1/* parser auto-generated by pidl */ 2 3#include "includes.h" 4#include "../librpc/gen_ndr/ndr_schannel.h" 5 6#include "librpc/gen_ndr/ndr_netlogon.h" 7#include "librpc/gen_ndr/ndr_nbt.h" 8_PUBLIC_ enum ndr_err_code ndr_push_netlogon_creds_CredentialState(struct ndr_push *ndr, int ndr_flags, const struct netlogon_creds_CredentialState *r) 9{ 10 { 11 uint32_t _flags_save_STRUCT = ndr->flags; 12 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 13 if (ndr_flags & NDR_SCALARS) { 14 NDR_CHECK(ndr_push_align(ndr, 5)); 15 NDR_CHECK(ndr_push_netr_NegotiateFlags(ndr, NDR_SCALARS, r->negotiate_flags)); 16 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->session_key, 16)); 17 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->sequence)); 18 NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->seed)); 19 NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->client)); 20 NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->server)); 21 NDR_CHECK(ndr_push_netr_SchannelType(ndr, NDR_SCALARS, r->secure_channel_type)); 22 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF8))); 23 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0)); 24 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF8))); 25 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->computer_name, ndr_charset_length(r->computer_name, CH_UTF8), sizeof(uint8_t), CH_UTF8)); 26 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8))); 27 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0)); 28 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8))); 29 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->account_name, ndr_charset_length(r->account_name, CH_UTF8), sizeof(uint8_t), CH_UTF8)); 30 NDR_CHECK(ndr_push_unique_ptr(ndr, r->sid)); 31 NDR_CHECK(ndr_push_trailer_align(ndr, 5)); 32 } 33 if (ndr_flags & NDR_BUFFERS) { 34 if (r->sid) { 35 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, r->sid)); 36 } 37 } 38 ndr->flags = _flags_save_STRUCT; 39 } 40 return NDR_ERR_SUCCESS; 41} 42 43_PUBLIC_ enum ndr_err_code ndr_pull_netlogon_creds_CredentialState(struct ndr_pull *ndr, int ndr_flags, struct netlogon_creds_CredentialState *r) 44{ 45 uint32_t _ptr_sid; 46 TALLOC_CTX *_mem_save_sid_0; 47 { 48 uint32_t _flags_save_STRUCT = ndr->flags; 49 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 50 if (ndr_flags & NDR_SCALARS) { 51 NDR_CHECK(ndr_pull_align(ndr, 5)); 52 NDR_CHECK(ndr_pull_netr_NegotiateFlags(ndr, NDR_SCALARS, &r->negotiate_flags)); 53 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->session_key, 16)); 54 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->sequence)); 55 NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->seed)); 56 NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->client)); 57 NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->server)); 58 NDR_CHECK(ndr_pull_netr_SchannelType(ndr, NDR_SCALARS, &r->secure_channel_type)); 59 NDR_CHECK(ndr_pull_array_size(ndr, &r->computer_name)); 60 NDR_CHECK(ndr_pull_array_length(ndr, &r->computer_name)); 61 if (ndr_get_array_length(ndr, &r->computer_name) > ndr_get_array_size(ndr, &r->computer_name)) { 62 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->computer_name), ndr_get_array_length(ndr, &r->computer_name)); 63 } 64 NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->computer_name), sizeof(uint8_t))); 65 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->computer_name, ndr_get_array_length(ndr, &r->computer_name), sizeof(uint8_t), CH_UTF8)); 66 NDR_CHECK(ndr_pull_array_size(ndr, &r->account_name)); 67 NDR_CHECK(ndr_pull_array_length(ndr, &r->account_name)); 68 if (ndr_get_array_length(ndr, &r->account_name) > ndr_get_array_size(ndr, &r->account_name)) { 69 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->account_name), ndr_get_array_length(ndr, &r->account_name)); 70 } 71 NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t))); 72 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->account_name, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t), CH_UTF8)); 73 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sid)); 74 if (_ptr_sid) { 75 NDR_PULL_ALLOC(ndr, r->sid); 76 } else { 77 r->sid = NULL; 78 } 79 NDR_CHECK(ndr_pull_trailer_align(ndr, 5)); 80 } 81 if (ndr_flags & NDR_BUFFERS) { 