https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15503
--- Comment #15 from Tomasz Mon <deso...@gmail.com> ---
Latest master now dissects the USB Midi data from the pcap file attached here.
While there is quite a few data yet to be dissected, you can start your reverse
engineering effort by trying to figure out the layout of MIDI System Exclusive
commands.
Eample SysEx message is in:
Frame 361: 100 bytes on wire (800 bits), 100 bytes captured (800 bits) on
interface 0
USB URB
USB Audio
MIDI System Exclusive Command
SysEx message start: 0xf0
Manufacturer ID: Serato Inc LP (0x00207f)
Device ID: 0x01
Not dissected yet (report to wireshark.org)
EOX: 0xf7
The data that is marked as "Not dissected yet (report to wireshark.org)" will
not be dissected unless the specification of this is available or the protocol
gets reverse engineered.
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe