Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 7633] New: Decode Bluetooth HS 4-way handshake over 802.11

Date: Tue, 14 Aug 2012 00:43:31 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7633

           Summary: Decode Bluetooth HS 4-way handshake over 802.11 media
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Dissection engine (libwireshark)
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: andrei.emeltchenko.news@xxxxxxxxx


Created attachment 8954
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8954
[PATCH] Decode Bluetooth HS 4-way handshake over 802.11 media

Build Information:
wireshark 1.9.0 (SVN Rev Unknown from unknown)

Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.24.10, with Cairo 1.10.2, with Pango 1.30.0, with
GLib 2.32.3, with libpcap, with libz 1.2.3.4, without POSIX capabilities, with
libnl 1, without SMI, without c-ares, without ADNS, without Lua, without
Python,
with GnuTLS 2.12.14, with Gcrypt 1.5.0, without Kerberos, without GeoIP,
without
PortAudio, without AirPcap.

Running on Linux 3.5.0-rc1+, with locale en_US.UTF-8, with libpcap version
1.1.1, with libz 1.2.3.4, GnuTLS 2.12.14, Gcrypt 1.5.0.

Built using gcc 4.6.3.

--
commit 0adc73f2072e7b8de8f940203fdbf3511f4f4af9
Author: Andrei Emeltchenko <andrei.emeltchenko@xxxxxxxxx>
Date:   Mon Aug 6 11:36:23 2012 +0300

    Decode Bluetooth HS 4-way handshake over 802.11 media

    Decode 4-way handshake over 802.11 media packets like one shown below:

    ...
    Logical-Link Control
        DSAP: SNAP (0xaa)
        IG Bit: Individual
        SSAP: SNAP (0xaa)
        CR Bit: Command
        Control field: U, func=UI (0x03)
        Organization Code: Bluetooth (0x001958)
        Type: Bluetooth Security (0x0003)
    802.1X Authentication
        Version: 802.1X-2001 (1)
        Type: Key (3)
        Length: 117
        Key Descriptor Type: EAPOL RSN Key (2)
        Key Information: 0x010a
            .... .... .... .010 = Key Descriptor Version: AES Cipher, HMAC-SHA1
MIC (2)
            .... .... .... 1... = Key Type: Pairwise Key
            .... .... ..00 .... = Key Index: 0
            .... .... .0.. .... = Install: Not set
            .... .... 0... .... = Key ACK: Not set
            .... ...1 .... .... = Key MIC: Set
            .... ..0. .... .... = Secure: Not set
            .... .0.. .... .... = Error: Not set
            .... 0... .... .... = Request: Not set
            ...0 .... .... .... = Encrypted Key Data: Not set
        Key Length: 16
        Replay Counter: 1
        WPA Key Nonce: 768574f5be8f87e5564ef8eab556a26c2e1f0abc6ca256b5...
        Key IV: 00000000000000000000000000000000
        WPA Key RSC: 0000000000000000
        WPA Key ID: 0000000000000000
        WPA Key MIC: 0553a180d3415401216c080bac23d381
        WPA Key Data Length: 22
        WPA Key Data: 30140100000fac040100000fac040100000fac020000
    ...

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.