summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
authorGerald Combs <gerald@wireshark.org>2014-07-22 10:15:55 -0700
committerGerald Combs <gerald@wireshark.org>2014-07-22 17:17:50 +0000
commit04e4136a35287e2068d346f79bada76b4a372a9e (patch)
tree54e417e89bd56eb4019265ad71d32d25d9fc53cf /ChangeLog
parent88834bd3e39879d1d7fa003444ed8fdd886617a8 (diff)
downloadwireshark-04e4136a35287e2068d346f79bada76b4a372a9e.tar.gz
Build 1.12.0rc3.
Change-Id: I49feefa838224cad4184596551618871ba5d6abe Reviewed-on: https://code.wireshark.org/review/3163 Reviewed-by: Gerald Combs <gerald@wireshark.org>
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog2496
1 files changed, 2496 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index bc0f4590d2..b92cca5437 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,2499 @@
+commit 88834bd
+Author: Patrice Fournier <patrice.fournier@ifax.com>
+Date: Wed Jul 16 13:50:11 2014 -0400
+
+ Makes the RTP Player graphs work with GTK3
+
+ Change-Id: I91c689eb3a35f02f8fa4de64fb6e3337d42c9190
+ Partial-bug: 9891
+ Reviewed-on: https://code.wireshark.org/review/3090
+ Reviewed-by: Balint Reczey <balint@balintreczey.hu>
+ Tested-by: Balint Reczey <balint@balintreczey.hu>
+ (cherry picked from commit faf3261c3ae31f0c603657b5092eb6707c988dd8)
+ Reviewed-on: https://code.wireshark.org/review/3159
+
+commit dcf0717
+Author: Jeff Morriss <morriss@ulticom.com>
+Date: Tue Jul 1 16:39:15 2014 -0400
+
+ Don't put hyphens in the rc's versions.
+
+ Apparently neither RPM nor the Debian packaging systems like having hyphens in
+ in the version.
+
+ This change leaves a hyphen in the daily builds (which means we can't build
+ RPMs or .debs of those); we might want to consider changing that to a tilde
+ (~).
+
+ Change-Id: Iaa4f3135e9e6452c2e1e199d85540e50778c5cdc
+ Reviewed-on: https://code.wireshark.org/review/2759
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit fd12a88
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jul 20 08:08:37 2014 -0700
+
+ [Automatic manuf, services and enterprise-numbers update for 2014-07-20]
+
+ Change-Id: I6ce16bfb03e2c7fbda83a04e11f77182d051d5bf
+ Reviewed-on: https://code.wireshark.org/review/3132
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 8dc5330
+Author: Steev Klimaszewski <threeway@gmail.com>
+Date: Thu Jun 19 16:54:57 2014 -0500
+
+ va_list can't be NULL on ARM.
+
+ Bug: 10209
+ Change-Id: Ibd63a530450b7d2d4ec244e91c77caa731ba63aa
+ Signed-off-by: Steev Klimaszewski <threeway@gmail.com>
+ Signed-off-by: Balint Reczey <balint@balintreczey.hu>
+ Reviewed-on: https://code.wireshark.org/review/2464
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 320c4f0d705a3ed94f710fb4b7b3eef897ff7bc4)
+ Reviewed-on: https://code.wireshark.org/review/3130
+
+commit f9f1247
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Sat Jul 19 15:17:17 2014 +0200
+
+ fix bug 9100
+
+ object and package containers may have multiple entries
+
+ (manually backported 30239117ac1364b03a0a000cb79f91d986a3aa60 from master)
+
+ Change-Id: If589988795f5307dccc8106f886cb115228efad4
+ Reviewed-on: https://code.wireshark.org/review/3123
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+
+commit 90bb39f
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri Jul 18 16:02:56 2014 +0200
+
+ add H.265 stream type
+
+ Change-Id: Ic8e17f949f245ad6fe26fb8078e0545fe5b35daa
+ Reviewed-on: https://code.wireshark.org/review/3116
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 831c1f2fe1586c7d8d5aa9767033ccba8b64da91)
+ Reviewed-on: https://code.wireshark.org/review/3120
+
+commit dc00875
+Author: Fabian Raetz <fabian.raetz@gmail.com>
+Date: Fri Jul 18 13:50:05 2014 -0700
+
+ Fix install_desktop_files non-portability and add out-of-tree support.
+
+ Prepend $(srcdir)/ to the sources in install commands, and get rid of
+ the -T flag, as it's GNU coreutils install-specific; some versions of
+ install don't support -T at all, and FreeBSD's install has a -T flag
+ that takes an argument and has a completely different meaning.
+
+ Fixes bug 10292; fix came from
+
+ http://marc.info/?l=openbsd-ports&m=140571104528980&w=2
+
+ Change-Id: I8e80d475a728a17848736be043f97d2b90a0be82
+ Reviewed-on: https://code.wireshark.org/review/3107
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 4b720691c45e1a803bdcc01567ac1ec52da62740)
+ Reviewed-on: https://code.wireshark.org/review/3108
+
+commit 331a6ca
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri Jul 18 00:02:27 2014 +0200
+
+ WebSocket: increase max unmask payload size to 256K and indicate that packet is truncated is going above the new limit
+
+ Bug: 10283
+ Change-Id: Iea5401d02bcf50a3427dce5f2b817c3b73a7dc11
+ Reviewed-on: https://code.wireshark.org/review/3098
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit deb1d8d07f17911914216c5769cd69b9a29c5999)
+ Reviewed-on: https://code.wireshark.org/review/3105
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit 3c75739
+Author: Tatsuhiro Tsujikawa <tatsuhiro.t@gmail.com>
+Date: Wed Jul 16 22:41:27 2014 +0900
+
+ Fix assertion error when no header field was decompressed
+
+ bug: 10279
+ Change-Id: Ibf88b1622318692ccf3904aede5d964e6028bdc7
+ Reviewed-on: https://code.wireshark.org/review/3087
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 1b8c4bae489caa26cfd5d7b68a25394f286607e4)
+ Reviewed-on: https://code.wireshark.org/review/3088
+
+commit 3abb0f0
+Author: Jim Young <jyoung@gsu.edu>
+Date: Thu Jul 10 04:32:06 2014 -0400
+
+ Fix regression related to OSPF related enum order definitions
+
+ bug: 10271
+ Change-Id: Ic400ab922679d86887f8b17bfe371b719d33490a
+ Reviewed-on: https://code.wireshark.org/review/3086
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 1a92fab
+Author: Michael Mann <mmann78@netscape.net>
+Date: Fri Jun 20 02:47:03 2014 -0400
+
+ Allow expert info to show only items in the display filter.
+
+ This was started by Chris Maynard before Qt was announced and I just polished it off for inclusion in GTK version of Wireshark.
+
+ bug:1860
+ Change-Id: Icaada6e7900f22b0a3d97c2a5656edfd8d8c8b7f
+ Reviewed-on: https://code.wireshark.org/review/3035
+ Reviewed-by: Christopher Maynard <Christopher.Maynard@gtech.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit d8cff57ef342b909f128244f3ab5e5debcec4988)
+ Reviewed-on: https://code.wireshark.org/review/3077
+
+commit 5446fea
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jul 15 18:10:22 2014 -0700
+
+ The plural is "PDUs", not "PDU:s".
+
+ Change-Id: I4bef734ef17b02e254b742744e2debd3038e98a0
+ Reviewed-on: https://code.wireshark.org/review/3074
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit bd30abf8701c940fc995317e6ac4aee3be04ad29)
+ Reviewed-on: https://code.wireshark.org/review/3075
+
+commit b7d81fa
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jul 15 17:56:24 2014 -0700
+
+ "Export PDUs to File" pops up a dialog, so put "..." after it.
+
+ Also, capitalize "File" in the GTK+ version (it's already capitalized in
+ the Qt version).
+
+ Change-Id: I27eb27022930b1c0e0321cd1a1446c3b9dc1bd17
+ Reviewed-on: https://code.wireshark.org/review/3072
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit f862eaa7c29debe03c276c2d37dcbf501e18158c)
+ Reviewed-on: https://code.wireshark.org/review/3073
+
+commit 663b13b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jul 15 17:14:11 2014 -0700
+
+ Squelch a warning.
+
+ In at least some versions of GLib, g_array_free() warns if passed a null
+ pointer, rather than just silently returning.
+
+ Change-Id: I1bfc0a81faa1eeebe288f6e0cc58ebfb64784958
+ Reviewed-on: https://code.wireshark.org/review/3068
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 28971b28518ba0c210690d97c29df984064f4cca)
+ Reviewed-on: https://code.wireshark.org/review/3069
+
+commit 445abfa
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jul 15 16:40:46 2014 -0700
+
+ Only one buffer.c, please.
+
+ Otherwise, if you link with both libwiretap and libfiletap, it's
+ anybody's guess which one you get. That means you're wasting memory
+ with two copies of its routines if they're identical, and means
+ surprising behavior if they're not (which showed up when I was debugging
+ a double-free crash - fixing libwiretap's buffer_free() didn't fix the
+ problem, because Wireshark happened to be calling libfiletap' unfixed
+ buffer_free()).
+
+ There's nothing *tap-specific about Buffers, anyway, so it really
+ belongs in wsutil.
+
+ Change-Id: I242f93013c7104f31783c9ee52adcb090ce7b367
+ Reviewed-on: https://code.wireshark.org/review/3067
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 21bf67a
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jul 15 16:22:34 2014 -0700
+
+ Have buffer_free() null out the buffer data pointer.
+
+ That prevents some double-free issues (I got one when doing non-"Update
+ list of packets in real time" captures, if I do one such capture and
+ then another one).
+
+ Change-Id: Ia08034d9d1640bad21b74960efade8926dbfc5de
+ Reviewed-on: https://code.wireshark.org/review/3063
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 7344cfc78ff89603af6dec685ed968f5954e757d)
+ Reviewed-on: https://code.wireshark.org/review/3064
+
+commit 15b43a1
+Author: Alexis La Goutte <alexis.lagoutte@gmail.com>
+Date: Tue Jul 15 16:50:32 2014 +0200
+
+ HTTP2: Fix double free
+
+ Found by Clang Analyzer
+
+ Backport from https://github.com/tatsuhiro-t/nghttp2/commit/62423f5949001c375c8e325296c74c92d1be0965
+ Signed-off-by: Tatsuhiro Tsujikawa <tatsuhiro.t@gmail.com>
+
+ Change-Id: Ic70f74b55ab80ca0b8d5042f07a29c9d14af4fe2
+ Reviewed-on: https://code.wireshark.org/review/3059
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit a5591dc
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jul 14 16:48:10 2014 -0700
+
+ Add application/atom+xml as an XML document type.
+
+ Change-Id: I9fcf438f3cafcb3ab3a5b6dc0f72ed2561e5a94f
+ Reviewed-on: https://code.wireshark.org/review/3049
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 52a4f3d121765ce758c16137b03e7b9d2e15908c)
+ Reviewed-on: https://code.wireshark.org/review/3050
+
+commit 967c209
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jul 14 12:18:11 2014 -0700
+
+ Treat CR-LF at the end of a line like LF.
+
+ That way, if we're reading a Windows-format file on UN*X, we handle it
+ the same way we'd handle a UN*X-format file.
+
+ This handles bug 10272 for the cfilter and dfilter file; there are other
+ configuration files that may need code changes as well.
+
+ While we're at it, don't hand non-ASCII characters to isspace().
+
+ Change-Id: Ie4ecd2c9601545a60b4d3326c6782cfff093b156
+ Reviewed-on: https://code.wireshark.org/review/3046
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 53c01b1e
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jul 14 11:26:24 2014 -0700
+
+ Treat CR-LF at the end of a line like LF.
+
+ That way, if we're reading a Windows-format file on UN*X, we handle it
+ the same way we'd handle a UN*X-format file.
