add WITH_SENDFILE profiling data (from Pierre Belanger)
[Samba.git] / source / rpc_parse / parse_lsa.c
blob16f0a5bde8b39e1c731eca46090dc9af00298cd6
1 /*
2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997.
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #include "includes.h"
25 static BOOL lsa_io_trans_names(char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
27 /*******************************************************************
28 Inits a LSA_TRANS_NAME structure.
29 ********************************************************************/
31 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
32 uint16 sid_name_use, char *name, uint32 idx)
34 int len_name = strlen(name);
36 if(len_name == 0)
37 len_name = 1;
39 trn->sid_name_use = sid_name_use;
40 init_uni_hdr(&trn->hdr_name, len_name);
41 init_unistr2(uni_name, name, len_name);
42 trn->domain_idx = idx;
45 /*******************************************************************
46 Reads or writes a LSA_TRANS_NAME structure.
47 ********************************************************************/
49 static BOOL lsa_io_trans_name(char *desc, LSA_TRANS_NAME *trn, prs_struct *ps,
50 int depth)
52 prs_debug(ps, depth, desc, "lsa_io_trans_name");
53 depth++;
55 if(!prs_align(ps))
56 return False;
58 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
59 return False;
60 if(!prs_align(ps))
61 return False;
63 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
64 return False;
65 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
66 return False;
68 return True;
71 /*******************************************************************
72 Reads or writes a DOM_R_REF structure.
73 ********************************************************************/
75 static BOOL lsa_io_dom_r_ref(char *desc, DOM_R_REF *r_r, prs_struct *ps,
76 int depth)
78 int i;
80 prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
81 depth++;
83 if(!prs_align(ps))
84 return False;
86 if(!prs_uint32("num_ref_doms_1", ps, depth, &r_r->num_ref_doms_1)) /* num referenced domains? */
87 return False;
88 if(!prs_uint32("ptr_ref_dom ", ps, depth, &r_r->ptr_ref_dom)) /* undocumented buffer pointer. */
89 return False;
90 if(!prs_uint32("max_entries ", ps, depth, &r_r->max_entries)) /* 32 - max number of entries */
91 return False;
93 SMB_ASSERT_ARRAY(r_r->hdr_ref_dom, r_r->num_ref_doms_1);
95 if (r_r->ptr_ref_dom != 0) {
97 if(!prs_uint32("num_ref_doms_2", ps, depth, &r_r->num_ref_doms_2)) /* 4 - num referenced domains? */
98 return False;
100 SMB_ASSERT_ARRAY(r_r->ref_dom, r_r->num_ref_doms_2);
102 for (i = 0; i < r_r->num_ref_doms_1; i++) {
103 fstring t;
105 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
106 if(!smb_io_unihdr(t, &r_r->hdr_ref_dom[i].hdr_dom_name, ps, depth))
107 return False;
109 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
110 if(!prs_uint32(t, ps, depth, &r_r->hdr_ref_dom[i].ptr_dom_sid))
111 return False;
114 for (i = 0; i < r_r->num_ref_doms_2; i++) {
115 fstring t;
117 if (r_r->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
118 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
119 if(!smb_io_unistr2(t, &r_r->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
120 return False;
121 if(!prs_align(ps))
122 return False;
125 if (r_r->hdr_ref_dom[i].ptr_dom_sid != 0) {
126 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
127 if(!smb_io_dom_sid2(t, &r_r->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
128 return False;
133 return True;
136 /*******************************************************************
137 Inits an LSA_SEC_QOS structure.
138 ********************************************************************/
140 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
142 DEBUG(5, ("init_lsa_sec_qos\n"));
144 qos->len = 0x0c; /* length of quality of service block, in bytes */
145 qos->sec_imp_level = imp_lev;
146 qos->sec_ctxt_mode = ctxt;
147 qos->effective_only = eff;
150 /*******************************************************************
151 Reads or writes an LSA_SEC_QOS structure.
152 ********************************************************************/
154 static BOOL lsa_io_sec_qos(char *desc, LSA_SEC_QOS *qos, prs_struct *ps,
155 int depth)
157 uint32 start;
159 prs_debug(ps, depth, desc, "lsa_io_obj_qos");
160 depth++;
162 if(!prs_align(ps))
163 return False;
165 start = prs_offset(ps);
167 /* these pointers had _better_ be zero, because we don't know
168 what they point to!
170 if(!prs_uint32("len ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
171 return False;
172 if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
173 return False;
174 if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
175 return False;
176 if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
177 return False;
179 if (qos->len != prs_offset(ps) - start) {
180 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
181 qos->len, prs_offset(ps) - start));
184 return True;
187 /*******************************************************************
188 Inits an LSA_OBJ_ATTR structure.
189 ********************************************************************/
191 void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
193 DEBUG(5, ("init_lsa_obj_attr\n"));
195 attr->len = 0x18; /* length of object attribute block, in bytes */
196 attr->ptr_root_dir = 0;
197 attr->ptr_obj_name = 0;
198 attr->attributes = attributes;
199 attr->ptr_sec_desc = 0;
201 if (qos != NULL) {
202 attr->ptr_sec_qos = 1;
203 attr->sec_qos = qos;
204 } else {
205 attr->ptr_sec_qos = 0;
206 attr->sec_qos = NULL;
210 /*******************************************************************
211 Reads or writes an LSA_OBJ_ATTR structure.
212 ********************************************************************/
214 static BOOL lsa_io_obj_attr(char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps,
215 int depth)
217 uint32 start;
219 prs_debug(ps, depth, desc, "lsa_io_obj_attr");
220 depth++;
222 if(!prs_align(ps))
223 return False;
225 start = prs_offset(ps);
227 /* these pointers had _better_ be zero, because we don't know
228 what they point to!
230 if(!prs_uint32("len ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
231 return False;
232 if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
233 return False;
234 if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
235 return False;
236 if(!prs_uint32("attributes ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
237 return False;
238 if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
239 return False;
240 if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
241 return False;
243 /* code commented out as it's not necessary true (tested with hyena). JFM, 11/22/2001 */
244 #if 0
245 if (attr->len != prs_offset(ps) - start) {
246 DEBUG(3,("lsa_io_obj_attr: length %x does not match size %x\n",
247 attr->len, prs_offset(ps) - start));
248 return False;
250 #endif
252 if (attr->ptr_sec_qos != 0) {
253 if (UNMARSHALLING(ps))
254 if (!(attr->sec_qos = (LSA_SEC_QOS *)prs_alloc_mem(ps,sizeof(LSA_SEC_QOS))))
255 return False;
257 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
258 return False;
261 return True;
265 /*******************************************************************
266 Inits an LSA_Q_OPEN_POL structure.
267 ********************************************************************/
269 void init_q_open_pol(LSA_Q_OPEN_POL *r_q, uint16 system_name,
270 uint32 attributes, uint32 desired_access,
271 LSA_SEC_QOS *qos)
273 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes,
274 desired_access));
276 r_q->ptr = 1; /* undocumented pointer */
278 r_q->des_access = desired_access;
280 r_q->system_name = system_name;
281 init_lsa_obj_attr(&r_q->attr, attributes, qos);
