Update URLs pointing to the bug database.

Switch from bugs.wireshark.org to the GitLab issues list.
osmith/wip
Guy Harris 2 years ago
parent e02229250d
commit a883081b70
  1. 2
      diameter/dictionary.xml
  2. 2
      epan/dissectors/asn1/camel/CAP-gsmSSF-gsmSCF-ops-args.asn
  3. 2
      epan/dissectors/asn1/gsm_map/Ericsson.asn
  4. 2
      epan/dissectors/asn1/mpeg-pes/packet-mpeg-pes-template.c
  5. 2
      epan/dissectors/packet-acdr.c
  6. 2
      epan/dissectors/packet-bitcoin.c
  7. 2
      epan/dissectors/packet-cisco-sm.c
  8. 4
      epan/dissectors/packet-corosync-totemnet.c
  9. 2
      epan/dissectors/packet-dhcp.c
  10. 2
      epan/dissectors/packet-etch.c
  11. 2
      epan/dissectors/packet-fcsp.c
  12. 2
      epan/dissectors/packet-giop.c
  13. 4
      epan/dissectors/packet-gsm_cbch.c
  14. 2
      epan/dissectors/packet-isup.c
  15. 2
      epan/dissectors/packet-lldp.c
  16. 2
      epan/dissectors/packet-lon.c
  17. 2
      epan/dissectors/packet-mpeg-pes.c
  18. 2
      epan/dissectors/packet-netflow.c
  19. 2
      epan/dissectors/packet-nwmtp.c
  20. 4
      epan/dissectors/packet-quic.c
  21. 2
      epan/dissectors/packet-rtmpt.c
  22. 2
      epan/dissectors/packet-sip.c
  23. 4
      epan/dissectors/packet-tls-utils.c
  24. 2
      epan/dissectors/packet-tpncp.c
  25. 4
      epan/dissectors/packet-usb-video.c
  26. 2
      epan/tvbuff_zlib.c
  27. 2
      ipmap.html
  28. 2
      radius/README.radius_dictionary
  29. 2
      radius/dictionary.iea
  30. 16
      ui/qt/conversation_dialog.cpp
  31. 2
      ui/qt/geometry_state_dialog.h
  32. 4
      ui/qt/wireshark_application.cpp
  33. 4
      ui/tap-rtp-analysis.c
  34. 3
      wiretap/erf.c
  35. 2
      wiretap/file_access.c
  36. 2
      wiretap/libpcap.c
  37. 4
      wiretap/wtap.h

@ -898,7 +898,7 @@
</avp>
<avp name="Acct-Session-Id" code="44" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
<type type-name="OctetString"/>
<!-- See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5411 -->
<!-- See https://gitlab.com/wireshark/wireshark/-/issues/5411 -->
</avp>
<avp name="Acct-Authentic" code="45" mandatory="must" protected="may" may-encrypt="yes" vendor-bit="mustnot">
<type type-name="Enumerated"/>

@ -212,7 +212,7 @@ ApplyChargingArg {PARAMETERS-BOUND : bound} ::= SEQUENCE {
DEFAULT legID:sendingSideID:leg1,
...,
-- WS modification Frensh National standard addition
-- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7656
-- https://gitlab.com/wireshark/wireshark/-/issues/7656
iTXcharging [64] BOOLEAN OPTIONAL
-- End WS
}

@ -34,7 +34,7 @@ FROM MAP-ExtensionDataTypes {
gsm-Network (1) modules (3) map-ExtensionDataTypes (21) version13 (13)}
;
-- non 3GPP standard compliant extension used by Ericsson (see https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7648)
-- non 3GPP standard compliant extension used by Ericsson (see https://gitlab.com/wireshark/wireshark/-/issues/7648)
EnhancedCheckIMEI-Arg ::= SEQUENCE {
imei IMEI,
requestedEquipmentInfo RequestedEquipmentInfo OPTIONAL,