+
+ This handles bug 10272 for the preference file and the "recent" files;
+ there are other configuration files that may need code changes as well.
+
+ Change-Id: Iec15a8fac276929ce8b53ae16070e9f2855f574c
+ Reviewed-on: https://code.wireshark.org/review/3042
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 338369ec2f89b47729df4b56ccf8fa3eab4ea270)
+ Reviewed-on: https://code.wireshark.org/review/3043
+
+commit a01be9b
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Fri Jul 11 10:40:47 2014 +0200
+
+ dtls: fix faulty offsets and tvbuff references
+
+ This could lead to problems for fragmented DTLS packets.
+
+ Change-Id: I602c7e181ea3799a4a2e7bcfed05bfbb129f7df4
+ Reviewed-on: https://code.wireshark.org/review/3017
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 9e5e43ba449b4431f9db0cb77cd0fa3171acf7d4)
+ Reviewed-on: https://code.wireshark.org/review/3028
+ Reviewed-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+
+commit 2c9dd83
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jul 13 08:08:09 2014 -0700
+
+ [Automatic manuf, services and enterprise-numbers update for 2014-07-13]
+
+ Change-Id: I277a4f4761e2f725b3d8edfbbcb7cb28adf1efbf
+ Reviewed-on: https://code.wireshark.org/review/3032
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 87bcaa1
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Fri Jul 11 00:35:04 2014 +0200
+
+ ssl: move Certificate handshake dissection to ssl-utils
+
+ There are no dissection differences between DTLS and SSL, so move to
+ ssl-utils. While at it, skip dissection when the tree is NULL, remove
+ the plural from certificates length (the length is always larger than
+ ome), fix type of "ti" for dtls, get rid of "failsafe" subtree
+ assignment in ssl, get rid of tvb_ensure_bytes_exist in ssl.
+
+ Unrelated changes: fix param (tvb vs sub_tvb) for DTLS KeyExchange
+ handshake messages.
+
+ Change-Id: Iecaa45a7a601e55a52aa16180cf219a122fbe95a
+ Reviewed-on: https://code.wireshark.org/review/2985
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit ba6d2e7cc8d8d06e9b879813d3e11dc7855a9e99)
+ Reviewed-on: https://code.wireshark.org/review/3000
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit 7db5606
+Author: Hauke Mehrtens <hauke@hauke-m.de>
+Date: Sat Apr 26 11:38:40 2014 +0200
+
+ ssl/dtls: add support for Raw Public keys
+
+ Instead of X.509 certificates now also Raw public keys are supported
+ and shown correctly.
+
+ This is described in this draft:
+ https://tools.ietf.org/html/draft-ietf-tls-oob-pubkey-11
+
+ Change-Id: Ibe7610aace31a19791b02e71ccd8d9ceb8cf979d
+ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-on: https://code.wireshark.org/review/1372
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit a8e6d128ab85da609915b92f3d9e370203b67131)
+ Reviewed-on: https://code.wireshark.org/review/2999
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit 615b70a
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri Jul 11 19:49:46 2014 +0200
+
+ GTP: allow empty Data Record Packet IE
+
+ Bug: 10277
+ Change-Id: I4edf330fa1c44a52d985d70555c7756954fb9364
+ Reviewed-on: https://code.wireshark.org/review/3008
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 826bca091874e04ce5aa72fa233df652bf8819fb)
+ Reviewed-on: https://code.wireshark.org/review/3009
+
+commit 3cebc55
+Author: Bill Meier <wmeier@newsguy.com>
+Date: Thu Jul 3 19:28:21 2014 -0400
+
+ packet-vnc.c: Fix a bug in displaying a set of FT_BOOLEAN bit fields (found by checkAPIs).
+
+ Backported to master-1.12 from master
+
+ Change-Id: Ie5252d20db5826f3e48aba11da1bf85d00630db2
+ Reviewed-on: https://code.wireshark.org/review/2838
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+ Reviewed-on: https://code.wireshark.org/review/3005
+
+commit ef90ec1
+Author: Bill Meier <wmeier@newsguy.com>
+Date: Thu Jul 3 17:35:58 2014 -0400
+
+ packet-vnc.c: Improve dissection
+
+ - Properly dissect multiple VNC PDUs in one (or more) TCP segment(s).
+ - Dissect additional message types ('Fence' and 'Enable Continuous Updates').
+ - Handle "num_rects" field = 0xFFFF (TightVNC).
+ - Add some more info as to sources of information about the VNC protocol.
+ - Add an XXX note as to the (incorrect) reassembly method being used.
+ - Add some notes as to possible ToDo's.
+
+ Backported to master-1.12 from master
+
+ Change-Id: Id4942c50b3d1373bd2e72c0131614835dc39ba90
+ Reviewed-on: https://code.wireshark.org/review/2834
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+ Reviewed-on: https://code.wireshark.org/review/3004
+
+commit 7f36674
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Thu Jun 19 16:49:07 2014 -0700
+
+ remove duplicate offset=0
+
+ Backported to master-1,12 from master
+
+ Change-Id: I6653b733dfd2c587909371e50fd0c2efc4649dcd
+ Reviewed-on: https://code.wireshark.org/review/2482
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Reviewed-on: https://code.wireshark.org/review/3003
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+
+commit 9536540
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Thu Jun 19 16:40:49 2014 -0700
+
+ no need for if(tree)
+
+ Backported to master-1.12 from master
+
+ Change-Id: I5762fb30f57d0f9bc3e5fc786577ed1cc49b64d7
+ Reviewed-on: https://code.wireshark.org/review/2481
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Reviewed-on: https://code.wireshark.org/review/3002
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+
+commit feabf6e
+Author: Alexis La Goutte <alexis.lagoutte@gmail.com>
+Date: Tue May 6 17:54:47 2014 +0200
+
+ HTTP2: Backport to 1.12
+ * Add HPACK decompression (add lib nghttp2)
+ * Update to draft-13
+
+ HTTP2: Showing decompressed headers
+
+ Decode the HTTP/2 header block using nghttp2 HPACK decoder
+
+ In this patch, We use nghttp2 HPACK decoder to decompress HTTP/2 header
+ block. To make HPACK decompressor work, we need to track down HTTP/2
+ connection from the beginning. If we see the HTTP/2 magic (connection
+ preface), we initialize HPACK decompressor objects. We actually use 2
+ HPACK decompressor for both client and server. HPACK decompressor
+ objects are stored in hash tables using TCP stream index as a key.
+
+ Most code by: Tatsuhiro Tsujikawa
+
+ Signed-off-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Signed-off-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+ Change-Id: Idb4dd4b0a200924820cb0b34db664cc37518168d
+ Reviewed-on: https://code.wireshark.org/review/1527
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+
+ Add nghttp2 lib (HPACK)
+
+ Change-Id: I2a361951924045035a2a5d38f943e6b97c170f36
+ Reviewed-on: https://code.wireshark.org/review/1623
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+ NGHTTP2: fix typo (nghttp2_ent.h => nghttp2_net.h)
+
+ Change-Id: I52d3c40794841614d55e88c9fe9cf2de43a0fa46
+ Reviewed-on: https://code.wireshark.org/review/1897
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+
+ NGHTTP2: fix -Wshadow about index with some old GCC release or Mac OS X buildbot
+
+ (No problem with gcc-4.7 or gcc-4.8)
+
+ Change-Id: Iae1f801abeb80429c08e93668133a9c5ac7977ef
+ Reviewed-on: https://code.wireshark.org/review/1898
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+
+ nghttp2: upgrade library to g4f7223e and add casts to please buildbots
+
+ Change-Id: Ic412d4bfc56695cbcab709d42a6f31aa9e50c64e
+ Reviewed-on: https://code.wireshark.org/review/1900
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+
+ Fix /home/jmayer/work/wireshark/git/wsutil/nghttp2/nghttp2_hd.c:996:12: error: ‘check_index_range’ defined but not used [-Werror=unused-function]
+ static int check_index_range(nghttp2_hd_context *context, size_t idx)
+ ^
+ cc1: all warnings being treated as errors
+
+ Change-Id: Ie8e3fe12d339a689e0222eda501b253a7d6d923c
+ Reviewed-on: https://code.wireshark.org/review/1912
+ Reviewed-by: Jörg Mayer <jmayer@loplof.de>
+
+ HTTP2: try to please OSX 10.6 x64 buildbot
+
+ Change-Id: I79e7a619b5dadb68b70f8b057494cc970a655cc7
+ Reviewed-on: https://code.wireshark.org/review/1903
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+ Make this comple whether assertions are enabled or not.
+
+ Make the check for a valid index range a macro, so the compiler doesn't
+ whine if it's not used, but it's available if it *is* used.
+
+ Change-Id: I3cee0460eacef23187c141458dc5ac7a7acbf7c8
+ Reviewed-on: https://code.wireshark.org/review/1914
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+ HTTP2 : Max value for type is now 0x0B (BLOCKED type), update the heuristic
+
+ Change-Id: I8de7b63ca90803f8fc6333bbe43aeb94459e6363
+ Reviewed-on: https://code.wireshark.org/review/1918
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+ Dissect HTTP/2 draft-13
+
+ Summary of changes since draft-12:
+
+ * Pad High and Pad Low wereare replaced with single Pad Length field.
+ * Padding was removed from CONTINUATION frame.
+ * ALTSVC and BLOCKED frames were removed.
+ * Per-frame compression and its associated SETTINGS flag were removed.
+ * HPACK Huffman code table and static header table were updated.
+
+ Change-Id: I9c4f05f8cd937bfadbb1b912f2b9ffb31e9c18d5
+ Reviewed-on: https://code.wireshark.org/review/2615
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+ Update libnghttp2 to latest master (add support for draft-13)
+
+ Bug:10256
+ Change-Id: I24275f1b67120f69cfd673f7e5598a50b3c7566f
+ Reviewed-on: https://code.wireshark.org/review/2145
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+
+ Moved nghttp2 to epan
+
+ Cleaned up nghttp2 build
+
+ Change-Id: I9f7adc12936155e0ffc01ec825b5aff95279f97d
+ Reviewed-on: https://code.wireshark.org/review/2937
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/2953
+
+commit 0ab474c
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Jul 10 17:27:49 2014 -0700
+
+ Avoid sign-extending bytes before handing them to <ctype.h> macros.
+
+ Pointed out by the Visual Studio code analyzer.
+
+ Change-Id: Idd429b4d0fb3db11ce171c3a5b38bdc55cc53c15
+ Reviewed-on: https://code.wireshark.org/review/2988
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit b5d4128bee88b42cb32337a6343bb44574ff2f3a)
+ Reviewed-on: https://code.wireshark.org/review/2989
+
+commit 8a47b3a
+Author: Bill Meier <wmeier@newsguy.com>
+Date: Tue Jul 8 15:32:39 2014 -0400
+
+ pre-commit: Add 'unset GREP_OPTIONS' (similar to Gerrit commit-msg)
+
+ msysgit grep is fairly old and doesn't recognize certain
+ grep options, e.g., '--color=auto'.
+
+ I imagine there may possibly be other grep option issues
+ on various platforms.
+
+ (I also note that the various git scripts in libexec/git-core
+ clear out GREP_OPTIONS before calling grep).
+
+ Change-Id: I67bc148a77cfc0167064e61e8c47a5f091704eac
+ Reviewed-on: https://code.wireshark.org/review/2945
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+ (cherry picked from commit b66f614e5d5fee0aad1eb025c228fcbf7f2aae7e)
+ Reviewed-on: https://code.wireshark.org/review/2948
+
+commit de09662
+Author: Bill Meier <wmeier@newsguy.com>
+Date: Mon Jul 7 11:02:56 2014 -0400
+
+ tools/pre-commit: Complete all checks on all files before exiting with Ok/Fail status.
