/* Do not modify this file. */
/* It is created automatically by the ASN.1 to Wireshark dissector compiler */
-/* .\packet-pkinit.c */
+/* ./packet-pkinit.c */
/* ../../tools/asn2wrs.py -e -b -p pkinit -c pkinit.cnf -s packet-pkinit-template PKINIT.asn */
/* Input file: packet-pkinit-template.c */
#line 1 "packet-pkinit-fn.c"
/*--- Fields for imported types ---*/
-static int dissect_signedAuthPack(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_signedAuthPack(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_cms_ContentInfo(FALSE, tvb, offset, pinfo, tree, hf_pkinit_signedAuthPack);
}
-static int dissect_kdcCert(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_kdcCert(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_cms_IssuerAndSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_pkinit_kdcCert);
}
-static int dissect_caName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_caName(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkix1explicit_Name(FALSE, tvb, offset, pinfo, tree, hf_pkinit_caName);
}
-static int dissect_issuerAndSerial(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_issuerAndSerial(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_cms_IssuerAndSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_pkinit_issuerAndSerial);
}
-static int dissect_clientPublicValue(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_clientPublicValue(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkix1explicit_SubjectPublicKeyInfo(FALSE, tvb, offset, pinfo, tree, hf_pkinit_clientPublicValue);
}
-static int dissect_supportedCMSTypes_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_supportedCMSTypes_item(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkix1explicit_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_pkinit_supportedCMSTypes_item);
}
-static int dissect_ctime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_ctime(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_KerberosV5Spec2_KerberosTime(FALSE, tvb, offset, pinfo, tree, hf_pkinit_ctime);
}
-static int dissect_paChecksum(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_paChecksum(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_KerberosV5Spec2_Checksum(FALSE, tvb, offset, pinfo, tree, hf_pkinit_paChecksum);
}
-static int dissect_dhSignedData(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_dhSignedData(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_cms_ContentInfo(FALSE, tvb, offset, pinfo, tree, hf_pkinit_dhSignedData);
}
-static int dissect_encKeyPack(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_encKeyPack(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_cms_ContentInfo(FALSE, tvb, offset, pinfo, tree, hf_pkinit_encKeyPack);
}
-static int dissect_dhKeyExpiration(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_dhKeyExpiration(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_KerberosV5Spec2_KerberosTime(FALSE, tvb, offset, pinfo, tree, hf_pkinit_dhKeyExpiration);
}
};
static int
-dissect_pkinit_TrustedCA(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_TrustedCA(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_choice(pinfo, tree, tvb, offset,
TrustedCA_choice, hf_index, ett_pkinit_TrustedCA,
NULL);
return offset;
}
-static int dissect_trustedCertifiers_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_trustedCertifiers_item(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_TrustedCA(FALSE, tvb, offset, pinfo, tree, hf_pkinit_trustedCertifiers_item);
}
};
static int
-dissect_pkinit_SEQUENCE_OF_TrustedCA(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_SEQUENCE_OF_TrustedCA(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
SEQUENCE_OF_TrustedCA_sequence_of, hf_index, ett_pkinit_SEQUENCE_OF_TrustedCA);
return offset;
}
-static int dissect_trustedCertifiers(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_trustedCertifiers(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_SEQUENCE_OF_TrustedCA(FALSE, tvb, offset, pinfo, tree, hf_pkinit_trustedCertifiers);
}
};
static int
