Age | Commit message (Collapse) | Author | Files | Lines |
|
Change-Id: Iae157730303f13e8b2abe73306e88bb070c78256
Reviewed-on: https://code.wireshark.org/review/22536
Reviewed-by: Anders Broman <a.broman58@gmail.com>
|
|
check
Change-Id: I9c51032060b821f79ba2fbbc496d6ce1e20ce304
Reviewed-on: https://code.wireshark.org/review/22535
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
|
|
Facebook uses a derivative of QUIC protocol (on top of TCP) for Android device
The dissector was reverse engineered based off of QUIC dissector functionality
Pcap avaliable https://github.com/ntop/nDPI/issues/300
Some information (not spec) can be found here:
https://code.facebook.com/posts/608854979307125/building-zero-protocol-for-fast-secure-mobile-connections/
Change-Id: I4026bb992aa17a0c679379646b388a694f24a07f
Reviewed-on: https://code.wireshark.org/review/18937
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
|