https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15503

--- Comment #15 from Tomasz Mon <deso...@gmail.com> ---
Latest master now dissects the USB Midi data from the pcap file attached here.

While there is quite a few data yet to be dissected, you can start your reverse
engineering effort by trying to figure out the layout of MIDI System Exclusive
commands.

Eample SysEx message is in:
Frame 361: 100 bytes on wire (800 bits), 100 bytes captured (800 bits) on
interface 0
USB URB
USB Audio
MIDI System Exclusive Command
    SysEx message start: 0xf0
    Manufacturer ID: Serato Inc LP (0x00207f)
    Device ID: 0x01
    Not dissected yet (report to wireshark.org)
    EOX: 0xf7

The data that is marked as "Not dissected yet (report to wireshark.org)" will
not be dissected unless the specification of this is available or the protocol
gets reverse engineered.

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to