https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15474
Bug ID: 15474
Summary: Enhancement request: adding EBHSCR dissector
Product: Wireshark
Version: Git
Hardware: x86
OS: Windows 7
Status: UNCONFIRMED
Severity: Enhancement
Priority: Low
Component: Dissection engine (libwireshark)
Assignee: bugzilla-ad...@wireshark.org
Reporter: ana.pan...@gmail.com
Target Milestone: ---
Created attachment 16888
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16888&action=edit
A sample pcap file for EBHSCR protocol
Build Information:
Version 2.9.1 (Git Rev Unknown from unknown)
Copyright 1998-2019 Gerald Combs <ger...@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software;
see the source for copying conditions. There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with Qt 5.11.1, with WinPcap SDK (WpdPack) 4.1.2, with GLib
2.52.2, with zlib 1.2.11, with SMI 0.4.8, without c-ares, with Lua 5.2.4, with
GnuTLS 3.6.3 and PKCS #11 support, with Gcrypt 1.8.3, with MIT Kerberos, with
MaxMind DB resolver, with nghttp2 1.14.0, with LZ4, with Snappy, with libxml2
2.9.9, with QtMultimedia, with AirPcap, with SBC, with SpanDSP, with bcg729.
Running on 64-bit Windows 7 Service Pack 1, build 7601, with Intel(R) Core(TM)
i5-6440HQ CPU @ 2.60GHz (with SSE4.2), with 11386 MB of physical memory, with
locale English_United Kingdom.1252, with Npcap version 0.98, based on libpcap
version 1.8.1, with GnuTLS 3.6.3, with Gcrypt 1.8.3, with AirPcap 4.1.0 build
1622, binary plugins supported (15 loaded). Built using Microsoft Visual Studio
2015 (VC++ 14.0, build 24215).
--
EBHSCR dissector added in:
https://code.wireshark.org/review/#/c/31847/
Protocol description:
https://www.elektrobit.com/ebhscr
A sample Ebhscr pcap file in the attachment.
thank you,
ana
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe