forked from osmocom/wireshark
![]() The sha1 function outputs a multiple of 20 bytes while the ptk buffer
has only a size of 64 bytes. Follow the hint in 802.11i-2004, page 164
and use an output buffer of 80 octets.
Noticed when running Wireshark with ASAN, on exit it would try to free a
"next" pointer which was filled with sha1 garbage. It probably got
triggered via
|
||
---|---|---|
.. | ||
Custom.common | ||
Makefile.am | ||
Makefile.common | ||
Makefile.nmake | ||
airpdcap.c | ||
airpdcap_ccmp.c | ||
airpdcap_debug.c | ||
airpdcap_debug.h | ||
airpdcap_int.h | ||
airpdcap_interop.h | ||
airpdcap_rijndael.c | ||
airpdcap_rijndael.h | ||
airpdcap_system.h | ||
airpdcap_tkip.c | ||
airpdcap_user.h | ||
airpdcap_ws.h | ||
kasumi.h | ||
wep-wpadefs.h |