minor update
[metze/wireshark/wip.git] / epan / dissectors / packet-x509af.c
1 /* Do not modify this file.                                                   */
2 /* It is created automatically by the ASN.1 to Ethereal dissector compiler    */
3 /* packet-x509af.c                                                            */
4 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
5
6 /* Input file: packet-x509af-template.c */
7 /* Include files: packet-x509af-hf.c, packet-x509af-ett.c, packet-x509af-fn.c, packet-x509af-hfarr.c, packet-x509af-ettarr.c, packet-x509af-val.h */
8
9 /* packet-x509af.c
10  * Routines for X.509 Authentication Framework packet dissection
11  *
12  * $Id: packet-x509af-template.c,v 1.2 2004/05/25 21:07:43 guy Exp $
13  *
14  * Ethereal - Network traffic analyzer
15  * By Gerald Combs <gerald@ethereal.com>
16  * Copyright 1998 Gerald Combs
17  *
18  * This program is free software; you can redistribute it and/or
19  * modify it under the terms of the GNU General Public License
20  * as published by the Free Software Foundation; either version 2
21  * of the License, or (at your option) any later version.
22  *
23  * This program is distributed in the hope that it will be useful,
24  * but WITHOUT ANY WARRANTY; without even the implied warranty of
25  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
26  * GNU General Public License for more details.
27  *
28  * You should have received a copy of the GNU General Public License
29  * along with this program; if not, write to the Free Software
30  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
31  */
32
33 #ifdef HAVE_CONFIG_H
34 # include "config.h"
35 #endif
36
37 #include <glib.h>
38 #include <epan/packet.h>
39 #include <epan/conversation.h>
40
41 #include <stdio.h>
42 #include <string.h>
43
44 #include "packet-ber.h"
45 #include "packet-x509af.h"
46 #include "packet-x509ce.h"
47 #include "packet-x509if.h"
48 #include "packet-x509sat.h"
49
50 #define PNAME  "X.509 Authentication Framework"
51 #define PSNAME "X509AF"
52 #define PFNAME "x509af"
53
54 /* Initialize the protocol and registered fields */
55 int proto_x509af = -1;
56 int hf_x509af_algorithm_id = -1;
57
58 /*--- Included file: packet-x509af-hf.c ---*/
59
60 /* Do not modify this file.                                                   */
61 /* It is created automatically by the ASN.1 to Ethereal dissector compiler    */
62 /* packet-x509af-hf.c                                                         */
63 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
64
65 static int hf_x509af_signedCertificate = -1;      /* T_signedCertificate */
66 static int hf_x509af_version = -1;                /* Version */
67 static int hf_x509af_serialNumber = -1;           /* CertificateSerialNumber */
68 static int hf_x509af_signature = -1;              /* AlgorithmIdentifier */
69 static int hf_x509af_issuer = -1;                 /* Name */
70 static int hf_x509af_validity = -1;               /* Validity */
71 static int hf_x509af_subject = -1;                /* Name */
72 static int hf_x509af_subjectPublicKeyInfo = -1;   /* SubjectPublicKeyInfo */
73 static int hf_x509af_issuerUniqueIdentifier = -1;  /* UniqueIdentifier */
74 static int hf_x509af_subjectUniqueIdentifier = -1;  /* UniqueIdentifier */
75 static int hf_x509af_extensions = -1;             /* Extensions */
76 static int hf_x509af_algorithmIdentifier = -1;    /* AlgorithmIdentifier */
77 static int hf_x509af_encrypted = -1;              /* BIT_STRING */
78 static int hf_x509af_notBefore = -1;              /* Time */
79 static int hf_x509af_notAfter = -1;               /* Time */
80 static int hf_x509af_algorithm = -1;              /* AlgorithmIdentifier */
81 static int hf_x509af_subjectPublicKey = -1;       /* BIT_STRING */
82 static int hf_x509af_utcTime = -1;                /* UTCTime */
83 static int hf_x509af_generalizedTime = -1;        /* GeneralizedTime */
84 static int hf_x509af_Extensions_item = -1;        /* Extension */
85 static int hf_x509af_critical = -1;               /* BOOLEAN */
86 static int hf_x509af_extnValue = -1;              /* OCTET_STRING */
87 static int hf_x509af_userCertificate = -1;        /* Certificate */
88 static int hf_x509af_certificationPath = -1;      /* ForwardCertificationPath */
89 static int hf_x509af_ForwardCertificationPath_item = -1;  /* CrossCertificates */
90 static int hf_x509af_CrossCertificates_item = -1;  /* Certificate */
91 static int hf_x509af_theCACertificates = -1;      /* SEQUNCE_OF_CertificatePair */
92 static int hf_x509af_theCACertificates_item = -1;  /* CertificatePair */
93 static int hf_x509af_issuedByThisCA = -1;         /* Certificate */
94 static int hf_x509af_issuedToThisCA = -1;         /* Certificate */
95 static int hf_x509af_signedCertificateList = -1;  /* T_signedCertificateList */
96 static int hf_x509af_thisUpdate = -1;             /* Time */
97 static int hf_x509af_nextUpdate = -1;             /* Time */
98 static int hf_x509af_revokedCertificates = -1;    /* T_revokedCertificates */
99 static int hf_x509af_revokedCertificates_item = -1;  /* T_revokedCertificates_item */
100 static int hf_x509af_userCertificate1 = -1;       /* CertificateSerialNumber */
101 static int hf_x509af_revocationDate = -1;         /* Time */
102 static int hf_x509af_crlEntryExtensions = -1;     /* Extensions */
103 static int hf_x509af_crlExtensions = -1;          /* Extensions */
104 static int hf_x509af_attributeCertificate = -1;   /* AttributeCertificate */
105 static int hf_x509af_acPath = -1;                 /* SEQUNCE_OF_ACPathData */
106 static int hf_x509af_acPath_item = -1;            /* ACPathData */
107 static int hf_x509af_certificate = -1;            /* Certificate */
108 static int hf_x509af_signedAttributeCertificateInfo = -1;  /* AttributeCertificateInfo */
109 static int hf_x509af_info_subject = -1;           /* InfoSubject */
110 static int hf_x509af_baseCertificateID = -1;      /* IssuerSerial */
111 static int hf_x509af_infoSubjectName = -1;        /* GeneralNames */
112 static int hf_x509af_issuer1 = -1;                /* GeneralNames */
113 static int hf_x509af_attCertValidityPeriod = -1;  /* AttCertValidityPeriod */
114 static int hf_x509af_attributes = -1;             /* SEQUNCE_OF_Attribute */
115 static int hf_x509af_attributes_item = -1;        /* Attribute */
116 static int hf_x509af_issuerUniqueID = -1;         /* UniqueIdentifier */
117 static int hf_x509af_serial = -1;                 /* CertificateSerialNumber */
118 static int hf_x509af_issuerUID = -1;              /* UniqueIdentifier */
119 static int hf_x509af_notBeforeTime = -1;          /* GeneralizedTime */
120 static int hf_x509af_notAfterTime = -1;           /* GeneralizedTime */
121 static int hf_x509af_assertion_subject = -1;      /* AssertionSubject */
122 static int hf_x509af_assertionSubjectName = -1;   /* Name */
123 static int hf_x509af_assertionIssuer = -1;        /* Name */
124 static int hf_x509af_attCertValidity = -1;        /* GeneralizedTime */
125 static int hf_x509af_attType = -1;                /* SET_OF_AttributeType */
