https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3088
           Summary: RTP events patch to dissect Cisco NSE packets
           Product: Wireshark
           Version: SVN
          Platform: PC
        OS/Version: Windows XP
            Status: NEW
          Severity: Normal
          Priority: Medium
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: carunach@xxxxxxxxx
Build Information:
Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.12.11, with GLib 2.16.5, with WinPcap (version unknown),
with libz 1.2.3, without POSIX capabilities, with libpcre 7.0, with SMI 0.4.8,
with c-ares 1.5.2, without ADNS, with Lua 5.1, with GnuTLS 2.3.8, with Gcrypt
1.4.1, with MIT Kerberos, with PortAudio V19-devel (built Nov  7 2008), with
AirPcap.
Running on Windows XP Service Pack 2, build 2600, with WinPcap version 4.0.2
(packet.dll version 4.0.0.1040), based on libpcap version 0.9.5, without
AirPcap.
Built using Microsoft Visual C++ 8.0 build 50727
--
This patch adds the ability to identify Cisco NSE packets.
http://www.iana.org/assignments/media-types/audio/vnd.cisco.nse
In addition to the NSE(s) described in the above document, the patch also
decodes two additional NSE(s): Modem relay capability (199) and 
Modem Relay indication (203). 
Following files have been attached along with sample sniffer captures:
packet-rtp-events.c.patch       
packet-rtp-events.h.patch       
Thanks,
Arun
-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.