diff options
author | Aurelien Aptel <aaptel@suse.com> | 2020-02-19 22:30:37 +0100 |
---|---|---|
committer | Alexis La Goutte <alexis.lagoutte@gmail.com> | 2020-02-23 06:13:30 +0000 |
commit | b8f9448c7887729ce82efeb097da01b9f8d246de (patch) | |
tree | 9c6bebb4d0ce360e5373a5b689baa24ed0dbfcaa /epan/dissectors/packet-netlink.c | |
parent | 95a37ff2fe1017bd2a97e9f0d96d9fd0faffdbf4 (diff) |
SMB2: try to guess encryption settings when not available
When dissecting a capture made in the middle of an existing encrypted
session we cannot decrypt the traffic because we don't know:
* what SMB dialect and encryption algorithm was picked during the
session establishment
* which host is the server and which host is the client
Since we know the decrypted payload always starts with a valid header
we use this as an heuristic and try all possible decryption settings.
Change-Id: I1daa297ced98e62cf361b9022871c668e56f8f4b
Reviewed-on: https://code.wireshark.org/review/36136
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Diffstat (limited to 'epan/dissectors/packet-netlink.c')
0 files changed, 0 insertions, 0 deletions