https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3941
Summary: Include the request TTL in the preferences iso hard-
coded
Product: Wireshark
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: TShark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: Thierry.Andry@xxxxxxxxx
Thierry Andry <Thierry.Andry@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #3570| |review_for_checkin?
Flag| |
Created an attachment (id=3570)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3570)
patch file for packet-radius.c
Build Information:
TShark 1.3.0 (SVN Rev 29550 from /trunk)
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GLib 2.20.1, with libpcap 1.0.0, without libz, without POSIX
capabilities, without libpcre, without SMI, without c-ares, without ADNS,
without Lua, without Python, without GnuTLS, without Gcrypt, without Kerberos,
without GeoIP.
NOTE: this build doesn't support the "matches" operator for Wireshark filter
syntax.
Running on Linux 2.6.28-15-generic, with libpcap version 1.0.0.
Built using gcc 4.3.3.
--
The radius dissector is hard-coding the TTL of a radius request to 5 sec. If
response is emitted after this time, the dissector won't be able to build the
conversation accordingly and add the 2 useful information: [This is a response
to a request in frame x] & [Time from request: x seconds].
This patch allows this value to be modified using the radius protocol
preferences. It was tested to be working with TShark (could not test it with
Wireshark)
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.