Merge client lsa fixes from HEAD (fix potential crashes).
[Samba/ekacnet.git] / source / rpc_parse / parse_lsa.c
blob18ed6943eca439e6ec0a493ee3ed3f1e40ac5fa7
1 /*
2 * Unix SMB/Netbios implementation.
3 * Version 1.9.
4 * RPC Pipe client / server routines
5 * Copyright (C) Andrew Tridgell 1992-1997,
6 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
7 * Copyright (C) Paul Ashton 1997.
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 #include "includes.h"
26 extern int DEBUGLEVEL;
28 static BOOL lsa_io_trans_names(char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
30 /*******************************************************************
31 Inits a LSA_TRANS_NAME structure.
32 ********************************************************************/
34 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
35 uint16 sid_name_use, char *name, uint32 idx)
37 int len_name = strlen(name);
39 if(len_name == 0)
40 len_name = 1;
42 trn->sid_name_use = sid_name_use;
43 init_uni_hdr(&trn->hdr_name, len_name);
44 init_unistr2(uni_name, name, len_name);
45 trn->domain_idx = idx;
48 /*******************************************************************
49 Reads or writes a LSA_TRANS_NAME structure.
50 ********************************************************************/
52 static BOOL lsa_io_trans_name(char *desc, LSA_TRANS_NAME *trn, prs_struct *ps,
53 int depth)
55 prs_debug(ps, depth, desc, "lsa_io_trans_name");
56 depth++;
58 if(!prs_align(ps))
59 return False;
61 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
62 return False;
63 if(!prs_align(ps))
64 return False;
66 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
67 return False;
68 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
69 return False;
71 return True;
74 /*******************************************************************
75 Reads or writes a DOM_R_REF structure.
76 ********************************************************************/
78 static BOOL lsa_io_dom_r_ref(char *desc, DOM_R_REF *r_r, prs_struct *ps,
79 int depth)
81 int i;
83 prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
84 depth++;
86 if(!prs_align(ps))
87 return False;
89 if(!prs_uint32("num_ref_doms_1", ps, depth, &r_r->num_ref_doms_1)) /* num referenced domains? */
90 return False;
91 if(!prs_uint32("ptr_ref_dom ", ps, depth, &r_r->ptr_ref_dom)) /* undocumented buffer pointer. */
92 return False;
93 if(!prs_uint32("max_entries ", ps, depth, &r_r->max_entries)) /* 32 - max number of entries */
94 return False;
96 SMB_ASSERT_ARRAY(r_r->hdr_ref_dom, r_r->num_ref_doms_1);
98 if (r_r->ptr_ref_dom != 0) {
100 if(!prs_uint32("num_ref_doms_2", ps, depth, &r_r->num_ref_doms_2)) /* 4 - num referenced domains? */
101 return False;
103 SMB_ASSERT_ARRAY(r_r->ref_dom, r_r->num_ref_doms_2);
105 for (i = 0; i < r_r->num_ref_doms_1; i++) {
106 fstring t;
108 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
109 if(!smb_io_unihdr(t, &r_r->hdr_ref_dom[i].hdr_dom_name, ps, depth))
110 return False;
112 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
113 if(!prs_uint32(t, ps, depth, &r_r->hdr_ref_dom[i].ptr_dom_sid))
114 return False;
117 for (i = 0; i < r_r->num_ref_doms_2; i++) {
118 fstring t;
120 if (r_r->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
121 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
122 if(!smb_io_unistr2(t, &r_r->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
123 return False;
124 if(!prs_align(ps))
125 return False;
128 if (r_r->hdr_ref_dom[i].ptr_dom_sid != 0) {
129 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
130 if(!smb_io_dom_sid2(t, &r_r->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
131 return False;
136 return True;
139 /*******************************************************************
140 Inits an LSA_SEC_QOS structure.
141 ********************************************************************/
143 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff,
144 uint32 unknown)
146 DEBUG(5, ("init_lsa_sec_qos\n"));
148 qos->len = 0x0c; /* length of quality of service block, in bytes */
149 qos->sec_imp_level = imp_lev;
150 qos->sec_ctxt_mode = ctxt;
151 qos->effective_only = eff;
152 qos->unknown = unknown;
155 /*******************************************************************
156 Reads or writes an LSA_SEC_QOS structure.
157 ********************************************************************/
159 static BOOL lsa_io_sec_qos(char *desc, LSA_SEC_QOS *qos, prs_struct *ps,
160 int depth)
162 uint32 start;
164 prs_debug(ps, depth, desc, "lsa_io_obj_qos");
165 depth++;
167 if(!prs_align(ps))
168 return False;
170 start = prs_offset(ps);
172 /* these pointers had _better_ be zero, because we don't know
173 what they point to!
175 if(!prs_uint32("len ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
176 return False;
177 if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
178 return False;
179 if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
180 return False;
181 if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
182 return False;
183 if(!prs_uint32("unknown ", ps, depth, &qos->unknown))
184 return False;
186 if (qos->len != prs_offset(ps) - start) {
187 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
188 qos->len, prs_offset(ps) - start));
189 return False;
192 return True;
195 /*******************************************************************
196 Inits an LSA_OBJ_ATTR structure.
197 ********************************************************************/
199 void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
201 DEBUG(5, ("init_lsa_obj_attr\n"));
203 attr->len = 0x18; /* length of object attribute block, in bytes */
204 attr->ptr_root_dir = 0;
205 attr->ptr_obj_name = 0;
206 attr->attributes = attributes;
207 attr->ptr_sec_desc = 0;
209 if (qos != NULL) {
210 attr->ptr_sec_qos = 1;
211 attr->sec_qos = qos;
212 } else {
213 attr->ptr_sec_qos = 0;
214 attr->sec_qos = NULL;
218 /*******************************************************************
219 Reads or writes an LSA_OBJ_ATTR structure.
220 ********************************************************************/
222 static BOOL lsa_io_obj_attr(char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps,
223 int depth)
225 uint32 start;
227 prs_debug(ps, depth, desc, "lsa_io_obj_attr");
228 depth++;
230 if(!prs_align(ps))
231 return False;
233 start = prs_offset(ps);
235 /* these pointers had _better_ be zero, because we don't know
236 what they point to!
238 if(!prs_uint32("len ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
239 return False;
240 if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
241 return False;
242 if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
243 return False;
244 if(!prs_uint32("attributes ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
245 return False;
246 if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
247 return False;
248 if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
249 return False;
251 if (attr->len != prs_offset(ps) - start) {
252 DEBUG(3,("lsa_io_obj_attr: length %x does not match size %x\n",
253 attr->len, prs_offset(ps) - start));
254 return False;
257 if (attr->ptr_sec_qos != 0 && attr->sec_qos != NULL) {
258 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
259 return False;
262 return True;
266 /*******************************************************************
267 Inits an LSA_Q_OPEN_POL structure.
268 ********************************************************************/
270 void init_q_open_pol(LSA_Q_OPEN_POL *r_q, uint16 system_name,
271 uint32 attributes, uint32 desired_access,
272 LSA_SEC_QOS *qos)
274 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes,
275 desired_access));
277 r_q->ptr = 1; /* undocumented pointer */
279 if (qos == NULL)
280 r_q->des_access = desired_access;
282 r_q->system_name = system_name;
283 init_lsa_obj_attr(&r_q->attr, attributes, qos);
286 /*******************************************************************
287 Reads or writes an LSA_Q_OPEN_POL structure.
288 ********************************************************************/
290 BOOL lsa_io_q_open_pol(char *desc, LSA_Q_OPEN_POL *r_q, prs_struct *ps,
291 int depth)
293 prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
294 depth++;
296 if(!prs_uint32("ptr ", ps, depth, &r_q->ptr))
297 return False;
298 if(!prs_uint16("system_name", ps, depth, &r_q->system_name))
299 return False;
300 if(!prs_align( ps ))
301 return False;
303 if(!lsa_io_obj_attr("", &r_q->attr, ps, depth))
304 return False;
306 if (r_q->attr.ptr_sec_qos == 0) {
307 if(!prs_uint32("des_access", ps, depth, &r_q->des_access))
308 return False;
311 return True;
