Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 8366] New: Bluetooth: Add MCAP dissector

Date: Thu, 21 Feb 2013 10:34:47 +0000
Bug ID 8366
Summary Bluetooth: Add MCAP dissector
Classification Unclassified
Product Wireshark
Version SVN
Hardware All
OS All
Status UNCONFIRMED
Severity Enhancement
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 10065 [details]
Example MCAP logs (fake)

Build Information:
TShark 1.9.1 (SVN Rev Unknown from unknown)

Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GLib 2.32.3, with libpcap, with libz 1.2.3.4, with POSIX
capabilities (Linux), with libnl 2, with SMI 0.4.8, with c-ares 1.7.5, with Lua
5.2, without Python, with GnuTLS 2.12.14, with Gcrypt 1.5.0, with MIT Kerberos,
with GeoIP.

Running on Linux 3.6.9, with locale en_IE.UTF-8, with libpcap version 1.1.1,
with libz 1.2.3.4.
        Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz

Built using gcc 4.4.7.

--
Add support for MCAP Protocol version 1.0.
Based on latest specification from:
https://www.bluetooth.org/Technical/Specifications/adopted.htm

How to:
1. Load example logs.
2. Go to frame 26 and try to use "Decode As..." on L2CAP PSM 0x1001 and choose
MCAP.

It would be very nice if someone upload real MCAP (HDP) logs.


You are receiving this mail because:
  • You are watching all bug changes.