12#ifndef __PACKET_TLS_UTILS_H__
13#define __PACKET_TLS_UTILS_H__
28#define SSL_CIPHER_CTX gcry_cipher_hd_t
29#define SSL_DECRYPT_DEBUG
34 SSL_ID_CHG_CIPHER_SPEC = 0x14,
36 SSL_ID_HANDSHAKE = 0x16,
37 SSL_ID_APP_DATA = 0x17,
38 SSL_ID_HEARTBEAT = 0x18,
39 SSL_ID_TLS12_CID = 0x19,
40 SSL_ID_DTLS13_ACK = 0x1A,
44 SSL_HND_HELLO_REQUEST = 0,
45 SSL_HND_CLIENT_HELLO = 1,
46 SSL_HND_SERVER_HELLO = 2,
47 SSL_HND_HELLO_VERIFY_REQUEST = 3,
48 SSL_HND_NEWSESSION_TICKET = 4,
49 SSL_HND_END_OF_EARLY_DATA = 5,
50 SSL_HND_HELLO_RETRY_REQUEST = 6,
51 SSL_HND_ENCRYPTED_EXTENSIONS = 8,
52 SSL_HND_CERTIFICATE = 11,
53 SSL_HND_SERVER_KEY_EXCHG = 12,
54 SSL_HND_CERT_REQUEST = 13,
55 SSL_HND_SVR_HELLO_DONE = 14,
56 SSL_HND_CERT_VERIFY = 15,
57 SSL_HND_CLIENT_KEY_EXCHG = 16,
58 SSL_HND_FINISHED = 20,
59 SSL_HND_CERT_URL = 21,
60 SSL_HND_CERT_STATUS = 22,
61 SSL_HND_SUPPLEMENTAL_DATA = 23,
62 SSL_HND_KEY_UPDATE = 24,
63 SSL_HND_COMPRESSED_CERTIFICATE = 25,
66 SSL_HND_ENCRYPTED_EXTS = 67,
67 SSL_HND_MESSAGE_HASH = 254
70#define SSL2_HND_ERROR 0x00
71#define SSL2_HND_CLIENT_HELLO 0x01
72#define SSL2_HND_CLIENT_MASTER_KEY 0x02
73#define SSL2_HND_CLIENT_FINISHED 0x03
74#define SSL2_HND_SERVER_HELLO 0x04
75#define SSL2_HND_SERVER_VERIFY 0x05
76#define SSL2_HND_SERVER_FINISHED 0x06
77#define SSL2_HND_REQUEST_CERTIFICATE 0x07
78#define SSL2_HND_CLIENT_CERTIFICATE 0x08
80#define SSL_HND_HELLO_EXT_SERVER_NAME 0
81#define SSL_HND_HELLO_EXT_MAX_FRAGMENT_LENGTH 1
82#define SSL_HND_HELLO_EXT_CLIENT_CERTIFICATE_URL 2
83#define SSL_HND_HELLO_EXT_TRUSTED_CA_KEYS 3
84#define SSL_HND_HELLO_EXT_TRUNCATED_HMAC 4
85#define SSL_HND_HELLO_EXT_STATUS_REQUEST 5
86#define SSL_HND_HELLO_EXT_USER_MAPPING 6
87#define SSL_HND_HELLO_EXT_CLIENT_AUTHZ 7
88#define SSL_HND_HELLO_EXT_SERVER_AUTHZ 8
89#define SSL_HND_HELLO_EXT_CERT_TYPE 9
90#define SSL_HND_HELLO_EXT_SUPPORTED_GROUPS 10
91#define SSL_HND_HELLO_EXT_EC_POINT_FORMATS 11
92#define SSL_HND_HELLO_EXT_SRP 12
93#define SSL_HND_HELLO_EXT_SIGNATURE_ALGORITHMS 13
94#define SSL_HND_HELLO_EXT_USE_SRTP 14
95#define SSL_HND_HELLO_EXT_HEARTBEAT 15
96#define SSL_HND_HELLO_EXT_ALPN 16
97#define SSL_HND_HELLO_EXT_STATUS_REQUEST_V2 17
98#define SSL_HND_HELLO_EXT_SIGNED_CERTIFICATE_TIMESTAMP 18
99#define SSL_HND_HELLO_EXT_CLIENT_CERT_TYPE 19
100#define SSL_HND_HELLO_EXT_SERVER_CERT_TYPE 20
101#define SSL_HND_HELLO_EXT_PADDING 21
102#define SSL_HND_HELLO_EXT_ENCRYPT_THEN_MAC 22
103#define SSL_HND_HELLO_EXT_EXTENDED_MASTER_SECRET 23
104#define SSL_HND_HELLO_EXT_TOKEN_BINDING 24
105#define SSL_HND_HELLO_EXT_CACHED_INFO 25
106#define SSL_HND_HELLO_EXT_COMPRESS_CERTIFICATE 27
107#define SSL_HND_HELLO_EXT_RECORD_SIZE_LIMIT 28
109#define SSL_HND_HELLO_EXT_DELEGATED_CREDENTIALS 34
110#define SSL_HND_HELLO_EXT_SESSION_TICKET_TLS 35
112#define SSL_HND_HELLO_EXT_KEY_SHARE_OLD 40
113#define SSL_HND_HELLO_EXT_PRE_SHARED_KEY 41
114#define SSL_HND_HELLO_EXT_EARLY_DATA 42
115#define SSL_HND_HELLO_EXT_SUPPORTED_VERSIONS 43
116#define SSL_HND_HELLO_EXT_COOKIE 44
117#define SSL_HND_HELLO_EXT_PSK_KEY_EXCHANGE_MODES 45
118#define SSL_HND_HELLO_EXT_TICKET_EARLY_DATA_INFO 46
119#define SSL_HND_HELLO_EXT_CERTIFICATE_AUTHORITIES 47
120#define SSL_HND_HELLO_EXT_OID_FILTERS 48
121#define SSL_HND_HELLO_EXT_POST_HANDSHAKE_AUTH 49
122#define SSL_HND_HELLO_EXT_SIGNATURE_ALGORITHMS_CERT 50
123#define SSL_HND_HELLO_EXT_KEY_SHARE 51
124#define SSL_HND_HELLO_EXT_TRANSPARENCY_INFO 52
125#define SSL_HND_HELLO_EXT_CONNECTION_ID_DEPRECATED 53
126#define SSL_HND_HELLO_EXT_CONNECTION_ID 54
127#define SSL_HND_HELLO_EXT_EXTERNAL_ID_HASH 55
128#define SSL_HND_HELLO_EXT_EXTERNAL_SESSION_ID 56
129#define SSL_HND_HELLO_EXT_QUIC_TRANSPORT_PARAMETERS_V1 57
130#define SSL_HND_HELLO_EXT_TICKET_REQUEST 58
131#define SSL_HND_HELLO_EXT_DNSSEC_CHAIN 59
132#define SSL_HND_HELLO_EXT_GREASE_0A0A 2570
133#define SSL_HND_HELLO_EXT_GREASE_1A1A 6682
134#define SSL_HND_HELLO_EXT_GREASE_2A2A 10794
135#define SSL_HND_HELLO_EXT_NPN 13172
136#define SSL_HND_HELLO_EXT_GREASE_3A3A 14906
137#define SSL_HND_HELLO_EXT_ALPS_OLD 17513
138#define SSL_HND_HELLO_EXT_ALPS 17613
139#define SSL_HND_HELLO_EXT_GREASE_4A4A 19018
140#define SSL_HND_HELLO_EXT_GREASE_5A5A 23130
141#define SSL_HND_HELLO_EXT_GREASE_6A6A 27242
142#define SSL_HND_HELLO_EXT_CHANNEL_ID_OLD 30031
143#define SSL_HND_HELLO_EXT_CHANNEL_ID 30032
144#define SSL_HND_HELLO_EXT_GREASE_7A7A 31354
145#define SSL_HND_HELLO_EXT_GREASE_8A8A 35466
146#define SSL_HND_HELLO_EXT_GREASE_9A9A 39578
147#define SSL_HND_HELLO_EXT_GREASE_AAAA 43690
148#define SSL_HND_HELLO_EXT_GREASE_BABA 47802
149#define SSL_HND_HELLO_EXT_GREASE_CACA 51914
150#define SSL_HND_HELLO_EXT_GREASE_DADA 56026
151#define SSL_HND_HELLO_EXT_GREASE_EAEA 60138
152#define SSL_HND_HELLO_EXT_GREASE_FAFA 64250
153#define SSL_HND_HELLO_EXT_ECH_OUTER_EXTENSIONS 64768
154#define SSL_HND_HELLO_EXT_ENCRYPTED_CLIENT_HELLO 65037
155#define SSL_HND_HELLO_EXT_RENEGOTIATION_INFO 65281
156#define SSL_HND_HELLO_EXT_QUIC_TRANSPORT_PARAMETERS 65445
157#define SSL_HND_HELLO_EXT_ENCRYPTED_SERVER_NAME 65486
159#define SSL_HND_CERT_URL_TYPE_INDIVIDUAL_CERT 1
160#define SSL_HND_CERT_URL_TYPE_PKIPATH 2
161#define SSL_HND_CERT_STATUS_TYPE_OCSP 1
162#define SSL_HND_CERT_STATUS_TYPE_OCSP_MULTI 2
163#define SSL_HND_CERT_TYPE_RAW_PUBLIC_KEY 2
166#define SSL_HND_QUIC_TP_ORIGINAL_DESTINATION_CONNECTION_ID 0x00
167#define SSL_HND_QUIC_TP_MAX_IDLE_TIMEOUT 0x01
168#define SSL_HND_QUIC_TP_STATELESS_RESET_TOKEN 0x02
169#define SSL_HND_QUIC_TP_MAX_UDP_PAYLOAD_SIZE 0x03
170#define SSL_HND_QUIC_TP_INITIAL_MAX_DATA 0x04
171#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAM_DATA_BIDI_LOCAL 0x05
172#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAM_DATA_BIDI_REMOTE 0x06
173#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAM_DATA_UNI 0x07
174#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAMS_BIDI 0x08
175#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAMS_UNI 0x09
176#define SSL_HND_QUIC_TP_ACK_DELAY_EXPONENT 0x0a
177#define SSL_HND_QUIC_TP_MAX_ACK_DELAY 0x0b
178#define SSL_HND_QUIC_TP_DISABLE_ACTIVE_MIGRATION 0x0c
179#define SSL_HND_QUIC_TP_PREFERRED_ADDRESS 0x0d
180#define SSL_HND_QUIC_TP_ACTIVE_CONNECTION_ID_LIMIT 0x0e
181#define SSL_HND_QUIC_TP_INITIAL_SOURCE_CONNECTION_ID 0x0f
182#define SSL_HND_QUIC_TP_RETRY_SOURCE_CONNECTION_ID 0x10
183#define SSL_HND_QUIC_TP_VERSION_INFORMATION 0x11
184#define SSL_HND_QUIC_TP_MAX_DATAGRAM_FRAME_SIZE 0x20
185#define SSL_HND_QUIC_TP_CIBIR_ENCODING 0x1000
186#define SSL_HND_QUIC_TP_LOSS_BITS 0x1057
187#define SSL_HND_QUIC_TP_GREASE_QUIC_BIT 0x2ab2
188#define SSL_HND_QUIC_TP_ENABLE_TIME_STAMP 0x7157
189#define SSL_HND_QUIC_TP_ENABLE_TIME_STAMP_V2 0x7158
190#define SSL_HND_QUIC_TP_MIN_ACK_DELAY_OLD 0xde1a
192#define SSL_HND_QUIC_TP_GOOGLE_USER_AGENT 0x3129
193#define SSL_HND_QUIC_TP_GOOGLE_KEY_UPDATE_NOT_YET_SUPPORTED 0x312B
194#define SSL_HND_QUIC_TP_GOOGLE_QUIC_VERSION 0x4752
195#define SSL_HND_QUIC_TP_GOOGLE_INITIAL_RTT 0x3127
196#define SSL_HND_QUIC_TP_GOOGLE_SUPPORT_HANDSHAKE_DONE 0x312A
197#define SSL_HND_QUIC_TP_GOOGLE_QUIC_PARAMS 0x4751
198#define SSL_HND_QUIC_TP_GOOGLE_CONNECTION_OPTIONS 0x3128
200#define SSL_HND_QUIC_TP_FACEBOOK_PARTIAL_RELIABILITY 0xFF00
201#define SSL_HND_QUIC_TP_VERSION_INFORMATION_DRAFT 0xff73db
202#define SSL_HND_QUIC_TP_ADDRESS_DISCOVERY 0x9f81a176
203#define SSL_HND_QUIC_TP_MIN_ACK_DELAY_DRAFT_V1 0xFF03DE1A
204#define SSL_HND_QUIC_TP_MIN_ACK_DELAY_DRAFT05 0xff04de1a
205#define SSL_HND_QUIC_TP_MIN_ACK_DELAY 0xff04de1b
206#define SSL_HND_QUIC_TP_ENABLE_MULTIPATH_DRAFT04 0x0f739bbc1b666d04
207#define SSL_HND_QUIC_TP_ENABLE_MULTIPATH_DRAFT05 0x0f739bbc1b666d05
208#define SSL_HND_QUIC_TP_ENABLE_MULTIPATH 0x0f739bbc1b666d06
209#define SSL_HND_QUIC_TP_INITIAL_MAX_PATHS 0x0f739bbc1b666d07
210#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID_DRAFT09 0x0f739bbc1b666d09
211#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID_DRAFT11 0x0f739bbc1b666d11
212#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID_DRAFT12 0x0f739bbc1b666d0c
213#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID_DRAFT13 0x0f739bbc1b666d0d
214#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID 0x3e
232extern const value_string ssl_31_key_exchange_algorithm[];
234extern const value_string ssl_31_client_certificate_type[];
235extern const value_string ssl_31_public_value_encoding[];
245extern const value_string ssl_extension_ec_point_formats[];
247extern const value_string tls_hello_ext_server_name_type_vs[];
248extern const value_string tls_hello_ext_max_fragment_length[];
250extern const value_string tls_hello_ext_trusted_ca_key_type[];
252extern const value_string compress_certificate_algorithm_vals[];
256extern const val64_string quic_enable_time_stamp_v2_vals[];
258extern const value_string tls_hello_ext_ech_clienthello_types[];
262extern const value_string token_binding_key_parameter_vals[];
270#define SSL_WRITE_KEY 1
272#define SSL_VER_UNKNOWN 0
273#define SSLV2_VERSION 0x0002
275#define SSLV3_VERSION 0x300
276#define TLSV1_VERSION 0x301
277#define TLCPV1_VERSION 0x101
278#define TLSV1DOT1_VERSION 0x302
279#define TLSV1DOT2_VERSION 0x303
280#define TLSV1DOT3_VERSION 0x304
281#define DTLSV1DOT0_VERSION 0xfeff
282#define DTLSV1DOT0_OPENSSL_VERSION 0x100
283#define DTLSV1DOT2_VERSION 0xfefd
284#define DTLSV1DOT3_VERSION 0xfefc
287static inline uint8_t extract_tls13_draft_version(uint32_t version) {
288 if ((version & 0xff00) == 0x7f00) {
289 return (uint8_t) version;
295#define SSL_CLIENT_RANDOM (1<<0)
296#define SSL_SERVER_RANDOM (1<<1)
297#define SSL_CIPHER (1<<2)
298#define SSL_HAVE_SESSION_KEY (1<<3)
299#define SSL_VERSION (1<<4)
300#define SSL_MASTER_SECRET (1<<5)
301#define SSL_PRE_MASTER_SECRET (1<<6)
302#define SSL_CLIENT_EXTENDED_MASTER_SECRET (1<<7)
303#define SSL_SERVER_EXTENDED_MASTER_SECRET (1<<8)
304#define SSL_NEW_SESSION_TICKET (1<<10)
305#define SSL_ENCRYPT_THEN_MAC (1<<11)
306#define SSL_SEEN_0RTT_APPDATA (1<<12)
307#define SSL_QUIC_RECORD_LAYER (1<<13)
309#define SSL_EXTENDED_MASTER_SECRET_MASK (SSL_CLIENT_EXTENDED_MASTER_SECRET|SSL_SERVER_EXTENDED_MASTER_SECRET)
323#define IMPLICIT_NONCE_LEN 4
324#define EXPLICIT_NONCE_LEN 8
325#define TLS13_AEAD_NONCE_LENGTH 12
330 TLS_SECRET_HANDSHAKE,
334#define SSL_DEBUG_USE_STDERR "-"
336#define SSLV2_MAX_SESSION_ID_LENGTH_IN_BYTES 16
339#define TLS_MAX_RECORD_LENGTH 0x4000
346 ssl_cipher_mode_t mode;
360 unsigned char _mac_key_or_write_iv[48];
363 SSL_CIPHER_CTX sn_evp;
366 uint64_t dtls13_epoch;
374#define KEX_DHE_DSS 0x10
375#define KEX_DHE_PSK 0x11
376#define KEX_DHE_RSA 0x12
377#define KEX_DH_ANON 0x13
378#define KEX_DH_DSS 0x14
379#define KEX_DH_RSA 0x15
380#define KEX_ECDHE_ECDSA 0x16
381#define KEX_ECDHE_PSK 0x17
382#define KEX_ECDHE_RSA 0x18
383#define KEX_ECDH_ANON 0x19
384#define KEX_ECDH_ECDSA 0x1a
385#define KEX_ECDH_RSA 0x1b
389#define KEX_RSA_PSK 0x1f
390#define KEX_SRP_SHA 0x20
391#define KEX_SRP_SHA_DSS 0x21
392#define KEX_SRP_SHA_RSA 0x22
393#define KEX_IS_DH(n) ((n) >= KEX_DHE_DSS && (n) <= KEX_ECDH_RSA)
394#define KEX_TLS13 0x23
395#define KEX_ECJPAKE 0x24
397#define KEX_ECDHE_SM2 0x25
398#define KEX_ECC_SM2 0x26
399#define KEX_IBSDH_SM9 0x27
400#define KEX_IBC_SM9 0x28
404#define ENC_START 0x30
411#define ENC_AES256 0x36
412#define ENC_CAMELLIA128 0x37
413#define ENC_CAMELLIA256 0x38
415#define ENC_CHACHA20 0x3A
423#define DIG_SHA256 0x42
424#define DIG_SHA384 0x43
477 unsigned char tls13_draft_version;
478 unsigned char _client_random[32];
