2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997,
7 * Copyright (C) Andrew Bartlett 2002,
8 * Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2002.
9 * Copyright (C) Gerald )Jerry) Carter 2005
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
29 #define DBGC_CLASS DBGC_RPC_PARSE
31 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
32 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
34 /*******************************************************************
35 Inits a LSA_TRANS_NAME structure.
36 ********************************************************************/
38 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
39 uint16 sid_name_use, const char *name, uint32 idx)
41 trn->sid_name_use = sid_name_use;
42 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
43 init_uni_hdr(&trn->hdr_name, uni_name);
44 trn->domain_idx = idx;
47 /*******************************************************************
48 Reads or writes a LSA_TRANS_NAME structure.
49 ********************************************************************/
51 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps,
54 prs_debug(ps, depth, desc, "lsa_io_trans_name");
60 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
65 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
67 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
73 /*******************************************************************
74 Inits a LSA_TRANS_NAME2 structure.
75 ********************************************************************/
77 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
78 uint16 sid_name_use, const char *name, uint32 idx)
80 trn->sid_name_use = sid_name_use;
81 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
82 init_uni_hdr(&trn->hdr_name, uni_name);
83 trn->domain_idx = idx;
87 /*******************************************************************
88 Reads or writes a LSA_TRANS_NAME2 structure.
89 ********************************************************************/
91 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps,
94 prs_debug(ps, depth, desc, "lsa_io_trans_name2");
100 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
105 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
107 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
109 if(!prs_uint32("unknown ", ps, depth, &trn->unknown))
115 /*******************************************************************
116 Reads or writes a DOM_R_REF structure.
117 ********************************************************************/
119 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
123 prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
129 if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
131 if(!prs_uint32("ptr_ref_dom ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
133 if(!prs_uint32("max_entries ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
136 SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
138 if (dom->ptr_ref_dom != 0) {
140 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
143 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
145 for (i = 0; i < dom->num_ref_doms_1; i++) {
148 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
149 if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
152 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
153 if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
157 for (i = 0; i < dom->num_ref_doms_2; i++) {
160 if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
161 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
162 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
168 if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
169 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
170 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
179 /*******************************************************************
180 Inits an LSA_SEC_QOS structure.
181 ********************************************************************/
183 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
185 DEBUG(5, ("init_lsa_sec_qos\n"));
187 qos->len = 0x0c; /* length of quality of service block, in bytes */
188 qos->sec_imp_level = imp_lev;
189 qos->sec_ctxt_mode = ctxt;
190 qos->effective_only = eff;
193 /*******************************************************************
194 Reads or writes an LSA_SEC_QOS structure.
195 ********************************************************************/
197 static BOOL lsa_io_sec_qos(const char *desc, LSA_SEC_QOS *qos, prs_struct *ps,
202 prs_debug(ps, depth, desc, "lsa_io_obj_qos");
208 start = prs_offset(ps);
210 /* these pointers had _better_ be zero, because we don't know
213 if(!prs_uint32("len ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
215 if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
217 if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
219 if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
222 if (qos->len != prs_offset(ps) - start) {
223 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
224 qos->len, prs_offset(ps) - start));
230 /*******************************************************************
231 Inits an LSA_OBJ_ATTR structure.
232 ********************************************************************/
234 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
236 DEBUG(5, ("init_lsa_obj_attr\n"));
238 attr->len = 0x18; /* length of object attribute block, in bytes */
239 attr->ptr_root_dir = 0;
240 attr->ptr_obj_name = 0;
241 attr->attributes = attributes;
242 attr->ptr_sec_desc = 0;
245 attr->ptr_sec_qos = 1;
248 attr->ptr_sec_qos = 0;
249 attr->sec_qos = NULL;
253 /*******************************************************************
254 Reads or writes an LSA_OBJ_ATTR structure.
255 ********************************************************************/
257 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps,
260 prs_debug(ps, depth, desc, "lsa_io_obj_attr");
266 /* these pointers had _better_ be zero, because we don't know
269 if(!prs_uint32("len ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
271 if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
273 if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
275 if(!prs_uint32("attributes ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
277 if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
279 if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
282 if (attr->ptr_sec_qos != 0) {
283 if (UNMARSHALLING(ps))
284 if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
287 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
295 /*******************************************************************
296 Inits an LSA_Q_OPEN_POL structure.
297 ********************************************************************/
299 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
300 uint32 attributes, uint32 desired_access,
303 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes,
306 in->ptr = 1; /* undocumented pointer */
308 in->des_access = desired_access;
310 in->system_name = system_name;
311 init_lsa_obj_attr(&in->attr, attributes, qos);
314 /*******************************************************************
315 Reads or writes an LSA_Q_OPEN_POL structure.
316 ********************************************************************/
318 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps,
321 prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
324 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
326 if(!prs_uint16("system_name", ps, depth, &in->system_name))
331 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
334 if(!prs_uint32("des_access", ps, depth, &in->des_access))
340 /*******************************************************************
341 Reads or writes an LSA_R_OPEN_POL structure.
342 ********************************************************************/
344 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps,
347 prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
350 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
353 if(!prs_ntstatus("status", ps, depth, &out->status))
359 /*******************************************************************
360 Inits an LSA_Q_OPEN_POL2 structure.
361 ********************************************************************/
363 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
364 uint32 attributes, uint32 desired_access,
367 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes,
370 in->ptr = 1; /* undocumented pointer */
372 in->des_access = desired_access;
374 init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
376 init_lsa_obj_attr(&in->attr, attributes, qos);
379 /*******************************************************************
380 Reads or writes an LSA_Q_OPEN_POL2 structure.
381 ********************************************************************/
383 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps,
386 prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
389 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
392 if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
394 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
397 if(!prs_uint32("des_access", ps, depth, &in->des_access))
403 /*******************************************************************
404 Reads or writes an LSA_R_OPEN_POL2 structure.
405 ********************************************************************/
407 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps,
410 prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
413 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
416 if(!prs_ntstatus("status", ps, depth, &out->status))
422 /*******************************************************************
423 makes an LSA_Q_QUERY_SEC_OBJ structure.
