diff options
author | Dario Lombardo <lomato@gmail.com> | 2014-06-17 17:30:58 +0200 |
---|---|---|
committer | Anders Broman <a.broman58@gmail.com> | 2014-06-18 14:13:58 +0000 |
commit | 971ffd683ea23362bd8009567ff7860371e6e2cc (patch) | |
tree | 28c9ada98d2e59b196fc839d39ab2448fd436968 /epan/dissectors/packet-exec.c | |
parent | 421d817d70737ebd459b7027274bf38bb2d9a2ff (diff) |
Fixup: tvb_get_string(z) -> tvb_get_string(z)_enc
Change-Id: I63a3704effe3fcab01a193dc39b6a22e9f1cf3fe
Reviewed-on: https://code.wireshark.org/review/2376
Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'epan/dissectors/packet-exec.c')
-rw-r--r-- | epan/dissectors/packet-exec.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/epan/dissectors/packet-exec.c b/epan/dissectors/packet-exec.c index f9d9dd4a0d..27f829619f 100644 --- a/epan/dissectors/packet-exec.c +++ b/epan/dissectors/packet-exec.c @@ -224,7 +224,7 @@ dissect_exec(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) if(hash_info->state == WAIT_FOR_STDERR_PORT && tvb_length_remaining(tvb, offset)){ - field_stringz = tvb_get_stringz(wmem_packet_scope(), tvb, offset, &length); + field_stringz = tvb_get_stringz_enc(wmem_packet_scope(), tvb, offset, &length, ENC_ASCII); /* Check if this looks like the stderr_port field. * It is optional, so it may only be 1 character long @@ -247,7 +247,7 @@ dissect_exec(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) if(hash_info->state == WAIT_FOR_USERNAME && tvb_length_remaining(tvb, offset)){ - field_stringz = tvb_get_stringz(wmem_packet_scope(), tvb, offset, &length); + field_stringz = tvb_get_stringz_enc(wmem_packet_scope(), tvb, offset, &length, ENC_ASCII); /* Check if this looks like the username field */ if(length != 1 && length <= EXEC_USERNAME_LEN @@ -275,7 +275,7 @@ dissect_exec(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) if(hash_info->state == WAIT_FOR_PASSWORD && tvb_length_remaining(tvb, offset)){ - field_stringz = tvb_get_stringz(wmem_packet_scope(), tvb, offset, &length); + field_stringz = tvb_get_stringz_enc(wmem_packet_scope(), tvb, offset, &length, ENC_ASCII); /* Check if this looks like the password field */ if(length != 1 && length <= EXEC_PASSWORD_LEN @@ -298,7 +298,7 @@ dissect_exec(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) if(hash_info->state == WAIT_FOR_COMMAND && tvb_length_remaining(tvb, offset)){ - field_stringz = tvb_get_stringz(wmem_packet_scope(), tvb, offset, &length); + field_stringz = tvb_get_stringz_enc(wmem_packet_scope(), tvb, offset, &length, ENC_ASCII); /* Check if this looks like the command field */ if(length != 1 && length <= EXEC_COMMAND_LEN |