This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

hello all,

i have just the tcp payload data,i know the protocol message in the payload. what i am trying to do is calling dissector API on this packet,in my c code, expecting that it would form the proto tree that i will use in print_proto_tree function to get payload details.

i have populated the argument with required values.(except the eth,ip, related values)

but everytime i am getting this segmentation fault.

is this the correct approach.

This question is marked "community wiki".

asked 01 Apr '14, 11:50

Sanny_D's gravatar image

Sanny_D
0182021
accept rate: 50%

edited 04 Apr '14, 08:23

needed to populate correctly. it is dissecting properly.

(04 Apr '14, 08:18) Sanny_D

The question has been closed for the following reason "Duplicate Question: You have already asked a very similar question and received answers. If you are not happy with those answers, please continue to ask questions in your original request: http://ask.wireshark.org/questions/31149/how-to-dissect-bytearray-of-tcp-payload" by Kurt Knochner 02 Apr '14, 13:30

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×637
×58
×18
×4

question asked: 01 Apr '14, 11:50

question was seen: 2,016 times

last updated: 04 Apr '14, 08:23

p​o​w​e​r​e​d by O​S​Q​A