aboutsummaryrefslogtreecommitdiffstats
path: root/tools
diff options
context:
space:
mode:
authorGreg Morris <greg.morris@microfocus.com>2019-05-09 15:35:57 -0500
committerAnders Broman <a.broman58@gmail.com>2019-05-16 12:47:47 +0000
commit715f46b768c3dab4752b0b5752f89f62f509fa0d (patch)
tree2a60a652170ebe606e765a14ddfa3967e3089d7f /tools
parent5862b463805333ef723a96a7debeb5a5dd8b1bef (diff)
Updates to NCP protocol dissector
Add NCP 98 Fix NDSrequestprotocolflags not being captured on request so that reply would offset correctly with CRC flag. Change-Id: Ie45a1017326dd38393baf3f005f3ec9195438565 Reviewed-on: https://code.wireshark.org/review/33146 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'tools')
-rwxr-xr-xtools/ncp2222.py12
1 files changed, 12 insertions, 0 deletions
diff --git a/tools/ncp2222.py b/tools/ncp2222.py
index 1dea4ec67e..907a6e58f4 100755
--- a/tools/ncp2222.py
+++ b/tools/ncp2222.py
@@ -1252,6 +1252,7 @@ AbortQueueFlag = val_string8("abort_q_flag", "Abort Queue Flag"
[ 0x01, "Do Not Place Spool File, Examine Flags" ],
])
AcceptedMaxSize = uint16("accepted_max_size", "Accepted Max Size")
+AcceptedMaxSize64 = uint64("accepted_max_size64", "Accepted Max Size")
AccessControl = val_string8("access_control", "Access Control", [
[ 0x00, "Open for read by this client" ],
[ 0x01, "Open for write by this client" ],
@@ -3405,6 +3406,7 @@ PropertyType = val_string8("property_type", "Property Type",
])
PropertyValue = fw_string("property_value", "Property Value", 128)
ProposedMaxSize = uint16("proposed_max_size", "Proposed Max Size")
+ProposedMaxSize64 = uint64("proposed_max_size64", "Proposed Max Size")
protocolFlags = uint32("protocol_flags", "Protocol Flags")
protocolFlags.Display("BASE_HEX")
PurgeableBlocks = uint32("purgeable_blocks", "Purgeable Blocks")
@@ -15530,6 +15532,16 @@ rec( 9, 4, ObjectID ),
rec( 12, 1, SecurityFlag ),
])
pkt.CompletionCodes([0x0000])
+ # 2222/62, 98
+ pkt = NCP(0x62, "Negotiate NDS connection buffer size", 'connection')
+ pkt.Request(15, [
+ rec( 7, 8, ProposedMaxSize64, ENC_BIG_ENDIAN, Info_str=(ProposedMaxSize, "Negotiate NDS connection - %d", ", %d")),
+ ])
+ pkt.Reply(18, [
+ rec( 8, 8, AcceptedMaxSize64, ENC_BIG_ENDIAN ),
+ rec( 16, 2, EchoSocket, ENC_BIG_ENDIAN ),
+ ])
+ pkt.CompletionCodes([0x0000])
# 2222/63, 99
pkt = NCP(0x63, "Undocumented Packet Burst", 'pburst')
pkt.Request(7)