aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-x509af.c
diff options
context:
space:
mode:
authorRonnie Sahlberg <ronnie_sahlberg@ozemail.com.au>2004-07-20 09:11:40 +0000
committerRonnie Sahlberg <ronnie_sahlberg@ozemail.com.au>2004-07-20 09:11:40 +0000
commit723d3dbe44c0d14ef0849195c662211aaa98fdb8 (patch)
tree0837b1c968637c9b65a5a26b6b11228ed92528da /epan/dissectors/packet-x509af.c
parentd23af58fd6f1783974bd22421fae2af871328770 (diff)
Add the new protocols CMS, X509AF, X509IF, X509CE and X509SAT
to the ethereal build. The dissections are semi-useful but incomplete. The big problem still remaining is the x509if Name object not being dissected properly thus causing the dissection to get out of sync/fail halfway through the certificate structure. work in progress but already semi-useful. svn path=/trunk/; revision=11440
Diffstat (limited to 'epan/dissectors/packet-x509af.c')
-rw-r--r--epan/dissectors/packet-x509af.c1231
1 files changed, 1231 insertions, 0 deletions
diff --git a/epan/dissectors/packet-x509af.c b/epan/dissectors/packet-x509af.c
new file mode 100644
index 0000000000..3fb6017e80
--- /dev/null
+++ b/epan/dissectors/packet-x509af.c
@@ -0,0 +1,1231 @@
+/* Do not modify this file. */
+/* It is created automatically by the ASN.1 to Ethereal dissector compiler */
+/* packet-x509af.c */
+/* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
+
+/* Input file: packet-x509af-template.c */
+/* Include files: packet-x509af-hf.c, packet-x509af-ett.c, packet-x509af-fn.c, packet-x509af-hfarr.c, packet-x509af-ettarr.c, packet-x509af-val.h */
+
+/* packet-x509af.c
+ * Routines for X.509 Authentication Framework packet dissection
+ *
+ * $Id: packet-x509af-template.c,v 1.2 2004/05/25 21:07:43 guy Exp $
+ *
+ * Ethereal - Network traffic analyzer
+ * By Gerald Combs <gerald@ethereal.com>
+ * Copyright 1998 Gerald Combs
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ */
+
+#ifdef HAVE_CONFIG_H
+# include "config.h"
+#endif
+
+#include <glib.h>
+#include <epan/packet.h>
+#include <epan/conversation.h>
+
+#include <stdio.h>
+#include <string.h>
+
+#include "packet-ber.h"
+#include "packet-x509af.h"
+#include "packet-x509ce.h"
+#include "packet-x509if.h"
+
+#define PNAME "X.509 Authentication Framework"
+#define PSNAME "X509AF"
+#define PFNAME "x509af"
+
+/* Initialize the protocol and registered fields */
+int proto_x509af = -1;
+int hf_x509af_algorithm_id = -1;
+
+/*--- Included file: packet-x509af-hf.c ---*/
+
+/* Do not modify this file. */
+/* It is created automatically by the ASN.1 to Ethereal dissector compiler */
+/* packet-x509af-hf.c */
+/* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
+
+static int hf_x509af_signedCertificate = -1; /* T_signedCertificate */
+static int hf_x509af_version = -1; /* Version */
+static int hf_x509af_serialNumber = -1; /* CertificateSerialNumber */
+static int hf_x509af_signature = -1; /* AlgorithmIdentifier */
+static int hf_x509af_issuer = -1; /* Name */
+static int hf_x509af_validity = -1; /* Validity */
+static int hf_x509af_subject = -1; /* Name */
+static int hf_x509af_subjectPublicKeyInfo = -1; /* SubjectPublicKeyInfo */
+static int hf_x509af_issuerUniqueIdentifier = -1; /* UniqueIdentifier */
+static int hf_x509af_subjectUniqueIdentifier = -1; /* UniqueIdentifier */
+static int hf_x509af_extensions = -1; /* Extensions */
+static int hf_x509af_algorithmIdentifier = -1; /* AlgorithmIdentifier */
+static int hf_x509af_encrypted = -1; /* BIT_STRING */
+static int hf_x509af_notBefore = -1; /* Time */
+static int hf_x509af_notAfter = -1; /* Time */
+static int hf_x509af_algorithm = -1; /* AlgorithmIdentifier */
+static int hf_x509af_subjectPublicKey = -1; /* BIT_STRING */
+static int hf_x509af_utcTime = -1; /* UTCTime */
+static int hf_x509af_generalizedTime = -1; /* GeneralizedTime */
+static int hf_x509af_Extensions_item = -1; /* Extension */
+static int hf_x509af_critical = -1; /* BOOLEAN */
+static int hf_x509af_extnValue = -1; /* OCTET_STRING */
+static int hf_x509af_userCertificate = -1; /* Certificate */
+static int hf_x509af_certificationPath = -1; /* ForwardCertificationPath */
+static int hf_x509af_ForwardCertificationPath_item = -1; /* CrossCertificates */
+static int hf_x509af_CrossCertificates_item = -1; /* Certificate */
+static int hf_x509af_theCACertificates = -1; /* SEQUNCE_OF_CertificatePair */
+static int hf_x509af_theCACertificates_item = -1; /* CertificatePair */
+static int hf_x509af_issuedByThisCA = -1; /* Certificate */
+static int hf_x509af_issuedToThisCA = -1; /* Certificate */
+static int hf_x509af_signedCertificateList = -1; /* T_signedCertificateList */
+static int hf_x509af_thisUpdate = -1; /* Time */
+static int hf_x509af_nextUpdate = -1; /* Time */
+static int hf_x509af_revokedCertificates = -1; /* T_revokedCertificates */
+static int hf_x509af_revokedCertificates_item = -1; /* T_revokedCertificates_item */
+static int hf_x509af_userCertificate1 = -1; /* CertificateSerialNumber */
+static int hf_x509af_revocationDate = -1; /* Time */
+static int hf_x509af_crlEntryExtensions = -1; /* Extensions */
+static int hf_x509af_crlExtensions = -1; /* Extensions */
+static int hf_x509af_attributeCertificate = -1; /* AttributeCertificate */
+static int hf_x509af_acPath = -1; /* SEQUNCE_OF_ACPathData */
+static int hf_x509af_acPath_item = -1; /* ACPathData */
+static int hf_x509af_certificate = -1; /* Certificate */
+static int hf_x509af_signedAttributeCertificateInfo = -1; /* AttributeCertificateInfo */
+static int hf_x509af_info_subject = -1; /* InfoSubject */
+static int hf_x509af_baseCertificateID = -1; /* IssuerSerial */
+static int hf_x509af_infoSubjectName = -1; /* GeneralNames */
+static int hf_x509af_issuer1 = -1; /* GeneralNames */
