[GLUE] Rsync SAMBA_3_2_0 SVN r25598 in order to create the v3-2-test branch.
[gd/samba/.git] / source3 / rpc_parse / parse_lsa.c
1 /* 
2  *  Unix SMB/CIFS implementation.
3  *  RPC Pipe client / server routines
4  *  Copyright (C) Andrew Tridgell              1992-1997,
5  *  Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6  *  Copyright (C) Paul Ashton                       1997,
7  *  Copyright (C) Andrew Bartlett                   2002,
8  *  Copyright (C) Jim McDonough <jmcd@us.ibm.com>   2002.
9  *  Copyright (C) Gerald )Jerry) Carter             2005
10  *  
11  *  This program is free software; you can redistribute it and/or modify
12  *  it under the terms of the GNU General Public License as published by
13  *  the Free Software Foundation; either version 3 of the License, or
14  *  (at your option) any later version.
15  *  
16  *  This program is distributed in the hope that it will be useful,
17  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
18  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
19  *  GNU General Public License for more details.
20  *  
21  *  You should have received a copy of the GNU General Public License
22  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
23  */
24
25 #include "includes.h"
26
27 #undef DBGC_CLASS
28 #define DBGC_CLASS DBGC_RPC_PARSE
29
30 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
31 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
32
33 /*******************************************************************
34  Inits a LSA_TRANS_NAME structure.
35 ********************************************************************/
36
37 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
38                          uint16 sid_name_use, const char *name, uint32 idx)
39 {
40         trn->sid_name_use = sid_name_use;
41         init_unistr2(uni_name, name, UNI_FLAGS_NONE);
42         init_uni_hdr(&trn->hdr_name, uni_name);
43         trn->domain_idx = idx;
44 }
45
46 /*******************************************************************
47  Reads or writes a LSA_TRANS_NAME structure.
48 ********************************************************************/
49
50 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps, 
51                               int depth)
52 {
53         prs_debug(ps, depth, desc, "lsa_io_trans_name");
54         depth++;
55
56         if(!prs_align(ps))
57                 return False;
58         
59         if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
60                 return False;
61         if(!prs_align(ps))
62                 return False;
63         
64         if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
65                 return False;
66         if(!prs_uint32("domain_idx  ", ps, depth, &trn->domain_idx))
67                 return False;
68
69         return True;
70 }
71
72 /*******************************************************************
73  Inits a LSA_TRANS_NAME2 structure.
74 ********************************************************************/
75
76 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
77                          uint16 sid_name_use, const char *name, uint32 idx)
78 {
79         trn->sid_name_use = sid_name_use;
80         init_unistr2(uni_name, name, UNI_FLAGS_NONE);
81         init_uni_hdr(&trn->hdr_name, uni_name);
82         trn->domain_idx = idx;
83         trn->unknown = 0;
84 }
85
86 /*******************************************************************
87  Reads or writes a LSA_TRANS_NAME2 structure.
88 ********************************************************************/
89
90 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps, 
91                               int depth)
92 {
93         prs_debug(ps, depth, desc, "lsa_io_trans_name2");
94         depth++;
95
96         if(!prs_align(ps))
97                 return False;
98         
99         if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
100                 return False;
101         if(!prs_align(ps))
102                 return False;
103         
104         if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
105                 return False;
106         if(!prs_uint32("domain_idx  ", ps, depth, &trn->domain_idx))
107                 return False;
108         if(!prs_uint32("unknown  ", ps, depth, &trn->unknown))
109                 return False;
110
111         return True;
112 }
113
114 /*******************************************************************
115  Reads or writes a DOM_R_REF structure.
116 ********************************************************************/
117
118 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
119 {
120         unsigned int i;
121
122         prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
123         depth++;
124
125         if(!prs_align(ps))
126                 return False;
127         
128         if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
129                 return False;
130         if(!prs_uint32("ptr_ref_dom   ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
131                 return False;
132         if(!prs_uint32("max_entries   ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
133                 return False;
134
135         SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
136
137         if (dom->ptr_ref_dom != 0) {
138
139                 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
140                         return False;
141
142                 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
143
144                 for (i = 0; i < dom->num_ref_doms_1; i++) {
145                         fstring t;
146
147                         slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
148                         if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
149                                 return False;
150
151                         slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
152                         if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
153                                 return False;
154                 }
155
156                 for (i = 0; i < dom->num_ref_doms_2; i++) {
157                         fstring t;
158
159                         if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
160                                 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
161                                 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
162                                         return False;
163                                 if(!prs_align(ps))
164                                         return False;
165                         }
166
167                         if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
168                                 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
169                                 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
170                                         return False;
171                         }
172                 }
173         }
174
175         return True;
176 }
177
178 /*******************************************************************
179  Inits an LSA_SEC_QOS structure.
180 ********************************************************************/
181
182 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
183 {
184         DEBUG(5, ("init_lsa_sec_qos\n"));
185
186         qos->len = 0x0c; /* length of quality of service block, in bytes */
187         qos->sec_imp_level = imp_lev;
188         qos->sec_ctxt_mode = ctxt;
189         qos->effective_only = eff;
190 }
191
192 /*******************************************************************
193  Reads or writes an LSA_SEC_QOS structure.
194 ********************************************************************/
195
196 static BOOL lsa_io_sec_qos(const char *desc,  LSA_SEC_QOS *qos, prs_struct *ps, 
197                            int depth)
198 {
199         uint32 start;
200
201         prs_debug(ps, depth, desc, "lsa_io_obj_qos");
202         depth++;
203
204         if(!prs_align(ps))
205                 return False;
206         
207         start = prs_offset(ps);
208
209         /* these pointers had _better_ be zero, because we don't know
210            what they point to!
211          */
212         if(!prs_uint32("len           ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
213                 return False;
214         if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
215                 return False;
216         if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
217                 return False;
218         if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
219                 return False;
220
221         if (qos->len != prs_offset(ps) - start) {
222                 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
223                          qos->len, prs_offset(ps) - start));
224         }
225
226         return True;
227 }
228
229 /*******************************************************************
230  Inits an LSA_OBJ_ATTR structure.
231 ********************************************************************/
232
233 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
234 {
235         DEBUG(5, ("init_lsa_obj_attr\n"));
236
237         attr->len = 0x18; /* length of object attribute block, in bytes */
238         attr->ptr_root_dir = 0;
239         attr->ptr_obj_name = 0;
240         attr->attributes = attributes;
241         attr->ptr_sec_desc = 0;
242         
243         if (qos != NULL) {
244                 attr->ptr_sec_qos = 1;
245                 attr->sec_qos = qos;
246         } else {
247                 attr->ptr_sec_qos = 0;
248                 attr->sec_qos = NULL;
249         }
250 }
251
252 /*******************************************************************
253  Reads or writes an LSA_OBJ_ATTR structure.
254 ********************************************************************/
255
256 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps, 
257                             int depth)
258 {
259         prs_debug(ps, depth, desc, "lsa_io_obj_attr");
260         depth++;
261
262         if(!prs_align(ps))
263                 return False;
264         
265         /* these pointers had _better_ be zero, because we don't know
266            what they point to!
267          */
268         if(!prs_uint32("len         ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
269                 return False;
270         if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
271                 return False;
272         if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
273                 return False;
274         if(!prs_uint32("attributes  ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
275                 return False;
276         if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
277                 return False;
278         if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
279                 return False;
280
281         if (attr->ptr_sec_qos != 0) {
282                 if (UNMARSHALLING(ps))
283                         if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
284                                 return False;
285
286                 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
287                         return False;
288         }
289
290         return True;
291 }
292
293
294 /*******************************************************************
295  Inits an LSA_Q_OPEN_POL structure.
296 ********************************************************************/
297
298 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
299                      uint32 attributes, uint32 desired_access,
300                      LSA_SEC_QOS *qos)
301 {
302         DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes, 
303                   desired_access));
304
305         in->ptr = 1; /* undocumented pointer */
306
307         in->des_access = desired_access;
308
309         in->system_name = system_name;
310         init_lsa_obj_attr(&in->attr, attributes, qos);
311 }
312
313 /*******************************************************************
314  Reads or writes an LSA_Q_OPEN_POL structure.
315 ********************************************************************/
316
317 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps, 
318                        int depth)
319 {
320         prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
321         depth++;
322
323         if(!prs_uint32("ptr       ", ps, depth, &in->ptr))
324                 return False;
325         if(!prs_uint16("system_name", ps, depth, &in->system_name))
326                 return False;
327         if(!prs_align( ps ))
328                 return False;
329
330         if(!lsa_io_obj_attr("", &in->attr, ps, depth))
331                 return False;
332
333         if(!prs_uint32("des_access", ps, depth, &in->des_access))
334                 return False;
335
336         return True;
337 }
338
339 /*******************************************************************
340  Reads or writes an LSA_R_OPEN_POL structure.
341 ********************************************************************/
342
343 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps, 
344                        int depth)
345 {
346         prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
347         depth++;
348
349         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
350                 return False;
351
352         if(!prs_ntstatus("status", ps, depth, &out->status))
353                 return False;
354
355         return True;
356 }
357
358 /*******************************************************************
359  Inits an LSA_Q_OPEN_POL2 structure.
360 ********************************************************************/
361
362 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
363                         uint32 attributes, uint32 desired_access,
364                         LSA_SEC_QOS *qos)
365 {
366         DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes, 
367                   desired_access));
368
369         in->ptr = 1; /* undocumented pointer */
370
371         in->des_access = desired_access;
372
373         init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
374
375         init_lsa_obj_attr(&in->attr, attributes, qos);
376 }
377
378 /*******************************************************************
379  Reads or writes an LSA_Q_OPEN_POL2 structure.
380 ********************************************************************/
381
382 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps, 
383                         int depth)
384 {
385         prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
386         depth++;
387
388         if(!prs_uint32("ptr       ", ps, depth, &in->ptr))
389                 return False;
390
391         if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
392                 return False;
393         if(!lsa_io_obj_attr("", &in->attr, ps, depth))
394                 return False;
395
396         if(!prs_uint32("des_access", ps, depth, &in->des_access))
397                 return False;
398
399         return True;
400 }
401
402 /*******************************************************************
403  Reads or writes an LSA_R_OPEN_POL2 structure.
404 ********************************************************************/
405
406 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps, 
407                         int depth)
408 {
409         prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
410         depth++;
411
412         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
413                 return False;
414
415         if(!prs_ntstatus("status", ps, depth, &out->status))
416                 return False;
417
418         return True;
419 }
420
421 /*******************************************************************
422 makes an LSA_Q_QUERY_SEC_OBJ structure.
