Tyson Key
changed
bug 9333
Comment # 6
on bug 9333
from Tyson Key
(In reply to comment #1)
> Created attachment 11902 [details]
> [PATCH 1/5] NFC: PN532: Dissect InListPassiveTarget Response and Diagnose
> request and response
Thanks for working on this.
However, it seems that if I apply the patch to my modified version of Wireshark
1.11.0-SVN-51333, attempting to dissect most protocol payloads fails with an
assertion ("[Dissector bug, protocol PN532: packet-rfid-pn532.c:667: failed
assertion "usb_data"]"), after the dissection of the initital command byte.
Is this intentional, or a minor bug? Or should I rebase my working version of
Wireshark on the latest SVN revision, in case some other criticial changes have
been made in the USB dissectors?
Tyson.
You are receiving this mail because:
- You are watching all bug changes.