Wireshark-bugs: [Wireshark-bugs] [Bug 6651] New: Add dissector for CANopen protocol

Date: Wed, 7 Dec 2011 03:08:38 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6651

           Summary: Add dissector for CANopen protocol
           Product: Wireshark
           Version: 1.6.4
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: yegorslists@xxxxxxxxxxxxxx


Yegor Yefremov <yegorslists@xxxxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #7531|                            |review_for_checkin?
               Flag|                            |

Created an attachment (id=7531)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7531)
CANopen dissector

Build Information:
wireshark 1.6.4 (SVN Rev 39941 from /trunk-1.6)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.24.6, with GLib 2.30.0, with libpcap 1.1.1, with
libz 1.2.3.4, with POSIX capabilities (Linux), without libpcre, with SMI 0.4.8,
with c-ares 1.7.4, with Lua 5.1, without Python, with GnuTLS 2.10.5, with
Gcrypt
1.5.0, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built Jul 27
2011 11:30:44), without AirPcap.

Running on Linux 3.0.0-12-generic, with libpcap version 1.1.1, with libz
1.2.3.4, GnuTLS 2.10.5, Gcrypt 1.5.0.

Built using gcc 4.6.1.
--
CANopen is a communication protocol and device profile specification for
embedded systems used in automation. 

CANopen dissector uses SocketCAN dissector to capture CAN packets, hence fully
usable in Linux only. Special option for selecting a high-level protocol like
CANopen will be also added with this patch.

The code has passed fuzz testing.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.