Wireshark-bugs: [Wireshark-bugs] [Bug 8275] Basic dissector: FIPA/ACL Message protocol over TCP
Date: Tue, 05 Nov 2013 03:21:59 +0000

Comment # 24 on bug 8275 from
> 
> Many of the packets in your sample capture (specifically of types request,
> subscribe, propose and cancel) show up as malformed with the current version
> of the patch. Is this correct (the packets are malformed) or is it a bug in
> the dissector?

Yes! It was a bug. When porting to wmem, I forgot to re-initialise a wmem_list.
The problem was only happening with reassembled packets and packets containing
more than one message. It was fixed.

> 
> Also, once the dissector is finished, is it OK if we check it in without all
> the extra logging and testing code? It's not necessary for the actual
> dissection so I'd generally prefer not to have it included there. If you do
> want to include a test suite to run with the dissector it should probably go
> in the test/ instead so it is runnable through our automated test suite.
> This is probably not necessary though.

Absolutely. The logging was for me to help debugging. If you prefer not to
check it in, I have nothing to say.


> 
> Two final notes on port range registration:
> - please use MAX_TCP_PORT instead of hard-coding 65536 when registering the
> range string

DONE!

> - I think you can use dissector_add_uint_range and
> dissector_delete_uint_range which will be simpler than calling range_foreach
> with your own callback functions?
> 

Yes! Much simpler this way. Also done.


You are receiving this mail because:
  • You are watching all bug changes.