]> The Tcpdump Group git mirrors - tcpdump/blob - print-smb.c
Use TTEST2 instead of home-grown truncation check.
[tcpdump] / print-smb.c
1 /*
2 Copyright (C) Andrew Tridgell 1995-1999
3
4 This software may be distributed either under the terms of the
5 BSD-style license that accompanies tcpdump or the GNU GPL version 2
6 or later */
7
8 #ifdef HAVE_CONFIG_H
9 #include "config.h"
10 #endif
11
12 #include <stdio.h>
13 #include <sys/types.h>
14
15 #include "interface.h"
16 #include "smb.h"
17
18 static int request=0;
19
20 uchar *startbuf=NULL;
21
22 struct smbdescript
23 {
24 char *req_f1;
25 char *req_f2;
26 char *rep_f1;
27 char *rep_f2;
28 void (*fn)();
29 };
30
31 struct smbfns
32 {
33 int id;
34 char *name;
35 int flags;
36 struct smbdescript descript;
37 };
38
39 #define DEFDESCRIPT {NULL,NULL,NULL,NULL,NULL}
40
41 #define FLG_CHAIN (1<<0)
42
43 static struct smbfns *smbfind(int id,struct smbfns *list)
44 {
45 int sindex;
46
47 for (sindex=0;list[sindex].name;sindex++)
48 if (list[sindex].id == id) return(&list[sindex]);
49
50 return(&list[0]);
51 }
52
53 static void trans2_findfirst(uchar *param,uchar *data,int pcnt,int dcnt)
54 {
55 char *fmt;
56
57 if (request) {
58 fmt = "Attribute=[A]\nSearchCount=[d]\nFlags=[w]\nLevel=[dP5]\nFile=[S]\n";
59 } else {
60 fmt = "Handle=[w]\nCount=[d]\nEOS=[w]\nEoffset=[d]\nLastNameOfs=[w]\n";
61 }
62
63 fdata(param,fmt,param+pcnt);
64 if (dcnt) {
65 printf("data:\n");
66 print_data(data,dcnt);
67 }
68 }
69
70 static void trans2_qfsinfo(uchar *param,uchar *data,int pcnt,int dcnt)
71 {
72 static int level=0;
73 char *fmt="";
74
75 if (request) {
76 level = SVAL(param,0);
77 fmt = "InfoLevel=[d]\n";
78 fdata(param,fmt,param+pcnt);
79 } else {
80 switch (level) {
81 case 1:
82 fmt = "idFileSystem=[W]\nSectorUnit=[D]\nUnit=[D]\nAvail=[D]\nSectorSize=[d]\n";
83 break;
84 case 2:
85 fmt = "CreationTime=[T2]VolNameLength=[B]\nVolumeLabel=[s12]\n";
86 break;
87 case 0x105:
88 fmt = "Capabilities=[W]\nMaxFileLen=[D]\nVolNameLen=[D]\nVolume=[S]\n";
89 break;
90 default:
91 fmt = "UnknownLevel\n";
92 }
93 fdata(data,fmt,data+dcnt);
94 }
95 if (dcnt) {
96 printf("data:\n");
97 print_data(data,dcnt);
98 }
99 }
100
101 struct smbfns trans2_fns[] = {
102 {0,"TRANSACT2_OPEN",0,
103 {"Flags2=[w]\nMode=[w]\nSearchAttrib=[A]\nAttrib=[A]\nTime=[T2]\nOFun=[w]\nSize=[D]\nRes=([w,w,w,w,w])\nPath=[S]",NULL,
104 "Handle=[d]\nAttrib=[A]\nTime=[T2]\nSize=[D]\nAccess=[w]\nType=[w]\nState=[w]\nAction=[w]\nInode=[W]\nOffErr=[d]\n|EALength=[d]\n",NULL,NULL}},
105
106 {1,"TRANSACT2_FINDFIRST",0,
107 {NULL,NULL,NULL,NULL,trans2_findfirst}},
108
109 {2,"TRANSACT2_FINDNEXT",0,DEFDESCRIPT},
110
111 {3,"TRANSACT2_QFSINFO",0,
112 {NULL,NULL,NULL,NULL,trans2_qfsinfo}},
113
114 {4,"TRANSACT2_SETFSINFO",0,DEFDESCRIPT},
115 {5,"TRANSACT2_QPATHINFO",0,DEFDESCRIPT},
116 {6,"TRANSACT2_SETPATHINFO",0,DEFDESCRIPT},
117 {7,"TRANSACT2_QFILEINFO",0,DEFDESCRIPT},
118 {8,"TRANSACT2_SETFILEINFO",0,DEFDESCRIPT},
119 {9,"TRANSACT2_FSCTL",0,DEFDESCRIPT},
120 {10,"TRANSACT2_IOCTL",0,DEFDESCRIPT},
121 {11,"TRANSACT2_FINDNOTIFYFIRST",0,DEFDESCRIPT},
122 {12,"TRANSACT2_FINDNOTIFYNEXT",0,DEFDESCRIPT},
123 {13,"TRANSACT2_MKDIR",0,DEFDESCRIPT},
124 {-1,NULL,0,DEFDESCRIPT}};
125
126
127 static void print_trans2(uchar *words,uchar *dat,uchar *buf,uchar *maxbuf)
128 {
129 static struct smbfns *fn = &trans2_fns[0];
130 uchar *data,*param;
131 uchar *f1=NULL,*f2=NULL;
132 int pcnt,dcnt;
133
134 if (request) {
135 fn = smbfind(SVAL(words+1,14*2),trans2_fns);
136 data = buf+SVAL(words+1,12*2);
137 param = buf+SVAL(words+1,10*2);
138 pcnt = SVAL(words+1,9*2);
139 dcnt = SVAL(words+1,11*2);
140 } else {
141 data = buf+SVAL(words+1,7*2);
142 param = buf+SVAL(words+1,4*2);
143 pcnt = SVAL(words+1,3*2);
144 dcnt = SVAL(words+1,6*2);
145 }
146
147 printf("%s param_length=%d data_length=%d\n",
148 fn->name,pcnt,dcnt);
149
150 if (request) {
151 if (CVAL(words,0) == 8) {
152 fdata(words+1,"Trans2Secondary\nTotParam=[d]\nTotData=[d]\nParamCnt=[d]\nParamOff=[d]\nParamDisp=[d]\nDataCnt=[d]\nDataOff=[d]\nDataDisp=[d]\nHandle=[d]\n",maxbuf);
153 return;
154 } else {
155 fdata(words+1,"TotParam=[d]\nTotData=[d]\nMaxParam=[d]\nMaxData=[d]\nMaxSetup=[d]\nFlags=[w]\nTimeOut=[D]\nRes1=[w]\nParamCnt=[d]\nParamOff=[d]\nDataCnt=[d]\nDataOff=[d]\nSetupCnt=[d]\n",words+1+14*2);
156 fdata(data+1,"TransactionName=[S]\n%",maxbuf);
157 }
158 f1 = fn->descript.req_f1;
159 f2 = fn->descript.req_f2;
160 } else {
161 if (CVAL(words,0) == 0) {
162 printf("Trans2Interim\n");
163 return;
164 } else {
165 fdata(words+1,"TotParam=[d]\nTotData=[d]\nRes1=[w]\nParamCnt=[d]\nParamOff=[d]\nParamDisp[d]\nDataCnt=[d]\nDataOff=[d]\nDataDisp=[d]\nSetupCnt=[d]\n",words+1+10*2);
166 }
167 f1 = fn->descript.rep_f1;
168 f2 = fn->descript.rep_f2;
169 }
170
171 if (fn->descript.fn) {
172 fn->descript.fn(param,data,pcnt,dcnt);
173 } else {
174 fdata(param,f1?f1:(uchar*)"Paramaters=\n",param+pcnt);
175 fdata(data,f2?f2:(uchar*)"Data=\n",data+dcnt);
176 }
177 }
178
179
180 static void print_browse(uchar *param,int paramlen,uchar *data,int datalen)
181 {
182 uchar *maxbuf = data + datalen;
183 int command = CVAL(data,0);
184
185 fdata(param,"BROWSE PACKET\n|Param ",param+paramlen);
186
187 switch (command) {
188 case 0xF:
189 data = fdata(data,"BROWSE PACKET:\nType=[B] (LocalMasterAnnouncement)\nUpdateCount=[w]\nRes1=[B]\nAnnounceInterval=[d]\nName=[n2]\nMajorVersion=[B]\nMinorVersion=[B]\nServerType=[W]\nElectionVersion=[w]\nBrowserConstant=[w]\n",maxbuf);
190 break;
191
192 case 0x1:
193 data = fdata(data,"BROWSE PACKET:\nType=[B] (HostAnnouncement)\nUpdateCount=[w]\nRes1=[B]\nAnnounceInterval=[d]\nName=[n2]\nMajorVersion=[B]\nMinorVersion=[B]\nServerType=[W]\nElectionVersion=[w]\nBrowserConstant=[w]\n",maxbuf);
194 break;
195
196 case 0x2:
197 data = fdata(data,"BROWSE PACKET:\nType=[B] (AnnouncementRequest)\nFlags=[B]\nReplySystemName=[S]\n",maxbuf);
198 break;
199
200 case 0xc:
201 data = fdata(data,"BROWSE PACKET:\nType=[B] (WorkgroupAnnouncement)\nUpdateCount=[w]\nRes1=[B]\nAnnounceInterval=[d]\nName=[n2]\nMajorVersion=[B]\nMinorVersion=[B]\nServerType=[W]\nCommentPointer=[W]\nServerName=[S]\n",maxbuf);
202 break;
203
204 case 0x8:
205 data = fdata(data,"BROWSE PACKET:\nType=[B] (ElectionFrame)\nElectionVersion=[B]\nOSSummary=[W]\nUptime=[(W,W)]\nServerName=[S]\n",maxbuf);
206 break;
207
208 case 0xb:
209 data = fdata(data,"BROWSE PACKET:\nType=[B] (BecomeBackupBrowser)\nName=[S]\n",maxbuf);
210 break;
211
212 case 0x9:
213 data = fdata(data,"BROWSE PACKET:\nType=[B] (GetBackupList)\nListCount?=[B]\nToken?=[B]\n",maxbuf);
214 break;
215
216 case 0xa:
217 data = fdata(data,"BROWSE PACKET:\nType=[B] (BackupListResponse)\nServerCount?=[B]\nToken?=[B]*Name=[S]\n",maxbuf);
218 break;
219
220 case 0xd:
221 data = fdata(data,"BROWSE PACKET:\nType=[B] (MasterAnnouncement)\nMasterName=[S]\n",maxbuf);
222 break;
223
224 case 0xe:
225 data = fdata(data,"BROWSE PACKET:\nType=[B] (ResetBrowser)\nOptions=[B]\n",maxbuf);
226 break;
227
228 default:
229 data = fdata(data,"Unknown Browser Frame ",maxbuf);
230 break;
231 }
232 }
233
234
235 static void print_ipc(uchar *param,int paramlen,uchar *data,int datalen)
236 {
237 int command = SVAL(param,0);
238 if (paramlen)
239 fdata(param,"Command=[w]\nStr1=[S]\nStr2=[S]\n",param+paramlen);
240 if (datalen)
241 fdata(data,"IPC ",data+datalen);
242 }
243
244
245 static void print_trans(uchar *words,uchar *data1,uchar *buf,uchar *maxbuf)
246 {
247 uchar *f1,*f2,*f3,*f4;
248 uchar *data,*param;
249 int datalen,paramlen;
250 int buflen = SVAL(data1,0);
251
252 if (request) {
253 paramlen = SVAL(words+1,9*2);
254 param = buf + SVAL(words+1,10*2);
255 datalen = SVAL(words+1,11*2);
