[GLUE] Rsync SAMBA_3_2_0 SVN r25598 in order to create the v3-2-test branch.
[Samba/gebeck_regimport.git] / source3 / rpc_parse / parse_lsa.c
blob15d7d80c039dedf68c3faaacb69a23eec110622d
1 /*
2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997,
7 * Copyright (C) Andrew Bartlett 2002,
8 * Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2002.
9 * Copyright (C) Gerald )Jerry) Carter 2005
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 3 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, see <http://www.gnu.org/licenses/>.
25 #include "includes.h"
27 #undef DBGC_CLASS
28 #define DBGC_CLASS DBGC_RPC_PARSE
30 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
31 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
33 /*******************************************************************
34 Inits a LSA_TRANS_NAME structure.
35 ********************************************************************/
37 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
38 uint16 sid_name_use, const char *name, uint32 idx)
40 trn->sid_name_use = sid_name_use;
41 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
42 init_uni_hdr(&trn->hdr_name, uni_name);
43 trn->domain_idx = idx;
46 /*******************************************************************
47 Reads or writes a LSA_TRANS_NAME structure.
48 ********************************************************************/
50 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps,
51 int depth)
53 prs_debug(ps, depth, desc, "lsa_io_trans_name");
54 depth++;
56 if(!prs_align(ps))
57 return False;
59 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
60 return False;
61 if(!prs_align(ps))
62 return False;
64 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
65 return False;
66 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
67 return False;
69 return True;
72 /*******************************************************************
73 Inits a LSA_TRANS_NAME2 structure.
74 ********************************************************************/
76 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
77 uint16 sid_name_use, const char *name, uint32 idx)
79 trn->sid_name_use = sid_name_use;
80 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
81 init_uni_hdr(&trn->hdr_name, uni_name);
82 trn->domain_idx = idx;
83 trn->unknown = 0;
86 /*******************************************************************
87 Reads or writes a LSA_TRANS_NAME2 structure.
88 ********************************************************************/
90 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps,
91 int depth)
93 prs_debug(ps, depth, desc, "lsa_io_trans_name2");
94 depth++;
96 if(!prs_align(ps))
97 return False;
99 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
100 return False;
101 if(!prs_align(ps))
102 return False;
104 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
105 return False;
106 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
107 return False;
108 if(!prs_uint32("unknown ", ps, depth, &trn->unknown))
109 return False;
111 return True;
114 /*******************************************************************
115 Reads or writes a DOM_R_REF structure.
116 ********************************************************************/
118 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
120 unsigned int i;
122 prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
123 depth++;
125 if(!prs_align(ps))
126 return False;
128 if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
129 return False;
130 if(!prs_uint32("ptr_ref_dom ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
131 return False;
132 if(!prs_uint32("max_entries ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
133 return False;
135 SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
137 if (dom->ptr_ref_dom != 0) {
139 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
140 return False;
142 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
144 for (i = 0; i < dom->num_ref_doms_1; i++) {
145 fstring t;
147 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
148 if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
149 return False;
151 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
152 if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
153 return False;
156 for (i = 0; i < dom->num_ref_doms_2; i++) {
157 fstring t;
159 if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
160 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
161 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
162 return False;
163 if(!prs_align(ps))
164 return False;
167 if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
168 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
169 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
170 return False;
175 return True;
178 /*******************************************************************
179 Inits an LSA_SEC_QOS structure.
180 ********************************************************************/
182 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
184 DEBUG(5, ("init_lsa_sec_qos\n"));
186 qos->len = 0x0c; /* length of quality of service block, in bytes */
187 qos->sec_imp_level = imp_lev;
188 qos->sec_ctxt_mode = ctxt;
189 qos->effective_only = eff;
192 /*******************************************************************
193 Reads or writes an LSA_SEC_QOS structure.
194 ********************************************************************/
196 static BOOL lsa_io_sec_qos(const char *desc, LSA_SEC_QOS *qos, prs_struct *ps,
197 int depth)
199 uint32 start;
201 prs_debug(ps, depth, desc, "lsa_io_obj_qos");
202 depth++;
204 if(!prs_align(ps))
205 return False;
207 start = prs_offset(ps);
209 /* these pointers had _better_ be zero, because we don't know
210 what they point to!
212 if(!prs_uint32("len ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
213 return False;
214 if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
215 return False;
216 if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
217 return False;
218 if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
219 return False;
221 if (qos->len != prs_offset(ps) - start) {
222 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
223 qos->len, prs_offset(ps) - start));
226 return True;
229 /*******************************************************************
230 Inits an LSA_OBJ_ATTR structure.
231 ********************************************************************/
233 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
235 DEBUG(5, ("init_lsa_obj_attr\n"));
237 attr->len = 0x18; /* length of object attribute block, in bytes */
238 attr->ptr_root_dir = 0;
239 attr->ptr_obj_name = 0;
240 attr->attributes = attributes;
241 attr->ptr_sec_desc = 0;
243 if (qos != NULL) {
244 attr->ptr_sec_qos = 1;
245 attr->sec_qos = qos;
246 } else {
247 attr->ptr_sec_qos = 0;
248 attr->sec_qos = NULL;
252 /*******************************************************************
253 Reads or writes an LSA_OBJ_ATTR structure.
254 ********************************************************************/
256 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps,
257 int depth)
259 prs_debug(ps, depth, desc, "lsa_io_obj_attr");
260 depth++;
262 if(!prs_align(ps))
263 return False;
265 /* these pointers had _better_ be zero, because we don't know
266 what they point to!
268 if(!prs_uint32("len ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
269 return False;
270 if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
271 return False;
272 if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
273 return False;
274 if(!prs_uint32("attributes ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
275 return False;
276 if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
277 return False;
278 if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
279 return False;
281 if (attr->ptr_sec_qos != 0) {
282 if (UNMARSHALLING(ps))
283 if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
284 return False;
286 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
287 return False;
290 return True;
294 /*******************************************************************
295 Inits an LSA_Q_OPEN_POL structure.
296 ********************************************************************/
298 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
299 uint32 attributes, uint32 desired_access,
300 LSA_SEC_QOS *qos)
302 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes,
303 desired_access));
305 in->ptr = 1; /* undocumented pointer */
307 in->des_access = desired_access;
309 in->system_name = system_name;
310 init_lsa_obj_attr(&in->attr, attributes, qos);
313 /*******************************************************************
314 Reads or writes an LSA_Q_OPEN_POL structure.
315 ********************************************************************/
317 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps,
318 int depth)
320 prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
321 depth++;
323 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
324 return False;
325 if(!prs_uint16("system_name", ps, depth, &in->system_name))
326 return False;
327 if(!prs_align( ps ))
328 return False;
330 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
331 return False;
333 if(!prs_uint32("des_access", ps, depth, &in->des_access))
334 return False;
336 return True;
339 /*******************************************************************
340 Reads or writes an LSA_R_OPEN_POL structure.
341 ********************************************************************/
343 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps,
344 int depth)
346 prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
347 depth++;
349 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
350 return False;
352 if(!prs_ntstatus("status", ps, depth, &out->status))
353 return False;
355 return True;
358 /*******************************************************************
359 Inits an LSA_Q_OPEN_POL2 structure.
360 ********************************************************************/
362 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
363 uint32 attributes, uint32 desired_access,
364 LSA_SEC_QOS *qos)
366 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes,
367 desired_access));
369 in->ptr = 1; /* undocumented pointer */
371 in->des_access = desired_access;
373 init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
375 init_lsa_obj_attr(&in->attr, attributes, qos);
378 /*******************************************************************
379 Reads or writes an LSA_Q_OPEN_POL2 structure.
380 ********************************************************************/
382 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps,
383 int depth)
385 prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
386 depth++;
388 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
389 return False;
391 if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
392 return False;
393 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
394 return False;
396 if(!prs_uint32("des_access", ps, depth, &in->des_access))
397 return False;
399 return True;
402 /*******************************************************************
403 Reads or writes an LSA_R_OPEN_POL2 structure.
404 ********************************************************************/
406 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps,
407 int depth)
409 prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
410 depth++;
412 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
413 return False;
415 if(!prs_ntstatus("status", ps, depth, &out->status))
416 return False;
418 return True;
421 /*******************************************************************
422 makes an LSA_Q_QUERY_SEC_OBJ structure.
423 ********************************************************************/
425 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd,
426 uint32 sec_info)
428 DEBUG(5, ("init_q_query_sec_obj\n"));
430 in->pol = *hnd;
431 in->sec_info = sec_info;
433 return;
436 /*******************************************************************
437 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
438 ********************************************************************/
440 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in,
441 prs_struct *ps, int depth)
443 prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
444 depth++;
446 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
447 return False;
449 if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
450 return False;
452 return True;
455 /*******************************************************************
456 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
457 ********************************************************************/
459 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
461 prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
462 depth++;
464 if (!prs_align(ps))
465 return False;
467 if (!prs_uint32("ptr", ps, depth, &out->ptr))
468 return False;
470 if (out->ptr != 0) {
471 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
472 return False;
475 if (!prs_ntstatus("status", ps, depth, &out->status))
476 return False;
478 return True;
481 /*******************************************************************
482 Inits an LSA_Q_QUERY_INFO structure.
483 ********************************************************************/
485 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
487 DEBUG(5, ("init_q_query\n"));
489 memcpy(&in->pol, hnd, sizeof(in->pol));
491 in->info_class = info_class;
494 /*******************************************************************
495 Reads or writes an LSA_Q_QUERY_INFO structure.
496 ********************************************************************/
498 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps,
499 int depth)
501 prs_debug(ps, depth, desc, "lsa_io_q_query");
502 depth++;
504 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
505 return False;
507 if(!prs_uint16("info_class", ps, depth, &in->info_class))
508 return False;
510 return True;
513 /*******************************************************************
514 makes an LSA_Q_ENUM_TRUST_DOM structure.