424 ********************************************************************/
426 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd,
429 DEBUG(5, ("init_q_query_sec_obj\n"));
432 in->sec_info = sec_info;
437 /*******************************************************************
438 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
439 ********************************************************************/
441 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in,
442 prs_struct *ps, int depth)
444 prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
447 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
450 if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
456 /*******************************************************************
457 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
458 ********************************************************************/
460 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
462 prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
468 if (!prs_uint32("ptr", ps, depth, &out->ptr))
472 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
476 if (!prs_ntstatus("status", ps, depth, &out->status))
482 /*******************************************************************
483 Inits an LSA_Q_QUERY_INFO structure.
484 ********************************************************************/
486 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
488 DEBUG(5, ("init_q_query\n"));
490 memcpy(&in->pol, hnd, sizeof(in->pol));
492 in->info_class = info_class;
495 /*******************************************************************
496 Reads or writes an LSA_Q_QUERY_INFO structure.
497 ********************************************************************/
499 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps,
502 prs_debug(ps, depth, desc, "lsa_io_q_query");
505 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
508 if(!prs_uint16("info_class", ps, depth, &in->info_class))
514 /*******************************************************************
515 makes an LSA_Q_ENUM_TRUST_DOM structure.
516 ********************************************************************/
517 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
518 uint32 enum_context, uint32 preferred_len)
520 DEBUG(5, ("init_q_enum_trust_dom\n"));
523 q_e->enum_context = enum_context;
524 q_e->preferred_len = preferred_len;
529 /*******************************************************************
530 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
531 ********************************************************************/
533 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e,
534 prs_struct *ps, int depth)
536 prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
539 if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
542 if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
544 if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
550 /*******************************************************************
551 Inits an LSA_R_ENUM_TRUST_DOM structure.
552 ********************************************************************/
554 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
555 uint32 enum_context, uint32 num_domains,
556 struct trustdom_info **td)
560 DEBUG(5, ("init_r_enum_trust_dom\n"));
562 out->enum_context = enum_context;
563 out->count = num_domains;
565 if ( num_domains != 0 ) {
567 /* allocate container memory */
569 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
571 if ( !out->domlist ) {
572 out->status = NT_STATUS_NO_MEMORY;
577 out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
579 if ( !out->domlist->domains ) {
580 out->status = NT_STATUS_NO_MEMORY;
584 out->domlist->domains = NULL;
587 out->domlist->count = out->count;
589 /* initialize the list of domains and their sid */
591 for (i = 0; i < num_domains; i++) {
593 if ( !(out->domlist->domains[i].sid =
594 TALLOC_P(ctx, DOM_SID2)) ) {
595 out->status = NT_STATUS_NO_MEMORY;
599 init_dom_sid2(out->domlist->domains[i].sid,
601 if (push_ucs2_talloc(ctx, &name, (td[i])->name) == (size_t)-1){
602 out->status = NT_STATUS_NO_MEMORY;
605 init_unistr4_w(ctx, &out->domlist->domains[i].name,
612 /*******************************************************************
613 ********************************************************************/
615 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
619 prs_debug(ps, depth, desc, "lsa_io_domain_list");
622 if(!prs_uint32("count", ps, depth, &domlist->count))
625 if ( domlist->count == 0 )
628 if ( UNMARSHALLING(ps) ) {
629 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
635 for ( i=0; i<domlist->count; i++ ) {
636 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
638 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
644 for ( i=0; i<domlist->count; i++ ) {
645 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
647 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
654 /*******************************************************************
655 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
656 ********************************************************************/
658 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out,
659 prs_struct *ps, int depth)
661 prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
664 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
667 if(!prs_uint32("count", ps, depth, &out->count))
670 if ( !prs_pointer("trusted_domains", ps, depth, (void*)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
673 if(!prs_ntstatus("status", ps, depth, &out->status))
679 /*******************************************************************
680 reads or writes a structure.
681 ********************************************************************/
683 static BOOL lsa_io_dom_query_1(const char *desc, DOM_QUERY_1 *d_q, prs_struct *ps, int depth)
688 prs_debug(ps, depth, desc, "lsa_io_dom_query_1");
694 if (!prs_uint32("percent_full", ps, depth, &d_q->percent_full))
696 if (!prs_uint32("log_size", ps, depth, &d_q->log_size))
698 if (!smb_io_nttime("retention_time", ps, depth, &d_q->retention_time))
700 if (!prs_uint8("shutdown_in_progress", ps, depth, &d_q->shutdown_in_progress))
702 if (!smb_io_nttime("time_to_shutdown", ps, depth, &d_q->time_to_shutdown))
704 if (!prs_uint32("next_audit_record", ps, depth, &d_q->next_audit_record))
706 if (!prs_uint32("unknown", ps, depth, &d_q->unknown))
712 /*******************************************************************
713 reads or writes a structure.
714 ********************************************************************/
716 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
721 prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
727 if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
729 if (!prs_uint32("ptr ", ps, depth, &d_q->ptr))
731 if (!prs_uint32("count1", ps, depth, &d_q->count1))
736 if (!prs_uint32("count2", ps, depth, &d_q->count2))
739 if (d_q->count1 != d_q->count2)
742 if (UNMARSHALLING(ps)) {
743 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
744 if (!d_q->auditsettings) {
749 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
756 /*******************************************************************
757 reads or writes a dom query structure.
758 ********************************************************************/
760 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
765 prs_debug(ps, depth, desc, "lsa_io_dom_query_3");
771 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
773 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
776 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
778 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
781 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
787 if (d_q->buffer_dom_sid != 0) {
788 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
791 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
797 /*******************************************************************
798 Reads or writes a dom query structure.
799 ********************************************************************/
801 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
803 return lsa_io_dom_query_3("", d_q, ps, depth);
806 /*******************************************************************
807 Reads or writes a dom query structure.
808 ********************************************************************/
810 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
815 prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
818 if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
824 /*******************************************************************
825 Reads or writes a dom query structure.
826 ********************************************************************/
828 static BOOL lsa_io_dom_query_10(const char *desc, DOM_QUERY_10 *d_q, prs_struct *ps, int depth)
833 prs_debug(ps, depth, desc, "lsa_io_dom_query_10");
