diff options
author | Evan Huus <eapache@gmail.com> | 2013-09-21 17:04:41 +0000 |
---|---|---|
committer | Evan Huus <eapache@gmail.com> | 2013-09-21 17:04:41 +0000 |
commit | 6df83e8078aafe6b6dfa03cf1abc33cde0f6612d (patch) | |
tree | e982807717a63c7dcf361f5166edda8156ddebf1 /asn1/c1222 | |
parent | 8abfcaea798bba1c4d1db2092d94d3b6bc3e932f (diff) | |
download | wireshark-6df83e8078aafe6b6dfa03cf1abc33cde0f6612d.tar.gz wireshark-6df83e8078aafe6b6dfa03cf1abc33cde0f6612d.tar.bz2 wireshark-6df83e8078aafe6b6dfa03cf1abc33cde0f6612d.zip |
Add _g_ to the names of functions that allocate glib memory. This is a bit more
explicit, and frees up the "generic" names (like tvb_memdup) for new signatures
that take the appropriate wmem pool.
Majority of the conversion done with sed.
svn path=/trunk/; revision=52164
Diffstat (limited to 'asn1/c1222')
-rw-r--r-- | asn1/c1222/packet-c1222-template.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/asn1/c1222/packet-c1222-template.c b/asn1/c1222/packet-c1222-template.c index e2617f89ff..4e5113cc97 100644 --- a/asn1/c1222/packet-c1222-template.c +++ b/asn1/c1222/packet-c1222-template.c @@ -301,11 +301,11 @@ static uat_t *c1222_uat; #define FILL_START int length, start_offset = offset; #define FILL_TABLE(fieldname) \ length = offset - start_offset; \ - fieldname = (guint8 *)tvb_memdup(tvb, start_offset, length); \ + fieldname = (guint8 *)tvb_g_memdup(tvb, start_offset, length); \ fieldname##_len = length; #define FILL_TABLE_TRUNCATE(fieldname, len) \ length = 1 + 2*(offset - start_offset); \ - fieldname = (guint8 *)tvb_memdup(tvb, start_offset, length); \ + fieldname = (guint8 *)tvb_g_memdup(tvb, start_offset, length); \ fieldname##_len = len; #else /* HAVE_LIBGCRYPT */ #define FILL_TABLE(fieldname) @@ -919,7 +919,7 @@ dissect_epsem(tvbuff_t *tvb, int offset, guint32 len, packet_info *pinfo, proto_ return offset; encrypted = TRUE; if (c1222_decrypt) { - buffer = (guchar *)tvb_memdup(tvb, offset, len2); + buffer = (guchar *)tvb_g_memdup(tvb, offset, len2); if (!decrypt_packet(buffer, len2, TRUE)) { g_free(buffer); crypto_bad = TRUE; @@ -938,7 +938,7 @@ dissect_epsem(tvbuff_t *tvb, int offset, guint32 len, packet_info *pinfo, proto_ len2 = tvb_length_remaining(tvb, offset); if (len2 <= 0) return offset; - buffer = (guchar *)tvb_memdup(tvb, offset, len2); + buffer = (guchar *)tvb_g_memdup(tvb, offset, len2); epsem_buffer = tvb_new_subset_remaining(tvb, offset); if (c1222_decrypt) { if (!decrypt_packet(buffer, len2, FALSE)) { |