summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-h235.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-h235.c
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-h235.c')
-rw-r--r--epan/dissectors/packet-h235.c1523
1 files changed, 1523 insertions, 0 deletions
diff --git a/epan/dissectors/packet-h235.c b/epan/dissectors/packet-h235.c
new file mode 100644
index 00000000..f7bfe171
--- /dev/null
+++ b/epan/dissectors/packet-h235.c
@@ -0,0 +1,1523 @@
+/* Do not modify this file. Changes will be overwritten. */
+/* Generated automatically by the ASN.1 to Wireshark dissector compiler */
+/* packet-h235.c */
+/* asn2wrs.py -L -p h235 -c ./h235.cnf -s ./packet-h235-template -D . -O ../.. H235-SECURITY-MESSAGES.asn H235-SRTP.asn */
+
+/* packet-h235.c
+ * Routines for H.235 packet dissection
+ * 2004 Tomas Kukosa
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "config.h"
+
+#include <epan/packet.h>
+#include <epan/oids.h>
+#include <epan/asn1.h>
+
+#include "packet-per.h"
+#include "packet-h235.h"
+#include "packet-h225.h"
+
+#define PNAME "H235-SECURITY-MESSAGES"
+#define PSNAME "H.235"
+#define PFNAME "h235"
+
+#define OID_MIKEY "0.0.8.235.0.3.76"
+#define OID_MIKEY_PS "0.0.8.235.0.3.72"
+#define OID_MIKEY_DHHMAC "0.0.8.235.0.3.73"
+#define OID_MIKEY_PK_SIGN "0.0.8.235.0.3.74"
+#define OID_MIKEY_DH_SIGN "0.0.8.235.0.3.75"
+#define OID_TG "0.0.8.235.0.3.70"
+#define OID_SG "0.0.8.235.0.3.71"
+
+void proto_register_h235(void);
+void proto_reg_handoff_h235(void);
+
+/* Initialize the protocol and registered fields */
+static int proto_h235 = -1;
+static int hf_h235_SrtpCryptoCapability_PDU = -1; /* SrtpCryptoCapability */
+static int hf_h235_nonStandardIdentifier = -1; /* OBJECT_IDENTIFIER */
+static int hf_h235_data = -1; /* OCTET_STRING */
+static int hf_h235_halfkey = -1; /* BIT_STRING_SIZE_0_2048 */
+static int hf_h235_modSize = -1; /* BIT_STRING_SIZE_0_2048 */
+static int hf_h235_generator = -1; /* BIT_STRING_SIZE_0_2048 */
+static int hf_h235_x = -1; /* BIT_STRING_SIZE_0_511 */
+static int hf_h235_y = -1; /* BIT_STRING_SIZE_0_511 */
+static int hf_h235_eckasdhp = -1; /* T_eckasdhp */
+static int hf_h235_public_key = -1; /* ECpoint */
+static int hf_h235_modulus = -1; /* BIT_STRING_SIZE_0_511 */
+static int hf_h235_base = -1; /* ECpoint */
+static int hf_h235_weierstrassA = -1; /* BIT_STRING_SIZE_0_511 */
+static int hf_h235_weierstrassB = -1; /* BIT_STRING_SIZE_0_511 */
+static int hf_h235_eckasdh2 = -1; /* T_eckasdh2 */
+static int hf_h235_fieldSize = -1; /* BIT_STRING_SIZE_0_511 */
+static int hf_h235_type = -1; /* OBJECT_IDENTIFIER */
+static int hf_h235_certificatedata = -1; /* OCTET_STRING */
+static int hf_h235_default = -1; /* NULL */
+static int hf_h235_radius = -1; /* NULL */
+static int hf_h235_dhExch = -1; /* NULL */
+static int hf_h235_pwdSymEnc = -1; /* NULL */
+static int hf_h235_pwdHash = -1; /* NULL */
+static int hf_h235_certSign = -1; /* NULL */
+static int hf_h235_ipsec = -1; /* NULL */
+static int hf_h235_tls = -1; /* NULL */
+static int hf_h235_nonStandard = -1; /* NonStandardParameter */
+static int hf_h235_authenticationBES = -1; /* AuthenticationBES */
+static int hf_h235_keyExch = -1; /* OBJECT_IDENTIFIER */
+static int hf_h235_tokenOID = -1; /* OBJECT_IDENTIFIER */
+static int hf_h235_timeStamp = -1; /* TimeStamp */
+static int hf_h235_password = -1; /* Password */
+static int hf_h235_dhkey = -1; /* DHset */
+static int hf_h235_challenge = -1; /* ChallengeString */
+static int hf_h235_random = -1; /* RandomVal */
+static int hf_h235_certificate = -1; /* TypedCertificate */
+static int hf_h235_generalID = -1; /* Identifier */
+static int hf_h235_eckasdhkey = -1; /* ECKASDH */
+static int hf_h235_sendersID = -1; /* Identifier */
+static int hf_h235_h235Key = -1; /* H235Key */
+static int hf_h235_profileInfo = -1; /* SEQUENCE_OF_ProfileElement */
+static int hf_h235_profileInfo_item = -1; /* ProfileElement */
+static int hf_h235_elementID = -1; /* INTEGER_0_255 */
+static int hf_h235_paramS = -1; /* Params */
+static int hf_h235_element = -1; /* Element */
+static int hf_h235_octets = -1; /* OCTET_STRING */
+static int hf_h235_integer = -1; /* INTEGER */
+static int hf_h235_bits = -1; /* BIT_STRING */
+static int hf_h235_name = -1; /* BMPString */
+static int hf_h235_flag = -1; /* BOOLEAN */
+static int hf_h235_toBeSigned = -1; /* ToBeSigned */
+static int hf_h235_algorithmOID = -1; /* OBJECT_IDENTIFIER */
+static int hf_h235_signaturedata = -1; /* BIT_STRING */
+static int hf_h235_encryptedData = -1; /* OCTET_STRING */
+static int hf_h235_hash = -1; /* BIT_STRING */
+static int hf_h235_ranInt = -1; /* INTEGER */
+static int hf_h235_iv8 = -1; /* IV8 */
+static int hf_h235_iv16 = -1; /* IV16 */
+static int hf_h235_iv = -1; /* OCTET_STRING */
+static int hf_h235_clearSalt = -1; /* OCTET_STRING */
+static int hf_h235_cryptoEncryptedToken = -1; /* T_cryptoEncryptedToken */
+static int hf_h235_encryptedToken = -1; /* ENCRYPTED */
+static int hf_h235_cryptoSignedToken = -1; /* T_cryptoSignedToken */
+static int hf_h235_signedToken = -1; /* SIGNED */
+static int hf_h235_cryptoHashedToken = -1; /* T_cryptoHashedToken */
+static int hf_h235_hashedVals = -1; /* ClearToken */
+static int hf_h235_hashedToken = -1; /* HASHED */
+static int hf_h235_cryptoPwdEncr = -1; /* ENCRYPTED */
+static int hf_h235_secureChannel = -1; /* KeyMaterial */
+static int hf_h235_sharedSecret = -1; /* ENCRYPTED */
+static int hf_h235_certProtectedKey = -1; /* SIGNED */
+static int hf_h235_secureSharedSecret = -1; /* V3KeySyncMaterial */
+static int hf_h235_encryptedSessionKey = -1; /* OCTET_STRING */
+static int hf_h235_encryptedSaltingKey = -1; /* OCTET_STRING */
+static int hf_h235_clearSaltingKey = -1; /* OCTET_STRING */
+static int hf_h235_paramSsalt = -1; /* Params */
+static int hf_h235_keyDerivationOID = -1; /* OBJECT_IDENTIFIER */
+static int hf_h235_genericKeyMaterial = -1; /* OCTET_STRING */
+static int hf_h235_SrtpCryptoCapability_item = -1; /* SrtpCryptoInfo */
+static int hf_h235_cryptoSuite = -1; /* OBJECT_IDENTIFIER */
+static int hf_h235_sessionParams = -1; /* SrtpSessionParameters */
