1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-16 20:59:02 +00:00

code re-factoring and cleanup

This commit is contained in:
patrik
2012-10-10 22:19:49 +00:00
parent e2fb7301de
commit 89dab3fe14

View File

@@ -25,8 +25,7 @@
-- contain a function to parse the servers response. -- contain a function to parse the servers response.
-- --
-- o Comm -- o Comm
-- - Implements a number of functions to handle communication over the -- - Implements a number of functions to handle communication
-- the TNSSocket class.
-- --
-- o Crypt -- o Crypt
-- - Implements encryption algorithms and functions to support -- - Implements encryption algorithms and functions to support
@@ -35,10 +34,6 @@
-- o Helper -- o Helper
-- - A helper class that provides easy access to the rest of the library -- - A helper class that provides easy access to the rest of the library
-- --
-- o TNSSocket
-- - This is a copy of the DB2Socket class which provides fundamental
-- buffering
--
-- --
-- Example -- Example
-- ------- -- -------
@@ -117,6 +112,7 @@
local bin = require "bin" local bin = require "bin"
local bit = require "bit" local bit = require "bit"
local math = require "math" local math = require "math"
local match = require "match"
local nmap = require "nmap" local nmap = require "nmap"
local stdnse = require "stdnse" local stdnse = require "stdnse"
local string = require "string" local string = require "string"
@@ -141,17 +137,15 @@ AuthOptions =
-- Creates a new AuthOptions instance -- Creates a new AuthOptions instance
-- @return o new instance of AuthOptions -- @return o new instance of AuthOptions
new = function( self ) new = function( self )
local o = {} local o = {
setmetatable(o, self) auth_term = "pts/" .. math.random(255),
self.__index = self auth_prog = ("sqlplus@nmap_%d (TNS V1-V3)"):format(math.random(32768)),
auth_machine = "nmap_target",
o.auth_user = nil auth_pid = "" .. math.random(32768),
o.auth_term = "pts/" .. math.random(255) auth_sid = "nmap_" .. math.random(32768)
o.auth_prog = ("sqlplus@nmap_%d (TNS V1-V3)"):format(math.random(32768)) }
o.auth_machine = "nmap_target" setmetatable(o, self)
o.auth_pid = "" .. math.random(32768) self.__index = self
o.auth_sid = "nmap_" .. math.random(32768)
return o return o
end, end,
@@ -188,10 +182,7 @@ DataTypeDecoders = {
bytes = convert_bytes(bytes, positive) bytes = convert_bytes(bytes, positive)
local k = ( #bytes - 1 > bytes[1] +1 ) and local k = ( #bytes - 1 > bytes[1] +1 ) and ( bytes[1] + 1 ) or #bytes - 1
( bytes[1] + 1 ) or
#bytes - 1
local l = 0 local l = 0
for m=1, k do l = l * 100 + bytes[m+1] end for m=1, k do l = l * 100 + bytes[m+1] end
for m=bytes[1]-#bytes - 1, 0, -1 do l = l * 100 end for m=bytes[1]-#bytes - 1, 0, -1 do l = l * 100 end
@@ -250,11 +241,12 @@ Packet.TNS = {
MARKER = 12, MARKER = 12,
}, },
new = function( self, sock ) new = function( self, typ )
local o = {} local o = {
setmetatable(o, self) type = typ
self.__index = self }
o.socket = sock setmetatable(o, self)
self.__index = self
return o return o
end, end,
@@ -263,23 +255,23 @@ Packet.TNS = {
-- @return true on success, false on failure -- @return true on success, false on failure
-- @return err string containing error message on failure -- @return err string containing error message on failure
recv = function( self ) recv = function( self )
local _ local status, data = self.socket:receive_buf( match.numbytes(2), true )
local status, data = self.socket:recv( 2 )
if ( not(status) ) then if ( not(status) ) then
return status, data return status, data
end end
local _
_, self.length = bin.unpack(">S", data ) _, self.length = bin.unpack(">S", data )
status, data = self.socket:recv( 6 ) -- self.length - 2 ) status, data = self.socket:receive_buf( match.numbytes(6), true )
if ( not(status) ) then if ( not(status) ) then
return status, data return status, data
end end
_, self.checksum, self.type, self.reserved, self.hdr_checksum = bin.unpack(">SCCS", data) _, self.checksum, self.type, self.reserved, self.hdr_checksum = bin.unpack(">SCCS", data)
status, data = self.socket:recv( self.length - 8) status, data = self.socket:receive_buf( match.numbytes(self.length - 8), true )
if ( status ) then if ( status ) then
self.data = data self.data = data
end end
@@ -287,12 +279,19 @@ Packet.TNS = {
return true return true
end, end,
parse = function(data)
local tns = Packet.TNS:new()
local pos
pos, tns.length, tns.checksum, tns.type, tns.reserved, tns.hdr_checksum = bin.unpack(">SSCCS", data)
pos, tns.data = bin.unpack("A" .. ( tns.length - 8 ), data, pos)
return tns
end,
--- Converts the TNS packet to string suitable to be sent over the socket --- Converts the TNS packet to string suitable to be sent over the socket
-- --
-- @return string containing the TNS packet -- @return string containing the TNS packet
__tostring = function( self ) __tostring = function( self )
local data = bin.pack(">SSCCSA", self.length, self.checksum, self.type, local data = bin.pack(">SSCCSA", self.length, self.checksum, self.type, self.reserved, self.hdr_checksum, self.data )
self.reserved, self.hdr_checksum, self.data )
return data return data
end, end,
@@ -336,8 +335,8 @@ Packet.Connect = {
conn_data = Packet.Connect.CONN_STR:format( rhost, rport, dbinstance, rhost ), conn_data = Packet.Connect.CONN_STR:format( rhost, rport, dbinstance, rhost ),
dbinstance = dbinstance:upper() dbinstance = dbinstance:upper()
} }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -376,11 +375,11 @@ Packet.Connect = {
self.conn_data_len = #self.conn_data self.conn_data_len = #self.conn_data
return bin.pack(">SSSSSSSSSSICCIILLA", self.version, self.version_comp, self.svc_options, return bin.pack(">SSSSSSSSSSICCIILLA", self.version, self.version_comp, self.svc_options,
self.sess_dus, self.max_trans_dus, self.nt_proto_char, self.sess_dus, self.max_trans_dus, self.nt_proto_char,
self.line_turnaround, self.value_of_1_in_hw, self.conn_data_len, self.line_turnaround, self.value_of_1_in_hw, self.conn_data_len,
self.conn_data_offset, self.conn_data_max_recv, self.conn_data_flags_0, self.conn_data_offset, self.conn_data_max_recv, self.conn_data_flags_0,
self.conn_data_flags_1, self.trace_cross_1, self.trace_cross_2, self.conn_data_flags_1, self.trace_cross_1, self.trace_cross_2,
self.trace_unique_conn, 0, self.conn_data ) self.trace_unique_conn, 0, self.conn_data )
end, end,
@@ -393,14 +392,13 @@ Packet.Data = {
-- Createas a new Data instance -- Createas a new Data instance
-- @return o new instance of Data -- @return o new instance of Data
new = function( self, sock, data ) new = function( self, data )
local o = {} local o = {
setmetatable(o, self) TNS = Packet.TNS:new( Packet.TNS.Type.DATA ),
self.__index = self data = data
o.TNS = Packet.TNS:new( sock ) }
o.TNS.type = Packet.TNS.Type.DATA setmetatable(o, self)
o.socket = sock self.__index = self
o.data = data
return o return o
end, end,
@@ -425,8 +423,8 @@ Packet.Attention = {
-- @return o new instance of Attention -- @return o new instance of Attention
new = function( self, typ, data ) new = function( self, typ, data )
local o = { data = data, att_type = typ } local o = { data = data, att_type = typ }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -444,7 +442,6 @@ Packet.PreAuth = {
tns_type = Packet.TNS.Type.DATA, tns_type = Packet.TNS.Type.DATA,
flags = 0, flags = 0,
param_order = { param_order = {
{ ["AUTH_TERMINAL"] = "auth_term" }, { ["AUTH_TERMINAL"] = "auth_term" },
{ ["AUTH_PROGRAM_NM"] = "auth_prog" }, { ["AUTH_PROGRAM_NM"] = "auth_prog" },
@@ -453,15 +450,14 @@ Packet.PreAuth = {
{ ["AUTH_SID"] = "auth_sid" } { ["AUTH_SID"] = "auth_sid" }
}, },
--- Creates a new PreAuth packet --- Creates a new PreAuth packet
-- --
-- @param user string containing the user name -- @param user string containing the user name
-- @return a new instance of Packet.PreAuth -- @return a new instance of Packet.PreAuth
new = function(self, user, options, ver) new = function(self, user, options, ver)
local o = { auth_user = user, auth_options = options, version = ver } local o = { auth_user = user, auth_options = options, version = ver }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -495,15 +491,12 @@ Packet.PreAuth = {
-- @param tns Packet.TNS containing the TNS packet recieved from the server -- @param tns Packet.TNS containing the TNS packet recieved from the server
-- @return table containing the keys and values returned by the server -- @return table containing the keys and values returned by the server
parseResponse = function( self, tns ) parseResponse = function( self, tns )
local kvp_count, key, val, kvp_flags
local kvps = {} local kvps = {}
local pos, kvp_count = bin.unpack( "C", tns.data, 4 )
local pos = 4
pos, kvp_count = bin.unpack( "C", tns.data, pos )
pos = 6 pos = 6
for kvp_itr=1, kvp_count do for kvp_itr=1, kvp_count do
local key, val, kvp_flags
pos, key, val, kvp_flags = Marshaller.unmarshalKvp( tns.data, pos ) pos, key, val, kvp_flags = Marshaller.unmarshalKvp( tns.data, pos )
-- we don't actually do anything with the flags currently, but they're there -- we don't actually do anything with the flags currently, but they're there
kvps[key] = val kvps[key] = val
@@ -519,8 +512,6 @@ Packet.Auth = {
tns_type = Packet.TNS.Type.DATA, tns_type = Packet.TNS.Type.DATA,
flags = 0, flags = 0,
param_order = { param_order = {
{ ['key'] = "AUTH_RTT", ['def'] = "25456" }, { ['key'] = "AUTH_RTT", ['def'] = "25456" },
{ ['key'] = "AUTH_CLNT_MEM", ['def'] = "4096" }, { ['key'] = "AUTH_CLNT_MEM", ['def'] = "4096" },
@@ -548,8 +539,8 @@ Packet.Auth = {
user = user, user = user,
version = ver version = ver
} }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -588,14 +579,12 @@ Packet.Auth = {
-- @param tns Packet.TNS containing the TNS packet recieved from the server -- @param tns Packet.TNS containing the TNS packet recieved from the server
-- @return table containing the key pair values from the Auth packet -- @return table containing the key pair values from the Auth packet
parseResponse = function( self, tns ) parseResponse = function( self, tns )
local kvp_count, key, val, kvp_flags
local kvps = {} local kvps = {}
local pos, kvp_count = bin.unpack( "C", tns.data, 4 )
local pos = 4
pos, kvp_count = bin.unpack( "C", tns.data, pos )
pos = 6 pos = 6
for kvp_itr=1, kvp_count do for kvp_itr=1, kvp_count do
local key, val, kvp_flags
pos, key, val, kvp_flags = Marshaller.unmarshalKvp( tns.data, pos ) pos, key, val, kvp_flags = Marshaller.unmarshalKvp( tns.data, pos )
-- we don't actually do anything with the flags currently, but they're there -- we don't actually do anything with the flags currently, but they're there
kvps[key] = val kvps[key] = val
@@ -616,8 +605,8 @@ Packet.SNS = {
-- @return o new instance of the SNS packet -- @return o new instance of the SNS packet
new = function(self) new = function(self)
local o = {} local o = {}
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -645,8 +634,8 @@ Packet.ProtoNeg = {
new = function(self) new = function(self)
local o = {} local o = {}
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -662,9 +651,7 @@ Packet.ProtoNeg = {
-- --
-- @param tns Packet.TNS containing the response from the server -- @param tns Packet.TNS containing the response from the server
parseResponse = function( self, tns ) parseResponse = function( self, tns )
local flags, neg, ver, srv, pos, _ local pos, flags, neg, ver, _, srv = bin.unpack(">SCCCz", tns.data)
pos, flags, neg, ver, _, srv = bin.unpack(">SCCCz", tns.data)
if ( neg ~= 1 ) then if ( neg ~= 1 ) then
return false, "Error protocol negotiation failed" return false, "Error protocol negotiation failed"
end end
@@ -672,7 +659,6 @@ Packet.ProtoNeg = {
