wireshark/epan/dissectors/packet-ns_cert_exts.c

363 lines
15 KiB
C

/* Do not modify this file. Changes will be overwritten. */
/* Generated automatically by the ASN.1 to Wireshark dissector compiler */
/* packet-ns_cert_exts.c */
/* asn2wrs.py -b -p ns_cert_exts -c ./ns_cert_exts.cnf -s ./packet-ns_cert_exts-template -D . -O ../.. NETSCAPE-CERT-EXTS.asn */
/* Input file: packet-ns_cert_exts-template.c */
#line 1 "./asn1/ns_cert_exts/packet-ns_cert_exts-template.c"
/* packet-ns_cert_exts.c
* Routines for NetScape Certificate Extensions packet dissection
* Ronnie Sahlberg 2004
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "config.h"
#include <epan/packet.h>
#include "packet-ber.h"
#define PNAME "NetScape Certificate Extensions"
#define PSNAME "NS_CERT_EXTS"
#define PFNAME "ns_cert_exts"
void proto_register_ns_cert_exts(void);
void proto_reg_handoff_ns_cert_exts(void);
/* Initialize the protocol and registered fields */
static int proto_ns_cert_exts = -1;
/*--- Included file: packet-ns_cert_exts-hf.c ---*/
#line 1 "./asn1/ns_cert_exts/packet-ns_cert_exts-hf.c"
static int hf_ns_cert_exts_BaseUrl_PDU = -1; /* BaseUrl */
static int hf_ns_cert_exts_RevocationUrl_PDU = -1; /* RevocationUrl */
static int hf_ns_cert_exts_CaRevocationUrl_PDU = -1; /* CaRevocationUrl */
static int hf_ns_cert_exts_CaPolicyUrl_PDU = -1; /* CaPolicyUrl */
static int hf_ns_cert_exts_Comment_PDU = -1; /* Comment */
static int hf_ns_cert_exts_SslServerName_PDU = -1; /* SslServerName */
static int hf_ns_cert_exts_CertRenewalUrl_PDU = -1; /* CertRenewalUrl */
static int hf_ns_cert_exts_CertType_PDU = -1; /* CertType */
/* named bits */
static int hf_ns_cert_exts_CertType_ssl_client = -1;
static int hf_ns_cert_exts_CertType_ssl_server = -1;
static int hf_ns_cert_exts_CertType_smime = -1;
static int hf_ns_cert_exts_CertType_object_signing = -1;
static int hf_ns_cert_exts_CertType_reserved_for_future_use = -1;
static int hf_ns_cert_exts_CertType_ssl_ca = -1;
static int hf_ns_cert_exts_CertType_smime_ca = -1;
static int hf_ns_cert_exts_CertType_object_signing_ca = -1;
/*--- End of included file: packet-ns_cert_exts-hf.c ---*/
#line 40 "./asn1/ns_cert_exts/packet-ns_cert_exts-template.c"
/* Initialize the subtree pointers */
/*--- Included file: packet-ns_cert_exts-ett.c ---*/
#line 1 "./asn1/ns_cert_exts/packet-ns_cert_exts-ett.c"
static gint ett_ns_cert_exts_CertType = -1;
/*--- End of included file: packet-ns_cert_exts-ett.c ---*/
#line 43 "./asn1/ns_cert_exts/packet-ns_cert_exts-template.c"
/*--- Included file: packet-ns_cert_exts-fn.c ---*/
#line 1 "./asn1/ns_cert_exts/packet-ns_cert_exts-fn.c"
static int
dissect_ns_cert_exts_BaseUrl(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
actx, tree, tvb, offset, hf_index,
NULL);
return offset;
}
static int
dissect_ns_cert_exts_RevocationUrl(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
actx, tree, tvb, offset, hf_index,
NULL);
return offset;
}
static int
dissect_ns_cert_exts_CaRevocationUrl(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
actx, tree, tvb, offset, hf_index,
NULL);
return offset;
}
static int
dissect_ns_cert_exts_CaPolicyUrl(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
actx, tree, tvb, offset, hf_index,
NULL);
return offset;
}
static int
dissect_ns_cert_exts_Comment(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
actx, tree, tvb, offset, hf_index,
NULL);
return offset;
}
static int
dissect_ns_cert_exts_SslServerName(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
actx, tree, tvb, offset, hf_index,
NULL);
return offset;
}
static int
