r14279: Fix coverity #86, 87, 88, 89:
[Samba/nascimento.git] / source3 / rpc_parse / parse_lsa.c
blobd285f5d36b18b9b64f5a2c25bd6d35786e4176f9
1 /*
2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997,
7 * Copyright (C) Andrew Bartlett 2002,
8 * Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2002.
9 * Copyright (C) Gerald )Jerry) Carter 2005
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 #include "includes.h"
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_RPC_PARSE
31 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
32 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
34 /*******************************************************************
35 Inits a LSA_TRANS_NAME structure.
36 ********************************************************************/
38 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
39 uint16 sid_name_use, const char *name, uint32 idx)
41 trn->sid_name_use = sid_name_use;
42 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
43 init_uni_hdr(&trn->hdr_name, uni_name);
44 trn->domain_idx = idx;
47 /*******************************************************************
48 Reads or writes a LSA_TRANS_NAME structure.
49 ********************************************************************/
51 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps,
52 int depth)
54 prs_debug(ps, depth, desc, "lsa_io_trans_name");
55 depth++;
57 if(!prs_align(ps))
58 return False;
60 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
61 return False;
62 if(!prs_align(ps))
63 return False;
65 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
66 return False;
67 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
68 return False;
70 return True;
73 /*******************************************************************
74 Inits a LSA_TRANS_NAME2 structure.
75 ********************************************************************/
77 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
78 uint16 sid_name_use, const char *name, uint32 idx)
80 trn->sid_name_use = sid_name_use;
81 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
82 init_uni_hdr(&trn->hdr_name, uni_name);
83 trn->domain_idx = idx;
84 trn->unknown = 0;
87 /*******************************************************************
88 Reads or writes a LSA_TRANS_NAME2 structure.
89 ********************************************************************/
91 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps,
92 int depth)
94 prs_debug(ps, depth, desc, "lsa_io_trans_name2");
95 depth++;
97 if(!prs_align(ps))
98 return False;
100 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
101 return False;
102 if(!prs_align(ps))
103 return False;
105 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
106 return False;
107 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
108 return False;
109 if(!prs_uint32("unknown ", ps, depth, &trn->unknown))
110 return False;
112 return True;
115 /*******************************************************************
116 Reads or writes a DOM_R_REF structure.
117 ********************************************************************/
119 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
121 unsigned int i;
123 prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
124 depth++;
126 if(!prs_align(ps))
127 return False;
129 if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
130 return False;
131 if(!prs_uint32("ptr_ref_dom ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
132 return False;
133 if(!prs_uint32("max_entries ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
134 return False;
136 SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
138 if (dom->ptr_ref_dom != 0) {
140 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
141 return False;
143 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
145 for (i = 0; i < dom->num_ref_doms_1; i++) {
146 fstring t;
148 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
149 if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
150 return False;
152 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
153 if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
154 return False;
157 for (i = 0; i < dom->num_ref_doms_2; i++) {
158 fstring t;
160 if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
161 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
162 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
163 return False;
164 if(!prs_align(ps))
165 return False;
168 if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
169 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
170 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
171 return False;
176 return True;
179 /*******************************************************************
180 Inits an LSA_SEC_QOS structure.
181 ********************************************************************/
183 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
185 DEBUG(5, ("init_lsa_sec_qos\n"));
187 qos->len = 0x0c; /* length of quality of service block, in bytes */
188 qos->sec_imp_level = imp_lev;
189 qos->sec_ctxt_mode = ctxt;
190 qos->effective_only = eff;
193 /*******************************************************************
194 Reads or writes an LSA_SEC_QOS structure.
195 ********************************************************************/
197 static BOOL lsa_io_sec_qos(const char *desc, LSA_SEC_QOS *qos, prs_struct *ps,
198 int depth)
200 uint32 start;
202 prs_debug(ps, depth, desc, "lsa_io_obj_qos");
203 depth++;
205 if(!prs_align(ps))
206 return False;
208 start = prs_offset(ps);
210 /* these pointers had _better_ be zero, because we don't know
211 what they point to!
213 if(!prs_uint32("len ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
214 return False;
215 if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
216 return False;
217 if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
218 return False;
219 if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
220 return False;
222 if (qos->len != prs_offset(ps) - start) {
223 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
224 qos->len, prs_offset(ps) - start));
227 return True;
230 /*******************************************************************
231 Inits an LSA_OBJ_ATTR structure.
232 ********************************************************************/
234 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
236 DEBUG(5, ("init_lsa_obj_attr\n"));
238 attr->len = 0x18; /* length of object attribute block, in bytes */
239 attr->ptr_root_dir = 0;
240 attr->ptr_obj_name = 0;
241 attr->attributes = attributes;
242 attr->ptr_sec_desc = 0;
244 if (qos != NULL) {
245 attr->ptr_sec_qos = 1;
246 attr->sec_qos = qos;
247 } else {
248 attr->ptr_sec_qos = 0;
249 attr->sec_qos = NULL;
253 /*******************************************************************
254 Reads or writes an LSA_OBJ_ATTR structure.
255 ********************************************************************/
257 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps,
258 int depth)
260 prs_debug(ps, depth, desc, "lsa_io_obj_attr");
261 depth++;
263 if(!prs_align(ps))
264 return False;
266 /* these pointers had _better_ be zero, because we don't know
267 what they point to!
269 if(!prs_uint32("len ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
270 return False;
271 if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
272 return False;
273 if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
274 return False;
275 if(!prs_uint32("attributes ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
276 return False;
277 if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
278 return False;
279 if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
280 return False;
282 if (attr->ptr_sec_qos != 0) {
283 if (UNMARSHALLING(ps))
284 if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
285 return False;
287 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
288 return False;
291 return True;
295 /*******************************************************************
296 Inits an LSA_Q_OPEN_POL structure.
297 ********************************************************************/
299 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
300 uint32 attributes, uint32 desired_access,
301 LSA_SEC_QOS *qos)
303 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes,
304 desired_access));
306 in->ptr = 1; /* undocumented pointer */
308 in->des_access = desired_access;
310 in->system_name = system_name;
311 init_lsa_obj_attr(&in->attr, attributes, qos);
314 /*******************************************************************
315 Reads or writes an LSA_Q_OPEN_POL structure.
316 ********************************************************************/
318 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps,
319 int depth)
321 prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
322 depth++;
324 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
325 return False;
326 if(!prs_uint16("system_name", ps, depth, &in->system_name))
327 return False;
328 if(!prs_align( ps ))
329 return False;
331 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
332 return False;
334 if(!prs_uint32("des_access", ps, depth, &in->des_access))
335 return False;
337 return True;
340 /*******************************************************************
341 Reads or writes an LSA_R_OPEN_POL structure.
342 ********************************************************************/
344 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps,
345 int depth)
347 prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
348 depth++;
350 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
351 return False;
353 if(!prs_ntstatus("status", ps, depth, &out->status))
354 return False;
356 return True;
359 /*******************************************************************
360 Inits an LSA_Q_OPEN_POL2 structure.
361 ********************************************************************/
363 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
364 uint32 attributes, uint32 desired_access,
365 LSA_SEC_QOS *qos)
367 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes,
368 desired_access));
370 in->ptr = 1; /* undocumented pointer */
372 in->des_access = desired_access;
374 init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
376 init_lsa_obj_attr(&in->attr, attributes, qos);
379 /*******************************************************************
380 Reads or writes an LSA_Q_OPEN_POL2 structure.
381 ********************************************************************/
383 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps,
384 int depth)
386 prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
387 depth++;
389 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
390 return False;
392 if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
393 return False;
394 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
395 return False;
397 if(!prs_uint32("des_access", ps, depth, &in->des_access))
398 return False;
400 return True;
403 /*******************************************************************
404 Reads or writes an LSA_R_OPEN_POL2 structure.
405 ********************************************************************/
407 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps,
408 int depth)
410 prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
411 depth++;
413 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
414 return False;
416 if(!prs_ntstatus("status", ps, depth, &out->status))
417 return False;
419 return True;
422 /*******************************************************************
423 makes an LSA_Q_QUERY_SEC_OBJ structure.
