2 * Unix SMB/Netbios implementation.
4 * RPC Pipe client / server routines
5 * Copyright (C) Andrew Tridgell 1992-2000,
6 * Copyright (C) Luke Kenneth Casson Leighton 1996-2000,
7 * Copyright (C) Paul Ashton 1997-2000,
8 * Copyright (C) Elrond 2000,
9 * Copyright (C) Jeremy Allison 2001
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 #include "rpc_parse.h"
30 extern int DEBUGLEVEL;
32 /*******************************************************************
33 inits a SAMR_Q_CLOSE_HND structure.
34 ********************************************************************/
36 void init_samr_q_close_hnd(SAMR_Q_CLOSE_HND * q_c, POLICY_HND *hnd)
38 DEBUG(5, ("init_samr_q_close_hnd\n"));
43 /*******************************************************************
44 reads or writes a structure.
45 ********************************************************************/
47 BOOL samr_io_q_close_hnd(char *desc, SAMR_Q_CLOSE_HND * q_u,
48 prs_struct *ps, int depth)
53 prs_debug(ps, depth, desc, "samr_io_q_close_hnd");
59 return smb_io_pol_hnd("pol", &q_u->pol, ps, depth);
62 /*******************************************************************
63 reads or writes a structure.
64 ********************************************************************/
66 BOOL samr_io_r_close_hnd(char *desc, SAMR_R_CLOSE_HND * r_u,
67 prs_struct *ps, int depth)
72 prs_debug(ps, depth, desc, "samr_io_r_close_hnd");
78 if(!smb_io_pol_hnd("pol", &r_u->pol, ps, depth))
81 if(!prs_uint32("status", ps, depth, &r_u->status))
87 /*******************************************************************
88 inits a SAMR_Q_LOOKUP_DOMAIN structure.
89 ********************************************************************/
91 void init_samr_q_lookup_domain(SAMR_Q_LOOKUP_DOMAIN * q_u,
92 POLICY_HND *pol, char *dom_name)
94 int len_name = strlen(dom_name);
96 DEBUG(5, ("init_samr_q_lookup_domain\n"));
98 q_u->connect_pol = *pol;
100 init_uni_hdr(&q_u->hdr_domain, len_name);
101 init_unistr2(&q_u->uni_domain, dom_name, len_name);
104 /*******************************************************************
105 reads or writes a structure.
106 ********************************************************************/
107 BOOL samr_io_q_lookup_domain(char *desc, SAMR_Q_LOOKUP_DOMAIN * q_u,
108 prs_struct *ps, int depth)
113 prs_debug(ps, depth, desc, "samr_io_q_lookup_domain");
119 if(!smb_io_pol_hnd("connect_pol", &q_u->connect_pol, ps, depth))
122 if(!smb_io_unihdr("hdr_domain", &q_u->hdr_domain, ps, depth))
125 if(!smb_io_unistr2("uni_domain", &q_u->uni_domain, q_u->hdr_domain.buffer, ps, depth))
131 /*******************************************************************
132 inits a SAMR_R_LOOKUP_DOMAIN structure.
133 ********************************************************************/
135 void init_samr_r_lookup_domain(SAMR_R_LOOKUP_DOMAIN * r_u,
136 DOM_SID *dom_sid, uint32 status)
138 DEBUG(5, ("init_samr_r_lookup_domain\n"));
140 r_u->status = status;
144 init_dom_sid2(&r_u->dom_sid, dom_sid);
148 /*******************************************************************
149 reads or writes a structure.
150 ********************************************************************/
152 BOOL samr_io_r_lookup_domain(char *desc, SAMR_R_LOOKUP_DOMAIN * r_u,
153 prs_struct *ps, int depth)
158 prs_debug(ps, depth, desc, "samr_io_r_lookup_domain");
164 if(!prs_uint32("ptr", ps, depth, &r_u->ptr_sid))
167 if (r_u->ptr_sid != 0) {
168 if(!smb_io_dom_sid2("sid", &r_u->dom_sid, ps, depth))
174 if(!prs_uint32("status", ps, depth, &r_u->status))
180 /*******************************************************************
181 reads or writes a structure.
182 ********************************************************************/
184 void init_samr_q_unknown_2d(SAMR_Q_UNKNOWN_2D * q_u, POLICY_HND *dom_pol, DOM_SID *sid)
186 DEBUG(5, ("samr_init_samr_q_unknown_2d\n"));
188 q_u->dom_pol = *dom_pol;
189 init_dom_sid2(&q_u->sid, sid);
192 /*******************************************************************
193 reads or writes a structure.
194 ********************************************************************/
196 BOOL samr_io_q_unknown_2d(char *desc, SAMR_Q_UNKNOWN_2D * q_u,
197 prs_struct *ps, int depth)
202 prs_debug(ps, depth, desc, "samr_io_q_unknown_2d");
208 if(!smb_io_pol_hnd("domain_pol", &q_u->dom_pol, ps, depth))
211 if(!smb_io_dom_sid2("sid", &q_u->sid, ps, depth))
220 /*******************************************************************
221 reads or writes a structure.
222 ********************************************************************/
224 BOOL samr_io_r_unknown_2d(char *desc, SAMR_R_UNKNOWN_2D * r_u,
225 prs_struct *ps, int depth)
230 prs_debug(ps, depth, desc, "samr_io_r_unknown_2d");
236 if(!prs_uint32("status", ps, depth, &r_u->status))
242 /*******************************************************************
243 reads or writes a structure.
244 ********************************************************************/
246 void init_samr_q_open_domain(SAMR_Q_OPEN_DOMAIN * q_u,
247 POLICY_HND *pol, uint32 flags,
250 DEBUG(5, ("samr_init_samr_q_open_domain\n"));
254 init_dom_sid2(&q_u->dom_sid, sid);
257 /*******************************************************************
258 reads or writes a structure.
259 ********************************************************************/
261 BOOL samr_io_q_open_domain(char *desc, SAMR_Q_OPEN_DOMAIN * q_u,
262 prs_struct *ps, int depth)
267 prs_debug(ps, depth, desc, "samr_io_q_open_domain");
273 if(!smb_io_pol_hnd("pol", &q_u->pol, ps, depth))
276 if(!prs_uint32("flags", ps, depth, &q_u->flags))
279 if(!smb_io_dom_sid2("sid", &q_u->dom_sid, ps, depth))
285 /*******************************************************************
286 reads or writes a structure.
287 ********************************************************************/
289 BOOL samr_io_r_open_domain(char *desc, SAMR_R_OPEN_DOMAIN * r_u,
290 prs_struct *ps, int depth)
295 prs_debug(ps, depth, desc, "samr_io_r_open_domain");
301 if(!smb_io_pol_hnd("domain_pol", &r_u->domain_pol, ps, depth))
304 if(!prs_uint32("status", ps, depth, &r_u->status))
310 /*******************************************************************
311 reads or writes a structure.
312 ********************************************************************/
314 void init_samr_q_get_usrdom_pwinfo(SAMR_Q_GET_USRDOM_PWINFO * q_u,
315 POLICY_HND *user_pol)
317 DEBUG(5, ("samr_init_samr_q_get_usrdom_pwinfo\n"));
319 q_u->user_pol = *user_pol;
322 /*******************************************************************
323 reads or writes a structure.
324 ********************************************************************/
326 BOOL samr_io_q_get_usrdom_pwinfo(char *desc, SAMR_Q_GET_USRDOM_PWINFO * q_u,
327 prs_struct *ps, int depth)
332 prs_debug(ps, depth, desc, "samr_io_q_get_usrdom_pwinfo");
338 return smb_io_pol_hnd("user_pol", &q_u->user_pol, ps, depth);
341 /*******************************************************************
343 ********************************************************************/
345 void init_samr_r_get_usrdom_pwinfo(SAMR_R_GET_USRDOM_PWINFO *r_u, uint32 status)
347 DEBUG(5, ("init_samr_r_get_usrdom_pwinfo\n"));
349 r_u->unknown_0 = 0x0000;
350 r_u->unknown_1 = 0x0015;
351 r_u->unknown_2 = 0x00000000;
353 r_u->status = status;
356 /*******************************************************************
357 reads or writes a structure.
358 ********************************************************************/
360 BOOL samr_io_r_get_usrdom_pwinfo(char *desc, SAMR_R_GET_USRDOM_PWINFO * r_u,
361 prs_struct *ps, int depth)
366 prs_debug(ps, depth, desc, "samr_io_r_get_usrdom_pwinfo");
372 if(!prs_uint16("unknown_0", ps, depth, &r_u->unknown_0))
374 if(!prs_uint16("unknown_1", ps, depth, &r_u->unknown_1))
376 if(!prs_uint32("unknown_2", ps, depth, &r_u->unknown_2))
378 if(!prs_uint32("status ", ps, depth, &r_u->status))
384 /*******************************************************************
385 reads or writes a structure.
386 ********************************************************************/
388 void init_samr_q_query_sec_obj(SAMR_Q_QUERY_SEC_OBJ * q_u,
389 POLICY_HND *user_pol, uint32 sec_info)
391 DEBUG(5, ("samr_init_samr_q_query_sec_obj\n"));
393 q_u->user_pol = *user_pol;
394 q_u->sec_info = sec_info;
398 /*******************************************************************
399 reads or writes a structure.
400 ********************************************************************/
402 BOOL samr_io_q_query_sec_obj(char *desc, SAMR_Q_QUERY_SEC_OBJ * q_u,
403 prs_struct *ps, int depth)
408 prs_debug(ps, depth, desc, "samr_io_q_query_sec_obj");
414 if(!smb_io_pol_hnd("user_pol", &q_u->user_pol, ps, depth))
417 if(!prs_uint32("sec_info", ps, depth, &q_u->sec_info))
423 /*******************************************************************
424 reads or writes a structure.
425 ********************************************************************/
427 void init_samr_q_query_dom_info(SAMR_Q_QUERY_DOMAIN_INFO * q_u,
428 POLICY_HND *domain_pol, uint16 switch_value)
430 DEBUG(5, ("samr_init_samr_q_query_dom_info\n"));
432 q_u->domain_pol = *domain_pol;
433 q_u->switch_value = switch_value;
436 /*******************************************************************
437 reads or writes a structure.
438 ********************************************************************/
440 BOOL samr_io_q_query_dom_info(char *desc, SAMR_Q_QUERY_DOMAIN_INFO * q_u,
441 prs_struct *ps, int depth)
446 prs_debug(ps, depth, desc, "samr_io_q_query_dom_info");
452 if(!smb_io_pol_hnd("domain_pol", &q_u->domain_pol, ps, depth))
455 if(!prs_uint16("switch_value", ps, depth, &q_u->switch_value))
462 /*******************************************************************
464 ********************************************************************/
466 void init_unk_info3(SAM_UNK_INFO_3 * u_3)
468 u_3->unknown_0 = 0x00000000;
469 u_3->unknown_1 = 0x80000000;
472 /*******************************************************************
473 reads or writes a structure.
474 ********************************************************************/
476 static BOOL sam_io_unk_info3(char *desc, SAM_UNK_INFO_3 * u_3,
477 prs_struct *ps, int depth)
482 prs_debug(ps, depth, desc, "sam_io_unk_info3");
485 if(!prs_uint32("unknown_0", ps, depth, &u_3->unknown_0)) /* 0x0000 0000 */
487 if(!prs_uint32("unknown_1", ps, depth, &u_3->unknown_1)) /* 0x8000 0000 */
493 /*******************************************************************
495 ********************************************************************/
497 void init_unk_info6(SAM_UNK_INFO_6 * u_6)
499 u_6->unknown_0 = 0x00000000;
501 memset(u_6->padding, 0, sizeof(u_6->padding)); /* 12 bytes zeros */
504 /*******************************************************************
505 reads or writes a structure.
506 ********************************************************************/
508 static BOOL sam_io_unk_info6(char *desc, SAM_UNK_INFO_6 * u_6,
509 prs_struct *ps, int depth)
514 prs_debug(ps, depth, desc, "sam_io_unk_info6");
517 if(!prs_uint32("unknown_0", ps, depth, &u_6->unknown_0)) /* 0x0000 0000 */
519 if(!prs_uint32("ptr_0", ps, depth, &u_6->ptr_0)) /* pointer to unknown structure */
521 if(!prs_uint8s(False, "padding", ps, depth, u_6->padding, sizeof(u_6->padding))) /* 12 bytes zeros */
527 /*******************************************************************
529 ********************************************************************/
531 void init_unk_info7(SAM_UNK_INFO_7 * u_7)
533 u_7->unknown_0 = 0x0003;
536 /*******************************************************************
537 reads or writes a structure.
538 ********************************************************************/
540 static BOOL sam_io_unk_info7(char *desc, SAM_UNK_INFO_7 * u_7,
541 prs_struct *ps, int depth)
546 prs_debug(ps, depth, desc, "sam_io_unk_info7");
549 if(!prs_uint16("unknown_0", ps, depth, &u_7->unknown_0)) /* 0x0003 */
555 /*******************************************************************
557 ********************************************************************/
559 void init_unk_info12(SAM_UNK_INFO_12 * u_12)
561 u_12->unknown_0 = 0xcf1dcc00;
562 u_12->unknown_1 = 0xfffffffb;
563 u_12->unknown_2 = 0xcf1dcc00;
564 u_12->unknown_3 = 0xfffffffb;
566 u_12->unknown_4 = 0x8a880000;
569 /*******************************************************************
570 reads or writes a structure.
571 ********************************************************************/
573 static BOOL sam_io_unk_info12(char *desc, SAM_UNK_INFO_12 * u_12,
574 prs_struct *ps, int depth)
579 prs_debug(ps, depth, desc, "sam_io_unk_info12");
582 if(!prs_uint32("unknown_0", ps, depth, &u_12->unknown_0))
584 if(!prs_uint32("unknown_1", ps, depth, &u_12->unknown_1))
586 if(!prs_uint32("unknown_2", ps, depth, &u_12->unknown_2))
588 if(!prs_uint32("unknown_3", ps, depth, &u_12->unknown_3))
590 if(!prs_uint32("unknown_4", ps, depth, &u_12->unknown_4))
596 /*******************************************************************
598 ********************************************************************/
599 void init_unk_info2(SAM_UNK_INFO_2 * u_2,
600 char *domain, char *server,
603 int len_domain = strlen(domain);
604 int len_server = strlen(server);
606 u_2->unknown_0 = 0x00000000;
607 u_2->unknown_1 = 0x80000000;
608 u_2->unknown_2 = 0x00000000;
611 init_uni_hdr(&u_2->hdr_domain, len_domain);
612 init_uni_hdr(&u_2->hdr_server, len_server);
614 u_2->seq_num = seq_num;
615 u_2->unknown_3 = 0x00000000;
617 u_2->unknown_4 = 0x00000001;
618 u_2->unknown_5 = 0x00000003;
619 u_2->unknown_6 = 0x00000001;
620 u_2->num_domain_usrs = MAX_SAM_ENTRIES;
621 u_2->num_domain_grps = MAX_SAM_ENTRIES;
622 u_2->num_local_grps = MAX_SAM_ENTRIES;
624 memset(u_2->padding, 0, sizeof(u_2->padding)); /* 12 bytes zeros */
626 init_unistr2(&u_2->uni_domain, domain, len_domain);
627 init_unistr2(&u_2->uni_server, server, len_server);
630 /*******************************************************************
631 reads or writes a structure.
632 ********************************************************************/
634 static BOOL sam_io_unk_info2(char *desc, SAM_UNK_INFO_2 * u_2,
635 prs_struct *ps, int depth)
640 prs_debug(ps, depth, desc, "sam_io_unk_info2");
643 if(!prs_uint32("unknown_0", ps, depth, &u_2->unknown_0)) /* 0x0000 0000 */
645 if(!prs_uint32("unknown_1", ps, depth, &u_2->unknown_1)) /* 0x8000 0000 */
647 if(!prs_uint32("unknown_2", ps, depth, &u_2->unknown_2)) /* 0x0000 0000 */
650 if(!prs_uint32("ptr_0", ps, depth, &u_2->ptr_0))
652 if(!smb_io_unihdr("hdr_domain", &u_2->hdr_domain, ps, depth))
654 if(!smb_io_unihdr("hdr_server", &u_2->hdr_server, ps, depth))
657 /* put all the data in here, at the moment, including what the above
658 pointer is referring to
661 if(!prs_uint32("seq_num ", ps, depth, &u_2->seq_num)) /* 0x0000 0099 or 0x1000 0000 */
663 if(!prs_uint32("unknown_3 ", ps, depth, &u_2->unknown_3)) /* 0x0000 0000 */
666 if(!prs_uint32("unknown_4 ", ps, depth, &u_2->unknown_4)) /* 0x0000 0001 */
668 if(!prs_uint32("unknown_5 ", ps, depth, &u_2->unknown_5)) /* 0x0000 0003 */
670 if(!prs_uint32("unknown_6 ", ps, depth, &u_2->unknown_6)) /* 0x0000 0001 */
672 if(!prs_uint32("num_domain_usrs ", ps, depth, &u_2->num_domain_usrs))
674 if(!prs_uint32("num_domain_grps", ps, depth, &u_2->num_domain_grps))
676 if(!prs_uint32("num_local_grps", ps, depth, &u_2->num_local_grps))
679 if(!prs_uint8s(False, "padding", ps, depth, u_2->padding,sizeof(u_2->padding)))
682 if(!smb_io_unistr2("uni_domain", &u_2->uni_domain, u_2->hdr_domain.buffer, ps, depth))
684 if(!smb_io_unistr2("uni_server", &u_2->uni_server, u_2->hdr_server.buffer, ps, depth))
690 /*******************************************************************
692 ********************************************************************/
694 void init_unk_info1(SAM_UNK_INFO_1 * u_1)
696 memset(u_1->padding, 0, sizeof(u_1->padding)); /* 12 bytes zeros */
697 u_1->unknown_1 = 0x80000000;
698 u_1->unknown_2 = 0x00000000;
701 /*******************************************************************
702 reads or writes a structure.
703 ********************************************************************/
705 static BOOL sam_io_unk_info1(char *desc, SAM_UNK_INFO_1 * u_1,
706 prs_struct *ps, int depth)
711 prs_debug(ps, depth, desc, "sam_io_unk_info1");
714 if(!prs_uint8s(False, "padding", ps, depth, u_1->padding, sizeof(u_1->padding)))
717 if(!prs_uint32("unknown_1", ps, depth, &u_1->unknown_1)) /* 0x8000 0000 */
719 if(!prs_uint32("unknown_2", ps, depth, &u_1->unknown_2)) /* 0x0000 0000 */
725 /*******************************************************************
726 inits a SAMR_R_QUERY_DOMAIN_INFO structure.
727 ********************************************************************/
729 void init_samr_r_query_dom_info(SAMR_R_QUERY_DOMAIN_INFO * r_u,
730 uint16 switch_value, SAM_UNK_CTR * ctr,
733 DEBUG(5, ("init_samr_r_query_dom_info\n"));
736 r_u->switch_value = 0;
737 r_u->status = status; /* return status */
740 r_u->switch_value = switch_value;
746 /*******************************************************************
747 reads or writes a structure.
748 ********************************************************************/
750 BOOL samr_io_r_query_dom_info(char *desc, SAMR_R_QUERY_DOMAIN_INFO * r_u,
751 prs_struct *ps, int depth)
756 prs_debug(ps, depth, desc, "samr_io_r_query_dom_info");
762 if(!prs_uint32("ptr_0 ", ps, depth, &r_u->ptr_0))
765 if (r_u->ptr_0 != 0 && r_u->ctr != NULL) {
766 if(!prs_uint16("switch_value", ps, depth, &r_u->switch_value))
771 switch (r_u->switch_value) {
773 if(!sam_io_unk_info12("unk_inf12", &r_u->ctr->info.inf12, ps, depth))
777 if(!sam_io_unk_info7("unk_inf7",&r_u->ctr->info.inf7, ps,depth))
781 if(!sam_io_unk_info6("unk_inf6",&r_u->ctr->info.inf6, ps,depth))
785 if(!sam_io_unk_info3("unk_inf3",&r_u->ctr->info.inf3, ps,depth))
789 if(!sam_io_unk_info2("unk_inf2",&r_u->ctr->info.inf2, ps,depth))
793 if(!sam_io_unk_info1("unk_inf1",&r_u->ctr->info.inf1, ps,depth))
797 DEBUG(0, ("samr_io_r_query_dom_info: unknown switch level 0x%x\n",
799 r_u->status = NT_STATUS_INVALID_INFO_CLASS;
807 if(!prs_uint32("status", ps, depth, &r_u->status))
813 /*******************************************************************
814 reads or writes a SAMR_R_QUERY_SEC_OBJ structure.
815 ********************************************************************/
817 BOOL samr_io_r_query_sec_obj(char *desc, SAMR_R_QUERY_SEC_OBJ * r_u,
818 prs_struct *ps, int depth)
823 prs_debug(ps, depth, desc, "samr_io_r_query_sec_obj");
829 if(!prs_uint32("ptr", ps, depth, &r_u->ptr))
832 if(!sec_io_desc_buf("sec", &r_u->buf, ps, depth))
836 if(!prs_uint32("status", ps, depth, &r_u->status))
842 /*******************************************************************
843 reads or writes a SAM_STR1 structure.
844 ********************************************************************/
846 static BOOL sam_io_sam_str1(char *desc, SAM_STR1 * sam, uint32 acct_buf,
847 uint32 name_buf, uint32 desc_buf,
848 prs_struct *ps, int depth)
853 prs_debug(ps, depth, desc, "sam_io_sam_str1");
858 if (!smb_io_unistr2("name", &sam->uni_acct_name, acct_buf, ps, depth))
861 if (!smb_io_unistr2("desc", &sam->uni_acct_desc, desc_buf, ps, depth))
864 if (!smb_io_unistr2("full", &sam->uni_full_name, name_buf, ps, depth))
870 /*******************************************************************
871 inits a SAM_ENTRY1 structure.
872 ********************************************************************/
874 static void init_sam_entry1(SAM_ENTRY1 * sam, uint32 user_idx,
875 uint32 len_sam_name, uint32 len_sam_full,
876 uint32 len_sam_desc, uint32 rid_user,
879 DEBUG(5, ("init_sam_entry1\n"));
883 sam->user_idx = user_idx;
884 sam->rid_user = rid_user;
885 sam->acb_info = acb_info;
888 init_uni_hdr(&sam->hdr_acct_name, len_sam_name);
889 init_uni_hdr(&sam->hdr_user_name, len_sam_full);
890 init_uni_hdr(&sam->hdr_user_desc, len_sam_desc);
893 /*******************************************************************
894 reads or writes a SAM_ENTRY1 structure.
895 ********************************************************************/
897 static BOOL sam_io_sam_entry1(char *desc, SAM_ENTRY1 * sam,
898 prs_struct *ps, int depth)
903 prs_debug(ps, depth, desc, "sam_io_sam_entry1");
909 if(!prs_uint32("user_idx ", ps, depth, &sam->user_idx))
912 if(!prs_uint32("rid_user ", ps, depth, &sam->rid_user))
914 if(!prs_uint16("acb_info ", ps, depth, &sam->acb_info))
916 if(!prs_uint16("pad ", ps, depth, &sam->pad))
919 if (!smb_io_unihdr("hdr_acct_name", &sam->hdr_acct_name, ps, depth))
921 if (!smb_io_unihdr("hdr_user_desc", &sam->hdr_user_desc, ps, depth))
923 if (!smb_io_unihdr("hdr_user_name", &sam->hdr_user_name, ps, depth))
929 /*******************************************************************
930 reads or writes a SAM_STR2 structure.
931 ********************************************************************/
933 static BOOL sam_io_sam_str2(char *desc, SAM_STR2 * sam, uint32 acct_buf,
934 uint32 desc_buf, prs_struct *ps, int depth)
939 prs_debug(ps, depth, desc, "sam_io_sam_str2");
945 if(!smb_io_unistr2("uni_srv_name", &sam->uni_srv_name, acct_buf, ps, depth)) /* account name unicode string */
947 if(!smb_io_unistr2("uni_srv_desc", &sam->uni_srv_desc, desc_buf, ps, depth)) /* account desc unicode string */
953 /*******************************************************************
954 inits a SAM_ENTRY2 structure.
955 ********************************************************************/
956 static void init_sam_entry2(SAM_ENTRY2 * sam, uint32 user_idx,
957 uint32 len_sam_name, uint32 len_sam_desc,
958 uint32 rid_user, uint16 acb_info)
960 DEBUG(5, ("init_sam_entry2\n"));
962 sam->user_idx = user_idx;
963 sam->rid_user = rid_user;
964 sam->acb_info = acb_info;
967 init_uni_hdr(&sam->hdr_srv_name, len_sam_name);
968 init_uni_hdr(&sam->hdr_srv_desc, len_sam_desc);
971 /*******************************************************************
972 reads or writes a SAM_ENTRY2 structure.
