2000-06-11 05:19:21 +00:00
|
|
|
/* packet-syslog.c
|
|
|
|
* Routines for syslog message dissection
|
|
|
|
*
|
2007-02-01 09:55:52 +00:00
|
|
|
* Copyright 2000, Gerald Combs <gerald[AT]wireshark.org>
|
|
|
|
*
|
|
|
|
* Support for passing SS7 MSUs (from the Cisco ITP Packet Logging
|
|
|
|
* facility) to the MTP3 dissector by Abhik Sarkar <sarkar.abhik[AT]gmail.com>
|
|
|
|
* with some rework by Jeff Morriss <jeff.morriss[AT]ulticom.com>
|
2000-06-11 05:19:21 +00:00
|
|
|
*
|
2004-07-18 00:24:25 +00:00
|
|
|
* $Id$
|
2000-06-11 05:19:21 +00:00
|
|
|
*
|
2006-05-21 04:49:01 +00:00
|
|
|
* Wireshark - Network traffic analyzer
|
2007-02-01 09:55:52 +00:00
|
|
|
* By Gerald Combs <gerald[AT]wireshark.org>
|
2000-06-11 05:19:21 +00:00
|
|
|
* Copyright 1998 Gerald Combs
|
2002-08-28 21:04:11 +00:00
|
|
|
*
|
2000-06-11 05:19:21 +00:00
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version 2
|
|
|
|
* of the License, or (at your option) any later version.
|
2002-08-28 21:04:11 +00:00
|
|
|
*
|
2000-06-11 05:19:21 +00:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
2002-08-28 21:04:11 +00:00
|
|
|
*
|
2000-06-11 05:19:21 +00:00
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
# include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <glib.h>
|
2002-01-21 07:37:49 +00:00
|
|
|
#include <epan/packet.h>
|
2007-02-01 09:55:52 +00:00
|
|
|
#include <epan/strutil.h>
|
2000-06-11 05:19:21 +00:00
|
|
|
|
|
|
|
#define UDP_PORT_SYSLOG 514
|
|
|
|
|
|
|
|
#define PRIORITY_MASK 0x0007 /* 0000 0111 */
|
|
|
|
#define FACILITY_MASK 0x03f8 /* 1111 1000 */
|
|
|
|
|
2000-06-11 15:54:03 +00:00
|
|
|
/* The maximum number if priority digits to read in. */
|
|
|
|
#define MAX_DIGITS 3
|
|
|
|
|
2007-02-01 09:55:52 +00:00
|
|
|
#define LEVEL_EMERG 0
|
|
|
|
#define LEVEL_ALERT 1
|
2007-03-27 10:15:28 +00:00
|
|
|
#define LEVEL_CRIT 2
|
2007-02-01 09:55:52 +00:00
|
|
|
#define LEVEL_ERR 3
|
|
|
|
#define LEVEL_WARNING 4
|
|
|
|
#define LEVEL_NOTICE 5
|
|
|
|
#define LEVEL_INFO 6
|
|
|
|
#define LEVEL_DEBUG 7
|
2000-06-11 15:54:03 +00:00
|
|
|
static const value_string short_lev[] = {
|
2007-02-01 09:55:52 +00:00
|
|
|
{ LEVEL_EMERG, "EMERG" },
|
|
|
|
{ LEVEL_ALERT, "ALERT" },
|
|
|
|
{ LEVEL_CRIT, "CRIT" },
|
|
|
|
{ LEVEL_ERR, "ERR" },
|
|
|
|
{ LEVEL_WARNING, "WARNING" },
|
|
|
|
{ LEVEL_NOTICE, "NOTICE" },
|
|
|
|
{ LEVEL_INFO, "INFO" },
|
|
|
|
{ LEVEL_DEBUG, "DEBUG" },
|
2006-02-21 21:30:27 +00:00
|
|
|
{ 0, NULL }
|
