smb2-dissector: learn the "REPLAY_OPERATION" flag
[obnox/wireshark/wip.git] / epan / dissectors / packet-x509af.c
1 /* Do not modify this file.                                                   */
2 /* It is created automatically by the ASN.1 to Wireshark dissector compiler   */
3 /* packet-x509af.c                                                            */
4 /* ../../tools/asn2wrs.py -b -p x509af -c ./x509af.cnf -s ./packet-x509af-template -D . -O ../../epan/dissectors AuthenticationFramework.asn */
5
6 /* Input file: packet-x509af-template.c */
7
8 #line 1 "../../asn1/x509af/packet-x509af-template.c"
9 /* packet-x509af.c
10  * Routines for X.509 Authentication Framework packet dissection
11  *  Ronnie Sahlberg 2004
12  *
13  * $Id$
14  *
15  * Wireshark - Network traffic analyzer
16  * By Gerald Combs <gerald@wireshark.org>
17  * Copyright 1998 Gerald Combs
18  *
19  * This program is free software; you can redistribute it and/or
20  * modify it under the terms of the GNU General Public License
21  * as published by the Free Software Foundation; either version 2
22  * of the License, or (at your option) any later version.
23  *
24  * This program is distributed in the hope that it will be useful,
25  * but WITHOUT ANY WARRANTY; without even the implied warranty of
26  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
27  * GNU General Public License for more details.
28  *
29  * You should have received a copy of the GNU General Public License
30  * along with this program; if not, write to the Free Software
31  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
32  */
33
34 #ifdef HAVE_CONFIG_H
35 # include "config.h"
36 #endif
37
38 #include <glib.h>
39 #include <epan/packet.h>
40 #include <epan/oids.h>
41 #include <epan/asn1.h>
42
43 #include "packet-ber.h"
44 #include "packet-x509af.h"
45 #include "packet-x509ce.h"
46 #include "packet-x509if.h"
47 #include "packet-x509sat.h"
48 #include "packet-ldap.h"
49
50 #define PNAME  "X.509 Authentication Framework"
51 #define PSNAME "X509AF"
52 #define PFNAME "x509af"
53
54 /* Initialize the protocol and registered fields */
55 static int proto_x509af = -1;
56 static int hf_x509af_algorithm_id = -1;
57 static int hf_x509af_extension_id = -1;
58
59 /*--- Included file: packet-x509af-hf.c ---*/
60 #line 1 "../../asn1/x509af/packet-x509af-hf.c"
61 static int hf_x509af_x509af_Certificate_PDU = -1;  /* Certificate */
62 static int hf_x509af_CertificatePair_PDU = -1;    /* CertificatePair */
63 static int hf_x509af_CertificateList_PDU = -1;    /* CertificateList */
64 static int hf_x509af_AttributeCertificate_PDU = -1;  /* AttributeCertificate */
65 static int hf_x509af_DSS_Params_PDU = -1;         /* DSS_Params */
66 static int hf_x509af_signedCertificate = -1;      /* T_signedCertificate */
67 static int hf_x509af_version = -1;                /* Version */
68 static int hf_x509af_serialNumber = -1;           /* CertificateSerialNumber */
69 static int hf_x509af_signature = -1;              /* AlgorithmIdentifier */
70 static int hf_x509af_issuer = -1;                 /* Name */
71 static int hf_x509af_validity = -1;               /* Validity */
72 static int hf_x509af_subject = -1;                /* SubjectName */
73 static int hf_x509af_subjectPublicKeyInfo = -1;   /* SubjectPublicKeyInfo */
74 static int hf_x509af_issuerUniqueIdentifier = -1;  /* UniqueIdentifier */
75 static int hf_x509af_subjectUniqueIdentifier = -1;  /* UniqueIdentifier */
76 static int hf_x509af_extensions = -1;             /* Extensions */
77 static int hf_x509af_algorithmIdentifier = -1;    /* AlgorithmIdentifier */
78 static int hf_x509af_encrypted = -1;              /* BIT_STRING */
79 static int hf_x509af_rdnSequence = -1;            /* RDNSequence */
80 static int hf_x509af_algorithmId = -1;            /* T_algorithmId */
81 static int hf_x509af_parameters = -1;             /* T_parameters */
82 static int hf_x509af_notBefore = -1;              /* Time */
83 static int hf_x509af_notAfter = -1;               /* Time */
84 static int hf_x509af_algorithm = -1;              /* AlgorithmIdentifier */
85 static int hf_x509af_subjectPublicKey = -1;       /* BIT_STRING */
86 static int hf_x509af_utcTime = -1;                /* UTCTime */
87 static int hf_x509af_generalizedTime = -1;        /* GeneralizedTime */
88 static int hf_x509af_Extensions_item = -1;        /* Extension */
89 static int hf_x509af_extnId = -1;                 /* T_extnId */
90 static int hf_x509af_critical = -1;               /* BOOLEAN */
91 static int hf_x509af_extnValue = -1;              /* T_extnValue */
92 static int hf_x509af_userCertificate = -1;        /* Certificate */
93 static int hf_x509af_certificationPath = -1;      /* ForwardCertificationPath */
94 static int hf_x509af_ForwardCertificationPath_item = -1;  /* CrossCertificates */
95 static int hf_x509af_CrossCertificates_item = -1;  /* Certificate */
96 static int hf_x509af_theCACertificates = -1;      /* SEQUENCE_OF_CertificatePair */
97 static int hf_x509af_theCACertificates_item = -1;  /* CertificatePair */
98 static int hf_x509af_issuedByThisCA = -1;         /* Certificate */
99 static int hf_x509af_issuedToThisCA = -1;         /* Certificate */
100 static int hf_x509af_signedCertificateList = -1;  /* T_signedCertificateList */
101 static int hf_x509af_thisUpdate = -1;             /* Time */
102 static int hf_x509af_nextUpdate = -1;             /* Time */
103 static int hf_x509af_revokedCertificates = -1;    /* T_revokedCertificates */
104 static int hf_x509af_revokedCertificates_item = -1;  /* T_revokedCertificates_item */
105 static int hf_x509af_revokedUserCertificate = -1;  /* CertificateSerialNumber */
106 static int hf_x509af_revocationDate = -1;         /* Time */
107 static int hf_x509af_crlEntryExtensions = -1;     /* Extensions */
108 static int hf_x509af_crlExtensions = -1;          /* Extensions */
109 static int hf_x509af_attributeCertificate = -1;   /* AttributeCertificate */
110 static int hf_x509af_acPath = -1;                 /* SEQUENCE_OF_ACPathData */
111 static int hf_x509af_acPath_item = -1;            /* ACPathData */
112 static int hf_x509af_certificate = -1;            /* Certificate */
113 static int hf_x509af_signedAttributeCertificateInfo = -1;  /* AttributeCertificateInfo */
114 static int hf_x509af_info_subject = -1;           /* InfoSubject */
115 static int hf_x509af_baseCertificateID = -1;      /* IssuerSerial */
116 static int hf_x509af_infoSubjectName = -1;        /* GeneralNames */
117 static int hf_x509af_issuerName = -1;             /* GeneralNames */
118 static int hf_x509af_attCertValidityPeriod = -1;  /* AttCertValidityPeriod */
119 static int hf_x509af_attributes = -1;             /* SEQUENCE_OF_Attribute */
120 static int hf_x509af_attributes_item = -1;        /* Attribute */
121 static int hf_x509af_issuerUniqueID = -1;         /* UniqueIdentifier */
122 static int hf_x509af_serial = -1;                 /* CertificateSerialNumber */
123 static int hf_x509af_issuerUID = -1;              /* UniqueIdentifier */
124 static int hf_x509af_notBeforeTime = -1;          /* GeneralizedTime */
125 static int hf_x509af_notAfterTime = -1;           /* GeneralizedTime */
126 static int hf_x509af_assertion_subject = -1;      /* AssertionSubject */
127 static int hf_x509af_assertionSubjectName = -1;   /* SubjectName */
128 static int hf_x509af_assertionIssuer = -1;        /* Name */
129 static int hf_x509af_attCertValidity = -1;        /* GeneralizedTime */
130 static int hf_x509af_attType = -1;                /* SET_OF_AttributeType */