284 /*******************************************************************
285 Reads or writes an LSA_Q_OPEN_POL structure.
286 ********************************************************************/
288 BOOL lsa_io_q_open_pol(char *desc, LSA_Q_OPEN_POL *r_q, prs_struct *ps,
289 int depth)
291 prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
292 depth++;
294 if(!prs_uint32("ptr ", ps, depth, &r_q->ptr))
295 return False;
296 if(!prs_uint16("system_name", ps, depth, &r_q->system_name))
297 return False;
298 if(!prs_align( ps ))
299 return False;
301 if(!lsa_io_obj_attr("", &r_q->attr, ps, depth))
302 return False;
304 if(!prs_uint32("des_access", ps, depth, &r_q->des_access))
305 return False;
307 return True;
310 /*******************************************************************
311 Reads or writes an LSA_R_OPEN_POL structure.
312 ********************************************************************/
314 BOOL lsa_io_r_open_pol(char *desc, LSA_R_OPEN_POL *r_p, prs_struct *ps,
315 int depth)
317 prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
318 depth++;
320 if(!smb_io_pol_hnd("", &r_p->pol, ps, depth))
321 return False;
323 if(!prs_ntstatus("status", ps, depth, &r_p->status))
324 return False;
326 return True;
329 /*******************************************************************
330 Inits an LSA_Q_OPEN_POL2 structure.
331 ********************************************************************/
333 void init_q_open_pol2(LSA_Q_OPEN_POL2 *r_q, char *server_name,
334 uint32 attributes, uint32 desired_access,
335 LSA_SEC_QOS *qos)
337 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes,
338 desired_access));
340 r_q->ptr = 1; /* undocumented pointer */
342 r_q->des_access = desired_access;
344 init_unistr2(&r_q->uni_server_name, server_name,
345 strlen(server_name) + 1);
347 init_lsa_obj_attr(&r_q->attr, attributes, qos);
350 /*******************************************************************
351 Reads or writes an LSA_Q_OPEN_POL2 structure.
352 ********************************************************************/
354 BOOL lsa_io_q_open_pol2(char *desc, LSA_Q_OPEN_POL2 *r_q, prs_struct *ps,
355 int depth)
357 prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
358 depth++;
360 if(!prs_uint32("ptr ", ps, depth, &r_q->ptr))
361 return False;
363 if(!smb_io_unistr2 ("", &r_q->uni_server_name, r_q->ptr, ps, depth))
364 return False;
365 if(!lsa_io_obj_attr("", &r_q->attr, ps, depth))
366 return False;
368 if(!prs_uint32("des_access", ps, depth, &r_q->des_access))
369 return False;
371 return True;
374 /*******************************************************************
375 Reads or writes an LSA_R_OPEN_POL2 structure.
376 ********************************************************************/
378 BOOL lsa_io_r_open_pol2(char *desc, LSA_R_OPEN_POL2 *r_p, prs_struct *ps,
379 int depth)
381 prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
382 depth++;
384 if(!smb_io_pol_hnd("", &r_p->pol, ps, depth))
385 return False;
387 if(!prs_ntstatus("status", ps, depth, &r_p->status))
388 return False;
390 return True;
393 /*******************************************************************
394 makes an LSA_Q_QUERY_SEC_OBJ structure.
395 ********************************************************************/
397 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *q_q, const POLICY_HND *hnd,
398 uint32 sec_info)
400 DEBUG(5, ("init_q_query_sec_obj\n"));
402 q_q->pol = *hnd;
403 q_q->sec_info = sec_info;
405 return;
408 /*******************************************************************
409 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
410 ********************************************************************/
412 BOOL lsa_io_q_query_sec_obj(char *desc, LSA_Q_QUERY_SEC_OBJ *q_q,
413 prs_struct *ps, int depth)
415 prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
416 depth++;
418 if (!smb_io_pol_hnd("", &q_q->pol, ps, depth))
419 return False;
421 if (!prs_uint32("sec_info", ps, depth, &q_q->sec_info))
422 return False;
424 return True;
427 /*******************************************************************
428 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
429 ********************************************************************/
431 BOOL lsa_io_r_query_sec_obj(char *desc, LSA_R_QUERY_SEC_OBJ *r_u,
432 prs_struct *ps, int depth)
434 prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
435 depth++;
437 if (!prs_align(ps))
438 return False;
440 if (!prs_uint32("ptr", ps, depth, &r_u->ptr))
441 return False;
443 if (r_u->ptr != 0) {
444 if (!sec_io_desc_buf("sec", &r_u->buf, ps, depth))
445 return False;
448 if (!prs_ntstatus("status", ps, depth, &r_u->status))
449 return False;
451 return True;
454 /*******************************************************************
455 Inits an LSA_Q_QUERY_INFO structure.
456 ********************************************************************/
458 void init_q_query(LSA_Q_QUERY_INFO *q_q, POLICY_HND *hnd, uint16 info_class)
460 DEBUG(5, ("init_q_query\n"));
462 memcpy(&q_q->pol, hnd, sizeof(q_q->pol));
464 q_q->info_class = info_class;
467 /*******************************************************************
468 Reads or writes an LSA_Q_QUERY_INFO structure.
469 ********************************************************************/
471 BOOL lsa_io_q_query(char *desc, LSA_Q_QUERY_INFO *q_q, prs_struct *ps,
472 int depth)
474 prs_debug(ps, depth, desc, "lsa_io_q_query");
475 depth++;
477 if(!smb_io_pol_hnd("", &q_q->pol, ps, depth))
478 return False;
480 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
481 return False;
483 return True;
486 /*******************************************************************
487 makes an LSA_Q_ENUM_TRUST_DOM structure.
488 ********************************************************************/
489 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
490 uint32 enum_context, uint32 preferred_len)
492 DEBUG(5, ("init_q_enum_trust_dom\n"));
494 q_e->pol = *pol;
495 q_e->enum_context = enum_context;
496 q_e->preferred_len = preferred_len;
498 return True;
501 /*******************************************************************
502 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
503 ********************************************************************/
505 BOOL lsa_io_q_enum_trust_dom(char *desc, LSA_Q_ENUM_TRUST_DOM *q_e,
506 prs_struct *ps, int depth)
508 prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
509 depth++;
511 if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
512 return False;
514 if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
515 return False;
516 if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
517 return False;
519 return True;
