1 /* Do not modify this file. */
2 /* It is created automatically by the ASN.1 to Wireshark dissector compiler */
4 /* ../../tools/asn2wrs.py -b -p x509af -c ./x509af.cnf -s ./packet-x509af-template -D . -O ../../epan/dissectors AuthenticationFramework.asn */
6 /* Input file: packet-x509af-template.c */
8 #line 1 "../../asn1/x509af/packet-x509af-template.c"
10 * Routines for X.509 Authentication Framework packet dissection
11 * Ronnie Sahlberg 2004
15 * Wireshark - Network traffic analyzer
16 * By Gerald Combs <gerald@wireshark.org>
17 * Copyright 1998 Gerald Combs
19 * This program is free software; you can redistribute it and/or
20 * modify it under the terms of the GNU General Public License
21 * as published by the Free Software Foundation; either version 2
22 * of the License, or (at your option) any later version.
24 * This program is distributed in the hope that it will be useful,
25 * but WITHOUT ANY WARRANTY; without even the implied warranty of
26 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
27 * GNU General Public License for more details.
29 * You should have received a copy of the GNU General Public License
30 * along with this program; if not, write to the Free Software
31 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
39 #include <epan/packet.h>
40 #include <epan/oids.h>
41 #include <epan/asn1.h>
43 #include "packet-ber.h"
44 #include "packet-x509af.h"
45 #include "packet-x509ce.h"
46 #include "packet-x509if.h"
47 #include "packet-x509sat.h"
48 #include "packet-ldap.h"
50 #define PNAME "X.509 Authentication Framework"
51 #define PSNAME "X509AF"
52 #define PFNAME "x509af"
54 /* Initialize the protocol and registered fields */
55 static int proto_x509af = -1;
56 static int hf_x509af_algorithm_id = -1;
57 static int hf_x509af_extension_id = -1;
59 /*--- Included file: packet-x509af-hf.c ---*/
60 #line 1 "../../asn1/x509af/packet-x509af-hf.c"
61 static int hf_x509af_x509af_Certificate_PDU = -1; /* Certificate */
62 static int hf_x509af_CertificatePair_PDU = -1; /* CertificatePair */
63 static int hf_x509af_CertificateList_PDU = -1; /* CertificateList */
64 static int hf_x509af_AttributeCertificate_PDU = -1; /* AttributeCertificate */
65 static int hf_x509af_DSS_Params_PDU = -1; /* DSS_Params */
66 static int hf_x509af_signedCertificate = -1; /* T_signedCertificate */
67 static int hf_x509af_version = -1; /* Version */
68 static int hf_x509af_serialNumber = -1; /* CertificateSerialNumber */
69 static int hf_x509af_signature = -1; /* AlgorithmIdentifier */
70 static int hf_x509af_issuer = -1; /* Name */
71 static int hf_x509af_validity = -1; /* Validity */
72 static int hf_x509af_subject = -1; /* SubjectName */
73 static int hf_x509af_subjectPublicKeyInfo = -1; /* SubjectPublicKeyInfo */
74 static int hf_x509af_issuerUniqueIdentifier = -1; /* UniqueIdentifier */
75 static int hf_x509af_subjectUniqueIdentifier = -1; /* UniqueIdentifier */
76 static int hf_x509af_extensions = -1; /* Extensions */
77 static int hf_x509af_algorithmIdentifier = -1; /* AlgorithmIdentifier */
78 static int hf_x509af_encrypted = -1; /* BIT_STRING */
79 static int hf_x509af_rdnSequence = -1; /* RDNSequence */
80 static int hf_x509af_algorithmId = -1; /* T_algorithmId */
81 static int hf_x509af_parameters = -1; /* T_parameters */
82 static int hf_x509af_notBefore = -1; /* Time */
83 static int hf_x509af_notAfter = -1; /* Time */
84 static int hf_x509af_algorithm = -1; /* AlgorithmIdentifier */
85 static int hf_x509af_subjectPublicKey = -1; /* BIT_STRING */
86 static int hf_x509af_utcTime = -1; /* UTCTime */
87 static int hf_x509af_generalizedTime = -1; /* GeneralizedTime */
88 static int hf_x509af_Extensions_item = -1; /* Extension */
89 static int hf_x509af_extnId = -1; /* T_extnId */
90 static int hf_x509af_critical = -1; /* BOOLEAN */
91 static int hf_x509af_extnValue = -1; /* T_extnValue */
92 static int hf_x509af_userCertificate = -1; /* Certificate */
93 static int hf_x509af_certificationPath = -1; /* ForwardCertificationPath */
94 static int hf_x509af_ForwardCertificationPath_item = -1; /* CrossCertificates */
95 static int hf_x509af_CrossCertificates_item = -1; /* Certificate */
96 static int hf_x509af_theCACertificates = -1; /* SEQUENCE_OF_CertificatePair */
97 static int hf_x509af_theCACertificates_item = -1; /* CertificatePair */
98 static int hf_x509af_issuedByThisCA = -1; /* Certificate */
99 static int hf_x509af_issuedToThisCA = -1; /* Certificate */
100 static int hf_x509af_signedCertificateList = -1; /* T_signedCertificateList */
101 static int hf_x509af_thisUpdate = -1; /* Time */
102 static int hf_x509af_nextUpdate = -1; /* Time */
103 static int hf_x509af_revokedCertificates = -1; /* T_revokedCertificates */
104 static int hf_x509af_revokedCertificates_item = -1; /* T_revokedCertificates_item */
105 static int hf_x509af_revokedUserCertificate = -1; /* CertificateSerialNumber */
106 static int hf_x509af_revocationDate = -1; /* Time */
107 static int hf_x509af_crlEntryExtensions = -1; /* Extensions */
108 static int hf_x509af_crlExtensions = -1; /* Extensions */
109 static int hf_x509af_attributeCertificate = -1; /* AttributeCertificate */
110 static int hf_x509af_acPath = -1; /* SEQUENCE_OF_ACPathData */
111 static int hf_x509af_acPath_item = -1; /* ACPathData */
112 static int hf_x509af_certificate = -1; /* Certificate */
113 static int hf_x509af_signedAttributeCertificateInfo = -1; /* AttributeCertificateInfo */
114 static int hf_x509af_info_subject = -1; /* InfoSubject */
115 static int hf_x509af_baseCertificateID = -1; /* IssuerSerial */
116 static int hf_x509af_infoSubjectName = -1; /* GeneralNames */
117 static int hf_x509af_issuerName = -1; /* GeneralNames */
118 static int hf_x509af_attCertValidityPeriod = -1; /* AttCertValidityPeriod */
119 static int hf_x509af_attributes = -1; /* SEQUENCE_OF_Attribute */
120 static int hf_x509af_attributes_item = -1; /* Attribute */
121 static int hf_x509af_issuerUniqueID = -1; /* UniqueIdentifier */
122 static int hf_x509af_serial = -1; /* CertificateSerialNumber */
123 static int hf_x509af_issuerUID = -1; /* UniqueIdentifier */
124 static int hf_x509af_notBeforeTime = -1; /* GeneralizedTime */
125 static int hf_x509af_notAfterTime = -1; /* GeneralizedTime */