314 /*******************************************************************
315 Reads or writes an LSA_R_OPEN_POL structure.
316 ********************************************************************/
318 BOOL lsa_io_r_open_pol(char *desc, LSA_R_OPEN_POL *r_p, prs_struct *ps,
319 int depth)
321 prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
322 depth++;
324 if(!smb_io_pol_hnd("", &r_p->pol, ps, depth))
325 return False;
327 if(!prs_uint32("status", ps, depth, &r_p->status))
328 return False;
330 return True;
333 /*******************************************************************
334 Inits an LSA_Q_OPEN_POL2 structure.
335 ********************************************************************/
337 void init_q_open_pol2(LSA_Q_OPEN_POL2 *r_q, char *server_name,
338 uint32 attributes, uint32 desired_access,
339 LSA_SEC_QOS *qos)
341 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes,
342 desired_access));
344 r_q->ptr = 1; /* undocumented pointer */
346 if (qos == NULL)
347 r_q->des_access = desired_access;
349 init_unistr2(&r_q->uni_server_name, server_name,
350 strlen(server_name) + 1);
352 init_lsa_obj_attr(&r_q->attr, attributes, qos);
355 /*******************************************************************
356 Reads or writes an LSA_Q_OPEN_POL2 structure.
357 ********************************************************************/
359 BOOL lsa_io_q_open_pol2(char *desc, LSA_Q_OPEN_POL2 *r_q, prs_struct *ps,
360 int depth)
362 prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
363 depth++;
365 if(!prs_uint32("ptr ", ps, depth, &r_q->ptr))
366 return False;
368 if(!smb_io_unistr2 ("", &r_q->uni_server_name, r_q->ptr, ps, depth))
369 return False;
370 if(!lsa_io_obj_attr("", &r_q->attr, ps, depth))
371 return False;
373 if (r_q->attr.ptr_sec_qos == 0) {
374 if(!prs_uint32("des_access", ps, depth, &r_q->des_access))
375 return False;
378 return True;
381 /*******************************************************************
382 Reads or writes an LSA_R_OPEN_POL2 structure.
383 ********************************************************************/
385 BOOL lsa_io_r_open_pol2(char *desc, LSA_R_OPEN_POL2 *r_p, prs_struct *ps,
386 int depth)
388 prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
389 depth++;
391 if(!smb_io_pol_hnd("", &r_p->pol, ps, depth))
392 return False;
394 if(!prs_uint32("status", ps, depth, &r_p->status))
395 return False;
397 return True;
400 /*******************************************************************
401 makes an LSA_Q_QUERY_SEC_OBJ structure.
402 ********************************************************************/
404 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *q_q, const POLICY_HND *hnd,
405 uint32 sec_info)
407 DEBUG(5, ("init_q_query_sec_obj\n"));
409 q_q->pol = *hnd;
410 q_q->sec_info = sec_info;
412 return;
415 /*******************************************************************
416 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
417 ********************************************************************/
419 BOOL lsa_io_q_query_sec_obj(char *desc, LSA_Q_QUERY_SEC_OBJ *q_q,
420 prs_struct *ps, int depth)
422 prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
423 depth++;
425 if (!smb_io_pol_hnd("", &q_q->pol, ps, depth))
426 return False;
428 if (!prs_uint32("sec_info", ps, depth, &q_q->sec_info))
429 return False;
431 return True;
434 /*******************************************************************
435 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
436 ********************************************************************/
438 BOOL lsa_io_r_query_sec_obj(char *desc, LSA_R_QUERY_SEC_OBJ *r_u,
439 prs_struct *ps, int depth)
441 prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
442 depth++;
444 if (!prs_align(ps))
445 return False;
447 if (!prs_uint32("ptr", ps, depth, &r_u->ptr))
448 return False;
450 if (r_u->ptr != 0) {
451 if (!sec_io_desc_buf("sec", &r_u->buf, ps, depth))
452 return False;
455 if (!prs_uint32("status", ps, depth, &r_u->status))
456 return False;
458 return True;
461 /*******************************************************************
462 Inits an LSA_Q_QUERY_INFO structure.
463 ********************************************************************/
465 void init_q_query(LSA_Q_QUERY_INFO *q_q, POLICY_HND *hnd, uint16 info_class)
467 DEBUG(5, ("init_q_query\n"));
469 memcpy(&q_q->pol, hnd, sizeof(q_q->pol));
471 q_q->info_class = info_class;
474 /*******************************************************************
475 Reads or writes an LSA_Q_QUERY_INFO structure.
476 ********************************************************************/
478 BOOL lsa_io_q_query(char *desc, LSA_Q_QUERY_INFO *q_q, prs_struct *ps,
479 int depth)
481 prs_debug(ps, depth, desc, "lsa_io_q_query");
482 depth++;
484 if(!smb_io_pol_hnd("", &q_q->pol, ps, depth))
485 return False;
487 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
488 return False;
490 return True;
493 /*******************************************************************
494 makes an LSA_Q_ENUM_TRUST_DOM structure.