126 static int hf_x509af_attType_item = -1;           /* AttributeType */
127
128 /*--- End of included file: packet-x509af-hf.c ---*/
129
130
131 /* Initialize the subtree pointers */
132
133 /*--- Included file: packet-x509af-ett.c ---*/
134
135 /* Do not modify this file.                                                   */
136 /* It is created automatically by the ASN.1 to Ethereal dissector compiler    */
137 /* packet-x509af-ett.c                                                        */
138 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
139
140 static gint ett_x509af_Certificate = -1;
141 static gint ett_x509af_T_signedCertificate = -1;
142 static gint ett_x509af_AlgorithmIdentifier = -1;
143 static gint ett_x509af_Validity = -1;
144 static gint ett_x509af_SubjectPublicKeyInfo = -1;
145 static gint ett_x509af_Time = -1;
146 static gint ett_x509af_Extensions = -1;
147 static gint ett_x509af_Extension = -1;
148 static gint ett_x509af_Certificates = -1;
149 static gint ett_x509af_ForwardCertificationPath = -1;
150 static gint ett_x509af_CrossCertificates = -1;
151 static gint ett_x509af_CertificationPath = -1;
152 static gint ett_x509af_SEQUNCE_OF_CertificatePair = -1;
153 static gint ett_x509af_CertificatePair = -1;
154 static gint ett_x509af_CertificateList = -1;
155 static gint ett_x509af_T_signedCertificateList = -1;
156 static gint ett_x509af_T_revokedCertificates = -1;
157 static gint ett_x509af_T_revokedCertificates_item = -1;
158 static gint ett_x509af_AttributeCertificationPath = -1;
159 static gint ett_x509af_SEQUNCE_OF_ACPathData = -1;
160 static gint ett_x509af_ACPathData = -1;
161 static gint ett_x509af_AttributeCertificate = -1;
162 static gint ett_x509af_AttributeCertificateInfo = -1;
163 static gint ett_x509af_InfoSubject = -1;
164 static gint ett_x509af_SEQUNCE_OF_Attribute = -1;
165 static gint ett_x509af_IssuerSerial = -1;
166 static gint ett_x509af_AttCertValidityPeriod = -1;
167 static gint ett_x509af_AttributeCertificateAssertion = -1;
168 static gint ett_x509af_AssertionSubject = -1;
169 static gint ett_x509af_SET_OF_AttributeType = -1;
170
171 /*--- End of included file: packet-x509af-ett.c ---*/
172
173
174
175 static char algorithm_id[64]; /*64 chars should be long enough? */
176 static int 
177 dissect_hf_x509af_algorithm_id(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) 
178 {
179   offset = dissect_ber_object_identifier(FALSE, pinfo, tree, tvb, offset,
180                                          hf_x509af_algorithm_id, algorithm_id);
181   return offset;
182 }
183
184 static int 
185 dissect_hf_x509af_algorithm_type(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) 
186 {
187   offset=call_ber_oid_callback(algorithm_id, tvb, offset, pinfo, tree);
188
189   return offset;
190 }
191
192 /* Algorithm Identifier can not yet be handled by the compiler */
193 static ber_sequence AlgorithmIdentifier_sequence[] = {
194   { BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_hf_x509af_algorithm_id },
195   { BER_CLASS_ANY, 0, 0, dissect_hf_x509af_algorithm_type },
196   { 0, 0, 0, NULL }
197 };
198
199 int
200 dissect_x509af_AlgorithmIdentifier(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
201   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
202                                 AlgorithmIdentifier_sequence, hf_index, ett_x509af_AlgorithmIdentifier);
203
204   return offset;
205 }
206
207
208 /*--- Included file: packet-x509af-fn.c ---*/
209
210 /* Do not modify this file.                                                   */
211 /* It is created automatically by the ASN.1 to Ethereal dissector compiler    */
212 /* packet-x509af-fn.c                                                         */
213 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
214
215 static int dissect_issuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
216   return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuer);
217 }
218 static int dissect_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
219   return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_subject);
220 }
221 static int dissect_issuerUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
222   return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueIdentifier);
223 }
224 static int dissect_subjectUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
225   return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_subjectUniqueIdentifier);
226 }
227 static int dissect_infoSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
228   return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_infoSubjectName);
229 }
230 static int dissect_issuer1(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
231   return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuer1);
232 }
233 static int dissect_attributes_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
234   return dissect_x509if_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes_item);
235 }
236 static int dissect_issuerUniqueID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
237   return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueID);
238 }
239 static int dissect_issuerUID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
240   return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUID);
241 }
242 static int dissect_assertionSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
243   return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionSubjectName);
244 }
245 static int dissect_assertionIssuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
246   return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionIssuer);
247 }
248 static int dissect_attType_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
249   return dissect_x509if_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType_item);
250 }
251
252 static const value_string Version_vals[] = {
253   {   0, "v1" },
254   {   1, "v2" },
255   {   2, "v3" },
256   { 0, NULL }
257 };
258
259
260 static int
261 dissect_x509af_Version(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
262   offset = dissect_ber_integer(pinfo, tree, tvb, offset, hf_index, NULL);
263
264   return offset;
265 }
266 static int dissect_version(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
267   return dissect_x509af_Version(FALSE, tvb, offset, pinfo, tree, hf_x509af_version);
268 }
269
270
271
272 int
273 dissect_x509af_CertificateSerialNumber(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
274   offset = dissect_ber_integer(pinfo, tree, tvb, offset, hf_index, NULL);
275
276   return offset;
277 }
278 static int dissect_serialNumber(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
279   return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serialNumber);
280 }
281 static int dissect_userCertificate1(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
282   return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_userCertificate1);
283 }
284 static int dissect_serial(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
285   return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serial);
