forked from osmocom/wireshark
![]() - start decoding when we have eapol1+2 packets Do not insist on a complete captured handshake, decode what we can. - more robust way to detect eapol #2 packets At least Win 10 is violating the spec on rekey by setting the secure bit in #2. Unpatched version shows and handles #2 as #4, breaking decoding after rekey. - fixed eapol rekey key handling Inital patch (see https://code.wireshark.org/review/8268) is adding redundant keys, since it scans all the time and not only once. - ignore tailing garbage after eapol sections in frame See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9065#c8 Included testcase to test decode for incomplete handshakes and eapol2 packets with secure bit set on rekey. Ping-Bug: 9065 Change-Id: Id775088db9b5aaa80da9efdeed6902d024b5c0cd Reviewed-on: https://code.wireshark.org/review/11484 Reviewed-by: Michael Mann <mmann78@netscape.net> Petri-Dish: Michael Mann <mmann78@netscape.net> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> |
||
---|---|---|
.. | ||
c1222_std_example8.pcap | ||
dhcp-nanosecond.pcap | ||
dhcp-nanosecond.pcapng | ||
dhcp.pcap | ||
dhcp.pcapng | ||
dhe1.pcapng.gz | ||
dmgr.pcapng | ||
dns+icmp.pcapng.gz | ||
dns_port.pcap | ||
dvb-ci_UV1_0000.pcap | ||
empty.pcap | ||
ikev1-certs.pcap | ||
many_interfaces.pcapng.1 | ||
many_interfaces.pcapng.2 | ||
many_interfaces.pcapng.3 | ||
packet-h2-14_headers.pcapng | ||
rsa-p-lt-q.pcap | ||
rsasnakeoil2.pcap | ||
sample_control4_2012-03-24.pcap | ||
segmented_fpm.pcap | ||
sip.pcapng | ||
sipmsg.log | ||
snakeoil-dtls.pcap | ||
wpa-Induction.pcap.gz | ||
wpa-eap-tls.pcap.gz | ||
wpa-test-decode.pcap.gz |