495 ********************************************************************/
496 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
497 uint32 enum_context, uint32 preferred_len)
499 DEBUG(5, ("init_q_enum_trust_dom\n"));
501 q_e->pol = *pol;
502 q_e->enum_context = enum_context;
503 q_e->preferred_len = preferred_len;
505 return True;
508 /*******************************************************************
509 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
510 ********************************************************************/
512 BOOL lsa_io_q_enum_trust_dom(char *desc, LSA_Q_ENUM_TRUST_DOM *q_e,
513 prs_struct *ps, int depth)
515 prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
516 depth++;
518 if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
519 return False;
521 if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
522 return False;
523 if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
524 return False;
526 return True;
529 /*******************************************************************
530 Inits an LSA_R_ENUM_TRUST_DOM structure.
531 ********************************************************************/
533 void init_r_enum_trust_dom(LSA_R_ENUM_TRUST_DOM *r_e, uint32 enum_context,
534 char *domain_name, DOM_SID *domain_sid,
535 uint32 status)
537 DEBUG(5, ("init_r_enum_trust_dom\n"));
539 r_e->enum_context = enum_context;
541 if (status == 0) {
542 int len_domain_name = strlen(domain_name) + 1;
544 r_e->num_domains = 1;
545 r_e->ptr_enum_domains = 1;
546 r_e->num_domains2 = 1;
548 if (!(r_e->hdr_domain_name = (UNIHDR2 *)
549 malloc(sizeof(UNIHDR2)))) return;
551 if (!(r_e->uni_domain_name = (UNISTR2 *)
552 malloc(sizeof(UNISTR2)))) return;
554 if (!(r_e->domain_sid = (DOM_SID2 *)
555 malloc(sizeof(DOM_SID2)))) return;
557 init_uni_hdr2(&r_e->hdr_domain_name[0], len_domain_name);
558 init_unistr2 (&r_e->uni_domain_name[0], domain_name,
559 len_domain_name);
560 init_dom_sid2(&r_e->domain_sid[0], domain_sid);
561 } else {
562 r_e->num_domains = 0;
563 r_e->ptr_enum_domains = 0;
566 r_e->status = status;
569 /*******************************************************************
570 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
571 ********************************************************************/
573 BOOL lsa_io_r_enum_trust_dom(char *desc, LSA_R_ENUM_TRUST_DOM *r_e,
574 prs_struct *ps, int depth)
576 prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
577 depth++;
579 if(!prs_uint32("enum_context ", ps, depth, &r_e->enum_context))
580 return False;
581 if(!prs_uint32("num_domains ", ps, depth, &r_e->num_domains))
582 return False;
583 if(!prs_uint32("ptr_enum_domains", ps, depth, &r_e->ptr_enum_domains))
584 return False;
586 if (r_e->ptr_enum_domains) {
587 int i, num_domains;
589 if(!prs_uint32("num_domains2", ps, depth, &r_e->num_domains2))
590 return False;
592 num_domains = r_e->num_domains2;
594 if (UNMARSHALLING(ps)) {
595 if (!(r_e->hdr_domain_name = (UNIHDR2 *)prs_alloc_mem(ps,sizeof(UNIHDR2) * num_domains)))
596 return False;
598 if (!(r_e->uni_domain_name = (UNISTR2 *)prs_alloc_mem(ps,sizeof(UNISTR2) * num_domains)))
599 return False;
601 if (!(r_e->domain_sid = (DOM_SID2 *)prs_alloc_mem(ps,sizeof(DOM_SID2) * num_domains)))
602 return False;
605 for (i = 0; i < num_domains; i++) {
606 if(!smb_io_unihdr2 ("", &r_e->hdr_domain_name[i], ps,
607 depth))
608 return False;
611 for (i = 0; i < num_domains; i++) {
612 if(!smb_io_unistr2 ("", &r_e->uni_domain_name[i],
613 r_e->hdr_domain_name[i].buffer,
614 ps, depth))
615 return False;
616 if(!smb_io_dom_sid2("", &r_e->domain_sid[i], ps,
617 depth))
618 return False;
622 if(!prs_uint32("status", ps, depth, &r_e->status))
623 return False;
625 return True;
628 /*******************************************************************
629 reads or writes a dom query structure.
