BOOL sec_io_ace(const char *desc, SEC_ACE *psa, prs_struct *ps, int depth) { uint32 old_offset; uint32 offset_ace_size; if (psa == NULL) return False; prs_debug(ps, depth, desc, "sec_io_ace"); depth++; old_offset = prs_offset(ps); if(!prs_uint8("type ", ps, depth, &psa->type)) return False; if(!prs_uint8("flags", ps, depth, &psa->flags)) return False; if(!prs_uint16_pre("size ", ps, depth, &psa->size, &offset_ace_size)) return False; if(!sec_io_access("info ", &psa->info, ps, depth)) return False; /* check whether object access is present */ if (!sec_ace_object(psa->type)) { if (!smb_io_dom_sid("trustee ", &psa->trustee , ps, depth)) return False; } else { if (!prs_uint32("obj_flags", ps, depth, &psa->obj_flags)) return False; if (psa->obj_flags & SEC_ACE_OBJECT_PRESENT) if (!smb_io_uuid("obj_guid", &psa->obj_guid, ps,depth)) return False; if (psa->obj_flags & SEC_ACE_OBJECT_INHERITED_PRESENT) if (!smb_io_uuid("inh_guid", &psa->inh_guid, ps,depth)) return False; if(!smb_io_dom_sid("trustee ", &psa->trustee , ps, depth)) return False; } if(!prs_uint16_post("size ", ps, depth, &psa->size, offset_ace_size, old_offset)) return False; return True; }
/******************************************************************* reads or writes a structure. ********************************************************************/ char* samr_io_q_open_secret(BOOL io, SAMR_Q_OPEN_SECRET *q_u, char *q, char *base, int align, int depth) { if (q_u == NULL) return NULL; DEBUG(5,("%s%04x samr_io_q_open_secret\n", tab_depth(depth), PTR_DIFF(q, base))); depth++; q = align_offset(q, base, align); q = smb_io_pol_hnd(io, &(q_u->pol), q, base, align, depth); q = align_offset(q, base, align); DBG_RW_IVAL("unknown_0", depth, base, io, q, q_u->unknown_0); q += 4; q = smb_io_dom_sid(io, &(q_u->dom_sid), q, base, align, depth); q = align_offset(q, base, align); return q; }
BOOL smb_io_dom_sid2(const char *desc, DOM_SID2 *sid, prs_struct *ps, int depth) { if (sid == NULL) return False; prs_debug(ps, depth, desc, "smb_io_dom_sid2"); depth++; if(!prs_align(ps)) return False; if(!prs_uint32("num_auths", ps, depth, &sid->num_auths)) return False; if(!smb_io_dom_sid("sid", &sid->sid, ps, depth)) return False; return True; }
BOOL sec_io_desc(const char *desc, SEC_DESC **ppsd, prs_struct *ps, int depth) { uint32 old_offset; uint32 max_offset = 0; /* after we're done, move offset to end */ uint32 tmp_offset = 0; SEC_DESC *psd; if (ppsd == NULL) return False; psd = *ppsd; if (psd == NULL) { if(UNMARSHALLING(ps)) { if((psd = (SEC_DESC *)prs_alloc_mem(ps,sizeof(SEC_DESC))) == NULL) return False; *ppsd = psd; } else { /* Marshalling - just ignore. */ return True; } } prs_debug(ps, depth, desc, "sec_io_desc"); depth++; #if 0 /* * if alignment is needed, should be done by the the * caller. Not here. This caused me problems when marshalling * printer info into a buffer. --jerry */ if(!prs_align(ps)) return False; #endif /* start of security descriptor stored for back-calc offset purposes */ old_offset = prs_offset(ps); if(!prs_uint16("revision ", ps, depth, &psd->revision)) return False; if(!prs_uint16("type ", ps, depth, &psd->type)) return False; if(!prs_uint32("off_owner_sid", ps, depth, &psd->off_owner_sid)) return False; if(!prs_uint32("off_grp_sid ", ps, depth, &psd->off_grp_sid)) return False; if(!prs_uint32("off_sacl ", ps, depth, &psd->off_sacl)) return False; if(!prs_uint32("off_dacl ", ps, depth, &psd->off_dacl)) return False; max_offset = MAX(max_offset, prs_offset(ps)); if (psd->off_owner_sid != 0) { tmp_offset = prs_offset(ps); if(!prs_set_offset(ps, old_offset + psd->off_owner_sid)) return False; if (UNMARSHALLING(ps)) { /* reading */ if((psd->owner_sid = (DOM_SID *)prs_alloc_mem(ps,sizeof(*psd->owner_sid))) == NULL) return False; } if(!smb_io_dom_sid("owner_sid ", psd->owner_sid , ps, depth)) return False; max_offset = MAX(max_offset, prs_offset(ps)); if (!prs_set_offset(ps,tmp_offset)) return False; } if (psd->off_grp_sid != 0) { tmp_offset = prs_offset(ps); if(!prs_set_offset(ps, old_offset + psd->off_grp_sid)) return False; if (UNMARSHALLING(ps)) { /* reading */ if((psd->grp_sid = (DOM_SID *)prs_alloc_mem(ps,sizeof(*psd->grp_sid))) == NULL) return False; } if(!smb_io_dom_sid("grp_sid", psd->grp_sid, ps, depth)) return False; max_offset = MAX(max_offset, prs_offset(ps)); if (!prs_set_offset(ps,tmp_offset)) return False; } if ((psd->type & SEC_DESC_SACL_PRESENT) && psd->off_sacl) { tmp_offset = prs_offset(ps); if(!prs_set_offset(ps, old_offset + psd->off_sacl)) return False; if(!sec_io_acl("sacl", &psd->sacl, ps, depth)) return False; max_offset = MAX(max_offset, prs_offset(ps)); if (!prs_set_offset(ps,tmp_offset)) return False; } if ((psd->type & SEC_DESC_DACL_PRESENT) && psd->off_dacl != 0) { tmp_offset = prs_offset(ps); if(!prs_set_offset(ps, old_offset + psd->off_dacl)) return False; if(!sec_io_acl("dacl", &psd->dacl, ps, depth)) return False; max_offset = MAX(max_offset, prs_offset(ps)); if (!prs_set_offset(ps,tmp_offset)) return False; } if(!prs_set_offset(ps, max_offset)) return False; return True; }