2004-07-20 09:11:40 +00:00
|
|
|
/* Do not modify this file. */
|
|
|
|
/* It is created automatically by the ASN.1 to Ethereal dissector compiler */
|
2004-09-13 12:03:36 +00:00
|
|
|
/* ./packet-x509af.c */
|
2004-12-12 01:29:21 +00:00
|
|
|
/* ../../tools/asn2eth.py -X -b -e -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
/* Input file: packet-x509af-template.c */
|
|
|
|
|
|
|
|
/* packet-x509af.c
|
|
|
|
* Routines for X.509 Authentication Framework packet dissection
|
2004-11-30 04:08:16 +00:00
|
|
|
* Ronnie Sahlberg 2004
|
2004-07-20 09:11:40 +00:00
|
|
|
*
|
2004-12-12 01:14:03 +00:00
|
|
|
* $Id: packet-x509af-template.c 12624 2004-11-30 04:08:16Z sahlberg $
|
2004-07-20 09:11:40 +00:00
|
|
|
*
|
|
|
|
* Ethereal - Network traffic analyzer
|
|
|
|
* By Gerald Combs <gerald@ethereal.com>
|
|
|
|
* Copyright 1998 Gerald Combs
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version 2
|
|
|
|
* of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
# include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <glib.h>
|
|
|
|
#include <epan/packet.h>
|
|
|
|
#include <epan/conversation.h>
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "packet-ber.h"
|
|
|
|
#include "packet-x509af.h"
|
|
|
|
#include "packet-x509ce.h"
|
|
|
|
#include "packet-x509if.h"
|
2004-07-22 07:51:47 +00:00
|
|
|
#include "packet-x509sat.h"
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
#define PNAME "X.509 Authentication Framework"
|
|
|
|
#define PSNAME "X509AF"
|
|
|
|
#define PFNAME "x509af"
|
|
|
|
|
|
|
|
/* Initialize the protocol and registered fields */
|
2004-07-24 22:16:41 +00:00
|
|
|
static int proto_x509af = -1;
|
|
|
|
static int hf_x509af_algorithm_id = -1;
|
|
|
|
static int hf_x509af_extension_id = -1;
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
/*--- Included file: packet-x509af-hf.c ---*/
|
|
|
|
|
2004-09-13 12:03:36 +00:00
|
|
|
static int hf_x509af_Certificate_PDU = -1; /* Certificate */
|
|
|
|
static int hf_x509af_CertificatePair_PDU = -1; /* CertificatePair */
|
|
|
|
static int hf_x509af_CertificateList_PDU = -1; /* CertificateList */
|
|
|
|
static int hf_x509af_AttributeCertificate_PDU = -1; /* AttributeCertificate */
|
2004-07-20 09:11:40 +00:00
|
|
|
static int hf_x509af_signedCertificate = -1; /* T_signedCertificate */
|
|
|
|
static int hf_x509af_version = -1; /* Version */
|
|
|
|
static int hf_x509af_serialNumber = -1; /* CertificateSerialNumber */
|
|
|
|
static int hf_x509af_signature = -1; /* AlgorithmIdentifier */
|
|
|
|
static int hf_x509af_issuer = -1; /* Name */
|
|
|
|
static int hf_x509af_validity = -1; /* Validity */
|
|
|
|
static int hf_x509af_subject = -1; /* Name */
|
|
|
|
static int hf_x509af_subjectPublicKeyInfo = -1; /* SubjectPublicKeyInfo */
|
|
|
|
static int hf_x509af_issuerUniqueIdentifier = -1; /* UniqueIdentifier */
|
|
|
|
static int hf_x509af_subjectUniqueIdentifier = -1; /* UniqueIdentifier */
|
|
|
|
static int hf_x509af_extensions = -1; /* Extensions */
|
|
|
|
static int hf_x509af_algorithmIdentifier = -1; /* AlgorithmIdentifier */
|
|
|
|
static int hf_x509af_encrypted = -1; /* BIT_STRING */
|
2004-10-30 02:18:44 +00:00
|
|
|
static int hf_x509af_algorithmId = -1; /* T_algorithmId */
|
|
|
|
static int hf_x509af_parameters = -1; /* T_parameters */
|
2004-07-20 09:11:40 +00:00
|
|
|
static int hf_x509af_notBefore = -1; /* Time */
|
|
|
|
static int hf_x509af_notAfter = -1; /* Time */
|
|
|
|
static int hf_x509af_algorithm = -1; /* AlgorithmIdentifier */
|
|
|
|
static int hf_x509af_subjectPublicKey = -1; /* BIT_STRING */
|
|
|
|
static int hf_x509af_utcTime = -1; /* UTCTime */
|
|
|
|
static int hf_x509af_generalizedTime = -1; /* GeneralizedTime */
|
|
|
|
static int hf_x509af_Extensions_item = -1; /* Extension */
|
2004-10-30 02:36:58 +00:00
|
|
|
static int hf_x509af_extnId = -1; /* T_extnId */
|
|
|
|
static int hf_x509af_critical = -1; /* BOOLEAN */
|
|
|
|
static int hf_x509af_extnValue = -1; /* T_extnValue */
|
2004-07-20 09:11:40 +00:00
|
|
|
static int hf_x509af_userCertificate = -1; /* Certificate */
|
|
|
|
static int hf_x509af_certificationPath = -1; /* ForwardCertificationPath */
|
|
|
|
static int hf_x509af_ForwardCertificationPath_item = -1; /* CrossCertificates */
|
|
|
|
static int hf_x509af_CrossCertificates_item = -1; /* Certificate */
|
|
|
|
static int hf_x509af_theCACertificates = -1; /* SEQUNCE_OF_CertificatePair */
|
|
|
|
static int hf_x509af_theCACertificates_item = -1; /* CertificatePair */
|
|
|
|
static int hf_x509af_issuedByThisCA = -1; /* Certificate */
|
|
|
|
static int hf_x509af_issuedToThisCA = -1; /* Certificate */
|
|
|
|
static int hf_x509af_signedCertificateList = -1; /* T_signedCertificateList */
|
|
|
|
static int hf_x509af_thisUpdate = -1; /* Time */
|
|
|
|
static int hf_x509af_nextUpdate = -1; /* Time */
|
|
|
|
static int hf_x509af_revokedCertificates = -1; /* T_revokedCertificates */
|
|
|
|
static int hf_x509af_revokedCertificates_item = -1; /* T_revokedCertificates_item */
|
2004-10-13 00:16:42 +00:00
|
|
|
static int hf_x509af_revokedUserCertificate = -1; /* CertificateSerialNumber */
|
2004-07-20 09:11:40 +00:00
|
|
|
static int hf_x509af_revocationDate = -1; /* Time */
|
|
|
|
static int hf_x509af_crlEntryExtensions = -1; /* Extensions */
|
|
|
|
static int hf_x509af_crlExtensions = -1; /* Extensions */
|
|
|
|
static int hf_x509af_attributeCertificate = -1; /* AttributeCertificate */
|
|
|
|
static int hf_x509af_acPath = -1; /* SEQUNCE_OF_ACPathData */
|
|
|
|
static int hf_x509af_acPath_item = -1; /* ACPathData */
|
|
|
|
static int hf_x509af_certificate = -1; /* Certificate */
|
|
|
|
static int hf_x509af_signedAttributeCertificateInfo = -1; /* AttributeCertificateInfo */
|
|
|
|
static int hf_x509af_info_subject = -1; /* InfoSubject */
|
|
|
|
static int hf_x509af_baseCertificateID = -1; /* IssuerSerial */
|
|
|
|
static int hf_x509af_infoSubjectName = -1; /* GeneralNames */
|
2004-10-13 00:16:42 +00:00
|
|
|
static int hf_x509af_issuerName = -1; /* GeneralNames */
|
2004-07-20 09:11:40 +00:00
|
|
|
static int hf_x509af_attCertValidityPeriod = -1; /* AttCertValidityPeriod */
|
|
|
|
static int hf_x509af_attributes = -1; /* SEQUNCE_OF_Attribute */
|
|
|
|
static int hf_x509af_attributes_item = -1; /* Attribute */
|
|
|
|
static int hf_x509af_issuerUniqueID = -1; /* UniqueIdentifier */
|
|
|
|
static int hf_x509af_serial = -1; /* CertificateSerialNumber */
|
|
|
|
static int hf_x509af_issuerUID = -1; /* UniqueIdentifier */
|
|
|
|
static int hf_x509af_notBeforeTime = -1; /* GeneralizedTime */
|
|
|
|
static int hf_x509af_notAfterTime = -1; /* GeneralizedTime */
|
|
|
|
static int hf_x509af_assertion_subject = -1; /* AssertionSubject */
|
|
|
|
static int hf_x509af_assertionSubjectName = -1; /* Name */
|
|
|
|
static int hf_x509af_assertionIssuer = -1; /* Name */
|
|
|
|
static int hf_x509af_attCertValidity = -1; /* GeneralizedTime */
|
|
|
|
static int hf_x509af_attType = -1; /* SET_OF_AttributeType */
|
|
|
|
static int hf_x509af_attType_item = -1; /* AttributeType */
|
|
|
|
|
|
|
|
/*--- End of included file: packet-x509af-hf.c ---*/
|
|
|
|
|
|
|
|
|
|
|
|
/* Initialize the subtree pointers */
|
2004-11-30 04:08:16 +00:00
|
|
|
static gint ett_pkix_crl = -1;
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
/*--- Included file: packet-x509af-ett.c ---*/
|
|
|
|
|
|
|
|
static gint ett_x509af_Certificate = -1;
|
|
|
|
static gint ett_x509af_T_signedCertificate = -1;
|
|
|
|
static gint ett_x509af_AlgorithmIdentifier = -1;
