diff options
author | Luca Deri <deri@ntop.org> | 2019-06-16 16:05:13 +0200 |
---|---|---|
committer | Luca Deri <deri@ntop.org> | 2019-06-16 16:05:13 +0200 |
commit | 1a3f2b3f0d16a0fad74a01bac5c0258fe005043f (patch) | |
tree | 580b43dd8c23602e7dbd194d8a9de93537a48371 /src | |
parent | 5b7a08bac331d3d30f4ed29acb18f5c99c57883d (diff) |
Reworked SSL cipher handling
Diffstat (limited to 'src')
-rw-r--r-- | src/include/ndpi_api.h | 5 | ||||
-rw-r--r-- | src/lib/Makefile.in | 2 | ||||
-rw-r--r-- | src/lib/ndpi_main.c | 525 | ||||
-rw-r--r-- | src/lib/ndpi_utils.c | 620 | ||||
-rw-r--r-- | src/lib/protocols/ssl.c | 2 |
5 files changed, 737 insertions, 417 deletions
diff --git a/src/include/ndpi_api.h b/src/include/ndpi_api.h index afe22c329..206007a66 100644 --- a/src/include/ndpi_api.h +++ b/src/include/ndpi_api.h @@ -58,7 +58,7 @@ extern "C" { * else 0 * */ - int check_punycode_string(char *buff, int len); + int ndpi_check_punycode_string(char *buff, int len); /** @@ -807,7 +807,8 @@ extern "C" { u_int16_t src_port, u_int16_t dst_port, u_int8_t icmp_type, u_int8_t icmp_code, u_char *hash_buf, u_int8_t hash_buf_len); - u_int8_t ndpi_is_safe_ssl_cipher(u_int16_t cipher); + u_int8_t ndpi_is_safe_ssl_cipher(u_int32_t cipher); + const char* ndpi_cipher2str(u_int32_t cipher); #ifdef __cplusplus } #endif diff --git a/src/lib/Makefile.in b/src/lib/Makefile.in index 65934502d..aa2bbcc31 100644 --- a/src/lib/Makefile.in +++ b/src/lib/Makefile.in @@ -17,7 +17,7 @@ CC = @CC@ CFLAGS += -fPIC -DPIC -I../include -Ithird_party/include -DNDPI_LIB_COMPILATION -O2 -g RANLIB = ranlib -OBJECTS = $(patsubst protocols/%.c, protocols/%.o, $(wildcard protocols/*.c)) $(patsubst third_party/src/%.c, third_party/src/%.o, $(wildcard third_party/src/*.c)) ndpi_main.o +OBJECTS = $(patsubst protocols/%.c, protocols/%.o, $(wildcard protocols/*.c)) $(patsubst third_party/src/%.c, third_party/src/%.o, $(wildcard third_party/src/*.c)) ndpi_main.o ndpi_utils.o HEADERS = $(wildcard ../include/*.h) NDPI_VERSION_MAJOR = @NDPI_MAJOR@ NDPI_LIB_STATIC = libndpi.a diff --git a/src/lib/ndpi_main.c b/src/lib/ndpi_main.c index 4bc89fb6e..85fed4d0c 100644 --- a/src/lib/ndpi_main.c +++ b/src/lib/ndpi_main.c @@ -55,180 +55,6 @@ static int _ndpi_debug_callbacks = 0; // #define MATCH_DEBUG 1 -/* implementation of the punycode check function */ -int check_punycode_string(char * buffer , int len) -{ - int i = 0; - - while(i++ < len) - { - if( buffer[i] == 'x' && - buffer[i+1] == 'n' && - buffer[i+2] == '-' && - buffer[i+3] == '-' ) - // is a punycode string - return 1; - } - // not a punycode string - return 0; -} - -/* ftp://ftp.cc.uoc.gr/mirrors/OpenBSD/src/lib/libc/stdlib/tsearch.c */ -/* find or insert datum into search tree */ -void * ndpi_tsearch(const void *vkey, void **vrootp, - int (*compar)(const void *, const void *)) -{ - ndpi_node *q; - char *key = (char *)vkey; - ndpi_node **rootp = (ndpi_node **)vrootp; - - if(rootp == (ndpi_node **)0) - return ((void *)0); - while (*rootp != (ndpi_node *)0) { /* Knuth's T1: */ - int r; - - if((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */ - return ((void *)*rootp); /* we found it! */ - rootp = (r < 0) ? - &(*rootp)->left : /* T3: follow left branch */ - &(*rootp)->right; /* T4: follow right branch */ - } - q = (ndpi_node *) ndpi_malloc(sizeof(ndpi_node)); /* T5: key not found */ - if(q != (ndpi_node *)0) { /* make new node */ - *rootp = q; /* link new node to old */ - q->key = key; /* initialize new node */ - q->left = q->right = (ndpi_node *)0; - } - return ((void *)q); -} - -/* delete node with given key */ -void * ndpi_tdelete(const void *vkey, void **vrootp, - int (*compar)(const void *, const void *)) -{ - ndpi_node **rootp = (ndpi_node **)vrootp; - char *key = (char *)vkey; - ndpi_node *p = (ndpi_node *)1; - ndpi_node *q; - ndpi_node *r; - int cmp; - - if(rootp == (ndpi_node **)0 || *rootp == (ndpi_node *)0) - return ((ndpi_node *)0); - while ((cmp = (*compar)(key, (*rootp)->key)) != 0) { - p = *rootp; - rootp = (cmp < 0) ? - &(*rootp)->left : /* follow left branch */ - &(*rootp)->right; /* follow right branch */ - if(*rootp == (ndpi_node *)0) - return ((void *)0); /* key not found */ - } - r = (*rootp)->right; /* D1: */ - if((q = (*rootp)->left) == (ndpi_node *)0) /* Left (ndpi_node *)0? */ - q = r; - else if(r != (ndpi_node *)0) { /* Right link is null? */ - if(r->left == (ndpi_node *)0) { /* D2: Find successor */ - r->left = q; - q = r; - } else { /* D3: Find (ndpi_node *)0 link */ - for(q = r->left; q->left != (ndpi_node *)0; q = r->left) - r = q; - r->left = q->right; - q->left = (*rootp)->left; - q->right = (*rootp)->right; - } - } - ndpi_free((ndpi_node *) *rootp); /* D4: Free node */ - *rootp = q; /* link parent to new node */ - return(p); -} - -/* Walk the nodes of a tree */ -static void ndpi_trecurse(ndpi_node *root, void (*action)(const void *, ndpi_VISIT, int, void*), int level, void *user_data) -{ - if(root->left == (ndpi_node *)0 && root->right == (ndpi_node *)0) - (*action)(root, ndpi_leaf, level, user_data); - else { - (*action)(root, ndpi_preorder, level, user_data); - if(root->left != (ndpi_node *)0) - ndpi_trecurse(root->left, action, level + 1, user_data); - (*action)(root, ndpi_postorder, level, user_data); - if(root->right != (ndpi_node *)0) - ndpi_trecurse(root->right, action, level + 1, user_data); - (*action)(root, ndpi_endorder, level, user_data); - } -} - -/* Walk the nodes of a tree */ -void ndpi_twalk(const void *vroot, void (*action)(const void *, ndpi_VISIT, int, void *), void *user_data) -{ - ndpi_node *root = (ndpi_node *)vroot; - - if(root != (ndpi_node *)0 && action != (void (*)(const void *, ndpi_VISIT, int, void*))0) - ndpi_trecurse(root, action, 0, user_data); -} - -/* find a node, or return 0 */ -void * ndpi_tfind(const void *vkey, void *vrootp, - int (*compar)(const void *, const void *)) -{ - char *key = (char *)vkey; - ndpi_node **rootp = (ndpi_node **)vrootp; - - if(rootp == (ndpi_node **)0) - return ((ndpi_node *)0); - while (*rootp != (ndpi_node *)0) { /* T1: */ - int r; - if((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */ - return (*rootp); /* key found */ - rootp = (r < 0) ? - &(*rootp)->left : /* T3: follow left branch */ - &(*rootp)->right; /* T4: follow right branch */ - } - return (ndpi_node *)0; -} - -/* ****************************************** */ - -/* Walk the nodes of a tree */ -static void ndpi_tdestroy_recurse(ndpi_node* root, void (*free_action)(void *)) -{ - if(root->left != NULL) - ndpi_tdestroy_recurse(root->left, free_action); - if(root->right != NULL) - ndpi_tdestroy_recurse(root->right, free_action); - - (*free_action) ((void *) root->key); - ndpi_free(root); -} - -void ndpi_tdestroy(void *vrootp, void (*freefct)(void *)) -{ - ndpi_node *root = (ndpi_node *) vrootp; - - if(root != NULL) - ndpi_tdestroy_recurse(root, freefct); -} - -/* ****************************************** */ - -u_int8_t ndpi_net_match(u_int32_t ip_to_check, - u_int32_t net, - u_int32_t num_bits) -{ - u_int32_t mask = 0; - - mask = ~(~mask >> num_bits); - - return(((ip_to_check & mask) == (net & mask)) ? 1 : 0); -} - -u_int8_t ndpi_ips_match(u_int32_t src, u_int32_t dst, - u_int32_t net, u_int32_t num_bits) -{ - return(ndpi_net_match(src, net, num_bits) || ndpi_net_match(dst, net, num_bits)); -} - /* ****************************************** */ static void *(*_ndpi_flow_malloc)(size_t size); @@ -239,197 +65,6 @@ static void (*_ndpi_free)(void *ptr); /* ****************************************** */ -#ifdef WIN32 -/* http://opensource.apple.com/source/Libc/Libc-186/string.subproj/strcasecmp.c */ - -/* - * This array is designed for mapping upper and lower case letter - * together for a case independent comparison. The mappings are - * based upon ascii character sequences. - */ -static const u_char charmap[] = { - '\000', '\001', '\002', '\003', '\004', '\005', '\006', '\007', - '\010', '\011', '\012', '\013', '\014', '\015', '\016', '\017', - '\020', '\021', '\022', '\023', '\024', '\025', '\026', '\027', - '\030', '\031', '\032', '\033', '\034', '\035', '\036', '\037', - '\040', '\041', '\042', '\043', '\044', '\045', '\046', '\047', - '\050', '\051', '\052', '\053', '\054', '\055', '\056', '\057', - '\060', '\061', '\062', '\063', '\064', '\065', '\066', '\067', - '\070', '\071', '\072', '\073', '\074', '\075', '\076', '\077', - '\100', '\141', '\142', '\143', '\144', '\145', '\146', '\147', - '\150', '\151', '\152', '\153', '\154', '\155', '\156', '\157', - '\160', '\161', '\162', '\163', '\164', '\165', '\166', '\167', - '\170', '\171', '\172', '\133', '\134', '\135', '\136', '\137', - '\140', '\141', '\142', '\143', '\144', '\145', '\146', '\147', - '\150', '\151', '\152', '\153', '\154', '\155', '\156', '\157', - '\160', '\161', '\162', '\163', '\164', '\165', '\166', '\167', - '\170', '\171', '\172', '\173', '\174', '\175', '\176', '\177', - '\200', '\201', '\202', '\203', '\204', '\205', '\206', '\207', - '\210', '\211', '\212', '\213', '\214', '\215', '\216', '\217', - '\220', '\221', '\222', '\223', '\224', '\225', '\226', '\227', - '\230', '\231', '\232', '\233', '\234', '\235', '\236', '\237', - '\240', '\241', '\242', '\243', '\244', '\245', '\246', '\247', - '\250', '\251', '\252', '\253', '\254', '\255', '\256', '\257', - '\260', '\261', '\262', '\263', '\264', '\265', '\266', '\267', - '\270', '\271', '\272', '\273', '\274', '\275', '\276', '\277', - '\300', '\301', '\302', '\303', '\304', '\305', '\306', '\307', - '\310', '\311', '\312', '\313', '\314', '\315', '\316', '\317', - '\320', '\321', '\322', '\323', '\324', '\325', '\326', '\327', - '\330', '\331', '\332', '\333', '\334', '\335', '\336', '\337', - '\340', '\341', '\342', '\343', '\344', '\345', '\346', '\347', - '\350', '\351', '\352', '\353', '\354', '\355', '\356', '\357', - '\360', '\361', '\362', '\363', '\364', '\365', '\366', '\367', - '\370', '\371', '\372', '\373', '\374', '\375', '\376', '\377', -}; - -int strcasecmp(s1, s2) - const char *s1, *s2; -{ - register const u_char *cm = charmap, - *us1 = (const u_char *)s1, - *us2 = (const u_char *)s2; - - while (cm[*us1] == cm[*us2++]) - if(*us1++ == '\0') - return (0); - return (cm[*us1] - cm[*--us2]); -} - -int strncasecmp(s1, s2, n) - const char *s1, *s2; - register size_t n; -{ - if(n != 0) { - register const u_char *cm = charmap, - *us1 = (const u_char *)s1, - *us2 = (const u_char *)s2; - - do { - if(cm[*us1] != cm[*us2++]) - return (cm[*us1] - cm[*--us2]); - if(*us1++ == '\0') - break; - } while (--n != 0); - } - return (0); -} - -#endif - -/* ****************************************** */ - -/* Keep it in order and in sync with ndpi_protocol_category_t in ndpi_typedefs.h */ -static const char* categories[] = { - "Unspecified", - "Media", - "VPN", - "Email", - "DataTransfer", - "Web", - "SocialNetwork", - "Download-FileTransfer-FileSharing", - "Game", - "Chat", - "VoIP", - "Database", - "RemoteAccess", - "Cloud", - "Network", - "Collaborative", - "RPC", - "Streaming", - "System", - "SoftwareUpdate", - "", - "", - "", - "", - "", - "Music", - "Video", - "Shopping", - "Productivity", - "FileSharing", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "", - "Mining", /* 99 */ - "Malware", - "Advertisement", - "Banned_Site", - "Site_Unavailable", - "Allowed_Site", - "Antimalware", -}; - -/* ****************************************** */ - /* Forward */ static void addDefaultPort(struct ndpi_detection_module_struct *ndpi_mod, ndpi_port_range *range, @@ -2290,6 +1925,118 @@ void set_ndpi_debug_function(struct ndpi_detection_module_struct *ndpi_str, ndpi #endif } +/* ****************************************** */ + +/* Keep it in order and in sync with ndpi_protocol_category_t in ndpi_typedefs.h */ +static const char* categories[] = { + "Unspecified", + "Media", + "VPN", + "Email", + "DataTransfer", + "Web", + "SocialNetwork", + "Download-FileTransfer-FileSharing", + "Game", + "Chat", + "VoIP", + "Database", + "RemoteAccess", + "Cloud", + "Network", + "Collaborative", + "RPC", + "Streaming", + "System", + "SoftwareUpdate", + "", + "", + "", + "", + "", + "Music", + "Video", + "Shopping", + "Productivity", + "FileSharing", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "", + "Mining", /* 99 */ + "Malware", + "Advertisement", + "Banned_Site", + "Site_Unavailable", + "Allowed_Site", + "Antimalware", +}; + /* ******************************************************************** */ struct ndpi_detection_module_struct *ndpi_init_detection_module(void) { @@ -6408,51 +6155,3 @@ int ndpi_flowv6_flow_hash(u_int8_t l4_proto, struct ndpi_in6_addr *src_ip, struc /* **************************************** */ -/* **************************************** */ - -struct cipher_weakness { - u_int16_t cipher_id; - ndpi_cipher_weakness weakness_type; -}; - -static struct cipher_weakness safe_ssl_ciphers[] = { - /* https://community.qualys.com/thread/18212-how-does-qualys-determine-the-server-cipher-suites */ - /* INSECURE */ - { 0xc011, NDPI_CIPHER_INSECURE }, /* TLS_ECDHE_RSA_WITH_RC4_128_SHA */ - { 0x0005, NDPI_CIPHER_INSECURE }, /* TLS_RSA_WITH_RC4_128_SHA */ - { 0x0004, NDPI_CIPHER_INSECURE }, /* TLS_RSA_WITH_RC4_128_MD5 */ - /* WEAK */ - { 0x009d, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_256_GCM_SHA384 */ - { 0x003d, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_256_CBC_SHA256 */ - { 0x0035, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_256_CBC_SHA */ - { 0x0084, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_CAMELLIA_256_CBC_SHA */ - { 0x009c, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_128_GCM_SHA256 */ - { 0x003c, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_128_CBC_SHA256 */ - { 0x002f, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_128_CBC_SHA */ - { 0x0041, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_CAMELLIA_128_CBC_SHA */ - { 0xc012, NDPI_CIPHER_WEAK }, /* TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA */ - { 0x0016, NDPI_CIPHER_WEAK }, /* TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA */ - { 0x000a, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_3DES_EDE_CBC_SHA */ - { 0x0096, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_SEED_CBC_SHA */ - { 0x0007, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_IDEA_CBC_SHA */ - - { 0x0, NDPI_CIPHER_SAFE } /* END */ -}; - -u_int8_t ndpi_is_safe_ssl_cipher(u_int16_t cipher) { - u_int i; - - for(i=0; safe_ssl_ciphers[i].cipher_id != 0; i++) { - if(safe_ssl_ciphers[i].cipher_id == cipher) { -#ifdef CERTIFICATE_DEBUG - printf("%s %s(%04X / %u)\n", - (safe_ssl_ciphers[i].weakness_type == NDPI_CIPHER_WEAK) ? "WEAK" : "INSECURE", - __FUNCTION__, cipher, cipher); -#endif - - return(safe_ssl_ciphers[i].weakness_type); - } - } - - return(NDPI_CIPHER_SAFE); /* We're safe */ -} diff --git a/src/lib/ndpi_utils.c b/src/lib/ndpi_utils.c new file mode 100644 index 000000000..610fe06c9 --- /dev/null +++ b/src/lib/ndpi_utils.c @@ -0,0 +1,620 @@ +/* + * ndpi_utils.cc + * + * Copyright (C) 2011-19 - ntop.org + * + * This file is part of nDPI, an open source deep packet inspection + * library based on the OpenDPI and PACE technology by ipoque GmbH + * + * nDPI is free software: you can redistribute it and/or modify + * it under the terms of the GNU Lesser General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * nDPI is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public License + * along with nDPI. If not, see <http://www.gnu.org/licenses/>. + * + */ + +#ifdef HAVE_CONFIG_H +#include "ndpi_config.h" +#endif + +#include <stdlib.h> +#include <errno.h> +#include <sys/types.h> +#include "ahocorasick.h" +#include "libcache.h" + +#define NDPI_CURRENT_PROTO NDPI_PROTOCOL_UNKNOWN + +#include "ndpi_api.h" +#include "ndpi_config.h" + +#include <time.h> +#ifndef WIN32 +#include <unistd.h> +#endif + +#if defined __FreeBSD__ || defined __NetBSD__ || defined __OpenBSD__ +#include <sys/endian.h> +#endif + +#include "third_party/include/ndpi_patricia.h" +#include "third_party/include/ht_hash.h" + +#define NDPI_CONST_GENERIC_PROTOCOL_NAME "GenericProtocol" + +static int _ndpi_debug_callbacks = 0; + +// #define MATCH_DEBUG 1 + +/* implementation of the punycode check function */ +int ndpi_check_punycode_string(char * buffer , int len) { + int i = 0; + + while(i++ < len) { + if((buffer[i] == 'x') + && (buffer[i+1] == 'n') + && (buffer[i+2] == '-') + && (buffer[i+3] == '-')) + // is a punycode string + return(1); + } + + // not a punycode string + return 0; +} + +/* ftp://ftp.cc.uoc.gr/mirrors/OpenBSD/src/lib/libc/stdlib/tsearch.c */ +/* find or insert datum into search tree */ +void * ndpi_tsearch(const void *vkey, void **vrootp, + int (*compar)(const void *, const void *)) +{ + ndpi_node *q; + char *key = (char *)vkey; + ndpi_node **rootp = (ndpi_node **)vrootp; + + if(rootp == (ndpi_node **)0) + return ((void *)0); + while (*rootp != (ndpi_node *)0) { /* Knuth's T1: */ + int r; + + if((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */ + return ((void *)*rootp); /* we found it! */ + rootp = (r < 0) ? + &(*rootp)->left : /* T3: follow left branch */ + &(*rootp)->right; /* T4: follow right branch */ + } + q = (ndpi_node *) ndpi_malloc(sizeof(ndpi_node)); /* T5: key not found */ + if(q != (ndpi_node *)0) { /* make new node */ + *rootp = q; /* link new node to old */ + q->key = key; /* initialize new node */ + q->left = q->right = (ndpi_node *)0; + } + return ((void *)q); +} + +/* delete node with given key */ +void * ndpi_tdelete(const void *vkey, void **vrootp, + int (*compar)(const void *, const void *)) +{ + ndpi_node **rootp = (ndpi_node **)vrootp; + char *key = (char *)vkey; + ndpi_node *p = (ndpi_node *)1; + ndpi_node *q; + ndpi_node *r; + int cmp; + + if(rootp == (ndpi_node **)0 || *rootp == (ndpi_node *)0) + return ((ndpi_node *)0); + while ((cmp = (*compar)(key, (*rootp)->key)) != 0) { + p = *rootp; + rootp = (cmp < 0) ? + &(*rootp)->left : /* follow left branch */ + &(*rootp)->right; /* follow right branch */ + if(*rootp == (ndpi_node *)0) + return ((void *)0); /* key not found */ + } + r = (*rootp)->right; /* D1: */ + if((q = (*rootp)->left) == (ndpi_node *)0) /* Left (ndpi_node *)0? */ + q = r; + else if(r != (ndpi_node *)0) { /* Right link is null? */ + if(r->left == (ndpi_node *)0) { /* D2: Find successor */ + r->left = q; + q = r; + } else { /* D3: Find (ndpi_node *)0 link */ + for(q = r->left; q->left != (ndpi_node *)0; q = r->left) + r = q; + r->left = q->right; + q->left = (*rootp)->left; + q->right = (*rootp)->right; + } + } + ndpi_free((ndpi_node *) *rootp); /* D4: Free node */ + *rootp = q; /* link parent to new node */ + return(p); +} + +/* Walk the nodes of a tree */ +static void ndpi_trecurse(ndpi_node *root, void (*action)(const void *, ndpi_VISIT, int, void*), int level, void *user_data) +{ + if(root->left == (ndpi_node *)0 && root->right == (ndpi_node *)0) + (*action)(root, ndpi_leaf, level, user_data); + else { + (*action)(root, ndpi_preorder, level, user_data); + if(root->left != (ndpi_node *)0) + ndpi_trecurse(root->left, action, level + 1, user_data); + (*action)(root, ndpi_postorder, level, user_data); + if(root->right != (ndpi_node *)0) + ndpi_trecurse(root->right, action, level + 1, user_data); + (*action)(root, ndpi_endorder, level, user_data); + } +} + +/* Walk the nodes of a tree */ +void ndpi_twalk(const void *vroot, void (*action)(const void *, ndpi_VISIT, int, void *), void *user_data) +{ + ndpi_node *root = (ndpi_node *)vroot; + + if(root != (ndpi_node *)0 && action != (void (*)(const void *, ndpi_VISIT, int, void*))0) + ndpi_trecurse(root, action, 0, user_data); +} + +/* find a node, or return 0 */ +void * ndpi_tfind(const void *vkey, void *vrootp, + int (*compar)(const void *, const void *)) +{ + char *key = (char *)vkey; + ndpi_node **rootp = (ndpi_node **)vrootp; + + if(rootp == (ndpi_node **)0) + return ((ndpi_node *)0); + while (*rootp != (ndpi_node *)0) { /* T1: */ + int r; + if((r = (*compar)(key, (*rootp)->key)) == 0) /* T2: */ + return (*rootp); /* key found */ + rootp = (r < 0) ? + &(*rootp)->left : /* T3: follow left branch */ + &(*rootp)->right; /* T4: follow right branch */ + } + return (ndpi_node *)0; +} + +/* ****************************************** */ + +/* Walk the nodes of a tree */ +static void ndpi_tdestroy_recurse(ndpi_node* root, void (*free_action)(void *)) +{ + if(root->left != NULL) + ndpi_tdestroy_recurse(root->left, free_action); + if(root->right != NULL) + ndpi_tdestroy_recurse(root->right, free_action); + + (*free_action) ((void *) root->key); + ndpi_free(root); +} + +void ndpi_tdestroy(void *vrootp, void (*freefct)(void *)) +{ + ndpi_node *root = (ndpi_node *) vrootp; + + if(root != NULL) + ndpi_tdestroy_recurse(root, freefct); +} + +/* ****************************************** */ + +u_int8_t ndpi_net_match(u_int32_t ip_to_check, + u_int32_t net, + u_int32_t num_bits) +{ + u_int32_t mask = 0; + + mask = ~(~mask >> num_bits); + + return(((ip_to_check & mask) == (net & mask)) ? 1 : 0); +} + +u_int8_t ndpi_ips_match(u_int32_t src, u_int32_t dst, + u_int32_t net, u_int32_t num_bits) +{ + return(ndpi_net_match(src, net, num_bits) || ndpi_net_match(dst, net, num_bits)); +} + +/* ****************************************** */ + +#ifdef WIN32 +/* http://opensource.apple.com/source/Libc/Libc-186/string.subproj/strcasecmp.c */ + +/* + * This array is designed for mapping upper and lower case letter + * together for a case independent comparison. The mappings are + * based upon ascii character sequences. + */ +static const u_char charmap[] = { + '\000', '\001', '\002', '\003', '\004', '\005', '\006', '\007', + '\010', '\011', '\012', '\013', '\014', '\015', '\016', '\017', + '\020', '\021', '\022', '\023', '\024', '\025', '\026', '\027', + '\030', '\031', '\032', '\033', '\034', '\035', '\036', '\037', + '\040', '\041', '\042', '\043', '\044', '\045', '\046', '\047', + '\050', '\051', '\052', '\053', '\054', '\055', '\056', '\057', + '\060', '\061', '\062', '\063', '\064', '\065', '\066', '\067', + '\070', '\071', '\072', '\073', '\074', '\075', '\076', '\077', + '\100', '\141', '\142', '\143', '\144', '\145', '\146', '\147', + '\150', '\151', '\152', '\153', '\154', '\155', '\156', '\157', + '\160', '\161', '\162', '\163', '\164', '\165', '\166', '\167', + '\170', '\171', '\172', '\133', '\134', '\135', '\136', '\137', + '\140', '\141', '\142', '\143', '\144', '\145', '\146', '\147', + '\150', '\151', '\152', '\153', '\154', '\155', '\156', '\157', + '\160', '\161', '\162', '\163', '\164', '\165', '\166', '\167', + '\170', '\171', '\172', '\173', '\174', '\175', '\176', '\177', + '\200', '\201', '\202', '\203', '\204', '\205', '\206', '\207', + '\210', '\211', '\212', '\213', '\214', '\215', '\216', '\217', + '\220', '\221', '\222', '\223', '\224', '\225', '\226', '\227', + '\230', '\231', '\232', '\233', '\234', '\235', '\236', '\237', + '\240', '\241', '\242', '\243', '\244', '\245', '\246', '\247', + '\250', '\251', '\252', '\253', '\254', '\255', '\256', '\257', + '\260', '\261', '\262', '\263', '\264', '\265', '\266', '\267', + '\270', '\271', '\272', '\273', '\274', '\275', '\276', '\277', + '\300', '\301', '\302', '\303', '\304', '\305', '\306', '\307', + '\310', '\311', '\312', '\313', '\314', '\315', '\316', '\317', + '\320', '\321', '\322', '\323', '\324', '\325', '\326', '\327', + '\330', '\331', '\332', '\333', '\334', '\335', '\336', '\337', + '\340', '\341', '\342', '\343', '\344', '\345', '\346', '\347', + '\350', '\351', '\352', '\353', '\354', '\355', '\356', '\357', + '\360', '\361', '\362', '\363', '\364', '\365', '\366', '\367', + '\370', '\371', '\372', '\373', '\374', '\375', '\376', '\377', +}; + +int strcasecmp(const char *s1, const char *s2) { + register const u_char *cm = charmap, + *us1 = (const u_char *)s1, + *us2 = (const u_char *)s2; + + while (cm[*us1] == cm[*us2++]) + if(*us1++ == '\0') + return (0); + return (cm[*us1] - cm[*--us2]); +} + +/* ****************************************** */ + +int strncasecmp(const char *s1, const char *s2, size_t n) { + if(n != 0) { + register const u_char *cm = charmap, + *us1 = (const u_char *)s1, + *us2 = (const u_char *)s2; + + do { + if(cm[*us1] != cm[*us2++]) + return (cm[*us1] - cm[*--us2]); + if(*us1++ == '\0') + break; + } while (--n != 0); + } + return (0); +} + +#endif + +/* **************************************** */ + +struct cipher_weakness { + u_int16_t cipher_id; + ndpi_cipher_weakness weakness_type; +}; + +static struct cipher_weakness safe_ssl_ciphers[] = { + /* https://community.qualys.com/thread/18212-how-does-qualys-determine-the-server-cipher-suites */ + /* INSECURE */ + { 0xc011, NDPI_CIPHER_INSECURE }, /* TLS_ECDHE_RSA_WITH_RC4_128_SHA */ + { 0x0005, NDPI_CIPHER_INSECURE }, /* TLS_RSA_WITH_RC4_128_SHA */ + { 0x0004, NDPI_CIPHER_INSECURE }, /* TLS_RSA_WITH_RC4_128_MD5 */ + /* WEAK */ + { 0x009d, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_256_GCM_SHA384 */ + { 0x003d, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_256_CBC_SHA256 */ + { 0x0035, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_256_CBC_SHA */ + { 0x0084, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_CAMELLIA_256_CBC_SHA */ + { 0x009c, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_128_GCM_SHA256 */ + { 0x003c, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_128_CBC_SHA256 */ + { 0x002f, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_AES_128_CBC_SHA */ + { 0x0041, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_CAMELLIA_128_CBC_SHA */ + { 0xc012, NDPI_CIPHER_WEAK }, /* TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA */ + { 0x0016, NDPI_CIPHER_WEAK }, /* TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA */ + { 0x000a, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_3DES_EDE_CBC_SHA */ + { 0x0096, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_SEED_CBC_SHA */ + { 0x0007, NDPI_CIPHER_WEAK }, /* TLS_RSA_WITH_IDEA_CBC_SHA */ + + { 0x0, NDPI_CIPHER_SAFE } /* END */ +}; + +/* ***************************************************** */ + +u_int8_t ndpi_is_safe_ssl_cipher(u_int32_t cipher) { + u_int i; + + for(i=0; safe_ssl_ciphers[i].cipher_id != 0; i++) { + if(safe_ssl_ciphers[i].cipher_id == cipher) { +#ifdef CERTIFICATE_DEBUG + printf("%s %s(%04X / %u)\n", + (safe_ssl_ciphers[i].weakness_type == NDPI_CIPHER_WEAK) ? "WEAK" : "INSECURE", + __FUNCTION__, cipher, cipher); +#endif + + return(safe_ssl_ciphers[i].weakness_type); + } + } + + return(NDPI_CIPHER_SAFE); /* We're safe */ +} + +/* ***************************************************** */ + +const char* ndpi_cipher2str(u_int32_t cipher) { + switch(cipher) { + case 0x000000: return("TLS_NULL_WITH_NULL_NULL"); + case 0x000001: return("TLS_RSA_WITH_NULL_MD5"); + case 0x000002: return("TLS_RSA_WITH_NULL_SHA"); + case 0x000003: return("TLS_RSA_EXPORT_WITH_RC4_40_MD5"); + case 0x000004: return("TLS_RSA_WITH_RC4_128_MD5"); + case 0x000005: return("TLS_RSA_WITH_RC4_128_SHA"); + case 0x000006: return("TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5"); + case 0x000007: return("TLS_RSA_WITH_IDEA_CBC_SHA"); + case 0x000008: return("TLS_RSA_EXPORT_WITH_DES40_CBC_SHA"); + case 0x000009: return("TLS_RSA_WITH_DES_CBC_SHA"); + case 0x00000a: return("TLS_RSA_WITH_3DES_EDE_CBC_SHA"); + case 0x00000b: return("TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA"); + case 0x00000c: return("TLS_DH_DSS_WITH_DES_CBC_SHA"); + case 0x00000d: return("TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"); + case 0x00000e: return("TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA"); + case 0x00000f: return("TLS_DH_RSA_WITH_DES_CBC_SHA"); + case 0x000010: return("TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"); + case 0x000011: return("TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA"); + case 0x000012: return("TLS_DHE_DSS_WITH_DES_CBC_SHA"); + case 0x000013: return("TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"); + case 0x000014: return("TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA"); + case 0x000015: return("TLS_DHE_RSA_WITH_DES_CBC_SHA"); + case 