ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 7493] New: Dissector for the Parrot AR Drone

Date: Tue, 17 Jul 2012 13:21:55 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7493

           Summary: Dissector for the Parrot AR Drone
           Product: Wireshark
           Version: SVN
          Platform: x86-64
        OS/Version: Ubuntu
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Dissection engine (libwireshark)
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: hildesht@xxxxxxxxxxx


Build Information:
Version 1.9.0 (SVN Rev 43768 from /trunk)

Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.24.10, with Cairo 1.10.2, with Pango 1.30.0, with
GLib 2.32.3, with libpcap, with libz 1.2.3.4, with POSIX capabilities (Linux),
without libnl, with SMI 0.4.8, with c-ares 1.7.5, without Lua, without Python,
with GnuTLS 2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built Dec 10 2011 11:43:10), with AirPcap.

Running on Linux 3.2.0-23-generic, with locale en_US.UTF-8, with libpcap
version
1.1.1, with libz 1.2.3.4, GnuTLS 2.12.14, Gcrypt 1.5.0, without AirPcap.

Built using gcc 4.6.3.

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
This is our dissector for the protocol of the packets sent to the Parrot AR
Drone (http://ardrone.parrot.com/parrot-ar-drone/usa/), a commercial
quad-copter that is controlled through your iOS or Android device. It dissects
9 of the drones commands, which are:

AT*REF      - mode arguments such as takeoff, landing, and emergency stop
AT*PCMD     - arguments that control the moment of the drone
AT*FTRIM    - sets the reference for horizontal plane
AT*CONFIG   - configuration of the drone
AT*LED      - LED animation information
AT*ANIM     - animation, duration arguments to set a flight animation
AT*COMWDG   - resets the communication watchdog
AT*CONFIGID - identifies session information
AT*CTRL     - used for firmware updates

This dissector has been developed on Ubuntu 12.04 64 bit with gcc and had also
been installed on Windows 7 64 bit. I have tested the dissector using randpkt
and editcap and its does not crash Wireshark. It does however give malformed
packets. I know this is the intent of this testing but I do not know if the
dissector needs to handle these malformed packets in a special way. 
This is my first time submitting anything to a project like this so I apologize
if this is not professional grade. If it is  not just tell me what I can do to
make it better and I will do my best! I hope this can be a meaningful addition
to Wireshark.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.