r18865: fixed some of the most obvious NTSTATUS/WERROR mixups in Samba3. It
[Samba/nascimento.git] / source3 / rpc_parse / parse_lsa.c
blobe1630f79f481a08f4a5ffb21e8729c90787057d4
1 /*
2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997,
7 * Copyright (C) Andrew Bartlett 2002,
8 * Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2002.
9 * Copyright (C) Gerald )Jerry) Carter 2005
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 #include "includes.h"
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_RPC_PARSE
31 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
32 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
34 /*******************************************************************
35 Inits a LSA_TRANS_NAME structure.
36 ********************************************************************/
38 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
39 uint16 sid_name_use, const char *name, uint32 idx)
41 trn->sid_name_use = sid_name_use;
42 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
43 init_uni_hdr(&trn->hdr_name, uni_name);
44 trn->domain_idx = idx;
47 /*******************************************************************
48 Reads or writes a LSA_TRANS_NAME structure.
49 ********************************************************************/
51 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps,
52 int depth)
54 prs_debug(ps, depth, desc, "lsa_io_trans_name");
55 depth++;
57 if(!prs_align(ps))
58 return False;
60 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
61 return False;
62 if(!prs_align(ps))
63 return False;
65 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
66 return False;
67 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
68 return False;
70 return True;
73 /*******************************************************************
74 Inits a LSA_TRANS_NAME2 structure.
75 ********************************************************************/
77 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
78 uint16 sid_name_use, const char *name, uint32 idx)
80 trn->sid_name_use = sid_name_use;
81 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
82 init_uni_hdr(&trn->hdr_name, uni_name);
83 trn->domain_idx = idx;
84 trn->unknown = 0;
87 /*******************************************************************
88 Reads or writes a LSA_TRANS_NAME2 structure.
89 ********************************************************************/
91 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps,
92 int depth)
94 prs_debug(ps, depth, desc, "lsa_io_trans_name2");
95 depth++;
97 if(!prs_align(ps))
98 return False;
100 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
101 return False;
102 if(!prs_align(ps))
103 return False;
105 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
106 return False;
107 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
108 return False;
109 if(!prs_uint32("unknown ", ps, depth, &trn->unknown))
110 return False;
112 return True;
115 /*******************************************************************
116 Reads or writes a DOM_R_REF structure.
117 ********************************************************************/
119 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
121 unsigned int i;
123 prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
124 depth++;
126 if(!prs_align(ps))
127 return False;
129 if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
130 return False;
131 if(!prs_uint32("ptr_ref_dom ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
132 return False;
133 if(!prs_uint32("max_entries ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
134 return False;
136 SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
138 if (dom->ptr_ref_dom != 0) {
140 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
141 return False;
143 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
145 for (i = 0; i < dom->num_ref_doms_1; i++) {
146 fstring t;
148 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
149 if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
150 return False;
152 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
153 if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
154 return False;
157 for (i = 0; i < dom->num_ref_doms_2; i++) {
158 fstring t;
160 if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
161 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
162 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
163 return False;
164 if(!prs_align(ps))
165 return False;
168 if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
169 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
170 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
171 return False;
176 return True;
179 /*******************************************************************
180 Inits an LSA_SEC_QOS structure.
181 ********************************************************************/
183 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
185 DEBUG(5, ("init_lsa_sec_qos\n"));
187 qos->len = 0x0c; /* length of quality of service block, in bytes */
188 qos->sec_imp_level = imp_lev;
189 qos->sec_ctxt_mode = ctxt;
190 qos->effective_only = eff;
193 /*******************************************************************
194 Reads or writes an LSA_SEC_QOS structure.
195 ********************************************************************/
197 static BOOL lsa_io_sec_qos(const char *desc, LSA_SEC_QOS *qos, prs_struct *ps,
198 int depth)
200 uint32 start;
202 prs_debug(ps, depth, desc, "lsa_io_obj_qos");
203 depth++;
205 if(!prs_align(ps))
206 return False;
208 start = prs_offset(ps);
210 /* these pointers had _better_ be zero, because we don't know
211 what they point to!
213 if(!prs_uint32("len ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
214 return False;
215 if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
216 return False;
217 if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
218 return False;
219 if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
220 return False;
222 if (qos->len != prs_offset(ps) - start) {
223 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
224 qos->len, prs_offset(ps) - start));
227 return True;
230 /*******************************************************************
231 Inits an LSA_OBJ_ATTR structure.
232 ********************************************************************/
234 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
236 DEBUG(5, ("init_lsa_obj_attr\n"));
238 attr->len = 0x18; /* length of object attribute block, in bytes */
239 attr->ptr_root_dir = 0;
240 attr->ptr_obj_name = 0;
241 attr->attributes = attributes;
242 attr->ptr_sec_desc = 0;
244 if (qos != NULL) {
245 attr->ptr_sec_qos = 1;
246 attr->sec_qos = qos;
247 } else {
248 attr->ptr_sec_qos = 0;
249 attr->sec_qos = NULL;
253 /*******************************************************************
254 Reads or writes an LSA_OBJ_ATTR structure.
255 ********************************************************************/
257 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps,
258 int depth)
260 prs_debug(ps, depth, desc, "lsa_io_obj_attr");
261 depth++;
263 if(!prs_align(ps))
264 return False;
266 /* these pointers had _better_ be zero, because we don't know
267 what they point to!
269 if(!prs_uint32("len ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
270 return False;
271 if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
272 return False;
273 if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
274 return False;
275 if(!prs_uint32("attributes ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
276 return False;
277 if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
278 return False;
279 if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
280 return False;
282 if (attr->ptr_sec_qos != 0) {
283 if (UNMARSHALLING(ps))
284 if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
285 return False;
287 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
288 return False;
291 return True;
295 /*******************************************************************
296 Inits an LSA_Q_OPEN_POL structure.
297 ********************************************************************/
299 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
300 uint32 attributes, uint32 desired_access,
301 LSA_SEC_QOS *qos)
303 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes,
304 desired_access));
306 in->ptr = 1; /* undocumented pointer */
308 in->des_access = desired_access;
310 in->system_name = system_name;
311 init_lsa_obj_attr(&in->attr, attributes, qos);
314 /*******************************************************************
315 Reads or writes an LSA_Q_OPEN_POL structure.
316 ********************************************************************/
318 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps,
319 int depth)
321 prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
322 depth++;
324 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
325 return False;
326 if(!prs_uint16("system_name", ps, depth, &in->system_name))
327 return False;
328 if(!prs_align( ps ))
329 return False;
331 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
332 return False;
334 if(!prs_uint32("des_access", ps, depth, &in->des_access))
335 return False;
337 return True;
340 /*******************************************************************
341 Reads or writes an LSA_R_OPEN_POL structure.
342 ********************************************************************/
344 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps,
345 int depth)
347 prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
348 depth++;
350 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
351 return False;
353 if(!prs_ntstatus("status", ps, depth, &out->status))
354 return False;
356 return True;
359 /*******************************************************************
360 Inits an LSA_Q_OPEN_POL2 structure.
361 ********************************************************************/
363 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
364 uint32 attributes, uint32 desired_access,
365 LSA_SEC_QOS *qos)
367 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes,
368 desired_access));
370 in->ptr = 1; /* undocumented pointer */
372 in->des_access = desired_access;
374 init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
376 init_lsa_obj_attr(&in->attr, attributes, qos);
379 /*******************************************************************
380 Reads or writes an LSA_Q_OPEN_POL2 structure.
381 ********************************************************************/
383 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps,
384 int depth)
386 prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
387 depth++;
389 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
390 return False;
392 if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
393 return False;
394 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
395 return False;
397 if(!prs_uint32("des_access", ps, depth, &in->des_access))
398 return False;
400 return True;
403 /*******************************************************************
404 Reads or writes an LSA_R_OPEN_POL2 structure.
405 ********************************************************************/
407 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps,
408 int depth)
410 prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
411 depth++;
413 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
414 return False;
416 if(!prs_ntstatus("status", ps, depth, &out->status))
417 return False;
419 return True;
422 /*******************************************************************
423 makes an LSA_Q_QUERY_SEC_OBJ structure.
424 ********************************************************************/
426 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd,
427 uint32 sec_info)
429 DEBUG(5, ("init_q_query_sec_obj\n"));
431 in->pol = *hnd;
432 in->sec_info = sec_info;
434 return;
437 /*******************************************************************
438 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
439 ********************************************************************/
441 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in,
442 prs_struct *ps, int depth)
444 prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
445 depth++;
447 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
448 return False;
450 if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
451 return False;
453 return True;
456 /*******************************************************************
457 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
458 ********************************************************************/
460 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
462 prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
463 depth++;
465 if (!prs_align(ps))
466 return False;
468 if (!prs_uint32("ptr", ps, depth, &out->ptr))
469 return False;
471 if (out->ptr != 0) {
472 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
473 return False;
476 if (!prs_ntstatus("status", ps, depth, &out->status))
477 return False;
479 return True;
482 /*******************************************************************
483 Inits an LSA_Q_QUERY_INFO structure.
484 ********************************************************************/
486 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
488 DEBUG(5, ("init_q_query\n"));
490 memcpy(&in->pol, hnd, sizeof(in->pol));
492 in->info_class = info_class;
495 /*******************************************************************
496 Reads or writes an LSA_Q_QUERY_INFO structure.
497 ********************************************************************/
499 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps,
500 int depth)
502 prs_debug(ps, depth, desc, "lsa_io_q_query");
503 depth++;
505 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
506 return False;
508 if(!prs_uint16("info_class", ps, depth, &in->info_class))
509 return False;
511 return True;
514 /*******************************************************************
515 makes an LSA_Q_ENUM_TRUST_DOM structure.
