aboutsummaryrefslogtreecommitdiffstats
path: root/airpcap_loader.h
Commit message (Collapse)AuthorAgeFilesLines
* IEEE 802.11: 802.1X (WPA-EAP) rekeying supportdeagol2015-12-211-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch extends the existing decryption support for WPA to also handle rekeys by checking each decrypted packet for a 4-way-handshake. Rekeys can be used for WPA-PSK, but are more common with WPA-Enterprise (WPA-EAP). For decrypting WPA-EAP secured packets the user must provide all used PMK's of the connection (aka PSK's) as WPA-PSK 32 byte hex values to wireshark via the existing interface. (The capture must have all 4-way-handshakes included also, starting with the first unencrypted one.) Every decrypted unicast packet will habe the used PMK and TK shown in the CCMP/TKIP section below the key index in the GUI. Group packets will display the GTK instead. Additionally this fixes a small issue with group rekey handling, so every packet can be selected in the GUI in random order, removing the need to manually find the correct group keying packets prior to that. It was tested primary with WPA-CCMP, but TKIP is also working. One section in the code touch bluetooth 802.1X support. It should do exactly the same, but will now also examine all decypted packets for rekeys. Ping-Bug: 11172 Change-Id: I19d055581fce6268df888da63485a48326046748 Reviewed-on: https://code.wireshark.org/review/8268 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com> Reviewed-on: https://code.wireshark.org/review/12777 Reviewed-by: Guy Harris <guy@alum.mit.edu>
* Remove all $Id$ from top of fileAlexis La Goutte2014-03-041-2/+0
| | | | | | | | | | (Using sed : sed -i '/^ \* \$Id\$/,+1 d') Fix manually some typo (in export_object_dicom.c and crc16-plain.c) Change-Id: I4c1ae68d1c4afeace8cb195b53c715cf9e1227a8 Reviewed-on: https://code.wireshark.org/review/497 Reviewed-by: Anders Broman <a.broman58@gmail.com>
* Clean up white space (get rid of 4-space tabs).Guy Harris2013-02-171-31/+31
| | | | svn path=/trunk/; revision=47697
* Update Free Software Foundation address.Jakub Zawadzki2012-06-281-1/+1
| | | | | | (COPYING will be updated in next commit) svn path=/trunk/; revision=43536
* Add 'extern "C"' wrappers and #include guards to various header files.Gerald Combs2011-12-291-0/+8
| | | | svn path=/trunk/; revision=40321
* () -> (void)Jörg Mayer2009-05-131-8/+8
| | | | svn path=/trunk/; revision=28352
* Make it compile without warnings on OSX.Stig Bjørlykke2009-05-131-6/+0
| | | | svn path=/trunk/; revision=28343
* Replace all Windows types by glib types - hopefully theJörg Mayer2009-05-131-78/+78
| | | | | | | | | | | | | correct ones. Use buildbot as a compile test on Windows. This makes "configure --enable-airpcap && make" succeed on Linux. It crashes the moment you click the wireless settings button because some relevant information isn't present (nullpointer deref). svn path=/trunk/; revision=28340
* Instead of converting between 802.11 frequencies and channels umpteenGerald Combs2007-08-171-18/+0
| | | | | | | | | | different ways, add a set of common conversion routines. Add a "Frequency/Channel" column and fill it in where we can. Fix RSSI column printing in PPI. Fix up whitespace along the way. svn path=/trunk/; revision=22538
* From Dustin Johnson:Gerald Combs2007-05-181-21/+72
| | | | | | | | | | | | | | - Update the wireless/AirPcap GUI code to support 802.11n as well as some related upcoming code changes. - Remove airpcap.h from the repository, since it exists in the AirPcap devpack (and will be superseded Real Soon Now). - Show the individual channel flag bits in radiotap. Fix the 802.11n MCS set display. This is a partial checkin, so hopefully nothing is broken. svn path=/trunk/; revision=21831
* Fix bug 1377:Jeff Morriss2007-04-111-0/+1
| | | | | | | | | | | | | | http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1377 and complaints to the mailing list that a bogus (empty or non-ASCII contents) dialog box was popped up when getting the list of interfaces. The problem was that 'get_airpcap_interface_list()' wasn't setting the returned error value when it found that AirPcap was not loaded. If whatever was in that variable happened to be 1 when a non-AirPcap user requested the list of interfaces then the bogus dialog would show up. svn path=/trunk/; revision=21380
* Spelling fixes.Gerald Combs2007-01-261-2/+2
| | | | svn path=/trunk/; revision=20561
* Propagate the recent interface list changes (r20521) to the AirPcap code.Gerald Combs2007-01-231-1/+1
| | | | | | Fix a mismatched declaration found by Gisle Vanem. svn path=/trunk/; revision=20535
