2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997,
7 * Copyright (C) Andrew Bartlett 2002,
8 * Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2002.
9 * Copyright (C) Gerald )Jerry) Carter 2005
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 3 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, see <http://www.gnu.org/licenses/>.
28 #define DBGC_CLASS DBGC_RPC_PARSE
30 static BOOL
lsa_io_trans_names(const char *desc
, LSA_TRANS_NAME_ENUM
*trn
, prs_struct
*ps
, int depth
);
31 static BOOL
lsa_io_trans_names2(const char *desc
, LSA_TRANS_NAME_ENUM2
*trn
, prs_struct
*ps
, int depth
);
33 /*******************************************************************
34 Inits a LSA_TRANS_NAME structure.
35 ********************************************************************/
37 void init_lsa_trans_name(LSA_TRANS_NAME
*trn
, UNISTR2
*uni_name
,
38 uint16 sid_name_use
, const char *name
, uint32 idx
)
40 trn
->sid_name_use
= sid_name_use
;
41 init_unistr2(uni_name
, name
, UNI_FLAGS_NONE
);
42 init_uni_hdr(&trn
->hdr_name
, uni_name
);
43 trn
->domain_idx
= idx
;
46 /*******************************************************************
47 Reads or writes a LSA_TRANS_NAME structure.
48 ********************************************************************/
50 static BOOL
lsa_io_trans_name(const char *desc
, LSA_TRANS_NAME
*trn
, prs_struct
*ps
,
53 prs_debug(ps
, depth
, desc
, "lsa_io_trans_name");
59 if(!prs_uint16("sid_name_use", ps
, depth
, &trn
->sid_name_use
))
64 if(!smb_io_unihdr ("hdr_name", &trn
->hdr_name
, ps
, depth
))
66 if(!prs_uint32("domain_idx ", ps
, depth
, &trn
->domain_idx
))
72 /*******************************************************************
73 Inits a LSA_TRANS_NAME2 structure.
74 ********************************************************************/
76 void init_lsa_trans_name2(LSA_TRANS_NAME2
*trn
, UNISTR2
*uni_name
,
77 uint16 sid_name_use
, const char *name
, uint32 idx
)
79 trn
->sid_name_use
= sid_name_use
;
80 init_unistr2(uni_name
, name
, UNI_FLAGS_NONE
);
81 init_uni_hdr(&trn
->hdr_name
, uni_name
);
82 trn
->domain_idx
= idx
;
86 /*******************************************************************
87 Reads or writes a LSA_TRANS_NAME2 structure.
88 ********************************************************************/
90 static BOOL
lsa_io_trans_name2(const char *desc
, LSA_TRANS_NAME2
*trn
, prs_struct
*ps
,
93 prs_debug(ps
, depth
, desc
, "lsa_io_trans_name2");
99 if(!prs_uint16("sid_name_use", ps
, depth
, &trn
->sid_name_use
))
104 if(!smb_io_unihdr ("hdr_name", &trn
->hdr_name
, ps
, depth
))
106 if(!prs_uint32("domain_idx ", ps
, depth
, &trn
->domain_idx
))
108 if(!prs_uint32("unknown ", ps
, depth
, &trn
->unknown
))
114 /*******************************************************************
115 Reads or writes a DOM_R_REF structure.
116 ********************************************************************/
118 static BOOL
lsa_io_dom_r_ref(const char *desc
, DOM_R_REF
*dom
, prs_struct
*ps
, int depth
)
122 prs_debug(ps
, depth
, desc
, "lsa_io_dom_r_ref");
128 if(!prs_uint32("num_ref_doms_1", ps
, depth
, &dom
->num_ref_doms_1
)) /* num referenced domains? */
130 if(!prs_uint32("ptr_ref_dom ", ps
, depth
, &dom
->ptr_ref_dom
)) /* undocumented buffer pointer. */
132 if(!prs_uint32("max_entries ", ps
, depth
, &dom
->max_entries
)) /* 32 - max number of entries */
135 SMB_ASSERT_ARRAY(dom
->hdr_ref_dom
, dom
->num_ref_doms_1
);
137 if (dom
->ptr_ref_dom
!= 0) {
139 if(!prs_uint32("num_ref_doms_2", ps
, depth
, &dom
->num_ref_doms_2
)) /* 4 - num referenced domains? */
142 SMB_ASSERT_ARRAY(dom
->ref_dom
, dom
->num_ref_doms_2
);
144 for (i
= 0; i
< dom
->num_ref_doms_1
; i
++) {
147 slprintf(t
, sizeof(t
) - 1, "dom_ref[%d] ", i
);
148 if(!smb_io_unihdr(t
, &dom
->hdr_ref_dom
[i
].hdr_dom_name
, ps
, depth
))
151 slprintf(t
, sizeof(t
) - 1, "sid_ptr[%d] ", i
);
152 if(!prs_uint32(t
, ps
, depth
, &dom
->hdr_ref_dom
[i
].ptr_dom_sid
))
156 for (i
= 0; i
< dom
->num_ref_doms_2
; i
++) {
159 if (dom
->hdr_ref_dom
[i
].hdr_dom_name
.buffer
!= 0) {
160 slprintf(t
, sizeof(t
) - 1, "dom_ref[%d] ", i
);
161 if(!smb_io_unistr2(t
, &dom
->ref_dom
[i
].uni_dom_name
, True
, ps
, depth
)) /* domain name unicode string */
167 if (dom
->hdr_ref_dom
[i
].ptr_dom_sid
!= 0) {
168 slprintf(t
, sizeof(t
) - 1, "sid_ptr[%d] ", i
);
169 if(!smb_io_dom_sid2(t
, &dom
->ref_dom
[i
].ref_dom
, ps
, depth
)) /* referenced domain SIDs */
178 /*******************************************************************
179 Inits an LSA_SEC_QOS structure.
180 ********************************************************************/
182 void init_lsa_sec_qos(LSA_SEC_QOS
*qos
, uint16 imp_lev
, uint8 ctxt
, uint8 eff
)
184 DEBUG(5, ("init_lsa_sec_qos\n"));
186 qos
->len
= 0x0c; /* length of quality of service block, in bytes */
187 qos
->sec_imp_level
= imp_lev
;
188 qos
->sec_ctxt_mode
= ctxt
;
189 qos
->effective_only
= eff
;
192 /*******************************************************************
193 Reads or writes an LSA_SEC_QOS structure.
194 ********************************************************************/
196 static BOOL
lsa_io_sec_qos(const char *desc
, LSA_SEC_QOS
*qos
, prs_struct
*ps
,
201 prs_debug(ps
, depth
, desc
, "lsa_io_obj_qos");
207 start
= prs_offset(ps
);
209 /* these pointers had _better_ be zero, because we don't know
212 if(!prs_uint32("len ", ps
, depth
, &qos
->len
)) /* 0x18 - length (in bytes) inc. the length field. */
214 if(!prs_uint16("sec_imp_level ", ps
, depth
, &qos
->sec_imp_level
))
216 if(!prs_uint8 ("sec_ctxt_mode ", ps
, depth
, &qos
->sec_ctxt_mode
))
218 if(!prs_uint8 ("effective_only", ps
, depth
, &qos
->effective_only
))
221 if (qos
->len
!= prs_offset(ps
) - start
) {
222 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
223 qos
->len
, prs_offset(ps
) - start
));
229 /*******************************************************************
230 Inits an LSA_OBJ_ATTR structure.
231 ********************************************************************/
233 static void init_lsa_obj_attr(LSA_OBJ_ATTR
*attr
, uint32 attributes
, LSA_SEC_QOS
*qos
)
235 DEBUG(5, ("init_lsa_obj_attr\n"));
237 attr
->len
= 0x18; /* length of object attribute block, in bytes */
238 attr
->ptr_root_dir
= 0;
239 attr
->ptr_obj_name
= 0;
240 attr
->attributes
= attributes
;
241 attr
->ptr_sec_desc
= 0;
244 attr
->ptr_sec_qos
= 1;
247 attr
->ptr_sec_qos
= 0;
248 attr
->sec_qos
= NULL
;
252 /*******************************************************************
253 Reads or writes an LSA_OBJ_ATTR structure.
254 ********************************************************************/
256 static BOOL
lsa_io_obj_attr(const char *desc
, LSA_OBJ_ATTR
*attr
, prs_struct
*ps
,
259 prs_debug(ps
, depth
, desc
, "lsa_io_obj_attr");
265 /* these pointers had _better_ be zero, because we don't know
268 if(!prs_uint32("len ", ps
, depth
, &attr
->len
)) /* 0x18 - length (in bytes) inc. the length field. */
270 if(!prs_uint32("ptr_root_dir", ps
, depth
, &attr
->ptr_root_dir
)) /* 0 - root directory (pointer) */
272 if(!prs_uint32("ptr_obj_name", ps
, depth
, &attr
->ptr_obj_name
)) /* 0 - object name (pointer) */
274 if(!prs_uint32("attributes ", ps
, depth
, &attr
->attributes
)) /* 0 - attributes (undocumented) */
276 if(!prs_uint32("ptr_sec_desc", ps
, depth
, &attr
->ptr_sec_desc
)) /* 0 - security descriptior (pointer) */
278 if(!prs_uint32("ptr_sec_qos ", ps
, depth
, &attr
->ptr_sec_qos
)) /* security quality of service (pointer) */
281 if (attr
->ptr_sec_qos
!= 0) {
282 if (UNMARSHALLING(ps
))
283 if (!(attr
->sec_qos
= PRS_ALLOC_MEM(ps
,LSA_SEC_QOS
,1)))
286 if(!lsa_io_sec_qos("sec_qos", attr
->sec_qos
, ps
, depth
))
294 /*******************************************************************
295 Inits an LSA_Q_OPEN_POL structure.
296 ********************************************************************/
298 void init_q_open_pol(LSA_Q_OPEN_POL
*in
, uint16 system_name
,
299 uint32 attributes
, uint32 desired_access
,
302 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes
,
305 in
->ptr
= 1; /* undocumented pointer */
307 in
->des_access
= desired_access
;
309 in
->system_name
= system_name
;
310 init_lsa_obj_attr(&in
->attr
, attributes
, qos
);
313 /*******************************************************************
314 Reads or writes an LSA_Q_OPEN_POL structure.
315 ********************************************************************/
317 BOOL
lsa_io_q_open_pol(const char *desc
, LSA_Q_OPEN_POL
*in
, prs_struct
*ps
,
320 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_pol");
323 if(!prs_uint32("ptr ", ps
, depth
, &in
->ptr
))
325 if(!prs_uint16("system_name", ps
, depth
, &in
->system_name
))
330 if(!lsa_io_obj_attr("", &in
->attr
, ps
, depth
))
333 if(!prs_uint32("des_access", ps
, depth
, &in
->des_access
))
339 /*******************************************************************
340 Reads or writes an LSA_R_OPEN_POL structure.
341 ********************************************************************/
343 BOOL
lsa_io_r_open_pol(const char *desc
, LSA_R_OPEN_POL
*out
, prs_struct
*ps
,
346 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_pol");
349 if(!smb_io_pol_hnd("", &out
->pol
, ps
, depth
))
352 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
358 /*******************************************************************
359 Inits an LSA_Q_OPEN_POL2 structure.
360 ********************************************************************/
362 void init_q_open_pol2(LSA_Q_OPEN_POL2
*in
, const char *server_name
,
363 uint32 attributes
, uint32 desired_access
,
366 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes
,
369 in
->ptr
= 1; /* undocumented pointer */
371 in
->des_access
= desired_access
;
373 init_unistr2(&in
->uni_server_name
, server_name
, UNI_STR_TERMINATE
);
375 init_lsa_obj_attr(&in
->attr
, attributes
, qos
);
378 /*******************************************************************
379 Reads or writes an LSA_Q_OPEN_POL2 structure.
380 ********************************************************************/
382 BOOL
lsa_io_q_open_pol2(const char *desc
, LSA_Q_OPEN_POL2
*in
, prs_struct
*ps
,
385 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_pol2");
388 if(!prs_uint32("ptr ", ps
, depth
, &in
->ptr
))
391 if(!smb_io_unistr2 ("", &in
->uni_server_name
, in
->ptr
, ps
, depth
))
393 if(!lsa_io_obj_attr("", &in
->attr
, ps
, depth
))
396 if(!prs_uint32("des_access", ps
, depth
, &in
->des_access
))
402 /*******************************************************************
403 Reads or writes an LSA_R_OPEN_POL2 structure.
404 ********************************************************************/
406 BOOL
lsa_io_r_open_pol2(const char *desc
, LSA_R_OPEN_POL2
*out
, prs_struct
*ps
,
409 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_pol2");
412 if(!smb_io_pol_hnd("", &out
->pol
, ps
, depth
))
415 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
421 /*******************************************************************
422 makes an LSA_Q_QUERY_SEC_OBJ structure.
