Hello all, 
I was playing with the PCAP functionality in Drill and I wanted to add the TCP 
flags to the data that Drill is returning.  I was also interested in adding the 
TCP Sequence and Ack numbers as well.  I noticed that the code as written 
currently has a function in Packet.java which returns the TCP Sequence number, 
however this was never added to the schema, so I added that and rebuilt Drill, 
however, it doesn’t seem to be returning the correct result.  The file I was 
querying is attached to this email, and should in all cases return a sequence 
number of zero. 

Questions:
1.  Could someone please take a look at the code for the tcp_sequence and see 
if I did something wrong, or if the offset is not being calculated correctly
2.  I’m trying to figure out the offsets for the various TCP flags.   I would 
think that the offset should be PacketConstants.ETHER_HEADER_LENGTH + 
getIPHeaderLength() +13 to get the word that has the flags and then from there, 
access the individual bits.  However, this doesn’t seem to work.  What am I 
missing?
Thanks and Happy New Year!
- C

Reply via email to