973 ********************************************************************/
975 static BOOL sam_io_sam_entry2(char *desc, SAM_ENTRY2 * sam,
976 prs_struct *ps, int depth)
981 prs_debug(ps, depth, desc, "sam_io_sam_entry2");
987 if(!prs_uint32("user_idx ", ps, depth, &sam->user_idx))
990 if(!prs_uint32("rid_user ", ps, depth, &sam->rid_user))
992 if(!prs_uint16("acb_info ", ps, depth, &sam->acb_info))
994 if(!prs_uint16("pad ", ps, depth, &sam->pad))
997 if(!smb_io_unihdr("unihdr", &sam->hdr_srv_name, ps, depth)) /* account name unicode string header */
999 if(!smb_io_unihdr("unihdr", &sam->hdr_srv_desc, ps, depth)) /* account name unicode string header */
1005 /*******************************************************************
1006 reads or writes a SAM_STR3 structure.
1007 ********************************************************************/
1009 static BOOL sam_io_sam_str3(char *desc, SAM_STR3 * sam, uint32 acct_buf,
1010 uint32 desc_buf, prs_struct *ps, int depth)
1015 prs_debug(ps, depth, desc, "sam_io_sam_str3");
1021 if(!smb_io_unistr2("uni_grp_name", &sam->uni_grp_name, acct_buf, ps, depth)) /* account name unicode string */
1023 if(!smb_io_unistr2("uni_grp_desc", &sam->uni_grp_desc, desc_buf, ps, depth)) /* account desc unicode string */
1029 /*******************************************************************
1030 inits a SAM_ENTRY3 structure.
1031 ********************************************************************/
1033 static void init_sam_entry3(SAM_ENTRY3 * sam, uint32 grp_idx,
1034 uint32 len_grp_name, uint32 len_grp_desc,
1037 DEBUG(5, ("init_sam_entry3\n"));
1039 sam->grp_idx = grp_idx;
1040 sam->rid_grp = rid_grp;
1041 sam->attr = 0x07; /* group rid attributes - gets ignored by nt 4.0 */
1043 init_uni_hdr(&sam->hdr_grp_name, len_grp_name);
1044 init_uni_hdr(&sam->hdr_grp_desc, len_grp_desc);
1047 /*******************************************************************
1048 reads or writes a SAM_ENTRY3 structure.
1049 ********************************************************************/
1051 static BOOL sam_io_sam_entry3(char *desc, SAM_ENTRY3 * sam,
1052 prs_struct *ps, int depth)
1057 prs_debug(ps, depth, desc, "sam_io_sam_entry3");
1063 if(!prs_uint32("grp_idx", ps, depth, &sam->grp_idx))
1066 if(!prs_uint32("rid_grp", ps, depth, &sam->rid_grp))
1068 if(!prs_uint32("attr ", ps, depth, &sam->attr))
1071 if(!smb_io_unihdr("unihdr", &sam->hdr_grp_name, ps, depth)) /* account name unicode string header */
1073 if(!smb_io_unihdr("unihdr", &sam->hdr_grp_desc, ps, depth)) /* account name unicode string header */
1079 /*******************************************************************
1080 inits a SAM_ENTRY4 structure.
1081 ********************************************************************/
1083 static void init_sam_entry4(SAM_ENTRY4 * sam, uint32 user_idx,
1084 uint32 len_acct_name)
1086 DEBUG(5, ("init_sam_entry4\n"));
1088 sam->user_idx = user_idx;
1089 init_str_hdr(&sam->hdr_acct_name, len_acct_name, len_acct_name,
1090 len_acct_name != 0);
1093 /*******************************************************************
1094 reads or writes a SAM_ENTRY4 structure.
1095 ********************************************************************/
1097 static BOOL sam_io_sam_entry4(char *desc, SAM_ENTRY4 * sam,
1098 prs_struct *ps, int depth)
1103 prs_debug(ps, depth, desc, "sam_io_sam_entry4");
1109 if(!prs_uint32("user_idx", ps, depth, &sam->user_idx))
1111 if(!smb_io_strhdr("strhdr", &sam->hdr_acct_name, ps, depth))
1117 /*******************************************************************
1118 inits a SAM_ENTRY5 structure.
1119 ********************************************************************/
1121 static void init_sam_entry5(SAM_ENTRY5 * sam, uint32 grp_idx,
1122 uint32 len_grp_name)
1124 DEBUG(5, ("init_sam_entry5\n"));
1126 sam->grp_idx = grp_idx;
1127 init_str_hdr(&sam->hdr_grp_name, len_grp_name, len_grp_name,
1131 /*******************************************************************
1132 reads or writes a SAM_ENTRY5 structure.
1133 ********************************************************************/
1135 static BOOL sam_io_sam_entry5(char *desc, SAM_ENTRY5 * sam,
1136 prs_struct *ps, int depth)
1141 prs_debug(ps, depth, desc, "sam_io_sam_entry5");
1147 if(!prs_uint32("grp_idx", ps, depth, &sam->grp_idx))
1149 if(!smb_io_strhdr("strhdr", &sam->hdr_grp_name, ps, depth))
1155 /*******************************************************************
1156 inits a SAM_ENTRY structure.
1157 ********************************************************************/
1159 void init_sam_entry(SAM_ENTRY * sam, uint32 len_sam_name, uint32 rid)
1161 DEBUG(10, ("init_sam_entry: %d %d\n", len_sam_name, rid));
1164 init_uni_hdr(&sam->hdr_name, len_sam_name);
1167 /*******************************************************************
1168 reads or writes a SAM_ENTRY structure.
1169 ********************************************************************/
1171 static BOOL sam_io_sam_entry(char *desc, SAM_ENTRY * sam,
1172 prs_struct *ps, int depth)
1177 prs_debug(ps, depth, desc, "sam_io_sam_entry");
1182 if(!prs_uint32("rid", ps, depth, &sam->rid))
1184 if(!smb_io_unihdr("unihdr", &sam->hdr_name, ps, depth)) /* account name unicode string header */
1190 /*******************************************************************
1191 inits a SAMR_Q_ENUM_DOM_USERS structure.
1192 ********************************************************************/
1194 void init_samr_q_enum_dom_users(SAMR_Q_ENUM_DOM_USERS * q_e, POLICY_HND *pol,
1196 uint16 acb_mask, uint16 unk_1, uint32 size)
1198 DEBUG(5, ("init_samr_q_enum_dom_users\n"));
1202 q_e->start_idx = start_idx; /* zero indicates lots */
1203 q_e->acb_mask = acb_mask;
1204 q_e->unknown_1 = unk_1;
1205 q_e->max_size = size;
1208 /*******************************************************************
1209 reads or writes a structure.
1210 ********************************************************************/
1212 BOOL samr_io_q_enum_dom_users(char *desc, SAMR_Q_ENUM_DOM_USERS * q_e,
1213 prs_struct *ps, int depth)
1218 prs_debug(ps, depth, desc, "samr_io_q_enum_dom_users");
1224 if(!smb_io_pol_hnd("domain_pol", &q_e->pol, ps, depth))
1227 if(!prs_uint32("start_idx", ps, depth, &q_e->start_idx))
1229 if(!prs_uint16("acb_mask ", ps, depth, &q_e->acb_mask))
1231 if(!prs_uint16("unknown_1", ps, depth, &q_e->unknown_1))
1234 if(!prs_uint32("max_size ", ps, depth, &q_e->max_size))
1241 /*******************************************************************
1242 inits a SAMR_R_ENUM_DOM_USERS structure.
1243 ********************************************************************/
1245 void init_samr_r_enum_dom_users(SAMR_R_ENUM_DOM_USERS * r_u,
1246 uint32 next_idx, uint32 num_sam_entries)
1248 DEBUG(5, ("init_samr_r_enum_dom_users\n"));
1250 r_u->next_idx = next_idx;
1252 if (num_sam_entries != 0) {
1253 r_u->ptr_entries1 = 1;
1254 r_u->ptr_entries2 = 1;
1255 r_u->num_entries2 = num_sam_entries;
1256 r_u->num_entries3 = num_sam_entries;
1258 r_u->num_entries4 = num_sam_entries;
1260 r_u->ptr_entries1 = 0;
1261 r_u->num_entries2 = num_sam_entries;
1262 r_u->ptr_entries2 = 1;
1266 /*******************************************************************
1267 reads or writes a structure.
1268 ********************************************************************/
1270 BOOL samr_io_r_enum_dom_users(char *desc, SAMR_R_ENUM_DOM_USERS * r_u,
1271 prs_struct *ps, int depth)
1278 prs_debug(ps, depth, desc, "samr_io_r_enum_dom_users");
1284 if(!prs_uint32("next_idx ", ps, depth, &r_u->next_idx))
1286 if(!prs_uint32("ptr_entries1", ps, depth, &r_u->ptr_entries1))
1289 if (r_u->ptr_entries1 != 0) {
1290 if(!prs_uint32("num_entries2", ps, depth, &r_u->num_entries2))
1292 if(!prs_uint32("ptr_entries2", ps, depth, &r_u->ptr_entries2))
1294 if(!prs_uint32("num_entries3", ps, depth, &r_u->num_entries3))
1297 if (UNMARSHALLING(ps) && (r_u->num_entries2 != 0)) {
1298 r_u->sam = (SAM_ENTRY *)prs_alloc_mem(ps,sizeof(SAM_ENTRY)*r_u->num_entries2);
1299 r_u->uni_acct_name = (UNISTR2 *)prs_alloc_mem(ps,sizeof(UNISTR2)*r_u->num_entries2);
1302 if ((r_u->sam == NULL || r_u->uni_acct_name == NULL) && r_u->num_entries2 != 0) {
1303 DEBUG(0,("NULL pointers in SAMR_R_ENUM_DOM_USERS\n"));
1304 r_u->num_entries4 = 0;
1305 r_u->status = NT_STATUS_MEMORY_NOT_ALLOCATED;
1309 for (i = 0; i < r_u->num_entries2; i++) {
1310 if(!sam_io_sam_entry("", &r_u->sam[i], ps, depth))
1314 for (i = 0; i < r_u->num_entries2; i++) {
1315 if(!smb_io_unistr2("", &r_u->uni_acct_name[i],r_u->sam[i].hdr_name.buffer, ps,depth))
1324 if(!prs_uint32("num_entries4", ps, depth, &r_u->num_entries4))
1326 if(!prs_uint32("status", ps, depth, &r_u->status))
1332 /*******************************************************************
1333 inits a SAMR_Q_QUERY_DISPINFO structure.
1334 ********************************************************************/
1336 void init_samr_q_query_dispinfo(SAMR_Q_QUERY_DISPINFO * q_e, POLICY_HND *pol,
1337 uint16 switch_level, uint32 start_idx,
1340 DEBUG(5, ("init_samr_q_query_dispinfo\n"));
1342 q_e->domain_pol = *pol;
1344 q_e->switch_level = switch_level;
1346 q_e->start_idx = start_idx;
1347 q_e->max_entries = max_entries;
1348 q_e->max_size = 0xffff; /* Not especially useful */
1351 /*******************************************************************
1352 reads or writes a structure.
1353 ********************************************************************/
1355 BOOL samr_io_q_query_dispinfo(char *desc, SAMR_Q_QUERY_DISPINFO * q_e,
1356 prs_struct *ps, int depth)
1361 prs_debug(ps, depth, desc, "samr_io_q_query_dispinfo");
1367 if(!smb_io_pol_hnd("domain_pol", &q_e->domain_pol, ps, depth))
1370 if(!prs_uint16("switch_level", ps, depth, &q_e->switch_level))
1375 if(!prs_uint32("start_idx ", ps, depth, &q_e->start_idx))
1377 if(!prs_uint32("max_entries ", ps, depth, &q_e->max_entries))
1379 if(!prs_uint32("max_size ", ps, depth, &q_e->max_size))
1385 /*******************************************************************
1386 inits a SAM_DISPINFO_1 structure.
1387 ********************************************************************/
1389 uint32 init_sam_dispinfo_1(TALLOC_CTX *ctx, SAM_DISPINFO_1 *sam, uint32 *num_entries,
1390 uint32 *data_size, uint32 start_idx,
1391 SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES])
1393 uint32 len_sam_name, len_sam_full, len_sam_desc;
1394 uint32 max_entries, max_data_size;
1400 max_entries = *num_entries;
1401 max_data_size = *data_size;
1403 DEBUG(5, ("init_sam_dispinfo_1: max_entries: %d max_dsize: 0x%x\n",
1404 max_entries, max_data_size));
1406 sam->sam=(SAM_ENTRY1 *)talloc(ctx, max_entries*sizeof(SAM_ENTRY1));
1408 return NT_STATUS_NO_MEMORY;
1410 sam->str=(SAM_STR1 *)talloc(ctx, max_entries*sizeof(SAM_STR1));
1412 return NT_STATUS_NO_MEMORY;
1414 ZERO_STRUCTP(sam->sam);
1415 ZERO_STRUCTP(sam->str);
1417 for (i = 0; (i < max_entries) && (dsize < max_data_size); i++) {
1418 DEBUG(5, ("init_sam_dispinfo_1: entry: %d\n",i));
1419 len_sam_name = pass[i].uni_user_name.uni_str_len;
1420 len_sam_full = pass[i].uni_full_name.uni_str_len;
1421 len_sam_desc = pass[i].uni_acct_desc.uni_str_len;
1423 init_sam_entry1(&sam->sam[i], start_idx + i + 1,
1424 len_sam_name, len_sam_full, len_sam_desc,
1425 pass[i].user_rid, pass[i].acb_info);
1427 ZERO_STRUCTP(&sam->str[i].uni_acct_name);
1428 ZERO_STRUCTP(&sam->str[i].uni_full_name);
1429 ZERO_STRUCTP(&sam->str[i].uni_acct_desc);
1431 copy_unistr2(&sam->str[i].uni_acct_name, &pass[i].uni_user_name);
1432 copy_unistr2(&sam->str[i].uni_full_name, &pass[i].uni_full_name);
1433 copy_unistr2(&sam->str[i].uni_acct_desc, &pass[i].uni_acct_desc);
1435 dsize += sizeof(SAM_ENTRY1);
1436 dsize += len_sam_name + len_sam_full + len_sam_desc;
1442 return NT_STATUS_NO_PROBLEMO;
1445 /*******************************************************************
1446 reads or writes a structure.
1447 ********************************************************************/
1449 static BOOL sam_io_sam_dispinfo_1(char *desc, SAM_DISPINFO_1 * sam,
1451 prs_struct *ps, int depth)
1455 prs_debug(ps, depth, desc, "sam_io_sam_dispinfo_1");
1461 if (UNMARSHALLING(ps) && num_entries > 0) {
1463 if ((sam->sam = (SAM_ENTRY1 *)
1464 prs_alloc_mem(ps, sizeof(SAM_ENTRY1) *
1465 num_entries)) == NULL) {
1466 DEBUG(0, ("out of memory allocating SAM_ENTRY1\n"));
1470 if ((sam->str = (SAM_STR1 *)
1471 prs_alloc_mem(ps, sizeof(SAM_STR1) *
1472 num_entries)) == NULL) {
1473 DEBUG(0, ("out of memory allocating SAM_STR1\n"));
1478 for (i = 0; i < num_entries; i++) {
1479 if(!sam_io_sam_entry1("", &sam->sam[i], ps, depth))
1483 for (i = 0; i < num_entries; i++) {
1484 if(!sam_io_sam_str1("", &sam->str[i],
1485 sam->sam[i].hdr_acct_name.buffer,
1486 sam->sam[i].hdr_user_name.buffer,
1487 sam->sam[i].hdr_user_desc.buffer, ps, depth))
1494 /*******************************************************************
1495 inits a SAM_DISPINFO_2 structure.
1496 ********************************************************************/
1498 uint32 init_sam_dispinfo_2(TALLOC_CTX *ctx, SAM_DISPINFO_2 *sam, uint32 *num_entries,
1499 uint32 *data_size, uint32 start_idx,
1500 SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES])
1502 uint32 len_sam_name, len_sam_desc;
1503 uint32 max_entries, max_data_size;
1507 DEBUG(5, ("init_sam_dispinfo_2\n"));
1511 max_entries = *num_entries;
1512 max_data_size = *data_size;
1514 if (!(sam->sam=(SAM_ENTRY2 *)talloc(ctx, max_entries*sizeof(SAM_ENTRY2))))
1515 return NT_STATUS_NO_MEMORY;
1517 if (!(sam->str=(SAM_STR2 *)talloc(ctx, max_entries*sizeof(SAM_STR2))))
1518 return NT_STATUS_NO_MEMORY;
1520 ZERO_STRUCTP(sam->sam);
1521 ZERO_STRUCTP(sam->str);
1523 for (i = 0; (i < max_entries) && (dsize < max_data_size); i++) {
1524 len_sam_name = pass[i].uni_user_name.uni_str_len;
1525 len_sam_desc = pass[i].uni_acct_desc.uni_str_len;
1527 init_sam_entry2(&sam->sam[i], start_idx + i + 1,
1528 len_sam_name, len_sam_desc,
1529 pass[i].user_rid, pass[i].acb_info);
1531 ZERO_STRUCTP(&sam->str[i].uni_srv_name);
1532 ZERO_STRUCTP(&sam->str[i].uni_srv_desc);
1534 copy_unistr2(&sam->str[i].uni_srv_name, &pass[i].uni_user_name);
1535 copy_unistr2(&sam->str[i].uni_srv_desc, &pass[i].uni_acct_desc);
1537 dsize += sizeof(SAM_ENTRY2);
1538 dsize += len_sam_name + len_sam_desc;
1544 return NT_STATUS_NO_PROBLEMO;
1547 /*******************************************************************
1548 reads or writes a structure.
1549 ********************************************************************/
1551 static BOOL sam_io_sam_dispinfo_2(char *desc, SAM_DISPINFO_2 * sam,
1553 prs_struct *ps, int depth)
1560 prs_debug(ps, depth, desc, "sam_io_sam_dispinfo_2");
1566 if (UNMARSHALLING(ps) && num_entries > 0) {
1568 if ((sam->sam = (SAM_ENTRY2 *)
1569 prs_alloc_mem(ps, sizeof(SAM_ENTRY2) *
1570 num_entries)) == NULL) {
1571 DEBUG(0, ("out of memory allocating SAM_ENTRY2\n"));
1575 if ((sam->str = (SAM_STR2 *)
1576 prs_alloc_mem(ps, sizeof(SAM_STR2) *
1577 num_entries)) == NULL) {
1578 DEBUG(0, ("out of memory allocating SAM_STR2\n"));
1583 for (i = 0; i < num_entries; i++) {
1584 if(!sam_io_sam_entry2("", &sam->sam[i], ps, depth))
1588 for (i = 0; i < num_entries; i++) {
1589 if(!sam_io_sam_str2("", &sam->str[i],
1590 sam->sam[i].hdr_srv_name.buffer,
1591 sam->sam[i].hdr_srv_desc.buffer, ps, depth))
1598 /*******************************************************************
1599 inits a SAM_DISPINFO_3 structure.
1600 ********************************************************************/
1602 uint32 init_sam_dispinfo_3(TALLOC_CTX *ctx, SAM_DISPINFO_3 *sam, uint32 *num_entries,
1603 uint32 *data_size, uint32 start_idx,
1606 uint32 len_sam_name, len_sam_desc;
1607 uint32 max_entries, max_data_size;
1611 DEBUG(5, ("init_sam_dispinfo_3\n"));
1615 max_entries = *num_entries;
1616 max_data_size = *data_size;
1618 if (!(sam->sam=(SAM_ENTRY3 *)talloc(ctx, max_entries*sizeof(SAM_ENTRY3))))
1619 return NT_STATUS_NO_MEMORY;
1621 if (!(sam->str=(SAM_STR3 *)talloc(ctx, max_entries*sizeof(SAM_STR3))))
1622 return NT_STATUS_NO_MEMORY;
1624 ZERO_STRUCTP(sam->sam);
1625 ZERO_STRUCTP(sam->str);
1627 for (i = 0; (i < max_entries) && (dsize < max_data_size); i++) {
1628 len_sam_name = strlen(grp[i].name);
1629 len_sam_desc = strlen(grp[i].comment);
1631 init_sam_entry3(&sam->sam[i], start_idx + i + 1, len_sam_name, len_sam_desc, grp[i].rid);
1633 init_unistr2(&sam->str[i].uni_grp_name, grp[i].name, len_sam_name);
1634 init_unistr2(&sam->str[i].uni_grp_desc, grp[i].comment, len_sam_desc);
1636 dsize += sizeof(SAM_ENTRY3);
1637 dsize += (len_sam_name + len_sam_desc) * 2;
1644 return NT_STATUS_NO_PROBLEMO;
1647 /*******************************************************************
1648 reads or writes a structure.
1649 ********************************************************************/
1651 static BOOL sam_io_sam_dispinfo_3(char *desc, SAM_DISPINFO_3 * sam,
1653 prs_struct *ps, int depth)
1660 prs_debug(ps, depth, desc, "sam_io_sam_dispinfo_3");
1666 if (UNMARSHALLING(ps) && num_entries > 0) {
1668 if ((sam->sam = (SAM_ENTRY3 *)
1669 prs_alloc_mem(ps, sizeof(SAM_ENTRY3) *
1670 num_entries)) == NULL) {
1671 DEBUG(0, ("out of memory allocating SAM_ENTRY3\n"));
1675 if ((sam->str = (SAM_STR3 *)
1676 prs_alloc_mem(ps, sizeof(SAM_STR3) *
1677 num_entries)) == NULL) {
1678 DEBUG(0, ("out of memory allocating SAM_STR3\n"));
1683 for (i = 0; i < num_entries; i++) {
1684 if(!sam_io_sam_entry3("", &sam->sam[i], ps, depth))
1688 for (i = 0; i < num_entries; i++) {
1689 if(!sam_io_sam_str3("", &sam->str[i],
1690 sam->sam[i].hdr_grp_name.buffer,
1691 sam->sam[i].hdr_grp_desc.buffer, ps, depth))
1698 /*******************************************************************
1699 inits a SAM_DISPINFO_4 structure.
1700 ********************************************************************/
1702 uint32 init_sam_dispinfo_4(TALLOC_CTX *ctx, SAM_DISPINFO_4 *sam, uint32 *num_entries,
1703 uint32 *data_size, uint32 start_idx,
1704 SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES])
1707 uint32 len_sam_name;
1708 uint32 max_entries, max_data_size;
1712 DEBUG(5, ("init_sam_dispinfo_4\n"));
1716 max_entries = *num_entries;
1717 max_data_size = *data_size;
1719 if (!(sam->sam=(SAM_ENTRY4 *)talloc(ctx, max_entries*sizeof(SAM_ENTRY4))))
1720 return NT_STATUS_NO_MEMORY;
1722 if (!(sam->str=(SAM_STR4 *)talloc(ctx, max_entries*sizeof(SAM_STR4))))
1723 return NT_STATUS_NO_MEMORY;
1725 ZERO_STRUCTP(sam->sam);
1726 ZERO_STRUCTP(sam->str);
1728 for (i = 0; (i < max_entries) && (dsize < max_data_size); i++) {
1729 len_sam_name = pass[i].uni_user_name.uni_str_len;
1731 init_sam_entry4(&sam->sam[i], start_idx + i + 1, len_sam_name);
1733 unistr2_to_ascii(sam_name, &pass[i].uni_user_name, sizeof(sam_name));
1734 init_string2(&sam->str[i].acct_name, sam_name, len_sam_name);
1736 dsize += sizeof(SAM_ENTRY4);
1737 dsize += len_sam_name;
1743 return NT_STATUS_NO_PROBLEMO;
1746 /*******************************************************************
1747 reads or writes a structure.
