2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1997,
5 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6 * Copyright (C) Paul Ashton 1997,
7 * Copyright (C) Andrew Bartlett 2002,
8 * Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2002.
9 * Copyright (C) Gerald )Jerry) Carter 2005
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
29 #define DBGC_CLASS DBGC_RPC_PARSE
31 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
32 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
34 /*******************************************************************
35 Inits a LSA_TRANS_NAME structure.
36 ********************************************************************/
38 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
39 uint16 sid_name_use, const char *name, uint32 idx)
41 trn->sid_name_use = sid_name_use;
42 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
43 init_uni_hdr(&trn->hdr_name, uni_name);
44 trn->domain_idx = idx;
47 /*******************************************************************
48 Reads or writes a LSA_TRANS_NAME structure.
49 ********************************************************************/
51 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps,
54 prs_debug(ps, depth, desc, "lsa_io_trans_name");
60 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
65 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
67 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
73 /*******************************************************************
74 Inits a LSA_TRANS_NAME2 structure.
75 ********************************************************************/
77 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
78 uint16 sid_name_use, const char *name, uint32 idx)
80 trn->sid_name_use = sid_name_use;
81 init_unistr2(uni_name, name, UNI_FLAGS_NONE);
82 init_uni_hdr(&trn->hdr_name, uni_name);
83 trn->domain_idx = idx;
87 /*******************************************************************
88 Reads or writes a LSA_TRANS_NAME2 structure.
89 ********************************************************************/
91 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps,
94 prs_debug(ps, depth, desc, "lsa_io_trans_name2");
100 if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
105 if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
107 if(!prs_uint32("domain_idx ", ps, depth, &trn->domain_idx))
109 if(!prs_uint32("unknown ", ps, depth, &trn->unknown))
115 /*******************************************************************
116 Reads or writes a DOM_R_REF structure.
117 ********************************************************************/
119 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
123 prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
129 if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
131 if(!prs_uint32("ptr_ref_dom ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
133 if(!prs_uint32("max_entries ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
136 SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
138 if (dom->ptr_ref_dom != 0) {
140 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
143 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
145 for (i = 0; i < dom->num_ref_doms_1; i++) {
148 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
149 if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
152 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
153 if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
157 for (i = 0; i < dom->num_ref_doms_2; i++) {
160 if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
161 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
162 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
168 if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
169 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
170 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
179 /*******************************************************************
180 Inits an LSA_SEC_QOS structure.
181 ********************************************************************/
183 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
185 DEBUG(5, ("init_lsa_sec_qos\n"));
187 qos->len = 0x0c; /* length of quality of service block, in bytes */
188 qos->sec_imp_level = imp_lev;
189 qos->sec_ctxt_mode = ctxt;
190 qos->effective_only = eff;
193 /*******************************************************************
194 Reads or writes an LSA_SEC_QOS structure.
195 ********************************************************************/
197 static BOOL lsa_io_sec_qos(const char *desc, LSA_SEC_QOS *qos, prs_struct *ps,
202 prs_debug(ps, depth, desc, "lsa_io_obj_qos");
208 start = prs_offset(ps);
210 /* these pointers had _better_ be zero, because we don't know
213 if(!prs_uint32("len ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
215 if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
217 if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
219 if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
222 if (qos->len != prs_offset(ps) - start) {
223 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
224 qos->len, prs_offset(ps) - start));
230 /*******************************************************************
231 Inits an LSA_OBJ_ATTR structure.
232 ********************************************************************/
234 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
236 DEBUG(5, ("init_lsa_obj_attr\n"));
238 attr->len = 0x18; /* length of object attribute block, in bytes */
239 attr->ptr_root_dir = 0;
240 attr->ptr_obj_name = 0;
241 attr->attributes = attributes;
242 attr->ptr_sec_desc = 0;
245 attr->ptr_sec_qos = 1;
248 attr->ptr_sec_qos = 0;
249 attr->sec_qos = NULL;
253 /*******************************************************************
254 Reads or writes an LSA_OBJ_ATTR structure.
255 ********************************************************************/
257 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps,
260 prs_debug(ps, depth, desc, "lsa_io_obj_attr");
266 /* these pointers had _better_ be zero, because we don't know
269 if(!prs_uint32("len ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
271 if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
273 if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
275 if(!prs_uint32("attributes ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
277 if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
279 if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
282 if (attr->ptr_sec_qos != 0) {
283 if (UNMARSHALLING(ps))
284 if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
287 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
295 /*******************************************************************
296 Inits an LSA_Q_OPEN_POL structure.
297 ********************************************************************/
299 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
300 uint32 attributes, uint32 desired_access,
303 DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes,
306 in->ptr = 1; /* undocumented pointer */
308 in->des_access = desired_access;
310 in->system_name = system_name;
311 init_lsa_obj_attr(&in->attr, attributes, qos);
314 /*******************************************************************
315 Reads or writes an LSA_Q_OPEN_POL structure.
316 ********************************************************************/
318 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps,
321 prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
324 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
326 if(!prs_uint16("system_name", ps, depth, &in->system_name))
331 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
334 if(!prs_uint32("des_access", ps, depth, &in->des_access))
340 /*******************************************************************
341 Reads or writes an LSA_R_OPEN_POL structure.
342 ********************************************************************/
344 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps,
347 prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
350 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
353 if(!prs_ntstatus("status", ps, depth, &out->status))
359 /*******************************************************************
360 Inits an LSA_Q_OPEN_POL2 structure.
361 ********************************************************************/
363 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
364 uint32 attributes, uint32 desired_access,
367 DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes,
370 in->ptr = 1; /* undocumented pointer */
372 in->des_access = desired_access;
374 init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
376 init_lsa_obj_attr(&in->attr, attributes, qos);
379 /*******************************************************************
380 Reads or writes an LSA_Q_OPEN_POL2 structure.
381 ********************************************************************/
383 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps,
386 prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
389 if(!prs_uint32("ptr ", ps, depth, &in->ptr))
392 if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
394 if(!lsa_io_obj_attr("", &in->attr, ps, depth))
397 if(!prs_uint32("des_access", ps, depth, &in->des_access))
403 /*******************************************************************
404 Reads or writes an LSA_R_OPEN_POL2 structure.
405 ********************************************************************/
407 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps,
410 prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
413 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
416 if(!prs_ntstatus("status", ps, depth, &out->status))
422 /*******************************************************************
423 makes an LSA_Q_QUERY_SEC_OBJ structure.