+static int hf_x509af_attCertValidityPeriod = -1; /* AttCertValidityPeriod */
+static int hf_x509af_attributes = -1; /* SEQUNCE_OF_Attribute */
+static int hf_x509af_attributes_item = -1; /* Attribute */
+static int hf_x509af_issuerUniqueID = -1; /* UniqueIdentifier */
+static int hf_x509af_serial = -1; /* CertificateSerialNumber */
+static int hf_x509af_issuerUID = -1; /* UniqueIdentifier */
+static int hf_x509af_notBeforeTime = -1; /* GeneralizedTime */
+static int hf_x509af_notAfterTime = -1; /* GeneralizedTime */
+static int hf_x509af_assertion_subject = -1; /* AssertionSubject */
+static int hf_x509af_assertionSubjectName = -1; /* Name */
+static int hf_x509af_assertionIssuer = -1; /* Name */
+static int hf_x509af_attCertValidity = -1; /* GeneralizedTime */
+static int hf_x509af_attType = -1; /* SET_OF_AttributeType */
+static int hf_x509af_attType_item = -1; /* AttributeType */
+
+/*--- End of included file: packet-x509af-hf.c ---*/
+
+
+/* Initialize the subtree pointers */
+
+/*--- Included file: packet-x509af-ett.c ---*/
+
+/* Do not modify this file. */
+/* It is created automatically by the ASN.1 to Ethereal dissector compiler */
+/* packet-x509af-ett.c */
+/* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
+
+static gint ett_x509af_Certificate = -1;
+static gint ett_x509af_T_signedCertificate = -1;
+static gint ett_x509af_AlgorithmIdentifier = -1;
+static gint ett_x509af_Validity = -1;
+static gint ett_x509af_SubjectPublicKeyInfo = -1;
+static gint ett_x509af_Time = -1;
+static gint ett_x509af_Extensions = -1;
+static gint ett_x509af_Extension = -1;
+static gint ett_x509af_Certificates = -1;
+static gint ett_x509af_ForwardCertificationPath = -1;
+static gint ett_x509af_CrossCertificates = -1;
+static gint ett_x509af_CertificationPath = -1;
+static gint ett_x509af_SEQUNCE_OF_CertificatePair = -1;
+static gint ett_x509af_CertificatePair = -1;
+static gint ett_x509af_CertificateList = -1;
+static gint ett_x509af_T_signedCertificateList = -1;
+static gint ett_x509af_T_revokedCertificates = -1;
+static gint ett_x509af_T_revokedCertificates_item = -1;
+static gint ett_x509af_AttributeCertificationPath = -1;
+static gint ett_x509af_SEQUNCE_OF_ACPathData = -1;
+static gint ett_x509af_ACPathData = -1;
+static gint ett_x509af_AttributeCertificate = -1;
+static gint ett_x509af_AttributeCertificateInfo = -1;
+static gint ett_x509af_InfoSubject = -1;
+static gint ett_x509af_SEQUNCE_OF_Attribute = -1;
+static gint ett_x509af_IssuerSerial = -1;
+static gint ett_x509af_AttCertValidityPeriod = -1;
+static gint ett_x509af_AttributeCertificateAssertion = -1;
+static gint ett_x509af_AssertionSubject = -1;
+static gint ett_x509af_SET_OF_AttributeType = -1;
+
+/*--- End of included file: packet-x509af-ett.c ---*/
+
+
+
+static int dissect_hf_x509af_algorithm_id(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ offset = dissect_ber_object_identifier(FALSE, pinfo, tree, tvb, offset,
+ hf_x509af_algorithm_id, NULL);
+ return offset;
+}
+
+/* Algorithm Identifier can not yet be handled by the compiler */
+static ber_sequence AlgorithmIdentifier_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_OID, BER_FLAGS_NOOWNTAG, dissect_hf_x509af_algorithm_id },
+/*QQQ for the Type we need compiler support for ANY (==FT_BYTES) */
+ { 0, 0, 0, NULL }
+};
+
+int
+dissect_x509af_AlgorithmIdentifier(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ AlgorithmIdentifier_sequence, hf_index, ett_x509af_AlgorithmIdentifier);
+
+ return offset;
+}
+
+
+/*--- Included file: packet-x509af-fn.c ---*/
+
+/* Do not modify this file. */
+/* It is created automatically by the ASN.1 to Ethereal dissector compiler */
+/* packet-x509af-fn.c */
+/* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
+
+static int dissect_issuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuer);
+}
+static int dissect_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_subject);
+}
+static int dissect_issuerUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueIdentifier);
+}
+static int dissect_subjectUniqueIdentifier_impl(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509sat_UniqueIdentifier(TRUE, tvb, offset, pinfo, tree, hf_x509af_subjectUniqueIdentifier);
+}
+static int dissect_infoSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_infoSubjectName);
+}
+static int dissect_issuer1(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509ce_GeneralNames(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuer1);
+}
+static int dissect_attributes_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509if_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes_item);
+}
+static int dissect_issuerUniqueID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUniqueID);
+}
+static int dissect_issuerUID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509sat_UniqueIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuerUID);
+}
+static int dissect_assertionSubjectName(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionSubjectName);
+}
+static int dissect_assertionIssuer(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509if_Name(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertionIssuer);
+}
+static int dissect_attType_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509if_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType_item);
+}
+
+static const value_string Version_vals[] = {
+ { 0, "v1" },
+ { 1, "v2" },
+ { 2, "v3" },
+ { 0, NULL }
+};
+
+
+static int
+dissect_x509af_Version(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_integer(pinfo, tree, tvb, offset, hf_index, NULL);
+
+ return offset;
+}
+static int dissect_version(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Version(FALSE, tvb, offset, pinfo, tree, hf_x509af_version);
