Commit Graph

57440 Commits

Author SHA1 Message Date
Mikhail Koreshkov df164dfc62 GSM_A-BCC: dissector for BCC Protocol
Added dissector for Broadcast call control protocol
(3GPP TS 44.069 version 11.0.0 Release 11)

Change-Id: I179801d30fc2d32d8c4187a92dd0b1c9709711c7
Reviewed-on: https://code.wireshark.org/review/7627
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 16:36:14 +00:00
Jeff Morriss 283336508e Don't pass a t4-non-ecm-sig-end to the tap if we didn't see the start of the
data: the invalid frame number will crash Wireshark.

Bug: 10885
Change-Id: I3ae278b77a9449136fbaaac52f2bbaa8a510bf76
Reviewed-on: https://code.wireshark.org/review/7651
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 16:35:36 +00:00
Peter Wu ad1b3ee110 Qt: enable autoscroll on initial capture start
The capture timer was never enabled on capture start or disabled on
capture stop. This is now implemented.

Bug: 10601
Change-Id: Iae23a952986a2c5dddf92b6ac0d1f1bc1c83719c
Reviewed-on: https://code.wireshark.org/review/7582
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Tested-by: Peter Wu <peter@lekensteyn.nl>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 16:33:56 +00:00
Gerald Combs 5ab8490088 Qt: Allow multiple lines in the packet list.
Remove the setUniformRowHeights(true) call in the PacketList
constructor. This means that the packet list now calculates its height
by querying the Qt::SizeHintRole for every item instead of simply
multiplying item_height * number_of_rows.

Implement SizeHintRole in PacketListModel::data so that size
calculations aren't unbearably slow. We don't have any row text until an
item is drawn (via DisplayRole), so items with multiple lines end up
being rendered twice. Note where we make assumptions on line heights.

Although we call gtk_tree_view_set_fixed_height_mode() in the GTK+ UI we
don't have this problem there. GTK+ is apparently less strict about
enforcing row heights.

Bug: 10924
Change-Id: I98e9f4f5f321c2e03f18498e0a7e7556f88792a1
Reviewed-on: https://code.wireshark.org/review/7430
Petri-Dish: Evan Huus <eapache@gmail.com>
Reviewed-by: Evan Huus <eapache@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 16:29:58 +00:00
Peter Wu 410b40d371 Export CLIENT_RANDOM with Export SSL Session Keys
This allows for exporting the SSL session keys for captures which were
decrypted using a RSA certificate, but where the server does not support
session resumption.

To avoid frequent reallocations, the expected length is used as initial
string size.

Tested against a nginx server with ssl_session_cache off.

Note that all keys loaded via ssl.keylog_file are exported, not just the
displayed ones!

Change-Id: Ie3a93d3692885502f46442953fa53303d16672d7
Reviewed-on: https://code.wireshark.org/review/7175
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 16:27:10 +00:00
Peter Wu 6c1e4d2e7a http2: improve heuristics, remember conversation
Enable the reliable Magic Hello heuristics by default and dissect
further packets as HTTP2 as well. The weak frame heuristics is still
disabled by default.

Change-Id: I783d036fb6c6d867daedf251a5264fdf3b475447
Reviewed-on: https://code.wireshark.org/review/7615
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
Tested-by: Peter Wu <peter@lekensteyn.nl>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Tatsuhiro Tsujikawa <tatsuhiro.t@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 16:25:46 +00:00
Alexis La Goutte caebab58ff DNS: SSHFP Update Algo and fingertype
Change-Id: I78376c5578ee1f1871260db478a9c0d994f5bd38
RFC6594: Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records
RFC7479: Using Ed25519 in SSHFP Resource Records
Reviewed-on: https://code.wireshark.org/review/7654
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 16:24:43 +00:00
Alexis La Goutte ca9508a289 ICMP(v4): Remove proto_tree_add_text
Part 2

Change-Id: I4fa4a48fe047b7231f1cf084d8c798ada15372c5
Reviewed-on: https://code.wireshark.org/review/7607
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 13:41:28 +00:00
AndersBroman dcb087fb20 [Diameter] Add 3GPP AVPs
Change-Id: I1152114ff6b8ea103f0dee3cc9206aefc39db0bc
Reviewed-on: https://code.wireshark.org/review/7653
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 13:40:38 +00:00
Peter Wu 70d34eee2b ssl,dtls: fix CertificateVerify dissection for TLSv1.2
TLSv1.2 gained an additional SignatureAndHashAlgorithm field for fields
marked with the digitally-signed attribute. This was already implemented
before for ServerKeyExchange, let's reuse that.