423 ********************************************************************/
424
425 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd, 
426                           uint32 sec_info)
427 {
428         DEBUG(5, ("init_q_query_sec_obj\n"));
429
430         in->pol = *hnd;
431         in->sec_info = sec_info;
432
433         return;
434 }
435
436 /*******************************************************************
437  Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
438 ********************************************************************/
439
440 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in, 
441                             prs_struct *ps, int depth)
442 {
443         prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
444         depth++;
445
446         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
447                 return False;
448
449         if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
450                 return False;
451
452         return True;
453
454
455 /*******************************************************************
456  Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
457 ********************************************************************/
458
459 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
460 {
461         prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
462         depth++;
463
464         if (!prs_align(ps))
465                 return False;
466
467         if (!prs_uint32("ptr", ps, depth, &out->ptr))
468                 return False;
469
470         if (out->ptr != 0) {
471                 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
472                         return False;
473         }
474
475         if (!prs_ntstatus("status", ps, depth, &out->status))
476                 return False;
477
478         return True;
479 }
480
481 /*******************************************************************
482  Inits an LSA_Q_QUERY_INFO structure.
483 ********************************************************************/
484
485 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
486 {
487         DEBUG(5, ("init_q_query\n"));
488
489         memcpy(&in->pol, hnd, sizeof(in->pol));
490
491         in->info_class = info_class;
492 }
493
494 /*******************************************************************
495  Reads or writes an LSA_Q_QUERY_INFO structure.
496 ********************************************************************/
497
498 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps, 
499                     int depth)
500 {
501         prs_debug(ps, depth, desc, "lsa_io_q_query");
502         depth++;
503
504         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
505                 return False;
506
507         if(!prs_uint16("info_class", ps, depth, &in->info_class))
508                 return False;
509
510         return True;
511 }
512
513 /*******************************************************************
514 makes an LSA_Q_ENUM_TRUST_DOM structure.
515 ********************************************************************/
516 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
517                            uint32 enum_context, uint32 preferred_len)
518 {
519         DEBUG(5, ("init_q_enum_trust_dom\n"));
520
521         q_e->pol = *pol;
522         q_e->enum_context = enum_context;
523         q_e->preferred_len = preferred_len;
524
525         return True;
526 }
527
528 /*******************************************************************
529  Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
530 ********************************************************************/
531
532 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e, 
533                              prs_struct *ps, int depth)
534 {
535         prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
536         depth++;
537
538         if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
539                 return False;
540
541         if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
542                 return False;
543         if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
544                 return False;
545
546         return True;
547 }
548
549 /*******************************************************************
550  Inits an LSA_R_ENUM_TRUST_DOM structure.
551 ********************************************************************/
552
553 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
554                            uint32 enum_context, uint32 num_domains,
555                            struct trustdom_info **td)
556 {
557         unsigned int i;
558
559         DEBUG(5, ("init_r_enum_trust_dom\n"));
560         
561         out->enum_context  = enum_context;
562         out->count         = num_domains;
563                         
564         if ( num_domains != 0 ) {
565         
566                 /* allocate container memory */
567                 
568                 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
569
570                 if ( !out->domlist ) {
571                         out->status = NT_STATUS_NO_MEMORY;
572                         return;
573                 }
574
575                 if (out->count) {
576                         out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
577                                                       out->count );
578                         if ( !out->domlist->domains ) {
579                                 out->status = NT_STATUS_NO_MEMORY;
580                                 return;
581                         }
582                 } else {                
583                         out->domlist->domains = NULL;
584                 }
585         
586                 out->domlist->count = out->count;
587                 
588                 /* initialize the list of domains and their sid */
589                 
590                 for (i = 0; i < num_domains; i++) {     
591                         smb_ucs2_t *name;
592                         if ( !(out->domlist->domains[i].sid =
593                                TALLOC_P(ctx, DOM_SID2)) ) {
594                                 out->status = NT_STATUS_NO_MEMORY;
595                                 return;
596                         }
597                                 
598                         init_dom_sid2(out->domlist->domains[i].sid,
599                                       &(td[i])->sid);
600                         if (push_ucs2_talloc(ctx, &name, (td[i])->name) == (size_t)-1){
601                                 out->status = NT_STATUS_NO_MEMORY;
602                                 return;
603                         }
604                         init_unistr4_w(ctx, &out->domlist->domains[i].name,
605                                        name);
606                 }
607         }
608
609 }
610
611 /*******************************************************************
612 ********************************************************************/
613
614 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
615 {
616         int i;
617         
618         prs_debug(ps, depth, desc, "lsa_io_domain_list");
619         depth++;
620
621         if(!prs_uint32("count", ps, depth, &domlist->count))
622                 return False;
623
624         if ( domlist->count == 0 )
625                 return True;
626                 
627         if ( UNMARSHALLING(ps) ) {
628                 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
629                         return False;
630         }
631         
632         /* headers */
633         
634         for ( i=0; i<domlist->count; i++ ) {
635                 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
636                         return False;
637                 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
638                         return False;
639         }
640
641         /* data */
642         
643         for ( i=0; i<domlist->count; i++ ) {
644                 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
645                         return False;
646                 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
647                         return False;
648         }
649         
650         return True;
651 }
652
653 /*******************************************************************
654  Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
655 ********************************************************************/
656
657 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out, 
658                              prs_struct *ps, int depth)
659 {
660         prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
661         depth++;
662
663         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
664                 return False;
665
666         if(!prs_uint32("count", ps, depth, &out->count))
667                 return False;
668
669         if ( !prs_pointer("trusted_domains", ps, depth, (void*)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
670                 return False;
671                 
672         if(!prs_ntstatus("status", ps, depth, &out->status))
673                 return False;
674
675         return True;
676 }
677
678 /*******************************************************************
679 reads or writes a structure.
680 ********************************************************************/
681
682 static BOOL lsa_io_dom_query_1(const char *desc, DOM_QUERY_1 *d_q, prs_struct *ps, int depth)
683 {
684         if (d_q == NULL)
685                 return False;
686
687         prs_debug(ps, depth, desc, "lsa_io_dom_query_1");
688         depth++;
689
690         if (!prs_align(ps))
691                 return False;
692
693         if (!prs_uint32("percent_full", ps, depth, &d_q->percent_full))
694                 return False;
695         if (!prs_uint32("log_size", ps, depth, &d_q->log_size))
696                 return False;
697         if (!smb_io_nttime("retention_time", ps, depth, &d_q->retention_time))
698                 return False;
699         if (!prs_uint8("shutdown_in_progress", ps, depth, &d_q->shutdown_in_progress))
700                 return False;
701         if (!smb_io_nttime("time_to_shutdown", ps, depth, &d_q->time_to_shutdown))
702                 return False;
703         if (!prs_uint32("next_audit_record", ps, depth, &d_q->next_audit_record))
704                 return False;
705         if (!prs_uint32("unknown", ps, depth, &d_q->unknown))
706                 return False;
707
708         return True;
709 }
710
711 /*******************************************************************
712 reads or writes a structure.
713 ********************************************************************/
714
715 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
716 {
717         if (d_q == NULL)
718                 return False;
719
720         prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
721         depth++;
722
723         if (!prs_align(ps))
724                 return False;
725
726         if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
727                 return False;
728         if (!prs_uint32("ptr   ", ps, depth, &d_q->ptr))
729                 return False;
730         if (!prs_uint32("count1", ps, depth, &d_q->count1))
731                 return False;
732
733         if (d_q->ptr) {
734
735                 if (!prs_uint32("count2", ps, depth, &d_q->count2))
736                         return False;
737
738                 if (d_q->count1 != d_q->count2)
739                         return False;
740
741                 if (UNMARSHALLING(ps)) {
742                         if (d_q->count2) {
743                                 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
744                                 if (!d_q->auditsettings) {
745                                         return False;
746                                 }
747                         } else {
748                                 d_q->auditsettings = NULL;
749                         }
750                 }
751
752                 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
753                         return False;
754         }
755
756         return True;
757 }
758
759 /*******************************************************************
760 reads or writes a dom query structure.
761 ********************************************************************/
762
763 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
764 {
765         if (d_q == NULL)
766                 return False;
767
768         prs_debug(ps, depth, desc, "lsa_io_dom_query_3");
769         depth++;
770
771         if(!prs_align(ps))
772                 return False;
773
774         if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
775                 return False;
776         if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
777                 return False;
778
779         if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
780                 return False;
781         if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
782                 return False;
783
784         if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
785                 return False;
786
787         if(!prs_align(ps))
788                 return False;
789
790         if (d_q->buffer_dom_sid != 0) {
791                 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
792                         return False;
793         } else {
794                 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
795         }
796
797         return True;
798 }
799
800 /*******************************************************************
801  Reads or writes a dom query structure.
802 ********************************************************************/
803
804 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
805 {
806         return lsa_io_dom_query_3("", d_q, ps, depth);
807 }
808
809 /*******************************************************************
810  Reads or writes a dom query structure.
811 ********************************************************************/
812
813 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
814 {
815         if (d_q == NULL)
816                 return False;
817
818         prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
819         depth++;
820
821         if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
822                 return False;
823
824         return True;
825 }
826
827 /*******************************************************************
828  Reads or writes a dom query structure.
829 ********************************************************************/
830
831 static BOOL lsa_io_dom_query_10(const char *desc, DOM_QUERY_10 *d_q, prs_struct *ps, int depth)
832 {
833         if (d_q == NULL)
834                 return False;
835
836         prs_debug(ps, depth, desc, "lsa_io_dom_query_10");
837         depth++;
838
839         if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
840                 return False;
841
842         return True;
843 }
844
845 /*******************************************************************
846  Reads or writes a dom query structure.
847 ********************************************************************/
848
849 static BOOL lsa_io_dom_query_11(const char *desc, DOM_QUERY_11 *d_q, prs_struct *ps, int depth)
850 {
851         if (d_q == NULL)
852                 return False;
853
854         prs_debug(ps, depth, desc, "lsa_io_dom_query_11");
855         depth++;
856
857         if (!prs_uint16("unknown", ps, depth, &d_q->unknown))
858                 return False;
859         if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
860                 return False;
861         if (!prs_uint8("log_is_full", ps, depth, &d_q->log_is_full))
862                 return False;
863
864         return True;
865 }
866
867 /*******************************************************************
868  Reads or writes an LSA_DNS_DOM_INFO structure.
869 ********************************************************************/
870
871 BOOL lsa_io_dom_query_12(const char *desc, DOM_QUERY_12 *info, prs_struct *ps, int depth)
872 {
873         prs_debug(ps, depth, desc, "lsa_io_dom_query_12");
874         depth++;
875
876         if(!prs_align(ps))
877                 return False;
878         if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
879                 return False;
880         if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
881                 return False;
882         if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
883                 return False;
884
885         if(!prs_align(ps))
886                 return False;
887         if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
888                 return False;
889
890         if(!prs_align(ps))
891                 return False;
892         if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
893                 return False;
894
895         if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
896                            info->hdr_nb_dom_name.buffer, ps, depth))
897                 return False;
898         if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name, 
899                            info->hdr_dns_dom_name.buffer, ps, depth))
900                 return False;
901         if(!smb_io_unistr2("forest", &info->uni_forest_name, 
902                            info->hdr_forest_name.buffer, ps, depth))
903                 return False;
904
905         if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
906                 return False;
907
908         return True;
909         
910 }
911
912 /*******************************************************************
913  Inits an LSA_Q_QUERY_INFO structure.
914 ********************************************************************/
915
916 void init_q_set(LSA_Q_SET_INFO *in, POLICY_HND *hnd, uint16 info_class, LSA_INFO_CTR ctr)
917 {
918         DEBUG(5,("init_q_set\n"));
919
920         in->info_class = info_class;
921
922         in->pol = *hnd;
923
924         in->ctr = ctr;
925         in->ctr.info_class = info_class;
926 }
927
928 /*******************************************************************
929 reads or writes a structure.
