Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3171] New: Enhancement of packet-bootp.c to the decode of

Date: Sat, 3 Jan 2009 10:29:56 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3171

           Summary: Enhancement of packet-bootp.c to the decode of options
                    176 and 242
           Product: Wireshark
           Version: SVN
          Platform: PC
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: alindber@xxxxxxxxx



Alex Lindberg <alindber@xxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #2620|                            |review_for_checkin?
               Flag|                            |


Created an attachment (id=2620)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2620)
diff file to update epan/dissectors/packet-bootp.c

Build Information:
./tshark -v
TShark 1.1.2 (SVN Rev 27149)

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GLib 2.16.6, with libpcap 0.9.8, with libz 1.2.3.3, with POSIX
capabilities (Linux), with libpcre 7.6, with SMI 0.4.7, without c-ares, with
ADNS, without Lua, with GnuTLS 2.4.2, with Gcrypt 1.4.1, with MIT Kerberos,
without GeoIP.

Running on Linux 2.6.26-1-686, with libpcap version 0.9.8.

Built using gcc 4.3.2.
rse@RSE-Sniffer:~/DEV/WireShark.org$ 

--
Enhancement of packet-bootp.c to add optional decode of options 176 and 242
used by Avaya in support of their IP Phones.

These options are used to provide server and registration information during
the bootp process.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.