Don't use HTTP filter for DTLS decryption test as it's not really HTTP traffic (and a more discerning HTTP dissector will cause this to fail)

Change-Id: I74ea78f541f87000d84c85794d04e9de46d477f2
Reviewed-on: https://code.wireshark.org/review/1333
Reviewed-by: Anders Broman <a.broman58@gmail.com>
This commit is contained in:
Michael Mann 2014-04-24 20:37:34 -04:00 committed by Anders Broman
parent 4bd8336017
commit 757db64e48
2 changed files with 2 additions and 2 deletions

View File

@ -1 +1 @@
"127.0.0.1","443","http","TEST_KEYS_DIRrsasnakeoil2.key",""
"127.0.0.1","4433","data","TEST_KEYS_DIRrsasnakeoil2.key",""

View File

@ -78,7 +78,7 @@ decryption_step_80211_wpa_psk() {
decryption_step_dtls() {
env $TS_DC_ENV $TSHARK $TS_DC_ARGS \
-Tfields -e data.data \
-r "$CAPTURE_DIR/snakeoil-dtls.pcap" -Y http \
-r "$CAPTURE_DIR/snakeoil-dtls.pcap" -Y data \
| grep "69:74:20:77:6f:72:6b:20:21:0a" > /dev/null 2>&1
RETURNVALUE=$?
if [ ! $RETURNVALUE -eq $EXIT_OK ]; then