https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6874
Summary: New dissector: performance co-pilot protocol
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: ryan@xxxxxxxxxxxx
Ryan Doyle <ryan@xxxxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #7902| |review_for_checkin?
Flags| |
Created attachment 7902
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7902
Patch implementing PCP protocol dissection
Build Information:
TShark 1.7.1 (SVN Rev 41198 from /trunk)
Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.24.1, with libpcap, with libz 1.2.3.3, without
POSIX capabilities, without SMI, without c-ares, without ADNS, without Lua,
without Python, without GnuTLS, without Gcrypt, with MIT Kerberos, without
GeoIP.
Running on Linux 2.6.32-33-generic, with locale en_AU.UTF-8, with libpcap
version 1.0.0, with libz 1.2.3.3.
Built using gcc 4.4.3.
--
Attached patch implements dissection of the Performance Co-Pilot (PCP)
protocol.
Further details and sample capture file: http://wiki.wireshark.org/PCP
This sample capture contains all PDUs, and fuzz-test.sh has been run
successfully for over 20000 iterations.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.