gsm_abis_om2000: Dissect TLV structure of 0xa3/0xa5/0xa6 TLVs

We have no idea what those TLVs are, but the message hex-dumps clearly
indicate a 8-bit tag followed by 8-bit length and then 'length' amount
of bytes, so we can at least dissect that high-level structure for now.

They appear in equally unknown message type 0x126, which appears to be
sent in intervals of 300s by the RBS.

Change-Id: I91817eb20de1a4557399235c1fc42b638b9c935b
Reviewed-on: https://code.wireshark.org/review/18460
Petri-Dish: Michael Mann <mmann78@netscape.net>
Reviewed-by: Michael Mann <mmann78@netscape.net>
This commit is contained in:
Harald Welte 2016-10-21 20:45:59 +02:00 committed by Michael Mann
parent 517e777816
commit 3e82f423d9
1 changed files with 9 additions and 0 deletions

View File

@ -1005,6 +1005,15 @@ dissect_om2k_attrs(tvbuff_t *tvb, gint offset, proto_tree *tree)
case 0x9d: /* TSs MO State */
offset += dissect_tss_mo_state(tvb, offset, tree);
break;
case 0xa3:
case 0xa5:
case 0xa6:
/* we don't know any of the above, but the
* TLV structure is quite clear in the protocol
* traces */
tmp = tvb_get_guint8(tvb, offset++);
offset += dissect_om2k_attr_unkn(tvb, offset, tmp, iei, tree);
break;
case 0x9e:
case 0x9f:
default: