Wireshark-bugs: [Wireshark-bugs] [Bug 4210] Bug parsing IPv4 header flags field

Date: Fri, 6 Nov 2009 22:46:19 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4210


Guy Harris <guy@xxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         AssignedTo|fdmanana@xxxxxxxxx          |wireshark-bugs@xxxxxxxxxxxxx
             Status|ASSIGNED                    |NEW




--- Comment #4 from Guy Harris <guy@xxxxxxxxxxxx>  2009-11-06 22:46:18 PDT ---
There's no clean way to do it, but you could do it with a macro that takes
IP_OFFSET_WIDTH as an argument, stringifies it (you can only stringify
arguments to a macro, not arbitrary stuff), and concatenates it with the stuff
before it and after it in the string:

    http://gcc.gnu.org/onlinedocs/cpp/Stringification.html

(the fact that it's at gcc.gnu.org nonwithstanding, it's a part of standard C,
not a GCCism).

(Also, you probably don't want to assign a bug to yourself unless you have
commit access to the Wireshark repository; somebody with that access is needed
to check the fix in, and, unless they've CCed themselves on the bug, they won't
see the changes.)


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.