+
+ Change-Id: Iea6df6fbe5a977b282e823f87cd9f760e92a3e22
+ Reviewed-on: https://code.wireshark.org/review/2918
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+ (cherry picked from commit cdf6d62b3ba81fd40ab386f5b0b16ec61223f5a9)
+ Reviewed-on: https://code.wireshark.org/review/2947
+
+commit 97be684
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Tue Jul 8 17:06:21 2014 +0200
+
+ RRC: fix ASN.1 description by manually adding CR5591
+
+ Without it, dual-band DF-3C feature does not work
+
+ Change-Id: I95d4a7320b77c6093f5d51efdbb2b21af0deab11
+ Reviewed-on: https://code.wireshark.org/review/2942
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit ac52c06038d919b94e77c7d0c5bdb1e3e659815c)
+ Reviewed-on: https://code.wireshark.org/review/2943
+
+commit 6cc7671
+Author: Evan Huus <eapache@gmail.com>
+Date: Tue Jul 8 00:04:21 2014 -0400
+
+ udvm: free the buffer *before* throwing the exception
+
+ Freeing it after the exception doesn't do much, for obvious reasons. Also move
+ the allocation a bit later, and add modelines.
+
+ This fixes one major memory leak, although on inspection this code still isn't
+ safe since there are exception-throwing functions called all over the place with
+ glib memory active. Outside the scope of this fix though.
+
+ Bug: 10265
+ Change-Id: I1fe272e92b92cac6b99abb84866b8ae9b582e24c
+ Reviewed-on: https://code.wireshark.org/review/2932
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit e74a58b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Jul 6 21:34:06 2014 -0700
+
+ Squelch compiler warning.
+
+ Change-Id: I37c495cb4d68b95d8388c654bbf6a817167261ac
+ Reviewed-on: https://code.wireshark.org/review/2909
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit e286acd05fc5494a9cc12e5b80a3ccbd2a7f5251)
+ Reviewed-on: https://code.wireshark.org/review/2930
+
+commit 88aa372
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Jul 6 21:31:43 2014 -0700
+
+ Wrong macro.
+
+ Change-Id: I2e0e7c1a30c9fc2d5af7cbd53dae26ad9a619e71
+ Reviewed-on: https://code.wireshark.org/review/2908
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 9dfb3e7b46461bed36ba35a96d800f91288305ba)
+ Reviewed-on: https://code.wireshark.org/review/2929
+
+commit 4b8f8b3
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Jul 6 21:29:09 2014 -0700
+
+ G_GNUC_FORMAT encapsulates __attribute((format_arg(...))).
+
+ Change-Id: I9513c187ae4ce8b8cf8f6a926072b215e26ec64f
+ Reviewed-on: https://code.wireshark.org/review/2907
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit eea2e156384f74320deb3f71bb22883d70de7681)
+ Reviewed-on: https://code.wireshark.org/review/2928
+
+commit 97d02ae
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Jul 6 17:11:25 2014 -0700
+
+ Squelch some compiler warnings.
+
+ Change-Id: I768bf577b3871171ab33f080c5a0099ac06718ce
+ Reviewed-on: https://code.wireshark.org/review/2906
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 0a2f6fc01a9170ffc29570436c5496c046612a56)
+ Reviewed-on: https://code.wireshark.org/review/2927
+
+commit bade563
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Jul 6 16:48:06 2014 -0700
+
+ Squelch some compiler warnings.
+
+ Change-Id: Ie39c7b0c1fef8f862cec016a3a1a5bd1451a3df2
+ Reviewed-on: https://code.wireshark.org/review/2905
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 79fcc6a1a36e0637ce21f65a7e27bc6d90213509)
+ Reviewed-on: https://code.wireshark.org/review/2926
+
+commit 337aebe
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Sun Jul 6 15:34:38 2014 +0200
+
+ Add printf-format annotations, fix garbage
+
+ The WRETH dissector showed up some garbage in the column display. Upon
+ further inspection, it turns out that the format string had a trailing
+ percent sign which caused (unsigned)-1 to be returned by
+ g_printf_string_upper_bound (in emem_strdup_vprintf). Then ep_alloc is
+ called with (unsigned)-1 + 1 = 0 memory, no wonder that garbage shows
+ up. ASAN could not even catch this error because EP is in charge of
+ this.
+
+ So, start adding G_GNUC_PRINTF annotations in each header that uses
+ the "fmt" or "format" paramters (grepped + awk). This revealed some
+ other errors. The NCP2222 dissector was missing a format string (not
+ a security vuln though).
+
+ Many dissectors used val_to_str with a constant (but empty) string,
+ these have been replaced by val_to_str_const. ASN.1 dissectors
+ were regenerated for this.
+
+ Minor: the mate plugin used "%X" instead of "%p" for a pointer type.
+
+ The ncp2222 dissector and wimax plugin gained modelines.
+
+ Change-Id: I7f3f6a3136116f9b251719830a39a7b21646f622
+ Reviewed-on: https://code.wireshark.org/review/2881
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit f2b4daf4005d60eef7e34e2e6ebf4fe487d3c255)
+ Reviewed-on: https://code.wireshark.org/review/2923
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 6217370
+Author: Jeff Morriss <jeff.morriss.ws@gmail.com>
+Date: Mon Jun 16 17:45:57 2014 -0400
+
+ Add a cast to satisfy the buildbots.
+
+ Change-Id: I1c128db8a8b0cbbef01a26f7b3a50ed2b59af229
+ Reviewed-on: https://code.wireshark.org/review/2279
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ Tested-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ (cherry picked from commit 319ad977175e34dde70799aae7c68ff24f24b977)
+ Reviewed-on: https://code.wireshark.org/review/2922
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 3563b09
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jul 6 08:26:58 2014 -0700
+
+ [Automatic manuf, services and enterprise-numbers update for 2014-07-06]
+
+ Change-Id: I4a7770b144df70b577875adf6f4593682778da8c
+ Reviewed-on: https://code.wireshark.org/review/2891
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 8da0b0d
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jul 5 19:25:47 2014 -0700
+
+ Fix more errors revealed by enum-to-integer conversion warnings.
+
+ Change-Id: Ib28af874cbac0623ed94e7558f3711e9a1b03a2d
+ Reviewed-on: https://code.wireshark.org/review/2874
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 8481c438614427a9249aa20e31062e3bf7a86a89)
+ Reviewed-on: https://code.wireshark.org/review/2875
+
+commit e851c0a
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jul 5 18:33:00 2014 -0700
+
+ Squelch a warning.
+
+ Change-Id: Id27a6447dba9b6eda07933139a3f07edd71c8fd6
+ Reviewed-on: https://code.wireshark.org/review/2872
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit ab5d1cfa20b3047ed062bc3b9fbf85d396ae7e63)
+ Reviewed-on: https://code.wireshark.org/review/2873
+
+commit e13d4d4
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jul 5 18:13:13 2014 -0700
+
+ Pull the record processing into netmon_process_record().
+
+ That combines more common code from the read and seek-read code
+ paths.
+
+ Also, separate out the individual metadata record types, with a comment
+ for each, to simplify the process of supporting some or all of them in
+ the future.
+
+ Change-Id: Ic8ded397d9550ec6013c1f5f138333b1ef5c37e5
+ Reviewed-on: https://code.wireshark.org/review/2869
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 570d52a844afe40255ccce68d4bdad66669ff709)
+ Reviewed-on: https://code.wireshark.org/review/2870
+
+commit 9b81e6b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jul 5 12:32:27 2014 -0700
+
+ Fix an error caught by enum-conversion warnings.
+
+ (Strong typing is for weak minds.
+
+ Human minds are weak.
+
+ Therefore, strong typing is for human minds.)
+
+ Change-Id: I2a973b6168235d5d1c7f2a5f8ac79b97b963d846
+ Reviewed-on: https://code.wireshark.org/review/2863
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 3f7725174d2c4122b1d159958a56b8d8b928301b)
+ Reviewed-on: https://code.wireshark.org/review/2864
+
+commit 6319ff6
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jul 5 11:48:52 2014 -0700
+
+ Fix whitespace issues.
+
+ Change-Id: I69f84ca8b947be8e06005c82526559e3bc8f6387
+ Reviewed-on: https://code.wireshark.org/review/2861
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit c8bcdd52716a308bf3d6cbd131c68a31203f6e0b)
+ Reviewed-on: https://code.wireshark.org/review/2862
+
+commit df61fac
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jul 5 11:45:18 2014 -0700
+
+ Handle the UTC timestamps in NetMon 2.3 files.
+
+ This addresses part of, but not all of, the issues in bug ten thousand,
+ one hundred, and ninety:
+
+ https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10190
+
+ (I'm spelling it out to make sure Gerrit doesn't think this change
+ *does* address all the issues in that bug, and mark it as RESOLVED
+ FIXED; I feel like I have to treat Gerrit as a dog or small child from
+ whom I'm trying to keep a secret - "honey, I'm taking the dog to the
+ vee eee tee".)
+
+ Change-Id: Ic234130c1ea84cfaf47901485dca775e168f71d0
+ Reviewed-on: https://code.wireshark.org/review/2859
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 599b880e4c53613c243b0a39548968f34cdce0e3)
+ Reviewed-on: https://code.wireshark.org/review/2860
+
+commit 62a429a
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jun 23 23:56:59 2014 -0700
+
+ proto_tree_add_uint() takes a value, not an encoding, as an argument.
+
+ Change-Id: Ie2c0523e32b54cd13506501d98215934a8d1304e
+ Reviewed-on: https://code.wireshark.org/review/2611
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 4f1d20abae2c485bf0cdcaee10a917e4e01ebda1)
+ Reviewed-on: https://code.wireshark.org/review/2858
+
+commit e166d36
+Author: Evan Huus <eapache@gmail.com>
+Date: Fri Jul 4 21:45:15 2014 +0000
+
+ Expand a variable from 16 to 32 bits (and make it signed).
+
+ Fixes an overflow leading to infinite loop.
+
+ Bug: 10259
+ Change-Id: Ie76c5a810af927ba092f4067268bd789b3a7d7bf
+ Reviewed-on: https://code.wireshark.org/review/2856
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit c92bf7e44bae7d73b65461b7fb5bf9cea72705ce)
+ Reviewed-on: https://code.wireshark.org/review/2857
+
+commit f12aac6
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri Jul 4 13:48:29 2014 +0200
+
+ Fix qtshark compilation with more explicit casts (follow-up of g106c8b3)
+
+ Change-Id: I81f862e03977b7fd8aa6852fada0c6e1b00b52bf
+ Reviewed-on: https://code.wireshark.org/review/2849
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit 34303a2
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri Jul 4 11:56:48 2014 +0200
+
+ TCP: backport out of order packet detection algorithm from master branch
+
+ Change-Id: I20ec27a1dc226b412eaa1caddb66b6b7caafbe4e
+ Reviewed-on: https://code.wireshark.org/review/2847
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit f3a0092
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri Jul 4 11:52:55 2014 +0200
+
+ Fix Windows build broken by g106c8b3
+
+ Change-Id: I55aa398838a6809cb6597647335ae72f824cfc43
+ Reviewed-on: https://code.wireshark.org/review/2846
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 600a505
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Wed Jun 25 10:54:57 2014 +0200
+
+ ssl-utils: add missing ett registration
+
+ Fixes the dissector bug warning:
+ "epan/proto.c:4657: failed assertion "idx >= 0 && idx < num_tree_types"
+
+ Add some comments to avoid future mistakes, add folding markers and fix
+ alignment of curves hf.
