Age | Commit message (Collapse) | Author | Files | Lines |
|
increment the curr_offset by the correct number of bytes; otherwise we can run
into an infinite loop condition such as was the case for bug 6044.
Reference: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@37930 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Whitespace cleanup.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@36904 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Some fixes for 'set but not used' errors that GCC 4.6 emits.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@36903 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
to itself. Found by clang compiler.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@36813 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@36690 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@36688 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Found by clang.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@36687 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@35986 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@35985 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
/*
* Given a tvbuff, an offset into the tvbuff, and a length that starts
* at that offset (which may be -1 for "all the way to the end of the
* tvbuff"), fetch BCD encoded digits from a tvbuff starting from either
* the low or high half byte, formating the digits according to an input digit set,
* if NUll a default digit set of 0-9 returning "?" for overdecadic digits will be used.
* A pointer to the EP allocated string will be returned.
* Note a tvbuff content of 0xf is considered a 'filler' and will end the conversion.
*/
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@35286 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
keys to have _uint in their names, to match the routines that handle
dissector tables with string keys. (Using _port can confuse people into
thinking they're intended solely for use with TCP/UDP/etc. ports when,
in fact, they work better for things such as Ethernet types, where the
binding of particular values to particular protocols are a lot
stronger.)
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@35224 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@35211 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Minor whitespace and comments cleanup.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@34477 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
ANSI-A dissector does not recognize service option 73
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5176
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@34050 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
ansi_a_ios401_elem_1_strings[] are different lengths so use 'ansi_a_elem_1_max'
to know how far we can look into the array (instead of ANSI_A_E_NONE).
Since that variable points to the end of the array--a NULL entry--and since we
don't want to pass a NULL string pointer to proto_tree_add*(), ensure that
we only look at the last valid entry.
Also remove check_col() calls and reindent a bit.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@32901 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@32467 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@32466 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@32367 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@32243 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@30125 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
(1) Trailing/leading spaces are removed from 'name's/'blurb's
(2) Duplicate 'blurb's are replaced with NULL
(3) Empty ("") 'blurb's are replaced with NULL
(4) BASE_NONE, NULL, 0x0 are used for 'display', 'strings' and 'bitmask' fields
for FT_NONE, FT_BYTES, FT_IPv4, FT_IPv6, FT_ABSOLUTE_TIME, FT_RELATIVE_TIME,
FT_PROTOCOL, FT_STRING and FT_STRINGZ field types
(5) Only allow non-zero value for 'display' if 'bitmask' is non-zero
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@28770 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
statistics.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@28415 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@28117 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
MEID digit translation fix.
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3341
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@27795 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
More dissection of IOS parameters in ANSI MAP IOS Invoke/Response Data
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3323
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@27695 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
pESN detection fix and additional dissection enhancements.
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3254
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@27587 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Minor enhancement for for MEID/pESN
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3100
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@27079 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@27050 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
RFC3558 header dissection (EVRC in RTP)
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@26853 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@26646 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@26252 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@26124 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@25793 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
according to the ANSI C standard, implementation-defined; it could be
unsigned, in which case checking whether it's < 0 will cause a compiler
warning.
Casting a signed enum to unsigned will turn negative values into Really
Big Positive Values, so casting to unsigned and comparing against the
maximum value will catch values with the sign bit set regardless of
whether enums are signed or unsigned.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@24850 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Most ANSI A information elements are not displayed.
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2388
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@24847 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
I just add a test for the index, to check we are in the element table.
This fixes bug 2051.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@23688 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
from chris maynard fix some filter names for ansi_a
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@23056 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
fixes for various compiler warnings
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@21210 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@20409 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
warnings
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19990 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
1)
A small change in the number of teleservices recognized
2)
Finally finished a lot of the changes for IOS 5 support.
The attached files must be used together.
Built in Windows XP Pro using Visual Studio C++ with the latest repository.
packet-ansi_map.c.gz
packet-ansi_a.gz
This file contains both packet-ansi_a.c and packet-ansi_a.h changes.
libwireshark.def.gz
ansi_a_stat.c.gz
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19955 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@18196 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@17551 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@16210 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@15466 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
documentation in README.developer
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@15270 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
Additionally in dissectors/packet-ansi_map.c:
Flag unused parameters as such and remove dummy
param = param;
statements.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@15114 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
there was at least one obvious memleak in one of the uses of tvb_get_string()
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@15027 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
add a "match_strval_idx()" routine that does the same thing, and have
"match_strval()" call it.
Make those routines, and "val_to_str()", return a "const" pointer.
Update dissectors as necessary to squelch compiler warnings produced by
that.
Use "val_to_str()" rather than using "match_strval()" and then, if the
result is null, substituting a specific string. Clean up some other
"match_strval()"/"val_to_str()" usages.
Add a null pointer check in the NDPS dissector's "attribute_value()"
routine, as it's not clear that "global_attribute_name" won't be null at
that point.
Make some global variables in the AFS4INT dissector local.
Make some routines not used outside the module they're in static.
Make some tables "static const".
Clean up white space.
Fix Gerald's address in some files.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@14786 f5534014-38df-0310-8fa8-9805f1628bb7
|
|
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@14771 f5534014-38df-0310-8fa8-9805f1628bb7
|