-dissect_pkinit_PaPkAsReq(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_PaPkAsReq(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
PaPkAsReq_sequence, hf_index, ett_pkinit_PaPkAsReq);
static int
-dissect_pkinit_INTEGER(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_INTEGER(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_integer(implicit_tag, pinfo, tree, tvb, offset, hf_index,
NULL);
return offset;
}
-static int dissect_cusec(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_cusec(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_INTEGER(FALSE, tvb, offset, pinfo, tree, hf_pkinit_cusec);
}
-static int dissect_dhNonce(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_dhNonce(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_INTEGER(FALSE, tvb, offset, pinfo, tree, hf_pkinit_dhNonce);
}
static int
-dissect_pkinit_INTEGER_0_4294967295(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_INTEGER_0_4294967295(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_integer(implicit_tag, pinfo, tree, tvb, offset, hf_index,
NULL);
return offset;
}
-static int dissect_paNonce(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_paNonce(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_INTEGER_0_4294967295(FALSE, tvb, offset, pinfo, tree, hf_pkinit_paNonce);
}
};
static int
-dissect_pkinit_PKAuthenticator(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_PKAuthenticator(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
PKAuthenticator_sequence, hf_index, ett_pkinit_PKAuthenticator);
return offset;
}
-static int dissect_pkAuthenticator(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_pkAuthenticator(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_PKAuthenticator(FALSE, tvb, offset, pinfo, tree, hf_pkinit_pkAuthenticator);
}
};
static int
-dissect_pkinit_SEQUENCE_OF_AlgorithmIdentifier(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_SEQUENCE_OF_AlgorithmIdentifier(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
SEQUENCE_OF_AlgorithmIdentifier_sequence_of, hf_index, ett_pkinit_SEQUENCE_OF_AlgorithmIdentifier);
return offset;
}
-static int dissect_supportedCMSTypes(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_supportedCMSTypes(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_SEQUENCE_OF_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_pkinit_supportedCMSTypes);
}
};
static int
-dissect_pkinit_AuthPack(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_AuthPack(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
AuthPack_sequence, hf_index, ett_pkinit_AuthPack);
};
static int
-dissect_pkinit_PaPkAsRep(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_PaPkAsRep(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_choice(pinfo, tree, tvb, offset,
PaPkAsRep_choice, hf_index, ett_pkinit_PaPkAsRep,
NULL);
static int
-dissect_pkinit_BIT_STRING(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_BIT_STRING(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_bitstring(implicit_tag, pinfo, tree, tvb, offset,
NULL, hf_index, -1,
NULL);
return offset;
}
-static int dissect_subjectPublicKey(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+static int dissect_subjectPublicKey(packet_info *pinfo _U_, proto_tree *tree _U_, tvbuff_t *tvb _U_, int offset _U_) {
return dissect_pkinit_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_pkinit_subjectPublicKey);
}
};
static int
-dissect_pkinit_KDCDHKeyInfo(gboolean implicit_tag _U_, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index _U_) {
+dissect_pkinit_KDCDHKeyInfo(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
KDCDHKeyInfo_sequence, hf_index, ett_pkinit_KDCDHKeyInfo);
/*--- PDUs ---*/
-static void dissect_AuthPack_PDU(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) {
+static void dissect_AuthPack_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
dissect_pkinit_AuthPack(FALSE, tvb, 0, pinfo, tree, hf_pkinit_AuthPack_PDU);
}
-static void dissect_KDCDHKeyInfo_PDU(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) {
