(/home/sate/Testcases/c/cve/wireshark-1.2.0/epan/osi-utils.c) |
| |
| 56 | | | print_nsap_net_buf( const guint8 *ad, int length, gchar *buf, int buf_len) |
| 57 | | | { |
| 58 | | | gchar *cur; |
| 59 | | | |
| 60 | | | |
| 61 | | | |
| 62 | | | if ( (length <= 0 ) || ( length > MAX_NSAP_LEN ) ) { |
| 63 | | | g_snprintf(buf, buf_len, "<Invalid length of NSAP>"); |
| 64 | | | return; |
| 65 | | | } |
| 66 | | | cur = buf; |
| 67 | | | if ( ( length == RFC1237_NSAP_LEN ) || ( length == RFC1237_NSAP_LEN + 1 ) ) { |
| 68 | | | print_area_buf(ad, RFC1237_FULLAREA_LEN, cur, buf_len); |
| 69 | | | cur += strlen( cur ); |
| 70 | | | print_system_id_buf( ad + RFC1237_FULLAREA_LEN, RFC1237_SYSTEMID_LEN, cur, (int) (buf_len-(cur-buf))); |
| 71 | | | cur += strlen( cur ); |
| 72 | | | cur += g_snprintf(cur, (gulong) (buf_len-(cur-buf)), "[%02x]", |
| 73 | | | ad[ RFC1237_FULLAREA_LEN + RFC1237_SYSTEMID_LEN ] ); |
| 74 | | | if ( length == RFC1237_NSAP_LEN + 1 ) { |
| 75 | | | cur += g_snprintf(cur, (int) (buf_len-(cur-buf)), "-%02x", ad[ length -1 ] ); |
Unused Value
The value assigned to cur is never subsequently used on any execution path. |
|
| 76 | | | } |
| 77 | | | } |
| 78 | | | else { |
| 79 | | | print_area_buf( ad, length, buf, buf_len); |
| 80 | | | } |
| 81 | | | } |
| |