424 ********************************************************************/
426 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd,
427 uint32 sec_info)
429 DEBUG(5, ("init_q_query_sec_obj\n"));
431 in->pol = *hnd;
432 in->sec_info = sec_info;
434 return;
437 /*******************************************************************
438 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
439 ********************************************************************/
441 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in,
442 prs_struct *ps, int depth)
444 prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
445 depth++;
447 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
448 return False;
450 if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
451 return False;
453 return True;
456 /*******************************************************************
457 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
458 ********************************************************************/
460 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
462 prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
463 depth++;
465 if (!prs_align(ps))
466 return False;
468 if (!prs_uint32("ptr", ps, depth, &out->ptr))
469 return False;
471 if (out->ptr != 0) {
472 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
473 return False;
476 if (!prs_ntstatus("status", ps, depth, &out->status))
477 return False;
479 return True;
482 /*******************************************************************
483 Inits an LSA_Q_QUERY_INFO structure.
484 ********************************************************************/
486 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
488 DEBUG(5, ("init_q_query\n"));
490 memcpy(&in->pol, hnd, sizeof(in->pol));
492 in->info_class = info_class;
495 /*******************************************************************
496 Reads or writes an LSA_Q_QUERY_INFO structure.
497 ********************************************************************/
499 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps,
500 int depth)
502 prs_debug(ps, depth, desc, "lsa_io_q_query");
503 depth++;
505 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
506 return False;
508 if(!prs_uint16("info_class", ps, depth, &in->info_class))
509 return False;
511 return True;
514 /*******************************************************************
515 makes an LSA_Q_ENUM_TRUST_DOM structure.
516 ********************************************************************/
517 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
518 uint32 enum_context, uint32 preferred_len)
520 DEBUG(5, ("init_q_enum_trust_dom\n"));
522 q_e->pol = *pol;
523 q_e->enum_context = enum_context;
524 q_e->preferred_len = preferred_len;
526 return True;
529 /*******************************************************************
530 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
531 ********************************************************************/
533 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e,
534 prs_struct *ps, int depth)
536 prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
537 depth++;
539 if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
540 return False;
542 if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
543 return False;
544 if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
545 return False;
547 return True;
550 /*******************************************************************
551 Inits an LSA_R_ENUM_TRUST_DOM structure.
552 ********************************************************************/
554 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
555 uint32 enum_context, uint32 num_domains,
556 struct trustdom_info **td)
558 unsigned int i;
560 DEBUG(5, ("init_r_enum_trust_dom\n"));
562 out->enum_context = enum_context;
563 out->count = num_domains;
565 if ( num_domains != 0 ) {
567 /* allocate container memory */
569 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
571 if ( !out->domlist ) {
572 out->status = NT_STATUS_NO_MEMORY;
573 return;
576 out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
577 out->count );
579 if ( !out->domlist->domains ) {
580 out->status = NT_STATUS_NO_MEMORY;
581 return;
584 out->domlist->count = out->count;
586 /* initialize the list of domains and their sid */
588 for (i = 0; i < num_domains; i++) {
589 smb_ucs2_t *name;
590 if ( !(out->domlist->domains[i].sid =
591 TALLOC_P(ctx, DOM_SID2)) ) {
592 out->status = NT_STATUS_NO_MEMORY;
593 return;
596 init_dom_sid2(out->domlist->domains[i].sid,
597 &(td[i])->sid);
598 if (push_ucs2_talloc(ctx, &name, (td[i])->name) < 0){
599 out->status = NT_STATUS_NO_MEMORY;
600 return;
602 init_unistr4_w(ctx, &out->domlist->domains[i].name,
603 name);
609 /*******************************************************************
610 ********************************************************************/
612 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
614 int i;
616 prs_debug(ps, depth, desc, "lsa_io_domain_list");
617 depth++;
619 if(!prs_uint32("count", ps, depth, &domlist->count))
620 return False;
622 if ( domlist->count == 0 )
623 return True;
625 if ( UNMARSHALLING(ps) ) {
626 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
627 return False;
630 /* headers */
632 for ( i=0; i<domlist->count; i++ ) {
633 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
634 return False;
635 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
636 return False;
639 /* data */
641 for ( i=0; i<domlist->count; i++ ) {
642 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
643 return False;
644 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
645 return False;
648 return True;
651 /*******************************************************************
652 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
653 ********************************************************************/
655 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out,
656 prs_struct *ps, int depth)
658 prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
659 depth++;
661 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
662 return False;
664 if(!prs_uint32("count", ps, depth, &out->count))
665 return False;
667 if ( !prs_pointer("trusted_domains", ps, depth, (void**)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
668 return False;
670 if(!prs_ntstatus("status", ps, depth, &out->status))
671 return False;
673 return True;
676 /*******************************************************************
677 reads or writes a dom query structure.
678 ********************************************************************/
680 static BOOL lsa_io_dom_query(const char *desc, DOM_QUERY *d_q, prs_struct *ps, int depth)
682 if (d_q == NULL)
683 return False;
685 prs_debug(ps, depth, desc, "lsa_io_dom_query");
686 depth++;
688 if(!prs_align(ps))
689 return False;
691 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
692 return False;
693 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
694 return False;
696 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
697 return False;
698 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
699 return False;
701 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
702 return False;
704 if(!prs_align(ps))
705 return False;
707 if (d_q->buffer_dom_sid != 0) {
708 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
709 return False;
710 } else {
711 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
714 return True;
717 /*******************************************************************
718 reads or writes a structure.
719 ********************************************************************/
721 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
723 uint32 ptr = 1;
725 if (d_q == NULL)
726 return False;
728 prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
729 depth++;
731 if (!prs_align(ps))
732 return False;
734 if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
735 return False;
736 if (!prs_uint32("ptr ", ps, depth, &ptr))
737 return False;
738 if (!prs_uint32("count1", ps, depth, &d_q->count1))
739 return False;
740 if (!prs_uint32("count2", ps, depth, &d_q->count2))
741 return False;
743 if (UNMARSHALLING(ps)) {
744 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
747 if (d_q->auditsettings == NULL) {
748 DEBUG(1, ("lsa_io_dom_query_2: NULL auditsettings!\n"));
749 return False;
752 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
753 return False;
755 return True;
758 /*******************************************************************
759 Reads or writes a dom query structure.
760 ********************************************************************/
762 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
764 return lsa_io_dom_query("", d_q, ps, depth);
767 /*******************************************************************
768 Reads or writes a dom query structure.
769 ********************************************************************/
771 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
773 return lsa_io_dom_query("", d_q, ps, depth);
776 /*******************************************************************
777 Reads or writes a dom query structure.
778 ********************************************************************/
780 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
782 if (d_q == NULL)
783 return False;
785 prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
786 depth++;
788 if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
789 return False;
791 return True;
794 /*******************************************************************
795 Reads or writes an LSA_R_QUERY_INFO structure.
796 ********************************************************************/
798 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
800 prs_debug(ps, depth, desc, "lsa_io_r_query");
801 depth++;
803 if(!prs_uint32("undoc_buffer", ps, depth, &out->undoc_buffer))
804 return False;
806 if (out->undoc_buffer != 0) {
807 if(!prs_uint16("info_class", ps, depth, &out->info_class))
808 return False;
810 if(!prs_align(ps))
811 return False;
813 switch (out->info_class) {
814 case 2:
815 if(!lsa_io_dom_query_2("", &out->dom.id2, ps, depth))
816 return False;
817 break;
818 case 3:
819 if(!lsa_io_dom_query_3("", &out->dom.id3, ps, depth))
820 return False;
821 break;
822 case 5:
823 if(!lsa_io_dom_query_5("", &out->dom.id5, ps, depth))
824 return False;
825 break;
826 case 6:
827 if(!lsa_io_dom_query_6("", &out->dom.id6, ps, depth))
828 return False;
829 break;
830 default:
831 /* PANIC! */
832 break;
836 if(!prs_align(ps))
837 return False;
839 if(!prs_ntstatus("status", ps, depth, &out->status))
840 return False;
842 return True;
845 /*******************************************************************
846 Inits a LSA_SID_ENUM structure.
847 ********************************************************************/
849 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen,
850 int num_entries, const DOM_SID *sids)
852 int i;
854 DEBUG(5, ("init_lsa_sid_enum\n"));
856 sen->num_entries = num_entries;
857 sen->ptr_sid_enum = (num_entries != 0);
858 sen->num_entries2 = num_entries;
860 /* Allocate memory for sids and sid pointers */
862 if (num_entries == 0) return;
864 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
865 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
866 return;
869 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
870 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
871 return;
874 /* Copy across SIDs and SID pointers */
876 for (i = 0; i < num_entries; i++) {
877 sen->ptr_sid[i] = 1;
878 init_dom_sid2(&sen->sid[i], &sids[i]);
882 /*******************************************************************
883 Reads or writes a LSA_SID_ENUM structure.
884 ********************************************************************/
886 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps,
887 int depth)
889 unsigned int i;
891 prs_debug(ps, depth, desc, "lsa_io_sid_enum");
892 depth++;
894 if(!prs_align(ps))
895 return False;
897 if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
898 return False;
899 if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
900 return False;
903 if the ptr is NULL, leave here. checked from a real w2k trace.