423 ********************************************************************/
425 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ
*in
, const POLICY_HND
*hnd
,
428 DEBUG(5, ("init_q_query_sec_obj\n"));
431 in
->sec_info
= sec_info
;
436 /*******************************************************************
437 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
438 ********************************************************************/
440 BOOL
lsa_io_q_query_sec_obj(const char *desc
, LSA_Q_QUERY_SEC_OBJ
*in
,
441 prs_struct
*ps
, int depth
)
443 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_sec_obj");
446 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
449 if (!prs_uint32("sec_info", ps
, depth
, &in
->sec_info
))
455 /*******************************************************************
456 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
457 ********************************************************************/
459 BOOL
lsa_io_r_query_sec_obj(const char *desc
, LSA_R_QUERY_SEC_OBJ
*out
, prs_struct
*ps
, int depth
)
461 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_sec_obj");
467 if (!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
471 if (!sec_io_desc_buf("sec", &out
->buf
, ps
, depth
))
475 if (!prs_ntstatus("status", ps
, depth
, &out
->status
))
481 /*******************************************************************
482 Inits an LSA_Q_QUERY_INFO structure.
483 ********************************************************************/
485 void init_q_query(LSA_Q_QUERY_INFO
*in
, POLICY_HND
*hnd
, uint16 info_class
)
487 DEBUG(5, ("init_q_query\n"));
489 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
491 in
->info_class
= info_class
;
494 /*******************************************************************
495 Reads or writes an LSA_Q_QUERY_INFO structure.
496 ********************************************************************/
498 BOOL
lsa_io_q_query(const char *desc
, LSA_Q_QUERY_INFO
*in
, prs_struct
*ps
,
501 prs_debug(ps
, depth
, desc
, "lsa_io_q_query");
504 if(!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
507 if(!prs_uint16("info_class", ps
, depth
, &in
->info_class
))
513 /*******************************************************************
514 makes an LSA_Q_ENUM_TRUST_DOM structure.
515 ********************************************************************/
516 BOOL
init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM
* q_e
, POLICY_HND
*pol
,
517 uint32 enum_context
, uint32 preferred_len
)
519 DEBUG(5, ("init_q_enum_trust_dom\n"));
522 q_e
->enum_context
= enum_context
;
523 q_e
->preferred_len
= preferred_len
;
528 /*******************************************************************
529 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
530 ********************************************************************/
532 BOOL
lsa_io_q_enum_trust_dom(const char *desc
, LSA_Q_ENUM_TRUST_DOM
*q_e
,
533 prs_struct
*ps
, int depth
)
535 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_trust_dom");
538 if(!smb_io_pol_hnd("", &q_e
->pol
, ps
, depth
))
541 if(!prs_uint32("enum_context ", ps
, depth
, &q_e
->enum_context
))
543 if(!prs_uint32("preferred_len", ps
, depth
, &q_e
->preferred_len
))
549 /*******************************************************************
550 Inits an LSA_R_ENUM_TRUST_DOM structure.
551 ********************************************************************/
553 void init_r_enum_trust_dom(TALLOC_CTX
*ctx
, LSA_R_ENUM_TRUST_DOM
*out
,
554 uint32 enum_context
, uint32 num_domains
,
555 struct trustdom_info
**td
)
559 DEBUG(5, ("init_r_enum_trust_dom\n"));
561 out
->enum_context
= enum_context
;
562 out
->count
= num_domains
;
564 if ( num_domains
!= 0 ) {
566 /* allocate container memory */
568 out
->domlist
= TALLOC_P( ctx
, DOMAIN_LIST
);
570 if ( !out
->domlist
) {
571 out
->status
= NT_STATUS_NO_MEMORY
;
576 out
->domlist
->domains
= TALLOC_ARRAY( ctx
, DOMAIN_INFO
,
578 if ( !out
->domlist
->domains
) {
579 out
->status
= NT_STATUS_NO_MEMORY
;
583 out
->domlist
->domains
= NULL
;
586 out
->domlist
->count
= out
->count
;
588 /* initialize the list of domains and their sid */
590 for (i
= 0; i
< num_domains
; i
++) {
592 if ( !(out
->domlist
->domains
[i
].sid
=
593 TALLOC_P(ctx
, DOM_SID2
)) ) {
594 out
->status
= NT_STATUS_NO_MEMORY
;
598 init_dom_sid2(out
->domlist
->domains
[i
].sid
,
600 if (push_ucs2_talloc(ctx
, &name
, (td
[i
])->name
) == (size_t)-1){
601 out
->status
= NT_STATUS_NO_MEMORY
;
604 init_unistr4_w(ctx
, &out
->domlist
->domains
[i
].name
,
611 /*******************************************************************
612 ********************************************************************/
614 BOOL
lsa_io_domain_list( const char *desc
, prs_struct
*ps
, int depth
, DOMAIN_LIST
*domlist
)
618 prs_debug(ps
, depth
, desc
, "lsa_io_domain_list");
621 if(!prs_uint32("count", ps
, depth
, &domlist
->count
))
624 if ( domlist
->count
== 0 )
627 if ( UNMARSHALLING(ps
) ) {
628 if ( !(domlist
->domains
= PRS_ALLOC_MEM( ps
, DOMAIN_INFO
, domlist
->count
)) )
634 for ( i
=0; i
<domlist
->count
; i
++ ) {
635 if ( !prs_unistr4_hdr("name_header", ps
, depth
, &domlist
->domains
[i
].name
) )
637 if ( !smb_io_dom_sid2_p("sid_header", ps
, depth
, &domlist
->domains
[i
].sid
) )
643 for ( i
=0; i
<domlist
->count
; i
++ ) {
644 if ( !prs_unistr4_str("name", ps
, depth
, &domlist
->domains
[i
].name
) )
646 if( !smb_io_dom_sid2("sid", domlist
->domains
[i
].sid
, ps
, depth
) )
653 /*******************************************************************
654 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
655 ********************************************************************/
657 BOOL
lsa_io_r_enum_trust_dom(const char *desc
, LSA_R_ENUM_TRUST_DOM
*out
,
658 prs_struct
*ps
, int depth
)
660 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_trust_dom");
663 if(!prs_uint32("enum_context", ps
, depth
, &out
->enum_context
))
666 if(!prs_uint32("count", ps
, depth
, &out
->count
))
669 if ( !prs_pointer("trusted_domains", ps
, depth
, (void*)&out
->domlist
, sizeof(DOMAIN_LIST
), (PRS_POINTER_CAST
)lsa_io_domain_list
))
672 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
678 /*******************************************************************
679 reads or writes a structure.
680 ********************************************************************/
682 static BOOL
lsa_io_dom_query_1(const char *desc
, DOM_QUERY_1
*d_q
, prs_struct
*ps
, int depth
)
687 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_1");
693 if (!prs_uint32("percent_full", ps
, depth
, &d_q
->percent_full
))
695 if (!prs_uint32("log_size", ps
, depth
, &d_q
->log_size
))
697 if (!smb_io_nttime("retention_time", ps
, depth
, &d_q
->retention_time
))
699 if (!prs_uint8("shutdown_in_progress", ps
, depth
, &d_q
->shutdown_in_progress
))
701 if (!smb_io_nttime("time_to_shutdown", ps
, depth
, &d_q
->time_to_shutdown
))
703 if (!prs_uint32("next_audit_record", ps
, depth
, &d_q
->next_audit_record
))
705 if (!prs_uint32("unknown", ps
, depth
, &d_q
->unknown
))
711 /*******************************************************************
712 reads or writes a structure.
713 ********************************************************************/
715 static BOOL
lsa_io_dom_query_2(const char *desc
, DOM_QUERY_2
*d_q
, prs_struct
*ps
, int depth
)
720 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_2");
726 if (!prs_uint32("auditing_enabled", ps
, depth
, &d_q
->auditing_enabled
))
728 if (!prs_uint32("ptr ", ps
, depth
, &d_q
->ptr
))
730 if (!prs_uint32("count1", ps
, depth
, &d_q
->count1
))
735 if (!prs_uint32("count2", ps
, depth
, &d_q
->count2
))
738 if (d_q
->count1
!= d_q
->count2
)
741 if (UNMARSHALLING(ps
)) {
743 d_q
->auditsettings
= TALLOC_ZERO_ARRAY(ps
->mem_ctx
, uint32
, d_q
->count2
);
744 if (!d_q
->auditsettings
) {
748 d_q
->auditsettings
= NULL
;
752 if (!prs_uint32s(False
, "auditsettings", ps
, depth
, d_q
->auditsettings
, d_q
->count2
))
759 /*******************************************************************
760 reads or writes a dom query structure.
761 ********************************************************************/
763 static BOOL
lsa_io_dom_query_3(const char *desc
, DOM_QUERY_3
*d_q
, prs_struct
*ps
, int depth
)
768 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_3");
774 if(!prs_uint16("uni_dom_max_len", ps
, depth
, &d_q
->uni_dom_max_len
)) /* domain name string length * 2 */
776 if(!prs_uint16("uni_dom_str_len", ps
, depth
, &d_q
->uni_dom_str_len
)) /* domain name string length * 2 */
779 if(!prs_uint32("buffer_dom_name", ps
, depth
, &d_q
->buffer_dom_name
)) /* undocumented domain name string buffer pointer */
781 if(!prs_uint32("buffer_dom_sid ", ps
, depth
, &d_q
->buffer_dom_sid
)) /* undocumented domain SID string buffer pointer */
784 if(!smb_io_unistr2("unistr2", &d_q
->uni_domain_name
, d_q
->buffer_dom_name
, ps
, depth
)) /* domain name (unicode string) */
790 if (d_q
->buffer_dom_sid
!= 0) {
791 if(!smb_io_dom_sid2("", &d_q
->dom_sid
, ps
, depth
)) /* domain SID */
794 memset((char *)&d_q
->dom_sid
, '\0', sizeof(d_q
->dom_sid
));
800 /*******************************************************************
801 Reads or writes a dom query structure.
802 ********************************************************************/
804 static BOOL
lsa_io_dom_query_5(const char *desc
, DOM_QUERY_5
*d_q
, prs_struct
*ps
, int depth
)
806 return lsa_io_dom_query_3("", d_q
, ps
, depth
);
809 /*******************************************************************
810 Reads or writes a dom query structure.
811 ********************************************************************/
813 static BOOL
lsa_io_dom_query_6(const char *desc
, DOM_QUERY_6
*d_q
, prs_struct
*ps
, int depth
)
818 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_6");
821 if (!prs_uint16("server_role", ps
, depth
, &d_q
->server_role
))
827 /*******************************************************************
828 Reads or writes a dom query structure.
829 ********************************************************************/
831 static BOOL
lsa_io_dom_query_10(const char *desc
, DOM_QUERY_10
*d_q
, prs_struct
*ps
, int depth
)
836 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_10");
839 if (!prs_uint8("shutdown_on_full", ps
, depth
, &d_q
->shutdown_on_full
))
845 /*******************************************************************
846 Reads or writes a dom query structure.
847 ********************************************************************/
849 static BOOL
lsa_io_dom_query_11(const char *desc
, DOM_QUERY_11
*d_q
, prs_struct
*ps
, int depth
)
854 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_11");
857 if (!prs_uint16("unknown", ps
, depth
, &d_q
->unknown
))
859 if (!prs_uint8("shutdown_on_full", ps
, depth
, &d_q
->shutdown_on_full
))
861 if (!prs_uint8("log_is_full", ps
, depth
, &d_q
->log_is_full
))
867 /*******************************************************************
868 Reads or writes an LSA_DNS_DOM_INFO structure.
869 ********************************************************************/
871 BOOL
lsa_io_dom_query_12(const char *desc
, DOM_QUERY_12
*info
, prs_struct
*ps
, int depth
)
873 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_12");
878 if(!smb_io_unihdr("nb_name", &info
->hdr_nb_dom_name
, ps
, depth
))
880 if(!smb_io_unihdr("dns_name", &info
->hdr_dns_dom_name
, ps
, depth
))
882 if(!smb_io_unihdr("forest", &info
->hdr_forest_name
, ps
, depth
))
887 if ( !smb_io_uuid("dom_guid", &info
->dom_guid
, ps
, depth
) )
892 if(!prs_uint32("dom_sid", ps
, depth
, &info
->ptr_dom_sid
))
895 if(!smb_io_unistr2("nb_name", &info
->uni_nb_dom_name
,
896 info
->hdr_nb_dom_name
.buffer
, ps
, depth
))
898 if(!smb_io_unistr2("dns_name", &info
->uni_dns_dom_name
,
899 info
->hdr_dns_dom_name
.buffer
, ps
, depth
))
901 if(!smb_io_unistr2("forest", &info
->uni_forest_name
,
902 info
->hdr_forest_name
.buffer
, ps
, depth
))
905 if(!smb_io_dom_sid2("dom_sid", &info
->dom_sid
, ps
, depth
))
912 /*******************************************************************
913 Inits an LSA_Q_QUERY_INFO structure.
914 ********************************************************************/
916 void init_q_set(LSA_Q_SET_INFO
*in
, POLICY_HND
*hnd
, uint16 info_class
, LSA_INFO_CTR ctr
)
918 DEBUG(5,("init_q_set\n"));
920 in
->info_class
= info_class
;
925 in
->ctr
.info_class
= info_class
;
928 /*******************************************************************
929 reads or writes a structure.
