2 * Unix SMB/Netbios implementation.
4 * RPC Pipe client / server routines
5 * Copyright (C) Andrew Tridgell 1992-1997,
6 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
7 * Copyright (C) Paul Ashton 1997.
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 extern int DEBUGLEVEL
;
29 static TALLOC_CTX
*parse_misc_talloc
= NULL
;
31 /******************************************************************* a
32 free up temporary memory - called from the main loop
33 ********************************************************************/
35 void parse_talloc_free(void)
37 if (!parse_misc_talloc
)
39 talloc_destroy(parse_misc_talloc
);
40 parse_misc_talloc
= NULL
;
43 /*******************************************************************
44 Reads or writes a UTIME type.
45 ********************************************************************/
47 static BOOL
smb_io_utime(char *desc
, UTIME
*t
, prs_struct
*ps
, int depth
)
52 prs_debug(ps
, depth
, desc
, "smb_io_utime");
58 if(!prs_uint32 ("time", ps
, depth
, &t
->time
))
64 /*******************************************************************
65 Reads or writes an NTTIME structure.
66 ********************************************************************/
68 BOOL
smb_io_time(char *desc
, NTTIME
*nttime
, prs_struct
*ps
, int depth
)
73 prs_debug(ps
, depth
, desc
, "smb_io_time");
79 if(!prs_uint32("low ", ps
, depth
, &nttime
->low
)) /* low part */
81 if(!prs_uint32("high", ps
, depth
, &nttime
->high
)) /* high part */
87 /*******************************************************************
88 Reads or writes a LOOKUP_LEVEL structure.
89 ********************************************************************/
91 BOOL
smb_io_lookup_level(char *desc
, LOOKUP_LEVEL
*level
, prs_struct
*ps
, int depth
)
96 prs_debug(ps
, depth
, desc
, "smb_io_lookup_level");
101 if(!prs_uint16("value", ps
, depth
, &level
->value
))
109 /*******************************************************************
110 Gets an enumeration handle from an ENUM_HND structure.
111 ********************************************************************/
113 uint32
get_enum_hnd(ENUM_HND
*enh
)
115 return (enh
&& enh
->ptr_hnd
!= 0) ? enh
->handle
: 0;
118 /*******************************************************************
119 Inits an ENUM_HND structure.
120 ********************************************************************/
122 void init_enum_hnd(ENUM_HND
*enh
, uint32 hnd
)
124 DEBUG(5,("smb_io_enum_hnd\n"));
126 enh
->ptr_hnd
= (hnd
!= 0) ? 1 : 0;
130 /*******************************************************************
131 Reads or writes an ENUM_HND structure.
132 ********************************************************************/
134 BOOL
smb_io_enum_hnd(char *desc
, ENUM_HND
*hnd
, prs_struct
*ps
, int depth
)
139 prs_debug(ps
, depth
, desc
, "smb_io_enum_hnd");
145 if(!prs_uint32("ptr_hnd", ps
, depth
, &hnd
->ptr_hnd
)) /* pointer */
148 if (hnd
->ptr_hnd
!= 0) {
149 if(!prs_uint32("handle ", ps
, depth
, &hnd
->handle
)) /* enum handle */
156 /*******************************************************************
157 Reads or writes a DOM_SID structure.
158 ********************************************************************/
160 BOOL
smb_io_dom_sid(char *desc
, DOM_SID
*sid
, prs_struct
*ps
, int depth
)
167 prs_debug(ps
, depth
, desc
, "smb_io_dom_sid");
173 if(!prs_uint8 ("sid_rev_num", ps
, depth
, &sid
->sid_rev_num
))
175 if(!prs_uint8 ("num_auths ", ps
, depth
, &sid
->num_auths
))
178 for (i
= 0; i
< 6; i
++)
181 slprintf(tmp
, sizeof(tmp
) - 1, "id_auth[%d] ", i
);
182 if(!prs_uint8 (tmp
, ps
, depth
, &sid
->id_auth
[i
]))
186 /* oops! XXXX should really issue a warning here... */
187 if (sid
->num_auths
> MAXSUBAUTHS
)
188 sid
->num_auths
= MAXSUBAUTHS
;
190 if(!prs_uint32s(False
, "sub_auths ", ps
, depth
, sid
->sub_auths
, sid
->num_auths
))