516 ********************************************************************/
517 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
518 uint32 enum_context, uint32 preferred_len)
520 DEBUG(5, ("init_q_enum_trust_dom\n"));
522 q_e->pol = *pol;
523 q_e->enum_context = enum_context;
524 q_e->preferred_len = preferred_len;
526 return True;
529 /*******************************************************************
530 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
531 ********************************************************************/
533 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e,
534 prs_struct *ps, int depth)
536 prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
537 depth++;
539 if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
540 return False;
542 if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
543 return False;
544 if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
545 return False;
547 return True;
550 /*******************************************************************
551 Inits an LSA_R_ENUM_TRUST_DOM structure.
552 ********************************************************************/
554 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
555 uint32 enum_context, uint32 num_domains,
556 struct trustdom_info **td)
558 unsigned int i;
560 DEBUG(5, ("init_r_enum_trust_dom\n"));
562 out->enum_context = enum_context;
563 out->count = num_domains;
565 if ( num_domains != 0 ) {
567 /* allocate container memory */
569 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
571 if ( !out->domlist ) {
572 out->status = NT_STATUS_NO_MEMORY;
573 return;
576 out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
577 out->count );
579 if ( !out->domlist->domains ) {
580 out->status = NT_STATUS_NO_MEMORY;
581 return;
584 out->domlist->count = out->count;
586 /* initialize the list of domains and their sid */
588 for (i = 0; i < num_domains; i++) {
589 smb_ucs2_t *name;
590 if ( !(out->domlist->domains[i].sid =
591 TALLOC_P(ctx, DOM_SID2)) ) {
592 out->status = NT_STATUS_NO_MEMORY;
593 return;
596 init_dom_sid2(out->domlist->domains[i].sid,
597 &(td[i])->sid);
598 if (push_ucs2_talloc(ctx, &name, (td[i])->name) == (size_t)-1){
599 out->status = NT_STATUS_NO_MEMORY;
600 return;
602 init_unistr4_w(ctx, &out->domlist->domains[i].name,
603 name);
609 /*******************************************************************
610 ********************************************************************/
612 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
614 int i;
616 prs_debug(ps, depth, desc, "lsa_io_domain_list");
617 depth++;
619 if(!prs_uint32("count", ps, depth, &domlist->count))
620 return False;
622 if ( domlist->count == 0 )
623 return True;
625 if ( UNMARSHALLING(ps) ) {
626 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
627 return False;
630 /* headers */
632 for ( i=0; i<domlist->count; i++ ) {
633 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
634 return False;
635 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
636 return False;
639 /* data */
641 for ( i=0; i<domlist->count; i++ ) {
642 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
643 return False;
644 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
645 return False;
648 return True;
651 /*******************************************************************
652 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
653 ********************************************************************/
655 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out,
656 prs_struct *ps, int depth)
658 prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
659 depth++;
661 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
662 return False;
664 if(!prs_uint32("count", ps, depth, &out->count))
665 return False;
667 if ( !prs_pointer("trusted_domains", ps, depth, (void*)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
668 return False;
670 if(!prs_ntstatus("status", ps, depth, &out->status))
671 return False;
673 return True;
676 /*******************************************************************
677 reads or writes a structure.
678 ********************************************************************/
680 static BOOL lsa_io_dom_query_1(const char *desc, DOM_QUERY_1 *d_q, prs_struct *ps, int depth)
682 if (d_q == NULL)
683 return False;
685 prs_debug(ps, depth, desc, "lsa_io_dom_query_1");
686 depth++;
688 if (!prs_align(ps))
689 return False;
691 if (!prs_uint32("percent_full", ps, depth, &d_q->percent_full))
692 return False;
693 if (!prs_uint32("log_size", ps, depth, &d_q->log_size))
694 return False;
695 if (!smb_io_nttime("retention_time", ps, depth, &d_q->retention_time))
696 return False;
697 if (!prs_uint8("shutdown_in_progress", ps, depth, &d_q->shutdown_in_progress))
698 return False;
699 if (!smb_io_nttime("time_to_shutdown", ps, depth, &d_q->time_to_shutdown))
700 return False;
701 if (!prs_uint32("next_audit_record", ps, depth, &d_q->next_audit_record))
702 return False;
703 if (!prs_uint32("unknown", ps, depth, &d_q->unknown))
704 return False;
706 return True;
709 /*******************************************************************
710 reads or writes a structure.
711 ********************************************************************/
713 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
715 if (d_q == NULL)
716 return False;
718 prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
719 depth++;
721 if (!prs_align(ps))
722 return False;
724 if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
725 return False;
726 if (!prs_uint32("ptr ", ps, depth, &d_q->ptr))
727 return False;
728 if (!prs_uint32("count1", ps, depth, &d_q->count1))
729 return False;
731 if (d_q->ptr) {
733 if (!prs_uint32("count2", ps, depth, &d_q->count2))
734 return False;
736 if (d_q->count1 != d_q->count2)
737 return False;
739 if (UNMARSHALLING(ps)) {
740 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
741 if (!d_q->auditsettings) {
742 return False;
746 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
747 return False;
750 return True;
753 /*******************************************************************
754 reads or writes a dom query structure.
755 ********************************************************************/
757 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
759 if (d_q == NULL)
760 return False;
762 prs_debug(ps, depth, desc, "lsa_io_dom_query_3");
763 depth++;
765 if(!prs_align(ps))
766 return False;
768 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
769 return False;
770 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
771 return False;
773 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
774 return False;
775 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
776 return False;
778 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
779 return False;
781 if(!prs_align(ps))
782 return False;
784 if (d_q->buffer_dom_sid != 0) {
785 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
786 return False;
787 } else {
788 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
791 return True;
794 /*******************************************************************
795 Reads or writes a dom query structure.
796 ********************************************************************/
798 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
800 return lsa_io_dom_query_3("", d_q, ps, depth);
803 /*******************************************************************
804 Reads or writes a dom query structure.
805 ********************************************************************/
807 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
809 if (d_q == NULL)
810 return False;
812 prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
813 depth++;
815 if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
816 return False;
818 return True;
821 /*******************************************************************
822 Reads or writes a dom query structure.
823 ********************************************************************/
825 static BOOL lsa_io_dom_query_10(const char *desc, DOM_QUERY_10 *d_q, prs_struct *ps, int depth)
827 if (d_q == NULL)
828 return False;
830 prs_debug(ps, depth, desc, "lsa_io_dom_query_10");
831 depth++;
833 if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
834 return False;
836 return True;
839 /*******************************************************************
840 Reads or writes a dom query structure.
841 ********************************************************************/
843 static BOOL lsa_io_dom_query_11(const char *desc, DOM_QUERY_11 *d_q, prs_struct *ps, int depth)
845 if (d_q == NULL)
846 return False;
848 prs_debug(ps, depth, desc, "lsa_io_dom_query_11");
849 depth++;
851 if (!prs_uint16("unknown", ps, depth, &d_q->unknown))
852 return False;
853 if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
854 return False;
855 if (!prs_uint8("log_is_full", ps, depth, &d_q->log_is_full))
856 return False;
858 return True;
861 /*******************************************************************
862 Reads or writes an LSA_DNS_DOM_INFO structure.
863 ********************************************************************/
865 BOOL lsa_io_dom_query_12(const char *desc, DOM_QUERY_12 *info, prs_struct *ps, int depth)
867 prs_debug(ps, depth, desc, "lsa_io_dom_query_12");
868 depth++;
870 if(!prs_align(ps))
871 return False;
872 if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
873 return False;
874 if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
875 return False;
876 if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
877 return False;
879 if(!prs_align(ps))
880 return False;
881 if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
882 return False;
884 if(!prs_align(ps))
885 return False;
886 if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
887 return False;
889 if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
890 info->hdr_nb_dom_name.buffer, ps, depth))
891 return False;
892 if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name,
893 info->hdr_dns_dom_name.buffer, ps, depth))
894 return False;
895 if(!smb_io_unistr2("forest", &info->uni_forest_name,
896 info->hdr_forest_name.buffer, ps, depth))
897 return False;
899 if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
900 return False;
902 return True;
906 /*******************************************************************
907 Inits an LSA_Q_QUERY_INFO structure.
908 ********************************************************************/
910 void init_q_set(LSA_Q_SET_INFO *in, POLICY_HND *hnd, uint16 info_class, LSA_INFO_CTR ctr)
912 DEBUG(5,("init_q_set\n"));
914 in->info_class = info_class;
916 in->pol = *hnd;
918 in->ctr = ctr;
919 in->ctr.info_class = info_class;
922 /*******************************************************************
923 reads or writes a structure.