|
|
|
|
static gint ett_x509af_Validity = -1;
|
|
|
|
static gint ett_x509af_SubjectPublicKeyInfo = -1;
|
|
|
|
static gint ett_x509af_Time = -1;
|
|
|
|
static gint ett_x509af_Extensions = -1;
|
|
|
|
static gint ett_x509af_Extension = -1;
|
|
|
|
static gint ett_x509af_Certificates = -1;
|
|
|
|
static gint ett_x509af_ForwardCertificationPath = -1;
|
|
|
|
static gint ett_x509af_CrossCertificates = -1;
|
|
|
|
static gint ett_x509af_CertificationPath = -1;
|
|
|
|
static gint ett_x509af_SEQUNCE_OF_CertificatePair = -1;
|
|
|
|
static gint ett_x509af_CertificatePair = -1;
|
|
|
|
static gint ett_x509af_CertificateList = -1;
|
|
|
|
static gint ett_x509af_T_signedCertificateList = -1;
|
|
|
|
static gint ett_x509af_T_revokedCertificates = -1;
|
|
|
|
static gint ett_x509af_T_revokedCertificates_item = -1;
|
|
|
|
static gint ett_x509af_AttributeCertificationPath = -1;
|
|
|
|
static gint ett_x509af_SEQUNCE_OF_ACPathData = -1;
|
|
|
|
static gint ett_x509af_ACPathData = -1;
|
|
|
|
static gint ett_x509af_AttributeCertificate = -1;
|
|
|
|
static gint ett_x509af_AttributeCertificateInfo = -1;
|
|
|
|
static gint ett_x509af_InfoSubject = -1;
|
|
|
|
static gint ett_x509af_SEQUNCE_OF_Attribute = -1;
|
|
|
|
static gint ett_x509af_IssuerSerial = -1;
|
|
|
|
static gint ett_x509af_AttCertValidityPeriod = -1;
|
|
|
|
static gint ett_x509af_AttributeCertificateAssertion = -1;
|
|
|
|
static gint ett_x509af_AssertionSubject = -1;
|
|
|
|
static gint ett_x509af_SET_OF_AttributeType = -1;
|
|
|
|
|
|
|
|
/*--- End of included file: packet-x509af-ett.c ---*/
|
|
|
|
|
|
|
|
|
2004-10-30 02:18:44 +00:00
|
|
|
static char algorithm_id[64]; /*64 chars should be long enough? */
|
|
|
|
|
2004-07-20 09:11:40 +00:00
|
|
|
|
2004-07-24 22:16:41 +00:00
|
|
|
static char extension_id[64]; /*64 chars should be long enough? */
|
|
|
|
|
|
|
|
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
/*--- Included file: packet-x509af-fn.c ---*/
|
|
|
|
|
2004-07-29 09:52:14 +00:00
|
|
|
/*--- Fields for imported types ---*/
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
static int dissect_issuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuer);
|
|
|
|
}
|
|
|
|
static int dissect_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_subject);
|
|
|
|
}
|
|
|
|
static int dissect_issuerUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueIdentifier);
|
|
|
|
}
|
|
|
|
static int dissect_subjectUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_subjectUniqueIdentifier);
|
|
|
|
}
|
|
|
|
static int dissect_infoSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_infoSubjectName);
|
|
|
|
}
|
2004-10-13 00:16:42 +00:00
|
|
|
static int dissect_issuerName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerName);
|
2004-07-20 09:11:40 +00:00
|
|
|
}
|
|
|
|
static int dissect_attributes_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509if_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes_item);
|
|
|
|
}
|
|
|
|
static int dissect_issuerUniqueID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueID);
|
|
|
|
}
|
|
|
|
static int dissect_issuerUID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUID);
|
|
|
|
}
|
|
|
|
static int dissect_assertionSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionSubjectName);
|
|
|
|
}
|
|
|
|
static int dissect_assertionIssuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionIssuer);
|
|
|
|
}
|
|
|
|
static int dissect_attType_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509if_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType_item);
|
|
|
|
}
|
|
|
|
|
2004-07-29 09:52:14 +00:00
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
const value_string Version_vals[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ 0, "v1" },
|
|
|
|
{ 1, "v2" },
|
|
|
|
{ 2, "v3" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_Version(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-12-12 01:14:03 +00:00
|
|
|
offset = dissect_ber_integer(implicit_tag, pinfo, tree, tvb, offset, hf_index, NULL);
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_version(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Version(FALSE, tvb, offset, pinfo, tree, hf_x509af_version);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_CertificateSerialNumber(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-12-12 01:14:03 +00:00
|
|
|
offset = dissect_ber_integer(implicit_tag, pinfo, tree, tvb, offset, hf_index, NULL);
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_serialNumber(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serialNumber);
|
|
|
|
}
|
2004-10-13 00:16:42 +00:00
|
|
|
static int dissect_revokedUserCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedUserCertificate);
|
2004-07-20 09:11:40 +00:00
|
|
|
}
|
|
|
|
static int dissect_serial(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serial);
|
|
|
|
}
|
|
|
|
|
2004-10-30 02:18:44 +00:00
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_algorithmId(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-10-30 02:18:44 +00:00
|
|
|
offset = dissect_ber_object_identifier(FALSE, pinfo, tree, tvb, offset,
|
|
|
|
hf_x509af_algorithm_id, algorithm_id);
|
|
|
|
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_algorithmId(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_algorithmId(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithmId);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-11-06 02:03:14 +00:00
|
|
|
|
2004-10-30 02:18:44 +00:00
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_parameters(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-10-30 02:18:44 +00:00
|
|
|
offset=call_ber_oid_callback(algorithm_id, tvb, offset, pinfo, tree);
|
|
|
|
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_parameters(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_parameters(FALSE, tvb, offset, pinfo, tree, hf_x509af_parameters);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t AlgorithmIdentifier_sequence[] = {
|
2004-10-30 02:18:44 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_algorithmId },
|
|
|
|
{ BER_CLASS_ANY, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_parameters },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_AlgorithmIdentifier(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-10-30 02:18:44 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
AlgorithmIdentifier_sequence, hf_index, ett_x509af_AlgorithmIdentifier);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
2004-07-20 09:11:40 +00:00
|
|
|
static int dissect_signature(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_signature);
|
|
|
|
}
|
|
|
|
static int dissect_algorithmIdentifier(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithmIdentifier);
|
|
|
|
}
|
|
|
|
static int dissect_algorithm(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithm);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_UTCTime(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTCTime,
|
|
|
|
pinfo, tree, tvb, offset, hf_index,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_utcTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_UTCTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_utcTime);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_GeneralizedTime(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-12-12 22:47:24 +00:00
|
|
|
offset = dissect_ber_GeneralizedTime(implicit_tag, pinfo, tree, tvb, offset, hf_index);
