aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-kerberos.h
AgeCommit message (Collapse)AuthorFilesLines
2014-04-18Use new BER functions in kpasswd.Stig Bjørlykke1-1/+2
Added RFC 3244 ChangePasswdData to the kerberos dissector. This is the last dissector using the "old BER" functions. Change-Id: I1d79047103c07c268d08e652745391f1ac37c82c Reviewed-on: https://code.wireshark.org/review/1198 Reviewed-by: Tomáš Kukosa <tomas.kukosa@unify.com> Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-04-17Switch to using the ASN1 based kerberos dissector.AndersBroman1-1/+21
Change-Id: Ib8945cdad149b71e3f79bd88032fd10f55ba556d Reviewed-on: https://code.wireshark.org/review/1174 Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-03-04Remove all $Id$ from top of fileAlexis La Goutte1-2/+0
(Using sed : sed -i '/^ \* \$Id\$/,+1 d') Fix manually some typo (in export_object_dicom.c and crc16-plain.c) Change-Id: I4c1ae68d1c4afeace8cb195b53c715cf9e1227a8 Reviewed-on: https://code.wireshark.org/review/497 Reviewed-by: Anders Broman <a.broman58@gmail.com>
2014-02-25packet-kerberos: remember in what frame a key was learnedStefan Metzmacher1-0/+1
Change-Id: Icd05d4941fdacac44094fafbad07f08ec4cbe976 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-on: https://code.wireshark.org/review/364 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2013-03-01Export libwireshark symbols using WS_DLL_PUBLIC defineBalint Reczey1-0/+3
Also remove old WS_VAR_IMPORT define and related Makefile magic everywhere in the project. svn path=/trunk/; revision=47992
2012-06-28Update Free Software Foundation address.Jakub Zawadzki1-1/+1
(COPYING will be updated in next commit) svn path=/trunk/; revision=43536
2009-10-07add a new function read_keytab_file_from_preferences(void)Ronnie Sahlberg1-0/+2
that can be called by dissectoirs using kerberos keytab files. This function will load a new keytab file on demand, if it is changed in the preferences. The previous code had you save the preferences and then restart wireshark which is suboptimal from a user friendly perspective svn path=/trunk/; revision=30384
2009-07-28When we passed the crytobuffer to krb5_c_decrypt() we never actually Ronnie Sahlberg1-2/+1
verified that we did have enough data in the buffer/tvb, which could lead to a SEGV. (for example if we enable KRB5 decryption but we do NOT use TCP reassembly, and the encrypted data goes beyong the end of the current segment) Change the signature to decrypt_krb5_data() to take a TVB instead of a buffer+length. Actually check that we do have the entire encrypted PDU before calling out to the kerberos libraries. svn path=/trunk/; revision=29213
2008-10-16Revert files checked in by misstake.Anders Broman1-40/+5
svn path=/trunk/; revision=26485
2008-10-16Add asn1 file from Heimdal use som stuff from it add more dissection in the ↵Anders Broman1-5/+40
template and .cnf file. svn path=/trunk/; revision=26484
2008-10-05kerberos/gss enhancementsRonnie Sahlberg1-1/+4
add a parameter *datalen to decrypt_krb5_data() so that we can pass back the length of the decrypted blob back to the caller. This is useful for when there are "junk" at the end of the blob and thus the decrypted data is not the same size as the encrypted blob. GSS CFX is one such example. (we should have done this earlier since it might have made some other stuff easier to imlement...) make the preference setting krb_decrypt a globally visible variable so we can see its value and act on it from callers of krb decryption from outside of packet-kerberos.c i.e. from GSS CFX Make keytype == -1 a wildcard that when passed to decrypt_krb5_data() will try any/all encryption keys. This