Bug ID |
11421
|
Summary |
GVCP filter _expression_ predefined values for gvcp.cmd.command, hex vs. unsigned
|
Product |
Wireshark
|
Version |
1.99.x (Experimental)
|
Hardware |
x86
|
OS |
Windows 7
|
Status |
UNCONFIRMED
|
Severity |
Minor
|
Priority |
Low
|
Component |
Qt UI
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 13777 [details]
Screenshot: "Display Filter _expression_" Window
Build Information:
Version 1.99.8 (v1.99.8-0-ga0c561a from master)
Copyright 1998-2015 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with Qt 5.3.1, with WinPcap (unknown), with libz 1.2.8, with
GLib 2.42.0, with SMI 0.4.8, with c-ares 1.9.1, with Lua 5.2, with GnuTLS
3.2.15, with Gcrypt 1.6.2, with MIT Kerberos, with GeoIP, without PortAudio,
with AirPcap.
Running on 64-bit Windows 7 Service Pack 1, build 7601, with locale C, with
WinPcap version 4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version
1.0 branch 1_0_rel0b (20091008), with GnuTLS 3.2.15, with Gcrypt 1.6.2, without
AirPcap.
Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz (with SSE4.2), with 16318MB of physical
memory.
Built using Microsoft Visual C++ 12.0 build 31101
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
The predefined values for the dissector gvcp.cmd.command are provided as
unsigned decimal, but should be provided as unsigned hexadecimal. As an
example, the predefined values result in expressions like
gvcp.cmd.command == 82
when they should be
gvcp.cmd.command == 0x0082
for the GVCP-WRITEREG_CMD. Please comapre also the textual output of Wireshark
with the attached screenshot:
GigE Vision Control Protocol
Command Header: WRITEREG_CMD
Message Key Code: 0x42 (66)
Flags: 0x01
Command: WRITEREG_CMD (0x0082)
Payload Length: 0x0008 (8)
Request ID: 0x10d7 (4311)
[Response In: 476]
Custom Register Address: 0x00600004
Value: 0x00000003
You are receiving this mail because:
- You are watching all bug changes.