summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-dcerpc-rpriv.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-dcerpc-rpriv.c
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-dcerpc-rpriv.c')
-rw-r--r--epan/dissectors/packet-dcerpc-rpriv.c142
1 files changed, 142 insertions, 0 deletions
diff --git a/epan/dissectors/packet-dcerpc-rpriv.c b/epan/dissectors/packet-dcerpc-rpriv.c
new file mode 100644
index 00000000..808d7a85
--- /dev/null
+++ b/epan/dissectors/packet-dcerpc-rpriv.c
@@ -0,0 +1,142 @@
+/* packet-dcerpc-rpriv.c
+ *
+ * Routines for DCERPC Privilege Server operations
+ * Copyright 2002, Jaime Fournier <Jaime.Fournier@hush.com>
+ * This information is based off the released idl files from opengroup.
+ * ftp://ftp.opengroup.org/pub/dce122/dce/src/security.tar.gz security/idl/rpriv.idl
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "config.h"
+
+
+#include <epan/packet.h>
+#include "packet-dcerpc.h"
+
+void proto_register_rpriv (void);
+void proto_reg_handoff_rpriv (void);
+
+static int proto_rpriv = -1;
+static int hf_rpriv_opnum = -1;
+static int hf_rpriv_get_eptgt_rqst_authn_svc = -1;
+static int hf_rpriv_get_eptgt_rqst_authz_svc = -1;
+static int hf_rpriv_get_eptgt_rqst_var1 = -1;
+/* static int hf_rpriv_get_eptgt_rqst_key_size = -1; */
+static int hf_rpriv_get_eptgt_rqst_key_size2 = -1;
+static int hf_rpriv_get_eptgt_rqst_key_t = -1;
+static int hf_rpriv_get_eptgt_rqst_key_t2 = -1;
+
+static gint ett_rpriv = -1;
+
+
+static e_guid_t uuid_rpriv = { 0xb1e338f8, 0x9533, 0x11c9, { 0xa3, 0x4a, 0x08, 0x00, 0x1e, 0x01, 0x9c, 0x1e } };
+static guint16 ver_rpriv = 1;
+
+
+static int
+rpriv_dissect_get_eptgt_rqst (tvbuff_t *tvb, int offset,
+ packet_info *pinfo, proto_tree *tree,
+ dcerpc_info *di, guint8 *drep)
+{
+ /* [in] handle_t handle,
+ * [in] unsigned32 authn_svc,
+ * [in] unsigned32 authz_svc,
+ * [in] rpriv_pickle_t *ptgt_req,
+ * unsigned32 num_bytes;
+ * [size_is(num_bytes)]
+ * byte bytes[];
+ */
+
+ guint32 authn_svc, authz_svc, key_size, key_size2, var1;
+ const guint8 *key_t1 = NULL;
+ const guint8 *key_t2 = NULL;
+
+ offset = dissect_ndr_uint32(tvb, offset, pinfo, tree, di, drep, hf_rpriv_get_eptgt_rqst_authn_svc, &authn_svc);
+ offset = dissect_ndr_uint32(tvb, offset, pinfo, tree, di, drep, hf_rpriv_get_eptgt_rqst_authz_svc, &authz_svc);
+ offset = dissect_ndr_uint32(tvb, offset, pinfo, tree, di, drep, hf_rpriv_get_eptgt_rqst_var1, &var1);
+ offset += 276;
+ offset = dissect_ndr_uint32(tvb, offset, pinfo, tree, di, drep, hf_rpriv_get_eptgt_rqst_key_size2, &key_size);
+ /* advance to get size of cell, and princ */
+
+ proto_tree_add_item_ret_string(tree, hf_rpriv_get_eptgt_rqst_key_t, tvb, offset, key_size, ENC_ASCII|ENC_NA, pinfo->pool, &key_t1);
+ offset += key_size;
+
+ offset += 8;
+ offset = dissect_ndr_uint32(tvb, offset, pinfo, tree, di, drep, hf_rpriv_get_eptgt_rqst_key_size2, &key_size2);
+ proto_tree_add_item_ret_string(tree, hf_rpriv_get_eptgt_rqst_key_t2, tvb, offset, key_size2, ENC_ASCII|ENC_NA, pinfo->pool, &key_t2);
+ offset += key_size2;
+
+
+ col_append_fstr(pinfo->cinfo, COL_INFO,
+ " Request for: %s in %s ", key_t2, key_t1);
+
+ return offset;
+
+}
+
+
+static dcerpc_sub_dissector rpriv_dissectors[] = {
+ { 0, "get_ptgt", NULL,NULL},
+ { 1, "become_delegate", NULL, NULL},
+ { 2, "become_impersonator", NULL, NULL},
+ { 3, "get_eptgt", rpriv_dissect_get_eptgt_rqst , NULL},
+ { 0, NULL, NULL, NULL }
+};
+
+void
+proto_register_rpriv (void)
+{
+ static hf_register_info hf[] = {
+ { &hf_rpriv_opnum,
+ { "Operation", "rpriv.opnum", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_rpriv_get_eptgt_rqst_authn_svc,
+ { "Authn_Svc", "rpriv.get_eptgt_rqst_authn_svc", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_rpriv_get_eptgt_rqst_authz_svc,
+ { "Authz_Svc", "rpriv.get_eptgt_rqst_authz_svc", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+#if 0
+ { &hf_rpriv_get_eptgt_rqst_key_size,
+ { "Key_Size", "rpriv.get_eptgt_rqst_key_size", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+#endif
+ { &hf_rpriv_get_eptgt_rqst_var1,
+ { "Var1", "rpriv.get_eptgt_rqst_var1", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_rpriv_get_eptgt_rqst_key_size2,
+ { "Key_Size", "rpriv.get_eptgt_rqst_key_size2", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL }},
+ { &hf_rpriv_get_eptgt_rqst_key_t,
+ { "Key_t", "rpriv.get_eptgt_rqst_key_t", FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+ { &hf_rpriv_get_eptgt_rqst_key_t2,
+ { "Key_t2", "rpriv.get_eptgt_rqst_key_t2", FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ };
+
+ static gint *ett[] = {
+ &ett_rpriv,
+ };
+ proto_rpriv = proto_register_protocol ("Privilege Server operations", "rpriv", "rpriv");
+ proto_register_field_array (proto_rpriv, hf, array_length (hf));
+ proto_register_subtree_array (ett, array_length (ett));
+}
+
+void
+proto_reg_handoff_rpriv (void)
+{
+ /* Register the protocol as dcerpc */
+ dcerpc_init_uuid (proto_rpriv, ett_rpriv, &uuid_rpriv, ver_rpriv, rpriv_dissectors, hf_rpriv_opnum);
+}
+
+/*
+ * Editor modelines - https://www.wireshark.org/tools/modelines.html
+ *
+ * Local variables:
+ * c-basic-offset: 8
+ * tab-width: 8
+ * indent-tabs-mode: t
+ * End:
+ *
+ * vi: set shiftwidth=8 tabstop=8 noexpandtab:
+ * :indentSize=8:tabSize=8:noTabs=false:
+ */