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_generalizedTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_generalizedTime);
|
|
|
|
}
|
|
|
|
static int dissect_notBeforeTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBeforeTime);
|
|
|
|
}
|
|
|
|
static int dissect_notAfterTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfterTime);
|
|
|
|
}
|
|
|
|
static int dissect_attCertValidity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidity);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
const value_string Time_vals[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ 0, "utcTime" },
|
|
|
|
{ 1, "generalizedTime" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_choice_t Time_choice[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ 0, BER_CLASS_UNI, BER_UNI_TAG_UTCTime, BER_FLAGS_NOOWNTAG, dissect_utcTime },
|
|
|
|
{ 1, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_generalizedTime },
|
|
|
|
{ 0, 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_Time(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_choice(pinfo, tree, tvb, offset,
|
|
|
|
Time_choice, hf_index, ett_x509af_Time);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_notBefore(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBefore);
|
|
|
|
}
|
|
|
|
static int dissect_notAfter(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfter);
|
|
|
|
}
|
|
|
|
static int dissect_thisUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_thisUpdate);
|
|
|
|
}
|
|
|
|
static int dissect_nextUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_nextUpdate);
|
|
|
|
}
|
|
|
|
static int dissect_revocationDate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_revocationDate);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t Validity_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notBefore },
|
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notAfter },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_Validity(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
Validity_sequence, hf_index, ett_x509af_Validity);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_validity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Validity(FALSE, tvb, offset, pinfo, tree, hf_x509af_validity);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_BIT_STRING(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_bitstring(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
NULL, hf_index, -1,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_encrypted(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_encrypted);
|
|
|
|
}
|
|
|
|
static int dissect_subjectPublicKey(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKey);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t SubjectPublicKeyInfo_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithm },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKey },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-09-16 09:01:20 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_SubjectPublicKeyInfo(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
SubjectPublicKeyInfo_sequence, hf_index, ett_x509af_SubjectPublicKeyInfo);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_subjectPublicKeyInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_SubjectPublicKeyInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKeyInfo);
|
|
|
|
}
|
|
|
|
|
2004-10-30 02:36:58 +00:00
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_extnId(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-10-30 02:36:58 +00:00
|
|
|
offset = dissect_ber_object_identifier(FALSE, pinfo, tree, tvb, offset,
|
|
|
|
hf_x509af_extension_id, extension_id);
|
|
|
|
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_extnId(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_extnId(FALSE, tvb, offset, pinfo, tree, hf_x509af_extnId);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_BOOLEAN(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-10-30 02:36:58 +00:00
|
|
|
offset = dissect_ber_boolean(pinfo, tree, tvb, offset, hf_index);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_critical(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_BOOLEAN(FALSE, tvb, offset, pinfo, tree, hf_x509af_critical);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_extnValue(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-10-30 02:36:58 +00:00
|
|
|
guint8 class;
|
|
|
|
gboolean pc, ind;
|
|
|
|
guint32 tag;
|
|
|
|
guint32 len;
|
|
|
|
/* skip past the T and L */
|
|
|
|
offset = dissect_ber_identifier(pinfo, tree, tvb, offset, &class, &pc, &tag);
|
|
|
|
offset = dissect_ber_length(pinfo, tree, tvb, offset, &len, &ind);
|
|
|
|
offset=call_ber_oid_callback(extension_id, tvb, offset, pinfo, tree);
|
|
|
|
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_extnValue(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_extnValue(FALSE, tvb, offset, pinfo, tree, hf_x509af_extnValue);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t Extension_sequence[] = {
|
2004-10-30 02:36:58 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_extnId },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_BOOLEAN, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_critical },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_extnValue },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_Extension(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-10-30 02:36:58 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
Extension_sequence, hf_index, ett_x509af_Extension);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
2004-07-20 09:11:40 +00:00
|
|
|
static int dissect_Extensions_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Extension(FALSE, tvb, offset, pinfo, tree, hf_x509af_Extensions_item);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t Extensions_sequence_of[1] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_Extensions_item },
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_Extensions(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
Extensions_sequence_of, hf_index, ett_x509af_Extensions);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_extensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_extensions);
|
|
|
|
}
|
|
|
|
static int dissect_crlEntryExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlEntryExtensions);
|
|
|
|
}
|
|
|
|
static int dissect_crlExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlExtensions);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t T_signedCertificate_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_version },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
|
2004-11-21 10:00:40 +00:00
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_issuer },
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_validity },
|
2004-11-21 10:00:40 +00:00
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_subject },
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKeyInfo },
|
|
|
|
{ BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_issuerUniqueIdentifier_impl },
|
|
|
|
{ BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_subjectUniqueIdentifier_impl },
|
|
|
|
{ BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_extensions },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_signedCertificate(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
T_signedCertificate_sequence, hf_index, ett_x509af_T_signedCertificate);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_signedCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_signedCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificate);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t Certificate_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificate },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_Certificate(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
Certificate_sequence, hf_index, ett_x509af_Certificate);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_userCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_userCertificate);
|
|
|
|
}
|
|
|
|
static int dissect_CrossCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_CrossCertificates_item);
|
|
|
|
}
|
|
|
|
static int dissect_issuedByThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedByThisCA);
|
|
|
|
}
|
|
|
|
static int dissect_issuedToThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedToThisCA);
|
|
|
|
}
|
|
|
|
static int dissect_certificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificate);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t CrossCertificates_set_of[1] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_CrossCertificates_item },
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_CrossCertificates(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
CrossCertificates_set_of, hf_index, ett_x509af_CrossCertificates);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_ForwardCertificationPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_CrossCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_ForwardCertificationPath_item);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t ForwardCertificationPath_sequence_of[1] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SET, BER_FLAGS_NOOWNTAG, dissect_ForwardCertificationPath_item },
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_ForwardCertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
ForwardCertificationPath_sequence_of, hf_index, ett_x509af_ForwardCertificationPath);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_certificationPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_ForwardCertificationPath(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificationPath);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t Certificates_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_certificationPath },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-07-24 22:53:27 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_Certificates(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
Certificates_sequence, hf_index, ett_x509af_Certificates);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t CertificatePair_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_issuedByThisCA },
|
|
|
|
{ BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_issuedToThisCA },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_CertificatePair(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
CertificatePair_sequence, hf_index, ett_x509af_CertificatePair);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_theCACertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates_item);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t SEQUNCE_OF_CertificatePair_sequence_of[1] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_theCACertificates_item },
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_SEQUNCE_OF_CertificatePair(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
SEQUNCE_OF_CertificatePair_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_CertificatePair);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_theCACertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_SEQUNCE_OF_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t CertificationPath_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_theCACertificates },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-07-24 22:59:02 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_CertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
CertificationPath_sequence, hf_index, ett_x509af_CertificationPath);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t T_revokedCertificates_item_sequence[] = {
|
2004-10-13 00:16:42 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_revokedUserCertificate },
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_revocationDate },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_crlEntryExtensions },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_revokedCertificates_item(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
T_revokedCertificates_item_sequence, hf_index, ett_x509af_T_revokedCertificates_item);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_revokedCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_revokedCertificates_item(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates_item);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t T_revokedCertificates_sequence_of[1] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_revokedCertificates_item },
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_revokedCertificates(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
T_revokedCertificates_sequence_of, hf_index, ett_x509af_T_revokedCertificates);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_revokedCertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_revokedCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t T_signedCertificateList_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
|
2004-11-21 10:00:40 +00:00
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_issuer },
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_thisUpdate },
|
|
|
|
{ BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_nextUpdate },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_revokedCertificates },
|
|
|
|
{ BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_crlExtensions },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_T_signedCertificateList(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
T_signedCertificateList_sequence, hf_index, ett_x509af_T_signedCertificateList);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_signedCertificateList(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_T_signedCertificateList(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificateList);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t CertificateList_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificateList },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_CertificateList(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
CertificateList_sequence, hf_index, ett_x509af_CertificateList);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t IssuerSerial_sequence[] = {
|
2004-10-13 00:16:42 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuerName },
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serial },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUID },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_IssuerSerial(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
IssuerSerial_sequence, hf_index, ett_x509af_IssuerSerial);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_baseCertificateID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_IssuerSerial(FALSE, tvb, offset, pinfo, tree, hf_x509af_baseCertificateID);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static const value_string InfoSubject_vals[] = {
|
|
|
|
{ 0, "baseCertificateID" },
|
|
|
|