930 ********************************************************************/
932 static BOOL
lsa_io_query_info_ctr2(const char *desc
, prs_struct
*ps
, int depth
, LSA_INFO_CTR2
*ctr
)
934 prs_debug(ps
, depth
, desc
, "lsa_io_query_info_ctr2");
937 if(!prs_uint16("info_class", ps
, depth
, &ctr
->info_class
))
940 switch (ctr
->info_class
) {
942 if(!lsa_io_dom_query_1("", &ctr
->info
.id1
, ps
, depth
))
946 if(!lsa_io_dom_query_2("", &ctr
->info
.id2
, ps
, depth
))
950 if(!lsa_io_dom_query_3("", &ctr
->info
.id3
, ps
, depth
))
954 if(!lsa_io_dom_query_5("", &ctr
->info
.id5
, ps
, depth
))
958 if(!lsa_io_dom_query_6("", &ctr
->info
.id6
, ps
, depth
))
962 if(!lsa_io_dom_query_10("", &ctr
->info
.id10
, ps
, depth
))
966 if(!lsa_io_dom_query_11("", &ctr
->info
.id11
, ps
, depth
))
970 if(!lsa_io_dom_query_12("", &ctr
->info
.id12
, ps
, depth
))
974 DEBUG(0,("invalid info_class: %d\n", ctr
->info_class
));
983 /*******************************************************************
984 reads or writes a structure.
985 ********************************************************************/
987 static BOOL
lsa_io_query_info_ctr(const char *desc
, prs_struct
*ps
, int depth
, LSA_INFO_CTR
*ctr
)
989 prs_debug(ps
, depth
, desc
, "lsa_io_query_info_ctr");
992 if(!prs_uint16("info_class", ps
, depth
, &ctr
->info_class
))
998 switch (ctr
->info_class
) {
1000 if(!lsa_io_dom_query_1("", &ctr
->info
.id1
, ps
, depth
))
1004 if(!lsa_io_dom_query_2("", &ctr
->info
.id2
, ps
, depth
))
1008 if(!lsa_io_dom_query_3("", &ctr
->info
.id3
, ps
, depth
))
1012 if(!lsa_io_dom_query_5("", &ctr
->info
.id5
, ps
, depth
))
1016 if(!lsa_io_dom_query_6("", &ctr
->info
.id6
, ps
, depth
))
1020 if(!lsa_io_dom_query_10("", &ctr
->info
.id10
, ps
, depth
))
1024 if(!lsa_io_dom_query_11("", &ctr
->info
.id11
, ps
, depth
))
1028 DEBUG(0,("invalid info_class: %d\n", ctr
->info_class
));
1036 /*******************************************************************
1037 Reads or writes an LSA_R_QUERY_INFO structure.
1038 ********************************************************************/
1040 BOOL
lsa_io_r_query(const char *desc
, LSA_R_QUERY_INFO
*out
, prs_struct
*ps
, int depth
)
1043 prs_debug(ps
, depth
, desc
, "lsa_io_r_query");
1049 if(!prs_uint32("dom_ptr", ps
, depth
, &out
->dom_ptr
))
1054 if(!lsa_io_query_info_ctr("", ps
, depth
, &out
->ctr
))
1061 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
1067 /*******************************************************************
1068 Reads or writes an LSA_Q_SET_INFO structure.
1069 ********************************************************************/
1071 BOOL
lsa_io_q_set(const char *desc
, LSA_Q_SET_INFO
*in
, prs_struct
*ps
,
1074 prs_debug(ps
, depth
, desc
, "lsa_io_q_set");
1080 if(!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
1083 if(!prs_uint16("info_class", ps
, depth
, &in
->info_class
))
1086 if(!lsa_io_query_info_ctr("", ps
, depth
, &in
->ctr
))
1092 /*******************************************************************
1093 Reads or writes an LSA_R_SET_INFO structure.
1094 ********************************************************************/
1096 BOOL
lsa_io_r_set(const char *desc
, LSA_R_SET_INFO
*out
, prs_struct
*ps
, int depth
)
1098 prs_debug(ps
, depth
, desc
, "lsa_io_r_set");
1104 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
1110 /*******************************************************************
1111 Inits a LSA_SID_ENUM structure.
1112 ********************************************************************/
1114 static void init_lsa_sid_enum(TALLOC_CTX
*mem_ctx
, LSA_SID_ENUM
*sen
,
1115 int num_entries
, const DOM_SID
*sids
)
1119 DEBUG(5, ("init_lsa_sid_enum\n"));
1121 sen
->num_entries
= num_entries
;
1122 sen
->ptr_sid_enum
= (num_entries
!= 0);
1123 sen
->num_entries2
= num_entries
;
1125 /* Allocate memory for sids and sid pointers */
1128 if ((sen
->ptr_sid
= TALLOC_ZERO_ARRAY(mem_ctx
, uint32
, num_entries
)) == NULL
) {
1129 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
1133 if ((sen
->sid
= TALLOC_ZERO_ARRAY(mem_ctx
, DOM_SID2
, num_entries
)) == NULL
) {
1134 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
1139 /* Copy across SIDs and SID pointers */
1141 for (i
= 0; i
< num_entries
; i
++) {
1142 sen
->ptr_sid
[i
] = 1;
1143 init_dom_sid2(&sen
->sid
[i
], &sids
[i
]);
1147 /*******************************************************************
1148 Reads or writes a LSA_SID_ENUM structure.
1149 ********************************************************************/
1151 static BOOL
lsa_io_sid_enum(const char *desc
, LSA_SID_ENUM
*sen
, prs_struct
*ps
,
1156 prs_debug(ps
, depth
, desc
, "lsa_io_sid_enum");
1162 if(!prs_uint32("num_entries ", ps
, depth
, &sen
->num_entries
))
1164 if(!prs_uint32("ptr_sid_enum", ps
, depth
, &sen
->ptr_sid_enum
))
1168 if the ptr is NULL, leave here. checked from a real w2k trace.
1172 if (sen
->ptr_sid_enum
==0)
1175 if(!prs_uint32("num_entries2", ps
, depth
, &sen
->num_entries2
))
1178 /* Mallocate memory if we're unpacking from the wire */
1180 if (UNMARSHALLING(ps
) && sen
->num_entries
) {
1181 if ((sen
->ptr_sid
= PRS_ALLOC_MEM( ps
, uint32
, sen
->num_entries
)) == NULL
) {
1182 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1187 if ((sen
->sid
= PRS_ALLOC_MEM( ps
, DOM_SID2
, sen
->num_entries
)) == NULL
) {
1188 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1194 for (i
= 0; i
< sen
->num_entries
; i
++) {
1197 slprintf(temp
, sizeof(temp
) - 1, "ptr_sid[%d]", i
);
1198 if(!prs_uint32(temp
, ps
, depth
, &sen
->ptr_sid
[i
])) {
1203 for (i
= 0; i
< sen
->num_entries
; i
++) {
1206 slprintf(temp
, sizeof(temp
) - 1, "sid[%d]", i
);
1207 if(!smb_io_dom_sid2(temp
, &sen
->sid
[i
], ps
, depth
)) {
1215 /*******************************************************************
1216 Inits an LSA_R_ENUM_TRUST_DOM structure.
1217 ********************************************************************/
1219 void init_q_lookup_sids(TALLOC_CTX
*mem_ctx
, LSA_Q_LOOKUP_SIDS
*q_l
,
1220 POLICY_HND
*hnd
, int num_sids
, const DOM_SID
*sids
,
1223 DEBUG(5, ("init_q_lookup_sids\n"));
1227 memcpy(&q_l
->pol
, hnd
, sizeof(q_l
->pol
));
1228 init_lsa_sid_enum(mem_ctx
, &q_l
->sids
, num_sids
, sids
);
1233 /*******************************************************************
1234 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
1235 ********************************************************************/
1237 BOOL
lsa_io_q_lookup_sids(const char *desc
, LSA_Q_LOOKUP_SIDS
*q_s
, prs_struct
*ps
,
1240 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_sids");
1246 if(!smb_io_pol_hnd("pol_hnd", &q_s
->pol
, ps
, depth
)) /* policy handle */
1248 if(!lsa_io_sid_enum("sids ", &q_s
->sids
, ps
, depth
)) /* sids to be looked up */
1250 if(!lsa_io_trans_names("names ", &q_s
->names
, ps
, depth
)) /* translated names */
1253 if(!prs_uint16("level", ps
, depth
, &q_s
->level
)) /* lookup level */
1258 if(!prs_uint32("mapped_count", ps
, depth
, &q_s
->mapped_count
))
1264 /*******************************************************************
1265 Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1266 ********************************************************************/
1268 BOOL
lsa_io_q_lookup_sids2(const char *desc
, LSA_Q_LOOKUP_SIDS2
*q_s
, prs_struct
*ps
,
1271 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_sids2");
1277 if(!smb_io_pol_hnd("pol_hnd", &q_s
->pol
, ps
, depth
)) /* policy handle */
1279 if(!lsa_io_sid_enum("sids ", &q_s
->sids
, ps
, depth
)) /* sids to be looked up */
1281 if(!lsa_io_trans_names2("names ", &q_s
->names
, ps
, depth
)) /* translated names */
1284 if(!prs_uint16("level", ps
, depth
, &q_s
->level
)) /* lookup level */
1289 if(!prs_uint32("mapped_count", ps
, depth
, &q_s
->mapped_count
))
1291 if(!prs_uint32("unknown1", ps
, depth
, &q_s
->unknown1
))
1293 if(!prs_uint32("unknown2", ps
, depth
, &q_s
->unknown2
))
1299 /*******************************************************************
1300 Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1301 ********************************************************************/
1303 BOOL
lsa_io_q_lookup_sids3(const char *desc
, LSA_Q_LOOKUP_SIDS3
*q_s
, prs_struct
*ps
,
1306 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_sids3");
1312 if(!lsa_io_sid_enum("sids ", &q_s
->sids
, ps
, depth
)) /* sids to be looked up */
1314 if(!lsa_io_trans_names2("names ", &q_s
->names
, ps
, depth
)) /* translated names */
1317 if(!prs_uint16("level", ps
, depth
, &q_s
->level
)) /* lookup level */
1322 if(!prs_uint32("mapped_count", ps
, depth
, &q_s
->mapped_count
))
1324 if(!prs_uint32("unknown1", ps
, depth
, &q_s
->unknown1
))
1326 if(!prs_uint32("unknown2", ps
, depth
, &q_s
->unknown2
))
