r23080: Fix bug #4637 - we hads missed some cases where
[samba.git] / source / rpc_parse / parse_lsa.c
1 /* 
2  *  Unix SMB/CIFS implementation.
3  *  RPC Pipe client / server routines
4  *  Copyright (C) Andrew Tridgell              1992-1997,
5  *  Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
6  *  Copyright (C) Paul Ashton                       1997,
7  *  Copyright (C) Andrew Bartlett                   2002,
8  *  Copyright (C) Jim McDonough <jmcd@us.ibm.com>   2002.
9  *  Copyright (C) Gerald )Jerry) Carter             2005
10  *  
11  *  This program is free software; you can redistribute it and/or modify
12  *  it under the terms of the GNU General Public License as published by
13  *  the Free Software Foundation; either version 2 of the License, or
14  *  (at your option) any later version.
15  *  
16  *  This program is distributed in the hope that it will be useful,
17  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
18  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
19  *  GNU General Public License for more details.
20  *  
21  *  You should have received a copy of the GNU General Public License
22  *  along with this program; if not, write to the Free Software
23  *  Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24  */
25
26 #include "includes.h"
27
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_RPC_PARSE
30
31 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn, prs_struct *ps, int depth);
32 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn, prs_struct *ps, int depth);
33
34 /*******************************************************************
35  Inits a LSA_TRANS_NAME structure.
36 ********************************************************************/
37
38 void init_lsa_trans_name(LSA_TRANS_NAME *trn, UNISTR2 *uni_name,
39                          uint16 sid_name_use, const char *name, uint32 idx)
40 {
41         trn->sid_name_use = sid_name_use;
42         init_unistr2(uni_name, name, UNI_FLAGS_NONE);
43         init_uni_hdr(&trn->hdr_name, uni_name);
44         trn->domain_idx = idx;
45 }
46
47 /*******************************************************************
48  Reads or writes a LSA_TRANS_NAME structure.
49 ********************************************************************/
50
51 static BOOL lsa_io_trans_name(const char *desc, LSA_TRANS_NAME *trn, prs_struct *ps, 
52                               int depth)
53 {
54         prs_debug(ps, depth, desc, "lsa_io_trans_name");
55         depth++;
56
57         if(!prs_align(ps))
58                 return False;
59         
60         if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
61                 return False;
62         if(!prs_align(ps))
63                 return False;
64         
65         if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
66                 return False;
67         if(!prs_uint32("domain_idx  ", ps, depth, &trn->domain_idx))
68                 return False;
69
70         return True;
71 }
72
73 /*******************************************************************
74  Inits a LSA_TRANS_NAME2 structure.
75 ********************************************************************/
76
77 void init_lsa_trans_name2(LSA_TRANS_NAME2 *trn, UNISTR2 *uni_name,
78                          uint16 sid_name_use, const char *name, uint32 idx)
79 {
80         trn->sid_name_use = sid_name_use;
81         init_unistr2(uni_name, name, UNI_FLAGS_NONE);
82         init_uni_hdr(&trn->hdr_name, uni_name);
83         trn->domain_idx = idx;
84         trn->unknown = 0;
85 }
86
87 /*******************************************************************
88  Reads or writes a LSA_TRANS_NAME2 structure.
89 ********************************************************************/
90
91 static BOOL lsa_io_trans_name2(const char *desc, LSA_TRANS_NAME2 *trn, prs_struct *ps, 
92                               int depth)
93 {
94         prs_debug(ps, depth, desc, "lsa_io_trans_name2");
95         depth++;
96
97         if(!prs_align(ps))
98                 return False;
99         
100         if(!prs_uint16("sid_name_use", ps, depth, &trn->sid_name_use))
101                 return False;
102         if(!prs_align(ps))
103                 return False;
104         
105         if(!smb_io_unihdr ("hdr_name", &trn->hdr_name, ps, depth))
106                 return False;
107         if(!prs_uint32("domain_idx  ", ps, depth, &trn->domain_idx))
108                 return False;
109         if(!prs_uint32("unknown  ", ps, depth, &trn->unknown))
110                 return False;
111
112         return True;
113 }
114
115 /*******************************************************************
116  Reads or writes a DOM_R_REF structure.
117 ********************************************************************/
118
119 static BOOL lsa_io_dom_r_ref(const char *desc, DOM_R_REF *dom, prs_struct *ps, int depth)
120 {
121         unsigned int i;
122
123         prs_debug(ps, depth, desc, "lsa_io_dom_r_ref");
124         depth++;
125
126         if(!prs_align(ps))
127                 return False;
128         
129         if(!prs_uint32("num_ref_doms_1", ps, depth, &dom->num_ref_doms_1)) /* num referenced domains? */
130                 return False;
131         if(!prs_uint32("ptr_ref_dom   ", ps, depth, &dom->ptr_ref_dom)) /* undocumented buffer pointer. */
132                 return False;
133         if(!prs_uint32("max_entries   ", ps, depth, &dom->max_entries)) /* 32 - max number of entries */
134                 return False;
135
136         SMB_ASSERT_ARRAY(dom->hdr_ref_dom, dom->num_ref_doms_1);
137
138         if (dom->ptr_ref_dom != 0) {
139
140                 if(!prs_uint32("num_ref_doms_2", ps, depth, &dom->num_ref_doms_2)) /* 4 - num referenced domains? */
141                         return False;
142
143                 SMB_ASSERT_ARRAY(dom->ref_dom, dom->num_ref_doms_2);
144
145                 for (i = 0; i < dom->num_ref_doms_1; i++) {
146                         fstring t;
147
148                         slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
149                         if(!smb_io_unihdr(t, &dom->hdr_ref_dom[i].hdr_dom_name, ps, depth))
150                                 return False;
151
152                         slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
153                         if(!prs_uint32(t, ps, depth, &dom->hdr_ref_dom[i].ptr_dom_sid))
154                                 return False;
155                 }
156
157                 for (i = 0; i < dom->num_ref_doms_2; i++) {
158                         fstring t;
159
160                         if (dom->hdr_ref_dom[i].hdr_dom_name.buffer != 0) {
161                                 slprintf(t, sizeof(t) - 1, "dom_ref[%d] ", i);
162                                 if(!smb_io_unistr2(t, &dom->ref_dom[i].uni_dom_name, True, ps, depth)) /* domain name unicode string */
163                                         return False;
164                                 if(!prs_align(ps))
165                                         return False;
166                         }
167
168                         if (dom->hdr_ref_dom[i].ptr_dom_sid != 0) {
169                                 slprintf(t, sizeof(t) - 1, "sid_ptr[%d] ", i);
170                                 if(!smb_io_dom_sid2(t, &dom->ref_dom[i].ref_dom, ps, depth)) /* referenced domain SIDs */
171                                         return False;
172                         }
173                 }
174         }
175
176         return True;
177 }
178
179 /*******************************************************************
180  Inits an LSA_SEC_QOS structure.
181 ********************************************************************/
182
183 void init_lsa_sec_qos(LSA_SEC_QOS *qos, uint16 imp_lev, uint8 ctxt, uint8 eff)
184 {
185         DEBUG(5, ("init_lsa_sec_qos\n"));
186
187         qos->len = 0x0c; /* length of quality of service block, in bytes */
188         qos->sec_imp_level = imp_lev;
189         qos->sec_ctxt_mode = ctxt;
190         qos->effective_only = eff;
191 }
192
193 /*******************************************************************
194  Reads or writes an LSA_SEC_QOS structure.
195 ********************************************************************/
196
197 static BOOL lsa_io_sec_qos(const char *desc,  LSA_SEC_QOS *qos, prs_struct *ps, 
198                            int depth)
199 {
200         uint32 start;
201
202         prs_debug(ps, depth, desc, "lsa_io_obj_qos");
203         depth++;
204
205         if(!prs_align(ps))
206                 return False;
207         
208         start = prs_offset(ps);
209
210         /* these pointers had _better_ be zero, because we don't know
211            what they point to!
212          */
213         if(!prs_uint32("len           ", ps, depth, &qos->len)) /* 0x18 - length (in bytes) inc. the length field. */
214                 return False;
215         if(!prs_uint16("sec_imp_level ", ps, depth, &qos->sec_imp_level ))
216                 return False;
217         if(!prs_uint8 ("sec_ctxt_mode ", ps, depth, &qos->sec_ctxt_mode ))
218                 return False;
219         if(!prs_uint8 ("effective_only", ps, depth, &qos->effective_only))
220                 return False;
221
222         if (qos->len != prs_offset(ps) - start) {
223                 DEBUG(3,("lsa_io_sec_qos: length %x does not match size %x\n",
224                          qos->len, prs_offset(ps) - start));
225         }
226
227         return True;
228 }
229
230 /*******************************************************************
231  Inits an LSA_OBJ_ATTR structure.
232 ********************************************************************/
233
234 static void init_lsa_obj_attr(LSA_OBJ_ATTR *attr, uint32 attributes, LSA_SEC_QOS *qos)
235 {
236         DEBUG(5, ("init_lsa_obj_attr\n"));
237
238         attr->len = 0x18; /* length of object attribute block, in bytes */
239         attr->ptr_root_dir = 0;
240         attr->ptr_obj_name = 0;
241         attr->attributes = attributes;
242         attr->ptr_sec_desc = 0;
243         
244         if (qos != NULL) {
245                 attr->ptr_sec_qos = 1;
246                 attr->sec_qos = qos;
247         } else {
248                 attr->ptr_sec_qos = 0;
249                 attr->sec_qos = NULL;
250         }
251 }
252
253 /*******************************************************************
254  Reads or writes an LSA_OBJ_ATTR structure.
255 ********************************************************************/
256
257 static BOOL lsa_io_obj_attr(const char *desc, LSA_OBJ_ATTR *attr, prs_struct *ps, 
258                             int depth)
259 {
260         prs_debug(ps, depth, desc, "lsa_io_obj_attr");
261         depth++;
262
263         if(!prs_align(ps))
264                 return False;
265         
266         /* these pointers had _better_ be zero, because we don't know
267            what they point to!
268          */
269         if(!prs_uint32("len         ", ps, depth, &attr->len)) /* 0x18 - length (in bytes) inc. the length field. */
270                 return False;
271         if(!prs_uint32("ptr_root_dir", ps, depth, &attr->ptr_root_dir)) /* 0 - root directory (pointer) */
272                 return False;
273         if(!prs_uint32("ptr_obj_name", ps, depth, &attr->ptr_obj_name)) /* 0 - object name (pointer) */
274                 return False;
275         if(!prs_uint32("attributes  ", ps, depth, &attr->attributes)) /* 0 - attributes (undocumented) */
276                 return False;
277         if(!prs_uint32("ptr_sec_desc", ps, depth, &attr->ptr_sec_desc)) /* 0 - security descriptior (pointer) */
278                 return False;
279         if(!prs_uint32("ptr_sec_qos ", ps, depth, &attr->ptr_sec_qos )) /* security quality of service (pointer) */
280                 return False;
281
282         if (attr->ptr_sec_qos != 0) {
283                 if (UNMARSHALLING(ps))
284                         if (!(attr->sec_qos = PRS_ALLOC_MEM(ps,LSA_SEC_QOS,1)))
285                                 return False;
286
287                 if(!lsa_io_sec_qos("sec_qos", attr->sec_qos, ps, depth))
288                         return False;
289         }
290
291         return True;
292 }
293
294
295 /*******************************************************************
296  Inits an LSA_Q_OPEN_POL structure.
297 ********************************************************************/
298
299 void init_q_open_pol(LSA_Q_OPEN_POL *in, uint16 system_name,
300                      uint32 attributes, uint32 desired_access,
301                      LSA_SEC_QOS *qos)
302 {
303         DEBUG(5, ("init_open_pol: attr:%d da:%d\n", attributes, 
304                   desired_access));
305
306         in->ptr = 1; /* undocumented pointer */
307
308         in->des_access = desired_access;
309
310         in->system_name = system_name;
311         init_lsa_obj_attr(&in->attr, attributes, qos);
312 }
313
314 /*******************************************************************
315  Reads or writes an LSA_Q_OPEN_POL structure.
316 ********************************************************************/
317
318 BOOL lsa_io_q_open_pol(const char *desc, LSA_Q_OPEN_POL *in, prs_struct *ps, 
319                        int depth)
320 {
321         prs_debug(ps, depth, desc, "lsa_io_q_open_pol");
322         depth++;
323
324         if(!prs_uint32("ptr       ", ps, depth, &in->ptr))
325                 return False;
326         if(!prs_uint16("system_name", ps, depth, &in->system_name))
327                 return False;
328         if(!prs_align( ps ))
329                 return False;
330
331         if(!lsa_io_obj_attr("", &in->attr, ps, depth))
332                 return False;
333
334         if(!prs_uint32("des_access", ps, depth, &in->des_access))
335                 return False;
336
337         return True;
338 }
339
340 /*******************************************************************
341  Reads or writes an LSA_R_OPEN_POL structure.
342 ********************************************************************/
343
344 BOOL lsa_io_r_open_pol(const char *desc, LSA_R_OPEN_POL *out, prs_struct *ps, 
345                        int depth)
346 {
347         prs_debug(ps, depth, desc, "lsa_io_r_open_pol");
348         depth++;
349
350         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
351                 return False;
352
353         if(!prs_ntstatus("status", ps, depth, &out->status))
354                 return False;
355
356         return True;
357 }
358
359 /*******************************************************************
360  Inits an LSA_Q_OPEN_POL2 structure.
361 ********************************************************************/
362
363 void init_q_open_pol2(LSA_Q_OPEN_POL2 *in, const char *server_name,
364                         uint32 attributes, uint32 desired_access,
365                         LSA_SEC_QOS *qos)
366 {
367         DEBUG(5, ("init_q_open_pol2: attr:%d da:%d\n", attributes, 
368                   desired_access));
369
370         in->ptr = 1; /* undocumented pointer */
371
372         in->des_access = desired_access;
373
374         init_unistr2(&in->uni_server_name, server_name, UNI_STR_TERMINATE);
375
376         init_lsa_obj_attr(&in->attr, attributes, qos);
377 }
378
379 /*******************************************************************
380  Reads or writes an LSA_Q_OPEN_POL2 structure.
381 ********************************************************************/
382
383 BOOL lsa_io_q_open_pol2(const char *desc, LSA_Q_OPEN_POL2 *in, prs_struct *ps, 
384                         int depth)
385 {
386         prs_debug(ps, depth, desc, "lsa_io_q_open_pol2");
387         depth++;
388
389         if(!prs_uint32("ptr       ", ps, depth, &in->ptr))
390                 return False;
391
392         if(!smb_io_unistr2 ("", &in->uni_server_name, in->ptr, ps, depth))
393                 return False;
394         if(!lsa_io_obj_attr("", &in->attr, ps, depth))
395                 return False;
396
397         if(!prs_uint32("des_access", ps, depth, &in->des_access))
398                 return False;
399
400         return True;
401 }
402
403 /*******************************************************************
404  Reads or writes an LSA_R_OPEN_POL2 structure.
405 ********************************************************************/
406
407 BOOL lsa_io_r_open_pol2(const char *desc, LSA_R_OPEN_POL2 *out, prs_struct *ps, 
408                         int depth)
409 {
410         prs_debug(ps, depth, desc, "lsa_io_r_open_pol2");
411         depth++;
412
413         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
414                 return False;
415
416         if(!prs_ntstatus("status", ps, depth, &out->status))
417                 return False;
418
419         return True;
420 }
421
422 /*******************************************************************
423 makes an LSA_Q_QUERY_SEC_OBJ structure.
424 ********************************************************************/
425
426 void init_q_query_sec_obj(LSA_Q_QUERY_SEC_OBJ *in, const POLICY_HND *hnd, 
427                           uint32 sec_info)
428 {
429         DEBUG(5, ("init_q_query_sec_obj\n"));
430
431         in->pol = *hnd;
432         in->sec_info = sec_info;
433
434         return;
435 }
436
437 /*******************************************************************
438  Reads or writes an LSA_Q_QUERY_SEC_OBJ structure.
439 ********************************************************************/
440
441 BOOL lsa_io_q_query_sec_obj(const char *desc, LSA_Q_QUERY_SEC_OBJ *in, 
442                             prs_struct *ps, int depth)
443 {
444         prs_debug(ps, depth, desc, "lsa_io_q_query_sec_obj");
445         depth++;
446
447         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
448                 return False;
449
450         if (!prs_uint32("sec_info", ps, depth, &in->sec_info))
451                 return False;
452
453         return True;
454
455
456 /*******************************************************************
457  Reads or writes a LSA_R_QUERY_SEC_OBJ structure.
458 ********************************************************************/
459
460 BOOL lsa_io_r_query_sec_obj(const char *desc, LSA_R_QUERY_SEC_OBJ *out, prs_struct *ps, int depth)
461 {
462         prs_debug(ps, depth, desc, "lsa_io_r_query_sec_obj");
463         depth++;
464
465         if (!prs_align(ps))
466                 return False;
467
468         if (!prs_uint32("ptr", ps, depth, &out->ptr))
469                 return False;
470
471         if (out->ptr != 0) {
472                 if (!sec_io_desc_buf("sec", &out->buf, ps, depth))
473                         return False;
474         }
475
476         if (!prs_ntstatus("status", ps, depth, &out->status))
477                 return False;
478
479         return True;
480 }
481
482 /*******************************************************************
483  Inits an LSA_Q_QUERY_INFO structure.
484 ********************************************************************/
485
486 void init_q_query(LSA_Q_QUERY_INFO *in, POLICY_HND *hnd, uint16 info_class)
487 {
488         DEBUG(5, ("init_q_query\n"));
489
490         memcpy(&in->pol, hnd, sizeof(in->pol));
491
492         in->info_class = info_class;
493 }
494
495 /*******************************************************************
496  Reads or writes an LSA_Q_QUERY_INFO structure.
497 ********************************************************************/
498
499 BOOL lsa_io_q_query(const char *desc, LSA_Q_QUERY_INFO *in, prs_struct *ps, 
500                     int depth)
501 {
502         prs_debug(ps, depth, desc, "lsa_io_q_query");
503         depth++;
504
505         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
506                 return False;
507
508         if(!prs_uint16("info_class", ps, depth, &in->info_class))
509                 return False;
510
511         return True;
512 }
513
514 /*******************************************************************
515 makes an LSA_Q_ENUM_TRUST_DOM structure.
516 ********************************************************************/
517 BOOL init_q_enum_trust_dom(LSA_Q_ENUM_TRUST_DOM * q_e, POLICY_HND *pol,
518                            uint32 enum_context, uint32 preferred_len)
519 {
520         DEBUG(5, ("init_q_enum_trust_dom\n"));
521
522         q_e->pol = *pol;
523         q_e->enum_context = enum_context;
524         q_e->preferred_len = preferred_len;
525
526         return True;
527 }
528
529 /*******************************************************************
530  Reads or writes an LSA_Q_ENUM_TRUST_DOM structure.
531 ********************************************************************/
532
533 BOOL lsa_io_q_enum_trust_dom(const char *desc, LSA_Q_ENUM_TRUST_DOM *q_e, 
534                              prs_struct *ps, int depth)
535 {
536         prs_debug(ps, depth, desc, "lsa_io_q_enum_trust_dom");
537         depth++;
538
539         if(!smb_io_pol_hnd("", &q_e->pol, ps, depth))
540                 return False;
541
542         if(!prs_uint32("enum_context ", ps, depth, &q_e->enum_context))
543                 return False;
544         if(!prs_uint32("preferred_len", ps, depth, &q_e->preferred_len))
545                 return False;
546
547         return True;
548 }
549
550 /*******************************************************************
551  Inits an LSA_R_ENUM_TRUST_DOM structure.
552 ********************************************************************/
553
554 void init_r_enum_trust_dom(TALLOC_CTX *ctx, LSA_R_ENUM_TRUST_DOM *out,
555                            uint32 enum_context, uint32 num_domains,
556                            struct trustdom_info **td)
557 {
558         unsigned int i;
559
560         DEBUG(5, ("init_r_enum_trust_dom\n"));
561         
562         out->enum_context  = enum_context;
563         out->count         = num_domains;
564                         
565         if ( num_domains != 0 ) {
566         
567                 /* allocate container memory */
568                 
569                 out->domlist = TALLOC_P( ctx, DOMAIN_LIST );
570
571                 if ( !out->domlist ) {
572                         out->status = NT_STATUS_NO_MEMORY;
573                         return;
574                 }
575
576                 if (out->count) {
577                         out->domlist->domains = TALLOC_ARRAY( ctx, DOMAIN_INFO,
578                                                       out->count );
579                         if ( !out->domlist->domains ) {
580                                 out->status = NT_STATUS_NO_MEMORY;
581                                 return;
582                         }
583                 } else {                
584                         out->domlist->domains = NULL;
585                 }
586         
587                 out->domlist->count = out->count;
588                 
589                 /* initialize the list of domains and their sid */
590                 
591                 for (i = 0; i < num_domains; i++) {     
592                         smb_ucs2_t *name;
593                         if ( !(out->domlist->domains[i].sid =
594                                TALLOC_P(ctx, DOM_SID2)) ) {
595                                 out->status = NT_STATUS_NO_MEMORY;
596                                 return;
597                         }
598                                 
599                         init_dom_sid2(out->domlist->domains[i].sid,
600                                       &(td[i])->sid);
601                         if (push_ucs2_talloc(ctx, &name, (td[i])->name) == (size_t)-1){
602                                 out->status = NT_STATUS_NO_MEMORY;
603                                 return;
604                         }
605                         init_unistr4_w(ctx, &out->domlist->domains[i].name,
606                                        name);
607                 }
608         }
609
610 }
611
612 /*******************************************************************
613 ********************************************************************/
614
615 BOOL lsa_io_domain_list( const char *desc, prs_struct *ps, int depth, DOMAIN_LIST *domlist )
616 {
617         int i;
618         
619         prs_debug(ps, depth, desc, "lsa_io_domain_list");
620         depth++;
621
622         if(!prs_uint32("count", ps, depth, &domlist->count))
623                 return False;
624
625         if ( domlist->count == 0 )
626                 return True;
627                 
628         if ( UNMARSHALLING(ps) ) {
629                 if ( !(domlist->domains = PRS_ALLOC_MEM( ps, DOMAIN_INFO, domlist->count )) )
630                         return False;
631         }
632         
633         /* headers */
634         
635         for ( i=0; i<domlist->count; i++ ) {
636                 if ( !prs_unistr4_hdr("name_header", ps, depth, &domlist->domains[i].name) )
637                         return False;
638                 if ( !smb_io_dom_sid2_p("sid_header", ps, depth, &domlist->domains[i].sid) )
639                         return False;
640         }
641
642         /* data */
643         
644         for ( i=0; i<domlist->count; i++ ) {
645                 if ( !prs_unistr4_str("name", ps, depth, &domlist->domains[i].name) )
646                         return False;
647                 if( !smb_io_dom_sid2("sid", domlist->domains[i].sid, ps, depth) )
648                         return False;
649         }
650         
651         return True;
652 }
653
654 /*******************************************************************
655  Reads or writes an LSA_R_ENUM_TRUST_DOM structure.
656 ********************************************************************/
657
658 BOOL lsa_io_r_enum_trust_dom(const char *desc, LSA_R_ENUM_TRUST_DOM *out, 
659                              prs_struct *ps, int depth)
660 {
661         prs_debug(ps, depth, desc, "lsa_io_r_enum_trust_dom");
662         depth++;
663
664         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
665                 return False;
666
667         if(!prs_uint32("count", ps, depth, &out->count))
668                 return False;
669
670         if ( !prs_pointer("trusted_domains", ps, depth, (void*)&out->domlist, sizeof(DOMAIN_LIST), (PRS_POINTER_CAST)lsa_io_domain_list))
671                 return False;
672                 
673         if(!prs_ntstatus("status", ps, depth, &out->status))
674                 return False;
675
676         return True;
677 }
678
679 /*******************************************************************
680 reads or writes a structure.
681 ********************************************************************/
682
683 static BOOL lsa_io_dom_query_1(const char *desc, DOM_QUERY_1 *d_q, prs_struct *ps, int depth)
684 {
685         if (d_q == NULL)
686                 return False;
687
688         prs_debug(ps, depth, desc, "lsa_io_dom_query_1");
689         depth++;
690
691         if (!prs_align(ps))
692                 return False;
693
694         if (!prs_uint32("percent_full", ps, depth, &d_q->percent_full))
695                 return False;
696         if (!prs_uint32("log_size", ps, depth, &d_q->log_size))
697                 return False;
698         if (!smb_io_nttime("retention_time", ps, depth, &d_q->retention_time))
699                 return False;
700         if (!prs_uint8("shutdown_in_progress", ps, depth, &d_q->shutdown_in_progress))
701                 return False;
702         if (!smb_io_nttime("time_to_shutdown", ps, depth, &d_q->time_to_shutdown))
703                 return False;
704         if (!prs_uint32("next_audit_record", ps, depth, &d_q->next_audit_record))
705                 return False;
706         if (!prs_uint32("unknown", ps, depth, &d_q->unknown))
707                 return False;
708
709         return True;
710 }
711
712 /*******************************************************************
713 reads or writes a structure.
714 ********************************************************************/
715
716 static BOOL lsa_io_dom_query_2(const char *desc, DOM_QUERY_2 *d_q, prs_struct *ps, int depth)
717 {
718         if (d_q == NULL)
719                 return False;
720
721         prs_debug(ps, depth, desc, "lsa_io_dom_query_2");
722         depth++;
723
724         if (!prs_align(ps))
725                 return False;
726
727         if (!prs_uint32("auditing_enabled", ps, depth, &d_q->auditing_enabled))
728                 return False;
729         if (!prs_uint32("ptr   ", ps, depth, &d_q->ptr))
730                 return False;
731         if (!prs_uint32("count1", ps, depth, &d_q->count1))
732                 return False;
733
734         if (d_q->ptr) {
735
736                 if (!prs_uint32("count2", ps, depth, &d_q->count2))
737                         return False;
738
739                 if (d_q->count1 != d_q->count2)
740                         return False;
741
742                 if (UNMARSHALLING(ps)) {
743                         if (d_q->count2) {
744                                 d_q->auditsettings = TALLOC_ZERO_ARRAY(ps->mem_ctx, uint32, d_q->count2);
745                                 if (!d_q->auditsettings) {
746                                         return False;
747                                 }
748                         } else {
749                                 d_q->auditsettings = NULL;
750                         }
751                 }
752
753                 if (!prs_uint32s(False, "auditsettings", ps, depth, d_q->auditsettings, d_q->count2))
754                         return False;
755         }
756
757         return True;
758 }
759
760 /*******************************************************************
761 reads or writes a dom query structure.
762 ********************************************************************/
763
764 static BOOL lsa_io_dom_query_3(const char *desc, DOM_QUERY_3 *d_q, prs_struct *ps, int depth)
765 {
766         if (d_q == NULL)
767                 return False;
768
769         prs_debug(ps, depth, desc, "lsa_io_dom_query_3");
770         depth++;
771
772         if(!prs_align(ps))
773                 return False;
774
775         if(!prs_uint16("uni_dom_max_len", ps, depth, &d_q->uni_dom_max_len)) /* domain name string length * 2 */
776                 return False;
777         if(!prs_uint16("uni_dom_str_len", ps, depth, &d_q->uni_dom_str_len)) /* domain name string length * 2 */
778                 return False;
779
780         if(!prs_uint32("buffer_dom_name", ps, depth, &d_q->buffer_dom_name)) /* undocumented domain name string buffer pointer */
781                 return False;
782         if(!prs_uint32("buffer_dom_sid ", ps, depth, &d_q->buffer_dom_sid)) /* undocumented domain SID string buffer pointer */
783                 return False;
784
785         if(!smb_io_unistr2("unistr2", &d_q->uni_domain_name, d_q->buffer_dom_name, ps, depth)) /* domain name (unicode string) */
786                 return False;
787
788         if(!prs_align(ps))
789                 return False;
790
791         if (d_q->buffer_dom_sid != 0) {
792                 if(!smb_io_dom_sid2("", &d_q->dom_sid, ps, depth)) /* domain SID */
793                         return False;
794         } else {
795                 memset((char *)&d_q->dom_sid, '\0', sizeof(d_q->dom_sid));
796         }
797
798         return True;
799 }
800
801 /*******************************************************************
802  Reads or writes a dom query structure.
803 ********************************************************************/
804
805 static BOOL lsa_io_dom_query_5(const char *desc, DOM_QUERY_5 *d_q, prs_struct *ps, int depth)
806 {
807         return lsa_io_dom_query_3("", d_q, ps, depth);
808 }
809
810 /*******************************************************************
811  Reads or writes a dom query structure.
812 ********************************************************************/
813
814 static BOOL lsa_io_dom_query_6(const char *desc, DOM_QUERY_6 *d_q, prs_struct *ps, int depth)
815 {
816         if (d_q == NULL)
817                 return False;
818
819         prs_debug(ps, depth, desc, "lsa_io_dom_query_6");
820         depth++;
821
822         if (!prs_uint16("server_role", ps, depth, &d_q->server_role))
823                 return False;
824
825         return True;
826 }
827
828 /*******************************************************************
829  Reads or writes a dom query structure.
830 ********************************************************************/
831
832 static BOOL lsa_io_dom_query_10(const char *desc, DOM_QUERY_10 *d_q, prs_struct *ps, int depth)
833 {
834         if (d_q == NULL)
835                 return False;
836
837         prs_debug(ps, depth, desc, "lsa_io_dom_query_10");
838         depth++;
839
840         if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
841                 return False;
842
843         return True;
844 }
845
846 /*******************************************************************
847  Reads or writes a dom query structure.
848 ********************************************************************/
849
850 static BOOL lsa_io_dom_query_11(const char *desc, DOM_QUERY_11 *d_q, prs_struct *ps, int depth)
851 {
852         if (d_q == NULL)
853                 return False;
854
855         prs_debug(ps, depth, desc, "lsa_io_dom_query_11");
856         depth++;
857
858         if (!prs_uint16("unknown", ps, depth, &d_q->unknown))
859                 return False;
860         if (!prs_uint8("shutdown_on_full", ps, depth, &d_q->shutdown_on_full))
861                 return False;
862         if (!prs_uint8("log_is_full", ps, depth, &d_q->log_is_full))
863                 return False;
864
865         return True;
866 }
867
868 /*******************************************************************
869  Reads or writes an LSA_DNS_DOM_INFO structure.
870 ********************************************************************/
871
872 BOOL lsa_io_dom_query_12(const char *desc, DOM_QUERY_12 *info, prs_struct *ps, int depth)
873 {
874         prs_debug(ps, depth, desc, "lsa_io_dom_query_12");
875         depth++;
876
877         if(!prs_align(ps))
878                 return False;
879         if(!smb_io_unihdr("nb_name", &info->hdr_nb_dom_name, ps, depth))
880                 return False;
881         if(!smb_io_unihdr("dns_name", &info->hdr_dns_dom_name, ps, depth))
882                 return False;
883         if(!smb_io_unihdr("forest", &info->hdr_forest_name, ps, depth))
884                 return False;
885
886         if(!prs_align(ps))
887                 return False;
888         if ( !smb_io_uuid("dom_guid", &info->dom_guid, ps, depth) )
889                 return False;
890
891         if(!prs_align(ps))
892                 return False;
893         if(!prs_uint32("dom_sid", ps, depth, &info->ptr_dom_sid))
894                 return False;
895
896         if(!smb_io_unistr2("nb_name", &info->uni_nb_dom_name,
897                            info->hdr_nb_dom_name.buffer, ps, depth))
898                 return False;
899         if(!smb_io_unistr2("dns_name", &info->uni_dns_dom_name, 
900                            info->hdr_dns_dom_name.buffer, ps, depth))
901                 return False;
902         if(!smb_io_unistr2("forest", &info->uni_forest_name, 
903                            info->hdr_forest_name.buffer, ps, depth))
904                 return False;
905
906         if(!smb_io_dom_sid2("dom_sid", &info->dom_sid, ps, depth))
907                 return False;
908
909         return True;
910         
911 }
912
913 /*******************************************************************
914  Inits an LSA_Q_QUERY_INFO structure.
915 ********************************************************************/
916
917 void init_q_set(LSA_Q_SET_INFO *in, POLICY_HND *hnd, uint16 info_class, LSA_INFO_CTR ctr)
918 {
919         DEBUG(5,("init_q_set\n"));
920
921         in->info_class = info_class;
922
923         in->pol = *hnd;
924
925         in->ctr = ctr;
926         in->ctr.info_class = info_class;
927 }
928
929 /*******************************************************************
930 reads or writes a structure.
931 ********************************************************************/
932
933 static BOOL lsa_io_query_info_ctr2(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR2 *ctr)
934 {
935         prs_debug(ps, depth, desc, "lsa_io_query_info_ctr2");
936         depth++;
937
938         if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
939                 return False;
940
941         switch (ctr->info_class) {
942         case 1:
943                 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
944                         return False;
945                 break;
946         case 2:
947                 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
948                         return False;
949                 break;
950         case 3:
951                 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
952                         return False;
953                 break;
954         case 5:
955                 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
956                         return False;
957                 break;
958         case 6:
959                 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
960                         return False;
961                 break;
962         case 10:
963                 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
964                         return False;
965                 break;
966         case 11:
967                 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
968                         return False;
969                 break;
970         case 12:
971                 if(!lsa_io_dom_query_12("", &ctr->info.id12, ps, depth))
972                         return False;
973                 break;
974         default:
975                 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
976                 return False;
977                 break;
978         }
979
980         return True;
981 }
982
983
984 /*******************************************************************
985 reads or writes a structure.
