diff options
author | Peter Wu <peter@lekensteyn.nl> | 2019-08-11 18:09:54 +0100 |
---|---|---|
committer | Anders Broman <a.broman58@gmail.com> | 2019-08-11 20:25:00 +0000 |
commit | d4c14dd11cbed18194c42510175bcebf169bc57a (patch) | |
tree | ade38371f8e992aae3e9965781e61d38aeb344df | |
parent | 486efaedb1d81a482ac76cc6f1b14ca6159cf524 (diff) |
TLS: update outdated file-level comment
Some of these links are broken, but most of the information is severely
outdated. Replace it my a more up-to-date list of references.
Change-Id: I2a7a6041317c281f56ee86fe720a63332d493943
Reviewed-on: https://code.wireshark.org/review/34238
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
-rw-r--r-- | epan/dissectors/packet-tls.c | 60 |
1 files changed, 22 insertions, 38 deletions
diff --git a/epan/dissectors/packet-tls.c b/epan/dissectors/packet-tls.c index ec59e3c7b9..f33822622b 100644 --- a/epan/dissectors/packet-tls.c +++ b/epan/dissectors/packet-tls.c @@ -1,58 +1,37 @@ /* packet-tls.c * Routines for TLS dissection * Copyright (c) 2000-2001, Scott Renfro <scott@renfro.org> + * Copyright 2013-2019, Peter Wu <peter@lekensteyn.nl> * * Wireshark - Network traffic analyzer * By Gerald Combs <gerald@wireshark.org> * Copyright 1998 Gerald Combs * * SPDX-License-Identifier: GPL-2.0-or-later + */ + +/* + * Supported protocol versions: * - * See - * - * http://www.mozilla.org/projects/security/pki/nss/ssl/draft02.html - * - * for SSL 2.0 specs. - * - * See - * - * http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt - * - * for SSL 3.0 specs. - * - * See RFC 2246 for SSL 3.1/TLS 1.0 specs. - * - * See - * - * http://research.sun.com/projects/crypto/draft-ietf-tls-ecc-05.txt + * TLS 1.3, 1.2, 1.0, and SSL 3.0. SSL 2.0 is no longer supported, except for + * the SSL 2.0-compatible Client Hello. * - * for Elliptic Curve Cryptography cipher suites. + * Primary protocol specifications: * - * See + * https://tools.ietf.org/html/draft-hickman-netscape-ssl-00 - SSL 2.0 + * https://tools.ietf.org/html/rfc6101 - SSL 3.0 + * https://tools.ietf.org/html/rfc2246 - TLS 1.0 + * https://tools.ietf.org/html/rfc4346 - TLS 1.1 + * https://tools.ietf.org/html/rfc5246 - TLS 1.2 + * https://tools.ietf.org/html/rfc8446 - TLS 1.3 * - * http://www.ietf.org/internet-drafts/draft-ietf-tls-camellia-04.txt + * Important IANA registries: * - * for Camellia-based cipher suites. + * https://www.iana.org/assignments/tls-parameters/ + * https://www.iana.org/assignments/tls-extensiontype-values/ * * Notes: * - * - Does not support dissection - * of frames that would require state maintained between frames - * (e.g., single ssl records spread across multiple tcp frames) - * - * - Identifies, but does not fully dissect the following messages: - * - * - SSLv3/TLS (These need more state from previous handshake msgs) - * - Certificate Verify - * - * - SSLv2 (These don't appear in the clear) - * - Error - * - Client Finished - * - Server Verify - * - Server Finished - * - Request Certificate - * - Client Certificate - * * - Decryption needs to be performed 'sequentially', so it's done * at packet reception time. This may cause a significant packet capture * slow down. This also causes dissection of some ssl info that in previous @@ -61,6 +40,11 @@ * * We are at Packet reception if time pinfo->fd->visited == 0 * + * - Many dissection and decryption operations are implemented in + * epan/dissectors/packet-tls-utils.c and + * epan/dissectors/packet-tls-utils.h due to an overlap of functionality + * with DTLS (epan/dissectors/packet-dtls.c). + * */ #include "config.h" |