1333 /*******************************************************************
1334 Reads or writes a structure.
1335 ********************************************************************/
1337 static BOOL
lsa_io_trans_names(const char *desc
, LSA_TRANS_NAME_ENUM
*trn
,
1338 prs_struct
*ps
, int depth
)
1342 prs_debug(ps
, depth
, desc
, "lsa_io_trans_names");
1348 if(!prs_uint32("num_entries ", ps
, depth
, &trn
->num_entries
))
1350 if(!prs_uint32("ptr_trans_names", ps
, depth
, &trn
->ptr_trans_names
))
1353 if (trn
->ptr_trans_names
!= 0) {
1354 if(!prs_uint32("num_entries2 ", ps
, depth
,
1355 &trn
->num_entries2
))
1358 if (trn
->num_entries2
!= trn
->num_entries
) {
1363 if (UNMARSHALLING(ps
) && trn
->num_entries2
) {
1364 if ((trn
->name
= PRS_ALLOC_MEM(ps
, LSA_TRANS_NAME
, trn
->num_entries2
)) == NULL
) {
1368 if ((trn
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, trn
->num_entries2
)) == NULL
) {
1373 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1375 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1377 if(!lsa_io_trans_name(t
, &trn
->name
[i
], ps
, depth
)) /* translated name */
1381 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1383 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1385 if(!smb_io_unistr2(t
, &trn
->uni_name
[i
], trn
->name
[i
].hdr_name
.buffer
, ps
, depth
))
1395 /*******************************************************************
1396 Reads or writes a structure.
1397 ********************************************************************/
1399 static BOOL
lsa_io_trans_names2(const char *desc
, LSA_TRANS_NAME_ENUM2
*trn
,
1400 prs_struct
*ps
, int depth
)
1404 prs_debug(ps
, depth
, desc
, "lsa_io_trans_names2");
1410 if(!prs_uint32("num_entries ", ps
, depth
, &trn
->num_entries
))
1412 if(!prs_uint32("ptr_trans_names", ps
, depth
, &trn
->ptr_trans_names
))
1415 if (trn
->ptr_trans_names
!= 0) {
1416 if(!prs_uint32("num_entries2 ", ps
, depth
,
1417 &trn
->num_entries2
))
1420 if (trn
->num_entries2
!= trn
->num_entries
) {
1425 if (UNMARSHALLING(ps
) && trn
->num_entries2
) {
1426 if ((trn
->name
= PRS_ALLOC_MEM(ps
, LSA_TRANS_NAME2
, trn
->num_entries2
)) == NULL
) {
1430 if ((trn
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, trn
->num_entries2
)) == NULL
) {
1435 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1437 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1439 if(!lsa_io_trans_name2(t
, &trn
->name
[i
], ps
, depth
)) /* translated name */
1443 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1445 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1447 if(!smb_io_unistr2(t
, &trn
->uni_name
[i
], trn
->name
[i
].hdr_name
.buffer
, ps
, depth
))
1458 /*******************************************************************
1459 Reads or writes a structure.
1460 ********************************************************************/
1462 BOOL
lsa_io_r_lookup_sids(const char *desc
, LSA_R_LOOKUP_SIDS
*r_s
,
1463 prs_struct
*ps
, int depth
)
1465 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_sids");
1471 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &r_s
->ptr_dom_ref
))
1474 if (r_s
->ptr_dom_ref
!= 0)
1475 if(!lsa_io_dom_r_ref ("dom_ref", r_s
->dom_ref
, ps
, depth
)) /* domain reference info */
1478 if(!lsa_io_trans_names("names ", &r_s
->names
, ps
, depth
)) /* translated names */
1484 if(!prs_uint32("mapped_count", ps
, depth
, &r_s
->mapped_count
))
1487 if(!prs_ntstatus("status ", ps
, depth
, &r_s
->status
))
1493 /*******************************************************************
1494 Reads or writes a structure.
1495 ********************************************************************/
1497 BOOL
lsa_io_r_lookup_sids2(const char *desc
, LSA_R_LOOKUP_SIDS2
*r_s
,
1498 prs_struct
*ps
, int depth
)
1500 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_sids2");
1506 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &r_s
->ptr_dom_ref
))
1509 if (r_s
->ptr_dom_ref
!= 0)
1510 if(!lsa_io_dom_r_ref ("dom_ref", r_s
->dom_ref
, ps
, depth
)) /* domain reference info */
1513 if(!lsa_io_trans_names2("names ", &r_s
->names
, ps
, depth
)) /* translated names */
1519 if(!prs_uint32("mapped_count", ps
, depth
, &r_s
->mapped_count
))
1522 if(!prs_ntstatus("status ", ps
, depth
, &r_s
->status
))
1529 /*******************************************************************
1530 Reads or writes a structure.
1531 ********************************************************************/
1533 BOOL
lsa_io_r_lookup_sids3(const char *desc
, LSA_R_LOOKUP_SIDS3
*r_s
,
1534 prs_struct
*ps
, int depth
)
1536 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_sids3");
1542 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &r_s
->ptr_dom_ref
))
1545 if (r_s
->ptr_dom_ref
!= 0)
1546 if(!lsa_io_dom_r_ref ("dom_ref", r_s
->dom_ref
, ps
, depth
)) /* domain reference info */
1549 if(!lsa_io_trans_names2("names ", &r_s
->names
, ps
, depth
)) /* translated names */
1555 if(!prs_uint32("mapped_count", ps
, depth
, &r_s
->mapped_count
))
1558 if(!prs_ntstatus("status ", ps
, depth
, &r_s
->status
))
1564 /*******************************************************************
1566 ********************************************************************/
1568 void init_q_lookup_names(TALLOC_CTX
*mem_ctx
, LSA_Q_LOOKUP_NAMES
*q_l
,
1569 POLICY_HND
*hnd
, int num_names
, const char **names
,
1574 DEBUG(5, ("init_q_lookup_names\n"));
1579 q_l
->num_entries
= num_names
;
1580 q_l
->num_entries2
= num_names
;
1581 q_l
->lookup_level
= level
;
1584 if ((q_l
->uni_name
= TALLOC_ZERO_ARRAY(mem_ctx
, UNISTR2
, num_names
)) == NULL
) {
1585 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1589 if ((q_l
->hdr_name
= TALLOC_ZERO_ARRAY(mem_ctx
, UNIHDR
, num_names
)) == NULL
) {
1590 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1594 q_l
->uni_name
= NULL
;
1595 q_l
->hdr_name
= NULL
;
1598 for (i
= 0; i
< num_names
; i
++) {
1599 init_unistr2(&q_l
->uni_name
[i
], names
[i
], UNI_FLAGS_NONE
);
1600 init_uni_hdr(&q_l
->hdr_name
[i
], &q_l
->uni_name
[i
]);
1604 /*******************************************************************
1605 reads or writes a structure.
1606 ********************************************************************/
1608 BOOL
lsa_io_q_lookup_names(const char *desc
, LSA_Q_LOOKUP_NAMES
*q_r
,
1609 prs_struct
*ps
, int depth
)
1613 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names");
1619 if(!smb_io_pol_hnd("", &q_r
->pol
, ps
, depth
)) /* policy handle */
1624 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
1626 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
1629 if (UNMARSHALLING(ps
)) {
1630 if (q_r
->num_entries
) {
1631 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
1633 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
1638 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1641 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
1645 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1648 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
1654 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
1656 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
1658 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
1662 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
1668 /*******************************************************************
1669 reads or writes a structure.
1670 ********************************************************************/
1672 BOOL
lsa_io_r_lookup_names(const char *desc
, LSA_R_LOOKUP_NAMES
*out
, prs_struct
*ps
, int depth
)
1676 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names");
1682 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
1685 if (out
->ptr_dom_ref
!= 0)
1686 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
1689 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
1691 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
1694 if (out
->ptr_entries
!= 0) {
1695 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
1698 if (out
->num_entries2
!= out
->num_entries
) {
1703 if (UNMARSHALLING(ps
) && out
->num_entries2
) {
1704 if ((out
->dom_rid
= PRS_ALLOC_MEM(ps
, DOM_RID
, out
->num_entries2
))
1706 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1711 for (i
= 0; i
< out
->num_entries2
; i
++)
1712 if(!smb_io_dom_rid("", &out
->dom_rid
[i
], ps
, depth
)) /* domain RIDs being looked up */
1716 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
1719 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
1725 /*******************************************************************
1726 reads or writes a structure.
1727 ********************************************************************/
1729 BOOL
lsa_io_q_lookup_names2(const char *desc
, LSA_Q_LOOKUP_NAMES2
*q_r
,
1730 prs_struct
*ps
, int depth
)
1734 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names2");
1740 if(!smb_io_pol_hnd("", &q_r
->pol
, ps
, depth
)) /* policy handle */
1745 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
1747 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
1750 if (UNMARSHALLING(ps
)) {
1751 if (q_r
->num_entries
) {
1752 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
1754 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
1759 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1762 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
1766 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1769 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
1775 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
1777 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
1779 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
1783 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
1785 if(!prs_uint32("unknown1 ", ps
, depth
, &q_r
->unknown1
))
1787 if(!prs_uint32("unknown2 ", ps
, depth
, &q_r
->unknown2
))
1793 /*******************************************************************
1794 reads or writes a structure.
1795 ********************************************************************/
1797 BOOL
lsa_io_r_lookup_names2(const char *desc
, LSA_R_LOOKUP_NAMES2
*out
, prs_struct
*ps
, int depth
)
1801 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names2");
1807 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
1810 if (out
->ptr_dom_ref
!= 0)
1811 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
1814 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
1816 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
1819 if (out
->ptr_entries
!= 0) {
1820 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
1823 if (out
->num_entries2
!= out
->num_entries
) {
1828 if (UNMARSHALLING(ps
) && out
->num_entries2
) {
1829 if ((out
->dom_rid
= PRS_ALLOC_MEM(ps
, DOM_RID2
, out
->num_entries2
))
1831 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1836 for (i
= 0; i
< out
->num_entries2
; i
++)
1837 if(!smb_io_dom_rid2("", &out
->dom_rid
[i
], ps
, depth
)) /* domain RIDs being looked up */
1841 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
1844 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
1850 /*******************************************************************
1851 Internal lsa data type io.
1852 Following pass must read DOM_SID2 types.
1853 ********************************************************************/
1855 BOOL
smb_io_lsa_translated_sids3(const char *desc
, LSA_TRANSLATED_SID3
*q_r
,
1856 prs_struct
*ps
, int depth
)
1858 prs_debug(ps
, depth
, desc
, "smb_io_lsa_translated_sids3");
1863 if(!prs_uint8 ("sid_type ", ps
, depth
, &q_r
->sid_type
))
1867 /* Second pass will read/write these. */
1868 if (!smb_io_dom_sid2_p("sid_header", ps
, depth
, &q_r
->sid2
))
1870 if(!prs_uint32("sid_idx ", ps
, depth
, &q_r
->sid_idx
))
1872 if(!prs_uint32("unknown ", ps
, depth
, &q_r
->unknown
))
1878 /*******************************************************************
1879 Identical to lsa_io_q_lookup_names2.
1880 ********************************************************************/
1882 BOOL
lsa_io_q_lookup_names3(const char *desc
, LSA_Q_LOOKUP_NAMES3
*q_r
,
1883 prs_struct
*ps
, int depth
)
1887 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names3");
1893 if(!smb_io_pol_hnd("", &q_r
->pol
, ps
, depth
)) /* policy handle */
1898 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
1900 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
1903 if (UNMARSHALLING(ps
)) {
1904 if (q_r
->num_entries
) {
1905 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
1907 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
1912 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1915 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
1919 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1922 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
1928 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
1930 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
1932 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
1936 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
1938 if(!prs_uint32("unknown1 ", ps
, depth
, &q_r
->unknown1
))
1940 if(!prs_uint32("unknown2 ", ps
, depth
, &q_r
->unknown2
))
1946 /*******************************************************************
1947 reads or writes a structure.
