https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3033
--- Comment #2 from Chris Maynard <christopher.maynard@xxxxxxxxx> 2010-11-17 10:18:08 PST ---
Seems like eDonkey would be better suited as a heuristic dissector than
blatantly steal ports from the registered protocols of kar2ouche, oms, noteit,
contclientms and rfa. Also, eDonkey makes use of tcp_dissect_pdus(), so what's
this "continuation data"? Shouldn't dissect_edonkey_tcp_pdu() get called only
when all the data is present and reassembled by TCP? I'm not familiar enough
with eDonkey to confidently go any further with it; just posing some questions
for someone who might be.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.