'wlan.s1g.twt_information.next_twt' exists multiple times with incompatible types: FT_UINT48 and FT_UINT32
'wlan.s1g.twt_information.next_twt' exists multiple times with incompatible types: FT_UINT64 and FT_UINT48
packet-smc.c:595:4: warning: Value stored to 'offset' is never read [deadcode.DeadStores]
packet-smc.c:664:4: warning: Value stored to 'offset' is never read [deadcode.DeadStores]
packet-opa-mad.c:2816:12: warning: Although the value stored to 'local_offset' is used in the enclosing expression, the value is never actually read from 'local_offset'
packet-nfs.c:6690:9: warning: Although the value stored to 'offset' is used in the enclosing expression, the value is never actually read from 'offset
packet-nfs.c:6840:9: warning: Although the value stored to 'offset' is used in the enclosing expression, the value is never actually read from 'offset'
Currently, only pcapng has one, and it does nothing, but this mechanism
will be used more in the future.
Update comments in epan/dissectors/CMakeLists.txt and ui/taps.h while
we're at it.
Instead *_register_plugin() is turned into a noop (with a warning).
The test suit is failing with ENABLE_PLUGINS=Off (it was already failing
before and this patch didn't affect that).
Closes#17202.
This fix does not handle the less common case where a type 3 chunk starts a new message
and an extended timestamp is present.
This fixes the dissection of rtmp-cal-to-ams-4.pcap attached to the issue. Closes#15718
Let's keep track of the frame number which contained the initial read or write
request for the conversation. This allows us to easily add a link from each
DATA or ACK packet back to the read or write request which started the
transfer.
While we are here, add a missing initialization of tftp_info->windowsize and
sort the initializers into the same order as the fields.
Without this patch, any Linux cooked packet capture on HDLC / frame
relay devices will not be dispatched to the proper dissector.
Such packets do carry a proper sll_hatype set to ARPHRD_FRAD and should
be dispatched accordingly. However, the packet-fr dissector so far
did not register itself accordingly.
When many streams are analyzed, some streams can be found as useless during
replay. Patch adds option to remove it from list in RTP player.
Once stream is removed, it can't be returned except close/reopen RTP player
with new selection.