126 static int hf_x509af_assertion_subject = -1; /* AssertionSubject */
127 static int hf_x509af_assertionSubjectName = -1; /* SubjectName */
128 static int hf_x509af_assertionIssuer = -1; /* Name */
129 static int hf_x509af_attCertValidity = -1; /* GeneralizedTime */
130 static int hf_x509af_attType = -1; /* SET_OF_AttributeType */
131 static int hf_x509af_attType_item = -1; /* AttributeType */
132 static int hf_x509af_p = -1; /* INTEGER */
133 static int hf_x509af_q = -1; /* INTEGER */
134 static int hf_x509af_g = -1; /* INTEGER */
136 /*--- End of included file: packet-x509af-hf.c ---*/
137 #line 51 "../../asn1/x509af/packet-x509af-template.c"
139 /* Initialize the subtree pointers */
140 static gint ett_pkix_crl = -1;
142 /*--- Included file: packet-x509af-ett.c ---*/
143 #line 1 "../../asn1/x509af/packet-x509af-ett.c"
144 static gint ett_x509af_Certificate = -1;
145 static gint ett_x509af_T_signedCertificate = -1;
146 static gint ett_x509af_SubjectName = -1;
147 static gint ett_x509af_AlgorithmIdentifier = -1;
148 static gint ett_x509af_Validity = -1;
149 static gint ett_x509af_SubjectPublicKeyInfo = -1;
150 static gint ett_x509af_Time = -1;
151 static gint ett_x509af_Extensions = -1;
152 static gint ett_x509af_Extension = -1;
153 static gint ett_x509af_Certificates = -1;
154 static gint ett_x509af_ForwardCertificationPath = -1;
155 static gint ett_x509af_CrossCertificates = -1;
156 static gint ett_x509af_CertificationPath = -1;
157 static gint ett_x509af_SEQUENCE_OF_CertificatePair = -1;
158 static gint ett_x509af_CertificatePair = -1;
159 static gint ett_x509af_CertificateList = -1;
160 static gint ett_x509af_T_signedCertificateList = -1;
161 static gint ett_x509af_T_revokedCertificates = -1;
162 static gint ett_x509af_T_revokedCertificates_item = -1;
163 static gint ett_x509af_AttributeCertificationPath = -1;
164 static gint ett_x509af_SEQUENCE_OF_ACPathData = -1;
165 static gint ett_x509af_ACPathData = -1;
166 static gint ett_x509af_AttributeCertificate = -1;
167 static gint ett_x509af_AttributeCertificateInfo = -1;
168 static gint ett_x509af_InfoSubject = -1;
169 static gint ett_x509af_SEQUENCE_OF_Attribute = -1;
170 static gint ett_x509af_IssuerSerial = -1;
171 static gint ett_x509af_AttCertValidityPeriod = -1;
172 static gint ett_x509af_AttributeCertificateAssertion = -1;
173 static gint ett_x509af_AssertionSubject = -1;
174 static gint ett_x509af_SET_OF_AttributeType = -1;
175 static gint ett_x509af_DSS_Params = -1;
177 /*--- End of included file: packet-x509af-ett.c ---*/
178 #line 55 "../../asn1/x509af/packet-x509af-template.c"
180 static const char *algorithm_id;
181 static const char *extension_id;
184 /*--- Included file: packet-x509af-fn.c ---*/
185 #line 1 "../../asn1/x509af/packet-x509af-fn.c"
187 const value_string x509af_Version_vals[] = {
196 dissect_x509af_Version(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
197 offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
206 dissect_x509af_CertificateSerialNumber(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
207 offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
216 dissect_x509af_T_algorithmId(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
217 #line 70 "../../asn1/x509af/x509af.cnf"
220 offset = dissect_ber_object_identifier_str(implicit_tag, actx, tree, tvb, offset, hf_x509af_algorithm_id, &algorithm_id);
224 name = oid_resolved_from_string(algorithm_id);
226 proto_item_append_text(tree, " (%s)", name ? name : algorithm_id);
237 dissect_x509af_T_parameters(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
238 #line 81 "../../asn1/x509af/x509af.cnf"
239 offset=call_ber_oid_callback(algorithm_id, tvb, offset, actx->pinfo, tree);
247 static const ber_sequence_t AlgorithmIdentifier_sequence[] = {
248 { &hf_x509af_algorithmId , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509af_T_algorithmId },
249 { &hf_x509af_parameters , BER_CLASS_ANY, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_T_parameters },
250 { NULL, 0, 0, 0, NULL }
254 dissect_x509af_AlgorithmIdentifier(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
255 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
256 AlgorithmIdentifier_sequence, hf_index, ett_x509af_AlgorithmIdentifier);
264 dissect_x509af_UTCTime(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
265 offset = dissect_ber_UTCTime(implicit_tag, actx, tree, tvb, offset, hf_index);
273 dissect_x509af_GeneralizedTime(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
274 offset = dissect_ber_GeneralizedTime(implicit_tag, actx, tree, tvb, offset, hf_index);
280 const value_string x509af_Time_vals[] = {
282 { 1, "generalizedTime" },
286 static const ber_choice_t Time_choice[] = {
287 { 0, &hf_x509af_utcTime , BER_CLASS_UNI, BER_UNI_TAG_UTCTime, BER_FLAGS_NOOWNTAG, dissect_x509af_UTCTime },
288 { 1, &hf_x509af_generalizedTime, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_x509af_GeneralizedTime },
289 { 0, NULL, 0, 0, 0, NULL }
293 dissect_x509af_Time(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
294 offset = dissect_ber_choice(actx, tree, tvb, offset,
295 Time_choice, hf_index, ett_x509af_Time,
302 static const ber_sequence_t Validity_sequence[] = {
303 { &hf_x509af_notBefore , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
304 { &hf_x509af_notAfter , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
305 { NULL, 0, 0, 0, NULL }
309 dissect_x509af_Validity(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
310 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
311 Validity_sequence, hf_index, ett_x509af_Validity);
317 static const value_string x509af_SubjectName_vals[] = {
318 { 0, "rdnSequence" },
322 static const ber_choice_t SubjectName_choice[] = {
323 { 0, &hf_x509af_rdnSequence , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509if_RDNSequence },
324 { 0, NULL, 0, 0, 0, NULL }
328 dissect_x509af_SubjectName(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
329 #line 108 "../../asn1/x509af/x509af.cnf"
332 offset = dissect_ber_choice(actx, tree, tvb, offset,
333 SubjectName_choice, hf_index, ett_x509af_SubjectName,
337 str = x509if_get_last_dn();
338 proto_item_append_text(proto_item_get_parent(tree), " (%s)", str?str:"");
