Wireshark-bugs: [Wireshark-bugs] [Bug 5169] Dissection of uncodocumented AFP func FPSpotlightRPC
Date: Thu, 2 Sep 2010 11:31:49 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5169

--- Comment #5 from Frank Lahm <franklahm@xxxxxxxxxxxxxx> 2010-09-02 11:31:48 PDT ---
(In reply to comment #4)
> Why is the spotlight_ntohl() function within an #if 0 block?

It's obviously unused. As far as I have decoded the whole mess, all data items
are inside 8 byte blocks. It could be removed probably. Whenever there's a need
for it in the future it'd be easy to put back in.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.