Note that the SignatureAndHashAlgorithm tree and fields (hash algo,
signature algo) are repurposed in a different context, but since the
structure is the same it is kept like this.

By the way, add support for DTLSv1.2 too. RFC 6347 section 4.2.6
suggests that the implementation is the same (as far as the dissector is
concerned).

Also update the comments and remove the additional "Signature with
client's private key" subtree since the CertificateVerify message has no
other items.

Bug: 11045
Change-Id: I025901b85e607f04d60357ff14187cc13db2ae5d
Reviewed-on: https://code.wireshark.org/review/7650
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Tested-by: Peter Wu <peter@lekensteyn.nl>
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-12 12:48:00 +00:00
Gerald Combs 95ce3928de Fix the Lua FPM dissector test.
In the FPM dissector test, only check the fields produced by the
frame and FPM dissectors.

Change-Id: I212afb8a8a4a7a9aa54391b0d5971b982b819395
Reviewed-on: https://code.wireshark.org/review/7643
Reviewed-by: Graham Bloice <graham.bloice@trihedral.com>
Tested-by: Graham Bloice <graham.bloice@trihedral.com>
2015-03-12 10:44:14 +00:00
Jeff Morriss 8e709fca69 Assert that the row number passed to packet_list_get_row_data() is valid.
Unfortunately that row number may come from a dissector/tap but allowing us
to continue just causes us to die horribly later (and we can't except out of
processing a tap).

Change-Id: I37f03385db55dbe55f91e2ec6a03add5664857ba
Ping-Bug: 10885
Reviewed-on: https://code.wireshark.org/review/7652
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 05:18:39 +00:00
matibens c18a3c951e Add mip6.mnid.identifier as string with filter string instead of simple text
Change-Id: If9ecbb6ff77fff8131adf526bfec2bb08aa644aa
Reviewed-on: https://code.wireshark.org/review/7642
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-12 05:05:19 +00:00
Peter Wu a9c75ca3c8 Avoid abort on zero-length fields
Since commit v1.99.4rc0-70-g0bec885 (Remove use of sprintf for ftype
string formatting), Wireshark aborts with "Null pointer passed to
bytes_to_hexstr_punct()". This happened with a SSL capture where the
ssl.handshake.extensions_padding_data had a zero length.

Fix it by producing a zero-length string instead (as done by the
previous implementation).

Change-Id: I711d786a9ae692eb44c5e49a30d5fea41c5af31e
Reviewed-on: https://code.wireshark.org/review/7649
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-12 00:59:31 +00:00
Michael Mann 0bec88518f Remove use of sprintf for ftype string formatting
Change-Id: I656d6193aad740ab88bf16fb25c202e766e3092a
Reviewed-on: https://code.wireshark.org/review/7616
Petri-Dish: Michael Mann <mmann78@netscape.net>
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-11 22:50:55 +00:00
Peter Wu b5d062ba57 Fix buffer overflow in 802.11 decryption
The sha1 function outputs a multiple of 20 bytes while the ptk buffer
has only a size of 64 bytes. Follow the hint in 802.11i-2004, page 164
and use an output buffer of 80 octets.

Noticed when running Wireshark with ASAN, on exit it would try to free a
"next" pointer which was filled with sha1 garbage. It probably got
triggered via 3f8fbb7349 which made
AirPDcap responsible for managing its own memory.

Bug: 10849
Change-Id: I10c1b9c2e224e5571d746c01fc389f86d25994a1
Reviewed-on: https://code.wireshark.org/review/7645
Reviewed-by: Evan Huus <eapache@gmail.com>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Tested-by: Peter Wu <peter@lekensteyn.nl>
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-11 22:47:40 +00:00
Martin Kaiser 90797b95a0 relay USB control messages without payload to protocol-specific dissectors
at the moment, we don't forward such messages and therefore see lots
of generic USB control messages that could be dissected further

even if there's no data, a protocol-specific dissector may still set
the columns based on conversation info

Change-Id: If3fc0f0ce3bdec1f91b7e3cadc3affd56b8c8969
Reviewed-on: https://code.wireshark.org/review/7584
Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
Tested-by: Martin Kaiser <wireshark@kaiser.cx>
2015-03-11 22:05:43 +00:00
Evan Huus c19860dba8 lbmr: fix possible infinite loop
Ensure that we handle when option_len is zero so we don't go into an infinite
loop. Reported by Vlad Tsyrklevich and found by the "joern" tool. Also fix what
appears to be two misplaced "curr_offset" values which would have resulted in a
bad loop anyways.

