define SYSV for IRIX
[Samba.git] / source / rpc_parse / parse_misc.c
blob17a96fff80c596da3516ff313f196a5d0052d52c
1 /*
2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997.
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #include "includes.h"
25 #undef DBGC_CLASS
26 #define DBGC_CLASS DBGC_RPC_PARSE
28 /****************************************************************************
29 A temporary TALLOC context for things like unistrs, that is valid for
30 the life of a complete RPC call.
31 ****************************************************************************/
33 static TALLOC_CTX *current_rpc_talloc = NULL;
35 TALLOC_CTX *get_current_rpc_talloc(void)
37 return current_rpc_talloc;
40 void set_current_rpc_talloc( TALLOC_CTX *ctx)
42 current_rpc_talloc = ctx;
45 static TALLOC_CTX *main_loop_talloc = NULL;
47 /*******************************************************************
48 free up temporary memory - called from the main loop
49 ********************************************************************/
51 void main_loop_talloc_free(void)
53 if (!main_loop_talloc)
54 return;
55 talloc_destroy(main_loop_talloc);
56 main_loop_talloc = NULL;
59 /*******************************************************************
60 Get a talloc context that is freed in the main loop...
61 ********************************************************************/
63 TALLOC_CTX *main_loop_talloc_get(void)
65 if (!main_loop_talloc) {
66 main_loop_talloc = talloc_init("main loop talloc (mainly parse_misc)");
67 if (!main_loop_talloc)
68 smb_panic("main_loop_talloc: malloc fail\n");
71 return main_loop_talloc;
74 /*******************************************************************
75 Try and get a talloc context. Get the rpc one if possible, else
76 get the main loop one. The main loop one is more dangerous as it
77 goes away between packets, the rpc one will stay around for as long
78 as a current RPC lasts.
79 ********************************************************************/
81 TALLOC_CTX *get_talloc_ctx(void)
83 TALLOC_CTX *tc = get_current_rpc_talloc();
85 if (tc)
86 return tc;
87 return main_loop_talloc_get();
90 /*******************************************************************
91 Reads or writes a UTIME type.
92 ********************************************************************/
94 static BOOL smb_io_utime(const char *desc, UTIME *t, prs_struct *ps, int depth)
96 if (t == NULL)
97 return False;
99 prs_debug(ps, depth, desc, "smb_io_utime");
100 depth++;
102 if(!prs_align(ps))
103 return False;
105 if(!prs_uint32 ("time", ps, depth, &t->time))
106 return False;
108 return True;
111 /*******************************************************************
112 Reads or writes an NTTIME structure.
113 ********************************************************************/
115 BOOL smb_io_time(const char *desc, NTTIME *nttime, prs_struct *ps, int depth)
117 if (nttime == NULL)
118 return False;
120 prs_debug(ps, depth, desc, "smb_io_time");
121 depth++;
123 if(!prs_align(ps))
124 return False;
126 if(!prs_uint32("low ", ps, depth, &nttime->low)) /* low part */
127 return False;
128 if(!prs_uint32("high", ps, depth, &nttime->high)) /* high part */
129 return False;
131 return True;
134 /*******************************************************************
135 Reads or writes a LOOKUP_LEVEL structure.
136 ********************************************************************/
138 BOOL smb_io_lookup_level(const char *desc, LOOKUP_LEVEL *level, prs_struct *ps, int depth)
140 if (level == NULL)
141 return False;
143 prs_debug(ps, depth, desc, "smb_io_lookup_level");
144 depth++;
146 if(!prs_align(ps))
147 return False;
148 if(!prs_uint16("value", ps, depth, &level->value))
149 return False;
150 if(!prs_align(ps))
151 return False;
153 return True;
156 /*******************************************************************
157 Gets an enumeration handle from an ENUM_HND structure.
158 ********************************************************************/
160 uint32 get_enum_hnd(ENUM_HND *enh)
162 return (enh && enh->ptr_hnd != 0) ? enh->handle : 0;
165 /*******************************************************************
166 Inits an ENUM_HND structure.
167 ********************************************************************/
169 void init_enum_hnd(ENUM_HND *enh, uint32 hnd)
171 DEBUG(5,("smb_io_enum_hnd\n"));
173 enh->ptr_hnd = (hnd != 0) ? 1 : 0;
174 enh->handle = hnd;
177 /*******************************************************************
178 Reads or writes an ENUM_HND structure.
179 ********************************************************************/
181 BOOL smb_io_enum_hnd(const char *desc, ENUM_HND *hnd, prs_struct *ps, int depth)
183 if (hnd == NULL)
184 return False;
186 prs_debug(ps, depth, desc, "smb_io_enum_hnd");
187 depth++;
189 if(!prs_align(ps))
190 return False;
192 if(!prs_uint32("ptr_hnd", ps, depth, &hnd->ptr_hnd)) /* pointer */
193 return False;
195 if (hnd->ptr_hnd != 0) {
196 if(!prs_uint32("handle ", ps, depth, &hnd->handle )) /* enum handle */
197 return False;
200 return True;
203 /*******************************************************************
204 Reads or writes a DOM_SID structure.
205 ********************************************************************/
207 BOOL smb_io_dom_sid(const char *desc, DOM_SID *sid, prs_struct *ps, int depth)
209 int i;
211 if (sid == NULL)
212 return False;
214 prs_debug(ps, depth, desc, "smb_io_dom_sid");
215 depth++;
217 if(!prs_uint8 ("sid_rev_num", ps, depth, &sid->sid_rev_num))
218 return False;
220 if(!prs_uint8 ("num_auths ", ps, depth, &sid->num_auths))
221 return False;
223 for (i = 0; i < 6; i++)
225 fstring tmp;
226 slprintf(tmp, sizeof(tmp) - 1, "id_auth[%d] ", i);
227 if(!prs_uint8 (tmp, ps, depth, &sid->id_auth[i]))
228 return False;
231 /* oops! XXXX should really issue a warning here... */
232 if (sid->num_auths > MAXSUBAUTHS)
233 sid->num_auths = MAXSUBAUTHS;
235 if(!prs_uint32s(False, "sub_auths ", ps, depth, sid->sub_auths, sid->num_auths))
236 return False;
238 return True;