986 ********************************************************************/
987
988 static BOOL lsa_io_query_info_ctr(const char *desc, prs_struct *ps, int depth, LSA_INFO_CTR *ctr)
989 {
990         prs_debug(ps, depth, desc, "lsa_io_query_info_ctr");
991         depth++;
992
993         if(!prs_uint16("info_class", ps, depth, &ctr->info_class))
994                 return False;
995
996         if(!prs_align(ps))
997                 return False;
998
999         switch (ctr->info_class) {
1000         case 1:
1001                 if(!lsa_io_dom_query_1("", &ctr->info.id1, ps, depth))
1002                         return False;
1003                 break;
1004         case 2:
1005                 if(!lsa_io_dom_query_2("", &ctr->info.id2, ps, depth))
1006                         return False;
1007                 break;
1008         case 3:
1009                 if(!lsa_io_dom_query_3("", &ctr->info.id3, ps, depth))
1010                         return False;
1011                 break;
1012         case 5:
1013                 if(!lsa_io_dom_query_5("", &ctr->info.id5, ps, depth))
1014                         return False;
1015                 break;
1016         case 6:
1017                 if(!lsa_io_dom_query_6("", &ctr->info.id6, ps, depth))
1018                         return False;
1019                 break;
1020         case 10:
1021                 if(!lsa_io_dom_query_10("", &ctr->info.id10, ps, depth))
1022                         return False;
1023                 break;
1024         case 11:
1025                 if(!lsa_io_dom_query_11("", &ctr->info.id11, ps, depth))
1026                         return False;
1027                 break;
1028         default:
1029                 DEBUG(0,("invalid info_class: %d\n", ctr->info_class));
1030                 return False;
1031                 break;
1032         }
1033
1034         return True;
1035 }
1036
1037 /*******************************************************************
1038  Reads or writes an LSA_R_QUERY_INFO structure.
1039 ********************************************************************/
1040
1041 BOOL lsa_io_r_query(const char *desc, LSA_R_QUERY_INFO *out, prs_struct *ps, int depth)
1042 {
1043
1044         prs_debug(ps, depth, desc, "lsa_io_r_query");
1045         depth++;
1046
1047         if(!prs_align(ps))
1048                 return False;
1049
1050         if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
1051                 return False;
1052
1053         if (out->dom_ptr) {
1054
1055                 if(!lsa_io_query_info_ctr("", ps, depth, &out->ctr))
1056                         return False;
1057         }
1058
1059         if(!prs_align(ps))
1060                 return False;
1061
1062         if(!prs_ntstatus("status", ps, depth, &out->status))
1063                 return False;
1064
1065         return True;
1066 }
1067
1068 /*******************************************************************
1069  Reads or writes an LSA_Q_SET_INFO structure.
1070 ********************************************************************/
1071
1072 BOOL lsa_io_q_set(const char *desc, LSA_Q_SET_INFO *in, prs_struct *ps, 
1073                   int depth)
1074 {
1075         prs_debug(ps, depth, desc, "lsa_io_q_set");
1076         depth++;
1077
1078         if(!prs_align(ps))
1079                 return False;
1080
1081         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
1082                 return False;
1083
1084         if(!prs_uint16("info_class", ps, depth, &in->info_class))
1085                 return False;
1086
1087         if(!lsa_io_query_info_ctr("", ps, depth, &in->ctr))
1088                 return False;
1089
1090         return True;
1091 }
1092
1093 /*******************************************************************
1094  Reads or writes an LSA_R_SET_INFO structure.
1095 ********************************************************************/
1096
1097 BOOL lsa_io_r_set(const char *desc, LSA_R_SET_INFO *out, prs_struct *ps, int depth)
1098 {
1099         prs_debug(ps, depth, desc, "lsa_io_r_set");
1100         depth++;
1101
1102         if(!prs_align(ps))
1103                 return False;
1104
1105         if(!prs_ntstatus("status", ps, depth, &out->status))
1106                 return False;
1107
1108         return True;
1109 }
1110
1111 /*******************************************************************
1112  Inits a LSA_SID_ENUM structure.
1113 ********************************************************************/
1114
1115 static void init_lsa_sid_enum(TALLOC_CTX *mem_ctx, LSA_SID_ENUM *sen, 
1116                        int num_entries, const DOM_SID *sids)
1117 {
1118         int i;
1119
1120         DEBUG(5, ("init_lsa_sid_enum\n"));
1121
1122         sen->num_entries  = num_entries;
1123         sen->ptr_sid_enum = (num_entries != 0);
1124         sen->num_entries2 = num_entries;
1125
1126         /* Allocate memory for sids and sid pointers */
1127
1128         if (num_entries) {
1129                 if ((sen->ptr_sid = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_entries )) == NULL) {
1130                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for ptr_sid\n"));
1131                         return;
1132                 }
1133
1134                 if ((sen->sid = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID2, num_entries)) == NULL) {
1135                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for sids\n"));
1136                         return;
1137                 }
1138         }
1139
1140         /* Copy across SIDs and SID pointers */
1141
1142         for (i = 0; i < num_entries; i++) {
1143                 sen->ptr_sid[i] = 1;
1144                 init_dom_sid2(&sen->sid[i], &sids[i]);
1145         }
1146 }
1147
1148 /*******************************************************************
1149  Reads or writes a LSA_SID_ENUM structure.
1150 ********************************************************************/
1151
1152 static BOOL lsa_io_sid_enum(const char *desc, LSA_SID_ENUM *sen, prs_struct *ps, 
1153                             int depth)
1154 {
1155         unsigned int i;
1156
1157         prs_debug(ps, depth, desc, "lsa_io_sid_enum");
1158         depth++;
1159
1160         if(!prs_align(ps))
1161                 return False;
1162         
1163         if(!prs_uint32("num_entries ", ps, depth, &sen->num_entries))
1164                 return False;
1165         if(!prs_uint32("ptr_sid_enum", ps, depth, &sen->ptr_sid_enum))
1166                 return False;
1167
1168         /*
1169            if the ptr is NULL, leave here. checked from a real w2k trace.
1170            JFM, 11/23/2001
1171          */
1172         
1173         if (sen->ptr_sid_enum==0)
1174                 return True;
1175
1176         if(!prs_uint32("num_entries2", ps, depth, &sen->num_entries2))
1177                 return False;
1178
1179         /* Mallocate memory if we're unpacking from the wire */
1180
1181         if (UNMARSHALLING(ps) && sen->num_entries) {
1182                 if ((sen->ptr_sid = PRS_ALLOC_MEM( ps, uint32, sen->num_entries)) == NULL) {
1183                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1184                                   "ptr_sid\n"));
1185                         return False;
1186                 }
1187
1188                 if ((sen->sid = PRS_ALLOC_MEM( ps, DOM_SID2, sen->num_entries)) == NULL) {
1189                         DEBUG(3, ("init_lsa_sid_enum(): out of memory for "
1190                                   "sids\n"));
1191                         return False;
1192                 }
1193         }
1194
1195         for (i = 0; i < sen->num_entries; i++) {        
1196                 fstring temp;
1197
1198                 slprintf(temp, sizeof(temp) - 1, "ptr_sid[%d]", i);
1199                 if(!prs_uint32(temp, ps, depth, &sen->ptr_sid[i])) {
1200                         return False;
1201                 }
1202         }
1203
1204         for (i = 0; i < sen->num_entries; i++) {
1205                 fstring temp;
1206
1207                 slprintf(temp, sizeof(temp) - 1, "sid[%d]", i);
1208                 if(!smb_io_dom_sid2(temp, &sen->sid[i], ps, depth)) {
1209                         return False;
1210                 }
1211         }
1212
1213         return True;
1214 }
1215
1216 /*******************************************************************
1217  Inits an LSA_R_ENUM_TRUST_DOM structure.
1218 ********************************************************************/
1219
1220 void init_q_lookup_sids(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_SIDS *q_l, 
1221                         POLICY_HND *hnd, int num_sids, const DOM_SID *sids,
1222                         uint16 level)
1223 {
1224         DEBUG(5, ("init_q_lookup_sids\n"));
1225
1226         ZERO_STRUCTP(q_l);
1227
1228         memcpy(&q_l->pol, hnd, sizeof(q_l->pol));
1229         init_lsa_sid_enum(mem_ctx, &q_l->sids, num_sids, sids);
1230         
1231         q_l->level = level;
1232 }
1233
1234 /*******************************************************************
1235  Reads or writes a LSA_Q_LOOKUP_SIDS structure.
1236 ********************************************************************/
1237
1238 BOOL lsa_io_q_lookup_sids(const char *desc, LSA_Q_LOOKUP_SIDS *q_s, prs_struct *ps,
1239                           int depth)
1240 {
1241         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids");
1242         depth++;
1243
1244         if(!prs_align(ps))
1245                 return False;
1246         
1247         if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1248                 return False;
1249         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1250                 return False;
1251         if(!lsa_io_trans_names("names  ", &q_s->names, ps, depth)) /* translated names */
1252                 return False;
1253
1254         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1255                 return False;
1256         if(!prs_align(ps))
1257                 return False;
1258
1259         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1260                 return False;
1261
1262         return True;
1263 }
1264
1265 /*******************************************************************
1266  Reads or writes a LSA_Q_LOOKUP_SIDS2 structure.
1267 ********************************************************************/
1268
1269 BOOL lsa_io_q_lookup_sids2(const char *desc, LSA_Q_LOOKUP_SIDS2 *q_s, prs_struct *ps,
1270                           int depth)
1271 {
1272         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids2");
1273         depth++;
1274
1275         if(!prs_align(ps))
1276                 return False;
1277         
1278         if(!smb_io_pol_hnd("pol_hnd", &q_s->pol, ps, depth)) /* policy handle */
1279                 return False;
1280         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1281                 return False;
1282         if(!lsa_io_trans_names2("names  ", &q_s->names, ps, depth)) /* translated names */
1283                 return False;
1284
1285         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1286                 return False;
1287         if(!prs_align(ps))
1288                 return False;
1289
1290         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1291                 return False;
1292         if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1293                 return False;
1294         if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1295                 return False;
1296
1297         return True;
1298 }
1299
1300 /*******************************************************************
1301  Reads or writes a LSA_Q_LOOKUP_SIDS3 structure.
1302 ********************************************************************/
1303
1304 BOOL lsa_io_q_lookup_sids3(const char *desc, LSA_Q_LOOKUP_SIDS3 *q_s, prs_struct *ps,
1305                           int depth)
1306 {
1307         prs_debug(ps, depth, desc, "lsa_io_q_lookup_sids3");
1308         depth++;
1309
1310         if(!prs_align(ps))
1311                 return False;
1312         
1313         if(!lsa_io_sid_enum("sids   ", &q_s->sids, ps, depth)) /* sids to be looked up */
1314                 return False;
1315         if(!lsa_io_trans_names2("names  ", &q_s->names, ps, depth)) /* translated names */
1316                 return False;
1317
1318         if(!prs_uint16("level", ps, depth, &q_s->level)) /* lookup level */
1319                 return False;
1320         if(!prs_align(ps))
1321                 return False;
1322
1323         if(!prs_uint32("mapped_count", ps, depth, &q_s->mapped_count))
1324                 return False;
1325         if(!prs_uint32("unknown1", ps, depth, &q_s->unknown1))
1326                 return False;
1327         if(!prs_uint32("unknown2", ps, depth, &q_s->unknown2))
1328                 return False;
1329
1330         return True;
1331 }
1332
1333
1334 /*******************************************************************
1335  Reads or writes a structure.
1336 ********************************************************************/
1337
1338 static BOOL lsa_io_trans_names(const char *desc, LSA_TRANS_NAME_ENUM *trn,
1339                 prs_struct *ps, int depth)
1340 {
1341         unsigned int i;
1342
1343         prs_debug(ps, depth, desc, "lsa_io_trans_names");
1344         depth++;
1345
1346         if(!prs_align(ps))
1347                 return False;
1348    
1349         if(!prs_uint32("num_entries    ", ps, depth, &trn->num_entries))
1350                 return False;
1351         if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1352                 return False;
1353
1354         if (trn->ptr_trans_names != 0) {
1355                 if(!prs_uint32("num_entries2   ", ps, depth, 
1356                                &trn->num_entries2))
1357                         return False;
1358
1359                 if (trn->num_entries2 != trn->num_entries) {
1360                         /* RPC fault */
1361                         return False;
1362                 }
1363
1364                 if (UNMARSHALLING(ps) && trn->num_entries2) {
1365                         if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME, trn->num_entries2)) == NULL) {
1366                                 return False;
1367                         }
1368
1369                         if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1370                                 return False;
1371                         }
1372                 }
1373
1374                 for (i = 0; i < trn->num_entries2; i++) {
1375                         fstring t;
1376                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1377
1378                         if(!lsa_io_trans_name(t, &trn->name[i], ps, depth)) /* translated name */
1379                                 return False;
1380                 }
1381
1382                 for (i = 0; i < trn->num_entries2; i++) {
1383                         fstring t;
1384                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1385
1386                         if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1387                                 return False;
1388                         if(!prs_align(ps))
1389                                 return False;
1390                 }
1391         }
1392
1393         return True;
1394 }
1395
1396 /*******************************************************************
1397  Reads or writes a structure.
1398 ********************************************************************/
1399
1400 static BOOL lsa_io_trans_names2(const char *desc, LSA_TRANS_NAME_ENUM2 *trn,
1401                 prs_struct *ps, int depth)
1402 {
1403         unsigned int i;
1404
1405         prs_debug(ps, depth, desc, "lsa_io_trans_names2");
1406         depth++;
1407
1408         if(!prs_align(ps))
1409                 return False;
1410    
1411         if(!prs_uint32("num_entries    ", ps, depth, &trn->num_entries))
1412                 return False;
1413         if(!prs_uint32("ptr_trans_names", ps, depth, &trn->ptr_trans_names))
1414                 return False;
1415
1416         if (trn->ptr_trans_names != 0) {
1417                 if(!prs_uint32("num_entries2   ", ps, depth, 
1418                                &trn->num_entries2))
1419                         return False;
1420
1421                 if (trn->num_entries2 != trn->num_entries) {
1422                         /* RPC fault */
1423                         return False;
1424                 }
1425
1426                 if (UNMARSHALLING(ps) && trn->num_entries2) {
1427                         if ((trn->name = PRS_ALLOC_MEM(ps, LSA_TRANS_NAME2, trn->num_entries2)) == NULL) {
1428                                 return False;
1429                         }
1430
1431                         if ((trn->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, trn->num_entries2)) == NULL) {
1432                                 return False;
1433                         }
1434                 }
1435
1436                 for (i = 0; i < trn->num_entries2; i++) {
1437                         fstring t;
1438                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1439
1440                         if(!lsa_io_trans_name2(t, &trn->name[i], ps, depth)) /* translated name */
1441                                 return False;
1442                 }
1443
1444                 for (i = 0; i < trn->num_entries2; i++) {
1445                         fstring t;
1446                         slprintf(t, sizeof(t) - 1, "name[%d] ", i);
1447
1448                         if(!smb_io_unistr2(t, &trn->uni_name[i], trn->name[i].hdr_name.buffer, ps, depth))
1449                                 return False;
1450                         if(!prs_align(ps))
1451                                 return False;
1452                 }
1453         }
1454
1455         return True;
1456 }
1457
1458
1459 /*******************************************************************
1460  Reads or writes a structure.
1461 ********************************************************************/
1462
1463 BOOL lsa_io_r_lookup_sids(const char *desc, LSA_R_LOOKUP_SIDS *r_s, 
1464                           prs_struct *ps, int depth)
1465 {
1466         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids");
1467         depth++;
1468
1469         if(!prs_align(ps))
1470                 return False;
1471         
1472         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1473                 return False;
1474
1475         if (r_s->ptr_dom_ref != 0)
1476                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1477                         return False;
1478
1479         if(!lsa_io_trans_names("names  ", r_s->names, ps, depth)) /* translated names */
1480                 return False;
1481
1482         if(!prs_align(ps))
1483                 return False;
1484
1485         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1486                 return False;
1487
1488         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1489                 return False;
1490
1491         return True;
1492 }
1493
1494 /*******************************************************************
1495  Reads or writes a structure.
1496 ********************************************************************/
1497
1498 BOOL lsa_io_r_lookup_sids2(const char *desc, LSA_R_LOOKUP_SIDS2 *r_s, 
1499                           prs_struct *ps, int depth)
1500 {
1501         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids2");
1502         depth++;
1503
1504         if(!prs_align(ps))
1505                 return False;
1506         
1507         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1508                 return False;
1509
1510         if (r_s->ptr_dom_ref != 0)
1511                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1512                         return False;
1513
1514         if(!lsa_io_trans_names2("names  ", r_s->names, ps, depth)) /* translated names */
1515                 return False;
1516
1517         if(!prs_align(ps))
1518                 return False;
1519
1520         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1521                 return False;
1522
1523         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1524                 return False;
1525
1526         return True;
1527 }
1528
1529
1530 /*******************************************************************
1531  Reads or writes a structure.
1532 ********************************************************************/
1533
1534 BOOL lsa_io_r_lookup_sids3(const char *desc, LSA_R_LOOKUP_SIDS3 *r_s, 
1535                           prs_struct *ps, int depth)
1536 {
1537         prs_debug(ps, depth, desc, "lsa_io_r_lookup_sids3");
1538         depth++;
1539
1540         if(!prs_align(ps))
1541                 return False;
1542         
1543         if(!prs_uint32("ptr_dom_ref", ps, depth, &r_s->ptr_dom_ref))
1544                 return False;
1545
1546         if (r_s->ptr_dom_ref != 0)
1547                 if(!lsa_io_dom_r_ref ("dom_ref", r_s->dom_ref, ps, depth)) /* domain reference info */
1548                         return False;
1549
1550         if(!lsa_io_trans_names2("names  ", r_s->names, ps, depth)) /* translated names */
1551                 return False;
1552
1553         if(!prs_align(ps))
1554                 return False;
1555
1556         if(!prs_uint32("mapped_count", ps, depth, &r_s->mapped_count))
1557                 return False;
1558
1559         if(!prs_ntstatus("status      ", ps, depth, &r_s->status))
1560                 return False;
1561
1562         return True;
1563 }
1564
1565 /*******************************************************************
1566 makes a structure.
