diff options
Diffstat (limited to 'epan/dissectors/packet-crmf.c')
-rw-r--r-- | epan/dissectors/packet-crmf.c | 1272 |
1 files changed, 1272 insertions, 0 deletions
diff --git a/epan/dissectors/packet-crmf.c b/epan/dissectors/packet-crmf.c new file mode 100644 index 00000000..b3163868 --- /dev/null +++ b/epan/dissectors/packet-crmf.c @@ -0,0 +1,1272 @@ +/* Do not modify this file. Changes will be overwritten. */ +/* Generated automatically by the ASN.1 to Wireshark dissector compiler */ +/* packet-crmf.c */ +/* asn2wrs.py -b -L -p crmf -c ./crmf.cnf -s ./packet-crmf-template -D . -O ../.. CRMF.asn */ + +/* packet-crmf.c + * Routines for RFC2511 Certificate Request Message Format packet dissection + * Ronnie Sahlberg 2004 + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 1998 Gerald Combs + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#include "config.h" + +#include <epan/packet.h> +#include <epan/oids.h> +#include <epan/asn1.h> + +#include "packet-ber.h" +#include "packet-crmf.h" +#include "packet-cms.h" +#include "packet-pkix1explicit.h" +#include "packet-pkix1implicit.h" + +#define PNAME "Certificate Request Message Format" +#define PSNAME "CRMF" +#define PFNAME "crmf" + +void proto_register_crmf(void); +void proto_reg_handoff_crmf(void); + +/* Initialize the protocol and registered fields */ +static int proto_crmf = -1; +static int hf_crmf_type_oid = -1; +static int hf_crmf_PBMParameter_PDU = -1; /* PBMParameter */ +static int hf_crmf_RegToken_PDU = -1; /* RegToken */ +static int hf_crmf_Authenticator_PDU = -1; /* Authenticator */ +static int hf_crmf_PKIPublicationInfo_PDU = -1; /* PKIPublicationInfo */ +static int hf_crmf_PKIArchiveOptions_PDU = -1; /* PKIArchiveOptions */ +static int hf_crmf_OldCertId_PDU = -1; /* OldCertId */ +static int hf_crmf_ProtocolEncrKey_PDU = -1; /* ProtocolEncrKey */ +static int hf_crmf_UTF8Pairs_PDU = -1; /* UTF8Pairs */ +static int hf_crmf_CertReq_PDU = -1; /* CertReq */ +static int hf_crmf_EncKeyWithID_PDU = -1; /* EncKeyWithID */ +static int hf_crmf_CertReqMessages_item = -1; /* CertReqMsg */ +static int hf_crmf_certReq = -1; /* CertRequest */ +static int hf_crmf_popo = -1; /* ProofOfPossession */ +static int hf_crmf_regInfo = -1; /* SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue */ +static int hf_crmf_regInfo_item = -1; /* AttributeTypeAndValue */ +static int hf_crmf_certReqId = -1; /* INTEGER */ +static int hf_crmf_certTemplate = -1; /* CertTemplate */ +static int hf_crmf_controls = -1; /* Controls */ +static int hf_crmf_version = -1; /* Version */ +static int hf_crmf_serialNumber = -1; /* INTEGER_MIN_MAX */ +static int hf_crmf_signingAlg = -1; /* AlgorithmIdentifier */ +static int hf_crmf_template_issuer = -1; /* Name */ +static int hf_crmf_validity = -1; /* OptionalValidity */ +static int hf_crmf_subject = -1; /* Name */ +static int hf_crmf_publicKey = -1; /* SubjectPublicKeyInfo */ +static int hf_crmf_issuerUID = -1; /* UniqueIdentifier */ +static int hf_crmf_subjectUID = -1; /* UniqueIdentifier */ +static int hf_crmf_extensions = -1; /* Extensions */ +static int hf_crmf_notBefore = -1; /* Time */ +static int hf_crmf_notAfter = -1; /* Time */ +static int hf_crmf_Controls_item = -1; /* AttributeTypeAndValue */ +static int hf_crmf_type = -1; /* T_type */ +static int hf_crmf_value = -1; /* T_value */ +static int hf_crmf_raVerified = -1; /* NULL */ +static int hf_crmf_signature = -1; /* POPOSigningKey */ +static int hf_crmf_keyEncipherment = -1; /* POPOPrivKey */ +static int hf_crmf_keyAgreement = -1; /* POPOPrivKey */ +static int hf_crmf_poposkInput = -1; /* POPOSigningKeyInput */ +static int hf_crmf_algorithmIdentifier = -1; /* AlgorithmIdentifier */ +static int hf_crmf_sk_signature = -1; /* BIT_STRING */ +static int hf_crmf_authInfo = -1; /* T_authInfo */ +static int hf_crmf_sender = -1; /* GeneralName */ +static int hf_crmf_publicKeyMAC = -1; /* PKMACValue */ +static int hf_crmf_algId = -1; /* AlgorithmIdentifier */ +static int hf_crmf_pkmac_value = -1; /* BIT_STRING */ +static int hf_crmf_salt = -1; /* OCTET_STRING */ +static int hf_crmf_owf = -1; /* AlgorithmIdentifier */ +static int hf_crmf_iterationCount = -1; /* INTEGER */ +static int hf_crmf_mac = -1; /* AlgorithmIdentifier */ +static int hf_crmf_thisMessage = -1; /* BIT_STRING */ +static int hf_crmf_subsequentMessage = -1; /* SubsequentMessage */ +static int hf_crmf_dhMAC = -1; /* BIT_STRING */ +static int hf_crmf_agreeMAC = -1; /* PKMACValue */ +static int hf_crmf_encryptedKey = -1; /* EnvelopedData */ +static int hf_crmf_action = -1; /* T_action */ +static int hf_crmf_pubInfos = -1; /* SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo */ +static int hf_crmf_pubInfos_item = -1; /* SinglePubInfo */ +static int hf_crmf_pubMethod = -1; /* T_pubMethod */ +static int hf_crmf_pubLocation = -1; /* GeneralName */ +static int hf_crmf_encryptedPrivKey = -1; /* EncryptedKey */ +static int hf_crmf_keyGenParameters = -1; /* KeyGenParameters */ +static int hf_crmf_archiveRemGenPrivKey = -1; /* BOOLEAN */ +static int hf_crmf_encryptedValue = -1; /* EncryptedValue */ +static int hf_crmf_envelopedData = -1; /* EnvelopedData */ +static int hf_crmf_intendedAlg = -1; /* AlgorithmIdentifier */ +static int hf_crmf_symmAlg = -1; /* AlgorithmIdentifier */ +static int hf_crmf_encSymmKey = -1; /* BIT_STRING */ +static int hf_crmf_keyAlg = -1; /* AlgorithmIdentifier */ +static int hf_crmf_valueHint = -1; /* OCTET_STRING */ +static int hf_crmf_encValue = -1; /* BIT_STRING */ +static int hf_crmf_issuer = -1; /* GeneralName */ +static int hf_crmf_enckeywid_privkey = -1; /* PrivateKeyInfo */ +static int hf_crmf_identifier = -1; /* T_identifier */ +static int hf_crmf_string = -1; /* UTF8String */ +static int hf_crmf_generalName = -1; /* GeneralName */ +static int hf_crmf_privkey_version = -1; /* INTEGER */ +static int hf_crmf_privateKeyAlgorithm = -1; /* AlgorithmIdentifier */ +static int hf_crmf_privateKey = -1; /* OCTET_STRING */ +static int hf_crmf_attributes = -1; /* Attributes */ +static int hf_crmf_Attributes_item = -1; /* Attribute */ + +/* Initialize the subtree pointers */ +static gint ett_crmf_CertReqMessages = -1; +static gint ett_crmf_CertReqMsg = -1; +static gint ett_crmf_SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue = -1; +static gint ett_crmf_CertRequest = -1; +static gint ett_crmf_CertTemplate = -1; +static gint ett_crmf_OptionalValidity = -1; +static gint ett_crmf_Controls = -1; +static gint ett_crmf_AttributeTypeAndValue = -1; +static gint ett_crmf_ProofOfPossession = -1; +static gint ett_crmf_POPOSigningKey = -1; +static gint ett_crmf_POPOSigningKeyInput = -1; +static gint ett_crmf_T_authInfo = -1; +static gint ett_crmf_PKMACValue = -1; +static gint ett_crmf_PBMParameter = -1; +static gint ett_crmf_POPOPrivKey = -1; +static gint ett_crmf_PKIPublicationInfo = -1; +static gint ett_crmf_SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo = -1; +static gint ett_crmf_SinglePubInfo = -1; +static gint ett_crmf_PKIArchiveOptions = -1; +static gint ett_crmf_EncryptedKey = -1; +static gint ett_crmf_EncryptedValue = -1; +static gint ett_crmf_CertId = -1; +static gint ett_crmf_EncKeyWithID = -1; +static gint ett_crmf_T_identifier = -1; +static gint ett_crmf_PrivateKeyInfo = -1; +static gint ett_crmf_Attributes = -1; + + +static int +dissect_crmf_INTEGER(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + + +static int +dissect_crmf_INTEGER_MIN_MAX(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_integer64(implicit_tag, actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + +static const ber_sequence_t OptionalValidity_sequence[] = { + { &hf_crmf_notBefore , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_Time }, + { &hf_crmf_notAfter , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_Time }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_OptionalValidity(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + OptionalValidity_sequence, hf_index, ett_crmf_OptionalValidity); + + return offset; +} + + +static const ber_sequence_t CertTemplate_sequence[] = { + { &hf_crmf_version , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_Version }, + { &hf_crmf_serialNumber , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_crmf_INTEGER_MIN_MAX }, + { &hf_crmf_signingAlg , BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_template_issuer, BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_Name }, + { &hf_crmf_validity , BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_crmf_OptionalValidity }, + { &hf_crmf_subject , BER_CLASS_CON, 5, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_Name }, + { &hf_crmf_publicKey , BER_CLASS_CON, 6, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_SubjectPublicKeyInfo }, + { &hf_crmf_issuerUID , BER_CLASS_CON, 7, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_UniqueIdentifier }, + { &hf_crmf_subjectUID , BER_CLASS_CON, 8, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_UniqueIdentifier }, + { &hf_crmf_extensions , BER_CLASS_CON, 9, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_Extensions }, + { NULL, 0, 0, 0, NULL } +}; + +int +dissect_crmf_CertTemplate(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + CertTemplate_sequence, hf_index, ett_crmf_CertTemplate); + + return offset; +} + + + +static int +dissect_crmf_T_type(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_object_identifier_str(implicit_tag, actx, tree, tvb, offset, hf_crmf_type_oid, &actx->external.direct_reference); + + return offset; +} + + + +static int +dissect_crmf_T_value(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset=call_ber_oid_callback(actx->external.direct_reference, tvb, offset, actx->pinfo, tree, NULL); + + + return offset; +} + + +static const ber_sequence_t AttributeTypeAndValue_sequence[] = { + { &hf_crmf_type , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_crmf_T_type }, + { &hf_crmf_value , BER_CLASS_ANY, 0, BER_FLAGS_NOOWNTAG, dissect_crmf_T_value }, + { NULL, 0, 0, 0, NULL } +}; + +int +dissect_crmf_AttributeTypeAndValue(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + AttributeTypeAndValue_sequence, hf_index, ett_crmf_AttributeTypeAndValue); + + return