1 | /* parser auto-generated by pidl */
|
---|
2 |
|
---|
3 | #include "includes.h"
|
---|
4 | #include "librpc/gen_ndr/ndr_schannel.h"
|
---|
5 |
|
---|
6 | #include "librpc/gen_ndr/ndr_netlogon.h"
|
---|
7 | #include "librpc/gen_ndr/ndr_nbt.h"
|
---|
8 | _PUBLIC_ enum ndr_err_code ndr_push_netlogon_creds_CredentialState(struct ndr_push *ndr, int ndr_flags, const struct netlogon_creds_CredentialState *r)
|
---|
9 | {
|
---|
10 | {
|
---|
11 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
12 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
13 | if (ndr_flags & NDR_SCALARS) {
|
---|
14 | NDR_CHECK(ndr_push_align(ndr, 5));
|
---|
15 | NDR_CHECK(ndr_push_netr_NegotiateFlags(ndr, NDR_SCALARS, r->negotiate_flags));
|
---|
16 | NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->session_key, 16));
|
---|
17 | NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->sequence));
|
---|
18 | NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->seed));
|
---|
19 | NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->client));
|
---|
20 | NDR_CHECK(ndr_push_netr_Credential(ndr, NDR_SCALARS, &r->server));
|
---|
21 | NDR_CHECK(ndr_push_netr_SchannelType(ndr, NDR_SCALARS, r->secure_channel_type));
|
---|
22 | NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF8)));
|
---|
23 | NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
|
---|
24 | NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF8)));
|
---|
25 | NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->computer_name, ndr_charset_length(r->computer_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
|
---|
26 | NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
|
---|
27 | NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
|
---|
28 | NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
|
---|
29 | NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->account_name, ndr_charset_length(r->account_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
|
---|
30 | NDR_CHECK(ndr_push_unique_ptr(ndr, r->sid));
|
---|
31 | NDR_CHECK(ndr_push_trailer_align(ndr, 5));
|
---|
32 | }
|
---|
33 | if (ndr_flags & NDR_BUFFERS) {
|
---|
34 | if (r->sid) {
|
---|
35 | NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, r->sid));
|
---|
36 | }
|
---|
37 | }
|
---|
38 | ndr->flags = _flags_save_STRUCT;
|
---|
39 | }
|
---|
40 | return NDR_ERR_SUCCESS;
|
---|
41 | }
|
---|
42 |
|
---|
43 | _PUBLIC_ enum ndr_err_code ndr_pull_netlogon_creds_CredentialState(struct ndr_pull *ndr, int ndr_flags, struct netlogon_creds_CredentialState *r)
|
---|
44 | {
|
---|
45 | uint32_t _ptr_sid;
|
---|
46 | TALLOC_CTX *_mem_save_sid_0;
|
---|
47 | {
|
---|
48 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
49 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
50 | if (ndr_flags & NDR_SCALARS) {
|
---|
51 | NDR_CHECK(ndr_pull_align(ndr, 5));
|
---|
52 | NDR_CHECK(ndr_pull_netr_NegotiateFlags(ndr, NDR_SCALARS, &r->negotiate_flags));
|
---|
53 | NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->session_key, 16));
|
---|
54 | NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->sequence));
|
---|
55 | NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->seed));
|
---|
56 | NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->client));
|
---|
57 | NDR_CHECK(ndr_pull_netr_Credential(ndr, NDR_SCALARS, &r->server));
|
---|
58 | NDR_CHECK(ndr_pull_netr_SchannelType(ndr, NDR_SCALARS, &r->secure_channel_type));
|
---|
59 | NDR_CHECK(ndr_pull_array_size(ndr, &r->computer_name));
|
---|
60 | NDR_CHECK(ndr_pull_array_length(ndr, &r->computer_name));
|
---|
61 | if (ndr_get_array_length(ndr, &r->computer_name) > ndr_get_array_size(ndr, &r->computer_name)) {
|
---|
62 | return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->computer_name), ndr_get_array_length(ndr, &r->computer_name));
|
---|
63 | }
|
---|
64 | NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->computer_name), sizeof(uint8_t)));
|
---|
65 | NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->computer_name, ndr_get_array_length(ndr, &r->computer_name), sizeof(uint8_t), CH_UTF8));
