source: vendor/current/source3/librpc/gen_ndr/ndr_schannel.c@ 740

Last change on this file since 740 was 740, checked in by Silvan Scherrer, 12 years ago

Samba Server: update vendor to 3.6.0

File size: 25.8 KB
Line 
1/* parser auto-generated by pidl */
2
3#include "includes.h"
4#include "librpc/gen_ndr/ndr_schannel.h"
5
6#include "librpc/gen_ndr/ndr_netlogon.h"
7#include "librpc/gen_ndr/ndr_nbt.h"
8_PUBLIC_ enum ndr_err_code ndr_push_netlogon_creds_CredentialState(struct ndr_push *ndr, int ndr_flags, const struct netlogon_creds_CredentialState *r)
9{
10 {
11 uint32_t _flags_save_STRUCT = ndr->flags;
12 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
13 if (ndr_flags & NDR_SCALARS) {
14 NDR_CHECK(ndr_push_align(ndr, 5));
15 NDR_CHECK(ndr_push_netr_NegotiateFlags(ndr, NDR_SCALARS, r->negotiate_flags));
16 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->session_key, 16));
17 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->sequence));
18 NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->seed));
19 NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->client));
20 NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->server));
21 NDR_CHECK(ndr_push_netr_SchannelType(ndr, NDR_SCALARS, r->secure_channel_type));
22 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF8)));
23 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
24 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF8)));
25 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->computer_name, ndr_charset_length(r->computer_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
26 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
27 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
28 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
29 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->account_name, ndr_charset_length(r->account_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
30 NDR_CHECK(ndr_push_unique_ptr(ndr, r->sid));
31 NDR_CHECK(ndr_push_trailer_align(ndr, 5));
32 }
33 if (ndr_flags & NDR_BUFFERS) {
34 if (r->sid) {
35 NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, r->sid));
36 }
37 }
38 ndr->flags = _flags_save_STRUCT;
39 }
40 return NDR_ERR_SUCCESS;
41}
42
43_PUBLIC_ enum ndr_err_code ndr_pull_netlogon_creds_CredentialState(struct ndr_pull *ndr, int ndr_flags, struct netlogon_creds_CredentialState *r)
44{
45 uint32_t _ptr_sid;
46 TALLOC_CTX *_mem_save_sid_0;
47 {
48 uint32_t _flags_save_STRUCT = ndr->flags;
49 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
50 if (ndr_flags & NDR_SCALARS) {
51 NDR_CHECK(ndr_pull_align(ndr, 5));
52 NDR_CHECK(ndr_pull_netr_NegotiateFlags(ndr, NDR_SCALARS, &r->negotiate_flags));
53 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->session_key, 16));
54 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->sequence));
55 NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->seed));
56 NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->client));
57 NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->server));
58 NDR_CHECK(ndr_pull_netr_SchannelType(ndr, NDR_SCALARS, &r->secure_channel_type));
59 NDR_CHECK(ndr_pull_array_size(ndr, &r->computer_name));
60 NDR_CHECK(ndr_pull_array_length(ndr, &r->computer_name));
61 if (ndr_get_array_length(ndr, &r->computer_name) > ndr_get_array_size(ndr, &r->computer_name)) {
62 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->computer_name), ndr_get_array_length(ndr, &r->computer_name));
63 }
64 NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->computer_name), sizeof(uint8_t)));
65 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->computer_name, ndr_get_array_length(ndr, &r->computer_name), sizeof(uint8_t), CH_UTF8));
66 NDR_CHECK(ndr_pull_array_size(ndr, &r->account_name));
67 NDR_CHECK(ndr_pull_array_length(ndr, &r->account_name));
68 if (ndr_get_array_length(ndr, &r->account_name) > ndr_get_array_size(ndr, &r->account_name)) {
69 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->account_name), ndr_get_array_length(ndr, &r->account_name));
70 }
71 NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t)));
72 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->account_name, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t), CH_UTF8));
73 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sid));
74 if (_ptr_sid) {
75 NDR_PULL_ALLOC(ndr, r->sid);
76 } else {
77 r->sid = NULL;
78 }
79 NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
80 }
81 if (ndr_flags & NDR_BUFFERS) {
82 if (r->sid) {
83 _mem_save_sid_0 = NDR_PULL_GET_MEM_CTX(ndr);
84 NDR_PULL_SET_MEM_CTX(ndr, r->sid, 0);
85 NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS, r->sid));
86 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sid_0, 0);
87 }
88 }
89 ndr->flags = _flags_save_STRUCT;
90 }
91 return NDR_ERR_SUCCESS;
92}
93
94_PUBLIC_ void ndr_print_netlogon_creds_CredentialState(struct ndr_print *ndr, const char *name, const struct netlogon_creds_CredentialState *r)
95{
96 ndr_print_struct(ndr, name, "netlogon_creds_CredentialState");
97 if (r == NULL) { ndr_print_null(ndr); return; }
98 {
99 uint32_t _flags_save_STRUCT = ndr->flags;
100 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
101 ndr->depth++;
102 ndr_print_netr_NegotiateFlags(ndr, "negotiate_flags", r->negotiate_flags);
103 ndr_print_array_uint8(ndr, "session_key", r->session_key, 16);
104 ndr_print_uint32(ndr, "sequence", r->sequence);
105 ndr_print_netr_Credential(ndr, "seed", &r->seed);
106 ndr_print_netr_Credential(ndr, "client", &r->client);
107 ndr_print_netr_Credential(ndr, "server", &r->server);
108 ndr_print_netr_SchannelType(ndr, "secure_channel_type", r->secure_channel_type);
109 ndr_print_string(ndr, "computer_name", r->computer_name);
110 ndr_print_string(ndr, "account_name", r->account_name);
111 ndr_print_ptr(ndr, "sid", r->sid);
112 ndr->depth++;
113 if (r->sid) {
114 ndr_print_dom_sid(ndr, "sid", r->sid);
115 }
116 ndr->depth--;
117 ndr->depth--;
118 ndr->flags = _flags_save_STRUCT;
119 }
120}
121
122static enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_TYPE(struct ndr_push *ndr, int ndr_flags, enum NL_AUTH_MESSAGE_TYPE r)
123{
124 NDR_CHECK(ndr_push_enum_uint32(ndr, NDR_SCALARS, r));
125 return NDR_ERR_SUCCESS;
126}
127
128static enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_TYPE(struct ndr_pull *ndr, int ndr_flags, enum NL_AUTH_MESSAGE_TYPE *r)
129{
130 uint32_t v;
131 NDR_CHECK(ndr_pull_enum_uint32(ndr, NDR_SCALARS, &v));
132 *r = v;
133 return NDR_ERR_SUCCESS;
134}
135
136_PUBLIC_ void ndr_print_NL_AUTH_MESSAGE_TYPE(struct ndr_print *ndr, const char *name, enum NL_AUTH_MESSAGE_TYPE r)
137{
138 const char *val = NULL;
139
140 switch (r) {
141 case NL_NEGOTIATE_REQUEST: val = "NL_NEGOTIATE_REQUEST"; break;
142 case NL_NEGOTIATE_RESPONSE: val = "NL_NEGOTIATE_RESPONSE"; break;
143 }
144 ndr_print_enum(ndr, name, "ENUM", val, r);
145}
146
147static enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_FLAGS(struct ndr_push *ndr, int ndr_flags, uint32_t r)
148{
149 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r));
150 return NDR_ERR_SUCCESS;
151}
152
153static enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_FLAGS(struct ndr_pull *ndr, int ndr_flags, uint32_t *r)
154{
155 uint32_t v;
156 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &v));
157 *r = v;
158 return NDR_ERR_SUCCESS;
159}
160
161_PUBLIC_ void ndr_print_NL_AUTH_MESSAGE_FLAGS(struct ndr_print *ndr, const char *name, uint32_t r)
162{
163 ndr_print_uint32(ndr, name, r);
164 ndr->depth++;
165 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_OEM_NETBIOS_DOMAIN_NAME", NL_FLAG_OEM_NETBIOS_DOMAIN_NAME, r);
166 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_OEM_NETBIOS_COMPUTER_NAME", NL_FLAG_OEM_NETBIOS_COMPUTER_NAME, r);
167 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_DNS_DOMAIN_NAME", NL_FLAG_UTF8_DNS_DOMAIN_NAME, r);
168 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_DNS_HOST_NAME", NL_FLAG_UTF8_DNS_HOST_NAME, r);
169 ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME", NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME, r);
170 ndr->depth--;
171}
172
173_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_BUFFER(struct ndr_push *ndr, int ndr_flags, const union NL_AUTH_MESSAGE_BUFFER *r)
174{
175 if (ndr_flags & NDR_SCALARS) {
176 uint32_t level = ndr_push_get_switch_value(ndr, r);
177 NDR_CHECK(ndr_push_union_align(ndr, 4));
178 switch (level) {
179 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: {
180 {
181 uint32_t _flags_save_string = ndr->flags;
182 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
183 NDR_CHECK(ndr_push_string(ndr, NDR_SCALARS, r->a));
184 ndr->flags = _flags_save_string;
185 }
