summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/asn1/x509af/x509af.cnf
blob: 3061ed2c6efdbd6357d53f8b2c5d684448f1d4b8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
# x509.cnf
# X509 conformation file

#.IMPORT ../x509ce/x509ce-exp.cnf
#.IMPORT ../x509if/x509if-exp.cnf
#.IMPORT ../x509sat/x509sat-exp.cnf

#.MODULE_EXPORTS
EXTENSION
ACPathData
AlgorithmIdentifier
AttCertValidityPeriod
AttributeCertificate
AttributeCertificateAssertion
AttributeCertificateInfo
AttributeCertificationPath
Certificate
Certificate_PDU
Certificates
CertificateList
CertificatePair
CertificateSerialNumber
CertificationPath
CrossCertificates
Extension
Extensions
ForwardCertificationPath
IssuerSerial
SubjectPublicKeyInfo
Time
Validity
Version

#.PDU
SubjectPublicKeyInfo

#.REGISTER
Certificate				B "2.5.4.36" "id-at-userCertificate"
Certificate				B "2.5.4.37" "id-at-cAcertificate"
CertificateList			B "2.5.4.38" "id-at-authorityRevocationList"
CertificateList			B "2.5.4.39" "id-at-certificateRevocationList"
CertificatePair			B "2.5.4.40" "id-at-crossCertificatePair"
CertificateList			B "2.5.4.53" "id-at-deltaRevocationList"
AttributeCertificate	B "2.5.4.58" "id-at-attributeCertificate"
CertificateList			B "2.5.4.59" "id-at-attributeCertificateRevocationList"

DSS-Params				B "1.2.840.10040.4.1" "id-dsa"
# WS Implemet from RFC 1274
Userid					B "0.9.2342.19200300.100.1.1" "id-userid"

#.TYPE_RENAME
AttributeCertificateInfo/subject	InfoSubject
AttributeCertificateAssertion/subject	AssertionSubject

#.FIELD_RENAME
AttributeCertificateInfo/issuer		issuerName
AttributeCertificateInfo/subject info_subject
AttributeCertificateAssertion/subject assertion_subject

AttributeCertificateAssertion/issuer assertionIssuer

AttributeCertificateInfo/subject/subjectName      infoSubjectName
AttributeCertificateAssertion/subject/subjectName assertionSubjectName
IssuerSerial/issuer			issuerName
CertificateList/signedCertificateList/revokedCertificates/_item/userCertificate		revokedUserCertificate
#.END

#.FN_PARS AlgorithmIdentifier/algorithmId
  FN_VARIANT = _str  HF_INDEX = hf_x509af_algorithm_id  VAL_PTR = &actx->external.direct_reference

#.FN_BODY AlgorithmIdentifier/algorithmId
  const char *name;

  %(DEFAULT_BODY)s

  if (algorithm_id) {
    wmem_free(wmem_file_scope(), (void*)algorithm_id);
  }

  if(actx->external.direct_reference) {
    algorithm_id = (const char *)wmem_strdup(wmem_file_scope(), actx->external.direct_reference);

    name = oid_resolved_from_string(actx->pinfo->pool, actx->external.direct_reference);

    proto_item_append_text(tree, " (%%s)", name ? name : actx->external.direct_reference);
  } else {
    algorithm_id = NULL;
  }

#.FN_BODY AlgorithmIdentifier/parameters
  offset=call_ber_oid_callback(actx->external.direct_reference, tvb, offset, actx->pinfo, tree, NULL);

#.FN_HDR SubjectPublicKeyInfo
  int orig_offset = offset;
#.FN_FTR SubjectPublicKeyInfo
  x509af_export_publickey(tvb, actx, orig_offset, offset - orig_offset);
#.END

#.FN_BODY SubjectPublicKeyInfo/subjectPublicKey
  tvbuff_t *bs_tvb = NULL;
# proto_tree *subtree;

  dissect_ber_bitstring(FALSE, actx, NULL, tvb, offset,
                        NULL, 0, hf_index, -1, &bs_tvb);