Bug: 11036
Change-Id: I79e70fcf79015cb0add1744aff695143e11312aa
Reviewed-on: https://code.wireshark.org/review/7593
Reviewed-by: David Ameiss <netshark@ameissnet.com>
Reviewed-by: Evan Huus <eapache@gmail.com>
2015-03-11 17:57:10 +00:00
Alexis La Goutte 9b9aa9aa80 RADIUS: Sync with FreeRADIUS Master
commit 37620296eb862aedafe88d417405aba13f9e2b91
Author: Alan T. DeKok <aland@freeradius.org>
Date:   Mon Mar 9 16:06:50 2015 -0400

    Fix Cisco attributes.  Fixes #921

Change-Id: I1a7686eb010b87b576437555ea3e90fe803d3403
Reviewed-on: https://code.wireshark.org/review/7636
Reviewed-by: Evan Huus <eapache@gmail.com>
2015-03-11 16:28:55 +00:00
Jérôme LAFORGE 1bc0c48e78 Minor fix of RFC's number into comment.
Change-Id: I51035034397aa9bc42ed5b4aadc6c7fca52b2d5d
Reviewed-on: https://code.wireshark.org/review/7638
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-11 10:11:36 +00:00
Pascal Quantin 14b23203db QNET6: check that string is not null before accessing to it
Bug: 11048
Change-Id: I7921f19ad378d6d0b6707251a546c84405b8dcf4
Reviewed-on: https://code.wireshark.org/review/7623
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
2015-03-11 07:07:19 +00:00
Alexis La Goutte fdcae1f00e ICMP(v4): Enhance display of checksum stuff (like ICMPv6)
Change-Id: I74d0751b9efc3eac99b6bbadf3fe19207e2086db
Reviewed-on: https://code.wireshark.org/review/7609
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-11 05:16:37 +00:00
Alexis La Goutte 5988f6d060 ICMP(v4): Remove proto_tree_add_text
Change-Id: Iad5e28aab54a6f22148aa1e81f2dc87fbaf7ccea
Reviewed-on: https://code.wireshark.org/review/7016
Reviewed-by: Dario Lombardo <lomato@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-11 05:09:46 +00:00
Alexis La Goutte ea72d08036 RADIUS: Update Aruba dictionary (from ClearPass 6.5.0)
Change-Id: I82f4a14d18ad0c1f6911a5cb8c4eebaaa7cd9658
Reviewed-on: https://code.wireshark.org/review/7626
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-11 05:06:33 +00:00
Alexis La Goutte ce9ac00757 ICMPv6: Enhance / Update dissector
* Update to the last IANA icmpv6-parameters (2014-01-30)
* Add ICMP Locator Update message (RFC 6743)
* Add RFC 7400 (6LoWPAN-GHC: Generic Header Compression for IPv6 over Low-Power Wireless Personal Area Networks) (Add new ND Option)

Change-Id: I3d6c7f06b6f654e57844046d63c8091e5e33037a
Reviewed-on: https://code.wireshark.org/review/7629
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-11 05:04:43 +00:00
Alexis La Goutte 20afdbc57b VSIP: Add Modelines info
Change-Id: I6b578bad375687651e06508ea9c532bbad3472c8
Reviewed-on: https://code.wireshark.org/review/7631
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-11 00:02:08 +00:00
Alexis La Goutte 45a06dba6a VSIP : fix initializing 'const void *' with an expression of type 'void (*)(gchar *, guint32)' converts between void pointer and function pointer [-Wpedantic]
Change-Id: Idb7f075f67402d4ca02934a22ad0fd1127c89369
Reviewed-on: https://code.wireshark.org/review/7632
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-11 00:00:40 +00:00
Gerald Combs e991610467 Update the buildbot URL.
Change-Id: Ia3a9e8e919d3702a4499351df0289294cd10f808
Reviewed-on: https://code.wireshark.org/review/7634
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2015-03-10 23:51:52 +00:00
Alexis La Goutte a3bdf140a5 Bootp: fix typo
Change-Id: I6f6ac0bcb7b1ddc124f161b5cacd046aeef5043f
Reviewed-on: https://code.wireshark.org/review/7630
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2015-03-10 22:06:38 +00:00
Pascal Quantin 0bbbda713d TCP: use curr_num_layer as key for p_(add|get)_proto_data
It allows to properly handle a use case were several TCP connections would be encapsulated
Note that it is safe to use the same key for struct tcp_analysis and proto_tree as they are not using the same scope (and thus list)

