forked from osmocom/wireshark
Update URLs pointing to the bug database.
Switch from bugs.wireshark.org to the GitLab issues list.
This commit is contained in:
parent
e02229250d
commit
a883081b70
|
@ -898,7 +898,7 @@
|
|||
</avp>
|
||||
<avp name="Acct-Session-Id" code="44" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
|
||||
<type type-name="OctetString"/>
|
||||
<!-- See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5411 -->
|
||||
<!-- See https://gitlab.com/wireshark/wireshark/-/issues/5411 -->
|
||||
</avp>
|
||||
<avp name="Acct-Authentic" code="45" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
|
||||
<type type-name="Enumerated"/>
|
||||
|
|
|
@ -212,7 +212,7 @@ ApplyChargingArg {PARAMETERS-BOUND : bound} ::= SEQUENCE {
|
|||
DEFAULT legID:sendingSideID:leg1,
|
||||
...,
|
||||
-- WS modification Frensh National standard addition
|
||||
-- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7656
|
||||
-- https://gitlab.com/wireshark/wireshark/-/issues/7656
|
||||
iTXcharging [64] BOOLEAN OPTIONAL
|
||||
-- End WS
|
||||
}
|
||||
|
|
|
@ -34,7 +34,7 @@ FROM MAP-ExtensionDataTypes {
|
|||
gsm-Network (1) modules (3) map-ExtensionDataTypes (21) version13 (13)}
|
||||
;
|
||||
|
||||
-- non 3GPP standard compliant extension used by Ericsson (see https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7648)
|
||||
-- non 3GPP standard compliant extension used by Ericsson (see https://gitlab.com/wireshark/wireshark/-/issues/7648)
|
||||
EnhancedCheckIMEI-Arg ::= SEQUENCE {
|
||||
imei IMEI,
|
||||
requestedEquipmentInfo RequestedEquipmentInfo OPTIONAL,
|
||||
|
|
|
@ -462,7 +462,7 @@ dissect_mpeg_pes(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data
|
|||
|
||||
offset = dissect_mpeg_pes_Stream(tvb, offset, &asn1_ctx,
|
||||
tree, hf_mpeg_pes_extension);
|
||||
/* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2229
|
||||
/* https://gitlab.com/wireshark/wireshark/-/issues/2229
|
||||
* A value of 0 indicates that the PES packet length
|
||||
* is neither specified nor bounded and is allowed
|
||||
* only in PES packets whose payload is a video
|
||||
|
|
|
@ -1207,7 +1207,7 @@ dissect_acdr_voiceai(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *
|
|||
* an http_message_info_t *, and that's *NOT* what we hand
|
||||
* subdissectors. Hilarity ensures; see
|
||||
*
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16622
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/16622
|
||||
*/
|
||||
call_dissector(json_dissector_handle, tvb, pinfo, tree);
|
||||
return tvb_captured_length(tvb);
|
||||
|
|
|
@ -805,7 +805,7 @@ create_data_tree(proto_tree *tree, header_field_info* hfi, tvbuff_t *tvb, guint3
|
|||
* So: the loop should be executed only when 'tree' is defined so that the
|
||||
* proto_ calls will throw an exception when the tvb is used up;
|
||||
* This should only take a few-hundred loops at most.
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8312
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/8312
|
||||
*/
|
||||
|
||||
/**
|
||||
|
|
|
@ -211,7 +211,7 @@ static const value_string sm_pdu_type_value[] = {
|
|||
};
|
||||
|
||||
/* TODO: Change to useful name once known */
|
||||
#define SM_PROTOCOL_X004 0x0004 /* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7188 */
|
||||
#define SM_PROTOCOL_X004 0x0004 /* https://gitlab.com/wireshark/wireshark/-/issues/7188 */
|
||||
/* RUDP/SM stack called BSM V1 (version 1 versus Version 0 used for SS7). */
|
||||
#define SM_PROTOCOL_X100 0x0100
|
||||
#define SM_PROTOCOL_X101 0x0101
|
||||
|
|
|
@ -137,7 +137,7 @@ On 12/14/2010 08:04 AM, Masatake YAMATO wrote:
|
|||
>>>> Honza
|
||||
>>> I got the similar comment from wireshark developer.