196 /*******************************************************************
197 Inits a DOM_SID structure.
199 BIG NOTE: this function only does SIDS where the identauth is not >= 2^32
200 identauth >= 2^32 can be detected because it will be specified in hex
201 ********************************************************************/
203 void init_dom_sid(DOM_SID
*sid
, char *str_sid
)
211 DEBUG(4,("netlogon domain SID: none\n"));
212 sid
->sid_rev_num
= 0;
217 pstrcpy(domsid
, str_sid
);
219 DEBUG(4,("init_dom_sid %d SID: %s\n", __LINE__
, domsid
));
221 /* assume, but should check, that domsid starts "S-" */
222 p
= strtok(domsid
+2,"-");
223 sid
->sid_rev_num
= atoi(p
);
225 /* identauth in decimal should be < 2^32 */
226 /* identauth in hex should be >= 2^32 */
227 identauth
= atoi(strtok(0,"-"));
229 DEBUG(4,("netlogon rev %d\n", sid
->sid_rev_num
));
230 DEBUG(4,("netlogon %s ia %d\n", p
, identauth
));
234 sid
->id_auth
[2] = (identauth
& 0xff000000) >> 24;
235 sid
->id_auth
[3] = (identauth
& 0x00ff0000) >> 16;
236 sid
->id_auth
[4] = (identauth
& 0x0000ff00) >> 8;
237 sid
->id_auth
[5] = (identauth
& 0x000000ff);
241 while ((p
= strtok(0, "-")) != NULL
&& sid
->num_auths
< MAXSUBAUTHS
)
242 sid
->sub_auths
[sid
->num_auths
++] = atoi(p
);
244 DEBUG(4,("init_dom_sid: %d SID: %s\n", __LINE__
, domsid
));
247 /*******************************************************************
248 Inits a DOM_SID2 structure.
249 ********************************************************************/
251 void init_dom_sid2(DOM_SID2
*sid2
, DOM_SID
*sid
)
254 sid2
->num_auths
= sid2
->sid
.num_auths
;
257 /*******************************************************************
258 Reads or writes a DOM_SID2 structure.
259 ********************************************************************/
261 BOOL
smb_io_dom_sid2(char *desc
, DOM_SID2
*sid
, prs_struct
*ps
, int depth
)
266 prs_debug(ps
, depth
, desc
, "smb_io_dom_sid2");
272 if(!prs_uint32("num_auths", ps
, depth
, &sid
->num_auths
))
275 if(!smb_io_dom_sid("sid", &sid
->sid
, ps
, depth
))
281 /*******************************************************************
282 creates a STRHDR structure.
283 ********************************************************************/
285 void init_str_hdr(STRHDR
*hdr
, int max_len
, int len
, uint32 buffer
)
287 hdr
->str_max_len
= max_len
;
288 hdr
->str_str_len
= len
;
289 hdr
->buffer
= buffer
;
292 /*******************************************************************
293 Reads or writes a STRHDR structure.
294 ********************************************************************/
296 BOOL
smb_io_strhdr(char *desc
, STRHDR
*hdr
, prs_struct
*ps
, int depth
)
301 prs_debug(ps
, depth
, desc
, "smb_io_strhdr");
306 if(!prs_uint16("str_str_len", ps
, depth
, &hdr
->str_str_len
))
308 if(!prs_uint16("str_max_len", ps
, depth
, &hdr
->str_max_len
))
310 if(!prs_uint32("buffer ", ps
, depth
, &hdr
->buffer
))
316 /*******************************************************************
317 Inits a UNIHDR structure.
318 ********************************************************************/
320 void init_uni_hdr(UNIHDR
*hdr
, int len
)
322 hdr
->uni_str_len
= 2 * len
;
323 hdr
->uni_max_len
= 2 * len
;
324 hdr
->buffer
= len
!= 0 ? 1 : 0;
327 /*******************************************************************
328 Reads or writes a UNIHDR structure.
329 ********************************************************************/
331 BOOL
smb_io_unihdr(char *desc
, UNIHDR
*hdr
, prs_struct
*ps
, int depth
)
336 prs_debug(ps
, depth
, desc
, "smb_io_unihdr");
342 if(!prs_uint16("uni_str_len", ps
, depth
, &hdr
->uni_str_len
))
344 if(!prs_uint16("uni_max_len", ps
, depth
, &hdr
->uni_max_len
))
346 if(!prs_uint32("buffer ", ps
, depth
, &hdr
->buffer
))
352 /*******************************************************************
353 Inits a BUFHDR structure.
354 ********************************************************************/
356 void init_buf_hdr(BUFHDR
*hdr
, int max_len
, int len
)
358 hdr
->buf_max_len
= max_len
;
362 /*******************************************************************
363 prs_uint16 wrapper. Call this and it sets up a pointer to where the
364 uint16 should be stored, or gets the size if reading.
365 ********************************************************************/
367 BOOL
smb_io_hdrbuf_pre(char *desc
, BUFHDR
*hdr
, prs_struct
*ps
, int depth
, uint32
*offset
)
369 (*offset
) = prs_offset(ps
);
374 if(!smb_io_hdrbuf(desc
, hdr
, ps
, depth
))
381 if(!prs_set_offset(ps
, prs_offset(ps
) + (sizeof(uint32
) * 2)))
388 /*******************************************************************
389 smb_io_hdrbuf wrapper. Call this and it retrospectively stores the size.
390 Does nothing on reading, as that is already handled by ...._pre()
391 ********************************************************************/
393 BOOL
smb_io_hdrbuf_post(char *desc
, BUFHDR
*hdr
, prs_struct
*ps
, int depth
,
394 uint32 ptr_hdrbuf
, uint32 max_len
, uint32 len
)
397 /* writing: go back and do a retrospective job. i hate this */
399 uint32 old_offset
= prs_offset(ps
);
401 init_buf_hdr(hdr
, max_len
, len
);
402 if(!prs_set_offset(ps
, ptr_hdrbuf
))
404 if(!smb_io_hdrbuf(desc
, hdr
, ps
, depth
))
407 if(!prs_set_offset(ps
, old_offset
))
414 /*******************************************************************
415 Reads or writes a BUFHDR structure.
416 ********************************************************************/
418 BOOL
smb_io_hdrbuf(char *desc
, BUFHDR
*hdr
, prs_struct
*ps
, int depth
)
423 prs_debug(ps
, depth
, desc
, "smb_io_hdrbuf");
429 if(!prs_uint32("buf_max_len", ps
, depth
, &hdr
->buf_max_len
))
431 if(!prs_uint32("buf_len ", ps
, depth
, &hdr
->buf_len
))
437 /*******************************************************************
438 creates a UNIHDR2 structure.
439 ********************************************************************/
441 void init_uni_hdr2(UNIHDR2
*hdr
, int len
)
443 init_uni_hdr(&hdr
->unihdr
, len
);
444 hdr
->buffer
= (len
> 0) ? 1 : 0;
447 /*******************************************************************
448 Reads or writes a UNIHDR2 structure.
449 ********************************************************************/
451 BOOL
smb_io_unihdr2(char *desc
, UNIHDR2
*hdr2
, prs_struct
*ps
, int depth
)
456 prs_debug(ps
, depth
, desc
, "smb_io_unihdr2");
462 if(!smb_io_unihdr("hdr", &hdr2
->unihdr
, ps
, depth
))
464 if(!prs_uint32("buffer", ps
, depth
, &hdr2
->buffer
))
470 /*******************************************************************
471 Inits a UNISTR structure.
472 ********************************************************************/
474 void init_unistr(UNISTR
*str
, const char *buf
)
484 len
= strlen(buf
) + 1;
486 if (!parse_misc_talloc
)
487 parse_misc_talloc
= talloc_init();
489 if (len
< MAX_UNISTRLEN
)
491 len
*= sizeof(uint16
);
493 str
->buffer
= (uint16
*)talloc(parse_misc_talloc
, len
);
494 if (str
->buffer
== NULL
)
495 smb_panic("init_unistr: malloc fail\n");
497 /* store the string (null-terminated copy) */
498 dos_struni2((char *)str
->buffer
, buf
, len
);
501 /*******************************************************************
502 reads or writes a UNISTR structure.
503 XXXX NOTE: UNISTR structures NEED to be null-terminated.
504 ********************************************************************/
506 BOOL
smb_io_unistr(char *desc
, UNISTR
*uni
, prs_struct
*ps
, int depth
)
511 prs_debug(ps
, depth
, desc
, "smb_io_unistr");
516 if(!prs_unistr("unistr", ps
, depth
, uni
))
522 /*******************************************************************
523 Allocate the BUFFER3 memory.
524 ********************************************************************/
526 static void create_buffer3(BUFFER3
*str
, size_t len
)
528 if (!parse_misc_talloc
)
529 parse_misc_talloc
= talloc_init();
531 if (len
< MAX_BUFFERLEN
)
534 str
->buffer
= talloc(parse_misc_talloc
, len
);
535 if (str
->buffer
== NULL
)
536 smb_panic("create_buffer3: malloc fail\n");
540 /*******************************************************************
541 Inits a BUFFER3 structure from a uint32
542 ********************************************************************/
544 void init_buffer3_uint32(BUFFER3
*str
, uint32 val
)
548 /* set up string lengths. */
549 str
->buf_max_len
= sizeof(uint32
);
550 str
->buf_len
= sizeof(uint32
);
552 create_buffer3(str
, sizeof(uint32
));
553 SIVAL(str
->buffer
, 0, val
);
556 /*******************************************************************
557 Inits a BUFFER3 structure.
558 ********************************************************************/
560 void init_buffer3_str(BUFFER3
*str
, char *buf
, int len
)
564 /* set up string lengths. */
565 str
->buf_max_len
= len
* 2;
566 str
->buf_len
= len
* 2;
568 create_buffer3(str
, str
->buf_max_len
);
570 /* store the string (null-terminated 8 bit chars into 16 bit chars) */
571 dos_struni2((char *)str
->buffer
, buf
, str
->buf_max_len
);
574 /*******************************************************************
575 Inits a BUFFER3 structure from a hex string.
576 ********************************************************************/
578 void init_buffer3_hex(BUFFER3
*str
, char *buf
)
581 create_buffer3(str
, strlen(buf
));
582 str
->buf_max_len
= str
->buf_len
= strhex_to_str((char *)str
->buffer
, sizeof(str
->buffer
), buf
);
585 /*******************************************************************
586 Inits a BUFFER3 structure.
587 ********************************************************************/
589 void init_buffer3_bytes(BUFFER3
*str
, uint8
*buf
, int len
)
593 /* max buffer size (allocated size) */
594 str
->buf_max_len
= len
;
596 create_buffer3(str
, len
);
597 memcpy(str
->buffer
, buf
, len
);
599 str
->buf_len
= buf
!= NULL
? len
: 0;
602 /*******************************************************************
603 Reads or writes a BUFFER3 structure.
604 the uni_max_len member tells you how large the buffer is.
