summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-tls.h
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-tls.h
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-tls.h')
-rw-r--r--epan/dissectors/packet-tls.h62
1 files changed, 62 insertions, 0 deletions
diff --git a/epan/dissectors/packet-tls.h b/epan/dissectors/packet-tls.h
new file mode 100644
index 0000000..e92df38
--- /dev/null
+++ b/epan/dissectors/packet-tls.h
@@ -0,0 +1,62 @@
+/* packet-tls.h
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#ifndef __PACKET_TLS_H__
+#define __PACKET_TLS_H__
+
+#include "ws_symbol_export.h"
+#include <epan/packet.h>
+
+struct tlsinfo {
+ guint32 seq; /* The sequence number within the TLS stream. */
+ gboolean is_reassembled;
+ gboolean end_of_stream; /* TCP FIN, close_notify, etc. */
+ /* The app handle for the session, set by heuristic dissectors
+ * to be called in the future. */
+ dissector_handle_t *app_handle;
+};
+
+WS_DLL_PUBLIC void ssl_dissector_add(guint port, dissector_handle_t handle);
+WS_DLL_PUBLIC void ssl_dissector_delete(guint port, dissector_handle_t handle);
+
+WS_DLL_PUBLIC void ssl_set_master_secret(guint32 frame_num, address *addr_srv, address *addr_cli,
+ port_type ptype, guint32 port_srv, guint32 port_cli,
+ guint32 version, gint cipher, const guchar *_master_secret,
+ const guchar *_client_random, const guchar *_server_random,
+ guint32 client_seq, guint32 server_seq);
+/**
+ * Retrieves Libgcrypt identifiers for the current TLS cipher. Only valid after
+ * the Server Hello has been processed and if the current conversation has TLS.
+ * Alternatively, this conversation lookup can be skipped if the current cipher
+ * ('cipher_suite') is provided (non-zero).
+ */
+extern gboolean
+tls_get_cipher_info(packet_info *pinfo, guint16 cipher_suite, int *cipher_algo, int *cipher_mode, int *hash_algo);
+
+/**
+ * Computes the TLS 1.3 "TLS-Exporter(label, context_value, key_length)" value.
+ * On success, the secret is in "out" (free with "wmem_free(NULL, out)").
+ */
+gboolean
+tls13_exporter(packet_info *pinfo, gboolean is_early,
+ const char *label, guint8 *context,
+ guint context_length, guint key_length, guchar **out);
+
+gint
+tls13_get_quic_secret(packet_info *pinfo, gboolean is_from_server, int type, guint secret_min_len, guint secret_max_len, guint8 *secret_out);
+
+/**
+ * Returns the application-layer protocol name (ALPN) for the current TLS
+ * session, or NULL if unavailable.
+ */
+const char *
+tls_get_alpn(packet_info *pinfo);
+
+#endif /* __PACKET_TLS_H__ */