2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997.
7 * Copyright (C) Gerald (Jerry) Carter 2005
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, see <http://www.gnu.org/licenses/>.
26 #define DBGC_CLASS DBGC_RPC_PARSE
28 /*******************************************************************
29 Reads or writes a UTIME type.
30 ********************************************************************/
32 static bool smb_io_utime(const char *desc, UTIME *t, prs_struct *ps, int depth)
37 prs_debug(ps, depth, desc, "smb_io_utime");
43 if(!prs_uint32 ("time", ps, depth, &t->time))
49 /*******************************************************************
50 Reads or writes an NTTIME structure.
51 ********************************************************************/
53 bool smb_io_time(const char *desc, NTTIME *nttime, prs_struct *ps, int depth)
59 prs_debug(ps, depth, desc, "smb_io_time");
65 if (MARSHALLING(ps)) {
66 low = *nttime & 0xFFFFFFFF;
70 if(!prs_uint32("low ", ps, depth, &low)) /* low part */
72 if(!prs_uint32("high", ps, depth, &high)) /* high part */
75 if (UNMARSHALLING(ps)) {
76 *nttime = (((uint64_t)high << 32) + low);
82 /*******************************************************************
83 Reads or writes an NTTIME structure.
84 ********************************************************************/
86 bool smb_io_nttime(const char *desc, prs_struct *ps, int depth, NTTIME *nttime)
88 return smb_io_time( desc, nttime, ps, depth );
91 /*******************************************************************
92 Gets an enumeration handle from an ENUM_HND structure.
93 ********************************************************************/
95 uint32 get_enum_hnd(ENUM_HND *enh)
97 return (enh && enh->ptr_hnd != 0) ? enh->handle : 0;
100 /*******************************************************************
101 Inits an ENUM_HND structure.
102 ********************************************************************/
104 void init_enum_hnd(ENUM_HND *enh, uint32 hnd)
106 DEBUG(5,("smb_io_enum_hnd\n"));
108 enh->ptr_hnd = (hnd != 0) ? 1 : 0;
112 /*******************************************************************
113 Reads or writes an ENUM_HND structure.
114 ********************************************************************/
116 bool smb_io_enum_hnd(const char *desc, ENUM_HND *hnd, prs_struct *ps, int depth)
121 prs_debug(ps, depth, desc, "smb_io_enum_hnd");
127 if(!prs_uint32("ptr_hnd", ps, depth, &hnd->ptr_hnd)) /* pointer */
130 if (hnd->ptr_hnd != 0) {
131 if(!prs_uint32("handle ", ps, depth, &hnd->handle )) /* enum handle */
138 /*******************************************************************
139 Reads or writes a DOM_SID structure.
140 ********************************************************************/
142 bool smb_io_dom_sid(const char *desc, DOM_SID *sid, prs_struct *ps, int depth)
149 prs_debug(ps, depth, desc, "smb_io_dom_sid");
152 if(!prs_uint8 ("sid_rev_num", ps, depth, &sid->sid_rev_num))
155 if(!prs_uint8 ("num_auths ", ps, depth, &sid->num_auths))
158 for (i = 0; i < 6; i++)
161 slprintf(tmp, sizeof(tmp) - 1, "id_auth[%d] ", i);
162 if(!prs_uint8 (tmp, ps, depth, &sid->id_auth[i]))
166 /* oops! XXXX should really issue a warning here... */
167 if (sid->num_auths > MAXSUBAUTHS)
168 sid->num_auths = MAXSUBAUTHS;
170 if(!prs_uint32s(False, "sub_auths ", ps, depth, sid->sub_auths, sid->num_auths))
176 /*******************************************************************
177 Inits a DOM_SID2 structure.
178 ********************************************************************/
180 void init_dom_sid2(DOM_SID2 *sid2, const DOM_SID *sid)
183 sid2->num_auths = sid2->sid.num_auths;
186 /*******************************************************************
187 Reads or writes a DOM_SID2 structure.
188 ********************************************************************/
190 bool smb_io_dom_sid2_p(const char *desc, prs_struct *ps, int depth, DOM_SID2 **sid2)
194 /* caputure the pointer value to stream */
196 data_p = *sid2 ? 0xf000baaa : 0;
198 if ( !prs_uint32("dom_sid2_p", ps, depth, &data_p ))
201 /* we're done if there is no data */
206 if (UNMARSHALLING(ps)) {
207 if ( !(*sid2 = PRS_ALLOC_MEM(ps, DOM_SID2, 1)) )
213 /*******************************************************************
214 Reads or writes a DOM_SID2 structure.
215 ********************************************************************/
217 bool smb_io_dom_sid2(const char *desc, DOM_SID2 *sid, prs_struct *ps, int depth)
222 prs_debug(ps, depth, desc, "smb_io_dom_sid2");
228 if(!prs_uint32("num_auths", ps, depth, &sid->num_auths))
231 if(!smb_io_dom_sid("sid", &sid->sid, ps, depth))
237 /*******************************************************************
238 Reads or writes a struct GUID
239 ********************************************************************/
241 bool smb_io_uuid(const char *desc, struct GUID *uuid,
242 prs_struct *ps, int depth)
247 prs_debug(ps, depth, desc, "smb_io_uuid");
250 if(!prs_uint32 ("data ", ps, depth, &uuid->time_low))
252 if(!prs_uint16 ("data ", ps, depth, &uuid->time_mid))
254 if(!prs_uint16 ("data ", ps, depth, &uuid->time_hi_and_version))
257 if(!prs_uint8s (False, "data ", ps, depth, uuid->clock_seq, sizeof(uuid->clock_seq)))
259 if(!prs_uint8s (False, "data ", ps, depth, uuid->node, sizeof(uuid->node)))
265 /*******************************************************************
266 creates a STRHDR structure.
