Make sure we don't clobber the stack when response consists of the empty
[Samba/gebeck_regimport.git] / source3 / rpc_parse / parse_sec.c
bloba78627650ada3c21faca56f927d0a0c18828a402
1 /*
2 * Unix SMB/Netbios implementation.
3 * Version 1.9.
4 * RPC Pipe client / server routines
5 * Copyright (C) Andrew Tridgell 1992-1998,
6 * Copyright (C) Jeremy R. Allison 1995-2003.
7 * Copyright (C) Luke Kenneth Casson Leighton 1996-1998,
8 * Copyright (C) Paul Ashton 1997-1998.
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 #include "includes.h"
27 #undef DBGC_CLASS
28 #define DBGC_CLASS DBGC_RPC_PARSE
30 /*******************************************************************
31 Reads or writes a SEC_ACCESS structure.
32 ********************************************************************/
34 BOOL sec_io_access(const char *desc, SEC_ACCESS *t, prs_struct *ps, int depth)
36 if (t == NULL)
37 return False;
39 prs_debug(ps, depth, desc, "sec_io_access");
40 depth++;
42 if(!prs_uint32("mask", ps, depth, &t->mask))
43 return False;
45 return True;
48 /*******************************************************************
49 Reads or writes a SEC_ACE structure.
50 ********************************************************************/
52 BOOL sec_io_ace(const char *desc, SEC_ACE *psa, prs_struct *ps, int depth)
54 uint32 old_offset;
55 uint32 offset_ace_size;
57 if (psa == NULL)
58 return False;
60 prs_debug(ps, depth, desc, "sec_io_ace");
61 depth++;
63 old_offset = prs_offset(ps);
65 if(!prs_uint8("type ", ps, depth, &psa->type))
66 return False;
68 if(!prs_uint8("flags", ps, depth, &psa->flags))
69 return False;
71 if(!prs_uint16_pre("size ", ps, depth, &psa->size, &offset_ace_size))
72 return False;
74 if(!sec_io_access("info ", &psa->info, ps, depth))
75 return False;
77 /* check whether object access is present */
78 if (!sec_ace_object(psa->type)) {
79 if (!smb_io_dom_sid("trustee ", &psa->trustee , ps, depth))
80 return False;
81 } else {
82 if (!prs_uint32("obj_flags", ps, depth, &psa->obj_flags))
83 return False;
85 if (psa->obj_flags & SEC_ACE_OBJECT_PRESENT)
86 if (!smb_io_uuid("obj_guid", &psa->obj_guid, ps,depth))
87 return False;
89 if (psa->obj_flags & SEC_ACE_OBJECT_INHERITED_PRESENT)
90 if (!smb_io_uuid("inh_guid", &psa->inh_guid, ps,depth))
91 return False;
93 if(!smb_io_dom_sid("trustee ", &psa->trustee , ps, depth))
94 return False;
97 if(!prs_uint16_post("size ", ps, depth, &psa->size, offset_ace_size, old_offset))
98 return False;
99 return True;
102 /*******************************************************************
103 Reads or writes a SEC_ACL structure.
105 First of the xx_io_xx functions that allocates its data structures
106 for you as it reads them.
107 ********************************************************************/
109 BOOL sec_io_acl(const char *desc, SEC_ACL **ppsa, prs_struct *ps, int depth)
111 unsigned int i;
112 uint32 old_offset;
113 uint32 offset_acl_size;
114 SEC_ACL *psa;
117 * Note that the size is always a multiple of 4 bytes due to the
118 * nature of the data structure. Therefore the prs_align() calls
119 * have been removed as they through us off when doing two-layer
120 * marshalling such as in the printing code (NEW_BUFFER). --jerry
123 if (ppsa == NULL)
124 return False;
126 psa = *ppsa;
128 if(UNMARSHALLING(ps) && psa == NULL) {
130 * This is a read and we must allocate the stuct to read into.
