ISAKMP: Fix defragmentation of EAP-TLS in IKEv2

Remove NULL check to ensure IKEv2 encrypted payloads are dissected
during first pass, which is required for EAP-TLS fragment reassembly.

Change-Id: I7fd46ee2163188c1a8dd256a43f1457441b1b95a
Reviewed-on: https://code.wireshark.org/review/18348
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
This commit is contained in:
Mirko Parthey 2016-10-21 00:05:36 +02:00 committed by Anders Broman
parent 53400e0d33
commit 3756c0e24d
1 changed files with 1 additions and 1 deletions

View File

@ -5579,7 +5579,7 @@ dissect_enc(tvbuff_t *tvb,
* We dissect the inner payloads at last in order to ensure displaying Padding, Pad Length and ICD
* even if the dissection fails. This may occur when the user specify wrong encryption key.
*/
if (dissect_payload_now && decr_payloads_tree) {
if (dissect_payload_now) {
dissect_payloads(decr_tvb, decr_payloads_tree, 2, inner_payload, 0, payloads_len, pinfo, 0, is_request, decr_info);
}
}else{