1948 ********************************************************************/
1950 BOOL
lsa_io_r_lookup_names3(const char *desc
, LSA_R_LOOKUP_NAMES3
*out
, prs_struct
*ps
, int depth
)
1954 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names3");
1960 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
1963 if (out
->ptr_dom_ref
!= 0)
1964 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
1967 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
1969 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
1972 if (out
->ptr_entries
!= 0) {
1973 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
1976 if (out
->num_entries2
!= out
->num_entries
) {
1981 if (UNMARSHALLING(ps
) && out
->num_entries2
) {
1982 if ((out
->trans_sids
= PRS_ALLOC_MEM(ps
, LSA_TRANSLATED_SID3
, out
->num_entries2
))
1984 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1989 for (i
= 0; i
< out
->num_entries2
; i
++) {
1990 if(!smb_io_lsa_translated_sids3("", &out
->trans_sids
[i
], ps
, depth
)) {
1994 /* Now process the DOM_SID2 entries. */
1995 for (i
= 0; i
< out
->num_entries2
; i
++) {
1996 if (out
->trans_sids
[i
].sid2
) {
1997 if( !smb_io_dom_sid2("sid2", out
->trans_sids
[i
].sid2
, ps
, depth
) ) {
2004 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
2007 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
2013 /*******************************************************************
2014 ********************************************************************/
2016 BOOL
lsa_io_q_lookup_names4(const char *desc
, LSA_Q_LOOKUP_NAMES4
*q_r
,
2017 prs_struct
*ps
, int depth
)
2021 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names4");
2027 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
2029 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
2032 if (UNMARSHALLING(ps
)) {
2033 if (q_r
->num_entries
) {
2034 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
2036 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
2041 for (i
= 0; i
< q_r
->num_entries
; i
++) {
2044 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
2048 for (i
= 0; i
< q_r
->num_entries
; i
++) {
2051 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
2057 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
2059 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
2061 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
2065 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
2067 if(!prs_uint32("unknown1 ", ps
, depth
, &q_r
->unknown1
))
2069 if(!prs_uint32("unknown2 ", ps
, depth
, &q_r
->unknown2
))
2075 /*******************************************************************
2076 Identical to lsa_io_r_lookup_names3.
2077 ********************************************************************/
2079 BOOL
lsa_io_r_lookup_names4(const char *desc
, LSA_R_LOOKUP_NAMES4
*out
, prs_struct
*ps
, int depth
)
2083 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names4");
2089 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
2092 if (out
->ptr_dom_ref
!= 0)
2093 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
2096 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
2098 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
2101 if (out
->ptr_entries
!= 0) {
2102 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
2105 if (out
->num_entries2
!= out
->num_entries
) {
2110 if (UNMARSHALLING(ps
) && out
->num_entries2
) {
2111 if ((out
->trans_sids
= PRS_ALLOC_MEM(ps
, LSA_TRANSLATED_SID3
, out
->num_entries2
))
2113 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
2118 for (i
= 0; i
< out
->num_entries2
; i
++) {
2119 if(!smb_io_lsa_translated_sids3("", &out
->trans_sids
[i
], ps
, depth
)) {
2123 /* Now process the DOM_SID2 entries. */
2124 for (i
= 0; i
< out
->num_entries2
; i
++) {
2125 if (out
->trans_sids
[i
].sid2
) {
2126 if( !smb_io_dom_sid2("sid2", out
->trans_sids
[i
].sid2
, ps
, depth
) ) {
2133 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
2136 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
2142 /*******************************************************************
2143 Reads or writes an LSA_Q_OPEN_SECRET structure.
2144 ********************************************************************/
2146 BOOL
lsa_io_q_open_secret(const char *desc
, LSA_Q_OPEN_SECRET
*in
, prs_struct
*ps
, int depth
)
2148 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_secret");
2154 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
2157 if(!prs_unistr4 ("secretname", ps
, depth
, &in
->secretname
))
2162 if(!prs_uint32("access", ps
, depth
, &in
->access
))
2168 /*******************************************************************
2169 Reads or writes an LSA_R_OPEN_SECRET structure.
2170 ********************************************************************/
2172 BOOL
lsa_io_r_open_secret(const char *desc
, LSA_R_OPEN_SECRET
*out
, prs_struct
*ps
, int depth
)
2174 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_secret");
2180 if(!smb_io_pol_hnd("", &out
->handle
, ps
, depth
))
2183 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2189 /*******************************************************************
2190 Inits an LSA_Q_ENUM_PRIVS structure.
2191 ********************************************************************/
2193 void init_q_enum_privs(LSA_Q_ENUM_PRIVS
*in
, POLICY_HND
*hnd
, uint32 enum_context
, uint32 pref_max_length
)
2195 DEBUG(5, ("init_q_enum_privs\n"));
2197 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
2199 in
->enum_context
= enum_context
;
2200 in
->pref_max_length
= pref_max_length
;
2203 /*******************************************************************
2204 reads or writes a structure.
2205 ********************************************************************/
2206 BOOL
lsa_io_q_enum_privs(const char *desc
, LSA_Q_ENUM_PRIVS
*in
, prs_struct
*ps
, int depth
)
2211 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_privs");
2214 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
2217 if(!prs_uint32("enum_context ", ps
, depth
, &in
->enum_context
))
2219 if(!prs_uint32("pref_max_length", ps
, depth
, &in
->pref_max_length
))
2225 /*******************************************************************
2226 reads or writes a structure.
2227 ********************************************************************/
2228 static BOOL
lsa_io_priv_entries(const char *desc
, LSA_PRIV_ENTRY
*entries
, uint32 count
, prs_struct
*ps
, int depth
)
2232 if (entries
== NULL
)
2235 prs_debug(ps
, depth
, desc
, "lsa_io_priv_entries");
2241 for (i
= 0; i
< count
; i
++) {
2242 if (!smb_io_unihdr("", &entries
[i
].hdr_name
, ps
, depth
))
2244 if(!prs_uint32("luid_low ", ps
, depth
, &entries
[i
].luid_low
))
2246 if(!prs_uint32("luid_high", ps
, depth
, &entries
[i
].luid_high
))
2250 for (i
= 0; i
< count
; i
++)
2251 if (!smb_io_unistr2("", &entries
[i
].name
, entries
[i
].hdr_name
.buffer
, ps
, depth
))
2257 /*******************************************************************
2258 Inits an LSA_R_ENUM_PRIVS structure.
2259 ********************************************************************/
2261 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS
*out
, uint32 enum_context
,
2262 uint32 count
, LSA_PRIV_ENTRY
*entries
)
2264 DEBUG(5, ("init_lsa_r_enum_privs\n"));
2266 out
->enum_context
=enum_context
;
2269 if (entries
!=NULL
) {
2280 /*******************************************************************
2281 reads or writes a structure.
2282 ********************************************************************/
2283 BOOL
lsa_io_r_enum_privs(const char *desc
, LSA_R_ENUM_PRIVS
*out
, prs_struct
*ps
, int depth
)
2288 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_privs");
2294 if(!prs_uint32("enum_context", ps
, depth
, &out
->enum_context
))
2296 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2298 if(!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
2302 if(!prs_uint32("count1", ps
, depth
, &out
->count1
))
2305 if (UNMARSHALLING(ps
) && out
->count1
)
2306 if (!(out
->privs
= PRS_ALLOC_MEM(ps
, LSA_PRIV_ENTRY
, out
->count1
)))
2309 if (!lsa_io_priv_entries("", out
->privs
, out
->count1
, ps
, depth
))
2316 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2322 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME
*trn
, POLICY_HND
*hnd
, const char *name
, uint16 lang_id
, uint16 lang_id_sys
)
2324 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2326 init_unistr2(&trn
->name
, name
, UNI_FLAGS_NONE
);
2327 init_uni_hdr(&trn
->hdr_name
, &trn
->name
);
2328 trn
->lang_id
= lang_id
;
2329 trn
->lang_id_sys
= lang_id_sys
;
2332 /*******************************************************************
2333 reads or writes a structure.
2334 ********************************************************************/
2335 BOOL
lsa_io_q_priv_get_dispname(const char *desc
, LSA_Q_PRIV_GET_DISPNAME
*in
, prs_struct
*ps
, int depth
)
2340 prs_debug(ps
, depth
, desc
, "lsa_io_q_priv_get_dispname");
2346 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
2349 if (!smb_io_unihdr("hdr_name", &in
->hdr_name
, ps
, depth
))
2352 if (!smb_io_unistr2("name", &in
->name
, in
->hdr_name
.buffer
, ps
, depth
))
2355 if(!prs_uint16("lang_id ", ps
, depth
, &in
->lang_id
))
2357 if(!prs_uint16("lang_id_sys", ps
, depth
, &in
->lang_id_sys
))
2363 /*******************************************************************
2364 reads or writes a structure.
2365 ********************************************************************/
2366 BOOL
lsa_io_r_priv_get_dispname(const char *desc
, LSA_R_PRIV_GET_DISPNAME
*out
, prs_struct
*ps
, int depth
)
2371 prs_debug(ps
, depth
, desc
, "lsa_io_r_priv_get_dispname");
2377 if (!prs_uint32("ptr_info", ps
, depth
, &out
->ptr_info
))
2381 if (!smb_io_unihdr("hdr_name", &out
->hdr_desc
, ps
, depth
))
2384 if (!smb_io_unistr2("desc", &out
->desc
, out
->hdr_desc
.buffer
, ps
, depth
))
2391 if(!prs_uint16("lang_id", ps
, depth
, &out
->lang_id
))
2396 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2403 initialise a LSA_Q_ENUM_ACCOUNTS structure
2405 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS
*trn
, POLICY_HND
*hnd
, uint32 enum_context
, uint32 pref_max_length
)
2407 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2409 trn
->enum_context
= enum_context
;
2410 trn
->pref_max_length
= pref_max_length
;
2413 /*******************************************************************
2414 reads or writes a structure.
2415 ********************************************************************/
2416 BOOL
lsa_io_q_enum_accounts(const char *desc
, LSA_Q_ENUM_ACCOUNTS
*in
, prs_struct
*ps
, int depth
)
2421 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_accounts");
2424 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
2427 if(!prs_uint32("enum_context ", ps
, depth
, &in
->enum_context
))
2429 if(!prs_uint32("pref_max_length", ps
, depth
, &in
->pref_max_length
))
2436 /*******************************************************************
2437 Inits an LSA_R_ENUM_PRIVS structure.
2438 ********************************************************************/
2440 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS
*out
, uint32 enum_context
)
2442 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2444 out
->enum_context
=enum_context
;
2445 if (out
->enum_context
!=0) {
2446 out
->sids
.num_entries
=enum_context
;
2447 out
->sids
.ptr_sid_enum
=1;
2448 out
->sids
.num_entries2
=enum_context
;
2450 out
->sids
.num_entries
=0;
2451 out
->sids
.ptr_sid_enum
=0;
2452 out
->sids
.num_entries2
=0;
2456 /*******************************************************************
2457 reads or writes a structure.
2458 ********************************************************************/
2459 BOOL
lsa_io_r_enum_accounts(const char *desc
, LSA_R_ENUM_ACCOUNTS
*out
, prs_struct
*ps
, int depth
)
2464 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_accounts");
2470 if(!prs_uint32("enum_context", ps
, depth
, &out
->enum_context
))
2473 if (!lsa_io_sid_enum("sids", &out
->sids
, ps
, depth
))
2479 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2486 /*******************************************************************
2487 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2488 ********************************************************************/
2490 BOOL
lsa_io_q_unk_get_connuser(const char *desc
, LSA_Q_UNK_GET_CONNUSER
*in
, prs_struct
*ps
, int depth
)
2492 prs_debug(ps
, depth
, desc
, "lsa_io_q_unk_get_connuser");
2498 if(!prs_uint32("ptr_srvname", ps
, depth
, &in
->ptr_srvname
))
2501 if(!smb_io_unistr2("uni2_srvname", &in
->uni2_srvname
, in
->ptr_srvname
, ps
, depth
)) /* server name to be looked up */
2507 if(!prs_uint32("unk1", ps
, depth
, &in
->unk1
))
2509 if(!prs_uint32("unk2", ps
, depth
, &in
->unk2
))
2511 if(!prs_uint32("unk3", ps
, depth
, &in
->unk3
))
2514 /* Don't bother to read or write at present... */
2518 /*******************************************************************
2519 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2520 ********************************************************************/
2522 BOOL
lsa_io_r_unk_get_connuser(const char *desc
, LSA_R_UNK_GET_CONNUSER
*out
, prs_struct
*ps
, int depth
)
2524 prs_debug(ps
, depth
, desc
, "lsa_io_r_unk_get_connuser");
2530 if(!prs_uint32("ptr_user_name", ps
, depth
, &out
->ptr_user_name
))
2532 if(!smb_io_unihdr("hdr_user_name", &out
->hdr_user_name
, ps
, depth
))
2534 if(!smb_io_unistr2("uni2_user_name", &out
->uni2_user_name
, out
->ptr_user_name
, ps
, depth
))
2540 if(!prs_uint32("unk1", ps
, depth
, &out
->unk1
))
2543 if(!prs_uint32("ptr_dom_name", ps
, depth
, &out
->ptr_dom_name
))
2545 if(!smb_io_unihdr("hdr_dom_name", &out
->hdr_dom_name
, ps
, depth
))
2547 if(!smb_io_unistr2("uni2_dom_name", &out
->uni2_dom_name
, out
->ptr_dom_name
, ps
, depth
))
2553 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2559 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT
*trn
, POLICY_HND
*hnd
, DOM_SID
*sid
, uint32 desired_access
)
2561 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2563 init_dom_sid2(&trn
->sid
, sid
);
2564 trn
->access
= desired_access
;