267 ********************************************************************/
269 void init_str_hdr(STRHDR *hdr, int max_len, int len, uint32 buffer)
271 hdr->str_max_len = max_len;
272 hdr->str_str_len = len;
273 hdr->buffer = buffer;
276 /*******************************************************************
277 Reads or writes a STRHDR structure.
278 ********************************************************************/
280 bool smb_io_strhdr(const char *desc, STRHDR *hdr, prs_struct *ps, int depth)
285 prs_debug(ps, depth, desc, "smb_io_strhdr");
290 if(!prs_uint16("str_str_len", ps, depth, &hdr->str_str_len))
292 if(!prs_uint16("str_max_len", ps, depth, &hdr->str_max_len))
294 if(!prs_uint32("buffer ", ps, depth, &hdr->buffer))
300 /*******************************************************************
301 Inits a UNIHDR structure.
302 ********************************************************************/
304 void init_uni_hdr(UNIHDR *hdr, UNISTR2 *str2)
306 hdr->uni_str_len = 2 * (str2->uni_str_len);
307 hdr->uni_max_len = 2 * (str2->uni_max_len);
308 hdr->buffer = (str2->uni_str_len != 0) ? 1 : 0;
311 /*******************************************************************
312 Reads or writes a UNIHDR structure.
313 ********************************************************************/
315 bool smb_io_unihdr(const char *desc, UNIHDR *hdr, prs_struct *ps, int depth)
320 prs_debug(ps, depth, desc, "smb_io_unihdr");
326 if(!prs_uint16("uni_str_len", ps, depth, &hdr->uni_str_len))
328 if(!prs_uint16("uni_max_len", ps, depth, &hdr->uni_max_len))
330 if(!prs_uint32("buffer ", ps, depth, &hdr->buffer))
336 /*******************************************************************
337 Inits a BUFHDR structure.
338 ********************************************************************/
340 void init_buf_hdr(BUFHDR *hdr, int max_len, int len)
342 hdr->buf_max_len = max_len;
346 /*******************************************************************
347 prs_uint16 wrapper. Call this and it sets up a pointer to where the
348 uint16 should be stored, or gets the size if reading.
349 ********************************************************************/
351 bool smb_io_hdrbuf_pre(const char *desc, BUFHDR *hdr, prs_struct *ps, int depth, uint32 *offset)
353 (*offset) = prs_offset(ps);
358 if(!smb_io_hdrbuf(desc, hdr, ps, depth))
365 if(!prs_set_offset(ps, prs_offset(ps) + (sizeof(uint32) * 2)))
372 /*******************************************************************
373 smb_io_hdrbuf wrapper. Call this and it retrospectively stores the size.
374 Does nothing on reading, as that is already handled by ...._pre()
375 ********************************************************************/
377 bool smb_io_hdrbuf_post(const char *desc, BUFHDR *hdr, prs_struct *ps, int depth,
378 uint32 ptr_hdrbuf, uint32 max_len, uint32 len)
381 /* writing: go back and do a retrospective job. i hate this */
383 uint32 old_offset = prs_offset(ps);
385 init_buf_hdr(hdr, max_len, len);
386 if(!prs_set_offset(ps, ptr_hdrbuf))
388 if(!smb_io_hdrbuf(desc, hdr, ps, depth))
391 if(!prs_set_offset(ps, old_offset))
398 /*******************************************************************
399 Reads or writes a BUFHDR structure.
400 ********************************************************************/
402 bool smb_io_hdrbuf(const char *desc, BUFHDR *hdr, prs_struct *ps, int depth)
407 prs_debug(ps, depth, desc, "smb_io_hdrbuf");
413 if(!prs_uint32("buf_max_len", ps, depth, &hdr->buf_max_len))
415 if(!prs_uint32("buf_len ", ps, depth, &hdr->buf_len))
421 /*******************************************************************
422 Inits a UNISTR structure.
423 ********************************************************************/
425 void init_unistr(UNISTR *str, const char *buf)
434 len = rpcstr_push_talloc(talloc_tos(), &str->buffer, buf);
435 if (len == (size_t)-1) {
440 /*******************************************************************
441 reads or writes a UNISTR structure.
442 XXXX NOTE: UNISTR structures NEED to be null-terminated.
443 ********************************************************************/
445 bool smb_io_unistr(const char *desc, UNISTR *uni, prs_struct *ps, int depth)
450 prs_debug(ps, depth, desc, "smb_io_unistr");
453 if(!prs_unistr("unistr", ps, depth, uni))
459 /*******************************************************************
460 Allocate the RPC_DATA_BLOB memory.
461 ********************************************************************/
463 static void create_rpc_blob(RPC_DATA_BLOB *str, size_t len)
466 str->buffer = (uint8 *)TALLOC_ZERO(talloc_tos(), len);
467 if (str->buffer == NULL)
468 smb_panic("create_rpc_blob: talloc fail");
476 /*******************************************************************
477 Inits a RPC_DATA_BLOB structure from a uint32
478 ********************************************************************/
480 void init_rpc_blob_uint32(RPC_DATA_BLOB *str, uint32 val)
484 /* set up string lengths. */
485 create_rpc_blob(str, sizeof(uint32));
486 SIVAL(str->buffer, 0, val);
489 /*******************************************************************
490 Inits a RPC_DATA_BLOB structure.
491 ********************************************************************/
493 void init_rpc_blob_str(RPC_DATA_BLOB *str, const char *buf, int len)
497 /* set up string lengths. */
499 create_rpc_blob(str, len*2);
500 rpcstr_push(str->buffer, buf, (size_t)str->buf_len, STR_TERMINATE);
504 /*******************************************************************
505 Inits a RPC_DATA_BLOB structure from a hex string.
506 ********************************************************************/
508 void init_rpc_blob_hex(RPC_DATA_BLOB *str, const char *buf)
512 size_t len = strlen(buf);
513 create_rpc_blob(str, len);
514 str->buf_len = strhex_to_str((char *)str->buffer, str->buf_len,
519 /*******************************************************************
520 Inits a RPC_DATA_BLOB structure.
521 ********************************************************************/
523 void init_rpc_blob_bytes(RPC_DATA_BLOB *str, uint8 *buf, size_t len)
527 /* max buffer size (allocated size) */
528 if (buf != NULL && len) {
529 create_rpc_blob(str, len);
530 memcpy(str->buffer, buf, len);
535 /*******************************************************************
536 reads or writes a BUFFER5 structure.
