s3: make idl
[Samba/vfs_proxy.git] / source3 / librpc / gen_ndr / ndr_security.c
blob108f2f689c2907a9ba4fd5ff0dc490d246f8b045
1 /* parser auto-generated by pidl */
3 #include "includes.h"
4 #include "librpc/gen_ndr/ndr_security.h"
6 #include "librpc/gen_ndr/ndr_misc.h"
7 #include "librpc/gen_ndr/ndr_dom_sid.h"
8 _PUBLIC_ enum ndr_err_code ndr_push_security_ace_flags(struct ndr_push *ndr, int ndr_flags, uint8_t r)
10 NDR_CHECK(ndr_push_uint8(ndr, NDR_SCALARS, r));
11 return NDR_ERR_SUCCESS;
14 _PUBLIC_ enum ndr_err_code ndr_pull_security_ace_flags(struct ndr_pull *ndr, int ndr_flags, uint8_t *r)
16 uint8_t v;
17 NDR_CHECK(ndr_pull_uint8(ndr, NDR_SCALARS, &v));
18 *r = v;
19 return NDR_ERR_SUCCESS;
22 _PUBLIC_ void ndr_print_security_ace_flags(struct ndr_print *ndr, const char *name, uint8_t r)
24 ndr_print_uint8(ndr, name, r);
25 ndr->depth++;
26 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_OBJECT_INHERIT", SEC_ACE_FLAG_OBJECT_INHERIT, r);
27 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_CONTAINER_INHERIT", SEC_ACE_FLAG_CONTAINER_INHERIT, r);
28 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_NO_PROPAGATE_INHERIT", SEC_ACE_FLAG_NO_PROPAGATE_INHERIT, r);
29 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_INHERIT_ONLY", SEC_ACE_FLAG_INHERIT_ONLY, r);
30 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_INHERITED_ACE", SEC_ACE_FLAG_INHERITED_ACE, r);
31 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_VALID_INHERIT", SEC_ACE_FLAG_VALID_INHERIT, r);
32 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_SUCCESSFUL_ACCESS", SEC_ACE_FLAG_SUCCESSFUL_ACCESS, r);
33 ndr_print_bitmap_flag(ndr, sizeof(uint8_t), "SEC_ACE_FLAG_FAILED_ACCESS", SEC_ACE_FLAG_FAILED_ACCESS, r);
34 ndr->depth--;
37 _PUBLIC_ enum ndr_err_code ndr_push_security_ace_type(struct ndr_push *ndr, int ndr_flags, enum security_ace_type r)
39 NDR_CHECK(ndr_push_uint8(ndr, NDR_SCALARS, r));
40 return NDR_ERR_SUCCESS;
43 _PUBLIC_ enum ndr_err_code ndr_pull_security_ace_type(struct ndr_pull *ndr, int ndr_flags, enum security_ace_type *r)
45 uint8_t v;
46 NDR_CHECK(ndr_pull_uint8(ndr, NDR_SCALARS, &v));
47 *r = v;
48 return NDR_ERR_SUCCESS;
51 _PUBLIC_ void ndr_print_security_ace_type(struct ndr_print *ndr, const char *name, enum security_ace_type r)
53 const char *val = NULL;
55 switch (r) {
56 case SEC_ACE_TYPE_ACCESS_ALLOWED: val = "SEC_ACE_TYPE_ACCESS_ALLOWED"; break;
57 case SEC_ACE_TYPE_ACCESS_DENIED: val = "SEC_ACE_TYPE_ACCESS_DENIED"; break;
58 case SEC_ACE_TYPE_SYSTEM_AUDIT: val = "SEC_ACE_TYPE_SYSTEM_AUDIT"; break;
59 case SEC_ACE_TYPE_SYSTEM_ALARM: val = "SEC_ACE_TYPE_SYSTEM_ALARM"; break;
60 case SEC_ACE_TYPE_ALLOWED_COMPOUND: val = "SEC_ACE_TYPE_ALLOWED_COMPOUND"; break;
61 case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT: val = "SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT"; break;
62 case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT: val = "SEC_ACE_TYPE_ACCESS_DENIED_OBJECT"; break;
63 case SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT: val = "SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT"; break;
64 case SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT: val = "SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT"; break;
66 ndr_print_enum(ndr, name, "ENUM", val, r);
69 static enum ndr_err_code ndr_push_security_ace_object_flags(struct ndr_push *ndr, int ndr_flags, uint32_t r)
71 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r));
72 return NDR_ERR_SUCCESS;
75 static enum ndr_err_code ndr_pull_security_ace_object_flags(struct ndr_pull *ndr, int ndr_flags, uint32_t *r)
77 uint32_t v;
78 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &v));
79 *r = v;
80 return NDR_ERR_SUCCESS;
83 _PUBLIC_ void ndr_print_security_ace_object_flags(struct ndr_print *ndr, const char *name, uint32_t r)
85 ndr_print_uint32(ndr, name, r);
86 ndr->depth++;
87 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SEC_ACE_OBJECT_TYPE_PRESENT", SEC_ACE_OBJECT_TYPE_PRESENT, r);
88 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT", SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT, r);
89 ndr->depth--;
92 static enum ndr_err_code ndr_push_security_ace_object_type(struct ndr_push *ndr, int ndr_flags, const union security_ace_object_type *r)
94 if (ndr_flags & NDR_SCALARS) {
95 int level = ndr_push_get_switch_value(ndr, r);
96 switch (level) {
97 case SEC_ACE_OBJECT_TYPE_PRESENT: {
98 NDR_CHECK(ndr_push_GUID(ndr, NDR_SCALARS, &r->type));
99 break; }
101 default: {
102 break; }
106 if (ndr_flags & NDR_BUFFERS) {
107 int level = ndr_push_get_switch_value(ndr, r);
108 switch (level) {
109 case SEC_ACE_OBJECT_TYPE_PRESENT:
110 break;
112 default:
113 break;
117 return NDR_ERR_SUCCESS;
120 static enum ndr_err_code ndr_pull_security_ace_object_type(struct ndr_pull *ndr, int ndr_flags, union security_ace_object_type *r)
