forked from osmocom/wireshark
From Robin Seggelmann: Add support for the New Session Ticket
message according to RFC 5077. svn path=/trunk/; revision=41427
This commit is contained in:
parent
281f48f7e1
commit
9765ee1bea
|
@ -1168,6 +1168,7 @@ dissect_dtls_handshake(tvbuff_t *tvb, packet_info *pinfo,
|
|||
case SSL_HND_HELLO_REQUEST:
|
||||
case SSL_HND_CLIENT_HELLO:
|
||||
case SSL_HND_HELLO_VERIFY_REQUEST:
|
||||
case SSL_HND_NEWSESSION_TICKET:
|
||||
case SSL_HND_SERVER_HELLO:
|
||||
case SSL_HND_CERTIFICATE:
|
||||
case SSL_HND_SERVER_KEY_EXCHG:
|
||||
|
@ -1315,6 +1316,10 @@ dissect_dtls_handshake(tvbuff_t *tvb, packet_info *pinfo,
|
|||
dissect_dtls_hnd_hello_verify_request(sub_tvb, ssl_hand_tree, 0, ssl);
|
||||
break;
|
||||
|
||||
case SSL_HND_NEWSESSION_TICKET:
|
||||
/* Content depends on implementation, so nothing to do! */
|
||||
break;
|
||||
|
||||
case SSL_HND_SERVER_HELLO:
|
||||
dissect_dtls_hnd_srv_hello(sub_tvb, ssl_hand_tree, 0, length, ssl);
|
||||
break;
|
||||
|
@ -2129,6 +2134,7 @@ dtls_is_valid_handshake_type(guint8 type)
|
|||
case SSL_HND_CLIENT_HELLO:
|
||||
case SSL_HND_SERVER_HELLO:
|
||||
case SSL_HND_HELLO_VERIFY_REQUEST:
|
||||
case SSL_HND_NEWSESSION_TICKET:
|
||||
case SSL_HND_CERTIFICATE:
|
||||
case SSL_HND_SERVER_KEY_EXCHG:
|
||||
case SSL_HND_CERT_REQUEST:
|
||||
|
|
|
@ -474,6 +474,7 @@ const value_string ssl_31_handshake_type[] = {
|
|||
{ SSL_HND_CLIENT_HELLO, "Client Hello" },
|
||||
{ SSL_HND_SERVER_HELLO, "Server Hello" },
|
||||
{ SSL_HND_HELLO_VERIFY_REQUEST, "Hello Verify Request"},
|
||||
{ SSL_HND_NEWSESSION_TICKET, "New Session Ticket" },
|
||||
{ SSL_HND_CERTIFICATE, "Certificate" },
|
||||
{ SSL_HND_SERVER_KEY_EXCHG, "Server Key Exchange" },
|
||||
{ SSL_HND_CERT_REQUEST, "Certificate Request" },
|
||||
|
|
|
@ -77,6 +77,7 @@
|
|||
#define SSL_HND_CLIENT_HELLO 1
|
||||
#define SSL_HND_SERVER_HELLO 2
|
||||
#define SSL_HND_HELLO_VERIFY_REQUEST 3
|
||||
#define SSL_HND_NEWSESSION_TICKET 4
|
||||
#define SSL_HND_CERTIFICATE 11
|
||||
#define SSL_HND_SERVER_KEY_EXCHG 12
|
||||
#define SSL_HND_CERT_REQUEST 13
|
||||
|
|
|
@ -1945,6 +1945,10 @@ dissect_ssl3_handshake(tvbuff_t *tvb, packet_info *pinfo,
|
|||
dissect_ssl3_hnd_srv_hello(tvb, ssl_hand_tree, offset, length, ssl);
|
||||
break;
|
||||
|
||||
case SSL_HND_NEWSESSION_TICKET:
|
||||
/* Content depends on implementation, so nothing to do! */
|
||||
break;
|
||||
|
||||
case SSL_HND_CERTIFICATE:
|
||||
dissect_ssl3_hnd_cert(tvb, ssl_hand_tree, offset, pinfo);
|
||||
break;
|
||||
|
@ -4446,6 +4450,7 @@ ssl_is_valid_handshake_type(const guint8 type)
|
|||
case SSL_HND_HELLO_REQUEST:
|
||||
case SSL_HND_CLIENT_HELLO:
|
||||
case SSL_HND_SERVER_HELLO:
|
||||
case SSL_HND_NEWSESSION_TICKET:
|
||||
case SSL_HND_CERTIFICATE:
|
||||
case SSL_HND_SERVER_KEY_EXCHG:
|
||||
case SSL_HND_CERT_REQUEST:
|
||||
|
|
Loading…
Reference in New Issue