1567 ********************************************************************/
1568
1569 void init_q_lookup_names(TALLOC_CTX *mem_ctx, LSA_Q_LOOKUP_NAMES *q_l, 
1570                          POLICY_HND *hnd, int num_names, const char **names)
1571 {
1572         unsigned int i;
1573
1574         DEBUG(5, ("init_q_lookup_names\n"));
1575
1576         ZERO_STRUCTP(q_l);
1577
1578         q_l->pol = *hnd;
1579         q_l->num_entries = num_names;
1580         q_l->num_entries2 = num_names;
1581         q_l->lookup_level = 1;
1582
1583         if (num_names) {
1584                 if ((q_l->uni_name = TALLOC_ZERO_ARRAY(mem_ctx, UNISTR2, num_names)) == NULL) {
1585                         DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1586                         return;
1587                 }
1588
1589                 if ((q_l->hdr_name = TALLOC_ZERO_ARRAY(mem_ctx, UNIHDR, num_names)) == NULL) {
1590                         DEBUG(3, ("init_q_lookup_names(): out of memory\n"));
1591                         return;
1592                 }
1593         } else {
1594                 q_l->uni_name = NULL;
1595                 q_l->hdr_name = NULL;
1596         }
1597
1598         for (i = 0; i < num_names; i++) {
1599                 init_unistr2(&q_l->uni_name[i], names[i], UNI_FLAGS_NONE);
1600                 init_uni_hdr(&q_l->hdr_name[i], &q_l->uni_name[i]);
1601         }
1602 }
1603
1604 /*******************************************************************
1605 reads or writes a structure.
1606 ********************************************************************/
1607
1608 BOOL lsa_io_q_lookup_names(const char *desc, LSA_Q_LOOKUP_NAMES *q_r, 
1609                            prs_struct *ps, int depth)
1610 {
1611         unsigned int i;
1612
1613         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names");
1614         depth++;
1615
1616         if(!prs_align(ps))
1617                 return False;
1618
1619         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1620                 return False;
1621
1622         if(!prs_align(ps))
1623                 return False;
1624         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1625                 return False;
1626         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1627                 return False;
1628
1629         if (UNMARSHALLING(ps)) {
1630                 if (q_r->num_entries) {
1631                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1632                                 return False;
1633                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1634                                 return False;
1635                 }
1636         }
1637
1638         for (i = 0; i < q_r->num_entries; i++) {
1639                 if(!prs_align(ps))
1640                         return False;
1641                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1642                         return False;
1643         }
1644
1645         for (i = 0; i < q_r->num_entries; i++) {
1646                 if(!prs_align(ps))
1647                         return False;
1648                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1649                         return False;
1650         }
1651
1652         if(!prs_align(ps))
1653                 return False;
1654         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1655                 return False;
1656         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1657                 return False;
1658         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1659                 return False;
1660         if(!prs_align(ps))
1661                 return False;
1662         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1663                 return False;
1664
1665         return True;
1666 }
1667
1668 /*******************************************************************
1669 reads or writes a structure.
1670 ********************************************************************/
1671
1672 BOOL lsa_io_r_lookup_names(const char *desc, LSA_R_LOOKUP_NAMES *out, prs_struct *ps, int depth)
1673 {
1674         unsigned int i;
1675
1676         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names");
1677         depth++;
1678
1679         if(!prs_align(ps))
1680                 return False;
1681
1682         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1683                 return False;
1684
1685         if (out->ptr_dom_ref != 0)
1686                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1687                         return False;
1688
1689         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1690                 return False;
1691         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1692                 return False;
1693
1694         if (out->ptr_entries != 0) {
1695                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1696                         return False;
1697
1698                 if (out->num_entries2 != out->num_entries) {
1699                         /* RPC fault */
1700                         return False;
1701                 }
1702
1703                 if (UNMARSHALLING(ps) && out->num_entries2) {
1704                         if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID, out->num_entries2))
1705                             == NULL) {
1706                                 DEBUG(3, ("lsa_io_r_lookup_names(): out of memory\n"));
1707                                 return False;
1708                         }
1709                 }
1710
1711                 for (i = 0; i < out->num_entries2; i++)
1712                         if(!smb_io_dom_rid("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1713                                 return False;
1714         }
1715
1716         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1717                 return False;
1718
1719         if(!prs_ntstatus("status      ", ps, depth, &out->status))
1720                 return False;
1721
1722         return True;
1723 }
1724
1725 /*******************************************************************
1726 reads or writes a structure.
1727 ********************************************************************/
1728
1729 BOOL lsa_io_q_lookup_names2(const char *desc, LSA_Q_LOOKUP_NAMES2 *q_r, 
1730                            prs_struct *ps, int depth)
1731 {
1732         unsigned int i;
1733
1734         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names2");
1735         depth++;
1736
1737         if(!prs_align(ps))
1738                 return False;
1739
1740         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1741                 return False;
1742
1743         if(!prs_align(ps))
1744                 return False;
1745         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1746                 return False;
1747         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1748                 return False;
1749
1750         if (UNMARSHALLING(ps)) {
1751                 if (q_r->num_entries) {
1752                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1753                                 return False;
1754                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1755                                 return False;
1756                 }
1757         }
1758
1759         for (i = 0; i < q_r->num_entries; i++) {
1760                 if(!prs_align(ps))
1761                         return False;
1762                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1763                         return False;
1764         }
1765
1766         for (i = 0; i < q_r->num_entries; i++) {
1767                 if(!prs_align(ps))
1768                         return False;
1769                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1770                         return False;
1771         }
1772
1773         if(!prs_align(ps))
1774                 return False;
1775         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1776                 return False;
1777         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1778                 return False;
1779         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1780                 return False;
1781         if(!prs_align(ps))
1782                 return False;
1783         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1784                 return False;
1785         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
1786                 return False;
1787         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
1788                 return False;
1789
1790         return True;
1791 }
1792
1793 /*******************************************************************
1794 reads or writes a structure.
1795 ********************************************************************/
1796
1797 BOOL lsa_io_r_lookup_names2(const char *desc, LSA_R_LOOKUP_NAMES2 *out, prs_struct *ps, int depth)
1798 {
1799         unsigned int i;
1800
1801         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names2");
1802         depth++;
1803
1804         if(!prs_align(ps))
1805                 return False;
1806
1807         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1808                 return False;
1809
1810         if (out->ptr_dom_ref != 0)
1811                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1812                         return False;
1813
1814         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1815                 return False;
1816         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1817                 return False;
1818
1819         if (out->ptr_entries != 0) {
1820                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1821                         return False;
1822
1823                 if (out->num_entries2 != out->num_entries) {
1824                         /* RPC fault */
1825                         return False;
1826                 }
1827
1828                 if (UNMARSHALLING(ps) && out->num_entries2) {
1829                         if ((out->dom_rid = PRS_ALLOC_MEM(ps, DOM_RID2, out->num_entries2))
1830                             == NULL) {
1831                                 DEBUG(3, ("lsa_io_r_lookup_names2(): out of memory\n"));
1832                                 return False;
1833                         }
1834                 }
1835
1836                 for (i = 0; i < out->num_entries2; i++)
1837                         if(!smb_io_dom_rid2("", &out->dom_rid[i], ps, depth)) /* domain RIDs being looked up */
1838                                 return False;
1839         }
1840
1841         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
1842                 return False;
1843
1844         if(!prs_ntstatus("status      ", ps, depth, &out->status))
1845                 return False;
1846
1847         return True;
1848 }
1849
1850 /*******************************************************************
1851  Internal lsa data type io.
1852  Following pass must read DOM_SID2 types.
1853 ********************************************************************/
1854
1855 BOOL smb_io_lsa_translated_sids3(const char *desc, LSA_TRANSLATED_SID3 *q_r, 
1856                            prs_struct *ps, int depth)
1857 {
1858         prs_debug(ps, depth, desc, "smb_io_lsa_translated_sids3");
1859         depth++;
1860
1861         if(!prs_align(ps))
1862                 return False;
1863         if(!prs_uint8 ("sid_type ", ps, depth, &q_r->sid_type ))
1864                 return False;
1865         if(!prs_align(ps))
1866                 return False;
1867         /* Second pass will read/write these. */
1868         if (!smb_io_dom_sid2_p("sid_header", ps, depth, &q_r->sid2))
1869                 return False;
1870         if(!prs_uint32("sid_idx ", ps, depth, &q_r->sid_idx ))
1871                 return False;
1872         if(!prs_uint32("unknown ", ps, depth, &q_r->unknown ))
1873                 return False;
1874         
1875         return True;
1876 }
1877
1878 /*******************************************************************
1879  Identical to lsa_io_q_lookup_names2.
1880 ********************************************************************/
1881
1882 BOOL lsa_io_q_lookup_names3(const char *desc, LSA_Q_LOOKUP_NAMES3 *q_r, 
1883                            prs_struct *ps, int depth)
1884 {
1885         unsigned int i;
1886
1887         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names3");
1888         depth++;
1889
1890         if(!prs_align(ps))
1891                 return False;
1892
1893         if(!smb_io_pol_hnd("", &q_r->pol, ps, depth)) /* policy handle */
1894                 return False;
1895
1896         if(!prs_align(ps))
1897                 return False;
1898         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
1899                 return False;
1900         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
1901                 return False;
1902
1903         if (UNMARSHALLING(ps)) {
1904                 if (q_r->num_entries) {
1905                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
1906                                 return False;
1907                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
1908                                 return False;
1909                 }
1910         }
1911
1912         for (i = 0; i < q_r->num_entries; i++) {
1913                 if(!prs_align(ps))
1914                         return False;
1915                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
1916                         return False;
1917         }
1918
1919         for (i = 0; i < q_r->num_entries; i++) {
1920                 if(!prs_align(ps))
1921                         return False;
1922                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
1923                         return False;
1924         }
1925
1926         if(!prs_align(ps))
1927                 return False;
1928         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
1929                 return False;
1930         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
1931                 return False;
1932         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
1933                 return False;
1934         if(!prs_align(ps))
1935                 return False;
1936         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
1937                 return False;
1938         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
1939                 return False;
1940         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
1941                 return False;
1942
1943         return True;
1944 }
1945
1946 /*******************************************************************
1947 reads or writes a structure.
1948 ********************************************************************/
1949
1950 BOOL lsa_io_r_lookup_names3(const char *desc, LSA_R_LOOKUP_NAMES3 *out, prs_struct *ps, int depth)
1951 {
1952         unsigned int i;
1953
1954         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names3");
1955         depth++;
1956
1957         if(!prs_align(ps))
1958                 return False;
1959
1960         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
1961                 return False;
1962
1963         if (out->ptr_dom_ref != 0)
1964                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
1965                         return False;
1966
1967         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
1968                 return False;
1969         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
1970                 return False;
1971
1972         if (out->ptr_entries != 0) {
1973                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
1974                         return False;
1975
1976                 if (out->num_entries2 != out->num_entries) {
1977                         /* RPC fault */
1978                         return False;
1979                 }
1980
1981                 if (UNMARSHALLING(ps) && out->num_entries2) {
1982                         if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
1983                             == NULL) {
1984                                 DEBUG(3, ("lsa_io_r_lookup_names3(): out of memory\n"));
1985                                 return False;
1986                         }
1987                 }
1988
1989                 for (i = 0; i < out->num_entries2; i++) {
1990                         if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
1991                                 return False;
1992                         }
1993                 }
1994                 /* Now process the DOM_SID2 entries. */
1995                 for (i = 0; i < out->num_entries2; i++) {
1996                         if (out->trans_sids[i].sid2) {
1997                                 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
1998                                         return False;
1999                                 }
2000                         }
2001                 }
2002         }
2003
2004         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2005                 return False;
2006
2007         if(!prs_ntstatus("status      ", ps, depth, &out->status))
2008                 return False;
2009
2010         return True;
2011 }
2012
2013 /*******************************************************************
2014 ********************************************************************/
2015
2016 BOOL lsa_io_q_lookup_names4(const char *desc, LSA_Q_LOOKUP_NAMES4 *q_r, 
2017                            prs_struct *ps, int depth)
2018 {
2019         unsigned int i;
2020
2021         prs_debug(ps, depth, desc, "lsa_io_q_lookup_names4");
2022         depth++;
2023
2024         if(!prs_align(ps))
2025                 return False;
2026
2027         if(!prs_uint32("num_entries    ", ps, depth, &q_r->num_entries))
2028                 return False;
2029         if(!prs_uint32("num_entries2   ", ps, depth, &q_r->num_entries2))
2030                 return False;
2031
2032         if (UNMARSHALLING(ps)) {
2033                 if (q_r->num_entries) {
2034                         if ((q_r->hdr_name = PRS_ALLOC_MEM(ps, UNIHDR, q_r->num_entries)) == NULL)
2035                                 return False;
2036                         if ((q_r->uni_name = PRS_ALLOC_MEM(ps, UNISTR2, q_r->num_entries)) == NULL)
2037                                 return False;
2038                 }
2039         }
2040
2041         for (i = 0; i < q_r->num_entries; i++) {
2042                 if(!prs_align(ps))
2043                         return False;
2044                 if(!smb_io_unihdr("hdr_name", &q_r->hdr_name[i], ps, depth)) /* pointer names */
2045                         return False;
2046         }
2047
2048         for (i = 0; i < q_r->num_entries; i++) {
2049                 if(!prs_align(ps))
2050                         return False;
2051                 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */
2052                         return False;
2053         }
2054
2055         if(!prs_align(ps))
2056                 return False;
2057         if(!prs_uint32("num_trans_entries ", ps, depth, &q_r->num_trans_entries))
2058                 return False;
2059         if(!prs_uint32("ptr_trans_sids ", ps, depth, &q_r->ptr_trans_sids))
2060                 return False;
2061         if(!prs_uint16("lookup_level   ", ps, depth, &q_r->lookup_level))
2062                 return False;
2063         if(!prs_align(ps))
2064                 return False;
2065         if(!prs_uint32("mapped_count   ", ps, depth, &q_r->mapped_count))
2066                 return False;
2067         if(!prs_uint32("unknown1   ", ps, depth, &q_r->unknown1))
2068                 return False;
2069         if(!prs_uint32("unknown2   ", ps, depth, &q_r->unknown2))
2070                 return False;
2071
2072         return True;
2073 }
2074
2075 /*******************************************************************
2076  Identical to lsa_io_r_lookup_names3.
2077 ********************************************************************/
2078
2079 BOOL lsa_io_r_lookup_names4(const char *desc, LSA_R_LOOKUP_NAMES4 *out, prs_struct *ps, int depth)
2080 {
2081         unsigned int i;
2082
2083         prs_debug(ps, depth, desc, "lsa_io_r_lookup_names4");
2084         depth++;
2085
2086         if(!prs_align(ps))
2087                 return False;
2088
2089         if(!prs_uint32("ptr_dom_ref", ps, depth, &out->ptr_dom_ref))
2090                 return False;
2091
2092         if (out->ptr_dom_ref != 0)
2093                 if(!lsa_io_dom_r_ref("", out->dom_ref, ps, depth))
2094                         return False;
2095
2096         if(!prs_uint32("num_entries", ps, depth, &out->num_entries))
2097                 return False;
2098         if(!prs_uint32("ptr_entries", ps, depth, &out->ptr_entries))
2099                 return False;
2100
2101         if (out->ptr_entries != 0) {
2102                 if(!prs_uint32("num_entries2", ps, depth, &out->num_entries2))
2103                         return False;
2104
2105                 if (out->num_entries2 != out->num_entries) {
2106                         /* RPC fault */
2107                         return False;
2108                 }
2109
2110                 if (UNMARSHALLING(ps) && out->num_entries2) {
2111                         if ((out->trans_sids = PRS_ALLOC_MEM(ps, LSA_TRANSLATED_SID3, out->num_entries2))
2112                             == NULL) {
2113                                 DEBUG(3, ("lsa_io_r_lookup_names4(): out of memory\n"));
2114                                 return False;
2115                         }
2116                 }
2117
2118                 for (i = 0; i < out->num_entries2; i++) {
2119                         if(!smb_io_lsa_translated_sids3("", &out->trans_sids[i], ps, depth)) {
2120                                 return False;
2121                         }
2122                 }
2123                 /* Now process the DOM_SID2 entries. */
2124                 for (i = 0; i < out->num_entries2; i++) {
2125                         if (out->trans_sids[i].sid2) {
2126                                 if( !smb_io_dom_sid2("sid2", out->trans_sids[i].sid2, ps, depth) ) {
2127                                         return False;
2128                                 }
2129                         }
2130                 }
2131         }
2132
2133         if(!prs_uint32("mapped_count", ps, depth, &out->mapped_count))
2134                 return False;
2135
2136         if(!prs_ntstatus("status      ", ps, depth, &out->status))
2137                 return False;
2138
2139         return True;