2000-06-11 05:19:21 +00:00
|
|
|
};
|
|
|
|
|
2007-02-01 09:55:52 +00:00
|
|
|
#define FAC_KERN 0
|
|
|
|
#define FAC_USER 1
|
|
|
|
#define FAC_MAIL 2
|
|
|
|
#define FAC_DAEMON 3
|
|
|
|
#define FAC_AUTH 4
|
|
|
|
#define FAC_SYSLOG 5
|
|
|
|
#define FAC_LPR 6
|
|
|
|
#define FAC_NEWS 7
|
|
|
|
#define FAC_UUCP 8
|
|
|
|
#define FAC_CRON 9
|
|
|
|
#define FAC_AUTHPRIV 10
|
|
|
|
#define FAC_FTP 11
|
|
|
|
#define FAC_NTP 12
|
|
|
|
#define FAC_LOGAUDIT 13
|
|
|
|
#define FAC_LOGALERT 14
|
|
|
|
#define FAC_CRON_SOL 15
|
|
|
|
#define FAC_LOCAL0 16
|
|
|
|
#define FAC_LOCAL1 17
|
|
|
|
#define FAC_LOCAL2 18
|
|
|
|
#define FAC_LOCAL3 19
|
|
|
|
#define FAC_LOCAL4 20
|
|
|
|
#define FAC_LOCAL5 21
|
|
|
|
#define FAC_LOCAL6 22
|
|
|
|
#define FAC_LOCAL7 23
|
2000-06-11 05:19:21 +00:00
|
|
|
static const value_string short_fac[] = {
|
2007-02-01 09:55:52 +00:00
|
|
|
{ FAC_KERN, "KERN" },
|
|
|
|
{ FAC_USER, "USER" },
|
|
|
|
{ FAC_MAIL, "MAIL" },
|
|
|
|
{ FAC_DAEMON, "DAEMON" },
|
|
|
|
{ FAC_AUTH, "AUTH" },
|
|
|
|
{ FAC_SYSLOG, "SYSLOG" },
|
|
|
|
{ FAC_LPR, "LPR" },
|
|
|
|
{ FAC_NEWS, "NEWS" },
|
|
|
|
{ FAC_UUCP, "UUCP" },
|
|
|
|
{ FAC_CRON, "CRON" }, /* The BSDs, Linux, and others */
|
|
|
|
{ FAC_AUTHPRIV, "AUTHPRIV" },
|
|
|
|
{ FAC_FTP, "FTP" },
|
|
|
|
{ FAC_NTP, "NTP" },
|
|
|
|
{ FAC_LOGAUDIT, "LOGAUDIT" },
|
|
|
|
{ FAC_LOGALERT, "LOGALERT" },
|
|
|
|
{ FAC_CRON_SOL, "CRON" }, /* Solaris */
|
|
|
|
{ FAC_LOCAL0, "LOCAL0" },
|
|
|
|
{ FAC_LOCAL1, "LOCAL1" },
|
|
|
|
{ FAC_LOCAL2, "LOCAL2" },
|
|
|
|
{ FAC_LOCAL3, "LOCAL3" },
|
|
|
|
{ FAC_LOCAL4, "LOCAL4" },
|
|
|
|
{ FAC_LOCAL5, "LOCAL5" },
|
|
|
|
{ FAC_LOCAL6, "LOCAL6" },
|
|
|
|
{ FAC_LOCAL7, "LOCAL7" },
|
2006-02-21 21:30:27 +00:00
|
|
|
{ 0, NULL }
|
2000-06-11 05:19:21 +00:00
|
|
|
};
|
|
|
|
|
2000-06-11 15:54:03 +00:00
|
|
|
static const value_string long_lev[] = {
|
2007-02-01 09:55:52 +00:00
|
|
|
{ LEVEL_EMERG, "EMERG - system is unusable" },
|
|
|
|
{ LEVEL_ALERT, "ALERT - action must be taken immediately" },
|
|
|
|
{ LEVEL_CRIT, "CRIT - critical conditions" },
|
|
|
|
{ LEVEL_ERR, "ERR - error conditions" },
|
|
|
|
{ LEVEL_WARNING, "WARNING - warning conditions" },
|
|
|
|
{ LEVEL_NOTICE, "NOTICE - normal but significant condition" },
|
|
|
|
{ LEVEL_INFO, "INFO - informational" },
|
|
|
|
{ LEVEL_DEBUG, "DEBUG - debug-level messages" },
|
2006-02-21 21:30:27 +00:00
|
|
|
{ 0, NULL }
|
2000-06-11 05:19:21 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static const value_string long_fac[] = {
