1 /* Do not modify this file. */
2 /* It is created automatically by the ASN.1 to Ethereal dissector compiler */
4 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
6 /* Input file: packet-x509af-template.c */
7 /* Include files: packet-x509af-hf.c, packet-x509af-ett.c, packet-x509af-fn.c, packet-x509af-hfarr.c, packet-x509af-ettarr.c, packet-x509af-val.h */
10 * Routines for X.509 Authentication Framework packet dissection
12 * $Id: packet-x509af-template.c,v 1.2 2004/05/25 21:07:43 guy Exp $
14 * Ethereal - Network traffic analyzer
15 * By Gerald Combs <gerald@ethereal.com>
16 * Copyright 1998 Gerald Combs
18 * This program is free software; you can redistribute it and/or
19 * modify it under the terms of the GNU General Public License
20 * as published by the Free Software Foundation; either version 2
21 * of the License, or (at your option) any later version.
23 * This program is distributed in the hope that it will be useful,
24 * but WITHOUT ANY WARRANTY; without even the implied warranty of
25 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
26 * GNU General Public License for more details.
28 * You should have received a copy of the GNU General Public License
29 * along with this program; if not, write to the Free Software
30 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
38 #include <epan/packet.h>
39 #include <epan/conversation.h>
44 #include "packet-ber.h"
45 #include "packet-x509af.h"
46 #include "packet-x509ce.h"
47 #include "packet-x509if.h"
48 #include "packet-x509sat.h"
50 #define PNAME "X.509 Authentication Framework"
51 #define PSNAME "X509AF"
52 #define PFNAME "x509af"
54 /* Initialize the protocol and registered fields */
55 int proto_x509af = -1;
56 int hf_x509af_algorithm_id = -1;
58 /*--- Included file: packet-x509af-hf.c ---*/
60 /* Do not modify this file. */
61 /* It is created automatically by the ASN.1 to Ethereal dissector compiler */
62 /* packet-x509af-hf.c */
63 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
65 static int hf_x509af_signedCertificate = -1; /* T_signedCertificate */
66 static int hf_x509af_version = -1; /* Version */
67 static int hf_x509af_serialNumber = -1; /* CertificateSerialNumber */
68 static int hf_x509af_signature = -1; /* AlgorithmIdentifier */
69 static int hf_x509af_issuer = -1; /* Name */
70 static int hf_x509af_validity = -1; /* Validity */
71 static int hf_x509af_subject = -1; /* Name */
72 static int hf_x509af_subjectPublicKeyInfo = -1; /* SubjectPublicKeyInfo */
73 static int hf_x509af_issuerUniqueIdentifier = -1; /* UniqueIdentifier */
74 static int hf_x509af_subjectUniqueIdentifier = -1; /* UniqueIdentifier */
75 static int hf_x509af_extensions = -1; /* Extensions */
76 static int hf_x509af_algorithmIdentifier = -1; /* AlgorithmIdentifier */
77 static int hf_x509af_encrypted = -1; /* BIT_STRING */
78 static int hf_x509af_notBefore = -1; /* Time */
79 static int hf_x509af_notAfter = -1; /* Time */
80 static int hf_x509af_algorithm = -1; /* AlgorithmIdentifier */
81 static int hf_x509af_subjectPublicKey = -1; /* BIT_STRING */
82 static int hf_x509af_utcTime = -1; /* UTCTime */
83 static int hf_x509af_generalizedTime = -1; /* GeneralizedTime */
84 static int hf_x509af_Extensions_item = -1; /* Extension */
85 static int hf_x509af_critical = -1; /* BOOLEAN */
86 static int hf_x509af_extnValue = -1; /* OCTET_STRING */
87 static int hf_x509af_userCertificate = -1; /* Certificate */
88 static int hf_x509af_certificationPath = -1; /* ForwardCertificationPath */
89 static int hf_x509af_ForwardCertificationPath_item = -1; /* CrossCertificates */
90 static int hf_x509af_CrossCertificates_item = -1; /* Certificate */
91 static int hf_x509af_theCACertificates = -1; /* SEQUNCE_OF_CertificatePair */
92 static int hf_x509af_theCACertificates_item = -1; /* CertificatePair */
93 static int hf_x509af_issuedByThisCA = -1; /* Certificate */
94 static int hf_x509af_issuedToThisCA = -1; /* Certificate */
95 static int hf_x509af_signedCertificateList = -1; /* T_signedCertificateList */
96 static int hf_x509af_thisUpdate = -1; /* Time */
97 static int hf_x509af_nextUpdate = -1; /* Time */
98 static int hf_x509af_revokedCertificates = -1; /* T_revokedCertificates */
99 static int hf_x509af_revokedCertificates_item = -1; /* T_revokedCertificates_item */
100 static int hf_x509af_userCertificate1 = -1; /* CertificateSerialNumber */
101 static int hf_x509af_revocationDate = -1; /* Time */
102 static int hf_x509af_crlEntryExtensions = -1; /* Extensions */
103 static int hf_x509af_crlExtensions = -1; /* Extensions */
104 static int hf_x509af_attributeCertificate = -1; /* AttributeCertificate */
105 static int hf_x509af_acPath = -1; /* SEQUNCE_OF_ACPathData */
106 static int hf_x509af_acPath_item = -1; /* ACPathData */
107 static int hf_x509af_certificate = -1; /* Certificate */
108 static int hf_x509af_signedAttributeCertificateInfo = -1; /* AttributeCertificateInfo */
109 static int hf_x509af_info_subject = -1; /* InfoSubject */
110 static int hf_x509af_baseCertificateID = -1; /* IssuerSerial */
111 static int hf_x509af_infoSubjectName = -1; /* GeneralNames */
112 static int hf_x509af_issuer1 = -1; /* GeneralNames */
113 static int hf_x509af_attCertValidityPeriod = -1; /* AttCertValidityPeriod */
114 static int hf_x509af_attributes = -1; /* SEQUNCE_OF_Attribute */
115 static int hf_x509af_attributes_item = -1; /* Attribute */
116 static int hf_x509af_issuerUniqueID = -1; /* UniqueIdentifier */
117 static int hf_x509af_serial = -1; /* CertificateSerialNumber */
118 static int hf_x509af_issuerUID = -1; /* UniqueIdentifier */
119 static int hf_x509af_notBeforeTime = -1; /* GeneralizedTime */
120 static int hf_x509af_notAfterTime = -1; /* GeneralizedTime */
121 static int hf_x509af_assertion_subject = -1; /* AssertionSubject */
122 static int hf_x509af_assertionSubjectName = -1; /* Name */
123 static int hf_x509af_assertionIssuer = -1; /* Name */
124 static int hf_x509af_attCertValidity = -1; /* GeneralizedTime */
125 static int hf_x509af_attType = -1; /* SET_OF_AttributeType */
126 static int hf_x509af_attType_item = -1; /* AttributeType */
128 /*--- End of included file: packet-x509af-hf.c ---*/
131 /* Initialize the subtree pointers */
133 /*--- Included file: packet-x509af-ett.c ---*/
135 /* Do not modify this file. */
136 /* It is created automatically by the ASN.1 to Ethereal dissector compiler */
137 /* packet-x509af-ett.c */
138 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
140 static gint ett_x509af_Certificate = -1;
141 static gint ett_x509af_T_signedCertificate = -1;
142 static gint ett_x509af_AlgorithmIdentifier = -1;
143 static gint ett_x509af_Validity = -1;
144 static gint ett_x509af_SubjectPublicKeyInfo = -1;
145 static gint ett_x509af_Time = -1;
146 static gint ett_x509af_Extensions = -1;
147 static gint ett_x509af_Extension = -1;
148 static gint ett_x509af_Certificates = -1;
149 static gint ett_x509af_ForwardCertificationPath = -1;
150 static gint ett_x509af_CrossCertificates = -1;
151 static gint ett_x509af_CertificationPath = -1;
152 static gint ett_x509af_SEQUNCE_OF_CertificatePair = -1;
153 static gint ett_x509af_CertificatePair = -1;
154 static gint ett_x509af_CertificateList = -1;
155 static gint ett_x509af_T_signedCertificateList = -1;
156 static gint ett_x509af_T_revokedCertificates = -1;
157 static gint ett_x509af_T_revokedCertificates_item = -1;
158 static gint ett_x509af_AttributeCertificationPath = -1;
159 static gint ett_x509af_SEQUNCE_OF_ACPathData = -1;
160 static gint ett_x509af_ACPathData = -1;
161 static gint ett_x509af_AttributeCertificate = -1;
162 static gint ett_x509af_AttributeCertificateInfo = -1;
163 static gint ett_x509af_InfoSubject = -1;
164 static gint ett_x509af_SEQUNCE_OF_Attribute = -1;
165 static gint ett_x509af_IssuerSerial = -1;
166 static gint ett_x509af_AttCertValidityPeriod = -1;
167 static gint ett_x509af_AttributeCertificateAssertion = -1;
168 static gint ett_x509af_AssertionSubject = -1;
169 static gint ett_x509af_SET_OF_AttributeType = -1;
171 /*--- End of included file: packet-x509af-ett.c ---*/
175 static char algorithm_id[64]; /*64 chars should be long enough? */
177 dissect_hf_x509af_algorithm_id(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset)
179 offset = dissect_ber_object_identifier(FALSE, pinfo, tree, tvb, offset,
180 hf_x509af_algorithm_id, algorithm_id);
185 dissect_hf_x509af_algorithm_type(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset)
187 offset=call_ber_oid_callback(algorithm_id, tvb, offset, pinfo, tree);
192 /* Algorithm Identifier can not yet be handled by the compiler */
193 static ber_sequence AlgorithmIdentifier_sequence[] = {
194 { BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_hf_x509af_algorithm_id },
195 { BER_CLASS_ANY, 0, 0, dissect_hf_x509af_algorithm_type },
200 dissect_x509af_AlgorithmIdentifier(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
201 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
202 AlgorithmIdentifier_sequence, hf_index, ett_x509af_AlgorithmIdentifier);
208 /*--- Included file: packet-x509af-fn.c ---*/
210 /* Do not modify this file. */
211 /* It is created automatically by the ASN.1 to Ethereal dissector compiler */
212 /* packet-x509af-fn.c */
213 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
215 static int dissect_issuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
216 return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuer);
218 static int dissect_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
219 return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_subject);
221 static int dissect_issuerUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
222 return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueIdentifier);
224 static int dissect_subjectUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
225 return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_subjectUniqueIdentifier);
227 static int dissect_infoSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
228 return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_infoSubjectName);
230 static int dissect_issuer1(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
231 return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuer1);
233 static int dissect_attributes_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
234 return dissect_x509if_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes_item);
236 static int dissect_issuerUniqueID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
237 return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueID);
239 static int dissect_issuerUID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
240 return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUID);
242 static int dissect_assertionSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
243 return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionSubjectName);
245 static int dissect_assertionIssuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
246 return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionIssuer);
248 static int dissect_attType_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
249 return dissect_x509if_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType_item);
252 static const value_string Version_vals[] = {
261 dissect_x509af_Version(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
262 offset = dissect_ber_integer(pinfo, tree, tvb, offset, hf_index, NULL);
266 static int dissect_version(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
267 return dissect_x509af_Version(FALSE, tvb, offset, pinfo, tree, hf_x509af_version);
273 dissect_x509af_CertificateSerialNumber(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
274 offset = dissect_ber_integer(pinfo, tree, tvb, offset, hf_index, NULL);
278 static int dissect_serialNumber(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
279 return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serialNumber);
281 static int dissect_userCertificate1(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