@ -462,7 +462,7 @@ dissect_mpeg_pes(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data
offset = dissect_mpeg_pes_Stream(tvb, offset, &asn1_ctx,
tree, hf_mpeg_pes_extension);
/* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2229
/* https://gitlab.com/wireshark/wireshark/-/issues/2229
* A value of 0 indicates that the PES packet length
* is neither specified nor bounded and is allowed
* only in PES packets whose payload is a video

@ -1207,7 +1207,7 @@ dissect_acdr_voiceai(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *
* an http_message_info_t *, and that's *NOT* what we hand
* subdissectors. Hilarity ensures; see
*
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16622
* https://gitlab.com/wireshark/wireshark/-/issues/16622
*/
call_dissector(json_dissector_handle, tvb, pinfo, tree);
return tvb_captured_length(tvb);

@ -805,7 +805,7 @@ create_data_tree(proto_tree *tree, header_field_info* hfi, tvbuff_t *tvb, guint3
* So: the loop should be executed only when 'tree' is defined so that the
* proto_ calls will throw an exception when the tvb is used up;
* This should only take a few-hundred loops at most.
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8312
* https://gitlab.com/wireshark/wireshark/-/issues/8312
*/
/**

@ -211,7 +211,7 @@ static const value_string sm_pdu_type_value[] = {
};
/* TODO: Change to useful name once known */
#define SM_PROTOCOL_X004 0x0004 /* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7188 */
#define SM_PROTOCOL_X004 0x0004 /* https://gitlab.com/wireshark/wireshark/-/issues/7188 */
/* RUDP/SM stack called BSM V1 (version 1 versus Version 0 used for SS7). */
#define SM_PROTOCOL_X100 0x0100
#define SM_PROTOCOL_X101 0x0101

@ -137,7 +137,7 @@ On 12/14/2010 08:04 AM, Masatake YAMATO wrote:
>>>> Honza
>>> I got the similar comment from wireshark developer.
>>> Please, read the discussion:
>>> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3232
>>> https://gitlab.com/wireshark/wireshark/-/issues/3232
>>>
>>
>> I've read that thread long time before I've sent previous mail, so
@ -214,7 +214,7 @@ nnn>>
>
>>> licensed in 3-clause BSD, as you know. I'd like to change the license
>>> to merge my code to upstream project. I cannot do it in this context.
>>> See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3232#c13
>>> See https://gitlab.com/wireshark/wireshark/-/issues/3232#c13
>>> Thank you.
>>
>> Regards,

@ -2370,7 +2370,7 @@ dissect_dhcpopt_user_class_information(tvbuff_t *tvb, packet_info *pinfo, proto_
* "MSFT 5.0") such as "RRAS.Microsoft" and others like "iPXE".
* In the unlikely case that the first character can be interpreted as a valid length the next iteration
* of this while loop will catch that.
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16349
* https://gitlab.com/wireshark/wireshark/-/issues/16349
* https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dhcpe/fe8a2dd4-1e8c-4546-bacd-4ae10de02058
*/
proto_item *expert_ti = proto_tree_add_item(tree, hf_dhcp_option77_user_class_text, tvb, offset, uci_len, ENC_ASCII|ENC_NA);

@ -429,7 +429,7 @@ read_length(unsigned int *offset, tvbuff_t *tvb, proto_tree *etch_tree)
if (*offset + length < *offset) {
/* overflow case
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8464 */
* https://gitlab.com/wireshark/wireshark/-/issues/8464 */
length = tvb_reported_length_remaining(tvb, *offset);
}
return length;

@ -191,7 +191,7 @@ static void dissect_fcsp_dhchap_auth_param(tvbuff_t *tvb, proto_tree *tree,
default:
/* If we don't recognize the auth_param_tag and the param_len
* is 0 then just return to prevent an infinite loop. See
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8359
* https://gitlab.com/wireshark/wireshark/-/issues/8359
*/
if (param_len == 0) {
return;

@ -522,7 +522,7 @@ static const value_string target_address_discriminant_vals[] = {
{ 0, NULL}
};
Bug fix:
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2800
https://gitlab.com/wireshark/wireshark/-/issues/2800
http://ethereal.netmirror.org/lists/ethereal-users/200303/msg00135.html
*/
static const value_string response_flags_vals[] = {

@ -257,7 +257,7 @@ dissect_schedule_message(tvbuff_t *tvb, packet_info *pinfo, proto_tree *top_tree
/* XXX I don't know if a message can validly contain more than
* 48 slots, but that's the size of the array we create so cap
* it there to avoid uninitialized memory errors (see bug
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9270) */
* https://gitlab.com/wireshark/wireshark/-/issues/9270) */
if (sched_end > 48)
sched_end = 48;
while ((k<sched_end) && (other_slots[k]!=0xFFFF))
@ -291,7 +291,7 @@ dissect_schedule_message(tvbuff_t *tvb, packet_info *pinfo, proto_tree *top_tree
* case. Perhaps just an expert info is appropriate?
* Regardless, we need to increment k to prevent an
* infinite loop, see
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8730
* https://gitlab.com/wireshark/wireshark/-/issues/8730
*/
++k;
}

@ -27,7 +27,7 @@
* National variants
* French ISUP Specification: SPIROU 1998 - 002-005 edition 1 ( Info found here http://www.icg-corp.com/docs/ISUP.pdf ).
* See also http://www.fftelecoms.org/sites/default/files/contenus_lies/fft_interco_ip_-_sip-i_interface_specification_v1_0.pdf
* Israeli ISUP Specification: excertp (for BCM message) found in https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4231 .
* Israeli ISUP Specification: excertp (for BCM message) found in https://gitlab.com/wireshark/wireshark/-/issues/4231 .
* Russian national ISUP-R 2000: RD 45.217-2001 book 4
* Japan ISUP http://www.ttc.or.jp/jp/document_list/sum/sum_JT-Q763v21.1.pdf
*/

@ -1191,7 +1191,7 @@ static const value_string hytec_mc[] = {
/* Some vendors interpreted the standard to invert the bitorder:
* according to a IEEE ruling, this is now officially wrong.
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1455
* See https://gitlab.com/wireshark/wireshark/-/issues/1455
* for all the gory details
*/

@ -5,7 +5,7 @@
*
* Used some code by habibi_khalid <khalidhabibi@gmx.de> and
* Honorine_KEMGNE_NGUIFFO <honorinekemgne@yahoo.fr> from
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4704
* https://gitlab.com/wireshark/wireshark/-/issues/4704
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>

@ -903,7 +903,7 @@ dissect_mpeg_pes(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data
offset = dissect_mpeg_pes_Stream(tvb, offset, &asn1_ctx,
tree, hf_mpeg_pes_extension);
/* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2229
/* https://gitlab.com/wireshark/wireshark/-/issues/2229
* A value of 0 indicates that the PES packet length
* is neither specified nor bounded and is allowed
* only in PES packets whose payload is a video

@ -4887,7 +4887,7 @@ dissect_v9_v10_pdu_data(tvbuff_t *tvb, packet_info *pinfo, proto_tree *pdutree,
/* have the same template with the same ID. */
/* XXX: One capture has been seen wherein the "length" field in the template is 0 even though
the field is actually present in the dataflow.
See: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10432#c1
See: https://gitlab.com/wireshark/wireshark/-/issues/10432#c1
*/
continue;
}

@ -96,7 +96,7 @@ static int dissect_nwmtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, vo
call_dissector(mtp_handle, next_tvb, pinfo, tree);
/* Check for overflows, which probably can't happen, but better
* safe than sorry. See
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8169
* https://gitlab.com/wireshark/wireshark/-/issues/8169
*/
DISSECTOR_ASSERT(len < G_MAXUINT32 - 11);
DISSECTOR_ASSERT((guint64)offset + len + 12 < G_MAXINT);

