wireshark/epan/dissectors/packet-h235.c

1799 lines
74 KiB
C

/* Do not modify this file. */
/* It is created automatically by the ASN.1 to Wireshark dissector compiler */
/* .\packet-h235.c */
/* ../../tools/asn2wrs.py -e -p h235 -c h235.cnf -s packet-h235-template H235-SECURITY-MESSAGES.asn H235-SRTP.asn */
/* Input file: packet-h235-template.c */
#line 1 "packet-h235-template.c"
/* packet-h235.c
* Routines for H.235 packet dissection
* 2004 Tomas Kukosa
*
* $Id$
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*/
#ifdef HAVE_CONFIG_H
# include "config.h"
#endif
#include <glib.h>
#include <epan/packet.h>
#include <epan/conversation.h>
#include <stdio.h>
#include <string.h>
#include "packet-per.h"
#include "packet-h235.h"
#include "packet-h225.h"
#define PNAME "H235-SECURITY-MESSAGES"
#define PSNAME "H.235"
#define PFNAME "h235"
/* Initialize the protocol and registered fields */
int proto_h235 = -1;
/*--- Included file: packet-h235-hf.c ---*/
#line 1 "packet-h235-hf.c"
static int hf_h235_nonStandardIdentifier = -1; /* OBJECT_IDENTIFIER */
static int hf_h235_data = -1; /* OCTET_STRING */
static int hf_h235_halfkey = -1; /* BIT_STRING_SIZE_0_2048 */
static int hf_h235_modSize = -1; /* BIT_STRING_SIZE_0_2048 */
static int hf_h235_generator = -1; /* BIT_STRING_SIZE_0_2048 */
static int hf_h235_x = -1; /* BIT_STRING_SIZE_0_511 */
static int hf_h235_y = -1; /* BIT_STRING_SIZE_0_511 */
static int hf_h235_eckasdhp = -1; /* T_eckasdhp */
static int hf_h235_public_key = -1; /* ECpoint */
static int hf_h235_modulus = -1; /* BIT_STRING_SIZE_0_511 */
static int hf_h235_base = -1; /* ECpoint */
static int hf_h235_weierstrassA = -1; /* BIT_STRING_SIZE_0_511 */
static int hf_h235_weierstrassB = -1; /* BIT_STRING_SIZE_0_511 */
static int hf_h235_eckasdh2 = -1; /* T_eckasdh2 */
static int hf_h235_fieldSize = -1; /* BIT_STRING_SIZE_0_511 */
static int hf_h235_type = -1; /* OBJECT_IDENTIFIER */
static int hf_h235_certificatedata = -1; /* OCTET_STRING */
static int hf_h235_default = -1; /* NULL */
static int hf_h235_radius = -1; /* NULL */
static int hf_h235_dhExch = -1; /* NULL */
static int hf_h235_pwdSymEnc = -1; /* NULL */
static int hf_h235_pwdHash = -1; /* NULL */
static int hf_h235_certSign = -1; /* NULL */
static int hf_h235_ipsec = -1; /* NULL */
static int hf_h235_tls = -1; /* NULL */
static int hf_h235_nonStandard = -1; /* NonStandardParameter */
static int hf_h235_authenticationBES = -1; /* AuthenticationBES */
static int hf_h235_keyExch = -1; /* OBJECT_IDENTIFIER */
static int hf_h235_tokenOID = -1; /* OBJECT_IDENTIFIER */
static int hf_h235_timeStamp = -1; /* TimeStamp */
static int hf_h235_password = -1; /* Password */
static int hf_h235_dhkey = -1; /* DHset */
static int hf_h235_challenge = -1; /* ChallengeString */
static int hf_h235_random = -1; /* RandomVal */
static int hf_h235_certificate = -1; /* TypedCertificate */
static int hf_h235_generalID = -1; /* Identifier */
static int hf_h235_eckasdhkey = -1; /* ECKASDH */
static int hf_h235_sendersID = -1; /* Identifier */
static int hf_h235_h235Key = -1; /* H235Key */
static int hf_h235_profileInfo = -1; /* SEQUENCE_OF_ProfileElement */
static int hf_h235_profileInfo_item = -1; /* ProfileElement */
static int hf_h235_elementID = -1; /* INTEGER_0_255 */
static int hf_h235_paramS = -1; /* Params */
static int hf_h235_element = -1; /* Element */
static int hf_h235_octets = -1; /* OCTET_STRING */
static int hf_h235_integer = -1; /* INTEGER */
static int hf_h235_bits = -1; /* BIT_STRING */
static int hf_h235_name = -1; /* BMPString */
static int hf_h235_flag = -1; /* BOOLEAN */
static int hf_h235_toBeSigned = -1; /* ToBeSigned */
static int hf_h235_algorithmOID = -1; /* OBJECT_IDENTIFIER */
static int hf_h235_signaturedata = -1; /* BIT_STRING */
static int hf_h235_encryptedData = -1; /* OCTET_STRING */
static int hf_h235_hash = -1; /* BIT_STRING */
static int hf_h235_ranInt = -1; /* INTEGER */
static int hf_h235_iv8 = -1; /* IV8 */
static int hf_h235_iv16 = -1; /* IV16 */
static int hf_h235_iv = -1; /* OCTET_STRING */
static int hf_h235_clearSalt = -1; /* OCTET_STRING */
static int hf_h235_cryptoEncryptedToken = -1; /* T_cryptoEncryptedToken */
static int hf_h235_encryptedToken = -1; /* ENCRYPTEDxxx */
static int hf_h235_cryptoSignedToken = -1; /* T_cryptoSignedToken */
static int hf_h235_signedToken = -1; /* SIGNEDxxx */
static int hf_h235_cryptoHashedToken = -1; /* T_cryptoHashedToken */
static int hf_h235_hashedVals = -1; /* ClearToken */
static int hf_h235_hashedToken = -1; /* HASHEDxxx */
static int hf_h235_cryptoPwdEncr = -1; /* ENCRYPTEDxxx */
static int hf_h235_secureChannel = -1; /* KeyMaterial */
static int hf_h235_sharedSecret = -1; /* ENCRYPTEDxxx */
static int hf_h235_certProtectedKey = -1; /* SIGNEDxxx */
static int hf_h235_secureSharedSecret = -1; /* V3KeySyncMaterial */
static int hf_h235_encryptedSessionKey = -1; /* OCTET_STRING */
static int hf_h235_encryptedSaltingKey = -1; /* OCTET_STRING */
static int hf_h235_clearSaltingKey = -1; /* OCTET_STRING */
static int hf_h235_paramSsalt = -1; /* Params */
static int hf_h235_keyDerivationOID = -1; /* OBJECT_IDENTIFIER */
static int hf_h235_genericKeyMaterial = -1; /* OCTET_STRING */
static int hf_h235_SrtpCryptoCapability_item = -1; /* SrtpCryptoInfo */
static int hf_h235_cryptoSuite = -1; /* OBJECT_IDENTIFIER */
static int hf_h235_sessionParams = -1; /* SrtpSessionParameters */
static int hf_h235_allowMKI = -1; /* BOOLEAN */
static int hf_h235_SrtpKeys_item = -1; /* SrtpKeyParameters */
static int hf_h235_masterKey = -1; /* OCTET_STRING */
static int hf_h235_masterSalt = -1; /* OCTET_STRING */
static int hf_h235_lifetime = -1; /* T_lifetime */
static int hf_h235_powerOfTwo = -1; /* INTEGER */
static int hf_h235_specific = -1; /* INTEGER */
static int hf_h235_mki = -1; /* T_mki */
static int hf_h235_length = -1; /* INTEGER_1_128 */
static int hf_h235_value = -1; /* OCTET_STRING */
static int hf_h235_kdr = -1; /* INTEGER_0_24 */
static int hf_h235_unencryptedSrtp = -1; /* BOOLEAN */
static int hf_h235_unencryptedSrtcp = -1; /* BOOLEAN */
static int hf_h235_unauthenticatedSrtp = -1; /* BOOLEAN */
static int hf_h235_fecOrder = -1; /* FecOrder */
static int hf_h235_windowSizeHint = -1; /* INTEGER_64_65535 */
static int hf_h235_newParameter = -1; /* SEQUENCE_OF_GenericData */
static int hf_h235_newParameter_item = -1; /* GenericData */
static int hf_h235_fecBeforeSrtp = -1; /* NULL */
static int hf_h235_fecAfterSrtp = -1; /* NULL */
/*--- End of included file: packet-h235-hf.c ---*/
#line 48 "packet-h235-template.c"
/* Initialize the subtree pointers */
/*--- Included file: packet-h235-ett.c ---*/
#line 1 "packet-h235-ett.c"
static gint ett_h235_NonStandardParameter = -1;
static gint ett_h235_DHset = -1;
static gint ett_h235_ECpoint = -1;
static gint ett_h235_ECKASDH = -1;
static gint ett_h235_T_eckasdhp = -1;
static gint ett_h235_T_eckasdh2 = -1;
static gint ett_h235_TypedCertificate = -1;
static gint ett_h235_AuthenticationBES = -1;
static gint ett_h235_AuthenticationMechanism = -1;
static gint ett_h235_ClearToken = -1;