424 ********************************************************************/
426 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd,
429 DEBUG(5, ("init_q_query_sec_obj\n"));
432 in->sec_info = sec_info;
437 /*******************************************************************
438 Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
439 ********************************************************************/
441 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in,
442 prs_struct *ps, int depth)
444 prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
447 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
450 if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
456 /*******************************************************************
457 Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
458 ********************************************************************/
460 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
462 prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
468 if (!prs_uint32("ptr", ps, depth, &out->ptr))
472 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
476 if (!prs_ntstatus("status", ps, depth, &out->status))
482 /*******************************************************************
483 Inits an LSA_Q_QUERY_INFO structure.
484 ********************************************************************/
486 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
488 DEBUG(5, ("init_q_query\n"));
490 memcpy(&in->pol, hnd, sizeof(in->pol));
492 in->info_class = info_class;
495 /*******************************************************************
496 Reads or writes an LSA_Q_QUERY_INFO structure.
497 ********************************************************************/
499 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps,
502 prs_debug(ps, depth, desc, "lsa_io_q_query");
505 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
508 if(!prs_uint16("info_class", ps, depth, &in->info_class))
514 /*******************************************************************
515 makes an LSA_Q_ENUM_TRUST_DOM structure.
516 ********************************************************************/
517 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
518 uint32 enum_context, uint32 preferred_len)
520 DEBUG(5, ("init_q_enum_trust_dom\n"));
523 q_e->enum_context = enum_context;
524 q_e->preferred_len = preferred_len;
529 /*******************************************************************
530 Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
531 ********************************************************************/
533 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e,
534 prs_struct *ps, int depth)
536 prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
539 if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
542 if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
544 if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
550 /*******************************************************************
551 Inits an LSA_R_ENUM_TRUST_DOM structure.
552 ********************************************************************/
554 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
555 uint32 enum_context, uint32 num_domains,
556 struct trustdom_info **td)
560 DEBUG(5, ("init_r_enum_trust_dom\n"));
562 out->enum_context = enum_context;
563 out->count = num_domains;
565 if ( num_domains != 0 ) {
567 /* allocate container memory */
569 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
570 out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
573 if ( !out->domlist || !out->domlist->domains ) {
574 out->status = NT_STATUS_NO_MEMORY;
578 out->domlist->count = out->count;
580 /* initialize the list of domains and their sid */
582 for (i = 0; i < num_domains; i++) {
584 if ( !(out->domlist->domains[i].sid =
585 TALLOC_P(ctx, DOM_SID2)) ) {
586 out->status = NT_STATUS_NO_MEMORY;
590 init_dom_sid2(out->domlist->domains[i].sid,
592 if (push_ucs2_talloc(ctx, &name, (td[i])->name) < 0){
593 out->status = NT_STATUS_NO_MEMORY;
596 init_unistr4_w(ctx, &out->domlist->domains[i].name,
603 /*******************************************************************
604 ********************************************************************/
606 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
610 prs_debug(ps, depth, desc, "lsa_io_domain_list");
613 if(!prs_uint32("count", ps, depth, &domlist->count))
616 if ( domlist->count == 0 )
619 if ( UNMARSHALLING(ps) ) {
620 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
626 for ( i=0; i<domlist->count; i++ ) {
627 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
629 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
635 for ( i=0; i<domlist->count; i++ ) {
636 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
638 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
645 /*******************************************************************
646 Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
647 ********************************************************************/
649 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out,
650 prs_struct *ps, int depth)
652 prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
655 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
658 if(!prs_uint32("count", ps, depth, &out->count))
661 if ( !prs_pointer("trusted_domains", ps, depth, (void**)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
664 if(!prs_ntstatus("status", ps, depth, &out->status))
670 /*******************************************************************
671 reads or writes a dom query structure.
672 ********************************************************************/
674 static BOOL lsa_io_dom_query(const char *desc, DOM_QUERY *d_q, prs_struct *ps, int depth)
679 prs_debug(ps, depth, desc, "lsa_io_dom_query");
685 if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
687 if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
690 if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
692 if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
695 if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
701 if (d_q->buffer_dom_sid != 0) {
702 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
705 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
711 /*******************************************************************
712 reads or writes a structure.
713 ********************************************************************/
715 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
722 prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
728 if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
730 if (!prs_uint32("ptr ", ps, depth, &ptr))
732 if (!prs_uint32("count1", ps, depth, &d_q->count1))
734 if (!prs_uint32("count2", ps, depth, &d_q->count2))
737 if (UNMARSHALLING(ps)) {
738 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
741 if (d_q->auditsettings == NULL) {
742 DEBUG(1, ("lsa_io_dom_query_2: NULL auditsettings!\n"));
746 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
752 /*******************************************************************
753 Reads or writes a dom query structure.
754 ********************************************************************/
756 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
758 return lsa_io_dom_query("", d_q, ps, depth);
761 /*******************************************************************
762 Reads or writes a dom query structure.
763 ********************************************************************/
765 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
767 return lsa_io_dom_query("", d_q, ps, depth);
