aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-pkinit.c
diff options
context:
space:
mode:
authorTomas Kukosa <tomas.kukosa@siemens.com>2006-08-16 05:58:39 +0000
committerTomas Kukosa <tomas.kukosa@siemens.com>2006-08-16 05:58:39 +0000
commit5cd8c719e640cce981b68fa8a3964b3ddcba0c5a (patch)
tree28e91d9d8368623c83eb709c790b9bb47cfa3113 /epan/dissectors/packet-pkinit.c
parentc5bf44c6ad587dfcaba3e056ee0d2bb65e5953e2 (diff)
ASN.1 dissectors regenerated with new asn2wrs to get updated field blurb
svn path=/trunk/; revision=18921
Diffstat (limited to 'epan/dissectors/packet-pkinit.c')
-rw-r--r--epan/dissectors/packet-pkinit.c42
1 files changed, 21 insertions, 21 deletions
diff --git a/epan/dissectors/packet-pkinit.c b/epan/dissectors/packet-pkinit.c
index 25c778221f..879c31b3c2 100644
--- a/epan/dissectors/packet-pkinit.c
+++ b/epan/dissectors/packet-pkinit.c
@@ -379,87 +379,87 @@ void proto_register_pkinit(void) {
{ &hf_pkinit_AuthPack_PDU,
{ "AuthPack", "pkinit.AuthPack",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack", HFILL }},
+ "pkinit.AuthPack", HFILL }},
{ &hf_pkinit_KDCDHKeyInfo_PDU,
{ "KDCDHKeyInfo", "pkinit.KDCDHKeyInfo",
FT_NONE, BASE_NONE, NULL, 0,
- "KDCDHKeyInfo", HFILL }},
+ "pkinit.KDCDHKeyInfo", HFILL }},
{ &hf_pkinit_signedAuthPack,
{ "signedAuthPack", "pkinit.signedAuthPack",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsReq/signedAuthPack", HFILL }},
+ "cms.ContentInfo", HFILL }},
{ &hf_pkinit_trustedCertifiers,
{ "trustedCertifiers", "pkinit.trustedCertifiers",
FT_UINT32, BASE_DEC, NULL, 0,
- "PaPkAsReq/trustedCertifiers", HFILL }},
+ "pkinit.SEQUENCE_OF_TrustedCA", HFILL }},
{ &hf_pkinit_trustedCertifiers_item,
{ "Item", "pkinit.trustedCertifiers_item",
FT_UINT32, BASE_DEC, VALS(pkinit_TrustedCA_vals), 0,
- "PaPkAsReq/trustedCertifiers/_item", HFILL }},
+ "pkinit.TrustedCA", HFILL }},
{ &hf_pkinit_kdcCert,
{ "kdcCert", "pkinit.kdcCert",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsReq/kdcCert", HFILL }},
+ "cms.IssuerAndSerialNumber", HFILL }},
{ &hf_pkinit_caName,
{ "caName", "pkinit.caName",
FT_UINT32, BASE_DEC, NULL, 0,
- "TrustedCA/caName", HFILL }},
+ "pkix1explicit.Name", HFILL }},
{ &hf_pkinit_issuerAndSerial,
{ "issuerAndSerial", "pkinit.issuerAndSerial",
FT_NONE, BASE_NONE, NULL, 0,
- "TrustedCA/issuerAndSerial", HFILL }},
+ "cms.IssuerAndSerialNumber", HFILL }},
{ &hf_pkinit_pkAuthenticator,
{ "pkAuthenticator", "pkinit.pkAuthenticator",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack/pkAuthenticator", HFILL }},
+ "pkinit.PKAuthenticator", HFILL }},
{ &hf_pkinit_clientPublicValue,
{ "clientPublicValue", "pkinit.clientPublicValue",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack/clientPublicValue", HFILL }},
+ "pkix1explicit.SubjectPublicKeyInfo", HFILL }},
{ &hf_pkinit_supportedCMSTypes,
{ "supportedCMSTypes", "pkinit.supportedCMSTypes",
FT_UINT32, BASE_DEC, NULL, 0,
- "AuthPack/supportedCMSTypes", HFILL }},
+ "pkinit.SEQUENCE_OF_AlgorithmIdentifier", HFILL }},
{ &hf_pkinit_supportedCMSTypes_item,
{ "Item", "pkinit.supportedCMSTypes_item",
FT_NONE, BASE_NONE, NULL, 0,
- "AuthPack/supportedCMSTypes/_item", HFILL }},
+ "pkix1explicit.AlgorithmIdentifier", HFILL }},
{ &hf_pkinit_cusec,
{ "cusec", "pkinit.cusec",
FT_INT32, BASE_DEC, NULL, 0,
- "PKAuthenticator/cusec", HFILL }},
+ "pkinit.INTEGER", HFILL }},
{ &hf_pkinit_ctime,
{ "ctime", "pkinit.ctime",
FT_NONE, BASE_NONE, NULL, 0,
- "PKAuthenticator/ctime", HFILL }},
+ "KerberosV5Spec2.KerberosTime", HFILL }},
{ &hf_pkinit_paNonce,
{ "nonce", "pkinit.nonce",
FT_UINT32, BASE_DEC, NULL, 0,
- "PKAuthenticator/nonce", HFILL }},
+ "pkinit.INTEGER_0_4294967295", HFILL }},
{ &hf_pkinit_paChecksum,
{ "paChecksum", "pkinit.paChecksum",
FT_NONE, BASE_NONE, NULL, 0,
- "PKAuthenticator/paChecksum", HFILL }},
+ "KerberosV5Spec2.Checksum", HFILL }},
{ &hf_pkinit_dhSignedData,
{ "dhSignedData", "pkinit.dhSignedData",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsRep/dhSignedData", HFILL }},
+ "cms.ContentInfo", HFILL }},
{ &hf_pkinit_encKeyPack,
{ "encKeyPack", "pkinit.encKeyPack",
FT_NONE, BASE_NONE, NULL, 0,
- "PaPkAsRep/encKeyPack", HFILL }},
+ "cms.ContentInfo", HFILL }},
{ &hf_pkinit_subjectPublicKey,
{ "subjectPublicKey", "pkinit.subjectPublicKey",
FT_BYTES, BASE_HEX, NULL, 0,
- "KDCDHKeyInfo/subjectPublicKey", HFILL }},
+ "pkinit.BIT_STRING", HFILL }},
{ &hf_pkinit_dhNonce,
{ "nonce", "pkinit.nonce",
FT_INT32, BASE_DEC, NULL, 0,
- "KDCDHKeyInfo/nonce", HFILL }},
+ "pkinit.INTEGER", HFILL }},
{ &hf_pkinit_dhKeyExpiration,
{ "dhKeyExpiration", "pkinit.dhKeyExpiration",
FT_NONE, BASE_NONE, NULL, 0,
- "KDCDHKeyInfo/dhKeyExpiration", HFILL }},
+ "KerberosV5Spec2.KerberosTime", HFILL }},
/*--- End of included file: packet-pkinit-hfarr.c ---*/
#line 90 "packet-pkinit-template.c"