630 ********************************************************************/
632 static BOOL lsa_io_dom_query(char *desc, DOM_QUERY *d_q, prs_struct *ps, int depth)
634 if (d_q == NULL)
635 return False;
637 prs_debug(ps, depth, desc, "lsa_io_dom_query");
638 depth++;
640 if(!prs_align(ps))
641 return False;
643 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
644 return False;
645 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
646 return False;
648 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
649 return False;
650 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
651 return False;
653 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
654 return False;
656 if(!prs_align(ps))
657 return False;
659 if (d_q->buffer_dom_sid != 0) {
660 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
661 return False;
662 } else {
663 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
666 return True;
669 /*******************************************************************
670 reads or writes a structure.
671 ********************************************************************/
673 static BOOL lsa_io_dom_query_2(char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
675 uint32 ptr = 1;
677 if (d_q == NULL)
678 return False;
680 prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
681 depth++;
683 if (!prs_align(ps))
684 return False;
686 if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
687 return False;
688 if (!prs_uint32("ptr ", ps, depth, &ptr))
689 return False;
690 if (!prs_uint32("count1", ps, depth, &d_q->count1))
691 return False;
692 if (!prs_uint32("count2", ps, depth, &d_q->count2))
693 return False;
695 if (UNMARSHALLING(ps)) {
696 d_q->auditsettings = (uint32 *)talloc_zero(ps->mem_ctx, d_q->count2 * sizeof(uint32));
699 if (d_q->auditsettings == NULL) {
700 DEBUG(1, ("lsa_io_dom_query_2: NULL auditsettings!\n"));
701 return False;
704 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
705 return False;
707 return True;
710 /*******************************************************************
711 Reads or writes a dom query structure.
712 ********************************************************************/
714 static BOOL lsa_io_dom_query_3(char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
716 return lsa_io_dom_query("", d_q, ps, depth);
719 /*******************************************************************
720 Reads or writes a dom query structure.
721 ********************************************************************/
723 BOOL lsa_io_dom_query_5(char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
725 return lsa_io_dom_query("", d_q, ps, depth);
728 /*******************************************************************
729 Reads or writes a dom query structure.
730 ********************************************************************/
732 static BOOL lsa_io_dom_query_6(char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
734 if (d_q == NULL)
735 return False;
737 prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
738 depth++;
740 if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
741 return False;
743 return True;
746 /*******************************************************************
747 Reads or writes an LSA_R_QUERY_INFO structure.
748 ********************************************************************/
750 BOOL lsa_io_r_query(char *desc, LSA_R_QUERY_INFO *r_q, prs_struct *ps,
751 int depth)
753 prs_debug(ps, depth, desc, "lsa_io_r_query");
754 depth++;
756 if(!prs_uint32("undoc_buffer", ps, depth, &r_q->undoc_buffer))
757 return False;
759 if (r_q->undoc_buffer != 0) {
760 if(!prs_uint16("info_class", ps, depth, &r_q->info_class))
761 return False;
763 if(!prs_align(ps))
764 return False;
766 switch (r_q->info_class) {
767 case 2:
768 if(!lsa_io_dom_query_2("", &r_q->dom.id2, ps, depth))
769 return False;
770 break;
771 case 3:
772 if(!lsa_io_dom_query_3("", &r_q->dom.id3, ps, depth))
773 return False;
774 break;
775 case 5:
776 if(!lsa_io_dom_query_5("", &r_q->dom.id5, ps, depth))
777 return False;
778 break;
779 case 6:
780 if(!lsa_io_dom_query_6("", &r_q->dom.id6, ps, depth))
781 return False;
782 break;
783 default:
784 /* PANIC! */
785 break;
789 if(!prs_align(ps))
790 return False;
792 if(!prs_uint32("status", ps, depth, &r_q->status))
793 return False;
795 return True;
