diff options
Diffstat (limited to 'epan/dissectors/packet-h235.c')
-rw-r--r-- | epan/dissectors/packet-h235.c | 1232 |
1 files changed, 1232 insertions, 0 deletions
diff --git a/epan/dissectors/packet-h235.c b/epan/dissectors/packet-h235.c new file mode 100644 index 0000000000..e97be14376 --- /dev/null +++ b/epan/dissectors/packet-h235.c @@ -0,0 +1,1232 @@ +/* Do not modify this file. */ +/* It is created automatically by the ASN.1 to Ethereal dissector compiler */ +/* packet-h235.c */ +/* ../../tools/asn2eth.py -X -p h235 -c h235.cnf -s packet-h235-template H235-SECURITY-MESSAGES.asn */ + +/* Input file: packet-h235-template.c */ +/* Include files: packet-h235-hf.c, packet-h235-ett.c, packet-h235-fn.c, packet-h235-hfarr.c, packet-h235-ettarr.c, packet-h235-val.h */ + +/* packet-h235.c + * Routines for H.235 packet dissection + * 2004 Tomas Kukosa + * + * $Id$ + * + * Ethereal - Network traffic analyzer + * By Gerald Combs <gerald@ethereal.com> + * Copyright 1998 Gerald Combs + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + */ + +#ifdef HAVE_CONFIG_H +# include "config.h" +#endif + +#include <glib.h> +#include <epan/packet.h> +#include <epan/conversation.h> + +#include <stdio.h> +#include <string.h> + +#include "packet-per.h" +#include "packet-h235.h" + +#define PNAME "H235-SECURITY-MESSAGES" +#define PSNAME "H235" +#define PFNAME "h235" + +/* Initialize the protocol and registered fields */ +int proto_h235 = -1; + +/*--- Included file: packet-h235-hf.c ---*/ + +/* Do not modify this file. */ +/* It is created automatically by the ASN.1 to Ethereal dissector compiler */ +/* packet-h235-hf.c */ +/* ../../tools/asn2eth.py -X -p h235 -c h235.cnf -s packet-h235-template H235-SECURITY-MESSAGES.asn */ + +static int hf_h235_nonStandardIdentifier = -1; /* OBJECT_IDENTIFIER */ +static int hf_h235_data = -1; /* OCTET_STRING */ +static int hf_h235_halfkey = -1; /* BIT_STRING_SIZE_0_2048 */ +static int hf_h235_modSize = -1; /* BIT_STRING_SIZE_0_2048 */ +static int hf_h235_generator = -1; /* BIT_STRING_SIZE_0_2048 */ +static int hf_h235_x = -1; /* BIT_STRING_SIZE_0_511 */ +static int hf_h235_y = -1; /* BIT_STRING_SIZE_0_511 */ +static int hf_h235_eckasdhp = -1; /* T_eckasdhp */ +static int hf_h235_public_key = -1; /* ECpoint */ +static int hf_h235_modulus = -1; /* BIT_STRING_SIZE_0_511 */ +static int hf_h235_base = -1; /* ECpoint */ +static int hf_h235_weierstrassA = -1; /* BIT_STRING_SIZE_0_511 */ +static int hf_h235_weierstrassB = -1; /* BIT_STRING_SIZE_0_511 */ +static int hf_h235_eckasdh2 = -1; /* T_eckasdh2 */ +static int hf_h235_fieldSize = -1; /* BIT_STRING_SIZE_0_511 */ +static int hf_h235_type = -1; /* OBJECT_IDENTIFIER */ +static int hf_h235_certificatedata = -1; /* OCTET_STRING */ +static int hf_h235_default = -1; /* NULL */ +static int hf_h235_radius = -1; /* NULL */ +static int hf_h235_dhExch = -1; /* NULL */ +static int hf_h235_pwdSymEnc = -1; /* NULL */ +static int hf_h235_pwdHash = -1; /* NULL */ +static int hf_h235_certSign = -1; /* NULL */ +static int hf_h235_ipsec = -1; /* NULL */ +static int hf_h235_tls = -1; /* NULL */ +static int hf_h235_nonStandard = -1; /* NonStandardParameter */ +static int hf_h235_authenticationBES = -1; /* AuthenticationBES */ +static int hf_h235_tokenOID = -1; /* OBJECT_IDENTIFIER */ +static int hf_h235_timeStamp = -1; /* TimeStamp */ +static int hf_h235_password = -1; /* Password */ +static int hf_h235_dhkey = -1; /* DHset */ +static int hf_h235_challenge = -1; /* ChallengeString */ +static int hf_h235_random = -1; /* RandomVal */ +static int hf_h235_certificate = -1; /* TypedCertificate */ +static int hf_h235_generalID = -1; /* Identifier */ +static int hf_h235_eckasdhkey = -1; /* ECKASDH */ +static int hf_h235_sendersID = -1; /* Identifier */ +static int hf_h235_h235Key = -1; /* H235Key */ +static int hf_h235_toBeSigned = -1; /* ToBeSigned */ +static int hf_h235_algorithmOID = -1; /* OBJECT_IDENTIFIER */ +static int hf_h235_paramS = -1; /* Params */ +static int hf_h235_signaturedata = -1; /* BIT_STRING */ +static int hf_h235_encryptedData = -1; /* OCTET_STRING */ +static int hf_h235_hash = -1; /* BIT_STRING */ +static int hf_h235_ranInt = -1; /* INTEGER */ +static int hf_h235_iv8 = -1; /* IV8 */ +static int hf_h235_iv16 = -1; /* IV16 */ +static int hf_h235_iv = -1; /* OCTET_STRING */ +static int hf_h235_clearSalt = -1; /* OCTET_STRING */ +static int hf_h235_cryptoEncryptedToken = -1; /* T_cryptoEncryptedToken */ +static int hf_h235_encryptedToken = -1; /* ENCRYPTEDxxx */ +static int hf_h235_cryptoSignedToken = -1; /* T_cryptoSignedToken */ +static int hf_h235_signedToken = -1; /* SIGNEDxxx */ +static int hf_h235_cryptoHashedToken = -1; /* T_cryptoHashedToken */ +static int hf_h235_hashedVals = -1; /* ClearToken */ +static int hf_h235_hashedToken = -1; /* HASHEDxxx */ +static int hf_h235_cryptoPwdEncr = -1; /* ENCRYPTEDxxx */ +static int hf_h235_secureChannel = -1; /* KeyMaterial */ +static int hf_h235_sharedSecret = -1; /* ENCRYPTEDxxx */ +static int hf_h235_certProtectedKey = -1; /* SIGNEDxxx */ +static int hf_h235_secureSharedSecret = -1; /* V3KeySyncMaterial */ +static int hf_h235_encryptedSessionKey = -1; /* OCTET_STRING */ +static int hf_h235_encryptedSaltingKey = -1; /* OCTET_STRING */ +static int hf_h235_clearSaltingKey = -1; /* OCTET_STRING */ +static int hf_h235_paramSsalt = -1; /* Params */ +static int hf_h235_keyDerivationOID = -1; /* OBJECT_IDENTIFIER */ + +/*--- End of included file: packet-h235-hf.c ---*/ + + +/* Initialize the subtree pointers */ + +/*--- Included file: packet-h235-ett.c ---*/ + +/* Do not modify this file. */ +/* It is created automatically by the ASN.1 to Ethereal dissector compiler */ +/* packet-h235-ett.c */ +/* ../../tools/asn2eth.py -X -p h235 -c h235.cnf -s packet-h235-template H235-SECURITY-MESSAGES.asn */ + +static gint ett_h235_NonStandardParameter = -1; +static gint ett_h235_DHset = -1; +static gint ett_h235_ECpoint = -1; +static gint ett_h235_ECKASDH = -1; +static gint ett_h235_T_eckasdhp = -1; +static gint ett_h235_T_eckasdh2 = -1; +static gint ett_h235_TypedCertificate = -1; +static gint ett_h235_AuthenticationBES = -1; +static gint ett_h235_AuthenticationMechanism = -1; +static gint ett_h235_ClearToken = -1; +static gint ett_h235_SIGNEDxxx = -1; +static gint ett_h235_ENCRYPTEDxxx = -1; +static gint ett_h235_HASHEDxxx = -1; +static gint ett_h235_Params = -1; +static gint ett_h235_CryptoToken = -1; +static gint ett_h235_T_cryptoEncryptedToken = -1; +static gint ett_h235_T_cryptoSignedToken = -1; +static gint ett_h235_T_cryptoHashedToken = -1; +static gint ett_h235_H235Key = -1; +static gint ett_h235_V3KeySyncMaterial = -1; + +/*--- End of included file: packet-h235-ett.c ---*/ + + +static guint32 +dissect_xxx_ToBeSigned(tvbuff_t *tvb, guint32 offset, packet_info *pinfo, proto_tree *tree, int hf_index _U_) { +PER_NOT_DECODED_YET("ToBeSigned"); + return offset; +} + + +/*--- Included file: packet-h235-fn.c ---*/ + +/* Do not modify this file. */ +/* It is created automatically by the ASN.1 to Ethereal dissector compiler */ +/* packet-h235-fn.c */ +/* ../../tools/asn2eth.py -X -p h235 -c h235.cnf -s packet-h235-template H235-SECURITY-MESSAGES.asn */ + +static int dissect_toBeSigned(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_xxx_ToBeSigned(tvb, offset, pinfo, tree, hf_h235_toBeSigned); +} + +static int +dissect_h235_ChallengeString(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_octet_string(tvb, offset, pinfo, tree, hf_index, + 8, 128, + NULL, NULL); + + return offset; +} +static int dissect_challenge(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ChallengeString(tvb, offset, pinfo, tree, hf_h235_challenge); +} + + + +int +dissect_h235_TimeStamp(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_constrained_integer(tvb, offset, pinfo, tree, hf_index, + 1U, 4294967295U, NULL, NULL, FALSE); + + return offset; +} +static int dissect_timeStamp(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_TimeStamp(tvb, offset, pinfo, tree, hf_h235_timeStamp); +} + + + +static int +dissect_h235_RandomVal(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_integer(tvb, offset, pinfo, tree, hf_index, + NULL, NULL); + + return offset; +} +static int dissect_random(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_RandomVal(tvb, offset, pinfo, tree, hf_h235_random); +} + + +static int +dissect_h235_Password(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_BMPString(tvb, offset, pinfo, tree, hf_index, + 1, 128); + + return offset; +} +static int dissect_password(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_Password(tvb, offset, pinfo, tree, hf_h235_password); +} + + +static int +dissect_h235_Identifier(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_BMPString(tvb, offset, pinfo, tree, hf_index, + 1, 128); + + return offset; +} +static int dissect_generalID(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_Identifier(tvb, offset, pinfo, tree, hf_h235_generalID); +} +static int dissect_sendersID(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_Identifier(tvb, offset, pinfo, tree, hf_h235_sendersID); +} + + +static int +dissect_h235_KeyMaterial(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_bit_string(tvb, offset, pinfo, tree, hf_index, + 1, 2048); + + return offset; +} +static int dissect_secureChannel(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_KeyMaterial(tvb, offset, pinfo, tree, hf_h235_secureChannel); +} + + +static int +dissect_h235_OBJECT_IDENTIFIER(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_object_identifier(tvb, offset, pinfo, tree, hf_index, + NULL); + + return offset; +} +static int dissect_nonStandardIdentifier(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, pinfo, tree, hf_h235_nonStandardIdentifier); +} +static int dissect_type(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, pinfo, tree, hf_h235_type); +} +static int dissect_tokenOID(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, pinfo, tree, hf_h235_tokenOID); +} +static int dissect_algorithmOID(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, pinfo, tree, hf_h235_algorithmOID); +} +static int dissect_keyDerivationOID(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OBJECT_IDENTIFIER(tvb, offset, pinfo, tree, hf_h235_keyDerivationOID); +} + + +static int +dissect_h235_OCTET_STRING(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_octet_string(tvb, offset, pinfo, tree, hf_index, + -1, -1, + NULL, NULL); + + return offset; +} +static int dissect_data(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_data); +} +static int dissect_certificatedata(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_certificatedata); +} +static int dissect_encryptedData(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_encryptedData); +} +static int dissect_iv(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_iv); +} +static int dissect_clearSalt(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_clearSalt); +} +static int dissect_encryptedSessionKey(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_encryptedSessionKey); +} +static int dissect_encryptedSaltingKey(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_encryptedSaltingKey); +} +static int dissect_clearSaltingKey(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_OCTET_STRING(tvb, offset, pinfo, tree, hf_h235_clearSaltingKey); +} + +static per_sequence_t NonStandardParameter_sequence[] = { + { "nonStandardIdentifier" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_nonStandardIdentifier }, + { "data" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_data }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_NonStandardParameter(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_NonStandardParameter, NonStandardParameter_sequence); + + return offset; +} +static int dissect_nonStandard(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NonStandardParameter(tvb, offset, pinfo, tree, hf_h235_nonStandard); +} + + +static int +dissect_h235_BIT_STRING_SIZE_0_2048(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_bit_string(tvb, offset, pinfo, tree, hf_index, + 0, 2048); + + return offset; +} +static int dissect_halfkey(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_2048(tvb, offset, pinfo, tree, hf_h235_halfkey); +} +static int dissect_modSize(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_2048(tvb, offset, pinfo, tree, hf_h235_modSize); +} +static int dissect_generator(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_2048(tvb, offset, pinfo, tree, hf_h235_generator); +} + +static per_sequence_t DHset_sequence[] = { + { "halfkey" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_halfkey }, + { "modSize" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_modSize }, + { "generator" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_generator }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_DHset(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_DHset, DHset_sequence); + + return offset; +} +static int dissect_dhkey(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_DHset(tvb, offset, pinfo, tree, hf_h235_dhkey); +} + + +static int +dissect_h235_BIT_STRING_SIZE_0_511(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_bit_string(tvb, offset, pinfo, tree, hf_index, + 0, 511); + + return offset; +} +static int dissect_x(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, pinfo, tree, hf_h235_x); +} +static int dissect_y(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, pinfo, tree, hf_h235_y); +} +static int dissect_modulus(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, pinfo, tree, hf_h235_modulus); +} +static int dissect_weierstrassA(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, pinfo, tree, hf_h235_weierstrassA); +} +static int dissect_weierstrassB(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, pinfo, tree, hf_h235_weierstrassB); +} +static int dissect_fieldSize(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING_SIZE_0_511(tvb, offset, pinfo, tree, hf_h235_fieldSize); +} + +static per_sequence_t ECpoint_sequence[] = { + { "x" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_x }, + { "y" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_y }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_ECpoint(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_ECpoint, ECpoint_sequence); + + return offset; +} +static int dissect_public_key(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ECpoint(tvb, offset, pinfo, tree, hf_h235_public_key); +} +static int dissect_base(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ECpoint(tvb, offset, pinfo, tree, hf_h235_base); +} + +static per_sequence_t T_eckasdhp_sequence[] = { + { "public-key" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_public_key }, + { "modulus" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_modulus }, + { "base" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_base }, + { "weierstrassA" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassA }, + { "weierstrassB" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassB }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_T_eckasdhp(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_T_eckasdhp, T_eckasdhp_sequence); + + return offset; +} +static int dissect_eckasdhp(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_T_eckasdhp(tvb, offset, pinfo, tree, hf_h235_eckasdhp); +} + +static per_sequence_t T_eckasdh2_sequence[] = { + { "public-key" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_public_key }, + { "fieldSize" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_fieldSize }, + { "base" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_base }, + { "weierstrassA" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassA }, + { "weierstrassB" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_weierstrassB }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_T_eckasdh2(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_T_eckasdh2, T_eckasdh2_sequence); + + return offset; +} +static int dissect_eckasdh2(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_T_eckasdh2(tvb, offset, pinfo, tree, hf_h235_eckasdh2); +} + + +static const value_string ECKASDH_vals[] = { + { 0, "eckasdhp" }, + { 1, "eckasdh2" }, + { 0, NULL } +}; + +static per_choice_t ECKASDH_choice[] = { + { 0, "eckasdhp" , ASN1_EXTENSION_ROOT , dissect_eckasdhp }, + { 1, "eckasdh2" , ASN1_EXTENSION_ROOT , dissect_eckasdh2 }, + { 0, NULL, 0, NULL } +}; + +static int +dissect_h235_ECKASDH(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_choice(tvb, offset, pinfo, tree, hf_index, + ett_h235_ECKASDH, ECKASDH_choice, "ECKASDH", + NULL); + + return offset; +} +static int dissect_eckasdhkey(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ECKASDH(tvb, offset, pinfo, tree, hf_h235_eckasdhkey); +} + +static per_sequence_t TypedCertificate_sequence[] = { + { "type" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_type }, + { "certificate" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_certificatedata }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_TypedCertificate(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_TypedCertificate, TypedCertificate_sequence); + + return offset; +} +static int dissect_certificate(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_TypedCertificate(tvb, offset, pinfo, tree, hf_h235_certificate); +} + + +static int +dissect_h235_NULL(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + { proto_item *ti_tmp; + ti_tmp = proto_tree_add_item(tree, hf_index, tvb, offset>>8, 0, FALSE); + proto_item_append_text(ti_tmp, ": NULL"); + } + + return offset; +} +static int dissect_default(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_default); +} +static int dissect_radius(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_radius); +} +static int dissect_dhExch(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_dhExch); +} +static int dissect_pwdSymEnc(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_pwdSymEnc); +} +static int dissect_pwdHash(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_pwdHash); +} +static int dissect_certSign(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_certSign); +} +static int dissect_ipsec(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_ipsec); +} +static int dissect_tls(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_NULL(tvb, offset, pinfo, tree, hf_h235_tls); +} + + +static const value_string AuthenticationBES_vals[] = { + { 0, "default" }, + { 1, "radius" }, + { 0, NULL } +}; + +static per_choice_t AuthenticationBES_choice[] = { + { 0, "default" , ASN1_EXTENSION_ROOT , dissect_default }, + { 1, "radius" , ASN1_EXTENSION_ROOT , dissect_radius }, + { 0, NULL, 0, NULL } +}; + +static int +dissect_h235_AuthenticationBES(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_choice(tvb, offset, pinfo, tree, hf_index, + ett_h235_AuthenticationBES, AuthenticationBES_choice, "AuthenticationBES", + NULL); + + return offset; +} +static int dissect_authenticationBES(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_AuthenticationBES(tvb, offset, pinfo, tree, hf_h235_authenticationBES); +} + + +const value_string AuthenticationMechanism_vals[] = { + { 0, "dhExch" }, + { 1, "pwdSymEnc" }, + { 2, "pwdHash" }, + { 3, "certSign" }, + { 4, "ipsec" }, + { 5, "tls" }, + { 6, "nonStandard" }, + { 7, "authenticationBES" }, + { 0, NULL } +}; + +static per_choice_t AuthenticationMechanism_choice[] = { + { 0, "dhExch" , ASN1_EXTENSION_ROOT , dissect_dhExch }, + { 1, "pwdSymEnc" , ASN1_EXTENSION_ROOT , dissect_pwdSymEnc }, + { 2, "pwdHash" , ASN1_EXTENSION_ROOT , dissect_pwdHash }, + { 3, "certSign" , ASN1_EXTENSION_ROOT , dissect_certSign }, + { 4, "ipsec" , ASN1_EXTENSION_ROOT , dissect_ipsec }, + { 5, "tls" , ASN1_EXTENSION_ROOT , dissect_tls }, + { 6, "nonStandard" , ASN1_EXTENSION_ROOT , dissect_nonStandard }, + { 7, "authenticationBES" , ASN1_NOT_EXTENSION_ROOT, dissect_authenticationBES }, + { 0, NULL, 0, NULL } +}; + +int +dissect_h235_AuthenticationMechanism(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_choice(tvb, offset, pinfo, tree, hf_index, + ett_h235_AuthenticationMechanism, AuthenticationMechanism_choice, "AuthenticationMechanism", + NULL); + + return offset; +} + + + +static int +dissect_h235_INTEGER(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_integer(tvb, offset, pinfo, tree, hf_index, + NULL, NULL); + + return offset; +} +static int dissect_ranInt(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_INTEGER(tvb, offset, pinfo, tree, hf_h235_ranInt); +} + + +static int +dissect_h235_IV8(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_octet_string(tvb, offset, pinfo, tree, hf_index, + 8, 8, + NULL, NULL); + + return offset; +} +static int dissect_iv8(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_IV8(tvb, offset, pinfo, tree, hf_h235_iv8); +} + + +static int +dissect_h235_IV16(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_octet_string(tvb, offset, pinfo, tree, hf_index, + 16, 16, + NULL, NULL); + + return offset; +} +static int dissect_iv16(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_IV16(tvb, offset, pinfo, tree, hf_h235_iv16); +} + +static per_sequence_t Params_sequence[] = { + { "ranInt" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_ranInt }, + { "iv8" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_iv8 }, + { "iv16" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_iv16 }, + { "iv" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_iv }, + { "clearSalt" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_clearSalt }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_Params(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_Params, Params_sequence); + + return offset; +} +static int dissect_paramS(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_Params(tvb, offset, pinfo, tree, hf_h235_paramS); +} +static int dissect_paramSsalt(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_Params(tvb, offset, pinfo, tree, hf_h235_paramSsalt); +} + +static per_sequence_t ENCRYPTEDxxx_sequence[] = { + { "algorithmOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_algorithmOID }, + { "paramS" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_paramS }, + { "encryptedData" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_encryptedData }, + { NULL, 0, 0, NULL } +}; + +int +dissect_h235_ENCRYPTEDxxx(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE); + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_ENCRYPTEDxxx, ENCRYPTEDxxx_sequence); + + return offset; +} +static int dissect_encryptedToken(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ENCRYPTEDxxx(tvb, offset, pinfo, tree, hf_h235_encryptedToken); +} +static int dissect_cryptoPwdEncr(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ENCRYPTEDxxx(tvb, offset, pinfo, tree, hf_h235_cryptoPwdEncr); +} +static int dissect_sharedSecret(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ENCRYPTEDxxx(tvb, offset, pinfo, tree, hf_h235_sharedSecret); +} + + +static int +dissect_h235_BIT_STRING(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_bit_string(tvb, offset, pinfo, tree, hf_index, + -1, -1); + + return offset; +} +static int dissect_signaturedata(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING(tvb, offset, pinfo, tree, hf_h235_signaturedata); +} +static int dissect_hash(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_BIT_STRING(tvb, offset, pinfo, tree, hf_h235_hash); +} + +static per_sequence_t SIGNEDxxx_sequence[] = { + { "toBeSigned" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_toBeSigned }, + { "algorithmOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_algorithmOID }, + { "paramS" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_paramS }, + { "signature" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_signaturedata }, + { NULL, 0, 0, NULL } +}; + +int +dissect_h235_SIGNEDxxx(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE); + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_SIGNEDxxx, SIGNEDxxx_sequence); + + return offset; +} +static int dissect_signedToken(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_SIGNEDxxx(tvb, offset, pinfo, tree, hf_h235_signedToken); +} +static int dissect_certProtectedKey(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_SIGNEDxxx(tvb, offset, pinfo, tree, hf_h235_certProtectedKey); +} + +static per_sequence_t V3KeySyncMaterial_sequence[] = { + { "generalID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_generalID }, + { "algorithmOID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_algorithmOID }, + { "paramS" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_paramS }, + { "encryptedSessionKey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_encryptedSessionKey }, + { "encryptedSaltingKey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_encryptedSaltingKey }, + { "clearSaltingKey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_clearSaltingKey }, + { "paramSsalt" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_paramSsalt }, + { "keyDerivationOID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_keyDerivationOID }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_V3KeySyncMaterial(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_V3KeySyncMaterial, V3KeySyncMaterial_sequence); + + return offset; +} +static int dissect_secureSharedSecret(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_V3KeySyncMaterial(tvb, offset, pinfo, tree, hf_h235_secureSharedSecret); +} + + +static const value_string H235Key_vals[] = { + { 0, "secureChannel" }, + { 1, "sharedSecret" }, + { 2, "certProtectedKey" }, + { 3, "secureSharedSecret" }, + { 0, NULL } +}; + +static per_choice_t H235Key_choice[] = { + { 0, "secureChannel" , ASN1_EXTENSION_ROOT , dissect_secureChannel }, + { 1, "sharedSecret" , ASN1_EXTENSION_ROOT , dissect_sharedSecret }, + { 2, "certProtectedKey" , ASN1_EXTENSION_ROOT , dissect_certProtectedKey }, + { 3, "secureSharedSecret" , ASN1_NOT_EXTENSION_ROOT, dissect_secureSharedSecret }, + { 0, NULL, 0, NULL } +}; + +static int +dissect_h235_H235Key(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_choice(tvb, offset, pinfo, tree, hf_index, + ett_h235_H235Key, H235Key_choice, "H235Key", + NULL); + + return offset; +} +static int dissect_h235Key(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_H235Key(tvb, offset, pinfo, tree, hf_h235_h235Key); +} + +static per_sequence_t ClearToken_sequence[] = { + { "tokenOID" , ASN1_EXTENSION_ROOT , ASN1_NOT_OPTIONAL, dissect_tokenOID }, + { "timeStamp" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_timeStamp }, + { "password" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_password }, + { "dhkey" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_dhkey }, + { "challenge" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_challenge }, + { "random" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_random }, + { "certificate" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_certificate }, + { "generalID" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_generalID }, + { "nonStandard" , ASN1_EXTENSION_ROOT , ASN1_OPTIONAL , dissect_nonStandard }, + { "eckasdhkey" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_eckasdhkey }, + { "sendersID" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_sendersID }, + { "h235Key" , ASN1_NOT_EXTENSION_ROOT, ASN1_OPTIONAL , dissect_h235Key }, + { NULL, 0, 0, NULL } +}; + +int +dissect_h235_ClearToken(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE); + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_ClearToken, ClearToken_sequence); + + return offset; +} +static int dissect_hashedVals(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_ClearToken(tvb, offset, pinfo, tree, hf_h235_hashedVals); +} + +static per_sequence_t HASHEDxxx_sequence[] = { + { "algorithmOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_algorithmOID }, + { "paramS" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_paramS }, + { "hash" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_hash }, + { NULL, 0, 0, NULL } +}; + +int +dissect_h235_HASHEDxxx(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE); + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_HASHEDxxx, HASHEDxxx_sequence); + + return offset; +} +static int dissect_hashedToken(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_HASHEDxxx(tvb, offset, pinfo, tree, hf_h235_hashedToken); +} + +static per_sequence_t T_cryptoEncryptedToken_sequence[] = { + { "tokenOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_tokenOID }, + { "token" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_encryptedToken }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_T_cryptoEncryptedToken(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_T_cryptoEncryptedToken, T_cryptoEncryptedToken_sequence); + + return offset; +} +static int dissect_cryptoEncryptedToken(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_T_cryptoEncryptedToken(tvb, offset, pinfo, tree, hf_h235_cryptoEncryptedToken); +} + +static per_sequence_t T_cryptoSignedToken_sequence[] = { + { "tokenOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_tokenOID }, + { "token" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_signedToken }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_T_cryptoSignedToken(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_T_cryptoSignedToken, T_cryptoSignedToken_sequence); + + return offset; +} +static int dissect_cryptoSignedToken(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_T_cryptoSignedToken(tvb, offset, pinfo, tree, hf_h235_cryptoSignedToken); +} + +static per_sequence_t T_cryptoHashedToken_sequence[] = { + { "tokenOID" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_tokenOID }, + { "hashedVals" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_hashedVals }, + { "token" , ASN1_NO_EXTENSIONS , ASN1_NOT_OPTIONAL, dissect_hashedToken }, + { NULL, 0, 0, NULL } +}; + +static int +dissect_h235_T_cryptoHashedToken(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + offset = dissect_per_sequence(tvb, offset, pinfo, tree, hf_index, + ett_h235_T_cryptoHashedToken, T_cryptoHashedToken_sequence); + + return offset; +} +static int dissect_cryptoHashedToken(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree) { + return dissect_h235_T_cryptoHashedToken(tvb, offset, pinfo, tree, hf_h235_cryptoHashedToken); +} + + +const value_string CryptoToken_vals[] = { + { 0, "cryptoEncryptedToken" }, + { 1, "cryptoSignedToken" }, + { 2, "cryptoHashedToken" }, + { 3, "cryptoPwdEncr" }, + { 0, NULL } +}; + +static per_choice_t CryptoToken_choice[] = { + { 0, "cryptoEncryptedToken" , ASN1_EXTENSION_ROOT , dissect_cryptoEncryptedToken }, + { 1, "cryptoSignedToken" , ASN1_EXTENSION_ROOT , dissect_cryptoSignedToken }, + { 2, "cryptoHashedToken" , ASN1_EXTENSION_ROOT , dissect_cryptoHashedToken }, + { 3, "cryptoPwdEncr" , ASN1_EXTENSION_ROOT , dissect_cryptoPwdEncr }, + { 0, NULL, 0, NULL } +}; + +int +dissect_h235_CryptoToken(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, int hf_index) { + proto_tree_add_item_hidden(tree, proto_h235, tvb, offset, 0, FALSE); + offset = dissect_per_choice(tvb, offset, pinfo, tree, hf_index, + ett_h235_CryptoToken, CryptoToken_choice, "CryptoToken", + NULL); + + return offset; +} + + +/*--- End of