625ef5fb41ff6e63dd255201ab547be561b5cb30
[samba.git] / source / rpc_parse / parse_lsa.c
1 /* 
2  *  Unix SMB/CIFS implementation.
3  *  RPC Pipe client / server routines
4  *  Copyright (C) Andrew Tridgell              1992-1997,
5  *  Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6  *  Copyright (C) Paul Ashton                       1997,
7  *  Copyright (C) Andrew Bartlett                   2002,
8  *  Copyright (C) Jim McDonough <jmcd@us.ibm.com>   2002.
9  *  Copyright (C) Gerald )Jerry) Carter             2005
10  *  
11  *  This program is free software; you can redistribute it and/or modify
12  *  it under the terms of the GNU General Public License as published by
13  *  the Free Software Foundation; either version 3 of the License, or
14  *  (at your option) any later version.
15  *  
16  *  This program is distributed in the hope that it will be useful,
17  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
18  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
19  *  GNU General Public License for more details.
20  *  
21  *  You should have received a copy of the GNU General Public License
22  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
23  */
24
25 #include "includes.h"
26
27 #undef DBGC_CLASS
28 #define DBGC_CLASS DBGC_RPC_PARSE
29
30 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
31 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
32
33 /*******************************************************************
34  Inits a LSA_TRANS_NAME structure.
35 ********************************************************************/
36
37 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
38                          uint16 sid_name_use, const char *name, uint32 idx)
39 {
40         trn->sid_name_use = sid_name_use;
41         init_unistr2(uni_name, name, UNI_FLAGS_NONE);
42         init_uni_hdr(&trn->hdr_name, uni_name);
43         trn->domain_idx = idx;
44 }
45
46 /*******************************************************************
47  Reads or writes a LSA_TRANS_NAME structure.
48 ********************************************************************/
49
50 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps, 
51                               int depth)
52 {
53         prs_debug(ps, depth, desc, "lsa_io_trans_name");
54         depth++;
55
56         if(!prs_align(ps))
57                 return False;
58         
59         if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
60                 return False;
61         if(!prs_align(ps))
62                 return False;
63         
64         if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
65                 return False;
66         if(!prs_uint32("domain_idx  ", ps, depth, &trn->domain_idx))
67                 return False;
68
69         return True;
70 }
71
72 /*******************************************************************
73  Inits a LSA_TRANS_NAME2 structure.
74 ********************************************************************/
75
76 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
77                          uint16 sid_name_use, const char *name, uint32 idx)
78 {
79         trn->sid_name_use = sid_name_use;
80         init_unistr2(uni_name, name, UNI_FLAGS_NONE);
81         init_uni_hdr(&trn->hdr_name, uni_name);
82         trn->domain_idx = idx;
83         trn->unknown = 0;
84 }
85
86 /*******************************************************************
87  Reads or writes a LSA_TRANS_NAME2 structure.
88 ********************************************************************/
89
90 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps, 
91                               int depth)
92 {
93         prs_debug(ps, depth, desc, "lsa_io_trans_name2");
94         depth++;
95
96         if(!prs_align(ps))
97                 return False;
98         
99         if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
100                 return False;
101         if(!prs_align(ps))
102                 return False;
103         
104         if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
105                 return False;
106         if(!prs_uint32("domain_idx  ", ps, depth, &trn->domain_idx))
107                 return False;
108         if(!prs_uint32("unknown  ", ps, depth, &trn->unknown))
109                 return False;
110
111         return True;
112 }
113
114 /*******************************************************************
115  Reads or writes a DOM_R_REF structure.
116 ********************************************************************/
117
118 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
119 {
120         unsigned int i;
121
122         prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
123         depth++;
124
125         if(!prs_align(ps))
126                 return False;
127         
128         if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
129                 return False;
130         if(!prs_uint32("ptr_ref_dom   ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
131                 return False;
132         if(!prs_uint32("max_entries   ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
133                 return False;
134
135         SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
136
137         if (dom->ptr_ref_dom != 0) {
138
139                 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
140                         return False;
141
142                 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
143
144                 for (i = 0; i < dom->num_ref_doms_1; i++) {
145                         fstring t;
146
147                         slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
148                         if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
149                                 return False;
150
151                         slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
152                         if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
153                                 return False;
154                 }
155
156                 for (i = 0; i < dom->num_ref_doms_2; i++) {
157                         fstring t;
158
159                         if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
160                                 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
161                                 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
162                                         return False;
163                                 if(!prs_align(ps))
164                                         return False;
165                         }
166
167                         if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
168                                 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
169                                 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
170                                         return False;
171                         }
172                 }
173         }
174
175         return True;
176 }
177
178 /*******************************************************************
179  Inits an LSA_SEC_QOS structure.
180 ********************************************************************/
181
182 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
183 {
184         DEBUG(5, ("init_lsa_sec_qos\n"));
185
186         qos->len = 0x0c; /* length of quality of service block, in bytes */
187         qos->sec_imp_level = imp_lev;
188         qos->sec_ctxt_mode = ctxt;
189         qos->effective_only = eff;
190 }
191
192 /*******************************************************************
193  Reads or writes an LSA_SEC_QOS structure.
194 ********************************************************************/
195
196 static BOOL lsa_io_sec_qos(const char *desc,  LSA_SEC_QOS *qos, prs_struct *ps, 
197                            int depth)
198 {
199         uint32 start;
200
201         prs_debug(ps, depth, desc, "lsa_io_obj_qos");
202         depth++;
203
204         if(!prs_align(ps))
205                 return False;
206         
207         start = prs_offset(ps);
208
209         /* these pointers had _better_ be zero, because we don't know
210            what they point to!
211          */
212         if(!prs_uint32("len           ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
213                 return False;
214         if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
215                 return False;
216         if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
217                 return False;
218         if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
219                 return False;
220
221         if (qos->len != prs_offset(ps) - start) {
222                 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
223                          qos->len, prs_offset(ps) - start));
224         }
225
226         return True;
227 }
228
229 /*******************************************************************
230  Inits an LSA_OBJ_ATTR structure.
231 ********************************************************************/
232
233 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
234 {
235         DEBUG(5, ("init_lsa_obj_attr\n"));
236
237         attr->len = 0x18; /* length of object attribute block, in bytes */
238         attr->ptr_root_dir = 0;
239         attr->ptr_obj_name = 0;
240         attr->attributes = attributes;
241         attr->ptr_sec_desc = 0;
242         
243         if (qos != NULL) {
244                 attr->ptr_sec_qos = 1;
245                 attr->sec_qos = qos;
246         } else {
247                 attr->ptr_sec_qos = 0;
248                 attr->sec_qos = NULL;
249         }
250 }
251
252 /*******************************************************************
253  Reads or writes an LSA_OBJ_ATTR structure.
254 ********************************************************************/
255
256 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps, 
257                             int depth)
258 {
259         prs_debug(ps, depth, desc, "lsa_io_obj_attr");
260         depth++;
261
262         if(!prs_align(ps))
263                 return False;
264         
265         /* these pointers had _better_ be zero, because we don't know
266            what they point to!
267          */
268         if(!prs_uint32("len         ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
269                 return False;
270         if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
271                 return False;
272         if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
273                 return False;
274         if(!prs_uint32("attributes  ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
275                 return False;
276         if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
277                 return False;
278         if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
279                 return False;
280
281         if (attr->ptr_sec_qos != 0) {
282                 if (UNMARSHALLING(ps))
283                         if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
284                                 return False;
285
286                 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
287                         return False;
288         }
289
290         return True;
291 }
292
293
294 /*******************************************************************
295  Inits an LSA_Q_OPEN_POL structure.
296 ********************************************************************/
297
298 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
299                      uint32 attributes, uint32 desired_access,
300                      LSA_SEC_QOS *qos)
301 {
302         DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes, 
303                   desired_access));
304
305         in->ptr = 1; /* undocumented pointer */
306
307         in->des_access = desired_access;
308
309         in->system_name = system_name;
310         init_lsa_obj_attr(&in->attr, attributes, qos);
311 }
312
313 /*******************************************************************
314  Reads or writes an LSA_Q_OPEN_POL structure.
315 ********************************************************************/
316
317 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps, 
318                        int depth)
319 {
320         prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
321         depth++;
322
323         if(!prs_uint32("ptr       ", ps, depth, &in->ptr))
324                 return False;
325         if(!prs_uint16("system_name", ps, depth, &in->system_name))
326                 return False;
327         if(!prs_align( ps ))
328                 return False;
329
330         if(!lsa_io_obj_attr("", &in->attr, ps, depth))
331                 return False;
332
333         if(!prs_uint32("des_access", ps, depth, &in->des_access))
334                 return False;
335
336         return True;
337 }
338
339 /*******************************************************************
340  Reads or writes an LSA_R_OPEN_POL structure.
341 ********************************************************************/
342
343 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps, 
344                        int depth)
345 {
346         prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
347         depth++;
348
349         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
350                 return False;
351
352         if(!prs_ntstatus("status", ps, depth, &out->status))
353                 return False;
354
355         return True;
356 }
357
358 /*******************************************************************
359  Inits an LSA_Q_OPEN_POL2 structure.
360 ********************************************************************/
361
362 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
363                         uint32 attributes, uint32 desired_access,
364                         LSA_SEC_QOS *qos)
365 {
366         DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes, 
367                   desired_access));
368
369         in->ptr = 1; /* undocumented pointer */
370
371         in->des_access = desired_access;
372
373         init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
374
375         init_lsa_obj_attr(&in->attr, attributes, qos);
376 }
377
378 /*******************************************************************
379  Reads or writes an LSA_Q_OPEN_POL2 structure.
380 ********************************************************************/
381
382 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps, 
383                         int depth)
384 {
385         prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
386         depth++;
387
388         if(!prs_uint32("ptr       ", ps, depth, &in->ptr))
389                 return False;
390
391         if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
392                 return False;
393         if(!lsa_io_obj_attr("", &in->attr, ps, depth))
394                 return False;
395
396         if(!prs_uint32("des_access", ps, depth, &in->des_access))
397                 return False;
398
399         return True;
400 }
401
402 /*******************************************************************
403  Reads or writes an LSA_R_OPEN_POL2 structure.
404 ********************************************************************/
405
406 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps, 
407                         int depth)
408 {
409         prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
410         depth++;
411
412         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
413                 return False;
414
415         if(!prs_ntstatus("status", ps, depth, &out->status))
416                 return False;
417
418         return True;
419 }
420
421 /*******************************************************************
422 makes an LSA_Q_QUERY_SEC_OBJ structure.
423 ********************************************************************/
424
425 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd, 
426                           uint32 sec_info)
427 {
428         DEBUG(5, ("init_q_query_sec_obj\n"));
429
430         in->pol = *hnd;
431         in->sec_info = sec_info;
432
433         return;
434 }
435
436 /*******************************************************************
437  Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
438 ********************************************************************/
439
440 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in, 
441                             prs_struct *ps, int depth)
442 {
443         prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
444         depth++;
445
446         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
447                 return False;
448
449         if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
450                 return False;
451
452         return True;
453
454
455 /*******************************************************************
456  Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
457 ********************************************************************/
458
459 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
460 {
461         prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
462         depth++;
463
464         if (!prs_align(ps))
465                 return False;
466
467         if (!prs_uint32("ptr", ps, depth, &out->ptr))
468                 return False;
469
470         if (out->ptr != 0) {
471                 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
472                         return False;
473         }
474
475         if (!prs_ntstatus("status", ps, depth, &out->status))
476                 return False;
477
478         return True;
479 }
480
481 /*******************************************************************
482  Inits an LSA_Q_QUERY_INFO structure.
483 ********************************************************************/
484
485 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
486 {
487         DEBUG(5, ("init_q_query\n"));
488
489         memcpy(&in->pol, hnd, sizeof(in->pol));
490
491         in->info_class = info_class;
492 }
493
494 /*******************************************************************
495  Reads or writes an LSA_Q_QUERY_INFO structure.
496 ********************************************************************/
497
498 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps, 
499                     int depth)
500 {
501         prs_debug(ps, depth, desc, "lsa_io_q_query");
502         depth++;
503
504         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
505                 return False;
506
507         if(!prs_uint16("info_class", ps, depth, &in->info_class))
508                 return False;
509
510         return True;
511 }
512
513 /*******************************************************************
514 makes an LSA_Q_ENUM_TRUST_DOM structure.