770 /*******************************************************************
771 Reads or writes a dom query structure.
772 ********************************************************************/
774 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
779 prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
782 if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
788 /*******************************************************************
789 Reads or writes an LSA_R_QUERY_INFO structure.
790 ********************************************************************/
792 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
794 prs_debug(ps, depth, desc, "lsa_io_r_query");
797 if(!prs_uint32("undoc_buffer", ps, depth, &out->undoc_buffer))
800 if (out->undoc_buffer != 0) {
801 if(!prs_uint16("info_class", ps, depth, &out->info_class))
807 switch (out->info_class) {
809 if(!lsa_io_dom_query_2("", &out->dom.id2, ps, depth))
813 if(!lsa_io_dom_query_3("", &out->dom.id3, ps, depth))
817 if(!lsa_io_dom_query_5("", &out->dom.id5, ps, depth))
821 if(!lsa_io_dom_query_6("", &out->dom.id6, ps, depth))
833 if(!prs_ntstatus("status", ps, depth, &out->status))
839 /*******************************************************************
840 Inits a LSA_SID_ENUM structure.
841 ********************************************************************/
843 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen,
844 int num_entries, const DOM_SID *sids)
848 DEBUG(5, ("init_lsa_sid_enum\n"));
850 sen->num_entries = num_entries;
851 sen->ptr_sid_enum = (num_entries != 0);
852 sen->num_entries2 = num_entries;
854 /* Allocate memory for sids and sid pointers */
856 if (num_entries == 0) return;
858 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
859 DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
863 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
864 DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
868 /* Copy across SIDs and SID pointers */
870 for (i = 0; i < num_entries; i++) {
872 init_dom_sid2(&sen->sid[i], &sids[i]);
876 /*******************************************************************
877 Reads or writes a LSA_SID_ENUM structure.
878 ********************************************************************/
880 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps,
885 prs_debug(ps, depth, desc, "lsa_io_sid_enum");
891 if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
893 if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
897 if the ptr is NULL, leave here. checked from a real w2k trace.
901 if (sen->ptr_sid_enum==0)
904 if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
907 /* Mallocate memory if we're unpacking from the wire */
909 if (UNMARSHALLING(ps)) {
910 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
911 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
916 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
917 DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
923 for (i = 0; i < sen->num_entries; i++) {
926 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
927 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
932 for (i = 0; i < sen->num_entries; i++) {
935 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
936 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
944 /*******************************************************************
945 Inits an LSA_R_ENUM_TRUST_DOM structure.
946 ********************************************************************/
948 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l,
949 POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
952 DEBUG(5, ("init_q_lookup_sids\n"));
956 memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
957 init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
962 /*******************************************************************
963 Reads or writes a LSA_Q_LOOKUP_SIDS structure.
964 ********************************************************************/
966 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
969 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
975 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
977 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
979 if(!lsa_io_trans_names("names ", &q_s->names, ps, depth)) /* translated names */
982 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
987 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
993 /*******************************************************************
994 Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
995 ********************************************************************/
997 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1000 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1006 if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1008 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1010 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1013 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1018 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1020 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1022 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1028 /*******************************************************************
1029 Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1030 ********************************************************************/
1032 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1035 prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1041 if(!lsa_io_sid_enum("sids ", &q_s->sids, ps, depth)) /* sids to be looked up */
1043 if(!lsa_io_trans_names2("names ", &q_s->names, ps, depth)) /* translated names */
1046 if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1051 if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1053 if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1055 if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1062 /*******************************************************************
1063 Reads or writes a structure.
1064 ********************************************************************/
1066 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1067 prs_struct *ps, int depth)
1071 prs_debug(ps, depth, desc, "lsa_io_trans_names");
1077 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1079 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1082 if (trn->ptr_trans_names != 0) {
1083 if(!prs_uint32("num_entries2 ", ps, depth,
1084 &trn->num_entries2))
1087 if (UNMARSHALLING(ps)) {
1088 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries)) == NULL) {
1092 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1097 for (i = 0; i < trn->num_entries2; i++) {
1099 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1101 if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1105 for (i = 0; i < trn->num_entries2; i++) {
1107 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1109 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1119 /*******************************************************************
1120 Reads or writes a structure.
1121 ********************************************************************/
1123 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1124 prs_struct *ps, int depth)
1128 prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1134 if(!prs_uint32("num_entries ", ps, depth, &trn->num_entries))
1136 if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1139 if (trn->ptr_trans_names != 0) {
1140 if(!prs_uint32("num_entries2 ", ps, depth,
1141 &trn->num_entries2))
1144 if (UNMARSHALLING(ps)) {
1145 if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries)) == NULL) {
1149 if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries)) == NULL) {
1154 for (i = 0; i < trn->num_entries2; i++) {
1156 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1158 if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1162 for (i = 0; i < trn->num_entries2; i++) {
1164 slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1166 if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1177 /*******************************************************************
1178 Reads or writes a structure.
1179 ********************************************************************/
1181 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s,
1182 prs_struct *ps, int depth)
1184 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1190 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1193 if (r_s->ptr_dom_ref != 0)
1194 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1197 if(!lsa_io_trans_names("names ", r_s->names, ps, depth)) /* translated names */
1203 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1206 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1212 /*******************************************************************
1213 Reads or writes a structure.
1214 ********************************************************************/
1216 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s,
1217 prs_struct *ps, int depth)
1219 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1225 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1228 if (r_s->ptr_dom_ref != 0)
1229 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1232 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1238 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1241 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1248 /*******************************************************************
1249 Reads or writes a structure.
1250 ********************************************************************/
1252 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s,
1253 prs_struct *ps, int depth)
1255 prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1261 if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1264 if (r_s->ptr_dom_ref != 0)
1265 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1268 if(!lsa_io_trans_names2("names ", r_s->names, ps, depth)) /* translated names */
1274 if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1277 if(!prs_ntstatus("status ", ps, depth, &r_s->status))
1283 /*******************************************************************
1285 ********************************************************************/
1287 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l,
1288 POLICY_HND *hnd, int num_names, const char **names)
1292 DEBUG(5, ("init_q_lookup_names\n"));
1297 q_l->num_entries = num_names;
1298 q_l->num_entries2 = num_names;
1299 q_l->lookup_level = 1;
1301 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1302 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1306 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1307 DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1311 for (i = 0; i < num_names; i++) {
1312 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1313 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1317 /*******************************************************************
1318 reads or writes a structure.
1319 ********************************************************************/
1321 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r,
1322 prs_struct *ps, int depth)
1326 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1332 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1337 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1339 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1342 if (UNMARSHALLING(ps)) {
1343 if (q_r->num_entries) {
1344 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1346 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1351 for (i = 0; i < q_r->num_entries; i++) {
1354 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1358 for (i = 0; i < q_r->num_entries; i++) {
1361 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1367 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1369 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1371 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1375 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1381 /*******************************************************************
1382 reads or writes a structure.