82 if (r->sid) { 83 _mem_save_sid_0 = NDR_PULL_GET_MEM_CTX(ndr); 84 NDR_PULL_SET_MEM_CTX(ndr, r->sid, 0); 85 NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS, r->sid)); 86 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sid_0, 0); 87 } 88 } 89 ndr->flags = _flags_save_STRUCT; 90 } 91 return NDR_ERR_SUCCESS; 92} 93 94_PUBLIC_ void ndr_print_netlogon_creds_CredentialState(struct ndr_print *ndr, const char *name, const struct netlogon_creds_CredentialState *r) 95{ 96 ndr_print_struct(ndr, name, "netlogon_creds_CredentialState"); 97 { 98 uint32_t _flags_save_STRUCT = ndr->flags; 99 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 100 ndr->depth++; 101 ndr_print_netr_NegotiateFlags(ndr, "negotiate_flags", r->negotiate_flags); 102 ndr_print_array_uint8(ndr, "session_key", r->session_key, 16); 103 ndr_print_uint32(ndr, "sequence", r->sequence); 104 ndr_print_netr_Credential(ndr, "seed", &r->seed); 105 ndr_print_netr_Credential(ndr, "client", &r->client); 106 ndr_print_netr_Credential(ndr, "server", &r->server); 107 ndr_print_netr_SchannelType(ndr, "secure_channel_type", r->secure_channel_type); 108 ndr_print_string(ndr, "computer_name", r->computer_name); 109 ndr_print_string(ndr, "account_name", r->account_name); 110 ndr_print_ptr(ndr, "sid", r->sid); 111 ndr->depth++; 112 if (r->sid) { 113 ndr_print_dom_sid(ndr, "sid", r->sid); 114 } 115 ndr->depth--; 116 ndr->depth--; 117 ndr->flags = _flags_save_STRUCT; 118 } 119} 120 121static enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_TYPE(struct ndr_push *ndr, int ndr_flags, enum NL_AUTH_MESSAGE_TYPE r) 122{ 123 NDR_CHECK(ndr_push_enum_uint32(ndr, NDR_SCALARS, r)); 124 return NDR_ERR_SUCCESS; 125} 126 127static enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_TYPE(struct ndr_pull *ndr, int ndr_flags, enum NL_AUTH_MESSAGE_TYPE *r) 128{ 129 uint32_t v; 130 NDR_CHECK(ndr_pull_enum_uint32(ndr, NDR_SCALARS, &v)); 131 *r = v; 132 return NDR_ERR_SUCCESS; 133} 134 135_PUBLIC_ void ndr_print_NL_AUTH_MESSAGE_TYPE(struct ndr_print *ndr, const char *name, enum NL_AUTH_MESSAGE_TYPE r) 136{ 137 const char *val = NULL; 138 139 switch (r) { 140 case NL_NEGOTIATE_REQUEST: val = "NL_NEGOTIATE_REQUEST"; break; 141 case NL_NEGOTIATE_RESPONSE: val = "NL_NEGOTIATE_RESPONSE"; break; 142 } 143 ndr_print_enum(ndr, name, "ENUM", val, r); 144} 145 146static enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_FLAGS(struct ndr_push *ndr, int ndr_flags, uint32_t r) 147{ 148 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r)); 149 return NDR_ERR_SUCCESS; 150} 151 152static enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_FLAGS(struct ndr_pull *ndr, int ndr_flags, uint32_t *r) 153{ 154 uint32_t v; 155 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &v)); 156 *r = v; 157 return NDR_ERR_SUCCESS; 158} 159 160_PUBLIC_ void ndr_print_NL_AUTH_MESSAGE_FLAGS(struct ndr_print *ndr, const char *name, uint32_t r) 161{ 162 ndr_print_uint32(ndr, name, r); 163 ndr->depth++; 164 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_OEM_NETBIOS_DOMAIN_NAME", NL_FLAG_OEM_NETBIOS_DOMAIN_NAME, r); 165 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_OEM_NETBIOS_COMPUTER_NAME", NL_FLAG_OEM_NETBIOS_COMPUTER_NAME, r); 166 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_DNS_DOMAIN_NAME", NL_FLAG_UTF8_DNS_DOMAIN_NAME, r); 167 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_DNS_HOST_NAME", NL_FLAG_UTF8_DNS_HOST_NAME, r); 168 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME", NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME, r); 169 ndr->depth--; 170} 171 172_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_BUFFER(struct ndr_push *ndr, int ndr_flags, const union NL_AUTH_MESSAGE_BUFFER *r) 173{ 174 if (ndr_flags & NDR_SCALARS) { 175 int level = ndr_push_get_switch_value(ndr, r); 176 NDR_CHECK(ndr_push_union_align(ndr, 4)); 177 switch (level) { 178 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: { 179 { 180 uint32_t _flags_save_string = ndr->flags; 181 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM); 182 NDR_CHECK(ndr_push_string(ndr, NDR_SCALARS, r->a)); 183 ndr->flags = _flags_save_string; 184 } 185 break; } 186 187 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: { 188 { 189 uint32_t _flags_save_string = ndr->flags; 190 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM); 191 NDR_CHECK(ndr_push_string(ndr, NDR_SCALARS, r->a)); 192 ndr->flags = _flags_save_string; 193 } 194 break; } 195 196 case NL_FLAG_UTF8_DNS_DOMAIN_NAME: { 197 NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u)); 198 break; } 199 200 case NL_FLAG_UTF8_DNS_HOST_NAME: { 201 NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u)); 202 break; } 203 204 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: { 205 NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u)); 206 break; } 207 208 default: { 209 break; } 210 211 } 212 } 213 if (ndr_flags & NDR_BUFFERS) { 214 int level = ndr_push_get_switch_value(ndr, r); 215 switch (level) { 216 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: 217 break; 218 219 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: 220 break; 221 222 case NL_FLAG_UTF8_DNS_DOMAIN_NAME: 223 break; 224 225 case NL_FLAG_UTF8_DNS_HOST_NAME: 226 break; 227 228 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: 229 break; 230 231 default: 232 break; 233 234 } 235 } 236 return NDR_ERR_SUCCESS; 237} 238 239_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_BUFFER(struct ndr_pull *ndr, int ndr_flags, union NL_AUTH_MESSAGE_BUFFER *r) 240{ 241 int level; 242 level = ndr_pull_get_switch_value(ndr, r); 243 if (ndr_flags & NDR_SCALARS) { 244 NDR_CHECK(ndr_pull_union_align(ndr, 4)); 245 switch (level) { 246 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: { 247 { 248 uint32_t _flags_save_string = ndr->flags; 249 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM); 250 NDR_CHECK(ndr_pull_string(ndr, NDR_SCALARS, &r->a)); 251 ndr->flags = _flags_save_string; 252 } 253 break; } 254 255 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: { 256 { 257 uint32_t _flags_save_string = ndr->flags; 258 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM); 259 NDR_CHECK(ndr_pull_string(ndr, NDR_SCALARS, &r->a)); 260 ndr->flags = _flags_save_string; 261 } 262 break; } 263 264 case NL_FLAG_UTF8_DNS_DOMAIN_NAME: { 265 NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u)); 266 break; } 267 268 case NL_FLAG_UTF8_DNS_HOST_NAME: { 269 NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u)); 270 break; } 271 272 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: { 273 NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u)); 274 break; } 275 276 default: { 277 break; } 278 279 } 280 } 281 if (ndr_flags & NDR_BUFFERS) { 282 switch (level) { 283 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: 284 break; 285 286 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: 287 break; 288 289 case NL_FLAG_UTF8_DNS_DOMAIN_NAME: 290 break; 291 292 case NL_FLAG_UTF8_DNS_HOST_NAME: 293 break; 294 295 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: 296 break; 297 298 default: 299 break; 300 301 } 302 } 303 return NDR_ERR_SUCCESS; 304} 305 306_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(struct ndr_push *ndr, int ndr_flags, const union NL_AUTH_MESSAGE_BUFFER_REPLY *r) 307{ 308 if (ndr_flags & NDR_SCALARS) { 309 int level = ndr_push_get_switch_value(ndr, r); 310 NDR_CHECK(ndr_push_union_align(ndr, 4)); 311 switch (level) { 312 case NL_NEGOTIATE_RESPONSE: { 313 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->dummy)); 314 break; } 315 316 default: { 317 break; } 318 319 } 320 } 321 if (ndr_flags & NDR_BUFFERS) { 322 int level = ndr_push_get_switch_value(ndr, r); 323 switch (level) { 324 case NL_NEGOTIATE_RESPONSE: 325 break; 326 327 default: 328 break; 329 330 } 331 } 332 return NDR_ERR_SUCCESS; 333} 334 335_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(struct ndr_pull *ndr, int ndr_flags, union NL_AUTH_MESSAGE_BUFFER_REPLY *r) 336{ 337 int level; 338 level = ndr_pull_get_switch_value(ndr, r); 339 if (ndr_flags & NDR_SCALARS) { 340 NDR_CHECK(ndr_pull_union_align(ndr, 4)); 341 switch (level) { 342 case NL_NEGOTIATE_RESPONSE: { 343 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->dummy)); 344 break; } 345 346 default: { 347 break; } 348 349 } 350 } 351 if (ndr_flags & NDR_BUFFERS) { 352 switch (level) { 353 case NL_NEGOTIATE_RESPONSE: 354 break; 355 356 default: 357 break; 358 359 } 360 } 361 return NDR_ERR_SUCCESS; 362} 363 364_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_MESSAGE *r) 365{ 366 { 367 uint32_t _flags_save_STRUCT = ndr->flags; 368 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 369 if (ndr_flags & NDR_SCALARS) { 370 NDR_CHECK(ndr_push_align(ndr, 4)); 371 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_TYPE(ndr, NDR_SCALARS, r->MessageType)); 372 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_FLAGS(ndr, NDR_SCALARS, r->Flags)); 373 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME)); 374 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_domain)); 375 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME)); 376 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_computer)); 377 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME)); 378 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_domain)); 379 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME)); 380 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_host)); 381 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME)); 382 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_netbios_computer)); 383 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE)); 384 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_SCALARS, &r->Buffer)); 385 NDR_CHECK(ndr_push_trailer_align(ndr, 4)); 386 } 387 if (ndr_flags & NDR_BUFFERS) { 388 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_domain)); 389 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_computer)); 390 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_domain)); 391 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_host)); 392 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_netbios_computer)); 393 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_BUFFERS, &r->Buffer)); 394 } 395 ndr->flags = _flags_save_STRUCT; 396 } 397 return NDR_ERR_SUCCESS; 398} 399 400_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_MESSAGE *r) 401{ 402 { 403 uint32_t _flags_save_STRUCT = ndr->flags; 404 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 405 if (ndr_flags & NDR_SCALARS) { 406 NDR_CHECK(ndr_pull_align(ndr, 4)); 407 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_TYPE(ndr, NDR_SCALARS, &r->MessageType)); 408 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_FLAGS(ndr, NDR_SCALARS, &r->Flags)); 409 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME)); 410 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_domain)); 411 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME)); 412 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_computer)); 413 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME)); 414 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_domain)); 415 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME)); 416 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_host)); 417 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME)); 418 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_netbios_computer)); 419 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE)); 420 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_SCALARS, &r->Buffer)); 421 NDR_CHECK(ndr_pull_trailer_align(ndr, 4)); 422 } 423 if (ndr_flags & NDR_BUFFERS) { 424 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_domain)); 425 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_computer)); 426 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_domain)); 427 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_host)); 428 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_netbios_computer)); 429 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_BUFFERS, &r->Buffer)); 430 } 431 ndr->flags = _flags_save_STRUCT; 432 } 433 return NDR_ERR_SUCCESS; 434} 435 436_PUBLIC_ void ndr_print_NL_AUTH_MESSAGE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_MESSAGE *r) 437{ 438 ndr_print_struct(ndr, name, "NL_AUTH_MESSAGE"); 439 { 440 uint32_t _flags_save_STRUCT = ndr->flags; 441 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 442 ndr->depth++; 443 ndr_print_NL_AUTH_MESSAGE_TYPE(ndr, "MessageType", r->MessageType); 444 ndr_print_NL_AUTH_MESSAGE_FLAGS(ndr, "Flags", r->Flags); 445 ndr_print_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME); 446 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "oem_netbios_domain", &r->oem_netbios_domain); 