Wireshark 4.7.0
The Wireshark network protocol analyzer
Loading...
Searching...
No Matches
packet-tls-utils.h
1/* packet-tls-utils.h
2 * ssl manipulation functions
3 * By Paolo Abeni <[email protected]>
4 *
5 * Wireshark - Network traffic analyzer
6 * By Gerald Combs <[email protected]>
7 * Copyright 1998 Gerald Combs
8 *
9 * SPDX-License-Identifier: GPL-2.0-or-later
10 */
11
12#ifndef __PACKET_TLS_UTILS_H__
13#define __PACKET_TLS_UTILS_H__
14
15#include <stdio.h> /* some APIs we declare take a stdio stream as an argument */
16
17#include <glib.h>
18#include <epan/packet.h>
19#include <epan/prefs.h>
20#include <epan/wmem_scopes.h>
21#include <epan/expert.h>
22#include <epan/conversation.h>
23#include <epan/tap.h>
24#include <epan/unit_strings.h>
25#include <wsutil/wsgcrypt.h>
26
27#ifdef HAVE_LIBGNUTLS
28#include <gnutls/x509.h>
29#include <gnutls/pkcs12.h>
30#endif /* HAVE_LIBGNUTLS */
31
32/* TODO inline this now that Libgcrypt is mandatory? */
33#define SSL_CIPHER_CTX gcry_cipher_hd_t
34#define SSL_DECRYPT_DEBUG
35
36
37/* other defines */
38typedef enum {
39 SSL_ID_CHG_CIPHER_SPEC = 0x14,
40 SSL_ID_ALERT = 0x15,
41 SSL_ID_HANDSHAKE = 0x16,
42 SSL_ID_APP_DATA = 0x17,
43 SSL_ID_HEARTBEAT = 0x18,
44 SSL_ID_TLS12_CID = 0x19,
45 SSL_ID_DTLS13_ACK = 0x1A,
46} ContentType;
47
48typedef enum {
49 SSL_HND_HELLO_REQUEST = 0,
50 SSL_HND_CLIENT_HELLO = 1,
51 SSL_HND_SERVER_HELLO = 2,
52 SSL_HND_HELLO_VERIFY_REQUEST = 3,
53 SSL_HND_NEWSESSION_TICKET = 4,
54 SSL_HND_END_OF_EARLY_DATA = 5,
55 SSL_HND_HELLO_RETRY_REQUEST = 6,
56 SSL_HND_ENCRYPTED_EXTENSIONS = 8,
57 SSL_HND_CERTIFICATE = 11,
58 SSL_HND_SERVER_KEY_EXCHG = 12,
59 SSL_HND_CERT_REQUEST = 13,
60 SSL_HND_SVR_HELLO_DONE = 14,
61 SSL_HND_CERT_VERIFY = 15,
62 SSL_HND_CLIENT_KEY_EXCHG = 16,
63 SSL_HND_FINISHED = 20,
64 SSL_HND_CERT_URL = 21,
65 SSL_HND_CERT_STATUS = 22,
66 SSL_HND_SUPPLEMENTAL_DATA = 23,
67 SSL_HND_KEY_UPDATE = 24,
68 SSL_HND_COMPRESSED_CERTIFICATE = 25,
69 /* Encrypted Extensions was NextProtocol in draft-agl-tls-nextprotoneg-03
70 * and changed in draft 04. Not to be confused with TLS 1.3 EE. */
71 SSL_HND_ENCRYPTED_EXTS = 67,
72 SSL_HND_MESSAGE_HASH = 254
73} HandshakeType;
74
75#define SSL2_HND_ERROR 0x00
76#define SSL2_HND_CLIENT_HELLO 0x01
77#define SSL2_HND_CLIENT_MASTER_KEY 0x02
78#define SSL2_HND_CLIENT_FINISHED 0x03
79#define SSL2_HND_SERVER_HELLO 0x04
80#define SSL2_HND_SERVER_VERIFY 0x05
81#define SSL2_HND_SERVER_FINISHED 0x06
82#define SSL2_HND_REQUEST_CERTIFICATE 0x07
83#define SSL2_HND_CLIENT_CERTIFICATE 0x08
84
85#define SSL_HND_HELLO_EXT_SERVER_NAME 0
86#define SSL_HND_HELLO_EXT_MAX_FRAGMENT_LENGTH 1
87#define SSL_HND_HELLO_EXT_CLIENT_CERTIFICATE_URL 2
88#define SSL_HND_HELLO_EXT_TRUSTED_CA_KEYS 3
89#define SSL_HND_HELLO_EXT_TRUNCATED_HMAC 4
90#define SSL_HND_HELLO_EXT_STATUS_REQUEST 5
91#define SSL_HND_HELLO_EXT_USER_MAPPING 6
92#define SSL_HND_HELLO_EXT_CLIENT_AUTHZ 7
93#define SSL_HND_HELLO_EXT_SERVER_AUTHZ 8
94#define SSL_HND_HELLO_EXT_CERT_TYPE 9
95#define SSL_HND_HELLO_EXT_SUPPORTED_GROUPS 10 /* renamed from "elliptic_curves" (RFC 7919 / TLS 1.3) */
96#define SSL_HND_HELLO_EXT_EC_POINT_FORMATS 11
97#define SSL_HND_HELLO_EXT_SRP 12
98#define SSL_HND_HELLO_EXT_SIGNATURE_ALGORITHMS 13
99#define SSL_HND_HELLO_EXT_USE_SRTP 14
100#define SSL_HND_HELLO_EXT_HEARTBEAT 15
101#define SSL_HND_HELLO_EXT_ALPN 16
102#define SSL_HND_HELLO_EXT_STATUS_REQUEST_V2 17
103#define SSL_HND_HELLO_EXT_SIGNED_CERTIFICATE_TIMESTAMP 18
104#define SSL_HND_HELLO_EXT_CLIENT_CERT_TYPE 19
105#define SSL_HND_HELLO_EXT_SERVER_CERT_TYPE 20
106#define SSL_HND_HELLO_EXT_PADDING 21
107#define SSL_HND_HELLO_EXT_ENCRYPT_THEN_MAC 22
108#define SSL_HND_HELLO_EXT_EXTENDED_MASTER_SECRET 23
109#define SSL_HND_HELLO_EXT_TOKEN_BINDING 24
110#define SSL_HND_HELLO_EXT_CACHED_INFO 25
111#define SSL_HND_HELLO_EXT_COMPRESS_CERTIFICATE 27
112#define SSL_HND_HELLO_EXT_RECORD_SIZE_LIMIT 28
113/* 26-33 Unassigned*/
114#define SSL_HND_HELLO_EXT_DELEGATED_CREDENTIALS 34 /* draft-ietf-tls-subcerts-10.txt */
115#define SSL_HND_HELLO_EXT_SESSION_TICKET_TLS 35
116/* RFC 8446 (TLS 1.3) */
117#define SSL_HND_HELLO_EXT_KEY_SHARE_OLD 40 /* draft-ietf-tls-tls13-22 (removed in -23) */
118#define SSL_HND_HELLO_EXT_PRE_SHARED_KEY 41
119#define SSL_HND_HELLO_EXT_EARLY_DATA 42
120#define SSL_HND_HELLO_EXT_SUPPORTED_VERSIONS 43
121#define SSL_HND_HELLO_EXT_COOKIE 44
122#define SSL_HND_HELLO_EXT_PSK_KEY_EXCHANGE_MODES 45
123#define SSL_HND_HELLO_EXT_TICKET_EARLY_DATA_INFO 46 /* draft-ietf-tls-tls13-18 (removed in -19) */
124#define SSL_HND_HELLO_EXT_CERTIFICATE_AUTHORITIES 47
125#define SSL_HND_HELLO_EXT_OID_FILTERS 48
126#define SSL_HND_HELLO_EXT_POST_HANDSHAKE_AUTH 49
127#define SSL_HND_HELLO_EXT_SIGNATURE_ALGORITHMS_CERT 50
128#define SSL_HND_HELLO_EXT_KEY_SHARE 51
129#define SSL_HND_HELLO_EXT_TRANSPARENCY_INFO 52 /* draft-ietf-trans-rfc6962-bis-41 */
130#define SSL_HND_HELLO_EXT_CONNECTION_ID_DEPRECATED 53 /* draft-ietf-tls-dtls-connection-id-07 */
131#define SSL_HND_HELLO_EXT_CONNECTION_ID 54
132#define SSL_HND_HELLO_EXT_EXTERNAL_ID_HASH 55 /* RFC 8844 */
133#define SSL_HND_HELLO_EXT_EXTERNAL_SESSION_ID 56 /* RFC 8844 */
134#define SSL_HND_HELLO_EXT_QUIC_TRANSPORT_PARAMETERS_V1 57 /* draft-ietf-quic-tls-33 */
135#define SSL_HND_HELLO_EXT_TICKET_REQUEST 58 /* draft-ietf-tls-ticketrequests-07 */
136#define SSL_HND_HELLO_EXT_DNSSEC_CHAIN 59 /* RFC 9102 */
137#define SSL_HND_HELLO_EXT_GREASE_0A0A 2570
138#define SSL_HND_HELLO_EXT_GREASE_1A1A 6682
139#define SSL_HND_HELLO_EXT_GREASE_2A2A 10794
140#define SSL_HND_HELLO_EXT_NPN 13172 /* 0x3374 */
141#define SSL_HND_HELLO_EXT_GREASE_3A3A 14906
142#define SSL_HND_HELLO_EXT_ALPS_OLD 17513 /* draft-vvv-tls-alps-01, previous value used in BoringSSL implementation */
143#define SSL_HND_HELLO_EXT_ALPS 17613 /* draft-vvv-tls-alps-01, current value used in BoringSSL implementation */
144#define SSL_HND_HELLO_EXT_GREASE_4A4A 19018
145#define SSL_HND_HELLO_EXT_GREASE_5A5A 23130
146#define SSL_HND_HELLO_EXT_GREASE_6A6A 27242
147#define SSL_HND_HELLO_EXT_CHANNEL_ID_OLD 30031 /* 0x754f */
148#define SSL_HND_HELLO_EXT_CHANNEL_ID 30032 /* 0x7550 */
149#define SSL_HND_HELLO_EXT_GREASE_7A7A 31354
150#define SSL_HND_HELLO_EXT_GREASE_8A8A 35466
151#define SSL_HND_HELLO_EXT_GREASE_9A9A 39578
152#define SSL_HND_HELLO_EXT_GREASE_AAAA 43690
153#define SSL_HND_HELLO_EXT_GREASE_BABA 47802
154#define SSL_HND_HELLO_EXT_GREASE_CACA 51914
155#define SSL_HND_HELLO_EXT_GREASE_DADA 56026
156#define SSL_HND_HELLO_EXT_GREASE_EAEA 60138
157#define SSL_HND_HELLO_EXT_GREASE_FAFA 64250
158#define SSL_HND_HELLO_EXT_ECH_OUTER_EXTENSIONS 64768 /* 0xfd00 draft-ietf-tls-esni-16 */
159#define SSL_HND_HELLO_EXT_ENCRYPTED_CLIENT_HELLO 65037 /* 0xfe0d draft-ietf-tls-esni-16 */
160#define SSL_HND_HELLO_EXT_RENEGOTIATION_INFO 65281 /* 0xFF01 */
161#define SSL_HND_HELLO_EXT_QUIC_TRANSPORT_PARAMETERS 65445 /* 0xffa5 draft-ietf-quic-tls-13 */
162#define SSL_HND_HELLO_EXT_ENCRYPTED_SERVER_NAME 65486 /* 0xffce draft-ietf-tls-esni-01 */
163
164#define SSL_HND_CERT_URL_TYPE_INDIVIDUAL_CERT 1
165#define SSL_HND_CERT_URL_TYPE_PKIPATH 2
166#define SSL_HND_CERT_STATUS_TYPE_OCSP 1
167#define SSL_HND_CERT_STATUS_TYPE_OCSP_MULTI 2
168#define SSL_HND_CERT_TYPE_RAW_PUBLIC_KEY 2
169
170/* https://github.com/quicwg/base-drafts/wiki/Temporary-IANA-Registry#quic-transport-parameters */
171#define SSL_HND_QUIC_TP_ORIGINAL_DESTINATION_CONNECTION_ID 0x00
172#define SSL_HND_QUIC_TP_MAX_IDLE_TIMEOUT 0x01
173#define SSL_HND_QUIC_TP_STATELESS_RESET_TOKEN 0x02
174#define SSL_HND_QUIC_TP_MAX_UDP_PAYLOAD_SIZE 0x03
175#define SSL_HND_QUIC_TP_INITIAL_MAX_DATA 0x04
176#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAM_DATA_BIDI_LOCAL 0x05
177#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAM_DATA_BIDI_REMOTE 0x06
178#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAM_DATA_UNI 0x07
179#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAMS_BIDI 0x08
180#define SSL_HND_QUIC_TP_INITIAL_MAX_STREAMS_UNI 0x09
181#define SSL_HND_QUIC_TP_ACK_DELAY_EXPONENT 0x0a
182#define SSL_HND_QUIC_TP_MAX_ACK_DELAY 0x0b
183#define SSL_HND_QUIC_TP_DISABLE_ACTIVE_MIGRATION 0x0c
184#define SSL_HND_QUIC_TP_PREFERRED_ADDRESS 0x0d
185#define SSL_HND_QUIC_TP_ACTIVE_CONNECTION_ID_LIMIT 0x0e
186#define SSL_HND_QUIC_TP_INITIAL_SOURCE_CONNECTION_ID 0x0f
187#define SSL_HND_QUIC_TP_RETRY_SOURCE_CONNECTION_ID 0x10
188#define SSL_HND_QUIC_TP_VERSION_INFORMATION 0x11 /* https://tools.ietf.org/html/draft-ietf-quic-version-negotiation-14 */
189#define SSL_HND_QUIC_TP_MAX_DATAGRAM_FRAME_SIZE 0x20 /* https://datatracker.ietf.org/doc/html/draft-ietf-quic-datagram-06 */
190#define SSL_HND_QUIC_TP_CIBIR_ENCODING 0x1000 /* https://datatracker.ietf.org/doc/html/draft-banks-quic-cibir-01 */
191#define SSL_HND_QUIC_TP_LOSS_BITS 0x1057 /* https://tools.ietf.org/html/draft-ferrieuxhamchaoui-quic-lossbits-03 */
192#define SSL_HND_QUIC_TP_GREASE_QUIC_BIT 0x2ab2 /* RFC 9287 */
193#define SSL_HND_QUIC_TP_ENABLE_TIME_STAMP 0x7157 /* https://tools.ietf.org/html/draft-huitema-quic-ts-02 */
194#define SSL_HND_QUIC_TP_ENABLE_TIME_STAMP_V2 0x7158 /* https://tools.ietf.org/html/draft-huitema-quic-ts-03 */
195#define SSL_HND_QUIC_TP_MIN_ACK_DELAY_OLD 0xde1a /* https://tools.ietf.org/html/draft-iyengar-quic-delayed-ack-00 */
196/* https://quiche.googlesource.com/quiche/+/refs/heads/master/quic/core/crypto/transport_parameters.cc */
197#define SSL_HND_QUIC_TP_GOOGLE_USER_AGENT 0x3129
198#define SSL_HND_QUIC_TP_GOOGLE_KEY_UPDATE_NOT_YET_SUPPORTED 0x312B
199#define SSL_HND_QUIC_TP_GOOGLE_QUIC_VERSION 0x4752
200#define SSL_HND_QUIC_TP_GOOGLE_INITIAL_RTT 0x3127
201#define SSL_HND_QUIC_TP_GOOGLE_SUPPORT_HANDSHAKE_DONE 0x312A
202#define SSL_HND_QUIC_TP_GOOGLE_QUIC_PARAMS 0x4751
203#define SSL_HND_QUIC_TP_GOOGLE_CONNECTION_OPTIONS 0x3128
204/* https://github.com/facebookincubator/mvfst/blob/master/quic/QuicConstants.h */
205#define SSL_HND_QUIC_TP_FACEBOOK_PARTIAL_RELIABILITY 0xFF00
206#define SSL_HND_QUIC_TP_VERSION_INFORMATION_DRAFT 0xff73db /* https://datatracker.ietf.org/doc/draft-ietf-quic-version-negotiation/13/ */
207#define SSL_HND_QUIC_TP_ADDRESS_DISCOVERY 0x9f81a176 /* https://tools.ietf.org/html/draft-ietf-quic-address-discovery-00 */
208#define SSL_HND_QUIC_TP_MIN_ACK_DELAY_DRAFT_V1 0xFF03DE1A /* https://tools.ietf.org/html/draft-ietf-quic-ack-frequency-01 */
209#define SSL_HND_QUIC_TP_MIN_ACK_DELAY_DRAFT05 0xff04de1a /* https://tools.ietf.org/html/draft-ietf-quic-ack-frequency-04 / draft-05 */
210#define SSL_HND_QUIC_TP_MIN_ACK_DELAY 0xff04de1b /* https://tools.ietf.org/html/draft-ietf-quic-ack-frequency-07 */
211#define SSL_HND_QUIC_TP_ENABLE_MULTIPATH_DRAFT04 0x0f739bbc1b666d04 /* https://tools.ietf.org/html/draft-ietf-quic-multipath-04 */
212#define SSL_HND_QUIC_TP_ENABLE_MULTIPATH_DRAFT05 0x0f739bbc1b666d05 /* https://tools.ietf.org/html/draft-ietf-quic-multipath-05 */
213#define SSL_HND_QUIC_TP_ENABLE_MULTIPATH 0x0f739bbc1b666d06 /* https://tools.ietf.org/html/draft-ietf-quic-multipath-06 */
214#define SSL_HND_QUIC_TP_INITIAL_MAX_PATHS 0x0f739bbc1b666d07 /* https://tools.ietf.org/html/draft-ietf-quic-multipath-07 */
215#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID_DRAFT09 0x0f739bbc1b666d09 /* https://tools.ietf.org/html/draft-ietf-quic-multipath-09 */
216#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID_DRAFT11 0x0f739bbc1b666d11 /* https://tools.ietf.org/html/draft-ietf-quic-multipath-11 */
217#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID_DRAFT12 0x0f739bbc1b666d0c /* https://tools.ietf.org/html/draft-ietf-quic-multipath-12 */
218#define SSL_HND_QUIC_TP_INITIAL_MAX_PATH_ID 0x0f739bbc1b666d0d /* https://tools.ietf.org/html/draft-ietf-quic-multipath-13 */
219
220/*
221 * Lookup tables
222 */
223extern const value_string ssl_version_short_names[];
224extern const value_string ssl_20_msg_types[];
225extern value_string_ext ssl_20_cipher_suites_ext;
226extern const value_string ssl_20_certificate_type[];
227extern const value_string ssl_31_content_type[];
228extern const value_string ssl_versions[];
229extern const value_string ssl_31_change_cipher_spec[];
230extern const value_string ssl_31_alert_level[];
231extern const value_string ssl_31_alert_description[];
232extern const value_string ssl_31_handshake_type[];
233extern const value_string tls_heartbeat_type[];
234extern const value_string tls_heartbeat_mode[];
235extern const value_string ssl_31_compression_method[];
236extern const value_string ssl_31_key_exchange_algorithm[];
237extern const value_string ssl_31_signature_algorithm[];
238extern const value_string ssl_31_client_certificate_type[];
239extern const value_string ssl_31_public_value_encoding[];
240extern value_string_ext ssl_31_ciphersuite_ext;
241extern const value_string tls_hello_extension_types[];
242extern const value_string tls_hash_algorithm[];
243extern const value_string tls_signature_algorithm[];
244extern const value_string tls13_signature_algorithm[];
245extern const value_string tls_certificate_type[];
246extern const value_string tls_cert_chain_type[];
247extern const value_string tls_cert_status_type[];
248extern const value_string ssl_extension_curves[];
249extern const value_string ssl_extension_ec_point_formats[];
250extern const value_string ssl_curve_types[];
251extern const value_string tls_hello_ext_server_name_type_vs[];
252extern const value_string tls_hello_ext_max_fragment_length[];
253extern const value_string tls_hello_ext_psk_ke_mode[];
254extern const value_string tls_hello_ext_trusted_ca_key_type[];
255extern const value_string tls13_key_update_request[];
256extern const value_string compress_certificate_algorithm_vals[];
257extern const val64_string quic_transport_parameter_id[];
258extern const range_string quic_version_vals[];
259extern const val64_string quic_address_discovery_vals[];
260extern const val64_string quic_enable_time_stamp_v2_vals[];
261extern const val64_string quic_enable_multipath_vals[];
262extern const value_string tls_hello_ext_ech_clienthello_types[];
263extern const value_string kem_id_type_vals[];
264extern const value_string kdf_id_type_vals[];
265extern const value_string aead_id_type_vals[];
266extern const value_string token_binding_key_parameter_vals[];
267
268/* XXX Should we use GByteArray instead? */
269typedef struct _StringInfo {
270 unsigned char *data; /* Backing storage which may be larger than data_len */
271 unsigned data_len; /* Length of the meaningful part of data */
272} StringInfo;
273
274#define SSL_WRITE_KEY 1
275
276#define SSL_VER_UNKNOWN 0
277#define SSLV2_VERSION 0x0002 /* not in record layer, SSL_CLIENT_SERVER from
278 http://www-archive.mozilla.org/projects/security/pki/nss/ssl/draft02.html */
279#define SSLV3_VERSION 0x300
280#define TLSV1_VERSION 0x301
281#define TLCPV1_VERSION 0x101
282#define TLSV1DOT1_VERSION 0x302
283#define TLSV1DOT2_VERSION 0x303
284#define TLSV1DOT3_VERSION 0x304
285#define DTLSV1DOT0_VERSION 0xfeff
286#define DTLSV1DOT0_OPENSSL_VERSION 0x100
287#define DTLSV1DOT2_VERSION 0xfefd
288#define DTLSV1DOT3_VERSION 0xfefc
289
290/* Returns the TLS 1.3 draft version or 0 if not applicable. */
291static inline uint8_t extract_tls13_draft_version(uint32_t version) {
292 if ((version & 0xff00) == 0x7f00) {
293 return (uint8_t) version;
294 }
295 return 0;
296}
297
298
299#define SSL_CLIENT_RANDOM (1<<0)
300#define SSL_SERVER_RANDOM (1<<1)
301#define SSL_CIPHER (1<<2)
302#define SSL_HAVE_SESSION_KEY (1<<3)
303#define SSL_VERSION (1<<4)
304#define SSL_MASTER_SECRET (1<<5)
305#define SSL_PRE_MASTER_SECRET (1<<6)
306#define SSL_CLIENT_EXTENDED_MASTER_SECRET (1<<7)
307#define SSL_SERVER_EXTENDED_MASTER_SECRET (1<<8)
308#define SSL_NEW_SESSION_TICKET (1<<10)
309#define SSL_ENCRYPT_THEN_MAC (1<<11)
310#define SSL_SEEN_0RTT_APPDATA (1<<12)
311#define SSL_QUIC_RECORD_LAYER (1<<13) /* For QUIC (draft >= -13) */
312
313#define SSL_EXTENDED_MASTER_SECRET_MASK (SSL_CLIENT_EXTENDED_MASTER_SECRET|SSL_SERVER_EXTENDED_MASTER_SECRET)
314
315/* SSL Cipher Suite modes */
316typedef enum {
317 MODE_STREAM, /* GenericStreamCipher */
318 MODE_CBC, /* GenericBlockCipher */
319 MODE_GCM, /* GenericAEADCipher */
320 MODE_CCM, /* AEAD_AES_{128,256}_CCM with 16 byte auth tag */
321 MODE_CCM_8, /* AEAD_AES_{128,256}_CCM with 8 byte auth tag */
322 MODE_POLY1305, /* AEAD_CHACHA20_POLY1305 with 16 byte auth tag (RFC 7905) */
323 MODE_ECB, /* ECB: used to perform record seq number encryption in DTLSv1.3 */
324} ssl_cipher_mode_t;
325
326/* Explicit and implicit nonce length (RFC 5116 - Section 3.2.1) */
327#define IMPLICIT_NONCE_LEN 4
328#define EXPLICIT_NONCE_LEN 8
329#define TLS13_AEAD_NONCE_LENGTH 12
330
331/* TLS 1.3 Record type for selecting the appropriate secret. */
332typedef enum {
333 TLS_SECRET_0RTT_APP,
334 TLS_SECRET_HANDSHAKE,
335 TLS_SECRET_APP,
336} TLSRecordType;
337
338#define SSL_DEBUG_USE_STDERR "-"
339
340#define SSLV2_MAX_SESSION_ID_LENGTH_IN_BYTES 16
341
342/* Record fragment lengths MUST NOT exceed 2^14 (= 0x4000) */
343#define TLS_MAX_RECORD_LENGTH 0x4000
345typedef struct _SslCipherSuite {
346 int number;
347 int kex;
348 int enc;
349 int dig;
350 ssl_cipher_mode_t mode;
353typedef struct _SslFlow {
354 uint32_t byte_seq;
355 uint16_t flags;
356 wmem_tree_t *multisegment_pdus;
357} SslFlow;
358
359typedef struct _SslDecompress SslDecompress;
361typedef struct _SslDecoder {
362 const SslCipherSuite *cipher_suite;
363 int compression;
364 unsigned char _mac_key_or_write_iv[48];
365 StringInfo mac_key; /* for block and stream ciphers */
366 StringInfo write_iv; /* for AEAD ciphers (at least GCM, CCM) */
367 SSL_CIPHER_CTX sn_evp; /* used to decrypt serial number in DTLSv1.3 */
368 SSL_CIPHER_CTX evp;
369 SslDecompress *decomp;
370 uint64_t dtls13_epoch;
371 uint64_t seq;
373 uint16_t epoch;
374 SslFlow *flow;
376} SslDecoder;
377
378#define KEX_DHE_DSS 0x10
379#define KEX_DHE_PSK 0x11
380#define KEX_DHE_RSA 0x12
381#define KEX_DH_ANON 0x13
382#define KEX_DH_DSS 0x14
383#define KEX_DH_RSA 0x15
384#define KEX_ECDHE_ECDSA 0x16
385#define KEX_ECDHE_PSK 0x17
386#define KEX_ECDHE_RSA 0x18
387#define KEX_ECDH_ANON 0x19
388#define KEX_ECDH_ECDSA 0x1a
389#define KEX_ECDH_RSA 0x1b
390#define KEX_KRB5 0x1c
391#define KEX_PSK 0x1d
392#define KEX_RSA 0x1e
393#define KEX_RSA_PSK 0x1f
394#define KEX_SRP_SHA 0x20
395#define KEX_SRP_SHA_DSS 0x21
396#define KEX_SRP_SHA_RSA 0x22
397#define KEX_IS_DH(n) ((n) >= KEX_DHE_DSS && (n) <= KEX_ECDH_RSA)
398#define KEX_TLS13 0x23
399#define KEX_ECJPAKE 0x24
400
401#define KEX_ECDHE_SM2 0x25
402#define KEX_ECC_SM2 0x26
403#define KEX_IBSDH_SM9 0x27
404#define KEX_IBC_SM9 0x28
405
406/* Order is significant, must match "ciphers" array in packet-tls-utils.c */
407
408#define ENC_START 0x30
409#define ENC_DES 0x30
410#define ENC_3DES 0x31
411#define ENC_RC4 0x32
412#define ENC_RC2 0x33
413#define ENC_IDEA 0x34
414#define ENC_AES 0x35
415#define ENC_AES256 0x36
416#define ENC_CAMELLIA128 0x37
417#define ENC_CAMELLIA256 0x38
418#define ENC_SEED 0x39
419#define ENC_CHACHA20 0x3A
420#define ENC_SM1 0x3B
421#define ENC_SM4 0x3C
422#define ENC_NULL 0x3D
423
424
425#define DIG_MD5 0x40
426#define DIG_SHA 0x41
427#define DIG_SHA256 0x42
428#define DIG_SHA384 0x43
429#define DIG_SM3 0x44
430#define DIG_NA 0x45 /* Not Applicable */
432typedef struct {
433 const char *name;
434 unsigned len;
437typedef struct _SslRecordInfo {
438 unsigned char *plain_data;
439 unsigned data_len;
440 int id;
442 ContentType type;
443 SslFlow *flow;
445 uint64_t record_seq;
446 uint32_t seq;
447 struct _SslRecordInfo* next;
449
454typedef struct _TlsHsFragment {
455 unsigned record_id;
457 unsigned reassembly_id;
458 uint32_t offset;
459 uint8_t type;
460 int is_last : 1;
461 struct _TlsHsFragment *next;
464typedef struct {
465 SslRecordInfo *records;
466 TlsHsFragment *hs_fragments;
467 uint32_t srcport;
468 uint32_t destport;
469 int cipher;
473typedef struct _SslSession {
474 int cipher;
475 int compression;
476 uint16_t version;
477 unsigned char tls13_draft_version;
478 unsigned char _client_random[32];
479 int8_t client_cert_type;
480 int8_t server_cert_type;
481 uint32_t client_ccs_frame;
482 uint32_t server_ccs_frame;
483 uint32_t first_ch_ech_frame;
484 StringInfo client_random;
485 bool ech;
486 bool hrr_ech_declined;
487 unsigned char ech_confirmation[8];
488 unsigned char hrr_ech_confirmation[8];
489 unsigned char first_ech_auth_tag[16];
490
491 /* The address/proto/port of the server as determined from heuristics
492 * (e.g. ClientHello) or set externally (via ssl_set_master_secret()). */
493 address srv_addr;
494 port_type srv_ptype;
495 unsigned srv_port;
496
497 uint32_t stream;
498
499 /* The Application layer protocol if known (for STARTTLS support) */
500 dissector_handle_t app_handle;
501 const char *alpn_name;
502 /* The ALPN the client requested, not necessarily the one chosen */
503 const char *client_alpn_name;
504 uint32_t last_nontls_frame;
505 bool is_session_resumed;
506
507 /* First pass only: track an in-progress handshake reassembly (>0) */
508 uint32_t client_hs_reassembly_id;
509 uint32_t server_hs_reassembly_id;
510
511 /* Connection ID extension
512
513 struct {
514 opaque cid<0..2^8-1>;
515 } ConnectionId;
516 */
517
518 uint8_t *client_cid;
519 uint8_t *server_cid;
520 uint8_t client_cid_len;
521 bool client_cid_len_present;
522 uint8_t server_cid_len;
523 bool server_cid_len_present;
524 bool deprecated_cid; /* Set when handshake is using the deprecated CID extension type */
525 uint64_t dtls13_current_epoch[2]; /* max epoch (for server and client respectively) */
526 uint64_t dtls13_next_seq_num[2]; /* DTLSv1.3 next expected seq number (for server and client respectively) */
527} SslSession;
528
529/* RFC 5246, section 8.1 says that the master secret is always 48 bytes */
530#define SSL_MASTER_SECRET_LENGTH 48
531
532struct cert_key_id; /* defined in epan/secrets.h */
533
534/* This holds state information for a SSL conversation */
535typedef struct _SslDecryptSession {
536 unsigned char _master_secret[SSL_MASTER_SECRET_LENGTH];
537 unsigned char _session_id[256];
538 unsigned char _client_random[32];
539 unsigned char _server_random[32];
540 StringInfo session_id;
541 StringInfo session_ticket;
542 StringInfo server_random;
543 StringInfo client_random;
544 StringInfo master_secret;
545 StringInfo handshake_data;
546 /* the data store for this StringInfo must be allocated explicitly with a capture lifetime scope */
547 StringInfo pre_master_secret;
548 unsigned char _server_data_for_iv[24];
549 StringInfo server_data_for_iv;
550 unsigned char _client_data_for_iv[24];
551 StringInfo client_data_for_iv;
552
553 int state;
554 const SslCipherSuite *cipher_suite;
555 SslDecoder *server;
556 SslDecoder *client;
557 SslDecoder *server_new;
558 SslDecoder *client_new;
559#if defined(HAVE_LIBGNUTLS)
560 struct cert_key_id *cert_key_id;
561#endif
562 StringInfo psk;
563 StringInfo app_data_segment;
564 SslSession session;
565 bool has_early_data;
566 StringInfo ech_transcript;
567
569
570/* RecordNumber - RFC 9147 section 4 */
571typedef struct {
572 uint64_t epoch;
573 uint64_t sequence_number;
575
576/* User Access Table */
577typedef struct _ssldecrypt_assoc_t {
578 char* ipaddr;
579 char* port;
580 char* protocol;
581 char* keyfile;
582 char* password;
585typedef struct ssl_common_options {
586 const char *psk;
587 const char *keylog_filename;
589
591typedef struct {
592 GHashTable *session; /* Session ID (1-32 bytes) to master secret. */
593 GHashTable *tickets; /* Session Ticket to master secret. */
594 GHashTable *crandom; /* Client Random to master secret */
595 GHashTable *pre_master; /* First 8 bytes of encrypted pre-master secret to
596 pre-master secret */
597 GHashTable *pms; /* Client Random to unencrypted pre-master secret */
598
599 /* For TLS 1.3: maps Client Random to derived secret. */
600 GHashTable *tls13_client_early;
601 GHashTable *tls13_client_handshake;
602 GHashTable *tls13_server_handshake;
603 GHashTable *tls13_client_appdata;
604 GHashTable *tls13_server_appdata;
605 GHashTable *tls13_early_exporter;
606 GHashTable *tls13_exporter;
607 GHashTable *ech_secret;
608 GHashTable *ech_config;
609
610 /* The hash tables above store the static keylog file contents and secrets
611 * from any DSB, not all of which may be used, in addition to any master
612 * secrets derived at runtime ([D]TLS < 1.3). These store the used
613 * Client Random for exporting master secrets and derived secrets in
614 * TLS Export Sessions or adding a DSB.