+static int hf_h235_allowMKI = -1; /* BOOLEAN */
+static int hf_h235_SrtpKeys_item = -1; /* SrtpKeyParameters */
+static int hf_h235_masterKey = -1; /* OCTET_STRING */
+static int hf_h235_masterSalt = -1; /* OCTET_STRING */
+static int hf_h235_lifetime = -1; /* T_lifetime */
+static int hf_h235_powerOfTwo = -1; /* INTEGER */
+static int hf_h235_specific = -1; /* INTEGER */
+static int hf_h235_mki = -1; /* T_mki */
+static int hf_h235_length = -1; /* INTEGER_1_128 */
+static int hf_h235_value = -1; /* OCTET_STRING */
+static int hf_h235_kdr = -1; /* INTEGER_0_24 */
+static int hf_h235_unencryptedSrtp = -1; /* BOOLEAN */
+static int hf_h235_unencryptedSrtcp = -1; /* BOOLEAN */
+static int hf_h235_unauthenticatedSrtp = -1; /* BOOLEAN */
+static int hf_h235_fecOrder = -1; /* FecOrder */
+static int hf_h235_windowSizeHint = -1; /* INTEGER_64_65535 */
+static int hf_h235_newParameter = -1; /* SEQUENCE_OF_GenericData */
+static int hf_h235_newParameter_item = -1; /* GenericData */
+static int hf_h235_fecBeforeSrtp = -1; /* NULL */
+static int hf_h235_fecAfterSrtp = -1; /* NULL */
+
+/* Initialize the subtree pointers */
+static gint ett_h235_NonStandardParameter = -1;
+static gint ett_h235_DHset = -1;
+static gint ett_h235_ECpoint = -1;
+static gint ett_h235_ECKASDH = -1;
+static gint ett_h235_T_eckasdhp = -1;
+static gint ett_h235_T_eckasdh2 = -1;
+static gint ett_h235_TypedCertificate = -1;
+static gint ett_h235_AuthenticationBES = -1;
+static gint ett_h235_AuthenticationMechanism = -1;
+static gint ett_h235_ClearToken = -1;
+static gint ett_h235_SEQUENCE_OF_ProfileElement = -1;
+static gint ett_h235_ProfileElement = -1;
+static gint ett_h235_Element = -1;
+static gint ett_h235_SIGNED = -1;
+static gint ett_h235_ENCRYPTED = -1;
+static gint ett_h235_HASHED = -1;
+static gint ett_h235_Params = -1;
+static gint ett_h235_CryptoToken = -1;
+static gint ett_h235_T_cryptoEncryptedToken = -1;
+static gint ett_h235_T_cryptoSignedToken = -1;
+static gint ett_h235_T_cryptoHashedToken = -1;
+static gint ett_h235_H235Key = -1;
+static gint ett_h235_V3KeySyncMaterial = -1;
+static gint ett_h235_SrtpCryptoCapability = -1;
+static gint ett_h235_SrtpCryptoInfo = -1;
+static gint ett_h235_SrtpKeys = -1;
+static gint ett_h235_SrtpKeyParameters = -1;
+static gint ett_h235_T_lifetime = -1;
+static gint ett_h235_T_mki = -1;
+static gint ett_h235_SrtpSessionParameters = -1;
+static gint ett_h235_SEQUENCE_OF_GenericData = -1;
+static gint ett_h235_FecOrder = -1;
+
+
+static int
+dissect_xxx_ToBeSigned(tvbuff_t *tvb, int offset, asn1_ctx_t *actx, proto_tree *tree, int hf_index _U_) {
+ dissect_per_not_decoded_yet(tree, actx->pinfo, tvb, "ToBeSigned");
+ return offset;
+}
+
+
+
+static int
+dissect_h235_ChallengeString(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
+ 8, 128, FALSE, NULL);
+
+ return offset;
+}
+
+
+
+int
+dissect_h235_TimeStamp(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
+ 1U, 4294967295U, NULL, FALSE);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_RandomVal(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_integer(tvb, offset, actx, tree, hf_index, NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_Password(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_BMPString(tvb, offset, actx, tree, hf_index,
+ 1, 128, FALSE);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_Identifier(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_BMPString(tvb, offset, actx, tree, hf_index,
+ 1, 128, FALSE);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_KeyMaterial(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
+ 1, 2048, FALSE, NULL, 0, NULL, NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_OBJECT_IDENTIFIER(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_object_identifier(tvb, offset, actx, tree, hf_index, NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_OCTET_STRING(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
+ NO_BOUND, NO_BOUND, FALSE, NULL);
+
+ return offset;
+}
+
+
+static const per_sequence_t NonStandardParameter_sequence[] = {
+ { &hf_h235_nonStandardIdentifier, ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_data , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OCTET_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_NonStandardParameter(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_NonStandardParameter, NonStandardParameter_sequence);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_BIT_STRING_SIZE_0_2048(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
+ 0, 2048, FALSE, NULL, 0, NULL, NULL);
+
+ return offset;
+}
+
+
+static const per_sequence_t DHset_sequence[] = {
+ { &hf_h235_halfkey , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_2048 },
+ { &hf_h235_modSize , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_2048 },
+ { &hf_h235_generator , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_2048 },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_DHset(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_DHset, DHset_sequence);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_BIT_STRING_SIZE_0_511(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
+ 0, 511, FALSE, NULL, 0, NULL, NULL);
+
+ return offset;
+}
+
+
+static const per_sequence_t ECpoint_sequence[] = {
+ { &hf_h235_x , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_BIT_STRING_SIZE_0_511 },
+ { &hf_h235_y , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_BIT_STRING_SIZE_0_511 },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_ECpoint(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_ECpoint, ECpoint_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t T_eckasdhp_sequence[] = {
+ { &hf_h235_public_key , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_ECpoint },
+ { &hf_h235_modulus , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_511 },
+ { &hf_h235_base , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_ECpoint },
+ { &hf_h235_weierstrassA , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_511 },
+ { &hf_h235_weierstrassB , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_511 },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_T_eckasdhp(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_T_eckasdhp, T_eckasdhp_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t T_eckasdh2_sequence[] = {
+ { &hf_h235_public_key , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_ECpoint },
+ { &hf_h235_fieldSize , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_511 },
+ { &hf_h235_base , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_ECpoint },
+ { &hf_h235_weierstrassA , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_511 },
+ { &hf_h235_weierstrassB , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING_SIZE_0_511 },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_T_eckasdh2(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_T_eckasdh2, T_eckasdh2_sequence);
+
+ return offset;
+}
+
+
+static const value_string h235_ECKASDH_vals[] = {
+ { 0, "eckasdhp" },
+ { 1, "eckasdh2" },
+ { 0, NULL }
+};
+
+static const per_choice_t ECKASDH_choice[] = {
+ { 0, &hf_h235_eckasdhp , ASN1_EXTENSION_ROOT , dissect_h235_T_eckasdhp },
+ { 1, &hf_h235_eckasdh2 , ASN1_EXTENSION_ROOT , dissect_h235_T_eckasdh2 },
+ { 0, NULL, 0, NULL }
+};
+
+static int
+dissect_h235_ECKASDH(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
+ ett_h235_ECKASDH, ECKASDH_choice,
+ NULL);
+
+ return offset;
+}
+
+
+static const per_sequence_t TypedCertificate_sequence[] = {
+ { &hf_h235_type , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_certificatedata, ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_OCTET_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_TypedCertificate(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_TypedCertificate, TypedCertificate_sequence);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_NULL(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_null(tvb, offset, actx, tree, hf_index);
+
+ return offset;
+}
+
+
+static const value_string h235_AuthenticationBES_vals[] = {
+ { 0, "default" },
+ { 1, "radius" },
+ { 0, NULL }
+};
+
+static const per_choice_t AuthenticationBES_choice[] = {
+ { 0, &hf_h235_default , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 1, &hf_h235_radius , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 0, NULL, 0, NULL }
+};
+
+static int
+dissect_h235_AuthenticationBES(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
+ ett_h235_AuthenticationBES, AuthenticationBES_choice,
+ NULL);
+
+ return offset;
+}
+
+
+const value_string h235_AuthenticationMechanism_vals[] = {
+ { 0, "dhExch" },
+ { 1, "pwdSymEnc" },
+ { 2, "pwdHash" },
+ { 3, "certSign" },
+ { 4, "ipsec" },
+ { 5, "tls" },
+ { 6, "nonStandard" },
+ { 7, "authenticationBES" },
+ { 8, "keyExch" },
+ { 0, NULL }
+};
+
+static const per_choice_t AuthenticationMechanism_choice[] = {
+ { 0, &hf_h235_dhExch , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 1, &hf_h235_pwdSymEnc , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 2, &hf_h235_pwdHash , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 3, &hf_h235_certSign , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 4, &hf_h235_ipsec , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 5, &hf_h235_tls , ASN1_EXTENSION_ROOT , dissect_h235_NULL },
+ { 6, &hf_h235_nonStandard , ASN1_EXTENSION_ROOT , dissect_h235_NonStandardParameter },
+ { 7, &hf_h235_authenticationBES, ASN1_NOT_EXTENSION_ROOT, dissect_h235_AuthenticationBES },
+ { 8, &hf_h235_keyExch , ASN1_NOT_EXTENSION_ROOT, dissect_h235_OBJECT_IDENTIFIER },
+ { 0, NULL, 0, NULL }
+};
+
+int
+dissect_h235_AuthenticationMechanism(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
+ ett_h235_AuthenticationMechanism, AuthenticationMechanism_choice,
+ NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_INTEGER(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_integer(tvb, offset, actx, tree, hf_index, NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_IV8(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
+ 8, 8, FALSE, NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_IV16(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_octet_string(tvb, offset, actx, tree, hf_index,
+ 16, 16, FALSE, NULL);
+
+ return offset;
+}
+
+
+static const per_sequence_t Params_sequence[] = {
+ { &hf_h235_ranInt , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_INTEGER },
+ { &hf_h235_iv8 , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_IV8 },
+ { &hf_h235_iv16 , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_IV16 },
+ { &hf_h235_iv , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_OCTET_STRING },
+ { &hf_h235_clearSalt , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_OCTET_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_Params(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_Params, Params_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t ENCRYPTED_sequence[] = {
+ { &hf_h235_algorithmOID , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_paramS , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_Params },
+ { &hf_h235_encryptedData , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OCTET_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+int
+dissect_h235_ENCRYPTED(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ proto_item *hidden_item;
+ hidden_item = proto_tree_add_item(tree, proto_h235, tvb, offset>>3, 0, ENC_NA);
+ proto_item_set_hidden(hidden_item);
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_ENCRYPTED, ENCRYPTED_sequence);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_BIT_STRING(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_bit_string(tvb, offset, actx, tree, hf_index,
+ NO_BOUND, NO_BOUND, FALSE, NULL, 0, NULL, NULL);
+
+ return offset;
+}
+
+
+static const per_sequence_t SIGNED_sequence[] = {
+ { &hf_h235_toBeSigned , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_xxx_ToBeSigned },
+ { &hf_h235_algorithmOID , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_paramS , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_Params },
+ { &hf_h235_signaturedata , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+int