+}
+
+
+
+int
+dissect_x509af_CertificateSerialNumber(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_integer(pinfo, tree, tvb, offset, hf_index, NULL);
+
+ return offset;
+}
+static int dissect_serialNumber(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serialNumber);
+}
+static int dissect_userCertificate1(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_userCertificate1);
+}
+static int dissect_serial(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_CertificateSerialNumber(FALSE, tvb, offset, pinfo, tree, hf_x509af_serial);
+}
+
+static int dissect_signature(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_signature);
+}
+static int dissect_algorithmIdentifier(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithmIdentifier);
+}
+static int dissect_algorithm(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_AlgorithmIdentifier(FALSE, tvb, offset, pinfo, tree, hf_x509af_algorithm);
+}
+
+
+static int
+dissect_x509af_UTCTime(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_restricted_string(implicit_tag, BER_UNI_TAG_UTCTime,
+ pinfo, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+static int dissect_utcTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_UTCTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_utcTime);
+}
+
+
+static int
+dissect_x509af_GeneralizedTime(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_generalized_time(pinfo, tree, tvb, offset, hf_index);
+
+ return offset;
+}
+static int dissect_generalizedTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_generalizedTime);
+}
+static int dissect_notBeforeTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBeforeTime);
+}
+static int dissect_notAfterTime(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfterTime);
+}
+static int dissect_attCertValidity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_GeneralizedTime(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidity);
+}
+
+
+static const value_string Time_vals[] = {
+ { 0, "utcTime" },
+ { 1, "generalizedTime" },
+ { 0, NULL }
+};
+
+static ber_choice Time_choice[] = {
+ { 0, BER_CLASS_UNI, BER_UNI_TAG_UTCTime, BER_FLAGS_NOOWNTAG, dissect_utcTime },
+ { 1, BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_generalizedTime },
+ { 0, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_Time(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_choice(pinfo, tree, tvb, offset,
+ Time_choice, hf_index, ett_x509af_Time);
+
+ return offset;
+}
+static int dissect_notBefore(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notBefore);
+}
+static int dissect_notAfter(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_notAfter);
+}
+static int dissect_thisUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_thisUpdate);
+}
+static int dissect_nextUpdate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_nextUpdate);
+}
+static int dissect_revocationDate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Time(FALSE, tvb, offset, pinfo, tree, hf_x509af_revocationDate);
+}
+
+static ber_sequence Validity_sequence[] = {
+ { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notBefore },
+ { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_notAfter },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_Validity(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ Validity_sequence, hf_index, ett_x509af_Validity);
+
+ return offset;
+}
+static int dissect_validity(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Validity(FALSE, tvb, offset, pinfo, tree, hf_x509af_validity);
+}
+
+
+static int
+dissect_x509af_BIT_STRING(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_bitstring(implicit_tag, pinfo, tree, tvb, offset,
+ NULL, hf_index, -1,
+ NULL);
+
+ return offset;
+}
+static int dissect_encrypted(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_encrypted);
+}
+static int dissect_subjectPublicKey(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_BIT_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKey);
+}
+
+static ber_sequence SubjectPublicKeyInfo_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithm },
+ { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKey },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_SubjectPublicKeyInfo(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ SubjectPublicKeyInfo_sequence, hf_index, ett_x509af_SubjectPublicKeyInfo);
+
+ return offset;
+}
+static int dissect_subjectPublicKeyInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_SubjectPublicKeyInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_subjectPublicKeyInfo);
+}
+
+
+static int
+dissect_x509af_BOOLEAN(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_boolean(pinfo, tree, tvb, offset, hf_index);
+
+ return offset;
+}
+static int dissect_critical(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_BOOLEAN(FALSE, tvb, offset, pinfo, tree, hf_x509af_critical);
+}
+
+
+static int
+dissect_x509af_OCTET_STRING(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_octet_string(implicit_tag, pinfo, tree, tvb, offset, hf_index,
+ NULL);
+
+ return offset;
+}
+static int dissect_extnValue(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_OCTET_STRING(FALSE, tvb, offset, pinfo, tree, hf_x509af_extnValue);
+}
+
+static ber_sequence Extension_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_BOOLEAN, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_critical },
+ { BER_CLASS_UNI, BER_UNI_TAG_OCTETSTRING, BER_FLAGS_NOOWNTAG, dissect_extnValue },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_Extension(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ Extension_sequence, hf_index, ett_x509af_Extension);
+
+ return offset;
+}
