2 * Unix SMB/Netbios implementation.
4 * RPC Pipe client / server routines
5 * Copyright (C) Andrew Tridgell 1992-1997,
6 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
7 * Copyright (C) Paul Ashton 1997.
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 extern int DEBUGLEVEL;
29 static TALLOC_CTX *parse_misc_talloc = NULL;
31 /******************************************************************* a
32 free up temporary memory - called from the main loop
33 ********************************************************************/
35 void parse_talloc_free(void)
37 if (!parse_misc_talloc)
39 talloc_destroy(parse_misc_talloc);
40 parse_misc_talloc = NULL;
43 /*******************************************************************
44 Reads or writes a UTIME type.
45 ********************************************************************/
47 static BOOL smb_io_utime(char *desc, UTIME *t, prs_struct *ps, int depth)
52 prs_debug(ps, depth, desc, "smb_io_utime");
58 if(!prs_uint32 ("time", ps, depth, &t->time))
64 /*******************************************************************
65 Reads or writes an NTTIME structure.
66 ********************************************************************/
68 BOOL smb_io_time(char *desc, NTTIME *nttime, prs_struct *ps, int depth)
73 prs_debug(ps, depth, desc, "smb_io_time");
79 if(!prs_uint32("low ", ps, depth, &nttime->low)) /* low part */
81 if(!prs_uint32("high", ps, depth, &nttime->high)) /* high part */
87 /*******************************************************************
88 Reads or writes a LOOKUP_LEVEL structure.
89 ********************************************************************/
91 BOOL smb_io_lookup_level(char *desc, LOOKUP_LEVEL *level, prs_struct *ps, int depth)
96 prs_debug(ps, depth, desc, "smb_io_lookup_level");
101 if(!prs_uint16("value", ps, depth, &level->value))
109 /*******************************************************************
110 Gets an enumeration handle from an ENUM_HND structure.
111 ********************************************************************/
113 uint32 get_enum_hnd(ENUM_HND *enh)
115 return (enh && enh->ptr_hnd != 0) ? enh->handle : 0;
118 /*******************************************************************
119 Inits an ENUM_HND structure.
120 ********************************************************************/
122 void init_enum_hnd(ENUM_HND *enh, uint32 hnd)
124 DEBUG(5,("smb_io_enum_hnd\n"));
126 enh->ptr_hnd = (hnd != 0) ? 1 : 0;
130 /*******************************************************************
131 Reads or writes an ENUM_HND structure.
132 ********************************************************************/
134 BOOL smb_io_enum_hnd(char *desc, ENUM_HND *hnd, prs_struct *ps, int depth)
139 prs_debug(ps, depth, desc, "smb_io_enum_hnd");
145 if(!prs_uint32("ptr_hnd", ps, depth, &hnd->ptr_hnd)) /* pointer */
148 if (hnd->ptr_hnd != 0) {
149 if(!prs_uint32("handle ", ps, depth, &hnd->handle )) /* enum handle */
156 /*******************************************************************
157 Reads or writes a DOM_SID structure.
158 ********************************************************************/
160 BOOL smb_io_dom_sid(char *desc, DOM_SID *sid, prs_struct *ps, int depth)
167 prs_debug(ps, depth, desc, "smb_io_dom_sid");
173 if(!prs_uint8 ("sid_rev_num", ps, depth, &sid->sid_rev_num))
175 if(!prs_uint8 ("num_auths ", ps, depth, &sid->num_auths))
178 for (i = 0; i < 6; i++)
181 slprintf(tmp, sizeof(tmp) - 1, "id_auth[%d] ", i);
182 if(!prs_uint8 (tmp, ps, depth, &sid->id_auth[i]))
186 /* oops! XXXX should really issue a warning here... */
187 if (sid->num_auths > MAXSUBAUTHS)
188 sid->num_auths = MAXSUBAUTHS;
190 if(!prs_uint32s(False, "sub_auths ", ps, depth, sid->sub_auths, sid->num_auths))
