reload_framing_message(tvbuff_t * tvb,packet_info * pinfo,proto_tree * tree,gboolean from_dtls)105 dissect_reload_framing_message(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gboolean from_dtls)
106 {
107 proto_item *ti;
108 proto_tree *reload_framing_tree;
109 guint32 relo_token;
110 guint32 message_length = 0;
111 wmem_tree_key_t transaction_id_key[4];
112 guint32 *key_save, len_save;
113 guint32 sequence;
114 guint effective_length;
115 guint16 offset;
116 conversation_t *conversation;
117 reload_conv_info_t *reload_framing_info = NULL;
118 reload_frame_t * reload_frame;
119 guint8 type;
120
121 offset = 0;
122 effective_length = tvb_captured_length(tvb);
123
124 /* First, make sure we have enough data to do the check. */
125 if (effective_length < MIN_HDR_LENGTH)
126 return 0;
127
128 conversation = find_conversation_pinfo(pinfo, 0);
129 if (conversation)
130 reload_framing_info = (reload_conv_info_t *)conversation_get_proto_data(conversation, proto_reload_framing);
131
132 /* Get the type
133 * https://tools.ietf.org/html/draft-ietf-p2psip-base-12
134 * 5.6.2. Framing Header
135 */
136 type = tvb_get_guint8(tvb, 0);
137
138 switch(type) {
139 case DATA:
140 /* in the data type, check the reload token to be sure this
141 * is a reLoad packet
142 */
143 if (effective_length < 12) /* [type + seq + length + token] */
144 return 0;
145
146 relo_token = tvb_get_ntohl(tvb,1 + 4 + 3);
147 if (relo_token != RELOAD_TOKEN) {
148 return 0;
149 }
150 message_length = tvb_get_ntoh24(tvb, 1 + 4);
151 if (message_length < MIN_RELOADDATA_HDR_LENGTH) {
152 return 0;
153 }
154 break;
155 case ACK:
156 /* Require previous ACK (i.e., reload_framing_info attached to conversation). */
157 if (effective_length < 9 || ! reload_framing_info) {
158 return 0;
159 }
160 break;
161 default:
162 return 0;
163 }
164
165 if (from_dtls && have_tap_listener(exported_pdu_tap)) {
166 exp_pdu_data_t *exp_pdu_data = export_pdu_create_common_tags(pinfo, "reload-framing", EXP_PDU_TAG_PROTO_NAME);
167
168 exp_pdu_data->tvb_captured_length = effective_length;
169 exp_pdu_data->tvb_reported_length = tvb_reported_length(tvb);
170 exp_pdu_data->pdu_tvb = tvb;
171
172 tap_queue_packet(exported_pdu_tap, pinfo, exp_pdu_data);
173 }
174
175 /* The message seems to be a valid RELOAD framing message! */
176
177 col_set_str(pinfo->cinfo, COL_PROTOCOL, "RELOAD Frame");
178 col_clear(pinfo->cinfo, COL_INFO);
179
180 /* Create the transaction key which may be used to track the conversation */
181
182 sequence = tvb_get_ntohl(tvb, 1);
183 transaction_id_key[0].length = 1;
184 transaction_id_key[0].key = &sequence; /* sequence number */
185
186 /* When the wmem_tree_* functions iterate through the keys, they
187 * perform pointer arithmetic with guint32s, so we have to divide
188 * our length fields by that to make things work, but we still want
189 * to g_malloc and memcpy the entire amounts, since those both operate
190 * in raw bytes. */
191 if (type==DATA) {
192 transaction_id_key[1].length = 1;
193 transaction_id_key[1].key = &pinfo->srcport;
194 transaction_id_key[2].length = (pinfo->src.len) / (guint)sizeof(guint32);
195 transaction_id_key[2].key = (guint32 *)g_malloc(pinfo->src.len);
196 memcpy(transaction_id_key[2].key, pinfo->src.data, pinfo->src.len);
197 }
198 else {
199 transaction_id_key[1].length = 1;
200 transaction_id_key[1].key = &pinfo->destport;
201 transaction_id_key[2].length = (pinfo->dst.len) / (guint)sizeof(guint32);
202 transaction_id_key[2].key = (guint32 *)g_malloc(pinfo->dst.len);
203 memcpy(transaction_id_key[2].key, pinfo->dst.data, pinfo->dst.len);
204 }
205 transaction_id_key[3].length=0;
206 transaction_id_key[3].key=NULL;
207 /* The tree functions are destructive to this part of the key, so save the
208 * proper values here and restore them after each call. */
209 key_save = transaction_id_key[2].key;
210 len_save = transaction_id_key[2].length;
211
212 if (!conversation) {
213 conversation = conversation_new(pinfo->num, &pinfo->src, &pinfo->dst,
214 conversation_pt_to_endpoint_type(pinfo->ptype), pinfo->srcport, pinfo->destport, 0);
215 }
216
217 /*
218 * Do we already have a state structure for this conv
219 */
220 if (!reload_framing_info) {
221 /* No. Attach that information to the conversation, and add
222 * it to the list of information structures.