dissect_ns_cert_exts_CertRenewalUrl(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
actx, tree, tvb, offset, hf_index,
NULL);
return offset;
}
static const asn_namedbit CertType_bits[] = {
{ 0, &hf_ns_cert_exts_CertType_ssl_client, -1, -1, "ssl-client", NULL },
{ 1, &hf_ns_cert_exts_CertType_ssl_server, -1, -1, "ssl-server", NULL },
{ 2, &hf_ns_cert_exts_CertType_smime, -1, -1, "smime", NULL },
{ 3, &hf_ns_cert_exts_CertType_object_signing, -1, -1, "object-signing", NULL },
{ 4, &hf_ns_cert_exts_CertType_reserved_for_future_use, -1, -1, "reserved-for-future-use", NULL },
{ 5, &hf_ns_cert_exts_CertType_ssl_ca, -1, -1, "ssl-ca", NULL },
{ 6, &hf_ns_cert_exts_CertType_smime_ca, -1, -1, "smime-ca", NULL },
{ 7, &hf_ns_cert_exts_CertType_object_signing_ca, -1, -1, "object-signing-ca", NULL },
{ 0, NULL, 0, 0, NULL, NULL }
};
static int
dissect_ns_cert_exts_CertType(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
CertType_bits, hf_index, ett_ns_cert_exts_CertType,
NULL);
return offset;
}
/*--- PDUs ---*/
static int dissect_BaseUrl_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_BaseUrl(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_BaseUrl_PDU);
return offset;
}
static int dissect_RevocationUrl_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_RevocationUrl(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_RevocationUrl_PDU);
return offset;
}
static int dissect_CaRevocationUrl_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_CaRevocationUrl(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_CaRevocationUrl_PDU);
return offset;
}
static int dissect_CaPolicyUrl_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_CaPolicyUrl(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_CaPolicyUrl_PDU);
return offset;
}
static int dissect_Comment_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_Comment(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_Comment_PDU);
return offset;
}
static int dissect_SslServerName_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_SslServerName(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_SslServerName_PDU);
return offset;
}
static int dissect_CertRenewalUrl_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_CertRenewalUrl(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_CertRenewalUrl_PDU);
return offset;
}
static int dissect_CertType_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
int offset = 0;
asn1_ctx_t asn1_ctx;
asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
offset = dissect_ns_cert_exts_CertType(FALSE, tvb, offset, &asn1_ctx, tree, hf_ns_cert_exts_CertType_PDU);
return offset;
}
/*--- End of included file: packet-ns_cert_exts-fn.c ---*/
#line 45 "./asn1/ns_cert_exts/packet-ns_cert_exts-template.c"
/*--- proto_register_ns_cert_exts -------------------------------------------*/
void proto_register_ns_cert_exts(void) {
/* List of fields */
static hf_register_info hf[] = {
/*--- Included file: packet-ns_cert_exts-hfarr.c ---*/
#line 1 "./asn1/ns_cert_exts/packet-ns_cert_exts-hfarr.c"
{ &hf_ns_cert_exts_BaseUrl_PDU,
{ "BaseUrl", "ns_cert_exts.BaseUrl",
FT_STRING, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_RevocationUrl_PDU,
{ "RevocationUrl", "ns_cert_exts.RevocationUrl",
FT_STRING, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_CaRevocationUrl_PDU,
{ "CaRevocationUrl", "ns_cert_exts.CaRevocationUrl",
FT_STRING, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_CaPolicyUrl_PDU,
{ "CaPolicyUrl", "ns_cert_exts.CaPolicyUrl",
FT_STRING, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_Comment_PDU,
{ "Comment", "ns_cert_exts.Comment",