798 /*******************************************************************
799 Inits a LSA_SID_ENUM structure.
800 ********************************************************************/
802 void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen,
803 int num_entries, DOM_SID *sids)
805 int i;
807 DEBUG(5, ("init_lsa_sid_enum\n"));
809 sen->num_entries = num_entries;
810 sen->ptr_sid_enum = (num_entries != 0);
811 sen->num_entries2 = num_entries;
813 /* Allocate memory for sids and sid pointers */
815 if (num_entries == 0) return;
817 if ((sen->ptr_sid = (uint32 *)talloc_zero(mem_ctx, num_entries *
818 sizeof(uint32))) == NULL) {
819 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
820 return;
823 if ((sen->sid = (DOM_SID2 *)talloc_zero(mem_ctx, num_entries *
824 sizeof(DOM_SID2))) == NULL) {
825 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
826 return;
829 /* Copy across SIDs and SID pointers */
831 for (i = 0; i < num_entries; i++) {
832 sen->ptr_sid[i] = 1;
833 init_dom_sid2(&sen->sid[i], &sids[i]);
837 /*******************************************************************
838 Reads or writes a LSA_SID_ENUM structure.
839 ********************************************************************/
841 static BOOL lsa_io_sid_enum(char *desc, LSA_SID_ENUM *sen, prs_struct *ps,
842 int depth)
844 int i;
846 prs_debug(ps, depth, desc, "lsa_io_sid_enum");
847 depth++;
849 if(!prs_align(ps))
850 return False;
852 if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
853 return False;
854 if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
855 return False;
856 if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
857 return False;
859 /* Mallocate memory if we're unpacking from the wire */
861 if (UNMARSHALLING(ps)) {
862 if ((sen->ptr_sid = (uint32 *)prs_alloc_mem( ps,
863 sen->num_entries * sizeof(uint32))) == NULL) {
864 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
865 "ptr_sid\n"));
866 return False;
869 if ((sen->sid = (DOM_SID2 *)prs_alloc_mem( ps,
870 sen->num_entries * sizeof(DOM_SID2))) == NULL) {
871 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
872 "sids\n"));
873 return False;
877 for (i = 0; i < sen->num_entries; i++) {
878 fstring temp;
880 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
881 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
882 return False;
886 for (i = 0; i < sen->num_entries; i++) {
887 fstring temp;
889 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
890 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
891 return False;
895 return True;
898 /*******************************************************************
899 Inits an LSA_R_ENUM_TRUST_DOM structure.
900 ********************************************************************/
902 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l,
903 POLICY_HND *hnd, int num_sids, DOM_SID *sids,
904 uint16 level)
906 DEBUG(5, ("init_r_enum_trust_dom\n"));
908 ZERO_STRUCTP(q_l);
910 memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
911 init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
913 q_l->level.value = level;
916 /*******************************************************************
917 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
918 ********************************************************************/
920 BOOL lsa_io_q_lookup_sids(char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
921 int depth)
923 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
924 depth++;
926 if(!prs_align(ps))
927 return False;
929 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
930 return False;
931 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
932 return False;
933 if(!lsa_io_trans_names("names ", &q_s->names, ps, depth)) /* translated names */
934 return False;
935 if(!smb_io_lookup_level("switch ", &q_s->level, ps, depth)) /* lookup level */
936 return False;
938 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
939 return False;
941 return True;
944 /*******************************************************************
945 Reads or writes a structure.
946 ********************************************************************/
948 static BOOL lsa_io_trans_names(char *desc, LSA_TRANS_NAME_ENUM *trn,
949 prs_struct *ps, int depth)
951 int i;
953 prs_debug(ps, depth, desc, "lsa_io_trans_names");
954 depth++;
956 if(!prs_align(ps))
957 return False;
959 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
960 return False;
961 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
962 return False;
964 if (trn->ptr_trans_names != 0) {
965 if(!prs_uint32("num_entries2 ", ps, depth,
966 &trn->num_entries2))
967 return False;
969 if (UNMARSHALLING(ps)) {
970 if ((trn->name = (LSA_TRANS_NAME *)
971 prs_alloc_mem(ps, trn->num_entries *
972 sizeof(LSA_TRANS_NAME))) == NULL) {
973 return False;
976 if ((trn->uni_name = (UNISTR2 *)
977 prs_alloc_mem(ps, trn->num_entries *
978 sizeof(UNISTR2))) == NULL) {
979 return False;
983 for (i = 0; i < trn->num_entries2; i++) {
984 fstring t;
985 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
987 if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
988 return False;
991 for (i = 0; i < trn->num_entries2; i++) {
992 fstring t;
993 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
995 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
996 return False;
997 if(!prs_align(ps))
998 return False;
1002 return True;