348 dissect_x509af_BIT_STRING(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
349 offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
357 static const ber_sequence_t SubjectPublicKeyInfo_sequence[] = {
358 { &hf_x509af_algorithm , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
359 { &hf_x509af_subjectPublicKey, BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
360 { NULL, 0, 0, 0, NULL }
364 dissect_x509af_SubjectPublicKeyInfo(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
365 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
366 SubjectPublicKeyInfo_sequence, hf_index, ett_x509af_SubjectPublicKeyInfo);
374 dissect_x509af_T_extnId(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
375 #line 87 "../../asn1/x509af/x509af.cnf"
378 offset = dissect_ber_object_identifier_str(implicit_tag, actx, tree, tvb, offset, hf_x509af_extension_id, &extension_id);
382 name = oid_resolved_from_string(extension_id);
384 proto_item_append_text(tree, " (%s)", name ? name : extension_id);
395 dissect_x509af_BOOLEAN(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
396 offset = dissect_ber_boolean(implicit_tag, actx, tree, tvb, offset, hf_index, NULL);
404 dissect_x509af_T_extnValue(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
405 #line 98 "../../asn1/x509af/x509af.cnf"
410 /* skip past the T and L */
411 offset = dissect_ber_identifier(actx->pinfo, tree, tvb, offset, &class, &pc, &tag);
412 offset = dissect_ber_length(actx->pinfo, tree, tvb, offset, &len, &ind);
413 offset=call_ber_oid_callback(extension_id, tvb, offset, actx->pinfo, tree);
421 static const ber_sequence_t Extension_sequence[] = {
422 { &hf_x509af_extnId , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509af_T_extnId },
423 { &hf_x509af_critical , BER_CLASS_UNI, BER_UNI_TAG_BOOLEAN, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_BOOLEAN },
424 { &hf_x509af_extnValue , BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_T_extnValue },
425 { NULL, 0, 0, 0, NULL }
429 dissect_x509af_Extension(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
430 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
431 Extension_sequence, hf_index, ett_x509af_Extension);
437 static const ber_sequence_t Extensions_sequence_of[1] = {
438 { &hf_x509af_Extensions_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Extension },
442 dissect_x509af_Extensions(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
443 offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
444 Extensions_sequence_of, hf_index, ett_x509af_Extensions);
450 static const ber_sequence_t T_signedCertificate_sequence[] = {
451 { &hf_x509af_version , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Version },
452 { &hf_x509af_serialNumber , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
453 { &hf_x509af_signature , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
454 { &hf_x509af_issuer , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
455 { &hf_x509af_validity , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Validity },
456 { &hf_x509af_subject , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_SubjectName },
457 { &hf_x509af_subjectPublicKeyInfo, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_SubjectPublicKeyInfo },
458 { &hf_x509af_issuerUniqueIdentifier, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509sat_UniqueIdentifier },
459 { &hf_x509af_subjectUniqueIdentifier, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509sat_UniqueIdentifier },
460 { &hf_x509af_extensions , BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_x509af_Extensions },
461 { NULL, 0, 0, 0, NULL }
465 dissect_x509af_T_signedCertificate(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
466 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
467 T_signedCertificate_sequence, hf_index, ett_x509af_T_signedCertificate);
473 static const ber_sequence_t Certificate_sequence[] = {
474 { &hf_x509af_signedCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_T_signedCertificate },
475 { &hf_x509af_algorithmIdentifier, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
476 { &hf_x509af_encrypted , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
477 { NULL, 0, 0, 0, NULL }
481 dissect_x509af_Certificate(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
482 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
483 Certificate_sequence, hf_index, ett_x509af_Certificate);
489 static const ber_sequence_t CrossCertificates_set_of[1] = {
490 { &hf_x509af_CrossCertificates_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Certificate },
494 dissect_x509af_CrossCertificates(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
495 offset = dissect_ber_set_of(implicit_tag, actx, tree, tvb, offset,
496 CrossCertificates_set_of, hf_index, ett_x509af_CrossCertificates);
502 static const ber_sequence_t ForwardCertificationPath_sequence_of[1] = {
503 { &hf_x509af_ForwardCertificationPath_item, BER_CLASS_UNI, BER_UNI_TAG_SET, BER_FLAGS_NOOWNTAG, dissect_x509af_CrossCertificates },
507 dissect_x509af_ForwardCertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
508 offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
509 ForwardCertificationPath_sequence_of, hf_index, ett_x509af_ForwardCertificationPath);
515 static const ber_sequence_t Certificates_sequence[] = {
516 { &hf_x509af_userCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Certificate },
517 { &hf_x509af_certificationPath, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_ForwardCertificationPath },
518 { NULL, 0, 0, 0, NULL }
522 dissect_x509af_Certificates(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
523 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
524 Certificates_sequence, hf_index, ett_x509af_Certificates);
530 static const ber_sequence_t CertificatePair_sequence[] = {
531 { &hf_x509af_issuedByThisCA, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Certificate },
532 { &hf_x509af_issuedToThisCA, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_x509af_Certificate },
533 { NULL, 0, 0, 0, NULL }
537 dissect_x509af_CertificatePair(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
538 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
