Wireshark-bugs: [Wireshark-bugs] [Bug 11134] CORBA dissectors show malformed packet errors for v

Date: Wed, 22 Apr 2015 03:10:46 +0000

Comment # 13 on bug 11134 from
(In reply to Evan Huus from comment #12)
> I guess my instinct was that most protocols shouldn't claim
> their payloads, so e.g. TCP shouldn't be passing -1 or tvb_reported_length()
> or anything like that, it should be passing 20 (or more, adjusting for
> options).

I think they should start out saying "I'll claim the whole thing" and, when
finished, say "OK, this is all I needed"; that obviates the need to calculate
the length in advance (assuming it *can* be calculated in advance without first
looking into the packet - which it can't, for IPv4 or TCP, for example).

We might also be able to leverage that into a way to have dissectors just
return a Boolean "I accepted this"/"I rejected this" indication and provide the
"how much I dissected" indication separately (which would avoid problems if
there's a case where the dissectors 1) can reject packets and 2) can also not
dissect any bytes, e.g. if you have protocol A transporting request/response
protocol B, with protocol A responses not having any data in them - I seem to
remember there was a case where that could happen, which is why I didn't
vigorously pursue changing all "old-style" dissectors to "new-style"
dissectors).


You are receiving this mail because:
  • You are watching all bug changes.