|
||||
>>> Please, read the discussion:
|
||||
>>> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3232
|
||||
>>> https://gitlab.com/wireshark/wireshark/-/issues/3232
|
||||
>>>
|
||||
>>
|
||||
>> I've read that thread long time before I've sent previous mail, so
|
||||
|
@ -214,7 +214,7 @@ nnn>>
|
|||
>
|
||||
>>> licensed in 3-clause BSD, as you know. I'd like to change the license
|
||||
>>> to merge my code to upstream project. I cannot do it in this context.
|
||||
>>> See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3232#c13
|
||||
>>> See https://gitlab.com/wireshark/wireshark/-/issues/3232#c13
|
||||
>>> Thank you.
|
||||
>>
|
||||
>> Regards,
|
||||
|
|
|
@ -2370,7 +2370,7 @@ dissect_dhcpopt_user_class_information(tvbuff_t *tvb, packet_info *pinfo, proto_
|
|||
* "MSFT 5.0") such as "RRAS.Microsoft" and others like "iPXE".
|
||||
* In the unlikely case that the first character can be interpreted as a valid length the next iteration
|
||||
* of this while loop will catch that.
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16349
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/16349
|
||||
* https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dhcpe/fe8a2dd4-1e8c-4546-bacd-4ae10de02058
|
||||
*/
|
||||
proto_item *expert_ti = proto_tree_add_item(tree, hf_dhcp_option77_user_class_text, tvb, offset, uci_len, ENC_ASCII|ENC_NA);
|
||||
|
|
|
@ -429,7 +429,7 @@ read_length(unsigned int *offset, tvbuff_t *tvb, proto_tree *etch_tree)
|
|||
|
||||
if (*offset + length < *offset) {
|
||||
/* overflow case
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8464 */
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/8464 */
|
||||
length = tvb_reported_length_remaining(tvb, *offset);
|
||||
}
|
||||
return length;
|
||||
|
|
|
@ -191,7 +191,7 @@ static void dissect_fcsp_dhchap_auth_param(tvbuff_t *tvb, proto_tree *tree,
|
|||
default:
|
||||
/* If we don't recognize the auth_param_tag and the param_len
|
||||
* is 0 then just return to prevent an infinite loop. See
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8359
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/8359
|
||||
*/
|
||||
if (param_len == 0) {
|
||||
return;
|
||||
|
|
|
@ -522,7 +522,7 @@ static const value_string target_address_discriminant_vals[] = {
|
|||
{ 0, NULL}
|
||||
};
|
||||
Bug fix:
|
||||
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2800
|
||||
https://gitlab.com/wireshark/wireshark/-/issues/2800
|
||||
http://ethereal.netmirror.org/lists/ethereal-users/200303/msg00135.html
|
||||
*/
|
||||
static const value_string response_flags_vals[] = {
|
||||
|
|
|
@ -257,7 +257,7 @@ dissect_schedule_message(tvbuff_t *tvb, packet_info *pinfo, proto_tree *top_tree
|
|||
/* XXX I don't know if a message can validly contain more than
|
||||
* 48 slots, but that's the size of the array we create so cap
|
||||
* it there to avoid uninitialized memory errors (see bug
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9270) */
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/9270) */
|
||||
if (sched_end > 48)
|
||||
sched_end = 48;
|
||||
while ((k<sched_end) && (other_slots[k]!=0xFFFF))
|
||||
|
@ -291,7 +291,7 @@ dissect_schedule_message(tvbuff_t *tvb, packet_info *pinfo, proto_tree *top_tree
|
|||
* case. Perhaps just an expert info is appropriate?
|
||||
* Regardless, we need to increment k to prevent an
|
||||
* infinite loop, see
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8730
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/8730
|
||||
*/
|
||||
++k;
|
||||
}
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
* National variants
|
||||
* French ISUP Specification: SPIROU 1998 - 002-005 edition 1 ( Info found here http://www.icg-corp.com/docs/ISUP.pdf ).
|
||||
* See also http://www.fftelecoms.org/sites/default/files/contenus_lies/fft_interco_ip_-_sip-i_interface_specification_v1_0.pdf
|
||||
* Israeli ISUP Specification: excertp (for BCM message) found in https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4231 .