479 int8_t client_cert_type;
480 int8_t server_cert_type;
481 uint32_t client_ccs_frame;
482 uint32_t server_ccs_frame;
483 uint32_t first_ch_ech_frame;
486 bool hrr_ech_declined;
487 unsigned char ech_confirmation[8];
488 unsigned char hrr_ech_confirmation[8];
489 unsigned char first_ech_auth_tag[16];
501 const char *alpn_name;
503 const char *client_alpn_name;
504 uint32_t last_nontls_frame;
505 bool is_session_resumed;
508 uint32_t client_hs_reassembly_id;
509 uint32_t server_hs_reassembly_id;
520 uint8_t client_cid_len;
521 bool client_cid_len_present;
522 uint8_t server_cid_len;
523 bool server_cid_len_present;
525 uint64_t dtls13_current_epoch[2];
526 uint64_t dtls13_next_seq_num[2];
530#define SSL_MASTER_SECRET_LENGTH 48
536 unsigned char _master_secret[SSL_MASTER_SECRET_LENGTH];
537 unsigned char _session_id[256];
538 unsigned char _client_random[32];
539 unsigned char _server_random[32];
548 unsigned char _server_data_for_iv[24];
550 unsigned char _client_data_for_iv[24];
559#if defined(HAVE_LIBGNUTLS)
560 struct cert_key_id *cert_key_id;
573 uint64_t sequence_number;
587 const char *keylog_filename;
595 GHashTable *pre_master;
600 GHashTable *tls13_client_early;
601 GHashTable *tls13_client_handshake;
602 GHashTable *tls13_server_handshake;
603 GHashTable *tls13_client_appdata;
604 GHashTable *tls13_server_appdata;
605 GHashTable *tls13_early_exporter;
606 GHashTable *tls13_exporter;
607 GHashTable *ech_secret;
608 GHashTable *ech_config;
616 GHashTable *used_crandom;
619int ssl_get_keyex_alg(
int cipher);
621void quic_transport_parameter_id_base_custom(
char *result, uint64_t parameter_id);
623bool ssldecrypt_uat_fld_ip_chk_cb(
void*,
const char*,
unsigned,
const void*,
const void*,
char** err);
624bool ssldecrypt_uat_fld_port_chk_cb(
void*,
const char*,
unsigned,
const void*,
const void*,
char** err);
625bool ssldecrypt_uat_fld_fileopen_chk_cb(
void*,
const char*,
unsigned,
const void*,
const void*,
char** err);
626bool ssldecrypt_uat_fld_password_chk_cb(
void*,
const char*,
unsigned,
const void*,
const void*,
char** err);
627char* ssl_association_info(
const char* dissector_table_name,
const char* table_protocol);
630void ssl_init_cid_list(
void);
633void ssl_cleanup_cid_list(
void);
658ssl_set_server(
SslSession *session,
address *addr, port_type ptype, uint32_t port);
680WS_DLL_PUBLIC uint32_t
692WS_DLL_PUBLIC uint32_t
697ssl_find_appdata_dissector(
const char *name);
705ssl_data_set(
StringInfo* buf,
const unsigned char* src,
unsigned len);
714ssl_cipher_setiv(SSL_CIPHER_CTX *cipher,
unsigned char* iv,
int iv_len);
720ssl_find_cipher(
int num);
736 uint32_t length,
tvbuff_t *tvb, uint32_t offset,
739 GHashTable *key_hash,
770 bool ignore_mac_failed,
771 const unsigned char *in, uint16_t inl,
const unsigned char *cid, uint8_t cidl,
789tls_add_packet_info(
int proto,
packet_info *pinfo, uint8_t curr_layer_num_ssl);
794 const unsigned char *plain_data,
int plain_data_len,
int content_len,
795 int record_id,
SslFlow *flow, ContentType type, uint8_t curr_layer_num_ssl,
796 uint64_t record_seq);
816tls_get_master_key_map(
bool load_secrets);
824ssl_load_keyfile(
const char *ssl_keylog_filename, FILE **keylog_file,
848 bool is_from_server, TLSRecordType type);
852 bool is_from_server, TLSRecordType type);
858ssl_is_valid_content_type(uint8_t type);
861ssl_is_valid_handshake_type(uint8_t hs_type,
bool is_dtls);
864tls_scan_server_hello(
tvbuff_t *tvb, uint32_t offset, uint32_t offset_end,
865 uint16_t *server_version,
bool *is_hrr);
869 uint8_t content_type, uint8_t handshake_type,
870 bool is_dtls, uint16_t version);
878 int change_cipher_spec;
881 int hs_ext_alpn_list;
883 int hs_ext_alpn_str_len;
884 int hs_ext_cert_url_item;
885 int hs_ext_cert_url_padding;
886 int hs_ext_cert_url_sha1;
887 int hs_ext_cert_url_type;
888 int hs_ext_cert_url_url;
889 int hs_ext_cert_url_url_hash_list_len;
890 int hs_ext_cert_url_url_len;
891 int hs_ext_cert_status_type;
892 int hs_ext_cert_status_request_len;
893 int hs_ext_cert_status_responder_id_list_len;
894 int hs_ext_cert_status_request_extensions_len;
895 int hs_ext_cert_status_request_list_len;
896 int hs_ocsp_response_list_len;
897 int hs_ocsp_response_len;
898 int hs_ext_cert_type;
899 int hs_ext_cert_types;
900 int hs_ext_cert_types_len;
902 int hs_ext_ec_point_format;
903 int hs_ext_ec_point_formats;
904 int hs_ext_ec_point_formats_len;
906 int hs_ext_srp_username;
907 int hs_ext_supported_group;
908 int hs_ext_supported_groups;
909 int hs_ext_supported_groups_len;
910 int hs_ext_ech_outer_ext;
911 int hs_ext_ech_outer_ext_len;
913 int hs_ech_confirm_compute;
914 int hs_ext_heartbeat_mode;
917 int hs_ext_npn_str_len;
918 int hs_ext_reneg_info_len;
919 int hs_ext_reneg_info;
920 int hs_ext_key_share_client_length;
921 int hs_ext_key_share_group;
922 int hs_ext_key_share_key_exchange_length;
923 int hs_ext_key_share_key_exchange;
924 int hs_ext_key_share_selected_group;
925 int hs_ext_psk_identities_length;
926 int hs_ext_psk_identity_identity_length;
927 int hs_ext_psk_identity_identity;
928 int hs_ext_psk_identity_obfuscated_ticket_age;
929 int hs_ext_psk_binders_length;
930 int hs_ext_psk_binders;
931 int hs_ext_psk_binder;
932 int hs_ext_psk_binder_binder_length;
933 int hs_ext_psk_binder_binder;
934 int hs_ext_psk_identity_selected;
935 int hs_ext_session_ticket;
936 int hs_ext_supported_versions_len;
937 int hs_ext_supported_version;
938 int hs_ext_cookie_len;
940 int hs_ext_server_name;
941 int hs_ext_server_name_len;
942 int hs_ext_server_name_list_len;
943 int hs_ext_server_name_type;
944 int hs_ext_max_fragment_length;
945 int hs_ext_padding_data;
948 int hs_ext_connection_id_length;
949 int hs_ext_connection_id;
950 int hs_ext_trusted_ca_keys_len;
951 int hs_ext_trusted_ca_keys_list;
952 int hs_ext_trusted_ca_key;
953 int hs_ext_trusted_ca_key_type;
954 int hs_ext_trusted_ca_key_hash;
955 int hs_ext_trusted_ca_key_dname_len;
956 int hs_ext_trusted_ca_key_dname;
958 int hs_sig_hash_alg_len;
959 int hs_sig_hash_algs;
960 int hs_sig_hash_hash;
962 int hs_client_keyex_epms_len;
963 int hs_client_keyex_epms;
964 int hs_server_keyex_modulus_len;
965 int hs_server_keyex_exponent_len;
966 int hs_server_keyex_sig_len;
967 int hs_server_keyex_p_len;
968 int hs_server_keyex_g_len;
969 int hs_server_keyex_ys_len;
970 int hs_client_keyex_yc_len;
971 int hs_client_keyex_point_len;
972 int hs_server_keyex_point_len;
973 int hs_server_keyex_p;
974 int hs_server_keyex_g;
975 int hs_server_keyex_curve_type;
976 int hs_server_keyex_named_curve;
977 int hs_server_keyex_ys;
978 int hs_client_keyex_yc;
979 int hs_server_keyex_point;
980 int hs_client_keyex_point;
981 int hs_server_keyex_xs_len;
982 int hs_client_keyex_xc_len;
983 int hs_server_keyex_xs;
984 int hs_client_keyex_xc;
985 int hs_server_keyex_vs_len;
986 int hs_client_keyex_vc_len;
987 int hs_server_keyex_vs;
988 int hs_client_keyex_vc;
989 int hs_server_keyex_rs_len;
990 int hs_client_keyex_rc_len;
991 int hs_server_keyex_rs;
992 int hs_client_keyex_rc;
993 int hs_server_keyex_modulus;
994 int hs_server_keyex_exponent;
995 int hs_server_keyex_sig;
996 int hs_server_keyex_hint_len;
997 int hs_server_keyex_hint;
998 int hs_client_keyex_identity_len;
999 int hs_client_keyex_identity;
1000 int hs_certificates_len;
1001 int hs_certificates;
1002 int hs_certificate_len;
1004 int hs_cert_types_count;
1009 int hs_dnames_truncated;
1014 int hs_random_bytes;
1016 int hs_session_id_len;
1017 int hs_client_version;
1018 int hs_server_version;
1019 int hs_cipher_suites_len;
1020 int hs_cipher_suites;
1021 int hs_cipher_suite;
1022 int hs_comp_methods_len;
1023 int hs_comp_methods;
1025 int hs_session_ticket_lifetime_hint;
1026 int hs_session_ticket_age_add;
1027 int hs_session_ticket_nonce_len;
1028 int hs_session_ticket_nonce;
1029 int hs_session_ticket_len;
1030 int hs_session_ticket;
1032 int hs_client_cert_vrfy_sig_len;
1033 int hs_client_cert_vrfy_sig;
1042 int hs_ext_psk_ke_modes_length;
1043 int hs_ext_psk_ke_mode;
1044 int hs_certificate_request_context_length;
1045 int hs_certificate_request_context;
1046 int hs_key_update_request_update;
1047 int sct_scts_length;
1049 int sct_sct_version;
1051 int sct_sct_timestamp;
1052 int sct_sct_extensions_length;
1053 int sct_sct_extensions;
1054 int sct_sct_signature;
1055 int sct_sct_signature_length;
1056 int hs_ext_max_early_data_size;
1057 int hs_ext_oid_filters_length;
1058 int hs_ext_oid_filters_oid_length;
1059 int hs_ext_oid_filters_oid;
1060 int hs_ext_oid_filters_values_length;
1061 int hs_cred_valid_time;
1063 int hs_cred_pubkey_len;
1064 int hs_cred_signature;
1065 int hs_cred_signature_len;
1068 int hs_ext_compress_certificate_algorithms_length;
1069 int hs_ext_compress_certificate_algorithm;
1070 int hs_ext_compress_certificate_uncompressed_length;
1071 int hs_ext_compress_certificate_compressed_certificate_message_length;
1072 int hs_ext_compress_certificate_compressed_certificate_message;
1075 int hs_ext_token_binding_version_major;
1076 int hs_ext_token_binding_version_minor;
1077 int hs_ext_token_binding_key_parameters;
1078 int hs_ext_token_binding_key_parameters_length;
1079 int hs_ext_token_binding_key_parameter;
1081 int hs_ext_record_size_limit;
1084 int hs_ext_quictp_len;
1085 int hs_ext_quictp_parameter;
1086 int hs_ext_quictp_parameter_type;
1087 int hs_ext_quictp_parameter_len;
1088 int hs_ext_quictp_parameter_len_old;
1089 int hs_ext_quictp_parameter_value;
1090 int hs_ext_quictp_parameter_original_destination_connection_id;
1091 int hs_ext_quictp_parameter_max_idle_timeout;
1092 int hs_ext_quictp_parameter_stateless_reset_token;
1093 int hs_ext_quictp_parameter_initial_max_data;
1094 int hs_ext_quictp_parameter_initial_max_stream_data_bidi_local;
1095 int hs_ext_quictp_parameter_initial_max_stream_data_bidi_remote;
1096 int hs_ext_quictp_parameter_initial_max_stream_data_uni;
1097 int hs_ext_quictp_parameter_initial_max_streams_bidi;
1098 int hs_ext_quictp_parameter_initial_max_streams_uni;
1099 int hs_ext_quictp_parameter_ack_delay_exponent;
1100 int hs_ext_quictp_parameter_max_ack_delay;
1101 int hs_ext_quictp_parameter_max_udp_payload_size;
1102 int hs_ext_quictp_parameter_pa_ipv4address;
1103 int hs_ext_quictp_parameter_pa_ipv6address;
1104 int hs_ext_quictp_parameter_pa_ipv4port;
1105 int hs_ext_quictp_parameter_pa_ipv6port;
1106 int hs_ext_quictp_parameter_pa_connectionid_length;
1107 int hs_ext_quictp_parameter_pa_connectionid;
1108 int hs_ext_quictp_parameter_pa_statelessresettoken;
1109 int hs_ext_quictp_parameter_active_connection_id_limit;
1110 int hs_ext_quictp_parameter_initial_source_connection_id;
1111 int hs_ext_quictp_parameter_retry_source_connection_id;
1112 int hs_ext_quictp_parameter_max_datagram_frame_size;
1113 int hs_ext_quictp_parameter_cibir_encoding_length;
1114 int hs_ext_quictp_parameter_cibir_encoding_offset;
1115 int hs_ext_quictp_parameter_loss_bits;
1116 int hs_ext_quictp_parameter_address_discovery;
1117 int hs_ext_quictp_parameter_enable_time_stamp_v2;
1118 int hs_ext_quictp_parameter_min_ack_delay;
1119 int hs_ext_quictp_parameter_google_user_agent_id;
1120 int hs_ext_quictp_parameter_google_key_update_not_yet_supported;
1121 int hs_ext_quictp_parameter_google_quic_version;
1122 int hs_ext_quictp_parameter_google_initial_rtt;
1123 int hs_ext_quictp_parameter_google_support_handshake_done;
1124 int hs_ext_quictp_parameter_google_quic_params;
