summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-x509ce.c
diff options
context:
space:
mode:
Diffstat (limited to 'epan/dissectors/packet-x509ce.c')
-rw-r--r--epan/dissectors/packet-x509ce.c3084
1 files changed, 3084 insertions, 0 deletions
diff --git a/epan/dissectors/packet-x509ce.c b/epan/dissectors/packet-x509ce.c
new file mode 100644
index 00000000..fac6a43e
--- /dev/null
+++ b/epan/dissectors/packet-x509ce.c
@@ -0,0 +1,3084 @@
+/* Do not modify this file. Changes will be overwritten. */
+/* Generated automatically by the ASN.1 to Wireshark dissector compiler */
+/* packet-x509ce.c */
+/* asn2wrs.py -b -L -p x509ce -c ./x509ce.cnf -s ./packet-x509ce-template -D . -O ../.. CertificateExtensions.asn CertificateExtensionsRFC9310.asn CertificateExtensionsCiplus.asn */
+
+/* packet-x509ce.c
+ * Routines for X.509 Certificate Extensions packet dissection
+ * Ronnie Sahlberg 2004
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "config.h"
+
+#include <epan/packet.h>
+#include <epan/asn1.h>
+#include <epan/oids.h>
+
+#include "packet-ber.h"
+#include "packet-x509ce.h"
+#include "packet-x509af.h"
+#include "packet-x509if.h"
+#include "packet-x509sat.h"
+#include "packet-p1.h"
+
+#define PNAME "X.509 Certificate Extensions"
+#define PSNAME "X509CE"
+#define PFNAME "x509ce"
+
+void proto_register_x509ce(void);
+void proto_reg_handoff_x509ce(void);
+
+/* Initialize the protocol and registered fields */
+static int proto_x509ce = -1;
+static int hf_x509ce_id_ce_invalidityDate = -1;
+static int hf_x509ce_id_ce_baseUpdateTime = -1;
+static int hf_x509ce_object_identifier_id = -1;
+static int hf_x509ce_IPAddress_ipv4 = -1;
+static int hf_x509ce_IPAddress_ipv6 = -1;
+static int hf_x509ce_AuthorityKeyIdentifier_PDU = -1; /* AuthorityKeyIdentifier */
+static int hf_x509ce_SubjectKeyIdentifier_PDU = -1; /* SubjectKeyIdentifier */
+static int hf_x509ce_KeyUsage_PDU = -1; /* KeyUsage */
+static int hf_x509ce_KeyPurposeIDs_PDU = -1; /* KeyPurposeIDs */
+static int hf_x509ce_PrivateKeyUsagePeriod_PDU = -1; /* PrivateKeyUsagePeriod */
+static int hf_x509ce_CertificatePoliciesSyntax_PDU = -1; /* CertificatePoliciesSyntax */
+static int hf_x509ce_PolicyMappingsSyntax_PDU = -1; /* PolicyMappingsSyntax */
+static int hf_x509ce_GeneralNames_PDU = -1; /* GeneralNames */
+static int hf_x509ce_AttributesSyntax_PDU = -1; /* AttributesSyntax */
+static int hf_x509ce_BasicConstraintsSyntax_PDU = -1; /* BasicConstraintsSyntax */
+static int hf_x509ce_NameConstraintsSyntax_PDU = -1; /* NameConstraintsSyntax */
+static int hf_x509ce_PolicyConstraintsSyntax_PDU = -1; /* PolicyConstraintsSyntax */
+static int hf_x509ce_SkipCerts_PDU = -1; /* SkipCerts */
+static int hf_x509ce_CRLNumber_PDU = -1; /* CRLNumber */
+static int hf_x509ce_CRLReason_PDU = -1; /* CRLReason */
+static int hf_x509ce_HoldInstruction_PDU = -1; /* HoldInstruction */
+static int hf_x509ce_CRLScopeSyntax_PDU = -1; /* CRLScopeSyntax */
+static int hf_x509ce_StatusReferrals_PDU = -1; /* StatusReferrals */
+static int hf_x509ce_CRLStreamIdentifier_PDU = -1; /* CRLStreamIdentifier */
+static int hf_x509ce_OrderedListSyntax_PDU = -1; /* OrderedListSyntax */
+static int hf_x509ce_DeltaInformation_PDU = -1; /* DeltaInformation */
+static int hf_x509ce_CRLDistPointsSyntax_PDU = -1; /* CRLDistPointsSyntax */
+static int hf_x509ce_IssuingDistPointSyntax_PDU = -1; /* IssuingDistPointSyntax */
+static int hf_x509ce_BaseCRLNumber_PDU = -1; /* BaseCRLNumber */
+static int hf_x509ce_ToBeRevokedSyntax_PDU = -1; /* ToBeRevokedSyntax */
+static int hf_x509ce_RevokedGroupsSyntax_PDU = -1; /* RevokedGroupsSyntax */
+static int hf_x509ce_ExpiredCertsOnCRL_PDU = -1; /* ExpiredCertsOnCRL */
+static int hf_x509ce_AAIssuingDistPointSyntax_PDU = -1; /* AAIssuingDistPointSyntax */
+static int hf_x509ce_CertificateAssertion_PDU = -1; /* CertificateAssertion */
+static int hf_x509ce_CertificatePairExactAssertion_PDU = -1; /* CertificatePairExactAssertion */
+static int hf_x509ce_CertificatePairAssertion_PDU = -1; /* CertificatePairAssertion */
+static int hf_x509ce_CertificateListExactAssertion_PDU = -1; /* CertificateListExactAssertion */
+static int hf_x509ce_CertificateListAssertion_PDU = -1; /* CertificateListAssertion */
+static int hf_x509ce_PkiPathMatchSyntax_PDU = -1; /* PkiPathMatchSyntax */
+static int hf_x509ce_EnhancedCertificateAssertion_PDU = -1; /* EnhancedCertificateAssertion */
+static int hf_x509ce_CertificateTemplate_PDU = -1; /* CertificateTemplate */
+static int hf_x509ce_NtdsCaSecurity_PDU = -1; /* NtdsCaSecurity */
+static int hf_x509ce_NtdsObjectSid_PDU = -1; /* NtdsObjectSid */
+static int hf_x509ce_EntrustVersionInfo_PDU = -1; /* EntrustVersionInfo */
+static int hf_x509ce_NFTypes_PDU = -1; /* NFTypes */
+static int hf_x509ce_ScramblerCapabilities_PDU = -1; /* ScramblerCapabilities */
+static int hf_x509ce_CiplusInfo_PDU = -1; /* CiplusInfo */
+static int hf_x509ce_CicamBrandId_PDU = -1; /* CicamBrandId */
+static int hf_x509ce_SecurityLevel_PDU = -1; /* SecurityLevel */
+static int hf_x509ce_keyIdentifier = -1; /* KeyIdentifier */
+static int hf_x509ce_authorityCertIssuer = -1; /* GeneralNames */
+static int hf_x509ce_authorityCertSerialNumber = -1; /* CertificateSerialNumber */
+static int hf_x509ce_KeyPurposeIDs_item = -1; /* KeyPurposeId */
+static int hf_x509ce_notBefore = -1; /* GeneralizedTime */
+static int hf_x509ce_notAfter = -1; /* GeneralizedTime */
+static int hf_x509ce_CertificatePoliciesSyntax_item = -1; /* PolicyInformation */
+static int hf_x509ce_policyIdentifier = -1; /* CertPolicyId */
+static int hf_x509ce_policyQualifiers = -1; /* SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo */
+static int hf_x509ce_policyQualifiers_item = -1; /* PolicyQualifierInfo */
+static int hf_x509ce_policyQualifierId = -1; /* T_policyQualifierId */
+static int hf_x509ce_qualifier = -1; /* T_qualifier */
+static int hf_x509ce_PolicyMappingsSyntax_item = -1; /* PolicyMappingsSyntax_item */
+static int hf_x509ce_issuerDomainPolicy = -1; /* CertPolicyId */
+static int hf_x509ce_subjectDomainPolicy = -1; /* CertPolicyId */
+static int hf_x509ce_GeneralNames_item = -1; /* GeneralName */
+static int hf_x509ce_otherName = -1; /* OtherName */
+static int hf_x509ce_rfc822Name = -1; /* IA5String */
+static int hf_x509ce_dNSName = -1; /* IA5String */
+static int hf_x509ce_x400Address = -1; /* ORAddress */
+static int hf_x509ce_directoryName = -1; /* Name */
+static int hf_x509ce_ediPartyName = -1; /* EDIPartyName */
+static int hf_x509ce_uniformResourceIdentifier = -1; /* T_uniformResourceIdentifier */
+static int hf_x509ce_iPAddress = -1; /* T_iPAddress */
+static int hf_x509ce_registeredID = -1; /* OBJECT_IDENTIFIER */
+static int hf_x509ce_type_id = -1; /* OtherNameType */
+static int hf_x509ce_value = -1; /* OtherNameValue */
+static int hf_x509ce_nameAssigner = -1; /* DirectoryString */
+static int hf_x509ce_partyName = -1; /* DirectoryString */
+static int hf_x509ce_AttributesSyntax_item = -1; /* Attribute */
+static int hf_x509ce_cA = -1; /* BOOLEAN */
+static int hf_x509ce_pathLenConstraint = -1; /* INTEGER_0_MAX */
+static int hf_x509ce_permittedSubtrees = -1; /* GeneralSubtrees */
+static int hf_x509ce_excludedSubtrees = -1; /* GeneralSubtrees */
+static int hf_x509ce_GeneralSubtrees_item = -1; /* GeneralSubtree */
+static int hf_x509ce_base = -1; /* GeneralName */
+static int hf_x509ce_minimum = -1; /* BaseDistance */
+static int hf_x509ce_maximum = -1; /* BaseDistance */
+static int hf_x509ce_requireExplicitPolicy = -1; /* SkipCerts */
+static int hf_x509ce_inhibitPolicyMapping = -1; /* SkipCerts */
+static int hf_x509ce_CRLScopeSyntax_item = -1; /* PerAuthorityScope */
+static int hf_x509ce_authorityName = -1; /* GeneralName */
+static int hf_x509ce_distributionPoint = -1; /* DistributionPointName */
+static int hf_x509ce_onlyContains = -1; /* OnlyCertificateTypes */
+static int hf_x509ce_onlySomeReasons = -1; /* ReasonFlags */
+static int hf_x509ce_serialNumberRange = -1; /* NumberRange */
+static int hf_x509ce_subjectKeyIdRange = -1; /* NumberRange */
+static int hf_x509ce_nameSubtrees = -1; /* GeneralNames */
+static int hf_x509ce_baseRevocationInfo = -1; /* BaseRevocationInfo */
+static int hf_x509ce_startingNumber = -1; /* INTEGER */
+static int hf_x509ce_endingNumber = -1; /* INTEGER */
+static int hf_x509ce_modulus = -1; /* INTEGER */
+static int hf_x509ce_cRLStreamIdentifier = -1; /* CRLStreamIdentifier */
+static int hf_x509ce_cRLNumber = -1; /* CRLNumber */
+static int hf_x509ce_baseThisUpdate = -1; /* GeneralizedTime */
+static int hf_x509ce_StatusReferrals_item = -1; /* StatusReferral */
+static int hf_x509ce_cRLReferral = -1; /* CRLReferral */
+static int hf_x509ce_crlr_issuer = -1; /* GeneralName */
+static int hf_x509ce_location = -1; /* GeneralName */
+static int hf_x509ce_deltaRefInfo = -1; /* DeltaRefInfo */
+static int hf_x509ce_cRLScope = -1; /* CRLScopeSyntax */
+static int hf_x509ce_lastUpdate = -1; /* GeneralizedTime */
+static int hf_x509ce_lastChangedCRL = -1; /* GeneralizedTime */
+static int hf_x509ce_deltaLocation = -1; /* GeneralName */
+static int hf_x509ce_lastDelta = -1; /* GeneralizedTime */
+static int hf_x509ce_nextDelta = -1; /* GeneralizedTime */
+static int hf_x509ce_CRLDistPointsSyntax_item = -1; /* DistributionPoint */
+static int hf_x509ce_reasons = -1; /* ReasonFlags */
+static int hf_x509ce_cRLIssuer = -1; /* GeneralNames */
+static int hf_x509ce_fullName = -1; /* GeneralNames */
+static int hf_x509ce_nameRelativeToCRLIssuer = -1; /* RelativeDistinguishedName */
+static int hf_x509ce_onlyContainsUserPublicKeyCerts = -1; /* BOOLEAN */
+static int hf_x509ce_onlyContainsCACerts = -1; /* BOOLEAN */
+static int hf_x509ce_indirectCRL = -1; /* BOOLEAN */
+static int hf_x509ce_ToBeRevokedSyntax_item = -1; /* ToBeRevokedGroup */
+static int hf_x509ce_certificateIssuer = -1; /* GeneralName */
+static int hf_x509ce_reasonInfo = -1; /* ReasonInfo */
+static int hf_x509ce_revocationTime = -1; /* GeneralizedTime */
+static int hf_x509ce_certificateGroup = -1; /* CertificateGroup */
+static int hf_x509ce_reasonCode = -1; /* CRLReason */
+static int hf_x509ce_holdInstructionCode = -1; /* HoldInstruction */
+static int hf_x509ce_serialNumbers = -1; /* CertificateSerialNumbers */
+static int hf_x509ce_certificateGroupNumberRange = -1; /* CertificateGroupNumberRange */
+static int hf_x509ce_nameSubtree = -1; /* GeneralName */
+static int hf_x509ce_CertificateSerialNumbers_item = -1; /* CertificateSerialNumber */
+static int hf_x509ce_RevokedGroupsSyntax_item = -1; /* RevokedGroup */
+static int hf_x509ce_invalidityDate = -1; /* GeneralizedTime */
+static int hf_x509ce_revokedcertificateGroup = -1; /* RevokedCertificateGroup */
+static int hf_x509ce_containsUserAttributeCerts = -1; /* BOOLEAN */
+static int hf_x509ce_containsAACerts = -1; /* BOOLEAN */
+static int hf_x509ce_containsSOAPublicKeyCerts = -1; /* BOOLEAN */
+static int hf_x509ce_serialNumber = -1; /* CertificateSerialNumber */
+static int hf_x509ce_issuer = -1; /* Name */
+static int hf_x509ce_subjectKeyIdentifier = -1; /* SubjectKeyIdentifier */
+static int hf_x509ce_authorityKeyIdentifier = -1; /* AuthorityKeyIdentifier */
+static int hf_x509ce_certificateValid = -1; /* Time */
+static int hf_x509ce_privateKeyValid = -1; /* GeneralizedTime */
+static int hf_x509ce_subjectPublicKeyAlgID = -1; /* OBJECT_IDENTIFIER */
+static int hf_x509ce_keyUsage = -1; /* KeyUsage */
+static int hf_x509ce_subjectAltNameType = -1; /* AltNameType */
+static int hf_x509ce_policy = -1; /* CertPolicySet */
+static int hf_x509ce_pathToName = -1; /* Name */
+static int hf_x509ce_subject = -1; /* Name */
+static int hf_x509ce_nameConstraints = -1; /* NameConstraintsSyntax */
+static int hf_x509ce_builtinNameForm = -1; /* T_builtinNameForm */
+static int hf_x509ce_otherNameForm = -1; /* OBJECT_IDENTIFIER */
+static int hf_x509ce_CertPolicySet_item = -1; /* CertPolicyId */
+static int hf_x509ce_cpea_issuedToThisCAAssertion = -1; /* CertificateExactAssertion */
+static int hf_x509ce_cpea_issuedByThisCAAssertion = -1; /* CertificateExactAssertion */
+static int hf_x509ce_issuedToThisCAAssertion = -1; /* CertificateAssertion */
+static int hf_x509ce_issuedByThisCAAssertion = -1; /* CertificateAssertion */
+static int hf_x509ce_thisUpdate = -1; /* Time */
+static int hf_x509ce_minCRLNumber = -1; /* CRLNumber */
+static int hf_x509ce_maxCRLNumber = -1; /* CRLNumber */
+static int hf_x509ce_reasonFlags = -1; /* ReasonFlags */
+static int hf_x509ce_dateAndTime = -1; /* Time */
+static int hf_x509ce_firstIssuer = -1; /* Name */
+static int hf_x509ce_lastSubject = -1; /* Name */
+static int hf_x509ce_subjectAltName = -1; /* AltName */
+static int hf_x509ce_enhancedPathToName = -1; /* GeneralNames */
+static int hf_x509ce_altnameType = -1; /* AltNameType */
+static int hf_x509ce_altNameValue = -1; /* GeneralName */
+static int hf_x509ce_templateID = -1; /* OBJECT_IDENTIFIER */
+static int hf_x509ce_templateMajorVersion = -1; /* INTEGER */
+static int hf_x509ce_templateMinorVersion = -1; /* INTEGER */
+static int hf_x509ce_ntdsObjectSid = -1; /* NtdsObjectSid */
+static int hf_x509ce_type_id_01 = -1; /* OBJECT_IDENTIFIER */
+static int hf_x509ce_sid = -1; /* PrintableString */
+static int hf_x509ce_entrustVers = -1; /* GeneralString */
+static int hf_x509ce_entrustVersInfoFlags = -1; /* EntrustInfoFlags */
+static int hf_x509ce_NFTypes_item = -1; /* NFType */
+static int hf_x509ce_capability = -1; /* INTEGER_0_MAX */
+static int hf_x509ce_version = -1; /* INTEGER_0_MAX */
+/* named bits */
+static int hf_x509ce_KeyUsage_digitalSignature = -1;
+static int hf_x509ce_KeyUsage_contentCommitment = -1;
+static int hf_x509ce_KeyUsage_keyEncipherment = -1;
+static int hf_x509ce_KeyUsage_dataEncipherment = -1;
