ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 5384] Patch to fix dissector bug noticed in ZigBee APS com

Date: Fri, 12 Nov 2010 18:22:34 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5384

--- Comment #5 from Fred Fierling <fff@xxxxxxxxxx> 2010-11-12 18:22:31 PST ---
Created an attachment (id=5457)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5457)
Test for Malformed Packet Exceptions

After applying the patch, packet 7 in the attached test capture, which has a
null APS ACK command payload, will decode properly. To decode payloads, the
following keys must be entered in the Edit / Preferences... / Protocols /
ZigBee NWK / Pre-configured Keys window, in Normal Byte Order:

ea85:613b:3f61:e18a:1b97:c5fc:35ac:00c5
5677:7777:7777:7777:7777:7777:7777:7777

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.