samba-spoolss: use spoolss_StringArray2 in spoolss_EnumPrinterKey.
authorGünther Deschner <gd@samba.org>
Wed, 2 Dec 2009 13:53:39 +0000 (14:53 +0100)
committerKarolin Seeger <kseeger@samba.org>
Mon, 14 Dec 2009 09:52:48 +0000 (10:52 +0100)
This should finally resolve the endian issues we were seeing on sparc and is
much cleaner for spoolss clients and servers.

Guenther

librpc/gen_ndr/cli_spoolss.c
librpc/gen_ndr/cli_spoolss.h
librpc/gen_ndr/ndr_spoolss.c
librpc/gen_ndr/spoolss.h
librpc/gen_ndr/srv_spoolss.c
librpc/idl/spoolss.idl
source3/rpc_client/cli_spoolss.c
source3/rpc_server/srv_spoolss_nt.c
source4/torture/rpc/spoolss.c
source4/torture/rpc/spoolss_win.c

index b605f580e025a7856b759ff3044a3d0b4f8ffc07..244245d5f32ceb36f6fe2c207d9a0838afd544ac 100644 (file)
@@ -3811,7 +3811,7 @@ NTSTATUS rpccli_spoolss_EnumPrinterKey(struct rpc_pipe_client *cli,
                                       TALLOC_CTX *mem_ctx,
                                       struct policy_handle *handle /* [in] [ref] */,
                                       const char *key_name /* [in] [charset(UTF16)] */,
-                                      uint16_t *key_buffer /* [out] [ref,size_is(offered/2)] */,
+                                      struct spoolss_StringArray2 *key_buffer /* [out] [ref] */,
                                       uint32_t offered /* [in]  */,
                                       uint32_t *needed /* [out] [ref] */,
                                       WERROR *werror)
@@ -3847,7 +3847,7 @@ NTSTATUS rpccli_spoolss_EnumPrinterKey(struct rpc_pipe_client *cli,
        }
 
        /* Return variables */
-       memcpy(key_buffer, r.out.key_buffer, (r.in.offered / 2) * sizeof(*key_buffer));
+       *key_buffer = *r.out.key_buffer;
        *needed = *r.out.needed;
 
        /* Return result */
index 4c621f41d2156d1deba8f256b09c284b809bd69c..f97bf9a8d1de0ac4490d8feeadebcd03426e65c3 100644 (file)
@@ -497,7 +497,7 @@ NTSTATUS rpccli_spoolss_EnumPrinterKey(struct rpc_pipe_client *cli,
                                       TALLOC_CTX *mem_ctx,
                                       struct policy_handle *handle /* [in] [ref] */,
                                       const char *key_name /* [in] [charset(UTF16)] */,
-                                      uint16_t *key_buffer /* [out] [ref,size_is(offered/2)] */,
+                                      struct spoolss_StringArray2 *key_buffer /* [out] [ref] */,
                                       uint32_t offered /* [in]  */,
                                       uint32_t *needed /* [out] [ref] */,
                                       WERROR *werror);
index 0b67e80e2c619b500045205c095b0c77f95cc026..a1d7f8fc73312decdbb6200fc2e4de38553eccb9 100644 (file)
@@ -26672,7 +26672,6 @@ _PUBLIC_ void ndr_print_spoolss_EnumPrinterDataEx(struct ndr_print *ndr, const c
 
