diff options
Diffstat (limited to 'src/lib/ndpi_utils.c')
-rw-r--r-- | src/lib/ndpi_utils.c | 70 |
1 files changed, 35 insertions, 35 deletions
diff --git a/src/lib/ndpi_utils.c b/src/lib/ndpi_utils.c index 294be770a..3b3e31514 100644 --- a/src/lib/ndpi_utils.c +++ b/src/lib/ndpi_utils.c @@ -919,10 +919,10 @@ char* ndpi_ssl_version2str(struct ndpi_flow_struct *flow, *unknown_tls_version = 1; if(flow != NULL) { - snprintf(flow->protos.stun_ssl.ssl.ssl_version_str, - sizeof(flow->protos.stun_ssl.ssl.ssl_version_str), "TLS (%04X)", version); + snprintf(flow->protos.tls_quic_stun.tls_quic.ssl_version_str, + sizeof(flow->protos.tls_quic_stun.tls_quic.ssl_version_str), "TLS (%04X)", version); - return(flow->protos.stun_ssl.ssl.ssl_version_str); + return(flow->protos.tls_quic_stun.tls_quic.ssl_version_str); } else return(""); } @@ -1213,22 +1213,22 @@ int ndpi_dpi2json(struct ndpi_detection_module_struct *ndpi_struct, case NDPI_PROTOCOL_QUIC: ndpi_serialize_start_of_block(serializer, "quic"); - if(flow->protos.stun_ssl.ssl.client_requested_server_name[0] != '\0') + if(flow->protos.tls_quic_stun.tls_quic.client_requested_server_name[0] != '\0') ndpi_serialize_string_string(serializer, "client_requested_server_name", - flow->protos.stun_ssl.ssl.client_requested_server_name); + flow->protos.tls_quic_stun.tls_quic.client_requested_server_name); if(flow->http.user_agent) ndpi_serialize_string_string(serializer, "user_agent", flow->http.user_agent); - if(flow->protos.stun_ssl.ssl.ssl_version) { + if(flow->protos.tls_quic_stun.tls_quic.ssl_version) { u_int8_t unknown_tls_version; - char *version = ndpi_ssl_version2str(flow, flow->protos.stun_ssl.ssl.ssl_version, &unknown_tls_version); + char *version = ndpi_ssl_version2str(flow, flow->protos.tls_quic_stun.tls_quic.ssl_version, &unknown_tls_version); if(!unknown_tls_version) ndpi_serialize_string_string(serializer, "version", version); - if(flow->protos.stun_ssl.ssl.alpn) - ndpi_serialize_string_string(serializer, "alpn", flow->protos.stun_ssl.ssl.alpn); - ndpi_serialize_string_string(serializer, "ja3", flow->protos.stun_ssl.ssl.ja3_client); - if(flow->protos.stun_ssl.ssl.tls_supported_versions) - ndpi_serialize_string_string(serializer, "tls_supported_versions", flow->protos.stun_ssl.ssl.tls_supported_versions); + if(flow->protos.tls_quic_stun.tls_quic.alpn) + ndpi_serialize_string_string(serializer, "alpn", flow->protos.tls_quic_stun.tls_quic.alpn); + ndpi_serialize_string_string(serializer, "ja3", flow->protos.tls_quic_stun.tls_quic.ja3_client); + if(flow->protos.tls_quic_stun.tls_quic.tls_supported_versions) + ndpi_serialize_string_string(serializer, "tls_supported_versions", flow->protos.tls_quic_stun.tls_quic.tls_supported_versions); } ndpi_serialize_end_of_block(serializer); break; @@ -1272,25 +1272,25 @@ int ndpi_dpi2json(struct ndpi_detection_module_struct *ndpi_struct, break; case NDPI_PROTOCOL_TLS: - if(flow->protos.stun_ssl.ssl.ssl_version) { + if(flow->protos.tls_quic_stun.tls_quic.ssl_version) { char notBefore[32], notAfter[32]; struct tm a, b, *before = NULL, *after = NULL; u_int i, off; u_int8_t unknown_tls_version; - char *version = ndpi_ssl_version2str(flow, flow->protos.stun_ssl.ssl.ssl_version, &unknown_tls_version); + char *version = ndpi_ssl_version2str(flow, flow->protos.tls_quic_stun.tls_quic.ssl_version, &unknown_tls_version); - if(flow->protos.stun_ssl.ssl.notBefore) - before = gmtime_r((const time_t *)&flow->protos.stun_ssl.ssl.notBefore, &a); - if(flow->protos.stun_ssl.ssl.notAfter) - after = gmtime_r((const time_t *)&flow->protos.stun_ssl.ssl.notAfter, &b); + if(flow->protos.tls_quic_stun.tls_quic.notBefore) + before = gmtime_r((const