1383 ********************************************************************/
1385 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1389 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1395 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1398 if (out->ptr_dom_ref != 0)
1399 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1402 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1404 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1407 if (out->ptr_entries != 0) {
1408 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1411 if (out->num_entries2 != out->num_entries) {
1416 if (UNMARSHALLING(ps)) {
1417 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1419 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1424 for (i = 0; i < out->num_entries2; i++)
1425 if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1429 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1432 if(!prs_ntstatus("status ", ps, depth, &out->status))
1438 /*******************************************************************
1439 reads or writes a structure.
1440 ********************************************************************/
1442 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r,
1443 prs_struct *ps, int depth)
1447 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1453 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1458 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1460 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1463 if (UNMARSHALLING(ps)) {
1464 if (q_r->num_entries) {
1465 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1467 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1472 for (i = 0; i < q_r->num_entries; i++) {
1475 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1479 for (i = 0; i < q_r->num_entries; i++) {
1482 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1488 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1490 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1492 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1496 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1498 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1500 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1506 /*******************************************************************
1507 reads or writes a structure.
1508 ********************************************************************/
1510 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1514 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1520 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1523 if (out->ptr_dom_ref != 0)
1524 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1527 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1529 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1532 if (out->ptr_entries != 0) {
1533 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1536 if (out->num_entries2 != out->num_entries) {
1541 if (UNMARSHALLING(ps)) {
1542 if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1544 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1549 for (i = 0; i < out->num_entries2; i++)
1550 if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1554 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1557 if(!prs_ntstatus("status ", ps, depth, &out->status))
1563 /*******************************************************************
1564 Internal lsa data type io.
1565 Following pass must read DOM_SID2 types.
1566 ********************************************************************/
1568 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r,
1569 prs_struct *ps, int depth)
1571 prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1576 if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1580 /* Second pass will read/write these. */
1581 if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1583 if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1585 if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1591 /*******************************************************************
1592 Identical to lsa_io_q_lookup_names2.
1593 ********************************************************************/
1595 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r,
1596 prs_struct *ps, int depth)
1600 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1606 if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1611 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1613 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1616 if (UNMARSHALLING(ps)) {
1617 if (q_r->num_entries) {
1618 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1620 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1625 for (i = 0; i < q_r->num_entries; i++) {
1628 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1632 for (i = 0; i < q_r->num_entries; i++) {
1635 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1641 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1643 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1645 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1649 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1651 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1653 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1659 /*******************************************************************
1660 reads or writes a structure.
1661 ********************************************************************/
1663 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1667 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1673 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1676 if (out->ptr_dom_ref != 0)
1677 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1680 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1682 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1685 if (out->ptr_entries != 0) {
1686 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1689 if (out->num_entries2 != out->num_entries) {
1694 if (UNMARSHALLING(ps)) {
1695 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1697 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1702 for (i = 0; i < out->num_entries2; i++) {
1703 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1707 /* Now process the DOM_SID2 entries. */
1708 for (i = 0; i < out->num_entries2; i++) {
1709 if (out->trans_sids[i].sid2) {
1710 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1717 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1720 if(!prs_ntstatus("status ", ps, depth, &out->status))
1726 /*******************************************************************
1727 ********************************************************************/
1729 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r,
1730 prs_struct *ps, int depth)
1734 prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1740 if(!prs_uint32("num_entries ", ps, depth, &q_r->num_entries))
1742 if(!prs_uint32("num_entries2 ", ps, depth, &q_r->num_entries2))
1745 if (UNMARSHALLING(ps)) {
1746 if (q_r->num_entries) {
1747 if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1749 if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1754 for (i = 0; i < q_r->num_entries; i++) {
1757 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1761 for (i = 0; i < q_r->num_entries; i++) {
1764 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1770 if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1772 if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1774 if(!prs_uint16("lookup_level ", ps, depth, &q_r->lookup_level))
1778 if(!prs_uint32("mapped_count ", ps, depth, &q_r->mapped_count))
1780 if(!prs_uint32("unknown1 ", ps, depth, &q_r->unknown1))
1782 if(!prs_uint32("unknown2 ", ps, depth, &q_r->unknown2))
1788 /*******************************************************************
1789 Identical to lsa_io_r_lookup_names3.
1790 ********************************************************************/
1792 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
1796 prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
1802 if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1805 if (out->ptr_dom_ref != 0)
1806 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1809 if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1811 if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1814 if (out->ptr_entries != 0) {
1815 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1818 if (out->num_entries2 != out->num_entries) {
1823 if (UNMARSHALLING(ps)) {
1824 if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1826 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
1831 for (i = 0; i < out->num_entries2; i++) {
1832 if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1836 /* Now process the DOM_SID2 entries. */
1837 for (i = 0; i < out->num_entries2; i++) {
1838 if (out->trans_sids[i].sid2) {
1839 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1846 if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1849 if(!prs_ntstatus("status ", ps, depth, &out->status))
1855 /*******************************************************************
1856 Inits an LSA_Q_CLOSE structure.
1857 ********************************************************************/
1859 void init_lsa_q_close(LSA_Q_CLOSE *in, POLICY_HND *hnd)
1861 DEBUG(5, ("init_lsa_q_close\n"));
1863 memcpy(&in->pol, hnd, sizeof(in->pol));
1866 /*******************************************************************
1867 Reads or writes an LSA_Q_CLOSE structure.
1868 ********************************************************************/
1870 BOOL lsa_io_q_close(const char *desc, LSA_Q_CLOSE *in, prs_struct *ps, int depth)
1872 prs_debug(ps, depth, desc, "lsa_io_q_close");
1875 if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1881 /*******************************************************************