static gint ett_h235_SEQUENCE_OF_ProfileElement = -1;
static gint ett_h235_ProfileElement = -1;
static gint ett_h235_Element = -1;
static gint ett_h235_SIGNEDxxx = -1;
static gint ett_h235_ENCRYPTEDxxx = -1;
static gint ett_h235_HASHEDxxx = -1;
static gint ett_h235_Params = -1;
static gint ett_h235_CryptoToken = -1;
static gint ett_h235_T_cryptoEncryptedToken = -1;
static gint ett_h235_T_cryptoSignedToken = -1;
static gint ett_h235_T_cryptoHashedToken = -1;
static gint ett_h235_H235Key = -1;
static gint ett_h235_V3KeySyncMaterial = -1;
static gint ett_h235_SrtpCryptoCapability = -1;
static gint ett_h235_SrtpCryptoInfo = -1;
static gint ett_h235_SrtpKeys = -1;
static gint ett_h235_SrtpKeyParameters = -1;
static gint ett_h235_T_lifetime = -1;
static gint ett_h235_T_mki = -1;
static gint ett_h235_SrtpSessionParameters = -1;
static gint ett_h235_SEQUENCE_OF_GenericData = -1;
static gint ett_h235_FecOrder = -1;
/*--- End of included file: packet-h235-ett.c ---*/
#line 51 "packet-h235-template.c"
static guint32
dissect_xxx_ToBeSigned(tvbuff_t *tvb, guint32 offset, asn_ctx_t *actx, proto_tree *tree, int hf_index _U_) {
PER_NOT_DECODED_YET("ToBeSigned");
return offset;
}
/*--- Included file: packet-h235-fn.c ---*/
#line 1 "packet-h235-fn.c"
/*--- Fields for imported types ---*/
static int dissect_toBeSigned(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_xxx_ToBeSigned(tvb, offset, actx, tree, hf_h235_toBeSigned);
}
static int dissect_newParameter_item(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h225_GenericData(tvb, offset, actx, tree, hf_h235_newParameter_item);
}
static int
dissect_h235_ChallengeString(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
8, 128, NULL);
return offset;
}
static int dissect_challenge(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ChallengeString(tvb, offset, actx, tree, hf_h235_challenge);
}
int
dissect_h235_TimeStamp(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
1U, 4294967295U, NULL, FALSE);
return offset;
}
static int dissect_timeStamp(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_TimeStamp(tvb, offset, actx, tree, hf_h235_timeStamp);
}
static int
dissect_h235_RandomVal(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_integer(tvb, offset, actx, tree, hf_index, NULL);
return offset;
}
static int dissect_random(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_RandomVal(tvb, offset, actx, tree, hf_h235_random);
}
static int
dissect_h235_Password(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_BMPString(tvb, offset, actx, tree, hf_index,
1, 128);
return offset;
}
static int dissect_password(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_Password(tvb, offset, actx, tree, hf_h235_password);
}
static int
dissect_h235_Identifier(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_BMPString(tvb, offset, actx, tree, hf_index,
1, 128);
return offset;
}
static int dissect_generalID(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_Identifier(tvb, offset, actx, tree, hf_h235_generalID);
}
static int dissect_sendersID(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_Identifier(tvb, offset, actx, tree, hf_h235_sendersID);
}
static int
dissect_h235_KeyMaterial(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
1, 2048, FALSE);
return offset;
}
static int dissect_secureChannel(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_KeyMaterial(tvb, offset, actx, tree, hf_h235_secureChannel);
}
static int
dissect_h235_OBJECT_IDENTIFIER(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_object_identifier(tvb, offset, actx, tree, hf_index, NULL);
return offset;
}
static int dissect_nonStandardIdentifier(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, actx, tree, hf_h235_nonStandardIdentifier);
}
static int dissect_type(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, actx, tree, hf_h235_type);
}
static int dissect_keyExch(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, actx, tree, hf_h235_keyExch);
}
static int dissect_tokenOID(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, actx, tree, hf_h235_tokenOID);
}
static int dissect_algorithmOID(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, actx, tree, hf_h235_algorithmOID);
}
static int dissect_keyDerivationOID(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, actx, tree, hf_h235_keyDerivationOID);
}
static int dissect_cryptoSuite(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, actx, tree, hf_h235_cryptoSuite);
}
static int
dissect_h235_OCTET_STRING(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
NO_BOUND, NO_BOUND, NULL);
return offset;
}
static int dissect_data(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_data);
}
static int dissect_certificatedata(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_certificatedata);
}
static int dissect_octets(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_octets);
}
static int dissect_encryptedData(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_encryptedData);
}
static int dissect_iv(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_iv);
}
static int dissect_clearSalt(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_clearSalt);
}
static int dissect_encryptedSessionKey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_encryptedSessionKey);
}
static int dissect_encryptedSaltingKey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_encryptedSaltingKey);
}
static int dissect_clearSaltingKey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_clearSaltingKey);
}
static int dissect_genericKeyMaterial(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_genericKeyMaterial);
}
static int dissect_masterKey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_masterKey);
}
static int dissect_masterSalt(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_masterSalt);
}
static int dissect_value(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_OCTET_STRING(tvb, offset, actx, tree, hf_h235_value);
}
static const per_sequence_t NonStandardParameter_sequence[] = {
{ "nonStandardIdentifier" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_nonStandardIdentifier },
{ "data" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_data },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_NonStandardParameter(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_NonStandardParameter, NonStandardParameter_sequence);
return offset;
}
static int dissect_nonStandard(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NonStandardParameter(tvb, offset, actx, tree, hf_h235_nonStandard);
}
static int
dissect_h235_BIT_STRING_SIZE_0_2048(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
0, 2048, FALSE);
return offset;
}
static int dissect_halfkey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_2048(tvb, offset, actx, tree, hf_h235_halfkey);
}
static int dissect_modSize(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_2048(tvb, offset, actx, tree, hf_h235_modSize);
}
static int dissect_generator(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_2048(tvb, offset, actx, tree, hf_h235_generator);
}