282 return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_userCertificate1);
284 static int dissect_serial(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
285 return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serial);
288 static int dissect_signature(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
289 return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_signature);
291 static int dissect_algorithmIdentifier(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
292 return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithmIdentifier);
294 static int dissect_algorithm(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
295 return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithm);
300 dissect_x509af_UTCTime(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
301 offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTCTime,
302 pinfo, tree, tvb, offset, hf_index,
307 static int dissect_utcTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
308 return dissect_x509af_UTCTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_utcTime);
313 dissect_x509af_GeneralizedTime(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
314 offset = dissect_ber_generalized_time(pinfo, tree, tvb, offset, hf_index);
318 static int dissect_generalizedTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
319 return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_generalizedTime);
321 static int dissect_notBeforeTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
322 return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBeforeTime);
324 static int dissect_notAfterTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
325 return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfterTime);
327 static int dissect_attCertValidity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
328 return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidity);
332 static const value_string Time_vals[] = {
334 { 1, "generalizedTime" },
338 static ber_choice Time_choice[] = {
339 { 0, BER_CLASS_UNI, BER_UNI_TAG_UTCTime, BER_FLAGS_NOOWNTAG, dissect_utcTime },
340 { 1, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_generalizedTime },
345 dissect_x509af_Time(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
346 offset = dissect_ber_choice(pinfo, tree, tvb, offset,
347 Time_choice, hf_index, ett_x509af_Time);
351 static int dissect_notBefore(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
352 return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBefore);
354 static int dissect_notAfter(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
355 return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfter);
357 static int dissect_thisUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
358 return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_thisUpdate);
360 static int dissect_nextUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
361 return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_nextUpdate);
363 static int dissect_revocationDate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
364 return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_revocationDate);
367 static ber_sequence Validity_sequence[] = {
368 { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notBefore },
369 { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notAfter },
374 dissect_x509af_Validity(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
375 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
376 Validity_sequence, hf_index, ett_x509af_Validity);
380 static int dissect_validity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
381 return dissect_x509af_Validity(FALSE, tvb, offset, pinfo, tree, hf_x509af_validity);
386 dissect_x509af_BIT_STRING(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
387 offset = dissect_ber_bitstring(implicit_tag, pinfo, tree, tvb, offset,
393 static int dissect_encrypted(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
394 return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_encrypted);
396 static int dissect_subjectPublicKey(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
397 return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKey);
400 static ber_sequence SubjectPublicKeyInfo_sequence[] = {
401 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithm },
402 { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKey },
407 dissect_x509af_SubjectPublicKeyInfo(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
408 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
409 SubjectPublicKeyInfo_sequence, hf_index, ett_x509af_SubjectPublicKeyInfo);
413 static int dissect_subjectPublicKeyInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
414 return dissect_x509af_SubjectPublicKeyInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKeyInfo);
419 dissect_x509af_BOOLEAN(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
420 offset = dissect_ber_boolean(pinfo, tree, tvb, offset, hf_index);
424 static int dissect_critical(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
425 return dissect_x509af_BOOLEAN(FALSE, tvb, offset, pinfo, tree, hf_x509af_critical);
430 dissect_x509af_OCTET_STRING(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
431 offset = dissect_ber_octet_string(implicit_tag, pinfo, tree, tvb, offset, hf_index,
436 static int dissect_extnValue(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
437 return dissect_x509af_OCTET_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_extnValue);
440 static ber_sequence Extension_sequence[] = {
441 { BER_CLASS_UNI, BER_UNI_TAG_BOOLEAN, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_critical },
442 { BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_extnValue },
447 dissect_x509af_Extension(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
448 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
449 Extension_sequence, hf_index, ett_x509af_Extension);