|
---|
66 | NDR_CHECK(ndr_pull_array_size(ndr, &r->account_name));
|
---|
67 | NDR_CHECK(ndr_pull_array_length(ndr, &r->account_name));
|
---|
68 | if (ndr_get_array_length(ndr, &r->account_name) > ndr_get_array_size(ndr, &r->account_name)) {
|
---|
69 | return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->account_name), ndr_get_array_length(ndr, &r->account_name));
|
---|
70 | }
|
---|
71 | NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t)));
|
---|
72 | NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->account_name, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t), CH_UTF8));
|
---|
73 | NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sid));
|
---|
74 | if (_ptr_sid) {
|
---|
75 | NDR_PULL_ALLOC(ndr, r->sid);
|
---|
76 | } else {
|
---|
77 | r->sid = NULL;
|
---|
78 | }
|
---|
79 | NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
|
---|
80 | }
|
---|
81 | if (ndr_flags & NDR_BUFFERS) {
|
---|
82 | if (r->sid) {
|
---|
83 | _mem_save_sid_0 = NDR_PULL_GET_MEM_CTX(ndr);
|
---|
84 | NDR_PULL_SET_MEM_CTX(ndr, r->sid, 0);
|
---|
85 | NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS, r->sid));
|
---|
86 | NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sid_0, 0);
|
---|
87 | }
|
---|
88 | }
|
---|
89 | ndr->flags = _flags_save_STRUCT;
|
---|
90 | }
|
---|
91 | return NDR_ERR_SUCCESS;
|
---|
92 | }
|
---|
93 |
|
---|
94 | _PUBLIC_ void ndr_print_netlogon_creds_CredentialState(struct ndr_print *ndr, const char *name, const struct netlogon_creds_CredentialState *r)
|
---|
95 | {
|
---|
96 | ndr_print_struct(ndr, name, "netlogon_creds_CredentialState");
|
---|
97 | if (r == NULL) { ndr_print_null(ndr); return; }
|
---|
98 | {
|
---|
99 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
100 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
101 | ndr->depth++;
|
---|
102 | ndr_print_netr_NegotiateFlags(ndr, "negotiate_flags", r->negotiate_flags);
|
---|
103 | ndr_print_array_uint8(ndr, "session_key", r->session_key, 16);
|
---|
104 | ndr_print_uint32(ndr, "sequence", r->sequence);
|
---|
105 | ndr_print_netr_Credential(ndr, "seed", &r->seed);
|
---|
106 | ndr_print_netr_Credential(ndr, "client", &r->client);
|
---|
107 | ndr_print_netr_Credential(ndr, "server", &r->server);
|
---|
108 | ndr_print_netr_SchannelType(ndr, "secure_channel_type", r->secure_channel_type);
|
---|
109 | ndr_print_string(ndr, "computer_name", r->computer_name);
|
---|
110 | ndr_print_string(ndr, "account_name", r->account_name);
|
---|
111 | ndr_print_ptr(ndr, "sid", r->sid);
|
---|
112 | ndr->depth++;
|
---|
113 | if (r->sid) {
|
---|
114 | ndr_print_dom_sid(ndr, "sid", r->sid);
|
---|
115 | }
|
---|
116 | ndr->depth--;
|
---|
117 | ndr->depth--;
|
---|
118 | ndr->flags = _flags_save_STRUCT;
|
---|
119 | }
|
---|
120 | }
|
---|
121 |
|
---|
122 | static enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_TYPE(struct ndr_push *ndr, int ndr_flags, enum NL_AUTH_MESSAGE_TYPE r)
|
---|
123 | {
|
---|
124 | NDR_CHECK(ndr_push_enum_uint32(ndr, NDR_SCALARS, r));
|
---|
125 | return NDR_ERR_SUCCESS;
|
---|
126 | }
|
---|
127 |
|
---|
128 | static enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_TYPE(struct ndr_pull *ndr, int ndr_flags, enum NL_AUTH_MESSAGE_TYPE *r)
|
---|
129 | {
|
---|
130 | uint32_t v;
|
---|
131 | NDR_CHECK(ndr_pull_enum_uint32(ndr, NDR_SCALARS, &v));
|
---|
132 | *r = v;
|
---|
133 | return NDR_ERR_SUCCESS;
|
---|
134 | }
|
---|
135 |
|
---|
136 | _PUBLIC_ void ndr_print_NL_AUTH_MESSAGE_TYPE(struct ndr_print *ndr, const char *name, enum NL_AUTH_MESSAGE_TYPE r)
|
---|
137 | {
|
---|
138 | const char *val = NULL;
|
---|
139 |
|
---|
140 | switch (r) {
|
---|
141 | case NL_NEGOTIATE_REQUEST: val = "NL_NEGOTIATE_REQUEST"; break;
|
---|
142 | case NL_NEGOTIATE_RESPONSE: val = "NL_NEGOTIATE_RESPONSE"; break;
|
---|
143 | }
|
---|
144 | ndr_print_enum(ndr, name, "ENUM", val, r);
|
---|
145 | }
|
---|
146 |
|
---|
