Age | Commit message (Collapse) | Author | Files | Lines |
|
Change-Id: I434da226c842298f4fb2a4335d06d51e164af2af
Reviewed-on: https://code.wireshark.org/review/4394
Reviewed-by: Bill Meier <wmeier@newsguy.com>
|
|
Other minor cleanups while in the area.
Change-Id: I8ea59205cfe6fab643d8fe01b75ce91532004fd9
Reviewed-on: https://code.wireshark.org/review/4004
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
|
|
Change-Id: I8df48b25de784a48a25f0e48aac1e1545ed92c35
Reviewed-on: https://code.wireshark.org/review/2865
Reviewed-by: Michael Mann <mmann78@netscape.net>
|
|
Hopefully that name makes it clear what the routiner's purpose is, and
will encourage people to use it rather than using dissector_add_uint()
with a bogus integer value.
Change-Id: Ic5be456d0ad40b176aab01712ab7b13aed5de2a8
Reviewed-on: https://code.wireshark.org/review/2483
Reviewed-by: Guy Harris <guy@alum.mit.edu>
|
|
https://www.wireshark.org/lists/wireshark-dev/201406/msg00131.html
This reverts commit 246fe2ca4c67d8c98caa84e2f57694f6322e2f96.
Change-Id: Ib24bae0198c13a84bd7f731bf4af921212109a8f
Reviewed-on: https://code.wireshark.org/review/2430
Reviewed-by: Michael Mann <mmann78@netscape.net>
|
|
Change-Id: I9209c1271967405c34c1b6fa43e1726a4d3a5a3f
Reviewed-on: https://code.wireshark.org/review/2377
Reviewed-by: Anders Broman <a.broman58@gmail.com>
|
|
tvb_new_subset -> tvb_new_subset_remaining it appears that's what the intention is.
Change-Id: I2334bbf3f10475b3c22391392fc8b6864454de2d
Reviewed-on: https://code.wireshark.org/review/1999
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
|
|
red/black tree to hash map
Update the readme file accordingly
Change-Id: I056d1ab1f77df641b83fa9b3618b6c25d66e1a83
Reviewed-on: https://code.wireshark.org/review/1420
Reviewed-by: Evan Huus <eapache@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
|
|
(Using sed : sed -i '/^ \* \$Id\$/,+1 d')
Fix manually some typo (in export_object_dicom.c and crc16-plain.c)
Change-Id: I4c1ae68d1c4afeace8cb195b53c715cf9e1227a8
Reviewed-on: https://code.wireshark.org/review/497
Reviewed-by: Anders Broman <a.broman58@gmail.com>
|
|
- Encryption-Encap AVP (AVP code 12)
- Encryption-Algorithm AVP (AVP code 13)
Change-Id: I9a4245b526bc59c2ffa228ce46c80ce3250ef0b6
Reviewed-on: https://code.wireshark.org/review/189
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
|
|
svn path=/trunk/; revision=54085
|
|
Also; fix a few "set but not used" warnings.
svn path=/trunk/; revision=52780
|
|
svn path=/trunk/; revision=52468
|
|
svn path=/trunk/; revision=51612
|
|
svn path=/trunk/; revision=49921
|
|
remove C++ incompatibilities
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8416
svn path=/trunk/; revision=48425
|
|
svn path=/trunk/; revision=45017
|
|
Add new parameter 'data' to heur_dissector_t and new_dissector_t, for now it's always NULL
svn path=/trunk/; revision=44860
|
|
svn path=/trunk/; revision=43538
|
|
svn path=/trunk/; revision=38413
|
|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6109
Add support for PANA Relay
svn path=/trunk/; revision=38257
|
|
svn path=/trunk/; revision=37716
|
|
(AVP length as being interpreted incorrectly).
