diff options
author | Evan Huus <eapache@gmail.com> | 2013-08-22 02:19:22 +0000 |
---|---|---|
committer | Evan Huus <eapache@gmail.com> | 2013-08-22 02:19:22 +0000 |
commit | 216155047003a86076bdbb35640a72f7a9fd2502 (patch) | |
tree | 0ff4421dada9dc9bbd1509be27c895cb476c91ce /tshark.c | |
parent | 8c484c090b756f0c6eda16688d745792b6bb7f44 (diff) | |
download | wireshark-216155047003a86076bdbb35640a72f7a9fd2502.tar.gz wireshark-216155047003a86076bdbb35640a72f7a9fd2502.tar.bz2 wireshark-216155047003a86076bdbb35640a72f7a9fd2502.zip |
Don't look at packet or byte limits during the second pass of two-pass analysis.
The limits are enforced during the first pass, and frames that get dropped from
the first pass for this reason aren't available to the second pass at all, so
checking again is redundant.
svn path=/trunk/; revision=51460
Diffstat (limited to 'tshark.c')
-rw-r--r-- | tshark.c | 12 |
1 files changed, 0 insertions, 12 deletions
@@ -3048,7 +3048,6 @@ load_cap_file(capture_file *cf, char *save_file, int out_file_type, if (perform_two_pass_analysis) { frame_data *fdata; - int old_max_packet_count = max_packet_count; /* Allocate a frame_data_sequence for all the frames. */ cf->frames = new_frame_data_sequence(); @@ -3075,8 +3074,6 @@ load_cap_file(capture_file *cf, char *save_file, int out_file_type, * don't need after the sequential run-through of the packets. */ postseq_cleanup_all_protocols(); - max_packet_count = old_max_packet_count; - prev_dis = NULL; prev_cap = NULL; buffer_init(&buf, 1500); @@ -3117,15 +3114,6 @@ load_cap_file(capture_file *cf, char *save_file, int out_file_type, exit(2); } } - /* Stop reading if we have the maximum number of packets; - * When the -c option has not been used, max_packet_count - * starts at 0, which practically means, never stop reading. - * (unless we roll over max_packet_count ?) - */ - if ( (--max_packet_count == 0) || (max_byte_count != 0 && data_offset >= max_byte_count)) { - err = 0; /* This is not an error */ - break; - } } } } |