453 static int dissect_Extensions_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
454 return dissect_x509af_Extension(FALSE, tvb, offset, pinfo, tree, hf_x509af_Extensions_item);
457 static ber_sequence Extensions_sequence_of[1] = {
458 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_Extensions_item },
462 dissect_x509af_Extensions(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
463 offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
464 Extensions_sequence_of, hf_index, ett_x509af_Extensions);
468 static int dissect_extensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
469 return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_extensions);
471 static int dissect_crlEntryExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
472 return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlEntryExtensions);
474 static int dissect_crlExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
475 return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlExtensions);
478 static ber_sequence T_signedCertificate_sequence[] = {
479 { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_version },
480 { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
481 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
482 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer },
483 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_validity },
484 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_subject },
485 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKeyInfo },
486 { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_issuerUniqueIdentifier_impl },
487 { BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_subjectUniqueIdentifier_impl },
488 { BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_extensions },
493 dissect_x509af_T_signedCertificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
494 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
495 T_signedCertificate_sequence, hf_index, ett_x509af_T_signedCertificate);
499 static int dissect_signedCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
500 return dissect_x509af_T_signedCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificate);
503 static ber_sequence Certificate_sequence[] = {
504 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificate },
505 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
506 { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
511 dissect_x509af_Certificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
512 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
513 Certificate_sequence, hf_index, ett_x509af_Certificate);
517 static int dissect_userCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
518 return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_userCertificate);
520 static int dissect_CrossCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
521 return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_CrossCertificates_item);
523 static int dissect_issuedByThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
524 return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedByThisCA);
526 static int dissect_issuedToThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
527 return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedToThisCA);
529 static int dissect_certificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
530 return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificate);
533 static ber_sequence CrossCertificates_set_of[1] = {
534 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_CrossCertificates_item },
538 dissect_x509af_CrossCertificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
539 offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
540 CrossCertificates_set_of, hf_index, ett_x509af_CrossCertificates);
544 static int dissect_ForwardCertificationPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
545 return dissect_x509af_CrossCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_ForwardCertificationPath_item);
548 static ber_sequence ForwardCertificationPath_sequence_of[1] = {
549 { BER_CLASS_UNI, BER_UNI_TAG_SET, BER_FLAGS_NOOWNTAG, dissect_ForwardCertificationPath_item },
553 dissect_x509af_ForwardCertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
554 offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
555 ForwardCertificationPath_sequence_of, hf_index, ett_x509af_ForwardCertificationPath);
559 static int dissect_certificationPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
560 return dissect_x509af_ForwardCertificationPath(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificationPath);
563 static ber_sequence Certificates_sequence[] = {
564 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
565 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_certificationPath },
570 dissect_x509af_Certificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
571 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
572 Certificates_sequence, hf_index, ett_x509af_Certificates);
577 static ber_sequence CertificatePair_sequence[] = {
578 { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_issuedByThisCA },
579 { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_issuedToThisCA },
584 dissect_x509af_CertificatePair(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
585 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
586 CertificatePair_sequence, hf_index, ett_x509af_CertificatePair);
590 static int dissect_theCACertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
591 return dissect_x509af_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates_item);
594 static ber_sequence SEQUNCE_OF_CertificatePair_sequence_of[1] = {
595 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_theCACertificates_item },
599 dissect_x509af_SEQUNCE_OF_CertificatePair(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
600 offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
601 SEQUNCE_OF_CertificatePair_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_CertificatePair);
