Wireshark-bugs: [Wireshark-bugs] [Bug 5651] TCP analysis is not performed if options field has b
Date: Wed, 09 Oct 2013 16:41:33 +0000

changed bug 5651

What Removed Added
Attachment #5876 is obsolete   1

Comment # 10 on bug 5651 from
Created attachment 11749 [details]
Allows for TCP seq analysis to process when TCP option are sliced

If the capture is frame sliced at or beyond the TCP 20-byte fixed length
portion of the TCP header and tcp_analyze_seq is enabled, TCP analysis is not
conducted:  As much of the options field as possible should be dissected and
TCP analysis should be performed.
Patch was tested with snaplens of: 
49 and 52:  (TCP fixed header incomplete) TCP analysis NOT performed.
54:  (Fixed header complete but entire options wfield was sliced off) TCP
analysis ran and was OK.
64:  (Fixed header complete but a portion of the options field was missing)
Options were dissected to the extent possible.  TCP analysis ran and was OK.
66:  (Fixed header and options complete) TCP analysis ran and was OK.
70:  (Fixed header and options complete plus  4 bytes) TCP analysis ran and was
OK.


You are receiving this mail because:
  • You are watching all bug changes.