Line data Source code
1 : /* parser auto-generated by pidl */
2 :
3 : #include "includes.h"
4 : #include "bin/default/librpc/gen_ndr/ndr_auth.h"
5 :
6 : #include "librpc/gen_ndr/ndr_misc.h"
7 : #include "librpc/gen_ndr/ndr_security.h"
8 : #include "librpc/gen_ndr/ndr_lsa.h"
9 : #include "librpc/gen_ndr/ndr_krb5pac.h"
10 0 : _PUBLIC_ enum ndr_err_code ndr_push_auth_method(struct ndr_push *ndr, int ndr_flags, enum auth_method r)
11 : {
12 0 : NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r));
13 0 : return NDR_ERR_SUCCESS;
14 : }
15 :
16 0 : _PUBLIC_ enum ndr_err_code ndr_pull_auth_method(struct ndr_pull *ndr, int ndr_flags, enum auth_method *r)
17 : {
18 : uint16_t v;
19 0 : NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v));
20 0 : *r = v;
21 0 : return NDR_ERR_SUCCESS;
22 : }
23 :
24 0 : _PUBLIC_ void ndr_print_auth_method(struct ndr_print *ndr, const char *name, enum auth_method r)
25 : {
26 0 : const char *val = NULL;
27 :
28 0 : switch (r) {
29 0 : case SEC_AUTH_METHOD_UNAUTHENTICATED: val = "SEC_AUTH_METHOD_UNAUTHENTICATED"; break;
30 0 : case SEC_AUTH_METHOD_NTLM: val = "SEC_AUTH_METHOD_NTLM"; break;
31 0 : case SEC_AUTH_METHOD_KERBEROS: val = "SEC_AUTH_METHOD_KERBEROS"; break;
32 : }
33 0 : ndr_print_enum(ndr, name, "ENUM", val, r);
34 0 : }
35 :
36 57604 : _PUBLIC_ enum ndr_err_code ndr_push_auth_user_info(struct ndr_push *ndr, int ndr_flags, const struct auth_user_info *r)
37 : {
38 57604 : NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
39 57604 : if (ndr_flags & NDR_SCALARS) {
40 57604 : NDR_CHECK(ndr_push_align(ndr, 5));
41 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->account_name));
42 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->user_principal_name));
43 57604 : NDR_CHECK(ndr_push_uint8(ndr, NDR_SCALARS, r->user_principal_constructed));
44 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->domain_name));
45 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->dns_domain_name));
46 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->full_name));
47 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->logon_script));
48 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->profile_path));
49 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->home_directory));
50 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->home_drive));
51 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->logon_server));
52 57604 : NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->last_logon));
53 57604 : NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->last_logoff));
54 57604 : NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->acct_expiry));
55 57604 : NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->last_password_change));
56 57604 : NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->allow_password_change));
57 57604 : NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->force_password_change));
58 57604 : NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->logon_count));
59 57604 : NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->bad_password_count));
60 57604 : NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->acct_flags));
61 57604 : NDR_CHECK(ndr_push_uint8(ndr, NDR_SCALARS, r->authenticated));
62 57604 : NDR_CHECK(ndr_push_trailer_align(ndr, 5));
63 : }
64 57604 : if (ndr_flags & NDR_BUFFERS) {
65 57604 : if (r->account_name) {
66 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
67 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
68 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
69 57604 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->account_name, ndr_charset_length(r->account_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
70 : }
71 57604 : if (r->user_principal_name) {
72 35949 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->user_principal_name, CH_UTF8)));
73 35949 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
74 35949 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->user_principal_name, CH_UTF8)));
75 35949 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user_principal_name, ndr_charset_length(r->user_principal_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
76 : }
77 57604 : if (r->domain_name) {
78 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->domain_name, CH_UTF8)));
79 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
80 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->domain_name, CH_UTF8)));
81 57604 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->domain_name, ndr_charset_length(r->domain_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
82 : }
83 57604 : if (r->dns_domain_name) {
84 35949 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->dns_domain_name, CH_UTF8)));
85 35949 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
86 35949 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->dns_domain_name, CH_UTF8)));
87 35949 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->dns_domain_name, ndr_charset_length(r->dns_domain_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
88 : }
89 57604 : if (r->full_name) {
90 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->full_name, CH_UTF8)));
91 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
92 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->full_name, CH_UTF8)));
93 57388 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->full_name, ndr_charset_length(r->full_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
