I am Dave Jing Tian, an (to-be) Assistant Professor in the Department of Computer Science at Purdue University working on system security. My research involves embedded systems, operating systems, and trusted computing.
- 139,082 hits
All blogs on this website are licensed under a Creative Commons Attribution 4.0 International License.
Category Archives: H.248/MEGACO/EGCP
Previous_Part_8 Now we are moving to the last post of ‘itevad’ – writing a stack for decoding text format of Itevad Protocol using Flex and Bison as well as C as a main function. Being different with previous Flex and … Continue reading
Previous_Part_7 After writing a Flex standalone lexer, we are going to make it a little bit useful – adding parser, Bison. When Flex and Bison work together, standalone flex file needs some changes to cooperate with Bison, as you will … Continue reading
Previous_Part_6 From this post, we will have to learn Flex and Bison, which are assumed to have very bizarre grammars to write and understand. Fortunately, we will step forwardly from Flex standalone, Flex+Bison and Flex+Bison+C finally. Please kindly note that … Continue reading
Previous_Part_5 From this post, we will start our Flex and Bison journey. Before that, we will need a clarification for BNF and ABNF again and give ABNF description of Iitevad accordingly. As mentioned in General Background, BNF and ABNF are … Continue reading
Previous_Part_4 In this post, we will begin our Itevad Protocol Text Encoder. Again, with the help of ASN.1 compiler, we have already got the structure of Itevad itself. Moreover, we have implemented binary encoder and decoder in previous post. For … Continue reading
Previous_Part_3 In this post, we will continue our Itevad Protocol Binary Ber Decoder. With the help of ANS.1 compiler, not only do we get the structural description of Itevad protocol itself but also the necessary converting functions used to convert … Continue reading
Previous_Part_2 In this post, we will focus on writing Itevad Protocol Binary Ber Encoder. With the necessary headers and sources generated in Part_2, now we could write our Ber Encoder. Then we will run our encoder and use hexdump to … Continue reading