Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 4455] New: AppleMIDI - dissector for lightweight session p

Date: Wed, 3 Feb 2010 05:36:29 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4455

           Summary: AppleMIDI - dissector for lightweight session protocol
                    used in Apple network MIDI
           Product: Wireshark
           Version: 1.3.x (Experimental)
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: t.erichsen@xxxxxx


Build Information:
Compiled with GTK+ 2.16.6, with GLib 2.20.5, with WinPcap (version unknown),
with libz 1.2.3, without POSIX capabilities, without libpcre, without SMI, with
c-ares 1.7.0, with Lua 5.1, without Python, with GnuTLS 2.8.5, with Gcrypt
1.4.5, without Kerberos, with GeoIP, with PortAudio V19-devel (built Feb  3
2010), with AirPcap, with new_packet_list.

Running on Windows XP Professional x64 Edition Service Pack 2, build 3790, with
WinPcap version 4.1.1 (packet.dll version 4.1.0.1753), based on libpcap version
1.0 branch 1_0_rel0b (20091008), GnuTLS 2.8.5, Gcrypt 1.4.5, without AirPcap.

Built using Microsoft Visual C++ 9.0 build 21022
--
AppleMIDI is a lightweight session control protocol.  It is used by Apple
since OX 10.4 to allow users to interconnect MIDI-capable application over
network-links.  The MIDI-data itself is sent via RTP (RFC 4695) between the two
interconnected computers on the session that was negotiated using this
protocol.

The code has been built with 1.2.6, and 1.3.3 for Windows 32bit and 64bit.
The fuzztest has been done on 1.2.6, no problems were reported.
The fuzztest of the 1.3.3 checked out from the subversion server was not
functional, therefore only the 1.2.6 test was performed.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.