![]() Because of the way PER specification encodes length determinant >= 16K, we cannot get the PDU length from a fixed position at the beginning of the message. So drop tcp_dissect_pdus() (that cannot work for this use case) and manually request extra chunks until the full PDU is available. Bug: 8221 Change-Id: I91e32160fc2180f74b3edb9699ba510798b46983 Reviewed-on: https://code.wireshark.org/review/18808 Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com> |
||
---|---|---|
.. | ||
CMakeLists.txt | ||
Makefile.am | ||
SABP-CommonDataTypes.asn | ||
SABP-Constants.asn | ||
SABP-Containers.asn | ||
SABP-IEs.asn | ||
SABP-PDU-Contents.asn | ||
SABP-PDU-Descriptions.asn | ||
packet-sabp-template.c | ||
sabp.cnf |