+static int hf_x509ce_KeyUsage_keyAgreement = -1;
+static int hf_x509ce_KeyUsage_keyCertSign = -1;
+static int hf_x509ce_KeyUsage_cRLSign = -1;
+static int hf_x509ce_KeyUsage_encipherOnly = -1;
+static int hf_x509ce_KeyUsage_decipherOnly = -1;
+static int hf_x509ce_OnlyCertificateTypes_user = -1;
+static int hf_x509ce_OnlyCertificateTypes_authority = -1;
+static int hf_x509ce_OnlyCertificateTypes_attribute = -1;
+static int hf_x509ce_ReasonFlags_unused = -1;
+static int hf_x509ce_ReasonFlags_keyCompromise = -1;
+static int hf_x509ce_ReasonFlags_cACompromise = -1;
+static int hf_x509ce_ReasonFlags_affiliationChanged = -1;
+static int hf_x509ce_ReasonFlags_superseded = -1;
+static int hf_x509ce_ReasonFlags_cessationOfOperation = -1;
+static int hf_x509ce_ReasonFlags_certificateHold = -1;
+static int hf_x509ce_ReasonFlags_privilegeWithdrawn = -1;
+static int hf_x509ce_ReasonFlags_aACompromise = -1;
+static int hf_x509ce_EntrustInfoFlags_keyUpdateAllowed = -1;
+static int hf_x509ce_EntrustInfoFlags_newExtensions = -1;
+static int hf_x509ce_EntrustInfoFlags_pKIXCertificate = -1;
+static int hf_x509ce_EntrustInfoFlags_enterpriseCategory = -1;
+static int hf_x509ce_EntrustInfoFlags_webCategory = -1;
+static int hf_x509ce_EntrustInfoFlags_sETCategory = -1;
+
+/* Initialize the subtree pointers */
+static gint ett_x509ce_AuthorityKeyIdentifier = -1;
+static gint ett_x509ce_KeyUsage = -1;
+static gint ett_x509ce_KeyPurposeIDs = -1;
+static gint ett_x509ce_PrivateKeyUsagePeriod = -1;
+static gint ett_x509ce_CertificatePoliciesSyntax = -1;
+static gint ett_x509ce_PolicyInformation = -1;
+static gint ett_x509ce_SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo = -1;
+static gint ett_x509ce_PolicyQualifierInfo = -1;
+static gint ett_x509ce_PolicyMappingsSyntax = -1;
+static gint ett_x509ce_PolicyMappingsSyntax_item = -1;
+static gint ett_x509ce_GeneralNames = -1;
+static gint ett_x509ce_GeneralName = -1;
+static gint ett_x509ce_OtherName = -1;
+static gint ett_x509ce_EDIPartyName = -1;
+static gint ett_x509ce_AttributesSyntax = -1;
+static gint ett_x509ce_BasicConstraintsSyntax = -1;
+static gint ett_x509ce_NameConstraintsSyntax = -1;
+static gint ett_x509ce_GeneralSubtrees = -1;
+static gint ett_x509ce_GeneralSubtree = -1;
+static gint ett_x509ce_PolicyConstraintsSyntax = -1;
+static gint ett_x509ce_CRLScopeSyntax = -1;
+static gint ett_x509ce_PerAuthorityScope = -1;
+static gint ett_x509ce_OnlyCertificateTypes = -1;
+static gint ett_x509ce_NumberRange = -1;
+static gint ett_x509ce_BaseRevocationInfo = -1;
+static gint ett_x509ce_StatusReferrals = -1;
+static gint ett_x509ce_StatusReferral = -1;
+static gint ett_x509ce_CRLReferral = -1;
+static gint ett_x509ce_DeltaRefInfo = -1;
+static gint ett_x509ce_DeltaInformation = -1;
+static gint ett_x509ce_CRLDistPointsSyntax = -1;
+static gint ett_x509ce_DistributionPoint = -1;
+static gint ett_x509ce_DistributionPointName = -1;
+static gint ett_x509ce_ReasonFlags = -1;
+static gint ett_x509ce_IssuingDistPointSyntax = -1;
+static gint ett_x509ce_ToBeRevokedSyntax = -1;
+static gint ett_x509ce_ToBeRevokedGroup = -1;
+static gint ett_x509ce_ReasonInfo = -1;
+static gint ett_x509ce_CertificateGroup = -1;
+static gint ett_x509ce_CertificateGroupNumberRange = -1;
+static gint ett_x509ce_CertificateSerialNumbers = -1;
+static gint ett_x509ce_RevokedGroupsSyntax = -1;
+static gint ett_x509ce_RevokedGroup = -1;
+static gint ett_x509ce_RevokedCertificateGroup = -1;
+static gint ett_x509ce_AAIssuingDistPointSyntax = -1;
+static gint ett_x509ce_CertificateExactAssertion = -1;
+static gint ett_x509ce_CertificateAssertion = -1;
+static gint ett_x509ce_AltNameType = -1;
+static gint ett_x509ce_CertPolicySet = -1;
+static gint ett_x509ce_CertificatePairExactAssertion = -1;
+static gint ett_x509ce_CertificatePairAssertion = -1;
+static gint ett_x509ce_CertificateListExactAssertion = -1;
+static gint ett_x509ce_CertificateListAssertion = -1;
+static gint ett_x509ce_PkiPathMatchSyntax = -1;
+static gint ett_x509ce_EnhancedCertificateAssertion = -1;
+static gint ett_x509ce_AltName = -1;
+static gint ett_x509ce_CertificateTemplate = -1;
+static gint ett_x509ce_NtdsCaSecurity = -1;
+static gint ett_x509ce_NtdsObjectSid_U = -1;
+static gint ett_x509ce_EntrustVersionInfo = -1;
+static gint ett_x509ce_EntrustInfoFlags = -1;
+static gint ett_x509ce_NFTypes = -1;
+static gint ett_x509ce_ScramblerCapabilities = -1;
+
+
+int
+dissect_x509ce_KeyIdentifier(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_octet_string(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_OtherNameType(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_object_identifier_str(implicit_tag, actx, tree, tvb, offset, hf_index, &actx->external.direct_reference);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_OtherNameValue(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset=call_ber_oid_callback(actx->external.direct_reference, tvb, offset, actx->pinfo, tree, NULL);
+
+
+ return offset;
+}
+
+
+static const ber_sequence_t OtherName_sequence[] = {
+ { &hf_x509ce_type_id , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_OtherNameType },
+ { &hf_x509ce_value , BER_CLASS_CON, 0, 0, dissect_x509ce_OtherNameValue },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_OtherName(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ OtherName_sequence, hf_index, ett_x509ce_OtherName);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_IA5String(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
+ actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t EDIPartyName_sequence[] = {
+ { &hf_x509ce_nameAssigner , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509sat_DirectoryString },
+ { &hf_x509ce_partyName , BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_x509sat_DirectoryString },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_EDIPartyName(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ EDIPartyName_sequence, hf_index, ett_x509ce_EDIPartyName);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_T_uniformResourceIdentifier(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
+ actx, tree, tvb, offset, hf_index,
+ NULL);
+
+
+ proto_item_set_url(actx->created_item);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_T_iPAddress(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ switch (tvb_reported_length(tvb)) {
+ case 4: /* IPv4 */
+ proto_tree_add_item(tree, hf_x509ce_IPAddress_ipv4, tvb, offset, 4, ENC_BIG_ENDIAN);
+ offset += 4;
+ break;
+ case 16: /* IPv6 */
+ proto_tree_add_item(tree, hf_x509ce_IPAddress_ipv6, tvb, offset, 16, ENC_NA);
+ offset += 16;
+ break;
+ }
+
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_OBJECT_IDENTIFIER(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_object_identifier(implicit_tag, actx, tree, tvb, offset, hf_index, NULL);
+
+ return offset;
+}
+
+
+const value_string x509ce_GeneralName_vals[] = {
+ { 0, "otherName" },
+ { 1, "rfc822Name" },
+ { 2, "dNSName" },
+ { 3, "x400Address" },
+ { 4, "directoryName" },
+ { 5, "ediPartyName" },
+ { 6, "uniformResourceIdentifier" },
+ { 7, "iPAddress" },
+ { 8, "registeredID" },
+ { 0, NULL }
+};
+
+static const ber_choice_t GeneralName_choice[] = {
+ { 0, &hf_x509ce_otherName , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_x509ce_OtherName },
+ { 1, &hf_x509ce_rfc822Name , BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_x509ce_IA5String },
+ { 2, &hf_x509ce_dNSName , BER_CLASS_CON, 2, BER_FLAGS_IMPLTAG, dissect_x509ce_IA5String },
+ { 3, &hf_x509ce_x400Address , BER_CLASS_CON, 3, BER_FLAGS_IMPLTAG, dissect_p1_ORAddress },
+ { 4, &hf_x509ce_directoryName, BER_CLASS_CON, 4, BER_FLAGS_IMPLTAG, dissect_x509if_Name },
+ { 5, &hf_x509ce_ediPartyName , BER_CLASS_CON, 5, BER_FLAGS_IMPLTAG, dissect_x509ce_EDIPartyName },
+ { 6, &hf_x509ce_uniformResourceIdentifier, BER_CLASS_CON, 6, BER_FLAGS_IMPLTAG, dissect_x509ce_T_uniformResourceIdentifier },
+ { 7, &hf_x509ce_iPAddress , BER_CLASS_CON, 7, BER_FLAGS_IMPLTAG, dissect_x509ce_T_iPAddress },
+ { 8, &hf_x509ce_registeredID , BER_CLASS_CON, 8, BER_FLAGS_IMPLTAG, dissect_x509ce_OBJECT_IDENTIFIER },
+ { 0, NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_GeneralName(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_choice(actx, tree, tvb, offset,
+ GeneralName_choice, hf_index, ett_x509ce_GeneralName,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t GeneralNames_sequence_of[1] = {
+ { &hf_x509ce_GeneralNames_item, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+};
+
+int
+dissect_x509ce_GeneralNames(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ GeneralNames_sequence_of, hf_index, ett_x509ce_GeneralNames);
+
+ return offset;
+}
+
+
+static const ber_sequence_t AuthorityKeyIdentifier_sequence[] = {
+ { &hf_x509ce_keyIdentifier, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_KeyIdentifier },
+ { &hf_x509ce_authorityCertIssuer, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralNames },
+ { &hf_x509ce_authorityCertSerialNumber, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509af_CertificateSerialNumber },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_AuthorityKeyIdentifier(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ AuthorityKeyIdentifier_sequence, hf_index, ett_x509ce_AuthorityKeyIdentifier);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_SubjectKeyIdentifier(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_x509ce_KeyIdentifier(implicit_tag, tvb, offset, actx, tree, hf_index);
+
+ return offset;
+}
+
+
+static int * const KeyUsage_bits[] = {
+ &hf_x509ce_KeyUsage_digitalSignature,
+ &hf_x509ce_KeyUsage_contentCommitment,
+ &hf_x509ce_KeyUsage_keyEncipherment,
+ &hf_x509ce_KeyUsage_dataEncipherment,
+ &hf_x509ce_KeyUsage_keyAgreement,
+ &hf_x509ce_KeyUsage_keyCertSign,
+ &hf_x509ce_KeyUsage_cRLSign,
+ &hf_x509ce_KeyUsage_encipherOnly,
+ &hf_x509ce_KeyUsage_decipherOnly,
+ NULL
+};
+
+int
+dissect_x509ce_KeyUsage(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
+ KeyUsage_bits, 9, hf_index, ett_x509ce_KeyUsage,
+ NULL);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_KeyPurposeId(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_object_identifier(implicit_tag, actx, tree, tvb, offset, hf_index, NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t KeyPurposeIDs_sequence_of[1] = {
+ { &hf_x509ce_KeyPurposeIDs_item, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_KeyPurposeId },
+};
+
+int
+dissect_x509ce_KeyPurposeIDs(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ KeyPurposeIDs_sequence_of, hf_index, ett_x509ce_KeyPurposeIDs);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_GeneralizedTime(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_GeneralizedTime(implicit_tag, actx, tree, tvb, offset, hf_index);
+
+ return offset;
+}
+
+
+static const ber_sequence_t PrivateKeyUsagePeriod_sequence[] = {
+ { &hf_x509ce_notBefore , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { &hf_x509ce_notAfter , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_PrivateKeyUsagePeriod(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ PrivateKeyUsagePeriod_sequence, hf_index, ett_x509ce_PrivateKeyUsagePeriod);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_CertPolicyId(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_object_identifier(implicit_tag, actx, tree, tvb, offset, hf_index, NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_T_policyQualifierId(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_object_identifier_str(implicit_tag, actx, tree, tvb, offset, hf_x509ce_object_identifier_id, &actx->external.direct_reference);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_T_qualifier(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset=call_ber_oid_callback(actx->external.direct_reference, tvb, offset, actx->pinfo, tree, NULL);
+
+
+ return offset;
+}
+
+
+static const ber_sequence_t PolicyQualifierInfo_sequence[] = {
+ { &hf_x509ce_policyQualifierId, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_T_policyQualifierId },
+ { &hf_x509ce_qualifier , BER_CLASS_ANY, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_T_qualifier },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_PolicyQualifierInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ PolicyQualifierInfo_sequence, hf_index, ett_x509ce_PolicyQualifierInfo);
+
+ return offset;
+}
+
+
+static const ber_sequence_t SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo_sequence_of[1] = {
+ { &hf_x509ce_policyQualifiers_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_PolicyQualifierInfo },
+};
+
+static int
+dissect_x509ce_SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo_sequence_of, hf_index, ett_x509ce_SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo);
+
+ return offset;
+}
+
+
+static const ber_sequence_t PolicyInformation_sequence[] = {
+ { &hf_x509ce_policyIdentifier, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_CertPolicyId },
+ { &hf_x509ce_policyQualifiers, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_PolicyInformation(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ PolicyInformation_sequence, hf_index, ett_x509ce_PolicyInformation);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificatePoliciesSyntax_sequence_of[1] = {
+ { &hf_x509ce_CertificatePoliciesSyntax_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_PolicyInformation },
+};
+
+int
+dissect_x509ce_CertificatePoliciesSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ CertificatePoliciesSyntax_sequence_of, hf_index, ett_x509ce_CertificatePoliciesSyntax);
+
+ return offset;
+}
+
+
+static const ber_sequence_t PolicyMappingsSyntax_item_sequence[] = {
+ { &hf_x509ce_issuerDomainPolicy, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_CertPolicyId },