241 /*******************************************************************
242 Inits a DOM_SID structure.
244 BIG NOTE: this function only does SIDS where the identauth is not >= 2^32
245 identauth >= 2^32 can be detected because it will be specified in hex
246 ********************************************************************/
248 void init_dom_sid(DOM_SID *sid, const char *str_sid)
250 pstring domsid;
251 int identauth;
252 char *p;
254 if (str_sid == NULL) {
255 DEBUG(4,("netlogon domain SID: none\n"));
256 sid->sid_rev_num = 0;
257 sid->num_auths = 0;
258 return;
261 pstrcpy(domsid, str_sid);
263 DEBUG(4,("init_dom_sid %d SID: %s\n", __LINE__, domsid));
265 /* assume, but should check, that domsid starts "S-" */
266 p = strtok(domsid+2,"-");
267 sid->sid_rev_num = atoi(p);
269 /* identauth in decimal should be < 2^32 */
270 /* identauth in hex should be >= 2^32 */
271 identauth = atoi(strtok(0,"-"));
273 DEBUG(4,("netlogon rev %d\n", sid->sid_rev_num));
274 DEBUG(4,("netlogon %s ia %d\n", p, identauth));
276 sid->id_auth[0] = 0;
277 sid->id_auth[1] = 0;
278 sid->id_auth[2] = (identauth & 0xff000000) >> 24;
279 sid->id_auth[3] = (identauth & 0x00ff0000) >> 16;
280 sid->id_auth[4] = (identauth & 0x0000ff00) >> 8;
281 sid->id_auth[5] = (identauth & 0x000000ff);
283 sid->num_auths = 0;
285 while ((p = strtok(0, "-")) != NULL && sid->num_auths < MAXSUBAUTHS)
286 sid->sub_auths[sid->num_auths++] = atoi(p);
288 DEBUG(4,("init_dom_sid: %d SID: %s\n", __LINE__, domsid));
291 /*******************************************************************
292 Inits a DOM_SID2 structure.
293 ********************************************************************/
295 void init_dom_sid2(DOM_SID2 *sid2, const DOM_SID *sid)
297 sid2->sid = *sid;
298 sid2->num_auths = sid2->sid.num_auths;
301 /*******************************************************************
302 Reads or writes a DOM_SID2 structure.
303 ********************************************************************/
305 BOOL smb_io_dom_sid2(const char *desc, DOM_SID2 *sid, prs_struct *ps, int depth)
307 if (sid == NULL)
308 return False;
310 prs_debug(ps, depth, desc, "smb_io_dom_sid2");
311 depth++;
313 if(!prs_align(ps))
314 return False;
316 if(!prs_uint32("num_auths", ps, depth, &sid->num_auths))
317 return False;
319 if(!smb_io_dom_sid("sid", &sid->sid, ps, depth))
320 return False;
322 return True;
325 /*******************************************************************
326 creates a STRHDR structure.
327 ********************************************************************/
329 void init_str_hdr(STRHDR *hdr, int max_len, int len, uint32 buffer)
331 hdr->str_max_len = max_len;
332 hdr->str_str_len = len;
333 hdr->buffer = buffer;
336 /*******************************************************************
337 Reads or writes a STRHDR structure.
338 ********************************************************************/
340 BOOL smb_io_strhdr(const char *desc, STRHDR *hdr, prs_struct *ps, int depth)
342 if (hdr == NULL)
343 return False;
345 prs_debug(ps, depth, desc, "smb_io_strhdr");
346 depth++;
348 prs_align(ps);
350 if(!prs_uint16("str_str_len", ps, depth, &hdr->str_str_len))
351 return False;
352 if(!prs_uint16("str_max_len", ps, depth, &hdr->str_max_len))
353 return False;
354 if(!prs_uint32("buffer ", ps, depth, &hdr->buffer))
355 return False;
357 return True;
360 /*******************************************************************
361 Inits a UNIHDR structure.
362 ********************************************************************/
364 void init_uni_hdr(UNIHDR *hdr, int len)
366 hdr->uni_str_len = 2 * len;
367 hdr->uni_max_len = 2 * len;
368 hdr->buffer = len != 0 ? 1 : 0;
371 /*******************************************************************
372 Reads or writes a UNIHDR structure.
373 ********************************************************************/
375 BOOL smb_io_unihdr(const char *desc, UNIHDR *hdr, prs_struct *ps, int depth)
377 if (hdr == NULL)
378 return False;
380 prs_debug(ps, depth, desc, "smb_io_unihdr");
381 depth++;
383 if(!prs_align(ps))
384 return False;
386 if(!prs_uint16("uni_str_len", ps, depth, &hdr->uni_str_len))
387 return False;
388 if(!prs_uint16("uni_max_len", ps, depth, &hdr->uni_max_len))
389 return False;
390 if(!prs_uint32("buffer ", ps, depth, &hdr->buffer))
391 return False;
393 return True;
396 /*******************************************************************
397 Inits a BUFHDR structure.
398 ********************************************************************/
400 void init_buf_hdr(BUFHDR *hdr, int max_len, int len)
402 hdr->buf_max_len = max_len;
403 hdr->buf_len = len;
406 /*******************************************************************
407 prs_uint16 wrapper. Call this and it sets up a pointer to where the
408 uint16 should be stored, or gets the size if reading.
409 ********************************************************************/
411 BOOL smb_io_hdrbuf_pre(const char *desc, BUFHDR *hdr, prs_struct *ps, int depth, uint32 *offset)
413 (*offset) = prs_offset(ps);
414 if (ps->io) {
416 /* reading. */
418 if(!smb_io_hdrbuf(desc, hdr, ps, depth))
419 return False;
421 } else {
423 /* writing. */
425 if(!prs_set_offset(ps, prs_offset(ps) + (sizeof(uint32) * 2)))
426 return False;
429 return True;
432 /*******************************************************************
433 smb_io_hdrbuf wrapper. Call this and it retrospectively stores the size.