since GSS CFX does not provide the enctype in the GSS layer. (The GSS CFX enctype is only negotiated during the AP-REQ/REP so we should later pick this value up and store it in a CFX session variable. That is for a later enhancement. ) Enhance the GSS decryption (that for hitorical reasons are implemented in packet-spnego.c and not packet-gssapi.c :-) ) to also handle decryption of GSS CFX This should make wireshark able to decrypt any/all GSSAPI RFC4121 packets, if the keytab file is provided. I have successfully decrypted LDAP using GSS CFX with AES encryption with this. svn path=/trunk/; revision=26350
2007-05-13Second step in introducing asn context to BER dissectors just like in PER.Anders Broman1-4/+4
svn path=/trunk/; revision=21753
2007-05-06Start introducing actx to ber functions.Anders Broman1-4/+4
svn path=/trunk/; revision=21705
2006-10-31change the signature for the get_pdu_len() function pointer passed to ↵Ronnie Sahlberg1-1/+1
tcp_dissect_pdus() to also include a packet_info pointer. there are many reasons why some protocols actually need to be able to access the pinfo structure while determining the pdu size svn path=/trunk/; revision=19751
2006-05-21change a whole bunch of ethereal into wiresharkRonnie Sahlberg1-2/+2
svn path=/trunk/; revision=18196
2005-12-23from eric wedelRonnie Sahlberg1-0/+7
kpasswd over tcp support svn path=/trunk/; revision=16885
2005-08-28In at least some captures, some Kerberos packets contain just a TicketGuy Harris1-1/+1
structure. Handle that. Don't muck with the columns, or put a top-level Kerberos protocol item into the protocol tree, until we decide that we really have a Kerberos packet. Do, however, clear the Info column if we're dissecting the Kerberos protocol. svn path=/trunk/; revision=15590
2005-07-09Make a bunch of items in encryption code arrays of guint8, and make someGuy Harris1-1/+1
pointers either "void *" or "guint8 *", to reduce the level of compiler warnings (the data in question is largely binary in those cases). svn path=/trunk/; revision=14886
2005-06-28Declare "decrypt_krb5_data()" for use by the KINK dissector.Guy Harris1-0/+7
svn path=/trunk/; revision=14809
2005-06-19Fix trivial warningJörg Mayer1-1/+1
svn path=/trunk/; revision=14701
2005-05-27From T.NakashimaRonnie Sahlberg1-0/+1
updates to KINK svn path=/trunk/; revision=14453
2005-03-21make ethereal decrypt gss-krb (secure ldap and ms signandseal for dce)Ronnie Sahlberg1-2/+2
also when linked with mit kerberos svn path=/trunk/; revision=13850
2005-03-21remove some heimdal dependencies we dont really needRonnie Sahlberg1-2/+3
and prepare for gssapi mit support svn path=/trunk/; revision=13849
2005-03-07export some symbols we will need later.Ronnie Sahlberg1-2/+14
svn path=/trunk/; revision=13646
2005-03-06export decrypt_krb5_dataRonnie Sahlberg1-0/+4
svn path=/trunk/; revision=13641
2005-03-04make kpasswd privide subdissectors to handle the user-data field for the ↵Ronnie Sahlberg1-0/+3
KRB_PRIV structure for kpasswd requests and replies. decrypt and behold the new password in plaintext in all its glory (given you have the keytab with the old one of course) svn path=/trunk/; revision=13586
2005-03-04make ethereal able to decrypt KRB_PRIV which kpasswd usesRonnie Sahlberg1-1/+2
svn path=/trunk/; revision=13583
2004-10-28Add support for pkauthdata and pkdhkeydata OIDs.Gerald Combs1-0/+6
svn path=/trunk/; revision=12426
2004-07-18Move dissectors to epan/dissectors directory.Gilbert Ramirez1-0/+46
Also move ncp222.py, x11-fields, process-x11-fields.pl, make-reg-dotc, and make-reg-dotc.py. Adjust #include lines in files that include packet-*.h files. svn path=/trunk/; revision=11410