+dissect_h235_SIGNED(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ proto_item *hidden_item;
+ hidden_item = proto_tree_add_item(tree, proto_h235, tvb, offset>>3, 0, ENC_NA);
+ proto_item_set_hidden(hidden_item);
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_SIGNED, SIGNED_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t V3KeySyncMaterial_sequence[] = {
+ { &hf_h235_generalID , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_Identifier },
+ { &hf_h235_algorithmOID , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_paramS , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_Params },
+ { &hf_h235_encryptedSessionKey, ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_OCTET_STRING },
+ { &hf_h235_encryptedSaltingKey, ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_OCTET_STRING },
+ { &hf_h235_clearSaltingKey, ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_OCTET_STRING },
+ { &hf_h235_paramSsalt , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_Params },
+ { &hf_h235_keyDerivationOID, ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_genericKeyMaterial, ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_OCTET_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_V3KeySyncMaterial(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_V3KeySyncMaterial, V3KeySyncMaterial_sequence);
+
+ return offset;
+}
+
+
+static const value_string h235_H235Key_vals[] = {
+ { 0, "secureChannel" },
+ { 1, "sharedSecret" },
+ { 2, "certProtectedKey" },
+ { 3, "secureSharedSecret" },
+ { 0, NULL }
+};
+
+static const per_choice_t H235Key_choice[] = {
+ { 0, &hf_h235_secureChannel , ASN1_EXTENSION_ROOT , dissect_h235_KeyMaterial },
+ { 1, &hf_h235_sharedSecret , ASN1_EXTENSION_ROOT , dissect_h235_ENCRYPTED },
+ { 2, &hf_h235_certProtectedKey, ASN1_EXTENSION_ROOT , dissect_h235_SIGNED },
+ { 3, &hf_h235_secureSharedSecret, ASN1_NOT_EXTENSION_ROOT, dissect_h235_V3KeySyncMaterial },
+ { 0, NULL, 0, NULL }
+};
+
+static int
+dissect_h235_H235Key(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
+ ett_h235_H235Key, H235Key_choice,
+ NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_INTEGER_0_255(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
+ 0U, 255U, NULL, FALSE);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_BMPString(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_BMPString(tvb, offset, actx, tree, hf_index,
+ NO_BOUND, NO_BOUND, FALSE);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_BOOLEAN(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_boolean(tvb, offset, actx, tree, hf_index, NULL);
+
+ return offset;
+}
+
+
+static const value_string h235_Element_vals[] = {
+ { 0, "octets" },
+ { 1, "integer" },
+ { 2, "bits" },
+ { 3, "name" },
+ { 4, "flag" },
+ { 0, NULL }
+};
+
+static const per_choice_t Element_choice[] = {
+ { 0, &hf_h235_octets , ASN1_EXTENSION_ROOT , dissect_h235_OCTET_STRING },
+ { 1, &hf_h235_integer , ASN1_EXTENSION_ROOT , dissect_h235_INTEGER },
+ { 2, &hf_h235_bits , ASN1_EXTENSION_ROOT , dissect_h235_BIT_STRING },
+ { 3, &hf_h235_name , ASN1_EXTENSION_ROOT , dissect_h235_BMPString },
+ { 4, &hf_h235_flag , ASN1_EXTENSION_ROOT , dissect_h235_BOOLEAN },
+ { 0, NULL, 0, NULL }
+};
+
+static int
+dissect_h235_Element(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
+ ett_h235_Element, Element_choice,
+ NULL);
+
+ return offset;
+}
+
+
+static const per_sequence_t ProfileElement_sequence[] = {
+ { &hf_h235_elementID , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_INTEGER_0_255 },
+ { &hf_h235_paramS , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_Params },
+ { &hf_h235_element , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_Element },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_ProfileElement(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_ProfileElement, ProfileElement_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t SEQUENCE_OF_ProfileElement_sequence_of[1] = {
+ { &hf_h235_profileInfo_item, ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_ProfileElement },
+};
+
+static int
+dissect_h235_SEQUENCE_OF_ProfileElement(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
+ ett_h235_SEQUENCE_OF_ProfileElement, SEQUENCE_OF_ProfileElement_sequence_of);
+
+ return offset;
+}
+
+
+static const per_sequence_t ClearToken_sequence[] = {
+ { &hf_h235_tokenOID , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_timeStamp , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_TimeStamp },
+ { &hf_h235_password , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_Password },
+ { &hf_h235_dhkey , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_DHset },
+ { &hf_h235_challenge , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_ChallengeString },
+ { &hf_h235_random , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_RandomVal },
+ { &hf_h235_certificate , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_TypedCertificate },
+ { &hf_h235_generalID , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_Identifier },
+ { &hf_h235_nonStandard , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_NonStandardParameter },
+ { &hf_h235_eckasdhkey , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_ECKASDH },
+ { &hf_h235_sendersID , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_Identifier },
+ { &hf_h235_h235Key , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_H235Key },
+ { &hf_h235_profileInfo , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235_SEQUENCE_OF_ProfileElement },
+ { NULL, 0, 0, NULL }
+};
+
+int
+dissect_h235_ClearToken(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ proto_item *hidden_item;
+ hidden_item = proto_tree_add_item(tree, proto_h235, tvb, offset>>3, 0, ENC_NA);
+ proto_item_set_hidden(hidden_item);
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_ClearToken, ClearToken_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t HASHED_sequence[] = {
+ { &hf_h235_algorithmOID , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_paramS , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_Params },
