aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-dns.c
diff options
context:
space:
mode:
authorJörg Mayer <jmayer@loplof.de>2006-01-20 21:18:18 +0000
committerJörg Mayer <jmayer@loplof.de>2006-01-20 21:18:18 +0000
commita052b3a98b5ddb839ad5c7bb22c8ed06cfca3f58 (patch)
tree016767623fc98e98b07e2c39e6ab1e27f4febf89 /epan/dissectors/packet-dns.c
parent613d04a1ce869e9811eb13f4cf5a1a5b0bb5c632 (diff)
packet-bgp.c: Fix incorrect use of g_snprintf return value
mp_addr_to_str was unnecessary 'complex' - simplified it packet-dns.c: Fix incorrect use of g_snprintf return value packet-dcm.c: Fix incorrect use of g_snprintf return value Someone who understands the protocol should look at the "vr, tr might be used uninitialized..." warning. packet-x11.c: Fix incorrect use of g_snprintf return value packet-kerberos.c: Fix incorrect use of g_snprintf return value Someone should take a look at the "longjump might clobber ..." messages packet-diameter.c: Fix incorrect use of g_snprintf return value Get rid of unsigned < 0 check packet-pgm.c: Fix incorrect use of g_snprintf return value packet-nbns.c: Fix incorrect use of g_snprintf return value packet-winsrepl.c: Collateral damage to packet-nbns.c fix packet-netbios.c: Collateral damage to packet-nbns.c fix packet-netbios.h: Collateral damage to packet-nbns.c fix packet-kerberos.c: Collateral damage to packet-nbns.c fix packet-nbipx.c: Collateral damage to packet-nbns.c fix svn path=/trunk/; revision=17065
Diffstat (limited to 'epan/dissectors/packet-dns.c')
-rw-r--r--epan/dissectors/packet-dns.c32
1 files changed, 20 insertions, 12 deletions
diff --git a/epan/dissectors/packet-dns.c b/epan/dissectors/packet-dns.c
index 6599650111..59de4a896d 100644
--- a/epan/dissectors/packet-dns.c
+++ b/epan/dissectors/packet-dns.c
@@ -1185,19 +1185,23 @@ dissect_dns_answer(tvbuff_t *tvb, int offset, int dns_data_offset,
for (i = 0; i < 8; i++) {
if (bits & mask) {
if (strptr!=bitnames)
- strptr += g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), ", ");
+ strptr += MIN(MAX_STR_LEN-(strptr-bitnames),
+ g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), ", "));
switch (protocol) {
case IP_PROTO_TCP:
- strptr += g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), get_tcp_port(port_num));
+ strptr += MIN(MAX_STR_LEN-(strptr-bitnames),
+ g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), get_tcp_port(port_num)));
break;
case IP_PROTO_UDP:
- strptr += g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), get_udp_port(port_num));
+ strptr += MIN(MAX_STR_LEN-(strptr-bitnames),
+ g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), get_udp_port(port_num)));
break;
default:
- strptr += g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), "%u", port_num);
+ strptr += MIN(MAX_STR_LEN-(strptr-bitnames),
+ g_snprintf(strptr, MAX_STR_LEN-(strptr-bitnames), "%u", port_num));
break;
}
}
@@ -2337,14 +2341,16 @@ dissect_dns_common(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
if (check_col(pinfo->cinfo, COL_INFO)) {
bufpos=0;
- bufpos+=g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, "%s%s",
+ bufpos+=MIN(MAX_BUF_SIZE-bufpos,
+ g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, "%s%s",
val_to_str(opcode, opcode_vals, "Unknown operation (%u)"),
- (flags&F_RESPONSE)?" response":"");
+ (flags&F_RESPONSE)?" response":""));
if (flags & F_RESPONSE) {
if ((flags & F_RCODE) != RCODE_NOERROR) {
- bufpos+=g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, ", %s",
- val_to_str(flags & F_RCODE, rcode_vals, "Unknown error (%u)"));
+ bufpos+=MIN(MAX_BUF_SIZE-bufpos,
+ g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, ", %s",
+ val_to_str(flags & F_RCODE, rcode_vals, "Unknown error (%u)")));
}
}
col_add_str(pinfo->cinfo, COL_INFO, buf);
@@ -2376,11 +2382,13 @@ dissect_dns_common(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
offset + DNS_ID, 2, id);
bufpos=0;
- bufpos+=g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, "%s",
- val_to_str(opcode, opcode_vals, "Unknown operation"));
+ bufpos+=MIN(MAX_BUF_SIZE-bufpos,
+ g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, "%s",
+ val_to_str(opcode, opcode_vals, "Unknown operation")));
if (flags & F_RESPONSE) {
- bufpos+=g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, " response, %s",
- val_to_str(flags & F_RCODE, rcode_vals, "Unknown error"));
+ bufpos+=MIN(MAX_BUF_SIZE-bufpos,
+ g_snprintf(buf+bufpos, MAX_BUF_SIZE-bufpos, " response, %s",
+ val_to_str(flags & F_RCODE, rcode_vals, "Unknown error")));
}
tf = proto_tree_add_uint_format(dns_tree, hf_dns_flags, tvb,
offset + DNS_FLAGS, 2,