![]() To be able to support authentication key management suites that use different MIC, PMK, PTK lengths the engine would need to be extended to support parsing EAPOL Key frames with variable field lengts. Though as the IEEE 802.11 dissector already support this the alternative (implemented in this patch) is to remove the EAPOL frame parsing inside the engine and have the dissector feed it with a struct of parsed fields instead. For this a new type DOT11DECRYPT_EAPOL_PARSED is exported and dot11decrypt now expects dissector to fill this struct with parsed EAPOL fields before calling Dot11DecryptScanEapolForKeys. Dissection of EAPOL fields is scattered over several functions in the dissector code so parsed fields are temporarily stored in proto data and then gathered before fed into dot11decrypt engine. Change-Id: Ic6aeb4900f373dcde1ea3f1f0f24df2ae827576e Reviewed-on: https://code.wireshark.org/review/35020 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com> |
||
---|---|---|
.. | ||
CMakeLists.txt | ||
CMakeListsCustom.txt.example | ||
dot11decrypt.c | ||
dot11decrypt_ccmp.c | ||
dot11decrypt_debug.h | ||
dot11decrypt_int.h | ||
dot11decrypt_interop.h | ||
dot11decrypt_rijndael.c | ||
dot11decrypt_rijndael.h | ||
dot11decrypt_system.h | ||
dot11decrypt_tkip.c | ||
dot11decrypt_user.h | ||
dot11decrypt_ws.h | ||
kasumi.h | ||
wep-wpadefs.h |