537 the buf_len member tells you how large the buffer is.
538 ********************************************************************/
539 bool smb_io_buffer5(const char *desc, BUFFER5 *buf5, prs_struct *ps, int depth)
541 prs_debug(ps, depth, desc, "smb_io_buffer5");
544 if (buf5 == NULL) return False;
548 if(!prs_uint32("buf_len", ps, depth, &buf5->buf_len))
552 if(!prs_buffer5(True, "buffer" , ps, depth, buf5))
559 /*******************************************************************
560 Inits a REGVAL_BUFFER structure.
561 ********************************************************************/
563 void init_regval_buffer(REGVAL_BUFFER *str, const uint8 *buf, size_t len)
567 /* max buffer size (allocated size) */
568 str->buf_max_len = len;
570 str->buf_len = buf != NULL ? len : 0;
573 SMB_ASSERT(str->buf_max_len >= str->buf_len);
574 str->buffer = (uint16 *)TALLOC_ZERO(talloc_tos(),
576 if (str->buffer == NULL)
577 smb_panic("init_regval_buffer: talloc fail");
578 memcpy(str->buffer, buf, str->buf_len);
582 /*******************************************************************
583 Reads or writes a REGVAL_BUFFER structure.
584 the uni_max_len member tells you how large the buffer is.
585 the uni_str_len member tells you how much of the buffer is really used.
586 ********************************************************************/
588 bool smb_io_regval_buffer(const char *desc, prs_struct *ps, int depth, REGVAL_BUFFER *buf2)
591 prs_debug(ps, depth, desc, "smb_io_regval_buffer");
597 if(!prs_uint32("buf_max_len", ps, depth, &buf2->buf_max_len))
599 if(!prs_uint32("offset ", ps, depth, &buf2->offset))
601 if(!prs_uint32("buf_len ", ps, depth, &buf2->buf_len))
604 /* buffer advanced by indicated length of string
605 NOT by searching for null-termination */
607 if(!prs_regval_buffer(True, "buffer ", ps, depth, buf2))
613 /*******************************************************************
614 creates a UNISTR2 structure: sets up the buffer, too
615 ********************************************************************/
617 void init_buf_unistr2(UNISTR2 *str, uint32 *ptr, const char *buf)
621 init_unistr2(str, buf, UNI_STR_TERMINATE);
624 init_unistr2(str, NULL, UNI_FLAGS_NONE);
629 /*******************************************************************
630 Copies a UNISTR2 structure.
631 ********************************************************************/
633 void copy_unistr2(UNISTR2 *str, const UNISTR2 *from)
635 if (from->buffer == NULL) {
640 SMB_ASSERT(from->uni_max_len >= from->uni_str_len);
642 str->uni_max_len = from->uni_max_len;
643 str->offset = from->offset;
644 str->uni_str_len = from->uni_str_len;
646 /* the string buffer is allocated to the maximum size
647 (the the length of the source string) to prevent
648 reallocation of memory. */
649 if (str->buffer == NULL) {
650 if (str->uni_max_len) {
651 str->buffer = (uint16 *)TALLOC_ZERO_ARRAY(talloc_tos(), uint16, str->uni_max_len);
652 if ((str->buffer == NULL)) {
653 smb_panic("copy_unistr2: talloc fail");
656 /* copy the string */
657 memcpy(str->buffer, from->buffer, str->uni_max_len*sizeof(uint16));
664 /*******************************************************************
665 Creates a STRING2 structure.
666 ********************************************************************/
668 void init_string2(STRING2 *str, const char *buf, size_t max_len, size_t str_len)
670 /* set up string lengths. */
671 SMB_ASSERT(max_len >= str_len);
673 /* Ensure buf is valid if str_len was set. Coverity check. */
674 if (str_len && !buf) {
678 str->str_max_len = max_len;
680 str->str_str_len = str_len;
682 /* store the string */
684 str->buffer = (uint8 *)TALLOC_ZERO(talloc_tos(),
686 if (str->buffer == NULL)
687 smb_panic("init_string2: malloc fail");
688 memcpy(str->buffer, buf, str_len);
692 /*******************************************************************
693 Reads or writes a STRING2 structure.
694 XXXX NOTE: STRING2 structures need NOT be null-terminated.
695 the str_str_len member tells you how long the string is;
696 the str_max_len member tells you how large the buffer is.
697 ********************************************************************/
699 bool smb_io_string2(const char *desc, STRING2 *str2, uint32 buffer, prs_struct *ps, int depth)
706 prs_debug(ps, depth, desc, "smb_io_string2");
712 if(!prs_uint32("str_max_len", ps, depth, &str2->str_max_len))
714 if(!prs_uint32("offset ", ps, depth, &str2->offset))
716 if(!prs_uint32("str_str_len", ps, depth, &str2->str_str_len))
719 /* buffer advanced by indicated length of string
720 NOT by searching for null-termination */
721 if(!prs_string2(True, "buffer ", ps, depth, str2))
726 prs_debug(ps, depth, desc, "smb_io_string2 - NULL");
728 memset((char *)str2, '\0', sizeof(*str2));
735 /*******************************************************************
736 Inits a UNISTR2 structure.
737 ********************************************************************/
739 void init_unistr2(UNISTR2 *str, const char *buf, enum unistr2_term_codes flags)
742 uint32 num_chars = 0;
745 /* We always null terminate the copy. */
746 len = strlen(buf) + 1;
747 if ( flags == UNI_STR_DBLTERMINATE )
751 if (buf == NULL || len == 0) {
752 /* no buffer -- nothing to do */
753 str->uni_max_len = 0;
755 str->uni_str_len = 0;
761 str->buffer = TALLOC_ZERO_ARRAY(talloc_tos(), uint16, len);
762 if (str->buffer == NULL) {
763 smb_panic("init_unistr2: malloc fail");
767 /* Ensure len is the length in *bytes* */
768 len *= sizeof(uint16);
771 * The UNISTR2 must be initialized !!!
