ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 6903] New: Dissector for the NXP PN532 protocol

Date: Sat, 3 Mar 2012 05:46:14 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6903

           Summary: Dissector for the NXP PN532 protocol
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: tyson.key@xxxxxxxxx


Created attachment 7939
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7939
The latest version of the dissector, as of writing

Build Information:
Version 1.7.1 (SVN Rev 41162 from /trunk)

Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.24.6, with Cairo 1.10.2, with Pango 1.29.3, with
GLib 2.30.0, with libpcap, with libz 1.2.3.4, with POSIX capabilities (Linux),
with SMI 0.4.8, without c-ares, with ADNS, with Lua 5.1, without Python, with
GnuTLS 2.10.5, with Gcrypt 1.5.0, without Kerberos, without GeoIP, without
PortAudio, without AirPcap.

Running on Linux 3.0.0-14-generic, with locale en_GB.UTF-8, with libpcap
version
1.3.0-PRE-GIT_2011_12_28, with libz 1.2.3.4, GnuTLS 2.10.5, Gcrypt 1.5.0.

Built using gcc 4.6.1.

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
I've written a dissector for the variant of the NXP PN532 chipset protocol
(documented at http://www.nxp.com/documents/user_manual/141520.pdf) used by the
ACS ACR122U card reader that currently identifies all of the packets mentioned
in that document.

Support for dissection of the following packet types is mostly implemented:

 * Get Firmware Version (command/response)
 * Initiator: List Passive Targets (command/response) - works with my handful
of ISO 14443-A/B tags (a MiFare Classic-based student ID card, a DESFire
EV1-based public transport card, some MiFare UltraLight tokens, and some
14443-B-based sample cards from Maxim Integrated Products that I have), and
FeliCa Lite tokens

I'm still working on implementing support for other packet types - although my
reader doesn't utilise all of them; and some reverse-engineering and guesswork
is necessary at times.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.