836 if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
842 /*******************************************************************
843 Reads or writes a dom query structure.
844 ********************************************************************/
846 static BOOL lsa_io_dom_query_11(const char *desc, DOM_QUERY_11 *d_q, prs_struct *ps, int depth)
851 prs_debug(ps, depth, desc, "lsa_io_dom_query_11");
854 if (!prs_uint16("unknown", ps, depth, &d_q->unknown))
856 if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
858 if (!prs_uint8("log_is_full", ps, depth, &d_q->log_is_full))
864 /*******************************************************************
865 Reads or writes an LSA_DNS_DOM_INFO structure.
866 ********************************************************************/
868 BOOL lsa_io_dom_query_12(const char *desc, DOM_QUERY_12 *info, prs_struct *ps, int depth)
870 prs_debug(ps, depth, desc, "lsa_io_dom_query_12");
875 if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
877 if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
879 if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
884 if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
889 if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
892 if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
893 info->hdr_nb_dom_name.buffer, ps, depth))
895 if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name,
896 info->hdr_dns_dom_name.buffer, ps, depth))
898 if(!smb_io_unistr2("forest", &info->uni_forest_name,
899 info->hdr_forest_name.buffer, ps, depth))
902 if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
909 /*******************************************************************
910 Inits an LSA_Q_QUERY_INFO structure.
911 ********************************************************************/
913 void init_q_set(LSA_Q_SET_INFO *in, POLICY_HND *hnd, uint16 info_class, LSA_INFO_CTR ctr)
915 DEBUG(5,("init_q_set\n"));
917 in->info_class = info_class;
922 in->ctr.info_class = info_class;
925 /*******************************************************************
926 reads or writes a structure.
927 ********************************************************************/
929 static BOOL lsa_io_query_info_ctr2(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR2 *ctr)
931 prs_debug(ps, depth, desc, "lsa_io_query_info_ctr2");
934 if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
937 switch (ctr->info_class) {
939 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
943 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
947 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
951 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
955 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
959 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
963 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
967 if(!lsa_io_dom_query_12("", &ctr->info.id12, ps, depth))
971 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
980 /*******************************************************************
981 reads or writes a structure.
982 ********************************************************************/
984 static BOOL lsa_io_query_info_ctr(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR *ctr)
986 prs_debug(ps, depth, desc, "lsa_io_query_info_ctr");
989 if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
995 switch (ctr->info_class) {
997 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
1001 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
1005 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
1009 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
1013 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
1017 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
1021 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
1025 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
1033 /*******************************************************************
1034 Reads or writes an LSA_R_QUERY_INFO structure.
1035 ********************************************************************/
1037 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
1040 prs_debug(ps, depth, desc, "lsa_io_r_query");
1046 if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
1051 if(!lsa_io_query_info_ctr("", ps, depth, &out->ctr))
1058 if(!prs_ntstatus("status", ps, depth, &out->status))
1064 /*******************************************************************
1065 Reads or writes an LSA_Q_SET_INFO structure.
1066 ********************************************************************/
1068 BOOL lsa_io_q_set(const char *desc, LSA_Q_SET_INFO *in, prs_struct *ps,
1071 prs_debug(ps, depth, desc, "lsa_io_q_set");
1077 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1080 if(!prs_uint16("info_class", ps, depth, &in->info_class))
1083 if(!lsa_io_query_info_ctr("", ps, depth, &in->ctr))
1089 /*******************************************************************
1090 Reads or writes an LSA_R_SET_INFO structure.
1091 ********************************************************************/
1093 BOOL lsa_io_r_set(const char *desc, LSA_R_SET_INFO *out, prs_struct *ps, int depth)
1095 prs_debug(ps, depth, desc, "lsa_io_r_set");
1101 if(!prs_ntstatus("status", ps, depth, &out->status))
1107 /*******************************************************************
1108 Inits a LSA_SID_ENUM structure.
1109 ********************************************************************/
1111 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen,
1112 int num_entries, const DOM_SID *sids)
1116 DEBUG(5, ("init_lsa_sid_enum\n"));
1118 sen->num_entries = num_entries;
1119 sen->ptr_sid_enum = (num_entries != 0);
1120 sen->num_entries2 = num_entries;
1122 /* Allocate memory for sids and sid pointers */
1124 if (num_entries == 0) return;
1126 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
1127 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
1131 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
1132 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
1136 /* Copy across SIDs and SID pointers */
1138 for (i = 0; i < num_entries; i++) {
1139 sen->ptr_sid[i] = 1;
1140 init_dom_sid2(&sen->sid[i], &sids[i]);
1144 /*******************************************************************
1145 Reads or writes a LSA_SID_ENUM structure.
1146 ********************************************************************/
1148 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps,
1153 prs_debug(ps, depth, desc, "lsa_io_sid_enum");
1159 if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
1161 if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
1165 if the ptr is NULL, leave here. checked from a real w2k trace.
1169 if (sen->ptr_sid_enum==0)
1172 if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
1175 /* Mallocate memory if we're unpacking from the wire */
1177 if (UNMARSHALLING(ps)) {
1178 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
1179 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1184 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
1185 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1191 for (i = 0; i < sen->num_entries; i++) {
1194 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
1195 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
1200 for (i = 0; i < sen->num_entries; i++) {
1203 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
1204 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
1212 /*******************************************************************
1213 Inits an LSA_R_ENUM_TRUST_DOM structure.
1214 ********************************************************************/
1216 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l,
1217 POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
1220 DEBUG(5, ("init_q_lookup_sids\n"));
1224 memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
1225 init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
1230 /*******************************************************************
1231 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
1232 ********************************************************************/
1234 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
1237 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
1243 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1245 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1247 if(!lsa_io_trans_names("names ", &q_s->names, ps, depth)) /* translated names */
1250 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1255 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1261 /*******************************************************************
1262 Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1263 ********************************************************************/
1265 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1268 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1274 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1276 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1278 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1281 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1286 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1288 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1290 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1296 /*******************************************************************
1297 Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1298 ********************************************************************/
1300 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1303 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1309 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1311 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1314 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1319 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1321 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1323 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1330 /*******************************************************************