* Have the routines to get interface lists take a pointer to a "gchar *"Guy Harris2007-01-211-7/+0
| | | | | | | | | | | | | | | | | | | | as an argument, and, on an error, if they have an error message, have them set that "gchar *" to point to a g_malloc()ed string containing the error message, rather than taking a pointer to a buffer for that message as an argument. That's more like what's done in Wiretap, and doesn't impose an upper limit on the lengths of those error messages. If that pointer is null, don't allocate the message string and return it. Have that error message already have the "cant_get" processing applied to it, so nobody other than those routines need to call the "cant_get" routines to process the error messages. Have get_airpcap_interface_list() explicitly set "*err" to the appropriate error code. Clean up indentation. svn path=/trunk/; revision=20521
* Add uri_str_to_bytes(), byte_array_dup(), and byte_array_equal()Gerald Combs2007-01-111-13/+0
| | | | | | | | | | | | functions to strutil. Use GByteArrays to store SSIDs for decryption, and let the user specify arbitrary byte strings using percent-encoded strings. We should probably add percent encoding for pass phrases as well, so you can escape the ":" character. Move the key struct key conversion utilities to airpdcap.c, and remove duplicate code from packet-ieee80211.c. Fix a lot of indentation. svn path=/trunk/; revision=20388
* From Gisle Vanem:Gerald Combs2007-01-021-0/+2
| | | | | | | | | | | | | | | Here are some patches needed to build using HAVE_AIRPCAP on MingW: * airpcap.h needs 'WEP_KEY_MAX_SIZE' from <epan/crypt/wep-wpadefs.h>. * airpcap_loader.h needs <epan/crypt/airpdcap_user.h> and definition of 'decryption_key_t'. * epan/crypt/airpdcap_interop.h defines 'ntohs()' before <winsock2.h> gets included. Thus creating a parse error later on. svn path=/trunk/; revision=20274
* Prepare to move the airpdcap code to epan/crypt (SVN won't let me actuallyGerald Combs2006-12-271-63/+3
| | | | | | | | | | move the files until these changes are checked in). Add an AC_DEFINE for airpdcap (which will be removed once the changes have settled). Update the airpdcap code to compile on non-Windows systems. Fix up comments and whitespace to conform more closely to the rest of the code base. Verified to compile under Windows and OS X. svn path=/trunk/; revision=20227
* From Davide Schiera and Giorgio Tino: Add initial WPA/WPA2 decryptionGerald Combs2006-12-051-18/+66
| | | | | | | | | | | | support. WEP key preferences have been overloaded to allow WPA keys. The decryption code currently uses Windows-specific data types, but can be converted to use glib equivalents. Add a few text and whitespace fixups. svn path=/trunk/; revision=20049
* From Giorgio Tino: Add support for version 2.0 of the AirPcap driver, Gerald Combs2006-10-301-3/+110
| | | | | | which has an updated API for WEP key handling. svn path=/trunk/; revision=19736
* Rename get_epan_and_portaudio_version_info() to get_gui_compiled_info()Gerald Combs2006-10-191-8/+18
| | | | | | | and add version info for AirPcap. Add a corresponding get_gui_runtime_info(). Fix up whitespace. svn path=/trunk/; revision=19620
* Add support for:Gerald Combs2006-10-191-1/+137
| | | | | | | | | | | - The AirPcap Multi-Channel Aggregator (which is marketspeak for an "any" device) - Merging the 802.11 dissector WEP key list with AirPcap's - Decrypting WEP in the adapter, in Wireshark, or not at all Update the release notes. svn path=/trunk/; revision=19599
* First step in integrating the AirPcap WEP preferences with thoseGerald Combs2006-10-101-2/+0
| | | | | | | | from the 802.11 dissector. Use a #define for the maximum number of WEP keys. Use AirPcap's if we have it (64). Rename find_module() prefs_find_module() and make it public. svn path=/trunk/; revision=19467
* Fix WEP key bug in the AirPcap code that could cause a crash. EnableGerald Combs2006-10-021-0/+8
| | | | | | | AirPcap by default. Add initial support for the "Any" device in AirPcap (more to come). svn path=/trunk/; revision=19401
* remove obsolete "HAVE_AIRPCAP_API" commentUlf Lamping2006-09-121-2/+0
| | | | svn path=/trunk/; revision=19197
* Fix up copyrights and whitespace.Gerald Combs2006-08-211-31/+34
| | | | svn path=/trunk/; revision=18981
* Add support for AirPcap, an upcoming wireless product from CACE. SupportGerald Combs2006-08-161-0/+296
is disabled by default, and can be enabled by setting AIRPCAP_CONFIG in config.nmake. The code is currently limited to Windows, but should be adaptable to other platforms. The official announcement won't come until next week, so you'll have to read the source for details. :) svn path=/trunk/; revision=18928