2140 }
2141
2142 /*******************************************************************
2143  Inits an LSA_Q_CLOSE structure.
2144 ********************************************************************/
2145
2146 void init_lsa_q_close(LSA_Q_CLOSE *in, POLICY_HND *hnd)
2147 {
2148         DEBUG(5, ("init_lsa_q_close\n"));
2149
2150         memcpy(&in->pol, hnd, sizeof(in->pol));
2151 }
2152
2153 /*******************************************************************
2154  Reads or writes an LSA_Q_CLOSE structure.
2155 ********************************************************************/
2156
2157 BOOL lsa_io_q_close(const char *desc, LSA_Q_CLOSE *in, prs_struct *ps, int depth)
2158 {
2159         prs_debug(ps, depth, desc, "lsa_io_q_close");
2160         depth++;
2161
2162         if(!smb_io_pol_hnd("", &in->pol, ps, depth))
2163                 return False;
2164
2165         return True;
2166 }
2167
2168 /*******************************************************************
2169  Reads or writes an LSA_R_CLOSE structure.
2170 ********************************************************************/
2171
2172 BOOL lsa_io_r_close(const char *desc,  LSA_R_CLOSE *out, prs_struct *ps, int depth)
2173 {
2174         prs_debug(ps, depth, desc, "lsa_io_r_close");
2175         depth++;
2176
2177         if(!smb_io_pol_hnd("", &out->pol, ps, depth))
2178                 return False;
2179
2180         if(!prs_ntstatus("status", ps, depth, &out->status))
2181                 return False;
2182
2183         return True;
2184 }
2185
2186 /*******************************************************************
2187  Reads or writes an LSA_Q_OPEN_SECRET structure.
2188 ********************************************************************/
2189
2190 BOOL lsa_io_q_open_secret(const char *desc, LSA_Q_OPEN_SECRET *in, prs_struct *ps, int depth)
2191 {
2192         prs_debug(ps, depth, desc, "lsa_io_q_open_secret");
2193         depth++;
2194
2195         if(!prs_align(ps))
2196                 return False;
2197
2198         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
2199                 return False;
2200
2201         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
2202                 return False;
2203         if(!prs_align(ps))
2204                 return False;
2205
2206         if(!prs_uint32("access", ps, depth, &in->access))
2207                 return False;
2208
2209         return True;
2210 }
2211
2212 /*******************************************************************
2213  Reads or writes an LSA_R_OPEN_SECRET structure.
2214 ********************************************************************/
2215
2216 BOOL lsa_io_r_open_secret(const char *desc, LSA_R_OPEN_SECRET *out, prs_struct *ps, int depth)
2217 {
2218         prs_debug(ps, depth, desc, "lsa_io_r_open_secret");
2219         depth++;
2220
2221         if(!prs_align(ps))
2222                 return False;
2223    
2224         if(!smb_io_pol_hnd("", &out->handle, ps, depth))
2225                 return False;
2226
2227         if(!prs_ntstatus("status", ps, depth, &out->status))
2228                 return False;
2229
2230         return True;
2231 }
2232
2233 /*******************************************************************
2234  Inits an LSA_Q_ENUM_PRIVS structure.
2235 ********************************************************************/
2236
2237 void init_q_enum_privs(LSA_Q_ENUM_PRIVS *in, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2238 {
2239         DEBUG(5, ("init_q_enum_privs\n"));
2240
2241         memcpy(&in->pol, hnd, sizeof(in->pol));
2242
2243         in->enum_context = enum_context;
2244         in->pref_max_length = pref_max_length;
2245 }
2246
2247 /*******************************************************************
2248 reads or writes a structure.
2249 ********************************************************************/
2250 BOOL lsa_io_q_enum_privs(const char *desc, LSA_Q_ENUM_PRIVS *in, prs_struct *ps, int depth)
2251 {
2252         if (in == NULL)
2253                 return False;
2254
2255         prs_debug(ps, depth, desc, "lsa_io_q_enum_privs");
2256         depth++;
2257
2258         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2259                 return False;
2260
2261         if(!prs_uint32("enum_context   ", ps, depth, &in->enum_context))
2262                 return False;
2263         if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2264                 return False;
2265
2266         return True;
2267 }
2268
2269 /*******************************************************************
2270 reads or writes a structure.
2271 ********************************************************************/
2272 static BOOL lsa_io_priv_entries(const char *desc, LSA_PRIV_ENTRY *entries, uint32 count, prs_struct *ps, int depth)
2273 {
2274         uint32 i;
2275
2276         if (entries == NULL)
2277                 return False;
2278
2279         prs_debug(ps, depth, desc, "lsa_io_priv_entries");
2280         depth++;
2281
2282         if(!prs_align(ps))
2283                 return False;
2284
2285         for (i = 0; i < count; i++) {
2286                 if (!smb_io_unihdr("", &entries[i].hdr_name, ps, depth))
2287                         return False;
2288                 if(!prs_uint32("luid_low ", ps, depth, &entries[i].luid_low))
2289                         return False;
2290                 if(!prs_uint32("luid_high", ps, depth, &entries[i].luid_high))
2291                         return False;
2292         }
2293
2294         for (i = 0; i < count; i++)
2295                 if (!smb_io_unistr2("", &entries[i].name, entries[i].hdr_name.buffer, ps, depth))
2296                         return False;
2297
2298         return True;
2299 }
2300
2301 /*******************************************************************
2302  Inits an LSA_R_ENUM_PRIVS structure.
2303 ********************************************************************/
2304
2305 void init_lsa_r_enum_privs(LSA_R_ENUM_PRIVS *out, uint32 enum_context,
2306                           uint32 count, LSA_PRIV_ENTRY *entries)
2307 {
2308         DEBUG(5, ("init_lsa_r_enum_privs\n"));
2309
2310         out->enum_context=enum_context;
2311         out->count=count;
2312         
2313         if (entries!=NULL) {
2314                 out->ptr=1;
2315                 out->count1=count;
2316                 out->privs=entries;
2317         } else {
2318                 out->ptr=0;
2319                 out->count1=0;
2320                 out->privs=NULL;
2321         }               
2322 }
2323
2324 /*******************************************************************
2325 reads or writes a structure.
2326 ********************************************************************/
2327 BOOL lsa_io_r_enum_privs(const char *desc, LSA_R_ENUM_PRIVS *out, prs_struct *ps, int depth)
2328 {
2329         if (out == NULL)
2330                 return False;
2331
2332         prs_debug(ps, depth, desc, "lsa_io_r_enum_privs");
2333         depth++;
2334
2335         if(!prs_align(ps))
2336                 return False;
2337
2338         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2339                 return False;
2340         if(!prs_uint32("count", ps, depth, &out->count))
2341                 return False;
2342         if(!prs_uint32("ptr", ps, depth, &out->ptr))
2343                 return False;
2344
2345         if (out->ptr) {
2346                 if(!prs_uint32("count1", ps, depth, &out->count1))
2347                         return False;
2348
2349                 if (UNMARSHALLING(ps) && out->count1)
2350                         if (!(out->privs = PRS_ALLOC_MEM(ps, LSA_PRIV_ENTRY, out->count1)))
2351                                 return False;
2352
2353                 if (!lsa_io_priv_entries("", out->privs, out->count1, ps, depth))
2354                         return False;
2355         }
2356
2357         if(!prs_align(ps))
2358                 return False;
2359
2360         if(!prs_ntstatus("status", ps, depth, &out->status))
2361                 return False;
2362
2363         return True;
2364 }
2365
2366 void init_lsa_priv_get_dispname(LSA_Q_PRIV_GET_DISPNAME *trn, POLICY_HND *hnd, const char *name, uint16 lang_id, uint16 lang_id_sys)
2367 {
2368         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2369
2370         init_unistr2(&trn->name, name, UNI_FLAGS_NONE);
2371         init_uni_hdr(&trn->hdr_name, &trn->name);
2372         trn->lang_id = lang_id;
2373         trn->lang_id_sys = lang_id_sys;
2374 }
2375
2376 /*******************************************************************
2377 reads or writes a structure.
2378 ********************************************************************/
2379 BOOL lsa_io_q_priv_get_dispname(const char *desc, LSA_Q_PRIV_GET_DISPNAME *in, prs_struct *ps, int depth)
2380 {
2381         if (in == NULL)
2382                 return False;
2383
2384         prs_debug(ps, depth, desc, "lsa_io_q_priv_get_dispname");
2385         depth++;
2386
2387         if(!prs_align(ps))
2388                 return False;
2389
2390         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2391                 return False;
2392
2393         if (!smb_io_unihdr("hdr_name", &in->hdr_name, ps, depth))
2394                 return False;
2395
2396         if (!smb_io_unistr2("name", &in->name, in->hdr_name.buffer, ps, depth))
2397                 return False;
2398
2399         if(!prs_uint16("lang_id    ", ps, depth, &in->lang_id))
2400                 return False;
2401         if(!prs_uint16("lang_id_sys", ps, depth, &in->lang_id_sys))
2402                 return False;
2403
2404         return True;
2405 }
2406
2407 /*******************************************************************
2408 reads or writes a structure.
2409 ********************************************************************/
2410 BOOL lsa_io_r_priv_get_dispname(const char *desc, LSA_R_PRIV_GET_DISPNAME *out, prs_struct *ps, int depth)
2411 {
2412         if (out == NULL)
2413                 return False;
2414
2415         prs_debug(ps, depth, desc, "lsa_io_r_priv_get_dispname");
2416         depth++;
2417
2418         if (!prs_align(ps))
2419                 return False;
2420
2421         if (!prs_uint32("ptr_info", ps, depth, &out->ptr_info))
2422                 return False;
2423
2424         if (out->ptr_info){
2425                 if (!smb_io_unihdr("hdr_name", &out->hdr_desc, ps, depth))
2426                         return False;
2427
2428                 if (!smb_io_unistr2("desc", &out->desc, out->hdr_desc.buffer, ps, depth))
2429                         return False;
2430         }
2431 /*
2432         if(!prs_align(ps))
2433                 return False;
2434 */
2435         if(!prs_uint16("lang_id", ps, depth, &out->lang_id))
2436                 return False;
2437
2438         if(!prs_align(ps))
2439                 return False;
2440         if(!prs_ntstatus("status", ps, depth, &out->status))
2441                 return False;
2442
2443         return True;
2444 }
2445
2446 /*
2447   initialise a LSA_Q_ENUM_ACCOUNTS structure
2448 */
2449 void init_lsa_q_enum_accounts(LSA_Q_ENUM_ACCOUNTS *trn, POLICY_HND *hnd, uint32 enum_context, uint32 pref_max_length)
2450 {
2451         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2452
2453         trn->enum_context = enum_context;
2454         trn->pref_max_length = pref_max_length;
2455 }
2456
2457 /*******************************************************************
2458 reads or writes a structure.
2459 ********************************************************************/
2460 BOOL lsa_io_q_enum_accounts(const char *desc, LSA_Q_ENUM_ACCOUNTS *in, prs_struct *ps, int depth)
2461 {
2462         if (in == NULL)
2463                 return False;
2464
2465         prs_debug(ps, depth, desc, "lsa_io_q_enum_accounts");
2466         depth++;
2467
2468         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
2469                 return False;
2470
2471         if(!prs_uint32("enum_context   ", ps, depth, &in->enum_context))
2472                 return False;
2473         if(!prs_uint32("pref_max_length", ps, depth, &in->pref_max_length))
2474                 return False;
2475
2476         return True;
2477 }
2478
2479
2480 /*******************************************************************
2481  Inits an LSA_R_ENUM_PRIVS structure.
2482 ********************************************************************/
2483
2484 void init_lsa_r_enum_accounts(LSA_R_ENUM_ACCOUNTS *out, uint32 enum_context)
2485 {
2486         DEBUG(5, ("init_lsa_r_enum_accounts\n"));
2487
2488         out->enum_context=enum_context;
2489         if (out->enum_context!=0) {
2490                 out->sids.num_entries=enum_context;
2491                 out->sids.ptr_sid_enum=1;
2492                 out->sids.num_entries2=enum_context;
2493         } else {
2494                 out->sids.num_entries=0;
2495                 out->sids.ptr_sid_enum=0;
2496                 out->sids.num_entries2=0;
2497         }
2498 }
2499
2500 /*******************************************************************
2501 reads or writes a structure.
2502 ********************************************************************/
2503 BOOL lsa_io_r_enum_accounts(const char *desc, LSA_R_ENUM_ACCOUNTS *out, prs_struct *ps, int depth)
2504 {
2505         if (out == NULL)
2506                 return False;
2507
2508         prs_debug(ps, depth, desc, "lsa_io_r_enum_accounts");
2509         depth++;
2510
2511         if (!prs_align(ps))
2512                 return False;
2513
2514         if(!prs_uint32("enum_context", ps, depth, &out->enum_context))
2515                 return False;
2516
2517         if (!lsa_io_sid_enum("sids", &out->sids, ps, depth))
2518                 return False;
2519
2520         if (!prs_align(ps))
2521                 return False;
2522
2523         if(!prs_ntstatus("status", ps, depth, &out->status))
2524                 return False;
2525
2526         return True;
2527 }
2528
2529
2530 /*******************************************************************
2531  Reads or writes an LSA_Q_UNK_GET_CONNUSER structure.
2532 ********************************************************************/
2533
2534 BOOL lsa_io_q_unk_get_connuser(const char *desc, LSA_Q_UNK_GET_CONNUSER *in, prs_struct *ps, int depth)
2535 {
2536         prs_debug(ps, depth, desc, "lsa_io_q_unk_get_connuser");
2537         depth++;
2538
2539         if(!prs_align(ps))
2540                 return False;
2541    
2542         if(!prs_uint32("ptr_srvname", ps, depth, &in->ptr_srvname))
2543                 return False;
2544
2545         if(!smb_io_unistr2("uni2_srvname", &in->uni2_srvname, in->ptr_srvname, ps, depth)) /* server name to be looked up */
2546                 return False;
2547
2548         if (!prs_align(ps))
2549           return False;
2550
2551         if(!prs_uint32("unk1", ps, depth, &in->unk1))
2552                 return False;
2553         if(!prs_uint32("unk2", ps, depth, &in->unk2))
2554                 return False;
2555         if(!prs_uint32("unk3", ps, depth, &in->unk3))
2556                 return False;
2557
2558         /* Don't bother to read or write at present... */
2559         return True;
2560 }
2561
2562 /*******************************************************************
2563  Reads or writes an LSA_R_UNK_GET_CONNUSER structure.
2564 ********************************************************************/
2565
2566 BOOL lsa_io_r_unk_get_connuser(const char *desc, LSA_R_UNK_GET_CONNUSER *out, prs_struct *ps, int depth)
2567 {
2568         prs_debug(ps, depth, desc, "lsa_io_r_unk_get_connuser");
2569         depth++;
2570
2571         if(!prs_align(ps))
2572                 return False;
2573    
2574         if(!prs_uint32("ptr_user_name", ps, depth, &out->ptr_user_name))
2575                 return False;
2576         if(!smb_io_unihdr("hdr_user_name", &out->hdr_user_name, ps, depth))
2577                 return False;
2578         if(!smb_io_unistr2("uni2_user_name", &out->uni2_user_name, out->ptr_user_name, ps, depth))
2579                 return False;
2580
2581         if (!prs_align(ps))
2582           return False;
2583         
2584         if(!prs_uint32("unk1", ps, depth, &out->unk1))
2585                 return False;
2586
2587         if(!prs_uint32("ptr_dom_name", ps, depth, &out->ptr_dom_name))
2588                 return False;
2589         if(!smb_io_unihdr("hdr_dom_name", &out->hdr_dom_name, ps, depth))
2590                 return False;
2591         if(!smb_io_unistr2("uni2_dom_name", &out->uni2_dom_name, out->ptr_dom_name, ps, depth))
2592                 return False;
2593
2594         if (!prs_align(ps))
2595           return False;
2596         
2597         if(!prs_ntstatus("status", ps, depth, &out->status))
2598                 return False;
2599
2600         return True;
2601 }
2602
2603 void init_lsa_q_create_account(LSA_Q_CREATEACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2604 {
2605         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2606
2607         init_dom_sid2(&trn->sid, sid);
2608         trn->access = desired_access;
2609 }
2610
2611
2612 /*******************************************************************
2613  Reads or writes an LSA_Q_CREATEACCOUNT structure.
2614 ********************************************************************/
2615
2616 BOOL lsa_io_q_create_account(const char *desc, LSA_Q_CREATEACCOUNT *out, prs_struct *ps, int depth)
2617 {
2618         prs_debug(ps, depth, desc, "lsa_io_q_create_account");
2619         depth++;
2620
2621         if(!prs_align(ps))
2622                 return False;
2623  
2624         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2625                 return False;
2626
2627         if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2628                 return False;
2629
2630         if(!prs_uint32("access", ps, depth, &out->access))
2631                 return False;
2632   
2633         return True;
