• News
  • Get Acquainted ▼
    • About
    • Download
    • Blog
  • Get Help ▼
    • Ask a Question
    • FAQs
    • Documentation
    • Mailing Lists
    • Online Tools
    • Wiki
    • Issue Tracker
  • Develop ▼
    • Get Involved
    • Developer's Guide
    • Browse the Code
    • Latest Builds
  • Project Host
  • SharkFest
Wireshark-bugs: [Wireshark-bugs] [Bug 10283] Decoding websocket protocol client side very large
Date Index · Thread Index · Other Months · All Mailing Lists
Date Prev · Date Next · Thread Prev · Thread Next
From: bugzilla-daemon@xxxxxxxxxxxxx
Date: Fri, 18 Jul 2014 20:11:43 +0000

Comment # 7 on bug 10283 from Gerrit Code Review
Change 3098 merged by Evan Huus:
WebSocket: increase max unmask payload size to 256K and indicate that packet is
truncated is going above the new limit

https://code.wireshark.org/review/3098


You are receiving this mail because:
  • You are watching all bug changes.
  • References:
    • [Wireshark-bugs] [Bug 10283] New: Decoding websocket protocol client side very large message flags an error when there is none
      • From: bugzilla-daemon
  • Prev by Date: [Wireshark-bugs] [Bug 10283] Decoding websocket protocol client side very large message flags an error when there is none
  • Next by Date: [Wireshark-bugs] [Bug 10283] Decoding websocket protocol client side very large message flags an error when there is none
  • Previous by thread: [Wireshark-bugs] [Bug 10283] Decoding websocket protocol client side very large message flags an error when there is none
  • Next by thread: [Wireshark-bugs] [Bug 10283] Decoding websocket protocol client side very large message flags an error when there is none
  • Index(es):
    • Date
    • Thread
Wireshark and the "fin" logo are registered trademarks of the Wireshark Foundation Back to top