186 break; }
187
188 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: {
189 {
190 uint32_t _flags_save_string = ndr->flags;
191 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
192 NDR_CHECK(ndr_push_string(ndr, NDR_SCALARS, r->a));
193 ndr->flags = _flags_save_string;
194 }
195 break; }
196
197 case NL_FLAG_UTF8_DNS_DOMAIN_NAME: {
198 NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u));
199 break; }
200
201 case NL_FLAG_UTF8_DNS_HOST_NAME: {
202 NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u));
203 break; }
204
205 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: {
206 NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u));
207 break; }
208
209 default: {
210 break; }
211
212 }
213 }
214 if (ndr_flags & NDR_BUFFERS) {
215 uint32_t level = ndr_push_get_switch_value(ndr, r);
216 switch (level) {
217 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME:
218 break;
219
220 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME:
221 break;
222
223 case NL_FLAG_UTF8_DNS_DOMAIN_NAME:
224 break;
225
226 case NL_FLAG_UTF8_DNS_HOST_NAME:
227 break;
228
229 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME:
230 break;
231
232 default:
233 break;
234
235 }
236 }
237 return NDR_ERR_SUCCESS;
238}
239
240_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_BUFFER(struct ndr_pull *ndr, int ndr_flags, union NL_AUTH_MESSAGE_BUFFER *r)
241{
242 uint32_t level;
243 level = ndr_pull_get_switch_value(ndr, r);
244 if (ndr_flags & NDR_SCALARS) {
245 NDR_CHECK(ndr_pull_union_align(ndr, 4));
246 switch (level) {
247 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: {
248 {
249 uint32_t _flags_save_string = ndr->flags;
250 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
251 NDR_CHECK(ndr_pull_string(ndr, NDR_SCALARS, &r->a));
252 ndr->flags = _flags_save_string;
253 }
254 break; }
255
256 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: {
257 {
258 uint32_t _flags_save_string = ndr->flags;
259 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
260 NDR_CHECK(ndr_pull_string(ndr, NDR_SCALARS, &r->a));
261 ndr->flags = _flags_save_string;
262 }
263 break; }
264
265 case NL_FLAG_UTF8_DNS_DOMAIN_NAME: {
266 NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u));
267 break; }
268
269 case NL_FLAG_UTF8_DNS_HOST_NAME: {
270 NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u));
271 break; }
272
273 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: {
274 NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u));
275 break; }
276
277 default: {
278 break; }
279
280 }
281 }
282 if (ndr_flags & NDR_BUFFERS) {
283 switch (level) {
284 case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME:
285 break;
286
287 case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME:
288 break;
289
290 case NL_FLAG_UTF8_DNS_DOMAIN_NAME:
291 break;
292
293 case NL_FLAG_UTF8_DNS_HOST_NAME:
294 break;
295
296 case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME:
297 break;
298
299 default:
300 break;
301
302 }
303 }
304 return NDR_ERR_SUCCESS;
305}
306
307_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(struct ndr_push *ndr, int ndr_flags, const union NL_AUTH_MESSAGE_BUFFER_REPLY *r)
308{
309 if (ndr_flags & NDR_SCALARS) {
310 uint32_t level = ndr_push_get_switch_value(ndr, r);
311 NDR_CHECK(ndr_push_union_align(ndr, 4));
312 switch (level) {
313 case NL_NEGOTIATE_RESPONSE: {
314 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->dummy));
315 break; }
316
317 default: {
318 break; }
319
320 }
321 }
322 if (ndr_flags & NDR_BUFFERS) {
323 uint32_t level = ndr_push_get_switch_value(ndr, r);
324 switch (level) {
325 case NL_NEGOTIATE_RESPONSE:
326 break;
327
328 default:
329 break;
330
331 }
332 }
333 return NDR_ERR_SUCCESS;
334}
335
336_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(struct ndr_pull *ndr, int ndr_flags, union NL_AUTH_MESSAGE_BUFFER_REPLY *r)
337{
338 uint32_t level;
339 level = ndr_pull_get_switch_value(ndr, r);
340 if (ndr_flags & NDR_SCALARS) {
341 NDR_CHECK(ndr_pull_union_align(ndr, 4));
342 switch (level) {
343 case NL_NEGOTIATE_RESPONSE: {
344 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->dummy));
345 break; }
346
347 default: {
348 break; }
349
350 }
351 }
352 if (ndr_flags & NDR_BUFFERS) {
353 switch (level) {
354 case NL_NEGOTIATE_RESPONSE:
355 break;
356
357 default:
358 break;
359
360 }
361 }
362 return NDR_ERR_SUCCESS;