515 ********************************************************************/
516 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
517                            uint32 enum_context, uint32 preferred_len)
518 {
519         DEBUG(5, ("init_q_enum_trust_dom\n"));
520
521         q_e->pol = *pol;
522         q_e->enum_context = enum_context;
523         q_e->preferred_len = preferred_len;
524
525         return True;
526 }
527
528 /*******************************************************************
529  Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
530 ********************************************************************/
531
532 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e, 
533                              prs_struct *ps, int depth)
534 {
535         prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
536         depth++;
537
538         if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
539                 return False;
540
541         if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
542                 return False;
543         if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
544                 return False;
545
546         return True;
547 }
548
549 /*******************************************************************
550  Inits an LSA_R_ENUM_TRUST_DOM structure.
551 ********************************************************************/
552
553 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
554                            uint32 enum_context, uint32 num_domains,
555                            struct trustdom_info **td)
556 {
557         unsigned int i;
558
559         DEBUG(5, ("init_r_enum_trust_dom\n"));
560         
561         out->enum_context  = enum_context;
562         out->count         = num_domains;
563                         
564         if ( num_domains != 0 ) {
565         
566                 /* allocate container memory */
567                 
568                 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
569
570                 if ( !out->domlist ) {
571                         out->status = NT_STATUS_NO_MEMORY;
572                         return;
573                 }
574
575                 if (out->count) {
576                         out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
577                                                       out->count );
578                         if ( !out->domlist->domains ) {
579                                 out->status = NT_STATUS_NO_MEMORY;
580                                 return;
581                         }
582                 } else {                
583                         out->domlist->domains = NULL;
584                 }
585         
586                 out->domlist->count = out->count;
587                 
588                 /* initialize the list of domains and their sid */
589                 
590                 for (i = 0; i < num_domains; i++) {     
591                         smb_ucs2_t *name;
592                         if ( !(out->domlist->domains[i].sid =
593                                TALLOC_P(ctx, DOM_SID2)) ) {
594                                 out->status = NT_STATUS_NO_MEMORY;
595                                 return;
596                         }
597                                 
598                         init_dom_sid2(out->domlist->domains[i].sid,
599                                       &(td[i])->sid);
600                         if (push_ucs2_talloc(ctx, &name, (td[i])->name) == (size_t)-1){
601                                 out->status = NT_STATUS_NO_MEMORY;
602                                 return;
603                         }
604                         init_unistr4_w(ctx, &out->domlist->domains[i].name,
605                                        name);
606                 }
607         }
608
609 }
610
611 /*******************************************************************
612 ********************************************************************/
613
614 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
615 {
616         int i;
617         
618         prs_debug(ps, depth, desc, "lsa_io_domain_list");
619         depth++;
620
621         if(!prs_uint32("count", ps, depth, &domlist->count))
622                 return False;
623
624         if ( domlist->count == 0 )
625                 return True;
626                 
627         if ( UNMARSHALLING(ps) ) {
628                 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
629                         return False;
630         }
631         
632         /* headers */
633         
634         for ( i=0; i<domlist->count; i++ ) {
635                 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
636                         return False;
637                 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
638                         return False;
639         }
640
641         /* data */
642         
643         for ( i=0; i<domlist->count; i++ ) {
644                 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
645                         return False;
646                 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
647                         return False;
648         }
649         
650         return True;
651 }
652
653 /*******************************************************************
654  Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
655 ********************************************************************/
656
657 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out, 
658                              prs_struct *ps, int depth)
659 {
660         prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
661         depth++;
662
663         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
664                 return False;
665
666         if(!prs_uint32("count", ps, depth, &out->count))
667                 return False;
668
669         if ( !prs_pointer("trusted_domains", ps, depth, (void*)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
670                 return False;
671                 
672         if(!prs_ntstatus("status", ps, depth, &out->status))
673                 return False;
674
675         return True;
676 }
677
678 /*******************************************************************
679 reads or writes a structure.
680 ********************************************************************/
681
682 static BOOL lsa_io_dom_query_1(const char *desc, DOM_QUERY_1 *d_q, prs_struct *ps, int depth)
683 {
684         if (d_q == NULL)
685                 return False;
686
687         prs_debug(ps, depth, desc, "lsa_io_dom_query_1");
688         depth++;
689
690         if (!prs_align(ps))
691                 return False;
692
693         if (!prs_uint32("percent_full", ps, depth, &d_q->percent_full))
694                 return False;
695         if (!prs_uint32("log_size", ps, depth, &d_q->log_size))
696                 return False;
697         if (!smb_io_nttime("retention_time", ps, depth, &d_q->retention_time))
698                 return False;
699         if (!prs_uint8("shutdown_in_progress", ps, depth, &d_q->shutdown_in_progress))
700                 return False;
701         if (!smb_io_nttime("time_to_shutdown", ps, depth, &d_q->time_to_shutdown))
702                 return False;
703         if (!prs_uint32("next_audit_record", ps, depth, &d_q->next_audit_record))
704                 return False;
705         if (!prs_uint32("unknown", ps, depth, &d_q->unknown))
706                 return False;
707
708         return True;
709 }
710
711 /*******************************************************************
712 reads or writes a structure.
713 ********************************************************************/
714
715 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
716 {
717         if (d_q == NULL)
718                 return False;
719
720         prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
721         depth++;
722
723         if (!prs_align(ps))
724                 return False;
725
726         if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
727                 return False;
728         if (!prs_uint32("ptr   ", ps, depth, &d_q->ptr))
729                 return False;
730         if (!prs_uint32("count1", ps, depth, &d_q->count1))
731                 return False;
732
733         if (d_q->ptr) {
734
735                 if (!prs_uint32("count2", ps, depth, &d_q->count2))
736                         return False;
737
738                 if (d_q->count1 != d_q->count2)
739                         return False;
740
741                 if (UNMARSHALLING(ps)) {
742                         if (d_q->count2) {
743                                 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
744                                 if (!d_q->auditsettings) {
745                                         return False;
746                                 }
747                         } else {
748                                 d_q->auditsettings = NULL;
749                         }
750                 }
751
752                 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
753                         return False;
754         }
755
756         return True;
757 }
758
759 /*******************************************************************
760 reads or writes a dom query structure.
761 ********************************************************************/
762
763 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
764 {
765         if (d_q == NULL)
766                 return False;
767
768         prs_debug(ps, depth, desc, "lsa_io_dom_query_3");
769         depth++;
770
771         if(!prs_align(ps))
772                 return False;
773
774         if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
775                 return False;
776         if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
777                 return False;
778
779         if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
780                 return False;
781         if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
782                 return False;
783
784         if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
785                 return False;
786
787         if(!prs_align(ps))
788                 return False;
789
790         if (d_q->buffer_dom_sid != 0) {
791                 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
792                         return False;
793         } else {
794                 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
795         }
796
797         return True;
798 }
799
800 /*******************************************************************
801  Reads or writes a dom query structure.
802 ********************************************************************/
803
804 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
805 {
806         return lsa_io_dom_query_3("", d_q, ps, depth);
807 }
808
809 /*******************************************************************
810  Reads or writes a dom query structure.
811 ********************************************************************/
812
813 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
814 {
815         if (d_q == NULL)
816                 return False;
817
818         prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
819         depth++;
820
821         if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
822                 return False;
823
824         return True;
825 }
826
827 /*******************************************************************
828  Reads or writes a dom query structure.
829 ********************************************************************/
830
831 static BOOL lsa_io_dom_query_10(const char *desc, DOM_QUERY_10 *d_q, prs_struct *ps, int depth)
832 {
833         if (d_q == NULL)
834                 return False;
835
836         prs_debug(ps, depth, desc, "lsa_io_dom_query_10");
837         depth++;
838
839         if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
840                 return False;
841
842         return True;
843 }
844
845 /*******************************************************************
846  Reads or writes a dom query structure.
847 ********************************************************************/
848
849 static BOOL lsa_io_dom_query_11(const char *desc, DOM_QUERY_11 *d_q, prs_struct *ps, int depth)
850 {
851         if (d_q == NULL)
852                 return False;
853
854         prs_debug(ps, depth, desc, "lsa_io_dom_query_11");
855         depth++;
856
857         if (!prs_uint16("unknown", ps, depth, &d_q->unknown))
858                 return False;
859         if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
860                 return False;
861         if (!prs_uint8("log_is_full", ps, depth, &d_q->log_is_full))
862                 return False;
863
864         return True;
865 }
866
867 /*******************************************************************
868  Reads or writes an LSA_DNS_DOM_INFO structure.
869 ********************************************************************/
870
871 BOOL lsa_io_dom_query_12(const char *desc, DOM_QUERY_12 *info, prs_struct *ps, int depth)
872 {
873         prs_debug(ps, depth, desc, "lsa_io_dom_query_12");
874         depth++;
875
876         if(!prs_align(ps))
877                 return False;
878         if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
879                 return False;
880         if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
881                 return False;
882         if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
883                 return False;
884
885         if(!prs_align(ps))
886                 return False;
887         if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
888                 return False;
889
890         if(!prs_align(ps))
891                 return False;
892         if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
893                 return False;
894
895         if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
896                            info->hdr_nb_dom_name.buffer, ps, depth))
897                 return False;
898         if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name, 
899                            info->hdr_dns_dom_name.buffer, ps, depth))
900                 return False;
901         if(!smb_io_unistr2("forest", &info->uni_forest_name, 
902                            info->hdr_forest_name.buffer, ps, depth))
903                 return False;
904
905         if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
906                 return False;
907
908         return True;
909         
910 }
911
912 /*******************************************************************
913  Inits an LSA_Q_QUERY_INFO structure.
914 ********************************************************************/
915
916 void init_q_set(LSA_Q_SET_INFO *in, POLICY_HND *hnd, uint16 info_class, LSA_INFO_CTR ctr)
917 {
918         DEBUG(5,("init_q_set\n"));
919
920         in->info_class = info_class;
921
922         in->pol = *hnd;
923
924         in->ctr = ctr;
925         in->ctr.info_class = info_class;
926 }
927
928 /*******************************************************************
929 reads or writes a structure.
930 ********************************************************************/
931
932 static BOOL lsa_io_query_info_ctr2(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR2 *ctr)
933 {
934         prs_debug(ps, depth, desc, "lsa_io_query_info_ctr2");
935         depth++;
936
937         if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
938                 return False;
939
940         switch (ctr->info_class) {
941         case 1:
942                 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
943                         return False;
944                 break;
945         case 2:
946                 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
947                         return False;
948                 break;
949         case 3:
950                 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
951                         return False;
952                 break;
953         case 5:
954                 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
955                         return False;
956                 break;
957         case 6:
958                 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
959                         return False;
960                 break;
961         case 10:
962                 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
963                         return False;
964                 break;
965         case 11:
966                 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
967                         return False;
968                 break;
969         case 12:
970                 if(!lsa_io_dom_query_12("", &ctr->info.id12, ps, depth))
971                         return False;
972                 break;
973         default:
974                 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
975                 return False;
976                 break;
977         }
978
979         return True;
980 }
981
982
983 /*******************************************************************
984 reads or writes a structure.
