URL: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c7ca0e88df468989647fc272a798bcd038084d99
Submitter: Pascal Quantin (pascal.quan...@gmail.com)
Changed: branch: master
Repository: wireshark

Commits:

c7ca0e8 by MichaƂ Skalski (mskalsk...@gmail.com):

    dissector ISAKMP IKEv2: fixed bug with libgcrypt-1.6.x and AEAD ciphers
    
    IKEv2: 
    Fixed bug with AEAD ciphers with 8- and 12-byte length ICVs and
    libgcrypt 1.6.x - gcry_cipher_checktag() returned INVALID_LENGTH.
    Fixed for merged changeset https://code.wireshark.org/review/17078
    
    
    Added support for verification of encrypted data with HMAC_MD5_128
    [RFC4595] and HMAC_SHA1_160 [RFC4595] integrity algorithms
    
    Added IKEv2 decryption suite for few combinations of encryption and
    integrity algorithms: 3DES-CBC/SHA1_160, AES-128-CCM-12, AES-128-CCM-12
    (using CTR mode), AES-192-CTR/SHA2-512, AES-256-CBC/SHA2-256,
    AES-256-CCM-16, AES-256-GCM-16, AES-256-GCM-8
    
    
    Change-Id: Ic564b25f1fd41e913c605322b7b8aa030cf90ddf
    Reviewed-on: https://code.wireshark.org/review/17213
    Petri-Dish: Pascal Quantin <pascal.quan...@gmail.com>
    Reviewed-by: Peter Wu <pe...@lekensteyn.nl>
    Tested-by: Petri Dish Buildbot <buildbot-no-re...@wireshark.org>
    Reviewed-by: Pascal Quantin <pascal.quan...@gmail.com>
    

Actions performed:

    from  8d7aba1   IEEE 802.15.4:dissecting header & payload information 
elements used by 6tisch.
    adds  c7ca0e8   dissector ISAKMP IKEv2: fixed bug with libgcrypt-1.6.x and 
AEAD ciphers


Summary of changes:
 epan/dissectors/packet-isakmp.c                |   51 ++++++++--
 test/captures/ikev2-decrypt-3des-sha1_160.pcap |  Bin 0 -> 1860 bytes
 test/captures/ikev2-decrypt-aes128ccm12-2.pcap |  Bin 0 -> 1416 bytes
 test/captures/ikev2-decrypt-aes128ccm12.pcap   |  Bin 0 -> 1432 bytes
 test/captures/ikev2-decrypt-aes192ctr.pcap     |  Bin 0 -> 1512 bytes
 test/captures/ikev2-decrypt-aes256cbc.pcapng   |  Bin 0 -> 1792 bytes
 test/captures/ikev2-decrypt-aes256ccm16.pcapng |  Bin 0 -> 1728 bytes
 test/captures/ikev2-decrypt-aes256gcm16.pcap   |  Bin 0 -> 1448 bytes
 test/captures/ikev2-decrypt-aes256gcm8.pcap    |  Bin 0 -> 1400 bytes
 test/config/ikev2_decryption_table.tmpl        |   10 ++
 test/suite-decryption.sh                       |  124 ++++++++++++++++++++++++
 11 files changed, 176 insertions(+), 9 deletions(-)
 create mode 100644 test/captures/ikev2-decrypt-3des-sha1_160.pcap
 create mode 100644 test/captures/ikev2-decrypt-aes128ccm12-2.pcap
 create mode 100644 test/captures/ikev2-decrypt-aes128ccm12.pcap
 create mode 100644 test/captures/ikev2-decrypt-aes192ctr.pcap
 create mode 100644 test/captures/ikev2-decrypt-aes256cbc.pcapng
 create mode 100644 test/captures/ikev2-decrypt-aes256ccm16.pcapng
 create mode 100644 test/captures/ikev2-decrypt-aes256gcm16.pcap
 create mode 100644 test/captures/ikev2-decrypt-aes256gcm8.pcap
 create mode 100644 test/config/ikev2_decryption_table.tmpl
___________________________________________________________________________
Sent via:    Wireshark-commits mailing list <wireshark-commits@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-commits
Unsubscribe: https://wireshark.org/mailman/options/wireshark-commits
             mailto:wireshark-commits-requ...@wireshark.org?subject=unsubscribe

Reply via email to