+
+ Change-Id: Ibcb57bfeb09a9777324682704a86f1ce260d345e
+ Reviewed-on: https://code.wireshark.org/review/2642
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 4224e353f9ca3a3224ad2be3728905e729e74b9c)
+ Reviewed-on: https://code.wireshark.org/review/2817
+ Reviewed-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit dcc01c2
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Mon Jun 23 23:14:06 2014 +0200
+
+ ssl: fix ClientKeyExchange, fix TLSv1.2 SKE for DH
+
+ Since DTLS and TLS do not differ in handling ClientKeyExchange and
+ ServerKeyExchange, its dissection got moved to ssl-utils. The code is
+ based on the SSL dissector, with header field names adjusted to the
+ DTLS ones (those got capitalized). Besides a version difference (for
+ signatures), the header field and function names, the DTLS and SSL code
+ are equal (this is verified).
+
+ This patch refactors the dissectors for DHE_RSA and ECDHE to make use of
+ a common function to dissect the signed_params field. All offset
+ tracking is also removed in favor of exception handling by the
+ proto_tree_add_item function. Occurrences of proto_tree_add_uint are
+ also replaced by proto_tree_add_item for simplicity.
+
+ After those changes, the SKE dissector for DH key exchanges is updated
+ to handle the mandatory signature field in TLSv1.2, using the newly
+ added function. (bug 9208)
+
+ Another bug occurred after the length check removal, pre-TLS and
+ OpenSSL's old DTLS implemenation do not include a vector length in
+ the CKE. This is now also fixed. (bug 10222)
+
+ Other minor changes: comments added/corrected, renamed
+ keyex_dh -> keyex_dhe (includes DHE_RSA and DHE_DSS).
+
+ Bug: 9208
+ Bug: 10222
+ Change-Id: I76e835d56a65c91facce46840d79c1c48ce8d5dd
+ Reviewed-on: https://code.wireshark.org/review/2542
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit e22d3c9b744af8fa49806f1cde2100be85cc58cc)
+ Reviewed-on: https://code.wireshark.org/review/2816
+ Reviewed-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 098aa9f
+Author: Hauke Mehrtens <hauke@hauke-m.de>
+Date: Sat Apr 26 10:45:41 2014 +0200
+
+ ssl-utils: dissect the certificate type TLS extension
+
+ This analyses the certificate type extensions and then stores the
+ certificate type in the ssl session. This way we can later show the
+ certificate in the correct from.
+
+ This is described in this draft:
+ https://tools.ietf.org/html/draft-ietf-tls-oob-pubkey-11
+
+ Change-Id: Ifdda165807bc29f1fc138da000a9a538ecd18b6e
+ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-on: https://code.wireshark.org/review/1371
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 584b81372b70f3fbb28e35df145215778b0d6663)
+ Reviewed-on: https://code.wireshark.org/review/2815
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 9c1607f
+Author: Hauke Mehrtens <hauke@hauke-m.de>
+Date: Sun May 25 11:07:51 2014 +0300
+
+ ssl: use SslSession
+
+ Use the struct SslSession instead of passing the tls version and cipher
+ to each function.
+
+ Change-Id: I19b163913f8f6521a34d94d130e2ae74546a615a
+ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-on: https://code.wireshark.org/review/1821
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 13e4f777c763e22a260638445d7395687d787b54)
+ Reviewed-on: https://code.wireshark.org/review/2814
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit a028288
+Author: Hauke Mehrtens <hauke@hauke-m.de>
+Date: Sat May 24 17:51:10 2014 +0300
+
+ dtls: use SslSession
+
+ Use the struct SslSession instead of passing the tls version and cipher
+ to each function.
+
+ Change-Id: I95ad8cb5857794608f0f8db5c2dfd4b16e6578d5
+ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-on: https://code.wireshark.org/review/1820
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 00251edd7d6bb2720507fa30fcde4d4e2f6c4842)
+ Reviewed-on: https://code.wireshark.org/review/2813
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 3245a9f
+Author: Hauke Mehrtens <hauke@hauke-m.de>
+Date: Thu May 22 10:45:40 2014 +0200
+
+ ssl: add SslSession structure
+
+ This structure is used to store information about a SSL session which
+ is not only needed for decrypting the session, but also to show nice
+ dissection information.
+
+ In an other patch I will add some more members to the struct because
+ the old way of passing them to the function does not scale.
+
+ Change-Id: I88e7f2896e0364a41d4538752dad291de83bfbca
+ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
+ Reviewed-on: https://code.wireshark.org/review/1819
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit a7a4aa9a743f68f9864011d3b56bb5739c2cda15)
+ Reviewed-on: https://code.wireshark.org/review/2812
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 106c8b3
+Author: Andrew Bitson <abitson@gmail.com>
+Date: Wed Jul 2 09:04:47 2014 -0500
+
+ adding abs() functions when creating the values to be graphed since the graph only handles positive values.
+ Does not apply to FT_RELATIVE_TIME.
+
+ This is being added to master-1.12 to avoid breaking future QT functionality in the graph.
+
+ Bug 9985 - Add absolute values to i/o graph
+
+ Change-Id: I32565c346bef48ec852f61c379df96f2c733e68f
+ Reviewed-on: https://code.wireshark.org/review/2780
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit 047c4c0
+Author: Bill Meier <wmeier@newsguy.com>
+Date: Thu Jun 19 21:35:46 2014 -0400
+
+ packet-vnc.c: Improve re-assembly.
+
+ Essentially:
+
+ When more data is needed to continue dissecting a PDU, use
+ DESEGMENT_ONE_MORE_SEGMENT instead of repeatedly requesting
+ additional bytes (for one or a few more fields).
+
+ - Improves the efficiency of the dissection;
+
+ - Prevents 'one-pass' tshark dissection from redissecting
+ the PDU repeatedly many, many times with each time dissecting
+ the PDU with one or a few more additional fields.
+ This generated *lots* of (repeated) output since a reassembled
+ VNC PDU can contain many fields (each of short length).
+
+ - (A comment in packet-tcp.c states, in effect, that repeatedly
+ requesting a specific amount of more bytes to dissect a PDU
+ will "break reassembly" although I note that the reassembly did
+ seem to work (in-efficiently)).
+
+ Note: Although this patch improves the handling of reassembly, the
+ dissector has significant issues. For example. see Bug #5366.
+
+ I expect this fixes the Bug #10134 issue: "Cannot allocate memory";
+
+ Before the fix, 'tshark -nVxr' for the input file generated trees with
+ multiple hundreds of thousands of entries and generated reassembled
+ PDUs consisting of many, many small fragments.
+
+ Change-Id: I970037c346fbaa4bffa5726fd5bee5f69396eabf
+ Reviewed-on: https://code.wireshark.org/review/2471
+ Reviewed-by: Bill Meier <wmeier@newsguy.com>
+ (cherry picked from commit 728e5a1ab3e2614ec83a6af43a52742cf0f5df01)
+ Reviewed-on: https://code.wireshark.org/review/2821
+
+commit 71cb629
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu Jul 3 11:25:21 2014 +0200
+
+ catapult,irda: Fix ASAN crashes due to buffer underrun
+
+ The catapult dissector tripped on this random file I had. A quick look
+ at other dissectors which use a construct like "-1] *= '*\\[rn]" showed
+ packet-irda too, so fix that as well.
+
+ Change-Id: I4b5fadcacd0b09d0fb29bdefc3dd1f28aef9b593
+ Reviewed-on: https://code.wireshark.org/review/2802
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 16f8ba1bed579344df373bf38fff552ab8baf380)
+ Change-Id: I4b5fadcacd0b09d0fb29bdefc3dd1f28aef9b593
+ Reviewed-on: https://code.wireshark.org/review/2809
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit 58d93e1
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Wed Jul 2 23:04:58 2014 +0200
+
+ GTP: add dissection of Extended End User Address
+
+ Bug: 10251
+ Change-Id: I174b5a2b3e2ec8ff2ead9f290b452ee468f6fe66
+ Reviewed-on: https://code.wireshark.org/review/2783
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 2dbab6df183148c370f6ea501c1c00974364407b)
+ Reviewed-on: https://code.wireshark.org/review/2793
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit a81265a
+Author: Balint Reczey <balint@balintreczey.hu>
+Date: Mon Jun 30 17:56:28 2014 +0200
+
+ Allow overriding C/C++ flags from CMake command line
+
+ Append user's flags to our flags instead of prepending them to make
+ user flags higher priority.
+
+ Change-Id: I3ead33ee5fa06a2395d9197a027306ef99a704a2
+ Reviewed-on: https://code.wireshark.org/review/2722
+ Reviewed-by: Jörg Mayer <jmayer@loplof.de>
+ (cherry picked from commit 65e3f5c25ee48e5b736ddbdf04fb2a31601ce8c1)
+ Reviewed-on: https://code.wireshark.org/review/2786
+ Reviewed-by: Balint Reczey <balint@balintreczey.hu>
+
+commit fcea3cb
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Jul 2 13:27:00 2014 -0700
+
+ Fail if any of the install-exec-hook commands fails.
+
+ Hopefully, this will mean that somebody doing a set-UID/set-GID/setcap
+ installation as themselves rather than as root will not "succeed" but
+ leave dumpcap installed without enhanced privileges, so the underlying
+ problem in bugs such as bug 10247 will be more obvious.
+
+ Change-Id: I34393bc2c9ea4dc59854a08524edb4f65e79730b
+ Reviewed-on: https://code.wireshark.org/review/2781
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 2c9d2bea32238223634ae975cfd4e682ba1a0b2b)
+ Reviewed-on: https://code.wireshark.org/review/2782
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit d570514
+Author: Jeff Morriss <jeff.morriss.ws@gmail.com>
+Date: Tue Jul 1 18:28:26 2014 -0400
+
+ Get rid of rpath when we're building RPMs.
+
+ Fedora prohibits it, we don't need it, and it gets in the way some times.
+
+ Change-Id: I92cee959f471866ff90efe9f96e4fa519c357dd9
+ Reviewed-on: https://code.wireshark.org/review/2763
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ (cherry picked from commit a4a624e4c5f16ad75ab9124e390f82efaca06512)
+ Reviewed-on: https://code.wireshark.org/review/2765
+
+commit 44b8729
+Author: Jeff Morriss <jeff.morriss.ws@gmail.com>
+Date: Tue Jul 1 17:22:46 2014 -0400
+
+ Fix buildroot.
+
+ Change-Id: I902db6c69ae5966da1102e4fbcfd9f46867c0b4f
+ Reviewed-on: https://code.wireshark.org/review/2762
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ (cherry picked from commit 5f682f1f0329d65edbb363d7db1df23840d38d83)
+ Reviewed-on: https://code.wireshark.org/review/2764
+
+commit 5d2747c
+Author: Malcolm Walters <malcolm.walters@acano.com>
+Date: Tue Jul 1 13:38:47 2014 +0100
+
+ Fix for Bug 10240.
+ Include padding length in calculation of correct attribute length
+
+ Change-Id: I569c6a9e1be39e3bb997e797a094b80cdcba6b07
+ Reviewed-on: https://code.wireshark.org/review/2747
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 2a306f4b05b156a08788df80648bc2714c412b1f)
+ Reviewed-on: https://code.wireshark.org/review/2760
+
+commit 4b59394
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jun 30 15:37:58 2014 -0700
+
+ Always set the crash information.
+
+ There's no reason to do it only on Windows - and, in fact, the only
+ platform where we currently do anything with the information is OS X.
+ Every other program in the Wireshark suite that does it at all does it
+ on all platforms.
+
+ Change-Id: I7d017be224628fc08aaf7e64b380af7a5beb0232
+ Reviewed-on: https://code.wireshark.org/review/2731
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 1322190
+Author: Bill Meier <wmeier@newsguy.com>
+Date: Mon Jun 30 01:48:16 2014 -0400
+
+ Fix Bug #10238: Display filter expression dialog items do not expand/display properly.
+
+ Unfortunately, certain proto_hier_tree_model.c functions
+ assume/require that a cookie generated by
+ proto_(first|next)_protocol_field() will never have a NULL value.