1125 int hs_ext_quictp_parameter_google_quic_params_unknown_field;
1126 int hs_ext_quictp_parameter_google_connection_options;
1127 int hs_ext_quictp_parameter_google_supported_versions_length;
1128 int hs_ext_quictp_parameter_google_supported_version;
1129 int hs_ext_quictp_parameter_facebook_partial_reliability;
1130 int hs_ext_quictp_parameter_chosen_version;
1131 int hs_ext_quictp_parameter_other_version;
1132 int hs_ext_quictp_parameter_enable_multipath;
1133 int hs_ext_quictp_parameter_initial_max_paths;
1134 int hs_ext_quictp_parameter_initial_max_path_id;
1137 int esni_record_digest_length;
1138 int esni_record_digest;
1139 int esni_encrypted_sni_length;
1140 int esni_encrypted_sni;
1143 int ech_echconfiglist_length;
1144 int ech_echconfiglist;
1146 int ech_echconfig_version;
1147 int ech_echconfig_length;
1148 int ech_echconfigcontents_maximum_name_length;
1149 int ech_echconfigcontents_public_name_length;
1150 int ech_echconfigcontents_public_name;
1151 int ech_echconfigcontents_extensions_length;
1152 int ech_echconfigcontents_extensions;
1153 int ech_hpke_keyconfig;
1154 int ech_hpke_keyconfig_config_id;
1155 int ech_hpke_keyconfig_kem_id;
1156 int ech_hpke_keyconfig_public_key_length;
1157 int ech_hpke_keyconfig_public_key;
1158 int ech_hpke_keyconfig_cipher_suites;
1159 int ech_hpke_keyconfig_cipher_suites_length;
1160 int ech_hpke_keyconfig_cipher_suite;
1161 int ech_hpke_keyconfig_cipher_suite_kdf_id;
1162 int ech_hpke_keyconfig_cipher_suite_aead_id;
1163 int ech_clienthello_type;
1164 int ech_cipher_suite;
1168 int ech_payload_length;
1170 int ech_confirmation;
1171 int ech_retry_configs;
1172 int ech_padding_data;
1174 int hs_ext_alps_len;
1175 int hs_ext_alps_alpn_list;
1176 int hs_ext_alps_alpn_str;
1177 int hs_ext_alps_alpn_str_len;
1178 int hs_ext_alps_settings;
1185 int hs_ext_cert_types;
1187 int hs_ext_curves_point_formats;
1189 int hs_ext_reneg_info;
1190 int hs_ext_key_share;
1191 int hs_ext_key_share_ks;
1192 int hs_ext_pre_shared_key;
1193 int hs_ext_psk_identity;
1194 int hs_ext_psk_binders;
1195 int hs_ext_psk_binder;
1196 int hs_ext_server_name;
1197 int hs_ext_oid_filter;
1198 int hs_ext_quictp_parameter;
1199 int hs_ext_trusted_ca_keys;
1200 int hs_ext_trusted_ca_key;
1201 int hs_sig_hash_alg;
1202 int hs_sig_hash_algs;
1215 int uncompressed_certificates;
1217 int ech_echconfiglist;
1219 int ech_retry_configs;
1220 int ech_hpke_keyconfig;
1221 int ech_hpke_cipher_suites;
1222 int ech_hpke_cipher_suite;
1224 int hs_ext_token_binding_key_parameters;
1254 int hf_dtls_handshake_cookie_len;
1255 int hf_dtls_handshake_cookie;
1269 uint32_t max_version;
1270 bool server_name_present;
1271 int num_cipher_suites;
1282#define G_MAXUINT24 ((1U << 24) - 1)
1298 unsigned offset,
unsigned offset_end, uint32_t *ret_length,
1299 int hf_length, uint32_t min_value, uint32_t max_value);
1311 unsigned offset,
unsigned offset_end);
1317 ContentType content_type,
1318 unsigned record_length,
proto_item *length_pi,
1319 uint16_t version,
tvbuff_t *decrypted_tvb);
1325 bool is_from_server,
1337 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1339 bool is_dtls,
bool is_hrr);
1343 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1349 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1355 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1357 bool is_dtls, GHashTable *session_hash);
1361 uint32_t offset, uint32_t offset_end,
packet_info *pinfo,
1363 bool is_from_server,
bool is_dtls);
1367 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1372 proto_tree *tree, uint32_t offset, uint32_t offset_end, uint16_t version);
1376 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1384 proto_tree *tree, uint32_t offset, uint32_t offset_end);
1388 proto_tree *tree, uint32_t offset, uint32_t length,
1393 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1402 uint32_t offset, uint32_t offset_end, uint16_t version);
1405tls13_hkdf_expand_label_context(
int md,
const StringInfo *secret,
1406 const char *label_prefix,
const char *label,
1407 const uint8_t *context, uint8_t context_length,
1408 uint16_t out_len,
unsigned char **out);
1411tls13_hkdf_expand_label(
int md,
const StringInfo *secret,
1412 const char *label_prefix,
const char *label,
1413 uint16_t out_len,
unsigned char **out);
1417 uint32_t offset, uint32_t offset_end,
packet_info *pinfo,
1419 bool is_from_server _U_,
bool is_dtls _U_);
1422ssl_follow_tap_listener(
void *tapdata,
packet_info *pinfo,
epan_dissect_t *edt _U_,
const void *ssl, tap_flags_t flags _U_);
1425#define SSL_COMMON_LIST_T(name) \
1426ssl_common_dissect_t name
1430#define SSL_COMMON_HF_LIST(name, prefix) \
1431 { & name .hf.change_cipher_spec, \
1432 { "Change Cipher Spec Message", prefix ".change_cipher_spec", \
1433 FT_NONE, BASE_NONE, NULL, 0x0, \
1434 "Signals a change in cipher specifications", HFILL } \
1436 { & name .hf.hs_exts_len, \
1437 { "Extensions Length", prefix ".handshake.extensions_length", \
1438 FT_UINT16, BASE_DEC, NULL, 0x0, \
1439 "Length of hello extensions", HFILL } \
1441 { & name .hf.hs_ext, \
1442 { "Extension", prefix ".handshake.extension", \
1443 FT_NONE, BASE_NONE, NULL, 0x0, \
1444 "Hello extension", HFILL } \
1446 { & name .hf.hs_ext_type, \
1447 { "Type", prefix ".handshake.extension.type", \
1448 FT_UINT16, BASE_DEC, VALS(tls_hello_extension_types), 0x0, \
1449 "Hello extension type", HFILL } \
1451 { & name .hf.hs_ext_len, \
1452 { "Length", prefix ".handshake.extension.len", \
1453 FT_UINT16, BASE_DEC, NULL, 0x0, \
1454 "Length of a hello extension", HFILL } \
1456 { & name .hf.hs_ext_data, \
1457 { "Data", prefix ".handshake.extension.data", \
1458 FT_BYTES, BASE_NONE, NULL, 0x0, \
1459 "Hello Extension data", HFILL } \
1461 { & name .hf.hs_ext_ech_outer_ext_len, \
1462 { "Outer Extensions List Length", prefix ".handshake.extensions_ech_outer_extensions_length", \
1463 FT_UINT8, BASE_DEC, NULL, 0x0, \
1466 { & name .hf.hs_ext_ech_outer_ext, \
1467 { "Outer Extensions List", prefix ".handshake.extensions_ech_outer_extensions", \
1468 FT_NONE, BASE_NONE, NULL, 0x0, \
1469 "List of extensions derived from Outer Client Hello", HFILL } \
1471 { & name .hf.hs_ech_confirm, \
1472 { "ECH Confirmation Bytes", prefix ".handshake.ech_confirm", \
1473 FT_BYTES, BASE_NONE, NULL, 0x0, \
1476 { & name .hf.hs_ech_confirm_compute, \
1477 { "Computed ECH Confirmation Bytes", prefix ".handshake.ech_confirm_compute", \
1478 FT_BYTES, BASE_NONE, NULL, 0x0, \
1481 { & name .hf.hs_ext_supported_groups_len, \
1482 { "Supported Groups List Length", prefix ".handshake.extensions_supported_groups_length", \
1483 FT_UINT16, BASE_DEC, NULL, 0x0, \
1486 { & name .hf.hs_ext_supported_groups, \
1487 { "Supported Groups List", prefix ".handshake.extensions_supported_groups", \
1488 FT_NONE, BASE_NONE, NULL, 0x0, \
1489 "List of supported groups (formerly Supported Elliptic Curves)", HFILL } \
1491 { & name .hf.hs_ext_supported_group, \
1492 { "Supported Group", prefix ".handshake.extensions_supported_group", \
1493 FT_UINT16, BASE_HEX, VALS(ssl_extension_curves), 0x0, \
1496 { & name .hf.hs_ext_ec_point_formats_len, \
1497 { "EC point formats Length", prefix ".handshake.extensions_ec_point_formats_length", \
1498 FT_UINT8, BASE_DEC, NULL, 0x0, \
1499 "Length of elliptic curves point formats field", HFILL } \
1501 { & name .hf.hs_ext_ec_point_formats, \
1502 { "EC point formats", prefix ".handshake.extensions_ec_point_formats", \
1503 FT_NONE, BASE_NONE, NULL, 0x0, \
1504 "List of elliptic curves point format", HFILL } \
1506 { & name .hf.hs_ext_ec_point_format, \
1507 { "EC point format", prefix ".handshake.extensions_ec_point_format", \
1508 FT_UINT8, BASE_DEC, VALS(ssl_extension_ec_point_formats), 0x0, \
1509 "Elliptic curves point format", HFILL } \
1511 { & name .hf.hs_ext_srp_len, \
1512 { "SRP username length", prefix ".handshake.extensions_srp_len", \
1513 FT_UINT8, BASE_DEC, NULL, 0x0, \
1514 "Length of Secure Remote Password username field", HFILL } \
1516 { & name .hf.hs_ext_srp_username, \
1517 { "SRP username", prefix ".handshake.extensions_srp_username", \
1518 FT_STRING, BASE_NONE, NULL, 0x0, \
1519 "Secure Remote Password username", HFILL } \
1521 { & name .hf.hs_ext_alpn_len, \
1522 { "ALPN Extension Length", prefix ".handshake.extensions_alpn_len", \
1523 FT_UINT16, BASE_DEC, NULL, 0x0, \
1524 "Length of the ALPN Extension", HFILL } \
1526 { & name .hf.hs_ext_alpn_list, \
1527 { "ALPN Protocol", prefix ".handshake.extensions_alpn_list", \
1528 FT_NONE, BASE_NONE, NULL, 0x0, \
1531 { & name .hf.hs_ext_alpn_str_len, \
1532 { "ALPN string length", prefix ".handshake.extensions_alpn_str_len", \
1533 FT_UINT8, BASE_DEC, NULL, 0x0, \
1534 "Length of ALPN string", HFILL } \
1536 { & name .hf.hs_ext_alpn_str, \
1537 { "ALPN Next Protocol", prefix ".handshake.extensions_alpn_str", \
1538 FT_STRING, BASE_NONE, NULL, 0x00, \
1541 { & name .hf.hs_ext_npn_str_len, \
1542 { "Protocol string length", prefix ".handshake.extensions_npn_str_len", \
1543 FT_UINT8, BASE_DEC, NULL, 0x0, \
1544 "Length of next protocol string", HFILL } \
1546 { & name .hf.hs_ext_npn_str, \
1547 { "Next Protocol", prefix ".handshake.extensions_npn", \
1548 FT_STRING, BASE_NONE, NULL, 0x0, \
1551 { & name .hf.hs_ext_reneg_info_len, \
1552 { "Renegotiation info extension length", prefix ".handshake.extensions_reneg_info_len", \
1553 FT_UINT8, BASE_DEC, NULL, 0x0, \
1556 { & name .hf.hs_ext_reneg_info, \
1557 { "Renegotiation info", prefix ".handshake.extensions_reneg_info",\
1558 FT_BYTES, BASE_NONE, NULL, 0x0, \
1561 { & name .hf.hs_ext_key_share_client_length, \
1562 { "Client Key Share Length", prefix ".handshake.extensions_key_share_client_length", \
1563 FT_UINT16, BASE_DEC, NULL, 0x00, \
1566 { & name .hf.hs_ext_key_share_group, \
1567 { "Group", prefix ".handshake.extensions_key_share_group", \
1568 FT_UINT16, BASE_DEC, VALS(ssl_extension_curves), 0x00, \
1571 { & name .hf.hs_ext_key_share_key_exchange_length, \
1572 { "Key Exchange Length", prefix ".handshake.extensions_key_share_key_exchange_length", \
1573 FT_UINT16, BASE_DEC, NULL, 0x00, \
1576 { & name .hf.hs_ext_key_share_key_exchange, \
1577 { "Key Exchange", prefix ".handshake.extensions_key_share_key_exchange", \
1578 FT_BYTES, BASE_NONE, NULL, 0x0, \
1581 { & name .hf.hs_ext_key_share_selected_group, \
1582 { "Selected Group", prefix ".handshake.extensions_key_share_selected_group", \
1583 FT_UINT16, BASE_DEC, VALS(ssl_extension_curves), 0x00, \
1586 { & name .hf.hs_ext_psk_identities_length, \
1587 { "Identities Length", prefix ".handshake.extensions.psk.identities.length", \
1588 FT_UINT16, BASE_DEC, NULL, 0x0, \
1591 { & name .hf.hs_ext_psk_identity_identity_length, \
1592 { "Identity Length", prefix ".handshake.extensions.psk.identity.identity_length", \
1593 FT_UINT16, BASE_DEC, NULL, 0x0, \
1596 { & name .hf.hs_ext_psk_identity_identity, \
1597 { "Identity", prefix ".handshake.extensions.psk.identity.identity", \
1598 FT_BYTES, BASE_NONE, NULL, 0x0, \
1601 { & name .hf.hs_ext_psk_identity_obfuscated_ticket_age, \
1602 { "Obfuscated Ticket Age", prefix ".handshake.extensions.psk.identity.obfuscated_ticket_age", \
1603 FT_UINT32, BASE_DEC, NULL, 0x0, \
1606 { & name .hf.hs_ext_psk_binders_length, \
1607 { "PSK Binders length", prefix ".handshake.extensions.psk.binders_len", \
1608 FT_UINT16, BASE_DEC, NULL, 0x0, \
1611 { & name .hf.hs_ext_psk_binders, \
1612 { "PSK Binders", prefix ".handshake.extensions.psk.binders", \
