Wireshark-bugs: [Wireshark-bugs] [Bug 8246] Support for dissection of FeliCa payloads in PN532 I
Date: Sat, 26 Jan 2013 13:48:16 +0000

Comment # 3 on bug 8246 from
Comment on attachment 9853 [details]
A trace file containing a FeliCa Polling + Read Without Encryption session
against a FeliCa Lite tag containing an NDEF payload

If I remember correctly, this capture file is sound in terms of content - but
dissection on the payloads isn't done automatically (since both the USB CCID
dissector, and the PN532 dissector treat packet payloads in a generic manner by
default, since the hardware involved is relatively agnostic in terms of the
higher-level protocols that it'll be a conduit for). 

You've got to first select "NXP PN532 with ACS Pseudo-Header" as the USB CCID
dissector's payload type in the preferences, and then "Sony FeliCa" as the
payload type in the PN532 dissector, in order to successfully decode all of the
FeliCa packets in the trace.

Apologies for neglecting to mention those extra steps, earlier.


You are receiving this mail because:
  • You are watching all bug changes.