904 JFM, 11/23/2001
907 if (sen->ptr_sid_enum==0)
908 return True;
910 if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
911 return False;
913 /* Mallocate memory if we're unpacking from the wire */
915 if (UNMARSHALLING(ps)) {
916 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
917 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
918 "ptr_sid\n"));
919 return False;
922 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
923 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
924 "sids\n"));
925 return False;
929 for (i = 0; i < sen->num_entries; i++) {
930 fstring temp;
932 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
933 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
934 return False;
938 for (i = 0; i < sen->num_entries; i++) {
939 fstring temp;
941 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
942 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
943 return False;
947 return True;
950 /*******************************************************************
951 Inits an LSA_R_ENUM_TRUST_DOM structure.
952 ********************************************************************/
954 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l,
955 POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
956 uint16 level)
958 DEBUG(5, ("init_q_lookup_sids\n"));
960 ZERO_STRUCTP(q_l);
962 memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
963 init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
965 q_l->level = level;
968 /*******************************************************************
969 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
970 ********************************************************************/
972 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
973 int depth)
975 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
976 depth++;
978 if(!prs_align(ps))
979 return False;
981 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
982 return False;
983 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
984 return False;
985 if(!lsa_io_trans_names("names ", &q_s->names, ps, depth)) /* translated names */
986 return False;
988 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
989 return False;
990 if(!prs_align(ps))
991 return False;
993 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
994 return False;
996 return True;
999 /*******************************************************************
1000 Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1001 ********************************************************************/
1003 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1004 int depth)
1006 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1007 depth++;
1009 if(!prs_align(ps))
1010 return False;
1012 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1013 return False;
1014 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1015 return False;
1016 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1017 return False;
1019 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1020 return False;
1021 if(!prs_align(ps))
1022 return False;
1024 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1025 return False;
1026 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1027 return False;
1028 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1029 return False;
1031 return True;
1034 /*******************************************************************
1035 Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1036 ********************************************************************/
1038 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1039 int depth)
1041 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1042 depth++;
1044 if(!prs_align(ps))
1045 return False;
1047 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1048 return False;
1049 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1050 return False;
1052 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1053 return False;
1054 if(!prs_align(ps))
1055 return False;
1057 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1058 return False;
1059 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1060 return False;
1061 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1062 return False;
1064 return True;
1068 /*******************************************************************
1069 Reads or writes a structure.
1070 ********************************************************************/
1072 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1073 prs_struct *ps, int depth)
1075 unsigned int i;
1077 prs_debug(ps, depth, desc, "lsa_io_trans_names");
1078 depth++;
1080 if(!prs_align(ps))
1081 return False;
1083 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1084 return False;
1085 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1086 return False;
1088 if (trn->ptr_trans_names != 0) {
1089 if(!prs_uint32("num_entries2 ", ps, depth,
1090 &trn->num_entries2))
1091 return False;
1093 if (UNMARSHALLING(ps)) {
1094 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries)) == NULL) {
1095 return False;
1098 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1099 return False;
1103 for (i = 0; i < trn->num_entries2; i++) {
1104 fstring t;
1105 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1107 if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1108 return False;
1111 for (i = 0; i < trn->num_entries2; i++) {
1112 fstring t;
1113 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1115 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1116 return False;
1117 if(!prs_align(ps))
1118 return False;
1122 return True;
1125 /*******************************************************************
1126 Reads or writes a structure.
1127 ********************************************************************/
1129 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1130 prs_struct *ps, int depth)
1132 unsigned int i;
1134 prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1135 depth++;
1137 if(!prs_align(ps))
1138 return False;
1140 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1141 return False;
1142 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1143 return False;
1145 if (trn->ptr_trans_names != 0) {
1146 if(!prs_uint32("num_entries2 ", ps, depth,
1147 &trn->num_entries2))
1148 return False;
1150 if (UNMARSHALLING(ps)) {
1151 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries)) == NULL) {
1152 return False;
1155 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1156 return False;
1160 for (i = 0; i < trn->num_entries2; i++) {
1161 fstring t;
1162 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1164 if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1165 return False;
1168 for (i = 0; i < trn->num_entries2; i++) {
1169 fstring t;
1170 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1172 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1173 return False;
1174 if(!prs_align(ps))
1175 return False;
1179 return True;
1183 /*******************************************************************
1184 Reads or writes a structure.
1185 ********************************************************************/
1187 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s,
1188 prs_struct *ps, int depth)
1190 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1191 depth++;
1193 if(!prs_align(ps))
1194 return False;
1196 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1197 return False;
1199 if (r_s->ptr_dom_ref != 0)
1200 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1201 return False;
1203 if(!lsa_io_trans_names("names ", r_s->names, ps, depth)) /* translated names */
1204 return False;
1206 if(!prs_align(ps))
1207 return False;
1209 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1210 return False;
1212 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1213 return False;
1215 return True;
1218 /*******************************************************************
1219 Reads or writes a structure.
1220 ********************************************************************/
1222 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s,
1223 prs_struct *ps, int depth)
1225 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1226 depth++;
1228 if(!prs_align(ps))
1229 return False;
1231 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1232 return False;
1234 if (r_s->ptr_dom_ref != 0)
1235 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1236 return False;
1238 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1239 return False;
1241 if(!prs_align(ps))
1242 return False;
1244 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1245 return False;
1247 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1248 return False;
1250 return True;
1254 /*******************************************************************
1255 Reads or writes a structure.
1256 ********************************************************************/
1258 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s,
1259 prs_struct *ps, int depth)
1261 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1262 depth++;
1264 if(!prs_align(ps))
1265 return False;
1267 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1268 return False;
1270 if (r_s->ptr_dom_ref != 0)
1271 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1272 return False;
1274 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1275 return False;
1277 if(!prs_align(ps))
1278 return False;
1280 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1281 return False;
1283 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1284 return False;
1286 return True;
1289 /*******************************************************************
1290 makes a structure.
1291 ********************************************************************/
1293 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l,
1294 POLICY_HND *hnd, int num_names, const char **names)
1296 unsigned int i;
1298 DEBUG(5, ("init_q_lookup_names\n"));
1300 ZERO_STRUCTP(q_l);
1302 q_l->pol = *hnd;
1303 q_l->num_entries = num_names;
1304 q_l->num_entries2 = num_names;
1305 q_l->lookup_level = 1;
1307 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1308 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1309 return;
1312 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1313 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1314 return;
1317 for (i = 0; i < num_names; i++) {
1318 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1319 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1323 /*******************************************************************
1324 reads or writes a structure.
1325 ********************************************************************/
1327 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r,
1328 prs_struct *ps, int depth)
1330 unsigned int i;
1332 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1333 depth++;
1335 if(!prs_align(ps))
1336 return False;
1338 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1339 return False;
1341 if(!prs_align(ps))
1342 return False;
1343 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1344 return False;
1345 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1346 return False;
1348 if (UNMARSHALLING(ps)) {
1349 if (q_r->num_entries) {
1350 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1351 return False;
1352 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1353 return False;
1357 for (i = 0; i < q_r->num_entries; i++) {
1358 if(!prs_align(ps))
1359 return False;
1360 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1361 return False;
1364 for (i = 0; i < q_r->num_entries; i++) {
1365 if(!prs_align(ps))
1366 return False;
1367 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1368 return False;
1371 if(!prs_align(ps))
1372 return False;
1373 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1374 return False;
1375 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1376 return False;
1377 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1378 return False;
1379 if(!prs_align(ps))
1380 return False;
1381 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1382 return False;
1384 return True;
1387 /*******************************************************************
1388 reads or writes a structure.
1389 ********************************************************************/
1391 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1393 unsigned int i;
1395 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1396 depth++;
1398 if(!prs_align(ps))
1399 return False;
1401 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1402 return False;
1404 if (out->ptr_dom_ref != 0)
1405 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1406 return False;
1408 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1409 return False;
1410 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1411 return False;
1413 if (out->ptr_entries != 0) {
1414 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1415 return False;
1417 if (out->num_entries2 != out->num_entries) {
1418 /* RPC fault */
1419 return False;
1422 if (UNMARSHALLING(ps)) {
1423 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1424 == NULL) {
1425 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1426 return False;
1430 for (i = 0; i < out->num_entries2; i++)
1431 if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1432 return False;
1435 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1436 return False;
1438 if(!prs_ntstatus("status ", ps, depth, &out->status))
1439 return False;
1441 return True;
1444 /*******************************************************************
1445 reads or writes a structure.
