В сообщении от Понедельник 15 Май 2006 08:02 Trejkaz написал(a):
> On 15/05/2006, at 11:58 AM, Tobias Thierer wrote:
> > Is the following a legal XMPP packet (linebreaks inserted for
> > readability)?
> >
> > <iq id="rpc-0wLET-8" to="[EMAIL PROTECTED]/Biomatters"
> > type="set">
> >   <query xmlns="jabber:iq:biomatters:rpc" version="1.0">
> >     <methodCall>
> >       <methodName>add</methodName>
> >       <params>
> >   <int>23</int>
> >   <int>42</int>
> > </params>
> >     </methodCall>
> >   </query>
> > </iq>
>
> It is.
>
> > <iq id="rpc-WRH8A-8" to="[EMAIL PROTECTED]/Biomatters"
> > from="[EMAIL PROTECTED]/Biomatters" type="set">
> >   <query version="1.0" xmlns="jabber:iq:biomatters:rpc">
> >     <methodCall>
> >       <methodName></methodName></methodName>
> >       <params>
> >         <int>23</int>
> >         <int>42</int>
> >       </params>
> >     </methodCall>
> >   </query>
> > </iq>
>
> Are you sure this is what's actually coming out of the server?  My
> bet is that whatever library you're using to print that packet out
> has either parsed it incorrectly, or is formatting it incorrectly.
> If you run tcpdump or similar, you should be able to see what the
> server is actually sending.
"tcpflow -c" is much more suitable for this purpose. It do not prints out IP 
headers or hex data, just IPs, port numbers and stream contents.

> TX

-- 
Respectfully
Alexey Nezhdanov

Reply via email to