1748 ********************************************************************/
1750 static BOOL sam_io_sam_dispinfo_4(char *desc, SAM_DISPINFO_4 * sam,
1752 prs_struct *ps, int depth)
1759 prs_debug(ps, depth, desc, "sam_io_sam_dispinfo_4");
1765 if (UNMARSHALLING(ps) && num_entries > 0) {
1767 if ((sam->sam = (SAM_ENTRY4 *)
1768 prs_alloc_mem(ps, sizeof(SAM_ENTRY4) *
1769 num_entries)) == NULL) {
1770 DEBUG(0, ("out of memory allocating SAM_ENTRY4\n"));
1774 if ((sam->str = (SAM_STR4 *)
1775 prs_alloc_mem(ps, sizeof(SAM_STR4) *
1776 num_entries)) == NULL) {
1777 DEBUG(0, ("out of memory allocating SAM_STR4\n"));
1782 for (i = 0; i < num_entries; i++) {
1783 if(!sam_io_sam_entry4("", &sam->sam[i], ps, depth))
1787 for (i = 0; i < num_entries; i++) {
1788 if(!smb_io_string2("acct_name", &sam->str[i].acct_name,
1789 sam->sam[i].hdr_acct_name.buffer, ps, depth))
1798 /*******************************************************************
1799 inits a SAM_DISPINFO_5 structure.
1800 ********************************************************************/
1802 uint32 init_sam_dispinfo_5(TALLOC_CTX *ctx, SAM_DISPINFO_5 *sam, uint32 *num_entries,
1803 uint32 *data_size, uint32 start_idx,
1806 uint32 len_sam_name;
1807 uint32 max_entries, max_data_size;
1811 DEBUG(5, ("init_sam_dispinfo_5\n"));
1815 max_entries = *num_entries;
1816 max_data_size = *data_size;
1818 if (!(sam->sam=(SAM_ENTRY5 *)talloc(ctx, max_entries*sizeof(SAM_ENTRY5))))
1819 return NT_STATUS_NO_MEMORY;
1821 if (!(sam->str=(SAM_STR5 *)talloc(ctx, max_entries*sizeof(SAM_STR5))))
1822 return NT_STATUS_NO_MEMORY;
1824 ZERO_STRUCTP(sam->sam);
1825 ZERO_STRUCTP(sam->str);
1827 for (i = 0; (i < max_entries) && (dsize < max_data_size); i++) {
1828 len_sam_name = strlen(grp[i].name);
1830 init_sam_entry5(&sam->sam[i], start_idx + i + 1, len_sam_name);
1831 init_string2(&sam->str[i].grp_name, grp[i].name, len_sam_name);
1833 dsize += sizeof(SAM_ENTRY5);
1834 dsize += len_sam_name;
1840 return NT_STATUS_NO_PROBLEMO;
1843 /*******************************************************************
1844 reads or writes a structure.
1845 ********************************************************************/
1847 static BOOL sam_io_sam_dispinfo_5(char *desc, SAM_DISPINFO_5 * sam,
1849 prs_struct *ps, int depth)
1856 prs_debug(ps, depth, desc, "sam_io_sam_dispinfo_5");
1862 if (UNMARSHALLING(ps) && num_entries > 0) {
1864 if ((sam->sam = (SAM_ENTRY5 *)
1865 prs_alloc_mem(ps, sizeof(SAM_ENTRY5) *
1866 num_entries)) == NULL) {
1867 DEBUG(0, ("out of memory allocating SAM_ENTRY5\n"));
1871 if ((sam->str = (SAM_STR5 *)
1872 prs_alloc_mem(ps, sizeof(SAM_STR5) *
1873 num_entries)) == NULL) {
1874 DEBUG(0, ("out of memory allocating SAM_STR5\n"));
1879 for (i = 0; i < num_entries; i++) {
1880 if(!sam_io_sam_entry5("", &sam->sam[i], ps, depth))
1884 for (i = 0; i < num_entries; i++) {
1885 if(!smb_io_string2("grp_name", &sam->str[i].grp_name,
1886 sam->sam[i].hdr_grp_name.buffer, ps, depth))
1895 /*******************************************************************
1896 inits a SAMR_R_QUERY_DISPINFO structure.
1897 ********************************************************************/
1899 void init_samr_r_query_dispinfo(SAMR_R_QUERY_DISPINFO * r_u,
1900 uint32 num_entries, uint32 data_size,
1901 uint16 switch_level, SAM_DISPINFO_CTR * ctr,
1904 DEBUG(5, ("init_samr_r_query_dispinfo: level %d\n", switch_level));
1906 r_u->total_size = data_size; /* not calculated */
1907 r_u->data_size = data_size;
1909 r_u->switch_level = switch_level;
1910 r_u->num_entries = num_entries;
1913 r_u->ptr_entries = 0;
1915 r_u->ptr_entries = 1;
1917 r_u->num_entries2 = num_entries;
1920 r_u->status = status;
1923 /*******************************************************************
1924 reads or writes a structure.
1925 ********************************************************************/
1927 BOOL samr_io_r_query_dispinfo(char *desc, SAMR_R_QUERY_DISPINFO * r_u,
1928 prs_struct *ps, int depth)
1933 prs_debug(ps, depth, desc, "samr_io_r_query_dispinfo");
1939 if(!prs_uint32("total_size ", ps, depth, &r_u->total_size))
1941 if(!prs_uint32("data_size ", ps, depth, &r_u->data_size))
1943 if(!prs_uint16("switch_level", ps, depth, &r_u->switch_level))
1948 if(!prs_uint32("num_entries ", ps, depth, &r_u->num_entries))
1950 if(!prs_uint32("ptr_entries ", ps, depth, &r_u->ptr_entries))
1953 if (r_u->ptr_entries==0) {
1956 if(!prs_uint32("status", ps, depth, &r_u->status))
1962 if(!prs_uint32("num_entries2", ps, depth, &r_u->num_entries2))
1965 switch (r_u->switch_level) {
1967 if(!sam_io_sam_dispinfo_1("users", r_u->ctr->sam.info1,
1968 r_u->num_entries, ps, depth))
1972 if(!sam_io_sam_dispinfo_2("servers", r_u->ctr->sam.info2,
1973 r_u->num_entries, ps, depth))
1977 if(!sam_io_sam_dispinfo_3("groups", r_u->ctr->sam.info3,
1978 r_u->num_entries, ps, depth))
1982 if(!sam_io_sam_dispinfo_4("user list",
1983 r_u->ctr->sam.info4,
1984 r_u->num_entries, ps, depth))
1988 if(!sam_io_sam_dispinfo_5("group list",
1989 r_u->ctr->sam.info5,
1990 r_u->num_entries, ps, depth))
1994 DEBUG(0,("samr_io_r_query_dispinfo: unknown switch value\n"));
2000 if(!prs_uint32("status", ps, depth, &r_u->status))
2006 /*******************************************************************
2007 inits a SAMR_Q_OPEN_GROUP structure.
2008 ********************************************************************/
2010 void init_samr_q_open_group(SAMR_Q_OPEN_GROUP * q_c,
2012 uint32 access_mask, uint32 rid)
2014 DEBUG(5, ("init_samr_q_open_group\n"));
2016 q_c->domain_pol = *hnd;
2017 q_c->access_mask = access_mask;
2018 q_c->rid_group = rid;
2021 /*******************************************************************
2022 reads or writes a structure.
2023 ********************************************************************/
2025 BOOL samr_io_q_open_group(char *desc, SAMR_Q_OPEN_GROUP * q_u,
2026 prs_struct *ps, int depth)
2031 prs_debug(ps, depth, desc, "samr_io_q_open_group");
2037 if(!smb_io_pol_hnd("domain_pol", &q_u->domain_pol, ps, depth))
2040 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
2042 if(!prs_uint32("rid_group", ps, depth, &q_u->rid_group))
2048 /*******************************************************************
2049 reads or writes a structure.
2050 ********************************************************************/
2052 BOOL samr_io_r_open_group(char *desc, SAMR_R_OPEN_GROUP * r_u,
2053 prs_struct *ps, int depth)
2058 prs_debug(ps, depth, desc, "samr_io_r_open_group");
2064 if(!smb_io_pol_hnd("pol", &r_u->pol, ps, depth))
2067 if(!prs_uint32("status", ps, depth, &r_u->status))
2073 /*******************************************************************
2074 inits a GROUP_INFO1 structure.
2075 ********************************************************************/
2077 void init_samr_group_info1(GROUP_INFO1 * gr1,
2078 char *acct_name, char *acct_desc,
2081 int desc_len = acct_desc != NULL ? strlen(acct_desc) : 0;
2082 int acct_len = acct_name != NULL ? strlen(acct_name) : 0;
2084 DEBUG(5, ("init_samr_group_info1\n"));
2086 init_uni_hdr(&gr1->hdr_acct_name, acct_len);
2088 gr1->unknown_1 = 0x3;
2089 gr1->num_members = num_members;
2091 init_uni_hdr(&gr1->hdr_acct_desc, desc_len);
2093 init_unistr2(&gr1->uni_acct_name, acct_name, acct_len);
2094 init_unistr2(&gr1->uni_acct_desc, acct_desc, desc_len);
2097 /*******************************************************************
2098 reads or writes a structure.
2099 ********************************************************************/
2101 BOOL samr_io_group_info1(char *desc, GROUP_INFO1 * gr1,
2102 prs_struct *ps, int depth)
2107 prs_debug(ps, depth, desc, "samr_io_group_info1");
2113 if(!smb_io_unihdr("hdr_acct_name", &gr1->hdr_acct_name, ps, depth))
2116 if(!prs_uint32("unknown_1", ps, depth, &gr1->unknown_1))
2118 if(!prs_uint32("num_members", ps, depth, &gr1->num_members))
2121 if(!smb_io_unihdr("hdr_acct_desc", &gr1->hdr_acct_desc, ps, depth))
2124 if(!smb_io_unistr2("uni_acct_name", &gr1->uni_acct_name,
2125 gr1->hdr_acct_name.buffer, ps, depth))
2128 if(!smb_io_unistr2("uni_acct_desc", &gr1->uni_acct_desc,
2129 gr1->hdr_acct_desc.buffer, ps, depth))
2135 /*******************************************************************
2136 inits a GROUP_INFO4 structure.
2137 ********************************************************************/
2139 void init_samr_group_info4(GROUP_INFO4 * gr4, char *acct_desc)
2141 int acct_len = acct_desc != NULL ? strlen(acct_desc) : 0;
2143 DEBUG(5, ("init_samr_group_info4\n"));
2145 init_uni_hdr(&gr4->hdr_acct_desc, acct_len);
2146 init_unistr2(&gr4->uni_acct_desc, acct_desc, acct_len);
2149 /*******************************************************************
2150 reads or writes a structure.
2151 ********************************************************************/
2153 BOOL samr_io_group_info4(char *desc, GROUP_INFO4 * gr4,
2154 prs_struct *ps, int depth)
2159 prs_debug(ps, depth, desc, "samr_io_group_info4");
2165 if(!smb_io_unihdr("hdr_acct_desc", &gr4->hdr_acct_desc, ps, depth))
2167 if(!smb_io_unistr2("uni_acct_desc", &gr4->uni_acct_desc,
2168 gr4->hdr_acct_desc.buffer, ps, depth))
2174 /*******************************************************************
2175 reads or writes a structure.
2176 ********************************************************************/
2178 static BOOL samr_group_info_ctr(char *desc, GROUP_INFO_CTR **ctr,
2179 prs_struct *ps, int depth)
2181 if (UNMARSHALLING(ps))
2182 *ctr = (GROUP_INFO_CTR *)prs_alloc_mem(ps,sizeof(GROUP_INFO_CTR));
2187 prs_debug(ps, depth, desc, "samr_group_info_ctr");
2190 if(!prs_uint16("switch_value1", ps, depth, &(*ctr)->switch_value1))
2192 if(!prs_uint16("switch_value2", ps, depth, &(*ctr)->switch_value2))
2195 switch ((*ctr)->switch_value1) {
2197 if(!samr_io_group_info1("group_info1",
2198 &(*ctr)->group.info1, ps, depth))
2202 if(!samr_io_group_info4("group_info4",
2203 &(*ctr)->group.info4, ps, depth))
2207 DEBUG(0,("samr_group_info_ctr: unsupported switch level\n"));
2214 /*******************************************************************
2215 inits a SAMR_Q_CREATE_DOM_GROUP structure.
2216 ********************************************************************/
2218 void init_samr_q_create_dom_group(SAMR_Q_CREATE_DOM_GROUP * q_e,
2219 POLICY_HND *pol, char *acct_desc,
2222 int acct_len = acct_desc != NULL ? strlen(acct_desc) : 0;
2224 DEBUG(5, ("init_samr_q_create_dom_group\n"));
2228 init_uni_hdr(&q_e->hdr_acct_desc, acct_len);
2229 init_unistr2(&q_e->uni_acct_desc, acct_desc, acct_len);
2231 q_e->access_mask = access_mask;
2234 /*******************************************************************
2235 reads or writes a structure.
2236 ********************************************************************/
2238 BOOL samr_io_q_create_dom_group(char *desc, SAMR_Q_CREATE_DOM_GROUP * q_e,
2239 prs_struct *ps, int depth)
2244 prs_debug(ps, depth, desc, "samr_io_q_create_dom_group");
2250 if(!smb_io_pol_hnd("pol", &q_e->pol, ps, depth))
2253 if(!smb_io_unihdr("hdr_acct_desc", &q_e->hdr_acct_desc, ps, depth))
2255 if(!smb_io_unistr2("uni_acct_desc", &q_e->uni_acct_desc,
2256 q_e->hdr_acct_desc.buffer, ps, depth))
2261 if(!prs_uint32("access", ps, depth, &q_e->access_mask))
2267 /*******************************************************************
2268 reads or writes a structure.
2269 ********************************************************************/
2271 BOOL samr_io_r_create_dom_group(char *desc, SAMR_R_CREATE_DOM_GROUP * r_u,
2272 prs_struct *ps, int depth)
2277 prs_debug(ps, depth, desc, "samr_io_r_create_dom_group");
2283 if(!smb_io_pol_hnd("pol", &r_u->pol, ps, depth))
2286 if(!prs_uint32("rid ", ps, depth, &r_u->rid))
2288 if(!prs_uint32("status", ps, depth, &r_u->status))
2294 /*******************************************************************
2295 inits a SAMR_Q_DELETE_DOM_GROUP structure.
2296 ********************************************************************/
2298 void init_samr_q_delete_dom_group(SAMR_Q_DELETE_DOM_GROUP * q_c,
2301 DEBUG(5, ("init_samr_q_delete_dom_group\n"));
2303 q_c->group_pol = *hnd;
2306 /*******************************************************************
2307 reads or writes a structure.
2308 ********************************************************************/
2310 BOOL samr_io_q_delete_dom_group(char *desc, SAMR_Q_DELETE_DOM_GROUP * q_u,
2311 prs_struct *ps, int depth)
2316 prs_debug(ps, depth, desc, "samr_io_q_delete_dom_group");
2322 if(!smb_io_pol_hnd("group_pol", &q_u->group_pol, ps, depth))
2328 /*******************************************************************
2329 reads or writes a structure.
2330 ********************************************************************/
2332 BOOL samr_io_r_delete_dom_group(char *desc, SAMR_R_DELETE_DOM_GROUP * r_u,
2333 prs_struct *ps, int depth)
2338 prs_debug(ps, depth, desc, "samr_io_r_delete_dom_group");
2344 if(!prs_uint32("status", ps, depth, &r_u->status))
2350 /*******************************************************************
2351 inits a SAMR_Q_DEL_GROUPMEM structure.
2352 ********************************************************************/
2354 void init_samr_q_del_groupmem(SAMR_Q_DEL_GROUPMEM * q_e,
2355 POLICY_HND *pol, uint32 rid)
2357 DEBUG(5, ("init_samr_q_del_groupmem\n"));
2363 /*******************************************************************
2364 reads or writes a structure.
2365 ********************************************************************/
2367 BOOL samr_io_q_del_groupmem(char *desc, SAMR_Q_DEL_GROUPMEM * q_e,
2368 prs_struct *ps, int depth)
2373 prs_debug(ps, depth, desc, "samr_io_q_del_groupmem");
2379 if(!smb_io_pol_hnd("pol", &q_e->pol, ps, depth))
2382 if(!prs_uint32("rid", ps, depth, &q_e->rid))
2388 /*******************************************************************
2389 inits a SAMR_R_DEL_GROUPMEM structure.
2390 ********************************************************************/
2392 void init_samr_r_del_groupmem(SAMR_R_DEL_GROUPMEM * r_u, POLICY_HND *pol,
2395 DEBUG(5, ("init_samr_r_del_groupmem\n"));
2397 r_u->status = status;
2400 /*******************************************************************
2401 reads or writes a structure.
2402 ********************************************************************/
2404 BOOL samr_io_r_del_groupmem(char *desc, SAMR_R_DEL_GROUPMEM * r_u,
2405 prs_struct *ps, int depth)
2410 prs_debug(ps, depth, desc, "samr_io_r_del_groupmem");
2416 if(!prs_uint32("status", ps, depth, &r_u->status))
2422 /*******************************************************************
2423 inits a SAMR_Q_ADD_GROUPMEM structure.
2424 ********************************************************************/
2426 void init_samr_q_add_groupmem(SAMR_Q_ADD_GROUPMEM * q_e,
2427 POLICY_HND *pol, uint32 rid)
2429 DEBUG(5, ("init_samr_q_add_groupmem\n"));
2433 q_e->unknown = 0x0005;
2436 /*******************************************************************
2437 reads or writes a structure.
2438 ********************************************************************/
2440 BOOL samr_io_q_add_groupmem(char *desc, SAMR_Q_ADD_GROUPMEM * q_e,
2441 prs_struct *ps, int depth)
2446 prs_debug(ps, depth, desc, "samr_io_q_add_groupmem");
2452 if(!smb_io_pol_hnd("pol", &q_e->pol, ps, depth))
2455 if(!prs_uint32("rid ", ps, depth, &q_e->rid))
2457 if(!prs_uint32("unknown", ps, depth, &q_e->unknown))
2463 /*******************************************************************
2464 inits a SAMR_R_ADD_GROUPMEM structure.
2465 ********************************************************************/
2467 void init_samr_r_add_groupmem(SAMR_R_ADD_GROUPMEM * r_u, POLICY_HND *pol,
2470 DEBUG(5, ("init_samr_r_add_groupmem\n"));
2472 r_u->status = status;
2475 /*******************************************************************
2476 reads or writes a structure.
2477 ********************************************************************/
2479 BOOL samr_io_r_add_groupmem(char *desc, SAMR_R_ADD_GROUPMEM * r_u,
2480 prs_struct *ps, int depth)
2485 prs_debug(ps, depth, desc, "samr_io_r_add_groupmem");
2491 if(!prs_uint32("status", ps, depth, &r_u->status))
2497 /*******************************************************************
2498 inits a SAMR_Q_SET_GROUPINFO structure.
2499 ********************************************************************/
2501 void init_samr_q_set_groupinfo(SAMR_Q_SET_GROUPINFO * q_e,
2502 POLICY_HND *pol, GROUP_INFO_CTR * ctr)
2504 DEBUG(5, ("init_samr_q_set_groupinfo\n"));
2510 /*******************************************************************
2511 reads or writes a structure.
2512 ********************************************************************/
2514 BOOL samr_io_q_set_groupinfo(char *desc, SAMR_Q_SET_GROUPINFO * q_e,
2515 prs_struct *ps, int depth)
2520 prs_debug(ps, depth, desc, "samr_io_q_set_groupinfo");
2526 if(!smb_io_pol_hnd("pol", &q_e->pol, ps, depth))
2529 if(!samr_group_info_ctr("ctr", &q_e->ctr, ps, depth))
2535 /*******************************************************************
2536 inits a SAMR_R_SET_GROUPINFO structure.
2537 ********************************************************************/
2539 void init_samr_r_set_groupinfo(SAMR_R_SET_GROUPINFO * r_u, uint32 status)
2541 DEBUG(5, ("init_samr_r_set_groupinfo\n"));
2543 r_u->status = status;
2546 /*******************************************************************
2547 reads or writes a structure.
2548 ********************************************************************/
2550 BOOL samr_io_r_set_groupinfo(char *desc, SAMR_R_SET_GROUPINFO * r_u,
2551 prs_struct *ps, int depth)
2556 prs_debug(ps, depth, desc, "samr_io_r_set_groupinfo");
2562 if(!prs_uint32("status", ps, depth, &r_u->status))
2568 /*******************************************************************
2569 inits a SAMR_Q_QUERY_GROUPINFO structure.
2570 ********************************************************************/
2572 void init_samr_q_query_groupinfo(SAMR_Q_QUERY_GROUPINFO * q_e,
2573 POLICY_HND *pol, uint16 switch_level)
2575 DEBUG(5, ("init_samr_q_query_groupinfo\n"));
2579 q_e->switch_level = switch_level;
2582 /*******************************************************************
2583 reads or writes a structure.
2584 ********************************************************************/
2586 BOOL samr_io_q_query_groupinfo(char *desc, SAMR_Q_QUERY_GROUPINFO * q_e,
2587 prs_struct *ps, int depth)
2592 prs_debug(ps, depth, desc, "samr_io_q_query_groupinfo");
2598 if(!smb_io_pol_hnd("pol", &q_e->pol, ps, depth))
2601 if(!prs_uint16("switch_level", ps, depth, &q_e->switch_level))
2607 /*******************************************************************
2608 inits a SAMR_R_QUERY_GROUPINFO structure.
2609 ********************************************************************/
2611 void init_samr_r_query_groupinfo(SAMR_R_QUERY_GROUPINFO * r_u,
2612 GROUP_INFO_CTR * ctr, uint32 status)
2614 DEBUG(5, ("init_samr_r_query_groupinfo\n"));
2616 r_u->ptr = (status == 0x0 && ctr != NULL) ? 1 : 0;
2618 r_u->status = status;
2621 /*******************************************************************
2622 reads or writes a structure.
2623 ********************************************************************/
2625 BOOL samr_io_r_query_groupinfo(char *desc, SAMR_R_QUERY_GROUPINFO * r_u,
2626 prs_struct *ps, int depth)
2631 prs_debug(ps, depth, desc, "samr_io_r_query_groupinfo");
2637 if(!prs_uint32("ptr", ps, depth, &r_u->ptr))
2640 if (r_u->ptr != 0) {
2641 if(!samr_group_info_ctr("ctr", &r_u->ctr, ps, depth))
2647 if(!prs_uint32("status", ps, depth, &r_u->status))
2653 /*******************************************************************
2654 inits a SAMR_Q_QUERY_GROUPMEM structure.
2655 ********************************************************************/
2657 void init_samr_q_query_groupmem(SAMR_Q_QUERY_GROUPMEM * q_c, POLICY_HND *hnd)
2659 DEBUG(5, ("init_samr_q_query_groupmem\n"));
2661 q_c->group_pol = *hnd;
2664 /*******************************************************************
2665 reads or writes a structure.
2666 ********************************************************************/
2668 BOOL samr_io_q_query_groupmem(char *desc, SAMR_Q_QUERY_GROUPMEM * q_u,
2669 prs_struct *ps, int depth)
2674 prs_debug(ps, depth, desc, "samr_io_q_query_groupmem");
2680 if(!smb_io_pol_hnd("group_pol", &q_u->group_pol, ps, depth))
2686 /*******************************************************************
2687 inits a SAMR_R_QUERY_GROUPMEM structure.
2688 ********************************************************************/
2690 void init_samr_r_query_groupmem(SAMR_R_QUERY_GROUPMEM * r_u,
2691 uint32 num_entries, uint32 *rid,
2692 uint32 *attr, uint32 status)
2694 DEBUG(5, ("init_samr_r_query_groupmem\n"));
2696 if (status == 0x0) {
2698 r_u->num_entries = num_entries;
2700 r_u->ptr_attrs = attr != NULL ? 1 : 0;
2701 r_u->ptr_rids = rid != NULL ? 1 : 0;
2703 r_u->num_rids = num_entries;
2706 r_u->num_attrs = num_entries;
2710 r_u->num_entries = 0;
2713 r_u->status = status;
2716 /*******************************************************************
2717 reads or writes a structure.
