aboutsummaryrefslogtreecommitdiffstats
path: root/packet-kerberos.c
AgeCommit message (Collapse)AuthorFilesLines
2004-07-18Move dissectors to epan/dissectors directory.Gilbert Ramirez1-4173/+0
Also move ncp222.py, x11-fields, process-x11-fields.pl, make-reg-dotc, and make-reg-dotc.py. Adjust #include lines in files that include packet-*.h files. svn path=/trunk/; revision=11410
2004-07-18Declare "wrap_dissect_gssapi_verf()" in "packet-gssapi.h", and, inGuy Harris1-5/+3
"packet-kerberos.c", get the declaration from that header. svn path=/trunk/; revision=11408
2004-07-18From Jean-Baptiste Marchand:Guy Harris1-0/+35
add identification for various Microsoft Security Service Providers in DCE RPC; for the Kerberos SSP, disect AP_REQ and AP_REP tokens in DCE RPC Bind requests. svn path=/trunk/; revision=11406
2004-07-18Set the svn:eol-style property on all text files to "native", so thatGuy Harris1-1/+1
they have LF at the end of the line on UN*X and CR/LF on Windows; hopefully this means that if a CR/LF version is checked in on Windows, the CRs will be stripped so that they show up only when checked out on Windows, not on UN*X. svn path=/trunk/; revision=11400
2004-07-17From Jean-Baptiste Marchand: add Microsoft-specific name-types, and makeGuy Harris1-2/+19
the name-type field signed. Make the variable into which "dissect_krb5_name_type()" puts the name type local to that routine - it's not used outside that routine. svn path=/trunk/; revision=11392
2004-06-15From Jean-Baptiste Marchand: fix up a couple of #defines that collidedGuy Harris1-5/+5
with existing defines. svn path=/trunk/; revision=11150
2004-06-10some more encryption types and checksum typesRonnie Sahlberg1-2/+78
svn path=/trunk/; revision=11135
2004-06-04get rid of a compiler warningRonnie Sahlberg1-2/+2
svn path=/trunk/; revision=11105
2004-06-04Add a mechanism where one can provide callbacks to the kerbgeros dissectorRonnie Sahlberg1-8/+34
to pass back dissection of application specific fields (octet strings) This can later be used to pick up session keys by dcerpc and similar. Currently it will initially be used by packetcable. PacketCable additions by Thomas Anders svn path=/trunk/; revision=11101
2004-05-27make KRB_SAFE more consistent with the other PDUs by removing the SAFE ↵Ronnie Sahlberg1-9/+5
expansion. cosmetic: Put the application type on the kerberos subtree svn path=/trunk/; revision=11012
2004-05-26remove the SAFE_BODY expansion to make KRB5_MSG_SAFE look more consistentRonnie Sahlberg1-8/+2
with the other application dissectors. svn path=/trunk/; revision=11007
2004-05-26implementation of the KRB_SAFE applicationRonnie Sahlberg1-1/+109
svn path=/trunk/; revision=11005
2004-05-25Get rid of some extra blanks.Guy Harris1-4/+4
svn path=/trunk/; revision=10991
2004-05-18New protocol : PacketCable : PKTCRonnie Sahlberg1-1/+3
The AP-REQ and AP_REP packets are partially dissected up to and including the kerberos blob. work in progress svn path=/trunk/; revision=10916
2004-05-17rename the NOT_DECODED_YET macros to avoid a name clashRonnie Sahlberg1-4/+4
for those sources that include both packet-ber.h and packet-per.h svn path=/trunk/; revision=10912
2004-05-14More updates to packetcable kerberosRonnie Sahlberg1-10/+37
in particular, packetcable use a slightly diufferent KDC-REQ-BODY where the field till[5] is optional. Make it optional in the dissector as well since ethereal will still be able to dissecto normal kerberos pdus where it is not optional svn path=/trunk/; revision=10899
2004-05-14work in progress started implementing PA-PK-AS-REQRonnie Sahlberg1-1/+82
svn path=/trunk/; revision=10886
2004-05-14add dissection of pa-prov-srv-location preauthentication type used by ↵Ronnie Sahlberg1-2/+24
packetcable. svn path=/trunk/; revision=10883
2004-05-11Kerberos encryption types are ASN.1 integers, meaning signed values, andGuy Harris1-3/+3
at least one mail message: http://mailman.mit.edu/pipermail/kerberos/2004-February/004653.html shows some of the weird Microsoft encryption type values logged by some KDC implementation as negative integers. Also, show them as decimal in the top-level line for encryption types, just as we do in the lines for each encryption type. svn path=/trunk/; revision=10848
2004-04-15decryption and dissection of PA_ENC_TIMESTAMPRonnie Sahlberg1-4/+80
svn path=/trunk/; revision=10604
2004-04-15dissect EncKDCRepPart applications 25 and 26Ronnie Sahlberg1-1/+131
svn path=/trunk/; revision=10603
2004-04-05Add support to decrypt the encrypted part of AS/TSG -REP PDUs.Ronnie Sahlberg1-4/+62
Now we only need application 25/26 to be dissected as well for it to be useful ... svn path=/trunk/; revision=10553
2004-04-05Added some more principal name types from the kerberos draftRonnie Sahlberg1-8/+14
svn path=/trunk/; revision=10552
2004-04-01add dissection of the canonicalize bit which some windows clients useRonnie Sahlberg1-1/+14
