Hi all,
I've been studying the MSNSLP/P2P protocol in detail lately and got a
bit frustrated by it all, and to try and clear things up a bit I wrote
a tiny app to help me study the mess. The app lets you open switchboard
session dumps taken by Ethereal using its "C Arrays" dumping method
("Follow TCP Stream" -> Check "C Arrays" -> "Save As").
Screenshot:
http://jblinux.net/tmp/Screenshot-msnslpview.png
It's just a quick 'n dirty one-evening hack, so it's probably got lots
of bugs, but in case anyone finds it useful I put it up here:
http://www.jblinux.net/gmessenger/msnslpview-20051120.tar.gz
Requires python and pygtk to run, haven't checked exact version dependencies (I'm running Python 2.4.2 and pygtk 2.8.2).
Ole André