On Fri, May 15, 2020 at 3:33 PM Peter Wu wrote:
>
> The "asn1" target rebuilds all asn1 dissectors.
> Alternatively to rebuild a specific one, use a target such as
> "generate_dissector-pkcs1".
Sure, but there seems to be multiple issues.
1. The 'documented' command placed in the generated sour
Den fre 15 maj 2020 19:44Richard Sharpe skrev:
> On Fri, May 15, 2020 at 10:27 AM Mikael Kanstrup
> wrote:
> >
> > Hi,
> >
> > Fast BSS Transitioning decryption is unfortunately not supported by
> Wireshark.
> >
> > Wireshark uses passphrase/PSK/PMK together with 4-way handshake to
> derive PTK
The "asn1" target rebuilds all asn1 dissectors.
Alternatively to rebuild a specific one, use a target such as
"generate_dissector-pkcs1".
Example:
mkdir build
cd build
cmake ..
cmake --build . --target generate_dissector-pkcs1
Or if you use ninja:
mkdir build
cd build
Hi,
Yes it's related to that bug. And if memory serves the trace would illustrate
the problem.
I don't see how the compression/decompression could recover as in showing the
missing header element. I'm not sure I understand what your objection is. Is it
in how to present the non decodable element
On Fri, May 15, 2020 at 2:29 PM Richard Sharpe
wrote:
>
> On Fri, May 15, 2020 at 2:30 PM Peter Wu wrote:
> >
> > Hi Richard,
> >
> > On Fri, May 08, 2020 at 08:54:58AM -0700, Richard Sharpe wrote:
> > [..]
> > > It doesn't look like it was manually modified. The last person who
> > > touched tha
On Fri, May 15, 2020 at 2:30 PM Peter Wu wrote:
>
> Hi Richard,
>
> On Fri, May 08, 2020 at 08:54:58AM -0700, Richard Sharpe wrote:
> [..]
> > It doesn't look like it was manually modified. The last person who
> > touched that file was Peter Wu, it seems, so maybe he can shed some
> > light on it.
Hi Richard,
On Fri, May 08, 2020 at 08:54:58AM -0700, Richard Sharpe wrote:
[..]
> It doesn't look like it was manually modified. The last person who
> touched that file was Peter Wu, it seems, so maybe he can shed some
> light on it.
How did you invoke asn2wrs.py? If I run the asn1 ninja/make ta
On Fri, May 15, 2020 at 06:50:18AM +, Anders Broman via Wireshark-dev wrote:
> Hi,
>
> I think there is a demand to dissect http2 traffic where all packets in a
> session is not captured. This is currently not possible.
>
> As the http2 protocol creates dynamic data for compression/decompress
On Fri, May 15, 2020 at 10:27 AM Mikael Kanstrup
wrote:
>
> Hi,
>
> Fast BSS Transitioning decryption is unfortunately not supported by Wireshark.
>
> Wireshark uses passphrase/PSK/PMK together with 4-way handshake to derive PTK
> and GTK. FT key hierarchy and key derivation is not handled by the
On Wed, May 13, 2020 at 9:01 PM Mohit Khattar via Wireshark-dev
wrote:
>
> Hi,
>
> We (myself and Jeff Hansen, CC'd) have been having trouble decrypting data
> packets on a monitor-mode capture involving packets between an ath9k client
> and a Fast BSS Transition-capable wireless network with WP
Hi,
Fast BSS Transitioning decryption is unfortunately not supported by
Wireshark.
Wireshark uses passphrase/PSK/PMK together with 4-way handshake to derive
PTK and GTK. FT key hierarchy and key derivation is not handled by the
decryption engine so PTK remains unknown which makes decryption fail.
On Fri, May 15, 2020 at 5:03 PM Muhammad Afzal wrote:
> For now, I want to clear one doubt, do i need to submit my proposal right now
> to you
> or it would be included in the application form?
The actual proposal should be submitted using Season of Docs website
when the application window opens
My name is Muhammad Afzal and I am from Pakistan.
I have read the ideas under GSoD enlighten by the Wireshark community.
What I believe is that without solid foundations of
Computer Networks history and the reason behind every protocol invention,
nobody would be able to give genuine description by
13 matches
Mail list logo