1331 Reads or writes a structure.
1332 ********************************************************************/
1334 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1335 prs_struct *ps, int depth)
1339 prs_debug(ps, depth, desc, "lsa_io_trans_names");
1345 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1347 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1350 if (trn->ptr_trans_names != 0) {
1351 if(!prs_uint32("num_entries2 ", ps, depth,
1352 &trn->num_entries2))
1355 if (UNMARSHALLING(ps)) {
1356 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries)) == NULL) {
1360 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1365 for (i = 0; i < trn->num_entries2; i++) {
1367 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1369 if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1373 for (i = 0; i < trn->num_entries2; i++) {
1375 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1377 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1387 /*******************************************************************
1388 Reads or writes a structure.
1389 ********************************************************************/
1391 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1392 prs_struct *ps, int depth)
1396 prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1402 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1404 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1407 if (trn->ptr_trans_names != 0) {
1408 if(!prs_uint32("num_entries2 ", ps, depth,
1409 &trn->num_entries2))
1412 if (UNMARSHALLING(ps)) {
1413 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries)) == NULL) {
1417 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1422 for (i = 0; i < trn->num_entries2; i++) {
1424 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1426 if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1430 for (i = 0; i < trn->num_entries2; i++) {
1432 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1434 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1445 /*******************************************************************
1446 Reads or writes a structure.
1447 ********************************************************************/
1449 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s,
1450 prs_struct *ps, int depth)
1452 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1458 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1461 if (r_s->ptr_dom_ref != 0)
1462 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1465 if(!lsa_io_trans_names("names ", r_s->names, ps, depth)) /* translated names */
1471 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1474 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1480 /*******************************************************************
1481 Reads or writes a structure.
1482 ********************************************************************/
1484 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s,
1485 prs_struct *ps, int depth)
1487 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1493 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1496 if (r_s->ptr_dom_ref != 0)
1497 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1500 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1506 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1509 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1516 /*******************************************************************
1517 Reads or writes a structure.
1518 ********************************************************************/
1520 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s,
1521 prs_struct *ps, int depth)
1523 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1529 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1532 if (r_s->ptr_dom_ref != 0)
1533 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1536 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1542 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1545 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1551 /*******************************************************************
1553 ********************************************************************/
1555 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l,
1556 POLICY_HND *hnd, int num_names, const char **names)
1560 DEBUG(5, ("init_q_lookup_names\n"));
1565 q_l->num_entries = num_names;
1566 q_l->num_entries2 = num_names;
1567 q_l->lookup_level = 1;
1569 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1570 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1574 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1575 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1579 for (i = 0; i < num_names; i++) {
1580 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1581 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1585 /*******************************************************************
1586 reads or writes a structure.
1587 ********************************************************************/
1589 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r,
1590 prs_struct *ps, int depth)
1594 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1600 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1605 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1607 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1610 if (UNMARSHALLING(ps)) {
1611 if (q_r->num_entries) {
1612 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1614 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1619 for (i = 0; i < q_r->num_entries; i++) {
1622 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1626 for (i = 0; i < q_r->num_entries; i++) {
1629 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1635 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1637 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1639 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1643 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1649 /*******************************************************************
1650 reads or writes a structure.
1651 ********************************************************************/
1653 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1657 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1663 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1666 if (out->ptr_dom_ref != 0)
1667 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1670 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1672 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1675 if (out->ptr_entries != 0) {
1676 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1679 if (out->num_entries2 != out->num_entries) {
1684 if (UNMARSHALLING(ps)) {
1685 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1687 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1692 for (i = 0; i < out->num_entries2; i++)
1693 if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1697 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1700 if(!prs_ntstatus("status ", ps, depth, &out->status))
1706 /*******************************************************************
1707 reads or writes a structure.
1708 ********************************************************************/
1710 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r,
1711 prs_struct *ps, int depth)
1715 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1721 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1726 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1728 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1731 if (UNMARSHALLING(ps)) {
1732 if (q_r->num_entries) {
1733 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1735 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1740 for (i = 0; i < q_r->num_entries; i++) {
1743 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1747 for (i = 0; i < q_r->num_entries; i++) {
1750 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1756 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1758 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1760 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1764 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1766 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1768 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1774 /*******************************************************************
1775 reads or writes a structure.
1776 ********************************************************************/
1778 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1782 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1788 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1791 if (out->ptr_dom_ref != 0)
1792 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1795 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1797 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1800 if (out->ptr_entries != 0) {
1801 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1804 if (out->num_entries2 != out->num_entries) {
1809 if (UNMARSHALLING(ps)) {
1810 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1812 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1817 for (i = 0; i < out->num_entries2; i++)
1818 if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1822 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1825 if(!prs_ntstatus("status ", ps, depth, &out->status))
1831 /*******************************************************************
1832 Internal lsa data type io.
1833 Following pass must read DOM_SID2 types.
1834 ********************************************************************/
1836 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r,
1837 prs_struct *ps, int depth)
1839 prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1844 if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1848 /* Second pass will read/write these. */
1849 if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1851 if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1853 if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1859 /*******************************************************************
1860 Identical to lsa_io_q_lookup_names2.
1861 ********************************************************************/
1863 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r,
1864 prs_struct *ps, int depth)
1868 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1874 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1879 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1881 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1884 if (UNMARSHALLING(ps)) {
1885 if (q_r->num_entries) {
1886 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1888 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1893 for (i = 0; i < q_r->num_entries; i++) {
1896 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1900 for (i = 0; i < q_r->num_entries; i++) {
1903 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1909 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1911 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1913 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1917 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1919 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1921 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1927 /*******************************************************************
1928 reads or writes a structure.