930 ********************************************************************/
931
932 static BOOL lsa_io_query_info_ctr2(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR2 *ctr)
933 {
934         prs_debug(ps, depth, desc, "lsa_io_query_info_ctr2");
935         depth++;
936
937         if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
938                 return False;
939
940         switch (ctr->info_class) {
941         case 1:
942                 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
943                         return False;
944                 break;
945         case 2:
946                 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
947                         return False;
948                 break;
949         case 3:
950                 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
951                         return False;
952                 break;
953         case 5:
954                 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
955                         return False;
956                 break;
957         case 6:
958                 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
959                         return False;
960                 break;
961         case 10:
962                 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
963                         return False;
964                 break;
965         case 11:
966                 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
967                         return False;
968                 break;
969         case 12:
970                 if(!lsa_io_dom_query_12("", &ctr->info.id12, ps, depth))
971                         return False;
972                 break;
973         default:
974                 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
975                 return False;
976                 break;
977         }
978
979         return True;
980 }
981
982
983 /*******************************************************************
984 reads or writes a structure.
985 ********************************************************************/
986
987 static BOOL lsa_io_query_info_ctr(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR *ctr)
988 {
989         prs_debug(ps, depth, desc, "lsa_io_query_info_ctr");
990         depth++;
991
992         if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
993                 return False;
994
995         if(!prs_align(ps))
996                 return False;
997
998         switch (ctr->info_class) {
999         case 1:
1000                 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
1001                         return False;
1002                 break;
1003         case 2:
1004                 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
1005                         return False;
1006                 break;
1007         case 3:
1008                 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
1009                         return False;
1010                 break;
1011         case 5:
1012                 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
1013                         return False;
1014                 break;
1015         case 6:
1016                 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
1017                         return False;
1018                 break;
1019         case 10:
1020                 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
1021                         return False;
1022                 break;
1023         case 11:
1024                 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
1025                         return False;
1026                 break;
1027         default:
1028                 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
1029                 return False;
1030                 break;
1031         }
1032
1033         return True;
1034 }
1035
1036 /*******************************************************************
1037  Reads or writes an LSA_R_QUERY_INFO structure.
1038 ********************************************************************/
1039
1040 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
1041 {
1042
1043         prs_debug(ps, depth, desc, "lsa_io_r_query");
1044         depth++;
1045
1046         if(!prs_align(ps))
1047                 return False;
1048
1049         if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
1050                 return False;
1051
1052         if (out->dom_ptr) {
1053
1054                 if(!lsa_io_query_info_ctr("", ps, depth, &out->ctr))
1055                         return False;
1056         }
1057
1058         if(!prs_align(ps))
1059                 return False;
1060
1061         if(!prs_ntstatus("status", ps, depth, &out->status))
1062                 return False;
1063
1064         return True;
1065 }
1066
1067 /*******************************************************************
1068  Reads or writes an LSA_Q_SET_INFO structure.
1069 ********************************************************************/
1070
1071 BOOL lsa_io_q_set(const char *desc, LSA_Q_SET_INFO *in, prs_struct *ps, 
1072                   int depth)
1073 {
1074         prs_debug(ps, depth, desc, "lsa_io_q_set");
1075         depth++;
1076
1077         if(!prs_align(ps))
1078                 return False;
1079
1080         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1081                 return False;
1082
1083         if(!prs_uint16("info_class", ps, depth, &in->info_class))
1084                 return False;
1085
1086         if(!lsa_io_query_info_ctr("", ps, depth, &in->ctr))
1087                 return False;
1088
1089         return True;
1090 }
1091
1092 /*******************************************************************
1093  Reads or writes an LSA_R_SET_INFO structure.
1094 ********************************************************************/
1095
1096 BOOL lsa_io_r_set(const char *desc, LSA_R_SET_INFO *out, prs_struct *ps, int depth)
1097 {
1098         prs_debug(ps, depth, desc, "lsa_io_r_set");
1099         depth++;
1100
1101         if(!prs_align(ps))
1102                 return False;
1103
1104         if(!prs_ntstatus("status", ps, depth, &out->status))
1105                 return False;
1106
1107         return True;
1108 }
1109
1110 /*******************************************************************
1111  Inits a LSA_SID_ENUM structure.
1112 ********************************************************************/
1113
1114 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen, 
1115                        int num_entries, const DOM_SID *sids)
1116 {
1117         int i;
1118
1119         DEBUG(5, ("init_lsa_sid_enum\n"));
1120
1121         sen->num_entries  = num_entries;
1122         sen->ptr_sid_enum = (num_entries != 0);
1123         sen->num_entries2 = num_entries;
1124
1125         /* Allocate memory for sids and sid pointers */
1126
1127         if (num_entries) {
1128                 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
1129                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
1130                         return;
1131                 }
1132
1133                 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
1134                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
1135                         return;
1136                 }
1137         }
1138
1139         /* Copy across SIDs and SID pointers */
1140
1141         for (i = 0; i < num_entries; i++) {
1142                 sen->ptr_sid[i] = 1;
1143                 init_dom_sid2(&sen->sid[i], &sids[i]);
1144         }
1145 }
1146
1147 /*******************************************************************
1148  Reads or writes a LSA_SID_ENUM structure.
1149 ********************************************************************/
1150
1151 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps, 
1152                             int depth)
1153 {
1154         unsigned int i;
1155
1156         prs_debug(ps, depth, desc, "lsa_io_sid_enum");
1157         depth++;
1158
1159         if(!prs_align(ps))
1160                 return False;
1161         
1162         if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
1163                 return False;
1164         if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
1165                 return False;
1166
1167         /*
1168            if the ptr is NULL, leave here. checked from a real w2k trace.
1169            JFM, 11/23/2001
1170          */
1171         
1172         if (sen->ptr_sid_enum==0)
1173                 return True;
1174
1175         if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
1176                 return False;
1177
1178         /* Mallocate memory if we're unpacking from the wire */
1179
1180         if (UNMARSHALLING(ps) && sen->num_entries) {
1181                 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
1182                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1183                                   "ptr_sid\n"));
1184                         return False;
1185                 }
1186
1187                 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
1188                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1189                                   "sids\n"));
1190                         return False;
1191                 }
1192         }
1193
1194         for (i = 0; i < sen->num_entries; i++) {        
1195                 fstring temp;
1196
1197                 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
1198                 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
1199                         return False;
1200                 }
1201         }
1202
1203         for (i = 0; i < sen->num_entries; i++) {
1204                 fstring temp;
1205
1206                 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
1207                 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
1208                         return False;
1209                 }
1210         }
1211
1212         return True;
1213 }
1214
1215 /*******************************************************************
1216  Inits an LSA_R_ENUM_TRUST_DOM structure.
1217 ********************************************************************/
1218
1219 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l, 
1220                         POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
1221                         uint16 level)
1222 {
1223         DEBUG(5, ("init_q_lookup_sids\n"));
1224
1225         ZERO_STRUCTP(q_l);
1226
1227         memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
1228         init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
1229         
1230         q_l->level = level;
1231 }
1232
1233 /*******************************************************************
1234  Reads or writes a LSA_Q_LOOKUP_SIDS structure.
1235 ********************************************************************/
1236
1237 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
1238                           int depth)
1239 {
1240         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
1241         depth++;
1242
1243         if(!prs_align(ps))
1244                 return False;
1245         
1246         if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1247                 return False;
1248         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1249                 return False;
1250         if(!lsa_io_trans_names("names  ", &q_s->names, ps, depth)) /* translated names */
1251                 return False;
1252
1253         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1254                 return False;
1255         if(!prs_align(ps))
1256                 return False;
1257
1258         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1259                 return False;
1260
1261         return True;
1262 }
1263
1264 /*******************************************************************
1265  Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1266 ********************************************************************/
1267
1268 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1269                           int depth)
1270 {
1271         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1272         depth++;
1273
1274         if(!prs_align(ps))
1275                 return False;
1276         
1277         if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1278                 return False;
1279         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1280                 return False;
1281         if(!lsa_io_trans_names2("names  ", &q_s->names, ps, depth)) /* translated names */
1282                 return False;
1283
1284         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1285                 return False;
1286         if(!prs_align(ps))
1287                 return False;
1288
1289         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1290                 return False;
1291         if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1292                 return False;
1293         if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1294                 return False;
1295
1296         return True;
1297 }
1298
1299 /*******************************************************************
1300  Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1301 ********************************************************************/
1302
1303 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1304                           int depth)
1305 {
1306         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1307         depth++;
1308
1309         if(!prs_align(ps))
1310                 return False;
1311         
1312         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1313                 return False;
1314         if(!lsa_io_trans_names2("names  ", &q_s->names, ps, depth)) /* translated names */
1315                 return False;
1316
1317         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1318                 return False;
1319         if(!prs_align(ps))
1320                 return False;
1321
1322         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1323                 return False;
1324         if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1325                 return False;
1326         if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1327                 return False;
1328
1329         return True;
1330 }
1331
1332
1333 /*******************************************************************
1334  Reads or writes a structure.
1335 ********************************************************************/
1336
1337 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1338                 prs_struct *ps, int depth)
1339 {
1340         unsigned int i;
1341
1342         prs_debug(ps, depth, desc, "lsa_io_trans_names");
1343         depth++;
1344
1345         if(!prs_align(ps))
1346                 return False;
1347    
1348         if(!prs_uint32("num_entries    ", ps, depth, &trn->num_entries))
1349                 return False;
1350         if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1351                 return False;
1352
1353         if (trn->ptr_trans_names != 0) {
1354                 if(!prs_uint32("num_entries2   ", ps, depth, 
1355                                &trn->num_entries2))
1356                         return False;
1357
1358                 if (trn->num_entries2 != trn->num_entries) {
1359                         /* RPC fault */
1360                         return False;
1361                 }
1362
1363                 if (UNMARSHALLING(ps) && trn->num_entries2) {
1364                         if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries2)) == NULL) {
1365                                 return False;
1366                         }
1367
1368                         if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1369                                 return False;
1370                         }
1371                 }
1372
1373                 for (i = 0; i < trn->num_entries2; i++) {
1374                         fstring t;
1375                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1376
1377                         if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1378                                 return False;
1379                 }
1380
1381                 for (i = 0; i < trn->num_entries2; i++) {
1382                         fstring t;
1383                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1384
1385                         if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1386                                 return False;
1387                         if(!prs_align(ps))
1388                                 return False;
1389                 }
1390         }
1391
1392         return True;
1393 }
1394
1395 /*******************************************************************
1396  Reads or writes a structure.
1397 ********************************************************************/
1398
1399 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1400                 prs_struct *ps, int depth)
1401 {
1402         unsigned int i;
1403
1404         prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1405         depth++;
1406
1407         if(!prs_align(ps))
1408                 return False;
1409    
1410         if(!prs_uint32("num_entries    ", ps, depth, &trn->num_entries))
1411                 return False;
1412         if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1413                 return False;
1414
1415         if (trn->ptr_trans_names != 0) {
1416                 if(!prs_uint32("num_entries2   ", ps, depth, 
1417                                &trn->num_entries2))
1418                         return False;
1419
1420                 if (trn->num_entries2 != trn->num_entries) {
1421                         /* RPC fault */
1422                         return False;
1423                 }
1424
1425                 if (UNMARSHALLING(ps) && trn->num_entries2) {
1426                         if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries2)) == NULL) {
1427                                 return False;
1428                         }
1429
1430                         if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1431                                 return False;
1432                         }
1433                 }
1434
1435                 for (i = 0; i < trn->num_entries2; i++) {
1436                         fstring t;
1437                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1438
1439                         if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1440                                 return False;
1441                 }
1442
1443                 for (i = 0; i < trn->num_entries2; i++) {
1444                         fstring t;
1445                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1446
1447                         if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1448                                 return False;
1449                         if(!prs_align(ps))
1450                                 return False;
1451                 }
1452         }
1453
1454         return True;