131 static int hf_x509af_attType_item = -1;           /* AttributeType */
132 static int hf_x509af_p = -1;                      /* INTEGER */
133 static int hf_x509af_q = -1;                      /* INTEGER */
134 static int hf_x509af_g = -1;                      /* INTEGER */
135
136 /*--- End of included file: packet-x509af-hf.c ---*/
137 #line 51 "../../asn1/x509af/packet-x509af-template.c"
138
139 /* Initialize the subtree pointers */
140 static gint ett_pkix_crl = -1;
141
142 /*--- Included file: packet-x509af-ett.c ---*/
143 #line 1 "../../asn1/x509af/packet-x509af-ett.c"
144 static gint ett_x509af_Certificate = -1;
145 static gint ett_x509af_T_signedCertificate = -1;
146 static gint ett_x509af_SubjectName = -1;
147 static gint ett_x509af_AlgorithmIdentifier = -1;
148 static gint ett_x509af_Validity = -1;
149 static gint ett_x509af_SubjectPublicKeyInfo = -1;
150 static gint ett_x509af_Time = -1;
151 static gint ett_x509af_Extensions = -1;
152 static gint ett_x509af_Extension = -1;
153 static gint ett_x509af_Certificates = -1;
154 static gint ett_x509af_ForwardCertificationPath = -1;
155 static gint ett_x509af_CrossCertificates = -1;
156 static gint ett_x509af_CertificationPath = -1;
157 static gint ett_x509af_SEQUENCE_OF_CertificatePair = -1;
158 static gint ett_x509af_CertificatePair = -1;
159 static gint ett_x509af_CertificateList = -1;
160 static gint ett_x509af_T_signedCertificateList = -1;
161 static gint ett_x509af_T_revokedCertificates = -1;
162 static gint ett_x509af_T_revokedCertificates_item = -1;
163 static gint ett_x509af_AttributeCertificationPath = -1;
164 static gint ett_x509af_SEQUENCE_OF_ACPathData = -1;
165 static gint ett_x509af_ACPathData = -1;
166 static gint ett_x509af_AttributeCertificate = -1;
167 static gint ett_x509af_AttributeCertificateInfo = -1;
168 static gint ett_x509af_InfoSubject = -1;
169 static gint ett_x509af_SEQUENCE_OF_Attribute = -1;
170 static gint ett_x509af_IssuerSerial = -1;
171 static gint ett_x509af_AttCertValidityPeriod = -1;
172 static gint ett_x509af_AttributeCertificateAssertion = -1;
173 static gint ett_x509af_AssertionSubject = -1;
174 static gint ett_x509af_SET_OF_AttributeType = -1;
175 static gint ett_x509af_DSS_Params = -1;
176
177 /*--- End of included file: packet-x509af-ett.c ---*/
178 #line 55 "../../asn1/x509af/packet-x509af-template.c"
179
180 static const char *algorithm_id;
181 static const char *extension_id;
182
183
184 /*--- Included file: packet-x509af-fn.c ---*/
185 #line 1 "../../asn1/x509af/packet-x509af-fn.c"
186
187 const value_string x509af_Version_vals[] = {
188   {   0, "v1" },
189   {   1, "v2" },
190   {   2, "v3" },
191   { 0, NULL }
192 };
193
194
195 int
196 dissect_x509af_Version(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
197   offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
198                                                 NULL);
199
200   return offset;
201 }
202
203
204
205 int
206 dissect_x509af_CertificateSerialNumber(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
207   offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
208                                                 NULL);
209
210   return offset;
211 }
212
213
214
215 static int
216 dissect_x509af_T_algorithmId(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
217 #line 70 "../../asn1/x509af/x509af.cnf"
218   const char *name;
219
220     offset = dissect_ber_object_identifier_str(implicit_tag, actx, tree, tvb, offset, hf_x509af_algorithm_id, &algorithm_id);
221
222
223   if(algorithm_id) {
224     name = oid_resolved_from_string(algorithm_id);
225
226     proto_item_append_text(tree, " (%s)", name ? name : algorithm_id); 
227   }
228
229
230
231   return offset;
232 }
233
234
235
236 static int
237 dissect_x509af_T_parameters(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
238 #line 81 "../../asn1/x509af/x509af.cnf"
239   offset=call_ber_oid_callback(algorithm_id, tvb, offset, actx->pinfo, tree);
240
241
242
243   return offset;
244 }
245
246
247 static const ber_sequence_t AlgorithmIdentifier_sequence[] = {
248   { &hf_x509af_algorithmId  , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509af_T_algorithmId },
249   { &hf_x509af_parameters   , BER_CLASS_ANY, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_T_parameters },
250   { NULL, 0, 0, 0, NULL }
251 };
252
253 int
254 dissect_x509af_AlgorithmIdentifier(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
255   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
256                                    AlgorithmIdentifier_sequence, hf_index, ett_x509af_AlgorithmIdentifier);
257
258   return offset;
259 }
260
261
262
263 static int
264 dissect_x509af_UTCTime(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
265   offset = dissect_ber_UTCTime(implicit_tag, actx, tree, tvb, offset, hf_index);
266
267   return offset;
268 }
269
270
271
272 static int
273 dissect_x509af_GeneralizedTime(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
274   offset = dissect_ber_GeneralizedTime(implicit_tag, actx, tree, tvb, offset, hf_index);
275
276   return offset;
277 }
278
279
280 const value_string x509af_Time_vals[] = {
281   {   0, "utcTime" },
282   {   1, "generalizedTime" },
283   { 0, NULL }
284 };
285
286 static const ber_choice_t Time_choice[] = {
287   {   0, &hf_x509af_utcTime      , BER_CLASS_UNI, BER_UNI_TAG_UTCTime, BER_FLAGS_NOOWNTAG, dissect_x509af_UTCTime },
288   {   1, &hf_x509af_generalizedTime, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_x509af_GeneralizedTime },
289   { 0, NULL, 0, 0, 0, NULL }
290 };
291
292 int
293 dissect_x509af_Time(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
294   offset = dissect_ber_choice(actx, tree, tvb, offset,
295                                  Time_choice, hf_index, ett_x509af_Time,
296                                  NULL);
297
298   return offset;
299 }
300
301
302 static const ber_sequence_t Validity_sequence[] = {
303   { &hf_x509af_notBefore    , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
304   { &hf_x509af_notAfter     , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
305   { NULL, 0, 0, 0, NULL }
306 };
307
308 int
309 dissect_x509af_Validity(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
310   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
311                                    Validity_sequence, hf_index, ett_x509af_Validity);
312
313   return offset;
314 }
315
316
317 static const value_string x509af_SubjectName_vals[] = {
318   {   0, "rdnSequence" },
319   { 0, NULL }
320 };
321
322 static const ber_choice_t SubjectName_choice[] = {
323   {   0, &hf_x509af_rdnSequence  , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509if_RDNSequence },
324   { 0, NULL, 0, 0, 0, NULL }
325 };
326
327 static int
328 dissect_x509af_SubjectName(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
329 #line 108 "../../asn1/x509af/x509af.cnf"
330
331   const char* str;
332     offset = dissect_ber_choice(actx, tree, tvb, offset,
333                                  SubjectName_choice, hf_index, ett_x509af_SubjectName,
334                                  NULL);
335
336
337   str = x509if_get_last_dn();
338   proto_item_append_text(proto_item_get_parent(tree), " (%s)", str?str:"");
339
340
341
342   return offset;
343 }
344
345
346
347 static int
348 dissect_x509af_BIT_STRING(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
349   offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
350                                     NULL, hf_index, -1,