605 the uni_str_len member tells you how much of the buffer is really used.
606 ********************************************************************/
608 BOOL
smb_io_buffer3(char *desc
, BUFFER3
*buf3
, prs_struct
*ps
, int depth
)
613 prs_debug(ps
, depth
, desc
, "smb_io_buffer3");
619 if(!prs_uint32("uni_max_len", ps
, depth
, &buf3
->buf_max_len
))
622 if (UNMARSHALLING(ps
)) {
623 buf3
->buffer
= prs_alloc_mem(ps
, buf3
->buf_max_len
);
624 if (buf3
->buffer
== NULL
)
628 if(!prs_uint8s(True
, "buffer ", ps
, depth
, buf3
->buffer
, buf3
->buf_max_len
))
631 if(!prs_uint32("buf_len ", ps
, depth
, &buf3
->buf_len
))
637 /*******************************************************************
638 reads or writes a BUFFER5 structure.
639 the buf_len member tells you how large the buffer is.
640 ********************************************************************/
641 BOOL
smb_io_buffer5(char *desc
, BUFFER5
*buf5
, prs_struct
*ps
, int depth
)
643 prs_debug(ps
, depth
, desc
, "smb_io_buffer5");
646 if (buf5
== NULL
) return False
;
649 prs_uint32("buf_len", ps
, depth
, &(buf5
->buf_len
));
651 /* reading: alloc the buffer first */
652 if ( UNMARSHALLING(ps
) ) {
653 buf5
->buffer
=(uint16
*)prs_alloc_mem(ps
, sizeof(uint16
)*buf5
->buf_len
);
654 if (buf5
->buffer
== NULL
)
658 prs_uint16s(True
, "buffer", ps
, depth
, buf5
->buffer
, buf5
->buf_len
);
663 /*******************************************************************
664 Inits a BUFFER2 structure.
665 ********************************************************************/
667 void init_buffer2(BUFFER2
*str
, uint8
*buf
, int len
)
671 /* max buffer size (allocated size) */
672 str
->buf_max_len
= len
;
674 str
->buf_len
= buf
!= NULL
? len
: 0;
677 if (!parse_misc_talloc
)
678 parse_misc_talloc
= talloc_init();
680 if (len
< MAX_BUFFERLEN
)
682 str
->buffer
= talloc(parse_misc_talloc
, len
);
683 if (str
->buffer
== NULL
)
684 smb_panic("init_buffer2: malloc fail\n");
685 memcpy(str
->buffer
, buf
, MIN(str
->buf_len
, len
));
689 /*******************************************************************
690 Reads or writes a BUFFER2 structure.
691 the uni_max_len member tells you how large the buffer is.
692 the uni_str_len member tells you how much of the buffer is really used.
693 ********************************************************************/
695 BOOL
smb_io_buffer2(char *desc
, BUFFER2
*buf2
, uint32 buffer
, prs_struct
*ps
, int depth
)
702 prs_debug(ps
, depth
, desc
, "smb_io_buffer2");
708 if(!prs_uint32("uni_max_len", ps
, depth
, &buf2
->buf_max_len
))
710 if(!prs_uint32("undoc ", ps
, depth
, &buf2
->undoc
))
712 if(!prs_uint32("buf_len ", ps
, depth
, &buf2
->buf_len
))
715 /* buffer advanced by indicated length of string
716 NOT by searching for null-termination */
718 if(!prs_buffer2(True
, "buffer ", ps
, depth
, buf2
))
723 prs_debug(ps
, depth
, desc
, "smb_io_buffer2 - NULL");
725 memset((char *)buf2
, '\0', sizeof(*buf2
));
731 /*******************************************************************
732 creates a UNISTR2 structure: sets up the buffer, too
733 ********************************************************************/
735 void init_buf_unistr2(UNISTR2
*str
, uint32
*ptr
, const char *buf
)
740 init_unistr2(str
, buf
, strlen(buf
)+1);
745 init_unistr2(str
, "", 0);
750 /*******************************************************************
751 Copies a UNISTR2 structure.
752 ********************************************************************/
754 void copy_unistr2(UNISTR2
*str
, UNISTR2
*from
)
757 /* set up string lengths. add one if string is not null-terminated */
758 str
->uni_max_len
= from
->uni_max_len
;
759 str
->undoc
= from
->undoc
;
760 str
->uni_str_len
= from
->uni_str_len
;
762 if (from
->buffer
== NULL
)
765 /* the string buffer is allocated to the maximum size
766 (the the length of the source string) to prevent
767 reallocation of memory. */
768 if (str
->buffer
== NULL
) {
769 size_t len
= from
->uni_max_len
* sizeof(uint16
);
771 if (!parse_misc_talloc
)
772 parse_misc_talloc
= talloc_init();
774 if (len
< MAX_UNISTRLEN
)
776 len
*= sizeof(uint16
);
778 str
->buffer
= (uint16
*)talloc(parse_misc_talloc
, len
);
779 if ((str
->buffer
== NULL
) && (len
> 0 ))
781 smb_panic("copy_unistr2: malloc fail\n");
786 /* copy the string */
787 memcpy(str
->buffer
, from
->buffer
, from
->uni_max_len
*sizeof(uint16
));
