aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-netflow.c
diff options
context:
space:
mode:
authorJeff Morriss <jeff.morriss@ulticom.com>2010-09-17 02:03:09 +0000
committerJeff Morriss <jeff.morriss@ulticom.com>2010-09-17 02:03:09 +0000
commitf2cfa4e4538ea7f46b5953a3b65ec1af2e132b71 (patch)
treeaae5d0e2a4619cbeb06414c3a81af14b7f2e248b /epan/dissectors/packet-netflow.c
parent252df40cc2803e179c160b3d8dfa794ae5a1d669 (diff)
From Cal Turney via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5197 :
The NFS dissector (all versions) show access types that have not been requested to be checked as "not allowed" in the call and reply. This is incorrect and misleading. At present one must manually compare what was requested in order to assess if access was actually denied for that type. When there are hundreds or thousands of these ACCESS requests in a capture, it is not possible or practical to manually check each one. The submitted patch does the following: * Passes the access mask in the call to the reply for comparison * Adds filterable fields for each supported (v4) and access type * Adds a pseudo field, nfs.access_denied * Lists the access types to be checked in the summary and tree * Separately lists the supported, denied, and allowed access types in the summary and tree The changes are applied to all NFS versions. From me: a couple of small changes to make it compile without warnings. svn path=/trunk/; revision=34141
Diffstat (limited to 'epan/dissectors/packet-netflow.c')
0 files changed, 0 insertions, 0 deletions