|
||||
* Israeli ISUP Specification: excertp (for BCM message) found in https://gitlab.com/wireshark/wireshark/-/issues/4231 .
|
||||
* Russian national ISUP-R 2000: RD 45.217-2001 book 4
|
||||
* Japan ISUP http://www.ttc.or.jp/jp/document_list/sum/sum_JT-Q763v21.1.pdf
|
||||
*/
|
||||
|
|
|
@ -1191,7 +1191,7 @@ static const value_string hytec_mc[] = {
|
|||
|
||||
/* Some vendors interpreted the standard to invert the bitorder:
|
||||
* according to a IEEE ruling, this is now officially wrong.
|
||||
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1455
|
||||
* See https://gitlab.com/wireshark/wireshark/-/issues/1455
|
||||
* for all the gory details
|
||||
*/
|
||||
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
*
|
||||
* Used some code by habibi_khalid <khalidhabibi@gmx.de> and
|
||||
* Honorine_KEMGNE_NGUIFFO <honorinekemgne@yahoo.fr> from
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4704
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/4704
|
||||
*
|
||||
* Wireshark - Network traffic analyzer
|
||||
* By Gerald Combs <gerald@wireshark.org>
|
||||
|
|
|
@ -903,7 +903,7 @@ dissect_mpeg_pes(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data
|
|||
|
||||
offset = dissect_mpeg_pes_Stream(tvb, offset, &asn1_ctx,
|
||||
tree, hf_mpeg_pes_extension);
|
||||
/* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2229
|
||||
/* https://gitlab.com/wireshark/wireshark/-/issues/2229
|
||||
* A value of 0 indicates that the PES packet length
|
||||
* is neither specified nor bounded and is allowed
|
||||
* only in PES packets whose payload is a video
|
||||
|
|
|
@ -4887,7 +4887,7 @@ dissect_v9_v10_pdu_data(tvbuff_t *tvb, packet_info *pinfo, proto_tree *pdutree,
|
|||
/* have the same template with the same ID. */
|
||||
/* XXX: One capture has been seen wherein the "length" field in the template is 0 even though
|
||||
the field is actually present in the dataflow.
|
||||
See: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10432#c1
|
||||
See: https://gitlab.com/wireshark/wireshark/-/issues/10432#c1
|
||||
*/
|
||||
continue;
|
||||
}
|
||||
|
|
|
@ -96,7 +96,7 @@ static int dissect_nwmtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, vo
|
|||
call_dissector(mtp_handle, next_tvb, pinfo, tree);
|
||||
/* Check for overflows, which probably can't happen, but better
|
||||
* safe than sorry. See
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8169
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/8169
|
||||
*/
|
||||
DISSECTOR_ASSERT(len < G_MAXUINT32 - 11);
|
||||
DISSECTOR_ASSERT((guint64)offset + len + 12 < G_MAXINT);
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
* Decryption is supported via TLS 1.3 secrets in the "TLS Key Log File",
|
||||
* configured either at the TLS Protocol preferences, or embedded in a pcapng
|
||||
* file. Sample captures and secrets can be found at:
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13881
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/13881
|
||||
*
|
||||
* Limitations:
|
||||
* - STREAM offsets larger than 32-bit are unsupported.
|
||||
|
@ -3257,7 +3257,7 @@ static tap_packet_status
|
|||
follow_quic_tap_listener(void *tapdata, packet_info *pinfo, epan_dissect_t *edt _U_, const void *data)
|
||||
{
|
||||
// TODO fix filtering for multiple streams, see
|
||||
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16093
|
||||
// https://gitlab.com/wireshark/wireshark/-/issues/16093
|
||||
follow_tvb_tap_listener(tapdata, pinfo, NULL, data);
|
||||
return TAP_PACKET_DONT_REDRAW;
|
||||
}
|
||||
|
|
|
@ -140,7 +140,7 @@ static gboolean rtmpt_desegment = TRUE;
|
|||
* exceed 256KB, but setting the limit there can cause massive memory
|
||||
* usage in some scenarios. For now make it a preference, but a better fix
|
||||
* is really needed.