94 : }
95 57604 : if (r->logon_script) {
96 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->logon_script, CH_UTF8)));
97 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
98 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->logon_script, CH_UTF8)));
99 57388 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->logon_script, ndr_charset_length(r->logon_script, CH_UTF8), sizeof(uint8_t), CH_UTF8));
100 : }
101 57604 : if (r->profile_path) {
102 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->profile_path, CH_UTF8)));
103 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
104 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->profile_path, CH_UTF8)));
105 57388 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->profile_path, ndr_charset_length(r->profile_path, CH_UTF8), sizeof(uint8_t), CH_UTF8));
106 : }
107 57604 : if (r->home_directory) {
108 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->home_directory, CH_UTF8)));
109 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
110 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->home_directory, CH_UTF8)));
111 57388 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->home_directory, ndr_charset_length(r->home_directory, CH_UTF8), sizeof(uint8_t), CH_UTF8));
112 : }
113 57604 : if (r->home_drive) {
114 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->home_drive, CH_UTF8)));
115 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
116 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->home_drive, CH_UTF8)));
117 57388 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->home_drive, ndr_charset_length(r->home_drive, CH_UTF8), sizeof(uint8_t), CH_UTF8));
118 : }
119 57604 : if (r->logon_server) {
120 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->logon_server, CH_UTF8)));
121 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
122 57388 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->logon_server, CH_UTF8)));
123 57388 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->logon_server, ndr_charset_length(r->logon_server, CH_UTF8), sizeof(uint8_t), CH_UTF8));
124 : }
125 : }
126 57604 : return NDR_ERR_SUCCESS;
127 : }
128 :
129 43351 : _PUBLIC_ enum ndr_err_code ndr_pull_auth_user_info(struct ndr_pull *ndr, int ndr_flags, struct auth_user_info *r)
130 : {
131 : uint32_t _ptr_account_name;
132 43351 : uint32_t size_account_name_1 = 0;
133 43351 : uint32_t length_account_name_1 = 0;
134 43351 : TALLOC_CTX *_mem_save_account_name_0 = NULL;
135 : uint32_t _ptr_user_principal_name;
136 43351 : uint32_t size_user_principal_name_1 = 0;
137 43351 : uint32_t length_user_principal_name_1 = 0;
138 43351 : TALLOC_CTX *_mem_save_user_principal_name_0 = NULL;
139 : uint32_t _ptr_domain_name;
140 43351 : uint32_t size_domain_name_1 = 0;
141 43351 : uint32_t length_domain_name_1 = 0;
142 43351 : TALLOC_CTX *_mem_save_domain_name_0 = NULL;
143 : uint32_t _ptr_dns_domain_name;
144 43351 : uint32_t size_dns_domain_name_1 = 0;
145 43351 : uint32_t length_dns_domain_name_1 = 0;
146 43351 : TALLOC_CTX *_mem_save_dns_domain_name_0 = NULL;
147 : uint32_t _ptr_full_name;
148 43351 : uint32_t size_full_name_1 = 0;
149 43351 : uint32_t length_full_name_1 = 0;
150 43351 : TALLOC_CTX *_mem_save_full_name_0 = NULL;
151 : uint32_t _ptr_logon_script;
152 43351 : uint32_t size_logon_script_1 = 0;
153 43351 : uint32_t length_logon_script_1 = 0;
154 43351 : TALLOC_CTX *_mem_save_logon_script_0 = NULL;
155 : uint32_t _ptr_profile_path;
156 43351 : uint32_t size_profile_path_1 = 0;
157 43351 : uint32_t length_profile_path_1 = 0;
158 43351 : TALLOC_CTX *_mem_save_profile_path_0 = NULL;
159 : uint32_t _ptr_home_directory;
160 43351 : uint32_t size_home_directory_1 = 0;
161 43351 : uint32_t length_home_directory_1 = 0;
162 43351 : TALLOC_CTX *_mem_save_home_directory_0 = NULL;
163 : uint32_t _ptr_home_drive;
164 43351 : uint32_t size_home_drive_1 = 0;
165 43351 : uint32_t length_home_drive_1 = 0;
166 43351 : TALLOC_CTX *_mem_save_home_drive_0 = NULL;
167 : uint32_t _ptr_logon_server;
168 43351 : uint32_t size_logon_server_1 = 0;
169 43351 : uint32_t length_logon_server_1 = 0;
170 43351 : TALLOC_CTX *_mem_save_logon_server_0 = NULL;
171 43351 : NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
172 43351 : if (ndr_flags & NDR_SCALARS) {
173 43351 : NDR_CHECK(ndr_pull_align(ndr, 5));
174 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_account_name));
175 43351 : if (_ptr_account_name) {
176 43351 : NDR_PULL_ALLOC(ndr, r->account_name);
177 : } else {
178 0 : r->account_name = NULL;
179 : }
180 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_user_principal_name));
181 43351 : if (_ptr_user_principal_name) {
182 24473 : NDR_PULL_ALLOC(ndr, r->user_principal_name);
183 : } else {
184 18878 : r->user_principal_name = NULL;
185 : }
186 43351 : NDR_CHECK(ndr_pull_uint8(ndr, NDR_SCALARS, &r->user_principal_constructed));
187 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_domain_name));
188 43351 : if (_ptr_domain_name) {
189 43351 : NDR_PULL_ALLOC(ndr, r->domain_name);
190 : } else {
191 0 : r->domain_name = NULL;
192 : }
193 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_dns_domain_name));
194 43351 : if (_ptr_dns_domain_name) {
195 24473 : NDR_PULL_ALLOC(ndr, r->dns_domain_name);
196 : } else {
197 18878 : r->dns_domain_name = NULL;
198 : }