@ -30,7 +30,7 @@
* Decryption is supported via TLS 1.3 secrets in the "TLS Key Log File",
* configured either at the TLS Protocol preferences, or embedded in a pcapng
* file. Sample captures and secrets can be found at:
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13881
* https://gitlab.com/wireshark/wireshark/-/issues/13881
*
* Limitations:
* - STREAM offsets larger than 32-bit are unsupported.
@ -3257,7 +3257,7 @@ static tap_packet_status
follow_quic_tap_listener(void *tapdata, packet_info *pinfo, epan_dissect_t *edt _U_, const void *data)
{
// TODO fix filtering for multiple streams, see
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16093
// https://gitlab.com/wireshark/wireshark/-/issues/16093
follow_tvb_tap_listener(tapdata, pinfo, NULL, data);
return TAP_PACKET_DONT_REDRAW;
}

@ -140,7 +140,7 @@ static gboolean rtmpt_desegment = TRUE;
* exceed 256KB, but setting the limit there can cause massive memory
* usage in some scenarios. For now make it a preference, but a better fix
* is really needed.
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6898
* See https://gitlab.com/wireshark/wireshark/-/issues/6898
*/
static guint rtmpt_max_packet_size = 32768;

@ -2112,7 +2112,7 @@ dissect_sip_contact_item(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gi
/* it is actually unusual - arguably invalid - for a SIP REGISTER
* 200 OK _response_ to contain Contacts with expires=0.
*
* See Bug https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10364
* See Bug https://gitlab.com/wireshark/wireshark/-/issues/10364
* Why this warning was removed (3GPP usage, 3GPP TS24.229 )
*/
#if 0

@ -6507,7 +6507,7 @@ tls_dissect_certificate_authorities(ssl_common_dissect_t *hf, tvbuff_t *tvb, pac
if (dnames_count-- == 0) {
/* stop adding to tree when the list is considered too large
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16202
* https://gitlab.com/wireshark/wireshark/-/issues/16202
Note: dnames_count must be set low enough not to hit the
limit set by PINFO_LAYER_MAX_RECURSION_DEPTH in packet.c
*/
@ -9397,7 +9397,7 @@ dissect_ssl3_hnd_cli_keyex_rsa(ssl_common_dissect_t *hf, tvbuff_t *tvb,
case DTLSV1DOT0_OPENSSL_VERSION:
/* OpenSSL pre-0.9.8f DTLS and pre-TLS quirk: 2-octet length vector is
* not present. The handshake contents represents the EPMS, see:
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10222 */
* https://gitlab.com/wireshark/wireshark/-/issues/10222 */
epms_len = length;
break;

@ -974,7 +974,7 @@ proto_register_tpncp(void)
expert_tpncp = expert_register_protocol(proto_tpncp);
expert_register_field_array(expert_tpncp, ei, array_length(ei));
/* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9569 for some discussion on this as well */
/* See https://gitlab.com/wireshark/wireshark/-/issues/9569 for some discussion on this as well */
prefs_register_bool_preference(tpncp_module, "load_db",
"Whether to load DB or not; if DB not loaded dissector is passive",
"Whether to load the Database or not; not loading the DB"

@ -858,7 +858,7 @@ dissect_usb_video_extension_unit(proto_tree *tree, tvbuff_t *tvb, int offset)
{
/* Too big to display as integer */
/* @todo Display as FT_BYTES with a big-endian disclaimer?
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7933
* See https://gitlab.com/wireshark/wireshark/-/issues/7933
*/
proto_tree_add_bytes_format(tree, hf_usb_vid_bmControl_bytes, tvb, offset, control_size, NULL, "bmControl");
}
@ -1752,7 +1752,7 @@ dissect_usb_vid_control_value(proto_tree *tree, tvbuff_t *tvb, int offset, guint
else
{
/* @todo Display as FT_BYTES with a big-endian disclaimer?
* See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7933
* See https://gitlab.com/wireshark/wireshark/-/issues/7933
*/
proto_tree_add_bytes_format(tree, hf_usb_vid_control_value, tvb, offset, value_size, NULL, "%s", fallback_name);
}

