https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4446
Summary: NFSv4 callback fixes and enhancements
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Normal
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: sager@xxxxxxxxxx
Created an attachment (id=4244)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4244)
NFSv4 callback fixes and enhancements patch
Build Information:
Version 1.3.3 (SVN Rev 31661 from /trunk)
Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.10.14, with GLib 2.12.13, with libpcap 0.9.7, with libz
1.2.3, with POSIX capabilities (Linux), with libpcre 7.0, without SMI, without
c-ares, without ADNS, without Lua, without Python, with GnuTLS 1.6.3, with
Gcrypt 1.2.4, with MIT Kerberos, without GeoIP, without PortAudio, without
AirPcap, with new_packet_list.
Running on Linux 2.6.23.8-34.fc7, with libpcap version 0.9.7, GnuTLS 1.6.3,
Gcrypt 1.2.4.
Built using gcc 4.1.2 20070925 (Red Hat 4.1.2-27).
--
Dynamically register callback dissector based on the NFSv4.0 SETCLIENTID args
(the equivalent of what had already been done for NFSv4.1 CREATE_SESSION).
Fix CB_LAYOUTRECALL dissecting: the recall type wasn't getting parsed, so some
of the layout recall info wasn't being displayed.
Parse CB_SEQUENCE's referring call lists.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.