ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 7440] New: DVB-CI/CI+: dissect the payload of LSC messages

Date: Thu, 5 Jul 2012 14:07:24 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7440

           Summary: DVB-CI/CI+: dissect the payload of LSC messages
           Product: Wireshark
           Version: SVN
          Platform: x86
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Dissection engine (libwireshark)
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: wireshark@xxxxxxxxx


Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
Dear all,

using the lsc (low-speed communication) resource, a DVB-CI module can ask the
host to open an ip connection on its behalf.

The attached patch extracts the ip protocol and target port from a connection
request. If a dissector is registered for this protocol and port, subsequent
payloads are passed on to this dissector.

Since many people run their proprietary protocols on top of lsc, I made this
payload dissection configurable and added a boolean preference that defaults to
off (i.e. dissect as data).

Thanks for review and merging. The attached example shows a DVB-CI module that
sends a http request to www.google.com via the DVB-CI host.

Best regards,

   Martin

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.