Wireshark-bugs: [Wireshark-bugs] [Bug 9476] New: Add DTMF dissector setup based on the informati
Date: Mon, 25 Nov 2013 14:04:44 +0000
Bug ID 9476
Summary Add DTMF dissector setup based on the information found in RTPproxy requests
Classification Unclassified
Product Wireshark
Version unspecified
Hardware All
OS All
Status UNCONFIRMED
Severity Enhancement
Priority Low
Component Wireshark
Assignee bugzilla-admin@wireshark.org
Reporter lemenkov@gmail.com

Created attachment 12176 [details]
Initial patch

Build Information:
wireshark 1.11.3 (SVN Rev Unknown from unknown)

Copyright 1998-2013 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.24.22, with Cairo 1.12.14, with Pango 1.34.1,
with
GLib 2.36.3, with libpcap, with libz 1.2.7, with POSIX capabilities (Linux),
without libnl, with SMI 0.4.8, with c-ares 1.10.0, with Lua 5.1, without
Python,
with GnuTLS 3.1.16, with Gcrypt 1.5.3, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built May  4 2013 13:59:07), with AirPcap.

Running on Linux 3.11.6-200.fc19.x86_64, with locale ru_RU.UTF-8, with libpcap
version 1.4.0, with libz 1.2.7, GnuTLS 3.1.16, Gcrypt 1.5.3, without AirPcap.
Intel(R) Core(TM)2 Duo CPU     E7300  @ 2.66GHz

Built using gcc 4.8.2 20131017 (Red Hat 4.8.2-1).
--
Hello All!

RTPproxy protocol has a special field in requests' parameters - a DTMF payload
ID. We can use it for setting up RTP-Event dissector.

Unfortunately this patch can be applied after two previous ones (see blocking
tickets).


You are receiving this mail because:
  • You are watching all bug changes.