if ( ver ~= 6 ) then if ( ver ~= 6 ) then
return false, ("Error protocol version (%d) not supported"):format(ver) return false, ("Error protocol version (%d) not supported"):format(ver)
end end
return true, srv return true, srv
end end
@@ -689,8 +675,8 @@ Packet.Unknown1 = {
-- @return new instance of Packet.Unknown1 -- @return new instance of Packet.Unknown1
new = function(self, os) new = function(self, os)
local o = { os = os } local o = { os = os }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -835,7 +821,7 @@ Packet.Unknown1 = {
]]) ]])
else else
return bin.pack(">SH", self.flags, "02b200b2004225060101010d010105010101010101017fff0309030301007f011" .. return bin.pack(">SH", self.flags, "02b200b2004225060101010d010105010101010101017fff0309030301007f011" ..
"fff010301013f01010500010702010000180001800000003c3c3c80000000d007") "fff010301013f01010500010702010000180001800000003c3c3c80000000d007")
end end
end, end,
@@ -850,8 +836,8 @@ Packet.Unknown2 = {
new = function(self, os) new = function(self, os)
local o = { os = os } local o = { os = os }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -907,8 +893,8 @@ Packet.EOF = {
new = function(self) new = function(self)
local o = {} local o = {}
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -931,8 +917,8 @@ Packet.PostLogin = {
-- @return o a new instance of PostLogin -- @return o a new instance of PostLogin
new = function(self, sessid) new = function(self, sessid)
local o = { sessid = sessid } local o = { sessid = sessid }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -960,8 +946,8 @@ Packet.Query = {
-- @return instance of Query -- @return instance of Query
new = function(self, query) new = function(self, query)
local o = { query = query, counter = 0 } local o = { query = query, counter = 0 }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -1067,8 +1053,8 @@ Packet.QueryResponseAck = {
-- @return instance new instance of QueryResponseAck -- @return instance new instance of QueryResponseAck
new = function(self, result) new = function(self, result)
local o = { result = result } local o = { result = result }
setmetatable(o, self) setmetatable(o, self)
self.__index = self self.__index = self
return o return o
end, end,
@@ -1189,14 +1175,9 @@ Marshaller = {
-- @param flags The flags -- @param flags The flags
-- @return A binary packed string representing the KVP structure -- @return A binary packed string representing the KVP structure
marshalKvp = function( key, value, flags ) marshalKvp = function( key, value, flags )
flags = flags or 0 return Marshaller.marshalKvpComponent( key ) ..
Marshaller.marshalKvpComponent( value ) ..
local result = "" bin.pack( "<I", ( flags or 0 ) )
result = result .. Marshaller.marshalKvpComponent( key )
result = result .. Marshaller.marshalKvpComponent( value )
result = result .. bin.pack( "<I", flags )
return result
end, end,
--- Parses a TNS key-value pair data structure. --- Parses a TNS key-value pair data structure.
@@ -1250,7 +1231,6 @@ Marshaller = {
local write_value = value:sub( 1, write_length ) local write_value = value:sub( 1, write_length )
-- ...and remove that piece from the remaining string -- ...and remove that piece from the remaining string
value = value:sub( write_length + 1 ) value = value:sub( write_length + 1 )
result = result .. bin.pack( "p", write_value ) result = result .. bin.pack( "p", write_value )
end end
@@ -1311,10 +1291,11 @@ Comm = {
-- @return new instance of Comm -- @return new instance of Comm
new = function(self, socket) new = function(self, socket)
local o = { local o = {
tnssocket = socket, socket = socket,
data_counter = 06 } data_counter = 06
setmetatable(o, self) }
self.__index = self setmetatable(o, self)
self.__index = self
return o return o
end, end,
@@ -1324,8 +1305,7 @@ Comm = {
-- @return Status (true or false). -- @return Status (true or false).