+ { &hf_h235_hash , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_BIT_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+int
+dissect_h235_HASHED(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ proto_item *hidden_item;
+ hidden_item = proto_tree_add_item(tree, proto_h235, tvb, offset>>3, 0, ENC_NA);
+ proto_item_set_hidden(hidden_item);
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_HASHED, HASHED_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t T_cryptoEncryptedToken_sequence[] = {
+ { &hf_h235_tokenOID , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_encryptedToken , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_ENCRYPTED },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_T_cryptoEncryptedToken(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_T_cryptoEncryptedToken, T_cryptoEncryptedToken_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t T_cryptoSignedToken_sequence[] = {
+ { &hf_h235_tokenOID , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_signedToken , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_SIGNED },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_T_cryptoSignedToken(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_T_cryptoSignedToken, T_cryptoSignedToken_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t T_cryptoHashedToken_sequence[] = {
+ { &hf_h235_tokenOID , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_hashedVals , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_ClearToken },
+ { &hf_h235_hashedToken , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_HASHED },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_T_cryptoHashedToken(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_T_cryptoHashedToken, T_cryptoHashedToken_sequence);
+
+ return offset;
+}
+
+
+const value_string h235_CryptoToken_vals[] = {
+ { 0, "cryptoEncryptedToken" },
+ { 1, "cryptoSignedToken" },
+ { 2, "cryptoHashedToken" },
+ { 3, "cryptoPwdEncr" },
+ { 0, NULL }
+};
+
+static const per_choice_t CryptoToken_choice[] = {
+ { 0, &hf_h235_cryptoEncryptedToken, ASN1_EXTENSION_ROOT , dissect_h235_T_cryptoEncryptedToken },
+ { 1, &hf_h235_cryptoSignedToken, ASN1_EXTENSION_ROOT , dissect_h235_T_cryptoSignedToken },
+ { 2, &hf_h235_cryptoHashedToken, ASN1_EXTENSION_ROOT , dissect_h235_T_cryptoHashedToken },
+ { 3, &hf_h235_cryptoPwdEncr , ASN1_EXTENSION_ROOT , dissect_h235_ENCRYPTED },
+ { 0, NULL, 0, NULL }
+};
+
+int
+dissect_h235_CryptoToken(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ proto_item *hidden_item;
+ hidden_item = proto_tree_add_item(tree, proto_h235, tvb, offset>>3, 0, ENC_NA);
+ proto_item_set_hidden(hidden_item);
+ offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
+ ett_h235_CryptoToken, CryptoToken_choice,
+ NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_INTEGER_0_24(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
+ 0U, 24U, NULL, FALSE);
+
+ return offset;
+}
+
+
+static const per_sequence_t FecOrder_sequence[] = {
+ { &hf_h235_fecBeforeSrtp , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_NULL },
+ { &hf_h235_fecAfterSrtp , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_NULL },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_FecOrder(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_FecOrder, FecOrder_sequence);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_INTEGER_64_65535(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
+ 64U, 65535U, NULL, FALSE);
+
+ return offset;
+}
+
+
+static const per_sequence_t SEQUENCE_OF_GenericData_sequence_of[1] = {
+ { &hf_h235_newParameter_item, ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h225_GenericData },
+};
+
+static int
+dissect_h235_SEQUENCE_OF_GenericData(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
+ ett_h235_SEQUENCE_OF_GenericData, SEQUENCE_OF_GenericData_sequence_of);
+
+ return offset;
+}
+
+
+static const per_sequence_t SrtpSessionParameters_sequence[] = {
+ { &hf_h235_kdr , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_INTEGER_0_24 },
+ { &hf_h235_unencryptedSrtp, ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_BOOLEAN },
+ { &hf_h235_unencryptedSrtcp, ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_BOOLEAN },
+ { &hf_h235_unauthenticatedSrtp, ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_BOOLEAN },
+ { &hf_h235_fecOrder , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_FecOrder },
+ { &hf_h235_windowSizeHint , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_INTEGER_64_65535 },
+ { &hf_h235_newParameter , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_SEQUENCE_OF_GenericData },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_SrtpSessionParameters(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_SrtpSessionParameters, SrtpSessionParameters_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t SrtpCryptoInfo_sequence[] = {
+ { &hf_h235_cryptoSuite , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_OBJECT_IDENTIFIER },
+ { &hf_h235_sessionParams , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_SrtpSessionParameters },
+ { &hf_h235_allowMKI , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_BOOLEAN },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_SrtpCryptoInfo(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_SrtpCryptoInfo, SrtpCryptoInfo_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t SrtpCryptoCapability_sequence_of[1] = {
+ { &hf_h235_SrtpCryptoCapability_item, ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_SrtpCryptoInfo },
+};
+
+static int
+dissect_h235_SrtpCryptoCapability(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
+ ett_h235_SrtpCryptoCapability, SrtpCryptoCapability_sequence_of);
+
+ return offset;
+}
+
+
+static const value_string h235_T_lifetime_vals[] = {
+ { 0, "powerOfTwo" },
+ { 1, "specific" },
+ { 0, NULL }
+};
+
+static const per_choice_t T_lifetime_choice[] = {
+ { 0, &hf_h235_powerOfTwo , ASN1_EXTENSION_ROOT , dissect_h235_INTEGER },
+ { 1, &hf_h235_specific , ASN1_EXTENSION_ROOT , dissect_h235_INTEGER },
+ { 0, NULL, 0, NULL }