122 int level;
123 level = ndr_pull_get_switch_value(ndr, r);
124 if (ndr_flags & NDR_SCALARS) {
125 switch (level) {
126 case SEC_ACE_OBJECT_TYPE_PRESENT: {
127 NDR_CHECK(ndr_pull_GUID(ndr, NDR_SCALARS, &r->type));
128 break; }
130 default: {
131 break; }
135 if (ndr_flags & NDR_BUFFERS) {
136 switch (level) {
137 case SEC_ACE_OBJECT_TYPE_PRESENT:
138 break;
140 default:
141 break;
145 return NDR_ERR_SUCCESS;
148 _PUBLIC_ void ndr_print_security_ace_object_type(struct ndr_print *ndr, const char *name, const union security_ace_object_type *r)
150 int level;
151 level = ndr_print_get_switch_value(ndr, r);
152 ndr_print_union(ndr, name, level, "security_ace_object_type");
153 switch (level) {
154 case SEC_ACE_OBJECT_TYPE_PRESENT:
155 ndr_print_GUID(ndr, "type", &r->type);
156 break;
158 default:
159 break;
164 static enum ndr_err_code ndr_push_security_ace_object_inherited_type(struct ndr_push *ndr, int ndr_flags, const union security_ace_object_inherited_type *r)
166 if (ndr_flags & NDR_SCALARS) {
167 int level = ndr_push_get_switch_value(ndr, r);
168 switch (level) {
169 case SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT: {
170 NDR_CHECK(ndr_push_GUID(ndr, NDR_SCALARS, &r->inherited_type));
171 break; }
173 default: {
174 break; }
178 if (ndr_flags & NDR_BUFFERS) {
179 int level = ndr_push_get_switch_value(ndr, r);
180 switch (level) {
181 case SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT:
182 break;
184 default:
185 break;
189 return NDR_ERR_SUCCESS;
192 static enum ndr_err_code ndr_pull_security_ace_object_inherited_type(struct ndr_pull *ndr, int ndr_flags, union security_ace_object_inherited_type *r)
194 int level;
195 level = ndr_pull_get_switch_value(ndr, r);
196 if (ndr_flags & NDR_SCALARS) {
197 switch (level) {
198 case SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT: {
199 NDR_CHECK(ndr_pull_GUID(ndr, NDR_SCALARS, &r->inherited_type));
200 break; }
202 default: {
203 break; }
207 if (ndr_flags & NDR_BUFFERS) {
208 switch (level) {
209 case SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT:
210 break;
212 default:
213 break;
217 return NDR_ERR_SUCCESS;
220 _PUBLIC_ void ndr_print_security_ace_object_inherited_type(struct ndr_print *ndr, const char *name, const union security_ace_object_inherited_type *r)
222 int level;
223 level = ndr_print_get_switch_value(ndr, r);
224 ndr_print_union(ndr, name, level, "security_ace_object_inherited_type");
225 switch (level) {
226 case SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT:
227 ndr_print_GUID(ndr, "inherited_type", &r->inherited_type);
228 break;
230 default:
231 break;
236 static enum ndr_err_code ndr_push_security_ace_object(struct ndr_push *ndr, int ndr_flags, const struct security_ace_object *r)
238 if (ndr_flags & NDR_SCALARS) {
239 NDR_CHECK(ndr_push_align(ndr, 4));
240 NDR_CHECK(ndr_push_security_ace_object_flags(ndr, NDR_SCALARS, r->flags));
241 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->type, r->flags & SEC_ACE_OBJECT_TYPE_PRESENT));
242 NDR_CHECK(ndr_push_security_ace_object_type(ndr, NDR_SCALARS, &r->type));
243 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->inherited_type, r->flags & SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT));
244 NDR_CHECK(ndr_push_security_ace_object_inherited_type(ndr, NDR_SCALARS, &r->inherited_type));
246 if (ndr_flags & NDR_BUFFERS) {
247 NDR_CHECK(ndr_push_security_ace_object_type(ndr, NDR_BUFFERS, &r->type));
248 NDR_CHECK(ndr_push_security_ace_object_inherited_type(ndr, NDR_BUFFERS, &r->inherited_type));
250 return NDR_ERR_SUCCESS;
253 static enum ndr_err_code ndr_pull_security_ace_object(struct ndr_pull *ndr, int ndr_flags, struct security_ace_object *r)
255 if (ndr_flags & NDR_SCALARS) {
256 NDR_CHECK(ndr_pull_align(ndr, 4));
257 NDR_CHECK(ndr_pull_security_ace_object_flags(ndr, NDR_SCALARS, &r->flags));
258 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->type, r->flags & SEC_ACE_OBJECT_TYPE_PRESENT));
259 NDR_CHECK(ndr_pull_security_ace_object_type(ndr, NDR_SCALARS, &r->type));
260 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->inherited_type, r->flags & SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT));
261 NDR_CHECK(ndr_pull_security_ace_object_inherited_type(ndr, NDR_SCALARS, &r->inherited_type));
263 if (ndr_flags & NDR_BUFFERS) {
264 NDR_CHECK(ndr_pull_security_ace_object_type(ndr, NDR_BUFFERS, &r->type));
265 NDR_CHECK(ndr_pull_security_ace_object_inherited_type(ndr, NDR_BUFFERS, &r->inherited_type));
267 return NDR_ERR_SUCCESS;
270 _PUBLIC_ void ndr_print_security_ace_object(struct ndr_print *ndr, const char *name, const struct security_ace_object *r)
272 ndr_print_struct(ndr, name, "security_ace_object");
273 ndr->depth++;
274 ndr_print_security_ace_object_flags(ndr, "flags", r->flags);