615 */
616 GHashTable *used_crandom;
618
619int ssl_get_keyex_alg(int cipher);
620
621void quic_transport_parameter_id_base_custom(char *result, uint64_t parameter_id);
622
623bool ssldecrypt_uat_fld_ip_chk_cb(void*, const char*, unsigned, const void*, const void*, char** err);
624bool ssldecrypt_uat_fld_port_chk_cb(void*, const char*, unsigned, const void*, const void*, char** err);
625bool ssldecrypt_uat_fld_fileopen_chk_cb(void*, const char*, unsigned, const void*, const void*, char** err);
626bool ssldecrypt_uat_fld_password_chk_cb(void*, const char*, unsigned, const void*, const void*, char** err);
627char* ssl_association_info(const char* dissector_table_name, const char* table_protocol);
628
630void ssl_init_cid_list(void);
631
633void ssl_cleanup_cid_list(void);
634
636void ssl_add_session_by_cid(SslDecryptSession *ssl);
637
643SslDecryptSession *ssl_get_session_by_cid(tvbuff_t *tvb, uint32_t offset);
644
649extern SslDecryptSession *
650ssl_get_session(conversation_t *conversation, dissector_handle_t tls_handle);
651
653extern void
654ssl_reset_session(SslSession *session, SslDecryptSession *ssl, bool is_client);
655
657extern void
658ssl_set_server(SslSession *session, address *addr, port_type ptype, uint32_t port);
659
667WS_DLL_PUBLIC void
668tls_set_appdata_dissector(dissector_handle_t tls_handle, packet_info *pinfo,
669 dissector_handle_t app_handle);
670
680WS_DLL_PUBLIC uint32_t
681ssl_starttls_ack(dissector_handle_t tls_handle, packet_info *pinfo,
682 dissector_handle_t app_handle);
683
692WS_DLL_PUBLIC uint32_t
693ssl_starttls_post_ack(dissector_handle_t tls_handle, packet_info *pinfo,
694 dissector_handle_t app_handle);
695
697ssl_find_appdata_dissector(const char *name);
698
704extern void
705ssl_data_set(StringInfo* buf, const unsigned char* src, unsigned len);
706
710extern int
711ssl_data_alloc(StringInfo* str, size_t len);
712
713extern int
714ssl_cipher_setiv(SSL_CIPHER_CTX *cipher, unsigned char* iv, int iv_len);
715
719extern const SslCipherSuite *
720ssl_find_cipher(int num);
721
722
724int
725ssl_get_cipher_algo(const SslCipherSuite *cipher_suite);
726
731unsigned
732ssl_get_cipher_blocksize(const SslCipherSuite *cipher_suite);
733
734bool
735ssl_generate_pre_master_secret(SslDecryptSession *ssl_session,
736 uint32_t length, tvbuff_t *tvb, uint32_t offset,
737 const char *ssl_psk, packet_info *pinfo,
738#ifdef HAVE_LIBGNUTLS
739 GHashTable *key_hash,
740#endif
741 const ssl_master_key_map_t *mk_map);
742
747extern int
748ssl_generate_keyring_material(SslDecryptSession*ssl_session);
749
750extern void
751ssl_change_cipher(SslDecryptSession *ssl_session, bool server);
752
768extern int
769ssl_decrypt_record(wmem_allocator_t* allocator, SslDecryptSession *ssl, SslDecoder *decoder, uint8_t ct, uint16_t record_version,
770 bool ignore_mac_failed,
771 const unsigned char *in, uint16_t inl, const unsigned char *cid, uint8_t cidl,
772 StringInfo *comp_str, StringInfo *out_str, unsigned *outl);
773
774
775/* Common part between TLS and DTLS dissectors */
776
777/* handling of association between tls/dtls ports and clear text protocol */
778extern void
779ssl_association_add(const char* dissector_table_name, dissector_handle_t main_handle, dissector_handle_t subdissector_handle, unsigned port, bool tcp);
780
781extern void
782ssl_association_remove(const char* dissector_table_name, dissector_handle_t main_handle, dissector_handle_t subdissector_handle, unsigned port, bool tcp);
783
784extern int
785ssl_packet_from_server(SslSession *session, dissector_table_t table, const packet_info *pinfo);
786
787/* Obtain information about the current TLS layer. */
789tls_add_packet_info(int proto, packet_info *pinfo, uint8_t curr_layer_num_ssl);
790
791/* add to packet data a copy of the specified real data */
792extern void
793ssl_add_record_info(int proto, packet_info *pinfo, const unsigned char *data, int data_len, int record_id, SslFlow *flow, ContentType type, uint8_t curr_layer_num_ssl, uint64_t record_seq);
794
795/* search in packet data for the specified id; return a newly created tvb for the associated data */
796extern tvbuff_t*
797ssl_get_record_info(tvbuff_t *parent_tvb, int proto, packet_info *pinfo, int record_id, uint8_t curr_layer_num_ssl, SslRecordInfo **matched_record);
798
799/* initialize/reset per capture state data (ssl sessions cache) */
800extern void
801ssl_common_init(ssl_master_key_map_t *master_key_map,
802 StringInfo *decrypted_data, StringInfo *compressed_data);
803extern void
804ssl_common_cleanup(ssl_master_key_map_t *master_key_map, FILE **ssl_keylog_file,
805 StringInfo *decrypted_data, StringInfo *compressed_data);
806
812WS_DLL_PUBLIC ssl_master_key_map_t *
813tls_get_master_key_map(bool load_secrets);
814
815/* Process lines from the TLS key log and populate the secrets map. */
816extern void
817tls_keylog_process_lines(const ssl_master_key_map_t *mk_map, const uint8_t *data, unsigned len);
818
819/* tries to update the secrets cache from the given filename */
820extern void
821ssl_load_keyfile(const char *ssl_keylog_filename, FILE **keylog_file,
822 const ssl_master_key_map_t *mk_map);
823
824#ifdef HAVE_LIBGNUTLS
825/* parse ssl related preferences (private keys and ports association strings) */
826extern void
827ssl_parse_key_list(const ssldecrypt_assoc_t * uats, GHashTable *key_hash, const char* dissector_table_name, dissector_handle_t main_handle, bool tcp);
828#endif
829
830extern void
831ssl_finalize_decryption(SslDecryptSession *ssl, ssl_master_key_map_t *mk_map);
832
837extern void
838tls_save_crandom(SslDecryptSession *ssl, ssl_master_key_map_t *mk_map);
839
840extern bool
841tls13_generate_keys(SslDecryptSession *ssl_session, const StringInfo *secret, bool is_from_server);
842
843extern StringInfo *
844tls13_load_secret(SslDecryptSession *ssl, ssl_master_key_map_t *mk_map,
845 bool is_from_server, TLSRecordType type);
846
847extern void
848tls13_change_key(SslDecryptSession *ssl, ssl_master_key_map_t *mk_map,
849 bool is_from_server, TLSRecordType type);
850
851extern void
852tls13_key_update(SslDecryptSession *ssl, bool is_from_server);
853
854extern bool
855ssl_is_valid_content_type(uint8_t type);
856
857extern bool
858ssl_is_valid_handshake_type(uint8_t hs_type, bool is_dtls);
859
860extern bool
861tls_scan_server_hello(tvbuff_t *tvb, uint32_t offset, uint32_t offset_end,
862 uint16_t *server_version, bool *is_hrr);
863
864extern void
865ssl_try_set_version(SslSession *session, SslDecryptSession *ssl,
866 uint8_t content_type, uint8_t handshake_type,
867 bool is_dtls, uint16_t version);
868
869extern void
870ssl_calculate_handshake_hash(SslDecryptSession *ssl_session, tvbuff_t *tvb, uint32_t offset, uint32_t length);
871
872/* common header fields, subtrees and expert info for SSL and DTLS dissectors */
873typedef struct ssl_common_dissect {
874 struct {
875 int change_cipher_spec;
876 int hs_exts_len;
877 int hs_ext_alpn_len;
878 int hs_ext_alpn_list;
879 int hs_ext_alpn_str;
880 int hs_ext_alpn_str_len;
881 int hs_ext_cert_url_item;
882 int hs_ext_cert_url_padding;
883 int hs_ext_cert_url_sha1;
884 int hs_ext_cert_url_type;
885 int hs_ext_cert_url_url;
886 int hs_ext_cert_url_url_hash_list_len;
887 int hs_ext_cert_url_url_len;
888 int hs_ext_cert_status_type;
889 int hs_ext_cert_status_request_len;
890 int hs_ext_cert_status_responder_id_list_len;
891 int hs_ext_cert_status_request_extensions_len;
892 int hs_ext_cert_status_request_list_len;
893 int hs_ocsp_response_list_len;
894 int hs_ocsp_response_len;
895 int hs_ext_cert_type;
896 int hs_ext_cert_types;
897 int hs_ext_cert_types_len;
898 int hs_ext_data;
899 int hs_ext_ec_point_format;
900 int hs_ext_ec_point_formats;
901 int hs_ext_ec_point_formats_len;
902 int hs_ext_srp_len;
903 int hs_ext_srp_username;
904 int hs_ext_supported_group;
905 int hs_ext_supported_groups;
906 int hs_ext_supported_groups_len;
907 int hs_ext_ech_outer_ext;
908 int hs_ext_ech_outer_ext_len;
909 int hs_ech_confirm;
910 int hs_ech_confirm_compute;
911 int hs_ext_heartbeat_mode;
912 int hs_ext_len;
913 int hs_ext_npn_str;
914 int hs_ext_npn_str_len;
915 int hs_ext_reneg_info_len;
916 int hs_ext_reneg_info;
917 int hs_ext_key_share_client_length;
918 int hs_ext_key_share_group;
919 int hs_ext_key_share_key_exchange_length;
920 int hs_ext_key_share_key_exchange;
921 int hs_ext_key_share_selected_group;
922 int hs_ext_psk_identities_length;
923 int hs_ext_psk_identity_identity_length;
924 int hs_ext_psk_identity_identity;
925 int hs_ext_psk_identity_obfuscated_ticket_age;
926 int hs_ext_psk_binders_length;
927 int hs_ext_psk_binders;
928 int hs_ext_psk_binder;
929 int hs_ext_psk_binder_binder_length;
930 int hs_ext_psk_binder_binder;
931 int hs_ext_psk_identity_selected;
932 int hs_ext_session_ticket;
933 int hs_ext_supported_versions_len;
934 int hs_ext_supported_version;
935 int hs_ext_cookie_len;
936 int hs_ext_cookie;
937 int hs_ext_server_name;
938 int hs_ext_server_name_len;
939 int hs_ext_server_name_list_len;
940 int hs_ext_server_name_type;
941 int hs_ext_max_fragment_length;
942 int hs_ext_padding_data;
943 int hs_ext;
944 int hs_ext_type;
945 int hs_ext_connection_id_length;
946 int hs_ext_connection_id;
947 int hs_ext_trusted_ca_keys_len;
948 int hs_ext_trusted_ca_keys_list;
949 int hs_ext_trusted_ca_key;
950 int hs_ext_trusted_ca_key_type;
951 int hs_ext_trusted_ca_key_hash;
952 int hs_ext_trusted_ca_key_dname_len;
953 int hs_ext_trusted_ca_key_dname;
954 int hs_sig_hash_alg;
955 int hs_sig_hash_alg_len;
956 int hs_sig_hash_algs;
957 int hs_sig_hash_hash;
958 int hs_sig_hash_sig;
959 int hs_client_keyex_epms_len;
960 int hs_client_keyex_epms;
961 int hs_server_keyex_modulus_len;
962 int hs_server_keyex_exponent_len;
963 int hs_server_keyex_sig_len;
964 int hs_server_keyex_p_len;
965 int hs_server_keyex_g_len;
966 int hs_server_keyex_ys_len;
967 int hs_client_keyex_yc_len;
968 int hs_client_keyex_point_len;
969 int hs_server_keyex_point_len;
970 int hs_server_keyex_p;
971 int hs_server_keyex_g;
972 int hs_server_keyex_curve_type;
973 int hs_server_keyex_named_curve;
974 int hs_server_keyex_ys;
975 int hs_client_keyex_yc;
976 int hs_server_keyex_point;
977 int hs_client_keyex_point;
978 int hs_server_keyex_xs_len;
979 int hs_client_keyex_xc_len;
980 int hs_server_keyex_xs;
981 int hs_client_keyex_xc;
982 int hs_server_keyex_vs_len;
983 int hs_client_keyex_vc_len;
984 int hs_server_keyex_vs;
985 int hs_client_keyex_vc;
986 int hs_server_keyex_rs_len;
987 int hs_client_keyex_rc_len;
988 int hs_server_keyex_rs;
989 int hs_client_keyex_rc;
990 int hs_server_keyex_modulus;
991 int hs_server_keyex_exponent;
992 int hs_server_keyex_sig;
993 int hs_server_keyex_hint_len;
994 int hs_server_keyex_hint;
995 int hs_client_keyex_identity_len;
996 int hs_client_keyex_identity;
997 int hs_certificates_len;
998 int hs_certificates;
999 int hs_certificate_len;
1000 int hs_certificate;
1001 int hs_cert_types_count;
1002 int hs_cert_types;
1003 int hs_cert_type;
1004 int hs_dnames_len;
1005 int hs_dnames;
1006 int hs_dnames_truncated;
1007 int hs_dname_len;
1008 int hs_dname;
1009 int hs_random;
1010 int hs_random_time;
1011 int hs_random_bytes;
1012 int hs_session_id;
1013 int hs_session_id_len;
1014 int hs_client_version;
1015 int hs_server_version;
1016 int hs_cipher_suites_len;
1017 int hs_cipher_suites;
1018 int hs_cipher_suite;
1019 int hs_comp_methods_len;
1020 int hs_comp_methods;
1021 int hs_comp_method;
1022 int hs_session_ticket_lifetime_hint;
1023 int hs_session_ticket_age_add;
1024 int hs_session_ticket_nonce_len;
1025 int hs_session_ticket_nonce;
1026 int hs_session_ticket_len;
1027 int hs_session_ticket;
1028 int hs_finished;
1029 int hs_client_cert_vrfy_sig_len;
1030 int hs_client_cert_vrfy_sig;
1031 int hs_ja3_full;
1032 int hs_ja3_hash;
1033 int hs_ja3s_full;
1034 int hs_ja3s_hash;
1035 int hs_ja4;
1036 int hs_ja4_r;
1037
1038 /* TLS 1.3 */
1039 int hs_ext_psk_ke_modes_length;
1040 int hs_ext_psk_ke_mode;
1041 int hs_certificate_request_context_length;
1042 int hs_certificate_request_context;
1043 int hs_key_update_request_update;
1044 int sct_scts_length;
1045 int sct_sct_length;
1046 int sct_sct_version;
1047 int sct_sct_logid;
1048 int sct_sct_timestamp;
1049 int sct_sct_extensions_length;
1050 int sct_sct_extensions;
1051 int sct_sct_signature;
1052 int sct_sct_signature_length;
1053 int hs_ext_max_early_data_size;
1054 int hs_ext_oid_filters_length;
1055 int hs_ext_oid_filters_oid_length;
1056 int hs_ext_oid_filters_oid;
1057 int hs_ext_oid_filters_values_length;
1058 int hs_cred_valid_time;
1059 int hs_cred_pubkey;
1060 int hs_cred_pubkey_len;
1061 int hs_cred_signature;
1062 int hs_cred_signature_len;
1063
1064 /* compress_certificate */
1065 int hs_ext_compress_certificate_algorithms_length;
1066 int hs_ext_compress_certificate_algorithm;
1067 int hs_ext_compress_certificate_uncompressed_length;
1068 int hs_ext_compress_certificate_compressed_certificate_message_length;
1069 int hs_ext_compress_certificate_compressed_certificate_message;
1070
1071 /* Token Binding Negotiation */
1072 int hs_ext_token_binding_version_major;
1073 int hs_ext_token_binding_version_minor;
1074 int hs_ext_token_binding_key_parameters;
1075 int hs_ext_token_binding_key_parameters_length;
1076 int hs_ext_token_binding_key_parameter;
1077
1078 int hs_ext_record_size_limit;
1079
1080 /* QUIC Transport Parameters */
1081 int hs_ext_quictp_len;
1082 int hs_ext_quictp_parameter;
1083 int hs_ext_quictp_parameter_type;
1084 int hs_ext_quictp_parameter_len;
1085 int hs_ext_quictp_parameter_len_old;
1086 int hs_ext_quictp_parameter_value;
1087 int hs_ext_quictp_parameter_original_destination_connection_id;
1088 int hs_ext_quictp_parameter_max_idle_timeout;
1089 int hs_ext_quictp_parameter_stateless_reset_token;
1090 int hs_ext_quictp_parameter_initial_max_data;
1091 int hs_ext_quictp_parameter_initial_max_stream_data_bidi_local;
1092 int hs_ext_quictp_parameter_initial_max_stream_data_bidi_remote;
1093 int hs_ext_quictp_parameter_initial_max_stream_data_uni;
1094 int hs_ext_quictp_parameter_initial_max_streams_bidi;
1095 int hs_ext_quictp_parameter_initial_max_streams_uni;
1096 int hs_ext_quictp_parameter_ack_delay_exponent;
1097 int hs_ext_quictp_parameter_max_ack_delay;
1098 int hs_ext_quictp_parameter_max_udp_payload_size;
1099 int hs_ext_quictp_parameter_pa_ipv4address;
1100 int hs_ext_quictp_parameter_pa_ipv6address;
1101 int hs_ext_quictp_parameter_pa_ipv4port;
1102 int hs_ext_quictp_parameter_pa_ipv6port;
1103 int hs_ext_quictp_parameter_pa_connectionid_length;
1104 int hs_ext_quictp_parameter_pa_connectionid;
1105 int hs_ext_quictp_parameter_pa_statelessresettoken;
1106 int hs_ext_quictp_parameter_active_connection_id_limit;
1107 int hs_ext_quictp_parameter_initial_source_connection_id;
1108 int hs_ext_quictp_parameter_retry_source_connection_id;
1109 int hs_ext_quictp_parameter_max_datagram_frame_size;
1110 int hs_ext_quictp_parameter_cibir_encoding_length;
1111 int hs_ext_quictp_parameter_cibir_encoding_offset;
1112 int hs_ext_quictp_parameter_loss_bits;
1113 int hs_ext_quictp_parameter_address_discovery;
1114 int hs_ext_quictp_parameter_enable_time_stamp_v2;
1115 int hs_ext_quictp_parameter_min_ack_delay;
1116 int hs_ext_quictp_parameter_google_user_agent_id;
1117 int hs_ext_quictp_parameter_google_key_update_not_yet_supported;
1118 int hs_ext_quictp_parameter_google_quic_version;
1119 int hs_ext_quictp_parameter_google_initial_rtt;
1120 int hs_ext_quictp_parameter_google_support_handshake_done;
1121 int hs_ext_quictp_parameter_google_quic_params;
1122 int hs_ext_quictp_parameter_google_quic_params_unknown_field;
1123 int hs_ext_quictp_parameter_google_connection_options;
1124 int hs_ext_quictp_parameter_google_supported_versions_length;
1125 int hs_ext_quictp_parameter_google_supported_version;
1126 int hs_ext_quictp_parameter_facebook_partial_reliability;
1127 int hs_ext_quictp_parameter_chosen_version;
1128 int hs_ext_quictp_parameter_other_version;