+
+ Bug introduced in gd47ae54.
+
+ Change-Id: I42763d02f700e15ca9b3ab9980943d4f8d933ca9
+ Reviewed-on: https://code.wireshark.org/review/2712
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 9cf40b67b258616c248569b74685693f14a0aab3)
+ Reviewed-on: https://code.wireshark.org/review/2715
+
+commit 1d08bee
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Sun Jun 29 15:13:43 2014 +0200
+
+ GSM MAP: ensure that p2p_dir is always initialized before calling GSM SMS dissector
+
+ Bug: 10234
+ Change-Id: Ie340b849015febe46f91836440d44d4cfde005a4
+ Reviewed-on: https://code.wireshark.org/review/2695
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit e39e44df246c89c31d708923a181f99810240731)
+ Reviewed-on: https://code.wireshark.org/review/2700
+
+commit a2e2571
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jun 29 08:07:20 2014 -0700
+
+ [Automatic manuf, services and enterprise-numbers update for 2014-06-29]
+
+ Change-Id: I47f6863f34690631f4b7b8dcc654f802155794c6
+ Reviewed-on: https://code.wireshark.org/review/2697
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 713fbc6
+Author: Evan Huus <eapache@gmail.com>
+Date: Thu Jun 26 23:25:08 2014 -0400
+
+ If we have no fields, don't try to iterate through them.
+
+ Otherwise glib throws an assertion since the array we pass it is NULL.
+
+ Change-Id: I9159c1f5ad99b280c040cd790df3cf352738601f
+ Reviewed-on: https://code.wireshark.org/review/2680
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 8d2eaaab51f0c64de0488b7b2b83cac7086628c1)
+ Reviewed-on: https://code.wireshark.org/review/2681
+
+commit a189ed8
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Thu Jun 19 14:32:55 2014 -0700
+
+ handle TS packet reassembly for PES packets with 0 length field
+ (unknown length)
+
+ this fixes bug 9527
+
+ Change-Id: I255ae9662dfeea06e61e4b0891e0ea8eaa254d0f
+ Reviewed-on: https://code.wireshark.org/review/2462
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 1e9bc6e4832d99be59e9140558b0265828fd590e)
+ Reviewed-on: https://code.wireshark.org/review/2679
+
+commit 35ee9d2
+Author: Jeff Morriss <jeff.morriss.ws@gmail.com>
+Date: Wed Jun 25 15:37:36 2014 -0400
+
+ Check the validity of fields given to tshark with "-e": complain and exit if
+ they aren't valid.
+
+ Should help avoid confusion like that in
+ https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10201
+
+ Bug: 10201
+ Change-Id: Iff7f51ae042ca1a92d1c803b6cb61aa5d81ce205
+ Reviewed-on: https://code.wireshark.org/review/2654
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 9d4af5fccd4061521f72d42c2afb7fef78d3e690)
+ Reviewed-on: https://code.wireshark.org/review/2673
+
+commit b97d70d
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Thu Jun 26 10:33:21 2014 -0700
+
+ Fix compilation of packet-btavdtp.c.
+
+ Change-Id: I6962dafd8c6c2db522fb01178a1b4cdb831ee85b
+ Reviewed-on: https://code.wireshark.org/review/2671
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit ced8a05
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed Jun 25 16:00:11 2014 -0700
+
+ Decrease TRAFFIC_CAPTURE_DURATION from 60s to 15s.
+
+ Change-Id: Ie6d6ac0489f0fcb506360a3900d33c44cb3477e9
+ Reviewed-on: https://code.wireshark.org/review/2664
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit 81963e7f1a5c7b19b414a4de210cc65c62aee27c)
+ Reviewed-on: https://code.wireshark.org/review/2666
+
+commit 9d8adb2
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Jun 25 14:05:36 2014 -0700
+
+ Update a comment.
+
+ Also, make the block of code containing that comment intended
+ consistently with spaces.
+
+ Change-Id: I8e8eb346833662f15c53ece5869b12cc430bad11
+ Reviewed-on: https://code.wireshark.org/review/2661
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 765405da3e7ee501935e04a818beda6fffa4ccf9)
+ Reviewed-on: https://code.wireshark.org/review/2662
+
+commit 4c4ae26
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Jun 25 13:42:36 2014 -0700
+
+ Boost the maximum snapshot length to 262144, for USBPcap.
+
+ Change-Id: I104bd9d1519298a0e4ff818f1cf821df594b3491
+ Reviewed-on: https://code.wireshark.org/review/2658
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 474b90e35898c8898695b43bb49305ec200fa6b0)
+ Reviewed-on: https://code.wireshark.org/review/2659
+
+commit 9ade6ec
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Jun 25 13:26:39 2014 -0700
+
+ Boost the maximum packet size to 131072.
+
+ Libpcap 1.6/tcpdump 4.6 will support up to 131072, as the MTU on the
+ Linux loopback device is 65536 on at least some versions of the kernel,
+ and that doesn't count the fake Ethernet header, so the maximum packet
+ size is 65549; they went to the next power of 2 up.
+
+ Change-Id: Ibfc66d01ef8ef7387887a75c2b567159bb78ac0f
+ Reviewed-on: https://code.wireshark.org/review/2655
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 8cde7a72d6c2b8e5cac87aeec5b1f200185cbe4a)
+ Reviewed-on: https://code.wireshark.org/review/2656
+
+commit e314763
+Author: Balint Reczey <balint@balintreczey.hu>
+Date: Tue Jun 24 16:53:58 2014 +0200
+
+ Fix sorting RTP Streams by jitter
+
+ Bug: 9460
+ Change-Id: I80d991053eb47b8650561e8af4cc8dec512e2c9c
+ Reviewed-on: https://code.wireshark.org/review/2619
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 00212e5f98b71787e274a92a3b72f41d474e888f)
+ Reviewed-on: https://code.wireshark.org/review/2634
+
+commit 0db675d
+Author: Ben Burwell <bburwell@lutron.com>
+Date: Tue Jun 24 11:34:40 2014 -0400
+
+ Add quotes around MAKEDIR.
+
+ Bug: 7870
+ Change-Id: I6cea057c4953f5ecc0a146a24570d089e79f8352
+ Reviewed-on: https://code.wireshark.org/review/2620
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 830d1b1ce9905e287386c9e8bc638c26380d77cb)
+ Change-Id: I6cea057c4953f5ecc0a146a24570d089e79f8352
+ Reviewed-on: https://code.wireshark.org/review/2636
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 018fa44
+Author: Balint Reczey <balint@balintreczey.hu>
+Date: Tue Jun 24 14:58:46 2014 +0200
+
+ GTK3: Fix changing filter expression's bg color based on validity
+
+ Bug: 8598
+ Change-Id: Id5a52c05cab25df9e228b1b4d2caf07335c1f4c8
+ Reviewed-on: https://code.wireshark.org/review/2614
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 09b86bdb0ce6602f1c15a8fccd4057aeb1d2e823)
+ Reviewed-on: https://code.wireshark.org/review/2630
+
+commit 25d39ca
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jun 24 13:48:40 2014 -0700
+
+ Support -w even if we're not built with pcap.
+
+ You can, for example, do
+
+ tshark -r file1 -Y filter -w file2
+
+ to read a file, apply a read filter, and write the packets that match
+ the filter to another file even if you can't capture traffic.
+
+ Change-Id: Ifd5e1d5c0e745edef5e98ec4babc720bfbcee6d9
+ Reviewed-on: https://code.wireshark.org/review/2627
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 0fb9369a5ed3381c1c243c2f34a66f3061712c4b)
+ Reviewed-on: https://code.wireshark.org/review/2628
+
+commit c7874f7
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Mon Jun 23 22:06:05 2014 +0200
+
+ Initialize whole buffer in GPRS Mobility and Session Management dissector
+
+ Bug: 10216
+ Change-Id: I572a7a6ce0f816063f02397b667dd46c990cf73e
+ Reviewed-on: https://code.wireshark.org/review/2583
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit dd7134d907350ccc574cdec596f4162860912bb9)
+ Reviewed-on: https://code.wireshark.org/review/2584
+
+commit d24be5b
+Author: Michal Labedzki <michal.labedzki@tieto.com>
+Date: Wed Jun 18 17:10:09 2014 +0200
+
+ Bluetooth: A2DP: Fix fuzz failture
+
+ Fix invalid structure casting by using defaults values,
+ this also fix DecodeAs for A2DP.
+
+ Do the same for VDP.
+
+ Change-Id: I360787af648ed65205eb54732ab6d88f8532cf15
+ Reviewed-on: https://code.wireshark.org/review/2551
+ Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com>
+ (cherry picked from commit 10fc6e253195dced1c00d59e4fbe3d020ecb739d)
+ Reviewed-on: https://code.wireshark.org/review/2565
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit a3e3db5
+Author: Evan Huus <eapache@gmail.com>
+Date: Sun Jun 22 16:53:35 2014 -0400
+
+ Initialize whole buffer in GTP dissector
+
+ Bug:10216
+ Change-Id: Ib7de616d50937eb43b16daa4067ee0de9edc8ec7
+ Reviewed-on: https://code.wireshark.org/review/2562
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 3fc441e7a5008640c68ec985e669d5092414a519)
+ Reviewed-on: https://code.wireshark.org/review/2563
+
+commit 91a375f
+Author: Evan Huus <eapache@gmail.com>
+Date: Sun Jun 22 15:33:06 2014 -0400
+
+ Fix leak in nbap init function
+
+ Change-Id: I9a70d4da936ad5fd847fc1ba0b29b7220030b977
+ Reviewed-on: https://code.wireshark.org/review/2558
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit ce99d8a205071eaa5f3de69f281a272861294a57)
+ Reviewed-on: https://code.wireshark.org/review/2561
+
+commit 3775ebd
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jun 22 08:06:55 2014 -0700
+
+ [Automatic manuf, services and enterprise-numbers update for 2014-06-22]
+
+ Change-Id: Iba4a0dbae673d14232a1c8d2f6f9e48e291f739c
+ Reviewed-on: https://code.wireshark.org/review/2544
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit f5ea0d2
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri Jun 20 20:43:48 2014 +0200
+
+ TCP: update the list of options and put Kind and Length items in the right subtree
+
+ Bug: 10211
+ Change-Id: Ide37f2a2b33f0d6d7cdff897eed02a8c1ea24f7d
+ Reviewed-on: https://code.wireshark.org/review/2488
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 6808afd0172cc1507f19ef1533f500fac4b0dce2)
+ Reviewed-on: https://code.wireshark.org/review/2490
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit 6a369cf
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Fri Jun 20 18:50:00 2014 +0200
+
+ Revert part of svn revision 52045 (git b38ee917)
+
+ This fix does change the format printed for values using bitmasks
+ (because the bit values are printed first) and is not always wanted
+ in this dissectors (because of readability).
+
+ We should have a better way of doing what I want in this dissectors,
+ so I'll have a look at this later.
+
+ Change-Id: I2477aa6b1d0c42a7ad5848bba3cb74dce3bba1f0
+ Reviewed-on: https://code.wireshark.org/review/2485
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ (cherry picked from commit 2ab2921c7d146ae453770e14ea3a4a11f2bdc2fd)
+ Reviewed-on: https://code.wireshark.org/review/2486
+
+commit b1da509
+Author: dameiss <netshark@ameissnet.com>
+Date: Thu Jun 19 18:08:39 2014 -0400
+
+ Add GTK modules for existing LBM dissectors.
+
+ Mainly cherry-picked from commit 46a808acf4e8c87b61169bfac00799857b38f1f0, but there were a few minor issues that were merged into this single commit.