985 ********************************************************************/
986
987 static BOOL lsa_io_query_info_ctr(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR *ctr)
988 {
989         prs_debug(ps, depth, desc, "lsa_io_query_info_ctr");
990         depth++;
991
992         if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
993                 return False;
994
995         if(!prs_align(ps))
996                 return False;
997
998         switch (ctr->info_class) {
999         case 1:
1000                 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
1001                         return False;
1002                 break;
1003         case 2:
1004                 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
1005                         return False;
1006                 break;
1007         case 3:
1008                 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
1009                         return False;
1010                 break;
1011         case 5:
1012                 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
1013                         return False;
1014                 break;
1015         case 6:
1016                 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
1017                         return False;
1018                 break;
1019         case 10:
1020                 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
1021                         return False;
1022                 break;
1023         case 11:
1024                 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
1025                         return False;
1026                 break;
1027         default:
1028                 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
1029                 return False;
1030                 break;
1031         }
1032
1033         return True;
1034 }
1035
1036 /*******************************************************************
1037  Reads or writes an LSA_R_QUERY_INFO structure.
1038 ********************************************************************/
1039
1040 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
1041 {
1042
1043         prs_debug(ps, depth, desc, "lsa_io_r_query");
1044         depth++;
1045
1046         if(!prs_align(ps))
1047                 return False;
1048
1049         if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
1050                 return False;
1051
1052         if (out->dom_ptr) {
1053
1054                 if(!lsa_io_query_info_ctr("", ps, depth, &out->ctr))
1055                         return False;
1056         }
1057
1058         if(!prs_align(ps))
1059                 return False;
1060
1061         if(!prs_ntstatus("status", ps, depth, &out->status))
1062                 return False;
1063
1064         return True;
1065 }
1066
1067 /*******************************************************************
1068  Reads or writes an LSA_Q_SET_INFO structure.
1069 ********************************************************************/
1070
1071 BOOL lsa_io_q_set(const char *desc, LSA_Q_SET_INFO *in, prs_struct *ps, 
1072                   int depth)
1073 {
1074         prs_debug(ps, depth, desc, "lsa_io_q_set");
1075         depth++;
1076
1077         if(!prs_align(ps))
1078                 return False;
1079
1080         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1081                 return False;
1082
1083         if(!prs_uint16("info_class", ps, depth, &in->info_class))
1084                 return False;
1085
1086         if(!lsa_io_query_info_ctr("", ps, depth, &in->ctr))
1087                 return False;
1088
1089         return True;
1090 }
1091
1092 /*******************************************************************
1093  Reads or writes an LSA_R_SET_INFO structure.
1094 ********************************************************************/
1095
1096 BOOL lsa_io_r_set(const char *desc, LSA_R_SET_INFO *out, prs_struct *ps, int depth)
1097 {
1098         prs_debug(ps, depth, desc, "lsa_io_r_set");
1099         depth++;
1100
1101         if(!prs_align(ps))
1102                 return False;
1103
1104         if(!prs_ntstatus("status", ps, depth, &out->status))
1105                 return False;
1106
1107         return True;
1108 }
1109
1110 /*******************************************************************
1111  Inits a LSA_SID_ENUM structure.
1112 ********************************************************************/
1113
1114 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen, 
1115                        int num_entries, const DOM_SID *sids)
1116 {
1117         int i;
1118
1119         DEBUG(5, ("init_lsa_sid_enum\n"));
1120
1121         sen->num_entries  = num_entries;
1122         sen->ptr_sid_enum = (num_entries != 0);
1123         sen->num_entries2 = num_entries;
1124
1125         /* Allocate memory for sids and sid pointers */
1126
1127         if (num_entries) {
1128                 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
1129                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
1130                         return;
1131                 }
1132
1133                 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
1134                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
1135                         return;
1136                 }
1137         }
1138
1139         /* Copy across SIDs and SID pointers */
1140
1141         for (i = 0; i < num_entries; i++) {
1142                 sen->ptr_sid[i] = 1;
1143                 init_dom_sid2(&sen->sid[i], &sids[i]);
1144         }
1145 }
1146
1147 /*******************************************************************
1148  Reads or writes a LSA_SID_ENUM structure.
1149 ********************************************************************/
1150
1151 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps, 
1152                             int depth)
1153 {
1154         unsigned int i;
1155
1156         prs_debug(ps, depth, desc, "lsa_io_sid_enum");
1157         depth++;
1158
1159         if(!prs_align(ps))
1160                 return False;
1161         
1162         if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
1163                 return False;
1164         if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
1165                 return False;
1166
1167         /*
1168            if the ptr is NULL, leave here. checked from a real w2k trace.
1169            JFM, 11/23/2001
1170          */
1171         
1172         if (sen->ptr_sid_enum==0)
1173                 return True;
1174
1175         if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
1176                 return False;
1177
1178         /* Mallocate memory if we're unpacking from the wire */
1179
1180         if (UNMARSHALLING(ps) && sen->num_entries) {
1181                 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
1182                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1183                                   "ptr_sid\n"));
1184                         return False;
1185                 }
1186
1187                 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
1188                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1189                                   "sids\n"));
1190                         return False;
1191                 }
1192         }
1193
1194         for (i = 0; i < sen->num_entries; i++) {        
1195                 fstring temp;
1196
1197                 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
1198                 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
1199                         return False;
1200                 }
1201         }
1202
1203         for (i = 0; i < sen->num_entries; i++) {
1204                 fstring temp;
1205
1206                 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
1207                 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
1208                         return False;
1209                 }
1210         }
1211
1212         return True;
1213 }
1214
1215 /*******************************************************************
1216  Inits an LSA_R_ENUM_TRUST_DOM structure.
1217 ********************************************************************/
1218
1219 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l, 
1220                         POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
1221                         uint16 level)
1222 {
1223         DEBUG(5, ("init_q_lookup_sids\n"));
1224
1225         ZERO_STRUCTP(q_l);
1226
1227         memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
1228         init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
1229         
1230         q_l->level = level;
1231 }
1232
1233 /*******************************************************************
1234  Reads or writes a LSA_Q_LOOKUP_SIDS structure.
1235 ********************************************************************/
1236
1237 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
1238                           int depth)
1239 {
1240         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
1241         depth++;
1242
1243         if(!prs_align(ps))
1244                 return False;
1245         
1246         if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1247                 return False;
1248         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1249                 return False;
1250         if(!lsa_io_trans_names("names  ", &q_s->names, ps, depth)) /* translated names */
1251                 return False;
1252
1253         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1254                 return False;
1255         if(!prs_align(ps))
1256                 return False;
1257
1258         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1259                 return False;
1260
1261         return True;
1262 }
1263
1264 /*******************************************************************
1265  Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1266 ********************************************************************/
1267
1268 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1269                           int depth)
1270 {
1271         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1272         depth++;
1273
1274         if(!prs_align(ps))
1275                 return False;
1276         
1277         if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1278                 return False;
1279         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1280                 return False;
1281         if(!lsa_io_trans_names2("names  ", &q_s->names, ps, depth)) /* translated names */
1282                 return False;
1283
1284         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1285                 return False;
1286         if(!prs_align(ps))
1287                 return False;
1288
1289         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1290                 return False;
1291         if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1292                 return False;
1293         if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1294                 return False;
1295
1296         return True;
1297 }
1298
1299 /*******************************************************************
1300  Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1301 ********************************************************************/
1302
1303 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1304                           int depth)
1305 {
1306         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1307         depth++;
1308
1309         if(!prs_align(ps))
1310                 return False;
1311         
1312         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1313                 return False;
1314         if(!lsa_io_trans_names2("names  ", &q_s->names, ps, depth)) /* translated names */
1315                 return False;
1316
1317         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1318                 return False;
1319         if(!prs_align(ps))
1320                 return False;
1321
1322         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1323                 return False;
1324         if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1325                 return False;
1326         if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1327                 return False;
1328
1329         return True;
1330 }
1331
1332
1333 /*******************************************************************
1334  Reads or writes a structure.
1335 ********************************************************************/
1336
1337 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1338                 prs_struct *ps, int depth)
1339 {
1340         unsigned int i;
1341
1342         prs_debug(ps, depth, desc, "lsa_io_trans_names");
1343         depth++;
1344
1345         if(!prs_align(ps))
1346                 return False;
1347    
1348         if(!prs_uint32("num_entries    ", ps, depth, &trn->num_entries))
1349                 return False;
1350         if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1351                 return False;
1352
1353         if (trn->ptr_trans_names != 0) {
1354                 if(!prs_uint32("num_entries2   ", ps, depth, 
1355                                &trn->num_entries2))
1356                         return False;
1357
1358                 if (trn->num_entries2 != trn->num_entries) {
1359                         /* RPC fault */
1360                         return False;
1361                 }
1362
1363                 if (UNMARSHALLING(ps) && trn->num_entries2) {
1364                         if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries2)) == NULL) {
1365                                 return False;
1366                         }
1367
1368                         if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1369                                 return False;
1370                         }
1371                 }
1372
1373                 for (i = 0; i < trn->num_entries2; i++) {
1374                         fstring t;
1375                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1376
1377                         if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1378                                 return False;
1379                 }
1380
1381                 for (i = 0; i < trn->num_entries2; i++) {
1382                         fstring t;
1383                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1384
1385                         if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1386                                 return False;
1387                         if(!prs_align(ps))
1388                                 return False;
1389                 }
1390         }
1391
1392         return True;
1393 }
1394
1395 /*******************************************************************
1396  Reads or writes a structure.
1397 ********************************************************************/
1398
1399 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1400                 prs_struct *ps, int depth)
1401 {
1402         unsigned int i;
1403
1404         prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1405         depth++;
1406
1407         if(!prs_align(ps))
1408                 return False;
1409    
1410         if(!prs_uint32("num_entries    ", ps, depth, &trn->num_entries))
1411                 return False;
1412         if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1413                 return False;
1414
1415         if (trn->ptr_trans_names != 0) {
1416                 if(!prs_uint32("num_entries2   ", ps, depth, 
1417                                &trn->num_entries2))
1418                         return False;
1419
1420                 if (trn->num_entries2 != trn->num_entries) {
1421                         /* RPC fault */
1422                         return False;
1423                 }
1424
1425                 if (UNMARSHALLING(ps) && trn->num_entries2) {
1426                         if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries2)) == NULL) {
1427                                 return False;
1428                         }
1429
1430                         if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1431                                 return False;
1432                         }
1433                 }
1434
1435                 for (i = 0; i < trn->num_entries2; i++) {
1436                         fstring t;
1437                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1438
1439                         if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1440                                 return False;
1441                 }
1442
1443                 for (i = 0; i < trn->num_entries2; i++) {
1444                         fstring t;
1445                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1446
1447                         if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1448                                 return False;
1449                         if(!prs_align(ps))
1450                                 return False;
1451                 }
1452         }
1453
1454         return True;
