Wireshark-bugs: [Wireshark-bugs] [Bug 5425] New: Support for dissecting SLL type 0x0C frames (ra
Date: Sun, 21 Nov 2010 04:02:30 -0800 (PST)

           Summary: Support for dissecting SLL type 0x0C frames (raw
                    SocketCAN with Linux Cooked encapsulation)
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: [email protected]
        ReportedBy: [email protected]

Build Information:
Version 1.5.0-SVN-34987 (SVN Rev 34987 from /trunk)

Copyright 1998-2010 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO

Compiled (64-bit) with GTK+ 2.16.6, with GLib 2.24.2, with WinPcap (version
unknown), with libz 1.2.3, without POSIX capabilities, without libpcre, without
SMI, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS 2.8.5, with
Gcrypt 1.4.5, without Kerberos, with GeoIP, with PortAudio V19-devel (built Nov
20 2010), with AirPcap.

Running on 64-bit Windows 7, build 7600, with WinPcap version 4.1.2 (packet.dll
version, based on libpcap version 1.0 branch 1_0_rel0b (20091008),
GnuTLS 2.8.5, Gcrypt 1.4.5, without AirPcap.

Built using Microsoft Visual C++ 9.0 build 30729

Wireshark is Open Source Software released under the GNU General Public

Check the man page and http://www.wireshark.org for more information.
It may be useful to support dissection of raw Controller Area Network frames
encapsulated in SLL Link Type 0x0C packets, in order to support further
dissection of the content within. 

These frames typically appear when capturing on SocketCAN/Controller Area
Network interfaces using versions of LibPCap without "native" SocketCAN/Linux
support (and therefore exist in older capture files from interfaces of this
type), or when capturing on the "any" interface under Linux with a SocketCAN
interface active.

Thanks in advance.

Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.