https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4616
Summary: update for Bug 4560: extract specified diameter AVPs
from large capture files
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Normal
Priority: Low
Component: TShark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: andrejk@xxxxxxxxxx
Build Information:
TShark 1.3.4 (SVN Rev 32276 from /trunk)
Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GLib 2.22.4, with libpcap 1.0.0, with libz 1.2.3, without POSIX
capabilities, without libpcre, without SMI, without c-ares, without ADNS, with
Lua 5.1, without Python, with GnuTLS 2.8.5, with Gcrypt 1.4.4, with MIT
Kerberos, without GeoIP.
Running on Linux 2.6.32.9-70.fc12.i686, with libpcap version 1.0.0, GnuTLS
2.8.5, Gcrypt 1.4.4.
Built using gcc 4.4.3 20100127 (Red Hat 4.4.3-4).
--
original patch was: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4560
tap-diameter-avp.patch:
- make diameter.cmd_code configurable rather than hard coded in
- more fields in the output
- documetation/man pages + usage examples
- switch option parser from stdlib to glib to avoid troubles with M$ c++
diameter-dict.patch
remove strage spaces in the AVP names.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.