223 */
224 reload_framing_info = wmem_new(wmem_file_scope(), reload_conv_info_t);
225 reload_framing_info->transaction_pdus = wmem_tree_new(wmem_file_scope());
226 conversation_add_proto_data(conversation, proto_reload_framing, reload_framing_info);
227 }
228
229 if (!pinfo->fd->visited) {
230 if ((reload_frame = (reload_frame_t *)
231 wmem_tree_lookup32_array(reload_framing_info->transaction_pdus, transaction_id_key)) == NULL) {
232 transaction_id_key[2].key = key_save;
233 transaction_id_key[2].length = len_save;
234 reload_frame = wmem_new(wmem_file_scope(), reload_frame_t);
235 reload_frame->data_frame = 0;
236 reload_frame->ack_frame = 0;
237 reload_frame->req_time = pinfo->abs_ts;
238 wmem_tree_insert32_array(reload_framing_info->transaction_pdus, transaction_id_key, (void *)reload_frame);
239 }
240 transaction_id_key[2].key = key_save;
241 transaction_id_key[2].length = len_save;
242
243 /* check whether the message is a request or a response */
244
245 if (type == DATA) {
246 /* This is a data */
247 if (reload_frame->data_frame == 0) {
248 reload_frame->data_frame = pinfo->num;
249 }
250 }
251 else {
252 /* This is a catch-all for all non-request messages */
253 if (reload_frame->ack_frame == 0) {
254 reload_frame->ack_frame = pinfo->num;
255 }
256 }
257 }
258 else {
259 reload_frame=(reload_frame_t *)wmem_tree_lookup32_array(reload_framing_info->transaction_pdus, transaction_id_key);
260 transaction_id_key[2].key = key_save;
261 transaction_id_key[2].length = len_save;
262 }
263 g_free(transaction_id_key[2].key);
264
265 if (!reload_frame) {
266 /* create a "fake" pana_trans structure */
267 reload_frame = wmem_new(pinfo->pool, reload_frame_t);
268 reload_frame->data_frame = (type==DATA) ? pinfo->num : 0;
269 reload_frame->ack_frame = (type!=DATA) ? pinfo->num : 0;
270 reload_frame->req_time = pinfo->abs_ts;
271 }
272
273 ti = proto_tree_add_item(tree, proto_reload_framing, tvb, 0, -1, ENC_NA);
274
275 reload_framing_tree = proto_item_add_subtree(ti, ett_reload_framing);
276
277 col_add_fstr(pinfo->cinfo, COL_INFO, "%s", val_to_str_const(type, types, "Unknown"));
278 proto_item_append_text(ti, ": %s", val_to_str_const(type, types, "Unknown"));
279
280 /* Retransmission control */
281 if (type == DATA) {
282 if (reload_frame->data_frame != pinfo->num) {
283 proto_item *it;
284 it = proto_tree_add_uint(reload_framing_tree, hf_reload_framing_duplicate, tvb, 0, 0, reload_frame->data_frame);
285 proto_item_set_generated(it);
286 }
287 if (reload_frame->ack_frame) {
288 proto_item *it;
289 it = proto_tree_add_uint(reload_framing_tree, hf_reload_framing_response_in, tvb, 0, 0, reload_frame->ack_frame);
290 proto_item_set_generated(it);
291 }
292 }
293 else {
294 /* This is a response */
295 if (reload_frame->ack_frame != pinfo->num) {
296 proto_item *it;
297 it = proto_tree_add_uint(reload_framing_tree, hf_reload_framing_duplicate, tvb, 0, 0, reload_frame->ack_frame);
298 proto_item_set_generated(it);
299 }
300
301 if (reload_frame->data_frame) {
302 proto_item *it;
303 nstime_t ns;
304
305 it = proto_tree_add_uint(reload_framing_tree, hf_reload_framing_response_to, tvb, 0, 0, reload_frame->data_frame);
306 proto_item_set_generated(it);
307
308 nstime_delta(&ns, &pinfo->abs_ts, &reload_frame->req_time);
309 it = proto_tree_add_time(reload_framing_tree, hf_reload_framing_time, tvb, 0, 0, &ns);
310 proto_item_set_generated(it);
311 }
312 }
313
314 /*
315 * Message dissection
316 */