256 data = buf + SVAL(words+1,12*2);
257 f1 = "TotParamCnt=[d] \nTotDataCnt=[d] \nMaxParmCnt=[d] \nMaxDataCnt=[d]\nMaxSCnt=[d] \nTransFlags=[w] \nRes1=[w] \nRes2=[w] \nRes3=[w]\nParamCnt=[d] \nParamOff=[d] \nDataCnt=[d] \nDataOff=[d] \nSUCnt=[d]\n";
258 f2 = "|Name=[S]\n";
259 f3 = "|Param ";
260 f4 = "|Data ";
261 } else {
262 paramlen = SVAL(words+1,3*2);
263 param = buf + SVAL(words+1,4*2);
264 datalen = SVAL(words+1,6*2);
265 data = buf + SVAL(words+1,7*2);
266 f1 = "TotParamCnt=[d] \nTotDataCnt=[d] \nRes1=[d]\nParamCnt=[d] \nParamOff=[d] \nRes2=[d] \nDataCnt=[d] \nDataOff=[d] \nRes3=[d]\nLsetup=[d]\n";
267 f2 = "|Unknown ";
268 f3 = "|Param ";
269 f4 = "|Data ";
270 }
271
272 fdata(words+1,f1,MIN(words+1+2*CVAL(words,0),maxbuf));
273 fdata(data1+2,f2,maxbuf - (paramlen + datalen));
274
275 if (!strcmp(data1+2,"\\MAILSLOT\\BROWSE")) {
276 print_browse(param,paramlen,data,datalen);
277 return;
278 }
279
280 if (!strcmp(data1+2,"\\PIPE\\LANMAN")) {
281 print_ipc(param,paramlen,data,datalen);
282 return;
283 }
284
285 if (paramlen) fdata(param,f3,MIN(param+paramlen,maxbuf));
286 if (datalen) fdata(data,f4,MIN(data+datalen,maxbuf));
287 }
288
289
290
291 void print_negprot(uchar *words,uchar *data,uchar *buf,uchar *maxbuf)
292 {
293 uchar *f1=NULL,*f2=NULL;
294
295 if (request) {
296 f2 = "*|Dialect=[Z]\n";
297 } else {
298 if (CVAL(words,0) == 1) {
299 f1 = "Core Protocol\nDialectIndex=[d]";
300 } else if (CVAL(words,0) == 17) {
301 f1 = "NT1 Protocol\nDialectIndex=[d]\nSecMode=[B]\nMaxMux=[d]\nNumVcs=[d]\nMaxBuffer=[D]\nRawSize=[D]\nSessionKey=[W]\nCapabilities=[W]\nServerTime=[T3]TimeZone=[d]\nCryptKey=";
302 } else if (CVAL(words,0) == 13) {
303 f1 = "Coreplus/Lanman1/Lanman2 Protocol\nDialectIndex=[d]\nSecMode=[w]\nMaxXMit=[d]\nMaxMux=[d]\nMaxVcs=[d]\nBlkMode=[w]\nSessionKey=[W]\nServerTime=[T1]TimeZone=[d]\nRes=[W]\nCryptKey=";
304 }
305 }
306
307 if (f1)
308 fdata(words+1,f1,MIN(words + 1 + CVAL(words,0)*2,maxbuf));
309 else
310 print_data(words+1,MIN(CVAL(words,0)*2,PTR_DIFF(maxbuf,words+1)));
311
312 if (f2)
313 fdata(data+2,f2,MIN(data + 2 + SVAL(data,0),maxbuf));
314 else
315 print_data(data+2,MIN(SVAL(data,0),PTR_DIFF(maxbuf,data+2)));
316
317 }
318
319 void print_sesssetup(uchar *words,uchar *data,uchar *buf,uchar *maxbuf)
320 {
321 int wcnt = CVAL(words,0);
322 uchar *f1=NULL,*f2=NULL;
323
324 if (request) {
325 if (wcnt==10) {
326 f1 = "Com2=[w]\nOff2=[d]\nBufSize=[d]\nMpxMax=[d]\nVcNum=[d]\nSessionKey=[W]\nPassLen=[d]\nCryptLen=[d]\nCryptOff=[d]\nPass&Name=\n";
327 } else {
328 f1 = "Com2=[B]\nRes1=[B]\nOff2=[d]\nMaxBuffer=[d]\nMaxMpx=[d]\nVcNumber=[d]\nSessionKey=[W]\nCaseInsensitivePasswordLength=[d]\nCaseSensitivePasswordLength=[d]\nRes=[W]\nCapabilities=[W]\nPass1&Pass2&Account&Domain&OS&LanMan=\n";
329 }
330 } else {
331 if (CVAL(words,0) == 3) {
332 f1 = "Com2=[w]\nOff2=[d]\nAction=[w]\n";
333 } else if (CVAL(words,0) == 13) {
334 f1 = "Com2=[B]\nRes=[B]\nOff2=[d]\nAction=[w]\n";
335 f2 = "NativeOS=[S]\nNativeLanMan=[S]\nPrimaryDomain=[S]\n";
336 }
337 }
338
339 if (f1)
340 fdata(words+1,f1,MIN(words + 1 + CVAL(words,0)*2,maxbuf));
341 else
342 print_data(words+1,MIN(CVAL(words,0)*2,PTR_DIFF(maxbuf,words+1)));
343
344 if (f2)
345 fdata(data+2,f2,MIN(data + 2 + SVAL(data,0),maxbuf));
346 else
347 print_data(data+2,MIN(SVAL(data,0),PTR_DIFF(maxbuf,data+2)));
348 }
349
350
351 static struct smbfns smb_fns[] =
352 {
353 {-1,"SMBunknown",0,DEFDESCRIPT},
354
355 {SMBtcon,"SMBtcon",0,
356 {NULL,"Path=[Z]\nPassword=[Z]\nDevice=[Z]\n",
357 "MaxXmit=[d]\nTreeId=[d]\n",NULL,
358 NULL}},
359
360
361 {SMBtdis,"SMBtdis",0,DEFDESCRIPT},
362 {SMBexit,"SMBexit",0,DEFDESCRIPT},
363 {SMBioctl,"SMBioctl",0,DEFDESCRIPT},
364
365 {SMBecho,"SMBecho",0,
366 {"ReverbCount=[d]\n",NULL,
367 "SequenceNum=[d]\n",NULL,
368 NULL}},
369
370 {SMBulogoffX, "SMBulogoffX",FLG_CHAIN,DEFDESCRIPT},
