ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-commits: [Wireshark-commits] rev 43752: /trunk/epan/dissectors/ /trunk/epan/dissectors/:

Date: Mon, 16 Jul 2012 14:23:28 GMT
http://anonsvn.wireshark.org/viewvc/viewvc.cgi?view=rev&revision=43752

User: alagoutte
Date: 2012/07/16 07:23 AM

Log:
 From Zdravko Velinov via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7483
 Enhancements to the HP ERM protocol dissector 
 
 I have done some reverse engineering of the HP ERM protocol. I had injected
 some 802.1Q frames on a network that contained a HP ProCurve 5406zl switch,
 then I examined the resulting encapsulated traffic. It was quite easy to spot
 the VLAN identifier and the priority field because part of the header closely
 resembled the 802.1Q header. There were just some minor differences in the
 priority numbering between 802.1Q and HP ERM.
 
 
 From me :
 Add Modeline info
 Fix Clang warning

Directory: /trunk/epan/dissectors/
  Changes    Path               Action
  +83 -13    packet-hp-erm.c    Modified