Commit Graph

52529 Commits

Author SHA1 Message Date
Bill Meier 55d5c0f01b Add a hack to _VS_ENUM_XXX to prevent gcc "warning: comma at end of enumerator list [-pedantic]"
Change-Id: Icfab3cf8e152a2ee239c042e5bfbd9260d102035
Reviewed-on: https://code.wireshark.org/review/1194
Reviewed-by: Bill Meier <wmeier@newsguy.com>
Tested-by: Bill Meier <wmeier@newsguy.com>
2014-04-18 03:20:52 +00:00
Stig Bjørlykke 0f78d03609 Moved packet-kerberos.c to DIRTY_ASN1_DISSECTOR_SRC
Change-Id: Ib51dc40bdf4e5e2de0dd159eb40ea5114b4b6ee4
Reviewed-on: https://code.wireshark.org/review/1190
Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
2014-04-17 22:01:48 +00:00
Stig Bjørlykke a317ba0e1f Fixed typo HAVE_LIBGRYPT -> HAVE_LIBGCRYPT
Change-Id: I85772e1f4d4882810bf82a9903e30156eb374df9
Reviewed-on: https://code.wireshark.org/review/1191
Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
2014-04-17 22:01:22 +00:00
Guy Harris ad0066c81e Save and restore the current_proto string in tcp_dissect_pdus().
That way, the right protocol gets shown for exceptions in PDUs after the
one for which dissection failed.

Change-Id: I9f212fe55f19a7a818cd58cd0611683cbb723c0c
Reviewed-on: https://code.wireshark.org/review/1189
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-17 21:38:38 +00:00
Philip Rosenberg-Watt 53ae83750e Add CRC-8 calculator for EPON
See IEEE Standard 802.3-2012 Section 5, Clause 65

Change-Id: I83d8adfd5c4fd1f263175ac726854d51419b34e0
Reviewed-on: https://code.wireshark.org/review/1187
Reviewed-by: Evan Huus <eapache@gmail.com>
2014-04-17 20:38:44 +00:00
Guy Harris c531099875 Try to fix bug 10000.
This involves duplicating macros, but at least it

	1) doesn't have empty arguments to macros, which are apparently
	   considered "undefined" by C90 and C++98

and

	2) doesn't involve "extern" applied to a definition rather than
	   a declaration, which breaks building on some platforms (and
	   which I think is also not legal C).

Change-Id: I7eb98963a6d2e1bc9f869ebce3d7ba9228b6c9e4
Reviewed-on: https://code.wireshark.org/review/1188
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-17 20:10:27 +00:00
Hadriel Kaplan f52626cc83 Add tvb_get and proto_tree_add for string-encoded byte arrays
This commit adds tvb_get_string_bytes and proto_tree_add_bytes_item routines for
getting GByteArrays fields from the tvb when they are encoded in ASCII hex string form.

The proto_tree_add_bytes_item routine is also usable for normal
binary encoded byte arrays, and has the advantage of retrieving
the array values even if there's no proto tree.

It also exposes the routines to Lua, both so that a Lua script can take
advantage of this, but also so I can write a testsuite to test the functions.

Change-Id: I112a038653df6482a5d0ebe7c95708f207319e20
Reviewed-on: https://code.wireshark.org/review/1158
Reviewed-by: Hadriel Kaplan <hadrielk@yahoo.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-17 14:04:19 +00:00
AndersBroman c49be78f4e remove duplicated entries.
Change-Id: I1fcbda17cbc444eee04e975d60b371fc2fa4754c
Reviewed-on: https://code.wireshark.org/review/1184
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-17 13:39:34 +00:00
AndersBroman 17a0b59e39 From Graham Bloice:
Fix A mismatch in the dnp3_al_obj_vals value string fixes bug
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9945

Change-Id: I3d0a423d7d2e4a711533debbd950e2976dd5115e
Reviewed-on: https://code.wireshark.org/review/1183
Reviewed-by: Graham Bloice <graham.bloice@trihedral.com>
2014-04-17 13:28:52 +00:00
Peter Wu ce468653da ssl: Detect unencrypted heartbeat messages
Records are always unencrypted before the ChangeCipherSpec message. This
patch assumes that conversations without a SSL decoder (i.e. before
calling ssl_change_cipher) are unencrypted. If it turns out that the
contents were encrypted anyway, then there is about 0.8% probability
that the heartbeat message gets recognized wrong
(dissect_ssl3_heartbeat checks if the first byte equals 1 (request) or 2
(response)). Not a big deal, and the advantage that the heartbleed
expert information is triggered overweights that possible mistake.