147 | static enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_FLAGS(struct ndr_push *ndr, int ndr_flags, uint32_t r)
|
---|
148 | {
|
---|
149 | NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r));
|
---|
150 | return NDR_ERR_SUCCESS;
|
---|
151 | }
|
---|
152 |
|
---|
153 | static enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_FLAGS(struct ndr_pull *ndr, int ndr_flags, uint32_t *r)
|
---|
154 | {
|
---|
155 | uint32_t v;
|
---|
156 | NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &v));
|
---|
157 | *r = v;
|
---|
158 | return NDR_ERR_SUCCESS;
|
---|
159 | }
|
---|
160 |
|
---|
161 | _PUBLIC_ void ndr_print_NL_AUTH_MESSAGE_FLAGS(struct ndr_print *ndr, const char *name, uint32_t r)
|
---|
162 | {
|
---|
163 | ndr_print_uint32(ndr, name, r);
|
---|
164 | ndr->depth++;
|
---|
165 | ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_OEM_NETBIOS_DOMAIN_NAME", NL_FLAG_OEM_NETBIOS_DOMAIN_NAME, r);
|
---|
166 | ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_OEM_NETBIOS_COMPUTER_NAME", NL_FLAG_OEM_NETBIOS_COMPUTER_NAME, r);
|
---|
167 | ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_DNS_DOMAIN_NAME", NL_FLAG_UTF8_DNS_DOMAIN_NAME, r);
|
---|
168 | ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_DNS_HOST_NAME", NL_FLAG_UTF8_DNS_HOST_NAME, r);
|
---|
169 | ndr_print_bitmap_flag(ndr, sizeof(uint32_t), "NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME", NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME, r);
|
---|
170 | ndr->depth--;
|
---|
171 | }
|
---|
172 |
|
---|
173 | _PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_BUFFER(struct ndr_push *ndr, int ndr_flags, const union NL_AUTH_MESSAGE_BUFFER *r)
|
---|
174 | {
|
---|
175 | if (ndr_flags & NDR_SCALARS) {
|
---|
176 | uint32_t level = ndr_push_get_switch_value(ndr, r);
|
---|
177 | NDR_CHECK(ndr_push_union_align(ndr, 4));
|
---|
178 | switch (level) {
|
---|
179 | case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: {
|
---|
180 | {
|
---|
181 | uint32_t _flags_save_string = ndr->flags;
|
---|
182 | ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
|
---|
183 | NDR_CHECK(ndr_push_string(ndr, NDR_SCALARS, r->a));
|
---|
184 | ndr->flags = _flags_save_string;
|
---|
185 | }
|
---|
186 | break; }
|
---|
187 |
|
---|
188 | case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: {
|
---|
189 | {
|
---|
190 | uint32_t _flags_save_string = ndr->flags;
|
---|
191 | ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
|
---|
192 | NDR_CHECK(ndr_push_string(ndr, NDR_SCALARS, r->a));
|
---|
193 | ndr->flags = _flags_save_string;
|
---|
194 | }
|
---|
195 | break; }
|
---|
196 |
|
---|
197 | case NL_FLAG_UTF8_DNS_DOMAIN_NAME: {
|
---|
198 | NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u));
|
---|
199 | break; }
|
---|
200 |
|
---|
201 | case NL_FLAG_UTF8_DNS_HOST_NAME: {
|
---|
202 | NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u));
|
---|
203 | break; }
|
---|
204 |
|
---|
205 | case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: {
|
---|
206 | NDR_CHECK(ndr_push_nbt_string(ndr, NDR_SCALARS, r->u));
|
---|
207 | break; }
|
---|
208 |
|
---|
209 | default: {
|
---|
210 | break; }
|
---|
211 |
|
---|
212 | }
|
---|
213 | }
|
---|
214 | if (ndr_flags & NDR_BUFFERS) {
|
---|
215 | uint32_t level = ndr_push_get_switch_value(ndr, r);
|
---|
216 | switch (level) {
|
---|
217 | case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME:
|
---|
218 | break;
|
---|
219 |
|
---|
220 | case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME:
|
---|
221 | break;
|
---|
222 |
|
---|
223 | case NL_FLAG_UTF8_DNS_DOMAIN_NAME:
|
---|
224 | break;
|
---|
225 |
|
---|
226 | case NL_FLAG_UTF8_DNS_HOST_NAME:
|
---|
227 | break;
|
---|
228 |
|
---|
229 | case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME:
|
---|
230 | break;
|
---|
231 |
|
---|
232 | default:
|
---|
233 | break;
|
---|
234 |
|
---|
235 | }
|
---|
236 | }
|
---|
237 | return NDR_ERR_SUCCESS;
|
---|
238 | }
|
---|
239 |
|
---|
240 | _PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_BUFFER(struct ndr_pull *ndr, int ndr_flags, union NL_AUTH_MESSAGE_BUFFER *r)
