Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 7633] Decode Bluetooth HS 4-way handshake over 802.11 medi

Date: Tue, 14 Aug 2012 12:21:53 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7633

Guy Harris <guy@xxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #8954|                            |review_for_checkin-
              Flags|                            |

--- Comment #1 from Guy Harris <guy@xxxxxxxxxxxx> 2012-08-14 12:21:53 PDT ---
Comment on attachment 8954
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8954
[PATCH] Decode Bluetooth HS 4-way handshake over 802.11 media

0x0003 is not an Ethernet type, so the EAPOL dissector should *NOT* be
registered in the "ethertype" table with a value of 0x0003.

Instead, it's a protocol ID in the space of SNAP protocol IDs for the OUI value
00:19:58, i.e. OUI_BLUETOOTH, so what you want to do is to:

    register a dissector table for the OUI value OUI_BLUETOOTH - for an example
of how to do this, see proto_register_cisco_oui() in
epan/dissectors/packet-cisco-oui.c;

    in that dissector table, register the EAPOL dissector in *THAT* dissector
table with a protocol ID of 0x0003.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.