aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-ssl-utils.c
diff options
context:
space:
mode:
authorAlexis La Goutte <alexis.lagoutte@gmail.com>2013-11-18 20:27:04 +0000
committerAlexis La Goutte <alexis.lagoutte@gmail.com>2013-11-18 20:27:04 +0000
commite069d1c9eaa22f1995d9a24a1dd44503809a79aa (patch)
tree65a5efef98a171fc8ee81e73d563b9b37b0e0dea /epan/dissectors/packet-ssl-utils.c
parent123e3d92039770c0a36c4be97ae34c1ef27c4f8e (diff)
From Peter Wu
Add RFC6066 CertificateUrl TLS extension This is not supported by OpenSSL or NSS, the extension itself seems unsafe, but some implementations seem to support it[1]. Untested, no capture available. [1]: http://www.ietf.org/mail-archive/web/tls/current/msg02535.html svn path=/trunk/; revision=53417
Diffstat (limited to 'epan/dissectors/packet-ssl-utils.c')
-rw-r--r--epan/dissectors/packet-ssl-utils.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/epan/dissectors/packet-ssl-utils.c b/epan/dissectors/packet-ssl-utils.c
index 020f0105dc..19e9d85de7 100644
--- a/epan/dissectors/packet-ssl-utils.c
+++ b/epan/dissectors/packet-ssl-utils.c
@@ -484,6 +484,7 @@ const value_string ssl_31_handshake_type[] = {
{ SSL_HND_CERT_VERIFY, "Certificate Verify" },
{ SSL_HND_CLIENT_KEY_EXCHG, "Client Key Exchange" },
{ SSL_HND_FINISHED, "Finished" },
+ { SSL_HND_CERT_URL, "Client Certificate URL" },
{ SSL_HND_CERT_STATUS, "Certificate Status" },
{ SSL_HND_ENCRYPTED_EXTS, "Encrypted Extensions" },
{ 0x00, NULL }
@@ -1075,6 +1076,11 @@ const value_string tls_certificate_type[] = {
{ 0, NULL }
};
+const value_string tls_cert_chain_type[] = {
+ { SSL_HND_CERT_URL_TYPE_INDIVIDUAL_CERT, "Individual Certificates" },
+ { SSL_HND_CERT_URL_TYPE_PKIPATH, "PKI Path" },
+};
+
const value_string tls_cert_status_type[] = {
{ SSL_HND_CERT_STATUS_TYPE_OCSP, "OCSP" },
{ SSL_HND_CERT_STATUS_TYPE_OCSP_MULTI, "OCSP Multi" },