static const per_sequence_t DHset_sequence[] = {
{ "halfkey" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_halfkey },
{ "modSize" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_modSize },
{ "generator" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_generator },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_DHset(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_DHset, DHset_sequence);
return offset;
}
static int dissect_dhkey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_DHset(tvb, offset, actx, tree, hf_h235_dhkey);
}
static int
dissect_h235_BIT_STRING_SIZE_0_511(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
0, 511, FALSE);
return offset;
}
static int dissect_x(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, actx, tree, hf_h235_x);
}
static int dissect_y(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, actx, tree, hf_h235_y);
}
static int dissect_modulus(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, actx, tree, hf_h235_modulus);
}
static int dissect_weierstrassA(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, actx, tree, hf_h235_weierstrassA);
}
static int dissect_weierstrassB(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, actx, tree, hf_h235_weierstrassB);
}
static int dissect_fieldSize(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, actx, tree, hf_h235_fieldSize);
}
static const per_sequence_t ECpoint_sequence[] = {
{ "x" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_x },
{ "y" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_y },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_ECpoint(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_ECpoint, ECpoint_sequence);
return offset;
}
static int dissect_public_key(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ECpoint(tvb, offset, actx, tree, hf_h235_public_key);
}
static int dissect_base(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ECpoint(tvb, offset, actx, tree, hf_h235_base);
}
static const per_sequence_t T_eckasdhp_sequence[] = {
{ "public-key" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_public_key },
{ "modulus" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_modulus },
{ "base" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_base },
{ "weierstrassA" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassA },
{ "weierstrassB" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassB },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_T_eckasdhp(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_T_eckasdhp, T_eckasdhp_sequence);
return offset;
}
static int dissect_eckasdhp(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_T_eckasdhp(tvb, offset, actx, tree, hf_h235_eckasdhp);
}
static const per_sequence_t T_eckasdh2_sequence[] = {
{ "public-key" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_public_key },
{ "fieldSize" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_fieldSize },
{ "base" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_base },
{ "weierstrassA" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassA },
{ "weierstrassB" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassB },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_T_eckasdh2(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_T_eckasdh2, T_eckasdh2_sequence);
return offset;
}
static int dissect_eckasdh2(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_T_eckasdh2(tvb, offset, actx, tree, hf_h235_eckasdh2);
}
static const value_string h235_ECKASDH_vals[] = {
{ 0, "eckasdhp" },
{ 1, "eckasdh2" },
{ 0, NULL }
};
static const per_choice_t ECKASDH_choice[] = {
{ 0, "eckasdhp" , ASN1_EXTENSION_ROOT , dissect_eckasdhp },
{ 1, "eckasdh2" , ASN1_EXTENSION_ROOT , dissect_eckasdh2 },
{ 0, NULL, 0, NULL }
};
static int
dissect_h235_ECKASDH(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
ett_h235_ECKASDH, ECKASDH_choice,
NULL);
return offset;
}
static int dissect_eckasdhkey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ECKASDH(tvb, offset, actx, tree, hf_h235_eckasdhkey);
}
static const per_sequence_t TypedCertificate_sequence[] = {
{ "type" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_type },
{ "certificate" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_certificatedata },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_TypedCertificate(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_TypedCertificate, TypedCertificate_sequence);
return offset;
}
static int dissect_certificate(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_TypedCertificate(tvb, offset, actx, tree, hf_h235_certificate);
}
static int
dissect_h235_NULL(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_null(tvb, offset, actx, tree, hf_index);
return offset;
}
static int dissect_default(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_default);
}
static int dissect_radius(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_radius);
}
static int dissect_dhExch(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_dhExch);
}
static int dissect_pwdSymEnc(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_pwdSymEnc);
}
static int dissect_pwdHash(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_pwdHash);
}
static int dissect_certSign(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_certSign);
}
static int dissect_ipsec(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_ipsec);
}
static int dissect_tls(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_tls);
}
static int dissect_fecBeforeSrtp(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_fecBeforeSrtp);
}
static int dissect_fecAfterSrtp(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_NULL(tvb, offset, actx, tree, hf_h235_fecAfterSrtp);
}
static const value_string h235_AuthenticationBES_vals[] = {
{ 0, "default" },
{ 1, "radius" },
{ 0, NULL }
};
static const per_choice_t AuthenticationBES_choice[] = {
{ 0, "default" , ASN1_EXTENSION_ROOT , dissect_default },
{ 1, "radius" , ASN1_EXTENSION_ROOT , dissect_radius },
{ 0, NULL, 0, NULL }
};
static int
dissect_h235_AuthenticationBES(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
ett_h235_AuthenticationBES, AuthenticationBES_choice,
NULL);
return offset;
}
static int dissect_authenticationBES(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_AuthenticationBES(tvb, offset, actx, tree, hf_h235_authenticationBES);
}
const value_string h235_AuthenticationMechanism_vals[] = {
{ 0, "dhExch" },
{ 1, "pwdSymEnc" },
{ 2, "pwdHash" },
{ 3, "certSign" },
{ 4, "ipsec" },
{ 5, "tls" },
{ 6, "nonStandard" },
{ 7, "authenticationBES" },
{ 8, "keyExch" },
{ 0, NULL }
};
static const per_choice_t AuthenticationMechanism_choice[] = {
{ 0, "dhExch" , ASN1_EXTENSION_ROOT , dissect_dhExch },
{ 1, "pwdSymEnc" , ASN1_EXTENSION_ROOT , dissect_pwdSymEnc },
{ 2, "pwdHash" , ASN1_EXTENSION_ROOT , dissect_pwdHash },
{ 3, "certSign" , ASN1_EXTENSION_ROOT , dissect_certSign },
{ 4, "ipsec" , ASN1_EXTENSION_ROOT , dissect_ipsec },
{ 5, "tls" , ASN1_EXTENSION_ROOT , dissect_tls },
{ 6, "nonStandard" , ASN1_EXTENSION_ROOT , dissect_nonStandard },