1129 int hs_ext_quictp_parameter_enable_multipath;
1130 int hs_ext_quictp_parameter_initial_max_paths;
1131 int hs_ext_quictp_parameter_initial_max_path_id;
1132
1133 int esni_suite;
1134 int esni_record_digest_length;
1135 int esni_record_digest;
1136 int esni_encrypted_sni_length;
1137 int esni_encrypted_sni;
1138 int esni_nonce;
1139
1140 int ech_echconfiglist_length;
1141 int ech_echconfiglist;
1142 int ech_echconfig;
1143 int ech_echconfig_version;
1144 int ech_echconfig_length;
1145 int ech_echconfigcontents_maximum_name_length;
1146 int ech_echconfigcontents_public_name_length;
1147 int ech_echconfigcontents_public_name;
1148 int ech_echconfigcontents_extensions_length;
1149 int ech_echconfigcontents_extensions;
1150 int ech_hpke_keyconfig;
1151 int ech_hpke_keyconfig_config_id;
1152 int ech_hpke_keyconfig_kem_id;
1153 int ech_hpke_keyconfig_public_key_length;
1154 int ech_hpke_keyconfig_public_key;
1155 int ech_hpke_keyconfig_cipher_suites;
1156 int ech_hpke_keyconfig_cipher_suites_length;
1157 int ech_hpke_keyconfig_cipher_suite;
1158 int ech_hpke_keyconfig_cipher_suite_kdf_id;
1159 int ech_hpke_keyconfig_cipher_suite_aead_id;
1160 int ech_clienthello_type;
1161 int ech_cipher_suite;
1162 int ech_config_id;
1163 int ech_enc_length;
1164 int ech_enc;
1165 int ech_payload_length;
1166 int ech_payload;
1167 int ech_confirmation;
1168 int ech_retry_configs;
1169 int ech_padding_data;
1170
1171 int hs_ext_alps_len;
1172 int hs_ext_alps_alpn_list;
1173 int hs_ext_alps_alpn_str;
1174 int hs_ext_alps_alpn_str_len;
1175 int hs_ext_alps_settings;
1176
1177 /* do not forget to update SSL_COMMON_HF_LIST! */
1178 } hf;
1179 struct {
1180 int hs_ext;
1181 int hs_ext_alpn;
1182 int hs_ext_cert_types;
1183 int hs_ext_groups;
1184 int hs_ext_curves_point_formats;
1185 int hs_ext_npn;
1186 int hs_ext_reneg_info;
1187 int hs_ext_key_share;
1188 int hs_ext_key_share_ks;
1189 int hs_ext_pre_shared_key;
1190 int hs_ext_psk_identity;
1191 int hs_ext_psk_binders;
1192 int hs_ext_psk_binder;
1193 int hs_ext_server_name;
1194 int hs_ext_oid_filter;
1195 int hs_ext_quictp_parameter;
1196 int hs_ext_trusted_ca_keys;
1197 int hs_ext_trusted_ca_key;
1198 int hs_sig_hash_alg;
1199 int hs_sig_hash_algs;
1200 int urlhash;
1201 int keyex_params;
1202 int certificates;
1203 int cert_types;
1204 int dnames;
1205 int hs_random;
1206 int cipher_suites;
1207 int comp_methods;
1208 int session_ticket;
1209 int sct;
1210 int cert_status;
1211 int ocsp_response;
1212 int uncompressed_certificates;
1213 int hs_ext_alps;
1214 int ech_echconfiglist;
1215 int ech_echconfig;
1216 int ech_retry_configs;
1217 int ech_hpke_keyconfig;
1218 int ech_hpke_cipher_suites;
1219 int ech_hpke_cipher_suite;
1220 int ech_decrypt;
1221 int hs_ext_token_binding_key_parameters;
1222
1223 /* do not forget to update SSL_COMMON_ETT_LIST! */
1224 } ett;
1225 struct {
1226 /* Generic expert info for malformed packets. */
1227 expert_field client_version_error;
1228 expert_field server_version_error;
1229 expert_field legacy_version;
1230 expert_field malformed_vector_length;
1231 expert_field malformed_buffer_too_small;
1232 expert_field malformed_trailing_data;
1233
1234 expert_field hs_ext_cert_status_undecoded;
1235 expert_field hs_ciphersuite_undecoded;
1236 expert_field hs_srv_keyex_illegal;
1237 expert_field resumed;
1238 expert_field record_length_invalid;
1239 expert_field decompression_error;
1240
1241 expert_field ech_echconfig_invalid_version;
1242 expert_field ech_accepted;
1243 expert_field ech_rejected;
1244
1245 /* do not forget to update SSL_COMMON_EI_LIST! */
1246 } ei;
1248
1249/* Header fields specific to DTLS. See packet-dtls.c */
1250typedef struct {
1251 int hf_dtls_handshake_cookie_len;
1252 int hf_dtls_handshake_cookie;
1253
1254 /* Do not forget to initialize dtls_hfs to -1 in packet-dtls.c! */
1255} dtls_hfs_t;
1256
1257/* Header fields specific to SSL. See packet-tls.c */
1258typedef struct {
1259 int hs_md5_hash;
1260 int hs_sha_hash;
1261
1262 /* Do not forget to initialize ssl_hfs to -1 in packet-tls.c! */
1263} ssl_hfs_t;
1265typedef struct {
1266 uint32_t max_version;
1267 bool server_name_present;
1268 int num_cipher_suites;
1269 int num_extensions;
1270 wmem_strbuf_t *alpn;
1271 wmem_list_t *cipher_list;
1272 wmem_list_t *extension_list;
1273 wmem_list_t *sighash_list;
1274} ja4_data_t;
1275
1276
1277/* Helpers for dissecting Variable-Length Vectors. {{{ */
1278/* Largest value that fits in a 24-bit number (2^24-1). */
1279#define G_MAXUINT24 ((1U << 24) - 1)
1280
1293extern bool
1294ssl_add_vector(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
1295 unsigned offset, unsigned offset_end, uint32_t *ret_length,
1296 int hf_length, uint32_t min_value, uint32_t max_value);
1297
1306extern bool
1307ssl_end_vector(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
1308 unsigned offset, unsigned offset_end);
1309/* }}} */
1310
1311
1312extern void
1313ssl_check_record_length(ssl_common_dissect_t *hf, packet_info *pinfo,
1314 ContentType content_type,
1315 unsigned record_length, proto_item *length_pi,
1316 uint16_t version, tvbuff_t *decrypted_tvb);
1317
1318void
1319ssl_dissect_change_cipher_spec(ssl_common_dissect_t *hf, tvbuff_t *tvb,
1320 packet_info *pinfo, proto_tree *tree,
1321 uint32_t offset, SslSession *session,
1322 bool is_from_server,
1323 const SslDecryptSession *ssl);
1324
1325extern int
1326ssl_dissect_hnd_cli_hello(ssl_common_dissect_t *hf, tvbuff_t *tvb,
1327 packet_info *pinfo, proto_tree *tree, uint32_t offset,
1328 uint32_t offset_end, SslSession *session,
1329 SslDecryptSession *ssl,
1330 dtls_hfs_t *dtls_hfs, ssl_master_key_map_t *mk_map);
1331
1332extern void
1333ssl_dissect_hnd_srv_hello(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info* pinfo,
1334 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1335 SslSession *session, SslDecryptSession *ssl,
1336 bool is_dtls, bool is_hrr);
1337
1338extern void
1339ssl_dissect_hnd_hello_retry_request(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info* pinfo,
1340 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1341 SslSession *session, SslDecryptSession *ssl,
1342 bool is_dtls);
1343
1344extern void
1345ssl_dissect_hnd_encrypted_extensions(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info* pinfo,
1346 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1347 SslSession *session, SslDecryptSession *ssl,
1348 bool is_dtls);
1349
1350extern void
1351ssl_dissect_hnd_new_ses_ticket(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo,
1352 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1353 SslSession *session, SslDecryptSession *ssl,
1354 bool is_dtls, GHashTable *session_hash);
1355
1356extern void
1357ssl_dissect_hnd_cert(ssl_common_dissect_t *hf, tvbuff_t *tvb, proto_tree *tree,
1358 uint32_t offset, uint32_t offset_end, packet_info *pinfo,
1359 SslSession *session, SslDecryptSession *ssl,
1360 bool is_from_server, bool is_dtls);
1361
1362extern void
1363ssl_dissect_hnd_cert_req(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo,
1364 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1365 SslSession *session, bool is_dtls);
1366
1367extern void
1368ssl_dissect_hnd_cli_cert_verify(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo,
1369 proto_tree *tree, uint32_t offset, uint32_t offset_end, uint16_t version);
1370
1371extern void
1372ssl_dissect_hnd_finished(ssl_common_dissect_t *hf, tvbuff_t *tvb,
1373 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1374 const SslSession *session, ssl_hfs_t *ssl_hfs);
1375
1376extern void
1377ssl_dissect_hnd_cert_url(ssl_common_dissect_t *hf, tvbuff_t *tvb, proto_tree *tree, uint32_t offset);
1378
1379extern uint32_t
1380tls_dissect_hnd_certificate_status(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo,
1381 proto_tree *tree, uint32_t offset, uint32_t offset_end);
1382
1383extern void
1384ssl_dissect_hnd_cli_keyex(ssl_common_dissect_t *hf, tvbuff_t *tvb,
1385 proto_tree *tree, uint32_t offset, uint32_t length,
1386 const SslSession *session);
1387
1388extern void
1389ssl_dissect_hnd_srv_keyex(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo,
1390 proto_tree *tree, uint32_t offset, uint32_t offset_end,
1391 const SslSession *session);
1392
1393extern void
1394tls13_dissect_hnd_key_update(ssl_common_dissect_t *hf, tvbuff_t *tvb,
1395 proto_tree *tree, uint32_t offset);
1396
1397extern uint32_t
1398tls_dissect_sct_list(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
1399 uint32_t offset, uint32_t offset_end, uint16_t version);
1400
1401extern bool
1402tls13_hkdf_expand_label_context(int md, const StringInfo *secret,
1403 const char *label_prefix, const char *label,
1404 const uint8_t *context, uint8_t context_length,
1405 uint16_t out_len, unsigned char **out);
1406
1407extern bool
1408tls13_hkdf_expand_label(int md, const StringInfo *secret,
1409 const char *label_prefix, const char *label,
1410 uint16_t out_len, unsigned char **out);
1411
1412extern void
1413ssl_dissect_hnd_compress_certificate(ssl_common_dissect_t *hf, tvbuff_t *tvb, proto_tree *tree,
1414 uint32_t offset, uint32_t offset_end, packet_info *pinfo,
1415 SslSession *session _U_, SslDecryptSession *ssl _U_,
1416 bool is_from_server _U_, bool is_dtls _U_);
1417
1418extern tap_packet_status
1419ssl_follow_tap_listener(void *tapdata, packet_info *pinfo, epan_dissect_t *edt _U_, const void *ssl, tap_flags_t flags _U_);
1420
1421/* {{{ */
1422#define SSL_COMMON_LIST_T(name) \
1423ssl_common_dissect_t name
1424/* }}} */
1425
1426/* {{{ */
1427#define SSL_COMMON_HF_LIST(name, prefix) \
1428 { & name .hf.change_cipher_spec, \
1429 { "Change Cipher Spec Message", prefix ".change_cipher_spec", \
1430 FT_NONE, BASE_NONE, NULL, 0x0, \
1431 "Signals a change in cipher specifications", HFILL } \
1432 }, \
1433 { & name .hf.hs_exts_len, \
1434 { "Extensions Length", prefix ".handshake.extensions_length", \
1435 FT_UINT16, BASE_DEC, NULL, 0x0, \
1436 "Length of hello extensions", HFILL } \
1437 }, \
1438 { & name .hf.hs_ext, \
1439 { "Extension", prefix ".handshake.extension", \
1440 FT_NONE, BASE_NONE, NULL, 0x0, \
1441 "Hello extension", HFILL } \
1442 }, \
1443 { & name .hf.hs_ext_type, \
1444 { "Type", prefix ".handshake.extension.type", \
1445 FT_UINT16, BASE_DEC, VALS(tls_hello_extension_types), 0x0, \
1446 "Hello extension type", HFILL } \
1447 }, \
1448 { & name .hf.hs_ext_len, \
1449 { "Length", prefix ".handshake.extension.len", \
1450 FT_UINT16, BASE_DEC, NULL, 0x0, \
1451 "Length of a hello extension", HFILL } \
1452 }, \
1453 { & name .hf.hs_ext_data, \
1454 { "Data", prefix ".handshake.extension.data", \
1455 FT_BYTES, BASE_NONE, NULL, 0x0, \
1456 "Hello Extension data", HFILL } \
1457 }, \
1458 { & name .hf.hs_ext_ech_outer_ext_len, \
1459 { "Outer Extensions List Length", prefix ".handshake.extensions_ech_outer_extensions_length", \
1460 FT_UINT8, BASE_DEC, NULL, 0x0, \
1461 NULL, HFILL } \
1462 }, \
1463 { & name .hf.hs_ext_ech_outer_ext, \
1464 { "Outer Extensions List", prefix ".handshake.extensions_ech_outer_extensions", \
1465 FT_NONE, BASE_NONE, NULL, 0x0, \
1466 "List of extensions derived from Outer Client Hello", HFILL } \
1467 }, \
1468 { & name .hf.hs_ech_confirm, \
1469 { "ECH Confirmation Bytes", prefix ".handshake.ech_confirm", \
1470 FT_BYTES, BASE_NONE, NULL, 0x0, \
1471 NULL, HFILL } \
1472 }, \
1473 { & name .hf.hs_ech_confirm_compute, \
1474 { "Computed ECH Confirmation Bytes", prefix ".handshake.ech_confirm_compute", \
1475 FT_BYTES, BASE_NONE, NULL, 0x0, \
1476 NULL, HFILL } \
1477 }, \
1478 { & name .hf.hs_ext_supported_groups_len, \
1479 { "Supported Groups List Length", prefix ".handshake.extensions_supported_groups_length", \
1480 FT_UINT16, BASE_DEC, NULL, 0x0, \
1481 NULL, HFILL } \
1482 }, \
1483 { & name .hf.hs_ext_supported_groups, \
1484 { "Supported Groups List", prefix ".handshake.extensions_supported_groups", \
1485 FT_NONE, BASE_NONE, NULL, 0x0, \
1486 "List of supported groups (formerly Supported Elliptic Curves)", HFILL } \
1487 }, \
1488 { & name .hf.hs_ext_supported_group, \
1489 { "Supported Group", prefix ".handshake.extensions_supported_group", \
1490 FT_UINT16, BASE_HEX, VALS(ssl_extension_curves), 0x0, \
1491 NULL, HFILL } \
1492 }, \
1493 { & name .hf.hs_ext_ec_point_formats_len, \
1494 { "EC point formats Length", prefix ".handshake.extensions_ec_point_formats_length", \
1495 FT_UINT8, BASE_DEC, NULL, 0x0, \
1496 "Length of elliptic curves point formats field", HFILL } \
1497 }, \
1498 { & name .hf.hs_ext_ec_point_formats, \
1499 { "EC point formats", prefix ".handshake.extensions_ec_point_formats", \
1500 FT_NONE, BASE_NONE, NULL, 0x0, \
1501 "List of elliptic curves point format", HFILL } \
1502 }, \
1503 { & name .hf.hs_ext_ec_point_format, \
1504 { "EC point format", prefix ".handshake.extensions_ec_point_format", \
1505 FT_UINT8, BASE_DEC, VALS(ssl_extension_ec_point_formats), 0x0, \
1506 "Elliptic curves point format", HFILL } \
1507 }, \
1508 { & name .hf.hs_ext_srp_len, \
1509 { "SRP username length", prefix ".handshake.extensions_srp_len", \
1510 FT_UINT8, BASE_DEC, NULL, 0x0, \
1511 "Length of Secure Remote Password username field", HFILL } \
1512 }, \
1513 { & name .hf.hs_ext_srp_username, \
1514 { "SRP username", prefix ".handshake.extensions_srp_username", \
1515 FT_STRING, BASE_NONE, NULL, 0x0, \
1516 "Secure Remote Password username", HFILL } \
1517 }, \
1518 { & name .hf.hs_ext_alpn_len, \
1519 { "ALPN Extension Length", prefix ".handshake.extensions_alpn_len", \
1520 FT_UINT16, BASE_DEC, NULL, 0x0, \
1521 "Length of the ALPN Extension", HFILL } \
1522 }, \
1523 { & name .hf.hs_ext_alpn_list, \
1524 { "ALPN Protocol", prefix ".handshake.extensions_alpn_list", \
1525 FT_NONE, BASE_NONE, NULL, 0x0, \
1526 NULL, HFILL } \
1527 }, \
1528 { & name .hf.hs_ext_alpn_str_len, \
1529 { "ALPN string length", prefix ".handshake.extensions_alpn_str_len", \
1530 FT_UINT8, BASE_DEC, NULL, 0x0, \
1531 "Length of ALPN string", HFILL } \
1532 }, \
1533 { & name .hf.hs_ext_alpn_str, \
1534 { "ALPN Next Protocol", prefix ".handshake.extensions_alpn_str", \
1535 FT_STRING, BASE_NONE, NULL, 0x00, \
1536 NULL, HFILL } \
1537 }, \
1538 { & name .hf.hs_ext_npn_str_len, \
1539 { "Protocol string length", prefix ".handshake.extensions_npn_str_len", \
1540 FT_UINT8, BASE_DEC, NULL, 0x0, \
1541 "Length of next protocol string", HFILL } \
1542 }, \
1543 { & name .hf.hs_ext_npn_str, \
1544 { "Next Protocol", prefix ".handshake.extensions_npn", \
1545 FT_STRING, BASE_NONE, NULL, 0x0, \
1546 NULL, HFILL } \
1547 }, \
1548 { & name .hf.hs_ext_reneg_info_len, \
1549 { "Renegotiation info extension length", prefix ".handshake.extensions_reneg_info_len", \
1550 FT_UINT8, BASE_DEC, NULL, 0x0, \
1551 NULL, HFILL } \
1552 }, \
1553 { & name .hf.hs_ext_reneg_info, \
1554 { "Renegotiation info", prefix ".handshake.extensions_reneg_info",\
1555 FT_BYTES, BASE_NONE, NULL, 0x0, \
1556 NULL, HFILL } \
1557 }, \
1558 { & name .hf.hs_ext_key_share_client_length, \
1559 { "Client Key Share Length", prefix ".handshake.extensions_key_share_client_length", \
1560 FT_UINT16, BASE_DEC, NULL, 0x00, \
1561 NULL, HFILL } \
1562 }, \
1563 { & name .hf.hs_ext_key_share_group, \
1564 { "Group", prefix ".handshake.extensions_key_share_group", \
1565 FT_UINT16, BASE_DEC, VALS(ssl_extension_curves), 0x00, \
1566 NULL, HFILL } \
1567 }, \
1568 { & name .hf.hs_ext_key_share_key_exchange_length, \
1569 { "Key Exchange Length", prefix ".handshake.extensions_key_share_key_exchange_length", \
1570 FT_UINT16, BASE_DEC, NULL, 0x00, \
1571 NULL, HFILL } \
1572 }, \
1573 { & name .hf.hs_ext_key_share_key_exchange, \
1574 { "Key Exchange", prefix ".handshake.extensions_key_share_key_exchange", \
1575 FT_BYTES, BASE_NONE, NULL, 0x0, \
1576 NULL, HFILL } \
1577 }, \
1578 { & name .hf.hs_ext_key_share_selected_group, \
1579 { "Selected Group", prefix ".handshake.extensions_key_share_selected_group", \