539 CertificatePair_sequence, hf_index, ett_x509af_CertificatePair);
545 static const ber_sequence_t SEQUENCE_OF_CertificatePair_sequence_of[1] = {
546 { &hf_x509af_theCACertificates_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificatePair },
550 dissect_x509af_SEQUENCE_OF_CertificatePair(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
551 offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
552 SEQUENCE_OF_CertificatePair_sequence_of, hf_index, ett_x509af_SEQUENCE_OF_CertificatePair);
558 static const ber_sequence_t CertificationPath_sequence[] = {
559 { &hf_x509af_userCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_Certificate },
560 { &hf_x509af_theCACertificates, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_SEQUENCE_OF_CertificatePair },
561 { NULL, 0, 0, 0, NULL }
565 dissect_x509af_CertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
566 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
567 CertificationPath_sequence, hf_index, ett_x509af_CertificationPath);
573 static const ber_sequence_t T_revokedCertificates_item_sequence[] = {
574 { &hf_x509af_revokedUserCertificate, BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
575 { &hf_x509af_revocationDate, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
576 { &hf_x509af_crlEntryExtensions, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Extensions },
577 { NULL, 0, 0, 0, NULL }
581 dissect_x509af_T_revokedCertificates_item(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
582 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
583 T_revokedCertificates_item_sequence, hf_index, ett_x509af_T_revokedCertificates_item);
589 static const ber_sequence_t T_revokedCertificates_sequence_of[1] = {
590 { &hf_x509af_revokedCertificates_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_T_revokedCertificates_item },
594 dissect_x509af_T_revokedCertificates(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
595 offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
596 T_revokedCertificates_sequence_of, hf_index, ett_x509af_T_revokedCertificates);
602 static const ber_sequence_t T_signedCertificateList_sequence[] = {
603 { &hf_x509af_version , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Version },
604 { &hf_x509af_signature , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
605 { &hf_x509af_issuer , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
606 { &hf_x509af_thisUpdate , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
607 { &hf_x509af_nextUpdate , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_Time },
608 { &hf_x509af_revokedCertificates, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_T_revokedCertificates },
609 { &hf_x509af_crlExtensions, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Extensions },
610 { NULL, 0, 0, 0, NULL }
614 dissect_x509af_T_signedCertificateList(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
615 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
616 T_signedCertificateList_sequence, hf_index, ett_x509af_T_signedCertificateList);
622 static const ber_sequence_t CertificateList_sequence[] = {
623 { &hf_x509af_signedCertificateList, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_T_signedCertificateList },
624 { &hf_x509af_algorithmIdentifier, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
625 { &hf_x509af_encrypted , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
626 { NULL, 0, 0, 0, NULL }
630 dissect_x509af_CertificateList(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
631 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
632 CertificateList_sequence, hf_index, ett_x509af_CertificateList);
638 static const ber_sequence_t IssuerSerial_sequence[] = {
639 { &hf_x509af_issuerName , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralNames },
640 { &hf_x509af_serial , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
641 { &hf_x509af_issuerUID , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509sat_UniqueIdentifier },
642 { NULL, 0, 0, 0, NULL }
646 dissect_x509af_IssuerSerial(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
647 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
648 IssuerSerial_sequence, hf_index, ett_x509af_IssuerSerial);
654 static const value_string x509af_InfoSubject_vals[] = {
655 { 0, "baseCertificateID" },
656 { 1, "subjectName" },
660 static const ber_choice_t InfoSubject_choice[] = {
661 { 0, &hf_x509af_baseCertificateID, BER_CLASS_CON, 0, 0, dissect_x509af_IssuerSerial },
662 { 1, &hf_x509af_infoSubjectName, BER_CLASS_CON, 1, 0, dissect_x509ce_GeneralNames },
663 { 0, NULL, 0, 0, 0, NULL }
667 dissect_x509af_InfoSubject(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
668 offset = dissect_ber_choice(actx, tree, tvb, offset,
669 InfoSubject_choice, hf_index, ett_x509af_InfoSubject,
676 static const ber_sequence_t AttCertValidityPeriod_sequence[] = {
677 { &hf_x509af_notBeforeTime, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_x509af_GeneralizedTime },
678 { &hf_x509af_notAfterTime , BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_x509af_GeneralizedTime },
679 { NULL, 0, 0, 0, NULL }
683 dissect_x509af_AttCertValidityPeriod(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
684 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
685 AttCertValidityPeriod_sequence, hf_index, ett_x509af_AttCertValidityPeriod);
691 static const ber_sequence_t SEQUENCE_OF_Attribute_sequence_of[1] = {
692 { &hf_x509af_attributes_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509if_Attribute },
696 dissect_x509af_SEQUENCE_OF_Attribute(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
697 offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
698 SEQUENCE_OF_Attribute_sequence_of, hf_index, ett_x509af_SEQUENCE_OF_Attribute);
704 static const ber_sequence_t AttributeCertificateInfo_sequence[] = {
705 { &hf_x509af_version , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Version },
706 { &hf_x509af_info_subject , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509af_InfoSubject },
707 { &hf_x509af_issuerName , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralNames },
708 { &hf_x509af_signature , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
709 { &hf_x509af_serialNumber , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
710 { &hf_x509af_attCertValidityPeriod, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AttCertValidityPeriod },
711 { &hf_x509af_attributes , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_SEQUENCE_OF_Attribute },
712 { &hf_x509af_issuerUniqueID, BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509sat_UniqueIdentifier },
713 { &hf_x509af_extensions , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Extensions },
714 { NULL, 0, 0, 0, NULL }
718 dissect_x509af_AttributeCertificateInfo(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
719 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
720 AttributeCertificateInfo_sequence, hf_index, ett_x509af_AttributeCertificateInfo);
726 static const ber_sequence_t AttributeCertificate_sequence[] = {
727 { &hf_x509af_signedAttributeCertificateInfo, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AttributeCertificateInfo },
728 { &hf_x509af_algorithmIdentifier, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AlgorithmIdentifier },
729 { &hf_x509af_encrypted , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_x509af_BIT_STRING },
730 { NULL, 0, 0, 0, NULL }
734 dissect_x509af_AttributeCertificate(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
735 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
736 AttributeCertificate_sequence, hf_index, ett_x509af_AttributeCertificate);
742 static const ber_sequence_t ACPathData_sequence[] = {
743 { &hf_x509af_certificate , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_Certificate },
744 { &hf_x509af_attributeCertificate, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_x509af_AttributeCertificate },
745 { NULL, 0, 0, 0, NULL }
749 dissect_x509af_ACPathData(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
750 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
751 ACPathData_sequence, hf_index, ett_x509af_ACPathData);
757 static const ber_sequence_t SEQUENCE_OF_ACPathData_sequence_of[1] = {
758 { &hf_x509af_acPath_item , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_ACPathData },
762 dissect_x509af_SEQUENCE_OF_ACPathData(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
763 offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
764 SEQUENCE_OF_ACPathData_sequence_of, hf_index, ett_x509af_SEQUENCE_OF_ACPathData);
770 static const ber_sequence_t AttributeCertificationPath_sequence[] = {
771 { &hf_x509af_attributeCertificate, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509af_AttributeCertificate },
772 { &hf_x509af_acPath , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_SEQUENCE_OF_ACPathData },
773 { NULL, 0, 0, 0, NULL }
777 dissect_x509af_AttributeCertificationPath(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
778 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
779 AttributeCertificationPath_sequence, hf_index, ett_x509af_AttributeCertificationPath);
785 static const value_string x509af_AssertionSubject_vals[] = {
786 { 0, "baseCertificateID" },
787 { 1, "subjectName" },
791 static const ber_choice_t AssertionSubject_choice[] = {
792 { 0, &hf_x509af_baseCertificateID, BER_CLASS_CON, 0, 0, dissect_x509af_IssuerSerial },
793 { 1, &hf_x509af_assertionSubjectName, BER_CLASS_CON, 1, 0, dissect_x509af_SubjectName },
794 { 0, NULL, 0, 0, 0, NULL }
798 dissect_x509af_AssertionSubject(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
799 offset = dissect_ber_choice(actx, tree, tvb, offset,
800 AssertionSubject_choice, hf_index, ett_x509af_AssertionSubject,
807 static const ber_sequence_t SET_OF_AttributeType_set_of[1] = {
808 { &hf_x509af_attType_item , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509if_AttributeType },
812 dissect_x509af_SET_OF_AttributeType(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
813 offset = dissect_ber_set_of(implicit_tag, actx, tree, tvb, offset,
814 SET_OF_AttributeType_set_of, hf_index, ett_x509af_SET_OF_AttributeType);
820 static const ber_sequence_t AttributeCertificateAssertion_sequence[] = {
821 { &hf_x509af_assertion_subject, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_x509af_AssertionSubject },
822 { &hf_x509af_assertionIssuer, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_x509if_Name },
823 { &hf_x509af_attCertValidity, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL, dissect_x509af_GeneralizedTime },
824 { &hf_x509af_attType , BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_x509af_SET_OF_AttributeType },
825 { NULL, 0, 0, 0, NULL }
829 dissect_x509af_AttributeCertificateAssertion(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
830 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
831 AttributeCertificateAssertion_sequence, hf_index, ett_x509af_AttributeCertificateAssertion);
839 dissect_x509af_INTEGER(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
840 offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
847 static const ber_sequence_t DSS_Params_sequence[] = {
848 { &hf_x509af_p , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_INTEGER },
849 { &hf_x509af_q , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_INTEGER },
850 { &hf_x509af_g , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_INTEGER },
851 { NULL, 0, 0, 0, NULL }
855 dissect_x509af_DSS_Params(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
856 offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
857 DSS_Params_sequence, hf_index, ett_x509af_DSS_Params);
864 void dissect_x509af_Certificate_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
866 asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
867 dissect_x509af_Certificate(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_x509af_Certificate_PDU);
869 static void dissect_CertificatePair_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
871 asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
872 dissect_x509af_CertificatePair(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_CertificatePair_PDU);
874 static void dissect_CertificateList_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
876 asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
877 dissect_x509af_CertificateList(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_CertificateList_PDU);