(Note that ssl_set_master_secret as called by external code will also
invoke ssl_change_cipher, but that should be caught by the if
condition in the line before this hunk.)

An example capture is available at:
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9988

Change-Id: I5b14d9e7e8e0c1cd358f3b05c9b84fca1daf1d69
Reviewed-on: https://code.wireshark.org/review/1102
Reviewed-by: Evan Huus <eapache@gmail.com>
2014-04-17 12:05:17 +00:00
AndersBroman 5201d17786 From zeljko:
Preferences for the MRCPv2 protocol, TCP port is converted from a single port to a port range field.

Change-Id: Ieb7a7a9beb8474fe89531742d39d5ed6f6862637
Reviewed-on: https://code.wireshark.org/review/1182
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-17 12:03:40 +00:00
AndersBroman 194e7ecab1 From: Alvaro Neira Ayuso <anayuso@sysmocom.de>
fix SW_DESCR decoding
 error

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9993

Change-Id: Ia722239797ae4458d5cf880a54b6d358dc108b64
Reviewed-on: https://code.wireshark.org/review/1181
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-17 11:51:57 +00:00
AndersBroman dea68bf00f Switch to using the ASN1 based kerberos dissector.
Change-Id: Ib8945cdad149b71e3f79bd88032fd10f55ba556d
Reviewed-on: https://code.wireshark.org/review/1174
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-17 08:29:39 +00:00
Pascal Quantin 791dd4e128 Use Lua 5.2.3 linked against MSVCR110.DLL when compiling with MSVC2012
Change-Id: I372ca3b6ad80ee5a3073d06bccd3986a6d7ba27f
Reviewed-on: https://code.wireshark.org/review/1176
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-17 07:38:51 +00:00
Bill Meier 544f89eb9a Fix a [pedantic] gcc warning: "empty macro arguments are undefined in ISO C90 and ISO C++98"
Change-Id: I09f05bb1af1da20eb1a0675ed56fbe7e6b769d68
Reviewed-on: https://code.wireshark.org/review/1180
Reviewed-by: Bill Meier <wmeier@newsguy.com>
Tested-by: Bill Meier <wmeier@newsguy.com>
2014-04-17 02:05:57 +00:00
Bill Meier a919be5ff4 Fix gcc "might be clobbered by 'longjmp' or 'vfork' [-Werror=clobbered]" introduced by 19a3d046f2
[Apparently (at least) the Ubuntu buildbot gcc (presumably < 4.9) needs two vars
to be marked volatile even though gcc.4.9 (Fedora) doesn't.

Change-Id: Icf95511d08a31547196874aecb60d85cab975cfb
Reviewed-on: https://code.wireshark.org/review/1179
Reviewed-by: Bill Meier <wmeier@newsguy.com>
Tested-by: Bill Meier <wmeier@newsguy.com>
2014-04-17 00:51:23 +00:00
Bill Meier 19a3d046f2 Fix "might be clobbered by 'longjmp' or 'vfork' [-Werror=clobbered]" warning from gcc 4.9.
Change-Id: I99f777b3058e1cef3e1a077ffde259f0d2f51c98
Also: rename some vars to catch any incorrect usage.
Reviewed-on: https://code.wireshark.org/review/1178
Reviewed-by: Bill Meier <wmeier@newsguy.com>
Tested-by: Bill Meier <wmeier@newsguy.com>
2014-04-17 00:17:27 +00:00
Bill Meier d51cac21b1 Fix "might be clobbered by 'longjmp' or 'vfork' [-Werror=clobbered]" warning from gcc 4.9
Rework code related to TRY_SCSI_CDB_ALLOC_LEN macro to simplify and clarify same.
Rename some vars to catch any incorrect usage.

Change-Id: Ibf9465c5ce7670aa1147e0c311c37e582ece427a
Reviewed-on: https://code.wireshark.org/review/1177
Reviewed-by: Bill Meier <wmeier@newsguy.com>
Tested-by: Bill Meier <wmeier@newsguy.com>
2014-04-17 00:16:52 +00:00
Guy Harris b9dd810c4c Make dissect_nbss() a bit more like tcp_dissect_pdus().
Move some stuff out of dissect_nbss_packet() to dissect_nbss(), to make
its main loop look a bit more like tcp_dissect_pdus()' main loop, and
then pick up some changes from tcp_dissect_pdus().