|
---|
241 | {
|
---|
242 | uint32_t level;
|
---|
243 | level = ndr_pull_get_switch_value(ndr, r);
|
---|
244 | if (ndr_flags & NDR_SCALARS) {
|
---|
245 | NDR_CHECK(ndr_pull_union_align(ndr, 4));
|
---|
246 | switch (level) {
|
---|
247 | case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME: {
|
---|
248 | {
|
---|
249 | uint32_t _flags_save_string = ndr->flags;
|
---|
250 | ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
|
---|
251 | NDR_CHECK(ndr_pull_string(ndr, NDR_SCALARS, &r->a));
|
---|
252 | ndr->flags = _flags_save_string;
|
---|
253 | }
|
---|
254 | break; }
|
---|
255 |
|
---|
256 | case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME: {
|
---|
257 | {
|
---|
258 | uint32_t _flags_save_string = ndr->flags;
|
---|
259 | ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
|
---|
260 | NDR_CHECK(ndr_pull_string(ndr, NDR_SCALARS, &r->a));
|
---|
261 | ndr->flags = _flags_save_string;
|
---|
262 | }
|
---|
263 | break; }
|
---|
264 |
|
---|
265 | case NL_FLAG_UTF8_DNS_DOMAIN_NAME: {
|
---|
266 | NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u));
|
---|
267 | break; }
|
---|
268 |
|
---|
269 | case NL_FLAG_UTF8_DNS_HOST_NAME: {
|
---|
270 | NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u));
|
---|
271 | break; }
|
---|
272 |
|
---|
273 | case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME: {
|
---|
274 | NDR_CHECK(ndr_pull_nbt_string(ndr, NDR_SCALARS, &r->u));
|
---|
275 | break; }
|
---|
276 |
|
---|
277 | default: {
|
---|
278 | break; }
|
---|
279 |
|
---|
280 | }
|
---|
281 | }
|
---|
282 | if (ndr_flags & NDR_BUFFERS) {
|
---|
283 | switch (level) {
|
---|
284 | case NL_FLAG_OEM_NETBIOS_DOMAIN_NAME:
|
---|
285 | break;
|
---|
286 |
|
---|
287 | case NL_FLAG_OEM_NETBIOS_COMPUTER_NAME:
|
---|
288 | break;
|
---|
289 |
|
---|
290 | case NL_FLAG_UTF8_DNS_DOMAIN_NAME:
|
---|
291 | break;
|
---|
292 |
|
---|
293 | case NL_FLAG_UTF8_DNS_HOST_NAME:
|
---|
294 | break;
|
---|
295 |
|
---|
296 | case NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME:
|
---|
297 | break;
|
---|
298 |
|
---|
299 | default:
|
---|
300 | break;
|
---|
301 |
|
---|
302 | }
|
---|
303 | }
|
---|
304 | return NDR_ERR_SUCCESS;
|
---|
305 | }
|
---|
306 |
|
---|
307 | _PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(struct ndr_push *ndr, int ndr_flags, const union NL_AUTH_MESSAGE_BUFFER_REPLY *r)
|
---|
308 | {
|
---|
309 | if (ndr_flags & NDR_SCALARS) {
|
---|
310 | uint32_t level = ndr_push_get_switch_value(ndr, r);
|
---|
311 | NDR_CHECK(ndr_push_union_align(ndr, 4));
|
---|
312 | switch (level) {
|
---|
313 | case NL_NEGOTIATE_RESPONSE: {
|
---|
314 | NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->dummy));
|
---|
315 | break; }
|
---|
316 |
|
---|
317 | default: {
|
---|
318 | break; }
|
---|
319 |
|
---|
320 | }
|
---|
321 | }
|
---|
322 | if (ndr_flags & NDR_BUFFERS) {
|
---|
323 | uint32_t level = ndr_push_get_switch_value(ndr, r);
|
---|
324 | switch (level) {
|
---|
325 | case NL_NEGOTIATE_RESPONSE:
|
---|
326 | break;
|
---|
327 |
|
---|
328 | default:
|
---|
329 | break;
|
---|
330 |
|
---|
331 | }
|
---|
332 | }
|
---|
333 | return NDR_ERR_SUCCESS;
|
---|
334 | }
|
---|
335 |
|
---|
336 | _PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(struct ndr_pull *ndr, int ndr_flags, union NL_AUTH_MESSAGE_BUFFER_REPLY *r)
|
---|
337 | {
|
---|
338 | uint32_t level;
|
---|
339 | level = ndr_pull_get_switch_value(ndr, r);
|
---|
340 | if (ndr_flags & NDR_SCALARS) {
|
---|
341 | NDR_CHECK(ndr_pull_union_align(ndr, 4));
|
---|
342 | switch (level) {
|
---|
343 | case NL_NEGOTIATE_RESPONSE: {
|
---|
344 | NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->dummy));
|
---|
345 | break; }
|
---|
346 |
|
---|
347 | default: {
|
---|
348 | break; }
|
---|
349 |
|
---|
350 | }
|
---|
351 | }
|
---|
352 | if (ndr_flags & NDR_BUFFERS) {
|
---|
353 | switch (level) {
|
---|
354 | case NL_NEGOTIATE_RESPONSE:
|
---|
355 | break;
|
---|
356 |
|
---|
357 | default:
