The "http" dissector is what's used for protocols other than TCP, SCTP,
and SSL/TLS.
Change-Id: Ib5138d3a082f1017b7ef190e5128a21eb9a49e92
Reviewed-on: https://code.wireshark.org/review/14947
Reviewed-by: Guy Harris <guy@alum.mit.edu>
-"127.0.0.1","443","http","TEST_KEYS_DIRrsasnakeoil2.key",""
-"127.0.0.1","9131","http","TEST_KEYS_DIRkey.p12","WebAS"
+"127.0.0.1","443","http-over-ssl","TEST_KEYS_DIRrsasnakeoil2.key",""
+"127.0.0.1","9131","http-over-ssl","TEST_KEYS_DIRkey.p12","WebAS"
TEST_KEYS_FILE="`cygpath -w $TEST_KEYS_FILE`"
fi
$TESTS_DIR/run_and_catch_crashes env $TS_DC_ENV $TSHARK $TS_DC_ARGS -Tfields -e http.request.uri \
- -o ssl.keys_list:"0.0.0.0,443,http,$TEST_KEYS_FILE" \
+ -o ssl.keys_list:"0.0.0.0,443,http-over-ssl,$TEST_KEYS_FILE" \
-r "$CAPTURE_DIR/rsa-p-lt-q.pcap" -Y http \
| grep / > /dev/null 2>&1
RETURNVALUE=$?