+ { &hf_x509ce_subjectDomainPolicy, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_CertPolicyId },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_PolicyMappingsSyntax_item(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ PolicyMappingsSyntax_item_sequence, hf_index, ett_x509ce_PolicyMappingsSyntax_item);
+
+ return offset;
+}
+
+
+static const ber_sequence_t PolicyMappingsSyntax_sequence_of[1] = {
+ { &hf_x509ce_PolicyMappingsSyntax_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_PolicyMappingsSyntax_item },
+};
+
+int
+dissect_x509ce_PolicyMappingsSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ PolicyMappingsSyntax_sequence_of, hf_index, ett_x509ce_PolicyMappingsSyntax);
+
+ return offset;
+}
+
+
+static const ber_sequence_t AttributesSyntax_sequence_of[1] = {
+ { &hf_x509ce_AttributesSyntax_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509if_Attribute },
+};
+
+int
+dissect_x509ce_AttributesSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ AttributesSyntax_sequence_of, hf_index, ett_x509ce_AttributesSyntax);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_BOOLEAN(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_boolean(implicit_tag, actx, tree, tvb, offset, hf_index, NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_INTEGER_0_MAX(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer64(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t BasicConstraintsSyntax_sequence[] = {
+ { &hf_x509ce_cA , BER_CLASS_UNI, BER_UNI_TAG_BOOLEAN, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_BOOLEAN },
+ { &hf_x509ce_pathLenConstraint, BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_INTEGER_0_MAX },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_BasicConstraintsSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ BasicConstraintsSyntax_sequence, hf_index, ett_x509ce_BasicConstraintsSyntax);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_BaseDistance(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer64(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t GeneralSubtree_sequence[] = {
+ { &hf_x509ce_base , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_minimum , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BaseDistance },
+ { &hf_x509ce_maximum , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BaseDistance },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_GeneralSubtree(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ GeneralSubtree_sequence, hf_index, ett_x509ce_GeneralSubtree);
+
+ return offset;
+}
+
+
+static const ber_sequence_t GeneralSubtrees_sequence_of[1] = {
+ { &hf_x509ce_GeneralSubtrees_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralSubtree },
+};
+
+int
+dissect_x509ce_GeneralSubtrees(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ GeneralSubtrees_sequence_of, hf_index, ett_x509ce_GeneralSubtrees);
+
+ return offset;
+}
+
+
+static const ber_sequence_t NameConstraintsSyntax_sequence[] = {
+ { &hf_x509ce_permittedSubtrees, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralSubtrees },
+ { &hf_x509ce_excludedSubtrees, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralSubtrees },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_NameConstraintsSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ NameConstraintsSyntax_sequence, hf_index, ett_x509ce_NameConstraintsSyntax);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_SkipCerts(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer64(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t PolicyConstraintsSyntax_sequence[] = {
+ { &hf_x509ce_requireExplicitPolicy, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_SkipCerts },
+ { &hf_x509ce_inhibitPolicyMapping, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_SkipCerts },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_PolicyConstraintsSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ PolicyConstraintsSyntax_sequence, hf_index, ett_x509ce_PolicyConstraintsSyntax);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_CRLNumber(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer64(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+const value_string x509ce_CRLReason_vals[] = {
+ { 0, "unspecified" },
+ { 1, "keyCompromise" },
+ { 2, "cACompromise" },
+ { 3, "affiliationChanged" },
+ { 4, "superseded" },
+ { 5, "cessationOfOperation" },
+ { 6, "certificateHold" },
+ { 8, "removeFromCRL" },
+ { 9, "privilegeWithdrawn" },
+ { 10, "aaCompromise" },
+ { 0, NULL }
+};
+
+
+int
+dissect_x509ce_CRLReason(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_HoldInstruction(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_object_identifier(implicit_tag, actx, tree, tvb, offset, hf_index, NULL);
+
+ return offset;
+}
+
+
+const value_string x509ce_DistributionPointName_vals[] = {
+ { 0, "fullName" },
+ { 1, "nameRelativeToCRLIssuer" },
+ { 0, NULL }
+};
+
+static const ber_choice_t DistributionPointName_choice[] = {
+ { 0, &hf_x509ce_fullName , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralNames },
+ { 1, &hf_x509ce_nameRelativeToCRLIssuer, BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_x509if_RelativeDistinguishedName },
+ { 0, NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_DistributionPointName(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_choice(actx, tree, tvb, offset,
+ DistributionPointName_choice, hf_index, ett_x509ce_DistributionPointName,
+ NULL);
+
+ return offset;
+}
+
+
+static int * const OnlyCertificateTypes_bits[] = {
+ &hf_x509ce_OnlyCertificateTypes_user,
+ &hf_x509ce_OnlyCertificateTypes_authority,
+ &hf_x509ce_OnlyCertificateTypes_attribute,
+ NULL
+};
+
+int
+dissect_x509ce_OnlyCertificateTypes(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
+ OnlyCertificateTypes_bits, 3, hf_index, ett_x509ce_OnlyCertificateTypes,
+ NULL);
+
+ return offset;
+}
+
+
+static int * const ReasonFlags_bits[] = {
+ &hf_x509ce_ReasonFlags_unused,
+ &hf_x509ce_ReasonFlags_keyCompromise,
+ &hf_x509ce_ReasonFlags_cACompromise,
+ &hf_x509ce_ReasonFlags_affiliationChanged,
+ &hf_x509ce_ReasonFlags_superseded,
+ &hf_x509ce_ReasonFlags_cessationOfOperation,
+ &hf_x509ce_ReasonFlags_certificateHold,
+ &hf_x509ce_ReasonFlags_privilegeWithdrawn,
+ &hf_x509ce_ReasonFlags_aACompromise,
+ NULL
+};
+
+int
+dissect_x509ce_ReasonFlags(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
+ ReasonFlags_bits, 9, hf_index, ett_x509ce_ReasonFlags,
+ NULL);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_INTEGER(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t NumberRange_sequence[] = {
+ { &hf_x509ce_startingNumber, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_INTEGER },
+ { &hf_x509ce_endingNumber , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_INTEGER },
+ { &hf_x509ce_modulus , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_INTEGER },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_NumberRange(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ NumberRange_sequence, hf_index, ett_x509ce_NumberRange);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_CRLStreamIdentifier(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer64(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t BaseRevocationInfo_sequence[] = {
+ { &hf_x509ce_cRLStreamIdentifier, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CRLStreamIdentifier },
+ { &hf_x509ce_cRLNumber , BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_x509ce_CRLNumber },
+ { &hf_x509ce_baseThisUpdate, BER_CLASS_CON, 2, BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_BaseRevocationInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ BaseRevocationInfo_sequence, hf_index, ett_x509ce_BaseRevocationInfo);
+
+ return offset;
+}
+
+
+static const ber_sequence_t PerAuthorityScope_sequence[] = {
+ { &hf_x509ce_authorityName, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_distributionPoint, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_DistributionPointName },
+ { &hf_x509ce_onlyContains , BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_OnlyCertificateTypes },
+ { &hf_x509ce_onlySomeReasons, BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_ReasonFlags },
+ { &hf_x509ce_serialNumberRange, BER_CLASS_CON, 5, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_NumberRange },
+ { &hf_x509ce_subjectKeyIdRange, BER_CLASS_CON, 6, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_NumberRange },
+ { &hf_x509ce_nameSubtrees , BER_CLASS_CON, 7, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralNames },
+ { &hf_x509ce_baseRevocationInfo, BER_CLASS_CON, 9, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BaseRevocationInfo },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_PerAuthorityScope(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ PerAuthorityScope_sequence, hf_index, ett_x509ce_PerAuthorityScope);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CRLScopeSyntax_sequence_of[1] = {
+ { &hf_x509ce_CRLScopeSyntax_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_PerAuthorityScope },
+};
+
+int
+dissect_x509ce_CRLScopeSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ CRLScopeSyntax_sequence_of, hf_index, ett_x509ce_CRLScopeSyntax);
+
+ return offset;
+}
+
+
+static const ber_sequence_t DeltaRefInfo_sequence[] = {
+ { &hf_x509ce_deltaLocation, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_lastDelta , BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralizedTime },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_DeltaRefInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ DeltaRefInfo_sequence, hf_index, ett_x509ce_DeltaRefInfo);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CRLReferral_sequence[] = {
+ { &hf_x509ce_crlr_issuer , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_location , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_deltaRefInfo , BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_DeltaRefInfo },
+ { &hf_x509ce_cRLScope , BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_CRLScopeSyntax },
+ { &hf_x509ce_lastUpdate , BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { &hf_x509ce_lastChangedCRL, BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_CRLReferral(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CRLReferral_sequence, hf_index, ett_x509ce_CRLReferral);
+
+ return offset;
+}
+
+
+const value_string x509ce_StatusReferral_vals[] = {
+ { 0, "cRLReferral" },
+ { 0, NULL }
+};
+
+static const ber_choice_t StatusReferral_choice[] = {
+ { 0, &hf_x509ce_cRLReferral , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_x509ce_CRLReferral },
+ { 0, NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_StatusReferral(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_choice(actx, tree, tvb, offset,
+ StatusReferral_choice, hf_index, ett_x509ce_StatusReferral,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t StatusReferrals_sequence_of[1] = {
+ { &hf_x509ce_StatusReferrals_item, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_StatusReferral },
+};
+
+int
+dissect_x509ce_StatusReferrals(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ StatusReferrals_sequence_of, hf_index, ett_x509ce_StatusReferrals);
+
+ return offset;
+}
+
+
+const value_string x509ce_OrderedListSyntax_vals[] = {
+ { 0, "ascSerialNum" },
+ { 1, "ascRevDate" },
+ { 0, NULL }
+};
+
+
+int
+dissect_x509ce_OrderedListSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t DeltaInformation_sequence[] = {
+ { &hf_x509ce_deltaLocation, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_nextDelta , BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralizedTime },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_DeltaInformation(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ DeltaInformation_sequence, hf_index, ett_x509ce_DeltaInformation);
+
+ return offset;
+}
+
+
+static const ber_sequence_t DistributionPoint_sequence[] = {
+ { &hf_x509ce_distributionPoint, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_DistributionPointName },
+ { &hf_x509ce_reasons , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_ReasonFlags },
+ { &hf_x509ce_cRLIssuer , BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralNames },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_DistributionPoint(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ DistributionPoint_sequence, hf_index, ett_x509ce_DistributionPoint);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CRLDistPointsSyntax_sequence_of[1] = {
+ { &hf_x509ce_CRLDistPointsSyntax_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_DistributionPoint },
+};
+
+int
+dissect_x509ce_CRLDistPointsSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ CRLDistPointsSyntax_sequence_of, hf_index, ett_x509ce_CRLDistPointsSyntax);
+
+ return offset;
+}
+
+
+static const ber_sequence_t IssuingDistPointSyntax_sequence[] = {
+ { &hf_x509ce_distributionPoint, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_DistributionPointName },
+ { &hf_x509ce_onlyContainsUserPublicKeyCerts, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BOOLEAN },
+ { &hf_x509ce_onlyContainsCACerts, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BOOLEAN },
+ { &hf_x509ce_onlySomeReasons, BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_ReasonFlags },
+ { &hf_x509ce_indirectCRL , BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BOOLEAN },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_IssuingDistPointSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ IssuingDistPointSyntax_sequence, hf_index, ett_x509ce_IssuingDistPointSyntax);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_BaseCRLNumber(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_x509ce_CRLNumber(implicit_tag, tvb, offset, actx, tree, hf_index);