879 static void dissect_AttributeCertificate_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
881 asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
882 dissect_x509af_AttributeCertificate(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_AttributeCertificate_PDU);
884 static void dissect_DSS_Params_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
886 asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
887 dissect_x509af_DSS_Params(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509af_DSS_Params_PDU);
891 /*--- End of included file: packet-x509af-fn.c ---*/
892 #line 60 "../../asn1/x509af/packet-x509af-template.c"
894 const char *x509af_get_last_algorithm_id(void) {
900 dissect_pkix_crl(tvbuff_t *tvb, packet_info *pinfo, proto_tree *parent_tree)
902 proto_item *item=NULL;
903 proto_tree *tree=NULL;
905 asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
907 col_set_str(pinfo->cinfo, COL_PROTOCOL, "PKIX-CRL");
909 col_set_str(pinfo->cinfo, COL_INFO, "Certificate Revocation List");
913 item=proto_tree_add_text(parent_tree, tvb, 0, -1, "Certificate Revocation List");
914 tree = proto_item_add_subtree(item, ett_pkix_crl);
917 return dissect_x509af_CertificateList(FALSE, tvb, 0, &asn1_ctx, tree, -1);
920 /*--- proto_register_x509af ----------------------------------------------*/
921 void proto_register_x509af(void) {
924 static hf_register_info hf[] = {
925 { &hf_x509af_algorithm_id,
926 { "Algorithm Id", "x509af.algorithm.id",
927 FT_OID, BASE_NONE, NULL, 0,
929 { &hf_x509af_extension_id,
930 { "Extension Id", "x509af.extension.id",
931 FT_OID, BASE_NONE, NULL, 0,
934 /*--- Included file: packet-x509af-hfarr.c ---*/
935 #line 1 "../../asn1/x509af/packet-x509af-hfarr.c"
936 { &hf_x509af_x509af_Certificate_PDU,
937 { "Certificate", "x509af.Certificate",
938 FT_NONE, BASE_NONE, NULL, 0,
940 { &hf_x509af_CertificatePair_PDU,
941 { "CertificatePair", "x509af.CertificatePair",
942 FT_NONE, BASE_NONE, NULL, 0,
944 { &hf_x509af_CertificateList_PDU,
945 { "CertificateList", "x509af.CertificateList",
946 FT_NONE, BASE_NONE, NULL, 0,
948 { &hf_x509af_AttributeCertificate_PDU,
949 { "AttributeCertificate", "x509af.AttributeCertificate",
950 FT_NONE, BASE_NONE, NULL, 0,
952 { &hf_x509af_DSS_Params_PDU,
953 { "DSS-Params", "x509af.DSS_Params",
954 FT_NONE, BASE_NONE, NULL, 0,
956 { &hf_x509af_signedCertificate,
957 { "signedCertificate", "x509af.signedCertificate",
958 FT_NONE, BASE_NONE, NULL, 0,
960 { &hf_x509af_version,
961 { "version", "x509af.version",
962 FT_INT32, BASE_DEC, VALS(x509af_Version_vals), 0,
964 { &hf_x509af_serialNumber,
965 { "serialNumber", "x509af.serialNumber",
966 FT_INT32, BASE_DEC, NULL, 0,
967 "CertificateSerialNumber", HFILL }},
968 { &hf_x509af_signature,
969 { "signature", "x509af.signature",
970 FT_NONE, BASE_NONE, NULL, 0,
971 "AlgorithmIdentifier", HFILL }},
973 { "issuer", "x509af.issuer",
974 FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
976 { &hf_x509af_validity,
977 { "validity", "x509af.validity",
978 FT_NONE, BASE_NONE, NULL, 0,
980 { &hf_x509af_subject,
981 { "subject", "x509af.subject",
982 FT_UINT32, BASE_DEC, VALS(x509af_SubjectName_vals), 0,
983 "SubjectName", HFILL }},
984 { &hf_x509af_subjectPublicKeyInfo,
985 { "subjectPublicKeyInfo", "x509af.subjectPublicKeyInfo",
986 FT_NONE, BASE_NONE, NULL, 0,
988 { &hf_x509af_issuerUniqueIdentifier,
989 { "issuerUniqueIdentifier", "x509af.issuerUniqueIdentifier",
990 FT_BYTES, BASE_NONE, NULL, 0,
991 "UniqueIdentifier", HFILL }},
992 { &hf_x509af_subjectUniqueIdentifier,
993 { "subjectUniqueIdentifier", "x509af.subjectUniqueIdentifier",
994 FT_BYTES, BASE_NONE, NULL, 0,
995 "UniqueIdentifier", HFILL }},
996 { &hf_x509af_extensions,
997 { "extensions", "x509af.extensions",
998 FT_UINT32, BASE_DEC, NULL, 0,
1000 { &hf_x509af_algorithmIdentifier,
1001 { "algorithmIdentifier", "x509af.algorithmIdentifier",
1002 FT_NONE, BASE_NONE, NULL, 0,
1004 { &hf_x509af_encrypted,
1005 { "encrypted", "x509af.encrypted",
1006 FT_BYTES, BASE_NONE, NULL, 0,
1007 "BIT_STRING", HFILL }},
1008 { &hf_x509af_rdnSequence,
1009 { "rdnSequence", "x509af.rdnSequence",
1010 FT_UINT32, BASE_DEC, NULL, 0,
1012 { &hf_x509af_algorithmId,
1013 { "algorithmId", "x509af.algorithmId",
1014 FT_OID, BASE_NONE, NULL, 0,
1016 { &hf_x509af_parameters,
1017 { "parameters", "x509af.parameters",
1018 FT_NONE, BASE_NONE, NULL, 0,
1020 { &hf_x509af_notBefore,
1021 { "notBefore", "x509af.notBefore",
1022 FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1024 { &hf_x509af_notAfter,
1025 { "notAfter", "x509af.notAfter",
1026 FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1028 { &hf_x509af_algorithm,
1029 { "algorithm", "x509af.algorithm",
1030 FT_NONE, BASE_NONE, NULL, 0,
1031 "AlgorithmIdentifier", HFILL }},
1032 { &hf_x509af_subjectPublicKey,
1033 { "subjectPublicKey", "x509af.subjectPublicKey",
1034 FT_BYTES, BASE_NONE, NULL, 0,
1035 "BIT_STRING", HFILL }},
1036 { &hf_x509af_utcTime,
1037 { "utcTime", "x509af.utcTime",
1038 FT_STRING, BASE_NONE, NULL, 0,
1040 { &hf_x509af_generalizedTime,
1041 { "generalizedTime", "x509af.generalizedTime",
1042 FT_STRING, BASE_NONE, NULL, 0,
1044 { &hf_x509af_Extensions_item,
1045 { "Extension", "x509af.Extension",
1046 FT_NONE, BASE_NONE, NULL, 0,
1048 { &hf_x509af_extnId,
1049 { "extnId", "x509af.extnId",
1050 FT_OID, BASE_NONE, NULL, 0,
1052 { &hf_x509af_critical,
1053 { "critical", "x509af.critical",
1054 FT_BOOLEAN, BASE_NONE, NULL, 0,
1055 "BOOLEAN", HFILL }},
1056 { &hf_x509af_extnValue,
1057 { "extnValue", "x509af.extnValue",
1058 FT_BYTES, BASE_NONE, NULL, 0,
1060 { &hf_x509af_userCertificate,
1061 { "userCertificate", "x509af.userCertificate",
1062 FT_NONE, BASE_NONE, NULL, 0,
1063 "Certificate", HFILL }},
1064 { &hf_x509af_certificationPath,
1065 { "certificationPath", "x509af.certificationPath",
1066 FT_UINT32, BASE_DEC, NULL, 0,
1067 "ForwardCertificationPath", HFILL }},
1068 { &hf_x509af_ForwardCertificationPath_item,
1069 { "CrossCertificates", "x509af.CrossCertificates",
1070 FT_UINT32, BASE_DEC, NULL, 0,
1072 { &hf_x509af_CrossCertificates_item,
1073 { "Certificate", "x509af.Certificate",
1074 FT_NONE, BASE_NONE, NULL, 0,
1076 { &hf_x509af_theCACertificates,