@ -112,7 +112,7 @@ tvb_uncompress(tvbuff_t *tvb, const int offset, int comprlen)
if (uncompr == NULL) {
/*
* This is ugly workaround for bug #6480
* (https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6480)
* (https://gitlab.com/wireshark/wireshark/-/issues/6480)
*
* g_memdup(..., 0) returns NULL (g_malloc(0) also)
* when uncompr is NULL logic below doesn't create tvb

@ -154,7 +154,7 @@ function loadGeoJSON(obj) {
// MaxMind databases use km for accuracy, but they always use
// 50, 100, 200 or 1000. That is too course, so ignore it and use a
// fixed 1km radius.
// See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14693#c12
// See https://gitlab.com/wireshark/wireshark/-/issues/14693#note_400735005
return L.circle(latlng, {radius: 1e3});
},
onEachFeature: function(feature, layer) {

@ -1,6 +1,6 @@
[Dec-01-2010]
Commented out global VSA:s from dictionary.ascend to avoid name clashes with IANA assigned VSA:s
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5455
https://gitlab.com/wireshark/wireshark/-/issues/5455
[Jul-09-2009]

@ -11,7 +11,7 @@ BEGIN-VENDOR IEA-Software
# AirMarshal Attributes [1-30]
# Some added as per
#
# https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6486
# https://gitlab.com/wireshark/wireshark/-/issues/6486
#
ATTRIBUTE AM-Interrupt-HTMLFile 1 string
ATTRIBUTE AM-Interrupt-Interval 2 integer

@ -28,13 +28,13 @@
#include <QPushButton>
// To do:
// - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6727
// - https://gitlab.com/wireshark/wireshark/-/issues/6727
// - Wide last column?
// + No arrows on unsorted columns
// - Add follow stream to context menu
// + Change "A <- B" to "B -> A"
// - Improper wildcard handling https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8010
// - TShark consolidation https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6310
// - Improper wildcard handling https://gitlab.com/wireshark/wireshark/-/issues/8010
// - TShark consolidation https://gitlab.com/wireshark/wireshark/-/issues/6310
// - Display filter entry?
// - Add follow, copy & graph actions to context menu.
@ -45,10 +45,10 @@
// - Closing the capture file clears conversation data.
// Fixed bugs:
// - Friendly unit displays https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9231
// - Misleading bps calculation https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8703
// - Show Absolute time in conversation tables https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11618
// - The value of 'Rel start' and 'Duration' in "Conversations" no need too precise https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12803
// - Friendly unit displays https://gitlab.com/wireshark/wireshark/-/issues/9231
// - Misleading bps calculation https://gitlab.com/wireshark/wireshark/-/issues/8703
// - Show Absolute time in conversation tables https://gitlab.com/wireshark/wireshark/-/issues/11618
// - The value of 'Rel start' and 'Duration' in "Conversations" no need too precise https://gitlab.com/wireshark/wireshark/-/issues/12803
static const QString table_name_ = QObject::tr("Conversation");
@ -326,7 +326,7 @@ void init_conversation_table(struct register_ct* ct, const char *filter)
// TrafficTableTreeWidgetItem / QTreeWidgetItem subclass that allows sorting
// Minimum bandwidth calculation duration
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8703
// https://gitlab.com/wireshark/wireshark/-/issues/8703
static const double min_bw_calc_duration_ = 5 / 1000.0; // seconds
static const char *bps_na_ = UTF8_EM_DASH;

@ -45,7 +45,7 @@ public:
// W, L, X: Independent, minimize button.
//
// Additionally, maximized, parent-less dialogs can close to a black screen
// on macOS: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12544
// on macOS: https://gitlab.com/wireshark/wireshark/-/issues/12544
//
// Pass in the parent on macOS and NULL elsewhere so that we have an
// independent window that un-maximizes correctly.