1455 }
1456
1457
1458 /*******************************************************************
1459  Reads or writes a structure.
1460 ********************************************************************/
1461
1462 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s, 
1463                           prs_struct *ps, int depth)
1464 {
1465         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1466         depth++;
1467
1468         if(!prs_align(ps))
1469                 return False;
1470         
1471         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1472                 return False;
1473
1474         if (r_s->ptr_dom_ref != 0)
1475                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1476                         return False;
1477
1478         if(!lsa_io_trans_names("names  ", &r_s->names, ps, depth)) /* translated names */
1479                 return False;
1480
1481         if(!prs_align(ps))
1482                 return False;
1483
1484         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1485                 return False;
1486
1487         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1488                 return False;
1489
1490         return True;
1491 }
1492
1493 /*******************************************************************
1494  Reads or writes a structure.
1495 ********************************************************************/
1496
1497 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s, 
1498                           prs_struct *ps, int depth)
1499 {
1500         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1501         depth++;
1502
1503         if(!prs_align(ps))
1504                 return False;
1505         
1506         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1507                 return False;
1508
1509         if (r_s->ptr_dom_ref != 0)
1510                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1511                         return False;
1512
1513         if(!lsa_io_trans_names2("names  ", &r_s->names, ps, depth)) /* translated names */
1514                 return False;
1515
1516         if(!prs_align(ps))
1517                 return False;
1518
1519         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1520                 return False;
1521
1522         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1523                 return False;
1524
1525         return True;
1526 }
1527
1528
1529 /*******************************************************************
1530  Reads or writes a structure.
1531 ********************************************************************/
1532
1533 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s, 
1534                           prs_struct *ps, int depth)
1535 {
1536         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1537         depth++;
1538
1539         if(!prs_align(ps))
1540                 return False;
1541         
1542         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1543                 return False;
1544
1545         if (r_s->ptr_dom_ref != 0)
1546                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1547                         return False;
1548
1549         if(!lsa_io_trans_names2("names  ", &r_s->names, ps, depth)) /* translated names */
1550                 return False;
1551
1552         if(!prs_align(ps))
1553                 return False;
1554
1555         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1556                 return False;
1557
1558         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1559                 return False;
1560
1561         return True;
1562 }
1563
1564 /*******************************************************************
1565 makes a structure.
1566 ********************************************************************/
1567
1568 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l, 
1569                          POLICY_HND *hnd, int num_names, const char **names, 
1570                          int level)
1571 {
1572         unsigned int i;
1573
1574         DEBUG(5, ("init_q_lookup_names\n"));
1575
1576         ZERO_STRUCTP(q_l);
1577
1578         q_l->pol = *hnd;
1579         q_l->num_entries = num_names;
1580         q_l->num_entries2 = num_names;
1581         q_l->lookup_level = level;
1582
1583         if (num_names) {
1584                 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1585                         DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1586                         return;
1587                 }
1588
1589                 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1590                         DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1591                         return;
1592                 }
1593         } else {
1594                 q_l->uni_name = NULL;
1595                 q_l->hdr_name = NULL;
1596         }
1597
1598         for (i = 0; i < num_names; i++) {
1599                 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1600                 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1601         }
1602 }
1603
1604 /*******************************************************************
1605 reads or writes a structure.
1606 ********************************************************************/
1607
1608 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r, 
1609                            prs_struct *ps, int depth)
1610 {
1611         unsigned int i;
1612
1613         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1614         depth++;
1615
1616         if(!prs_align(ps))
1617                 return False;
1618
1619         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1620                 return False;
1621
1622         if(!prs_align(ps))
1623                 return False;
1624         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1625                 return False;
1626         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1627                 return False;
1628
1629         if (UNMARSHALLING(ps)) {
1630                 if (q_r->num_entries) {
1631                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1632                                 return False;
1633                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1634                                 return False;
1635                 }
1636         }
1637
1638         for (i = 0; i < q_r->num_entries; i++) {
1639                 if(!prs_align(ps))
1640                         return False;
1641                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1642                         return False;
1643         }
1644
1645         for (i = 0; i < q_r->num_entries; i++) {
1646                 if(!prs_align(ps))
1647                         return False;
1648                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1649                         return False;
1650         }
1651
1652         if(!prs_align(ps))
1653                 return False;
1654         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1655                 return False;
1656         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1657                 return False;
1658         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1659                 return False;
1660         if(!prs_align(ps))
1661                 return False;
1662         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1663                 return False;
1664
1665         return True;
1666 }
1667
1668 /*******************************************************************
1669 reads or writes a structure.
1670 ********************************************************************/
1671
1672 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1673 {
1674         unsigned int i;
1675
1676         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1677         depth++;
1678
1679         if(!prs_align(ps))
1680                 return False;
1681
1682         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1683                 return False;
1684
1685         if (out->ptr_dom_ref != 0)
1686                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1687                         return False;
1688
1689         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1690                 return False;
1691         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1692                 return False;
1693
1694         if (out->ptr_entries != 0) {
1695                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1696                         return False;
1697
1698                 if (out->num_entries2 != out->num_entries) {
1699                         /* RPC fault */
1700                         return False;
1701                 }
1702
1703                 if (UNMARSHALLING(ps) && out->num_entries2) {
1704                         if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1705                             == NULL) {
1706                                 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1707                                 return False;
1708                         }
1709                 }
1710
1711                 for (i = 0; i < out->num_entries2; i++)
1712                         if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1713                                 return False;
1714         }
1715
1716         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1717                 return False;
1718
1719         if(!prs_ntstatus("status      ", ps, depth, &out->status))
1720                 return False;
1721
1722         return True;
1723 }
1724
1725 /*******************************************************************
1726 reads or writes a structure.
1727 ********************************************************************/
1728
1729 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r, 
1730                            prs_struct *ps, int depth)
1731 {
1732         unsigned int i;
1733
1734         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1735         depth++;
1736
1737         if(!prs_align(ps))
1738                 return False;
1739
1740         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1741                 return False;
1742
1743         if(!prs_align(ps))
1744                 return False;
1745         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1746                 return False;
1747         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1748                 return False;
1749
1750         if (UNMARSHALLING(ps)) {
1751                 if (q_r->num_entries) {
1752                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1753                                 return False;
1754                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1755                                 return False;
1756                 }
1757         }
1758
1759         for (i = 0; i < q_r->num_entries; i++) {
1760                 if(!prs_align(ps))
1761                         return False;
1762                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1763                         return False;
1764         }
1765
1766         for (i = 0; i < q_r->num_entries; i++) {
1767                 if(!prs_align(ps))
1768                         return False;
1769                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1770                         return False;
1771         }
1772
1773         if(!prs_align(ps))
1774                 return False;
1775         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1776                 return False;
1777         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1778                 return False;
1779         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1780                 return False;
1781         if(!prs_align(ps))
1782                 return False;
1783         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1784                 return False;
1785         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
1786                 return False;
1787         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
1788                 return False;
1789
1790         return True;
1791 }
1792
1793 /*******************************************************************
1794 reads or writes a structure.
1795 ********************************************************************/
1796
1797 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1798 {
1799         unsigned int i;
1800
1801         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1802         depth++;
1803
1804         if(!prs_align(ps))
1805                 return False;
1806
1807         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1808                 return False;
1809
1810         if (out->ptr_dom_ref != 0)
1811                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1812                         return False;
1813
1814         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1815                 return False;
1816         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1817                 return False;
1818
1819         if (out->ptr_entries != 0) {
1820                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1821                         return False;
1822
1823                 if (out->num_entries2 != out->num_entries) {
1824                         /* RPC fault */
1825                         return False;
1826                 }
1827
1828                 if (UNMARSHALLING(ps) && out->num_entries2) {
1829                         if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1830                             == NULL) {
1831                                 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1832                                 return False;
1833                         }
1834                 }
1835
1836                 for (i = 0; i < out->num_entries2; i++)
1837                         if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1838                                 return False;
1839         }
1840
1841         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1842                 return False;
1843
1844         if(!prs_ntstatus("status      ", ps, depth, &out->status))
1845                 return False;
1846
1847         return True;
1848 }
1849
1850 /*******************************************************************
1851  Internal lsa data type io.
1852  Following pass must read DOM_SID2 types.
1853 ********************************************************************/
1854
1855 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r, 
1856                            prs_struct *ps, int depth)
1857 {
1858         prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1859         depth++;
1860
1861         if(!prs_align(ps))
1862                 return False;
1863         if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1864                 return False;
1865         if(!prs_align(ps))
1866                 return False;
1867         /* Second pass will read/write these. */
1868         if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1869                 return False;
1870         if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1871                 return False;
1872         if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1873                 return False;
1874         
1875         return True;
1876 }
1877
1878 /*******************************************************************
1879  Identical to lsa_io_q_lookup_names2.
1880 ********************************************************************/
1881
1882 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r, 
1883                            prs_struct *ps, int depth)
1884 {
1885         unsigned int i;
1886
1887         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1888         depth++;
1889
1890         if(!prs_align(ps))
1891                 return False;
1892
1893         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1894                 return False;
1895
1896         if(!prs_align(ps))
1897                 return False;
1898         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1899                 return False;
1900         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1901                 return False;
1902
1903         if (UNMARSHALLING(ps)) {
1904                 if (q_r->num_entries) {
1905                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1906                                 return False;
1907                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1908                                 return False;
1909                 }
1910         }
1911
1912         for (i = 0; i < q_r->num_entries; i++) {
1913                 if(!prs_align(ps))
1914                         return False;
1915                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1916                         return False;
1917         }
1918
1919         for (i = 0; i < q_r->num_entries; i++) {
1920                 if(!prs_align(ps))
1921                         return False;
1922                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1923                         return False;
1924         }
1925
1926         if(!prs_align(ps))
1927                 return False;
1928         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1929                 return False;
1930         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1931                 return False;
1932         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1933                 return False;
1934         if(!prs_align(ps))
1935                 return False;
1936         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1937                 return False;
1938         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
1939                 return False;
1940         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
1941                 return False;
1942
1943         return True;
1944 }
1945
1946 /*******************************************************************
1947 reads or writes a structure.
1948 ********************************************************************/
1949
1950 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1951 {
1952         unsigned int i;
1953
1954         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1955         depth++;
1956
1957         if(!prs_align(ps))
1958                 return False;
1959
1960         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1961                 return False;
1962
1963         if (out->ptr_dom_ref != 0)
1964                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1965                         return False;
1966
1967         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1968                 return False;
1969         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1970                 return False;
1971
1972         if (out->ptr_entries != 0) {
1973                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1974                         return False;
1975
1976                 if (out->num_entries2 != out->num_entries) {
1977                         /* RPC fault */
1978                         return False;
1979                 }
1980
1981                 if (UNMARSHALLING(ps) && out->num_entries2) {
1982                         if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1983                             == NULL) {
1984                                 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1985                                 return False;
1986                         }
1987                 }
1988
1989                 for (i = 0; i < out->num_entries2; i++) {
1990                         if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1991                                 return False;
1992                         }
1993                 }
1994                 /* Now process the DOM_SID2 entries. */
1995                 for (i = 0; i < out->num_entries2; i++) {
1996                         if (out->trans_sids[i].sid2) {
1997                                 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1998                                         return False;
1999                                 }
2000                         }
2001                 }
2002         }
2003
2004         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2005                 return False;
2006
2007         if(!prs_ntstatus("status      ", ps, depth, &out->status))
2008                 return False;
2009
2010         return True;
2011 }
2012
2013 /*******************************************************************
2014 ********************************************************************/
2015
2016 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r, 
2017                            prs_struct *ps, int depth)
2018 {
2019         unsigned int i;
2020
2021         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names4");
2022         depth++;
2023
2024         if(!prs_align(ps))
2025                 return False;
2026
2027         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
2028                 return False;
2029         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
2030                 return False;
2031
2032         if (UNMARSHALLING(ps)) {
2033                 if (q_r->num_entries) {
2034                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
2035                                 return False;
2036                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
2037                                 return False;
2038                 }
2039         }
2040
2041         for (i = 0; i < q_r->num_entries; i++) {
2042                 if(!prs_align(ps))
2043                         return False;
2044                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
2045                         return False;
2046         }
2047
2048         for (i = 0; i < q_r->num_entries; i++) {
2049                 if(!prs_align(ps))
2050                         return False;
2051                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
2052                         return False;
2053         }
2054
2055         if(!prs_align(ps))
2056                 return False;
2057         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
2058                 return False;
2059         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
2060                 return False;
2061         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
2062                 return False;
2063         if(!prs_align(ps))
2064                 return False;
2065         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
2066                 return False;
2067         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
2068                 return False;
2069         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
2070                 return False;
2071
2072         return True;