2568 /*******************************************************************
2569 Reads or writes an LSA_Q_CREATEACCOUNT structure.
2570 ********************************************************************/
2572 BOOL
lsa_io_q_create_account(const char *desc
, LSA_Q_CREATEACCOUNT
*out
, prs_struct
*ps
, int depth
)
2574 prs_debug(ps
, depth
, desc
, "lsa_io_q_create_account");
2580 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2583 if(!smb_io_dom_sid2("sid", &out
->sid
, ps
, depth
)) /* domain SID */
2586 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2592 /*******************************************************************
2593 Reads or writes an LSA_R_CREATEACCOUNT structure.
2594 ********************************************************************/
2596 BOOL
lsa_io_r_create_account(const char *desc
, LSA_R_CREATEACCOUNT
*out
, prs_struct
*ps
, int depth
)
2598 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_account");
2604 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2607 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2614 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT
*trn
, POLICY_HND
*hnd
, DOM_SID
*sid
, uint32 desired_access
)
2616 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2618 init_dom_sid2(&trn
->sid
, sid
);
2619 trn
->access
= desired_access
;
2622 /*******************************************************************
2623 Reads or writes an LSA_Q_OPENACCOUNT structure.
2624 ********************************************************************/
2626 BOOL
lsa_io_q_open_account(const char *desc
, LSA_Q_OPENACCOUNT
*out
, prs_struct
*ps
, int depth
)
2628 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_account");
2634 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2637 if(!smb_io_dom_sid2("sid", &out
->sid
, ps
, depth
)) /* domain SID */
2640 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2646 /*******************************************************************
2647 Reads or writes an LSA_R_OPENACCOUNT structure.
2648 ********************************************************************/
2650 BOOL
lsa_io_r_open_account(const char *desc
, LSA_R_OPENACCOUNT
*out
, prs_struct
*ps
, int depth
)
2652 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_account");
2658 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2661 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2668 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT
*trn
, POLICY_HND
*hnd
)
2670 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2674 /*******************************************************************
2675 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2676 ********************************************************************/
2678 BOOL
lsa_io_q_enum_privsaccount(const char *desc
, LSA_Q_ENUMPRIVSACCOUNT
*out
, prs_struct
*ps
, int depth
)
2680 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_privsaccount");
2686 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2692 /*******************************************************************
2693 Reads or writes an LUID structure.
2694 ********************************************************************/
2696 static BOOL
lsa_io_luid(const char *desc
, LUID
*out
, prs_struct
*ps
, int depth
)
2698 prs_debug(ps
, depth
, desc
, "lsa_io_luid");
2704 if(!prs_uint32("low", ps
, depth
, &out
->low
))
2707 if(!prs_uint32("high", ps
, depth
, &out
->high
))
2713 /*******************************************************************
2714 Reads or writes an LUID_ATTR structure.
2715 ********************************************************************/
2717 static BOOL
lsa_io_luid_attr(const char *desc
, LUID_ATTR
*out
, prs_struct
*ps
, int depth
)
2719 prs_debug(ps
, depth
, desc
, "lsa_io_luid_attr");
2725 if (!lsa_io_luid(desc
, &out
->luid
, ps
, depth
))
2728 if(!prs_uint32("attr", ps
, depth
, &out
->attr
))
2734 /*******************************************************************
2735 Reads or writes an PRIVILEGE_SET structure.
2736 ********************************************************************/
2738 static BOOL
lsa_io_privilege_set(const char *desc
, PRIVILEGE_SET
*out
, prs_struct
*ps
, int depth
)
2742 prs_debug(ps
, depth
, desc
, "lsa_io_privilege_set");
2748 if(!prs_uint32("count", ps
, depth
, &dummy
))
2750 if(!prs_uint32("control", ps
, depth
, &out
->control
))
2753 for (i
=0; i
<out
->count
; i
++) {
2754 if (!lsa_io_luid_attr(desc
, &out
->set
[i
], ps
, depth
))
2761 NTSTATUS
init_lsa_r_enum_privsaccount(TALLOC_CTX
*mem_ctx
, LSA_R_ENUMPRIVSACCOUNT
*out
, LUID_ATTR
*set
, uint32 count
, uint32 control
)
2763 NTSTATUS ret
= NT_STATUS_OK
;
2768 if ( !NT_STATUS_IS_OK(ret
= privilege_set_init_by_ctx(mem_ctx
, &(out
->set
))) )
2771 out
->set
.count
= count
;
2773 if (!NT_STATUS_IS_OK(ret
= dup_luid_attr(out
->set
.mem_ctx
, &(out
->set
.set
), set
, count
)))
2776 DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out
->count
));
2781 /*******************************************************************
2782 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2783 ********************************************************************/
2785 BOOL
lsa_io_r_enum_privsaccount(const char *desc
, LSA_R_ENUMPRIVSACCOUNT
*out
, prs_struct
*ps
, int depth
)
2787 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_privsaccount");
2793 if(!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
2797 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2800 /* malloc memory if unmarshalling here */
2802 if (UNMARSHALLING(ps
) && out
->count
!= 0) {
2803 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps
->mem_ctx
, &(out
->set
))))
2806 if (!(out
->set
.set
= PRS_ALLOC_MEM(ps
,LUID_ATTR
,out
->count
)))
2811 if(!lsa_io_privilege_set(desc
, &out
->set
, ps
, depth
))
2815 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2823 /*******************************************************************
2824 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
2825 ********************************************************************/
2827 BOOL
lsa_io_q_getsystemaccount(const char *desc
, LSA_Q_GETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2829 prs_debug(ps
, depth
, desc
, "lsa_io_q_getsystemaccount");
2835 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2841 /*******************************************************************
2842 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
2843 ********************************************************************/
2845 BOOL
lsa_io_r_getsystemaccount(const char *desc
, LSA_R_GETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2847 prs_debug(ps
, depth
, desc
, "lsa_io_r_getsystemaccount");
2853 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2856 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2863 /*******************************************************************
2864 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2865 ********************************************************************/
2867 BOOL
lsa_io_q_setsystemaccount(const char *desc
, LSA_Q_SETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2869 prs_debug(ps
, depth
, desc
, "lsa_io_q_setsystemaccount");
2875 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2878 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2884 /*******************************************************************
2885 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2886 ********************************************************************/
2888 BOOL
lsa_io_r_setsystemaccount(const char *desc
, LSA_R_SETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2890 prs_debug(ps
, depth
, desc
, "lsa_io_r_setsystemaccount");
2896 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2903 void init_lsa_string( LSA_STRING
*uni
, const char *string
)
2905 init_unistr2(&uni
->unistring
, string
, UNI_FLAGS_NONE
);
2906 init_uni_hdr(&uni
->hdr
, &uni
->unistring
);
2909 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE
*q_u
, POLICY_HND
*hnd
, const char *name
)
2911 memcpy(&q_u
->pol
, hnd
, sizeof(q_u
->pol
));
2912 init_lsa_string( &q_u
->privname
, name
);
2915 BOOL
smb_io_lsa_string( const char *desc
, LSA_STRING
*string
, prs_struct
*ps
, int depth
)
2917 prs_debug(ps
, depth
, desc
, "smb_io_lsa_string");
2920 if(!smb_io_unihdr ("hdr", &string
->hdr
, ps
, depth
))
2922 if(!smb_io_unistr2("unistring", &string
->unistring
, string
->hdr
.buffer
, ps
, depth
))
2928 /*******************************************************************
2929 Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE structure.
2930 ********************************************************************/
2932 BOOL
lsa_io_q_lookup_priv_value(const char *desc
, LSA_Q_LOOKUP_PRIV_VALUE
*out
, prs_struct
*ps
, int depth
)
2934 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_priv_value");
2940 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2942 if(!smb_io_lsa_string("privname", &out
->privname
, ps
, depth
))
2948 /*******************************************************************
2949 Reads or writes an LSA_R_LOOKUP_PRIV_VALUE structure.
2950 ********************************************************************/
2952 BOOL
lsa_io_r_lookup_priv_value(const char *desc
, LSA_R_LOOKUP_PRIV_VALUE
*out
, prs_struct
*ps
, int depth
)
2954 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_priv_value");
2960 if(!lsa_io_luid("luid", &out
->luid
, ps
, depth
))
2963 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2970 /*******************************************************************
2971 Reads or writes an LSA_Q_ADDPRIVS structure.
2972 ********************************************************************/
2974 BOOL
lsa_io_q_addprivs(const char *desc
, LSA_Q_ADDPRIVS
*out
, prs_struct
*ps
, int depth
)
2976 prs_debug(ps
, depth
, desc
, "lsa_io_q_addprivs");
2982 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2985 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2988 if (UNMARSHALLING(ps
) && out
->count
!=0) {
2989 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps
->mem_ctx
, &(out
->set
))))
2992 if (!(out
->set
.set
= PRS_ALLOC_MEM(ps
, LUID_ATTR
, out
->count
)))
2996 if(!lsa_io_privilege_set(desc
, &out
->set
, ps
, depth
))
3002 /*******************************************************************
3003 Reads or writes an LSA_R_ADDPRIVS structure.
3004 ********************************************************************/
3006 BOOL
lsa_io_r_addprivs(const char *desc
, LSA_R_ADDPRIVS
*out
, prs_struct
*ps
, int depth
)
3008 prs_debug(ps
, depth
, desc
, "lsa_io_r_addprivs");
3014 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3020 /*******************************************************************
3021 Reads or writes an LSA_Q_REMOVEPRIVS structure.
3022 ********************************************************************/
3024 BOOL
lsa_io_q_removeprivs(const char *desc
, LSA_Q_REMOVEPRIVS
*out
, prs_struct
*ps
, int depth
)
3026 prs_debug(ps
, depth
, desc
, "lsa_io_q_removeprivs");
3032 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
3035 if(!prs_uint32("allrights", ps
, depth
, &out
->allrights
))
3038 if(!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
3042 * JFM: I'm not sure at all if the count is inside the ptr
3043 * never seen one with ptr=0
3047 if(!prs_uint32("count", ps
, depth
, &out
->count
))
3050 if (UNMARSHALLING(ps
) && out
->count
!=0) {
3051 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps
->mem_ctx
, &(out
->set
))))
3054 if (!(out
->set
.set
= PRS_ALLOC_MEM(ps
, LUID_ATTR
, out
->count
)))
3058 if(!lsa_io_privilege_set(desc
, &out
->set
, ps
, depth
))
3065 /*******************************************************************
3066 Reads or writes an LSA_R_REMOVEPRIVS structure.
3067 ********************************************************************/
3069 BOOL
lsa_io_r_removeprivs(const char *desc
, LSA_R_REMOVEPRIVS
*out
, prs_struct
*ps
, int depth
)
3071 prs_debug(ps
, depth
, desc
, "lsa_io_r_removeprivs");
3077 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3083 BOOL
policy_handle_is_valid(const POLICY_HND
*hnd
)
3085 POLICY_HND zero_pol
;
3087 ZERO_STRUCT(zero_pol
);
3088 return ((memcmp(&zero_pol
, hnd
, sizeof(POLICY_HND
)) == 0) ? False
: True
);