 _PUBLIC_ enum ndr_err_code ndr_push_spoolss_EnumPrinterKey(struct ndr_push *ndr, int flags, const struct spoolss_EnumPrinterKey *r)
 {
-       uint32_t cntr_key_buffer_1;
        if (flags & NDR_IN) {
                if (r->in.handle == NULL) {
                        return ndr_push_error(ndr, NDR_ERR_INVALID_POINTER, "NULL [ref] pointer");
@@ -26688,10 +26687,7 @@ _PUBLIC_ enum ndr_err_code ndr_push_spoolss_EnumPrinterKey(struct ndr_push *ndr,
                if (r->out.key_buffer == NULL) {
                        return ndr_push_error(ndr, NDR_ERR_INVALID_POINTER, "NULL [ref] pointer");
                }
-               NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->in.offered / 2));
-               for (cntr_key_buffer_1 = 0; cntr_key_buffer_1 < r->in.offered / 2; cntr_key_buffer_1++) {
-                       NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->out.key_buffer[cntr_key_buffer_1]));
-               }
+               NDR_CHECK(ndr_push_spoolss_StringArray2(ndr, NDR_SCALARS, r->out.key_buffer));
                if (r->out.needed == NULL) {
                        return ndr_push_error(ndr, NDR_ERR_INVALID_POINTER, "NULL [ref] pointer");
                }
@@ -26703,9 +26699,8 @@ _PUBLIC_ enum ndr_err_code ndr_push_spoolss_EnumPrinterKey(struct ndr_push *ndr,
 
 _PUBLIC_ enum ndr_err_code ndr_pull_spoolss_EnumPrinterKey(struct ndr_pull *ndr, int flags, struct spoolss_EnumPrinterKey *r)
 {
-       uint32_t cntr_key_buffer_1;
        TALLOC_CTX *_mem_save_handle_0;
-       TALLOC_CTX *_mem_save_key_buffer_1;
+       TALLOC_CTX *_mem_save_key_buffer_0;
        TALLOC_CTX *_mem_save_needed_0;
        if (flags & NDR_IN) {
                ZERO_STRUCT(r->out);
@@ -26725,22 +26720,19 @@ _PUBLIC_ enum ndr_err_code ndr_pull_spoolss_EnumPrinterKey(struct ndr_pull *ndr,
                NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.key_name), sizeof(uint16_t)));
                NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.key_name, ndr_get_array_length(ndr, &r->in.key_name), sizeof(uint16_t), CH_UTF16));
                NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->in.offered));
-               NDR_PULL_ALLOC_N(ndr, r->out.key_buffer, r->in.offered / 2);
-               memset(r->out.key_buffer, 0, (r->in.offered / 2) * sizeof(*r->out.key_buffer));
+               NDR_PULL_ALLOC(ndr, r->out.key_buffer);
+               ZERO_STRUCTP(r->out.key_buffer);
                NDR_PULL_ALLOC(ndr, r->out.needed);
                ZERO_STRUCTP(r->out.needed);
        }
        if (flags & NDR_OUT) {
-               NDR_CHECK(ndr_pull_array_size(ndr, &r->out.key_buffer));
                if (ndr->flags & LIBNDR_FLAG_REF_ALLOC) {
-                       NDR_PULL_ALLOC_N(ndr, r->out.key_buffer, ndr_get_array_size(ndr, &r->out.key_buffer));
-               }
-               _mem_save_key_buffer_1 = NDR_PULL_GET_MEM_CTX(ndr);
-               NDR_PULL_SET_MEM_CTX(ndr, r->out.key_buffer, 0);
-               for (cntr_key_buffer_1 = 0; cntr_key_buffer_1 < r->in.offered / 2; cntr_key_buffer_1++) {
-                       NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->out.key_buffer[cntr_key_buffer_1]));
+                       NDR_PULL_ALLOC(ndr, r->out.key_buffer);
                }
-               NDR_PULL_SET_MEM_CTX(ndr, _mem_save_key_buffer_1, 0);
+               _mem_save_key_buffer_0 = NDR_PULL_GET_MEM_CTX(ndr);
+               NDR_PULL_SET_MEM_CTX(ndr, r->out.key_buffer, LIBNDR_FLAG_REF_ALLOC);
+               NDR_CHECK(ndr_pull_spoolss_StringArray2(ndr, NDR_SCALARS, r->out.key_buffer));
+               NDR_PULL_SET_MEM_CTX(ndr, _mem_save_key_buffer_0, LIBNDR_FLAG_REF_ALLOC);
                if (ndr->flags & LIBNDR_FLAG_REF_ALLOC) {
                        NDR_PULL_ALLOC(ndr, r->out.needed);
                }
@@ -26749,16 +26741,12 @@ _PUBLIC_ enum ndr_err_code ndr_pull_spoolss_EnumPrinterKey(struct ndr_pull *ndr,
                NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, r->out.needed));
                NDR_PULL_SET_MEM_CTX(ndr, _mem_save_needed_0, LIBNDR_FLAG_REF_ALLOC);
                NDR_CHECK(ndr_pull_WERROR(ndr, NDR_SCALARS, &r->out.result));
-               if (r->out.key_buffer) {
-                       NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->out.key_buffer, r->in.offered / 2));
-               }
        }
        return NDR_ERR_SUCCESS;
 }
 
