2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997,
7 * Copyright (C) Andrew Bartlett 2002,
8 * Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2002.
9 * Copyright (C) Gerald )Jerry) Carter 2005
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
29 #define DBGC_CLASS DBGC_RPC_PARSE
31 static BOOL
lsa_io_trans_names(const char *desc
, LSA_TRANS_NAME_ENUM
*trn
, prs_struct
*ps
, int depth
);
32 static BOOL
lsa_io_trans_names2(const char *desc
, LSA_TRANS_NAME_ENUM2
*trn
, prs_struct
*ps
, int depth
);
34 /*******************************************************************
35 Inits a LSA_TRANS_NAME structure.
36 ********************************************************************/
38 void init_lsa_trans_name(LSA_TRANS_NAME
*trn
, UNISTR2
*uni_name
,
39 uint16 sid_name_use
, const char *name
, uint32 idx
)
41 trn
->sid_name_use
= sid_name_use
;
42 init_unistr2(uni_name
, name
, UNI_FLAGS_NONE
);
43 init_uni_hdr(&trn
->hdr_name
, uni_name
);
44 trn
->domain_idx
= idx
;
47 /*******************************************************************
48 Reads or writes a LSA_TRANS_NAME structure.
49 ********************************************************************/
51 static BOOL
lsa_io_trans_name(const char *desc
, LSA_TRANS_NAME
*trn
, prs_struct
*ps
,
54 prs_debug(ps
, depth
, desc
, "lsa_io_trans_name");
60 if(!prs_uint16("sid_name_use", ps
, depth
, &trn
->sid_name_use
))
65 if(!smb_io_unihdr ("hdr_name", &trn
->hdr_name
, ps
, depth
))
67 if(!prs_uint32("domain_idx ", ps
, depth
, &trn
->domain_idx
))
73 /*******************************************************************
74 Inits a LSA_TRANS_NAME2 structure.
75 ********************************************************************/
77 void init_lsa_trans_name2(LSA_TRANS_NAME2
*trn
, UNISTR2
*uni_name
,
78 uint16 sid_name_use
, const char *name
, uint32 idx
)
80 trn
->sid_name_use
= sid_name_use
;
81 init_unistr2(uni_name
, name
, UNI_FLAGS_NONE
);
82 init_uni_hdr(&trn
->hdr_name
, uni_name
);
83 trn
->domain_idx
= idx
;
87 /*******************************************************************
88 Reads or writes a LSA_TRANS_NAME2 structure.
89 ********************************************************************/
91 static BOOL
lsa_io_trans_name2(const char *desc
, LSA_TRANS_NAME2
*trn
, prs_struct
*ps
,
94 prs_debug(ps
, depth
, desc
, "lsa_io_trans_name2");
100 if(!prs_uint16("sid_name_use", ps
, depth
, &trn
->sid_name_use
))
105 if(!smb_io_unihdr ("hdr_name", &trn
->hdr_name
, ps
, depth
))
107 if(!prs_uint32("domain_idx ", ps
, depth
, &trn
->domain_idx
))
109 if(!prs_uint32("unknown ", ps
, depth
, &trn
->unknown
))
115 /*******************************************************************
116 Reads or writes a DOM_R_REF structure.
117 ********************************************************************/
119 static BOOL
lsa_io_dom_r_ref(const char *desc
, DOM_R_REF
*dom
, prs_struct
*ps
, int depth
)
123 prs_debug(ps
, depth
, desc
, "lsa_io_dom_r_ref");
129 if(!prs_uint32("num_ref_doms_1", ps
, depth
, &dom
->num_ref_doms_1
)) /* num referenced domains? */
131 if(!prs_uint32("ptr_ref_dom ", ps
, depth
, &dom
->ptr_ref_dom
)) /* undocumented buffer pointer. */
133 if(!prs_uint32("max_entries ", ps
, depth
, &dom
->max_entries
)) /* 32 - max number of entries */
136 SMB_ASSERT_ARRAY(dom
->hdr_ref_dom
, dom
->num_ref_doms_1
);
138 if (dom
->ptr_ref_dom
!= 0) {
140 if(!prs_uint32("num_ref_doms_2", ps
, depth
, &dom
->num_ref_doms_2
)) /* 4 - num referenced domains? */
143 SMB_ASSERT_ARRAY(dom
->ref_dom
, dom
->num_ref_doms_2
);
145 for (i
= 0; i
< dom
->num_ref_doms_1
; i
++) {
148 slprintf(t
, sizeof(t
) - 1, "dom_ref[%d] ", i
);
149 if(!smb_io_unihdr(t
, &dom
->hdr_ref_dom
[i
].hdr_dom_name
, ps
, depth
))
152 slprintf(t
, sizeof(t
) - 1, "sid_ptr[%d] ", i
);
153 if(!prs_uint32(t
, ps
, depth
, &dom
->hdr_ref_dom
[i
].ptr_dom_sid
))
157 for (i
= 0; i
< dom
->num_ref_doms_2
; i
++) {
160 if (dom
->hdr_ref_dom
[i
].hdr_dom_name
.buffer
!= 0) {
161 slprintf(t
, sizeof(t
) - 1, "dom_ref[%d] ", i
);
162 if(!smb_io_unistr2(t
, &dom
->ref_dom
[i
].uni_dom_name
, True
, ps
, depth
)) /* domain name unicode string */
168 if (dom
->hdr_ref_dom
[i
].ptr_dom_sid
!= 0) {
169 slprintf(t
, sizeof(t
) - 1, "sid_ptr[%d] ", i
);
170 if(!smb_io_dom_sid2(t
, &dom
->ref_dom
[i
].ref_dom
, ps
, depth
)) /* referenced domain SIDs */
179 /*******************************************************************
180 Inits an LSA_SEC_QOS structure.
181 ********************************************************************/
183 void init_lsa_sec_qos(LSA_SEC_QOS
*qos
, uint16 imp_lev
, uint8 ctxt
, uint8 eff
)
185 DEBUG(5, ("init_lsa_sec_qos\n"));
187 qos
->len
= 0x0c; /* length of quality of service block, in bytes */
188 qos
->sec_imp_level
= imp_lev
;
189 qos
->sec_ctxt_mode
= ctxt
;
190 qos
->effective_only
= eff
;
193 /*******************************************************************
194 Reads or writes an LSA_SEC_QOS structure.
195 ********************************************************************/
197 static BOOL
lsa_io_sec_qos(const char *desc
, LSA_SEC_QOS
*qos
, prs_struct
*ps
,
202 prs_debug(ps
, depth
, desc
, "lsa_io_obj_qos");
208 start
= prs_offset(ps
);
210 /* these pointers had _better_ be zero, because we don't know
213 if(!prs_uint32("len ", ps
, depth
, &qos
->len
)) /* 0x18 - length (in bytes) inc. the length field. */
215 if(!prs_uint16("sec_imp_level ", ps
, depth
, &qos
->sec_imp_level
))
217 if(!prs_uint8 ("sec_ctxt_mode ", ps
, depth
, &qos
->sec_ctxt_mode
))
219 if(!prs_uint8 ("effective_only", ps
, depth
, &qos
->effective_only
))
222 if (qos
->len
!= prs_offset(ps
) - start
) {
223 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
224 qos
->len
, prs_offset(ps
) - start
));
230 /*******************************************************************
231 Inits an LSA_OBJ_ATTR structure.
232 ********************************************************************/
234 static void init_lsa_obj_attr(LSA_OBJ_ATTR
*attr
, uint32 attributes
, LSA_SEC_QOS
*qos
)
236 DEBUG(5, ("init_lsa_obj_attr\n"));
238 attr
->len
= 0x18; /* length of object attribute block, in bytes */
239 attr
->ptr_root_dir
= 0;
240 attr
->ptr_obj_name
= 0;
241 attr
->attributes
= attributes
;
242 attr
->ptr_sec_desc
= 0;
245 attr
->ptr_sec_qos
= 1;
248 attr
->ptr_sec_qos
= 0;
249 attr
->sec_qos
= NULL
;
253 /*******************************************************************
254 Reads or writes an LSA_OBJ_ATTR structure.
255 ********************************************************************/
257 static BOOL
lsa_io_obj_attr(const char *desc
, LSA_OBJ_ATTR
*attr
, prs_struct
*ps
,
260 prs_debug(ps
, depth
, desc
, "lsa_io_obj_attr");
266 /* these pointers had _better_ be zero, because we don't know
269 if(!prs_uint32("len ", ps
, depth
, &attr
->len
)) /* 0x18 - length (in bytes) inc. the length field. */
271 if(!prs_uint32("ptr_root_dir", ps
, depth
, &attr
->ptr_root_dir
)) /* 0 - root directory (pointer) */
273 if(!prs_uint32("ptr_obj_name", ps
, depth
, &attr
->ptr_obj_name
)) /* 0 - object name (pointer) */
275 if(!prs_uint32("attributes ", ps
, depth
, &attr
->attributes
)) /* 0 - attributes (undocumented) */
277 if(!prs_uint32("ptr_sec_desc", ps
, depth
, &attr
->ptr_sec_desc
)) /* 0 - security descriptior (pointer) */
279 if(!prs_uint32("ptr_sec_qos ", ps
, depth
, &attr
->ptr_sec_qos
)) /* security quality of service (pointer) */
282 if (attr
->ptr_sec_qos
!= 0) {
283 if (UNMARSHALLING(ps
))
284 if (!(attr
->sec_qos
= PRS_ALLOC_MEM(ps
,LSA_SEC_QOS
,1)))
287 if(!lsa_io_sec_qos("sec_qos", attr
->sec_qos
, ps
, depth
))
295 /*******************************************************************
296 Inits an LSA_Q_OPEN_POL structure.
297 ********************************************************************/
299 void init_q_open_pol(LSA_Q_OPEN_POL
*in
, uint16 system_name
,
300 uint32 attributes
, uint32 desired_access
,
303 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes
,
306 in
->ptr
= 1; /* undocumented pointer */
308 in
->des_access
= desired_access
;
310 in
->system_name
= system_name
;
311 init_lsa_obj_attr(&in
->attr
, attributes
, qos
);
314 /*******************************************************************
315 Reads or writes an LSA_Q_OPEN_POL structure.
316 ********************************************************************/
318 BOOL
lsa_io_q_open_pol(const char *desc
, LSA_Q_OPEN_POL
*in
, prs_struct
*ps
,
321 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_pol");
324 if(!prs_uint32("ptr ", ps
, depth
, &in
->ptr
))
326 if(!prs_uint16("system_name", ps
, depth
, &in
->system_name
))
331 if(!lsa_io_obj_attr("", &in
->attr
, ps
, depth
))
334 if(!prs_uint32("des_access", ps
, depth
, &in
->des_access
))
340 /*******************************************************************
341 Reads or writes an LSA_R_OPEN_POL structure.
342 ********************************************************************/
344 BOOL
lsa_io_r_open_pol(const char *desc
, LSA_R_OPEN_POL
*out
, prs_struct
*ps
,
347 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_pol");
350 if(!smb_io_pol_hnd("", &out
->pol
, ps
, depth
))
353 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
359 /*******************************************************************
360 Inits an LSA_Q_OPEN_POL2 structure.
361 ********************************************************************/
363 void init_q_open_pol2(LSA_Q_OPEN_POL2
*in
, const char *server_name
,
364 uint32 attributes
, uint32 desired_access
,
367 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes
,
370 in
->ptr
= 1; /* undocumented pointer */
372 in
->des_access
= desired_access
;
374 init_unistr2(&in
->uni_server_name
, server_name
, UNI_STR_TERMINATE
);
376 init_lsa_obj_attr(&in
->attr
, attributes
, qos
);
379 /*******************************************************************
380 Reads or writes an LSA_Q_OPEN_POL2 structure.
381 ********************************************************************/
383 BOOL
lsa_io_q_open_pol2(const char *desc
, LSA_Q_OPEN_POL2
*in
, prs_struct
*ps
,
386 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_pol2");
389 if(!prs_uint32("ptr ", ps
, depth
, &in
->ptr
))
392 if(!smb_io_unistr2 ("", &in
->uni_server_name
, in
->ptr
, ps
, depth
))
394 if(!lsa_io_obj_attr("", &in
->attr
, ps
, depth
))
397 if(!prs_uint32("des_access", ps
, depth
, &in
->des_access
))
403 /*******************************************************************
404 Reads or writes an LSA_R_OPEN_POL2 structure.
405 ********************************************************************/
407 BOOL
lsa_io_r_open_pol2(const char *desc
, LSA_R_OPEN_POL2
*out
, prs_struct
*ps
,
410 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_pol2");
413 if(!smb_io_pol_hnd("", &out
->pol
, ps
, depth
))
416 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
422 /*******************************************************************
423 makes an LSA_Q_QUERY_SEC_OBJ structure.
424 ********************************************************************/
426 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ
*in
, const POLICY_HND
*hnd
,
429 DEBUG(5, ("init_q_query_sec_obj\n"));
432 in
->sec_info
= sec_info
;
437 /*******************************************************************
438 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
439 ********************************************************************/
441 BOOL
lsa_io_q_query_sec_obj(const char *desc
, LSA_Q_QUERY_SEC_OBJ
*in
,
442 prs_struct
*ps
, int depth
)
444 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_sec_obj");
447 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
450 if (!prs_uint32("sec_info", ps
, depth
, &in
->sec_info
))
456 /*******************************************************************
457 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
458 ********************************************************************/
460 BOOL
lsa_io_r_query_sec_obj(const char *desc
, LSA_R_QUERY_SEC_OBJ
*out
, prs_struct
*ps
, int depth
)
462 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_sec_obj");
468 if (!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
472 if (!sec_io_desc_buf("sec", &out
->buf
, ps
, depth
))
476 if (!prs_ntstatus("status", ps
, depth
, &out
->status
))
482 /*******************************************************************
483 Inits an LSA_Q_QUERY_INFO structure.
484 ********************************************************************/
486 void init_q_query(LSA_Q_QUERY_INFO
*in
, POLICY_HND
*hnd
, uint16 info_class
)
488 DEBUG(5, ("init_q_query\n"));
490 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
492 in
->info_class
= info_class
;
495 /*******************************************************************
496 Reads or writes an LSA_Q_QUERY_INFO structure.
497 ********************************************************************/
499 BOOL
lsa_io_q_query(const char *desc
, LSA_Q_QUERY_INFO
*in
, prs_struct
*ps
,
502 prs_debug(ps
, depth
, desc
, "lsa_io_q_query");
505 if(!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
508 if(!prs_uint16("info_class", ps
, depth
, &in
->info_class
))
514 /*******************************************************************
515 makes an LSA_Q_ENUM_TRUST_DOM structure.
516 ********************************************************************/
517 BOOL
init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM
* q_e
, POLICY_HND
*pol
,
518 uint32 enum_context
, uint32 preferred_len
)
520 DEBUG(5, ("init_q_enum_trust_dom\n"));
523 q_e
->enum_context
= enum_context
;
524 q_e
->preferred_len
= preferred_len
;
529 /*******************************************************************
530 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
531 ********************************************************************/
533 BOOL
lsa_io_q_enum_trust_dom(const char *desc
, LSA_Q_ENUM_TRUST_DOM
*q_e
,
534 prs_struct
*ps
, int depth
)
536 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_trust_dom");
539 if(!smb_io_pol_hnd("", &q_e
->pol
, ps
, depth
))
542 if(!prs_uint32("enum_context ", ps
, depth
, &q_e
->enum_context
))
544 if(!prs_uint32("preferred_len", ps
, depth
, &q_e
->preferred_len
))
550 /*******************************************************************
551 Inits an LSA_R_ENUM_TRUST_DOM structure.
552 ********************************************************************/
554 void init_r_enum_trust_dom(TALLOC_CTX
*ctx
, LSA_R_ENUM_TRUST_DOM
*out
,
555 uint32 enum_context
, uint32 num_domains
,
556 struct trustdom_info
**td
)
560 DEBUG(5, ("init_r_enum_trust_dom\n"));
562 out
->enum_context
= enum_context
;
563 out
->count
= num_domains
;
565 if ( num_domains
!= 0 ) {
567 /* allocate container memory */
569 out
->domlist
= TALLOC_P( ctx
, DOMAIN_LIST
);
571 if ( !out
->domlist
) {
572 out
->status
= NT_STATUS_NO_MEMORY
;
576 out
->domlist
->domains
= TALLOC_ARRAY( ctx
, DOMAIN_INFO
,
579 if ( !out
->domlist
->domains
) {
580 out
->status
= NT_STATUS_NO_MEMORY
;
584 out
->domlist
->count
= out
->count
;
586 /* initialize the list of domains and their sid */
588 for (i
= 0; i
< num_domains
; i
++) {
590 if ( !(out
->domlist
->domains
[i
].sid
=
591 TALLOC_P(ctx
, DOM_SID2
)) ) {
592 out
->status
= NT_STATUS_NO_MEMORY
;
596 init_dom_sid2(out
->domlist
->domains
[i
].sid
,
598 if (push_ucs2_talloc(ctx
, &name
, (td
[i
])->name
) < 0){
599 out
->status
= NT_STATUS_NO_MEMORY
;
602 init_unistr4_w(ctx
, &out
->domlist
->domains
[i
].name
,
609 /*******************************************************************
610 ********************************************************************/
612 BOOL
lsa_io_domain_list( const char *desc
, prs_struct
*ps
, int depth
, DOMAIN_LIST
*domlist
)
616 prs_debug(ps
, depth
, desc
, "lsa_io_domain_list");
619 if(!prs_uint32("count", ps
, depth
, &domlist
->count
))
622 if ( domlist
->count
== 0 )
625 if ( UNMARSHALLING(ps
) ) {
626 if ( !(domlist
->domains
= PRS_ALLOC_MEM( ps
, DOMAIN_INFO
, domlist
->count
)) )
632 for ( i
=0; i
<domlist
->count
; i
++ ) {
633 if ( !prs_unistr4_hdr("name_header", ps
, depth
, &domlist
->domains
[i
].name
) )
635 if ( !smb_io_dom_sid2_p("sid_header", ps
, depth
, &domlist
->domains
[i
].sid
) )
641 for ( i
=0; i
<domlist
->count
; i
++ ) {
642 if ( !prs_unistr4_str("name", ps
, depth
, &domlist
->domains
[i
].name
) )
644 if( !smb_io_dom_sid2("sid", domlist
->domains
[i
].sid
, ps
, depth
) )
651 /*******************************************************************
652 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
653 ********************************************************************/
655 BOOL
lsa_io_r_enum_trust_dom(const char *desc
, LSA_R_ENUM_TRUST_DOM
*out
,
656 prs_struct
*ps
, int depth
)
658 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_trust_dom");
661 if(!prs_uint32("enum_context", ps
, depth
, &out
->enum_context
))
664 if(!prs_uint32("count", ps
, depth
, &out
->count
))
667 if ( !prs_pointer("trusted_domains", ps
, depth
, (void**)&out
->domlist
, sizeof(DOMAIN_LIST
), (PRS_POINTER_CAST
)lsa_io_domain_list
))
670 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
676 /*******************************************************************
677 reads or writes a dom query structure.
678 ********************************************************************/
680 static BOOL
lsa_io_dom_query(const char *desc
, DOM_QUERY
*d_q
, prs_struct
*ps
, int depth
)
685 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query");
691 if(!prs_uint16("uni_dom_max_len", ps
, depth
, &d_q
->uni_dom_max_len
)) /* domain name string length * 2 */
693 if(!prs_uint16("uni_dom_str_len", ps
, depth
, &d_q
->uni_dom_str_len
)) /* domain name string length * 2 */
696 if(!prs_uint32("buffer_dom_name", ps
, depth
, &d_q
->buffer_dom_name
)) /* undocumented domain name string buffer pointer */
698 if(!prs_uint32("buffer_dom_sid ", ps
, depth
, &d_q
->buffer_dom_sid
)) /* undocumented domain SID string buffer pointer */
701 if(!smb_io_unistr2("unistr2", &d_q
->uni_domain_name
, d_q
->buffer_dom_name
, ps
, depth
)) /* domain name (unicode string) */
707 if (d_q
->buffer_dom_sid
!= 0) {
708 if(!smb_io_dom_sid2("", &d_q
->dom_sid
, ps
, depth
)) /* domain SID */
711 memset((char *)&d_q
->dom_sid
, '\0', sizeof(d_q
->dom_sid
));
717 /*******************************************************************
718 reads or writes a structure.
719 ********************************************************************/
721 static BOOL
lsa_io_dom_query_2(const char *desc
, DOM_QUERY_2
*d_q
, prs_struct
*ps
, int depth
)
728 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_2");
734 if (!prs_uint32("auditing_enabled", ps
, depth
, &d_q
->auditing_enabled
))
736 if (!prs_uint32("ptr ", ps
, depth
, &ptr
))
738 if (!prs_uint32("count1", ps
, depth
, &d_q
->count1
))
740 if (!prs_uint32("count2", ps
, depth
, &d_q
->count2
))
743 if (UNMARSHALLING(ps
)) {
744 d_q
->auditsettings
= TALLOC_ZERO_ARRAY(ps
->mem_ctx
, uint32
, d_q
->count2
);
747 if (d_q
->auditsettings
== NULL
) {
748 DEBUG(1, ("lsa_io_dom_query_2: NULL auditsettings!\n"));
752 if (!prs_uint32s(False
, "auditsettings", ps
, depth
, d_q
->auditsettings
, d_q
->count2
))
758 /*******************************************************************
759 Reads or writes a dom query structure.
760 ********************************************************************/
762 static BOOL
lsa_io_dom_query_3(const char *desc
, DOM_QUERY_3
*d_q
, prs_struct
*ps
, int depth
)
764 return lsa_io_dom_query("", d_q
, ps
, depth
);
767 /*******************************************************************
768 Reads or writes a dom query structure.
769 ********************************************************************/
771 static BOOL
lsa_io_dom_query_5(const char *desc
, DOM_QUERY_5
*d_q
, prs_struct
*ps
, int depth
)
773 return lsa_io_dom_query("", d_q
, ps
, depth
);
776 /*******************************************************************
777 Reads or writes a dom query structure.
778 ********************************************************************/
780 static BOOL
lsa_io_dom_query_6(const char *desc
, DOM_QUERY_6
*d_q
, prs_struct
*ps
, int depth
)
785 prs_debug(ps
, depth
, desc
, "lsa_io_dom_query_6");
788 if (!prs_uint16("server_role", ps
, depth
, &d_q
->server_role
))
794 /*******************************************************************
795 Reads or writes an LSA_R_QUERY_INFO structure.
796 ********************************************************************/
798 BOOL
lsa_io_r_query(const char *desc
, LSA_R_QUERY_INFO
*out
, prs_struct
*ps
, int depth
)
800 prs_debug(ps
, depth
, desc
, "lsa_io_r_query");
803 if(!prs_uint32("undoc_buffer", ps
, depth
, &out
->undoc_buffer
))
806 if (out
->undoc_buffer
!= 0) {
807 if(!prs_uint16("info_class", ps
, depth
, &out
->info_class
))
813 switch (out
->info_class
) {
815 if(!lsa_io_dom_query_2("", &out
->dom
.id2
, ps
, depth
))
819 if(!lsa_io_dom_query_3("", &out
->dom
.id3
, ps
, depth
))
823 if(!lsa_io_dom_query_5("", &out
->dom
.id5
, ps
, depth
))
827 if(!lsa_io_dom_query_6("", &out
->dom
.id6
, ps
, depth
))
839 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
845 /*******************************************************************
846 Inits a LSA_SID_ENUM structure.
847 ********************************************************************/
849 static void init_lsa_sid_enum(TALLOC_CTX
*mem_ctx
, LSA_SID_ENUM
*sen
,
850 int num_entries
, const DOM_SID
*sids
)
854 DEBUG(5, ("init_lsa_sid_enum\n"));
856 sen
->num_entries
= num_entries
;
857 sen
->ptr_sid_enum
= (num_entries
!= 0);
858 sen
->num_entries2
= num_entries
;
860 /* Allocate memory for sids and sid pointers */
862 if (num_entries
== 0) return;
864 if ((sen
->ptr_sid
= TALLOC_ZERO_ARRAY(mem_ctx
, uint32
, num_entries
)) == NULL
) {
865 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
869 if ((sen
->sid
= TALLOC_ZERO_ARRAY(mem_ctx
, DOM_SID2
, num_entries
)) == NULL
) {
870 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
874 /* Copy across SIDs and SID pointers */
876 for (i
= 0; i
< num_entries
; i
++) {
878 init_dom_sid2(&sen
->sid
[i
], &sids
[i
]);
882 /*******************************************************************
883 Reads or writes a LSA_SID_ENUM structure.
884 ********************************************************************/
886 static BOOL
lsa_io_sid_enum(const char *desc
, LSA_SID_ENUM
*sen
, prs_struct
*ps
,
891 prs_debug(ps
, depth
, desc
, "lsa_io_sid_enum");
897 if(!prs_uint32("num_entries ", ps
, depth
, &sen
->num_entries
))
899 if(!prs_uint32("ptr_sid_enum", ps
, depth
, &sen
->ptr_sid_enum
))
903 if the ptr is NULL, leave here. checked from a real w2k trace.