790 /*******************************************************************
791 Creates a STRING2 structure.
792 ********************************************************************/
794 void init_string2(STRING2
*str
, char *buf
, int len
)
798 /* set up string lengths. */
799 str
->str_max_len
= len
;
801 str
->str_str_len
= len
;
803 /* store the string */
805 if (!parse_misc_talloc
)
806 parse_misc_talloc
= talloc_init();
808 if (len
< MAX_STRINGLEN
)
809 alloc_len
= MAX_STRINGLEN
;
810 str
->buffer
= talloc(parse_misc_talloc
, alloc_len
);
811 if (str
->buffer
== NULL
)
812 smb_panic("init_string2: malloc fail\n");
813 memcpy(str
->buffer
, buf
, len
);
817 /*******************************************************************
818 Reads or writes a STRING2 structure.
819 XXXX NOTE: STRING2 structures need NOT be null-terminated.
820 the str_str_len member tells you how long the string is;
821 the str_max_len member tells you how large the buffer is.
822 ********************************************************************/
824 BOOL
smb_io_string2(char *desc
, STRING2
*str2
, uint32 buffer
, prs_struct
*ps
, int depth
)
831 prs_debug(ps
, depth
, desc
, "smb_io_string2");
837 if(!prs_uint32("str_max_len", ps
, depth
, &str2
->str_max_len
))
839 if(!prs_uint32("undoc ", ps
, depth
, &str2
->undoc
))
841 if(!prs_uint32("str_str_len", ps
, depth
, &str2
->str_str_len
))
844 /* buffer advanced by indicated length of string
845 NOT by searching for null-termination */
846 if(!prs_string2(True
, "buffer ", ps
, depth
, str2
))
851 prs_debug(ps
, depth
, desc
, "smb_io_string2 - NULL");
853 memset((char *)str2
, '\0', sizeof(*str2
));
860 /*******************************************************************
861 Inits a UNISTR2 structure.
862 ********************************************************************/
864 void init_unistr2(UNISTR2
*str
, const char *buf
, size_t len
)
868 /* set up string lengths. */
869 str
->uni_max_len
= (uint32
)len
;
871 str
->uni_str_len
= (uint32
)len
;
873 if (!parse_misc_talloc
)
874 parse_misc_talloc
= talloc_init();
876 if (len
< MAX_UNISTRLEN
)
878 len
*= sizeof(uint16
);
880 str
->buffer
= (uint16
*)talloc(parse_misc_talloc
, len
);
881 if ((str
->buffer
== NULL
) && (len
> 0))
883 smb_panic("init_unistr2: malloc fail\n");
887 /* store the string (null-terminated 8 bit chars into 16 bit chars) */
888 dos_struni2((char *)str
->buffer
, buf
, len
);
891 /*******************************************************************
892 Inits a UNISTR2 structure from a UNISTR
893 ********************************************************************/
894 void init_unistr2_from_unistr (UNISTR2
*to
, UNISTR
*from
)
899 /* the destination UNISTR2 should never be NULL.
900 if it is it is a programming error */
902 /* if the source UNISTR is NULL, then zero out
903 the destination string and return */
905 if ((from
== NULL
) || (from
->buffer
== NULL
))
908 /* get the length; UNISTR must be NULL terminated */
910 while ((from
->buffer
)[i
]!='\0')
912 i
++; /* one more to catch the terminating NULL */
913 /* is this necessary -- jerry? I need to think */
915 /* set up string lengths; uni_max_len is set to i+1
916 because we need to account for the final NULL termination */
921 if (!parse_misc_talloc
)
922 parse_misc_talloc
= talloc_init();
924 /* allocate the space and copy the string buffer */
925 to
->buffer
= (uint16
*)talloc(parse_misc_talloc
, sizeof(uint16
)*(to
->uni_str_len
));
926 if (to
->buffer
== NULL
)
927 smb_panic("init_unistr2_from_unistr: malloc fail\n");
928 memcpy(to
->buffer
, from
->buffer
, to
->uni_max_len
*sizeof(uint16
));
934 /*******************************************************************
935 Reads or writes a UNISTR2 structure.
936 XXXX NOTE: UNISTR2 structures need NOT be null-terminated.
937 the uni_str_len member tells you how long the string is;
938 the uni_max_len member tells you how large the buffer is.