2634 }
2635
2636 /*******************************************************************
2637  Reads or writes an LSA_R_CREATEACCOUNT structure.
2638 ********************************************************************/
2639
2640 BOOL lsa_io_r_create_account(const char *desc, LSA_R_CREATEACCOUNT  *out, prs_struct *ps, int depth)
2641 {
2642         prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2643         depth++;
2644
2645         if(!prs_align(ps))
2646                 return False;
2647  
2648         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2649                 return False;
2650
2651         if(!prs_ntstatus("status", ps, depth, &out->status))
2652                 return False;
2653
2654         return True;
2655 }
2656
2657
2658 void init_lsa_q_open_account(LSA_Q_OPENACCOUNT *trn, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
2659 {
2660         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2661
2662         init_dom_sid2(&trn->sid, sid);
2663         trn->access = desired_access;
2664 }
2665
2666 /*******************************************************************
2667  Reads or writes an LSA_Q_OPENACCOUNT structure.
2668 ********************************************************************/
2669
2670 BOOL lsa_io_q_open_account(const char *desc, LSA_Q_OPENACCOUNT *out, prs_struct *ps, int depth)
2671 {
2672         prs_debug(ps, depth, desc, "lsa_io_q_open_account");
2673         depth++;
2674
2675         if(!prs_align(ps))
2676                 return False;
2677  
2678         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2679                 return False;
2680
2681         if(!smb_io_dom_sid2("sid", &out->sid, ps, depth)) /* domain SID */
2682                 return False;
2683
2684         if(!prs_uint32("access", ps, depth, &out->access))
2685                 return False;
2686   
2687         return True;
2688 }
2689
2690 /*******************************************************************
2691  Reads or writes an LSA_R_OPENACCOUNT structure.
2692 ********************************************************************/
2693
2694 BOOL lsa_io_r_open_account(const char *desc, LSA_R_OPENACCOUNT  *out, prs_struct *ps, int depth)
2695 {
2696         prs_debug(ps, depth, desc, "lsa_io_r_open_account");
2697         depth++;
2698
2699         if(!prs_align(ps))
2700                 return False;
2701  
2702         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2703                 return False;
2704
2705         if(!prs_ntstatus("status", ps, depth, &out->status))
2706                 return False;
2707
2708         return True;
2709 }
2710
2711
2712 void init_lsa_q_enum_privsaccount(LSA_Q_ENUMPRIVSACCOUNT *trn, POLICY_HND *hnd)
2713 {
2714         memcpy(&trn->pol, hnd, sizeof(trn->pol));
2715
2716 }
2717
2718 /*******************************************************************
2719  Reads or writes an LSA_Q_ENUMPRIVSACCOUNT structure.
2720 ********************************************************************/
2721
2722 BOOL lsa_io_q_enum_privsaccount(const char *desc, LSA_Q_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2723 {
2724         prs_debug(ps, depth, desc, "lsa_io_q_enum_privsaccount");
2725         depth++;
2726
2727         if(!prs_align(ps))
2728                 return False;
2729  
2730         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2731                 return False;
2732
2733         return True;
2734 }
2735
2736 /*******************************************************************
2737  Reads or writes an LUID structure.
2738 ********************************************************************/
2739
2740 static BOOL lsa_io_luid(const char *desc, LUID *out, prs_struct *ps, int depth)
2741 {
2742         prs_debug(ps, depth, desc, "lsa_io_luid");
2743         depth++;
2744
2745         if(!prs_align(ps))
2746                 return False;
2747  
2748         if(!prs_uint32("low", ps, depth, &out->low))
2749                 return False;
2750
2751         if(!prs_uint32("high", ps, depth, &out->high))
2752                 return False;
2753
2754         return True;
2755 }
2756
2757 /*******************************************************************
2758  Reads or writes an LUID_ATTR structure.
2759 ********************************************************************/
2760
2761 static BOOL lsa_io_luid_attr(const char *desc, LUID_ATTR *out, prs_struct *ps, int depth)
2762 {
2763         prs_debug(ps, depth, desc, "lsa_io_luid_attr");
2764         depth++;
2765
2766         if(!prs_align(ps))
2767                 return False;
2768  
2769         if (!lsa_io_luid(desc, &out->luid, ps, depth))
2770                 return False;
2771
2772         if(!prs_uint32("attr", ps, depth, &out->attr))
2773                 return False;
2774
2775         return True;
2776 }
2777
2778 /*******************************************************************
2779  Reads or writes an PRIVILEGE_SET structure.
2780 ********************************************************************/
2781
2782 static BOOL lsa_io_privilege_set(const char *desc, PRIVILEGE_SET *out, prs_struct *ps, int depth)
2783 {
2784         uint32 i, dummy;
2785
2786         prs_debug(ps, depth, desc, "lsa_io_privilege_set");
2787         depth++;
2788
2789         if(!prs_align(ps))
2790                 return False;
2791  
2792         if(!prs_uint32("count", ps, depth, &dummy))
2793                 return False;
2794         if(!prs_uint32("control", ps, depth, &out->control))
2795                 return False;
2796
2797         for (i=0; i<out->count; i++) {
2798                 if (!lsa_io_luid_attr(desc, &out->set[i], ps, depth))
2799                         return False;
2800         }
2801         
2802         return True;
2803 }
2804
2805 NTSTATUS init_lsa_r_enum_privsaccount(TALLOC_CTX *mem_ctx, LSA_R_ENUMPRIVSACCOUNT *out, LUID_ATTR *set, uint32 count, uint32 control)
2806 {
2807         NTSTATUS ret = NT_STATUS_OK;
2808
2809         out->ptr = 1;
2810         out->count = count;
2811
2812         if ( !NT_STATUS_IS_OK(ret = privilege_set_init_by_ctx(mem_ctx, &(out->set))) )
2813                 return ret;
2814         
2815         out->set.count = count;
2816         
2817         if (!NT_STATUS_IS_OK(ret = dup_luid_attr(out->set.mem_ctx, &(out->set.set), set, count)))
2818                 return ret;
2819
2820         DEBUG(10,("init_lsa_r_enum_privsaccount: %d privileges\n", out->count));
2821
2822         return ret;
2823 }
2824
2825 /*******************************************************************
2826  Reads or writes an LSA_R_ENUMPRIVSACCOUNT structure.
2827 ********************************************************************/
2828
2829 BOOL lsa_io_r_enum_privsaccount(const char *desc, LSA_R_ENUMPRIVSACCOUNT *out, prs_struct *ps, int depth)
2830 {
2831         prs_debug(ps, depth, desc, "lsa_io_r_enum_privsaccount");
2832         depth++;
2833
2834         if(!prs_align(ps))
2835                 return False;
2836  
2837         if(!prs_uint32("ptr", ps, depth, &out->ptr))
2838                 return False;
2839
2840         if (out->ptr!=0) {
2841                 if(!prs_uint32("count", ps, depth, &out->count))
2842                         return False;
2843
2844                 /* malloc memory if unmarshalling here */
2845
2846                 if (UNMARSHALLING(ps) && out->count != 0) {
2847                         if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
2848                                 return False;
2849
2850                         if (!(out->set.set = PRS_ALLOC_MEM(ps,LUID_ATTR,out->count)))
2851                                 return False;
2852
2853                 }
2854                 
2855                 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
2856                         return False;
2857         }
2858
2859         if(!prs_ntstatus("status", ps, depth, &out->status))
2860                 return False;
2861
2862         return True;
2863 }
2864
2865
2866
2867 /*******************************************************************
2868  Reads or writes an  LSA_Q_GETSYSTEMACCOUNTstructure.
2869 ********************************************************************/
2870
2871 BOOL lsa_io_q_getsystemaccount(const char *desc, LSA_Q_GETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2872 {
2873         prs_debug(ps, depth, desc, "lsa_io_q_getsystemaccount");
2874         depth++;
2875
2876         if(!prs_align(ps))
2877                 return False;
2878  
2879         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2880                 return False;
2881
2882         return True;
2883 }
2884
2885 /*******************************************************************
2886  Reads or writes an  LSA_R_GETSYSTEMACCOUNTstructure.
2887 ********************************************************************/
2888
2889 BOOL lsa_io_r_getsystemaccount(const char *desc, LSA_R_GETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2890 {
2891         prs_debug(ps, depth, desc, "lsa_io_r_getsystemaccount");
2892         depth++;
2893
2894         if(!prs_align(ps))
2895                 return False;
2896  
2897         if(!prs_uint32("access", ps, depth, &out->access))
2898                 return False;
2899
2900         if(!prs_ntstatus("status", ps, depth, &out->status))
2901                 return False;
2902
2903         return True;
2904 }
2905
2906
2907 /*******************************************************************
2908  Reads or writes an LSA_Q_SETSYSTEMACCOUNT structure.
2909 ********************************************************************/
2910
2911 BOOL lsa_io_q_setsystemaccount(const char *desc, LSA_Q_SETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2912 {
2913         prs_debug(ps, depth, desc, "lsa_io_q_setsystemaccount");
2914         depth++;
2915
2916         if(!prs_align(ps))
2917                 return False;
2918  
2919         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2920                 return False;
2921
2922         if(!prs_uint32("access", ps, depth, &out->access))
2923                 return False;
2924
2925         return True;
2926 }
2927
2928 /*******************************************************************
2929  Reads or writes an LSA_R_SETSYSTEMACCOUNT structure.
2930 ********************************************************************/
2931
2932 BOOL lsa_io_r_setsystemaccount(const char *desc, LSA_R_SETSYSTEMACCOUNT  *out, prs_struct *ps, int depth)
2933 {
2934         prs_debug(ps, depth, desc, "lsa_io_r_setsystemaccount");
2935         depth++;
2936
2937         if(!prs_align(ps))
2938                 return False;
2939  
2940         if(!prs_ntstatus("status", ps, depth, &out->status))
2941                 return False;
2942
2943         return True;
2944 }
2945
2946
2947 void init_lsa_string( LSA_STRING *uni, const char *string )
2948 {
2949         init_unistr2(&uni->unistring, string, UNI_FLAGS_NONE);
2950         init_uni_hdr(&uni->hdr, &uni->unistring);
2951 }
2952
2953 void init_lsa_q_lookup_priv_value(LSA_Q_LOOKUP_PRIV_VALUE *q_u, POLICY_HND *hnd, const char *name)
2954 {
2955         memcpy(&q_u->pol, hnd, sizeof(q_u->pol));
2956         init_lsa_string( &q_u->privname, name );
2957 }
2958
2959 BOOL smb_io_lsa_string( const char *desc, LSA_STRING *string, prs_struct *ps, int depth )
2960 {
2961         prs_debug(ps, depth, desc, "smb_io_lsa_string");
2962         depth++;
2963
2964         if(!smb_io_unihdr ("hdr", &string->hdr, ps, depth))
2965                 return False;
2966         if(!smb_io_unistr2("unistring", &string->unistring, string->hdr.buffer, ps, depth))
2967                 return False;
2968         
2969         return True;
2970 }
2971
2972 /*******************************************************************
2973  Reads or writes an LSA_Q_LOOKUP_PRIV_VALUE  structure.
2974 ********************************************************************/
2975
2976 BOOL lsa_io_q_lookup_priv_value(const char *desc, LSA_Q_LOOKUP_PRIV_VALUE  *out, prs_struct *ps, int depth)
2977 {
2978         prs_debug(ps, depth, desc, "lsa_io_q_lookup_priv_value");
2979         depth++;
2980
2981         if(!prs_align(ps))
2982                 return False;
2983  
2984         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
2985                 return False;
2986         if(!smb_io_lsa_string("privname", &out->privname, ps, depth))
2987                 return False;
2988
2989         return True;
2990 }
2991
2992 /*******************************************************************
2993  Reads or writes an  LSA_R_LOOKUP_PRIV_VALUE structure.
2994 ********************************************************************/
2995
2996 BOOL lsa_io_r_lookup_priv_value(const char *desc, LSA_R_LOOKUP_PRIV_VALUE  *out, prs_struct *ps, int depth)
2997 {
2998         prs_debug(ps, depth, desc, "lsa_io_r_lookup_priv_value");
2999         depth++;
3000
3001         if(!prs_align(ps))
3002                 return False;
3003                 
3004         if(!lsa_io_luid("luid", &out->luid, ps, depth))
3005                 return False;
3006  
3007         if(!prs_ntstatus("status", ps, depth, &out->status))
3008                 return False;
3009
3010         return True;
3011 }
3012
3013
3014 /*******************************************************************
3015  Reads or writes an LSA_Q_ADDPRIVS structure.
3016 ********************************************************************/
3017
3018 BOOL lsa_io_q_addprivs(const char *desc, LSA_Q_ADDPRIVS *out, prs_struct *ps, int depth)
3019 {
3020         prs_debug(ps, depth, desc, "lsa_io_q_addprivs");
3021         depth++;
3022
3023         if(!prs_align(ps))
3024                 return False;
3025  
3026         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3027                 return False;
3028         
3029         if(!prs_uint32("count", ps, depth, &out->count))
3030                 return False;
3031
3032         if (UNMARSHALLING(ps) && out->count!=0) {
3033                 if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3034                         return False;
3035                 
3036                 if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3037                         return False;
3038         }
3039         
3040         if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3041                 return False;
3042         
3043         return True;
3044 }
3045
3046 /*******************************************************************
3047  Reads or writes an LSA_R_ADDPRIVS structure.
3048 ********************************************************************/
3049
3050 BOOL lsa_io_r_addprivs(const char *desc, LSA_R_ADDPRIVS *out, prs_struct *ps, int depth)
3051 {
3052         prs_debug(ps, depth, desc, "lsa_io_r_addprivs");
3053         depth++;
3054
3055         if(!prs_align(ps))
3056                 return False;
3057  
3058         if(!prs_ntstatus("status", ps, depth, &out->status))
3059                 return False;
3060
3061         return True;
3062 }
3063
3064 /*******************************************************************
3065  Reads or writes an LSA_Q_REMOVEPRIVS structure.
3066 ********************************************************************/
3067
3068 BOOL lsa_io_q_removeprivs(const char *desc, LSA_Q_REMOVEPRIVS *out, prs_struct *ps, int depth)
3069 {
3070         prs_debug(ps, depth, desc, "lsa_io_q_removeprivs");
3071         depth++;
3072
3073         if(!prs_align(ps))
3074                 return False;
3075  
3076         if(!smb_io_pol_hnd("pol", &out->pol, ps, depth))
3077                 return False;
3078         
3079         if(!prs_uint32("allrights", ps, depth, &out->allrights))
3080                 return False;
3081
3082         if(!prs_uint32("ptr", ps, depth, &out->ptr))
3083                 return False;
3084
3085         /* 
3086          * JFM: I'm not sure at all if the count is inside the ptr
3087          * never seen one with ptr=0
3088          */
3089
3090         if (out->ptr!=0) {
3091                 if(!prs_uint32("count", ps, depth, &out->count))
3092                         return False;
3093
3094                 if (UNMARSHALLING(ps) && out->count!=0) {
3095                         if (!NT_STATUS_IS_OK(privilege_set_init_by_ctx(ps->mem_ctx, &(out->set))))
3096                                 return False;
3097
3098                         if (!(out->set.set = PRS_ALLOC_MEM(ps, LUID_ATTR, out->count)))
3099                                 return False;
3100                 }
3101
3102                 if(!lsa_io_privilege_set(desc, &out->set, ps, depth))
3103                         return False;
3104         }
3105
3106         return True;
3107 }
3108
3109 /*******************************************************************
3110  Reads or writes an LSA_R_REMOVEPRIVS structure.
3111 ********************************************************************/
3112
3113 BOOL lsa_io_r_removeprivs(const char *desc, LSA_R_REMOVEPRIVS *out, prs_struct *ps, int depth)
3114 {
3115         prs_debug(ps, depth, desc, "lsa_io_r_removeprivs");
3116         depth++;
3117
3118         if(!prs_align(ps))
3119                 return False;
3120  
3121         if(!prs_ntstatus("status", ps, depth, &out->status))
3122                 return False;
3123
3124         return True;
3125 }
3126
3127 BOOL policy_handle_is_valid(const POLICY_HND *hnd)
3128 {
3129         POLICY_HND zero_pol;
3130
3131         ZERO_STRUCT(zero_pol);
3132         return ((memcmp(&zero_pol, hnd, sizeof(POLICY_HND)) == 0) ? False : True );
3133 }
3134
3135 /*******************************************************************
3136  Inits an LSA_Q_QUERY_INFO2 structure.
3137 ********************************************************************/
3138
3139 void init_q_query2(LSA_Q_QUERY_INFO2 *in, POLICY_HND *hnd, uint16 info_class)
3140 {
3141         DEBUG(5, ("init_q_query2\n"));
3142
3143         memcpy(&in->pol, hnd, sizeof(in->pol));
3144
3145         in->info_class = info_class;