+
+ return offset;
+}
+
+
+static const ber_sequence_t ReasonInfo_sequence[] = {
+ { &hf_x509ce_reasonCode , BER_CLASS_UNI, BER_UNI_TAG_ENUMERATED, BER_FLAGS_NOOWNTAG, dissect_x509ce_CRLReason },
+ { &hf_x509ce_holdInstructionCode, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_HoldInstruction },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_ReasonInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ ReasonInfo_sequence, hf_index, ett_x509ce_ReasonInfo);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificateSerialNumbers_sequence_of[1] = {
+ { &hf_x509ce_CertificateSerialNumbers_item, BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
+};
+
+static int
+dissect_x509ce_CertificateSerialNumbers(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ CertificateSerialNumbers_sequence_of, hf_index, ett_x509ce_CertificateSerialNumbers);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificateGroupNumberRange_sequence[] = {
+ { &hf_x509ce_startingNumber, BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_x509ce_INTEGER },
+ { &hf_x509ce_endingNumber , BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_x509ce_INTEGER },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_CertificateGroupNumberRange(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificateGroupNumberRange_sequence, hf_index, ett_x509ce_CertificateGroupNumberRange);
+
+ return offset;
+}
+
+
+static const value_string x509ce_CertificateGroup_vals[] = {
+ { 0, "serialNumbers" },
+ { 1, "serialNumberRange" },
+ { 2, "nameSubtree" },
+ { 0, NULL }
+};
+
+static const ber_choice_t CertificateGroup_choice[] = {
+ { 0, &hf_x509ce_serialNumbers, BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_x509ce_CertificateSerialNumbers },
+ { 1, &hf_x509ce_certificateGroupNumberRange, BER_CLASS_CON, 1, BER_FLAGS_IMPLTAG, dissect_x509ce_CertificateGroupNumberRange },
+ { 2, &hf_x509ce_nameSubtree , BER_CLASS_CON, 2, BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralName },
+ { 0, NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_CertificateGroup(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_choice(actx, tree, tvb, offset,
+ CertificateGroup_choice, hf_index, ett_x509ce_CertificateGroup,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t ToBeRevokedGroup_sequence[] = {
+ { &hf_x509ce_certificateIssuer, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_reasonInfo , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_ReasonInfo },
+ { &hf_x509ce_revocationTime, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralizedTime },
+ { &hf_x509ce_certificateGroup, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_CertificateGroup },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_ToBeRevokedGroup(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ ToBeRevokedGroup_sequence, hf_index, ett_x509ce_ToBeRevokedGroup);
+
+ return offset;
+}
+
+
+static const ber_sequence_t ToBeRevokedSyntax_sequence_of[1] = {
+ { &hf_x509ce_ToBeRevokedSyntax_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_ToBeRevokedGroup },
+};
+
+static int
+dissect_x509ce_ToBeRevokedSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ ToBeRevokedSyntax_sequence_of, hf_index, ett_x509ce_ToBeRevokedSyntax);
+
+ return offset;
+}
+
+
+static const value_string x509ce_RevokedCertificateGroup_vals[] = {
+ { 0, "serialNumberRange" },
+ { 1, "nameSubtree" },
+ { 0, NULL }
+};
+
+static const ber_choice_t RevokedCertificateGroup_choice[] = {
+ { 0, &hf_x509ce_serialNumberRange, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_NumberRange },
+ { 1, &hf_x509ce_nameSubtree , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralName },
+ { 0, NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_RevokedCertificateGroup(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_choice(actx, tree, tvb, offset,
+ RevokedCertificateGroup_choice, hf_index, ett_x509ce_RevokedCertificateGroup,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t RevokedGroup_sequence[] = {
+ { &hf_x509ce_certificateIssuer, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { &hf_x509ce_reasonInfo , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_ReasonInfo },
+ { &hf_x509ce_invalidityDate, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { &hf_x509ce_revokedcertificateGroup, BER_CLASS_CON, 3, BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_RevokedCertificateGroup },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_RevokedGroup(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ RevokedGroup_sequence, hf_index, ett_x509ce_RevokedGroup);
+
+ return offset;
+}
+
+
+static const ber_sequence_t RevokedGroupsSyntax_sequence_of[1] = {
+ { &hf_x509ce_RevokedGroupsSyntax_item, BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_x509ce_RevokedGroup },
+};
+
+static int
+dissect_x509ce_RevokedGroupsSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ RevokedGroupsSyntax_sequence_of, hf_index, ett_x509ce_RevokedGroupsSyntax);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_ExpiredCertsOnCRL(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_GeneralizedTime(implicit_tag, actx, tree, tvb, offset, hf_index);
+
+ return offset;
+}
+
+
+static const ber_sequence_t AAIssuingDistPointSyntax_sequence[] = {
+ { &hf_x509ce_distributionPoint, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_DistributionPointName },
+ { &hf_x509ce_onlySomeReasons, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_ReasonFlags },
+ { &hf_x509ce_indirectCRL , BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BOOLEAN },
+ { &hf_x509ce_containsUserAttributeCerts, BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BOOLEAN },
+ { &hf_x509ce_containsAACerts, BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BOOLEAN },
+ { &hf_x509ce_containsSOAPublicKeyCerts, BER_CLASS_CON, 5, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_BOOLEAN },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_AAIssuingDistPointSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ AAIssuingDistPointSyntax_sequence, hf_index, ett_x509ce_AAIssuingDistPointSyntax);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificateExactAssertion_sequence[] = {
+ { &hf_x509ce_serialNumber , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509af_CertificateSerialNumber },
+ { &hf_x509ce_issuer , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_CertificateExactAssertion(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificateExactAssertion_sequence, hf_index, ett_x509ce_CertificateExactAssertion);
+
+ return offset;
+}
+
+
+static const value_string x509ce_T_builtinNameForm_vals[] = {
+ { 1, "rfc822Name" },
+ { 2, "dNSName" },
+ { 3, "x400Address" },
+ { 4, "directoryName" },
+ { 5, "ediPartyName" },
+ { 6, "uniformResourceIdentifier" },
+ { 7, "iPAddress" },
+ { 8, "registeredId" },
+ { 0, NULL }
+};
+
+
+static int
+dissect_x509ce_T_builtinNameForm(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+const value_string x509ce_AltNameType_vals[] = {
+ { 0, "builtinNameForm" },
+ { 1, "otherNameForm" },
+ { 0, NULL }
+};
+
+static const ber_choice_t AltNameType_choice[] = {
+ { 0, &hf_x509ce_builtinNameForm, BER_CLASS_UNI, BER_UNI_TAG_ENUMERATED, BER_FLAGS_NOOWNTAG, dissect_x509ce_T_builtinNameForm },
+ { 1, &hf_x509ce_otherNameForm, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_OBJECT_IDENTIFIER },
+ { 0, NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_AltNameType(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_choice(actx, tree, tvb, offset,
+ AltNameType_choice, hf_index, ett_x509ce_AltNameType,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertPolicySet_sequence_of[1] = {
+ { &hf_x509ce_CertPolicySet_item, BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_CertPolicyId },
+};
+
+int
+dissect_x509ce_CertPolicySet(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ CertPolicySet_sequence_of, hf_index, ett_x509ce_CertPolicySet);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificateAssertion_sequence[] = {
+ { &hf_x509ce_serialNumber , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509af_CertificateSerialNumber },
+ { &hf_x509ce_issuer , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509if_Name },
+ { &hf_x509ce_subjectKeyIdentifier, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_SubjectKeyIdentifier },
+ { &hf_x509ce_authorityKeyIdentifier, BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_AuthorityKeyIdentifier },
+ { &hf_x509ce_certificateValid, BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509af_Time },
+ { &hf_x509ce_privateKeyValid, BER_CLASS_CON, 5, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { &hf_x509ce_subjectPublicKeyAlgID, BER_CLASS_CON, 6, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_OBJECT_IDENTIFIER },
+ { &hf_x509ce_keyUsage , BER_CLASS_CON, 7, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_KeyUsage },
+ { &hf_x509ce_subjectAltNameType, BER_CLASS_CON, 8, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_AltNameType },
+ { &hf_x509ce_policy , BER_CLASS_CON, 9, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CertPolicySet },
+ { &hf_x509ce_pathToName , BER_CLASS_CON, 10, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509if_Name },
+ { &hf_x509ce_subject , BER_CLASS_CON, 11, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509if_Name },
+ { &hf_x509ce_nameConstraints, BER_CLASS_CON, 12, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_NameConstraintsSyntax },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_CertificateAssertion(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificateAssertion_sequence, hf_index, ett_x509ce_CertificateAssertion);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificatePairExactAssertion_sequence[] = {
+ { &hf_x509ce_cpea_issuedToThisCAAssertion, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CertificateExactAssertion },
+ { &hf_x509ce_cpea_issuedByThisCAAssertion, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CertificateExactAssertion },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_CertificatePairExactAssertion(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificatePairExactAssertion_sequence, hf_index, ett_x509ce_CertificatePairExactAssertion);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificatePairAssertion_sequence[] = {
+ { &hf_x509ce_issuedToThisCAAssertion, BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CertificateAssertion },
+ { &hf_x509ce_issuedByThisCAAssertion, BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CertificateAssertion },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_CertificatePairAssertion(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificatePairAssertion_sequence, hf_index, ett_x509ce_CertificatePairAssertion);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificateListExactAssertion_sequence[] = {
+ { &hf_x509ce_issuer , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
+ { &hf_x509ce_thisUpdate , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509af_Time },
+ { &hf_x509ce_distributionPoint, BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_DistributionPointName },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_CertificateListExactAssertion(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificateListExactAssertion_sequence, hf_index, ett_x509ce_CertificateListExactAssertion);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificateListAssertion_sequence[] = {
+ { &hf_x509ce_issuer , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
+ { &hf_x509ce_minCRLNumber , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CRLNumber },
+ { &hf_x509ce_maxCRLNumber , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CRLNumber },
+ { &hf_x509ce_reasonFlags , BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_ReasonFlags },
+ { &hf_x509ce_dateAndTime , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509af_Time },
+ { &hf_x509ce_distributionPoint, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_DistributionPointName },
+ { &hf_x509ce_authorityKeyIdentifier, BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_AuthorityKeyIdentifier },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_CertificateListAssertion(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificateListAssertion_sequence, hf_index, ett_x509ce_CertificateListAssertion);
+
+ return offset;
+}
+
+
+static const ber_sequence_t PkiPathMatchSyntax_sequence[] = {
+ { &hf_x509ce_firstIssuer , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
+ { &hf_x509ce_lastSubject , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG, dissect_x509if_Name },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_PkiPathMatchSyntax(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ PkiPathMatchSyntax_sequence, hf_index, ett_x509ce_PkiPathMatchSyntax);
+
+ return offset;
+}
+
+
+static const ber_sequence_t AltName_sequence[] = {
+ { &hf_x509ce_altnameType , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_AltNameType },
+ { &hf_x509ce_altNameValue , BER_CLASS_ANY/*choice*/, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_x509ce_GeneralName },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_AltName(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ AltName_sequence, hf_index, ett_x509ce_AltName);
+
+ return offset;
+}
+
+
+static const ber_sequence_t EnhancedCertificateAssertion_sequence[] = {
+ { &hf_x509ce_serialNumber , BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509af_CertificateSerialNumber },
+ { &hf_x509ce_issuer , BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509if_Name },