3091 /*******************************************************************
3092 Inits an LSA_Q_QUERY_INFO2 structure.
3093 ********************************************************************/
3095 void init_q_query2(LSA_Q_QUERY_INFO2
*in
, POLICY_HND
*hnd
, uint16 info_class
)
3097 DEBUG(5, ("init_q_query2\n"));
3099 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
3101 in
->info_class
= info_class
;
3104 /*******************************************************************
3105 Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
3106 ********************************************************************/
3108 BOOL
lsa_io_q_query_info2(const char *desc
, LSA_Q_QUERY_INFO2
*in
, prs_struct
*ps
, int depth
)
3110 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_info2");
3116 if(!smb_io_pol_hnd("pol", &in
->pol
, ps
, depth
))
3119 if(!prs_uint16("info_class", ps
, depth
, &in
->info_class
))
3125 /*******************************************************************
3126 Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
3127 ********************************************************************/
3129 BOOL
lsa_io_r_query_info2(const char *desc
, LSA_R_QUERY_INFO2
*out
,
3130 prs_struct
*ps
, int depth
)
3132 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_info2");
3138 if(!prs_uint32("dom_ptr", ps
, depth
, &out
->dom_ptr
))
3143 if(!lsa_io_query_info_ctr2("", ps
, depth
, &out
->ctr
))
3149 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3155 /*******************************************************************
3156 Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
3157 ********************************************************************/
3158 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS
*in
,
3163 DEBUG(5, ("init_q_enum_acct_rights\n"));
3166 init_dom_sid2(&in
->sid
, sid
);
3169 /*******************************************************************
3170 ********************************************************************/
3171 NTSTATUS
init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS
*out
, PRIVILEGE_SET
*privileges
)
3174 const char *privname
;
3175 const char **privname_array
= NULL
;
3178 for ( i
=0; i
<privileges
->count
; i
++ ) {
3179 privname
= luid_to_privilege_name( &privileges
->set
[i
].luid
);
3181 if ( !add_string_to_array( talloc_tos(), privname
, &privname_array
, &num_priv
) )
3182 return NT_STATUS_NO_MEMORY
;
3187 out
->rights
= TALLOC_P( talloc_tos(), UNISTR4_ARRAY
);
3189 return NT_STATUS_NO_MEMORY
;
3192 if ( !init_unistr4_array( out
->rights
, num_priv
, privname_array
) )
3193 return NT_STATUS_NO_MEMORY
;
3195 out
->count
= num_priv
;
3198 return NT_STATUS_OK
;
3201 /*******************************************************************
3202 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3203 ********************************************************************/
3204 BOOL
lsa_io_q_enum_acct_rights(const char *desc
, LSA_Q_ENUM_ACCT_RIGHTS
*in
, prs_struct
*ps
, int depth
)
3210 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_acct_rights");
3213 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
3216 if(!smb_io_dom_sid2("sid", &in
->sid
, ps
, depth
))
3223 /*******************************************************************
3224 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3225 ********************************************************************/
3226 BOOL
lsa_io_r_enum_acct_rights(const char *desc
, LSA_R_ENUM_ACCT_RIGHTS
*out
, prs_struct
*ps
, int depth
)
3228 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_acct_rights");
3231 if(!prs_uint32("count ", ps
, depth
, &out
->count
))
3234 if ( !prs_pointer("rights", ps
, depth
, (void*)&out
->rights
, sizeof(UNISTR4_ARRAY
), (PRS_POINTER_CAST
)prs_unistr4_array
) )
3240 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3247 /*******************************************************************
3248 Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3249 ********************************************************************/
3250 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS
*in
, POLICY_HND
*hnd
,
3251 DOM_SID
*sid
, uint32 count
, const char **rights
)
3253 DEBUG(5, ("init_q_add_acct_rights\n"));
3256 init_dom_sid2(&in
->sid
, sid
);
3258 in
->rights
= TALLOC_P( talloc_tos(), UNISTR4_ARRAY
);
3260 smb_panic("init_q_add_acct_rights: talloc fail\n");
3263 init_unistr4_array( in
->rights
, count
, rights
);
3269 /*******************************************************************
3270 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3271 ********************************************************************/
3272 BOOL
lsa_io_q_add_acct_rights(const char *desc
, LSA_Q_ADD_ACCT_RIGHTS
*in
, prs_struct
*ps
, int depth
)
3274 prs_debug(ps
, depth
, desc
, "lsa_io_q_add_acct_rights");
3277 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
3280 if(!smb_io_dom_sid2("sid", &in
->sid
, ps
, depth
))
3283 if(!prs_uint32("count", ps
, depth
, &in
->count
))
3286 if ( !prs_pointer("rights", ps
, depth
, (void*)&in
->rights
, sizeof(UNISTR4_ARRAY
), (PRS_POINTER_CAST
)prs_unistr4_array
) )
3292 /*******************************************************************
3293 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3294 ********************************************************************/
3295 BOOL
lsa_io_r_add_acct_rights(const char *desc
, LSA_R_ADD_ACCT_RIGHTS
*out
, prs_struct
*ps
, int depth
)
3297 prs_debug(ps
, depth
, desc
, "lsa_io_r_add_acct_rights");
3300 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3306 /*******************************************************************
3307 Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3308 ********************************************************************/
3310 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS
*in
,
3315 const char **rights
)
3317 DEBUG(5, ("init_q_remove_acct_rights\n"));
3321 init_dom_sid2(&in
->sid
, sid
);
3323 in
->removeall
= removeall
;
3326 in
->rights
= TALLOC_P( talloc_tos(), UNISTR4_ARRAY
);
3328 smb_panic("init_q_remove_acct_rights: talloc fail\n");
3331 init_unistr4_array( in
->rights
, count
, rights
);
3334 /*******************************************************************
3335 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3336 ********************************************************************/
3338 BOOL
lsa_io_q_remove_acct_rights(const char *desc
, LSA_Q_REMOVE_ACCT_RIGHTS
*in
, prs_struct
*ps
, int depth
)
3340 prs_debug(ps
, depth
, desc
, "lsa_io_q_remove_acct_rights");
3343 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
3346 if(!smb_io_dom_sid2("sid", &in
->sid
, ps
, depth
))
3349 if(!prs_uint32("removeall", ps
, depth
, &in
->removeall
))
3352 if(!prs_uint32("count", ps
, depth
, &in
->count
))
3355 if ( !prs_pointer("rights", ps
, depth
, (void*)&in
->rights
, sizeof(UNISTR4_ARRAY
), (PRS_POINTER_CAST
)prs_unistr4_array
) )
3361 /*******************************************************************
3362 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3363 ********************************************************************/
3364 BOOL
lsa_io_r_remove_acct_rights(const char *desc
, LSA_R_REMOVE_ACCT_RIGHTS
*out
, prs_struct
*ps
, int depth
)
3366 prs_debug(ps
, depth
, desc
, "lsa_io_r_remove_acct_rights");
3369 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3375 /*******************************************************************
3376 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3377 ********************************************************************/
3379 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN
*q
, POLICY_HND
*hnd
, DOM_SID
*sid
, uint32 desired_access
)
3381 memcpy(&q
->pol
, hnd
, sizeof(q
->pol
));
3383 init_dom_sid2(&q
->sid
, sid
);
3384 q
->access_mask
= desired_access
;
3387 /*******************************************************************
3388 ********************************************************************/
3390 #if 0 /* jerry, I think this not correct - gd */
3391 BOOL
lsa_io_q_open_trusted_domain(const char *desc
, LSA_Q_OPEN_TRUSTED_DOMAIN
*in
, prs_struct
*ps
, int depth
)
3393 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_trusted_domain");
3399 if (!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3402 if(!prs_uint32("count", ps
, depth
, &in
->count
))
3405 if(!smb_io_dom_sid("sid", &in
->sid
, ps
, depth
))
3413 /*******************************************************************
3414 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3415 ********************************************************************/
3417 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME
*q
,
3420 uint32 desired_access
)
3422 memcpy(&q
->pol
, hnd
, sizeof(q
->pol
));
3424 init_lsa_string(&q
->name
, name
);
3425 q
->access_mask
= desired_access
;
3428 /*******************************************************************
3429 ********************************************************************/
3432 /*******************************************************************
3433 Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3434 ********************************************************************/
3436 BOOL
lsa_io_q_open_trusted_domain_by_name(const char *desc
, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME
*q_o
, prs_struct
*ps
, int depth
)
3438 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_trusted_domain_by_name");
3444 if(!smb_io_pol_hnd("pol", &q_o
->pol
, ps
, depth
))
3450 if(!smb_io_lsa_string("name", &q_o
->name
, ps
, depth
))
3456 if(!prs_uint32("access", ps
, depth
, &q_o
->access_mask
))
3462 /*******************************************************************
3463 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3464 ********************************************************************/
3466 BOOL
lsa_io_r_open_trusted_domain_by_name(const char *desc
, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME
*out
, prs_struct
*ps
, int depth
)
3468 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_trusted_domain_by_name");
3474 if (!smb_io_pol_hnd("handle", &out
->handle
, ps
, depth
))
3477 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3483 /*******************************************************************
3484 ********************************************************************/
3486 BOOL
lsa_io_q_open_trusted_domain(const char *desc
, LSA_Q_OPEN_TRUSTED_DOMAIN
*q_o
, prs_struct
*ps
, int depth
)
3488 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_trusted_domain");
3494 if(!smb_io_pol_hnd("pol", &q_o
->pol
, ps
, depth
))
3497 if(!smb_io_dom_sid2("sid", &q_o
->sid
, ps
, depth
))
3500 if(!prs_uint32("access", ps
, depth
, &q_o
->access_mask
))
3506 /*******************************************************************
3507 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3508 ********************************************************************/
3510 BOOL
lsa_io_r_open_trusted_domain(const char *desc
, LSA_R_OPEN_TRUSTED_DOMAIN
*out
, prs_struct
*ps
, int depth
)
3512 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_trusted_domain");
3518 if (!smb_io_pol_hnd("handle", &out
->handle
, ps
, depth
))
3521 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3527 /*******************************************************************
3528 ********************************************************************/
3530 BOOL
lsa_io_q_create_trusted_domain(const char *desc
, LSA_Q_CREATE_TRUSTED_DOMAIN
*in
, prs_struct
*ps
, int depth
)
3532 prs_debug(ps
, depth
, desc
, "lsa_io_q_create_trusted_domain");
3538 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3541 if(!prs_unistr4 ("secretname", ps
, depth
, &in
->secretname
))
3546 if(!prs_uint32("access", ps
, depth
, &in
->access
))
3552 /*******************************************************************
3553 ********************************************************************/
3555 BOOL
lsa_io_r_create_trusted_domain(const char *desc
, LSA_R_CREATE_TRUSTED_DOMAIN
*out
, prs_struct
*ps
, int depth
)
3557 prs_debug(ps
, depth
, desc
, "lsa_io_r_create_trusted_domain");
3563 if (!smb_io_pol_hnd("", &out
->handle
, ps
, depth
))
3566 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3572 /*******************************************************************
3573 ********************************************************************/
3575 BOOL
lsa_io_q_create_secret(const char *desc
, LSA_Q_CREATE_SECRET
*in
, prs_struct
*ps
, int depth
)
3577 prs_debug(ps
, depth
, desc
, "lsa_io_q_create_secret");
3583 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3586 if(!prs_unistr4 ("secretname", ps
, depth
, &in
->secretname
))
3591 if(!prs_uint32("access", ps
, depth
, &in
->access
))
3597 /*******************************************************************
3598 ********************************************************************/
3600 BOOL
lsa_io_r_create_secret(const char *desc
, LSA_R_CREATE_SECRET
*out
, prs_struct
*ps
, int depth
)
3602 prs_debug(ps
, depth
, desc
, "lsa_io_r_create_secret");
3608 if (!smb_io_pol_hnd("", &out
->handle
, ps
, depth
))
3611 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3619 /*******************************************************************
3620 ********************************************************************/
3622 static BOOL
lsa_io_data_blob( const char *desc
, prs_struct
*ps
, int depth
, LSA_DATA_BLOB
*blob
)
3624 prs_debug(ps
, depth
, desc
, "lsa_io_data_blob");
3627 if ( !prs_uint32("size", ps
, depth
, &blob
->size
) )
3629 if ( !prs_uint32("size", ps
, depth
, &blob
->size
) )