2718 ********************************************************************/
2720 BOOL samr_io_r_query_groupmem(char *desc, SAMR_R_QUERY_GROUPMEM * r_u,
2721 prs_struct *ps, int depth)
2728 if (UNMARSHALLING(ps))
2731 prs_debug(ps, depth, desc, "samr_io_r_query_groupmem");
2737 if(!prs_uint32("ptr", ps, depth, &r_u->ptr))
2739 if(!prs_uint32("num_entries ", ps, depth, &r_u->num_entries))
2742 if (r_u->ptr != 0) {
2743 if(!prs_uint32("ptr_rids ", ps, depth, &r_u->ptr_rids))
2745 if(!prs_uint32("ptr_attrs", ps, depth, &r_u->ptr_attrs))
2748 if (r_u->ptr_rids != 0) {
2749 if(!prs_uint32("num_rids", ps, depth, &r_u->num_rids))
2751 if (UNMARSHALLING(ps) && r_u->num_rids != 0) {
2752 r_u->rid = (uint32 *)prs_alloc_mem(ps,sizeof(r_u->rid[0])*r_u->num_rids);
2753 if (r_u->rid == NULL)
2757 for (i = 0; i < r_u->num_rids; i++) {
2758 if(!prs_uint32("", ps, depth, &r_u->rid[i]))
2763 if (r_u->ptr_attrs != 0) {
2764 if(!prs_uint32("num_attrs", ps, depth, &r_u->num_attrs))
2767 if (UNMARSHALLING(ps) && r_u->num_attrs != 0) {
2768 r_u->attr = (uint32 *)prs_alloc_mem(ps,sizeof(r_u->attr[0])*r_u->num_attrs);
2769 if (r_u->attr == NULL)
2773 for (i = 0; i < r_u->num_attrs; i++) {
2774 if(!prs_uint32("", ps, depth, &r_u->attr[i]))
2780 if(!prs_uint32("status", ps, depth, &r_u->status))
2786 /*******************************************************************
2787 inits a SAMR_Q_QUERY_USERGROUPS structure.
2788 ********************************************************************/
2790 void init_samr_q_query_usergroups(SAMR_Q_QUERY_USERGROUPS * q_u,
2793 DEBUG(5, ("init_samr_q_query_usergroups\n"));
2798 /*******************************************************************
2799 reads or writes a structure.
2800 ********************************************************************/
2802 BOOL samr_io_q_query_usergroups(char *desc, SAMR_Q_QUERY_USERGROUPS * q_u,
2803 prs_struct *ps, int depth)
2808 prs_debug(ps, depth, desc, "samr_io_q_query_usergroups");
2814 if(!smb_io_pol_hnd("pol", &q_u->pol, ps, depth))
2820 /*******************************************************************
2821 inits a SAMR_R_QUERY_USERGROUPS structure.
2822 ********************************************************************/
2824 void init_samr_r_query_usergroups(SAMR_R_QUERY_USERGROUPS * r_u,
2825 uint32 num_gids, DOM_GID * gid,
2828 DEBUG(5, ("init_samr_r_query_usergroups\n"));
2832 r_u->num_entries = num_gids;
2833 r_u->ptr_1 = (num_gids != 0) ? 1 : 0;
2834 r_u->num_entries2 = num_gids;
2839 r_u->num_entries = 0;
2844 r_u->status = status;
2847 /*******************************************************************
2848 reads or writes a structure.
2849 ********************************************************************/
2851 BOOL samr_io_gids(char *desc, uint32 *num_gids, DOM_GID ** gid,
2852 prs_struct *ps, int depth)
2858 prs_debug(ps, depth, desc, "samr_io_gids");
2864 if(!prs_uint32("num_gids", ps, depth, num_gids))
2867 if ((*num_gids) != 0) {
2868 if (UNMARSHALLING(ps)) {
2869 (*gid) = (DOM_GID *)prs_alloc_mem(ps,sizeof(DOM_GID)*(*num_gids));
2872 if ((*gid) == NULL) {
2876 for (i = 0; i < (*num_gids); i++) {
2877 if(!smb_io_gid("gids", &(*gid)[i], ps, depth))
2885 /*******************************************************************
2886 reads or writes a structure.
2887 ********************************************************************/
2889 BOOL samr_io_r_query_usergroups(char *desc, SAMR_R_QUERY_USERGROUPS * r_u,
2890 prs_struct *ps, int depth)
2895 prs_debug(ps, depth, desc, "samr_io_r_query_usergroups");
2901 if(!prs_uint32("ptr_0 ", ps, depth, &r_u->ptr_0))
2904 if (r_u->ptr_0 != 0) {
2905 if(!prs_uint32("num_entries ", ps, depth, &r_u->num_entries))
2907 if(!prs_uint32("ptr_1 ", ps, depth, &r_u->ptr_1))
2910 if (r_u->num_entries != 0 && r_u->ptr_1 != 0) {
2911 if(!samr_io_gids("gids", &r_u->num_entries2, &r_u->gid, ps, depth))
2918 if(!prs_uint32("status", ps, depth, &r_u->status))
2924 /*******************************************************************
2925 inits a SAMR_Q_ENUM_DOMAINS structure.
2926 ********************************************************************/
2928 void init_samr_q_enum_domains(SAMR_Q_ENUM_DOMAINS * q_e,
2930 uint32 start_idx, uint32 size)
2932 DEBUG(5, ("init_samr_q_enum_domains\n"));
2936 q_e->start_idx = start_idx;
2937 q_e->max_size = size;
2940 /*******************************************************************
2941 reads or writes a structure.
2942 ********************************************************************/
2944 BOOL samr_io_q_enum_domains(char *desc, SAMR_Q_ENUM_DOMAINS * q_e,
2945 prs_struct *ps, int depth)
2950 prs_debug(ps, depth, desc, "samr_io_q_enum_domains");
2956 if(!smb_io_pol_hnd("pol", &q_e->pol, ps, depth))
2959 if(!prs_uint32("start_idx", ps, depth, &q_e->start_idx))
2961 if(!prs_uint32("max_size ", ps, depth, &q_e->max_size))
2967 /*******************************************************************
2968 inits a SAMR_R_ENUM_DOMAINS structure.
2969 ********************************************************************/
2971 void init_samr_r_enum_domains(SAMR_R_ENUM_DOMAINS * r_u,
2972 uint32 next_idx, uint32 num_sam_entries)
2974 DEBUG(5, ("init_samr_r_enum_domains\n"));
2976 r_u->next_idx = next_idx;
2978 if (num_sam_entries != 0) {
2979 r_u->ptr_entries1 = 1;
2980 r_u->ptr_entries2 = 1;
2981 r_u->num_entries2 = num_sam_entries;
2982 r_u->num_entries3 = num_sam_entries;
2984 r_u->num_entries4 = num_sam_entries;
2986 r_u->ptr_entries1 = 0;
2987 r_u->num_entries2 = num_sam_entries;
2988 r_u->ptr_entries2 = 1;
2992 /*******************************************************************
2993 reads or writes a structure.
2994 ********************************************************************/
2996 BOOL samr_io_r_enum_domains(char *desc, SAMR_R_ENUM_DOMAINS * r_u,
2997 prs_struct *ps, int depth)
3004 prs_debug(ps, depth, desc, "samr_io_r_enum_domains");
3010 if(!prs_uint32("next_idx ", ps, depth, &r_u->next_idx))
3012 if(!prs_uint32("ptr_entries1", ps, depth, &r_u->ptr_entries1))
3015 if (r_u->ptr_entries1 != 0) {
3016 if(!prs_uint32("num_entries2", ps, depth, &r_u->num_entries2))
3018 if(!prs_uint32("ptr_entries2", ps, depth, &r_u->ptr_entries2))
3020 if(!prs_uint32("num_entries3", ps, depth, &r_u->num_entries3))
3023 if (UNMARSHALLING(ps)) {
3024 r_u->sam = (SAM_ENTRY *)prs_alloc_mem(ps,sizeof(SAM_ENTRY)*r_u->num_entries2);
3025 r_u->uni_dom_name = (UNISTR2 *)prs_alloc_mem(ps,sizeof(UNISTR2)*r_u->num_entries2);
3028 if ((r_u->sam == NULL || r_u->uni_dom_name == NULL) && r_u->num_entries2 != 0) {
3029 DEBUG(0, ("NULL pointers in SAMR_R_ENUM_DOMAINS\n"));
3030 r_u->num_entries4 = 0;
3031 r_u->status = NT_STATUS_MEMORY_NOT_ALLOCATED;
3035 for (i = 0; i < r_u->num_entries2; i++) {
3037 slprintf(tmp, sizeof(tmp) - 1, "dom[%d]", i);
3038 if(!sam_io_sam_entry(tmp, &r_u->sam[i], ps, depth))
3042 for (i = 0; i < r_u->num_entries2; i++) {
3044 slprintf(tmp, sizeof(tmp) - 1, "dom[%d]", i);
3045 if(!smb_io_unistr2(tmp, &r_u->uni_dom_name[i],
3046 r_u->sam[i].hdr_name.buffer, ps,
3055 if(!prs_uint32("num_entries4", ps, depth, &r_u->num_entries4))
3057 if(!prs_uint32("status", ps, depth, &r_u->status))
3063 /*******************************************************************
3064 inits a SAMR_Q_ENUM_DOM_GROUPS structure.
3065 ********************************************************************/
3067 void init_samr_q_enum_dom_groups(SAMR_Q_ENUM_DOM_GROUPS * q_e,
3069 uint32 start_idx, uint32 size)
3071 DEBUG(5, ("init_samr_q_enum_dom_groups\n"));
3075 q_e->start_idx = start_idx;
3076 q_e->max_size = size;
3079 /*******************************************************************
3080 reads or writes a structure.
3081 ********************************************************************/
3083 BOOL samr_io_q_enum_dom_groups(char *desc, SAMR_Q_ENUM_DOM_GROUPS * q_e,
3084 prs_struct *ps, int depth)
3089 prs_debug(ps, depth, desc, "samr_io_q_enum_dom_groups");
3095 if(!smb_io_pol_hnd("pol", &(q_e->pol), ps, depth))
3098 if(!prs_uint32("start_idx", ps, depth, &q_e->start_idx))
3100 if(!prs_uint32("max_size ", ps, depth, &q_e->max_size))
3106 /*******************************************************************
3107 inits a SAMR_R_ENUM_DOM_GROUPS structure.
3108 ********************************************************************/
3110 void init_samr_r_enum_dom_groups(SAMR_R_ENUM_DOM_GROUPS * r_u,
3111 uint32 next_idx, uint32 num_sam_entries)
3113 DEBUG(5, ("init_samr_r_enum_dom_groups\n"));
3115 r_u->next_idx = next_idx;
3117 if (num_sam_entries != 0) {
3118 r_u->ptr_entries1 = 1;
3119 r_u->ptr_entries2 = 1;
3120 r_u->num_entries2 = num_sam_entries;
3121 r_u->num_entries3 = num_sam_entries;
3123 r_u->num_entries4 = num_sam_entries;
3125 r_u->ptr_entries1 = 0;
3126 r_u->num_entries2 = num_sam_entries;
3127 r_u->ptr_entries2 = 1;
3131 /*******************************************************************
3132 reads or writes a structure.
3133 ********************************************************************/
3135 BOOL samr_io_r_enum_dom_groups(char *desc, SAMR_R_ENUM_DOM_GROUPS * r_u,
3136 prs_struct *ps, int depth)
3143 prs_debug(ps, depth, desc, "samr_io_r_enum_dom_groups");
3149 if(!prs_uint32("next_idx ", ps, depth, &r_u->next_idx))
3151 if(!prs_uint32("ptr_entries1", ps, depth, &r_u->ptr_entries1))
3154 if (r_u->ptr_entries1 != 0) {
3155 if(!prs_uint32("num_entries2", ps, depth, &r_u->num_entries2))
3157 if(!prs_uint32("ptr_entries2", ps, depth, &r_u->ptr_entries2))
3159 if(!prs_uint32("num_entries3", ps, depth, &r_u->num_entries3))
3162 if (UNMARSHALLING(ps)) {
3163 r_u->sam = (SAM_ENTRY *)prs_alloc_mem(ps,sizeof(SAM_ENTRY)*r_u->num_entries2);
3164 r_u->uni_grp_name = (UNISTR2 *)prs_alloc_mem(ps,sizeof(UNISTR2)*r_u->num_entries2);
3167 if ((r_u->sam == NULL || r_u->uni_grp_name == NULL) && r_u->num_entries2 != 0) {
3169 ("NULL pointers in SAMR_R_ENUM_DOM_GROUPS\n"));
3170 r_u->num_entries4 = 0;
3171 r_u->status = NT_STATUS_MEMORY_NOT_ALLOCATED;
3175 for (i = 0; i < r_u->num_entries2; i++) {
3176 if(!sam_io_sam_entry("", &r_u->sam[i], ps, depth))
3180 for (i = 0; i < r_u->num_entries2; i++) {
3181 if(!smb_io_unistr2("", &r_u->uni_grp_name[i],
3182 r_u->sam[i].hdr_name.buffer, ps, depth))
3189 if(!prs_uint32("num_entries4", ps, depth, &r_u->num_entries4))
3191 if(!prs_uint32("status", ps, depth, &r_u->status))
3197 /*******************************************************************
3198 inits a SAMR_Q_ENUM_DOM_ALIASES structure.
3199 ********************************************************************/
3201 void init_samr_q_enum_dom_aliases(SAMR_Q_ENUM_DOM_ALIASES * q_e,
3202 POLICY_HND *pol, uint32 start_idx,
3205 DEBUG(5, ("init_samr_q_enum_dom_aliases\n"));
3209 q_e->start_idx = start_idx;
3210 q_e->max_size = size;
3214 /*******************************************************************
3215 reads or writes a structure.
3216 ********************************************************************/
3218 BOOL samr_io_q_enum_dom_aliases(char *desc, SAMR_Q_ENUM_DOM_ALIASES * q_e,
3219 prs_struct *ps, int depth)
3224 prs_debug(ps, depth, desc, "samr_io_q_enum_dom_aliases");
3230 if(!smb_io_pol_hnd("pol", &q_e->pol, ps, depth))
3233 if(!prs_uint32("start_idx", ps, depth, &q_e->start_idx))
3235 if(!prs_uint32("max_size ", ps, depth, &q_e->max_size))
3241 /*******************************************************************
3242 inits a SAMR_R_ENUM_DOM_ALIASES structure.
3243 ********************************************************************/
3245 void init_samr_r_enum_dom_aliases(SAMR_R_ENUM_DOM_ALIASES *r_u, uint32 next_idx, uint32 num_sam_entries)
3247 DEBUG(5, ("init_samr_r_enum_dom_aliases\n"));
3249 r_u->next_idx = next_idx;
3251 if (num_sam_entries != 0) {
3252 r_u->ptr_entries1 = 1;
3253 r_u->ptr_entries2 = 1;
3254 r_u->num_entries2 = num_sam_entries;
3255 r_u->num_entries3 = num_sam_entries;
3257 r_u->num_entries4 = num_sam_entries;
3259 r_u->ptr_entries1 = 0;
3260 r_u->num_entries2 = num_sam_entries;
3261 r_u->ptr_entries2 = 1;
3265 /*******************************************************************
3266 reads or writes a structure.
3267 ********************************************************************/
3269 BOOL samr_io_r_enum_dom_aliases(char *desc, SAMR_R_ENUM_DOM_ALIASES * r_u,
3270 prs_struct *ps, int depth)
3277 prs_debug(ps, depth, desc, "samr_io_r_enum_dom_aliases");
3283 if(!prs_uint32("next_idx ", ps, depth, &r_u->next_idx))
3285 if(!prs_uint32("ptr_entries1", ps, depth, &r_u->ptr_entries1))
3288 if (r_u->ptr_entries1 != 0) {
3289 if(!prs_uint32("num_entries2", ps, depth, &r_u->num_entries2))
3291 if(!prs_uint32("ptr_entries2", ps, depth, &r_u->ptr_entries2))
3293 if(!prs_uint32("num_entries3", ps, depth, &r_u->num_entries3))
3296 if (UNMARSHALLING(ps) && (r_u->num_entries2 > 0)) {
3297 r_u->sam = (SAM_ENTRY *)prs_alloc_mem(ps,sizeof(SAM_ENTRY)*r_u->num_entries2);
3298 r_u->uni_grp_name = (UNISTR2 *)prs_alloc_mem(ps,sizeof(UNISTR2)*r_u->num_entries2);
3301 if (r_u->num_entries2 != 0 &&
3302 (r_u->sam == NULL || r_u->uni_grp_name == NULL)) {
3303 DEBUG(0,("NULL pointers in SAMR_R_ENUM_DOM_ALIASES\n"));
3304 r_u->num_entries4 = 0;
3305 r_u->status = NT_STATUS_MEMORY_NOT_ALLOCATED;
3309 for (i = 0; i < r_u->num_entries2; i++) {
3310 if(!sam_io_sam_entry("", &r_u->sam[i], ps, depth))
3314 for (i = 0; i < r_u->num_entries2; i++) {
3315 if(!smb_io_unistr2("", &r_u->uni_grp_name[i],
3316 r_u->sam[i].hdr_name.buffer, ps,
3324 if(!prs_uint32("num_entries4", ps, depth, &r_u->num_entries4))
3326 if(!prs_uint32("status", ps, depth, &r_u->status))
3332 /*******************************************************************
3333 inits a ALIAS_INFO3 structure.
3334 ********************************************************************/
3336 void init_samr_alias_info3(ALIAS_INFO3 * al3, char *acct_desc)
3338 int acct_len = acct_desc != NULL ? strlen(acct_desc) : 0;
3340 DEBUG(5, ("init_samr_alias_info3\n"));
3342 init_uni_hdr(&al3->hdr_acct_desc, acct_len);
3343 init_unistr2(&al3->uni_acct_desc, acct_desc, acct_len);
3346 /*******************************************************************
3347 reads or writes a structure.
3348 ********************************************************************/
3350 BOOL samr_io_alias_info3(char *desc, ALIAS_INFO3 * al3,
3351 prs_struct *ps, int depth)
3356 prs_debug(ps, depth, desc, "samr_io_alias_info3");
3362 if(!smb_io_unihdr("hdr_acct_desc", &al3->hdr_acct_desc, ps, depth))
3364 if(!smb_io_unistr2("uni_acct_desc", &al3->uni_acct_desc,
3365 al3->hdr_acct_desc.buffer, ps, depth))
3371 /*******************************************************************
3372 reads or writes a structure.
3373 ********************************************************************/
3375 BOOL samr_alias_info_ctr(char *desc, ALIAS_INFO_CTR * ctr,
3376 prs_struct *ps, int depth)
3381 prs_debug(ps, depth, desc, "samr_alias_info_ctr");
3384 if(!prs_uint16("switch_value1", ps, depth, &ctr->switch_value1))
3386 if(!prs_uint16("switch_value2", ps, depth, &ctr->switch_value2))
3389 switch (ctr->switch_value1) {
3391 if(!samr_io_alias_info3("alias_info3", &ctr->alias.info3, ps, depth))
3395 DEBUG(0,("samr_alias_info_ctr: unsupported switch level\n"));
3402 /*******************************************************************
3403 inits a SAMR_Q_QUERY_ALIASINFO structure.
3404 ********************************************************************/
3406 void init_samr_q_query_aliasinfo(SAMR_Q_QUERY_ALIASINFO * q_e,
3407 POLICY_HND *pol, uint16 switch_level)
3409 DEBUG(5, ("init_samr_q_query_aliasinfo\n"));
3412 q_e->switch_level = switch_level;
3415 /*******************************************************************
3416 reads or writes a structure.
3417 ********************************************************************/
3419 BOOL samr_io_q_query_aliasinfo(char *desc, SAMR_Q_QUERY_ALIASINFO * q_e,
3420 prs_struct *ps, int depth)
3425 prs_debug(ps, depth, desc, "samr_io_q_query_aliasinfo");
3431 if(!smb_io_pol_hnd("pol", &(q_e->pol), ps, depth))
3434 if(!prs_uint16("switch_level", ps, depth, &q_e->switch_level))
3440 /*******************************************************************
3441 inits a SAMR_R_QUERY_ALIASINFO structure.
3442 ********************************************************************/
3444 void init_samr_r_query_aliasinfo(SAMR_R_QUERY_ALIASINFO * r_u,
3445 ALIAS_INFO_CTR * ctr, uint32 status)
3447 DEBUG(5, ("init_samr_r_query_aliasinfo\n"));
3449 r_u->ptr = (status == 0x0 && ctr != NULL) ? 1 : 0;
3451 r_u->status = status;
3454 /*******************************************************************
3455 reads or writes a structure.
3456 ********************************************************************/
3458 BOOL samr_io_r_query_aliasinfo(char *desc, SAMR_R_QUERY_ALIASINFO * r_u,
3459 prs_struct *ps, int depth)
3464 prs_debug(ps, depth, desc, "samr_io_r_query_aliasinfo");
3470 if(!prs_uint32("ptr", ps, depth, &r_u->ptr))
3473 if (r_u->ptr != 0) {
3474 if(!samr_alias_info_ctr("ctr", &r_u->ctr, ps, depth))
3480 if(!prs_uint32("status", ps, depth, &r_u->status))
3486 /*******************************************************************
3487 inits a SAMR_Q_SET_ALIASINFO structure.
3488 ********************************************************************/
3490 void init_samr_q_set_aliasinfo(SAMR_Q_SET_ALIASINFO * q_u,
3491 POLICY_HND *hnd, ALIAS_INFO_CTR * ctr)
3493 DEBUG(5, ("init_samr_q_set_aliasinfo\n"));
3495 q_u->alias_pol = *hnd;
3499 /*******************************************************************
3500 reads or writes a structure.
3501 ********************************************************************/
3503 BOOL samr_io_q_set_aliasinfo(char *desc, SAMR_Q_SET_ALIASINFO * q_u,
3504 prs_struct *ps, int depth)
3509 prs_debug(ps, depth, desc, "samr_io_q_set_aliasinfo");
3515 if(!smb_io_pol_hnd("alias_pol", &q_u->alias_pol, ps, depth))
3517 if(!samr_alias_info_ctr("ctr", &q_u->ctr, ps, depth))
3523 /*******************************************************************
3524 reads or writes a structure.
3525 ********************************************************************/
3527 BOOL samr_io_r_set_aliasinfo(char *desc, SAMR_R_SET_ALIASINFO * r_u,
3528 prs_struct *ps, int depth)
3533 prs_debug(ps, depth, desc, "samr_io_r_set_aliasinfo");
3538 if(!prs_uint32("status", ps, depth, &r_u->status))
3544 /*******************************************************************
3545 inits a SAMR_Q_QUERY_USERALIASES structure.
3546 ********************************************************************/
3548 void init_samr_q_query_useraliases(SAMR_Q_QUERY_USERALIASES * q_u,
3551 uint32 *ptr_sid, DOM_SID2 * sid)
3553 DEBUG(5, ("init_samr_q_query_useraliases\n"));
3557 q_u->num_sids1 = num_sids;
3559 q_u->num_sids2 = num_sids;
3561 q_u->ptr_sid = ptr_sid;
3565 /*******************************************************************
3566 reads or writes a SAMR_Q_QUERY_USERALIASES structure.
3567 ********************************************************************/
3569 BOOL samr_io_q_query_useraliases(char *desc, SAMR_Q_QUERY_USERALIASES * q_u,
3570 prs_struct *ps, int depth)
3578 prs_debug(ps, depth, desc, "samr_io_q_query_useraliases");
3584 if(!smb_io_pol_hnd("pol", &q_u->pol, ps, depth))
3587 if(!prs_uint32("num_sids1", ps, depth, &q_u->num_sids1))
3589 if(!prs_uint32("ptr ", ps, depth, &q_u->ptr))
3595 if(!prs_uint32("num_sids2", ps, depth, &q_u->num_sids2))
3598 if (UNMARSHALLING(ps) && (q_u->num_sids2 != 0)) {
3599 q_u->ptr_sid = (uint32 *)prs_alloc_mem(ps,sizeof(q_u->ptr_sid[0])*q_u->num_sids2);
3600 if (q_u->ptr_sid == NULL)
3603 q_u->sid = (DOM_SID2 *)prs_alloc_mem(ps, sizeof(q_u->sid[0]) * q_u->num_sids2);
3604 if (q_u->sid == NULL)
3608 for (i = 0; i < q_u->num_sids2; i++) {
3609 slprintf(tmp, sizeof(tmp) - 1, "ptr[%02d]", i);
3610 if(!prs_uint32(tmp, ps, depth, &q_u->ptr_sid[i]))
3614 for (i = 0; i < q_u->num_sids2; i++) {
3615 if (q_u->ptr_sid[i] != 0) {
3616 slprintf(tmp, sizeof(tmp) - 1, "sid[%02d]", i);
3617 if(!smb_io_dom_sid2(tmp, &q_u->sid[i], ps, depth))
3625 /*******************************************************************
3626 inits a SAMR_R_QUERY_USERALIASES structure.
3627 ********************************************************************/
3629 void init_samr_r_query_useraliases(SAMR_R_QUERY_USERALIASES * r_u,
3630 uint32 num_rids, uint32 *rid,
3633 DEBUG(5, ("init_samr_r_query_useraliases\n"));
3635 if (status == 0x0) {
3636 r_u->num_entries = num_rids;
3638 r_u->num_entries2 = num_rids;
3642 r_u->num_entries = 0;
3644 r_u->num_entries2 = 0;
3647 r_u->status = status;
3650 /*******************************************************************
3651 reads or writes a structure.