196 /*******************************************************************
197 Inits a DOM_SID structure.
199 BIG NOTE: this function only does SIDS where the identauth is not >= 2^32
200 identauth >= 2^32 can be detected because it will be specified in hex
201 ********************************************************************/
203 void init_dom_sid(DOM_SID *sid, char *str_sid)
211 DEBUG(4,("netlogon domain SID: none\n"));
212 sid->sid_rev_num = 0;
217 pstrcpy(domsid, str_sid);
219 DEBUG(4,("init_dom_sid %d SID: %s\n", __LINE__, domsid));
221 /* assume, but should check, that domsid starts "S-" */
222 p = strtok(domsid+2,"-");
223 sid->sid_rev_num = atoi(p);
225 /* identauth in decimal should be < 2^32 */
226 /* identauth in hex should be >= 2^32 */
227 identauth = atoi(strtok(0,"-"));
229 DEBUG(4,("netlogon rev %d\n", sid->sid_rev_num));
230 DEBUG(4,("netlogon %s ia %d\n", p, identauth));
234 sid->id_auth[2] = (identauth & 0xff000000) >> 24;
235 sid->id_auth[3] = (identauth & 0x00ff0000) >> 16;
236 sid->id_auth[4] = (identauth & 0x0000ff00) >> 8;
237 sid->id_auth[5] = (identauth & 0x000000ff);
241 while ((p = strtok(0, "-")) != NULL && sid->num_auths < MAXSUBAUTHS)
242 sid->sub_auths[sid->num_auths++] = atoi(p);
244 DEBUG(4,("init_dom_sid: %d SID: %s\n", __LINE__, domsid));
247 /*******************************************************************
248 Inits a DOM_SID2 structure.
249 ********************************************************************/
251 void init_dom_sid2(DOM_SID2 *sid2, DOM_SID *sid)
254 sid2->num_auths = sid2->sid.num_auths;
257 /*******************************************************************
258 Reads or writes a DOM_SID2 structure.
259 ********************************************************************/
261 BOOL smb_io_dom_sid2(char *desc, DOM_SID2 *sid, prs_struct *ps, int depth)
266 prs_debug(ps, depth, desc, "smb_io_dom_sid2");
272 if(!prs_uint32("num_auths", ps, depth, &sid->num_auths))
275 if(!smb_io_dom_sid("sid", &sid->sid, ps, depth))
281 /*******************************************************************
282 creates a STRHDR structure.
283 ********************************************************************/
285 void init_str_hdr(STRHDR *hdr, int max_len, int len, uint32 buffer)
287 hdr->str_max_len = max_len;
288 hdr->str_str_len = len;
289 hdr->buffer = buffer;
292 /*******************************************************************
293 Reads or writes a STRHDR structure.
294 ********************************************************************/
296 BOOL smb_io_strhdr(char *desc, STRHDR *hdr, prs_struct *ps, int depth)
301 prs_debug(ps, depth, desc, "smb_io_strhdr");
306 if(!prs_uint16("str_str_len", ps, depth, &hdr->str_str_len))
308 if(!prs_uint16("str_max_len", ps, depth, &hdr->str_max_len))
310 if(!prs_uint32("buffer ", ps, depth, &hdr->buffer))
316 /*******************************************************************
317 Inits a UNIHDR structure.
318 ********************************************************************/
320 void init_uni_hdr(UNIHDR *hdr, int len)
322 hdr->uni_str_len = 2 * len;
323 hdr->uni_max_len = 2 * len;
324 hdr->buffer = len != 0 ? 1 : 0;
327 /*******************************************************************
328 Reads or writes a UNIHDR structure.
329 ********************************************************************/
331 BOOL smb_io_unihdr(char *desc, UNIHDR *hdr, prs_struct *ps, int depth)
336 prs_debug(ps, depth, desc, "smb_io_unihdr");
342 if(!prs_uint16("uni_str_len", ps, depth, &hdr->uni_str_len))
344 if(!prs_uint16("uni_max_len", ps, depth, &hdr->uni_max_len))
346 if(!prs_uint32("buffer ", ps, depth, &hdr->buffer))
352 /*******************************************************************
353 Inits a BUFHDR structure.
354 ********************************************************************/
356 void init_buf_hdr(BUFHDR *hdr, int max_len, int len)
358 hdr->buf_max_len = max_len;
362 /*******************************************************************
363 prs_uint16 wrapper. Call this and it sets up a pointer to where the
364 uint16 should be stored, or gets the size if reading.
365 ********************************************************************/
367 BOOL smb_io_hdrbuf_pre(char *desc, BUFHDR *hdr, prs_struct *ps, int depth, uint32 *offset)
369 (*offset) = prs_offset(ps);
374 if(!smb_io_hdrbuf(desc, hdr, ps, depth))
381 if(!prs_set_offset(ps, prs_offset(ps) + (sizeof(uint32) * 2)))
388 /*******************************************************************
389 smb_io_hdrbuf wrapper. Call this and it retrospectively stores the size.
