Le 20/10/2012 17:33, Sho Amano a écrit : > Okey, I figured out that following quick hack works for me. Now I can see > the decrypted TCP packets. > (build running on Ubuntu 12.04 amd64) > > $ svn diff > Index: epan/dissectors/packet-ieee80211.c > =================================================================== > --- epan/dissectors/packet-ieee80211.c (revision 45658) > +++ epan/dissectors/packet-ieee80211.c (working copy) > @@ -17369,7 +17369,7 @@ > keys->Keys[keys->nKeys] = key; > keys->nKeys++; > } > - else if(dk->type == AIRPDCAP_KEY_TYPE_WPA_PMK) > + else if(dk->type == AIRPDCAP_KEY_TYPE_WPA_PSK) > { > key.KeyType = AIRPDCAP_KEY_TYPE_WPA_PMK; > > > Thanks.
Hi Sho, thanks for the report and patch. I committed a slightly different version in r45696 and scheduled it for backport in 1.8.4. Regards, Pascal. ___________________________________________________________________________ Sent via: Wireshark-dev mailing list <wireshark-dev@wireshark.org> Archives: http://www.wireshark.org/lists/wireshark-dev Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe