summaryrefslogtreecommitdiff
path: root/epan/dissectors/packet-dtls.c
diff options
context:
space:
mode:
authorPeter Wu <peter@lekensteyn.nl>2017-01-27 22:30:34 +0100
committerPeter Wu <peter@lekensteyn.nl>2017-01-28 14:32:09 +0100
commitec9ce3fdad014274ce00de1768f9e11395a77e37 (patch)
tree9c5dd1a5e2c80fa542404594561a17ff3f1a4446 /epan/dissectors/packet-dtls.c
parent0d57fe2fe4941acf69d1b5af9b61cc0b10248aa3 (diff)
downloadwireshark-ec9ce3fdad014274ce00de1768f9e11395a77e37.tar.gz
(D)TLS: fix type of record sequence numberTLS13
The record sequence number is 64-bit, not 32-bit. This applies to all SSLv3/TLS/DTLS versions. Without this fix, after about four million records, the wrong MAC is calculated (for TLS 1.2) or decryption will fail (for TLS 1.3). Change-Id: I05e5e8bc4229ac443a1b06c5fe984fb885eab1ca
Diffstat (limited to 'epan/dissectors/packet-dtls.c')
-rw-r--r--epan/dissectors/packet-dtls.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/epan/dissectors/packet-dtls.c b/epan/dissectors/packet-dtls.c
index dd08f58da4..0ac6a94340 100644
--- a/epan/dissectors/packet-dtls.c
+++ b/epan/dissectors/packet-dtls.c
@@ -716,13 +716,13 @@ dissect_dtls_record(tvbuff_t *tvb, packet_info *pinfo,
if(ssl){
if(ssl_packet_from_server(session, dtls_associations, pinfo)){
if (ssl->server) {
- ssl->server->seq=(guint32)sequence_number;
+ ssl->server->seq=sequence_number;
ssl->server->epoch=epoch;
}
}
else{
if (ssl->client) {
- ssl->client->seq=(guint32)sequence_number;
+ ssl->client->seq=sequence_number;
ssl->client->epoch=epoch;
}
}