1580 FT_UINT16, BASE_DEC, VALS(ssl_extension_curves), 0x00, \
1581 NULL, HFILL } \
1582 }, \
1583 { & name .hf.hs_ext_psk_identities_length, \
1584 { "Identities Length", prefix ".handshake.extensions.psk.identities.length", \
1585 FT_UINT16, BASE_DEC, NULL, 0x0, \
1586 NULL, HFILL } \
1587 }, \
1588 { & name .hf.hs_ext_psk_identity_identity_length, \
1589 { "Identity Length", prefix ".handshake.extensions.psk.identity.identity_length", \
1590 FT_UINT16, BASE_DEC, NULL, 0x0, \
1591 NULL, HFILL } \
1592 }, \
1593 { & name .hf.hs_ext_psk_identity_identity, \
1594 { "Identity", prefix ".handshake.extensions.psk.identity.identity", \
1595 FT_BYTES, BASE_NONE, NULL, 0x0, \
1596 NULL, HFILL } \
1597 }, \
1598 { & name .hf.hs_ext_psk_identity_obfuscated_ticket_age, \
1599 { "Obfuscated Ticket Age", prefix ".handshake.extensions.psk.identity.obfuscated_ticket_age", \
1600 FT_UINT32, BASE_DEC, NULL, 0x0, \
1601 NULL, HFILL } \
1602 }, \
1603 { & name .hf.hs_ext_psk_binders_length, \
1604 { "PSK Binders length", prefix ".handshake.extensions.psk.binders_len", \
1605 FT_UINT16, BASE_DEC, NULL, 0x0, \
1606 NULL, HFILL } \
1607 }, \
1608 { & name .hf.hs_ext_psk_binders, \
1609 { "PSK Binders", prefix ".handshake.extensions.psk.binders", \
1610 FT_NONE, BASE_NONE, NULL, 0x0, \
1611 NULL, HFILL } \
1612 }, \
1613 { & name .hf.hs_ext_psk_binder, \
1614 { "PSK Binder", prefix ".handshake.extensions.psk.binder", \
1615 FT_NONE, BASE_NONE, NULL, 0x0, \
1616 NULL, HFILL } \
1617 }, \
1618 { & name .hf.hs_ext_psk_binder_binder_length, \
1619 { "Binder Length", prefix ".handshake.extensions.psk.binder.binder_length", \
1620 FT_UINT8, BASE_DEC, NULL, 0x0, \
1621 NULL, HFILL } \
1622 }, \
1623 { & name .hf.hs_ext_psk_binder_binder, \
1624 { "Binder", prefix ".handshake.extensions.psk.binder.binder", \
1625 FT_BYTES, BASE_NONE, NULL, 0x0, \
1626 NULL, HFILL } \
1627 }, \
1628 { & name .hf.hs_ext_psk_identity_selected, \
1629 { "Selected Identity", prefix ".handshake.extensions.psk.identity.selected", \
1630 FT_UINT16, BASE_DEC, NULL, 0x0, \
1631 NULL, HFILL } \
1632 }, \
1633 { & name .hf.hs_ext_session_ticket, \
1634 { "Session Ticket", prefix ".handshake.extensions.session_ticket", \
1635 FT_BYTES, BASE_NONE, NULL, 0x0, \
1636 NULL, HFILL } \
1637 }, \
1638 { & name .hf.hs_ext_supported_versions_len, \
1639 { "Supported Versions length", prefix ".handshake.extensions.supported_versions_len", \
1640 FT_UINT8, BASE_DEC, NULL, 0x0, \
1641 NULL, HFILL } \
1642 }, \
1643 { & name .hf.hs_ext_supported_version, \
1644 { "Supported Version", prefix ".handshake.extensions.supported_version", \
1645 FT_UINT16, BASE_HEX, VALS(ssl_versions), 0x0, \
1646 NULL, HFILL } \
1647 }, \
1648 { & name .hf.hs_ext_cookie_len, \
1649 { "Cookie length", prefix ".handshake.extensions.cookie_len", \
1650 FT_UINT16, BASE_DEC, NULL, 0x0, \
1651 NULL, HFILL } \
1652 }, \
1653 { & name .hf.hs_ext_cookie, \
1654 { "Cookie", prefix ".handshake.extensions.cookie", \
1655 FT_BYTES, BASE_NONE, NULL, 0x0, \
1656 NULL, HFILL } \
1657 }, \
1658 { & name .hf.hs_ext_server_name_list_len, \
1659 { "Server Name list length", prefix ".handshake.extensions_server_name_list_len", \
1660 FT_UINT16, BASE_DEC, NULL, 0x0, \
1661 "Length of server name list", HFILL } \
1662 }, \
1663 { & name .hf.hs_ext_server_name_len, \
1664 { "Server Name length", prefix ".handshake.extensions_server_name_len", \
1665 FT_UINT16, BASE_DEC, NULL, 0x0, \
1666 "Length of server name string", HFILL } \
1667 }, \
1668 { & name .hf.hs_ext_server_name_type, \
1669 { "Server Name Type", prefix ".handshake.extensions_server_name_type", \
1670 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_server_name_type_vs), 0x0, \
1671 NULL, HFILL } \
1672 }, \
1673 { & name .hf.hs_ext_server_name, \
1674 { "Server Name", prefix ".handshake.extensions_server_name", \
1675 FT_STRING, BASE_NONE, NULL, 0x0, \
1676 NULL, HFILL } \
1677 }, \
1678 { & name .hf.hs_ext_max_fragment_length, \
1679 { "Maximum Fragment Length", prefix ".handshake.max_fragment_length", \
1680 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_max_fragment_length), 0x00, \
1681 "Maximum fragment length that an endpoint is willing to receive", HFILL } \
1682 }, \
1683 { & name .hf.hs_ext_padding_data, \
1684 { "Padding Data", prefix ".handshake.extensions_padding_data", \
1685 FT_BYTES, BASE_NONE, NULL, 0x0, \
1686 "Must be zero", HFILL } \
1687 }, \
1688 { & name .hf.hs_ext_cert_url_type, \
1689 { "Certificate Chain Type", prefix ".handshake.cert_url_type", \
1690 FT_UINT8, BASE_DEC, VALS(tls_cert_chain_type), 0x0, \
1691 "Certificate Chain Type for Client Certificate URL", HFILL } \
1692 }, \
1693 { & name .hf.hs_ext_cert_url_url_hash_list_len, \
1694 { "URL and Hash list Length", prefix ".handshake.cert_url.url_hash_len", \
1695 FT_UINT16, BASE_DEC, NULL, 0x0, \
1696 NULL, HFILL } \
1697 }, \
1698 { & name .hf.hs_ext_cert_url_item, \
1699 { "URL and Hash", prefix ".handshake.cert_url.url_hash", \
1700 FT_NONE, BASE_NONE, NULL, 0x0, \
1701 NULL, HFILL } \
1702 }, \
1703 { & name .hf.hs_ext_cert_url_url_len, \
1704 { "URL Length", prefix ".handshake.cert_url.url_len", \
1705 FT_UINT16, BASE_DEC, NULL, 0x0, \
1706 NULL, HFILL } \
1707 }, \
1708 { & name .hf.hs_ext_cert_type, \
1709 { "Certificate Type", prefix ".handshake.cert_type.type", \
1710 FT_UINT8, BASE_HEX, VALS(tls_certificate_type), 0x0, \
1711 NULL, HFILL } \
1712 }, \
1713 { & name .hf.hs_ext_cert_types, \
1714 { "Certificate Type List", prefix ".handshake.cert_type.types", \
1715 FT_NONE, BASE_NONE, NULL, 0x0, \
1716 NULL, HFILL } \
1717 }, \
1718 { & name .hf.hs_ext_cert_types_len, \
1719 { "Certificate Type List Length", prefix ".handshake.cert_type.types_len", \
1720 FT_UINT8, BASE_DEC, NULL, 0x0, \
1721 NULL, HFILL } \
1722 }, \
1723 { & name .hf.hs_ext_cert_url_url, \
1724 { "URL", prefix ".handshake.cert_url.url", \
1725 FT_STRING, BASE_NONE, NULL, 0x0, \
1726 "URL used to fetch the certificate(s)", HFILL } \
1727 }, \
1728 { & name .hf.hs_ext_cert_url_padding, \
1729 { "Padding", prefix ".handshake.cert_url.padding", \
1730 FT_NONE, BASE_NONE, NULL, 0x0, \
1731 "Padding that MUST be 0x01 for backwards compatibility", HFILL } \
1732 }, \
1733 { & name .hf.hs_ext_cert_url_sha1, \
1734 { "SHA1 Hash", prefix ".handshake.cert_url.sha1", \
1735 FT_BYTES, BASE_NONE, NULL, 0x0, \
1736 "SHA1 Hash of the certificate", HFILL } \
1737 }, \
1738 { & name .hf.hs_ext_cert_status_type, \
1739 { "Certificate Status Type", prefix ".handshake.extensions_status_request_type", \
1740 FT_UINT8, BASE_DEC, VALS(tls_cert_status_type), 0x0, \
1741 NULL, HFILL } \
1742 }, \
1743 { & name .hf.hs_ext_cert_status_request_len, \
1744 { "Certificate Status Length", prefix ".handshake.extensions_status_request_len", \
1745 FT_UINT16, BASE_DEC, NULL, 0x0, \
1746 NULL, HFILL } \
1747 }, \
1748 { & name .hf.hs_ext_cert_status_responder_id_list_len, \
1749 { "Responder ID list Length", prefix ".handshake.extensions_status_request_responder_ids_len", \
1750 FT_UINT16, BASE_DEC, NULL, 0x0, \
1751 NULL, HFILL } \
1752 }, \
1753 { & name .hf.hs_ext_cert_status_request_extensions_len, \
1754 { "Request Extensions Length", prefix ".handshake.extensions_status_request_exts_len", \
1755 FT_UINT16, BASE_DEC, NULL, 0x0, \
1756 NULL, HFILL } \
1757 }, \
1758 { & name .hf.hs_ext_cert_status_request_list_len, \
1759 { "Certificate Status List Length", prefix ".handshake.extensions_status_request_list_len", \
1760 FT_UINT16, BASE_DEC, NULL, 0x0, \
1761 "CertificateStatusRequestItemV2 list length", HFILL } \
1762 }, \
1763 { & name .hf.hs_ocsp_response_list_len, \
1764 { "OCSP Response List Length", prefix ".handshake.ocsp_response_list_len", \
1765 FT_UINT24, BASE_DEC, NULL, 0x0, \
1766 "OCSPResponseList length", HFILL } \
1767 }, \
1768 { & name .hf.hs_ocsp_response_len, \
1769 { "OCSP Response Length", prefix ".handshake.ocsp_response_len", \
1770 FT_UINT24, BASE_DEC, NULL, 0x0, \
1771 NULL, HFILL } \
1772 }, \
1773 { & name .hf.hs_sig_hash_alg_len, \
1774 { "Signature Hash Algorithms Length", prefix ".handshake.sig_hash_alg_len", \
1775 FT_UINT16, BASE_DEC, NULL, 0x0, \
1776 "Length of Signature Hash Algorithms", HFILL } \
1777 }, \
1778 { & name .hf.hs_sig_hash_algs, \
1779 { "Signature Algorithms", prefix ".handshake.sig_hash_algs", \
1780 FT_NONE, BASE_NONE, NULL, 0x0, \
1781 "List of supported Signature Algorithms", HFILL } \
1782 }, \
1783 { & name .hf.hs_sig_hash_alg, \
1784 { "Signature Algorithm", prefix ".handshake.sig_hash_alg", \
1785 FT_UINT16, BASE_HEX, VALS(tls13_signature_algorithm), 0x0, \
1786 NULL, HFILL } \
1787 }, \
1788 { & name .hf.hs_sig_hash_hash, \
1789 { "Signature Hash Algorithm Hash", prefix ".handshake.sig_hash_hash", \
1790 FT_UINT8, BASE_DEC, VALS(tls_hash_algorithm), 0x0, \
1791 "Hash algorithm (TLS 1.2)", HFILL } \
1792 }, \
1793 { & name .hf.hs_sig_hash_sig, \
1794 { "Signature Hash Algorithm Signature", prefix ".handshake.sig_hash_sig", \
1795 FT_UINT8, BASE_DEC, VALS(tls_signature_algorithm), 0x0, \
1796 "Signature algorithm (TLS 1.2)", HFILL } \
1797 }, \
1798 { & name .hf.hs_client_keyex_epms_len, \
1799 { "Encrypted PreMaster length", prefix ".handshake.epms_len", \
1800 FT_UINT16, BASE_DEC, NULL, 0x0, \
1801 "Length of encrypted PreMaster secret", HFILL } \
1802 }, \
1803 { & name .hf.hs_client_keyex_epms, \
1804 { "Encrypted PreMaster", prefix ".handshake.epms", \
1805 FT_BYTES, BASE_NONE, NULL, 0x0, \
1806 "Encrypted PreMaster secret", HFILL } \
1807 }, \
1808 { & name .hf.hs_server_keyex_modulus_len, \
1809 { "Modulus Length", prefix ".handshake.modulus_len", \
1810 FT_UINT16, BASE_DEC, NULL, 0x0, \
1811 "Length of RSA-EXPORT modulus", HFILL } \
1812 }, \
1813 { & name .hf.hs_server_keyex_exponent_len, \
1814 { "Exponent Length", prefix ".handshake.exponent_len", \
1815 FT_UINT16, BASE_DEC, NULL, 0x0, \
1816 "Length of RSA-EXPORT exponent", HFILL } \
1817 }, \
1818 { & name .hf.hs_server_keyex_sig_len, \
1819 { "Signature Length", prefix ".handshake.sig_len", \
1820 FT_UINT16, BASE_DEC, NULL, 0x0, \
1821 "Length of Signature", HFILL } \
1822 }, \
1823 { & name .hf.hs_server_keyex_p_len, \
1824 { "p Length", prefix ".handshake.p_len", \
1825 FT_UINT16, BASE_DEC, NULL, 0x0, \
1826 "Length of p", HFILL } \
1827 }, \
1828 { & name .hf.hs_server_keyex_g_len, \
1829 { "g Length", prefix ".handshake.g_len", \
1830 FT_UINT16, BASE_DEC, NULL, 0x0, \
1831 "Length of g", HFILL } \
1832 }, \
1833 { & name .hf.hs_server_keyex_ys_len, \
1834 { "Pubkey Length", prefix ".handshake.ys_len", \
1835 FT_UINT16, BASE_DEC, NULL, 0x0, \
1836 "Length of server's Diffie-Hellman public key", HFILL } \
1837 }, \
1838 { & name .hf.hs_client_keyex_yc_len, \
1839 { "Pubkey Length", prefix ".handshake.yc_len", \
1840 FT_UINT16, BASE_DEC, NULL, 0x0, \
1841 "Length of client's Diffie-Hellman public key", HFILL } \
1842 }, \
1843 { & name .hf.hs_client_keyex_point_len, \
1844 { "Pubkey Length", prefix ".handshake.client_point_len", \
1845 FT_UINT8, BASE_DEC, NULL, 0x0, \
1846 "Length of client's EC Diffie-Hellman public key", HFILL } \
1847 }, \
1848 { & name .hf.hs_server_keyex_point_len, \
1849 { "Pubkey Length", prefix ".handshake.server_point_len", \
1850 FT_UINT8, BASE_DEC, NULL, 0x0, \
1851 "Length of server's EC Diffie-Hellman public key", HFILL } \
1852 }, \
1853 { & name .hf.hs_server_keyex_p, \
1854 { "p", prefix ".handshake.p", \
1855 FT_BYTES, BASE_NONE, NULL, 0x0, \
1856 "Diffie-Hellman p", HFILL } \
1857 }, \
1858 { & name .hf.hs_server_keyex_g, \
1859 { "g", prefix ".handshake.g", \
1860 FT_BYTES, BASE_NONE, NULL, 0x0, \
1861 "Diffie-Hellman g", HFILL } \
1862 }, \
1863 { & name .hf.hs_server_keyex_curve_type, \
1864 { "Curve Type", prefix ".handshake.server_curve_type", \
1865 FT_UINT8, BASE_HEX, VALS(ssl_curve_types), 0x0, \
1866 "Server curve_type", HFILL } \
1867 }, \
1868 { & name .hf.hs_server_keyex_named_curve, \
1869 { "Named Curve", prefix ".handshake.server_named_curve", \
1870 FT_UINT16, BASE_HEX, VALS(ssl_extension_curves), 0x0, \
1871 "Server named_curve", HFILL } \
1872 }, \
1873 { & name .hf.hs_server_keyex_ys, \
1874 { "Pubkey", prefix ".handshake.ys", \
1875 FT_BYTES, BASE_NONE, NULL, 0x0, \
1876 "Diffie-Hellman server pubkey", HFILL } \
1877 }, \
1878 { & name .hf.hs_client_keyex_yc, \
1879 { "Pubkey", prefix ".handshake.yc", \
1880 FT_BYTES, BASE_NONE, NULL, 0x0, \
1881 "Diffie-Hellman client pubkey", HFILL } \
1882 }, \
1883 { & name .hf.hs_server_keyex_point, \
1884 { "Pubkey", prefix ".handshake.server_point", \
1885 FT_BYTES, BASE_NONE, NULL, 0x0, \
1886 "EC Diffie-Hellman server pubkey", HFILL } \
1887 }, \
1888 { & name .hf.hs_client_keyex_point, \
1889 { "Pubkey", prefix ".handshake.client_point", \
1890 FT_BYTES, BASE_NONE, NULL, 0x0, \
1891 "EC Diffie-Hellman client pubkey", HFILL } \
1892 }, \
1893 { & name .hf.hs_server_keyex_xs_len, \
1894 { "Pubkey Length", prefix ".handshake.xs_len", \
1895 FT_UINT8, BASE_DEC, NULL, 0x0, \
1896 "Length of EC J-PAKE server public key", HFILL } \
1897 }, \
1898 { & name .hf.hs_client_keyex_xc_len, \
1899 { "Pubkey Length", prefix ".handshake.xc_len", \
1900 FT_UINT8, BASE_DEC, NULL, 0x0, \
1901 "Length of EC J-PAKE client public key", HFILL } \
1902 }, \
1903 { & name .hf.hs_server_keyex_xs, \
1904 { "Pubkey", prefix ".handshake.xs", \
1905 FT_BYTES, BASE_NONE, NULL, 0x0, \
1906 "EC J-PAKE server public key", HFILL } \
1907 }, \
1908 { & name .hf.hs_client_keyex_xc, \
1909 { "Pubkey", prefix ".handshake.xc", \
1910 FT_BYTES, BASE_NONE, NULL, 0x0, \
1911 "EC J-PAKE client public key", HFILL } \
1912 }, \
1913 { & name .hf.hs_server_keyex_vs_len, \
1914 { "Ephemeral Pubkey Length", prefix ".handshake.vs_len", \
1915 FT_UINT8, BASE_DEC, NULL, 0x0, \
1916 "Length of EC J-PAKE server ephemeral public key", HFILL } \
1917 }, \
1918 { & name .hf.hs_client_keyex_vc_len, \
1919 { "Ephemeral Pubkey Length", prefix ".handshake.vc_len", \
1920 FT_UINT8, BASE_DEC, NULL, 0x0, \
1921 "Length of EC J-PAKE client ephemeral public key", HFILL } \
1922 }, \
1923 { & name .hf.hs_server_keyex_vs, \
1924 { "Ephemeral Pubkey", prefix ".handshake.vs", \
1925 FT_BYTES, BASE_NONE, NULL, 0x0, \
1926 "EC J-PAKE server ephemeral public key", HFILL } \
1927 }, \
1928 { & name .hf.hs_client_keyex_vc, \
1929 { "Ephemeral Pubkey", prefix ".handshake.vc", \
1930 FT_BYTES, BASE_NONE, NULL, 0x0, \
1931 "EC J-PAKE client ephemeral public key", HFILL } \
1932 }, \
1933 { & name .hf.hs_server_keyex_rs_len, \
1934 { "Schnorr signature Length", prefix ".handshake.rs_len", \
1935 FT_UINT8, BASE_DEC, NULL, 0x0, \
1936 "Length of EC J-PAKE server Schnorr signature", HFILL } \
1937 }, \
1938 { & name .hf.hs_client_keyex_rc_len, \
1939 { "Schnorr signature Length", prefix ".handshake.rc_len", \
1940 FT_UINT8, BASE_DEC, NULL, 0x0, \
1941 "Length of EC J-PAKE client Schnorr signature", HFILL } \
1942 }, \
1943 { & name .hf.hs_server_keyex_rs, \
1944 { "Schnorr signature", prefix ".handshake.rs", \
1945 FT_BYTES, BASE_NONE, NULL, 0x0, \
1946 "EC J-PAKE server Schnorr signature", HFILL } \
1947 }, \
1948 { & name .hf.hs_client_keyex_rc, \
1949 { "Schnorr signature", prefix ".handshake.rc", \
1950 FT_BYTES, BASE_NONE, NULL, 0x0, \
1951 "EC J-PAKE client Schnorr signature", HFILL } \
1952 }, \
1953 { & name .hf.hs_server_keyex_modulus, \
1954 { "Modulus", prefix ".handshake.modulus", \
1955 FT_BYTES, BASE_NONE, NULL, 0x0, \
1956 "RSA-EXPORT modulus", HFILL } \
1957 }, \
1958 { & name .hf.hs_server_keyex_exponent, \
1959 { "Exponent", prefix ".handshake.exponent", \
1960 FT_BYTES, BASE_NONE, NULL, 0x0, \
1961 "RSA-EXPORT exponent", HFILL } \
1962 }, \
1963 { & name .hf.hs_server_keyex_sig, \
1964 { "Signature", prefix ".handshake.sig", \
1965 FT_BYTES, BASE_NONE, NULL, 0x0, \
1966 "Diffie-Hellman server signature", HFILL } \
1967 }, \
1968 { & name .hf.hs_server_keyex_hint_len, \
1969 { "Hint Length", prefix ".handshake.hint_len", \
1970 FT_UINT16, BASE_DEC, NULL, 0x0, \
