Wireshark-bugs: [Wireshark-bugs] [Bug 5459] Riverbed TCP options dissection (options 0x4c 0x4e)
Date: Thu, 9 Dec 2010 15:46:15 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5459

--- Comment #4 from James Deucker <[email protected]> 2010-12-09 15:46:15 PST ---
(In reply to comment #3)
> Hi,
> 
> Riverbed has an internal dissector for their TCP options as well. An engineer
> there has been working on getting it ready for inclusion in Wireshark. I'll
> attach it here for comparison in the next day or so.
> 
> (Disclosure: I'm also a Riverbed employee.)


Thanks Gerald, I know Riverbed have an internal one, I'd be really interested
in seeing what they end up submitting.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.