Bug ID |
11097
|
Summary |
Need to have offset information in the output of "tshark -r <pcapFile> -V -P"
|
Product |
Wireshark
|
Version |
1.10.6
|
Hardware |
x86
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
Version 1.10.6 (Git Rev Unknown from unknown)
Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 2.24.10, with Cairo 1.10.2, with Pango 1.30.0, with
GLib 2.32.4, with libpcap, with libz 1.2.3.4, without POSIX capabilities,
without libnl, without SMI, with c-ares 1.7.5, without Lua, without Python,
without GnuTLS, without Gcrypt, without Kerberos, without GeoIP, without
PortAudio, with AirPcap.
Running on Linux 3.2.0-64-generic, with locale en_US.UTF-8, with libpcap
version
1.1.1, with libz 1.2.3.4, without AirPcap.
Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz
Built using gcc 4.6.3.
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
Need to connect the output of tshark to another program which displays the
output in a browser like wireshark. In order to be able to click a field (say,
TCP sequence number) and highlight the corresponding range of bytes, I wish the
tshark can output offset information of that field (and length of the field in
bytes).
Just need to have the information for ip tcp http since they are the most
popular, don't want to incur a change on all dissectors.
Thanks.
You are receiving this mail because:
- You are watching all bug changes.