Bug ID |
12053
|
Summary |
Bluetooth LE packet disection error
|
Product |
Wireshark
|
Version |
2.0.1
|
Hardware |
x86
|
OS |
All
|
Status |
CONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
Wireshark 2.0.1 (SVN Rev Unknown from unknown)
Copyright 1998-2015 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with Qt 4.8.6, with libpcap, without POSIX capabilities,
without libnl, with libz 1.2.8, with GLib 2.40.2, without SMI, without c-ares,
without ADNS, without Lua, without GnuTLS, without Gcrypt, without Kerberos,
without GeoIP, without QtMultimedia, without AirPcap.
Running on Linux 3.19.0-32-generic, with locale C, with libpcap version 1.5.3,
with libz 1.2.8.
Intel(R) Core(TM) i7-4700MQ CPU @ 2.40GHz (with SSE4.2)
Built using gcc 4.8.4.
--
I recently moved all my work involving Bluetooth in wireshark to a windows 10
virtual machine. I fixed an initial error with encapsulation where I added user
10 DLT = 157 with btle as the protocol, which was the same as I did before and
it worked fine. However this time, while I get no errors, the layout is
different and it is missing a lot of info like source and destination, payload,
any handle values. The type of packets displayed are "Empty PDU", "Control
Opcode: LL_START_ENC_RSP", and "L2CAP Fragment". This is reproducible on Linux
as well.
You are receiving this mail because:
- You are watching all bug changes.