286 }
287
288 static int dissect_signature(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
289   return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_signature);
290 }
291 static int dissect_algorithmIdentifier(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
292   return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithmIdentifier);
293 }
294 static int dissect_algorithm(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
295   return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithm);
296 }
297
298
299 static int
300 dissect_x509af_UTCTime(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
301   offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTCTime,
302                                          pinfo, tree, tvb, offset, hf_index,
303                                          NULL);
304
305   return offset;
306 }
307 static int dissect_utcTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
308   return dissect_x509af_UTCTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_utcTime);
309 }
310
311
312 static int
313 dissect_x509af_GeneralizedTime(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
314   offset = dissect_ber_generalized_time(pinfo, tree, tvb, offset, hf_index);
315
316   return offset;
317 }
318 static int dissect_generalizedTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
319   return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_generalizedTime);
320 }
321 static int dissect_notBeforeTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
322   return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBeforeTime);
323 }
324 static int dissect_notAfterTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
325   return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfterTime);
326 }
327 static int dissect_attCertValidity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
328   return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidity);
329 }
330
331
332 static const value_string Time_vals[] = {
333   {   0, "utcTime" },
334   {   1, "generalizedTime" },
335   { 0, NULL }
336 };
337
338 static ber_choice Time_choice[] = {
339   {   0, BER_CLASS_UNI, BER_UNI_TAG_UTCTime, BER_FLAGS_NOOWNTAG, dissect_utcTime },
340   {   1, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_generalizedTime },
341   { 0, 0, 0, 0, NULL }
342 };
343
344 static int
345 dissect_x509af_Time(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
346   offset = dissect_ber_choice(pinfo, tree, tvb, offset,
347                               Time_choice, hf_index, ett_x509af_Time);
348
349   return offset;
350 }
351 static int dissect_notBefore(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
352   return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBefore);
353 }
354 static int dissect_notAfter(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
355   return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfter);
356 }
357 static int dissect_thisUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
358   return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_thisUpdate);
359 }
360 static int dissect_nextUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
361   return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_nextUpdate);
362 }
363 static int dissect_revocationDate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
364   return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_revocationDate);
365 }
366
367 static ber_sequence Validity_sequence[] = {
368   { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notBefore },
369   { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notAfter },
370   { 0, 0, 0, NULL }
371 };
372
373 static int
374 dissect_x509af_Validity(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
375   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
376                                 Validity_sequence, hf_index, ett_x509af_Validity);
377
378   return offset;
379 }
380 static int dissect_validity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
381   return dissect_x509af_Validity(FALSE, tvb, offset, pinfo, tree, hf_x509af_validity);
382 }
383
384
385 static int
386 dissect_x509af_BIT_STRING(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
387   offset = dissect_ber_bitstring(implicit_tag, pinfo, tree, tvb, offset,
388                                  NULL, hf_index, -1,
389                                  NULL);
390
391   return offset;
392 }
393 static int dissect_encrypted(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
394   return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_encrypted);
395 }
396 static int dissect_subjectPublicKey(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
397   return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKey);
398 }
399
400 static ber_sequence SubjectPublicKeyInfo_sequence[] = {
401   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithm },
402   { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKey },
403   { 0, 0, 0, NULL }
404 };
405
406 static int
407 dissect_x509af_SubjectPublicKeyInfo(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
408   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
409                                 SubjectPublicKeyInfo_sequence, hf_index, ett_x509af_SubjectPublicKeyInfo);
410
411   return offset;
412 }
413 static int dissect_subjectPublicKeyInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
414   return dissect_x509af_SubjectPublicKeyInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKeyInfo);
415 }
416
417
418 static int
419 dissect_x509af_BOOLEAN(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
420   offset = dissect_ber_boolean(pinfo, tree, tvb, offset, hf_index);
421
422   return offset;
423 }
424 static int dissect_critical(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
425   return dissect_x509af_BOOLEAN(FALSE, tvb, offset, pinfo, tree, hf_x509af_critical);
426 }
427
428
429 static int
430 dissect_x509af_OCTET_STRING(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
431   offset = dissect_ber_octet_string(implicit_tag, pinfo, tree, tvb, offset, hf_index,
432                                     NULL);
433
434   return offset;
435 }
436 static int dissect_extnValue(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
437   return dissect_x509af_OCTET_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_extnValue);
438 }
439
440 static ber_sequence Extension_sequence[] = {
441   { BER_CLASS_UNI, BER_UNI_TAG_BOOLEAN, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_critical },
442   { BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_extnValue },
443   { 0, 0, 0, NULL }
444 };
445
446 static int
447 dissect_x509af_Extension(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
448   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
449                                 Extension_sequence, hf_index, ett_x509af_Extension);
450
451   return offset;
452 }
453 static int dissect_Extensions_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