434 Does nothing on reading, as that is already handled by ...._pre()
435 ********************************************************************/
437 BOOL smb_io_hdrbuf_post(const char *desc, BUFHDR *hdr, prs_struct *ps, int depth,
438 uint32 ptr_hdrbuf, uint32 max_len, uint32 len)
440 if (!ps->io) {
441 /* writing: go back and do a retrospective job. i hate this */
443 uint32 old_offset = prs_offset(ps);
445 init_buf_hdr(hdr, max_len, len);
446 if(!prs_set_offset(ps, ptr_hdrbuf))
447 return False;
448 if(!smb_io_hdrbuf(desc, hdr, ps, depth))
449 return False;
451 if(!prs_set_offset(ps, old_offset))
452 return False;
455 return True;
458 /*******************************************************************
459 Reads or writes a BUFHDR structure.
460 ********************************************************************/
462 BOOL smb_io_hdrbuf(const char *desc, BUFHDR *hdr, prs_struct *ps, int depth)
464 if (hdr == NULL)
465 return False;
467 prs_debug(ps, depth, desc, "smb_io_hdrbuf");
468 depth++;
470 if(!prs_align(ps))
471 return False;
473 if(!prs_uint32("buf_max_len", ps, depth, &hdr->buf_max_len))
474 return False;
475 if(!prs_uint32("buf_len ", ps, depth, &hdr->buf_len))
476 return False;
478 return True;
481 /*******************************************************************
482 creates a UNIHDR2 structure.
483 ********************************************************************/
485 void init_uni_hdr2(UNIHDR2 *hdr, int len)
487 init_uni_hdr(&hdr->unihdr, len);
488 hdr->buffer = (len > 0) ? 1 : 0;
491 /*******************************************************************
492 Reads or writes a UNIHDR2 structure.
493 ********************************************************************/
495 BOOL smb_io_unihdr2(const char *desc, UNIHDR2 *hdr2, prs_struct *ps, int depth)
497 if (hdr2 == NULL)
498 return False;
500 prs_debug(ps, depth, desc, "smb_io_unihdr2");
501 depth++;
503 if(!prs_align(ps))
504 return False;
506 if(!smb_io_unihdr("hdr", &hdr2->unihdr, ps, depth))
507 return False;
508 if(!prs_uint32("buffer", ps, depth, &hdr2->buffer))
509 return False;
511 return True;
514 /*******************************************************************
515 Inits a UNISTR structure.
516 ********************************************************************/
518 void init_unistr(UNISTR *str, const char *buf)
520 size_t len;
522 if (buf == NULL) {
523 str->buffer = NULL;
524 return;
528 len = strlen(buf) + 1;
530 if (len < MAX_UNISTRLEN)
531 len = MAX_UNISTRLEN;
532 len *= sizeof(uint16);
534 str->buffer = (uint16 *)talloc_zero(get_talloc_ctx(), len);
535 if (str->buffer == NULL)
536 smb_panic("init_unistr: malloc fail\n");
538 rpcstr_push(str->buffer, buf, len, STR_TERMINATE);
541 /*******************************************************************
542 reads or writes a UNISTR structure.
543 XXXX NOTE: UNISTR structures NEED to be null-terminated.
544 ********************************************************************/
546 BOOL smb_io_unistr(const char *desc, UNISTR *uni, prs_struct *ps, int depth)
548 if (uni == NULL)
549 return False;
551 prs_debug(ps, depth, desc, "smb_io_unistr");
552 depth++;
554 if(!prs_unistr("unistr", ps, depth, uni))
555 return False;
557 return True;
560 /*******************************************************************
561 Allocate the BUFFER3 memory.
562 ********************************************************************/
564 static void create_buffer3(BUFFER3 *str, size_t len)
566 if (len < MAX_BUFFERLEN)
567 len = MAX_BUFFERLEN;
569 str->buffer = talloc_zero(get_talloc_ctx(), len);
570 if (str->buffer == NULL)
571 smb_panic("create_buffer3: talloc fail\n");
575 /*******************************************************************
576 Inits a BUFFER3 structure from a uint32
577 ********************************************************************/
579 void init_buffer3_uint32(BUFFER3 *str, uint32 val)
581 ZERO_STRUCTP(str);
583 /* set up string lengths. */
584 str->buf_max_len = sizeof(uint32);
585 str->buf_len = sizeof(uint32);
587 create_buffer3(str, sizeof(uint32));
588 SIVAL(str->buffer, 0, val);
591 /*******************************************************************
592 Inits a BUFFER3 structure.
593 ********************************************************************/
595 void init_buffer3_str(BUFFER3 *str, const char *buf, int len)
597 ZERO_STRUCTP(str);
599 /* set up string lengths. */
600 str->buf_max_len = len * 2;
601 str->buf_len = len * 2;
603 create_buffer3(str, str->buf_max_len);
605 rpcstr_push(str->buffer, buf, str->buf_max_len, STR_TERMINATE);
609 /*******************************************************************
610 Inits a BUFFER3 structure from a hex string.
611 ********************************************************************/
613 void init_buffer3_hex(BUFFER3 *str, const char *buf)
615 ZERO_STRUCTP(str);
616 create_buffer3(str, strlen(buf));
617 str->buf_max_len = str->buf_len = strhex_to_str((char *)str->buffer, sizeof(str->buffer), buf);
620 /*******************************************************************
621 Inits a BUFFER3 structure.
622 ********************************************************************/
624 void init_buffer3_bytes(BUFFER3 *str, uint8 *buf, int len)
626 ZERO_STRUCTP(str);
628 /* max buffer size (allocated size) */
629 str->buf_max_len = len;
630 if (buf != NULL) {
631 create_buffer3(str, len);
632 memcpy(str->buffer, buf, len);
634 str->buf_len = buf != NULL ? len : 0;
637 /*******************************************************************
638 Reads or writes a BUFFER3 structure.
639 the uni_max_len member tells you how large the buffer is.
640 the uni_str_len member tells you how much of the buffer is really used.
641 ********************************************************************/
643 BOOL smb_io_buffer3(const char *desc, BUFFER3 *buf3, prs_struct *ps, int depth)
645 if (buf3 == NULL)
646 return False;
648 prs_debug(ps, depth, desc, "smb_io_buffer3");
649 depth++;
651 if(!prs_align(ps))
652 return False;
654 if(!prs_uint32("uni_max_len", ps, depth, &buf3->buf_max_len))
655 return False;
657 if (UNMARSHALLING(ps)) {
658 buf3->buffer = (unsigned char *)prs_alloc_mem(ps, buf3->buf_max_len);
659 if (buf3->buffer == NULL)
660 return False;
663 if(!prs_uint8s(True, "buffer ", ps, depth, buf3->buffer, buf3->buf_max_len))
664 return False;
666 if(!prs_uint32("buf_len ", ps, depth, &buf3->buf_len))
667 return False;
669 return True;
672 /*******************************************************************
673 reads or writes a BUFFER5 structure.
674 the buf_len member tells you how large the buffer is.