{ 1, "subjectName" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_choice_t InfoSubject_choice[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ 0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
|
|
|
|
{ 1, BER_CLASS_CON, 1, 0, dissect_infoSubjectName },
|
|
|
|
{ 0, 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_InfoSubject(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_choice(pinfo, tree, tvb, offset,
|
|
|
|
InfoSubject_choice, hf_index, ett_x509af_InfoSubject);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_info_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_InfoSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_info_subject);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t AttCertValidityPeriod_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notBeforeTime },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notAfterTime },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_AttCertValidityPeriod(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
AttCertValidityPeriod_sequence, hf_index, ett_x509af_AttCertValidityPeriod);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_attCertValidityPeriod(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_AttCertValidityPeriod(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidityPeriod);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t SEQUNCE_OF_Attribute_sequence_of[1] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes_item },
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_SEQUNCE_OF_Attribute(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
SEQUNCE_OF_Attribute_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_Attribute);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_attributes(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_SEQUNCE_OF_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t AttributeCertificateInfo_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
|
|
|
|
{ BER_CLASS_CON, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_info_subject },
|
2004-10-13 00:16:42 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuerName },
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attCertValidityPeriod },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUniqueID },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_extensions },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_AttributeCertificateInfo(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
AttributeCertificateInfo_sequence, hf_index, ett_x509af_AttributeCertificateInfo);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_signedAttributeCertificateInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_AttributeCertificateInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedAttributeCertificateInfo);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t AttributeCertificate_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedAttributeCertificateInfo },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_AttributeCertificate(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
AttributeCertificate_sequence, hf_index, ett_x509af_AttributeCertificate);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_attributeCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_AttributeCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributeCertificate);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t ACPathData_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_certificate },
|
|
|
|
{ BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_attributeCertificate },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-11-21 10:16:06 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_ACPathData(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
ACPathData_sequence, hf_index, ett_x509af_ACPathData);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_acPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath_item);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t SEQUNCE_OF_ACPathData_sequence_of[1] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_acPath_item },
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_SEQUNCE_OF_ACPathData(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
SEQUNCE_OF_ACPathData_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_ACPathData);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_acPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_SEQUNCE_OF_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t AttributeCertificationPath_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributeCertificate },
|
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_acPath },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-07-24 22:59:02 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_AttributeCertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
AttributeCertificationPath_sequence, hf_index, ett_x509af_AttributeCertificationPath);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static const value_string AssertionSubject_vals[] = {
|
|
|
|
{ 0, "baseCertificateID" },
|
|
|
|
{ 1, "subjectName" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_choice_t AssertionSubject_choice[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ 0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
|
|
|
|
{ 1, BER_CLASS_CON, 1, 0, dissect_assertionSubjectName },
|
|
|
|
{ 0, 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_AssertionSubject(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_choice(pinfo, tree, tvb, offset,
|
|
|
|
AssertionSubject_choice, hf_index, ett_x509af_AssertionSubject);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_assertion_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_AssertionSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertion_subject);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t SET_OF_AttributeType_set_of[1] = {
|
2004-07-22 10:05:59 +00:00
|
|
|
{ BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_attType_item },
|
2004-07-20 09:11:40 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_SET_OF_AttributeType(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
SET_OF_AttributeType_set_of, hf_index, ett_x509af_SET_OF_AttributeType);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
static int dissect_attType(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
|
|
|
|
return dissect_x509af_SET_OF_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType);
|
|
|
|
}
|
|
|
|
|
2004-12-13 08:15:34 +00:00
|
|
|
static const ber_sequence_t AttributeCertificateAssertion_sequence[] = {
|
2004-07-20 09:11:40 +00:00
|
|
|
{ BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_assertion_subject },
|
|
|
|
{ BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_assertionIssuer },
|
|
|
|
{ BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL, dissect_attCertValidity },
|
|
|
|
{ BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_attType },
|
|
|
|
{ 0, 0, 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-07-24 22:59:02 +00:00
|
|
|
int
|
2004-11-20 07:11:08 +00:00
|
|
|
dissect_x509af_AttributeCertificateAssertion(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
|
2004-07-20 09:11:40 +00:00
|
|
|
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
|
|
|
|
AttributeCertificateAssertion_sequence, hf_index, ett_x509af_AttributeCertificateAssertion);
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
2004-09-13 12:03:36 +00:00
|
|
|
/*--- PDUs ---*/
|