605 static int dissect_theCACertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
606 return dissect_x509af_SEQUNCE_OF_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates);
609 static ber_sequence CertificationPath_sequence[] = {
610 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
611 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_theCACertificates },
616 dissect_x509af_CertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
617 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
618 CertificationPath_sequence, hf_index, ett_x509af_CertificationPath);
623 static ber_sequence T_revokedCertificates_item_sequence[] = {
624 { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_userCertificate1 },
625 { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_revocationDate },
626 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_crlEntryExtensions },
631 dissect_x509af_T_revokedCertificates_item(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
632 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
633 T_revokedCertificates_item_sequence, hf_index, ett_x509af_T_revokedCertificates_item);
637 static int dissect_revokedCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
638 return dissect_x509af_T_revokedCertificates_item(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates_item);
641 static ber_sequence T_revokedCertificates_sequence_of[1] = {
642 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_revokedCertificates_item },
646 dissect_x509af_T_revokedCertificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
647 offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
648 T_revokedCertificates_sequence_of, hf_index, ett_x509af_T_revokedCertificates);
652 static int dissect_revokedCertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
653 return dissect_x509af_T_revokedCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates);
656 static ber_sequence T_signedCertificateList_sequence[] = {
657 { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
658 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
659 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer },
660 { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_thisUpdate },
661 { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_nextUpdate },
662 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_revokedCertificates },
663 { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_crlExtensions },
668 dissect_x509af_T_signedCertificateList(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
669 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
670 T_signedCertificateList_sequence, hf_index, ett_x509af_T_signedCertificateList);
674 static int dissect_signedCertificateList(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
675 return dissect_x509af_T_signedCertificateList(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificateList);
678 static ber_sequence CertificateList_sequence[] = {
679 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificateList },
680 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
681 { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
686 dissect_x509af_CertificateList(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
687 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
688 CertificateList_sequence, hf_index, ett_x509af_CertificateList);
693 static ber_sequence IssuerSerial_sequence[] = {
694 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer1 },
695 { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serial },
696 { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUID },
701 dissect_x509af_IssuerSerial(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
702 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
703 IssuerSerial_sequence, hf_index, ett_x509af_IssuerSerial);
707 static int dissect_baseCertificateID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
708 return dissect_x509af_IssuerSerial(FALSE, tvb, offset, pinfo, tree, hf_x509af_baseCertificateID);
712 static const value_string InfoSubject_vals[] = {
713 { 0, "baseCertificateID" },
714 { 1, "subjectName" },
718 static ber_choice InfoSubject_choice[] = {
719 { 0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
720 { 1, BER_CLASS_CON, 1, 0, dissect_infoSubjectName },
725 dissect_x509af_InfoSubject(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
726 offset = dissect_ber_choice(pinfo, tree, tvb, offset,
727 InfoSubject_choice, hf_index, ett_x509af_InfoSubject);
731 static int dissect_info_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
732 return dissect_x509af_InfoSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_info_subject);
735 static ber_sequence AttCertValidityPeriod_sequence[] = {
736 { BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notBeforeTime },
737 { BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notAfterTime },
742 dissect_x509af_AttCertValidityPeriod(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
743 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
744 AttCertValidityPeriod_sequence, hf_index, ett_x509af_AttCertValidityPeriod);
748 static int dissect_attCertValidityPeriod(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
749 return dissect_x509af_AttCertValidityPeriod(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidityPeriod);
752 static ber_sequence SEQUNCE_OF_Attribute_sequence_of[1] = {
753 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes_item },
757 dissect_x509af_SEQUNCE_OF_Attribute(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
758 offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
759 SEQUNCE_OF_Attribute_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_Attribute);
763 static int dissect_attributes(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
764 return dissect_x509af_SEQUNCE_OF_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes);
767 static ber_sequence AttributeCertificateInfo_sequence[] = {