675 ********************************************************************/
676 BOOL smb_io_buffer5(const char *desc, BUFFER5 *buf5, prs_struct *ps, int depth)
678 prs_debug(ps, depth, desc, "smb_io_buffer5");
679 depth++;
681 if (buf5 == NULL) return False;
683 if(!prs_align(ps))
684 return False;
685 if(!prs_uint32("buf_len", ps, depth, &buf5->buf_len))
686 return False;
688 if(buf5->buf_len) {
689 if(!prs_buffer5(True, "buffer" , ps, depth, buf5))
690 return False;
693 return True;
696 /*******************************************************************
697 Inits a BUFFER2 structure.
698 ********************************************************************/
700 void init_buffer2(BUFFER2 *str, const uint8 *buf, size_t len)
702 ZERO_STRUCTP(str);
704 /* max buffer size (allocated size) */
705 str->buf_max_len = len;
706 str->undoc = 0;
707 str->buf_len = buf != NULL ? len : 0;
709 if (buf != NULL) {
710 if (len < MAX_BUFFERLEN)
711 len = MAX_BUFFERLEN;
712 str->buffer = talloc_zero(get_talloc_ctx(), len);
713 if (str->buffer == NULL)
714 smb_panic("init_buffer2: talloc fail\n");
715 memcpy(str->buffer, buf, MIN(str->buf_len, len));
719 /*******************************************************************
720 Reads or writes a BUFFER2 structure.
721 the uni_max_len member tells you how large the buffer is.
722 the uni_str_len member tells you how much of the buffer is really used.
723 ********************************************************************/
725 BOOL smb_io_buffer2(const char *desc, BUFFER2 *buf2, uint32 buffer, prs_struct *ps, int depth)
727 if (buf2 == NULL)
728 return False;
730 if (buffer) {
732 prs_debug(ps, depth, desc, "smb_io_buffer2");
733 depth++;
735 if(!prs_align(ps))
736 return False;
738 if(!prs_uint32("uni_max_len", ps, depth, &buf2->buf_max_len))
739 return False;
740 if(!prs_uint32("undoc ", ps, depth, &buf2->undoc))
741 return False;
742 if(!prs_uint32("buf_len ", ps, depth, &buf2->buf_len))
743 return False;
745 /* buffer advanced by indicated length of string
746 NOT by searching for null-termination */
748 if(!prs_buffer2(True, "buffer ", ps, depth, buf2))
749 return False;
751 } else {
753 prs_debug(ps, depth, desc, "smb_io_buffer2 - NULL");
754 depth++;
755 memset((char *)buf2, '\0', sizeof(*buf2));
758 return True;
761 /*******************************************************************
762 creates a UNISTR2 structure: sets up the buffer, too
763 ********************************************************************/
765 void init_buf_unistr2(UNISTR2 *str, uint32 *ptr, const char *buf)
767 if (buf != NULL) {
769 *ptr = 1;
770 init_unistr2(str, buf, strlen(buf)+1);
772 } else {
774 *ptr = 0;
775 init_unistr2(str, "", 0);
780 /*******************************************************************
781 Copies a UNISTR2 structure.
782 ********************************************************************/
784 void copy_unistr2(UNISTR2 *str, const UNISTR2 *from)
787 /* set up string lengths. add one if string is not null-terminated */
788 str->uni_max_len = from->uni_max_len;
789 str->undoc = from->undoc;
790 str->uni_str_len = from->uni_str_len;
792 if (from->buffer == NULL)
793 return;
795 /* the string buffer is allocated to the maximum size
796 (the the length of the source string) to prevent
797 reallocation of memory. */
798 if (str->buffer == NULL) {
799 size_t len = from->uni_max_len * sizeof(uint16);
801 if (len < MAX_UNISTRLEN)
802 len = MAX_UNISTRLEN;
803 len *= sizeof(uint16);
805 str->buffer = (uint16 *)talloc_zero(get_talloc_ctx(), len);
806 if ((str->buffer == NULL) && (len > 0 ))
808 smb_panic("copy_unistr2: talloc fail\n");
809 return;
813 /* copy the string */
814 memcpy(str->buffer, from->buffer, from->uni_max_len*sizeof(uint16));
817 /*******************************************************************
818 Creates a STRING2 structure.
819 ********************************************************************/
821 void init_string2(STRING2 *str, const char *buf, int max_len, int str_len)
823 int alloc_len = 0;
825 /* set up string lengths. */
826 str->str_max_len = max_len;
827 str->undoc = 0;
828 str->str_str_len = str_len;
830 /* store the string */
831 if(str_len != 0) {
832 if (str_len < MAX_STRINGLEN)
833 alloc_len = MAX_STRINGLEN;
834 str->buffer = talloc_zero(get_talloc_ctx(), alloc_len);
835 if (str->buffer == NULL)
836 smb_panic("init_string2: malloc fail\n");
837 memcpy(str->buffer, buf, str_len);
841 /*******************************************************************
842 Reads or writes a STRING2 structure.
843 XXXX NOTE: STRING2 structures need NOT be null-terminated.
844 the str_str_len member tells you how long the string is;
845 the str_max_len member tells you how large the buffer is.
846 ********************************************************************/
848 BOOL smb_io_string2(const char *desc, STRING2 *str2, uint32 buffer, prs_struct *ps, int depth)
850 if (str2 == NULL)
851 return False;
853 if (buffer) {
855 prs_debug(ps, depth, desc, "smb_io_string2");
856 depth++;
858 if(!prs_align(ps))
859 return False;
861 if(!prs_uint32("str_max_len", ps, depth, &str2->str_max_len))
862 return False;
863 if(!prs_uint32("undoc ", ps, depth, &str2->undoc))
864 return False;
865 if(!prs_uint32("str_str_len", ps, depth, &str2->str_str_len))
866 return False;
868 /* buffer advanced by indicated length of string
869 NOT by searching for null-termination */
870 if(!prs_string2(True, "buffer ", ps, depth, str2))
871 return False;
873 } else {
875 prs_debug(ps, depth, desc, "smb_io_string2 - NULL");
876 depth++;
877 memset((char *)str2, '\0', sizeof(*str2));
881 return True;
884 /*******************************************************************
885 Inits a UNISTR2 structure.
886 ********************************************************************/
888 void init_unistr2(UNISTR2 *str, const char *buf, size_t len)
890 ZERO_STRUCTP(str);
892 /* set up string lengths. */
893 str->uni_max_len = (uint32)len;
894 str->undoc = 0;
895 str->uni_str_len = (uint32)len;
897 if (len < MAX_UNISTRLEN)
898 len = MAX_UNISTRLEN;
899 len *= sizeof(uint16);
901 str->buffer = (uint16 *)talloc_zero(get_talloc_ctx(), len);
902 if ((str->buffer == NULL) && (len > 0))
904 smb_panic("init_unistr2: malloc fail\n");
905 return;
909 * don't move this test above ! The UNISTR2 must be initialized !!!