2073 }
2074
2075 /*******************************************************************
2076  Identical to lsa_io_r_lookup_names3.
2077 ********************************************************************/
2078
2079 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
2080 {
2081         unsigned int i;
2082
2083         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
2084         depth++;
2085
2086         if(!prs_align(ps))
2087                 return False;
2088
2089         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
2090                 return False;
2091
2092         if (out->ptr_dom_ref != 0)
2093                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
2094                         return False;
2095
2096         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
2097                 return False;
2098         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
2099                 return False;
2100
2101         if (out->ptr_entries != 0) {
2102                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
2103                         return False;
2104
2105                 if (out->num_entries2 != out->num_entries) {
2106                         /* RPC fault */
2107                         return False;
2108                 }
2109
2110                 if (UNMARSHALLING(ps) && out->num_entries2) {
2111                         if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
2112                             == NULL) {
2113                                 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
2114                                 return False;
2115                         }
2116                 }
2117
2118                 for (i = 0; i < out->num_entries2; i++) {
2119                         if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
2120                                 return False;
2121                         }
2122                 }
2123                 /* Now process the DOM_SID2 entries. */
2124                 for (i = 0; i < out->num_entries2; i++) {
2125                         if (out->trans_sids[i].sid2) {
2126                                 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
2127                                         return False;
2128                                 }
2129                         }
2130                 }
2131         }
2132
2133         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2134                 return False;
2135
2136         if(!prs_ntstatus("status      ", ps, depth, &out->status))
2137                 return False;
2138
2139         return True;
2140 }
2141
2142 /*******************************************************************
2143  Inits an LSA_Q_CLOSE structure.
2144 ********************************************************************/
2145
2146 void init_lsa_q_close(LSA_Q_CLOSE *in, POLICY_HND *hnd)
2147 {
2148         DEBUG(5, ("init_lsa_q_close\n"));
2149
2150         memcpy(&in->pol, hnd, sizeof(in->pol));
2151 }
2152
2153 /*******************************************************************
2154  Reads or writes an LSA_Q_CLOSE structure.
2155 ********************************************************************/
2156
2157 BOOL lsa_io_q_close(const char *desc, LSA_Q_CLOSE *in, prs_struct *ps, int depth)
2158 {
2159         prs_debug(ps, depth, desc, "lsa_io_q_close");
2160         depth++;
2161
2162         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
2163                 return False;
2164
2165         return True;
2166 }
2167
2168 /*******************************************************************
2169  Reads or writes an LSA_R_CLOSE structure.
2170 ********************************************************************/
2171
2172 BOOL lsa_io_r_close(const char *desc,  LSA_R_CLOSE *out, prs_struct *ps, int depth)
2173 {
2174         prs_debug(ps, depth, desc, "lsa_io_r_close");
2175         depth++;
2176
2177         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
2178                 return False;
2179
2180         if(!prs_ntstatus("status", ps, depth, &out->status))
2181                 return False;
2182
2183         return True;
2184 }
2185
2186 /*******************************************************************
2187  Reads or writes an LSA_Q_OPEN_SECRET structure.
2188 ********************************************************************/
2189
2190 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
2191 {
2192         prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
2193         depth++;
2194
2195         if(!prs_align(ps))
2196                 return False;
2197
2198         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
2199                 return False;
2200
2201         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
2202                 return False;
2203         if(!prs_align(ps))
2204                 return False;
2205
2206         if(!prs_uint32("access", ps, depth, &in->access))
2207                 return False;
2208
2209         return True;
2210 }
2211
2212 /*******************************************************************
2213  Reads or writes an LSA_R_OPEN_SECRET structure.
2214 ********************************************************************/
2215
2216 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
2217 {
2218         prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
2219         depth++;
2220
2221         if(!prs_align(ps))
2222                 return False;
2223    
2224         if(!smb_io_pol_hnd("", &out->handle, ps, depth))
2225                 return False;
2226
2227         if(!prs_ntstatus("status", ps, depth, &out->status))
2228                 return False;
2229
2230         return True;
2231 }
2232
2233 /*******************************************************************
2234  Inits an LSA_Q_ENUM_PRIVS structure.
2235 ********************************************************************/
2236
2237 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2238 {
2239         DEBUG(5, ("init_q_enum_privs\n"));
2240
2241         memcpy(&in->pol, hnd, sizeof(in->pol));
2242
2243         in->enum_context = enum_context;
2244         in->pref_max_length = pref_max_length;
2245 }
2246
2247 /*******************************************************************
2248 reads or writes a structure.
2249 ********************************************************************/
2250 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
2251 {
2252         if (in == NULL)
2253                 return False;
2254
2255         prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
2256         depth++;
2257
2258         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2259                 return False;
2260
2261         if(!prs_uint32("enum_context   ", ps, depth, &in->enum_context))
2262                 return False;
2263         if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2264                 return False;
2265
2266         return True;
2267 }
2268
2269 /*******************************************************************
2270 reads or writes a structure.
2271 ********************************************************************/
2272 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
2273 {
2274         uint32 i;
2275
2276         if (entries == NULL)
2277                 return False;
2278
2279         prs_debug(ps, depth, desc, "lsa_io_priv_entries");
2280         depth++;
2281
2282         if(!prs_align(ps))
2283                 return False;
2284
2285         for (i = 0; i < count; i++) {
2286                 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2287                         return False;
2288                 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2289                         return False;
2290                 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2291                         return False;
2292         }
2293
2294         for (i = 0; i < count; i++)
2295                 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2296                         return False;
2297
2298         return True;
2299 }
2300
2301 /*******************************************************************
2302  Inits an LSA_R_ENUM_PRIVS structure.
2303 ********************************************************************/
2304
2305 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2306                           uint32 count, LSA_PRIV_ENTRY *entries)
2307 {
2308         DEBUG(5, ("init_lsa_r_enum_privs\n"));
2309
2310         out->enum_context=enum_context;
2311         out->count=count;
2312         
2313         if (entries!=NULL) {
2314                 out->ptr=1;
2315                 out->count1=count;
2316                 out->privs=entries;
2317         } else {
2318                 out->ptr=0;
2319                 out->count1=0;
2320                 out->privs=NULL;
2321         }               
2322 }
2323
2324 /*******************************************************************
2325 reads or writes a structure.
2326 ********************************************************************/
2327 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2328 {
2329         if (out == NULL)
2330                 return False;
2331
2332         prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2333         depth++;
2334
2335         if(!prs_align(ps))
2336                 return False;
2337
2338         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2339                 return False;
2340         if(!prs_uint32("count", ps, depth, &out->count))
2341                 return False;
2342         if(!prs_uint32("ptr", ps, depth, &out->ptr))
2343                 return False;
2344
2345         if (out->ptr) {
2346                 if(!prs_uint32("count1", ps, depth, &out->count1))
2347                         return False;
2348
2349                 if (UNMARSHALLING(ps) && out->count1)
2350                         if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2351                                 return False;
2352
2353                 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2354                         return False;
2355         }
2356
2357         if(!prs_align(ps))
2358                 return False;
2359
2360         if(!prs_ntstatus("status", ps, depth, &out->status))
2361                 return False;
2362
2363         return True;
2364 }
2365
2366 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2367 {
2368         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2369
2370         init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2371         init_uni_hdr(&trn->hdr_name, &trn->name);
2372         trn->lang_id = lang_id;
2373         trn->lang_id_sys = lang_id_sys;
2374 }
2375
2376 /*******************************************************************
2377 reads or writes a structure.
2378 ********************************************************************/
2379 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2380 {
2381         if (in == NULL)
2382                 return False;
2383
2384         prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2385         depth++;
2386
2387         if(!prs_align(ps))
2388                 return False;
2389
2390         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2391                 return False;
2392
2393         if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2394                 return False;
2395
2396         if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2397                 return False;
2398
2399         if(!prs_uint16("lang_id    ", ps, depth, &in->lang_id))
2400                 return False;
2401         if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2402                 return False;
2403
2404         return True;
2405 }
2406
2407 /*******************************************************************
2408 reads or writes a structure.
2409 ********************************************************************/
2410 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2411 {
2412         if (out == NULL)
2413                 return False;
2414
2415         prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2416         depth++;
2417
2418         if (!prs_align(ps))
2419                 return False;
2420
2421         if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2422                 return False;
2423
2424         if (out->ptr_info){
2425                 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2426                         return False;
2427
2428                 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2429                         return False;
2430         }
2431 /*
2432         if(!prs_align(ps))
2433                 return False;
2434 */
2435         if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2436                 return False;
2437
2438         if(!prs_align(ps))
2439                 return False;
2440         if(!prs_ntstatus("status", ps, depth, &out->status))
2441                 return False;
2442
2443         return True;
2444 }
2445
2446 /*
2447   initialise a LSA_Q_ENUM_ACCOUNTS structure
2448 */
2449 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2450 {
2451         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2452
2453         trn->enum_context = enum_context;
2454         trn->pref_max_length = pref_max_length;
2455 }
2456
2457 /*******************************************************************
2458 reads or writes a structure.
2459 ********************************************************************/
2460 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2461 {
2462         if (in == NULL)
2463                 return False;
2464
2465         prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2466         depth++;
2467
2468         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2469                 return False;
2470
2471         if(!prs_uint32("enum_context   ", ps, depth, &in->enum_context))
2472                 return False;
2473         if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2474                 return False;
2475
2476         return True;
2477 }
2478
2479
2480 /*******************************************************************
2481  Inits an LSA_R_ENUM_PRIVS structure.
2482 ********************************************************************/
2483
2484 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2485 {
2486         DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2487
2488         out->enum_context=enum_context;
2489         if (out->enum_context!=0) {
2490                 out->sids.num_entries=enum_context;
2491                 out->sids.ptr_sid_enum=1;
2492                 out->sids.num_entries2=enum_context;
2493         } else {
2494                 out->sids.num_entries=0;
2495                 out->sids.ptr_sid_enum=0;
2496                 out->sids.num_entries2=0;
2497         }
2498 }
2499
2500 /*******************************************************************
2501 reads or writes a structure.