447 ndr_print_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME); 448 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "oem_netbios_computer", &r->oem_netbios_computer); 449 ndr_print_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME); 450 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_dns_domain", &r->utf8_dns_domain); 451 ndr_print_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME); 452 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_dns_host", &r->utf8_dns_host); 453 ndr_print_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME); 454 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_netbios_computer", &r->utf8_netbios_computer); 455 ndr_print_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE); 456 ndr_print_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, "Buffer", &r->Buffer); 457 ndr->depth--; 458 ndr->flags = _flags_save_STRUCT; 459 } 460} 461 462static enum ndr_err_code ndr_push_NL_SIGNATURE_ALGORITHM(struct ndr_push *ndr, int ndr_flags, enum NL_SIGNATURE_ALGORITHM r) 463{ 464 NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r)); 465 return NDR_ERR_SUCCESS; 466} 467 468static enum ndr_err_code ndr_pull_NL_SIGNATURE_ALGORITHM(struct ndr_pull *ndr, int ndr_flags, enum NL_SIGNATURE_ALGORITHM *r) 469{ 470 uint16_t v; 471 NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v)); 472 *r = v; 473 return NDR_ERR_SUCCESS; 474} 475 476_PUBLIC_ void ndr_print_NL_SIGNATURE_ALGORITHM(struct ndr_print *ndr, const char *name, enum NL_SIGNATURE_ALGORITHM r) 477{ 478 const char *val = NULL; 479 480 switch (r) { 481 case NL_SIGN_HMAC_SHA256: val = "NL_SIGN_HMAC_SHA256"; break; 482 case NL_SIGN_HMAC_MD5: val = "NL_SIGN_HMAC_MD5"; break; 483 } 484 ndr_print_enum(ndr, name, "ENUM", val, r); 485} 486 487static enum ndr_err_code ndr_push_NL_SEAL_ALGORITHM(struct ndr_push *ndr, int ndr_flags, enum NL_SEAL_ALGORITHM r) 488{ 489 NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r)); 490 return NDR_ERR_SUCCESS; 491} 492 493static enum ndr_err_code ndr_pull_NL_SEAL_ALGORITHM(struct ndr_pull *ndr, int ndr_flags, enum NL_SEAL_ALGORITHM *r) 494{ 495 uint16_t v; 496 NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v)); 497 *r = v; 498 return NDR_ERR_SUCCESS; 499} 500 501_PUBLIC_ void ndr_print_NL_SEAL_ALGORITHM(struct ndr_print *ndr, const char *name, enum NL_SEAL_ALGORITHM r) 502{ 503 const char *val = NULL; 504 505 switch (r) { 506 case NL_SEAL_AES128: val = "NL_SEAL_AES128"; break; 507 case NL_SEAL_RC4: val = "NL_SEAL_RC4"; break; 508 case NL_SEAL_NONE: val = "NL_SEAL_NONE"; break; 509 } 510 ndr_print_enum(ndr, name, "ENUM", val, r); 511} 512 513_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_SIGNATURE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_SIGNATURE *r) 514{ 515 { 516 uint32_t _flags_save_STRUCT = ndr->flags; 517 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 518 if (ndr_flags & NDR_SCALARS) { 519 NDR_CHECK(ndr_push_align(ndr, 3)); 520 NDR_CHECK(ndr_push_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, NL_SIGN_HMAC_MD5)); 521 NDR_CHECK(ndr_push_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, r->SealAlgorithm)); 522 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Pad)); 523 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Flags)); 524 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8)); 525 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Checksum, 8)); 526 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8)); 527 NDR_CHECK(ndr_push_trailer_align(ndr, 3)); 528 } 529 if (ndr_flags & NDR_BUFFERS) { 530 } 531 ndr->flags = _flags_save_STRUCT; 532 } 533 return NDR_ERR_SUCCESS; 534} 535 536_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_SIGNATURE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_SIGNATURE *r) 537{ 538 { 539 uint32_t _flags_save_STRUCT = ndr->flags; 540 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 541 if (ndr_flags & NDR_SCALARS) { 542 NDR_CHECK(ndr_pull_align(ndr, 3)); 543 NDR_CHECK(ndr_pull_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, &r->SignatureAlgorithm)); 544 NDR_CHECK(ndr_pull_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, &r->SealAlgorithm)); 545 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Pad)); 546 