132 if((psa = (SEC_ACL *)prs_alloc_mem(ps, sizeof(SEC_ACL))) == NULL)
133 return False;
134 *ppsa = psa;
137 prs_debug(ps, depth, desc, "sec_io_acl");
138 depth++;
140 old_offset = prs_offset(ps);
142 if(!prs_uint16("revision", ps, depth, &psa->revision))
143 return False;
145 if(!prs_uint16_pre("size ", ps, depth, &psa->size, &offset_acl_size))
146 return False;
148 if(!prs_uint32("num_aces ", ps, depth, &psa->num_aces))
149 return False;
151 if (UNMARSHALLING(ps)) {
153 * Even if the num_aces is zero, allocate memory as there's a difference
154 * between a non-present DACL (allow all access) and a DACL with no ACE's
155 * (allow no access).
157 if((psa->ace = (SEC_ACE *)prs_alloc_mem(ps,sizeof(psa->ace[0]) * (psa->num_aces+1))) == NULL)
158 return False;
161 for (i = 0; i < psa->num_aces; i++) {
162 fstring tmp;
163 slprintf(tmp, sizeof(tmp)-1, "ace_list[%02d]: ", i);
164 if(!sec_io_ace(tmp, &psa->ace[i], ps, depth))
165 return False;
168 if(!prs_uint16_post("size ", ps, depth, &psa->size, offset_acl_size, old_offset))
169 return False;
171 return True;
174 /*******************************************************************
175 Reads or writes a SEC_DESC structure.
176 If reading and the *ppsd = NULL, allocates the structure.
177 ********************************************************************/
179 BOOL sec_io_desc(const char *desc, SEC_DESC **ppsd, prs_struct *ps, int depth)
181 uint32 old_offset;
182 uint32 max_offset = 0; /* after we're done, move offset to end */
183 uint32 tmp_offset = 0;
185 SEC_DESC *psd;
187 if (ppsd == NULL)
188 return False;
190 psd = *ppsd;
192 if (psd == NULL) {
193 if(UNMARSHALLING(ps)) {
194 if((psd = (SEC_DESC *)prs_alloc_mem(ps,sizeof(SEC_DESC))) == NULL)
195 return False;
196 *ppsd = psd;
197 } else {
198 /* Marshalling - just ignore. */
199 return True;
203 prs_debug(ps, depth, desc, "sec_io_desc");
204 depth++;
206 #if 0
208 * if alignment is needed, should be done by the the
209 * caller. Not here. This caused me problems when marshalling
210 * printer info into a buffer. --jerry
212 if(!prs_align(ps))
213 return False;
214 #endif
216 /* start of security descriptor stored for back-calc offset purposes */
217 old_offset = prs_offset(ps);
219 if(!prs_uint16("revision ", ps, depth, &psd->revision))
220 return False;
222 if(!prs_uint16("type ", ps, depth, &psd->type))
223 return False;
225 if(!prs_uint32("off_owner_sid", ps, depth, &psd->off_owner_sid))
226 return False;
228 if(!prs_uint32("off_grp_sid ", ps, depth, &psd->off_grp_sid))
229 return False;
231 if(!prs_uint32("off_sacl ", ps, depth, &psd->off_sacl))
232 return False;
234 if(!prs_uint32("off_dacl ", ps, depth, &psd->off_dacl))
235 return False;
237 max_offset = MAX(max_offset, prs_offset(ps));
239 if (psd->off_owner_sid != 0) {
241 tmp_offset = prs_offset(ps);
242 if(!prs_set_offset(ps, old_offset + psd->off_owner_sid))
243 return False;
245 if (UNMARSHALLING(ps)) {
246 /* reading */
247 if((psd->owner_sid = (DOM_SID *)prs_alloc_mem(ps,sizeof(*psd->owner_sid))) == NULL)