775 rpcstr_push((char *)str->buffer, buf, len, STR_TERMINATE);
776 num_chars = strlen_w(str->buffer);
777 if (flags == UNI_STR_TERMINATE || flags == UNI_MAXLEN_TERMINATE) {
780 if ( flags == UNI_STR_DBLTERMINATE )
784 str->uni_max_len = num_chars;
786 str->uni_str_len = num_chars;
787 if ( num_chars && ((flags == UNI_MAXLEN_TERMINATE) || (flags == UNI_BROKEN_NON_NULL)) )
791 /*******************************************************************
792 Inits a UNISTR4 structure.
793 ********************************************************************/
795 void init_unistr4(UNISTR4 *uni4, const char *buf, enum unistr2_term_codes flags)
797 uni4->string = TALLOC_P( talloc_tos(), UNISTR2 );
799 smb_panic("init_unistr4: talloc fail");
802 init_unistr2( uni4->string, buf, flags );
804 uni4->length = 2 * (uni4->string->uni_str_len);
805 uni4->size = 2 * (uni4->string->uni_max_len);
808 void init_unistr4_w( TALLOC_CTX *ctx, UNISTR4 *uni4, const smb_ucs2_t *buf )
810 uni4->string = TALLOC_P( ctx, UNISTR2 );
812 smb_panic("init_unistr4_w: talloc fail");
815 init_unistr2_w( ctx, uni4->string, buf );
817 uni4->length = 2 * (uni4->string->uni_str_len);
818 uni4->size = 2 * (uni4->string->uni_max_len);
822 * Inits a UNISTR2 structure.
823 * @param ctx talloc context to allocate string on
824 * @param str pointer to string to create
825 * @param buf UCS2 null-terminated buffer to init from
828 void init_unistr2_w(TALLOC_CTX *ctx, UNISTR2 *str, const smb_ucs2_t *buf)
830 uint32 len = buf ? strlen_w(buf) : 0;
834 /* set up string lengths. */
835 str->uni_max_len = len;
837 str->uni_str_len = len;
840 str->buffer = TALLOC_ZERO_ARRAY(ctx, uint16, len + 1);
841 if (str->buffer == NULL) {
842 smb_panic("init_unistr2_w: talloc fail");
850 * don't move this test above ! The UNISTR2 must be initialized !!!
856 /* Yes, this is a strncpy( foo, bar, strlen(bar)) - but as
857 long as the buffer above is talloc()ed correctly then this
858 is the correct thing to do */
860 strncpy_w(str->buffer, buf, len + 1);
864 /*******************************************************************
865 Inits a UNISTR2 structure from a UNISTR
866 ********************************************************************/
868 void init_unistr2_from_unistr(TALLOC_CTX *ctx, UNISTR2 *to, const UNISTR *from)
872 /* the destination UNISTR2 should never be NULL.
873 if it is it is a programming error */
875 /* if the source UNISTR is NULL, then zero out
876 the destination string and return */
878 if ((from == NULL) || (from->buffer == NULL))
881 /* get the length; UNISTR must be NULL terminated */
883 while ((from->buffer)[i]!='\0')
885 i++; /* one more to catch the terminating NULL */
886 /* is this necessary -- jerry? I need to think */
888 /* set up string lengths; uni_max_len is set to i+1
889 because we need to account for the final NULL termination */
894 /* allocate the space and copy the string buffer */
896 to->buffer = TALLOC_ZERO_ARRAY(ctx, uint16, i);
897 if (to->buffer == NULL)
898 smb_panic("init_unistr2_from_unistr: talloc fail");
899 memcpy(to->buffer, from->buffer, i*sizeof(uint16));
906 /*******************************************************************
907 Inits a UNISTR2 structure from a DATA_BLOB.
908 The length of the data_blob must count the bytes of the buffer.
909 Copies the blob data.
910 ********************************************************************/
912 void init_unistr2_from_datablob(UNISTR2 *str, DATA_BLOB *blob)
914 /* Allocs the unistring */
915 init_unistr2(str, NULL, UNI_FLAGS_NONE);
917 /* Sets the values */
918 str->uni_str_len = blob->length / sizeof(uint16);
919 str->uni_max_len = str->uni_str_len;
922 str->buffer = (uint16 *) memdup(blob->data, blob->length);
926 if ((str->buffer == NULL) && (blob->length > 0)) {
927 smb_panic("init_unistr2_from_datablob: malloc fail");
931 /*******************************************************************
932 UNISTR2* are a little different in that the pointer and the UNISTR2
933 are not necessarily read/written back to back. So we break it up
934 into 2 separate functions.
935 See SPOOL_USER_1 in include/rpc_spoolss.h for an example.
936 ********************************************************************/
938 bool prs_io_unistr2_p(const char *desc, prs_struct *ps, int depth, UNISTR2 **uni2)
942 /* caputure the pointer value to stream */
944 data_p = *uni2 ? 0xf000baaa : 0;
946 if ( !prs_uint32("ptr", ps, depth, &data_p ))
949 /* we're done if there is no data */
954 if (UNMARSHALLING(ps)) {
955 if ( !(*uni2 = PRS_ALLOC_MEM(ps, UNISTR2, 1)) )
962 /*******************************************************************
963 now read/write the actual UNISTR2. Memory for the UNISTR2 (but
964 not UNISTR2.buffer) has been allocated previously by prs_unistr2_p()
965 ********************************************************************/
967 bool prs_io_unistr2(const char *desc, prs_struct *ps, int depth, UNISTR2 *uni2 )
969 /* just return true if there is no pointer to deal with.
