aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-windows-common.h
AgeCommit message (Collapse)AuthorFilesLines
2010-10-22From CaL Turney:Anders Broman1-3/+10
Add support for well-known SIDs/RIDs and option to display in hex. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5286 svn path=/trunk/; revision=34613
2009-03-31From: yami <yamisoe [AT] gmail.com>: Update comment in .c file; copy same to ↵Bill Meier1-0/+8
.h file svn path=/trunk/; revision=27909
2008-10-03SAMR updatesRonnie Sahlberg1-0/+3
svn path=/trunk/; revision=26340
2007-05-18this error is returned in srvsvc when a SessDel fails because no matching ↵Ronnie Sahlberg1-0/+1
session can be found svn path=/trunk/; revision=21823
2007-05-17add a new dos error codeRonnie Sahlberg1-0/+1
svn path=/trunk/; revision=21809
2006-09-23we did not have a proper WERR error table for the windows errors insterad ↵Ronnie Sahlberg1-0/+104
we justkept adding the errors to the DOS error table (this merging does work ok since there is so very little overlap between he values in both ranges) Add a new WERR error table to packet-windows-common so that PIDL generated dissectors can use this table instead of the DOS table. To make this table as complete and accurate as possible and to avoid having to type all the values in by hand the table is generated from the samba doserr.h file and two small commandlines. The commends in pakcet-windows-common.h explains how to regenerate the table from doserr.h svn path=/trunk/; revision=19306
2006-08-19add some well known rids from s4 security.idl and code to show the name of ↵Ronnie Sahlberg1-0/+3
this rid when dissecting a security descriptor svn path=/trunk/; revision=18959
2006-05-21change a whole bunch of ethereal into wiresharkRonnie Sahlberg1-2/+2
svn path=/trunk/; revision=18196
2006-01-03Fix a typo in a comment.Guy Harris1-1/+1
svn path=/trunk/; revision=16935
2005-10-04Don't ensure all the bytes of a security descriptor exist before callingGuy Harris1-1/+2
"dissect_nt_sec_desc()". Add a Boolean argument to "dissect_nt_sec_desc()" to indicate whether a length was passed to it (so we don't treat -1 as a special value; we want to stop treating -1 as a special length value, and, in fact, want to stop treating *any* negative length values specially, so that we don't have to worry about passing arbitrary 32-bit values from packets as lengths), and have "dissect_nt_sec_desc()" initially create the protocol tree item for the security descriptor with a length of "go to the end of the tvbuff", and set the length once we're done dissecting it - and, if the length was specified, check at *that* point, *after* we've dissected the security descriptor, whether we have the entire security descriptor in the tvbuff. That means that we don't have to worry about overflows after "dissect_nt_sec_desc()" returns - if the length was so large that we would have gotten an overflow, we'd have thrown an exception in the "tvb_ensure_bytes_exist()" call at the end of "dissect_nt_sec_desc()". Do sanity checks on offsets within the security descriptor, so we know the item referred to by the offset is after the fixed-length portion of the descriptor. svn path=/trunk/; revision=16113
2005-07-26char -> const char warning fixesJörg Mayer1-1/+1
svn path=/trunk/; revision=15079
2005-06-26Yet more constification.Guy Harris1-1/+1
svn path=/trunk/; revision=14788
2004-08-03Move a bunch of stuff that's more Windows-related than SMB-related toGuy Harris1-0/+183
"packet-windows-common.[ch]". svn path=/trunk/; revision=11592