454   return dissect_x509af_Extension(FALSE, tvb, offset, pinfo, tree, hf_x509af_Extensions_item);
455 }
456
457 static ber_sequence Extensions_sequence_of[1] = {
458   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_Extensions_item },
459 };
460
461 static int
462 dissect_x509af_Extensions(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
463   offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
464                                    Extensions_sequence_of, hf_index, ett_x509af_Extensions);
465
466   return offset;
467 }
468 static int dissect_extensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
469   return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_extensions);
470 }
471 static int dissect_crlEntryExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
472   return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlEntryExtensions);
473 }
474 static int dissect_crlExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
475   return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlExtensions);
476 }
477
478 static ber_sequence T_signedCertificate_sequence[] = {
479   { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_version },
480   { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
481   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
482   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer },
483   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_validity },
484   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_subject },
485   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKeyInfo },
486   { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_issuerUniqueIdentifier_impl },
487   { BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_subjectUniqueIdentifier_impl },
488   { BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_extensions },
489   { 0, 0, 0, NULL }
490 };
491
492 static int
493 dissect_x509af_T_signedCertificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
494   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
495                                 T_signedCertificate_sequence, hf_index, ett_x509af_T_signedCertificate);
496
497   return offset;
498 }
499 static int dissect_signedCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
500   return dissect_x509af_T_signedCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificate);
501 }
502
503 static ber_sequence Certificate_sequence[] = {
504   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificate },
505   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
506   { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
507   { 0, 0, 0, NULL }
508 };
509
510 int
511 dissect_x509af_Certificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
512   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
513                                 Certificate_sequence, hf_index, ett_x509af_Certificate);
514
515   return offset;
516 }
517 static int dissect_userCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
518   return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_userCertificate);
519 }
520 static int dissect_CrossCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
521   return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_CrossCertificates_item);
522 }
523 static int dissect_issuedByThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
524   return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedByThisCA);
525 }
526 static int dissect_issuedToThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
527   return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedToThisCA);
528 }
529 static int dissect_certificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
530   return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificate);
531 }
532
533 static ber_sequence CrossCertificates_set_of[1] = {
534   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_CrossCertificates_item },
535 };
536
537 static int
538 dissect_x509af_CrossCertificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
539   offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
540                               CrossCertificates_set_of, hf_index, ett_x509af_CrossCertificates);
541
542   return offset;
543 }
544 static int dissect_ForwardCertificationPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
545   return dissect_x509af_CrossCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_ForwardCertificationPath_item);
546 }
547
548 static ber_sequence ForwardCertificationPath_sequence_of[1] = {
549   { BER_CLASS_UNI, BER_UNI_TAG_SET, BER_FLAGS_NOOWNTAG, dissect_ForwardCertificationPath_item },
550 };
551
552 static int
553 dissect_x509af_ForwardCertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
554   offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
555                                    ForwardCertificationPath_sequence_of, hf_index, ett_x509af_ForwardCertificationPath);
556
557   return offset;
558 }
559 static int dissect_certificationPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
560   return dissect_x509af_ForwardCertificationPath(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificationPath);
561 }
562
563 static ber_sequence Certificates_sequence[] = {
564   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
565   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_certificationPath },
566   { 0, 0, 0, NULL }
567 };
568
569 static int
570 dissect_x509af_Certificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
571   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
572                                 Certificates_sequence, hf_index, ett_x509af_Certificates);
573
574   return offset;
575 }
576
577 static ber_sequence CertificatePair_sequence[] = {
578   { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_issuedByThisCA },
579   { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_issuedToThisCA },
580   { 0, 0, 0, NULL }
581 };
582
583 static int
584 dissect_x509af_CertificatePair(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
585   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
586                                 CertificatePair_sequence, hf_index, ett_x509af_CertificatePair);
587
588   return offset;
589 }
590 static int dissect_theCACertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
591   return dissect_x509af_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates_item);
592 }
593
594 static ber_sequence SEQUNCE_OF_CertificatePair_sequence_of[1] = {
595   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_theCACertificates_item },
596 };
597
598 static int
599 dissect_x509af_SEQUNCE_OF_CertificatePair(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
600   offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
601                                    SEQUNCE_OF_CertificatePair_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_CertificatePair);
602
603   return offset;
604 }
605 static int dissect_theCACertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
606   return dissect_x509af_SEQUNCE_OF_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates);
