2 * Routines for Novell Modular Authentication Service
3 * Greg Morris <gmorris@novell.com>
4 * Copyright (c) Novell, Inc. 2002-2004
8 * Ethereal - Network traffic analyzer
9 * By Gerald Combs <gerald@ethereal.com>
10 * Copyright 1998 Gerald Combs
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version 2
15 * of the License, or (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
33 #include <epan/packet.h>
34 #include <epan/prefs.h>
35 #include "packet-ncp-int.h"
36 #include "packet-ncp-nmas.h"
38 static gint ett_nmas = -1;
40 static int proto_nmas = -1;
41 static int hf_func = -1;
42 static int hf_subfunc = -1;
43 static int hf_ping_version = -1;
44 static int hf_ping_flags = -1;
45 static int hf_frag_handle = -1;
46 static int hf_length = -1;
47 static int hf_subverb = -1;
48 static int hf_tree = -1;
49 static int hf_user = -1;
50 static int hf_nmas_version = -1;
51 static int hf_msg_version = -1;
52 static int hf_session_ident = -1;
53 static int hf_msg_verb = -1;
54 static int hf_attribute = -1;
55 static int hf_clearence = -1;
56 static int hf_login_sequence = -1;
57 static int hf_opaque = -1;
58 static int hf_data = -1;
59 static int hf_return_code = -1;
60 static int hf_lsm_verb = -1;
61 static int hf_squeue_bytes = -1;
62 static int hf_cqueue_bytes = -1;
63 static int hf_num_creds = -1;
64 static int hf_cred_type = -1;
65 static int hf_login_state = -1;
66 static int hf_enc_cred = -1;
67 static int hf_enc_data = -1;
68 static int hf_reply_buffer_size = -1;
69 static int hf_encrypt_error = -1;
71 static const value_string nmas_func_enum[] = {
78 static const value_string nmas_subverb_enum[] = {
79 { 0, "Fragmented Ping" },
80 { 2, "Client Put Data" },
81 { 4, "Client Get Data" },
82 { 6, "Client Get User NDS Credentials" },
83 { 8, "Login Store Management" },
84 { 10, "Writable Object Check" },
85 { 1242, "Message Handler" },
89 static const value_string nmas_msgverb_enum[] = {
91 { 3, "Start Session" },
92 { 5, "Client Write Data" },
93 { 7, "Client Read Data" },
98 static const value_string nmas_attribute_enum[] = {
102 { 11, "Login Sequence" },
106 static const value_string nmas_lsmverb_enum[] = {
107 { 1, "Put Login Configuration" },
108 { 2, "Get Login Configuration" },
109 { 3, "Get All Configurations" },
110 { 4, "Delete Login Configuration" },
111 { 5, "Put Login Secret" },
112 { 6, "Delete Login Secret" },
113 { 7, "Set Password" },
114 { 8, "Change Password" },
115 { 9, "Delete Password" },
116 { 10, "Get Password" },
117 { 11, "Check Password Policy" },
121 static const value_string nmas_errors_enum[] = {
122 { 0xFFFFF9A1, "(-1631) FRAGMENT FAILURE" },
123 { 0xFFFFF9A0, "(-1632) BAD REQUEST SYNTAX" },
124 { 0xFFFFF99F, "(-1633) BUFFER OVERFLOW" },
125 { 0xFFFFF99E, "(-1634) SYSTEM RESOURCES" },
126 { 0xFFFFF99D, "(-1635) INSUFFICIENT MEMORY" },
127 { 0xFFFFF99C, "(-1636) NOT SUPPORTED" },
128 { 0xFFFFF99B, "(-1637) BUFFER UNDERFLOW" },
129 { 0xFFFFF99A, "(-1638) NOT FOUND" },
130 { 0xFFFFF999, "(-1639) INVALID OPERATION" },
131 { 0xFFFFF998, "(-1640) ASN1 DECODE" },
132 { 0xFFFFF997, "(-1641) ASN1 ENCODE" },
