Bug ID |
9445
|
Summary |
USB: Enable DecodeBy
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Enhancement
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
TShark 1.11.2 (SVN Rev Unknown from unknown)
Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GLib 2.34.3, with libpcap, with libz 1.2.5, with POSIX
capabilities (Linux), with libnl 3, with SMI 0.4.8, with c-ares 1.7.5, without
Lua, without Python, with GnuTLS 2.8.5, with Gcrypt 1.4.4, with MIT Kerberos,
without GeoIP.
Running on Linux 3.11.0+, without locale, with libpcap version
1.5.0-PRE-GIT_2013_06_28, with libz 1.2.5.
Built using gcc 4.8.0.
--
>From some time USB dissectors have new 3 tables to decoding payload. Now is
time to enable DecodeBy for those 3 tables. Patch enable decoding by:
1) Bus ID and Device Address (all frame have those fields)
2) Vendor Id and Product ID
3) Device Class, Subclass and Protocol (please do not miss with
"Interface Class/Subclass/Protocol")
Last two patches are for little cleanup.
You are receiving this mail because:
- You are watching all bug changes.