@ -828,8 +828,8 @@ void WiresharkApplication::emitAppSignal(AppSignal signal)
//
// On macOS emitting PacketDissectionChanged from a dialog can
// render the application unusable:
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11361
// https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11448
// https://gitlab.com/wireshark/wireshark/-/issues/11361
// https://gitlab.com/wireshark/wireshark/-/issues/11448
// Work around the problem by queueing up app signals and emitting them
// after the dialog is closed.
//

@ -221,7 +221,7 @@ rtppacket_analyse(tap_rtp_stat_t *statinfo,
/* Reset flags */
statinfo->flags = 0;
#if 0
/*According to bug https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11478
/*According to bug https://gitlab.com/wireshark/wireshark/-/issues/11478
* this code causes problems. A better solution is needed if there is need for the functionality */
/* Try to detect duplicated packets due to mirroring/span ports by comparing src MAC addresses.
* Check for duplicates (src mac differs from first_packet_mac_addr) */
@ -285,7 +285,7 @@ rtppacket_analyse(tap_rtp_stat_t *statinfo,
* we assume that instead of being massively late we lost the packet(s)
* that would have indicated the sequence number wrapping. An imprecise
* heuristic at best, but it seems to work well enough.
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5958 */
* https://gitlab.com/wireshark/wireshark/-/issues/5958 */
else if (statinfo->seq_num+1 < rtpinfo->info_seq_num || statinfo->seq_num - rtpinfo->info_seq_num > 0xFF00) {
statinfo->seq_num = rtpinfo->info_seq_num;
statinfo->sequence++;

@ -17,7 +17,8 @@
* https://www.endace.com/erf-extensible-record-format-types.pdf
*
* Version 8:
* https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4333 (bug #4484)
* https://gitlab.com/wireshark/wireshark/uploads/f694bfee494784425b6545892180a8b2/Endace_ERF_Types.pdf
* (bug #4484)
*/
#include "config.h"

@ -325,7 +325,7 @@ wtap_get_all_capture_file_extensions_list(void)
*
* Note that the routine does not have to free the private data pointer on
* error. The caller takes care of that by calling wtap_close on error.
* (See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8518)
* (See https://gitlab.com/wireshark/wireshark/-/issues/8518)
*
* However, the caller does have to free the private data pointer when
* returning 0, since the next file type will be called and will likely

@ -676,7 +676,7 @@ static int libpcap_try_record(wtap *wth, FILE_T fh, int *err, gchar **err_info)
* corrupt, and treating them as such makes the heuristics
* much more reliable. See, for example,
*
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9634
* https://gitlab.com/wireshark/wireshark/-/issues/9634
*
* (128MB is an arbitrary size at this point, chosen to be
* large enough for the largest D-Bus packet).

@ -419,7 +419,7 @@ extern "C" {
*
* For WTAP_ENCAP_USBPCAP, the maximum is 128MiB, as per
*
* https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15985
* https://gitlab.com/wireshark/wireshark/-/issues/15985
*
* We don't want to write out files that specify a maximum packet size
* greater than 262144 if we don't have to, as software reading those
@ -1653,7 +1653,7 @@ struct file_extension_info {
*
* Note that the routine does not have to free the private data pointer on
* error. The caller takes care of that by calling wtap_close on error.
* (See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8518)
* (See https://gitlab.com/wireshark/wireshark/-/issues/8518)
*
* However, the caller does have to free the private data pointer when
* returning WTAP_OPEN_NOT_MINE, since the next file type will be called

Loading…
Cancel
Save