https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3936
Summary: Add support for backchannel decoding in NFSv4.1
Product: Wireshark
Version: 1.2.1
Platform: Other
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Medium
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: batsakis@xxxxxxxxxx
Alexandros Batsakis <batsakis@xxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #3566| |review_for_checkin?
Flag| |
Created an attachment (id=3566)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3566)
backchannel support in NFSv4.1
Build Information:
TShark 1.2.1
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GLib 2.20.4, with libpcap 0.9.8, with libz 1.2.3, without POSIX
capabilities, without libpcre, without SMI, without c-ares, without ADNS,
without Lua, without GnuTLS, without Gcrypt, without Kerberos, without GeoIP.
NOTE: this build doesn't support the "matches" operator for Wireshark filter
syntax.
Running on Linux 2.6.29.4-167.fc11.i586, with libpcap version 0.9.8.
Built using gcc 4.4.1 20090725 (Red Hat 4.4.1-2).
--
This patch adds support for backchannel decoding in NFSv4.1
It presents the backchannel packets as part of the NFS v4 protocol with a
different version number (v1) as described in the corresponding RFC.
(This patch applies on top of the latest stable version as I couldn't compile
the SVN build -- error in libdissectors_la-packet-tpncp.lo)
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.