363}
364
365_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_MESSAGE *r)
366{
367 {
368 uint32_t _flags_save_STRUCT = ndr->flags;
369 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
370 if (ndr_flags & NDR_SCALARS) {
371 NDR_CHECK(ndr_push_align(ndr, 4));
372 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_TYPE(ndr, NDR_SCALARS, r->MessageType));
373 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_FLAGS(ndr, NDR_SCALARS, r->Flags));
374 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME));
375 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_domain));
376 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME));
377 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_computer));
378 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME));
379 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_domain));
380 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME));
381 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_host));
382 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME));
383 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_netbios_computer));
384 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE));
385 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_SCALARS, &r->Buffer));
386 NDR_CHECK(ndr_push_trailer_align(ndr, 4));
387 }
388 if (ndr_flags & NDR_BUFFERS) {
389 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_domain));
390 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_computer));
391 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_domain));
392 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_host));
393 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_netbios_computer));
394 NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_BUFFERS, &r->Buffer));
395 }
396 ndr->flags = _flags_save_STRUCT;
397 }
398 return NDR_ERR_SUCCESS;
399}
400
401_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_MESSAGE *r)
402{
403 {
404 uint32_t _flags_save_STRUCT = ndr->flags;
405 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
406 if (ndr_flags & NDR_SCALARS) {
407 NDR_CHECK(ndr_pull_align(ndr, 4));
408 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_TYPE(ndr, NDR_SCALARS, &r->MessageType));
409 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_FLAGS(ndr, NDR_SCALARS, &r->Flags));
410 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME));
411 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_domain));
412 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME));
413 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_computer));
414 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME));
415 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_domain));
416 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME));
417 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_host));
418 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME));
419 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_netbios_computer));
420 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE));
421 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_SCALARS, &r->Buffer));
422 NDR_CHECK(ndr_pull_trailer_align(ndr, 4));
423 }
424 if (ndr_flags & NDR_BUFFERS) {
425 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_domain));
426 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_computer));
427 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_domain));
428 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_host));
429 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_netbios_computer));
430 NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_BUFFERS, &r->Buffer));
431 }
432 ndr->flags = _flags_save_STRUCT;
433 }
434 return NDR_ERR_SUCCESS;
435}
436
437_PUBLIC_ void ndr_print_NL_AUTH_MESSAGE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_MESSAGE *r)
438{
439 ndr_print_struct(ndr, name, "NL_AUTH_MESSAGE");
440 if (r == NULL) { ndr_print_null(ndr); return; }
441 {
442 uint32_t _flags_save_STRUCT = ndr->flags;
443 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
444 ndr->depth++;
445 ndr_print_NL_AUTH_MESSAGE_TYPE(ndr, "MessageType", r->MessageType);
446 ndr_print_NL_AUTH_MESSAGE_FLAGS(ndr, "Flags", r->Flags);
447 ndr_print_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME);
448 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "oem_netbios_domain", &r->oem_netbios_domain);
