The dissector I'm working on overrides the mbtcp dissector, to display a
particular subset of the protocol in application-specific detail.
My question is - what's the best way to reject those packets the
dissector is not interested in? I thought that if the dissect_myprot
function returned 0, the mbtcp dissector would then take over, but this
doesn't seem to be the case.
Should I use a heuristic dissector here, or is there another way to
allow the packet to cascade back to the mbtcp dissector?
-Patrick
DISCLAIMER:---------------------------------------------------------------------------
This e-mail transmission and any documents, files and previous e-mail messages
attached to it are private and confidential. They may contain proprietary or copyright
material or information that is subject to legal professional privilege. They are for
the use of the intended recipient only. Any unauthorised viewing, use, disclosure,
copying, alteration, storage or distribution of, or reliance on, this message is
strictly prohibited. No part may be reproduced, adapted or transmitted without the
written permission of the owner. If you have received this transmission in error, or
are not an authorised recipient, please immediately notify the sender by return email,
delete this message and all copies from your e-mail system, and destroy any printed
copies. Receipt by anyone other than the intended recipient should not be deemed a
waiver of any privilege or protection. Thales Australia does not warrant or represent
that this e-mail or any documents, files and previous e-mail messages attached are
error or virus free.
--------------------------------------------------------------------------------------