http://anonsvn.wireshark.org/viewvc/viewvc.cgi?view=rev&revision=43752
User: alagoutte
Date: 2012/07/16 07:23 AM
Log:
From Zdravko Velinov via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7483
Enhancements to the HP ERM protocol dissector
I have done some reverse engineering of the HP ERM protocol. I had injected
some 802.1Q frames on a network that contained a HP ProCurve 5406zl switch,
then I examined the resulting encapsulated traffic. It was quite easy to spot
the VLAN identifier and the priority field because part of the header closely
resembled the 802.1Q header. There were just some minor differences in the
priority numbering between 802.1Q and HP ERM.
From me :
Add Modeline info
Fix Clang warning
Directory: /trunk/epan/dissectors/
Changes Path Action
+83 -13 packet-hp-erm.c Modified