Have "wtap_seek_read()" return 0 on success and -1 on failure, and take
authorguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>
Tue, 5 Mar 2002 05:58:41 +0000 (05:58 +0000)
committerguy <guy@f5534014-38df-0310-8fa8-9805f1628bb7>
Tue, 5 Mar 2002 05:58:41 +0000 (05:58 +0000)
commitba95ac6c6e371b82f1f91eef869c91b097510ec7
treeedc94f3db1aa4b8d5dfc6192d153023fb32d9a0d
parenta059dca44b7026f03d8b4376b93ed09c255aaf7b
Have "wtap_seek_read()" return 0 on success and -1 on failure, and take
an "err" argument that points to an "int" into which to put an error
code if it fails.

Check for errors in one call to it, and note that we should do so in
other places.

In the "wtap_seek_read()" call in the TCP graphing code, don't overwrite
"cfile.pseudo_header", and make the buffer into which we read the data
WTAP_MAX_PACKET_SIZE bytes, as it should be.

In some of the file readers for text files, check for errors from the
"parse the record header" and "parse the hex dump" routines when reading
sequentially.

In "csids_seek_read()", fix some calls to "file_error()" to check the
error on the random stream (that being what we're reading).

git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@4874 f5534014-38df-0310-8fa8-9805f1628bb7
22 files changed:
file.c
gtk/main.c
gtk/tcp_graph.c
proto_hier_stats.c
wiretap/ascend.c
wiretap/csids.c
wiretap/dbs-etherwatch.c
wiretap/file.c
wiretap/i4btrace.c
wiretap/iptrace.c
wiretap/netmon.c
wiretap/nettl.c
wiretap/ngsniffer.c
wiretap/pppdump.c
wiretap/radcom.c
wiretap/snoop.c
wiretap/toshiba.c
wiretap/visual.c
wiretap/vms.c
wiretap/wtap-int.h
wiretap/wtap.c
wiretap/wtap.h