Comment # 9
on bug 8243
from Tyson Key
Heh, I also thought that was a nice coincidence, as far as opcodes are
concerned.
Thanks for the review, and the tweak.
For the time being, that's all that I plan to do. In the long term, I *really*
want to integrate the NDEF dissector from
https://code.google.com/p/wireshark-nfc/ with this one, so that we can have
support for dissection of the most common FeliCa Lite payload type.
Other than that, I'd need to either purchase, and import some FeliCa Standard
cards from Japan (probably from
http://www.switch-science.com/products/list.php?category_id=52), or persuade
someome to send me a SuiCa/PasMo card (or a similar FeliCa-based
e-money/transport card); and then I'd have to modify some of LibNFC's example
code, in order to create traces for testing the other commands...
With that in mind, it's probably OK to close this bug.
Tyson.
(In reply to comment #8)
> Comment on attachment 9855 [details]
> Identify all 40 opcodes in the combined FeliCa Lite + Standard profiles, and
> flatten the commands/responses tables
>
> Checked into rev 47205 with the addition of "refactoring" hf_felica_opcode
> so all opcodes can be filtered on.
>
> FWIW, I noticed "response opcodes" are always odd numbered and one greater
> then their respective command opcode.
>
> Are there more patches planned for this or should the bug be closed?
You are receiving this mail because:
- You are watching all bug changes.