aboutsummaryrefslogtreecommitdiffstats
path: root/wiretap/netscreen.c
AgeCommit message (Expand)AuthorFilesLines
2017-06-05Allow bigger snapshot lengths for D-Bus captures.Guy Harris1-2/+2
2017-03-27netscreen.c: Suppress compiler warnings on WindowsMichael Mann1-0/+3
2016-05-01Don't treat the packet length as unsigned.Guy Harris1-3/+8
2016-04-30Fix packet length handling.Guy Harris1-61/+40
2015-01-03Remove unnecessary includes from wiretap folderMartin Mathieson1-2/+0
2015-01-02Add "Editor modelines"; Adjust whitespace as needed.Bill Meier1-17/+30
2014-10-17Don't use ctype.h routines.Guy Harris1-3/+2
2014-10-09Use an enum for the open-routine return value, as per Evan Huus's suggestion.Guy Harris1-5/+5
2014-09-28Make the time stamp resolution per-packet.Guy Harris1-1/+1
2014-08-02Rename buffer_ routines to ws_buffer_ to avoid name collisions.Guy Harris1-2/+2
2014-07-15Only one buffer.c, please.Guy Harris1-1/+1
2014-05-24Allow wtap_read() and wtap_seek_read() to return records other than packets.Guy Harris1-0/+1
2014-05-23Revert "Allow wtap_read() and wtap_seek_read() to return non-packet records."Guy Harris1-13/+13
2014-05-23Allow wtap_read() and wtap_seek_read() to return non-packet records.Guy Harris1-13/+13
2014-05-09Revert "Refactor Wiretap"Guy Harris1-39/+36
2014-05-09Refactor WiretapMichael Mann1-36/+39
2014-03-04Remove all $Id$ from top of fileAlexis La Goutte1-2/+0
2014-01-02No seek-read routines use the length argument, so eliminate it fromGuy Harris1-2/+2
2013-12-31Use the packet length read from the packet header when reading packetsGuy Harris1-8/+9
2013-11-08(Trivial) whitespace cleanup (mostly trailing whitespace).Bill Meier1-7/+7
2013-11-08The "file types" we have are actually combinations of types andGuy Harris1-1/+1
2013-06-16Have the seek-read routines take a Buffer rather than a guint8 pointerGuy Harris1-14/+14
2013-06-15Pull some of the code to set the struct wtap_pkthdr intoGuy Harris1-47/+50
2013-01-02Update TODO list - the first two items are done, and with stuff added toGuy Harris1-65/+75
2012-12-28Use the "if (file_gets(...) == NULL) { fail }" style, as used elsewhere.Guy Harris1-13/+12
2012-12-27Errors take precedence over EOF; use file_error() after operations thatGuy Harris1-18/+10
2012-12-27Do not call wtap_file_read_unknown_bytes() orGuy Harris1-7/+3
2012-10-17Fill some phdr values also when doing random readJakub Zawadzki1-20/+17
2012-10-16Add wtap_pseudo_header union to wtap_pkthdr structure.Jakub Zawadzki1-3/+4
2012-09-20We always HAVE_CONFIG_H so don't bother checking whether we have it or not.Jeff Morriss1-2/+0
2012-06-28Update Free Software Foundation address.Jakub Zawadzki1-1/+1
2012-06-06Fix bug #7340Jakub Zawadzki1-1/+1
2012-05-04file_seek() used to be a wrapper around fseek() or gzseek(), both ofGuy Harris1-2/+0
2012-02-25Add a presence flag field to the packet information structure filled inGuy Harris1-0/+2
2011-12-13Rename WTAP_ERR_BAD_RECORD to WTAP_ERR_BAD_FILE; it really reports anyGuy Harris1-4/+4
2011-04-21Add a new WTAP_ERR_DECOMPRESS error, and use that for errors discoveredGuy Harris1-13/+18
2011-04-11Use ws_open(), not open(), so we handle UTF-8 pathnames on Windows.Guy Harris1-4/+1
2011-04-07Be more picky about our sscanf integer field widths. Hopefully this willGerald Combs1-1/+1
2011-03-22Use the same style in netscreen_seek_read() that we use inGuy Harris1-1/+5
2011-03-21Fix for bug 5762, wireshark asserts on reading juniper snoop output when no h...Sake Blok1-1/+1
2009-05-25Fix for bug 3469:Sake Blok1-10/+27
2009-03-09P64 fixes.Gerald Combs1-1/+1
2008-12-20From babi: Fix three overflows (bugs 3150 and 3151).Gerald Combs1-1/+1
2008-05-08strncpy -> g_strlcpyAnders Broman1-2/+1
2007-11-15Added correct svn propset settings to wiretap/netscreen.[ch]Sake Blok1-0/+2
2007-09-29When reading NetScreen snoop output, only use WTAP_ENCAP_PER_PACKETSake Blok1-1/+23
2007-09-28When reading NetScreen snoop output, allow the '.' in interface namesSake Blok1-1/+1
2007-09-25Allow the output of NetScreen VSI interfaces to be parsed.Sake Blok1-1/+1
2007-09-01This patch solves two issue with the NetScreen wiretap routine:Sake Blok1-7/+7
2007-08-17(http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1717)Sake Blok1-0/+437