768 { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
769 { BER_CLASS_CON, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_info_subject },
770 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer1 },
771 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
772 { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
773 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attCertValidityPeriod },
774 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes },
775 { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUniqueID },
776 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_extensions },
781 dissect_x509af_AttributeCertificateInfo(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
782 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
783 AttributeCertificateInfo_sequence, hf_index, ett_x509af_AttributeCertificateInfo);
787 static int dissect_signedAttributeCertificateInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
788 return dissect_x509af_AttributeCertificateInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedAttributeCertificateInfo);
791 static ber_sequence AttributeCertificate_sequence[] = {
792 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedAttributeCertificateInfo },
793 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
794 { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
799 dissect_x509af_AttributeCertificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
800 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
801 AttributeCertificate_sequence, hf_index, ett_x509af_AttributeCertificate);
805 static int dissect_attributeCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
806 return dissect_x509af_AttributeCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributeCertificate);
809 static ber_sequence ACPathData_sequence[] = {
810 { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_certificate },
811 { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_attributeCertificate },
816 dissect_x509af_ACPathData(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
817 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
818 ACPathData_sequence, hf_index, ett_x509af_ACPathData);
822 static int dissect_acPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
823 return dissect_x509af_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath_item);
826 static ber_sequence SEQUNCE_OF_ACPathData_sequence_of[1] = {
827 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_acPath_item },
831 dissect_x509af_SEQUNCE_OF_ACPathData(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
832 offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
833 SEQUNCE_OF_ACPathData_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_ACPathData);
837 static int dissect_acPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
838 return dissect_x509af_SEQUNCE_OF_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath);
841 static ber_sequence AttributeCertificationPath_sequence[] = {
842 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributeCertificate },
843 { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_acPath },
848 dissect_x509af_AttributeCertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
849 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
850 AttributeCertificationPath_sequence, hf_index, ett_x509af_AttributeCertificationPath);
856 static const value_string AssertionSubject_vals[] = {
857 { 0, "baseCertificateID" },
858 { 1, "subjectName" },
862 static ber_choice AssertionSubject_choice[] = {
863 { 0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
864 { 1, BER_CLASS_CON, 1, 0, dissect_assertionSubjectName },
869 dissect_x509af_AssertionSubject(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
870 offset = dissect_ber_choice(pinfo, tree, tvb, offset,
871 AssertionSubject_choice, hf_index, ett_x509af_AssertionSubject);
875 static int dissect_assertion_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
876 return dissect_x509af_AssertionSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertion_subject);
879 static ber_sequence SET_OF_AttributeType_set_of[1] = {
880 { -1 /*imported*/, -1 /*imported*/, BER_FLAGS_NOOWNTAG, dissect_attType_item },
884 dissect_x509af_SET_OF_AttributeType(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
885 offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
886 SET_OF_AttributeType_set_of, hf_index, ett_x509af_SET_OF_AttributeType);
890 static int dissect_attType(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
891 return dissect_x509af_SET_OF_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType);
894 static ber_sequence AttributeCertificateAssertion_sequence[] = {
895 { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_assertion_subject },
896 { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_assertionIssuer },
897 { BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL, dissect_attCertValidity },
898 { BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_attType },
903 dissect_x509af_AttributeCertificateAssertion(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
904 offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
905 AttributeCertificateAssertion_sequence, hf_index, ett_x509af_AttributeCertificateAssertion);
911 /*--- End of included file: packet-x509af-fn.c ---*/
915 /*--- proto_register_x509af ----------------------------------------------*/
916 void proto_register_x509af(void) {
919 static hf_register_info hf[] = {
920 { &hf_x509af_algorithm_id,
921 { "Algorithm Id", "x509af.algorithm.id",
922 FT_STRING, BASE_NONE, NULL, 0,
923 "Algorithm Id", HFILL }},
925 /*--- Included file: packet-x509af-hfarr.c ---*/
927 /* Do not modify this file. */
928 /* It is created automatically by the ASN.1 to Ethereal dissector compiler */
929 /* packet-x509af-hfarr.c */
930 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
932 { &hf_x509af_signedCertificate,
933 { "signedCertificate", "x509af.signedCertificate",
