McAtee, Kip wrote:
> +if (octet[0] == 0x00 && octet[1] == 0x21)
> +{
> +call_dissector(ppp_handle, next_tvb, pinfo, tree);
> +}
So is this for VC-multiplexed PPPoA (for IP)? If so, you might want to
use pntohs() on the two octets and compare a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Wireshark 1.0.1pre1 is now available for testing. Installers for Windows, OS X,
and source code can be downloaded immediately from
http://www.wireshark.org/download/prerelease/wireshark-setup-1.0.1pre1.exe
http://www.wireshark.org/download/prerelease/
Greetings-
I incorporated Guy Harris's suggestions and entered the patch into
Bugzilla. I appreciate your thoughtful review.
Thanks-
Kip
E-mail confidentiality.
This e-mail contains confidential and / or privileged information belonging to
Spirent C
The Buildbot has detected a new failure of Windows-XP-x86 on Wireshark
(development).
Full details are available at:
http://buildbot.wireshark.org/trunk/builders/Windows-XP-x86/builds/4496
Buildbot URL: http://buildbot.wireshark.org/trunk/
Buildslave for this Build: windows-xp-x86
Build Reason
nlpid.h #defines Q2119 as 0x0c. However, the X.263 table I checked
from the ITU's web site
says this value is 0x0a. There are comments that indicate the same
value can have a slightly
different meaning depending on context, so I hesitate to just file a
bug report
Also, should I see