|
---|
358 | break;
|
---|
359 |
|
---|
360 | }
|
---|
361 | }
|
---|
362 | return NDR_ERR_SUCCESS;
|
---|
363 | }
|
---|
364 |
|
---|
365 | _PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_MESSAGE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_MESSAGE *r)
|
---|
366 | {
|
---|
367 | {
|
---|
368 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
369 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
370 | if (ndr_flags & NDR_SCALARS) {
|
---|
371 | NDR_CHECK(ndr_push_align(ndr, 4));
|
---|
372 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_TYPE(ndr, NDR_SCALARS, r->MessageType));
|
---|
373 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_FLAGS(ndr, NDR_SCALARS, r->Flags));
|
---|
374 | NDR_CHECK(ndr_push_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME));
|
---|
375 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_domain));
|
---|
376 | NDR_CHECK(ndr_push_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME));
|
---|
377 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_computer));
|
---|
378 | NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME));
|
---|
379 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_domain));
|
---|
380 | NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME));
|
---|
381 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_host));
|
---|
382 | NDR_CHECK(ndr_push_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME));
|
---|
383 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_netbios_computer));
|
---|
384 | NDR_CHECK(ndr_push_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE));
|
---|
385 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_SCALARS, &r->Buffer));
|
---|
386 | NDR_CHECK(ndr_push_trailer_align(ndr, 4));
|
---|
387 | }
|
---|
388 | if (ndr_flags & NDR_BUFFERS) {
|
---|
389 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_domain));
|
---|
390 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_computer));
|
---|
391 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_domain));
|
---|
392 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_host));
|
---|
393 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_netbios_computer));
|
---|
394 | NDR_CHECK(ndr_push_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_BUFFERS, &r->Buffer));
|
---|
395 | }
|
---|
396 | ndr->flags = _flags_save_STRUCT;
|
---|
397 | }
|
---|
398 | return NDR_ERR_SUCCESS;
|
---|
399 | }
|
---|
400 |
|
---|
401 | _PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_MESSAGE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_MESSAGE *r)
|
---|
402 | {
|
---|
403 | {
|
---|
404 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
405 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
406 | if (ndr_flags & NDR_SCALARS) {
|
---|
407 | NDR_CHECK(ndr_pull_align(ndr, 4));
|
---|
408 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_TYPE(ndr, NDR_SCALARS, &r->MessageType));
|
---|
409 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_FLAGS(ndr, NDR_SCALARS, &r->Flags));
|
---|
410 | NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME));
|
---|
411 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_domain));
|
---|
412 | NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME));
|
---|
413 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->oem_netbios_computer));
|
---|
414 | NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME));
|
---|
415 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_domain));
|
---|
416 | NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME));
|
---|
417 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_dns_host));
|
---|
418 | NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME));
|
---|
419 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_SCALARS, &r->utf8_netbios_computer));
|
---|
420 | NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE));
|
---|
421 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_SCALARS, &r->Buffer));
|
---|
422 | NDR_CHECK(ndr_pull_trailer_align(ndr, 4));