{ 7, "authenticationBES" , ASN1_NOT_EXTENSION_ROOT, dissect_authenticationBES },
{ 8, "keyExch" , ASN1_NOT_EXTENSION_ROOT, dissect_keyExch },
{ 0, NULL, 0, NULL }
};
int
dissect_h235_AuthenticationMechanism(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
ett_h235_AuthenticationMechanism, AuthenticationMechanism_choice,
NULL);
return offset;
}
static int
dissect_h235_INTEGER(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_integer(tvb, offset, actx, tree, hf_index, NULL);
return offset;
}
static int dissect_integer(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER(tvb, offset, actx, tree, hf_h235_integer);
}
static int dissect_ranInt(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER(tvb, offset, actx, tree, hf_h235_ranInt);
}
static int dissect_powerOfTwo(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER(tvb, offset, actx, tree, hf_h235_powerOfTwo);
}
static int dissect_specific(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER(tvb, offset, actx, tree, hf_h235_specific);
}
static int
dissect_h235_IV8(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
8, 8, NULL);
return offset;
}
static int dissect_iv8(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_IV8(tvb, offset, actx, tree, hf_h235_iv8);
}
static int
dissect_h235_IV16(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
16, 16, NULL);
return offset;
}
static int dissect_iv16(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_IV16(tvb, offset, actx, tree, hf_h235_iv16);
}
static const per_sequence_t Params_sequence[] = {
{ "ranInt" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_ranInt },
{ "iv8" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_iv8 },
{ "iv16" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_iv16 },
{ "iv" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_iv },
{ "clearSalt" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_clearSalt },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_Params(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_Params, Params_sequence);
return offset;
}
static int dissect_paramS(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_Params(tvb, offset, actx, tree, hf_h235_paramS);
}
static int dissect_paramSsalt(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_Params(tvb, offset, actx, tree, hf_h235_paramSsalt);
}
static const per_sequence_t ENCRYPTEDxxx_sequence[] = {
{ "algorithmOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_algorithmOID },
{ "paramS" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_paramS },
{ "encryptedData" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_encryptedData },
{ NULL, 0, 0, NULL }
};
int
dissect_h235_ENCRYPTEDxxx(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
#line 53 "h235.cnf"
proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE);
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_ENCRYPTEDxxx, ENCRYPTEDxxx_sequence);
return offset;
}
static int dissect_encryptedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ENCRYPTEDxxx(tvb, offset, actx, tree, hf_h235_encryptedToken);
}
static int dissect_cryptoPwdEncr(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ENCRYPTEDxxx(tvb, offset, actx, tree, hf_h235_cryptoPwdEncr);
}
static int dissect_sharedSecret(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ENCRYPTEDxxx(tvb, offset, actx, tree, hf_h235_sharedSecret);
}
static int
dissect_h235_BIT_STRING(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
NO_BOUND, NO_BOUND, FALSE);
return offset;
}
static int dissect_bits(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING(tvb, offset, actx, tree, hf_h235_bits);
}
static int dissect_signaturedata(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING(tvb, offset, actx, tree, hf_h235_signaturedata);
}
static int dissect_hash(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BIT_STRING(tvb, offset, actx, tree, hf_h235_hash);
}
static const per_sequence_t SIGNEDxxx_sequence[] = {
{ "toBeSigned" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_toBeSigned },
{ "algorithmOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_algorithmOID },
{ "paramS" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_paramS },
{ "signature" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_signaturedata },
{ NULL, 0, 0, NULL }
};
int
dissect_h235_SIGNEDxxx(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
#line 50 "h235.cnf"
proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE);
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_SIGNEDxxx, SIGNEDxxx_sequence);
return offset;
}
static int dissect_signedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_SIGNEDxxx(tvb, offset, actx, tree, hf_h235_signedToken);
}
static int dissect_certProtectedKey(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_SIGNEDxxx(tvb, offset, actx, tree, hf_h235_certProtectedKey);
}
static const per_sequence_t V3KeySyncMaterial_sequence[] = {
{ "generalID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_generalID },
{ "algorithmOID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_algorithmOID },
{ "paramS" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_paramS },
{ "encryptedSessionKey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_encryptedSessionKey },
{ "encryptedSaltingKey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_encryptedSaltingKey },
{ "clearSaltingKey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_clearSaltingKey },
{ "paramSsalt" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_paramSsalt },
{ "keyDerivationOID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_keyDerivationOID },
{ "genericKeyMaterial" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_genericKeyMaterial },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_V3KeySyncMaterial(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_V3KeySyncMaterial, V3KeySyncMaterial_sequence);
return offset;
}
static int dissect_secureSharedSecret(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_V3KeySyncMaterial(tvb, offset, actx, tree, hf_h235_secureSharedSecret);
}
static const value_string h235_H235Key_vals[] = {
{ 0, "secureChannel" },
{ 1, "sharedSecret" },
{ 2, "certProtectedKey" },
{ 3, "secureSharedSecret" },
{ 0, NULL }
};
static const per_choice_t H235Key_choice[] = {
{ 0, "secureChannel" , ASN1_EXTENSION_ROOT , dissect_secureChannel },
{ 1, "sharedSecret" , ASN1_EXTENSION_ROOT , dissect_sharedSecret },
{ 2, "certProtectedKey" , ASN1_EXTENSION_ROOT , dissect_certProtectedKey },
{ 3, "secureSharedSecret" , ASN1_NOT_EXTENSION_ROOT, dissect_secureSharedSecret },
{ 0, NULL, 0, NULL }
};
static int
dissect_h235_H235Key(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
ett_h235_H235Key, H235Key_choice,
NULL);
return offset;
}
static int dissect_h235Key(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_H235Key(tvb, offset, actx, tree, hf_h235_h235Key);
}
static int
dissect_h235_INTEGER_0_255(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
0U, 255U, NULL, FALSE);
return offset;
}
