summaryrefslogtreecommitdiff
path: root/epan/packet.c
diff options
context:
space:
mode:
authorJaap Keuter <jaap.keuter@xs4all.nl>2009-07-16 19:57:15 +0000
committerJaap Keuter <jaap.keuter@xs4all.nl>2009-07-16 19:57:15 +0000
commit05babef3b45279712b217b7954337bd1863af6bc (patch)
tree225d60c9303c751d179c9ed8137bd1bd2ba9ec89 /epan/packet.c
parent517d9cec5f3ef6c70753de30f71c7a7343ef1f87 (diff)
downloadwireshark-05babef3b45279712b217b7954337bd1863af6bc.tar.gz
From David Dahlberg:
As for now, Wireshark supports only 96-bit (or 0-bit for NULL authentication) integrity control values (ICVs) for IPsec ESP. While the autentication field is of variable length, this may lead to situations where the whole packet is not parsable. To solve this, I added generic classes (not checked) for 128, 192 and 256 bit ICVs to the ESP dissector. I also split the HMAC-SHA-256 autentication algorithm to HMAC-SHA-256-128 (128 bit as defined in RFC 4868) and HMAC-SHA-256-96 (from the very first draft, nevertheless unpatched Linux and BSDs do it this way). svn path=/trunk/; revision=29121
Diffstat (limited to 'epan/packet.c')
0 files changed, 0 insertions, 0 deletions