aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/CMakeLists.txt
AgeCommit message (Collapse)AuthorFilesLines
2023-03-11WIP: dissector for vsmartcard protocollaforge/rsproHarald Welte1-0/+1
Change-Id: Iba8cbe09b14fcd0644cc3d09303eab1ef71fbca3
2023-03-11WIP: Osmocom RSPRO dissector supportHarald Welte1-0/+2
The Osmocom RSPRO protocol is a protocol for remote SIM card access, i.e. extending the SIM card interface between phone/mdoem (UE) and a remote SIM card reader. The primary user of this protocol is osmo-remsim software suite, which can be found at https://osmocom.org/projects/osmo-remsim/wiki RSPRO is specified in ASN.1 using BER and runs on top of the IPA multiplex (protocol-gsm_ipa.c). Change-Id: Ibcdb2c92281d05c36e3973de4d7ec4aa0cd9b207
2023-03-10New dissector for GSM L2RCOP (3GPP TS 27.002)Harald Welte1-0/+1
This is a dissector for the GSM "Layer 2 Relay Character Oriented Protocol" as used in non-transparent CSD (Circuit Switched Data) calls in GSM and UMTS cellular networks.
2023-03-10Add new dissector for GSM RLP protocol (3GPP TS 24.022)Harald Welte1-0/+1
This protocol is used in the user plane of non-transparent CSD (Circuit Switched Data) calls in GSM networks. RLP frames are sent over the Um air interface, and are sent as modified V.110 frames over 64k TDM channels in the back-haul/core network. For modern implementations, this means in RFC4040 RTP CLEARMODE. As there's no V.110 decoder in wireshark, we cannot connect the RLP decoder to that. However, we hook it up to the GSMTAP dissector to enable other software to pass the decoded RLP frames into wireshark.
2023-03-08TRDP: Add dissector for TRDP protocolIgor Dmitriev1-0/+1
2023-02-12CMake: Add a comment about dissector headersJoão Valverde1-0/+10
2023-02-08file-pcapng: Provide mechanism for 'local' block handlersMartin Mathieson1-0/+1
2023-01-25SAPDIAG: Added SAP Diag as main dissectorMartin Gallo1-0/+1
Added the SAP Diag dissector protocol from [SecureAuth's plugin](https://github.com/SecureAuthCorp/SAP-Dissection-plug-in-for-Wireshark/blob/master/src/packet-sapdiag.c). This is a dissector that implements the Diag protocol. Decompression of packets is not considered as this requires the proprietary LZC/LZH decompression routines still pending to be added in #8973. The Diag packets can be wrapped in an SNC frame, in which case the respective dissector is called. Embedded RFC calls are disabled as this requires the respective dissector to be found, which will be submitted in a separate merge request. Details about the protocol and example requests can be found in [pysap's documentation](https://pysap.readthedocs.io/en/latest/protocols/SAPDiag.html).
2023-01-18CMake: Require explicit installation of development headersJoão Valverde1-0/+2
Develpment headers are a sizeable part of the binary installation and most users won't ever require them. It's recommended to package them separately in a devel package or SDK. Create a CMake installation component for development headers and add the EXCLUDE_FROM_ALL property. Headers can be installed using the invocation: cmake --install <dir> --component Development
2023-01-10LLS: add dissector for ATSC3 Low Level Signalling (LLS) ProtocolSergey V. Lobanov1-0/+1
LLS dissector is implemented according to A/331:2022-11. .pcap sample: https://wiki.wireshark.org/SampleCaptures#lls-low-level-signalling-protocol
2023-01-08ALP: add dissector for ALP protocol (ATSC3.0 A/330)Sergey V. Lobanov1-0/+1
This is a port of SiliconDust ALP decoder provided in public repository https://github.com/silicondust/wireshark Original Author: Nick Kelsey <nickk@silicondust.com>
2022-12-21DECT-NWK: Initial dissector for DECT NWK layerHarald Welte1-0/+1
Change-Id: Idf0b97ce40ec5b2dd1b507a72fed64cfee288354
2022-12-15DECT-DLC: Initial dissector for DECT DLC protocol layerHarald Welte1-0/+1
Change-Id: Iabd75b0f9b12ea9162dc164741123feb1ba7992d
2022-11-29SAPSNC: Added SAP SNC as main dissectorMartin Gallo1-0/+1
2022-11-28DECT-MITEL-RFP: Begin of OMM/RFP protocolBernhard Dick1-0/+1
This is the begin of a basic dissection of the proprietary protocol used by the Mitel OMM/RFP communicatino over TCP. Currently no decryption is supported so there is the need of external decryption.
