aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-rtp.h
diff options
context:
space:
mode:
authorMichael Mann <mmann78@netscape.net>2015-01-11 19:48:54 -0500
committerMichael Mann <mmann78@netscape.net>2015-01-16 00:37:02 +0000
commite530c899406d2212fb7cb8821d083fb4871ff718 (patch)
tree9bb1ef43a4ed562dfb7a19c4db4ecd17926801a7 /epan/dissectors/packet-rtp.h
parent7d43836b3ad54073a98926450ff0bca7bc34ddeb (diff)
Replace se alloced memory in compare stat tap.
Also replaced comments mentioning se_alloc memory with wmem_file_scope, since it's more accurate. It seems that many of the TShark stat taps may be leaking memory, because the hash tables created by the taps don't get a chance to be freed. Somewhat academic since TShark exits shortly after displaying any stats, but a leak none the less. Change-Id: I8ceecbd00d65b3442dc02d720b39c2e15aa0c8a6 Reviewed-on: https://code.wireshark.org/review/6557 Reviewed-by: Evan Huus <eapache@gmail.com> Reviewed-by: Michael Mann <mmann78@netscape.net>
Diffstat (limited to 'epan/dissectors/packet-rtp.h')
-rw-r--r--epan/dissectors/packet-rtp.h6
1 files changed, 3 insertions, 3 deletions
diff --git a/epan/dissectors/packet-rtp.h b/epan/dissectors/packet-rtp.h
index db60be435e..b1a421fdab 100644
--- a/epan/dissectors/packet-rtp.h
+++ b/epan/dissectors/packet-rtp.h
@@ -75,8 +75,8 @@ struct _rtp_info {
#if 0 /* these are only needed once the dissector include the crypto functions to decrypt and/or authenticate */
struct srtp_key_info
{
- guint8 *master_key; /* pointer to an se_alloc'ed master key */
- guint8 *master_salt; /* pointer to an se_alloc'ed salt for this master key - NULL if no salt */
+ guint8 *master_key; /* pointer to an wmem_file_scope'ed master key */
+ guint8 *master_salt; /* pointer to an wmem_file_scope'ed salt for this master key - NULL if no salt */
guint8 key_generation_rate; /* encoded as the power of 2, 0..24, or 255 (=zero rate) */
/* Either the MKI value is used (in which case from=to=0), or the <from,to> values are used (and MKI=0) */
guint32 from_roc; /* 32 MSBs of a 48 bit value - frame from which this key is valid (roll-over counter part) */
@@ -94,7 +94,7 @@ struct srtp_info
guint mki_len; /* number of octets used for the MKI in the RTP payload */
guint auth_tag_len; /* number of octets used for the Auth Tag in the RTP payload */
#if 0 /* these are only needed once the dissector include the crypto functions to decrypt and/or authenticate */
- struct srtp_key_info **master_keys; /* an array of pointers to master keys and their info, the array and each key struct being se_alloc'ed */
+ struct srtp_key_info **master_keys; /* an array of pointers to master keys and their info, the array and each key struct being wmem_file_scope'ed */
void *enc_alg_info, /* algorithm-dependent info struct - may be void for default alg with default params */
void *auth_alg_info /* algorithm-dependent info struct - void for default alg with default params */
#endif