1613 FT_NONE, BASE_NONE, NULL, 0x0, \
1616 { & name .hf.hs_ext_psk_binder, \
1617 { "PSK Binder", prefix ".handshake.extensions.psk.binder", \
1618 FT_NONE, BASE_NONE, NULL, 0x0, \
1621 { & name .hf.hs_ext_psk_binder_binder_length, \
1622 { "Binder Length", prefix ".handshake.extensions.psk.binder.binder_length", \
1623 FT_UINT8, BASE_DEC, NULL, 0x0, \
1626 { & name .hf.hs_ext_psk_binder_binder, \
1627 { "Binder", prefix ".handshake.extensions.psk.binder.binder", \
1628 FT_BYTES, BASE_NONE, NULL, 0x0, \
1631 { & name .hf.hs_ext_psk_identity_selected, \
1632 { "Selected Identity", prefix ".handshake.extensions.psk.identity.selected", \
1633 FT_UINT16, BASE_DEC, NULL, 0x0, \
1636 { & name .hf.hs_ext_session_ticket, \
1637 { "Session Ticket", prefix ".handshake.extensions.session_ticket", \
1638 FT_BYTES, BASE_NONE, NULL, 0x0, \
1641 { & name .hf.hs_ext_supported_versions_len, \
1642 { "Supported Versions length", prefix ".handshake.extensions.supported_versions_len", \
1643 FT_UINT8, BASE_DEC, NULL, 0x0, \
1646 { & name .hf.hs_ext_supported_version, \
1647 { "Supported Version", prefix ".handshake.extensions.supported_version", \
1648 FT_UINT16, BASE_HEX, VALS(ssl_versions), 0x0, \
1651 { & name .hf.hs_ext_cookie_len, \
1652 { "Cookie length", prefix ".handshake.extensions.cookie_len", \
1653 FT_UINT16, BASE_DEC, NULL, 0x0, \
1656 { & name .hf.hs_ext_cookie, \
1657 { "Cookie", prefix ".handshake.extensions.cookie", \
1658 FT_BYTES, BASE_NONE, NULL, 0x0, \
1661 { & name .hf.hs_ext_server_name_list_len, \
1662 { "Server Name list length", prefix ".handshake.extensions_server_name_list_len", \
1663 FT_UINT16, BASE_DEC, NULL, 0x0, \
1664 "Length of server name list", HFILL } \
1666 { & name .hf.hs_ext_server_name_len, \
1667 { "Server Name length", prefix ".handshake.extensions_server_name_len", \
1668 FT_UINT16, BASE_DEC, NULL, 0x0, \
1669 "Length of server name string", HFILL } \
1671 { & name .hf.hs_ext_server_name_type, \
1672 { "Server Name Type", prefix ".handshake.extensions_server_name_type", \
1673 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_server_name_type_vs), 0x0, \
1676 { & name .hf.hs_ext_server_name, \
1677 { "Server Name", prefix ".handshake.extensions_server_name", \
1678 FT_STRING, BASE_NONE, NULL, 0x0, \
1681 { & name .hf.hs_ext_max_fragment_length, \
1682 { "Maximum Fragment Length", prefix ".handshake.max_fragment_length", \
1683 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_max_fragment_length), 0x00, \
1684 "Maximum fragment length that an endpoint is willing to receive", HFILL } \
1686 { & name .hf.hs_ext_padding_data, \
1687 { "Padding Data", prefix ".handshake.extensions_padding_data", \
1688 FT_BYTES, BASE_NONE, NULL, 0x0, \
1689 "Must be zero", HFILL } \
1691 { & name .hf.hs_ext_cert_url_type, \
1692 { "Certificate Chain Type", prefix ".handshake.cert_url_type", \
1693 FT_UINT8, BASE_DEC, VALS(tls_cert_chain_type), 0x0, \
1694 "Certificate Chain Type for Client Certificate URL", HFILL } \
1696 { & name .hf.hs_ext_cert_url_url_hash_list_len, \
1697 { "URL and Hash list Length", prefix ".handshake.cert_url.url_hash_len", \
1698 FT_UINT16, BASE_DEC, NULL, 0x0, \
1701 { & name .hf.hs_ext_cert_url_item, \
1702 { "URL and Hash", prefix ".handshake.cert_url.url_hash", \
1703 FT_NONE, BASE_NONE, NULL, 0x0, \
1706 { & name .hf.hs_ext_cert_url_url_len, \
1707 { "URL Length", prefix ".handshake.cert_url.url_len", \
1708 FT_UINT16, BASE_DEC, NULL, 0x0, \
1711 { & name .hf.hs_ext_cert_type, \
1712 { "Certificate Type", prefix ".handshake.cert_type.type", \
1713 FT_UINT8, BASE_HEX, VALS(tls_certificate_type), 0x0, \
1716 { & name .hf.hs_ext_cert_types, \
1717 { "Certificate Type List", prefix ".handshake.cert_type.types", \
1718 FT_NONE, BASE_NONE, NULL, 0x0, \
1721 { & name .hf.hs_ext_cert_types_len, \
1722 { "Certificate Type List Length", prefix ".handshake.cert_type.types_len", \
1723 FT_UINT8, BASE_DEC, NULL, 0x0, \
1726 { & name .hf.hs_ext_cert_url_url, \
1727 { "URL", prefix ".handshake.cert_url.url", \
1728 FT_STRING, BASE_NONE, NULL, 0x0, \
1729 "URL used to fetch the certificate(s)", HFILL } \
1731 { & name .hf.hs_ext_cert_url_padding, \
1732 { "Padding", prefix ".handshake.cert_url.padding", \
1733 FT_NONE, BASE_NONE, NULL, 0x0, \
1734 "Padding that MUST be 0x01 for backwards compatibility", HFILL } \
1736 { & name .hf.hs_ext_cert_url_sha1, \
1737 { "SHA1 Hash", prefix ".handshake.cert_url.sha1", \
1738 FT_BYTES, BASE_NONE, NULL, 0x0, \
1739 "SHA1 Hash of the certificate", HFILL } \
1741 { & name .hf.hs_ext_cert_status_type, \
1742 { "Certificate Status Type", prefix ".handshake.extensions_status_request_type", \
1743 FT_UINT8, BASE_DEC, VALS(tls_cert_status_type), 0x0, \
1746 { & name .hf.hs_ext_cert_status_request_len, \
1747 { "Certificate Status Length", prefix ".handshake.extensions_status_request_len", \
1748 FT_UINT16, BASE_DEC, NULL, 0x0, \
1751 { & name .hf.hs_ext_cert_status_responder_id_list_len, \
1752 { "Responder ID list Length", prefix ".handshake.extensions_status_request_responder_ids_len", \
1753 FT_UINT16, BASE_DEC, NULL, 0x0, \
1756 { & name .hf.hs_ext_cert_status_request_extensions_len, \
1757 { "Request Extensions Length", prefix ".handshake.extensions_status_request_exts_len", \
1758 FT_UINT16, BASE_DEC, NULL, 0x0, \
1761 { & name .hf.hs_ext_cert_status_request_list_len, \
1762 { "Certificate Status List Length", prefix ".handshake.extensions_status_request_list_len", \
1763 FT_UINT16, BASE_DEC, NULL, 0x0, \
1764 "CertificateStatusRequestItemV2 list length", HFILL } \
1766 { & name .hf.hs_ocsp_response_list_len, \
1767 { "OCSP Response List Length", prefix ".handshake.ocsp_response_list_len", \
1768 FT_UINT24, BASE_DEC, NULL, 0x0, \
1769 "OCSPResponseList length", HFILL } \
1771 { & name .hf.hs_ocsp_response_len, \
1772 { "OCSP Response Length", prefix ".handshake.ocsp_response_len", \
1773 FT_UINT24, BASE_DEC, NULL, 0x0, \
1776 { & name .hf.hs_sig_hash_alg_len, \
1777 { "Signature Hash Algorithms Length", prefix ".handshake.sig_hash_alg_len", \
1778 FT_UINT16, BASE_DEC, NULL, 0x0, \
1779 "Length of Signature Hash Algorithms", HFILL } \
1781 { & name .hf.hs_sig_hash_algs, \
1782 { "Signature Algorithms", prefix ".handshake.sig_hash_algs", \
1783 FT_NONE, BASE_NONE, NULL, 0x0, \
1784 "List of supported Signature Algorithms", HFILL } \
1786 { & name .hf.hs_sig_hash_alg, \
1787 { "Signature Algorithm", prefix ".handshake.sig_hash_alg", \
1788 FT_UINT16, BASE_HEX, VALS(tls13_signature_algorithm), 0x0, \
1791 { & name .hf.hs_sig_hash_hash, \
1792 { "Signature Hash Algorithm Hash", prefix ".handshake.sig_hash_hash", \
1793 FT_UINT8, BASE_DEC, VALS(tls_hash_algorithm), 0x0, \
1794 "Hash algorithm (TLS 1.2)", HFILL } \
1796 { & name .hf.hs_sig_hash_sig, \
1797 { "Signature Hash Algorithm Signature", prefix ".handshake.sig_hash_sig", \
1798 FT_UINT8, BASE_DEC, VALS(tls_signature_algorithm), 0x0, \
1799 "Signature algorithm (TLS 1.2)", HFILL } \
1801 { & name .hf.hs_client_keyex_epms_len, \
1802 { "Encrypted PreMaster length", prefix ".handshake.epms_len", \
1803 FT_UINT16, BASE_DEC, NULL, 0x0, \
1804 "Length of encrypted PreMaster secret", HFILL } \
1806 { & name .hf.hs_client_keyex_epms, \
1807 { "Encrypted PreMaster", prefix ".handshake.epms", \
1808 FT_BYTES, BASE_NONE, NULL, 0x0, \
1809 "Encrypted PreMaster secret", HFILL } \
1811 { & name .hf.hs_server_keyex_modulus_len, \
1812 { "Modulus Length", prefix ".handshake.modulus_len", \
1813 FT_UINT16, BASE_DEC, NULL, 0x0, \
1814 "Length of RSA-EXPORT modulus", HFILL } \
1816 { & name .hf.hs_server_keyex_exponent_len, \
1817 { "Exponent Length", prefix ".handshake.exponent_len", \
1818 FT_UINT16, BASE_DEC, NULL, 0x0, \
1819 "Length of RSA-EXPORT exponent", HFILL } \
1821 { & name .hf.hs_server_keyex_sig_len, \
1822 { "Signature Length", prefix ".handshake.sig_len", \
1823 FT_UINT16, BASE_DEC, NULL, 0x0, \
1824 "Length of Signature", HFILL } \
1826 { & name .hf.hs_server_keyex_p_len, \
1827 { "p Length", prefix ".handshake.p_len", \
1828 FT_UINT16, BASE_DEC, NULL, 0x0, \
1829 "Length of p", HFILL } \
1831 { & name .hf.hs_server_keyex_g_len, \
1832 { "g Length", prefix ".handshake.g_len", \
1833 FT_UINT16, BASE_DEC, NULL, 0x0, \
1834 "Length of g", HFILL } \
1836 { & name .hf.hs_server_keyex_ys_len, \
1837 { "Pubkey Length", prefix ".handshake.ys_len", \
1838 FT_UINT16, BASE_DEC, NULL, 0x0, \
1839 "Length of server's Diffie-Hellman public key", HFILL } \
1841 { & name .hf.hs_client_keyex_yc_len, \
1842 { "Pubkey Length", prefix ".handshake.yc_len", \
1843 FT_UINT16, BASE_DEC, NULL, 0x0, \
1844 "Length of client's Diffie-Hellman public key", HFILL } \
1846 { & name .hf.hs_client_keyex_point_len, \
1847 { "Pubkey Length", prefix ".handshake.client_point_len", \
1848 FT_UINT8, BASE_DEC, NULL, 0x0, \
1849 "Length of client's EC Diffie-Hellman public key", HFILL } \
1851 { & name .hf.hs_server_keyex_point_len, \
1852 { "Pubkey Length", prefix ".handshake.server_point_len", \
1853 FT_UINT8, BASE_DEC, NULL, 0x0, \
1854 "Length of server's EC Diffie-Hellman public key", HFILL } \
1856 { & name .hf.hs_server_keyex_p, \
1857 { "p", prefix ".handshake.p", \
1858 FT_BYTES, BASE_NONE, NULL, 0x0, \
1859 "Diffie-Hellman p", HFILL } \
1861 { & name .hf.hs_server_keyex_g, \
1862 { "g", prefix ".handshake.g", \
1863 FT_BYTES, BASE_NONE, NULL, 0x0, \
1864 "Diffie-Hellman g", HFILL } \
1866 { & name .hf.hs_server_keyex_curve_type, \
1867 { "Curve Type", prefix ".handshake.server_curve_type", \
1868 FT_UINT8, BASE_HEX, VALS(ssl_curve_types), 0x0, \
1869 "Server curve_type", HFILL } \
1871 { & name .hf.hs_server_keyex_named_curve, \
1872 { "Named Curve", prefix ".handshake.server_named_curve", \
1873 FT_UINT16, BASE_HEX, VALS(ssl_extension_curves), 0x0, \
1874 "Server named_curve", HFILL } \
1876 { & name .hf.hs_server_keyex_ys, \
1877 { "Pubkey", prefix ".handshake.ys", \
1878 FT_BYTES, BASE_NONE, NULL, 0x0, \
1879 "Diffie-Hellman server pubkey", HFILL } \
1881 { & name .hf.hs_client_keyex_yc, \
1882 { "Pubkey", prefix ".handshake.yc", \
1883 FT_BYTES, BASE_NONE, NULL, 0x0, \
1884 "Diffie-Hellman client pubkey", HFILL } \
1886 { & name .hf.hs_server_keyex_point, \
1887 { "Pubkey", prefix ".handshake.server_point", \
1888 FT_BYTES, BASE_NONE, NULL, 0x0, \
1889 "EC Diffie-Hellman server pubkey", HFILL } \
1891 { & name .hf.hs_client_keyex_point, \
1892 { "Pubkey", prefix ".handshake.client_point", \
1893 FT_BYTES, BASE_NONE, NULL, 0x0, \
1894 "EC Diffie-Hellman client pubkey", HFILL } \
1896 { & name .hf.hs_server_keyex_xs_len, \
1897 { "Pubkey Length", prefix ".handshake.xs_len", \
1898 FT_UINT8, BASE_DEC, NULL, 0x0, \
1899 "Length of EC J-PAKE server public key", HFILL } \
1901 { & name .hf.hs_client_keyex_xc_len, \
1902 { "Pubkey Length", prefix ".handshake.xc_len", \
1903 FT_UINT8, BASE_DEC, NULL, 0x0, \
1904 "Length of EC J-PAKE client public key", HFILL } \
1906 { & name .hf.hs_server_keyex_xs, \
1907 { "Pubkey", prefix ".handshake.xs", \
1908 FT_BYTES, BASE_NONE, NULL, 0x0, \
1909 "EC J-PAKE server public key", HFILL } \
1911 { & name .hf.hs_client_keyex_xc, \
1912 { "Pubkey", prefix ".handshake.xc", \
1913 FT_BYTES, BASE_NONE, NULL, 0x0, \
1914 "EC J-PAKE client public key", HFILL } \
1916 { & name .hf.hs_server_keyex_vs_len, \
1917 { "Ephemeral Pubkey Length", prefix ".handshake.vs_len", \
1918 FT_UINT8, BASE_DEC, NULL, 0x0, \
1919 "Length of EC J-PAKE server ephemeral public key", HFILL } \