522 /*******************************************************************
523 Inits an LSA_R_ENUM_TRUST_DOM structure.
524 ********************************************************************/
526 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *r_e, uint32 enum_context,
527 char *domain_name, DOM_SID *domain_sid,
528 NTSTATUS status)
530 DEBUG(5, ("init_r_enum_trust_dom\n"));
532 r_e->enum_context = enum_context;
534 if (NT_STATUS_IS_OK(status)) {
535 int len_domain_name = strlen(domain_name) + 1;
537 r_e->num_domains = 1;
538 r_e->ptr_enum_domains = 1;
539 r_e->num_domains2 = 1;
541 if (!(r_e->hdr_domain_name = (UNIHDR2 *)talloc(ctx,sizeof(UNIHDR2))))
542 return;
544 if (!(r_e->uni_domain_name = (UNISTR2 *)talloc(ctx,sizeof(UNISTR2))))
545 return;
547 if (!(r_e->domain_sid = (DOM_SID2 *)talloc(ctx,sizeof(DOM_SID2))))
548 return;
550 init_uni_hdr2(&r_e->hdr_domain_name[0], len_domain_name);
551 init_unistr2 (&r_e->uni_domain_name[0], domain_name,
552 len_domain_name);
553 init_dom_sid2(&r_e->domain_sid[0], domain_sid);
554 } else {
555 r_e->num_domains = 0;
556 r_e->ptr_enum_domains = 0;
559 r_e->status = status;
562 /*******************************************************************
563 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
564 ********************************************************************/
566 BOOL lsa_io_r_enum_trust_dom(char *desc, LSA_R_ENUM_TRUST_DOM *r_e,
567 prs_struct *ps, int depth)
569 prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
570 depth++;
572 if(!prs_uint32("enum_context ", ps, depth, &r_e->enum_context))
573 return False;
574 if(!prs_uint32("num_domains ", ps, depth, &r_e->num_domains))
575 return False;
576 if(!prs_uint32("ptr_enum_domains", ps, depth, &r_e->ptr_enum_domains))
577 return False;
579 if (r_e->ptr_enum_domains) {
580 int i, num_domains;
582 if(!prs_uint32("num_domains2", ps, depth, &r_e->num_domains2))
583 return False;
585 num_domains = r_e->num_domains2;
587 if (UNMARSHALLING(ps)) {
588 if (!(r_e->hdr_domain_name = (UNIHDR2 *)prs_alloc_mem(ps,sizeof(UNIHDR2) * num_domains)))
589 return False;
591 if (!(r_e->uni_domain_name = (UNISTR2 *)prs_alloc_mem(ps,sizeof(UNISTR2) * num_domains)))
592 return False;
594 if (!(r_e->domain_sid = (DOM_SID2 *)prs_alloc_mem(ps,sizeof(DOM_SID2) * num_domains)))
595 return False;
598 for (i = 0; i < num_domains; i++) {
599 if(!smb_io_unihdr2 ("", &r_e->hdr_domain_name[i], ps,
600 depth))
601 return False;
604 for (i = 0; i < num_domains; i++) {
605 if(!smb_io_unistr2 ("", &r_e->uni_domain_name[i],
606 r_e->hdr_domain_name[i].buffer,
607 ps, depth))
608 return False;
609 if(!smb_io_dom_sid2("", &r_e->domain_sid[i], ps,
610 depth))
611 return False;
615 if(!prs_ntstatus("status", ps, depth, &r_e->status))
616 return False;
618 return True;
621 /*******************************************************************
622 reads or writes a dom query structure.
623 ********************************************************************/
625 static BOOL lsa_io_dom_query(char *desc, DOM_QUERY *d_q, prs_struct *ps, int depth)
627 if (d_q == NULL)
628 return False;
630 prs_debug(ps, depth, desc, "lsa_io_dom_query");
631 depth++;
633 if(!prs_align(ps))
634 return False;
636 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
637 return False;
638 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
639 return False;
641 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
642 return False;
643 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
644 return False;
646 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
647 return False;
649 if(!prs_align(ps))
650 return False;
652 if (d_q->buffer_dom_sid != 0) {
653 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
654 return False;
655 } else {
656 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
659 return True;
662 /*******************************************************************
663 reads or writes a structure.
664 ********************************************************************/
666 static BOOL lsa_io_dom_query_2(char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
668 uint32 ptr = 1;
670 if (d_q == NULL)
671 return False;
673 prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
674 depth++;
676 if (!prs_align(ps))
677 return False;
679 if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
680 return False;
681 if (!prs_uint32("ptr ", ps, depth, &ptr))
682 return False;
683 if (!prs_uint32("count1", ps, depth, &d_q->count1))
684 return False;
685 if (!prs_uint32("count2", ps, depth, &d_q->count2))
686 return False;
688 if (UNMARSHALLING(ps)) {
689 d_q->auditsettings = (uint32 *)talloc_zero(ps->mem_ctx, d_q->count2 * sizeof(uint32));
692 if (d_q->auditsettings == NULL) {
693 DEBUG(1, ("lsa_io_dom_query_2: NULL auditsettings!\n"));
694 return False;
697 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
698 return False;
700 return True;
703 /*******************************************************************
704 Reads or writes a dom query structure.
705 ********************************************************************/
707 static BOOL lsa_io_dom_query_3(char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
709 return lsa_io_dom_query("", d_q, ps, depth);
712 /*******************************************************************
713 Reads or writes a dom query structure.
714 ********************************************************************/
716 BOOL lsa_io_dom_query_5(char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
718 return lsa_io_dom_query("", d_q, ps, depth);
721 /*******************************************************************
722 Reads or writes a dom query structure.
723 ********************************************************************/
725 static BOOL lsa_io_dom_query_6(char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
727 if (d_q == NULL)
728 return False;
730 prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
731 depth++;
733 if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
734 return False;
736 return True;
739 /*******************************************************************
740 Reads or writes an LSA_R_QUERY_INFO structure.
741 ********************************************************************/
743 BOOL lsa_io_r_query(char *desc, LSA_R_QUERY_INFO *r_q, prs_struct *ps,
744 int depth)
746 prs_debug(ps, depth, desc, "lsa_io_r_query");
747 depth++;
749 if(!prs_uint32("undoc_buffer", ps, depth, &r_q->undoc_buffer))
750 return False;
752 if (r_q->undoc_buffer != 0) {
753 if(!prs_uint16("info_class", ps, depth, &r_q->info_class))
754 return False;
756 if(!prs_align(ps))
757 return False;
759 switch (r_q->info_class) {
760 case 2:
761 if(!lsa_io_dom_query_2("", &r_q->dom.id2, ps, depth))
762 return False;
763 break;
764 case 3:
765 if(!lsa_io_dom_query_3("", &r_q->dom.id3, ps, depth))
766 return False;
767 break;
768 case 5:
769 if(!lsa_io_dom_query_5("", &r_q->dom.id5, ps, depth))
770 return False;
771 break;
772 case 6:
773 if(!lsa_io_dom_query_6("", &r_q->dom.id6, ps, depth))
774 return False;
775 break;
776 default:
777 /* PANIC! */
778 break;
782 if(!prs_align(ps))
783 return False;
785 if(!prs_ntstatus("status", ps, depth, &r_q->status))
786 return False;
788 return True;