|
||||
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6898
|
||||
* See https://gitlab.com/wireshark/wireshark/-/issues/6898
|
||||
*/
|
||||
static guint rtmpt_max_packet_size = 32768;
|
||||
|
||||
|
|
|
@ -2112,7 +2112,7 @@ dissect_sip_contact_item(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gi
|
|||
/* it is actually unusual - arguably invalid - for a SIP REGISTER
|
||||
* 200 OK _response_ to contain Contacts with expires=0.
|
||||
*
|
||||
* See Bug https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10364
|
||||
* See Bug https://gitlab.com/wireshark/wireshark/-/issues/10364
|
||||
* Why this warning was removed (3GPP usage, 3GPP TS24.229 )
|
||||
*/
|
||||
#if 0
|
||||
|
|
|
@ -6507,7 +6507,7 @@ tls_dissect_certificate_authorities(ssl_common_dissect_t *hf, tvbuff_t *tvb, pac
|
|||
|
||||
if (dnames_count-- == 0) {
|
||||
/* stop adding to tree when the list is considered too large
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16202
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/16202
|
||||
Note: dnames_count must be set low enough not to hit the
|
||||
limit set by PINFO_LAYER_MAX_RECURSION_DEPTH in packet.c
|
||||
*/
|
||||
|
@ -9397,7 +9397,7 @@ dissect_ssl3_hnd_cli_keyex_rsa(ssl_common_dissect_t *hf, tvbuff_t *tvb,
|
|||
case DTLSV1DOT0_OPENSSL_VERSION:
|
||||
/* OpenSSL pre-0.9.8f DTLS and pre-TLS quirk: 2-octet length vector is
|
||||
* not present. The handshake contents represents the EPMS, see:
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10222 */
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/10222 */
|
||||
epms_len = length;
|
||||
break;
|
||||
|
||||
|
|
|
@ -974,7 +974,7 @@ proto_register_tpncp(void)
|
|||
expert_tpncp = expert_register_protocol(proto_tpncp);
|
||||
expert_register_field_array(expert_tpncp, ei, array_length(ei));
|
||||
|
||||
/* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9569 for some discussion on this as well */
|
||||
/* See https://gitlab.com/wireshark/wireshark/-/issues/9569 for some discussion on this as well */
|
||||
prefs_register_bool_preference(tpncp_module, "load_db",
|
||||
"Whether to load DB or not; if DB not loaded dissector is passive",
|
||||
"Whether to load the Database or not; not loading the DB"
|
||||
|
|
|
@ -858,7 +858,7 @@ dissect_usb_video_extension_unit(proto_tree *tree, tvbuff_t *tvb, int offset)
|
|||
{
|
||||
/* Too big to display as integer */
|
||||
/* @todo Display as FT_BYTES with a big-endian disclaimer?
|
||||
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7933
|
||||
* See https://gitlab.com/wireshark/wireshark/-/issues/7933
|
||||
*/
|
||||
proto_tree_add_bytes_format(tree, hf_usb_vid_bmControl_bytes, tvb, offset, control_size, NULL, "bmControl");
|
||||
}
|
||||
|
@ -1752,7 +1752,7 @@ dissect_usb_vid_control_value(proto_tree *tree, tvbuff_t *tvb, int offset, guint
|
|||
else
|
||||
{
|
||||
/* @todo Display as FT_BYTES with a big-endian disclaimer?
|
||||
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7933
|
||||
* See https://gitlab.com/wireshark/wireshark/-/issues/7933
|
||||
*/
|
||||
proto_tree_add_bytes_format(tree, hf_usb_vid_control_value, tvb, offset, value_size, NULL, "%s", fallback_name);
|
||||
}
|
||||
|
|
|
@ -112,7 +112,7 @@ tvb_uncompress(tvbuff_t *tvb, const int offset, int comprlen)
|
|||
if (uncompr == NULL) {
|
||||
/*
|
||||
* This is ugly workaround for bug #6480
|
||||
* (https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6480)
|
||||
* (https://gitlab.com/wireshark/wireshark/-/issues/6480)
|
||||
*
|
||||
* g_memdup(..., 0) returns NULL (g_malloc(0) also)
|
||||
* when uncompr is NULL logic below doesn't create tvb
|
||||
|
|
|
@ -154,7 +154,7 @@ function loadGeoJSON(obj) {
|
|||
// MaxMind databases use km for accuracy, but they always use
|
||||
// 50, 100, 200 or 1000. That is too course, so ignore it and use a
|
||||
// fixed 1km radius.