2502 ********************************************************************/
2503 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2504 {
2505         if (out == NULL)
2506                 return False;
2507
2508         prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2509         depth++;
2510
2511         if (!prs_align(ps))
2512                 return False;
2513
2514         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2515                 return False;
2516
2517         if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2518                 return False;
2519
2520         if (!prs_align(ps))
2521                 return False;
2522
2523         if(!prs_ntstatus("status", ps, depth, &out->status))
2524                 return False;
2525
2526         return True;
2527 }
2528
2529
2530 /*******************************************************************
2531  Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2532 ********************************************************************/
2533
2534 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2535 {
2536         prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2537         depth++;
2538
2539         if(!prs_align(ps))
2540                 return False;
2541    
2542         if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2543                 return False;
2544
2545         if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2546                 return False;
2547
2548         if (!prs_align(ps))
2549           return False;
2550
2551         if(!prs_uint32("unk1", ps, depth, &in->unk1))
2552                 return False;
2553         if(!prs_uint32("unk2", ps, depth, &in->unk2))
2554                 return False;
2555         if(!prs_uint32("unk3", ps, depth, &in->unk3))
2556                 return False;
2557
2558         /* Don't bother to read or write at present... */
2559         return True;
2560 }
2561
2562 /*******************************************************************
2563  Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2564 ********************************************************************/
2565
2566 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2567 {
2568         prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2569         depth++;
2570
2571         if(!prs_align(ps))
2572                 return False;
2573    
2574         if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2575                 return False;
2576         if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2577                 return False;
2578         if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2579                 return False;
2580
2581         if (!prs_align(ps))
2582           return False;
2583         
2584         if(!prs_uint32("unk1", ps, depth, &out->unk1))
2585                 return False;
2586
2587         if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2588                 return False;
2589         if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2590                 return False;
2591         if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2592                 return False;
2593
2594         if (!prs_align(ps))
2595           return False;
2596         
2597         if(!prs_ntstatus("status", ps, depth, &out->status))
2598                 return False;
2599
2600         return True;
2601 }
2602
2603 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2604 {
2605         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2606
2607         init_dom_sid2(&trn->sid, sid);
2608         trn->access = desired_access;
2609 }
2610
2611
2612 /*******************************************************************
2613  Reads or writes an LSA_Q_CREATEACCOUNT structure.
2614 ********************************************************************/
2615
2616 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2617 {
2618         prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2619         depth++;
2620
2621         if(!prs_align(ps))
2622                 return False;
2623  
2624         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2625                 return False;
2626
2627         if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2628                 return False;
2629
2630         if(!prs_uint32("access", ps, depth, &out->access))
2631                 return False;
2632   
2633         return True;
2634 }
2635
2636 /*******************************************************************
2637  Reads or writes an LSA_R_CREATEACCOUNT structure.
2638 ********************************************************************/
2639
2640 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT  *out, prs_struct *ps, int depth)
2641 {
2642         prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2643         depth++;
2644
2645         if(!prs_align(ps))
2646                 return False;
2647  
2648         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2649                 return False;
2650
2651         if(!prs_ntstatus("status", ps, depth, &out->status))
2652                 return False;
2653
2654         return True;
2655 }
2656
2657
2658 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2659 {
2660         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2661
2662         init_dom_sid2(&trn->sid, sid);
2663         trn->access = desired_access;
2664 }
2665
2666 /*******************************************************************
2667  Reads or writes an LSA_Q_OPENACCOUNT structure.
2668 ********************************************************************/
2669
2670 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2671 {
2672         prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2673         depth++;
2674
2675         if(!prs_align(ps))
2676                 return False;
2677  
2678         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2679                 return False;
2680
2681         if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2682                 return False;
2683
2684         if(!prs_uint32("access", ps, depth, &out->access))
2685                 return False;
2686   
2687         return True;
2688 }
2689
2690 /*******************************************************************
2691  Reads or writes an LSA_R_OPENACCOUNT structure.
2692 ********************************************************************/
2693
2694 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT  *out, prs_struct *ps, int depth)
2695 {
2696         prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2697         depth++;
2698
2699         if(!prs_align(ps))
2700                 return False;
2701  
2702         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2703                 return False;
2704
2705         if(!prs_ntstatus("status", ps, depth, &out->status))
2706                 return False;
2707
2708         return True;
2709 }
2710
2711
2712 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2713 {
2714         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2715
2716 }
2717
2718 /*******************************************************************
2719  Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2720 ********************************************************************/
2721
2722 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2723 {
2724         prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2725         depth++;
2726
2727         if(!prs_align(ps))
2728                 return False;
2729  
2730         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2731                 return False;
2732
2733         return True;
2734 }
2735
2736 /*******************************************************************
2737  Reads or writes an LUID structure.
2738 ********************************************************************/
2739
2740 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2741 {
2742         prs_debug(ps, depth, desc, "lsa_io_luid");
2743         depth++;
2744
2745         if(!prs_align(ps))
2746                 return False;
2747  
2748         if(!prs_uint32("low", ps, depth, &out->low))
2749                 return False;
2750
2751         if(!prs_uint32("high", ps, depth, &out->high))
2752                 return False;
2753
2754         return True;
2755 }
2756
2757 /*******************************************************************
2758  Reads or writes an LUID_ATTR structure.
2759 ********************************************************************/
2760
2761 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2762 {
2763         prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2764         depth++;
2765
2766         if(!prs_align(ps))
2767                 return False;
2768  
2769         if (!lsa_io_luid(desc, &out->luid, ps, depth))
2770                 return False;
2771
2772         if(!prs_uint32("attr", ps, depth, &out->attr))
2773                 return False;
2774
2775         return True;
2776 }
2777
2778 /*******************************************************************
2779  Reads or writes an PRIVILEGE_SET structure.
2780 ********************************************************************/
2781
2782 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2783 {
2784         uint32 i, dummy;
2785
2786         prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2787         depth++;
2788
2789         if(!prs_align(ps))
2790                 return False;
2791  
2792         if(!prs_uint32("count", ps, depth, &dummy))
2793                 return False;
2794         if(!prs_uint32("control", ps, depth, &out->control))
2795                 return False;
2796
2797         for (i=0; i<out->count; i++) {
2798                 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2799                         return False;
2800         }
2801         
2802         return True;
2803 }
2804
2805 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2806 {
2807         NTSTATUS ret = NT_STATUS_OK;
2808
2809         out->ptr = 1;
2810         out->count = count;
2811
2812         if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2813                 return ret;
2814         
2815         out->set.count = count;
2816         
2817         if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2818                 return ret;
2819
2820         DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2821
2822         return ret;
2823 }
2824
2825 /*******************************************************************
2826  Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2827 ********************************************************************/
2828
2829 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2830 {
2831         prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2832         depth++;
2833
2834         if(!prs_align(ps))
2835                 return False;
2836  
2837         if(!prs_uint32("ptr", ps, depth, &out->ptr))
2838                 return False;
2839
2840         if (out->ptr!=0) {
2841                 if(!prs_uint32("count", ps, depth, &out->count))
2842                         return False;
2843
2844                 /* malloc memory if unmarshalling here */
2845
2846                 if (UNMARSHALLING(ps) && out->count != 0) {
2847                         if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2848                                 return False;
2849
2850                         if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2851                                 return False;
2852
2853                 }
2854                 
2855                 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2856                         return False;
2857         }
2858
2859         if(!prs_ntstatus("status", ps, depth, &out->status))
2860                 return False;
2861
2862         return True;
2863 }
2864
2865
2866
2867 /*******************************************************************
2868  Reads or writes an  LSA_Q_GETSYSTEMACCOUNTstructure.
2869 ********************************************************************/
2870
2871 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2872 {
2873         prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2874         depth++;
2875
2876         if(!prs_align(ps))
2877                 return False;
2878  
2879         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2880                 return False;
2881
2882         return True;
2883 }
2884
2885 /*******************************************************************
2886  Reads or writes an  LSA_R_GETSYSTEMACCOUNTstructure.
2887 ********************************************************************/
2888
2889 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2890 {
2891         prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2892         depth++;
2893
2894         if(!prs_align(ps))
2895                 return False;
2896  
2897         if(!prs_uint32("access", ps, depth, &out->access))
2898                 return False;
2899
2900         if(!prs_ntstatus("status", ps, depth, &out->status))
2901                 return False;
2902
2903         return True;
2904 }
2905
2906
2907 /*******************************************************************
2908  Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2909 ********************************************************************/
2910
2911 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2912 {
2913         prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2914         depth++;
2915
2916         if(!prs_align(ps))
2917                 return False;
2918  
2919         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2920                 return False;
2921
2922         if(!prs_uint32("access", ps, depth, &out->access))
2923                 return False;
2924
2925         return True;
2926 }
2927
2928 /*******************************************************************
2929  Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2930 ********************************************************************/
2931
2932 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2933 {
2934         prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2935         depth++;
2936
2937         if(!prs_align(ps))
2938                 return False;
2939  
2940         if(!prs_ntstatus("status", ps, depth, &out->status))
2941                 return False;
2942
2943         return True;
2944 }
2945
2946
2947 void init_lsa_string( LSA_STRING *uni, const char *string )
2948 {
2949         init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2950         init_uni_hdr(&uni->hdr, &uni->unistring);
2951 }
2952
2953 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2954 {
2955         memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2956         init_lsa_string( &q_u->privname, name );
2957 }
2958
2959 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2960 {
2961         prs_debug(ps, depth, desc, "smb_io_lsa_string");
2962         depth++;
2963
2964         if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2965                 return False;
2966         if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2967                 return False;
2968         
2969         return True;
2970 }
2971
2972 /*******************************************************************
2973  Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE  structure.
2974 ********************************************************************/
2975
2976 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE  *out, prs_struct *ps, int depth)
2977 {
2978         prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2979         depth++;
2980
2981         if(!prs_align(ps))
2982                 return False;
2983  
2984         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2985                 return False;
2986         if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2987                 return False;
2988
2989         return True;
2990 }
2991
2992 /*******************************************************************
2993  Reads or writes an  LSA_R_LOOKUP_PRIV_VALUE structure.
2994 ********************************************************************/
2995
2996 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE  *out, prs_struct *ps, int depth)
2997 {
2998         prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2999         depth++;
3000
3001         if(!prs_align(ps))
3002                 return False;
3003                 
3004         if(!lsa_io_luid("luid", &out->luid, ps, depth))
3005                 return False;
3006  
3007         if(!prs_ntstatus("status", ps, depth, &out->status))
3008                 return False;
3009
3010         return True;
3011 }
3012
3013
3014 /*******************************************************************
3015  Reads or writes an LSA_Q_ADDPRIVS structure.
3016 ********************************************************************/
3017
3018 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
3019 {
3020         prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
3021         depth++;
3022
3023         if(!prs_align(ps))
3024                 return False;
3025  
3026         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3027                 return False;
3028         
3029         if(!prs_uint32("count", ps, depth, &out->count))
3030                 return False;
3031
3032         if (UNMARSHALLING(ps) && out->count!=0) {
3033                 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3034                         return False;
3035                 
3036                 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3037                         return False;
3038         }
3039         
3040         if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3041                 return False;
3042         
3043         return True;
3044 }
3045
3046 /*******************************************************************
3047  Reads or writes an LSA_R_ADDPRIVS structure.
3048 ********************************************************************/
3049
3050 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
3051 {
3052         prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
3053         depth++;
3054
3055         if(!prs_align(ps))
3056                 return False;
3057  
3058         if(!prs_ntstatus("status", ps, depth, &out->status))
3059                 return False;
3060
3061         return True;
3062 }
3063
3064 /*******************************************************************
3065  Reads or writes an LSA_Q_REMOVEPRIVS structure.
3066 ********************************************************************/
3067
3068 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
3069 {
3070         prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
3071         depth++;
3072
3073         if(!prs_align(ps))
3074                 return False;
3075  
3076         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3077                 return False;
3078         
3079         if(!prs_uint32("allrights", ps, depth, &out->allrights))
3080                 return False;
3081
3082         if(!prs_uint32("ptr", ps, depth, &out->ptr))
3083                 return False;
3084
3085         /* 
3086          * JFM: I'm not sure at all if the count is inside the ptr
3087          * never seen one with ptr=0
3088          */
3089
3090         if (out->ptr!=0) {
3091                 if(!prs_uint32("count", ps, depth, &out->count))
3092                         return False;
3093
3094                 if (UNMARSHALLING(ps) && out->count!=0) {
3095                         if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3096                                 return False;
3097
3098                         if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3099                                 return False;
3100                 }
3101
3102                 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3103                         return False;
3104         }
3105
3106         return True;
