aboutsummaryrefslogtreecommitdiffstats
path: root/wiretap/etherpeek.c
diff options
context:
space:
mode:
authorguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>2011-04-12 18:21:05 +0000
committerguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>2011-04-12 18:21:05 +0000
commit4f1db3b3290a07299219e19a480e89db72eb80ae (patch)
tree4918291883fd6a940bc4b3be6494298cdeae6450 /wiretap/etherpeek.c
parent4306629e8846aad29bc5dc73d0a45ee72031ef8a (diff)
#if 0 out some unused variables; we may make use of them later, but this
keeps GCC 4.6.0 from complaining about them and failing to build with -Werror, and may also squelch some Coverity (and other static analyzer) complaints. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@36599 f5534014-38df-0310-8fa8-9805f1628bb7
Diffstat (limited to 'wiretap/etherpeek.c')
-rw-r--r--wiretap/etherpeek.c16
1 files changed, 16 insertions, 0 deletions
diff --git a/wiretap/etherpeek.c b/wiretap/etherpeek.c
index 81e4dba572..39c20327d9 100644
--- a/wiretap/etherpeek.c
+++ b/wiretap/etherpeek.c
@@ -365,10 +365,14 @@ static gboolean etherpeek_read_v7(wtap *wth, int *err, gchar **err_info,
gint64 *data_offset)
{
guchar ep_pkt[ETHERPEEK_V7_PKT_SIZE];
+#if 0
guint16 protoNum;
+#endif
guint16 length;
guint16 sliceLength;
+#if 0
guint8 flags;
+#endif
guint8 status;
guint64 timestamp;
time_t tsecs;
@@ -381,10 +385,14 @@ static gboolean etherpeek_read_v7(wtap *wth, int *err, gchar **err_info,
wth->data_offset += sizeof(ep_pkt);
/* Extract the fields from the packet */
+#if 0
protoNum = pntohs(&ep_pkt[ETHERPEEK_V7_PROTONUM_OFFSET]);
+#endif
length = pntohs(&ep_pkt[ETHERPEEK_V7_LENGTH_OFFSET]);
sliceLength = pntohs(&ep_pkt[ETHERPEEK_V7_SLICE_LENGTH_OFFSET]);
+#if 0
flags = ep_pkt[ETHERPEEK_V7_FLAGS_OFFSET];
+#endif
status = ep_pkt[ETHERPEEK_V7_STATUS_OFFSET];
timestamp = pntohll(&ep_pkt[ETHERPEEK_V7_TIMESTAMP_OFFSET]);
@@ -538,11 +546,15 @@ static gboolean etherpeek_read_v56(wtap *wth, int *err, gchar **err_info _U_,
guchar ep_pkt[ETHERPEEK_V56_PKT_SIZE];
guint16 length;
guint16 sliceLength;
+#if 0
guint8 flags;
guint8 status;
+#endif
guint32 timestamp;
+#if 0
guint16 destNum;
guint16 srcNum;
+#endif
guint16 protoNum;
char protoStr[8];
unsigned int i;
@@ -565,11 +577,15 @@ static gboolean etherpeek_read_v56(wtap *wth, int *err, gchar **err_info _U_,
/* Extract the fields from the packet */
length = pntohs(&ep_pkt[ETHERPEEK_V56_LENGTH_OFFSET]);
sliceLength = pntohs(&ep_pkt[ETHERPEEK_V56_SLICE_LENGTH_OFFSET]);
+#if 0
flags = ep_pkt[ETHERPEEK_V56_FLAGS_OFFSET];
status = ep_pkt[ETHERPEEK_V56_STATUS_OFFSET];
+#endif
timestamp = pntohl(&ep_pkt[ETHERPEEK_V56_TIMESTAMP_OFFSET]);
+#if 0
destNum = pntohs(&ep_pkt[ETHERPEEK_V56_DESTNUM_OFFSET]);
srcNum = pntohs(&ep_pkt[ETHERPEEK_V56_SRCNUM_OFFSET]);
+#endif
protoNum = pntohs(&ep_pkt[ETHERPEEK_V56_PROTONUM_OFFSET]);
memcpy(protoStr, &ep_pkt[ETHERPEEK_V56_PROTOSTR_OFFSET],
sizeof protoStr);