133 { 0xFFFFF996, "(-1642) LOGIN FAILED" },
134 { 0xFFFFF995, "(-1643) INVALID PARAMETER" },
135 { 0xFFFFF994, "(-1644) TIMED OUT RECOVERABLE" },
136 { 0xFFFFF993, "(-1645) TIMED OUT NOT RECOVERABLE" },
137 { 0xFFFFF992, "(-1646) TIMED OUT UNKNOWN" },
138 { 0xFFFFF991, "(-1647) AUTHORIZATION FAILURE" },
139 { 0xFFFFF990, "(-1648) INVALID DISTINGUSHED NAME" },
140 { 0xFFFFF98F, "(-1649) CANNOT RESOLVE DISTINGUISHED NAME" },
141 { 0xFFFFF98E, "(-1650) CANNOT RESOLVE CONNECTION" },
142 { 0xFFFFF98D, "(-1651) NO CRYPTOGRAPHY" },
143 { 0xFFFFF98C, "(-1652) INVALID VERSION" },
144 { 0xFFFFF98B, "(-1653) SYNC NEEDED" },
145 { 0xFFFFF98A, "(-1654) PROTOCOL STATE" },
146 { 0xFFFFF989, "(-1655) INVALID HANDLE" },
147 { 0xFFFFF988, "(-1656) INVALID METHOD" },
148 { 0xFFFFF987, "(-1657) DEVELOPMENT VERSION" },
149 { 0xFFFFF986, "(-1658) MISSING KEY" },
150 { 0xFFFFF985, "(-1659) ACCESS NOT ALLOWED" },
151 { 0xFFFFF984, "(-1660) SEQUENCE NOT FOUND" },
152 { 0xFFFFF983, "(-1661) CLEARANCE NOT FOUND" },
153 { 0xFFFFF982, "(-1662) LOGIN SERVER METHOD NOT FOUND" },
154 { 0xFFFFF981, "(-1663) LOGIN CLIENT METHOD NOT FOUND" },
155 { 0xFFFFF980, "(-1664) SERVER NOT FOUND" },
156 { 0xFFFFF97F, "(-1665) LOGIN ATTRIBUTE NOT FOUND" },
157 { 0xFFFFF97E, "(-1666) LEGACY INVALID PASSWORD" },
158 { 0xFFFFF97D, "(-1667) ACCOUNT DISABLED" },
159 { 0xFFFFF97C, "(-1668) ACCOUNT LOCKED" },
160 { 0xFFFFF97B, "(-1669) ADDRESS RESTRICTION" },
161 { 0xFFFFF97A, "(-1670) CONNECTION CLEARED" },
162 { 0xFFFFF979, "(-1671) TIME RESTRICTION" },
163 { 0xFFFFF978, "(-1672) SHORT TERM SECRET" },
164 { 0xFFFFF977, "(-1673) NO NMAS ON TREE" },
165 { 0xFFFFF976, "(-1674) NO NMAS ON SERVER" },
166 { 0xFFFFF975, "(-1675) REQUEST CHALLENGED" },
167 { 0xFFFFF974, "(-1676) LOGIN CANCELED" },
168 { 0xFFFFF973, "(-1677) LOCAL CREDENTIAL STORE" },
169 { 0xFFFFF972, "(-1678) REMOTE CREDENTIAL STORE" },
170 { 0xFFFFF971, "(-1679) SMC NICM" },
171 { 0xFFFFF970, "(-1680) SEQUENCE NOT AUTHORIZED" },
172 { 0xFFFFF96F, "(-1681) TRANSPORT" },
173 { 0xFFFFF96E, "(-1682) CRYPTO FAILED INIT" },
174 { 0xFFFFF96D, "(-1683) DOUBLEBYTE FAILED INIT" },
175 { 0xFFFFF96C, "(-1684) CODEPAGE FAILED INIT" },
176 { 0xFFFFF96B, "(-1685) UNICODE FAILED INIT" },
177 { 0xFFFFF96A, "(-1686) DLL FAILED LOADING" },
178 { 0xFFFFF969, "(-1687) EVALUATION VERSION WARNING" },
179 { 0xFFFFF968, "(-1688) CONCURRENT LOGIN" },
180 { 0xFFFFF969, "(-1689) THREAD CREATE" },
181 { 0xFFFFF96A, "(-1690) SECURE CHANNEL REQUIRED" },
182 { 0xFFFFF96B, "(-1691) NO DEFAULT USER SEQUENCE" },
183 { 0xFFFFF96C, "(-1692) NO TREENAME" },
184 { 0xFFFFF96D, "(-1693) MECHANISM NOT FOUND" },
190 align_4(tvbuff_t *tvb, int aoffset)
192 if(tvb_length_remaining(tvb, aoffset) > 4 )
201 nmas_string(tvbuff_t* tvb, int hfinfo, proto_tree *nmas_tree, int offset, gboolean little)
203 int foffset = offset;
208 guint32 length_remaining = 0;
211 str_length = tvb_get_letohl(tvb, foffset);
215 str_length = tvb_get_ntohl(tvb, foffset);
218 if(str_length > 1024)
220 proto_tree_add_string(nmas_tree, hfinfo, tvb, foffset,
221 length_remaining + 4, "<String too long to process>");
