Wireshark-bugs: [Wireshark-bugs] [Bug 4062] New: T.125 MCS: connect-initial/response 4 bytes lef
Date: Tue, 29 Sep 2009 01:19:14 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4062

           Summary: T.125 MCS: connect-initial/response 4 bytes left to
                    decode ?
           Product: Wireshark
           Version: SVN
          Platform: Other
        OS/Version: Gentoo
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: [email protected]
        ReportedBy: [email protected]


Created an attachment (id=3714)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3714)
T.125 protocol

Build Information:
Version 1.3.1 (SVN Rev 30188 from /trunk)

Copyright 1998-2009 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.16.6, with GLib 2.20.5, with libpcap 1.0.0, with libz
1.2.3, without POSIX capabilities, with libpcre 7.9, without SMI, without
c-ares, without ADNS, with Lua 5.1, without Python, without GnuTLS, with Gcrypt
1.4.4, without Kerberos, with GeoIP, without PortAudio, without AirPcap, with
new_packet_list.

Running on Linux 2.6.31.1, with libpcap version 1.0.0, Gcrypt 1.4.4.

Built using gcc 4.3.2.

--
The content of the 2 attached packets from a sniffed remote desktop session is
not decoded at position 0xbc - 0xbf of packet #1 and position 0x70 - 0x74 of
packet #2 respectively. The hex values of each 4byte sequence are the same:
0x04 0x82 0x01 0x1b.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.