390 Does nothing on reading, as that is already handled by ...._pre()
391 ********************************************************************/
393 BOOL smb_io_hdrbuf_post(char *desc, BUFHDR *hdr, prs_struct *ps, int depth,
394 uint32 ptr_hdrbuf, uint32 max_len, uint32 len)
397 /* writing: go back and do a retrospective job. i hate this */
399 uint32 old_offset = prs_offset(ps);
401 init_buf_hdr(hdr, max_len, len);
402 if(!prs_set_offset(ps, ptr_hdrbuf))
404 if(!smb_io_hdrbuf(desc, hdr, ps, depth))
407 if(!prs_set_offset(ps, old_offset))
414 /*******************************************************************
415 Reads or writes a BUFHDR structure.
416 ********************************************************************/
418 BOOL smb_io_hdrbuf(char *desc, BUFHDR *hdr, prs_struct *ps, int depth)
423 prs_debug(ps, depth, desc, "smb_io_hdrbuf");
429 if(!prs_uint32("buf_max_len", ps, depth, &hdr->buf_max_len))
431 if(!prs_uint32("buf_len ", ps, depth, &hdr->buf_len))
437 /*******************************************************************
438 creates a UNIHDR2 structure.
439 ********************************************************************/
441 void init_uni_hdr2(UNIHDR2 *hdr, int len)
443 init_uni_hdr(&hdr->unihdr, len);
444 hdr->buffer = (len > 0) ? 1 : 0;
447 /*******************************************************************
448 Reads or writes a UNIHDR2 structure.
449 ********************************************************************/
451 BOOL smb_io_unihdr2(char *desc, UNIHDR2 *hdr2, prs_struct *ps, int depth)
456 prs_debug(ps, depth, desc, "smb_io_unihdr2");
462 if(!smb_io_unihdr("hdr", &hdr2->unihdr, ps, depth))
464 if(!prs_uint32("buffer", ps, depth, &hdr2->buffer))
470 /*******************************************************************
471 Inits a UNISTR structure.
472 ********************************************************************/
474 void init_unistr(UNISTR *str, const char *buf)
476 size_t len = strlen(buf) + 1;
478 if (!parse_misc_talloc)
479 parse_misc_talloc = talloc_init();
481 if (len < MAX_UNISTRLEN)
483 len *= sizeof(uint16);
485 str->buffer = (uint16 *)talloc(parse_misc_talloc, len);
486 if (str->buffer == NULL)
487 smb_panic("init_unistr2: malloc fail\n");
489 /* store the string (null-terminated copy) */
490 dos_struni2((char *)str->buffer, buf, len);
493 /*******************************************************************
494 reads or writes a UNISTR structure.
495 XXXX NOTE: UNISTR structures NEED to be null-terminated.
496 ********************************************************************/
498 BOOL smb_io_unistr(char *desc, UNISTR *uni, prs_struct *ps, int depth)
503 prs_debug(ps, depth, desc, "smb_io_unistr");
508 if(!prs_unistr("unistr", ps, depth, uni))
514 /*******************************************************************
515 Allocate the BUFFER3 memory.
516 ********************************************************************/
518 static void create_buffer3(BUFFER3 *str, size_t len)
520 if (!parse_misc_talloc)
521 parse_misc_talloc = talloc_init();
523 if (len < MAX_BUFFERLEN)
526 str->buffer = talloc(parse_misc_talloc, len);
527 if (str->buffer == NULL)
528 smb_panic("create_buffer3: malloc fail\n");
532 /*******************************************************************
533 Inits a BUFFER3 structure from a uint32
534 ********************************************************************/
536 void init_buffer3_uint32(BUFFER3 *str, uint32 val)
540 /* set up string lengths. */
541 str->buf_max_len = sizeof(uint32);
542 str->buf_len = sizeof(uint32);
544 create_buffer3(str, sizeof(uint32));
545 SIVAL(str->buffer, 0, val);
548 /*******************************************************************
549 Inits a BUFFER3 structure.
550 ********************************************************************/
552 void init_buffer3_str(BUFFER3 *str, char *buf, int len)
556 /* set up string lengths. */
557 str->buf_max_len = len * 2;
558 str->buf_len = len * 2;
560 create_buffer3(str, str->buf_max_len);
562 /* store the string (null-terminated 8 bit chars into 16 bit chars) */
563 dos_struni2((char *)str->buffer, buf, str->buf_max_len);
