summaryrefslogtreecommitdiff
path: root/epan/dissectors/packet-ssl-utils.h
diff options
context:
space:
mode:
authorPeter Wu <peter@lekensteyn.nl>2016-12-29 20:17:18 +0100
committerAnders Broman <a.broman58@gmail.com>2017-01-09 05:18:26 +0000
commit86a5bf5abe53457dd5cfbde33b4670b6bf3efc94 (patch)
treeac283a44bbffa36b10ac2d0b621be92f2bf793e1 /epan/dissectors/packet-ssl-utils.h
parent45d967c803324a50852d4c4615a521e6e245a5dd (diff)
downloadwireshark-86a5bf5abe53457dd5cfbde33b4670b6bf3efc94.tar.gz
TLS(1.3): update PSK extension for draft -18
Removed ke_modes and auth_modes fields, add identity.obfuscated_ticket_age and binders fields. (Note that binders field is not dissected further at this moment due to the lack of a pcap for verification.) Ping-Bug: 12779 Change-Id: I9af7d93feb2352a494be2d5bda66d124267cf464 Reviewed-on: https://code.wireshark.org/review/19462 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'epan/dissectors/packet-ssl-utils.h')
-rw-r--r--epan/dissectors/packet-ssl-utils.h47
1 files changed, 20 insertions, 27 deletions
diff --git a/epan/dissectors/packet-ssl-utils.h b/epan/dissectors/packet-ssl-utils.h
index c1808ed90d..43e408028a 100644
--- a/epan/dissectors/packet-ssl-utils.h
+++ b/epan/dissectors/packet-ssl-utils.h
@@ -223,7 +223,6 @@ extern const value_string ssl_extension_ec_point_formats[];
extern const value_string ssl_curve_types[];
extern const value_string tls_hello_ext_server_name_type_vs[];
extern const value_string tls_hello_ext_psk_ke_mode[];
-extern const value_string tls_hello_ext_psk_auth_mode[];
/* XXX Should we use GByteArray instead? */
typedef struct _StringInfo {
@@ -680,12 +679,11 @@ typedef struct ssl_common_dissect {
gint hs_ext_key_share_key_exchange;
gint hs_ext_key_share_selected_group;
gint hs_ext_psk_identities_length;
- gint hs_ext_psk_identity_ke_modes_length;
- gint hs_ext_psk_identity_ke_mode;
- gint hs_ext_psk_identity_auth_modes_length;
- gint hs_ext_psk_identity_auth_mode;
- gint hs_ext_psk_identity_length;
- gint hs_ext_psk_identity;
+ gint hs_ext_psk_identity_identity_length;
+ gint hs_ext_psk_identity_identity;
+ gint hs_ext_psk_identity_obfuscated_ticket_age;
+ gint hs_ext_psk_binders_length;
+ gint hs_ext_psk_binders;
gint hs_ext_psk_identity_selected;
gint hs_ext_early_data_obfuscated_ticket_age;
gint hs_ext_supported_versions_len;
@@ -899,7 +897,7 @@ ssl_common_dissect_t name = { \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
- -1, -1, -1, -1, -1, -1, -1, -1, \
+ -1, -1, -1, -1, -1, -1, -1, \
}, \
/* ett */ { \
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, \
@@ -1033,34 +1031,29 @@ ssl_common_dissect_t name = { \
FT_UINT16, BASE_DEC, NULL, 0x0, \
NULL, HFILL } \
}, \
- { & name .hf.hs_ext_psk_identity_ke_modes_length, \
- { "Key Exchange Modes length", prefix ".handshake.extensions.psk.identity.ke_modes_length", \
- FT_UINT8, BASE_DEC, NULL, 0x0, \
- NULL, HFILL } \
- }, \
- { & name .hf.hs_ext_psk_identity_ke_mode, \
- { "Key Exchange Mode", prefix ".handshake.extensions.psk.identity.ke_mode", \
- FT_UINT8, BASE_DEC, VALS(tls_hello_ext_psk_ke_mode), 0x0, \
+ { & name .hf.hs_ext_psk_identity_identity_length, \
+ { "Identity Length", prefix ".handshake.extensions.psk.identity.identity_length", \
+ FT_UINT16, BASE_DEC, NULL, 0x0, \
NULL, HFILL } \
}, \
- { & name .hf.hs_ext_psk_identity_auth_modes_length, \
- { "Authentication Modes length", prefix ".handshake.extensions.psk.identity.auth_modes_length", \
- FT_UINT8, BASE_DEC, NULL, 0x0, \
+ { & name .hf.hs_ext_psk_identity_identity, \
+ { "Identity", prefix ".handshake.extensions.psk.identity.identity", \
+ FT_BYTES, BASE_NONE, NULL, 0x0, \
NULL, HFILL } \
}, \
- { & name .hf.hs_ext_psk_identity_auth_mode, \
- { "Authentication Mode", prefix ".handshake.extensions.psk.identity.auth_mode", \
- FT_UINT8, BASE_DEC, VALS(tls_hello_ext_psk_auth_mode), 0x0, \
+ { & name .hf.hs_ext_psk_identity_obfuscated_ticket_age, \
+ { "Obfuscated Ticket Age", prefix ".handshake.extensions.psk.identity.obfuscated_ticket_age", \
+ FT_UINT32, BASE_DEC, NULL, 0x0, \
NULL, HFILL } \
}, \
- { & name .hf.hs_ext_psk_identity_length, \
- { "Identity Length", prefix ".handshake.extensions.psk.identity.length", \
+ { & name .hf.hs_ext_psk_binders_length, \
+ { "PSK Binders length", prefix ".handshake.extensions.psk.binders_len", \
FT_UINT16, BASE_DEC, NULL, 0x0, \
NULL, HFILL } \
}, \
- { & name .hf.hs_ext_psk_identity, \
- { "Identity", prefix ".handshake.extensions.psk.identity", \
- FT_BYTES, BASE_NONE, NULL, 0x0, \
+ { & name .hf.hs_ext_psk_binders, \
+ { "PSK Binders", prefix ".handshake.extensions.psk.binders", \
+ FT_NONE, BASE_NONE, NULL, 0x0, \
NULL, HFILL } \
}, \
{ & name .hf.hs_ext_psk_identity_selected, \