2004-07-20 09:11:40 +00:00
|
|
|
|
2004-09-13 12:03:36 +00:00
|
|
|
static void dissect_Certificate_PDU(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) {
|
|
|
|
dissect_x509af_Certificate(FALSE, tvb, 0, pinfo, tree, hf_x509af_Certificate_PDU);
|
2004-07-24 22:30:49 +00:00
|
|
|
}
|
2004-09-13 12:03:36 +00:00
|
|
|
static void dissect_CertificatePair_PDU(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) {
|
|
|
|
dissect_x509af_CertificatePair(FALSE, tvb, 0, pinfo, tree, hf_x509af_CertificatePair_PDU);
|
2004-07-24 22:30:49 +00:00
|
|
|
}
|
2004-09-13 12:03:36 +00:00
|
|
|
static void dissect_CertificateList_PDU(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) {
|
|
|
|
dissect_x509af_CertificateList(FALSE, tvb, 0, pinfo, tree, hf_x509af_CertificateList_PDU);
|
2004-07-24 22:53:27 +00:00
|
|
|
}
|
2004-09-13 12:03:36 +00:00
|
|
|
static void dissect_AttributeCertificate_PDU(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) {
|
|
|
|
dissect_x509af_AttributeCertificate(FALSE, tvb, 0, pinfo, tree, hf_x509af_AttributeCertificate_PDU);
|
2004-07-24 22:53:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-09-13 12:03:36 +00:00
|
|
|
/*--- End of included file: packet-x509af-fn.c ---*/
|
|
|
|
|
2004-07-24 22:53:27 +00:00
|
|
|
|
|
|
|
|
2004-11-30 04:08:16 +00:00
|
|
|
static int
|
|
|
|
dissect_pkix_crl(tvbuff_t *tvb, packet_info *pinfo, proto_tree *parent_tree)
|
|
|
|
{
|
|
|
|
proto_item *item=NULL;
|
|
|
|
proto_tree *tree=NULL;
|
|
|
|
|
|
|
|
if (check_col(pinfo->cinfo, COL_PROTOCOL))
|
|
|
|
col_set_str(pinfo->cinfo, COL_PROTOCOL, "PKIX-CRL");
|
|
|
|
|
|
|
|
if (check_col(pinfo->cinfo, COL_INFO)) {
|
|
|
|
col_clear(pinfo->cinfo, COL_INFO);
|
|
|
|
|
|
|
|
col_add_fstr(pinfo->cinfo, COL_INFO, "Certificate Revocation List");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if(parent_tree){
|
|
|
|
item=proto_tree_add_text(parent_tree, tvb, 0, -1, "Certificate Revocation List");
|
|
|
|
tree = proto_item_add_subtree(item, ett_pkix_crl);
|
|
|
|
}
|
|
|
|
|
|
|
|
return dissect_x509af_CertificateList(FALSE, tvb, 0, pinfo, tree, -1);
|
|
|
|
}
|
|
|
|
|
2004-07-20 09:11:40 +00:00
|
|
|
/*--- proto_register_x509af ----------------------------------------------*/
|
|
|
|
void proto_register_x509af(void) {
|
|
|
|
|
|
|
|
/* List of fields */
|
|
|
|
static hf_register_info hf[] = {
|
|
|
|
{ &hf_x509af_algorithm_id,
|
|
|
|
{ "Algorithm Id", "x509af.algorithm.id",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"Algorithm Id", HFILL }},
|
2004-07-24 22:16:41 +00:00
|
|
|
{ &hf_x509af_extension_id,
|
|
|
|
{ "Extension Id", "x509af.extension.id",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"Extension Id", HFILL }},
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
/*--- Included file: packet-x509af-hfarr.c ---*/
|
|
|
|
|
2004-09-13 12:03:36 +00:00
|
|
|
{ &hf_x509af_Certificate_PDU,
|
|
|
|
{ "Certificate", "x509af.Certificate",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"Certificate", HFILL }},
|
|
|
|
{ &hf_x509af_CertificatePair_PDU,
|
|
|
|
{ "CertificatePair", "x509af.CertificatePair",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CertificatePair", HFILL }},
|
|
|
|
{ &hf_x509af_CertificateList_PDU,
|
|
|
|
{ "CertificateList", "x509af.CertificateList",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CertificateList", HFILL }},
|
|
|
|
{ &hf_x509af_AttributeCertificate_PDU,
|
|
|
|
{ "AttributeCertificate", "x509af.AttributeCertificate",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"AttributeCertificate", HFILL }},
|
2004-07-20 09:11:40 +00:00
|
|
|
{ &hf_x509af_signedCertificate,
|
|
|
|
{ "signedCertificate", "x509af.signedCertificate",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"Certificate/signedCertificate", HFILL }},
|
|
|
|
{ &hf_x509af_version,
|
|
|
|
{ "version", "x509af.version",
|
|
|
|
FT_INT32, BASE_DEC, VALS(Version_vals), 0,
|
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_serialNumber,
|
|
|
|
{ "serialNumber", "x509af.serialNumber",
|
|
|
|
FT_INT32, BASE_DEC, NULL, 0,
|
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_signature,
|
|
|
|
{ "signature", "x509af.signature",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_issuer,
|
|
|
|
{ "issuer", "x509af.issuer",
|
2004-07-22 10:05:59 +00:00
|
|
|
FT_UINT32, BASE_DEC, VALS(Name_vals), 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_validity,
|
|
|
|
{ "validity", "x509af.validity",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"Certificate/signedCertificate/validity", HFILL }},
|
|
|
|
{ &hf_x509af_subject,
|
|
|
|
{ "subject", "x509af.subject",
|
2004-07-22 10:05:59 +00:00
|
|
|
FT_UINT32, BASE_DEC, VALS(Name_vals), 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"Certificate/signedCertificate/subject", HFILL }},
|
|
|
|
{ &hf_x509af_subjectPublicKeyInfo,
|
|
|
|
{ "subjectPublicKeyInfo", "x509af.subjectPublicKeyInfo",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"Certificate/signedCertificate/subjectPublicKeyInfo", HFILL }},
|
|
|
|
{ &hf_x509af_issuerUniqueIdentifier,
|
|
|
|
{ "issuerUniqueIdentifier", "x509af.issuerUniqueIdentifier",
|
2004-11-21 10:00:40 +00:00
|
|
|
FT_BYTES, BASE_HEX, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"Certificate/signedCertificate/issuerUniqueIdentifier", HFILL }},
|
|
|
|
{ &hf_x509af_subjectUniqueIdentifier,
|
|
|
|
{ "subjectUniqueIdentifier", "x509af.subjectUniqueIdentifier",
|
2004-11-21 10:00:40 +00:00
|
|
|
FT_BYTES, BASE_HEX, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"Certificate/signedCertificate/subjectUniqueIdentifier", HFILL }},
|
|
|
|
{ &hf_x509af_extensions,
|
|
|
|
{ "extensions", "x509af.extensions",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_algorithmIdentifier,
|
|
|
|
{ "algorithmIdentifier", "x509af.algorithmIdentifier",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_encrypted,
|
|
|
|
{ "encrypted", "x509af.encrypted",
|
|
|
|
FT_BYTES, BASE_HEX, NULL, 0,
|
|
|
|
"", HFILL }},
|
2004-10-30 02:18:44 +00:00
|
|
|
{ &hf_x509af_algorithmId,
|
|
|
|
{ "algorithmId", "x509af.algorithmId",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"AlgorithmIdentifier/algorithmId", HFILL }},
|
|
|
|
{ &hf_x509af_parameters,
|
|
|
|
{ "parameters", "x509af.parameters",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"AlgorithmIdentifier/parameters", HFILL }},
|
2004-07-20 09:11:40 +00:00
|
|
|
{ &hf_x509af_notBefore,
|
|
|
|
{ "notBefore", "x509af.notBefore",
|
|
|
|
FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
|
|
|
|
"Validity/notBefore", HFILL }},
|
|
|
|
{ &hf_x509af_notAfter,
|
|
|
|
{ "notAfter", "x509af.notAfter",
|
|
|
|
FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
|
|
|
|
"Validity/notAfter", HFILL }},
|
|
|
|
{ &hf_x509af_algorithm,
|
|
|
|
{ "algorithm", "x509af.algorithm",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"SubjectPublicKeyInfo/algorithm", HFILL }},
|
|
|
|
{ &hf_x509af_subjectPublicKey,
|
|
|
|
{ "subjectPublicKey", "x509af.subjectPublicKey",
|
|
|
|
FT_BYTES, BASE_HEX, NULL, 0,
|
|
|
|
"SubjectPublicKeyInfo/subjectPublicKey", HFILL }},
|
|
|
|
{ &hf_x509af_utcTime,
|
|
|
|
{ "utcTime", "x509af.utcTime",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"Time/utcTime", HFILL }},
|
|
|
|
{ &hf_x509af_generalizedTime,
|
|
|
|
{ "generalizedTime", "x509af.generalizedTime",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"Time/generalizedTime", HFILL }},
|
|
|
|
{ &hf_x509af_Extensions_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.Extensions_item",
