![]() Register_dissector("", dissect_mac_fdd_pch, proto_umts_mac) Register_dissector("", dissect_mac_fdd_fach, proto_umts_mac) Register_dissector("", dissect_mac_fdd_rach, proto_umts_mac) $ grep register_dissector packet-umts_mac.c Packet-umts_mac.c: proto_umts_mac = proto_register_protocol("MAC", "MAC", "mac") $ grep "proto_register_protocol" packet-*.c | grep "\"MAC\"" In this case, it seems you need to look at the source code (unless there's some other method I'm not aware of) in order to find the dissector that's actually registered. WiMAX MAC-PHY over Ethernet WiMAX MAC-PHY wimaxmacphy WiMax Generic/Type1/Type2 MAC Header Messages WiMax Generic/Type1/Type2 MAC Header (hdr) wmx.hdr Token-Ring Media Access Control TR MAC trmac WiMax MAC Management Message MGMT MSG wmx.mgmt MPLS-MAC Media Access Control (MAC) Address Withdrawal over Static Pseudowire mpls_mac ![]() MikroTik MAC-Telnet Protocol MAC-Telnet mactelnet Mac-lte-framed MAC-LTE-FRAMED mac-lte-framed Radio Link Control, Medium Access Control, 3GPP TS44.060 GSM RLC MAC gsm_rlcmac ![]() Of course this doesn't always work, because the same search for MAC does find it: $ tshark -G protocols | grep MACĭOCSIS Mac Management DOCSIS MAC MGMT docsis_mgmt So in the case of RSL, it looks like you'd need Dissector.get("gsm_abis_rsl"):call(buf, pinfo,tree) Radio Signalling Link (RSL) RSL gsm_abis_rsl (Refer to the tshark man page for more details on the -G option.)įor example: $ tshark -G protocols | grep RSL If you're looking for the correct protocol names, you can try running something like tshark -G protocols | grep NAME … where NAME is the name of the protocol you're looking for. Below is the answer I provided to this same question over at, but copied here for convenience:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |