opcua: Parse more Server and Client Certificates
Even though these files are generated and warn not to change them, the generator is not working currently, so patch them. (See the disscussion in !14000)
This commit is contained in:
parent
6c26a3c7dc
commit
d4bc9d4036
|
@ -637,7 +637,7 @@ void parseEndpointDescription(proto_tree *tree, tvbuff_t *tvb, packet_info *pinf
|
|||
proto_tree *subtree = proto_tree_add_subtree_format(tree, tvb, *pOffset, -1, ett_opcua_EndpointDescription, &ti, "%s: EndpointDescription", szFieldName);
|
||||
parseString(subtree, tvb, pinfo, pOffset, hf_opcua_EndpointUrl);
|
||||
parseApplicationDescription(subtree, tvb, pinfo, pOffset, "Server");
|
||||
parseByteString(subtree, tvb, pinfo, pOffset, hf_opcua_ServerCertificate);
|
||||
parseCertificate(subtree, tvb, pinfo, pOffset, hf_opcua_ServerCertificate);
|
||||
parseMessageSecurityMode(subtree, tvb, pinfo, pOffset);
|
||||
parseString(subtree, tvb, pinfo, pOffset, hf_opcua_SecurityPolicyUri);
|
||||
/* Array length field ignored: NoOfUserIdentityTokens */
|
||||
|
@ -1817,7 +1817,7 @@ void parseSessionSecurityDiagnosticsDataType(proto_tree *tree, tvbuff_t *tvb, pa
|
|||
parseString(subtree, tvb, pinfo, pOffset, hf_opcua_TransportProtocol);
|
||||
parseMessageSecurityMode(subtree, tvb, pinfo, pOffset);
|
||||
parseString(subtree, tvb, pinfo, pOffset, hf_opcua_SecurityPolicyUri);
|
||||
parseByteString(subtree, tvb, pinfo, pOffset, hf_opcua_ClientCertificate);
|
||||
parseCertificate(subtree, tvb, pinfo, pOffset, hf_opcua_ClientCertificate);
|
||||
proto_item_set_end(ti, tvb, *pOffset);
|
||||
}
|
||||
void parseServiceCounterDataType(proto_tree *tree, tvbuff_t *tvb, packet_info *pinfo, gint *pOffset, const char *szFieldName)
|
||||
|
|
|
@ -360,7 +360,7 @@ void parseCreateSessionRequest(proto_tree *tree, tvbuff_t *tvb, packet_info *pin
|
|||
parseString(subtree, tvb, pinfo, pOffset, hf_opcua_EndpointUrl);
|
||||
parseString(subtree, tvb, pinfo, pOffset, hf_opcua_SessionName);
|
||||
parseByteString(subtree, tvb, pinfo, pOffset, hf_opcua_ClientNonce);
|
||||
parseByteString(subtree, tvb, pinfo, pOffset, hf_opcua_ClientCertificate);
|
||||
parseCertificate(subtree, tvb, pinfo, pOffset, hf_opcua_ClientCertificate);
|
||||
parseDouble(subtree, tvb, pinfo, pOffset, hf_opcua_RequestedSessionTimeout);
|
||||
parseUInt32(subtree, tvb, pinfo, pOffset, hf_opcua_MaxResponseMessageSize);
|
||||
proto_item_set_end(ti, tvb, *pOffset);
|
||||
|
@ -375,7 +375,7 @@ void parseCreateSessionResponse(proto_tree *tree, tvbuff_t *tvb, packet_info *pi
|
|||
parseNodeId(subtree, tvb, pinfo, pOffset, "AuthenticationToken");
|
||||
parseDouble(subtree, tvb, pinfo, pOffset, hf_opcua_RevisedSessionTimeout);
|
||||
parseByteString(subtree, tvb, pinfo, pOffset, hf_opcua_ServerNonce);
|
||||
parseByteString(subtree, tvb, pinfo, pOffset, hf_opcua_ServerCertificate);
|
||||
parseCertificate(subtree, tvb, pinfo, pOffset, hf_opcua_ServerCertificate);
|
||||
/* Array length field ignored: NoOfServerEndpoints */
|
||||
parseArrayComplex(subtree, tvb, pinfo, pOffset, "ServerEndpoints", "EndpointDescription", parseEndpointDescription, ett_opcua_array_EndpointDescription);
|
||||
/* Array length field ignored: NoOfServerSoftwareCertificates */
|
||||
|
|
Loading…
Reference in New Issue