wireshark/epan/crypt
Gerald Combs 8ca33644e7 From Greg Schwendimann via bug 3156:
Airpdcap does not allow for more than one key to be stored for a pair of nodes.
 This means that when a device associates more than once the previous keys are
lost.  This is ok for the first pass as the newest key is all that is needed
but when the user tries to click on a packet, to get the tree, which used a
previous key all that is seen is the encrypted data.  The attached patch stores
previous associations in a linked list and will try all known keys before
decided the packet can't be decrypted.  The list of keys is garbage collected
when a new capture is started.

svn path=/trunk/; revision=28449
2009-05-22 17:38:21 +00:00
..
airpdcap.c From Greg Schwendimann via bug 3156: 2009-05-22 17:38:21 +00:00
airpdcap_ccmp.c
airpdcap_debug.c
airpdcap_debug.h
airpdcap_int.h
airpdcap_interop.h
airpdcap_rijndael.c
airpdcap_rijndael.h
airpdcap_system.h From Greg Schwendimann via bug 3156: 2009-05-22 17:38:21 +00:00
airpdcap_tkip.c
airpdcap_user.h
airpdcap_wep.c
airpdcap_ws.h
crypt-des.c
crypt-des.h
crypt-md4.c
crypt-md4.h
crypt-md5.c
crypt-md5.h
crypt-rc4.c
crypt-rc4.h
crypt-sha1.c
crypt-sha1.h
Makefile.am
Makefile.common
Makefile.nmake
wep-wpadefs.h