3652 ********************************************************************/
3654 BOOL samr_io_rids(char *desc, uint32 *num_rids, uint32 **rid,
3655 prs_struct *ps, int depth)
3662 prs_debug(ps, depth, desc, "samr_io_rids");
3668 if(!prs_uint32("num_rids", ps, depth, num_rids))
3671 if ((*num_rids) != 0) {
3672 if (UNMARSHALLING(ps)) {
3674 (*rid) = (uint32 *)prs_alloc_mem(ps,sizeof(uint32)*(*num_rids));
3679 for (i = 0; i < (*num_rids); i++) {
3680 slprintf(tmp, sizeof(tmp) - 1, "rid[%02d]", i);
3681 if(!prs_uint32(tmp, ps, depth, &((*rid)[i])))
3689 /*******************************************************************
3690 reads or writes a structure.
3691 ********************************************************************/
3693 BOOL samr_io_r_query_useraliases(char *desc, SAMR_R_QUERY_USERALIASES * r_u,
3694 prs_struct *ps, int depth)
3699 prs_debug(ps, depth, desc, "samr_io_r_query_useraliases");
3705 if(!prs_uint32("num_entries", ps, depth, &r_u->num_entries))
3707 if(!prs_uint32("ptr ", ps, depth, &r_u->ptr))
3710 if (r_u->ptr != 0) {
3711 if(!samr_io_rids("rids", &r_u->num_entries2, &r_u->rid, ps, depth))
3717 if(!prs_uint32("status", ps, depth, &r_u->status))
3723 /*******************************************************************
3724 inits a SAMR_Q_OPEN_ALIAS structure.
3725 ********************************************************************/
3727 void init_samr_q_open_alias(SAMR_Q_OPEN_ALIAS * q_u, POLICY_HND *pol,
3728 uint32 access_mask, uint32 rid)
3730 DEBUG(5, ("init_samr_q_open_alias\n"));
3732 q_u->dom_pol = *pol;
3733 q_u->access_mask = access_mask;
3734 q_u->rid_alias = rid;
3737 /*******************************************************************
3738 reads or writes a structure.
3739 ********************************************************************/
3741 BOOL samr_io_q_open_alias(char *desc, SAMR_Q_OPEN_ALIAS * q_u,
3742 prs_struct *ps, int depth)
3747 prs_debug(ps, depth, desc, "samr_io_q_open_alias");
3753 if(!smb_io_pol_hnd("domain_pol", &q_u->dom_pol, ps, depth))
3756 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
3758 if(!prs_uint32("rid_alias", ps, depth, &q_u->rid_alias))
3764 /*******************************************************************
3765 reads or writes a structure.
3766 ********************************************************************/
3768 BOOL samr_io_r_open_alias(char *desc, SAMR_R_OPEN_ALIAS * r_u,
3769 prs_struct *ps, int depth)
3774 prs_debug(ps, depth, desc, "samr_io_r_open_alias");
3780 if(!smb_io_pol_hnd("pol", &r_u->pol, ps, depth))
3783 if(!prs_uint32("status", ps, depth, &r_u->status))
3789 /*******************************************************************
3790 inits a SAMR_Q_LOOKUP_RIDS structure.
3791 ********************************************************************/
3793 void init_samr_q_lookup_rids(TALLOC_CTX *ctx, SAMR_Q_LOOKUP_RIDS * q_u,
3794 POLICY_HND *pol, uint32 flags,
3795 uint32 num_rids, uint32 *rid)
3797 DEBUG(5, ("init_samr_q_lookup_rids\n"));
3801 q_u->num_rids1 = num_rids;
3804 q_u->num_rids2 = num_rids;
3805 q_u->rid = (uint32 *)talloc_zero(ctx, num_rids * sizeof(q_u->rid[0]));
3806 if (q_u->rid == NULL) {
3810 memcpy(q_u->rid, rid, num_rids * sizeof(q_u->rid[0]));
3814 /*******************************************************************
3815 reads or writes a structure.
3816 ********************************************************************/
3818 BOOL samr_io_q_lookup_rids(char *desc, SAMR_Q_LOOKUP_RIDS * q_u,
3819 prs_struct *ps, int depth)
3827 prs_debug(ps, depth, desc, "samr_io_q_lookup_rids");
3830 if (UNMARSHALLING(ps))
3836 if(!smb_io_pol_hnd("pol", &q_u->pol, ps, depth))
3839 if(!prs_uint32("num_rids1", ps, depth, &q_u->num_rids1))
3841 if(!prs_uint32("flags ", ps, depth, &q_u->flags))
3843 if(!prs_uint32("ptr ", ps, depth, &q_u->ptr))
3845 if(!prs_uint32("num_rids2", ps, depth, &q_u->num_rids2))
3848 if (UNMARSHALLING(ps) && (q_u->num_rids2 != 0)) {
3849 q_u->rid = (uint32 *)prs_alloc_mem(ps, sizeof(q_u->rid[0])*q_u->num_rids2);
3850 if (q_u->rid == NULL)
3854 for (i = 0; i < q_u->num_rids2; i++) {
3855 slprintf(tmp, sizeof(tmp) - 1, "rid[%02d] ", i);
3856 if(!prs_uint32(tmp, ps, depth, &q_u->rid[i]))
3863 /*******************************************************************
3864 inits a SAMR_R_LOOKUP_RIDS structure.
3865 ********************************************************************/
3867 void init_samr_r_lookup_rids(SAMR_R_LOOKUP_RIDS * r_u,
3868 uint32 num_names, UNIHDR * hdr_name,
3869 UNISTR2 *uni_name, uint32 *type)
3871 DEBUG(5, ("init_samr_r_lookup_rids\n"));
3873 r_u->hdr_name = NULL;
3874 r_u->uni_name = NULL;
3877 if (num_names != 0) {
3878 r_u->num_names1 = num_names;
3880 r_u->num_names2 = num_names;
3882 r_u->num_types1 = num_names;
3884 r_u->num_types2 = num_names;
3886 r_u->hdr_name = hdr_name;
3887 r_u->uni_name = uni_name;
3890 r_u->num_names1 = num_names;
3892 r_u->num_names2 = num_names;
3894 r_u->num_types1 = num_names;
3896 r_u->num_types2 = num_names;
3900 /*******************************************************************
3901 reads or writes a structure.
3902 ********************************************************************/
3904 BOOL samr_io_r_lookup_rids(char *desc, SAMR_R_LOOKUP_RIDS * r_u,
3905 prs_struct *ps, int depth)
3912 prs_debug(ps, depth, desc, "samr_io_r_lookup_rids");
3918 if(!prs_uint32("num_names1", ps, depth, &r_u->num_names1))
3920 if(!prs_uint32("ptr_names ", ps, depth, &r_u->ptr_names))
3923 if (r_u->ptr_names != 0) {
3925 if(!prs_uint32("num_names2", ps, depth, &r_u->num_names2))
3929 if (UNMARSHALLING(ps) && (r_u->num_names2 != 0)) {
3930 r_u->hdr_name = (UNIHDR *) prs_alloc_mem(ps, r_u->num_names2 * sizeof(r_u->hdr_name[0]));
3931 if (r_u->hdr_name == NULL)
3934 r_u->uni_name = (UNISTR2 *)prs_alloc_mem(ps, r_u->num_names2 * sizeof(r_u->uni_name[0]));
3935 if (r_u->uni_name == NULL)
3939 for (i = 0; i < r_u->num_names2; i++) {
3940 slprintf(tmp, sizeof(tmp) - 1, "hdr[%02d] ", i);
3941 if(!smb_io_unihdr("", &r_u->hdr_name[i], ps, depth))
3944 for (i = 0; i < r_u->num_names2; i++) {
3945 slprintf(tmp, sizeof(tmp) - 1, "str[%02d] ", i);
3946 if(!smb_io_unistr2("", &r_u->uni_name[i], r_u->hdr_name[i].buffer, ps, depth))
3954 if(!prs_uint32("num_types1", ps, depth, &r_u->num_types1))
3956 if(!prs_uint32("ptr_types ", ps, depth, &r_u->ptr_types))
3959 if (r_u->ptr_types != 0) {
3961 if(!prs_uint32("num_types2", ps, depth, &r_u->num_types2))
3964 if (UNMARSHALLING(ps) && (r_u->num_types2 != 0)) {
3965 r_u->type = (uint32 *)prs_alloc_mem(ps, r_u->num_types2 * sizeof(r_u->type[0]));
3966 if (r_u->type == NULL)
3970 for (i = 0; i < r_u->num_types2; i++) {
3971 slprintf(tmp, sizeof(tmp) - 1, "type[%02d] ", i);
3972 if(!prs_uint32(tmp, ps, depth, &r_u->type[i]))
3977 if(!prs_uint32("status", ps, depth, &r_u->status))
3983 /*******************************************************************
3984 inits a SAMR_Q_OPEN_ALIAS structure.
3985 ********************************************************************/
3987 void init_samr_q_delete_alias(SAMR_Q_DELETE_DOM_ALIAS * q_u, POLICY_HND *hnd)
3989 DEBUG(5, ("init_samr_q_delete_alias\n"));
3991 q_u->alias_pol = *hnd;
3994 /*******************************************************************
3995 reads or writes a structure.
3996 ********************************************************************/
3998 BOOL samr_io_q_delete_alias(char *desc, SAMR_Q_DELETE_DOM_ALIAS * q_u,
3999 prs_struct *ps, int depth)
4004 prs_debug(ps, depth, desc, "samr_io_q_delete_alias");
4010 if(!smb_io_pol_hnd("alias_pol", &q_u->alias_pol, ps, depth))
4016 /*******************************************************************
4017 reads or writes a structure.
4018 ********************************************************************/
4020 BOOL samr_io_r_delete_alias(char *desc, SAMR_R_DELETE_DOM_ALIAS * r_u,
4021 prs_struct *ps, int depth)
4026 prs_debug(ps, depth, desc, "samr_io_r_delete_alias");
4032 if(!smb_io_pol_hnd("pol", &r_u->pol, ps, depth))
4034 if(!prs_uint32("status", ps, depth, &r_u->status))
4040 /*******************************************************************
4041 inits a SAMR_Q_CREATE_DOM_ALIAS structure.
4042 ********************************************************************/
4044 void init_samr_q_create_dom_alias(SAMR_Q_CREATE_DOM_ALIAS * q_u,
4045 POLICY_HND *hnd, char *acct_desc)
4047 int acct_len = acct_desc != NULL ? strlen(acct_desc) : 0;
4049 DEBUG(5, ("init_samr_q_create_dom_alias\n"));
4051 q_u->dom_pol = *hnd;
4053 init_uni_hdr(&q_u->hdr_acct_desc, acct_len);
4054 init_unistr2(&q_u->uni_acct_desc, acct_desc, acct_len);
4056 q_u->access_mask = 0x001f000f;
4059 /*******************************************************************
4060 reads or writes a structure.
4061 ********************************************************************/
4063 BOOL samr_io_q_create_dom_alias(char *desc, SAMR_Q_CREATE_DOM_ALIAS * q_u,
4064 prs_struct *ps, int depth)
4069 prs_debug(ps, depth, desc, "samr_io_q_create_dom_alias");
4075 if(!smb_io_pol_hnd("dom_pol", &q_u->dom_pol, ps, depth))
4078 if(!smb_io_unihdr("hdr_acct_desc", &q_u->hdr_acct_desc, ps, depth))
4080 if(!smb_io_unistr2("uni_acct_desc", &q_u->uni_acct_desc,
4081 q_u->hdr_acct_desc.buffer, ps, depth))
4086 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
4092 /*******************************************************************
4093 reads or writes a structure.
4094 ********************************************************************/
4096 BOOL samr_io_r_create_dom_alias(char *desc, SAMR_R_CREATE_DOM_ALIAS * r_u,
4097 prs_struct *ps, int depth)
4102 prs_debug(ps, depth, desc, "samr_io_r_create_dom_alias");
4108 if(!smb_io_pol_hnd("alias_pol", &r_u->alias_pol, ps, depth))
4111 if(!prs_uint32("rid", ps, depth, &r_u->rid))
4114 if(!prs_uint32("status", ps, depth, &r_u->status))
4120 /*******************************************************************
4121 inits a SAMR_Q_ADD_ALIASMEM structure.
4122 ********************************************************************/
4124 void init_samr_q_add_aliasmem(SAMR_Q_ADD_ALIASMEM * q_u, POLICY_HND *hnd,
4127 DEBUG(5, ("init_samr_q_add_aliasmem\n"));
4129 q_u->alias_pol = *hnd;
4130 init_dom_sid2(&q_u->sid, sid);
4133 /*******************************************************************
4134 reads or writes a structure.
4135 ********************************************************************/
4137 BOOL samr_io_q_add_aliasmem(char *desc, SAMR_Q_ADD_ALIASMEM * q_u,
4138 prs_struct *ps, int depth)
4143 prs_debug(ps, depth, desc, "samr_io_q_add_aliasmem");
4149 if(!smb_io_pol_hnd("alias_pol", &q_u->alias_pol, ps, depth))
4151 if(!smb_io_dom_sid2("sid ", &q_u->sid, ps, depth))
4157 /*******************************************************************
4158 reads or writes a structure.
4159 ********************************************************************/
4161 BOOL samr_io_r_add_aliasmem(char *desc, SAMR_R_ADD_ALIASMEM * r_u,
4162 prs_struct *ps, int depth)
4167 prs_debug(ps, depth, desc, "samr_io_r_add_aliasmem");
4173 if(!prs_uint32("status", ps, depth, &r_u->status))
4179 /*******************************************************************
4180 inits a SAMR_Q_DEL_ALIASMEM structure.
4181 ********************************************************************/
4183 void init_samr_q_del_aliasmem(SAMR_Q_DEL_ALIASMEM * q_u, POLICY_HND *hnd,
4186 DEBUG(5, ("init_samr_q_del_aliasmem\n"));
4188 q_u->alias_pol = *hnd;
4189 init_dom_sid2(&q_u->sid, sid);
4192 /*******************************************************************
4193 reads or writes a structure.
4194 ********************************************************************/
4196 BOOL samr_io_q_del_aliasmem(char *desc, SAMR_Q_DEL_ALIASMEM * q_u,
4197 prs_struct *ps, int depth)
4202 prs_debug(ps, depth, desc, "samr_io_q_del_aliasmem");
4208 if(!smb_io_pol_hnd("alias_pol", &q_u->alias_pol, ps, depth))
4210 if(!smb_io_dom_sid2("sid ", &q_u->sid, ps, depth))
4216 /*******************************************************************
4217 reads or writes a structure.
4218 ********************************************************************/
4220 BOOL samr_io_r_del_aliasmem(char *desc, SAMR_R_DEL_ALIASMEM * r_u,
4221 prs_struct *ps, int depth)
4226 prs_debug(ps, depth, desc, "samr_io_r_del_aliasmem");
4232 if(!prs_uint32("status", ps, depth, &r_u->status))
4238 /*******************************************************************
4239 inits a SAMR_Q_DELETE_DOM_ALIAS structure.
4240 ********************************************************************/
4242 void init_samr_q_delete_dom_alias(SAMR_Q_DELETE_DOM_ALIAS * q_c,
4245 DEBUG(5, ("init_samr_q_delete_dom_alias\n"));
4247 q_c->alias_pol = *hnd;
4250 /*******************************************************************
4251 reads or writes a structure.
4252 ********************************************************************/
4254 BOOL samr_io_q_delete_dom_alias(char *desc, SAMR_Q_DELETE_DOM_ALIAS * q_u,
4255 prs_struct *ps, int depth)
4260 prs_debug(ps, depth, desc, "samr_io_q_delete_dom_alias");
4266 if(!smb_io_pol_hnd("alias_pol", &q_u->alias_pol, ps, depth))
4272 /*******************************************************************
4273 inits a SAMR_R_DELETE_DOM_ALIAS structure.
4274 ********************************************************************/
4276 void init_samr_r_delete_dom_alias(SAMR_R_DELETE_DOM_ALIAS * r_u,
4279 DEBUG(5, ("init_samr_r_delete_dom_alias\n"));
4281 r_u->status = status;
4284 /*******************************************************************
4285 reads or writes a structure.
4286 ********************************************************************/
4288 BOOL samr_io_r_delete_dom_alias(char *desc, SAMR_R_DELETE_DOM_ALIAS * r_u,
4289 prs_struct *ps, int depth)
4294 prs_debug(ps, depth, desc, "samr_io_r_delete_dom_alias");
4300 if(!prs_uint32("status", ps, depth, &r_u->status))
4306 /*******************************************************************
4307 inits a SAMR_Q_QUERY_ALIASMEM structure.
4308 ********************************************************************/
4310 void init_samr_q_query_aliasmem(SAMR_Q_QUERY_ALIASMEM * q_c,
4313 DEBUG(5, ("init_samr_q_query_aliasmem\n"));
4315 q_c->alias_pol = *hnd;
4318 /*******************************************************************
4319 reads or writes a structure.
4320 ********************************************************************/
4322 BOOL samr_io_q_query_aliasmem(char *desc, SAMR_Q_QUERY_ALIASMEM * q_u,
4323 prs_struct *ps, int depth)
4328 prs_debug(ps, depth, desc, "samr_io_q_query_aliasmem");
4334 if(!smb_io_pol_hnd("alias_pol", &q_u->alias_pol, ps, depth))
4340 /*******************************************************************
4341 inits a SAMR_R_QUERY_ALIASMEM structure.
4342 ********************************************************************/
4344 void init_samr_r_query_aliasmem(SAMR_R_QUERY_ALIASMEM * r_u,
4345 uint32 num_sids, DOM_SID2 * sid,
4348 DEBUG(5, ("init_samr_r_query_aliasmem\n"));
4351 r_u->num_sids = num_sids;
4352 r_u->ptr = (num_sids != 0) ? 1 : 0;
4353 r_u->num_sids1 = num_sids;
4361 r_u->status = status;
4364 /*******************************************************************
4365 reads or writes a structure.
4366 ********************************************************************/
4368 BOOL samr_io_r_query_aliasmem(char *desc, SAMR_R_QUERY_ALIASMEM * r_u,
4369 prs_struct *ps, int depth)
4372 uint32 ptr_sid[MAX_LOOKUP_SIDS];
4377 prs_debug(ps, depth, desc, "samr_io_r_query_aliasmem");
4383 if(!prs_uint32("num_sids ", ps, depth, &r_u->num_sids))
4385 if(!prs_uint32("ptr", ps, depth, &r_u->ptr))
4388 if (r_u->ptr != 0) {
4389 SMB_ASSERT_ARRAY(ptr_sid, r_u->num_sids);
4391 if (r_u->num_sids != 0) {
4392 if(!prs_uint32("num_sids1", ps, depth, &r_u->num_sids1))
4395 for (i = 0; i < r_u->num_sids1; i++) {
4397 if(!prs_uint32("", ps, depth, &ptr_sid[i]))
4401 for (i = 0; i < r_u->num_sids1; i++) {
4402 if (ptr_sid[i] != 0) {
4403 if(!smb_io_dom_sid2("", &r_u->sid[i], ps, depth))
4412 if(!prs_uint32("status", ps, depth, &r_u->status))
4418 /*******************************************************************
4419 inits a SAMR_Q_LOOKUP_NAMES structure.
4420 ********************************************************************/
4422 uint32 init_samr_q_lookup_names(TALLOC_CTX *ctx, SAMR_Q_LOOKUP_NAMES * q_u,
4423 POLICY_HND *pol, uint32 flags,
4424 uint32 num_names, char **name)
4428 DEBUG(5, ("init_samr_q_lookup_names\n"));
4432 q_u->num_names1 = num_names;
4435 q_u->num_names2 = num_names;
4437 if (!(q_u->hdr_name = (UNIHDR *)talloc_zero(ctx, num_names * sizeof(UNIHDR))))
4438 return NT_STATUS_NO_MEMORY;
4440 if (!(q_u->uni_name = (UNISTR2 *)talloc_zero(ctx, num_names * sizeof(UNISTR2))))
4441 return NT_STATUS_NO_MEMORY;
4443 for (i = 0; i < num_names; i++) {
4444 int len_name = name[i] != NULL ? strlen(name[i]) : 0;
4445 init_uni_hdr(&q_u->hdr_name[i], len_name); /* unicode header for user_name */
4446 init_unistr2(&q_u->uni_name[i], name[i], len_name); /* unicode string for machine account */
4449 return NT_STATUS_NO_PROBLEMO;
4452 /*******************************************************************
4453 reads or writes a structure.
4454 ********************************************************************/
4456 BOOL samr_io_q_lookup_names(char *desc, SAMR_Q_LOOKUP_NAMES * q_u,
4457 prs_struct *ps, int depth)
4464 prs_debug(ps, depth, desc, "samr_io_q_lookup_names");
4467 if (UNMARSHALLING(ps))
4473 if(!smb_io_pol_hnd("pol", &q_u->pol, ps, depth))
4476 if(!prs_uint32("num_names1", ps, depth, &q_u->num_names1))
4478 if(!prs_uint32("flags ", ps, depth, &q_u->flags))
4480 if(!prs_uint32("ptr ", ps, depth, &q_u->ptr))
4482 if(!prs_uint32("num_names2", ps, depth, &q_u->num_names2))
4485 if (UNMARSHALLING(ps) && (q_u->num_names2 != 0)) {
4486 q_u->hdr_name = (UNIHDR *)prs_alloc_mem(ps, sizeof(UNIHDR) *
4488 q_u->uni_name = (UNISTR2 *)prs_alloc_mem(ps, sizeof(UNISTR2) *
4490 if (!q_u->hdr_name || !q_u->uni_name)
4494 for (i = 0; i < q_u->num_names2; i++) {
4495 if(!smb_io_unihdr("", &q_u->hdr_name[i], ps, depth))
4499 for (i = 0; i < q_u->num_names2; i++) {
4500 if(!smb_io_unistr2("", &q_u->uni_name[i], q_u->hdr_name[i].buffer, ps, depth))
4507 /*******************************************************************
4508 inits a SAMR_R_LOOKUP_NAMES structure.
4509 ********************************************************************/
4511 uint32 init_samr_r_lookup_names(TALLOC_CTX *ctx, SAMR_R_LOOKUP_NAMES * r_u,
4513 uint32 *rid, uint32 *type,
4516 DEBUG(5, ("init_samr_r_lookup_names\n"));
4518 if ((status == 0) && (num_rids != 0)) {
4521 r_u->num_types1 = num_rids;
4523 r_u->num_types2 = num_rids;
4525 r_u->num_rids1 = num_rids;
4527 r_u->num_rids2 = num_rids;
4529 if (!(r_u->rids = (uint32 *)talloc_zero(ctx, sizeof(uint32)*num_rids)))
4530 return NT_STATUS_NO_MEMORY;
4531 if (!(r_u->types = (uint32 *)talloc_zero(ctx, sizeof(uint32)*num_rids)))
4532 return NT_STATUS_NO_MEMORY;
4534 if (!r_u->rids || !r_u->types)
4537 for (i = 0; i < num_rids; i++) {
4538 r_u->rids[i] = rid[i];
4539 r_u->types[i] = type[i];
4544 r_u->num_types1 = 0;
4546 r_u->num_types2 = 0;
4556 r_u->status = status;
4558 return NT_STATUS_NO_PROBLEMO;
4561 /*******************************************************************
4562 reads or writes a structure.
4563 ********************************************************************/
4565 BOOL samr_io_r_lookup_names(char *desc, SAMR_R_LOOKUP_NAMES * r_u,
4566 prs_struct *ps, int depth)
4574 prs_debug(ps, depth, desc, "samr_io_r_lookup_names");
4577 if (UNMARSHALLING(ps))
4583 if(!prs_uint32("num_rids1", ps, depth, &r_u->num_rids1))
4585 if(!prs_uint32("ptr_rids ", ps, depth, &r_u->ptr_rids))
4588 if (r_u->ptr_rids != 0) {
4589 if(!prs_uint32("num_rids2", ps, depth, &r_u->num_rids2))
4592 if (r_u->num_rids2 != r_u->num_rids1) {
4597 if (UNMARSHALLING(ps))
4598 r_u->rids = (uint32 *)prs_alloc_mem(ps, sizeof(uint32)*r_u->num_rids2);
4601 DEBUG(0, ("NULL rids in samr_io_r_lookup_names\n"));
4605 for (i = 0; i < r_u->num_rids2; i++) {
4606 slprintf(tmp, sizeof(tmp) - 1, "rid[%02d] ", i);
4607 if(!prs_uint32(tmp, ps, depth, &r_u->rids[i]))
4612 if(!prs_uint32("num_types1", ps, depth, &r_u->num_types1))
4614 if(!prs_uint32("ptr_types ", ps, depth, &r_u->ptr_types))
4617 if (r_u->ptr_types != 0) {
4618 if(!prs_uint32("num_types2", ps, depth, &r_u->num_types2))
4621 if (r_u->num_types2 != r_u->num_types1) {
4626 if (UNMARSHALLING(ps))
4627 r_u->types = (uint32 *)prs_alloc_mem(ps, sizeof(uint32)*r_u->num_types2);
4630 DEBUG(0, ("NULL types in samr_io_r_lookup_names\n"));
4634 for (i = 0; i < r_u->num_types2; i++) {
4635 slprintf(tmp, sizeof(tmp) - 1, "type[%02d] ", i);
4636 if(!prs_uint32(tmp, ps, depth, &r_u->types[i]))
4641 if(!prs_uint32("status", ps, depth, &r_u->status))
4647 /*******************************************************************
4648 inits a SAMR_Q_DELETE_DOM_USER structure.
4649 ********************************************************************/
4651 void init_samr_q_delete_dom_user(SAMR_Q_DELETE_DOM_USER * q_c,
4654 DEBUG(5, ("init_samr_q_delete_dom_user\n"));
4656 q_c->user_pol = *hnd;
4659 /*******************************************************************
4660 reads or writes a structure.
4661 ********************************************************************/
4663 BOOL samr_io_q_delete_dom_user(char *desc, SAMR_Q_DELETE_DOM_USER * q_u,
4664 prs_struct *ps, int depth)
4669 prs_debug(ps, depth, desc, "samr_io_q_delete_dom_user");
4675 if(!smb_io_pol_hnd("user_pol", &q_u->user_pol, ps, depth))
4681 /*******************************************************************
4682 reads or writes a structure.
4683 ********************************************************************/
4685 BOOL samr_io_r_delete_dom_user(char *desc, SAMR_R_DELETE_DOM_USER * r_u,
4686 prs_struct *ps, int depth)
4691 prs_debug(ps, depth, desc, "samr_io_r_delete_dom_user");
4697 if(!prs_uint32("status", ps, depth, &r_u->status))
4703 /*******************************************************************
4704 reads or writes a structure.
4705 ********************************************************************/
4707 void init_samr_q_open_user(SAMR_Q_OPEN_USER * q_u,
4709 uint32 access_mask, uint32 rid)
4711 DEBUG(5, ("samr_init_samr_q_open_user\n"));
4713 q_u->domain_pol = *pol;
4714 q_u->access_mask = access_mask;
4715 q_u->user_rid = rid;
4718 /*******************************************************************
4719 reads or writes a structure.
4720 ********************************************************************/
4722 BOOL samr_io_q_open_user(char *desc, SAMR_Q_OPEN_USER * q_u,
4723 prs_struct *ps, int depth)
4728 prs_debug(ps, depth, desc, "samr_io_q_open_user");
4734 if(!smb_io_pol_hnd("domain_pol", &q_u->domain_pol, ps, depth))
4737 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
4739 if(!prs_uint32("user_rid ", ps, depth, &q_u->user_rid))
4745 /*******************************************************************
4746 reads or writes a structure.
4747 ********************************************************************/
4749 BOOL samr_io_r_open_user(char *desc, SAMR_R_OPEN_USER * r_u,
4750 prs_struct *ps, int depth)
4755 prs_debug(ps, depth, desc, "samr_io_r_open_user");
4761 if(!smb_io_pol_hnd("user_pol", &r_u->user_pol, ps, depth))
4764 if(!prs_uint32("status", ps, depth, &r_u->status))
4771 /*******************************************************************
4772 reads or writes a structure.
4773 ********************************************************************/
4775 void init_samr_q_create_user(SAMR_Q_CREATE_USER * q_u,
4778 uint32 acb_info, uint32 access_mask)
4781 len_name = strlen(name);
4783 DEBUG(5, ("samr_init_samr_q_create_user\n"));
4785 q_u->domain_pol = *pol;
4787 init_uni_hdr(&q_u->hdr_name, len_name);
4788 init_unistr2(&q_u->uni_name, name, len_name);
4790 q_u->acb_info = acb_info;
4791 q_u->access_mask = access_mask;
4794 /*******************************************************************
4795 reads or writes a structure.
4796 ********************************************************************/
4798 BOOL samr_io_q_create_user(char *desc, SAMR_Q_CREATE_USER * q_u,
4799 prs_struct *ps, int depth)
4804 prs_debug(ps, depth, desc, "samr_io_q_create_user");
4810 if(!smb_io_pol_hnd("domain_pol", &q_u->domain_pol, ps, depth))
4813 if(!smb_io_unihdr("hdr_name", &q_u->hdr_name, ps, depth))
4815 if(!smb_io_unistr2("uni_name", &q_u->uni_name, q_u->hdr_name.buffer, ps, depth))
4820 if(!prs_uint32("acb_info ", ps, depth, &q_u->acb_info))
4822 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
4828 /*******************************************************************
4829 reads or writes a structure.
4830 ********************************************************************/
4832 BOOL samr_io_r_create_user(char *desc, SAMR_R_CREATE_USER * r_u,
4833 prs_struct *ps, int depth)
4838 prs_debug(ps, depth, desc, "samr_io_r_create_user");
4844 if(!smb_io_pol_hnd("user_pol", &r_u->user_pol, ps, depth))
4847 if(!prs_uint32("unknown_0", ps, depth, &r_u->unknown_0))
4849 if(!prs_uint32("user_rid ", ps, depth, &r_u->user_rid))
4851 if(!prs_uint32("status", ps, depth, &r_u->status))
4857 /*******************************************************************
4858 inits a SAMR_Q_QUERY_USERINFO structure.
4859 ********************************************************************/
4861 void init_samr_q_query_userinfo(SAMR_Q_QUERY_USERINFO * q_u,
4862 POLICY_HND *hnd, uint16 switch_value)
4864 DEBUG(5, ("init_samr_q_query_userinfo\n"));
4867 q_u->switch_value = switch_value;
4870 /*******************************************************************
4871 reads or writes a structure.
4872 ********************************************************************/
4874 BOOL samr_io_q_query_userinfo(char *desc, SAMR_Q_QUERY_USERINFO * q_u,
4875 prs_struct *ps, int depth)
4880 prs_debug(ps, depth, desc, "samr_io_q_query_userinfo");
4886 if(!smb_io_pol_hnd("pol", &q_u->pol, ps, depth))
4889 if(!prs_uint16("switch_value", ps, depth, &q_u->switch_value)) /* 0x0015 or 0x0011 */
4895 /*******************************************************************
4896 reads or writes a LOGON_HRS structure.
4897 ********************************************************************/
4899 static BOOL sam_io_logon_hrs(char *desc, LOGON_HRS * hrs,
4900 prs_struct *ps, int depth)
4905 prs_debug(ps, depth, desc, "sam_io_logon_hrs");
4911 if(!prs_uint32("len ", ps, depth, &hrs->len))
4914 if (hrs->len > sizeof(hrs->hours)) {
4915 DEBUG(3, ("sam_io_logon_hrs: truncating length from %d\n", hrs->len));
4916 hrs->len = sizeof(hrs->hours);
4919 if(!prs_uint8s(False, "hours", ps, depth, hrs->hours, hrs->len))
4925 /*******************************************************************
4926 inits a SAM_USER_INFO_12 structure.
4927 ********************************************************************/
4929 void init_sam_user_info12(SAM_USER_INFO_12 * usr,
4930 uint8 lm_pwd[16], uint8 nt_pwd[16])
4932 DEBUG(5, ("init_sam_user_info12\n"));
4934 usr->lm_pwd_active =
4935 memcpy(usr->lm_pwd, lm_pwd, sizeof(usr->lm_pwd)) ? 1 : 0;
4936 usr->nt_pwd_active =
4937 memcpy(usr->nt_pwd, nt_pwd, sizeof(usr->nt_pwd)) ? 1 : 0;
4940 /*******************************************************************
4941 reads or writes a structure.
4942 ********************************************************************/
4944 static BOOL sam_io_user_info12(char *desc, SAM_USER_INFO_12 * u,
4945 prs_struct *ps, int depth)
4950 prs_debug(ps, depth, desc, "samr_io_r_user_info12");
4956 if(!prs_uint8s(False, "lm_pwd", ps, depth, u->lm_pwd, sizeof(u->lm_pwd)))
4958 if(!prs_uint8s(False, "nt_pwd", ps, depth, u->nt_pwd, sizeof(u->nt_pwd)))
4961 if(!prs_uint8("lm_pwd_active", ps, depth, &u->lm_pwd_active))
4963 if(!prs_uint8("nt_pwd_active", ps, depth, &u->nt_pwd_active))
4969 /*******************************************************************
4970 inits a SAM_USER_INFO_10 structure.
4971 ********************************************************************/
4973 void init_sam_user_info10(SAM_USER_INFO_10 * usr, uint32 acb_info)
4975 DEBUG(5, ("init_sam_user_info10\n"));
4977 usr->acb_info = acb_info;
4980 /*******************************************************************
4981 reads or writes a structure.
4982 ********************************************************************/
4984 static BOOL sam_io_user_info10(char *desc, SAM_USER_INFO_10 * usr,
4985 prs_struct *ps, int depth)
4990 prs_debug(ps, depth, desc, "samr_io_r_user_info10");
4996 if(!prs_uint32("acb_info", ps, depth, &usr->acb_info))
5002 /*******************************************************************
5003 inits a SAM_USER_INFO_11 structure.
5004 ********************************************************************/
5006 void init_sam_user_info11(SAM_USER_INFO_11 * usr,
5009 uint32 rid_user, uint32 rid_group, uint16 acct_ctrl)
5013 DEBUG(5, ("init_sam_user_info11\n"));
5015 len_mach_acct = strlen(mach_acct);
5017 memcpy(&(usr->expiry), expiry, sizeof(usr->expiry)); /* expiry time or something? */
5018 ZERO_STRUCT(usr->padding_1); /* 0 - padding 24 bytes */
5020 init_uni_hdr(&usr->hdr_mach_acct, len_mach_acct); /* unicode header for machine account */
5021 usr->padding_2 = 0; /* 0 - padding 4 bytes */
5023 usr->ptr_1 = 1; /* pointer */
5024 ZERO_STRUCT(usr->padding_3); /* 0 - padding 32 bytes */
5025 usr->padding_4 = 0; /* 0 - padding 4 bytes */
5027 usr->ptr_2 = 1; /* pointer */
5028 usr->padding_5 = 0; /* 0 - padding 4 bytes */
5030 usr->ptr_3 = 1; /* pointer */
5031 ZERO_STRUCT(usr->padding_6); /* 0 - padding 32 bytes */
5033 usr->rid_user = rid_user;
5034 usr->rid_group = rid_group;
5036 usr->acct_ctrl = acct_ctrl;
5037 usr->unknown_3 = 0x0000;
5039 usr->unknown_4 = 0x003f; /* 0x003f - 16 bit unknown */
5040 usr->unknown_5 = 0x003c; /* 0x003c - 16 bit unknown */
5042 ZERO_STRUCT(usr->padding_7); /* 0 - padding 16 bytes */
5043 usr->padding_8 = 0; /* 0 - padding 4 bytes */
5045 init_unistr2(&usr->uni_mach_acct, mach_acct, len_mach_acct); /* unicode string for machine account */
5048 /*******************************************************************
5049 reads or writes a structure.
5050 ********************************************************************/
5052 static BOOL sam_io_user_info11(char *desc, SAM_USER_INFO_11 * usr,
5053 prs_struct *ps, int depth)
5058 prs_debug(ps, depth, desc, "samr_io_r_unknown_11");
5064 if(!prs_uint8s(False, "padding_0", ps, depth, usr->padding_0, sizeof(usr->padding_0)))
5067 if(!smb_io_time("time", &usr->expiry, ps, depth))
5070 if(!prs_uint8s(False, "padding_1", ps, depth, usr->padding_1, sizeof(usr->padding_1)))
5073 if(!smb_io_unihdr("unihdr", &usr->hdr_mach_acct, ps, depth))
5076 if(!prs_uint32("padding_2", ps, depth, &usr->padding_2))
5079 if(!prs_uint32("ptr_1 ", ps, depth, &usr->ptr_1))
5081 if(!prs_uint8s(False, "padding_3", ps, depth, usr->padding_3, sizeof(usr->padding_3)))
5084 if(!prs_uint32("padding_4", ps, depth, &usr->padding_4))
5087 if(!prs_uint32("ptr_2 ", ps, depth, &usr->ptr_2))
5089 if(!prs_uint32("padding_5", ps, depth, &usr->padding_5))
5092 if(!prs_uint32("ptr_3 ", ps, depth, &usr->ptr_3))
5094 if(!prs_uint8s(False, "padding_6", ps, depth, usr->padding_6,sizeof(usr->padding_6)))
5097 if(!prs_uint32("rid_user ", ps, depth, &usr->rid_user))
5099 if(!prs_uint32("rid_group", ps, depth, &usr->rid_group))
5101 if(!prs_uint16("acct_ctrl", ps, depth, &usr->acct_ctrl))
5103 if(!prs_uint16("unknown_3", ps, depth, &usr->unknown_3))
5105 if(!prs_uint16("unknown_4", ps, depth, &usr->unknown_4))
5107 if(!prs_uint16("unknown_5", ps, depth, &usr->unknown_5))
5110 if(!prs_uint8s(False, "padding_7", ps, depth, usr->padding_7, sizeof(usr->padding_7)))
5113 if(!prs_uint32("padding_8", ps, depth, &(usr->padding_8)))
5116 if(!smb_io_unistr2("unistr2", &usr->uni_mach_acct, True, ps, depth))
5122 if(!prs_uint8s(False, "padding_9", ps, depth, usr->padding_9, sizeof(usr->padding_9)))
5128 /*************************************************************************
5131 unknown_3 = 0x09f8 27fa
5132 unknown_5 = 0x0001 0000
5133 unknown_6 = 0x0000 04ec
5135 *************************************************************************/
5137 void init_sam_user_info24(SAM_USER_INFO_24 * usr, char newpass[516])
5139 DEBUG(10, ("init_sam_user_info24:\n"));
5140 memcpy(usr->pass, newpass, sizeof(usr->pass));
5143 /*******************************************************************
5144 reads or writes a structure.
5145 ********************************************************************/
5147 static BOOL sam_io_user_info24(char *desc, SAM_USER_INFO_24 * usr,
5148 prs_struct *ps, int depth)
5153 prs_debug(ps, depth, desc, "sam_io_user_info24");
5159 if(!prs_uint8s(False, "password", ps, depth, usr->pass,
5169 /*************************************************************************
5170 init_sam_user_info23
5172 unknown_3 = 0x09f8 27fa
5173 unknown_5 = 0x0001 0000
5174 unknown_6 = 0x0000 04ec
5176 *************************************************************************/
5178 void init_sam_user_info23W(SAM_USER_INFO_23 * usr, NTTIME * logon_time, /* all zeros */
5179 NTTIME * logoff_time, /* all zeros */
5180 NTTIME * kickoff_time, /* all zeros */
5181 NTTIME * pass_last_set_time, /* all zeros */
5182 NTTIME * pass_can_change_time, /* all zeros */
5183 NTTIME * pass_must_change_time, /* all zeros */
5194 uint32 user_rid, /* 0x0000 0000 */
5201 char newpass[516], uint32 unknown_6)
5203 int len_user_name = user_name != NULL ? user_name->uni_str_len : 0;
5204 int len_full_name = full_name != NULL ? full_name->uni_str_len : 0;
5205 int len_home_dir = home_dir != NULL ? home_dir->uni_str_len : 0;
5206 int len_dir_drive = dir_drive != NULL ? dir_drive->uni_str_len : 0;
5207 int len_logon_script = log_scr != NULL ? log_scr->uni_str_len : 0;
5208 int len_profile_path = prof_path != NULL ? prof_path->uni_str_len : 0;
5209 int len_description = desc != NULL ? desc->uni_str_len : 0;
5210 int len_workstations = wkstas != NULL ? wkstas->uni_str_len : 0;
5211 int len_unknown_str = unk_str != NULL ? unk_str->uni_str_len : 0;
5212 int len_munged_dial = mung_dial != NULL ? mung_dial->uni_str_len : 0;
5214 usr->logon_time = *logon_time; /* all zeros */
5215 usr->logoff_time = *logoff_time; /* all zeros */
5216 usr->kickoff_time = *kickoff_time; /* all zeros */
5217 usr->pass_last_set_time = *pass_last_set_time; /* all zeros */
5218 usr->pass_can_change_time = *pass_can_change_time; /* all zeros */
5219 usr->pass_must_change_time = *pass_must_change_time; /* all zeros */
5221 init_uni_hdr(&usr->hdr_user_name, len_user_name); /* NULL */
5222 init_uni_hdr(&usr->hdr_full_name, len_full_name);
5223 init_uni_hdr(&usr->hdr_home_dir, len_home_dir);
5224 init_uni_hdr(&usr->hdr_dir_drive, len_dir_drive);
5225 init_uni_hdr(&usr->hdr_logon_script, len_logon_script);
5226 init_uni_hdr(&usr->hdr_profile_path, len_profile_path);
5227 init_uni_hdr(&usr->hdr_acct_desc, len_description);
5228 init_uni_hdr(&usr->hdr_workstations, len_workstations);
5229 init_uni_hdr(&usr->hdr_unknown_str, len_unknown_str);
5230 init_uni_hdr(&usr->hdr_munged_dial, len_munged_dial);
5232 ZERO_STRUCT(usr->nt_pwd);
5233 ZERO_STRUCT(usr->lm_pwd);
5235 usr->user_rid = user_rid; /* 0x0000 0000 */
5236 usr->group_rid = group_rid;
5237 usr->acb_info = acb_info;
5238 usr->unknown_3 = unknown_3; /* 09f8 27fa */
5240 usr->logon_divs = logon_divs; /* should be 168 (hours/week) */
5241 usr->ptr_logon_hrs = hrs ? 1 : 0;
5243 ZERO_STRUCT(usr->padding1);
5245 usr->unknown_5 = unknown_5; /* 0x0001 0000 */
5247 memcpy(usr->pass, newpass, sizeof(usr->pass));
5249 copy_unistr2(&usr->uni_user_name, user_name);
5250 copy_unistr2(&usr->uni_full_name, full_name);
5251 copy_unistr2(&usr->uni_home_dir, home_dir);
5252 copy_unistr2(&usr->uni_dir_drive, dir_drive);
5253 copy_unistr2(&usr->uni_logon_script, log_scr);
5254 copy_unistr2(&usr->uni_profile_path, prof_path);
5255 copy_unistr2(&usr->uni_acct_desc, desc);
5256 copy_unistr2(&usr->uni_workstations, wkstas);
5257 copy_unistr2(&usr->uni_unknown_str, unk_str);
5258 copy_unistr2(&usr->uni_munged_dial, mung_dial);
5260 usr->unknown_6 = unknown_6; /* 0x0000 04ec */
5263 memcpy(&usr->logon_hrs, hrs, sizeof(usr->logon_hrs));
5266 /*************************************************************************
5267 init_sam_user_info23
5269 unknown_3 = 0x09f8 27fa
5270 unknown_5 = 0x0001 0000
5271 unknown_6 = 0x0000 04ec
5273 *************************************************************************/
5275 void init_sam_user_info23A(SAM_USER_INFO_23 * usr, NTTIME * logon_time, /* all zeros */
5276 NTTIME * logoff_time, /* all zeros */
5277 NTTIME * kickoff_time, /* all zeros */
5278 NTTIME * pass_last_set_time, /* all zeros */
5279 NTTIME * pass_can_change_time, /* all zeros */
5280 NTTIME * pass_must_change_time, /* all zeros */
5281 char *user_name, /* NULL */
5283 char *home_dir, char *dir_drive, char *log_scr,
5284 char *prof_path, char *desc, char *wkstas,
5285 char *unk_str, char *mung_dial, uint32 user_rid, /* 0x0000 0000 */
5286 uint32 group_rid, uint32 acb_info,
5287 uint32 unknown_3, uint16 logon_divs,
5288 LOGON_HRS * hrs, uint32 unknown_5,
5289 char newpass[516], uint32 unknown_6)
5291 int len_user_name = user_name != NULL ? strlen(user_name) : 0;
5292 int len_full_name = full_name != NULL ? strlen(full_name) : 0;
5293 int len_home_dir = home_dir != NULL ? strlen(home_dir) : 0;
5294 int len_dir_drive = dir_drive != NULL ? strlen(dir_drive) : 0;
5295 int len_logon_script = log_scr != NULL ? strlen(log_scr) : 0;
5296 int len_profile_path = prof_path != NULL ? strlen(prof_path) : 0;
5297 int len_description = desc != NULL ? strlen(desc) : 0;
5298 int len_workstations = wkstas != NULL ? strlen(wkstas) : 0;
5299 int len_unknown_str = unk_str != NULL ? strlen(unk_str) : 0;
5300 int len_munged_dial = mung_dial != NULL ? strlen(mung_dial) : 0;
5302 usr->logon_time = *logon_time; /* all zeros */
5303 usr->logoff_time = *logoff_time; /* all zeros */
5304 usr->kickoff_time = *kickoff_time; /* all zeros */
5305 usr->pass_last_set_time = *pass_last_set_time; /* all zeros */
5306 usr->pass_can_change_time = *pass_can_change_time; /* all zeros */
5307 usr->pass_must_change_time = *pass_must_change_time; /* all zeros */
5309 init_uni_hdr(&usr->hdr_user_name, len_user_name); /* NULL */
5310 init_uni_hdr(&usr->hdr_full_name, len_full_name);
5311 init_uni_hdr(&usr->hdr_home_dir, len_home_dir);
5312 init_uni_hdr(&usr->hdr_dir_drive, len_dir_drive);
5313 init_uni_hdr(&usr->hdr_logon_script, len_logon_script);
5314 init_uni_hdr(&usr->hdr_profile_path, len_profile_path);
5315 init_uni_hdr(&usr->hdr_acct_desc, len_description);
5316 init_uni_hdr(&usr->hdr_workstations, len_workstations);
5317 init_uni_hdr(&usr->hdr_unknown_str, len_unknown_str);
5318 init_uni_hdr(&usr->hdr_munged_dial, len_munged_dial);
5320 ZERO_STRUCT(usr->nt_pwd);
5321 ZERO_STRUCT(usr->lm_pwd);
5323 usr->user_rid = user_rid; /* 0x0000 0000 */
5324 usr->group_rid = group_rid;
5325 usr->acb_info = acb_info;
5326 usr->unknown_3 = unknown_3; /* 09f8 27fa */
5328 usr->logon_divs = logon_divs; /* should be 168 (hours/week) */
5329 usr->ptr_logon_hrs = hrs ? 1 : 0;
5331 ZERO_STRUCT(usr->padding1);
5333 usr->unknown_5 = unknown_5; /* 0x0001 0000 */
5335 memcpy(usr->pass, newpass, sizeof(usr->pass));
5337 init_unistr2(&usr->uni_user_name, user_name, len_user_name); /* NULL */
5338 init_unistr2(&usr->uni_full_name, full_name, len_full_name);
5339 init_unistr2(&usr->uni_home_dir, home_dir, len_home_dir);
5340 init_unistr2(&usr->uni_dir_drive, dir_drive, len_dir_drive);
5341 init_unistr2(&usr->uni_logon_script, log_scr, len_logon_script);
5342 init_unistr2(&usr->uni_profile_path, prof_path, len_profile_path);
5343 init_unistr2(&usr->uni_acct_desc, desc, len_description);
5344 init_unistr2(&usr->uni_workstations, wkstas, len_workstations);
5345 init_unistr2(&usr->uni_unknown_str, unk_str, len_unknown_str);
5346 init_unistr2(&usr->uni_munged_dial, mung_dial, len_munged_dial);
5348 usr->unknown_6 = unknown_6; /* 0x0000 04ec */
5351 memcpy(&usr->logon_hrs, hrs, sizeof(usr->logon_hrs));
5354 /*******************************************************************
5355 reads or writes a structure.