275 ndr_print_set_switch_value(ndr, &r->type, r->flags & SEC_ACE_OBJECT_TYPE_PRESENT);
276 ndr_print_security_ace_object_type(ndr, "type", &r->type);
277 ndr_print_set_switch_value(ndr, &r->inherited_type, r->flags & SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT);
278 ndr_print_security_ace_object_inherited_type(ndr, "inherited_type", &r->inherited_type);
279 ndr->depth--;
282 _PUBLIC_ enum ndr_err_code ndr_push_security_ace_object_ctr(struct ndr_push *ndr, int ndr_flags, const union security_ace_object_ctr *r)
284 if (ndr_flags & NDR_SCALARS) {
285 int level = ndr_push_get_switch_value(ndr, r);
286 switch (level) {
287 case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT: {
288 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_SCALARS, &r->object));
289 break; }
291 case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT: {
292 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_SCALARS, &r->object));
293 break; }
295 case SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT: {
296 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_SCALARS, &r->object));
297 break; }
299 case SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT: {
300 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_SCALARS, &r->object));
301 break; }
303 default: {
304 break; }
308 if (ndr_flags & NDR_BUFFERS) {
309 int level = ndr_push_get_switch_value(ndr, r);
310 switch (level) {
311 case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT:
312 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_BUFFERS, &r->object));
313 break;
315 case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT:
316 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_BUFFERS, &r->object));
317 break;
319 case SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT:
320 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_BUFFERS, &r->object));
321 break;
323 case SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT:
324 NDR_CHECK(ndr_push_security_ace_object(ndr, NDR_BUFFERS, &r->object));
325 break;
327 default:
328 break;
332 return NDR_ERR_SUCCESS;
335 _PUBLIC_ enum ndr_err_code ndr_pull_security_ace_object_ctr(struct ndr_pull *ndr, int ndr_flags, union security_ace_object_ctr *r)
337 int level;
338 level = ndr_pull_get_switch_value(ndr, r);
339 if (ndr_flags & NDR_SCALARS) {
340 switch (level) {
341 case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT: {
342 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_SCALARS, &r->object));
343 break; }
345 case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT: {
346 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_SCALARS, &r->object));
347 break; }
349 case SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT: {
350 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_SCALARS, &r->object));
351 break; }
353 case SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT: {
354 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_SCALARS, &r->object));
355 break; }
357 default: {
358 break; }
362 if (ndr_flags & NDR_BUFFERS) {
363 switch (level) {
364 case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT:
365 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_BUFFERS, &r->object));
366 break;
368 case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT:
369 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_BUFFERS, &r->object));
370 break;
372 case SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT:
373 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_BUFFERS, &r->object));
374 break;
376 case SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT:
377 NDR_CHECK(ndr_pull_security_ace_object(ndr, NDR_BUFFERS, &r->object));
378 break;
380 default:
381 break;
385 return NDR_ERR_SUCCESS;
388 _PUBLIC_ void ndr_print_security_ace_object_ctr(struct ndr_print *ndr, const char *name, const union security_ace_object_ctr *r)
390 int level;
391 level = ndr_print_get_switch_value(ndr, r);
392 ndr_print_union(ndr, name, level, "security_ace_object_ctr");
393 switch (level) {
394 case SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT:
395 ndr_print_security_ace_object(ndr, "object", &r->object);
396 break;
398 case SEC_ACE_TYPE_ACCESS_DENIED_OBJECT:
399 ndr_print_security_ace_object(ndr, "object", &r->object);
400 break;
402 case SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT:
403 ndr_print_security_ace_object(ndr, "object", &r->object);
404 break;
406 case SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT:
407 ndr_print_security_ace_object(ndr, "object", &r->object);
408 break;
410 default:
411 break;
416 _PUBLIC_ enum ndr_err_code ndr_push_security_ace(struct ndr_push *ndr, int ndr_flags, const struct security_ace *r)
418 if (ndr_flags & NDR_SCALARS) {
419 NDR_CHECK(ndr_push_align(ndr, 4));
420 NDR_CHECK(ndr_push_security_ace_type(ndr, NDR_SCALARS, r->type));
