ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 7139] New: HIP dissector: PUZZLE and SOLUTION parameters v

Date: Wed, 18 Apr 2012 06:04:59 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7139

           Summary: HIP dissector: PUZZLE and SOLUTION parameters variable
                    size
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: fvidalmeca@xxxxxxxxx


Created attachment 8262
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8262
Dummy messages carrying puzzle and solution parameters with different sizes.

Build Information:
Version 1.7.2 (SVN Rev 42128 from /trunk)

Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.24.4, with Cairo 1.10.2, with Pango 1.28.4, with
GLib 2.28.6, with libpcap, with libz 1.2.3.4, without POSIX capabilities,
without SMI, without c-ares, without ADNS, without Lua, without Python, without
GnuTLS, without Gcrypt, without Kerberos, without GeoIP, without PortAudio,
with
AirPcap.

Running on Linux 2.6.38-13-generic, with locale en_US.UTF-8, with libpcap
version 1.1.1, with libz 1.2.3.4, without AirPcap.

Built using gcc 4.5.2.
--
According to specifications, puzzle and solution parameters carry Random #I and
#J fields that has variable length depending of the Hash function. The fields
are recognized with a fixed value of 8 bytes.

The #I and #J fields should be determined depending of the TLV size.

See http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-08#section-5.2.5 .

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.