317 proto_tree_add_item(reload_framing_tree, hf_reload_framing_type, tvb, offset , 1, ENC_BIG_ENDIAN);
318 offset += 1;
319 switch (type) {
320
321 case DATA:
322 {
323 tvbuff_t *next_tvb;
324 proto_item *ti_message;
325 proto_tree *message_tree;
326
327 proto_tree_add_item(reload_framing_tree, hf_reload_framing_sequence, tvb, offset , 4, ENC_BIG_ENDIAN);
328 offset += 4;
329 ti_message = proto_tree_add_item(reload_framing_tree, hf_reload_framing_message, tvb, offset, 3+message_length, ENC_NA);
330 proto_item_append_text(ti_message, " (opaque<%d>)", message_length);
331 message_tree = proto_item_add_subtree(ti_message, ett_reload_framing_message);
332 proto_tree_add_item(message_tree, hf_reload_framing_message_length, tvb, offset, 3, ENC_BIG_ENDIAN);
333 offset += 3;
334 proto_tree_add_item(message_tree, hf_reload_framing_message_data, tvb, offset, message_length, ENC_NA);
335 next_tvb = tvb_new_subset_length_caplen(tvb, offset, effective_length - offset, message_length);
336 if (reload_handle == NULL) {
337 expert_add_info(pinfo, ti, &ei_reload_no_dissector);
338 return tvb_captured_length(tvb);
339 }
340 call_dissector_only(reload_handle, next_tvb, pinfo, tree, NULL);
341 }
342 break;
343
344 case ACK:
345 {
346 proto_item *ti_received;
347
348 proto_tree_add_uint(reload_framing_tree, hf_reload_framing_ack_sequence, tvb, offset , 4, sequence);
349 offset += 4;
350
351 ti_received = proto_tree_add_item(reload_framing_tree, hf_reload_framing_received, tvb, offset , 4, ENC_BIG_ENDIAN);
352 {
353 guint32 received;
354 int last_received = -1;
355 unsigned int indx = 0;
356 proto_tree *received_tree;
357 proto_item *ti_parsed_received = NULL;
358
359 received = tvb_get_ntohl(tvb, offset);
360 while ((indx<32) && (received<<indx) != 0) {
361 if (received &(1U<<(31-indx))) {
362 if (indx==0) {
363 received_tree = proto_item_add_subtree(ti_received, ett_reload_framing_received);
364 ti_parsed_received = proto_tree_add_item(received_tree, hf_reload_framing_parsed_received, tvb, offset, 4, ENC_NA);
365 proto_item_append_text(ti_parsed_received, "[%u", (sequence -32+indx));
366 last_received = indx;
367 }
368 else {
369 if (received &(1U<<(31-indx+1))) {
370 indx++;
371 /* the previous one is also acked: in the middle of a range: skip */
372 continue;
373 }
374 else {
375 /* 1st acked in a series */
376 if (last_received<0) {
377 /* 1st acked ever */
378 received_tree = proto_item_add_subtree(ti_received, ett_reload_framing_received);
379 ti_parsed_received = proto_tree_add_item(received_tree, hf_reload_framing_parsed_received, tvb, offset, 4, ENC_NA);
380 proto_item_append_text(ti_parsed_received, "[%u",(sequence-32+indx));
381 }
382 else {
383 proto_item_append_text(ti_parsed_received, ",%u",(sequence-32+indx));
384 }
385 last_received = indx;
386
387 }
388 }
389 }
390 else if (indx>0) {
391 if ((indx>1) && (received &(1U<<(31-indx+1))) && (received &(1U<<(31-indx+2)))) {
392 /* end of a series */
393 if ((indx>2) && (received &(1U<<(31-indx+3)))) {
394 proto_item_append_text(ti_parsed_received,"-%u",(sequence-32+indx-1));
395 }
396 else {
397 /* just a pair */
398 proto_item_append_text(ti_received, ",%u", (sequence-32+indx-1));
399 }
400 }
401 else {
402 indx++;
403 continue;
404 }
405 }
406 indx++;
407 }
408 if (last_received>=0) {
409 if ((indx>1) && (received &(1U<<(31-indx+1))) && (received &(1U<<(31-indx+2)))) {
410 /* end of a series */
411 if ((indx>2) && (received &(1U<<(31-indx+3)))) {
412 proto_item_append_text(ti_parsed_received,"-%u",(sequence-32+indx-1));