791 /*******************************************************************
792 Inits a LSA_SID_ENUM structure.
793 ********************************************************************/
795 void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen,
796 int num_entries, DOM_SID *sids)
798 int i;
800 DEBUG(5, ("init_lsa_sid_enum\n"));
802 sen->num_entries = num_entries;
803 sen->ptr_sid_enum = (num_entries != 0);
804 sen->num_entries2 = num_entries;
806 /* Allocate memory for sids and sid pointers */
808 if (num_entries == 0) return;
810 if ((sen->ptr_sid = (uint32 *)talloc_zero(mem_ctx, num_entries *
811 sizeof(uint32))) == NULL) {
812 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
813 return;
816 if ((sen->sid = (DOM_SID2 *)talloc_zero(mem_ctx, num_entries *
817 sizeof(DOM_SID2))) == NULL) {
818 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
819 return;
822 /* Copy across SIDs and SID pointers */
824 for (i = 0; i < num_entries; i++) {
825 sen->ptr_sid[i] = 1;
826 init_dom_sid2(&sen->sid[i], &sids[i]);
830 /*******************************************************************
831 Reads or writes a LSA_SID_ENUM structure.
832 ********************************************************************/
834 static BOOL lsa_io_sid_enum(char *desc, LSA_SID_ENUM *sen, prs_struct *ps,
835 int depth)
837 int i;
839 prs_debug(ps, depth, desc, "lsa_io_sid_enum");
840 depth++;
842 if(!prs_align(ps))
843 return False;
845 if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
846 return False;
847 if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
848 return False;
851 if the ptr is NULL, leave here. checked from a real w2k trace.
852 JFM, 11/23/2001
855 if (sen->ptr_sid_enum==0)
856 return True;
858 if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
859 return False;
861 /* Mallocate memory if we're unpacking from the wire */
863 if (UNMARSHALLING(ps)) {
864 if ((sen->ptr_sid = (uint32 *)prs_alloc_mem( ps,
865 sen->num_entries * sizeof(uint32))) == NULL) {
866 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
867 "ptr_sid\n"));
868 return False;
871 if ((sen->sid = (DOM_SID2 *)prs_alloc_mem( ps,
872 sen->num_entries * sizeof(DOM_SID2))) == NULL) {
873 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
874 "sids\n"));
875 return False;
879 for (i = 0; i < sen->num_entries; i++) {
880 fstring temp;
882 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
883 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
884 return False;
888 for (i = 0; i < sen->num_entries; i++) {
889 fstring temp;
891 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
892 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
893 return False;
897 return True;
900 /*******************************************************************
901 Inits an LSA_R_ENUM_TRUST_DOM structure.
902 ********************************************************************/
904 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l,
905 POLICY_HND *hnd, int num_sids, DOM_SID *sids,
906 uint16 level)
908 DEBUG(5, ("init_r_enum_trust_dom\n"));
910 ZERO_STRUCTP(q_l);
912 memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
913 init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
915 q_l->level.value = level;
918 /*******************************************************************
919 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
920 ********************************************************************/
922 BOOL lsa_io_q_lookup_sids(char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
923 int depth)
925 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
926 depth++;
928 if(!prs_align(ps))
929 return False;
931 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
932 return False;
933 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
934 return False;
935 if(!lsa_io_trans_names("names ", &q_s->names, ps, depth)) /* translated names */
936 return False;
937 if(!smb_io_lookup_level("switch ", &q_s->level, ps, depth)) /* lookup level */
938 return False;
940 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
941 return False;
943 return True;
946 /*******************************************************************
947 Reads or writes a structure.
948 ********************************************************************/
950 static BOOL lsa_io_trans_names(char *desc, LSA_TRANS_NAME_ENUM *trn,
951 prs_struct *ps, int depth)
953 int i;
955 prs_debug(ps, depth, desc, "lsa_io_trans_names");
956 depth++;
958 if(!prs_align(ps))
959 return False;
961 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
962 return False;
963 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
964 return False;
966 if (trn->ptr_trans_names != 0) {
967 if(!prs_uint32("num_entries2 ", ps, depth,
968 &trn->num_entries2))
969 return False;
971 if (UNMARSHALLING(ps)) {
972 if ((trn->name = (LSA_TRANS_NAME *)
973 prs_alloc_mem(ps, trn->num_entries *
974 sizeof(LSA_TRANS_NAME))) == NULL) {
975 return False;
978 if ((trn->uni_name = (UNISTR2 *)
979 prs_alloc_mem(ps, trn->num_entries *
980 sizeof(UNISTR2))) == NULL) {
981 return False;
985 for (i = 0; i < trn->num_entries2; i++) {
986 fstring t;
987 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
989 if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
990 return False;
993 for (i = 0; i < trn->num_entries2; i++) {
994 fstring t;
995 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
997 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
998 return False;
999 if(!prs_align(ps))
1000 return False;
1004 return True;
1007 /*******************************************************************
1008 Reads or writes a structure.
1009 ********************************************************************/
1011 BOOL lsa_io_r_lookup_sids(char *desc, LSA_R_LOOKUP_SIDS *r_s,
1012 prs_struct *ps, int depth)
1014 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1015 depth++;
1017 if(!prs_align(ps))
1018 return False;
1020 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1021 return False;
1023 if (r_s->ptr_dom_ref != 0)
1024 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1025 return False;
1027 if(!lsa_io_trans_names("names ", r_s->names, ps, depth)) /* translated names */
1028 return False;
1030 if(!prs_align(ps))
1031 return False;
1033 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1034 return False;
1036 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1037 return False;
1039 return True;
1042 /*******************************************************************
1043 makes a structure.
1044 ********************************************************************/
1046 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l,
1047 POLICY_HND *hnd, int num_names, const char **names)
1049 int i;
1051 DEBUG(5, ("init_q_lookup_names\n"));
1053 ZERO_STRUCTP(q_l);
1055 q_l->pol = *hnd;
1056 q_l->num_entries = num_names;
1057 q_l->num_entries2 = num_names;
1058 q_l->lookup_level = 1;
1060 if ((q_l->uni_name = (UNISTR2 *)talloc_zero(
1061 mem_ctx, num_names * sizeof(UNISTR2))) == NULL) {
1062 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1063 return;
1066 if ((q_l->hdr_name = (UNIHDR *)talloc_zero(
1067 mem_ctx, num_names * sizeof(UNIHDR))) == NULL) {
1068 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1069 return;
1072 for (i = 0; i < num_names; i++) {
1073 int len;
1074 len = strlen(unix_to_dos_static(names[i]));
1076 init_uni_hdr(&q_l->hdr_name[i], len);
1077 init_unistr2(&q_l->uni_name[i], unix_to_dos_static(names[i]), len);
1081 /*******************************************************************
1082 reads or writes a structure.
