aboutsummaryrefslogtreecommitdiffstats
path: root/epan
diff options
context:
space:
mode:
Diffstat (limited to 'epan')
-rw-r--r--epan/dissectors/packet-ssl-utils.c8
-rw-r--r--epan/dissectors/packet-ssl-utils.h8
2 files changed, 8 insertions, 8 deletions
diff --git a/epan/dissectors/packet-ssl-utils.c b/epan/dissectors/packet-ssl-utils.c
index cb8de960cd..5c1c2307e7 100644
--- a/epan/dissectors/packet-ssl-utils.c
+++ b/epan/dissectors/packet-ssl-utils.c
@@ -1200,10 +1200,10 @@ const value_string tls_hello_ext_server_name_type_vs[] = {
{ 0, NULL }
};
-/* draft-ietf-tls-tls13-18 4.2.7 */
+/* draft-ietf-tls-tls13-19 4.2.6 */
const value_string tls_hello_ext_psk_ke_mode[] = {
{ 0, "PSK-only key establishment (psk_ke)" },
- { 1, "PSK key establishment with (EC)DHE key establishment (psk_dhe_ke)" },
+ { 1, "PSK with (EC)DHE key establishment (psk_dhe_ke)" },
{ 0, NULL }
};
@@ -6295,7 +6295,7 @@ static gint
ssl_dissect_hnd_hello_ext_psk_key_exchange_modes(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo,
proto_tree *tree, guint32 offset, guint32 offset_end)
{
- /* https://tools.ietf.org/html/draft-ietf-tls-tls13-18#section-4.2.7
+ /* https://tools.ietf.org/html/draft-ietf-tls-tls13-19#section-4.2.6
* enum { psk_ke(0), psk_dhe_ke(1), (255) } PskKeyExchangeMode;
*
* struct {
@@ -6306,7 +6306,7 @@ ssl_dissect_hnd_hello_ext_psk_key_exchange_modes(ssl_common_dissect_t *hf, tvbuf
/* PskKeyExchangeMode ke_modes<1..255> */
if (!ssl_add_vector(hf, tvb, pinfo, tree, offset, offset_end, &ke_modes_length,
- hf->hf.hs_ext_psk_ke_modes_len, 1, 255)) {
+ hf->hf.hs_ext_psk_ke_modes_length, 1, 255)) {
return offset_end;
}
offset++;
diff --git a/epan/dissectors/packet-ssl-utils.h b/epan/dissectors/packet-ssl-utils.h
index 9e5b242ad1..fb9df9d115 100644
--- a/epan/dissectors/packet-ssl-utils.h
+++ b/epan/dissectors/packet-ssl-utils.h
@@ -769,7 +769,7 @@ typedef struct ssl_common_dissect {
/* TLS 1.3 */
gint hs_ext_draft_version_tls13;
- gint hs_ext_psk_ke_modes_len;
+ gint hs_ext_psk_ke_modes_length;
gint hs_ext_psk_ke_mode;
gint hs_certificate_request_context_length;
gint hs_certificate_request_context;
@@ -1583,13 +1583,13 @@ ssl_common_dissect_t name = { \
FT_UINT16, BASE_DEC, NULL, 0x0, \
"Indicate the version of draft supported by client", HFILL } \
}, \
- { & name .hf.hs_ext_psk_ke_modes_len, \
- { "PSK Key Exchange Modes Length", prefix ".handshake.psk_ke_modes_len", \
+ { & name .hf.hs_ext_psk_ke_modes_length, \
+ { "PSK Key Exchange Modes Length", prefix ".extension.psk_ke_modes_length", \
FT_UINT8, BASE_DEC, NULL, 0x0, \
NULL, HFILL } \
}, \
{ & name .hf.hs_ext_psk_ke_mode, \
- { "PSK Key Exchange Mode", prefix ".handshake.psk_ke_mode", \
+ { "PSK Key Exchange Mode", prefix ".extension.psk_ke_mode", \
FT_UINT8, BASE_DEC, VALS(tls_hello_ext_psk_ke_mode), 0x0, \
"Key exchange modes where the client supports use of PSKs", HFILL } \
}, \