Michael Mann
changed
bug 13238
What |
Removed |
Added |
Status |
UNCONFIRMED
|
CONFIRMED
|
CC |
|
[email protected]
|
Hardware |
x86-64
|
All
|
Ever confirmed |
|
1
|
OS |
Windows 10
|
All
|
Comment # 2
on bug 13238
from Michael Mann
I think the better solution would be to try to address the malformed portion of
the packet/data, however I don't have access to the spec (it's not free) to
confirm my findings.
The issue appears to be that for descriptor tag type 0xA2, Wireshark expects to
parse minimally 5 bytes of data within that tag, and your packets only have 1
(group id). Is group id = 0 something "special" that would carry less data? I
hacked the dissector to only parse the first byte and things looked much
better, but I'd like spec backing on how the 0xA2 descriptor tag should be
parsed.
You are receiving this mail because:
- You are watching all bug changes.