Age | Commit message (Collapse) | Author | Files | Lines |
|
svn path=/trunk/; revision=52591
|
|
Also remove old WS_VAR_IMPORT define and related Makefile magic
everywhere in the project.
svn path=/trunk/; revision=47992
|
|
(COPYING will be updated in next commit)
svn path=/trunk/; revision=43536
|
|
Fix some "assignment discards qualifiers from pointer target type", etc
svn path=/trunk/; revision=41996
|
|
Add support for well-known SIDs/RIDs and option to display in hex.
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5286
svn path=/trunk/; revision=34613
|
|
.h file
svn path=/trunk/; revision=27909
|
|
svn path=/trunk/; revision=26340
|
|
session can be
found
svn path=/trunk/; revision=21823
|
|
svn path=/trunk/; revision=21809
|
|
we justkept adding the errors to the DOS error table (this merging does work ok since there is so very little overlap between he values in both ranges)
Add a new WERR error table to packet-windows-common so that PIDL generated dissectors can use this table instead of the DOS table.
To make this table as complete and accurate as possible and to avoid having to type all the values in by hand the table is generated from the samba doserr.h file and two small commandlines.
The commends in pakcet-windows-common.h explains how to regenerate the table from doserr.h
svn path=/trunk/; revision=19306
|
|
this rid
when dissecting a security descriptor
svn path=/trunk/; revision=18959
|
|
svn path=/trunk/; revision=18196
|
|
svn path=/trunk/; revision=16935
|
|
"dissect_nt_sec_desc()". Add a Boolean argument to
"dissect_nt_sec_desc()" to indicate whether a length was passed to it
(so we don't treat -1 as a special value; we want to stop treating -1 as
a special length value, and, in fact, want to stop treating *any*
negative length values specially, so that we don't have to worry about
passing arbitrary 32-bit values from packets as lengths), and have
"dissect_nt_sec_desc()" initially create the protocol tree item for the
security descriptor with a length of "go to the end of the tvbuff", and
set the length once we're done dissecting it - and, if the length was
specified, check at *that* point, *after* we've dissected the security
descriptor, whether we have the entire security descriptor in the
tvbuff.
That means that we don't have to worry about overflows after
"dissect_nt_sec_desc()" returns - if the length was so large that we
would have gotten an overflow, we'd have thrown an exception in the
"tvb_ensure_bytes_exist()" call at the end of "dissect_nt_sec_desc()".
Do sanity checks on offsets within the security descriptor, so we know
the item referred to by the offset is after the fixed-length portion of
the descriptor.
svn path=/trunk/; revision=16113
|
|
svn path=/trunk/; revision=15079
|
|
svn path=/trunk/; revision=14788
|
|
"packet-windows-common.[ch]".
svn path=/trunk/; revision=11592
|