907 if (sen
->ptr_sid_enum
==0)
910 if(!prs_uint32("num_entries2", ps
, depth
, &sen
->num_entries2
))
913 /* Mallocate memory if we're unpacking from the wire */
915 if (UNMARSHALLING(ps
)) {
916 if ((sen
->ptr_sid
= PRS_ALLOC_MEM( ps
, uint32
, sen
->num_entries
)) == NULL
) {
917 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
922 if ((sen
->sid
= PRS_ALLOC_MEM( ps
, DOM_SID2
, sen
->num_entries
)) == NULL
) {
923 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
929 for (i
= 0; i
< sen
->num_entries
; i
++) {
932 slprintf(temp
, sizeof(temp
) - 1, "ptr_sid[%d]", i
);
933 if(!prs_uint32(temp
, ps
, depth
, &sen
->ptr_sid
[i
])) {
938 for (i
= 0; i
< sen
->num_entries
; i
++) {
941 slprintf(temp
, sizeof(temp
) - 1, "sid[%d]", i
);
942 if(!smb_io_dom_sid2(temp
, &sen
->sid
[i
], ps
, depth
)) {
950 /*******************************************************************
951 Inits an LSA_R_ENUM_TRUST_DOM structure.
952 ********************************************************************/
954 void init_q_lookup_sids(TALLOC_CTX
*mem_ctx
, LSA_Q_LOOKUP_SIDS
*q_l
,
955 POLICY_HND
*hnd
, int num_sids
, const DOM_SID
*sids
,
958 DEBUG(5, ("init_q_lookup_sids\n"));
962 memcpy(&q_l
->pol
, hnd
, sizeof(q_l
->pol
));
963 init_lsa_sid_enum(mem_ctx
, &q_l
->sids
, num_sids
, sids
);
968 /*******************************************************************
969 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
970 ********************************************************************/
972 BOOL
lsa_io_q_lookup_sids(const char *desc
, LSA_Q_LOOKUP_SIDS
*q_s
, prs_struct
*ps
,
975 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_sids");
981 if(!smb_io_pol_hnd("pol_hnd", &q_s
->pol
, ps
, depth
)) /* policy handle */
983 if(!lsa_io_sid_enum("sids ", &q_s
->sids
, ps
, depth
)) /* sids to be looked up */
985 if(!lsa_io_trans_names("names ", &q_s
->names
, ps
, depth
)) /* translated names */
988 if(!prs_uint16("level", ps
, depth
, &q_s
->level
)) /* lookup level */
993 if(!prs_uint32("mapped_count", ps
, depth
, &q_s
->mapped_count
))
999 /*******************************************************************
1000 Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1001 ********************************************************************/
1003 BOOL
lsa_io_q_lookup_sids2(const char *desc
, LSA_Q_LOOKUP_SIDS2
*q_s
, prs_struct
*ps
,
1006 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_sids2");
1012 if(!smb_io_pol_hnd("pol_hnd", &q_s
->pol
, ps
, depth
)) /* policy handle */
1014 if(!lsa_io_sid_enum("sids ", &q_s
->sids
, ps
, depth
)) /* sids to be looked up */
1016 if(!lsa_io_trans_names2("names ", &q_s
->names
, ps
, depth
)) /* translated names */
1019 if(!prs_uint16("level", ps
, depth
, &q_s
->level
)) /* lookup level */
1024 if(!prs_uint32("mapped_count", ps
, depth
, &q_s
->mapped_count
))
1026 if(!prs_uint32("unknown1", ps
, depth
, &q_s
->unknown1
))
1028 if(!prs_uint32("unknown2", ps
, depth
, &q_s
->unknown2
))
1034 /*******************************************************************
1035 Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1036 ********************************************************************/
1038 BOOL
lsa_io_q_lookup_sids3(const char *desc
, LSA_Q_LOOKUP_SIDS3
*q_s
, prs_struct
*ps
,
1041 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_sids3");
1047 if(!lsa_io_sid_enum("sids ", &q_s
->sids
, ps
, depth
)) /* sids to be looked up */
1049 if(!lsa_io_trans_names2("names ", &q_s
->names
, ps
, depth
)) /* translated names */
1052 if(!prs_uint16("level", ps
, depth
, &q_s
->level
)) /* lookup level */
1057 if(!prs_uint32("mapped_count", ps
, depth
, &q_s
->mapped_count
))
1059 if(!prs_uint32("unknown1", ps
, depth
, &q_s
->unknown1
))
1061 if(!prs_uint32("unknown2", ps
, depth
, &q_s
->unknown2
))
1068 /*******************************************************************
1069 Reads or writes a structure.
1070 ********************************************************************/
1072 static BOOL
lsa_io_trans_names(const char *desc
, LSA_TRANS_NAME_ENUM
*trn
,
1073 prs_struct
*ps
, int depth
)
1077 prs_debug(ps
, depth
, desc
, "lsa_io_trans_names");
1083 if(!prs_uint32("num_entries ", ps
, depth
, &trn
->num_entries
))
1085 if(!prs_uint32("ptr_trans_names", ps
, depth
, &trn
->ptr_trans_names
))
1088 if (trn
->ptr_trans_names
!= 0) {
1089 if(!prs_uint32("num_entries2 ", ps
, depth
,
1090 &trn
->num_entries2
))
1093 if (UNMARSHALLING(ps
)) {
1094 if ((trn
->name
= PRS_ALLOC_MEM(ps
, LSA_TRANS_NAME
, trn
->num_entries
)) == NULL
) {
1098 if ((trn
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, trn
->num_entries
)) == NULL
) {
1103 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1105 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1107 if(!lsa_io_trans_name(t
, &trn
->name
[i
], ps
, depth
)) /* translated name */
1111 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1113 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1115 if(!smb_io_unistr2(t
, &trn
->uni_name
[i
], trn
->name
[i
].hdr_name
.buffer
, ps
, depth
))
1125 /*******************************************************************
1126 Reads or writes a structure.
1127 ********************************************************************/
1129 static BOOL
lsa_io_trans_names2(const char *desc
, LSA_TRANS_NAME_ENUM2
*trn
,
1130 prs_struct
*ps
, int depth
)
1134 prs_debug(ps
, depth
, desc
, "lsa_io_trans_names2");
1140 if(!prs_uint32("num_entries ", ps
, depth
, &trn
->num_entries
))
1142 if(!prs_uint32("ptr_trans_names", ps
, depth
, &trn
->ptr_trans_names
))
1145 if (trn
->ptr_trans_names
!= 0) {
1146 if(!prs_uint32("num_entries2 ", ps
, depth
,
1147 &trn
->num_entries2
))
1150 if (UNMARSHALLING(ps
)) {
1151 if ((trn
->name
= PRS_ALLOC_MEM(ps
, LSA_TRANS_NAME2
, trn
->num_entries
)) == NULL
) {
1155 if ((trn
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, trn
->num_entries
)) == NULL
) {
1160 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1162 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1164 if(!lsa_io_trans_name2(t
, &trn
->name
[i
], ps
, depth
)) /* translated name */
1168 for (i
= 0; i
< trn
->num_entries2
; i
++) {
1170 slprintf(t
, sizeof(t
) - 1, "name[%d] ", i
);
1172 if(!smb_io_unistr2(t
, &trn
->uni_name
[i
], trn
->name
[i
].hdr_name
.buffer
, ps
, depth
))
1183 /*******************************************************************
1184 Reads or writes a structure.
1185 ********************************************************************/
1187 BOOL
lsa_io_r_lookup_sids(const char *desc
, LSA_R_LOOKUP_SIDS
*r_s
,
1188 prs_struct
*ps
, int depth
)
1190 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_sids");
1196 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &r_s
->ptr_dom_ref
))
1199 if (r_s
->ptr_dom_ref
!= 0)
1200 if(!lsa_io_dom_r_ref ("dom_ref", r_s
->dom_ref
, ps
, depth
)) /* domain reference info */
1203 if(!lsa_io_trans_names("names ", r_s
->names
, ps
, depth
)) /* translated names */
1209 if(!prs_uint32("mapped_count", ps
, depth
, &r_s
->mapped_count
))
1212 if(!prs_ntstatus("status ", ps
, depth
, &r_s
->status
))
1218 /*******************************************************************
1219 Reads or writes a structure.
1220 ********************************************************************/
1222 BOOL
lsa_io_r_lookup_sids2(const char *desc
, LSA_R_LOOKUP_SIDS2
*r_s
,
1223 prs_struct
*ps
, int depth
)
1225 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_sids2");
1231 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &r_s
->ptr_dom_ref
))
1234 if (r_s
->ptr_dom_ref
!= 0)
1235 if(!lsa_io_dom_r_ref ("dom_ref", r_s
->dom_ref
, ps
, depth
)) /* domain reference info */
1238 if(!lsa_io_trans_names2("names ", r_s
->names
, ps
, depth
)) /* translated names */
1244 if(!prs_uint32("mapped_count", ps
, depth
, &r_s
->mapped_count
))
1247 if(!prs_ntstatus("status ", ps
, depth
, &r_s
->status
))
1254 /*******************************************************************
1255 Reads or writes a structure.
1256 ********************************************************************/
1258 BOOL
lsa_io_r_lookup_sids3(const char *desc
, LSA_R_LOOKUP_SIDS3
*r_s
,
1259 prs_struct
*ps
, int depth
)
1261 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_sids3");
1267 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &r_s
->ptr_dom_ref
))
1270 if (r_s
->ptr_dom_ref
!= 0)
1271 if(!lsa_io_dom_r_ref ("dom_ref", r_s
->dom_ref
, ps
, depth
)) /* domain reference info */
1274 if(!lsa_io_trans_names2("names ", r_s
->names
, ps
, depth
)) /* translated names */
1280 if(!prs_uint32("mapped_count", ps
, depth
, &r_s
->mapped_count
))
1283 if(!prs_ntstatus("status ", ps
, depth
, &r_s
->status
))
1289 /*******************************************************************
1291 ********************************************************************/
1293 void init_q_lookup_names(TALLOC_CTX
*mem_ctx
, LSA_Q_LOOKUP_NAMES
*q_l
,
1294 POLICY_HND
*hnd
, int num_names
, const char **names
)
1298 DEBUG(5, ("init_q_lookup_names\n"));
1303 q_l
->num_entries
= num_names
;
1304 q_l
->num_entries2
= num_names
;
1305 q_l
->lookup_level
= 1;
1307 if ((q_l
->uni_name
= TALLOC_ZERO_ARRAY(mem_ctx
, UNISTR2
, num_names
)) == NULL
) {
1308 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1312 if ((q_l
->hdr_name
= TALLOC_ZERO_ARRAY(mem_ctx
, UNIHDR
, num_names
)) == NULL
) {
1313 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1317 for (i
= 0; i
< num_names
; i
++) {
1318 init_unistr2(&q_l
->uni_name
[i
], names
[i
], UNI_FLAGS_NONE
);
1319 init_uni_hdr(&q_l
->hdr_name
[i
], &q_l
->uni_name
[i
]);
1323 /*******************************************************************
1324 reads or writes a structure.
1325 ********************************************************************/
1327 BOOL
lsa_io_q_lookup_names(const char *desc
, LSA_Q_LOOKUP_NAMES
*q_r
,
1328 prs_struct
*ps
, int depth
)
1332 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names");
1338 if(!smb_io_pol_hnd("", &q_r
->pol
, ps
, depth
)) /* policy handle */
1343 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
1345 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
1348 if (UNMARSHALLING(ps
)) {
1349 if (q_r
->num_entries
) {
1350 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
1352 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
1357 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1360 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
1364 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1367 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
1373 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
1375 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
1377 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
1381 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
1387 /*******************************************************************
1388 reads or writes a structure.
1389 ********************************************************************/
1391 BOOL
lsa_io_r_lookup_names(const char *desc
, LSA_R_LOOKUP_NAMES
*out
, prs_struct
*ps
, int depth
)
1395 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names");
1401 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
1404 if (out
->ptr_dom_ref
!= 0)
1405 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
1408 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
1410 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
1413 if (out
->ptr_entries
!= 0) {
1414 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
1417 if (out
->num_entries2
!= out
->num_entries
) {
1422 if (UNMARSHALLING(ps
)) {
1423 if ((out
->dom_rid
= PRS_ALLOC_MEM(ps
, DOM_RID
, out
->num_entries2
))
1425 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1430 for (i
= 0; i
< out
->num_entries2
; i
++)
1431 if(!smb_io_dom_rid("", &out
->dom_rid
[i
], ps
, depth
)) /* domain RIDs being looked up */
1435 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
1438 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
1444 /*******************************************************************
1445 reads or writes a structure.
1446 ********************************************************************/
1448 BOOL
lsa_io_q_lookup_names2(const char *desc
, LSA_Q_LOOKUP_NAMES2
*q_r
,
1449 prs_struct
*ps
, int depth
)
1453 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names2");
1459 if(!smb_io_pol_hnd("", &q_r
->pol
, ps
, depth
)) /* policy handle */
1464 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
1466 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
1469 if (UNMARSHALLING(ps
)) {
1470 if (q_r
->num_entries
) {
1471 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
1473 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
1478 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1481 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
1485 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1488 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
1494 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
1496 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
1498 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
1502 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
1504 if(!prs_uint32("unknown1 ", ps
, depth
, &q_r
->unknown1
))
1506 if(!prs_uint32("unknown2 ", ps
, depth
, &q_r
->unknown2
))
1512 /*******************************************************************
1513 reads or writes a structure.
1514 ********************************************************************/
1516 BOOL
lsa_io_r_lookup_names2(const char *desc
, LSA_R_LOOKUP_NAMES2
*out
, prs_struct
*ps
, int depth
)
1520 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names2");
1526 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
1529 if (out
->ptr_dom_ref
!= 0)
1530 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
1533 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
1535 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
1538 if (out
->ptr_entries
!= 0) {
1539 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
1542 if (out
->num_entries2
!= out
->num_entries
) {
1547 if (UNMARSHALLING(ps
)) {
1548 if ((out
->dom_rid
= PRS_ALLOC_MEM(ps
, DOM_RID2
, out
->num_entries2
))
1550 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1555 for (i
= 0; i
< out
->num_entries2
; i
++)
1556 if(!smb_io_dom_rid2("", &out
->dom_rid
[i
], ps
, depth
)) /* domain RIDs being looked up */
1560 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
1563 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
1569 /*******************************************************************
1570 Internal lsa data type io.
1571 Following pass must read DOM_SID2 types.
1572 ********************************************************************/
1574 BOOL
smb_io_lsa_translated_sids3(const char *desc
, LSA_TRANSLATED_SID3
*q_r
,
1575 prs_struct
*ps
, int depth
)
1577 prs_debug(ps
, depth
, desc
, "smb_io_lsa_translated_sids3");
1582 if(!prs_uint8 ("sid_type ", ps
, depth
, &q_r
->sid_type
))
1586 /* Second pass will read/write these. */
1587 if (!smb_io_dom_sid2_p("sid_header", ps
, depth
, &q_r
->sid2
))
1589 if(!prs_uint32("sid_idx ", ps
, depth
, &q_r
->sid_idx
))
1591 if(!prs_uint32("unknown ", ps
, depth
, &q_r
->unknown
))
1597 /*******************************************************************
1598 Identical to lsa_io_q_lookup_names2.
1599 ********************************************************************/
1601 BOOL
lsa_io_q_lookup_names3(const char *desc
, LSA_Q_LOOKUP_NAMES3
*q_r
,
1602 prs_struct
*ps
, int depth
)
1606 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names3");
1612 if(!smb_io_pol_hnd("", &q_r
->pol
, ps
, depth
)) /* policy handle */
1617 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
1619 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
1622 if (UNMARSHALLING(ps
)) {
1623 if (q_r
->num_entries
) {
1624 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
1626 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
1631 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1634 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
1638 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1641 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
1647 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
1649 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
1651 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
1655 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
1657 if(!prs_uint32("unknown1 ", ps
, depth
, &q_r
->unknown1
))
1659 if(!prs_uint32("unknown2 ", ps
, depth
, &q_r
->unknown2
))
1665 /*******************************************************************
1666 reads or writes a structure.
1667 ********************************************************************/
1669 BOOL
lsa_io_r_lookup_names3(const char *desc
, LSA_R_LOOKUP_NAMES3
*out
, prs_struct
*ps
, int depth
)
1673 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names3");
1679 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
1682 if (out
->ptr_dom_ref
!= 0)
1683 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
1686 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
1688 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
1691 if (out
->ptr_entries
!= 0) {
1692 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
1695 if (out
->num_entries2
!= out
->num_entries
) {
1700 if (UNMARSHALLING(ps
)) {
1701 if ((out
->trans_sids
= PRS_ALLOC_MEM(ps
, LSA_TRANSLATED_SID3
, out
->num_entries2
))
1703 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1708 for (i
= 0; i
< out
->num_entries2
; i
++) {
1709 if(!smb_io_lsa_translated_sids3("", &out
->trans_sids
[i
], ps
, depth
)) {
1713 /* Now process the DOM_SID2 entries. */
1714 for (i
= 0; i
< out
->num_entries2
; i
++) {
1715 if (out
->trans_sids
[i
].sid2
) {
1716 if( !smb_io_dom_sid2("sid2", out
->trans_sids
[i
].sid2
, ps
, depth
) ) {
1723 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
1726 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
1732 /*******************************************************************
1733 ********************************************************************/
1735 BOOL
lsa_io_q_lookup_names4(const char *desc
, LSA_Q_LOOKUP_NAMES4
*q_r
,
1736 prs_struct
*ps
, int depth
)
1740 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_names4");
1746 if(!prs_uint32("num_entries ", ps
, depth
, &q_r
->num_entries
))
1748 if(!prs_uint32("num_entries2 ", ps
, depth
, &q_r
->num_entries2
))
1751 if (UNMARSHALLING(ps
)) {
1752 if (q_r
->num_entries
) {
1753 if ((q_r
->hdr_name
= PRS_ALLOC_MEM(ps
, UNIHDR
, q_r
->num_entries
)) == NULL
)
1755 if ((q_r
->uni_name
= PRS_ALLOC_MEM(ps
, UNISTR2
, q_r
->num_entries
)) == NULL
)
1760 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1763 if(!smb_io_unihdr("hdr_name", &q_r
->hdr_name
[i
], ps
, depth
)) /* pointer names */
1767 for (i
= 0; i
< q_r
->num_entries
; i
++) {
1770 if(!smb_io_unistr2("dom_name", &q_r
->uni_name
[i
], q_r
->hdr_name
[i
].buffer
, ps
, depth
)) /* names to be looked up */
1776 if(!prs_uint32("num_trans_entries ", ps
, depth
, &q_r
->num_trans_entries
))
1778 if(!prs_uint32("ptr_trans_sids ", ps
, depth
, &q_r
->ptr_trans_sids
))
1780 if(!prs_uint16("lookup_level ", ps
, depth
, &q_r
->lookup_level
))
1784 if(!prs_uint32("mapped_count ", ps
, depth
, &q_r
->mapped_count
))
1786 if(!prs_uint32("unknown1 ", ps
, depth
, &q_r
->unknown1
))
1788 if(!prs_uint32("unknown2 ", ps
, depth
, &q_r
->unknown2
))
1794 /*******************************************************************
1795 Identical to lsa_io_r_lookup_names3.
1796 ********************************************************************/
1798 BOOL
lsa_io_r_lookup_names4(const char *desc
, LSA_R_LOOKUP_NAMES4
*out
, prs_struct
*ps
, int depth
)
1802 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_names4");
1808 if(!prs_uint32("ptr_dom_ref", ps
, depth
, &out
->ptr_dom_ref
))
1811 if (out
->ptr_dom_ref
!= 0)
1812 if(!lsa_io_dom_r_ref("", out
->dom_ref
, ps
, depth
))
1815 if(!prs_uint32("num_entries", ps
, depth
, &out
->num_entries
))
1817 if(!prs_uint32("ptr_entries", ps
, depth
, &out
->ptr_entries
))
1820 if (out
->ptr_entries
!= 0) {
1821 if(!prs_uint32("num_entries2", ps
, depth
, &out
->num_entries2
))
1824 if (out
->num_entries2
!= out
->num_entries
) {
1829 if (UNMARSHALLING(ps
)) {
1830 if ((out
->trans_sids
= PRS_ALLOC_MEM(ps
, LSA_TRANSLATED_SID3
, out
->num_entries2
))
1832 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
1837 for (i
= 0; i
< out
->num_entries2
; i
++) {
1838 if(!smb_io_lsa_translated_sids3("", &out
->trans_sids
[i
], ps
, depth
)) {
1842 /* Now process the DOM_SID2 entries. */
1843 for (i
= 0; i
< out
->num_entries2
; i
++) {
1844 if (out
->trans_sids
[i
].sid2
) {
1845 if( !smb_io_dom_sid2("sid2", out
->trans_sids
[i
].sid2
, ps
, depth
) ) {
1852 if(!prs_uint32("mapped_count", ps
, depth
, &out
->mapped_count
))
1855 if(!prs_ntstatus("status ", ps
, depth
, &out
->status
))
1861 /*******************************************************************
1862 Inits an LSA_Q_CLOSE structure.
1863 ********************************************************************/
1865 void init_lsa_q_close(LSA_Q_CLOSE
*in
, POLICY_HND
*hnd
)
1867 DEBUG(5, ("init_lsa_q_close\n"));
1869 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
1872 /*******************************************************************
1873 Reads or writes an LSA_Q_CLOSE structure.
1874 ********************************************************************/
1876 BOOL
lsa_io_q_close(const char *desc
, LSA_Q_CLOSE
*in
, prs_struct
*ps
, int depth
)
1878 prs_debug(ps
, depth
, desc
, "lsa_io_q_close");
1881 if(!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
1887 /*******************************************************************
1888 Reads or writes an LSA_R_CLOSE structure.
1889 ********************************************************************/
1891 BOOL
lsa_io_r_close(const char *desc
, LSA_R_CLOSE
*out
, prs_struct
*ps
, int depth
)
1893 prs_debug(ps
, depth
, desc
, "lsa_io_r_close");
1896 if(!smb_io_pol_hnd("", &out
->pol
, ps
, depth
))
1899 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
1905 /*******************************************************************
1906 Reads or writes an LSA_Q_OPEN_SECRET structure.
1907 ********************************************************************/
1909 BOOL
lsa_io_q_open_secret(const char *desc
, LSA_Q_OPEN_SECRET
*in
, prs_struct
*ps
, int depth
)
1911 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_secret");
1917 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
1920 if(!prs_unistr4 ("secretname", ps
, depth
, &in
->secretname
))
1925 if(!prs_uint32("access", ps
, depth
, &in
->access
))
1931 /*******************************************************************
1932 Reads or writes an LSA_R_OPEN_SECRET structure.
1933 ********************************************************************/
1935 BOOL
lsa_io_r_open_secret(const char *desc
, LSA_R_OPEN_SECRET
*out
, prs_struct
*ps
, int depth
)
1937 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_secret");
1943 if(!smb_io_pol_hnd("", &out
->handle
, ps
, depth
))
1946 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
1952 /*******************************************************************
1953 Inits an LSA_Q_ENUM_PRIVS structure.
1954 ********************************************************************/
1956 void init_q_enum_privs(LSA_Q_ENUM_PRIVS
*in
, POLICY_HND
*hnd
, uint32 enum_context
, uint32 pref_max_length
)
1958 DEBUG(5, ("init_q_enum_privs\n"));
1960 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
1962 in
->enum_context
= enum_context
;
1963 in
->pref_max_length
= pref_max_length
;
1966 /*******************************************************************
1967 reads or writes a structure.
