http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1122
------- Comment #2 from pierre.juhen@xxxxxxxxxx 2006-09-24 12:08 GMT -------
Confirmation : it's clearly linked to SEQ/ACK analysis
<field show="SEQ/ACK analysis" size="0" pos="34" value="">
−
<field name="tcp.analysis.flags" showname="TCP Analysis Flags"
size="32" pos="34"
show="b2:45:e5:0d:79:0c:21:b7:a9:fc:80:10:19:20:37:9b:00:00:01:01:08:0a:58:79:97:ba:00:27:5c:35"
value="0050b245e50d790c21b7a9fc80101920379b00000101080a587997ba00275c35">
<field name="tcp.analysis.duplicate_ack" showname="This is a TCP duplicate ack"
size="0" pos="34" show="��W3HH�/"/>
</field>
<field name="tcp.analysis.duplicate_ack_num" showname="Duplicate ACK #: 1"
size="0" pos="34" show="1"/>
<field name="tcp.analysis.duplicate_ack_frame" showname="Duplicate to the ACK
in frame: 1" size="0" pos="34" show="1"/>
</field>
The length of the SEQ/ACK analysis is 0 whilst the length of the subfield is
32....
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.