Change-Id: I37423eca225960f2e72817f6faf543f6676cf489
Reviewed-on: https://code.wireshark.org/review/7606
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-10 21:52:59 +00:00
Gerald Combs cac102eee3 Change a lot of http:// URLs to https://.
Most of our sites are now HTTPS-only. Update URLs accordingly. Update
other URLs while we're at it. Remove or comment out dead links.

Change-Id: I7c4f323e6585d22760bb90bf28fc0faa6b893a33
Reviewed-on: https://code.wireshark.org/review/7621
Petri-Dish: Gerald Combs <gerald@wireshark.org>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2015-03-10 19:30:50 +00:00
Pascal Quantin 7f61e90eeb SPNEGO: fix compilation without Kerberos
Remove a dead increment while we are at it

Change-Id: I4a453bbd959e71ff6e85be06d079176abdc33a95
Reviewed-on: https://code.wireshark.org/review/7622
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
2015-03-10 19:04:38 +00:00
Pascal Quantin 16d8525a80 VSIP: fix extended value string declaration
Change-Id: I10e243bfa33f2e2415c937dcb12fca0578bcb7a9
Reviewed-on: https://code.wireshark.org/review/7620
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
2015-03-10 18:17:05 +00:00
Pascal Quantin 75e8d91fd6 TCP: fix addition of tcp.pdu.size field
Bug: 11007
Change-Id: I902d07f6492bffe5d44f6687be9db53b11b0acd3
Reviewed-on: https://code.wireshark.org/review/7602
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
2015-03-10 17:29:07 +00:00
Evan Huus 8ff55a910e forces: make redirecttlv robust to invalid lengths
Fixes a potential infinite loop reported by Vlad Tsyrklevich found via the
"joern" tool. I'm pretty sure the semantics of proto_tree_add_item would have
prevented this, but not 100% and making it explicit doesn't hurt.

Bug: 11037
Change-Id: I92049a95d23ca9c233b3fd830637e6bca19a7434
Reviewed-on: https://code.wireshark.org/review/7592
Petri-Dish: Evan Huus <eapache@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Evan Huus <eapache@gmail.com>
2015-03-10 15:53:39 +00:00
Stefan Metzmacher 5a1b32b769 packet-spnego: fix krb5_cfx_wrap without encryption
We need to use rrc, as the checksum is likely to be
rotated before the plaintext payload.

For now we only handle the two common cases
rrc == 0 and rrc == ec...

Ping-Bug: 9398
Change-Id: I548f2f0650716294b6aeb361021be6e44ae8f1b3
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-on: https://code.wireshark.org/review/7271
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-10 13:01:42 +00:00
Stefan Metzmacher ea0e4892e9 packet-ldap: use the correct tvb to report the SASL wrapped payload
Ping-Bug: 9398
Change-Id: I163d3dc99562b3388470c58d05e2d4d2e2f6d00c
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-on: https://code.wireshark.org/review/7477
Reviewed-by: Michael Mann <mmann78@netscape.net>
2015-03-10 13:00:56 +00:00
Charles Nepveu d2b9a4b170 Add Video Services over IP (VSIP) dissector.
Took the original patch from bug 5116 and made the dissector "human readable".

