Commit Graph

78205 Commits

Author SHA1 Message Date
Jaap Keuter cac1426dd6 BGP: MP_REACH_NLRI dissect Next hop network address for EVPN
Add EVPN to the set of SAFI's of the L2VPN AFI to dissect the
Net hop network address for.

Bug: 16644
Change-Id: Ib335e765907d72945a5e58e6e992f84b92f9f261
Reviewed-on: https://code.wireshark.org/review/37536
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-22 15:43:53 +00:00
Alexis La Goutte ba1777cb6e ieee80211: update status code (from 802.11REVmd May 2020)
Change-Id: Ica4e3c1651bda5dbc7b4d77140520ac4db91b792
Reviewed-on: https://code.wireshark.org/review/37538
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-22 15:43:18 +00:00
Guy Harris c3d5ddc557 sysdig-event: fix the type of elements of an array of pointers to hf_ values.
"int * const a[]" means "array of const pointers to (non-const) int". so
the array elements are all const; "const int *a[]" means "array of
(non-const) pointrs to const int".

Change-Id: I0571fde7704570b60c9cbd5d94826365ff35abe0
Reviewed-on: https://code.wireshark.org/review/37546
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-22 09:12:58 +00:00
Guy Harris 74d7c3d14f RTPS: set the "we have an entity ID" flag whenever the entity ID is set.
Also, remove a comment leftover from an earlier uncommitted version of
these changes.

Change-Id: I0990a186bc280e11a6d0fda05748f5871fb227f1
Reviewed-on: https://code.wireshark.org/review/37542
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-21 23:15:33 +00:00
Guy Harris f97e20a011 RTPS: don't use incompletely filled in GUIDs.
Add to the GUID type a bitmask that indicates which fields have been
filled in; start it out as 0, and then set bits in it as fields get
filled in.

Do not add a type mapping object to the hash table unless the GUID is
completely filled in, and don't look for a type mapping object in the
hash table with a GUID that hasn't been completely filled in as a key.

Bug: 16642
Change-Id: I31db92238adcb2ec2d70b2650e41b14d99001908
Reviewed-on: https://code.wireshark.org/review/37537
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-21 19:33:19 +00:00
Gerald Combs 4f1276b5fe WSDG: Update the Code Requirements section.
Update the text in the Code Requirements section. Switch to a
description list. Add a list of allowed licenses.

Change-Id: Ic9bf88bee7122684f5e3b80185be37a7e4e7b011
Reviewed-on: https://code.wireshark.org/review/37417
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-21 15:26:14 +00:00
Alexis La Goutte 2a0a29c544 rtps: Fix Dead Store
Fix dead store (Dead assignement/Dead increment) Warning found by Clang

Change-Id: Ieda68cc1518325c64c8862a77f16cee5de7def8b
Reviewed-on: https://code.wireshark.org/review/37519
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-21 15:23:44 +00:00
Eelco Chaudron d96e72ee2d pcapng: add support for new Enhanced Packet Block options
Add support to read/write the new EPB options, epb_packetid,
epb_queue and epb_verdict, from/to pcap files.

In addition, it updates the packet-frame dissector to dissect
these new fields.

More details on the options can be found in the PcapNG
specification: https://github.com/pcapng/pcapng

An application using these new fields can be found here:
  https://github.com/chaudron/xdp-tools/tree/dev/pcapngII/xdp-dump

Change-Id: I761b8114b437fe573dd2c750e35586ad88494938
Signed-off-by: Eelco Chaudron <echaudro@redhat.com>
Reviewed-on: https://code.wireshark.org/review/37412
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-21 15:23:27 +00:00
Gerald Combs dad321fb0e [Automatic update for 2020-06-21]
Update manuf, services enterprise numbers, translations, and other items.

Change-Id: I951278c0a2fc5feb434c093c3ad5f94c651ba498
Reviewed-on: https://code.wireshark.org/review/37531
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2020-06-21 08:16:16 +00:00
Guy Harris 040cb0c9dd tools/generate-sysdig-event.py: fail if the URL fetch fails.
Call exit_msg(), not just print().

