Commit graph

360 commits

Author SHA1 Message Date
Mathew Marcus
83627b7c8f Revert "moved struct ssl_decoder_ definition into header file because we need it in ssl.enums.c"
This reverts commit 193c600108.
2018-06-20 10:28:35 -05:00
mathewmarcus
193c600108 moved struct ssl_decoder_ definition into header file because we need it in ssl.enums.c 2018-06-20 09:11:42 -05:00
mathewmarcus
a066b61dfe added handler for extended master secret extension 2018-06-20 09:06:09 -05:00
mathewmarcus
919684d5ae rename functions 2018-06-20 08:27:53 -05:00
Mathew Marcus
1086c102d6 record handshake messages for session hash 2018-06-19 23:32:11 -05:00
mathewmarcus
157a906228 include extensions in output 2018-06-19 17:36:49 -05:00
430d57af39
Merge pull request #15 from Whissi/update-ciphers
Update ciphers
2018-01-14 15:41:28 +01:00
Thomas Deutschmann
f5a73a61bc
Adjust cipher suite formation 2018-01-02 17:36:13 +01:00
Thomas Deutschmann
76cbb5cd15
Add TLS 1.3 cipher suites 2018-01-02 17:36:13 +01:00
Thomas Deutschmann
b1b339ff0f
Add fallback signaling cipher suite 2018-01-02 17:36:13 +01:00
Thomas Deutschmann
17a84809c9
Add CHACHA20_POLY1305 cipher suite 2018-01-02 17:36:06 +01:00
af19c316ca Merge pull request #14 from davidkretch/fix-typo
Fix a typo in the man page
2017-10-26 08:19:43 +02:00
David Kretch
959a2c53a3 Fix a typo in the man page
Delete the extra "to" in "To decrypt traffic to to host" under the examples section.
2017-10-25 20:44:34 -04:00
f7585c4bee Merge pull request #13 from alperakcan/master
fix ssl record queue data read
2017-06-12 14:05:19 +02:00
Alper Akcan
e6cd50ed6c - fix mis calculation of read_left if queue already has some data, which might not be bigger than ssl_header_size
- update q->ptr only if q->data is changed
2017-06-10 16:16:34 +03:00
Alper Akcan
2c602e876a Merge pull request #1 from adulau/master
Merge pull request #12 from alperakcan/master
2017-06-10 16:07:33 +03:00
f96ec877dd Merge pull request #12 from alperakcan/master
Fix packet length calculation if IP length is 0, due to TSO
2017-05-29 14:57:49 +02:00
Alper Akcan
d18d2fce01 Fix packet length calculation if IP length is 0, due to TSO 2017-05-29 15:54:19 +03:00
a875af0611 Typo fixed 2016-11-20 11:28:57 +01:00
94e2dd4adb Explanation added in a new README 2016-11-20 11:26:24 +01:00
4529d03a50 Merge pull request #9 from PequalsNP-team/master
updated configure for new libpcap location on most linux distro
2016-07-26 09:29:21 +02:00
thez3ro
a27e6028c7 updated configure for new libpcap location on most linux distro 2015-11-23 20:06:38 +01:00
4dcaf2054c Merge pull request #7 from knowtoto/master
Fix a null pointer dereference bug
2015-09-09 14:47:41 +02:00
hyunkyu.oh
66673e4407 Fix a null pointer dereference bug of tls12_prf be caused by invalid extern declaration for digests variable. 2015-09-09 17:20:49 +09:00
d4ce6d1ff7 Merge pull request #5 from wllm-rbnt/master
More code cleaning
2015-05-18 21:54:31 +02:00
William Robinet
e49030e3b4 Include string.h (remove warnings about memcpy) 2015-05-18 16:07:18 +02:00
William Robinet
2e0d67c172 Fix order of arguments in calls to calloc 2015-05-18 15:40:22 +02:00
William Robinet
e82f01e3fb "Each invocation of va_start() must be matched by a corresponding invocation of va_end()" 2015-05-13 16:11:06 +02:00
William Robinet
d1b3a2ac07 Remove dead code 2015-05-13 16:07:22 +02:00
William Robinet
03d490159c Do not use uninitialized variable 2015-05-13 15:47:08 +02:00
William Robinet
ca50396186 Make valgrind/memcheck happy 2015-05-13 09:45:11 +02:00
William Robinet
cf9c055c62 Add missing comma (introduced by 2d067c2650) 2015-05-13 09:40:52 +02:00
2c7500b968 Merge pull request #4 from wllm-rbnt/master
Fix cleanup loop
2015-04-28 08:24:54 +02:00
William Robinet
d87056ac76 Avoid auto-vivisection during connection clean-up ... 2015-04-27 22:43:47 +02:00
William Robinet
d5dc74824d Fix inactive connection removal 2015-04-27 14:37:44 +02:00
0c177776c2 Merge pull request #3 from wllm-rbnt/master
[bugfix] Initialize initial reference timeval
2015-04-27 08:01:42 +02:00
William Robinet
05fe4a619c Initialize initial reference timeval
Avoids wrong cleaning of first connection(s)
2015-04-23 11:29:42 +02:00
f195ab149a Merge pull request #2 from wllm-rbnt/master
Fixes for 2 memory leaks and in flight structure cleaning
2015-04-22 13:42:03 +02:00
William Robinet
3ca46766e4 Fix memory leak if SSL session id is not present 2015-04-22 11:32:42 +02:00
William Robinet
4310c3f117 In flight connection pool cleaning 2015-04-22 11:23:37 +02:00
William Robinet
68255f5e9d Fix memory leak at connection closing 2015-04-17 10:59:26 +02:00
ad0961874e Merge pull request #1 from wllm-rbnt/csloop
Fix for infinite loop in Ciphers Suite decoding
2015-03-31 23:04:28 +02:00
William Robinet
082cc7afed Fix for infinite loop in Ciphers Suite decoding 2015-03-25 14:52:31 +01:00
2c9003f0cf dtable bug fixed: list overrun (from NetBSD tree) 2015-02-14 14:50:39 +01:00
ac8ca39406 Memory leak per TLS session removed. Call cleanup after each finalization. 2015-02-14 14:41:12 +01:00
326e7a3eab Free also the packet structure 2015-02-14 14:31:35 +01:00
58bd5e795f Snaplen increased to the default jumbo frame size
If the snaplen is lower than the total frame length announced,
ssldump won't be able to reassemble the payload. "Length mismatch"
error. Tested on Ethernet uplinks supporting jumbo frame.
2015-02-01 13:57:03 +01:00
3d17d67ea0 Continue even if no IP address is assigned on the interface
ssldump in a production environment can be used on a capture
interface where no IP addresses are assigned. Print a warning instead
of exiting.
2015-02-01 13:31:01 +01:00
388814dd45 Modern config.guess/sub from Ubuntu ssldump package 2015-01-31 10:27:51 +01:00
3ae72cda17 ssldump-0.9-ciphersuites.patch 2015-01-31 10:19:02 +01:00