Wireshark-bugs: [Wireshark-bugs] [Bug 1678] "Follow TCP Stream" adds extra 0A char
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1678
------- Comment #2 from peter@xxxxxxxxxx 2007-07-10 13:31 GMT -------
Yes, pretty sure -- with tcpdump, it looks like:
% tcpdump -r dump.out -Xnn | grep "0d 0a"
reading from file dump.out, link-type EN10MB (Ethernet)
0x0050: 2048 5454 502f 312e 310d 0a55 7365 722d .HTTP/1.1..User-
0x00a0: 432d 312e 310d 0a43 6f6e 6e65 6374 696f C-1.1..Connectio
0x0100: 2d37 6433 3462 3135 3630 3266 380d 0a48 -7d34b15602f8..H
0x0120: 6269 6f6d 6564 2e61 740d 0a54 7261 6e73 biomed.at..Trans
0x0140: 756e 6b65 640d 0a0d 0a unked....
0x0030: 038a 2914 3765 300d 0a2d 2d2d 2d2d 2d2d ..).7e0..-------
In the second to last line, theres the two CRLFs.
In contrast, the saved file from wireshark has this in it:
% xxd /tmp/tcpstream.txt | grep "0d 0a" | head -n10
0000020: 502f 312e 310d 0a55 7365 722d 4167 656e P/1.1..User-Agen
0000070: 310d 0a43 6f6e 6e65 6374 696f 6e3a 2043 1..Connection: C
00000d0: 3462 3135 3630 3266 380d 0a48 6f73 743a 4b15602f8..Host:
00000f0: 6564 2e61 740d 0a54 7261 6e73 6665 722d ed.at..Transfer-
0000110: 640d 0a0d 0a0a 3765 300d 0a2d 2d2d 2d2d d.....7e0..-----
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.