https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6138
Roland Knall <rknall@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #6719| |review_for_checkin?
Flag| |
--- Comment #2 from Roland Knall <rknall@xxxxxxxxx> 2011-07-25 22:19:05 PDT ---
Created an attachment (id=6719)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=6719)
Correcting the use of unxorFrame to prevent the failure
This small patch circumventes the call to unxorFrame, if not enough bytes are
available for dissection. There is no other logical solution for this
particular protocol, as such a case by itself should not occur. But I do not
stop the dissection, as it can occur during development, and preventing this
kind of failure to produce some form of dissection might hinder development of
openSAFETY enabled products.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.