|
2007-02-01 09:55:52 +00:00
|
|
|
{ FAC_KERN, "KERN - kernel messages" },
|
|
|
|
{ FAC_USER, "USER - random user-level messages" },
|
|
|
|
{ FAC_MAIL, "MAIL - mail system" },
|
|
|
|
{ FAC_DAEMON, "DAEMON - system daemons" },
|
|
|
|
{ FAC_AUTH, "AUTH - security/authorization messages" },
|
|
|
|
{ FAC_SYSLOG, "SYSLOG - messages generated internally by syslogd" },
|
|
|
|
{ FAC_LPR, "LPR - line printer subsystem" },
|
|
|
|
{ FAC_NEWS, "NEWS - network news subsystem" },
|
|
|
|
{ FAC_UUCP, "UUCP - UUCP subsystem" },
|
|
|
|
{ FAC_CRON, "CRON - clock daemon (BSD, Linux)" },
|
|
|
|
{ FAC_AUTHPRIV, "AUTHPRIV - security/authorization messages (private)" },
|
|
|
|
{ FAC_FTP, "FTP - ftp daemon" },
|
|
|
|
{ FAC_NTP, "NTP - ntp subsystem" },
|
|
|
|
{ FAC_LOGAUDIT, "LOGAUDIT - log audit" },
|
|
|
|
{ FAC_LOGALERT, "LOGALERT - log alert" },
|
|
|
|
{ FAC_CRON_SOL, "CRON - clock daemon (Solaris)" },
|
|
|
|
{ FAC_LOCAL0, "LOCAL0 - reserved for local use" },
|
|
|
|
{ FAC_LOCAL1, "LOCAL1 - reserved for local use" },
|
|
|
|
{ FAC_LOCAL2, "LOCAL2 - reserved for local use" },
|
|
|
|
{ FAC_LOCAL3, "LOCAL3 - reserved for local use" },
|
|
|
|
{ FAC_LOCAL4, "LOCAL4 - reserved for local use" },
|
|
|
|
{ FAC_LOCAL5, "LOCAL5 - reserved for local use" },
|
|
|
|
{ FAC_LOCAL6, "LOCAL6 - reserved for local use" },
|
|
|
|
{ FAC_LOCAL7, "LOCAL7 - reserved for local use" },
|
2006-02-21 21:30:27 +00:00
|
|
|
{ 0, NULL }
|
2000-06-11 05:19:21 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static gint proto_syslog = -1;
|
2000-06-11 15:54:03 +00:00
|
|
|
static gint hf_syslog_level = -1;
|
2000-06-11 05:19:21 +00:00
|
|
|
static gint hf_syslog_facility = -1;
|
2002-05-15 06:51:07 +00:00
|
|
|
static gint hf_syslog_msg = -1;
|
2007-02-01 09:55:52 +00:00
|
|
|
static gint hf_syslog_msu_present = -1;
|
2000-06-11 05:19:21 +00:00
|
|
|
|
|
|
|
static gint ett_syslog = -1;
|
|
|
|
|
2007-02-01 09:55:52 +00:00
|
|
|
static dissector_handle_t mtp_handle;
|
|
|
|
|
2007-03-27 10:15:28 +00:00
|
|
|
/* The Cisco ITP's packet logging facility allows selected (SS7) MSUs to be
|
2007-02-01 09:55:52 +00:00
|
|
|
* to be encapsulated in syslog UDP datagrams and sent to a monitoring tool.
|
|
|
|
* However, no actual tool to monitor/decode the MSUs is provided. The aim
|
|
|
|
* of this routine is to extract the hex dump of the MSU from the syslog
|
|
|
|
* packet so that it can be passed on to the mtp3 dissector for decoding.