910 * jfm, 7/7/2001.
912 if (buf==NULL)
913 return;
915 rpcstr_push((char *)str->buffer, buf, len, STR_TERMINATE);
918 /**
919 * Inits a UNISTR2 structure.
920 * @param ctx talloc context to allocate string on
921 * @param str pointer to string to create
922 * @param buf UCS2 null-terminated buffer to init from
925 void init_unistr2_w(TALLOC_CTX *ctx, UNISTR2 *str, const smb_ucs2_t *buf)
927 uint32 len = strlen_w(buf);
928 uint32 max_len = len;
929 uint32 alloc_len;
931 ZERO_STRUCTP(str);
933 /* set up string lengths. */
934 str->uni_max_len = len;
935 str->undoc = 0;
936 str->uni_str_len = len;
938 if (max_len < MAX_UNISTRLEN)
939 max_len = MAX_UNISTRLEN;
941 alloc_len = (max_len + 1) * sizeof(uint16);
943 str->buffer = (uint16 *)talloc_zero(ctx, alloc_len);
944 if ((str->buffer == NULL) && (alloc_len > 0))
946 smb_panic("init_unistr2_w: malloc fail\n");
947 return;
951 * don't move this test above ! The UNISTR2 must be initialized !!!
952 * jfm, 7/7/2001.
954 if (buf==NULL)
955 return;
957 /* Yes, this is a strncpy( foo, bar, strlen(bar)) - but as
958 long as the buffer above is talloc()ed correctly then this
959 is the correct thing to do */
960 strncpy_w(str->buffer, buf, len + 1);
963 /*******************************************************************
964 Inits a UNISTR2 structure from a UNISTR
965 ********************************************************************/
966 void init_unistr2_from_unistr (UNISTR2 *to, const UNISTR *from)
969 uint32 i;
971 /* the destination UNISTR2 should never be NULL.
972 if it is it is a programming error */
974 /* if the source UNISTR is NULL, then zero out
975 the destination string and return */
976 ZERO_STRUCTP (to);
977 if ((from == NULL) || (from->buffer == NULL))
978 return;
980 /* get the length; UNISTR must be NULL terminated */
981 i = 0;
982 while ((from->buffer)[i]!='\0')
983 i++;
984 i++; /* one more to catch the terminating NULL */
985 /* is this necessary -- jerry? I need to think */
987 /* set up string lengths; uni_max_len is set to i+1
988 because we need to account for the final NULL termination */
989 to->uni_max_len = i;
990 to->undoc = 0;
991 to->uni_str_len = i;
993 /* allocate the space and copy the string buffer */
994 to->buffer = (uint16 *)talloc_zero(get_talloc_ctx(), sizeof(uint16)*(to->uni_str_len));
995 if (to->buffer == NULL)
996 smb_panic("init_unistr2_from_unistr: malloc fail\n");
997 memcpy(to->buffer, from->buffer, to->uni_max_len*sizeof(uint16));
999 return;
1003 /*******************************************************************
1004 Reads or writes a UNISTR2 structure.
1005 XXXX NOTE: UNISTR2 structures need NOT be null-terminated.
1006 the uni_str_len member tells you how long the string is;
1007 the uni_max_len member tells you how large the buffer is.
1008 ********************************************************************/
1010 BOOL smb_io_unistr2(const char *desc, UNISTR2 *uni2, uint32 buffer, prs_struct *ps, int depth)
1012 if (uni2 == NULL)
1013 return False;
1015 if (buffer) {
1017 prs_debug(ps, depth, desc, "smb_io_unistr2");
1018 depth++;
1020 if(!prs_align(ps))
1021 return False;
1023 if(!prs_uint32("uni_max_len", ps, depth, &uni2->uni_max_len))
1024 return False;
1025 if(!prs_uint32("undoc ", ps, depth, &uni2->undoc))
1026 return False;
1027 if(!prs_uint32("uni_str_len", ps, depth, &uni2->uni_str_len))
1028 return False;
1030 /* buffer advanced by indicated length of string
1031 NOT by searching for null-termination */
1032 if(!prs_unistr2(True, "buffer ", ps, depth, uni2))
1033 return False;
1035 } else {
1037 prs_debug(ps, depth, desc, "smb_io_unistr2 - NULL");
1038 depth++;
1039 memset((char *)uni2, '\0', sizeof(*uni2));
1043 return True;
1048 initialise a UNISTR_ARRAY from a char**
1050 BOOL init_unistr2_array(UNISTR2_ARRAY *array,
1051 uint32 count, const char **strings)
1053 unsigned int i;
1055 array->count = count;
1056 array->ref_id = count?1:0;
1057 if (array->count == 0) {
1058 return True;
1061 array->strings = (UNISTR2_ARRAY_EL *)talloc_zero(get_talloc_ctx(), count * sizeof(UNISTR2_ARRAY_EL));
1062 if (!array->strings) {
1063 return False;
1066 for (i=0;i<count;i++) {
1067 init_unistr2(&array->strings[i].string, strings[i], strlen(strings[i]));
1068 array->strings[i].size = array->strings[i].string.uni_max_len*2;
1069 array->strings[i].length = array->strings[i].size;
1070 array->strings[i].ref_id = 1;
1073 return True;
