341c3f3c62
Encrypted packets were decrypted two times. One time to scan for new keys. If no keys were found the decrypted data was simply discarded. Then later on the packet was decrypted again for dissection. Avoid decrypting packets two times by storing the result from first decryption if no key was found. Skip the second attempt. Note though that in the special case where a key was actually found inside an encrypted packet the decryption will still be performed twice. First time decrypt, discover the key, and return the EAPOL keydata. Second time decrypt and return the decrypted frame. Change-Id: I1acd0060d4e1f351fb15070f8d7aa78c0035ce39 Reviewed-on: https://code.wireshark.org/review/30568 Reviewed-by: Anders Broman <a.broman58@gmail.com> |
||
---|---|---|
.. | ||
CMakeLists.txt | ||
CMakeListsCustom.txt.example | ||
dot11decrypt.c | ||
dot11decrypt_ccmp.c | ||
dot11decrypt_debug.h | ||
dot11decrypt_int.h | ||
dot11decrypt_interop.h | ||
dot11decrypt_rijndael.c | ||
dot11decrypt_rijndael.h | ||
dot11decrypt_system.h | ||
dot11decrypt_tkip.c | ||
dot11decrypt_user.h | ||
dot11decrypt_ws.h | ||
kasumi.h | ||
wep-wpadefs.h |