static int dissect_elementID(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER_0_255(tvb, offset, actx, tree, hf_h235_elementID);
}
static int
dissect_h235_BMPString(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_BMPString(tvb, offset, actx, tree, hf_index,
NO_BOUND, NO_BOUND);
return offset;
}
static int dissect_name(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BMPString(tvb, offset, actx, tree, hf_h235_name);
}
static int
dissect_h235_BOOLEAN(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_boolean(tvb, offset, actx, tree, hf_index, NULL);
return offset;
}
static int dissect_flag(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BOOLEAN(tvb, offset, actx, tree, hf_h235_flag);
}
static int dissect_allowMKI(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BOOLEAN(tvb, offset, actx, tree, hf_h235_allowMKI);
}
static int dissect_unencryptedSrtp(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BOOLEAN(tvb, offset, actx, tree, hf_h235_unencryptedSrtp);
}
static int dissect_unencryptedSrtcp(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BOOLEAN(tvb, offset, actx, tree, hf_h235_unencryptedSrtcp);
}
static int dissect_unauthenticatedSrtp(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_BOOLEAN(tvb, offset, actx, tree, hf_h235_unauthenticatedSrtp);
}
static const value_string h235_Element_vals[] = {
{ 0, "octets" },
{ 1, "integer" },
{ 2, "bits" },
{ 3, "name" },
{ 4, "flag" },
{ 0, NULL }
};
static const per_choice_t Element_choice[] = {
{ 0, "octets" , ASN1_EXTENSION_ROOT , dissect_octets },
{ 1, "integer" , ASN1_EXTENSION_ROOT , dissect_integer },
{ 2, "bits" , ASN1_EXTENSION_ROOT , dissect_bits },
{ 3, "name" , ASN1_EXTENSION_ROOT , dissect_name },
{ 4, "flag" , ASN1_EXTENSION_ROOT , dissect_flag },
{ 0, NULL, 0, NULL }
};
static int
dissect_h235_Element(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
ett_h235_Element, Element_choice,
NULL);
return offset;
}
static int dissect_element(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_Element(tvb, offset, actx, tree, hf_h235_element);
}
static const per_sequence_t ProfileElement_sequence[] = {
{ "elementID" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_elementID },
{ "paramS" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_paramS },
{ "element" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_element },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_ProfileElement(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_ProfileElement, ProfileElement_sequence);
return offset;
}
static int dissect_profileInfo_item(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ProfileElement(tvb, offset, actx, tree, hf_h235_profileInfo_item);
}
static const per_sequence_t SEQUENCE_OF_ProfileElement_sequence_of[1] = {
{ "" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_profileInfo_item },
};
static int
dissect_h235_SEQUENCE_OF_ProfileElement(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
ett_h235_SEQUENCE_OF_ProfileElement, SEQUENCE_OF_ProfileElement_sequence_of);
return offset;
}
static int dissect_profileInfo(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_SEQUENCE_OF_ProfileElement(tvb, offset, actx, tree, hf_h235_profileInfo);
}
static const per_sequence_t ClearToken_sequence[] = {
{ "tokenOID" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_tokenOID },
{ "timeStamp" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_timeStamp },
{ "password" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_password },
{ "dhkey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_dhkey },
{ "challenge" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_challenge },
{ "random" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_random },
{ "certificate" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_certificate },
{ "generalID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_generalID },
{ "nonStandard" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_nonStandard },
{ "eckasdhkey" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_eckasdhkey },
{ "sendersID" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_sendersID },
{ "h235Key" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235Key },
{ "profileInfo" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_profileInfo },
{ NULL, 0, 0, NULL }
};
int
dissect_h235_ClearToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
#line 60 "h235.cnf"
proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE);
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_ClearToken, ClearToken_sequence);
return offset;
}
static int dissect_hashedVals(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_ClearToken(tvb, offset, actx, tree, hf_h235_hashedVals);
}
static const per_sequence_t HASHEDxxx_sequence[] = {
{ "algorithmOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_algorithmOID },
{ "paramS" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_paramS },
{ "hash" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_hash },
{ NULL, 0, 0, NULL }
};
int
dissect_h235_HASHEDxxx(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
#line 56 "h235.cnf"
proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE);
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_HASHEDxxx, HASHEDxxx_sequence);
return offset;
}
static int dissect_hashedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_HASHEDxxx(tvb, offset, actx, tree, hf_h235_hashedToken);
}
static const per_sequence_t T_cryptoEncryptedToken_sequence[] = {
{ "tokenOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_tokenOID },
{ "token" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_encryptedToken },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_T_cryptoEncryptedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_T_cryptoEncryptedToken, T_cryptoEncryptedToken_sequence);
return offset;
}
static int dissect_cryptoEncryptedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_T_cryptoEncryptedToken(tvb, offset, actx, tree, hf_h235_cryptoEncryptedToken);
}
static const per_sequence_t T_cryptoSignedToken_sequence[] = {
{ "tokenOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_tokenOID },
{ "token" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_signedToken },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_T_cryptoSignedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_T_cryptoSignedToken, T_cryptoSignedToken_sequence);
return offset;
}
static int dissect_cryptoSignedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_T_cryptoSignedToken(tvb, offset, actx, tree, hf_h235_cryptoSignedToken);
}
static const per_sequence_t T_cryptoHashedToken_sequence[] = {
{ "tokenOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_tokenOID },
{ "hashedVals" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_hashedVals },
{ "token" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_hashedToken },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_T_cryptoHashedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_T_cryptoHashedToken, T_cryptoHashedToken_sequence);
return offset;
}
