Wireshark
4.5.0
The Wireshark network protocol analyzer
Loading...
Searching...
No Matches
epan
dissectors
packet-ansi_tcap.h
1
/* Do not modify this file. Changes will be overwritten. */
2
/* Generated automatically by the ASN.1 to Wireshark dissector compiler */
3
/* packet-ansi_tcap.h */
4
/* asn2wrs.py -b -q -L -p ansi_tcap -c ./ansi_tcap.cnf -s ./packet-ansi_tcap-template -D . -O ../.. TCAP-Remote-Operations-Information-Objects.asn TCAPPackage.asn */
5
6
/* packet-ansi_tcap.h
7
*
8
* Copyright 2007 Anders Broman <
[email protected]
>
9
*
10
* Wireshark - Network traffic analyzer
11
* By Gerald Combs <
[email protected]
>
12
* Copyright 1998 Gerald Combs
13
*
14
* SPDX-License-Identifier: GPL-2.0-or-later
15
*/
16
17
18
#ifndef PACKET_ANSI_TCAP_H
19
#define PACKET_ANSI_TCAP_H
20
21
#define ANSI_TCAP_CTX_SIGNATURE 0x41544341
/* "ATCA" */
22
23
struct
ansi_tcap_private_t
{
24
uint32_t signature;
25
bool
oid_is_present;
/* Is the Application Context Version present */
26
const
void
* objectApplicationId_oid;
27
uint32_t session_id;
28
void
* context;
29
char
*TransactionID_str;
30
struct
{
/* "dynamic" data */
31
int
pdu;
32
/*
33
1 : invoke,
34
2 : returnResult,
35
3 : returnError,
36
4 : reject
37
*/
38
int
OperationCode;
39
/*
40
0 : national,
41
1 : private
42
*/
43
int32_t OperationCode_national;
44
int32_t OperationCode_private;
45
proto_item
*OperationCode_item;
46
} d;
47
48
};
49
50
/*extern void add_ansi_tcap_subdissector(uint32_t ssn, dissector_handle_t dissector);*/
51
52
53
/*extern void delete_ansi_tcap_subdissector(uint32_t ssn, dissector_handle_t dissector);*/
54
55
56
#endif
/* PACKET_ANSI_TCAP_H */
_proto_node
Definition
proto.h:903
ansi_tcap_private_t
Definition
packet-ansi_tcap.h:23
Generated by
1.9.8