ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-dev: Re: [Wireshark-dev] about mikey dissector

From: "Filippo Margiotta" <filippo.margiotta@xxxxxxxxx>
Date: Wed, 19 Sep 2007 09:51:47 +0200
Hi Jaap,
now the mikey dissector is working as I was looking for.

I suggest you to add the two lines :

    dissector_add("udp.port", 4359, mikey_handle);
    dissector_add("tcp.port", 4359, mikey_handle);

after the line
    dissector_add_string("key_mgmt", "mikey", mikey_handle);

in the proto_reg_handoff_mikey() function as you suggested.

The port 4359 are ufficially assigned by IANA.

I cannot commit the changes because I haven't the right.
Thanks again.
Filippo



2007/9/18, Filippo Margiotta < filippo.margiotta@xxxxxxxxx>:
Hi Jaap,
tomorrow I will test your suggestion.

Thank you very much!
Filippo



2007/9/18, Jaap Keuter < jaap.keuter@xxxxxxxxx >:
Hi,

Add this line to proto_reg_handoff_mikey() in
epan/dissectors/packet- mikey.c:

   dissector_add("udp.port", 2269, mikey_handle);

as I assume you're using the IANA registered UDP port.

Thanx,
Jaap

Filippo Margiotta wrote:
> Hi All,
> I would like to use the mikey dissector in a different way it is used now.
> At the moment, a mikey packet is captured only as key-mgmt session
> attributes in the SDP protocol.
>
> Could somebody give me, please, some information about what to modify in
> the current implementation to have a mikey capture dissector that can
> directly parse an UDP datagram containing directly a mikey message?
>
> Thanks in advance,
> Filippo
>

_______________________________________________
Wireshark-dev mailing list
Wireshark-dev@xxxxxxxxxxxxx
http://www.wireshark.org/mailman/listinfo/wireshark-dev