static int dissect_cryptoHashedToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_T_cryptoHashedToken(tvb, offset, actx, tree, hf_h235_cryptoHashedToken);
}
const value_string h235_CryptoToken_vals[] = {
{ 0, "cryptoEncryptedToken" },
{ 1, "cryptoSignedToken" },
{ 2, "cryptoHashedToken" },
{ 3, "cryptoPwdEncr" },
{ 0, NULL }
};
static const per_choice_t CryptoToken_choice[] = {
{ 0, "cryptoEncryptedToken" , ASN1_EXTENSION_ROOT , dissect_cryptoEncryptedToken },
{ 1, "cryptoSignedToken" , ASN1_EXTENSION_ROOT , dissect_cryptoSignedToken },
{ 2, "cryptoHashedToken" , ASN1_EXTENSION_ROOT , dissect_cryptoHashedToken },
{ 3, "cryptoPwdEncr" , ASN1_EXTENSION_ROOT , dissect_cryptoPwdEncr },
{ 0, NULL, 0, NULL }
};
int
dissect_h235_CryptoToken(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
#line 64 "h235.cnf"
proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE);
offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
ett_h235_CryptoToken, CryptoToken_choice,
NULL);
return offset;
}
static int
dissect_h235_INTEGER_0_24(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
0U, 24U, NULL, FALSE);
return offset;
}
static int dissect_kdr(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER_0_24(tvb, offset, actx, tree, hf_h235_kdr);
}
static const per_sequence_t FecOrder_sequence[] = {
{ "fecBeforeSrtp" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_fecBeforeSrtp },
{ "fecAfterSrtp" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_fecAfterSrtp },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_FecOrder(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_FecOrder, FecOrder_sequence);
return offset;
}
static int dissect_fecOrder(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_FecOrder(tvb, offset, actx, tree, hf_h235_fecOrder);
}
static int
dissect_h235_INTEGER_64_65535(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
64U, 65535U, NULL, FALSE);
return offset;
}
static int dissect_windowSizeHint(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER_64_65535(tvb, offset, actx, tree, hf_h235_windowSizeHint);
}
static const per_sequence_t SEQUENCE_OF_GenericData_sequence_of[1] = {
{ "" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_newParameter_item },
};
static int
dissect_h235_SEQUENCE_OF_GenericData(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
ett_h235_SEQUENCE_OF_GenericData, SEQUENCE_OF_GenericData_sequence_of);
return offset;
}
static int dissect_newParameter(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_SEQUENCE_OF_GenericData(tvb, offset, actx, tree, hf_h235_newParameter);
}
static const per_sequence_t SrtpSessionParameters_sequence[] = {
{ "kdr" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_kdr },
{ "unencryptedSrtp" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_unencryptedSrtp },
{ "unencryptedSrtcp" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_unencryptedSrtcp },
{ "unauthenticatedSrtp" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_unauthenticatedSrtp },
{ "fecOrder" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_fecOrder },
{ "windowSizeHint" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_windowSizeHint },
{ "newParameter" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_newParameter },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_SrtpSessionParameters(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_SrtpSessionParameters, SrtpSessionParameters_sequence);
return offset;
}
static int dissect_sessionParams(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_SrtpSessionParameters(tvb, offset, actx, tree, hf_h235_sessionParams);
}
static const per_sequence_t SrtpCryptoInfo_sequence[] = {
{ "cryptoSuite" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_cryptoSuite },
{ "sessionParams" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_sessionParams },
{ "allowMKI" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_allowMKI },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_SrtpCryptoInfo(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_SrtpCryptoInfo, SrtpCryptoInfo_sequence);
return offset;
}
static int dissect_SrtpCryptoCapability_item(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_SrtpCryptoInfo(tvb, offset, actx, tree, hf_h235_SrtpCryptoCapability_item);
}
static const per_sequence_t SrtpCryptoCapability_sequence_of[1] = {
{ "" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_SrtpCryptoCapability_item },
};
int
dissect_h235_SrtpCryptoCapability(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
ett_h235_SrtpCryptoCapability, SrtpCryptoCapability_sequence_of);
return offset;
}
static const value_string h235_T_lifetime_vals[] = {
{ 0, "powerOfTwo" },
{ 1, "specific" },
{ 0, NULL }
};
static const per_choice_t T_lifetime_choice[] = {
{ 0, "powerOfTwo" , ASN1_EXTENSION_ROOT , dissect_powerOfTwo },
{ 1, "specific" , ASN1_EXTENSION_ROOT , dissect_specific },
{ 0, NULL, 0, NULL }
};
static int
dissect_h235_T_lifetime(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
ett_h235_T_lifetime, T_lifetime_choice,
NULL);
return offset;
}
static int dissect_lifetime(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_T_lifetime(tvb, offset, actx, tree, hf_h235_lifetime);
}
static int
dissect_h235_INTEGER_1_128(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
1U, 128U, NULL, FALSE);
return offset;
}
static int dissect_length(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_INTEGER_1_128(tvb, offset, actx, tree, hf_h235_length);
}
static const per_sequence_t T_mki_sequence[] = {
{ "length" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_length },
{ "value" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_value },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_T_mki(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_T_mki, T_mki_sequence);
return offset;
}
static int dissect_mki(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_T_mki(tvb, offset, actx, tree, hf_h235_mki);
}
static const per_sequence_t SrtpKeyParameters_sequence[] = {
{ "masterKey" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_masterKey },
{ "masterSalt" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_masterSalt },
{ "lifetime" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_lifetime },
{ "mki" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_mki },
{ NULL, 0, 0, NULL }
};
static int
dissect_h235_SrtpKeyParameters(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_h235_SrtpKeyParameters, SrtpKeyParameters_sequence);
return offset;
}
static int dissect_SrtpKeys_item(tvbuff_t *tvb, int offset, asn_ctx_t *actx, proto_tree *tree) {
return dissect_h235_SrtpKeyParameters(tvb, offset, actx, tree, hf_h235_SrtpKeys_item);
}
static const per_sequence_t SrtpKeys_sequence_of[1] = {
{ "" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_SrtpKeys_item },
};
int
dissect_h235_SrtpKeys(tvbuff_t *tvb, int offset, asn_ctx_t *actx _U_, proto_tree *tree, int hf_index) {
offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
ett_h235_SrtpKeys, SrtpKeys_sequence_of);
return offset;
}
/*--- End of included file: packet-h235-fn.c ---*/
#line 59 "packet-h235-template.c"