|
---|
423 | }
|
---|
424 | if (ndr_flags & NDR_BUFFERS) {
|
---|
425 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_domain));
|
---|
426 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->oem_netbios_computer));
|
---|
427 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_domain));
|
---|
428 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_dns_host));
|
---|
429 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER(ndr, NDR_BUFFERS, &r->utf8_netbios_computer));
|
---|
430 | NDR_CHECK(ndr_pull_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, NDR_BUFFERS, &r->Buffer));
|
---|
431 | }
|
---|
432 | ndr->flags = _flags_save_STRUCT;
|
---|
433 | }
|
---|
434 | return NDR_ERR_SUCCESS;
|
---|
435 | }
|
---|
436 |
|
---|
437 | _PUBLIC_ void ndr_print_NL_AUTH_MESSAGE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_MESSAGE *r)
|
---|
438 | {
|
---|
439 | ndr_print_struct(ndr, name, "NL_AUTH_MESSAGE");
|
---|
440 | if (r == NULL) { ndr_print_null(ndr); return; }
|
---|
441 | {
|
---|
442 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
443 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
444 | ndr->depth++;
|
---|
445 | ndr_print_NL_AUTH_MESSAGE_TYPE(ndr, "MessageType", r->MessageType);
|
---|
446 | ndr_print_NL_AUTH_MESSAGE_FLAGS(ndr, "Flags", r->Flags);
|
---|
447 | ndr_print_set_switch_value(ndr, &r->oem_netbios_domain, r->Flags & NL_FLAG_OEM_NETBIOS_DOMAIN_NAME);
|
---|
448 | ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "oem_netbios_domain", &r->oem_netbios_domain);
|
---|
449 | ndr_print_set_switch_value(ndr, &r->oem_netbios_computer, r->Flags & NL_FLAG_OEM_NETBIOS_COMPUTER_NAME);
|
---|
450 | ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "oem_netbios_computer", &r->oem_netbios_computer);
|
---|
451 | ndr_print_set_switch_value(ndr, &r->utf8_dns_domain, r->Flags & NL_FLAG_UTF8_DNS_DOMAIN_NAME);
|
---|
452 | ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_dns_domain", &r->utf8_dns_domain);
|
---|
453 | ndr_print_set_switch_value(ndr, &r->utf8_dns_host, r->Flags & NL_FLAG_UTF8_DNS_HOST_NAME);
|
---|
454 | ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_dns_host", &r->utf8_dns_host);
|
---|
455 | ndr_print_set_switch_value(ndr, &r->utf8_netbios_computer, r->Flags & NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME);
|
---|
456 | ndr_print_NL_AUTH_MESSAGE_BUFFER(ndr, "utf8_netbios_computer", &r->utf8_netbios_computer);
|
---|
457 | ndr_print_set_switch_value(ndr, &r->Buffer, r->MessageType & NL_NEGOTIATE_RESPONSE);
|
---|
458 | ndr_print_NL_AUTH_MESSAGE_BUFFER_REPLY(ndr, "Buffer", &r->Buffer);
|
---|
459 | ndr->depth--;
|
---|
460 | ndr->flags = _flags_save_STRUCT;
|
---|
461 | }
|
---|
462 | }
|
---|
463 |
|
---|
464 | static enum ndr_err_code ndr_push_NL_SIGNATURE_ALGORITHM(struct ndr_push *ndr, int ndr_flags, enum NL_SIGNATURE_ALGORITHM r)
|
---|
465 | {
|
---|
466 | NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r));
|
---|
467 | return NDR_ERR_SUCCESS;
|
---|
468 | }
|
---|
469 |
|
---|
470 | static enum ndr_err_code ndr_pull_NL_SIGNATURE_ALGORITHM(struct ndr_pull *ndr, int ndr_flags, enum NL_SIGNATURE_ALGORITHM *r)
|
---|
471 | {
|
---|
472 | uint16_t v;
|
---|
473 | NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v));
|
---|
474 | *r = v;
|
---|
475 | return NDR_ERR_SUCCESS;
|
---|
476 | }
|
---|
477 |
|
---|
478 | _PUBLIC_ void ndr_print_NL_SIGNATURE_ALGORITHM(struct ndr_print *ndr, const char *name, enum NL_SIGNATURE_ALGORITHM r)
|
---|
479 | {
|
---|
480 | const char *val = NULL;
|
---|
481 |
|
---|
482 | switch (r) {
|
---|
483 | case NL_SIGN_HMAC_SHA256: val = "NL_SIGN_HMAC_SHA256"; break;
|
---|
484 | case NL_SIGN_HMAC_MD5: val = "NL_SIGN_HMAC_MD5"; break;
|
---|
485 | }
|
---|
486 | ndr_print_enum(ndr, name, "ENUM", val, r);
|
---|
487 | }
|
---|
488 |
|
---|
489 | static enum ndr_err_code ndr_push_NL_SEAL_ALGORITHM(struct ndr_push *ndr, int ndr_flags, enum NL_SEAL_ALGORITHM r)
|
---|
490 | {
|
---|
491 | NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r));