970 the memory must have been previously allocated on unmarshalling
971 by prs_unistr2_p() */
976 /* just pass off to smb_io_unstr2() passing the uni2 address as
977 the pointer (like you would expect) */
979 return smb_io_unistr2( desc, uni2, uni2 ? 1 : 0, ps, depth );
982 /*******************************************************************
983 Reads or writes a UNISTR2 structure.
984 XXXX NOTE: UNISTR2 structures need NOT be null-terminated.
985 the uni_str_len member tells you how long the string is;
986 the uni_max_len member tells you how large the buffer is.
987 ********************************************************************/
989 bool smb_io_unistr2(const char *desc, UNISTR2 *uni2, uint32 buffer, prs_struct *ps, int depth)
996 prs_debug(ps, depth, desc, "smb_io_unistr2");
1002 if(!prs_uint32("uni_max_len", ps, depth, &uni2->uni_max_len))
1004 if(!prs_uint32("offset ", ps, depth, &uni2->offset))
1006 if(!prs_uint32("uni_str_len", ps, depth, &uni2->uni_str_len))
1009 /* buffer advanced by indicated length of string
1010 NOT by searching for null-termination */
1011 if(!prs_unistr2(True, "buffer ", ps, depth, uni2))
1016 prs_debug(ps, depth, desc, "smb_io_unistr2 - NULL");
1018 memset((char *)uni2, '\0', sizeof(*uni2));
1025 /*******************************************************************
1026 now read/write UNISTR4
1027 ********************************************************************/
1029 bool prs_unistr4(const char *desc, prs_struct *ps, int depth, UNISTR4 *uni4)
1032 prs_debug(ps, depth, desc, "prs_unistr4");
1035 if ( !prs_uint16("length", ps, depth, &uni4->length ))
1037 if ( !prs_uint16("size", ps, depth, &uni4->size ))
1042 if ( !prs_pointer( desc, ps, depth, &ptr, sizeof(UNISTR2), (PRS_POINTER_CAST)prs_io_unistr2 ) )
1045 uni4->string = (UNISTR2 *)ptr;
1050 /*******************************************************************
1051 now read/write UNISTR4 header
1052 ********************************************************************/
1054 bool prs_unistr4_hdr(const char *desc, prs_struct *ps, int depth, UNISTR4 *uni4)
1056 prs_debug(ps, depth, desc, "prs_unistr4_hdr");
1059 if ( !prs_uint16("length", ps, depth, &uni4->length) )
1061 if ( !prs_uint16("size", ps, depth, &uni4->size) )
1063 if ( !prs_io_unistr2_p(desc, ps, depth, &uni4->string) )
1069 /*******************************************************************
1070 now read/write UNISTR4 string
1071 ********************************************************************/
1073 bool prs_unistr4_str(const char *desc, prs_struct *ps, int depth, UNISTR4 *uni4)
1075 prs_debug(ps, depth, desc, "prs_unistr4_str");
1078 if ( !prs_io_unistr2(desc, ps, depth, uni4->string) )
1084 /*******************************************************************
1085 Reads or writes a UNISTR4_ARRAY structure.
1086 ********************************************************************/
1088 bool prs_unistr4_array(const char *desc, prs_struct *ps, int depth, UNISTR4_ARRAY *array )
1092 prs_debug(ps, depth, desc, "prs_unistr4_array");
1095 if(!prs_uint32("count", ps, depth, &array->count))
1098 if (UNMARSHALLING(ps)) {
1100 if ( !(array->strings = TALLOC_ZERO_ARRAY( talloc_tos(), UNISTR4, array->count)) )
1103 array->strings = NULL;
1107 /* write the headers and then the actual string buffer */
1109 for ( i=0; i<array->count; i++ ) {
1110 if ( !prs_unistr4_hdr( "string", ps, depth, &array->strings[i]) )
1114 for (i=0;i<array->count;i++) {
1115 if ( !prs_unistr4_str("string", ps, depth, &array->strings[i]) )
1122 /********************************************************************
1123 initialise a UNISTR_ARRAY from a char**
1124 ********************************************************************/
1126 bool init_unistr4_array( UNISTR4_ARRAY *array, uint32 count, const char **strings )
1130 array->count = count;
1132 /* allocate memory for the array of UNISTR4 objects */
1135 if ( !(array->strings = TALLOC_ZERO_ARRAY(talloc_tos(), UNISTR4, count )) )
1138 array->strings = NULL;
1141 for ( i=0; i<count; i++ )
1142 init_unistr4( &array->strings[i], strings[i], UNI_STR_TERMINATE );
1147 bool smb_io_lockout_string_hdr(const char *desc, HDR_LOCKOUT_STRING *hdr_account_lockout, prs_struct *ps, int depth)
1149 prs_debug(ps, depth, desc, "smb_io_lockout_string_hdr");
1155 if(!prs_uint16("size", ps, depth, &hdr_account_lockout->size))
1157 if(!prs_uint16("length", ps, depth, &hdr_account_lockout->length))
1159 if(!prs_uint32("buffer", ps, depth, &hdr_account_lockout->buffer))
1165 bool smb_io_account_lockout_str(const char *desc, LOCKOUT_STRING *account_lockout, uint32 buffer, prs_struct *ps, int depth)
1167 prs_debug(ps, depth, desc, "smb_io_account_lockout_string");
1170 if(!prs_uint32("array_size", ps, depth, &account_lockout->array_size))
1173 if(!prs_uint32("offset", ps, depth, &account_lockout->offset))
1175 if(!prs_uint32("length", ps, depth, &account_lockout->length))
1178 if (!prs_uint64("lockout_duration", ps, depth, &account_lockout->lockout_duration))
1180 if (!prs_uint64("reset_count", ps, depth, &account_lockout->reset_count))
1182 if (!prs_uint32("bad_attempt_lockout", ps, depth, &account_lockout->bad_attempt_lockout))
1184 if (!prs_uint32("dummy", ps, depth, &account_lockout->dummy))
1187 if(!prs_uint16s (False, "bindata", ps, depth, &account_lockout->bindata, length))