/*--- proto_register_h235 ----------------------------------------------*/
void proto_register_h235(void) {
/* List of fields */
static hf_register_info hf[] = {
/*--- Included file: packet-h235-hfarr.c ---*/
#line 1 "packet-h235-hfarr.c"
{ &hf_h235_nonStandardIdentifier,
{ "nonStandardIdentifier", "h235.nonStandardIdentifier",
FT_OID, BASE_NONE, NULL, 0,
"NonStandardParameter/nonStandardIdentifier", HFILL }},
{ &hf_h235_data,
{ "data", "h235.data",
FT_UINT32, BASE_DEC, NULL, 0,
"NonStandardParameter/data", HFILL }},
{ &hf_h235_halfkey,
{ "halfkey", "h235.halfkey",
FT_BYTES, BASE_HEX, NULL, 0,
"DHset/halfkey", HFILL }},
{ &hf_h235_modSize,
{ "modSize", "h235.modSize",
FT_BYTES, BASE_HEX, NULL, 0,
"DHset/modSize", HFILL }},
{ &hf_h235_generator,
{ "generator", "h235.generator",
FT_BYTES, BASE_HEX, NULL, 0,
"DHset/generator", HFILL }},
{ &hf_h235_x,
{ "x", "h235.x",
FT_BYTES, BASE_HEX, NULL, 0,
"ECpoint/x", HFILL }},
{ &hf_h235_y,
{ "y", "h235.y",
FT_BYTES, BASE_HEX, NULL, 0,
"ECpoint/y", HFILL }},
{ &hf_h235_eckasdhp,
{ "eckasdhp", "h235.eckasdhp",
FT_NONE, BASE_NONE, NULL, 0,
"ECKASDH/eckasdhp", HFILL }},
{ &hf_h235_public_key,
{ "public-key", "h235.public_key",
FT_NONE, BASE_NONE, NULL, 0,
"", HFILL }},
{ &hf_h235_modulus,
{ "modulus", "h235.modulus",
FT_BYTES, BASE_HEX, NULL, 0,
"ECKASDH/eckasdhp/modulus", HFILL }},
{ &hf_h235_base,
{ "base", "h235.base",
FT_NONE, BASE_NONE, NULL, 0,
"", HFILL }},
{ &hf_h235_weierstrassA,
{ "weierstrassA", "h235.weierstrassA",
FT_BYTES, BASE_HEX, NULL, 0,
"", HFILL }},
{ &hf_h235_weierstrassB,
{ "weierstrassB", "h235.weierstrassB",
FT_BYTES, BASE_HEX, NULL, 0,
"", HFILL }},
{ &hf_h235_eckasdh2,
{ "eckasdh2", "h235.eckasdh2",
FT_NONE, BASE_NONE, NULL, 0,
"ECKASDH/eckasdh2", HFILL }},
{ &hf_h235_fieldSize,
{ "fieldSize", "h235.fieldSize",
FT_BYTES, BASE_HEX, NULL, 0,
"ECKASDH/eckasdh2/fieldSize", HFILL }},
{ &hf_h235_type,
{ "type", "h235.type",
FT_OID, BASE_NONE, NULL, 0,
"TypedCertificate/type", HFILL }},
{ &hf_h235_certificatedata,
{ "certificate", "h235.certificate",
FT_BYTES, BASE_HEX, NULL, 0,
"TypedCertificate/certificate", HFILL }},
{ &hf_h235_default,
{ "default", "h235.default",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationBES/default", HFILL }},
{ &hf_h235_radius,
{ "radius", "h235.radius",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationBES/radius", HFILL }},
{ &hf_h235_dhExch,
{ "dhExch", "h235.dhExch",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationMechanism/dhExch", HFILL }},
{ &hf_h235_pwdSymEnc,
{ "pwdSymEnc", "h235.pwdSymEnc",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationMechanism/pwdSymEnc", HFILL }},
{ &hf_h235_pwdHash,
{ "pwdHash", "h235.pwdHash",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationMechanism/pwdHash", HFILL }},
{ &hf_h235_certSign,
{ "certSign", "h235.certSign",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationMechanism/certSign", HFILL }},
{ &hf_h235_ipsec,
{ "ipsec", "h235.ipsec",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationMechanism/ipsec", HFILL }},
{ &hf_h235_tls,
{ "tls", "h235.tls",
FT_NONE, BASE_NONE, NULL, 0,
"AuthenticationMechanism/tls", HFILL }},
{ &hf_h235_nonStandard,
{ "nonStandard", "h235.nonStandard",
FT_NONE, BASE_NONE, NULL, 0,
"", HFILL }},
{ &hf_h235_authenticationBES,
{ "authenticationBES", "h235.authenticationBES",
FT_UINT32, BASE_DEC, VALS(h235_AuthenticationBES_vals), 0,
"AuthenticationMechanism/authenticationBES", HFILL }},
{ &hf_h235_keyExch,
{ "keyExch", "h235.keyExch",
FT_OID, BASE_NONE, NULL, 0,
"AuthenticationMechanism/keyExch", HFILL }},
{ &hf_h235_tokenOID,
{ "tokenOID", "h235.tokenOID",
FT_OID, BASE_NONE, NULL, 0,
"", HFILL }},
{ &hf_h235_timeStamp,
{ "timeStamp", "h235.timeStamp",
FT_ABSOLUTE_TIME, BASE_NONE, NULL, 0,
"ClearToken/timeStamp", HFILL }},
{ &hf_h235_password,
{ "password", "h235.password",
FT_STRING, BASE_NONE, NULL, 0,
"ClearToken/password", HFILL }},
{ &hf_h235_dhkey,
{ "dhkey", "h235.dhkey",
FT_NONE, BASE_NONE, NULL, 0,
"ClearToken/dhkey", HFILL }},
{ &hf_h235_challenge,
{ "challenge", "h235.challenge",
FT_BYTES, BASE_HEX, NULL, 0,
"ClearToken/challenge", HFILL }},
{ &hf_h235_random,
{ "random", "h235.random",
FT_INT32, BASE_DEC, NULL, 0,
"ClearToken/random", HFILL }},
{ &hf_h235_certificate,
{ "certificate", "h235.certificate",
FT_NONE, BASE_NONE, NULL, 0,
"ClearToken/certificate", HFILL }},
{ &hf_h235_generalID,
{ "generalID", "h235.generalID",
FT_STRING, BASE_NONE, NULL, 0,
"", HFILL }},
{ &hf_h235_eckasdhkey,
{ "eckasdhkey", "h235.eckasdhkey",
FT_UINT32, BASE_DEC, VALS(h235_ECKASDH_vals), 0,
"ClearToken/eckasdhkey", HFILL }},
{ &hf_h235_sendersID,
{ "sendersID", "h235.sendersID",
FT_STRING, BASE_NONE, NULL, 0,
"ClearToken/sendersID", HFILL }},
{ &hf_h235_h235Key,
{ "h235Key", "h235.h235Key",
FT_UINT32, BASE_DEC, VALS(h235_H235Key_vals), 0,
"ClearToken/h235Key", HFILL }},
{ &hf_h235_profileInfo,
{ "profileInfo", "h235.profileInfo",
FT_UINT32, BASE_DEC, NULL, 0,
"ClearToken/profileInfo", HFILL }},
{ &hf_h235_profileInfo_item,
{ "Item", "h235.profileInfo_item",
FT_NONE, BASE_NONE, NULL, 0,
"ClearToken/profileInfo/_item", HFILL }},
{ &hf_h235_elementID,
{ "elementID", "h235.elementID",
FT_UINT32, BASE_DEC, NULL, 0,
"ProfileElement/elementID", HFILL }},
{ &hf_h235_paramS,
{ "paramS", "h235.paramS",
FT_NONE, BASE_NONE, NULL, 0,
"", HFILL }},
{ &hf_h235_element,
{ "element", "h235.element",
FT_UINT32, BASE_DEC, VALS(h235_Element_vals), 0,
"ProfileElement/element", HFILL }},
{ &hf_h235_octets,
{ "octets", "h235.octets",
FT_BYTES, BASE_HEX, NULL, 0,
"Element/octets", HFILL }},
{ &hf_h235_integer,
{ "integer", "h235.integer",
FT_INT32, BASE_DEC, NULL, 0,
"Element/integer", HFILL }},
{ &hf_h235_bits,
{ "bits", "h235.bits",
FT_BYTES, BASE_HEX, NULL, 0,
"Element/bits", HFILL }},
{ &hf_h235_name,
{ "name", "h235.name",
FT_STRING, BASE_NONE, NULL, 0,
"Element/name", HFILL }},
{ &hf_h235_flag,
{ "flag", "h235.flag",
FT_BOOLEAN, 8, NULL, 0,
"Element/flag", HFILL }},
{ &hf_h235_toBeSigned,
{ "toBeSigned", "h235.toBeSigned",
FT_NONE, BASE_NONE, NULL, 0,
"SIGNEDxxx/toBeSigned", HFILL }},
{ &hf_h235_algorithmOID,
{ "algorithmOID", "h235.algorithmOID",
FT_OID, BASE_NONE, NULL, 0,
"", HFILL }},
{ &hf_h235_signaturedata,
{ "signature", "h235.signature",
FT_BYTES, BASE_HEX, NULL, 0,
"SIGNEDxxx/signature", HFILL }},
{ &hf_h235_encryptedData,
{ "encryptedData", "h235.encryptedData",
FT_BYTES, BASE_HEX, NULL, 0,
"ENCRYPTEDxxx/encryptedData", HFILL }},
{ &hf_h235_hash,
{ "hash", "h235.hash",
FT_BYTES, BASE_HEX, NULL, 0,
"HASHEDxxx/hash", HFILL }},
{ &hf_h235_ranInt,
{ "ranInt", "h235.ranInt",
FT_INT32, BASE_DEC, NULL, 0,
"Params/ranInt", HFILL }},
{ &hf_h235_iv8,
{ "iv8", "h235.iv8",
FT_BYTES, BASE_HEX, NULL, 0,
"Params/iv8", HFILL }},
{ &hf_h235_iv16,
{ "iv16", "h235.iv16",
FT_BYTES, BASE_HEX, NULL, 0,
"Params/iv16", HFILL }},
{ &hf_h235_iv,
{ "iv", "h235.iv",
FT_BYTES, BASE_HEX, NULL, 0,
"Params/iv", HFILL }},
{ &hf_h235_clearSalt,
{ "clearSalt", "h235.clearSalt",
FT_BYTES, BASE_HEX, NULL, 0,
"Params/clearSalt", HFILL }},
{ &hf_h235_cryptoEncryptedToken,