Change-Id: I3ca59b262285222e5f54045244b6eeaa31fa363e
Reviewed-on: https://code.wireshark.org/review/37530
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-21 04:59:20 +00:00
Guy Harris 9e1fbfb766 generate-sysdig-event.py: improve error reporting.
Catch particular exceptions and print a more detailed error.

Change-Id: Ied98c6d0bc0410eb8b9cb2a98f7264e980c2bb28
Reviewed-on: https://code.wireshark.org/review/37529
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-21 03:54:55 +00:00
Guy Harris 78a507b142 VRT: fix the type of elements of an array of pointers to hf_ values.
"int * const a[]" means "array of const pointers to (non-const) int". so
the array elements are all const; "const int *a[]" means "array of
(non-const) pointrs to const int".

Change-Id: I790f6ecb2d9616ff1ae9ca47364e1d5443e36ace
Reviewed-on: https://code.wireshark.org/review/37528
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-21 02:06:41 +00:00
Guy Harris 1d0f7c3a0c ICQ: fix the type of elements of an array of pointers to hf_ values.
"int * const a[]" means "array of const pointers to (non-const) int". so
the array elements are all const; "const int *a[]" means "array of
(non-const) pointrs to const int".

Change-Id: I2089ca390308da50d182f6bdad5be530f7e7cc71
Reviewed-on: https://code.wireshark.org/review/37527
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-20 23:18:09 +00:00
Guy Harris 5b885240b7 MAC-NR: get rid of an unnecessary level of indirection.
Don't take the address of an hf_ field and then, in the called routine,
dereference the pointer; just pass the hf_ field value.  In the cases
where we're passing a member of an array of pointers, dereference the
pointer at the call site.

Change-Id: I022ce46c196621088e093f9a43d57b4653c957f7
Reviewed-on: https://code.wireshark.org/review/37526
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-20 22:13:56 +00:00
Peter Wu 1f8c4ec270 QUIC: print helpful hints when Libgcrypt is too old
Robin Marx reported an issue where decryption failed and "Unable to
retrieve cipher information" was displayed. It turns out that his Ubuntu
16.04 installation was too old to support ChaCha20-Poly1305 decryption.
Be sure to report a more helpful error.

Change-Id: Id61471b68e0a52a54ed5573437126f784371c2b7
Reviewed-on: https://code.wireshark.org/review/37525
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-20 17:22:34 +00:00
Guy Harris 2eb87432f7 RTPS: initialize the fields_visited memer of a new type mapping object.
Bug: 16639
Change-Id: Iac8957b3e2ebd41b636d5853c359954cff796527
Reviewed-on: https://code.wireshark.org/review/37521
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-20 10:59:15 +00:00
Uli Heilmeier e6726a4608 PIM: Check return value of dissect_pim_addr()
Check the return value of dissect_pim_addr()

Change-Id: I783afeb6302b15fbaa7af4df5aadfdf64639acbc
Reviewed-on: https://code.wireshark.org/review/37496
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-19 11:33:18 +00:00
Guy Harris e1d9a226a2 Fix the type of arrays of pointers to hf_ values for bitfield routines.
The static arrays are supposed to be arrays of const pointers to int,
not arrays of non-const pointers to const int.

Fixing that means some bugs (scribbling on what's *supposed* to be a
const array) will be caught (see packet-ieee80211-radiotap.c for
examples, the first of which inspired this change and the second of
which was discovered while testing compiles with this change), and
removes the need for some annoying casts.

Also make some of those arrays static while we're at it.

Update documentation and dissector-generator tools.

Change-Id: I789da5fc60aadc15797cefecfd9a9fbe9a130ccc
Reviewed-on: https://code.wireshark.org/review/37517
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-19 11:32:26 +00:00
Guy Harris 51bb2c4d7f README.X11: update.
The current xcbproto has some more files.

