diff options
author | Mikael Kanstrup <mikael.kanstrup@gmail.com> | 2017-08-17 10:21:19 +0200 |
---|---|---|
committer | Michael Mann <mmann78@netscape.net> | 2017-08-17 13:12:43 +0000 |
commit | d56de21d6a56b1897c420802294359b1678bc40a (patch) | |
tree | 1673b9ab526f08e296b325ff66625f1f8a377756 /extcap | |
parent | fc6f7b9021abd604f0d8650881885a5443c2ecb2 (diff) |
androiddump: Fix bt snoop capturing
Recent changes had the bt snoop capturing function stop working for
Android API versions >= 21. One of the command strings used for
detecting btsnoop server socket interface got messed up when
refactoring code. Fix by using the correct command strings again.
Fixes: faf100ec ("androiddump: Introduce adb_connect_transport helper function")
Change-Id: Id645d24cfb0cb23f36484cfd6416768c89bce51b
Reviewed-on: https://code.wireshark.org/review/23106
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Michael Mann <mmann78@netscape.net>
Diffstat (limited to 'extcap')
-rw-r--r-- | extcap/androiddump.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/extcap/androiddump.c b/extcap/androiddump.c index 3cc67de5f2..f2c03db9cf 100644 --- a/extcap/androiddump.c +++ b/extcap/androiddump.c @@ -1183,7 +1183,7 @@ static int register_interfaces(extcap_parameters * extcap_conf, const char *adb_ sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number); if (sock == INVALID_SOCKET) continue; - response = adb_send_and_read(sock, ps_cmd, check_port_buf, sizeof(helpful_packet), &data_length); + response = adb_send_and_read(sock, check_port_buf, helpful_packet, sizeof(helpful_packet), &data_length); closesocket(sock); if (!response) { |