Bug: 5116
Change-Id: Ic5cc35f919865bc84ee8a3d0589f498ef13e8f6f
Signed-off-by: Michael Mann <mmann78@netscape.net>
Signed-off-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-on: https://code.wireshark.org/review/7605
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
2015-03-10 11:36:20 +00:00
Michael Mann 082d03d2b7 Add support to display unsigned integer "field type" in hex.
Ping-Bug: 10318
Change-Id: Idb8790681cda901788df10fc1484179001bbb35c
Reviewed-on: https://code.wireshark.org/review/7566
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-10 10:00:59 +00:00
AndersBroman 1e3840e40c [GTPv2] Dissect ULI Timestamp.
Change-Id: If257831315423e5654cbbc3f6af99703cfad7f90
Reviewed-on: https://code.wireshark.org/review/7614
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-10 09:57:13 +00:00
Alexis La Goutte e9a4010630 ICMP(v4): fix Found soft-deprecated APIs (tvb_length,tvb_length_remaining)
Change-Id: Ib79a55d4f2459119feff29aa06dc8eda8bea6954
Reviewed-on: https://code.wireshark.org/review/7608
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-10 07:30:01 +00:00
Alexis La Goutte 296bb23697 ui uitls (Qt): fix parameter 'val' not found in the function declaration [-Wdocumentation]
Change-Id: I5fb1afca4b412697c56d80a8eb7be4140cd9420f
Reviewed-on: https://code.wireshark.org/review/7612
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-10 07:21:25 +00:00
Alexis La Goutte d36c2ad77b CMakeLists: fix indent (use tabs)
Change-Id: If1a0a7dbe85eada1926eb278d973ddd1c55becda
Reviewed-on: https://code.wireshark.org/review/7613
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-10 07:19:10 +00:00
Pascal Quantin 8ec6ab68fa ETSI CAT: upgrade dissector to v12.2.0
Change-Id: Ifd5f901aa3856e5469f213c4c63c53f3d8f1b4c8
Reviewed-on: https://code.wireshark.org/review/7611
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
2015-03-09 22:24:54 +00:00
Gerald Combs 44dbae72ba ProtoTree: Fix crashes.
Don't dereference a null pointer. Remove g_assert()s copied from ui/gtk.
This fixes problems mentioned in bug 11044 but not the bug itself.

Change-Id: Iab75ab5cc6a184c8145a094b1c529a634e3c1c0d
Ping-Bug: 11044
Reviewed-on: https://code.wireshark.org/review/7610
Reviewed-by: Gerald Combs <gerald@wireshark.org>
2015-03-09 21:33:29 +00:00
Richard Sharpe ae8b538bdf Add dissection of the SMB2 FSCTL_SET_INTEGRITY_INFORMATION FSCTL based on
documentation on the MS website and a capture I have.

Still have to dissect FSCTL_GET_INTEGRITY_INFORMATION.

Change-Id: I17ada4daa479810d8d8512c7e7b8798bcb650081
Signed-off-by: Richard Sharpe <realrichardsharpe@gmail.com>
Reviewed-on: https://code.wireshark.org/review/7587
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2015-03-09 20:35:45 +00:00
Jeff Morriss 5fbf88f8a5 Use the new request/response framenum hints.
Change-Id: Ic4a3750a55523a5cf8ea72002055ffea1f081dd1
Reviewed-on: https://code.wireshark.org/review/7565
Reviewed-by: Michael Mann <mmann78@netscape.net>
Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
2015-03-09 16:11:08 +00:00
Alexis La Goutte 7c5fbdaebd Proto.c: fix no previous prototype for ... [-Wmissing-prototypes]
proto.c:8733:1: warning: no previous prototype for 'proto_tree_add_uint64_bits_format_value' [-Wmissing-prototypes]
proto.c:8812:1: warning: no previous prototype for 'proto_tree_add_int64_bits_format_value' [-Wmissing-prototypes]
proto.c:8861:1: warning: no previous prototype for 'proto_tree_add_boolean_bits_format_value64' [-Wmissing-prototypes]

Change-Id: Ic40ca6f32739b415a423fc978e8677d669a95867
Reviewed-on: https://code.wireshark.org/review/7509
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-09 05:36:21 +00:00
Dario Lombardo a242c09fba Small improvement in incomplete dissectors check.
This avoids logging "frame" as incomplete dissector.

Change-Id: Ifd32c4326fbe9e86d14c94e065b602ca45cb0a7e
Reviewed-on: https://code.wireshark.org/review/7390
Reviewed-by: Evan Huus <eapache@gmail.com>
Petri-Dish: Evan Huus <eapache@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-09 05:34:28 +00:00
Alexis La Goutte bd64823e3f HTTP2: Update to libnghttp2 0.7.5
Change-Id: Idcaf31b177b387b4a7199c8e1a9f591e3bf8a58f
Reviewed-on: https://code.wireshark.org/review/7541
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2015-03-09 05:31:04 +00:00