515 ********************************************************************/
516 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
517 uint32 enum_context, uint32 preferred_len)
519 DEBUG(5, ("init_q_enum_trust_dom\n"));
521 q_e->pol = *pol;
522 q_e->enum_context = enum_context;
523 q_e->preferred_len = preferred_len;
525 return True;
528 /*******************************************************************
529 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
530 ********************************************************************/
532 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e,
533 prs_struct *ps, int depth)
535 prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
536 depth++;
538 if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
539 return False;
541 if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
542 return False;
543 if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
544 return False;
546 return True;
549 /*******************************************************************
550 Inits an LSA_R_ENUM_TRUST_DOM structure.
551 ********************************************************************/
553 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
554 uint32 enum_context, uint32 num_domains,
555 struct trustdom_info **td)
557 unsigned int i;
559 DEBUG(5, ("init_r_enum_trust_dom\n"));
561 out->enum_context = enum_context;
562 out->count = num_domains;
564 if ( num_domains != 0 ) {
566 /* allocate container memory */
568 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
570 if ( !out->domlist ) {
571 out->status = NT_STATUS_NO_MEMORY;
572 return;
575 if (out->count) {
576 out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
577 out->count );
578 if ( !out->domlist->domains ) {
579 out->status = NT_STATUS_NO_MEMORY;
580 return;
582 } else {
583 out->domlist->domains = NULL;
586 out->domlist->count = out->count;
588 /* initialize the list of domains and their sid */
590 for (i = 0; i < num_domains; i++) {
591 smb_ucs2_t *name;
592 if ( !(out->domlist->domains[i].sid =
593 TALLOC_P(ctx, DOM_SID2)) ) {
594 out->status = NT_STATUS_NO_MEMORY;
595 return;
598 init_dom_sid2(out->domlist->domains[i].sid,
599 &(td[i])->sid);
600 if (push_ucs2_talloc(ctx, &name, (td[i])->name) == (size_t)-1){
601 out->status = NT_STATUS_NO_MEMORY;
602 return;
604 init_unistr4_w(ctx, &out->domlist->domains[i].name,
605 name);
611 /*******************************************************************
612 ********************************************************************/
614 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
616 int i;
618 prs_debug(ps, depth, desc, "lsa_io_domain_list");
619 depth++;
621 if(!prs_uint32("count", ps, depth, &domlist->count))
622 return False;
624 if ( domlist->count == 0 )
625 return True;
627 if ( UNMARSHALLING(ps) ) {
628 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
629 return False;
632 /* headers */
634 for ( i=0; i<domlist->count; i++ ) {
635 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
636 return False;
637 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
638 return False;
641 /* data */
643 for ( i=0; i<domlist->count; i++ ) {
644 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
645 return False;
646 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
647 return False;
650 return True;
653 /*******************************************************************
654 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
655 ********************************************************************/
657 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out,
658 prs_struct *ps, int depth)
660 prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
661 depth++;
663 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
664 return False;
666 if(!prs_uint32("count", ps, depth, &out->count))
667 return False;
669 if ( !prs_pointer("trusted_domains", ps, depth, (void*)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
670 return False;
672 if(!prs_ntstatus("status", ps, depth, &out->status))
673 return False;
675 return True;
678 /*******************************************************************
679 reads or writes a structure.
680 ********************************************************************/
682 static BOOL lsa_io_dom_query_1(const char *desc, DOM_QUERY_1 *d_q, prs_struct *ps, int depth)
684 if (d_q == NULL)
685 return False;
687 prs_debug(ps, depth, desc, "lsa_io_dom_query_1");
688 depth++;
690 if (!prs_align(ps))
691 return False;
693 if (!prs_uint32("percent_full", ps, depth, &d_q->percent_full))
694 return False;
695 if (!prs_uint32("log_size", ps, depth, &d_q->log_size))
696 return False;
697 if (!smb_io_nttime("retention_time", ps, depth, &d_q->retention_time))
698 return False;
699 if (!prs_uint8("shutdown_in_progress", ps, depth, &d_q->shutdown_in_progress))
700 return False;
701 if (!smb_io_nttime("time_to_shutdown", ps, depth, &d_q->time_to_shutdown))
702 return False;
703 if (!prs_uint32("next_audit_record", ps, depth, &d_q->next_audit_record))
704 return False;
705 if (!prs_uint32("unknown", ps, depth, &d_q->unknown))
706 return False;
708 return True;
711 /*******************************************************************
712 reads or writes a structure.
713 ********************************************************************/
715 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
717 if (d_q == NULL)
718 return False;
720 prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
721 depth++;
723 if (!prs_align(ps))
724 return False;
726 if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
727 return False;
728 if (!prs_uint32("ptr ", ps, depth, &d_q->ptr))
729 return False;
730 if (!prs_uint32("count1", ps, depth, &d_q->count1))
731 return False;
733 if (d_q->ptr) {
735 if (!prs_uint32("count2", ps, depth, &d_q->count2))
736 return False;
738 if (d_q->count1 != d_q->count2)
739 return False;
741 if (UNMARSHALLING(ps)) {
742 if (d_q->count2) {
743 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
744 if (!d_q->auditsettings) {
745 return False;
747 } else {
748 d_q->auditsettings = NULL;
752 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
753 return False;
756 return True;
759 /*******************************************************************
760 reads or writes a dom query structure.
761 ********************************************************************/
763 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
765 if (d_q == NULL)
766 return False;
768 prs_debug(ps, depth, desc, "lsa_io_dom_query_3");
769 depth++;
771 if(!prs_align(ps))
772 return False;
774 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
775 return False;
776 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
777 return False;
779 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
780 return False;
781 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
782 return False;
784 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
785 return False;
787 if(!prs_align(ps))
788 return False;
790 if (d_q->buffer_dom_sid != 0) {
791 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
792 return False;
793 } else {
794 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
797 return True;
800 /*******************************************************************
801 Reads or writes a dom query structure.
802 ********************************************************************/
804 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
806 return lsa_io_dom_query_3("", d_q, ps, depth);
809 /*******************************************************************
810 Reads or writes a dom query structure.
811 ********************************************************************/
813 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
815 if (d_q == NULL)
816 return False;
818 prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
819 depth++;
821 if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
822 return False;
824 return True;
827 /*******************************************************************
828 Reads or writes a dom query structure.
829 ********************************************************************/
831 static BOOL lsa_io_dom_query_10(const char *desc, DOM_QUERY_10 *d_q, prs_struct *ps, int depth)
833 if (d_q == NULL)
834 return False;
836 prs_debug(ps, depth, desc, "lsa_io_dom_query_10");
837 depth++;
839 if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
840 return False;
842 return True;
845 /*******************************************************************
846 Reads or writes a dom query structure.
847 ********************************************************************/
849 static BOOL lsa_io_dom_query_11(const char *desc, DOM_QUERY_11 *d_q, prs_struct *ps, int depth)
851 if (d_q == NULL)
852 return False;
854 prs_debug(ps, depth, desc, "lsa_io_dom_query_11");
855 depth++;
857 if (!prs_uint16("unknown", ps, depth, &d_q->unknown))
858 return False;
859 if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
860 return False;
861 if (!prs_uint8("log_is_full", ps, depth, &d_q->log_is_full))
862 return False;
864 return True;
867 /*******************************************************************
868 Reads or writes an LSA_DNS_DOM_INFO structure.
869 ********************************************************************/
871 BOOL lsa_io_dom_query_12(const char *desc, DOM_QUERY_12 *info, prs_struct *ps, int depth)
873 prs_debug(ps, depth, desc, "lsa_io_dom_query_12");
874 depth++;
876 if(!prs_align(ps))
877 return False;
878 if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
879 return False;
880 if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
881 return False;
882 if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
883 return False;
885 if(!prs_align(ps))
886 return False;
887 if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
888 return False;
890 if(!prs_align(ps))
891 return False;
892 if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
893 return False;
895 if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
896 info->hdr_nb_dom_name.buffer, ps, depth))
897 return False;
898 if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name,
899 info->hdr_dns_dom_name.buffer, ps, depth))
900 return False;
901 if(!smb_io_unistr2("forest", &info->uni_forest_name,
902 info->hdr_forest_name.buffer, ps, depth))
903 return False;
905 if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
906 return False;
908 return True;
912 /*******************************************************************
913 Inits an LSA_Q_QUERY_INFO structure.
914 ********************************************************************/
916 void init_q_set(LSA_Q_SET_INFO *in, POLICY_HND *hnd, uint16 info_class, LSA_INFO_CTR ctr)
918 DEBUG(5,("init_q_set\n"));
920 in->info_class = info_class;
922 in->pol = *hnd;
924 in->ctr = ctr;
925 in->ctr.info_class = info_class;
928 /*******************************************************************
929 reads or writes a structure.
