ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-dev: Re: [Wireshark-dev] Hello to the list and a nested dissector

From: "Anders Broman" <anders.broman@xxxxxxxxxxxx>
Date: Mon, 16 Mar 2009 18:12:17 +0100
Hi,
Why reinvent the wheel?
Use the existing TCAP dissector and use asn2wrs to generate the ASN.1 based dissector.
Regards
Anders


From: wireshark-dev-bounces@xxxxxxxxxxxxx [mailto:wireshark-dev-bounces@xxxxxxxxxxxxx] On Behalf Of yagvoc-web@xxxxxxxx
Sent: den 16 mars 2009 17:45
To: wireshark-dev@xxxxxxxxxxxxx
Subject: [Wireshark-dev] Hello to the list and a nested dissector

This is my first message to the list, hello to all the members and thank you for your invaluable work.

Sorry if I quickly fall back to a development problem, hoping somebody can help me.
My goal is to write a dissector for  a proprietary protocol with a little complexity.
It is a TCP/IP based protocol with a fixed (6 bytes) length header followed by a TCAP message which component is an ASN.1 defined protocol.

I have been able, following docs and samples, to dissect the header (the easy work!) but now don't know how to go on. Should I call the existing TCAP dissector or write  new one with included the inner protocol?

Thank you in advance
Gaetano