1921 { & name .hf.hs_client_keyex_vc_len, \
1922 { "Ephemeral Pubkey Length", prefix ".handshake.vc_len", \
1923 FT_UINT8, BASE_DEC, NULL, 0x0, \
1924 "Length of EC J-PAKE client ephemeral public key", HFILL } \
1926 { & name .hf.hs_server_keyex_vs, \
1927 { "Ephemeral Pubkey", prefix ".handshake.vs", \
1928 FT_BYTES, BASE_NONE, NULL, 0x0, \
1929 "EC J-PAKE server ephemeral public key", HFILL } \
1931 { & name .hf.hs_client_keyex_vc, \
1932 { "Ephemeral Pubkey", prefix ".handshake.vc", \
1933 FT_BYTES, BASE_NONE, NULL, 0x0, \
1934 "EC J-PAKE client ephemeral public key", HFILL } \
1936 { & name .hf.hs_server_keyex_rs_len, \
1937 { "Schnorr signature Length", prefix ".handshake.rs_len", \
1938 FT_UINT8, BASE_DEC, NULL, 0x0, \
1939 "Length of EC J-PAKE server Schnorr signature", HFILL } \
1941 { & name .hf.hs_client_keyex_rc_len, \
1942 { "Schnorr signature Length", prefix ".handshake.rc_len", \
1943 FT_UINT8, BASE_DEC, NULL, 0x0, \
1944 "Length of EC J-PAKE client Schnorr signature", HFILL } \
1946 { & name .hf.hs_server_keyex_rs, \
1947 { "Schnorr signature", prefix ".handshake.rs", \
1948 FT_BYTES, BASE_NONE, NULL, 0x0, \
1949 "EC J-PAKE server Schnorr signature", HFILL } \
1951 { & name .hf.hs_client_keyex_rc, \
1952 { "Schnorr signature", prefix ".handshake.rc", \
1953 FT_BYTES, BASE_NONE, NULL, 0x0, \
1954 "EC J-PAKE client Schnorr signature", HFILL } \
1956 { & name .hf.hs_server_keyex_modulus, \
1957 { "Modulus", prefix ".handshake.modulus", \
1958 FT_BYTES, BASE_NONE, NULL, 0x0, \
1959 "RSA-EXPORT modulus", HFILL } \
1961 { & name .hf.hs_server_keyex_exponent, \
1962 { "Exponent", prefix ".handshake.exponent", \
1963 FT_BYTES, BASE_NONE, NULL, 0x0, \
1964 "RSA-EXPORT exponent", HFILL } \
1966 { & name .hf.hs_server_keyex_sig, \
1967 { "Signature", prefix ".handshake.sig", \
1968 FT_BYTES, BASE_NONE, NULL, 0x0, \
1969 "Diffie-Hellman server signature", HFILL } \
1971 { & name .hf.hs_server_keyex_hint_len, \
1972 { "Hint Length", prefix ".handshake.hint_len", \
1973 FT_UINT16, BASE_DEC, NULL, 0x0, \
1974 "Length of PSK Hint", HFILL } \
1976 { & name .hf.hs_server_keyex_hint, \
1977 { "Hint", prefix ".handshake.hint", \
1978 FT_BYTES, BASE_NONE, NULL, 0x0, \
1979 "PSK Hint", HFILL } \
1981 { & name .hf.hs_client_keyex_identity_len, \
1982 { "Identity Length", prefix ".handshake.identity_len", \
1983 FT_UINT16, BASE_DEC, NULL, 0x0, \
1984 "Length of PSK Identity", HFILL } \
1986 { & name .hf.hs_client_keyex_identity, \
1987 { "Identity", prefix ".handshake.identity", \
1988 FT_BYTES, BASE_NONE, NULL, 0x0, \
1989 "PSK Identity", HFILL } \
1991 { & name .hf.hs_ext_heartbeat_mode, \
1992 { "Mode", prefix ".handshake.extension.heartbeat.mode", \
1993 FT_UINT8, BASE_DEC, VALS(tls_heartbeat_mode), 0x0, \
1994 "Heartbeat extension mode", HFILL } \
1996 { & name .hf.hs_certificates_len, \
1997 { "Certificates Length", prefix ".handshake.certificates_length", \
1998 FT_UINT24, BASE_DEC, NULL, 0x0, \
1999 "Length of certificates field", HFILL } \
2001 { & name .hf.hs_certificates, \
2002 { "Certificates", prefix ".handshake.certificates", \
2003 FT_NONE, BASE_NONE, NULL, 0x0, \
2004 "List of certificates", HFILL } \
2006 { & name .hf.hs_certificate, \
2007 { "Certificate", prefix ".handshake.certificate", \
2008 FT_BYTES, BASE_NONE, NULL, 0x0, \
2011 { & name .hf.hs_certificate_len, \
2012 { "Certificate Length", prefix ".handshake.certificate_length", \
2013 FT_UINT24, BASE_DEC, NULL, 0x0, \
2014 "Length of certificate", HFILL } \
2016 { & name .hf.hs_cert_types_count, \
2017 { "Certificate types count", prefix ".handshake.cert_types_count",\
2018 FT_UINT8, BASE_DEC, NULL, 0x0, \
2019 "Count of certificate types", HFILL } \
2021 { & name .hf.hs_cert_types, \
2022 { "Certificate types", prefix ".handshake.cert_types", \
2023 FT_NONE, BASE_NONE, NULL, 0x0, \
2024 "List of certificate types", HFILL } \
2026 { & name .hf.hs_cert_type, \
2027 { "Certificate type", prefix ".handshake.cert_type", \
2028 FT_UINT8, BASE_DEC, VALS(ssl_31_client_certificate_type), 0x0, \
2031 { & name .hf.hs_dnames_len, \
2032 { "Distinguished Names Length", prefix ".handshake.dnames_len", \
2033 FT_UINT16, BASE_DEC, NULL, 0x0, \
2034 "Length of list of CAs that server trusts", HFILL } \
2036 { & name .hf.hs_dnames, \
2037 { "Distinguished Names", prefix ".handshake.dnames", \
2038 FT_NONE, BASE_NONE, NULL, 0x0, \
2039 "List of CAs that server trusts", HFILL } \
2041 { & name .hf.hs_dname_len, \
2042 { "Distinguished Name Length", prefix ".handshake.dname_len", \
2043 FT_UINT16, BASE_DEC, NULL, 0x0, \
2044 "Length of distinguished name", HFILL } \
2046 { & name .hf.hs_dnames_truncated, \
2047 { "Tree view truncated", prefix ".handshake.dnames_truncated", \
2048 FT_NONE, BASE_NONE, NULL, 0x00, \
2049 "Some Distinguished Names are not added to tree pane to limit resources", HFILL } \
2051 { & name .hf.hs_dname, \
2052 { "Distinguished Name", prefix ".handshake.dname", \
2053 FT_NONE, BASE_NONE, NULL, 0x0, \
2054 "Distinguished name of a CA that server trusts", HFILL } \
2056 { & name .hf.hs_random, \
2057 { "Random", prefix ".handshake.random", \
2058 FT_BYTES, BASE_NONE, NULL, 0x0, \
2059 "Random values used for deriving keys", HFILL } \
2061 { & name .hf.hs_random_time, \
2062 { "GMT Unix Time", prefix ".handshake.random_time", \
2063 FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0, \
2064 "Unix time field of random structure", HFILL } \
2066 { & name .hf.hs_random_bytes, \
2067 { "Random Bytes", prefix ".handshake.random_bytes", \
2068 FT_BYTES, BASE_NONE, NULL, 0x0, \
2069 "Random values used for deriving keys", HFILL } \
2071 { & name .hf.hs_session_id, \
2072 { "Session ID", prefix ".handshake.session_id", \
2073 FT_BYTES, BASE_NONE, NULL, 0x0, \
2074 "Identifies the SSL session, allowing later resumption", HFILL }\
2076 { & name .hf.hs_session_id_len, \
2077 { "Session ID Length", prefix ".handshake.session_id_length", \
2078 FT_UINT8, BASE_DEC, NULL, 0x0, \
2079 "Length of Session ID field", HFILL } \
2081 { & name .hf.hs_client_version, \
2082 { "Version", prefix ".handshake.version", \
2083 FT_UINT16, BASE_HEX, VALS(ssl_versions), 0x0, \
2084 "Maximum version supported by client [legacy_version if supported_versions ext is present]", HFILL } \
2086 { & name .hf.hs_server_version, \
2087 { "Version", prefix ".handshake.version", \
2088 FT_UINT16, BASE_HEX, VALS(ssl_versions), 0x0, \
2089 "Version selected by server [legacy_version if supported_versions ext is present]", HFILL } \
2091 { & name .hf.hs_cipher_suites_len, \
2092 { "Cipher Suites Length", prefix ".handshake.cipher_suites_length", \
2093 FT_UINT16, BASE_DEC, NULL, 0x0, \
2094 "Length of cipher suites field", HFILL } \
2096 { & name .hf.hs_cipher_suites, \
2097 { "Cipher Suites", prefix ".handshake.ciphersuites", \
2098 FT_NONE, BASE_NONE, NULL, 0x0, \
2099 "List of cipher suites supported by client", HFILL } \
2101 { & name .hf.hs_cipher_suite, \
2102 { "Cipher Suite", prefix ".handshake.ciphersuite", \
2103 FT_UINT16, BASE_HEX|BASE_EXT_STRING, &ssl_31_ciphersuite_ext, 0x0, \
2106 { & name .hf.hs_comp_methods_len, \
2107 { "Compression Methods Length", prefix ".handshake.comp_methods_length", \
2108 FT_UINT8, BASE_DEC, NULL, 0x0, \
2109 "Length of compression methods field", HFILL } \
2111 { & name .hf.hs_comp_methods, \
2112 { "Compression Methods", prefix ".handshake.comp_methods", \
2113 FT_NONE, BASE_NONE, NULL, 0x0, \
2114 "List of compression methods supported by client", HFILL } \
2116 { & name .hf.hs_comp_method, \
2117 { "Compression Method", prefix ".handshake.comp_method", \
2118 FT_UINT8, BASE_DEC, VALS(ssl_31_compression_method), 0x0, \
2121 { & name .hf.hs_session_ticket_lifetime_hint, \
2122 { "Session Ticket Lifetime Hint", \
2123 prefix ".handshake.session_ticket_lifetime_hint", \
2124 FT_UINT32, BASE_DEC|BASE_UNIT_STRING, UNS(&units_second_seconds), 0x0, \
2125 "New Session Ticket Lifetime Hint", HFILL } \
2127 { & name .hf.hs_session_ticket_age_add, \
2128 { "Session Ticket Age Add", \
2129 prefix ".handshake.session_ticket_age_add", \
2130 FT_UINT32, BASE_DEC, NULL, 0x0, \
2131 "Random 32-bit value to obscure age of ticket", HFILL } \
2133 { & name .hf.hs_session_ticket_nonce_len, \
2134 { "Session Ticket Nonce Length", prefix ".handshake.session_ticket_nonce_length", \
2135 FT_UINT8, BASE_DEC, NULL, 0x0, \
2138 { & name .hf.hs_session_ticket_nonce, \
2139 { "Session Ticket Nonce", prefix ".handshake.session_ticket_nonce", \
2140 FT_BYTES, BASE_NONE, NULL, 0x0, \
2141 "A unique per-ticket value", HFILL } \
2143 { & name .hf.hs_session_ticket_len, \
2144 { "Session Ticket Length", prefix ".handshake.session_ticket_length", \
2145 FT_UINT16, BASE_DEC, NULL, 0x0, \
2146 "New Session Ticket Length", HFILL } \
2148 { & name .hf.hs_session_ticket, \
2149 { "Session Ticket", prefix ".handshake.session_ticket", \
2150 FT_BYTES, BASE_NONE, NULL, 0x0, \
2151 "New Session Ticket", HFILL } \
2153 { & name .hf.hs_finished, \
2154 { "Verify Data", prefix ".handshake.verify_data", \
2155 FT_BYTES, BASE_NONE, NULL, 0x0, \
2156 "Opaque verification data", HFILL } \
2158 { & name .hf.hs_client_cert_vrfy_sig_len, \
2159 { "Signature length", prefix ".handshake.client_cert_vrfy.sig_len", \
2160 FT_UINT16, BASE_DEC, NULL, 0x0, \
2161 "Length of CertificateVerify's signature", HFILL } \
2163 { & name .hf.hs_client_cert_vrfy_sig, \
2164 { "Signature", prefix ".handshake.client_cert_vrfy.sig", \
2165 FT_BYTES, BASE_NONE, NULL, 0x0, \
2166 "CertificateVerify's signature", HFILL } \
2168 { & name .hf.hs_ja3_full, \
2169 { "JA3 Fullstring", prefix ".handshake.ja3_full", \
2170 FT_STRING, BASE_NONE, NULL, 0x0, \
2173 { & name .hf.hs_ja3_hash, \
2174 { "JA3", prefix ".handshake.ja3", \
2175 FT_STRING, BASE_NONE, NULL, 0x0, \
2178 { & name .hf.hs_ja3s_full, \
2179 { "JA3S Fullstring", prefix ".handshake.ja3s_full", \
2180 FT_STRING, BASE_NONE, NULL, 0x0, \
2183 { & name .hf.hs_ja3s_hash, \
2184 { "JA3S", prefix ".handshake.ja3s", \
2185 FT_STRING, BASE_NONE, NULL, 0x0, \
2188 { & name .hf.hs_ja4, \
2189 { "JA4", prefix ".handshake.ja4", \
2190 FT_STRING, BASE_NONE, NULL, 0x0, \
2193 { & name .hf.hs_ja4_r, \
2194 { "JA4_r", prefix ".handshake.ja4_r", \
2195 FT_STRING, BASE_NONE, NULL, 0x0, \
2198 { & name .hf.hs_ext_psk_ke_modes_length, \
2199 { "PSK Key Exchange Modes Length", prefix ".extension.psk_ke_modes_length", \
2200 FT_UINT8, BASE_DEC, NULL, 0x0, \
2203 { & name .hf.hs_ext_psk_ke_mode, \
2204 { "PSK Key Exchange Mode", prefix ".extension.psk_ke_mode", \
2205 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_psk_ke_mode), 0x0, \
2206 "Key exchange modes where the client supports use of PSKs", HFILL } \
2208 { & name .hf.hs_certificate_request_context_length, \
2209 { "Certificate Request Context Length", prefix ".handshake.certificate_request_context_length", \
2210 FT_UINT8, BASE_DEC, NULL, 0x0, \
2213 { & name .hf.hs_certificate_request_context, \
2214 { "Certificate Request Context", prefix ".handshake.certificate_request_context", \
2215 FT_BYTES, BASE_NONE, NULL, 0x0, \
2216 "Value from CertificateRequest or empty for server auth", HFILL } \
2218 { & name .hf.hs_key_update_request_update, \
2219 { "Key Update Request", prefix ".handshake.key_update.request_update", \
2220 FT_UINT8, BASE_DEC, VALS(tls13_key_update_request), 0x00, \
2221 "Whether the receiver should also update its keys", HFILL } \