{ "cryptoEncryptedToken", "h235.cryptoEncryptedToken",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoEncryptedToken", HFILL }},
{ &hf_h235_encryptedToken,
{ "token", "h235.token",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoEncryptedToken/token", HFILL }},
{ &hf_h235_cryptoSignedToken,
{ "cryptoSignedToken", "h235.cryptoSignedToken",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoSignedToken", HFILL }},
{ &hf_h235_signedToken,
{ "token", "h235.token",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoSignedToken/token", HFILL }},
{ &hf_h235_cryptoHashedToken,
{ "cryptoHashedToken", "h235.cryptoHashedToken",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoHashedToken", HFILL }},
{ &hf_h235_hashedVals,
{ "hashedVals", "h235.hashedVals",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoHashedToken/hashedVals", HFILL }},
{ &hf_h235_hashedToken,
{ "token", "h235.token",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoHashedToken/token", HFILL }},
{ &hf_h235_cryptoPwdEncr,
{ "cryptoPwdEncr", "h235.cryptoPwdEncr",
FT_NONE, BASE_NONE, NULL, 0,
"CryptoToken/cryptoPwdEncr", HFILL }},
{ &hf_h235_secureChannel,
{ "secureChannel", "h235.secureChannel",
FT_BYTES, BASE_HEX, NULL, 0,
"H235Key/secureChannel", HFILL }},
{ &hf_h235_sharedSecret,
{ "sharedSecret", "h235.sharedSecret",
FT_NONE, BASE_NONE, NULL, 0,
"H235Key/sharedSecret", HFILL }},
{ &hf_h235_certProtectedKey,
{ "certProtectedKey", "h235.certProtectedKey",
FT_NONE, BASE_NONE, NULL, 0,
"H235Key/certProtectedKey", HFILL }},
{ &hf_h235_secureSharedSecret,
{ "secureSharedSecret", "h235.secureSharedSecret",
FT_NONE, BASE_NONE, NULL, 0,
"H235Key/secureSharedSecret", HFILL }},
{ &hf_h235_encryptedSessionKey,
{ "encryptedSessionKey", "h235.encryptedSessionKey",
FT_BYTES, BASE_HEX, NULL, 0,
"V3KeySyncMaterial/encryptedSessionKey", HFILL }},
{ &hf_h235_encryptedSaltingKey,
{ "encryptedSaltingKey", "h235.encryptedSaltingKey",
FT_BYTES, BASE_HEX, NULL, 0,
"V3KeySyncMaterial/encryptedSaltingKey", HFILL }},
{ &hf_h235_clearSaltingKey,
{ "clearSaltingKey", "h235.clearSaltingKey",
FT_BYTES, BASE_HEX, NULL, 0,
"V3KeySyncMaterial/clearSaltingKey", HFILL }},
{ &hf_h235_paramSsalt,
{ "paramSsalt", "h235.paramSsalt",
FT_NONE, BASE_NONE, NULL, 0,
"V3KeySyncMaterial/paramSsalt", HFILL }},
{ &hf_h235_keyDerivationOID,
{ "keyDerivationOID", "h235.keyDerivationOID",
FT_OID, BASE_NONE, NULL, 0,
"V3KeySyncMaterial/keyDerivationOID", HFILL }},
{ &hf_h235_genericKeyMaterial,
{ "genericKeyMaterial", "h235.genericKeyMaterial",
FT_BYTES, BASE_HEX, NULL, 0,
"V3KeySyncMaterial/genericKeyMaterial", HFILL }},
{ &hf_h235_SrtpCryptoCapability_item,
{ "Item", "h235.SrtpCryptoCapability_item",
FT_NONE, BASE_NONE, NULL, 0,
"SrtpCryptoCapability/_item", HFILL }},
{ &hf_h235_cryptoSuite,
{ "cryptoSuite", "h235.cryptoSuite",
FT_OID, BASE_NONE, NULL, 0,
"SrtpCryptoInfo/cryptoSuite", HFILL }},
{ &hf_h235_sessionParams,
{ "sessionParams", "h235.sessionParams",
FT_NONE, BASE_NONE, NULL, 0,
"SrtpCryptoInfo/sessionParams", HFILL }},
{ &hf_h235_allowMKI,
{ "allowMKI", "h235.allowMKI",
FT_BOOLEAN, 8, NULL, 0,
"SrtpCryptoInfo/allowMKI", HFILL }},
{ &hf_h235_SrtpKeys_item,
{ "Item", "h235.SrtpKeys_item",
FT_NONE, BASE_NONE, NULL, 0,
"SrtpKeys/_item", HFILL }},
{ &hf_h235_masterKey,
{ "masterKey", "h235.masterKey",
FT_BYTES, BASE_HEX, NULL, 0,
"SrtpKeyParameters/masterKey", HFILL }},
{ &hf_h235_masterSalt,
{ "masterSalt", "h235.masterSalt",
FT_BYTES, BASE_HEX, NULL, 0,
"SrtpKeyParameters/masterSalt", HFILL }},
{ &hf_h235_lifetime,
{ "lifetime", "h235.lifetime",
FT_UINT32, BASE_DEC, VALS(h235_T_lifetime_vals), 0,
"SrtpKeyParameters/lifetime", HFILL }},
{ &hf_h235_powerOfTwo,
{ "powerOfTwo", "h235.powerOfTwo",
FT_INT32, BASE_DEC, NULL, 0,
"SrtpKeyParameters/lifetime/powerOfTwo", HFILL }},
{ &hf_h235_specific,
{ "specific", "h235.specific",
FT_INT32, BASE_DEC, NULL, 0,
"SrtpKeyParameters/lifetime/specific", HFILL }},
{ &hf_h235_mki,
{ "mki", "h235.mki",
FT_NONE, BASE_NONE, NULL, 0,
"SrtpKeyParameters/mki", HFILL }},
{ &hf_h235_length,
{ "length", "h235.length",
FT_UINT32, BASE_DEC, NULL, 0,
"SrtpKeyParameters/mki/length", HFILL }},
{ &hf_h235_value,
{ "value", "h235.value",
FT_BYTES, BASE_HEX, NULL, 0,
"SrtpKeyParameters/mki/value", HFILL }},
{ &hf_h235_kdr,
{ "kdr", "h235.kdr",
FT_UINT32, BASE_DEC, NULL, 0,
"SrtpSessionParameters/kdr", HFILL }},
{ &hf_h235_unencryptedSrtp,
{ "unencryptedSrtp", "h235.unencryptedSrtp",
FT_BOOLEAN, 8, NULL, 0,
"SrtpSessionParameters/unencryptedSrtp", HFILL }},
{ &hf_h235_unencryptedSrtcp,
{ "unencryptedSrtcp", "h235.unencryptedSrtcp",
FT_BOOLEAN, 8, NULL, 0,
"SrtpSessionParameters/unencryptedSrtcp", HFILL }},
{ &hf_h235_unauthenticatedSrtp,
{ "unauthenticatedSrtp", "h235.unauthenticatedSrtp",
FT_BOOLEAN, 8, NULL, 0,
"SrtpSessionParameters/unauthenticatedSrtp", HFILL }},
{ &hf_h235_fecOrder,
{ "fecOrder", "h235.fecOrder",
FT_NONE, BASE_NONE, NULL, 0,
"SrtpSessionParameters/fecOrder", HFILL }},
{ &hf_h235_windowSizeHint,
{ "windowSizeHint", "h235.windowSizeHint",
FT_UINT32, BASE_DEC, NULL, 0,
"SrtpSessionParameters/windowSizeHint", HFILL }},
{ &hf_h235_newParameter,
{ "newParameter", "h235.newParameter",
FT_UINT32, BASE_DEC, NULL, 0,
"SrtpSessionParameters/newParameter", HFILL }},
{ &hf_h235_newParameter_item,
{ "Item", "h235.newParameter_item",
FT_NONE, BASE_NONE, NULL, 0,
"SrtpSessionParameters/newParameter/_item", HFILL }},
{ &hf_h235_fecBeforeSrtp,
{ "fecBeforeSrtp", "h235.fecBeforeSrtp",
FT_NONE, BASE_NONE, NULL, 0,
"FecOrder/fecBeforeSrtp", HFILL }},
{ &hf_h235_fecAfterSrtp,
{ "fecAfterSrtp", "h235.fecAfterSrtp",
FT_NONE, BASE_NONE, NULL, 0,
"FecOrder/fecAfterSrtp", HFILL }},
/*--- End of included file: packet-h235-hfarr.c ---*/
#line 67 "packet-h235-template.c"
};
/* List of subtrees */
static gint *ett[] = {
/*--- Included file: packet-h235-ettarr.c ---*/
#line 1 "packet-h235-ettarr.c"
&ett_h235_NonStandardParameter,
&ett_h235_DHset,
&ett_h235_ECpoint,
&ett_h235_ECKASDH,
&ett_h235_T_eckasdhp,
&ett_h235_T_eckasdh2,
&ett_h235_TypedCertificate,
&ett_h235_AuthenticationBES,
&ett_h235_AuthenticationMechanism,
&ett_h235_ClearToken,
&ett_h235_SEQUENCE_OF_ProfileElement,
&ett_h235_ProfileElement,
&ett_h235_Element,
&ett_h235_SIGNEDxxx,
&ett_h235_ENCRYPTEDxxx,
&ett_h235_HASHEDxxx,
&ett_h235_Params,
&ett_h235_CryptoToken,
&ett_h235_T_cryptoEncryptedToken,
&ett_h235_T_cryptoSignedToken,
&ett_h235_T_cryptoHashedToken,
&ett_h235_H235Key,
&ett_h235_V3KeySyncMaterial,
&ett_h235_SrtpCryptoCapability,
&ett_h235_SrtpCryptoInfo,
&ett_h235_SrtpKeys,
&ett_h235_SrtpKeyParameters,
&ett_h235_T_lifetime,
&ett_h235_T_mki,
&ett_h235_SrtpSessionParameters,
&ett_h235_SEQUENCE_OF_GenericData,
&ett_h235_FecOrder,
/*--- End of included file: packet-h235-ettarr.c ---*/
#line 72 "packet-h235-template.c"
};
/* Register protocol */
proto_h235 = proto_register_protocol(PNAME, PSNAME, PFNAME);
/* Register fields and subtrees */
proto_register_field_array(proto_h235, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
}
/*--- proto_reg_handoff_h235 -------------------------------------------*/
void proto_reg_handoff_h235(void) {
}