+
+ bug: 10204
+ Change-Id: Ie21cc07b0ac9a56648ec72062ce58a1ac800318e
+ Reviewed-on: https://code.wireshark.org/review/2427
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit 224ab2d
+Author: Evan Huus <eapache@gmail.com>
+Date: Thu Jun 19 23:05:53 2014 -0700
+
+ Don't hide tcp option kind/len fields
+
+ Hidden fields are deprecated, and we were hiding them inconsistently anyways.
+
+ Bug:10211
+ Change-Id: Iaf1576ae7bc04c0c0bd896c096b117f1b8af2e9e
+ Reviewed-on: https://code.wireshark.org/review/2474
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 80c070fb517a8c153278d936f0143e283adc01fb)
+ Reviewed-on: https://code.wireshark.org/review/2475
+
+commit 4a5b04b
+Author: Jeff Morriss <jeff.morriss.ws@gmail.com>
+Date: Thu Jun 19 17:42:37 2014 -0400
+
+ Don't crash when closing the Summary window if the file has been closed.
+
+ Yes, this is a Gtk-UI fix but it's a one-liner and easy enough.
+ Fixes https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8715
+
+ Bug: 8715
+ Change-Id: I554b6c953e83ff3d8cb57029e844f2f481b751dd
+ Reviewed-on: https://code.wireshark.org/review/2460
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ (cherry picked from commit a32dbae525386fbf2ed14d5d5b982f666ac42219)
+ Reviewed-on: https://code.wireshark.org/review/2463
+
+commit b1c025a
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Thu Jun 19 23:16:56 2014 +0200
+
+ Update User Guide for upcoming 1.12.0 release
+
+ Change-Id: I01dace804dc011c096753e413c27615c0661edbe
+ Reviewed-on: https://code.wireshark.org/review/2457
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit bc075ae
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Thu Jun 19 21:40:20 2014 +0200
+
+ Kerberos: fix dissection of packets when Record Mark is present
+
+ Bug: 10200
+ Change-Id: Ied8db64120131c029e276d66aeff8b81a45a7286
+ Reviewed-on: https://code.wireshark.org/review/2447
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 0a3b1d8beb22745d6c9a04297f4056770016299e)
+ Reviewed-on: https://code.wireshark.org/review/2454
+
+commit 7ea0d6c
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Thu Jun 19 21:13:17 2014 +0200
+
+ Long and short names are inverted
+
+ Change-Id: Ief3c86562d5eadb845b5a32dc704a61ccd27fdf6
+ Reviewed-on: https://code.wireshark.org/review/2443
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit e1c0674564ee39ebf7bc74d6c70e9a78a92dbe7d)
+ Reviewed-on: https://code.wireshark.org/review/2444
+
+commit 1dfe213
+Author: Evan Huus <evan.huus@jadedpixel.com>
+Date: Thu Jun 19 19:06:59 2014 +0000
+
+ Fix underflow causing infinite loop in openflow dissector
+
+ Bug:10208
+ Change-Id: I8aff9523fd33cf9e0802153100ea032139966b26
+ Reviewed-on: https://code.wireshark.org/review/2440
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 592c3673c63561c5126885933e64d734e0572769)
+ Reviewed-on: https://code.wireshark.org/review/2441
+
+commit 7e92d04
+Author: Roland Knall <roland.knall@br-automation.com>
+Date: Tue May 27 13:50:00 2014 +0200
+
+ EPL: Reassemble the splitted payload
+
+ The data that is sent when downloading or uploading from a server is
+ sent in segments to the client.To clearly display all the segments
+ belonging together the splitted payload needs to be reassembled.
+
+ The behaviour is described in the powerlink specification 301 v1.2.0
+ chapter 6.3.2.4.1.1 Download Protocol and chapter 6.3.2.4.2 Upload
+ Protocol. The payload of the download/upload is now reassembled.
+
+ Backport - This is an enhancement over the current dissector in a way, that the former segmented payload can be debugged better.
+
+ Signed-off-by: Lukas Emersberger <lukas.emersberger@gmail.com>
+ Change-Id: I17c30f15e75da47bcaba8f1fda1e412849ec268c
+ Reviewed-on: https://code.wireshark.org/review/1120
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit f0cf649b3265c915e4e11aeac5ecd76ada03c46c)
+ Reviewed-on: https://code.wireshark.org/review/2337
+ Reviewed-by: Roland Knall <rknall@gmail.com>
+
+commit 701b6ad
+Author: Balint Reczey <balint@balintreczey.hu>
+Date: Wed Jun 18 12:07:20 2014 -0700
+
+ Generate xz compressed archives instead of .bz2-s
+
+ Change-Id: Iad47516ae617f5ecac5b03f2d7e800208c499d4a
+ Reviewed-on: https://code.wireshark.org/review/2403
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit 5a6366c9b56990eb7f4af17bf628ad80fc354ece)
+ Reviewed-on: https://code.wireshark.org/review/2426
+ Reviewed-by: Balint Reczey <balint@balintreczey.hu>
+ Tested-by: Balint Reczey <balint@balintreczey.hu>
+
+commit 32f4bee
+Author: Balint Reczey <balint@balintreczey.hu>
+Date: Wed Jun 18 11:43:08 2014 -0700
+
+ Add simple script to export release tarball right from Git
+
+ The files not to be present in the release tarballs are filetered based
+ on the contents of the .gitattributes files
+
+ Change-Id: If12eb00cf174f5d5b6dfffd56685b078a4593bf8
+ Reviewed-on: https://code.wireshark.org/review/2402
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit 85499fbbc682c36482e2053e66a642f5d581d356)
+ Reviewed-on: https://code.wireshark.org/review/2425
+ Reviewed-by: Balint Reczey <balint@balintreczey.hu>
+ Tested-by: Balint Reczey <balint@balintreczey.hu>
+
+commit d4f9805
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Thu Jun 19 02:42:47 2014 +0200
+
+ Add the ability to dynamically add a new protocol to export PDU dialog box
+
+ Change-Id: I83012cc963d514982e40010e837e11a6fcf1bc3e
+ Reviewed-on: https://code.wireshark.org/review/2423
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit bcff3c57cc42acdda9eb9bc6f556dcbcb069e51f)
+ Reviewed-on: https://code.wireshark.org/review/2424
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit 3d23e94
+Author: Joerg Mayer <jmayer@loplof.de>
+Date: Wed Jun 18 22:57:15 2014 +0200
+
+ Rename the filtername to initial_rtt
+
+ Change-Id: I64af535dc07eb4310b212077bb4c52032e97ecdb
+ Reviewed-on: https://code.wireshark.org/review/2413
+ Reviewed-by: Jörg Mayer <jmayer@loplof.de>
+ (cherry picked from commit 13597c936393545abad95ab15aa8d8944a6c7f04)
+ Reviewed-on: https://code.wireshark.org/review/2421
+
+commit 7d72f26
+Author: Joerg Mayer <jmayer@loplof.de>
+Date: Wed Jun 18 21:57:47 2014 +0200
+
+ Rename the Shortname of initial RTT to something short (iRTT)
+
+ Change-Id: I182f2cccae5a385572950f08fa0a6005dcf59ff1
+ Reviewed-on: https://code.wireshark.org/review/2409
+ Reviewed-by: Jörg Mayer <jmayer@loplof.de>
+ (cherry picked from commit 461c6a0984236100177aa689e89e5e18fe7f360a)
+ Reviewed-on: https://code.wireshark.org/review/2419
+
+commit c52c909
+Author: Joerg Mayer <jmayer@loplof.de>
+Date: Wed Jun 18 19:46:27 2014 +0200
+
+ Get rid of some ancient qualityreview comments...
+
+ Change-Id: If25bdd594b20b656c345dcfe62765379f5dd9c5e
+ Reviewed-on: https://code.wireshark.org/review/2392
+ Reviewed-by: Jörg Mayer <jmayer@loplof.de>
+ (cherry picked from commit c6324a0b1ea6478a5f2c24b41cb26d0b02014536)
+ Reviewed-on: https://code.wireshark.org/review/2418
+
+commit 8a104e0
+Author: Evan Huus <eapache@gmail.com>
+Date: Tue Jun 17 23:12:58 2014 -0700
+
+ Try to calculate the initial RTT of tcp conns
+
+ This (if it works well) will let us do much more accurate out-of-order
+ detection, which is currently otherwise hardcoded to 3ms. Ask Jörg for details.
+
+ Change-Id: Ie0662723946edeaea1e43958bf7f5158f09dde71
+ Reviewed-on: https://code.wireshark.org/review/2367
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit b5a462b087bdd7670e1a69786ebbe3f073084ac3)
+ Reviewed-on: https://code.wireshark.org/review/2417
+ Reviewed-by: Jörg Mayer <jmayer@loplof.de>
+
+commit 4a4b267
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Jun 18 13:54:33 2014 -0700
+
+ Get the handle for the pw_hdlc_nocw_hdlc_ppp dissector.
+
+ Change-Id: If7bc620c19e9c6511a724847e38cf0776d26b444
+ Reviewed-on: https://code.wireshark.org/review/2410
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 6da6bf77b3da928aa6fc9ae9d6b67ecfd77d25e1)
+ Reviewed-on: https://code.wireshark.org/review/2411
+
+commit d6f4b75
+Author: Shoichi Sakane <wireshark-shoichi@tanu.org>
+Date: Wed Jun 18 10:40:19 2014 -0700
+
+ Fix copy-paste probem in COAP dissector
+
+ Bug:8070
+ Change-Id: I7a86a37f7de6b3e4e12fe1c47980a9a6604488d6
+ Reviewed-on: https://code.wireshark.org/review/2390
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/2397
+
+commit e042581
+Author: Michal Labedzki <michal.labedzki@tieto.com>
+Date: Wed May 28 17:47:41 2014 +0200
+
+ Guarantee that open routines are initialized
+
+ Open routines need to be initialized before try to open
+ capture or add/remove routine.
+
+ This fixes crash in mergecap reported as Debian bug #751872.
+
+ Change-Id: Ic3b88eef947ebd4a3dd2edf8120bb6bd8aec0765
+ Reviewed-on: https://code.wireshark.org/review/1874
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit c6d175ef67a091bdf024c11469a22b59f64f2345)
+ Reviewed-on: https://code.wireshark.org/review/2391
+ Reviewed-by: Balint Reczey <balint@balintreczey.hu>
+ Tested-by: Balint Reczey <balint@balintreczey.hu>
+
+commit 2f8a254
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Wed Jun 18 08:14:27 2014 +0200
+
+ PDCP LTE: do not try to decipher PDCP control messages (like ROHC feedback)
+
+ Change-Id: I4a1596fd45bbc78ed8e90accf69ac048e7053161
+ Reviewed-on: https://code.wireshark.org/review/2366
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 666127f5f9768d33095152047234ae2ebfcea9f5)
+ Reviewed-on: https://code.wireshark.org/review/2368
+
+commit 268c965
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jun 17 15:05:43 2014 -0700
+
+ When building an OS X package for GTK+, put the libraries in lib.
+
+ This reverts to the way we did it prior to the switch to Qt; with GTK+,
+ Contents/MacOS/Wireshark is just a launcher, and the Wireshark binary is
+ in Contents/Resources/bin/wireshark-bin, and the appropriate rpath entry
+ would be @executable_path/../lib - @executable_path/../Frameworks, which
+ works for the Qt version, in which Contents/MacOS/Wireshark is the
+ actual executable, doesn't work for the GTK+ version.
+
+ This should fix bug 10185.
+
+ Change-Id: I4e50a4ead8f29a742c97a9001c821aabe1fa5e65
+ Reviewed-on: https://code.wireshark.org/review/2347
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 93b5a313ada6684c7706da7a578f7787344d6144)
+ Reviewed-on: https://code.wireshark.org/review/2348
+
+commit 2c877e0
+Author: Evan Huus <evan.huus@jadedpixel.com>
+Date: Tue Jun 17 21:43:49 2014 +0000
+
+ Set the rlc len field before we try to use it in an expert info.