2223 { & name .hf.sct_scts_length, \
2224 { "Serialized SCT List Length", prefix ".sct.scts_length", \
2225 FT_UINT16, BASE_DEC, NULL, 0x00, \
2228 { & name .hf.sct_sct_length, \
2229 { "Serialized SCT Length", prefix ".sct.sct_length", \
2230 FT_UINT16, BASE_DEC, NULL, 0x00, \
2233 { & name .hf.sct_sct_version, \
2234 { "SCT Version", prefix ".sct.sct_version", \
2235 FT_UINT8, BASE_DEC, NULL, 0x00, \
2236 "SCT Protocol version (v1 (0) is defined in RFC 6962)", HFILL } \
2238 { & name .hf.sct_sct_logid, \
2239 { "Log ID", prefix ".sct.sct_logid", \
2240 FT_BYTES, BASE_NONE, NULL, 0x00, \
2241 "SHA-256 hash of log's public key", HFILL } \
2243 { & name .hf.sct_sct_timestamp, \
2244 { "Timestamp", prefix ".sct.sct_timestamp", \
2245 FT_ABSOLUTE_TIME, ABSOLUTE_TIME_UTC, NULL, 0x00, \
2246 "Timestamp of issuance", HFILL } \
2248 { & name .hf.sct_sct_extensions_length, \
2249 { "Extensions length", prefix ".sct.sct_extensions_length", \
2250 FT_UINT16, BASE_DEC, NULL, 0x00, \
2251 "Length of future extensions to this protocol (currently none)", HFILL } \
2253 { & name .hf.sct_sct_extensions, \
2254 { "Extensions", prefix ".sct.sct_extensions", \
2255 FT_NONE, BASE_NONE, NULL, 0x00, \
2256 "Future extensions to this protocol (currently none)", HFILL } \
2258 { & name .hf.sct_sct_signature_length, \
2259 { "Signature Length", prefix ".sct.sct_signature_length", \
2260 FT_UINT16, BASE_DEC, NULL, 0x00, \
2263 { & name .hf.sct_sct_signature, \
2264 { "Signature", prefix ".sct.sct_signature", \
2265 FT_BYTES, BASE_NONE, NULL, 0x00, \
2268 { & name .hf.hs_ext_max_early_data_size, \
2269 { "Maximum Early Data Size", prefix ".early_data.max_early_data_size", \
2270 FT_UINT32, BASE_DEC, NULL, 0x00, \
2271 "Maximum amount of 0-RTT data that the client may send", HFILL } \
2273 { & name .hf.hs_ext_oid_filters_length, \
2274 { "OID Filters Length", prefix ".extension.oid_filters_length", \
2275 FT_UINT16, BASE_DEC, NULL, 0x00, \
2278 { & name .hf.hs_ext_oid_filters_oid_length, \
2279 { "Certificate Extension OID Length", prefix ".extension.oid_filters.oid_length", \
2280 FT_UINT8, BASE_DEC, NULL, 0x00, \
2283 { & name .hf.hs_ext_oid_filters_oid, \
2284 { "Certificate Extension OID", prefix ".extension.oid_filters.oid", \
2285 FT_OID, BASE_NONE, NULL, 0x00, \
2288 { & name .hf.hs_ext_oid_filters_values_length, \
2289 { "Certificate Extension Values Length", prefix ".extension.oid_filters.values_length", \
2290 FT_UINT16, BASE_DEC, NULL, 0x00, \
2293 { & name .hf.hs_cred_valid_time, \
2294 { "Valid Time", prefix ".handshake.cred.valid_time", \
2295 FT_UINT16, BASE_DEC, NULL, 0x0, \
2296 "Delegated Credentials Valid Time", HFILL } \
2298 { & name .hf.hs_cred_pubkey, \
2299 { "Subject Public Key Info", prefix ".handshake.cred.pubkey", \
2300 FT_BYTES, BASE_NONE, NULL, 0x0, \
2301 "Delegated Credentials Subject Public Key Info", HFILL } \
2303 { & name .hf.hs_cred_pubkey_len, \
2304 { "Subject Public Key Info Length", prefix ".handshake.cred.pubkey_len", \
2305 FT_UINT24, BASE_DEC, NULL, 0x0, \
2306 "Delegated Credentials Subject Public Key Info Length", HFILL } \
2308 { & name .hf.hs_cred_signature, \
2309 { "Signature", prefix ".handshake.cred.signature", \
2310 FT_BYTES, BASE_NONE, NULL, 0x0, \
2311 "Delegated Credentials Signature", HFILL } \
2313 { & name .hf.hs_cred_signature_len, \
2314 { "Signature Length", prefix ".handshake.cred.signature_len", \
2315 FT_UINT16, BASE_DEC, NULL, 0x0, \
2316 "Delegated Credentials Signature Length", HFILL } \
2318 { & name .hf.hs_ext_compress_certificate_algorithms_length, \
2319 { "Algorithms Length", prefix ".compress_certificate.algorithms_length", \
2320 FT_UINT8, BASE_DEC, NULL, 0x00, \
2323 { & name .hf.hs_ext_compress_certificate_algorithm, \
2324 { "Algorithm", prefix ".compress_certificate.algorithm", \
2325 FT_UINT16, BASE_DEC, VALS(compress_certificate_algorithm_vals), 0x00, \
2328 { & name .hf.hs_ext_compress_certificate_uncompressed_length, \
2329 { "Uncompressed Length", prefix ".compress_certificate.uncompressed_length", \
2330 FT_UINT24, BASE_DEC, NULL, 0x00, \
2333 { & name .hf.hs_ext_compress_certificate_compressed_certificate_message_length, \
2334 { "Length", prefix ".compress_certificate.compressed_certificate_message.length", \
2335 FT_UINT24, BASE_DEC, NULL, 0x00, \
2338 { & name .hf.hs_ext_compress_certificate_compressed_certificate_message, \
2339 { "Compressed Certificate Message", prefix ".compress_certificate.compressed_certificate_message", \
2340 FT_BYTES, BASE_NONE, NULL, 0x00, \
2343 { & name .hf.hs_ext_token_binding_version_major, \
2344 { "Protocol Major Version", prefix ".token_binding.version_major", \
2345 FT_UINT8, BASE_HEX, NULL, 0x00, \
2346 "Major version of the Token Binding protocol", HFILL } \
2348 { & name .hf.hs_ext_token_binding_version_minor, \
2349 { "Protocol Minor Version", prefix ".token_binding.version_minor", \
2350 FT_UINT8, BASE_HEX, NULL, 0x00, \
2351 "Minor version of the Token Binding protocol", HFILL } \
2353 { & name .hf.hs_ext_token_binding_key_parameters, \
2354 { "Key Parameters", prefix ".token_binding.key_parameters", \
2355 FT_NONE, BASE_NONE, NULL, 0x0, \
2358 { & name .hf.hs_ext_token_binding_key_parameters_length, \
2359 { "Key Parameters Length", prefix ".token_binding.key_parameters_length", \
2360 FT_UINT8, BASE_DEC, NULL, 0x00, \
2361 "Length of the key parameters list", HFILL } \
2363 { & name .hf.hs_ext_token_binding_key_parameter, \
2364 { "Key Parameter", prefix ".token_binding.key_parameter", \
2365 FT_UINT8, BASE_DEC, VALS(token_binding_key_parameter_vals), 0x00, \
2366 "Identifier of the Token Binding key parameter", HFILL } \
2368 { & name .hf.hs_ext_record_size_limit, \
2369 { "Record Size Limit", prefix ".record_size_limit", \
2370 FT_UINT16, BASE_DEC, NULL, 0x00, \
2371 "Maximum record size that an endpoint is willing to receive", HFILL } \
2373 { & name .hf.hs_ext_quictp_len, \
2374 { "Parameters Length", prefix ".quic.len", \
2375 FT_UINT16, BASE_DEC, NULL, 0x00, \
2378 { & name .hf.hs_ext_quictp_parameter, \
2379 { "Parameter", prefix ".quic.parameter", \
2380 FT_NONE, BASE_NONE, NULL, 0x00, \
2383 { & name .hf.hs_ext_quictp_parameter_type, \
2384 { "Type", prefix ".quic.parameter.type", \
2385 FT_UINT64, BASE_CUSTOM, CF_FUNC(quic_transport_parameter_id_base_custom), 0x00, \
2388 { & name .hf.hs_ext_quictp_parameter_len, \
2389 { "Length", prefix ".quic.parameter.length", \
2390 FT_UINT64, BASE_DEC, NULL, 0x00, \
2393 { & name .hf.hs_ext_quictp_parameter_len_old, \
2394 { "Length", prefix ".quic.parameter.length.old", \
2395 FT_UINT16, BASE_DEC, NULL, 0x00, \
2398 { & name .hf.hs_ext_quictp_parameter_value, \
2399 { "Value", prefix ".quic.parameter.value", \
2400 FT_BYTES, BASE_NONE, NULL, 0x00, \
2403 { & name .hf.hs_ext_quictp_parameter_original_destination_connection_id, \
2404 { "original_destination_connection_id", prefix ".quic.parameter.original_destination_connection_id", \
2405 FT_BYTES, BASE_NONE, NULL, 0x00, \
2406 "Destination Connection ID from the first Initial packet sent by the client", HFILL } \
2408 { & name .hf.hs_ext_quictp_parameter_max_idle_timeout, \
2409 { "max_idle_timeout", prefix ".quic.parameter.max_idle_timeout", \
2410 FT_UINT64, BASE_DEC, NULL, 0x00, \
2411 "In milliseconds", HFILL } \
2413 { & name .hf.hs_ext_quictp_parameter_stateless_reset_token, \
2414 { "stateless_reset_token", prefix ".quic.parameter.stateless_reset_token", \
2415 FT_BYTES, BASE_NONE, NULL, 0x00, \
2416 "Used in verifying a stateless reset", HFILL } \
2418 { & name .hf.hs_ext_quictp_parameter_max_udp_payload_size, \
2419 { "max_udp_payload_size", prefix ".quic.parameter.max_udp_payload_size", \
2420 FT_UINT64, BASE_DEC, NULL, 0x00, \
2421 "Maximum UDP payload size that the endpoint is willing to receive", HFILL } \
2423 { & name .hf.hs_ext_quictp_parameter_initial_max_data, \
2424 { "initial_max_data", prefix ".quic.parameter.initial_max_data", \
2425 FT_UINT64, BASE_DEC, NULL, 0x00, \
2426 "Contains the initial value for the maximum amount of data that can be sent on the connection", HFILL } \
2428 { & name .hf.hs_ext_quictp_parameter_initial_max_stream_data_bidi_local, \
2429 { "initial_max_stream_data_bidi_local", prefix ".quic.parameter.initial_max_stream_data_bidi_local", \
2430 FT_UINT64, BASE_DEC, NULL, 0x00, \
2431 "Initial stream maximum data for bidirectional, locally-initiated streams", HFILL } \
2433 { & name .hf.hs_ext_quictp_parameter_initial_max_stream_data_bidi_remote, \
2434 { "initial_max_stream_data_bidi_remote", prefix ".quic.parameter.initial_max_stream_data_bidi_remote", \
2435 FT_UINT64, BASE_DEC, NULL, 0x00, \
2436 "Initial stream maximum data for bidirectional, peer-initiated streams", HFILL } \
2438 { & name .hf.hs_ext_quictp_parameter_initial_max_stream_data_uni, \
2439 { "initial_max_stream_data_uni", prefix ".quic.parameter.initial_max_stream_data_uni", \
2440 FT_UINT64, BASE_DEC, NULL, 0x00, \
2441 "Initial stream maximum data for unidirectional streams parameter", HFILL } \
2443 { & name .hf.hs_ext_quictp_parameter_initial_max_streams_bidi, \
2444 { "initial_max_streams_bidi", prefix ".quic.parameter.initial_max_streams_bidi", \
2445 FT_UINT64, BASE_DEC, NULL, 0x00, \
2446 "Initial maximum number of application-owned bidirectional streams", HFILL } \
2448 { & name .hf.hs_ext_quictp_parameter_initial_max_streams_uni, \
2449 { "initial_max_streams_uni", prefix ".quic.parameter.initial_max_streams_uni", \
2450 FT_UINT64, BASE_DEC, NULL, 0x00, \
2451 "Initial maximum number of application-owned unidirectional streams", HFILL } \
2453 { & name .hf.hs_ext_quictp_parameter_ack_delay_exponent, \
2454 { "ack_delay_exponent", prefix ".quic.parameter.ack_delay_exponent", \
2455 FT_UINT64, BASE_DEC, NULL, 0x00, \
2456 "Indicating an exponent used to decode the ACK Delay field in the ACK frame,", HFILL } \
2458 { & name .hf.hs_ext_quictp_parameter_max_ack_delay, \
2459 { "max_ack_delay", prefix ".quic.parameter.max_ack_delay", \
2460 FT_UINT64, BASE_DEC, NULL, 0x00, \
2461 "Indicating the maximum amount of time in milliseconds by which it will delay sending of acknowledgments", HFILL } \
2463 { & name .hf.hs_ext_quictp_parameter_pa_ipv4address, \
2464 { "ipv4Address", prefix ".quic.parameter.preferred_address.ipv4address", \
2465 FT_IPv4, BASE_NONE, NULL, 0x00, \
2468 { & name .hf.hs_ext_quictp_parameter_pa_ipv6address, \
2469 { "ipv6Address", prefix ".quic.parameter.preferred_address.ipv6address", \
2470 FT_IPv6, BASE_NONE, NULL, 0x00, \
2473 { & name .hf.hs_ext_quictp_parameter_pa_ipv4port, \
2474 { "ipv4Port", prefix ".quic.parameter.preferred_address.ipv4port", \
2475 FT_UINT16, BASE_DEC, NULL, 0x00, \
2478 { & name .hf.hs_ext_quictp_parameter_pa_ipv6port, \
2479 { "ipv6Port", prefix ".quic.parameter.preferred_address.ipv6port", \
2480 FT_UINT16, BASE_DEC, NULL, 0x00, \
2483 { & name .hf.hs_ext_quictp_parameter_pa_connectionid_length, \
2484 { "Length", prefix ".quic.parameter.preferred_address.connectionid.length", \
2485 FT_UINT8, BASE_DEC, NULL, 0x00, \
2486 "Length of connectionId Field", HFILL } \
2488 { & name .hf.hs_ext_quictp_parameter_pa_connectionid, \
2489 { "connectionId", prefix ".quic.parameter.preferred_address.connectionid", \
2490 FT_BYTES, BASE_NONE, NULL, 0x00, \
2493 { & name .hf.hs_ext_quictp_parameter_pa_statelessresettoken, \
2494 { "statelessResetToken", prefix ".quic.parameter.preferred_address.statelessresettoken", \
