Wireshark-bugs: [Wireshark-bugs] [Bug 12763] tshark print 'TCP flags' with non-ascci chars on so
Comment # 8
on bug 12763
from Francois-Xavier Le Bail
1) LANG=C
$ ./tshark -r pkt-1.pcap
1 0.000000000 192.139.46.66 ? 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -r pkt-1.pcap|grep TCP
1 0.000000000 192.139.46.66 â 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -V -r pkt-1.pcap
[...]
[TCP Flags: ???????AP???]
[...]
$ ./tshark -V -r pkt-1.pcap|grep 'TCP Flags'
[...]
[TCP Flags: ·······AP···]
[...]
$ ./tshark -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT
1 0.000000000 192.139.46.66 -> 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -V -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT
[...]
[TCP Flags: ???????AP???]
[...]
2) LANG=C.UTF-8
$ ./tshark -r pkt-1.pcap
1 0.000000000 192.139.46.66 â 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -r pkt-1.pcap|grep TCP
1 0.000000000 192.139.46.66 â 192.168.108.129 TCP 1506 [TCP segment of a
reassembled PDU]
$ ./tshark -V -r pkt-1.pcap
[...]
[TCP Flags: ·······AP···]
[...]
$ ./tshark -V -r pkt-1.pcap|grep 'TCP Flags'
[TCP Flags: ·······AP···]
$ ./tshark -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT
1 0.000000000 192.139.46.66 iconv: illegal input sequence at position 30
$ ./tshark -V -r pkt-1.pcap | iconv -f UTF-8 -t ASCII//TRANSLIT
[TCP Flags: iconv: illegal input sequence at position 3090
with LANG=C and iconv, it's better for the arrow, not for the dot.
with LANG=C.UTF-8 and iconv, errors.
See the changes when filter with grep.
Why not just '->' and '.' for tshark ?
You are receiving this mail because:
- You are watching all bug changes.