+
+ Bug:9795
+ Change-Id: I740a9fe36278995cf6e590206f600c037789f0eb
+ Reviewed-on: https://code.wireshark.org/review/2344
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit ba6eb5c72ffe82ca0e51c7083240975a5b118ad2)
+ Reviewed-on: https://code.wireshark.org/review/2345
+
+commit c9f2311
+Author: Evan Huus <evan.huus@jadedpixel.com>
+Date: Tue Jun 17 21:25:14 2014 +0000
+
+ Initialize smb ioctl_function struct member
+
+ Bug:10020
+ Change-Id: I415a29dd36697887cb06485d6ed3a2b799a93464
+ Reviewed-on: https://code.wireshark.org/review/2342
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit f4b9ea4362cd1ffdf5315a3f1311c8418a91579d)
+ Reviewed-on: https://code.wireshark.org/review/2343
+
+commit 35e920c
+Author: Evan Huus <evan.huus@jadedpixel.com>
+Date: Tue Jun 17 18:26:01 2014 +0000
+
+ Initialize rq_hdr.session
+
+ Bug:10168
+ Change-Id: Ida4d82d102421152785ce680aa47bcb5cf8692f6
+ Reviewed-on: https://code.wireshark.org/review/2334
+ Reviewed-by: Dmitry Bazhenov <dima_b@pigeonpoint.com>
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 417938310ad78de5f41f1f4108e62b50ed5b4dfa)
+ Reviewed-on: https://code.wireshark.org/review/2341
+
+commit d2b6365
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Thu Jun 12 17:36:32 2014 +0200
+
+ Create and register subtree identifiers for all opcua array types
+
+ Currently for all arrays, the generic ett_opcua_array is used, instead we want to be more selective for storing the expanded state of subtrees. This commit adds subtree identifiers for all array types.
+
+ Change-Id: Idcec51a200d1109cdb557d3366021d3b066b453d
+ Reviewed-on: https://code.wireshark.org/review/2176
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 7067e3a34006cc15b5d050e9dd564ced0cb1bd9b)
+ Reviewed-on: https://code.wireshark.org/review/2314
+
+commit 8e5241a
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Thu Jun 12 16:54:25 2014 +0200
+
+ Unify how opcua arrays are displayed
+
+ - Display 'Array of <fieldname>' instead of 'Array of Simple Type'
+ - Display array indexes for simple types
+ - Display data type in simple type arrays
+
+ Change-Id: Id2cc746898f97ce329c6afb9cc49f1907a9f18e4
+ Reviewed-on: https://code.wireshark.org/review/2161
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 647255d6279fe6fea6ad43388a52e55afd5549e0)
+ Reviewed-on: https://code.wireshark.org/review/2313
+
+commit f8fcb34
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Thu Jun 12 16:49:40 2014 +0200
+
+ Add dissect_nt_64bit_time_ex for retrieving the created proto_item
+
+ Using dissect_nt_64bit_time it is not possible to access the created proto_item afterwards, hence the new function.
+
+ Change-Id: I39aca92536a53841045c30b601b6ec1a7d8bfb4e
+ Reviewed-on: https://code.wireshark.org/review/2160
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 9991f43f273878021b41a9ba7fddb375bdfbab21)
+ Reviewed-on: https://code.wireshark.org/review/2311
+
+commit be6ef28
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 17 13:40:29 2014 +0200
+
+ Add myself as author for the opcua dissector plugin
+
+ Change-Id: If8349e778fd91426a6a4b6d6e98d3ab870d188d5
+ Reviewed-on: https://code.wireshark.org/review/2302
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 91c29ec2057c7e25a61da92f6bdbc32efa856525)
+ Reviewed-on: https://code.wireshark.org/review/2312
+
+commit c0b5d6f
+Author: Lukas Emersberger <lukas.emersberger@br-automation.co.at>
+Date: Thu Mar 20 06:56:49 2014 +0100
+
+ EPL: Duplicated frames
+
+ The MN interprets the CMD layer data only if the CN increments
+ the Send-Sequence-Counter => new data. The MN interprets the
+ data only once, if the same frame is sent again the MN ignores
+ the data.
+
+ The behaviour is described in the powerlink specification 301 v1.2.0
+ chapter 6.3.2.3.2.3 Error: Duplication of Frame
+ Frames which duplicate previous sent data are now marked as
+ duplicated frames.
+
+ Signed-off-by: Lukas Emersberger <lukas.emersberger@gmail.com>
+ Change-Id: I9ef24b52712bfd3c735856b0cd5747c47aeef72a
+ Reviewed-on: https://code.wireshark.org/review/992
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 75531b6a40719c9cac603f699f0cdf72159fd518)
+ Change-Id: I9ef24b52712bfd3c735856b0cd5747c47aeef72a
+ Reviewed-on: https://code.wireshark.org/review/2317
+ Reviewed-by: Roland Knall <rknall@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 1230627
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Tue Jun 3 17:16:18 2014 +0200
+
+ simplify PCR calculation
+
+ Change-Id: I892088e158519e331cba89be3c8d7c71f38a8925
+ Reviewed-on: https://code.wireshark.org/review/1964
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 653dd75483a68ca8793ccdb482668cad7dcf950e)
+ Reviewed-on: https://code.wireshark.org/review/2333
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+
+commit e8dd396
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Mon Jun 2 23:20:05 2014 +0200
+
+ make the PCR value filterable
+
+ this fixes bug #10158
+
+ Change-Id: Ic67b074c464c52ac523e835b9815a5c3a3fa14d9
+ Reviewed-on: https://code.wireshark.org/review/1925
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit cd4ba3d271fc62eca89114703b0955f9f34978d5)
+ Reviewed-on: https://code.wireshark.org/review/2332
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+
+commit 9107e5c
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Sat May 31 15:30:14 2014 +0200
+
+ do a plausibility check for interaction channel data
+ in the linkage descriptor
+
+ Change-Id: I7ebca539076b2b881e82fd6baec5bb223e778a52
+ Reviewed-on: https://code.wireshark.org/review/1896
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 3ec1ec1caf3029f47dc362077af421662c86ae85)
+ Reviewed-on: https://code.wireshark.org/review/2331
+
+commit d8f30a8
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Sat May 31 11:00:30 2014 +0200
+
+ make population id filterable
+
+ Change-Id: I3381e1c35795ac33331cdddb8cefa8b0a16907cc
+ Reviewed-on: https://code.wireshark.org/review/1894
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 877f38b46d0380d9804bbac805e6f02ffc95423a)
+ Reviewed-on: https://code.wireshark.org/review/2330
+
+commit 70261f4
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri May 30 19:20:11 2014 +0200
+
+ make terrestrial centre frequency filterable
+
+ Change-Id: I007ff5215f52f80f25622cab6980128eabd39c5f
+ Reviewed-on: https://code.wireshark.org/review/1888
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 419ea28960b54ceade6216b4b9b302b6d4de1e70)
+ Reviewed-on: https://code.wireshark.org/review/2329
+
+commit d0156c4
+Author: Evan Huus <evan.huus@jadedpixel.com>
+Date: Tue Jun 17 18:13:51 2014 +0000
+
+ fix underflow in BER constrained bitstrings
+
+ this can happen and cause invalid memory accesses with incorrectly-large padding
+ values
+
+ Bug:10187
+ Change-Id: Ib9b2a2fa10766efb4d95d588f57354a56373c626
+ Reviewed-on: https://code.wireshark.org/review/2327
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+
+commit fd2566c
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri May 30 18:28:36 2014 +0200
+
+ make next time offset filterable
+
+ Change-Id: I18c2b7992b237eaaacbec04d504fc293b03558a3
+ Reviewed-on: https://code.wireshark.org/review/1887
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit bc3ab61ddacab2ec6072c2709af3df405e18dfc3)
+ Reviewed-on: https://code.wireshark.org/review/2326
+
+commit 67e6170
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri May 30 18:17:17 2014 +0200
+
+ make local time offset filterable
+
+ Change-Id: Icccc07706287df4b6a7481108f9921b939aae2d5
+ Reviewed-on: https://code.wireshark.org/review/1886
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 9f0419d376d25d738539bac2b55197abe226a6ce)
+ Reviewed-on: https://code.wireshark.org/review/2324
+
+commit a3ff1c1
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri May 30 09:59:05 2014 +0200
+
+ avoid proto_tree_add_uint_format() when we just want the default
+ description
+
+ Change-Id: Ice06e257a72f3b4ce1229ff90129628f0e3bbcfb
+ Reviewed-on: https://code.wireshark.org/review/1873
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 8515bd7633412342f579ad2d51573052c37a0b57)
+ Reviewed-on: https://code.wireshark.org/review/2323
+
+commit 0937cce
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Thu May 29 17:56:17 2014 +0200
+
+ convert cable freq, symbol rate into doubles
+
+ Change-Id: Iaddd3c4847e803af855c847212ae822b2529ff06
+ Reviewed-on: https://code.wireshark.org/review/1860
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 7aecd47be71f300e654c277104855a341b3f48c3)
+ Reviewed-on: https://code.wireshark.org/review/2322
+
+commit 8ce3af7
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Thu May 29 17:51:37 2014 +0200
+
+ conver sat freq and symbol rate into doubles in order to make the
+ filtering work, fix typos
+
+ Change-Id: I7ed989807826d1322dab00d13d998488caaf73ff
+ Reviewed-on: https://code.wireshark.org/review/1859
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 91dac2771b9374c61d0d2b45ef08202cb404e59a)
+ Reviewed-on: https://code.wireshark.org/review/2321
+
+commit 33caf46
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri Mar 14 10:14:14 2014 +0100
+
+ dissect more components of the track header box
+
+ Change-Id: If8d35122ce096f52837bdff1c6599b47456697d5
+ Reviewed-on: https://code.wireshark.org/review/1858
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 254e227266a37eddd887ba5721a72b9dcf8a900b)
+ Reviewed-on: https://code.wireshark.org/review/2320
+
+commit 04792d5
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Tue May 27 23:37:31 2014 +0200
+
+ use proto_tree_add_float_format_value() correctly
+
+ Change-Id: I927a2f32aa0016b5b0c476fa4c16fc1dbe0aebb0
+ Reviewed-on: https://code.wireshark.org/review/1825
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit b4fb165ef30d246d1fda03eab597e1f4060ec563)
+ Reviewed-on: https://code.wireshark.org/review/2319
+
+commit d34c0d0
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Tue May 27 23:36:32 2014 +0200
+
+ make cable symbol rate filterable
+
+ Change-Id: I034b351d4bc12f6c00a0224a5c5b9f85496657b6
+ Reviewed-on: https://code.wireshark.org/review/1824
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit b3008f31ec72f4476df261e37784214565057e2f)
+ Reviewed-on: https://code.wireshark.org/review/2318
+
+commit 3c1f13c
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri May 23 18:40:15 2014 +0200
+
+ make cable frequency filterable
+
+ Change-Id: I8464fb8e98e485523127dd95948a717554b6aee4
+ Reviewed-on: https://code.wireshark.org/review/1823
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 9c98f9fdbd07815c7c22d1ebac347d59c6f5f57c)
+ Reviewed-on: https://code.wireshark.org/review/2316
+
+commit e9c3905
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri May 23 18:23:59 2014 +0200
+
+ make the satellite symbol rate filterable
+
+ Change-Id: I301d0804e097c62cd8bf7b27003918eedab9616a
+ Reviewed-on: https://code.wireshark.org/review/1816
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 0911ce12ff3304eb7a745a409fc3a1eb6797e0d5)
+ Reviewed-on: https://code.wireshark.org/review/2315
+
+commit b8cb7d3
+Author: Alex Badea <abadea@ixiacom.com>
+Date: Tue Jun 17 13:12:34 2014 +0300
+
+ isakmp: add support for IKEv1 AES decryption
+
+ Select an appropriate gcrypt cipher based on ISAKMP encryption ID and
+ key length attribute. Fixes bug 10128.
