ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-dev: Re: [Wireshark-dev] [PATCH] Dissector hooks: Small and Simple additions

From: Shehjar Tikoo <shehjart@xxxxxxxxxxxxxxx>
Date: Tue, 06 Mar 2007 17:45:51 +1100
Hi everyone

Guy Harris wrote:
Also, can this be done with the existing tap mechanism, by searching for particular fields in the generated protocol tree?

Thanks. Now I have a basic tap working for me, which uses the generated
protocol tree to to get the RPC starting offset and takes it from there
to the NFS anonymizer.

My one question here is, is there a way I can run the anonymizer tap
selectively? For eg. right now, I added the tap using the call below:

	register_stat_cmd_arg("nfsanon", nfs_anon_tap_init, NULL);

which allows me to run the tap only when I specify -z nfsanon as one of
the command line args. Can I continue using this or is there another way
to enable/disable taps from the command line, in tshark?

Thanks again
Shehjar