 _PUBLIC_ void ndr_print_spoolss_EnumPrinterKey(struct ndr_print *ndr, const char *name, int flags, const struct spoolss_EnumPrinterKey *r)
 {
-       uint32_t cntr_key_buffer_1;
        ndr_print_struct(ndr, name, "spoolss_EnumPrinterKey");
        ndr->depth++;
        if (flags & NDR_SET_VALUES) {
@@ -26780,16 +26768,7 @@ _PUBLIC_ void ndr_print_spoolss_EnumPrinterKey(struct ndr_print *ndr, const char
                ndr->depth++;
                ndr_print_ptr(ndr, "key_buffer", r->out.key_buffer);
                ndr->depth++;
-               ndr->print(ndr, "%s: ARRAY(%d)", "key_buffer", (int)r->in.offered / 2);
-               ndr->depth++;
-               for (cntr_key_buffer_1=0;cntr_key_buffer_1<r->in.offered / 2;cntr_key_buffer_1++) {
-                       char *idx_1=NULL;
-                       if (asprintf(&idx_1, "[%d]", cntr_key_buffer_1) != -1) {
-                               ndr_print_uint16(ndr, "key_buffer", r->out.key_buffer[cntr_key_buffer_1]);
-                               free(idx_1);
-                       }
-               }
-               ndr->depth--;
+               ndr_print_spoolss_StringArray2(ndr, "key_buffer", r->out.key_buffer);
                ndr->depth--;
                ndr_print_ptr(ndr, "needed", r->out.needed);
                ndr->depth++;
index 1d2cf5bcbf559f35e256dcab812990dd3d7a12d3..e7c125a9eaee45c1d8d93fb212705d19c4b86ae8 100644 (file)
@@ -3035,7 +3035,7 @@ struct spoolss_EnumPrinterKey {
        } in;
 
        struct {
-               uint16_t *key_buffer;/* [ref,size_is(offered/2)] */
+               struct spoolss_StringArray2 *key_buffer;/* [ref] */
                uint32_t *needed;/* [ref] */
                WERROR result;
        } out;
index 3bbe401fd80badb8ef822d76b17ea23499a5b7bc..2d125872e0346fec53b66d406033655ef438979a 100644 (file)
@@ -6296,7 +6296,7 @@ static bool api_spoolss_EnumPrinterKey(pipes_struct *p)
        }
 
