aboutsummaryrefslogtreecommitdiffstats
path: root/epan
AgeCommit message (Collapse)AuthorFilesLines
2019-08-19MB-34017: Add HCS to SnapshotMarkerBen Huddleston1-7/+7
Add the optional HCS field to the snapshot marker (only send on when non-zero for disk snapshots). Also, remove the durability timeout field from DCP_PREPARE as it is not sent and the UI warns about invalid extras length. Change-Id: I46955e2a719d28a70377bc6addb65fa3356ea1d4 Reviewed-on: https://code.wireshark.org/review/34323 Reviewed-by: Jim Walker <jim@couchbase.com> Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-19NAS 5GS: decode LPP payloadPascal Quantin1-0/+7
Change-Id: I086370088e9ecf56e0871e2dbedb367a23633ce7 Reviewed-on: https://code.wireshark.org/review/34326 Petri-Dish: Pascal Quantin <pascal@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2019-08-19tds: Fix Dead Store (Dead assignement/Dead increment) Warning found by ClangAlexis La Goutte1-1/+1
Change-Id: I948f9cc9ef22798fd5e24d078e4749cb68548aec Reviewed-on: https://code.wireshark.org/review/34319 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-19EAP: use new tls_set_appdata_dissector API to set the dissectorPeter Wu1-5/+5
Passing the appdata dissector via the data parameter caused crashes due to type confusion, use an alternative, indirect method instead. Change-Id: I1de3de4e7daf4504c176a6ad8947037606aa20bb Depends-On: I4770d03f912dd75f92878dd74ad830ebb7eb1431 Reviewed-on: https://code.wireshark.org/review/34312 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-19TLS: add mechanism to set the TLS appdata protocolPeter Wu2-10/+37
For use by EAP-TTLS which embeds TLS. Change-Id: I4770d03f912dd75f92878dd74ad830ebb7eb1431 Reviewed-on: https://code.wireshark.org/review/34311 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-19obd-ii: Add support for decoding 29bit query and responsesjfp_martin1-13/+82
This patch adds support for decoding 29bit CAN IDs. Much of the existing code was in place for handling 29bit IDs but lacked the ability to check for the correct 29bit request and response IDs. This patch adds that ability and correctly selects for use of either 11bit or 29bit CAN IDs. Change-Id: I7cf10a56aa93d951c3ffa45734139689b3f3af4c Reviewed-on: https://code.wireshark.org/review/34297 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-18mswsp: check pipe name in case insensitive mannerJiajun Wang1-1/+1
Change-Id: I33cde794a3a7314247b46b6e8fded6ee528450cc Reviewed-on: https://code.wireshark.org/review/34304 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-17ZigBee: Replace AT_STRINGZ with a dedicated address typeKenneth Soerensen1-24/+43
Change-Id: If9bdc776e249e969f76fdbf86313e7095266ae66 Reviewed-on: https://code.wireshark.org/review/34251 Petri-Dish: Guy Harris <guy@alum.mit.edu> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl> Reviewed-by: Guy Harris <guy@alum.mit.edu>
2019-08-17MAC-NR: replace the SFN/SF timestamp by SFN/SlotPascal Quantin2-13/+48
A subframe number is not as useful as in LTE due to the different sub-carrier spacing in NR; use the slot number instead. While we are at it, uniformize a bit the label and info display. Change-Id: I432546ab38b07e7f256493ece25595a10613841d Reviewed-on: https://code.wireshark.org/review/34314 Petri-Dish: Pascal Quantin <pascal@wireshark.org> Tested-by: Petri Dish Buildbot Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2019-08-17Revert "TLS: allow dissectors to set the appdata protocol via the data param"Peter Wu1-15/+5
This reverts commit ede7be3440689cee51489361934704467f2b2ffb. The TLS dissector can be called via multiple entrypoints. It could be called directly (the EAP-TTLS/EAP-PEAP case with an explicit dissector name), but also through dissector tables. The TCP and SCTP dissectors however pass a data parameter of a different type, resulting in crashes due to type confusion. Change-Id: I1d21cb5e31eb09689970ff3bdc7a63c6b7965d49 Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16442 Link: https://www.wireshark.org/lists/wireshark-dev/201908/msg00037.html Reviewed-on: https://code.wireshark.org/review/34310 Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-16DNS: fix bytes highlight for name length and labels countPascal Quantin1-2/+2
