http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1678
Summary: "Follow TCP Stream" adds extra 0A char
Product: Wireshark
Version: 0.99.4
Platform: PC
OS/Version: Linux
Status: NEW
Severity: Major
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: peter@xxxxxxxxxx
Build Information:
wireshark 0.99.4
Copyright 1998-2006 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.10.9, with GLib 2.12.9, with libpcap 0.9.5, with libz
1.2.3, with libpcre 6.7, without UCD-SNMP or Net-SNMP, with ADNS, without Lua,
with GnuTLS 1.4.4, with Gcrypt 1.2.3, without Kerberos, with PortAudio <= V18,
without AirPcap.
Running on Linux 2.6.20.3-ubuntu1, with libpcap version 0.9.5.
Built using gcc 4.1.2 (Ubuntu 4.1.2-0ubuntu4).
--
While analysing a HTTP application I noticed that saving the output of "Follow
TCP Stream" as ASCII added extra linefeeds; specifically the "0D0A0D0A" between
header and body became "0D0A0D0A0A"
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.