449 ndr_print_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME);
450 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "oem_netbios_computer", &r->oem_netbios_computer);
451 ndr_print_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME);
452 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_dns_domain", &r->utf8_dns_domain);
453 ndr_print_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME);
454 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_dns_host", &r->utf8_dns_host);
455 ndr_print_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME);
456 ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_netbios_computer", &r->utf8_netbios_computer);
457 ndr_print_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE);
458 ndr_print_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, "Buffer", &r->Buffer);
459 ndr->depth--;
460 ndr->flags = _flags_save_STRUCT;
461 }
462}
463
464static enum ndr_err_code ndr_push_NL_SIGNATURE_ALGORITHM(struct ndr_push *ndr, int ndr_flags, enum NL_SIGNATURE_ALGORITHM r)
465{
466 NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r));
467 return NDR_ERR_SUCCESS;
468}
469
470static enum ndr_err_code ndr_pull_NL_SIGNATURE_ALGORITHM(struct ndr_pull *ndr, int ndr_flags, enum NL_SIGNATURE_ALGORITHM *r)
471{
472 uint16_t v;
473 NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v));
474 *r = v;
475 return NDR_ERR_SUCCESS;
476}
477
478_PUBLIC_ void ndr_print_NL_SIGNATURE_ALGORITHM(struct ndr_print *ndr, const char *name, enum NL_SIGNATURE_ALGORITHM r)
479{
480 const char *val = NULL;
481
482 switch (r) {
483 case NL_SIGN_HMAC_SHA256: val = "NL_SIGN_HMAC_SHA256"; break;
484 case NL_SIGN_HMAC_MD5: val = "NL_SIGN_HMAC_MD5"; break;
485 }
486 ndr_print_enum(ndr, name, "ENUM", val, r);
487}
488
489static enum ndr_err_code ndr_push_NL_SEAL_ALGORITHM(struct ndr_push *ndr, int ndr_flags, enum NL_SEAL_ALGORITHM r)
490{
491 NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r));
492 return NDR_ERR_SUCCESS;
493}
494
495static enum ndr_err_code ndr_pull_NL_SEAL_ALGORITHM(struct ndr_pull *ndr, int ndr_flags, enum NL_SEAL_ALGORITHM *r)
496{
497 uint16_t v;
498 NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v));
499 *r = v;
500 return NDR_ERR_SUCCESS;
501}
502
503_PUBLIC_ void ndr_print_NL_SEAL_ALGORITHM(struct ndr_print *ndr, const char *name, enum NL_SEAL_ALGORITHM r)
504{
505 const char *val = NULL;
506
507 switch (r) {
508 case NL_SEAL_AES128: val = "NL_SEAL_AES128"; break;
509 case NL_SEAL_RC4: val = "NL_SEAL_RC4"; break;
510 case NL_SEAL_NONE: val = "NL_SEAL_NONE"; break;
511 }
512 ndr_print_enum(ndr, name, "ENUM", val, r);
513}
514
515_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_SIGNATURE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_SIGNATURE *r)
516{
517 {
518 uint32_t _flags_save_STRUCT = ndr->flags;
519 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
520 if (ndr_flags & NDR_SCALARS) {
521 NDR_CHECK(ndr_push_align(ndr, 3));
522 NDR_CHECK(ndr_push_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, NL_SIGN_HMAC_MD5));
523 NDR_CHECK(ndr_push_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, r->SealAlgorithm));
524 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Pad));
525 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Flags));
526 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
527 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Checksum, 8));
528 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
529 NDR_CHECK(ndr_push_trailer_align(ndr, 3));
530 }
531 if (ndr_flags & NDR_BUFFERS) {
532 }
533 ndr->flags = _flags_save_STRUCT;
534 }
535 return NDR_ERR_SUCCESS;
536}
537
538_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_SIGNATURE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_SIGNATURE *r)
539{
540 {
541 uint32_t _flags_save_STRUCT = ndr->flags;
542 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
543 if (ndr_flags & NDR_SCALARS) {
544 NDR_CHECK(ndr_pull_align(ndr, 3));
545 NDR_CHECK(ndr_pull_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, &r->SignatureAlgorithm));
546 NDR_CHECK(ndr_pull_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, &r->SealAlgorithm));
547 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Pad));
548 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Flags));