-- @return Error code (if status is false). -- @return Error code (if status is false).
sendTNSPacket = function( self, pkt ) sendTNSPacket = function( self, pkt )
local tns = Packet.TNS:new( self.tnssocket ) local tns = Packet.TNS:new( pkt.tns_type )
tns.type = pkt.tns_type
if ( pkt.setCounter ) then if ( pkt.setCounter ) then
pkt:setCounter(self.data_counter) pkt:setCounter(self.data_counter)
self.data_counter = self.data_counter + 1 self.data_counter = self.data_counter + 1
@@ -1336,7 +1316,7 @@ Comm = {
-- buffer incase of RESEND -- buffer incase of RESEND
self.pkt = pkt self.pkt = pkt
return self.tnssocket:send( tostring(tns) ) return self.socket:send( tostring(tns) )
end, end,
--- Handles communication when a MARKER packet is recieved and retrieves --- Handles communication when a MARKER packet is recieved and retrieves
@@ -1346,7 +1326,6 @@ Comm = {
-- @return msg containing the error message -- @return msg containing the error message
handleMarker = function( self ) handleMarker = function( self )
local status, tns = self:recvTNSPacket() local status, tns = self:recvTNSPacket()
local pos, msg, b1
if ( not(status) or tns.type ~= Packet.TNS.Type.MARKER ) then if ( not(status) or tns.type ~= Packet.TNS.Type.MARKER ) then
return false, "ERROR: failed to handle marker sent by server" return false, "ERROR: failed to handle marker sent by server"
@@ -1365,15 +1344,11 @@ Comm = {
-- check if byte 12 is set or not, this should help us distinguish the offset -- check if byte 12 is set or not, this should help us distinguish the offset
-- to the error message in Oracle 10g and 11g -- to the error message in Oracle 10g and 11g
pos, b1 = bin.unpack("C", tns.data, 10) local pos, b1 = bin.unpack("C", tns.data, 10)
pos = (b1 == 1) and 99 or 69
if( b1 == 1 ) then
pos = 99
else
pos = 69
end
-- fetch the oracle error and return it -- fetch the oracle error and return it
local msg
pos, msg = bin.unpack("p", tns.data, pos ) pos, msg = bin.unpack("p", tns.data, pos )
return false, msg return false, msg
@@ -1384,11 +1359,25 @@ Comm = {
-- @return status true on success, false on failure -- @return status true on success, false on failure
-- @return tns Packet.TNS containing the recieved packet or err on failure -- @return tns Packet.TNS containing the recieved packet or err on failure
recvTNSPacket = function( self ) recvTNSPacket = function( self )
local tns = Packet.TNS:new( self.tnssocket ) local tns
local retries = 5 local retries = 5
repeat repeat
local status = tns:recv() local function recv()
local status, header = self.socket:receive_buf( match.numbytes(8), true )
if ( not(status) ) then return status, header end
local _, length = bin.unpack(">S", header )
local status, data = self.socket:receive_buf( match.numbytes(length - 8), true )
if ( not(status) ) then
return false, data
else
return status, Packet.TNS.parse(header .. data)
end
end
local status
status, tns = recv()
if ( not(status) ) then if ( not(status) ) then
if ( retries == 0 ) then if ( retries == 0 ) then
return false, "ERROR: recvTNSPacket failed to receive TNS headers" return false, "ERROR: recvTNSPacket failed to receive TNS headers"
@@ -1465,7 +1454,6 @@ Crypt = {
HashPassword10g = function( self, username, password ) HashPassword10g = function( self, username, password )
local uspw = ( username .. password ):gsub("(%w)", "\0%1") local uspw = ( username .. password ):gsub("(%w)", "\0%1")
local key = bin.pack("H", "0123456789abcdef") local key = bin.pack("H", "0123456789abcdef")