1077 { "theCACertificates", "x509af.theCACertificates",
1078 FT_UINT32, BASE_DEC, NULL, 0,
1079 "SEQUENCE_OF_CertificatePair", HFILL }},
1080 { &hf_x509af_theCACertificates_item,
1081 { "CertificatePair", "x509af.CertificatePair",
1082 FT_NONE, BASE_NONE, NULL, 0,
1084 { &hf_x509af_issuedByThisCA,
1085 { "issuedByThisCA", "x509af.issuedByThisCA",
1086 FT_NONE, BASE_NONE, NULL, 0,
1087 "Certificate", HFILL }},
1088 { &hf_x509af_issuedToThisCA,
1089 { "issuedToThisCA", "x509af.issuedToThisCA",
1090 FT_NONE, BASE_NONE, NULL, 0,
1091 "Certificate", HFILL }},
1092 { &hf_x509af_signedCertificateList,
1093 { "signedCertificateList", "x509af.signedCertificateList",
1094 FT_NONE, BASE_NONE, NULL, 0,
1096 { &hf_x509af_thisUpdate,
1097 { "thisUpdate", "x509af.thisUpdate",
1098 FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1100 { &hf_x509af_nextUpdate,
1101 { "nextUpdate", "x509af.nextUpdate",
1102 FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1104 { &hf_x509af_revokedCertificates,
1105 { "revokedCertificates", "x509af.revokedCertificates",
1106 FT_UINT32, BASE_DEC, NULL, 0,
1108 { &hf_x509af_revokedCertificates_item,
1109 { "revokedCertificates item", "x509af.revokedCertificates_item",
1110 FT_NONE, BASE_NONE, NULL, 0,
1112 { &hf_x509af_revokedUserCertificate,
1113 { "userCertificate", "x509af.userCertificate",
1114 FT_INT32, BASE_DEC, NULL, 0,
1115 "CertificateSerialNumber", HFILL }},
1116 { &hf_x509af_revocationDate,
1117 { "revocationDate", "x509af.revocationDate",
1118 FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
1120 { &hf_x509af_crlEntryExtensions,
1121 { "crlEntryExtensions", "x509af.crlEntryExtensions",
1122 FT_UINT32, BASE_DEC, NULL, 0,
1123 "Extensions", HFILL }},
1124 { &hf_x509af_crlExtensions,
1125 { "crlExtensions", "x509af.crlExtensions",
1126 FT_UINT32, BASE_DEC, NULL, 0,
1127 "Extensions", HFILL }},
1128 { &hf_x509af_attributeCertificate,
1129 { "attributeCertificate", "x509af.attributeCertificate",
1130 FT_NONE, BASE_NONE, NULL, 0,
1132 { &hf_x509af_acPath,
1133 { "acPath", "x509af.acPath",
1134 FT_UINT32, BASE_DEC, NULL, 0,
1135 "SEQUENCE_OF_ACPathData", HFILL }},
1136 { &hf_x509af_acPath_item,
1137 { "ACPathData", "x509af.ACPathData",
1138 FT_NONE, BASE_NONE, NULL, 0,
1140 { &hf_x509af_certificate,
1141 { "certificate", "x509af.certificate",
1142 FT_NONE, BASE_NONE, NULL, 0,
1144 { &hf_x509af_signedAttributeCertificateInfo,
1145 { "signedAttributeCertificateInfo", "x509af.signedAttributeCertificateInfo",
1146 FT_NONE, BASE_NONE, NULL, 0,
1147 "AttributeCertificateInfo", HFILL }},
1148 { &hf_x509af_info_subject,
1149 { "subject", "x509af.subject",
1150 FT_UINT32, BASE_DEC, VALS(x509af_InfoSubject_vals), 0,
1151 "InfoSubject", HFILL }},
1152 { &hf_x509af_baseCertificateID,
1153 { "baseCertificateID", "x509af.baseCertificateID",
1154 FT_NONE, BASE_NONE, NULL, 0,
1155 "IssuerSerial", HFILL }},
1156 { &hf_x509af_infoSubjectName,
1157 { "subjectName", "x509af.subjectName",
1158 FT_UINT32, BASE_DEC, NULL, 0,
1159 "GeneralNames", HFILL }},
1160 { &hf_x509af_issuerName,
1161 { "issuer", "x509af.issuer",
1162 FT_UINT32, BASE_DEC, NULL, 0,
1163 "GeneralNames", HFILL }},
1164 { &hf_x509af_attCertValidityPeriod,
1165 { "attCertValidityPeriod", "x509af.attCertValidityPeriod",
1166 FT_NONE, BASE_NONE, NULL, 0,
1168 { &hf_x509af_attributes,
1169 { "attributes", "x509af.attributes",
1170 FT_UINT32, BASE_DEC, NULL, 0,
1171 "SEQUENCE_OF_Attribute", HFILL }},
1172 { &hf_x509af_attributes_item,
1173 { "Attribute", "x509af.Attribute",
1174 FT_NONE, BASE_NONE, NULL, 0,
1176 { &hf_x509af_issuerUniqueID,
1177 { "issuerUniqueID", "x509af.issuerUniqueID",
1178 FT_BYTES, BASE_NONE, NULL, 0,
1179 "UniqueIdentifier", HFILL }},
1180 { &hf_x509af_serial,
1181 { "serial", "x509af.serial",
1182 FT_INT32, BASE_DEC, NULL, 0,
1183 "CertificateSerialNumber", HFILL }},
1184 { &hf_x509af_issuerUID,
1185 { "issuerUID", "x509af.issuerUID",
1186 FT_BYTES, BASE_NONE, NULL, 0,
1187 "UniqueIdentifier", HFILL }},
1188 { &hf_x509af_notBeforeTime,
1189 { "notBeforeTime", "x509af.notBeforeTime",
1190 FT_STRING, BASE_NONE, NULL, 0,
1191 "GeneralizedTime", HFILL }},
1192 { &hf_x509af_notAfterTime,
1193 { "notAfterTime", "x509af.notAfterTime",
1194 FT_STRING, BASE_NONE, NULL, 0,
1195 "GeneralizedTime", HFILL }},
1196 { &hf_x509af_assertion_subject,
1197 { "subject", "x509af.subject",
1198 FT_UINT32, BASE_DEC, VALS(x509af_AssertionSubject_vals), 0,
1199 "AssertionSubject", HFILL }},
1200 { &hf_x509af_assertionSubjectName,
1201 { "subjectName", "x509af.subjectName",
1202 FT_UINT32, BASE_DEC, VALS(x509af_SubjectName_vals), 0,
1204 { &hf_x509af_assertionIssuer,
1205 { "issuer", "x509af.issuer",
1206 FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
1208 { &hf_x509af_attCertValidity,
1209 { "attCertValidity", "x509af.attCertValidity",
1210 FT_STRING, BASE_NONE, NULL, 0,
1211 "GeneralizedTime", HFILL }},
1212 { &hf_x509af_attType,
1213 { "attType", "x509af.attType",
1214 FT_UINT32, BASE_DEC, NULL, 0,
1215 "SET_OF_AttributeType", HFILL }},
1216 { &hf_x509af_attType_item,
1217 { "AttributeType", "x509af.AttributeType",
1218 FT_OID, BASE_NONE, NULL, 0,
1222 FT_INT32, BASE_DEC, NULL, 0,
1223 "INTEGER", HFILL }},
1226 FT_INT32, BASE_DEC, NULL, 0,
1227 "INTEGER", HFILL }},
1230 FT_INT32, BASE_DEC, NULL, 0,
1231 "INTEGER", HFILL }},
1233 /*--- End of included file: packet-x509af-hfarr.c ---*/
1234 #line 101 "../../asn1/x509af/packet-x509af-template.c"
1237 /* List of subtrees */
1238 static gint *ett[] = {
1241 /*--- Included file: packet-x509af-ettarr.c ---*/
1242 #line 1 "../../asn1/x509af/packet-x509af-ettarr.c"
1243 &ett_x509af_Certificate,
1244 &ett_x509af_T_signedCertificate,
1245 &ett_x509af_SubjectName,
1246 &ett_x509af_AlgorithmIdentifier,
1247 &ett_x509af_Validity,
1248 &ett_x509af_SubjectPublicKeyInfo,
1250 &ett_x509af_Extensions,
1251 &ett_x509af_Extension,
1252 &ett_x509af_Certificates,
1253 &ett_x509af_ForwardCertificationPath,
1254 &ett_x509af_CrossCertificates,
1255 &ett_x509af_CertificationPath,
1256 &ett_x509af_SEQUENCE_OF_CertificatePair,
1257 &ett_x509af_CertificatePair,
1258 &ett_x509af_CertificateList,
1259 &ett_x509af_T_signedCertificateList,
1260 &ett_x509af_T_revokedCertificates,
1261 &ett_x509af_T_revokedCertificates_item,