222 foffset += length_remaining;
227 proto_tree_add_string(nmas_tree, hfinfo, tvb, offset,
228 4, "<Not Specified>");
232 * XXX - other than the special-casing of null bytes,
233 * we could just use "proto_tree_add_item()", as for
234 * FT_STRING, FT_STRINGZ, and FT_UINT_STRING fields,
235 * the display representation of an item is generated
236 * using "format_text()", so it handles non-printable
239 for ( i = 0; i < str_length; i++ )
241 c_char = tvb_get_guint8(tvb, foffset );
242 if (c_char<0x20 || c_char>0x7e)
247 buffer[i] = c_char & 0xff;
257 buffer[i] = c_char & 0xff;
262 if(length_remaining==1)
271 str_length = tvb_get_letohl(tvb, offset);
275 str_length = tvb_get_ntohl(tvb, offset);
277 proto_tree_add_string(nmas_tree, hfinfo, tvb, offset+4,
279 /*foffset += align_4(tvb, foffset);*/
284 dissect_nmas_request(tvbuff_t *tvb, packet_info *pinfo, proto_tree *ncp_tree, ncp_req_hash_value *request_value)
286 guint8 func, subfunc = 0;
287 guint32 msg_length=0, cur_string_len=0;
296 func = tvb_get_guint8(tvb, foffset);
298 subfunc = tvb_get_guint8(tvb, foffset);
301 /* Fill in the INFO column. */
302 if (check_col(pinfo->cinfo, COL_INFO)) {
303 col_set_str(pinfo->cinfo, COL_PROTOCOL, "NMAS");
304 col_add_fstr(pinfo->cinfo, COL_INFO, "C NMAS - %s",
305 val_to_str(subfunc, nmas_func_enum, "Unknown (0x%02x)"));
307 aitem = proto_tree_add_text(ncp_tree, tvb, foffset, -1, "Packet Type: %s",
308 val_to_str(subfunc, nmas_func_enum, "Unknown (0x%02x)"));
309 atree = proto_item_add_subtree(aitem, ett_nmas);
312 proto_tree_add_item(atree, hf_ping_version, tvb, foffset, 4, TRUE);
314 proto_tree_add_item(atree, hf_ping_flags, tvb, foffset, 4, TRUE);
318 proto_tree_add_item(atree, hf_frag_handle, tvb, foffset, 4, TRUE);
320 foffset += 4; /* Dont know what this is */
321 proto_tree_add_item(atree, hf_length, tvb, foffset, 4, TRUE);
322 msg_length = tvb_get_letohl(tvb, foffset);
326 proto_tree_add_item(atree, hf_subverb, tvb, foffset, 4, TRUE);
327 subverb = tvb_get_letohl(tvb, foffset);
329 request_value->req_nds_flags=subverb; /* Store the NMAS fragment verb */
333 if (check_col(pinfo->cinfo, COL_INFO)) {
334 col_append_fstr(pinfo->cinfo, COL_INFO, ", %s",
335 val_to_str(subverb, nmas_subverb_enum, "Unknown subverb (%u)"));
338 case 0: /* Fragmented Ping */
339 proto_tree_add_item(atree, hf_ping_version, tvb, foffset, 4, TRUE);
341 proto_tree_add_item(atree, hf_ping_flags, tvb, foffset, 4, TRUE);
344 case 2: /* Client Put Data */
345 proto_tree_add_item(atree, hf_opaque, tvb, foffset, msg_length, FALSE);
346 foffset += msg_length;
348 case 4: /* Client Get Data */
349 case 6: /* Client Get User NDS Credentials */
352 case 8: /* Login Store Management */
353 proto_tree_add_item(atree, hf_reply_buffer_size, tvb, foffset, 1, TRUE);
355 msgverb = tvb_get_guint8(tvb, foffset);
357 request_value->nds_request_verb=msgverb; /* Use nds_request_verb for passed subverb */
359 proto_tree_add_item(atree, hf_lsm_verb, tvb, foffset, 1, TRUE);
361 if (check_col(pinfo->cinfo, COL_INFO)) {
362 col_append_fstr(pinfo->cinfo, COL_INFO, ", %s",
363 val_to_str(msgverb, nmas_lsmverb_enum, "Unknown (%u)"));
