RTCP: try to continue dissection with partial SRTCP packet
When due to limited capture length the tailing part of the SRTCP packet is missing it might be impossible to know the encryption status of this packet. Before retrieving that information make sure that's even possible, otherwise continue as if not encrypted.
This commit is contained in:
parent
07f048f1f2
commit
57fc841aea
|
@ -4323,7 +4323,7 @@ dissect_rtcp( tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U
|
|||
srtcp_offset = tvb_reported_length_remaining(tvb, offset) - srtcp_info->auth_tag_len - srtcp_info->mki_len - 4;
|
||||
/* It has been setup as SRTCP, but skip to the SRTCP E field at the end
|
||||
to see if this particular packet is encrypted or not. The E bit is the MSB. */
|
||||
srtcp_index = tvb_get_ntohl(tvb,srtcp_offset);
|
||||
srtcp_index = tvb_bytes_exist(tvb, srtcp_offset, 4) ? tvb_get_ntohl(tvb, srtcp_offset) : 0;
|
||||
e_bit = (srtcp_index & 0x80000000) ? TRUE : FALSE;
|
||||
srtcp_index &= 0x7fffffff;
|
||||
|
||||
|
|
Loading…
Reference in New Issue