Wireshark-bugs: [Wireshark-bugs] [Bug 12763] tshark print 'TCP flags' with non-ascci chars on so

Date: Fri, 23 Sep 2016 15:47:28 +0000

Comment # 8 on bug 12763 from
1) LANG=C
$ ./tshark -r pkt-1.pcap
  1 0.000000000 192.139.46.66 ? 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -r pkt-1.pcap|grep TCP
  1 0.000000000 192.139.46.66 â 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -V -r pkt-1.pcap
[...]
        [TCP Flags: ???????AP???]
[...]
$ ./tshark -V -r pkt-1.pcap|grep 'TCP Flags'
[...]
        [TCP Flags: ·······AP···]
[...]
$ ./tshark -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT       
  1 0.000000000 192.139.46.66 -> 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -V -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT
[...]
        [TCP Flags: ???????AP???]
[...]

2) LANG=C.UTF-8
$ ./tshark -r pkt-1.pcap
  1 0.000000000 192.139.46.66 â 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -r pkt-1.pcap|grep TCP
  1 0.000000000 192.139.46.66 â 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -V -r pkt-1.pcap
[...]
        [TCP Flags: ·······AP···]
[...]
$ ./tshark -V -r pkt-1.pcap|grep 'TCP Flags'
        [TCP Flags: ·······AP···]
$ ./tshark -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT
  1 0.000000000 192.139.46.66 iconv: illegal input sequence at position 30
$ ./tshark -V -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT
        [TCP Flags: iconv: illegal input sequence at position 3090

with LANG=C and iconv, it's better for the arrow, not for the dot.
with LANG=C.UTF-8 and iconv, errors.
See the changes when filter with grep.
Why not just '->' and '.' for tshark ?


You are receiving this mail because:
  • You are watching all bug changes.