1455 }
1456
1457
1458 /*******************************************************************
1459  Reads or writes a structure.
1460 ********************************************************************/
1461
1462 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s, 
1463                           prs_struct *ps, int depth)
1464 {
1465         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1466         depth++;
1467
1468         if(!prs_align(ps))
1469                 return False;
1470         
1471         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1472                 return False;
1473
1474         if (r_s->ptr_dom_ref != 0)
1475                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1476                         return False;
1477
1478         if(!lsa_io_trans_names("names  ", &r_s->names, ps, depth)) /* translated names */
1479                 return False;
1480
1481         if(!prs_align(ps))
1482                 return False;
1483
1484         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1485                 return False;
1486
1487         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1488                 return False;
1489
1490         return True;
1491 }
1492
1493 /*******************************************************************
1494  Reads or writes a structure.
1495 ********************************************************************/
1496
1497 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s, 
1498                           prs_struct *ps, int depth)
1499 {
1500         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1501         depth++;
1502
1503         if(!prs_align(ps))
1504                 return False;
1505         
1506         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1507                 return False;
1508
1509         if (r_s->ptr_dom_ref != 0)
1510                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1511                         return False;
1512
1513         if(!lsa_io_trans_names2("names  ", &r_s->names, ps, depth)) /* translated names */
1514                 return False;
1515
1516         if(!prs_align(ps))
1517                 return False;
1518
1519         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1520                 return False;
1521
1522         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1523                 return False;
1524
1525         return True;
1526 }
1527
1528
1529 /*******************************************************************
1530  Reads or writes a structure.
1531 ********************************************************************/
1532
1533 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s, 
1534                           prs_struct *ps, int depth)
1535 {
1536         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1537         depth++;
1538
1539         if(!prs_align(ps))
1540                 return False;
1541         
1542         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1543                 return False;
1544
1545         if (r_s->ptr_dom_ref != 0)
1546                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1547                         return False;
1548
1549         if(!lsa_io_trans_names2("names  ", &r_s->names, ps, depth)) /* translated names */
1550                 return False;
1551
1552         if(!prs_align(ps))
1553                 return False;
1554
1555         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1556                 return False;
1557
1558         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1559                 return False;
1560
1561         return True;
1562 }
1563
1564 /*******************************************************************
1565 makes a structure.
1566 ********************************************************************/
1567
1568 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l, 
1569                          POLICY_HND *hnd, int num_names, const char **names, 
1570                          int level)
1571 {
1572         unsigned int i;
1573
1574         DEBUG(5, ("init_q_lookup_names\n"));
1575
1576         ZERO_STRUCTP(q_l);
1577
1578         q_l->pol = *hnd;
1579         q_l->num_entries = num_names;
1580         q_l->num_entries2 = num_names;
1581         q_l->lookup_level = level;
1582
1583         if (num_names) {
1584                 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1585                         DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1586                         return;
1587                 }
1588
1589                 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1590                         DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1591                         return;
1592                 }
1593         } else {
1594                 q_l->uni_name = NULL;
1595                 q_l->hdr_name = NULL;
1596         }
1597
1598         for (i = 0; i < num_names; i++) {
1599                 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1600                 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1601         }
1602 }
1603
1604 /*******************************************************************
1605 reads or writes a structure.
1606 ********************************************************************/
1607
1608 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r, 
1609                            prs_struct *ps, int depth)
1610 {
1611         unsigned int i;
1612
1613         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1614         depth++;
1615
1616         if(!prs_align(ps))
1617                 return False;
1618
1619         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1620                 return False;
1621
1622         if(!prs_align(ps))
1623                 return False;
1624         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1625                 return False;
1626         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1627                 return False;
1628
1629         if (UNMARSHALLING(ps)) {
1630                 if (q_r->num_entries) {
1631                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1632                                 return False;
1633                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1634                                 return False;
1635                 }
1636         }
1637
1638         for (i = 0; i < q_r->num_entries; i++) {
1639                 if(!prs_align(ps))
1640                         return False;
1641                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1642                         return False;
1643         }
1644
1645         for (i = 0; i < q_r->num_entries; i++) {
1646                 if(!prs_align(ps))
1647                         return False;
1648                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1649                         return False;
1650         }
1651
1652         if(!prs_align(ps))
1653                 return False;
1654         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1655                 return False;
1656         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1657                 return False;
1658         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1659                 return False;
1660         if(!prs_align(ps))
1661                 return False;
1662         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1663                 return False;
1664
1665         return True;
1666 }
1667
1668 /*******************************************************************
1669 reads or writes a structure.
1670 ********************************************************************/
1671
1672 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1673 {
1674         unsigned int i;
1675
1676         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1677         depth++;
1678
1679         if(!prs_align(ps))
1680                 return False;
1681
1682         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1683                 return False;
1684
1685         if (out->ptr_dom_ref != 0)
1686                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1687                         return False;
1688
1689         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1690                 return False;
1691         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1692                 return False;
1693
1694         if (out->ptr_entries != 0) {
1695                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1696                         return False;
1697
1698                 if (out->num_entries2 != out->num_entries) {
1699                         /* RPC fault */
1700                         return False;
1701                 }
1702
1703                 if (UNMARSHALLING(ps) && out->num_entries2) {
1704                         if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1705                             == NULL) {
1706                                 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1707                                 return False;
1708                         }
1709                 }
1710
1711                 for (i = 0; i < out->num_entries2; i++)
1712                         if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1713                                 return False;
1714         }
1715
1716         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1717                 return False;
1718
1719         if(!prs_ntstatus("status      ", ps, depth, &out->status))
1720                 return False;
1721
1722         return True;
1723 }
1724
1725 /*******************************************************************
1726 reads or writes a structure.
1727 ********************************************************************/
1728
1729 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r, 
1730                            prs_struct *ps, int depth)
1731 {
1732         unsigned int i;
1733
1734         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1735         depth++;
1736
1737         if(!prs_align(ps))
1738                 return False;
1739
1740         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1741                 return False;
1742
1743         if(!prs_align(ps))
1744                 return False;
1745         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1746                 return False;
1747         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1748                 return False;
1749
1750         if (UNMARSHALLING(ps)) {
1751                 if (q_r->num_entries) {
1752                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1753                                 return False;
1754                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1755                                 return False;
1756                 }
1757         }
1758
1759         for (i = 0; i < q_r->num_entries; i++) {
1760                 if(!prs_align(ps))
1761                         return False;
1762                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1763                         return False;
1764         }
1765
1766         for (i = 0; i < q_r->num_entries; i++) {
1767                 if(!prs_align(ps))
1768                         return False;
1769                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1770                         return False;
1771         }
1772
1773         if(!prs_align(ps))
1774                 return False;
1775         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1776                 return False;
1777         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1778                 return False;
1779         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1780                 return False;
1781         if(!prs_align(ps))
1782                 return False;
1783         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1784                 return False;
1785         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
1786                 return False;
1787         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
1788                 return False;
1789
1790         return True;
1791 }
1792
1793 /*******************************************************************
1794 reads or writes a structure.
1795 ********************************************************************/
1796
1797 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1798 {
1799         unsigned int i;
1800
1801         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1802         depth++;
1803
1804         if(!prs_align(ps))
1805                 return False;
1806
1807         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1808                 return False;
1809
1810         if (out->ptr_dom_ref != 0)
1811                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1812                         return False;
1813
1814         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1815                 return False;
1816         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1817                 return False;
1818
1819         if (out->ptr_entries != 0) {
1820                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1821                         return False;
1822
1823                 if (out->num_entries2 != out->num_entries) {
1824                         /* RPC fault */
1825                         return False;
1826                 }
1827
1828                 if (UNMARSHALLING(ps) && out->num_entries2) {
1829                         if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1830                             == NULL) {
1831                                 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1832                                 return False;
1833                         }
1834                 }
1835
1836                 for (i = 0; i < out->num_entries2; i++)
1837                         if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1838                                 return False;
1839         }
1840
1841         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1842                 return False;
1843
1844         if(!prs_ntstatus("status      ", ps, depth, &out->status))
1845                 return False;
1846
1847         return True;
1848 }
1849
1850 /*******************************************************************
1851  Internal lsa data type io.
1852  Following pass must read DOM_SID2 types.
1853 ********************************************************************/
1854
1855 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r, 
1856                            prs_struct *ps, int depth)
1857 {
1858         prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1859         depth++;
1860
1861         if(!prs_align(ps))
1862                 return False;
1863         if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1864                 return False;
1865         if(!prs_align(ps))
1866                 return False;
1867         /* Second pass will read/write these. */
1868         if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1869                 return False;
1870         if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1871                 return False;
1872         if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1873                 return False;
1874         
1875         return True;
1876 }
1877
1878 /*******************************************************************
1879  Identical to lsa_io_q_lookup_names2.
1880 ********************************************************************/
1881
1882 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r, 
1883                            prs_struct *ps, int depth)
1884 {
1885         unsigned int i;
1886
1887         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1888         depth++;
1889
1890         if(!prs_align(ps))
1891                 return False;
1892
1893         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1894                 return False;
1895
1896         if(!prs_align(ps))
1897                 return False;
1898         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1899                 return False;
1900         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1901                 return False;
1902
1903         if (UNMARSHALLING(ps)) {
1904                 if (q_r->num_entries) {
1905                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1906                                 return False;
1907                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1908                                 return False;
1909                 }
1910         }
1911
1912         for (i = 0; i < q_r->num_entries; i++) {
1913                 if(!prs_align(ps))
1914                         return False;
1915                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1916                         return False;
1917         }
1918
1919         for (i = 0; i < q_r->num_entries; i++) {
1920                 if(!prs_align(ps))
1921                         return False;
1922                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1923                         return False;
1924         }
1925
1926         if(!prs_align(ps))
1927                 return False;
1928         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1929                 return False;
1930         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1931                 return False;
1932         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1933                 return False;
1934         if(!prs_align(ps))
1935                 return False;
1936         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1937                 return False;
1938         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
1939                 return False;
1940         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
1941                 return False;
1942
1943         return True;
1944 }
1945
1946 /*******************************************************************
1947 reads or writes a structure.