566 /*******************************************************************
567 Inits a BUFFER3 structure from a hex string.
568 ********************************************************************/
570 void init_buffer3_hex(BUFFER3 *str, char *buf)
573 create_buffer3(str, strlen(buf));
574 str->buf_max_len = str->buf_len = strhex_to_str((char *)str->buffer, sizeof(str->buffer), buf);
577 /*******************************************************************
578 Inits a BUFFER3 structure.
579 ********************************************************************/
581 void init_buffer3_bytes(BUFFER3 *str, uint8 *buf, int len)
585 /* max buffer size (allocated size) */
586 str->buf_max_len = len;
588 create_buffer3(str, len);
589 memcpy(str->buffer, buf, len);
591 str->buf_len = buf != NULL ? len : 0;
594 /*******************************************************************
595 Reads or writes a BUFFER3 structure.
596 the uni_max_len member tells you how large the buffer is.
597 the uni_str_len member tells you how much of the buffer is really used.
598 ********************************************************************/
600 BOOL smb_io_buffer3(char *desc, BUFFER3 *buf3, prs_struct *ps, int depth)
605 prs_debug(ps, depth, desc, "smb_io_buffer3");
611 if(!prs_uint32("uni_max_len", ps, depth, &buf3->buf_max_len))
614 if (UNMARSHALLING(ps)) {
615 buf3->buffer = prs_alloc_mem(ps, buf3->buf_max_len);
616 if (buf3->buffer == NULL)
620 if(!prs_uint8s(True, "buffer ", ps, depth, buf3->buffer, buf3->buf_max_len))
623 if(!prs_uint32("buf_len ", ps, depth, &buf3->buf_len))
629 /*******************************************************************
630 reads or writes a BUFFER5 structure.
631 the buf_len member tells you how large the buffer is.
632 ********************************************************************/
633 BOOL smb_io_buffer5(char *desc, BUFFER5 *buf5, prs_struct *ps, int depth)
635 prs_debug(ps, depth, desc, "smb_io_buffer5");
638 if (buf5 == NULL) return False;
641 prs_uint32("buf_len", ps, depth, &(buf5->buf_len));
643 /* reading: alloc the buffer first */
644 if ( UNMARSHALLING(ps) ) {
645 buf5->buffer=(uint16 *)prs_alloc_mem(ps, sizeof(uint16)*buf5->buf_len );
646 if (buf5->buffer == NULL)
650 prs_uint16s(True, "buffer", ps, depth, buf5->buffer, buf5->buf_len);
655 /*******************************************************************
656 Inits a BUFFER2 structure.
657 ********************************************************************/
659 void init_buffer2(BUFFER2 *str, uint8 *buf, int len)
663 /* max buffer size (allocated size) */
664 str->buf_max_len = len;
666 str->buf_len = buf != NULL ? len : 0;
669 if (!parse_misc_talloc)
670 parse_misc_talloc = talloc_init();
672 if (len < MAX_BUFFERLEN)
674 str->buffer = talloc(parse_misc_talloc, len);
675 if (str->buffer == NULL)
676 smb_panic("init_buffer2: malloc fail\n");
677 memcpy(str->buffer, buf, MIN(str->buf_len, len));
681 /*******************************************************************
682 Reads or writes a BUFFER2 structure.
683 the uni_max_len member tells you how large the buffer is.
684 the uni_str_len member tells you how much of the buffer is really used.
685 ********************************************************************/
687 BOOL smb_io_buffer2(char *desc, BUFFER2 *buf2, uint32 buffer, prs_struct *ps, int depth)
694 prs_debug(ps, depth, desc, "smb_io_buffer2");
700 if(!prs_uint32("uni_max_len", ps, depth, &buf2->buf_max_len))
702 if(!prs_uint32("undoc ", ps, depth, &buf2->undoc))
704 if(!prs_uint32("buf_len ", ps, depth, &buf2->buf_len))
707 /* buffer advanced by indicated length of string
708 NOT by searching for null-termination */
710 if(!prs_buffer2(True, "buffer ", ps, depth, buf2))
715 prs_debug(ps, depth, desc, "smb_io_buffer2 - NULL");
717 memset((char *)buf2, '\0', sizeof(*buf2));
723 /*******************************************************************
724 creates a UNISTR2 structure: sets up the buffer, too
725 ********************************************************************/
727 void init_buf_unistr2(UNISTR2 *str, uint32 *ptr, const char *buf)
732 init_unistr2(str, buf, strlen(buf)+1);
737 init_unistr2(str, "", 0);