930 ********************************************************************/
932 static BOOL lsa_io_query_info_ctr2(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR2 *ctr)
934 prs_debug(ps, depth, desc, "lsa_io_query_info_ctr2");
935 depth++;
937 if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
938 return False;
940 switch (ctr->info_class) {
941 case 1:
942 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
943 return False;
944 break;
945 case 2:
946 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
947 return False;
948 break;
949 case 3:
950 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
951 return False;
952 break;
953 case 5:
954 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
955 return False;
956 break;
957 case 6:
958 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
959 return False;
960 break;
961 case 10:
962 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
963 return False;
964 break;
965 case 11:
966 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
967 return False;
968 break;
969 case 12:
970 if(!lsa_io_dom_query_12("", &ctr->info.id12, ps, depth))
971 return False;
972 break;
973 default:
974 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
975 return False;
976 break;
979 return True;
983 /*******************************************************************
984 reads or writes a structure.
985 ********************************************************************/
987 static BOOL lsa_io_query_info_ctr(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR *ctr)
989 prs_debug(ps, depth, desc, "lsa_io_query_info_ctr");
990 depth++;
992 if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
993 return False;
995 if(!prs_align(ps))
996 return False;
998 switch (ctr->info_class) {
999 case 1:
1000 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
1001 return False;
1002 break;
1003 case 2:
1004 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
1005 return False;
1006 break;
1007 case 3:
1008 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
1009 return False;
1010 break;
1011 case 5:
1012 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
1013 return False;
1014 break;
1015 case 6:
1016 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
1017 return False;
1018 break;
1019 case 10:
1020 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
1021 return False;
1022 break;
1023 case 11:
1024 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
1025 return False;
1026 break;
1027 default:
1028 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
1029 return False;
1030 break;
1033 return True;
1036 /*******************************************************************
1037 Reads or writes an LSA_R_QUERY_INFO structure.
1038 ********************************************************************/
1040 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
1043 prs_debug(ps, depth, desc, "lsa_io_r_query");
1044 depth++;
1046 if(!prs_align(ps))
1047 return False;
1049 if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
1050 return False;
1052 if (out->dom_ptr) {
1054 if(!lsa_io_query_info_ctr("", ps, depth, &out->ctr))
1055 return False;
1058 if(!prs_align(ps))
1059 return False;
1061 if(!prs_ntstatus("status", ps, depth, &out->status))
1062 return False;
1064 return True;
1067 /*******************************************************************
1068 Reads or writes an LSA_Q_SET_INFO structure.
1069 ********************************************************************/
1071 BOOL lsa_io_q_set(const char *desc, LSA_Q_SET_INFO *in, prs_struct *ps,
1072 int depth)
1074 prs_debug(ps, depth, desc, "lsa_io_q_set");
1075 depth++;
1077 if(!prs_align(ps))
1078 return False;
1080 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1081 return False;
1083 if(!prs_uint16("info_class", ps, depth, &in->info_class))
1084 return False;
1086 if(!lsa_io_query_info_ctr("", ps, depth, &in->ctr))
1087 return False;
1089 return True;
1092 /*******************************************************************
1093 Reads or writes an LSA_R_SET_INFO structure.
1094 ********************************************************************/
1096 BOOL lsa_io_r_set(const char *desc, LSA_R_SET_INFO *out, prs_struct *ps, int depth)
1098 prs_debug(ps, depth, desc, "lsa_io_r_set");
1099 depth++;
1101 if(!prs_align(ps))
1102 return False;
1104 if(!prs_ntstatus("status", ps, depth, &out->status))
1105 return False;
1107 return True;
1110 /*******************************************************************
1111 Inits a LSA_SID_ENUM structure.
1112 ********************************************************************/
1114 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen,
1115 int num_entries, const DOM_SID *sids)
1117 int i;
1119 DEBUG(5, ("init_lsa_sid_enum\n"));
1121 sen->num_entries = num_entries;
1122 sen->ptr_sid_enum = (num_entries != 0);
1123 sen->num_entries2 = num_entries;
1125 /* Allocate memory for sids and sid pointers */
1127 if (num_entries) {
1128 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
1129 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
1130 return;
1133 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
1134 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
1135 return;
1139 /* Copy across SIDs and SID pointers */
1141 for (i = 0; i < num_entries; i++) {
1142 sen->ptr_sid[i] = 1;
1143 init_dom_sid2(&sen->sid[i], &sids[i]);
1147 /*******************************************************************
1148 Reads or writes a LSA_SID_ENUM structure.
1149 ********************************************************************/
1151 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps,
1152 int depth)
1154 unsigned int i;
1156 prs_debug(ps, depth, desc, "lsa_io_sid_enum");
1157 depth++;
1159 if(!prs_align(ps))
1160 return False;
1162 if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
1163 return False;
1164 if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
1165 return False;
1168 if the ptr is NULL, leave here. checked from a real w2k trace.
1169 JFM, 11/23/2001
1172 if (sen->ptr_sid_enum==0)
1173 return True;
1175 if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
1176 return False;
1178 /* Mallocate memory if we're unpacking from the wire */
1180 if (UNMARSHALLING(ps) && sen->num_entries) {
1181 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
1182 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1183 "ptr_sid\n"));
1184 return False;
1187 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
1188 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1189 "sids\n"));
1190 return False;
1194 for (i = 0; i < sen->num_entries; i++) {
1195 fstring temp;
1197 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
1198 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
1199 return False;
1203 for (i = 0; i < sen->num_entries; i++) {
1204 fstring temp;
1206 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
1207 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
1208 return False;
1212 return True;
1215 /*******************************************************************
1216 Inits an LSA_R_ENUM_TRUST_DOM structure.
1217 ********************************************************************/
1219 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l,
1220 POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
1221 uint16 level)
1223 DEBUG(5, ("init_q_lookup_sids\n"));
1225 ZERO_STRUCTP(q_l);
1227 memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
1228 init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
1230 q_l->level = level;
1233 /*******************************************************************
1234 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
1235 ********************************************************************/
1237 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
1238 int depth)
1240 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
1241 depth++;
1243 if(!prs_align(ps))
1244 return False;
1246 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1247 return False;
1248 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1249 return False;
1250 if(!lsa_io_trans_names("names ", &q_s->names, ps, depth)) /* translated names */
1251 return False;
1253 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1254 return False;
1255 if(!prs_align(ps))
1256 return False;
1258 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1259 return False;
1261 return True;
1264 /*******************************************************************
1265 Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1266 ********************************************************************/
1268 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1269 int depth)
1271 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1272 depth++;
1274 if(!prs_align(ps))
1275 return False;
1277 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1278 return False;
1279 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1280 return False;
1281 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1282 return False;
1284 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1285 return False;
1286 if(!prs_align(ps))
1287 return False;
1289 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1290 return False;
1291 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1292 return False;
1293 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1294 return False;
1296 return True;
1299 /*******************************************************************
1300 Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1301 ********************************************************************/
1303 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1304 int depth)
1306 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1307 depth++;
1309 if(!prs_align(ps))
1310 return False;
1312 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1313 return False;
1314 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1315 return False;
1317 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1318 return False;
1319 if(!prs_align(ps))
1320 return False;
1322 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1323 return False;
1324 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1325 return False;
1326 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1327 return False;
1329 return True;
1333 /*******************************************************************
1334 Reads or writes a structure.
1335 ********************************************************************/
1337 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1338 prs_struct *ps, int depth)
1340 unsigned int i;
1342 prs_debug(ps, depth, desc, "lsa_io_trans_names");
1343 depth++;
1345 if(!prs_align(ps))
1346 return False;
1348 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1349 return False;
1350 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1351 return False;
1353 if (trn->ptr_trans_names != 0) {
1354 if(!prs_uint32("num_entries2 ", ps, depth,
1355 &trn->num_entries2))
1356 return False;
1358 if (trn->num_entries2 != trn->num_entries) {
1359 /* RPC fault */
1360 return False;
1363 if (UNMARSHALLING(ps) && trn->num_entries2) {
1364 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries2)) == NULL) {
1365 return False;
1368 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1369 return False;
1373 for (i = 0; i < trn->num_entries2; i++) {
1374 fstring t;
1375 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1377 if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1378 return False;
1381 for (i = 0; i < trn->num_entries2; i++) {
1382 fstring t;
1383 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1385 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1386 return False;
1387 if(!prs_align(ps))
1388 return False;
1392 return True;
1395 /*******************************************************************
1396 Reads or writes a structure.
1397 ********************************************************************/
1399 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1400 prs_struct *ps, int depth)
1402 unsigned int i;
1404 prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1405 depth++;
1407 if(!prs_align(ps))
1408 return False;
1410 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1411 return False;
1412 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1413 return False;
1415 if (trn->ptr_trans_names != 0) {
1416 if(!prs_uint32("num_entries2 ", ps, depth,
1417 &trn->num_entries2))
1418 return False;
1420 if (trn->num_entries2 != trn->num_entries) {
1421 /* RPC fault */
1422 return False;
1425 if (UNMARSHALLING(ps) && trn->num_entries2) {
1426 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries2)) == NULL) {
1427 return False;
1430 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1431 return False;
1435 for (i = 0; i < trn->num_entries2; i++) {
1436 fstring t;
1437 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1439 if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1440 return False;
1443 for (i = 0; i < trn->num_entries2; i++) {
1444 fstring t;
1445 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1447 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1448 return False;
1449 if(!prs_align(ps))
1450 return False;
1454 return True;
