wireshark/epan/dissectors/packet-ypbind.c

228 lines
5.7 KiB
C

/* packet-ypbind.c
* Routines for ypbind dissection
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* Copied from packet-smb.c
*
* 2001 Ronnie Sahlberg, added dissectors for the commands
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "config.h"
#include "packet-rpc.h"
#include "packet-ypbind.h"
void proto_register_ypbind(void);
void proto_reg_handoff_ypbind(void);
static int proto_ypbind = -1;
static int hf_ypbind_procedure_v1 = -1;
static int hf_ypbind_procedure_v2 = -1;
static int hf_ypbind_domain = -1;
static int hf_ypbind_resp_type = -1;
/* static int hf_ypbind_error = -1; */
static int hf_ypbind_addr = -1;
static int hf_ypbind_port = -1;
static int hf_ypbind_setdom_version = -1;
static gint ett_ypbind = -1;
static int
dissect_ypbind_domain_v2_request(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree, void* data _U_)
{
/* domain */
return dissect_rpc_string(tvb, tree, hf_ypbind_domain, 0, NULL);
}
#define YPBIND_RESP_TYPE_SUCC_VAL 1
#define YPBIND_RESP_TYPE_FAIL_VAL 2
static const value_string resp_type_vals[] = {
{YPBIND_RESP_TYPE_SUCC_VAL, "SUCC_VAL"},
{YPBIND_RESP_TYPE_FAIL_VAL, "FAIL_VAL"},
{0, NULL}
};
#if 0
#define YPBIND_ERROR_ERR 1
#define YPBIND_ERROR_NOSERV 2
#define YPBIND_ERROR_RESC 3
static const value_string error_vals[] = {
{YPBIND_ERROR_ERR, "Internal error"},
{YPBIND_ERROR_NOSERV, "No bound server for passed domain"},
{YPBIND_ERROR_RESC, "System resource allocation failure"},
{0, NULL}
};
#endif
static int
dissect_ypbind_domain_v2_reply(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree, void* data _U_)
{
guint32 type;
int offset = 0;
/* response type */
type=tvb_get_ntohl(tvb, offset);
offset = dissect_rpc_uint32(tvb, tree, hf_ypbind_resp_type, offset);
switch(type){
case YPBIND_RESP_TYPE_SUCC_VAL:
/* ip address */
proto_tree_add_item(tree, hf_ypbind_addr,
tvb, offset, 4, ENC_BIG_ENDIAN);
offset += 4;
/* port */
offset = dissect_rpc_uint32(tvb, tree,
hf_ypbind_port, offset);
break;
case YPBIND_RESP_TYPE_FAIL_VAL:
/* error */
offset = dissect_rpc_uint32(tvb, tree,
hf_ypbind_resp_type, offset);
break;
}
return offset;
}
static int
dissect_ypbind_setdomain_v2_request(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree, void* data _U_)
{
int offset = 0;
/* domain */
offset = dissect_rpc_string(tvb, tree,
hf_ypbind_domain, offset, NULL);
/* ip address */
proto_tree_add_item(tree, hf_ypbind_addr,
tvb, offset, 4, ENC_BIG_ENDIAN);
offset += 4;
/* port */
offset = dissect_rpc_uint32(tvb, tree,
hf_ypbind_port, offset);
/* version */
offset = dissect_rpc_uint32(tvb, tree,
hf_ypbind_setdom_version, offset);
return offset;
}
/* proc number, "proc name", dissect_request, dissect_reply */
static const vsff ypbind1_proc[] = {
{ YPBINDPROC_NULL, "NULL",
dissect_rpc_void, dissect_rpc_void },
{ YPBINDPROC_DOMAIN, "DOMAIN", dissect_rpc_unknown, dissect_rpc_unknown },
{ YPBINDPROC_SETDOM, "SETDOMAIN", dissect_rpc_unknown, dissect_rpc_unknown },
{ 0, NULL, NULL, NULL }
};
static const value_string ypbind1_proc_vals[] = {
{ YPBINDPROC_NULL, "NULL" },
{ YPBINDPROC_DOMAIN, "DOMAIN" },
{ YPBINDPROC_SETDOM, "SETDOMAIN" },
{ 0, NULL }
};
/* end of YPBind version 1 */
static const vsff ypbind2_proc[] = {
{ YPBINDPROC_NULL, "NULL",
dissect_rpc_void, dissect_rpc_void },
{ YPBINDPROC_DOMAIN, "DOMAIN",
dissect_ypbind_domain_v2_request, dissect_ypbind_domain_v2_reply},
{ YPBINDPROC_SETDOM, "SETDOMAIN",
dissect_ypbind_setdomain_v2_request, dissect_rpc_void },
{ 0, NULL, NULL, NULL }
};
static const value_string ypbind2_proc_vals[] = {
{ YPBINDPROC_NULL, "NULL" },
{ YPBINDPROC_DOMAIN, "DOMAIN" },
{ YPBINDPROC_SETDOM, "SETDOMAIN" },
{ 0, NULL }
};
/* end of YPBind version 2 */
static const rpc_prog_vers_info ypbind_vers_info[] = {
{ 1, ypbind1_proc, &hf_ypbind_procedure_v1 },
{ 2, ypbind2_proc, &hf_ypbind_procedure_v2 },
};
void
proto_register_ypbind(void)
{
static hf_register_info hf[] = {
{ &hf_ypbind_procedure_v1, {
"V1 Procedure", "ypbind.procedure_v1", FT_UINT32, BASE_DEC,
VALS(ypbind1_proc_vals), 0, NULL, HFILL }},
{ &hf_ypbind_procedure_v2, {
"V2 Procedure", "ypbind.procedure_v2", FT_UINT32, BASE_DEC,
VALS(ypbind2_proc_vals), 0, NULL, HFILL }},
{ &hf_ypbind_domain, {
"Domain", "ypbind.domain", FT_STRING, BASE_NONE,
NULL, 0, "Name of the NIS/YP Domain", HFILL }},
{ &hf_ypbind_resp_type, {
"Response Type", "ypbind.resp_type", FT_UINT32, BASE_DEC,
VALS(resp_type_vals), 0, NULL, HFILL }},
#if 0
{ &hf_ypbind_error, {
"Error", "ypbind.error", FT_UINT32, BASE_DEC,
VALS(error_vals), 0, "YPBIND Error code", HFILL }},
#endif
{ &hf_ypbind_addr, {
"IP Addr", "ypbind.addr", FT_IPv4, BASE_NONE,
NULL, 0, "IP Address of server", HFILL }},
{ &hf_ypbind_port, {
"Port", "ypbind.port", FT_UINT32, BASE_DEC,
NULL, 0, "Port to use", HFILL }},
{ &hf_ypbind_setdom_version, {
"Version", "ypbind.setdom.version", FT_UINT32, BASE_DEC,
NULL, 0, "Version of setdom", HFILL }},
};
static gint *ett[] = {
&ett_ypbind,
};
proto_ypbind = proto_register_protocol("Yellow Pages Bind",
"YPBIND", "ypbind");
proto_register_field_array(proto_ypbind, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
}
void
proto_reg_handoff_ypbind(void)
{
/* Register the protocol as RPC */
rpc_init_prog(proto_ypbind, YPBIND_PROGRAM, ett_ypbind,
G_N_ELEMENTS(ypbind_vers_info), ypbind_vers_info);
}
/*
* Editor modelines - https://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 8
* tab-width: 8
* indent-tabs-mode: t
* End:
*
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
* :indentSize=8:tabSize=8:noTabs=false:
*/