Hi Jaap,
now the mikey dissector is working as I was looking for.

I suggest you to add the two lines :

    dissector_add("udp.port", 4359, mikey_handle);
    dissector_add("tcp.port", 4359, mikey_handle);

after the line
    dissector_add_string("key_mgmt", "mikey", mikey_handle);

in the proto_reg_handoff_mikey() function as you suggested.

The port 4359 are ufficially assigned by IANA.

I cannot commit the changes because I haven't the right.
Thanks again.
Filippo



2007/9/18, Filippo Margiotta <[EMAIL PROTECTED]>:
>
> Hi Jaap,
> tomorrow I will test your suggestion.
>
> Thank you very much!
> Filippo
>
>
>
> 2007/9/18, Jaap Keuter <[EMAIL PROTECTED] >:
> >
> > Hi,
> >
> > Add this line to proto_reg_handoff_mikey() in
> > epan/dissectors/packet- mikey.c:
> >
> >    dissector_add("udp.port", 2269, mikey_handle);
> >
> > as I assume you're using the IANA registered UDP port.
> >
> > Thanx,
> > Jaap
> >
> > Filippo Margiotta wrote:
> > > Hi All,
> > > I would like to use the mikey dissector in a different way it is used
> > now.
> > > At the moment, a mikey packet is captured only as key-mgmt session
> > > attributes in the SDP protocol.
> > >
> > > Could somebody give me, please, some information about what to modify
> > in
> > > the current implementation to have a mikey capture dissector that can
> > > directly parse an UDP datagram containing directly a mikey message?
> > >
> > > Thanks in advance,
> > > Filippo
> > >
> >
> > _______________________________________________
> > Wireshark-dev mailing list
> > [email protected]
> > http://www.wireshark.org/mailman/listinfo/wireshark-dev
> >
>
>
_______________________________________________
Wireshark-dev mailing list
[email protected]
http://www.wireshark.org/mailman/listinfo/wireshark-dev

Reply via email to