forked from osmocom/wireshark
6425ba961d
Use eapol key data length to differentiate between #2 and #4. This should work around ieee802.11 client implementation errors. Windows is setting the Secure Bit on #2 when rekeying and Bug 11994 has a sample capture with the Nonce set in #4 and are so both violating the spec. Bug: 11994 Change-Id: Ia9e9c68d08dae042cfa7fd9517892db211b0a00f Reviewed-on: https://code.wireshark.org/review/13299 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> |
||
---|---|---|
.. | ||
Custom.common | ||
Makefile.am | ||
Makefile.common | ||
Makefile.nmake | ||
airpdcap.c | ||
airpdcap_ccmp.c | ||
airpdcap_debug.c | ||
airpdcap_debug.h | ||
airpdcap_int.h | ||
airpdcap_interop.h | ||
airpdcap_rijndael.c | ||
airpdcap_rijndael.h | ||
airpdcap_system.h | ||
airpdcap_tkip.c | ||
airpdcap_user.h | ||
airpdcap_ws.h | ||
kasumi.h | ||
wep-wpadefs.h |