forked from osmocom/wireshark
82e2865739
There are a few things in here which could still use attention. Don't regenerate anything now. Change-Id: I283c224d3523212144707fca3d6265916cb11792 Reviewed-on: https://code.wireshark.org/review/205 Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
109 lines
2.7 KiB
Bash
Executable file
109 lines
2.7 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
# List the protocols (dissectors) used in capture file(s)
|
|
#
|
|
# The Python script indexcap.py does the same thing.
|
|
#
|
|
# This script extracts the protocol names contained in a given capture file.
|
|
# This is useful for generating a "database" (flat file :-)) of in what file
|
|
# a given protocol can be found.
|
|
#
|
|
# Output consists of the file name followed by the protocols, for example:
|
|
# /path/to/the/file.pcap eth ip sctp
|
|
#
|
|
# Copyright 2012 Jeff Morriss <jeff.morriss.ws [AT] gmail.com>
|
|
#
|
|
# Wireshark - Network traffic analyzer
|
|
# By Gerald Combs <gerald@wireshark.org>
|
|
# Copyright 1998 Gerald Combs
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
# Directory containing binaries. Default current directory.
|
|
BIN_DIR=.
|
|
|
|
# Tweak the following to your liking. Editcap must support "-E".
|
|
TSHARK="$BIN_DIR/tshark"
|
|
CAPINFOS="$BIN_DIR/capinfos"
|
|
|
|
if [ "$BIN_DIR" = "." ]; then
|
|
export WIRESHARK_RUN_FROM_BUILD_DIRECTORY=
|
|
fi
|
|
|
|
NOTFOUND=0
|
|
for i in "$TSHARK" "$CAPINFOS"
|
|
do
|
|
if [ ! -x $i ]
|
|
then
|
|
echo "Couldn't find $i" 1>&2
|
|
NOTFOUND=1
|
|
fi
|
|
done
|
|
if [ $NOTFOUND -eq 1 ]
|
|
then
|
|
exit 1
|
|
fi
|
|
|
|
# Make sure we have at least one file
|
|
FOUND=0
|
|
for CF in "$@"
|
|
do
|
|
if [ "$OSTYPE" == "cygwin" ]
|
|
then
|
|
CF=`cygpath --windows "$CF"`
|
|
fi
|
|
"$CAPINFOS" "$CF" > /dev/null 2>&1 && FOUND=1
|
|
if [ $FOUND -eq 1 ]
|
|
then
|
|
break
|
|
fi
|
|
done
|
|
|
|
if [ $FOUND -eq 0 ] ; then
|
|
cat <<FIN
|
|
Error: No valid capture files found.
|
|
|
|
Usage: `basename $0` capture file 1 [capture file 2]...
|
|
FIN
|
|
exit 1
|
|
fi
|
|
|
|
for CF in "$@" ; do
|
|
if [ "$OSTYPE" == "cygwin" ] ; then
|
|
CF=`cygpath --windows "$CF"`
|
|
fi
|
|
|
|
if [ ! -f "$CF" ] ; then
|
|
echo "Doesn't exist or not a file: $CF" 1>&2
|
|
continue
|
|
fi
|
|
|
|
"$CAPINFOS" "$CF" > /dev/null
|
|
RETVAL=$?
|
|
if [ $RETVAL -ne 0 ] ; then
|
|
echo "Not a valid capture file (or some other problem)" 1>&2
|
|
continue
|
|
fi
|
|
|
|
printf "%s: " "$CF"
|
|
|
|
# Extract the protocol names.
|
|
$TSHARK -T fields -eframe.protocols -nr "$CF" 2>/dev/null | tr ':\r' '\n' \
|
|
| sort -u | tr '\n\r' ' '
|
|
|
|
printf "\n"
|
|
done
|
|
|