Wireshark-bugs: [Wireshark-bugs] [Bug 5332] Dissector for ANSI TCAP NATIONAL code:4294934785/429
Date: Wed, 3 Nov 2010 16:18:23 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5332

--- Comment #5 from Anders Broman <anders.broman@xxxxxxxxxxxx> 2010-11-03 16:18:21 PDT ---
Just to try and put the record straight, Wireshark is the direct successor of
Ethereal as you can see here
http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ansi_map.c?view=log
the original ANSI MAP and ANSI TCAP dissectors have "evolved" into the current
ones. Both dissectors are now automatically generated from their ASN1
specifications in the case of ANS MAP there is a lot of handcrafted code as the
protocol description is a mix of ASN1 and OCTET STRINGS containing "coded"
protocol data to make things worse there is no official ANSI MAP ASN1
description(that I know of) so that's han crafted too. I think the main
drawback of the current ANSI MAP dissector is it's inabillity to properly track
responses. 

In this particular BUG I think the problem may be that we lack a decoder for
WNP and CNAM is suspect thats not ANSI MAP at all.

If you search the BUG data base for ANSI MAP there are suggestions on how to
improve things for any one with time and interest to do it.

If the original dissector was better it's not straightforward to rool back as
the supporting infrastructure has changed so doing that is a considerable
amount of work too.
Regards
Anders

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.