924 ********************************************************************/
926 static BOOL lsa_io_query_info_ctr2(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR2 *ctr)
928 prs_debug(ps, depth, desc, "lsa_io_query_info_ctr2");
929 depth++;
931 if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
932 return False;
934 switch (ctr->info_class) {
935 case 1:
936 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
937 return False;
938 break;
939 case 2:
940 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
941 return False;
942 break;
943 case 3:
944 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
945 return False;
946 break;
947 case 5:
948 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
949 return False;
950 break;
951 case 6:
952 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
953 return False;
954 break;
955 case 10:
956 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
957 return False;
958 break;
959 case 11:
960 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
961 return False;
962 break;
963 case 12:
964 if(!lsa_io_dom_query_12("", &ctr->info.id12, ps, depth))
965 return False;
966 break;
967 default:
968 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
969 return False;
970 break;
973 return True;
977 /*******************************************************************
978 reads or writes a structure.
979 ********************************************************************/
981 static BOOL lsa_io_query_info_ctr(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR *ctr)
983 prs_debug(ps, depth, desc, "lsa_io_query_info_ctr");
984 depth++;
986 if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
987 return False;
989 if(!prs_align(ps))
990 return False;
992 switch (ctr->info_class) {
993 case 1:
994 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
995 return False;
996 break;
997 case 2:
998 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
999 return False;
1000 break;
1001 case 3:
1002 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
1003 return False;
1004 break;
1005 case 5:
1006 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
1007 return False;
1008 break;
1009 case 6:
1010 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
1011 return False;
1012 break;
1013 case 10:
1014 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
1015 return False;
1016 break;
1017 case 11:
1018 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
1019 return False;
1020 break;
1021 default:
1022 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
1023 return False;
1024 break;
1027 return True;
1030 /*******************************************************************
1031 Reads or writes an LSA_R_QUERY_INFO structure.
1032 ********************************************************************/
1034 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
1037 prs_debug(ps, depth, desc, "lsa_io_r_query");
1038 depth++;
1040 if(!prs_align(ps))
1041 return False;
1043 if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
1044 return False;
1046 if (out->dom_ptr) {
1048 if(!lsa_io_query_info_ctr("", ps, depth, &out->ctr))
1049 return False;
1052 if(!prs_align(ps))
1053 return False;
1055 if(!prs_ntstatus("status", ps, depth, &out->status))
1056 return False;
1058 return True;
1061 /*******************************************************************
1062 Reads or writes an LSA_Q_SET_INFO structure.
1063 ********************************************************************/
1065 BOOL lsa_io_q_set(const char *desc, LSA_Q_SET_INFO *in, prs_struct *ps,
1066 int depth)
1068 prs_debug(ps, depth, desc, "lsa_io_q_set");
1069 depth++;
1071 if(!prs_align(ps))
1072 return False;
1074 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1075 return False;
1077 if(!prs_uint16("info_class", ps, depth, &in->info_class))
1078 return False;
1080 if(!lsa_io_query_info_ctr("", ps, depth, &in->ctr))
1081 return False;
1083 return True;
1086 /*******************************************************************
1087 Reads or writes an LSA_R_SET_INFO structure.
1088 ********************************************************************/
1090 BOOL lsa_io_r_set(const char *desc, LSA_R_SET_INFO *out, prs_struct *ps, int depth)
1092 prs_debug(ps, depth, desc, "lsa_io_r_set");
1093 depth++;
1095 if(!prs_align(ps))
1096 return False;
1098 if(!prs_ntstatus("status", ps, depth, &out->status))
1099 return False;
1101 return True;
1104 /*******************************************************************
1105 Inits a LSA_SID_ENUM structure.
1106 ********************************************************************/
1108 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen,
1109 int num_entries, const DOM_SID *sids)
1111 int i;
1113 DEBUG(5, ("init_lsa_sid_enum\n"));
1115 sen->num_entries = num_entries;
1116 sen->ptr_sid_enum = (num_entries != 0);
1117 sen->num_entries2 = num_entries;
1119 /* Allocate memory for sids and sid pointers */
1121 if (num_entries == 0) return;
1123 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
1124 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
1125 return;
1128 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
1129 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
1130 return;
1133 /* Copy across SIDs and SID pointers */
1135 for (i = 0; i < num_entries; i++) {
1136 sen->ptr_sid[i] = 1;
1137 init_dom_sid2(&sen->sid[i], &sids[i]);
1141 /*******************************************************************
1142 Reads or writes a LSA_SID_ENUM structure.
1143 ********************************************************************/
1145 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps,
1146 int depth)
1148 unsigned int i;
1150 prs_debug(ps, depth, desc, "lsa_io_sid_enum");
1151 depth++;
1153 if(!prs_align(ps))
1154 return False;
1156 if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
1157 return False;
1158 if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
1159 return False;
1162 if the ptr is NULL, leave here. checked from a real w2k trace.
1163 JFM, 11/23/2001
1166 if (sen->ptr_sid_enum==0)
1167 return True;
1169 if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
1170 return False;
1172 /* Mallocate memory if we're unpacking from the wire */
1174 if (UNMARSHALLING(ps)) {
1175 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
1176 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1177 "ptr_sid\n"));
1178 return False;
1181 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
1182 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1183 "sids\n"));
1184 return False;
1188 for (i = 0; i < sen->num_entries; i++) {
1189 fstring temp;
1191 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
1192 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
1193 return False;
1197 for (i = 0; i < sen->num_entries; i++) {
1198 fstring temp;
1200 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
1201 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
1202 return False;
1206 return True;
1209 /*******************************************************************
1210 Inits an LSA_R_ENUM_TRUST_DOM structure.
1211 ********************************************************************/
1213 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l,
1214 POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
1215 uint16 level)
1217 DEBUG(5, ("init_q_lookup_sids\n"));
1219 ZERO_STRUCTP(q_l);
1221 memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
1222 init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
1224 q_l->level = level;
1227 /*******************************************************************
1228 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
1229 ********************************************************************/
1231 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
1232 int depth)
1234 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
1235 depth++;
1237 if(!prs_align(ps))
1238 return False;
1240 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1241 return False;
1242 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1243 return False;
1244 if(!lsa_io_trans_names("names ", &q_s->names, ps, depth)) /* translated names */
1245 return False;
1247 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1248 return False;
1249 if(!prs_align(ps))
1250 return False;
1252 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1253 return False;
1255 return True;
1258 /*******************************************************************
1259 Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1260 ********************************************************************/
1262 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1263 int depth)
1265 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1266 depth++;
1268 if(!prs_align(ps))
1269 return False;
1271 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1272 return False;
1273 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1274 return False;
1275 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1276 return False;
1278 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1279 return False;
1280 if(!prs_align(ps))
1281 return False;
1283 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1284 return False;
1285 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1286 return False;
1287 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1288 return False;
1290 return True;
1293 /*******************************************************************
1294 Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1295 ********************************************************************/
1297 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1298 int depth)
1300 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1301 depth++;
1303 if(!prs_align(ps))
1304 return False;
1306 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1307 return False;
1308 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1309 return False;
1311 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1312 return False;
1313 if(!prs_align(ps))
1314 return False;
1316 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1317 return False;
1318 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1319 return False;
1320 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1321 return False;
1323 return True;
1327 /*******************************************************************
1328 Reads or writes a structure.
1329 ********************************************************************/
1331 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1332 prs_struct *ps, int depth)
1334 unsigned int i;
1336 prs_debug(ps, depth, desc, "lsa_io_trans_names");
1337 depth++;
1339 if(!prs_align(ps))
1340 return False;
1342 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1343 return False;
1344 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1345 return False;
1347 if (trn->ptr_trans_names != 0) {
1348 if(!prs_uint32("num_entries2 ", ps, depth,
1349 &trn->num_entries2))
1350 return False;
1352 if (UNMARSHALLING(ps)) {
1353 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries)) == NULL) {
1354 return False;
1357 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1358 return False;
1362 for (i = 0; i < trn->num_entries2; i++) {
1363 fstring t;
1364 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1366 if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1367 return False;
1370 for (i = 0; i < trn->num_entries2; i++) {
1371 fstring t;
1372 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1374 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1375 return False;
1376 if(!prs_align(ps))
1377 return False;
1381 return True;
1384 /*******************************************************************
1385 Reads or writes a structure.
1386 ********************************************************************/
1388 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1389 prs_struct *ps, int depth)
1391 unsigned int i;
1393 prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1394 depth++;
1396 if(!prs_align(ps))
1397 return False;
1399 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1400 return False;
1401 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1402 return False;
1404 if (trn->ptr_trans_names != 0) {
1405 if(!prs_uint32("num_entries2 ", ps, depth,
1406 &trn->num_entries2))
1407 return False;
1409 if (UNMARSHALLING(ps)) {
1410 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries)) == NULL) {
1411 return False;
1414 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1415 return False;
1419 for (i = 0; i < trn->num_entries2; i++) {
1420 fstring t;
1421 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1423 if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1424 return False;
1427 for (i = 0; i < trn->num_entries2; i++) {
1428 fstring t;
1429 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1431 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1432 return False;
1433 if(!prs_align(ps))
1434 return False;
1438 return True;
1442 /*******************************************************************
1443 Reads or writes a structure.
1444 ********************************************************************/
1446 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s,
1447 prs_struct *ps, int depth)
1449 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1450 depth++;
1452 if(!prs_align(ps))
1453 return False;
1455 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1456 return False;
1458 if (r_s->ptr_dom_ref != 0)
1459 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1460 return False;
1462 if(!lsa_io_trans_names("names ", r_s->names, ps, depth)) /* translated names */
1463 return False;
1465 if(!prs_align(ps))
1466 return False;
1468 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1469 return False;
1471 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1472 return False;
1474 return True;
1477 /*******************************************************************
1478 Reads or writes a structure.
1479 ********************************************************************/
1481 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s,
1482 prs_struct *ps, int depth)
1484 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1485 depth++;
1487 if(!prs_align(ps))
1488 return False;
1490 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1491 return False;
1493 if (r_s->ptr_dom_ref != 0)
1494 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1495 return False;
1497 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1498 return False;
1500 if(!prs_align(ps))
1501 return False;
1503 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1504 return False;
1506 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1507 return False;
1509 return True;
1513 /*******************************************************************
1514 Reads or writes a structure.
1515 ********************************************************************/
1517 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s,
1518 prs_struct *ps, int depth)
1520 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1521 depth++;
1523 if(!prs_align(ps))
1524 return False;
1526 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1527 return False;
1529 if (r_s->ptr_dom_ref != 0)
1530 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1531 return False;
1533 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1534 return False;
1536 if(!prs_align(ps))
1537 return False;
1539 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1540 return False;
1542 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1543 return False;
1545 return True;
1548 /*******************************************************************
1549 makes a structure.