607 }
608
609 static ber_sequence CertificationPath_sequence[] = {
610   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
611   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_theCACertificates },
612   { 0, 0, 0, NULL }
613 };
614
615 static int
616 dissect_x509af_CertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
617   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
618                                 CertificationPath_sequence, hf_index, ett_x509af_CertificationPath);
619
620   return offset;
621 }
622
623 static ber_sequence T_revokedCertificates_item_sequence[] = {
624   { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_userCertificate1 },
625   { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_revocationDate },
626   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_crlEntryExtensions },
627   { 0, 0, 0, NULL }
628 };
629
630 static int
631 dissect_x509af_T_revokedCertificates_item(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
632   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
633                                 T_revokedCertificates_item_sequence, hf_index, ett_x509af_T_revokedCertificates_item);
634
635   return offset;
636 }
637 static int dissect_revokedCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
638   return dissect_x509af_T_revokedCertificates_item(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates_item);
639 }
640
641 static ber_sequence T_revokedCertificates_sequence_of[1] = {
642   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_revokedCertificates_item },
643 };
644
645 static int
646 dissect_x509af_T_revokedCertificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
647   offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
648                                    T_revokedCertificates_sequence_of, hf_index, ett_x509af_T_revokedCertificates);
649
650   return offset;
651 }
652 static int dissect_revokedCertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
653   return dissect_x509af_T_revokedCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates);
654 }
655
656 static ber_sequence T_signedCertificateList_sequence[] = {
657   { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
658   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
659   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer },
660   { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_thisUpdate },
661   { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_nextUpdate },
662   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_revokedCertificates },
663   { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_crlExtensions },
664   { 0, 0, 0, NULL }
665 };
666
667 static int
668 dissect_x509af_T_signedCertificateList(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
669   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
670                                 T_signedCertificateList_sequence, hf_index, ett_x509af_T_signedCertificateList);
671
672   return offset;
673 }
674 static int dissect_signedCertificateList(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
675   return dissect_x509af_T_signedCertificateList(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificateList);
676 }
677
678 static ber_sequence CertificateList_sequence[] = {
679   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificateList },
680   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
681   { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
682   { 0, 0, 0, NULL }
683 };
684
685 int
686 dissect_x509af_CertificateList(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
687   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
688                                 CertificateList_sequence, hf_index, ett_x509af_CertificateList);
689
690   return offset;
691 }
692
693 static ber_sequence IssuerSerial_sequence[] = {
694   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer1 },
695   { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serial },
696   { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUID },
697   { 0, 0, 0, NULL }
698 };
699
700 static int
701 dissect_x509af_IssuerSerial(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
702   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
703                                 IssuerSerial_sequence, hf_index, ett_x509af_IssuerSerial);
704
705   return offset;
706 }
707 static int dissect_baseCertificateID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
708   return dissect_x509af_IssuerSerial(FALSE, tvb, offset, pinfo, tree, hf_x509af_baseCertificateID);
709 }
710
711
712 static const value_string InfoSubject_vals[] = {
713   {   0, "baseCertificateID" },
714   {   1, "subjectName" },
715   { 0, NULL }
716 };
717
718 static ber_choice InfoSubject_choice[] = {
719   {   0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
720   {   1, BER_CLASS_CON, 1, 0, dissect_infoSubjectName },
721   { 0, 0, 0, 0, NULL }
722 };
723
724 static int
725 dissect_x509af_InfoSubject(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
726   offset = dissect_ber_choice(pinfo, tree, tvb, offset,
727                               InfoSubject_choice, hf_index, ett_x509af_InfoSubject);
728
729   return offset;
730 }
731 static int dissect_info_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
732   return dissect_x509af_InfoSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_info_subject);
733 }
734
735 static ber_sequence AttCertValidityPeriod_sequence[] = {
736   { BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notBeforeTime },
737   { BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notAfterTime },
738   { 0, 0, 0, NULL }
739 };
740
741 static int
742 dissect_x509af_AttCertValidityPeriod(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
743   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
744                                 AttCertValidityPeriod_sequence, hf_index, ett_x509af_AttCertValidityPeriod);
745
746   return offset;
747 }
748 static int dissect_attCertValidityPeriod(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
749   return dissect_x509af_AttCertValidityPeriod(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidityPeriod);
750 }
751
752 static ber_sequence SEQUNCE_OF_Attribute_sequence_of[1] = {
753   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes_item },
754 };
755
756 static int
757 dissect_x509af_SEQUNCE_OF_Attribute(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
758   offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
759                                    SEQUNCE_OF_Attribute_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_Attribute);
760
761   return offset;
762 }
763 static int dissect_attributes(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
764   return dissect_x509af_SEQUNCE_OF_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes);
765 }
766
767 static ber_sequence AttributeCertificateInfo_sequence[] = {
768   { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
769   { BER_CLASS_CON, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_info_subject },
