aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPeter Wu <peter@lekensteyn.nl>2019-08-11 18:09:54 +0100
committerAnders Broman <a.broman58@gmail.com>2019-08-11 20:25:00 +0000
commitd4c14dd11cbed18194c42510175bcebf169bc57a (patch)
treeade38371f8e992aae3e9965781e61d38aeb344df
parent486efaedb1d81a482ac76cc6f1b14ca6159cf524 (diff)
TLS: update outdated file-level comment
Some of these links are broken, but most of the information is severely outdated. Replace it my a more up-to-date list of references. Change-Id: I2a7a6041317c281f56ee86fe720a63332d493943 Reviewed-on: https://code.wireshark.org/review/34238 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot Reviewed-by: Anders Broman <a.broman58@gmail.com>
-rw-r--r--epan/dissectors/packet-tls.c60
1 files changed, 22 insertions, 38 deletions
diff --git a/epan/dissectors/packet-tls.c b/epan/dissectors/packet-tls.c
index ec59e3c7b9..f33822622b 100644
--- a/epan/dissectors/packet-tls.c
+++ b/epan/dissectors/packet-tls.c
@@ -1,58 +1,37 @@
/* packet-tls.c
* Routines for TLS dissection
* Copyright (c) 2000-2001, Scott Renfro <scott@renfro.org>
+ * Copyright 2013-2019, Peter Wu <peter@lekensteyn.nl>
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+/*
+ * Supported protocol versions:
*
- * See
- *
- * http://www.mozilla.org/projects/security/pki/nss/ssl/draft02.html
- *
- * for SSL 2.0 specs.
- *
- * See
- *
- * http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt
- *
- * for SSL 3.0 specs.
- *
- * See RFC 2246 for SSL 3.1/TLS 1.0 specs.
- *
- * See
- *
- * http://research.sun.com/projects/crypto/draft-ietf-tls-ecc-05.txt
+ * TLS 1.3, 1.2, 1.0, and SSL 3.0. SSL 2.0 is no longer supported, except for
+ * the SSL 2.0-compatible Client Hello.
*
- * for Elliptic Curve Cryptography cipher suites.
+ * Primary protocol specifications:
*
- * See
+ * https://tools.ietf.org/html/draft-hickman-netscape-ssl-00 - SSL 2.0
+ * https://tools.ietf.org/html/rfc6101 - SSL 3.0
+ * https://tools.ietf.org/html/rfc2246 - TLS 1.0
+ * https://tools.ietf.org/html/rfc4346 - TLS 1.1
+ * https://tools.ietf.org/html/rfc5246 - TLS 1.2
+ * https://tools.ietf.org/html/rfc8446 - TLS 1.3
*
- * http://www.ietf.org/internet-drafts/draft-ietf-tls-camellia-04.txt
+ * Important IANA registries:
*
- * for Camellia-based cipher suites.
+ * https://www.iana.org/assignments/tls-parameters/
+ * https://www.iana.org/assignments/tls-extensiontype-values/
*
* Notes:
*
- * - Does not support dissection
- * of frames that would require state maintained between frames
- * (e.g., single ssl records spread across multiple tcp frames)
- *
- * - Identifies, but does not fully dissect the following messages:
- *
- * - SSLv3/TLS (These need more state from previous handshake msgs)
- * - Certificate Verify
- *
- * - SSLv2 (These don't appear in the clear)
- * - Error
- * - Client Finished
- * - Server Verify
- * - Server Finished
- * - Request Certificate
- * - Client Certificate
- *
* - Decryption needs to be performed 'sequentially', so it's done
* at packet reception time. This may cause a significant packet capture
* slow down. This also causes dissection of some ssl info that in previous
@@ -61,6 +40,11 @@
*
* We are at Packet reception if time pinfo->fd->visited == 0
*
+ * - Many dissection and decryption operations are implemented in
+ * epan/dissectors/packet-tls-utils.c and
+ * epan/dissectors/packet-tls-utils.h due to an overlap of functionality
+ * with DTLS (epan/dissectors/packet-dtls.c).
+ *
*/
#include "config.h"