https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7139
Summary: HIP dissector: PUZZLE and SOLUTION parameters variable
size
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Normal
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: fvidalmeca@xxxxxxxxx
Created attachment 8262
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8262
Dummy messages carrying puzzle and solution parameters with different sizes.
Build Information:
Version 1.7.2 (SVN Rev 42128 from /trunk)
Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.4, with Cairo 1.10.2, with Pango 1.28.4, with
GLib 2.28.6, with libpcap, with libz 1.2.3.4, without POSIX capabilities,
without SMI, without c-ares, without ADNS, without Lua, without Python, without
GnuTLS, without Gcrypt, without Kerberos, without GeoIP, without PortAudio,
with
AirPcap.
Running on Linux 2.6.38-13-generic, with locale en_US.UTF-8, with libpcap
version 1.1.1, with libz 1.2.3.4, without AirPcap.
Built using gcc 4.5.2.
--
According to specifications, puzzle and solution parameters carry Random #I and
#J fields that has variable length depending of the Hash function. The fields
are recognized with a fixed value of 8 bytes.
The #I and #J fields should be determined depending of the TLV size.
See http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-08#section-5.2.5 .
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.