ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 11172] IEEE 802.11: 802.1X (WPA-EAP) rekeying support - Pr

Date: Sun, 10 May 2015 21:01:39 +0000

Comment # 7 on bug 11172 from
I've no idea how I can track the problem on solaris. I could probably install
opensolaris, but then it would also be litte-endian on my hardware...

If there is some way to do that with the bulid system for me plese point out
how. But I guess there isn't.

The core of the change was reordering the code and I do not see how this could
cause a segfault. 
If it would not segfault... then it could probably explained with the endian
difference. The EAP-TLS test is using a TK key as filter which could well fail
the test here somehow.

But as I understand the build log it's a segfault.

So I would first try to comment out:

memcpy(&(key->KeyData.Wpa.Ptk), sa->wpa.ptk, AIRPDCAP_WPA_PTK_LEN);

Which was for my rusty C-skill quite a problem to get working as it should.
Without this line the test can't work, but should when it related to that no
longer core dump.

The other option would be to increase AIRPDCAP_WPA_PSK_LEN to 64 again. That
will break the display of the PSK in wireshark and probably filtering on it. 

If that is not working around it my last idea would be to remove the section 
"Add Key information to packet" in packet-ieee80211.c.


You are receiving this mail because:
  • You are watching all bug changes.