381 case 10: /* Writable Object Check */
382 /* The first GUINT32 value is the len of the header? */
384 /* The next two GUINT32 values are reserved and always 0 */
386 foffset = nmas_string(tvb, hf_tree, atree, foffset, TRUE);
387 foffset = nmas_string(tvb, hf_user, atree, foffset, TRUE);
389 case 1242: /* Message Handler */
391 proto_tree_add_item(atree, hf_msg_version, tvb, foffset, 4, FALSE);
393 proto_tree_add_item(atree, hf_session_ident, tvb, foffset, 4, FALSE);
396 msgverb = tvb_get_guint8(tvb, foffset);
398 request_value->nds_request_verb=msgverb; /* Use nds_request_verb for passed verb */
400 proto_tree_add_item(atree, hf_msg_verb, tvb, foffset, 1, FALSE);
403 if (check_col(pinfo->cinfo, COL_INFO)) {
404 col_append_fstr(pinfo->cinfo, COL_INFO, ", %s",
405 val_to_str(msgverb, nmas_msgverb_enum, "Unknown (%u)"));
410 msg_length = tvb_get_ntohl(tvb, foffset);
411 proto_tree_add_item(atree, hf_length, tvb, foffset, 4, FALSE);
413 proto_tree_add_item(atree, hf_data, tvb, foffset, msg_length, FALSE);
414 foffset += msg_length;
417 msg_length = tvb_get_ntohl(tvb, foffset);
419 proto_tree_add_item(atree, hf_length, tvb, foffset, 4, FALSE);
421 while (msg_length > 0)
423 attribute = tvb_get_ntohl(tvb, foffset);
425 cur_string_len=tvb_get_ntohl(tvb, foffset);
428 foffset = nmas_string(tvb, hf_user, atree, foffset, FALSE);
431 foffset = nmas_string(tvb, hf_tree, atree, foffset, FALSE);
434 foffset = nmas_string(tvb, hf_clearence, atree, foffset, FALSE);
437 foffset = nmas_string(tvb, hf_login_sequence, atree, foffset, FALSE);
442 msg_length -= cur_string_len;
443 if (tvb_reported_length_remaining(tvb, foffset)<5)
450 proto_tree_add_item(atree, hf_opaque, tvb, foffset, msg_length, FALSE);
451 foffset += msg_length;
474 dissect_nmas_reply(tvbuff_t *tvb, packet_info *pinfo, proto_tree *ncp_tree, guint8 func _U_, guint8 subfunc, ncp_req_hash_value *request_value)
476 guint32 foffset=0, roffset=0;
479 guint32 msg_length=0;
480 guint32 return_code=0, encrypt_error=0;
486 subverb = request_value->req_nds_flags;
487 msgverb = request_value->nds_request_verb;
489 if (check_col(pinfo->cinfo, COL_INFO)) {
490 col_set_str(pinfo->cinfo, COL_PROTOCOL, "NMAS");
492 if (tvb_reported_length_remaining(tvb, foffset)<4) {
496 aitem = proto_tree_add_text(ncp_tree, tvb, foffset, -1, "Packet Type: %s",
497 val_to_str(subfunc, nmas_func_enum, "Unknown (0x%02x)"));
498 atree = proto_item_add_subtree(aitem, ett_nmas);
501 proto_tree_add_item(atree, hf_ping_flags, tvb, foffset, 4, TRUE);
503 proto_tree_add_item(atree, hf_nmas_version, tvb, foffset, 4, TRUE);
507 proto_tree_add_item(atree, hf_length, tvb, foffset, 4, TRUE);
508 msg_length = tvb_get_letohl(tvb, foffset);
510 proto_tree_add_item(atree, hf_frag_handle, tvb, foffset, 4, TRUE);
512 return_code = tvb_get_letohl(tvb, foffset);
516 proto_tree_add_text(atree, tvb, foffset, -1, "Verb: %s",
517 val_to_str(subverb, nmas_subverb_enum, "Unknown (%u)"));
518 if (return_code == 0)
521 case 0: /* Fragmented Ping */
522 proto_tree_add_item(atree, hf_ping_flags, tvb, foffset, 4, TRUE);