371
372 {SMBgetatr,"SMBgetatr",0,
373 {NULL,"Path=[Z]\n",
374 "Attribute=[A]\nTime=[T2]Size=[D]\nRes=([w,w,w,w,w])\n",NULL,
375 NULL}},
376
377 {SMBsetatr,"SMBsetatr",0,
378 {"Attribute=[A]\nTime=[T2]Res=([w,w,w,w,w])\n","Path=[Z]\n",
379 NULL,NULL,NULL}},
380
381 {SMBchkpth,"SMBchkpth",0,
382 {NULL,"Path=[Z]\n",NULL,NULL,NULL}},
383
384 {SMBsearch,"SMBsearch",0,
385 {"Count=[d]\nAttrib=[A]\n","Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\n",
386 "Count=[d]\n","BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",NULL}},
387
388
389 {SMBopen,"SMBopen",0,
390 {"Mode=[w]\nAttribute=[A]\n","Path=[Z]\n",
391 "Handle=[d]\nOAttrib=[A]\nTime=[T2]Size=[D]\nAccess=[w]\n",NULL,
392 NULL}},
393
394 {SMBcreate,"SMBcreate",0,
395 {"Attrib=[A]\nTime=[T2]","Path=[Z]\n",
396 "Handle=[d]\n",NULL,
397 NULL}},
398
399 {SMBmknew,"SMBmknew",0,
400 {"Attrib=[A]\nTime=[T2]","Path=[Z]\n",
401 "Handle=[d]\n",NULL,
402 NULL}},
403
404 {SMBunlink,"SMBunlink",0,
405 {"Attrib=[A]\n","Path=[Z]\n",NULL,NULL,NULL}},
406
407 {SMBread,"SMBread",0,
408 {"Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n",NULL,
409 "Count=[d]\nRes=([w,w,w,w])\n",NULL,NULL}},
410
411 {SMBwrite,"SMBwrite",0,
412 {"Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n",NULL,
413 "Count=[d]\n",NULL,NULL}},
414
415 {SMBclose,"SMBclose",0,
416 {"Handle=[d]\nTime=[T2]",NULL,NULL,NULL,NULL}},
417
418 {SMBmkdir,"SMBmkdir",0,
419 {NULL,"Path=[Z]\n",NULL,NULL,NULL}},
420
421 {SMBrmdir,"SMBrmdir",0,
422 {NULL,"Path=[Z]\n",NULL,NULL,NULL}},
423
424 {SMBdskattr,"SMBdskattr",0,
425 {NULL,NULL,
426 "TotalUnits=[d]\nBlocksPerUnit=[d]\nBlockSize=[d]\nFreeUnits=[d]\nMedia=[w]\n",
427 NULL,NULL}},
428
429 {SMBmv,"SMBmv",0,
430 {"Attrib=[A]\n","OldPath=[Z]\nNewPath=[Z]\n",NULL,NULL,NULL}},
431
432 /* this is a Pathworks specific call, allowing the
433 changing of the root path */
434 {pSETDIR,"SMBsetdir",0,
435 {NULL,"Path=[Z]\n",NULL,NULL,NULL}},
436
437 {SMBlseek,"SMBlseek",0,
438 {"Handle=[d]\nMode=[w]\nOffset=[D]\n","Offset=[D]\n",NULL,NULL}},
439
440 {SMBflush,"SMBflush",0,
441 {"Handle=[d]\n",NULL,NULL,NULL,NULL}},
442
443 {SMBsplopen,"SMBsplopen",0,
444 {"SetupLen=[d]\nMode=[w]\n","Ident=[Z]\n","Handle=[d]\n",NULL,NULL}},
445
446 {SMBsplclose,"SMBsplclose",0,
447 {"Handle=[d]\n",NULL,NULL,NULL,NULL}},
448
449 {SMBsplretq,"SMBsplretq",0,
450 {"MaxCount=[d]\nStartIndex=[d]\n",NULL,
451 "Count=[d]\nIndex=[d]\n",
452 "*Time=[T2]Status=[B]\nJobID=[d]\nSize=[D]\nRes=[B]Name=[s16]\n",
453 NULL}},
454
455 {SMBsplwr,"SMBsplwr",0,
456 {"Handle=[d]\n",NULL,NULL,NULL,NULL}},
457
458 {SMBlock,"SMBlock",0,
459 {"Handle=[d]\nCount=[D]\nOffset=[D]\n",NULL,NULL,NULL,NULL}},
460
461 {SMBunlock,"SMBunlock",0,
462 {"Handle=[d]\nCount=[D]\nOffset=[D]\n",NULL,NULL,NULL,NULL}},
463
464 /* CORE+ PROTOCOL FOLLOWS */
465
466 {SMBreadbraw,"SMBreadbraw",0,
467 {"Handle=[d]\nOffset=[D]\nMaxCount=[d]\nMinCount=[d]\nTimeOut=[D]\nRes=[d]\n",
468 NULL,NULL,NULL,NULL}},
469
470 {SMBwritebraw,"SMBwritebraw",0,
471 {"Handle=[d]\nTotalCount=[d]\nRes=[w]\nOffset=[D]\nTimeOut=[D]\nWMode=[w]\nRes2=[W]\n|DataSize=[d]\nDataOff=[d]\n",
472 NULL,"WriteRawAck",NULL,NULL}},
473
474 {SMBwritec,"SMBwritec",0,
475 {NULL,NULL,"Count=[d]\n",NULL,NULL}},
476
477 {SMBwriteclose,"SMBwriteclose",0,
478 {"Handle=[d]\nCount=[d]\nOffset=[D]\nTime=[T2]Res=([w,w,w,w,w,w])",NULL,
479 "Count=[d]\n",NULL,NULL}},
480
481 {SMBlockread,"SMBlockread",0,
482 {"Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n",NULL,
483 "Count=[d]\nRes=([w,w,w,w])\n",NULL,NULL}},
484
485 {SMBwriteunlock,"SMBwriteunlock",0,
486 {"Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n",NULL,
487 "Count=[d]\n",NULL,NULL}},
488
489 {SMBreadBmpx,"SMBreadBmpx",0,
490 {"Handle=[d]\nOffset=[D]\nMaxCount=[d]\nMinCount=[d]\nTimeOut=[D]\nRes=[w]\n",
491 NULL,