5356 ********************************************************************/
5358 static BOOL sam_io_user_info23(char *desc, SAM_USER_INFO_23 * usr,
5359 prs_struct *ps, int depth)
5364 prs_debug(ps, depth, desc, "sam_io_user_info23");
5370 if(!smb_io_time("logon_time ", &usr->logon_time, ps, depth))
5372 if(!smb_io_time("logoff_time ", &usr->logoff_time, ps, depth))
5374 if(!smb_io_time("kickoff_time ", &usr->kickoff_time, ps, depth))
5376 if(!smb_io_time("pass_last_set_time ", &usr->pass_last_set_time, ps, depth))
5378 if(!smb_io_time("pass_can_change_time ", &usr->pass_can_change_time, ps, depth))
5380 if(!smb_io_time("pass_must_change_time", &usr->pass_must_change_time, ps, depth))
5383 if(!smb_io_unihdr("hdr_user_name ", &usr->hdr_user_name, ps, depth)) /* username unicode string header */
5385 if(!smb_io_unihdr("hdr_full_name ", &usr->hdr_full_name, ps, depth)) /* user's full name unicode string header */
5387 if(!smb_io_unihdr("hdr_home_dir ", &usr->hdr_home_dir, ps, depth)) /* home directory unicode string header */
5389 if(!smb_io_unihdr("hdr_dir_drive ", &usr->hdr_dir_drive, ps, depth)) /* home directory drive */
5391 if(!smb_io_unihdr("hdr_logon_script", &usr->hdr_logon_script, ps, depth)) /* logon script unicode string header */
5393 if(!smb_io_unihdr("hdr_profile_path", &usr->hdr_profile_path, ps, depth)) /* profile path unicode string header */
5395 if(!smb_io_unihdr("hdr_acct_desc ", &usr->hdr_acct_desc, ps, depth)) /* account desc */
5397 if(!smb_io_unihdr("hdr_workstations", &usr->hdr_workstations, ps, depth)) /* wkstas user can log on from */
5399 if(!smb_io_unihdr("hdr_unknown_str ", &usr->hdr_unknown_str, ps, depth)) /* unknown string */
5401 if(!smb_io_unihdr("hdr_munged_dial ", &usr->hdr_munged_dial, ps, depth)) /* wkstas user can log on from */
5404 if(!prs_uint8s(False, "lm_pwd ", ps, depth, usr->lm_pwd, sizeof(usr->lm_pwd)))
5406 if(!prs_uint8s(False, "nt_pwd ", ps, depth, usr->nt_pwd, sizeof(usr->nt_pwd)))
5409 if(!prs_uint32("user_rid ", ps, depth, &usr->user_rid)) /* User ID */
5411 if(!prs_uint32("group_rid ", ps, depth, &usr->group_rid)) /* Group ID */
5413 if(!prs_uint32("acb_info ", ps, depth, &usr->acb_info))
5416 if(!prs_uint32("unknown_3 ", ps, depth, &usr->unknown_3))
5418 if(!prs_uint16("logon_divs ", ps, depth, &usr->logon_divs)) /* logon divisions per week */
5422 if(!prs_uint32("ptr_logon_hrs ", ps, depth, &usr->ptr_logon_hrs))
5424 if(!prs_uint8s(False, "padding1 ", ps, depth, usr->padding1, sizeof(usr->padding1)))
5426 if(!prs_uint32("unknown_5 ", ps, depth, &usr->unknown_5))
5429 if(!prs_uint8s(False, "password ", ps, depth, usr->pass, sizeof(usr->pass)))
5432 /* here begins pointed-to data */
5434 if(!smb_io_unistr2("uni_user_name ", &usr->uni_user_name, usr->hdr_user_name.buffer, ps, depth)) /* username unicode string */
5437 if(!smb_io_unistr2("uni_full_name ", &usr->uni_full_name, usr->hdr_full_name.buffer, ps, depth)) /* user's full name unicode string */
5440 if(!smb_io_unistr2("uni_home_dir ", &usr->uni_home_dir, usr->hdr_home_dir.buffer, ps, depth)) /* home directory unicode string */
5443 if(!smb_io_unistr2("uni_dir_drive ", &usr->uni_dir_drive, usr->hdr_dir_drive.buffer, ps, depth)) /* home directory drive unicode string */
5446 if(!smb_io_unistr2("uni_logon_script", &usr->uni_logon_script, usr->hdr_logon_script.buffer, ps, depth)) /* logon script unicode string */
5449 if(!smb_io_unistr2("uni_profile_path", &usr->uni_profile_path, usr->hdr_profile_path.buffer, ps, depth)) /* profile path unicode string */
5452 if(!smb_io_unistr2("uni_acct_desc ", &usr->uni_acct_desc, usr->hdr_acct_desc.buffer, ps, depth)) /* user desc unicode string */
5455 if(!smb_io_unistr2("uni_workstations", &usr->uni_workstations, usr->hdr_workstations.buffer, ps, depth)) /* worksations user can log on from */
5458 if(!smb_io_unistr2("uni_unknown_str ", &usr->uni_unknown_str, usr->hdr_unknown_str.buffer, ps, depth)) /* unknown string */
5461 if(!smb_io_unistr2("uni_munged_dial ", &usr->uni_munged_dial, usr->hdr_munged_dial.buffer, ps, depth))
5464 /* ok, this is only guess-work (as usual) */
5465 if (usr->ptr_logon_hrs) {
5466 if(!prs_uint32("unknown_6 ", ps, depth, &usr->unknown_6))
5468 if(!prs_uint32("padding4 ", ps, depth, &usr->padding4))
5470 if(!sam_io_logon_hrs("logon_hrs", &usr->logon_hrs, ps, depth))
5472 } else if (UNMARSHALLING(ps)) {
5480 /*******************************************************************
5481 reads or writes a structure.
5482 NB. This structure is *definately* incorrect. It's my best guess
5483 currently for W2K SP2. The password field is encrypted in a different
5484 way than normal... And there are definately other problems. JRA.
5485 ********************************************************************/
5487 static BOOL sam_io_user_info25(char *desc, SAM_USER_INFO_25 * usr, prs_struct *ps, int depth)
5492 prs_debug(ps, depth, desc, "sam_io_user_info23");
5498 if(!smb_io_time("logon_time ", &usr->logon_time, ps, depth))
5500 if(!smb_io_time("logoff_time ", &usr->logoff_time, ps, depth))
5502 if(!smb_io_time("kickoff_time ", &usr->kickoff_time, ps, depth))
5504 if(!smb_io_time("pass_last_set_time ", &usr->pass_last_set_time, ps, depth))
5506 if(!smb_io_time("pass_can_change_time ", &usr->pass_can_change_time, ps, depth))
5508 if(!smb_io_time("pass_must_change_time", &usr->pass_must_change_time, ps, depth))
5511 if(!smb_io_unihdr("hdr_user_name ", &usr->hdr_user_name, ps, depth)) /* username unicode string header */
5513 if(!smb_io_unihdr("hdr_full_name ", &usr->hdr_full_name, ps, depth)) /* user's full name unicode string header */
5515 if(!smb_io_unihdr("hdr_home_dir ", &usr->hdr_home_dir, ps, depth)) /* home directory unicode string header */
5517 if(!smb_io_unihdr("hdr_dir_drive ", &usr->hdr_dir_drive, ps, depth)) /* home directory drive */
5519 if(!smb_io_unihdr("hdr_logon_script", &usr->hdr_logon_script, ps, depth)) /* logon script unicode string header */
5521 if(!smb_io_unihdr("hdr_profile_path", &usr->hdr_profile_path, ps, depth)) /* profile path unicode string header */
5523 if(!smb_io_unihdr("hdr_acct_desc ", &usr->hdr_acct_desc, ps, depth)) /* account desc */
5525 if(!smb_io_unihdr("hdr_workstations", &usr->hdr_workstations, ps, depth)) /* wkstas user can log on from */
5527 if(!smb_io_unihdr("hdr_unknown_str ", &usr->hdr_unknown_str, ps, depth)) /* unknown string */
5529 if(!smb_io_unihdr("hdr_munged_dial ", &usr->hdr_munged_dial, ps, depth)) /* wkstas user can log on from */
5532 if(!prs_uint8s(False, "lm_pwd ", ps, depth, usr->lm_pwd, sizeof(usr->lm_pwd)))
5534 if(!prs_uint8s(False, "nt_pwd ", ps, depth, usr->nt_pwd, sizeof(usr->nt_pwd)))
5537 if(!prs_uint32("user_rid ", ps, depth, &usr->user_rid)) /* User ID */
5539 if(!prs_uint32("group_rid ", ps, depth, &usr->group_rid)) /* Group ID */
5541 if(!prs_uint32("acb_info ", ps, depth, &usr->acb_info))
5544 if(!prs_uint32s(False, "unknown_6 ", ps, depth, usr->unknown_6, 6))
5547 if(!prs_uint8s(False, "password ", ps, depth, usr->pass, sizeof(usr->pass)))
5550 /* here begins pointed-to data */
5552 if(!smb_io_unistr2("uni_user_name ", &usr->uni_user_name, usr->hdr_user_name.buffer, ps, depth)) /* username unicode string */
5555 if(!smb_io_unistr2("uni_full_name ", &usr->uni_full_name, usr->hdr_full_name.buffer, ps, depth)) /* user's full name unicode string */
5558 if(!smb_io_unistr2("uni_home_dir ", &usr->uni_home_dir, usr->hdr_home_dir.buffer, ps, depth)) /* home directory unicode string */
5561 if(!smb_io_unistr2("uni_dir_drive ", &usr->uni_dir_drive, usr->hdr_dir_drive.buffer, ps, depth)) /* home directory drive unicode string */
5564 if(!smb_io_unistr2("uni_logon_script", &usr->uni_logon_script, usr->hdr_logon_script.buffer, ps, depth)) /* logon script unicode string */
5567 if(!smb_io_unistr2("uni_profile_path", &usr->uni_profile_path, usr->hdr_profile_path.buffer, ps, depth)) /* profile path unicode string */
5570 if(!smb_io_unistr2("uni_acct_desc ", &usr->uni_acct_desc, usr->hdr_acct_desc.buffer, ps, depth)) /* user desc unicode string */
5573 if(!smb_io_unistr2("uni_workstations", &usr->uni_workstations, usr->hdr_workstations.buffer, ps, depth)) /* worksations user can log on from */
5576 if(!smb_io_unistr2("uni_unknown_str ", &usr->uni_unknown_str, usr->hdr_unknown_str.buffer, ps, depth)) /* unknown string */
5579 if(!smb_io_unistr2("uni_munged_dial ", &usr->uni_munged_dial, usr->hdr_munged_dial.buffer, ps, depth))
5582 #if 0 /* JRA - unknown... */
5583 /* ok, this is only guess-work (as usual) */
5584 if (usr->ptr_logon_hrs) {
5585 if(!prs_uint32("unknown_6 ", ps, depth, &usr->unknown_6))
5587 if(!prs_uint32("padding4 ", ps, depth, &usr->padding4))
5589 if(!sam_io_logon_hrs("logon_hrs", &usr->logon_hrs, ps, depth))
5591 } else if (UNMARSHALLING(ps)) {
5601 /*************************************************************************
5602 init_sam_user_info21W
5604 unknown_3 = 0x00ff ffff
5605 unknown_5 = 0x0002 0000
5606 unknown_6 = 0x0000 04ec
5608 *************************************************************************/
5610 void init_sam_user_info21W(SAM_USER_INFO_21 * usr,
5611 NTTIME * logon_time,
5612 NTTIME * logoff_time,
5613 NTTIME * kickoff_time,
5614 NTTIME * pass_last_set_time,
5615 NTTIME * pass_can_change_time,
5616 NTTIME * pass_must_change_time,
5635 uint32 unknown_5, uint32 unknown_6)
5637 int len_user_name = user_name != NULL ? user_name->uni_str_len : 0;
5638 int len_full_name = full_name != NULL ? full_name->uni_str_len : 0;
5639 int len_home_dir = home_dir != NULL ? home_dir->uni_str_len : 0;
5640 int len_dir_drive = dir_drive != NULL ? dir_drive->uni_str_len : 0;
5641 int len_logon_script = log_scr != NULL ? log_scr->uni_str_len : 0;
5642 int len_profile_path = prof_path != NULL ? prof_path->uni_str_len : 0;
5643 int len_description = desc != NULL ? desc->uni_str_len : 0;
5644 int len_workstations = wkstas != NULL ? wkstas->uni_str_len : 0;
5645 int len_unknown_str = unk_str != NULL ? unk_str->uni_str_len : 0;
5646 int len_munged_dial = mung_dial != NULL ? mung_dial->uni_str_len : 0;
5648 usr->logon_time = *logon_time;
5649 usr->logoff_time = *logoff_time;
5650 usr->kickoff_time = *kickoff_time;
5651 usr->pass_last_set_time = *pass_last_set_time;
5652 usr->pass_can_change_time = *pass_can_change_time;
5653 usr->pass_must_change_time = *pass_must_change_time;
5655 init_uni_hdr(&usr->hdr_user_name, len_user_name);
5656 init_uni_hdr(&usr->hdr_full_name, len_full_name);
5657 init_uni_hdr(&usr->hdr_home_dir, len_home_dir);
5658 init_uni_hdr(&usr->hdr_dir_drive, len_dir_drive);
5659 init_uni_hdr(&usr->hdr_logon_script, len_logon_script);
5660 init_uni_hdr(&usr->hdr_profile_path, len_profile_path);
5661 init_uni_hdr(&usr->hdr_acct_desc, len_description);
5662 init_uni_hdr(&usr->hdr_workstations, len_workstations);
5663 init_uni_hdr(&usr->hdr_unknown_str, len_unknown_str);
5664 init_uni_hdr(&usr->hdr_munged_dial, len_munged_dial);
5666 memcpy(usr->lm_pwd, lm_pwd, sizeof(usr->lm_pwd));
5667 memcpy(usr->nt_pwd, nt_pwd, sizeof(usr->nt_pwd));
5669 usr->user_rid = user_rid;
5670 usr->group_rid = group_rid;
5671 usr->acb_info = acb_info;
5672 usr->unknown_3 = unknown_3; /* 0x00ff ffff */
5674 usr->logon_divs = logon_divs; /* should be 168 (hours/week) */
5675 usr->ptr_logon_hrs = hrs ? 1 : 0;
5676 usr->unknown_5 = unknown_5; /* 0x0002 0000 */
5678 ZERO_STRUCT(usr->padding1);
5680 copy_unistr2(&usr->uni_user_name, user_name);
5681 copy_unistr2(&usr->uni_full_name, full_name);
5682 copy_unistr2(&usr->uni_home_dir, home_dir);
5683 copy_unistr2(&usr->uni_dir_drive, dir_drive);
5684 copy_unistr2(&usr->uni_logon_script, log_scr);
5685 copy_unistr2(&usr->uni_profile_path, prof_path);
5686 copy_unistr2(&usr->uni_acct_desc, desc);
5687 copy_unistr2(&usr->uni_workstations, wkstas);
5688 copy_unistr2(&usr->uni_unknown_str, unk_str);
5689 copy_unistr2(&usr->uni_munged_dial, mung_dial);
5691 usr->unknown_6 = unknown_6; /* 0x0000 04ec */
5694 memcpy(&usr->logon_hrs, hrs, sizeof(usr->logon_hrs));
5697 /*************************************************************************
5698 init_sam_user_info21
5700 unknown_3 = 0x00ff ffff
5701 unknown_5 = 0x0002 0000
5702 unknown_6 = 0x0000 04ec
5704 *************************************************************************/
5706 void init_sam_user_info21A(SAM_USER_INFO_21 *usr, SAM_ACCOUNT *pw)
5708 NTTIME logon_time, logoff_time, kickoff_time,
5709 pass_last_set_time, pass_can_change_time,
5710 pass_must_change_time;
5712 int len_user_name, len_full_name, len_home_dir,
5713 len_dir_drive, len_logon_script, len_profile_path,
5714 len_description, len_workstations, len_unknown_str,
5717 char* user_name = pdb_get_username(pw);
5718 char* full_name = pdb_get_fullname(pw);
5719 char* home_dir = pdb_get_homedir(pw);
5720 char* dir_drive = pdb_get_dirdrive(pw);
5721 char* logon_script = pdb_get_logon_script(pw);
5722 char* profile_path = pdb_get_profile_path(pw);
5723 char* description = pdb_get_acct_desc(pw);
5724 char* workstations = pdb_get_workstations(pw);
5725 char* munged_dial = pdb_get_munged_dial(pw);
5727 len_user_name = user_name != NULL ? strlen(user_name )+1 : 0;
5728 len_full_name = full_name != NULL ? strlen(full_name )+1 : 0;
5729 len_home_dir = home_dir != NULL ? strlen(home_dir )+1 : 0;
5730 len_dir_drive = dir_drive != NULL ? strlen(dir_drive )+1 : 0;
5731 len_logon_script = logon_script != NULL ? strlen(logon_script)+1 : 0;
5732 len_profile_path = profile_path != NULL ? strlen(profile_path)+1 : 0;
5733 len_description = description != NULL ? strlen(description )+1 : 0;
5734 len_workstations = workstations != NULL ? strlen(workstations)+1 : 0;
5735 len_unknown_str = 0;
5736 len_munged_dial = munged_dial != NULL ? strlen(munged_dial )+1 : 0;
5739 /* Create NTTIME structs */
5740 unix_to_nt_time (&logon_time, pdb_get_logon_time(pw));
5741 unix_to_nt_time (&logoff_time, pdb_get_logoff_time(pw));
5742 unix_to_nt_time (&kickoff_time, pdb_get_kickoff_time(pw));
5743 unix_to_nt_time (&pass_last_set_time, pdb_get_pass_last_set_time(pw));
5744 unix_to_nt_time (&pass_can_change_time, pdb_get_pass_can_change_time(pw));
5745 unix_to_nt_time (&pass_must_change_time,pdb_get_pass_must_change_time(pw));
5747 /* structure assignment */
5748 usr->logon_time = logon_time;
5749 usr->logoff_time = logoff_time;
5750 usr->kickoff_time = kickoff_time;
5751 usr->pass_last_set_time = pass_last_set_time;
5752 usr->pass_can_change_time = pass_can_change_time;
5753 usr->pass_must_change_time = pass_must_change_time;
5755 init_uni_hdr(&usr->hdr_user_name, len_user_name);
5756 init_uni_hdr(&usr->hdr_full_name, len_full_name);
5757 init_uni_hdr(&usr->hdr_home_dir, len_home_dir);
5758 init_uni_hdr(&usr->hdr_dir_drive, len_dir_drive);
5759 init_uni_hdr(&usr->hdr_logon_script, len_logon_script);
5760 init_uni_hdr(&usr->hdr_profile_path, len_profile_path);
5761 init_uni_hdr(&usr->hdr_acct_desc, len_description);
5762 init_uni_hdr(&usr->hdr_workstations, len_workstations);
5763 init_uni_hdr(&usr->hdr_unknown_str, len_unknown_str);
5764 init_uni_hdr(&usr->hdr_munged_dial, len_munged_dial);
5766 ZERO_STRUCT(usr->nt_pwd);
5767 ZERO_STRUCT(usr->lm_pwd);
5769 usr->user_rid = pdb_get_user_rid(pw);
5770 usr->group_rid = pdb_get_group_rid(pw);
5771 usr->acb_info = pdb_get_acct_ctrl(pw);
5772 usr->unknown_3 = pdb_get_unknown3(pw);
5774 usr->logon_divs = pdb_get_logon_divs(pw);
5775 usr->ptr_logon_hrs = pdb_get_hours(pw) ? 1 : 0;
5776 usr->unknown_5 = pdb_get_unknown5(pw); /* 0x0002 0000 */
5778 ZERO_STRUCT(usr->padding1);
5780 init_unistr2(&usr->uni_user_name, user_name, len_user_name);
5781 init_unistr2(&usr->uni_full_name, full_name, len_full_name);
5782 init_unistr2(&usr->uni_home_dir, home_dir, len_home_dir);
5783 init_unistr2(&usr->uni_dir_drive, dir_drive, len_dir_drive);
5784 init_unistr2(&usr->uni_logon_script, logon_script, len_logon_script);
5785 init_unistr2(&usr->uni_profile_path, profile_path, len_profile_path);
5786 init_unistr2(&usr->uni_acct_desc, description, len_description);
5787 init_unistr2(&usr->uni_workstations, workstations, len_workstations);
5788 init_unistr2(&usr->uni_unknown_str, NULL, len_unknown_str);
5789 init_unistr2(&usr->uni_munged_dial, munged_dial, len_munged_dial);
5791 usr->unknown_6 = pdb_get_unknown6(pw);
5794 if (pdb_get_hours(pw)) {
5795 usr->logon_hrs.len = pdb_get_hours_len(pw);
5796 memcpy(&usr->logon_hrs.hours, pdb_get_hours(pw), MAX_HOURS_LEN);
5798 memset(&usr->logon_hrs, 0xff, sizeof(usr->logon_hrs));
5801 /*******************************************************************
5802 reads or writes a structure.
5803 ********************************************************************/
5805 static BOOL sam_io_user_info21(char *desc, SAM_USER_INFO_21 * usr,
5806 prs_struct *ps, int depth)
5811 prs_debug(ps, depth, desc, "sam_io_user_info21");
5817 if(!smb_io_time("logon_time ", &usr->logon_time, ps, depth))
5819 if(!smb_io_time("logoff_time ", &usr->logoff_time, ps, depth))
5821 if(!smb_io_time("pass_last_set_time ", &usr->pass_last_set_time, ps,depth))
5823 if(!smb_io_time("kickoff_time ", &usr->kickoff_time, ps, depth))
5825 if(!smb_io_time("pass_can_change_time ", &usr->pass_can_change_time, ps,depth))
5827 if(!smb_io_time("pass_must_change_time", &usr->pass_must_change_time, ps, depth))
5830 if(!smb_io_unihdr("hdr_user_name ", &usr->hdr_user_name, ps, depth)) /* username unicode string header */
5832 if(!smb_io_unihdr("hdr_full_name ", &usr->hdr_full_name, ps, depth)) /* user's full name unicode string header */
5834 if(!smb_io_unihdr("hdr_home_dir ", &usr->hdr_home_dir, ps, depth)) /* home directory unicode string header */
5836 if(!smb_io_unihdr("hdr_dir_drive ", &usr->hdr_dir_drive, ps, depth)) /* home directory drive */
5838 if(!smb_io_unihdr("hdr_logon_script", &usr->hdr_logon_script, ps, depth)) /* logon script unicode string header */
5840 if(!smb_io_unihdr("hdr_profile_path", &usr->hdr_profile_path, ps, depth)) /* profile path unicode string header */
5842 if(!smb_io_unihdr("hdr_acct_desc ", &usr->hdr_acct_desc, ps, depth)) /* account desc */
5844 if(!smb_io_unihdr("hdr_workstations", &usr->hdr_workstations, ps, depth)) /* wkstas user can log on from */
5846 if(!smb_io_unihdr("hdr_unknown_str ", &usr->hdr_unknown_str, ps, depth)) /* unknown string */
5848 if(!smb_io_unihdr("hdr_munged_dial ", &usr->hdr_munged_dial, ps, depth)) /* wkstas user can log on from */
5851 if(!prs_uint8s(False, "lm_pwd ", ps, depth, usr->lm_pwd, sizeof(usr->lm_pwd)))
5853 if(!prs_uint8s(False, "nt_pwd ", ps, depth, usr->nt_pwd, sizeof(usr->nt_pwd)))
5856 if(!prs_uint32("user_rid ", ps, depth, &usr->user_rid)) /* User ID */
5858 if(!prs_uint32("group_rid ", ps, depth, &usr->group_rid)) /* Group ID */
5860 if(!prs_uint32("acb_info ", ps, depth, &usr->acb_info))
5863 if(!prs_uint32("unknown_3 ", ps, depth, &usr->unknown_3))
5865 if(!prs_uint16("logon_divs ", ps, depth, &usr->logon_divs)) /* logon divisions per week */
5869 if(!prs_uint32("ptr_logon_hrs ", ps, depth, &usr->ptr_logon_hrs))
5871 if(!prs_uint32("unknown_5 ", ps, depth, &usr->unknown_5))
5874 if(!prs_uint8s(False, "padding1 ", ps, depth, usr->padding1, sizeof(usr->padding1)))
5877 /* here begins pointed-to data */
5879 if(!smb_io_unistr2("uni_user_name ", &usr->uni_user_name,usr->hdr_user_name.buffer, ps, depth)) /* username unicode string */
5881 if(!smb_io_unistr2("uni_full_name ", &usr->uni_full_name, usr->hdr_full_name.buffer, ps, depth)) /* user's full name unicode string */
5883 if(!smb_io_unistr2("uni_home_dir ", &usr->uni_home_dir, usr->hdr_home_dir.buffer, ps, depth)) /* home directory unicode string */
5885 if(!smb_io_unistr2("uni_dir_drive ", &usr->uni_dir_drive, usr->hdr_dir_drive.buffer, ps, depth)) /* home directory drive unicode string */
5887 if(!smb_io_unistr2("uni_logon_script", &usr->uni_logon_script, usr->hdr_logon_script.buffer, ps, depth)) /* logon script unicode string */
5889 if(!smb_io_unistr2("uni_profile_path", &usr->uni_profile_path, usr->hdr_profile_path.buffer, ps, depth)) /* profile path unicode string */
5891 if(!smb_io_unistr2("uni_acct_desc ", &usr->uni_acct_desc, usr->hdr_acct_desc.buffer, ps, depth)) /* user desc unicode string */
5893 if(!smb_io_unistr2("uni_workstations", &usr->uni_workstations, usr->hdr_workstations.buffer, ps, depth)) /* worksations user can log on from */
5895 if(!smb_io_unistr2("uni_unknown_str ", &usr->uni_unknown_str, usr->hdr_unknown_str.buffer, ps, depth)) /* unknown string */
5897 if(!smb_io_unistr2("uni_munged_dial ", &usr->uni_munged_dial,usr->hdr_munged_dial.buffer, ps, depth)) /* worksations user can log on from */
5900 /* ok, this is only guess-work (as usual) */
5901 if (usr->ptr_logon_hrs) {
5904 if(!prs_uint32("unknown_6 ", ps, depth, &usr->unknown_6))
5906 if(!prs_uint32("padding4 ", ps, depth, &usr->padding4))
5908 if(!sam_io_logon_hrs("logon_hrs", &usr->logon_hrs, ps, depth))
5910 } else if (UNMARSHALLING(ps)) {
5918 /*******************************************************************
5919 inits a SAM_USERINFO_CTR structure.