+static void dissect_KDCDHKeyInfo_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_) {
dissect_pkinit_KDCDHKeyInfo(FALSE, tvb, 0, pinfo, tree, hf_pkinit_KDCDHKeyInfo_PDU);
}
{ &hf_pkinit_AuthPack_PDU,
{ "AuthPack", "pkinit.AuthPack",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack", HFILL }},
+ "pkinit.AuthPack", HFILL }},
{ &hf_pkinit_KDCDHKeyInfo_PDU,
{ "KDCDHKeyInfo", "pkinit.KDCDHKeyInfo",
FT_NONE, BASE_NONE, NULL, 0,
- "KDCDHKeyInfo", HFILL }},
+ "pkinit.KDCDHKeyInfo", HFILL }},
{ &hf_pkinit_signedAuthPack,
{ "signedAuthPack", "pkinit.signedAuthPack",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsReq/signedAuthPack", HFILL }},
+ "cms.ContentInfo", HFILL }},
{ &hf_pkinit_trustedCertifiers,
{ "trustedCertifiers", "pkinit.trustedCertifiers",
FT_UINT32, BASE_DEC, NULL, 0,
- "PaPkAsReq/trustedCertifiers", HFILL }},
+ "pkinit.SEQUENCE_OF_TrustedCA", HFILL }},
{ &hf_pkinit_trustedCertifiers_item,
{ "Item", "pkinit.trustedCertifiers_item",
FT_UINT32, BASE_DEC, VALS(pkinit_TrustedCA_vals), 0,
- "PaPkAsReq/trustedCertifiers/_item", HFILL }},
+ "pkinit.TrustedCA", HFILL }},
{ &hf_pkinit_kdcCert,
{ "kdcCert", "pkinit.kdcCert",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsReq/kdcCert", HFILL }},
+ "cms.IssuerAndSerialNumber", HFILL }},
{ &hf_pkinit_caName,
{ "caName", "pkinit.caName",
FT_UINT32, BASE_DEC, NULL, 0,
- "TrustedCA/caName", HFILL }},
+ "pkix1explicit.Name", HFILL }},
{ &hf_pkinit_issuerAndSerial,
{ "issuerAndSerial", "pkinit.issuerAndSerial",
FT_NONE, BASE_NONE, NULL, 0,
- "TrustedCA/issuerAndSerial", HFILL }},
+ "cms.IssuerAndSerialNumber", HFILL }},
{ &hf_pkinit_pkAuthenticator,
{ "pkAuthenticator", "pkinit.pkAuthenticator",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack/pkAuthenticator", HFILL }},
+ "pkinit.PKAuthenticator", HFILL }},
{ &hf_pkinit_clientPublicValue,
{ "clientPublicValue", "pkinit.clientPublicValue",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack/clientPublicValue", HFILL }},
+ "pkix1explicit.SubjectPublicKeyInfo", HFILL }},
{ &hf_pkinit_supportedCMSTypes,
{ "supportedCMSTypes", "pkinit.supportedCMSTypes",
FT_UINT32, BASE_DEC, NULL, 0,
- "AuthPack/supportedCMSTypes", HFILL }},
+ "pkinit.SEQUENCE_OF_AlgorithmIdentifier", HFILL }},
{ &hf_pkinit_supportedCMSTypes_item,
{ "Item", "pkinit.supportedCMSTypes_item",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack/supportedCMSTypes/_item", HFILL }},
+ "pkix1explicit.AlgorithmIdentifier", HFILL }},
{ &hf_pkinit_cusec,
{ "cusec", "pkinit.cusec",
FT_INT32, BASE_DEC, NULL, 0,
- "PKAuthenticator/cusec", HFILL }},
+ "pkinit.INTEGER", HFILL }},
{ &hf_pkinit_ctime,
{ "ctime", "pkinit.ctime",
FT_NONE, BASE_NONE, NULL, 0,
- "PKAuthenticator/ctime", HFILL }},
+ "KerberosV5Spec2.KerberosTime", HFILL }},
{ &hf_pkinit_paNonce,
{ "nonce", "pkinit.nonce",
FT_UINT32, BASE_DEC, NULL, 0,
- "PKAuthenticator/nonce", HFILL }},
+ "pkinit.INTEGER_0_4294967295", HFILL }},
{ &hf_pkinit_paChecksum,
{ "paChecksum", "pkinit.paChecksum",
FT_NONE, BASE_NONE, NULL, 0,
- "PKAuthenticator/paChecksum", HFILL }},
+ "KerberosV5Spec2.Checksum", HFILL }},
{ &hf_pkinit_dhSignedData,
{ "dhSignedData", "pkinit.dhSignedData",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsRep/dhSignedData", HFILL }},
+ "cms.ContentInfo", HFILL }},
{ &hf_pkinit_encKeyPack,
{ "encKeyPack", "pkinit.encKeyPack",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsRep/encKeyPack", HFILL }},
+ "cms.ContentInfo", HFILL }},
{ &hf_pkinit_subjectPublicKey,
{ "subjectPublicKey", "pkinit.subjectPublicKey",
FT_BYTES, BASE_HEX, NULL, 0,
- "KDCDHKeyInfo/subjectPublicKey", HFILL }},
+ "pkinit.BIT_STRING", HFILL }},
{ &hf_pkinit_dhNonce,
{ "nonce", "pkinit.nonce",
FT_INT32, BASE_DEC, NULL, 0,
- "KDCDHKeyInfo/nonce", HFILL }},
+ "pkinit.INTEGER", HFILL }},
{ &hf_pkinit_dhKeyExpiration,
{ "dhKeyExpiration", "pkinit.dhKeyExpiration",
FT_NONE, BASE_NONE, NULL, 0,
- "KDCDHKeyInfo/dhKeyExpiration", HFILL }},
+ "KerberosV5Spec2.KerberosTime", HFILL }},
/*--- End of included file: packet-pkinit-hfarr.c ---*/
#line 90 "packet-pkinit-template.c"