dissect_rtp_heur: prevent a 'false positive' when trying stun dissection.
authorwmeier <wmeier@f5534014-38df-0310-8fa8-9805f1628bb7>
Thu, 12 Feb 2009 17:30:15 +0000 (17:30 +0000)
committerwmeier <wmeier@f5534014-38df-0310-8fa8-9805f1628bb7>
Thu, 12 Feb 2009 17:30:15 +0000 (17:30 +0000)
commit63fb6f24841dc744fa38537afbbea7d0d11abbb7
tree8bd4de83f413bbdb54e4e48f8c0ad4eac4e95eaf
parent5b37e16ad8a594339a22c5929502e8a0134b2aec
dissect_rtp_heur: prevent a 'false positive' when trying stun dissection.

Specifically: when dissect_rtp_heur calls the stun dissector:
- Don't do a 'data' dissection if stun dissection fails;
  (ie: use call_dissector_only instead of call_dissector).
- return the stun dissector success/fail status to the caller of dissect_rtp_heur;
  (Done by registering and calling the heuristic version of the stun dissector).
Also: use call_dissector_only for each of the dissectors called by dissect_rtp_heur
 (altho it really makes no difference at this point except for the call to the
  stun dissector).

git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@27443 f5534014-38df-0310-8fa8-9805f1628bb7
epan/dissectors/packet-rtp.c
epan/dissectors/packet-stun.c