+};
+
+static int
+dissect_h235_T_lifetime(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_choice(tvb, offset, actx, tree, hf_index,
+ ett_h235_T_lifetime, T_lifetime_choice,
+ NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_h235_INTEGER_1_128(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_constrained_integer(tvb, offset, actx, tree, hf_index,
+ 1U, 128U, NULL, FALSE);
+
+ return offset;
+}
+
+
+static const per_sequence_t T_mki_sequence[] = {
+ { &hf_h235_length , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_INTEGER_1_128 },
+ { &hf_h235_value , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_OCTET_STRING },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_T_mki(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_T_mki, T_mki_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t SrtpKeyParameters_sequence[] = {
+ { &hf_h235_masterKey , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_OCTET_STRING },
+ { &hf_h235_masterSalt , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_h235_OCTET_STRING },
+ { &hf_h235_lifetime , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_T_lifetime },
+ { &hf_h235_mki , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_h235_T_mki },
+ { NULL, 0, 0, NULL }
+};
+
+static int
+dissect_h235_SrtpKeyParameters(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
+ ett_h235_SrtpKeyParameters, SrtpKeyParameters_sequence);
+
+ return offset;
+}
+
+
+static const per_sequence_t SrtpKeys_sequence_of[1] = {
+ { &hf_h235_SrtpKeys_item , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_h235_SrtpKeyParameters },
+};
+
+int
+dissect_h235_SrtpKeys(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_per_sequence_of(tvb, offset, actx, tree, hf_index,
+ ett_h235_SrtpKeys, SrtpKeys_sequence_of);
+
+ return offset;
+}
+
+/*--- PDUs ---*/
+
+static int dissect_SrtpCryptoCapability_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_PER, TRUE, pinfo);
+ offset = dissect_h235_SrtpCryptoCapability(tvb, offset, &asn1_ctx, tree, hf_h235_SrtpCryptoCapability_PDU);
+ offset += 7; offset >>= 3;
+ return offset;
+}
+
+
+
+/*--- proto_register_h235 ----------------------------------------------*/
+void proto_register_h235(void) {
+
+ /* List of fields */
+ static hf_register_info hf[] = {
+ { &hf_h235_SrtpCryptoCapability_PDU,
+ { "SrtpCryptoCapability", "h235.SrtpCryptoCapability",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_nonStandardIdentifier,
+ { "nonStandardIdentifier", "h235.nonStandardIdentifier",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_h235_data,
+ { "data", "h235.data",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_halfkey,
+ { "halfkey", "h235.halfkey",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_2048", HFILL }},
+ { &hf_h235_modSize,
+ { "modSize", "h235.modSize",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_2048", HFILL }},
+ { &hf_h235_generator,
+ { "generator", "h235.generator",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_2048", HFILL }},
+ { &hf_h235_x,
+ { "x", "h235.x",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_511", HFILL }},
+ { &hf_h235_y,
+ { "y", "h235.y",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_511", HFILL }},
+ { &hf_h235_eckasdhp,
+ { "eckasdhp", "h235.eckasdhp_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_public_key,
+ { "public-key", "h235.public_key_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ECpoint", HFILL }},
+ { &hf_h235_modulus,
+ { "modulus", "h235.modulus",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_511", HFILL }},
+ { &hf_h235_base,
+ { "base", "h235.base_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ECpoint", HFILL }},
+ { &hf_h235_weierstrassA,
+ { "weierstrassA", "h235.weierstrassA",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_511", HFILL }},
+ { &hf_h235_weierstrassB,
+ { "weierstrassB", "h235.weierstrassB",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_511", HFILL }},
+ { &hf_h235_eckasdh2,
+ { "eckasdh2", "h235.eckasdh2_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_fieldSize,
+ { "fieldSize", "h235.fieldSize",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING_SIZE_0_511", HFILL }},
+ { &hf_h235_type,
+ { "type", "h235.type",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_h235_certificatedata,
+ { "certificate", "h235.certificate",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_default,
+ { "default", "h235.default_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_radius,
+ { "radius", "h235.radius_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_dhExch,
+ { "dhExch", "h235.dhExch_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_pwdSymEnc,
+ { "pwdSymEnc", "h235.pwdSymEnc_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_pwdHash,
+ { "pwdHash", "h235.pwdHash_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_certSign,
+ { "certSign", "h235.certSign_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_ipsec,
+ { "ipsec", "h235.ipsec_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_tls,
+ { "tls", "h235.tls_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_nonStandard,
+ { "nonStandard", "h235.nonStandard_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "NonStandardParameter", HFILL }},
+ { &hf_h235_authenticationBES,
+ { "authenticationBES", "h235.authenticationBES",
+ FT_UINT32, BASE_DEC, VALS(h235_AuthenticationBES_vals), 0,
+ NULL, HFILL }},
+ { &hf_h235_keyExch,
+ { "keyExch", "h235.keyExch",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_h235_tokenOID,
+ { "tokenOID", "h235.tokenOID",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_h235_timeStamp,
+ { "timeStamp", "h235.timeStamp",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_password,
+ { "password", "h235.password",
+ FT_STRING, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_dhkey,
+ { "dhkey", "h235.dhkey_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "DHset", HFILL }},
+ { &hf_h235_challenge,
+ { "challenge", "h235.challenge",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "ChallengeString", HFILL }},
