Pid* values taken from \[MS-OXPROPS\].pdf. #124
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pid* values taken from [MS-OXPROPS].pdf.
Ran PDFTOTEXT over it and then:
grep -Pi '(?:Canonical name|Property ID):' MS-OXPROPS.txt | grep -iPo '(?:Canonical name|Property ID).*' | grep 'Property ID' --before-context=1 > pid0
Gives 573 entries the first being:
spam7 ~/tnef 1066: head pid0
Canonical name: The name used to refer to the property in the Exchange Server Protocols Property ID: An unsigned 16-bit quantity that identifies a tagged property. Property IDs are not --
Canonical name: PidTagAccess
Property ID: 0x0FF4
cut -f2 -d':' pid0 | tail -n 1144 | sed -e :a -e '$!N;s/\n *0/ 0/;ta' -e 'P;D'
gives:
PidTagWlinkSection 0x6852
PidTagWlinkStoreEntryId 0x684E
PidTagWlinkType 0x6849
awk '{print $1 " = " $2}' pid1
awk '{print $1 ": "" $1 "","}' pid1
to get the correct bits