3107 }
3108
3109 /*******************************************************************
3110  Reads or writes an LSA_R_REMOVEPRIVS structure.
3111 ********************************************************************/
3112
3113 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
3114 {
3115         prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
3116         depth++;
3117
3118         if(!prs_align(ps))
3119                 return False;
3120  
3121         if(!prs_ntstatus("status", ps, depth, &out->status))
3122                 return False;
3123
3124         return True;
3125 }
3126
3127 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
3128 {
3129         POLICY_HND zero_pol;
3130
3131         ZERO_STRUCT(zero_pol);
3132         return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
3133 }
3134
3135 /*******************************************************************
3136  Inits an LSA_Q_QUERY_INFO2 structure.
3137 ********************************************************************/
3138
3139 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
3140 {
3141         DEBUG(5, ("init_q_query2\n"));
3142
3143         memcpy(&in->pol, hnd, sizeof(in->pol));
3144
3145         in->info_class = info_class;
3146 }
3147
3148 /*******************************************************************
3149  Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
3150 ********************************************************************/
3151
3152 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
3153 {
3154         prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
3155         depth++;
3156
3157         if(!prs_align(ps))
3158                 return False;
3159  
3160         if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3161                 return False;
3162         
3163         if(!prs_uint16("info_class", ps, depth, &in->info_class))
3164                 return False;
3165
3166         return True;
3167 }
3168
3169 /*******************************************************************
3170  Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
3171 ********************************************************************/
3172
3173 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
3174                           prs_struct *ps, int depth)
3175 {
3176         prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
3177         depth++;
3178
3179         if(!prs_align(ps))
3180                 return False;
3181
3182         if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
3183                 return False;
3184
3185         if (out->dom_ptr) {
3186
3187                 if(!lsa_io_query_info_ctr2("", ps, depth, &out->ctr))
3188                         return False;
3189         }
3190
3191         if(!prs_align(ps))
3192                 return False;
3193         if(!prs_ntstatus("status", ps, depth, &out->status))
3194                 return False;
3195
3196         return True;
3197 }
3198
3199 /*******************************************************************
3200  Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
3201 ********************************************************************/
3202 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in, 
3203                              POLICY_HND *hnd, 
3204                              uint32 count, 
3205                              DOM_SID *sid)
3206 {
3207         DEBUG(5, ("init_q_enum_acct_rights\n"));
3208
3209         in->pol = *hnd;
3210         init_dom_sid2(&in->sid, sid);
3211 }
3212
3213 /*******************************************************************
3214 ********************************************************************/
3215 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
3216 {
3217         uint32 i;
3218         const char *privname;
3219         const char **privname_array = NULL;
3220         int num_priv = 0;
3221
3222         for ( i=0; i<privileges->count; i++ ) {
3223                 privname = luid_to_privilege_name( &privileges->set[i].luid );
3224                 if ( privname ) {
3225                         if ( !add_string_to_array( talloc_tos(), privname, &privname_array, &num_priv ) )
3226                                 return NT_STATUS_NO_MEMORY;
3227                 }
3228         }
3229
3230         if ( num_priv ) {
3231                 out->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3232                 if (!out->rights) {
3233                         return NT_STATUS_NO_MEMORY;
3234                 }
3235
3236                 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) ) 
3237                         return NT_STATUS_NO_MEMORY;
3238
3239                 out->count = num_priv;
3240         }
3241
3242         return NT_STATUS_OK;
3243 }
3244
3245 /*******************************************************************
3246 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3247 ********************************************************************/
3248 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3249 {
3250         
3251         if (in == NULL)
3252                 return False;
3253
3254         prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3255         depth++;
3256
3257         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3258                 return False;
3259
3260         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3261                 return False;
3262
3263         return True;
3264 }
3265
3266
3267 /*******************************************************************
3268 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3269 ********************************************************************/
3270 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3271 {
3272         prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3273         depth++;
3274
3275         if(!prs_uint32("count   ", ps, depth, &out->count))
3276                 return False;
3277
3278         if ( !prs_pointer("rights", ps, depth, (void*)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3279                 return False;
3280
3281         if(!prs_align(ps))
3282                 return False;
3283
3284         if(!prs_ntstatus("status", ps, depth, &out->status))
3285                 return False;
3286
3287         return True;
3288 }
3289
3290
3291 /*******************************************************************
3292  Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3293 ********************************************************************/
3294 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd, 
3295                              DOM_SID *sid, uint32 count, const char **rights )
3296 {
3297         DEBUG(5, ("init_q_add_acct_rights\n"));
3298
3299         in->pol = *hnd;
3300         init_dom_sid2(&in->sid, sid);
3301         
3302         in->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3303         if (!in->rights) {
3304                 smb_panic("init_q_add_acct_rights: talloc fail\n");
3305                 return;
3306         }
3307         init_unistr4_array( in->rights, count, rights );
3308         
3309         in->count = count;
3310 }
3311
3312
3313 /*******************************************************************
3314 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3315 ********************************************************************/
3316 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3317 {
3318         prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3319         depth++;
3320
3321         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3322                 return False;
3323
3324         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3325                 return False;
3326
3327         if(!prs_uint32("count", ps, depth, &in->count))
3328                 return False;
3329
3330         if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3331                 return False;
3332
3333         return True;
3334 }
3335
3336 /*******************************************************************
3337 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3338 ********************************************************************/
3339 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3340 {
3341         prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3342         depth++;
3343
3344         if(!prs_ntstatus("status", ps, depth, &out->status))
3345                 return False;
3346
3347         return True;
3348 }
3349
3350 /*******************************************************************
3351  Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3352 ********************************************************************/
3353
3354 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in, 
3355                                POLICY_HND *hnd, 
3356                                DOM_SID *sid,
3357                                uint32 removeall,
3358                                uint32 count, 
3359                                const char **rights)
3360 {
3361         DEBUG(5, ("init_q_remove_acct_rights\n"));
3362
3363         in->pol = *hnd;
3364
3365         init_dom_sid2(&in->sid, sid);
3366
3367         in->removeall = removeall;
3368         in->count = count;
3369
3370         in->rights = TALLOC_P( talloc_tos(), UNISTR4_ARRAY );
3371         if (!in->rights) {
3372                 smb_panic("init_q_remove_acct_rights: talloc fail\n");
3373                 return;
3374         }
3375         init_unistr4_array( in->rights, count, rights );
3376 }
3377
3378 /*******************************************************************
3379 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3380 ********************************************************************/
3381
3382 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3383 {
3384         prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3385         depth++;
3386
3387         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3388                 return False;
3389
3390         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3391                 return False;
3392
3393         if(!prs_uint32("removeall", ps, depth, &in->removeall))
3394                 return False;
3395
3396         if(!prs_uint32("count", ps, depth, &in->count))
3397                 return False;
3398
3399         if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3400                 return False;
3401
3402         return True;
3403 }
3404
3405 /*******************************************************************
3406 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3407 ********************************************************************/
3408 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3409 {
3410         prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3411         depth++;
3412
3413         if(!prs_ntstatus("status", ps, depth, &out->status))
3414                 return False;
3415
3416         return True;
3417 }
3418
3419 /*******************************************************************
3420  Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3421 ********************************************************************/
3422
3423 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3424 {
3425         memcpy(&q->pol, hnd, sizeof(q->pol));
3426
3427         init_dom_sid2(&q->sid, sid);
3428         q->access_mask = desired_access;
3429 }
3430
3431 /*******************************************************************
3432 ********************************************************************/
3433
3434 #if 0 /* jerry, I think this not correct - gd */
3435 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3436 {
3437         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3438         depth++;
3439
3440         if(!prs_align(ps))
3441                 return False;
3442
3443         if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3444                 return False;
3445
3446         if(!prs_uint32("count", ps, depth, &in->count))
3447                 return False;
3448
3449         if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3450                 return False;
3451
3452         return True;
3453 }
3454 #endif
3455
3456
3457 /*******************************************************************
3458  Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3459 ********************************************************************/
3460
3461 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q, 
3462                                             POLICY_HND *hnd, 
3463                                             const char *name, 
3464                                             uint32 desired_access)
3465 {
3466         memcpy(&q->pol, hnd, sizeof(q->pol));
3467
3468         init_lsa_string(&q->name, name);
3469         q->access_mask = desired_access;
3470 }
3471
3472 /*******************************************************************
3473 ********************************************************************/
3474
3475
3476 /*******************************************************************
3477  Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3478 ********************************************************************/
3479
3480 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3481 {
3482         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3483         depth++;
3484
3485         if(!prs_align(ps))
3486                 return False;
3487  
3488         if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3489                 return False;
3490
3491         if(!prs_align(ps))
3492                 return False;
3493
3494         if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3495                 return False;
3496
3497         if(!prs_align(ps))
3498                 return False;
3499
3500         if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3501                 return False;
3502
3503         return True;
3504 }
3505
3506 /*******************************************************************
3507  Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3508 ********************************************************************/
3509
3510 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3511 {
3512         prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3513         depth++;
3514
3515         if(!prs_align(ps))
3516                 return False;
3517
3518         if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3519                 return False;
3520
3521         if(!prs_ntstatus("status", ps, depth, &out->status))
3522                 return False;
3523
3524         return True;
3525 }
3526
3527 /*******************************************************************
3528 ********************************************************************/
3529
3530 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3531 {
3532         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3533         depth++;
3534
3535         if(!prs_align(ps))
3536                 return False;
3537  
3538         if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3539                 return False;
3540
3541         if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3542                 return False;
3543
3544         if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3545                 return False;
3546   
3547         return True;
3548 }
3549
3550 /*******************************************************************
3551  Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3552 ********************************************************************/
3553
3554 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3555 {
3556         prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3557         depth++;
3558
3559         if(!prs_align(ps))
3560                 return False;
3561
3562         if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3563                 return False;
3564
3565         if(!prs_ntstatus("status", ps, depth, &out->status))
3566                 return False;
3567
3568         return True;
3569 }
3570
3571 /*******************************************************************
3572 ********************************************************************/
3573
3574 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3575 {
3576         prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3577         depth++;
3578
3579         if(!prs_align(ps))
3580                 return False;
3581
3582         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3583                 return False;
3584
3585         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3586                 return False;
3587         if(!prs_align(ps))
3588                 return False;
3589
3590         if(!prs_uint32("access", ps, depth, &in->access))
3591                 return False;
3592
3593         return True;
3594 }
3595
3596 /*******************************************************************
3597 ********************************************************************/
3598
3599 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3600 {
3601         prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3602         depth++;
3603
3604         if(!prs_align(ps))
3605                 return False;
3606
3607         if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3608                 return False;
3609
3610         if(!prs_ntstatus("status", ps, depth, &out->status))
3611                 return False;
3612
3613         return True;
3614 }
3615
3616 /*******************************************************************
3617 ********************************************************************/
3618
3619 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3620 {
3621         prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3622         depth++;
3623
3624         if(!prs_align(ps))
3625                 return False;
3626
3627         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3628                 return False;
3629
3630         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3631                 return False;
3632         if(!prs_align(ps))
3633                 return False;
3634
3635         if(!prs_uint32("access", ps, depth, &in->access))
3636                 return False;
3637
3638         return True;
3639 }
3640
3641 /*******************************************************************
3642 ********************************************************************/
3643
3644 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3645 {
3646         prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3647         depth++;
3648
3649         if(!prs_align(ps))
3650                 return False;
3651
3652         if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3653                 return False;
3654
3655         if(!prs_ntstatus("status", ps, depth, &out->status))
3656                 return False;
3657
3658         return True;
3659 }
3660
3661
3662
3663 /*******************************************************************
3664 ********************************************************************/
3665
3666 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3667 {
3668         prs_debug(ps, depth, desc, "lsa_io_data_blob");
3669         depth++;
3670
3671         if ( !prs_uint32("size", ps, depth, &blob->size) )
3672                 return False;
3673         if ( !prs_uint32("size", ps, depth, &blob->size) )
3674                 return False;
3675