1948 ********************************************************************/
1949
1950 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1951 {
1952         unsigned int i;
1953
1954         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1955         depth++;
1956
1957         if(!prs_align(ps))
1958                 return False;
1959
1960         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1961                 return False;
1962
1963         if (out->ptr_dom_ref != 0)
1964                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1965                         return False;
1966
1967         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1968                 return False;
1969         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1970                 return False;
1971
1972         if (out->ptr_entries != 0) {
1973                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1974                         return False;
1975
1976                 if (out->num_entries2 != out->num_entries) {
1977                         /* RPC fault */
1978                         return False;
1979                 }
1980
1981                 if (UNMARSHALLING(ps) && out->num_entries2) {
1982                         if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1983                             == NULL) {
1984                                 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1985                                 return False;
1986                         }
1987                 }
1988
1989                 for (i = 0; i < out->num_entries2; i++) {
1990                         if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1991                                 return False;
1992                         }
1993                 }
1994                 /* Now process the DOM_SID2 entries. */
1995                 for (i = 0; i < out->num_entries2; i++) {
1996                         if (out->trans_sids[i].sid2) {
1997                                 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1998                                         return False;
1999                                 }
2000                         }
2001                 }
2002         }
2003
2004         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2005                 return False;
2006
2007         if(!prs_ntstatus("status      ", ps, depth, &out->status))
2008                 return False;
2009
2010         return True;
2011 }
2012
2013 /*******************************************************************
2014 ********************************************************************/
2015
2016 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r, 
2017                            prs_struct *ps, int depth)
2018 {
2019         unsigned int i;
2020
2021         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names4");
2022         depth++;
2023
2024         if(!prs_align(ps))
2025                 return False;
2026
2027         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
2028                 return False;
2029         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
2030                 return False;
2031
2032         if (UNMARSHALLING(ps)) {
2033                 if (q_r->num_entries) {
2034                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
2035                                 return False;
2036                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
2037                                 return False;
2038                 }
2039         }
2040
2041         for (i = 0; i < q_r->num_entries; i++) {
2042                 if(!prs_align(ps))
2043                         return False;
2044                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
2045                         return False;
2046         }
2047
2048         for (i = 0; i < q_r->num_entries; i++) {
2049                 if(!prs_align(ps))
2050                         return False;
2051                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
2052                         return False;
2053         }
2054
2055         if(!prs_align(ps))
2056                 return False;
2057         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
2058                 return False;
2059         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
2060                 return False;
2061         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
2062                 return False;
2063         if(!prs_align(ps))
2064                 return False;
2065         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
2066                 return False;
2067         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
2068                 return False;
2069         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
2070                 return False;
2071
2072         return True;
2073 }
2074
2075 /*******************************************************************
2076  Identical to lsa_io_r_lookup_names3.
2077 ********************************************************************/
2078
2079 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
2080 {
2081         unsigned int i;
2082
2083         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
2084         depth++;
2085
2086         if(!prs_align(ps))
2087                 return False;
2088
2089         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
2090                 return False;
2091
2092         if (out->ptr_dom_ref != 0)
2093                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
2094                         return False;
2095
2096         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
2097                 return False;
2098         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
2099                 return False;
2100
2101         if (out->ptr_entries != 0) {
2102                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
2103                         return False;
2104
2105                 if (out->num_entries2 != out->num_entries) {
2106                         /* RPC fault */
2107                         return False;
2108                 }
2109
2110                 if (UNMARSHALLING(ps) && out->num_entries2) {
2111                         if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
2112                             == NULL) {
2113                                 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
2114                                 return False;
2115                         }
2116                 }
2117
2118                 for (i = 0; i < out->num_entries2; i++) {
2119                         if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
2120                                 return False;
2121                         }
2122                 }
2123                 /* Now process the DOM_SID2 entries. */
2124                 for (i = 0; i < out->num_entries2; i++) {
2125                         if (out->trans_sids[i].sid2) {
2126                                 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
2127                                         return False;
2128                                 }
2129                         }
2130                 }
2131         }
2132
2133         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2134                 return False;
2135
2136         if(!prs_ntstatus("status      ", ps, depth, &out->status))
2137                 return False;
2138
2139         return True;
2140 }
2141
2142 /*******************************************************************
2143  Reads or writes an LSA_Q_OPEN_SECRET structure.
2144 ********************************************************************/
2145
2146 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
2147 {
2148         prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
2149         depth++;
2150
2151         if(!prs_align(ps))
2152                 return False;
2153
2154         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
2155                 return False;
2156
2157         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
2158                 return False;
2159         if(!prs_align(ps))
2160                 return False;
2161
2162         if(!prs_uint32("access", ps, depth, &in->access))
2163                 return False;
2164
2165         return True;
2166 }
2167
2168 /*******************************************************************
2169  Reads or writes an LSA_R_OPEN_SECRET structure.
2170 ********************************************************************/
2171
2172 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
2173 {
2174         prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
2175         depth++;
2176
2177         if(!prs_align(ps))
2178                 return False;
2179    
2180         if(!smb_io_pol_hnd("", &out->handle, ps, depth))
2181                 return False;
2182
2183         if(!prs_ntstatus("status", ps, depth, &out->status))
2184                 return False;
2185
2186         return True;
2187 }
2188
2189 /*******************************************************************
2190  Inits an LSA_Q_ENUM_PRIVS structure.
2191 ********************************************************************/
2192
2193 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2194 {
2195         DEBUG(5, ("init_q_enum_privs\n"));
2196
2197         memcpy(&in->pol, hnd, sizeof(in->pol));
2198
2199         in->enum_context = enum_context;
2200         in->pref_max_length = pref_max_length;
2201 }
2202
2203 /*******************************************************************
2204 reads or writes a structure.
2205 ********************************************************************/
2206 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
2207 {
2208         if (in == NULL)
2209                 return False;
2210
2211         prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
2212         depth++;
2213
2214         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2215                 return False;
2216
2217         if(!prs_uint32("enum_context   ", ps, depth, &in->enum_context))
2218                 return False;
2219         if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2220                 return False;
2221
2222         return True;
2223 }
2224
2225 /*******************************************************************
2226 reads or writes a structure.
2227 ********************************************************************/
2228 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
2229 {
2230         uint32 i;
2231
2232         if (entries == NULL)
2233                 return False;
2234
2235         prs_debug(ps, depth, desc, "lsa_io_priv_entries");
2236         depth++;
2237
2238         if(!prs_align(ps))
2239                 return False;
2240
2241         for (i = 0; i < count; i++) {
2242                 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2243                         return False;
2244                 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2245                         return False;
2246                 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2247                         return False;
2248         }
2249
2250         for (i = 0; i < count; i++)
2251                 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2252                         return False;
2253
2254         return True;
2255 }
2256
2257 /*******************************************************************
2258  Inits an LSA_R_ENUM_PRIVS structure.
2259 ********************************************************************/
2260
2261 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2262                           uint32 count, LSA_PRIV_ENTRY *entries)
2263 {
2264         DEBUG(5, ("init_lsa_r_enum_privs\n"));
2265
2266         out->enum_context=enum_context;
2267         out->count=count;
2268         
2269         if (entries!=NULL) {
2270                 out->ptr=1;
2271                 out->count1=count;
2272                 out->privs=entries;
2273         } else {
2274                 out->ptr=0;
2275                 out->count1=0;
2276                 out->privs=NULL;
2277         }               
2278 }
2279
2280 /*******************************************************************
2281 reads or writes a structure.
2282 ********************************************************************/
2283 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2284 {
2285         if (out == NULL)
2286                 return False;
2287
2288         prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2289         depth++;
2290
2291         if(!prs_align(ps))
2292                 return False;
2293
2294         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2295                 return False;
2296         if(!prs_uint32("count", ps, depth, &out->count))
2297                 return False;
2298         if(!prs_uint32("ptr", ps, depth, &out->ptr))
2299                 return False;
2300
2301         if (out->ptr) {
2302                 if(!prs_uint32("count1", ps, depth, &out->count1))
2303                         return False;
2304
2305                 if (UNMARSHALLING(ps) && out->count1)
2306                         if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2307                                 return False;
2308
2309                 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2310                         return False;
2311         }
2312
2313         if(!prs_align(ps))
2314                 return False;
2315
2316         if(!prs_ntstatus("status", ps, depth, &out->status))
2317                 return False;
2318
2319         return True;
2320 }
2321
2322 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2323 {
2324         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2325
2326         init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2327         init_uni_hdr(&trn->hdr_name, &trn->name);
2328         trn->lang_id = lang_id;
2329         trn->lang_id_sys = lang_id_sys;
2330 }
2331
2332 /*******************************************************************
2333 reads or writes a structure.
2334 ********************************************************************/
2335 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2336 {
2337         if (in == NULL)
2338                 return False;
2339
2340         prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2341         depth++;
2342
2343         if(!prs_align(ps))
2344                 return False;
2345
2346         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2347                 return False;
2348
2349         if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2350                 return False;
2351
2352         if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2353                 return False;
2354
2355         if(!prs_uint16("lang_id    ", ps, depth, &in->lang_id))
2356                 return False;
2357         if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2358                 return False;
2359
2360         return True;
2361 }
2362
2363 /*******************************************************************
2364 reads or writes a structure.
2365 ********************************************************************/
2366 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2367 {
2368         if (out == NULL)
2369                 return False;
2370
2371         prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2372         depth++;
2373
2374         if (!prs_align(ps))
2375                 return False;
2376
2377         if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2378                 return False;
2379
2380         if (out->ptr_info){
2381                 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2382                         return False;
2383
2384                 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2385                         return False;
2386         }
2387 /*
2388         if(!prs_align(ps))
2389                 return False;
2390 */
2391         if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2392                 return False;
2393
2394         if(!prs_align(ps))
2395                 return False;
2396         if(!prs_ntstatus("status", ps, depth, &out->status))
2397                 return False;
2398
2399         return True;
2400 }
2401
2402 /*
2403   initialise a LSA_Q_ENUM_ACCOUNTS structure
2404 */
2405 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2406 {
2407         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2408
2409         trn->enum_context = enum_context;
2410         trn->pref_max_length = pref_max_length;
2411 }
2412
2413 /*******************************************************************
2414 reads or writes a structure.
2415 ********************************************************************/
2416 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2417 {
2418         if (in == NULL)
2419                 return False;
2420
2421         prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2422         depth++;
2423
2424         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2425                 return False;
2426
2427         if(!prs_uint32("enum_context   ", ps, depth, &in->enum_context))
2428                 return False;
2429         if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2430                 return False;
2431
2432         return True;
2433 }
2434
2435
2436 /*******************************************************************
2437  Inits an LSA_R_ENUM_PRIVS structure.
2438 ********************************************************************/
2439
2440 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2441 {
2442         DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2443
2444         out->enum_context=enum_context;
2445         if (out->enum_context!=0) {
2446                 out->sids.num_entries=enum_context;
2447                 out->sids.ptr_sid_enum=1;
2448                 out->sids.num_entries2=enum_context;
2449         } else {
2450                 out->sids.num_entries=0;
2451                 out->sids.ptr_sid_enum=0;
2452                 out->sids.num_entries2=0;
2453         }
2454 }
2455
2456 /*******************************************************************
2457 reads or writes a structure.