local enc, iv2, hash
-- do padding -- do padding
if ( #uspw % 8 > 0 ) then if ( #uspw % 8 > 0 ) then
@@ -1474,8 +1462,8 @@ Crypt = {
end end
end end
iv2 = openssl.encrypt( "DES-CBC", key, nil, uspw, false ):sub(-8) local iv2 = openssl.encrypt( "DES-CBC", key, nil, uspw, false ):sub(-8)
enc = openssl.encrypt( "DES-CBC", iv2, nil, uspw, false ):sub(-8) local enc = openssl.encrypt( "DES-CBC", iv2, nil, uspw, false ):sub(-8)
return enc return enc
end, end,
@@ -1492,7 +1480,7 @@ Crypt = {
for i=17, 32 do for i=17, 32 do
combined_sesskey = combined_sesskey .. string.char( bit.bxor( string.byte(srv_sesskey, i), string.byte(cli_sesskey, i) ) ) combined_sesskey = combined_sesskey .. string.char( bit.bxor( string.byte(srv_sesskey, i), string.byte(cli_sesskey, i) ) )
end end
combined_sesskey= openssl.md5( combined_sesskey ) combined_sesskey = openssl.md5( combined_sesskey )
pass = openssl.decrypt( "AES-128-CBC", combined_sesskey, nil, auth_pass ):sub(17) pass = openssl.decrypt( "AES-128-CBC", combined_sesskey, nil, auth_pass ):sub(17)
@@ -1526,10 +1514,8 @@ Crypt = {
for i=17, 32 do for i=17, 32 do
combined_sesskey = combined_sesskey .. string.char( bit.bxor( string.byte(srv_sesskey, i), string.byte(cli_sesskey, i) ) ) combined_sesskey = combined_sesskey .. string.char( bit.bxor( string.byte(srv_sesskey, i), string.byte(cli_sesskey, i) ) )
end end
combined_sesskey= openssl.md5( combined_sesskey ) combined_sesskey = openssl.md5( combined_sesskey )
auth_pass = openssl.encrypt("AES-128-CBC", combined_sesskey, nil, rnd .. pass, true ) auth_pass = openssl.encrypt("AES-128-CBC", combined_sesskey, nil, rnd .. pass, true )
auth_pass = select(2, bin.unpack("H" .. #auth_pass, auth_pass)) auth_pass = select(2, bin.unpack("H" .. #auth_pass, auth_pass))
cli_sesskey_enc = select(2, bin.unpack("H" .. #cli_sesskey_enc, cli_sesskey_enc)) cli_sesskey_enc = select(2, bin.unpack("H" .. #cli_sesskey_enc, cli_sesskey_enc))
return cli_sesskey_enc, auth_pass return cli_sesskey_enc, auth_pass
@@ -1584,14 +1570,12 @@ Helper = {
local o = { local o = {
host = host, host = host,
port = port, port = port,
tnssocket = TNSSocket:new(), socket = nmap.new_socket(),
-- fallback to the common ORCL instance if none was supplied dbinstance = instance or stdnse.get_script_args('tns.sid') or "orcl"
dbinstance = instance or
stdnse.get_script_args('tns.sid') or
"orcl"
} }
setmetatable(o, self) o.socket:set_timeout(30000)
self.__index = self setmetatable(o, self)
self.__index = self
return o return o
end, end,
@@ -1606,12 +1590,12 @@ Helper = {
"Linuxi386/Linux-2.0.34-8.1.0", "Linuxi386/Linux-2.0.34-8.1.0",
"x86_64/Linux 2.4.xx" "x86_64/Linux 2.4.xx"
} }
local status, data = self.tnssocket:connect( self.host.ip, self.port.number, "tcp" ) local status, data = self.socket:connect( self.host.ip, self.port.number, "tcp" )
local conn, packet, tns local conn, packet, tns
if( not(status) ) then return status, data end if( not(status) ) then return status, data end
self.comm = Comm:new( self.tnssocket ) self.comm = Comm:new( self.socket )
status, self.version = self.comm:exchTNSPacket( Packet.Connect:new( self.host.ip, self.port.number, self.dbinstance ) ) status, self.version = self.comm:exchTNSPacket( Packet.Connect:new( self.host.ip, self.port.number, self.dbinstance ) )
if ( not(status) ) then return false, self.version end if ( not(status) ) then return false, self.version end
@@ -1693,15 +1677,14 @@ Helper = {
