forked from osmocom/wireshark
Use the same style in netscreen_seek_read() that we use in
netscreen_read(), checking the return value of parse_netscreen_hex_dump() against -1 and explicitly returning FALSE if it's -1, otherwise driving on. svn path=/trunk/; revision=36237
This commit is contained in:
parent
3a39cb2ed6
commit
423e428441
|
@ -322,7 +322,11 @@ netscreen_seek_read (wtap *wth, gint64 seek_off,
|
|||
return FALSE;
|
||||
}
|
||||
|
||||
return (parse_netscreen_hex_dump(wth->random_fh, len, pd, err, err_info) != -1);
|
||||
if (parse_netscreen_hex_dump(wth->random_fh, len, pd, err, err_info)
|
||||
== -1) {
|
||||
return FALSE;
|
||||
}
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
/* Parses a packet record header. There are a few possible formats:
|
||||
|
|
Loading…
Reference in New Issue