forked from osmocom/wireshark
8ca33644e7
Airpdcap does not allow for more than one key to be stored for a pair of nodes. This means that when a device associates more than once the previous keys are lost. This is ok for the first pass as the newest key is all that is needed but when the user tries to click on a packet, to get the tree, which used a previous key all that is seen is the encrypted data. The attached patch stores previous associations in a linked list and will try all known keys before decided the packet can't be decrypted. The list of keys is garbage collected when a new capture is started. svn path=/trunk/; revision=28449 |
||
---|---|---|
.. | ||
airpdcap.c | ||
airpdcap_ccmp.c | ||
airpdcap_debug.c | ||
airpdcap_debug.h | ||
airpdcap_int.h | ||
airpdcap_interop.h | ||
airpdcap_rijndael.c | ||
airpdcap_rijndael.h | ||
airpdcap_system.h | ||
airpdcap_tkip.c | ||
airpdcap_user.h | ||
airpdcap_wep.c | ||
airpdcap_ws.h | ||
crypt-des.c | ||
crypt-des.h | ||
crypt-md4.c | ||
crypt-md4.h | ||
crypt-md5.c | ||
crypt-md5.h | ||
crypt-rc4.c | ||
crypt-rc4.h | ||
crypt-sha1.c | ||
crypt-sha1.h | ||
Makefile.am | ||
Makefile.common | ||
Makefile.nmake | ||
wep-wpadefs.h |