1262 &ett_x509af_AttributeCertificationPath,
1263 &ett_x509af_SEQUENCE_OF_ACPathData,
1264 &ett_x509af_ACPathData,
1265 &ett_x509af_AttributeCertificate,
1266 &ett_x509af_AttributeCertificateInfo,
1267 &ett_x509af_InfoSubject,
1268 &ett_x509af_SEQUENCE_OF_Attribute,
1269 &ett_x509af_IssuerSerial,
1270 &ett_x509af_AttCertValidityPeriod,
1271 &ett_x509af_AttributeCertificateAssertion,
1272 &ett_x509af_AssertionSubject,
1273 &ett_x509af_SET_OF_AttributeType,
1274 &ett_x509af_DSS_Params,
1276 /*--- End of included file: packet-x509af-ettarr.c ---*/
1277 #line 107 "../../asn1/x509af/packet-x509af-template.c"
1280 /* Register protocol */
1281 proto_x509af = proto_register_protocol(PNAME, PSNAME, PFNAME);
1283 /* Register fields and subtrees */
1284 proto_register_field_array(proto_x509af, hf, array_length(hf));
1285 proto_register_subtree_array(ett, array_length(ett));
1288 register_ber_syntax_dissector("Certificate", proto_x509af, dissect_x509af_Certificate_PDU);
1289 register_ber_syntax_dissector("CertificateList", proto_x509af, dissect_CertificateList_PDU);
1290 register_ber_syntax_dissector("CrossCertificatePair", proto_x509af, dissect_CertificatePair_PDU);
1292 register_ber_oid_syntax(".cer", NULL, "Certificate");
1293 register_ber_oid_syntax(".crt", NULL, "Certificate");
1294 register_ber_oid_syntax(".crl", NULL, "CertificateList");
1298 /*--- proto_reg_handoff_x509af -------------------------------------------*/
1299 void proto_reg_handoff_x509af(void) {
1300 dissector_handle_t pkix_crl_handle;
1302 pkix_crl_handle = new_create_dissector_handle(dissect_pkix_crl, proto_x509af);
1303 dissector_add_string("media_type", "application/pkix-crl", pkix_crl_handle);
1306 /*--- Included file: packet-x509af-dis-tab.c ---*/
1307 #line 1 "../../asn1/x509af/packet-x509af-dis-tab.c"
1308 register_ber_oid_dissector("2.5.4.36", dissect_x509af_Certificate_PDU, proto_x509af, "id-at-userCertificate");
1309 register_ber_oid_dissector("2.5.4.37", dissect_x509af_Certificate_PDU, proto_x509af, "id-at-cAcertificate");
1310 register_ber_oid_dissector("2.5.4.38", dissect_CertificateList_PDU, proto_x509af, "id-at-authorityRevocationList");
1311 register_ber_oid_dissector("2.5.4.39", dissect_CertificateList_PDU, proto_x509af, "id-at-certificateRevocationList");
1312 register_ber_oid_dissector("2.5.4.40", dissect_CertificatePair_PDU, proto_x509af, "id-at-crossCertificatePair");
1313 register_ber_oid_dissector("2.5.4.58", dissect_AttributeCertificate_PDU, proto_x509af, "id-at-attributeCertificate");
1314 register_ber_oid_dissector("2.5.4.59", dissect_CertificateList_PDU, proto_x509af, "id-at-attributeCertificateRevocationList");
1315 register_ber_oid_dissector("1.2.840.10040.4.1", dissect_DSS_Params_PDU, proto_x509af, "id-dsa");
1318 /*--- End of included file: packet-x509af-dis-tab.c ---*/
1319 #line 135 "../../asn1/x509af/packet-x509af-template.c"
1321 /*XXX these should really go to a better place but since that
1322 I have not that ITU standard, ill put it here for the time
1324 Only implemented those algorithms that take no parameters
1325 for the time being, ronnie
1327 /* from http://www.alvestrand.no/objectid/1.3.14.3.2.html */
1328 register_ber_oid_dissector("1.3.14.3.2.2", dissect_ber_oid_NULL_callback, proto_x509af, "md4WithRSA");
1329 register_ber_oid_dissector("1.3.14.3.2.3", dissect_ber_oid_NULL_callback, proto_x509af, "md5WithRSA");
1330 register_ber_oid_dissector("1.3.14.3.2.4", dissect_ber_oid_NULL_callback, proto_x509af, "md4WithRSAEncryption");
1331 register_ber_oid_dissector("1.3.14.3.2.6", dissect_ber_oid_NULL_callback, proto_x509af, "desECB");
1332 register_ber_oid_dissector("1.3.14.3.2.11", dissect_ber_oid_NULL_callback, proto_x509af, "rsaSignature");
1333 register_ber_oid_dissector("1.3.14.3.2.14", dissect_ber_oid_NULL_callback, proto_x509af, "mdc2WithRSASignature");
1334 register_ber_oid_dissector("1.3.14.3.2.15", dissect_ber_oid_NULL_callback, proto_x509af, "shaWithRSASignature");
1335 register_ber_oid_dissector("1.3.14.3.2.16", dissect_ber_oid_NULL_callback, proto_x509af, "dhWithCommonModulus");
1336 register_ber_oid_dissector("1.3.14.3.2.17", dissect_ber_oid_NULL_callback, proto_x509af, "desEDE");
1337 register_ber_oid_dissector("1.3.14.3.2.18", dissect_ber_oid_NULL_callback, proto_x509af, "sha");
1338 register_ber_oid_dissector("1.3.14.3.2.19", dissect_ber_oid_NULL_callback, proto_x509af, "mdc-2");
1339 register_ber_oid_dissector("1.3.14.3.2.20", dissect_ber_oid_NULL_callback, proto_x509af, "dsaCommon");
1340 register_ber_oid_dissector("1.3.14.3.2.21", dissect_ber_oid_NULL_callback, proto_x509af, "dsaCommonWithSHA");
1341 register_ber_oid_dissector("1.3.14.3.2.22", dissect_ber_oid_NULL_callback, proto_x509af, "rsaKeyTransport");
1342 register_ber_oid_dissector("1.3.14.3.2.23", dissect_ber_oid_NULL_callback, proto_x509af, "keyed-hash-seal");
1343 register_ber_oid_dissector("1.3.14.3.2.24", dissect_ber_oid_NULL_callback, proto_x509af, "md2WithRSASignature");
1344 register_ber_oid_dissector("1.3.14.3.2.25", dissect_ber_oid_NULL_callback, proto_x509af, "md5WithRSASignature");
1345 register_ber_oid_dissector("1.3.14.3.2.26", dissect_ber_oid_NULL_callback, proto_x509af, "SHA-1");
1346 register_ber_oid_dissector("1.3.14.3.2.27", dissect_ber_oid_NULL_callback, proto_x509af, "dsaWithSHA1");
1347 register_ber_oid_dissector("1.3.14.3.2.28", dissect_ber_oid_NULL_callback, proto_x509af, "dsaWithCommonSHA1");
1348 register_ber_oid_dissector("1.3.14.3.2.29", dissect_ber_oid_NULL_callback, proto_x509af, "sha-1WithRSAEncryption");
1350 /* these will generally be encoded as ";binary" in LDAP */
1352 register_ldap_name_dissector("cACertificate", dissect_x509af_Certificate_PDU, proto_x509af);
1353 register_ldap_name_dissector("userCertificate", dissect_x509af_Certificate_PDU, proto_x509af);
1355 register_ldap_name_dissector("certificateRevocationList", dissect_CertificateList_PDU, proto_x509af);
1356 register_ldap_name_dissector("crl", dissect_CertificateList_PDU, proto_x509af);
1358 register_ldap_name_dissector("authorityRevocationList", dissect_CertificateList_PDU, proto_x509af);
1359 register_ldap_name_dissector("arl", dissect_CertificateList_PDU, proto_x509af);
1361 register_ldap_name_dissector("crossCertificatePair", dissect_CertificatePair_PDU, proto_x509af);