1458 /*******************************************************************
1459 Reads or writes a structure.
1460 ********************************************************************/
1462 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s,
1463 prs_struct *ps, int depth)
1465 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1466 depth++;
1468 if(!prs_align(ps))
1469 return False;
1471 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1472 return False;
1474 if (r_s->ptr_dom_ref != 0)
1475 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1476 return False;
1478 if(!lsa_io_trans_names("names ", &r_s->names, ps, depth)) /* translated names */
1479 return False;
1481 if(!prs_align(ps))
1482 return False;
1484 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1485 return False;
1487 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1488 return False;
1490 return True;
1493 /*******************************************************************
1494 Reads or writes a structure.
1495 ********************************************************************/
1497 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s,
1498 prs_struct *ps, int depth)
1500 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1501 depth++;
1503 if(!prs_align(ps))
1504 return False;
1506 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1507 return False;
1509 if (r_s->ptr_dom_ref != 0)
1510 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1511 return False;
1513 if(!lsa_io_trans_names2("names ", &r_s->names, ps, depth)) /* translated names */
1514 return False;
1516 if(!prs_align(ps))
1517 return False;
1519 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1520 return False;
1522 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1523 return False;
1525 return True;
1529 /*******************************************************************
1530 Reads or writes a structure.
1531 ********************************************************************/
1533 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s,
1534 prs_struct *ps, int depth)
1536 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1537 depth++;
1539 if(!prs_align(ps))
1540 return False;
1542 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1543 return False;
1545 if (r_s->ptr_dom_ref != 0)
1546 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1547 return False;
1549 if(!lsa_io_trans_names2("names ", &r_s->names, ps, depth)) /* translated names */
1550 return False;
1552 if(!prs_align(ps))
1553 return False;
1555 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1556 return False;
1558 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1559 return False;
1561 return True;
1564 /*******************************************************************
1565 makes a structure.
1566 ********************************************************************/
1568 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l,
1569 POLICY_HND *hnd, int num_names, const char **names,
1570 int level)
1572 unsigned int i;
1574 DEBUG(5, ("init_q_lookup_names\n"));
1576 ZERO_STRUCTP(q_l);
1578 q_l->pol = *hnd;
1579 q_l->num_entries = num_names;
1580 q_l->num_entries2 = num_names;
1581 q_l->lookup_level = level;
1583 if (num_names) {
1584 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1585 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1586 return;
1589 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1590 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1591 return;
1593 } else {
1594 q_l->uni_name = NULL;
1595 q_l->hdr_name = NULL;
1598 for (i = 0; i < num_names; i++) {
1599 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1600 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1604 /*******************************************************************
1605 reads or writes a structure.
1606 ********************************************************************/
1608 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r,
1609 prs_struct *ps, int depth)
1611 unsigned int i;
1613 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1614 depth++;
1616 if(!prs_align(ps))
1617 return False;
1619 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1620 return False;
1622 if(!prs_align(ps))
1623 return False;
1624 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1625 return False;
1626 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1627 return False;
1629 if (UNMARSHALLING(ps)) {
1630 if (q_r->num_entries) {
1631 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1632 return False;
1633 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1634 return False;
1638 for (i = 0; i < q_r->num_entries; i++) {
1639 if(!prs_align(ps))
1640 return False;
1641 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1642 return False;
1645 for (i = 0; i < q_r->num_entries; i++) {
1646 if(!prs_align(ps))
1647 return False;
1648 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1649 return False;
1652 if(!prs_align(ps))
1653 return False;
1654 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1655 return False;
1656 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1657 return False;
1658 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1659 return False;
1660 if(!prs_align(ps))
1661 return False;
1662 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1663 return False;
1665 return True;
1668 /*******************************************************************
1669 reads or writes a structure.
1670 ********************************************************************/
1672 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1674 unsigned int i;
1676 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1677 depth++;
1679 if(!prs_align(ps))
1680 return False;
1682 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1683 return False;
1685 if (out->ptr_dom_ref != 0)
1686 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1687 return False;
1689 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1690 return False;
1691 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1692 return False;
1694 if (out->ptr_entries != 0) {
1695 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1696 return False;
1698 if (out->num_entries2 != out->num_entries) {
1699 /* RPC fault */
1700 return False;
1703 if (UNMARSHALLING(ps) && out->num_entries2) {
1704 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1705 == NULL) {
1706 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1707 return False;
1711 for (i = 0; i < out->num_entries2; i++)
1712 if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1713 return False;
1716 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1717 return False;
1719 if(!prs_ntstatus("status ", ps, depth, &out->status))
1720 return False;
1722 return True;
1725 /*******************************************************************
1726 reads or writes a structure.
1727 ********************************************************************/
1729 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r,
1730 prs_struct *ps, int depth)
1732 unsigned int i;
1734 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1735 depth++;
1737 if(!prs_align(ps))
1738 return False;
1740 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1741 return False;
1743 if(!prs_align(ps))
1744 return False;
1745 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1746 return False;
1747 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1748 return False;
1750 if (UNMARSHALLING(ps)) {
1751 if (q_r->num_entries) {
1752 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1753 return False;
1754 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1755 return False;
1759 for (i = 0; i < q_r->num_entries; i++) {
1760 if(!prs_align(ps))
1761 return False;
1762 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1763 return False;
1766 for (i = 0; i < q_r->num_entries; i++) {
1767 if(!prs_align(ps))
1768 return False;
1769 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1770 return False;
1773 if(!prs_align(ps))
1774 return False;
1775 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1776 return False;
1777 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1778 return False;
1779 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1780 return False;
1781 if(!prs_align(ps))
1782 return False;
1783 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1784 return False;
1785 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1786 return False;
1787 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1788 return False;
1790 return True;
1793 /*******************************************************************
1794 reads or writes a structure.
1795 ********************************************************************/
1797 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1799 unsigned int i;
1801 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1802 depth++;
1804 if(!prs_align(ps))
1805 return False;
1807 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1808 return False;
1810 if (out->ptr_dom_ref != 0)
1811 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1812 return False;
1814 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1815 return False;
1816 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1817 return False;
1819 if (out->ptr_entries != 0) {
1820 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1821 return False;
1823 if (out->num_entries2 != out->num_entries) {
1824 /* RPC fault */
1825 return False;
1828 if (UNMARSHALLING(ps) && out->num_entries2) {
1829 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1830 == NULL) {
1831 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1832 return False;
1836 for (i = 0; i < out->num_entries2; i++)
1837 if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1838 return False;
1841 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1842 return False;
1844 if(!prs_ntstatus("status ", ps, depth, &out->status))
1845 return False;
1847 return True;
1850 /*******************************************************************
1851 Internal lsa data type io.
1852 Following pass must read DOM_SID2 types.
1853 ********************************************************************/
1855 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r,
1856 prs_struct *ps, int depth)
1858 prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1859 depth++;
1861 if(!prs_align(ps))
1862 return False;
1863 if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1864 return False;
1865 if(!prs_align(ps))
1866 return False;
1867 /* Second pass will read/write these. */
1868 if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1869 return False;
1870 if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1871 return False;
1872 if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1873 return False;
1875 return True;
1878 /*******************************************************************
1879 Identical to lsa_io_q_lookup_names2.
1880 ********************************************************************/
1882 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r,
1883 prs_struct *ps, int depth)
1885 unsigned int i;
1887 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1888 depth++;
1890 if(!prs_align(ps))
1891 return False;
1893 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1894 return False;
1896 if(!prs_align(ps))
1897 return False;
1898 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1899 return False;
1900 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1901 return False;
1903 if (UNMARSHALLING(ps)) {
1904 if (q_r->num_entries) {
1905 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1906 return False;
1907 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1908 return False;
1912 for (i = 0; i < q_r->num_entries; i++) {
1913 if(!prs_align(ps))
1914 return False;
1915 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1916 return False;
1919 for (i = 0; i < q_r->num_entries; i++) {
1920 if(!prs_align(ps))
1921 return False;
1922 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1923 return False;
1926 if(!prs_align(ps))
1927 return False;
1928 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1929 return False;
1930 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1931 return False;
1932 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1933 return False;
1934 if(!prs_align(ps))
1935 return False;
1936 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1937 return False;
1938 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1939 return False;
1940 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1941 return False;
1943 return True;
1946 /*******************************************************************
1947 reads or writes a structure.