1005 /*******************************************************************
1006 Reads or writes a structure.
1007 ********************************************************************/
1009 BOOL lsa_io_r_lookup_sids(char *desc, LSA_R_LOOKUP_SIDS *r_s,
1010 prs_struct *ps, int depth)
1012 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1013 depth++;
1015 if(!prs_align(ps))
1016 return False;
1018 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1019 return False;
1021 if (r_s->ptr_dom_ref != 0)
1022 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1023 return False;
1025 if(!lsa_io_trans_names("names ", r_s->names, ps, depth)) /* translated names */
1026 return False;
1028 if(!prs_align(ps))
1029 return False;
1031 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1032 return False;
1034 if(!prs_uint32("status ", ps, depth, &r_s->status))
1035 return False;
1037 return True;
1040 /*******************************************************************
1041 makes a structure.
1042 ********************************************************************/
1044 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l,
1045 POLICY_HND *hnd, int num_names, char **names)
1047 int i;
1049 DEBUG(5, ("init_q_lookup_names\n"));
1051 ZERO_STRUCTP(q_l);
1053 q_l->pol = *hnd;
1054 q_l->num_entries = num_names;
1055 q_l->num_entries2 = num_names;
1056 q_l->lookup_level = 1;
1058 if ((q_l->uni_name = (UNISTR2 *)talloc_zero(
1059 mem_ctx, num_names * sizeof(UNISTR2))) == NULL) {
1060 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1061 return;
1064 if ((q_l->hdr_name = (UNIHDR *)talloc_zero(
1065 mem_ctx, num_names * sizeof(UNIHDR))) == NULL) {
1066 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1067 return;
1070 for (i = 0; i < num_names; i++) {
1071 char* name = names[i];
1072 int len = strlen(name);
1074 init_uni_hdr(&q_l->hdr_name[i], len);
1075 init_unistr2(&q_l->uni_name[i], name, len);
1079 /*******************************************************************
1080 reads or writes a structure.
1081 ********************************************************************/
1083 BOOL lsa_io_q_lookup_names(char *desc, LSA_Q_LOOKUP_NAMES *q_r,
1084 prs_struct *ps, int depth)
1086 int i;
1088 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1089 depth++;
1091 if(!prs_align(ps))
1092 return False;
1094 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1095 return False;
1097 if(!prs_align(ps))
1098 return False;
1099 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1100 return False;
1101 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1102 return False;
1104 if (UNMARSHALLING(ps)) {
1105 if (q_r->num_entries) {
1106 if ((q_r->hdr_name = (UNIHDR *)prs_alloc_mem(ps,
1107 q_r->num_entries * sizeof(UNIHDR))) == NULL)
1108 return False;
1109 if ((q_r->uni_name = (UNISTR2 *)prs_alloc_mem(ps,
1110 q_r->num_entries * sizeof(UNISTR2))) == NULL)
1111 return False;
1115 for (i = 0; i < q_r->num_entries; i++) {
1116 if(!prs_align(ps))
1117 return False;
1118 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1119 return False;
1122 for (i = 0; i < q_r->num_entries; i++) {
1123 if(!prs_align(ps))
1124 return False;
1125 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1126 return False;
1129 if(!prs_align(ps))
1130 return False;
1131 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1132 return False;
1133 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1134 return False;
1135 if(!prs_uint32("lookup_level ", ps, depth, &q_r->lookup_level))
1136 return False;
1137 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1138 return False;
1140 return True;
1143 /*******************************************************************
1144 reads or writes a structure.
