forked from osmocom/wireshark
Don't use HTTP filter for DTLS decryption test as it's not really HTTP traffic (and a more discerning HTTP dissector will cause this to fail)
Change-Id: I74ea78f541f87000d84c85794d04e9de46d477f2 Reviewed-on: https://code.wireshark.org/review/1333 Reviewed-by: Anders Broman <a.broman58@gmail.com>
This commit is contained in:
parent
4bd8336017
commit
757db64e48
|
@ -1 +1 @@
|
|||
"127.0.0.1","443","http","TEST_KEYS_DIRrsasnakeoil2.key",""
|
||||
"127.0.0.1","4433","data","TEST_KEYS_DIRrsasnakeoil2.key",""
|
||||
|
|
|
@ -78,7 +78,7 @@ decryption_step_80211_wpa_psk() {
|
|||
decryption_step_dtls() {
|
||||
env $TS_DC_ENV $TSHARK $TS_DC_ARGS \
|
||||
-Tfields -e data.data \
|
||||
-r "$CAPTURE_DIR/snakeoil-dtls.pcap" -Y http \
|
||||
-r "$CAPTURE_DIR/snakeoil-dtls.pcap" -Y data \
|
||||
| grep "69:74:20:77:6f:72:6b:20:21:0a" > /dev/null 2>&1
|
||||
RETURNVALUE=$?
|
||||
if [ ! $RETURNVALUE -eq $EXIT_OK ]; then
|
||||
|
|
Loading…
Reference in New Issue