Wireshark-bugs: [Wireshark-bugs] [Bug 1678] "Follow TCP Stream" adds extra 0A char
Date: Tue, 10 Jul 2007 13:31:41 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1678





------- Comment #2 from peter@xxxxxxxxxx  2007-07-10 13:31 GMT -------
Yes, pretty sure -- with tcpdump, it looks like:

% tcpdump -r dump.out -Xnn | grep "0d 0a"
reading from file dump.out, link-type EN10MB (Ethernet)
        0x0050:  2048 5454 502f 312e 310d 0a55 7365 722d  .HTTP/1.1..User-
        0x00a0:  432d 312e 310d 0a43 6f6e 6e65 6374 696f  C-1.1..Connectio
        0x0100:  2d37 6433 3462 3135 3630 3266 380d 0a48  -7d34b15602f8..H
        0x0120:  6269 6f6d 6564 2e61 740d 0a54 7261 6e73  biomed.at..Trans
        0x0140:  756e 6b65 640d 0a0d 0a                   unked....
        0x0030:  038a 2914 3765 300d 0a2d 2d2d 2d2d 2d2d  ..).7e0..-------

In the second to last line, theres the two CRLFs.
In contrast, the saved file from wireshark has this in it:

% xxd /tmp/tcpstream.txt | grep "0d 0a" | head -n10
0000020: 502f 312e 310d 0a55 7365 722d 4167 656e  P/1.1..User-Agen
0000070: 310d 0a43 6f6e 6e65 6374 696f 6e3a 2043  1..Connection: C
00000d0: 3462 3135 3630 3266 380d 0a48 6f73 743a  4b15602f8..Host:
00000f0: 6564 2e61 740d 0a54 7261 6e73 6665 722d  ed.at..Transfer-
0000110: 640d 0a0d 0a0a 3765 300d 0a2d 2d2d 2d2d  d.....7e0..-----


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.