1929 ********************************************************************/
1931 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1935 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1941 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1944 if (out->ptr_dom_ref != 0)
1945 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1948 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1950 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1953 if (out->ptr_entries != 0) {
1954 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1957 if (out->num_entries2 != out->num_entries) {
1962 if (UNMARSHALLING(ps)) {
1963 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1965 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1970 for (i = 0; i < out->num_entries2; i++) {
1971 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1975 /* Now process the DOM_SID2 entries. */
1976 for (i = 0; i < out->num_entries2; i++) {
1977 if (out->trans_sids[i].sid2) {
1978 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1985 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1988 if(!prs_ntstatus("status ", ps, depth, &out->status))
1994 /*******************************************************************
1995 ********************************************************************/
1997 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r,
1998 prs_struct *ps, int depth)
2002 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names4");
2008 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
2010 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
2013 if (UNMARSHALLING(ps)) {
2014 if (q_r->num_entries) {
2015 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
2017 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
2022 for (i = 0; i < q_r->num_entries; i++) {
2025 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
2029 for (i = 0; i < q_r->num_entries; i++) {
2032 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
2038 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
2040 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
2042 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
2046 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
2048 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
2050 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
2056 /*******************************************************************
2057 Identical to lsa_io_r_lookup_names3.
2058 ********************************************************************/
2060 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
2064 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
2070 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
2073 if (out->ptr_dom_ref != 0)
2074 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
2077 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
2079 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
2082 if (out->ptr_entries != 0) {
2083 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
2086 if (out->num_entries2 != out->num_entries) {
2091 if (UNMARSHALLING(ps)) {
2092 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
2094 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
2099 for (i = 0; i < out->num_entries2; i++) {
2100 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
2104 /* Now process the DOM_SID2 entries. */
2105 for (i = 0; i < out->num_entries2; i++) {
2106 if (out->trans_sids[i].sid2) {
2107 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
2114 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2117 if(!prs_ntstatus("status ", ps, depth, &out->status))
2123 /*******************************************************************
2124 Inits an LSA_Q_CLOSE structure.
2125 ********************************************************************/
2127 void init_lsa_q_close(LSA_Q_CLOSE *in, POLICY_HND *hnd)
2129 DEBUG(5, ("init_lsa_q_close\n"));
2131 memcpy(&in->pol, hnd, sizeof(in->pol));
2134 /*******************************************************************
2135 Reads or writes an LSA_Q_CLOSE structure.
2136 ********************************************************************/
2138 BOOL lsa_io_q_close(const char *desc, LSA_Q_CLOSE *in, prs_struct *ps, int depth)
2140 prs_debug(ps, depth, desc, "lsa_io_q_close");
2143 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
2149 /*******************************************************************
2150 Reads or writes an LSA_R_CLOSE structure.
2151 ********************************************************************/
2153 BOOL lsa_io_r_close(const char *desc, LSA_R_CLOSE *out, prs_struct *ps, int depth)
2155 prs_debug(ps, depth, desc, "lsa_io_r_close");
2158 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
2161 if(!prs_ntstatus("status", ps, depth, &out->status))
2167 /*******************************************************************
2168 Reads or writes an LSA_Q_OPEN_SECRET structure.
2169 ********************************************************************/
2171 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
2173 prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
2179 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
2182 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
2187 if(!prs_uint32("access", ps, depth, &in->access))
2193 /*******************************************************************
2194 Reads or writes an LSA_R_OPEN_SECRET structure.
2195 ********************************************************************/
2197 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
2199 prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
2205 if(!smb_io_pol_hnd("", &out->handle, ps, depth))
2208 if(!prs_ntstatus("status", ps, depth, &out->status))
2214 /*******************************************************************
2215 Inits an LSA_Q_ENUM_PRIVS structure.
2216 ********************************************************************/
2218 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2220 DEBUG(5, ("init_q_enum_privs\n"));
2222 memcpy(&in->pol, hnd, sizeof(in->pol));
2224 in->enum_context = enum_context;
2225 in->pref_max_length = pref_max_length;
2228 /*******************************************************************
2229 reads or writes a structure.
2230 ********************************************************************/
2231 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
2236 prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
2239 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2242 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2244 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2250 /*******************************************************************
2251 reads or writes a structure.
2252 ********************************************************************/
2253 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
2257 if (entries == NULL)
2260 prs_debug(ps, depth, desc, "lsa_io_priv_entries");
2266 for (i = 0; i < count; i++) {
2267 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2269 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2271 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2275 for (i = 0; i < count; i++)
2276 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2282 /*******************************************************************
2283 Inits an LSA_R_ENUM_PRIVS structure.
2284 ********************************************************************/
2286 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2287 uint32 count, LSA_PRIV_ENTRY *entries)
2289 DEBUG(5, ("init_lsa_r_enum_privs\n"));
2291 out->enum_context=enum_context;
2294 if (entries!=NULL) {
2305 /*******************************************************************
2306 reads or writes a structure.
2307 ********************************************************************/
2308 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2313 prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2319 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2321 if(!prs_uint32("count", ps, depth, &out->count))
2323 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2327 if(!prs_uint32("count1", ps, depth, &out->count1))
2330 if (UNMARSHALLING(ps))
2331 if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2334 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2341 if(!prs_ntstatus("status", ps, depth, &out->status))
2347 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2349 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2351 init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2352 init_uni_hdr(&trn->hdr_name, &trn->name);
2353 trn->lang_id = lang_id;
2354 trn->lang_id_sys = lang_id_sys;
2357 /*******************************************************************
2358 reads or writes a structure.
2359 ********************************************************************/
2360 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2365 prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2371 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2374 if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2377 if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2380 if(!prs_uint16("lang_id ", ps, depth, &in->lang_id))
2382 if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2388 /*******************************************************************
2389 reads or writes a structure.
2390 ********************************************************************/
2391 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2396 prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2402 if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2406 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2409 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2416 if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2421 if(!prs_ntstatus("status", ps, depth, &out->status))
2428 initialise a LSA_Q_ENUM_ACCOUNTS structure
2430 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2432 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2434 trn->enum_context = enum_context;
2435 trn->pref_max_length = pref_max_length;
2438 /*******************************************************************
2439 reads or writes a structure.
2440 ********************************************************************/
2441 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2446 prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2449 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2452 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2454 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2461 /*******************************************************************
2462 Inits an LSA_R_ENUM_PRIVS structure.
2463 ********************************************************************/
2465 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2467 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2469 out->enum_context=enum_context;
2470 if (out->enum_context!=0) {
2471 out->sids.num_entries=enum_context;
2472 out->sids.ptr_sid_enum=1;
2473 out->sids.num_entries2=enum_context;
2475 out->sids.num_entries=0;
2476 out->sids.ptr_sid_enum=0;
2477 out->sids.num_entries2=0;
2481 /*******************************************************************
2482 reads or writes a structure.