1550 ********************************************************************/
1552 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l,
1553 POLICY_HND *hnd, int num_names, const char **names)
1555 unsigned int i;
1557 DEBUG(5, ("init_q_lookup_names\n"));
1559 ZERO_STRUCTP(q_l);
1561 q_l->pol = *hnd;
1562 q_l->num_entries = num_names;
1563 q_l->num_entries2 = num_names;
1564 q_l->lookup_level = 1;
1566 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1567 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1568 return;
1571 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1572 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1573 return;
1576 for (i = 0; i < num_names; i++) {
1577 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1578 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1582 /*******************************************************************
1583 reads or writes a structure.
1584 ********************************************************************/
1586 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r,
1587 prs_struct *ps, int depth)
1589 unsigned int i;
1591 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1592 depth++;
1594 if(!prs_align(ps))
1595 return False;
1597 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1598 return False;
1600 if(!prs_align(ps))
1601 return False;
1602 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1603 return False;
1604 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1605 return False;
1607 if (UNMARSHALLING(ps)) {
1608 if (q_r->num_entries) {
1609 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1610 return False;
1611 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1612 return False;
1616 for (i = 0; i < q_r->num_entries; i++) {
1617 if(!prs_align(ps))
1618 return False;
1619 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1620 return False;
1623 for (i = 0; i < q_r->num_entries; i++) {
1624 if(!prs_align(ps))
1625 return False;
1626 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1627 return False;
1630 if(!prs_align(ps))
1631 return False;
1632 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1633 return False;
1634 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1635 return False;
1636 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1637 return False;
1638 if(!prs_align(ps))
1639 return False;
1640 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1641 return False;
1643 return True;
1646 /*******************************************************************
1647 reads or writes a structure.
1648 ********************************************************************/
1650 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1652 unsigned int i;
1654 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1655 depth++;
1657 if(!prs_align(ps))
1658 return False;
1660 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1661 return False;
1663 if (out->ptr_dom_ref != 0)
1664 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1665 return False;
1667 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1668 return False;
1669 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1670 return False;
1672 if (out->ptr_entries != 0) {
1673 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1674 return False;
1676 if (out->num_entries2 != out->num_entries) {
1677 /* RPC fault */
1678 return False;
1681 if (UNMARSHALLING(ps)) {
1682 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1683 == NULL) {
1684 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1685 return False;
1689 for (i = 0; i < out->num_entries2; i++)
1690 if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1691 return False;
1694 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1695 return False;
1697 if(!prs_ntstatus("status ", ps, depth, &out->status))
1698 return False;
1700 return True;
1703 /*******************************************************************
1704 reads or writes a structure.
1705 ********************************************************************/
1707 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r,
1708 prs_struct *ps, int depth)
1710 unsigned int i;
1712 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1713 depth++;
1715 if(!prs_align(ps))
1716 return False;
1718 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1719 return False;
1721 if(!prs_align(ps))
1722 return False;
1723 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1724 return False;
1725 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1726 return False;
1728 if (UNMARSHALLING(ps)) {
1729 if (q_r->num_entries) {
1730 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1731 return False;
1732 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1733 return False;
1737 for (i = 0; i < q_r->num_entries; i++) {
1738 if(!prs_align(ps))
1739 return False;
1740 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1741 return False;
1744 for (i = 0; i < q_r->num_entries; i++) {
1745 if(!prs_align(ps))
1746 return False;
1747 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1748 return False;
1751 if(!prs_align(ps))
1752 return False;
1753 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1754 return False;
1755 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1756 return False;
1757 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1758 return False;
1759 if(!prs_align(ps))
1760 return False;
1761 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1762 return False;
1763 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1764 return False;
1765 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1766 return False;
1768 return True;
1771 /*******************************************************************
1772 reads or writes a structure.
1773 ********************************************************************/
1775 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1777 unsigned int i;
1779 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1780 depth++;
1782 if(!prs_align(ps))
1783 return False;
1785 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1786 return False;
1788 if (out->ptr_dom_ref != 0)
1789 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1790 return False;
1792 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1793 return False;
1794 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1795 return False;
1797 if (out->ptr_entries != 0) {
1798 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1799 return False;
1801 if (out->num_entries2 != out->num_entries) {
1802 /* RPC fault */
1803 return False;
1806 if (UNMARSHALLING(ps)) {
1807 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1808 == NULL) {
1809 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1810 return False;
1814 for (i = 0; i < out->num_entries2; i++)
1815 if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1816 return False;
1819 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1820 return False;
1822 if(!prs_ntstatus("status ", ps, depth, &out->status))
1823 return False;
1825 return True;
1828 /*******************************************************************
1829 Internal lsa data type io.
1830 Following pass must read DOM_SID2 types.
1831 ********************************************************************/
1833 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r,
1834 prs_struct *ps, int depth)
1836 prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1837 depth++;
1839 if(!prs_align(ps))
1840 return False;
1841 if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1842 return False;
1843 if(!prs_align(ps))
1844 return False;
1845 /* Second pass will read/write these. */
1846 if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1847 return False;
1848 if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1849 return False;
1850 if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1851 return False;
1853 return True;
1856 /*******************************************************************
1857 Identical to lsa_io_q_lookup_names2.
1858 ********************************************************************/
1860 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r,
1861 prs_struct *ps, int depth)
1863 unsigned int i;
1865 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1866 depth++;
1868 if(!prs_align(ps))
1869 return False;
1871 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1872 return False;
1874 if(!prs_align(ps))
1875 return False;
1876 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1877 return False;
1878 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1879 return False;
1881 if (UNMARSHALLING(ps)) {
1882 if (q_r->num_entries) {
1883 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1884 return False;
1885 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1886 return False;
1890 for (i = 0; i < q_r->num_entries; i++) {
1891 if(!prs_align(ps))
1892 return False;
1893 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1894 return False;
1897 for (i = 0; i < q_r->num_entries; i++) {
1898 if(!prs_align(ps))
1899 return False;
1900 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1901 return False;
1904 if(!prs_align(ps))
1905 return False;
1906 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1907 return False;
1908 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1909 return False;
1910 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1911 return False;
1912 if(!prs_align(ps))
1913 return False;
1914 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1915 return False;
1916 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1917 return False;
1918 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1919 return False;
1921 return True;
1924 /*******************************************************************
1925 reads or writes a structure.
1926 ********************************************************************/
1928 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1930 unsigned int i;
1932 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1933 depth++;
1935 if(!prs_align(ps))
1936 return False;
1938 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1939 return False;
1941 if (out->ptr_dom_ref != 0)
1942 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1943 return False;
1945 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1946 return False;
1947 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1948 return False;
1950 if (out->ptr_entries != 0) {
1951 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1952 return False;
1954 if (out->num_entries2 != out->num_entries) {
1955 /* RPC fault */
1956 return False;
1959 if (UNMARSHALLING(ps)) {
1960 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1961 == NULL) {
1962 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1963 return False;
1967 for (i = 0; i < out->num_entries2; i++) {
1968 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1969 return False;
1972 /* Now process the DOM_SID2 entries. */
1973 for (i = 0; i < out->num_entries2; i++) {
1974 if (out->trans_sids[i].sid2) {
1975 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1976 return False;
1982 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1983 return False;
1985 if(!prs_ntstatus("status ", ps, depth, &out->status))
1986 return False;
1988 return True;
1991 /*******************************************************************
1992 ********************************************************************/
1994 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r,
1995 prs_struct *ps, int depth)
1997 unsigned int i;
1999 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names4");
2000 depth++;
2002 if(!prs_align(ps))
2003 return False;
2005 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
2006 return False;
2007 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
2008 return False;
2010 if (UNMARSHALLING(ps)) {
2011 if (q_r->num_entries) {
2012 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
2013 return False;
2014 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
2015 return False;
2019 for (i = 0; i < q_r->num_entries; i++) {
2020 if(!prs_align(ps))
2021 return False;
2022 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
2023 return False;
2026 for (i = 0; i < q_r->num_entries; i++) {
2027 if(!prs_align(ps))
2028 return False;
2029 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
2030 return False;
2033 if(!prs_align(ps))
2034 return False;
2035 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
2036 return False;
2037 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
2038 return False;
2039 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
2040 return False;
2041 if(!prs_align(ps))
2042 return False;
2043 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
2044 return False;
2045 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
2046 return False;
2047 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
2048 return False;
2050 return True;
2053 /*******************************************************************
2054 Identical to lsa_io_r_lookup_names3.
2055 ********************************************************************/
2057 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
2059 unsigned int i;
2061 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
2062 depth++;
2064 if(!prs_align(ps))
2065 return False;
2067 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
2068 return False;
2070 if (out->ptr_dom_ref != 0)
2071 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
2072 return False;
2074 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
2075 return False;
2076 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
2077 return False;
2079 if (out->ptr_entries != 0) {
2080 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
2081 return False;
2083 if (out->num_entries2 != out->num_entries) {
2084 /* RPC fault */
2085 return False;
2088 if (UNMARSHALLING(ps)) {
2089 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
2090 == NULL) {
2091 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
2092 return False;
2096 for (i = 0; i < out->num_entries2; i++) {
2097 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
2098 return False;
2101 /* Now process the DOM_SID2 entries. */
2102 for (i = 0; i < out->num_entries2; i++) {
2103 if (out->trans_sids[i].sid2) {
2104 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
2105 return False;
2111 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2112 return False;
2114 if(!prs_ntstatus("status ", ps, depth, &out->status))
2115 return False;
2117 return True;
2120 /*******************************************************************
2121 Inits an LSA_Q_CLOSE structure.
2122 ********************************************************************/
2124 void init_lsa_q_close(LSA_Q_CLOSE *in, POLICY_HND *hnd)
2126 DEBUG(5, ("init_lsa_q_close\n"));
2128 memcpy(&in->pol, hnd, sizeof(in->pol));
2131 /*******************************************************************
2132 Reads or writes an LSA_Q_CLOSE structure.
2133 ********************************************************************/
2135 BOOL lsa_io_q_close(const char *desc, LSA_Q_CLOSE *in, prs_struct *ps, int depth)
2137 prs_debug(ps, depth, desc, "lsa_io_q_close");
2138 depth++;
2140 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
2141 return False;
2143 return True;
2146 /*******************************************************************
2147 Reads or writes an LSA_R_CLOSE structure.
2148 ********************************************************************/
2150 BOOL lsa_io_r_close(const char *desc, LSA_R_CLOSE *out, prs_struct *ps, int depth)
2152 prs_debug(ps, depth, desc, "lsa_io_r_close");
2153 depth++;
2155 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
2156 return False;
2158 if(!prs_ntstatus("status", ps, depth, &out->status))
2159 return False;
2161 return True;
2164 /*******************************************************************
2165 Reads or writes an LSA_Q_OPEN_SECRET structure.
2166 ********************************************************************/
2168 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
2170 prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
2171 depth++;
2173 if(!prs_align(ps))
2174 return False;
2176 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
2177 return False;
2179 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
2180 return False;
2181 if(!prs_align(ps))
2182 return False;
2184 if(!prs_uint32("access", ps, depth, &in->access))
2185 return False;
2187 return True;
2190 /*******************************************************************
2191 Reads or writes an LSA_R_OPEN_SECRET structure.
2192 ********************************************************************/
2194 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
2196 prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
2197 depth++;
2199 if(!prs_align(ps))
2200 return False;
2202 if(!smb_io_pol_hnd("", &out->handle, ps, depth))
2203 return False;
2205 if(!prs_ntstatus("status", ps, depth, &out->status))
2206 return False;
2208 return True;
2211 /*******************************************************************
2212 Inits an LSA_Q_ENUM_PRIVS structure.
2213 ********************************************************************/
2215 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2217 DEBUG(5, ("init_q_enum_privs\n"));
2219 memcpy(&in->pol, hnd, sizeof(in->pol));
2221 in->enum_context = enum_context;
2222 in->pref_max_length = pref_max_length;
2225 /*******************************************************************
2226 reads or writes a structure.
2227 ********************************************************************/
2228 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
2230 if (in == NULL)
2231 return False;
2233 prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
2234 depth++;
2236 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2237 return False;
2239 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2240 return False;
2241 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2242 return False;
2244 return True;
2247 /*******************************************************************
2248 reads or writes a structure.
2249 ********************************************************************/
2250 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
2252 uint32 i;
2254 if (entries == NULL)
2255 return False;
2257 prs_debug(ps, depth, desc, "lsa_io_priv_entries");
2258 depth++;
2260 if(!prs_align(ps))
2261 return False;
2263 for (i = 0; i < count; i++) {
2264 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2265 return False;
2266 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2267 return False;
2268 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2269 return False;
2272 for (i = 0; i < count; i++)
2273 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2274 return False;
2276 return True;
2279 /*******************************************************************
2280 Inits an LSA_R_ENUM_PRIVS structure.
2281 ********************************************************************/
2283 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2284 uint32 count, LSA_PRIV_ENTRY *entries)
2286 DEBUG(5, ("init_lsa_r_enum_privs\n"));
2288 out->enum_context=enum_context;
2289 out->count=count;
2291 if (entries!=NULL) {
2292 out->ptr=1;
2293 out->count1=count;
2294 out->privs=entries;
2295 } else {
2296 out->ptr=0;
2297 out->count1=0;
2298 out->privs=NULL;
2302 /*******************************************************************
2303 reads or writes a structure.
2304 ********************************************************************/
2305 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2307 if (out == NULL)
2308 return False;
2310 prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2311 depth++;
2313 if(!prs_align(ps))
2314 return False;
2316 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2317 return False;
2318 if(!prs_uint32("count", ps, depth, &out->count))
2319 return False;
2320 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2321 return False;
2323 if (out->ptr) {
2324 if(!prs_uint32("count1", ps, depth, &out->count1))
2325 return False;
2327 if (UNMARSHALLING(ps))
2328 if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2329 return False;
2331 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2332 return False;
2335 if(!prs_align(ps))
2336 return False;
2338 if(!prs_ntstatus("status", ps, depth, &out->status))
2339 return False;
2341 return True;
2344 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2346 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2348 init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2349 init_uni_hdr(&trn->hdr_name, &trn->name);
2350 trn->lang_id = lang_id;
2351 trn->lang_id_sys = lang_id_sys;
2354 /*******************************************************************
2355 reads or writes a structure.
2356 ********************************************************************/
2357 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2359 if (in == NULL)
2360 return False;
2362 prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2363 depth++;
2365 if(!prs_align(ps))
2366 return False;
2368 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2369 return False;
2371 if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2372 return False;
2374 if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2375 return False;
2377 if(!prs_uint16("lang_id ", ps, depth, &in->lang_id))
2378 return False;
2379 if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2380 return False;
2382 return True;
2385 /*******************************************************************
2386 reads or writes a structure.
2387 ********************************************************************/
2388 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2390 if (out == NULL)
2391 return False;
2393 prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2394 depth++;
2396 if (!prs_align(ps))
2397 return False;
2399 if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2400 return False;
2402 if (out->ptr_info){
2403 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2404 return False;
2406 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2407 return False;
2410 if(!prs_align(ps))
2411 return False;
2413 if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2414 return False;
2416 if(!prs_align(ps))
2417 return False;
2418 if(!prs_ntstatus("status", ps, depth, &out->status))
2419 return False;
2421 return True;
2425 initialise a LSA_Q_ENUM_ACCOUNTS structure
2427 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2429 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2431 trn->enum_context = enum_context;
2432 trn->pref_max_length = pref_max_length;
2435 /*******************************************************************
2436 reads or writes a structure.
2437 ********************************************************************/
2438 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2440 if (in == NULL)
2441 return False;
2443 prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2444 depth++;
2446 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2447 return False;
2449 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2450 return False;
2451 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2452 return False;
2454 return True;
2458 /*******************************************************************
2459 Inits an LSA_R_ENUM_PRIVS structure.
2460 ********************************************************************/
2462 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2464 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2466 out->enum_context=enum_context;
2467 if (out->enum_context!=0) {
2468 out->sids.num_entries=enum_context;
2469 out->sids.ptr_sid_enum=1;
2470 out->sids.num_entries2=enum_context;
2471 } else {
2472 out->sids.num_entries=0;
2473 out->sids.ptr_sid_enum=0;
2474 out->sids.num_entries2=0;
2478 /*******************************************************************
2479 reads or writes a structure.
2480 ********************************************************************/
2481 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2483 if (out == NULL)
2484 return False;
2486 prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2487 depth++;
2489 if (!prs_align(ps))
2490 return False;
2492 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2493 return False;
2495 if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2496 return False;
2498 if (!prs_align(ps))
2499 return False;
2501 if(!prs_ntstatus("status", ps, depth, &out->status))
2502 return False;
2504 return True;
2508 /*******************************************************************
2509 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2510 ********************************************************************/
2512 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2514 prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2515 depth++;
2517 if(!prs_align(ps))
2518 return False;
2520 if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2521 return False;
2523 if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2524 return False;
2526 if (!prs_align(ps))
2527 return False;
2529 if(!prs_uint32("unk1", ps, depth, &in->unk1))
2530 return False;
2531 if(!prs_uint32("unk2", ps, depth, &in->unk2))
2532 return False;
2533 if(!prs_uint32("unk3", ps, depth, &in->unk3))
2534 return False;
2536 /* Don't bother to read or write at present... */
2537 return True;
2540 /*******************************************************************
2541 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2542 ********************************************************************/
2544 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2546 prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2547 depth++;
2549 if(!prs_align(ps))
2550 return False;
2552 if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2553 return False;
2554 if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2555 return False;
2556 if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2557 return False;
2559 if (!prs_align(ps))
2560 return False;
2562 if(!prs_uint32("unk1", ps, depth, &out->unk1))
2563 return False;
2565 if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2566 return False;
2567 if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2568 return False;
2569 if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2570 return False;
2572 if (!prs_align(ps))
2573 return False;
2575 if(!prs_ntstatus("status", ps, depth, &out->status))
2576 return False;
2578 return True;
2581 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2583 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2585 init_dom_sid2(&trn->sid, sid);
2586 trn->access = desired_access;
2590 /*******************************************************************
2591 Reads or writes an LSA_Q_CREATEACCOUNT structure.
2592 ********************************************************************/
2594 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2596 prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2597 depth++;
2599 if(!prs_align(ps))
2600 return False;
2602 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2603 return False;
2605 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2606 return False;
2608 if(!prs_uint32("access", ps, depth, &out->access))
2609 return False;
2611 return True;
2614 /*******************************************************************
2615 Reads or writes an LSA_R_CREATEACCOUNT structure.
2616 ********************************************************************/
2618 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT *out, prs_struct *ps, int depth)
2620 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2621 depth++;
2623 if(!prs_align(ps))
2624 return False;
2626 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2627 return False;
2629 if(!prs_ntstatus("status", ps, depth, &out->status))
2630 return False;
2632 return True;
2636 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2638 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2640 init_dom_sid2(&trn->sid, sid);
2641 trn->access = desired_access;
2644 /*******************************************************************
2645 Reads or writes an LSA_Q_OPENACCOUNT structure.
2646 ********************************************************************/
2648 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2650 prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2651 depth++;
2653 if(!prs_align(ps))
2654 return False;
2656 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2657 return False;
2659 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2660 return False;
2662 if(!prs_uint32("access", ps, depth, &out->access))
2663 return False;
2665 return True;
2668 /*******************************************************************
2669 Reads or writes an LSA_R_OPENACCOUNT structure.
2670 ********************************************************************/
2672 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT *out, prs_struct *ps, int depth)
2674 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2675 depth++;
2677 if(!prs_align(ps))
2678 return False;
2680 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2681 return False;
2683 if(!prs_ntstatus("status", ps, depth, &out->status))
2684 return False;
2686 return True;
2690 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2692 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2696 /*******************************************************************
2697 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2698 ********************************************************************/
2700 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2702 prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2703 depth++;
2705 if(!prs_align(ps))
2706 return False;
2708 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2709 return False;
2711 return True;
2714 /*******************************************************************
2715 Reads or writes an LUID structure.
2716 ********************************************************************/
2718 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2720 prs_debug(ps, depth, desc, "lsa_io_luid");
2721 depth++;
2723 if(!prs_align(ps))
2724 return False;
2726 if(!prs_uint32("low", ps, depth, &out->low))
2727 return False;
2729 if(!prs_uint32("high", ps, depth, &out->high))
2730 return False;
2732 return True;
2735 /*******************************************************************
2736 Reads or writes an LUID_ATTR structure.
2737 ********************************************************************/
2739 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2741 prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2742 depth++;
2744 if(!prs_align(ps))
2745 return False;
2747 if (!lsa_io_luid(desc, &out->luid, ps, depth))
2748 return False;
2750 if(!prs_uint32("attr", ps, depth, &out->attr))
2751 return False;
2753 return True;
2756 /*******************************************************************
2757 Reads or writes an PRIVILEGE_SET structure.
2758 ********************************************************************/
2760 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2762 uint32 i;
2764 prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2765 depth++;
2767 if(!prs_align(ps))
2768 return False;
2770 if(!prs_uint32("count", ps, depth, &out->count))
2771 return False;
2772 if(!prs_uint32("control", ps, depth, &out->control))
2773 return False;
2775 for (i=0; i<out->count; i++) {
2776 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2777 return False;
2780 return True;
2783 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2785 NTSTATUS ret = NT_STATUS_OK;
2787 out->ptr = 1;
2788 out->count = count;
2790 if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2791 return ret;
2793 out->set.count = count;
2795 if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2796 return ret;
2798 DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2800 return ret;
2803 /*******************************************************************
2804 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2805 ********************************************************************/
2807 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2809 prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2810 depth++;
2812 if(!prs_align(ps))
2813 return False;
2815 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2816 return False;
2818 if (out->ptr!=0) {
2819 if(!prs_uint32("count", ps, depth, &out->count))
2820 return False;
2822 /* malloc memory if unmarshalling here */
2824 if (UNMARSHALLING(ps) && out->count != 0) {
2825 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2826 return False;
2828 if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2829 return False;
2833 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2834 return False;
2837 if(!prs_ntstatus("status", ps, depth, &out->status))
2838 return False;
2840 return True;
2845 /*******************************************************************
2846 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
2847 ********************************************************************/
2849 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2851 prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2852 depth++;
2854 if(!prs_align(ps))
2855 return False;
2857 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2858 return False;
2860 return True;
2863 /*******************************************************************
2864 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
2865 ********************************************************************/
2867 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2869 prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2870 depth++;
2872 if(!prs_align(ps))
2873 return False;
2875 if(!prs_uint32("access", ps, depth, &out->access))
2876 return False;
2878 if(!prs_ntstatus("status", ps, depth, &out->status))
2879 return False;
2881 return True;
2885 /*******************************************************************
2886 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2887 ********************************************************************/
2889 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2891 prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2892 depth++;
2894 if(!prs_align(ps))
2895 return False;
2897 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2898 return False;
2900 if(!prs_uint32("access", ps, depth, &out->access))
2901 return False;
2903 return True;
2906 /*******************************************************************
2907 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2908 ********************************************************************/
2910 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2912 prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2913 depth++;
2915 if(!prs_align(ps))
2916 return False;
2918 if(!prs_ntstatus("status", ps, depth, &out->status))
2919 return False;
2921 return True;
2925 void init_lsa_string( LSA_STRING *uni, const char *string )
2927 init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2928 init_uni_hdr(&uni->hdr, &uni->unistring);
2931 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2933 memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2934 init_lsa_string( &q_u->privname, name );
2937 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2939 prs_debug(ps, depth, desc, "smb_io_lsa_string");
2940 depth++;
2942 if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2943 return False;
2944 if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2945 return False;
2947 return True;
2950 /*******************************************************************
2951 Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE structure.
2952 ********************************************************************/
2954 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2956 prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2957 depth++;
2959 if(!prs_align(ps))
2960 return False;
2962 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2963 return False;
2964 if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2965 return False;
2967 return True;
2970 /*******************************************************************
2971 Reads or writes an LSA_R_LOOKUP_PRIV_VALUE structure.
2972 ********************************************************************/
2974 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2976 prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2977 depth++;
2979 if(!prs_align(ps))
2980 return False;
2982 if(!lsa_io_luid("luid", &out->luid, ps, depth))
2983 return False;
2985 if(!prs_ntstatus("status", ps, depth, &out->status))
2986 return False;
2988 return True;
2992 /*******************************************************************
2993 Reads or writes an LSA_Q_ADDPRIVS structure.
2994 ********************************************************************/
2996 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
2998 prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
2999 depth++;
3001 if(!prs_align(ps))
3002 return False;
3004 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3005 return False;
3007 if(!prs_uint32("count", ps, depth, &out->count))
3008 return False;
3010 if (UNMARSHALLING(ps) && out->count!=0) {
3011 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3012 return False;
3014 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3015 return False;
3018 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3019 return False;
3021 return True;
3024 /*******************************************************************
3025 Reads or writes an LSA_R_ADDPRIVS structure.
3026 ********************************************************************/
3028 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
3030 prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
3031 depth++;
3033 if(!prs_align(ps))
3034 return False;
3036 if(!prs_ntstatus("status", ps, depth, &out->status))
3037 return False;
3039 return True;
3042 /*******************************************************************
3043 Reads or writes an LSA_Q_REMOVEPRIVS structure.
3044 ********************************************************************/
3046 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
3048 prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
3049 depth++;
3051 if(!prs_align(ps))
3052 return False;
3054 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3055 return False;
3057 if(!prs_uint32("allrights", ps, depth, &out->allrights))
3058 return False;
3060 if(!prs_uint32("ptr", ps, depth, &out->ptr))
3061 return False;
3064 * JFM: I'm not sure at all if the count is inside the ptr
3065 * never seen one with ptr=0
3068 if (out->ptr!=0) {
3069 if(!prs_uint32("count", ps, depth, &out->count))
3070 return False;
3072 if (UNMARSHALLING(ps) && out->count!=0) {
3073 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3074 return False;
3076 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3077 return False;
3080 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3081 return False;
3084 return True;
3087 /*******************************************************************
3088 Reads or writes an LSA_R_REMOVEPRIVS structure.
3089 ********************************************************************/
3091 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
3093 prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
3094 depth++;
3096 if(!prs_align(ps))
3097 return False;
3099 if(!prs_ntstatus("status", ps, depth, &out->status))
3100 return False;
3102 return True;
3105 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
3107 POLICY_HND zero_pol;
3109 ZERO_STRUCT(zero_pol);
3110 return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
3113 /*******************************************************************
3114 Inits an LSA_Q_QUERY_INFO2 structure.
3115 ********************************************************************/
3117 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
3119 DEBUG(5, ("init_q_query2\n"));
3121 memcpy(&in->pol, hnd, sizeof(in->pol));
3123 in->info_class = info_class;
3126 /*******************************************************************
3127 Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
3128 ********************************************************************/
3130 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
3132 prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
3133 depth++;
3135 if(!prs_align(ps))
3136 return False;
3138 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3139 return False;
3141 if(!prs_uint16("info_class", ps, depth, &in->info_class))
3142 return False;
3144 return True;
3147 /*******************************************************************
3148 Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
3149 ********************************************************************/
3151 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
3152 prs_struct *ps, int depth)
3154 prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
3155 depth++;
3157 if(!prs_align(ps))
3158 return False;
3160 if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
3161 return False;
3163 if (out->dom_ptr) {
3165 if(!lsa_io_query_info_ctr2("", ps, depth, &out->ctr))
3166 return False;
3169 if(!prs_align(ps))
3170 return False;
3171 if(!prs_ntstatus("status", ps, depth, &out->status))
3172 return False;
3174 return True;
3177 /*******************************************************************
3178 Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
3179 ********************************************************************/
3180 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in,
3181 POLICY_HND *hnd,
3182 uint32 count,
3183 DOM_SID *sid)
3185 DEBUG(5, ("init_q_enum_acct_rights\n"));
3187 in->pol = *hnd;
3188 init_dom_sid2(&in->sid, sid);
3191 /*******************************************************************
3192 ********************************************************************/
3193 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
3195 uint32 i;
3196 char *privname;
3197 const char **privname_array = NULL;
3198 int num_priv = 0;
3200 for ( i=0; i<privileges->count; i++ ) {
3201 privname = luid_to_privilege_name( &privileges->set[i].luid );
3202 if ( privname ) {
3203 if ( !add_string_to_array( get_talloc_ctx(), privname, &privname_array, &num_priv ) )
3204 return NT_STATUS_NO_MEMORY;
3208 if ( num_priv ) {
3209 out->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3210 if (!out->rights) {
3211 return NT_STATUS_NO_MEMORY;
3214 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) )
3215 return NT_STATUS_NO_MEMORY;
3217 out->count = num_priv;
3220 return NT_STATUS_OK;
3223 /*******************************************************************
3224 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3225 ********************************************************************/
3226 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3229 if (in == NULL)
3230 return False;
3232 prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3233 depth++;
3235 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3236 return False;
3238 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3239 return False;
3241 return True;
3245 /*******************************************************************
3246 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3247 ********************************************************************/
3248 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3250 prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3251 depth++;
3253 if(!prs_uint32("count ", ps, depth, &out->count))
3254 return False;
3256 if ( !prs_pointer("rights", ps, depth, (void*)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3257 return False;
3259 if(!prs_align(ps))
3260 return False;
3262 if(!prs_ntstatus("status", ps, depth, &out->status))
3263 return False;
3265 return True;
3269 /*******************************************************************
3270 Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3271 ********************************************************************/
3272 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd,
3273 DOM_SID *sid, uint32 count, const char **rights )
3275 DEBUG(5, ("init_q_add_acct_rights\n"));
3277 in->pol = *hnd;
3278 init_dom_sid2(&in->sid, sid);
3280 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3281 if (!in->rights) {
3282 smb_panic("init_q_add_acct_rights: talloc fail\n");
3283 return;
3285 init_unistr4_array( in->rights, count, rights );
3287 in->count = count;
3291 /*******************************************************************
3292 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3293 ********************************************************************/
3294 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3296 prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3297 depth++;
3299 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3300 return False;
3302 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3303 return False;
3305 if(!prs_uint32("count", ps, depth, &in->count))
3306 return False;
3308 if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3309 return False;
3311 return True;
3314 /*******************************************************************
3315 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3316 ********************************************************************/
3317 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3319 prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3320 depth++;
3322 if(!prs_ntstatus("status", ps, depth, &out->status))
3323 return False;
3325 return True;
3328 /*******************************************************************
3329 Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3330 ********************************************************************/
3332 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in,
3333 POLICY_HND *hnd,
3334 DOM_SID *sid,
3335 uint32 removeall,
3336 uint32 count,
3337 const char **rights)
3339 DEBUG(5, ("init_q_remove_acct_rights\n"));
3341 in->pol = *hnd;
3343 init_dom_sid2(&in->sid, sid);
3345 in->removeall = removeall;
3346 in->count = count;
3348 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3349 if (!in->rights) {
3350 smb_panic("init_q_remove_acct_rights: talloc fail\n");
3351 return;
3353 init_unistr4_array( in->rights, count, rights );
3356 /*******************************************************************
3357 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3358 ********************************************************************/
3360 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3362 prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3363 depth++;
3365 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3366 return False;
3368 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3369 return False;
3371 if(!prs_uint32("removeall", ps, depth, &in->removeall))
3372 return False;
3374 if(!prs_uint32("count", ps, depth, &in->count))
3375 return False;
3377 if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3378 return False;
3380 return True;
3383 /*******************************************************************
3384 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3385 ********************************************************************/
3386 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3388 prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3389 depth++;
3391 if(!prs_ntstatus("status", ps, depth, &out->status))
3392 return False;
3394 return True;
3397 /*******************************************************************
3398 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3399 ********************************************************************/
3401 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3403 memcpy(&q->pol, hnd, sizeof(q->pol));
3405 init_dom_sid2(&q->sid, sid);
3406 q->access_mask = desired_access;
3409 /*******************************************************************
3410 ********************************************************************/
3412 #if 0 /* jerry, I think this not correct - gd */
3413 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3415 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3416 depth++;
3418 if(!prs_align(ps))
3419 return False;
3421 if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3422 return False;
3424 if(!prs_uint32("count", ps, depth, &in->count))
3425 return False;
3427 if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3428 return False;
3430 return True;
3432 #endif
3435 /*******************************************************************
3436 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3437 ********************************************************************/
3439 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q,
3440 POLICY_HND *hnd,
3441 const char *name,
3442 uint32 desired_access)
3444 memcpy(&q->pol, hnd, sizeof(q->pol));
3446 init_lsa_string(&q->name, name);
3447 q->access_mask = desired_access;
3450 /*******************************************************************
3451 ********************************************************************/
3454 /*******************************************************************
3455 Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3456 ********************************************************************/
3458 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3460 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3461 depth++;
3463 if(!prs_align(ps))
3464 return False;
3466 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3467 return False;
3469 if(!prs_align(ps))
3470 return False;
3472 if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3473 return False;
3475 if(!prs_align(ps))
3476 return False;
3478 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3479 return False;
3481 return True;
3484 /*******************************************************************
3485 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3486 ********************************************************************/
3488 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3490 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3491 depth++;
3493 if(!prs_align(ps))
3494 return False;
3496 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3497 return False;
3499 if(!prs_ntstatus("status", ps, depth, &out->status))
3500 return False;
3502 return True;
3505 /*******************************************************************
3506 ********************************************************************/
3508 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3510 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3511 depth++;
3513 if(!prs_align(ps))
3514 return False;
3516 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3517 return False;
3519 if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3520 return False;
3522 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3523 return False;
3525 return True;
3528 /*******************************************************************
3529 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3530 ********************************************************************/
3532 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3534 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3535 depth++;
3537 if(!prs_align(ps))
3538 return False;
3540 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3541 return False;
3543 if(!prs_ntstatus("status", ps, depth, &out->status))
3544 return False;
3546 return True;
3549 /*******************************************************************
3550 ********************************************************************/
3552 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3554 prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3555 depth++;
3557 if(!prs_align(ps))
3558 return False;
3560 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3561 return False;
3563 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3564 return False;
3565 if(!prs_align(ps))
3566 return False;
3568 if(!prs_uint32("access", ps, depth, &in->access))
3569 return False;
3571 return True;
3574 /*******************************************************************
3575 ********************************************************************/
3577 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3579 prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3580 depth++;
3582 if(!prs_align(ps))
3583 return False;
3585 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3586 return False;
3588 if(!prs_ntstatus("status", ps, depth, &out->status))
3589 return False;
3591 return True;
3594 /*******************************************************************
3595 ********************************************************************/
3597 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3599 prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3600 depth++;
3602 if(!prs_align(ps))
3603 return False;
3605 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3606 return False;
3608 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3609 return False;
3610 if(!prs_align(ps))
3611 return False;
3613 if(!prs_uint32("access", ps, depth, &in->access))
3614 return False;
3616 return True;
3619 /*******************************************************************
3620 ********************************************************************/
3622 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3624 prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3625 depth++;
3627 if(!prs_align(ps))
3628 return False;
3630 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3631 return False;
3633 if(!prs_ntstatus("status", ps, depth, &out->status))
3634 return False;
3636 return True;
