| 1 | initial version |
I think the problem is just that you're applying -e raw_sip instead of -e raw_sip.line, which is the only defined field for the raw_sip "protocol". Find all the raw_sip fields at https://www.wireshark.org/docs/dfref/r/raw_sip.html
| 2 | No.2 Revision |
I think the problem is just that you're applying -e raw_sip instead of -e raw_sip.line, which is the only defined field for the raw_sip "protocol". Find all the raw_sip fields at https://www.wireshark.org/docs/dfref/r/raw_sip.html
To make the output a bit more readable, you might want to pipe the output to sed, for example:
tshark -r SIP_CALL_RTP_G711.pcap -2Y sip -T fields -e frame.number -e raw_sip.line | sed s/\\r\\n,/\n/g
This has the unfortunate side-affect of causing tshark/sed to hang at the end, so some tweaking may be needed here.
(If you'd rather be able to just specify -e raw_sip and get the output, then sure, go ahead and file a bug report; it can't hurt.)