https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5810
Chris Maynard <christopher.maynard@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution| |FIXED
--- Comment #10 from Chris Maynard <christopher.maynard@xxxxxxxxx> 2011-04-11 10:51:54 PDT ---
OK, so that was pretty easy to implement. I never really looked at ICMPv6
before. I guess I was expecting something more radically different from
ICMPv4, but it's basically the same thing. Still, the capture files did help
to verify proper operation, and there were some minor differences, so thanks
for those.
Anyway, this is now fixed in r36561. Like ICMPv4, I also added a tshark tap;
however, a Wireshark tap has not yet been implemented. Guy seemed to suggest
that we might be able to make use of the stats_tree stuff for ICMPv4, so that
almost certainly applies here as well. At some point in the hopefully not too
distant future, I'll try to take a look at that. If it can be used, then I'll
convert it over; otherwise it could be awhile before I ever get around to
adding a Wireshark tap to either ICMPv4 or ICMPv6.
Lastly, the ICMPv6 payload also appears to carry the sender's timestamp, so
like ICMPv4 (see bug 5770), this information might be used to estimate the
total SRT. My initial results were not very good with ICMPv4 though, but this
might be a future area of interest to someone.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.