1076 /*******************************************************************
1077 Reads or writes a UNISTR2_ARRAY structure.
1078 ********************************************************************/
1079 BOOL smb_io_unistr2_array(const char *desc, UNISTR2_ARRAY *array, prs_struct *ps, int depth)
1081 unsigned int i;
1083 prs_debug(ps, depth, desc, "smb_io_unistr2_array");
1084 depth++;
1086 if(!prs_uint32("ref_id", ps, depth, &array->ref_id))
1087 return False;
1089 if (! array->ref_id) {
1090 return True;
1093 if(!prs_uint32("count", ps, depth, &array->count))
1094 return False;
1096 if (array->count == 0) {
1097 return True;
1100 if (UNMARSHALLING(ps)) {
1101 array->strings = talloc_zero(get_talloc_ctx(), array->count * sizeof(array->strings[0]));
1103 if (! array->strings) {
1104 return False;
1107 for (i=0;i<array->count;i++) {
1108 if(!prs_uint16("length", ps, depth, &array->strings[i].length))
1109 return False;
1110 if(!prs_uint16("size", ps, depth, &array->strings[i].size))
1111 return False;
1112 if(!prs_uint32("ref_id", ps, depth, &array->strings[i].ref_id))
1113 return False;
1116 for (i=0;i<array->count;i++) {
1117 if (! smb_io_unistr2("string", &array->strings[i].string, array->strings[i].ref_id, ps, depth))
1118 return False;
1121 return True;
1125 /*******************************************************************
1126 Inits a DOM_RID2 structure.
1127 ********************************************************************/
1129 void init_dom_rid2(DOM_RID2 *rid2, uint32 rid, uint8 type, uint32 idx)
1131 rid2->type = type;
1132 rid2->rid = rid;
1133 rid2->rid_idx = idx;
1136 /*******************************************************************
1137 Reads or writes a DOM_RID2 structure.
1138 ********************************************************************/
1140 BOOL smb_io_dom_rid2(const char *desc, DOM_RID2 *rid2, prs_struct *ps, int depth)
1142 if (rid2 == NULL)
1143 return False;
1145 prs_debug(ps, depth, desc, "smb_io_dom_rid2");
1146 depth++;
1148 if(!prs_align(ps))
1149 return False;
1151 if(!prs_uint8("type ", ps, depth, &rid2->type))
1152 return False;
1153 if(!prs_align(ps))
1154 return False;
1155 if(!prs_uint32("rid ", ps, depth, &rid2->rid))
1156 return False;
1157 if(!prs_uint32("rid_idx", ps, depth, &rid2->rid_idx))
1158 return False;
1160 return True;
1163 /*******************************************************************
1164 creates a DOM_RID3 structure.
1165 ********************************************************************/
1167 void init_dom_rid3(DOM_RID3 *rid3, uint32 rid, uint8 type)
1169 rid3->rid = rid;
1170 rid3->type1 = type;
1171 rid3->ptr_type = 0x1; /* non-zero, basically. */
1172 rid3->type2 = 0x1;
1173 rid3->unk = type;
1176 /*******************************************************************
1177 reads or writes a DOM_RID3 structure.
1178 ********************************************************************/
1180 BOOL smb_io_dom_rid3(const char *desc, DOM_RID3 *rid3, prs_struct *ps, int depth)
1182 if (rid3 == NULL)
1183 return False;
1185 prs_debug(ps, depth, desc, "smb_io_dom_rid3");
1186 depth++;
1188 if(!prs_align(ps))
1189 return False;
1191 if(!prs_uint32("rid ", ps, depth, &rid3->rid))
1192 return False;
1193 if(!prs_uint32("type1 ", ps, depth, &rid3->type1))
1194 return False;
1195 if(!prs_uint32("ptr_type", ps, depth, &rid3->ptr_type))
1196 return False;
1197 if(!prs_uint32("type2 ", ps, depth, &rid3->type2))
1198 return False;
1199 if(!prs_uint32("unk ", ps, depth, &rid3->unk))
1200 return False;
1202 return True;
1205 /*******************************************************************
1206 Inits a DOM_RID4 structure.
1207 ********************************************************************/
1209 void init_dom_rid4(DOM_RID4 *rid4, uint16 unknown, uint16 attr, uint32 rid)
1211 rid4->unknown = unknown;
1212 rid4->attr = attr;
1213 rid4->rid = rid;
1216 /*******************************************************************
1217 Inits a DOM_CLNT_SRV structure.
1218 ********************************************************************/
1220 static void init_clnt_srv(DOM_CLNT_SRV *logcln, const char *logon_srv, const char *comp_name)
1222 DEBUG(5,("init_clnt_srv: %d\n", __LINE__));
1224 if (logon_srv != NULL) {
1225 logcln->undoc_buffer = 1;
1226 init_unistr2(&logcln->uni_logon_srv, logon_srv, strlen(logon_srv)+1);
1227 } else {
1228 logcln->undoc_buffer = 0;
1231 if (comp_name != NULL) {
1232 logcln->undoc_buffer2 = 1;
1233 init_unistr2(&logcln->uni_comp_name, comp_name, strlen(comp_name)+1);
1234 } else {
1235 logcln->undoc_buffer2 = 0;
1239 /*******************************************************************
1240 Inits or writes a DOM_CLNT_SRV structure.
1241 ********************************************************************/
1243 static BOOL smb_io_clnt_srv(const char *desc, DOM_CLNT_SRV *logcln, prs_struct *ps, int depth)
1245 if (logcln == NULL)
1246 return False;
1248 prs_debug(ps, depth, desc, "smb_io_clnt_srv");
1249 depth++;
1251 if(!prs_align(ps))
1252 return False;
1254 if(!prs_uint32("undoc_buffer ", ps, depth, &logcln->undoc_buffer))
1255 return False;
1257 if (logcln->undoc_buffer != 0) {
1258 if(!smb_io_unistr2("unistr2", &logcln->uni_logon_srv, logcln->undoc_buffer, ps, depth))
1259 return False;
1262 if(!prs_align(ps))
1263 return False;
1265 if(!prs_uint32("undoc_buffer2", ps, depth, &logcln->undoc_buffer2))
1266 return False;
1268 if (logcln->undoc_buffer2 != 0) {
1269 if(!smb_io_unistr2("unistr2", &logcln->uni_comp_name, logcln->undoc_buffer2, ps, depth))
1270 return False;
1273 return True;
1276 /*******************************************************************
1277 Inits a DOM_LOG_INFO structure.
1278 ********************************************************************/
1280 void init_log_info(DOM_LOG_INFO *loginfo, const char *logon_srv, const char *acct_name,
1281 uint16 sec_chan, const char *comp_name)
1283 DEBUG(5,("make_log_info %d\n", __LINE__));
1285 loginfo->undoc_buffer = 1;
1287 init_unistr2(&loginfo->uni_logon_srv, logon_srv, strlen(logon_srv)+1);
1288 init_unistr2(&loginfo->uni_acct_name, acct_name, strlen(acct_name)+1);
1290 loginfo->sec_chan = sec_chan;
1292 init_unistr2(&loginfo->uni_comp_name, comp_name, strlen(comp_name)+1);