492 "Offset=[D]\nTotCount=[d]\nRemaining=[d]\nRes=([w,w])\nDataSize=[d]\nDataOff=[d]\n",
493 NULL,NULL}},
494
495 {SMBwriteBmpx,"SMBwriteBmpx",0,
496 {"Handle=[d]\nTotCount=[d]\nRes=[w]\nOffset=[D]\nTimeOut=[D]\nWMode=[w]\nRes2=[W]\nDataSize=[d]\nDataOff=[d]\n",NULL,
497 "Remaining=[d]\n",NULL,NULL}},
498
499 {SMBwriteBs,"SMBwriteBs",0,
500 {"Handle=[d]\nTotCount=[d]\nOffset=[D]\nRes=[W]\nDataSize=[d]\nDataOff=[d]\n",NULL,
501 "Count=[d]\n",NULL,NULL}},
502
503 {SMBsetattrE,"SMBsetattrE",0,
504 {"Handle=[d]\nCreationTime=[T2]AccessTime=[T2]ModifyTime=[T2]",NULL,
505 NULL,NULL,NULL}},
506
507 {SMBgetattrE,"SMBgetattrE",0,
508 {"Handle=[d]\n",NULL,
509 "CreationTime=[T2]AccessTime=[T2]ModifyTime=[T2]Size=[D]\nAllocSize=[D]\nAttribute=[A]\n",NULL,NULL}},
510
511 {SMBtranss,"SMBtranss",0,DEFDESCRIPT},
512 {SMBioctls,"SMBioctls",0,DEFDESCRIPT},
513
514 {SMBcopy,"SMBcopy",0,
515 {"TreeID2=[d]\nOFun=[w]\nFlags=[w]\n","Path=[S]\nNewPath=[S]\n",
516 "CopyCount=[d]\n","|ErrStr=[S]\n",NULL}},
517
518 {SMBmove,"SMBmove",0,
519 {"TreeID2=[d]\nOFun=[w]\nFlags=[w]\n","Path=[S]\nNewPath=[S]\n",
520 "MoveCount=[d]\n","|ErrStr=[S]\n",NULL}},
521
522 {SMBopenX,"SMBopenX",FLG_CHAIN,
523 {"Com2=[w]\nOff2=[d]\nFlags=[w]\nMode=[w]\nSearchAttrib=[A]\nAttrib=[A]\nTime=[T2]OFun=[w]\nSize=[D]\nTimeOut=[D]\nRes=[W]\n","Path=[S]\n",
524 "Com2=[w]\nOff2=[d]\nHandle=[d]\nAttrib=[A]\nTime=[T2]Size=[D]\nAccess=[w]\nType=[w]\nState=[w]\nAction=[w]\nFileID=[W]\nRes=[w]\n",NULL,NULL}},
525
526 {SMBreadX,"SMBreadX",FLG_CHAIN,
527 {"Com2=[w]\nOff2=[d]\nHandle=[d]\nOffset=[D]\nMaxCount=[d]\nMinCount=[d]\nTimeOut=[D]\nCountLeft=[d]\n",NULL,
528 "Com2=[w]\nOff2=[d]\nRemaining=[d]\nRes=[W]\nDataSize=[d]\nDataOff=[d]\nRes=([w,w,w,w])\n",NULL,NULL}},
529
530 {SMBwriteX,"SMBwriteX",FLG_CHAIN,
531 {"Com2=[w]\nOff2=[d]\nHandle=[d]\nOffset=[D]\nTimeOut=[D]\nWMode=[w]\nCountLeft=[d]\nRes=[w]\nDataSize=[d]\nDataOff=[d]\n",NULL,
532 "Com2=[w]\nOff2=[d]\nCount=[d]\nRemaining=[d]\nRes=[W]\n",NULL,NULL}},
533
534 {SMBlockingX,"SMBlockingX",FLG_CHAIN,
535 {"Com2=[w]\nOff2=[d]\nHandle=[d]\nLockType=[w]\nTimeOut=[D]\nUnlockCount=[d]\nLockCount=[d]\n",
536 "*Process=[d]\nOffset=[D]\nLength=[D]\n",
537 "Com2=[w]\nOff2=[d]\n"}},
538
539 {SMBffirst,"SMBffirst",0,
540 {"Count=[d]\nAttrib=[A]\n","Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\n",
541 "Count=[d]\n","BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",NULL}},
542
543 {SMBfunique,"SMBfunique",0,
544 {"Count=[d]\nAttrib=[A]\n","Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\n",
545 "Count=[d]\n","BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",NULL}},
546
547 {SMBfclose,"SMBfclose",0,
548 {"Count=[d]\nAttrib=[A]\n","Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\n",
549 "Count=[d]\n","BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",NULL}},
550
551 {SMBfindnclose, "SMBfindnclose", 0,
552 {"Handle=[d]\n",NULL,NULL,NULL,NULL}},
553
554 {SMBfindclose, "SMBfindclose", 0,
555 {"Handle=[d]\n",NULL,NULL,NULL,NULL}},
556
557 {SMBsends,"SMBsends",0,
558 {NULL,"Source=[Z]\nDest=[Z]\n",NULL,NULL,NULL}},
559
560 {SMBsendstrt,"SMBsendstrt",0,
561 {NULL,"Source=[Z]\nDest=[Z]\n","GroupID=[d]\n",NULL,NULL}},
562
563 {SMBsendend,"SMBsendend",0,
564 {"GroupID=[d]\n",NULL,NULL,NULL,NULL}},
565
566 {SMBsendtxt,"SMBsendtxt",0,
567 {"GroupID=[d]\n",NULL,NULL,NULL,NULL}},
568
569 {SMBsendb,"SMBsendb",0,
570 {NULL,"Source=[Z]\nDest=[Z]\n",NULL,NULL,NULL}},
571
572 {SMBfwdname,"SMBfwdname",0,DEFDESCRIPT},
573 {SMBcancelf,"SMBcancelf",0,DEFDESCRIPT},
574 {SMBgetmac,"SMBgetmac",0,DEFDESCRIPT},
575
576 {SMBnegprot,"SMBnegprot",0,
577 {NULL,NULL,NULL,NULL,print_negprot}},
578
579 {SMBsesssetupX,"SMBsesssetupX",FLG_CHAIN,
580 {NULL,NULL,NULL,NULL,print_sesssetup}},
581
582 {SMBtconX,"SMBtconX",FLG_CHAIN,
583 {"Com2=[w]\nOff2=[d]\nFlags=[w]\nPassLen=[d]\nPasswd&Path&Device=\n",NULL,