Also, have the "Length" field cover not only the field nominally
designated as a length field, but also the low-order bit of the flags
field, because that bit is really the 17th bit of a 17-bit length field
(RFC 1002 even speaks of it in those terms).

Change-Id: Ia95912163c23d482bfca6c026d92aadbd0ca8ac4
Reviewed-on: https://code.wireshark.org/review/1175
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-16 20:39:13 +00:00
Pascal Quantin 4bee7a503f USB: fix 'Decode As' by USB Device functionality
Change-Id: I22a997939f456dd4c4baecd7dd1aedc3ffefcc82
Reviewed-on: https://code.wireshark.org/review/1173
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
2014-04-16 17:11:43 +00:00
Philip Rosenberg-Watt 0269b5e704 Added David Miller and Philip Rosenberg-Watt to file info.
Change-Id: I5f9248d58a4e809ed2fffd714411ab2e0fcc283d
Reviewed-on: https://code.wireshark.org/review/1171
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-16 16:01:22 +00:00
AndersBroman 328a335bf8 Fix packet-maccontrol.c:147: warning: format not a string literal and no
format arguments

Change-Id: I57305c7c6be86a706f10ac2c08f6576bd41eac94
Reviewed-on: https://code.wireshark.org/review/1172
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
Reviewed-by: Philip Rosenberg-Watt <p.rosenberg-watt@cablelabs.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-16 16:00:39 +00:00
Philip Rosenberg-Watt cd2abf956b Add missing MPCP messages as per IEEE 802.3 Standard
Added following message types:
  * GATE
  * REPORT
  * REGISTER REQ
  * REGISTER
  * REGISTER ACK

Change-Id: I005d92289cf3a8d46f3786184d18ce500863541e
Reviewed-on: https://code.wireshark.org/review/1128
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-16 14:31:52 +00:00
AndersBroman f0125746ca From Martin Mathieson:
For S1AP PDUs that contain a cause, show that cause in the Info column.

Change-Id: Icecb8da278c16e0d47395b17b54dee6ebd7be646
Reviewed-on: https://code.wireshark.org/review/1170
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-16 14:30:01 +00:00
Selva ba7a70ad78 Fix typo in openflow dissector.
Change-Id: Ic702cc804b0d8757f284e64d35e449ed233149d3
Reviewed-on: https://code.wireshark.org/review/1169
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-16 07:41:39 +00:00
Guy Harris 65371b9f0c Fetch fields in NBDS as we add them to the protocol tree.
That way, we don't throw an exception until we actually try to fetch a
field that's not present, so that fields we *do* successfully fetch show
up in the protocol tree.

While we're at it, convert some proto_tree_add_text() fields to named
fields.

Change-Id: I22877dfaa0fe53c44f66e8f150a9f31ccd5aba37
Reviewed-on: https://code.wireshark.org/review/1168
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-16 04:48:04 +00:00
Bill Meier d063b324e4 Fix "might be clobbered by 'longjmp' or 'vfork' [-Werror=clobbered]" warning from gcc 4.9.
Change-Id: I8495d746f47c0e2528f88295771f86197d22d159
Reviewed-on: https://code.wireshark.org/review/1166
Reviewed-by: Bill Meier <wmeier@newsguy.com>
Tested-by: Bill Meier <wmeier@newsguy.com>
2014-04-16 03:05:21 +00:00
Guy Harris 53cb2b7159 Get rid of another g_assert().
Change-Id: I7eb5177864d683cf722f877336f787b392e707e6
Reviewed-on: https://code.wireshark.org/review/1165
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-16 01:29:04 +00:00
Guy Harris 16f334238b Fix FSF address.
Change-Id: Id4a7b4ff8167c4691cf3b2c6273e29d1b00f79cf
Reviewed-on: https://code.wireshark.org/review/1163
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-16 00:51:02 +00:00
Guy Harris abbf5202b4 Squelch some warnings:
The dictionary_id member of a spdy_conv_t is only used if we have libz;
put it inside the #ifdef.  That also lets us give it a type of uLong,
from libz, which avoids it being 32 bits when the type returned by
adler32() is 64 bits.  (The *value returned by adler32()* might always
fit in 32 bits, but this is arguably cleaner than throwing a cast at the
problem.)

The third argument to adler32() is a uInt; cast sizeof to uInt to avoid
other 32-bit-vs-64-bit warnings.  (It should have been size_t, but maybe
libz antedated size_t's availability in all the compilers that were used
to compile it.)

The buffer size in spdy_decompress_header_block() is always 16K; just
make it a #define that is *not* size_t, so that we avoid other
32-bit-vs-64-bit warnings.