|
2004-07-20 09:11:40 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"Extensions/_item", HFILL }},
|
2004-10-30 02:36:58 +00:00
|
|
|
{ &hf_x509af_extnId,
|
|
|
|
{ "extnId", "x509af.extnId",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"Extension/extnId", HFILL }},
|
|
|
|
{ &hf_x509af_critical,
|
|
|
|
{ "critical", "x509af.critical",
|
|
|
|
FT_BOOLEAN, 8, NULL, 0,
|
|
|
|
"Extension/critical", HFILL }},
|
|
|
|
{ &hf_x509af_extnValue,
|
|
|
|
{ "extnValue", "x509af.extnValue",
|
|
|
|
FT_BYTES, BASE_HEX, NULL, 0,
|
|
|
|
"Extension/extnValue", HFILL }},
|
2004-07-20 09:11:40 +00:00
|
|
|
{ &hf_x509af_userCertificate,
|
|
|
|
{ "userCertificate", "x509af.userCertificate",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_certificationPath,
|
|
|
|
{ "certificationPath", "x509af.certificationPath",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"Certificates/certificationPath", HFILL }},
|
|
|
|
{ &hf_x509af_ForwardCertificationPath_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.ForwardCertificationPath_item",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"ForwardCertificationPath/_item", HFILL }},
|
|
|
|
{ &hf_x509af_CrossCertificates_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.CrossCertificates_item",
|
2004-07-20 09:11:40 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CrossCertificates/_item", HFILL }},
|
|
|
|
{ &hf_x509af_theCACertificates,
|
|
|
|
{ "theCACertificates", "x509af.theCACertificates",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"CertificationPath/theCACertificates", HFILL }},
|
|
|
|
{ &hf_x509af_theCACertificates_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.theCACertificates_item",
|
2004-07-20 09:11:40 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CertificationPath/theCACertificates/_item", HFILL }},
|
|
|
|
{ &hf_x509af_issuedByThisCA,
|
|
|
|
{ "issuedByThisCA", "x509af.issuedByThisCA",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CertificatePair/issuedByThisCA", HFILL }},
|
|
|
|
{ &hf_x509af_issuedToThisCA,
|
|
|
|
{ "issuedToThisCA", "x509af.issuedToThisCA",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CertificatePair/issuedToThisCA", HFILL }},
|
|
|
|
{ &hf_x509af_signedCertificateList,
|
|
|
|
{ "signedCertificateList", "x509af.signedCertificateList",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CertificateList/signedCertificateList", HFILL }},
|
|
|
|
{ &hf_x509af_thisUpdate,
|
|
|
|
{ "thisUpdate", "x509af.thisUpdate",
|
|
|
|
FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
|
|
|
|
"CertificateList/signedCertificateList/thisUpdate", HFILL }},
|
|
|
|
{ &hf_x509af_nextUpdate,
|
|
|
|
{ "nextUpdate", "x509af.nextUpdate",
|
|
|
|
FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
|
|
|
|
"CertificateList/signedCertificateList/nextUpdate", HFILL }},
|
|
|
|
{ &hf_x509af_revokedCertificates,
|
|
|
|
{ "revokedCertificates", "x509af.revokedCertificates",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"CertificateList/signedCertificateList/revokedCertificates", HFILL }},
|
|
|
|
{ &hf_x509af_revokedCertificates_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.revokedCertificates_item",
|
2004-07-20 09:11:40 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"CertificateList/signedCertificateList/revokedCertificates/_item", HFILL }},
|
2004-10-13 00:16:42 +00:00
|
|
|
{ &hf_x509af_revokedUserCertificate,
|
2004-07-20 09:11:40 +00:00
|
|
|
{ "userCertificate", "x509af.userCertificate",
|
|
|
|
FT_INT32, BASE_DEC, NULL, 0,
|
|
|
|
"CertificateList/signedCertificateList/revokedCertificates/_item/userCertificate", HFILL }},
|
|
|
|
{ &hf_x509af_revocationDate,
|
|
|
|
{ "revocationDate", "x509af.revocationDate",
|
|
|
|
FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
|
|
|
|
"CertificateList/signedCertificateList/revokedCertificates/_item/revocationDate", HFILL }},
|
|
|
|
{ &hf_x509af_crlEntryExtensions,
|
|
|
|
{ "crlEntryExtensions", "x509af.crlEntryExtensions",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"CertificateList/signedCertificateList/revokedCertificates/_item/crlEntryExtensions", HFILL }},
|
|
|
|
{ &hf_x509af_crlExtensions,
|
|
|
|
{ "crlExtensions", "x509af.crlExtensions",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"CertificateList/signedCertificateList/crlExtensions", HFILL }},
|
|
|
|
{ &hf_x509af_attributeCertificate,
|
|
|
|
{ "attributeCertificate", "x509af.attributeCertificate",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_acPath,
|
|
|
|
{ "acPath", "x509af.acPath",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificationPath/acPath", HFILL }},
|
|
|
|
{ &hf_x509af_acPath_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.acPath_item",
|
2004-07-20 09:11:40 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"AttributeCertificationPath/acPath/_item", HFILL }},
|
|
|
|
{ &hf_x509af_certificate,
|
|
|
|
{ "certificate", "x509af.certificate",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"ACPathData/certificate", HFILL }},
|
|
|
|
{ &hf_x509af_signedAttributeCertificateInfo,
|
|
|
|
{ "signedAttributeCertificateInfo", "x509af.signedAttributeCertificateInfo",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"AttributeCertificate/signedAttributeCertificateInfo", HFILL }},
|
|
|
|
{ &hf_x509af_info_subject,
|
|
|
|
{ "subject", "x509af.subject",
|
|
|
|
FT_UINT32, BASE_DEC, VALS(InfoSubject_vals), 0,
|
|
|
|
"AttributeCertificateInfo/subject", HFILL }},
|
|
|
|
{ &hf_x509af_baseCertificateID,
|
|
|
|
{ "baseCertificateID", "x509af.baseCertificateID",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_infoSubjectName,
|
|
|
|
{ "subjectName", "x509af.subjectName",
|
2004-12-12 01:29:21 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificateInfo/subject/subjectName", HFILL }},
|
2004-10-13 00:16:42 +00:00
|
|
|
{ &hf_x509af_issuerName,
|
2004-07-20 09:11:40 +00:00
|
|
|
{ "issuer", "x509af.issuer",
|
2004-12-12 01:29:21 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"", HFILL }},
|
|
|
|
{ &hf_x509af_attCertValidityPeriod,
|
|
|
|
{ "attCertValidityPeriod", "x509af.attCertValidityPeriod",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"AttributeCertificateInfo/attCertValidityPeriod", HFILL }},
|
|
|
|
{ &hf_x509af_attributes,
|
|
|
|
{ "attributes", "x509af.attributes",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificateInfo/attributes", HFILL }},
|
|
|
|
{ &hf_x509af_attributes_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.attributes_item",
|
2004-07-20 09:11:40 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
"AttributeCertificateInfo/attributes/_item", HFILL }},
|
|
|
|
{ &hf_x509af_issuerUniqueID,
|
|
|
|
{ "issuerUniqueID", "x509af.issuerUniqueID",
|
2004-11-21 10:00:40 +00:00
|
|
|
FT_BYTES, BASE_HEX, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificateInfo/issuerUniqueID", HFILL }},
|
|
|
|
{ &hf_x509af_serial,
|
|
|
|
{ "serial", "x509af.serial",
|
|
|
|
FT_INT32, BASE_DEC, NULL, 0,
|
|
|
|
"IssuerSerial/serial", HFILL }},
|
|
|
|
{ &hf_x509af_issuerUID,
|
|
|
|
{ "issuerUID", "x509af.issuerUID",
|
2004-11-21 10:00:40 +00:00
|
|
|
FT_BYTES, BASE_HEX, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"IssuerSerial/issuerUID", HFILL }},
|
|
|
|
{ &hf_x509af_notBeforeTime,
|
|
|
|
{ "notBeforeTime", "x509af.notBeforeTime",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"AttCertValidityPeriod/notBeforeTime", HFILL }},
|
|
|
|
{ &hf_x509af_notAfterTime,
|