2483 ********************************************************************/
2484 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2489 prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2495 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2498 if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2504 if(!prs_ntstatus("status", ps, depth, &out->status))
2511 /*******************************************************************
2512 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2513 ********************************************************************/
2515 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2517 prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2523 if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2526 if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2532 if(!prs_uint32("unk1", ps, depth, &in->unk1))
2534 if(!prs_uint32("unk2", ps, depth, &in->unk2))
2536 if(!prs_uint32("unk3", ps, depth, &in->unk3))
2539 /* Don't bother to read or write at present... */
2543 /*******************************************************************
2544 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2545 ********************************************************************/
2547 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2549 prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2555 if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2557 if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2559 if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2565 if(!prs_uint32("unk1", ps, depth, &out->unk1))
2568 if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2570 if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2572 if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2578 if(!prs_ntstatus("status", ps, depth, &out->status))
2584 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2586 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2588 init_dom_sid2(&trn->sid, sid);
2589 trn->access = desired_access;
2593 /*******************************************************************
2594 Reads or writes an LSA_Q_CREATEACCOUNT structure.
2595 ********************************************************************/
2597 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2599 prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2605 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2608 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2611 if(!prs_uint32("access", ps, depth, &out->access))
2617 /*******************************************************************
2618 Reads or writes an LSA_R_CREATEACCOUNT structure.
2619 ********************************************************************/
2621 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT *out, prs_struct *ps, int depth)
2623 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2629 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2632 if(!prs_ntstatus("status", ps, depth, &out->status))
2639 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2641 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2643 init_dom_sid2(&trn->sid, sid);
2644 trn->access = desired_access;
2647 /*******************************************************************
2648 Reads or writes an LSA_Q_OPENACCOUNT structure.
2649 ********************************************************************/
2651 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2653 prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2659 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2662 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2665 if(!prs_uint32("access", ps, depth, &out->access))
2671 /*******************************************************************
2672 Reads or writes an LSA_R_OPENACCOUNT structure.
2673 ********************************************************************/
2675 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT *out, prs_struct *ps, int depth)
2677 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2683 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2686 if(!prs_ntstatus("status", ps, depth, &out->status))
2693 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2695 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2699 /*******************************************************************
2700 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2701 ********************************************************************/
2703 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2705 prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2711 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2717 /*******************************************************************
2718 Reads or writes an LUID structure.
2719 ********************************************************************/
2721 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2723 prs_debug(ps, depth, desc, "lsa_io_luid");
2729 if(!prs_uint32("low", ps, depth, &out->low))
2732 if(!prs_uint32("high", ps, depth, &out->high))
2738 /*******************************************************************
2739 Reads or writes an LUID_ATTR structure.
2740 ********************************************************************/
2742 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2744 prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2750 if (!lsa_io_luid(desc, &out->luid, ps, depth))
2753 if(!prs_uint32("attr", ps, depth, &out->attr))
2759 /*******************************************************************
2760 Reads or writes an PRIVILEGE_SET structure.
2761 ********************************************************************/
2763 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2767 prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2773 if(!prs_uint32("count", ps, depth, &out->count))
2775 if(!prs_uint32("control", ps, depth, &out->control))
2778 for (i=0; i<out->count; i++) {
2779 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2786 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2788 NTSTATUS ret = NT_STATUS_OK;
2793 if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2796 out->set.count = count;
2798 if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2801 DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2806 /*******************************************************************
2807 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2808 ********************************************************************/
2810 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2812 prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2818 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2822 if(!prs_uint32("count", ps, depth, &out->count))
2825 /* malloc memory if unmarshalling here */
2827 if (UNMARSHALLING(ps) && out->count != 0) {
2828 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2831 if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2836 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2840 if(!prs_ntstatus("status", ps, depth, &out->status))
2848 /*******************************************************************
2849 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
2850 ********************************************************************/
2852 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2854 prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2860 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2866 /*******************************************************************
2867 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
2868 ********************************************************************/
2870 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2872 prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2878 if(!prs_uint32("access", ps, depth, &out->access))
2881 if(!prs_ntstatus("status", ps, depth, &out->status))
2888 /*******************************************************************
2889 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2890 ********************************************************************/
2892 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2894 prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2900 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2903 if(!prs_uint32("access", ps, depth, &out->access))
2909 /*******************************************************************
2910 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2911 ********************************************************************/
2913 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2915 prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2921 if(!prs_ntstatus("status", ps, depth, &out->status))
2928 void init_lsa_string( LSA_STRING *uni, const char *string )
2930 init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2931 init_uni_hdr(&uni->hdr, &uni->unistring);
2934 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2936 memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2937 init_lsa_string( &q_u->privname, name );
2940 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2942 prs_debug(ps, depth, desc, "smb_io_lsa_string");
2945 if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2947 if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2953 /*******************************************************************
2954 Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE structure.
2955 ********************************************************************/
2957 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2959 prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2965 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2967 if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2973 /*******************************************************************
2974 Reads or writes an LSA_R_LOOKUP_PRIV_VALUE structure.
2975 ********************************************************************/
2977 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2979 prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2985 if(!lsa_io_luid("luid", &out->luid, ps, depth))
2988 if(!prs_ntstatus("status", ps, depth, &out->status))
2995 /*******************************************************************
2996 Reads or writes an LSA_Q_ADDPRIVS structure.
2997 ********************************************************************/
2999 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
3001 prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
3007 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3010 if(!prs_uint32("count", ps, depth, &out->count))
3013 if (UNMARSHALLING(ps) && out->count!=0) {
3014 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3017 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3021 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3027 /*******************************************************************
3028 Reads or writes an LSA_R_ADDPRIVS structure.
3029 ********************************************************************/
3031 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
3033 prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
3039 if(!prs_ntstatus("status", ps, depth, &out->status))
3045 /*******************************************************************
3046 Reads or writes an LSA_Q_REMOVEPRIVS structure.
3047 ********************************************************************/
3049 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
3051 prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
3057 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3060 if(!prs_uint32("allrights", ps, depth, &out->allrights))
3063 if(!prs_uint32("ptr", ps, depth, &out->ptr))
3067 * JFM: I'm not sure at all if the count is inside the ptr
3068 * never seen one with ptr=0
3072 if(!prs_uint32("count", ps, depth, &out->count))
3075 if (UNMARSHALLING(ps) && out->count!=0) {
3076 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3079 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3083 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3090 /*******************************************************************
3091 Reads or writes an LSA_R_REMOVEPRIVS structure.
3092 ********************************************************************/
3094 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
3096 prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
3102 if(!prs_ntstatus("status", ps, depth, &out->status))
3108 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
3110 POLICY_HND zero_pol;
3112 ZERO_STRUCT(zero_pol);
3113 return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
3116 /*******************************************************************
3117 Inits an LSA_Q_QUERY_INFO2 structure.
3118 ********************************************************************/
3120 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
3122 DEBUG(5, ("init_q_query2\n"));
3124 memcpy(&in->pol, hnd, sizeof(in->pol));
3126 in->info_class = info_class;
3129 /*******************************************************************
3130 Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
3131 ********************************************************************/
3133 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
3135 prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
3141 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3144 if(!prs_uint16("info_class", ps, depth, &in->info_class))
3150 /*******************************************************************
3151 Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
3152 ********************************************************************/
3154 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
3155 prs_struct *ps, int depth)
3157 prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
3163 if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
3168 if(!lsa_io_query_info_ctr2("", ps, depth, &out->ctr))
3174 if(!prs_ntstatus("status", ps, depth, &out->status))
3180 /*******************************************************************
3181 Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
3182 ********************************************************************/
3183 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in,
3188 DEBUG(5, ("init_q_enum_acct_rights\n"));
3191 init_dom_sid2(&in->sid, sid);
3194 /*******************************************************************
3195 ********************************************************************/
3196 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
3200 const char **privname_array = NULL;
3203 for ( i=0; i<privileges->count; i++ ) {
3204 privname = luid_to_privilege_name( &privileges->set[i].luid );
3206 if ( !add_string_to_array( get_talloc_ctx(), privname, &privname_array, &num_priv ) )
3207 return NT_STATUS_NO_MEMORY;
3212 out->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3214 return NT_STATUS_NO_MEMORY;
3217 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) )
3218 return NT_STATUS_NO_MEMORY;
3220 out->count = num_priv;
3223 return NT_STATUS_OK;
3226 /*******************************************************************
3227 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3228 ********************************************************************/
3229 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3235 prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3238 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3241 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3248 /*******************************************************************
3249 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3250 ********************************************************************/
3251 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3253 prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3256 if(!prs_uint32("count ", ps, depth, &out->count))
3259 if ( !prs_pointer("rights", ps, depth, (void*)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3265 if(!prs_ntstatus("status", ps, depth, &out->status))
3272 /*******************************************************************
3273 Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3274 ********************************************************************/
3275 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd,
3276 DOM_SID *sid, uint32 count, const char **rights )
3278 DEBUG(5, ("init_q_add_acct_rights\n"));
3281 init_dom_sid2(&in->sid, sid);
3283 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3285 smb_panic("init_q_add_acct_rights: talloc fail\n");
3288 init_unistr4_array( in->rights, count, rights );
3294 /*******************************************************************
3295 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3296 ********************************************************************/
3297 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3299 prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3302 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3305 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3308 if(!prs_uint32("count", ps, depth, &in->count))
3311 if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3317 /*******************************************************************
3318 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3319 ********************************************************************/
3320 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3322 prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3325 if(!prs_ntstatus("status", ps, depth, &out->status))
3331 /*******************************************************************
3332 Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3333 ********************************************************************/
3335 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in,
3340 const char **rights)
3342 DEBUG(5, ("init_q_remove_acct_rights\n"));
3346 init_dom_sid2(&in->sid, sid);
3348 in->removeall = removeall;
3351 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3353 smb_panic("init_q_remove_acct_rights: talloc fail\n");
3356 init_unistr4_array( in->rights, count, rights );
3359 /*******************************************************************
3360 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3361 ********************************************************************/
3363 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3365 prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3368 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3371 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3374 if(!prs_uint32("removeall", ps, depth, &in->removeall))
3377 if(!prs_uint32("count", ps, depth, &in->count))
3380 if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3386 /*******************************************************************
3387 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3388 ********************************************************************/
3389 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3391 prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3394 if(!prs_ntstatus("status", ps, depth, &out->status))
3400 /*******************************************************************
3401 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3402 ********************************************************************/
3404 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3406 memcpy(&q->pol, hnd, sizeof(q->pol));
3408 init_dom_sid2(&q->sid, sid);
3409 q->access_mask = desired_access;
3412 /*******************************************************************
3413 ********************************************************************/
3415 #if 0 /* jerry, I think this not correct - gd */
3416 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3418 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3424 if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3427 if(!prs_uint32("count", ps, depth, &in->count))
3430 if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3438 /*******************************************************************
3439 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3440 ********************************************************************/
3442 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q,
3445 uint32 desired_access)
3447 memcpy(&q->pol, hnd, sizeof(q->pol));
3449 init_lsa_string(&q->name, name);
3450 q->access_mask = desired_access;
3453 /*******************************************************************
3454 ********************************************************************/
3457 /*******************************************************************
3458 Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3459 ********************************************************************/
3461 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3463 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3469 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3475 if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3481 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3487 /*******************************************************************
3488 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3489 ********************************************************************/
3491 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3493 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3499 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3502 if(!prs_ntstatus("status", ps, depth, &out->status))
3508 /*******************************************************************
3509 ********************************************************************/
3511 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3513 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3519 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3522 if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3525 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3531 /*******************************************************************
3532 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3533 ********************************************************************/
3535 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3537 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3543 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3546 if(!prs_ntstatus("status", ps, depth, &out->status))
3552 /*******************************************************************
3553 ********************************************************************/
3555 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3557 prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3563 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3566 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3571 if(!prs_uint32("access", ps, depth, &in->access))
3577 /*******************************************************************
3578 ********************************************************************/
3580 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3582 prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3588 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3591 if(!prs_ntstatus("status", ps, depth, &out->status))
3597 /*******************************************************************
3598 ********************************************************************/
3600 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3602 prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3608 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3611 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3616 if(!prs_uint32("access", ps, depth, &in->access))
3622 /*******************************************************************
3623 ********************************************************************/
3625 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3627 prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3633 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3636 if(!prs_ntstatus("status", ps, depth, &out->status))
3644 /*******************************************************************
3645 ********************************************************************/
3647 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3649 prs_debug(ps, depth, desc, "lsa_io_data_blob");
3652 if ( !prs_uint32("size", ps, depth, &blob->size) )
3654 if ( !prs_uint32("size", ps, depth, &blob->size) )
3657 if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3663 /*******************************************************************
3664 ********************************************************************/
3666 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3668 prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3671 if ( !prs_align(ps) )
3674 if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3677 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3680 if( !prs_align(ps) )
3682 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3689 /*******************************************************************
3690 ********************************************************************/
3692 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3694 prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3697 if(!prs_ntstatus("status", ps, depth, &out->status))
3703 /*******************************************************************
3704 ********************************************************************/
3706 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3708 prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3714 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3720 /*******************************************************************
3721 ********************************************************************/
3723 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3725 prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3728 if(!prs_ntstatus("status", ps, depth, &out->status))
3734 /*******************************************************************
3735 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3736 ********************************************************************/
3738 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q,
3739 POLICY_HND *hnd, uint16 info_class)
3741 DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3744 q->info_class = info_class;
3747 /*******************************************************************
3748 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3749 ********************************************************************/
3751 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q,
3752 POLICY_HND *hnd, uint16 info_class,
3753 const char *dom_name)
3755 DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3758 init_lsa_string(&q->domain_name, dom_name );
3759 q->info_class = info_class;
3762 /*******************************************************************
3763 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3764 ********************************************************************/
3766 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q,
3767 POLICY_HND *hnd, uint16 info_class,
3770 DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3773 init_dom_sid2(&q->dom_sid, dom_sid);
3774 q->info_class = info_class;
3777 /*******************************************************************
3778 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3779 ********************************************************************/
3781 BOOL lsa_io_q_query_trusted_domain_info(const char *desc,
3782 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3783 prs_struct *ps, int depth)
3785 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3791 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3794 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3801 /*******************************************************************
3802 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3803 ********************************************************************/
3805 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc,
3806 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3807 prs_struct *ps, int depth)
3809 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3815 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3821 if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3824 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3830 /*******************************************************************
3831 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3832 ********************************************************************/
3834 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc,
3835 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3836 prs_struct *ps, int depth)
3838 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3844 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3850 if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3853 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3859 /*******************************************************************
3860 ********************************************************************/
3862 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr,
3863 prs_struct *ps, int depth)
3865 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3871 if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3874 if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3877 if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3883 /*******************************************************************
3884 ********************************************************************/
3886 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf,
3887 prs_struct *ps, int depth, int length, int size)
3889 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3892 if ( UNMARSHALLING(ps) ) {
3893 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3897 if (!prs_uint32("size", ps, depth, &buf->size))
3900 if (!prs_uint32("offset", ps, depth, &buf->offset))
3903 if (!prs_uint32("length", ps, depth, &buf->length))
3906 if(!prs_uint8s(False, "data", ps, depth, buf->data, size))
3912 /*******************************************************************
3913 ********************************************************************/
3915 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name,
3916 prs_struct *ps, int depth)
3918 if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3924 /*******************************************************************
3925 ********************************************************************/
3927 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix,
3928 prs_struct *ps, int depth)
3930 if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3936 /*******************************************************************
3937 ********************************************************************/
3939 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password,
3940 prs_struct *ps, int depth)
3945 if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3948 if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3951 if (&password->ptr_password) {
3953 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3956 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth,
3957 password->password_hdr.length, password->password_hdr.size))
3961 if (&password->ptr_old_password) {
3963 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3966 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth,
3967 password->old_password_hdr.length, password->old_password_hdr.size))
3974 /*******************************************************************
3975 ********************************************************************/
3977 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex,
3978 prs_struct *ps, int depth)
3982 if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
3985 if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
3988 if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
3991 if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
3994 if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
3997 if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
4000 if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
4003 if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
4006 if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
4012 /*******************************************************************
4013 ********************************************************************/
4015 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
4017 prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
4020 if(!prs_uint16("info_class", ps, depth, &info->info_class))
4026 switch (info->info_class) {
4028 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
4032 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
4036 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
4040 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
4044 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4051 /*******************************************************************
4052 Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
4053 ********************************************************************/
4055 BOOL lsa_io_r_query_trusted_domain_info(const char *desc,
4056 LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q,
4057 prs_struct *ps, int depth)
4062 prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
4065 if (!prs_pointer("trustdom", ps, depth, (void*)&r_q->info,
4066 sizeof(LSA_TRUSTED_DOMAIN_INFO),
4067 (PRS_POINTER_CAST)lsa_io_trustdom_query) )
4073 if(!prs_ntstatus("status", ps, depth, &r_q->status))
4079 /*******************************************************************
4080 Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4081 ********************************************************************/
4083 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
4085 DEBUG(5, ("init_q_query_dom_info\n"));
4087 memcpy(&in->pol, hnd, sizeof(in->pol));
4089 in->info_class = info_class;
4092 /*******************************************************************
4093 Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4094 ********************************************************************/
4096 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
4098 prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
4104 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
4107 if(!prs_uint16("info_class", ps, depth, &in->info_class))
4113 /*******************************************************************
4114 Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
4115 ********************************************************************/
4117 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy,
4118 prs_struct *ps, int depth)
4120 if (!prs_align_uint64(ps))
4126 if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
4129 if (!prs_align_uint64(ps))
4132 if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
4135 if (!prs_align_uint64(ps))
4138 if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
4141 if (!prs_align_uint64(ps))
4144 if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
4147 if (!prs_align_uint64(ps))
4150 if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
4153 if (!prs_align_uint64(ps))
4156 if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
4162 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
4164 prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
4167 if(!prs_align_uint16(ps))
4170 if(!prs_uint16("info_class", ps, depth, &info->info_class))
4173 switch (info->info_class) {
4175 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
4179 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4188 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
4189 prs_struct *ps, int depth)
4191 prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
4194 if (!prs_pointer("dominfo", ps, depth, (void*)&out->info,
4195 sizeof(LSA_DOM_INFO_UNION),
4196 (PRS_POINTER_CAST)lsa_io_dom_info_query) )
4199 if(!prs_ntstatus("status", ps, depth, &out->status))