Use DISSECTOR_ASSERT_NOT_REACHED() for "this can't happen" - it's marked
as "doesn't return", so we don't get "variable is unassigned" warnings
(at least not from the Clang I'm using), and also means we wouldn't get
a crash if it *does* happen (we just get a warning on the console and in
the protocol tree).

Change-Id: I55945b69b7485a02f3f623b21f671ed2915d453d
Reviewed-on: https://code.wireshark.org/review/1162
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-16 00:41:42 +00:00
Guy Harris cd958c7418 Squelch warnings when built without libz.
Change-Id: I881bb369ccf5d32cb53014998ddf76210aaab73e
Reviewed-on: https://code.wireshark.org/review/1161
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-16 00:28:27 +00:00
Michael Mann 8055351c6d Add SPDY dissector (from SPDYSHARK)
Porting SPDYSHARK Plugin ( http://code.google.com/p/spdyshark/) to built-in dissector

Closed-bug: 9821
Change-Id: I3169ab49e67f67a17e4094a289f4d3a389d610bc
Reviewed-on: https://code.wireshark.org/review/767
Reviewed-by: Michael Mann <mmann78@netscape.net>
2014-04-15 23:19:43 +00:00
Martin Kaiser 537a02b365 start a dissector for Ethernet Local Management Interface
Change-Id: I332bd690be67c908067c12e570f993565de98aed
Reviewed-on: https://code.wireshark.org/review/1159
Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
Tested-by: Martin Kaiser <wireshark@kaiser.cx>
2014-04-15 21:30:25 +00:00
Martin Kaiser da055b8f52 remove unused variable 'tree'
Change-Id: Icd39b32aa61fd9fc39c7a15d22134350582b9de6
Reviewed-on: https://code.wireshark.org/review/1160
Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
2014-04-15 21:22:12 +00:00
Michael Mann c538b4498b Cleanup Alljoyn dissector.
Change-Id: I8de7a196ad068506f8e7312021879d20be4063d2
Reviewed-on: https://code.wireshark.org/review/1156
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Joe Huffman <jhuffman@codeaurora.org>
Reviewed-by: Michael Mann <mmann78@netscape.net>
2014-04-15 21:16:28 +00:00
Peter Wu e80f9cda38 Fix crash on invalid SSH_CONNECTION and SSH_CLIENT values
The third parameter to g_strsplit is the maximum number of elements, you
cannot just assume that a vector with exactly that number of elements
is available. This will crash for example: `SSH_CONNECTION= wireshark`.

This patch takes care of that and also fixes a memleak due to missing
g_strfreev. To reduce code bloat, return the filter at last so that
g_strfreev does not have to be repeated before returning.

Note that it still possible for the filter to contain absolute junk
since the port and host number is not validated...

Change-Id: I4414d2a748f83ded59775fb1e733ce1250cfc553
Reviewed-on: https://code.wireshark.org/review/1100
Reviewed-by: Michael Mann <mmann78@netscape.net>
2014-04-15 19:40:09 +00:00
Michael Mann 30661905c4 Bug 8214. Don't let array ett_ variables limit the number of array elements dissected. Also add support for set and bag dissection.
Change-Id: I11059ec313aba7d289ce06e38b4992429f2fd999
Reviewed-on: https://code.wireshark.org/review/1123
Reviewed-by: Michael Mann <mmann78@netscape.net>
2014-04-15 19:24:37 +00:00
Peter Wu b4442b875c ui/gtk/voip_calls: Fix minor memleak
Return values from g_strsplit must be always be freed. Also remove a
useless return statement and set a saner maximum split.

Change-Id: I680e20d40fe86103b0dcba210ef41aa5769f4f86
Reviewed-on: https://code.wireshark.org/review/1155
Reviewed-by: Michael Mann <mmann78@netscape.net>
2014-04-15 19:07:33 +00:00
Gerald Combs 3f0bc55ed0 Add license compatibility information for GMP (used by GnuTLS).
Update GLib and GTK+ release dates and add Qt release dates while we're
here.