5920 ********************************************************************/
5922 uint32 make_samr_userinfo_ctr_usr21(TALLOC_CTX *ctx, SAM_USERINFO_CTR * ctr,
5923 uint16 switch_value,
5924 SAM_USER_INFO_21 * usr)
5926 DEBUG(5, ("init_samr_userinfo_ctr\n"));
5928 ctr->switch_value = switch_value;
5929 ctr->info.id = NULL;
5931 switch (switch_value) {
5933 ctr->info.id10 = (SAM_USER_INFO_10 *)talloc_zero(ctx,sizeof(SAM_USER_INFO_10));
5934 if (ctr->info.id10 == NULL)
5935 return NT_STATUS_NO_MEMORY;
5937 init_sam_user_info10(ctr->info.id10, usr->acb_info);
5940 /* whoops - got this wrong. i think. or don't understand what's happening. */
5944 info = (void *)&id11;
5946 expire.low = 0xffffffff;
5947 expire.high = 0x7fffffff;
5949 ctr->info.id = (SAM_USER_INFO_11 *) talloc_zero(ctx,sizeof(*ctr->info.id11));
5950 init_sam_user_info11(ctr->info.id11, &expire,
5951 "BROOKFIELDS$", /* name */
5952 0x03ef, /* user rid */
5953 0x201, /* group rid */
5954 0x0080); /* acb info */
5960 ctr->info.id12 = (SAM_USER_INFO_12 *)talloc_zero(ctx,sizeof(SAM_USER_INFO_12));
5961 if (ctr->info.id12 == NULL)
5962 return NT_STATUS_NO_MEMORY;
5964 init_sam_user_info12(ctr->info.id12, usr->lm_pwd, usr->nt_pwd);
5968 SAM_USER_INFO_21 *cusr;
5969 cusr = (SAM_USER_INFO_21 *)talloc_zero(ctx,sizeof(SAM_USER_INFO_21));
5970 ctr->info.id21 = cusr;
5971 if (ctr->info.id21 == NULL)
5972 return NT_STATUS_NO_MEMORY;
5973 memcpy(cusr, usr, sizeof(*usr));
5974 memset(cusr->lm_pwd, 0, sizeof(cusr->lm_pwd));
5975 memset(cusr->nt_pwd, 0, sizeof(cusr->nt_pwd));
5979 DEBUG(4,("make_samr_userinfo_ctr: unsupported info\n"));
5980 return NT_STATUS_INVALID_INFO_CLASS;
5983 return NT_STATUS_NOPROBLEMO;
5986 /*******************************************************************
5987 inits a SAM_USERINFO_CTR structure.
5988 ********************************************************************/
5990 void init_samr_userinfo_ctr(SAM_USERINFO_CTR * ctr, uchar * sess_key,
5991 uint16 switch_value, void *info)
5993 DEBUG(5, ("init_samr_userinfo_ctr\n"));
5995 ctr->switch_value = switch_value;
5996 ctr->info.id = info;
5998 switch (switch_value) {
6000 SamOEMhash(ctr->info.id24->pass, sess_key, 516);
6001 dump_data(100, (char *)sess_key, 16);
6002 dump_data(100, (char *)ctr->info.id24->pass, 516);
6005 SamOEMhash(ctr->info.id23->pass, sess_key, 516);
6006 dump_data(100, (char *)sess_key, 16);
6007 dump_data(100, (char *)ctr->info.id23->pass, 516);
6010 DEBUG(4,("init_samr_userinfo_ctr: unsupported switch level\n"));
6014 /*******************************************************************
6015 reads or writes a structure.
6016 ********************************************************************/
6018 static BOOL samr_io_userinfo_ctr(char *desc, SAM_USERINFO_CTR **ppctr,
6019 prs_struct *ps, int depth)
6022 SAM_USERINFO_CTR *ctr;
6024 prs_debug(ps, depth, desc, "samr_io_userinfo_ctr");
6027 if (UNMARSHALLING(ps)) {
6028 ctr = (SAM_USERINFO_CTR *)prs_alloc_mem(ps,sizeof(SAM_USERINFO_CTR));
6036 /* lkclXXXX DO NOT ALIGN BEFORE READING SWITCH VALUE! */
6038 if(!prs_uint16("switch_value", ps, depth, &ctr->switch_value))
6045 switch (ctr->switch_value) {
6047 if (UNMARSHALLING(ps))
6048 ctr->info.id10 = (SAM_USER_INFO_10 *)prs_alloc_mem(ps,sizeof(SAM_USER_INFO_10));
6049 if (ctr->info.id10 == NULL) {
6050 DEBUG(2,("samr_io_userinfo_ctr: info pointer not initialised\n"));
6053 ret = sam_io_user_info10("", ctr->info.id10, ps, depth);
6056 if (UNMARSHALLING(ps))
6057 ctr->info.id11 = (SAM_USER_INFO_11 *)prs_alloc_mem(ps,sizeof(SAM_USER_INFO_11));
6059 if (ctr->info.id11 == NULL) {
6060 DEBUG(2,("samr_io_userinfo_ctr: info pointer not initialised\n"));
6063 ret = sam_io_user_info11("", ctr->info.id11, ps, depth);
6066 if (UNMARSHALLING(ps))
6067 ctr->info.id12 = (SAM_USER_INFO_12 *)prs_alloc_mem(ps,sizeof(SAM_USER_INFO_12));
6069 if (ctr->info.id12 == NULL) {
6070 DEBUG(2,("samr_io_userinfo_ctr: info pointer not initialised\n"));
6073 ret = sam_io_user_info12("", ctr->info.id12, ps, depth);
6076 if (UNMARSHALLING(ps))
6077 ctr->info.id21 = (SAM_USER_INFO_21 *)prs_alloc_mem(ps,sizeof(SAM_USER_INFO_21));
6079 if (ctr->info.id21 == NULL) {
6080 DEBUG(2,("samr_io_userinfo_ctr: info pointer not initialised\n"));
6083 ret = sam_io_user_info21("", ctr->info.id21, ps, depth);
6086 if (UNMARSHALLING(ps))
6087 ctr->info.id23 = (SAM_USER_INFO_23 *)prs_alloc_mem(ps,sizeof(SAM_USER_INFO_23));
6089 if (ctr->info.id23 == NULL) {
6090 DEBUG(2,("samr_io_userinfo_ctr: info pointer not initialised\n"));
6093 ret = sam_io_user_info23("", ctr->info.id23, ps, depth);
6096 if (UNMARSHALLING(ps))
6097 ctr->info.id24 = (SAM_USER_INFO_24 *)prs_alloc_mem(ps,sizeof(SAM_USER_INFO_24));
6099 if (ctr->info.id24 == NULL) {
6100 DEBUG(2,("samr_io_userinfo_ctr: info pointer not initialised\n"));
6103 ret = sam_io_user_info24("", ctr->info.id24, ps, depth);
6106 if (UNMARSHALLING(ps))
6107 ctr->info.id25 = (SAM_USER_INFO_25 *)prs_alloc_mem(ps,sizeof(SAM_USER_INFO_25));
6109 if (ctr->info.id25 == NULL) {
6110 DEBUG(2,("samr_io_userinfo_ctr: info pointer not initialised\n"));
6113 ret = sam_io_user_info25("", ctr->info.id25, ps, depth);
6116 DEBUG(2, ("samr_io_userinfo_ctr: unknown switch level 0x%x\n", ctr->switch_value));
6124 /*******************************************************************
6125 inits a SAMR_R_QUERY_USERINFO structure.
6126 ********************************************************************/
6128 void init_samr_r_query_userinfo(SAMR_R_QUERY_USERINFO * r_u,
6129 SAM_USERINFO_CTR * ctr, uint32 status)
6131 DEBUG(5, ("init_samr_r_query_userinfo\n"));
6141 r_u->status = status; /* return status */
6144 /*******************************************************************
6145 reads or writes a structure.
6146 ********************************************************************/
6148 BOOL samr_io_r_query_userinfo(char *desc, SAMR_R_QUERY_USERINFO * r_u,
6149 prs_struct *ps, int depth)
6154 prs_debug(ps, depth, desc, "samr_io_r_query_userinfo");
6160 if(!prs_uint32("ptr", ps, depth, &r_u->ptr))
6163 if (r_u->ptr != 0) {
6164 if(!samr_io_userinfo_ctr("ctr", &r_u->ctr, ps, depth))
6170 if(!prs_uint32("status", ps, depth, &r_u->status))
6176 /*******************************************************************
6177 inits a SAMR_Q_SET_USERINFO structure.
6178 ********************************************************************/
6180 void init_samr_q_set_userinfo(SAMR_Q_SET_USERINFO * q_u,
6181 POLICY_HND *hnd, unsigned char sess_key[16],
6182 uint16 switch_value, void *info)
6184 DEBUG(5, ("init_samr_q_set_userinfo\n"));
6187 q_u->switch_value = switch_value;
6188 init_samr_userinfo_ctr(q_u->ctr, sess_key, switch_value, info);
6191 /*******************************************************************
6192 reads or writes a structure.
6193 ********************************************************************/
6195 BOOL samr_io_q_set_userinfo(char *desc, SAMR_Q_SET_USERINFO * q_u,
6196 prs_struct *ps, int depth)
6201 prs_debug(ps, depth, desc, "samr_io_q_set_userinfo");
6207 smb_io_pol_hnd("pol", &(q_u->pol), ps, depth);
6209 if(!prs_uint16("switch_value", ps, depth, &q_u->switch_value))
6211 if(!samr_io_userinfo_ctr("ctr", &q_u->ctr, ps, depth))
6217 /*******************************************************************
6218 inits a SAMR_R_SET_USERINFO structure.
6219 ********************************************************************/
6221 void init_samr_r_set_userinfo(SAMR_R_SET_USERINFO * r_u, uint32 status)
6223 DEBUG(5, ("init_samr_r_set_userinfo\n"));
6225 r_u->status = status; /* return status */
6228 /*******************************************************************
6229 reads or writes a structure.
6230 ********************************************************************/
6232 BOOL samr_io_r_set_userinfo(char *desc, SAMR_R_SET_USERINFO * r_u,
6233 prs_struct *ps, int depth)
6238 prs_debug(ps, depth, desc, "samr_io_r_set_userinfo");
6244 if(!prs_uint32("status", ps, depth, &r_u->status))
6250 /*******************************************************************
6251 inits a SAMR_Q_SET_USERINFO2 structure.
6252 ********************************************************************/
6254 void init_samr_q_set_userinfo2(SAMR_Q_SET_USERINFO2 * q_u,
6255 POLICY_HND *hnd, unsigned char sess_key[16],
6256 uint16 switch_value, SAM_USERINFO_CTR * ctr)
6258 DEBUG(5, ("init_samr_q_set_userinfo2\n"));
6261 q_u->switch_value = switch_value;
6264 if (q_u->ctr != NULL)
6265 q_u->ctr->switch_value = switch_value;
6267 switch (switch_value) {
6269 SamOEMhash(ctr->info.id12->lm_pwd, sess_key, 16);
6270 SamOEMhash(ctr->info.id12->nt_pwd, sess_key, 16);
6271 dump_data(100, (char *)sess_key, 16);
6272 dump_data(100, (char *)ctr->info.id12->lm_pwd, 16);
6273 dump_data(100, (char *)ctr->info.id12->nt_pwd, 16);
6278 /*******************************************************************
6279 reads or writes a structure.
6280 ********************************************************************/
6282 BOOL samr_io_q_set_userinfo2(char *desc, SAMR_Q_SET_USERINFO2 * q_u,
6283 prs_struct *ps, int depth)
6288 prs_debug(ps, depth, desc, "samr_io_q_set_userinfo2");
6294 if(!smb_io_pol_hnd("pol", &q_u->pol, ps, depth))
6297 if(!prs_uint16("switch_value", ps, depth, &q_u->switch_value))
6299 if(!samr_io_userinfo_ctr("ctr", &q_u->ctr, ps, depth))
6305 /*******************************************************************
6306 inits a SAMR_R_SET_USERINFO2 structure.
6307 ********************************************************************/
6309 void init_samr_r_set_userinfo2(SAMR_R_SET_USERINFO2 * r_u, uint32 status)
6311 DEBUG(5, ("init_samr_r_set_userinfo2\n"));
6313 r_u->status = status; /* return status */
6316 /*******************************************************************
6317 reads or writes a structure.
6318 ********************************************************************/
6320 BOOL samr_io_r_set_userinfo2(char *desc, SAMR_R_SET_USERINFO2 * r_u,
6321 prs_struct *ps, int depth)
6326 prs_debug(ps, depth, desc, "samr_io_r_set_userinfo2");
6332 if(!prs_uint32("status", ps, depth, &r_u->status))
6338 /*******************************************************************
6339 inits a SAMR_Q_CONNECT structure.
6340 ********************************************************************/
6342 void init_samr_q_connect(SAMR_Q_CONNECT * q_u,
6343 char *srv_name, uint32 access_mask)
6345 int len_srv_name = strlen(srv_name);
6347 DEBUG(5, ("init_samr_q_connect\n"));
6349 /* make PDC server name \\server */
6350 q_u->ptr_srv_name = len_srv_name > 0 ? 1 : 0;
6351 init_unistr2(&q_u->uni_srv_name, srv_name, len_srv_name + 1);
6353 /* example values: 0x0000 0002 */
6354 q_u->access_mask = access_mask;
6357 /*******************************************************************
6358 reads or writes a structure.
6359 ********************************************************************/
6361 BOOL samr_io_q_connect(char *desc, SAMR_Q_CONNECT * q_u,
6362 prs_struct *ps, int depth)
6367 prs_debug(ps, depth, desc, "samr_io_q_connect");
6373 if(!prs_uint32("ptr_srv_name", ps, depth, &q_u->ptr_srv_name))
6375 if(!smb_io_unistr2("", &q_u->uni_srv_name, q_u->ptr_srv_name, ps, depth))
6380 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
6386 /*******************************************************************
6387 reads or writes a structure.
6388 ********************************************************************/
6390 BOOL samr_io_r_connect(char *desc, SAMR_R_CONNECT * r_u,
6391 prs_struct *ps, int depth)
6396 prs_debug(ps, depth, desc, "samr_io_r_connect");
6402 if(!smb_io_pol_hnd("connect_pol", &r_u->connect_pol, ps, depth))
6405 if(!prs_uint32("status", ps, depth, &r_u->status))
6411 /*******************************************************************
6412 inits a SAMR_Q_CONNECT_ANON structure.
6413 ********************************************************************/
6415 void init_samr_q_connect_anon(SAMR_Q_CONNECT_ANON * q_u)
6417 DEBUG(5, ("init_samr_q_connect_anon\n"));
6420 q_u->unknown_0 = 0x5c; /* server name (?!!) */
6421 q_u->unknown_1 = 0x01;
6422 q_u->access_mask = 0x20;
6425 /*******************************************************************
6426 reads or writes a structure.
6427 ********************************************************************/
6429 BOOL samr_io_q_connect_anon(char *desc, SAMR_Q_CONNECT_ANON * q_u,
6430 prs_struct *ps, int depth)
6435 prs_debug(ps, depth, desc, "samr_io_q_connect_anon");
6441 if(!prs_uint32("ptr ", ps, depth, &q_u->ptr))
6443 if(!prs_uint16("unknown_0", ps, depth, &q_u->unknown_0))
6445 if(!prs_uint16("unknown_1", ps, depth, &q_u->unknown_1))
6447 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
6453 /*******************************************************************
6454 reads or writes a structure.
6455 ********************************************************************/
6457 BOOL samr_io_r_connect_anon(char *desc, SAMR_R_CONNECT_ANON * r_u,
6458 prs_struct *ps, int depth)
6463 prs_debug(ps, depth, desc, "samr_io_r_connect_anon");
6469 if(!smb_io_pol_hnd("connect_pol", &r_u->connect_pol, ps, depth))
6472 if(!prs_uint32("status", ps, depth, &r_u->status))
6478 /*******************************************************************
6479 inits a SAMR_Q_GET_DOM_PWINFO structure.
6480 ********************************************************************/
6482 void init_samr_q_get_dom_pwinfo(SAMR_Q_GET_DOM_PWINFO * q_u,
6485 int len_srv_name = strlen(srv_name);
6487 DEBUG(5, ("init_samr_q_get_dom_pwinfo\n"));
6490 init_uni_hdr(&q_u->hdr_srv_name, len_srv_name);
6491 init_unistr2(&q_u->uni_srv_name, srv_name, len_srv_name);
6494 /*******************************************************************
6495 reads or writes a structure.
6496 ********************************************************************/
6498 BOOL samr_io_q_get_dom_pwinfo(char *desc, SAMR_Q_GET_DOM_PWINFO * q_u,
6499 prs_struct *ps, int depth)
6504 prs_debug(ps, depth, desc, "samr_io_q_get_dom_pwinfo");
6510 if(!prs_uint32("ptr", ps, depth, &q_u->ptr))
6512 if (q_u->ptr != 0) {
6513 if(!smb_io_unihdr("", &q_u->hdr_srv_name, ps, depth))
6515 if(!smb_io_unistr2("", &q_u->uni_srv_name, q_u->hdr_srv_name.buffer, ps, depth))
6522 /*******************************************************************
6523 reads or writes a structure.
6524 ********************************************************************/
6526 BOOL samr_io_r_get_dom_pwinfo(char *desc, SAMR_R_GET_DOM_PWINFO * r_u,
6527 prs_struct *ps, int depth)
6532 prs_debug(ps, depth, desc, "samr_io_r_get_dom_pwinfo");
6538 if(!prs_uint16("unk_0", ps, depth, &r_u->unk_0))
6542 if(!prs_uint16("unk_1", ps, depth, &r_u->unk_1))
6546 if(!prs_uint16("unk_2", ps, depth, &r_u->unk_2))
6551 if(!prs_uint32("status", ps, depth, &r_u->status))
6557 /*******************************************************************
6558 make a SAMR_ENC_PASSWD structure.
6559 ********************************************************************/
6561 void init_enc_passwd(SAMR_ENC_PASSWD * pwd, char pass[512])
6569 memcpy(pwd->pass, pass, sizeof(pwd->pass));
6573 /*******************************************************************
6574 reads or writes a SAMR_ENC_PASSWD structure.
6575 ********************************************************************/
6577 BOOL samr_io_enc_passwd(char *desc, SAMR_ENC_PASSWD * pwd,
6578 prs_struct *ps, int depth)
6583 prs_debug(ps, depth, desc, "samr_io_enc_passwd");
6589 if(!prs_uint32("ptr", ps, depth, &pwd->ptr))
6592 if (pwd->ptr != 0) {
6593 if(!prs_uint8s(False, "pwd", ps, depth, pwd->pass, sizeof(pwd->pass)))
6600 /*******************************************************************
6601 inits a SAMR_ENC_HASH structure.
6602 ********************************************************************/
6604 void init_enc_hash(SAMR_ENC_HASH * hsh, uchar hash[16])
6612 memcpy(hsh->hash, hash, sizeof(hsh->hash));
6616 /*******************************************************************
6617 reads or writes a SAMR_ENC_HASH structure.
6618 ********************************************************************/
6620 BOOL samr_io_enc_hash(char *desc, SAMR_ENC_HASH * hsh,
6621 prs_struct *ps, int depth)
6626 prs_debug(ps, depth, desc, "samr_io_enc_hash");
6632 if(!prs_uint32("ptr ", ps, depth, &hsh->ptr))
6634 if (hsh->ptr != 0) {
6635 if(!prs_uint8s(False, "hash", ps, depth, hsh->hash,sizeof(hsh->hash)))
6642 /*******************************************************************
6643 inits a SAMR_R_GET_DOM_PWINFO structure.
6644 ********************************************************************/
6646 void init_samr_q_chgpasswd_user(SAMR_Q_CHGPASSWD_USER * q_u,
6647 char *dest_host, char *user_name,
6648 char nt_newpass[516],
6649 uchar nt_oldhash[16],
6650 char lm_newpass[516],
6651 uchar lm_oldhash[16])
6653 int len_dest_host = strlen(dest_host);
6654 int len_user_name = strlen(user_name);
6656 DEBUG(5, ("init_samr_q_chgpasswd_user\n"));
6659 init_uni_hdr(&q_u->hdr_dest_host, len_dest_host);
6660 init_unistr2(&q_u->uni_dest_host, dest_host, len_dest_host);
6661 init_uni_hdr(&q_u->hdr_user_name, len_user_name);
6662 init_unistr2(&q_u->uni_user_name, user_name, len_user_name);
6664 init_enc_passwd(&q_u->nt_newpass, nt_newpass);
6665 init_enc_hash(&q_u->nt_oldhash, nt_oldhash);
6667 q_u->unknown = 0x01;
6669 init_enc_passwd(&q_u->lm_newpass, lm_newpass);
6670 init_enc_hash(&q_u->lm_oldhash, lm_oldhash);
6673 /*******************************************************************
6674 reads or writes a structure.
6675 ********************************************************************/
6677 BOOL samr_io_q_chgpasswd_user(char *desc, SAMR_Q_CHGPASSWD_USER * q_u,
6678 prs_struct *ps, int depth)
6683 prs_debug(ps, depth, desc, "samr_io_q_chgpasswd_user");
6689 if(!prs_uint32("ptr_0", ps, depth, &q_u->ptr_0))
6692 if(!smb_io_unihdr("", &q_u->hdr_dest_host, ps, depth))
6694 if(!smb_io_unistr2("", &q_u->uni_dest_host, q_u->hdr_dest_host.buffer, ps, depth))
6699 if(!smb_io_unihdr("", &q_u->hdr_user_name, ps, depth))
6701 if(!smb_io_unistr2("", &q_u->uni_user_name, q_u->hdr_user_name.buffer,ps, depth))
6704 if(!samr_io_enc_passwd("nt_newpass", &q_u->nt_newpass, ps, depth))
6706 if(!samr_io_enc_hash("nt_oldhash", &q_u->nt_oldhash, ps, depth))
6709 if(!prs_uint32("unknown", ps, depth, &q_u->unknown))
6712 if(!samr_io_enc_passwd("lm_newpass", &q_u->lm_newpass, ps, depth))
6714 if(!samr_io_enc_hash("lm_oldhash", &q_u->lm_oldhash, ps, depth))
6720 /*******************************************************************
6721 inits a SAMR_R_CHGPASSWD_USER structure.
6722 ********************************************************************/
6724 void init_samr_r_chgpasswd_user(SAMR_R_CHGPASSWD_USER * r_u, uint32 status)
6726 DEBUG(5, ("init_r_chgpasswd_user\n"));
6728 r_u->status = status;
6731 /*******************************************************************
6732 reads or writes a structure.
6733 ********************************************************************/
6735 BOOL samr_io_r_chgpasswd_user(char *desc, SAMR_R_CHGPASSWD_USER * r_u,
6736 prs_struct *ps, int depth)
6741 prs_debug(ps, depth, desc, "samr_io_r_chgpasswd_user");
6747 if(!prs_uint32("status", ps, depth, &r_u->status))