WireGuard: implement peer identification based on MAC1
authorPeter Wu <peter@lekensteyn.nl>
Fri, 22 Jun 2018 17:36:11 +0000 (19:36 +0200)
committerAnders Broman <a.broman58@gmail.com>
Wed, 8 Aug 2018 11:25:08 +0000 (11:25 +0000)
commitcf9f1cac07130e3da2ef5e51c9232b7c206dcde2
treec1e9e9c70dc28f6826f7785f1a21ca56d5fadb74
parentd7187e0b1ba0303dc493c4a75d9949cfca8ede98
WireGuard: implement peer identification based on MAC1

Using long-term static public keys, it is possible to identify the
recipient of a handshake message. Add a new UAT where such keys can be
configured. Allow private keys to be configured as well since this
enables decryption of the Initiation handshake message.

Bug: 15011
Change-Id: I0d4df046824eac6c333e0df75f69f73d10ed8e5e
Reviewed-on: https://code.wireshark.org/review/28988
Reviewed-by: Anders Broman <a.broman58@gmail.com>
epan/dissectors/packet-wireguard.c
test/captures/wireguard-ping-tcp.pcap [new file with mode: 0644]
test/suite_decryption.py