0x000016: return("TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"); + case 0x000017: return("TLS_DH_anon_EXPORT_WITH_RC4_40_MD5"); + case 0x000018: return("TLS_DH_anon_WITH_RC4_128_MD5"); + case 0x000019: return("TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA"); + case 0x00001a: return("TLS_DH_anon_WITH_DES_CBC_SHA"); + case 0x00001b: return("TLS_DH_anon_WITH_3DES_EDE_CBC_SHA"); + case 0x00001c: return("SSL_FORTEZZA_KEA_WITH_NULL_SHA"); + case 0x00001d: return("SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA"); + /* case 0x00001e: return("SSL_FORTEZZA_KEA_WITH_RC4_128_SHA"); */ + case 0x00001E: return("TLS_KRB5_WITH_DES_CBC_SHA"); + case 0x00001F: return("TLS_KRB5_WITH_3DES_EDE_CBC_SHA"); + case 0x000020: return("TLS_KRB5_WITH_RC4_128_SHA"); + case 0x000021: return("TLS_KRB5_WITH_IDEA_CBC_SHA"); + case 0x000022: return("TLS_KRB5_WITH_DES_CBC_MD5"); + case 0x000023: return("TLS_KRB5_WITH_3DES_EDE_CBC_MD5"); + case 0x000024: return("TLS_KRB5_WITH_RC4_128_MD5"); + case 0x000025: return("TLS_KRB5_WITH_IDEA_CBC_MD5"); + case 0x000026: return("TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA"); + case 0x000027: return("TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA"); + case 0x000028: return("TLS_KRB5_EXPORT_WITH_RC4_40_SHA"); + case 0x000029: return("TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5"); + case 0x00002A: return("TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5"); + case 0x00002B: return("TLS_KRB5_EXPORT_WITH_RC4_40_MD5"); + case 0x00002C: return("TLS_PSK_WITH_NULL_SHA"); + case 0x00002D: return("TLS_DHE_PSK_WITH_NULL_SHA"); + case 0x00002E: return("TLS_RSA_PSK_WITH_NULL_SHA"); + case 0x00002f: return("TLS_RSA_WITH_AES_128_CBC_SHA"); + case 0x000030: return("TLS_DH_DSS_WITH_AES_128_CBC_SHA"); + case 0x000031: return("TLS_DH_RSA_WITH_AES_128_CBC_SHA"); + case 0x000032: return("TLS_DHE_DSS_WITH_AES_128_CBC_SHA"); + case 0x000033: return("TLS_DHE_RSA_WITH_AES_128_CBC_SHA"); + case 0x000034: return("TLS_DH_anon_WITH_AES_128_CBC_SHA"); + case 0x000035: return("TLS_RSA_WITH_AES_256_CBC_SHA"); + case 0x000036: return("TLS_DH_DSS_WITH_AES_256_CBC_SHA"); + case 0x000037: return("TLS_DH_RSA_WITH_AES_256_CBC_SHA"); + case 0x000038: return("TLS_DHE_DSS_WITH_AES_256_CBC_SHA"); + case 0x000039: return("TLS_DHE_RSA_WITH_AES_256_CBC_SHA"); + case 0x00003A: return("TLS_DH_anon_WITH_AES_256_CBC_SHA"); + case 0x00003B: return("TLS_RSA_WITH_NULL_SHA256"); + case 0x00003C: return("TLS_RSA_WITH_AES_128_CBC_SHA256"); + case 0x00003D: return("TLS_RSA_WITH_AES_256_CBC_SHA256"); + case 0x00003E: return("TLS_DH_DSS_WITH_AES_128_CBC_SHA256"); + case 0x00003F: return("TLS_DH_RSA_WITH_AES_128_CBC_SHA256"); + case 0x000040: return("TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"); + case 0x000041: return("TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"); + case 0x000042: return("TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"); + case 0x000043: return("TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"); + case 0x000044: return("TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"); + case 0x000045: return("TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"); + case 0x000046: return("TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA"); + case 0x000047: return("TLS_ECDH_ECDSA_WITH_NULL_SHA"); + case 0x000048: return("TLS_ECDH_ECDSA_WITH_RC4_128_SHA"); + case 0x000049: return("TLS_ECDH_ECDSA_WITH_DES_CBC_SHA"); + case 0x00004A: return("TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"); + case 0x00004B: return("TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"); + case 0x00004C: return("TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"); + case 0x000060: return("TLS_RSA_EXPORT1024_WITH_RC4_56_MD5"); + case 0x000061: return("TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5"); + case 0x000062: return("TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA"); + case 0x000063: return("TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA"); + case 0x000064: return("TLS_RSA_EXPORT1024_WITH_RC4_56_SHA"); + case 0x000065: return("TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA"); + case 0x000066: return("TLS_DHE_DSS_WITH_RC4_128_SHA"); + case 0x000067: return("TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"); + case 0x000068: return("TLS_DH_DSS_WITH_AES_256_CBC_SHA256"); + case 0x000069: return("TLS_DH_RSA_WITH_AES_256_CBC_SHA256"); + case 0x00006A: return("TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"); + case 0x00006B: return("TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"); + case 0x00006C: return("TLS_DH_anon_WITH_AES_128_CBC_SHA256"); + case 0x00006D: return("TLS_DH_anon_WITH_AES_256_CBC_SHA256"); + case 0x000084: return("TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"); + case 0x000085: return("TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"); + case 0x000086: return("TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"); + case 0x000087: return("TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"); + case 0x000088: return("TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"); + case 0x000089: return("TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA"); + case 0x00008A: return("TLS_PSK_WITH_RC4_128_SHA"); + case 0x00008B: return("TLS_PSK_WITH_3DES_EDE_CBC_SHA"); + case 0x00008C: return("TLS_PSK_WITH_AES_128_CBC_SHA"); + case 0x00008D: return("TLS_PSK_WITH_AES_256_CBC_SHA"); + case 0x00008E: return("TLS_DHE_PSK_WITH_RC4_128_SHA"); + case 0x00008F: return("TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"); + case 0x000090: return("TLS_DHE_PSK_WITH_AES_128_CBC_SHA"); + case 0x000091: return("TLS_DHE_PSK_WITH_AES_256_CBC_SHA"); + case 0x000092: return("TLS_RSA_PSK_WITH_RC4_128_SHA"); + case 0x000093: return("TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"); + case 0x000094: return("TLS_RSA_PSK_WITH_AES_128_CBC_SHA"); + case 0x000095: return("TLS_RSA_PSK_WITH_AES_256_CBC_SHA"); + case 0x000096: return("TLS_RSA_WITH_SEED_CBC_SHA"); + case 0x000097: return("TLS_DH_DSS_WITH_SEED_CBC_SHA"); + case 0x000098: return("TLS_DH_RSA_WITH_SEED_CBC_SHA"); + case 0x000099: return("TLS_DHE_DSS_WITH_SEED_CBC_SHA"); + case 0x00009A: return("TLS_DHE_RSA_WITH_SEED_CBC_SHA"); + case 0x00009B: return("TLS_DH_anon_WITH_SEED_CBC_SHA"); + case 0x00009C: return("TLS_RSA_WITH_AES_128_GCM_SHA256"); + case 0x00009D: return("TLS_RSA_WITH_AES_256_GCM_SHA384"); + case 0x00009E: return("TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"); + case 0x00009F: return("TLS_DHE_RSA_WITH_AES_256_GCM_SHA384"); + case 0x0000A0: return("TLS_DH_RSA_WITH_AES_128_GCM_SHA256"); + case 0x0000A1: return("TLS_DH_RSA_WITH_AES_256_GCM_SHA384"); + case 0x0000A2: return("TLS_DHE_DSS_WITH_AES_128_GCM_SHA256"); + case 0x0000A3: return("TLS_DHE_DSS_WITH_AES_256_GCM_SHA384"); + case 0x0000A4: return("TLS_DH_DSS_WITH_AES_128_GCM_SHA256"); + case 0x0000A5: return("TLS_DH_DSS_WITH_AES_256_GCM_SHA384"); + case 0x0000A6: return("TLS_DH_anon_WITH_AES_128_GCM_SHA256"); + case 0x0000A7: return("TLS_DH_anon_WITH_AES_256_GCM_SHA384"); + case 0x0000A8: return("TLS_PSK_WITH_AES_128_GCM_SHA256"); + case 0x0000A9: return("TLS_PSK_WITH_AES_256_GCM_SHA384"); + case 0x0000AA: return("TLS_DHE_PSK_WITH_AES_128_GCM_SHA256"); + case 0x0000AB: return("TLS_DHE_PSK_WITH_AES_256_GCM_SHA384"); + case 0x0000AC: return("TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"); + case 0x0000AD: return("TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"); + case 0x0000AE: return("TLS_PSK_WITH_AES_128_CBC_SHA256"); + case 0x0000AF: return("TLS_PSK_WITH_AES_256_CBC_SHA384"); + case 0x0000B0: return("TLS_PSK_WITH_NULL_SHA256"); + case 0x0000B1: return("TLS_PSK_WITH_NULL_SHA384"); + case 0x0000B2: return("TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"); + case 0x0000B3: return("TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"); + case 0x0000B4: return("TLS_DHE_PSK_WITH_NULL_SHA256"); + case 0x0000B5: return("TLS_DHE_PSK_WITH_NULL_SHA384"); + case 0x0000B6: return("TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"); + case 0x0000B7: return("TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"); + case 0x0000B8: return("TLS_RSA_PSK_WITH_NULL_SHA256"); + case 0x0000B9: return("TLS_RSA_PSK_WITH_NULL_SHA384"); + case 0x0000BA: return("TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"); + case 0x0000BB: return("TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"); + case 0x0000BC: return("TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"); + case 0x0000BD: return("TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"); + case 0x0000BE: return("TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"); + case 0x0000BF: return("TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256"); + case 0x0000C0: return("TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"); + case 0x0000C1: return("TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"); + case 0x0000C2: return("TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"); + case 0x0000C3: return("TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"); + case 0x0000C4: return("TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"); + case 0x0000C5: return("TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256"); + case 0x0000FF: return("TLS_EMPTY_RENEGOTIATION_INFO_SCSV"); + case 0x00c001: return("TLS_ECDH_ECDSA_WITH_NULL_SHA"); + case 0x00c002: return("TLS_ECDH_ECDSA_WITH_RC4_128_SHA"); + case 0x00c003: return("TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"); + case 0x00c004: return("TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"); + case 0x00c005: return("TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"); + case 0x00c006: return("TLS_ECDHE_ECDSA_WITH_NULL_SHA"); + case 0x00c007: return("TLS_ECDHE_ECDSA_WITH_RC4_128_SHA"); + case 0x00c008: return("TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"); + case 0x00c009: return("TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"); + case 0x00c00a: return("TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"); + case 0x00c00b: return("TLS_ECDH_RSA_WITH_NULL_SHA"); + case 0x00c00c: return("TLS_ECDH_RSA_WITH_RC4_128_SHA"); + case 0x00c00d: return("TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"); + case 0x00c00e: return("TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"); + case 0x00c00f: return("TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"); + case 0x00c010: return("TLS_ECDHE_RSA_WITH_NULL_SHA"); + case 0x00c011: return("TLS_ECDHE_RSA_WITH_RC4_128_SHA"); + case 0x00c012: return("TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"); + case 0x00c013: return("TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"); + case 0x00c014: return("TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"); + case 0x00c015: return("TLS_ECDH_anon_WITH_NULL_SHA"); + case 0x00c016: return("TLS_ECDH_anon_WITH_RC4_128_SHA"); + case 0x00c017: return("TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA"); + case 0x00c018: return("TLS_ECDH_anon_WITH_AES_128_CBC_SHA"); + case 0x00c019: return("TLS_ECDH_anon_WITH_AES_256_CBC_SHA"); + case 0x00C01A: return("TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"); + case 