Not everybody builds with Make; say "build the x11-dissector target", to
make it more generic in the CMake era, and give both Make and Ninja
examples.

Change-Id: I5a3c9b4dd3112cdc3054b37e4ead3abfe278df93
Reviewed-on: https://code.wireshark.org/review/37516
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-18 22:59:28 +00:00
Guy Harris 45b5103e91 X11: update to the latest xcbproto and Mesa.
Change-Id: Ie3a0c138ab98dd32884a4886094a359fcff87274
Reviewed-on: https://code.wireshark.org/review/37515
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-18 22:51:44 +00:00
Alexis La Goutte 3d6b466700 QUIC: Add support of mvfst draft-27 (0xfaceb002)
mvfst 0xfaceb002 is compatible with draft-27, see
d1a3652a4c

This is necessary to support 0xfaceb002 decryption since draft-29
changed the salt again.

Bug: 16378
Change-Id: Ib186effdb5e85bc6d48fffbfbb1f3498bf89860d
Reviewed-on: https://code.wireshark.org/review/37493
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-06-18 20:59:19 +00:00
Peter Wu b8ef6db0b6 QUIC: restore draft-22 and mvfst (0xfaceb001) support
Partially reverts v3.3.0rc0-1373-g9d240722f1 to restore decryption of
mvfst draft-22 traffic.

Bug: 16632
Ping-Bug: 13881
Change-Id: I40d193489346593a8726ea1564f4048ad19a3593
Reviewed-on: https://code.wireshark.org/review/37514
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-06-18 20:56:43 +00:00
Dario Lombardo 2f4bb25287 rtps: fix compilation with and without ZLIB.
Set the options of rtps_add_zlib_compressed_typeobject used or unused
according to the presence of zlib.

Change-Id: I73d995fce9ec5a65b0d6ebce6c2510b6d25ad347
Reviewed-on: https://code.wireshark.org/review/37495
Petri-Dish: Dario Lombardo <lomato@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2020-06-18 19:55:39 +00:00
Guy Harris fdf9610b84 radiotap: make tables that we modify automatic rather than static.
Another instance of this problem that showed up when working on the fix
to the data types of those tables (fixing the data types mean that these
errors cause the conpile to fail; as indicated, that's one reason to fix
them).

Change-Id: Ia1953b95968101f27fedd98a5fc2854101779deb
Reviewed-on: https://code.wireshark.org/review/37509
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-18 18:44:43 +00:00
Guy Harris 7a526325e9 radiotap: make tables that we modify automatic rather than static.
The arrays of pointers to header field hf_ values were getting
overwritten if the fields in question are unknown; that meant that, in
all future dissections, they would be dissected as unknown *even for
packets where they are known*.

Make them auto arrays, instead, so that each call to the dissector has
its own copy, properly initialized at run time, that it can scribble
over as it chooses without damaging the array for the next call.

This involves a cast to work around the type of the array argument being
"const int **", which means "pointer to pointer to const int",
not "pointer to const pointer to (non-const) int".  That meant that the
scribbling on the static array was *not* detected at compile time.

Fixing the type is a *lot* of work, but may catch other instances of
this problem, and may prevent future instances of it.  That's a project
for a separate commit, however.

Bug: 16636
Change-Id: I985157063488739bb59f87780c017e94e2380343
Reviewed-on: https://code.wireshark.org/review/37502
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-18 08:04:32 +00:00
Guy Harris 8b168e998f radiotap: fix typo.
Prof. Doppler's name is spelled with two "p"s.

