ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 2990] New: Decode event in an X11 SendEvent request

Date: Wed, 22 Oct 2008 06:47:48 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2990

           Summary: Decode event in an X11 SendEvent request
           Product: Wireshark
           Version: SVN
          Platform: PC
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: tom@xxxxxxxxxx


Created an attachment (id=2391)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2391)
Patch to decode event in a SendEvent request

Build Information:
wireshark 1.1.2 (SVN Rev 26512)

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.12.12, with GLib 2.16.6, with libpcap 0.9.8, with libz
1.2.3, with POSIX capabilities (Linux), with libpcre 7.3, without SMI, without
c-ares, without ADNS, without Lua, with GnuTLS 2.0.4, with Gcrypt 1.4.0,
without
Kerberos, without PortAudio, without AirPcap.

Running on Linux 2.6.26.5-45.fc9.x86_64, with libpcap version 0.9.8.

Built using gcc 4.3.0 20080428 (Red Hat 4.3.0-8).

--
The attached patch extends the X11 protocol dissector to decode the event
contained in a SendEvent request.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.