Dissector for the USB Integrated Circuit Card Interface Device Class (CCID)
This issue was migrated from bug 6155 in our old bug tracker.
Original bug information:
Reporter: Tyson Key
Status: RESOLVED FIXED
Product: Wireshark
Component: GTK+ UI
OS: All
Platform: All
Version: Git
Attachments:
packet-usb-ccid.c: The latest version of the dissector, after implementing dissection of 0x6F packets.
TouchATag_Connect_and_Read_MiFare_UltraLight_Tag.cap: A libpcap trace containing traffic from the connection of a card reader, and reading several MiFare UltraLight tokens.
packet-usb-ccid.c: Version of the patch that introduces macros, and makes endianness explicit for FT_UINT8s
packet-usb-ccid.c: Essentially the same patch as the previous one, modulo the reference to a MiFare dissector handle
packet-usb-ccid.c: Clean up some irrelevant, leftover references in the header
packet-usb-ccid.c: Switch to using ENC_LITTLE_ENDIAN exclusively, in keeping with the rest of the CCID and USB specifications
Read_GSM_SIM_Card.cap: A USB PCSC/CCID trace containing the results of running CardPeek's "GSM" script against a new O2 UK GSM/UMTS SIM card
PN53x_SAM_and_Contact_ATRs.cap: A USB PCSC/CCID trace containing ATR packets from 2 different cards, and NXP PN53x Secure Application Module-specific commands
packet-usb-ccid.c: Hopefully resolve the "duplicate blurbs" issues
packet-usb-ccid.c: Add Modelines, and RCS ID fix