1295 /*******************************************************************
1296 Reads or writes a DOM_LOG_INFO structure.
1297 ********************************************************************/
1299 BOOL smb_io_log_info(const char *desc, DOM_LOG_INFO *loginfo, prs_struct *ps, int depth)
1301 if (loginfo == NULL)
1302 return False;
1304 prs_debug(ps, depth, desc, "smb_io_log_info");
1305 depth++;
1307 if(!prs_align(ps))
1308 return False;
1310 if(!prs_uint32("undoc_buffer", ps, depth, &loginfo->undoc_buffer))
1311 return False;
1313 if(!smb_io_unistr2("unistr2", &loginfo->uni_logon_srv, True, ps, depth))
1314 return False;
1315 if(!smb_io_unistr2("unistr2", &loginfo->uni_acct_name, True, ps, depth))
1316 return False;
1318 if(!prs_uint16("sec_chan", ps, depth, &loginfo->sec_chan))
1319 return False;
1321 if(!smb_io_unistr2("unistr2", &loginfo->uni_comp_name, True, ps, depth))
1322 return False;
1324 return True;
1327 /*******************************************************************
1328 Reads or writes a DOM_CHAL structure.
1329 ********************************************************************/
1331 BOOL smb_io_chal(const char *desc, DOM_CHAL *chal, prs_struct *ps, int depth)
1333 if (chal == NULL)
1334 return False;
1336 prs_debug(ps, depth, desc, "smb_io_chal");
1337 depth++;
1339 if(!prs_uint8s (False, "data", ps, depth, chal->data, 8))
1340 return False;
1342 return True;
1345 /*******************************************************************
1346 Reads or writes a DOM_CRED structure.
1347 ********************************************************************/
1349 BOOL smb_io_cred(const char *desc, DOM_CRED *cred, prs_struct *ps, int depth)
1351 if (cred == NULL)
1352 return False;
1354 prs_debug(ps, depth, desc, "smb_io_cred");
1355 depth++;
1357 if(!prs_align(ps))
1358 return False;
1360 if(!smb_io_chal ("", &cred->challenge, ps, depth))
1361 return False;
1363 if(!smb_io_utime("", &cred->timestamp, ps, depth))
1364 return False;
1366 return True;
1369 /*******************************************************************
1370 Inits a DOM_CLNT_INFO2 structure.
1371 ********************************************************************/
1373 void init_clnt_info2(DOM_CLNT_INFO2 *clnt,
1374 const char *logon_srv, const char *comp_name,
1375 const DOM_CRED *clnt_cred)
1377 DEBUG(5,("make_clnt_info: %d\n", __LINE__));
1379 init_clnt_srv(&clnt->login, logon_srv, comp_name);
1381 if (clnt_cred != NULL) {
1382 clnt->ptr_cred = 1;
1383 memcpy(&clnt->cred, clnt_cred, sizeof(clnt->cred));
1384 } else {
1385 clnt->ptr_cred = 0;
1389 /*******************************************************************
1390 Reads or writes a DOM_CLNT_INFO2 structure.
1391 ********************************************************************/
1393 BOOL smb_io_clnt_info2(const char *desc, DOM_CLNT_INFO2 *clnt, prs_struct *ps, int depth)
1395 if (clnt == NULL)
1396 return False;
1398 prs_debug(ps, depth, desc, "smb_io_clnt_info2");
1399 depth++;
1401 if(!prs_align(ps))
1402 return False;
1404 if(!smb_io_clnt_srv("", &clnt->login, ps, depth))
1405 return False;
1407 if(!prs_align(ps))
1408 return False;
1410 if(!prs_uint32("ptr_cred", ps, depth, &clnt->ptr_cred))
1411 return False;
1412 if(!smb_io_cred("", &clnt->cred, ps, depth))
1413 return False;
1415 return True;
1418 /*******************************************************************
1419 Inits a DOM_CLNT_INFO structure.
1420 ********************************************************************/
1422 void init_clnt_info(DOM_CLNT_INFO *clnt,
1423 const char *logon_srv, const char *acct_name,
1424 uint16 sec_chan, const char *comp_name,
1425 const DOM_CRED *cred)
1427 DEBUG(5,("make_clnt_info\n"));
1429 init_log_info(&clnt->login, logon_srv, acct_name, sec_chan, comp_name);
1430 memcpy(&clnt->cred, cred, sizeof(clnt->cred));
1433 /*******************************************************************
1434 Reads or writes a DOM_CLNT_INFO structure.
1435 ********************************************************************/
1437 BOOL smb_io_clnt_info(const char *desc, DOM_CLNT_INFO *clnt, prs_struct *ps, int depth)
1439 if (clnt == NULL)
1440 return False;
1442 prs_debug(ps, depth, desc, "smb_io_clnt_info");
1443 depth++;
1445 if(!prs_align(ps))
1446 return False;
1448 if(!smb_io_log_info("", &clnt->login, ps, depth))
1449 return False;
1450 if(!smb_io_cred("", &clnt->cred, ps, depth))
1451 return False;
1453 return True;
1456 /*******************************************************************
1457 Inits a DOM_LOGON_ID structure.
1458 ********************************************************************/
1460 void init_logon_id(DOM_LOGON_ID *logonid, uint32 log_id_low, uint32 log_id_high)
1462 DEBUG(5,("make_logon_id: %d\n", __LINE__));
1464 logonid->low = log_id_low;
1465 logonid->high = log_id_high;
1468 /*******************************************************************
1469 Reads or writes a DOM_LOGON_ID structure.
1470 ********************************************************************/
1472 BOOL smb_io_logon_id(const char *desc, DOM_LOGON_ID *logonid, prs_struct *ps, int depth)
1474 if (logonid == NULL)
1475 return False;
1477 prs_debug(ps, depth, desc, "smb_io_logon_id");
1478 depth++;
1480 if(!prs_align(ps))
1481 return False;
1483 if(!prs_uint32("low ", ps, depth, &logonid->low ))
1484 return False;
1485 if(!prs_uint32("high", ps, depth, &logonid->high))
1486 return False;
1488 return True;
1491 /*******************************************************************
1492 Inits an OWF_INFO structure.
1493 ********************************************************************/
1495 void init_owf_info(OWF_INFO *hash, const uint8 data[16])
1497 DEBUG(5,("init_owf_info: %d\n", __LINE__));
1499 if (data != NULL)
1500 memcpy(hash->data, data, sizeof(hash->data));
1501 else
1502 memset((char *)hash->data, '\0', sizeof(hash->data));