1882 Reads or writes an LSA_R_CLOSE structure.
1883 ********************************************************************/
1885 BOOL lsa_io_r_close(const char *desc, LSA_R_CLOSE *out, prs_struct *ps, int depth)
1887 prs_debug(ps, depth, desc, "lsa_io_r_close");
1890 if(!smb_io_pol_hnd("", &out->pol, ps, depth))
1893 if(!prs_ntstatus("status", ps, depth, &out->status))
1899 /*******************************************************************
1900 Reads or writes an LSA_Q_OPEN_SECRET structure.
1901 ********************************************************************/
1903 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
1905 prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
1911 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
1914 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
1919 if(!prs_uint32("access", ps, depth, &in->access))
1925 /*******************************************************************
1926 Reads or writes an LSA_R_OPEN_SECRET structure.
1927 ********************************************************************/
1929 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
1931 prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
1937 if(!smb_io_pol_hnd("", &out->handle, ps, depth))
1940 if(!prs_ntstatus("status", ps, depth, &out->status))
1946 /*******************************************************************
1947 Inits an LSA_Q_ENUM_PRIVS structure.
1948 ********************************************************************/
1950 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
1952 DEBUG(5, ("init_q_enum_privs\n"));
1954 memcpy(&in->pol, hnd, sizeof(in->pol));
1956 in->enum_context = enum_context;
1957 in->pref_max_length = pref_max_length;
1960 /*******************************************************************
1961 reads or writes a structure.
1962 ********************************************************************/
1963 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
1968 prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
1971 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
1974 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
1976 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
1982 /*******************************************************************
1983 reads or writes a structure.
1984 ********************************************************************/
1985 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
1989 if (entries == NULL)
1992 prs_debug(ps, depth, desc, "lsa_io_priv_entries");
1998 for (i = 0; i < count; i++) {
1999 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2001 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2003 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2007 for (i = 0; i < count; i++)
2008 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2014 /*******************************************************************
2015 Inits an LSA_R_ENUM_PRIVS structure.
2016 ********************************************************************/
2018 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2019 uint32 count, LSA_PRIV_ENTRY *entries)
2021 DEBUG(5, ("init_lsa_r_enum_privs\n"));
2023 out->enum_context=enum_context;
2026 if (entries!=NULL) {
2037 /*******************************************************************
2038 reads or writes a structure.
2039 ********************************************************************/
2040 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2045 prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2051 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2053 if(!prs_uint32("count", ps, depth, &out->count))
2055 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2059 if(!prs_uint32("count1", ps, depth, &out->count1))
2062 if (UNMARSHALLING(ps))
2063 if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2066 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2073 if(!prs_ntstatus("status", ps, depth, &out->status))
2079 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2081 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2083 init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2084 init_uni_hdr(&trn->hdr_name, &trn->name);
2085 trn->lang_id = lang_id;
2086 trn->lang_id_sys = lang_id_sys;
2089 /*******************************************************************
2090 reads or writes a structure.
2091 ********************************************************************/
2092 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2097 prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2103 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2106 if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2109 if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2112 if(!prs_uint16("lang_id ", ps, depth, &in->lang_id))
2114 if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2120 /*******************************************************************
2121 reads or writes a structure.
2122 ********************************************************************/
2123 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2128 prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2134 if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2138 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2141 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2148 if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2153 if(!prs_ntstatus("status", ps, depth, &out->status))
2160 initialise a LSA_Q_ENUM_ACCOUNTS structure
2162 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2164 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2166 trn->enum_context = enum_context;
2167 trn->pref_max_length = pref_max_length;
2170 /*******************************************************************
2171 reads or writes a structure.
2172 ********************************************************************/
2173 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2178 prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2181 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2184 if(!prs_uint32("enum_context ", ps, depth, &in->enum_context))
2186 if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2193 /*******************************************************************
2194 Inits an LSA_R_ENUM_PRIVS structure.
2195 ********************************************************************/
2197 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2199 DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2201 out->enum_context=enum_context;
2202 if (out->enum_context!=0) {
2203 out->sids.num_entries=enum_context;
2204 out->sids.ptr_sid_enum=1;
2205 out->sids.num_entries2=enum_context;
2207 out->sids.num_entries=0;
2208 out->sids.ptr_sid_enum=0;
2209 out->sids.num_entries2=0;
2213 /*******************************************************************
2214 reads or writes a structure.
2215 ********************************************************************/
2216 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2221 prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2227 if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2230 if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2236 if(!prs_ntstatus("status", ps, depth, &out->status))
2243 /*******************************************************************
2244 Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2245 ********************************************************************/
2247 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2249 prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2255 if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2258 if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2264 if(!prs_uint32("unk1", ps, depth, &in->unk1))
2266 if(!prs_uint32("unk2", ps, depth, &in->unk2))
2268 if(!prs_uint32("unk3", ps, depth, &in->unk3))
2271 /* Don't bother to read or write at present... */
2275 /*******************************************************************
2276 Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2277 ********************************************************************/
2279 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2281 prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2287 if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2289 if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2291 if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2297 if(!prs_uint32("unk1", ps, depth, &out->unk1))
2300 if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2302 if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2304 if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2310 if(!prs_ntstatus("status", ps, depth, &out->status))
2316 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2318 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2320 init_dom_sid2(&trn->sid, sid);
2321 trn->access = desired_access;
2325 /*******************************************************************
2326 Reads or writes an LSA_Q_CREATEACCOUNT structure.
2327 ********************************************************************/
2329 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2331 prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2337 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2340 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2343 if(!prs_uint32("access", ps, depth, &out->access))
2349 /*******************************************************************
2350 Reads or writes an LSA_R_CREATEACCOUNT structure.
2351 ********************************************************************/
2353 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT *out, prs_struct *ps, int depth)
2355 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2361 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2364 if(!prs_ntstatus("status", ps, depth, &out->status))
2371 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2373 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2375 init_dom_sid2(&trn->sid, sid);
2376 trn->access = desired_access;
2379 /*******************************************************************
2380 Reads or writes an LSA_Q_OPENACCOUNT structure.
2381 ********************************************************************/
2383 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2385 prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2391 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2394 if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2397 if(!prs_uint32("access", ps, depth, &out->access))
