https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6869
Bartosz Brachaczek <b.brachaczek@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #9284| |review_for_checkin?
Flags| |
--- Comment #2 from Bartosz Brachaczek <b.brachaczek@xxxxxxxxx> 2012-10-07 05:48:13 PDT ---
Created attachment 9284
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=9284
Make the SSL dissector work with GnuTLS compiled with nettle
The main problem is that depending on crypto backend used by GnuTLS, the
meaning of p and q RSA parameters varies[1], and ssl_privkey_to_sexp() function
fails because of that if GnuTLS uses nettle but works if GnuTLS uses libgcrypt.
Attaching a patch to fix that.
[1] Looks like an awful abstraction leakage, but there's no sense in reporting
this to upstream GnuTLS, as the current stable versions, starting from version
3.0, support only nettle as a crypto backend.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.