Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 6575] New: DVB-CI / CI+ dissect X.509 certificates

Date: Sun, 13 Nov 2011 11:37:06 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6575

           Summary: DVB-CI / CI+ dissect X.509 certificates
           Product: Wireshark
           Version: SVN
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: wireshark@xxxxxxxxx


Created an attachment (id=7410)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7410)
DVB-CI/CI+ dissect X.509 certificates

Build Information:
TShark 1.7.1 (SVN Rev 39818 from /trunk)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GLib 2.24.2, with libpcap 1.1.1, with libz 1.2.3.4,
without POSIX capabilities, without SMI, without c-ares, without ADNS, without
Lua, without Python, with GnuTLS 2.8.6, with Gcrypt 1.4.5, with MIT Kerberos,
without GeoIP.

Running on Linux 2.6.32-5-amd64, with locale en_US.UTF-8, with libpcap version
1.1.1, with libz 1.2.3.4.

Built using gcc 4.4.5.

--
Dear all,

@Anders: thanks for merging the RSASSA-PSS definitions :-)

now that pss is in, the certificates in CI+ messages can be dissected. The
attached patch extracts them and calls the X.509 dissection.

I looked at ssl, isakmp and others for examples. hf variables for the
certificates are FT_NONE, dissect_x509af_Certificate()'s parameter implicit_tag
is set to false.

Sample capture file is attached. Please note that one of the certificates
contains non-standard extensions which cause a warning. I'll add support for
those later (once I understand a good way how to do this).

Best regards,

   Martin

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.