3146 }
3147
3148 /*******************************************************************
3149  Reads or writes an LSA_Q_QUERY_DNSDOMINFO structure.
3150 ********************************************************************/
3151
3152 BOOL lsa_io_q_query_info2(const char *desc, LSA_Q_QUERY_INFO2 *in, prs_struct *ps, int depth)
3153 {
3154         prs_debug(ps, depth, desc, "lsa_io_q_query_info2");
3155         depth++;
3156
3157         if(!prs_align(ps))
3158                 return False;
3159  
3160         if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
3161                 return False;
3162         
3163         if(!prs_uint16("info_class", ps, depth, &in->info_class))
3164                 return False;
3165
3166         return True;
3167 }
3168
3169 /*******************************************************************
3170  Reads or writes an LSA_R_QUERY_DNSDOMINFO structure.
3171 ********************************************************************/
3172
3173 BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *out,
3174                           prs_struct *ps, int depth)
3175 {
3176         prs_debug(ps, depth, desc, "lsa_io_r_query_info2");
3177         depth++;
3178
3179         if(!prs_align(ps))
3180                 return False;
3181
3182         if(!prs_uint32("dom_ptr", ps, depth, &out->dom_ptr))
3183                 return False;
3184
3185         if (out->dom_ptr) {
3186
3187                 if(!lsa_io_query_info_ctr2("", ps, depth, &out->ctr))
3188                         return False;
3189         }
3190
3191         if(!prs_align(ps))
3192                 return False;
3193         if(!prs_ntstatus("status", ps, depth, &out->status))
3194                 return False;
3195
3196         return True;
3197 }
3198
3199 /*******************************************************************
3200  Inits an LSA_Q_ENUM_ACCT_RIGHTS structure.
3201 ********************************************************************/
3202 void init_q_enum_acct_rights(LSA_Q_ENUM_ACCT_RIGHTS *in, 
3203                              POLICY_HND *hnd, 
3204                              uint32 count, 
3205                              DOM_SID *sid)
3206 {
3207         DEBUG(5, ("init_q_enum_acct_rights\n"));
3208
3209         in->pol = *hnd;
3210         init_dom_sid2(&in->sid, sid);
3211 }
3212
3213 /*******************************************************************
3214 ********************************************************************/
3215 NTSTATUS init_r_enum_acct_rights( LSA_R_ENUM_ACCT_RIGHTS *out, PRIVILEGE_SET *privileges )
3216 {
3217         uint32 i;
3218         char *privname;
3219         const char **privname_array = NULL;
3220         int num_priv = 0;
3221
3222         for ( i=0; i<privileges->count; i++ ) {
3223                 privname = luid_to_privilege_name( &privileges->set[i].luid );
3224                 if ( privname ) {
3225                         if ( !add_string_to_array( get_talloc_ctx(), privname, &privname_array, &num_priv ) ) 
3226                                 return NT_STATUS_NO_MEMORY;
3227                 }
3228         }
3229
3230         if ( num_priv ) {
3231                 out->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3232                 if (!out->rights) {
3233                         return NT_STATUS_NO_MEMORY;
3234                 }
3235
3236                 if ( !init_unistr4_array( out->rights, num_priv, privname_array ) ) 
3237                         return NT_STATUS_NO_MEMORY;
3238
3239                 out->count = num_priv;
3240         }
3241
3242         return NT_STATUS_OK;
3243 }
3244
3245 /*******************************************************************
3246 reads or writes a LSA_Q_ENUM_ACCT_RIGHTS structure.
3247 ********************************************************************/
3248 BOOL lsa_io_q_enum_acct_rights(const char *desc, LSA_Q_ENUM_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3249 {
3250         
3251         if (in == NULL)
3252                 return False;
3253
3254         prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_rights");
3255         depth++;
3256
3257         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3258                 return False;
3259
3260         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3261                 return False;
3262
3263         return True;
3264 }
3265
3266
3267 /*******************************************************************
3268 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3269 ********************************************************************/
3270 BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3271 {
3272         prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_rights");
3273         depth++;
3274
3275         if(!prs_uint32("count   ", ps, depth, &out->count))
3276                 return False;
3277
3278         if ( !prs_pointer("rights", ps, depth, (void*)&out->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3279                 return False;
3280
3281         if(!prs_align(ps))
3282                 return False;
3283
3284         if(!prs_ntstatus("status", ps, depth, &out->status))
3285                 return False;
3286
3287         return True;
3288 }
3289
3290
3291 /*******************************************************************
3292  Inits an LSA_Q_ADD_ACCT_RIGHTS structure.
3293 ********************************************************************/
3294 void init_q_add_acct_rights( LSA_Q_ADD_ACCT_RIGHTS *in, POLICY_HND *hnd, 
3295                              DOM_SID *sid, uint32 count, const char **rights )
3296 {
3297         DEBUG(5, ("init_q_add_acct_rights\n"));
3298
3299         in->pol = *hnd;
3300         init_dom_sid2(&in->sid, sid);
3301         
3302         in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3303         if (!in->rights) {
3304                 smb_panic("init_q_add_acct_rights: talloc fail\n");
3305                 return;
3306         }
3307         init_unistr4_array( in->rights, count, rights );
3308         
3309         in->count = count;
3310 }
3311
3312
3313 /*******************************************************************
3314 reads or writes a LSA_Q_ADD_ACCT_RIGHTS structure.
3315 ********************************************************************/
3316 BOOL lsa_io_q_add_acct_rights(const char *desc, LSA_Q_ADD_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3317 {
3318         prs_debug(ps, depth, desc, "lsa_io_q_add_acct_rights");
3319         depth++;
3320
3321         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3322                 return False;
3323
3324         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3325                 return False;
3326
3327         if(!prs_uint32("count", ps, depth, &in->count))
3328                 return False;
3329
3330         if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3331                 return False;
3332
3333         return True;
3334 }
3335
3336 /*******************************************************************
3337 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3338 ********************************************************************/
3339 BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3340 {
3341         prs_debug(ps, depth, desc, "lsa_io_r_add_acct_rights");
3342         depth++;
3343
3344         if(!prs_ntstatus("status", ps, depth, &out->status))
3345                 return False;
3346
3347         return True;
3348 }
3349
3350 /*******************************************************************
3351  Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure.
3352 ********************************************************************/
3353
3354 void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *in, 
3355                                POLICY_HND *hnd, 
3356                                DOM_SID *sid,
3357                                uint32 removeall,
3358                                uint32 count, 
3359                                const char **rights)
3360 {
3361         DEBUG(5, ("init_q_remove_acct_rights\n"));
3362
3363         in->pol = *hnd;
3364
3365         init_dom_sid2(&in->sid, sid);
3366
3367         in->removeall = removeall;
3368         in->count = count;
3369
3370         in->rights = TALLOC_P( get_talloc_ctx(), UNISTR4_ARRAY );
3371         if (!in->rights) {
3372                 smb_panic("init_q_remove_acct_rights: talloc fail\n");
3373                 return;
3374         }
3375         init_unistr4_array( in->rights, count, rights );
3376 }
3377
3378 /*******************************************************************
3379 reads or writes a LSA_Q_REMOVE_ACCT_RIGHTS structure.
3380 ********************************************************************/
3381
3382 BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *in, prs_struct *ps, int depth)
3383 {
3384         prs_debug(ps, depth, desc, "lsa_io_q_remove_acct_rights");
3385         depth++;
3386
3387         if (!smb_io_pol_hnd("", &in->pol, ps, depth))
3388                 return False;
3389
3390         if(!smb_io_dom_sid2("sid", &in->sid, ps, depth))
3391                 return False;
3392
3393         if(!prs_uint32("removeall", ps, depth, &in->removeall))
3394                 return False;
3395
3396         if(!prs_uint32("count", ps, depth, &in->count))
3397                 return False;
3398
3399         if ( !prs_pointer("rights", ps, depth, (void*)&in->rights, sizeof(UNISTR4_ARRAY), (PRS_POINTER_CAST)prs_unistr4_array) )
3400                 return False;
3401
3402         return True;
3403 }
3404
3405 /*******************************************************************
3406 reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure.
3407 ********************************************************************/
3408 BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *out, prs_struct *ps, int depth)
3409 {
3410         prs_debug(ps, depth, desc, "lsa_io_r_remove_acct_rights");
3411         depth++;
3412
3413         if(!prs_ntstatus("status", ps, depth, &out->status))
3414                 return False;
3415
3416         return True;
3417 }
3418
3419 /*******************************************************************
3420  Inits an LSA_Q_OPEN_TRUSTED_DOMAIN structure.
3421 ********************************************************************/
3422
3423 void init_lsa_q_open_trusted_domain(LSA_Q_OPEN_TRUSTED_DOMAIN *q, POLICY_HND *hnd, DOM_SID *sid, uint32 desired_access)
3424 {
3425         memcpy(&q->pol, hnd, sizeof(q->pol));
3426
3427         init_dom_sid2(&q->sid, sid);
3428         q->access_mask = desired_access;
3429 }
3430
3431 /*******************************************************************
3432 ********************************************************************/
3433
3434 #if 0 /* jerry, I think this not correct - gd */
3435 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3436 {
3437         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3438         depth++;
3439
3440         if(!prs_align(ps))
3441                 return False;
3442
3443         if (!smb_io_pol_hnd("", &in->handle, ps, depth))
3444                 return False;
3445
3446         if(!prs_uint32("count", ps, depth, &in->count))
3447                 return False;
3448
3449         if(!smb_io_dom_sid("sid", &in->sid, ps, depth))
3450                 return False;
3451
3452         return True;
3453 }
3454 #endif
3455
3456
3457 /*******************************************************************
3458  Inits an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3459 ********************************************************************/
3460
3461 void init_lsa_q_open_trusted_domain_by_name(LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q, 
3462                                             POLICY_HND *hnd, 
3463                                             const char *name, 
3464                                             uint32 desired_access)
3465 {
3466         memcpy(&q->pol, hnd, sizeof(q->pol));
3467
3468         init_lsa_string(&q->name, name);
3469         q->access_mask = desired_access;
3470 }
3471
3472 /*******************************************************************
3473 ********************************************************************/
3474
3475
3476 /*******************************************************************
3477  Reads or writes an LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3478 ********************************************************************/
3479
3480 BOOL lsa_io_q_open_trusted_domain_by_name(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN_BY_NAME *q_o, prs_struct *ps, int depth)
3481 {
3482         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain_by_name");
3483         depth++;
3484
3485         if(!prs_align(ps))
3486                 return False;
3487  
3488         if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3489                 return False;
3490
3491         if(!prs_align(ps))
3492                 return False;
3493
3494         if(!smb_io_lsa_string("name", &q_o->name, ps, depth))
3495                 return False;
3496
3497         if(!prs_align(ps))
3498                 return False;
3499
3500         if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3501                 return False;
3502
3503         return True;
3504 }
3505
3506 /*******************************************************************
3507  Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME structure.
3508 ********************************************************************/
3509
3510 BOOL lsa_io_r_open_trusted_domain_by_name(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN_BY_NAME *out, prs_struct *ps, int depth)
3511 {
3512         prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain_by_name");
3513         depth++;
3514
3515         if(!prs_align(ps))
3516                 return False;
3517
3518         if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3519                 return False;
3520
3521         if(!prs_ntstatus("status", ps, depth, &out->status))
3522                 return False;
3523
3524         return True;
3525 }
3526
3527 /*******************************************************************
3528 ********************************************************************/
3529
3530 BOOL lsa_io_q_open_trusted_domain(const char *desc, LSA_Q_OPEN_TRUSTED_DOMAIN *q_o, prs_struct *ps, int depth)
3531 {
3532         prs_debug(ps, depth, desc, "lsa_io_q_open_trusted_domain");
3533         depth++;
3534
3535         if(!prs_align(ps))
3536                 return False;
3537  
3538         if(!smb_io_pol_hnd("pol", &q_o->pol, ps, depth))
3539                 return False;
3540
3541         if(!smb_io_dom_sid2("sid", &q_o->sid, ps, depth))
3542                 return False;
3543
3544         if(!prs_uint32("access", ps, depth, &q_o->access_mask))
3545                 return False;
3546   
3547         return True;
3548 }
3549
3550 /*******************************************************************
3551  Reads or writes an LSA_R_OPEN_TRUSTED_DOMAIN structure.
3552 ********************************************************************/
3553
3554 BOOL lsa_io_r_open_trusted_domain(const char *desc, LSA_R_OPEN_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3555 {
3556         prs_debug(ps, depth, desc, "lsa_io_r_open_trusted_domain");
3557         depth++;
3558
3559         if(!prs_align(ps))
3560                 return False;
3561
3562         if (!smb_io_pol_hnd("handle", &out->handle, ps, depth))
3563                 return False;
3564
3565         if(!prs_ntstatus("status", ps, depth, &out->status))
3566                 return False;
3567
3568         return True;
3569 }
3570
3571 /*******************************************************************
3572 ********************************************************************/
3573
3574 BOOL lsa_io_q_create_trusted_domain(const char *desc, LSA_Q_CREATE_TRUSTED_DOMAIN *in, prs_struct *ps, int depth)
3575 {
3576         prs_debug(ps, depth, desc, "lsa_io_q_create_trusted_domain");
3577         depth++;
3578
3579         if(!prs_align(ps))
3580                 return False;
3581
3582         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3583                 return False;
3584
3585         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3586                 return False;
3587         if(!prs_align(ps))
3588                 return False;
3589
3590         if(!prs_uint32("access", ps, depth, &in->access))
3591                 return False;
3592
3593         return True;
3594 }
3595
3596 /*******************************************************************
3597 ********************************************************************/
3598
3599 BOOL lsa_io_r_create_trusted_domain(const char *desc, LSA_R_CREATE_TRUSTED_DOMAIN *out, prs_struct *ps, int depth)
3600 {
3601         prs_debug(ps, depth, desc, "lsa_io_r_create_trusted_domain");
3602         depth++;
3603
3604         if(!prs_align(ps))
3605                 return False;
3606
3607         if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3608                 return False;
3609
3610         if(!prs_ntstatus("status", ps, depth, &out->status))
3611                 return False;
3612
3613         return True;
3614 }
3615
3616 /*******************************************************************
3617 ********************************************************************/
3618
3619 BOOL lsa_io_q_create_secret(const char *desc, LSA_Q_CREATE_SECRET *in, prs_struct *ps, int depth)
3620 {
3621         prs_debug(ps, depth, desc, "lsa_io_q_create_secret");
3622         depth++;
3623
3624         if(!prs_align(ps))
3625                 return False;
3626
3627         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3628                 return False;
3629
3630         if(!prs_unistr4 ("secretname", ps, depth, &in->secretname))
3631                 return False;
3632         if(!prs_align(ps))
3633                 return False;
3634
3635         if(!prs_uint32("access", ps, depth, &in->access))
3636                 return False;
3637
3638         return True;
3639 }
3640
3641 /*******************************************************************
3642 ********************************************************************/
3643
3644 BOOL lsa_io_r_create_secret(const char *desc, LSA_R_CREATE_SECRET *out, prs_struct *ps, int depth)
3645 {
3646         prs_debug(ps, depth, desc, "lsa_io_r_create_secret");
3647         depth++;
3648
3649         if(!prs_align(ps))
3650                 return False;
3651
3652         if (!smb_io_pol_hnd("", &out->handle, ps, depth))
3653                 return False;
3654
3655         if(!prs_ntstatus("status", ps, depth, &out->status))
3656                 return False;
3657
3658         return True;
3659 }
3660
3661
3662
3663 /*******************************************************************
3664 ********************************************************************/
3665
3666 static BOOL lsa_io_data_blob( const char *desc, prs_struct *ps, int depth, LSA_DATA_BLOB *blob )
3667 {
3668         prs_debug(ps, depth, desc, "lsa_io_data_blob");
3669         depth++;
3670
3671         if ( !prs_uint32("size", ps, depth, &blob->size) )
3672                 return False;
3673         if ( !prs_uint32("size", ps, depth, &blob->size) )
3674                 return False;
3675
3676         if ( !prs_io_unistr2_p(desc, ps, depth, &blob->data) )
3677                 return False;
3678
3679         return True;
3680 }
3681
3682 /*******************************************************************
3683 ********************************************************************/
3684
3685 BOOL lsa_io_q_set_secret(const char *desc, LSA_Q_SET_SECRET *in, prs_struct *ps, int depth)
3686 {
3687         prs_debug(ps, depth, desc, "lsa_io_q_set_secret");
3688         depth++;
3689
3690         if ( !prs_align(ps) )
3691                 return False;
3692
3693         if ( !smb_io_pol_hnd("", &in->handle, ps, depth) )
3694                 return False;
3695
3696         if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3697                 return False;
3698
3699         if( !prs_align(ps) )
3700                 return False;
3701         if ( !prs_pointer( "old_value", ps, depth, (void*)&in->old_value, sizeof(LSA_DATA_BLOB), (PRS_POINTER_CAST)lsa_io_data_blob ))
3702                 return False;
3703
3704
3705         return True;
3706 }
3707
3708 /*******************************************************************
3709 ********************************************************************/
3710
3711 BOOL lsa_io_r_set_secret(const char *desc, LSA_R_SET_SECRET *out, prs_struct *ps, int depth)
3712 {
3713         prs_debug(ps, depth, desc, "lsa_io_r_set_secret");
3714         depth++;
3715
3716         if(!prs_ntstatus("status", ps, depth, &out->status))
3717                 return False;
3718
3719         return True;
3720 }
3721
3722 /*******************************************************************
3723 ********************************************************************/
3724
3725 BOOL lsa_io_q_delete_object(const char *desc, LSA_Q_DELETE_OBJECT *in, prs_struct *ps, int depth)
3726 {
3727         prs_debug(ps, depth, desc, "lsa_io_q_delete_object");
3728         depth++;
3729
3730         if(!prs_align(ps))
3731                 return False;
3732
3733         if(!smb_io_pol_hnd("", &in->handle, ps, depth))
3734                 return False;
3735
3736         return True;
3737 }
3738
3739 /*******************************************************************
3740 ********************************************************************/
3741
3742 BOOL lsa_io_r_delete_object(const char *desc, LSA_R_DELETE_OBJECT *out, prs_struct *ps, int depth)
3743 {
3744         prs_debug(ps, depth, desc, "lsa_io_r_delete_object");
3745         depth++;
3746
3747         if(!prs_ntstatus("status", ps, depth, &out->status))
3748                 return False;
3749
3750         return True;
3751 }
3752
3753 /*******************************************************************
3754  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3755 ********************************************************************/
3756
3757 void init_q_query_trusted_domain_info(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q, 
3758                                       POLICY_HND *hnd, uint16 info_class) 
3759 {
3760         DEBUG(5, ("init_q_query_trusted_domain_info\n"));
3761         
3762         q->pol = *hnd;
3763         q->info_class = info_class;
3764 }
3765
3766 /*******************************************************************
3767  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3768 ********************************************************************/
3769
3770 void init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q, 
3771                                               POLICY_HND *hnd, uint16 info_class, 
3772                                               const char *dom_name)
3773 {
3774         DEBUG(5, ("init_q_query_trusted_domain_info_by_name\n"));
3775         
3776         q->pol = *hnd;
3777         init_lsa_string(&q->domain_name, dom_name );
3778         q->info_class = info_class;
3779 }
3780
3781 /*******************************************************************
3782  Inits an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3783 ********************************************************************/
3784
3785 void init_q_query_trusted_domain_info_by_sid(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q, 
3786                                              POLICY_HND *hnd, uint16 info_class, 
3787                                              DOM_SID *dom_sid)
3788 {
3789         DEBUG(5, ("init_q_query_trusted_domain_info_by_sid\n"));
3790         
3791         q->pol = *hnd;
3792         init_dom_sid2(&q->dom_sid, dom_sid);
3793         q->info_class = info_class;
3794 }
3795
3796 /*******************************************************************
3797  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO structure.