|
---|
492 | return NDR_ERR_SUCCESS;
|
---|
493 | }
|
---|
494 |
|
---|
495 | static enum ndr_err_code ndr_pull_NL_SEAL_ALGORITHM(struct ndr_pull *ndr, int ndr_flags, enum NL_SEAL_ALGORITHM *r)
|
---|
496 | {
|
---|
497 | uint16_t v;
|
---|
498 | NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v));
|
---|
499 | *r = v;
|
---|
500 | return NDR_ERR_SUCCESS;
|
---|
501 | }
|
---|
502 |
|
---|
503 | _PUBLIC_ void ndr_print_NL_SEAL_ALGORITHM(struct ndr_print *ndr, const char *name, enum NL_SEAL_ALGORITHM r)
|
---|
504 | {
|
---|
505 | const char *val = NULL;
|
---|
506 |
|
---|
507 | switch (r) {
|
---|
508 | case NL_SEAL_AES128: val = "NL_SEAL_AES128"; break;
|
---|
509 | case NL_SEAL_RC4: val = "NL_SEAL_RC4"; break;
|
---|
510 | case NL_SEAL_NONE: val = "NL_SEAL_NONE"; break;
|
---|
511 | }
|
---|
512 | ndr_print_enum(ndr, name, "ENUM", val, r);
|
---|
513 | }
|
---|
514 |
|
---|
515 | _PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_SIGNATURE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_SIGNATURE *r)
|
---|
516 | {
|
---|
517 | {
|
---|
518 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
519 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
520 | if (ndr_flags & NDR_SCALARS) {
|
---|
521 | NDR_CHECK(ndr_push_align(ndr, 3));
|
---|
522 | NDR_CHECK(ndr_push_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, NL_SIGN_HMAC_MD5));
|
---|
523 | NDR_CHECK(ndr_push_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, r->SealAlgorithm));
|
---|
524 | NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Pad));
|
---|
525 | NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Flags));
|
---|
526 | NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
|
---|
527 | NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Checksum, 8));
|
---|
528 | NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
|
---|
529 | NDR_CHECK(ndr_push_trailer_align(ndr, 3));
|
---|
530 | }
|
---|
531 | if (ndr_flags & NDR_BUFFERS) {
|
---|
532 | }
|
---|
533 | ndr->flags = _flags_save_STRUCT;
|
---|
534 | }
|
---|
535 | return NDR_ERR_SUCCESS;
|
---|
536 | }
|
---|
537 |
|
---|
538 | _PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_SIGNATURE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_SIGNATURE *r)
|
---|
539 | {
|
---|
540 | {
|
---|
541 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
542 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
543 | if (ndr_flags & NDR_SCALARS) {
|
---|
544 | NDR_CHECK(ndr_pull_align(ndr, 3));
|
---|
545 | NDR_CHECK(ndr_pull_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, &r->SignatureAlgorithm));
|
---|
546 | NDR_CHECK(ndr_pull_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, &r->SealAlgorithm));
|
---|
547 | NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Pad));
|
---|
548 | NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Flags));
|
---|
549 | NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
|
---|
550 | NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Checksum, 8));
|
---|
551 | NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
|
---|
552 | NDR_CHECK(ndr_pull_trailer_align(ndr, 3));
|
---|
553 | }
|
---|
554 | if (ndr_flags & NDR_BUFFERS) {
|
---|
555 | }
|
---|
556 | ndr->flags = _flags_save_STRUCT;
|
---|
557 | }
|
---|
558 | return NDR_ERR_SUCCESS;
|
---|
559 | }
|
---|
560 |
|
---|
561 | _PUBLIC_ void ndr_print_NL_AUTH_SIGNATURE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_SIGNATURE *r)
|
---|
562 | {
|
---|
563 | ndr_print_struct(ndr, name, "NL_AUTH_SIGNATURE");
|
---|
564 | if (r == NULL) { ndr_print_null(ndr); return; }
|
---|
565 | {
|
---|
566 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
567 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
568 | ndr->depth++;
|
---|
569 | ndr_print_NL_SIGNATURE_ALGORITHM(ndr, "SignatureAlgorithm", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NL_SIGN_HMAC_MD5:r->SignatureAlgorithm);
|
---|
570 | ndr_print_NL_SEAL_ALGORITHM(ndr, "SealAlgorithm", r->SealAlgorithm);
|
---|