1194 /*******************************************************************
1195 Inits a DOM_RID structure.
1196 ********************************************************************/
1198 void init_dom_rid(DOM_RID *prid, uint32 rid, uint16 type, uint32 idx)
1202 prid->rid_idx = idx;
1205 /*******************************************************************
1206 Reads or writes a DOM_RID structure.
1207 ********************************************************************/
1209 bool smb_io_dom_rid(const char *desc, DOM_RID *rid, prs_struct *ps, int depth)
1214 prs_debug(ps, depth, desc, "smb_io_dom_rid");
1220 if(!prs_uint16("type ", ps, depth, &rid->type))
1224 if(!prs_uint32("rid ", ps, depth, &rid->rid))
1226 if(!prs_uint32("rid_idx", ps, depth, &rid->rid_idx))
1232 /*******************************************************************
1233 Reads or writes a DOM_RID2 structure.
1234 ********************************************************************/
1236 bool smb_io_dom_rid2(const char *desc, DOM_RID2 *rid, prs_struct *ps, int depth)
1241 prs_debug(ps, depth, desc, "smb_io_dom_rid2");
1247 if(!prs_uint16("type ", ps, depth, &rid->type))
1251 if(!prs_uint32("rid ", ps, depth, &rid->rid))
1253 if(!prs_uint32("rid_idx", ps, depth, &rid->rid_idx))
1255 if(!prs_uint32("unknown", ps, depth, &rid->unknown))
1262 /*******************************************************************
1263 creates a DOM_RID3 structure.
1264 ********************************************************************/
1266 void init_dom_rid3(DOM_RID3 *rid3, uint32 rid, uint8 type)
1270 rid3->ptr_type = 0x1; /* non-zero, basically. */
1275 /*******************************************************************
1276 reads or writes a DOM_RID3 structure.
1277 ********************************************************************/
1279 bool smb_io_dom_rid3(const char *desc, DOM_RID3 *rid3, prs_struct *ps, int depth)
1284 prs_debug(ps, depth, desc, "smb_io_dom_rid3");
1290 if(!prs_uint32("rid ", ps, depth, &rid3->rid))
1292 if(!prs_uint32("type1 ", ps, depth, &rid3->type1))
1294 if(!prs_uint32("ptr_type", ps, depth, &rid3->ptr_type))
1296 if(!prs_uint32("type2 ", ps, depth, &rid3->type2))
1298 if(!prs_uint32("unk ", ps, depth, &rid3->unk))
1304 /*******************************************************************
1305 Inits a DOM_RID4 structure.
1306 ********************************************************************/
1308 void init_dom_rid4(DOM_RID4 *rid4, uint16 unknown, uint16 attr, uint32 rid)
1310 rid4->unknown = unknown;
1315 /*******************************************************************
1316 Inits a DOM_CLNT_SRV structure.
1317 ********************************************************************/
1319 void init_clnt_srv(DOM_CLNT_SRV *logcln, const char *logon_srv,
1320 const char *comp_name)
1322 DEBUG(5,("init_clnt_srv: %d\n", __LINE__));
1324 if (logon_srv != NULL) {
1325 logcln->undoc_buffer = 1;
1326 init_unistr2(&logcln->uni_logon_srv, logon_srv, UNI_STR_TERMINATE);
1328 logcln->undoc_buffer = 0;
1331 if (comp_name != NULL) {
1332 logcln->undoc_buffer2 = 1;
1333 init_unistr2(&logcln->uni_comp_name, comp_name, UNI_STR_TERMINATE);
1335 logcln->undoc_buffer2 = 0;
1339 /*******************************************************************
1340 Inits or writes a DOM_CLNT_SRV structure.
1341 ********************************************************************/
1343 bool smb_io_clnt_srv(const char *desc, DOM_CLNT_SRV *logcln, prs_struct *ps, int depth)
1348 prs_debug(ps, depth, desc, "smb_io_clnt_srv");
1354 if(!prs_uint32("undoc_buffer ", ps, depth, &logcln->undoc_buffer))
1357 if (logcln->undoc_buffer != 0) {
1358 if(!smb_io_unistr2("unistr2", &logcln->uni_logon_srv, logcln->undoc_buffer, ps, depth))
1365 if(!prs_uint32("undoc_buffer2", ps, depth, &logcln->undoc_buffer2))
1368 if (logcln->undoc_buffer2 != 0) {
1369 if(!smb_io_unistr2("unistr2", &logcln->uni_comp_name, logcln->undoc_buffer2, ps, depth))
1376 /*******************************************************************
1377 Inits a DOM_LOG_INFO structure.
1378 ********************************************************************/
1380 void init_log_info(DOM_LOG_INFO *loginfo, const char *logon_srv, const char *acct_name,
1381 uint16 sec_chan, const char *comp_name)
1383 DEBUG(5,("make_log_info %d\n", __LINE__));
1385 loginfo->undoc_buffer = 1;
1387 init_unistr2(&loginfo->uni_logon_srv, logon_srv, UNI_STR_TERMINATE);
1388 init_unistr2(&loginfo->uni_acct_name, acct_name, UNI_STR_TERMINATE);
1390 loginfo->sec_chan = sec_chan;
1392 init_unistr2(&loginfo->uni_comp_name, comp_name, UNI_STR_TERMINATE);