FT_STRING, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_SslServerName_PDU,
{ "SslServerName", "ns_cert_exts.SslServerName",
FT_STRING, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertRenewalUrl_PDU,
{ "CertRenewalUrl", "ns_cert_exts.CertRenewalUrl",
FT_STRING, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_PDU,
{ "CertType", "ns_cert_exts.CertType",
FT_BYTES, BASE_NONE, NULL, 0,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_ssl_client,
{ "ssl-client", "ns_cert_exts.ssl-client",
FT_BOOLEAN, 8, NULL, 0x80,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_ssl_server,
{ "ssl-server", "ns_cert_exts.ssl-server",
FT_BOOLEAN, 8, NULL, 0x40,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_smime,
{ "smime", "ns_cert_exts.smime",
FT_BOOLEAN, 8, NULL, 0x20,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_object_signing,
{ "object-signing", "ns_cert_exts.object-signing",
FT_BOOLEAN, 8, NULL, 0x10,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_reserved_for_future_use,
{ "reserved-for-future-use", "ns_cert_exts.reserved-for-future-use",
FT_BOOLEAN, 8, NULL, 0x08,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_ssl_ca,
{ "ssl-ca", "ns_cert_exts.ssl-ca",
FT_BOOLEAN, 8, NULL, 0x04,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_smime_ca,
{ "smime-ca", "ns_cert_exts.smime-ca",
FT_BOOLEAN, 8, NULL, 0x02,
NULL, HFILL }},
{ &hf_ns_cert_exts_CertType_object_signing_ca,
{ "object-signing-ca", "ns_cert_exts.object-signing-ca",
FT_BOOLEAN, 8, NULL, 0x01,
NULL, HFILL }},
/*--- End of included file: packet-ns_cert_exts-hfarr.c ---*/
#line 53 "./asn1/ns_cert_exts/packet-ns_cert_exts-template.c"
};
/* List of subtrees */
static gint *ett[] = {
/*--- Included file: packet-ns_cert_exts-ettarr.c ---*/
#line 1 "./asn1/ns_cert_exts/packet-ns_cert_exts-ettarr.c"
&ett_ns_cert_exts_CertType,
/*--- End of included file: packet-ns_cert_exts-ettarr.c ---*/
#line 58 "./asn1/ns_cert_exts/packet-ns_cert_exts-template.c"
};
/* Register protocol */
proto_ns_cert_exts = proto_register_protocol(PNAME, PSNAME, PFNAME);
/* Register fields and subtrees */
proto_register_field_array(proto_ns_cert_exts, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
}
/*--- proto_reg_handoff_ns_cert_exts ---------------------------------------*/
void proto_reg_handoff_ns_cert_exts(void) {
/*--- Included file: packet-ns_cert_exts-dis-tab.c ---*/
#line 1 "./asn1/ns_cert_exts/packet-ns_cert_exts-dis-tab.c"
register_ber_oid_dissector("2.16.840.1.113730.1.1", dissect_CertType_PDU, proto_ns_cert_exts, "ns_cert_exts.cert_type");
register_ber_oid_dissector("2.16.840.1.113730.1.2", dissect_BaseUrl_PDU, proto_ns_cert_exts, "ns_cert_exts.base_url");
register_ber_oid_dissector("2.16.840.1.113730.1.3", dissect_RevocationUrl_PDU, proto_ns_cert_exts, "ns_cert_exts.revocation-url");
register_ber_oid_dissector("2.16.840.1.113730.1.4", dissect_CaRevocationUrl_PDU, proto_ns_cert_exts, "ns_cert_exts.ca-revocation-url");
register_ber_oid_dissector("2.16.840.1.113730.1.7", dissect_CertRenewalUrl_PDU, proto_ns_cert_exts, "ns_cert_exts.cert-renewal-url");
register_ber_oid_dissector("2.16.840.1.113730.1.8", dissect_CaPolicyUrl_PDU, proto_ns_cert_exts, "ns_cert_exts.ca-policy-url");
register_ber_oid_dissector("2.16.840.1.113730.1.12", dissect_SslServerName_PDU, proto_ns_cert_exts, "ns_cert_exts.ssl-server-name");
register_ber_oid_dissector("2.16.840.1.113730.1.13", dissect_Comment_PDU, proto_ns_cert_exts, "ns_cert_exts.comment");
/*--- End of included file: packet-ns_cert_exts-dis-tab.c ---*/
#line 73 "./asn1/ns_cert_exts/packet-ns_cert_exts-template.c"
}