742 /*******************************************************************
743 Copies a UNISTR2 structure.
744 ********************************************************************/
746 void copy_unistr2(UNISTR2 *str, UNISTR2 *from)
748 /* set up string lengths. add one if string is not null-terminated */
749 str->uni_max_len = from->uni_max_len;
750 str->undoc = from->undoc;
751 str->uni_str_len = from->uni_str_len;
753 if (str->buffer == NULL) {
754 size_t len = from->uni_max_len * 2;
756 if (!parse_misc_talloc)
757 parse_misc_talloc = talloc_init();
759 if (len < MAX_UNISTRLEN)
761 len *= sizeof(uint16);
763 str->buffer = (uint16 *)talloc(parse_misc_talloc, len);
764 if (str->buffer == NULL)
765 smb_panic("copy_unistr2: malloc fail\n");
768 /* copy the string */
769 memcpy(str->buffer, from->buffer, sizeof(from->buffer));
772 /*******************************************************************
773 Creates a STRING2 structure.
774 ********************************************************************/
776 void init_string2(STRING2 *str, char *buf, int len)
780 /* set up string lengths. */
781 str->str_max_len = len;
783 str->str_str_len = len;
785 /* store the string */
787 if (!parse_misc_talloc)
788 parse_misc_talloc = talloc_init();
790 if (len < MAX_STRINGLEN)
791 alloc_len = MAX_STRINGLEN;
792 str->buffer = talloc(parse_misc_talloc, alloc_len);
793 if (str->buffer == NULL)
794 smb_panic("init_string2: malloc fail\n");
795 memcpy(str->buffer, buf, len);
799 /*******************************************************************
800 Reads or writes a STRING2 structure.
801 XXXX NOTE: STRING2 structures need NOT be null-terminated.
802 the str_str_len member tells you how long the string is;
803 the str_max_len member tells you how large the buffer is.
804 ********************************************************************/
806 BOOL smb_io_string2(char *desc, STRING2 *str2, uint32 buffer, prs_struct *ps, int depth)
813 prs_debug(ps, depth, desc, "smb_io_string2");
819 if(!prs_uint32("str_max_len", ps, depth, &str2->str_max_len))
821 if(!prs_uint32("undoc ", ps, depth, &str2->undoc))
823 if(!prs_uint32("str_str_len", ps, depth, &str2->str_str_len))
826 /* buffer advanced by indicated length of string
827 NOT by searching for null-termination */
828 if(!prs_string2(True, "buffer ", ps, depth, str2))
833 prs_debug(ps, depth, desc, "smb_io_string2 - NULL");
835 memset((char *)str2, '\0', sizeof(*str2));
842 /*******************************************************************
843 Inits a UNISTR2 structure.
844 ********************************************************************/
846 void init_unistr2(UNISTR2 *str, const char *buf, size_t len)
850 /* set up string lengths. */
851 str->uni_max_len = (uint32)len;
853 str->uni_str_len = (uint32)len;
855 if (!parse_misc_talloc)
856 parse_misc_talloc = talloc_init();
858 if (len < MAX_UNISTRLEN)
860 len *= sizeof(uint16);
862 str->buffer = (uint16 *)talloc(parse_misc_talloc, len);
863 if (str->buffer == NULL)
864 smb_panic("init_unistr2: malloc fail\n");
866 /* store the string (null-terminated 8 bit chars into 16 bit chars) */
867 dos_struni2((char *)str->buffer, buf, len);
870 /*******************************************************************
871 Inits a UNISTR2 structure from a UNISTR
872 ********************************************************************/
873 void init_unistr2_from_unistr (UNISTR2 *to, UNISTR *from)
879 if ((to == NULL) || (from == NULL) || (from->buffer == NULL))
884 /* get the length; UNISTR **are** NULL terminated */
888 if ((from->buffer)[i]=='\0' && (from->buffer)[(2*i)+1]=='\0')
897 DEBUG(0,("init_unistr2_from_unistr: non-null terminiated UNISTR!\n"));
901 /* set up string lengths. */
906 if (!parse_misc_talloc)
907 parse_misc_talloc = talloc_init();
909 to->buffer = (uint16 *)talloc(parse_misc_talloc, sizeof(uint16)*(to->uni_str_len));
910 if (to->buffer == NULL)
911 smb_panic("init_unistr2_from_unistr: malloc fail\n");
913 for (i=0; i < to->uni_str_len; i++)
914 to->buffer[i] = from->buffer[i];
920 /*******************************************************************
921 Reads or writes a UNISTR2 structure.
922 XXXX NOTE: UNISTR2 structures need NOT be null-terminated.
923 the uni_str_len member tells you how long the string is;
924 the uni_max_len member tells you how large the buffer is.
