Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 4440] New: New PNRP Dissector

Date: Fri, 29 Jan 2010 09:36:46 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4440

           Summary: New PNRP Dissector
           Product: Wireshark
           Version: unspecified
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: jan.gerbecks@xxxxxxxxxxxxxxx


Created an attachment (id=4226)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4226)
PNRP Dissector Patch file

Build Information:
Version 1.3.3 (SVN Rev 31727 from /trunk)

Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.18.2, with GLib 2.22.2, with libpcap 1.0.0, with libz
1.2.3, without POSIX capabilities, without libpcre, without SMI, without
c-ares,
without ADNS, without Lua, without Python, without GnuTLS, without Gcrypt, with
MIT Kerberos, without GeoIP, without PortAudio, without AirPcap, with
new_packet_list.

Running on Darwin 10.2.0 (MacOS 10.6.2), with libpcap version 1.0.0.

Built using gcc 4.2.1 (Apple Inc. build 5646) (dot 1).

--
Hello,

as part of one of my university course studies, I wrote a PNRP Dissector for
Wireshark.
As Microsoft is more and more using PNRP in its new OSes, it seemed like an
interesting project, to add a Wireshark dissector to allow further analysis of
the protocol.

It was my first attempt at writing a Wireshark dissector and actually writing
something in C, but I tried to follow all the coding guidelines :)
Any hints about improving the dissector are greatly appreciated :)
>From a feature standpoint, it is only missing a way to parse a EXTENDED_PAYLOAD
segment, as I ran out of time.

I successfully build and used the dissector under Mac OSX 10.6 and Windows 7.
I also ran the fuzzy test without finding any hiccups.

Well, I hope the dissector can be integrated into the main project and be of
use to other people out there.

Take care,
Jan

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.