+ { &hf_h235_random,
+ { "random", "h235.random",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "RandomVal", HFILL }},
+ { &hf_h235_certificate,
+ { "certificate", "h235.certificate_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "TypedCertificate", HFILL }},
+ { &hf_h235_generalID,
+ { "generalID", "h235.generalID",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "Identifier", HFILL }},
+ { &hf_h235_eckasdhkey,
+ { "eckasdhkey", "h235.eckasdhkey",
+ FT_UINT32, BASE_DEC, VALS(h235_ECKASDH_vals), 0,
+ "ECKASDH", HFILL }},
+ { &hf_h235_sendersID,
+ { "sendersID", "h235.sendersID",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "Identifier", HFILL }},
+ { &hf_h235_h235Key,
+ { "h235Key", "h235.h235Key",
+ FT_UINT32, BASE_DEC, VALS(h235_H235Key_vals), 0,
+ NULL, HFILL }},
+ { &hf_h235_profileInfo,
+ { "profileInfo", "h235.profileInfo",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "SEQUENCE_OF_ProfileElement", HFILL }},
+ { &hf_h235_profileInfo_item,
+ { "ProfileElement", "h235.ProfileElement_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_elementID,
+ { "elementID", "h235.elementID",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "INTEGER_0_255", HFILL }},
+ { &hf_h235_paramS,
+ { "paramS", "h235.paramS_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_element,
+ { "element", "h235.element",
+ FT_UINT32, BASE_DEC, VALS(h235_Element_vals), 0,
+ NULL, HFILL }},
+ { &hf_h235_octets,
+ { "octets", "h235.octets",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_integer,
+ { "integer", "h235.integer",
+ FT_INT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_bits,
+ { "bits", "h235.bits",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING", HFILL }},
+ { &hf_h235_name,
+ { "name", "h235.name",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "BMPString", HFILL }},
+ { &hf_h235_flag,
+ { "flag", "h235.flag",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_h235_toBeSigned,
+ { "toBeSigned", "h235.toBeSigned_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_algorithmOID,
+ { "algorithmOID", "h235.algorithmOID",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_h235_signaturedata,
+ { "signature", "h235.signature",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING", HFILL }},
+ { &hf_h235_encryptedData,
+ { "encryptedData", "h235.encryptedData",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_hash,
+ { "hash", "h235.hash",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "BIT_STRING", HFILL }},
+ { &hf_h235_ranInt,
+ { "ranInt", "h235.ranInt",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_h235_iv8,
+ { "iv8", "h235.iv8",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_iv16,
+ { "iv16", "h235.iv16",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_iv,
+ { "iv", "h235.iv",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_clearSalt,
+ { "clearSalt", "h235.clearSalt",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_cryptoEncryptedToken,
+ { "cryptoEncryptedToken", "h235.cryptoEncryptedToken_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_encryptedToken,
+ { "token", "h235.token_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ENCRYPTED", HFILL }},
+ { &hf_h235_cryptoSignedToken,
+ { "cryptoSignedToken", "h235.cryptoSignedToken_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_signedToken,
+ { "token", "h235.token_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "SIGNED", HFILL }},
+ { &hf_h235_cryptoHashedToken,
+ { "cryptoHashedToken", "h235.cryptoHashedToken_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_hashedVals,
+ { "hashedVals", "h235.hashedVals_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ClearToken", HFILL }},
+ { &hf_h235_hashedToken,
+ { "token", "h235.token_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "HASHED", HFILL }},
+ { &hf_h235_cryptoPwdEncr,
+ { "cryptoPwdEncr", "h235.cryptoPwdEncr_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ENCRYPTED", HFILL }},
+ { &hf_h235_secureChannel,
+ { "secureChannel", "h235.secureChannel",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "KeyMaterial", HFILL }},
+ { &hf_h235_sharedSecret,
+ { "sharedSecret", "h235.sharedSecret_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ENCRYPTED", HFILL }},
+ { &hf_h235_certProtectedKey,
+ { "certProtectedKey", "h235.certProtectedKey_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "SIGNED", HFILL }},
+ { &hf_h235_secureSharedSecret,
+ { "secureSharedSecret", "h235.secureSharedSecret_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "V3KeySyncMaterial", HFILL }},
+ { &hf_h235_encryptedSessionKey,
+ { "encryptedSessionKey", "h235.encryptedSessionKey",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_encryptedSaltingKey,
+ { "encryptedSaltingKey", "h235.encryptedSaltingKey",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_clearSaltingKey,
+ { "clearSaltingKey", "h235.clearSaltingKey",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_paramSsalt,
+ { "paramSsalt", "h235.paramSsalt_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Params", HFILL }},
+ { &hf_h235_keyDerivationOID,
+ { "keyDerivationOID", "h235.keyDerivationOID",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_h235_genericKeyMaterial,
+ { "genericKeyMaterial", "h235.genericKeyMaterial",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_SrtpCryptoCapability_item,
+ { "SrtpCryptoInfo", "h235.SrtpCryptoInfo_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_cryptoSuite,
+ { "cryptoSuite", "h235.cryptoSuite",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_h235_sessionParams,
+ { "sessionParams", "h235.sessionParams_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "SrtpSessionParameters", HFILL }},
+ { &hf_h235_allowMKI,
+ { "allowMKI", "h235.allowMKI",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_h235_SrtpKeys_item,
+ { "SrtpKeyParameters", "h235.SrtpKeyParameters_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_masterKey,
+ { "masterKey", "h235.masterKey",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_masterSalt,