934 FT_NONE, BASE_NONE, NULL, 0,
935 "Certificate/signedCertificate", HFILL }},
936 { &hf_x509af_version,
937 { "version", "x509af.version",
938 FT_INT32, BASE_DEC, VALS(Version_vals), 0,
940 { &hf_x509af_serialNumber,
941 { "serialNumber", "x509af.serialNumber",
942 FT_INT32, BASE_DEC, NULL, 0,
944 { &hf_x509af_signature,
945 { "signature", "x509af.signature",
946 FT_NONE, BASE_NONE, NULL, 0,
949 { "issuer", "x509af.issuer",
950 FT_NONE, BASE_NONE, NULL, 0,
952 { &hf_x509af_validity,
953 { "validity", "x509af.validity",
954 FT_NONE, BASE_NONE, NULL, 0,
955 "Certificate/signedCertificate/validity", HFILL }},
956 { &hf_x509af_subject,
957 { "subject", "x509af.subject",
958 FT_NONE, BASE_NONE, NULL, 0,
959 "Certificate/signedCertificate/subject", HFILL }},
960 { &hf_x509af_subjectPublicKeyInfo,
961 { "subjectPublicKeyInfo", "x509af.subjectPublicKeyInfo",
962 FT_NONE, BASE_NONE, NULL, 0,
963 "Certificate/signedCertificate/subjectPublicKeyInfo", HFILL }},
964 { &hf_x509af_issuerUniqueIdentifier,
965 { "issuerUniqueIdentifier", "x509af.issuerUniqueIdentifier",
966 FT_NONE, BASE_NONE, NULL, 0,
967 "Certificate/signedCertificate/issuerUniqueIdentifier", HFILL }},
968 { &hf_x509af_subjectUniqueIdentifier,
969 { "subjectUniqueIdentifier", "x509af.subjectUniqueIdentifier",
970 FT_NONE, BASE_NONE, NULL, 0,
971 "Certificate/signedCertificate/subjectUniqueIdentifier", HFILL }},
972 { &hf_x509af_extensions,
973 { "extensions", "x509af.extensions",
974 FT_UINT32, BASE_DEC, NULL, 0,
976 { &hf_x509af_algorithmIdentifier,
977 { "algorithmIdentifier", "x509af.algorithmIdentifier",
978 FT_NONE, BASE_NONE, NULL, 0,
980 { &hf_x509af_encrypted,
981 { "encrypted", "x509af.encrypted",
982 FT_BYTES, BASE_HEX, NULL, 0,
984 { &hf_x509af_notBefore,
985 { "notBefore", "x509af.notBefore",
986 FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
987 "Validity/notBefore", HFILL }},
988 { &hf_x509af_notAfter,
989 { "notAfter", "x509af.notAfter",
990 FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
991 "Validity/notAfter", HFILL }},
992 { &hf_x509af_algorithm,
993 { "algorithm", "x509af.algorithm",
994 FT_NONE, BASE_NONE, NULL, 0,
995 "SubjectPublicKeyInfo/algorithm", HFILL }},
996 { &hf_x509af_subjectPublicKey,
997 { "subjectPublicKey", "x509af.subjectPublicKey",
998 FT_BYTES, BASE_HEX, NULL, 0,
999 "SubjectPublicKeyInfo/subjectPublicKey", HFILL }},
1000 { &hf_x509af_utcTime,
1001 { "utcTime", "x509af.utcTime",
1002 FT_STRING, BASE_NONE, NULL, 0,
1003 "Time/utcTime", HFILL }},
1004 { &hf_x509af_generalizedTime,
1005 { "generalizedTime", "x509af.generalizedTime",
1006 FT_STRING, BASE_NONE, NULL, 0,
1007 "Time/generalizedTime", HFILL }},
1008 { &hf_x509af_Extensions_item,
1009 { "Item[##]", "x509af.Extensions_item",
1010 FT_NONE, BASE_NONE, NULL, 0,
1011 "Extensions/_item", HFILL }},
1012 { &hf_x509af_critical,
1013 { "critical", "x509af.critical",
1014 FT_BOOLEAN, 8, NULL, 0,
1015 "Extension/critical", HFILL }},
1016 { &hf_x509af_extnValue,
1017 { "extnValue", "x509af.extnValue",
1018 FT_BYTES, BASE_HEX, NULL, 0,
1019 "Extension/extnValue", HFILL }},
1020 { &hf_x509af_userCertificate,
1021 { "userCertificate", "x509af.userCertificate",
1022 FT_NONE, BASE_NONE, NULL, 0,
1024 { &hf_x509af_certificationPath,
1025 { "certificationPath", "x509af.certificationPath",
1026 FT_UINT32, BASE_DEC, NULL, 0,
1027 "Certificates/certificationPath", HFILL }},
1028 { &hf_x509af_ForwardCertificationPath_item,
1029 { "Item[##]", "x509af.ForwardCertificationPath_item",
1030 FT_UINT32, BASE_DEC, NULL, 0,
1031 "ForwardCertificationPath/_item", HFILL }},
1032 { &hf_x509af_CrossCertificates_item,
1033 { "Item(##)", "x509af.CrossCertificates_item",
1034 FT_NONE, BASE_NONE, NULL, 0,
1035 "CrossCertificates/_item", HFILL }},
1036 { &hf_x509af_theCACertificates,
1037 { "theCACertificates", "x509af.theCACertificates",
1038 FT_UINT32, BASE_DEC, NULL, 0,
1039 "CertificationPath/theCACertificates", HFILL }},
1040 { &hf_x509af_theCACertificates_item,
1041 { "Item[##]", "x509af.theCACertificates_item",
1042 FT_NONE, BASE_NONE, NULL, 0,
1043 "CertificationPath/theCACertificates/_item", HFILL }},
1044 { &hf_x509af_issuedByThisCA,
1045 { "issuedByThisCA", "x509af.issuedByThisCA",
1046 FT_NONE, BASE_NONE, NULL, 0,
1047 "CertificatePair/issuedByThisCA", HFILL }},
1048 { &hf_x509af_issuedToThisCA,
1049 { "issuedToThisCA", "x509af.issuedToThisCA",
1050 FT_NONE, BASE_NONE, NULL, 0,
1051 "CertificatePair/issuedToThisCA", HFILL }},
1052 { &hf_x509af_signedCertificateList,
1053 { "signedCertificateList", "x509af.signedCertificateList",
1054 FT_NONE, BASE_NONE, NULL, 0,
1055 "CertificateList/signedCertificateList", HFILL }},
1056 { &hf_x509af_thisUpdate,
1057 { "thisUpdate", "x509af.thisUpdate",
1058 FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
1059 "CertificateList/signedCertificateList/thisUpdate", HFILL }},
1060 { &hf_x509af_nextUpdate,
1061 { "nextUpdate", "x509af.nextUpdate",
1062 FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
1063 "CertificateList/signedCertificateList/nextUpdate", HFILL }},
1064 { &hf_x509af_revokedCertificates,
1065 { "revokedCertificates", "x509af.revokedCertificates",
1066 FT_UINT32, BASE_DEC, NULL, 0,
1067 "CertificateList/signedCertificateList/revokedCertificates", HFILL }},
1068 { &hf_x509af_revokedCertificates_item,
1069 { "Item[##]", "x509af.revokedCertificates_item",
1070 FT_NONE, BASE_NONE, NULL, 0,
1071 "CertificateList/signedCertificateList/revokedCertificates/_item", HFILL }},
1072 { &hf_x509af_userCertificate1,
1073 { "userCertificate", "x509af.userCertificate",
1074 FT_INT32, BASE_DEC, NULL, 0,
1075 "CertificateList/signedCertificateList/revokedCertificates/_item/userCertificate", HFILL }},
1076 { &hf_x509af_revocationDate,
1077 { "revocationDate", "x509af.revocationDate",
1078 FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
1079 "CertificateList/signedCertificateList/revokedCertificates/_item/revocationDate", HFILL }},
1080 { &hf_x509af_crlEntryExtensions,
1081 { "crlEntryExtensions", "x509af.crlEntryExtensions",
1082 FT_UINT32, BASE_DEC, NULL, 0,
1083 "CertificateList/signedCertificateList/revokedCertificates/_item/crlEntryExtensions", HFILL }},
1084 { &hf_x509af_crlExtensions,
1085 { "crlExtensions", "x509af.crlExtensions",
1086 FT_UINT32, BASE_DEC, NULL, 0,
1087 "CertificateList/signedCertificateList/crlExtensions", HFILL }},
1088 { &hf_x509af_attributeCertificate,
1089 { "attributeCertificate", "x509af.attributeCertificate",
1090 FT_NONE, BASE_NONE, NULL, 0,
1092 { &hf_x509af_acPath,
1093 { "acPath", "x509af.acPath",
1094 FT_UINT32, BASE_DEC, NULL, 0,
1095 "AttributeCertificationPath/acPath", HFILL }},
1096 { &hf_x509af_acPath_item,
1097 { "Item[##]", "x509af.acPath_item",
1098 FT_NONE, BASE_NONE, NULL, 0,
1099 "AttributeCertificationPath/acPath/_item", HFILL }},
1100 { &hf_x509af_certificate,
1101 { "certificate", "x509af.certificate",
1102 FT_NONE, BASE_NONE, NULL, 0,
1103 "ACPathData/certificate", HFILL }},
1104 { &hf_x509af_signedAttributeCertificateInfo,
1105 { "signedAttributeCertificateInfo", "x509af.signedAttributeCertificateInfo",
1106 FT_NONE, BASE_NONE, NULL, 0,
1107 "AttributeCertificate/signedAttributeCertificateInfo", HFILL }},
1108 { &hf_x509af_info_subject,
1109 { "subject", "x509af.subject",
1110 FT_UINT32, BASE_DEC, VALS(InfoSubject_vals), 0,
1111 "AttributeCertificateInfo/subject", HFILL }},
1112 { &hf_x509af_baseCertificateID,
1113 { "baseCertificateID", "x509af.baseCertificateID",
1114 FT_NONE, BASE_NONE, NULL, 0,
1116 { &hf_x509af_infoSubjectName,
1117 { "subjectName", "x509af.subjectName",
1118 FT_NONE, BASE_NONE, NULL, 0,
1119 "AttributeCertificateInfo/subject/subjectName", HFILL }},
1120 { &hf_x509af_issuer1,
1121 { "issuer", "x509af.issuer",
1122 FT_NONE, BASE_NONE, NULL, 0,
1124 { &hf_x509af_attCertValidityPeriod,
1125 { "attCertValidityPeriod", "x509af.attCertValidityPeriod",
1126 FT_NONE, BASE_NONE, NULL, 0,
1127 "AttributeCertificateInfo/attCertValidityPeriod", HFILL }},
1128 { &hf_x509af_attributes,
1129 { "attributes", "x509af.attributes",
1130 FT_UINT32, BASE_DEC, NULL, 0,
1131 "AttributeCertificateInfo/attributes", HFILL }},
1132 { &hf_x509af_attributes_item,
1133 { "Item[##]", "x509af.attributes_item",
1134 FT_NONE, BASE_NONE, NULL, 0,
1135 "AttributeCertificateInfo/attributes/_item", HFILL }},
1136 { &hf_x509af_issuerUniqueID,
1137 { "issuerUniqueID", "x509af.issuerUniqueID",
1138 FT_NONE, BASE_NONE, NULL, 0,
1139 "AttributeCertificateInfo/issuerUniqueID", HFILL }},
1140 { &hf_x509af_serial,
1141 { "serial", "x509af.serial",
1142 FT_INT32, BASE_DEC, NULL, 0,
1143 "IssuerSerial/serial", HFILL }},
1144 { &hf_x509af_issuerUID,
1145 { "issuerUID", "x509af.issuerUID",
1146 FT_NONE, BASE_NONE, NULL, 0,
1147 "IssuerSerial/issuerUID", HFILL }},
1148 { &hf_x509af_notBeforeTime,
1149 { "notBeforeTime", "x509af.notBeforeTime",
1150 FT_STRING, BASE_NONE, NULL, 0,
1151 "AttCertValidityPeriod/notBeforeTime", HFILL }},
1152 { &hf_x509af_notAfterTime,
1153 { "notAfterTime", "x509af.notAfterTime",
1154 FT_STRING, BASE_NONE, NULL, 0,
1155 "AttCertValidityPeriod/notAfterTime", HFILL }},
1156 { &hf_x509af_assertion_subject,
1157 { "subject", "x509af.subject",
1158 FT_UINT32, BASE_DEC, VALS(AssertionSubject_vals), 0,
1159 "AttributeCertificateAssertion/subject", HFILL }},
1160 { &hf_x509af_assertionSubjectName,
1161 { "subjectName", "x509af.subjectName",
1162 FT_NONE, BASE_NONE, NULL, 0,
1163 "AttributeCertificateAssertion/subject/subjectName", HFILL }},
1164 { &hf_x509af_assertionIssuer,
1165 { "issuer", "x509af.issuer",
1166 FT_NONE, BASE_NONE, NULL, 0,
1167 "AttributeCertificateAssertion/issuer", HFILL }},
1168 { &hf_x509af_attCertValidity,
1169 { "attCertValidity", "x509af.attCertValidity",
1170 FT_STRING, BASE_NONE, NULL, 0,
1171 "AttributeCertificateAssertion/attCertValidity", HFILL }},
1172 { &hf_x509af_attType,
1173 { "attType", "x509af.attType",
1174 FT_UINT32, BASE_DEC, NULL, 0,
1175 "AttributeCertificateAssertion/attType", HFILL }},
1176 { &hf_x509af_attType_item,
1177 { "Item(##)", "x509af.attType_item",
1178 FT_NONE, BASE_NONE, NULL, 0,
1179 "AttributeCertificateAssertion/attType/_item", HFILL }},
1181 /*--- End of included file: packet-x509af-hfarr.c ---*/
1185 /* List of subtrees */
1186 static gint *ett[] = {
1188 /*--- Included file: packet-x509af-ettarr.c ---*/
1190 /* Do not modify this file. */
1191 /* It is created automatically by the ASN.1 to Ethereal dissector compiler */
1192 /* packet-x509af-ettarr.c */
1193 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
1195 &ett_x509af_Certificate,
1196 &ett_x509af_T_signedCertificate,
1197 &ett_x509af_AlgorithmIdentifier,
1198 &ett_x509af_Validity,
1199 &ett_x509af_SubjectPublicKeyInfo,
1201 &ett_x509af_Extensions,
1202 &ett_x509af_Extension,
1203 &ett_x509af_Certificates,
1204 &ett_x509af_ForwardCertificationPath,
1205 &ett_x509af_CrossCertificates,
1206 &ett_x509af_CertificationPath,
1207 &ett_x509af_SEQUNCE_OF_CertificatePair,
1208 &ett_x509af_CertificatePair,
1209 &ett_x509af_CertificateList,
1210 &ett_x509af_T_signedCertificateList,
1211 &ett_x509af_T_revokedCertificates,
1212 &ett_x509af_T_revokedCertificates_item,
1213 &ett_x509af_AttributeCertificationPath,
1214 &ett_x509af_SEQUNCE_OF_ACPathData,
1215 &ett_x509af_ACPathData,
1216 &ett_x509af_AttributeCertificate,
1217 &ett_x509af_AttributeCertificateInfo,
1218 &ett_x509af_InfoSubject,
1219 &ett_x509af_SEQUNCE_OF_Attribute,
1220 &ett_x509af_IssuerSerial,
1221 &ett_x509af_AttCertValidityPeriod,
1222 &ett_x509af_AttributeCertificateAssertion,
1223 &ett_x509af_AssertionSubject,
1224 &ett_x509af_SET_OF_AttributeType,
1226 /*--- End of included file: packet-x509af-ettarr.c ---*/
1230 /* Register protocol */
1231 proto_x509af = proto_register_protocol(PNAME, PSNAME, PFNAME);
1233 /* Register fields and subtrees */
1234 proto_register_field_array(proto_x509af, hf, array_length(hf));
1235 proto_register_subtree_array(ett, array_length(ett));
1240 /*--- proto_reg_handoff_x509af -------------------------------------------*/
1241 void proto_reg_handoff_x509af(void) {