/* Header field declarations */
-static gint hf_backupkey_bkrp_data_in_blob_valBACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER_cert_req = -1;
static gint hf_backupkey_bkrp_access_check_v2_nonce = -1;
static gint hf_backupkey_bkrp_client_side_wrapped_access_check_len = -1;
-static gint hf_backupkey_bkrp_data_in_blob_valBACKUPKEY_RESTORE_GUID_INTEGER_restore_req = -1;
+static gint hf_backupkey_bkrp_data_in_blob_cert_req = -1;
static gint hf_backupkey_bkrp_exported_RSA_key_pair_prime2 = -1;
static gint hf_backupkey_bkrp_encrypted_secret_v3_payload_key = -1;
static gint hf_backupkey_bkrp_client_side_wrapped_guid = -1;
static gint hf_backupkey_bkrp_exported_RSA_key_pair_public_exponent_ = -1;
static gint hf_backupkey_bkrp_exported_RSA_key_pair_header1 = -1;
static gint hf_backupkey_bkrp_exported_RSA_key_pair_certificate_len = -1;
+static gint hf_backupkey_bkrp_data_in_blob_restore_req = -1;
static gint hf_backupkey_bkrp_exported_RSA_key_pair_coefficient_ = -1;
static gint hf_backupkey_bkrp_dc_serverwrap_key_magic = -1;
static gint hf_backupkey_bkrp_exported_RSA_key_pair_magic2 = -1;
{ BACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER, "BACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER" },
{ 0, NULL }
};
-static int backupkey_dissect_element_bkrp_data_in_blob_valBACKUPKEY_RESTORE_GUID_INTEGER_restore_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_);
-static int backupkey_dissect_element_bkrp_data_in_blob_valBACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER_cert_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_);
+static int backupkey_dissect_element_bkrp_data_in_blob_restore_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_);
+static int backupkey_dissect_element_bkrp_data_in_blob_cert_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_);
static int backupkey_dissect_element_bkrp_BackupKey_guidActionAgent(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_);
static int backupkey_dissect_element_bkrp_BackupKey_guidActionAgent_(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_);
static int backupkey_dissect_element_bkrp_BackupKey_data_in(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_);
/* IDL: } */
static int
-backupkey_dissect_element_bkrp_data_in_blob_valBACKUPKEY_RESTORE_GUID_INTEGER_restore_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_)
+backupkey_dissect_element_bkrp_data_in_blob_restore_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_)
{
- offset = backupkey_dissect_struct_bkrp_client_side_wrapped(tvb,offset,pinfo,tree,drep,hf_backupkey_bkrp_data_in_blob_valBACKUPKEY_RESTORE_GUID_INTEGER_restore_req,0);
+ offset = backupkey_dissect_struct_bkrp_client_side_wrapped(tvb,offset,pinfo,tree,drep,hf_backupkey_bkrp_data_in_blob_restore_req,0);
return offset;
}
static int
-backupkey_dissect_element_bkrp_data_in_blob_valBACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER_cert_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_)
+backupkey_dissect_element_bkrp_data_in_blob_cert_req(tvbuff_t *tvb _U_, int offset _U_, packet_info *pinfo _U_, proto_tree *tree _U_, guint8 *drep _U_)
{
- offset = backupkey_dissect_struct_bkrp_client_side_wrapped(tvb,offset,pinfo,tree,drep,hf_backupkey_bkrp_data_in_blob_valBACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER_cert_req,0);
+ offset = backupkey_dissect_struct_bkrp_client_side_wrapped(tvb,offset,pinfo,tree,drep,hf_backupkey_bkrp_data_in_blob_cert_req,0);
return offset;
}
switch(level) {
case BACKUPKEY_RESTORE_GUID_INTEGER:
- offset = backupkey_dissect_element_bkrp_data_in_blob_valBACKUPKEY_RESTORE_GUID_INTEGER_restore_req(tvb, offset, pinfo, tree, drep);
+ offset = backupkey_dissect_element_bkrp_data_in_blob_restore_req(tvb, offset, pinfo, tree, drep);
break;
case BACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER:
- offset = backupkey_dissect_element_bkrp_data_in_blob_valBACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER_cert_req(tvb, offset, pinfo, tree, drep);
+ offset = backupkey_dissect_element_bkrp_data_in_blob_cert_req(tvb, offset, pinfo, tree, drep);
break;
}
proto_item_set_len(item, offset-old_offset);
void proto_register_dcerpc_backupkey(void)
{
static hf_register_info hf[] = {
- { &hf_backupkey_bkrp_data_in_blob_valBACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER_cert_req,
- { "Cert Req", "backupkey.bkrp_data_in_blob_valBACKUPKEY_RETRIEVE_BACKUP_KEY_GUID_INTEGER.cert_req", FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL }},
{ &hf_backupkey_bkrp_access_check_v2_nonce,
{ "Nonce", "backupkey.bkrp_access_check_v2.nonce", FT_UINT8, BASE_DEC, NULL, 0, NULL, HFILL }},
{ &hf_backupkey_bkrp_client_side_wrapped_access_check_len,
{ "Access Check Len", "backupkey.bkrp_client_side_wrapped.access_check_len", FT_UINT32, BASE_DEC, NULL, 0, NULL, HFILL }},
- { &hf_backupkey_bkrp_data_in_blob_valBACKUPKEY_RESTORE_GUID_INTEGER_restore_req,
- { "Restore Req", "backupkey.bkrp_data_in_blob_valBACKUPKEY_RESTORE_GUID_INTEGER.restore_req", FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL }},
+ { &hf_backupkey_bkrp_data_in_blob_cert_req,
+ { "Cert Req", "backupkey.bkrp_data_in_blob.cert_req", FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL }},
{ &hf_backupkey_bkrp_exported_RSA_key_pair_prime2,
{ "Prime2", "backupkey.bkrp_exported_RSA_key_pair.prime2", FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL }},
{ &hf_backupkey_bkrp_encrypted_secret_v3_payload_key,
{ "Header1", "backupkey.bkrp_exported_RSA_key_pair.header1", FT_UINT32, BASE_DEC, NULL, 0, NULL, HFILL }},
{ &hf_backupkey_bkrp_exported_RSA_key_pair_certificate_len,
{ "Certificate Len", "backupkey.bkrp_exported_RSA_key_pair.certificate_len", FT_UINT32, BASE_DEC, NULL, 0, NULL, HFILL }},
+ { &hf_backupkey_bkrp_data_in_blob_restore_req,
+ { "Restore Req", "backupkey.bkrp_data_in_blob.restore_req", FT_NONE, BASE_NONE, NULL, 0, NULL, HFILL }},
{ &hf_backupkey_bkrp_exported_RSA_key_pair_coefficient_,
{ "Subcontext length", "backupkey.bkrp_exported_RSA_key_pair.subcontext", FT_UINT0, BASE_HEX, NULL, 0, NULL, HFILL }},
{ &hf_backupkey_bkrp_dc_serverwrap_key_magic,