+ { "masterSalt", "h235.masterSalt",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_lifetime,
+ { "lifetime", "h235.lifetime",
+ FT_UINT32, BASE_DEC, VALS(h235_T_lifetime_vals), 0,
+ NULL, HFILL }},
+ { &hf_h235_powerOfTwo,
+ { "powerOfTwo", "h235.powerOfTwo",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_h235_specific,
+ { "specific", "h235.specific",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_h235_mki,
+ { "mki", "h235.mki_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_length,
+ { "length", "h235.length",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "INTEGER_1_128", HFILL }},
+ { &hf_h235_value,
+ { "value", "h235.value",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OCTET_STRING", HFILL }},
+ { &hf_h235_kdr,
+ { "kdr", "h235.kdr",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "INTEGER_0_24", HFILL }},
+ { &hf_h235_unencryptedSrtp,
+ { "unencryptedSrtp", "h235.unencryptedSrtp",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_h235_unencryptedSrtcp,
+ { "unencryptedSrtcp", "h235.unencryptedSrtcp",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_h235_unauthenticatedSrtp,
+ { "unauthenticatedSrtp", "h235.unauthenticatedSrtp",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_h235_fecOrder,
+ { "fecOrder", "h235.fecOrder_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_windowSizeHint,
+ { "windowSizeHint", "h235.windowSizeHint",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "INTEGER_64_65535", HFILL }},
+ { &hf_h235_newParameter,
+ { "newParameter", "h235.newParameter",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "SEQUENCE_OF_GenericData", HFILL }},
+ { &hf_h235_newParameter_item,
+ { "GenericData", "h235.GenericData_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_fecBeforeSrtp,
+ { "fecBeforeSrtp", "h235.fecBeforeSrtp_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_h235_fecAfterSrtp,
+ { "fecAfterSrtp", "h235.fecAfterSrtp_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ };
+
+ /* List of subtrees */
+ static gint *ett[] = {
+ &ett_h235_NonStandardParameter,
+ &ett_h235_DHset,
+ &ett_h235_ECpoint,
+ &ett_h235_ECKASDH,
+ &ett_h235_T_eckasdhp,
+ &ett_h235_T_eckasdh2,
+ &ett_h235_TypedCertificate,
+ &ett_h235_AuthenticationBES,
+ &ett_h235_AuthenticationMechanism,
+ &ett_h235_ClearToken,
+ &ett_h235_SEQUENCE_OF_ProfileElement,
+ &ett_h235_ProfileElement,
+ &ett_h235_Element,
+ &ett_h235_SIGNED,
+ &ett_h235_ENCRYPTED,
+ &ett_h235_HASHED,
+ &ett_h235_Params,
+ &ett_h235_CryptoToken,
+ &ett_h235_T_cryptoEncryptedToken,
+ &ett_h235_T_cryptoSignedToken,
+ &ett_h235_T_cryptoHashedToken,
+ &ett_h235_H235Key,
+ &ett_h235_V3KeySyncMaterial,
+ &ett_h235_SrtpCryptoCapability,
+ &ett_h235_SrtpCryptoInfo,
+ &ett_h235_SrtpKeys,
+ &ett_h235_SrtpKeyParameters,
+ &ett_h235_T_lifetime,
+ &ett_h235_T_mki,
+ &ett_h235_SrtpSessionParameters,
+ &ett_h235_SEQUENCE_OF_GenericData,
+ &ett_h235_FecOrder,
+ };
+
+ /* Register protocol */
+ proto_h235 = proto_register_protocol(PNAME, PSNAME, PFNAME);
+
+ /* Register fields and subtrees */
+ proto_register_field_array(proto_h235, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+
+ /* OID names */
+ /* H.235.1, Chapter 15, Table 3 */
+ /* A */
+ oid_add_from_string("all fields in RAS/CS","0.0.8.235.0.1.1");
+ oid_add_from_string("all fields in RAS/CS","0.0.8.235.0.2.1");
+ /* T */
+ oid_add_from_string("ClearToken","0.0.8.235.0.1.5");
+ oid_add_from_string("ClearToken","0.0.8.235.0.2.5");
+ /* U */
+ oid_add_from_string("HMAC-SHA1-96","0.0.8.235.0.1.6");
+ oid_add_from_string("HMAC-SHA1-96","0.0.8.235.0.2.6");
+ /* H.235.7, Chapter 5, Table 1 */
+ oid_add_from_string("MIKEY", OID_MIKEY);
+ oid_add_from_string("MIKEY-PS", OID_MIKEY_PS);
+ oid_add_from_string("MIKEY-DHHMAC", OID_MIKEY_DHHMAC);
+ oid_add_from_string("MIKEY-PK-SIGN", OID_MIKEY_PK_SIGN);
+ oid_add_from_string("MIKEY-DH-SIGN", OID_MIKEY_DH_SIGN);
+ /* H.235.7, Chapter 8.5 */
+ oid_add_from_string("TG",OID_TG);
+ /* H.235.7, Chapter 9.5 */
+ oid_add_from_string("SG",OID_SG);
+ /* H.235.8, Chapter 4.2, Table 2 */
+ oid_add_from_string("AES_CM_128_HMAC_SHA1_80","0.0.8.235.0.4.91");
+ oid_add_from_string("AES_CM_128_HMAC_SHA1_32","0.0.8.235.0.4.92");
+ oid_add_from_string("F8_128_HMAC_SHA1_80","0.0.8.235.0.4.93");
+}
+
+
+/*--- proto_reg_handoff_h235 -------------------------------------------*/
+void proto_reg_handoff_h235(void) {
+ dissector_handle_t mikey_handle;
+
+ mikey_handle = find_dissector("mikey");
+
+ /* H.235.7, Chapter 7.1, MIKEY operation at "session level" */
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY "/nonCollapsing/0", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PS "/nonCollapsing/0", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DHHMAC "/nonCollapsing/0", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PK_SIGN "/nonCollapsing/0", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DH_SIGN "/nonCollapsing/0", mikey_handle);
+ dissector_add_string("h245.gef.content", "EncryptionSync/0", mikey_handle);
+ /* H.235.7, Chapter 7.2, MIKEY operation at "media level" */
+ dissector_add_string("h245.gef.content", "EncryptionSync/76", mikey_handle);
+ dissector_add_string("h245.gef.content", "EncryptionSync/72", mikey_handle);
+ dissector_add_string("h245.gef.content", "EncryptionSync/73", mikey_handle);
+ dissector_add_string("h245.gef.content", "EncryptionSync/74", mikey_handle);
+ dissector_add_string("h245.gef.content", "EncryptionSync/75", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY "/nonCollapsing/76", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PS "/nonCollapsing/72", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DHHMAC "/nonCollapsing/73", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_PK_SIGN "/nonCollapsing/74", mikey_handle);
+ dissector_add_string("h245.gef.content", "GenericCapability/" OID_MIKEY_DH_SIGN "/nonCollapsing/75", mikey_handle);
+
+ /* H.235.8, Chapter 4.1.2, SrtpCryptoCapability transport */
+ dissector_add_string("h245.gef.content", "GenericCapability/0.0.8.235.0.4.90/nonCollapsingRaw",
+ create_dissector_handle(dissect_SrtpCryptoCapability_PDU, proto_h235));
+
+}
+