2403 /*******************************************************************
2404 Reads or writes an LSA_R_OPENACCOUNT structure.
2405 ********************************************************************/
2407 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT *out, prs_struct *ps, int depth)
2409 prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2415 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2418 if(!prs_ntstatus("status", ps, depth, &out->status))
2425 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2427 memcpy(&trn->pol, hnd, sizeof(trn->pol));
2431 /*******************************************************************
2432 Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2433 ********************************************************************/
2435 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2437 prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2443 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2449 /*******************************************************************
2450 Reads or writes an LUID structure.
2451 ********************************************************************/
2453 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2455 prs_debug(ps, depth, desc, "lsa_io_luid");
2461 if(!prs_uint32("low", ps, depth, &out->low))
2464 if(!prs_uint32("high", ps, depth, &out->high))
2470 /*******************************************************************
2471 Reads or writes an LUID_ATTR structure.
2472 ********************************************************************/
2474 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2476 prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2482 if (!lsa_io_luid(desc, &out->luid, ps, depth))
2485 if(!prs_uint32("attr", ps, depth, &out->attr))
2491 /*******************************************************************
2492 Reads or writes an PRIVILEGE_SET structure.
2493 ********************************************************************/
2495 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2499 prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2505 if(!prs_uint32("count", ps, depth, &out->count))
2507 if(!prs_uint32("control", ps, depth, &out->control))
2510 for (i=0; i<out->count; i++) {
2511 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2518 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2520 NTSTATUS ret = NT_STATUS_OK;
2525 if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2528 out->set.count = count;
2530 if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2533 DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2538 /*******************************************************************
2539 Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2540 ********************************************************************/
2542 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2544 prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2550 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2554 if(!prs_uint32("count", ps, depth, &out->count))
2557 /* malloc memory if unmarshalling here */
2559 if (UNMARSHALLING(ps) && out->count != 0) {
2560 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2563 if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2568 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2572 if(!prs_ntstatus("status", ps, depth, &out->status))
2580 /*******************************************************************
2581 Reads or writes an LSA_Q_GETSYSTEMACCOUNTstructure.
2582 ********************************************************************/
2584 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2586 prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2592 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2598 /*******************************************************************
2599 Reads or writes an LSA_R_GETSYSTEMACCOUNTstructure.
2600 ********************************************************************/
2602 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2604 prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2610 if(!prs_uint32("access", ps, depth, &out->access))
2613 if(!prs_ntstatus("status", ps, depth, &out->status))
2620 /*******************************************************************
2621 Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2622 ********************************************************************/
2624 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2626 prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2632 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2635 if(!prs_uint32("access", ps, depth, &out->access))
2641 /*******************************************************************
2642 Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2643 ********************************************************************/
2645 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT *out, prs_struct *ps, int depth)
2647 prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2653 if(!prs_ntstatus("status", ps, depth, &out->status))
2660 static void init_lsa_string( LSA_STRING *uni, const char *string )
2662 init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2663 init_uni_hdr(&uni->hdr, &uni->unistring);
2666 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2668 memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2669 init_lsa_string( &q_u->privname, name );
2672 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2674 prs_debug(ps, depth, desc, "smb_io_lsa_string");
2677 if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2679 if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2685 /*******************************************************************
2686 Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE structure.
2687 ********************************************************************/
2689 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2691 prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2697 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2699 if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2705 /*******************************************************************
2706 Reads or writes an LSA_R_LOOKUP_PRIV_VALUE structure.
2707 ********************************************************************/
2709 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE *out, prs_struct *ps, int depth)
2711 prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2717 if(!lsa_io_luid("luid", &out->luid, ps, depth))
2720 if(!prs_ntstatus("status", ps, depth, &out->status))
2727 /*******************************************************************
2728 Reads or writes an LSA_Q_ADDPRIVS structure.
2729 ********************************************************************/
2731 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
2733 prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
2739 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2742 if(!prs_uint32("count", ps, depth, &out->count))
2745 if (UNMARSHALLING(ps) && out->count!=0) {
2746 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2749 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
2753 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2759 /*******************************************************************
2760 Reads or writes an LSA_R_ADDPRIVS structure.
2761 ********************************************************************/
2763 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
2765 prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
2771 if(!prs_ntstatus("status", ps, depth, &out->status))
2777 /*******************************************************************
2778 Reads or writes an LSA_Q_REMOVEPRIVS structure.
2779 ********************************************************************/
2781 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
2783 prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
2789 if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2792 if(!prs_uint32("allrights", ps, depth, &out->allrights))
2795 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2799 * JFM: I'm not sure at all if the count is inside the ptr
2800 * never seen one with ptr=0
2804 if(!prs_uint32("count", ps, depth, &out->count))
2807 if (UNMARSHALLING(ps) && out->count!=0) {
2808 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2811 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
2815 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2822 /*******************************************************************
2823 Reads or writes an LSA_R_REMOVEPRIVS structure.
2824 ********************************************************************/
2826 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
2828 prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
2834 if(!prs_ntstatus("status", ps, depth, &out->status))
2840 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
2842 POLICY_HND zero_pol;
2844 ZERO_STRUCT(zero_pol);
2845 return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
2848 /*******************************************************************
2849 Reads or writes an LSA_DNS_DOM_INFO structure.
2850 ********************************************************************/
2852 BOOL lsa_io_dns_dom_info(const char *desc, LSA_DNS_DOM_INFO *info,
2853 prs_struct *ps, int depth)
2855 prs_debug(ps, depth, desc, "lsa_io_dns_dom_info");
2860 if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
2862 if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
2864 if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
2869 if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
2874 if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
2877 if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
2878 info->hdr_nb_dom_name.buffer, ps, depth))
2880 if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name,
2881 info->hdr_dns_dom_name.buffer, ps, depth))
2883 if(!smb_io_unistr2("forest", &info->uni_forest_name,
2884 info->hdr_forest_name.buffer, ps, depth))