3641 /*******************************************************************
3642 ********************************************************************/
3644 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3646 prs_debug(ps, depth, desc, "lsa_io_data_blob");
3647 depth++;
3649 if ( !prs_uint32("size", ps, depth, &blob->size) )
3650 return False;
3651 if ( !prs_uint32("size", ps, depth, &blob->size) )
3652 return False;
3654 if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3655 return False;
3657 return True;
3660 /*******************************************************************
3661 ********************************************************************/
3663 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3665 prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3666 depth++;
3668 if ( !prs_align(ps) )
3669 return False;
3671 if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3672 return False;
3674 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3675 return False;
3677 if( !prs_align(ps) )
3678 return False;
3679 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3680 return False;
3683 return True;
3686 /*******************************************************************
3687 ********************************************************************/
3689 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3691 prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3692 depth++;
3694 if(!prs_ntstatus("status", ps, depth, &out->status))
3695 return False;
3697 return True;
3700 /*******************************************************************
3701 ********************************************************************/
3703 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3705 prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3706 depth++;
3708 if(!prs_align(ps))
3709 return False;
3711 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3712 return False;
3714 return True;
3717 /*******************************************************************
3718 ********************************************************************/
3720 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3722 prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3723 depth++;
3725 if(!prs_ntstatus("status", ps, depth, &out->status))
3726 return False;
3728 return True;
3731 /*******************************************************************
3732 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3733 ********************************************************************/
3735 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q,
3736 POLICY_HND *hnd, uint16 info_class)
3738 DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3740 q->pol = *hnd;
3741 q->info_class = info_class;
3744 /*******************************************************************
3745 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3746 ********************************************************************/
3748 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q,
3749 POLICY_HND *hnd, uint16 info_class,
3750 const char *dom_name)
3752 DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3754 q->pol = *hnd;
3755 init_lsa_string(&q->domain_name, dom_name );
3756 q->info_class = info_class;
3759 /*******************************************************************
3760 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3761 ********************************************************************/
3763 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q,
3764 POLICY_HND *hnd, uint16 info_class,
3765 DOM_SID *dom_sid)
3767 DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3769 q->pol = *hnd;
3770 init_dom_sid2(&q->dom_sid, dom_sid);
3771 q->info_class = info_class;
3774 /*******************************************************************
3775 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3776 ********************************************************************/
3778 BOOL lsa_io_q_query_trusted_domain_info(const char *desc,
3779 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3780 prs_struct *ps, int depth)
3782 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3783 depth++;
3785 if(!prs_align(ps))
3786 return False;
3788 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3789 return False;
3791 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3792 return False;
3794 return True;
3798 /*******************************************************************
3799 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3800 ********************************************************************/
3802 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc,
3803 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3804 prs_struct *ps, int depth)
3806 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3807 depth++;
3809 if(!prs_align(ps))
3810 return False;
3812 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3813 return False;
3815 if(!prs_align(ps))
3816 return False;
3818 if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3819 return False;
3821 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3822 return False;
3824 return True;
3827 /*******************************************************************
3828 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3829 ********************************************************************/
3831 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc,
3832 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3833 prs_struct *ps, int depth)
3835 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3836 depth++;
3838 if(!prs_align(ps))
3839 return False;
3841 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3842 return False;
3844 if(!prs_align(ps))
3845 return False;
3847 if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3848 return False;
3850 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3851 return False;
3853 return True;
3856 /*******************************************************************
3857 ********************************************************************/
3859 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr,
3860 prs_struct *ps, int depth)
3862 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3863 depth++;
3865 if(!prs_align(ps))
3866 return False;
3868 if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3869 return False;
3871 if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3872 return False;
3874 if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3875 return False;
3877 return True;
3880 /*******************************************************************
3881 ********************************************************************/
3883 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf,
3884 prs_struct *ps, int depth, int length, int size)
3886 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3887 depth++;
3889 if ( UNMARSHALLING(ps) ) {
3890 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3891 return False;
3894 if (!prs_uint32("size", ps, depth, &buf->size))
3895 return False;
3897 if (!prs_uint32("offset", ps, depth, &buf->offset))
3898 return False;
3900 if (!prs_uint32("length", ps, depth, &buf->length))
3901 return False;
3903 if(!prs_uint8s(False, "data", ps, depth, buf->data, size))
3904 return False;
3906 return True;
3909 /*******************************************************************
3910 ********************************************************************/
3912 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name,
3913 prs_struct *ps, int depth)
3915 if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3916 return False;
3918 return True;
3921 /*******************************************************************
3922 ********************************************************************/
3924 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix,
3925 prs_struct *ps, int depth)
3927 if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3928 return False;
3930 return True;
3933 /*******************************************************************
3934 ********************************************************************/
3936 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password,
3937 prs_struct *ps, int depth)
3939 if(!prs_align(ps))
3940 return False;
3942 if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3943 return False;
3945 if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3946 return False;
3948 if (&password->ptr_password) {
3950 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3951 return False;
3953 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth,
3954 password->password_hdr.length, password->password_hdr.size))
3955 return False;
3958 if (&password->ptr_old_password) {
3960 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3961 return False;
3963 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth,
3964 password->old_password_hdr.length, password->old_password_hdr.size))
3965 return False;
3968 return True;
3971 /*******************************************************************
3972 ********************************************************************/
3974 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex,
3975 prs_struct *ps, int depth)
3977 uint32 dom_sid_ptr;
3979 if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
3980 return False;
3982 if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
3983 return False;
3985 if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
3986 return False;
3988 if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
3989 return False;
3991 if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
3992 return False;
3994 if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
3995 return False;
3997 if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
3998 return False;
4000 if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
4001 return False;
4003 if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
4004 return False;
4006 return True;
4009 /*******************************************************************
4010 ********************************************************************/
4012 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
4014 prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
4015 depth++;
4017 if(!prs_uint16("info_class", ps, depth, &info->info_class))
4018 return False;
4020 if(!prs_align(ps))
4021 return False;
4023 switch (info->info_class) {
4024 case 1:
4025 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
4026 return False;
4027 break;
4028 case 3:
4029 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
4030 return False;
4031 break;
4032 case 4:
4033 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
4034 return False;
4035 break;
4036 case 6:
4037 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
4038 return False;
4039 break;
4040 default:
4041 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4042 return False;
4045 return True;
4048 /*******************************************************************
4049 Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
4050 ********************************************************************/
4052 BOOL lsa_io_r_query_trusted_domain_info(const char *desc,
4053 LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q,
4054 prs_struct *ps, int depth)
4056 if (r_q == NULL)
4057 return False;
4059 prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
4060 depth++;
4062 if (!prs_pointer("trustdom", ps, depth, (void*)&r_q->info,
4063 sizeof(LSA_TRUSTED_DOMAIN_INFO),
4064 (PRS_POINTER_CAST)lsa_io_trustdom_query) )
4065 return False;
4067 if(!prs_align(ps))
4068 return False;
4070 if(!prs_ntstatus("status", ps, depth, &r_q->status))
4071 return False;
4073 return True;
4076 /*******************************************************************
4077 Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4078 ********************************************************************/
4080 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
4082 DEBUG(5, ("init_q_query_dom_info\n"));
4084 memcpy(&in->pol, hnd, sizeof(in->pol));
4086 in->info_class = info_class;
4089 /*******************************************************************
4090 Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4091 ********************************************************************/
4093 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
4095 prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
4096 depth++;
4098 if(!prs_align(ps))
4099 return False;
4101 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
4102 return False;
4104 if(!prs_uint16("info_class", ps, depth, &in->info_class))
4105 return False;
4107 return True;
4110 /*******************************************************************
4111 Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
4112 ********************************************************************/
4114 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy,
4115 prs_struct *ps, int depth)
4117 if (!prs_align_uint64(ps))
4118 return False;
4120 if (!prs_align(ps))
4121 return False;
4123 if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
4124 return False;
4126 if (!prs_align_uint64(ps))
4127 return False;
4129 if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
4130 return False;
4132 if (!prs_align_uint64(ps))
4133 return False;
4135 if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
4136 return False;
4138 if (!prs_align_uint64(ps))
4139 return False;
4141 if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
4142 return False;
4144 if (!prs_align_uint64(ps))
4145 return False;
4147 if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
4148 return False;
4150 if (!prs_align_uint64(ps))
4151 return False;
4153 if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
4154 return False;
4156 return True;
4159 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
4161 prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
4162 depth++;
4164 if(!prs_align_uint16(ps))
4165 return False;
4167 if(!prs_uint16("info_class", ps, depth, &info->info_class))
4168 return False;
4170 switch (info->info_class) {
4171 case 3:
4172 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
4173 return False;
4174 break;
4175 default:
4176 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4177 return False;
4178 break;
4181 return True;
4185 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
4186 prs_struct *ps, int depth)
4188 prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
4189 depth++;
4191 if (!prs_pointer("dominfo", ps, depth, (void*)&out->info,
4192 sizeof(LSA_DOM_INFO_UNION),
4193 (PRS_POINTER_CAST)lsa_io_dom_info_query) )
4194 return False;
4196 if(!prs_ntstatus("status", ps, depth, &out->status))
4197 return False;
4199 return True;