-- @param cmd string containing the command to send to the server -- @param cmd string containing the command to send to the server
-- @return data string containing the result recieved from the server -- @return data string containing the result recieved from the server
lsnrCtl = function( self, cmd ) lsnrCtl = function( self, cmd )
local status, data = self.tnssocket:connect( self.host.ip, self.port.number, "tcp" ) local status, data = self.socket:connect( self.host.ip, self.port.number, "tcp" )
local conn, packet, tns, pkt local conn, packet, tns, pkt
if( not(status) ) then if( not(status) ) then
return status, data return status, data
end end
self.comm = Comm:new( self.tnssocket ) self.comm = Comm:new( self.socket )
pkt = Packet.Connect:new( self.host.ip, self.port.number, self.dbinstance ) pkt = Packet.Connect:new( self.host.ip, self.port.number, self.dbinstance )
pkt:setCmd(cmd) pkt:setCmd(cmd)
@@ -1768,8 +1751,7 @@ Helper = {
status, auth = self.comm:exchTNSPacket( Packet.PreAuth:new( user, auth_options, self.os ) ) status, auth = self.comm:exchTNSPacket( Packet.PreAuth:new( user, auth_options, self.os ) )
if ( not(status) ) then if ( not(status) ) then
return false, auth return false, auth
end elseif ( auth["AUTH_SESSKEY"] ) then
if ( auth["AUTH_SESSKEY"] ) then
return true, auth return true, auth
else else
return false return false
@@ -1828,80 +1810,9 @@ Helper = {
Close = function( self ) Close = function( self )
-- We should probably stick some slick sqlplus termination stuff in here -- We should probably stick some slick sqlplus termination stuff in here
local status = self.comm:sendTNSPacket( Packet.EOF:new( ) ) local status = self.comm:sendTNSPacket( Packet.EOF:new( ) )
self.tnssocket:close() self.socket:close()
end, end,
} }
-- copy paste of DB2Socket aka VNCSocket
TNSSocket =
{
new = function(self)
local o = {}
setmetatable(o, self)
self.__index = self
o.Socket = nmap.new_socket()
-- We need this massive timeout due to Oracle 11g throttling of
-- repeated login attempts.
o.Socket:set_timeout(30000)
o.Buffer = nil
return o
end,
--- Establishes a connection.
--
-- @param hostid Hostname or IP address.
-- @param port Port number.
-- @param protocol <code>"tcp"</code>, <code>"udp"</code>, or
-- @return Status (true or false).
-- @return Error code (if status is false).
connect = function( self, hostid, port, protocol )
return self.Socket:connect( hostid, port, protocol )
end,
--- Closes an open connection.
--
-- @return Status (true or false).
-- @return Error code (if status is false).
close = function( self )
return self.Socket:close()
end,
--- Opposed to the <code>socket:receive_bytes</code> function, that returns
-- at least x bytes, this function returns the amount of bytes requested.
--
-- @param count of bytes to read
-- @return true on success, false on failure
-- @return data containing bytes read from the socket
-- err containing error message if status is false
recv = function( self, count )
local status, data
self.Buffer = self.Buffer or ""
if ( #self.Buffer < count ) then
status, data = self.Socket:receive_bytes( count - #self.Buffer )
if ( not(status) or #data < count - #self.Buffer ) then
return false, data
end
self.Buffer = self.Buffer .. data
end
data = self.Buffer:sub( 1, count )
self.Buffer = self.Buffer:sub( count + 1)
return true, data
end,
--- Sends data over the socket
--
-- @return Status (true or false).
-- @return Error code (if status is false).
send = function( self, data )
return self.Socket:send( data )
end,
}
return _ENV; return _ENV;