+static int dissect_Extensions_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Extension(FALSE, tvb, offset, pinfo, tree, hf_x509af_Extensions_item);
+}
+
+static ber_sequence Extensions_sequence_of[1] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_Extensions_item },
+};
+
+static int
+dissect_x509af_Extensions(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
+ Extensions_sequence_of, hf_index, ett_x509af_Extensions);
+
+ return offset;
+}
+static int dissect_extensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_extensions);
+}
+static int dissect_crlEntryExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlEntryExtensions);
+}
+static int dissect_crlExtensions(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Extensions(FALSE, tvb, offset, pinfo, tree, hf_x509af_crlExtensions);
+}
+
+static ber_sequence T_signedCertificate_sequence[] = {
+ { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_version },
+ { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_validity },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_subject },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_subjectPublicKeyInfo },
+ { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_issuerUniqueIdentifier_impl },
+ { BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL|BER_FLAGS_IMPLTAG, dissect_subjectUniqueIdentifier_impl },
+ { BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_extensions },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_T_signedCertificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ T_signedCertificate_sequence, hf_index, ett_x509af_T_signedCertificate);
+
+ return offset;
+}
+static int dissect_signedCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_T_signedCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificate);
+}
+
+static ber_sequence Certificate_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificate },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
+ { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
+ { 0, 0, 0, NULL }
+};
+
+int
+dissect_x509af_Certificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ Certificate_sequence, hf_index, ett_x509af_Certificate);
+
+ return offset;
+}
+static int dissect_userCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_userCertificate);
+}
+static int dissect_CrossCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_CrossCertificates_item);
+}
+static int dissect_issuedByThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedByThisCA);
+}
+static int dissect_issuedToThisCA(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_issuedToThisCA);
+}
+static int dissect_certificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_Certificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificate);
+}
+
+static ber_sequence CrossCertificates_set_of[1] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_CrossCertificates_item },
+};
+
+static int
+dissect_x509af_CrossCertificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
+ CrossCertificates_set_of, hf_index, ett_x509af_CrossCertificates);
+
+ return offset;
+}
+static int dissect_ForwardCertificationPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_CrossCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_ForwardCertificationPath_item);
+}
+
+static ber_sequence ForwardCertificationPath_sequence_of[1] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SET, BER_FLAGS_NOOWNTAG, dissect_ForwardCertificationPath_item },
+};
+
+static int
+dissect_x509af_ForwardCertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
+ ForwardCertificationPath_sequence_of, hf_index, ett_x509af_ForwardCertificationPath);
+
+ return offset;
+}
+static int dissect_certificationPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_ForwardCertificationPath(FALSE, tvb, offset, pinfo, tree, hf_x509af_certificationPath);
+}
+
+static ber_sequence Certificates_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_certificationPath },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_Certificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ Certificates_sequence, hf_index, ett_x509af_Certificates);
+
+ return offset;
+}
+
+static ber_sequence CertificatePair_sequence[] = {
+ { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_issuedByThisCA },
+ { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_issuedToThisCA },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_CertificatePair(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ CertificatePair_sequence, hf_index, ett_x509af_CertificatePair);
+
+ return offset;
+}
+static int dissect_theCACertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates_item);
+}
+
+static ber_sequence SEQUNCE_OF_CertificatePair_sequence_of[1] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_theCACertificates_item },
+};
+
+static int
+dissect_x509af_SEQUNCE_OF_CertificatePair(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
+ SEQUNCE_OF_CertificatePair_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_CertificatePair);
+
+ return offset;
+}
+static int dissect_theCACertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_SEQUNCE_OF_CertificatePair(FALSE, tvb, offset, pinfo, tree, hf_x509af_theCACertificates);
+}
+
+static ber_sequence CertificationPath_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_userCertificate },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_theCACertificates },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_CertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ CertificationPath_sequence, hf_index, ett_x509af_CertificationPath);
+
+ return offset;
+}
+
+static ber_sequence T_revokedCertificates_item_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_userCertificate1 },
+ { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_revocationDate },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_crlEntryExtensions },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_T_revokedCertificates_item(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ T_revokedCertificates_item_sequence, hf_index, ett_x509af_T_revokedCertificates_item);
+
+ return offset;
+}
+static int dissect_revokedCertificates_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_T_revokedCertificates_item(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates_item);
+}
+
+static ber_sequence T_revokedCertificates_sequence_of[1] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_revokedCertificates_item },
+};
+
+static int
+dissect_x509af_T_revokedCertificates(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
+ T_revokedCertificates_sequence_of, hf_index, ett_x509af_T_revokedCertificates);
+
+ return offset;
+}
+static int dissect_revokedCertificates(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_T_revokedCertificates(FALSE, tvb, offset, pinfo, tree, hf_x509af_revokedCertificates);
+}
+
+static ber_sequence T_signedCertificateList_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer },
+ { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_thisUpdate },
+ { BER_CLASS_UNI, -1/*choice*/, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_nextUpdate },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_revokedCertificates },
+ { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_crlExtensions },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_T_signedCertificateList(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ T_signedCertificateList_sequence, hf_index, ett_x509af_T_signedCertificateList);
+
+ return offset;
+}
+static int dissect_signedCertificateList(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_T_signedCertificateList(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedCertificateList);
+}
+
+static ber_sequence CertificateList_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedCertificateList },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
+ { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
+ { 0, 0, 0, NULL }
+};
+
+int
+dissect_x509af_CertificateList(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ CertificateList_sequence, hf_index, ett_x509af_CertificateList);
+
+ return offset;
+}
+
+static ber_sequence IssuerSerial_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer1 },
+ { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serial },
+ { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUID },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_IssuerSerial(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ IssuerSerial_sequence, hf_index, ett_x509af_IssuerSerial);
+
+ return offset;
+}
+static int dissect_baseCertificateID(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_IssuerSerial(FALSE, tvb, offset, pinfo, tree, hf_x509af_baseCertificateID);
+}
+
+
+static const value_string InfoSubject_vals[] = {
+ { 0, "baseCertificateID" },
+ { 1, "subjectName" },
+ { 0, NULL }
+};
+
+static ber_choice InfoSubject_choice[] = {
+ { 0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
+ { 1, BER_CLASS_CON, 1, 0, dissect_infoSubjectName },
+ { 0, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_InfoSubject(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_choice(pinfo, tree, tvb, offset,
+ InfoSubject_choice, hf_index, ett_x509af_InfoSubject);
+
+ return offset;
+}
+static int dissect_info_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_InfoSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_info_subject);
+}
+
+static ber_sequence AttCertValidityPeriod_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notBeforeTime },
+ { BER_CLASS_UNI, BER_UNI_TAG_GeneralizedTime, BER_FLAGS_NOOWNTAG, dissect_notAfterTime },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_AttCertValidityPeriod(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ AttCertValidityPeriod_sequence, hf_index, ett_x509af_AttCertValidityPeriod);
+
+ return offset;
+}
+static int dissect_attCertValidityPeriod(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_AttCertValidityPeriod(FALSE, tvb, offset, pinfo, tree, hf_x509af_attCertValidityPeriod);
+}
+
+static ber_sequence SEQUNCE_OF_Attribute_sequence_of[1] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes_item },
+};
+
+static int
+dissect_x509af_SEQUNCE_OF_Attribute(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
+ SEQUNCE_OF_Attribute_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_Attribute);
+
+ return offset;
+}
+static int dissect_attributes(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_SEQUNCE_OF_Attribute(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributes);
+}
+
+static ber_sequence AttributeCertificateInfo_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_version },
+ { BER_CLASS_CON, -1/*choice*/, BER_FLAGS_NOOWNTAG|BER_FLAGS_NOTCHKTAG, dissect_info_subject },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_issuer1 },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signature },
+ { BER_CLASS_UNI, BER_UNI_TAG_INTEGER, BER_FLAGS_NOOWNTAG, dissect_serialNumber },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attCertValidityPeriod },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributes },
+ { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_issuerUniqueID },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_extensions },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_AttributeCertificateInfo(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ AttributeCertificateInfo_sequence, hf_index, ett_x509af_AttributeCertificateInfo);
+
+ return offset;
+}
