/usr/share/wireshark/idl2wrs.html is in libwireshark-data 2.0.2+ga16e22e-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 | <?xml version="1.0" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>idl2wrs\ -\ The\ Wireshark\ Network\ Analyzer\ 2.0.2</title>
<link rel="stylesheet" href="ws.css" type="text/css" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<link rev="made" href="mailto:root@localhost" />
</head>
<body>
<h1 id="NAME">NAME</h1>
<p>idl2wrs - CORBA IDL to Wireshark Plugin Generator</p>
<h1 id="SYNOPSIS">SYNOPSIS</h1>
<p><b>idl2wrs</b> <filename></p>
<h1 id="DESCRIPTION">DESCRIPTION</h1>
<p><b>idl2wrs</b> is a program that takes a user specified <b>CORBA IDL</b> file and generates <b>"C"</b> source code for a <b>Wireshark</b> "plugin".</p>
<p>This resulting file can be compiled as a <b>Wireshark</b> plugin, and used to monitor <b>GIOP/IIOP</b> traffic that is using this IDL.</p>
<p><b>idl2wrs</b> is actually a shell script wrapper for two <b>Python</b> programs. These programs are:</p>
<ul>
<li><p><b>wireshark_be.py</b></p>
<p>Contains the main IDL Visitor Class</p>
</li>
<li><p><b>wireshark_gen.py</b></p>
<p>Contains the Source Code Generator Class</p>
</li>
</ul>
<p><b>idl2wrs</b> supports heuristic dissection of GIOP/IIOP traffic, and some experimental code for explicit dissection, based on Object Key <-> Repository Id mapping. However, code for heuristic based plugins is generated by default, and users should consider this the preferred method unless you have some namespace collisions.</p>
<h1 id="OPTIONS">OPTIONS</h1>
<p>Currently there are no options. <b>idl2wrs</b> can be invoked as follows.</p>
<p>1. To write the C code to stdout.</p>
<pre><code> idl2wrs <your_file.idl>
eg: idl2wrs echo.idl</code></pre>
<p>2. To write to a file, just redirect the output.</p>
<pre><code> idl2wrs echo.idl > packet-test.c</code></pre>
<h1 id="ENVIRONMENT">ENVIRONMENT</h1>
<p><b>idl2wrs</b> will look for <b>wireshark_be.py</b> and <b>wireshark_gen.py</b> in <b>$PYTHONPATH/site-packages/</b> and if not found, will try the current directory <b>./</b></p>
<p>The <b>-p</b> option passed to omniidl (inside <b>idl2wrs</b>) indicates where <b>wireshark_be.py</b> and <b>wireshark_gen.py</b> will be searched. This may need tweaking if you place these files somewhere else.</p>
<p>If it complains about being unable to find some modules (eg tempfile.py), you may want to check if PYTHONPATH is set correctly.</p>
<p>eg: PYTHONPATH=/usr/lib/python1.5/</p>
<h1 id="SEE-ALSO">SEE ALSO</h1>
<p>wireshark(1), tshark(1)</p>
<h1 id="NOTES">NOTES</h1>
<p><b>idl2wrs</b> (including <b>wireshark_be.py</b> and <b>wireshark_gen.py</b>) are part of the <b>Wireshark</b> distribution. The latest version of <b>Wireshark</b> can be found at <a href="https://www.wireshark.org">https://www.wireshark.org</a>.</p>
<p><b>idl2wrs</b> uses <b>omniidl</b>, an IDL parser, and can be found at <a href="http://omniorb.sourceforge.net/">http://omniorb.sourceforge.net/</a></p>
<h1 id="TODO">TODO</h1>
<p>Some of the more important things to do are:</p>
<ul>
<li><p>Improve Explicit dissection code.</p>
</li>
<li><p>Improve command line options.</p>
</li>
<li><p>Improve decode algorithm when we have operation name collision.</p>
</li>
</ul>
<h1 id="AUTHORS">AUTHORS</h1>
<pre><code> Original Author
-------- ------
Frank Singleton <frank.singleton[AT]ericsson.com>
Contributors
------------</code></pre>
</body>
</html>
|