549 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
550 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Checksum, 8));
551 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
552 NDR_CHECK(ndr_pull_trailer_align(ndr, 3));
553 }
554 if (ndr_flags & NDR_BUFFERS) {
555 }
556 ndr->flags = _flags_save_STRUCT;
557 }
558 return NDR_ERR_SUCCESS;
559}
560
561_PUBLIC_ void ndr_print_NL_AUTH_SIGNATURE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_SIGNATURE *r)
562{
563 ndr_print_struct(ndr, name, "NL_AUTH_SIGNATURE");
564 if (r == NULL) { ndr_print_null(ndr); return; }
565 {
566 uint32_t _flags_save_STRUCT = ndr->flags;
567 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
568 ndr->depth++;
569 ndr_print_NL_SIGNATURE_ALGORITHM(ndr, "SignatureAlgorithm", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NL_SIGN_HMAC_MD5:r->SignatureAlgorithm);
570 ndr_print_NL_SEAL_ALGORITHM(ndr, "SealAlgorithm", r->SealAlgorithm);
571 ndr_print_uint16(ndr, "Pad", r->Pad);
572 ndr_print_uint16(ndr, "Flags", r->Flags);
573 ndr_print_array_uint8(ndr, "SequenceNumber", r->SequenceNumber, 8);
574 ndr_print_array_uint8(ndr, "Checksum", r->Checksum, 8);
575 ndr_print_array_uint8(ndr, "Confounder", r->Confounder, 8);
576 ndr->depth--;
577 ndr->flags = _flags_save_STRUCT;
578 }
579}
580
581_PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_SHA2_SIGNATURE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_SHA2_SIGNATURE *r)
582{
583 {
584 uint32_t _flags_save_STRUCT = ndr->flags;
585 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
586 if (ndr_flags & NDR_SCALARS) {
587 NDR_CHECK(ndr_push_align(ndr, 3));
588 NDR_CHECK(ndr_push_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, NL_SIGN_HMAC_SHA256));
589 NDR_CHECK(ndr_push_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, r->SealAlgorithm));
590 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Pad));
591 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Flags));
592 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
593 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Checksum, 32));
594 NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
595 NDR_CHECK(ndr_push_trailer_align(ndr, 3));
596 }
597 if (ndr_flags & NDR_BUFFERS) {
598 }
599 ndr->flags = _flags_save_STRUCT;
600 }
601 return NDR_ERR_SUCCESS;
602}
603
604_PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_SHA2_SIGNATURE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_SHA2_SIGNATURE *r)
605{
606 {
607 uint32_t _flags_save_STRUCT = ndr->flags;
608 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
609 if (ndr_flags & NDR_SCALARS) {
610 NDR_CHECK(ndr_pull_align(ndr, 3));
611 NDR_CHECK(ndr_pull_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, &r->SignatureAlgorithm));
612 NDR_CHECK(ndr_pull_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, &r->SealAlgorithm));
613 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Pad));
614 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Flags));
615 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
616 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Checksum, 32));
617 NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
618 NDR_CHECK(ndr_pull_trailer_align(ndr, 3));
619 }
620 if (ndr_flags & NDR_BUFFERS) {
621 }
622 ndr->flags = _flags_save_STRUCT;
623 }
624 return NDR_ERR_SUCCESS;
625}
626
627_PUBLIC_ void ndr_print_NL_AUTH_SHA2_SIGNATURE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_SHA2_SIGNATURE *r)
628{
629 ndr_print_struct(ndr, name, "NL_AUTH_SHA2_SIGNATURE");
630 if (r == NULL) { ndr_print_null(ndr); return; }
631 {
632 uint32_t _flags_save_STRUCT = ndr->flags;
633 ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
634 ndr->depth++;
635 ndr_print_NL_SIGNATURE_ALGORITHM(ndr, "SignatureAlgorithm", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NL_SIGN_HMAC_SHA256:r->SignatureAlgorithm);
636 ndr_print_NL_SEAL_ALGORITHM(ndr, "SealAlgorithm", r->SealAlgorithm);
637 ndr_print_uint16(ndr, "Pad", r->Pad);
638 ndr_print_uint16(ndr, "Flags", r->Flags);
639 ndr_print_array_uint8(ndr, "SequenceNumber", r->SequenceNumber, 8);
640 ndr_print_array_uint8(ndr, "Checksum", r->Checksum, 32);
641 ndr_print_array_uint8(ndr, "Confounder", r->Confounder, 8);
642 ndr->depth--;
643 ndr->flags = _flags_save_STRUCT;
644 }
645}
646
Note: See TracBrowser for help on using the repository browser.