wireshark/epan/dissectors/asn1/credssp/credssp.cnf

75 lines
1.5 KiB
INI

# credssp.cnf
# Credential Security Support Provider (CredSSP) conformance file
#.PDU
TSRequest
#.FN_PARS TSRequest/version VAL_PTR = &credssp_ver
#.FN_PARS TSRequest/authInfo VAL_PTR = &auth_tvb
#.FN_BODY TSRequest/authInfo
tvbuff_t *auth_tvb = NULL;
tvbuff_t *decr_tvb = NULL;
%(DEFAULT_BODY)s
if(decr_tvb != NULL)
offset = dissect_credssp_TSCredentials(FALSE, decr_tvb, 0, actx, tree, hf_credssp_TSCredentials);
#.FN_BODY TSRequest/errorCode
if (credssp_ver < 3) {
return 0;
}
%(DEFAULT_BODY)s
#.FN_BODY TSRequest/clientNonce
if (credssp_ver < 5) {
return 0;
}
%(DEFAULT_BODY)s
#.FN_PARS TSCredentials/credType VAL_PTR = &creds_type
#.FN_PARS TSCredentials/credentials VAL_PTR = &creds_tvb
#.FN_BODY TSCredentials/credentials
tvbuff_t *creds_tvb = NULL;
tvbuff_t *decr_tvb = NULL;
%(DEFAULT_BODY)s
if((decr_tvb != NULL) &&
((creds_type == TS_PASSWORD_CREDS) || (creds_type == TS_SMARTCARD_CREDS))) {
switch(creds_type) {
case TS_PASSWORD_CREDS:
offset = dissect_credssp_TSPasswordCreds(FALSE, decr_tvb, 0, actx, tree, hf_credssp_TSPasswordCreds);
break;
case TS_SMARTCARD_CREDS:
offset = dissect_credssp_TSSmartCardCreds(FALSE, decr_tvb, 0, actx, tree, hf_credssp_TSSmartCardCreds);
break;
}
}
#.FN_PARS NegoData/_item/negoToken VAL_PTR = &token_tvb
#.FN_BODY NegoData/_item/negoToken
tvbuff_t *token_tvb = NULL;
%(DEFAULT_BODY)s
if(token_tvb != NULL)
call_dissector(gssapi_handle, token_tvb, actx->pinfo, tree);
#.END