0x00C01B: return("TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"); + case 0x00C01C: return("TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"); + case 0x00C01D: return("TLS_SRP_SHA_WITH_AES_128_CBC_SHA"); + case 0x00C01E: return("TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"); + case 0x00C01F: return("TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"); + case 0x00C020: return("TLS_SRP_SHA_WITH_AES_256_CBC_SHA"); + case 0x00C021: return("TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"); + case 0x00C022: return("TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"); + case 0x00C023: return("TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"); + case 0x00C024: return("TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"); + case 0x00C025: return("TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"); + case 0x00C026: return("TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"); + case 0x00C027: return("TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"); + case 0x00C028: return("TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"); + case 0x00C029: return("TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"); + case 0x00C02A: return("TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"); + case 0x00C02B: return("TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"); + case 0x00C02C: return("TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"); + case 0x00C02D: return("TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"); + case 0x00C02E: return("TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"); + case 0x00C02F: return("TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"); + case 0x00C030: return("TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"); + case 0x00C031: return("TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"); + case 0x00C032: return("TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"); + case 0x00C033: return("TLS_ECDHE_PSK_WITH_RC4_128_SHA"); + case 0x00C034: return("TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"); + case 0x00C035: return("TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"); + case 0x00C036: return("TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"); + case 0x00C037: return("TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"); + case 0x00C038: return("TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"); + case 0x00C039: return("TLS_ECDHE_PSK_WITH_NULL_SHA"); + case 0x00C03A: return("TLS_ECDHE_PSK_WITH_NULL_SHA256"); + case 0x00C03B: return("TLS_ECDHE_PSK_WITH_NULL_SHA384"); + case 0x00CC13: return("TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CC14: return("TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CC15: return("TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CCA8: return("TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CCA9: return("TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CCAA: return("TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CCAB: return("TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CCAC: return("TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CCAD: return("TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00CCAE: return("TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"); + case 0x00E410: return("TLS_RSA_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E411: return("TLS_RSA_WITH_SALSA20_SHA1"); + case 0x00E412: return("TLS_ECDHE_RSA_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E413: return("TLS_ECDHE_RSA_WITH_SALSA20_SHA1"); + case 0x00E414: return("TLS_ECDHE_ECDSA_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E415: return("TLS_ECDHE_ECDSA_WITH_SALSA20_SHA1"); + case 0x00E416: return("TLS_PSK_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E417: return("TLS_PSK_WITH_SALSA20_SHA1"); + case 0x00E418: return("TLS_ECDHE_PSK_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E419: return("TLS_ECDHE_PSK_WITH_SALSA20_SHA1"); + case 0x00E41A: return("TLS_RSA_PSK_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E41B: return("TLS_RSA_PSK_WITH_SALSA20_SHA1"); + case 0x00E41C: return("TLS_DHE_PSK_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E41D: return("TLS_DHE_PSK_WITH_SALSA20_SHA1"); + case 0x00E41E: return("TLS_DHE_RSA_WITH_ESTREAM_SALSA20_SHA1"); + case 0x00E41F: return("TLS_DHE_RSA_WITH_SALSA20_SHA1"); + case 0x00fefe: return("SSL_RSA_FIPS_WITH_DES_CBC_SHA"); + case 0x00feff: return("SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA"); + case 0x00ffe0: return("SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA"); + case 0x00ffe1: return("SSL_RSA_FIPS_WITH_DES_CBC_SHA"); + case 0x010080: return("SSL2_RC4_128_WITH_MD5"); + case 0x020080: return("SSL2_RC4_128_EXPORT40_WITH_MD5"); + case 0x030080: return("SSL2_RC2_128_CBC_WITH_MD5"); + case 0x040080: return("SSL2_RC2_128_CBC_EXPORT40_WITH_MD5"); + case 0x050080: return("SSL2_IDEA_128_CBC_WITH_MD5"); + case 0x060040: return("SSL2_DES_64_CBC_WITH_MD5"); + case 0x0700c0: return("SSL2_DES_192_EDE3_CBC_WITH_MD5"); + case 0x080080: return("SSL2_RC4_64_WITH_MD5"); + default: return("???"); + } +} + diff --git a/src/lib/protocols/ssl.c b/src/lib/protocols/ssl.c index eee31e94b..9b3a6c51b 100644 --- a/src/lib/protocols/ssl.c +++ b/src/lib/protocols/ssl.c @@ -317,7 +317,7 @@ static void stripCertificateTrailer(char *buffer, int buffer_len) { } /* check for punycode encoding */ - is_puny = check_punycode_string(buffer, buffer_len); + is_puny = ndpi_check_punycode_string(buffer, buffer_len); // not a punycode string - need more checks if(is_puny == 0) { |