1971 "Length of PSK Hint", HFILL } \
1972 }, \
1973 { & name .hf.hs_server_keyex_hint, \
1974 { "Hint", prefix ".handshake.hint", \
1975 FT_BYTES, BASE_NONE, NULL, 0x0, \
1976 "PSK Hint", HFILL } \
1977 }, \
1978 { & name .hf.hs_client_keyex_identity_len, \
1979 { "Identity Length", prefix ".handshake.identity_len", \
1980 FT_UINT16, BASE_DEC, NULL, 0x0, \
1981 "Length of PSK Identity", HFILL } \
1982 }, \
1983 { & name .hf.hs_client_keyex_identity, \
1984 { "Identity", prefix ".handshake.identity", \
1985 FT_BYTES, BASE_NONE, NULL, 0x0, \
1986 "PSK Identity", HFILL } \
1987 }, \
1988 { & name .hf.hs_ext_heartbeat_mode, \
1989 { "Mode", prefix ".handshake.extension.heartbeat.mode", \
1990 FT_UINT8, BASE_DEC, VALS(tls_heartbeat_mode), 0x0, \
1991 "Heartbeat extension mode", HFILL } \
1992 }, \
1993 { & name .hf.hs_certificates_len, \
1994 { "Certificates Length", prefix ".handshake.certificates_length", \
1995 FT_UINT24, BASE_DEC, NULL, 0x0, \
1996 "Length of certificates field", HFILL } \
1997 }, \
1998 { & name .hf.hs_certificates, \
1999 { "Certificates", prefix ".handshake.certificates", \
2000 FT_NONE, BASE_NONE, NULL, 0x0, \
2001 "List of certificates", HFILL } \
2002 }, \
2003 { & name .hf.hs_certificate, \
2004 { "Certificate", prefix ".handshake.certificate", \
2005 FT_BYTES, BASE_NONE, NULL, 0x0, \
2006 NULL, HFILL } \
2007 }, \
2008 { & name .hf.hs_certificate_len, \
2009 { "Certificate Length", prefix ".handshake.certificate_length", \
2010 FT_UINT24, BASE_DEC, NULL, 0x0, \
2011 "Length of certificate", HFILL } \
2012 }, \
2013 { & name .hf.hs_cert_types_count, \
2014 { "Certificate types count", prefix ".handshake.cert_types_count",\
2015 FT_UINT8, BASE_DEC, NULL, 0x0, \
2016 "Count of certificate types", HFILL } \
2017 }, \
2018 { & name .hf.hs_cert_types, \
2019 { "Certificate types", prefix ".handshake.cert_types", \
2020 FT_NONE, BASE_NONE, NULL, 0x0, \
2021 "List of certificate types", HFILL } \
2022 }, \
2023 { & name .hf.hs_cert_type, \
2024 { "Certificate type", prefix ".handshake.cert_type", \
2025 FT_UINT8, BASE_DEC, VALS(ssl_31_client_certificate_type), 0x0, \
2026 NULL, HFILL } \
2027 }, \
2028 { & name .hf.hs_dnames_len, \
2029 { "Distinguished Names Length", prefix ".handshake.dnames_len", \
2030 FT_UINT16, BASE_DEC, NULL, 0x0, \
2031 "Length of list of CAs that server trusts", HFILL } \
2032 }, \
2033 { & name .hf.hs_dnames, \
2034 { "Distinguished Names", prefix ".handshake.dnames", \
2035 FT_NONE, BASE_NONE, NULL, 0x0, \
2036 "List of CAs that server trusts", HFILL } \
2037 }, \
2038 { & name .hf.hs_dname_len, \
2039 { "Distinguished Name Length", prefix ".handshake.dname_len", \
2040 FT_UINT16, BASE_DEC, NULL, 0x0, \
2041 "Length of distinguished name", HFILL } \
2042 }, \
2043 { & name .hf.hs_dnames_truncated, \
2044 { "Tree view truncated", prefix ".handshake.dnames_truncated", \
2045 FT_NONE, BASE_NONE, NULL, 0x00, \
2046 "Some Distinguished Names are not added to tree pane to limit resources", HFILL } \
2047 }, \
2048 { & name .hf.hs_dname, \
2049 { "Distinguished Name", prefix ".handshake.dname", \
2050 FT_NONE, BASE_NONE, NULL, 0x0, \
2051 "Distinguished name of a CA that server trusts", HFILL } \
2052 }, \
2053 { & name .hf.hs_random, \
2054 { "Random", prefix ".handshake.random", \
2055 FT_BYTES, BASE_NONE, NULL, 0x0, \
2056 "Random values used for deriving keys", HFILL } \
2057 }, \
2058 { & name .hf.hs_random_time, \
2059 { "GMT Unix Time", prefix ".handshake.random_time", \
2060 FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0, \
2061 "Unix time field of random structure", HFILL } \
2062 }, \
2063 { & name .hf.hs_random_bytes, \
2064 { "Random Bytes", prefix ".handshake.random_bytes", \
2065 FT_BYTES, BASE_NONE, NULL, 0x0, \
2066 "Random values used for deriving keys", HFILL } \
2067 }, \
2068 { & name .hf.hs_session_id, \
2069 { "Session ID", prefix ".handshake.session_id", \
2070 FT_BYTES, BASE_NONE, NULL, 0x0, \
2071 "Identifies the SSL session, allowing later resumption", HFILL }\
2072 }, \
2073 { & name .hf.hs_session_id_len, \
2074 { "Session ID Length", prefix ".handshake.session_id_length", \
2075 FT_UINT8, BASE_DEC, NULL, 0x0, \
2076 "Length of Session ID field", HFILL } \
2077 }, \
2078 { & name .hf.hs_client_version, \
2079 { "Version", prefix ".handshake.version", \
2080 FT_UINT16, BASE_HEX, VALS(ssl_versions), 0x0, \
2081 "Maximum version supported by client [legacy_version if supported_versions ext is present]", HFILL } \
2082 }, \
2083 { & name .hf.hs_server_version, \
2084 { "Version", prefix ".handshake.version", \
2085 FT_UINT16, BASE_HEX, VALS(ssl_versions), 0x0, \
2086 "Version selected by server [legacy_version if supported_versions ext is present]", HFILL } \
2087 }, \
2088 { & name .hf.hs_cipher_suites_len, \
2089 { "Cipher Suites Length", prefix ".handshake.cipher_suites_length", \
2090 FT_UINT16, BASE_DEC, NULL, 0x0, \
2091 "Length of cipher suites field", HFILL } \
2092 }, \
2093 { & name .hf.hs_cipher_suites, \
2094 { "Cipher Suites", prefix ".handshake.ciphersuites", \
2095 FT_NONE, BASE_NONE, NULL, 0x0, \
2096 "List of cipher suites supported by client", HFILL } \
2097 }, \
2098 { & name .hf.hs_cipher_suite, \
2099 { "Cipher Suite", prefix ".handshake.ciphersuite", \
2100 FT_UINT16, BASE_HEX|BASE_EXT_STRING, &ssl_31_ciphersuite_ext, 0x0, \
2101 NULL, HFILL } \
2102 }, \
2103 { & name .hf.hs_comp_methods_len, \
2104 { "Compression Methods Length", prefix ".handshake.comp_methods_length", \
2105 FT_UINT8, BASE_DEC, NULL, 0x0, \
2106 "Length of compression methods field", HFILL } \
2107 }, \
2108 { & name .hf.hs_comp_methods, \
2109 { "Compression Methods", prefix ".handshake.comp_methods", \
2110 FT_NONE, BASE_NONE, NULL, 0x0, \
2111 "List of compression methods supported by client", HFILL } \
2112 }, \
2113 { & name .hf.hs_comp_method, \
2114 { "Compression Method", prefix ".handshake.comp_method", \
2115 FT_UINT8, BASE_DEC, VALS(ssl_31_compression_method), 0x0, \
2116 NULL, HFILL } \
2117 }, \
2118 { & name .hf.hs_session_ticket_lifetime_hint, \
2119 { "Session Ticket Lifetime Hint", \
2120 prefix ".handshake.session_ticket_lifetime_hint", \
2121 FT_UINT32, BASE_DEC|BASE_UNIT_STRING, UNS(&units_second_seconds), 0x0, \
2122 "New Session Ticket Lifetime Hint", HFILL } \
2123 }, \
2124 { & name .hf.hs_session_ticket_age_add, \
2125 { "Session Ticket Age Add", \
2126 prefix ".handshake.session_ticket_age_add", \
2127 FT_UINT32, BASE_DEC, NULL, 0x0, \
2128 "Random 32-bit value to obscure age of ticket", HFILL } \
2129 }, \
2130 { & name .hf.hs_session_ticket_nonce_len, \
2131 { "Session Ticket Nonce Length", prefix ".handshake.session_ticket_nonce_length", \
2132 FT_UINT8, BASE_DEC, NULL, 0x0, \
2133 NULL, HFILL } \
2134 }, \
2135 { & name .hf.hs_session_ticket_nonce, \
2136 { "Session Ticket Nonce", prefix ".handshake.session_ticket_nonce", \
2137 FT_BYTES, BASE_NONE, NULL, 0x0, \
2138 "A unique per-ticket value", HFILL } \
2139 }, \
2140 { & name .hf.hs_session_ticket_len, \
2141 { "Session Ticket Length", prefix ".handshake.session_ticket_length", \
2142 FT_UINT16, BASE_DEC, NULL, 0x0, \
2143 "New Session Ticket Length", HFILL } \
2144 }, \
2145 { & name .hf.hs_session_ticket, \
2146 { "Session Ticket", prefix ".handshake.session_ticket", \
2147 FT_BYTES, BASE_NONE, NULL, 0x0, \
2148 "New Session Ticket", HFILL } \
2149 }, \
2150 { & name .hf.hs_finished, \
2151 { "Verify Data", prefix ".handshake.verify_data", \
2152 FT_BYTES, BASE_NONE, NULL, 0x0, \
2153 "Opaque verification data", HFILL } \
2154 }, \
2155 { & name .hf.hs_client_cert_vrfy_sig_len, \
2156 { "Signature length", prefix ".handshake.client_cert_vrfy.sig_len", \
2157 FT_UINT16, BASE_DEC, NULL, 0x0, \
2158 "Length of CertificateVerify's signature", HFILL } \
2159 }, \
2160 { & name .hf.hs_client_cert_vrfy_sig, \
2161 { "Signature", prefix ".handshake.client_cert_vrfy.sig", \
2162 FT_BYTES, BASE_NONE, NULL, 0x0, \
2163 "CertificateVerify's signature", HFILL } \
2164 }, \
2165 { & name .hf.hs_ja3_full, \
2166 { "JA3 Fullstring", prefix ".handshake.ja3_full", \
2167 FT_STRING, BASE_NONE, NULL, 0x0, \
2168 NULL, HFILL } \
2169 }, \
2170 { & name .hf.hs_ja3_hash, \
2171 { "JA3", prefix ".handshake.ja3", \
2172 FT_STRING, BASE_NONE, NULL, 0x0, \
2173 NULL, HFILL } \
2174 }, \
2175 { & name .hf.hs_ja3s_full, \
2176 { "JA3S Fullstring", prefix ".handshake.ja3s_full", \
2177 FT_STRING, BASE_NONE, NULL, 0x0, \
2178 NULL, HFILL } \
2179 }, \
2180 { & name .hf.hs_ja3s_hash, \
2181 { "JA3S", prefix ".handshake.ja3s", \
2182 FT_STRING, BASE_NONE, NULL, 0x0, \
2183 NULL, HFILL } \
2184 }, \
2185 { & name .hf.hs_ja4, \
2186 { "JA4", prefix ".handshake.ja4", \
2187 FT_STRING, BASE_NONE, NULL, 0x0, \
2188 NULL, HFILL } \
2189 }, \
2190 { & name .hf.hs_ja4_r, \
2191 { "JA4_r", prefix ".handshake.ja4_r", \
2192 FT_STRING, BASE_NONE, NULL, 0x0, \
2193 NULL, HFILL } \
2194 }, \
2195 { & name .hf.hs_ext_psk_ke_modes_length, \
2196 { "PSK Key Exchange Modes Length", prefix ".extension.psk_ke_modes_length", \
2197 FT_UINT8, BASE_DEC, NULL, 0x0, \
2198 NULL, HFILL } \
2199 }, \
2200 { & name .hf.hs_ext_psk_ke_mode, \
2201 { "PSK Key Exchange Mode", prefix ".extension.psk_ke_mode", \
2202 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_psk_ke_mode), 0x0, \
2203 "Key exchange modes where the client supports use of PSKs", HFILL } \
2204 }, \
2205 { & name .hf.hs_certificate_request_context_length, \
2206 { "Certificate Request Context Length", prefix ".handshake.certificate_request_context_length", \
2207 FT_UINT8, BASE_DEC, NULL, 0x0, \
2208 NULL, HFILL } \
2209 }, \
2210 { & name .hf.hs_certificate_request_context, \
2211 { "Certificate Request Context", prefix ".handshake.certificate_request_context", \
2212 FT_BYTES, BASE_NONE, NULL, 0x0, \
2213 "Value from CertificateRequest or empty for server auth", HFILL } \
2214 }, \
2215 { & name .hf.hs_key_update_request_update, \
2216 { "Key Update Request", prefix ".handshake.key_update.request_update", \
2217 FT_UINT8, BASE_DEC, VALS(tls13_key_update_request), 0x00, \
2218 "Whether the receiver should also update its keys", HFILL } \
2219 }, \
2220 { & name .hf.sct_scts_length, \
2221 { "Serialized SCT List Length", prefix ".sct.scts_length", \
2222 FT_UINT16, BASE_DEC, NULL, 0x00, \
2223 NULL, HFILL } \
2224 }, \
2225 { & name .hf.sct_sct_length, \
2226 { "Serialized SCT Length", prefix ".sct.sct_length", \
2227 FT_UINT16, BASE_DEC, NULL, 0x00, \
2228 NULL, HFILL } \
2229 }, \
2230 { & name .hf.sct_sct_version, \
2231 { "SCT Version", prefix ".sct.sct_version", \
2232 FT_UINT8, BASE_DEC, NULL, 0x00, \
2233 "SCT Protocol version (v1 (0) is defined in RFC 6962)", HFILL } \
2234 }, \
2235 { & name .hf.sct_sct_logid, \
2236 { "Log ID", prefix ".sct.sct_logid", \
2237 FT_BYTES, BASE_NONE, NULL, 0x00, \
2238 "SHA-256 hash of log's public key", HFILL } \
2239 }, \
2240 { & name .hf.sct_sct_timestamp, \
2241 { "Timestamp", prefix ".sct.sct_timestamp", \
2242 FT_ABSOLUTE_TIME, ABSOLUTE_TIME_UTC, NULL, 0x00, \
2243 "Timestamp of issuance", HFILL } \
2244 }, \
2245 { & name .hf.sct_sct_extensions_length, \
2246 { "Extensions length", prefix ".sct.sct_extensions_length", \
2247 FT_UINT16, BASE_DEC, NULL, 0x00, \
2248 "Length of future extensions to this protocol (currently none)", HFILL } \
2249 }, \
2250 { & name .hf.sct_sct_extensions, \
2251 { "Extensions", prefix ".sct.sct_extensions", \
2252 FT_NONE, BASE_NONE, NULL, 0x00, \
2253 "Future extensions to this protocol (currently none)", HFILL } \
2254 }, \
2255 { & name .hf.sct_sct_signature_length, \
2256 { "Signature Length", prefix ".sct.sct_signature_length", \
2257 FT_UINT16, BASE_DEC, NULL, 0x00, \
2258 NULL, HFILL } \
2259 }, \
2260 { & name .hf.sct_sct_signature, \
2261 { "Signature", prefix ".sct.sct_signature", \
2262 FT_BYTES, BASE_NONE, NULL, 0x00, \
2263 NULL, HFILL } \
2264 }, \
2265 { & name .hf.hs_ext_max_early_data_size, \
2266 { "Maximum Early Data Size", prefix ".early_data.max_early_data_size", \
2267 FT_UINT32, BASE_DEC, NULL, 0x00, \
2268 "Maximum amount of 0-RTT data that the client may send", HFILL } \
2269 }, \
2270 { & name .hf.hs_ext_oid_filters_length, \
2271 { "OID Filters Length", prefix ".extension.oid_filters_length", \
2272 FT_UINT16, BASE_DEC, NULL, 0x00, \
2273 NULL, HFILL } \
2274 }, \
2275 { & name .hf.hs_ext_oid_filters_oid_length, \
2276 { "Certificate Extension OID Length", prefix ".extension.oid_filters.oid_length", \
2277 FT_UINT8, BASE_DEC, NULL, 0x00, \
2278 NULL, HFILL } \
2279 }, \
2280 { & name .hf.hs_ext_oid_filters_oid, \
2281 { "Certificate Extension OID", prefix ".extension.oid_filters.oid", \
2282 FT_OID, BASE_NONE, NULL, 0x00, \
2283 NULL, HFILL } \
2284 }, \
2285 { & name .hf.hs_ext_oid_filters_values_length, \
2286 { "Certificate Extension Values Length", prefix ".extension.oid_filters.values_length", \
2287 FT_UINT16, BASE_DEC, NULL, 0x00, \
2288 NULL, HFILL } \
2289 }, \
2290 { & name .hf.hs_cred_valid_time, \
2291 { "Valid Time", prefix ".handshake.cred.valid_time", \
2292 FT_UINT16, BASE_DEC, NULL, 0x0, \
2293 "Delegated Credentials Valid Time", HFILL } \
2294 }, \
2295 { & name .hf.hs_cred_pubkey, \
2296 { "Subject Public Key Info", prefix ".handshake.cred.pubkey", \
2297 FT_BYTES, BASE_NONE, NULL, 0x0, \
2298 "Delegated Credentials Subject Public Key Info", HFILL } \
2299 }, \
2300 { & name .hf.hs_cred_pubkey_len, \
2301 { "Subject Public Key Info Length", prefix ".handshake.cred.pubkey_len", \
2302 FT_UINT24, BASE_DEC, NULL, 0x0, \
2303 "Delegated Credentials Subject Public Key Info Length", HFILL } \
2304 }, \
2305 { & name .hf.hs_cred_signature, \
2306 { "Signature", prefix ".handshake.cred.signature", \
2307 FT_BYTES, BASE_NONE, NULL, 0x0, \
2308 "Delegated Credentials Signature", HFILL } \
2309 }, \
2310 { & name .hf.hs_cred_signature_len, \
2311 { "Signature Length", prefix ".handshake.cred.signature_len", \
2312 FT_UINT16, BASE_DEC, NULL, 0x0, \
2313 "Delegated Credentials Signature Length", HFILL } \
2314 }, \
2315 { & name .hf.hs_ext_compress_certificate_algorithms_length, \
2316 { "Algorithms Length", prefix ".compress_certificate.algorithms_length", \
2317 FT_UINT8, BASE_DEC, NULL, 0x00, \
2318 NULL, HFILL } \
2319 }, \
2320 { & name .hf.hs_ext_compress_certificate_algorithm, \
2321 { "Algorithm", prefix ".compress_certificate.algorithm", \
2322 FT_UINT16, BASE_DEC, VALS(compress_certificate_algorithm_vals), 0x00, \
2323 NULL, HFILL } \
2324 }, \
2325 { & name .hf.hs_ext_compress_certificate_uncompressed_length, \
2326 { "Uncompressed Length", prefix ".compress_certificate.uncompressed_length", \
2327 FT_UINT24, BASE_DEC, NULL, 0x00, \
2328 NULL, HFILL } \
2329 }, \
2330 { & name .hf.hs_ext_compress_certificate_compressed_certificate_message_length, \
2331 { "Length", prefix ".compress_certificate.compressed_certificate_message.length", \
2332 FT_UINT24, BASE_DEC, NULL, 0x00, \
2333 NULL, HFILL } \
2334 }, \
2335 { & name .hf.hs_ext_compress_certificate_compressed_certificate_message, \
2336 { "Compressed Certificate Message", prefix ".compress_certificate.compressed_certificate_message", \
2337 FT_BYTES, BASE_NONE, NULL, 0x00, \
2338 NULL, HFILL } \
2339 }, \
2340 { & name .hf.hs_ext_token_binding_version_major, \
2341 { "Protocol Major Version", prefix ".token_binding.version_major", \
2342 FT_UINT8, BASE_HEX, NULL, 0x00, \
2343 "Major version of the Token Binding protocol", HFILL } \
2344 }, \
2345 { & name .hf.hs_ext_token_binding_version_minor, \
2346 { "Protocol Minor Version", prefix ".token_binding.version_minor", \
2347 FT_UINT8, BASE_HEX, NULL, 0x00, \
2348 "Minor version of the Token Binding protocol", HFILL } \
2349 }, \
2350 { & name .hf.hs_ext_token_binding_key_parameters, \
2351 { "Key Parameters", prefix ".token_binding.key_parameters", \
2352 FT_NONE, BASE_NONE, NULL, 0x0, \
2353 NULL, HFILL } \
2354 }, \
2355 { & name .hf.hs_ext_token_binding_key_parameters_length, \
2356 { "Key Parameters Length", prefix ".token_binding.key_parameters_length", \