Those generated fields are linked to the dns.qry.name field, so highlight the same bytes. Bug: 15999 Change-Id: Ia989b79a9ec14140472b79fdf7acea6e67baee68 Reviewed-on: https://code.wireshark.org/review/34299 Petri-Dish: Pascal Quantin <pascal@wireshark.org> Tested-by: Petri Dish Buildbot Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2019-08-16tvbuff.h: Fix doxygen comment of base64_to_tvb()Maksim Salau1-1/+1
Change-Id: I89603d48ad2a8f46563088c46664c5406342a994 Reviewed-on: https://code.wireshark.org/review/34298 Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
2019-08-15Pegasus LSC: LSC_DONE updated to send Status Code fieldAnthony Crawford1-14/+14
LSC_DONE messages should dissect the Status Code field. Status Code provides error code information to client devices. Bug: 15997 Change-Id: I40f3b2835189047ee428cfc8376065c5eaff6eb4 Reviewed-on: https://code.wireshark.org/review/34280 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-15Diameter: Add MS-CHAP/MS-CHAPv2 AVP support for EAP-TLSPeter Wu1-0/+12
Created the Microsoft Diameter file based on MS-CHAP-* AVPs listed at https://www.iana.org/assignments/eap-numbers/eap-numbers.xhtml#eap-numbers-10 Many values are displayed as bytes for simplicit. The MS-CHAP2-Success attribute could for example be dissected further as 1 byte followed by a string, but that requires more effort. Allow padding to be missing since the eap-ttls-mschapv2.pcapng capture would throw a Malformed Packet exception otherwise. Bug: 15603 Change-Id: I9efc322a86802e78bb6cd4bc3df1c1282a45fe9e Reviewed-on: https://code.wireshark.org/review/34291 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-15EAP: add support for EAP-PEAPPeter Wu1-0/+3
Tested with the three captures from the linked bug: eap-peap-gtc.pcapng, eap-peap-md5.pcapng, eap-peap-mschapv2.pcapng. Bug: 15597 Change-Id: Idb1fb2809d05648a3b961af8dbdd9b35c3284c13 Reviewed-on: https://code.wireshark.org/review/34294 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-15EAP, Diameter: add EAP-TTLS and EAP-Message dissection supportPeter Wu2-53/+116
Add support for dissecting the decrypted TLS payload as Diameter. Add support for dissecting the EAP-Message attribute as EAP. Disable retransmission detection when EAP-Message is detected (EAP in TLS in EAP) since this results in false positives. Tested with captures from Bug 15603: * eap-ttls-pap.pcapng - ok, User-Name and User-Password AVPs. * eap-ttls-eap-gtc.pcapng, eap-ttls-eap-md5.pcapng - EAP-Message AVP. * eap-ttls-mschapv2.pcapng - partially supported, does not conform to Diameter AVP requirements as it is not padded. Microsoft vendor types are also not yet supported. To be fixed later. * eapttls-diameter-avp.pcapng (Bug 12880) - EAP-Message AVP. Bug: 12880 Bug: 15603 Change-Id: Ie7ea282d05c1d3ff8463c34bf259107562714440 Reviewed-on: https://code.wireshark.org/review/34281 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-15TLS: allow dissectors to set the appdata protocol via the data paramPeter Wu1-5/+15
For use by EAP-TTLS which knows the next protocol that must be set. Similar to the ssl_starttls functions, but simpler as the caller does not switch the transport protocol to TLS. Change-Id: Idadb6f33e5e1182bf7b3b0b5134df9af2717a592 Reviewed-on: https://code.wireshark.org/review/34293 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-15EAP: show expert info for bad EAP lengthsPeter Wu1-2/+7
The EAP length field must cover at least Code (1 byte), ID (1 byte), Length (1 byte) and not have missing data afterwards. Bug: 14406 Change-Id: I829e2aa33e5f286d55d2e8249457e118e7c3ebcc Reviewed-on: https://code.wireshark.org/review/34292 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-14Try to fix Wpointer-sign warnings.Anders Broman11-63/+63