2458 ********************************************************************/
2459 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2460 {
2461         if (out == NULL)
2462                 return False;
2463
2464         prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2465         depth++;
2466
2467         if (!prs_align(ps))
2468                 return False;
2469
2470         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2471                 return False;
2472
2473         if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2474                 return False;
2475
2476         if (!prs_align(ps))
2477                 return False;
2478
2479         if(!prs_ntstatus("status", ps, depth, &out->status))
2480                 return False;
2481
2482         return True;
2483 }
2484
2485
2486 /*******************************************************************
2487  Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2488 ********************************************************************/
2489
2490 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2491 {
2492         prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2493         depth++;
2494
2495         if(!prs_align(ps))
2496                 return False;
2497    
2498         if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2499                 return False;
2500
2501         if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2502                 return False;
2503
2504         if (!prs_align(ps))
2505           return False;
2506
2507         if(!prs_uint32("unk1", ps, depth, &in->unk1))
2508                 return False;
2509         if(!prs_uint32("unk2", ps, depth, &in->unk2))
2510                 return False;
2511         if(!prs_uint32("unk3", ps, depth, &in->unk3))
2512                 return False;
2513
2514         /* Don't bother to read or write at present... */
2515         return True;
2516 }
2517
2518 /*******************************************************************
2519  Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2520 ********************************************************************/
2521
2522 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2523 {
2524         prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2525         depth++;
2526
2527         if(!prs_align(ps))
2528                 return False;
2529    
2530         if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2531                 return False;
2532         if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2533                 return False;
2534         if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2535                 return False;
2536
2537         if (!prs_align(ps))
2538           return False;
2539         
2540         if(!prs_uint32("unk1", ps, depth, &out->unk1))
2541                 return False;
2542
2543         if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2544                 return False;
2545         if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2546                 return False;
2547         if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2548                 return False;
2549
2550         if (!prs_align(ps))
2551           return False;
2552         
2553         if(!prs_ntstatus("status", ps, depth, &out->status))
2554                 return False;
2555
2556         return True;
2557 }
2558
2559 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2560 {
2561         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2562
2563         init_dom_sid2(&trn->sid, sid);
2564         trn->access = desired_access;
2565 }
2566
2567
2568 /*******************************************************************
2569  Reads or writes an LSA_Q_CREATEACCOUNT structure.
2570 ********************************************************************/
2571
2572 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2573 {
2574         prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2575         depth++;
2576
2577         if(!prs_align(ps))
2578                 return False;
2579  
2580         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2581                 return False;
2582
2583         if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2584                 return False;
2585
2586         if(!prs_uint32("access", ps, depth, &out->access))
2587                 return False;
2588   
2589         return True;
2590 }
2591
2592 /*******************************************************************
2593  Reads or writes an LSA_R_CREATEACCOUNT structure.
2594 ********************************************************************/
2595
2596 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT  *out, prs_struct *ps, int depth)
2597 {
2598         prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2599         depth++;
2600
2601         if(!prs_align(ps))
2602                 return False;
2603  
2604         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2605                 return False;
2606
2607         if(!prs_ntstatus("status", ps, depth, &out->status))
2608                 return False;
2609
2610         return True;
2611 }
2612
2613
2614 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2615 {
2616         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2617
2618         init_dom_sid2(&trn->sid, sid);
2619         trn->access = desired_access;
2620 }
2621
2622 /*******************************************************************
2623  Reads or writes an LSA_Q_OPENACCOUNT structure.
2624 ********************************************************************/
2625
2626 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2627 {
2628         prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2629         depth++;
2630
2631         if(!prs_align(ps))
2632                 return False;
2633  
2634         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2635                 return False;
2636
2637         if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2638                 return False;
2639
2640         if(!prs_uint32("access", ps, depth, &out->access))
2641                 return False;
2642   
2643         return True;
2644 }
2645
2646 /*******************************************************************
2647  Reads or writes an LSA_R_OPENACCOUNT structure.
2648 ********************************************************************/
2649
2650 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT  *out, prs_struct *ps, int depth)
2651 {
2652         prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2653         depth++;
2654
2655         if(!prs_align(ps))
2656                 return False;
2657  
2658         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2659                 return False;
2660
2661         if(!prs_ntstatus("status", ps, depth, &out->status))
2662                 return False;
2663
2664         return True;
2665 }
2666
2667
2668 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2669 {
2670         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2671
2672 }
2673
2674 /*******************************************************************
2675  Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2676 ********************************************************************/
2677
2678 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2679 {
2680         prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2681         depth++;
2682
2683         if(!prs_align(ps))
2684                 return False;
2685  
2686         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2687                 return False;
2688
2689         return True;
2690 }
2691
2692 /*******************************************************************
2693  Reads or writes an LUID structure.
2694 ********************************************************************/
2695
2696 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2697 {
2698         prs_debug(ps, depth, desc, "lsa_io_luid");
2699         depth++;
2700
2701         if(!prs_align(ps))
2702                 return False;
2703  
2704         if(!prs_uint32("low", ps, depth, &out->low))
2705                 return False;
2706
2707         if(!prs_uint32("high", ps, depth, &out->high))
2708                 return False;
2709
2710         return True;
2711 }
2712
2713 /*******************************************************************
2714  Reads or writes an LUID_ATTR structure.
2715 ********************************************************************/
2716
2717 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2718 {
2719         prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2720         depth++;
2721
2722         if(!prs_align(ps))
2723                 return False;
2724  
2725         if (!lsa_io_luid(desc, &out->luid, ps, depth))
2726                 return False;
2727
2728         if(!prs_uint32("attr", ps, depth, &out->attr))
2729                 return False;
2730
2731         return True;
2732 }
2733
2734 /*******************************************************************
2735  Reads or writes an PRIVILEGE_SET structure.
2736 ********************************************************************/
2737
2738 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2739 {
2740         uint32 i, dummy;
2741
2742         prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2743         depth++;
2744
2745         if(!prs_align(ps))
2746                 return False;
2747  
2748         if(!prs_uint32("count", ps, depth, &dummy))
2749                 return False;
2750         if(!prs_uint32("control", ps, depth, &out->control))
2751                 return False;
2752
2753         for (i=0; i<out->count; i++) {
2754                 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2755                         return False;
2756         }
2757         
2758         return True;
2759 }
2760
2761 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2762 {
2763         NTSTATUS ret = NT_STATUS_OK;
2764
2765         out->ptr = 1;
2766         out->count = count;
2767
2768         if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2769                 return ret;
2770         
2771         out->set.count = count;
2772         
2773         if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2774                 return ret;
2775
2776         DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2777
2778         return ret;
2779 }
2780
2781 /*******************************************************************
2782  Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2783 ********************************************************************/
2784
2785 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2786 {
2787         prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2788         depth++;
2789
2790         if(!prs_align(ps))
2791                 return False;
2792  
2793         if(!prs_uint32("ptr", ps, depth, &out->ptr))
2794                 return False;
2795
2796         if (out->ptr!=0) {
2797                 if(!prs_uint32("count", ps, depth, &out->count))
2798                         return False;
2799
2800                 /* malloc memory if unmarshalling here */
2801
2802                 if (UNMARSHALLING(ps) && out->count != 0) {
2803                         if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2804                                 return False;
2805
2806                         if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2807                                 return False;
2808
2809                 }
2810                 
2811                 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2812                         return False;
2813         }
2814
2815         if(!prs_ntstatus("status", ps, depth, &out->status))
2816                 return False;
2817
2818         return True;
2819 }
2820
2821
2822
2823 /*******************************************************************
2824  Reads or writes an  LSA_Q_GETSYSTEMACCOUNTstructure.
2825 ********************************************************************/
2826
2827 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2828 {
2829         prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2830         depth++;
2831
2832         if(!prs_align(ps))
2833                 return False;
2834  
2835         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2836                 return False;
2837
2838         return True;
2839 }
2840
2841 /*******************************************************************
2842  Reads or writes an  LSA_R_GETSYSTEMACCOUNTstructure.
2843 ********************************************************************/
2844
2845 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2846 {
2847         prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2848         depth++;
2849
2850         if(!prs_align(ps))
2851                 return False;
2852  
2853         if(!prs_uint32("access", ps, depth, &out->access))
2854                 return False;
2855
2856         if(!prs_ntstatus("status", ps, depth, &out->status))
2857                 return False;
2858
2859         return True;
2860 }
2861
2862
2863 /*******************************************************************
2864  Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2865 ********************************************************************/
2866
2867 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2868 {
2869         prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2870         depth++;
2871
2872         if(!prs_align(ps))
2873                 return False;
2874  
2875         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2876                 return False;
2877
2878         if(!prs_uint32("access", ps, depth, &out->access))
2879                 return False;
2880
2881         return True;
2882 }
2883
2884 /*******************************************************************
2885  Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2886 ********************************************************************/
2887
2888 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2889 {
2890         prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2891         depth++;
2892
2893         if(!prs_align(ps))
2894                 return False;
2895  
2896         if(!prs_ntstatus("status", ps, depth, &out->status))
2897                 return False;
2898
2899         return True;
2900 }
2901
2902
2903 void init_lsa_string( LSA_STRING *uni, const char *string )
2904 {
2905         init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2906         init_uni_hdr(&uni->hdr, &uni->unistring);
2907 }
2908
2909 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2910 {
2911         memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2912         init_lsa_string( &q_u->privname, name );
2913 }
2914
2915 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2916 {
2917         prs_debug(ps, depth, desc, "smb_io_lsa_string");
2918         depth++;
2919
2920         if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2921                 return False;
2922         if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2923                 return False;
2924         
2925         return True;
2926 }
2927
2928 /*******************************************************************
2929  Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE  structure.
2930 ********************************************************************/
2931
2932 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE  *out, prs_struct *ps, int depth)
2933 {
2934         prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2935         depth++;
2936
2937         if(!prs_align(ps))
2938                 return False;
2939  
2940         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2941                 return False;
2942         if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2943                 return False;
2944
2945         return True;
2946 }
2947
2948 /*******************************************************************
2949  Reads or writes an  LSA_R_LOOKUP_PRIV_VALUE structure.
2950 ********************************************************************/
2951
2952 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE  *out, prs_struct *ps, int depth)
2953 {
2954         prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2955         depth++;
2956
2957         if(!prs_align(ps))
2958                 return False;
2959                 
2960         if(!lsa_io_luid("luid", &out->luid, ps, depth))
2961                 return False;
2962  
2963         if(!prs_ntstatus("status", ps, depth, &out->status))
2964                 return False;
2965
2966         return True;
2967 }
2968
2969
2970 /*******************************************************************
2971  Reads or writes an LSA_Q_ADDPRIVS structure.
2972 ********************************************************************/
2973
2974 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
2975 {
2976         prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
2977         depth++;
2978
2979         if(!prs_align(ps))
2980                 return False;
2981  
2982         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2983                 return False;
2984         
2985         if(!prs_uint32("count", ps, depth, &out->count))
2986                 return False;
2987
2988         if (UNMARSHALLING(ps) && out->count!=0) {
2989                 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2990                         return False;
2991                 
2992                 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
2993                         return False;
2994         }
2995         
2996         if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2997                 return False;
2998         
2999         return True;
3000 }
3001
3002 /*******************************************************************
3003  Reads or writes an LSA_R_ADDPRIVS structure.
3004 ********************************************************************/
3005
3006 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
3007 {
3008         prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
3009         depth++;
3010
3011         if(!prs_align(ps))
3012                 return False;
3013  
3014         if(!prs_ntstatus("status", ps, depth, &out->status))
3015                 return False;
3016
3017         return True;
3018 }
3019
3020 /*******************************************************************
3021  Reads or writes an LSA_Q_REMOVEPRIVS structure.
3022 ********************************************************************/
3023
3024 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
3025 {
3026         prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
3027         depth++;
3028
3029         if(!prs_align(ps))
3030                 return False;
3031  
3032         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3033                 return False;
3034         
3035         if(!prs_uint32("allrights", ps, depth, &out->allrights))
3036                 return False;
3037
3038         if(!prs_uint32("ptr", ps, depth, &out->ptr))
3039                 return False;
3040
3041         /* 
3042          * JFM: I'm not sure at all if the count is inside the ptr
3043          * never seen one with ptr=0
3044          */
3045
3046         if (out->ptr!=0) {
3047                 if(!prs_uint32("count", ps, depth, &out->count))
3048                         return False;
3049
3050                 if (UNMARSHALLING(ps) && out->count!=0) {
3051                         if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3052                                 return False;
3053
3054                         if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3055                                 return False;
3056                 }
3057
3058                 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3059                         return False;
3060         }
3061
3062         return True;