1395 /*******************************************************************
1396 Reads or writes a DOM_LOG_INFO structure.
1397 ********************************************************************/
1399 bool smb_io_log_info(const char *desc, DOM_LOG_INFO *loginfo, prs_struct *ps, int depth)
1401 if (loginfo == NULL)
1404 prs_debug(ps, depth, desc, "smb_io_log_info");
1410 if(!prs_uint32("undoc_buffer", ps, depth, &loginfo->undoc_buffer))
1413 if(!smb_io_unistr2("unistr2", &loginfo->uni_logon_srv, True, ps, depth))
1415 if(!smb_io_unistr2("unistr2", &loginfo->uni_acct_name, True, ps, depth))
1418 if(!prs_uint16("sec_chan", ps, depth, &loginfo->sec_chan))
1421 if(!smb_io_unistr2("unistr2", &loginfo->uni_comp_name, True, ps, depth))
1427 /*******************************************************************
1428 Reads or writes a DOM_CHAL structure.
1429 ********************************************************************/
1431 bool smb_io_chal(const char *desc, DOM_CHAL *chal, prs_struct *ps, int depth)
1436 prs_debug(ps, depth, desc, "smb_io_chal");
1439 if(!prs_uint8s (False, "data", ps, depth, chal->data, 8))
1445 /*******************************************************************
1446 Reads or writes a DOM_CRED structure.
1447 ********************************************************************/
1449 bool smb_io_cred(const char *desc, DOM_CRED *cred, prs_struct *ps, int depth)
1454 prs_debug(ps, depth, desc, "smb_io_cred");
1460 if(!smb_io_chal ("", &cred->challenge, ps, depth))
1463 if(!smb_io_utime("", &cred->timestamp, ps, depth))
1469 /*******************************************************************
1470 Inits a DOM_CLNT_INFO2 structure.
1471 ********************************************************************/
1473 void init_clnt_info2(DOM_CLNT_INFO2 *clnt,
1474 const char *logon_srv, const char *comp_name,
1475 const DOM_CRED *clnt_cred)
1477 DEBUG(5,("make_clnt_info: %d\n", __LINE__));
1479 init_clnt_srv(&clnt->login, logon_srv, comp_name);
1481 if (clnt_cred != NULL) {
1483 memcpy(&clnt->cred, clnt_cred, sizeof(clnt->cred));
1489 /*******************************************************************
1490 Reads or writes a DOM_CLNT_INFO2 structure.
1491 ********************************************************************/
1493 bool smb_io_clnt_info2(const char *desc, DOM_CLNT_INFO2 *clnt, prs_struct *ps, int depth)
1498 prs_debug(ps, depth, desc, "smb_io_clnt_info2");
1504 if(!smb_io_clnt_srv("", &clnt->login, ps, depth))
1510 if(!prs_uint32("ptr_cred", ps, depth, &clnt->ptr_cred))
1512 if(!smb_io_cred("", &clnt->cred, ps, depth))
1518 /*******************************************************************
1519 Inits a DOM_CLNT_INFO structure.
1520 ********************************************************************/
1522 void init_clnt_info(DOM_CLNT_INFO *clnt,
1523 const char *logon_srv, const char *acct_name,
1524 uint16 sec_chan, const char *comp_name,
1525 const DOM_CRED *cred)
1527 DEBUG(5,("make_clnt_info\n"));
1529 init_log_info(&clnt->login, logon_srv, acct_name, sec_chan, comp_name);
1530 memcpy(&clnt->cred, cred, sizeof(clnt->cred));
1533 /*******************************************************************
1534 Reads or writes a DOM_CLNT_INFO structure.
1535 ********************************************************************/
1537 bool smb_io_clnt_info(const char *desc, DOM_CLNT_INFO *clnt, prs_struct *ps, int depth)
1542 prs_debug(ps, depth, desc, "smb_io_clnt_info");
1548 if(!smb_io_log_info("", &clnt->login, ps, depth))
1550 if(!smb_io_cred("", &clnt->cred, ps, depth))
1556 /*******************************************************************
1557 Inits a DOM_LOGON_ID structure.
1558 ********************************************************************/
1560 void init_logon_id(DOM_LOGON_ID *logonid, uint32 log_id_low, uint32 log_id_high)
1562 DEBUG(5,("make_logon_id: %d\n", __LINE__));
1564 logonid->low = log_id_low;
1565 logonid->high = log_id_high;
1568 /*******************************************************************
1569 Reads or writes a DOM_LOGON_ID structure.
1570 ********************************************************************/
1572 bool smb_io_logon_id(const char *desc, DOM_LOGON_ID *logonid, prs_struct *ps, int depth)
1574 if (logonid == NULL)
1577 prs_debug(ps, depth, desc, "smb_io_logon_id");
1583 if(!prs_uint32("low ", ps, depth, &logonid->low ))
1585 if(!prs_uint32("high", ps, depth, &logonid->high))
1591 /*******************************************************************
1592 Inits an OWF_INFO structure.
1593 ********************************************************************/
1595 void init_owf_info(OWF_INFO *hash, const uint8 data[16])
1597 DEBUG(5,("init_owf_info: %d\n", __LINE__));
1600 memcpy(hash->data, data, sizeof(hash->data));
1602 memset((char *)hash->data, '\0', sizeof(hash->data));
1605 /*******************************************************************
1606 Reads or writes an OWF_INFO structure.
1607 ********************************************************************/
1609 bool smb_io_owf_info(const char *desc, OWF_INFO *hash, prs_struct *ps, int depth)
1614 prs_debug(ps, depth, desc, "smb_io_owf_info");
1620 if(!prs_uint8s (False, "data", ps, depth, hash->data, 16))
