Wireshark-commits: [Wireshark-commits] master 22ab2b9: nvme: Dissect NVMe Identify Ctrl (CNS 0x1) d

From: Wireshark code review <code-review-do-not-reply@xxxxxxxxxxxxx>
Date: Tue, 05 Nov 2019 00:03:19 +0000
URL: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=22ab2b970a389805b4aa0e0e5ff13afb05998480
Submitter: "Anders Broman <a.broman58@xxxxxxxxx>"
Changed: branch: master
Repository: wireshark

Commits:

22ab2b9 by Nitzan Carmi (nitzanc@xxxxxxxxxxxx):

    nvme: Dissect NVMe Identify Ctrl (CNS 0x1) data response
    
    On NVMe specification, calling NVMe "Identify Controller" command
    (Identify with CNS 0x1) is responded with 4K data structure which
    holds all controller's capabilities/attributes.
    
    This commits dissects the main fields in this data structure.
    
    Change-Id: I36eced7619ba70f0323a8f3d3914394343ec4dd0
    Signed-off-by: Nitzan Carmi <nitzanc@xxxxxxxxxxxx>
    Reviewed-on: https://code.wireshark.org/review/34931
    Petri-Dish: Anders Broman <a.broman58@xxxxxxxxx>
    Tested-by: Petri Dish Buildbot
    Reviewed-by: Anders Broman <a.broman58@xxxxxxxxx>
    

Actions performed:

    from  2ecb282   dot11decrypt: Let dissector feed engine with EAPOL key message type
     add  22ab2b9   nvme: Dissect NVMe Identify Ctrl (CNS 0x1) data response


Summary of changes:
 epan/dissectors/packet-nvme.c | 176 ++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 176 insertions(+)