2495 FT_BYTES, BASE_NONE, NULL, 0x00, \
2498 { & name .hf.hs_ext_quictp_parameter_active_connection_id_limit, \
2499 { "Active Connection ID Limit", prefix ".quic.parameter.active_connection_id_limit", \
2500 FT_UINT64, BASE_DEC, NULL, 0x00, \
2503 { & name .hf.hs_ext_quictp_parameter_initial_source_connection_id, \
2504 { "Initial Source Connection ID", prefix ".quic.parameter.initial_source_connection_id", \
2505 FT_BYTES, BASE_NONE, NULL, 0x00, \
2508 { & name .hf.hs_ext_quictp_parameter_retry_source_connection_id, \
2509 { "Retry Source Connection ID", prefix ".quic.parameter.retry_source_connection_id", \
2510 FT_BYTES, BASE_NONE, NULL, 0x00, \
2513 { & name .hf.hs_ext_quictp_parameter_max_datagram_frame_size, \
2514 { "max_datagram_frame_size", prefix ".quic.parameter.max_datagram_frame_size", \
2515 FT_UINT64, BASE_DEC, NULL, 0x00, \
2518 { & name .hf.hs_ext_quictp_parameter_cibir_encoding_length, \
2519 { "length", prefix ".quic.parameter.cibir_encoding.length", \
2520 FT_UINT64, BASE_DEC, NULL, 0x00, \
2523 { & name .hf.hs_ext_quictp_parameter_cibir_encoding_offset, \
2524 { "offset", prefix ".quic.parameter.cibir_encoding.offset", \
2525 FT_UINT64, BASE_DEC, NULL, 0x00, \
2528 { & name .hf.hs_ext_quictp_parameter_loss_bits, \
2529 { "loss_bits", prefix ".quic.parameter.loss_bits", \
2530 FT_UINT64, BASE_DEC, NULL, 0x00, \
2533 { & name .hf.hs_ext_quictp_parameter_address_discovery, \
2534 { "address_discovery", prefix ".quic.parameter.address_discovery", \
2535 FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(quic_address_discovery_vals), 0x00, \
2538 { & name .hf.hs_ext_quictp_parameter_enable_time_stamp_v2, \
2539 { "Enable TimestampV2", prefix ".quic.parameter.enable_time_stamp_v2", \
2540 FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(quic_enable_time_stamp_v2_vals), 0x00, \
2543 { & name .hf.hs_ext_quictp_parameter_min_ack_delay, \
2544 { "min_ack_delay", prefix ".quic.parameter.min_ack_delay", \
2545 FT_UINT64, BASE_DEC, NULL, 0x00, \
2548 { & name .hf.hs_ext_quictp_parameter_google_user_agent_id, \
2549 { "Google UserAgent", prefix ".quic.parameter.google.user_agent", \
2550 FT_STRING, BASE_NONE, NULL, 0x00, \
2553 { & name .hf.hs_ext_quictp_parameter_google_key_update_not_yet_supported, \
2554 { "Google Key Update not yet supported", prefix ".quic.parameter.google.key_update_not_yet_supported", \
2555 FT_NONE, BASE_NONE, NULL, 0x00, \
2558 { & name .hf.hs_ext_quictp_parameter_google_quic_version, \
2559 { "Google QUIC version", prefix ".quic.parameter.google.quic_version", \
2560 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2563 { & name .hf.hs_ext_quictp_parameter_google_initial_rtt, \
2564 { "Google Initial RTT", prefix ".quic.parameter.google.initial_rtt", \
2565 FT_UINT64, BASE_DEC, NULL, 0x00, \
2568 { & name .hf.hs_ext_quictp_parameter_google_support_handshake_done, \
2569 { "Google Support Handshake Done", prefix ".quic.parameter.google.support_handshake_done", \
2570 FT_NONE, BASE_NONE, NULL, 0x00, \
2573 { & name .hf.hs_ext_quictp_parameter_google_quic_params, \
2574 { "Google QUIC parameters", prefix ".quic.parameter.google.quic_params", \
2575 FT_BYTES, BASE_NONE, NULL, 0x00, \
2578 { & name .hf.hs_ext_quictp_parameter_google_quic_params_unknown_field, \
2579 { "Google Unknown Field", prefix ".quic.parameter.google.quic_params_unknown_field", \
2580 FT_BYTES, BASE_NONE, NULL, 0x00, \
2583 { & name .hf.hs_ext_quictp_parameter_google_connection_options, \
2584 { "Google Connection options", prefix ".quic.parameter.google.connection_options", \
2585 FT_BYTES, BASE_NONE, NULL, 0x00, \
2588 { & name .hf.hs_ext_quictp_parameter_google_supported_versions_length, \
2589 { "Google Supported Versions Length", prefix ".quic.parameter.google.supported_versions_length", \
2590 FT_UINT8, BASE_DEC, NULL, 0x00, \
2593 { & name .hf.hs_ext_quictp_parameter_google_supported_version, \
2594 { "Google Supported Version", prefix ".quic.parameter.google.supported_version", \
2595 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2598 { & name .hf.hs_ext_quictp_parameter_facebook_partial_reliability, \
2599 { "Facebook Partial Reliability", prefix ".quic.parameter.facebook.partial_reliability", \
2600 FT_UINT64, BASE_DEC, NULL, 0x00, \
2603 { & name .hf.hs_ext_quictp_parameter_chosen_version, \
2604 { "Chosen Version", prefix ".quic.parameter.vi.chosen_version", \
2605 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2608 { & name .hf.hs_ext_quictp_parameter_other_version, \
2609 { "Other Version", prefix ".quic.parameter.vi.other_version", \
2610 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2613 { & name .hf.hs_ext_quictp_parameter_enable_multipath, \
2614 { "Enable Multipath", prefix ".quic.parameter.enable_multipath", \
2615 FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(quic_enable_multipath_vals), 0x00, \
2618 { & name .hf.hs_ext_quictp_parameter_initial_max_paths, \
2619 { "Initial Max Paths", prefix ".quic.parameter.initial_max_paths", \
2620 FT_UINT64, BASE_DEC, NULL, 0x00, \
2623 { & name .hf.hs_ext_quictp_parameter_initial_max_path_id, \
2624 { "Initial Max Path ID", prefix ".quic.parameter.initial_max_path_id", \
2625 FT_UINT64, BASE_DEC, NULL, 0x00, \
2628 { & name .hf.hs_ext_connection_id_length, \
2629 { "Connection ID length", prefix ".connection_id_length", \
2630 FT_UINT8, BASE_DEC, NULL, 0x00, \
2633 { & name .hf.hs_ext_connection_id, \
2634 { "Connection ID", prefix ".connection_id", \
2635 FT_BYTES, BASE_NONE, NULL, 0x00, \
2638 { & name .hf.hs_ext_trusted_ca_keys_len, \
2639 { "Trusted CA keys length", prefix ".handshake.trusted_ca.keys_length", \
2640 FT_UINT16, BASE_DEC, NULL, 0x00, \
2641 "Length of Trusted CA keys extension", HFILL } \
2643 { & name .hf.hs_ext_trusted_ca_keys_list, \
2644 { "Trusted CA keys", prefix ".handshake.trusted_ca.keys", \
2645 FT_NONE, BASE_NONE, NULL, 0x00, \
2646 "List of Trusted CA keys", HFILL } \
2648 { & name .hf.hs_ext_trusted_ca_key, \
2649 { "Trusted CA key", prefix ".handshake.trusted_ca.key", \
2650 FT_NONE, BASE_NONE, NULL, 0x0, \
2653 { & name .hf.hs_ext_trusted_ca_key_type, \
2654 { "Trusted CA key type", prefix ".handshake.trusted_ca.key_type", \
2655 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_trusted_ca_key_type), 0x00, \
2656 "Type of Trusted CA key", HFILL } \
2658 { & name .hf.hs_ext_trusted_ca_key_hash, \
2659 { "Trusted CA key hash", prefix ".handshake.trusted_ca.key_hash", \
2660 FT_BYTES, BASE_NONE, NULL, 0x00, \
2663 { & name .hf.hs_ext_trusted_ca_key_dname_len, \
2664 { "Distinguished Name Length", prefix ".handshake.trusted_ca.key_dname_len", \
2665 FT_UINT16, BASE_DEC, NULL, 0x0, \
2666 "Length of distinguished name", HFILL } \
2668 { & name .hf.hs_ext_trusted_ca_key_dname, \
2669 { "Distinguished Name", prefix ".handshake.trusted_ca.key_dname", \
2670 FT_NONE, BASE_NONE, NULL, 0x0, \
2671 "Distinguished name of a CA that the client trusts", HFILL } \
2673 { & name .hf.esni_suite, \
2674 { "Cipher Suite", prefix ".esni.suite", \
2675 FT_UINT16, BASE_HEX|BASE_EXT_STRING, &ssl_31_ciphersuite_ext, 0x0, \
2676 "Cipher suite used to encrypt the SNI", HFILL } \
2678 { & name .hf.esni_record_digest_length, \
2679 { "Record Digest Length", prefix ".esni.record_digest_length", \
2680 FT_UINT16, BASE_DEC, NULL, 0x00, \
2683 { & name .hf.esni_record_digest, \
2684 { "Record Digest", prefix ".esni.record_digest", \
2685 FT_BYTES, BASE_NONE, NULL, 0x00, \
2686 "Cryptographic hash of the ESNIKeys from which the ESNI key was obtained", HFILL } \
2688 { & name .hf.esni_encrypted_sni_length, \
2689 { "Encrypted SNI Length", prefix ".esni.encrypted_sni_length", \
2690 FT_UINT16, BASE_DEC, NULL, 0x00, \
2693 { & name .hf.esni_encrypted_sni, \
2694 { "Encrypted SNI", prefix ".esni.encrypted_sni", \
2695 FT_BYTES, BASE_NONE, NULL, 0x00, \
2696 "The encrypted ClientESNIInner structure", HFILL } \
2698 { & name .hf.esni_nonce, \
2699 { "Nonce", prefix ".esni.nonce", \
2700 FT_BYTES, BASE_NONE, NULL, 0x00, \
2701 "Contents of ClientESNIInner.nonce", HFILL } \
2703 { & name .hf.ech_echconfiglist_length, \
2704 { "ECHConfigList length", prefix ".ech.echconfiglist_length", \
2705 FT_UINT16, BASE_DEC, NULL, 0x0, \
2706 "Encrypted ClientHello (ECH) Configurations length", HFILL } \
2708 { & name .hf.ech_echconfiglist, \
2709 { "ECHConfigList", prefix ".ech.echconfiglist", \
2710 FT_NONE, BASE_NONE, NULL, 0x0, \
2711 "Encrypted ClientHello (ECH) Configurations", HFILL } \
2713 { & name .hf.ech_echconfig, \
2714 { "ECHConfig", prefix ".ech.echconfig", \
2715 FT_NONE, BASE_NONE, NULL, 0x0, \
2716 "Encrypted ClientHello (ECH) Configuration", HFILL } \
2718 { & name .hf.ech_echconfig_version, \
2719 { "Version", prefix ".ech.echconfig.version", \
2720 FT_UINT16, BASE_HEX, NULL, 0x0, \
2721 "Encrypted ClientHello: ECHConfig version", HFILL } \
2723 { & name .hf.ech_echconfig_length, \
2724 { "Length", prefix ".ech.echconfig.length", \
2725 FT_UINT16, BASE_DEC, NULL, 0x0, \
2726 "Encrypted ClientHello: ECHConfig length", HFILL } \
2728 { & name .hf.ech_echconfigcontents_maximum_name_length, \
2729 { "Maximum Name Length", prefix ".ech.echconfigcontents.maximum_name_length", \
2730 FT_UINT8, BASE_DEC, NULL, 0x0, \
2731 "The longest name of a backend server, if known", HFILL } \
2733 { & name .hf.ech_echconfigcontents_public_name_length, \
2734 { "Public Name length", prefix ".ech.echconfigcontents.public_name_length", \
2735 FT_UINT8, BASE_DEC, NULL, 0x0, \
2736 "Length of the Public Name field", HFILL } \
2738 { & name .hf.ech_echconfigcontents_public_name, \
2739 { "Public Name", prefix ".ech.echconfigcontents.public_name", \
2740 FT_STRING, BASE_NONE, NULL, 0x0, \
2741 "The DNS name of the client-facing server, i.e., the entity trusted to update the ECH configuration", HFILL } \
2743 { & name .hf.ech_echconfigcontents_extensions_length, \
2744 { "Extensions length", prefix ".ech.echconfigcontents.extensions_length", \
2745 FT_UINT16, BASE_DEC, NULL, 0x0, \
2746 "Length of the Extensions field", HFILL } \
2748 { & name .hf.ech_echconfigcontents_extensions, \
2749 { "Extensions", prefix ".ech.echconfigcontents.extensions", \
2750 FT_BYTES, BASE_NONE, NULL, 0x0, \
2751 "A list of extensions that the client must take into consideration when generating a ClientHello message", HFILL } \
2753 { & name .hf.ech_hpke_keyconfig, \
2754 { "HPKE Key Config", prefix ".ech.hpke.keyconfig", \
2755 FT_NONE, BASE_NONE, NULL, 0x0, \
2756 "HPKE Key Config", HFILL } \
2758 { & name .hf.ech_hpke_keyconfig_config_id, \
2759 { "Config Id", prefix ".ech.hpke.keyconfig.config_id", \
2760 FT_UINT8, BASE_DEC, NULL, 0x0, \
2761 "HPKE Config Id", HFILL } \
2763 { & name .hf.ech_hpke_keyconfig_kem_id, \
2764 { "KEM Id", prefix ".ech.hpke.keyconfig.kem_id", \
2765 FT_UINT16, BASE_DEC, VALS(kem_id_type_vals), 0x0, \
2766 "HPKE KEM Id", HFILL } \
2768 { & name .hf.ech_hpke_keyconfig_public_key_length, \
2769 { "Public Key length", prefix ".ech.hpke.keyconfig.public_key_length", \
2770 FT_UINT16, BASE_DEC, NULL, 0x0, \
2771 "HPKE Public Key length", HFILL } \
2773 { & name .hf.ech_hpke_keyconfig_public_key, \
2774 { "Public Key", prefix ".ech.hpke.keyconfig.public_key", \
2775 FT_BYTES, BASE_NONE, NULL, 0x0, \
2776 "HPKE Public Key", HFILL } \
2778 { & name .hf.ech_hpke_keyconfig_cipher_suites, \
2779 { "Cipher Suites", prefix ".ech.hpke.keyconfig.cipher_suites", \
2780 FT_NONE, BASE_NONE, NULL, 0x0, \