+ { &hf_x509ce_subjectKeyIdentifier, BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_SubjectKeyIdentifier },
+ { &hf_x509ce_authorityKeyIdentifier, BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_AuthorityKeyIdentifier },
+ { &hf_x509ce_certificateValid, BER_CLASS_CON, 4, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509af_Time },
+ { &hf_x509ce_privateKeyValid, BER_CLASS_CON, 5, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralizedTime },
+ { &hf_x509ce_subjectPublicKeyAlgID, BER_CLASS_CON, 6, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_OBJECT_IDENTIFIER },
+ { &hf_x509ce_keyUsage , BER_CLASS_CON, 7, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_KeyUsage },
+ { &hf_x509ce_subjectAltName, BER_CLASS_CON, 8, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_AltName },
+ { &hf_x509ce_policy , BER_CLASS_CON, 9, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_CertPolicySet },
+ { &hf_x509ce_enhancedPathToName, BER_CLASS_CON, 10, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_GeneralNames },
+ { &hf_x509ce_subject , BER_CLASS_CON, 11, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509if_Name },
+ { &hf_x509ce_nameConstraints, BER_CLASS_CON, 12, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_x509ce_NameConstraintsSyntax },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_EnhancedCertificateAssertion(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ EnhancedCertificateAssertion_sequence, hf_index, ett_x509ce_EnhancedCertificateAssertion);
+
+ return offset;
+}
+
+
+static const ber_sequence_t CertificateTemplate_sequence[] = {
+ { &hf_x509ce_templateID , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_OBJECT_IDENTIFIER },
+ { &hf_x509ce_templateMajorVersion, BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509ce_INTEGER },
+ { &hf_x509ce_templateMinorVersion, BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_INTEGER },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_CertificateTemplate(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ CertificateTemplate_sequence, hf_index, ett_x509ce_CertificateTemplate);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_PrintableString(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_PrintableString,
+ actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t NtdsObjectSid_U_sequence[] = {
+ { &hf_x509ce_type_id_01 , BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_x509ce_OBJECT_IDENTIFIER },
+ { &hf_x509ce_sid , BER_CLASS_CON, 0, BER_FLAGS_IMPLTAG, dissect_x509ce_PrintableString },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_NtdsObjectSid_U(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ NtdsObjectSid_U_sequence, hf_index, ett_x509ce_NtdsObjectSid_U);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_NtdsObjectSid(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_tagged_type(implicit_tag, actx, tree, tvb, offset,
+ hf_index, BER_CLASS_CON, 0, TRUE, dissect_x509ce_NtdsObjectSid_U);
+
+ return offset;
+}
+
+
+static const ber_sequence_t NtdsCaSecurity_sequence[] = {
+ { &hf_x509ce_ntdsObjectSid, BER_CLASS_CON, 0, BER_FLAGS_NOOWNTAG, dissect_x509ce_NtdsObjectSid },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_NtdsCaSecurity(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ NtdsCaSecurity_sequence, hf_index, ett_x509ce_NtdsCaSecurity);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_GeneralString(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_GeneralString,
+ actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static int * const EntrustInfoFlags_bits[] = {
+ &hf_x509ce_EntrustInfoFlags_keyUpdateAllowed,
+ &hf_x509ce_EntrustInfoFlags_newExtensions,
+ &hf_x509ce_EntrustInfoFlags_pKIXCertificate,
+ &hf_x509ce_EntrustInfoFlags_enterpriseCategory,
+ &hf_x509ce_EntrustInfoFlags_webCategory,
+ &hf_x509ce_EntrustInfoFlags_sETCategory,
+ NULL
+};
+
+static int
+dissect_x509ce_EntrustInfoFlags(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
+ EntrustInfoFlags_bits, 6, hf_index, ett_x509ce_EntrustInfoFlags,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t EntrustVersionInfo_sequence[] = {
+ { &hf_x509ce_entrustVers , BER_CLASS_UNI, BER_UNI_TAG_GeneralString, BER_FLAGS_NOOWNTAG, dissect_x509ce_GeneralString },
+ { &hf_x509ce_entrustVersInfoFlags, BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_x509ce_EntrustInfoFlags },
+ { NULL, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509ce_EntrustVersionInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ EntrustVersionInfo_sequence, hf_index, ett_x509ce_EntrustVersionInfo);
+
+ return offset;
+}
+
+
+
+static int
+dissect_x509ce_NFType(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_IA5String,
+ actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+static const ber_sequence_t NFTypes_sequence_of[1] = {
+ { &hf_x509ce_NFTypes_item , BER_CLASS_UNI, BER_UNI_TAG_IA5String, BER_FLAGS_NOOWNTAG, dissect_x509ce_NFType },
+};
+
+static int
+dissect_x509ce_NFTypes(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence_of(implicit_tag, actx, tree, tvb, offset,
+ NFTypes_sequence_of, hf_index, ett_x509ce_NFTypes);
+
+ return offset;
+}
+
+
+static const ber_sequence_t ScramblerCapabilities_sequence[] = {
+ { &hf_x509ce_capability , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509ce_INTEGER_0_MAX },
+ { &hf_x509ce_version , BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_x509ce_INTEGER_0_MAX },
+ { NULL, 0, 0, 0, NULL }
+};
+
+int
+dissect_x509ce_ScramblerCapabilities(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_sequence(implicit_tag, actx, tree, tvb, offset,
+ ScramblerCapabilities_sequence, hf_index, ett_x509ce_ScramblerCapabilities);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_CiplusInfo(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_bitstring(implicit_tag, actx, tree, tvb, offset,
+ NULL, 0, hf_index, -1,
+ NULL);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_CicamBrandId(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+
+
+int
+dissect_x509ce_SecurityLevel(bool implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
+ offset = dissect_ber_integer64(implicit_tag, actx, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+
+/*--- PDUs ---*/
+
+static int dissect_AuthorityKeyIdentifier_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_AuthorityKeyIdentifier(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_AuthorityKeyIdentifier_PDU);
+ return offset;
+}
+static int dissect_SubjectKeyIdentifier_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_SubjectKeyIdentifier(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_SubjectKeyIdentifier_PDU);
+ return offset;
+}
+static int dissect_KeyUsage_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_KeyUsage(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_KeyUsage_PDU);
+ return offset;
+}
+static int dissect_KeyPurposeIDs_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_KeyPurposeIDs(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_KeyPurposeIDs_PDU);
+ return offset;
+}
+static int dissect_PrivateKeyUsagePeriod_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_PrivateKeyUsagePeriod(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_PrivateKeyUsagePeriod_PDU);
+ return offset;
+}
+static int dissect_CertificatePoliciesSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CertificatePoliciesSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CertificatePoliciesSyntax_PDU);
+ return offset;
+}
+static int dissect_PolicyMappingsSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_PolicyMappingsSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_PolicyMappingsSyntax_PDU);
+ return offset;
+}
+static int dissect_GeneralNames_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_GeneralNames(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_GeneralNames_PDU);
+ return offset;
+}
+static int dissect_AttributesSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_AttributesSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_AttributesSyntax_PDU);
+ return offset;
+}
+static int dissect_BasicConstraintsSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_BasicConstraintsSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_BasicConstraintsSyntax_PDU);
+ return offset;
+}
+static int dissect_NameConstraintsSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_NameConstraintsSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_NameConstraintsSyntax_PDU);
+ return offset;
+}
+static int dissect_PolicyConstraintsSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_PolicyConstraintsSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_PolicyConstraintsSyntax_PDU);
+ return offset;
+}
+static int dissect_SkipCerts_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_SkipCerts(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_SkipCerts_PDU);
+ return offset;
+}
+static int dissect_CRLNumber_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CRLNumber(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CRLNumber_PDU);
+ return offset;
+}
+static int dissect_CRLReason_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CRLReason(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CRLReason_PDU);
+ return offset;
+}
+static int dissect_HoldInstruction_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_HoldInstruction(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_HoldInstruction_PDU);
+ return offset;
+}
+static int dissect_CRLScopeSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CRLScopeSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CRLScopeSyntax_PDU);
+ return offset;
+}
+static int dissect_StatusReferrals_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_StatusReferrals(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_StatusReferrals_PDU);
+ return offset;
+}
+static int dissect_CRLStreamIdentifier_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CRLStreamIdentifier(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CRLStreamIdentifier_PDU);
+ return offset;
+}
+static int dissect_OrderedListSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_OrderedListSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_OrderedListSyntax_PDU);
+ return offset;
+}
+static int dissect_DeltaInformation_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_DeltaInformation(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_DeltaInformation_PDU);
+ return offset;
+}
+static int dissect_CRLDistPointsSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CRLDistPointsSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CRLDistPointsSyntax_PDU);
+ return offset;
+}
+static int dissect_IssuingDistPointSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_IssuingDistPointSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_IssuingDistPointSyntax_PDU);
+ return offset;
+}
+static int dissect_BaseCRLNumber_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_BaseCRLNumber(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_BaseCRLNumber_PDU);
+ return offset;
+}
+static int dissect_ToBeRevokedSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_ToBeRevokedSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_ToBeRevokedSyntax_PDU);
+ return offset;
+}
+static int dissect_RevokedGroupsSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_RevokedGroupsSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_RevokedGroupsSyntax_PDU);
+ return offset;
+}
+static int dissect_ExpiredCertsOnCRL_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_ExpiredCertsOnCRL(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_ExpiredCertsOnCRL_PDU);
+ return offset;
+}
+static int dissect_AAIssuingDistPointSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_AAIssuingDistPointSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_AAIssuingDistPointSyntax_PDU);
+ return offset;
+}
+static int dissect_CertificateAssertion_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CertificateAssertion(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CertificateAssertion_PDU);
+ return offset;
+}
+static int dissect_CertificatePairExactAssertion_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CertificatePairExactAssertion(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CertificatePairExactAssertion_PDU);
+ return offset;
+}
+static int dissect_CertificatePairAssertion_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CertificatePairAssertion(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CertificatePairAssertion_PDU);
+ return offset;
+}
+static int dissect_CertificateListExactAssertion_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CertificateListExactAssertion(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CertificateListExactAssertion_PDU);
+ return offset;
+}
+static int dissect_CertificateListAssertion_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CertificateListAssertion(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CertificateListAssertion_PDU);
+ return offset;
+}
+static int dissect_PkiPathMatchSyntax_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_PkiPathMatchSyntax(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_PkiPathMatchSyntax_PDU);
+ return offset;
+}
+static int dissect_EnhancedCertificateAssertion_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_EnhancedCertificateAssertion(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_EnhancedCertificateAssertion_PDU);
+ return offset;
+}
+static int dissect_CertificateTemplate_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CertificateTemplate(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CertificateTemplate_PDU);
+ return offset;
+}