1446 ********************************************************************/
1448 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r,
1449 prs_struct *ps, int depth)
1451 unsigned int i;
1453 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1454 depth++;
1456 if(!prs_align(ps))
1457 return False;
1459 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1460 return False;
1462 if(!prs_align(ps))
1463 return False;
1464 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1465 return False;
1466 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1467 return False;
1469 if (UNMARSHALLING(ps)) {
1470 if (q_r->num_entries) {
1471 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1472 return False;
1473 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1474 return False;
1478 for (i = 0; i < q_r->num_entries; i++) {
1479 if(!prs_align(ps))
1480 return False;
1481 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1482 return False;
1485 for (i = 0; i < q_r->num_entries; i++) {
1486 if(!prs_align(ps))
1487 return False;
1488 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1489 return False;
1492 if(!prs_align(ps))
1493 return False;
1494 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1495 return False;
1496 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1497 return False;
1498 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1499 return False;
1500 if(!prs_align(ps))
1501 return False;
1502 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1503 return False;
1504 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1505 return False;
1506 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1507 return False;
1509 return True;
1512 /*******************************************************************
1513 reads or writes a structure.
1514 ********************************************************************/
1516 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1518 unsigned int i;
1520 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1521 depth++;
1523 if(!prs_align(ps))
1524 return False;
1526 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1527 return False;
1529 if (out->ptr_dom_ref != 0)
1530 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1531 return False;
1533 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1534 return False;
1535 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1536 return False;
1538 if (out->ptr_entries != 0) {
1539 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1540 return False;
1542 if (out->num_entries2 != out->num_entries) {
1543 /* RPC fault */
1544 return False;
1547 if (UNMARSHALLING(ps)) {
1548 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1549 == NULL) {
1550 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1551 return False;
1555 for (i = 0; i < out->num_entries2; i++)
1556 if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1557 return False;
1560 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1561 return False;
1563 if(!prs_ntstatus("status ", ps, depth, &out->status))
1564 return False;
1566 return True;
1569 /*******************************************************************
1570 Internal lsa data type io.
1571 Following pass must read DOM_SID2 types.
1572 ********************************************************************/
1574 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r,
1575 prs_struct *ps, int depth)
1577 prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1578 depth++;
1580 if(!prs_align(ps))
1581 return False;
1582 if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1583 return False;
1584 if(!prs_align(ps))
1585 return False;
1586 /* Second pass will read/write these. */
1587 if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1588 return False;
1589 if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1590 return False;
1591 if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1592 return False;
1594 return True;
1597 /*******************************************************************
1598 Identical to lsa_io_q_lookup_names2.
1599 ********************************************************************/
1601 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r,
1602 prs_struct *ps, int depth)
1604 unsigned int i;
1606 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1607 depth++;
1609 if(!prs_align(ps))
1610 return False;
1612 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1613 return False;
1615 if(!prs_align(ps))
1616 return False;
1617 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1618 return False;
1619 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1620 return False;
1622 if (UNMARSHALLING(ps)) {
1623 if (q_r->num_entries) {
1624 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1625 return False;
1626 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1627 return False;
1631 for (i = 0; i < q_r->num_entries; i++) {
1632 if(!prs_align(ps))
1633 return False;
1634 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1635 return False;
1638 for (i = 0; i < q_r->num_entries; i++) {
1639 if(!prs_align(ps))
1640 return False;
1641 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1642 return False;
1645 if(!prs_align(ps))
1646 return False;
1647 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1648 return False;
1649 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1650 return False;
1651 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1652 return False;
1653 if(!prs_align(ps))
1654 return False;
1655 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1656 return False;
1657 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1658 return False;
1659 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1660 return False;
1662 return True;
1665 /*******************************************************************
1666 reads or writes a structure.
1667 ********************************************************************/
1669 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1671 unsigned int i;
1673 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1674 depth++;
1676 if(!prs_align(ps))
1677 return False;
1679 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1680 return False;
1682 if (out->ptr_dom_ref != 0)
1683 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1684 return False;
1686 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1687 return False;
1688 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1689 return False;
1691 if (out->ptr_entries != 0) {
1692 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1693 return False;
1695 if (out->num_entries2 != out->num_entries) {
1696 /* RPC fault */
1697 return False;
1700 if (UNMARSHALLING(ps)) {
1701 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1702 == NULL) {
1703 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1704 return False;
1708 for (i = 0; i < out->num_entries2; i++) {
1709 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1710 return False;
1713 /* Now process the DOM_SID2 entries. */
1714 for (i = 0; i < out->num_entries2; i++) {
1715 if (out->trans_sids[i].sid2) {
1716 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1717 return False;
1723 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1724 return False;
1726 if(!prs_ntstatus("status ", ps, depth, &out->status))
1727 return False;
1729 return True;
1732 /*******************************************************************
1733 ********************************************************************/
1735 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r,
1736 prs_struct *ps, int depth)
1738 unsigned int i;
1740 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names4");
1741 depth++;
1743 if(!prs_align(ps))
1744 return False;
1746 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1747 return False;
1748 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1749 return False;
1751 if (UNMARSHALLING(ps)) {
1752 if (q_r->num_entries) {
1753 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1754 return False;
1755 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1756 return False;
1760 for (i = 0; i < q_r->num_entries; i++) {
1761 if(!prs_align(ps))
1762 return False;
1763 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1764 return False;
1767 for (i = 0; i < q_r->num_entries; i++) {
1768 if(!prs_align(ps))
1769 return False;
1770 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1771 return False;
1774 if(!prs_align(ps))
1775 return False;
1776 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1777 return False;
1778 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1779 return False;
1780 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1781 return False;
1782 if(!prs_align(ps))
1783 return False;
1784 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1785 return False;
1786 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1787 return False;
1788 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1789 return False;
1791 return True;
1794 /*******************************************************************
1795 Identical to lsa_io_r_lookup_names3.
1796 ********************************************************************/
1798 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
1800 unsigned int i;
1802 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
1803 depth++;
1805 if(!prs_align(ps))
1806 return False;
1808 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1809 return False;
1811 if (out->ptr_dom_ref != 0)
1812 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1813 return False;
1815 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1816 return False;
1817 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1818 return False;
1820 if (out->ptr_entries != 0) {
1821 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1822 return False;
1824 if (out->num_entries2 != out->num_entries) {
1825 /* RPC fault */
1826 return False;
1829 if (UNMARSHALLING(ps)) {
1830 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1831 == NULL) {
1832 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
1833 return False;
1837 for (i = 0; i < out->num_entries2; i++) {
1838 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1839 return False;
1842 /* Now process the DOM_SID2 entries. */
1843 for (i = 0; i < out->num_entries2; i++) {
1844 if (out->trans_sids[i].sid2) {
1845 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1846 return False;
1852 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1853 return False;
1855 if(!prs_ntstatus("status ", ps, depth, &out->status))
1856 return False;
1858 return True;
1861 /*******************************************************************
1862 Inits an LSA_Q_CLOSE structure.
1863 ********************************************************************/
1865 void init_lsa_q_close(LSA_Q_CLOSE *in, POLICY_HND *hnd)
1867 DEBUG(5, ("init_lsa_q_close\n"));
1869 memcpy(&in->pol, hnd, sizeof(in->pol));
1872 /*******************************************************************
1873 Reads or writes an LSA_Q_CLOSE structure.
1874 ********************************************************************/
1876 BOOL lsa_io_q_close(const char *desc, LSA_Q_CLOSE *in, prs_struct *ps, int depth)
1878 prs_debug(ps, depth, desc, "lsa_io_q_close");
1879 depth++;
1881 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1882 return False;
1884 return True;
1887 /*******************************************************************
1888 Reads or writes an LSA_R_CLOSE structure.
1889 ********************************************************************/
1891 BOOL lsa_io_r_close(const char *desc, LSA_R_CLOSE *out, prs_struct *ps, int depth)
1893 prs_debug(ps, depth, desc, "lsa_io_r_close");
1894 depth++;
1896 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
1897 return False;
1899 if(!prs_ntstatus("status", ps, depth, &out->status))
1900 return False;
1902 return True;
1905 /*******************************************************************
1906 Reads or writes an LSA_Q_OPEN_SECRET structure.
1907 ********************************************************************/
1909 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
1911 prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
1912 depth++;
1914 if(!prs_align(ps))
1915 return False;
1917 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
1918 return False;
1920 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
1921 return False;
1922 if(!prs_align(ps))
1923 return False;
1925 if(!prs_uint32("access", ps, depth, &in->access))
1926 return False;
1928 return True;
1931 /*******************************************************************
1932 Reads or writes an LSA_R_OPEN_SECRET structure.
1933 ********************************************************************/
1935 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
1937 prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
1938 depth++;
1940 if(!prs_align(ps))
1941 return False;
1943 if(!smb_io_pol_hnd("", &out->handle, ps, depth))
1944 return False;
1946 if(!prs_ntstatus("status", ps, depth, &out->status))
1947 return False;
1949 return True;
1952 /*******************************************************************
1953 Inits an LSA_Q_ENUM_PRIVS structure.
1954 ********************************************************************/
1956 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
1958 DEBUG(5, ("init_q_enum_privs\n"));
1960 memcpy(&in->pol, hnd, sizeof(in->pol));
1962 in->enum_context = enum_context;
1963 in->pref_max_length = pref_max_length;
1966 /*******************************************************************
1967 reads or writes a structure.
1968 ********************************************************************/
1969 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
1971 if (in == NULL)
1972 return False;
1974 prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
1975 depth++;
1977 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
1978 return False;
1980 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
1981 return False;
1982 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
1983 return False;
1985 return True;
1988 /*******************************************************************
1989 reads or writes a structure.
1990 ********************************************************************/
1991 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
1993 uint32 i;
1995 if (entries == NULL)
1996 return False;
1998 prs_debug(ps, depth, desc, "lsa_io_priv_entries");
1999 depth++;
2001 if(!prs_align(ps))
2002 return False;
2004 for (i = 0; i < count; i++) {
2005 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2006 return False;
2007 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2008 return False;
2009 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2010 return False;
2013 for (i = 0; i < count; i++)
2014 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2015 return False;
2017 return True;
2020 /*******************************************************************
2021 Inits an LSA_R_ENUM_PRIVS structure.
2022 ********************************************************************/
2024 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2025 uint32 count, LSA_PRIV_ENTRY *entries)
2027 DEBUG(5, ("init_lsa_r_enum_privs\n"));
2029 out->enum_context=enum_context;
2030 out->count=count;
2032 if (entries!=NULL) {
2033 out->ptr=1;
2034 out->count1=count;
2035 out->privs=entries;
2036 } else {
2037 out->ptr=0;
2038 out->count1=0;
2039 out->privs=NULL;
2043 /*******************************************************************
2044 reads or writes a structure.
2045 ********************************************************************/
2046 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2048 if (out == NULL)
2049 return False;
2051 prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2052 depth++;
2054 if(!prs_align(ps))
2055 return False;
2057 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2058 return False;
2059 if(!prs_uint32("count", ps, depth, &out->count))
2060 return False;
2061 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2062 return False;
2064 if (out->ptr) {
2065 if(!prs_uint32("count1", ps, depth, &out->count1))
2066 return False;
2068 if (UNMARSHALLING(ps))
2069 if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2070 return False;
2072 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2073 return False;
2076 if(!prs_align(ps))
2077 return False;
2079 if(!prs_ntstatus("status", ps, depth, &out->status))
2080 return False;
2082 return True;
2085 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2087 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2089 init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2090 init_uni_hdr(&trn->hdr_name, &trn->name);
2091 trn->lang_id = lang_id;
2092 trn->lang_id_sys = lang_id_sys;
2095 /*******************************************************************
2096 reads or writes a structure.
2097 ********************************************************************/
2098 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2100 if (in == NULL)
2101 return False;
2103 prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2104 depth++;
2106 if(!prs_align(ps))
2107 return False;
2109 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2110 return False;
2112 if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2113 return False;
2115 if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2116 return False;
2118 if(!prs_uint16("lang_id ", ps, depth, &in->lang_id))
2119 return False;
2120 if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2121 return False;
2123 return True;
2126 /*******************************************************************
2127 reads or writes a structure.
2128 ********************************************************************/
2129 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2131 if (out == NULL)
2132 return False;
2134 prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2135 depth++;
2137 if (!prs_align(ps))
2138 return False;
2140 if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2141 return False;
2143 if (out->ptr_info){
2144 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2145 return False;
2147 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2148 return False;
2151 if(!prs_align(ps))
2152 return False;
2154 if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2155 return False;
2157 if(!prs_align(ps))
2158 return False;
2159 if(!prs_ntstatus("status", ps, depth, &out->status))
2160 return False;
2162 return True;
2166 initialise a LSA_Q_ENUM_ACCOUNTS structure
2168 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2170 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2172 trn->enum_context = enum_context;
2173 trn->pref_max_length = pref_max_length;
2176 /*******************************************************************
2177 reads or writes a structure.
2178 ********************************************************************/
2179 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2181 if (in == NULL)
2182 return False;
2184 prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2185 depth++;
2187 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2188 return False;
2190 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2191 return False;
2192 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2193 return False;
2195 return True;
2199 /*******************************************************************
2200 Inits an LSA_R_ENUM_PRIVS structure.
2201 ********************************************************************/
2203 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2205 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2207 out->enum_context=enum_context;
2208 if (out->enum_context!=0) {
2209 out->sids.num_entries=enum_context;
2210 out->sids.ptr_sid_enum=1;
2211 out->sids.num_entries2=enum_context;
2212 } else {
2213 out->sids.num_entries=0;
2214 out->sids.ptr_sid_enum=0;
2215 out->sids.num_entries2=0;
2219 /*******************************************************************
2220 reads or writes a structure.
2221 ********************************************************************/
2222 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2224 if (out == NULL)
2225 return False;
2227 prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2228 depth++;
2230 if (!prs_align(ps))
2231 return False;
2233 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2234 return False;
2236 if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2237 return False;
2239 if (!prs_align(ps))
2240 return False;
2242 if(!prs_ntstatus("status", ps, depth, &out->status))
2243 return False;
2245 return True;
2249 /*******************************************************************
2250 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2251 ********************************************************************/
2253 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2255 prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2256 depth++;
2258 if(!prs_align(ps))
2259 return False;
2261 if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2262 return False;
2264 if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2265 return False;
2267 if (!prs_align(ps))
2268 return False;
2270 if(!prs_uint32("unk1", ps, depth, &in->unk1))
2271 return False;
2272 if(!prs_uint32("unk2", ps, depth, &in->unk2))
2273 return False;
2274 if(!prs_uint32("unk3", ps, depth, &in->unk3))
2275 return False;
2277 /* Don't bother to read or write at present... */
2278 return True;
2281 /*******************************************************************
2282 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2283 ********************************************************************/
2285 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2287 prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2288 depth++;
2290 if(!prs_align(ps))
2291 return False;
2293 if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2294 return False;
2295 if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2296 return False;
2297 if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2298 return False;
2300 if (!prs_align(ps))
2301 return False;
2303 if(!prs_uint32("unk1", ps, depth, &out->unk1))
2304 return False;
2306 if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2307 return False;
2308 if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2309 return False;
2310 if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2311 return False;
2313 if (!prs_align(ps))
2314 return False;
2316 if(!prs_ntstatus("status", ps, depth, &out->status))
2317 return False;
2319 return True;
2322 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2324 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2326 init_dom_sid2(&trn->sid, sid);
2327 trn->access = desired_access;
2331 /*******************************************************************
2332 Reads or writes an LSA_Q_CREATEACCOUNT structure.
2333 ********************************************************************/
2335 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2337 prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2338 depth++;
2340 if(!prs_align(ps))
2341 return False;
2343 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2344 return False;
2346 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2347 return False;
2349 if(!prs_uint32("access", ps, depth, &out->access))
2350 return False;
2352 return True;
2355 /*******************************************************************
2356 Reads or writes an LSA_R_CREATEACCOUNT structure.
2357 ********************************************************************/
2359 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT *out, prs_struct *ps, int depth)
2361 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2362 depth++;
2364 if(!prs_align(ps))
2365 return False;
2367 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2368 return False;
2370 if(!prs_ntstatus("status", ps, depth, &out->status))
2371 return False;
2373 return True;
2377 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2379 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2381 init_dom_sid2(&trn->sid, sid);
2382 trn->access = desired_access;
2385 /*******************************************************************
2386 Reads or writes an LSA_Q_OPENACCOUNT structure.
2387 ********************************************************************/
2389 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2391 prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2392 depth++;
2394 if(!prs_align(ps))
2395 return False;
2397 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2398 return False;
2400 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2401 return False;
2403 if(!prs_uint32("access", ps, depth, &out->access))
2404 return False;
2406 return True;
2409 /*******************************************************************
2410 Reads or writes an LSA_R_OPENACCOUNT structure.
2411 ********************************************************************/
2413 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT *out, prs_struct *ps, int depth)
2415 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2416 depth++;
2418 if(!prs_align(ps))
2419 return False;
2421 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2422 return False;
2424 if(!prs_ntstatus("status", ps, depth, &out->status))
2425 return False;
2427 return True;
2431 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2433 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2437 /*******************************************************************
2438 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2439 ********************************************************************/
2441 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2443 prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2444 depth++;
2446 if(!prs_align(ps))
2447 return False;
2449 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2450 return False;
2452 return True;