|
|
|
|
*/
|
|
|
|
static tvbuff_t *
|
|
|
|
mtp3_msu_present(gint fac, gint level, const char *msg_str)
|
|
|
|
{
|
2007-02-19 00:59:20 +00:00
|
|
|
size_t nbytes;
|
2007-02-01 09:55:52 +00:00
|
|
|
gchar **split_string, *msu_hex_dump;
|
|
|
|
tvbuff_t *mtp3_tvb = NULL;
|
|
|
|
guint8 *byte_array;
|
|
|
|
|
|
|
|
/* In the sample capture I have, all MSUs are LOCAL0.DEBUG.
|
|
|
|
* Try to optimize this routine for most syslog users by short-cutting
|
|
|
|
* out here.
|
|
|
|
*/
|
|
|
|
if (!(fac == FAC_LOCAL0 && level == LEVEL_DEBUG))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (strstr(msg_str, "msu=") == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
split_string = g_strsplit(msg_str, "msu=", 2);
|
|
|
|
msu_hex_dump = split_string[1];
|
|
|
|
|
|
|
|
if (msu_hex_dump && strlen(msu_hex_dump)) {
|
|
|
|
byte_array = convert_string_to_hex(msu_hex_dump, &nbytes);
|
|
|
|
|
|
|
|
mtp3_tvb = tvb_new_real_data(byte_array, nbytes, nbytes);
|
|
|
|
tvb_set_free_cb(mtp3_tvb, g_free);
|
|
|
|
}
|
|
|
|
|
|
|
|
g_strfreev(split_string);
|
2000-06-11 05:19:21 +00:00
|
|
|
|
2007-02-01 09:55:52 +00:00
|
|
|
return(mtp3_tvb);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The message format is defined in RFC 3164 */
|
|
|
|
static void
|
|
|
|
dissect_syslog(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
|
2000-06-11 05:19:21 +00:00
|
|
|
{
|
2000-06-11 15:54:03 +00:00
|
|
|
gint pri = -1, lev = -1, fac = -1;
|
2000-06-11 05:19:21 +00:00
|
|
|
gint msg_off = 0, msg_len;
|
|
|
|
proto_item *ti;
|
|
|
|
proto_tree *syslog_tree;
|
2006-01-29 12:57:14 +00:00
|
|
|
const char *msg_str;
|
2007-02-01 09:55:52 +00:00
|
|
|
tvbuff_t *mtp3_tvb;
|
2000-06-11 05:19:21 +00:00
|
|
|
|
2001-12-10 00:26:21 +00:00
|
|
|
if (check_col(pinfo->cinfo, COL_PROTOCOL))
|
|
|
|
col_set_str(pinfo->cinfo, COL_PROTOCOL, "Syslog");
|
|
|
|
if (check_col(pinfo->cinfo, COL_INFO))
|
|
|
|
col_clear(pinfo->cinfo, COL_INFO);
|
2002-08-28 21:04:11 +00:00
|
|
|
|
2002-02-02 03:04:07 +00:00
|
|
|
if (tvb_get_guint8(tvb, msg_off) == '<') {
|
|
|
|
/* A facility and level follow. */
|
2000-06-11 05:19:21 +00:00
|
|
|
msg_off++;
|
2000-06-11 15:54:03 +00:00
|
|
|
pri = 0;
|
2002-02-02 03:04:07 +00:00
|
|
|
while (tvb_bytes_exist(tvb, msg_off, 1) &&
|
|
|
|
isdigit(tvb_get_guint8(tvb, msg_off)) && msg_off <= MAX_DIGITS) {
|
2000-06-11 15:54:03 +00:00
|
|
|
pri = pri * 10 + (tvb_get_guint8(tvb, msg_off) - '0');
|
2000-06-11 05:19:21 +00:00
|
|
|
msg_off++;
|
|
|
|
}
|
|
|
|
if (tvb_get_guint8(tvb, msg_off) == '>')
|
|
|
|
msg_off++;
|
2000-06-11 15:54:03 +00:00
|
|
|
fac = (pri & FACILITY_MASK) >> 3;
|
|
|
|
lev = pri & PRIORITY_MASK;