413 }
414 else {
415 /* just a pair */
416 proto_item_append_text(ti_parsed_received, ",%u", (sequence-32+indx-1));
417 }
418 }
419 proto_item_append_text(ti_parsed_received, "]");
420 proto_item_set_generated(ti_parsed_received);
421 }
422 }
423 }
424 break;
425
426 default:
427 DISSECTOR_ASSERT_NOT_REACHED();
428 }
429
430 return tvb_captured_length(tvb);
431 }
432
433 static int
dissect_reload_framing(tvbuff_t * tvb,packet_info * pinfo,proto_tree * tree,void * data _U_)434 dissect_reload_framing(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
435 {
436 return dissect_reload_framing_message(tvb, pinfo, tree, FALSE);
437 }
438
439 static int
dissect_reload_framing_tcp(tvbuff_t * tvb,packet_info * pinfo,proto_tree * tree,void * data)440 dissect_reload_framing_tcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data)
441 {
442 /* XXX: Check if we have a valid RELOAD Frame Type ? */
443 tcp_dissect_pdus(tvb, pinfo, tree, TRUE, MIN_HDR_LENGTH,
444 get_reload_framing_message_length, dissect_reload_framing, data);
445 return tvb_captured_length(tvb);
446 }
447
448 /* ToDo: If a TCP connection is identified heuristically as reload-framing, then
449 * the code should be such that reload-framing PDUs can be re-assembled (as is
450 * done for a TCP connection identified as reload-framing because of
451 * the TCP port used).
452 */
453 static gboolean
dissect_reload_framing_heur(tvbuff_t * tvb,packet_info * pinfo,proto_tree * tree,void * data _U_)454 dissect_reload_framing_heur(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
455 {
456 if (dissect_reload_framing_message(tvb, pinfo, tree, FALSE) == 0) {
457 /*
458 * It wasn't a valid RELOAD message, and wasn't
459 * dissected as such.
460 */
461 return FALSE;
462 }
463 return TRUE;
464 }
465
466 static gboolean
dissect_reload_framing_heur_dtls(tvbuff_t * tvb,packet_info * pinfo,proto_tree * tree,void * data _U_)467 dissect_reload_framing_heur_dtls(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
468 {
469 if (dissect_reload_framing_message(tvb, pinfo, tree, TRUE) == 0) {
470 /*
471 * It wasn't a valid RELOAD message, and wasn't
472 * dissected as such.
473 */
474 return FALSE;
475 }
476 return TRUE;
477 }
478
479 void
proto_register_reload_framing(void)480 proto_register_reload_framing(void)
481 {
482
483 static hf_register_info hf[] = {
484 { &hf_reload_framing_type,
485 { "type (FramedMessageType)", "reload_framing.type", FT_UINT8,
486 BASE_DEC, VALS(types), 0x0, NULL, HFILL
487 }
488 },
489 { &hf_reload_framing_sequence,
490 { "sequence (uint32)", "reload_framing.sequence", FT_UINT32,
491 BASE_DEC, NULL, 0x0, NULL, HFILL
492 }
493 },
494 { &hf_reload_framing_ack_sequence,
495 { "ack_sequence (uint32)", "reload_framing.ack_sequence", FT_UINT32,
496 BASE_DEC, NULL, 0x0, NULL, HFILL
497 }
498 },
499 { &hf_reload_framing_message,
500 { "message", "reload_framing.message", FT_NONE,
501 BASE_NONE, NULL, 0x0, NULL, HFILL
502 }
503 },
504 { &hf_reload_framing_message_length,
505 { "length (uint24)", "reload_framing.message.length", FT_UINT32,
506 BASE_DEC, NULL, 0x0, NULL, HFILL
507 }
508 },
509 { &hf_reload_framing_message_data,
510 { "data", "reload_framing.message.data", FT_BYTES,
511 BASE_NONE, NULL, 0x0, NULL, HFILL
512 }
513 },
514 { &hf_reload_framing_received,
515 { "received (uint32)", "reload_framing.received", FT_UINT32,
516 BASE_HEX, NULL, 0x0, NULL, HFILL
517 }
518 },
519 { &hf_reload_framing_parsed_received,
520 { "Acked Frames:", "reload_framing.parsed_received", FT_NONE,