1083 ********************************************************************/
1085 BOOL lsa_io_q_lookup_names(char *desc, LSA_Q_LOOKUP_NAMES *q_r,
1086 prs_struct *ps, int depth)
1088 int i;
1090 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1091 depth++;
1093 if(!prs_align(ps))
1094 return False;
1096 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1097 return False;
1099 if(!prs_align(ps))
1100 return False;
1101 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1102 return False;
1103 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1104 return False;
1106 if (UNMARSHALLING(ps)) {
1107 if (q_r->num_entries) {
1108 if ((q_r->hdr_name = (UNIHDR *)prs_alloc_mem(ps,
1109 q_r->num_entries * sizeof(UNIHDR))) == NULL)
1110 return False;
1111 if ((q_r->uni_name = (UNISTR2 *)prs_alloc_mem(ps,
1112 q_r->num_entries * sizeof(UNISTR2))) == NULL)
1113 return False;
1117 for (i = 0; i < q_r->num_entries; i++) {
1118 if(!prs_align(ps))
1119 return False;
1120 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1121 return False;
1124 for (i = 0; i < q_r->num_entries; i++) {
1125 if(!prs_align(ps))
1126 return False;
1127 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1128 return False;
1131 if(!prs_align(ps))
1132 return False;
1133 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1134 return False;
1135 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1136 return False;
1137 if(!prs_uint32("lookup_level ", ps, depth, &q_r->lookup_level))
1138 return False;
1139 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1140 return False;
1142 return True;
1145 /*******************************************************************
1146 reads or writes a structure.
1147 ********************************************************************/
1149 BOOL lsa_io_r_lookup_names(char *desc, LSA_R_LOOKUP_NAMES *r_r,
1150 prs_struct *ps, int depth)
1152 int i;
1154 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1155 depth++;
1157 if(!prs_align(ps))
1158 return False;
1160 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_r->ptr_dom_ref))
1161 return False;
1163 if (r_r->ptr_dom_ref != 0)
1164 if(!lsa_io_dom_r_ref("", r_r->dom_ref, ps, depth))
1165 return False;
1167 if(!prs_uint32("num_entries", ps, depth, &r_r->num_entries))
1168 return False;
1169 if(!prs_uint32("ptr_entries", ps, depth, &r_r->ptr_entries))
1170 return False;
1172 if (r_r->ptr_entries != 0) {
1173 if(!prs_uint32("num_entries2", ps, depth, &r_r->num_entries2))
1174 return False;
1176 if (r_r->num_entries2 != r_r->num_entries) {
1177 /* RPC fault */
1178 return False;
1181 if (UNMARSHALLING(ps)) {
1182 if ((r_r->dom_rid = (DOM_RID2 *)prs_alloc_mem(ps, r_r->num_entries2 * sizeof(DOM_RID2)))
1183 == NULL) {
1184 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1185 return False;
1189 for (i = 0; i < r_r->num_entries2; i++)
1190 if(!smb_io_dom_rid2("", &r_r->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1191 return False;
1194 if(!prs_uint32("mapped_count", ps, depth, &r_r->mapped_count))
1195 return False;
1197 if(!prs_ntstatus("status ", ps, depth, &r_r->status))
1198 return False;
1200 return True;
1204 /*******************************************************************
1205 Inits an LSA_Q_CLOSE structure.
1206 ********************************************************************/
1208 void init_lsa_q_close(LSA_Q_CLOSE *q_c, POLICY_HND *hnd)
1210 DEBUG(5, ("init_lsa_q_close\n"));
1212 memcpy(&q_c->pol, hnd, sizeof(q_c->pol));
1215 /*******************************************************************
1216 Reads or writes an LSA_Q_CLOSE structure.
1217 ********************************************************************/
1219 BOOL lsa_io_q_close(char *desc, LSA_Q_CLOSE *q_c, prs_struct *ps, int depth)
1221 prs_debug(ps, depth, desc, "lsa_io_q_close");
1222 depth++;
1224 if(!smb_io_pol_hnd("", &q_c->pol, ps, depth))
1225 return False;
1227 return True;
1230 /*******************************************************************
1231 Reads or writes an LSA_R_CLOSE structure.
1232 ********************************************************************/
1234 BOOL lsa_io_r_close(char *desc, LSA_R_CLOSE *r_c, prs_struct *ps, int depth)
1236 prs_debug(ps, depth, desc, "lsa_io_r_close");
1237 depth++;
1239 if(!smb_io_pol_hnd("", &r_c->pol, ps, depth))
1240 return False;
1242 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1243 return False;
1245 return True;
1248 /*******************************************************************
1249 Reads or writes an LSA_Q_OPEN_SECRET structure.
1250 ********************************************************************/
1252 BOOL lsa_io_q_open_secret(char *desc, LSA_Q_OPEN_SECRET *q_c, prs_struct *ps, int depth)
1254 prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
1255 depth++;
1257 /* Don't bother to read or write at present... */
1258 return True;
1261 /*******************************************************************
1262 Reads or writes an LSA_R_OPEN_SECRET structure.
1263 ********************************************************************/
1265 BOOL lsa_io_r_open_secret(char *desc, LSA_R_OPEN_SECRET *r_c, prs_struct *ps, int depth)
1267 prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
1268 depth++;
1270 if(!prs_align(ps))
1271 return False;
1273 if(!prs_uint32("dummy1", ps, depth, &r_c->dummy1))
1274 return False;
1275 if(!prs_uint32("dummy2", ps, depth, &r_c->dummy2))
1276 return False;
1277 if(!prs_uint32("dummy3", ps, depth, &r_c->dummy3))
1278 return False;
1279 if(!prs_uint32("dummy4", ps, depth, &r_c->dummy4))
1280 return False;
1281 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1282 return False;
1284 return True;
1287 /*******************************************************************
1288 Inits an LSA_Q_ENUM_PRIVS structure.
1289 ********************************************************************/
1291 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *q_q, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
1293 DEBUG(5, ("init_q_enum_privs\n"));
1295 memcpy(&q_q->pol, hnd, sizeof(q_q->pol));
1297 q_q->enum_context = enum_context;
1298 q_q->pref_max_length = pref_max_length;
1301 /*******************************************************************
1302 reads or writes a structure.
1303 ********************************************************************/
1304 BOOL lsa_io_q_enum_privs(char *desc, LSA_Q_ENUM_PRIVS *q_q, prs_struct *ps, int depth)
1306 if (q_q == NULL)
1307 return False;
1309 prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
1310 depth++;
1312 if (!smb_io_pol_hnd("", &q_q->pol, ps, depth))
1313 return False;
1315 if(!prs_uint32("enum_context ", ps, depth, &q_q->enum_context))
1316 return False;
1317 if(!prs_uint32("pref_max_length", ps, depth, &q_q->pref_max_length))
1318 return False;
1320 return True;
1323 /*******************************************************************
1324 reads or writes a structure.
1325 ********************************************************************/
1326 static BOOL lsa_io_priv_entries(char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
1328 uint32 i;
1330 if (entries == NULL)
1331 return False;
1333 prs_debug(ps, depth, desc, "lsa_io_priv_entries");
1334 depth++;
1336 if(!prs_align(ps))
1337 return False;
1339 for (i = 0; i < count; i++) {
1340 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
1341 return False;
1342 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
1343 return False;
1344 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
1345 return False;
1348 for (i = 0; i < count; i++)
1349 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
1350 return False;
1352 return True;
1355 /*******************************************************************
1356 Inits an LSA_R_ENUM_PRIVS structure.
1357 ********************************************************************/
1359 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *r_u, uint32 enum_context,
1360 uint32 count, LSA_PRIV_ENTRY *entries)
1362 DEBUG(5, ("init_lsa_r_enum_privs\n"));
1364 r_u->enum_context=enum_context;
1365 r_u->count=count;
1367 if (entries!=NULL) {
1368 r_u->ptr=1;
1369 r_u->count1=count;
1370 r_u->privs=entries;
1371 } else {
1372 r_u->ptr=0;
1373 r_u->count1=0;
1374 r_u->privs=NULL;
1378 /*******************************************************************
1379 reads or writes a structure.
1380 ********************************************************************/
1381 BOOL lsa_io_r_enum_privs(char *desc, LSA_R_ENUM_PRIVS *r_q, prs_struct *ps, int depth)
1383 if (r_q == NULL)
1384 return False;
1386 prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
1387 depth++;
1389 if(!prs_align(ps))
1390 return False;
1392 if(!prs_uint32("enum_context", ps, depth, &r_q->enum_context))
1393 return False;
1394 if(!prs_uint32("count", ps, depth, &r_q->count))
1395 return False;
1396 if(!prs_uint32("ptr", ps, depth, &r_q->ptr))
1397 return False;
1399 if (r_q->ptr) {
1400 if(!prs_uint32("count1", ps, depth, &r_q->count1))
1401 return False;
1403 if (UNMARSHALLING(ps))
1404 if (!(r_q->privs = (LSA_PRIV_ENTRY *)prs_alloc_mem(ps, sizeof(LSA_PRIV_ENTRY) * r_q->count1)))
1405 return False;
1407 if (!lsa_io_priv_entries("", r_q->privs, r_q->count1, ps, depth))
1408 return False;
1411 if(!prs_align(ps))
1412 return False;
1414 if(!prs_ntstatus("status", ps, depth, &r_q->status))
1415 return False;
1417 return True;
1420 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, char *name, uint16 lang_id, uint16 lang_id_sys)
1422 int len_name = strlen(name);
1424 if(len_name == 0)
1425 len_name = 1;
1427 memcpy(&trn->pol, hnd, sizeof(trn->pol));
1429 init_uni_hdr(&trn->hdr_name, len_name);
1430 init_unistr2(&trn->name, name, len_name);
1431 trn->lang_id = lang_id;
1432 trn->lang_id_sys = lang_id_sys;
1435 /*******************************************************************
1436 reads or writes a structure.
1437 ********************************************************************/
1438 BOOL lsa_io_q_priv_get_dispname(char *desc, LSA_Q_PRIV_GET_DISPNAME *q_q, prs_struct *ps, int depth)
1440 if (q_q == NULL)
1441 return False;
1443 prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
1444 depth++;
1446 if(!prs_align(ps))
1447 return False;
1449 if (!smb_io_pol_hnd("", &q_q->pol, ps, depth))
1450 return False;
1452 if (!smb_io_unihdr("hdr_name", &q_q->hdr_name, ps, depth))
1453 return False;
1455 if (!smb_io_unistr2("name", &q_q->name, q_q->hdr_name.buffer, ps, depth))
1456 return False;
1458 if(!prs_uint16("lang_id ", ps, depth, &q_q->lang_id))
1459 return False;
1460 if(!prs_uint16("lang_id_sys", ps, depth, &q_q->lang_id_sys))
1461 return False;
1463 return True;
1466 /*******************************************************************
1467 reads or writes a structure.
1468 ********************************************************************/
1469 BOOL lsa_io_r_priv_get_dispname(char *desc, LSA_R_PRIV_GET_DISPNAME *r_q, prs_struct *ps, int depth)
1471 if (r_q == NULL)
1472 return False;
1474 prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
1475 depth++;
1477 if (!prs_align(ps))
1478 return False;
1480 if (!prs_uint32("ptr_info", ps, depth, &r_q->ptr_info))
1481 return False;
1483 if (r_q->ptr_info){
1484 if (!smb_io_unihdr("hdr_name", &r_q->hdr_desc, ps, depth))
1485 return False;
1487 if (!smb_io_unistr2("desc", &r_q->desc, r_q->hdr_desc.buffer, ps, depth))
1488 return False;
1491 if(!prs_align(ps))
1492 return False;
1494 if(!prs_uint16("lang_id", ps, depth, &r_q->lang_id))
1495 return False;
1497 if(!prs_align(ps))
1498 return False;
1499 if(!prs_ntstatus("status", ps, depth, &r_q->status))
1500 return False;
1502 return True;
1505 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
1507 memcpy(&trn->pol, hnd, sizeof(trn->pol));
1509 trn->enum_context = enum_context;
1510 trn->pref_max_length = pref_max_length;
1513 /*******************************************************************
1514 reads or writes a structure.
1515 ********************************************************************/
1516 BOOL lsa_io_q_enum_accounts(char *desc, LSA_Q_ENUM_ACCOUNTS *q_q, prs_struct *ps, int depth)
1518 if (q_q == NULL)
1519 return False;
1521 prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
1522 depth++;
1524 if (!smb_io_pol_hnd("", &q_q->pol, ps, depth))
1525 return False;
1527 if(!prs_uint32("enum_context ", ps, depth, &q_q->enum_context))
1528 return False;
1529 if(!prs_uint32("pref_max_length", ps, depth, &q_q->pref_max_length))
1530 return False;
1532 return True;
1535 /*******************************************************************
1536 Inits an LSA_R_ENUM_PRIVS structure.
1537 ********************************************************************/
1539 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *r_u, uint32 enum_context)
1541 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
1543 r_u->enum_context=enum_context;
1544 if (r_u->enum_context!=0) {
1545 r_u->sids.num_entries=enum_context;
1546 r_u->sids.ptr_sid_enum=1;
1547 r_u->sids.num_entries2=enum_context;
1548 } else {
1549 r_u->sids.num_entries=0;
1550 r_u->sids.ptr_sid_enum=0;
1551 r_u->sids.num_entries2=0;
1555 /*******************************************************************
1556 reads or writes a structure.