3676         if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3677                 return False;
3678
3679         return True;
3680 }
3681
3682 /*******************************************************************
3683 ********************************************************************/
3684
3685 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3686 {
3687         prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3688         depth++;
3689
3690         if ( !prs_align(ps) )
3691                 return False;
3692
3693         if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3694                 return False;
3695
3696         if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3697                 return False;
3698
3699         if( !prs_align(ps) )
3700                 return False;
3701         if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3702                 return False;
3703
3704
3705         return True;
3706 }
3707
3708 /*******************************************************************
3709 ********************************************************************/
3710
3711 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3712 {
3713         prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3714         depth++;
3715
3716         if(!prs_ntstatus("status", ps, depth, &out->status))
3717                 return False;
3718
3719         return True;
3720 }
3721
3722 /*******************************************************************
3723 ********************************************************************/
3724
3725 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3726 {
3727         prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3728         depth++;
3729
3730         if(!prs_align(ps))
3731                 return False;
3732
3733         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3734                 return False;
3735
3736         return True;
3737 }
3738
3739 /*******************************************************************
3740 ********************************************************************/
3741
3742 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3743 {
3744         prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3745         depth++;
3746
3747         if(!prs_ntstatus("status", ps, depth, &out->status))
3748                 return False;
3749
3750         return True;
3751 }
3752
3753 /*******************************************************************
3754  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3755 ********************************************************************/
3756
3757 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q, 
3758                                       POLICY_HND *hnd, uint16 info_class) 
3759 {
3760         DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3761         
3762         q->pol = *hnd;
3763         q->info_class = info_class;
3764 }
3765
3766 /*******************************************************************
3767  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3768 ********************************************************************/
3769
3770 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q, 
3771                                               POLICY_HND *hnd, uint16 info_class, 
3772                                               const char *dom_name)
3773 {
3774         DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3775         
3776         q->pol = *hnd;
3777         init_lsa_string(&q->domain_name, dom_name );
3778         q->info_class = info_class;
3779 }
3780
3781 /*******************************************************************
3782  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3783 ********************************************************************/
3784
3785 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q, 
3786                                              POLICY_HND *hnd, uint16 info_class, 
3787                                              DOM_SID *dom_sid)
3788 {
3789         DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3790         
3791         q->pol = *hnd;
3792         init_dom_sid2(&q->dom_sid, dom_sid);
3793         q->info_class = info_class;
3794 }
3795
3796 /*******************************************************************
3797  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3798 ********************************************************************/
3799
3800 BOOL lsa_io_q_query_trusted_domain_info(const char *desc, 
3801                                         LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3802                                         prs_struct *ps, int depth)
3803 {
3804         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3805         depth++;
3806
3807         if(!prs_align(ps))
3808                 return False;
3809
3810         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3811                 return False;
3812
3813         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3814                 return False;
3815
3816         return True;
3817 }
3818
3819
3820 /*******************************************************************
3821  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3822 ********************************************************************/
3823
3824 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc, 
3825                                                LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3826                                                prs_struct *ps, int depth)
3827 {
3828         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3829         depth++;
3830
3831         if(!prs_align(ps))
3832                 return False;
3833
3834         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3835                 return False;
3836
3837         if(!prs_align(ps))
3838                 return False;
3839
3840         if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3841                 return False;
3842
3843         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3844                 return False;
3845
3846         return True;
3847 }
3848
3849 /*******************************************************************
3850  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3851 ********************************************************************/
3852
3853 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc, 
3854                                                 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3855                                                 prs_struct *ps, int depth)
3856 {
3857         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3858         depth++;
3859
3860         if(!prs_align(ps))
3861                 return False;
3862
3863         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3864                 return False;
3865
3866         if(!prs_align(ps))
3867                 return False;
3868
3869         if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3870                 return False;
3871
3872         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3873                 return False;
3874
3875         return True;
3876 }
3877
3878 /*******************************************************************
3879 ********************************************************************/
3880
3881 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr, 
3882                                     prs_struct *ps, int depth)
3883 {
3884         prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3885         depth++;
3886
3887         if(!prs_align(ps))
3888                 return False;
3889
3890         if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3891                 return False;
3892         
3893         if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3894                 return False;
3895
3896         if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3897                 return False;
3898
3899         return True;
3900 }
3901
3902 /*******************************************************************
3903 ********************************************************************/
3904
3905 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf, 
3906                                 prs_struct *ps, int depth, int length, int size)
3907 {
3908         prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3909         depth++;
3910
3911         if ( UNMARSHALLING(ps) && length ) {
3912                 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3913                         return False;
3914         }
3915
3916         if (!prs_uint32("size", ps, depth, &buf->size))
3917                 return False;
3918
3919         if (!prs_uint32("offset", ps, depth, &buf->offset))
3920                 return False;
3921
3922         if (!prs_uint32("length", ps, depth, &buf->length))
3923                 return False;
3924
3925         if(!prs_uint8s(False, "data", ps, depth, buf->data, length))
3926                 return False;
3927
3928         return True;
3929 }
3930
3931 /*******************************************************************
3932 ********************************************************************/
3933
3934 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name, 
3935                                     prs_struct *ps, int depth)
3936 {
3937         if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3938                 return False;
3939
3940         return True;
3941 }
3942
3943 /*******************************************************************
3944 ********************************************************************/
3945
3946 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix, 
3947                                     prs_struct *ps, int depth)
3948 {
3949         if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3950                 return False;
3951
3952         return True;
3953 }
3954
3955 /*******************************************************************
3956 ********************************************************************/
3957
3958 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password, 
3959                                     prs_struct *ps, int depth)
3960 {
3961         if(!prs_align(ps))
3962                 return False;
3963         
3964         if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3965                 return False;
3966
3967         if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3968                 return False;
3969
3970         if (&password->ptr_password) {
3971         
3972                 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3973                         return False;
3974
3975                 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth, 
3976                                         password->password_hdr.length, password->password_hdr.size))
3977                         return False;
3978         }
3979
3980         if (&password->ptr_old_password) {
3981
3982                 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3983                         return False;
3984
3985                 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth, 
3986                                         password->old_password_hdr.length, password->old_password_hdr.size))
3987                         return False;
3988         }
3989
3990         return True;
3991 }
3992
3993 /*******************************************************************
3994 ********************************************************************/
3995
3996 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex, 
3997                                     prs_struct *ps, int depth)
3998 {
3999         uint32 dom_sid_ptr;
4000         
4001         if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
4002                 return False;
4003                 
4004         if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
4005                 return False;
4006
4007         if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
4008                 return False;
4009
4010         if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
4011                 return False;
4012
4013         if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
4014                 return False;
4015
4016         if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
4017                 return False;
4018                 
4019         if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
4020                 return False;
4021                 
4022         if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
4023                 return False;
4024
4025         if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
4026                 return False;
4027
4028         return True;
4029 }
4030
4031 /*******************************************************************
4032 ********************************************************************/
4033
4034 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
4035 {
4036         prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
4037         depth++;
4038
4039         if(!prs_uint16("info_class", ps, depth, &info->info_class))
4040                 return False;
4041
4042         if(!prs_align(ps))
4043                 return False;
4044
4045         switch (info->info_class) {
4046         case 1:
4047                 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
4048                         return False;
4049                 break;
4050         case 3:
4051                 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
4052                         return False;
4053                 break;
4054         case 4:
4055                 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
4056                         return False;
4057                 break;
4058         case 6:
4059                 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
4060                         return False;
4061                 break;
4062         default:
4063                 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4064                 return False;
4065         }
4066
4067         return True;
4068 }
4069
4070 /*******************************************************************
4071  Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
4072 ********************************************************************/
4073
4074 BOOL lsa_io_r_query_trusted_domain_info(const char *desc, 
4075                                         LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q, 
4076                                         prs_struct *ps, int depth)
4077 {
4078         if (r_q == NULL)
4079                 return False;
4080
4081         prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
4082         depth++;
4083
4084         if (!prs_pointer("trustdom", ps, depth, (void*)&r_q->info, 
4085                          sizeof(LSA_TRUSTED_DOMAIN_INFO), 
4086                          (PRS_POINTER_CAST)lsa_io_trustdom_query) )
4087                 return False;
4088
4089         if(!prs_align(ps))
4090                 return False;
4091
4092         if(!prs_ntstatus("status", ps, depth, &r_q->status))
4093                 return False;
4094
4095         return True;
4096 }
4097
4098 /*******************************************************************
4099  Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4100 ********************************************************************/
4101
4102 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
4103 {
4104         DEBUG(5, ("init_q_query_dom_info\n"));
4105
4106         memcpy(&in->pol, hnd, sizeof(in->pol));
4107
4108         in->info_class = info_class;
4109 }
4110
4111 /*******************************************************************
4112  Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4113 ********************************************************************/
4114
4115 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
4116 {
4117         prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
4118         depth++;
4119
4120         if(!prs_align(ps))
4121                 return False;
4122  
4123         if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
4124                 return False;
4125         
4126         if(!prs_uint16("info_class", ps, depth, &in->info_class))
4127                 return False;
4128
4129         return True;
4130 }
4131
4132 /*******************************************************************
4133  Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
4134 ********************************************************************/
4135
4136 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy, 
4137                                    prs_struct *ps, int depth)
4138 {
4139         if (!prs_align_uint64(ps))
4140                 return False;
4141
4142         if (!prs_align(ps))
4143                 return False;
4144
4145         if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
4146                 return False;
4147
4148         if (!prs_align_uint64(ps))
4149                 return False;
4150
4151         if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
4152                 return False;
4153
4154         if (!prs_align_uint64(ps))
4155                 return False;
4156         
4157         if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
4158                 return False;
4159
4160         if (!prs_align_uint64(ps))
4161                 return False;
4162         
4163         if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
4164                 return False;
4165
4166         if (!prs_align_uint64(ps))
4167                 return False;
4168         
4169         if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
4170                 return False;
4171
4172         if (!prs_align_uint64(ps))
4173                 return False;
4174         
4175         if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
4176                 return False;
4177
4178         return True;
4179 }
4180
4181 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
4182 {
4183         prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
4184         depth++;
4185
4186         if(!prs_align_uint16(ps))
4187                 return False;
4188
4189         if(!prs_uint16("info_class", ps, depth, &info->info_class))
4190                 return False;
4191
4192         switch (info->info_class) {
4193         case 3: 
4194                 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
4195                         return False;
4196                 break;
4197         default:
4198                 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4199                 return False;
4200                 break;
4201         }
4202
4203         return True;
4204 }
4205
4206
4207 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
4208                              prs_struct *ps, int depth)
4209 {
4210         prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
4211         depth++;
4212
4213         if (!prs_pointer("dominfo", ps, depth, (void*)&out->info, 
4214                          sizeof(LSA_DOM_INFO_UNION), 
4215                          (PRS_POINTER_CAST)lsa_io_dom_info_query) )
4216                 return False;
4217         
4218         if(!prs_ntstatus("status", ps, depth, &out->status))
4219                 return False;
4220
4221         return True;
4222 }