https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6852
Summary: BACnet: Allow vendor specified network layer messages
Product: Wireshark
Version: 1.7.x (Experimental)
Platform: x86
OS/Version: Windows XP
Status: NEW
Severity: Minor
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: ljtconsulting@xxxxxxxxx
Created attachment 7858
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7858
Sample vendor proprietary network message
Build Information:
NOTE: you should run 'diskperf -y' to enable the disk statistics
TShark 1.7.1-SVN-ALC-122010 (SVN Rev Unknown from unknown)
Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GLib 2.26.1, with WinPcap (4_1_2), with libz 1.2.5,
without POSIX capabilities, with SMI 0.4.8, with c-ares 1.7.1, with Lua 5.1,
without Python, with GnuTLS 2.10.3, with Gcrypt 1.4.6, with MIT Kerberos, with
GeoIP.
Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.1.2
(packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b
(20091008).
Built using Microsoft Visual C++ 9.0 build 21022
--
BACnet allows for Vendor Proprietary Network Layer Messages. The patch
included here provides a way for vendors to create a plug in based on their
vendor-id to decode these proprietary network layer messages.
This change affects packet-bacnet.c only. To use this new feature, vendors
create a new dissector and register it using the following:
dissector_add_uint("bacnet.vendor", MY_VENDOR_NUMBER, my_dissector_handle);
The attached capture contains 2 sample messages for demonstration purposes.
This patch has been fuzz tested.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.