421 NDR_CHECK(ndr_push_security_ace_flags(ndr, NDR_SCALARS, r->flags));
422 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, ndr_size_security_ace(r, ndr->flags)));
423 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->access_mask));
424 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->object, r->type));
425 NDR_CHECK(ndr_push_security_ace_object_ctr(ndr, NDR_SCALARS, &r->object));
426 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, &r->trustee));
428 if (ndr_flags & NDR_BUFFERS) {
429 NDR_CHECK(ndr_push_security_ace_object_ctr(ndr, NDR_BUFFERS, &r->object));
430 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_BUFFERS, &r->trustee));
432 return NDR_ERR_SUCCESS;
435 _PUBLIC_ void ndr_print_security_ace(struct ndr_print *ndr, const char *name, const struct security_ace *r)
437 ndr_print_struct(ndr, name, "security_ace");
438 ndr->depth++;
439 ndr_print_security_ace_type(ndr, "type", r->type);
440 ndr_print_security_ace_flags(ndr, "flags", r->flags);
441 ndr_print_uint16(ndr, "size", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?ndr_size_security_ace(r, ndr->flags):r->size);
442 ndr_print_uint32(ndr, "access_mask", r->access_mask);
443 ndr_print_set_switch_value(ndr, &r->object, r->type);
444 ndr_print_security_ace_object_ctr(ndr, "object", &r->object);
445 ndr_print_dom_sid(ndr, "trustee", &r->trustee);
446 ndr->depth--;
449 static enum ndr_err_code ndr_push_security_acl_revision(struct ndr_push *ndr, int ndr_flags, enum security_acl_revision r)
451 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r));
452 return NDR_ERR_SUCCESS;
455 static enum ndr_err_code ndr_pull_security_acl_revision(struct ndr_pull *ndr, int ndr_flags, enum security_acl_revision *r)
457 uint16_t v;
458 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &v));
459 *r = v;
460 return NDR_ERR_SUCCESS;
463 _PUBLIC_ void ndr_print_security_acl_revision(struct ndr_print *ndr, const char *name, enum security_acl_revision r)
465 const char *val = NULL;
467 switch (r) {
468 case SECURITY_ACL_REVISION_NT4: val = "SECURITY_ACL_REVISION_NT4"; break;
469 case SECURITY_ACL_REVISION_ADS: val = "SECURITY_ACL_REVISION_ADS"; break;
471 ndr_print_enum(ndr, name, "ENUM", val, r);
474 _PUBLIC_ enum ndr_err_code ndr_push_security_acl(struct ndr_push *ndr, int ndr_flags, const struct security_acl *r)
476 uint32_t cntr_aces_0;
477 if (ndr_flags & NDR_SCALARS) {
478 NDR_CHECK(ndr_push_align(ndr, 4));
479 NDR_CHECK(ndr_push_security_acl_revision(ndr, NDR_SCALARS, r->revision));
480 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, ndr_size_security_acl(r, ndr->flags)));
481 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->num_aces));
482 for (cntr_aces_0 = 0; cntr_aces_0 < r->num_aces; cntr_aces_0++) {
483 NDR_CHECK(ndr_push_security_ace(ndr, NDR_SCALARS, &r->aces[cntr_aces_0]));
486 if (ndr_flags & NDR_BUFFERS) {
487 for (cntr_aces_0 = 0; cntr_aces_0 < r->num_aces; cntr_aces_0++) {
488 NDR_CHECK(ndr_push_security_ace(ndr, NDR_BUFFERS, &r->aces[cntr_aces_0]));
491 return NDR_ERR_SUCCESS;
494 _PUBLIC_ enum ndr_err_code ndr_pull_security_acl(struct ndr_pull *ndr, int ndr_flags, struct security_acl *r)
496 uint32_t cntr_aces_0;
497 TALLOC_CTX *_mem_save_aces_0;
498 if (ndr_flags & NDR_SCALARS) {
499 NDR_CHECK(ndr_pull_align(ndr, 4));
500 NDR_CHECK(ndr_pull_security_acl_revision(ndr, NDR_SCALARS, &r->revision));
501 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->size));
502 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->num_aces));
503 if (r->num_aces < 0 || r->num_aces > 1000) {
504 return ndr_pull_error(ndr, NDR_ERR_RANGE, "value out of range");
506 NDR_PULL_ALLOC_N(ndr, r->aces, r->num_aces);
507 _mem_save_aces_0 = NDR_PULL_GET_MEM_CTX(ndr);
508 NDR_PULL_SET_MEM_CTX(ndr, r->aces, 0);
509 for (cntr_aces_0 = 0; cntr_aces_0 < r->num_aces; cntr_aces_0++) {
510 NDR_CHECK(ndr_pull_security_ace(ndr, NDR_SCALARS, &r->aces[cntr_aces_0]));
512 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_aces_0, 0);
514 if (ndr_flags & NDR_BUFFERS) {
515 _mem_save_aces_0 = NDR_PULL_GET_MEM_CTX(ndr);
516 NDR_PULL_SET_MEM_CTX(ndr, r->aces, 0);
517 for (cntr_aces_0 = 0; cntr_aces_0 < r->num_aces; cntr_aces_0++) {
518 NDR_CHECK(ndr_pull_security_ace(ndr, NDR_BUFFERS, &r->aces[cntr_aces_0]));
520 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_aces_0, 0);
522 return NDR_ERR_SUCCESS;
525 _PUBLIC_ void ndr_print_security_acl(struct ndr_print *ndr, const char *name, const struct security_acl *r)
527 uint32_t cntr_aces_0;
528 ndr_print_struct(ndr, name, "security_acl");
529 ndr->depth++;
530 ndr_print_security_acl_revision(ndr, "revision", r->revision);
531 ndr_print_uint16(ndr, "size", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?ndr_size_security_acl(r, ndr->flags):r->size);
532 ndr_print_uint32(ndr, "num_aces", r->num_aces);