+static int dissect_signedAttributeCertificateInfo(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_AttributeCertificateInfo(FALSE, tvb, offset, pinfo, tree, hf_x509af_signedAttributeCertificateInfo);
+}
+
+static ber_sequence AttributeCertificate_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_signedAttributeCertificateInfo },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_algorithmIdentifier },
+ { BER_CLASS_UNI, BER_UNI_TAG_BITSTRING, BER_FLAGS_NOOWNTAG, dissect_encrypted },
+ { 0, 0, 0, NULL }
+};
+
+int
+dissect_x509af_AttributeCertificate(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ AttributeCertificate_sequence, hf_index, ett_x509af_AttributeCertificate);
+
+ return offset;
+}
+static int dissect_attributeCertificate(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_AttributeCertificate(FALSE, tvb, offset, pinfo, tree, hf_x509af_attributeCertificate);
+}
+
+static ber_sequence ACPathData_sequence[] = {
+ { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_certificate },
+ { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_attributeCertificate },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_ACPathData(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ ACPathData_sequence, hf_index, ett_x509af_ACPathData);
+
+ return offset;
+}
+static int dissect_acPath_item(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath_item);
+}
+
+static ber_sequence SEQUNCE_OF_ACPathData_sequence_of[1] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_acPath_item },
+};
+
+static int
+dissect_x509af_SEQUNCE_OF_ACPathData(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence_of(implicit_tag, pinfo, tree, tvb, offset,
+ SEQUNCE_OF_ACPathData_sequence_of, hf_index, ett_x509af_SEQUNCE_OF_ACPathData);
+
+ return offset;
+}
+static int dissect_acPath(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_SEQUNCE_OF_ACPathData(FALSE, tvb, offset, pinfo, tree, hf_x509af_acPath);
+}
+
+static ber_sequence AttributeCertificationPath_sequence[] = {
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_NOOWNTAG, dissect_attributeCertificate },
+ { BER_CLASS_UNI, BER_UNI_TAG_SEQUENCE, BER_FLAGS_OPTIONAL|BER_FLAGS_NOOWNTAG, dissect_acPath },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_AttributeCertificationPath(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ AttributeCertificationPath_sequence, hf_index, ett_x509af_AttributeCertificationPath);
+
+ return offset;
+}
+
+
+static const value_string AssertionSubject_vals[] = {
+ { 0, "baseCertificateID" },
+ { 1, "subjectName" },
+ { 0, NULL }
+};
+
+static ber_choice AssertionSubject_choice[] = {
+ { 0, BER_CLASS_CON, 0, 0, dissect_baseCertificateID },
+ { 1, BER_CLASS_CON, 1, 0, dissect_assertionSubjectName },
+ { 0, 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_AssertionSubject(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_choice(pinfo, tree, tvb, offset,
+ AssertionSubject_choice, hf_index, ett_x509af_AssertionSubject);
+
+ return offset;
+}
+static int dissect_assertion_subject(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_AssertionSubject(FALSE, tvb, offset, pinfo, tree, hf_x509af_assertion_subject);
+}
+
+static ber_sequence SET_OF_AttributeType_set_of[1] = {
+ { -1 /*imported*/, -1 /*imported*/, BER_FLAGS_NOOWNTAG, dissect_attType_item },
+};
+
+static int
+dissect_x509af_SET_OF_AttributeType(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_set_of(implicit_tag, pinfo, tree, tvb, offset,
+ SET_OF_AttributeType_set_of, hf_index, ett_x509af_SET_OF_AttributeType);
+
+ return offset;
+}
+static int dissect_attType(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb, int offset) {
+ return dissect_x509af_SET_OF_AttributeType(FALSE, tvb, offset, pinfo, tree, hf_x509af_attType);
+}
+
+static ber_sequence AttributeCertificateAssertion_sequence[] = {
+ { BER_CLASS_CON, 0, BER_FLAGS_OPTIONAL, dissect_assertion_subject },
+ { BER_CLASS_CON, 1, BER_FLAGS_OPTIONAL, dissect_assertionIssuer },
+ { BER_CLASS_CON, 2, BER_FLAGS_OPTIONAL, dissect_attCertValidity },
+ { BER_CLASS_CON, 3, BER_FLAGS_OPTIONAL, dissect_attType },
+ { 0, 0, 0, NULL }
+};
+
+static int
+dissect_x509af_AttributeCertificateAssertion(gboolean implicit_tag, tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) {
+ offset = dissect_ber_sequence(implicit_tag, pinfo, tree, tvb, offset,
+ AttributeCertificateAssertion_sequence, hf_index, ett_x509af_AttributeCertificateAssertion);
+
+ return offset;
+}
+
+
+/*--- End of included file: packet-x509af-fn.c ---*/
+
+
+
+/*--- proto_register_x509af ----------------------------------------------*/
+void proto_register_x509af(void) {
+
+ /* List of fields */
+ static hf_register_info hf[] = {
+ { &hf_x509af_algorithm_id,
+ { "Algorithm Id", "x509af.algorithm.id",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "Algorithm Id", HFILL }},
+
+/*--- Included file: packet-x509af-hfarr.c ---*/
+
+/* Do not modify this file. */
+/* It is created automatically by the ASN.1 to Ethereal dissector compiler */
+/* packet-x509af-hfarr.c */
+/* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
+
+ { &hf_x509af_signedCertificate,
+ { "signedCertificate", "x509af.signedCertificate",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Certificate/signedCertificate", HFILL }},
+ { &hf_x509af_version,
+ { "version", "x509af.version",
+ FT_INT32, BASE_DEC, VALS(Version_vals), 0,
+ "", HFILL }},
+ { &hf_x509af_serialNumber,
+ { "serialNumber", "x509af.serialNumber",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_signature,
+ { "signature", "x509af.signature",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_issuer,
+ { "issuer", "x509af.issuer",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_validity,