939 ********************************************************************/
941 BOOL
smb_io_unistr2(char *desc
, UNISTR2
*uni2
, uint32 buffer
, prs_struct
*ps
, int depth
)
948 prs_debug(ps
, depth
, desc
, "smb_io_unistr2");
954 if(!prs_uint32("uni_max_len", ps
, depth
, &uni2
->uni_max_len
))
956 if(!prs_uint32("undoc ", ps
, depth
, &uni2
->undoc
))
958 if(!prs_uint32("uni_str_len", ps
, depth
, &uni2
->uni_str_len
))
961 /* buffer advanced by indicated length of string
962 NOT by searching for null-termination */
963 if(!prs_unistr2(True
, "buffer ", ps
, depth
, uni2
))
968 prs_debug(ps
, depth
, desc
, "smb_io_unistr2 - NULL");
970 memset((char *)uni2
, '\0', sizeof(*uni2
));
977 /*******************************************************************
978 Inits a DOM_RID2 structure.
979 ********************************************************************/
981 void init_dom_rid2(DOM_RID2
*rid2
, uint32 rid
, uint8 type
, uint32 idx
)
988 /*******************************************************************
989 Reads or writes a DOM_RID2 structure.
990 ********************************************************************/
992 BOOL
smb_io_dom_rid2(char *desc
, DOM_RID2
*rid2
, prs_struct
*ps
, int depth
)
997 prs_debug(ps
, depth
, desc
, "smb_io_dom_rid2");
1003 if(!prs_uint8("type ", ps
, depth
, &rid2
->type
))
1007 if(!prs_uint32("rid ", ps
, depth
, &rid2
->rid
))
1009 if(!prs_uint32("rid_idx", ps
, depth
, &rid2
->rid_idx
))
1015 /*******************************************************************
1016 creates a DOM_RID3 structure.
1017 ********************************************************************/
1019 void init_dom_rid3(DOM_RID3
*rid3
, uint32 rid
, uint8 type
)
1023 rid3
->ptr_type
= 0x1; /* non-zero, basically. */
1028 /*******************************************************************
1029 reads or writes a DOM_RID3 structure.
1030 ********************************************************************/
1032 BOOL
smb_io_dom_rid3(char *desc
, DOM_RID3
*rid3
, prs_struct
*ps
, int depth
)
1037 prs_debug(ps
, depth
, desc
, "smb_io_dom_rid3");
1043 if(!prs_uint32("rid ", ps
, depth
, &rid3
->rid
))
1045 if(!prs_uint32("type1 ", ps
, depth
, &rid3
->type1
))
1047 if(!prs_uint32("ptr_type", ps
, depth
, &rid3
->ptr_type
))
1049 if(!prs_uint32("type2 ", ps
, depth
, &rid3
->type2
))
1051 if(!prs_uint32("unk ", ps
, depth
, &rid3
->unk
))
1057 /*******************************************************************
1058 Inits a DOM_RID4 structure.
1059 ********************************************************************/
1061 void init_dom_rid4(DOM_RID4
*rid4
, uint16 unknown
, uint16 attr
, uint32 rid
)
1063 rid4
->unknown
= unknown
;
1068 /*******************************************************************
1069 Inits a DOM_CLNT_SRV structure.
1070 ********************************************************************/
1072 static void init_clnt_srv(DOM_CLNT_SRV
*log
, char *logon_srv
, char *comp_name
)
1074 DEBUG(5,("init_clnt_srv: %d\n", __LINE__
));
1076 if (logon_srv
!= NULL
) {
1077 log
->undoc_buffer
= 1;
1078 init_unistr2(&log
->uni_logon_srv
, logon_srv
, strlen(logon_srv
)+1);
1080 log
->undoc_buffer
= 0;
1083 if (comp_name
!= NULL
) {
1084 log
->undoc_buffer2
= 1;
1085 init_unistr2(&log
->uni_comp_name
, comp_name
, strlen(comp_name
)+1);
1087 log
->undoc_buffer2
= 0;
1091 /*******************************************************************
1092 Inits or writes a DOM_CLNT_SRV structure.
1093 ********************************************************************/
1095 static BOOL
smb_io_clnt_srv(char *desc
, DOM_CLNT_SRV
*log
, prs_struct
*ps
, int depth
)
1100 prs_debug(ps
, depth
, desc
, "smb_io_clnt_srv");
1106 if(!prs_uint32("undoc_buffer ", ps
, depth
, &log
->undoc_buffer
))
1109 if (log
->undoc_buffer
!= 0) {
1110 if(!smb_io_unistr2("unistr2", &log
->uni_logon_srv
, log
->undoc_buffer
, ps
, depth
))
1117 if(!prs_uint32("undoc_buffer2", ps
, depth
, &log
->undoc_buffer2
))
1120 if (log
->undoc_buffer2
!= 0) {
1121 if(!smb_io_unistr2("unistr2", &log
->uni_comp_name
, log
->undoc_buffer2
, ps
, depth
))
1128 /*******************************************************************
1129 Inits a DOM_LOG_INFO structure.
1130 ********************************************************************/
1132 void init_log_info(DOM_LOG_INFO
*log
, char *logon_srv
, char *acct_name
,
1133 uint16 sec_chan
, char *comp_name
)
1135 DEBUG(5,("make_log_info %d\n", __LINE__
));
1137 log
->undoc_buffer
= 1;
1139 init_unistr2(&log
->uni_logon_srv
, logon_srv
, strlen(logon_srv
)+1);
1140 init_unistr2(&log
->uni_acct_name
, acct_name
, strlen(acct_name
)+1);
1142 log
->sec_chan
= sec_chan
;
1144 init_unistr2(&log
->uni_comp_name
, comp_name
, strlen(comp_name
)+1);