1968 ********************************************************************/
1969 BOOL
lsa_io_q_enum_privs(const char *desc
, LSA_Q_ENUM_PRIVS
*in
, prs_struct
*ps
, int depth
)
1974 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_privs");
1977 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
1980 if(!prs_uint32("enum_context ", ps
, depth
, &in
->enum_context
))
1982 if(!prs_uint32("pref_max_length", ps
, depth
, &in
->pref_max_length
))
1988 /*******************************************************************
1989 reads or writes a structure.
1990 ********************************************************************/
1991 static BOOL
lsa_io_priv_entries(const char *desc
, LSA_PRIV_ENTRY
*entries
, uint32 count
, prs_struct
*ps
, int depth
)
1995 if (entries
== NULL
)
1998 prs_debug(ps
, depth
, desc
, "lsa_io_priv_entries");
2004 for (i
= 0; i
< count
; i
++) {
2005 if (!smb_io_unihdr("", &entries
[i
].hdr_name
, ps
, depth
))
2007 if(!prs_uint32("luid_low ", ps
, depth
, &entries
[i
].luid_low
))
2009 if(!prs_uint32("luid_high", ps
, depth
, &entries
[i
].luid_high
))
2013 for (i
= 0; i
< count
; i
++)
2014 if (!smb_io_unistr2("", &entries
[i
].name
, entries
[i
].hdr_name
.buffer
, ps
, depth
))
2020 /*******************************************************************
2021 Inits an LSA_R_ENUM_PRIVS structure.
2022 ********************************************************************/
2024 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS
*out
, uint32 enum_context
,
2025 uint32 count
, LSA_PRIV_ENTRY
*entries
)
2027 DEBUG(5, ("init_lsa_r_enum_privs\n"));
2029 out
->enum_context
=enum_context
;
2032 if (entries
!=NULL
) {
2043 /*******************************************************************
2044 reads or writes a structure.
2045 ********************************************************************/
2046 BOOL
lsa_io_r_enum_privs(const char *desc
, LSA_R_ENUM_PRIVS
*out
, prs_struct
*ps
, int depth
)
2051 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_privs");
2057 if(!prs_uint32("enum_context", ps
, depth
, &out
->enum_context
))
2059 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2061 if(!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
2065 if(!prs_uint32("count1", ps
, depth
, &out
->count1
))
2068 if (UNMARSHALLING(ps
))
2069 if (!(out
->privs
= PRS_ALLOC_MEM(ps
, LSA_PRIV_ENTRY
, out
->count1
)))
2072 if (!lsa_io_priv_entries("", out
->privs
, out
->count1
, ps
, depth
))
2079 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2085 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME
*trn
, POLICY_HND
*hnd
, const char *name
, uint16 lang_id
, uint16 lang_id_sys
)
2087 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2089 init_unistr2(&trn
->name
, name
, UNI_FLAGS_NONE
);
2090 init_uni_hdr(&trn
->hdr_name
, &trn
->name
);
2091 trn
->lang_id
= lang_id
;
2092 trn
->lang_id_sys
= lang_id_sys
;
2095 /*******************************************************************
2096 reads or writes a structure.
2097 ********************************************************************/
2098 BOOL
lsa_io_q_priv_get_dispname(const char *desc
, LSA_Q_PRIV_GET_DISPNAME
*in
, prs_struct
*ps
, int depth
)
2103 prs_debug(ps
, depth
, desc
, "lsa_io_q_priv_get_dispname");
2109 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
2112 if (!smb_io_unihdr("hdr_name", &in
->hdr_name
, ps
, depth
))
2115 if (!smb_io_unistr2("name", &in
->name
, in
->hdr_name
.buffer
, ps
, depth
))
2118 if(!prs_uint16("lang_id ", ps
, depth
, &in
->lang_id
))
2120 if(!prs_uint16("lang_id_sys", ps
, depth
, &in
->lang_id_sys
))
2126 /*******************************************************************
2127 reads or writes a structure.
2128 ********************************************************************/
2129 BOOL
lsa_io_r_priv_get_dispname(const char *desc
, LSA_R_PRIV_GET_DISPNAME
*out
, prs_struct
*ps
, int depth
)
2134 prs_debug(ps
, depth
, desc
, "lsa_io_r_priv_get_dispname");
2140 if (!prs_uint32("ptr_info", ps
, depth
, &out
->ptr_info
))
2144 if (!smb_io_unihdr("hdr_name", &out
->hdr_desc
, ps
, depth
))
2147 if (!smb_io_unistr2("desc", &out
->desc
, out
->hdr_desc
.buffer
, ps
, depth
))
2154 if(!prs_uint16("lang_id", ps
, depth
, &out
->lang_id
))
2159 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2166 initialise a LSA_Q_ENUM_ACCOUNTS structure
2168 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS
*trn
, POLICY_HND
*hnd
, uint32 enum_context
, uint32 pref_max_length
)
2170 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2172 trn
->enum_context
= enum_context
;
2173 trn
->pref_max_length
= pref_max_length
;
2176 /*******************************************************************
2177 reads or writes a structure.
2178 ********************************************************************/
2179 BOOL
lsa_io_q_enum_accounts(const char *desc
, LSA_Q_ENUM_ACCOUNTS
*in
, prs_struct
*ps
, int depth
)
2184 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_accounts");
2187 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
2190 if(!prs_uint32("enum_context ", ps
, depth
, &in
->enum_context
))
2192 if(!prs_uint32("pref_max_length", ps
, depth
, &in
->pref_max_length
))
2199 /*******************************************************************
2200 Inits an LSA_R_ENUM_PRIVS structure.
2201 ********************************************************************/
2203 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS
*out
, uint32 enum_context
)
2205 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2207 out
->enum_context
=enum_context
;
2208 if (out
->enum_context
!=0) {
2209 out
->sids
.num_entries
=enum_context
;
2210 out
->sids
.ptr_sid_enum
=1;
2211 out
->sids
.num_entries2
=enum_context
;
2213 out
->sids
.num_entries
=0;
2214 out
->sids
.ptr_sid_enum
=0;
2215 out
->sids
.num_entries2
=0;
2219 /*******************************************************************
2220 reads or writes a structure.
2221 ********************************************************************/
2222 BOOL
lsa_io_r_enum_accounts(const char *desc
, LSA_R_ENUM_ACCOUNTS
*out
, prs_struct
*ps
, int depth
)
2227 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_accounts");
2233 if(!prs_uint32("enum_context", ps
, depth
, &out
->enum_context
))
2236 if (!lsa_io_sid_enum("sids", &out
->sids
, ps
, depth
))
2242 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2249 /*******************************************************************
2250 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2251 ********************************************************************/
2253 BOOL
lsa_io_q_unk_get_connuser(const char *desc
, LSA_Q_UNK_GET_CONNUSER
*in
, prs_struct
*ps
, int depth
)
2255 prs_debug(ps
, depth
, desc
, "lsa_io_q_unk_get_connuser");
2261 if(!prs_uint32("ptr_srvname", ps
, depth
, &in
->ptr_srvname
))
2264 if(!smb_io_unistr2("uni2_srvname", &in
->uni2_srvname
, in
->ptr_srvname
, ps
, depth
)) /* server name to be looked up */
2270 if(!prs_uint32("unk1", ps
, depth
, &in
->unk1
))
2272 if(!prs_uint32("unk2", ps
, depth
, &in
->unk2
))
2274 if(!prs_uint32("unk3", ps
, depth
, &in
->unk3
))
2277 /* Don't bother to read or write at present... */
2281 /*******************************************************************
2282 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2283 ********************************************************************/
2285 BOOL
lsa_io_r_unk_get_connuser(const char *desc
, LSA_R_UNK_GET_CONNUSER
*out
, prs_struct
*ps
, int depth
)
2287 prs_debug(ps
, depth
, desc
, "lsa_io_r_unk_get_connuser");
2293 if(!prs_uint32("ptr_user_name", ps
, depth
, &out
->ptr_user_name
))
2295 if(!smb_io_unihdr("hdr_user_name", &out
->hdr_user_name
, ps
, depth
))
2297 if(!smb_io_unistr2("uni2_user_name", &out
->uni2_user_name
, out
->ptr_user_name
, ps
, depth
))
2303 if(!prs_uint32("unk1", ps
, depth
, &out
->unk1
))
2306 if(!prs_uint32("ptr_dom_name", ps
, depth
, &out
->ptr_dom_name
))
2308 if(!smb_io_unihdr("hdr_dom_name", &out
->hdr_dom_name
, ps
, depth
))
2310 if(!smb_io_unistr2("uni2_dom_name", &out
->uni2_dom_name
, out
->ptr_dom_name
, ps
, depth
))
2316 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2322 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT
*trn
, POLICY_HND
*hnd
, DOM_SID
*sid
, uint32 desired_access
)
2324 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2326 init_dom_sid2(&trn
->sid
, sid
);
2327 trn
->access
= desired_access
;
2331 /*******************************************************************
2332 Reads or writes an LSA_Q_CREATEACCOUNT structure.
2333 ********************************************************************/
2335 BOOL
lsa_io_q_create_account(const char *desc
, LSA_Q_CREATEACCOUNT
*out
, prs_struct
*ps
, int depth
)
2337 prs_debug(ps
, depth
, desc
, "lsa_io_q_create_account");
2343 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2346 if(!smb_io_dom_sid2("sid", &out
->sid
, ps
, depth
)) /* domain SID */
2349 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2355 /*******************************************************************
2356 Reads or writes an LSA_R_CREATEACCOUNT structure.
2357 ********************************************************************/
2359 BOOL
lsa_io_r_create_account(const char *desc
, LSA_R_CREATEACCOUNT
*out
, prs_struct
*ps
, int depth
)
2361 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_account");
2367 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2370 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2377 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT
*trn
, POLICY_HND
*hnd
, DOM_SID
*sid
, uint32 desired_access
)
2379 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2381 init_dom_sid2(&trn
->sid
, sid
);
2382 trn
->access
= desired_access
;
2385 /*******************************************************************
2386 Reads or writes an LSA_Q_OPENACCOUNT structure.
2387 ********************************************************************/
2389 BOOL
lsa_io_q_open_account(const char *desc
, LSA_Q_OPENACCOUNT
*out
, prs_struct
*ps
, int depth
)
2391 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_account");
2397 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2400 if(!smb_io_dom_sid2("sid", &out
->sid
, ps
, depth
)) /* domain SID */
2403 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2409 /*******************************************************************
2410 Reads or writes an LSA_R_OPENACCOUNT structure.
2411 ********************************************************************/
2413 BOOL
lsa_io_r_open_account(const char *desc
, LSA_R_OPENACCOUNT
*out
, prs_struct
*ps
, int depth
)
2415 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_account");
2421 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2424 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2431 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT
*trn
, POLICY_HND
*hnd
)
2433 memcpy(&trn
->pol
, hnd
, sizeof(trn
->pol
));
2437 /*******************************************************************
2438 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2439 ********************************************************************/
2441 BOOL
lsa_io_q_enum_privsaccount(const char *desc
, LSA_Q_ENUMPRIVSACCOUNT
*out
, prs_struct
*ps
, int depth
)
2443 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_privsaccount");
2449 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2455 /*******************************************************************
2456 Reads or writes an LUID structure.
2457 ********************************************************************/
2459 static BOOL
lsa_io_luid(const char *desc
, LUID
*out
, prs_struct
*ps
, int depth
)
2461 prs_debug(ps
, depth
, desc
, "lsa_io_luid");
2467 if(!prs_uint32("low", ps
, depth
, &out
->low
))
2470 if(!prs_uint32("high", ps
, depth
, &out
->high
))