584 "Com2=[w]\nOff2=[d]\n","ServiceType=[S]\n",NULL}},
585
586 {SMBtrans2, "SMBtrans2",0,{NULL,NULL,NULL,NULL,print_trans2}},
587
588 {SMBtranss2, "SMBtranss2", 0,DEFDESCRIPT},
589 {SMBctemp,"SMBctemp",0,DEFDESCRIPT},
590 {SMBreadBs,"SMBreadBs",0,DEFDESCRIPT},
591 {SMBtrans,"SMBtrans",0,{NULL,NULL,NULL,NULL,print_trans}},
592
593 {SMBnttrans,"SMBnttrans", 0, DEFDESCRIPT},
594 {SMBnttranss,"SMBnttranss", 0, DEFDESCRIPT},
595
596 {SMBntcreateX,"SMBntcreateX", FLG_CHAIN,
597 {"Com2=[w]\nOff2=[d]\nRes=[b]\nNameLen=[d]\nFlags=[W]\nRootDirectoryFid=[D]\nAccessMask=[W]\nAllocationSize=[L]\nExtFileAttributes=[W]\nShareAccess=[W]\nCreateDisposition=[W]\nCreateOptions=[W]\nImpersonationLevel=[W]\nSecurityFlags=[b]\n","Path=[S]\n",
598 "Com2=[w]\nOff2=[d]\nOplockLevel=[b]\nFid=[d]\nCreateAction=[W]\nCreateTime=[T3]LastAccessTime=[T3]LastWriteTime=[T3]ChangeTime=[T3]ExtFileAttributes=[W]\nAllocationSize=[L]\nEndOfFile=[L]\nFileType=[w]\nDeviceState=[w]\nDirectory=[b]\n", NULL}},
599
600 {SMBntcancel,"SMBntcancel", 0, DEFDESCRIPT},
601
602 {-1,NULL,0,DEFDESCRIPT}};
603
604
605 /*******************************************************************
606 print a SMB message
607 ********************************************************************/
608 void print_smb(uchar *buf,uchar *maxbuf)
609 {
610 int command;
611 uchar *words, *data;
612 struct smbfns *fn;
613 char *fmt_smbheader =
614 "[P4]SMB Command = [B]\nError class = [BP1]\nError code = [d]\nFlags1 = [B]\nFlags2 = [B][P13]\nTree ID = [d]\nProc ID = [d]\nUID = [d]\nMID = [d]\nWord Count = [b]\n";
615
616 request = (CVAL(buf,9)&0x80)?0:1;
617
618 command = CVAL(buf,4);
619
620 fn = smbfind(command,smb_fns);
621
622 printf("\nSMB PACKET: %s (%s)\n",fn->name,request?"REQUEST":"REPLY");
623
624 if (vflag == 0) return;
625
626 /* print out the header */
627 fdata(buf,fmt_smbheader,buf+33);
628
629 if (CVAL(buf,5)) {
630 int class = CVAL(buf,5);
631 int num = SVAL(buf,7);
632 printf("SMBError = %s\n",smb_errstr(class,num));
633 }
634
635 words = buf+32;
636 data = words + 1 + CVAL(words,0)*2;
637
638
639 while (words && data)
640 {
641 char *f1,*f2;
642 int wct = CVAL(words,0);
643
644 if (request) {
645 f1 = fn->descript.req_f1;
646 f2 = fn->descript.req_f2;
647 } else {
648 f1 = fn->descript.rep_f1;
649 f2 = fn->descript.rep_f2;
650 }
651
652 if (fn->descript.fn) {
653 fn->descript.fn(words,data,buf,maxbuf);
654 } else {
655 if (f1) {
656 printf("smbvwv[]=\n");
657 fdata(words+1,f1,words + 1 + wct*2);
658 } else if (wct) {
659 int i;
660 int v;
661 printf("smbvwv[]=\n");
662 for (i=0;i<wct;i++) {
663 v = SVAL(words+1,2*i);
664 printf("smb_vwv[%d]=%d (0x%X)\n",i,v,v);
665 }
666 }
667
668 if (f2) {
669 printf("smbbuf[]=\n");
670 fdata(data+2,f2,maxbuf);
671 } else {
672 int bcc = SVAL(data,0);
673 printf("smb_bcc=%d\n",bcc);
674 if (bcc>0) {
675 printf("smb_buf[]=\n");
676 print_data(data+2,MIN(bcc,PTR_DIFF(maxbuf,data+2)));
677 }
678 }
679 }
680
681 if ((fn->flags & FLG_CHAIN) && CVAL(words,0) && SVAL(words,1)!=0xFF) {
682 command = SVAL(words,1);
683 words = buf + SVAL(words,3);
684 data = words + 1 + CVAL(words,0)*2;
685
686 fn = smbfind(command,smb_fns);
687
688 printf("\nSMB PACKET: %s (%s) (CHAINED)\n",fn->name,request?"REQUEST":"REPLY");
689 } else {
690 words = data = NULL;
691 }
692 }
693
694 printf("\n");
695 }
696
697
698 /*
699 print a NBT packet received across tcp on port 139
700 */
701 void nbt_tcp_print(uchar *data,int length)
702 {
703 uchar *maxbuf = data + length;
704 int flags = CVAL(data,0);
705 int nbt_len = RSVAL(data,2);
706 startbuf = data;
707 if (maxbuf <= data) return;
708
709 printf("\n>>> NBT Packet\n");
710
711 switch (flags) {
712 case 1:
713 printf("flags=0x%x\n", flags);
714 case 0:
715 data = fdata(data,"NBT Session Packet\nFlags=[rw]\nLength=[rd]\n",data+4);
716 if (memcmp(data,"\377SMB",4)==0) {