Change-Id: Ia25d45b0a890be8c954a67b1ce5860753c1de25d
Reviewed-on: https://code.wireshark.org/review/37498
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-18 04:23:43 +00:00
Vadim Yanitskiy 090b32f485 A-bis/OML: check indicated vs actual message length
Change-Id: Ibd77b8e915a42f3f679e1affa28e2ff9e62a1565
Signed-off-by: Vadim Yanitskiy <vyanitskiy@sysmocom.de>
Reviewed-on: https://code.wireshark.org/review/37477
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-17 14:02:34 +00:00
Guy Harris 5336ae7d84 ascend: add a couple of comments.
Change-Id: I92a84087122e3997f7d2481f82f955987cf8f8dd
Reviewed-on: https://code.wireshark.org/review/37494
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-17 10:28:01 +00:00
Juanjo Martin 77d94aea24 RTPS: Added dissection of user data using discovery traffic
Change-Id: I5b91416f4135f61d55289e869f00be6ccadc78b6
Reviewed-on: https://code.wireshark.org/review/37335
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-17 07:52:14 +00:00
Enrique Giraldo b179fbe059 ZigBee: Fix multiple wrong field type string in ZCL SE.
Replacing FT_STRING with FT_UINT_STRING and removing length field where
it existed.

Change-Id: I5dc8b8ba472f161d604e4c157a9b0230694ea87a
Reviewed-on: https://code.wireshark.org/review/37463
Reviewed-by: Kenneth Soerensen <knnthsrnsn@gmail.com>
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-17 07:51:56 +00:00
Alexis La Goutte 4dc64b44aa ieee80211: fix BSS menbership (wrong value)
Change-Id: I54455eb441b7f222ab118f0187f88491a02c68cd
Reviewed-on: https://code.wireshark.org/review/37491
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-17 06:10:35 +00:00
Dario Lombardo c7c6927332 version_info: make indentation more consistent.
The preprocessor statements in the function get_compiler_info were
indented with a mixed approach: indented, but not following the style
of the rest of the file. The indented approach has been followed to
increase the readability, but with tabs, as in the rest of the file.

Other indentation issues fixed.

Change-Id: I6486c2cfa640f87c90a7fe4b7d95848d02249d23
Reviewed-on: https://code.wireshark.org/review/37481
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-17 05:31:19 +00:00
Guy Harris d91b0d560a acdr: cleaner test for "is this tree item an RTP item?"
Don't rely on the item having the name "Real-Time Transport Protocol",
as that's fragile.  We could check for the abbreviation or filter name
being "rtp", but we can avoid string comparisons entirely by getting the
ID for the protocol "rtp" and comparing the item's ID with that.

Change-Id: I2a859f0b346f15a797fb5de75e0cf5c0b5abcfe9
Reviewed-on: https://code.wireshark.org/review/37490
Petri-Dish: Guy Harris <gharris@sonic.net>
Reviewed-by: Orgad Shaneh <orgads@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-16 13:55:01 +00:00
Guy Harris 67e70dcad2 proto: clean up comments.
Say "attempt to XXX", as the attempt might not succeed.

Fix a copied-and-pasted comment to reflect what
proto_is_frame_protocol() does.

Change-Id: Ia16a98064b87001f019fda43f2db2970a89e355e
Reviewed-on: https://code.wireshark.org/review/37486
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-16 08:34:03 +00:00
Dr. Lars Völker 5954e5556f MACsec: Adding parsing of unencrypted messages
This patch allows to parse authentication-only MACsec messages
and show the payload.

Bug: 16624
Change-Id: I7fd071e6c7f5522f302255d65560f0848a262bfb
Reviewed-on: https://code.wireshark.org/review/37445
Reviewed-by: Jaap Keuter <jaap.keuter@xs4all.nl>
Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-16 08:04:29 +00:00
Peter Wu e3d44136f0 QUIC: fix Malformed Packet exception with small transport parameters
Since draft 27 the minimum transport parameter size can be smaller than
4 due to variable-length encoding. With ngtcp2-29-dsb.pcapng, the
active_connection_id_limit at the end covers only three bytes for
example. Even though the correct length is normally set later, the early
attempt to read four bytes resulted in an Malformed Packet exception.

Change-Id: I9ec6ec6c66ce7a993f2fcfdc987e35966dc809ac
Ping-Bug: 13881
Reviewed-on: https://code.wireshark.org/review/37483
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-06-16 07:08:20 +00:00
Guy Harris 933067acc2 ACDR: don't call the JSON dissector as an ACDR media type dissector.
We pass an acdr_dissector_data_t * to dissectors for the
"acdr.media_type" dissector table, but the JSON dissector expects an
http_message_info_t *.