533 ndr->print(ndr, "%s: ARRAY(%d)", "aces", (int)r->num_aces);
534 ndr->depth++;
535 for (cntr_aces_0=0;cntr_aces_0<r->num_aces;cntr_aces_0++) {
536 char *idx_0=NULL;
537 if (asprintf(&idx_0, "[%d]", cntr_aces_0) != -1) {
538 ndr_print_security_ace(ndr, "aces", &r->aces[cntr_aces_0]);
539 free(idx_0);
542 ndr->depth--;
543 ndr->depth--;
546 static enum ndr_err_code ndr_push_security_descriptor_revision(struct ndr_push *ndr, int ndr_flags, enum security_descriptor_revision r)
548 NDR_CHECK(ndr_push_uint8(ndr, NDR_SCALARS, r));
549 return NDR_ERR_SUCCESS;
552 static enum ndr_err_code ndr_pull_security_descriptor_revision(struct ndr_pull *ndr, int ndr_flags, enum security_descriptor_revision *r)
554 uint8_t v;
555 NDR_CHECK(ndr_pull_uint8(ndr, NDR_SCALARS, &v));
556 *r = v;
557 return NDR_ERR_SUCCESS;
560 _PUBLIC_ void ndr_print_security_descriptor_revision(struct ndr_print *ndr, const char *name, enum security_descriptor_revision r)
562 const char *val = NULL;
564 switch (r) {
565 case SECURITY_DESCRIPTOR_REVISION_1: val = "SECURITY_DESCRIPTOR_REVISION_1"; break;
567 ndr_print_enum(ndr, name, "ENUM", val, r);
570 static enum ndr_err_code ndr_push_security_descriptor_type(struct ndr_push *ndr, int ndr_flags, uint16_t r)
572 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r));
573 return NDR_ERR_SUCCESS;
576 static enum ndr_err_code ndr_pull_security_descriptor_type(struct ndr_pull *ndr, int ndr_flags, uint16_t *r)
578 uint16_t v;
579 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &v));
580 *r = v;
581 return NDR_ERR_SUCCESS;
584 _PUBLIC_ void ndr_print_security_descriptor_type(struct ndr_print *ndr, const char *name, uint16_t r)
586 ndr_print_uint16(ndr, name, r);
587 ndr->depth++;
588 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_OWNER_DEFAULTED", SEC_DESC_OWNER_DEFAULTED, r);
589 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_GROUP_DEFAULTED", SEC_DESC_GROUP_DEFAULTED, r);
590 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_DACL_PRESENT", SEC_DESC_DACL_PRESENT, r);
591 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_DACL_DEFAULTED", SEC_DESC_DACL_DEFAULTED, r);
592 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_SACL_PRESENT", SEC_DESC_SACL_PRESENT, r);
593 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_SACL_DEFAULTED", SEC_DESC_SACL_DEFAULTED, r);
594 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_DACL_TRUSTED", SEC_DESC_DACL_TRUSTED, r);
595 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_SERVER_SECURITY", SEC_DESC_SERVER_SECURITY, r);
596 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_DACL_AUTO_INHERIT_REQ", SEC_DESC_DACL_AUTO_INHERIT_REQ, r);
597 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_SACL_AUTO_INHERIT_REQ", SEC_DESC_SACL_AUTO_INHERIT_REQ, r);
598 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_DACL_AUTO_INHERITED", SEC_DESC_DACL_AUTO_INHERITED, r);
599 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_SACL_AUTO_INHERITED", SEC_DESC_SACL_AUTO_INHERITED, r);
600 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_DACL_PROTECTED", SEC_DESC_DACL_PROTECTED, r);
601 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_SACL_PROTECTED", SEC_DESC_SACL_PROTECTED, r);
602 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_RM_CONTROL_VALID", SEC_DESC_RM_CONTROL_VALID, r);
603 ndr_print_bitmap_flag(ndr, sizeof(uint16_t), "SEC_DESC_SELF_RELATIVE", SEC_DESC_SELF_RELATIVE, r);
604 ndr->depth--;
607 _PUBLIC_ enum ndr_err_code ndr_push_security_descriptor(struct ndr_push *ndr, int ndr_flags, const struct security_descriptor *r)
610 uint32_t _flags_save_STRUCT = ndr->flags;
611 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_LITTLE_ENDIAN);
612 if (ndr_flags & NDR_SCALARS) {
613 NDR_CHECK(ndr_push_align(ndr, 4));
614 NDR_CHECK(ndr_push_security_descriptor_revision(ndr, NDR_SCALARS, r->revision));
615 NDR_CHECK(ndr_push_security_descriptor_type(ndr, NDR_SCALARS, r->type));
616 NDR_CHECK(ndr_push_relative_ptr1(ndr, r->owner_sid));
617 NDR_CHECK(ndr_push_relative_ptr1(ndr, r->group_sid));
618 NDR_CHECK(ndr_push_relative_ptr1(ndr, r->sacl));
619 NDR_CHECK(ndr_push_relative_ptr1(ndr, r->dacl));
621 if (ndr_flags & NDR_BUFFERS) {
622 if (r->owner_sid) {
623 NDR_CHECK(ndr_push_relative_ptr2(ndr, r->owner_sid));
624 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->owner_sid));
626 if (r->group_sid) {
627 NDR_CHECK(ndr_push_relative_ptr2(ndr, r->group_sid));
628 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->group_sid));
630 if (r->sacl) {
631 NDR_CHECK(ndr_push_relative_ptr2(ndr, r->sacl));
632 NDR_CHECK(ndr_push_security_acl(ndr, NDR_SCALARS|NDR_BUFFERS, r->sacl));
634 if (r->dacl) {
635 NDR_CHECK(ndr_push_relative_ptr2(ndr, r->dacl));
636 NDR_CHECK(ndr_push_security_acl(ndr, NDR_SCALARS|NDR_BUFFERS, r->dacl));
639 ndr->flags = _flags_save_STRUCT;