1505 /*******************************************************************
1506 Reads or writes an OWF_INFO structure.
1507 ********************************************************************/
1509 BOOL smb_io_owf_info(const char *desc, OWF_INFO *hash, prs_struct *ps, int depth)
1511 if (hash == NULL)
1512 return False;
1514 prs_debug(ps, depth, desc, "smb_io_owf_info");
1515 depth++;
1517 if(!prs_align(ps))
1518 return False;
1520 if(!prs_uint8s (False, "data", ps, depth, hash->data, 16))
1521 return False;
1523 return True;
1526 /*******************************************************************
1527 Reads or writes a DOM_GID structure.
1528 ********************************************************************/
1530 BOOL smb_io_gid(const char *desc, DOM_GID *gid, prs_struct *ps, int depth)
1532 if (gid == NULL)
1533 return False;
1535 prs_debug(ps, depth, desc, "smb_io_gid");
1536 depth++;
1538 if(!prs_align(ps))
1539 return False;
1541 if(!prs_uint32("g_rid", ps, depth, &gid->g_rid))
1542 return False;
1543 if(!prs_uint32("attr ", ps, depth, &gid->attr))
1544 return False;
1546 return True;
1549 /*******************************************************************
1550 Reads or writes an POLICY_HND structure.
1551 ********************************************************************/
1553 BOOL smb_io_pol_hnd(const char *desc, POLICY_HND *pol, prs_struct *ps, int depth)
1555 if (pol == NULL)
1556 return False;
1558 prs_debug(ps, depth, desc, "smb_io_pol_hnd");
1559 depth++;
1561 if(!prs_align(ps))
1562 return False;
1564 if(UNMARSHALLING(ps))
1565 ZERO_STRUCTP(pol);
1567 if (!prs_uint32("data1", ps, depth, &pol->data1))
1568 return False;
1569 if (!prs_uint32("data2", ps, depth, &pol->data2))
1570 return False;
1571 if (!prs_uint16("data3", ps, depth, &pol->data3))
1572 return False;
1573 if (!prs_uint16("data4", ps, depth, &pol->data4))
1574 return False;
1575 if(!prs_uint8s (False, "data5", ps, depth, pol->data5, sizeof(pol->data5)))
1576 return False;
1578 return True;
1581 /*******************************************************************
1582 Create a UNISTR3.
1583 ********************************************************************/
1585 void init_unistr3(UNISTR3 *str, const char *buf)
1587 size_t len;
1589 if (buf == NULL) {
1590 str->uni_str_len=0;
1591 str->str.buffer = NULL;
1592 return;
1595 len = strlen(buf) + 1;
1597 str->uni_str_len=len;
1599 if (len < MAX_UNISTRLEN)
1600 len = MAX_UNISTRLEN;
1602 len *= sizeof(uint16);
1604 str->str.buffer = (uint16 *)talloc_zero(get_talloc_ctx(), len);
1605 if (str->str.buffer == NULL)
1606 smb_panic("init_unistr3: malloc fail\n");
1608 rpcstr_push((char *)str->str.buffer, buf, len, STR_TERMINATE);
1611 /*******************************************************************
1612 Reads or writes a UNISTR3 structure.
1613 ********************************************************************/
1615 BOOL smb_io_unistr3(const char *desc, UNISTR3 *name, prs_struct *ps, int depth)
1617 if (name == NULL)
1618 return False;
1620 prs_debug(ps, depth, desc, "smb_io_unistr3");
1621 depth++;
1623 if(!prs_align(ps))
1624 return False;
1626 if(!prs_uint32("uni_str_len", ps, depth, &name->uni_str_len))
1627 return False;
1629 /* don't know if len is specified by uni_str_len member... */
1630 /* assume unicode string is unicode-null-terminated, instead */
1632 if(!prs_unistr3(True, "unistr", name, ps, depth))
1633 return False;
1635 return True;
1639 /*******************************************************************
1640 Stream a uint64_struct
1641 ********************************************************************/
1642 BOOL prs_uint64(const char *name, prs_struct *ps, int depth, UINT64_S *data64)
1644 return prs_uint32(name, ps, depth+1, &data64->low) &&
1645 prs_uint32(name, ps, depth+1, &data64->high);
1648 /*******************************************************************
1649 reads or writes a BUFHDR2 structure.
1650 ********************************************************************/
1651 BOOL smb_io_bufhdr2(const char *desc, BUFHDR2 *hdr, prs_struct *ps, int depth)
1653 prs_debug(ps, depth, desc, "smb_io_bufhdr2");
1654 depth++;
1656 prs_align(ps);
1657 prs_uint32("info_level", ps, depth, &(hdr->info_level));
1658 prs_uint32("length ", ps, depth, &(hdr->length ));
1659 prs_uint32("buffer ", ps, depth, &(hdr->buffer ));
1661 return True;
1664 /*******************************************************************
1665 reads or writes a BUFFER4 structure.
1666 ********************************************************************/
1667 BOOL smb_io_buffer4(const char *desc, BUFFER4 *buf4, uint32 buffer, prs_struct *ps, int depth)
1669 prs_debug(ps, depth, desc, "smb_io_buffer4");
1670 depth++;
1672 prs_align(ps);
1673 prs_uint32("buf_len", ps, depth, &(buf4->buf_len));
1675 if (buf4->buf_len > MAX_BUFFERLEN)
1677 buf4->buf_len = MAX_BUFFERLEN;
1680 prs_uint8s(True, "buffer", ps, depth, buf4->buffer, buf4->buf_len);
1682 return True;
1685 /*******************************************************************
1686 creates a UNIHDR structure.
1687 ********************************************************************/
1689 BOOL make_uni_hdr(UNIHDR *hdr, int len)
1691 if (hdr == NULL)
1693 return False;
1695 hdr->uni_str_len = 2 * len;
1696 hdr->uni_max_len = 2 * len;
1697 hdr->buffer = len != 0 ? 1 : 0;
1699 return True;
1702 /*******************************************************************
1703 creates a BUFHDR2 structure.
1704 ********************************************************************/
1705 BOOL make_bufhdr2(BUFHDR2 *hdr, uint32 info_level, uint32 length, uint32 buffer)
1707 hdr->info_level = info_level;
1708 hdr->length = length;
1709 hdr->buffer = buffer;
1711 return True;