2455 /*******************************************************************
2456 Reads or writes an LUID structure.
2457 ********************************************************************/
2459 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2461 prs_debug(ps, depth, desc, "lsa_io_luid");
2462 depth++;
2464 if(!prs_align(ps))
2465 return False;
2467 if(!prs_uint32("low", ps, depth, &out->low))
2468 return False;
2470 if(!prs_uint32("high", ps, depth, &out->high))
2471 return False;
2473 return True;
2476 /*******************************************************************
2477 Reads or writes an LUID_ATTR structure.
2478 ********************************************************************/
2480 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2482 prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2483 depth++;
2485 if(!prs_align(ps))
2486 return False;
2488 if (!lsa_io_luid(desc, &out->luid, ps, depth))
2489 return False;
2491 if(!prs_uint32("attr", ps, depth, &out->attr))
2492 return False;
2494 return True;
2497 /*******************************************************************
2498 Reads or writes an PRIVILEGE_SET structure.
2499 ********************************************************************/
2501 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2503 uint32 i;
2505 prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2506 depth++;
2508 if(!prs_align(ps))
2509 return False;
2511 if(!prs_uint32("count", ps, depth, &out->count))
2512 return False;
2513 if(!prs_uint32("control", ps, depth, &out->control))
2514 return False;
2516 for (i=0; i<out->count; i++) {
2517 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2518 return False;
2521 return True;
2524 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2526 NTSTATUS ret = NT_STATUS_OK;
2528 out->ptr = 1;
2529 out->count = count;
2531 if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2532 return ret;
2534 out->set.count = count;
2536 if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2537 return ret;
2539 DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2541 return ret;
2544 /*******************************************************************
2545 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2546 ********************************************************************/
2548 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2550 prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2551 depth++;
2553 if(!prs_align(ps))
2554 return False;
2556 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2557 return False;
2559 if (out->ptr!=0) {
2560 if(!prs_uint32("count", ps, depth, &out->count))
2561 return False;
2563 /* malloc memory if unmarshalling here */
2565 if (UNMARSHALLING(ps) && out->count != 0) {
2566 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2567 return False;
2569 if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2570 return False;
2574 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2575 return False;
2578 if(!prs_ntstatus("status", ps, depth, &out->status))
2579 return False;
2581 return True;
2586 /*******************************************************************
2587 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
2588 ********************************************************************/
2590 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2592 prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2593 depth++;
2595 if(!prs_align(ps))
2596 return False;
2598 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2599 return False;
2601 return True;
2604 /*******************************************************************
2605 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
2606 ********************************************************************/
2608 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2610 prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2611 depth++;
2613 if(!prs_align(ps))
2614 return False;
2616 if(!prs_uint32("access", ps, depth, &out->access))
2617 return False;
2619 if(!prs_ntstatus("status", ps, depth, &out->status))
2620 return False;
2622 return True;
2626 /*******************************************************************
2627 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2628 ********************************************************************/
2630 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2632 prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2633 depth++;
2635 if(!prs_align(ps))
2636 return False;
2638 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2639 return False;
2641 if(!prs_uint32("access", ps, depth, &out->access))
2642 return False;
2644 return True;
2647 /*******************************************************************
2648 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2649 ********************************************************************/
2651 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2653 prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2654 depth++;
2656 if(!prs_align(ps))
2657 return False;
2659 if(!prs_ntstatus("status", ps, depth, &out->status))
2660 return False;
2662 return True;
2666 static void init_lsa_string( LSA_STRING *uni, const char *string )
2668 init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2669 init_uni_hdr(&uni->hdr, &uni->unistring);
2672 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2674 memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2675 init_lsa_string( &q_u->privname, name );
2678 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2680 prs_debug(ps, depth, desc, "smb_io_lsa_string");
2681 depth++;
2683 if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2684 return False;
2685 if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2686 return False;
2688 return True;
2691 /*******************************************************************
2692 Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE structure.
2693 ********************************************************************/
2695 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2697 prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2698 depth++;
2700 if(!prs_align(ps))
2701 return False;
2703 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2704 return False;
2705 if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2706 return False;
2708 return True;
2711 /*******************************************************************
2712 Reads or writes an LSA_R_LOOKUP_PRIV_VALUE structure.
2713 ********************************************************************/
2715 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2717 prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2718 depth++;
2720 if(!prs_align(ps))
2721 return False;
2723 if(!lsa_io_luid("luid", &out->luid, ps, depth))
2724 return False;
2726 if(!prs_ntstatus("status", ps, depth, &out->status))
2727 return False;
2729 return True;
2733 /*******************************************************************
2734 Reads or writes an LSA_Q_ADDPRIVS structure.
2735 ********************************************************************/
2737 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
2739 prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
2740 depth++;
2742 if(!prs_align(ps))
2743 return False;
2745 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2746 return False;
2748 if(!prs_uint32("count", ps, depth, &out->count))
2749 return False;
2751 if (UNMARSHALLING(ps) && out->count!=0) {
2752 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2753 return False;
2755 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
2756 return False;
2759 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2760 return False;
2762 return True;
2765 /*******************************************************************
2766 Reads or writes an LSA_R_ADDPRIVS structure.
2767 ********************************************************************/
2769 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
2771 prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
2772 depth++;
2774 if(!prs_align(ps))
2775 return False;
2777 if(!prs_ntstatus("status", ps, depth, &out->status))
2778 return False;
2780 return True;
2783 /*******************************************************************
2784 Reads or writes an LSA_Q_REMOVEPRIVS structure.
2785 ********************************************************************/
2787 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
2789 prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
2790 depth++;
2792 if(!prs_align(ps))
2793 return False;
2795 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2796 return False;
2798 if(!prs_uint32("allrights", ps, depth, &out->allrights))
2799 return False;
2801 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2802 return False;
2805 * JFM: I'm not sure at all if the count is inside the ptr
2806 * never seen one with ptr=0
2809 if (out->ptr!=0) {
2810 if(!prs_uint32("count", ps, depth, &out->count))
2811 return False;
2813 if (UNMARSHALLING(ps) && out->count!=0) {
2814 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2815 return False;
2817 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
2818 return False;
2821 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2822 return False;
2825 return True;
2828 /*******************************************************************
2829 Reads or writes an LSA_R_REMOVEPRIVS structure.
2830 ********************************************************************/
2832 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
2834 prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
2835 depth++;
2837 if(!prs_align(ps))
2838 return False;
2840 if(!prs_ntstatus("status", ps, depth, &out->status))
2841 return False;
2843 return True;
2846 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
2848 POLICY_HND zero_pol;
2850 ZERO_STRUCT(zero_pol);
2851 return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
2854 /*******************************************************************
2855 Reads or writes an LSA_DNS_DOM_INFO structure.
2856 ********************************************************************/
2858 BOOL lsa_io_dns_dom_info(const char *desc, LSA_DNS_DOM_INFO *info,
2859 prs_struct *ps, int depth)
2861 prs_debug(ps, depth, desc, "lsa_io_dns_dom_info");
2862 depth++;
2864 if(!prs_align(ps))
2865 return False;
2866 if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
2867 return False;
2868 if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
2869 return False;
2870 if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
2871 return False;
2873 if(!prs_align(ps))
2874 return False;
2875 if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
2876 return False;
2878 if(!prs_align(ps))
2879 return False;
2880 if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
2881 return False;
2883 if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
2884 info->hdr_nb_dom_name.buffer, ps, depth))
2885 return False;
2886 if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name,
2887 info->hdr_dns_dom_name.buffer, ps, depth))
2888 return False;
2889 if(!smb_io_unistr2("forest", &info->uni_forest_name,
2890 info->hdr_forest_name.buffer, ps, depth))
2891 return False;
2893 if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
2894 return False;
2896 return True;
2900 /*******************************************************************
2901 Inits an LSA_Q_QUERY_INFO2 structure.
2902 ********************************************************************/
2904 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
2906 DEBUG(5, ("init_q_query2\n"));
2908 memcpy(&in->pol, hnd, sizeof(in->pol));
2910 in->info_class = info_class;
2913 /*******************************************************************
2914 Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
2915 ********************************************************************/
2917 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
2919 prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
2920 depth++;
2922 if(!prs_align(ps))
2923 return False;
2925 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
2926 return False;
2928 if(!prs_uint16("info_class", ps, depth, &in->info_class))
2929 return False;
2931 return True;
2934 /*******************************************************************
2935 Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
2936 ********************************************************************/
2938 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
2939 prs_struct *ps, int depth)
2941 prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
2942 depth++;
2944 if(!prs_align(ps))
2945 return False;
2947 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2948 return False;
2949 if(!prs_uint16("info_class", ps, depth, &out->info_class))
2950 return False;
2951 switch(out->info_class) {
2952 case 0x000c:
2953 if (!lsa_io_dns_dom_info("info12", &out->info.dns_dom_info,
2954 ps, depth))
2955 return False;
2956 break;
2957 default:
2958 DEBUG(0,("lsa_io_r_query_info2: unknown info class %d\n",
2959 out->info_class));
2960 return False;
2963 if(!prs_align(ps))
2964 return False;
2965 if(!prs_ntstatus("status", ps, depth, &out->status))
2966 return False;
2968 return True;
2971 /*******************************************************************
2972 Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
2973 ********************************************************************/
2974 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in,
2975 POLICY_HND *hnd,
2976 uint32 count,
2977 DOM_SID *sid)
2979 DEBUG(5, ("init_q_enum_acct_rights\n"));
2981 in->pol = *hnd;
2982 init_dom_sid2(&in->sid, sid);
2985 /*******************************************************************
2986 ********************************************************************/
2987 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
2989 uint32 i;
2990 char *privname;
2991 const char **privname_array = NULL;
2992 int num_priv = 0;
2994 for ( i=0; i<privileges->count; i++ ) {
2995 privname = luid_to_privilege_name( &privileges->set[i].luid );
2996 if ( privname ) {
2997 if ( !add_string_to_array( get_talloc_ctx(), privname, &privname_array, &num_priv ) )
2998 return NT_STATUS_NO_MEMORY;
3002 if ( num_priv ) {
3003 out->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3005 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) )
3006 return NT_STATUS_NO_MEMORY;
3008 out->count = num_priv;
3011 return NT_STATUS_OK;
3014 /*******************************************************************
3015 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3016 ********************************************************************/
3017 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3020 if (in == NULL)
3021 return False;
3023 prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3024 depth++;
3026 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3027 return False;
3029 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3030 return False;
3032 return True;
3036 /*******************************************************************
3037 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3038 ********************************************************************/
3039 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3041 prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3042 depth++;
3044 if(!prs_uint32("count ", ps, depth, &out->count))
3045 return False;
3047 if ( !prs_pointer("rights", ps, depth, (void**)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3048 return False;
3050 if(!prs_align(ps))
3051 return False;
3053 if(!prs_ntstatus("status", ps, depth, &out->status))
3054 return False;
3056 return True;
3060 /*******************************************************************
3061 Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3062 ********************************************************************/
3063 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd,
3064 DOM_SID *sid, uint32 count, const char **rights )
3066 DEBUG(5, ("init_q_add_acct_rights\n"));
3068 in->pol = *hnd;
3069 init_dom_sid2(&in->sid, sid);
3071 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3072 init_unistr4_array( in->rights, count, rights );
3074 in->count = count;
3078 /*******************************************************************
3079 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3080 ********************************************************************/
3081 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3083 prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3084 depth++;
3086 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3087 return False;
3089 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3090 return False;
3092 if(!prs_uint32("count", ps, depth, &in->count))
3093 return False;
3095 if ( !prs_pointer("rights", ps, depth, (void**)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3096 return False;
3098 return True;
3101 /*******************************************************************
3102 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3103 ********************************************************************/
3104 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3106 prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3107 depth++;
3109 if(!prs_ntstatus("status", ps, depth, &out->status))
3110 return False;
3112 return True;
3116 /*******************************************************************
3117 Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3118 ********************************************************************/
3119 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in,
3120 POLICY_HND *hnd,
3121 DOM_SID *sid,
3122 uint32 removeall,
3123 uint32 count,
3124 const char **rights)
3126 DEBUG(5, ("init_q_remove_acct_rights\n"));
3128 in->pol = *hnd;
3130 init_dom_sid2(&in->sid, sid);
3132 in->removeall = removeall;
3133 in->count = count;
3135 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3136 init_unistr4_array( in->rights, count, rights );
3140 /*******************************************************************
3141 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3142 ********************************************************************/
3143 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3145 prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3146 depth++;
3148 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3149 return False;
3151 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3152 return False;
3154 if(!prs_uint32("removeall", ps, depth, &in->removeall))
3155 return False;
3157 if(!prs_uint32("count", ps, depth, &in->count))
3158 return False;
3160 if ( !prs_pointer("rights", ps, depth, (void**)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3161 return False;
3163 return True;
3166 /*******************************************************************
3167 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3168 ********************************************************************/
3169 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3171 prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3172 depth++;
3174 if(!prs_ntstatus("status", ps, depth, &out->status))
3175 return False;
3177 return True;
3180 /*******************************************************************
3181 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3182 ********************************************************************/
3184 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3186 memcpy(&q->pol, hnd, sizeof(q->pol));
3188 init_dom_sid2(&q->sid, sid);
3189 q->access_mask = desired_access;
3192 /*******************************************************************
3193 ********************************************************************/
3195 #if 0 /* jerry, I think this not correct - gd */
3196 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3198 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3199 depth++;
3201 if(!prs_align(ps))
3202 return False;
3204 if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3205 return False;
3207 if(!prs_uint32("count", ps, depth, &in->count))
3208 return False;
3210 if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3211 return False;
3213 return True;
3215 #endif
3218 /*******************************************************************
3219 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3220 ********************************************************************/
3222 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q,
3223 POLICY_HND *hnd,
3224 const char *name,
3225 uint32 desired_access)
3227 memcpy(&q->pol, hnd, sizeof(q->pol));
3229 init_lsa_string(&q->name, name);
3230 q->access_mask = desired_access;
3233 /*******************************************************************
3234 ********************************************************************/
3237 /*******************************************************************
3238 Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3239 ********************************************************************/
3241 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3243 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3244 depth++;
3246 if(!prs_align(ps))
3247 return False;
3249 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3250 return False;
3252 if(!prs_align(ps))
3253 return False;
3255 if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3256 return False;
3258 if(!prs_align(ps))
3259 return False;
3261 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3262 return False;
3264 return True;
3267 /*******************************************************************
3268 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3269 ********************************************************************/
3271 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3273 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3274 depth++;
3276 if(!prs_align(ps))
3277 return False;
3279 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3280 return False;
3282 if(!prs_ntstatus("status", ps, depth, &out->status))
3283 return False;
3285 return True;
3288 /*******************************************************************
3289 ********************************************************************/
3291 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3293 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3294 depth++;
3296 if(!prs_align(ps))
3297 return False;
3299 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3300 return False;
3302 if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3303 return False;
3305 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3306 return False;
3308 return True;
3311 /*******************************************************************
3312 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3313 ********************************************************************/
3315 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3317 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3318 depth++;
3320 if(!prs_align(ps))
3321 return False;
3323 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3324 return False;
3326 if(!prs_ntstatus("status", ps, depth, &out->status))
3327 return False;
3329 return True;
3332 /*******************************************************************
3333 ********************************************************************/
3335 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3337 prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3338 depth++;
3340 if(!prs_align(ps))
3341 return False;
3343 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3344 return False;
3346 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3347 return False;
3348 if(!prs_align(ps))
3349 return False;
3351 if(!prs_uint32("access", ps, depth, &in->access))
3352 return False;
3354 return True;
3357 /*******************************************************************
3358 ********************************************************************/
3360 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3362 prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3363 depth++;
3365 if(!prs_align(ps))
3366 return False;
3368 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3369 return False;
3371 if(!prs_ntstatus("status", ps, depth, &out->status))
3372 return False;
3374 return True;
3377 /*******************************************************************
3378 ********************************************************************/
3380 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3382 prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3383 depth++;
3385 if(!prs_align(ps))
3386 return False;
3388 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3389 return False;
3391 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3392 return False;
3393 if(!prs_align(ps))
3394 return False;
3396 if(!prs_uint32("access", ps, depth, &in->access))
3397 return False;
3399 return True;
3402 /*******************************************************************
3403 ********************************************************************/
3405 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3407 prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3408 depth++;
3410 if(!prs_align(ps))
3411 return False;
3413 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3414 return False;
3416 if(!prs_ntstatus("status", ps, depth, &out->status))
3417 return False;
3419 return True;
3424 /*******************************************************************
3425 ********************************************************************/
3427 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3429 prs_debug(ps, depth, desc, "lsa_io_data_blob");
3430 depth++;
3432 if ( !prs_uint32("size", ps, depth, &blob->size) )
3433 return False;
3434 if ( !prs_uint32("size", ps, depth, &blob->size) )
3435 return False;
3437 if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3438 return False;
3440 return True;
3443 /*******************************************************************
3444 ********************************************************************/
3446 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3448 prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3449 depth++;
3451 if ( !prs_align(ps) )
3452 return False;
3454 if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3455 return False;
3457 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3458 return False;
3460 if( !prs_align(ps) )
3461 return False;
3462 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3463 return False;
3466 return True;
3469 /*******************************************************************
3470 ********************************************************************/
3472 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3474 prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3475 depth++;
3477 if(!prs_ntstatus("status", ps, depth, &out->status))
3478 return False;
3480 return True;
3483 /*******************************************************************
3484 ********************************************************************/
3486 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3488 prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3489 depth++;
3491 if(!prs_align(ps))
3492 return False;
3494 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3495 return False;
3497 return True;
3500 /*******************************************************************
3501 ********************************************************************/
3503 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3505 prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3506 depth++;
3508 if(!prs_ntstatus("status", ps, depth, &out->status))
3509 return False;
3511 return True;
3514 /*******************************************************************
3515 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3516 ********************************************************************/
3518 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q,
3519 POLICY_HND *hnd, uint16 info_class)
3521 DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3523 q->pol = *hnd;
3524 q->info_class = info_class;
3527 /*******************************************************************
3528 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3529 ********************************************************************/
3531 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q,
3532 POLICY_HND *hnd, uint16 info_class,
3533 const char *dom_name)
3535 DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3537 q->pol = *hnd;
3538 init_lsa_string(&q->domain_name, dom_name );
3539 q->info_class = info_class;
3542 /*******************************************************************
3543 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3544 ********************************************************************/
3546 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q,
3547 POLICY_HND *hnd, uint16 info_class,
3548 DOM_SID *dom_sid)
3550 DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3552 q->pol = *hnd;
3553 init_dom_sid2(&q->dom_sid, dom_sid);
3554 q->info_class = info_class;
3557 /*******************************************************************
3558 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3559 ********************************************************************/
3561 BOOL lsa_io_q_query_trusted_domain_info(const char *desc,
3562 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3563 prs_struct *ps, int depth)
3565 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3566 depth++;
3568 if(!prs_align(ps))
3569 return False;
3571 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3572 return False;
3574 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3575 return False;
3577 return True;
3581 /*******************************************************************
3582 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3583 ********************************************************************/
3585 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc,
3586 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3587 prs_struct *ps, int depth)
3589 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3590 depth++;
3592 if(!prs_align(ps))
3593 return False;
3595 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3596 return False;
3598 if(!prs_align(ps))
3599 return False;
3601 if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3602 return False;
3604 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3605 return False;
3607 return True;
3610 /*******************************************************************
3611 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3612 ********************************************************************/
3614 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc,
3615 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3616 prs_struct *ps, int depth)
3618 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3619 depth++;
3621 if(!prs_align(ps))
3622 return False;
3624 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3625 return False;
3627 if(!prs_align(ps))
3628 return False;
3630 if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3631 return False;
3633 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3634 return False;
3636 return True;
3639 /*******************************************************************
3640 ********************************************************************/
3642 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr,
3643 prs_struct *ps, int depth)
3645 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3646 depth++;
3648 if(!prs_align(ps))
3649 return False;
3651 if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3652 return False;
3654 if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3655 return False;
3657 if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3658 return False;
3660 return True;
3663 /*******************************************************************
3664 ********************************************************************/
3666 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf,
3667 prs_struct *ps, int depth, int length, int size)
3669 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3670 depth++;
3672 if ( UNMARSHALLING(ps) ) {
3673 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3674 return False;
3677 if (!prs_uint32("size", ps, depth, &buf->size))
3678 return False;
3680 if (!prs_uint32("offset", ps, depth, &buf->offset))
3681 return False;
3683 if (!prs_uint32("length", ps, depth, &buf->length))
3684 return False;
3686 if(!prs_uint8s(False, "data", ps, depth, buf->data, size))
3687 return False;
3689 return True;
3692 /*******************************************************************
3693 ********************************************************************/
3695 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name,
3696 prs_struct *ps, int depth)
3698 if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3699 return False;
3701 return True;
3704 /*******************************************************************
3705 ********************************************************************/
3707 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix,
3708 prs_struct *ps, int depth)
3710 if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3711 return False;
3713 return True;
3716 /*******************************************************************
3717 ********************************************************************/
3719 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password,
3720 prs_struct *ps, int depth)
3722 if(!prs_align(ps))
3723 return False;
3725 if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3726 return False;
3728 if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3729 return False;
3731 if (&password->ptr_password) {
3733 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3734 return False;
3736 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth,
3737 password->password_hdr.length, password->password_hdr.size))
3738 return False;
3741 if (&password->ptr_old_password) {
3743 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3744 return False;
3746 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth,
3747 password->old_password_hdr.length, password->old_password_hdr.size))
3748 return False;
3751 return True;
3754 /*******************************************************************
3755 ********************************************************************/
3757 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex,
3758 prs_struct *ps, int depth)
3760 uint32 dom_sid_ptr;
3762 if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
3763 return False;
3765 if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
3766 return False;
3768 if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
3769 return False;
3771 if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
3772 return False;
3774 if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
3775 return False;
3777 if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
3778 return False;
3780 if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
3781 return False;
3783 if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
3784 return False;
3786 if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
3787 return False;
3789 return True;
3792 /*******************************************************************
3793 ********************************************************************/
3795 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
3797 prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
3798 depth++;
3800 if(!prs_uint16("info_class", ps, depth, &info->info_class))
3801 return False;
3803 if(!prs_align(ps))
3804 return False;
3806 switch (info->info_class) {
3807 case 1:
3808 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
3809 return False;
3810 break;
3811 case 3:
3812 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
3813 return False;
3814 break;
3815 case 4:
3816 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
3817 return False;
3818 break;
3819 case 6:
3820 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
3821 return False;
3822 break;
3823 default:
3824 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
3825 return False;
3828 return True;
3831 /*******************************************************************
3832 Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
3833 ********************************************************************/
3835 BOOL lsa_io_r_query_trusted_domain_info(const char *desc,
3836 LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q,
3837 prs_struct *ps, int depth)
3839 if (r_q == NULL)
3840 return False;
3842 prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
3843 depth++;
3845 if (!prs_pointer("trustdom", ps, depth, (void**)&r_q->info,
3846 sizeof(LSA_TRUSTED_DOMAIN_INFO),
3847 (PRS_POINTER_CAST)lsa_io_trustdom_query) )
3848 return False;
3850 if(!prs_align(ps))
3851 return False;
3853 if(!prs_ntstatus("status", ps, depth, &r_q->status))
3854 return False;
3856 return True;
3859 /*******************************************************************
3860 Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
3861 ********************************************************************/
3863 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
3865 DEBUG(5, ("init_q_query_dom_info\n"));
3867 memcpy(&in->pol, hnd, sizeof(in->pol));
3869 in->info_class = info_class;
3872 /*******************************************************************
3873 Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
3874 ********************************************************************/
3876 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
3878 prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
3879 depth++;
3881 if(!prs_align(ps))
3882 return False;
3884 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3885 return False;
3887 if(!prs_uint16("info_class", ps, depth, &in->info_class))
3888 return False;
3890 return True;
3893 /*******************************************************************
3894 Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
3895 ********************************************************************/
3897 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy,
3898 prs_struct *ps, int depth)
3900 if (!prs_align_uint64(ps))
3901 return False;
3903 if (!prs_align(ps))
3904 return False;
3906 if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
3907 return False;
3909 if (!prs_align_uint64(ps))
3910 return False;
3912 if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
3913 return False;
3915 if (!prs_align_uint64(ps))
3916 return False;
3918 if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
3919 return False;
3921 if (!prs_align_uint64(ps))
3922 return False;
3924 if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
3925 return False;
3927 if (!prs_align_uint64(ps))
3928 return False;
3930 if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
3931 return False;
3933 if (!prs_align_uint64(ps))
3934 return False;
3936 if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
3937 return False;
3939 return True;
3942 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
3944 prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
3945 depth++;
3947 if(!prs_align_uint16(ps))
3948 return False;
3950 if(!prs_uint16("info_class", ps, depth, &info->info_class))
3951 return False;
3953 switch (info->info_class) {
3954 case 3:
3955 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
3956 return False;
3957 break;
3958 default:
3959 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
3960 return False;
3961 break;
3964 return True;
3968 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
3969 prs_struct *ps, int depth)
3971 prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
3972 depth++;
3974 if (!prs_pointer("dominfo", ps, depth, (void**)&out->info,
3975 sizeof(LSA_DOM_INFO_UNION),
3976 (PRS_POINTER_CAST)lsa_io_dom_info_query) )
3977 return False;
3979 if(!prs_ntstatus("status", ps, depth, &out->status))
3980 return False;
3982 return True;