925 ********************************************************************/
927 BOOL smb_io_unistr2(char *desc, UNISTR2 *uni2, uint32 buffer, prs_struct *ps, int depth)
934 prs_debug(ps, depth, desc, "smb_io_unistr2");
940 if(!prs_uint32("uni_max_len", ps, depth, &uni2->uni_max_len))
942 if(!prs_uint32("undoc ", ps, depth, &uni2->undoc))
944 if(!prs_uint32("uni_str_len", ps, depth, &uni2->uni_str_len))
947 /* buffer advanced by indicated length of string
948 NOT by searching for null-termination */
949 if(!prs_unistr2(True, "buffer ", ps, depth, uni2))
954 prs_debug(ps, depth, desc, "smb_io_unistr2 - NULL");
956 memset((char *)uni2, '\0', sizeof(*uni2));
963 /*******************************************************************
964 Inits a DOM_RID2 structure.
965 ********************************************************************/
967 void init_dom_rid2(DOM_RID2 *rid2, uint32 rid, uint8 type, uint32 idx)
974 /*******************************************************************
975 Reads or writes a DOM_RID2 structure.
976 ********************************************************************/
978 BOOL smb_io_dom_rid2(char *desc, DOM_RID2 *rid2, prs_struct *ps, int depth)
983 prs_debug(ps, depth, desc, "smb_io_dom_rid2");
989 if(!prs_uint8("type ", ps, depth, &rid2->type))
993 if(!prs_uint32("rid ", ps, depth, &rid2->rid))
995 if(!prs_uint32("rid_idx", ps, depth, &rid2->rid_idx))
1001 /*******************************************************************
1002 creates a DOM_RID3 structure.
1003 ********************************************************************/
1005 void init_dom_rid3(DOM_RID3 *rid3, uint32 rid, uint8 type)
1009 rid3->ptr_type = 0x1; /* non-zero, basically. */
1014 /*******************************************************************
1015 reads or writes a DOM_RID3 structure.
1016 ********************************************************************/
1018 BOOL smb_io_dom_rid3(char *desc, DOM_RID3 *rid3, prs_struct *ps, int depth)
1023 prs_debug(ps, depth, desc, "smb_io_dom_rid3");
1029 if(!prs_uint32("rid ", ps, depth, &rid3->rid))
1031 if(!prs_uint32("type1 ", ps, depth, &rid3->type1))
1033 if(!prs_uint32("ptr_type", ps, depth, &rid3->ptr_type))
1035 if(!prs_uint32("type2 ", ps, depth, &rid3->type2))
1037 if(!prs_uint32("unk ", ps, depth, &rid3->unk))
1043 /*******************************************************************
1044 Inits a DOM_RID4 structure.
1045 ********************************************************************/
1047 void init_dom_rid4(DOM_RID4 *rid4, uint16 unknown, uint16 attr, uint32 rid)
1049 rid4->unknown = unknown;
1054 /*******************************************************************
1055 Inits a DOM_CLNT_SRV structure.
1056 ********************************************************************/
1058 static void init_clnt_srv(DOM_CLNT_SRV *log, char *logon_srv, char *comp_name)
1060 DEBUG(5,("init_clnt_srv: %d\n", __LINE__));
1062 if (logon_srv != NULL) {
1063 log->undoc_buffer = 1;
1064 init_unistr2(&log->uni_logon_srv, logon_srv, strlen(logon_srv)+1);
1066 log->undoc_buffer = 0;
1069 if (comp_name != NULL) {
1070 log->undoc_buffer2 = 1;
1071 init_unistr2(&log->uni_comp_name, comp_name, strlen(comp_name)+1);
1073 log->undoc_buffer2 = 0;
1077 /*******************************************************************
1078 Inits or writes a DOM_CLNT_SRV structure.
1079 ********************************************************************/
1081 static BOOL smb_io_clnt_srv(char *desc, DOM_CLNT_SRV *log, prs_struct *ps, int depth)
1086 prs_debug(ps, depth, desc, "smb_io_clnt_srv");
1092 if(!prs_uint32("undoc_buffer ", ps, depth, &log->undoc_buffer))
1095 if (log->undoc_buffer != 0) {
1096 if(!smb_io_unistr2("unistr2", &log->uni_logon_srv, log->undoc_buffer, ps, depth))
1103 if(!prs_uint32("undoc_buffer2", ps, depth, &log->undoc_buffer2))
1106 if (log->undoc_buffer2 != 0) {
1107 if(!smb_io_unistr2("unistr2", &log->uni_comp_name, log->undoc_buffer2, ps, depth))
1114 /*******************************************************************
1115 Inits a DOM_LOG_INFO structure.
1116 ********************************************************************/
1118 void init_log_info(DOM_LOG_INFO *log, char *logon_srv, char *acct_name,
1119 uint16 sec_chan, char *comp_name)
1121 DEBUG(5,("make_log_info %d\n", __LINE__));
1123 log->undoc_buffer = 1;
1125 init_unistr2(&log->uni_logon_srv, logon_srv, strlen(logon_srv)+1);
1126 init_unistr2(&log->uni_acct_name, acct_name, strlen(acct_name)+1);
1128 log->sec_chan = sec_chan;
1130 init_unistr2(&log->uni_comp_name, comp_name, strlen(comp_name)+1);
1133 /*******************************************************************
1134 Reads or writes a DOM_LOG_INFO structure.
1135 ********************************************************************/
1137 BOOL smb_io_log_info(char *desc, DOM_LOG_INFO *log, prs_struct *ps, int depth)
1142 prs_debug(ps, depth, desc, "smb_io_log_info");
1148 if(!prs_uint32("undoc_buffer", ps, depth, &log->undoc_buffer))
1151 if(!smb_io_unistr2("unistr2", &log->uni_logon_srv, True, ps, depth))
1153 if(!smb_io_unistr2("unistr2", &log->uni_acct_name, True, ps, depth))
1156 if(!prs_uint16("sec_chan", ps, depth, &log->sec_chan))
1159 if(!smb_io_unistr2("unistr2", &log->uni_comp_name, True, ps, depth))
1165 /*******************************************************************
1166 Reads or writes a DOM_CHAL structure.
1167 ********************************************************************/
1169 BOOL smb_io_chal(char *desc, DOM_CHAL *chal, prs_struct *ps, int depth)
1174 prs_debug(ps, depth, desc, "smb_io_chal");
1180 if(!prs_uint8s (False, "data", ps, depth, chal->data, 8))
1186 /*******************************************************************
1187 Reads or writes a DOM_CRED structure.
1188 ********************************************************************/
1190 BOOL smb_io_cred(char *desc, DOM_CRED *cred, prs_struct *ps, int depth)
1195 prs_debug(ps, depth, desc, "smb_io_cred");
1201 if(!smb_io_chal ("", &cred->challenge, ps, depth))
1203 if(!smb_io_utime("", &cred->timestamp, ps, depth))
1209 /*******************************************************************
1210 Inits a DOM_CLNT_INFO2 structure.
1211 ********************************************************************/
1213 void init_clnt_info2(DOM_CLNT_INFO2 *clnt,
1214 char *logon_srv, char *comp_name,
1215 DOM_CRED *clnt_cred)
1217 DEBUG(5,("make_clnt_info: %d\n", __LINE__));
1219 init_clnt_srv(&(clnt->login), logon_srv, comp_name);
1221 if (clnt_cred != NULL) {
1223 memcpy(&(clnt->cred), clnt_cred, sizeof(clnt->cred));
1229 /*******************************************************************
1230 Reads or writes a DOM_CLNT_INFO2 structure.
1231 ********************************************************************/
1233 BOOL smb_io_clnt_info2(char *desc, DOM_CLNT_INFO2 *clnt, prs_struct *ps, int depth)
1238 prs_debug(ps, depth, desc, "smb_io_clnt_info2");
1244 if(!smb_io_clnt_srv("", &clnt->login, ps, depth))
1250 if(!prs_uint32("ptr_cred", ps, depth, &clnt->ptr_cred))
1252 if(!smb_io_cred("", &clnt->cred, ps, depth))
1258 /*******************************************************************
1259 Inits a DOM_CLNT_INFO structure.
1260 ********************************************************************/
1262 void init_clnt_info(DOM_CLNT_INFO *clnt,
1263 char *logon_srv, char *acct_name,
1264 uint16 sec_chan, char *comp_name,
1267 DEBUG(5,("make_clnt_info\n"));
1269 init_log_info(&clnt->login, logon_srv, acct_name, sec_chan, comp_name);
1270 memcpy(&clnt->cred, cred, sizeof(clnt->cred));