|
2000-06-11 05:19:21 +00:00
|
|
|
}
|
|
|
|
|
2002-02-02 03:04:07 +00:00
|
|
|
msg_len = tvb_ensure_length_remaining(tvb, msg_off);
|
2006-01-29 12:57:14 +00:00
|
|
|
msg_str = tvb_format_text(tvb, msg_off, msg_len);
|
2007-02-01 09:55:52 +00:00
|
|
|
|
|
|
|
mtp3_tvb = mtp3_msu_present(fac, lev, msg_str);
|
|
|
|
|
|
|
|
if (mtp3_tvb == NULL && check_col(pinfo->cinfo, COL_INFO)) {
|
2000-06-11 15:54:03 +00:00
|
|
|
if (pri >= 0) {
|
2002-08-28 21:04:11 +00:00
|
|
|
col_add_fstr(pinfo->cinfo, COL_INFO, "%s.%s: %s",
|
2000-06-11 05:19:21 +00:00
|
|
|
val_to_str(fac, short_fac, "UNKNOWN"),
|
2000-06-11 15:54:03 +00:00
|
|
|
val_to_str(lev, short_lev, "UNKNOWN"), msg_str);
|
2000-06-11 05:19:21 +00:00
|
|
|
} else {
|
2006-01-29 12:57:14 +00:00
|
|
|
col_add_str(pinfo->cinfo, COL_INFO, msg_str);
|
2000-06-11 05:19:21 +00:00
|
|
|
}
|
|
|
|
}
|
2002-08-28 21:04:11 +00:00
|
|
|
|
2000-06-11 05:19:21 +00:00
|
|
|
if (tree) {
|
2000-06-11 15:54:03 +00:00
|
|
|
if (pri >= 0) {
|
2002-01-24 09:20:54 +00:00
|
|
|
ti = proto_tree_add_protocol_format(tree, proto_syslog, tvb, 0, -1,
|
|
|
|
"Syslog message: %s.%s: %s",
|
2000-06-11 05:19:21 +00:00
|
|
|
val_to_str(fac, short_fac, "UNKNOWN"),
|
2000-06-11 15:54:03 +00:00
|
|
|
val_to_str(lev, short_lev, "UNKNOWN"), msg_str);
|
2000-06-11 05:19:21 +00:00
|
|
|
} else {
|
2002-01-24 09:20:54 +00:00
|
|
|
ti = proto_tree_add_protocol_format(tree, proto_syslog, tvb, 0, -1,
|
|
|
|
"Syslog message: (unknown): %s", msg_str);
|
2000-06-11 05:19:21 +00:00
|
|
|
}
|
|
|
|
syslog_tree = proto_item_add_subtree(ti, ett_syslog);
|
2000-06-11 15:54:03 +00:00
|
|
|
if (pri >= 0) {
|
2000-06-11 05:19:21 +00:00
|
|
|
ti = proto_tree_add_uint(syslog_tree, hf_syslog_facility, tvb, 0,
|
2000-06-11 15:54:03 +00:00
|
|
|
msg_off, pri);
|
|
|
|
ti = proto_tree_add_uint(syslog_tree, hf_syslog_level, tvb, 0,
|
|
|
|
msg_off, pri);
|
2000-06-11 05:19:21 +00:00
|
|
|
}
|
2002-05-15 06:51:07 +00:00
|
|
|
proto_tree_add_item(syslog_tree, hf_syslog_msg, tvb, msg_off,
|
|
|
|
msg_len, FALSE);
|
2007-02-01 09:55:52 +00:00
|
|
|
|
|
|
|
if (mtp3_tvb) {
|
|
|
|
proto_item *mtp3_item;
|
|
|
|
mtp3_item = proto_tree_add_boolean(syslog_tree, hf_syslog_msu_present,
|
|
|
|
tvb, msg_off, msg_len, TRUE);
|
|
|
|
PROTO_ITEM_SET_GENERATED(mtp3_item);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-03-22 08:11:16 +00:00
|
|
|
/* Call MTP dissector if encapsulated MSU was found... */
|
2007-02-01 09:55:52 +00:00
|
|
|
if (mtp3_tvb) {
|
2007-03-22 08:11:16 +00:00
|
|
|
/* ...and add the encapsulated MSU as a new data source so that it gets
|
|
|
|
* its own tab in the packet bytes pane.
