manpagez: man pages & more
man idl2wrs(1)
Home | html | info | man
idl2wrs(1)              The Wireshark Network Analyzer              idl2wrs(1)


       idl2wrs - CORBA IDL to Wireshark Plugin Generator


       idl2wrs <filename>


       idl2wrs is a program that takes a user specified CORBA IDL file and
       generates "C" source code for a Wireshark "plugin".

       This resulting file can be compiled as a Wireshark plugin, and used to
       monitor GIOP/IIOP traffic that is using this IDL.

       idl2wrs is actually a shell script wrapper for two Python programs.
       These programs are:


           Contains the main IDL Visitor Class


           Contains the Source Code Generator Class

       idl2wrs supports heuristic dissection of GIOP/IIOP traffic, and some
       experimental code for explicit dissection, based on Object Key <->
       Repository Id mapping.  However, code for heuristic based plugins is
       generated by default, and users should consider this the preferred
       method unless you have some namespace collisions.


       Currently there are no options. idl2wrs can be invoked as follows.

       1.  To write the C code to stdout.

           idl2wrs  <your_file.idl>

           eg: idl2wrs echo.idl

       2. To write to a file, just redirect the output.

           idl2wrs echo.idl > packet-test.c


       idl2wrs will look for and in
       $PYTHONPATH/site-packages/ and if not found, will try the current
       directory ./

       The -p option passed to omniidl (inside idl2wrs) indicates where and will be searched.  This may need
       tweaking if you place these files somewhere else.

       If it complains about being unable to find some modules (eg, you may want to check if PYTHONPATH is set correctly.

       eg:  PYTHONPATH=/usr/lib/python1.5/


       wireshark(1), tshark(1)


       idl2wrs (including and are part of
       the Wireshark distribution.  The latest version of Wireshark can be
       found at <>.

       idl2wrs uses omniidl, an IDL parser, and can be found at


       Some of the more important things to do are:

       o   Improve Explicit dissection code.

       o   Improve command line options.

       o   Improve decode algorithm when we have operation name collision.


         Original Author
         -------- ------
         Frank Singleton             <frank.singleton[AT]>


2.0.5                             2016-07-27                        idl2wrs(1)

wireshark 2.0.5 - Generated Fri Aug 12 18:15:31 CDT 2016
© 2000-2021
Individual documents may contain additional copyright information.