3632 if ( !prs_io_unistr2_p(desc
, ps
, depth
, &blob
->data
) )
3638 /*******************************************************************
3639 ********************************************************************/
3641 BOOL
lsa_io_q_set_secret(const char *desc
, LSA_Q_SET_SECRET
*in
, prs_struct
*ps
, int depth
)
3643 prs_debug(ps
, depth
, desc
, "lsa_io_q_set_secret");
3646 if ( !prs_align(ps
) )
3649 if ( !smb_io_pol_hnd("", &in
->handle
, ps
, depth
) )
3652 if ( !prs_pointer( "old_value", ps
, depth
, (void*)&in
->old_value
, sizeof(LSA_DATA_BLOB
), (PRS_POINTER_CAST
)lsa_io_data_blob
))
3655 if( !prs_align(ps
) )
3657 if ( !prs_pointer( "old_value", ps
, depth
, (void*)&in
->old_value
, sizeof(LSA_DATA_BLOB
), (PRS_POINTER_CAST
)lsa_io_data_blob
))
3664 /*******************************************************************
3665 ********************************************************************/
3667 BOOL
lsa_io_r_set_secret(const char *desc
, LSA_R_SET_SECRET
*out
, prs_struct
*ps
, int depth
)
3669 prs_debug(ps
, depth
, desc
, "lsa_io_r_set_secret");
3672 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3678 /*******************************************************************
3679 ********************************************************************/
3681 BOOL
lsa_io_q_delete_object(const char *desc
, LSA_Q_DELETE_OBJECT
*in
, prs_struct
*ps
, int depth
)
3683 prs_debug(ps
, depth
, desc
, "lsa_io_q_delete_object");
3689 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3695 /*******************************************************************
3696 ********************************************************************/
3698 BOOL
lsa_io_r_delete_object(const char *desc
, LSA_R_DELETE_OBJECT
*out
, prs_struct
*ps
, int depth
)
3700 prs_debug(ps
, depth
, desc
, "lsa_io_r_delete_object");
3703 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3709 /*******************************************************************
3710 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3711 ********************************************************************/
3713 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO
*q
,
3714 POLICY_HND
*hnd
, uint16 info_class
)
3716 DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3719 q
->info_class
= info_class
;
3722 /*******************************************************************
3723 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3724 ********************************************************************/
3726 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME
*q
,
3727 POLICY_HND
*hnd
, uint16 info_class
,
3728 const char *dom_name
)
3730 DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3733 init_lsa_string(&q
->domain_name
, dom_name
);
3734 q
->info_class
= info_class
;
3737 /*******************************************************************
3738 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3739 ********************************************************************/
3741 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID
*q
,
3742 POLICY_HND
*hnd
, uint16 info_class
,
3745 DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3748 init_dom_sid2(&q
->dom_sid
, dom_sid
);
3749 q
->info_class
= info_class
;
3752 /*******************************************************************
3753 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3754 ********************************************************************/
3756 BOOL
lsa_io_q_query_trusted_domain_info(const char *desc
,
3757 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO
*q_q
,
3758 prs_struct
*ps
, int depth
)
3760 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_trusted_domain_info");
3766 if(!smb_io_pol_hnd("pol", &q_q
->pol
, ps
, depth
))
3769 if(!prs_uint16("info_class", ps
, depth
, &q_q
->info_class
))
3776 /*******************************************************************
3777 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3778 ********************************************************************/
3780 BOOL
lsa_io_q_query_trusted_domain_info_by_sid(const char *desc
,
3781 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID
*q_q
,
3782 prs_struct
*ps
, int depth
)
3784 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_trusted_domain_info_by_sid");
3790 if(!smb_io_pol_hnd("pol", &q_q
->pol
, ps
, depth
))
3796 if(!smb_io_dom_sid2("dom_sid", &q_q
->dom_sid
, ps
, depth
))
3799 if(!prs_uint16("info_class", ps
, depth
, &q_q
->info_class
))
3805 /*******************************************************************
3806 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3807 ********************************************************************/
3809 BOOL
lsa_io_q_query_trusted_domain_info_by_name(const char *desc
,
3810 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME
*q_q
,
3811 prs_struct
*ps
, int depth
)
3813 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_trusted_domain_info_by_name");
3819 if(!smb_io_pol_hnd("pol", &q_q
->pol
, ps
, depth
))
3825 if(!smb_io_lsa_string("domain_name", &q_q
->domain_name
, ps
, depth
))
3828 if(!prs_uint16("info_class", ps
, depth
, &q_q
->info_class
))
3834 /*******************************************************************
3835 ********************************************************************/
3837 static BOOL
smb_io_lsa_data_buf_hdr(const char *desc
, LSA_DATA_BUF_HDR
*buf_hdr
,
3838 prs_struct
*ps
, int depth
)
3840 prs_debug(ps
, depth
, desc
, "smb_io_lsa_data_buf_hdr");
3846 if(!prs_uint32("length", ps
, depth
, &buf_hdr
->length
))
3849 if(!prs_uint32("size", ps
, depth
, &buf_hdr
->size
))
3852 if (!prs_uint32("data_ptr", ps
, depth
, &buf_hdr
->data_ptr
))
3858 /*******************************************************************
3859 ********************************************************************/
3861 static BOOL
smb_io_lsa_data_buf(const char *desc
, LSA_DATA_BUF
*buf
,
3862 prs_struct
*ps
, int depth
, int length
, int size
)
3864 prs_debug(ps
, depth
, desc
, "smb_io_lsa_data_buf");
3867 if ( UNMARSHALLING(ps
) && length
) {
3868 if ( !(buf
->data
= PRS_ALLOC_MEM( ps
, uint8
, length
)) )
3872 if (!prs_uint32("size", ps
, depth
, &buf
->size
))
3875 if (!prs_uint32("offset", ps
, depth
, &buf
->offset
))
3878 if (!prs_uint32("length", ps
, depth
, &buf
->length
))
3881 if(!prs_uint8s(False
, "data", ps
, depth
, buf
->data
, length
))
3887 /*******************************************************************
3888 ********************************************************************/
3890 static BOOL
lsa_io_trustdom_query_1(const char *desc
, TRUSTED_DOMAIN_INFO_NAME
*name
,
3891 prs_struct
*ps
, int depth
)
3893 if (!smb_io_lsa_string("netbios_name", &name
->netbios_name
, ps
, depth
))
3899 /*******************************************************************
3900 ********************************************************************/
3902 static BOOL
lsa_io_trustdom_query_3(const char *desc
, TRUSTED_DOMAIN_INFO_POSIX_OFFSET
*posix
,
3903 prs_struct
*ps
, int depth
)
3905 if(!prs_uint32("posix_offset", ps
, depth
, &posix
->posix_offset
))
3911 /*******************************************************************
3912 ********************************************************************/
3914 static BOOL
lsa_io_trustdom_query_4(const char *desc
, TRUSTED_DOMAIN_INFO_PASSWORD
*password
,
3915 prs_struct
*ps
, int depth
)
3920 if(!prs_uint32("ptr_password", ps
, depth
, &password
->ptr_password
))
3923 if(!prs_uint32("ptr_old_password", ps
, depth
, &password
->ptr_old_password
))
3926 if (&password
->ptr_password
) {
3928 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password
->password_hdr
, ps
, depth
))
3931 if (!smb_io_lsa_data_buf("password", &password
->password
, ps
, depth
,
3932 password
->password_hdr
.length
, password
->password_hdr
.size
))
3936 if (&password
->ptr_old_password
) {
3938 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password
->old_password_hdr
, ps
, depth
))
3941 if (!smb_io_lsa_data_buf("old_password", &password
->old_password
, ps
, depth
,
3942 password
->old_password_hdr
.length
, password
->old_password_hdr
.size
))
3949 /*******************************************************************
3950 ********************************************************************/
3952 static BOOL
lsa_io_trustdom_query_6(const char *desc
, TRUSTED_DOMAIN_INFO_EX
*info_ex
,
3953 prs_struct
*ps
, int depth
)
3957 if (!smb_io_unihdr("domain_name_hdr", &info_ex
->domain_name
.hdr
, ps
, depth
))
3960 if (!smb_io_unihdr("netbios_name_hdr", &info_ex
->netbios_name
.hdr
, ps
, depth
))
3963 if (!prs_uint32("dom_sid_ptr", ps
, depth
, &dom_sid_ptr
))
3966 if (!prs_uint32("trust_direction", ps
, depth
, &info_ex
->trust_direction
))
3969 if (!prs_uint32("trust_type", ps
, depth
, &info_ex
->trust_type
))
3972 if (!prs_uint32("trust_attributes", ps
, depth
, &info_ex
->trust_attributes
))
3975 if (!smb_io_unistr2("domain_name_unistring", &info_ex
->domain_name
.unistring
, info_ex
->domain_name
.hdr
.buffer
, ps
, depth
))
3978 if (!smb_io_unistr2("netbios_name_unistring", &info_ex
->netbios_name
.unistring
, info_ex
->netbios_name
.hdr
.buffer
, ps
, depth
))
3981 if (!smb_io_dom_sid2("sid", &info_ex
->sid
, ps
, depth
))
3987 /*******************************************************************
3988 ********************************************************************/
3990 static BOOL
lsa_io_trustdom_query(const char *desc
, prs_struct
*ps
, int depth
, LSA_TRUSTED_DOMAIN_INFO
*info
)
3992 prs_debug(ps
, depth
, desc
, "lsa_io_trustdom_query");
3995 if(!prs_uint16("info_class", ps
, depth
, &info
->info_class
))
4001 switch (info
->info_class
) {
4003 if(!lsa_io_trustdom_query_1("name", &info
->name
, ps
, depth
))
4007 if(!lsa_io_trustdom_query_3("posix_offset", &info
->posix_offset
, ps
, depth
))
4011 if(!lsa_io_trustdom_query_4("password", &info
->password
, ps
, depth
))
4015 if(!lsa_io_trustdom_query_6("info_ex", &info
->info_ex
, ps
, depth
))
4019 DEBUG(0,("unsupported info-level: %d\n", info
->info_class
));
4026 /*******************************************************************
4027 Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
4028 ********************************************************************/
4030 BOOL
lsa_io_r_query_trusted_domain_info(const char *desc
,
4031 LSA_R_QUERY_TRUSTED_DOMAIN_INFO
*r_q
,
4032 prs_struct
*ps
, int depth
)
4037 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_trusted_domain_info");
4040 if (!prs_pointer("trustdom", ps
, depth
, (void*)&r_q
->info
,
4041 sizeof(LSA_TRUSTED_DOMAIN_INFO
),
4042 (PRS_POINTER_CAST
)lsa_io_trustdom_query
) )
4048 if(!prs_ntstatus("status", ps
, depth
, &r_q
->status
))
4054 /*******************************************************************
4055 Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4056 ********************************************************************/
4058 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY
*in
, POLICY_HND
*hnd
, uint16 info_class
)
4060 DEBUG(5, ("init_q_query_dom_info\n"));
4062 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
4064 in
->info_class
= info_class
;
4067 /*******************************************************************
4068 Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4069 ********************************************************************/
4071 BOOL
lsa_io_q_query_dom_info(const char *desc
, LSA_Q_QUERY_DOM_INFO_POLICY
*in
, prs_struct
*ps
, int depth
)
4073 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_dom_info");
4079 if(!smb_io_pol_hnd("pol", &in
->pol
, ps
, depth
))
4082 if(!prs_uint16("info_class", ps
, depth
, &in
->info_class
))
4088 /*******************************************************************
4089 Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
4090 ********************************************************************/
4092 static BOOL
lsa_io_dominfo_query_3(const char *desc
, LSA_DOM_INFO_POLICY_KERBEROS
*krb_policy
,
4093 prs_struct
*ps
, int depth
)
4095 if (!prs_align_uint64(ps
))
4101 if (!prs_uint32("enforce_restrictions", ps
, depth
, &krb_policy
->enforce_restrictions
))
4104 if (!prs_align_uint64(ps
))
4107 if (!smb_io_nttime("service_tkt_lifetime", ps
, depth
, &krb_policy
->service_tkt_lifetime
))
4110 if (!prs_align_uint64(ps
))
4113 if (!smb_io_nttime("user_tkt_lifetime", ps
, depth
, &krb_policy
->user_tkt_lifetime
))
4116 if (!prs_align_uint64(ps
))
4119 if (!smb_io_nttime("user_tkt_renewaltime", ps
, depth
, &krb_policy
->user_tkt_renewaltime
))
4122 if (!prs_align_uint64(ps
))
4125 if (!smb_io_nttime("clock_skew", ps
, depth
, &krb_policy
->clock_skew
))
4128 if (!prs_align_uint64(ps
))
4131 if (!smb_io_nttime("unknown6", ps
, depth
, &krb_policy
->unknown6
))
4137 static BOOL
lsa_io_dom_info_query(const char *desc
, prs_struct
*ps
, int depth
, LSA_DOM_INFO_UNION
*info
)
4139 prs_debug(ps
, depth
, desc
, "lsa_io_dom_info_query");
4142 if(!prs_align_uint16(ps
))
4145 if(!prs_uint16("info_class", ps
, depth
, &info
->info_class
))
4148 switch (info
->info_class
) {
4150 if (!lsa_io_dominfo_query_3("krb_policy", &info
->krb_policy
, ps
, depth
))
4154 DEBUG(0,("unsupported info-level: %d\n", info
->info_class
));
4163 BOOL
lsa_io_r_query_dom_info(const char *desc
, LSA_R_QUERY_DOM_INFO_POLICY
*out
,
4164 prs_struct
*ps
, int depth
)
4166 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_dom_info");
4169 if (!prs_pointer("dominfo", ps
, depth
, (void*)&out
->info
,
4170 sizeof(LSA_DOM_INFO_UNION
),
4171 (PRS_POINTER_CAST
)lsa_io_dom_info_query
) )
4174 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))