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5183
From me: General dissector code cleanup & bug fixing:
- Show/dissect AVP "value" for non-vendor-specific AVPs;
- Tighten & cleanup heuristic;
- Fix some potential overflow issues;
- #include <stdio.h> #include <stdlib.h> not req'd;
- Fix some whitespace & formatting;
svn path=/trunk/; revision=34366
|
|
http://www.wireshark.org/lists/wireshark-dev/200809/msg00075.html
(as referenced in https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2907 ) and
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3411 :
Write a new convenience routine for finding a conversation and, if it is not
found, create it. The frame number and addresses are taken from pinfo (as is
the common case).
Use this function in a bunch of dissectors.
svn path=/trunk/; revision=32790
|
|
svn path=/trunk/; revision=32410
|
|
col_clear.diff
Remove calls to col_clear :
- called twice.
- before functions which also clear the column
- by replacing col_clear + col_append_xxx with col_add_xxx
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4394
svn path=/trunk/; revision=31517
|
|
svn path=/trunk/; revision=29340
|
|
More FT_XXX cleanup.
svn path=/trunk/; revision=28971
|
|
svn path=/trunk/; revision=28517
|
|
svn path=/trunk/; revision=27062
|
|
svn path=/trunk/; revision=27053
|
|
svn path=/trunk/; revision=26307
|
|
*reported* length, so that if the packet was cut short by a snapshot
length, we get an exception because we run past the end, and the packet
is marked as having been cut short.
Do not use DISSECTOR_ASSERT() to check for the validity of packet data;
dissectors should try to handle even malformed packets, they shouldn't
report malformed packets as dissector bugs (if DISSECTOR_ASSERT(), that
is *ipso facto* evidence of a dissector bug, *even if the packet is
malformed*).
Update the offset when scanning the packet even if we *aren't* building
the protocol tree.
svn path=/trunk/; revision=25068
|
|
This fixes bug 2464.
svn path=/trunk/; revision=25039
|
|
Hexadecimal and octal are unsigned. Don't let dissectors register signed
fields (FT_INT*) to be displayed in hexadecimal (including HEX_DEC and DEC_HEX)
or octal. Fix dissectors that do that mostly by changing the fields to
unsigned though in PANA it appears the fields are meant to be signed so
change those fields to be displayed in decimal.
This fixes an assertion crash in hfinfo_numeric_format() if/when someone tries
to create a filter using one of these mixed signed/unsigned fields (because
that routine does not know how to present the user with a signed value in
hex).
Also add FT_*INT64 to the "make sure it's not BASE_NONE" check.
svn path=/trunk/; revision=24643
|
|
col_add_*() or proto_add_*(); use val_to_str() (returning "Unknown (%d)" if no match is found) instead.
svn path=/trunk/; revision=24557
|
|
that the length of the first AVP is less than the length of the message.
svn path=/trunk/; revision=23167
|
|
svn path=/trunk/; revision=22585
|
|
Updated patches to support draft-ietf-pana-pana-18.txt.
svn path=/trunk/; revision=22583
|
|
svn path=/trunk/; revision=22282
|
|
Attached is a patch file for the PANA protocol dissector. The changes updates the packet-pana.c dissector to support draft-ietf-pana-pana-15.txt.
svn path=/trunk/; revision=22098
|
|
The packet-pana.c dissector I have submitted previously [SVN rev 21447]
had a minor issue. The following are the fixes:
Change packet-pana.c, Line 823:
{ "Ping","pana.flags.e",
to:
{ "Error","pana.flags.e",
svn path=/trunk/; revision=21731
|
|
add an expert info entry if the AVP length is 0 and just return after
dissecting that AVP.
svn path=/trunk/; revision=21465
|
|
svn path=/trunk/; revision=21448
|
|
svn path=/trunk/; revision=21447
|
|
most have been tagged unused (few have been deleted if dissector has not been
modified since a long time)
move packet-ssl-utils.c to DISSECTOR_SRC
svn path=/trunk/; revision=21431
|
|
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1511
by replacing g_assert() with DISSECTOR_ASSERT().
svn path=/trunk/; revision=21366
|
|
svn path=/trunk/; revision=18894
|
|
svn path=/trunk/; revision=18738
|
|
svn path=/trunk/; revision=18734
|