https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6575
Summary: DVB-CI / CI+ dissect X.509 certificates
Product: Wireshark
Version: SVN
Platform: Other
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: wireshark@xxxxxxxxx
Created an attachment (id=7410)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7410)
DVB-CI/CI+ dissect X.509 certificates
Build Information:
TShark 1.7.1 (SVN Rev 39818 from /trunk)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GLib 2.24.2, with libpcap 1.1.1, with libz 1.2.3.4,
without POSIX capabilities, without SMI, without c-ares, without ADNS, without
Lua, without Python, with GnuTLS 2.8.6, with Gcrypt 1.4.5, with MIT Kerberos,
without GeoIP.
Running on Linux 2.6.32-5-amd64, with locale en_US.UTF-8, with libpcap version
1.1.1, with libz 1.2.3.4.
Built using gcc 4.4.5.
--
Dear all,
@Anders: thanks for merging the RSASSA-PSS definitions :-)
now that pss is in, the certificates in CI+ messages can be dissected. The
attached patch extracts them and calls the X.509 dissection.
I looked at ssl, isakmp and others for examples. hf variables for the
certificates are FT_NONE, dissect_x509af_Certificate()'s parameter implicit_tag
is set to false.
Sample capture file is attached. Please note that one of the certificates
contains non-standard extensions which cause a warning. I'll add support for
those later (once I understand a good way how to do this).
Best regards,
Martin
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.