You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
First off, thanks for the great work! sharktools is proving very useful to me!
I'm using pyshark to filter/dissect some telecom protocols. I've come across a problem that in one case a field is not directly exposed by libwireshark (a tag that signifies in what state a TCAP dialogue is). In wireshark itself I can inspect the binary data and see that the first byte of the tcap segment contains this value, however I couldn't find a obvious way to do this using pyshark. For now I hacked sharktools_core.c to return a string representation of the hexdump instead of the field_name for this case. Can this be done maybe cleaner, through a bit of API? I have just started working both with wireshark and python .so modules but I gladly help with some direction :)
Thanks in advance.
cheers
omar
The text was updated successfully, but these errors were encountered:
Hello!
First off, thanks for the great work! sharktools is proving very useful to me!
I'm using pyshark to filter/dissect some telecom protocols. I've come across a problem that in one case a field is not directly exposed by libwireshark (a tag that signifies in what state a TCAP dialogue is). In wireshark itself I can inspect the binary data and see that the first byte of the tcap segment contains this value, however I couldn't find a obvious way to do this using pyshark. For now I hacked sharktools_core.c to return a string representation of the hexdump instead of the field_name for this case. Can this be done maybe cleaner, through a bit of API? I have just started working both with wireshark and python .so modules but I gladly help with some direction :)
Thanks in advance.
cheers
omar
The text was updated successfully, but these errors were encountered: