Age | Commit message (Collapse) | Author | Files | Lines |
|
Also move ncp222.py, x11-fields, process-x11-fields.pl,
make-reg-dotc, and make-reg-dotc.py.
Adjust #include lines in files that include packet-*.h
files.
svn path=/trunk/; revision=11410
|
|
"packet-kerberos.c", get the declaration from that header.
svn path=/trunk/; revision=11408
|
|
add identification for various Microsoft Security Service
Providers in DCE RPC;
for the Kerberos SSP, disect AP_REQ and AP_REP tokens in DCE RPC
Bind requests.
svn path=/trunk/; revision=11406
|
|
they have LF at the end of the line on UN*X and CR/LF on Windows;
hopefully this means that if a CR/LF version is checked in on Windows,
the CRs will be stripped so that they show up only when checked out on
Windows, not on UN*X.
svn path=/trunk/; revision=11400
|
|
the name-type field signed.
Make the variable into which "dissect_krb5_name_type()" puts the name
type local to that routine - it's not used outside that routine.
svn path=/trunk/; revision=11392
|
|
with existing defines.
svn path=/trunk/; revision=11150
|
|
svn path=/trunk/; revision=11135
|
|
svn path=/trunk/; revision=11105
|
|
to pass back dissection of application specific fields (octet strings)
This can later be used to pick up session keys by dcerpc and similar.
Currently it will initially be used by packetcable.
PacketCable additions by Thomas Anders
svn path=/trunk/; revision=11101
|
|
expansion.
cosmetic: Put the application type on the kerberos subtree
svn path=/trunk/; revision=11012
|
|
with the other application dissectors.
svn path=/trunk/; revision=11007
|
|
svn path=/trunk/; revision=11005
|
|
svn path=/trunk/; revision=10991
|
|
The AP-REQ and AP_REP packets are partially dissected up to and including the kerberos blob.
work in progress
svn path=/trunk/; revision=10916
|
|
for those sources that include both packet-ber.h and packet-per.h
svn path=/trunk/; revision=10912
|
|
in particular, packetcable use a slightly diufferent KDC-REQ-BODY
where the field till[5] is optional.
Make it optional in the dissector as well since ethereal will still be able to dissecto normal kerberos pdus where it is not optional
svn path=/trunk/; revision=10899
|
|
svn path=/trunk/; revision=10886
|
|
packetcable.
svn path=/trunk/; revision=10883
|
|
at least one mail message:
http://mailman.mit.edu/pipermail/kerberos/2004-February/004653.html
shows some of the weird Microsoft encryption type values logged by some
KDC implementation as negative integers. Also, show them as decimal in
the top-level line for encryption types, just as we do in the lines for
each encryption type.
svn path=/trunk/; revision=10848
|
|
svn path=/trunk/; revision=10604
|
|
svn path=/trunk/; revision=10603
|
|
Now we only need application 25/26 to be dissected as well for it to be
useful ...
svn path=/trunk/; revision=10553
|
|
svn path=/trunk/; revision=10552
|
|
svn path=/trunk/; revision=10536
|
|
Clean up white space.
svn path=/trunk/; revision=10492
|
|
"proto_item_get_parent_nth()" routines, and use the new name for some of
the constants for universal tags.
svn path=/trunk/; revision=10490
|
|
support them.
From Ronnie Sahlberg: Kerberos updates with new constants from the
current draft, decryption and dissection of Kerberos blobs, and changes
to work with the changed BER dissector.
svn path=/trunk/; revision=10479
|
|
print the netbios type as hex and not decimal
svn path=/trunk/; revision=10235
|
|
(application 21) of kerberos v5.
there are commonly found in Kpasswd packets.
Not too interesting yet until we start supporting decryption of kerberos
blobs using mit/heimdal kerveros shared libraries.
svn path=/trunk/; revision=10197
|
|
Split kerberos prototype into two halves:
helpers to dissect ASN.1 BER in packet-ber.c
and kerberos stuff using those helpers in packet-kerberos.c
This new kerberos thing places filterable items for every single field
and also dissects the bitstring Option fields.
It is hoped that this will make it easier to extend kerberos to do decryption of service tickets.
svn path=/trunk/; revision=10122
|
|
svn path=/trunk/; revision=9803
|
|
svn path=/trunk/; revision=9761
|
|
"guint".
svn path=/trunk/; revision=9759
|
|
svn path=/trunk/; revision=9754
|
|
if the kerberos blob contains a krb error, print the error string to COL_INFO
svn path=/trunk/; revision=9170
|
|
unused; presumably it'll either
1) get written, in which case if an argument isn't used it
shouldn't be supplied
or
2) be removed, in which case there aren't any arguments.
svn path=/trunk/; revision=7983
|
|
svn path=/trunk/; revision=7981
|
|
start to work on kerberos flags etc.
Also prettied up the case where the responseToken was an empty string.
svn path=/trunk/; revision=7767
|
|
svn path=/trunk/; revision=7565
|
|
svn path=/trunk/; revision=7564
|
|
Add some additional information from
http://www.isi.edu/people/bcn/krb-revisions/krbclar8-1.html
svn path=/trunk/; revision=6245
|
|
svn path=/trunk/; revision=6242
|
|
length of the string value and "item_len" to the length of the entire
BER item, including the type header. As such, "val_len", not
"item_len", should be used when formatting the value, and "item_len",
not "val_len", should be used as the length when putting the item into
the protocol tree and when advancing the offset.
The kvno in an encryptedData item is unsigned; display it as such.
svn path=/trunk/; revision=6231
|
|
svn path=/trunk/; revision=6211
|
|
svn path=/trunk/; revision=6209
|
|
Turns out it is a KRB5 AP-REQ ASN1 encoded, and the Kerberos dissector is
going to need to be re-architected to deal with this.
svn path=/trunk/; revision=6187
|
|
svn path=/trunk/; revision=6180
|
|
svn path=/trunk/; revision=6164
|
|
registered dissector name; that means you don't have to register a
dissector by name to associate it with a GSS-API security mechanism OID.
svn path=/trunk/; revision=6163
|
|
svn path=/trunk/; revision=6142
|