1147 /*******************************************************************
1148 Reads or writes a DOM_LOG_INFO structure.
1149 ********************************************************************/
1151 BOOL
smb_io_log_info(char *desc
, DOM_LOG_INFO
*log
, prs_struct
*ps
, int depth
)
1156 prs_debug(ps
, depth
, desc
, "smb_io_log_info");
1162 if(!prs_uint32("undoc_buffer", ps
, depth
, &log
->undoc_buffer
))
1165 if(!smb_io_unistr2("unistr2", &log
->uni_logon_srv
, True
, ps
, depth
))
1167 if(!smb_io_unistr2("unistr2", &log
->uni_acct_name
, True
, ps
, depth
))
1170 if(!prs_uint16("sec_chan", ps
, depth
, &log
->sec_chan
))
1173 if(!smb_io_unistr2("unistr2", &log
->uni_comp_name
, True
, ps
, depth
))
1179 /*******************************************************************
1180 Reads or writes a DOM_CHAL structure.
1181 ********************************************************************/
1183 BOOL
smb_io_chal(char *desc
, DOM_CHAL
*chal
, prs_struct
*ps
, int depth
)
1188 prs_debug(ps
, depth
, desc
, "smb_io_chal");
1194 if(!prs_uint8s (False
, "data", ps
, depth
, chal
->data
, 8))
1200 /*******************************************************************
1201 Reads or writes a DOM_CRED structure.
1202 ********************************************************************/
1204 BOOL
smb_io_cred(char *desc
, DOM_CRED
*cred
, prs_struct
*ps
, int depth
)
1209 prs_debug(ps
, depth
, desc
, "smb_io_cred");
1215 if(!smb_io_chal ("", &cred
->challenge
, ps
, depth
))
1217 if(!smb_io_utime("", &cred
->timestamp
, ps
, depth
))
1223 /*******************************************************************
1224 Inits a DOM_CLNT_INFO2 structure.
1225 ********************************************************************/
1227 void init_clnt_info2(DOM_CLNT_INFO2
*clnt
,
1228 char *logon_srv
, char *comp_name
,
1229 DOM_CRED
*clnt_cred
)
1231 DEBUG(5,("make_clnt_info: %d\n", __LINE__
));
1233 init_clnt_srv(&(clnt
->login
), logon_srv
, comp_name
);
1235 if (clnt_cred
!= NULL
) {
1237 memcpy(&(clnt
->cred
), clnt_cred
, sizeof(clnt
->cred
));
1243 /*******************************************************************
1244 Reads or writes a DOM_CLNT_INFO2 structure.
1245 ********************************************************************/
1247 BOOL
smb_io_clnt_info2(char *desc
, DOM_CLNT_INFO2
*clnt
, prs_struct
*ps
, int depth
)
1252 prs_debug(ps
, depth
, desc
, "smb_io_clnt_info2");
1258 if(!smb_io_clnt_srv("", &clnt
->login
, ps
, depth
))
1264 if(!prs_uint32("ptr_cred", ps
, depth
, &clnt
->ptr_cred
))
1266 if(!smb_io_cred("", &clnt
->cred
, ps
, depth
))
1272 /*******************************************************************
1273 Inits a DOM_CLNT_INFO structure.
1274 ********************************************************************/
1276 void init_clnt_info(DOM_CLNT_INFO
*clnt
,
1277 char *logon_srv
, char *acct_name
,
1278 uint16 sec_chan
, char *comp_name
,
1281 DEBUG(5,("make_clnt_info\n"));
1283 init_log_info(&clnt
->login
, logon_srv
, acct_name
, sec_chan
, comp_name
);
1284 memcpy(&clnt
->cred
, cred
, sizeof(clnt
->cred
));
1287 /*******************************************************************
1288 Reads or writes a DOM_CLNT_INFO structure.
1289 ********************************************************************/
1291 BOOL
smb_io_clnt_info(char *desc
, DOM_CLNT_INFO
*clnt
, prs_struct
*ps
, int depth
)
1296 prs_debug(ps
, depth
, desc
, "smb_io_clnt_info");
1302 if(!smb_io_log_info("", &clnt
->login
, ps
, depth
))
1304 if(!smb_io_cred("", &clnt
->cred
, ps
, depth
))
1310 /*******************************************************************
1311 Inits a DOM_LOGON_ID structure.
1312 ********************************************************************/
1314 void init_logon_id(DOM_LOGON_ID
*log
, uint32 log_id_low
, uint32 log_id_high
)
1316 DEBUG(5,("make_logon_id: %d\n", __LINE__
));
1318 log
->low
= log_id_low
;
1319 log
->high
= log_id_high
;
1322 /*******************************************************************
1323 Reads or writes a DOM_LOGON_ID structure.
1324 ********************************************************************/
1326 BOOL
smb_io_logon_id(char *desc
, DOM_LOGON_ID
*log
, prs_struct
*ps
, int depth
)
1331 prs_debug(ps
, depth
, desc
, "smb_io_logon_id");
1337 if(!prs_uint32("low ", ps
, depth
, &log
->low
))
1339 if(!prs_uint32("high", ps
, depth
, &log
->high
))