3063 }
3064
3065 /*******************************************************************
3066  Reads or writes an LSA_R_REMOVEPRIVS structure.
3067 ********************************************************************/
3068
3069 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
3070 {
3071         prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
3072         depth++;
3073
3074         if(!prs_align(ps))
3075                 return False;
3076  
3077         if(!prs_ntstatus("status", ps, depth, &out->status))
3078                 return False;
3079
3080         return True;
3081 }
3082
3083 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
3084 {
3085         POLICY_HND zero_pol;
3086
3087         ZERO_STRUCT(zero_pol);
3088         return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
3089 }
3090
3091 /*******************************************************************
3092  Inits an LSA_Q_QUERY_INFO2 structure.
3093 ********************************************************************/
3094
3095 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
3096 {
3097         DEBUG(5, ("init_q_query2\n"));
3098
3099         memcpy(&in->pol, hnd, sizeof(in->pol));
3100
3101         in->info_class = info_class;
3102 }
3103
3104 /*******************************************************************
3105  Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
3106 ********************************************************************/
3107
3108 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
3109 {
3110         prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
3111         depth++;
3112
3113         if(!prs_align(ps))
3114                 return False;
3115  
3116         if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3117                 return False;
3118         
3119         if(!prs_uint16("info_class", ps, depth, &in->info_class))
3120                 return False;
3121
3122         return True;
3123 }
3124
3125 /*******************************************************************
3126  Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
3127 ********************************************************************/
3128
3129 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
3130                           prs_struct *ps, int depth)
3131 {
3132         prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
3133         depth++;
3134
3135         if(!prs_align(ps))
3136                 return False;
3137
3138         if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
3139                 return False;
3140
3141         if (out->dom_ptr) {
3142
3143                 if(!lsa_io_query_info_ctr2("", ps, depth, &out->ctr))
3144                         return False;
3145         }
3146
3147         if(!prs_align(ps))
3148                 return False;
3149         if(!prs_ntstatus("status", ps, depth, &out->status))
3150                 return False;
3151
3152         return True;
3153 }
3154
3155 /*******************************************************************
3156  Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
3157 ********************************************************************/
3158 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in, 
3159                              POLICY_HND *hnd, 
3160                              uint32 count, 
3161                              DOM_SID *sid)
3162 {
3163         DEBUG(5, ("init_q_enum_acct_rights\n"));
3164
3165         in->pol = *hnd;
3166         init_dom_sid2(&in->sid, sid);
3167 }
3168
3169 /*******************************************************************
3170 ********************************************************************/
3171 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
3172 {
3173         uint32 i;
3174         const char *privname;
3175         const char **privname_array = NULL;
3176         int num_priv = 0;
3177
3178         for ( i=0; i<privileges->count; i++ ) {
3179                 privname = luid_to_privilege_name( &privileges->set[i].luid );
3180                 if ( privname ) {
3181                         if ( !add_string_to_array( talloc_tos(), privname, &privname_array, &num_priv ) )
3182                                 return NT_STATUS_NO_MEMORY;
3183                 }
3184         }
3185
3186         if ( num_priv ) {
3187                 out->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3188                 if (!out->rights) {
3189                         return NT_STATUS_NO_MEMORY;
3190                 }
3191
3192                 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) ) 
3193                         return NT_STATUS_NO_MEMORY;
3194
3195                 out->count = num_priv;
3196         }
3197
3198         return NT_STATUS_OK;
3199 }
3200
3201 /*******************************************************************
3202 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3203 ********************************************************************/
3204 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3205 {
3206         
3207         if (in == NULL)
3208                 return False;
3209
3210         prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3211         depth++;
3212
3213         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3214                 return False;
3215
3216         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3217                 return False;
3218
3219         return True;
3220 }
3221
3222
3223 /*******************************************************************
3224 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3225 ********************************************************************/
3226 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3227 {
3228         prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3229         depth++;
3230
3231         if(!prs_uint32("count   ", ps, depth, &out->count))
3232                 return False;
3233
3234         if ( !prs_pointer("rights", ps, depth, (void*)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3235                 return False;
3236
3237         if(!prs_align(ps))
3238                 return False;
3239
3240         if(!prs_ntstatus("status", ps, depth, &out->status))
3241                 return False;
3242
3243         return True;
3244 }
3245
3246
3247 /*******************************************************************
3248  Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3249 ********************************************************************/
3250 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd, 
3251                              DOM_SID *sid, uint32 count, const char **rights )
3252 {
3253         DEBUG(5, ("init_q_add_acct_rights\n"));
3254
3255         in->pol = *hnd;
3256         init_dom_sid2(&in->sid, sid);
3257         
3258         in->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3259         if (!in->rights) {
3260                 smb_panic("init_q_add_acct_rights: talloc fail\n");
3261                 return;
3262         }
3263         init_unistr4_array( in->rights, count, rights );
3264         
3265         in->count = count;
3266 }
3267
3268
3269 /*******************************************************************
3270 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3271 ********************************************************************/
3272 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3273 {
3274         prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3275         depth++;
3276
3277         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3278                 return False;
3279
3280         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3281                 return False;
3282
3283         if(!prs_uint32("count", ps, depth, &in->count))
3284                 return False;
3285
3286         if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3287                 return False;
3288
3289         return True;
3290 }
3291
3292 /*******************************************************************
3293 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3294 ********************************************************************/
3295 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3296 {
3297         prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3298         depth++;
3299
3300         if(!prs_ntstatus("status", ps, depth, &out->status))
3301                 return False;
3302
3303         return True;
3304 }
3305
3306 /*******************************************************************
3307  Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3308 ********************************************************************/
3309
3310 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in, 
3311                                POLICY_HND *hnd, 
3312                                DOM_SID *sid,
3313                                uint32 removeall,
3314                                uint32 count, 
3315                                const char **rights)
3316 {
3317         DEBUG(5, ("init_q_remove_acct_rights\n"));
3318
3319         in->pol = *hnd;
3320
3321         init_dom_sid2(&in->sid, sid);
3322
3323         in->removeall = removeall;
3324         in->count = count;
3325
3326         in->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3327         if (!in->rights) {
3328                 smb_panic("init_q_remove_acct_rights: talloc fail\n");
3329                 return;
3330         }
3331         init_unistr4_array( in->rights, count, rights );
3332 }
3333
3334 /*******************************************************************
3335 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3336 ********************************************************************/
3337
3338 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3339 {
3340         prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3341         depth++;
3342
3343         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3344                 return False;
3345
3346         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3347                 return False;
3348
3349         if(!prs_uint32("removeall", ps, depth, &in->removeall))
3350                 return False;
3351
3352         if(!prs_uint32("count", ps, depth, &in->count))
3353                 return False;
3354
3355         if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3356                 return False;
3357
3358         return True;
3359 }
3360
3361 /*******************************************************************
3362 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3363 ********************************************************************/
3364 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3365 {
3366         prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3367         depth++;
3368
3369         if(!prs_ntstatus("status", ps, depth, &out->status))
3370                 return False;
3371
3372         return True;
3373 }
3374
3375 /*******************************************************************
3376  Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3377 ********************************************************************/
3378
3379 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3380 {
3381         memcpy(&q->pol, hnd, sizeof(q->pol));
3382
3383         init_dom_sid2(&q->sid, sid);
3384         q->access_mask = desired_access;
3385 }
3386
3387 /*******************************************************************
3388 ********************************************************************/
3389
3390 #if 0 /* jerry, I think this not correct - gd */
3391 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3392 {
3393         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3394         depth++;
3395
3396         if(!prs_align(ps))
3397                 return False;
3398
3399         if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3400                 return False;
3401
3402         if(!prs_uint32("count", ps, depth, &in->count))
3403                 return False;
3404
3405         if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3406                 return False;
3407
3408         return True;
3409 }
3410 #endif
3411
3412
3413 /*******************************************************************
3414  Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3415 ********************************************************************/
3416
3417 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q, 
3418                                             POLICY_HND *hnd, 
3419                                             const char *name, 
3420                                             uint32 desired_access)
3421 {
3422         memcpy(&q->pol, hnd, sizeof(q->pol));
3423
3424         init_lsa_string(&q->name, name);
3425         q->access_mask = desired_access;
3426 }
3427
3428 /*******************************************************************
3429 ********************************************************************/
3430
3431
3432 /*******************************************************************
3433  Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3434 ********************************************************************/
3435
3436 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3437 {
3438         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3439         depth++;
3440
3441         if(!prs_align(ps))
3442                 return False;
3443  
3444         if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3445                 return False;
3446
3447         if(!prs_align(ps))
3448                 return False;
3449
3450         if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3451                 return False;
3452
3453         if(!prs_align(ps))
3454                 return False;
3455
3456         if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3457                 return False;
3458
3459         return True;
3460 }
3461
3462 /*******************************************************************
3463  Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3464 ********************************************************************/
3465
3466 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3467 {
3468         prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3469         depth++;
3470
3471         if(!prs_align(ps))
3472                 return False;
3473
3474         if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3475                 return False;
3476
3477         if(!prs_ntstatus("status", ps, depth, &out->status))
3478                 return False;
3479
3480         return True;
3481 }
3482
3483 /*******************************************************************
3484 ********************************************************************/
3485
3486 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3487 {
3488         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3489         depth++;
3490
3491         if(!prs_align(ps))
3492                 return False;
3493  
3494         if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3495                 return False;
3496
3497         if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3498                 return False;
3499
3500         if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3501                 return False;
3502   
3503         return True;
3504 }
3505
3506 /*******************************************************************
3507  Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3508 ********************************************************************/
3509
3510 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3511 {
3512         prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3513         depth++;
3514
3515         if(!prs_align(ps))
3516                 return False;
3517
3518         if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3519                 return False;
3520
3521         if(!prs_ntstatus("status", ps, depth, &out->status))
3522                 return False;
3523
3524         return True;
3525 }
3526
3527 /*******************************************************************
3528 ********************************************************************/
3529
3530 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3531 {
3532         prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3533         depth++;
3534
3535         if(!prs_align(ps))
3536                 return False;
3537
3538         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3539                 return False;
3540
3541         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3542                 return False;
3543         if(!prs_align(ps))
3544                 return False;
3545
3546         if(!prs_uint32("access", ps, depth, &in->access))
3547                 return False;
3548
3549         return True;
3550 }
3551
3552 /*******************************************************************
3553 ********************************************************************/
3554
3555 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3556 {
3557         prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3558         depth++;
3559
3560         if(!prs_align(ps))
3561                 return False;
3562
3563         if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3564                 return False;
3565
3566         if(!prs_ntstatus("status", ps, depth, &out->status))
3567                 return False;
3568
3569         return True;
3570 }
3571
3572 /*******************************************************************
3573 ********************************************************************/
3574
3575 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3576 {
3577         prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3578         depth++;
3579
3580         if(!prs_align(ps))
3581                 return False;
3582
3583         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3584                 return False;
3585
3586         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3587                 return False;
3588         if(!prs_align(ps))
3589                 return False;
3590
3591         if(!prs_uint32("access", ps, depth, &in->access))
3592                 return False;
3593
3594         return True;
3595 }
3596
3597 /*******************************************************************
3598 ********************************************************************/
3599
3600 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3601 {
3602         prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3603         depth++;
3604
3605         if(!prs_align(ps))
3606                 return False;
3607
3608         if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3609                 return False;
3610
3611         if(!prs_ntstatus("status", ps, depth, &out->status))
3612                 return False;
3613
3614         return True;
3615 }
3616
3617
3618
3619 /*******************************************************************
3620 ********************************************************************/
3621
3622 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3623 {
3624         prs_debug(ps, depth, desc, "lsa_io_data_blob");
3625         depth++;
3626
3627         if ( !prs_uint32("size", ps, depth, &blob->size) )
3628                 return False;
3629         if ( !prs_uint32("size", ps, depth, &blob->size) )
3630                 return False;
3631