offset; +} + + +static const ber_sequence_t Controls_sequence_of[1] = { + { &hf_crmf_Controls_item , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_AttributeTypeAndValue }, +}; + +static int +dissect_crmf_Controls(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset, + Controls_sequence_of, hf_index, ett_crmf_Controls); + + return offset; +} + + +static const ber_sequence_t CertRequest_sequence[] = { + { &hf_crmf_certReqId , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_crmf_INTEGER }, + { &hf_crmf_certTemplate , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_CertTemplate }, + { &hf_crmf_controls , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_crmf_Controls }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_CertRequest(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + CertRequest_sequence, hf_index, ett_crmf_CertRequest); + + return offset; +} + + + +static int +dissect_crmf_NULL(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_null(implicit_tag, actx, tree, tvb, offset, hf_index); + + return offset; +} + + + +static int +dissect_crmf_BIT_STRING(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset, + NULL, 0, hf_index, -1, + NULL); + + return offset; +} + + +static const ber_sequence_t PKMACValue_sequence[] = { + { &hf_crmf_algId , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_pkmac_value , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_crmf_BIT_STRING }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_PKMACValue(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + PKMACValue_sequence, hf_index, ett_crmf_PKMACValue); + + return offset; +} + + +static const value_string crmf_T_authInfo_vals[] = { + { 0, "sender" }, + { 1, "publicKeyMAC" }, + { 0, NULL } +}; + +static const ber_choice_t T_authInfo_choice[] = { + { 0, &hf_crmf_sender , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_pkix1implicit_GeneralName }, + { 1, &hf_crmf_publicKeyMAC , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_PKMACValue }, + { 0, NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_T_authInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_choice(actx, tree, tvb, offset, + T_authInfo_choice, hf_index, ett_crmf_T_authInfo, + NULL); + + return offset; +} + + +static const ber_sequence_t POPOSigningKeyInput_sequence[] = { + { &hf_crmf_authInfo , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_crmf_T_authInfo }, + { &hf_crmf_publicKey , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_pkix1explicit_SubjectPublicKeyInfo }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_POPOSigningKeyInput(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + POPOSigningKeyInput_sequence, hf_index, ett_crmf_POPOSigningKeyInput); + + return offset; +} + + +static const ber_sequence_t POPOSigningKey_sequence[] = { + { &hf_crmf_poposkInput , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_crmf_POPOSigningKeyInput }, + { &hf_crmf_algorithmIdentifier, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_sk_signature , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_crmf_BIT_STRING }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_POPOSigningKey(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + POPOSigningKey_sequence, hf_index, ett_crmf_POPOSigningKey); + + return offset; +} + + +static const value_string crmf_SubsequentMessage_vals[] = { + { 0, "encrCert" }, + { 1, "challengeResp" }, + { 0, NULL } +}; + + +static int +dissect_crmf_SubsequentMessage(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + +static const value_string crmf_POPOPrivKey_vals[] = { + { 0, "thisMessage" }, + { 1, "subsequentMessage" }, + { 2, "dhMAC" }, + { 3, "agreeMAC" }, + { 4, "encryptedKey" }, + { 0, NULL } +}; + +static const ber_choice_t POPOPrivKey_choice[] = { + { 0, &hf_crmf_thisMessage , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_crmf_BIT_STRING }, + { 1, &hf_crmf_subsequentMessage, BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_crmf_SubsequentMessage }, + { 2, &hf_crmf_dhMAC , BER_CLASS_CON, 2, BER_FLAGS_IMPLTAG, dissect_crmf_BIT_STRING }, + { 3, &hf_crmf_agreeMAC , BER_CLASS_CON, 3, BER_FLAGS_IMPLTAG, dissect_crmf_PKMACValue }, + { 4, &hf_crmf_encryptedKey , BER_CLASS_CON, 4, BER_FLAGS_IMPLTAG, dissect_cms_EnvelopedData }, + { 0, NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_POPOPrivKey(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_choice(actx, tree, tvb, offset, + POPOPrivKey_choice, hf_index, ett_crmf_POPOPrivKey, + NULL); + + return offset; +} + + +static const value_string crmf_ProofOfPossession_vals[] = { + { 0, "raVerified" }, + { 1, "signature" }, + { 2, "keyEncipherment" }, + { 3, "keyAgreement" }, + { 0, NULL } +}; + +static const ber_choice_t ProofOfPossession_choice[] = { + { 0, &hf_crmf_raVerified , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_crmf_NULL }, + { 1, &hf_crmf_signature , BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_crmf_POPOSigningKey }, + { 2, &hf_crmf_keyEncipherment, BER_CLASS_CON, 2, BER_FLAGS_IMPLTAG, dissect_crmf_POPOPrivKey }, + { 3, &hf_crmf_keyAgreement , BER_CLASS_CON, 3, BER_FLAGS_IMPLTAG, dissect_crmf_POPOPrivKey }, + { 0, NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_ProofOfPossession(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_choice(actx, tree, tvb, offset, + ProofOfPossession_choice, hf_index, ett_crmf_ProofOfPossession, + NULL); + + return offset; +} + + +static const ber_sequence_t SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue_sequence_of[1] = { + { &hf_crmf_regInfo_item , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_AttributeTypeAndValue }, +}; + +static int +dissect_crmf_SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset, + SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue_sequence_of, hf_index, ett_crmf_SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue); + + return offset; +} + + +static const ber_sequence_t CertReqMsg_sequence[] = { + { &hf_crmf_certReq , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_CertRequest }, + { &hf_crmf_popo , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_crmf_ProofOfPossession }, + { &hf_crmf_regInfo , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_crmf_SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_CertReqMsg(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + CertReqMsg_sequence, hf_index, ett_crmf_CertReqMsg); + + return offset; +} + + +static const ber_sequence_t CertReqMessages_sequence_of[1] = { + { &hf_crmf_CertReqMessages_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_CertReqMsg }, +}; + +int +dissect_crmf_CertReqMessages(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset, + CertReqMessages_sequence_of, hf_index, ett_crmf_CertReqMessages); + + return offset; +} + + + +static int +dissect_crmf_OCTET_STRING(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_octet_string(implicit_tag, actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + +static const ber_sequence_t PBMParameter_sequence[] = { + { &hf_crmf_salt , BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_crmf_OCTET_STRING }, + { &hf_crmf_owf , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_iterationCount , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_crmf_INTEGER }, + { &hf_crmf_mac , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_PBMParameter(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + PBMParameter_sequence, hf_index, ett_crmf_PBMParameter); + + return offset; +} + + + +static int +dissect_crmf_RegToken(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTF8String, + actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + + +static int +dissect_crmf_Authenticator(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTF8String, + actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + +static const value_string crmf_T_action_vals[] = { + { 0, "dontPublish" }, + { 1, "pleasePublish" }, + { 0, NULL } +}; + + +static int +dissect_crmf_T_action(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + +static const value_string crmf_T_pubMethod_vals[] = { + { 0, "dontCare" }, + { 1, "x500" }, + { 2, "web" }, + { 3, "ldap" }, + { 0, NULL } +}; + + +static int +dissect_crmf_T_pubMethod(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + +static const ber_sequence_t SinglePubInfo_sequence[] = { + { &hf_crmf_pubMethod , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_crmf_T_pubMethod }, + { &hf_crmf_pubLocation , BER_CLASS_CON, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_pkix1implicit_GeneralName }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_SinglePubInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + SinglePubInfo_sequence, hf_index, ett_crmf_SinglePubInfo); + + return offset; +} + + +static const ber_sequence_t SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo_sequence_of[1] = { + { &hf_crmf_pubInfos_item , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_SinglePubInfo }, +}; + +static int +dissect_crmf_SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset, + SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo_sequence_of, hf_index, ett_crmf_SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo); + + return offset; +} + + +static const ber_sequence_t PKIPublicationInfo_sequence[] = { + { &hf_crmf_action , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_crmf_T_action }, + { &hf_crmf_pubInfos , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_crmf_SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo }, + { NULL, 0, 0, 0, NULL } +}; + +int +dissect_crmf_PKIPublicationInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + PKIPublicationInfo_sequence, hf_index, ett_crmf_PKIPublicationInfo); + + return offset; +} + + +static const ber_sequence_t EncryptedValue_sequence[] = { + { &hf_crmf_intendedAlg , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_symmAlg , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_encSymmKey , BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_crmf_BIT_STRING }, + { &hf_crmf_keyAlg , BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_valueHint , BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_crmf_OCTET_STRING }, + { &hf_crmf_encValue , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_crmf_BIT_STRING }, + { NULL, 0, 0, 0, NULL } +}; + +int +dissect_crmf_EncryptedValue(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + EncryptedValue_sequence, hf_index, ett_crmf_EncryptedValue); + + return offset; +} + + +static const value_string crmf_EncryptedKey_vals[] = { + { 0, "encryptedValue" }, + { 1, "envelopedData" }, + { 0, NULL } +}; + +static const ber_choice_t EncryptedKey_choice[] = { + { 0, &hf_crmf_encryptedValue , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_EncryptedValue }, + { 1, &hf_crmf_envelopedData , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_cms_EnvelopedData }, + { 0, NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_EncryptedKey(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_choice(actx, tree, tvb, offset, + EncryptedKey_choice, hf_index, ett_crmf_EncryptedKey, + NULL); + + return offset; +} + + + +static int +dissect_crmf_KeyGenParameters(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_octet_string(implicit_tag, actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + + +static int +dissect_crmf_BOOLEAN(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_boolean(implicit_tag, actx, tree, tvb, offset, hf_index, NULL); + + return offset; +} + + +static const value_string crmf_PKIArchiveOptions_vals[] = { + { 0, "encryptedPrivKey" }, + { 1, "keyGenParameters" }, + { 2, "archiveRemGenPrivKey" }, + { 0, NULL } +}; + +static const ber_choice_t PKIArchiveOptions_choice[] = { + { 0, &hf_crmf_encryptedPrivKey, BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_crmf_EncryptedKey }, + { 1, &hf_crmf_keyGenParameters, BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_crmf_KeyGenParameters }, + { 2, &hf_crmf_archiveRemGenPrivKey, BER_CLASS_CON, 2, BER_FLAGS_IMPLTAG, dissect_crmf_BOOLEAN }, + { 0, NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_PKIArchiveOptions(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_choice(actx, tree, tvb, offset, + PKIArchiveOptions_choice, hf_index, ett_crmf_PKIArchiveOptions, + NULL); + + return offset; +} + + +static const ber_sequence_t CertId_sequence[] = { + { &hf_crmf_issuer , BER_CLASS_CON, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_pkix1implicit_GeneralName }, + { &hf_crmf_serialNumber , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_crmf_INTEGER_MIN_MAX }, + { NULL, 0, 0, 0, NULL } +}; + +int +dissect_crmf_CertId(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + CertId_sequence, hf_index, ett_crmf_CertId); + + return offset; +} + + + +static int +dissect_crmf_OldCertId(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_crmf_CertId(implicit_tag, tvb, offset, actx, tree, hf_index); + + return offset; +} + + + +static int +dissect_crmf_ProtocolEncrKey(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_pkix1explicit_SubjectPublicKeyInfo(implicit_tag, tvb, offset, actx, tree, hf_index); + + return offset; +} + + + +static int +dissect_crmf_UTF8Pairs(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTF8String, + actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + + +static int +dissect_crmf_CertReq(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_crmf_CertRequest(implicit_tag, tvb, offset, actx, tree, hf_index); + + return offset; +} + + +static const ber_sequence_t Attributes_set_of[1] = { + { &hf_crmf_Attributes_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_pkix1explicit_Attribute }, +}; + +static int +dissect_crmf_Attributes(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_set_of(implicit_tag, actx, tree, tvb, offset, + Attributes_set_of, hf_index, ett_crmf_Attributes); + + return offset; +} + + +static const ber_sequence_t PrivateKeyInfo_sequence[] = { + { &hf_crmf_privkey_version, BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_crmf_INTEGER }, + { &hf_crmf_privateKeyAlgorithm, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_pkix1explicit_AlgorithmIdentifier }, + { &hf_crmf_privateKey , BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_crmf_OCTET_STRING }, + { &hf_crmf_attributes , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_crmf_Attributes }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_PrivateKeyInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + PrivateKeyInfo_sequence, hf_index, ett_crmf_PrivateKeyInfo); + + return offset; +} + + + +static int +dissect_crmf_UTF8String(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTF8String, + actx, tree, tvb, offset, hf_index, + NULL); + + return offset; +} + + +static const value_string crmf_T_identifier_vals[] = { + { 0, "string" }, + { 1, "generalName" }, + { 0, NULL } +}; + +static const ber_choice_t T_identifier_choice[] = { + { 0, &hf_crmf_string , BER_CLASS_UNI, BER_UNI_TAG_UTF8String, BER_FLAGS_NOOWNTAG, dissect_crmf_UTF8String }, + { 1, &hf_crmf_generalName , BER_CLASS_CON, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_pkix1implicit_GeneralName }, + { 0, NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_T_identifier(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_choice(actx, tree, tvb, offset, + T_identifier_choice, hf_index, ett_crmf_T_identifier, + NULL); + + return offset; +} + + +static const ber_sequence_t EncKeyWithID_sequence[] = { + { &hf_crmf_enckeywid_privkey, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_crmf_PrivateKeyInfo }, + { &hf_crmf_identifier , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_crmf_T_identifier }, + { NULL, 0, 0, 0, NULL } +}; + +static int +dissect_crmf_EncKeyWithID(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { + offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset, + EncKeyWithID_sequence, hf_index, ett_crmf_EncKeyWithID); + + return offset; +} + +/*--- PDUs ---*/ + +static int dissect_PBMParameter_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_PBMParameter(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_PBMParameter_PDU); + return offset; +} +static int dissect_RegToken_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_RegToken(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_RegToken_PDU); + return offset; +} +static int dissect_Authenticator_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_Authenticator(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_Authenticator_PDU); + return offset; +} +static int dissect_PKIPublicationInfo_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_PKIPublicationInfo(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_PKIPublicationInfo_PDU); + return offset; +} +static int dissect_PKIArchiveOptions_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_PKIArchiveOptions(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_PKIArchiveOptions_PDU); + return offset; +} +static int dissect_OldCertId_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_OldCertId(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_OldCertId_PDU); + return offset; +} +static int dissect_ProtocolEncrKey_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_ProtocolEncrKey(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_ProtocolEncrKey_PDU); + return offset; +} +static int dissect_UTF8Pairs_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_UTF8Pairs(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_UTF8Pairs_PDU); + return offset; +} +static int dissect_CertReq_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_CertReq(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_CertReq_PDU); + return offset; +} +static int dissect_EncKeyWithID_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) { + int offset = 0; + asn1_ctx_t asn1_ctx; + asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo); + offset = dissect_crmf_EncKeyWithID(FALSE, tvb, offset, &asn1_ctx, tree, hf_crmf_EncKeyWithID_PDU); + return offset; +} + + + +/*--- proto_register_crmf ----------------------------------------------*/ +void proto_register_crmf(void) { + + /* List of fields */ + static hf_register_info hf[] = { + { &hf_crmf_type_oid, + { "Type", "crmf.type.oid", + FT_STRING, BASE_NONE, NULL, 0, + "Type of AttributeTypeAndValue", HFILL }}, + { &hf_crmf_PBMParameter_PDU, + { "PBMParameter", "crmf.PBMParameter_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_RegToken_PDU, + { "RegToken", "crmf.RegToken", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_Authenticator_PDU, + { "Authenticator", "crmf.Authenticator", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_PKIPublicationInfo_PDU, + { "PKIPublicationInfo", "crmf.PKIPublicationInfo_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_PKIArchiveOptions_PDU, + { "PKIArchiveOptions", "crmf.PKIArchiveOptions", + FT_UINT32, BASE_DEC, VALS(crmf_PKIArchiveOptions_vals), 0, + NULL, HFILL }}, + { &hf_crmf_OldCertId_PDU, + { "OldCertId", "crmf.OldCertId_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_ProtocolEncrKey_PDU, + { "ProtocolEncrKey", "crmf.ProtocolEncrKey_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_UTF8Pairs_PDU, + { "UTF8Pairs", "crmf.UTF8Pairs", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_CertReq_PDU, + { "CertReq", "crmf.CertReq_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_EncKeyWithID_PDU, + { "EncKeyWithID", "crmf.EncKeyWithID_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_CertReqMessages_item, + { "CertReqMsg", "crmf.CertReqMsg_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_certReq, + { "certReq", "crmf.certReq_element", + FT_NONE, BASE_NONE, NULL, 0, + "CertRequest", HFILL }}, + { &hf_crmf_popo, + { "popo", "crmf.popo", + FT_UINT32, BASE_DEC, VALS(crmf_ProofOfPossession_vals), 0, + "ProofOfPossession", HFILL }}, + { &hf_crmf_regInfo, + { "regInfo", "crmf.regInfo", + FT_UINT32, BASE_DEC, NULL, 0, + "SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue", HFILL }}, + { &hf_crmf_regInfo_item, + { "AttributeTypeAndValue", "crmf.AttributeTypeAndValue_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_certReqId, + { "certReqId", "crmf.certReqId", + FT_INT32, BASE_DEC, NULL, 0, + "INTEGER", HFILL }}, + { &hf_crmf_certTemplate, + { "certTemplate", "crmf.certTemplate_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_controls, + { "controls", "crmf.controls", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_version, + { "version", "crmf.version", + FT_INT32, BASE_DEC, VALS(pkix1explicit_Version_vals), 0, + NULL, HFILL }}, + { &hf_crmf_serialNumber, + { "serialNumber", "crmf.serialNumber", + FT_INT64, BASE_DEC, NULL, 0, + "INTEGER_MIN_MAX", HFILL }}, + { &hf_crmf_signingAlg, + { "signingAlg", "crmf.signingAlg_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_template_issuer, + { "issuer", "crmf.issuer", + FT_UINT32, BASE_DEC, NULL, 0, + "Name", HFILL }}, + { &hf_crmf_validity, + { "validity", "crmf.validity_element", + FT_NONE, BASE_NONE, NULL, 0, + "OptionalValidity", HFILL }}, + { &hf_crmf_subject, + { "subject", "crmf.subject", + FT_UINT32, BASE_DEC, NULL, 0, + "Name", HFILL }}, + { &hf_crmf_publicKey, + { "publicKey", "crmf.publicKey_element", + FT_NONE, BASE_NONE, NULL, 0, + "SubjectPublicKeyInfo", HFILL }}, + { &hf_crmf_issuerUID, + { "issuerUID", "crmf.issuerUID", + FT_BYTES, BASE_NONE, NULL, 0, + "UniqueIdentifier", HFILL }}, + { &hf_crmf_subjectUID, + { "subjectUID", "crmf.subjectUID", + FT_BYTES, BASE_NONE, NULL, 0, + "UniqueIdentifier", HFILL }}, + { &hf_crmf_extensions, + { "extensions", "crmf.extensions", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_notBefore, + { "notBefore", "crmf.notBefore", + FT_UINT32, BASE_DEC, VALS(pkix1explicit_Time_vals), 0, + "Time", HFILL }}, + { &hf_crmf_notAfter, + { "notAfter", "crmf.notAfter", + FT_UINT32, BASE_DEC, VALS(pkix1explicit_Time_vals), 0, + "Time", HFILL }}, + { &hf_crmf_Controls_item, + { "AttributeTypeAndValue", "crmf.AttributeTypeAndValue_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_type, + { "type", "crmf.type", + FT_OID, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_value, + { "value", "crmf.value_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_raVerified, + { "raVerified", "crmf.raVerified_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_signature, + { "signature", "crmf.signature_element", + FT_NONE, BASE_NONE, NULL, 0, + "POPOSigningKey", HFILL }}, + { &hf_crmf_keyEncipherment, + { "keyEncipherment", "crmf.keyEncipherment", + FT_UINT32, BASE_DEC, VALS(crmf_POPOPrivKey_vals), 0, + "POPOPrivKey", HFILL }}, + { &hf_crmf_keyAgreement, + { "keyAgreement", "crmf.keyAgreement", + FT_UINT32, BASE_DEC, VALS(crmf_POPOPrivKey_vals), 0, + "POPOPrivKey", HFILL }}, + { &hf_crmf_poposkInput, + { "poposkInput", "crmf.poposkInput_element", + FT_NONE, BASE_NONE, NULL, 0, + "POPOSigningKeyInput", HFILL }}, + { &hf_crmf_algorithmIdentifier, + { "algorithmIdentifier", "crmf.algorithmIdentifier_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_sk_signature, + { "signature", "crmf.signature", + FT_BYTES, BASE_NONE, NULL, 0, + "BIT_STRING", HFILL }}, + { &hf_crmf_authInfo, + { "authInfo", "crmf.authInfo", + FT_UINT32, BASE_DEC, VALS(crmf_T_authInfo_vals), 0, + NULL, HFILL }}, + { &hf_crmf_sender, + { "sender", "crmf.sender", + FT_UINT32, BASE_DEC, NULL, 0, + "GeneralName", HFILL }}, + { &hf_crmf_publicKeyMAC, + { "publicKeyMAC", "crmf.publicKeyMAC_element", + FT_NONE, BASE_NONE, NULL, 0, + "PKMACValue", HFILL }}, + { &hf_crmf_algId, + { "algId", "crmf.algId_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_pkmac_value, + { "value", "crmf.value", + FT_BYTES, BASE_NONE, NULL, 0, + "BIT_STRING", HFILL }}, + { &hf_crmf_salt, + { "salt", "crmf.salt", + FT_BYTES, BASE_NONE, NULL, 0, + "OCTET_STRING", HFILL }}, + { &hf_crmf_owf, + { "owf", "crmf.owf_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_iterationCount, + { "iterationCount", "crmf.iterationCount", + FT_INT32, BASE_DEC, NULL, 0, + "INTEGER", HFILL }}, + { &hf_crmf_mac, + { "mac", "crmf.mac_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_thisMessage, + { "thisMessage", "crmf.thisMessage", + FT_BYTES, BASE_NONE, NULL, 0, + "BIT_STRING", HFILL }}, + { &hf_crmf_subsequentMessage, + { "subsequentMessage", "crmf.subsequentMessage", + FT_INT32, BASE_DEC, VALS(crmf_SubsequentMessage_vals), 0, + NULL, HFILL }}, + { &hf_crmf_dhMAC, + { "dhMAC", "crmf.dhMAC", + FT_BYTES, BASE_NONE, NULL, 0, + "BIT_STRING", HFILL }}, + { &hf_crmf_agreeMAC, + { "agreeMAC", "crmf.agreeMAC_element", + FT_NONE, BASE_NONE, NULL, 0, + "PKMACValue", HFILL }}, + { &hf_crmf_encryptedKey, + { "encryptedKey", "crmf.encryptedKey_element", + FT_NONE, BASE_NONE, NULL, 0, + "EnvelopedData", HFILL }}, + { &hf_crmf_action, + { "action", "crmf.action", + FT_INT32, BASE_DEC, VALS(crmf_T_action_vals), 0, + NULL, HFILL }}, + { &hf_crmf_pubInfos, + { "pubInfos", "crmf.pubInfos", + FT_UINT32, BASE_DEC, NULL, 0, + "SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo", HFILL }}, + { &hf_crmf_pubInfos_item, + { "SinglePubInfo", "crmf.SinglePubInfo_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_pubMethod, + { "pubMethod", "crmf.pubMethod", + FT_INT32, BASE_DEC, VALS(crmf_T_pubMethod_vals), 0, + NULL, HFILL }}, + { &hf_crmf_pubLocation, + { "pubLocation", "crmf.pubLocation", + FT_UINT32, BASE_DEC, NULL, 0, + "GeneralName", HFILL }}, + { &hf_crmf_encryptedPrivKey, + { "encryptedPrivKey", "crmf.encryptedPrivKey", + FT_UINT32, BASE_DEC, VALS(crmf_EncryptedKey_vals), 0, + "EncryptedKey", HFILL }}, + { &hf_crmf_keyGenParameters, + { "keyGenParameters", "crmf.keyGenParameters", + FT_BYTES, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_archiveRemGenPrivKey, + { "archiveRemGenPrivKey", "crmf.archiveRemGenPrivKey", + FT_BOOLEAN, BASE_NONE, NULL, 0, + "BOOLEAN", HFILL }}, + { &hf_crmf_encryptedValue, + { "encryptedValue", "crmf.encryptedValue_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_envelopedData, + { "envelopedData", "crmf.envelopedData_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_intendedAlg, + { "intendedAlg", "crmf.intendedAlg_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_symmAlg, + { "symmAlg", "crmf.symmAlg_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_encSymmKey, + { "encSymmKey", "crmf.encSymmKey", + FT_BYTES, BASE_NONE, NULL, 0, + "BIT_STRING", HFILL }}, + { &hf_crmf_keyAlg, + { "keyAlg", "crmf.keyAlg_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_valueHint, + { "valueHint", "crmf.valueHint", + FT_BYTES, BASE_NONE, NULL, 0, + "OCTET_STRING", HFILL }}, + { &hf_crmf_encValue, + { "encValue", "crmf.encValue", + FT_BYTES, BASE_NONE, NULL, 0, + "BIT_STRING", HFILL }}, + { &hf_crmf_issuer, + { "issuer", "crmf.issuer", + FT_UINT32, BASE_DEC, NULL, 0, + "GeneralName", HFILL }}, + { &hf_crmf_enckeywid_privkey, + { "privateKey", "crmf.privateKey_element", + FT_NONE, BASE_NONE, NULL, 0, + "PrivateKeyInfo", HFILL }}, + { &hf_crmf_identifier, + { "identifier", "crmf.identifier", + FT_UINT32, BASE_DEC, VALS(crmf_T_identifier_vals), 0, + NULL, HFILL }}, + { &hf_crmf_string, + { "string", "crmf.string", + FT_STRING, BASE_NONE, NULL, 0, + "UTF8String", HFILL }}, + { &hf_crmf_generalName, + { "generalName", "crmf.generalName", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_privkey_version, + { "version", "crmf.version", + FT_INT32, BASE_DEC, NULL, 0, + "INTEGER", HFILL }}, + { &hf_crmf_privateKeyAlgorithm, + { "privateKeyAlgorithm", "crmf.privateKeyAlgorithm_element", + FT_NONE, BASE_NONE, NULL, 0, + "AlgorithmIdentifier", HFILL }}, + { &hf_crmf_privateKey, + { "privateKey", "crmf.privateKey", + FT_BYTES, BASE_NONE, NULL, 0, + "OCTET_STRING", HFILL }}, + { &hf_crmf_attributes, + { "attributes", "crmf.attributes", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL }}, + { &hf_crmf_Attributes_item, + { "Attribute", "crmf.Attribute_element", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL }}, + }; + + /* List of subtrees */ + static gint *ett[] = { + &ett_crmf_CertReqMessages, + &ett_crmf_CertReqMsg, + &ett_crmf_SEQUENCE_SIZE_1_MAX_OF_AttributeTypeAndValue, + &ett_crmf_CertRequest, + &ett_crmf_CertTemplate, + &ett_crmf_OptionalValidity, + &ett_crmf_Controls, + &ett_crmf_AttributeTypeAndValue, + &ett_crmf_ProofOfPossession, + &ett_crmf_POPOSigningKey, + &ett_crmf_POPOSigningKeyInput, + &ett_crmf_T_authInfo, + &ett_crmf_PKMACValue, + &ett_crmf_PBMParameter, + &ett_crmf_POPOPrivKey, + &ett_crmf_PKIPublicationInfo, + &ett_crmf_SEQUENCE_SIZE_1_MAX_OF_SinglePubInfo, + &ett_crmf_SinglePubInfo, + &ett_crmf_PKIArchiveOptions, + &ett_crmf_EncryptedKey, + &ett_crmf_EncryptedValue, + &ett_crmf_CertId, + &ett_crmf_EncKeyWithID, + &ett_crmf_T_identifier, + &ett_crmf_PrivateKeyInfo, + &ett_crmf_Attributes, + }; + + /* Register protocol */ + proto_crmf = proto_register_protocol(PNAME, PSNAME, PFNAME); + + /* Register fields and subtrees */ + proto_register_field_array(proto_crmf, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + +} + + +/*--- proto_reg_handoff_crmf -------------------------------------------*/ +void proto_reg_handoff_crmf(void) { + oid_add_from_string("id-pkip","1.3.6.1.5.5.7.5"); + oid_add_from_string("id-regCtrl","1.3.6.1.5.5.7.5.1"); + oid_add_from_string("id-regInfo","1.3.6.1.5.5.7.5.2"); + register_ber_oid_dissector("1.2.840.113549.1.9.16.1.21", dissect_EncKeyWithID_PDU, proto_crmf, "id-ct-encKeyWithID"); + register_ber_oid_dissector("1.2.840.113533.7.66.13", dissect_PBMParameter_PDU, proto_crmf, "PasswordBasedMac"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.1.1", dissect_RegToken_PDU, proto_crmf, "id-regCtrl-regToken"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.1.2", dissect_Authenticator_PDU, proto_crmf, "id-regCtrl-authenticator"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.1.3", dissect_PKIPublicationInfo_PDU, proto_crmf, "id-regCtrl-pkiPublicationInfo"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.1.4", dissect_PKIArchiveOptions_PDU, proto_crmf, "id-regCtrl-pkiArchiveOptions"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.1.5", dissect_OldCertId_PDU, proto_crmf, "id-regCtrl-oldCertID"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.1.6", dissect_ProtocolEncrKey_PDU, proto_crmf, "id-regCtrl-protocolEncrKey"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.2.1", dissect_UTF8Pairs_PDU, proto_crmf, "id-regInfo-utf8Pairs"); + register_ber_oid_dissector("1.3.6.1.5.5.7.5.2.2", dissect_CertReq_PDU, proto_crmf, "id-regInfo-certReq"); + +} + |