Hi Jaap,
now the mikey dissector is working as I was looking for.
I suggest you to add the two lines :
dissector_add("udp.port", 4359, mikey_handle);
dissector_add("tcp.port", 4359, mikey_handle);
after the line
dissector_add_string("key_mgmt", "mikey", mikey_handle);
in the proto_reg_handoff_mikey() function as you suggested.
The port 4359 are ufficially assigned by IANA.
I cannot commit the changes because I haven't the right.
Thanks again.
Filippo
2007/9/18, Filippo Margiotta <
filippo.margiotta@xxxxxxxxx>:Hi Jaap,
tomorrow I will test your suggestion.
Thank you very much!
Filippo
2007/9/18, Jaap Keuter <
jaap.keuter@xxxxxxxxx
>:Hi,
Add this line to proto_reg_handoff_mikey() in
epan/dissectors/packet-
mikey.c:
dissector_add("udp.port", 2269, mikey_handle);
as I assume you're using the IANA registered UDP port.
Thanx,
Jaap
Filippo Margiotta wrote:
> Hi All,
> I would like to use the mikey dissector in a different way it is used now.
> At the moment, a mikey packet is captured only as key-mgmt session
> attributes in the SDP protocol.
>
> Could somebody give me, please, some information about what to modify in
> the current implementation to have a mikey capture dissector that can
> directly parse an UDP datagram containing directly a mikey message?
>
> Thanks in advance,
> Filippo
>
_______________________________________________
Wireshark-dev mailing list
Wireshark-dev@xxxxxxxxxxxxx
http://www.wireshark.org/mailman/listinfo/wireshark-dev