wireshark/epan/crypt
Alexander Wetzel cb3dd958af WPA/WPA2 decoding fixes and improvements
- start decoding when we have eapol1+2 packets
  Do not insist on a complete captured handshake, decode what we can.

- more robust way to detect eapol #2 packets
  At least Win 10 is violating the spec on rekey by setting the secure
  bit in #2. Unpatched version shows and handles #2 as #4, breaking
  decoding after rekey.

- fixed eapol rekey key handling
  Inital patch (see https://code.wireshark.org/review/8268)
  is adding redundant keys, since it scans all the time
  and not only once.

- ignore tailing garbage after eapol sections in frame
  See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9065#c8

Included testcase to test decode for incomplete handshakes and eapol2
packets with secure bit set on rekey.

Ping-Bug: 9065
Change-Id: Id775088db9b5aaa80da9efdeed6902d024b5c0cd
Reviewed-on: https://code.wireshark.org/review/11484
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2015-11-09 11:28:14 +00:00
..
airpdcap.c WPA/WPA2 decoding fixes and improvements 2015-11-09 11:28:14 +00:00
airpdcap_ccmp.c
airpdcap_debug.c
airpdcap_debug.h WPA/WPA2 decoding fixes and improvements 2015-11-09 11:28:14 +00:00
airpdcap_int.h
airpdcap_interop.h
airpdcap_rijndael.c
airpdcap_rijndael.h
airpdcap_system.h WPA/WPA2 decoding fixes and improvements 2015-11-09 11:28:14 +00:00
airpdcap_tkip.c
airpdcap_user.h WPA/WPA2 decoding fixes and improvements 2015-11-09 11:28:14 +00:00
airpdcap_ws.h
Custom.common
kasumi.h
Makefile.am
Makefile.common
Makefile.nmake
wep-wpadefs.h