2357 FT_UINT8, BASE_DEC, NULL, 0x00, \
2358 "Length of the key parameters list", HFILL } \
2359 }, \
2360 { & name .hf.hs_ext_token_binding_key_parameter, \
2361 { "Key Parameter", prefix ".token_binding.key_parameter", \
2362 FT_UINT8, BASE_DEC, VALS(token_binding_key_parameter_vals), 0x00, \
2363 "Identifier of the Token Binding key parameter", HFILL } \
2364 }, \
2365 { & name .hf.hs_ext_record_size_limit, \
2366 { "Record Size Limit", prefix ".record_size_limit", \
2367 FT_UINT16, BASE_DEC, NULL, 0x00, \
2368 "Maximum record size that an endpoint is willing to receive", HFILL } \
2369 }, \
2370 { & name .hf.hs_ext_quictp_len, \
2371 { "Parameters Length", prefix ".quic.len", \
2372 FT_UINT16, BASE_DEC, NULL, 0x00, \
2373 NULL, HFILL } \
2374 }, \
2375 { & name .hf.hs_ext_quictp_parameter, \
2376 { "Parameter", prefix ".quic.parameter", \
2377 FT_NONE, BASE_NONE, NULL, 0x00, \
2378 NULL, HFILL } \
2379 }, \
2380 { & name .hf.hs_ext_quictp_parameter_type, \
2381 { "Type", prefix ".quic.parameter.type", \
2382 FT_UINT64, BASE_CUSTOM, CF_FUNC(quic_transport_parameter_id_base_custom), 0x00, \
2383 NULL, HFILL } \
2384 }, \
2385 { & name .hf.hs_ext_quictp_parameter_len, \
2386 { "Length", prefix ".quic.parameter.length", \
2387 FT_UINT64, BASE_DEC, NULL, 0x00, \
2388 NULL, HFILL } \
2389 }, \
2390 { & name .hf.hs_ext_quictp_parameter_len_old, \
2391 { "Length", prefix ".quic.parameter.length.old", \
2392 FT_UINT16, BASE_DEC, NULL, 0x00, \
2393 NULL, HFILL } \
2394 }, \
2395 { & name .hf.hs_ext_quictp_parameter_value, \
2396 { "Value", prefix ".quic.parameter.value", \
2397 FT_BYTES, BASE_NONE, NULL, 0x00, \
2398 NULL, HFILL } \
2399 }, \
2400 { & name .hf.hs_ext_quictp_parameter_original_destination_connection_id, \
2401 { "original_destination_connection_id", prefix ".quic.parameter.original_destination_connection_id", \
2402 FT_BYTES, BASE_NONE, NULL, 0x00, \
2403 "Destination Connection ID from the first Initial packet sent by the client", HFILL } \
2404 }, \
2405 { & name .hf.hs_ext_quictp_parameter_max_idle_timeout, \
2406 { "max_idle_timeout", prefix ".quic.parameter.max_idle_timeout", \
2407 FT_UINT64, BASE_DEC, NULL, 0x00, \
2408 "In milliseconds", HFILL } \
2409 }, \
2410 { & name .hf.hs_ext_quictp_parameter_stateless_reset_token, \
2411 { "stateless_reset_token", prefix ".quic.parameter.stateless_reset_token", \
2412 FT_BYTES, BASE_NONE, NULL, 0x00, \
2413 "Used in verifying a stateless reset", HFILL } \
2414 }, \
2415 { & name .hf.hs_ext_quictp_parameter_max_udp_payload_size, \
2416 { "max_udp_payload_size", prefix ".quic.parameter.max_udp_payload_size", \
2417 FT_UINT64, BASE_DEC, NULL, 0x00, \
2418 "Maximum UDP payload size that the endpoint is willing to receive", HFILL } \
2419 }, \
2420 { & name .hf.hs_ext_quictp_parameter_initial_max_data, \
2421 { "initial_max_data", prefix ".quic.parameter.initial_max_data", \
2422 FT_UINT64, BASE_DEC, NULL, 0x00, \
2423 "Contains the initial value for the maximum amount of data that can be sent on the connection", HFILL } \
2424 }, \
2425 { & name .hf.hs_ext_quictp_parameter_initial_max_stream_data_bidi_local, \
2426 { "initial_max_stream_data_bidi_local", prefix ".quic.parameter.initial_max_stream_data_bidi_local", \
2427 FT_UINT64, BASE_DEC, NULL, 0x00, \
2428 "Initial stream maximum data for bidirectional, locally-initiated streams", HFILL } \
2429 }, \
2430 { & name .hf.hs_ext_quictp_parameter_initial_max_stream_data_bidi_remote, \
2431 { "initial_max_stream_data_bidi_remote", prefix ".quic.parameter.initial_max_stream_data_bidi_remote", \
2432 FT_UINT64, BASE_DEC, NULL, 0x00, \
2433 "Initial stream maximum data for bidirectional, peer-initiated streams", HFILL } \
2434 }, \
2435 { & name .hf.hs_ext_quictp_parameter_initial_max_stream_data_uni, \
2436 { "initial_max_stream_data_uni", prefix ".quic.parameter.initial_max_stream_data_uni", \
2437 FT_UINT64, BASE_DEC, NULL, 0x00, \
2438 "Initial stream maximum data for unidirectional streams parameter", HFILL } \
2439 }, \
2440 { & name .hf.hs_ext_quictp_parameter_initial_max_streams_bidi, \
2441 { "initial_max_streams_bidi", prefix ".quic.parameter.initial_max_streams_bidi", \
2442 FT_UINT64, BASE_DEC, NULL, 0x00, \
2443 "Initial maximum number of application-owned bidirectional streams", HFILL } \
2444 }, \
2445 { & name .hf.hs_ext_quictp_parameter_initial_max_streams_uni, \
2446 { "initial_max_streams_uni", prefix ".quic.parameter.initial_max_streams_uni", \
2447 FT_UINT64, BASE_DEC, NULL, 0x00, \
2448 "Initial maximum number of application-owned unidirectional streams", HFILL } \
2449 }, \
2450 { & name .hf.hs_ext_quictp_parameter_ack_delay_exponent, \
2451 { "ack_delay_exponent", prefix ".quic.parameter.ack_delay_exponent", \
2452 FT_UINT64, BASE_DEC, NULL, 0x00, \
2453 "Indicating an exponent used to decode the ACK Delay field in the ACK frame,", HFILL } \
2454 }, \
2455 { & name .hf.hs_ext_quictp_parameter_max_ack_delay, \
2456 { "max_ack_delay", prefix ".quic.parameter.max_ack_delay", \
2457 FT_UINT64, BASE_DEC, NULL, 0x00, \
2458 "Indicating the maximum amount of time in milliseconds by which it will delay sending of acknowledgments", HFILL } \
2459 }, \
2460 { & name .hf.hs_ext_quictp_parameter_pa_ipv4address, \
2461 { "ipv4Address", prefix ".quic.parameter.preferred_address.ipv4address", \
2462 FT_IPv4, BASE_NONE, NULL, 0x00, \
2463 NULL, HFILL } \
2464 }, \
2465 { & name .hf.hs_ext_quictp_parameter_pa_ipv6address, \
2466 { "ipv6Address", prefix ".quic.parameter.preferred_address.ipv6address", \
2467 FT_IPv6, BASE_NONE, NULL, 0x00, \
2468 NULL, HFILL } \
2469 }, \
2470 { & name .hf.hs_ext_quictp_parameter_pa_ipv4port, \
2471 { "ipv4Port", prefix ".quic.parameter.preferred_address.ipv4port", \
2472 FT_UINT16, BASE_DEC, NULL, 0x00, \
2473 NULL, HFILL } \
2474 }, \
2475 { & name .hf.hs_ext_quictp_parameter_pa_ipv6port, \
2476 { "ipv6Port", prefix ".quic.parameter.preferred_address.ipv6port", \
2477 FT_UINT16, BASE_DEC, NULL, 0x00, \
2478 NULL, HFILL } \
2479 }, \
2480 { & name .hf.hs_ext_quictp_parameter_pa_connectionid_length, \
2481 { "Length", prefix ".quic.parameter.preferred_address.connectionid.length", \
2482 FT_UINT8, BASE_DEC, NULL, 0x00, \
2483 "Length of connectionId Field", HFILL } \
2484 }, \
2485 { & name .hf.hs_ext_quictp_parameter_pa_connectionid, \
2486 { "connectionId", prefix ".quic.parameter.preferred_address.connectionid", \
2487 FT_BYTES, BASE_NONE, NULL, 0x00, \
2488 NULL, HFILL } \
2489 }, \
2490 { & name .hf.hs_ext_quictp_parameter_pa_statelessresettoken, \
2491 { "statelessResetToken", prefix ".quic.parameter.preferred_address.statelessresettoken", \
2492 FT_BYTES, BASE_NONE, NULL, 0x00, \
2493 NULL, HFILL } \
2494 }, \
2495 { & name .hf.hs_ext_quictp_parameter_active_connection_id_limit, \
2496 { "Active Connection ID Limit", prefix ".quic.parameter.active_connection_id_limit", \
2497 FT_UINT64, BASE_DEC, NULL, 0x00, \
2498 NULL, HFILL } \
2499 }, \
2500 { & name .hf.hs_ext_quictp_parameter_initial_source_connection_id, \
2501 { "Initial Source Connection ID", prefix ".quic.parameter.initial_source_connection_id", \
2502 FT_BYTES, BASE_NONE, NULL, 0x00, \
2503 NULL, HFILL } \
2504 }, \
2505 { & name .hf.hs_ext_quictp_parameter_retry_source_connection_id, \
2506 { "Retry Source Connection ID", prefix ".quic.parameter.retry_source_connection_id", \
2507 FT_BYTES, BASE_NONE, NULL, 0x00, \
2508 NULL, HFILL } \
2509 }, \
2510 { & name .hf.hs_ext_quictp_parameter_max_datagram_frame_size, \
2511 { "max_datagram_frame_size", prefix ".quic.parameter.max_datagram_frame_size", \
2512 FT_UINT64, BASE_DEC, NULL, 0x00, \
2513 NULL, HFILL } \
2514 }, \
2515 { & name .hf.hs_ext_quictp_parameter_cibir_encoding_length, \
2516 { "length", prefix ".quic.parameter.cibir_encoding.length", \
2517 FT_UINT64, BASE_DEC, NULL, 0x00, \
2518 NULL, HFILL } \
2519 }, \
2520 { & name .hf.hs_ext_quictp_parameter_cibir_encoding_offset, \
2521 { "offset", prefix ".quic.parameter.cibir_encoding.offset", \
2522 FT_UINT64, BASE_DEC, NULL, 0x00, \
2523 NULL, HFILL } \
2524 }, \
2525 { & name .hf.hs_ext_quictp_parameter_loss_bits, \
2526 { "loss_bits", prefix ".quic.parameter.loss_bits", \
2527 FT_UINT64, BASE_DEC, NULL, 0x00, \
2528 NULL, HFILL } \
2529 }, \
2530 { & name .hf.hs_ext_quictp_parameter_address_discovery, \
2531 { "address_discovery", prefix ".quic.parameter.address_discovery", \
2532 FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(quic_address_discovery_vals), 0x00, \
2533 NULL, HFILL } \
2534 }, \
2535 { & name .hf.hs_ext_quictp_parameter_enable_time_stamp_v2, \
2536 { "Enable TimestampV2", prefix ".quic.parameter.enable_time_stamp_v2", \
2537 FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(quic_enable_time_stamp_v2_vals), 0x00, \
2538 NULL, HFILL } \
2539 }, \
2540 { & name .hf.hs_ext_quictp_parameter_min_ack_delay, \
2541 { "min_ack_delay", prefix ".quic.parameter.min_ack_delay", \
2542 FT_UINT64, BASE_DEC, NULL, 0x00, \
2543 NULL, HFILL } \
2544 }, \
2545 { & name .hf.hs_ext_quictp_parameter_google_user_agent_id, \
2546 { "Google UserAgent", prefix ".quic.parameter.google.user_agent", \
2547 FT_STRING, BASE_NONE, NULL, 0x00, \
2548 NULL, HFILL } \
2549 }, \
2550 { & name .hf.hs_ext_quictp_parameter_google_key_update_not_yet_supported, \
2551 { "Google Key Update not yet supported", prefix ".quic.parameter.google.key_update_not_yet_supported", \
2552 FT_NONE, BASE_NONE, NULL, 0x00, \
2553 NULL, HFILL } \
2554 }, \
2555 { & name .hf.hs_ext_quictp_parameter_google_quic_version, \
2556 { "Google QUIC version", prefix ".quic.parameter.google.quic_version", \
2557 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2558 NULL, HFILL } \
2559 }, \
2560 { & name .hf.hs_ext_quictp_parameter_google_initial_rtt, \
2561 { "Google Initial RTT", prefix ".quic.parameter.google.initial_rtt", \
2562 FT_UINT64, BASE_DEC, NULL, 0x00, \
2563 NULL, HFILL } \
2564 }, \
2565 { & name .hf.hs_ext_quictp_parameter_google_support_handshake_done, \
2566 { "Google Support Handshake Done", prefix ".quic.parameter.google.support_handshake_done", \
2567 FT_NONE, BASE_NONE, NULL, 0x00, \
2568 NULL, HFILL } \
2569 }, \
2570 { & name .hf.hs_ext_quictp_parameter_google_quic_params, \
2571 { "Google QUIC parameters", prefix ".quic.parameter.google.quic_params", \
2572 FT_BYTES, BASE_NONE, NULL, 0x00, \
2573 NULL, HFILL } \
2574 }, \
2575 { & name .hf.hs_ext_quictp_parameter_google_quic_params_unknown_field, \
2576 { "Google Unknown Field", prefix ".quic.parameter.google.quic_params_unknown_field", \
2577 FT_BYTES, BASE_NONE, NULL, 0x00, \
2578 NULL, HFILL } \
2579 }, \
2580 { & name .hf.hs_ext_quictp_parameter_google_connection_options, \
2581 { "Google Connection options", prefix ".quic.parameter.google.connection_options", \
2582 FT_BYTES, BASE_NONE, NULL, 0x00, \
2583 NULL, HFILL } \
2584 }, \
2585 { & name .hf.hs_ext_quictp_parameter_google_supported_versions_length, \
2586 { "Google Supported Versions Length", prefix ".quic.parameter.google.supported_versions_length", \
2587 FT_UINT8, BASE_DEC, NULL, 0x00, \
2588 NULL, HFILL } \
2589 }, \
2590 { & name .hf.hs_ext_quictp_parameter_google_supported_version, \
2591 { "Google Supported Version", prefix ".quic.parameter.google.supported_version", \
2592 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2593 NULL, HFILL } \
2594 }, \
2595 { & name .hf.hs_ext_quictp_parameter_facebook_partial_reliability, \
2596 { "Facebook Partial Reliability", prefix ".quic.parameter.facebook.partial_reliability", \
2597 FT_UINT64, BASE_DEC, NULL, 0x00, \
2598 NULL, HFILL } \
2599 }, \
2600 { & name .hf.hs_ext_quictp_parameter_chosen_version, \
2601 { "Chosen Version", prefix ".quic.parameter.vi.chosen_version", \
2602 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2603 NULL, HFILL } \
2604 }, \
2605 { & name .hf.hs_ext_quictp_parameter_other_version, \
2606 { "Other Version", prefix ".quic.parameter.vi.other_version", \
2607 FT_UINT32, BASE_RANGE_STRING | BASE_HEX, RVALS(quic_version_vals), 0x00, \
2608 NULL, HFILL } \
2609 }, \
2610 { & name .hf.hs_ext_quictp_parameter_enable_multipath, \
2611 { "Enable Multipath", prefix ".quic.parameter.enable_multipath", \
2612 FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(quic_enable_multipath_vals), 0x00, \
2613 NULL, HFILL } \
2614 }, \
2615 { & name .hf.hs_ext_quictp_parameter_initial_max_paths, \
2616 { "Initial Max Paths", prefix ".quic.parameter.initial_max_paths", \
2617 FT_UINT64, BASE_DEC, NULL, 0x00, \
2618 NULL, HFILL } \
2619 }, \
2620 { & name .hf.hs_ext_quictp_parameter_initial_max_path_id, \
2621 { "Initial Max Path ID", prefix ".quic.parameter.initial_max_path_id", \
2622 FT_UINT64, BASE_DEC, NULL, 0x00, \
2623 NULL, HFILL } \
2624 }, \
2625 { & name .hf.hs_ext_connection_id_length, \
2626 { "Connection ID length", prefix ".connection_id_length", \
2627 FT_UINT8, BASE_DEC, NULL, 0x00, \
2628 NULL, HFILL } \
2629 }, \
2630 { & name .hf.hs_ext_connection_id, \
2631 { "Connection ID", prefix ".connection_id", \
2632 FT_BYTES, BASE_NONE, NULL, 0x00, \
2633 NULL, HFILL } \
2634 }, \
2635 { & name .hf.hs_ext_trusted_ca_keys_len, \
2636 { "Trusted CA keys length", prefix ".handshake.trusted_ca.keys_length", \
2637 FT_UINT16, BASE_DEC, NULL, 0x00, \
2638 "Length of Trusted CA keys extension", HFILL } \
2639 }, \
2640 { & name .hf.hs_ext_trusted_ca_keys_list, \
2641 { "Trusted CA keys", prefix ".handshake.trusted_ca.keys", \
2642 FT_NONE, BASE_NONE, NULL, 0x00, \
2643 "List of Trusted CA keys", HFILL } \
2644 }, \
2645 { & name .hf.hs_ext_trusted_ca_key, \
2646 { "Trusted CA key", prefix ".handshake.trusted_ca.key", \
2647 FT_NONE, BASE_NONE, NULL, 0x0, \
2648 NULL, HFILL } \
2649 }, \
2650 { & name .hf.hs_ext_trusted_ca_key_type, \
2651 { "Trusted CA key type", prefix ".handshake.trusted_ca.key_type", \
2652 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_trusted_ca_key_type), 0x00, \
2653 "Type of Trusted CA key", HFILL } \
2654 }, \
2655 { & name .hf.hs_ext_trusted_ca_key_hash, \
2656 { "Trusted CA key hash", prefix ".handshake.trusted_ca.key_hash", \
2657 FT_BYTES, BASE_NONE, NULL, 0x00, \
2658 NULL, HFILL } \
2659 }, \
2660 { & name .hf.hs_ext_trusted_ca_key_dname_len, \
2661 { "Distinguished Name Length", prefix ".handshake.trusted_ca.key_dname_len", \
2662 FT_UINT16, BASE_DEC, NULL, 0x0, \
2663 "Length of distinguished name", HFILL } \
2664 }, \
2665 { & name .hf.hs_ext_trusted_ca_key_dname, \
2666 { "Distinguished Name", prefix ".handshake.trusted_ca.key_dname", \
2667 FT_NONE, BASE_NONE, NULL, 0x0, \
2668 "Distinguished name of a CA that the client trusts", HFILL } \
2669 }, \
2670 { & name .hf.esni_suite, \
2671 { "Cipher Suite", prefix ".esni.suite", \
2672 FT_UINT16, BASE_HEX|BASE_EXT_STRING, &ssl_31_ciphersuite_ext, 0x0, \
2673 "Cipher suite used to encrypt the SNI", HFILL } \
2674 }, \
2675 { & name .hf.esni_record_digest_length, \
2676 { "Record Digest Length", prefix ".esni.record_digest_length", \
2677 FT_UINT16, BASE_DEC, NULL, 0x00, \
2678 NULL, HFILL } \
2679 }, \
2680 { & name .hf.esni_record_digest, \
2681 { "Record Digest", prefix ".esni.record_digest", \
2682 FT_BYTES, BASE_NONE, NULL, 0x00, \
2683 "Cryptographic hash of the ESNIKeys from which the ESNI key was obtained", HFILL } \
2684 }, \
2685 { & name .hf.esni_encrypted_sni_length, \
2686 { "Encrypted SNI Length", prefix ".esni.encrypted_sni_length", \
2687 FT_UINT16, BASE_DEC, NULL, 0x00, \
2688 NULL, HFILL } \
2689 }, \
2690 { & name .hf.esni_encrypted_sni, \
2691 { "Encrypted SNI", prefix ".esni.encrypted_sni", \
2692 FT_BYTES, BASE_NONE, NULL, 0x00, \
2693 "The encrypted ClientESNIInner structure", HFILL } \
2694 }, \
2695 { & name .hf.esni_nonce, \
2696 { "Nonce", prefix ".esni.nonce", \
2697 FT_BYTES, BASE_NONE, NULL, 0x00, \
2698 "Contents of ClientESNIInner.nonce", HFILL } \
2699 }, \
2700 { & name .hf.ech_echconfiglist_length, \
2701 { "ECHConfigList length", prefix ".ech.echconfiglist_length", \
2702 FT_UINT16, BASE_DEC, NULL, 0x0, \