524 proto_tree_add_item(atree, hf_nmas_version, tvb, foffset, 4, TRUE);
527 case 2: /* Client Put Data */
528 proto_tree_add_item(atree, hf_squeue_bytes, tvb, foffset, 4, TRUE);
530 proto_tree_add_item(atree, hf_cqueue_bytes, tvb, foffset, 4, TRUE);
533 case 4: /* Client Get Data */
534 proto_tree_add_item(atree, hf_opaque, tvb, foffset, msg_length, TRUE);
535 foffset += msg_length;
537 case 6: /* Client Get User NDS Credentials */
538 proto_tree_add_item(atree, hf_num_creds, tvb, foffset, 4, TRUE);
540 proto_tree_add_item(atree, hf_cred_type, tvb, foffset, 4, TRUE);
542 proto_tree_add_item(atree, hf_login_state, tvb, foffset, 4, TRUE);
545 proto_tree_add_item(atree, hf_enc_cred, tvb, foffset, msg_length, TRUE);
546 foffset += msg_length;
548 case 8: /* Login Store Management */
549 proto_tree_add_text(atree, tvb, foffset, -1, "Subverb: %s",
550 val_to_str(msgverb, nmas_lsmverb_enum, "Unknown (%u)"));
553 /* The data within these structures is all encrypted. */
559 proto_tree_add_item(atree, hf_enc_data, tvb, foffset, msg_length, TRUE);
560 foffset += msg_length;
566 case 10: /* Writable Object Check */
567 proto_tree_add_item(atree, hf_nmas_version, tvb, foffset, 4, TRUE);
570 case 1242: /* Message Handler */
571 proto_tree_add_text(atree, tvb, foffset, -1, "Subverb: %s",
572 val_to_str(msgverb, nmas_msgverb_enum, "Unknown (%u)"));
576 msg_length = tvb_get_ntohl(tvb, foffset);
577 proto_tree_add_item(atree, hf_length, tvb, foffset, 4, FALSE);
579 proto_tree_add_item(atree, hf_data, tvb, foffset, msg_length, FALSE);
580 foffset += msg_length;
583 proto_tree_add_item(atree, hf_session_ident, tvb, foffset, 4, FALSE);
590 encrypt_error = tvb_get_ntohl(tvb, foffset);
591 if (match_strval(encrypt_error, nmas_errors_enum)!=NULL)
593 if (check_col(pinfo->cinfo, COL_INFO)) {
594 col_add_fstr(pinfo->cinfo, COL_INFO, "R Payload Error - %s", match_strval(encrypt_error, nmas_errors_enum));
596 proto_tree_add_item(atree, hf_encrypt_error, tvb, foffset, 4, FALSE);
600 proto_tree_add_item(atree, hf_opaque, tvb, foffset, msg_length, FALSE);
602 foffset += msg_length;
615 if (match_strval(return_code, nmas_errors_enum)!=NULL)
617 proto_tree_add_item(atree, hf_return_code, tvb, roffset, 4, TRUE);
618 if (check_col(pinfo->cinfo, COL_INFO)) {
619 col_add_fstr(pinfo->cinfo, COL_INFO, "R Error - %s", match_strval(return_code, nmas_errors_enum));
626 proto_tree_add_item(atree, hf_return_code, tvb, roffset, 4, TRUE);
627 if (check_col(pinfo->cinfo, COL_INFO)) {
628 col_add_fstr(pinfo->cinfo, COL_INFO, "R Unknown NMAS Error - 0x%08x", return_code);
632 /*if (return_code == 0 && msgverb!=7) {*/
634 if (return_code == 0) {
635 proto_tree_add_text(atree, tvb, roffset, 4, "Return Code: Success (0x00000000)");
646 proto_register_nmas(void)
648 static hf_register_info hf_nmas[] = {
650 { "Function", "nmas.func", FT_UINT8, BASE_HEX, NULL, 0x0,
651 "Function", HFILL }},
654 { "Subfunction", "nmas.subfunc", FT_UINT8, BASE_HEX, NULL, 0x0,
655 "Subfunction", HFILL }},
658 { "Ping Version", "nmas.ping_version", FT_UINT32, BASE_HEX, NULL, 0x0,
659 "Ping Version", HFILL }},
662 { "Flags", "nmas.ping_flags", FT_UINT32, BASE_HEX, NULL, 0x0,