+static int dissect_NtdsCaSecurity_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_NtdsCaSecurity(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_NtdsCaSecurity_PDU);
+ return offset;
+}
+static int dissect_NtdsObjectSid_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_NtdsObjectSid(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_NtdsObjectSid_PDU);
+ return offset;
+}
+static int dissect_EntrustVersionInfo_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_EntrustVersionInfo(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_EntrustVersionInfo_PDU);
+ return offset;
+}
+static int dissect_NFTypes_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_NFTypes(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_NFTypes_PDU);
+ return offset;
+}
+static int dissect_ScramblerCapabilities_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_ScramblerCapabilities(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_ScramblerCapabilities_PDU);
+ return offset;
+}
+static int dissect_CiplusInfo_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CiplusInfo(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CiplusInfo_PDU);
+ return offset;
+}
+static int dissect_CicamBrandId_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_CicamBrandId(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_CicamBrandId_PDU);
+ return offset;
+}
+static int dissect_SecurityLevel_PDU(tvbuff_t *tvb _U_, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_) {
+ int offset = 0;
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ offset = dissect_x509ce_SecurityLevel(FALSE, tvb, offset, &asn1_ctx, tree, hf_x509ce_SecurityLevel_PDU);
+ return offset;
+}
+
+
+static const val64_string ciplus_scr_cap[] = {
+ { 0, "DES" },
+ { 1, "DES and AES" },
+ { 0, NULL }
+};
+
+static const val64_string ciplus_security_level[] = {
+ { 0, "Standard Security Level" },
+ { 1, "ECP Security Level" },
+ { 0, NULL }
+};
+
+/* CI+ (www.ci-plus.com) defines some X.509 certificate extensions
+ that use OIDs which are not officially assigned
+ dissection of these extensions can be enabled temporarily using the
+ functions below */
+void
+x509ce_enable_ciplus(void)
+{
+ dissector_handle_t dh25, dh26, dh27, dh50;
+
+ dh25 = create_dissector_handle(dissect_ScramblerCapabilities_PDU, proto_x509ce);
+ dissector_change_string("ber.oid", "1.3.6.1.5.5.7.1.25", dh25);
+ dh26 = create_dissector_handle(dissect_CiplusInfo_PDU, proto_x509ce);
+ dissector_change_string("ber.oid", "1.3.6.1.5.5.7.1.26", dh26);
+ dh27 = create_dissector_handle(dissect_CicamBrandId_PDU, proto_x509ce);
+ dissector_change_string("ber.oid", "1.3.6.1.5.5.7.1.27", dh27);
+ dh50 = create_dissector_handle(dissect_SecurityLevel_PDU, proto_x509ce);
+ dissector_change_string("ber.oid", "1.3.6.1.5.5.7.1.50", dh50);
+}
+
+void
+x509ce_disable_ciplus(void)
+{
+ dissector_reset_string("ber.oid", "1.3.6.1.5.5.7.1.25");
+ dissector_reset_string("ber.oid", "1.3.6.1.5.5.7.1.26");
+ dissector_reset_string("ber.oid", "1.3.6.1.5.5.7.1.27");
+ dissector_reset_string("ber.oid", "1.3.6.1.5.5.7.1.50");
+}
+
+
+static int
+dissect_x509ce_invalidityDate_callback(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
+{
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+
+ return dissect_x509ce_GeneralizedTime(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509ce_id_ce_invalidityDate);
+}
+
+static int
+dissect_x509ce_baseUpdateTime_callback(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
+{
+ asn1_ctx_t asn1_ctx;
+ asn1_ctx_init(&asn1_ctx, ASN1_ENC_BER, TRUE, pinfo);
+ return dissect_x509ce_GeneralizedTime(FALSE, tvb, 0, &asn1_ctx, tree, hf_x509ce_id_ce_baseUpdateTime);
+}
+
+/*--- proto_register_x509ce ----------------------------------------------*/
+void proto_register_x509ce(void) {
+
+ /* List of fields */
+ static hf_register_info hf[] = {
+ { &hf_x509ce_id_ce_baseUpdateTime,
+ { "baseUpdateTime", "x509ce.id_ce_baseUpdateTime",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_id_ce_invalidityDate,
+ { "invalidityDate", "x509ce.id_ce_invalidityDate",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_object_identifier_id,
+ { "Id", "x509ce.id", FT_OID, BASE_NONE, NULL, 0,
+ "Object identifier Id", HFILL }},
+ { &hf_x509ce_IPAddress_ipv4,
+ { "iPAddress", "x509ce.IPAddress.ipv4", FT_IPv4, BASE_NONE, NULL, 0,
+ "IPv4 address", HFILL }},
+ { &hf_x509ce_IPAddress_ipv6,
+ { "iPAddress", "x509ce.IPAddress.ipv6", FT_IPv6, BASE_NONE, NULL, 0,
+ "IPv6 address", HFILL }},
+
+ { &hf_x509ce_AuthorityKeyIdentifier_PDU,
+ { "AuthorityKeyIdentifier", "x509ce.AuthorityKeyIdentifier_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_SubjectKeyIdentifier_PDU,
+ { "SubjectKeyIdentifier", "x509ce.SubjectKeyIdentifier",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_PDU,
+ { "KeyUsage", "x509ce.KeyUsage",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyPurposeIDs_PDU,
+ { "KeyPurposeIDs", "x509ce.KeyPurposeIDs",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_PrivateKeyUsagePeriod_PDU,
+ { "PrivateKeyUsagePeriod", "x509ce.PrivateKeyUsagePeriod_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CertificatePoliciesSyntax_PDU,
+ { "CertificatePoliciesSyntax", "x509ce.CertificatePoliciesSyntax",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_PolicyMappingsSyntax_PDU,
+ { "PolicyMappingsSyntax", "x509ce.PolicyMappingsSyntax",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_GeneralNames_PDU,
+ { "GeneralNames", "x509ce.GeneralNames",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_AttributesSyntax_PDU,
+ { "AttributesSyntax", "x509ce.AttributesSyntax",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_BasicConstraintsSyntax_PDU,
+ { "BasicConstraintsSyntax", "x509ce.BasicConstraintsSyntax_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_NameConstraintsSyntax_PDU,
+ { "NameConstraintsSyntax", "x509ce.NameConstraintsSyntax_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_PolicyConstraintsSyntax_PDU,
+ { "PolicyConstraintsSyntax", "x509ce.PolicyConstraintsSyntax_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_SkipCerts_PDU,
+ { "SkipCerts", "x509ce.SkipCerts",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CRLNumber_PDU,
+ { "CRLNumber", "x509ce.CRLNumber",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CRLReason_PDU,
+ { "CRLReason", "x509ce.CRLReason",
+ FT_UINT32, BASE_DEC, VALS(x509ce_CRLReason_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_HoldInstruction_PDU,
+ { "HoldInstruction", "x509ce.HoldInstruction",
+ FT_OID, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CRLScopeSyntax_PDU,
+ { "CRLScopeSyntax", "x509ce.CRLScopeSyntax",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_StatusReferrals_PDU,
+ { "StatusReferrals", "x509ce.StatusReferrals",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CRLStreamIdentifier_PDU,
+ { "CRLStreamIdentifier", "x509ce.CRLStreamIdentifier",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_OrderedListSyntax_PDU,
+ { "OrderedListSyntax", "x509ce.OrderedListSyntax",
+ FT_UINT32, BASE_DEC, VALS(x509ce_OrderedListSyntax_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_DeltaInformation_PDU,
+ { "DeltaInformation", "x509ce.DeltaInformation_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CRLDistPointsSyntax_PDU,
+ { "CRLDistPointsSyntax", "x509ce.CRLDistPointsSyntax",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_IssuingDistPointSyntax_PDU,
+ { "IssuingDistPointSyntax", "x509ce.IssuingDistPointSyntax_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_BaseCRLNumber_PDU,
+ { "BaseCRLNumber", "x509ce.BaseCRLNumber",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_ToBeRevokedSyntax_PDU,
+ { "ToBeRevokedSyntax", "x509ce.ToBeRevokedSyntax",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_RevokedGroupsSyntax_PDU,
+ { "RevokedGroupsSyntax", "x509ce.RevokedGroupsSyntax",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_ExpiredCertsOnCRL_PDU,
+ { "ExpiredCertsOnCRL", "x509ce.ExpiredCertsOnCRL",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_AAIssuingDistPointSyntax_PDU,
+ { "AAIssuingDistPointSyntax", "x509ce.AAIssuingDistPointSyntax_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CertificateAssertion_PDU,
+ { "CertificateAssertion", "x509ce.CertificateAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CertificatePairExactAssertion_PDU,
+ { "CertificatePairExactAssertion", "x509ce.CertificatePairExactAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CertificatePairAssertion_PDU,
+ { "CertificatePairAssertion", "x509ce.CertificatePairAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CertificateListExactAssertion_PDU,
+ { "CertificateListExactAssertion", "x509ce.CertificateListExactAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CertificateListAssertion_PDU,
+ { "CertificateListAssertion", "x509ce.CertificateListAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_PkiPathMatchSyntax_PDU,
+ { "PkiPathMatchSyntax", "x509ce.PkiPathMatchSyntax_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_EnhancedCertificateAssertion_PDU,
+ { "EnhancedCertificateAssertion", "x509ce.EnhancedCertificateAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CertificateTemplate_PDU,
+ { "CertificateTemplate", "x509ce.CertificateTemplate_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_NtdsCaSecurity_PDU,
+ { "NtdsCaSecurity", "x509ce.NtdsCaSecurity_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_NtdsObjectSid_PDU,
+ { "NtdsObjectSid", "x509ce.NtdsObjectSid_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_EntrustVersionInfo_PDU,
+ { "EntrustVersionInfo", "x509ce.EntrustVersionInfo_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_NFTypes_PDU,
+ { "NFTypes", "x509ce.NFTypes",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_ScramblerCapabilities_PDU,
+ { "ScramblerCapabilities", "x509ce.ScramblerCapabilities_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CiplusInfo_PDU,
+ { "CiplusInfo", "x509ce.CiplusInfo",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_CicamBrandId_PDU,
+ { "CicamBrandId", "x509ce.CicamBrandId",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_SecurityLevel_PDU,
+ { "SecurityLevel", "x509ce.SecurityLevel",
+ FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(ciplus_security_level), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_keyIdentifier,
+ { "keyIdentifier", "x509ce.keyIdentifier",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_authorityCertIssuer,
+ { "authorityCertIssuer", "x509ce.authorityCertIssuer",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "GeneralNames", HFILL }},
+ { &hf_x509ce_authorityCertSerialNumber,
+ { "authorityCertSerialNumber", "x509ce.authorityCertSerialNumber",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "CertificateSerialNumber", HFILL }},
+ { &hf_x509ce_KeyPurposeIDs_item,
+ { "KeyPurposeId", "x509ce.KeyPurposeId",
+ FT_OID, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_notBefore,
+ { "notBefore", "x509ce.notBefore",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_notAfter,
+ { "notAfter", "x509ce.notAfter",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_CertificatePoliciesSyntax_item,
+ { "PolicyInformation", "x509ce.PolicyInformation_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_policyIdentifier,
+ { "policyIdentifier", "x509ce.policyIdentifier",
+ FT_OID, BASE_NONE, NULL, 0,
+ "CertPolicyId", HFILL }},
+ { &hf_x509ce_policyQualifiers,
+ { "policyQualifiers", "x509ce.policyQualifiers",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo", HFILL }},
+ { &hf_x509ce_policyQualifiers_item,
+ { "PolicyQualifierInfo", "x509ce.PolicyQualifierInfo_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_policyQualifierId,
+ { "policyQualifierId", "x509ce.policyQualifierId",
+ FT_OID, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_qualifier,
+ { "qualifier", "x509ce.qualifier_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_PolicyMappingsSyntax_item,
+ { "PolicyMappingsSyntax item", "x509ce.PolicyMappingsSyntax_item_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_issuerDomainPolicy,
+ { "issuerDomainPolicy", "x509ce.issuerDomainPolicy",
+ FT_OID, BASE_NONE, NULL, 0,
+ "CertPolicyId", HFILL }},
+ { &hf_x509ce_subjectDomainPolicy,
+ { "subjectDomainPolicy", "x509ce.subjectDomainPolicy",
+ FT_OID, BASE_NONE, NULL, 0,
+ "CertPolicyId", HFILL }},
+ { &hf_x509ce_GeneralNames_item,
+ { "GeneralName", "x509ce.GeneralName",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_otherName,
+ { "otherName", "x509ce.otherName_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_rfc822Name,
+ { "rfc822Name", "x509ce.rfc822Name",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "IA5String", HFILL }},
+ { &hf_x509ce_dNSName,
+ { "dNSName", "x509ce.dNSName",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "IA5String", HFILL }},
+ { &hf_x509ce_x400Address,
+ { "x400Address", "x509ce.x400Address_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ORAddress", HFILL }},
+ { &hf_x509ce_directoryName,
+ { "directoryName", "x509ce.directoryName",
+ FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
+ "Name", HFILL }},
+ { &hf_x509ce_ediPartyName,
+ { "ediPartyName", "x509ce.ediPartyName_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_uniformResourceIdentifier,
+ { "uniformResourceIdentifier", "x509ce.uniformResourceIdentifier",
+ FT_STRING, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_iPAddress,
+ { "iPAddress", "x509ce.iPAddress",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_registeredID,
+ { "registeredID", "x509ce.registeredID",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_x509ce_type_id,
+ { "type-id", "x509ce.type_id",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OtherNameType", HFILL }},
