https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5387
--- Comment #1 from Anders Broman <anders.broman@xxxxxxxxxxxx> 2010-12-05 11:51:59 PST ---
Hi,
You might want to do something like this:
case KRB5_PA_PW_SALT:
tmp_offset = dissect_ber_identifier(actx->pinfo, tree, tvb, offset,
&tmp_cls, NULL, &tmp_tag);
dissect_ber_length(actx->pinfo, tree, tvb, tmp_offset , &tmp_len, NULL);
Then performe length check and call the apropriate function.
offset=dissect_ber_old_octet_string_wcb(FALSE, actx, tree, tvb,
offset,hf_krb_PA_DATA_value, dissect_krb5_PW_SALT);
break;
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.