aboutsummaryrefslogtreecommitdiffstats
path: root/epan
AgeCommit message (Collapse)AuthorFilesLines
2023-01-04packet.c: Wrong pointer conversion in get_data_source_tvb_by_name()AndersBroman1-1/+1
Closes #18517 Solution by Zhao Ziqing
2023-01-04NAS EPS: upgrade dissector to v17.9.0Pascal Quantin1-1/+5
2023-01-04Bluetooth: Dissect features defined in 5.1 - 5.3Rubin Gerritsen1-7/+175
See Core_v5.3, Vol 6, Part B, Section 4.6. Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Dissect 5.3 ACL control procedure packetsRubin Gerritsen1-0/+220
The dissection also includes adding control procedure sequence validation. See Core_v5.3, Vol 6, Part B, Section 2.4.2.36-39 and Section 5.1.19-22. Core_v5.3 was released in 2021. Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Perform control proc validation on LL_CIS_TERMINATE_INDRubin Gerritsen1-0/+11
This will add expert info if the packet is being sent when it is not allowed to be sent Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Perform control proc validation on LL_PERIODIC_SYNC_INDRubin Gerritsen1-0/+11
This will add expert info if the packet is being sent when it is not allowed to be sent Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Add more validation to power control proceduresRubin Gerritsen1-0/+23
The LL_REJECT_EXT_IND is an allowed response to the LL_POWER_CONTROL_REQ, see Core_v5.3, Vol 6, Part B, Section 5.1.17. Performs control procedure validation one a LL_POWER_CHANGE_IND is sent Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Allow LL_REJECT_EXT_IND as a response to LL_CIS_REQ/RSPRubin Gerritsen1-0/+24
In Core_v5.3, Vol 6, Part B, Section 5.1.15 describes that this is allowed. Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Allow LL_REJECT_EXT_IND as a response to LL_CTE_REQRubin Gerritsen1-0/+12
In Core_v5.3, Vol 6, Part B, Section 5.1.12 describes that this is allowed. Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Detect invalid incompatible control procedure conflict resolutionRubin Gerritsen1-27/+257
Core spec 5.2, Vol 6, Part B, Section 5.3 describes how the link layer should resolve the scenario where a collision occurs where both link layers initiate incompabile control procedures. This commit adds expect information for the case where these conflicts are not handled according to spec. Example of an invalid scenario: M->S: LL_PHY_REQ S->M: LL_PHY_REQ S->M: LL_PHY_RSP M->S: LL_PHY_UPDATE_IND The correct sequence for this scenario is: M->S: LL_PHY_REQ S->M: LL_PHY_REQ S->M: LL_PHY_RSP M->S: LL_REJECT_EXT_IND M->S: LL_PHY_UPDATE_IND Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Refactor adding control procedure packets to contextsRubin Gerritsen1-193/+121
By defining control_proc_add_frame(), control_proc_add_last_frame(), and control_proc_add_frame_with_instant() a lot of duplicate code can be removed. This commit makes the checks for the CIS establishment procedure follow the spec. Previously the dissector had two bugs: - It allowed both master and slave to initiate this procedure - The procedure was marked as complete once the LL_CIS_RSP was received. Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04Bluetooth: Refactor starting control proc contextRubin Gerritsen1-152/+79
Moves the check of starting a control procedure before the previous was complete inside the function control_proc_start(). This check should be beformed before starting any control procedure. Therefore it is better to simply move it inside the funciton to remove code duplication. Signed-off-by: Rubin Gerritsen <rubin.gerritsen@nordicsemi.no>
2023-01-04packet-http3: add support for webtransport settings and frame typesGustavo Garcia1-1/+41
2023-01-04Implement sACN Universe Discovery dissectionHans Hinrichsen1-2/+247
2023-01-04lua: ByteArray integer parsing APIsDeveloper Alexander1-0/+413
Adds APIs for parsing different kinds of integer from a lua ByteArray: -16, 32 and 64 bit -singed or unsigned -encoded little endian or big endian
2023-01-04Lua: make evaluate_lua and run_console publicDavid Perry1-6/+8
2023-01-04Support `FT_CHAR` in Lua `TreeItem_add_item_any()`David Perry1-0/+1
Treat a `FT_CHAR` field like a `FT_UINT*` field, the same as Wireshark's `proto_tree_add_item()` does. Closes #18353
2023-01-04locamation-im: fix an snprintf compiler warningFerry Huberts1-1/+1
Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2023-01-04locamation-im: fix the windows build in an easier fashionFerry Huberts1-3/+2
Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2023-01-04Revert "locamation-im: fix windows build"Ferry Huberts1-4/+0
This reverts commit ee509cc3f25eacecd60a73da135a2065c34a77d8.