1557 ********************************************************************/
1558 BOOL lsa_io_r_enum_accounts(char *desc, LSA_R_ENUM_ACCOUNTS *r_q, prs_struct *ps, int depth)
1560 if (r_q == NULL)
1561 return False;
1563 prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
1564 depth++;
1566 if (!prs_align(ps))
1567 return False;
1569 if(!prs_uint32("enum_context", ps, depth, &r_q->enum_context))
1570 return False;
1572 if (!lsa_io_sid_enum("sids", &r_q->sids, ps, depth))
1573 return False;
1575 if (!prs_align(ps))
1576 return False;
1578 if(!prs_ntstatus("status", ps, depth, &r_q->status))
1579 return False;
1581 return True;
1585 /*******************************************************************
1586 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
1587 ********************************************************************/
1589 BOOL lsa_io_q_unk_get_connuser(char *desc, LSA_Q_UNK_GET_CONNUSER *q_c, prs_struct *ps, int depth)
1591 prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
1592 depth++;
1594 if(!prs_align(ps))
1595 return False;
1597 if(!prs_uint32("ptr_srvname", ps, depth, &q_c->ptr_srvname))
1598 return False;
1600 if(!smb_io_unistr2("uni2_srvname", &q_c->uni2_srvname, q_c->ptr_srvname, ps, depth)) /* server name to be looked up */
1601 return False;
1603 if (!prs_align(ps))
1604 return False;
1606 if(!prs_uint32("unk1", ps, depth, &q_c->unk1))
1607 return False;
1608 if(!prs_uint32("unk2", ps, depth, &q_c->unk2))
1609 return False;
1610 if(!prs_uint32("unk3", ps, depth, &q_c->unk3))
1611 return False;
1613 /* Don't bother to read or write at present... */
1614 return True;
1617 /*******************************************************************
1618 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
1619 ********************************************************************/
1621 BOOL lsa_io_r_unk_get_connuser(char *desc, LSA_R_UNK_GET_CONNUSER *r_c, prs_struct *ps, int depth)
1623 prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
1624 depth++;
1626 if(!prs_align(ps))
1627 return False;
1629 if(!prs_uint32("ptr_user_name", ps, depth, &r_c->ptr_user_name))
1630 return False;
1631 if(!smb_io_unihdr("hdr_user_name", &r_c->hdr_user_name, ps, depth))
1632 return False;
1633 if(!smb_io_unistr2("uni2_user_name", &r_c->uni2_user_name, r_c->ptr_user_name, ps, depth))
1634 return False;
1636 if (!prs_align(ps))
1637 return False;
1639 if(!prs_uint32("unk1", ps, depth, &r_c->unk1))
1640 return False;
1642 if(!prs_uint32("ptr_dom_name", ps, depth, &r_c->ptr_dom_name))
1643 return False;
1644 if(!smb_io_unihdr("hdr_dom_name", &r_c->hdr_dom_name, ps, depth))
1645 return False;
1646 if(!smb_io_unistr2("uni2_dom_name", &r_c->uni2_dom_name, r_c->ptr_dom_name, ps, depth))
1647 return False;
1649 if (!prs_align(ps))
1650 return False;
1652 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1653 return False;
1655 return True;
1658 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
1660 memcpy(&trn->pol, hnd, sizeof(trn->pol));
1662 init_dom_sid2(&trn->sid, sid);
1663 trn->access = desired_access;
1666 /*******************************************************************
1667 Reads or writes an LSA_Q_OPENACCOUNT structure.
1668 ********************************************************************/
1670 BOOL lsa_io_q_open_account(char *desc, LSA_Q_OPENACCOUNT *r_c, prs_struct *ps, int depth)
1672 prs_debug(ps, depth, desc, "lsa_io_q_open_account");
1673 depth++;
1675 if(!prs_align(ps))
1676 return False;
1678 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
1679 return False;
1681 if(!smb_io_dom_sid2("sid", &r_c->sid, ps, depth)) /* domain SID */
1682 return False;
1684 if(!prs_uint32("access", ps, depth, &r_c->access))
1685 return False;
1687 return True;
1690 /*******************************************************************
1691 Reads or writes an LSA_R_OPENACCOUNT structure.
1692 ********************************************************************/
1694 BOOL lsa_io_r_open_account(char *desc, LSA_R_OPENACCOUNT *r_c, prs_struct *ps, int depth)
1696 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
1697 depth++;
1699 if(!prs_align(ps))
1700 return False;
1702 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
1703 return False;
1705 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1706 return False;
1708 return True;
1712 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
1714 memcpy(&trn->pol, hnd, sizeof(trn->pol));
1718 /*******************************************************************
1719 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
1720 ********************************************************************/
1722 BOOL lsa_io_q_enum_privsaccount(char *desc, LSA_Q_ENUMPRIVSACCOUNT *r_c, prs_struct *ps, int depth)
1724 prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
1725 depth++;
1727 if(!prs_align(ps))
1728 return False;
1730 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
1731 return False;
1733 return True;
1736 /*******************************************************************
1737 Reads or writes an LUID structure.
1738 ********************************************************************/
1740 BOOL lsa_io_luid(char *desc, LUID *r_c, prs_struct *ps, int depth)
1742 prs_debug(ps, depth, desc, "lsa_io_luid");
1743 depth++;
1745 if(!prs_align(ps))
1746 return False;
1748 if(!prs_uint32("low", ps, depth, &r_c->low))
1749 return False;
1751 if(!prs_uint32("high", ps, depth, &r_c->high))
1752 return False;
1754 return True;
1757 /*******************************************************************
1758 Reads or writes an LUID_ATTR structure.
1759 ********************************************************************/
1761 BOOL lsa_io_luid_attr(char *desc, LUID_ATTR *r_c, prs_struct *ps, int depth)
1763 prs_debug(ps, depth, desc, "lsa_io_luid_attr");
1764 depth++;
1766 if(!prs_align(ps))
1767 return False;
1769 if (!lsa_io_luid(desc, &r_c->luid, ps, depth))
1770 return False;
1772 if(!prs_uint32("attr", ps, depth, &r_c->attr))
1773 return False;
1775 return True;