2887 if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
2894 /*******************************************************************
2895 Inits an LSA_Q_QUERY_INFO2 structure.
2896 ********************************************************************/
2898 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
2900 DEBUG(5, ("init_q_query2\n"));
2902 memcpy(&in->pol, hnd, sizeof(in->pol));
2904 in->info_class = info_class;
2907 /*******************************************************************
2908 Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
2909 ********************************************************************/
2911 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
2913 prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
2919 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
2922 if(!prs_uint16("info_class", ps, depth, &in->info_class))
2928 /*******************************************************************
2929 Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
2930 ********************************************************************/
2932 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
2933 prs_struct *ps, int depth)
2935 prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
2941 if(!prs_uint32("ptr", ps, depth, &out->ptr))
2943 if(!prs_uint16("info_class", ps, depth, &out->info_class))
2945 switch(out->info_class) {
2947 if (!lsa_io_dns_dom_info("info12", &out->info.dns_dom_info,
2952 DEBUG(0,("lsa_io_r_query_info2: unknown info class %d\n",
2959 if(!prs_ntstatus("status", ps, depth, &out->status))
2965 /*******************************************************************
2966 Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
2967 ********************************************************************/
2968 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in,
2973 DEBUG(5, ("init_q_enum_acct_rights\n"));
2976 init_dom_sid2(&in->sid, sid);
2979 /*******************************************************************
2980 ********************************************************************/
2981 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
2985 const char **privname_array = NULL;
2988 for ( i=0; i<privileges->count; i++ ) {
2989 privname = luid_to_privilege_name( &privileges->set[i].luid );
2991 if ( !add_string_to_array( get_talloc_ctx(), privname, &privname_array, &num_priv ) )
2992 return NT_STATUS_NO_MEMORY;
2997 out->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
2999 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) )
3000 return NT_STATUS_NO_MEMORY;
3002 out->count = num_priv;
3005 return NT_STATUS_OK;
3008 /*******************************************************************
3009 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3010 ********************************************************************/
3011 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3017 prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3020 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3023 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3030 /*******************************************************************
3031 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3032 ********************************************************************/
3033 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3035 prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3038 if(!prs_uint32("count ", ps, depth, &out->count))
3041 if ( !prs_pointer("rights", ps, depth, (void**)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3047 if(!prs_ntstatus("status", ps, depth, &out->status))
3054 /*******************************************************************
3055 Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3056 ********************************************************************/
3057 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd,
3058 DOM_SID *sid, uint32 count, const char **rights )
3060 DEBUG(5, ("init_q_add_acct_rights\n"));
3063 init_dom_sid2(&in->sid, sid);
3065 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3066 init_unistr4_array( in->rights, count, rights );
3072 /*******************************************************************
3073 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3074 ********************************************************************/
3075 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3077 prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3080 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3083 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3086 if(!prs_uint32("count", ps, depth, &in->count))
3089 if ( !prs_pointer("rights", ps, depth, (void**)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3095 /*******************************************************************
3096 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3097 ********************************************************************/
3098 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3100 prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3103 if(!prs_ntstatus("status", ps, depth, &out->status))
3110 /*******************************************************************
3111 Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3112 ********************************************************************/
3113 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in,
3118 const char **rights)
3120 DEBUG(5, ("init_q_remove_acct_rights\n"));
3124 init_dom_sid2(&in->sid, sid);
3126 in->removeall = removeall;
3129 in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3130 init_unistr4_array( in->rights, count, rights );
3134 /*******************************************************************
3135 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3136 ********************************************************************/
3137 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3139 prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3142 if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3145 if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3148 if(!prs_uint32("removeall", ps, depth, &in->removeall))
3151 if(!prs_uint32("count", ps, depth, &in->count))
3154 if ( !prs_pointer("rights", ps, depth, (void**)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3160 /*******************************************************************
3161 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3162 ********************************************************************/
3163 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3165 prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3168 if(!prs_ntstatus("status", ps, depth, &out->status))
3174 /*******************************************************************
3175 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3176 ********************************************************************/
3178 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3180 memcpy(&q->pol, hnd, sizeof(q->pol));
3182 init_dom_sid2(&q->sid, sid);
3183 q->access_mask = desired_access;
3186 /*******************************************************************
3187 ********************************************************************/
3189 #if 0 /* jerry, I think this not correct - gd */
3190 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3192 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3198 if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3201 if(!prs_uint32("count", ps, depth, &in->count))
3204 if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3212 /*******************************************************************
3213 Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3214 ********************************************************************/
3216 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q,
3219 uint32 desired_access)
3221 memcpy(&q->pol, hnd, sizeof(q->pol));
3223 init_lsa_string(&q->name, name);
3224 q->access_mask = desired_access;
3227 /*******************************************************************
3228 ********************************************************************/
3231 /*******************************************************************
3232 Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3233 ********************************************************************/
3235 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3237 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3243 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3249 if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3255 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3261 /*******************************************************************
3262 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3263 ********************************************************************/
3265 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3267 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3273 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3276 if(!prs_ntstatus("status", ps, depth, &out->status))
3282 /*******************************************************************
3283 ********************************************************************/
3285 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3287 prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3293 if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3296 if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3299 if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3305 /*******************************************************************
3306 Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3307 ********************************************************************/
3309 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3311 prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3317 if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3320 if(!prs_ntstatus("status", ps, depth, &out->status))
3326 /*******************************************************************
3327 ********************************************************************/
3329 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3331 prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3337 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3340 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3345 if(!prs_uint32("access", ps, depth, &in->access))
3351 /*******************************************************************
3352 ********************************************************************/
3354 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3356 prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3362 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3365 if(!prs_ntstatus("status", ps, depth, &out->status))
3371 /*******************************************************************
3372 ********************************************************************/
3374 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3376 prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3382 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3385 if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3390 if(!prs_uint32("access", ps, depth, &in->access))
3396 /*******************************************************************
3397 ********************************************************************/
3399 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3401 prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3407 if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3410 if(!prs_ntstatus("status", ps, depth, &out->status))
3418 /*******************************************************************
3419 ********************************************************************/
3421 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3423 prs_debug(ps, depth, desc, "lsa_io_data_blob");