2781 "HPKE Cipher Suites", HFILL } \
2783 { & name .hf.ech_hpke_keyconfig_cipher_suites_length, \
2784 { "Cipher Suites length", prefix ".ech.hpke.keyconfig.cipher_suites_length", \
2785 FT_UINT16, BASE_DEC, NULL, 0x0, \
2786 "HPKE Cipher Suites length", HFILL } \
2788 { & name .hf.ech_hpke_keyconfig_cipher_suite, \
2789 { "Cipher Suite", prefix ".ech.hpke.keyconfig.cipher_suite", \
2790 FT_NONE, BASE_NONE, NULL, 0x0, \
2791 "HPKE Cipher Suite", HFILL } \
2793 { & name .hf.ech_hpke_keyconfig_cipher_suite_kdf_id, \
2794 { "KDF Id", prefix ".ech.hpke.keyconfig.cipher_suite.kdf_id", \
2795 FT_UINT16, BASE_DEC, VALS(kdf_id_type_vals), 0x0, \
2796 "HPKE KDF Id", HFILL } \
2798 { & name .hf.ech_hpke_keyconfig_cipher_suite_aead_id, \
2799 { "AEAD Id", prefix ".ech.hpke.keyconfig.cipher_suite.aead_id", \
2800 FT_UINT16, BASE_DEC, VALS(aead_id_type_vals), 0x0, \
2801 "HPKE AEAD Id", HFILL } \
2803 { & name .hf.ech_clienthello_type, \
2804 { "Client Hello type", prefix ".ech.client_hello_type", \
2805 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_ech_clienthello_types), 0x0, \
2806 "Client Hello type", HFILL } \
2808 { & name .hf.ech_cipher_suite, \
2809 { "Cipher Suite", prefix ".ech.cipher_suite", \
2810 FT_NONE, BASE_NONE, NULL, 0x0, \
2811 "The cipher suite used to encrypt ClientHelloInner", HFILL } \
2813 { & name .hf.ech_config_id, \
2814 { "Config Id", prefix ".ech.config_id", \
2815 FT_UINT8, BASE_DEC, NULL, 0x0, \
2816 "The ECHConfigContents.key_config.config_id for the chosen ECHConfig", HFILL } \
2818 { & name .hf.ech_enc_length, \
2819 { "Enc length", prefix ".ech.enc_length", \
2820 FT_UINT16, BASE_DEC, NULL, 0x0, \
2823 { & name .hf.ech_enc, \
2824 { "Enc", prefix ".ech.enc", \
2825 FT_BYTES, BASE_NONE, NULL, 0x0, \
2826 "The HPKE encapsulated key, used by servers to decrypt the corresponding payload field", HFILL } \
2828 { & name .hf.ech_payload_length, \
2829 { "Payload length", prefix ".ech.payload_length", \
2830 FT_UINT16, BASE_DEC, NULL, 0x0, \
2831 "Payload Length", HFILL } \
2833 { & name .hf.ech_payload, \
2834 { "Payload", prefix ".ech.payload", \
2835 FT_BYTES, BASE_NONE, NULL, 0x0, \
2836 "The serialized and encrypted ClientHelloInner structure", HFILL } \
2838 { & name .hf.ech_confirmation, \
2839 { "Confirmation", prefix ".ech.confirmation", \
2840 FT_BYTES, BASE_NONE, NULL, 0x0, \
2841 "Confirmation of ECH acceptance in a HelloRetryRequest", HFILL } \
2843 { & name .hf.ech_retry_configs, \
2844 { "Retry Configs", prefix ".ech.retry_configs", \
2845 FT_NONE, BASE_NONE, NULL, 0x0, \
2846 "ECHConfig structures for one-time use by the client in a retry connection", HFILL } \
2848 { & name .hf.ech_padding_data, \
2849 { "ECH Encrypted Padding", prefix ".ech.encrypted_padding", \
2850 FT_BYTES, BASE_NONE, NULL, 0x0, \
2851 "Must be zero", HFILL } \
2853 { & name .hf.hs_ext_alps_len, \
2854 { "ALPS Extension Length", prefix ".handshake.extensions_alps_len", \
2855 FT_UINT16, BASE_DEC, NULL, 0x0, \
2856 "Length of the ALPS Extension", HFILL } \
2858 { & name .hf.hs_ext_alps_alpn_list, \
2859 { "Supported ALPN List", prefix ".handshake.extensions_alps_alpn_list", \
2860 FT_NONE, BASE_NONE, NULL, 0x0, \
2861 "List of supported ALPN by ALPS", HFILL } \
2863 { & name .hf.hs_ext_alps_alpn_str_len, \
2864 { "Supported ALPN Length", prefix ".handshake.extensions_alps_alpn_str_len", \
2865 FT_UINT8, BASE_DEC, NULL, 0x0, \
2866 "Length of ALPN string", HFILL } \
2868 { & name .hf.hs_ext_alps_alpn_str, \
2869 { "Supported ALPN", prefix ".handshake.extensions_alps_alpn_str", \
2870 FT_STRING, BASE_NONE, NULL, 0x00, \
2871 "ALPN supported by ALPS", HFILL } \
2873 { & name .hf.hs_ext_alps_settings, \
2874 { "ALPN Opaque Settings", prefix ".handshake.extensions_alps.settings", \
2875 FT_BYTES, BASE_NONE, NULL, 0x00, \
2876 "ALPN Opaque Settings", HFILL } \
2881#define SSL_COMMON_ETT_LIST(name) \
2882 & name .ett.hs_ext, \
2883 & name .ett.hs_ext_alpn, \
2884 & name .ett.hs_ext_cert_types, \
2885 & name .ett.hs_ext_groups, \
2886 & name .ett.hs_ext_curves_point_formats, \
2887 & name .ett.hs_ext_npn, \
2888 & name .ett.hs_ext_reneg_info, \
2889 & name .ett.hs_ext_key_share, \
2890 & name .ett.hs_ext_key_share_ks, \
2891 & name .ett.hs_ext_pre_shared_key, \
2892 & name .ett.hs_ext_psk_identity, \
2893 & name .ett.hs_ext_psk_binders, \
2894 & name .ett.hs_ext_psk_binder, \
2895 & name .ett.hs_ext_server_name, \
2896 & name .ett.hs_ext_oid_filter, \
2897 & name .ett.hs_ext_quictp_parameter, \
2898 & name .ett.hs_ext_trusted_ca_keys, \
2899 & name .ett.hs_ext_trusted_ca_key, \
2900 & name .ett.hs_sig_hash_alg, \
2901 & name .ett.hs_sig_hash_algs, \
2902 & name .ett.urlhash, \
2903 & name .ett.keyex_params, \
2904 & name .ett.certificates, \
2905 & name .ett.cert_types, \
2906 & name .ett.dnames, \
2907 & name .ett.hs_random, \
2908 & name .ett.cipher_suites, \
2909 & name .ett.comp_methods, \
2910 & name .ett.session_ticket, \
2912 & name .ett.cert_status, \
2913 & name .ett.ocsp_response, \
2914 & name .ett.uncompressed_certificates, \
2915 & name .ett.hs_ext_alps, \
2916 & name .ett.ech_echconfiglist, \
2917 & name .ett.ech_echconfig, \
2918 & name .ett.ech_retry_configs, \
2919 & name .ett.ech_hpke_keyconfig, \
2920 & name .ett.ech_hpke_cipher_suites, \
2921 & name .ett.ech_hpke_cipher_suite, \
2922 & name .ett.ech_decrypt, \
2923 & name .ett.hs_ext_token_binding_key_parameters, \
2928#define SSL_COMMON_EI_LIST(name, prefix) \
2929 { & name .ei.client_version_error, \
2930 { prefix ".handshake.client_version_error", PI_PROTOCOL, PI_WARN, \
2931 "Client Hello legacy version field specifies version 1.3, not version 1.2; some servers may not be able to handle that.", EXPFILL } \
2933 { & name .ei.server_version_error, \
2934 { prefix ".handshake.server_version_error", PI_PROTOCOL, PI_WARN, \
2935 "Server Hello legacy version field specifies version 1.3, not version 1.2; some middleboxes may not be able to handle that.", EXPFILL } \
2937 { & name .ei.legacy_version, \
2938 { prefix ".handshake.legacy_version", PI_DEPRECATED, PI_CHAT, \
2939 "This legacy_version field MUST be ignored. The supported_versions extension is present and MUST be used instead.", EXPFILL } \
2941 { & name .ei.malformed_vector_length, \
2942 { prefix ".malformed.vector_length", PI_PROTOCOL, PI_WARN, \
2943 "Variable vector length is outside the permitted range", EXPFILL } \
2945 { & name .ei.malformed_buffer_too_small, \
2946 { prefix ".malformed.buffer_too_small", PI_MALFORMED, PI_ERROR, \
2947 "Malformed message, not enough data is available", EXPFILL } \
2949 { & name .ei.malformed_trailing_data, \
2950 { prefix ".malformed.trailing_data", PI_PROTOCOL, PI_WARN, \
2951 "Undecoded trailing data is present", EXPFILL } \
2953 { & name .ei.hs_ext_cert_status_undecoded, \
2954 { prefix ".handshake.status_request.undecoded", PI_UNDECODED, PI_NOTE, \
2955 "Responder ID list or Request Extensions are not implemented", EXPFILL } \
2957 { & name .ei.hs_ciphersuite_undecoded, \
2958 { prefix ".handshake.ciphersuite.undecoded", PI_UNDECODED, PI_NOTE, \
2959 "Ciphersuite not implemented", EXPFILL } \
2961 { & name .ei.hs_srv_keyex_illegal, \
2962 { prefix ".handshake.server_keyex_illegal", PI_PROTOCOL, PI_WARN, \
2963 "It is not legal to send the ServerKeyExchange message for this ciphersuite", EXPFILL } \
2965 { & name .ei.resumed, \
2966 { prefix ".resumed", PI_SEQUENCE, PI_NOTE, \
2967 "This session reuses previously negotiated keys (Session resumption)", EXPFILL } \
2969 { & name .ei.record_length_invalid, \
2970 { prefix ".record.length.invalid", PI_PROTOCOL, PI_ERROR, \
2971 "Record fragment length is too small or too large", EXPFILL } \
2973 { & name .ei.decompression_error, \
2974 { prefix ".decompression_error", PI_PROTOCOL, PI_ERROR, \
2975 "Decompression error", EXPFILL } \
2977 { & name .ei.ech_echconfig_invalid_version, \
2978 { prefix ".ech_echconfig_invalid_version", PI_PROTOCOL, PI_ERROR, \
2979 "Invalid/unknown ECHConfig version", EXPFILL } \
2981 { & name .ei.ech_accepted, \
2982 { prefix ".ech_accepted", PI_PROTOCOL, PI_NOTE, \
2983 "Calculated ECH Confirmation matches Server Random bytes, ECH was accepted", EXPFILL } \
2985 { & name .ei.ech_rejected, \
2986 { prefix ".ech_rejected", PI_PROTOCOL, PI_WARN, \
2987 "Calculated ECH Confirmation does not match Server Random bytes, ECH was rejected", EXPFILL } \
2992ssl_common_register_ssl_alpn_dissector_table(
const char *name,
2993 const char *ui_name,
const int proto);
2996ssl_common_register_dtls_alpn_dissector_table(
const char *name,
2997 const char *ui_name,
const int proto);
3002#ifdef SSL_DECRYPT_DEBUG
3004ssl_debug_printf(
const char* fmt,...) G_GNUC_PRINTF(1,2);
3006ssl_print_data(const
char* name, const
unsigned char* data,
size_t len);
3008ssl_print_string(const
char* name, const
StringInfo* data);
3010ssl_set_debug(const
char* name);
3012ssl_debug_flush(
void);
3016static inline void G_GNUC_PRINTF(1,2)
3017ssl_debug_printf(const
char* fmt _U_,...)
3020#define ssl_print_data(a, b, c)
3021#define ssl_print_string(a, b)
3022#define ssl_set_debug(name)
3023#define ssl_debug_flush()
3030 proto_tree *tree, uint32_t offset, uint32_t offset_end);
Definition packet-tls-utils.h:340
Definition packet-tls-utils.h:356
StringInfo dtls13_aad
Definition packet-tls-utils.h:367
StringInfo app_traffic_secret
Definition packet-tls-utils.h:370
uint64_t seq
Definition packet-tls-utils.h:366
Definition packet-tls-utils.c:2893
Definition packet-tls-utils.h:534
Definition packet-tls-utils.h:348
Definition packet-tls-utils.h:432
SslFlow * flow
Definition packet-tls-utils.h:442
uint64_t record_seq
Definition packet-tls-utils.h:444
uint32_t seq
Definition packet-tls-utils.h:445
unsigned content_len
Definition packet-tls-utils.h:437
unsigned plain_data_len
Definition packet-tls-utils.h:434
int id
Definition packet-tls-utils.h:439
ContentType type
Definition packet-tls-utils.h:441
unsigned char * plain_data
Definition packet-tls-utils.h:433
Definition packet-tls-utils.h:472
Definition packet-tls-utils.h:265
Definition packet-tls-utils.h:453
unsigned reassembly_id
Definition packet-tls-utils.h:456
uint8_t type
Definition packet-tls-utils.h:458
int is_last
Definition packet-tls-utils.h:459
uint32_t offset
Definition packet-tls-utils.h:457
unsigned record_id
Definition packet-tls-utils.h:454
Definition packet_info.h:40
Definition value_string.h:640
Definition packet-tls-utils.h:576
Mapping between a 64-bit integer value and its string representation.
Definition value_string.h:196
Extended metadata for a value_string array.
Definition value_string.h:325
Mapping between a 32-bit integer value and its string representation.
Definition value_string.h:33
Internal memory allocator interface used by the wmem subsystem.
Definition wmem_allocator.h:34
Definition wmem_list.c:23
Internal structure representing a wmem-allocated string buffer.
Definition wmem_strbuf.h:38
Internal representation of a wmem balanced tree.
Definition wmem_tree-int.h:81
Definition packet-tls-utils.h:427
Definition packet-tls-utils.h:463
Definition packet-tls-utils.h:570
Definition conversation.h:227
Definition packet-tls-utils.h:1252
Definition epan_dissect.h:25
Definition packet-tls-utils.h:1267
Definition prefs-int.h:24
Definition packet-tls-utils.h:875
Definition packet-tls-utils.h:584
Definition packet-tls-utils.h:1260
Definition packet-tls-utils.h:590
Definition tvbuff-int.h:33
tap_packet_status
Definition tap.h:22