2703 "Encrypted ClientHello (ECH) Configurations length", HFILL } \
2704 }, \
2705 { & name .hf.ech_echconfiglist, \
2706 { "ECHConfigList", prefix ".ech.echconfiglist", \
2707 FT_NONE, BASE_NONE, NULL, 0x0, \
2708 "Encrypted ClientHello (ECH) Configurations", HFILL } \
2709 }, \
2710 { & name .hf.ech_echconfig, \
2711 { "ECHConfig", prefix ".ech.echconfig", \
2712 FT_NONE, BASE_NONE, NULL, 0x0, \
2713 "Encrypted ClientHello (ECH) Configuration", HFILL } \
2714 }, \
2715 { & name .hf.ech_echconfig_version, \
2716 { "Version", prefix ".ech.echconfig.version", \
2717 FT_UINT16, BASE_HEX, NULL, 0x0, \
2718 "Encrypted ClientHello: ECHConfig version", HFILL } \
2719 }, \
2720 { & name .hf.ech_echconfig_length, \
2721 { "Length", prefix ".ech.echconfig.length", \
2722 FT_UINT16, BASE_DEC, NULL, 0x0, \
2723 "Encrypted ClientHello: ECHConfig length", HFILL } \
2724 }, \
2725 { & name .hf.ech_echconfigcontents_maximum_name_length, \
2726 { "Maximum Name Length", prefix ".ech.echconfigcontents.maximum_name_length", \
2727 FT_UINT8, BASE_DEC, NULL, 0x0, \
2728 "The longest name of a backend server, if known", HFILL } \
2729 }, \
2730 { & name .hf.ech_echconfigcontents_public_name_length, \
2731 { "Public Name length", prefix ".ech.echconfigcontents.public_name_length", \
2732 FT_UINT8, BASE_DEC, NULL, 0x0, \
2733 "Length of the Public Name field", HFILL } \
2734 }, \
2735 { & name .hf.ech_echconfigcontents_public_name, \
2736 { "Public Name", prefix ".ech.echconfigcontents.public_name", \
2737 FT_STRING, BASE_NONE, NULL, 0x0, \
2738 "The DNS name of the client-facing server, i.e., the entity trusted to update the ECH configuration", HFILL } \
2739 }, \
2740 { & name .hf.ech_echconfigcontents_extensions_length, \
2741 { "Extensions length", prefix ".ech.echconfigcontents.extensions_length", \
2742 FT_UINT16, BASE_DEC, NULL, 0x0, \
2743 "Length of the Extensions field", HFILL } \
2744 }, \
2745 { & name .hf.ech_echconfigcontents_extensions, \
2746 { "Extensions", prefix ".ech.echconfigcontents.extensions", \
2747 FT_BYTES, BASE_NONE, NULL, 0x0, \
2748 "A list of extensions that the client must take into consideration when generating a ClientHello message", HFILL } \
2749 }, \
2750 { & name .hf.ech_hpke_keyconfig, \
2751 { "HPKE Key Config", prefix ".ech.hpke.keyconfig", \
2752 FT_NONE, BASE_NONE, NULL, 0x0, \
2753 "HPKE Key Config", HFILL } \
2754 }, \
2755 { & name .hf.ech_hpke_keyconfig_config_id, \
2756 { "Config Id", prefix ".ech.hpke.keyconfig.config_id", \
2757 FT_UINT8, BASE_DEC, NULL, 0x0, \
2758 "HPKE Config Id", HFILL } \
2759 }, \
2760 { & name .hf.ech_hpke_keyconfig_kem_id, \
2761 { "KEM Id", prefix ".ech.hpke.keyconfig.kem_id", \
2762 FT_UINT16, BASE_DEC, VALS(kem_id_type_vals), 0x0, \
2763 "HPKE KEM Id", HFILL } \
2764 }, \
2765 { & name .hf.ech_hpke_keyconfig_public_key_length, \
2766 { "Public Key length", prefix ".ech.hpke.keyconfig.public_key_length", \
2767 FT_UINT16, BASE_DEC, NULL, 0x0, \
2768 "HPKE Public Key length", HFILL } \
2769 }, \
2770 { & name .hf.ech_hpke_keyconfig_public_key, \
2771 { "Public Key", prefix ".ech.hpke.keyconfig.public_key", \
2772 FT_BYTES, BASE_NONE, NULL, 0x0, \
2773 "HPKE Public Key", HFILL } \
2774 }, \
2775 { & name .hf.ech_hpke_keyconfig_cipher_suites, \
2776 { "Cipher Suites", prefix ".ech.hpke.keyconfig.cipher_suites", \
2777 FT_NONE, BASE_NONE, NULL, 0x0, \
2778 "HPKE Cipher Suites", HFILL } \
2779 }, \
2780 { & name .hf.ech_hpke_keyconfig_cipher_suites_length, \
2781 { "Cipher Suites length", prefix ".ech.hpke.keyconfig.cipher_suites_length", \
2782 FT_UINT16, BASE_DEC, NULL, 0x0, \
2783 "HPKE Cipher Suites length", HFILL } \
2784 }, \
2785 { & name .hf.ech_hpke_keyconfig_cipher_suite, \
2786 { "Cipher Suite", prefix ".ech.hpke.keyconfig.cipher_suite", \
2787 FT_NONE, BASE_NONE, NULL, 0x0, \
2788 "HPKE Cipher Suite", HFILL } \
2789 }, \
2790 { & name .hf.ech_hpke_keyconfig_cipher_suite_kdf_id, \
2791 { "KDF Id", prefix ".ech.hpke.keyconfig.cipher_suite.kdf_id", \
2792 FT_UINT16, BASE_DEC, VALS(kdf_id_type_vals), 0x0, \
2793 "HPKE KDF Id", HFILL } \
2794 }, \
2795 { & name .hf.ech_hpke_keyconfig_cipher_suite_aead_id, \
2796 { "AEAD Id", prefix ".ech.hpke.keyconfig.cipher_suite.aead_id", \
2797 FT_UINT16, BASE_DEC, VALS(aead_id_type_vals), 0x0, \
2798 "HPKE AEAD Id", HFILL } \
2799 }, \
2800 { & name .hf.ech_clienthello_type, \
2801 { "Client Hello type", prefix ".ech.client_hello_type", \
2802 FT_UINT8, BASE_DEC, VALS(tls_hello_ext_ech_clienthello_types), 0x0, \
2803 "Client Hello type", HFILL } \
2804 }, \
2805 { & name .hf.ech_cipher_suite, \
2806 { "Cipher Suite", prefix ".ech.cipher_suite", \
2807 FT_NONE, BASE_NONE, NULL, 0x0, \
2808 "The cipher suite used to encrypt ClientHelloInner", HFILL } \
2809 }, \
2810 { & name .hf.ech_config_id, \
2811 { "Config Id", prefix ".ech.config_id", \
2812 FT_UINT8, BASE_DEC, NULL, 0x0, \
2813 "The ECHConfigContents.key_config.config_id for the chosen ECHConfig", HFILL } \
2814 }, \
2815 { & name .hf.ech_enc_length, \
2816 { "Enc length", prefix ".ech.enc_length", \
2817 FT_UINT16, BASE_DEC, NULL, 0x0, \
2818 NULL, HFILL } \
2819 }, \
2820 { & name .hf.ech_enc, \
2821 { "Enc", prefix ".ech.enc", \
2822 FT_BYTES, BASE_NONE, NULL, 0x0, \
2823 "The HPKE encapsulated key, used by servers to decrypt the corresponding payload field", HFILL } \
2824 }, \
2825 { & name .hf.ech_payload_length, \
2826 { "Payload length", prefix ".ech.payload_length", \
2827 FT_UINT16, BASE_DEC, NULL, 0x0, \
2828 "Payload Length", HFILL } \
2829 }, \
2830 { & name .hf.ech_payload, \
2831 { "Payload", prefix ".ech.payload", \
2832 FT_BYTES, BASE_NONE, NULL, 0x0, \
2833 "The serialized and encrypted ClientHelloInner structure", HFILL } \
2834 }, \
2835 { & name .hf.ech_confirmation, \
2836 { "Confirmation", prefix ".ech.confirmation", \
2837 FT_BYTES, BASE_NONE, NULL, 0x0, \
2838 "Confirmation of ECH acceptance in a HelloRetryRequest", HFILL } \
2839 }, \
2840 { & name .hf.ech_retry_configs, \
2841 { "Retry Configs", prefix ".ech.retry_configs", \
2842 FT_NONE, BASE_NONE, NULL, 0x0, \
2843 "ECHConfig structures for one-time use by the client in a retry connection", HFILL } \
2844 }, \
2845 { & name .hf.ech_padding_data, \
2846 { "ECH Encrypted Padding", prefix ".ech.encrypted_padding", \
2847 FT_BYTES, BASE_NONE, NULL, 0x0, \
2848 "Must be zero", HFILL } \
2849 }, \
2850 { & name .hf.hs_ext_alps_len, \
2851 { "ALPS Extension Length", prefix ".handshake.extensions_alps_len", \
2852 FT_UINT16, BASE_DEC, NULL, 0x0, \
2853 "Length of the ALPS Extension", HFILL } \
2854 }, \
2855 { & name .hf.hs_ext_alps_alpn_list, \
2856 { "Supported ALPN List", prefix ".handshake.extensions_alps_alpn_list", \
2857 FT_NONE, BASE_NONE, NULL, 0x0, \
2858 "List of supported ALPN by ALPS", HFILL } \
2859 }, \
2860 { & name .hf.hs_ext_alps_alpn_str_len, \
2861 { "Supported ALPN Length", prefix ".handshake.extensions_alps_alpn_str_len", \
2862 FT_UINT8, BASE_DEC, NULL, 0x0, \
2863 "Length of ALPN string", HFILL } \
2864 }, \
2865 { & name .hf.hs_ext_alps_alpn_str, \
2866 { "Supported ALPN", prefix ".handshake.extensions_alps_alpn_str", \
2867 FT_STRING, BASE_NONE, NULL, 0x00, \
2868 "ALPN supported by ALPS", HFILL } \
2869 }, \
2870 { & name .hf.hs_ext_alps_settings, \
2871 { "ALPN Opaque Settings", prefix ".handshake.extensions_alps.settings", \
2872 FT_BYTES, BASE_NONE, NULL, 0x00, \
2873 "ALPN Opaque Settings", HFILL } \
2874 }
2875/* }}} */
2876
2877/* {{{ */
2878#define SSL_COMMON_ETT_LIST(name) \
2879 & name .ett.hs_ext, \
2880 & name .ett.hs_ext_alpn, \
2881 & name .ett.hs_ext_cert_types, \
2882 & name .ett.hs_ext_groups, \
2883 & name .ett.hs_ext_curves_point_formats, \
2884 & name .ett.hs_ext_npn, \
2885 & name .ett.hs_ext_reneg_info, \
2886 & name .ett.hs_ext_key_share, \
2887 & name .ett.hs_ext_key_share_ks, \
2888 & name .ett.hs_ext_pre_shared_key, \
2889 & name .ett.hs_ext_psk_identity, \
2890 & name .ett.hs_ext_psk_binders, \
2891 & name .ett.hs_ext_psk_binder, \
2892 & name .ett.hs_ext_server_name, \
2893 & name .ett.hs_ext_oid_filter, \
2894 & name .ett.hs_ext_quictp_parameter, \
2895 & name .ett.hs_ext_trusted_ca_keys, \
2896 & name .ett.hs_ext_trusted_ca_key, \
2897 & name .ett.hs_sig_hash_alg, \
2898 & name .ett.hs_sig_hash_algs, \
2899 & name .ett.urlhash, \
2900 & name .ett.keyex_params, \
2901 & name .ett.certificates, \
2902 & name .ett.cert_types, \
2903 & name .ett.dnames, \
2904 & name .ett.hs_random, \
2905 & name .ett.cipher_suites, \
2906 & name .ett.comp_methods, \
2907 & name .ett.session_ticket, \
2908 & name .ett.sct, \
2909 & name .ett.cert_status, \
2910 & name .ett.ocsp_response, \
2911 & name .ett.uncompressed_certificates, \
2912 & name .ett.hs_ext_alps, \
2913 & name .ett.ech_echconfiglist, \
2914 & name .ett.ech_echconfig, \
2915 & name .ett.ech_retry_configs, \
2916 & name .ett.ech_hpke_keyconfig, \
2917 & name .ett.ech_hpke_cipher_suites, \
2918 & name .ett.ech_hpke_cipher_suite, \
2919 & name .ett.ech_decrypt, \
2920 & name .ett.hs_ext_token_binding_key_parameters, \
2921
2922/* }}} */
2923
2924/* {{{ */
2925#define SSL_COMMON_EI_LIST(name, prefix) \
2926 { & name .ei.client_version_error, \
2927 { prefix ".handshake.client_version_error", PI_PROTOCOL, PI_WARN, \
2928 "Client Hello legacy version field specifies version 1.3, not version 1.2; some servers may not be able to handle that.", EXPFILL } \
2929 }, \
2930 { & name .ei.server_version_error, \
2931 { prefix ".handshake.server_version_error", PI_PROTOCOL, PI_WARN, \
2932 "Server Hello legacy version field specifies version 1.3, not version 1.2; some middleboxes may not be able to handle that.", EXPFILL } \
2933 }, \
2934 { & name .ei.legacy_version, \
2935 { prefix ".handshake.legacy_version", PI_DEPRECATED, PI_CHAT, \
2936 "This legacy_version field MUST be ignored. The supported_versions extension is present and MUST be used instead.", EXPFILL } \
2937 }, \
2938 { & name .ei.malformed_vector_length, \
2939 { prefix ".malformed.vector_length", PI_PROTOCOL, PI_WARN, \
2940 "Variable vector length is outside the permitted range", EXPFILL } \
2941 }, \
2942 { & name .ei.malformed_buffer_too_small, \
2943 { prefix ".malformed.buffer_too_small", PI_MALFORMED, PI_ERROR, \
2944 "Malformed message, not enough data is available", EXPFILL } \
2945 }, \
2946 { & name .ei.malformed_trailing_data, \
2947 { prefix ".malformed.trailing_data", PI_PROTOCOL, PI_WARN, \
2948 "Undecoded trailing data is present", EXPFILL } \
2949 }, \
2950 { & name .ei.hs_ext_cert_status_undecoded, \
2951 { prefix ".handshake.status_request.undecoded", PI_UNDECODED, PI_NOTE, \
2952 "Responder ID list or Request Extensions are not implemented, contact Wireshark developers if you want this to be supported", EXPFILL } \
2953 }, \
2954 { & name .ei.hs_ciphersuite_undecoded, \
2955 { prefix ".handshake.ciphersuite.undecoded", PI_UNDECODED, PI_NOTE, \
2956 "Ciphersuite not implemented, contact Wireshark developers if you want this to be supported", EXPFILL } \
2957 }, \
2958 { & name .ei.hs_srv_keyex_illegal, \
2959 { prefix ".handshake.server_keyex_illegal", PI_PROTOCOL, PI_WARN, \
2960 "It is not legal to send the ServerKeyExchange message for this ciphersuite", EXPFILL } \
2961 }, \
2962 { & name .ei.resumed, \
2963 { prefix ".resumed", PI_SEQUENCE, PI_NOTE, \
2964 "This session reuses previously negotiated keys (Session resumption)", EXPFILL } \
2965 }, \
2966 { & name .ei.record_length_invalid, \
2967 { prefix ".record.length.invalid", PI_PROTOCOL, PI_ERROR, \
2968 "Record fragment length is too small or too large", EXPFILL } \
2969 }, \
2970 { & name .ei.decompression_error, \
2971 { prefix ".decompression_error", PI_PROTOCOL, PI_ERROR, \
2972 "Decompression error", EXPFILL } \
2973 }, \
2974 { & name .ei.ech_echconfig_invalid_version, \
2975 { prefix ".ech_echconfig_invalid_version", PI_PROTOCOL, PI_ERROR, \
2976 "Invalid/unknown ECHConfig version", EXPFILL } \
2977 }, \
2978 { & name .ei.ech_accepted, \
2979 { prefix ".ech_accepted", PI_PROTOCOL, PI_NOTE, \
2980 "Calculated ECH Confirmation matches Server Random bytes, ECH was accepted", EXPFILL } \
2981 }, \
2982 { & name .ei.ech_rejected, \
2983 { prefix ".ech_rejected", PI_PROTOCOL, PI_WARN, \
2984 "Calculated ECH Confirmation does not match Server Random bytes, ECH was rejected", EXPFILL } \
2985 }
2986/* }}} */
2987
2988extern void
2989ssl_common_register_ssl_alpn_dissector_table(const char *name,
2990 const char *ui_name, const int proto);
2991
2992extern void
2993ssl_common_register_dtls_alpn_dissector_table(const char *name,
2994 const char *ui_name, const int proto);
2995
2996extern void
2997ssl_common_register_options(module_t *module, ssl_common_options_t *options, bool is_dtls);
2998
2999#ifdef SSL_DECRYPT_DEBUG
3000extern void
3001ssl_debug_printf(const char* fmt,...) G_GNUC_PRINTF(1,2);
3002extern void
3003ssl_print_data(const char* name, const unsigned char* data, size_t len);
3004extern void
3005ssl_print_string(const char* name, const StringInfo* data);
3006extern void
3007ssl_set_debug(const char* name);
3008extern void
3009ssl_debug_flush(void);
3010#else
3011
3012/* No debug: nullify debug operation*/
3013static inline void G_GNUC_PRINTF(1,2)
3014ssl_debug_printf(const char* fmt _U_,...)
3015{
3016}
3017#define ssl_print_data(a, b, c)
3018#define ssl_print_string(a, b)
3019#define ssl_set_debug(name)
3020#define ssl_debug_flush()
3021
3022#endif /* SSL_DECRYPT_DEBUG */
3023
3024
3025uint32_t
3026ssl_dissect_ext_ech_echconfiglist(ssl_common_dissect_t *hf, tvbuff_t *tvb, packet_info *pinfo,
3027 proto_tree *tree, uint32_t offset, uint32_t offset_end);
3028
3029#endif /* __PACKET_TLS_UTILS_H__ */
3030
3031/*
3032 * Editor modelines - https://www.wireshark.org/tools/modelines.html
3033 *
3034 * Local variables:
3035 * c-basic-offset: 4
3036 * tab-width: 8
3037 * indent-tabs-mode: nil
3038 * End:
3039 *
3040 * vi: set shiftwidth=4 tabstop=8 expandtab:
3041 * :indentSize=4:tabSize=8:noTabs=true:
3042 */
Definition packet-tls-utils.h:344
Definition packet-tls-utils.h:360
StringInfo dtls13_aad
Definition packet-tls-utils.h:371
StringInfo app_traffic_secret
Definition packet-tls-utils.h:374
uint64_t seq
Definition packet-tls-utils.h:370
Definition packet-tls-utils.c:2835
Definition packet-tls-utils.h:534
Definition packet-tls-utils.h:352
Definition packet-tls-utils.h:436
SslFlow * flow
Definition packet-tls-utils.h:442
uint64_t record_seq
Definition packet-tls-utils.h:444
unsigned data_len
Definition packet-tls-utils.h:438
uint32_t seq
Definition packet-tls-utils.h:445
int id
Definition packet-tls-utils.h:439
ContentType type
Definition packet-tls-utils.h:441
unsigned char * plain_data
Definition packet-tls-utils.h:437
Definition packet-tls-utils.h:472
Definition packet-tls-utils.h:269
Definition packet-tls-utils.h:453
unsigned reassembly_id
Definition packet-tls-utils.h:456
uint8_t type
Definition packet-tls-utils.h:458
int is_last
Definition packet-tls-utils.h:459
uint32_t offset
Definition packet-tls-utils.h:457
unsigned record_id
Definition packet-tls-utils.h:454
Definition address.h:58
Definition packet_info.h:43
Definition proto.h:907
Definition value_string.h:279
Definition packet-tls-utils.h:576
Definition value_string.h:125
Definition value_string.h:162
Definition value_string.h:27
Definition wmem_allocator.h:27
Definition wmem_list.c:23
Definition wmem_strbuf.h:39
Definition wmem_tree-int.h:48
Definition packet-tls-utils.h:431
Definition packet-tls-utils.h:463
Definition packet-tls-utils.h:570
Definition conversation.h:230
Definition packet.c:837
Definition packet.c:97
Definition packet-tls-utils.h:1249
Definition epan_dissect.h:28
Definition expert.h:39
Definition packet-tls-utils.h:1264
Definition prefs-int.h:27
Definition packet-tls-utils.h:872
Definition packet-tls-utils.h:584
Definition packet-tls-utils.h:1257
Definition packet-tls-utils.h:590
Definition stream.c:41
Definition tvbuff-int.h:35
tap_packet_status
Definition tap.h:25