2022-08-25 09:17:59 +0000 | commented question | Calling CRC functions from Lua See Support Lua 5.2, 5.3 · Issue #3 · youlu-cn/luacrc16 and my pull request Use stdint.h for integer types by cmcqueen · |
2022-07-19 04:27:31 +0000 | received badge | ● Notable Question (source) |
2022-02-27 07:32:14 +0000 | received badge | ● Famous Question (source) |
2021-07-27 17:21:29 +0000 | received badge | ● Popular Question (source) |
2021-04-21 23:17:24 +0000 | received badge | ● Notable Question (source) |
2020-10-21 21:48:51 +0000 | received badge | ● Popular Question (source) |
2020-04-21 15:26:36 +0000 | received badge | ● Taxonomist |
2020-02-19 07:00:09 +0000 | received badge | ● Popular Question (source) |
2019-12-09 00:39:14 +0000 | edited question | Seeing the Intelligent Scrollbar Seeing the Intelligent Scrollbar The "Intelligent Scrollbar" in the Packet List pane is a useful feature. However, it se |
2019-12-09 00:37:46 +0000 | asked a question | Seeing the Intelligent Scrollbar Seeing the Intelligent Scrollbar The "Intelligent Scrollbar" is a useful feature. However, it seems to have disappeared |
2019-07-22 20:13:47 +0000 | received badge | ● Popular Question (source) |
2019-02-04 04:18:26 +0000 | marked best answer | Dissector preferences with alternative representations I've got a custom dissector written in Lua. The protocol has encryption, which needs a 16-byte encryption key to decode, so I've made that a protocol preference, with the key entered as 32 hex digits. That's working fine. I'd like to have the possibility of entering a protocol encryption key as a keyphrase instead, where the encryption key is a hash output from the keyphrase (and non-reversible). How could dissector preferences be set up so that a user could enter either an encryption key as 32 hex digits, or enter a passphrase that is converted to 32 hex digits? Could it be:
|
2019-01-24 03:52:13 +0000 | asked a question | Dissector preferences with alternative representations Dissector preferences with alternative representations I've got a custom dissector written in Lua. The protocol has encr |
2018-06-20 07:19:21 +0000 | edited answer | Lua dissector clean up of data tables Proto objects can be given an init() function. It's not totally clear to me when this function is called, but comments i |
2018-06-20 07:18:42 +0000 | answered a question | Lua dissector clean up of data tables Proto objects can be given an init() function. It's not totally clear to me when this function is called, but comments i |
2018-06-18 02:03:37 +0000 | edited question | Calling CRC functions from Lua Calling CRC functions from Lua Does Wireshark provide an API for CRC calculations from Lua dissectors? I see Wireshark h |
2018-06-18 01:59:11 +0000 | edited question | Lua dissector clean up of data tables Lua dissector clean up of data tables I've written a protocol dissector in Lua, and it is working reasonably well. It s |
2018-06-05 23:58:45 +0000 | asked a question | Calling CRC functions from Lua Calling CRC functions from Lua Does Wireshark provide an API for CRC calculations from Lua dissectors? I see Wireshark h |
2018-06-01 04:22:56 +0000 | asked a question | Lua dissector clean up of data tables Lua dissector clean up of data tables I've written a protocol dissector in Lua, and it is working reasonably well. It s |
2018-05-16 01:05:46 +0000 | marked best answer | Lua dissector memory-efficient packet reassembly I'd like to use Wireshark to analyse an RS-485 based protocol. I'd like to use a generic tool such as GitHub j123b567/SerialPCAP to save the data to a pcap file with a Due to the way the generic capture tool works, frames in the pcap file don't necessarily coincide with protocol packets. So, it is necessary to search for valid packets that might start on any byte within the pcap frame, or might span 2 or more frames. Valid packets can be determined by checking if the byte sequence starting at a particular byte has a valid length and CRC-16 value at the end. I have succeeded in writing a Lua dissector that does this. However, I am not so easily able to handle protocol packets that span 2 or more pcap frames. I could do manual frame reassembly by storing frame data in a Lua list, however, this takes significant memory so doesn't scale up well to large captures. I've read about TCP packet reassembly in Lua, and tried it, but it doesn't seem to work for dissecting The maximum protocol packet size is 31 bytes, so ideally I'd like the dissector to simply be able to look back to the data of previous pcap frames, up to 31 bytes' worth, to potentially reassemble valid packets. Is it possible to do memory-efficient packet reassembly, by simply looking back to a small number of previous pcap frames as needed to find valid protocol packets? If that's not possible, I guess I'd need to make a smarter capture tool, which is able to packetise protocol packets from the serial stream and save each packet into its own pcap frame. |
2018-05-16 01:05:46 +0000 | received badge | ● Scholar (source) |
2018-05-10 07:43:16 +0000 | edited question | Lua dissector memory-efficient packet reassembly Lua dissector memory-efficient packet reassembly I'd like to use Wireshark to analyse an RS-485 based protocol. I'd like |
2018-05-10 07:42:34 +0000 | edited question | Lua dissector memory-efficient packet reassembly Lua dissector memory-efficient packet reassembly I'd like to use Wireshark to analyse an RS-485 based protocol. I'd like |
2018-05-10 05:04:38 +0000 | received badge | ● Editor (source) |
2018-05-10 05:04:38 +0000 | edited question | Lua dissector memory-efficient packet reassembly Lua dissector memory-efficient packet reassembly I'd like to use Wireshark to analyse an RS-485 based protocol. I'd like |
2018-05-10 04:54:23 +0000 | asked a question | Lua dissector memory-efficient packet reassembly Lua dissector memory-efficient packet reassembly I'd like to use Wireshark to analyse an RS-485 based protocol. I'd like |