included file: packet-h235-fn.c ---*/ + + + +/*--- proto_register_h235 ----------------------------------------------*/ +void proto_register_h235(void) { + + /* List of fields */ + static hf_register_info hf[] = { + +/*--- Included file: packet-h235-hfarr.c ---*/ + +/* Do not modify this file. */ +/* It is created automatically by the ASN.1 to Ethereal dissector compiler */ +/* packet-h235-hfarr.c */ +/* ../../tools/asn2eth.py -X -p h235 -c h235.cnf -s packet-h235-template H235-SECURITY-MESSAGES.asn */ + + { &hf_h235_nonStandardIdentifier, + { "nonStandardIdentifier", "h235.nonStandardIdentifier", + FT_STRING, BASE_NONE, NULL, 0, + "NonStandardParameter/nonStandardIdentifier", HFILL }}, + { &hf_h235_data, + { "data", "h235.data", + FT_UINT32, BASE_DEC, NULL, 0, + "NonStandardParameter/data", HFILL }}, + { &hf_h235_halfkey, + { "halfkey", "h235.halfkey", + FT_BYTES, BASE_HEX, NULL, 0, + "DHset/halfkey", HFILL }}, + { &hf_h235_modSize, + { "modSize", "h235.modSize", + FT_BYTES, BASE_HEX, NULL, 0, + "DHset/modSize", HFILL }}, + { &hf_h235_generator, + { "generator", "h235.generator", + FT_BYTES, BASE_HEX, NULL, 0, + "DHset/generator", HFILL }}, + { &hf_h235_x, + { "x", "h235.x", + FT_BYTES, BASE_HEX, NULL, 0, + "ECpoint/x", HFILL }}, + { &hf_h235_y, + { "y", "h235.y", + FT_BYTES, BASE_HEX, NULL, 0, + "ECpoint/y", HFILL }}, + { &hf_h235_eckasdhp, + { "eckasdhp", "h235.eckasdhp", + FT_NONE, BASE_NONE, NULL, 0, + "ECKASDH/eckasdhp", HFILL }}, + { &hf_h235_public_key, + { "public-key", "h235.public_key", + FT_NONE, BASE_NONE, NULL, 0, + "", HFILL }}, + { &hf_h235_modulus, + { "modulus", "h235.modulus", + FT_BYTES, BASE_HEX, NULL, 0, + "ECKASDH/eckasdhp/modulus", HFILL }}, + { &hf_h235_base, + { "base", "h235.base", + FT_NONE, BASE_NONE, NULL, 0, + "", HFILL }}, + { &hf_h235_weierstrassA, + { "weierstrassA", "h235.weierstrassA", + FT_BYTES, BASE_HEX, NULL, 0, + "", HFILL }}, + { &hf_h235_weierstrassB, + { "weierstrassB", "h235.weierstrassB", + FT_BYTES, BASE_HEX, NULL, 0, + "", HFILL }}, + { &hf_h235_eckasdh2, + { "eckasdh2", "h235.eckasdh2", + FT_NONE, BASE_NONE, NULL, 0, + "ECKASDH/eckasdh2", HFILL }}, + { &hf_h235_fieldSize, + { "fieldSize", "h235.fieldSize", + FT_BYTES, BASE_HEX, NULL, 0, + "ECKASDH/eckasdh2/fieldSize", HFILL }}, + { &hf_h235_type, + { "type", "h235.type", + FT_STRING, BASE_NONE, NULL, 0, + "TypedCertificate/type", HFILL }}, + { &hf_h235_certificatedata, + { "certificate", "h235.certificate", + FT_BYTES, BASE_HEX, NULL, 0, + "TypedCertificate/certificate", HFILL }}, + { &hf_h235_default, + { "default", "h235.default", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationBES/default", HFILL }}, + { &hf_h235_radius, + { "radius", "h235.radius", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationBES/radius", HFILL }}, + { &hf_h235_dhExch, + { "dhExch", "h235.dhExch", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationMechanism/dhExch", HFILL }}, + { &hf_h235_pwdSymEnc, + { "pwdSymEnc", "h235.pwdSymEnc", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationMechanism/pwdSymEnc", HFILL }}, + { &hf_h235_pwdHash, + { "pwdHash", "h235.pwdHash", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationMechanism/pwdHash", HFILL }}, + { &hf_h235_certSign, + { "certSign", "h235.certSign", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationMechanism/certSign", HFILL }}, + { &hf_h235_ipsec, + { "ipsec", "h235.ipsec", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationMechanism/ipsec", HFILL }}, + { &hf_h235_tls, + { "tls", "h235.tls", + FT_NONE, BASE_NONE, NULL, 0, + "AuthenticationMechanism/tls", HFILL }}, + { &hf_h235_nonStandard, + { "nonStandard", "h235.nonStandard", + FT_NONE, BASE_NONE, NULL, 0, + "", HFILL }}, + { &hf_h235_authenticationBES, + { "authenticationBES", "h235.authenticationBES", + FT_UINT32, BASE_DEC, VALS(AuthenticationBES_vals), 0, + "AuthenticationMechanism/authenticationBES", HFILL }}, + { &hf_h235_tokenOID, + { "tokenOID", "h235.tokenOID", + FT_STRING, BASE_NONE, NULL, 0, + "", HFILL }}, + { &hf_h235_timeStamp, + { "timeStamp", "h235.timeStamp", + FT_ABSOLUTE_TIME, BASE_NONE, NULL, 0, + "ClearToken/timeStamp", HFILL }}, + { &hf_h235_password, + { "password", "h235.password", + FT_STRING, BASE_NONE, NULL, 0, + "ClearToken/password", HFILL }}, + { &hf_h235_dhkey, + { "dhkey", "h235.dhkey", + FT_NONE, BASE_NONE, NULL, 0, + "ClearToken/dhkey", HFILL }}, + { &hf_h235_challenge, + { "challenge", "h235.challenge", + FT_BYTES, BASE_HEX, NULL, 0, + "ClearToken/challenge", HFILL }}, + { &hf_h235_random, + { "random", "h235.random", + FT_INT32, BASE_DEC, NULL, 0, + "ClearToken/random", HFILL }}, + { &hf_h235_certificate, + { "certificate", "h235.certificate", + FT_NONE, BASE_NONE, NULL, 0, + "ClearToken/certificate", HFILL }}, + { &hf_h235_generalID, + { "generalID", "h235.generalID", + FT_STRING, BASE_NONE, NULL, 0, + "", HFILL }}, + { &hf_h235_eckasdhkey, + { "eckasdhkey", "h235.eckasdhkey", + FT_UINT32, BASE_DEC, VALS(ECKASDH_vals), 0, + "ClearToken/eckasdhkey", HFILL }}, + { &hf_h235_sendersID, + { "sendersID", "h235.sendersID", + FT_STRING, BASE_NONE, NULL, 0, + "ClearToken/sendersID", HFILL }}, + { &hf_h235_h235Key, + { "h235Key", "h235.h235Key", + FT_UINT32, BASE_DEC, VALS(H235Key_vals), 0, + "ClearToken/h235Key", HFILL }}, + { &hf_h235_toBeSigned, + { "toBeSigned", "h235.toBeSigned", + FT_NONE, BASE_NONE, NULL, 0, + "SIGNEDxxx/toBeSigned", HFILL }}, + { &hf_h235_algorithmOID, + { "algorithmOID", "h235.algorithmOID", + FT_STRING, BASE_NONE, NULL, 0, + "", HFILL }}, + { &hf_h235_paramS, + { "paramS", "h235.paramS", + FT_NONE, BASE_NONE, NULL, 0, + "", HFILL }}, + { &hf_h235_signaturedata, + { "signature", "h235.signature", + FT_BYTES, BASE_HEX, NULL, 0, + "SIGNEDxxx/signature", HFILL }}, + { &hf_h235_encryptedData, + { "encryptedData", "h235.encryptedData", + FT_BYTES, BASE_HEX, NULL, 0, + "ENCRYPTEDxxx/encryptedData", HFILL }}, + { &hf_h235_hash, + { "hash", "h235.hash", + FT_BYTES, BASE_HEX, NULL, 0, + "HASHEDxxx/hash", HFILL }}, + { &hf_h235_ranInt, + { "ranInt", "h235.ranInt", + FT_INT32, BASE_DEC, NULL, 0, + "Params/ranInt", HFILL }}, + { &hf_h235_iv8, + { "iv8", "h235.iv8", + FT_BYTES, BASE_HEX, NULL, 0, + "Params/iv8", HFILL }}, + { &hf_h235_iv16, + { "iv16", "h235.iv16", + FT_BYTES, BASE_HEX, NULL, 0, + "Params/iv16", HFILL }}, + { &hf_h235_iv, + { "iv", "h235.iv", + FT_BYTES, BASE_HEX, NULL, 0, + "Params/iv", HFILL }}, + { &hf_h235_clearSalt, + { "clearSalt", "h235.clearSalt", + FT_BYTES, BASE_HEX, NULL, 0, + "Params/clearSalt", HFILL }}, + { &hf_h235_cryptoEncryptedToken, + { "cryptoEncryptedToken", "h235.cryptoEncryptedToken", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoEncryptedToken", HFILL }}, + { &hf_h235_encryptedToken, + { "token", "h235.token", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoEncryptedToken/token", HFILL }}, + { &hf_h235_cryptoSignedToken, + { "cryptoSignedToken", "h235.cryptoSignedToken", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoSignedToken", HFILL }}, + { &hf_h235_signedToken, + { "token", "h235.token", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoSignedToken/token", HFILL }}, + { &hf_h235_cryptoHashedToken, + { "cryptoHashedToken", "h235.cryptoHashedToken", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoHashedToken", HFILL }}, + { &hf_h235_hashedVals, + { "hashedVals", "h235.hashedVals", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoHashedToken/hashedVals", HFILL }}, + { &hf_h235_hashedToken, + { "token", "h235.token", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoHashedToken/token", HFILL }}, + { &hf_h235_cryptoPwdEncr, + { "cryptoPwdEncr", "h235.cryptoPwdEncr", + FT_NONE, BASE_NONE, NULL, 0, + "CryptoToken/cryptoPwdEncr", HFILL }}, + { &hf_h235_secureChannel, + { "secureChannel", "h235.secureChannel", + FT_BYTES, BASE_HEX, NULL, 0, + "H235Key/secureChannel", HFILL }}, + { &hf_h235_sharedSecret, + { "sharedSecret", "h235.sharedSecret", + FT_NONE, BASE_NONE, NULL, 0, + "H235Key/sharedSecret", HFILL }}, + { &hf_h235_certProtectedKey, + { "certProtectedKey", "h235.certProtectedKey", + FT_NONE, BASE_NONE, NULL, 0, + "H235Key/certProtectedKey", HFILL }}, + { &hf_h235_secureSharedSecret, + { "secureSharedSecret", "h235.secureSharedSecret", + FT_NONE, BASE_NONE, NULL, 0, + "H235Key/secureSharedSecret", HFILL }}, + { &hf_h235_encryptedSessionKey, + { "encryptedSessionKey", "h235.encryptedSessionKey", + FT_BYTES, BASE_HEX, NULL, 0, + "V3KeySyncMaterial/encryptedSessionKey", HFILL }}, + { &hf_h235_encryptedSaltingKey, + { "encryptedSaltingKey", "h235.encryptedSaltingKey", + FT_BYTES, BASE_HEX, NULL, 0, + "V3KeySyncMaterial/encryptedSaltingKey", HFILL }}, + { &hf_h235_clearSaltingKey, + { "clearSaltingKey", "h235.clearSaltingKey", + FT_BYTES, BASE_HEX, NULL, 0, + "V3KeySyncMaterial/clearSaltingKey", HFILL }}, + { &hf_h235_paramSsalt, + { "paramSsalt", "h235.paramSsalt", + FT_NONE, BASE_NONE, NULL, 0, + "V3KeySyncMaterial/paramSsalt", HFILL }}, + { &hf_h235_keyDerivationOID, + { "keyDerivationOID", "h235.keyDerivationOID", + FT_STRING, BASE_NONE, NULL, 0, + "V3KeySyncMaterial/keyDerivationOID", HFILL }}, + +/*--- End of included file: packet-h235-hfarr.c ---*/ + + }; + + /* List of subtrees */ + static gint *ett[] = { + +/*--- Included file: packet-h235-ettarr.c ---*/ + +/* Do not modify this file. */ +/* It is created automatically by the ASN.1 to Ethereal dissector compiler */ +/* packet-h235-ettarr.c */ +/* ../../tools/asn2eth.py -X -p h235 -c h235.cnf -s packet-h235-template H235-SECURITY-MESSAGES.asn */ + + &ett_h235_NonStandardParameter, + &ett_h235_DHset, + &ett_h235_ECpoint, + &ett_h235_ECKASDH, + &ett_h235_T_eckasdhp, + &ett_h235_T_eckasdh2, + &ett_h235_TypedCertificate, + &ett_h235_AuthenticationBES, + &ett_h235_AuthenticationMechanism, + &ett_h235_ClearToken, + &ett_h235_SIGNEDxxx, + &ett_h235_ENCRYPTEDxxx, + &ett_h235_HASHEDxxx, + &ett_h235_Params, + &ett_h235_CryptoToken, + &ett_h235_T_cryptoEncryptedToken, + &ett_h235_T_cryptoSignedToken, + &ett_h235_T_cryptoHashedToken, + &ett_h235_H235Key, + &ett_h235_V3KeySyncMaterial, + +/*--- End of included file: packet-h235-ettarr.c ---*/ + + }; + + /* Register protocol */ + proto_h235 = proto_register_protocol(PNAME, PSNAME, PFNAME); + + /* Register fields and subtrees */ + proto_register_field_array(proto_h235, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + +} + + +/*--- proto_reg_handoff_h235 -------------------------------------------*/ +void proto_reg_handoff_h235(void) { +} + |