Change-Id: I52d24560d4061c996c25b290ee347cc55404c216 Reviewed-on: https://code.wireshark.org/review/33914 Tested-by: Petri Dish Buildbot Petri-Dish: Anders Broman <a.broman58@gmail.com> Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-14MPEG DSM-CC: Added U-N Session MessagesAnthony Crawford1-223/+2309
ISO/IEC 13818-6 DSM-CC section 4 U-N Session messages have been added. Bug: 15994 Change-Id: I76e65e9feabe54809184a446b160367e9f520ec1 Reviewed-on: https://code.wireshark.org/review/34258 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-14f5ethtrailer: fix type descripter in dissector table registrationJason Cohen1-2/+2
Bug: 15996 Change-Id: Ic6f616a0a0461adca6e44f8c5a0c20b0083ead1a Reviewed-on: https://code.wireshark.org/review/34286 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Guy Harris <guy@alum.mit.edu>
2019-08-14EAP: rename some identity fieldAlexis La Goutte1-2/+2
Bug: 15991 Change-Id: Ie180f4d8e018e31a138bfaf526fc8538d110901c Reviewed-on: https://code.wireshark.org/review/34285 Reviewed-by: Dario Lombardo <lomato@gmail.com> Petri-Dish: Dario Lombardo <lomato@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-14Add dissector for OsmoTRX protocolHarald Welte2-0/+724
This protocol is a non-standard, ad-hoc protocol to pass baseband GSM bursts between the modem (osmo-trx) and the encoder / decoder (osmo-bts-trx). Osmocom inherited this when forking OsmoTRX off the OpenBTS "Transceiver" program. Change-Id: I31f5071d08eff1731f1d602886e204c87eed107c Related: OS#4081 (https://osmocom.org/issues/4081) Bug: 14814 Reviewed-on: https://code.wireshark.org/review/26796 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl> Reviewed-by: Dario Lombardo <lomato@gmail.com>
2019-08-14GTPv2:Add dissection of new bit in IE 8.12 Indication.Anders Broman1-0/+24
Change-Id: Idcd5f1cd785d092d9169ef71e18705ab258b9476 Reviewed-on: https://code.wireshark.org/review/34282 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-14Move parsing of specific tokens to separate functionsKrzysztof Opasiak1-101/+133
One giant switch starts being very hard to read so let's move its parts to dedicated functions to improve the readability. Change-Id: I12861f110a0df862667f59a96710f6d3371c8fa7 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Reviewed-on: https://code.wireshark.org/review/34275 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-13json: add application/problem+json to the media types handled.Anders Broman1-0/+1
Change-Id: I33a7d92f92dde154a567c92b69748fe9c556cebf Reviewed-on: https://code.wireshark.org/review/34270 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-133GPP Diameter: Add nev values to AVP 21 3GPP-RAT-TypeAnders Broman1-0/+3
Change-Id: I252883bcc6f43bdacaa83cc43bf4624ccd44c7f0 Reviewed-on: https://code.wireshark.org/review/34269 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2019-08-13tvb: Improve documentation of base64_to_tvb.Anders Broman1-1/+7
Change-Id: I90a4290b893f25c543429cc08bf24af57a15e65b Reviewed-on: https://code.wireshark.org/review/34265 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-13EAP: ignore retransmissions to avoid breaking EAP-TTLS reassemblyPeter Wu1-5/+45
Remember the most recently seen Identifier field for the authenticator and peer. Flag packets that mismatch and skip further processing if it could modify the state as is the case for EAP-TTLS. Bug: 5056 Change-Id: If439d5ef2ae390208f678ff271d3036efaf9fa7f Reviewed-on: https://code.wireshark.org/review/34261 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-13Diameter 3GPP: Dissect new ULR and DSR Flags.Anders Broman1-6/+13
Change-Id: Idd42138e5ce98c804ebe7811b8a942a9e9bd8127 Reviewed-on: https://code.wireshark.org/review/34263 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-13ZigBee OTA: Fix field-control dissection in OTA commandsMartin Boye Petersen1-41/+111