  /* See RFC 3279 for possible subjectPublicKey values given an Algorithm ID.
   * The contents of subjectPublicKey are always explicitly tagged. */
  if (bs_tvb && !g_strcmp0(algorithm_id, "1.2.840.113549.1.1.1")) { /* id-rsa */
    offset += dissect_pkcs1_RSAPublicKey(FALSE, bs_tvb, 0, actx, tree, hf_index);

# TODO: PKCS#1 only defines RSA; DH and DSA are from PKIX1Algorithms2008
# } else if (bs_tvb && !g_strcmp0(algorithm_id, "1.2.840.10040.4.1")) { /* id-dsa */
#   subtree = proto_item_add_subtree(actx->created_item, ett_subjectpublickey);
#   offset += dissect_DSAPublicKey(FALSE, bs_tvb, 0, actx, subtree, hf_dsa_y);
#
# } else if (bs_tvb && !g_strcmp0(algorithm_id, "1.2.840.10046.2.1")) { /* dhpublicnumber */
#   subtree = proto_item_add_subtree(actx->created_item, ett_subjectpublickey);
#   offset += dissect_DHPublicKey(FALSE, bs_tvb, 0, actx, subtree, hf_dh_y);
#
  } else {
    offset = dissect_ber_bitstring(FALSE, actx, tree, tvb, offset,
                                   NULL, 0, hf_index, -1, NULL);
  }

#.FN_PARS Extension/extnId
  FN_VARIANT = _str  HF_INDEX = hf_x509af_extension_id  VAL_PTR = &actx->external.direct_reference

#.FN_BODY Extension/extnId
  const char *name;

  %(DEFAULT_BODY)s

  if(actx->external.direct_reference) {
    name = oid_resolved_from_string(actx->pinfo->pool, actx->external.direct_reference);

    proto_item_append_text(tree, " (%%s)", name ? name : actx->external.direct_reference);
  }

#.FN_BODY Extension/extnValue
  gint8 ber_class;
  bool pc, ind;
  gint32 tag;
  guint32 len;
  /* skip past the T and L  */
  offset = dissect_ber_identifier(actx->pinfo, tree, tvb, offset, &ber_class, &pc, &tag);
  offset = dissect_ber_length(actx->pinfo, tree, tvb, offset, &len, &ind);
  offset=call_ber_oid_callback(actx->external.direct_reference, tvb, offset, actx->pinfo, tree, NULL);

#.FN_BODY Time/utcTime
  char *outstr, *newstr;
  guint32 tvblen;

  /* the 2-digit year can only be in the range 1950..2049 https://tools.ietf.org/html/rfc5280#section-4.1.2.5.1 */
  offset = dissect_ber_UTCTime(implicit_tag, actx, tree, tvb, offset, hf_index, &outstr, &tvblen);
  if (hf_index >= 0 && outstr) {
    newstr = wmem_strconcat(actx->pinfo->pool, outstr[0] < '5' ? "20": "19", outstr, NULL);
    proto_tree_add_string(tree, hf_index, tvb, offset - tvblen, tvblen, newstr);
  }

#.FN_BODY SubjectName

  const char* str;
  %(DEFAULT_BODY)s

  str = x509if_get_last_dn();
  proto_item_append_text(proto_item_get_parent(tree), " (%%s)", str?str:"");

#.TYPE_ATTR
CertificateSerialNumber TYPE = FT_BYTES  DISPLAY = BASE_NONE
DSS-Params/p TYPE = FT_BYTES  DISPLAY = BASE_NONE
DSS-Params/q TYPE = FT_BYTES  DISPLAY = BASE_NONE
DSS-Params/g TYPE = FT_BYTES  DISPLAY = BASE_NONE

#.FN_PARS CertificateSerialNumber FN_VARIANT = 64

#.END