http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2335
Summary: dissect TIPC encapsulated in TCP
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Medium
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: wireshark@xxxxxxx
Martin Peylo <wireshark@xxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #1523| |review_for_checkin?
Flag| |
Created an attachment (id=1523)
--> (http://bugs.wireshark.org/bugzilla/attachment.cgi?id=1523)
enables TIPC-over-TCP dissection
Build Information:
wireshark 0.99.9 (SVN Rev 24575)
--
The attached patch enables the user to choose a TCP port for TIPC traffic. If
this port is !=0, TIPC-over-TCP traffic is dissected.
I added a sample capture file to the wiki!
It also removes "#define ETHERTYPE_TIPC2 0x0807" which was not used at all.
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.