diff options
author | Greg Morris <greg.morris@microfocus.com> | 2019-05-09 15:35:57 -0500 |
---|---|---|
committer | Anders Broman <a.broman58@gmail.com> | 2019-05-16 12:47:47 +0000 |
commit | 715f46b768c3dab4752b0b5752f89f62f509fa0d (patch) | |
tree | 2a60a652170ebe606e765a14ddfa3967e3089d7f /tools | |
parent | 5862b463805333ef723a96a7debeb5a5dd8b1bef (diff) |
Updates to NCP protocol dissector
Add NCP 98
Fix NDSrequestprotocolflags not being captured on request so that reply
would offset correctly with CRC flag.
Change-Id: Ie45a1017326dd38393baf3f005f3ec9195438565
Reviewed-on: https://code.wireshark.org/review/33146
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'tools')
-rwxr-xr-x | tools/ncp2222.py | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/tools/ncp2222.py b/tools/ncp2222.py index 1dea4ec67e..907a6e58f4 100755 --- a/tools/ncp2222.py +++ b/tools/ncp2222.py @@ -1252,6 +1252,7 @@ AbortQueueFlag = val_string8("abort_q_flag", "Abort Queue Flag" [ 0x01, "Do Not Place Spool File, Examine Flags" ], ]) AcceptedMaxSize = uint16("accepted_max_size", "Accepted Max Size") +AcceptedMaxSize64 = uint64("accepted_max_size64", "Accepted Max Size") AccessControl = val_string8("access_control", "Access Control", [ [ 0x00, "Open for read by this client" ], [ 0x01, "Open for write by this client" ], @@ -3405,6 +3406,7 @@ PropertyType = val_string8("property_type", "Property Type", ]) PropertyValue = fw_string("property_value", "Property Value", 128) ProposedMaxSize = uint16("proposed_max_size", "Proposed Max Size") +ProposedMaxSize64 = uint64("proposed_max_size64", "Proposed Max Size") protocolFlags = uint32("protocol_flags", "Protocol Flags") protocolFlags.Display("BASE_HEX") PurgeableBlocks = uint32("purgeable_blocks", "Purgeable Blocks") @@ -15530,6 +15532,16 @@ rec( 9, 4, ObjectID ), rec( 12, 1, SecurityFlag ), ]) pkt.CompletionCodes([0x0000]) + # 2222/62, 98 + pkt = NCP(0x62, "Negotiate NDS connection buffer size", 'connection') + pkt.Request(15, [ + rec( 7, 8, ProposedMaxSize64, ENC_BIG_ENDIAN, Info_str=(ProposedMaxSize, "Negotiate NDS connection - %d", ", %d")), + ]) + pkt.Reply(18, [ + rec( 8, 8, AcceptedMaxSize64, ENC_BIG_ENDIAN ), + rec( 16, 2, EchoSocket, ENC_BIG_ENDIAN ), + ]) + pkt.CompletionCodes([0x0000]) # 2222/63, 99 pkt = NCP(0x63, "Undocumented Packet Burst", 'pburst') pkt.Request(7) |