diff options
author | Andreas Schultz <aschultz@warp10.net> | 2015-03-26 10:23:58 +0100 |
---|---|---|
committer | Anders Broman <a.broman58@gmail.com> | 2015-03-26 14:48:55 +0000 |
commit | a5963612286c706146d477042b722d34d9ba20d7 (patch) | |
tree | 90d90499bad469e186edf0e8bdcb6039028bc21f /epan | |
parent | 680dfc1e2fa755e08981d1e4ce523bff04f42384 (diff) |
DTLS: use addresses_ports_reassembly_table_functions
When capturing two consecutive DTLS session to the same server,
fragments for the second session report a error:
> [Reassembly error, protocol DTLS: New fragment overlaps old data (retransmission?)]
It turns out that the DTLS dissector uses the addresses_reassembly_table_functions
which takes only the IP addresses into account and not the ports.
Changing that to the addresses_ports_reassembly_table_functions
fixes the bogus error message.
Change-Id: If317314dca4b1d46e802bac54c07c89c7a73e24e
Reviewed-on: https://code.wireshark.org/review/7824
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'epan')
-rw-r--r-- | epan/dissectors/packet-dtls.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/epan/dissectors/packet-dtls.c b/epan/dissectors/packet-dtls.c index 2c9f770cea..60ab1b11a1 100644 --- a/epan/dissectors/packet-dtls.c +++ b/epan/dissectors/packet-dtls.c @@ -186,7 +186,7 @@ dtls_init(void) ssl_common_init(&dtls_master_key_map, &dtls_keylog_file, &dtls_decrypted_data, &dtls_compressed_data); - reassembly_table_init (&dtls_reassembly_table, &addresses_reassembly_table_functions); + reassembly_table_init (&dtls_reassembly_table, &addresses_ports_reassembly_table_functions); /* We should have loaded "keys_list" by now. Mark it obsolete */ if (dtls_module) { |