717 if (nbt_len>PTR_DIFF(maxbuf,data))
718 printf("WARNING: Short packet. Try increasing the snap length (%d)\n",
719 PTR_DIFF(maxbuf,data));
720 print_smb(data,maxbuf>data+nbt_len?data+nbt_len:maxbuf);
721 } else {
722 printf("Session packet:(raw data?)\n");
723 }
724 break;
725
726 case 0x81:
727 data = fdata(data,"NBT Session Request\nFlags=[rW]\nDestination=[n1]\nSource=[n1]\n",maxbuf);
728 break;
729
730 case 0x82:
731 data = fdata(data,"NBT Session Granted\nFlags=[rW]\n",maxbuf);
732 break;
733
734 case 0x83:
735 {
736 int ecode = CVAL(data,4);
737 data = fdata(data,"NBT SessionReject\nFlags=[rW]\nReason=[B]\n",maxbuf);
738 switch (ecode) {
739 case 0x80:
740 printf("Not listening on called name\n");
741 break;
742 case 0x81:
743 printf("Not listening for calling name\n");
744 break;
745 case 0x82:
746 printf("Called name not present\n");
747 break;
748 case 0x83:
749 printf("Called name present, but insufficient resources\n");
750 break;
751 default:
752 printf("Unspecified error 0x%X\n",ecode);
753 break;
754 }
755 }
756 break;
757
758 case 0x85:
759 data = fdata(data,"NBT Session Keepalive\nFlags=[rW]\n",maxbuf);
760 break;
761
762 default:
763 printf("flags=0x%x\n", flags);
764 data = fdata(data,"NBT - Unknown packet type\nType=[rW]\n",maxbuf);
765 }
766 printf("\n");
767 fflush(stdout);
768 }
769
770
771 /*
772 print a NBT packet received across udp on port 137
773 */
774 void nbt_udp137_print(uchar *data,int length)
775 {
776 uchar *maxbuf = data + length;
777 int name_trn_id = RSVAL(data,0);
778 int response = (CVAL(data,2)>>7);
779 int opcode = (CVAL(data,2) >> 3) & 0xF;
780 int nm_flags = ((CVAL(data,2) & 0x7) << 4) + (CVAL(data,3)>>4);
781 int rcode = CVAL(data,3) & 0xF;
782 int qdcount = RSVAL(data,4);
783 int ancount = RSVAL(data,6);
784 int nscount = RSVAL(data,8);
785 int arcount = RSVAL(data,10);
786 char des[1024];
787 char *opcodestr="OPUNKNOWN";
788 char *p;
789
790 startbuf = data;
791
792 if (maxbuf <= data) return;
793
794 strcpy(des,"\n>>> NBT UDP PACKET(137): ");
795
796 switch (opcode) {
797 case 0: opcodestr = "QUERY"; break;
798 case 5: opcodestr = "REGISTRATION"; break;
799 case 6: opcodestr = "RELEASE"; break;
800 case 7: opcodestr = "WACK"; break;
801 case 8: opcodestr = "REFRESH(8)"; break;
802 case 9: opcodestr = "REFRESH"; break;
803 }
804 strcat(des,opcodestr);
805 if (response) {
806 if (rcode)
807 strcat(des,"; NEGATIVE");
808 else
809 strcat(des,"; POSITIVE");
810 }
811
812 if (response)
813 strcat(des,"; RESPONSE");
814 else
815 strcat(des,"; REQUEST");
816
817 if (nm_flags&1)
818 strcat(des,"; BROADCAST");
819 else
820 strcat(des,"; UNICAST");
821
822 printf("%s", des);
823
824 if (vflag == 0) return;
825
826 printf("\nTrnID=0x%X\nOpCode=%d\nNmFlags=0x%X\nRcode=%d\nQueryCount=%d\nAnswerCount=%d\nAuthorityCount=%d\nAddressRecCount=%d\n",
827 name_trn_id,opcode,nm_flags,rcode,qdcount,ancount,nscount,arcount);
828
829 p = data + 12;
830
831 {
832 int total = ancount+nscount+arcount;
833 int i;
834
835 if (qdcount>100 || total>100) {
836 printf("Corrupt packet??\n");
837 return;
838 }
839
840 if (qdcount) {
841 printf("QuestionRecords:\n");
842 for (i=0;i<qdcount;i++)
843 p = fdata(p,"|Name=[n1]\nQuestionType=[rw]\nQuestionClass=[rw]\n#",maxbuf);
844 }
845
846 if (total) {
847 printf("\nResourceRecords:\n");
848 for (i=0;i<total;i++) {
849 int rdlen;
850 int restype;
851 p = fdata(p,"Name=[n1]\n#",maxbuf);
852 restype = RSVAL(p,0);
853 p = fdata(p,"ResType=[rw]\nResClass=[rw]\nTTL=[rD]\n",p+8);
854 rdlen = RSVAL(p,0);
855 printf("ResourceLength=%d\nResourceData=\n",rdlen);
856 p += 2;
857 if (rdlen == 6) {
858 p = fdata(p,"AddrType=[rw]\nAddress=[b.b.b.b]\n",p+rdlen);
859 } else {
860 if (restype == 0x21) {
861 int numnames = CVAL(p,0);
862 p = fdata(p,"NumNames=[B]\n",p+1);
863 while (numnames--) {
864 char flags[128]="";
865 p = fdata(p,"Name=[n2]\t#",maxbuf);