3632         if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3633                 return False;
3634
3635         return True;
3636 }
3637
3638 /*******************************************************************
3639 ********************************************************************/
3640
3641 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3642 {
3643         prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3644         depth++;
3645
3646         if ( !prs_align(ps) )
3647                 return False;
3648
3649         if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3650                 return False;
3651
3652         if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3653                 return False;
3654
3655         if( !prs_align(ps) )
3656                 return False;
3657         if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3658                 return False;
3659
3660
3661         return True;
3662 }
3663
3664 /*******************************************************************
3665 ********************************************************************/
3666
3667 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3668 {
3669         prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3670         depth++;
3671
3672         if(!prs_ntstatus("status", ps, depth, &out->status))
3673                 return False;
3674
3675         return True;
3676 }
3677
3678 /*******************************************************************
3679 ********************************************************************/
3680
3681 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3682 {
3683         prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3684         depth++;
3685
3686         if(!prs_align(ps))
3687                 return False;
3688
3689         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3690                 return False;
3691
3692         return True;
3693 }
3694
3695 /*******************************************************************
3696 ********************************************************************/
3697
3698 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3699 {
3700         prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3701         depth++;
3702
3703         if(!prs_ntstatus("status", ps, depth, &out->status))
3704                 return False;
3705
3706         return True;
3707 }
3708
3709 /*******************************************************************
3710  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3711 ********************************************************************/
3712
3713 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q, 
3714                                       POLICY_HND *hnd, uint16 info_class) 
3715 {
3716         DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3717         
3718         q->pol = *hnd;
3719         q->info_class = info_class;
3720 }
3721
3722 /*******************************************************************
3723  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3724 ********************************************************************/
3725
3726 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q, 
3727                                               POLICY_HND *hnd, uint16 info_class, 
3728                                               const char *dom_name)
3729 {
3730         DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3731         
3732         q->pol = *hnd;
3733         init_lsa_string(&q->domain_name, dom_name );
3734         q->info_class = info_class;
3735 }
3736
3737 /*******************************************************************
3738  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3739 ********************************************************************/
3740
3741 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q, 
3742                                              POLICY_HND *hnd, uint16 info_class, 
3743                                              DOM_SID *dom_sid)
3744 {
3745         DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3746         
3747         q->pol = *hnd;
3748         init_dom_sid2(&q->dom_sid, dom_sid);
3749         q->info_class = info_class;
3750 }
3751
3752 /*******************************************************************
3753  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3754 ********************************************************************/
3755
3756 BOOL lsa_io_q_query_trusted_domain_info(const char *desc, 
3757                                         LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3758                                         prs_struct *ps, int depth)
3759 {
3760         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3761         depth++;
3762
3763         if(!prs_align(ps))
3764                 return False;
3765
3766         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3767                 return False;
3768
3769         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3770                 return False;
3771
3772         return True;
3773 }
3774
3775
3776 /*******************************************************************
3777  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3778 ********************************************************************/
3779
3780 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc, 
3781                                                LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3782                                                prs_struct *ps, int depth)
3783 {
3784         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3785         depth++;
3786
3787         if(!prs_align(ps))
3788                 return False;
3789
3790         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3791                 return False;
3792
3793         if(!prs_align(ps))
3794                 return False;
3795
3796         if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3797                 return False;
3798
3799         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3800                 return False;
3801
3802         return True;
3803 }
3804
3805 /*******************************************************************
3806  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3807 ********************************************************************/
3808
3809 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc, 
3810                                                 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3811                                                 prs_struct *ps, int depth)
3812 {
3813         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3814         depth++;
3815
3816         if(!prs_align(ps))
3817                 return False;
3818
3819         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3820                 return False;
3821
3822         if(!prs_align(ps))
3823                 return False;
3824
3825         if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3826                 return False;
3827
3828         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3829                 return False;
3830
3831         return True;
3832 }
3833
3834 /*******************************************************************
3835 ********************************************************************/
3836
3837 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr, 
3838                                     prs_struct *ps, int depth)
3839 {
3840         prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3841         depth++;
3842
3843         if(!prs_align(ps))
3844                 return False;
3845
3846         if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3847                 return False;
3848         
3849         if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3850                 return False;
3851
3852         if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3853                 return False;
3854
3855         return True;
3856 }
3857
3858 /*******************************************************************
3859 ********************************************************************/
3860
3861 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf, 
3862                                 prs_struct *ps, int depth, int length, int size)
3863 {
3864         prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3865         depth++;
3866
3867         if ( UNMARSHALLING(ps) && length ) {
3868                 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3869                         return False;
3870         }
3871
3872         if (!prs_uint32("size", ps, depth, &buf->size))
3873                 return False;
3874
3875         if (!prs_uint32("offset", ps, depth, &buf->offset))
3876                 return False;
3877
3878         if (!prs_uint32("length", ps, depth, &buf->length))
3879                 return False;
3880
3881         if(!prs_uint8s(False, "data", ps, depth, buf->data, length))
3882                 return False;
3883
3884         return True;
3885 }
3886
3887 /*******************************************************************
3888 ********************************************************************/
3889
3890 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name, 
3891                                     prs_struct *ps, int depth)
3892 {
3893         if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3894                 return False;
3895
3896         return True;
3897 }
3898
3899 /*******************************************************************
3900 ********************************************************************/
3901
3902 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix, 
3903                                     prs_struct *ps, int depth)
3904 {
3905         if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3906                 return False;
3907
3908         return True;
3909 }
3910
3911 /*******************************************************************
3912 ********************************************************************/
3913
3914 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password, 
3915                                     prs_struct *ps, int depth)
3916 {
3917         if(!prs_align(ps))
3918                 return False;
3919         
3920         if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3921                 return False;
3922
3923         if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3924                 return False;
3925
3926         if (&password->ptr_password) {
3927         
3928                 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3929                         return False;
3930
3931                 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth, 
3932                                         password->password_hdr.length, password->password_hdr.size))
3933                         return False;
3934         }
3935
3936         if (&password->ptr_old_password) {
3937
3938                 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3939                         return False;
3940
3941                 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth, 
3942                                         password->old_password_hdr.length, password->old_password_hdr.size))
3943                         return False;
3944         }
3945
3946         return True;
3947 }
3948
3949 /*******************************************************************
3950 ********************************************************************/
3951
3952 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex, 
3953                                     prs_struct *ps, int depth)
3954 {
3955         uint32 dom_sid_ptr;
3956         
3957         if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
3958                 return False;
3959                 
3960         if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
3961                 return False;
3962
3963         if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
3964                 return False;
3965
3966         if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
3967                 return False;
3968
3969         if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
3970                 return False;
3971
3972         if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
3973                 return False;
3974                 
3975         if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
3976                 return False;
3977                 
3978         if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
3979                 return False;
3980
3981         if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
3982                 return False;
3983
3984         return True;
3985 }
3986
3987 /*******************************************************************
3988 ********************************************************************/
3989
3990 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
3991 {
3992         prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
3993         depth++;
3994
3995         if(!prs_uint16("info_class", ps, depth, &info->info_class))
3996                 return False;
3997
3998         if(!prs_align(ps))
3999                 return False;
4000
4001         switch (info->info_class) {
4002         case 1:
4003                 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
4004                         return False;
4005                 break;
4006         case 3:
4007                 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
4008                         return False;
4009                 break;
4010         case 4:
4011                 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
4012                         return False;
4013                 break;
4014         case 6:
4015                 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
4016                         return False;
4017                 break;
4018         default:
4019                 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4020                 return False;
4021         }
4022
4023         return True;
4024 }
4025
4026 /*******************************************************************
4027  Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
4028 ********************************************************************/
4029
4030 BOOL lsa_io_r_query_trusted_domain_info(const char *desc, 
4031                                         LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q, 
4032                                         prs_struct *ps, int depth)
4033 {
4034         if (r_q == NULL)
4035                 return False;
4036
4037         prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
4038         depth++;
4039
4040         if (!prs_pointer("trustdom", ps, depth, (void*)&r_q->info, 
4041                          sizeof(LSA_TRUSTED_DOMAIN_INFO), 
4042                          (PRS_POINTER_CAST)lsa_io_trustdom_query) )
4043                 return False;
4044
4045         if(!prs_align(ps))
4046                 return False;
4047
4048         if(!prs_ntstatus("status", ps, depth, &r_q->status))
4049                 return False;
4050
4051         return True;
4052 }
4053
4054 /*******************************************************************
4055  Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4056 ********************************************************************/
4057
4058 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
4059 {
4060         DEBUG(5, ("init_q_query_dom_info\n"));
4061
4062         memcpy(&in->pol, hnd, sizeof(in->pol));
4063
4064         in->info_class = info_class;
4065 }
4066
4067 /*******************************************************************
4068  Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4069 ********************************************************************/
4070
4071 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
4072 {
4073         prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
4074         depth++;
4075
4076         if(!prs_align(ps))
4077                 return False;
4078  
4079         if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
4080                 return False;
4081         
4082         if(!prs_uint16("info_class", ps, depth, &in->info_class))
4083                 return False;
4084
4085         return True;
4086 }
4087
4088 /*******************************************************************
4089  Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
4090 ********************************************************************/
4091
4092 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy, 
4093                                    prs_struct *ps, int depth)
4094 {
4095         if (!prs_align_uint64(ps))
4096                 return False;
4097
4098         if (!prs_align(ps))
4099                 return False;
4100
4101         if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
4102                 return False;
4103
4104         if (!prs_align_uint64(ps))
4105                 return False;
4106
4107         if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
4108                 return False;
4109
4110         if (!prs_align_uint64(ps))
4111                 return False;
4112         
4113         if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
4114                 return False;
4115
4116         if (!prs_align_uint64(ps))
4117                 return False;
4118         
4119         if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
4120                 return False;
4121
4122         if (!prs_align_uint64(ps))
4123                 return False;
4124         
4125         if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
4126                 return False;
4127
4128         if (!prs_align_uint64(ps))
4129                 return False;
4130         
4131         if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
4132                 return False;
4133
4134         return True;
4135 }
4136
4137 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
4138 {
4139         prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
4140         depth++;
4141
4142         if(!prs_align_uint16(ps))
4143                 return False;
4144
4145         if(!prs_uint16("info_class", ps, depth, &info->info_class))
4146                 return False;
4147
4148         switch (info->info_class) {
4149         case 3: 
4150                 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
4151                         return False;
4152                 break;
4153         default:
4154                 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4155                 return False;
4156                 break;
4157         }
4158
4159         return True;
4160 }
4161
4162
4163 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
4164                              prs_struct *ps, int depth)
4165 {
4166         prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
4167         depth++;
4168
4169         if (!prs_pointer("dominfo", ps, depth, (void*)&out->info, 
4170                          sizeof(LSA_DOM_INFO_UNION), 
4171                          (PRS_POINTER_CAST)lsa_io_dom_info_query) )
4172                 return False;
4173         
4174         if(!prs_ntstatus("status", ps, depth, &out->status))
4175                 return False;
4176
4177         return True;
4178 }