+ { "validity", "x509af.validity",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Certificate/signedCertificate/validity", HFILL }},
+ { &hf_x509af_subject,
+ { "subject", "x509af.subject",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Certificate/signedCertificate/subject", HFILL }},
+ { &hf_x509af_subjectPublicKeyInfo,
+ { "subjectPublicKeyInfo", "x509af.subjectPublicKeyInfo",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Certificate/signedCertificate/subjectPublicKeyInfo", HFILL }},
+ { &hf_x509af_issuerUniqueIdentifier,
+ { "issuerUniqueIdentifier", "x509af.issuerUniqueIdentifier",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Certificate/signedCertificate/issuerUniqueIdentifier", HFILL }},
+ { &hf_x509af_subjectUniqueIdentifier,
+ { "subjectUniqueIdentifier", "x509af.subjectUniqueIdentifier",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Certificate/signedCertificate/subjectUniqueIdentifier", HFILL }},
+ { &hf_x509af_extensions,
+ { "extensions", "x509af.extensions",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_algorithmIdentifier,
+ { "algorithmIdentifier", "x509af.algorithmIdentifier",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_encrypted,
+ { "encrypted", "x509af.encrypted",
+ FT_BYTES, BASE_HEX, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_notBefore,
+ { "notBefore", "x509af.notBefore",
+ FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
+ "Validity/notBefore", HFILL }},
+ { &hf_x509af_notAfter,
+ { "notAfter", "x509af.notAfter",
+ FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
+ "Validity/notAfter", HFILL }},
+ { &hf_x509af_algorithm,
+ { "algorithm", "x509af.algorithm",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "SubjectPublicKeyInfo/algorithm", HFILL }},
+ { &hf_x509af_subjectPublicKey,
+ { "subjectPublicKey", "x509af.subjectPublicKey",
+ FT_BYTES, BASE_HEX, NULL, 0,
+ "SubjectPublicKeyInfo/subjectPublicKey", HFILL }},
+ { &hf_x509af_utcTime,
+ { "utcTime", "x509af.utcTime",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "Time/utcTime", HFILL }},
+ { &hf_x509af_generalizedTime,
+ { "generalizedTime", "x509af.generalizedTime",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "Time/generalizedTime", HFILL }},
+ { &hf_x509af_Extensions_item,
+ { "Item[##]", "x509af.Extensions_item",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "Extensions/_item", HFILL }},
+ { &hf_x509af_critical,
+ { "critical", "x509af.critical",
+ FT_BOOLEAN, 8, NULL, 0,
+ "Extension/critical", HFILL }},
+ { &hf_x509af_extnValue,
+ { "extnValue", "x509af.extnValue",
+ FT_BYTES, BASE_HEX, NULL, 0,
+ "Extension/extnValue", HFILL }},
+ { &hf_x509af_userCertificate,
+ { "userCertificate", "x509af.userCertificate",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_certificationPath,
+ { "certificationPath", "x509af.certificationPath",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "Certificates/certificationPath", HFILL }},
+ { &hf_x509af_ForwardCertificationPath_item,
+ { "Item[##]", "x509af.ForwardCertificationPath_item",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "ForwardCertificationPath/_item", HFILL }},
+ { &hf_x509af_CrossCertificates_item,
+ { "Item(##)", "x509af.CrossCertificates_item",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CrossCertificates/_item", HFILL }},
+ { &hf_x509af_theCACertificates,
+ { "theCACertificates", "x509af.theCACertificates",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "CertificationPath/theCACertificates", HFILL }},
+ { &hf_x509af_theCACertificates_item,
+ { "Item[##]", "x509af.theCACertificates_item",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificationPath/theCACertificates/_item", HFILL }},
+ { &hf_x509af_issuedByThisCA,
+ { "issuedByThisCA", "x509af.issuedByThisCA",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificatePair/issuedByThisCA", HFILL }},
+ { &hf_x509af_issuedToThisCA,
+ { "issuedToThisCA", "x509af.issuedToThisCA",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificatePair/issuedToThisCA", HFILL }},
+ { &hf_x509af_signedCertificateList,
+ { "signedCertificateList", "x509af.signedCertificateList",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificateList/signedCertificateList", HFILL }},
+ { &hf_x509af_thisUpdate,
+ { "thisUpdate", "x509af.thisUpdate",
+ FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
+ "CertificateList/signedCertificateList/thisUpdate", HFILL }},
+ { &hf_x509af_nextUpdate,
+ { "nextUpdate", "x509af.nextUpdate",
+ FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
+ "CertificateList/signedCertificateList/nextUpdate", HFILL }},
+ { &hf_x509af_revokedCertificates,
+ { "revokedCertificates", "x509af.revokedCertificates",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "CertificateList/signedCertificateList/revokedCertificates", HFILL }},
+ { &hf_x509af_revokedCertificates_item,
+ { "Item[##]", "x509af.revokedCertificates_item",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "CertificateList/signedCertificateList/revokedCertificates/_item", HFILL }},
+ { &hf_x509af_userCertificate1,
+ { "userCertificate", "x509af.userCertificate",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "CertificateList/signedCertificateList/revokedCertificates/_item/userCertificate", HFILL }},
+ { &hf_x509af_revocationDate,
+ { "revocationDate", "x509af.revocationDate",
+ FT_UINT32, BASE_DEC, VALS(Time_vals), 0,
+ "CertificateList/signedCertificateList/revokedCertificates/_item/revocationDate", HFILL }},
+ { &hf_x509af_crlEntryExtensions,
+ { "crlEntryExtensions", "x509af.crlEntryExtensions",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "CertificateList/signedCertificateList/revokedCertificates/_item/crlEntryExtensions", HFILL }},
+ { &hf_x509af_crlExtensions,