3798 ********************************************************************/
3799
3800 BOOL lsa_io_q_query_trusted_domain_info(const char *desc, 
3801                                         LSA_Q_QUERY_TRUSTED_DOMAIN_INFO *q_q,
3802                                         prs_struct *ps, int depth)
3803 {
3804         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info");
3805         depth++;
3806
3807         if(!prs_align(ps))
3808                 return False;
3809
3810         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3811                 return False;
3812
3813         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3814                 return False;
3815
3816         return True;
3817 }
3818
3819
3820 /*******************************************************************
3821  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID structure.
3822 ********************************************************************/
3823
3824 BOOL lsa_io_q_query_trusted_domain_info_by_sid(const char *desc, 
3825                                                LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_SID *q_q,
3826                                                prs_struct *ps, int depth)
3827 {
3828         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_sid");
3829         depth++;
3830
3831         if(!prs_align(ps))
3832                 return False;
3833
3834         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3835                 return False;
3836
3837         if(!prs_align(ps))
3838                 return False;
3839
3840         if(!smb_io_dom_sid2("dom_sid", &q_q->dom_sid, ps, depth))
3841                 return False;
3842
3843         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3844                 return False;
3845
3846         return True;
3847 }
3848
3849 /*******************************************************************
3850  Reads or writes an LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME structure.
3851 ********************************************************************/
3852
3853 BOOL lsa_io_q_query_trusted_domain_info_by_name(const char *desc, 
3854                                                 LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q_q,
3855                                                 prs_struct *ps, int depth)
3856 {
3857         prs_debug(ps, depth, desc, "lsa_io_q_query_trusted_domain_info_by_name");
3858         depth++;
3859
3860         if(!prs_align(ps))
3861                 return False;
3862
3863         if(!smb_io_pol_hnd("pol", &q_q->pol, ps, depth))
3864                 return False;
3865
3866         if(!prs_align(ps))
3867                 return False;
3868
3869         if(!smb_io_lsa_string("domain_name", &q_q->domain_name, ps, depth))
3870                 return False;
3871
3872         if(!prs_uint16("info_class", ps, depth, &q_q->info_class))
3873                 return False;
3874
3875         return True;
3876 }
3877
3878 /*******************************************************************
3879 ********************************************************************/
3880
3881 static BOOL smb_io_lsa_data_buf_hdr(const char *desc, LSA_DATA_BUF_HDR *buf_hdr, 
3882                                     prs_struct *ps, int depth)
3883 {
3884         prs_debug(ps, depth, desc, "smb_io_lsa_data_buf_hdr");
3885         depth++;
3886
3887         if(!prs_align(ps))
3888                 return False;
3889
3890         if(!prs_uint32("length", ps, depth, &buf_hdr->length))
3891                 return False;
3892         
3893         if(!prs_uint32("size", ps, depth, &buf_hdr->size))
3894                 return False;
3895
3896         if (!prs_uint32("data_ptr", ps, depth, &buf_hdr->data_ptr))
3897                 return False;
3898
3899         return True;
3900 }
3901
3902 /*******************************************************************
3903 ********************************************************************/
3904
3905 static BOOL smb_io_lsa_data_buf(const char *desc, LSA_DATA_BUF *buf, 
3906                                 prs_struct *ps, int depth, int length, int size)
3907 {
3908         prs_debug(ps, depth, desc, "smb_io_lsa_data_buf");
3909         depth++;
3910
3911         if ( UNMARSHALLING(ps) && length ) {
3912                 if ( !(buf->data = PRS_ALLOC_MEM( ps, uint8, length )) )
3913                         return False;
3914         }
3915
3916         if (!prs_uint32("size", ps, depth, &buf->size))
3917                 return False;
3918
3919         if (!prs_uint32("offset", ps, depth, &buf->offset))
3920                 return False;
3921
3922         if (!prs_uint32("length", ps, depth, &buf->length))
3923                 return False;
3924
3925         if(!prs_uint8s(False, "data", ps, depth, buf->data, length))
3926                 return False;
3927
3928         return True;
3929 }
3930
3931 /*******************************************************************
3932 ********************************************************************/
3933
3934 static BOOL lsa_io_trustdom_query_1(const char *desc, TRUSTED_DOMAIN_INFO_NAME *name, 
3935                                     prs_struct *ps, int depth)
3936 {
3937         if (!smb_io_lsa_string("netbios_name", &name->netbios_name, ps, depth))
3938                 return False;
3939
3940         return True;
3941 }
3942
3943 /*******************************************************************
3944 ********************************************************************/
3945
3946 static BOOL lsa_io_trustdom_query_3(const char *desc, TRUSTED_DOMAIN_INFO_POSIX_OFFSET *posix, 
3947                                     prs_struct *ps, int depth)
3948 {
3949         if(!prs_uint32("posix_offset", ps, depth, &posix->posix_offset))
3950                 return False;
3951
3952         return True;
3953 }
3954
3955 /*******************************************************************
3956 ********************************************************************/
3957
3958 static BOOL lsa_io_trustdom_query_4(const char *desc, TRUSTED_DOMAIN_INFO_PASSWORD *password, 
3959                                     prs_struct *ps, int depth)
3960 {
3961         if(!prs_align(ps))
3962                 return False;
3963         
3964         if(!prs_uint32("ptr_password", ps, depth, &password->ptr_password))
3965                 return False;
3966
3967         if(!prs_uint32("ptr_old_password", ps, depth, &password->ptr_old_password))
3968                 return False;
3969
3970         if (&password->ptr_password) {
3971         
3972                 if (!smb_io_lsa_data_buf_hdr("password_hdr", &password->password_hdr, ps, depth))
3973                         return False;
3974
3975                 if (!smb_io_lsa_data_buf("password", &password->password, ps, depth, 
3976                                         password->password_hdr.length, password->password_hdr.size))
3977                         return False;
3978         }
3979
3980         if (&password->ptr_old_password) {
3981
3982                 if (!smb_io_lsa_data_buf_hdr("old_password_hdr", &password->old_password_hdr, ps, depth))
3983                         return False;
3984
3985                 if (!smb_io_lsa_data_buf("old_password", &password->old_password, ps, depth, 
3986                                         password->old_password_hdr.length, password->old_password_hdr.size))
3987                         return False;
3988         }
3989
3990         return True;
3991 }
3992
3993 /*******************************************************************
3994 ********************************************************************/
3995
3996 static BOOL lsa_io_trustdom_query_6(const char *desc, TRUSTED_DOMAIN_INFO_EX *info_ex, 
3997                                     prs_struct *ps, int depth)
3998 {
3999         uint32 dom_sid_ptr;
4000         
4001         if (!smb_io_unihdr("domain_name_hdr", &info_ex->domain_name.hdr, ps, depth))
4002                 return False;
4003                 
4004         if (!smb_io_unihdr("netbios_name_hdr", &info_ex->netbios_name.hdr, ps, depth))
4005                 return False;
4006
4007         if (!prs_uint32("dom_sid_ptr", ps, depth, &dom_sid_ptr))
4008                 return False;
4009
4010         if (!prs_uint32("trust_direction", ps, depth, &info_ex->trust_direction))
4011                 return False;
4012
4013         if (!prs_uint32("trust_type", ps, depth, &info_ex->trust_type))
4014                 return False;
4015
4016         if (!prs_uint32("trust_attributes", ps, depth, &info_ex->trust_attributes))
4017                 return False;
4018                 
4019         if (!smb_io_unistr2("domain_name_unistring", &info_ex->domain_name.unistring, info_ex->domain_name.hdr.buffer, ps, depth))
4020                 return False;
4021                 
4022         if (!smb_io_unistr2("netbios_name_unistring", &info_ex->netbios_name.unistring, info_ex->netbios_name.hdr.buffer, ps, depth))
4023                 return False;
4024
4025         if (!smb_io_dom_sid2("sid", &info_ex->sid, ps, depth))
4026                 return False;
4027
4028         return True;
4029 }
4030
4031 /*******************************************************************
4032 ********************************************************************/
4033
4034 static BOOL lsa_io_trustdom_query(const char *desc, prs_struct *ps, int depth, LSA_TRUSTED_DOMAIN_INFO *info)
4035 {
4036         prs_debug(ps, depth, desc, "lsa_io_trustdom_query");
4037         depth++;
4038
4039         if(!prs_uint16("info_class", ps, depth, &info->info_class))
4040                 return False;
4041
4042         if(!prs_align(ps))
4043                 return False;
4044
4045         switch (info->info_class) {
4046         case 1:
4047                 if(!lsa_io_trustdom_query_1("name", &info->name, ps, depth))
4048                         return False;
4049                 break;
4050         case 3:
4051                 if(!lsa_io_trustdom_query_3("posix_offset", &info->posix_offset, ps, depth))
4052                         return False;
4053                 break;
4054         case 4:
4055                 if(!lsa_io_trustdom_query_4("password", &info->password, ps, depth))
4056                         return False;
4057                 break;
4058         case 6:
4059                 if(!lsa_io_trustdom_query_6("info_ex", &info->info_ex, ps, depth))
4060                         return False;
4061                 break;
4062         default:
4063                 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4064                 return False;
4065         }
4066
4067         return True;
4068 }
4069
4070 /*******************************************************************
4071  Reads or writes an LSA_R_QUERY_TRUSTED_DOMAIN_INFO structure.
4072 ********************************************************************/
4073
4074 BOOL lsa_io_r_query_trusted_domain_info(const char *desc, 
4075                                         LSA_R_QUERY_TRUSTED_DOMAIN_INFO *r_q, 
4076                                         prs_struct *ps, int depth)
4077 {
4078         if (r_q == NULL)
4079                 return False;
4080
4081         prs_debug(ps, depth, desc, "lsa_io_r_query_trusted_domain_info");
4082         depth++;
4083
4084         if (!prs_pointer("trustdom", ps, depth, (void*)&r_q->info, 
4085                          sizeof(LSA_TRUSTED_DOMAIN_INFO), 
4086                          (PRS_POINTER_CAST)lsa_io_trustdom_query) )
4087                 return False;
4088
4089         if(!prs_align(ps))
4090                 return False;
4091
4092         if(!prs_ntstatus("status", ps, depth, &r_q->status))
4093                 return False;
4094
4095         return True;
4096 }
4097
4098 /*******************************************************************
4099  Inits an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4100 ********************************************************************/
4101
4102 void init_q_query_dom_info(LSA_Q_QUERY_DOM_INFO_POLICY *in, POLICY_HND *hnd, uint16 info_class)
4103 {
4104         DEBUG(5, ("init_q_query_dom_info\n"));
4105
4106         memcpy(&in->pol, hnd, sizeof(in->pol));
4107
4108         in->info_class = info_class;
4109 }
4110
4111 /*******************************************************************
4112  Reads or writes an LSA_Q_QUERY_DOM_INFO_POLICY structure.
4113 ********************************************************************/
4114
4115 BOOL lsa_io_q_query_dom_info(const char *desc, LSA_Q_QUERY_DOM_INFO_POLICY *in, prs_struct *ps, int depth)
4116 {
4117         prs_debug(ps, depth, desc, "lsa_io_q_query_dom_info");
4118         depth++;
4119
4120         if(!prs_align(ps))
4121                 return False;
4122  
4123         if(!smb_io_pol_hnd("pol", &in->pol, ps, depth))
4124                 return False;
4125         
4126         if(!prs_uint16("info_class", ps, depth, &in->info_class))
4127                 return False;
4128
4129         return True;
4130 }
4131
4132 /*******************************************************************
4133  Reads or writes an LSA_R_QUERY_DOM_INFO_POLICY structure.
4134 ********************************************************************/
4135
4136 static BOOL lsa_io_dominfo_query_3(const char *desc, LSA_DOM_INFO_POLICY_KERBEROS *krb_policy, 
4137                                    prs_struct *ps, int depth)
4138 {
4139         if (!prs_align_uint64(ps))
4140                 return False;
4141
4142         if (!prs_align(ps))
4143                 return False;
4144
4145         if (!prs_uint32("enforce_restrictions", ps, depth, &krb_policy->enforce_restrictions))
4146                 return False;
4147
4148         if (!prs_align_uint64(ps))
4149                 return False;
4150
4151         if (!smb_io_nttime("service_tkt_lifetime", ps, depth, &krb_policy->service_tkt_lifetime))
4152                 return False;
4153
4154         if (!prs_align_uint64(ps))
4155                 return False;
4156         
4157         if (!smb_io_nttime("user_tkt_lifetime", ps, depth, &krb_policy->user_tkt_lifetime))
4158                 return False;
4159
4160         if (!prs_align_uint64(ps))
4161                 return False;
4162         
4163         if (!smb_io_nttime("user_tkt_renewaltime", ps, depth, &krb_policy->user_tkt_renewaltime))
4164                 return False;
4165
4166         if (!prs_align_uint64(ps))
4167                 return False;
4168         
4169         if (!smb_io_nttime("clock_skew", ps, depth, &krb_policy->clock_skew))
4170                 return False;
4171
4172         if (!prs_align_uint64(ps))
4173                 return False;
4174         
4175         if (!smb_io_nttime("unknown6", ps, depth, &krb_policy->unknown6))
4176                 return False;
4177
4178         return True;
4179 }
4180
4181 static BOOL lsa_io_dom_info_query(const char *desc, prs_struct *ps, int depth, LSA_DOM_INFO_UNION *info)
4182 {
4183         prs_debug(ps, depth, desc, "lsa_io_dom_info_query");
4184         depth++;
4185
4186         if(!prs_align_uint16(ps))
4187                 return False;
4188
4189         if(!prs_uint16("info_class", ps, depth, &info->info_class))
4190                 return False;
4191
4192         switch (info->info_class) {
4193         case 3: 
4194                 if (!lsa_io_dominfo_query_3("krb_policy", &info->krb_policy, ps, depth))
4195                         return False;
4196                 break;
4197         default:
4198                 DEBUG(0,("unsupported info-level: %d\n", info->info_class));
4199                 return False;
4200                 break;
4201         }
4202
4203         return True;
4204 }
4205
4206
4207 BOOL lsa_io_r_query_dom_info(const char *desc, LSA_R_QUERY_DOM_INFO_POLICY *out,
4208                              prs_struct *ps, int depth)
4209 {
4210         prs_debug(ps, depth, desc, "lsa_io_r_query_dom_info");
4211         depth++;
4212
4213         if (!prs_pointer("dominfo", ps, depth, (void*)&out->info, 
4214                          sizeof(LSA_DOM_INFO_UNION), 
4215                          (PRS_POINTER_CAST)lsa_io_dom_info_query) )
4216                 return False;
4217         
4218         if(!prs_ntstatus("status", ps, depth, &out->status))
4219                 return False;
4220
4221         return True;
4222 }