2 Unix SMB/CIFS implementation.
4 Manually parsed structures found in the DCERPC protocol
6 Copyright (C) Stefan Metzmacher 2014
7 Copyright (C) Gregor Beck 2014
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "librpc/gen_ndr/ndr_dcerpc.h"
25 #include "librpc/gen_ndr/ndr_misc.h"
28 * This function was generated by pidl and
29 * has been extended by the (_available == 0) check.
31 * That's why we ignore the 80 char per line limit.
33 enum ndr_err_code
ndr_pull_dcerpc_bind_nak(struct ndr_pull
*ndr
, int ndr_flags
, struct dcerpc_bind_nak
*r
)
35 uint32_t size_versions_0
= 0;
36 uint32_t cntr_versions_0
;
37 TALLOC_CTX
*_mem_save_versions_0
= NULL
;
38 NDR_PULL_CHECK_FLAGS(ndr
, ndr_flags
);
39 if (ndr_flags
& NDR_SCALARS
) {
41 NDR_CHECK(ndr_pull_align(ndr
, 4));
42 NDR_CHECK(ndr_pull_dcerpc_bind_nak_reason(ndr
, NDR_SCALARS
, &r
->reject_reason
));
43 _available
= ndr
->data_size
- ndr
->offset
;
44 if (_available
== 0) {
46 * This works around a bug in older
47 * Samba (<= 4.1) releases.
53 NDR_CHECK(ndr_pull_uint8(ndr
, NDR_SCALARS
, &r
->num_versions
));
55 size_versions_0
= r
->num_versions
;
56 NDR_PULL_ALLOC_N(ndr
, r
->versions
, size_versions_0
);
57 _mem_save_versions_0
= NDR_PULL_GET_MEM_CTX(ndr
);
58 NDR_PULL_SET_MEM_CTX(ndr
, r
->versions
, 0);
59 for (cntr_versions_0
= 0; cntr_versions_0
< (size_versions_0
); cntr_versions_0
++) {
60 NDR_CHECK(ndr_pull_dcerpc_bind_nak_version(ndr
, NDR_SCALARS
, &r
->versions
[cntr_versions_0
]));
62 NDR_PULL_SET_MEM_CTX(ndr
, _mem_save_versions_0
, 0);
64 uint32_t _flags_save_DATA_BLOB
= ndr
->flags
;
65 ndr_set_flags(&ndr
->flags
, LIBNDR_FLAG_REMAINING
);
66 NDR_CHECK(ndr_pull_DATA_BLOB(ndr
, NDR_SCALARS
, &r
->_pad
));
67 ndr
->flags
= _flags_save_DATA_BLOB
;
69 NDR_CHECK(ndr_pull_trailer_align(ndr
, 4));
71 if (ndr_flags
& NDR_BUFFERS
) {
73 return NDR_ERR_SUCCESS
;
76 const uint8_t DCERPC_SEC_VT_MAGIC
[] = {0x8a,0xe3,0x13,0x71,0x02,0xf4,0x36,0x71};
78 _PUBLIC_
enum ndr_err_code
ndr_push_dcerpc_sec_vt_count(struct ndr_push
*ndr
, int ndr_flags
, const struct dcerpc_sec_vt_count
*r
)
80 NDR_PUSH_CHECK_FLAGS(ndr
, ndr_flags
);
82 return NDR_ERR_SUCCESS
;
85 _PUBLIC_
enum ndr_err_code
ndr_pull_dcerpc_sec_vt_count(struct ndr_pull
*ndr
, int ndr_flags
, struct dcerpc_sec_vt_count
*r
)
87 uint32_t _saved_ofs
= ndr
->offset
;
89 NDR_PULL_CHECK_FLAGS(ndr
, ndr_flags
);
91 if (!(ndr_flags
& NDR_SCALARS
)) {
92 return NDR_ERR_SUCCESS
;
101 NDR_CHECK(ndr_pull_uint16(ndr
, NDR_SCALARS
, &command
));
102 NDR_CHECK(ndr_pull_uint16(ndr
, NDR_SCALARS
, &length
));
103 NDR_CHECK(ndr_pull_advance(ndr
, length
));
107 if (command
& DCERPC_SEC_VT_COMMAND_END
) {
112 ndr
->offset
= _saved_ofs
;
113 return NDR_ERR_SUCCESS
;
116 _PUBLIC_
enum ndr_err_code
ndr_pop_dcerpc_sec_verification_trailer(
117 struct ndr_pull
*ndr
, TALLOC_CTX
*mem_ctx
,
118 struct dcerpc_sec_verification_trailer
**_r
)
120 enum ndr_err_code ndr_err
;
122 uint32_t min_ofs
= 0;
123 struct dcerpc_sec_verification_trailer
*r
;
124 DATA_BLOB sub_blob
= data_blob_null
;
125 struct ndr_pull
*sub_ndr
= NULL
;
130 r
= talloc_zero(mem_ctx
, struct dcerpc_sec_verification_trailer
);
132 return NDR_ERR_ALLOC
;
135 if (ndr
->data_size
< sizeof(DCERPC_SEC_VT_MAGIC
)) {
137 * we return with r->count = 0
140 return NDR_ERR_SUCCESS
;
143 ofs
= ndr
->data_size
- sizeof(DCERPC_SEC_VT_MAGIC
);
144 /* the magic is 4 byte aligned */
147 if (ofs
> DCERPC_SEC_VT_MAX_SIZE
) {
149 * We just scan the last 1024 bytes.
151 min_ofs
= ofs
- DCERPC_SEC_VT_MAX_SIZE
;
159 ret
= memcmp(&ndr
->data
[ofs
],
161 sizeof(DCERPC_SEC_VT_MAGIC
));
163 sub_blob
= data_blob_const(&ndr
->data
[ofs
],
164 ndr
->data_size
- ofs
);
168 if (ofs
<= min_ofs
) {
175 if (sub_blob
.length
== 0) {
177 * we return with r->count = 0
180 return NDR_ERR_SUCCESS
;
183 sub_ndr
= ndr_pull_init_blob(&sub_blob
, r
);
184 if (sub_ndr
== NULL
) {
186 return NDR_ERR_ALLOC
;
189 ndr_err
= ndr_pull_dcerpc_sec_verification_trailer(sub_ndr
,
190 NDR_SCALARS
| NDR_BUFFERS
,
192 if (ndr_err
== NDR_ERR_ALLOC
) {
194 return NDR_ERR_ALLOC
;
197 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err
)) {
201 remaining
= sub_ndr
->data_size
- sub_ndr
->offset
;
202 if (remaining
> 16) {
204 * we expect not more than 16 byte of additional
205 * padding after the verification trailer.
211 * We assume that we got a real verification trailer.
213 * We remove it from the available stub data.
215 ndr
->data_size
= ofs
;
217 TALLOC_FREE(sub_ndr
);
220 return NDR_ERR_SUCCESS
;
223 TALLOC_FREE(sub_ndr
);
225 * just ignore the error, it's likely
226 * that the magic we found belongs to
229 * we return with r->count = 0
233 return NDR_ERR_SUCCESS
;