From 940c758ef66fcfc9a7a225d1c4cb896a9212a434 Mon Sep 17 00:00:00 2001 From: Guy Harris Date: Sun, 12 Feb 2017 19:33:35 -0800 Subject: Further explanation in comments. Change-Id: If88220dc39b2a6baeeefc244639992271b7f0464 Reviewed-on: https://code.wireshark.org/review/20086 Reviewed-by: Guy Harris --- tshark.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) (limited to 'tshark.c') diff --git a/tshark.c b/tshark.c index 242067be8d..ff803f1773 100644 --- a/tshark.c +++ b/tshark.c @@ -2919,7 +2919,9 @@ process_packet_second_pass(capture_file *cf, epan_dissect_t *edt, frame_data *fd /* If we're going to print packet information, or we're going to run a read filter, or we're going to process taps, set up to - do a dissection and do so. */ + do a dissection and do so. (This is the second pass of two + passes over the packets; that's the pass where we print + packet information or run taps.) */ if (edt) { if (gbl_resolv_flags.mac_name || gbl_resolv_flags.network_name || gbl_resolv_flags.transport_name) @@ -3555,7 +3557,9 @@ process_packet(capture_file *cf, epan_dissect_t *edt, gint64 offset, struct wtap /* If we're going to print packet information, or we're going to run a read filter, or we're going to process taps, set up to - do a dissection and do so. */ + do a dissection and do so. (This is the one and only pass + over the packets, so, if we'll be printing packet information + or running taps, we'll be doing it here.) */ if (edt) { if (print_packet_info && (gbl_resolv_flags.mac_name || gbl_resolv_flags.network_name || gbl_resolv_flags.transport_name)) -- cgit v1.2.1