time_t *)&flow->protos.tls_quic_stun.tls_quic.notBefore, &a); + if(flow->protos.tls_quic_stun.tls_quic.notAfter) + after = gmtime_r((const time_t *)&flow->protos.tls_quic_stun.tls_quic.notAfter, &b); if(!unknown_tls_version) { ndpi_serialize_start_of_block(serializer, "tls"); ndpi_serialize_string_string(serializer, "version", version); ndpi_serialize_string_string(serializer, "client_requested_server_name", - flow->protos.stun_ssl.ssl.client_requested_server_name); - if(flow->protos.stun_ssl.ssl.server_names) - ndpi_serialize_string_string(serializer, "server_names", flow->protos.stun_ssl.ssl.server_names); + flow->protos.tls_quic_stun.tls_quic.client_requested_server_name); + if(flow->protos.tls_quic_stun.tls_quic.server_names) + ndpi_serialize_string_string(serializer, "server_names", flow->protos.tls_quic_stun.tls_quic.server_names); if(before) { strftime(notBefore, sizeof(notBefore), "%Y-%m-%d %H:%M:%S", before); @@ -1301,27 +1301,27 @@ int ndpi_dpi2json(struct ndpi_detection_module_struct *ndpi_struct, strftime(notAfter, sizeof(notAfter), "%Y-%m-%d %H:%M:%S", after); ndpi_serialize_string_string(serializer, "notafter", notAfter); } - ndpi_serialize_string_string(serializer, "ja3", flow->protos.stun_ssl.ssl.ja3_client); - ndpi_serialize_string_string(serializer, "ja3s", flow->protos.stun_ssl.ssl.ja3_server); - ndpi_serialize_string_uint32(serializer, "unsafe_cipher", flow->protos.stun_ssl.ssl.server_unsafe_cipher); - ndpi_serialize_string_string(serializer, "cipher", ndpi_cipher2str(flow->protos.stun_ssl.ssl.server_cipher)); + ndpi_serialize_string_string(serializer, "ja3", flow->protos.tls_quic_stun.tls_quic.ja3_client); + ndpi_serialize_string_string(serializer, "ja3s", flow->protos.tls_quic_stun.tls_quic.ja3_server); + ndpi_serialize_string_uint32(serializer, "unsafe_cipher", flow->protos.tls_quic_stun.tls_quic.server_unsafe_cipher); + ndpi_serialize_string_string(serializer, "cipher", ndpi_cipher2str(flow->protos.tls_quic_stun.tls_quic.server_cipher)); - if(flow->protos.stun_ssl.ssl.issuerDN) - ndpi_serialize_string_string(serializer, "issuerDN", flow->protos.stun_ssl.ssl.issuerDN); + if(flow->protos.tls_quic_stun.tls_quic.issuerDN) + ndpi_serialize_string_string(serializer, "issuerDN", flow->protos.tls_quic_stun.tls_quic.issuerDN); - if(flow->protos.stun_ssl.ssl.subjectDN) - ndpi_serialize_string_string(serializer, "issuerDN", flow->protos.stun_ssl.ssl.subjectDN); + if(flow->protos.tls_quic_stun.tls_quic.subjectDN) + ndpi_serialize_string_string(serializer, "issuerDN", flow->protos.tls_quic_stun.tls_quic.subjectDN); - if(flow->protos.stun_ssl.ssl.alpn) - ndpi_serialize_string_string(serializer, "alpn", flow->protos.stun_ssl.ssl.alpn); + if(flow->protos.tls_quic_stun.tls_quic.alpn) + ndpi_serialize_string_string(serializer, "alpn", flow->protos.tls_quic_stun.tls_quic.alpn); - if(flow->protos.stun_ssl.ssl.tls_supported_versions) - ndpi_serialize_string_string(serializer, "tls_supported_versions", flow->protos.stun_ssl.ssl.tls_supported_versions); + if(flow->protos.tls_quic_stun.tls_quic.tls_supported_versions) + ndpi_serialize_string_string(serializer, "tls_supported_versions", flow->protos.tls_quic_stun.tls_quic.tls_supported_versions); - if(flow->protos.stun_ssl.ssl.sha1_certificate_fingerprint[0] != '\0') { + if(flow->protos.tls_quic_stun.tls_quic.sha1_certificate_fingerprint[0] != '\0') { for(i=0, off=0; i<20; i++) { int rc = snprintf(&buf[off], sizeof(buf)-off,"%s%02X", (i > 0) ? ":" : "", - flow->protos.stun_ssl.ssl.sha1_certificate_fingerprint[i] & 0xFF); + flow->protos.tls_quic_stun.tls_quic.sha1_certificate_fingerprint[i] & 0xFF); if(rc <= 0) break; else off += rc; } |