1778 /*******************************************************************
1779 Reads or writes an PRIVILEGE_SET structure.
1780 ********************************************************************/
1782 BOOL lsa_io_privilege_set(char *desc, PRIVILEGE_SET *r_c, prs_struct *ps, int depth)
1784 uint32 i;
1786 prs_debug(ps, depth, desc, "lsa_io_privilege_set");
1787 depth++;
1789 if(!prs_align(ps))
1790 return False;
1792 if(!prs_uint32("count", ps, depth, &r_c->count))
1793 return False;
1794 if(!prs_uint32("control", ps, depth, &r_c->control))
1795 return False;
1797 for (i=0; i<r_c->count; i++) {
1798 if (!lsa_io_luid_attr(desc, &r_c->set[i], ps, depth))
1799 return False;
1802 return True;
1805 void init_lsa_r_enum_privsaccount(LSA_R_ENUMPRIVSACCOUNT *r_u, LUID_ATTR *set, uint32 count, uint32 control)
1807 r_u->ptr=1;
1808 r_u->count=count;
1809 r_u->set.set=set;
1810 r_u->set.count=count;
1811 r_u->set.control=control;
1812 DEBUG(10,("init_lsa_r_enum_privsaccount: %d %d privileges\n", r_u->count, r_u->set.count));
1815 /*******************************************************************
1816 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
1817 ********************************************************************/
1819 BOOL lsa_io_r_enum_privsaccount(char *desc, LSA_R_ENUMPRIVSACCOUNT *r_c, prs_struct *ps, int depth)
1821 prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
1822 depth++;
1824 if(!prs_align(ps))
1825 return False;
1827 if(!prs_uint32("ptr", ps, depth, &r_c->ptr))
1828 return False;
1830 if (r_c->ptr!=0) {
1831 if(!prs_uint32("count", ps, depth, &r_c->count))
1832 return False;
1834 /* malloc memory if unmarshalling here */
1836 if (UNMARSHALLING(ps) && r_c->count!=0) {
1837 if (!(r_c->set.set = (LUID_ATTR *)prs_alloc_mem(ps,sizeof(LUID_ATTR) * r_c->count)))
1838 return False;
1842 if(!lsa_io_privilege_set(desc, &r_c->set, ps, depth))
1843 return False;
1846 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1847 return False;
1849 return True;
1854 /*******************************************************************
1855 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
1856 ********************************************************************/
1858 BOOL lsa_io_q_getsystemaccount(char *desc, LSA_Q_GETSYSTEMACCOUNT *r_c, prs_struct *ps, int depth)
1860 prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
1861 depth++;
1863 if(!prs_align(ps))
1864 return False;
1866 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
1867 return False;
1869 return True;
1872 /*******************************************************************
1873 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
1874 ********************************************************************/
1876 BOOL lsa_io_r_getsystemaccount(char *desc, LSA_R_GETSYSTEMACCOUNT *r_c, prs_struct *ps, int depth)
1878 prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
1879 depth++;
1881 if(!prs_align(ps))
1882 return False;
1884 if(!prs_uint32("access", ps, depth, &r_c->access))
1885 return False;
1887 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1888 return False;
1890 return True;
1894 /*******************************************************************
1895 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
1896 ********************************************************************/
1898 BOOL lsa_io_q_setsystemaccount(char *desc, LSA_Q_SETSYSTEMACCOUNT *r_c, prs_struct *ps, int depth)
1900 prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
1901 depth++;
1903 if(!prs_align(ps))
1904 return False;
1906 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
1907 return False;
1909 if(!prs_uint32("access", ps, depth, &r_c->access))
1910 return False;
1912 return True;
1915 /*******************************************************************
1916 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
1917 ********************************************************************/
1919 BOOL lsa_io_r_setsystemaccount(char *desc, LSA_R_SETSYSTEMACCOUNT *r_c, prs_struct *ps, int depth)
1921 prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
1922 depth++;
1924 if(!prs_align(ps))
1925 return False;
1927 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1928 return False;
1930 return True;
1934 void init_lsa_q_lookupprivvalue(LSA_Q_LOOKUPPRIVVALUE *trn, POLICY_HND *hnd, char *name)
1936 int len_name = strlen(name);
1937 memcpy(&trn->pol, hnd, sizeof(trn->pol));
1939 if(len_name == 0)
1940 len_name = 1;
1942 init_uni_hdr(&trn->hdr_right, len_name);
1943 init_unistr2(&trn->uni2_right, name, len_name);
1946 /*******************************************************************
1947 Reads or writes an LSA_Q_LOOKUPPRIVVALUE structure.
1948 ********************************************************************/
1950 BOOL lsa_io_q_lookupprivvalue(char *desc, LSA_Q_LOOKUPPRIVVALUE *r_c, prs_struct *ps, int depth)
1952 prs_debug(ps, depth, desc, "lsa_io_q_lookupprivvalue");
1953 depth++;
1955 if(!prs_align(ps))
1956 return False;
1958 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
1959 return False;
1960 if(!smb_io_unihdr ("hdr_name", &r_c->hdr_right, ps, depth))
1961 return False;
1962 if(!smb_io_unistr2("uni2_right", &r_c->uni2_right, r_c->hdr_right.buffer, ps, depth))
1963 return False;
1965 return True;
1968 /*******************************************************************
1969 Reads or writes an LSA_R_LOOKUPPRIVVALUE structure.
1970 ********************************************************************/
1972 BOOL lsa_io_r_lookupprivvalue(char *desc, LSA_R_LOOKUPPRIVVALUE *r_c, prs_struct *ps, int depth)
1974 prs_debug(ps, depth, desc, "lsa_io_r_lookupprivvalue");
1975 depth++;
1977 if(!prs_align(ps))
1978 return False;
1980 if(!lsa_io_luid("luid", &r_c->luid, ps, depth))
1981 return False;
1983 if(!prs_ntstatus("status", ps, depth, &r_c->status))
1984 return False;
1986 return True;
1990 /*******************************************************************
1991 Reads or writes an LSA_Q_ADDPRIVS structure.
1992 ********************************************************************/
1994 BOOL lsa_io_q_addprivs(char *desc, LSA_Q_ADDPRIVS *r_c, prs_struct *ps, int depth)
1996 prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
1997 depth++;
1999 if(!prs_align(ps))
2000 return False;
2002 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
2003 return False;
2005 if(!prs_uint32("count", ps, depth, &r_c->count))
2006 return False;
2008 if (UNMARSHALLING(ps) && r_c->count!=0) {
2009 if (!(r_c->set.set = (LUID_ATTR *)prs_alloc_mem(ps,sizeof(LUID_ATTR) * r_c->count)))
2010 return False;
2013 if(!lsa_io_privilege_set(desc, &r_c->set, ps, depth))
2014 return False;
2016 return True;
2019 /*******************************************************************
2020 Reads or writes an LSA_R_ADDPRIVS structure.
2021 ********************************************************************/
2023 BOOL lsa_io_r_addprivs(char *desc, LSA_R_ADDPRIVS *r_c, prs_struct *ps, int depth)
2025 prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
2026 depth++;
2028 if(!prs_align(ps))
2029 return False;
2031 if(!prs_ntstatus("status", ps, depth, &r_c->status))
2032 return False;
2034 return True;
2037 /*******************************************************************
2038 Reads or writes an LSA_Q_REMOVEPRIVS structure.
2039 ********************************************************************/
2041 BOOL lsa_io_q_removeprivs(char *desc, LSA_Q_REMOVEPRIVS *r_c, prs_struct *ps, int depth)
2043 prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
2044 depth++;
2046 if(!prs_align(ps))
2047 return False;
2049 if(!smb_io_pol_hnd("pol", &r_c->pol, ps, depth))
2050 return False;
2052 if(!prs_uint32("allrights", ps, depth, &r_c->allrights))
2053 return False;
2055 if(!prs_uint32("ptr", ps, depth, &r_c->ptr))
2056 return False;
2059 * JFM: I'm not sure at all if the count is inside the ptr
2060 * never seen one with ptr=0
2063 if (r_c->ptr!=0) {
2064 if(!prs_uint32("count", ps, depth, &r_c->count))
2065 return False;
2067 if (UNMARSHALLING(ps) && r_c->count!=0) {
2068 if (!(r_c->set.set = (LUID_ATTR *)prs_alloc_mem(ps,sizeof(LUID_ATTR) * r_c->count)))
2069 return False;
2072 if(!lsa_io_privilege_set(desc, &r_c->set, ps, depth))
2073 return False;
2076 return True;
2079 /*******************************************************************
2080 Reads or writes an LSA_R_REMOVEPRIVS structure.
2081 ********************************************************************/
2083 BOOL lsa_io_r_removeprivs(char *desc, LSA_R_REMOVEPRIVS *r_c, prs_struct *ps, int depth)
2085 prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
2086 depth++;
2088 if(!prs_align(ps))
2089 return False;
2091 if(!prs_ntstatus("status", ps, depth, &r_c->status))
2092 return False;
2094 return True;
2097 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
2099 POLICY_HND zero_pol;
2101 ZERO_STRUCT(zero_pol);
2102 return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );