aboutsummaryrefslogtreecommitdiff
path: root/src/lib/protocols/openflow.c
diff options
context:
space:
mode:
authorVladimir Gavrilov <105977161+0xA50C1A1@users.noreply.github.com>2023-12-20 12:48:45 +0300
committerGitHub <noreply@github.com>2023-12-20 10:48:45 +0100
commit33f11cb10f0bc598fc8e3d97d25bab87078aa294 (patch)
tree65f8a0a140af5a71b7ed7542c050e459a92ff3b3 /src/lib/protocols/openflow.c
parent8aa09f9c994bd234e17b4f4ad8b6808e2561c4d6 (diff)
Add OpenFlow protocol dissector (#2222)
Diffstat (limited to 'src/lib/protocols/openflow.c')
-rw-r--r--src/lib/protocols/openflow.c70
1 files changed, 70 insertions, 0 deletions
diff --git a/src/lib/protocols/openflow.c b/src/lib/protocols/openflow.c
new file mode 100644
index 000000000..8eb4d0599
--- /dev/null
+++ b/src/lib/protocols/openflow.c
@@ -0,0 +1,70 @@
+/*
+ * openflow.c
+ *
+ * Copyright (C) 2023 - ntop.org
+ * Copyright (C) 2023 - V.G <jacendi@protonmail.com>
+ *
+ * This file is part of nDPI, an open source deep packet inspection
+ * library based on the OpenDPI and PACE technology by ipoque GmbH
+ *
+ * nDPI is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * nDPI is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with nDPI. If not, see <http://www.gnu.org/licenses/>.
+ *
+ */
+
+#include "ndpi_protocol_ids.h"
+
+#define NDPI_CURRENT_PROTO NDPI_PROTOCOL_OPENFLOW
+
+#include "ndpi_api.h"
+#include "ndpi_private.h"
+
+static void ndpi_int_openflow_add_connection(struct ndpi_detection_module_struct *ndpi_struct,
+ struct ndpi_flow_struct *flow)
+{
+ NDPI_LOG_INFO(ndpi_struct, "found OpenFlow\n");
+ ndpi_set_detected_protocol(ndpi_struct, flow,
+ NDPI_PROTOCOL_OPENFLOW, NDPI_PROTOCOL_UNKNOWN,
+ NDPI_CONFIDENCE_DPI);
+}
+
+static void ndpi_search_openflow(struct ndpi_detection_module_struct *ndpi_struct,
+ struct ndpi_flow_struct *flow)
+{
+ struct ndpi_packet_struct const * const packet = &ndpi_struct->packet;
+
+ NDPI_LOG_DBG(ndpi_struct, "search OpenFlow\n");
+
+ if (packet->payload_packet_len >= 8 &&
+ packet->payload[0] == 0x06 && packet->payload[1] < 36 &&
+ packet->payload_packet_len == ntohs(get_u_int16_t(packet->payload, 2)))
+ {
+ ndpi_int_openflow_add_connection(ndpi_struct, flow);
+ return;
+ }
+
+ NDPI_EXCLUDE_PROTO(ndpi_struct, flow);
+}
+
+void init_openflow_dissector(struct ndpi_detection_module_struct *ndpi_struct, u_int32_t *id)
+{
+ ndpi_set_bitmask_protocol_detection("OpenFlow", ndpi_struct, *id,
+ NDPI_PROTOCOL_OPENFLOW,
+ ndpi_search_openflow,
+ NDPI_SELECTION_BITMASK_PROTOCOL_V4_V6_TCP_WITH_PAYLOAD_WITHOUT_RETRANSMISSION,
+ SAVE_DETECTION_BITMASK_AS_UNKNOWN,
+ ADD_TO_DETECTION_BITMASK);
+
+ *id += 1;
+}
+