        ZERO_STRUCT(r->out);
-       r->out.key_buffer = talloc_zero_array(r, uint16_t, r->in.offered / 2);
+       r->out.key_buffer = talloc_zero(r, struct spoolss_StringArray2);
        if (r->out.key_buffer == NULL) {
                talloc_free(r);
                return false;
@@ -8399,7 +8399,7 @@ NTSTATUS rpc_spoolss_dispatch(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
                case NDR_SPOOLSS_ENUMPRINTERKEY: {
                        struct spoolss_EnumPrinterKey *r = (struct spoolss_EnumPrinterKey *)_r;
                        ZERO_STRUCT(r->out);
-                       r->out.key_buffer = talloc_zero_array(mem_ctx, uint16_t, r->in.offered / 2);
+                       r->out.key_buffer = talloc_zero(mem_ctx, struct spoolss_StringArray2);
                        if (r->out.key_buffer == NULL) {
                        return NT_STATUS_NO_MEMORY;
                        }
index cb34138793bad0c35db289a61afc2fb295a9aa9e..3d82dfacfc776ff2860f8e13cae4eb6de293b6dd 100644 (file)
@@ -2307,7 +2307,7 @@ import "misc.idl", "security.idl", "winreg.idl";
        [public] WERROR spoolss_EnumPrinterKey(
                [in, ref] policy_handle *handle,
                [in] [string,charset(UTF16)] uint16 key_name[],
-               [out,ref] [size_is(offered/2)] uint16 *key_buffer,
+               [out,ref] spoolss_StringArray2 *key_buffer,
                [in] uint32 offered,
                [out,ref] uint32 *needed
        );
index 5522ca75f3d992e6e3f777ea6271fe30b300720e..d2e655666883c493c855f7ab6e25a8772f599819 100644 (file)
@@ -760,44 +760,28 @@ WERROR rpccli_spoolss_enumprinterkey(struct rpc_pipe_client *cli,
        NTSTATUS status;
        WERROR werror;
        uint32_t needed;
-       uint16_t *buffer = NULL;
-
-       *key_buffer = NULL;
-
-       if (offered) {
-               buffer = talloc_array(mem_ctx, uint16_t, offered/2);
-               W_ERROR_HAVE_NO_MEMORY(buffer);
-       }
+       struct spoolss_StringArray2 _key_buffer;
 
        status = rpccli_spoolss_EnumPrinterKey(cli, mem_ctx,
                                               handle,
                                               key_name,
-                                              buffer,
+                                              &_key_buffer,
                                               offered,
                                               &needed,
                                               &werror);
 
        if (W_ERROR_EQUAL(werror, WERR_MORE_DATA)) {
                offered = needed;
-               buffer = talloc_realloc(mem_ctx, buffer, uint16_t, needed/2);
-               W_ERROR_HAVE_NO_MEMORY(buffer);
                status = rpccli_spoolss_EnumPrinterKey(cli, mem_ctx,
                                                       handle,
                                                       key_name,
-                                                      buffer,
+                                                      &_key_buffer,
                                                       offered,
                                                       &needed,
                                                       &werror);
        }
 
-       if (W_ERROR_IS_OK(werror)) {
-               const char **array;
-               DATA_BLOB blob = data_blob_const((uint8_t *)buffer, offered);
-               if (!pull_reg_multi_sz(mem_ctx, &blob, &array)) {
-                       return WERR_NOMEM;
-               }
-               *key_buffer = array;
-       }
+       *key_buffer = _key_buffer.string;
 
        return werror;
 }
index af0c952cf55936e1f75488d267b49d406f84e4d1..1dfae32d07683056ab758ec52b88688feafade16 100644 (file)
@@ -9317,7 +9317,7 @@ WERROR _spoolss_EnumPrinterKey(pipes_struct *p,
                result = WERR_MORE_DATA;
        } else {
                result = WERR_OK;
-               memcpy(r->out.key_buffer, blob.data, blob.length);
+               r->out.key_buffer->string = array;
        }
 
  done:
index 895f6b94fce3e0ba5a4e75e64362b5c16aa8d627..6f9d7d23e41fadaa68f79f78048f5d7a0b14e21e 100644 (file)
@@ -2006,44 +2006,31 @@ bool test_printer_keys(struct torture_context *tctx,
                       struct dcerpc_pipe *p,
                       struct policy_handle *handle)
 {
-       DATA_BLOB blob;
        const char **key_array = NULL;
        int i;
 
