aboutsummaryrefslogtreecommitdiff
path: root/src/lib/protocols/ssl.c
Commit message (Collapse)AuthorAge
* Implemented DTLS supportLuca2019-08-08
| | | | Renamed ssl to tls
* Code cleanupLuca Deri2019-07-27
|
* Solve remaining warningsStuart Reilly2019-07-12
|
* Remvoed debug infoLuca2019-07-02
|
* Various TLS improvementsLuca Deri2019-07-02
|
* Improvemnts in SSL certificate detectionLuca Deri2019-06-30
|
* Dissection improvementsLuca Deri2019-06-27
|
* Reworked SSL cipher handlingLuca Deri2019-06-16
|
* Fixed MySQL dissectorLuca Deri2019-05-28
| | | | | SSL dissector now reports the protocol version Fixed bug in ndpiReader that ivalidates in some cases the protocl dissection and used to slow down the dissection
* Added ndpi_is_safe_ssl_cipher(0 callLuca Deri2019-05-23
|
* Disabled debugLuca Deri2019-05-22
|
* Update SSL server ciphersLuca Deri2019-05-22
|
* SSL certificate analysis improvementLuca Deri2019-05-20
|
* Implements #705Luca Deri2019-05-20
|
* Removed debug codeLuca Deri2019-05-20
|
* Fixed JA3 decodingLuca Deri2019-05-20
| | | | Made ndpi_process_extra_packet() optional
* JA3 hardeding codeLuca2019-05-15
|
* Skept GREASE in SSL JA3 fingerprintLuca Deri2019-05-13
|
* JA3 fixesLuca Deri2019-05-12
|
* Disabled debug tracesLuca Deri2019-05-11
|
* Initial JA3 support (https://github.com/salesforce/ja3) for SSLLuca Deri2019-05-11
|
* SSL cleanupLuca Deri2019-03-25
|
* we only need one dot to confirm it is a valid domain namechiehminw2019-03-20
| | | | | | | github.com is valid but can not be retreive by server certificate parsing Signed-off-by: chiehminw <chiehminw@synology.com>
* retreive ssl certificate origanizationchiehminw2019-03-20
| | | | Signed-off-by: chiehminw <chiehminw@synology.com>
* Proto cleanupLuca2019-03-08
|
* Removed debug codeLuca Deri2019-01-17
|
* Merge branch 'dev' of https://github.com/ntop/nDPI into devLuca Deri2019-01-17
|\
| * Warnign fixesLuca Deri2019-01-17
| | | | | | | | Updated test results
* | Removed this party LRU and replaced with home grownLuca Deri2019-01-17
|/
* Merge pull request #636 from 2miksyn/devLuca Deri2018-11-14
|\ | | | | Improve SSL detection, prevent false positive SSL detection
| * Improve SSL detection, prevent false positive SSL detectionMikhail Smirnov2018-11-09
| |
* | Merge branch 'dev' of https://github.com/ntop/nDPI into devkyrol2018-11-09
|\|
| * Improved SSL decodingLuca Deri2018-11-03
| |
* | FIX missing Application Data pkt for TLSkyrol2018-11-09
|/
* Fixes #601Luca2018-09-11
|
* Completed custom category implementationLuca Deri2018-08-16
|
* Major code cleanupLuca2018-07-21
| | | | Converted some not popular protocols to NDPI_PROTOCOL_GENERIC with category detection
* Fix for https://github.com/ntop/nDPI/issues/572Luca Deri2018-05-28
|
* Update ssl.cDaniele De Lorenzi2018-05-21
| | | Added support for SMTPS on port 587
* Added ndpi_set_detection_preferences() APi callLuca Deri2018-05-14
|
* Merge branch 'dev' into devMichele Campus2017-12-07
|\
| * Fixes #485Luca Deri2017-11-03
| |
* | Refactoring the debugging output.Vitaly Lavrov2017-10-26
|/ | | | | | | | | | | | | | levels of debug output: 0 - ERROR: Only for errors. 1 - TRACE: Start of each packets and if found protocol. 2 - DEBUG: Start of searching each protocol and excluding protocols. 3 - DEBUG_EXTRA: For all other messages. Added field ndpi_struct->debug_logging for enable debug output of each protocols. Simple macros for debugging output are added: NDPI_LOG_ERR(), NDPI_LOG_INFO(), NDPI_LOG_DBG(), NDPI_LOG_DBG2(), NDPI_EXCLUDE_PROTO()
* Implementation for extra packet processing if desiredMicah Lyle2017-07-17
|
* Fixed tcp ssl case where client cert got set but server did notMicah Lyle2017-07-14
|
* add check for whatsapp in sslCampus2017-06-09
|
* delete check for old protocolCampus2017-05-11
|
* SSL server certificate is now detectedLuca Deri2017-03-21
|
* change behaviour for https://github.com/ntop/nDPI/issues/344 - fix skype ↵Campus2017-03-15
| | | | detection deleting parts that detect host name and ip addr (duplicate behaviour) - improved any detection after fix - added skype host name
* spelling: unencryptedJosh Soref2017-03-12
|