https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4149
Summary: IPcomp: decompress deflated payloads
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: vamposdecampos@xxxxxxxxx
Alex Badea <vamposdecampos@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #3820| |review_for_checkin?
Flag| |
Created an attachment (id=3820)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3820)
Patch against recent-ish svn trunk
Build Information:
wireshark 1.3.1 (SVN Rev 30223 from /trunk)
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.16.1, with GLib 2.20.1, with libpcap 1.0.0, with libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.8, without SMI,
without
c-ares, with ADNS, without Lua, without Python, with GnuTLS 2.4.2, with Gcrypt
1.4.1, with MIT Kerberos, without GeoIP, with PortAudio <= V18, without
AirPcap,
with new_packet_list.
Running on Linux 2.6.28-15-generic, with libpcap version 1.0.0, GnuTLS 2.4.2,
Gcrypt 1.4.1.
Built using gcc 4.3.3.
--
Here's a patch which will enable decompressing IPcomp payloads.
It simply calls tvb_uncompress(), so AFAICT it only handles DEFLATE -- which
should be better than nothing at all.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.