|
|
|
|
*/
|
|
|
|
add_new_data_source(pinfo, mtp3_tvb, "Encapsulated MSU");
|
2007-02-01 09:55:52 +00:00
|
|
|
call_dissector(mtp_handle, mtp3_tvb, pinfo, tree);
|
2000-06-11 05:19:21 +00:00
|
|
|
}
|
2007-02-01 09:55:52 +00:00
|
|
|
|
2000-06-11 05:19:21 +00:00
|
|
|
return;
|
|
|
|
}
|
2002-08-28 21:04:11 +00:00
|
|
|
|
2006-05-21 04:49:01 +00:00
|
|
|
/* Register the protocol with Wireshark */
|
2000-06-11 05:19:21 +00:00
|
|
|
void proto_register_syslog(void)
|
2002-08-28 21:04:11 +00:00
|
|
|
{
|
2000-06-11 05:19:21 +00:00
|
|
|
|
|
|
|
/* Setup list of header fields */
|
|
|
|
static hf_register_info hf[] = {
|
|
|
|
{ &hf_syslog_facility,
|
|
|
|
{ "Facility", "syslog.facility",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(long_fac), FACILITY_MASK,
|
2001-06-18 02:18:27 +00:00
|
|
|
"Message facility", HFILL }
|
2000-06-11 05:19:21 +00:00
|
|
|
},
|
2000-06-11 15:54:03 +00:00
|
|
|
{ &hf_syslog_level,
|
|
|
|
{ "Level", "syslog.level",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(long_lev), PRIORITY_MASK,
|
2001-06-18 02:18:27 +00:00
|
|
|
"Message level", HFILL }
|
2000-06-11 05:19:21 +00:00
|
|
|
},
|
2002-05-15 06:51:07 +00:00
|
|
|
{ &hf_syslog_msg,
|
|
|
|
{ "Message", "syslog.msg",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0x0,
|
|
|
|
"Message Text", HFILL }
|
2000-06-11 05:19:21 +00:00
|
|
|
},
|
2007-02-01 09:55:52 +00:00
|
|
|
{ &hf_syslog_msu_present,
|
|
|
|
{ "SS7 MSU present", "syslog.msu_present",
|
|
|
|
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
|
|
|
|
"True if an SS7 MSU was detected in the syslog message",
|
|
|
|
HFILL }
|
|
|
|
}
|
2000-06-11 05:19:21 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/* Setup protocol subtree array */
|
|
|
|
static gint *ett[] = {
|
|
|
|
&ett_syslog,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Register the protocol name and description */
|
2001-01-03 06:56:03 +00:00
|
|
|
proto_syslog = proto_register_protocol("Syslog message", "Syslog", "syslog");
|
2000-06-11 05:19:21 +00:00
|
|
|
|
|
|
|
/* Required function calls to register the header fields and subtrees used */
|
|
|
|
proto_register_field_array(proto_syslog, hf, array_length(hf));
|
|
|
|
proto_register_subtree_array(ett, array_length(ett));
|
2002-05-30 08:34:19 +00:00
|
|
|
}
|
2000-06-11 05:19:21 +00:00
|
|
|
|
|
|
|
void
|
|
|
|
proto_reg_handoff_syslog(void)
|
|
|
|
{
|
2001-12-03 04:00:26 +00:00
|
|
|
dissector_handle_t syslog_handle;
|
|
|
|
|
|
|
|
syslog_handle = create_dissector_handle(dissect_syslog, proto_syslog);
|
|
|
|
dissector_add("udp.port", UDP_PORT_SYSLOG, syslog_handle);
|
2007-02-01 09:55:52 +00:00
|
|
|
|
|
|
|
/* Find the mtp3 dissector */
|
|
|
|
mtp_handle = find_dissector("mtp3");
|
2000-06-11 05:19:21 +00:00
|
|
|
}
|