Field control field was handled in the same way for QueryNextImageRequest, ImageBlockRequest and ImagePageRequest, but none of these fields are defined in the same way according to the specification. Also the optional MinimumBlockPeriod field in ImageBlockRequest was missing. Change-Id: Ibd5c7adbcc6493771baf0a099661cbd2282ee71d Reviewed-on: https://code.wireshark.org/review/34257 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-13nfs: Add the third version of the Hammerspace NFSv4 file handle dissectorTom Haynes1-3/+51
Change-Id: I7cbc670b08d0198f0afd466ddedd1dd9888d8000 Signed-off-by: Tom Haynes <loghyr@hammerspace.com> Reviewed-on: https://code.wireshark.org/review/34259 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-12DNS: Add few DNS type full namesJaap Keuter1-5/+5
Items as SSIG, NSEC and DNSKEY had no descriptive. Add these. Bug: 15970 Change-Id: I95916e628505c227338346c7aca8ae2dd5050f95 Reviewed-on: https://code.wireshark.org/review/34256 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-12Thread: Fix URI token passing to CoAP dissectorRobert Cragie1-3/+5
Incorrect token index being passed to Thread CoAP dissector. Change-Id: Ic64060134c655a5e7cfdee0cd0b78b98b60f090e Reviewed-on: https://code.wireshark.org/review/34154 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-12ZigBee: Update ZigBee Manufacturer CodesMartin Boye Petersen2-4/+587
Updated ZigBee Manufacturer Codes as per Zigbee-053874r55. Change-Id: I9e6f112b9cd5e4fc4dda03c3fe6734e1b5af8b57 Reviewed-on: https://code.wireshark.org/review/34246 Reviewed-by: Kenneth Soerensen <knnthsrnsn@gmail.com> Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-12EAP: force a new conversation at EAP-Request/IdentifyPeter Wu1-72/+17
TLS requires unique conversations for every TLS session. With EAP-TTLS over EAPOL, only a single conversation was created, breaking TLS. Force a new conversation at the start of the EAP protocol to fix this. This alone was not sufficient, the right conversation was not always matched. This happened due to wildcard matching in EAP (NO_PORT_B) while TLS does not use NO_PORT_B. TLS ended up setting a dummy port via "conversation_set_port2" because PT_NONE is considered connection-less. Even after treating PT_NONE as *not* connection-less in conversation.c, the EAP Success message was not correctly matched against a conversation and resulted into creation of another conversation. To avoid all of that mess, just use the same conversation matching logic as TLS, without NO_PORT_B. The original conversation tracking logic in EAP was presumably added to avoid multiple conversations for EAP over RADIUS (UDP), but that requirement does not seem necessary. Verified with `tshark -2r eap-tls-bug-cert.pcap -otls.log_file:out.txt`, two different `conversation =` values exist for the two sessions. Bug: 15983 Change-Id: I3376624ee3ea627eaa6233d39ae3c1d19bdc98bb Reviewed-on: https://code.wireshark.org/review/34247 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-12QUIC: add references to the QUIC wikiPeter Wu1-0/+9
A frequent question is what Wireshark version to use for a particular QUIC draft version. These are documented on the QUIC Tools wiki, add a reference to help users looking at the source code. Change-Id: Ieb008d1fa5bfb91e11cb64613336b8bf3e98a5e8 Reviewed-on: https://code.wireshark.org/review/34239 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-11TLS: update outdated file-level commentPeter Wu1-38/+22
Some of these links are broken, but most of the information is severely outdated. Replace it my a more up-to-date list of references. Change-Id: I2a7a6041317c281f56ee86fe720a63332d493943 Reviewed-on: https://code.wireshark.org/review/34238 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-11EAP: show reassembled TLS fragments only on the final framePeter Wu1-2/+2