1345 /*******************************************************************
1346 Inits an OWF_INFO structure.
1347 ********************************************************************/
1349 void init_owf_info(OWF_INFO
*hash
, uint8 data
[16])
1351 DEBUG(5,("init_owf_info: %d\n", __LINE__
));
1354 memcpy(hash
->data
, data
, sizeof(hash
->data
));
1356 memset((char *)hash
->data
, '\0', sizeof(hash
->data
));
1359 /*******************************************************************
1360 Reads or writes an OWF_INFO structure.
1361 ********************************************************************/
1363 BOOL
smb_io_owf_info(char *desc
, OWF_INFO
*hash
, prs_struct
*ps
, int depth
)
1368 prs_debug(ps
, depth
, desc
, "smb_io_owf_info");
1374 if(!prs_uint8s (False
, "data", ps
, depth
, hash
->data
, 16))
1380 /*******************************************************************
1381 Reads or writes a DOM_GID structure.
1382 ********************************************************************/
1384 BOOL
smb_io_gid(char *desc
, DOM_GID
*gid
, prs_struct
*ps
, int depth
)
1389 prs_debug(ps
, depth
, desc
, "smb_io_gid");
1395 if(!prs_uint32("g_rid", ps
, depth
, &gid
->g_rid
))
1397 if(!prs_uint32("attr ", ps
, depth
, &gid
->attr
))
1403 /*******************************************************************
1404 Reads or writes an POLICY_HND structure.
1405 ********************************************************************/
1407 BOOL
smb_io_pol_hnd(char *desc
, POLICY_HND
*pol
, prs_struct
*ps
, int depth
)
1412 prs_debug(ps
, depth
, desc
, "smb_io_pol_hnd");
1418 if(!prs_uint8s (False
, "data", ps
, depth
, pol
->data
, POL_HND_SIZE
))
1424 /*******************************************************************
1425 Reads or writes a dom query structure.
1426 ********************************************************************/
1428 static BOOL
smb_io_dom_query(char *desc
, DOM_QUERY
*d_q
, prs_struct
*ps
, int depth
)
1433 prs_debug(ps
, depth
, desc
, "smb_io_dom_query");
1439 if(!prs_uint16("uni_dom_max_len", ps
, depth
, &d_q
->uni_dom_max_len
)) /* domain name string length * 2 */
1441 if(!prs_uint16("uni_dom_str_len", ps
, depth
, &d_q
->uni_dom_str_len
)) /* domain name string length * 2 */
1444 if(!prs_uint32("buffer_dom_name", ps
, depth
, &d_q
->buffer_dom_name
)) /* undocumented domain name string buffer pointer */
1446 if(!prs_uint32("buffer_dom_sid ", ps
, depth
, &d_q
->buffer_dom_sid
)) /* undocumented domain SID string buffer pointer */
1449 if(!smb_io_unistr2("unistr2", &d_q
->uni_domain_name
, d_q
->buffer_dom_name
, ps
, depth
)) /* domain name (unicode string) */
1455 if (d_q
->buffer_dom_sid
!= 0) {
1456 if(!smb_io_dom_sid2("", &d_q
->dom_sid
, ps
, depth
)) /* domain SID */
1459 memset((char *)&d_q
->dom_sid
, '\0', sizeof(d_q
->dom_sid
));
1465 /*******************************************************************
1466 Reads or writes a dom query structure.
1467 ********************************************************************/
1469 BOOL
smb_io_dom_query_3(char *desc
, DOM_QUERY_3
*d_q
, prs_struct
*ps
, int depth
)
1471 return smb_io_dom_query("", d_q
, ps
, depth
);
1474 /*******************************************************************
1475 Reads or writes a dom query structure.
1476 ********************************************************************/
1478 BOOL
smb_io_dom_query_5(char *desc
, DOM_QUERY_3
*d_q
, prs_struct
*ps
, int depth
)
1480 return smb_io_dom_query("", d_q
, ps
, depth
);
1484 /*******************************************************************
1485 Reads or writes a UNISTR3 structure.
1486 ********************************************************************/
1488 BOOL
smb_io_unistr3(char *desc
, UNISTR3
*name
, prs_struct
*ps
, int depth
)
1493 prs_debug(ps
, depth
, desc
, "smb_io_unistr3");
1499 if(!prs_uint32("uni_str_len", ps
, depth
, &name
->uni_str_len
))
1502 /* don't know if len is specified by uni_str_len member... */
1503 /* assume unicode string is unicode-null-terminated, instead */
1505 if(!prs_unistr3(True
, "unistr", name
, ps
, depth
))
1512 /*******************************************************************
1513 Stream a uint64_struct
1514 ********************************************************************/
1515 BOOL
prs_uint64(char *name
, prs_struct
*ps
, int depth
, UINT64_S
*data64
)
1517 return prs_uint32(name
, ps
, depth
+1, &data64
->low
) &&
1518 prs_uint32(name
, ps
, depth
+1, &data64
->high
);