351                                     NULL);
352
353   return offset;
354 }
355
356
357 static const ber_sequence_t SubjectPublicKeyInfo_sequence[] = {
358   { &hf_x509af_algorithm    , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
359   { &hf_x509af_subjectPublicKey, BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
360   { NULL, 0, 0, 0, NULL }
361 };
362
363 int
364 dissect_x509af_SubjectPublicKeyInfo(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
365   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
366                                    SubjectPublicKeyInfo_sequence, hf_index, ett_x509af_SubjectPublicKeyInfo);
367
368   return offset;
369 }
370
371
372
373 static int
374 dissect_x509af_T_extnId(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
375 #line 87 "../../asn1/x509af/x509af.cnf"
376   const char *name;
377
378     offset = dissect_ber_object_identifier_str(implicit_tag, actx, tree, tvb, offset, hf_x509af_extension_id, &extension_id);
379
380
381   if(extension_id) {
382     name = oid_resolved_from_string(extension_id);
383
384     proto_item_append_text(tree, " (%s)", name ? name : extension_id);
385   }
386
387
388
389   return offset;
390 }
391
392
393
394 static int
395 dissect_x509af_BOOLEAN(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
396   offset = dissect_ber_boolean(implicit_tag, actx, tree, tvb, offset, hf_index, NULL);
397
398   return offset;
399 }
400
401
402
403 static int
404 dissect_x509af_T_extnValue(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
405 #line 98 "../../asn1/x509af/x509af.cnf"
406   gint8 class;
407   gboolean pc, ind;
408   gint32 tag;
409   guint32 len;
410   /* skip past the T and L  */
411   offset = dissect_ber_identifier(actx->pinfo, tree, tvb, offset, &class, &pc, &tag);
412   offset = dissect_ber_length(actx->pinfo, tree, tvb, offset, &len, &ind);
413   offset=call_ber_oid_callback(extension_id, tvb, offset, actx->pinfo, tree);
414
415
416
417   return offset;
418 }
419
420
421 static const ber_sequence_t Extension_sequence[] = {
422   { &hf_x509af_extnId       , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509af_T_extnId },
423   { &hf_x509af_critical     , BER_CLASS_UNI, BER_UNI_TAG_BOOLEAN, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_BOOLEAN },
424   { &hf_x509af_extnValue    , BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_T_extnValue },
425   { NULL, 0, 0, 0, NULL }
426 };
427
428 int
429 dissect_x509af_Extension(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
430   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
431                                    Extension_sequence, hf_index, ett_x509af_Extension);
432
433   return offset;
434 }
435
436
437 static const ber_sequence_t Extensions_sequence_of[1] = {
438   { &hf_x509af_Extensions_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Extension },
439 };
440
441 int
442 dissect_x509af_Extensions(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
443   offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
444                                       Extensions_sequence_of, hf_index, ett_x509af_Extensions);
445
446   return offset;
447 }
448
449
450 static const ber_sequence_t T_signedCertificate_sequence[] = {
451   { &hf_x509af_version      , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Version },
452   { &hf_x509af_serialNumber , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
453   { &hf_x509af_signature    , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
454   { &hf_x509af_issuer       , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
455   { &hf_x509af_validity     , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Validity },
456   { &hf_x509af_subject      , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_SubjectName },
457   { &hf_x509af_subjectPublicKeyInfo, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_SubjectPublicKeyInfo },
458   { &hf_x509af_issuerUniqueIdentifier, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509sat_UniqueIdentifier },
459   { &hf_x509af_subjectUniqueIdentifier, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509sat_UniqueIdentifier },
460   { &hf_x509af_extensions   , BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_x509af_Extensions },
461   { NULL, 0, 0, 0, NULL }
462 };
463
464 static int
465 dissect_x509af_T_signedCertificate(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
466   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
467                                    T_signedCertificate_sequence, hf_index, ett_x509af_T_signedCertificate);
468
469   return offset;
470 }
471
472
473 static const ber_sequence_t Certificate_sequence[] = {
474   { &hf_x509af_signedCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_T_signedCertificate },
475   { &hf_x509af_algorithmIdentifier, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
476   { &hf_x509af_encrypted    , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
477   { NULL, 0, 0, 0, NULL }
478 };
479
480 int
481 dissect_x509af_Certificate(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
482   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
483                                    Certificate_sequence, hf_index, ett_x509af_Certificate);
484
485   return offset;
486 }
487
488
489 static const ber_sequence_t CrossCertificates_set_of[1] = {
490   { &hf_x509af_CrossCertificates_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Certificate },
491 };
492
493 int
494 dissect_x509af_CrossCertificates(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
495   offset = dissect_ber_set_of(implicit_tag, actx, tree, tvb, offset,
496                                  CrossCertificates_set_of, hf_index, ett_x509af_CrossCertificates);
497
498   return offset;
499 }
500
501
502 static const ber_sequence_t ForwardCertificationPath_sequence_of[1] = {
503   { &hf_x509af_ForwardCertificationPath_item, BER_CLASS_UNI, BER_UNI_TAG_SET, BER_FLAGS_NOOWNTAG, dissect_x509af_CrossCertificates },
504 };
505
506 int
507 dissect_x509af_ForwardCertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
508   offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
509                                       ForwardCertificationPath_sequence_of, hf_index, ett_x509af_ForwardCertificationPath);
510
511   return offset;
512 }
513
514
515 static const ber_sequence_t Certificates_sequence[] = {
516   { &hf_x509af_userCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Certificate },
517   { &hf_x509af_certificationPath, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_ForwardCertificationPath },
518   { NULL, 0, 0, 0, NULL }
519 };
520
521 int
522 dissect_x509af_Certificates(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
523   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
524                                    Certificates_sequence, hf_index, ett_x509af_Certificates);
525
526   return offset;
527 }
528
529
530 static const ber_sequence_t CertificatePair_sequence[] = {
531   { &hf_x509af_issuedByThisCA, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Certificate },
532   { &hf_x509af_issuedToThisCA, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_x509af_Certificate },
533   { NULL, 0, 0, 0, NULL }
534 };
535
536 int
537 dissect_x509af_CertificatePair(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
538   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
539                                    CertificatePair_sequence, hf_index, ett_x509af_CertificatePair);
540
541   return offset;
542 }
543
544
545 static const ber_sequence_t SEQUENCE_OF_CertificatePair_sequence_of[1] = {
546   { &hf_x509af_theCACertificates_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificatePair },
547 };
548
549 static int
550 dissect_x509af_SEQUENCE_OF_CertificatePair(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
551   offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
552                                       SEQUENCE_OF_CertificatePair_sequence_of, hf_index, ett_x509af_SEQUENCE_OF_CertificatePair);
553
554   return offset;
555 }
556
557
558 static const ber_sequence_t CertificationPath_sequence[] = {
559   { &hf_x509af_userCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Certificate },
560   { &hf_x509af_theCACertificates, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_SEQUENCE_OF_CertificatePair },
561   { NULL, 0, 0, 0, NULL }
562 };
563
564 int
565 dissect_x509af_CertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
566   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
567                                    CertificationPath_sequence, hf_index, ett_x509af_CertificationPath);
568
569   return offset;
570 }
571
572
573 static const ber_sequence_t T_revokedCertificates_item_sequence[] = {
574   { &hf_x509af_revokedUserCertificate, BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
575   { &hf_x509af_revocationDate, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
576   { &hf_x509af_crlEntryExtensions, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Extensions },
577   { NULL, 0, 0, 0, NULL }
578 };
579
580 static int
581 dissect_x509af_T_revokedCertificates_item(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
582   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
583                                    T_revokedCertificates_item_sequence, hf_index, ett_x509af_T_revokedCertificates_item);
584
585   return offset;
586 }
587
588
589 static const ber_sequence_t T_revokedCertificates_sequence_of[1] = {
590   { &hf_x509af_revokedCertificates_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_T_revokedCertificates_item },
591 };
592
593 static int
594 dissect_x509af_T_revokedCertificates(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
595   offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
596                                       T_revokedCertificates_sequence_of, hf_index, ett_x509af_T_revokedCertificates);
597
598   return offset;
599 }
600
601
602 static const ber_sequence_t T_signedCertificateList_sequence[] = {
603   { &hf_x509af_version      , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Version },
604   { &hf_x509af_signature    , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
605   { &hf_x509af_issuer       , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
606   { &hf_x509af_thisUpdate   , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
607   { &hf_x509af_nextUpdate   , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
608   { &hf_x509af_revokedCertificates, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_T_revokedCertificates },
609   { &hf_x509af_crlExtensions, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Extensions },
610   { NULL, 0, 0, 0, NULL }
611 };
612
613 static int
614 dissect_x509af_T_signedCertificateList(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
615   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
616                                    T_signedCertificateList_sequence, hf_index, ett_x509af_T_signedCertificateList);
617
618   return offset;
619 }
620
621
622 static const ber_sequence_t CertificateList_sequence[] = {
623   { &hf_x509af_signedCertificateList, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_T_signedCertificateList },
624   { &hf_x509af_algorithmIdentifier, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
625   { &hf_x509af_encrypted    , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
626   { NULL, 0, 0, 0, NULL }
627 };
628
629 int
630 dissect_x509af_CertificateList(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
631   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
632                                    CertificateList_sequence, hf_index, ett_x509af_CertificateList);
633
634   return offset;
635 }
636
637
638 static const ber_sequence_t IssuerSerial_sequence[] = {
639   { &hf_x509af_issuerName   , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralNames },
640   { &hf_x509af_serial       , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
641   { &hf_x509af_issuerUID    , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509sat_UniqueIdentifier },
642   { NULL, 0, 0, 0, NULL }
643 };
644
645 int
646 dissect_x509af_IssuerSerial(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
647   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
648                                    IssuerSerial_sequence, hf_index, ett_x509af_IssuerSerial);
649
650   return offset;
651 }
652
653
654 static const value_string x509af_InfoSubject_vals[] = {
655   {   0, "baseCertificateID" },
656   {   1, "subjectName" },
657   { 0, NULL }
658 };
659
660 static const ber_choice_t InfoSubject_choice[] = {
661   {   0, &hf_x509af_baseCertificateID, BER_CLASS_CON, 0, 0, dissect_x509af_IssuerSerial },
662   {   1, &hf_x509af_infoSubjectName, BER_CLASS_CON, 1, 0, dissect_x509ce_GeneralNames },
663   { 0, NULL, 0, 0, 0, NULL }
664 };
665
666 static int
667 dissect_x509af_InfoSubject(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
668   offset = dissect_ber_choice(actx, tree, tvb, offset,
669                                  InfoSubject_choice, hf_index, ett_x509af_InfoSubject,
670                                  NULL);
671
672   return offset;
673 }
674
675
676 static const ber_sequence_t AttCertValidityPeriod_sequence[] = {
677   { &hf_x509af_notBeforeTime, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_x509af_GeneralizedTime },
678   { &hf_x509af_notAfterTime , BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_x509af_GeneralizedTime },
679   { NULL, 0, 0, 0, NULL }
680 };
681
682 int
683 dissect_x509af_AttCertValidityPeriod(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
684   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
685                                    AttCertValidityPeriod_sequence, hf_index, ett_x509af_AttCertValidityPeriod);
686
687   return offset;
688 }
689
690
691 static const ber_sequence_t SEQUENCE_OF_Attribute_sequence_of[1] = {
692   { &hf_x509af_attributes_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509if_Attribute },
693 };
694
695 static int
696 dissect_x509af_SEQUENCE_OF_Attribute(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
697   offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
698                                       SEQUENCE_OF_Attribute_sequence_of, hf_index, ett_x509af_SEQUENCE_OF_Attribute);
699
700   return offset;
701 }
702
703
704 static const ber_sequence_t AttributeCertificateInfo_sequence[] = {
705   { &hf_x509af_version      , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Version },
706   { &hf_x509af_info_subject , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_InfoSubject },
707   { &hf_x509af_issuerName   , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralNames },
708   { &hf_x509af_signature    , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
709   { &hf_x509af_serialNumber , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
710   { &hf_x509af_attCertValidityPeriod, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AttCertValidityPeriod },
711   { &hf_x509af_attributes   , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_SEQUENCE_OF_Attribute },
712   { &hf_x509af_issuerUniqueID, BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509sat_UniqueIdentifier },
713   { &hf_x509af_extensions   , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Extensions },
714   { NULL, 0, 0, 0, NULL }
715 };
716
717 int
718 dissect_x509af_AttributeCertificateInfo(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
719   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
720                                    AttributeCertificateInfo_sequence, hf_index, ett_x509af_AttributeCertificateInfo);
721
722   return offset;
723 }
724
725
726 static const ber_sequence_t AttributeCertificate_sequence[] = {
727   { &hf_x509af_signedAttributeCertificateInfo, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AttributeCertificateInfo },
728   { &hf_x509af_algorithmIdentifier, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
729   { &hf_x509af_encrypted    , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
730   { NULL, 0, 0, 0, NULL }
731 };
732
733 int
734 dissect_x509af_AttributeCertificate(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
735   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
736                                    AttributeCertificate_sequence, hf_index, ett_x509af_AttributeCertificate);
737
738   return offset;
739 }
740
741
742 static const ber_sequence_t ACPathData_sequence[] = {
743   { &hf_x509af_certificate  , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Certificate },
744   { &hf_x509af_attributeCertificate, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_x509af_AttributeCertificate },
745   { NULL, 0, 0, 0, NULL }
746 };
747
748 int
749 dissect_x509af_ACPathData(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
750   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
751                                    ACPathData_sequence, hf_index, ett_x509af_ACPathData);
752
753   return offset;
754 }
755
756
757 static const ber_sequence_t SEQUENCE_OF_ACPathData_sequence_of[1] = {
758   { &hf_x509af_acPath_item  , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_ACPathData },
759 };
760
761 static int
762 dissect_x509af_SEQUENCE_OF_ACPathData(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
763   offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
764                                       SEQUENCE_OF_ACPathData_sequence_of, hf_index, ett_x509af_SEQUENCE_OF_ACPathData);
765
766   return offset;
767 }
768
769
770 static const ber_sequence_t AttributeCertificationPath_sequence[] = {
771   { &hf_x509af_attributeCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AttributeCertificate },
772   { &hf_x509af_acPath       , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_SEQUENCE_OF_ACPathData },
773   { NULL, 0, 0, 0, NULL }
774 };
775
776 int
777 dissect_x509af_AttributeCertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
778   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
779                                    AttributeCertificationPath_sequence, hf_index, ett_x509af_AttributeCertificationPath);
780
781   return offset;
782 }
783
784
785 static const value_string x509af_AssertionSubject_vals[] = {
786   {   0, "baseCertificateID" },
787   {   1, "subjectName" },
788   { 0, NULL }
789 };
790
791 static const ber_choice_t AssertionSubject_choice[] = {
792   {   0, &hf_x509af_baseCertificateID, BER_CLASS_CON, 0, 0, dissect_x509af_IssuerSerial },
793   {   1, &hf_x509af_assertionSubjectName, BER_CLASS_CON, 1, 0, dissect_x509af_SubjectName },
794   { 0, NULL, 0, 0, 0, NULL }
795 };
796
797 static int
798 dissect_x509af_AssertionSubject(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
799   offset = dissect_ber_choice(actx, tree, tvb, offset,
800                                  AssertionSubject_choice, hf_index, ett_x509af_AssertionSubject,
801                                  NULL);
802
803   return offset;
804 }
805
806
807 static const ber_sequence_t SET_OF_AttributeType_set_of[1] = {
808   { &hf_x509af_attType_item , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509if_AttributeType },
809 };
810
811 static int
812 dissect_x509af_SET_OF_AttributeType(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
813   offset = dissect_ber_set_of(implicit_tag, actx, tree, tvb, offset,
814                                  SET_OF_AttributeType_set_of, hf_index, ett_x509af_SET_OF_AttributeType);
815
816   return offset;
817 }
818
819
820 static const ber_sequence_t AttributeCertificateAssertion_sequence[] = {
821   { &hf_x509af_assertion_subject, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_AssertionSubject },
822   { &hf_x509af_assertionIssuer, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_x509if_Name },
823   { &hf_x509af_attCertValidity, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL, dissect_x509af_GeneralizedTime },
824   { &hf_x509af_attType      , BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_x509af_SET_OF_AttributeType },
825   { NULL, 0, 0, 0, NULL }
826 };
827
828 int
829 dissect_x509af_AttributeCertificateAssertion(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
830   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
831                                    AttributeCertificateAssertion_sequence, hf_index, ett_x509af_AttributeCertificateAssertion);
832
833   return offset;
834 }
835
836
837
838 static int
839 dissect_x509af_INTEGER(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
840   offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
841                                                 NULL);
842
843   return offset;
844 }
845
846
847 static const ber_sequence_t DSS_Params_sequence[] = {
848   { &hf_x509af_p            , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_INTEGER },
849   { &hf_x509af_q            , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_INTEGER },
850   { &hf_x509af_g            , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_INTEGER },
851   { NULL, 0, 0, 0, NULL }
852 };
853
854 static int
855 dissect_x509af_DSS_Params(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
856   offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
857                                    DSS_Params_sequence, hf_index, ett_x509af_DSS_Params);
858
859   return offset;
860 }
861
862 /*--- PDUs ---*/
863
864 void dissect_x509af_Certificate_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
865   asn1_ctx_t asn1_ctx;
866   asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
867   dissect_x509af_Certificate(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_x509af_Certificate_PDU);
868 }
869 static void dissect_CertificatePair_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
870   asn1_ctx_t asn1_ctx;
871   asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
872   dissect_x509af_CertificatePair(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_CertificatePair_PDU);
873 }
874 static void dissect_CertificateList_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
875   asn1_ctx_t asn1_ctx;
876   asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
877   dissect_x509af_CertificateList(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_CertificateList_PDU);
878 }
879 static void dissect_AttributeCertificate_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
880   asn1_ctx_t asn1_ctx;
881   asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
882   dissect_x509af_AttributeCertificate(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_AttributeCertificate_PDU);
883 }
884 static void dissect_DSS_Params_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
885   asn1_ctx_t asn1_ctx;
886   asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
887   dissect_x509af_DSS_Params(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_DSS_Params_PDU);
888 }
889
890
891 /*--- End of included file: packet-x509af-fn.c ---*/
892 #line 60 "../../asn1/x509af/packet-x509af-template.c"
893
894 const char *x509af_get_last_algorithm_id(void) {
895   return algorithm_id;
896 }
897
898
899 static int
900 dissect_pkix_crl(tvbuff_t *tvb, packet_info *pinfo, proto_tree *parent_tree)
901 {
902         proto_item *item=NULL;
903         proto_tree *tree=NULL;
904         asn1_ctx_t asn1_ctx;
905         asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
906
907         col_set_str(pinfo->cinfo, COL_PROTOCOL, "PKIX-CRL");
908
909         col_set_str(pinfo->cinfo, COL_INFO, "Certificate Revocation List");
910
911
912         if(parent_tree){
913                 item=proto_tree_add_text(parent_tree, tvb, 0, -1, "Certificate Revocation List");
914                 tree = proto_item_add_subtree(item, ett_pkix_crl);
915         }
916
917         return dissect_x509af_CertificateList(FALSE, tvb, 0, &asn1_ctx, tree, -1);
918 }
919
920 /*--- proto_register_x509af ----------------------------------------------*/
921 void proto_register_x509af(void) {
922
923   /* List of fields */
924   static hf_register_info hf[] = {
925     { &hf_x509af_algorithm_id,
926       { "Algorithm Id", "x509af.algorithm.id",
927         FT_OID, BASE_NONE, NULL, 0,
928         NULL, HFILL }},
929     { &hf_x509af_extension_id,
930       { "Extension Id", "x509af.extension.id",
931         FT_OID, BASE_NONE, NULL, 0,
932         NULL, HFILL }},
933
934 /*--- Included file: packet-x509af-hfarr.c ---*/
935 #line 1 "../../asn1/x509af/packet-x509af-hfarr.c"
936     { &hf_x509af_x509af_Certificate_PDU,
937       { "Certificate", "x509af.Certificate",
938         FT_NONE, BASE_NONE, NULL, 0,
939         NULL, HFILL }},
940     { &hf_x509af_CertificatePair_PDU,
941       { "CertificatePair", "x509af.CertificatePair",
942         FT_NONE, BASE_NONE, NULL, 0,
943         NULL, HFILL }},
944     { &hf_x509af_CertificateList_PDU,
945       { "CertificateList", "x509af.CertificateList",
946         FT_NONE, BASE_NONE, NULL, 0,
947         NULL, HFILL }},
948     { &hf_x509af_AttributeCertificate_PDU,
949       { "AttributeCertificate", "x509af.AttributeCertificate",
950         FT_NONE, BASE_NONE, NULL, 0,
951         NULL, HFILL }},
952     { &hf_x509af_DSS_Params_PDU,
953       { "DSS-Params", "x509af.DSS_Params",
954         FT_NONE, BASE_NONE, NULL, 0,
955         NULL, HFILL }},
956     { &hf_x509af_signedCertificate,
957       { "signedCertificate", "x509af.signedCertificate",
958         FT_NONE, BASE_NONE, NULL, 0,
959         NULL, HFILL }},
960     { &hf_x509af_version,
961       { "version", "x509af.version",
962         FT_INT32, BASE_DEC, VALS(x509af_Version_vals), 0,
963         NULL, HFILL }},
964     { &hf_x509af_serialNumber,
965       { "serialNumber", "x509af.serialNumber",
966         FT_INT32, BASE_DEC, NULL, 0,
967         "CertificateSerialNumber", HFILL }},
968     { &hf_x509af_signature,
969       { "signature", "x509af.signature",
970         FT_NONE, BASE_NONE, NULL, 0,
971         "AlgorithmIdentifier", HFILL }},
972     { &hf_x509af_issuer,
973       { "issuer", "x509af.issuer",
974         FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
975         "Name", HFILL }},
976     { &hf_x509af_validity,
977       { "validity", "x509af.validity",
978         FT_NONE, BASE_NONE, NULL, 0,
979         NULL, HFILL }},
980     { &hf_x509af_subject,
981       { "subject", "x509af.subject",
982         FT_UINT32, BASE_DEC, VALS(x509af_SubjectName_vals), 0,
983         "SubjectName", HFILL }},
984     { &hf_x509af_subjectPublicKeyInfo,
985       { "subjectPublicKeyInfo", "x509af.subjectPublicKeyInfo",
986         FT_NONE, BASE_NONE, NULL, 0,
987         NULL, HFILL }},
988     { &hf_x509af_issuerUniqueIdentifier,
989       { "issuerUniqueIdentifier", "x509af.issuerUniqueIdentifier",
990         FT_BYTES, BASE_NONE, NULL, 0,
991         "UniqueIdentifier", HFILL }},
992     { &hf_x509af_subjectUniqueIdentifier,
993       { "subjectUniqueIdentifier", "x509af.subjectUniqueIdentifier",
994         FT_BYTES, BASE_NONE, NULL, 0,
995         "UniqueIdentifier", HFILL }},
996     { &hf_x509af_extensions,
997       { "extensions", "x509af.extensions",
998         FT_UINT32, BASE_DEC, NULL, 0,
999         NULL, HFILL }},
1000     { &hf_x509af_algorithmIdentifier,
1001       { "algorithmIdentifier", "x509af.algorithmIdentifier",
1002         FT_NONE, BASE_NONE, NULL, 0,
1003         NULL, HFILL }},
1004     { &hf_x509af_encrypted,
1005       { "encrypted", "x509af.encrypted",
1006         FT_BYTES, BASE_NONE, NULL, 0,
1007         "BIT_STRING", HFILL }},
1008     { &hf_x509af_rdnSequence,
1009       { "rdnSequence", "x509af.rdnSequence",
1010         FT_UINT32, BASE_DEC, NULL, 0,
1011         NULL, HFILL }},
1012     { &hf_x509af_algorithmId,
1013       { "algorithmId", "x509af.algorithmId",
1014         FT_OID, BASE_NONE, NULL, 0,
1015         NULL, HFILL }},
1016     { &hf_x509af_parameters,
1017       { "parameters", "x509af.parameters",
1018         FT_NONE, BASE_NONE, NULL, 0,
1019         NULL, HFILL }},
1020     { &hf_x509af_notBefore,
1021       { "notBefore", "x509af.notBefore",
1022         FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1023         "Time", HFILL }},
1024     { &hf_x509af_notAfter,
1025       { "notAfter", "x509af.notAfter",
1026         FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1027         "Time", HFILL }},
1028     { &hf_x509af_algorithm,
1029       { "algorithm", "x509af.algorithm",
1030         FT_NONE, BASE_NONE, NULL, 0,
1031         "AlgorithmIdentifier", HFILL }},
1032     { &hf_x509af_subjectPublicKey,
1033       { "subjectPublicKey", "x509af.subjectPublicKey",
1034         FT_BYTES, BASE_NONE, NULL, 0,
1035         "BIT_STRING", HFILL }},
1036     { &hf_x509af_utcTime,
1037       { "utcTime", "x509af.utcTime",
1038         FT_STRING, BASE_NONE, NULL, 0,
1039         NULL, HFILL }},
1040     { &hf_x509af_generalizedTime,
1041       { "generalizedTime", "x509af.generalizedTime",
1042         FT_STRING, BASE_NONE, NULL, 0,
1043         NULL, HFILL }},
1044     { &hf_x509af_Extensions_item,
1045       { "Extension", "x509af.Extension",
1046         FT_NONE, BASE_NONE, NULL, 0,
1047         NULL, HFILL }},
1048     { &hf_x509af_extnId,
1049       { "extnId", "x509af.extnId",
1050         FT_OID, BASE_NONE, NULL, 0,
1051         NULL, HFILL }},
1052     { &hf_x509af_critical,
1053       { "critical", "x509af.critical",
1054         FT_BOOLEAN, BASE_NONE, NULL, 0,
1055         "BOOLEAN", HFILL }},
1056     { &hf_x509af_extnValue,
1057       { "extnValue", "x509af.extnValue",
1058         FT_BYTES, BASE_NONE, NULL, 0,
1059         NULL, HFILL }},
1060     { &hf_x509af_userCertificate,
1061       { "userCertificate", "x509af.userCertificate",
1062         FT_NONE, BASE_NONE, NULL, 0,
1063         "Certificate", HFILL }},
1064     { &hf_x509af_certificationPath,
1065       { "certificationPath", "x509af.certificationPath",
1066         FT_UINT32, BASE_DEC, NULL, 0,
1067         "ForwardCertificationPath", HFILL }},
1068     { &hf_x509af_ForwardCertificationPath_item,
1069       { "CrossCertificates", "x509af.CrossCertificates",
1070         FT_UINT32, BASE_DEC, NULL, 0,
1071         NULL, HFILL }},
1072     { &hf_x509af_CrossCertificates_item,
1073       { "Certificate", "x509af.Certificate",
1074         FT_NONE, BASE_NONE, NULL, 0,
1075         NULL, HFILL }},
1076     { &hf_x509af_theCACertificates,
1077       { "theCACertificates", "x509af.theCACertificates",
1078         FT_UINT32, BASE_DEC, NULL, 0,
1079         "SEQUENCE_OF_CertificatePair", HFILL }},
1080     { &hf_x509af_theCACertificates_item,
1081       { "CertificatePair", "x509af.CertificatePair",
1082         FT_NONE, BASE_NONE, NULL, 0,
1083         NULL, HFILL }},
1084     { &hf_x509af_issuedByThisCA,
1085       { "issuedByThisCA", "x509af.issuedByThisCA",
1086         FT_NONE, BASE_NONE, NULL, 0,
1087         "Certificate", HFILL }},
1088     { &hf_x509af_issuedToThisCA,
1089       { "issuedToThisCA", "x509af.issuedToThisCA",
1090         FT_NONE, BASE_NONE, NULL, 0,
1091         "Certificate", HFILL }},
1092     { &hf_x509af_signedCertificateList,
1093       { "signedCertificateList", "x509af.signedCertificateList",
1094         FT_NONE, BASE_NONE, NULL, 0,
1095         NULL, HFILL }},
1096     { &hf_x509af_thisUpdate,
1097       { "thisUpdate", "x509af.thisUpdate",
1098         FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1099         "Time", HFILL }},
1100     { &hf_x509af_nextUpdate,
1101       { "nextUpdate", "x509af.nextUpdate",
1102         FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1103         "Time", HFILL }},
1104     { &hf_x509af_revokedCertificates,
1105       { "revokedCertificates", "x509af.revokedCertificates",
1106         FT_UINT32, BASE_DEC, NULL, 0,
1107         NULL, HFILL }},
1108     { &hf_x509af_revokedCertificates_item,
1109       { "revokedCertificates item", "x509af.revokedCertificates_item",
1110         FT_NONE, BASE_NONE, NULL, 0,
1111         NULL, HFILL }},
1112     { &hf_x509af_revokedUserCertificate,
1113       { "userCertificate", "x509af.userCertificate",
1114         FT_INT32, BASE_DEC, NULL, 0,
1115         "CertificateSerialNumber", HFILL }},
1116     { &hf_x509af_revocationDate,
1117       { "revocationDate", "x509af.revocationDate",
1118         FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1119         "Time", HFILL }},
1120     { &hf_x509af_crlEntryExtensions,
1121       { "crlEntryExtensions", "x509af.crlEntryExtensions",
1122         FT_UINT32, BASE_DEC, NULL, 0,
1123         "Extensions", HFILL }},
1124     { &hf_x509af_crlExtensions,
1125       { "crlExtensions", "x509af.crlExtensions",
1126         FT_UINT32, BASE_DEC, NULL, 0,
1127         "Extensions", HFILL }},
1128     { &hf_x509af_attributeCertificate,
1129       { "attributeCertificate", "x509af.attributeCertificate",
1130         FT_NONE, BASE_NONE, NULL, 0,
1131         NULL, HFILL }},
1132     { &hf_x509af_acPath,
1133       { "acPath", "x509af.acPath",
1134         FT_UINT32, BASE_DEC, NULL, 0,
1135         "SEQUENCE_OF_ACPathData", HFILL }},
1136     { &hf_x509af_acPath_item,
1137       { "ACPathData", "x509af.ACPathData",
1138         FT_NONE, BASE_NONE, NULL, 0,
1139         NULL, HFILL }},
1140     { &hf_x509af_certificate,
1141       { "certificate", "x509af.certificate",
1142         FT_NONE, BASE_NONE, NULL, 0,
1143         NULL, HFILL }},
1144     { &hf_x509af_signedAttributeCertificateInfo,
1145       { "signedAttributeCertificateInfo", "x509af.signedAttributeCertificateInfo",
1146         FT_NONE, BASE_NONE, NULL, 0,
1147         "AttributeCertificateInfo", HFILL }},
1148     { &hf_x509af_info_subject,
1149       { "subject", "x509af.subject",
1150         FT_UINT32, BASE_DEC, VALS(x509af_InfoSubject_vals), 0,
1151         "InfoSubject", HFILL }},
1152     { &hf_x509af_baseCertificateID,
1153       { "baseCertificateID", "x509af.baseCertificateID",
1154         FT_NONE, BASE_NONE, NULL, 0,
1155         "IssuerSerial", HFILL }},
1156     { &hf_x509af_infoSubjectName,
1157       { "subjectName", "x509af.subjectName",
1158         FT_UINT32, BASE_DEC, NULL, 0,
1159         "GeneralNames", HFILL }},
1160     { &hf_x509af_issuerName,
1161       { "issuer", "x509af.issuer",
1162         FT_UINT32, BASE_DEC, NULL, 0,
1163         "GeneralNames", HFILL }},
1164     { &hf_x509af_attCertValidityPeriod,
1165       { "attCertValidityPeriod", "x509af.attCertValidityPeriod",
1166         FT_NONE, BASE_NONE, NULL, 0,
1167         NULL, HFILL }},
1168     { &hf_x509af_attributes,
1169       { "attributes", "x509af.attributes",
1170         FT_UINT32, BASE_DEC, NULL, 0,
1171         "SEQUENCE_OF_Attribute", HFILL }},
1172     { &hf_x509af_attributes_item,
1173       { "Attribute", "x509af.Attribute",
1174         FT_NONE, BASE_NONE, NULL, 0,
1175         NULL, HFILL }},
1176     { &hf_x509af_issuerUniqueID,
1177       { "issuerUniqueID", "x509af.issuerUniqueID",
1178         FT_BYTES, BASE_NONE, NULL, 0,
1179         "UniqueIdentifier", HFILL }},
1180     { &hf_x509af_serial,
1181       { "serial", "x509af.serial",
1182         FT_INT32, BASE_DEC, NULL, 0,
1183         "CertificateSerialNumber", HFILL }},
1184     { &hf_x509af_issuerUID,
1185       { "issuerUID", "x509af.issuerUID",
1186         FT_BYTES, BASE_NONE, NULL, 0,
1187         "UniqueIdentifier", HFILL }},
1188     { &hf_x509af_notBeforeTime,
1189       { "notBeforeTime", "x509af.notBeforeTime",
1190         FT_STRING, BASE_NONE, NULL, 0,
1191         "GeneralizedTime", HFILL }},
1192     { &hf_x509af_notAfterTime,
1193       { "notAfterTime", "x509af.notAfterTime",
1194         FT_STRING, BASE_NONE, NULL, 0,
1195         "GeneralizedTime", HFILL }},
1196     { &hf_x509af_assertion_subject,
1197       { "subject", "x509af.subject",
1198         FT_UINT32, BASE_DEC, VALS(x509af_AssertionSubject_vals), 0,
1199         "AssertionSubject", HFILL }},
1200     { &hf_x509af_assertionSubjectName,
1201       { "subjectName", "x509af.subjectName",
1202         FT_UINT32, BASE_DEC, VALS(x509af_SubjectName_vals), 0,
1203         NULL, HFILL }},
1204     { &hf_x509af_assertionIssuer,
1205       { "issuer", "x509af.issuer",
1206         FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
1207         "Name", HFILL }},
1208     { &hf_x509af_attCertValidity,
1209       { "attCertValidity", "x509af.attCertValidity",
1210         FT_STRING, BASE_NONE, NULL, 0,
1211         "GeneralizedTime", HFILL }},
1212     { &hf_x509af_attType,
1213       { "attType", "x509af.attType",
1214         FT_UINT32, BASE_DEC, NULL, 0,
1215         "SET_OF_AttributeType", HFILL }},
1216     { &hf_x509af_attType_item,
1217       { "AttributeType", "x509af.AttributeType",
1218         FT_OID, BASE_NONE, NULL, 0,
1219         NULL, HFILL }},
1220     { &hf_x509af_p,
1221       { "p", "x509af.p",
1222         FT_INT32, BASE_DEC, NULL, 0,
1223         "INTEGER", HFILL }},
1224     { &hf_x509af_q,
1225       { "q", "x509af.q",
1226         FT_INT32, BASE_DEC, NULL, 0,
1227         "INTEGER", HFILL }},
1228     { &hf_x509af_g,
1229       { "g", "x509af.g",
1230         FT_INT32, BASE_DEC, NULL, 0,
1231         "INTEGER", HFILL }},
1232
1233 /*--- End of included file: packet-x509af-hfarr.c ---*/
1234 #line 101 "../../asn1/x509af/packet-x509af-template.c"
1235   };
1236
1237   /* List of subtrees */
1238   static gint *ett[] = {
1239     &ett_pkix_crl,
1240
1241 /*--- Included file: packet-x509af-ettarr.c ---*/
1242 #line 1 "../../asn1/x509af/packet-x509af-ettarr.c"
1243     &ett_x509af_Certificate,
1244     &ett_x509af_T_signedCertificate,
1245     &ett_x509af_SubjectName,
1246     &ett_x509af_AlgorithmIdentifier,
1247     &ett_x509af_Validity,
1248     &ett_x509af_SubjectPublicKeyInfo,
1249     &ett_x509af_Time,
1250     &ett_x509af_Extensions,
1251     &ett_x509af_Extension,
1252     &ett_x509af_Certificates,
1253     &ett_x509af_ForwardCertificationPath,
1254     &ett_x509af_CrossCertificates,
1255     &ett_x509af_CertificationPath,
1256     &ett_x509af_SEQUENCE_OF_CertificatePair,
1257     &ett_x509af_CertificatePair,
1258     &ett_x509af_CertificateList,
1259     &ett_x509af_T_signedCertificateList,
1260     &ett_x509af_T_revokedCertificates,
1261     &ett_x509af_T_revokedCertificates_item,
1262     &ett_x509af_AttributeCertificationPath,
1263     &ett_x509af_SEQUENCE_OF_ACPathData,
1264     &ett_x509af_ACPathData,
1265     &ett_x509af_AttributeCertificate,
1266     &ett_x509af_AttributeCertificateInfo,
1267     &ett_x509af_InfoSubject,
1268     &ett_x509af_SEQUENCE_OF_Attribute,
1269     &ett_x509af_IssuerSerial,
1270     &ett_x509af_AttCertValidityPeriod,
1271     &ett_x509af_AttributeCertificateAssertion,
1272     &ett_x509af_AssertionSubject,
1273     &ett_x509af_SET_OF_AttributeType,
1274     &ett_x509af_DSS_Params,
1275
1276 /*--- End of included file: packet-x509af-ettarr.c ---*/
1277 #line 107 "../../asn1/x509af/packet-x509af-template.c"
1278   };
1279
1280   /* Register protocol */
1281   proto_x509af = proto_register_protocol(PNAME, PSNAME, PFNAME);
1282
1283   /* Register fields and subtrees */
1284   proto_register_field_array(proto_x509af, hf, array_length(hf));
1285   proto_register_subtree_array(ett, array_length(ett));
1286
1287
1288   register_ber_syntax_dissector("Certificate", proto_x509af, dissect_x509af_Certificate_PDU); 
1289   register_ber_syntax_dissector("CertificateList", proto_x509af, dissect_CertificateList_PDU); 
1290   register_ber_syntax_dissector("CrossCertificatePair", proto_x509af, dissect_CertificatePair_PDU); 
1291
1292   register_ber_oid_syntax(".cer", NULL, "Certificate");
1293   register_ber_oid_syntax(".crt", NULL, "Certificate");
1294   register_ber_oid_syntax(".crl", NULL, "CertificateList");
1295 }
1296
1297
1298 /*--- proto_reg_handoff_x509af -------------------------------------------*/
1299 void proto_reg_handoff_x509af(void) {
1300         dissector_handle_t pkix_crl_handle;
1301
1302         pkix_crl_handle = new_create_dissector_handle(dissect_pkix_crl, proto_x509af);
1303         dissector_add_string("media_type", "application/pkix-crl", pkix_crl_handle);
1304
1305
1306 /*--- Included file: packet-x509af-dis-tab.c ---*/
1307 #line 1 "../../asn1/x509af/packet-x509af-dis-tab.c"
1308   register_ber_oid_dissector("2.5.4.36", dissect_x509af_Certificate_PDU, proto_x509af, "id-at-userCertificate");
1309   register_ber_oid_dissector("2.5.4.37", dissect_x509af_Certificate_PDU, proto_x509af, "id-at-cAcertificate");
1310   register_ber_oid_dissector("2.5.4.38", dissect_CertificateList_PDU, proto_x509af, "id-at-authorityRevocationList");
1311   register_ber_oid_dissector("2.5.4.39", dissect_CertificateList_PDU, proto_x509af, "id-at-certificateRevocationList");
1312   register_ber_oid_dissector("2.5.4.40", dissect_CertificatePair_PDU, proto_x509af, "id-at-crossCertificatePair");
1313   register_ber_oid_dissector("2.5.4.58", dissect_AttributeCertificate_PDU, proto_x509af, "id-at-attributeCertificate");
1314   register_ber_oid_dissector("2.5.4.59", dissect_CertificateList_PDU, proto_x509af, "id-at-attributeCertificateRevocationList");
1315   register_ber_oid_dissector("1.2.840.10040.4.1", dissect_DSS_Params_PDU, proto_x509af, "id-dsa");
1316
1317
1318 /*--- End of included file: packet-x509af-dis-tab.c ---*/
1319 #line 135 "../../asn1/x509af/packet-x509af-template.c"
1320
1321         /*XXX these should really go to a better place but since that
1322           I have not that ITU standard, ill put it here for the time
1323           being.
1324           Only implemented those algorithms that take no parameters 
1325           for the time being,   ronnie
1326         */
1327         /* from http://www.alvestrand.no/objectid/1.3.14.3.2.html */
1328         register_ber_oid_dissector("1.3.14.3.2.2", dissect_ber_oid_NULL_callback, proto_x509af, "md4WithRSA");
1329         register_ber_oid_dissector("1.3.14.3.2.3", dissect_ber_oid_NULL_callback, proto_x509af, "md5WithRSA");
1330         register_ber_oid_dissector("1.3.14.3.2.4", dissect_ber_oid_NULL_callback, proto_x509af, "md4WithRSAEncryption");
1331         register_ber_oid_dissector("1.3.14.3.2.6", dissect_ber_oid_NULL_callback, proto_x509af, "desECB");
1332         register_ber_oid_dissector("1.3.14.3.2.11", dissect_ber_oid_NULL_callback, proto_x509af, "rsaSignature");
1333         register_ber_oid_dissector("1.3.14.3.2.14", dissect_ber_oid_NULL_callback, proto_x509af, "mdc2WithRSASignature");
1334         register_ber_oid_dissector("1.3.14.3.2.15", dissect_ber_oid_NULL_callback, proto_x509af, "shaWithRSASignature");
1335         register_ber_oid_dissector("1.3.14.3.2.16", dissect_ber_oid_NULL_callback, proto_x509af, "dhWithCommonModulus");
1336         register_ber_oid_dissector("1.3.14.3.2.17", dissect_ber_oid_NULL_callback, proto_x509af, "desEDE");
1337         register_ber_oid_dissector("1.3.14.3.2.18", dissect_ber_oid_NULL_callback, proto_x509af, "sha");
1338         register_ber_oid_dissector("1.3.14.3.2.19", dissect_ber_oid_NULL_callback, proto_x509af, "mdc-2");
1339         register_ber_oid_dissector("1.3.14.3.2.20", dissect_ber_oid_NULL_callback, proto_x509af, "dsaCommon");
1340         register_ber_oid_dissector("1.3.14.3.2.21", dissect_ber_oid_NULL_callback, proto_x509af, "dsaCommonWithSHA");
1341         register_ber_oid_dissector("1.3.14.3.2.22", dissect_ber_oid_NULL_callback, proto_x509af, "rsaKeyTransport");
1342         register_ber_oid_dissector("1.3.14.3.2.23", dissect_ber_oid_NULL_callback, proto_x509af, "keyed-hash-seal");
1343         register_ber_oid_dissector("1.3.14.3.2.24", dissect_ber_oid_NULL_callback, proto_x509af, "md2WithRSASignature");
1344         register_ber_oid_dissector("1.3.14.3.2.25", dissect_ber_oid_NULL_callback, proto_x509af, "md5WithRSASignature");
1345         register_ber_oid_dissector("1.3.14.3.2.26", dissect_ber_oid_NULL_callback, proto_x509af, "SHA-1");
1346         register_ber_oid_dissector("1.3.14.3.2.27", dissect_ber_oid_NULL_callback, proto_x509af, "dsaWithSHA1");
1347         register_ber_oid_dissector("1.3.14.3.2.28", dissect_ber_oid_NULL_callback, proto_x509af, "dsaWithCommonSHA1");
1348         register_ber_oid_dissector("1.3.14.3.2.29", dissect_ber_oid_NULL_callback, proto_x509af, "sha-1WithRSAEncryption");
1349
1350         /* these will generally be encoded as ";binary" in LDAP */
1351
1352         register_ldap_name_dissector("cACertificate", dissect_x509af_Certificate_PDU, proto_x509af);
1353         register_ldap_name_dissector("userCertificate", dissect_x509af_Certificate_PDU, proto_x509af);
1354         
1355         register_ldap_name_dissector("certificateRevocationList", dissect_CertificateList_PDU, proto_x509af);
1356         register_ldap_name_dissector("crl", dissect_CertificateList_PDU, proto_x509af);
1357
1358         register_ldap_name_dissector("authorityRevocationList", dissect_CertificateList_PDU, proto_x509af);
1359         register_ldap_name_dissector("arl", dissect_CertificateList_PDU, proto_x509af);
1360
1361         register_ldap_name_dissector("crossCertificatePair", dissect_CertificatePair_PDU, proto_x509af);
1362 }
1363