Hilarity ensues.

Instead, have our own dissector for VoiceAI, that calls the JSON
dissector and passes it *no* data.

Bug: 16622
Change-Id: Icb5b216ed63ab02680372836885b27de9541684c
Reviewed-on: https://code.wireshark.org/review/37484
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
2020-06-15 22:03:54 +00:00
Jeffrey Nichols 526a9a64ee New dissector: Asphodel Protocol
Add a dissector for Asphodel (https://bitbucket.org/suprocktech/asphodel).
Asphodel is a protocol for streaming real-time data from sensors in industrial
environments. This protocol dissector supports complete dissection of the UDP
advertisment packets, and simple dissection of the TCP command and stream data.

Sample Capture:
https://wiki.wireshark.org/SampleCaptures#Asphodel_Protocol

Change-Id: I6a7f730a4ce5349ac48b4fd86e61429983af5bf9
Reviewed-on: https://code.wireshark.org/review/37318
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Martin Mathieson <martin.r.mathieson@googlemail.com>
2020-06-15 19:18:14 +00:00
Martin Mathieson d7f610d776 rawshark: fix test to avoid reading beyond end of format string
rawshark.c:1347:21: note: opposite inner condition: pos>=len
            if (pos >= len) { /* There should always be a following character */

Change-Id: I2e1c6b3d031db4f658bb579e0c8aba8cac7c5cb5
Reviewed-on: https://code.wireshark.org/review/37475
Petri-Dish: Martin Mathieson <martin.r.mathieson@googlemail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Martin Mathieson <martin.r.mathieson@googlemail.com>
2020-06-15 13:56:31 +00:00
Dario Lombardo 326a43627a version_info: fix clang output.
Clang's __VERSION__ shows a trailing space. This ends up in a useless
space before the period, that shows a different output from other
compilers. Example:

Built using clang Clang 10.0.0 .
Built using gcc 7.5.0.

Fixed by stripping it in clang only.

Change-Id: I98dfce46b189fc6b2b58950dbb27f69d271bd729
Reviewed-on: https://code.wireshark.org/review/37480
Petri-Dish: Guy Harris <gharris@sonic.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <gharris@sonic.net>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-15 11:55:55 +00:00
Dario Lombardo ef8da8e355 acdr: remove unused variables.
Change-Id: I46d6614395782288105868ec5d7c399224d926e2
Reviewed-on: https://code.wireshark.org/review/37479
Reviewed-by: Orgad Shaneh <orgads@gmail.com>
Petri-Dish: Dario Lombardo <lomato@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Dario Lombardo <lomato@gmail.com>
2020-06-15 09:49:44 +00:00
Dario Lombardo 976130ddf8 acdr: check existence of last_child before using it.
Bug: 16628
Change-Id: Idb6e781d4491e3b5ad52d85c35cf38115a119d10
Reviewed-on: https://code.wireshark.org/review/37478
Reviewed-by: Orgad Shaneh <orgads@gmail.com>
Petri-Dish: Dario Lombardo <lomato@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Dario Lombardo <lomato@gmail.com>
2020-06-15 09:49:35 +00:00
Roland Knall c0b7a1d6eb Qt: Fix separator for FilterExpressions
Change the separator from && to // due to popular support for
that separator instead.

Bug: 16498
Change-Id: I0ee934f3f8a7b9ff1c062b533046980e3feb3d99
Reviewed-on: https://code.wireshark.org/review/37465
Reviewed-by: Roland Knall <rknall@gmail.com>
Petri-Dish: Roland Knall <rknall@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-15 05:03:35 +00:00
Vladislav Grishenko 6b1fd0b6f3 ssh: add support for Curve25519/448-based ECDH and EdDSA public keys
RFC8731 defines new ECDH key exchange methods:
 * curve25519-sha256 (same as curve25519-sha256@libssh.org)
 * curve448-sha512
Pass them to ECDH discriptor to avoid non-rfc compliant dissecting as DH.
Also, print negotiated key exchange method, if available.

