aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-ssl-utils.h
diff options
context:
space:
mode:
authorAlexis La Goutte <alexis.lagoutte@gmail.com>2016-10-06 12:44:43 +0200
committerMichael Mann <mmann78@netscape.net>2016-10-07 11:43:50 +0000
commit196c2b1284464239a47bc910c0d6abaac99ee007 (patch)
treec1ccb23b66dabe8a2fc9f08c3efa39a1f5b0cd7a /epan/dissectors/packet-ssl-utils.h
parent5b3dcb671f37ff635be47f778b6985a21163e5d6 (diff)
TLS(1.3): Add Hello Retry Request (6) extension
Add also special case on hello key_share extension Ping-Bug: 12779 Change-Id: Ib8e2dd060f322c2404a8afa9b8cb70de7c2c65b7 Reviewed-on: https://code.wireshark.org/review/18093 Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Reviewed-by: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Michael Mann <mmann78@netscape.net>
Diffstat (limited to 'epan/dissectors/packet-ssl-utils.h')
-rw-r--r--epan/dissectors/packet-ssl-utils.h14
1 files changed, 13 insertions, 1 deletions
diff --git a/epan/dissectors/packet-ssl-utils.h b/epan/dissectors/packet-ssl-utils.h
index 1e589a137c..0c416e2669 100644
--- a/epan/dissectors/packet-ssl-utils.h
+++ b/epan/dissectors/packet-ssl-utils.h
@@ -62,6 +62,7 @@ typedef enum {
SSL_HND_SERVER_HELLO = 2,
SSL_HND_HELLO_VERIFY_REQUEST = 3,
SSL_HND_NEWSESSION_TICKET = 4,
+ SSL_HND_HELLO_RETRY_REQUEST = 6,
SSL_HND_CERTIFICATE = 11,
SSL_HND_SERVER_KEY_EXCHG = 12,
SSL_HND_CERT_REQUEST = 13,
@@ -672,6 +673,7 @@ typedef struct ssl_common_dissect {
gint hs_ext_key_share_group;
gint hs_ext_key_share_key_exchange_length;
gint hs_ext_key_share_key_exchange;
+ gint hs_ext_key_share_selected_group;
gint hs_ext_psk_identities_length;
gint hs_ext_psk_identity_ke_modes_length;
gint hs_ext_psk_identity_ke_mode;
@@ -831,6 +833,11 @@ ssl_dissect_hnd_srv_hello(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info*
gboolean is_dtls);
extern void
+ssl_dissect_hnd_hello_retry_request(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info* pinfo,
+ proto_tree *tree, guint32 offset, guint32 length,
+ SslSession *session, SslDecryptSession *ssl);
+
+extern void
ssl_dissect_hnd_new_ses_ticket(ssl_common_dissect_t *hf, tvbuff_t *tvb,
proto_tree *tree, guint32 offset,
SslDecryptSession *ssl,
@@ -881,7 +888,7 @@ ssl_common_dissect_t name = { \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
- -1, -1, -1, \
+ -1, -1, -1, -1, \
}, \
/* ett */ { \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
@@ -1005,6 +1012,11 @@ ssl_common_dissect_t name = { \
FT_BYTES, BASE_NONE, NULL, 0x0, \
NULL, HFILL } \
}, \
+ { & name .hf.hs_ext_key_share_selected_group, \
+ { "Selected Group", prefix ".handshake.extensions_key_share_selected_group", \
+ FT_UINT16, BASE_DEC, VALS(ssl_extension_curves), 0x00, \
+ NULL, HFILL } \
+ }, \
{ & name .hf.hs_ext_psk_identities_length, \
{ "Identities Length", prefix ".handshake.extensions.psk.identities.length", \
FT_UINT16, BASE_DEC, NULL, 0x0, \