770   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer1 },
771   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
772   { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
773   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attCertValidityPeriod },
774   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes },
775   { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUniqueID },
776   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_extensions },
777   { 0, 0, 0, NULL }
778 };
779
780 static int
781 dissect_x509af_AttributeCertificateInfo(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
782   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
783                                 AttributeCertificateInfo_sequence, hf_index, ett_x509af_AttributeCertificateInfo);
784
785   return offset;
786 }
787 static int dissect_signedAttributeCertificateInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
788   return dissect_x509af_AttributeCertificateInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedAttributeCertificateInfo);
789 }
790
791 static ber_sequence AttributeCertificate_sequence[] = {
792   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedAttributeCertificateInfo },
793   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
794   { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
795   { 0, 0, 0, NULL }
796 };
797
798 int
799 dissect_x509af_AttributeCertificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
800   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
801                                 AttributeCertificate_sequence, hf_index, ett_x509af_AttributeCertificate);
802
803   return offset;
804 }
805 static int dissect_attributeCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
806   return dissect_x509af_AttributeCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributeCertificate);
807 }
808
809 static ber_sequence ACPathData_sequence[] = {
810   { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_certificate },
811   { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_attributeCertificate },
812   { 0, 0, 0, NULL }
813 };
814
815 static int
816 dissect_x509af_ACPathData(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
817   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
818                                 ACPathData_sequence, hf_index, ett_x509af_ACPathData);
819
820   return offset;
821 }
822 static int dissect_acPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
823   return dissect_x509af_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath_item);
824 }
825
826 static ber_sequence SEQUNCE_OF_ACPathData_sequence_of[1] = {
827   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_acPath_item },
828 };
829
830 static int
831 dissect_x509af_SEQUNCE_OF_ACPathData(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
832   offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
833                                    SEQUNCE_OF_ACPathData_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_ACPathData);
834
835   return offset;
836 }
837 static int dissect_acPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
838   return dissect_x509af_SEQUNCE_OF_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath);
839 }
840
841 static ber_sequence AttributeCertificationPath_sequence[] = {
842   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributeCertificate },
843   { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_acPath },
844   { 0, 0, 0, NULL }
845 };
846
847 static int
848 dissect_x509af_AttributeCertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
849   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
850                                 AttributeCertificationPath_sequence, hf_index, ett_x509af_AttributeCertificationPath);
851
852   return offset;
853 }
854
855
856 static const value_string AssertionSubject_vals[] = {
857   {   0, "baseCertificateID" },
858   {   1, "subjectName" },
859   { 0, NULL }
860 };
861
862 static ber_choice AssertionSubject_choice[] = {
863   {   0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
864   {   1, BER_CLASS_CON, 1, 0, dissect_assertionSubjectName },
865   { 0, 0, 0, 0, NULL }
866 };
867
868 static int
869 dissect_x509af_AssertionSubject(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
870   offset = dissect_ber_choice(pinfo, tree, tvb, offset,
871                               AssertionSubject_choice, hf_index, ett_x509af_AssertionSubject);
872
873   return offset;
874 }
875 static int dissect_assertion_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
876   return dissect_x509af_AssertionSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertion_subject);
877 }
878
879 static ber_sequence SET_OF_AttributeType_set_of[1] = {
880   { -1 /*imported*/, -1 /*imported*/, BER_FLAGS_NOOWNTAG, dissect_attType_item },
881 };
882
883 static int
884 dissect_x509af_SET_OF_AttributeType(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
885   offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
886                               SET_OF_AttributeType_set_of, hf_index, ett_x509af_SET_OF_AttributeType);
887
888   return offset;
889 }
890 static int dissect_attType(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
891   return dissect_x509af_SET_OF_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType);
892 }
893
894 static ber_sequence AttributeCertificateAssertion_sequence[] = {
895   { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_assertion_subject },
896   { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_assertionIssuer },
897   { BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL, dissect_attCertValidity },
898   { BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_attType },
899   { 0, 0, 0, NULL }
900 };
901
902 static int
903 dissect_x509af_AttributeCertificateAssertion(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
904   offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
905                                 AttributeCertificateAssertion_sequence, hf_index, ett_x509af_AttributeCertificateAssertion);
906
907   return offset;
908 }
909
910
911 /*--- End of included file: packet-x509af-fn.c ---*/
912
913
914
915 /*--- proto_register_x509af ----------------------------------------------*/
916 void proto_register_x509af(void) {
917
918   /* List of fields */
919   static hf_register_info hf[] = {
920     { &hf_x509af_algorithm_id,
921       { "Algorithm Id", "x509af.algorithm.id",
922         FT_STRING, BASE_NONE, NULL, 0,
923         "Algorithm Id", HFILL }},
924
925 /*--- Included file: packet-x509af-hfarr.c ---*/
926
927 /* Do not modify this file.                                                   */
928 /* It is created automatically by the ASN.1 to Ethereal dissector compiler    */
929 /* packet-x509af-hfarr.c                                                      */
930 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
931
932     { &hf_x509af_signedCertificate,
933       { "signedCertificate", "x509af.signedCertificate",