3426 if ( !prs_uint32("size", ps, depth, &blob->size) )
3428 if ( !prs_uint32("size", ps, depth, &blob->size) )
3431 if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3437 /*******************************************************************
3438 ********************************************************************/
3440 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3442 prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3445 if ( !prs_align(ps) )
3448 if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3451 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3454 if( !prs_align(ps) )
3456 if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3463 /*******************************************************************
3464 ********************************************************************/
3466 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3468 prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3471 if(!prs_ntstatus("status", ps, depth, &out->status))
3477 /*******************************************************************
3478 ********************************************************************/
3480 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3482 prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3488 if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3494 /*******************************************************************
3495 ********************************************************************/
3497 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3499 prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3502 if(!prs_ntstatus("status", ps, depth, &out->status))
3508 /*******************************************************************
3509 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3510 ********************************************************************/
3512 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q,
3513 POLICY_HND *hnd, uint16 info_class)
3515 DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3518 q->info_class = info_class;
3521 /*******************************************************************
3522 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3523 ********************************************************************/
3525 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q,
3526 POLICY_HND *hnd, uint16 info_class,
3527 const char *dom_name)
3529 DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3532 init_lsa_string(&q->domain_name, dom_name );
3533 q->info_class = info_class;
3536 /*******************************************************************
3537 Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3538 ********************************************************************/
3540 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q,
3541 POLICY_HND *hnd, uint16 info_class,
3544 DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3547 init_dom_sid2(&q->dom_sid, dom_sid);
3548 q->info_class = info_class;
3551 /*******************************************************************
3552 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3553 ********************************************************************/
3555 BOOL lsa_io_q_query_trusted_domain_info(const char *desc,
3556 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3557 prs_struct *ps, int depth)
3559 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3565 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3568 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3575 /*******************************************************************
3576 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3577 ********************************************************************/
3579 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc,
3580 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3581 prs_struct *ps, int depth)
3583 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3589 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3595 if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3598 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3604 /*******************************************************************
3605 Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3606 ********************************************************************/
3608 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc,
3609 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3610 prs_struct *ps, int depth)
3612 prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3618 if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3624 if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3627 if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3633 /*******************************************************************
3634 ********************************************************************/
3636 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr,
3637 prs_struct *ps, int depth)
3639 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3645 if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3648 if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3651 if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3657 /*******************************************************************
3658 ********************************************************************/
3660 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf,
3661 prs_struct *ps, int depth, int length, int size)
3663 prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3666 if ( UNMARSHALLING(ps) ) {
3667 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3671 if (!prs_uint32("size", ps, depth, &buf->size))
3674 if (!prs_uint32("offset", ps, depth, &buf->offset))
3677 if (!prs_uint32("length", ps, depth, &buf->length))
3680 if(!prs_uint8s(False, "data", ps, depth, buf->data, size))
3686 /*******************************************************************
3687 ********************************************************************/
3689 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name,
3690 prs_struct *ps, int depth)
3692 if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3698 /*******************************************************************
3699 ********************************************************************/
3701 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix,
3702 prs_struct *ps, int depth)
3704 if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3710 /*******************************************************************
3711 ********************************************************************/
3713 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password,
3714 prs_struct *ps, int depth)
3719 if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3722 if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3725 if (&password->ptr_password) {
3727 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3730 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth,
3731 password->password_hdr.length, password->password_hdr.size))
3735 if (&password->ptr_old_password) {
3737 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3740 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth,
3741 password->old_password_hdr.length, password->old_password_hdr.size))
3748 /*******************************************************************
3749 ********************************************************************/
3751 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex,
3752 prs_struct *ps, int depth)
3756 if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
3759 if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
3762 if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
3765 if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
3768 if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
3771 if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
3774 if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
3777 if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
3780 if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
3786 /*******************************************************************
3787 ********************************************************************/
3789 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
3791 prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
3794 if(!prs_uint16("info_class", ps, depth, &info->info_class))
3800 switch (info->info_class) {
3802 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
3806 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
3810 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
3814 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
3818 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
3825 /*******************************************************************
3826 Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
3827 ********************************************************************/
3829 BOOL lsa_io_r_query_trusted_domain_info(const char *desc,
3830 LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q,
3831 prs_struct *ps, int depth)
3836 prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
3839 if (!prs_pointer("trustdom", ps, depth, (void**)&r_q->info,
3840 sizeof(LSA_TRUSTED_DOMAIN_INFO),
3841 (PRS_POINTER_CAST)lsa_io_trustdom_query) )
3847 if(!prs_ntstatus("status", ps, depth, &r_q->status))
3853 /*******************************************************************
3854 Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
3855 ********************************************************************/
3857 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
3859 DEBUG(5, ("init_q_query_dom_info\n"));
3861 memcpy(&in->pol, hnd, sizeof(in->pol));
3863 in->info_class = info_class;
3866 /*******************************************************************
3867 Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
3868 ********************************************************************/
3870 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
3872 prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
3878 if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3881 if(!prs_uint16("info_class", ps, depth, &in->info_class))
3887 /*******************************************************************
3888 Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
3889 ********************************************************************/
3891 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy,
3892 prs_struct *ps, int depth)
3894 if (!prs_align_uint64(ps))
3900 if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
3903 if (!prs_align_uint64(ps))
3906 if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
3909 if (!prs_align_uint64(ps))
3912 if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
3915 if (!prs_align_uint64(ps))
3918 if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
3921 if (!prs_align_uint64(ps))
3924 if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
3927 if (!prs_align_uint64(ps))
3930 if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
3936 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
3938 prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
3941 if(!prs_align_uint16(ps))
3944 if(!prs_uint16("info_class", ps, depth, &info->info_class))
3947 switch (info->info_class) {
3949 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
3953 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
3962 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
3963 prs_struct *ps, int depth)
3965 prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
3968 if (!prs_pointer("dominfo", ps, depth, (void**)&out->info,
3969 sizeof(LSA_DOM_INFO_UNION),
3970 (PRS_POINTER_CAST)lsa_io_dom_info_query) )
3973 if(!prs_ntstatus("status", ps, depth, &out->status))