1145 ********************************************************************/
1147 BOOL lsa_io_r_lookup_names(char *desc, LSA_R_LOOKUP_NAMES *r_r,
1148 prs_struct *ps, int depth)
1150 int i;
1152 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1153 depth++;
1155 if(!prs_align(ps))
1156 return False;
1158 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_r->ptr_dom_ref))
1159 return False;
1161 if (r_r->ptr_dom_ref != 0)
1162 if(!lsa_io_dom_r_ref("", r_r->dom_ref, ps, depth))
1163 return False;
1165 if(!prs_uint32("num_entries", ps, depth, &r_r->num_entries))
1166 return False;
1167 if(!prs_uint32("ptr_entries", ps, depth, &r_r->ptr_entries))
1168 return False;
1170 if (r_r->ptr_entries != 0) {
1171 if(!prs_uint32("num_entries2", ps, depth, &r_r->num_entries2))
1172 return False;
1174 if (r_r->num_entries2 != r_r->num_entries) {
1175 /* RPC fault */
1176 return False;
1179 if (UNMARSHALLING(ps)) {
1180 if ((r_r->dom_rid = (DOM_RID2 *)prs_alloc_mem(ps, r_r->num_entries2 * sizeof(DOM_RID2)))
1181 == NULL) {
1182 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1183 return False;
1187 for (i = 0; i < r_r->num_entries2; i++)
1188 if(!smb_io_dom_rid2("", &r_r->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1189 return False;
1192 if(!prs_uint32("mapped_count", ps, depth, &r_r->mapped_count))
1193 return False;
1195 if(!prs_uint32("status ", ps, depth, &r_r->status))
1196 return False;
1198 return True;
1202 /*******************************************************************
1203 Inits an LSA_Q_CLOSE structure.
1204 ********************************************************************/
1206 void init_lsa_q_close(LSA_Q_CLOSE *q_c, POLICY_HND *hnd)
1208 DEBUG(5, ("init_lsa_q_close\n"));
1210 memcpy(&q_c->pol, hnd, sizeof(q_c->pol));
1213 /*******************************************************************
1214 Reads or writes an LSA_Q_CLOSE structure.
1215 ********************************************************************/
1217 BOOL lsa_io_q_close(char *desc, LSA_Q_CLOSE *q_c, prs_struct *ps, int depth)
1219 prs_debug(ps, depth, desc, "lsa_io_q_close");
1220 depth++;
1222 if(!smb_io_pol_hnd("", &q_c->pol, ps, depth))
1223 return False;
1225 return True;
1228 /*******************************************************************
1229 Reads or writes an LSA_R_CLOSE structure.
1230 ********************************************************************/
1232 BOOL lsa_io_r_close(char *desc, LSA_R_CLOSE *r_c, prs_struct *ps, int depth)
1234 prs_debug(ps, depth, desc, "lsa_io_r_close");
1235 depth++;
1237 if(!smb_io_pol_hnd("", &r_c->pol, ps, depth))
1238 return False;
1240 if(!prs_uint32("status", ps, depth, &r_c->status))
1241 return False;
1243 return True;
1246 /*******************************************************************
1247 Reads or writes an LSA_Q_OPEN_SECRET structure.
1248 ********************************************************************/
1250 BOOL lsa_io_q_open_secret(char *desc, LSA_Q_OPEN_SECRET *q_c, prs_struct *ps, int depth)
1252 prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
1253 depth++;
1255 /* Don't bother to read or write at present... */
1256 return True;
1259 /*******************************************************************
1260 Reads or writes an LSA_R_OPEN_SECRET structure.
1261 ********************************************************************/
1263 BOOL lsa_io_r_open_secret(char *desc, LSA_R_OPEN_SECRET *r_c, prs_struct *ps, int depth)
1265 prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
1266 depth++;
1268 if(!prs_align(ps))
1269 return False;
1271 if(!prs_uint32("dummy1", ps, depth, &r_c->dummy1))
1272 return False;
1273 if(!prs_uint32("dummy2", ps, depth, &r_c->dummy2))
1274 return False;
1275 if(!prs_uint32("dummy3", ps, depth, &r_c->dummy3))
1276 return False;
1277 if(!prs_uint32("dummy4", ps, depth, &r_c->dummy4))
1278 return False;
1279 if(!prs_uint32("status", ps, depth, &r_c->status))
1280 return False;
1282 return True;