Hello,

I am trying to use Wireshark to analyze a Bluetooth trace from an Android 
device (BTSnoop format).
Wireshark has identified a lot of HCI traffic as "HCI Vendor Commands" (for 
instance, command 0x0154) but does not display any more information about them.

When reading some of the source code from dissectors, I found that Broadcom HCI 
vendor commands should be able to be interpreted by Wireshark (for instance, 
command 0x0154 should be "LE Multi Advertising" with relevant parameters).

Is there something specific I should be doing ?
I am using Wireshark 3.4.7 and I attached a relevant extract of the capture.

Any help would be greatly appreciated!


Attachment: Export-1.log
Description: Binary data

___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-requ...@wireshark.org?subject=unsubscribe

Reply via email to