2476 /*******************************************************************
2477 Reads or writes an LUID_ATTR structure.
2478 ********************************************************************/
2480 static BOOL
lsa_io_luid_attr(const char *desc
, LUID_ATTR
*out
, prs_struct
*ps
, int depth
)
2482 prs_debug(ps
, depth
, desc
, "lsa_io_luid_attr");
2488 if (!lsa_io_luid(desc
, &out
->luid
, ps
, depth
))
2491 if(!prs_uint32("attr", ps
, depth
, &out
->attr
))
2497 /*******************************************************************
2498 Reads or writes an PRIVILEGE_SET structure.
2499 ********************************************************************/
2501 static BOOL
lsa_io_privilege_set(const char *desc
, PRIVILEGE_SET
*out
, prs_struct
*ps
, int depth
)
2505 prs_debug(ps
, depth
, desc
, "lsa_io_privilege_set");
2511 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2513 if(!prs_uint32("control", ps
, depth
, &out
->control
))
2516 for (i
=0; i
<out
->count
; i
++) {
2517 if (!lsa_io_luid_attr(desc
, &out
->set
[i
], ps
, depth
))
2524 NTSTATUS
init_lsa_r_enum_privsaccount(TALLOC_CTX
*mem_ctx
, LSA_R_ENUMPRIVSACCOUNT
*out
, LUID_ATTR
*set
, uint32 count
, uint32 control
)
2526 NTSTATUS ret
= NT_STATUS_OK
;
2531 if ( !NT_STATUS_IS_OK(ret
= privilege_set_init_by_ctx(mem_ctx
, &(out
->set
))) )
2534 out
->set
.count
= count
;
2536 if (!NT_STATUS_IS_OK(ret
= dup_luid_attr(out
->set
.mem_ctx
, &(out
->set
.set
), set
, count
)))
2539 DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out
->count
));
2544 /*******************************************************************
2545 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2546 ********************************************************************/
2548 BOOL
lsa_io_r_enum_privsaccount(const char *desc
, LSA_R_ENUMPRIVSACCOUNT
*out
, prs_struct
*ps
, int depth
)
2550 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_privsaccount");
2556 if(!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
2560 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2563 /* malloc memory if unmarshalling here */
2565 if (UNMARSHALLING(ps
) && out
->count
!= 0) {
2566 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps
->mem_ctx
, &(out
->set
))))
2569 if (!(out
->set
.set
= PRS_ALLOC_MEM(ps
,LUID_ATTR
,out
->count
)))
2574 if(!lsa_io_privilege_set(desc
, &out
->set
, ps
, depth
))
2578 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2586 /*******************************************************************
2587 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
2588 ********************************************************************/
2590 BOOL
lsa_io_q_getsystemaccount(const char *desc
, LSA_Q_GETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2592 prs_debug(ps
, depth
, desc
, "lsa_io_q_getsystemaccount");
2598 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2604 /*******************************************************************
2605 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
2606 ********************************************************************/
2608 BOOL
lsa_io_r_getsystemaccount(const char *desc
, LSA_R_GETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2610 prs_debug(ps
, depth
, desc
, "lsa_io_r_getsystemaccount");
2616 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2619 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2626 /*******************************************************************
2627 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2628 ********************************************************************/
2630 BOOL
lsa_io_q_setsystemaccount(const char *desc
, LSA_Q_SETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2632 prs_debug(ps
, depth
, desc
, "lsa_io_q_setsystemaccount");
2638 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2641 if(!prs_uint32("access", ps
, depth
, &out
->access
))
2647 /*******************************************************************
2648 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2649 ********************************************************************/
2651 BOOL
lsa_io_r_setsystemaccount(const char *desc
, LSA_R_SETSYSTEMACCOUNT
*out
, prs_struct
*ps
, int depth
)
2653 prs_debug(ps
, depth
, desc
, "lsa_io_r_setsystemaccount");
2659 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2666 static void init_lsa_string( LSA_STRING
*uni
, const char *string
)
2668 init_unistr2(&uni
->unistring
, string
, UNI_FLAGS_NONE
);
2669 init_uni_hdr(&uni
->hdr
, &uni
->unistring
);
2672 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE
*q_u
, POLICY_HND
*hnd
, const char *name
)
2674 memcpy(&q_u
->pol
, hnd
, sizeof(q_u
->pol
));
2675 init_lsa_string( &q_u
->privname
, name
);
2678 BOOL
smb_io_lsa_string( const char *desc
, LSA_STRING
*string
, prs_struct
*ps
, int depth
)
2680 prs_debug(ps
, depth
, desc
, "smb_io_lsa_string");
2683 if(!smb_io_unihdr ("hdr", &string
->hdr
, ps
, depth
))
2685 if(!smb_io_unistr2("unistring", &string
->unistring
, string
->hdr
.buffer
, ps
, depth
))
2691 /*******************************************************************
2692 Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE structure.
2693 ********************************************************************/
2695 BOOL
lsa_io_q_lookup_priv_value(const char *desc
, LSA_Q_LOOKUP_PRIV_VALUE
*out
, prs_struct
*ps
, int depth
)
2697 prs_debug(ps
, depth
, desc
, "lsa_io_q_lookup_priv_value");
2703 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2705 if(!smb_io_lsa_string("privname", &out
->privname
, ps
, depth
))
2711 /*******************************************************************
2712 Reads or writes an LSA_R_LOOKUP_PRIV_VALUE structure.
2713 ********************************************************************/
2715 BOOL
lsa_io_r_lookup_priv_value(const char *desc
, LSA_R_LOOKUP_PRIV_VALUE
*out
, prs_struct
*ps
, int depth
)
2717 prs_debug(ps
, depth
, desc
, "lsa_io_r_lookup_priv_value");
2723 if(!lsa_io_luid("luid", &out
->luid
, ps
, depth
))
2726 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2733 /*******************************************************************
2734 Reads or writes an LSA_Q_ADDPRIVS structure.
2735 ********************************************************************/
2737 BOOL
lsa_io_q_addprivs(const char *desc
, LSA_Q_ADDPRIVS
*out
, prs_struct
*ps
, int depth
)
2739 prs_debug(ps
, depth
, desc
, "lsa_io_q_addprivs");
2745 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2748 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2751 if (UNMARSHALLING(ps
) && out
->count
!=0) {
2752 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps
->mem_ctx
, &(out
->set
))))
2755 if (!(out
->set
.set
= PRS_ALLOC_MEM(ps
, LUID_ATTR
, out
->count
)))
2759 if(!lsa_io_privilege_set(desc
, &out
->set
, ps
, depth
))
2765 /*******************************************************************
2766 Reads or writes an LSA_R_ADDPRIVS structure.
2767 ********************************************************************/
2769 BOOL
lsa_io_r_addprivs(const char *desc
, LSA_R_ADDPRIVS
*out
, prs_struct
*ps
, int depth
)
2771 prs_debug(ps
, depth
, desc
, "lsa_io_r_addprivs");
2777 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2783 /*******************************************************************
2784 Reads or writes an LSA_Q_REMOVEPRIVS structure.
2785 ********************************************************************/
2787 BOOL
lsa_io_q_removeprivs(const char *desc
, LSA_Q_REMOVEPRIVS
*out
, prs_struct
*ps
, int depth
)
2789 prs_debug(ps
, depth
, desc
, "lsa_io_q_removeprivs");
2795 if(!smb_io_pol_hnd("pol", &out
->pol
, ps
, depth
))
2798 if(!prs_uint32("allrights", ps
, depth
, &out
->allrights
))
2801 if(!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
2805 * JFM: I'm not sure at all if the count is inside the ptr
2806 * never seen one with ptr=0
2810 if(!prs_uint32("count", ps
, depth
, &out
->count
))
2813 if (UNMARSHALLING(ps
) && out
->count
!=0) {
2814 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps
->mem_ctx
, &(out
->set
))))
2817 if (!(out
->set
.set
= PRS_ALLOC_MEM(ps
, LUID_ATTR
, out
->count
)))
2821 if(!lsa_io_privilege_set(desc
, &out
->set
, ps
, depth
))
2828 /*******************************************************************
2829 Reads or writes an LSA_R_REMOVEPRIVS structure.
2830 ********************************************************************/
2832 BOOL
lsa_io_r_removeprivs(const char *desc
, LSA_R_REMOVEPRIVS
*out
, prs_struct
*ps
, int depth
)
2834 prs_debug(ps
, depth
, desc
, "lsa_io_r_removeprivs");
2840 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2846 BOOL
policy_handle_is_valid(const POLICY_HND
*hnd
)
2848 POLICY_HND zero_pol
;
2850 ZERO_STRUCT(zero_pol
);
2851 return ((memcmp(&zero_pol
, hnd
, sizeof(POLICY_HND
)) == 0) ? False
: True
);
2854 /*******************************************************************
2855 Reads or writes an LSA_DNS_DOM_INFO structure.
2856 ********************************************************************/
2858 BOOL
lsa_io_dns_dom_info(const char *desc
, LSA_DNS_DOM_INFO
*info
,
2859 prs_struct
*ps
, int depth
)
2861 prs_debug(ps
, depth
, desc
, "lsa_io_dns_dom_info");
2866 if(!smb_io_unihdr("nb_name", &info
->hdr_nb_dom_name
, ps
, depth
))
2868 if(!smb_io_unihdr("dns_name", &info
->hdr_dns_dom_name
, ps
, depth
))
2870 if(!smb_io_unihdr("forest", &info
->hdr_forest_name
, ps
, depth
))
2875 if ( !smb_io_uuid("dom_guid", &info
->dom_guid
, ps
, depth
) )
2880 if(!prs_uint32("dom_sid", ps
, depth
, &info
->ptr_dom_sid
))
2883 if(!smb_io_unistr2("nb_name", &info
->uni_nb_dom_name
,
2884 info
->hdr_nb_dom_name
.buffer
, ps
, depth
))
2886 if(!smb_io_unistr2("dns_name", &info
->uni_dns_dom_name
,
2887 info
->hdr_dns_dom_name
.buffer
, ps
, depth
))
2889 if(!smb_io_unistr2("forest", &info
->uni_forest_name
,
2890 info
->hdr_forest_name
.buffer
, ps
, depth
))
2893 if(!smb_io_dom_sid2("dom_sid", &info
->dom_sid
, ps
, depth
))
2900 /*******************************************************************
2901 Inits an LSA_Q_QUERY_INFO2 structure.
2902 ********************************************************************/
2904 void init_q_query2(LSA_Q_QUERY_INFO2
*in
, POLICY_HND
*hnd
, uint16 info_class
)
2906 DEBUG(5, ("init_q_query2\n"));
2908 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
2910 in
->info_class
= info_class
;
2913 /*******************************************************************
2914 Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
2915 ********************************************************************/
2917 BOOL
lsa_io_q_query_info2(const char *desc
, LSA_Q_QUERY_INFO2
*in
, prs_struct
*ps
, int depth
)
2919 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_info2");
2925 if(!smb_io_pol_hnd("pol", &in
->pol
, ps
, depth
))
2928 if(!prs_uint16("info_class", ps
, depth
, &in
->info_class
))
2934 /*******************************************************************
2935 Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
2936 ********************************************************************/
2938 BOOL
lsa_io_r_query_info2(const char *desc
, LSA_R_QUERY_INFO2
*out
,
2939 prs_struct
*ps
, int depth
)
2941 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_info2");
2947 if(!prs_uint32("ptr", ps
, depth
, &out
->ptr
))
2949 if(!prs_uint16("info_class", ps
, depth
, &out
->info_class
))
2951 switch(out
->info_class
) {
2953 if (!lsa_io_dns_dom_info("info12", &out
->info
.dns_dom_info
,
2958 DEBUG(0,("lsa_io_r_query_info2: unknown info class %d\n",
2965 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
2971 /*******************************************************************
2972 Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
2973 ********************************************************************/
2974 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS
*in
,
2979 DEBUG(5, ("init_q_enum_acct_rights\n"));
2982 init_dom_sid2(&in
->sid
, sid
);
2985 /*******************************************************************
2986 ********************************************************************/
2987 NTSTATUS
init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS
*out
, PRIVILEGE_SET
*privileges
)
2991 const char **privname_array
= NULL
;
2994 for ( i
=0; i
<privileges
->count
; i
++ ) {
2995 privname
= luid_to_privilege_name( &privileges
->set
[i
].luid
);
2997 if ( !add_string_to_array( get_talloc_ctx(), privname
, &privname_array
, &num_priv
) )
2998 return NT_STATUS_NO_MEMORY
;
3003 out
->rights
= TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY
);
3005 if ( !init_unistr4_array( out
->rights
, num_priv
, privname_array
) )
3006 return NT_STATUS_NO_MEMORY
;
3008 out
->count
= num_priv
;
3011 return NT_STATUS_OK
;
3014 /*******************************************************************
3015 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3016 ********************************************************************/
3017 BOOL
lsa_io_q_enum_acct_rights(const char *desc
, LSA_Q_ENUM_ACCT_RIGHTS
*in
, prs_struct
*ps
, int depth
)
3023 prs_debug(ps
, depth
, desc
, "lsa_io_q_enum_acct_rights");
3026 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
3029 if(!smb_io_dom_sid2("sid", &in
->sid
, ps
, depth
))
3036 /*******************************************************************
3037 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3038 ********************************************************************/
3039 BOOL
lsa_io_r_enum_acct_rights(const char *desc
, LSA_R_ENUM_ACCT_RIGHTS
*out
, prs_struct
*ps
, int depth
)
3041 prs_debug(ps
, depth
, desc
, "lsa_io_r_enum_acct_rights");
3044 if(!prs_uint32("count ", ps
, depth
, &out
->count
))
3047 if ( !prs_pointer("rights", ps
, depth
, (void**)&out
->rights
, sizeof(UNISTR4_ARRAY
), (PRS_POINTER_CAST
)prs_unistr4_array
) )
3053 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3060 /*******************************************************************
3061 Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3062 ********************************************************************/
3063 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS
*in
, POLICY_HND
*hnd
,
3064 DOM_SID
*sid
, uint32 count
, const char **rights
)
3066 DEBUG(5, ("init_q_add_acct_rights\n"));
3069 init_dom_sid2(&in
->sid
, sid
);
3071 in
->rights
= TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY
);
3072 init_unistr4_array( in
->rights
, count
, rights
);
3078 /*******************************************************************
3079 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3080 ********************************************************************/
3081 BOOL
lsa_io_q_add_acct_rights(const char *desc
, LSA_Q_ADD_ACCT_RIGHTS
*in
, prs_struct
*ps
, int depth
)
3083 prs_debug(ps
, depth
, desc
, "lsa_io_q_add_acct_rights");
3086 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
3089 if(!smb_io_dom_sid2("sid", &in
->sid
, ps
, depth
))
3092 if(!prs_uint32("count", ps
, depth
, &in
->count
))
3095 if ( !prs_pointer("rights", ps
, depth
, (void**)&in
->rights
, sizeof(UNISTR4_ARRAY
), (PRS_POINTER_CAST
)prs_unistr4_array
) )
3101 /*******************************************************************
3102 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3103 ********************************************************************/
3104 BOOL
lsa_io_r_add_acct_rights(const char *desc
, LSA_R_ADD_ACCT_RIGHTS
*out
, prs_struct
*ps
, int depth
)
3106 prs_debug(ps
, depth
, desc
, "lsa_io_r_add_acct_rights");
3109 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3116 /*******************************************************************
3117 Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3118 ********************************************************************/
3119 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS
*in
,
3124 const char **rights
)
3126 DEBUG(5, ("init_q_remove_acct_rights\n"));
3130 init_dom_sid2(&in
->sid
, sid
);
3132 in
->removeall
= removeall
;
3135 in
->rights
= TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY
);
3136 init_unistr4_array( in
->rights
, count
, rights
);
3140 /*******************************************************************
3141 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3142 ********************************************************************/
3143 BOOL
lsa_io_q_remove_acct_rights(const char *desc
, LSA_Q_REMOVE_ACCT_RIGHTS
*in
, prs_struct
*ps
, int depth
)
3145 prs_debug(ps
, depth
, desc
, "lsa_io_q_remove_acct_rights");
3148 if (!smb_io_pol_hnd("", &in
->pol
, ps
, depth
))
3151 if(!smb_io_dom_sid2("sid", &in
->sid
, ps
, depth
))
3154 if(!prs_uint32("removeall", ps
, depth
, &in
->removeall
))
3157 if(!prs_uint32("count", ps
, depth
, &in
->count
))
3160 if ( !prs_pointer("rights", ps
, depth
, (void**)&in
->rights
, sizeof(UNISTR4_ARRAY
), (PRS_POINTER_CAST
)prs_unistr4_array
) )
3166 /*******************************************************************
3167 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3168 ********************************************************************/
3169 BOOL
lsa_io_r_remove_acct_rights(const char *desc
, LSA_R_REMOVE_ACCT_RIGHTS
*out
, prs_struct
*ps
, int depth
)
3171 prs_debug(ps
, depth
, desc
, "lsa_io_r_remove_acct_rights");
3174 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3180 /*******************************************************************
3181 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3182 ********************************************************************/
3184 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN
*q
, POLICY_HND
*hnd
, DOM_SID
*sid
, uint32 desired_access
)
3186 memcpy(&q
->pol
, hnd
, sizeof(q
->pol
));
3188 init_dom_sid2(&q
->sid
, sid
);
3189 q
->access_mask
= desired_access
;
3192 /*******************************************************************
3193 ********************************************************************/
3195 #if 0 /* jerry, I think this not correct - gd */
3196 BOOL
lsa_io_q_open_trusted_domain(const char *desc
, LSA_Q_OPEN_TRUSTED_DOMAIN
*in
, prs_struct
*ps
, int depth
)
3198 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_trusted_domain");
3204 if (!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3207 if(!prs_uint32("count", ps
, depth
, &in
->count
))
3210 if(!smb_io_dom_sid("sid", &in
->sid
, ps
, depth
))
3218 /*******************************************************************
3219 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3220 ********************************************************************/
3222 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME
*q
,
3225 uint32 desired_access
)
3227 memcpy(&q
->pol
, hnd
, sizeof(q
->pol
));
3229 init_lsa_string(&q
->name
, name
);
3230 q
->access_mask
= desired_access
;
3233 /*******************************************************************
3234 ********************************************************************/
3237 /*******************************************************************
3238 Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3239 ********************************************************************/
3241 BOOL
lsa_io_q_open_trusted_domain_by_name(const char *desc
, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME
*q_o
, prs_struct
*ps
, int depth
)
3243 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_trusted_domain_by_name");
3249 if(!smb_io_pol_hnd("pol", &q_o
->pol
, ps
, depth
))
3255 if(!smb_io_lsa_string("name", &q_o
->name
, ps
, depth
))
3261 if(!prs_uint32("access", ps
, depth
, &q_o
->access_mask
))
3267 /*******************************************************************
3268 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3269 ********************************************************************/
3271 BOOL
lsa_io_r_open_trusted_domain_by_name(const char *desc
, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME
*out
, prs_struct
*ps
, int depth
)
3273 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_trusted_domain_by_name");
3279 if (!smb_io_pol_hnd("handle", &out
->handle
, ps
, depth
))
3282 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3288 /*******************************************************************
3289 ********************************************************************/
3291 BOOL
lsa_io_q_open_trusted_domain(const char *desc
, LSA_Q_OPEN_TRUSTED_DOMAIN
*q_o
, prs_struct
*ps
, int depth
)
3293 prs_debug(ps
, depth
, desc
, "lsa_io_q_open_trusted_domain");
3299 if(!smb_io_pol_hnd("pol", &q_o
->pol
, ps
, depth
))
3302 if(!smb_io_dom_sid2("sid", &q_o
->sid
, ps
, depth
))
3305 if(!prs_uint32("access", ps
, depth
, &q_o
->access_mask
))
3311 /*******************************************************************
3312 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3313 ********************************************************************/
3315 BOOL
lsa_io_r_open_trusted_domain(const char *desc
, LSA_R_OPEN_TRUSTED_DOMAIN
*out
, prs_struct
*ps
, int depth
)
3317 prs_debug(ps
, depth
, desc
, "lsa_io_r_open_trusted_domain");
3323 if (!smb_io_pol_hnd("handle", &out
->handle
, ps
, depth
))
3326 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3332 /*******************************************************************
3333 ********************************************************************/
3335 BOOL
lsa_io_q_create_trusted_domain(const char *desc
, LSA_Q_CREATE_TRUSTED_DOMAIN
*in
, prs_struct
*ps
, int depth
)
3337 prs_debug(ps
, depth
, desc
, "lsa_io_q_create_trusted_domain");
3343 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3346 if(!prs_unistr4 ("secretname", ps
, depth
, &in
->secretname
))
3351 if(!prs_uint32("access", ps
, depth
, &in
->access
))
3357 /*******************************************************************
3358 ********************************************************************/
3360 BOOL
lsa_io_r_create_trusted_domain(const char *desc
, LSA_R_CREATE_TRUSTED_DOMAIN
*out
, prs_struct
*ps
, int depth
)
3362 prs_debug(ps
, depth
, desc
, "lsa_io_r_create_trusted_domain");
3368 if (!smb_io_pol_hnd("", &out
->handle
, ps
, depth
))
3371 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3377 /*******************************************************************
3378 ********************************************************************/
3380 BOOL
lsa_io_q_create_secret(const char *desc
, LSA_Q_CREATE_SECRET
*in
, prs_struct
*ps
, int depth
)
3382 prs_debug(ps
, depth
, desc
, "lsa_io_q_create_secret");
3388 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3391 if(!prs_unistr4 ("secretname", ps
, depth
, &in
->secretname
))
3396 if(!prs_uint32("access", ps
, depth
, &in
->access
))
3402 /*******************************************************************
3403 ********************************************************************/
3405 BOOL
lsa_io_r_create_secret(const char *desc
, LSA_R_CREATE_SECRET
*out
, prs_struct
*ps
, int depth
)
3407 prs_debug(ps
, depth
, desc
, "lsa_io_r_create_secret");
3413 if (!smb_io_pol_hnd("", &out
->handle
, ps
, depth
))
3416 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3424 /*******************************************************************
3425 ********************************************************************/
3427 static BOOL
lsa_io_data_blob( const char *desc
, prs_struct
*ps
, int depth
, LSA_DATA_BLOB
*blob
)
3429 prs_debug(ps
, depth
, desc
, "lsa_io_data_blob");
3432 if ( !prs_uint32("size", ps
, depth
, &blob
->size
) )
3434 if ( !prs_uint32("size", ps
, depth
, &blob
->size
) )
3437 if ( !prs_io_unistr2_p(desc
, ps
, depth
, &blob
->data
) )
3443 /*******************************************************************
3444 ********************************************************************/
3446 BOOL
lsa_io_q_set_secret(const char *desc
, LSA_Q_SET_SECRET
*in
, prs_struct
*ps
, int depth
)
3448 prs_debug(ps
, depth
, desc
, "lsa_io_q_set_secret");
3451 if ( !prs_align(ps
) )
3454 if ( !smb_io_pol_hnd("", &in
->handle
, ps
, depth
) )
3457 if ( !prs_pointer( "old_value", ps
, depth
, (void*)&in
->old_value
, sizeof(LSA_DATA_BLOB
), (PRS_POINTER_CAST
)lsa_io_data_blob
))
3460 if( !prs_align(ps
) )
3462 if ( !prs_pointer( "old_value", ps
, depth
, (void*)&in
->old_value
, sizeof(LSA_DATA_BLOB
), (PRS_POINTER_CAST
)lsa_io_data_blob
))
3469 /*******************************************************************
3470 ********************************************************************/
3472 BOOL
lsa_io_r_set_secret(const char *desc
, LSA_R_SET_SECRET
*out
, prs_struct
*ps
, int depth
)
3474 prs_debug(ps
, depth
, desc
, "lsa_io_r_set_secret");
3477 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3483 /*******************************************************************
3484 ********************************************************************/
3486 BOOL
lsa_io_q_delete_object(const char *desc
, LSA_Q_DELETE_OBJECT
*in
, prs_struct
*ps
, int depth
)
3488 prs_debug(ps
, depth
, desc
, "lsa_io_q_delete_object");
3494 if(!smb_io_pol_hnd("", &in
->handle
, ps
, depth
))
3500 /*******************************************************************
3501 ********************************************************************/
3503 BOOL
lsa_io_r_delete_object(const char *desc
, LSA_R_DELETE_OBJECT
*out
, prs_struct
*ps
, int depth
)
3505 prs_debug(ps
, depth
, desc
, "lsa_io_r_delete_object");
3508 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))
3514 /*******************************************************************
3515 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3516 ********************************************************************/
3518 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO
*q
,
3519 POLICY_HND
*hnd
, uint16 info_class
)
3521 DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3524 q
->info_class
= info_class
;
3527 /*******************************************************************
3528 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3529 ********************************************************************/
3531 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME
*q
,
3532 POLICY_HND
*hnd
, uint16 info_class
,
3533 const char *dom_name
)
3535 DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3538 init_lsa_string(&q
->domain_name
, dom_name
);
3539 q
->info_class
= info_class
;
3542 /*******************************************************************
3543 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3544 ********************************************************************/
3546 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID
*q
,
3547 POLICY_HND
*hnd
, uint16 info_class
,
3550 DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3553 init_dom_sid2(&q
->dom_sid
, dom_sid
);
3554 q
->info_class
= info_class
;
3557 /*******************************************************************
3558 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3559 ********************************************************************/
3561 BOOL
lsa_io_q_query_trusted_domain_info(const char *desc
,
3562 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO
*q_q
,
3563 prs_struct
*ps
, int depth
)
3565 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_trusted_domain_info");
3571 if(!smb_io_pol_hnd("pol", &q_q
->pol
, ps
, depth
))
3574 if(!prs_uint16("info_class", ps
, depth
, &q_q
->info_class
))
3581 /*******************************************************************
3582 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3583 ********************************************************************/
3585 BOOL
lsa_io_q_query_trusted_domain_info_by_sid(const char *desc
,
3586 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID
*q_q
,
3587 prs_struct
*ps
, int depth
)
3589 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_trusted_domain_info_by_sid");
3595 if(!smb_io_pol_hnd("pol", &q_q
->pol
, ps
, depth
))
3601 if(!smb_io_dom_sid2("dom_sid", &q_q
->dom_sid
, ps
, depth
))
3604 if(!prs_uint16("info_class", ps
, depth
, &q_q
->info_class
))
3610 /*******************************************************************
3611 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3612 ********************************************************************/
3614 BOOL
lsa_io_q_query_trusted_domain_info_by_name(const char *desc
,
3615 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME
*q_q
,
3616 prs_struct
*ps
, int depth
)
3618 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_trusted_domain_info_by_name");
3624 if(!smb_io_pol_hnd("pol", &q_q
->pol
, ps
, depth
))
3630 if(!smb_io_lsa_string("domain_name", &q_q
->domain_name
, ps
, depth
))
3633 if(!prs_uint16("info_class", ps
, depth
, &q_q
->info_class
))
3639 /*******************************************************************
3640 ********************************************************************/
3642 static BOOL
smb_io_lsa_data_buf_hdr(const char *desc
, LSA_DATA_BUF_HDR
*buf_hdr
,
3643 prs_struct
*ps
, int depth
)
3645 prs_debug(ps
, depth
, desc
, "smb_io_lsa_data_buf_hdr");
3651 if(!prs_uint32("length", ps
, depth
, &buf_hdr
->length
))
3654 if(!prs_uint32("size", ps
, depth
, &buf_hdr
->size
))
3657 if (!prs_uint32("data_ptr", ps
, depth
, &buf_hdr
->data_ptr
))
3663 /*******************************************************************
3664 ********************************************************************/
3666 static BOOL
smb_io_lsa_data_buf(const char *desc
, LSA_DATA_BUF
*buf
,
3667 prs_struct
*ps
, int depth
, int length
, int size
)
3669 prs_debug(ps
, depth
, desc
, "smb_io_lsa_data_buf");
3672 if ( UNMARSHALLING(ps
) ) {
3673 if ( !(buf
->data
= PRS_ALLOC_MEM( ps
, uint8
, length
)) )
3677 if (!prs_uint32("size", ps
, depth
, &buf
->size
))
3680 if (!prs_uint32("offset", ps
, depth
, &buf
->offset
))
3683 if (!prs_uint32("length", ps
, depth
, &buf
->length
))
3686 if(!prs_uint8s(False
, "data", ps
, depth
, buf
->data
, size
))
3692 /*******************************************************************
3693 ********************************************************************/
3695 static BOOL
lsa_io_trustdom_query_1(const char *desc
, TRUSTED_DOMAIN_INFO_NAME
*name
,
3696 prs_struct
*ps
, int depth
)
3698 if (!smb_io_lsa_string("netbios_name", &name
->netbios_name
, ps
, depth
))
3704 /*******************************************************************
3705 ********************************************************************/
3707 static BOOL
lsa_io_trustdom_query_3(const char *desc
, TRUSTED_DOMAIN_INFO_POSIX_OFFSET
*posix
,
3708 prs_struct
*ps
, int depth
)
3710 if(!prs_uint32("posix_offset", ps
, depth
, &posix
->posix_offset
))
3716 /*******************************************************************
3717 ********************************************************************/
3719 static BOOL
lsa_io_trustdom_query_4(const char *desc
, TRUSTED_DOMAIN_INFO_PASSWORD
*password
,
3720 prs_struct
*ps
, int depth
)
3725 if(!prs_uint32("ptr_password", ps
, depth
, &password
->ptr_password
))
3728 if(!prs_uint32("ptr_old_password", ps
, depth
, &password
->ptr_old_password
))
3731 if (&password
->ptr_password
) {
3733 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password
->password_hdr
, ps
, depth
))
3736 if (!smb_io_lsa_data_buf("password", &password
->password
, ps
, depth
,
3737 password
->password_hdr
.length
, password
->password_hdr
.size
))
3741 if (&password
->ptr_old_password
) {
3743 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password
->old_password_hdr
, ps
, depth
))
3746 if (!smb_io_lsa_data_buf("old_password", &password
->old_password
, ps
, depth
,
3747 password
->old_password_hdr
.length
, password
->old_password_hdr
.size
))
3754 /*******************************************************************
3755 ********************************************************************/
3757 static BOOL
lsa_io_trustdom_query_6(const char *desc
, TRUSTED_DOMAIN_INFO_EX
*info_ex
,
3758 prs_struct
*ps
, int depth
)
3762 if (!smb_io_unihdr("domain_name_hdr", &info_ex
->domain_name
.hdr
, ps
, depth
))
3765 if (!smb_io_unihdr("netbios_name_hdr", &info_ex
->netbios_name
.hdr
, ps
, depth
))
3768 if (!prs_uint32("dom_sid_ptr", ps
, depth
, &dom_sid_ptr
))
3771 if (!prs_uint32("trust_direction", ps
, depth
, &info_ex
->trust_direction
))
3774 if (!prs_uint32("trust_type", ps
, depth
, &info_ex
->trust_type
))
3777 if (!prs_uint32("trust_attributes", ps
, depth
, &info_ex
->trust_attributes
))
3780 if (!smb_io_unistr2("domain_name_unistring", &info_ex
->domain_name
.unistring
, info_ex
->domain_name
.hdr
.buffer
, ps
, depth
))
3783 if (!smb_io_unistr2("netbios_name_unistring", &info_ex
->netbios_name
.unistring
, info_ex
->netbios_name
.hdr
.buffer
, ps
, depth
))
3786 if (!smb_io_dom_sid2("sid", &info_ex
->sid
, ps
, depth
))
3792 /*******************************************************************
3793 ********************************************************************/
3795 static BOOL
lsa_io_trustdom_query(const char *desc
, prs_struct
*ps
, int depth
, LSA_TRUSTED_DOMAIN_INFO
*info
)
3797 prs_debug(ps
, depth
, desc
, "lsa_io_trustdom_query");
3800 if(!prs_uint16("info_class", ps
, depth
, &info
->info_class
))
3806 switch (info
->info_class
) {
3808 if(!lsa_io_trustdom_query_1("name", &info
->name
, ps
, depth
))
3812 if(!lsa_io_trustdom_query_3("posix_offset", &info
->posix_offset
, ps
, depth
))
3816 if(!lsa_io_trustdom_query_4("password", &info
->password
, ps
, depth
))
3820 if(!lsa_io_trustdom_query_6("info_ex", &info
->info_ex
, ps
, depth
))
3824 DEBUG(0,("unsupported info-level: %d\n", info
->info_class
));
3831 /*******************************************************************
3832 Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
3833 ********************************************************************/
3835 BOOL
lsa_io_r_query_trusted_domain_info(const char *desc
,
3836 LSA_R_QUERY_TRUSTED_DOMAIN_INFO
*r_q
,
3837 prs_struct
*ps
, int depth
)
3842 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_trusted_domain_info");
3845 if (!prs_pointer("trustdom", ps
, depth
, (void**)&r_q
->info
,
3846 sizeof(LSA_TRUSTED_DOMAIN_INFO
),
3847 (PRS_POINTER_CAST
)lsa_io_trustdom_query
) )
3853 if(!prs_ntstatus("status", ps
, depth
, &r_q
->status
))
3859 /*******************************************************************
3860 Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
3861 ********************************************************************/
3863 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY
*in
, POLICY_HND
*hnd
, uint16 info_class
)
3865 DEBUG(5, ("init_q_query_dom_info\n"));
3867 memcpy(&in
->pol
, hnd
, sizeof(in
->pol
));
3869 in
->info_class
= info_class
;
3872 /*******************************************************************
3873 Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
3874 ********************************************************************/
3876 BOOL
lsa_io_q_query_dom_info(const char *desc
, LSA_Q_QUERY_DOM_INFO_POLICY
*in
, prs_struct
*ps
, int depth
)
3878 prs_debug(ps
, depth
, desc
, "lsa_io_q_query_dom_info");
3884 if(!smb_io_pol_hnd("pol", &in
->pol
, ps
, depth
))
3887 if(!prs_uint16("info_class", ps
, depth
, &in
->info_class
))
3893 /*******************************************************************
3894 Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
3895 ********************************************************************/
3897 static BOOL
lsa_io_dominfo_query_3(const char *desc
, LSA_DOM_INFO_POLICY_KERBEROS
*krb_policy
,
3898 prs_struct
*ps
, int depth
)
3900 if (!prs_align_uint64(ps
))
3906 if (!prs_uint32("enforce_restrictions", ps
, depth
, &krb_policy
->enforce_restrictions
))
3909 if (!prs_align_uint64(ps
))
3912 if (!smb_io_nttime("service_tkt_lifetime", ps
, depth
, &krb_policy
->service_tkt_lifetime
))
3915 if (!prs_align_uint64(ps
))
3918 if (!smb_io_nttime("user_tkt_lifetime", ps
, depth
, &krb_policy
->user_tkt_lifetime
))
3921 if (!prs_align_uint64(ps
))
3924 if (!smb_io_nttime("user_tkt_renewaltime", ps
, depth
, &krb_policy
->user_tkt_renewaltime
))
3927 if (!prs_align_uint64(ps
))
3930 if (!smb_io_nttime("clock_skew", ps
, depth
, &krb_policy
->clock_skew
))
3933 if (!prs_align_uint64(ps
))
3936 if (!smb_io_nttime("unknown6", ps
, depth
, &krb_policy
->unknown6
))
3942 static BOOL
lsa_io_dom_info_query(const char *desc
, prs_struct
*ps
, int depth
, LSA_DOM_INFO_UNION
*info
)
3944 prs_debug(ps
, depth
, desc
, "lsa_io_dom_info_query");
3947 if(!prs_align_uint16(ps
))
3950 if(!prs_uint16("info_class", ps
, depth
, &info
->info_class
))
3953 switch (info
->info_class
) {
3955 if (!lsa_io_dominfo_query_3("krb_policy", &info
->krb_policy
, ps
, depth
))
3959 DEBUG(0,("unsupported info-level: %d\n", info
->info_class
));
3968 BOOL
lsa_io_r_query_dom_info(const char *desc
, LSA_R_QUERY_DOM_INFO_POLICY
*out
,
3969 prs_struct
*ps
, int depth
)
3971 prs_debug(ps
, depth
, desc
, "lsa_io_r_query_dom_info");
3974 if (!prs_pointer("dominfo", ps
, depth
, (void**)&out
->info
,
3975 sizeof(LSA_DOM_INFO_UNION
),
3976 (PRS_POINTER_CAST
)lsa_io_dom_info_query
) )
3979 if(!prs_ntstatus("status", ps
, depth
, &out
->status
))