248 return False;
251 if(!smb_io_dom_sid("owner_sid ", psd->owner_sid , ps, depth))
252 return False;
254 max_offset = MAX(max_offset, prs_offset(ps));
256 if (!prs_set_offset(ps,tmp_offset))
257 return False;
260 if (psd->off_grp_sid != 0) {
262 tmp_offset = prs_offset(ps);
263 if(!prs_set_offset(ps, old_offset + psd->off_grp_sid))
264 return False;
266 if (UNMARSHALLING(ps)) {
267 /* reading */
268 if((psd->grp_sid = (DOM_SID *)prs_alloc_mem(ps,sizeof(*psd->grp_sid))) == NULL)
269 return False;
272 if(!smb_io_dom_sid("grp_sid", psd->grp_sid, ps, depth))
273 return False;
275 max_offset = MAX(max_offset, prs_offset(ps));
277 if (!prs_set_offset(ps,tmp_offset))
278 return False;
281 if ((psd->type & SEC_DESC_SACL_PRESENT) && psd->off_sacl) {
282 tmp_offset = prs_offset(ps);
283 if(!prs_set_offset(ps, old_offset + psd->off_sacl))
284 return False;
285 if(!sec_io_acl("sacl", &psd->sacl, ps, depth))
286 return False;
287 max_offset = MAX(max_offset, prs_offset(ps));
288 if (!prs_set_offset(ps,tmp_offset))
289 return False;
293 if ((psd->type & SEC_DESC_DACL_PRESENT) && psd->off_dacl != 0) {
294 tmp_offset = prs_offset(ps);
295 if(!prs_set_offset(ps, old_offset + psd->off_dacl))
296 return False;
297 if(!sec_io_acl("dacl", &psd->dacl, ps, depth))
298 return False;
299 max_offset = MAX(max_offset, prs_offset(ps));
300 if (!prs_set_offset(ps,tmp_offset))
301 return False;
304 if(!prs_set_offset(ps, max_offset))
305 return False;
306 return True;
309 /*******************************************************************
310 Reads or writes a SEC_DESC_BUF structure.
311 ********************************************************************/
313 BOOL sec_io_desc_buf(const char *desc, SEC_DESC_BUF **ppsdb, prs_struct *ps, int depth)
315 uint32 off_len;
316 uint32 off_max_len;
317 uint32 old_offset;
318 uint32 size;
319 SEC_DESC_BUF *psdb;
321 if (ppsdb == NULL)
322 return False;
324 psdb = *ppsdb;
326 if (UNMARSHALLING(ps) && psdb == NULL) {
327 if((psdb = (SEC_DESC_BUF *)prs_alloc_mem(ps,sizeof(SEC_DESC_BUF))) == NULL)
328 return False;
329 *ppsdb = psdb;
332 prs_debug(ps, depth, desc, "sec_io_desc_buf");
333 depth++;
335 if(!prs_align(ps))
336 return False;
338 if(!prs_uint32_pre("max_len", ps, depth, &psdb->max_len, &off_max_len))
339 return False;
341 if(!prs_uint32 ("ptr ", ps, depth, &psdb->ptr))
342 return False;
344 if(!prs_uint32_pre("len ", ps, depth, &psdb->len, &off_len))
345 return False;
347 old_offset = prs_offset(ps);
349 /* reading, length is non-zero; writing, descriptor is non-NULL */
350 if ((UNMARSHALLING(ps) && psdb->len != 0) || (MARSHALLING(ps) && psdb->sec != NULL)) {
351 if(!sec_io_desc("sec ", &psdb->sec, ps, depth))
352 return False;
355 if(!prs_align(ps))
356 return False;
358 size = prs_offset(ps) - old_offset;
359 if(!prs_uint32_post("max_len", ps, depth, &psdb->max_len, off_max_len, size == 0 ? psdb->max_len : size))
360 return False;
362 if(!prs_uint32_post("len ", ps, depth, &psdb->len, off_len, size))
363 return False;
365 return True;