|
|
|
{ "notAfterTime", "x509af.notAfterTime",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"AttCertValidityPeriod/notAfterTime", HFILL }},
|
|
|
|
{ &hf_x509af_assertion_subject,
|
|
|
|
{ "subject", "x509af.subject",
|
|
|
|
FT_UINT32, BASE_DEC, VALS(AssertionSubject_vals), 0,
|
|
|
|
"AttributeCertificateAssertion/subject", HFILL }},
|
|
|
|
{ &hf_x509af_assertionSubjectName,
|
|
|
|
{ "subjectName", "x509af.subjectName",
|
2004-07-22 10:05:59 +00:00
|
|
|
FT_UINT32, BASE_DEC, VALS(Name_vals), 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificateAssertion/subject/subjectName", HFILL }},
|
|
|
|
{ &hf_x509af_assertionIssuer,
|
|
|
|
{ "issuer", "x509af.issuer",
|
2004-07-22 10:05:59 +00:00
|
|
|
FT_UINT32, BASE_DEC, VALS(Name_vals), 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificateAssertion/issuer", HFILL }},
|
|
|
|
{ &hf_x509af_attCertValidity,
|
|
|
|
{ "attCertValidity", "x509af.attCertValidity",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
|
|
|
"AttributeCertificateAssertion/attCertValidity", HFILL }},
|
|
|
|
{ &hf_x509af_attType,
|
|
|
|
{ "attType", "x509af.attType",
|
2004-12-12 01:14:03 +00:00
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificateAssertion/attType", HFILL }},
|
|
|
|
{ &hf_x509af_attType_item,
|
2004-10-11 18:36:51 +00:00
|
|
|
{ "Item", "x509af.attType_item",
|
2004-07-22 10:05:59 +00:00
|
|
|
FT_STRING, BASE_NONE, NULL, 0,
|
2004-07-20 09:11:40 +00:00
|
|
|
"AttributeCertificateAssertion/attType/_item", HFILL }},
|
|
|
|
|
|
|
|
/*--- End of included file: packet-x509af-hfarr.c ---*/
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
/* List of subtrees */
|
|
|
|
static gint *ett[] = {
|
2004-11-30 04:08:16 +00:00
|
|
|
&ett_pkix_crl,
|
2004-07-20 09:11:40 +00:00
|
|
|
|
|
|
|
/*--- Included file: packet-x509af-ettarr.c ---*/
|
|
|
|
|
|
|
|
&ett_x509af_Certificate,
|
|
|
|
&ett_x509af_T_signedCertificate,
|
|
|
|
&ett_x509af_AlgorithmIdentifier,
|
|
|
|
&ett_x509af_Validity,
|
|
|
|
&ett_x509af_SubjectPublicKeyInfo,
|
|
|
|
&ett_x509af_Time,
|
|
|
|
&ett_x509af_Extensions,
|
|
|
|
&ett_x509af_Extension,
|
|
|
|
&ett_x509af_Certificates,
|
|
|
|
&ett_x509af_ForwardCertificationPath,
|
|
|
|
&ett_x509af_CrossCertificates,
|
|
|
|
&ett_x509af_CertificationPath,
|
|
|
|
&ett_x509af_SEQUNCE_OF_CertificatePair,
|
|
|
|
&ett_x509af_CertificatePair,
|
|
|
|
&ett_x509af_CertificateList,
|
|
|
|
&ett_x509af_T_signedCertificateList,
|
|
|
|
&ett_x509af_T_revokedCertificates,
|
|
|
|
&ett_x509af_T_revokedCertificates_item,
|
|
|
|
&ett_x509af_AttributeCertificationPath,
|
|
|
|
&ett_x509af_SEQUNCE_OF_ACPathData,
|
|
|
|
&ett_x509af_ACPathData,
|
|
|
|
&ett_x509af_AttributeCertificate,
|
|
|
|
&ett_x509af_AttributeCertificateInfo,
|
|
|
|
&ett_x509af_InfoSubject,
|
|
|
|
&ett_x509af_SEQUNCE_OF_Attribute,
|
|
|
|
&ett_x509af_IssuerSerial,
|
|
|
|
&ett_x509af_AttCertValidityPeriod,
|
|
|
|
&ett_x509af_AttributeCertificateAssertion,
|
|
|
|
&ett_x509af_AssertionSubject,
|
|
|
|
&ett_x509af_SET_OF_AttributeType,
|
|
|
|
|
|
|
|
/*--- End of included file: packet-x509af-ettarr.c ---*/
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Register protocol */
|
|
|
|
proto_x509af = proto_register_protocol(PNAME, PSNAME, PFNAME);
|
|
|
|
|
|
|
|
/* Register fields and subtrees */
|
|
|
|
proto_register_field_array(proto_x509af, hf, array_length(hf));
|
|
|
|
proto_register_subtree_array(ett, array_length(ett));
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*--- proto_reg_handoff_x509af -------------------------------------------*/
|
|
|
|
void proto_reg_handoff_x509af(void) {
|
2004-11-30 04:08:16 +00:00
|
|
|
dissector_handle_t pkix_crl_handle;
|
|
|
|
|
|
|
|
pkix_crl_handle = new_create_dissector_handle(dissect_pkix_crl, proto_x509af);
|
|
|
|
dissector_add_string("media_type", "application/pkix-crl", pkix_crl_handle);
|
|
|
|
|
2004-10-30 02:18:44 +00:00
|
|
|
|
|
|
|
/*--- Included file: packet-x509af-dis-tab.c ---*/
|
|
|
|
|
|
|
|
register_ber_oid_dissector("2.5.4.36", dissect_Certificate_PDU, proto_x509af, "id-at-userCertificate");
|
|
|
|
register_ber_oid_dissector("2.5.4.37", dissect_Certificate_PDU, proto_x509af, "id-at-cAcertificate");
|
|
|
|
register_ber_oid_dissector("2.5.4.38", dissect_CertificateList_PDU, proto_x509af, "id-at-authorityRevocationList");
|
|
|
|
register_ber_oid_dissector("2.5.4.39", dissect_CertificateList_PDU, proto_x509af, "id-at-certificateRevocationList");
|
|
|
|
register_ber_oid_dissector("2.5.4.40", dissect_CertificatePair_PDU, proto_x509af, "id-at-crossCertificatePair");
|
|
|
|
register_ber_oid_dissector("2.5.4.58", dissect_AttributeCertificate_PDU, proto_x509af, "id-at-attributeCertificate");
|
|
|
|
register_ber_oid_dissector("2.5.4.59", dissect_CertificateList_PDU, proto_x509af, "id-at-attributeCertificateRevocationList");
|
|
|
|
|
|
|
|
|
|
|
|
/*--- End of included file: packet-x509af-dis-tab.c ---*/
|
|
|
|
|
2004-07-29 09:52:14 +00:00
|
|
|
|
|
|
|
/*XXX these should really go to a better place but since that
|
|
|
|
I have not that ITU standard, ill put it here for the time
|
|
|
|
being.
|
|
|
|
Only implemented those algorithms that take no parameters
|
|
|
|
for the time being, ronnie
|
|
|
|
*/
|
|
|
|
/* from http://www.alvestrand.no/objectid/1.3.14.3.2.html */
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.2", dissect_ber_oid_NULL_callback, proto_x509af, "md4WithRSA");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.3", dissect_ber_oid_NULL_callback, proto_x509af, "md5WithRSA");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.4", dissect_ber_oid_NULL_callback, proto_x509af, "md4WithRSAEncryption");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.6", dissect_ber_oid_NULL_callback, proto_x509af, "desECB");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.11", dissect_ber_oid_NULL_callback, proto_x509af, "rsaSignature");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.14", dissect_ber_oid_NULL_callback, proto_x509af, "mdc2WithRSASignature");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.15", dissect_ber_oid_NULL_callback, proto_x509af, "shaWithRSASignature");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.16", dissect_ber_oid_NULL_callback, proto_x509af, "dhWithCommonModulus");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.17", dissect_ber_oid_NULL_callback, proto_x509af, "desEDE");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.18", dissect_ber_oid_NULL_callback, proto_x509af, "sha");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.19", dissect_ber_oid_NULL_callback, proto_x509af, "mdc-2");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.20", dissect_ber_oid_NULL_callback, proto_x509af, "dsaCommon");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.21", dissect_ber_oid_NULL_callback, proto_x509af, "dsaCommonWithSHA");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.22", dissect_ber_oid_NULL_callback, proto_x509af, "rsaKeyTransport");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.23", dissect_ber_oid_NULL_callback, proto_x509af, "keyed-hash-seal");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.24", dissect_ber_oid_NULL_callback, proto_x509af, "md2WithRSASignature");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.25", dissect_ber_oid_NULL_callback, proto_x509af, "md5WithRSASignature");
|
|
|
|
register_ber_oid_dissector("1.3.14.3.2.26", dissect_ber_oid_NULL_callback, proto_x509af, "SHA-1");
|
2004-07-20 09:11:40 +00:00
|
|
|
}
|
|
|
|
|