This avoids multiple dissections on the second pass which could potentially break decryption and TLS handshake reassembly. Bug: 15982 Change-Id: I9f83fbd51c732140b831f7d5f29f46e9694e405c Reviewed-on: https://code.wireshark.org/review/34237 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-11radiotap: Comment that there are no more header bit numbers left.Richard Sharpe1-5/+13
The new approach for radiotap headers is TLVs. Let people know there are no more bits available for headers and point them to the correct place: www.radiotap.org. Change-Id: I8393c6ea32edd3cb09bcbf8c5e624c222b422c06 Reviewed-on: https://code.wireshark.org/review/34233 Reviewed-by: Richard Sharpe <realrichardsharpe@gmail.com> Petri-Dish: Richard Sharpe <realrichardsharpe@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Guy Harris <guy@alum.mit.edu>
2019-08-11IEEE 802.15.4: Add conversation table and conversation filterKenneth Soerensen1-0/+95
Change-Id: I3ec5be36bff3768bce66975deb15fec2dcc5cb26 Reviewed-on: https://code.wireshark.org/review/34155 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-11ZigBee: Add conversation table and conversation filterKenneth Soerensen1-0/+76
Change-Id: Idb650334e56e2cd268ff29138ed71386edfc8851 Reviewed-on: https://code.wireshark.org/review/34156 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-11f5ethtrailer: generate keylog entries from the debug dataJason Cohen1-128/+316
The f5ethtrailer TLS diagnostic information is able to provide TLS state information from the clientssl and serverssl profiles. Render the correct info to properly formatted keylog entries that could in turn be used to decrypt the TLS session in Wireshark. Preference added to f5ethtrailer to allow disabling the generation of keylog records Bug: 15948 Change-Id: I69c02f45827f71d4dd26b733cdd87f99e71bc00d Reviewed-on: https://code.wireshark.org/review/34141 Reviewed-by: Jason Cohen <kryojenik2@gmail.com> Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2019-08-08NAS-5GS: Dissect the Route selection descriptor.Anders Broman1-20/+191
Bug: 15914 Change-Id: If67e6d868df0493e32ef80b489c9a5e1de87fab1 Reviewed-on: https://code.wireshark.org/review/34205 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-08lsd: Add support of IPv6Alexis La Goutte1-8/+5
Bug: 15971 Change-Id: Ie6dea766f6fd38507a2e38d3b16525792993a8a7 Reviewed-on: https://code.wireshark.org/review/34206 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Dario Lombardo <lomato@gmail.com> Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-07NAS-5GS: Enhance Appendix D.5 dissection.Anders Broman1-15/+283
Bug: 15914 Change-Id: Ib69f5126b77b63dabd2d4317521e660f6d6c0b7f Reviewed-on: https://code.wireshark.org/review/34203 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-07f5ethtrailer: Fix Dead Store (Dead assignement/Dead increment) Warning found ↵Alexis La Goutte1-1/+0
by Clang Change-Id: I6d891123215c14202e1d764a32fa62de157da142 Reviewed-on: https://code.wireshark.org/review/34200 Petri-Dish: Anders Broman <a.broman58@gmail.com> Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-07s7comm: Fix Dead Store (Dead assignement/Dead increment) Warning found by ClangAlexis La Goutte1-4/+0
Change-Id: Iddd57361c9e25e13a28fd86531f6195214a52848 Reviewed-on: https://code.wireshark.org/review/34199 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Thomas Wiens <th.wiens@gmx.de> Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-06DOCSIS: correct behaviour when working with truncated messagesBruno Verstuyft1-1/+1
Change-Id: If2c1bb73a69bdc552389cd213da8aef47f6dc658 Reviewed-on: https://code.wireshark.org/review/34198 Petri-Dish: Anders Broman <a.broman58@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
2019-08-06ISO14443: Update some commandsUli Heilmeier1-13/+189
Updates short frames commands and added read/write for Type 2 tags. Change-Id: Ief7069cba8f6543290a246eda439b39c20c3079a Reviewed-on: https://code.wireshark.org/review/34190 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>