934         FT_NONE, BASE_NONE, NULL, 0,
935         "Certificate/signedCertificate", HFILL }},
936     { &hf_x509af_version,
937       { "version", "x509af.version",
938         FT_INT32, BASE_DEC, VALS(Version_vals), 0,
939         "", HFILL }},
940     { &hf_x509af_serialNumber,
941       { "serialNumber", "x509af.serialNumber",
942         FT_INT32, BASE_DEC, NULL, 0,
943         "", HFILL }},
944     { &hf_x509af_signature,
945       { "signature", "x509af.signature",
946         FT_NONE, BASE_NONE, NULL, 0,
947         "", HFILL }},
948     { &hf_x509af_issuer,
949       { "issuer", "x509af.issuer",
950         FT_NONE, BASE_NONE, NULL, 0,
951         "", HFILL }},
952     { &hf_x509af_validity,
953       { "validity", "x509af.validity",
954         FT_NONE, BASE_NONE, NULL, 0,
955         "Certificate/signedCertificate/validity", HFILL }},
956     { &hf_x509af_subject,
957       { "subject", "x509af.subject",
958         FT_NONE, BASE_NONE, NULL, 0,
959         "Certificate/signedCertificate/subject", HFILL }},
960     { &hf_x509af_subjectPublicKeyInfo,
961       { "subjectPublicKeyInfo", "x509af.subjectPublicKeyInfo",
962         FT_NONE, BASE_NONE, NULL, 0,
963         "Certificate/signedCertificate/subjectPublicKeyInfo", HFILL }},
964     { &hf_x509af_issuerUniqueIdentifier,
965       { "issuerUniqueIdentifier", "x509af.issuerUniqueIdentifier",
966         FT_NONE, BASE_NONE, NULL, 0,
967         "Certificate/signedCertificate/issuerUniqueIdentifier", HFILL }},
968     { &hf_x509af_subjectUniqueIdentifier,
969       { "subjectUniqueIdentifier", "x509af.subjectUniqueIdentifier",
970         FT_NONE, BASE_NONE, NULL, 0,
971         "Certificate/signedCertificate/subjectUniqueIdentifier", HFILL }},
972     { &hf_x509af_extensions,
973       { "extensions", "x509af.extensions",
974         FT_UINT32, BASE_DEC, NULL, 0,
975         "", HFILL }},
976     { &hf_x509af_algorithmIdentifier,
977       { "algorithmIdentifier", "x509af.algorithmIdentifier",
978         FT_NONE, BASE_NONE, NULL, 0,
979         "", HFILL }},
980     { &hf_x509af_encrypted,
981       { "encrypted", "x509af.encrypted",
982         FT_BYTES, BASE_HEX, NULL, 0,
983         "", HFILL }},
984     { &hf_x509af_notBefore,
985       { "notBefore", "x509af.notBefore",
986         FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
987         "Validity/notBefore", HFILL }},
988     { &hf_x509af_notAfter,
989       { "notAfter", "x509af.notAfter",
990         FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
991         "Validity/notAfter", HFILL }},
992     { &hf_x509af_algorithm,
993       { "algorithm", "x509af.algorithm",
994         FT_NONE, BASE_NONE, NULL, 0,
995         "SubjectPublicKeyInfo/algorithm", HFILL }},
996     { &hf_x509af_subjectPublicKey,
997       { "subjectPublicKey", "x509af.subjectPublicKey",
998         FT_BYTES, BASE_HEX, NULL, 0,
999         "SubjectPublicKeyInfo/subjectPublicKey", HFILL }},
1000     { &hf_x509af_utcTime,
1001       { "utcTime", "x509af.utcTime",
1002         FT_STRING, BASE_NONE, NULL, 0,
1003         "Time/utcTime", HFILL }},
1004     { &hf_x509af_generalizedTime,
1005       { "generalizedTime", "x509af.generalizedTime",
1006         FT_STRING, BASE_NONE, NULL, 0,
1007         "Time/generalizedTime", HFILL }},
1008     { &hf_x509af_Extensions_item,
1009       { "Item[##]", "x509af.Extensions_item",
1010         FT_NONE, BASE_NONE, NULL, 0,
1011         "Extensions/_item", HFILL }},
1012     { &hf_x509af_critical,
1013       { "critical", "x509af.critical",
1014         FT_BOOLEAN, 8, NULL, 0,
1015         "Extension/critical", HFILL }},
1016     { &hf_x509af_extnValue,
1017       { "extnValue", "x509af.extnValue",
1018         FT_BYTES, BASE_HEX, NULL, 0,
1019         "Extension/extnValue", HFILL }},
1020     { &hf_x509af_userCertificate,
1021       { "userCertificate", "x509af.userCertificate",
1022         FT_NONE, BASE_NONE, NULL, 0,
1023         "", HFILL }},
1024     { &hf_x509af_certificationPath,
1025       { "certificationPath", "x509af.certificationPath",
1026         FT_UINT32, BASE_DEC, NULL, 0,
1027         "Certificates/certificationPath", HFILL }},
1028     { &hf_x509af_ForwardCertificationPath_item,
1029       { "Item[##]", "x509af.ForwardCertificationPath_item",
1030         FT_UINT32, BASE_DEC, NULL, 0,
1031         "ForwardCertificationPath/_item", HFILL }},
1032     { &hf_x509af_CrossCertificates_item,
1033       { "Item(##)", "x509af.CrossCertificates_item",
1034         FT_NONE, BASE_NONE, NULL, 0,
1035         "CrossCertificates/_item", HFILL }},
1036     { &hf_x509af_theCACertificates,
1037       { "theCACertificates", "x509af.theCACertificates",
1038         FT_UINT32, BASE_DEC, NULL, 0,
1039         "CertificationPath/theCACertificates", HFILL }},
1040     { &hf_x509af_theCACertificates_item,
1041       { "Item[##]", "x509af.theCACertificates_item",
1042         FT_NONE, BASE_NONE, NULL, 0,
1043         "CertificationPath/theCACertificates/_item", HFILL }},
1044     { &hf_x509af_issuedByThisCA,
1045       { "issuedByThisCA", "x509af.issuedByThisCA",
1046         FT_NONE, BASE_NONE, NULL, 0,
1047         "CertificatePair/issuedByThisCA", HFILL }},
1048     { &hf_x509af_issuedToThisCA,
1049       { "issuedToThisCA", "x509af.issuedToThisCA",
1050         FT_NONE, BASE_NONE, NULL, 0,
1051         "CertificatePair/issuedToThisCA", HFILL }},
1052     { &hf_x509af_signedCertificateList,
1053       { "signedCertificateList", "x509af.signedCertificateList",
1054         FT_NONE, BASE_NONE, NULL, 0,
1055         "CertificateList/signedCertificateList", HFILL }},
1056     { &hf_x509af_thisUpdate,
1057       { "thisUpdate", "x509af.thisUpdate",
1058         FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
1059         "CertificateList/signedCertificateList/thisUpdate", HFILL }},
1060     { &hf_x509af_nextUpdate,
1061       { "nextUpdate", "x509af.nextUpdate",
1062         FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
1063         "CertificateList/signedCertificateList/nextUpdate", HFILL }},
1064     { &hf_x509af_revokedCertificates,
1065       { "revokedCertificates", "x509af.revokedCertificates",
1066         FT_UINT32, BASE_DEC, NULL, 0,
1067         "CertificateList/signedCertificateList/revokedCertificates", HFILL }},
1068     { &hf_x509af_revokedCertificates_item,
1069       { "Item[##]", "x509af.revokedCertificates_item",
1070         FT_NONE, BASE_NONE, NULL, 0,
1071         "CertificateList/signedCertificateList/revokedCertificates/_item", HFILL }},
1072     { &hf_x509af_userCertificate1,
1073       { "userCertificate", "x509af.userCertificate",
1074         FT_INT32, BASE_DEC, NULL, 0,
1075         "CertificateList/signedCertificateList/revokedCertificates/_item/userCertificate", HFILL }},
1076     { &hf_x509af_revocationDate,
1077       { "revocationDate", "x509af.revocationDate",
1078         FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
1079         "CertificateList/signedCertificateList/revokedCertificates/_item/revocationDate", HFILL }},
1080     { &hf_x509af_crlEntryExtensions,