521 BASE_NONE, NULL, 0x0, NULL, HFILL
522 }
523 },
524 { &hf_reload_framing_response_in,
525 { "Response In", "reload_framing.response-in", FT_FRAMENUM,
526 BASE_NONE, NULL, 0x0, "The response to this RELOAD Request is in this frame", HFILL
527 }
528 },
529 { &hf_reload_framing_response_to,
530 { "Request In", "reload_framing.response-to", FT_FRAMENUM,
531 BASE_NONE, NULL, 0x0, "This is a response to the RELOAD Request in this frame", HFILL
532 }
533 },
534 { &hf_reload_framing_time,
535 { "Time", "reload_framing.time", FT_RELATIVE_TIME,
536 BASE_NONE, NULL, 0x0, "The time between the Request and the Response", HFILL
537 }
538 },
539 { &hf_reload_framing_duplicate,
540 { "Duplicated original message in", "reload_framing.duplicate", FT_FRAMENUM,
541 BASE_NONE, NULL, 0x0, "This is a duplicate of RELOAD message in this frame", HFILL
542 }
543 },
544 };
545
546 /* Setup protocol subtree array */
547 static gint *ett[] = {
548 &ett_reload_framing,
549 &ett_reload_framing_message,
550 &ett_reload_framing_received,
551 };
552
553 static ei_register_info ei[] = {
554 { &ei_reload_no_dissector, { "reload_framing.no_dissector", PI_PROTOCOL, PI_WARN, "Can not find reload dissector", EXPFILL }},
555 };
556
557 expert_module_t* expert_reload_framing;
558
559 /* Register the protocol name and description */
560 proto_reload_framing = proto_register_protocol("REsource LOcation And Discovery Framing", "RELOAD FRAMING", "reload-framing");
561
562 /* Required function calls to register the header fields and subtrees used */
563 proto_register_field_array(proto_reload_framing, hf, array_length(hf));
564 proto_register_subtree_array(ett, array_length(ett));
565 expert_reload_framing = expert_register_protocol(proto_reload_framing);
566 expert_register_field_array(expert_reload_framing, ei, array_length(ei));
567
568 register_dissector("reload-framing", dissect_reload_framing, proto_reload_framing);
569
570 }
571
572 void
proto_reg_handoff_reload_framing(void)573 proto_reg_handoff_reload_framing(void)
574 {
575
576 dissector_handle_t reload_framing_tcp_handle;
577 dissector_handle_t reload_framing_udp_handle;
578
579 reload_framing_tcp_handle = create_dissector_handle(dissect_reload_framing_tcp, proto_reload_framing);
580 reload_framing_udp_handle = create_dissector_handle(dissect_reload_framing, proto_reload_framing);
581
582 reload_handle = find_dissector_add_dependency("reload", proto_reload_framing);
583
584 dissector_add_uint_with_preference("tcp.port", TCP_PORT_RELOAD, reload_framing_tcp_handle);
585 dissector_add_uint_with_preference("udp.port", UDP_PORT_RELOAD, reload_framing_udp_handle);
586
587 heur_dissector_add("udp", dissect_reload_framing_heur, "RELOAD Framing over UDP", "reload_framing_udp", proto_reload_framing, HEURISTIC_ENABLE);
588 heur_dissector_add("tcp", dissect_reload_framing_heur, "RELOAD Framing over TCP", "reload_framing_tcp", proto_reload_framing, HEURISTIC_ENABLE);
589 heur_dissector_add("dtls", dissect_reload_framing_heur_dtls, "RELOAD Framing over DTLS", "reload_framing_dtls", proto_reload_framing, HEURISTIC_ENABLE);
590
591 exported_pdu_tap = find_tap_id(EXPORT_PDU_TAP_NAME_LAYER_7);
592 }
593
594 /*
595 * Editor modelines - https://www.wireshark.org/tools/modelines.html
596 *
597 * Local variables:
598 * c-basic-offset: 2
599 * tab-width: 8
600 * indent-tabs-mode: nil
601 * End:
602 *
603 * vi: set shiftwidth=2 tabstop=8 expandtab:
604 * :indentSize=2:tabSize=8:noTabs=true:
605 */
606