https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16684

            Bug ID: 16684
           Summary: Miscellaneous items on TCAP dissector
           Product: Wireshark
           Version: 3.2.3
          Hardware: x86
                OS: Windows 10
            Status: UNCONFIRMED
          Severity: Minor
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: [email protected]
          Reporter: [email protected]
  Target Milestone: ---

Created attachment 17877
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17877&action=edit
miscellaneous TCAP traces

Build Information:
3.2.3 (v3.2.3-0-gf39b50865a13)

Compiled (64-bit) with Qt 5.12.6, with WinPcap SDK (WpdPack) 4.1.2, with GLib
2.52.3, with zlib 1.2.11, with SMI 0.4.8, with c-ares 1.15.0, with Lua 5.2.4,
with GnuTLS 3.6.3 and PKCS #11 support, with Gcrypt 1.8.3, with MIT Kerberos,
with MaxMind DB resolver, with nghttp2 1.39.2, with brotli, with LZ4, with
Zstandard, with Snappy, with libxml2 2.9.9, with QtMultimedia, with automatic
updates using WinSparkle 0.5.7, with AirPcap, with SpeexDSP (using bundled
resampler), with SBC, with SpanDSP, with bcg729.

Running on 64-bit Windows 10 (1909), build 18363, with Intel(R) Core(TM)
i7-10510U CPU @ 1.80GHz (with SSE4.2), with 16171 MB of physical memory, with
locale English_United States.1252, with light display mode, without HiDPI, with
Npcap version 0.9989, based on libpcap version 1.9.1, with GnuTLS 3.6.3, with
Gcrypt 1.8.3, with brotli 1.0.2, without AirPcap, binary plugins supported (19
loaded).

Built using Microsoft Visual Studio 2019 (VC++ 14.24, build 28316).

--
Hi there,

There is a number of things in the TCAP dissector I´d like to report. I´m not
sure if they'll be considered bugs or enhancements. That is for you to judge.

- Tag class is not decoded (universal, application, context-specific,
private-use) where applicable.
- Only first byte of every field is shown.
- No separation between sub-layers (transaction, component, dialogue).

You can find all that in all messages in the trace attached. In order to get
the messages properly decoded, use M2PA protocol over SCTP port 3565.

Thank you!
Alex

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <[email protected]>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:[email protected]?subject=unsubscribe

Reply via email to