Hello Christopher, all,
as I wrote "... to write Lua dissector...", so instructions what and how to
do on command line do not apply in this case. Meanwhile, I figured out by
myself how this is supposed to work:

local udlt = DissectorTable.get("wtap_encap")
udlt:add(wtap.USER1, ypp)

why not to stick to one naming convention of user_dlt -- I do not know but
the lines above is the way to start the dissector in this case.

Kind Regards
Ariel Burbaickij

On Wed, Sep 1, 2021 at 4:22 AM Maynard, Christopher via Wireshark-users <
wireshark-users@wireshark.org> wrote:

> > From: Wireshark-users <wireshark-users-boun...@wireshark.org> On Behalf
> Of Ariel Burbaickij
> > Sent: Monday, August 30, 2021 4:20 AM
> > To: Community support list for Wireshark <wireshark-users@wireshark.org>
> > Subject: [Wireshark-users] any examples of how to hook up Lua dissector
> to user_dlt tree?
> >
> > Hello community,
> > I would like to write Lua dissector for a binary, i.e. not text,
> proprietary protocol on top of user_dlt.
> > Are there any examples available, which roughly show how this is done ?
> Could you point me to them
> > as I have not found much interesting yet.
> >
> > In particular, how actual hooking should look like:
> >
> > local user_dlt = DissectorTable.get("user_dlt")  // user_dlt dissector
> exists in Wireshark
> > user_dlt:add(148, my_protocol_to_be_dissected) // my protocol uses
> user_dlt 148
> > or is it something else ?
> > Kind Regards
> > Ariel Burbaickij
>
> This is done just as for any other protocol, either by changing the
> Wireshark preferences or specifying the option on the command-line.
> Assuming "Your Proprietary Protocol" = ypp and DLT=147 ...
>
> 1) Changing Wireshark preference: Edit -> Preferences... -> Protocols ->
> DLT_USER -> Encapsulations Table: Edit... -> [+] -> Select DLT 147, Payload
> Protocol=ypp, and set other relevant fields as needed -> OK -> OK.
>
>         Refs:
>
> https://www.wireshark.org/docs/wsug_html_chunked/ChUserDLTsSection.html
>
> https://gitlab.com/wireshark/wireshark/-/wikis/HowToDissectAnything
>
> 2) Command-line option:
>         Windows: Wireshark.exe -o "uat:user_dlts:\"User 1
> (DLT=147)\",\"ypp\",\"0\",\"\",\"0\",\"\""
>         *nix: wireshark -o 'uat:user_dlts:"User 1
> (DLT=147)","ypp","0","","0",""'
>
>         Refs:
>                 https://www.wireshark.org/docs/man-pages/wireshark.html
>
> https://www.wireshark.org/docs/wsug_html_chunked/ChCustCommandLine.html
>
> I hope that helps?
> - Chris
>
>
>
>
>
>
>
>
>
>
> CONFIDENTIALITY NOTICE: This message is the property of International Game
> Technology PLC and/or its subsidiaries and may contain proprietary,
> confidential or trade secret information. This message is intended solely
> for the use of the addressee. If you are not the intended recipient and
> have received this message in error, please delete this message from your
> system. Any unauthorized reading, distribution, copying, or other use of
> this message or its attachments is strictly prohibited.
> ___________________________________________________________________________
> Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
> Archives:    https://www.wireshark.org/lists/wireshark-users
> Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
>              mailto:wireshark-users-requ...@wireshark.org
> ?subject=unsubscribe
>
___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-requ...@wireshark.org?subject=unsubscribe

Reply via email to