2023-01-04locamation-im: fix windows buildFerry Huberts1-0/+4
Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2023-01-04locamation-im: process review commentsFerry Huberts1-5/+11
Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2023-01-04locamation-im: process review commentsFerry Huberts1-12/+2
Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2023-01-04locamation-im: process review commentsFerry Huberts1-22/+7
Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2023-01-04locamation-im: support the (optional) timestamps blockFerry Huberts1-3/+290
Applies to IM2R0 only. Signed-off-by: Ferry Huberts <ferry.huberts@pelagic.nl>
2023-01-04DTLS: add DTLS over SCTP for PPIs assigned to 3GPP NGAP, XnAP, F1AP and E1APPavel Strnad1-0/+4
Change-Id: Ie52ffaffd72fb1aa273ea0d3ce9ff6754e3dbd56
2023-01-03ORAN FH CUS: add new session extension types to value_stringMartin Mathieson1-6/+12
2023-01-03dfilter: Remove semcheck arithmetic commute argumentJoão Valverde1-8/+4
No one is using this so I'd like to explore other options first to handle constants in arithmetic expressions that lack type information. Reverts 3ddb017a88797f520cda45961819c7084a0a5b29.
2023-01-03proto: Fix validity test for proto namesJoão Valverde1-6/+6
We want at least one letter. Because protocol names can contain dots and hyphens testing for !isdigit is not enough to make it dissimilar to decimal numeric expressions.
2023-01-03MBIM: restore use of VALSMartin Mathieson1-7/+42
2023-01-03JSON: add "Display JSON in raw form"Huang Qiangxiong1-2/+200
2023-01-03code cleaningUwe Heuert3-99/+5
2023-01-03prevent unused functionUwe Heuert2-0/+19
2023-01-03BSI TR-03109 required extensionsUwe Heuert7-93/+785
2023-01-03JSON: fix a displaying two dimensional array bug in compact formHuang Qiangxiong1-0/+17
2023-01-03For 'fields' param in add_bitmask_, check item masksMartin Mathieson4-4/+5
2023-01-03Change some vals entries to equivalent common tfsMartin Mathieson13-217/+77
2023-01-02DEC-NWK: Fix a couple of spelling errorsMartin Mathieson1-2/+2
2023-01-02cql: Fix 64-bit print format issueStig Bjørlykke1-1/+1
2023-01-02avsp: Fix 64-bit print format issueStig Bjørlykke1-2/+2
2023-01-02SOME/IP-SD: improve Entry/Option handling and port registeringDr. Lars Völker1-28/+57
- Show which options are referenced by entries in entry overview. - Show IPv6 address in option overview too (before IPv4 only). - Only register ports of endpoint referenced by SOME/IP services. Endpoint Options referenced by Service 0xfffe (non SOME/IP) are not automatically registered to be SOME/IP anymore [improvement].
2023-01-02BGP: Fix IP length when Root Node (IPv6)Alexis La Goutte1-3/+3
2023-01-02BGP: Wrong Tunnel ID format in PMSI tunnel attributeAlexis La Goutte1-3/+13
Close #18759
2023-01-02DECT-NWK: Fix possible overflowBernhard Dick1-1/+1
Calculating ipei_digits happened using signed int arithmetic due to type promotion rules. Explicitely casting the static number to guint64 ensures usage of unsigned 64bit arithmetics.
2023-01-02DECT-NWK: Fix ELI type decodingBernhard Dick1-3/+3
The extended location information type field is a four bit value. This was handled correctly while displaying, but not by interpreting the value. Hence the according MASK and SHIFT values have been updated.
2023-01-02TIPC: Add a recursion checkGerald Combs1-0/+15
Add a recursion check. Fixes #18770.
2023-01-02zstd: fix leak of tvbsKevin Albertson1-17/+16
Replace use of composite tvb with creation of one tvb.
2023-01-02zstd: add test for uncompressing 0 lengthKevin Albertson1-0/+6
2023-01-02packet-cql: keys with length -1 are NULL values in BATCH operationsYaniv Kaul1-3/+9
When procssing BATCH statements, Wireshark did not properly handled keys with length < 0 , which actually means that no value is sent on the wire.. This fixes it (and as a results, parses properly some result packets it failed to parse properly before). Signed-off-by: Yaniv Kaul <yaniv.kaul@scylladb.com>
2023-01-02packet-cql: keys with length -1 are NULL valuesYaniv Kaul1-7/+10
When procssing results, Wireshark did not properly handled keys with length -1, which actually means NULL. This fixes it (and as a results, parses properly some result packets it failed to parse properly before). Signed-off-by: Yaniv Kaul <yaniv.kaul@scylladb.com>