866 if (p[0] & 0x80) strcat(flags,"<GROUP> ");
867 if (p[0] & 0x60 == 0) strcat(flags,"B ");
868 if (p[0] & 0x60 == 1) strcat(flags,"P ");
869 if (p[0] & 0x60 == 2) strcat(flags,"M ");
870 if (p[0] & 0x60 == 3) strcat(flags,"_ ");
871 if (p[0] & 0x10) strcat(flags,"<DEREGISTERING> ");
872 if (p[0] & 0x08) strcat(flags,"<CONFLICT> ");
873 if (p[0] & 0x04) strcat(flags,"<ACTIVE> ");
874 if (p[0] & 0x02) strcat(flags,"<PERMANENT> ");
875 printf("%s\n",flags);
876 p += 2;
877 }
878 } else {
879 print_data(p,rdlen);
880 p += rdlen;
881 }
882 }
883 }
884 }
885 }
886
887 if ((uchar*)p < maxbuf) {
888 fdata(p,"AdditionalData:\n",maxbuf);
889 }
890
891 printf("\n");
892 fflush(stdout);
893 }
894
895
896
897 /*
898 print a NBT packet received across udp on port 138
899 */
900 void nbt_udp138_print(uchar *data,int length)
901 {
902 uchar *maxbuf = data + length;
903 startbuf = data;
904 if (maxbuf <= data) return;
905
906 data = fdata(data,"\n>>> NBT UDP PACKET(138) Res=[rw] ID=[rw] IP=[b.b.b.b] Port=[rd] Length=[rd] Res2=[rw]\nSourceName=[n1]\nDestName=[n1]\n#",maxbuf);
907
908 print_smb(data,maxbuf);
909
910 printf("\n");
911 fflush(stdout);
912 }
913
914
915
916 /*
917 print netbeui frames
918 */
919 void netbeui_print(uchar *data,uchar *maxbuf)
920 {
921 int len = SVAL(data,1);
922 int command = CVAL(data,5);
923 uchar *data2 = data + 1 + len;
924
925 startbuf = data;
926
927 data = fdata(data,"\n>>> NetBeui Packet\nType=[B] Length=[d] Signature=[w] Command=[B]\n#",maxbuf);
928
929 switch (command) {
930 case 0xA:
931 data = fdata(data,"NameQuery:[P1]\nSessionNumber=[B]\nNameType=[B][P2]\nResponseCorrelator=[w]\nDestination=[n2]\nSource=[n2]\n",data2);
932 break;
933
934 case 0x8:
935 data = fdata(data,"NetbiosDataGram:[P7]\nDestination=[n2]\nSource=[n2]\n",data2);
936 break;
937
938 case 0xE:
939 data = fdata(data,"NameRecognise:\n[P1]\nData2=[w]\nTransmitCorrelator=[w]\nResponseCorelator=[w]\nDestination=[n2]\nSource=[n2]\n",data2);
940 break;
941
942 case 0x19:
943 data = fdata(data,"SessionInitialise:\nData1=[B]\nData2=[w]\nTransmitCorrelator=[w]\nResponseCorelator=[w]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n",data2);
944 break;
945
946 case 0x17:
947 data = fdata(data,"SessionConfirm:\nData1=[B]\nData2=[w]\nTransmitCorrelator=[w]\nResponseCorelator=[w]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n",data2);
948 break;
949
950 case 0x16:
951 data = fdata(data,"NetbiosDataOnlyLast:\nFlags=[{|NO_ACK|PIGGYBACK_ACK_ALLOWED|PIGGYBACK_ACK_INCLUDED|}]\nResyncIndicator=[w][P2]\nResponseCorelator=[w]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n",data2);
952 break;
953
954 case 0x14:
955 data = fdata(data,"NetbiosDataAck:\n[P3]TransmitCorrelator=[w][P2]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n",data2);
956 break;
957
958 case 0x18:
959 data = fdata(data,"SessionEnd:\n[P1]Data2=[w][P4]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n",data2);
960 break;
961
962 default:
963 data = fdata(data,"Unknown Netbios Command ",data2);
964 break;
965 }
966
967 if (memcmp(data2,"\377SMB",4)==0) {
968 print_smb(data2,maxbuf);
969 } else {
970 int i;
971 for (i=0;i<128;i++) {
972 if (memcmp(&data2[i],"\377SMB",4)==0) {
973 printf("found SMB packet at %d\n", i);
974 print_smb(&data2[i],maxbuf);
975 break;
976 }
977 }
978 }
979
980 printf("\n");
981 }
982
983
984 /*
985 print IPX-Netbios frames
986 */
987 void ipx_netbios_print(uchar *data,uchar *maxbuf)
988 {
989 /* this is a hack till I work out how to parse the rest of the IPX stuff */
990 int i;
991 startbuf = data;
992 for (i=0;i<128;i++)
993 if (memcmp(&data[i],"\377SMB",4)==0) {
994 fdata(data,"\n>>> IPX transport ",&data[i]);
995 print_smb(&data[i],maxbuf);
996 printf("\n");
997 fflush(stdout);
998 break;
999 }
1000 if (i==128)
1001 fdata(data,"\n>>> Unknown IPX ",maxbuf);
1002 }