Bug ID |
9397
|
Summary |
Add RTP/RTCP dissector setup based on the replies found in rtpproxy dissector
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
unspecified
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Enhancement
|
Priority |
Low
|
Component |
Wireshark
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 12037 [details]
Initial patch
Build Information:
Version 1.11.1 (SVN Rev Unknown from unknown)
Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 2.24.22, with Cairo 1.13.1, with Pango 1.36.0, with
GLib 2.38.1, with libpcap, with libz 1.2.8, with POSIX capabilities (Linux),
without libnl, with SMI 0.4.8, with c-ares 1.10.0, with Lua 5.2, without
Python,
with GnuTLS 3.1.16, with Gcrypt 1.5.3, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built Aug 4 2013 06:59:20), with AirPcap.
Running on Linux 3.11.6-301.fc20.x86_64, with locale ru_RU.UTF-8, with libpcap
version 1.4.0, with libz 1.2.8, GnuTLS 3.1.16, Gcrypt 1.5.3, without AirPcap.
Intel(R) Core(TM) i5-2415M CPU @ 2.30GHz
Built using gcc 4.8.2 20131017 (Red Hat 4.8.2-1).
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
Hello All!
RTPproxy replies with IP-address and port where it will listen for RTP/RTCP and
from where it will send RTP/RTCP. We can use that information for automatic
RTP/RTP dissection (similar to SIP/RTSP/etc).
This patch adds RTP protocol dissection based on information from RTPproxy.
You are receiving this mail because:
- You are watching all bug changes.