+ { "crlExtensions", "x509af.crlExtensions",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "CertificateList/signedCertificateList/crlExtensions", HFILL }},
+ { &hf_x509af_attributeCertificate,
+ { "attributeCertificate", "x509af.attributeCertificate",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_acPath,
+ { "acPath", "x509af.acPath",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "AttributeCertificationPath/acPath", HFILL }},
+ { &hf_x509af_acPath_item,
+ { "Item[##]", "x509af.acPath_item",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificationPath/acPath/_item", HFILL }},
+ { &hf_x509af_certificate,
+ { "certificate", "x509af.certificate",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "ACPathData/certificate", HFILL }},
+ { &hf_x509af_signedAttributeCertificateInfo,
+ { "signedAttributeCertificateInfo", "x509af.signedAttributeCertificateInfo",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificate/signedAttributeCertificateInfo", HFILL }},
+ { &hf_x509af_info_subject,
+ { "subject", "x509af.subject",
+ FT_UINT32, BASE_DEC, VALS(InfoSubject_vals), 0,
+ "AttributeCertificateInfo/subject", HFILL }},
+ { &hf_x509af_baseCertificateID,
+ { "baseCertificateID", "x509af.baseCertificateID",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_infoSubjectName,
+ { "subjectName", "x509af.subjectName",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificateInfo/subject/subjectName", HFILL }},
+ { &hf_x509af_issuer1,
+ { "issuer", "x509af.issuer",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "", HFILL }},
+ { &hf_x509af_attCertValidityPeriod,
+ { "attCertValidityPeriod", "x509af.attCertValidityPeriod",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificateInfo/attCertValidityPeriod", HFILL }},
+ { &hf_x509af_attributes,
+ { "attributes", "x509af.attributes",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "AttributeCertificateInfo/attributes", HFILL }},
+ { &hf_x509af_attributes_item,
+ { "Item[##]", "x509af.attributes_item",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificateInfo/attributes/_item", HFILL }},
+ { &hf_x509af_issuerUniqueID,
+ { "issuerUniqueID", "x509af.issuerUniqueID",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificateInfo/issuerUniqueID", HFILL }},
+ { &hf_x509af_serial,
+ { "serial", "x509af.serial",
+ FT_INT32, BASE_DEC, NULL, 0,
+ "IssuerSerial/serial", HFILL }},
+ { &hf_x509af_issuerUID,
+ { "issuerUID", "x509af.issuerUID",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "IssuerSerial/issuerUID", HFILL }},
+ { &hf_x509af_notBeforeTime,
+ { "notBeforeTime", "x509af.notBeforeTime",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "AttCertValidityPeriod/notBeforeTime", HFILL }},
+ { &hf_x509af_notAfterTime,
+ { "notAfterTime", "x509af.notAfterTime",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "AttCertValidityPeriod/notAfterTime", HFILL }},
+ { &hf_x509af_assertion_subject,
+ { "subject", "x509af.subject",
+ FT_UINT32, BASE_DEC, VALS(AssertionSubject_vals), 0,
+ "AttributeCertificateAssertion/subject", HFILL }},
+ { &hf_x509af_assertionSubjectName,
+ { "subjectName", "x509af.subjectName",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificateAssertion/subject/subjectName", HFILL }},
+ { &hf_x509af_assertionIssuer,
+ { "issuer", "x509af.issuer",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificateAssertion/issuer", HFILL }},
+ { &hf_x509af_attCertValidity,
+ { "attCertValidity", "x509af.attCertValidity",
+ FT_STRING, BASE_NONE, NULL, 0,
+ "AttributeCertificateAssertion/attCertValidity", HFILL }},
+ { &hf_x509af_attType,
+ { "attType", "x509af.attType",
+ FT_UINT32, BASE_DEC, NULL, 0,
+ "AttributeCertificateAssertion/attType", HFILL }},
+ { &hf_x509af_attType_item,
+ { "Item(##)", "x509af.attType_item",
+ FT_NONE, BASE_NONE, NULL, 0,
+ "AttributeCertificateAssertion/attType/_item", HFILL }},
+
+/*--- End of included file: packet-x509af-hfarr.c ---*/
+
+ };
+
+ /* List of subtrees */
+ static gint *ett[] = {
+
+/*--- Included file: packet-x509af-ettarr.c ---*/
+
+/* Do not modify this file. */
+/* It is created automatically by the ASN.1 to Ethereal dissector compiler */
+/* packet-x509af-ettarr.c */
+/* ../../tools/asn2eth.py -X -b -p x509af -c x509af.cnf -s packet-x509af-template AuthenticationFramework.asn */
+
+ &ett_x509af_Certificate,
+ &ett_x509af_T_signedCertificate,
+ &ett_x509af_AlgorithmIdentifier,
+ &ett_x509af_Validity,
+ &ett_x509af_SubjectPublicKeyInfo,
+ &ett_x509af_Time,
+ &ett_x509af_Extensions,
+ &ett_x509af_Extension,
+ &ett_x509af_Certificates,
+ &ett_x509af_ForwardCertificationPath,
+ &ett_x509af_CrossCertificates,
+ &ett_x509af_CertificationPath,
+ &ett_x509af_SEQUNCE_OF_CertificatePair,
+ &ett_x509af_CertificatePair,
+ &ett_x509af_CertificateList,
+ &ett_x509af_T_signedCertificateList,
+ &ett_x509af_T_revokedCertificates,
+ &ett_x509af_T_revokedCertificates_item,
+ &ett_x509af_AttributeCertificationPath,
+ &ett_x509af_SEQUNCE_OF_ACPathData,
+ &ett_x509af_ACPathData,
+ &ett_x509af_AttributeCertificate,
+ &ett_x509af_AttributeCertificateInfo,
+ &ett_x509af_InfoSubject,
+ &ett_x509af_SEQUNCE_OF_Attribute,
+ &ett_x509af_IssuerSerial,
+ &ett_x509af_AttCertValidityPeriod,
+ &ett_x509af_AttributeCertificateAssertion,
+ &ett_x509af_AssertionSubject,
+ &ett_x509af_SET_OF_AttributeType,
+
+/*--- End of included file: packet-x509af-ettarr.c ---*/
+
+ };
+
+ /* Register protocol */
+ proto_x509af = proto_register_protocol(PNAME, PSNAME, PFNAME);
+
+ /* Register fields and subtrees */
+ proto_register_field_array(proto_x509af, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+
+}
+
+
+/*--- proto_reg_handoff_x509af -------------------------------------------*/
+void proto_reg_handoff_x509af(void) {
+}
+