Change-Id: Ia0da8f6e118e5737d19d321ce3fae6de75477b08
Reviewed-on: https://code.wireshark.org/review/1157
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2014-04-15 19:01:24 +00:00
Michael Mann 1279068c1d Fix check*.pl errors
Change-Id: Id0526cd9b6b724a8f125574507f9ce6302db540d
Reviewed-on: https://code.wireshark.org/review/1129
Reviewed-by: Michael Mann <mmann78@netscape.net>
2014-04-15 18:44:09 +00:00
Gerald Combs d73d1f14b3 1.11.3 → 1.11.4.
Change-Id: I0bf8792b9b524ae4d8e1022b234e2510972c7019
Reviewed-on: https://code.wireshark.org/review/1154
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2014-04-15 17:29:19 +00:00
Gerald Combs 1dd5d3a6aa Build 1.11.3.
Change-Id: I8c8f1c22a2cba97e69b27e5fb0b4de9981668966
Reviewed-on: https://code.wireshark.org/review/1153
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2014-04-15 16:37:19 +00:00
Alexis La Goutte 38d5b11fa2 Fix warning when build with -Wdocumentation
epan/wmem/wmem_strutl.h:85:63: error: parameter 'str' is already documented [-Werror,-Wdocumentation]
epan/wmem/wmem_strutl.h:85:27: note: previous documentation
epan/wmem/wmem_strutl.h:90:39: error: parameter 'str' is already documented [-Werror,-Wdocumentation]
epan/wmem/wmem_strutl.h:85:57: note: previous documentation
epan/wmem/wmem_strutl.h:83:11: error: parameter 'allocator:' not found in the function declaration
epan/wmem/wmem_strutl.h:83:11: note: did you mean 'allocator'?
epan/wmem/wmem_strutl.h:84:11: error: parameter 'str:' not found in the function declaration [-Werror,-Wdocumentation]
epan/wmem/wmem_strutl.h:85:11: error: parameter 'len:' not found in the function declaration [-Werror,-Wdocumentation]
epan/wmem/wmem_strutl.h:85:11: note: did you mean 'len'?

Change-Id: Id2888c5967c94c48f9b53957c8be361bbebd3488
Reviewed-on: https://code.wireshark.org/review/1151
Reviewed-by: Evan Huus <eapache@gmail.com>
2014-04-15 14:40:05 +00:00
Alexis La Goutte 5c5a24f48a Update French translation
Change-Id: If552907a2eb0828198e912fa5c2628efa7190f20
Reviewed-on: https://code.wireshark.org/review/1119
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2014-04-15 14:31:24 +00:00
Bill Meier e7488b7779 Fix "might be clobbered by 'longjmp' or 'vfork' [-Werror=clobbered]" warning from gcc 4.9.
Change-Id: I0d8f2a03d615840a1733602d0a5a6524caba6ff5
Reviewed-on: https://code.wireshark.org/review/1152
Reviewed-by: Bill Meier <wmeier@newsguy.com>
Tested-by: Bill Meier <wmeier@newsguy.com>
2014-04-15 14:28:34 +00:00
Martin Mathieson bd6ffea1cd LTE RRC: break the sr-configIndex down into periodicity and subframe offset
Change-Id: I5e153ebba9957f3dc5551f540cf333a1d0ff89f7
Reviewed-on: https://code.wireshark.org/review/1141
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-15 04:16:52 +00:00
Alexis La Goutte 157fe98533 Update .gitignore to ignore doxygen generate file/directory (wsar_html...)
Change-Id: I3d45c03f923dcc1c9216b8b102235221e8e3d556
Reviewed-on: https://code.wireshark.org/review/1140
Reviewed-by: Evan Huus <eapache@gmail.com>
2014-04-15 02:38:36 +00:00
Shu Shen e304d5d739 Fix typo in packet-openflow_v1 and v5
Change-Id: Iefc02123447edecbd02cd9a31fff0f412edc8461
Signed-off-by: Shu Shen <shu.shen@gmail.com>
Reviewed-on: https://code.wireshark.org/review/1148
Reviewed-by: Evan Huus <eapache@gmail.com>
2014-04-15 02:37:47 +00:00
Shu Shen a88b81109c Fix typo for packet-openflow_v4.c, Unknown Message Type
Change-Id: I6b416785f99c9a333d799188f06637d6643b4a38
Signed-off-by: Shu Shen <shu.shen@gmail.com>
Reviewed-on: https://code.wireshark.org/review/1147
Reviewed-by: Evan Huus <eapache@gmail.com>
2014-04-15 02:37:21 +00:00
Guy Harris 16b26b8e5f Put the system ID in the top-level items for neighbors.
Add a tvb_print_system_id() routine, and use that in various ISIS
dissectors, while we're at it.

Change-Id: I31b6b9ea8faf2b4849f974ec7ed27fbdd14b91ef
Reviewed-on: https://code.wireshark.org/review/1145
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2014-04-14 22:43:25 +00:00