Age | Commit message (Collapse) | Author | Files | Lines |
|
- do not flush SSL debug output after each message but only once per packet
svn path=/trunk/; revision=23680
|
|
svn path=/trunk/; revision=23651
|
|
This patch updates the DTLS dissector to be compatible with OpenSSL 0.9.8f in
the following ways:
* Handle both SSL version number 0xfeff (RFC 4347 and OpenSSL 0.9.8f), and
0x100 (Used by OpenSSL 0.9.8e and earlier)
* Reassemble fragmented handshake messages.
svn path=/trunk/; revision=23369
|
|
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1827
Update README.developer to tell developers not to use fopen() and friends
directly.
svn path=/trunk/; revision=23206
|
|
svn path=/trunk/; revision=23047
|
|
svn path=/trunk/; revision=22822
|
|
svn path=/trunk/; revision=22820
|
|
Add Elliptic Curve cypher suites
Add extension types
svn path=/trunk/; revision=22654
|
|
svn path=/trunk/; revision=22356
|
|
I ran into a problem trying to debug some of my stuff yesterday that depends on the http dissector, and the server I'm working with defaults to ssl traffic; whenever I try to debug it, it always gets hung up on the lines I mentioned in the email quoted below (within the ssl dissector).
It seems the culprit is in the use of g_malloc within ssl_data_alloc, and free (instead of g_free) in tls_prf.
I've attached the diff for the fixes I made.
svn path=/trunk/; revision=21929
|
|
--enable-extra-gcc-checks set.
If we turn on -pedantic, try turning on -Wno-long-long as well, so that
it's not *so* pedantic that it rejects the 64-bit integral data types
that we explicitly require.
Constify a bunch of stuff, and make some other changes, to get rid of
warnings.
Clean up some indentation.
svn path=/trunk/; revision=21526
|
|
svn path=/trunk/; revision=21445
|
|
svn path=/trunk/; revision=21381
|
|
svn path=/trunk/; revision=21374
|
|
is not defined.
svn path=/trunk/; revision=21371
|
|
svn path=/trunk/; revision=21370
|
|
- SSL DEFLATE compression method support (RFC3749)
- fix for Bugzilla Bug 1515: SSL bug with mutual authentication
svn path=/trunk/; revision=21368
|
|
one does not work well in many cases
svn path=/trunk/; revision=20405
|
|
svn path=/trunk/; revision=20305
|
|
other parameters) into SSL dissector from external source, e.g. private 'trace protocol' dissector
- call 'data' subdissector for decrypted data in real dissector is not found
svn path=/trunk/; revision=20300
|
|
svn path=/trunk/; revision=20230
|
|
svn path=/trunk/; revision=20108
|
|
svn path=/trunk/; revision=19072
|
|
- register H.225.0 over TLS (configurable port 1300)
- register SIP over TLS (fixed port 5061)
- new function proto_tree_get_root()
svn path=/trunk/; revision=19059
|
|
(similar to dissector_add())
svn path=/trunk/; revision=19026
|
|
svn path=/trunk/; revision=18863
|
|
ssl and dtls updates
svn path=/trunk/; revision=18816
|
|
have to worry about comments in the routine.
Fix up indentation a bit.
svn path=/trunk/; revision=18623
|
|
SSL updates and DTLS support
svn path=/trunk/; revision=18582
|
|
authesserre samuel <sauthess@gmail.com> kindly pointed out an issue with session renegotiation in the current ssl decryption code.
Encrypted handshake message are decrypted, but the dissector try to interpret the encrypted code. Renegotiation messages are therefore ignored. The attached pcap trace and key can be used to trigger the issue.
The attached patch fix the problem storing the decrypted version of encrypted handshake message and dissecting it when available. The patch also fix bad issue with des cipher (alike the issue fixed in my previous post)
svn path=/trunk/; revision=18081
|
|
The current ssl decryption code does not work for 3des session.
The attached patch fixes the problem.
svn path=/trunk/; revision=18004
|
|
Coverity CID 31
svn path=/trunk/; revision=17645
|
|
FIxes Coverity's run 14 CID 81
svn path=/trunk/; revision=17525
|
|
the attached patch fix a couple of possible memory leak in the ssl
decryption code, add some indentation fix, more comments and add the
preference to select the debug output (missing in previous patch)
svn path=/trunk/; revision=17281
|
|
The attached patch cleanup the debug infrastructure for ssl dissector.
Debug messages are by default off and can be enabled via the ssl
dissector preference. Debug output can be directed to stderr or file.
svn path=/trunk/; revision=17253
|
|
The attached patch fix bug 732.
The problem was in the client key dissection. On ssl v3 the encrypted
data is the whole record data, on tls v1 the encrypted data is preceded
by the 2 bytes length of the encrypted data itself.
svn path=/trunk/; revision=17244
|
|
Set up to build on Windows if we have GNU TLS.
Define "ssl_data_set()" regardless of whether we have GNU TLS or
not, as it's used in either case.
Get rid of an extra #include of epan/gnuc_format_check.h.
svn path=/trunk/; revision=17177
|
|
Also, remove some trailing white space.
svn path=/trunk/; revision=17175
|
|
svn path=/trunk/; revision=17171
|
|
packet-ssl-utils.c; everything else that includes it is a header file.
svn path=/trunk/; revision=17170
|
|
svn path=/trunk/; revision=17169
|
|
I have developed an external plugin to enable ssl decryption in
ethereal.
Me
- Remove unnecessary $Id$ from acinclude.m4
- Added packet-ssl-utils.h to Makefile.common
- Fixed a few warnings
TODO
- Lots of warning fixes (see separate mail)
- Reformat function headers to read like the others do
(return value<newline>function-name...)
- Test on Windows platform
- Review the patch to packet-ssl.c and new files packet-ssl-utils.[hc]
svn path=/trunk/; revision=17156
|