1081       { "crlEntryExtensions", "x509af.crlEntryExtensions",
1082         FT_UINT32, BASE_DEC, NULL, 0,
1083         "CertificateList/signedCertificateList/revokedCertificates/_item/crlEntryExtensions", HFILL }},
1084     { &hf_x509af_crlExtensions,
1085       { "crlExtensions", "x509af.crlExtensions",
1086         FT_UINT32, BASE_DEC, NULL, 0,
1087         "CertificateList/signedCertificateList/crlExtensions", HFILL }},
1088     { &hf_x509af_attributeCertificate,
1089       { "attributeCertificate", "x509af.attributeCertificate",
1090         FT_NONE, BASE_NONE, NULL, 0,
1091         "", HFILL }},
1092     { &hf_x509af_acPath,
1093       { "acPath", "x509af.acPath",
1094         FT_UINT32, BASE_DEC, NULL, 0,
1095         "AttributeCertificationPath/acPath", HFILL }},
1096     { &hf_x509af_acPath_item,
1097       { "Item[##]", "x509af.acPath_item",
1098         FT_NONE, BASE_NONE, NULL, 0,
1099         "AttributeCertificationPath/acPath/_item", HFILL }},
1100     { &hf_x509af_certificate,
1101       { "certificate", "x509af.certificate",
1102         FT_NONE, BASE_NONE, NULL, 0,
1103         "ACPathData/certificate", HFILL }},
1104     { &hf_x509af_signedAttributeCertificateInfo,
1105       { "signedAttributeCertificateInfo", "x509af.signedAttributeCertificateInfo",
1106         FT_NONE, BASE_NONE, NULL, 0,
1107         "AttributeCertificate/signedAttributeCertificateInfo", HFILL }},
1108     { &hf_x509af_info_subject,
1109       { "subject", "x509af.subject",
1110         FT_UINT32, BASE_DEC, VALS(InfoSubject_vals), 0,
1111         "AttributeCertificateInfo/subject", HFILL }},
1112     { &hf_x509af_baseCertificateID,
1113       { "baseCertificateID", "x509af.baseCertificateID",
1114         FT_NONE, BASE_NONE, NULL, 0,
1115         "", HFILL }},
1116     { &hf_x509af_infoSubjectName,
1117       { "subjectName", "x509af.subjectName",
1118         FT_NONE, BASE_NONE, NULL, 0,
1119         "AttributeCertificateInfo/subject/subjectName", HFILL }},
1120     { &hf_x509af_issuer1,
1121       { "issuer", "x509af.issuer",
1122         FT_NONE, BASE_NONE, NULL, 0,
1123         "", HFILL }},
1124     { &hf_x509af_attCertValidityPeriod,
1125       { "attCertValidityPeriod", "x509af.attCertValidityPeriod",
1126         FT_NONE, BASE_NONE, NULL, 0,
1127         "AttributeCertificateInfo/attCertValidityPeriod", HFILL }},
1128     { &hf_x509af_attributes,
1129       { "attributes", "x509af.attributes",
1130         FT_UINT32, BASE_DEC, NULL, 0,
1131         "AttributeCertificateInfo/attributes", HFILL }},
1132     { &hf_x509af_attributes_item,
1133       { "Item[##]", "x509af.attributes_item",
1134         FT_NONE, BASE_NONE, NULL, 0,
1135         "AttributeCertificateInfo/attributes/_item", HFILL }},
1136     { &hf_x509af_issuerUniqueID,
1137       { "issuerUniqueID", "x509af.issuerUniqueID",
1138         FT_NONE, BASE_NONE, NULL, 0,
1139         "AttributeCertificateInfo/issuerUniqueID", HFILL }},
1140     { &hf_x509af_serial,
1141       { "serial", "x509af.serial",
1142         FT_INT32, BASE_DEC, NULL, 0,
1143         "IssuerSerial/serial", HFILL }},
1144     { &hf_x509af_issuerUID,
1145       { "issuerUID", "x509af.issuerUID",
1146         FT_NONE, BASE_NONE, NULL, 0,
1147         "IssuerSerial/issuerUID", HFILL }},
1148     { &hf_x509af_notBeforeTime,
1149       { "notBeforeTime", "x509af.notBeforeTime",
1150         FT_STRING, BASE_NONE, NULL, 0,
1151         "AttCertValidityPeriod/notBeforeTime", HFILL }},
1152     { &hf_x509af_notAfterTime,
1153       { "notAfterTime", "x509af.notAfterTime",
1154         FT_STRING, BASE_NONE, NULL, 0,
1155         "AttCertValidityPeriod/notAfterTime", HFILL }},
1156     { &hf_x509af_assertion_subject,
1157       { "subject", "x509af.subject",
1158         FT_UINT32, BASE_DEC, VALS(AssertionSubject_vals), 0,
1159         "AttributeCertificateAssertion/subject", HFILL }},
1160     { &hf_x509af_assertionSubjectName,
1161       { "subjectName", "x509af.subjectName",
1162         FT_NONE, BASE_NONE, NULL, 0,
1163         "AttributeCertificateAssertion/subject/subjectName", HFILL }},
1164     { &hf_x509af_assertionIssuer,
1165       { "issuer", "x509af.issuer",
1166         FT_NONE, BASE_NONE, NULL, 0,
1167         "AttributeCertificateAssertion/issuer", HFILL }},
1168     { &hf_x509af_attCertValidity,
1169       { "attCertValidity", "x509af.attCertValidity",
1170         FT_STRING, BASE_NONE, NULL, 0,
1171         "AttributeCertificateAssertion/attCertValidity", HFILL }},
1172     { &hf_x509af_attType,
1173       { "attType", "x509af.attType",
1174         FT_UINT32, BASE_DEC, NULL, 0,
1175         "AttributeCertificateAssertion/attType", HFILL }},
1176     { &hf_x509af_attType_item,
1177       { "Item(##)", "x509af.attType_item",
1178         FT_NONE, BASE_NONE, NULL, 0,
1179         "AttributeCertificateAssertion/attType/_item", HFILL }},
1180
1181 /*--- End of included file: packet-x509af-hfarr.c ---*/
1182
1183   };
1184
1185   /* List of subtrees */
1186   static gint *ett[] = {
1187
1188 /*--- Included file: packet-x509af-ettarr.c ---*/
1189
1190 /* Do not modify this file.                                                   */
1191 /* It is created automatically by the ASN.1 to Ethereal dissector compiler    */
1192 /* packet-x509af-ettarr.c                                                     */
1193 /* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
1194
1195     &ett_x509af_Certificate,
1196     &ett_x509af_T_signedCertificate,
1197     &ett_x509af_AlgorithmIdentifier,
1198     &ett_x509af_Validity,
1199     &ett_x509af_SubjectPublicKeyInfo,
1200     &ett_x509af_Time,
1201     &ett_x509af_Extensions,
1202     &ett_x509af_Extension,
1203     &ett_x509af_Certificates,
1204     &ett_x509af_ForwardCertificationPath,
1205     &ett_x509af_CrossCertificates,
1206     &ett_x509af_CertificationPath,
1207     &ett_x509af_SEQUNCE_OF_CertificatePair,
1208     &ett_x509af_CertificatePair,
1209     &ett_x509af_CertificateList,
1210     &ett_x509af_T_signedCertificateList,
1211     &ett_x509af_T_revokedCertificates,
1212     &ett_x509af_T_revokedCertificates_item,
1213     &ett_x509af_AttributeCertificationPath,
1214     &ett_x509af_SEQUNCE_OF_ACPathData,
1215     &ett_x509af_ACPathData,
1216     &ett_x509af_AttributeCertificate,
1217     &ett_x509af_AttributeCertificateInfo,
1218     &ett_x509af_InfoSubject,
1219     &ett_x509af_SEQUNCE_OF_Attribute,
1220     &ett_x509af_IssuerSerial,
1221     &ett_x509af_AttCertValidityPeriod,
1222     &ett_x509af_AttributeCertificateAssertion,
1223     &ett_x509af_AssertionSubject,
1224     &ett_x509af_SET_OF_AttributeType,
1225
1226 /*--- End of included file: packet-x509af-ettarr.c ---*/
1227
1228   };
1229
1230   /* Register protocol */
1231   proto_x509af = proto_register_protocol(PNAME, PSNAME, PFNAME);
1232
1233   /* Register fields and subtrees */
1234   proto_register_field_array(proto_x509af, hf, array_length(hf));
1235   proto_register_subtree_array(ett, array_length(ett));
1236
1237 }
1238
1239
1240 /*--- proto_reg_handoff_x509af -------------------------------------------*/
1241 void proto_reg_handoff_x509af(void) {
1242 }
1243