URL: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=22ab2b970a389805b4aa0e0e5ff13afb05998480
Submitter: "Anders Broman <a.broman58@xxxxxxxxx>"
Changed: branch: master
Repository: wireshark
Commits:
22ab2b9 by Nitzan Carmi (nitzanc@xxxxxxxxxxxx):
nvme: Dissect NVMe Identify Ctrl (CNS 0x1) data response
On NVMe specification, calling NVMe "Identify Controller" command
(Identify with CNS 0x1) is responded with 4K data structure which
holds all controller's capabilities/attributes.
This commits dissects the main fields in this data structure.
Change-Id: I36eced7619ba70f0323a8f3d3914394343ec4dd0
Signed-off-by: Nitzan Carmi <nitzanc@xxxxxxxxxxxx>
Reviewed-on: https://code.wireshark.org/review/34931
Petri-Dish: Anders Broman <a.broman58@xxxxxxxxx>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@xxxxxxxxx>
Actions performed:
from 2ecb282 dot11decrypt: Let dissector feed engine with EAPOL key message type
add 22ab2b9 nvme: Dissect NVMe Identify Ctrl (CNS 0x1) data response
Summary of changes:
epan/dissectors/packet-nvme.c | 176 ++++++++++++++++++++++++++++++++++++++++++
1 file changed, 176 insertions(+)