I was talking about live capture and how to generate statistic plugins for them. USER_DLTs will certainly work in that regard.
regards > Am 27.01.2021 um 14:06 schrieb Björn > <bjoern.peter...@missinglinkelectronics.com>: > > > Hello Roland, > > thank you for your answer, but this will not work for me, because i need to > dissect a first level protocol and couldn't open the file to dissect. But i > think, as mentioned by John Thacker, to use the USER_DLT will take function. > > Best regards, > > Björn > > > > Am 27.01.21 um 12:30 schrieb Roland Knall: >> Hi Björn >> >> I realized something similar by implementing a tap interface in the original >> protocol and a UI using a similar code as in the plugin “pluginifdemo” >> >> Would it be possible to go that route? >> >> Regards, Roland >> >>> Am 27.01.2021 um 12:17 schrieb Björn >>> <bjoern.peter...@missinglinkelectronics.com>: >>> >>> >>> Hi, >>> >>> we use a custom dissector to analyze custom protocol traffic. However, to >>> further increase the usability, we need to add protocol analysis specific >>> GUI elements. For now, we are not aware of a way to add a first level >>> plugin which can be called through an encapsulation type from a pcap file. >>> One other point is that we are not able to load a compiled plugin to >>> wireshark, if we don’t build it from source. We can’t link against >>> wireshark and cmake will not load the project if we install wireshark from >>> the APT packages. >>> >>> Are implementations available to add an encapsulation type via a plugin? >>> Could anybody point us to examples of similar attempts? >>> Is there already some work in progress to provide such a plugin mechanism >>> for extending the encapsulation types? >>> We noticed that distributed packets, e.g. in Ubuntu 18.04 do not allow for >>> C plugins to be loaded. Do you know if this is common practice? >>> Our goal is creating an open source tool to analyze communication within >>> SoCs, e.g. SoC FPGAs by providing both insight into protocol structure as >>> well as bit and timing accurate analysis at the same time with >>> cross-references. >>> You may think about this like an analyzer for video data transport >>> protocols, which provides the ability to cross-reference actual pixels >>> within the frames to the protocol entities that has contained them by >>> showing the picture and enables clicking through the pixels / areas of the >>> frames and the frames within the timeline of the video. When you click on >>> an images pixel/area, the respective protocol unit containing the pixel is >>> highlighted and vice versa. This allows for much better interpretation than >>> going through the payload view or the image separately. >>> >>> We already built a proof of concept, but we feel that this approach to >>> basically create a fork of the wireshark GUI is neither maintainable and >>> efficient nor something the community is looking for. >>> We are seeking for any comment/reply or proposals to advance and/or >>> continue this idea! >>> >>> Björn Petersen >>> ___________________________________________________________________________ >>> Sent via: Wireshark-dev mailing list <wireshark-dev@wireshark.org> >>> Archives: https://www.wireshark.org/lists/wireshark-dev >>> Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev >>> mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe >> >> >> ___________________________________________________________________________ >> Sent via: Wireshark-dev mailing list <wireshark-dev@wireshark.org> >> Archives: https://www.wireshark.org/lists/wireshark-dev >> Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev >> mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe > ___________________________________________________________________________ > Sent via: Wireshark-dev mailing list <wireshark-dev@wireshark.org> > Archives: https://www.wireshark.org/lists/wireshark-dev > Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev > mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe
___________________________________________________________________________ Sent via: Wireshark-dev mailing list <wireshark-dev@wireshark.org> Archives: https://www.wireshark.org/lists/wireshark-dev Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe