ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 5485] improper decode of TLS 1.2 packet containing both Ce

Date: Mon, 13 Dec 2010 09:41:20 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5485

--- Comment #6 from Kevin Fall <kfall@xxxxxxxxxxxxxxx> 2010-12-13 09:41:20 PST ---
(In reply to comment #5)
> OK... looking at RFC 4346 (TLSv1.1) and RFC 5246 (TLSv1.2) it looks like the
> CertificateRequest format has changed between these two versions. So the code
> to dissect the CertificateRequest should use the TLS version to decide how to
> dissect the CertificateRequest.

Well, I think wireshark does decode the CertificateRequest message properly
already.  The problem that it doesn't keep going to decode the ServerHelloDone
message that immediately follows the CertificateRequest in the same packet. 
TLS (1.2 at least) allows multiple TLS messages in the same packet.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.