Bug ID |
8608
|
Summary |
DTLS 1.2 uses wrong PRF
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
1.11.x (Experimental)
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 10646 [details]
fix DLTS 1.2 PRF selection
Build Information:
--
DTLS 1.2 is based on TLS 1.2 and has to use the TLS 1.2 PRF.
Attached is patch for fix this.
A sample capture can be generate using a recent openssl (1.0.1c):
openssl s_server -key key.pem -cert cert.pem -dtls1_2 -accept 4433 -cipher
AES256-SHA
openssl s_client -connect localhost:4433 -dtls1_2
You are receiving this mail because:
- You are watching all bug changes.