aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-windows-common.h
AgeCommit message (Collapse)AuthorFilesLines
2007-05-18this error is returned in srvsvc when a SessDel fails because no matching ↵sahlberg1-0/+1
session can be found git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@21823 f5534014-38df-0310-8fa8-9805f1628bb7
2007-05-17add a new dos error codesahlberg1-0/+1
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@21809 f5534014-38df-0310-8fa8-9805f1628bb7
2006-09-23we did not have a proper WERR error table for the windows errors insterad ↵sahlberg1-0/+104
we justkept adding the errors to the DOS error table (this merging does work ok since there is so very little overlap between he values in both ranges) Add a new WERR error table to packet-windows-common so that PIDL generated dissectors can use this table instead of the DOS table. To make this table as complete and accurate as possible and to avoid having to type all the values in by hand the table is generated from the samba doserr.h file and two small commandlines. The commends in pakcet-windows-common.h explains how to regenerate the table from doserr.h git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@19306 f5534014-38df-0310-8fa8-9805f1628bb7
2006-08-19add some well known rids from s4 security.idl and code to show the name of ↵sahlberg1-0/+3
this rid when dissecting a security descriptor git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@18959 f5534014-38df-0310-8fa8-9805f1628bb7
2006-05-21change a whole bunch of ethereal into wiresharksahlberg1-2/+2
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@18196 f5534014-38df-0310-8fa8-9805f1628bb7
2006-01-03Fix a typo in a comment.guy1-1/+1
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@16935 f5534014-38df-0310-8fa8-9805f1628bb7
2005-10-04Don't ensure all the bytes of a security descriptor exist before callingguy1-1/+2
"dissect_nt_sec_desc()". Add a Boolean argument to "dissect_nt_sec_desc()" to indicate whether a length was passed to it (so we don't treat -1 as a special value; we want to stop treating -1 as a special length value, and, in fact, want to stop treating *any* negative length values specially, so that we don't have to worry about passing arbitrary 32-bit values from packets as lengths), and have "dissect_nt_sec_desc()" initially create the protocol tree item for the security descriptor with a length of "go to the end of the tvbuff", and set the length once we're done dissecting it - and, if the length was specified, check at *that* point, *after* we've dissected the security descriptor, whether we have the entire security descriptor in the tvbuff. That means that we don't have to worry about overflows after "dissect_nt_sec_desc()" returns - if the length was so large that we would have gotten an overflow, we'd have thrown an exception in the "tvb_ensure_bytes_exist()" call at the end of "dissect_nt_sec_desc()". Do sanity checks on offsets within the security descriptor, so we know the item referred to by the offset is after the fixed-length portion of the descriptor. git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@16113 f5534014-38df-0310-8fa8-9805f1628bb7
2005-07-26char -> const char warning fixesjmayer1-1/+1
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@15079 f5534014-38df-0310-8fa8-9805f1628bb7
2005-06-26Yet more constification.guy1-1/+1
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@14788 f5534014-38df-0310-8fa8-9805f1628bb7
2004-08-03Move a bunch of stuff that's more Windows-related than SMB-related toguy1-0/+183
"packet-windows-common.[ch]". git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@11592 f5534014-38df-0310-8fa8-9805f1628bb7