1273 /*******************************************************************
1274 Reads or writes a DOM_CLNT_INFO structure.
1275 ********************************************************************/
1277 BOOL smb_io_clnt_info(char *desc, DOM_CLNT_INFO *clnt, prs_struct *ps, int depth)
1282 prs_debug(ps, depth, desc, "smb_io_clnt_info");
1288 if(!smb_io_log_info("", &clnt->login, ps, depth))
1290 if(!smb_io_cred("", &clnt->cred, ps, depth))
1296 /*******************************************************************
1297 Inits a DOM_LOGON_ID structure.
1298 ********************************************************************/
1300 void init_logon_id(DOM_LOGON_ID *log, uint32 log_id_low, uint32 log_id_high)
1302 DEBUG(5,("make_logon_id: %d\n", __LINE__));
1304 log->low = log_id_low;
1305 log->high = log_id_high;
1308 /*******************************************************************
1309 Reads or writes a DOM_LOGON_ID structure.
1310 ********************************************************************/
1312 BOOL smb_io_logon_id(char *desc, DOM_LOGON_ID *log, prs_struct *ps, int depth)
1317 prs_debug(ps, depth, desc, "smb_io_logon_id");
1323 if(!prs_uint32("low ", ps, depth, &log->low ))
1325 if(!prs_uint32("high", ps, depth, &log->high))
1331 /*******************************************************************
1332 Inits an OWF_INFO structure.
1333 ********************************************************************/
1335 void init_owf_info(OWF_INFO *hash, uint8 data[16])
1337 DEBUG(5,("init_owf_info: %d\n", __LINE__));
1340 memcpy(hash->data, data, sizeof(hash->data));
1342 memset((char *)hash->data, '\0', sizeof(hash->data));
1345 /*******************************************************************
1346 Reads or writes an OWF_INFO structure.
1347 ********************************************************************/
1349 BOOL smb_io_owf_info(char *desc, OWF_INFO *hash, prs_struct *ps, int depth)
1354 prs_debug(ps, depth, desc, "smb_io_owf_info");
1360 if(!prs_uint8s (False, "data", ps, depth, hash->data, 16))
1366 /*******************************************************************
1367 Reads or writes a DOM_GID structure.
1368 ********************************************************************/
1370 BOOL smb_io_gid(char *desc, DOM_GID *gid, prs_struct *ps, int depth)
1375 prs_debug(ps, depth, desc, "smb_io_gid");
1381 if(!prs_uint32("g_rid", ps, depth, &gid->g_rid))
1383 if(!prs_uint32("attr ", ps, depth, &gid->attr))
1389 /*******************************************************************
1390 Reads or writes an POLICY_HND structure.
1391 ********************************************************************/
1393 BOOL smb_io_pol_hnd(char *desc, POLICY_HND *pol, prs_struct *ps, int depth)
1398 prs_debug(ps, depth, desc, "smb_io_pol_hnd");
1404 if(!prs_uint8s (False, "data", ps, depth, pol->data, POL_HND_SIZE))
1410 /*******************************************************************
1411 Reads or writes a dom query structure.
1412 ********************************************************************/
1414 static BOOL smb_io_dom_query(char *desc, DOM_QUERY *d_q, prs_struct *ps, int depth)
1419 prs_debug(ps, depth, desc, "smb_io_dom_query");
1425 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
1427 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
1430 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
1432 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
1435 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
1441 if (d_q->buffer_dom_sid != 0) {
1442 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
1445 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
1451 /*******************************************************************
1452 Reads or writes a dom query structure.
1453 ********************************************************************/
1455 BOOL smb_io_dom_query_3(char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
1457 return smb_io_dom_query("", d_q, ps, depth);
1460 /*******************************************************************
1461 Reads or writes a dom query structure.
1462 ********************************************************************/
1464 BOOL smb_io_dom_query_5(char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
1466 return smb_io_dom_query("", d_q, ps, depth);
1470 /*******************************************************************
1471 Reads or writes a UNISTR3 structure.
1472 ********************************************************************/
1474 BOOL smb_io_unistr3(char *desc, UNISTR3 *name, prs_struct *ps, int depth)
1479 prs_debug(ps, depth, desc, "smb_io_unistr3");
1485 if(!prs_uint32("uni_str_len", ps, depth, &name->uni_str_len))
1488 /* don't know if len is specified by uni_str_len member... */
1489 /* assume unicode string is unicode-null-terminated, instead */
1491 if(!prs_unistr3(True, "unistr", name, ps, depth))
1498 /*******************************************************************
1499 Stream a uint64_struct
1500 ********************************************************************/
1501 BOOL prs_uint64(char *name, prs_struct *ps, int depth, UINT64_S *data64)
1503 return prs_uint32(name, ps, depth+1, &data64->low) &&
1504 prs_uint32(name, ps, depth+1, &data64->high);