svn path=/trunk/; revision=10536
2004-03-26Fix a typo.Guy Harris1-2/+2
Clean up white space. svn path=/trunk/; revision=10492
2004-03-26From Tomas Kukosa: use the "proto_item_get_parent()" andGuy Harris1-4/+4
"proto_item_get_parent_nth()" routines, and use the new name for some of the constants for universal tags. svn path=/trunk/; revision=10490
2004-03-25From Tomas Kukosa: BER dissector enhancements and proto.c updates toGuy Harris1-194/+1562
support them. From Ronnie Sahlberg: Kerberos updates with new constants from the current draft, decryption and dissection of Kerberos blobs, and changes to work with the changed BER dissector. svn path=/trunk/; revision=10479
2004-02-25for netbios type addresses in kerberosRonnie Sahlberg1-2/+2
print the netbios type as hex and not decimal svn path=/trunk/; revision=10235
2004-02-23update to kerberos. now also decrypting the KRB_PRIB blobsRonnie Sahlberg1-8/+75
(application 21) of kerberos v5. there are commonly found in Kpasswd packets. Not too interesting yet until we start supporting decryption of kerberos blobs using mit/heimdal kerveros shared libraries. svn path=/trunk/; revision=10197
2004-02-20Update to Kerberos.Ronnie Sahlberg1-1163/+1319
Split kerberos prototype into two halves: helpers to dissect ASN.1 BER in packet-ber.c and kerberos stuff using those helpers in packet-kerberos.c This new kerberos thing places filterable items for every single field and also dissects the bitstring Option fields. It is hoped that this will make it easier to extend kerberos to do decryption of service tickets. svn path=/trunk/; revision=10122
2004-01-23"%.*" requires an "int" argument for the length.Guy Harris1-7/+7
svn path=/trunk/; revision=9803
2004-01-21Fix a check.Guy Harris1-2/+2
svn path=/trunk/; revision=9761
2004-01-20The offset argument to a "get_pdu_len" function is an "int", not aGuy Harris1-3/+3
"guint". svn path=/trunk/; revision=9759
2004-01-20signed/unsigned warning fixesJörg Mayer1-83/+85
svn path=/trunk/; revision=9754
2003-12-04update to kerberosRonnie Sahlberg1-1/+8
if the kerberos blob contains a krb error, print the error string to COL_INFO svn path=/trunk/; revision=9170
2003-07-08As "dissect_ap_options()" isn't compiled in, don't mark its arguments asGuy Harris1-2/+2
unused; presumably it'll either 1) get written, in which case if an argument isn't used it shouldn't be supplied or 2) be removed, in which case there aren't any arguments. svn path=/trunk/; revision=7983
2003-07-08Fix some unused parameter and function warnings.Tim Potter1-2/+6
svn path=/trunk/; revision=7981
2003-06-01Fix a small segmentation fault if we get an ASN.1 parse error, andRichard Sharpe1-1/+15
start to work on kerberos flags etc. Also prettied up the case where the responseToken was an empty string. svn path=/trunk/; revision=7767
2003-04-25Show the URL of the I-D giving information on Kerberos-over-TCP.Guy Harris1-1/+5
svn path=/trunk/; revision=7565
2003-04-25From Tony Schene: Kerberos-over-TCP support.Guy Harris1-27/+167
svn path=/trunk/; revision=7564
2002-09-10Fix a typo in Richard's name.Guy Harris1-5/+30
Add some additional information from http://www.isi.edu/people/bcn/krb-revisions/krbclar8-1.html svn path=/trunk/; revision=6245
2002-09-10Add Microsoft's RC4-HMAC and exportable(?) RC4-HMAC encryption types.Guy Harris1-2/+14
svn path=/trunk/; revision=6242
2002-09-08KRB_DECODE_STRING_OR_DIE, and variants thereof, set "val_len" to theGuy Harris1-8/+8
length of the string value and "item_len" to the length of the entire BER item, including the type header. As such, "val_len", not "item_len", should be used when formatting the value, and "item_len", not "val_len", should be used as the length when putting the item into the protocol tree and when advancing the offset. The kvno in an encryptedData item is unsigned; display it as such. svn path=/trunk/; revision=6231
2002-09-07Decode AP-REQ and AP-REP KRB5 message types ...Richard Sharpe1-6/+55
svn path=/trunk/; revision=6211
2002-09-07OK, now have KRB5 dissector playing nice.Richard Sharpe1-7/+7
svn path=/trunk/; revision=6209
2002-09-05Commit my changes to handle KRB5 in SPNEGO ...Richard Sharpe1-8/+3
Turns out it is a KRB5 AP-REQ ASN1 encoded, and the Kerberos dissector is going to need to be re-architected to deal with this. svn path=/trunk/; revision=6187
2002-09-04Add some level of OID naming etc ...Richard Sharpe1-5/+4
svn path=/trunk/; revision=6180
2002-09-01Add the OID that MS created for KRB5 in mistake.Richard Sharpe1-1/+5
svn path=/trunk/; revision=6164
2002-08-31Make "gssapi_init_oid()" take a dissector handle rather than aGuy Harris1-2/+3
registered dissector name; that means you don't have to register a dissector by name to associate it with a GSS-API security mechanism OID. svn path=/trunk/; revision=6163
2002-08-30Include "packet-gssapi.h" to declare routines we call.Guy Harris1-1/+2
svn path=/trunk/; revision=6142