        {
                struct spoolss_EnumPrinterKey r;
                uint32_t needed;
-               uint16_t *key_buffer = talloc_zero_array(tctx, uint16_t, 0);
+               struct spoolss_StringArray2 key_buffer;
 
                r.in.handle = handle;
                r.in.key_name = "";
                r.in.offered = 0;
-               r.out.key_buffer = key_buffer;
+               r.out.key_buffer = &key_buffer;
                r.out.needed = &needed;
 
                torture_assert_ntstatus_ok(tctx, dcerpc_spoolss_EnumPrinterKey(p, tctx, &r),
                        "failed to call EnumPrinterKey");
                if (W_ERROR_EQUAL(r.out.result, WERR_MORE_DATA)) {
                        r.in.offered = needed;
-                       key_buffer = talloc_zero_array(tctx, uint16_t, needed/2);
-                       r.out.key_buffer = key_buffer;
                        torture_assert_ntstatus_ok(tctx, dcerpc_spoolss_EnumPrinterKey(p, tctx, &r),
                                "failed to call EnumPrinterKey");
                }
                torture_assert_werr_ok(tctx, r.out.result,
                        "failed to call EnumPrinterKey");
 
-               blob = data_blob_const(key_buffer, needed);
-       }
-
-       {
-               union winreg_Data data;
-               enum ndr_err_code ndr_err;
-               ndr_err = ndr_pull_union_blob(&blob, tctx, lp_iconv_convenience(tctx->lp_ctx),
-                                       &data, REG_MULTI_SZ,
-                                       (ndr_pull_flags_fn_t)ndr_pull_winreg_Data);
-               torture_assert_ndr_success(tctx, ndr_err, "failed to pull REG_MULTI_SZ");
-               key_array = data.string_array;
+               key_array = key_buffer.string;
        }
 
        for (i=0; key_array[i]; i++) {
index df1a47d7ace0634ecc65caab682180037bc92500..5439d9d57e9061fcc9de4a31148662f64f63d814 100644 (file)
@@ -386,17 +386,15 @@ static bool test_EnumPrinterKey(struct torture_context *tctx,
        NTSTATUS status;
        struct spoolss_EnumPrinterKey epk;
        uint32_t needed = 0;
-       uint16_t *key_buffer;
+       struct spoolss_StringArray2 key_buffer;
 
        torture_comment(tctx, "Testing EnumPrinterKey(%s)\n", key);
 
-       key_buffer = talloc_zero_array(tctx, uint16_t, 0);
-
        epk.in.handle = handle;
        epk.in.key_name = talloc_strdup(tctx, key);
        epk.in.offered = 0;
        epk.out.needed = &needed;
-       epk.out.key_buffer = key_buffer;
+       epk.out.key_buffer = &key_buffer;
 
        status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk);
        torture_assert_ntstatus_ok(tctx, status, "EnumPrinterKey failed");
@@ -404,8 +402,6 @@ static bool test_EnumPrinterKey(struct torture_context *tctx,
 
        if (W_ERROR_EQUAL(epk.out.result, WERR_MORE_DATA)) {
                epk.in.offered = needed;
-               key_buffer = talloc_zero_array(tctx, uint16_t, needed/2);
-               epk.out.key_buffer = key_buffer;
                status = dcerpc_spoolss_EnumPrinterKey(p, tctx, &epk);
                torture_assert_ntstatus_ok(tctx, status,
                                "EnumPrinterKey failed");
@@ -413,16 +409,7 @@ static bool test_EnumPrinterKey(struct torture_context *tctx,
 
        torture_assert_werr_ok(tctx, epk.out.result, "EnumPrinterKey failed");
 
-       {
-               union winreg_Data data;
-               enum ndr_err_code ndr_err;
-               DATA_BLOB blob = data_blob_const(key_buffer, needed);
-               ndr_err = ndr_pull_union_blob(&blob, tctx, lp_iconv_convenience(tctx->lp_ctx),
-                                       &data, REG_MULTI_SZ,
-                                       (ndr_pull_flags_fn_t)ndr_pull_winreg_Data);
-               torture_assert_ndr_success(tctx, ndr_err, "failed to pull REG_MULTI_SZ");
-               ctx->printer_keys = data.string_array;
-       }
+       ctx->printer_keys = key_buffer.string;
 
        return true;
 }