This is merely a historical archive of years 2008-2021, before the migration to mailman3.
A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/OpenBSC@lists.osmocom.org/.
Dieter Spaar spaar at mirider.augusta.deHello Harald, On Tue, 28 Jul 2009 19:18:52 +0200, "Harald Welte" <laforge at gnumonks.org> wrote: > > Using this mode, I have created a pcap file with OML+RSL bringup, followed by > one call between two MS (extn. 1005 calls 1003) where all RTP/RTCP packets are > visible. The call uses EFR, since that is hardcoded in many places all over > OpenBSC at the moment. > > The pcap file is available from > http://bs11-abis.gnumonks.org/trac/attachment/wiki/nanoBTS/ipaccess-startup-mo_to_mo_call-proxy.pcap I just took a quick look at the dump with Wireshark, its possible to safe the raw RTP payload from within Wireshark and it looks OK (31-byte EFR packages starting with 0xC in the high nibble). However I have no ready-made EFR decoder available so I can't decode the speech. Best regards, Dieter -- Dieter Spaar, Germany spaar at mirider.augusta.de