Wireshark use pletohs to convert unsigned char to unsigned short,How to understand this code?What are some good Wireshark tutorials?How to filter by IP address in Wireshark?C.S. Basics: Understanding Data Packets, Protocols, WiresharkUsing libwireshark to get Wireshark functionality programmaticallyHow to read SSL/TLS Encrypted Alert code under Ephemeral RSAHow to capture Asterisk's AMI and AGI traffic using WireShark in a textual format?How to use Wireshark to help to create a protocol fuzzing framework?How do you pull certain substrings(ip addresses) out of strings(Wireshark Output)?How to Decrypt TCP Traffic Using Wireshark?Compiling Wireshark packet dissector

Co-worker is now managing my team. Does this mean that I'm being demoted?

Are there any rules for identifying what spell an opponent is casting?

Will users know a CardView is clickable

Cant bend fingertip when finger is straight

How can I detect if I'm in a subshell?

Leveling up and Getting Items!

Can artificial satellite positions affect tides?

Can I give my friend the sour dough "throw away" as a starter to their sourdough starter?

Is there a risk to write an invitation letter for a stranger to obtain a Czech (Schengen) visa?

How to search for Android apps without ads?

Are athletes' college degrees discounted by employers and graduate school admissions?

How did Avada Kedavra get its name?

Should I worry about having my credit pulled multiple times while car shopping?

Can an opamp have its own voltage regulator?

How did the European Union reach the figure of 3% as a maximum allowed deficit?

Is it possible for underground bunkers on different continents to be connected?

Someone who is granted access to information but not expected to read it

What things do I only get a limited opportunity to take photos of?

How could I create a situation in which a PC has to make a saving throw or be forced to pet a dog?

The title "Mord mit Aussicht" explained

Should I email my professor to clear up a (possibly very irrelevant) awkward misunderstanding?

Can an escape pod land on Earth from orbit and not be immediately detected?

New Site Design!

Do legislators hold the right of legislative initiative?



Wireshark use pletohs to convert unsigned char to unsigned short,How to understand this code?


What are some good Wireshark tutorials?How to filter by IP address in Wireshark?C.S. Basics: Understanding Data Packets, Protocols, WiresharkUsing libwireshark to get Wireshark functionality programmaticallyHow to read SSL/TLS Encrypted Alert code under Ephemeral RSAHow to capture Asterisk's AMI and AGI traffic using WireShark in a textual format?How to use Wireshark to help to create a protocol fuzzing framework?How do you pull certain substrings(ip addresses) out of strings(Wireshark Output)?How to Decrypt TCP Traffic Using Wireshark?Compiling Wireshark packet dissector






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I am reading the wireshark source code.but I can't understand this code:



typedef unsigned short guint16;
typedef unsigned char guint8;
#define pletohs(p) ((guint16)
((guint16)*((const guint8 *)(p)+1)<<8|
(guint16)*((const guint8 *)(p)+0)<<0))
const guint8 *ptr;
pletohs(ptr);


how pletohs works?










share|improve this question




























    0















    I am reading the wireshark source code.but I can't understand this code:



    typedef unsigned short guint16;
    typedef unsigned char guint8;
    #define pletohs(p) ((guint16)
    ((guint16)*((const guint8 *)(p)+1)<<8|
    (guint16)*((const guint8 *)(p)+0)<<0))
    const guint8 *ptr;
    pletohs(ptr);


    how pletohs works?










    share|improve this question
























      0












      0








      0








      I am reading the wireshark source code.but I can't understand this code:



      typedef unsigned short guint16;
      typedef unsigned char guint8;
      #define pletohs(p) ((guint16)
      ((guint16)*((const guint8 *)(p)+1)<<8|
      (guint16)*((const guint8 *)(p)+0)<<0))
      const guint8 *ptr;
      pletohs(ptr);


      how pletohs works?










      share|improve this question














      I am reading the wireshark source code.but I can't understand this code:



      typedef unsigned short guint16;
      typedef unsigned char guint8;
      #define pletohs(p) ((guint16)
      ((guint16)*((const guint8 *)(p)+1)<<8|
      (guint16)*((const guint8 *)(p)+0)<<0))
      const guint8 *ptr;
      pletohs(ptr);


      how pletohs works?







      wireshark






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Mar 25 at 2:42









      zbdbazbdba

      11




      11






















          0






          active

          oldest

          votes












          Your Answer






          StackExchange.ifUsing("editor", function ()
          StackExchange.using("externalEditor", function ()
          StackExchange.using("snippets", function ()
          StackExchange.snippets.init();
          );
          );
          , "code-snippets");

          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "1"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55330621%2fwireshark-use-pletohs-to-convert-unsigned-char-to-unsigned-short-how-to-understa%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Stack Overflow!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f55330621%2fwireshark-use-pletohs-to-convert-unsigned-char-to-unsigned-short-how-to-understa%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Kamusi Yaliyomo Aina za kamusi | Muundo wa kamusi | Faida za kamusi | Dhima ya picha katika kamusi | Marejeo | Tazama pia | Viungo vya nje | UrambazajiKuhusu kamusiGo-SwahiliWiki-KamusiKamusi ya Kiswahili na Kiingerezakuihariri na kuongeza habari

          SQL error code 1064 with creating Laravel foreign keysForeign key constraints: When to use ON UPDATE and ON DELETEDropping column with foreign key Laravel error: General error: 1025 Error on renameLaravel SQL Can't create tableLaravel Migration foreign key errorLaravel php artisan migrate:refresh giving a syntax errorSQLSTATE[42S01]: Base table or view already exists or Base table or view already exists: 1050 Tableerror in migrating laravel file to xampp serverSyntax error or access violation: 1064:syntax to use near 'unsigned not null, modelName varchar(191) not null, title varchar(191) not nLaravel cannot create new table field in mysqlLaravel 5.7:Last migration creates table but is not registered in the migration table

          은진 송씨 목차 역사 본관 분파 인물 조선 왕실과의 인척 관계 집성촌 항렬자 인구 같이 보기 각주 둘러보기 메뉴은진 송씨세종실록 149권, 지리지 충청도 공주목 은진현