2022-11-28DECT-MITEL-ETH: Unify namingBernhard Dick1-0/+1
This commit unifies the naming within the dissector for the DECT over Ethernet protocol within the Mitel DECT base stations (RFPs).
2022-11-28discard: Implement dissector for RFC 863Jim Young1-0/+1
2022-11-22SAPMS: Added SAP MS as main dissectorMartin Gallo1-0/+1
2022-11-21SAPRouter: Added SAP Router as main dissectorMartin Gallo1-0/+1
2022-11-15Add NVMe Management Interface (NVMe-MI) dissectorJeremy Kerr1-0/+1
This change adds a small dissector for the NVMe-MI protocol, typically for tunelling Administration commands over an MCTP (over I2C) channel. We just decode the request and response headers, and leave the payload as raw data. Signed-off-by: Jeremy Kerr <jk@codeconstruct.com.au>
2022-11-15Add MCTP control protocol dissectorJeremy Kerr1-0/+1
This change adds a very basic dissector for the MCTP control protocol - just the header fields, leaving the raw payload data. Signed-off-by: Jeremy Kerr <jk@codeconstruct.com.au>
2022-11-15Add Management Component Transport Protocol (MCTP) dissectorJeremy Kerr1-0/+1
This change adds a protocol dissector for the Management Component Transport Protocol (MCTP). This is a failry simple datagram-based protocol for messaging between components within a single platform, typically over I2C, serial or PCIe. This dissector just implements the header fields, and sequence-number based message reassembly. Inner protocols will be added as follow-up changes. Linux has support for AF_MCTP data, so decode from the MCTP SLL ltype. Signed-off-by: Jeremy Kerr <jk@codeconstruct.com.au>
2022-11-14SAPEnqueue: Added SAP Enqueue Server as main dissectorMartin Gallo1-1/+2
2022-11-11SAPHDB: Added SAP HDB as main dissectorMartin Gallo1-0/+1
2022-11-06SAPIGS: Added SAP IGS as main dissectorMartin Gallo1-0/+1
2022-11-01Dissector CMakeLists: custom header+support filesDavid Perry1-1/+2
2022-10-21H224: Add a basic dissectorAndersBroman1-0/+1
ping: #18514
2022-10-16SAPNI: Added SAP NI as main dissectorMartin Gallo1-0/+1
2022-10-04JSON: add seperate 3GPP fileJoakim Karlsson1-0/+2
Moving specific 3GPP keys handle to its own file This will also enable custom JSON string dissector
2022-09-15BBLog: refactor and update the list of eventsMichael Tuexen1-0/+1
2022-08-26DLT: Adding support to open DLT filesDr. Lars Völker1-0/+1
This patch allows Wireshark to open DLT files directly.
2022-08-24dissector: Open Control Protocol OCP.1/AES70Martin Mayer1-0/+1
2022-08-12PCAPNG: make dissect_block public for custom dissectorsJoakim Karlsson1-0/+1
2022-07-22TECMP: Adding Subdissector supportDr. Lars Völker1-0/+1
Adding subdissector support based on interface_id. This allows to write custom dissectors for e.g. UART/RS232 data.
2022-07-20Locamation Interface Module dissector for IM1Ferry Huberts1-0/+1
Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2022-06-23GREbond: Add support for Huawei's GRE bonding (RFC8157) control protocolThomas Vogt1-0/+1
This dissector is for the control messages of the GRE bonding protocol by Huawei. These messages are encapsulated in GRE and can appear on both/all bonding links. During development, I made heavy use of traffic for Deutsche Telekom Hybrid service. There fore, it also supports the first version which did not have an IEEE assigned ethertype.
2022-06-08Add Roon Discovery dissectorAaron Turner1-0/+1
Add support for Roon/roonlabs.com discovery running on UDP/9003.
2022-04-30EAP: add PEAP decoderAlexander Clouter1-0/+1
The existing PEAP support does not decode the inner attributes, this commit adds that support by introducing packet-peap.c which recreates a 'pseudo' EAP header before looping the TVB back into the EAP dissector.
2022-03-23Redis RESP: REdis Serialization Protocol v2 dissectorRyan Doyle1-0/+1
This adds support for RESP v2.
2022-02-07GDT: add dissector for SCTP PPID 49 protocolDamir Franusic1-0/+2
2022-01-30Add ZBOSS NCP protocol dissectorVladimir Bespalov1-0/+1
2022-01-27Add Microsoft Cluster Route Control Protocol (MSRCP)Will Aftring1-0/+1
2022-01-25realtek: add support for some Realtek protocols.Guy Harris1-0/+1
This could be extended to handle some "switch tags" seen when capturing from interfaces supporting the Linux DSA mechanism.
2022-01-18Adding dissection for subsystem sftp.Jerome-PS1-0/+1
2022-01-17cmake: fix indentation.Dario Lombardo1-4/+4
2022-01-05UDS: add subdissector supportDr. Lars Völker1-0/+1
Adding subdissector support to UDS and allow Signal PDUs for it. This patch supports: - ReadDataByIdentifier (RDBI) Reply - WriteDataByIdentifier (WDBI) Request - RoutineControl (RC) Request - RoutineControl (RC) Reply
2022-01-04mpeg table: implement Selection Information Table (SIT)Roman Volkov1-0/+1
2022-01-03Signal-PDU: Adding support to dissect DLT payloadsDr. Lars Völker1-0/+1
This patch adds support to DLT for subdissectors and allows the Signal PDU dissector to attach to DLT to parse non-verbose payloads.
2021-12-21Add ETI/EOBI order flow/market data dissectorsGeorg Sauthoff1-0/+3
The Enhanced Trading Interface (ETI) protocol and the Enhanced Order Book Interface (EOBI) protocol are used by a few European exchanges such as Eurex, Xetra and Börse Frankfurt. Basically, a trader uses ETI to communicate with a matching engine (over TCP), e.g. to add a new order, modify an existing one, etc. while the matching engine also publicizes the current state of the order book via EOBI over multicast UDP feeds. ETI actually consists of two variants, i.e. ETI for derivatives markets (such as Eurex) and ETI for cash markets (such as Xetra). A common convention is to abbreviate them as ETI (for derivatives) and XTI (for cash). These protocols share the same encoding, i.e. messages start with a length and a tag field and most messages and fields are fixed size. See also https://github.com/gsauthof/python-eti#protocol-introduction for some more details. The protocol specifications are openly available (cf. https://github.com/gsauthof/python-eti#protocol-descriptions for direct links) in human and machine-readable (XML) formats. The Wireshark ETI/XTI/EOBI dissectors are code-generated by `eti2wireshark.py` (https://github.com/gsauthof/python-eti/blob/master/eti2wireshark.py) which is GPL licensed. See also https://github.com/gsauthof/python-eti#wireshark-protocol-dissectors for usage examples and related work.
2021-12-165co-legacy: New FiveCo Legacy dissectorAntoine Gardiol1-0/+1