+
+ Bug:10128
+ Change-Id: Ie74fc51eb9bfe6d68340056d3ef2ef28c7677fb8
+ Signed-off-by: Alex Badea <abadea@ixiacom.com>
+ Reviewed-on: https://code.wireshark.org/review/2296
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit d1cdbd715a5c5e9395d9672394783061dd3a4bf2)
+ Reviewed-on: https://code.wireshark.org/review/2309
+
+commit 225aeef
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Fri May 23 18:16:40 2014 +0200
+
+ make satellite orbital position filterable
+
+ Change-Id: Ibd4edd30eca969699fea1971e1885299e4d3e552
+ Reviewed-on: https://code.wireshark.org/review/1813
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Martin Kaiser <wireshark@kaiser.cx>
+ (cherry picked from commit 75272241a10c23543fce1e14d7a59b1e0161ee6d)
+ Reviewed-on: https://code.wireshark.org/review/2310
+
+commit 1d87b4d
+Author: Alex Badea <abadea@ixiacom.com>
+Date: Mon Jun 16 18:55:45 2014 +0300
+
+ isakmp: support decryption for SHA-2 hash algorithms
+
+ Simply map ISAKMP hash IDs for sha256, sha384 and sha512 to gcrypt MDs.
+ Fixes bug 10181.
+
+ Change-Id: I9c8265bf3c5c8f8d2fd6d251cc0f267964e3be8e
+ Signed-off-by: Alex Badea <abadea@ixiacom.com>
+ Reviewed-on: https://code.wireshark.org/review/2250
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit faac494d989951d0995da00ea31e5b66511ae0d0)
+ Reviewed-on: https://code.wireshark.org/review/2308
+
+commit c6736f0
+Author: Alex Badea <abadea@ixiacom.com>
+Date: Tue Jun 17 13:55:06 2014 +0300
+
+ isakmp: allow IKEv1 decryption with non-PSK authentication
+
+ There is a check that disables decryption for non-PSK authentication. It
+ has been around ever since its introduction in commit acfe071e (svn
+ r17229). As suggested in bug 7951, remove this check to allow decryption
+ for e.g. certificates authentication.
+
+ Bug: 7951
+ Change-Id: I5e98407d0f8dbabac2cdaf632cf0af403192872b
+ Signed-off-by: Alex Badea <abadea@ixiacom.com>
+ Reviewed-on: https://code.wireshark.org/review/2297
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit f9b05dc13213832dba10600bd0116505ed251fec)
+ Reviewed-on: https://code.wireshark.org/review/2305
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+
+commit c41b64b
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Thu Jun 12 12:22:35 2014 +0200
+
+ Cleanup subtree types in opcua plugin
+
+ - make ett_opcua_transport static, is only used locally
+ - format code grouping extern ett variables
+ - add subtree variables for encodingmasks of simple types
+
+ Change-Id: Ia044ca6ca0ff19e940a03d21610db67fe3679b01
+ Reviewed-on: https://code.wireshark.org/review/2157
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 2f369b216fc18624a2e8b2c6bc1da80f964e54d7)
+ Reviewed-on: https://code.wireshark.org/review/2295
+
+commit 7eb1aec
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Thu Jun 12 10:11:06 2014 +0200
+
+ Display status code info bits if set
+
+ Checks if a StatusCode has any of the additional info bits set and displays them accordingly.
+
+ Change-Id: Ic584233083174d3fd30c6ec6684f308e0e5ae22e
+ Reviewed-on: https://code.wireshark.org/review/2127
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit 0bb0b62ec8580ab48c1e8c3eaa82b9fa255d7a4e)
+ Reviewed-on: https://code.wireshark.org/review/2294
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit f399a63
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 13:36:06 2014 +0200
+
+ Display text representation of status codes
+
+ Adds a table containing all known StatusCodes and displays them if found.
+ The list of StatusCodes is in a separate file for easy generating of the list if necessary.
+
+ Change-Id: Iab74b22b7fc4fb53d8f072c4e3a4cea4ae18196c
+ Reviewed-on: https://code.wireshark.org/review/2126
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit a9b18eff0fe904c87c38262148b39718f6e3cea5)
+ Reviewed-on: https://code.wireshark.org/review/2293
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit da96994
+Author: AndersBroman <anders.broman@ericsson.com>
+Date: Wed Jun 11 16:25:06 2014 +0200
+
+ opcua_simpletypes.c:94:12: error: static declaration of 'hf_opcua_NamespaceUri' follows non-static declaration
+
+ Change-Id: I2cae9691408c22a64144f5482cc536a5dc88ec6c
+ Reviewed-on: https://code.wireshark.org/review/2135
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 803d47d49ecfb37cc649911443edf6f1290fec90)
+ Reviewed-on: https://code.wireshark.org/review/2175
+
+commit eaeb03b
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 18:05:46 2014 +0200
+
+ Remove unused array length fields
+
+ The NoOf... fields are not used at all in the dissector.
+
+ Change-Id: I1f20a9992eab5d47c7e0ad34dabeaed07efa4a80
+ Reviewed-on: https://code.wireshark.org/review/2130
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 5e67c45160c6c69e6a22034607bbef9a89a14c8b)
+ Reviewed-on: https://code.wireshark.org/review/2174
+
+commit 35c980f
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 18:01:27 2014 +0200
+
+ Regenerate all sources using latest OPC UA specification
+
+ - HistoryUpdateEventResult has been removed
+ - Fixes two enums
+ - Removes unused identifier defines
+
+ Change-Id: I39c65c1eca1701b60dfaa3541cd7a5d1b479fb9b
+ Reviewed-on: https://code.wireshark.org/review/2129
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit abf1b5ead7f58ff6cd204c3727bed30eebe75e4e)
+ Reviewed-on: https://code.wireshark.org/review/2173
+
+commit 547f731
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 13:09:24 2014 +0200
+
+ Improve display of Open/CloseSecureChannel requests and responses
+
+ - Return the ServiceId of the service calls for displaying if it's a request or response
+ - Add the missing parsing code for CloseSecureChannel, some fields were missing
+
+ Change-Id: Id9b1e1986e222a77ad979fb615adc6ac62a4ced8
+ Reviewed-on: https://code.wireshark.org/review/2125
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 2ab3b2ac2b6300fd10df046e2d75acf6328ac332)
+ Reviewed-on: https://code.wireshark.org/review/2172
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 95cc25a
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 12:27:34 2014 +0200
+
+ Move ServiceFault from ComplexType- to ServiceParser
+
+ ServiceFaults are always sent as a service response and never as value, this moves the parsing code to the correct location.
+
+ Change-Id: Ida9cb561aa40fcbfc3c0429aed732d108b295138
+ Reviewed-on: https://code.wireshark.org/review/2124
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit baa58887886c6bbe24f2894e40a4c0e1bccd5314)
+ Reviewed-on: https://code.wireshark.org/review/2171
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 3e1eaed
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 11:47:07 2014 +0200
+
+ Unify displaying of NodeId
+
+ Adds hf_register_info for all possible NodeId identifier types for unified displaying.
+
+ Change-Id: Ic7a8077a32f435d5acfb1a956117d21a0b51b43b
+ Reviewed-on: https://code.wireshark.org/review/2123
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit fabee432def958af4a102eca6bfe935ec80836f6)
+ Reviewed-on: https://code.wireshark.org/review/2170
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit ee3f0a9
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 11:46:05 2014 +0200
+
+ Fix NodeId and ExpandedNodeId encoding mask display
+
+ There are no 'URI' NodeIds, removed this option and changed GUID/Opaque to their correct values as stated in the UA specification.
+
+ Change-Id: Ibf9afdbd72f8ad336f5eb83ece5adbcce51e8365
+ Reviewed-on: https://code.wireshark.org/review/2122
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit e2ae387d9c9d2d38d1da788f39b8e65a22fff8dd)
+ Reviewed-on: https://code.wireshark.org/review/2169
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit a95d0f1
+Author: Hannes Mezger <hannes.mezger@ascolab.com>
+Date: Tue Jun 10 11:25:30 2014 +0200
+
+ Unify variable and identifier names according to the UA specification
+
+ - Rename Uri to NamespaceUri for clarity
+ - Correct NsId to NsIndex
+ - ByteString NodeIds are called 'Opaque'
+
+ Change-Id: I622d408ef9e19a2a899906b4127bae497735d402
+ Reviewed-on: https://code.wireshark.org/review/2121
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit ddc275c562805757d5d971ccc31ef47dbc6df4bc)
+ Reviewed-on: https://code.wireshark.org/review/2168
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit fb0266f
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Mon Jun 16 22:15:55 2014 +0200
+
+ Do not handle P_Mul packet as ASCII string when calculating checksum.
+
+ This bug was introduced when rewriting tvb_get_string() to
+ handle encoding (and thus handling ASCII string different).
+
+ Change-Id: Ic107d7b9e2f63aea33fdf55b9c20c22202f7b458
+ Reviewed-on: https://code.wireshark.org/review/2270
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+
+commit b27bf15
+Author: Yan Burman <yanb@mellanox.com>
+Date: Mon Jun 16 11:54:24 2014 +0300
+
+ Fix SDP dissector crash during fuzz testing
+
+ Change-Id: Ic133dd9440feb61964d197fa0aaacd86241f229d
+ Signed-off-by: Yan Burman <yanb@mellanox.com>
+ Reviewed-on: https://code.wireshark.org/review/2248
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 0a29589c01b5aa9ec32c6624e90b32f546090c12)
+ Change-Id: Ic133dd9440feb61964d197fa0aaacd86241f229d
+ Reviewed-on: https://code.wireshark.org/review/2249
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 0406c06
+Author: Balint Reczey <balint@balintreczey.hu>
+Date: Wed Jun 11 16:52:56 2014 +0200
+
+ Depend on docbook-xml and drop obsoleted 0005-...patch
+
+ Change-Id: I4c849a1e8205b65ba05959213967bac5f378c96c
+ Reviewed-on: https://code.wireshark.org/review/2137
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Reviewed-by: Balint Reczey <balint@balintreczey.hu>
+ Tested-by: Balint Reczey <balint@balintreczey.hu>
+ (cherry picked from commit 14903d65c340b89a8b5fbbe80f8d40fd8a290719)
+ Reviewed-on: https://code.wireshark.org/review/2235
+
+commit f386b83
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jun 15 08:07:03 2014 -0700
+
+ [Automatic manuf, services and enterprise-numbers update for 2014-06-15]
+
+ Change-Id: I6da50d3a45673190991c635a7774f5c396d49047
+ Reviewed-on: https://code.wireshark.org/review/2228
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 697c069
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Jun 13 15:42:41 2014 -0700
+
+ Prep for 1.12.0-rc3.
+
+ Change-Id: I62edfc9df0d1b14b717624f29845977f238e44e3
+ Reviewed-on: https://code.wireshark.org/review/2203
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit fd017ee
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Jun 13 12:51:29 2014 -0700
+
+ Fix package version stamping.
+
+ Change-Id: I1615364071563c4f56b071d7d68e4660dd989296
+ Reviewed-on: https://code.wireshark.org/review/2198
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 3b9e39f
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Jun 13 12:06:43 2014 -0700
+
+ Prep for 1.12.0-rc2.
+
+ Change-Id: I6fc1db5adcee0ab762b2afcb761232544dab57e3
+ Reviewed-on: https://code.wireshark.org/review/2197
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
commit 4911f85
Author: Gerald Combs <gerald@wireshark.org>
Date: Fri Jun 13 11:34:49 2014 -0700