1948 ********************************************************************/
1950 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1952 unsigned int i;
1954 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1955 depth++;
1957 if(!prs_align(ps))
1958 return False;
1960 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1961 return False;
1963 if (out->ptr_dom_ref != 0)
1964 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1965 return False;
1967 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1968 return False;
1969 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1970 return False;
1972 if (out->ptr_entries != 0) {
1973 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1974 return False;
1976 if (out->num_entries2 != out->num_entries) {
1977 /* RPC fault */
1978 return False;
1981 if (UNMARSHALLING(ps) && out->num_entries2) {
1982 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1983 == NULL) {
1984 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1985 return False;
1989 for (i = 0; i < out->num_entries2; i++) {
1990 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1991 return False;
1994 /* Now process the DOM_SID2 entries. */
1995 for (i = 0; i < out->num_entries2; i++) {
1996 if (out->trans_sids[i].sid2) {
1997 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1998 return False;
2004 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2005 return False;
2007 if(!prs_ntstatus("status ", ps, depth, &out->status))
2008 return False;
2010 return True;
2013 /*******************************************************************
2014 ********************************************************************/
2016 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r,
2017 prs_struct *ps, int depth)
2019 unsigned int i;
2021 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names4");
2022 depth++;
2024 if(!prs_align(ps))
2025 return False;
2027 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
2028 return False;
2029 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
2030 return False;
2032 if (UNMARSHALLING(ps)) {
2033 if (q_r->num_entries) {
2034 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
2035 return False;
2036 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
2037 return False;
2041 for (i = 0; i < q_r->num_entries; i++) {
2042 if(!prs_align(ps))
2043 return False;
2044 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
2045 return False;
2048 for (i = 0; i < q_r->num_entries; i++) {
2049 if(!prs_align(ps))
2050 return False;
2051 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
2052 return False;
2055 if(!prs_align(ps))
2056 return False;
2057 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
2058 return False;
2059 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
2060 return False;
2061 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
2062 return False;
2063 if(!prs_align(ps))
2064 return False;
2065 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
2066 return False;
2067 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
2068 return False;
2069 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
2070 return False;
2072 return True;
2075 /*******************************************************************
2076 Identical to lsa_io_r_lookup_names3.
2077 ********************************************************************/
2079 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
2081 unsigned int i;
2083 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
2084 depth++;
2086 if(!prs_align(ps))
2087 return False;
2089 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
2090 return False;
2092 if (out->ptr_dom_ref != 0)
2093 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
2094 return False;
2096 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
2097 return False;
2098 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
2099 return False;
2101 if (out->ptr_entries != 0) {
2102 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
2103 return False;
2105 if (out->num_entries2 != out->num_entries) {
2106 /* RPC fault */
2107 return False;
2110 if (UNMARSHALLING(ps) && out->num_entries2) {
2111 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
2112 == NULL) {
2113 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
2114 return False;
2118 for (i = 0; i < out->num_entries2; i++) {
2119 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
2120 return False;
2123 /* Now process the DOM_SID2 entries. */
2124 for (i = 0; i < out->num_entries2; i++) {
2125 if (out->trans_sids[i].sid2) {
2126 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
2127 return False;
2133 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2134 return False;
2136 if(!prs_ntstatus("status ", ps, depth, &out->status))
2137 return False;
2139 return True;
2142 /*******************************************************************
2143 Reads or writes an LSA_Q_OPEN_SECRET structure.
2144 ********************************************************************/
2146 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
2148 prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
2149 depth++;
2151 if(!prs_align(ps))
2152 return False;
2154 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
2155 return False;
2157 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
2158 return False;
2159 if(!prs_align(ps))
2160 return False;
2162 if(!prs_uint32("access", ps, depth, &in->access))
2163 return False;
2165 return True;
2168 /*******************************************************************
2169 Reads or writes an LSA_R_OPEN_SECRET structure.
2170 ********************************************************************/
2172 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
2174 prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
2175 depth++;
2177 if(!prs_align(ps))
2178 return False;
2180 if(!smb_io_pol_hnd("", &out->handle, ps, depth))
2181 return False;
2183 if(!prs_ntstatus("status", ps, depth, &out->status))
2184 return False;
2186 return True;
2189 /*******************************************************************
2190 Inits an LSA_Q_ENUM_PRIVS structure.
2191 ********************************************************************/
2193 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2195 DEBUG(5, ("init_q_enum_privs\n"));
2197 memcpy(&in->pol, hnd, sizeof(in->pol));
2199 in->enum_context = enum_context;
2200 in->pref_max_length = pref_max_length;
2203 /*******************************************************************
2204 reads or writes a structure.
2205 ********************************************************************/
2206 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
2208 if (in == NULL)
2209 return False;
2211 prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
2212 depth++;
2214 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2215 return False;
2217 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2218 return False;
2219 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2220 return False;
2222 return True;
2225 /*******************************************************************
2226 reads or writes a structure.
2227 ********************************************************************/
2228 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
2230 uint32 i;
2232 if (entries == NULL)
2233 return False;
2235 prs_debug(ps, depth, desc, "lsa_io_priv_entries");
2236 depth++;
2238 if(!prs_align(ps))
2239 return False;
2241 for (i = 0; i < count; i++) {
2242 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2243 return False;
2244 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2245 return False;
2246 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2247 return False;
2250 for (i = 0; i < count; i++)
2251 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2252 return False;
2254 return True;
2257 /*******************************************************************
2258 Inits an LSA_R_ENUM_PRIVS structure.
2259 ********************************************************************/
2261 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2262 uint32 count, LSA_PRIV_ENTRY *entries)
2264 DEBUG(5, ("init_lsa_r_enum_privs\n"));
2266 out->enum_context=enum_context;
2267 out->count=count;
2269 if (entries!=NULL) {
2270 out->ptr=1;
2271 out->count1=count;
2272 out->privs=entries;
2273 } else {
2274 out->ptr=0;
2275 out->count1=0;
2276 out->privs=NULL;
2280 /*******************************************************************
2281 reads or writes a structure.
2282 ********************************************************************/
2283 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2285 if (out == NULL)
2286 return False;
2288 prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2289 depth++;
2291 if(!prs_align(ps))
2292 return False;
2294 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2295 return False;
2296 if(!prs_uint32("count", ps, depth, &out->count))
2297 return False;
2298 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2299 return False;
2301 if (out->ptr) {
2302 if(!prs_uint32("count1", ps, depth, &out->count1))
2303 return False;
2305 if (UNMARSHALLING(ps) && out->count1)
2306 if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2307 return False;
2309 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2310 return False;
2313 if(!prs_align(ps))
2314 return False;
2316 if(!prs_ntstatus("status", ps, depth, &out->status))
2317 return False;
2319 return True;
2322 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2324 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2326 init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2327 init_uni_hdr(&trn->hdr_name, &trn->name);
2328 trn->lang_id = lang_id;
2329 trn->lang_id_sys = lang_id_sys;
2332 /*******************************************************************
2333 reads or writes a structure.
2334 ********************************************************************/
2335 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2337 if (in == NULL)
2338 return False;
2340 prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2341 depth++;
2343 if(!prs_align(ps))
2344 return False;
2346 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2347 return False;
2349 if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2350 return False;
2352 if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2353 return False;
2355 if(!prs_uint16("lang_id ", ps, depth, &in->lang_id))
2356 return False;
2357 if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2358 return False;
2360 return True;
2363 /*******************************************************************
2364 reads or writes a structure.
2365 ********************************************************************/
2366 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2368 if (out == NULL)
2369 return False;
2371 prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2372 depth++;
2374 if (!prs_align(ps))
2375 return False;
2377 if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2378 return False;
2380 if (out->ptr_info){
2381 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2382 return False;
2384 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2385 return False;
2388 if(!prs_align(ps))
2389 return False;
2391 if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2392 return False;
2394 if(!prs_align(ps))
2395 return False;
2396 if(!prs_ntstatus("status", ps, depth, &out->status))
2397 return False;
2399 return True;
2403 initialise a LSA_Q_ENUM_ACCOUNTS structure
2405 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2407 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2409 trn->enum_context = enum_context;
2410 trn->pref_max_length = pref_max_length;
2413 /*******************************************************************
2414 reads or writes a structure.
2415 ********************************************************************/
2416 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2418 if (in == NULL)
2419 return False;
2421 prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2422 depth++;
2424 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2425 return False;
2427 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2428 return False;
2429 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2430 return False;
2432 return True;
2436 /*******************************************************************
2437 Inits an LSA_R_ENUM_PRIVS structure.
2438 ********************************************************************/
2440 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2442 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2444 out->enum_context=enum_context;
2445 if (out->enum_context!=0) {
2446 out->sids.num_entries=enum_context;
2447 out->sids.ptr_sid_enum=1;
2448 out->sids.num_entries2=enum_context;
2449 } else {
2450 out->sids.num_entries=0;
2451 out->sids.ptr_sid_enum=0;
2452 out->sids.num_entries2=0;
2456 /*******************************************************************
2457 reads or writes a structure.
2458 ********************************************************************/
2459 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2461 if (out == NULL)
2462 return False;
2464 prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2465 depth++;
2467 if (!prs_align(ps))
2468 return False;
2470 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2471 return False;
2473 if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2474 return False;
2476 if (!prs_align(ps))
2477 return False;
2479 if(!prs_ntstatus("status", ps, depth, &out->status))
2480 return False;
2482 return True;
2486 /*******************************************************************
2487 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2488 ********************************************************************/
2490 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2492 prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2493 depth++;
2495 if(!prs_align(ps))
2496 return False;
2498 if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2499 return False;
2501 if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2502 return False;
2504 if (!prs_align(ps))
2505 return False;
2507 if(!prs_uint32("unk1", ps, depth, &in->unk1))
2508 return False;
2509 if(!prs_uint32("unk2", ps, depth, &in->unk2))
2510 return False;
2511 if(!prs_uint32("unk3", ps, depth, &in->unk3))
2512 return False;
2514 /* Don't bother to read or write at present... */
2515 return True;
2518 /*******************************************************************
2519 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2520 ********************************************************************/
2522 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2524 prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2525 depth++;
2527 if(!prs_align(ps))
2528 return False;
2530 if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2531 return False;
2532 if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2533 return False;
2534 if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2535 return False;
2537 if (!prs_align(ps))
2538 return False;
2540 if(!prs_uint32("unk1", ps, depth, &out->unk1))
2541 return False;
2543 if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2544 return False;
2545 if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2546 return False;
2547 if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2548 return False;
2550 if (!prs_align(ps))
2551 return False;
2553 if(!prs_ntstatus("status", ps, depth, &out->status))
2554 return False;
2556 return True;
2559 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2561 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2563 init_dom_sid2(&trn->sid, sid);
2564 trn->access = desired_access;
2568 /*******************************************************************
2569 Reads or writes an LSA_Q_CREATEACCOUNT structure.
2570 ********************************************************************/
2572 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2574 prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2575 depth++;
2577 if(!prs_align(ps))
2578 return False;
2580 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2581 return False;
2583 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2584 return False;
2586 if(!prs_uint32("access", ps, depth, &out->access))
2587 return False;
2589 return True;
2592 /*******************************************************************
2593 Reads or writes an LSA_R_CREATEACCOUNT structure.
2594 ********************************************************************/
2596 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT *out, prs_struct *ps, int depth)
2598 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2599 depth++;
2601 if(!prs_align(ps))
2602 return False;
2604 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2605 return False;
2607 if(!prs_ntstatus("status", ps, depth, &out->status))
2608 return False;
2610 return True;
2614 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2616 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2618 init_dom_sid2(&trn->sid, sid);
2619 trn->access = desired_access;
2622 /*******************************************************************
2623 Reads or writes an LSA_Q_OPENACCOUNT structure.
2624 ********************************************************************/
2626 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2628 prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2629 depth++;
2631 if(!prs_align(ps))
2632 return False;
2634 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2635 return False;
2637 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2638 return False;
2640 if(!prs_uint32("access", ps, depth, &out->access))
2641 return False;
2643 return True;
2646 /*******************************************************************
2647 Reads or writes an LSA_R_OPENACCOUNT structure.
2648 ********************************************************************/
2650 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT *out, prs_struct *ps, int depth)
2652 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2653 depth++;
2655 if(!prs_align(ps))
2656 return False;
2658 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2659 return False;
2661 if(!prs_ntstatus("status", ps, depth, &out->status))
2662 return False;
2664 return True;
2668 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2670 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2674 /*******************************************************************
2675 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2676 ********************************************************************/
2678 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2680 prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2681 depth++;
2683 if(!prs_align(ps))
2684 return False;
2686 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2687 return False;
2689 return True;
2692 /*******************************************************************
2693 Reads or writes an LUID structure.
2694 ********************************************************************/
2696 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2698 prs_debug(ps, depth, desc, "lsa_io_luid");
2699 depth++;
2701 if(!prs_align(ps))
2702 return False;
2704 if(!prs_uint32("low", ps, depth, &out->low))
2705 return False;
2707 if(!prs_uint32("high", ps, depth, &out->high))
2708 return False;
2710 return True;
2713 /*******************************************************************
2714 Reads or writes an LUID_ATTR structure.
2715 ********************************************************************/
2717 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2719 prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2720 depth++;
2722 if(!prs_align(ps))
2723 return False;
2725 if (!lsa_io_luid(desc, &out->luid, ps, depth))
2726 return False;
2728 if(!prs_uint32("attr", ps, depth, &out->attr))
2729 return False;
2731 return True;
2734 /*******************************************************************
2735 Reads or writes an PRIVILEGE_SET structure.
2736 ********************************************************************/
2738 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2740 uint32 i, dummy;
2742 prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2743 depth++;
2745 if(!prs_align(ps))
2746 return False;
2748 if(!prs_uint32("count", ps, depth, &dummy))
2749 return False;
2750 if(!prs_uint32("control", ps, depth, &out->control))
2751 return False;
2753 for (i=0; i<out->count; i++) {
2754 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2755 return False;
2758 return True;
2761 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2763 NTSTATUS ret = NT_STATUS_OK;
2765 out->ptr = 1;
2766 out->count = count;
2768 if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2769 return ret;
2771 out->set.count = count;
2773 if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2774 return ret;
2776 DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2778 return ret;
2781 /*******************************************************************
2782 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2783 ********************************************************************/
2785 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2787 prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2788 depth++;
2790 if(!prs_align(ps))
2791 return False;
2793 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2794 return False;
2796 if (out->ptr!=0) {
2797 if(!prs_uint32("count", ps, depth, &out->count))
2798 return False;
2800 /* malloc memory if unmarshalling here */
2802 if (UNMARSHALLING(ps) && out->count != 0) {
2803 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2804 return False;
2806 if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2807 return False;
2811 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2812 return False;
2815 if(!prs_ntstatus("status", ps, depth, &out->status))
2816 return False;
2818 return True;
2823 /*******************************************************************
2824 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
2825 ********************************************************************/
2827 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2829 prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2830 depth++;
2832 if(!prs_align(ps))
2833 return False;
2835 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2836 return False;
2838 return True;
2841 /*******************************************************************
2842 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
2843 ********************************************************************/
2845 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2847 prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2848 depth++;
2850 if(!prs_align(ps))
2851 return False;
2853 if(!prs_uint32("access", ps, depth, &out->access))
2854 return False;
2856 if(!prs_ntstatus("status", ps, depth, &out->status))
2857 return False;
2859 return True;
2863 /*******************************************************************
2864 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2865 ********************************************************************/
2867 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2869 prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2870 depth++;
2872 if(!prs_align(ps))
2873 return False;
2875 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2876 return False;
2878 if(!prs_uint32("access", ps, depth, &out->access))
2879 return False;
2881 return True;
2884 /*******************************************************************
2885 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2886 ********************************************************************/
2888 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2890 prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2891 depth++;
2893 if(!prs_align(ps))
2894 return False;
2896 if(!prs_ntstatus("status", ps, depth, &out->status))
2897 return False;
2899 return True;
2903 void init_lsa_string( LSA_STRING *uni, const char *string )
2905 init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2906 init_uni_hdr(&uni->hdr, &uni->unistring);
2909 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2911 memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2912 init_lsa_string( &q_u->privname, name );
2915 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2917 prs_debug(ps, depth, desc, "smb_io_lsa_string");
2918 depth++;
2920 if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2921 return False;
2922 if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2923 return False;
2925 return True;
2928 /*******************************************************************
2929 Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE structure.
2930 ********************************************************************/
2932 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2934 prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2935 depth++;
2937 if(!prs_align(ps))
2938 return False;
2940 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2941 return False;
2942 if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2943 return False;
2945 return True;
2948 /*******************************************************************
2949 Reads or writes an LSA_R_LOOKUP_PRIV_VALUE structure.
2950 ********************************************************************/
2952 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2954 prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2955 depth++;
2957 if(!prs_align(ps))
2958 return False;
2960 if(!lsa_io_luid("luid", &out->luid, ps, depth))
2961 return False;
2963 if(!prs_ntstatus("status", ps, depth, &out->status))
2964 return False;
2966 return True;
2970 /*******************************************************************
2971 Reads or writes an LSA_Q_ADDPRIVS structure.
2972 ********************************************************************/
2974 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
2976 prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
2977 depth++;
2979 if(!prs_align(ps))
2980 return False;
2982 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2983 return False;
2985 if(!prs_uint32("count", ps, depth, &out->count))
2986 return False;
2988 if (UNMARSHALLING(ps) && out->count!=0) {
2989 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2990 return False;
2992 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
2993 return False;
2996 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2997 return False;
2999 return True;
3002 /*******************************************************************
3003 Reads or writes an LSA_R_ADDPRIVS structure.
3004 ********************************************************************/
3006 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
3008 prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
3009 depth++;
3011 if(!prs_align(ps))
3012 return False;
3014 if(!prs_ntstatus("status", ps, depth, &out->status))
3015 return False;
3017 return True;
3020 /*******************************************************************
3021 Reads or writes an LSA_Q_REMOVEPRIVS structure.
3022 ********************************************************************/
3024 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
3026 prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
3027 depth++;
3029 if(!prs_align(ps))
3030 return False;
3032 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3033 return False;
3035 if(!prs_uint32("allrights", ps, depth, &out->allrights))
3036 return False;
3038 if(!prs_uint32("ptr", ps, depth, &out->ptr))
3039 return False;
3042 * JFM: I'm not sure at all if the count is inside the ptr
3043 * never seen one with ptr=0
3046 if (out->ptr!=0) {
3047 if(!prs_uint32("count", ps, depth, &out->count))
3048 return False;
3050 if (UNMARSHALLING(ps) && out->count!=0) {
3051 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3052 return False;
3054 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3055 return False;
3058 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3059 return False;
3062 return True;
3065 /*******************************************************************
3066 Reads or writes an LSA_R_REMOVEPRIVS structure.
3067 ********************************************************************/
3069 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
3071 prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
3072 depth++;
3074 if(!prs_align(ps))
3075 return False;
3077 if(!prs_ntstatus("status", ps, depth, &out->status))
3078 return False;
3080 return True;
3083 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
3085 POLICY_HND zero_pol;
3087 ZERO_STRUCT(zero_pol);
3088 return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
3091 /*******************************************************************
3092 Inits an LSA_Q_QUERY_INFO2 structure.
3093 ********************************************************************/
3095 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
3097 DEBUG(5, ("init_q_query2\n"));
3099 memcpy(&in->pol, hnd, sizeof(in->pol));
3101 in->info_class = info_class;
3104 /*******************************************************************
3105 Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
3106 ********************************************************************/
3108 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
3110 prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
3111 depth++;
3113 if(!prs_align(ps))
3114 return False;
3116 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3117 return False;
3119 if(!prs_uint16("info_class", ps, depth, &in->info_class))
3120 return False;
3122 return True;
3125 /*******************************************************************
3126 Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
3127 ********************************************************************/
3129 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
3130 prs_struct *ps, int depth)
3132 prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
3133 depth++;
3135 if(!prs_align(ps))
3136 return False;
3138 if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
3139 return False;
3141 if (out->dom_ptr) {
3143 if(!lsa_io_query_info_ctr2("", ps, depth, &out->ctr))
3144 return False;
3147 if(!prs_align(ps))
3148 return False;
3149 if(!prs_ntstatus("status", ps, depth, &out->status))
3150 return False;
3152 return True;
3155 /*******************************************************************
3156 Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
3157 ********************************************************************/
3158 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in,
3159 POLICY_HND *hnd,
3160 uint32 count,
3161 DOM_SID *sid)
3163 DEBUG(5, ("init_q_enum_acct_rights\n"));
3165 in->pol = *hnd;
3166 init_dom_sid2(&in->sid, sid);
3169 /*******************************************************************
3170 ********************************************************************/
3171 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
3173 uint32 i;
3174 const char *privname;
3175 const char **privname_array = NULL;
3176 int num_priv = 0;
3178 for ( i=0; i<privileges->count; i++ ) {
3179 privname = luid_to_privilege_name( &privileges->set[i].luid );
3180 if ( privname ) {
3181 if ( !add_string_to_array( talloc_tos(), privname, &privname_array, &num_priv ) )
3182 return NT_STATUS_NO_MEMORY;
3186 if ( num_priv ) {
3187 out->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3188 if (!out->rights) {
3189 return NT_STATUS_NO_MEMORY;
3192 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) )
3193 return NT_STATUS_NO_MEMORY;
3195 out->count = num_priv;
3198 return NT_STATUS_OK;
3201 /*******************************************************************
3202 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3203 ********************************************************************/
3204 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3207 if (in == NULL)
3208 return False;
3210 prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3211 depth++;
3213 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3214 return False;
3216 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3217 return False;
3219 return True;
3223 /*******************************************************************
3224 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3225 ********************************************************************/
3226 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3228 prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3229 depth++;
3231 if(!prs_uint32("count ", ps, depth, &out->count))
3232 return False;
3234 if ( !prs_pointer("rights", ps, depth, (void*)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3235 return False;
3237 if(!prs_align(ps))
3238 return False;
3240 if(!prs_ntstatus("status", ps, depth, &out->status))
3241 return False;
3243 return True;
3247 /*******************************************************************
3248 Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3249 ********************************************************************/
3250 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd,
3251 DOM_SID *sid, uint32 count, const char **rights )
3253 DEBUG(5, ("init_q_add_acct_rights\n"));
3255 in->pol = *hnd;
3256 init_dom_sid2(&in->sid, sid);
3258 in->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3259 if (!in->rights) {
3260 smb_panic("init_q_add_acct_rights: talloc fail\n");
3261 return;
3263 init_unistr4_array( in->rights, count, rights );
3265 in->count = count;
3269 /*******************************************************************
3270 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3271 ********************************************************************/
3272 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3274 prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3275 depth++;
3277 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3278 return False;
3280 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3281 return False;
3283 if(!prs_uint32("count", ps, depth, &in->count))
3284 return False;
3286 if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3287 return False;
3289 return True;
3292 /*******************************************************************
3293 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3294 ********************************************************************/
3295 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3297 prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3298 depth++;
3300 if(!prs_ntstatus("status", ps, depth, &out->status))
3301 return False;
3303 return True;
3306 /*******************************************************************
3307 Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3308 ********************************************************************/
3310 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in,
3311 POLICY_HND *hnd,
3312 DOM_SID *sid,
3313 uint32 removeall,
3314 uint32 count,
3315 const char **rights)
3317 DEBUG(5, ("init_q_remove_acct_rights\n"));
3319 in->pol = *hnd;
3321 init_dom_sid2(&in->sid, sid);
3323 in->removeall = removeall;
3324 in->count = count;
3326 in->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3327 if (!in->rights) {
3328 smb_panic("init_q_remove_acct_rights: talloc fail\n");
3329 return;
3331 init_unistr4_array( in->rights, count, rights );
3334 /*******************************************************************
3335 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3336 ********************************************************************/
3338 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3340 prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3341 depth++;
3343 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3344 return False;
3346 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3347 return False;
3349 if(!prs_uint32("removeall", ps, depth, &in->removeall))
3350 return False;
3352 if(!prs_uint32("count", ps, depth, &in->count))
3353 return False;
3355 if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3356 return False;
3358 return True;
3361 /*******************************************************************
3362 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3363 ********************************************************************/
3364 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3366 prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3367 depth++;
3369 if(!prs_ntstatus("status", ps, depth, &out->status))
3370 return False;
3372 return True;
3375 /*******************************************************************
3376 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3377 ********************************************************************/
3379 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3381 memcpy(&q->pol, hnd, sizeof(q->pol));
3383 init_dom_sid2(&q->sid, sid);
3384 q->access_mask = desired_access;
3387 /*******************************************************************
3388 ********************************************************************/
3390 #if 0 /* jerry, I think this not correct - gd */
3391 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3393 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3394 depth++;
3396 if(!prs_align(ps))
3397 return False;
3399 if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3400 return False;
3402 if(!prs_uint32("count", ps, depth, &in->count))
3403 return False;
3405 if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3406 return False;
3408 return True;
3410 #endif
3413 /*******************************************************************
3414 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3415 ********************************************************************/
3417 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q,
3418 POLICY_HND *hnd,
3419 const char *name,
3420 uint32 desired_access)
3422 memcpy(&q->pol, hnd, sizeof(q->pol));
3424 init_lsa_string(&q->name, name);
3425 q->access_mask = desired_access;
3428 /*******************************************************************
3429 ********************************************************************/
3432 /*******************************************************************
3433 Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3434 ********************************************************************/
3436 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3438 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3439 depth++;
3441 if(!prs_align(ps))
3442 return False;
3444 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3445 return False;
3447 if(!prs_align(ps))
3448 return False;
3450 if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3451 return False;
3453 if(!prs_align(ps))
3454 return False;
3456 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3457 return False;
3459 return True;
3462 /*******************************************************************
3463 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3464 ********************************************************************/
3466 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3468 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3469 depth++;
3471 if(!prs_align(ps))
3472 return False;
3474 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3475 return False;
3477 if(!prs_ntstatus("status", ps, depth, &out->status))
3478 return False;
3480 return True;
3483 /*******************************************************************
3484 ********************************************************************/
3486 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3488 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3489 depth++;
3491 if(!prs_align(ps))
3492 return False;
3494 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3495 return False;
3497 if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3498 return False;
3500 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3501 return False;
3503 return True;
3506 /*******************************************************************
3507 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3508 ********************************************************************/
3510 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3512 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3513 depth++;
3515 if(!prs_align(ps))
3516 return False;
3518 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3519 return False;
3521 if(!prs_ntstatus("status", ps, depth, &out->status))
3522 return False;
3524 return True;
3527 /*******************************************************************
3528 ********************************************************************/
3530 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3532 prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3533 depth++;
3535 if(!prs_align(ps))
3536 return False;
3538 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3539 return False;
3541 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3542 return False;
3543 if(!prs_align(ps))
3544 return False;
3546 if(!prs_uint32("access", ps, depth, &in->access))
3547 return False;
3549 return True;
3552 /*******************************************************************
3553 ********************************************************************/
3555 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3557 prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3558 depth++;
3560 if(!prs_align(ps))
3561 return False;
3563 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3564 return False;
3566 if(!prs_ntstatus("status", ps, depth, &out->status))
3567 return False;
3569 return True;
3572 /*******************************************************************
3573 ********************************************************************/
3575 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3577 prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3578 depth++;
3580 if(!prs_align(ps))
3581 return False;
3583 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3584 return False;
3586 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3587 return False;
3588 if(!prs_align(ps))
3589 return False;
3591 if(!prs_uint32("access", ps, depth, &in->access))
3592 return False;
3594 return True;
3597 /*******************************************************************
3598 ********************************************************************/
3600 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3602 prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3603 depth++;
3605 if(!prs_align(ps))
3606 return False;
3608 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3609 return False;
3611 if(!prs_ntstatus("status", ps, depth, &out->status))
3612 return False;
3614 return True;
