https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7930
Summary: GSM RR DTM assignment command msg type error
Product: Wireshark
Version: 1.8.3
Platform: x86
OS/Version: Windows 7
Status: NEW
Severity: Normal
Priority: Low
Component: Dissection engine (libwireshark)
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: dingli2001@xxxxxxxx
Created attachment 9440
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=9440
DTM assignment command pcap
Build Information:
Version 1.8.3 (SVN Rev 45256 from /trunk-1.8)
Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.10, with Cairo 1.10.2, with Pango 1.30.0, with
GLib 2.32.2, with WinPcap (4_1_2), with libz 1.2.5, without POSIX capabilities,
with SMI 0.4.8, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS
2.12.18, with Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, with PortAudio
V19-devel (built Oct 2 2012), with AirPcap.
Running on 32-bit Windows 7, build 7600, with WinPcap version 4.1.2 (packet.dll
version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b (20091008),
GnuTLS 2.12.18, Gcrypt 1.4.6, without AirPcap, from the PortableApps U3 device
in drive D:.
Built using Microsoft Visual C++ 10.0 build 40219
--
GSM RR DTM Assignment Command msg is decoded as Packet Assignment Command
DTM Assignment Command type=0x4c
Packet Assignment Command =0x4b
in packet-gsm_a_rr.c
{ 0x4b, "Main DCCH Assignment Command" },
{ 0x4c, "Packet Assignment Command" },
{ 0x4d, "DTM Assignment Command" },
it is wrong
0x4d= DTM INFORMATION
see 3GPP TS 44.018 section 10.4 message type
and in current version , only msg type is decoded and display,
can you decode fields in DTM Assignment Command just like Assignment Command?
Thanks
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.