666 { "Fragment Handle", "nmas.frag_handle", FT_UINT32, BASE_HEX, NULL, 0x0,
667 "Fragment Handle", HFILL }},
670 { "Length", "nmas.length", FT_UINT32, BASE_DEC, NULL, 0x0,
674 { "Sub Verb", "nmas.subverb",
675 FT_UINT32, BASE_HEX, VALS(nmas_subverb_enum), 0x0,
676 "Sub Verb", HFILL }},
679 { "Tree", "nmas.tree",
680 FT_STRING, BASE_NONE, NULL, 0x0,
684 { "User", "nmas.user",
685 FT_STRING, BASE_NONE, NULL, 0x0,
689 { "NMAS Protocol Version", "nmas.version", FT_UINT32, BASE_HEX, NULL, 0x0,
690 "NMAS Protocol Version", HFILL }},
693 { "Message Version", "nmas.msg_version", FT_UINT32, BASE_HEX, NULL, 0x0,
694 "Message Version", HFILL }},
697 { "Session Identifier", "nmas.session_ident", FT_UINT32, BASE_HEX, NULL, 0x0,
698 "Session Identifier", HFILL }},
701 { "Message Verb", "nmas.msg_verb", FT_UINT8, BASE_HEX, VALS(nmas_msgverb_enum), 0x0,
702 "Message Verb", HFILL }},
705 { "Attribute Type", "nmas.attribute", FT_UINT32, BASE_DEC, VALS(nmas_attribute_enum), 0x0,
706 "Attribute Type", HFILL }},
709 { "Requested Clearence", "nmas.clearence",
710 FT_STRING, BASE_NONE, NULL, 0x0,
711 "Requested Clearence", HFILL }},
713 { &hf_login_sequence,
714 { "Requested Login Sequence", "nmas.login_seq",
715 FT_STRING, BASE_NONE, NULL, 0x0,
716 "Requested Login Sequence", HFILL }},
719 { "Opaque Data", "nmas.opaque",
720 FT_BYTES, BASE_NONE, NULL, 0x0,
721 "Opaque Data", HFILL }},
724 { "Data", "nmas.data",
725 FT_BYTES, BASE_NONE, NULL, 0x0,
729 { "Return Code", "nmas.return_code", FT_UINT32, BASE_HEX, VALS(nmas_errors_enum), 0x0,
730 "Return Code", HFILL }},
733 { "Login Store Message Verb", "nmas.lsm_verb", FT_UINT8, BASE_HEX, VALS(nmas_lsmverb_enum), 0x0,
734 "Login Store Message Verb", HFILL }},
737 { "Server Queue Number of Bytes", "nmas.squeue_bytes", FT_UINT32, BASE_DEC, NULL, 0x0,
738 "Server Queue Number of Bytes", HFILL }},
741 { "Client Queue Number of Bytes", "nmas.cqueue_bytes", FT_UINT32, BASE_DEC, NULL, 0x0,
742 "Client Queue Number of Bytes", HFILL }},
745 { "Number of Credentials", "nmas.num_creds", FT_UINT32, BASE_DEC, NULL, 0x0,
746 "Number of Credentials", HFILL }},
749 { "Credential Type", "nmas.cred_type", FT_UINT32, BASE_DEC, NULL, 0x0,
750 "Credential Type", HFILL }},
753 { "Login State", "nmas.login_state", FT_UINT32, BASE_DEC, NULL, 0x0,
754 "Login State", HFILL }},
757 { "Encrypted Credential", "nmas.enc_cred",
758 FT_BYTES, BASE_NONE, NULL, 0x0,
759 "Encrypted Credential", HFILL }},
762 { "Encrypted Data", "nmas.enc_data",
763 FT_BYTES, BASE_NONE, NULL, 0x0,
764 "Encrypted Data", HFILL }},
766 { &hf_reply_buffer_size,
767 { "Reply Buffer Size", "nmas.buf_size", FT_UINT32, BASE_DEC, NULL, 0x0,
768 "Reply Buffer Size", HFILL }},
771 { "Payload Error", "nmas.encrypt_error", FT_UINT32, BASE_HEX, VALS(nmas_errors_enum), 0x0,
772 "Payload/Encryption Return Code", HFILL }},
776 static gint *ett[] = {
780 proto_nmas = proto_register_protocol("Novell Modular Authentication Service", "NMAS", "nmas");
781 proto_register_field_array(proto_nmas, hf_nmas, array_length(hf_nmas));
782 proto_register_subtree_array(ett, array_length(ett));