641 return NDR_ERR_SUCCESS;
644 _PUBLIC_ enum ndr_err_code ndr_pull_security_descriptor(struct ndr_pull *ndr, int ndr_flags, struct security_descriptor *r)
646 uint32_t _ptr_owner_sid;
647 TALLOC_CTX *_mem_save_owner_sid_0;
648 uint32_t _ptr_group_sid;
649 TALLOC_CTX *_mem_save_group_sid_0;
650 uint32_t _ptr_sacl;
651 TALLOC_CTX *_mem_save_sacl_0;
652 uint32_t _ptr_dacl;
653 TALLOC_CTX *_mem_save_dacl_0;
655 uint32_t _flags_save_STRUCT = ndr->flags;
656 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_LITTLE_ENDIAN);
657 if (ndr_flags & NDR_SCALARS) {
658 NDR_CHECK(ndr_pull_align(ndr, 4));
659 NDR_CHECK(ndr_pull_security_descriptor_revision(ndr, NDR_SCALARS, &r->revision));
660 NDR_CHECK(ndr_pull_security_descriptor_type(ndr, NDR_SCALARS, &r->type));
661 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_owner_sid));
662 if (_ptr_owner_sid) {
663 NDR_PULL_ALLOC(ndr, r->owner_sid);
664 NDR_CHECK(ndr_pull_relative_ptr1(ndr, r->owner_sid, _ptr_owner_sid));
665 } else {
666 r->owner_sid = NULL;
668 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_group_sid));
669 if (_ptr_group_sid) {
670 NDR_PULL_ALLOC(ndr, r->group_sid);
671 NDR_CHECK(ndr_pull_relative_ptr1(ndr, r->group_sid, _ptr_group_sid));
672 } else {
673 r->group_sid = NULL;
675 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sacl));
676 if (_ptr_sacl) {
677 NDR_PULL_ALLOC(ndr, r->sacl);
678 NDR_CHECK(ndr_pull_relative_ptr1(ndr, r->sacl, _ptr_sacl));
679 } else {
680 r->sacl = NULL;
682 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_dacl));
683 if (_ptr_dacl) {
684 NDR_PULL_ALLOC(ndr, r->dacl);
685 NDR_CHECK(ndr_pull_relative_ptr1(ndr, r->dacl, _ptr_dacl));
686 } else {
687 r->dacl = NULL;
690 if (ndr_flags & NDR_BUFFERS) {
691 if (r->owner_sid) {
692 uint32_t _relative_save_offset;
693 _relative_save_offset = ndr->offset;
694 NDR_CHECK(ndr_pull_relative_ptr2(ndr, r->owner_sid));
695 _mem_save_owner_sid_0 = NDR_PULL_GET_MEM_CTX(ndr);
696 NDR_PULL_SET_MEM_CTX(ndr, r->owner_sid, 0);
697 NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->owner_sid));
698 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_owner_sid_0, 0);
699 ndr->offset = _relative_save_offset;
701 if (r->group_sid) {
702 uint32_t _relative_save_offset;
703 _relative_save_offset = ndr->offset;
704 NDR_CHECK(ndr_pull_relative_ptr2(ndr, r->group_sid));
705 _mem_save_group_sid_0 = NDR_PULL_GET_MEM_CTX(ndr);
706 NDR_PULL_SET_MEM_CTX(ndr, r->group_sid, 0);
707 NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->group_sid));
708 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_group_sid_0, 0);
709 ndr->offset = _relative_save_offset;
711 if (r->sacl) {
712 uint32_t _relative_save_offset;
713 _relative_save_offset = ndr->offset;
714 NDR_CHECK(ndr_pull_relative_ptr2(ndr, r->sacl));
715 _mem_save_sacl_0 = NDR_PULL_GET_MEM_CTX(ndr);
716 NDR_PULL_SET_MEM_CTX(ndr, r->sacl, 0);
717 NDR_CHECK(ndr_pull_security_acl(ndr, NDR_SCALARS|NDR_BUFFERS, r->sacl));
718 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sacl_0, 0);
719 ndr->offset = _relative_save_offset;
721 if (r->dacl) {
722 uint32_t _relative_save_offset;
723 _relative_save_offset = ndr->offset;
724 NDR_CHECK(ndr_pull_relative_ptr2(ndr, r->dacl));
725 _mem_save_dacl_0 = NDR_PULL_GET_MEM_CTX(ndr);
726 NDR_PULL_SET_MEM_CTX(ndr, r->dacl, 0);
727 NDR_CHECK(ndr_pull_security_acl(ndr, NDR_SCALARS|NDR_BUFFERS, r->dacl));
728 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_dacl_0, 0);
729 ndr->offset = _relative_save_offset;
732 ndr->flags = _flags_save_STRUCT;
734 return NDR_ERR_SUCCESS;
737 _PUBLIC_ void ndr_print_security_descriptor(struct ndr_print *ndr, const char *name, const struct security_descriptor *r)
739 ndr_print_struct(ndr, name, "security_descriptor");
741 uint32_t _flags_save_STRUCT = ndr->flags;
742 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_LITTLE_ENDIAN);
743 ndr->depth++;
744 ndr_print_security_descriptor_revision(ndr, "revision", r->revision);
745 ndr_print_security_descriptor_type(ndr, "type", r->type);
746 ndr_print_ptr(ndr, "owner_sid", r->owner_sid);
747 ndr->depth++;
748 if (r->owner_sid) {
749 ndr_print_dom_sid(ndr, "owner_sid", r->owner_sid);
751 ndr->depth--;
752 ndr_print_ptr(ndr, "group_sid", r->group_sid);
753 ndr->depth++;
754 if (r->group_sid) {
755 ndr_print_dom_sid(ndr, "group_sid", r->group_sid);
757 ndr->depth--;
758 ndr_print_ptr(ndr, "sacl", r->sacl);
759 ndr->depth++;
760 if (r->sacl) {
761 ndr_print_security_acl(ndr, "sacl", r->sacl);
763 ndr->depth--;
764 ndr_print_ptr(ndr, "dacl", r->dacl);
765 ndr->depth++;
766 if (r->dacl) {
767 ndr_print_security_acl(ndr, "dacl", r->dacl);
769 ndr->depth--;
770 ndr->depth--;
771 ndr->flags = _flags_save_STRUCT;
775 _PUBLIC_ enum ndr_err_code ndr_push_sec_desc_buf(struct ndr_push *ndr, int ndr_flags, const struct sec_desc_buf *r)
