Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 5331] New: Multi-key Support and Extended Address Mapping

Date: Fri, 22 Oct 2010 11:19:56 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5331

           Summary: Multi-key Support and Extended Address Mapping for
                    ZigBee Dissectors
           Product: Wireshark
           Version: 1.5.x (Experimental)
          Platform: x86
        OS/Version: Windows XP
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: fff@xxxxxxxxxx


Created an attachment (id=5359)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5359)
Multi-key Support and Extended Address Mapping for ZigBee Dissectors

Build Information:
Version 1.5.0-etl-5.5 (SVN Rev 34622 from /trunk)

Copyright 1998-2010 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.16.6, with GLib 2.24.2, with WinPcap (version
unknown), with libz 1.2.3, without POSIX capabilities, without libpcre, with
SMI
0.4.8, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS 2.8.5, with
Gcrypt 1.4.5, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built
Oct
21 2010), with AirPcap.

Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.1.2
(packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 2.8.5, Gcrypt 1.4.5, without AirPcap.

Built using Microsoft Visual C++ 9.0 build 30729
--
This patch adds the following enhancements to the ZigBee and IEEE 802.15.4
Dissectors:

- UAT allows user to enter more than one decryption key
- Automatically decrypts using keys sniffed from Transport Key commands
- Decrypts packets with both NWK and APS encrypted payloads
- Maps extended source addresses from 802.15.4 and NWK layers (no more tedious
manual entry of TC addresses)
- Displays origin of extended address mapping in previous packets
- Displays origin of keys used to decrypt payloads
- Allows keys to be entered in big- and little-endian order
- Allows keys to be entered as ASCII strings

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.