RFC8709 defines new EdDSA public key algoritms:
 * ssh-ed25519
 * ssh-ed448
Define specific "ssh.host_key.eddsa" scope for them with "key" and
"key_length" variables for filtering and visual reasons.

Example of tshark output (real key/sig data was nulled):

SSH Protocol
    SSH Version 2
        Packet Length: 188
        Padding Length: 8
        Key Exchange (method:curve25519-sha256)
            Message Code: Elliptic Curve Diffie-Hellman Key Exchange Reply (31)
            KEX host key (type: ssh-ed25519)
                Host key length: 51
                Host key type length: 11
                Host key type: ssh-ed25519
                EdDSA public key length: 32
                EdDSA public key: 0000000000000000000000000000000000000000000000000000000000000000
            ECDH server's ephemeral public key length: 32
            ECDH server's ephemeral public key (Q_S): 0000000000000000000000000000000000000000000000000000000000000000
            KEX H signature length: 83
            KEX H signature: 000000000000000000000000000000000000000000000000000000000000000000000000…
        Padding String: 0000000000000000

Change-Id: I5876a8707c12bc572a6493b60ef1d892475a44f6
Reviewed-on: https://code.wireshark.org/review/37466
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-15 05:03:14 +00:00
Uli Heilmeier e794525b7a PIM: decoding of address encoding
This commit extends decoding of source/group/unicast addresses as
defined in RFC4601 while preserving the existing fields.
Furthermore Joint Attributes TLVs as defined in RFC5384 are added for
encoded source addresses.
Initial decoding of Vector Attribute TLV Format as defined in RFC5496.

Bug: 16613
Change-Id: Ie2f142ef2ed48254c8483180eb4b310674d3437b
Reviewed-on: https://code.wireshark.org/review/37468
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-06-15 05:02:37 +00:00
Alexis La Goutte c888e3a4ee QUIC: Update Retry secret and nonce (draft-29)
Ping-Bug: 13881
Change-Id: I86d647ca693652a4289dc6034d7469e316f37344
Reviewed-on: https://code.wireshark.org/review/37464
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2020-06-14 21:58:50 +00:00
Peter Wu 4015992a89 sshdump: remove redundant ssh_userauth_agent call
Since the original introduction of sshdump, ssh_userauth_publickey_auto
was already in use which would try the ssh-agent on non-Windows
platforms. There is no need to explicitly call ssh_userauth_agent which
is dead code anyway due to a typo in the macro name.

Change-Id: I976ec3da9e35ade63983ba5ca01163714d466912
Reviewed-on: https://code.wireshark.org/review/37476
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Dario Lombardo <lomato@gmail.com>
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2020-06-14 21:47:33 +00:00
Gerald Combs 78bcdca8d3 [Automatic update for 2020-06-14]
Update manuf, services enterprise numbers, translations, and other items.

Change-Id: I158820fb33a2148f1075a59e2fec50edf10b9ecf
Reviewed-on: https://code.wireshark.org/review/37471
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2020-06-14 08:15:57 +00:00
Pascal Quantin 3ae8dc65c5 Windows: upgrade Npcap to 0.9994
Change-Id: I96475046236312701bfa8e9b36dc55b2a72755c4
Reviewed-on: https://code.wireshark.org/review/37470
Petri-Dish: Pascal Quantin <pascal@wireshark.org>
Tested-by: Petri Dish Buildbot
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-06-13 15:38:43 +00:00
Gerald Combs d6d4f71f29 macos-setup: Add iLBC.
Change-Id: Ibdea3918a24b4c248fd5f3d524b8546e917e4ea0
Reviewed-on: https://code.wireshark.org/review/37356
Reviewed-by: Jörg Mayer <jmayer@loplof.de>
2020-06-13 09:50:05 +00:00