Age | Commit message (Collapse) | Author | Files | Lines |
|
we regenerate the dissector
svn path=/trunk/; revision=30455
|
|
svn path=/trunk/; revision=30409
|
|
* Remove check_col guards
svn path=/trunk/; revision=30127
|
|
svn path=/trunk/; revision=29446
|
|
Date: Mon, 27 Jul 2009 08:55:55 +0000 (+0200)
Subject: patch_ldap_260709
Add a few additional LDAP OIDs
and increase the maximum SASL blob size to be 1M instead of 256kb
svn path=/trunk/; revision=29210
|
|
More FT_XXX cleanup.
svn path=/trunk/; revision=28971
|
|
Cleanup header_field_info definitions
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3548
svn path=/trunk/; revision=28940
|
|
The previous check is incorrect when the first ldap frame in the capture is
selected and the filter is changed, or selecting "Follow TCP Stream".
Also removed check_col().
svn path=/trunk/; revision=28889
|
|
svn path=/trunk/; revision=28888
|
|
svn path=/trunk/; revision=28799
|
|
svn path=/trunk/; revision=28783
|
|
don't need check against it.
svn path=/trunk/; revision=27861
|
|
svn path=/trunk/; revision=27482
|
|
guarantee a non-null string value. Use it in the LDAP dissector. Fixes
the crash on Windows (and other platforms) reported in bug 3262.
svn path=/trunk/; revision=27478
|
|
svn path=/trunk/; revision=26772
|
|
Use find_dissector;
Initialize saved tcp_port pref properly; This should
fix a possble bug wherein LDAP over SSL would not
be dissected properly. (I don't have a test capture
to verify this fix).
svn path=/trunk/; revision=26764
|
|
svn path=/trunk/; revision=26711
|
|
LDAP response".
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2687
svn path=/trunk/; revision=26272
|
|
Extended the cldap desector to include all the current netlogon response data
types.
Expanded the cldap netlogon ntver option to be a bit mask of the search flags
Updated the DS flags fields to include Windows 2008 options.
svn path=/trunk/; revision=25942
|
|
( I edited the template files)
Failure to dissect long SASL wrapped LDAP response.
svn path=/trunk/; revision=25890
|
|
indentation changes.
svn path=/trunk/; revision=25803
|
|
Attached is a patch to the ldap_reinit() function to fix bug 2407.
This particular bug was triggered by the order of steps used to walk
and free the nodes of the ldap_info_items list.
This should go into the next 1.0 release.
svn path=/trunk/; revision=24838
|
|
don't se_ alloc that structure but rather g_malloc() it and free it after we've freed the contents. This fixes the LDAP part of the crash from http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1113
svn path=/trunk/; revision=24664
|
|
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1613 : if the string is NULL pass "(null)" in instead (that's the behavior we get on Linux anyway).
svn path=/trunk/; revision=24660
|
|
2) Support for RFC 3909 - cancelRequest extendedOperation
3) Support for RFC 3062 - passwordModify extendedOperation
4) Column information for ExtendedRequest, SearchResultRef and AbandonRequest
5) Column information for multiple LDAP operations in the same packet (uses " | " separator)
svn path=/trunk/; revision=24195
|
|
- Fixed last parameter to cry_cipher_open() in pkcs12
svn path=/trunk/; revision=24116
|
|
extended operation arguments and results.
svn path=/trunk/; revision=24076
|
|
dissect_ber_boolean() to return a value and update asn2wrs to generate the new signature.
Regenerate all BER dissectors.
svn path=/trunk/; revision=24015
|
|
svn path=/trunk/; revision=24008
|
|
Spotted by Tomas Kukosa.
svn path=/trunk/; revision=23921
|
|
asn2wrs has -T (tagged types support) and -X (new BER sttructures) default behavior
remove all -T and -X usage
svn path=/trunk/; revision=23823
|
|
value
svn path=/trunk/; revision=23458
|
|
svn path=/trunk/; revision=23353
|
|
svn path=/trunk/; revision=23335
|
|
svn path=/trunk/; revision=23333
|
|
get_oid_str_name() -> oid_resolved_from_string()
get_oid_name() -> oid_resolved_from_encoded()
svn path=/trunk/; revision=23331
|
|
fix compil of gsmmap and inap.
Note xcopy of gsmmap does not work(rename packet-gsm_map -> packet-gsmmap ?)
svn path=/trunk/; revision=23325
|
|
- if offset is 0, tvb_length is the same as tvb_length_remaining, just faster.
Replace
- col_append_fstr() with faster col_append_str()
- col_add_str() with col_set_str()
when it's safe
svn path=/trunk/; revision=23252
|
|
- Add EXPORT_FILES to all files that still contain -e.
svn path=/trunk/; revision=23145
|
|
- Add missing new directories to asn1/Makefile.nmake
svn path=/trunk/; revision=23141
|
|
svn path=/trunk/; revision=23127
|
|
svn path=/trunk/; revision=23109
|
|
packet-ldap-template.c(1330) : error C2220: warning treated as error - no object file generated
packet-ldap-template.c(1330) : warning C4101: 'gss_len' : unreferenced local var iable NMAKE : fatal error U1077: 'cl' :
svn path=/trunk/; revision=22956
|
|
authentication packet or else we will get inconsistent dissection when
clicking on packets.
(inconsistent as in : a certain packet might/might not be dissected as
LDAP/SASL depending on which packets we clicked on previously)
svn path=/trunk/; revision=22949
|
|
cant check that the payload starts with BER tag 0x60 and an oid.
instead check that the length byte (first 4 bytes) look sane and if
SASL authentication has been negotiated on the connection
also, sometimes clients will mix both non-SASL and SASL protected LDAP
traffic on the same tcp connection by initially performing simple
unauthenticated searches on the database before performing the Bind.
svn path=/trunk/; revision=22948
|
|
wrappers that can be used when connecting with sasl
svn path=/trunk/; revision=22945
|
|
svn path=/trunk/; revision=22651
|
|
Rebuild asn1 dissectors.
svn path=/trunk/; revision=22627
|
|
one remaining use of tvb_get_string(), g_free the old entry if the pointer is *not* NULL.
svn path=/trunk/; revision=22518
|
|
svn path=/trunk/; revision=22199
|