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Flags)); 547 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8)); 548 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Checksum, 8)); 549 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8)); 550 NDR_CHECK(ndr_pull_trailer_align(ndr, 3)); 551 } 552 if (ndr_flags & NDR_BUFFERS) { 553 } 554 ndr->flags = _flags_save_STRUCT; 555 } 556 return NDR_ERR_SUCCESS; 557} 558 559_PUBLIC_ void ndr_print_NL_AUTH_SIGNATURE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_SIGNATURE *r) 560{ 561 ndr_print_struct(ndr, name, "NL_AUTH_SIGNATURE"); 562 { 563 uint32_t _flags_save_STRUCT = ndr->flags; 564 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 565 ndr->depth++; 566 ndr_print_NL_SIGNATURE_ALGORITHM(ndr, "SignatureAlgorithm", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NL_SIGN_HMAC_MD5:r->SignatureAlgorithm); 567 ndr_print_NL_SEAL_ALGORITHM(ndr, "SealAlgorithm", r->SealAlgorithm); 568 ndr_print_uint16(ndr, "Pad", r->Pad); 569 ndr_print_uint16(ndr, "Flags", r->Flags); 570 ndr_print_array_uint8(ndr, "SequenceNumber", r->SequenceNumber, 8); 571 ndr_print_array_uint8(ndr, "Checksum", r->Checksum, 8); 572 ndr_print_array_uint8(ndr, "Confounder", r->Confounder, 8); 573 ndr->depth--; 574 ndr->flags = _flags_save_STRUCT; 575 } 576} 577 578_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_SHA2_SIGNATURE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_SHA2_SIGNATURE *r) 579{ 580 { 581 uint32_t _flags_save_STRUCT = ndr->flags; 582 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 583 if (ndr_flags & NDR_SCALARS) { 584 NDR_CHECK(ndr_push_align(ndr, 3)); 585 NDR_CHECK(ndr_push_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, NL_SIGN_HMAC_SHA256)); 586 NDR_CHECK(ndr_push_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, r->SealAlgorithm)); 587 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Pad)); 588 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Flags)); 589 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8)); 590 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Checksum, 32)); 591 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8)); 592 NDR_CHECK(ndr_push_trailer_align(ndr, 3)); 593 } 594 if (ndr_flags & NDR_BUFFERS) { 595 } 596 ndr->flags = _flags_save_STRUCT; 597 } 598 return NDR_ERR_SUCCESS; 599} 600 601_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_SHA2_SIGNATURE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_SHA2_SIGNATURE *r) 602{ 603 { 604 uint32_t _flags_save_STRUCT = ndr->flags; 605 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 606 if (ndr_flags & NDR_SCALARS) { 607 NDR_CHECK(ndr_pull_align(ndr, 3)); 608 NDR_CHECK(ndr_pull_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, &r->SignatureAlgorithm)); 609 NDR_CHECK(ndr_pull_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, &r->SealAlgorithm)); 610 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Pad)); 611 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Flags)); 612 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8)); 613 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Checksum, 32)); 614 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8)); 615 NDR_CHECK(ndr_pull_trailer_align(ndr, 3)); 616 } 617 if (ndr_flags & NDR_BUFFERS) { 618 } 619 ndr->flags = _flags_save_STRUCT; 620 } 621 return NDR_ERR_SUCCESS; 622} 623 624_PUBLIC_ void ndr_print_NL_AUTH_SHA2_SIGNATURE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_SHA2_SIGNATURE *r) 625{ 626 ndr_print_struct(ndr, name, "NL_AUTH_SHA2_SIGNATURE"); 627 { 628 uint32_t _flags_save_STRUCT = ndr->flags; 629 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX); 630 ndr->depth++; 631 ndr_print_NL_SIGNATURE_ALGORITHM(ndr, "SignatureAlgorithm", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NL_SIGN_HMAC_SHA256:r->SignatureAlgorithm); 632 ndr_print_NL_SEAL_ALGORITHM(ndr, "SealAlgorithm", r->SealAlgorithm); 633 ndr_print_uint16(ndr, "Pad", r->Pad); 634 ndr_print_uint16(ndr, "Flags", r->Flags); 635 ndr_print_array_uint8(ndr, "SequenceNumber", r->SequenceNumber, 8); 636 ndr_print_array_uint8(ndr, "Checksum", r->Checksum, 32); 637 ndr_print_array_uint8(ndr, "Confounder", r->Confounder, 8); 638 ndr->depth--; 639 ndr->flags = _flags_save_STRUCT; 640 } 641} 642 643