|
||||
// See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14693#c12
|
||||
// See https://gitlab.com/wireshark/wireshark/-/issues/14693#note_400735005
|
||||
return L.circle(latlng, {radius: 1e3});
|
||||
},
|
||||
onEachFeature: function(feature, layer) {
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
[Dec-01-2010]
|
||||
Commented out global VSA:s from dictionary.ascend to avoid name clashes with IANA assigned VSA:s
|
||||
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5455
|
||||
https://gitlab.com/wireshark/wireshark/-/issues/5455
|
||||
|
||||
[Jul-09-2009]
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ BEGIN-VENDOR IEA-Software
|
|||
# AirMarshal Attributes [1-30]
|
||||
# Some added as per
|
||||
#
|
||||
# https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6486
|
||||
# https://gitlab.com/wireshark/wireshark/-/issues/6486
|
||||
#
|
||||
ATTRIBUTE AM-Interrupt-HTMLFile 1 string
|
||||
ATTRIBUTE AM-Interrupt-Interval 2 integer
|
||||
|
|
|
@ -28,13 +28,13 @@
|
|||
#include <QPushButton>
|
||||
|
||||
// To do:
|
||||
// - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6727
|
||||
// - https://gitlab.com/wireshark/wireshark/-/issues/6727
|
||||
// - Wide last column?
|
||||
// + No arrows on unsorted columns
|
||||
// - Add follow stream to context menu
|
||||
// + Change "A <- B" to "B -> A"
|
||||
// - Improper wildcard handling https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8010
|
||||
// - TShark consolidation https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6310
|
||||
// - Improper wildcard handling https://gitlab.com/wireshark/wireshark/-/issues/8010
|
||||
// - TShark consolidation https://gitlab.com/wireshark/wireshark/-/issues/6310
|
||||
// - Display filter entry?
|
||||
// - Add follow, copy & graph actions to context menu.
|
||||
|
||||
|
@ -45,10 +45,10 @@
|
|||
// - Closing the capture file clears conversation data.
|
||||
|
||||
// Fixed bugs:
|
||||
// - Friendly unit displays https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9231
|
||||
// - Misleading bps calculation https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8703
|
||||
// - Show Absolute time in conversation tables https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11618
|
||||
// - The value of 'Rel start' and 'Duration' in "Conversations" no need too precise https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12803
|
||||
// - Friendly unit displays https://gitlab.com/wireshark/wireshark/-/issues/9231
|
||||
// - Misleading bps calculation https://gitlab.com/wireshark/wireshark/-/issues/8703
|
||||
// - Show Absolute time in conversation tables https://gitlab.com/wireshark/wireshark/-/issues/11618
|
||||
// - The value of 'Rel start' and 'Duration' in "Conversations" no need too precise https://gitlab.com/wireshark/wireshark/-/issues/12803
|
||||
|
||||
|
||||
static const QString table_name_ = QObject::tr("Conversation");
|
||||
|
@ -326,7 +326,7 @@ void init_conversation_table(struct register_ct* ct, const char *filter)
|
|||
// TrafficTableTreeWidgetItem / QTreeWidgetItem subclass that allows sorting
|
||||
|
||||
// Minimum bandwidth calculation duration
|
||||
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8703
|
||||
// https://gitlab.com/wireshark/wireshark/-/issues/8703
|
||||
static const double min_bw_calc_duration_ = 5 / 1000.0; // seconds
|
||||
static const char *bps_na_ = UTF8_EM_DASH;
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ public:
|
|||
// W, L, X: Independent, minimize button.
|
||||
//
|
||||
// Additionally, maximized, parent-less dialogs can close to a black screen
|
||||
// on macOS: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12544
|
||||
// on macOS: https://gitlab.com/wireshark/wireshark/-/issues/12544
|
||||
//
|
||||
// Pass in the parent on macOS and NULL elsewhere so that we have an
|
||||
// independent window that un-maximizes correctly.
