| Bug ID |
8608
|
| Summary |
DTLS 1.2 uses wrong PRF
|
| Classification |
Unclassified
|
| Product |
Wireshark
|
| Version |
1.11.x (Experimental)
|
| Hardware |
All
|
| OS |
All
|
| Status |
UNCONFIRMED
|
| Severity |
Normal
|
| Priority |
Low
|
| Component |
Dissection engine (libwireshark)
|
| Assignee |
[email protected]
|
| Reporter |
[email protected]
|
Created attachment 10646 [details]
fix DLTS 1.2 PRF selection
Build Information:
--
DTLS 1.2 is based on TLS 1.2 and has to use the TLS 1.2 PRF.
Attached is patch for fix this.
A sample capture can be generate using a recent openssl (1.0.1c):
openssl s_server -key key.pem -cert cert.pem -dtls1_2 -accept 4433 -cipher
AES256-SHA
openssl s_client -connect localhost:4433 -dtls1_2
You are receiving this mail because:
- You are watching all bug changes.