+ { &hf_x509ce_value,
+ { "value", "x509ce.value_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "OtherNameValue", HFILL }},
+ { &hf_x509ce_nameAssigner,
+ { "nameAssigner", "x509ce.nameAssigner",
+ FT_UINT32, BASE_DEC, VALS(x509sat_DirectoryString_vals), 0,
+ "DirectoryString", HFILL }},
+ { &hf_x509ce_partyName,
+ { "partyName", "x509ce.partyName",
+ FT_UINT32, BASE_DEC, VALS(x509sat_DirectoryString_vals), 0,
+ "DirectoryString", HFILL }},
+ { &hf_x509ce_AttributesSyntax_item,
+ { "Attribute", "x509ce.Attribute_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_cA,
+ { "cA", "x509ce.cA",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_x509ce_pathLenConstraint,
+ { "pathLenConstraint", "x509ce.pathLenConstraint",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "INTEGER_0_MAX", HFILL }},
+ { &hf_x509ce_permittedSubtrees,
+ { "permittedSubtrees", "x509ce.permittedSubtrees",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "GeneralSubtrees", HFILL }},
+ { &hf_x509ce_excludedSubtrees,
+ { "excludedSubtrees", "x509ce.excludedSubtrees",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "GeneralSubtrees", HFILL }},
+ { &hf_x509ce_GeneralSubtrees_item,
+ { "GeneralSubtree", "x509ce.GeneralSubtree_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_base,
+ { "base", "x509ce.base",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_minimum,
+ { "minimum", "x509ce.minimum",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "BaseDistance", HFILL }},
+ { &hf_x509ce_maximum,
+ { "maximum", "x509ce.maximum",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "BaseDistance", HFILL }},
+ { &hf_x509ce_requireExplicitPolicy,
+ { "requireExplicitPolicy", "x509ce.requireExplicitPolicy",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "SkipCerts", HFILL }},
+ { &hf_x509ce_inhibitPolicyMapping,
+ { "inhibitPolicyMapping", "x509ce.inhibitPolicyMapping",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "SkipCerts", HFILL }},
+ { &hf_x509ce_CRLScopeSyntax_item,
+ { "PerAuthorityScope", "x509ce.PerAuthorityScope_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_authorityName,
+ { "authorityName", "x509ce.authorityName",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_distributionPoint,
+ { "distributionPoint", "x509ce.distributionPoint",
+ FT_UINT32, BASE_DEC, VALS(x509ce_DistributionPointName_vals), 0,
+ "DistributionPointName", HFILL }},
+ { &hf_x509ce_onlyContains,
+ { "onlyContains", "x509ce.onlyContains",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "OnlyCertificateTypes", HFILL }},
+ { &hf_x509ce_onlySomeReasons,
+ { "onlySomeReasons", "x509ce.onlySomeReasons",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "ReasonFlags", HFILL }},
+ { &hf_x509ce_serialNumberRange,
+ { "serialNumberRange", "x509ce.serialNumberRange_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "NumberRange", HFILL }},
+ { &hf_x509ce_subjectKeyIdRange,
+ { "subjectKeyIdRange", "x509ce.subjectKeyIdRange_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "NumberRange", HFILL }},
+ { &hf_x509ce_nameSubtrees,
+ { "nameSubtrees", "x509ce.nameSubtrees",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "GeneralNames", HFILL }},
+ { &hf_x509ce_baseRevocationInfo,
+ { "baseRevocationInfo", "x509ce.baseRevocationInfo_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_startingNumber,
+ { "startingNumber", "x509ce.startingNumber",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_x509ce_endingNumber,
+ { "endingNumber", "x509ce.endingNumber",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_x509ce_modulus,
+ { "modulus", "x509ce.modulus",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_x509ce_cRLStreamIdentifier,
+ { "cRLStreamIdentifier", "x509ce.cRLStreamIdentifier",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_cRLNumber,
+ { "cRLNumber", "x509ce.cRLNumber",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_baseThisUpdate,
+ { "baseThisUpdate", "x509ce.baseThisUpdate",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_StatusReferrals_item,
+ { "StatusReferral", "x509ce.StatusReferral",
+ FT_UINT32, BASE_DEC, VALS(x509ce_StatusReferral_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_cRLReferral,
+ { "cRLReferral", "x509ce.cRLReferral_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_crlr_issuer,
+ { "issuer", "x509ce.issuer",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_location,
+ { "location", "x509ce.location",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_deltaRefInfo,
+ { "deltaRefInfo", "x509ce.deltaRefInfo_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_cRLScope,
+ { "cRLScope", "x509ce.cRLScope",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "CRLScopeSyntax", HFILL }},
+ { &hf_x509ce_lastUpdate,
+ { "lastUpdate", "x509ce.lastUpdate",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_lastChangedCRL,
+ { "lastChangedCRL", "x509ce.lastChangedCRL",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_deltaLocation,
+ { "deltaLocation", "x509ce.deltaLocation",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_lastDelta,
+ { "lastDelta", "x509ce.lastDelta",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_nextDelta,
+ { "nextDelta", "x509ce.nextDelta",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_CRLDistPointsSyntax_item,
+ { "DistributionPoint", "x509ce.DistributionPoint_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_reasons,
+ { "reasons", "x509ce.reasons",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "ReasonFlags", HFILL }},
+ { &hf_x509ce_cRLIssuer,
+ { "cRLIssuer", "x509ce.cRLIssuer",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "GeneralNames", HFILL }},
+ { &hf_x509ce_fullName,
+ { "fullName", "x509ce.fullName",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "GeneralNames", HFILL }},
+ { &hf_x509ce_nameRelativeToCRLIssuer,
+ { "nameRelativeToCRLIssuer", "x509ce.nameRelativeToCRLIssuer",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "RelativeDistinguishedName", HFILL }},
+ { &hf_x509ce_onlyContainsUserPublicKeyCerts,
+ { "onlyContainsUserPublicKeyCerts", "x509ce.onlyContainsUserPublicKeyCerts",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_x509ce_onlyContainsCACerts,
+ { "onlyContainsCACerts", "x509ce.onlyContainsCACerts",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_x509ce_indirectCRL,
+ { "indirectCRL", "x509ce.indirectCRL",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_x509ce_ToBeRevokedSyntax_item,
+ { "ToBeRevokedGroup", "x509ce.ToBeRevokedGroup_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_certificateIssuer,
+ { "certificateIssuer", "x509ce.certificateIssuer",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_reasonInfo,
+ { "reasonInfo", "x509ce.reasonInfo_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_revocationTime,
+ { "revocationTime", "x509ce.revocationTime",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_certificateGroup,
+ { "certificateGroup", "x509ce.certificateGroup",
+ FT_UINT32, BASE_DEC, VALS(x509ce_CertificateGroup_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_reasonCode,
+ { "reasonCode", "x509ce.reasonCode",
+ FT_UINT32, BASE_DEC, VALS(x509ce_CRLReason_vals), 0,
+ "CRLReason", HFILL }},
+ { &hf_x509ce_holdInstructionCode,
+ { "holdInstructionCode", "x509ce.holdInstructionCode",
+ FT_OID, BASE_NONE, NULL, 0,
+ "HoldInstruction", HFILL }},
+ { &hf_x509ce_serialNumbers,
+ { "serialNumbers", "x509ce.serialNumbers",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "CertificateSerialNumbers", HFILL }},
+ { &hf_x509ce_certificateGroupNumberRange,
+ { "serialNumberRange", "x509ce.serialNumberRange_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificateGroupNumberRange", HFILL }},
+ { &hf_x509ce_nameSubtree,
+ { "nameSubtree", "x509ce.nameSubtree",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_CertificateSerialNumbers_item,
+ { "CertificateSerialNumber", "x509ce.CertificateSerialNumber",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_RevokedGroupsSyntax_item,
+ { "RevokedGroup", "x509ce.RevokedGroup_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_invalidityDate,
+ { "invalidityDate", "x509ce.invalidityDate",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_revokedcertificateGroup,
+ { "revokedcertificateGroup", "x509ce.revokedcertificateGroup",
+ FT_UINT32, BASE_DEC, VALS(x509ce_RevokedCertificateGroup_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_containsUserAttributeCerts,
+ { "containsUserAttributeCerts", "x509ce.containsUserAttributeCerts",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_x509ce_containsAACerts,
+ { "containsAACerts", "x509ce.containsAACerts",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_x509ce_containsSOAPublicKeyCerts,
+ { "containsSOAPublicKeyCerts", "x509ce.containsSOAPublicKeyCerts",
+ FT_BOOLEAN, BASE_NONE, NULL, 0,
+ "BOOLEAN", HFILL }},
+ { &hf_x509ce_serialNumber,
+ { "serialNumber", "x509ce.serialNumber",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "CertificateSerialNumber", HFILL }},
+ { &hf_x509ce_issuer,
+ { "issuer", "x509ce.issuer",
+ FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
+ "Name", HFILL }},
+ { &hf_x509ce_subjectKeyIdentifier,
+ { "subjectKeyIdentifier", "x509ce.subjectKeyIdentifier",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_authorityKeyIdentifier,
+ { "authorityKeyIdentifier", "x509ce.authorityKeyIdentifier_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_certificateValid,
+ { "certificateValid", "x509ce.certificateValid",
+ FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
+ "Time", HFILL }},
+ { &hf_x509ce_privateKeyValid,
+ { "privateKeyValid", "x509ce.privateKeyValid",
+ FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0,
+ "GeneralizedTime", HFILL }},
+ { &hf_x509ce_subjectPublicKeyAlgID,
+ { "subjectPublicKeyAlgID", "x509ce.subjectPublicKeyAlgID",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_x509ce_keyUsage,
+ { "keyUsage", "x509ce.keyUsage",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_subjectAltNameType,
+ { "subjectAltName", "x509ce.subjectAltName",
+ FT_UINT32, BASE_DEC, VALS(x509ce_AltNameType_vals), 0,
+ "AltNameType", HFILL }},
+ { &hf_x509ce_policy,
+ { "policy", "x509ce.policy",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "CertPolicySet", HFILL }},
+ { &hf_x509ce_pathToName,
+ { "pathToName", "x509ce.pathToName",
+ FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
+ "Name", HFILL }},
+ { &hf_x509ce_subject,
+ { "subject", "x509ce.subject",
+ FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
+ "Name", HFILL }},
+ { &hf_x509ce_nameConstraints,
+ { "nameConstraints", "x509ce.nameConstraints_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "NameConstraintsSyntax", HFILL }},
+ { &hf_x509ce_builtinNameForm,
+ { "builtinNameForm", "x509ce.builtinNameForm",
+ FT_UINT32, BASE_DEC, VALS(x509ce_T_builtinNameForm_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_otherNameForm,
+ { "otherNameForm", "x509ce.otherNameForm",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_x509ce_CertPolicySet_item,
+ { "CertPolicyId", "x509ce.CertPolicyId",
+ FT_OID, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_cpea_issuedToThisCAAssertion,
+ { "issuedToThisCAAssertion", "x509ce.issuedToThisCAAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificateExactAssertion", HFILL }},
+ { &hf_x509ce_cpea_issuedByThisCAAssertion,
+ { "issuedByThisCAAssertion", "x509ce.issuedByThisCAAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificateExactAssertion", HFILL }},
+ { &hf_x509ce_issuedToThisCAAssertion,
+ { "issuedToThisCAAssertion", "x509ce.issuedToThisCAAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificateAssertion", HFILL }},
+ { &hf_x509ce_issuedByThisCAAssertion,
+ { "issuedByThisCAAssertion", "x509ce.issuedByThisCAAssertion_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificateAssertion", HFILL }},
+ { &hf_x509ce_thisUpdate,
+ { "thisUpdate", "x509ce.thisUpdate",
+ FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
+ "Time", HFILL }},
+ { &hf_x509ce_minCRLNumber,
+ { "minCRLNumber", "x509ce.minCRLNumber",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "CRLNumber", HFILL }},
+ { &hf_x509ce_maxCRLNumber,
+ { "maxCRLNumber", "x509ce.maxCRLNumber",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "CRLNumber", HFILL }},
+ { &hf_x509ce_reasonFlags,
+ { "reasonFlags", "x509ce.reasonFlags",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_dateAndTime,
+ { "dateAndTime", "x509ce.dateAndTime",
+ FT_UINT32, BASE_DEC, VALS(x509af_Time_vals), 0,
+ "Time", HFILL }},
+ { &hf_x509ce_firstIssuer,
+ { "firstIssuer", "x509ce.firstIssuer",
+ FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
+ "Name", HFILL }},
+ { &hf_x509ce_lastSubject,
+ { "lastSubject", "x509ce.lastSubject",
+ FT_UINT32, BASE_DEC, VALS(x509if_Name_vals), 0,
+ "Name", HFILL }},
+ { &hf_x509ce_subjectAltName,
+ { "subjectAltName", "x509ce.subjectAltName_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AltName", HFILL }},
+ { &hf_x509ce_enhancedPathToName,
+ { "pathToName", "x509ce.pathToName",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "GeneralNames", HFILL }},
+ { &hf_x509ce_altnameType,
+ { "altnameType", "x509ce.altnameType",
+ FT_UINT32, BASE_DEC, VALS(x509ce_AltNameType_vals), 0,
+ NULL, HFILL }},
+ { &hf_x509ce_altNameValue,
+ { "altNameValue", "x509ce.altNameValue",
+ FT_UINT32, BASE_DEC, VALS(x509ce_GeneralName_vals), 0,
+ "GeneralName", HFILL }},
+ { &hf_x509ce_templateID,
+ { "templateID", "x509ce.templateID",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_x509ce_templateMajorVersion,
+ { "templateMajorVersion", "x509ce.templateMajorVersion",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_x509ce_templateMinorVersion,