1626 /*******************************************************************
1627 Reads or writes a DOM_GID structure.
1628 ********************************************************************/
1630 bool smb_io_gid(const char *desc, DOM_GID *gid, prs_struct *ps, int depth)
1635 prs_debug(ps, depth, desc, "smb_io_gid");
1641 if(!prs_uint32("g_rid", ps, depth, &gid->g_rid))
1643 if(!prs_uint32("attr ", ps, depth, &gid->attr))
1649 /*******************************************************************
1650 Reads or writes an POLICY_HND structure.
1651 ********************************************************************/
1653 bool smb_io_pol_hnd(const char *desc, POLICY_HND *pol, prs_struct *ps, int depth)
1658 prs_debug(ps, depth, desc, "smb_io_pol_hnd");
1664 if(UNMARSHALLING(ps))
1667 if (!prs_uint32("handle_type", ps, depth, &pol->handle_type))
1669 if (!smb_io_uuid("uuid", (struct GUID*)&pol->uuid, ps, depth))
1675 /*******************************************************************
1677 ********************************************************************/
1679 void init_unistr3(UNISTR3 *str, const char *buf)
1683 str->str.buffer = NULL;
1687 str->uni_str_len = strlen(buf) + 1;
1689 if (str->uni_str_len) {
1690 str->str.buffer = TALLOC_ZERO_ARRAY(talloc_tos(), uint16, str->uni_str_len);
1691 if (str->str.buffer == NULL)
1692 smb_panic("init_unistr3: malloc fail");
1694 rpcstr_push((char *)str->str.buffer, buf, str->uni_str_len * sizeof(uint16), STR_TERMINATE);
1696 str->str.buffer = NULL;
1700 /*******************************************************************
1701 Reads or writes a UNISTR3 structure.
1702 ********************************************************************/
1704 bool smb_io_unistr3(const char *desc, UNISTR3 *name, prs_struct *ps, int depth)
1709 prs_debug(ps, depth, desc, "smb_io_unistr3");
1715 if(!prs_uint32("uni_str_len", ps, depth, &name->uni_str_len))
1718 /* we're done if there is no string */
1720 if ( name->uni_str_len == 0 )
1723 /* don't know if len is specified by uni_str_len member... */
1724 /* assume unicode string is unicode-null-terminated, instead */
1726 if(!prs_unistr3(True, "unistr", name, ps, depth))
1732 /*******************************************************************
1733 Stream a uint64_struct
1734 ********************************************************************/
1735 bool prs_uint64(const char *name, prs_struct *ps, int depth, uint64 *data64)
1737 if (UNMARSHALLING(ps)) {
1740 if (!prs_uint32(name, ps, depth+1, &low))
1743 if (!prs_uint32(name, ps, depth+1, &high))
1746 *data64 = ((uint64_t)high << 32) + low;
1750 uint32 high = (*data64) >> 32, low = (*data64) & 0xFFFFFFFF;
1751 return prs_uint32(name, ps, depth+1, &low) &&
1752 prs_uint32(name, ps, depth+1, &high);
1756 /*******************************************************************
1757 reads or writes a BUFHDR2 structure.
1758 ********************************************************************/
1759 bool smb_io_bufhdr2(const char *desc, BUFHDR2 *hdr, prs_struct *ps, int depth)
1761 prs_debug(ps, depth, desc, "smb_io_bufhdr2");
1765 prs_uint32("info_level", ps, depth, &(hdr->info_level));
1766 prs_uint32("length ", ps, depth, &(hdr->length ));
1767 prs_uint32("buffer ", ps, depth, &(hdr->buffer ));
1772 /*******************************************************************
1773 reads or writes a BUFHDR4 structure.
1774 ********************************************************************/
1775 bool smb_io_bufhdr4(const char *desc, BUFHDR4 *hdr, prs_struct *ps, int depth)
1777 prs_debug(ps, depth, desc, "smb_io_bufhdr4");
1781 prs_uint32("size", ps, depth, &hdr->size);
1782 prs_uint32("buffer", ps, depth, &hdr->buffer);
1787 /*******************************************************************
1788 reads or writes a RPC_DATA_BLOB structure.
1789 ********************************************************************/
1791 bool smb_io_rpc_blob(const char *desc, RPC_DATA_BLOB *blob, prs_struct *ps, int depth)
1793 prs_debug(ps, depth, desc, "smb_io_rpc_blob");
1797 if ( !prs_uint32("buf_len", ps, depth, &blob->buf_len) )
1800 if ( blob->buf_len == 0 )
1803 if (UNMARSHALLING(ps)) {
1804 blob->buffer = PRS_ALLOC_MEM(ps, uint8, blob->buf_len);
1805 if (!blob->buffer) {
1810 if ( !prs_uint8s(True, "buffer", ps, depth, blob->buffer, blob->buf_len) )
1816 /*******************************************************************
1817 creates a UNIHDR structure.
1818 ********************************************************************/
1820 bool make_uni_hdr(UNIHDR *hdr, int len)
1826 hdr->uni_str_len = 2 * len;
1827 hdr->uni_max_len = 2 * len;
1828 hdr->buffer = len != 0 ? 1 : 0;
1833 /*******************************************************************
1834 creates a BUFHDR2 structure.
1835 ********************************************************************/
1836 bool make_bufhdr2(BUFHDR2 *hdr, uint32 info_level, uint32 length, uint32 buffer)
1838 hdr->info_level = info_level;
1839 hdr->length = length;
1840 hdr->buffer = buffer;
1845 /*******************************************************************
1846 return the length of a UNISTR string.
1847 ********************************************************************/
1849 uint32 str_len_uni(UNISTR *source)
1853 if (!source->buffer)
1856 while (source->buffer[i])
1862 /*******************************************************************
1863 Verifies policy handle
1864 ********************************************************************/
1866 bool policy_handle_is_valid(const POLICY_HND *hnd)
1868 POLICY_HND zero_pol;
1870 ZERO_STRUCT(zero_pol);
1871 return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? false : true );