Wireshark mailing list archives

Re: WLAN decryption using a hex PSK key


From: Pascal Quantin <pascal.quantin () gmail com>
Date: Sun, 21 Oct 2012 23:01:23 +0200

Le 20/10/2012 17:33, Sho Amano a écrit :
Okey, I figured out that following quick hack works for me. Now I can see
the decrypted TCP packets.
(build running on Ubuntu 12.04 amd64)

$ svn diff
Index: epan/dissectors/packet-ieee80211.c
===================================================================
--- epan/dissectors/packet-ieee80211.c    (revision 45658)
+++ epan/dissectors/packet-ieee80211.c    (working copy)
@@ -17369,7 +17369,7 @@
         keys->Keys[keys->nKeys] = key;
         keys->nKeys++;
       }
-      else if(dk->type == AIRPDCAP_KEY_TYPE_WPA_PMK)
+      else if(dk->type == AIRPDCAP_KEY_TYPE_WPA_PSK)
       {
         key.KeyType = AIRPDCAP_KEY_TYPE_WPA_PMK;
 

Thanks.

Hi Sho,

thanks for the report and patch. I committed a slightly different
version in r45696 and scheduled it for backport in 1.8.4.

Regards,
Pascal.

___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev () wireshark org>
Archives:    http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-request () wireshark org?subject=unsubscribe


Current thread: