wireshark/test/config
Alexander Wetzel cb3dd958af WPA/WPA2 decoding fixes and improvements
- start decoding when we have eapol1+2 packets
  Do not insist on a complete captured handshake, decode what we can.

- more robust way to detect eapol #2 packets
  At least Win 10 is violating the spec on rekey by setting the secure
  bit in #2. Unpatched version shows and handles #2 as #4, breaking
  decoding after rekey.

- fixed eapol rekey key handling
  Inital patch (see https://code.wireshark.org/review/8268)
  is adding redundant keys, since it scans all the time
  and not only once.

- ignore tailing garbage after eapol sections in frame
  See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9065#c8

Included testcase to test decode for incomplete handshakes and eapol2
packets with secure bit set on rekey.

Ping-Bug: 9065
Change-Id: Id775088db9b5aaa80da9efdeed6902d024b5c0cd
Reviewed-on: https://code.wireshark.org/review/11484
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2015-11-09 11:28:14 +00:00
..
80211_keys.tmpl WPA/WPA2 decoding fixes and improvements 2015-11-09 11:28:14 +00:00
c1222_decryption_table.tmpl From Ed Beroset via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9238 2013-10-09 17:21:30 +00:00
dtlsdecrypttablefile.tmpl Have DTLS just dissect the test capture as data 2014-04-26 21:45:48 +00:00
ikev1_decryption_table.tmpl test: add decryption test for isakmp with certificates 2014-09-24 22:06:31 +00:00
ssl_keys.tmpl Fix decryption test suite on Windows 2015-06-04 21:34:07 +00:00