+ { "templateMinorVersion", "x509ce.templateMinorVersion",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "INTEGER", HFILL }},
+ { &hf_x509ce_ntdsObjectSid,
+ { "ntdsObjectSid", "x509ce.ntdsObjectSid_element",
+ FT_NONE, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_type_id_01,
+ { "type-id", "x509ce.type_id",
+ FT_OID, BASE_NONE, NULL, 0,
+ "OBJECT_IDENTIFIER", HFILL }},
+ { &hf_x509ce_sid,
+ { "sid", "x509ce.sid",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "PrintableString", HFILL }},
+ { &hf_x509ce_entrustVers,
+ { "entrustVers", "x509ce.entrustVers",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "GeneralString", HFILL }},
+ { &hf_x509ce_entrustVersInfoFlags,
+ { "entrustVersInfoFlags", "x509ce.entrustVersInfoFlags",
+ FT_BYTES, BASE_NONE, NULL, 0,
+ "EntrustInfoFlags", HFILL }},
+ { &hf_x509ce_NFTypes_item,
+ { "NFType", "x509ce.NFType",
+ FT_STRING, BASE_NONE, NULL, 0,
+ NULL, HFILL }},
+ { &hf_x509ce_capability,
+ { "capability", "x509ce.capability",
+ FT_UINT64, BASE_DEC|BASE_VAL64_STRING, VALS64(ciplus_scr_cap), 0,
+ "INTEGER_0_MAX", HFILL }},
+ { &hf_x509ce_version,
+ { "version", "x509ce.version",
+ FT_UINT64, BASE_DEC, NULL, 0,
+ "INTEGER_0_MAX", HFILL }},
+ { &hf_x509ce_KeyUsage_digitalSignature,
+ { "digitalSignature", "x509ce.KeyUsage.digitalSignature",
+ FT_BOOLEAN, 8, NULL, 0x80,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_contentCommitment,
+ { "contentCommitment", "x509ce.KeyUsage.contentCommitment",
+ FT_BOOLEAN, 8, NULL, 0x40,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_keyEncipherment,
+ { "keyEncipherment", "x509ce.KeyUsage.keyEncipherment",
+ FT_BOOLEAN, 8, NULL, 0x20,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_dataEncipherment,
+ { "dataEncipherment", "x509ce.KeyUsage.dataEncipherment",
+ FT_BOOLEAN, 8, NULL, 0x10,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_keyAgreement,
+ { "keyAgreement", "x509ce.KeyUsage.keyAgreement",
+ FT_BOOLEAN, 8, NULL, 0x08,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_keyCertSign,
+ { "keyCertSign", "x509ce.KeyUsage.keyCertSign",
+ FT_BOOLEAN, 8, NULL, 0x04,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_cRLSign,
+ { "cRLSign", "x509ce.KeyUsage.cRLSign",
+ FT_BOOLEAN, 8, NULL, 0x02,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_encipherOnly,
+ { "encipherOnly", "x509ce.KeyUsage.encipherOnly",
+ FT_BOOLEAN, 8, NULL, 0x01,
+ NULL, HFILL }},
+ { &hf_x509ce_KeyUsage_decipherOnly,
+ { "decipherOnly", "x509ce.KeyUsage.decipherOnly",
+ FT_BOOLEAN, 8, NULL, 0x80,
+ NULL, HFILL }},
+ { &hf_x509ce_OnlyCertificateTypes_user,
+ { "user", "x509ce.OnlyCertificateTypes.user",
+ FT_BOOLEAN, 8, NULL, 0x80,
+ NULL, HFILL }},
+ { &hf_x509ce_OnlyCertificateTypes_authority,
+ { "authority", "x509ce.OnlyCertificateTypes.authority",
+ FT_BOOLEAN, 8, NULL, 0x40,
+ NULL, HFILL }},
+ { &hf_x509ce_OnlyCertificateTypes_attribute,
+ { "attribute", "x509ce.OnlyCertificateTypes.attribute",
+ FT_BOOLEAN, 8, NULL, 0x20,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_unused,
+ { "unused", "x509ce.ReasonFlags.unused",
+ FT_BOOLEAN, 8, NULL, 0x80,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_keyCompromise,
+ { "keyCompromise", "x509ce.ReasonFlags.keyCompromise",
+ FT_BOOLEAN, 8, NULL, 0x40,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_cACompromise,
+ { "cACompromise", "x509ce.ReasonFlags.cACompromise",
+ FT_BOOLEAN, 8, NULL, 0x20,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_affiliationChanged,
+ { "affiliationChanged", "x509ce.ReasonFlags.affiliationChanged",
+ FT_BOOLEAN, 8, NULL, 0x10,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_superseded,
+ { "superseded", "x509ce.ReasonFlags.superseded",
+ FT_BOOLEAN, 8, NULL, 0x08,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_cessationOfOperation,
+ { "cessationOfOperation", "x509ce.ReasonFlags.cessationOfOperation",
+ FT_BOOLEAN, 8, NULL, 0x04,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_certificateHold,
+ { "certificateHold", "x509ce.ReasonFlags.certificateHold",
+ FT_BOOLEAN, 8, NULL, 0x02,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_privilegeWithdrawn,
+ { "privilegeWithdrawn", "x509ce.ReasonFlags.privilegeWithdrawn",
+ FT_BOOLEAN, 8, NULL, 0x01,
+ NULL, HFILL }},
+ { &hf_x509ce_ReasonFlags_aACompromise,
+ { "aACompromise", "x509ce.ReasonFlags.aACompromise",
+ FT_BOOLEAN, 8, NULL, 0x80,
+ NULL, HFILL }},
+ { &hf_x509ce_EntrustInfoFlags_keyUpdateAllowed,
+ { "keyUpdateAllowed", "x509ce.EntrustInfoFlags.keyUpdateAllowed",
+ FT_BOOLEAN, 8, NULL, 0x80,
+ NULL, HFILL }},
+ { &hf_x509ce_EntrustInfoFlags_newExtensions,
+ { "newExtensions", "x509ce.EntrustInfoFlags.newExtensions",
+ FT_BOOLEAN, 8, NULL, 0x40,
+ NULL, HFILL }},
+ { &hf_x509ce_EntrustInfoFlags_pKIXCertificate,
+ { "pKIXCertificate", "x509ce.EntrustInfoFlags.pKIXCertificate",
+ FT_BOOLEAN, 8, NULL, 0x20,
+ NULL, HFILL }},
+ { &hf_x509ce_EntrustInfoFlags_enterpriseCategory,
+ { "enterpriseCategory", "x509ce.EntrustInfoFlags.enterpriseCategory",
+ FT_BOOLEAN, 8, NULL, 0x10,
+ NULL, HFILL }},
+ { &hf_x509ce_EntrustInfoFlags_webCategory,
+ { "webCategory", "x509ce.EntrustInfoFlags.webCategory",
+ FT_BOOLEAN, 8, NULL, 0x08,
+ NULL, HFILL }},
+ { &hf_x509ce_EntrustInfoFlags_sETCategory,
+ { "sETCategory", "x509ce.EntrustInfoFlags.sETCategory",
+ FT_BOOLEAN, 8, NULL, 0x04,
+ NULL, HFILL }},
+ };
+
+ /* List of subtrees */
+ static gint *ett[] = {
+ &ett_x509ce_AuthorityKeyIdentifier,
+ &ett_x509ce_KeyUsage,
+ &ett_x509ce_KeyPurposeIDs,
+ &ett_x509ce_PrivateKeyUsagePeriod,
+ &ett_x509ce_CertificatePoliciesSyntax,
+ &ett_x509ce_PolicyInformation,
+ &ett_x509ce_SEQUENCE_SIZE_1_MAX_OF_PolicyQualifierInfo,
+ &ett_x509ce_PolicyQualifierInfo,
+ &ett_x509ce_PolicyMappingsSyntax,
+ &ett_x509ce_PolicyMappingsSyntax_item,
+ &ett_x509ce_GeneralNames,
+ &ett_x509ce_GeneralName,
+ &ett_x509ce_OtherName,
+ &ett_x509ce_EDIPartyName,
+ &ett_x509ce_AttributesSyntax,
+ &ett_x509ce_BasicConstraintsSyntax,
+ &ett_x509ce_NameConstraintsSyntax,
+ &ett_x509ce_GeneralSubtrees,
+ &ett_x509ce_GeneralSubtree,
+ &ett_x509ce_PolicyConstraintsSyntax,
+ &ett_x509ce_CRLScopeSyntax,
+ &ett_x509ce_PerAuthorityScope,
+ &ett_x509ce_OnlyCertificateTypes,
+ &ett_x509ce_NumberRange,
+ &ett_x509ce_BaseRevocationInfo,
+ &ett_x509ce_StatusReferrals,
+ &ett_x509ce_StatusReferral,
+ &ett_x509ce_CRLReferral,
+ &ett_x509ce_DeltaRefInfo,
+ &ett_x509ce_DeltaInformation,
+ &ett_x509ce_CRLDistPointsSyntax,
+ &ett_x509ce_DistributionPoint,
+ &ett_x509ce_DistributionPointName,
+ &ett_x509ce_ReasonFlags,
+ &ett_x509ce_IssuingDistPointSyntax,
+ &ett_x509ce_ToBeRevokedSyntax,
+ &ett_x509ce_ToBeRevokedGroup,
+ &ett_x509ce_ReasonInfo,
+ &ett_x509ce_CertificateGroup,
+ &ett_x509ce_CertificateGroupNumberRange,
+ &ett_x509ce_CertificateSerialNumbers,
+ &ett_x509ce_RevokedGroupsSyntax,
+ &ett_x509ce_RevokedGroup,
+ &ett_x509ce_RevokedCertificateGroup,
+ &ett_x509ce_AAIssuingDistPointSyntax,
+ &ett_x509ce_CertificateExactAssertion,
+ &ett_x509ce_CertificateAssertion,
+ &ett_x509ce_AltNameType,
+ &ett_x509ce_CertPolicySet,
+ &ett_x509ce_CertificatePairExactAssertion,
+ &ett_x509ce_CertificatePairAssertion,
+ &ett_x509ce_CertificateListExactAssertion,
+ &ett_x509ce_CertificateListAssertion,
+ &ett_x509ce_PkiPathMatchSyntax,
+ &ett_x509ce_EnhancedCertificateAssertion,
+ &ett_x509ce_AltName,
+ &ett_x509ce_CertificateTemplate,
+ &ett_x509ce_NtdsCaSecurity,
+ &ett_x509ce_NtdsObjectSid_U,
+ &ett_x509ce_EntrustVersionInfo,
+ &ett_x509ce_EntrustInfoFlags,
+ &ett_x509ce_NFTypes,
+ &ett_x509ce_ScramblerCapabilities,
+ };
+
+ /* Register protocol */
+ proto_x509ce = proto_register_protocol(PNAME, PSNAME, PFNAME);
+
+ /* Register fields and subtrees */
+ proto_register_field_array(proto_x509ce, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+
+}
+
+
+/*--- proto_reg_handoff_x509ce -------------------------------------------*/
+void proto_reg_handoff_x509ce(void) {
+ register_ber_oid_dissector("2.5.29.3", dissect_CertificatePoliciesSyntax_PDU, proto_x509ce, "id-ce-certificatePolicies");
+ register_ber_oid_dissector("2.5.29.9", dissect_AttributesSyntax_PDU, proto_x509ce, "id-ce-subjectDirectoryAttributes");
+ register_ber_oid_dissector("2.5.29.14", dissect_SubjectKeyIdentifier_PDU, proto_x509ce, "id-ce-subjectKeyIdentifier");
+ register_ber_oid_dissector("2.5.29.15", dissect_KeyUsage_PDU, proto_x509ce, "id-ce-keyUsage");
+ register_ber_oid_dissector("2.5.29.16", dissect_PrivateKeyUsagePeriod_PDU, proto_x509ce, "id-ce-privateKeyUsagePeriod");
+ register_ber_oid_dissector("2.5.29.17", dissect_GeneralNames_PDU, proto_x509ce, "id-ce-subjectAltName");
+ register_ber_oid_dissector("2.5.29.18", dissect_GeneralNames_PDU, proto_x509ce, "id-ce-issuerAltName");
+ register_ber_oid_dissector("2.5.29.19", dissect_BasicConstraintsSyntax_PDU, proto_x509ce, "id-ce-basicConstraints");
+ register_ber_oid_dissector("2.5.29.20", dissect_CRLNumber_PDU, proto_x509ce, "id-ce-cRLNumber");
+ register_ber_oid_dissector("2.5.29.21", dissect_CRLReason_PDU, proto_x509ce, "id-ce-reasonCode");
+ register_ber_oid_dissector("2.5.29.23", dissect_HoldInstruction_PDU, proto_x509ce, "id-ce-instructionCode");
+ register_ber_oid_dissector("2.5.29.27", dissect_BaseCRLNumber_PDU, proto_x509ce, "id-ce-deltaCRLIndicator");
+ register_ber_oid_dissector("2.5.29.28", dissect_IssuingDistPointSyntax_PDU, proto_x509ce, "id-ce-issuingDistributionPoint");
+ register_ber_oid_dissector("2.5.29.29", dissect_GeneralNames_PDU, proto_x509ce, "id-ce-certificateIssuer");
+ register_ber_oid_dissector("2.5.29.30", dissect_NameConstraintsSyntax_PDU, proto_x509ce, "id-ce-nameConstraints");
+ register_ber_oid_dissector("2.5.29.31", dissect_CRLDistPointsSyntax_PDU, proto_x509ce, "id-ce-cRLDistributionPoints");
+ register_ber_oid_dissector("2.5.29.32", dissect_CertificatePoliciesSyntax_PDU, proto_x509ce, "id-ce-certificatePolicies");
+ register_ber_oid_dissector("2.5.29.33", dissect_PolicyMappingsSyntax_PDU, proto_x509ce, "id-ce-policyMappings");
+ register_ber_oid_dissector("2.5.29.35", dissect_AuthorityKeyIdentifier_PDU, proto_x509ce, "id-ce-authorityKeyIdentifier");
+ register_ber_oid_dissector("2.5.29.36", dissect_PolicyConstraintsSyntax_PDU, proto_x509ce, "id-ce-policyConstraints");
+ register_ber_oid_dissector("2.5.29.37", dissect_KeyPurposeIDs_PDU, proto_x509ce, "id-ce-extKeyUsage");
+ register_ber_oid_dissector("2.5.29.40", dissect_CRLStreamIdentifier_PDU, proto_x509ce, "id-ce-cRLStreamIdentifier");
+ register_ber_oid_dissector("2.5.29.44", dissect_CRLScopeSyntax_PDU, proto_x509ce, "id-ce-cRLScope");
+ register_ber_oid_dissector("2.5.29.45", dissect_StatusReferrals_PDU, proto_x509ce, "id-ce-statusReferrals");
+ register_ber_oid_dissector("2.5.29.46", dissect_CRLDistPointsSyntax_PDU, proto_x509ce, "id-ce-freshestCRL");
+ register_ber_oid_dissector("2.5.29.47", dissect_OrderedListSyntax_PDU, proto_x509ce, "id-ce-orderedList");
+ register_ber_oid_dissector("2.5.29.53", dissect_DeltaInformation_PDU, proto_x509ce, "id-ce-deltaInfo");
+ register_ber_oid_dissector("2.5.29.54", dissect_SkipCerts_PDU, proto_x509ce, "id-ce-inhibitAnyPolicy");
+ register_ber_oid_dissector("2.5.29.58", dissect_ToBeRevokedSyntax_PDU, proto_x509ce, "id-ce-toBeRevoked");
+ register_ber_oid_dissector("2.5.29.59", dissect_RevokedGroupsSyntax_PDU, proto_x509ce, "id-ce-RevokedGroups");
+ register_ber_oid_dissector("2.5.29.60", dissect_ExpiredCertsOnCRL_PDU, proto_x509ce, "id-ce-expiredCertsOnCRL");
+ register_ber_oid_dissector("2.5.29.61", dissect_AAIssuingDistPointSyntax_PDU, proto_x509ce, "id-ce-aAissuingDistributionPoint");
+ register_ber_oid_dissector("1.3.6.1.5.5.7.1.34", dissect_NFTypes_PDU, proto_x509ce, "id-pe-nftype");
+ register_ber_oid_dissector("2.5.13.35", dissect_CertificateAssertion_PDU, proto_x509ce, "id-mr-certificateMatch");
+ register_ber_oid_dissector("2.5.13.36", dissect_CertificatePairExactAssertion_PDU, proto_x509ce, "id-mr-certificatePairExactMatch");
+ register_ber_oid_dissector("2.5.13.37", dissect_CertificatePairAssertion_PDU, proto_x509ce, "id-mr-certificatePairMatch");
+ register_ber_oid_dissector("2.5.13.38", dissect_CertificateListExactAssertion_PDU, proto_x509ce, "id-mr-certificateListExactMatch");
+ register_ber_oid_dissector("2.5.13.39", dissect_CertificateListAssertion_PDU, proto_x509ce, "id-mr-certificateListMatch");
+ register_ber_oid_dissector("2.5.13.62", dissect_PkiPathMatchSyntax_PDU, proto_x509ce, "id-mr-pkiPathMatch");
+ register_ber_oid_dissector("2.5.13.65", dissect_EnhancedCertificateAssertion_PDU, proto_x509ce, "id-mr-enhancedCertificateMatch");
+ register_ber_oid_dissector("1.3.6.1.4.1.311.21.7", dissect_CertificateTemplate_PDU, proto_x509ce, "id-ms-certificate-template");
+ register_ber_oid_dissector("1.3.6.1.4.1.311.21.10", dissect_CertificatePoliciesSyntax_PDU, proto_x509ce, "id-ms-application-certificate-policies");
+ register_ber_oid_dissector("1.3.6.1.4.1.311.25.2", dissect_NtdsCaSecurity_PDU, proto_x509ce, "id-ms-ntds-ca-security");
+ register_ber_oid_dissector("1.3.6.1.4.1.311.25.2.1", dissect_NtdsObjectSid_PDU, proto_x509ce, "id-ms-ntds-object-sid");
+ register_ber_oid_dissector("1.2.840.113533.7.65.0", dissect_EntrustVersionInfo_PDU, proto_x509ce, "id-ce-entrustVersionInfo");
+
+ register_ber_oid_dissector("2.5.29.24", dissect_x509ce_invalidityDate_callback, proto_x509ce, "id-ce-invalidityDate");
+ register_ber_oid_dissector("2.5.29.51", dissect_x509ce_baseUpdateTime_callback, proto_x509ce, "id-ce-baseUpdateTime");
+ oid_add_from_string("anyPolicy","2.5.29.32.0");
+}
+
+
+/*
+ * Editor modelines - https://www.wireshark.org/tools/modelines.html
+ *
+ * Local Variables:
+ * c-basic-offset: 2
+ * tab-width: 8
+ * indent-tabs-mode: nil
+ * End:
+ *
+ * vi: set shiftwidth=2 tabstop=8 expandtab:
+ * :indentSize=2:tabSize=8:noTabs=true:
+ */