777 if (ndr_flags & NDR_SCALARS) {
778 NDR_CHECK(ndr_push_align(ndr, 4));
779 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_size_security_descriptor(r->sd, ndr->flags)));
780 NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd));
782 if (ndr_flags & NDR_BUFFERS) {
783 if (r->sd) {
785 struct ndr_push *_ndr_sd;
786 NDR_CHECK(ndr_push_subcontext_start(ndr, &_ndr_sd, 4, -1));
787 NDR_CHECK(ndr_push_security_descriptor(_ndr_sd, NDR_SCALARS|NDR_BUFFERS, r->sd));
788 NDR_CHECK(ndr_push_subcontext_end(ndr, _ndr_sd, 4, -1));
792 return NDR_ERR_SUCCESS;
795 _PUBLIC_ enum ndr_err_code ndr_pull_sec_desc_buf(struct ndr_pull *ndr, int ndr_flags, struct sec_desc_buf *r)
797 uint32_t _ptr_sd;
798 TALLOC_CTX *_mem_save_sd_0;
799 if (ndr_flags & NDR_SCALARS) {
800 NDR_CHECK(ndr_pull_align(ndr, 4));
801 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->sd_size));
802 if (r->sd_size < 0 || r->sd_size > 0x40000) {
803 return ndr_pull_error(ndr, NDR_ERR_RANGE, "value out of range");
805 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sd));
806 if (_ptr_sd) {
807 NDR_PULL_ALLOC(ndr, r->sd);
808 } else {
809 r->sd = NULL;
812 if (ndr_flags & NDR_BUFFERS) {
813 if (r->sd) {
814 _mem_save_sd_0 = NDR_PULL_GET_MEM_CTX(ndr);
815 NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0);
817 struct ndr_pull *_ndr_sd;
818 NDR_CHECK(ndr_pull_subcontext_start(ndr, &_ndr_sd, 4, -1));
819 NDR_CHECK(ndr_pull_security_descriptor(_ndr_sd, NDR_SCALARS|NDR_BUFFERS, r->sd));
820 NDR_CHECK(ndr_pull_subcontext_end(ndr, _ndr_sd, 4, -1));
822 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sd_0, 0);
825 return NDR_ERR_SUCCESS;
828 _PUBLIC_ void ndr_print_sec_desc_buf(struct ndr_print *ndr, const char *name, const struct sec_desc_buf *r)
830 ndr_print_struct(ndr, name, "sec_desc_buf");
831 ndr->depth++;
832 ndr_print_uint32(ndr, "sd_size", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?ndr_size_security_descriptor(r->sd, ndr->flags):r->sd_size);
833 ndr_print_ptr(ndr, "sd", r->sd);
834 ndr->depth++;
835 if (r->sd) {
836 ndr_print_security_descriptor(ndr, "sd", r->sd);
838 ndr->depth--;
839 ndr->depth--;
842 _PUBLIC_ enum ndr_err_code ndr_push_security_token(struct ndr_push *ndr, int ndr_flags, const struct security_token *r)
844 uint32_t cntr_sids_0;
845 if (ndr_flags & NDR_SCALARS) {
846 NDR_CHECK(ndr_push_align(ndr, 4));
847 NDR_CHECK(ndr_push_unique_ptr(ndr, r->user_sid));
848 NDR_CHECK(ndr_push_unique_ptr(ndr, r->group_sid));
849 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->num_sids));
850 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->num_sids));
851 for (cntr_sids_0 = 0; cntr_sids_0 < r->num_sids; cntr_sids_0++) {
852 NDR_CHECK(ndr_push_unique_ptr(ndr, r->sids[cntr_sids_0]));
854 NDR_CHECK(ndr_push_udlong(ndr, NDR_SCALARS, r->privilege_mask));
856 if (ndr_flags & NDR_BUFFERS) {
857 if (r->user_sid) {
858 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->user_sid));
860 if (r->group_sid) {
861 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->group_sid));
863 for (cntr_sids_0 = 0; cntr_sids_0 < r->num_sids; cntr_sids_0++) {
864 if (r->sids[cntr_sids_0]) {
865 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->sids[cntr_sids_0]));
869 return NDR_ERR_SUCCESS;
872 _PUBLIC_ enum ndr_err_code ndr_pull_security_token(struct ndr_pull *ndr, int ndr_flags, struct security_token *r)
874 uint32_t _ptr_user_sid;
875 TALLOC_CTX *_mem_save_user_sid_0;
876 uint32_t _ptr_group_sid;
877 TALLOC_CTX *_mem_save_group_sid_0;
878 uint32_t _ptr_sids;
879 uint32_t cntr_sids_0;
880 TALLOC_CTX *_mem_save_sids_0;
881 TALLOC_CTX *_mem_save_sids_1;
882 if (ndr_flags & NDR_SCALARS) {
883 NDR_CHECK(ndr_pull_align(ndr, 4));
884 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_user_sid));
885 if (_ptr_user_sid) {
886 NDR_PULL_ALLOC(ndr, r->user_sid);
887 } else {
888 r->user_sid = NULL;
890 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_group_sid));
891 if (_ptr_group_sid) {
892 NDR_PULL_ALLOC(ndr, r->group_sid);
893 } else {
894 r->group_sid = NULL;
896 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->num_sids));
897 NDR_CHECK(ndr_pull_array_size(ndr, &r->sids));
898 NDR_PULL_ALLOC_N(ndr, r->sids, ndr_get_array_size(ndr, &r->sids));
899 _mem_save_sids_0 = NDR_PULL_GET_MEM_CTX(ndr);
900 NDR_PULL_SET_MEM_CTX(ndr, r->sids, 0);
901 for (cntr_sids_0 = 0; cntr_sids_0 < r->num_sids; cntr_sids_0++) {
902 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sids));
903 if (_ptr_sids) {
904 NDR_PULL_ALLOC(ndr, r->sids[cntr_sids_0]);
905 } else {
906 r->sids[cntr_sids_0] = NULL;
909 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sids_0, 0);
910 NDR_CHECK(ndr_pull_udlong(ndr, NDR_SCALARS, &r->privilege_mask));
911 if (r->sids) {
912 NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->sids, r->num_sids));
915 if (ndr_flags & NDR_BUFFERS) {
916 if (r->user_sid) {
917 _mem_save_user_sid_0 = NDR_PULL_GET_MEM_CTX(ndr);
918 NDR_PULL_SET_MEM_CTX(ndr, r->user_sid, 0);
919 NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->user_sid));
920 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_user_sid_0, 0);
922 if (r->group_sid) {
923 _mem_save_group_sid_0 = NDR_PULL_GET_MEM_CTX(ndr);
924 NDR_PULL_SET_MEM_CTX(ndr, r->group_sid, 0);
925 NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->group_sid));
926 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_group_sid_0, 0);
928 _mem_save_sids_0 = NDR_PULL_GET_MEM_CTX(ndr);
929 NDR_PULL_SET_MEM_CTX(ndr, r->sids, 0);
930 for (cntr_sids_0 = 0; cntr_sids_0 < r->num_sids; cntr_sids_0++) {
931 if (r->sids[cntr_sids_0]) {
932 _mem_save_sids_1 = NDR_PULL_GET_MEM_CTX(ndr);
933 NDR_PULL_SET_MEM_CTX(ndr, r->sids[cntr_sids_0], 0);
934 NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS|NDR_BUFFERS, r->sids[cntr_sids_0]));
935 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sids_1, 0);
938 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sids_0, 0);
940 return NDR_ERR_SUCCESS;
943 _PUBLIC_ void ndr_print_security_token(struct ndr_print *ndr, const char *name, const struct security_token *r)
945 uint32_t cntr_sids_0;
946 ndr_print_struct(ndr, name, "security_token");
947 ndr->depth++;
948 ndr_print_ptr(ndr, "user_sid", r->user_sid);
949 ndr->depth++;
950 if (r->user_sid) {
951 ndr_print_dom_sid(ndr, "user_sid", r->user_sid);
953 ndr->depth--;
954 ndr_print_ptr(ndr, "group_sid", r->group_sid);
955 ndr->depth++;
956 if (r->group_sid) {
957 ndr_print_dom_sid(ndr, "group_sid", r->group_sid);
959 ndr->depth--;
960 ndr_print_uint32(ndr, "num_sids", r->num_sids);
961 ndr->print(ndr, "%s: ARRAY(%d)", "sids", (int)r->num_sids);
962 ndr->depth++;
963 for (cntr_sids_0=0;cntr_sids_0<r->num_sids;cntr_sids_0++) {
964 char *idx_0=NULL;
965 if (asprintf(&idx_0, "[%d]", cntr_sids_0) != -1) {
966 ndr_print_ptr(ndr, "sids", r->sids[cntr_sids_0]);
967 ndr->depth++;
968 if (r->sids[cntr_sids_0]) {
969 ndr_print_dom_sid(ndr, "sids", r->sids[cntr_sids_0]);
971 ndr->depth--;
972 free(idx_0);
975 ndr->depth--;
976 ndr_print_udlong(ndr, "privilege_mask", r->privilege_mask);
977 ndr->depth--;
980 _PUBLIC_ enum ndr_err_code ndr_push_security_secinfo(struct ndr_push *ndr, int ndr_flags, uint32_t r)
982 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r));
983 return NDR_ERR_SUCCESS;
986 _PUBLIC_ enum ndr_err_code ndr_pull_security_secinfo(struct ndr_pull *ndr, int ndr_flags, uint32_t *r)
988 uint32_t v;
989 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &v));
990 *r = v;
991 return NDR_ERR_SUCCESS;
994 _PUBLIC_ void ndr_print_security_secinfo(struct ndr_print *ndr, const char *name, uint32_t r)
996 ndr_print_uint32(ndr, name, r);
997 ndr->depth++;
998 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_OWNER", SECINFO_OWNER, r);
999 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_GROUP", SECINFO_GROUP, r);
1000 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_DACL", SECINFO_DACL, r);
1001 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_SACL", SECINFO_SACL, r);
1002 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_UNPROTECTED_SACL", SECINFO_UNPROTECTED_SACL, r);
1003 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_UNPROTECTED_DACL", SECINFO_UNPROTECTED_DACL, r);
1004 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_PROTECTED_SACL", SECINFO_PROTECTED_SACL, r);
1005 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "SECINFO_PROTECTED_DACL", SECINFO_PROTECTED_DACL, r);
1006 ndr->depth--;
1009 _PUBLIC_ enum ndr_err_code ndr_push_kerb_EncTypes(struct ndr_push *ndr, int ndr_flags, uint32_t r)
1011 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r));
1012 return NDR_ERR_SUCCESS;
1015 _PUBLIC_ enum ndr_err_code ndr_pull_kerb_EncTypes(struct ndr_pull *ndr, int ndr_flags, uint32_t *r)
1017 uint32_t v;
1018 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &v));
1019 *r = v;
1020 return NDR_ERR_SUCCESS;
1023 _PUBLIC_ void ndr_print_kerb_EncTypes(struct ndr_print *ndr, const char *name, uint32_t r)
1025 ndr_print_uint32(ndr, name, r);
1026 ndr->depth++;
1027 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "KERB_ENCTYPE_DES_CBC_CRC", KERB_ENCTYPE_DES_CBC_CRC, r);
1028 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "KERB_ENCTYPE_DES_CBC_MD5", KERB_ENCTYPE_DES_CBC_MD5, r);
1029 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "KERB_ENCTYPE_RC4_HMAC_MD5", KERB_ENCTYPE_RC4_HMAC_MD5, r);
1030 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "KERB_ENCTYPE_AES128_CTS_HMAC_SHA1_96", KERB_ENCTYPE_AES128_CTS_HMAC_SHA1_96, r);
1031 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "KERB_ENCTYPE_AES256_CTS_HMAC_SHA1_96", KERB_ENCTYPE_AES256_CTS_HMAC_SHA1_96, r);
1032 ndr->depth--;