3619 /*******************************************************************
3620 ********************************************************************/
3622 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3624 prs_debug(ps, depth, desc, "lsa_io_data_blob");
3625 depth++;
3627 if ( !prs_uint32("size", ps, depth, &blob->size) )
3628 return False;
3629 if ( !prs_uint32("size", ps, depth, &blob->size) )
3630 return False;
3632 if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3633 return False;
3635 return True;
3638 /*******************************************************************
3639 ********************************************************************/
3641 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3643 prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3644 depth++;
3646 if ( !prs_align(ps) )
3647 return False;
3649 if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3650 return False;
3652 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3653 return False;
3655 if( !prs_align(ps) )
3656 return False;
3657 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3658 return False;
3661 return True;
3664 /*******************************************************************
3665 ********************************************************************/
3667 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3669 prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3670 depth++;
3672 if(!prs_ntstatus("status", ps, depth, &out->status))
3673 return False;
3675 return True;
3678 /*******************************************************************
3679 ********************************************************************/
3681 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3683 prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3684 depth++;
3686 if(!prs_align(ps))
3687 return False;
3689 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3690 return False;
3692 return True;
3695 /*******************************************************************
3696 ********************************************************************/
3698 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3700 prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3701 depth++;
3703 if(!prs_ntstatus("status", ps, depth, &out->status))
3704 return False;
3706 return True;
3709 /*******************************************************************
3710 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3711 ********************************************************************/
3713 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q,
3714 POLICY_HND *hnd, uint16 info_class)
3716 DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3718 q->pol = *hnd;
3719 q->info_class = info_class;
3722 /*******************************************************************
3723 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3724 ********************************************************************/
3726 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q,
3727 POLICY_HND *hnd, uint16 info_class,
3728 const char *dom_name)
3730 DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3732 q->pol = *hnd;
3733 init_lsa_string(&q->domain_name, dom_name );
3734 q->info_class = info_class;
3737 /*******************************************************************
3738 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3739 ********************************************************************/
3741 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q,
3742 POLICY_HND *hnd, uint16 info_class,
3743 DOM_SID *dom_sid)
3745 DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3747 q->pol = *hnd;
3748 init_dom_sid2(&q->dom_sid, dom_sid);
3749 q->info_class = info_class;
3752 /*******************************************************************
3753 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3754 ********************************************************************/
3756 BOOL lsa_io_q_query_trusted_domain_info(const char *desc,
3757 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3758 prs_struct *ps, int depth)
3760 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3761 depth++;
3763 if(!prs_align(ps))
3764 return False;
3766 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3767 return False;
3769 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3770 return False;
3772 return True;
3776 /*******************************************************************
3777 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3778 ********************************************************************/
3780 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc,
3781 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3782 prs_struct *ps, int depth)
3784 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3785 depth++;
3787 if(!prs_align(ps))
3788 return False;
3790 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3791 return False;
3793 if(!prs_align(ps))
3794 return False;
3796 if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3797 return False;
3799 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3800 return False;
3802 return True;
3805 /*******************************************************************
3806 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3807 ********************************************************************/
3809 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc,
3810 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3811 prs_struct *ps, int depth)
3813 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3814 depth++;
3816 if(!prs_align(ps))
3817 return False;
3819 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3820 return False;
3822 if(!prs_align(ps))
3823 return False;
3825 if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3826 return False;
3828 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3829 return False;
3831 return True;
3834 /*******************************************************************
3835 ********************************************************************/
3837 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr,
3838 prs_struct *ps, int depth)
3840 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3841 depth++;
3843 if(!prs_align(ps))
3844 return False;
3846 if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3847 return False;
3849 if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3850 return False;
3852 if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3853 return False;
3855 return True;
3858 /*******************************************************************
3859 ********************************************************************/
3861 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf,
3862 prs_struct *ps, int depth, int length, int size)
3864 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3865 depth++;
3867 if ( UNMARSHALLING(ps) && length ) {
3868 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3869 return False;
3872 if (!prs_uint32("size", ps, depth, &buf->size))
3873 return False;
3875 if (!prs_uint32("offset", ps, depth, &buf->offset))
3876 return False;
3878 if (!prs_uint32("length", ps, depth, &buf->length))
3879 return False;
3881 if(!prs_uint8s(False, "data", ps, depth, buf->data, length))
3882 return False;
3884 return True;
3887 /*******************************************************************
3888 ********************************************************************/
3890 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name,
3891 prs_struct *ps, int depth)
3893 if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3894 return False;
3896 return True;
3899 /*******************************************************************
3900 ********************************************************************/
3902 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix,
3903 prs_struct *ps, int depth)
3905 if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3906 return False;
3908 return True;
3911 /*******************************************************************
3912 ********************************************************************/
3914 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password,
3915 prs_struct *ps, int depth)
3917 if(!prs_align(ps))
3918 return False;
3920 if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3921 return False;
3923 if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3924 return False;
3926 if (&password->ptr_password) {
3928 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3929 return False;
3931 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth,
3932 password->password_hdr.length, password->password_hdr.size))
3933 return False;
3936 if (&password->ptr_old_password) {
3938 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3939 return False;
3941 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth,
3942 password->old_password_hdr.length, password->old_password_hdr.size))
3943 return False;
3946 return True;
3949 /*******************************************************************
3950 ********************************************************************/
3952 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex,
3953 prs_struct *ps, int depth)
3955 uint32 dom_sid_ptr;
3957 if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
3958 return False;
3960 if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
3961 return False;
3963 if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
3964 return False;
3966 if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
3967 return False;
3969 if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
3970 return False;
3972 if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
3973 return False;
3975 if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
3976 return False;
3978 if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
3979 return False;
3981 if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
3982 return False;
3984 return True;
3987 /*******************************************************************
3988 ********************************************************************/
3990 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
3992 prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
3993 depth++;
3995 if(!prs_uint16("info_class", ps, depth, &info->info_class))
3996 return False;
3998 if(!prs_align(ps))
3999 return False;
4001 switch (info->info_class) {
4002 case 1:
4003 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
4004 return False;
4005 break;
4006 case 3:
4007 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
4008 return False;
4009 break;
4010 case 4:
4011 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
4012 return False;
4013 break;
4014 case 6:
4015 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
4016 return False;
4017 break;
4018 default:
4019 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4020 return False;
4023 return True;
4026 /*******************************************************************
4027 Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
4028 ********************************************************************/
4030 BOOL lsa_io_r_query_trusted_domain_info(const char *desc,
4031 LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q,
4032 prs_struct *ps, int depth)
4034 if (r_q == NULL)
4035 return False;
4037 prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
4038 depth++;
4040 if (!prs_pointer("trustdom", ps, depth, (void*)&r_q->info,
4041 sizeof(LSA_TRUSTED_DOMAIN_INFO),
4042 (PRS_POINTER_CAST)lsa_io_trustdom_query) )
4043 return False;
4045 if(!prs_align(ps))
4046 return False;
4048 if(!prs_ntstatus("status", ps, depth, &r_q->status))
4049 return False;
4051 return True;
4054 /*******************************************************************
4055 Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4056 ********************************************************************/
4058 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
4060 DEBUG(5, ("init_q_query_dom_info\n"));
4062 memcpy(&in->pol, hnd, sizeof(in->pol));
4064 in->info_class = info_class;
4067 /*******************************************************************
4068 Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4069 ********************************************************************/
4071 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
4073 prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
4074 depth++;
4076 if(!prs_align(ps))
4077 return False;
4079 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
4080 return False;
4082 if(!prs_uint16("info_class", ps, depth, &in->info_class))
4083 return False;
4085 return True;
4088 /*******************************************************************
4089 Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
4090 ********************************************************************/
4092 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy,
4093 prs_struct *ps, int depth)
4095 if (!prs_align_uint64(ps))
4096 return False;
4098 if (!prs_align(ps))
4099 return False;
4101 if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
4102 return False;
4104 if (!prs_align_uint64(ps))
4105 return False;
4107 if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
4108 return False;
4110 if (!prs_align_uint64(ps))
4111 return False;
4113 if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
4114 return False;
4116 if (!prs_align_uint64(ps))
4117 return False;
4119 if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
4120 return False;
4122 if (!prs_align_uint64(ps))
4123 return False;
4125 if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
4126 return False;
4128 if (!prs_align_uint64(ps))
4129 return False;
4131 if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
4132 return False;
4134 return True;
4137 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
4139 prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
4140 depth++;
4142 if(!prs_align_uint16(ps))
4143 return False;
4145 if(!prs_uint16("info_class", ps, depth, &info->info_class))
4146 return False;
4148 switch (info->info_class) {
4149 case 3:
4150 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
4151 return False;
4152 break;
4153 default:
4154 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4155 return False;
4156 break;
4159 return True;
4163 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
4164 prs_struct *ps, int depth)
4166 prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
4167 depth++;
4169 if (!prs_pointer("dominfo", ps, depth, (void*)&out->info,
4170 sizeof(LSA_DOM_INFO_UNION),
4171 (PRS_POINTER_CAST)lsa_io_dom_info_query) )
4172 return False;
4174 if(!prs_ntstatus("status", ps, depth, &out->status))
4175 return False;
4177 return True;