|
||||
|
|
|
@ -828,8 +828,8 @@ void WiresharkApplication::emitAppSignal(AppSignal signal)
|
|||
//
|
||||
// On macOS emitting PacketDissectionChanged from a dialog can
|
||||
// render the application unusable:
|
||||
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11361
|
||||
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11448
|
||||
// https://gitlab.com/wireshark/wireshark/-/issues/11361
|
||||
// https://gitlab.com/wireshark/wireshark/-/issues/11448
|
||||
// Work around the problem by queueing up app signals and emitting them
|
||||
// after the dialog is closed.
|
||||
//
|
||||
|
|
|
@ -221,7 +221,7 @@ rtppacket_analyse(tap_rtp_stat_t *statinfo,
|
|||
/* Reset flags */
|
||||
statinfo->flags = 0;
|
||||
#if 0
|
||||
/*According to bug https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11478
|
||||
/*According to bug https://gitlab.com/wireshark/wireshark/-/issues/11478
|
||||
* this code causes problems. A better solution is needed if there is need for the functionality */
|
||||
/* Try to detect duplicated packets due to mirroring/span ports by comparing src MAC addresses.
|
||||
* Check for duplicates (src mac differs from first_packet_mac_addr) */
|
||||
|
@ -285,7 +285,7 @@ rtppacket_analyse(tap_rtp_stat_t *statinfo,
|
|||
* we assume that instead of being massively late we lost the packet(s)
|
||||
* that would have indicated the sequence number wrapping. An imprecise
|
||||
* heuristic at best, but it seems to work well enough.
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5958 */
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/5958 */
|
||||
else if (statinfo->seq_num+1 < rtpinfo->info_seq_num || statinfo->seq_num - rtpinfo->info_seq_num > 0xFF00) {
|
||||
statinfo->seq_num = rtpinfo->info_seq_num;
|
||||
statinfo->sequence++;
|
||||
|
|
|
@ -17,7 +17,8 @@
|
|||
* https://www.endace.com/erf-extensible-record-format-types.pdf
|
||||
*
|
||||
* Version 8:
|
||||
* https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4333 (bug #4484)
|
||||
* https://gitlab.com/wireshark/wireshark/uploads/f694bfee494784425b6545892180a8b2/Endace_ERF_Types.pdf
|
||||
* (bug #4484)
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
|
|
@ -325,7 +325,7 @@ wtap_get_all_capture_file_extensions_list(void)
|
|||
*
|
||||
* Note that the routine does not have to free the private data pointer on
|
||||
* error. The caller takes care of that by calling wtap_close on error.
|
||||
* (See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8518)
|
||||
* (See https://gitlab.com/wireshark/wireshark/-/issues/8518)
|
||||
*
|
||||
* However, the caller does have to free the private data pointer when
|
||||
* returning 0, since the next file type will be called and will likely
|
||||
|
|
|
@ -676,7 +676,7 @@ static int libpcap_try_record(wtap *wth, FILE_T fh, int *err, gchar **err_info)
|
|||
* corrupt, and treating them as such makes the heuristics
|
||||
* much more reliable. See, for example,
|
||||
*
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9634
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/9634
|
||||
*
|
||||
* (128MB is an arbitrary size at this point, chosen to be
|
||||
* large enough for the largest D-Bus packet).
|
||||
|
|
|
@ -419,7 +419,7 @@ extern "C" {
|
|||
*
|
||||
* For WTAP_ENCAP_USBPCAP, the maximum is 128MiB, as per
|
||||
*
|
||||
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15985
|
||||
* https://gitlab.com/wireshark/wireshark/-/issues/15985
|
||||
*
|
||||
* We don't want to write out files that specify a maximum packet size
|
||||
* greater than 262144 if we don't have to, as software reading those
|
||||
|
@ -1653,7 +1653,7 @@ struct file_extension_info {
|
|||
*
|
||||
* Note that the routine does not have to free the private data pointer on
|
||||
* error. The caller takes care of that by calling wtap_close on error.
|
||||
* (See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8518)
|
||||
* (See https://gitlab.com/wireshark/wireshark/-/issues/8518)
|
||||
*
|
||||
* However, the caller does have to free the private data pointer when
|
||||
* returning WTAP_OPEN_NOT_MINE, since the next file type will be called
|
||||
|
|
Loading…
Reference in New Issue