571 | ndr_print_uint16(ndr, "Pad", r->Pad);
|
---|
572 | ndr_print_uint16(ndr, "Flags", r->Flags);
|
---|
573 | ndr_print_array_uint8(ndr, "SequenceNumber", r->SequenceNumber, 8);
|
---|
574 | ndr_print_array_uint8(ndr, "Checksum", r->Checksum, 8);
|
---|
575 | ndr_print_array_uint8(ndr, "Confounder", r->Confounder, 8);
|
---|
576 | ndr->depth--;
|
---|
577 | ndr->flags = _flags_save_STRUCT;
|
---|
578 | }
|
---|
579 | }
|
---|
580 |
|
---|
581 | _PUBLIC_ enum ndr_err_code ndr_push_NL_AUTH_SHA2_SIGNATURE(struct ndr_push *ndr, int ndr_flags, const struct NL_AUTH_SHA2_SIGNATURE *r)
|
---|
582 | {
|
---|
583 | {
|
---|
584 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
585 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
586 | if (ndr_flags & NDR_SCALARS) {
|
---|
587 | NDR_CHECK(ndr_push_align(ndr, 3));
|
---|
588 | NDR_CHECK(ndr_push_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, NL_SIGN_HMAC_SHA256));
|
---|
589 | NDR_CHECK(ndr_push_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, r->SealAlgorithm));
|
---|
590 | NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Pad));
|
---|
591 | NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->Flags));
|
---|
592 | NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
|
---|
593 | NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Checksum, 32));
|
---|
594 | NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
|
---|
595 | NDR_CHECK(ndr_push_trailer_align(ndr, 3));
|
---|
596 | }
|
---|
597 | if (ndr_flags & NDR_BUFFERS) {
|
---|
598 | }
|
---|
599 | ndr->flags = _flags_save_STRUCT;
|
---|
600 | }
|
---|
601 | return NDR_ERR_SUCCESS;
|
---|
602 | }
|
---|
603 |
|
---|
604 | _PUBLIC_ enum ndr_err_code ndr_pull_NL_AUTH_SHA2_SIGNATURE(struct ndr_pull *ndr, int ndr_flags, struct NL_AUTH_SHA2_SIGNATURE *r)
|
---|
605 | {
|
---|
606 | {
|
---|
607 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
608 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
609 | if (ndr_flags & NDR_SCALARS) {
|
---|
610 | NDR_CHECK(ndr_pull_align(ndr, 3));
|
---|
611 | NDR_CHECK(ndr_pull_NL_SIGNATURE_ALGORITHM(ndr, NDR_SCALARS, &r->SignatureAlgorithm));
|
---|
612 | NDR_CHECK(ndr_pull_NL_SEAL_ALGORITHM(ndr, NDR_SCALARS, &r->SealAlgorithm));
|
---|
613 | NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Pad));
|
---|
614 | NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->Flags));
|
---|
615 | NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->SequenceNumber, 8));
|
---|
616 | NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Checksum, 32));
|
---|
617 | NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->Confounder, 8));
|
---|
618 | NDR_CHECK(ndr_pull_trailer_align(ndr, 3));
|
---|
619 | }
|
---|
620 | if (ndr_flags & NDR_BUFFERS) {
|
---|
621 | }
|
---|
622 | ndr->flags = _flags_save_STRUCT;
|
---|
623 | }
|
---|
624 | return NDR_ERR_SUCCESS;
|
---|
625 | }
|
---|
626 |
|
---|
627 | _PUBLIC_ void ndr_print_NL_AUTH_SHA2_SIGNATURE(struct ndr_print *ndr, const char *name, const struct NL_AUTH_SHA2_SIGNATURE *r)
|
---|
628 | {
|
---|
629 | ndr_print_struct(ndr, name, "NL_AUTH_SHA2_SIGNATURE");
|
---|
630 | if (r == NULL) { ndr_print_null(ndr); return; }
|
---|
631 | {
|
---|
632 | uint32_t _flags_save_STRUCT = ndr->flags;
|
---|
633 | ndr_set_flags(&ndr->flags, LIBNDR_PRINT_ARRAY_HEX);
|
---|
634 | ndr->depth++;
|
---|
635 | ndr_print_NL_SIGNATURE_ALGORITHM(ndr, "SignatureAlgorithm", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NL_SIGN_HMAC_SHA256:r->SignatureAlgorithm);
|
---|
636 | ndr_print_NL_SEAL_ALGORITHM(ndr, "SealAlgorithm", r->SealAlgorithm);
|
---|
637 | ndr_print_uint16(ndr, "Pad", r->Pad);
|
---|
638 | ndr_print_uint16(ndr, "Flags", r->Flags);
|
---|
639 | ndr_print_array_uint8(ndr, "SequenceNumber", r->SequenceNumber, 8);
|
---|
640 | ndr_print_array_uint8(ndr, "Checksum", r->Checksum, 32);
|
---|
641 | ndr_print_array_uint8(ndr, "Confounder", r->Confounder, 8);
|
---|
642 | ndr->depth--;
|
---|
643 | ndr->flags = _flags_save_STRUCT;
|
---|
644 | }
|
---|
645 | }
|
---|
646 |
|
---|