199 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_full_name));
200 43351 : if (_ptr_full_name) {
201 43149 : NDR_PULL_ALLOC(ndr, r->full_name);
202 : } else {
203 202 : r->full_name = NULL;
204 : }
205 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_logon_script));
206 43351 : if (_ptr_logon_script) {
207 43149 : NDR_PULL_ALLOC(ndr, r->logon_script);
208 : } else {
209 202 : r->logon_script = NULL;
210 : }
211 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_profile_path));
212 43351 : if (_ptr_profile_path) {
213 43149 : NDR_PULL_ALLOC(ndr, r->profile_path);
214 : } else {
215 202 : r->profile_path = NULL;
216 : }
217 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_home_directory));
218 43351 : if (_ptr_home_directory) {
219 43149 : NDR_PULL_ALLOC(ndr, r->home_directory);
220 : } else {
221 202 : r->home_directory = NULL;
222 : }
223 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_home_drive));
224 43351 : if (_ptr_home_drive) {
225 43149 : NDR_PULL_ALLOC(ndr, r->home_drive);
226 : } else {
227 202 : r->home_drive = NULL;
228 : }
229 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_logon_server));
230 43351 : if (_ptr_logon_server) {
231 43149 : NDR_PULL_ALLOC(ndr, r->logon_server);
232 : } else {
233 202 : r->logon_server = NULL;
234 : }
235 43351 : NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->last_logon));
236 43351 : NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->last_logoff));
237 43351 : NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->acct_expiry));
238 43351 : NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->last_password_change));
239 43351 : NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->allow_password_change));
240 43351 : NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->force_password_change));
241 43351 : NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->logon_count));
242 43351 : NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->bad_password_count));
243 43351 : NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->acct_flags));
244 43351 : NDR_CHECK(ndr_pull_uint8(ndr, NDR_SCALARS, &r->authenticated));
245 43351 : NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
246 : }
247 43351 : if (ndr_flags & NDR_BUFFERS) {
248 43351 : if (r->account_name) {
249 43351 : _mem_save_account_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
250 43351 : NDR_PULL_SET_MEM_CTX(ndr, r->account_name, 0);
251 43351 : NDR_CHECK(ndr_pull_array_size(ndr, &r->account_name));
252 43351 : NDR_CHECK(ndr_pull_array_length(ndr, &r->account_name));
253 43351 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->account_name, &size_account_name_1));
254 43351 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->account_name, &length_account_name_1));
255 43351 : if (length_account_name_1 > size_account_name_1) {
256 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_account_name_1, length_account_name_1);
257 : }
258 43351 : NDR_CHECK(ndr_check_string_terminator(ndr, length_account_name_1, sizeof(uint8_t)));
259 43351 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->account_name, length_account_name_1, sizeof(uint8_t), CH_UTF8));
260 43351 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_account_name_0, 0);
261 : }
262 43351 : if (r->user_principal_name) {
263 24473 : _mem_save_user_principal_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
264 24473 : NDR_PULL_SET_MEM_CTX(ndr, r->user_principal_name, 0);
265 24473 : NDR_CHECK(ndr_pull_array_size(ndr, &r->user_principal_name));
266 24473 : NDR_CHECK(ndr_pull_array_length(ndr, &r->user_principal_name));
267 24473 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->user_principal_name, &size_user_principal_name_1));
268 24473 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->user_principal_name, &length_user_principal_name_1));
269 24473 : if (length_user_principal_name_1 > size_user_principal_name_1) {
270 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_user_principal_name_1, length_user_principal_name_1);
271 : }
272 24473 : NDR_CHECK(ndr_check_string_terminator(ndr, length_user_principal_name_1, sizeof(uint8_t)));
273 24473 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user_principal_name, length_user_principal_name_1, sizeof(uint8_t), CH_UTF8));
274 24473 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_user_principal_name_0, 0);
275 : }
276 43351 : if (r->domain_name) {
277 43351 : _mem_save_domain_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
278 43351 : NDR_PULL_SET_MEM_CTX(ndr, r->domain_name, 0);
279 43351 : NDR_CHECK(ndr_pull_array_size(ndr, &r->domain_name));
280 43351 : NDR_CHECK(ndr_pull_array_length(ndr, &r->domain_name));
281 43351 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->domain_name, &size_domain_name_1));
282 43351 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->domain_name, &length_domain_name_1));
283 43351 : if (length_domain_name_1 > size_domain_name_1) {
284 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_domain_name_1, length_domain_name_1);
285 : }
286 43351 : NDR_CHECK(ndr_check_string_terminator(ndr, length_domain_name_1, sizeof(uint8_t)));
287 43351 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->domain_name, length_domain_name_1, sizeof(uint8_t), CH_UTF8));
288 43351 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_domain_name_0, 0);
289 : }
290 43351 : if (r->dns_domain_name) {
291 24473 : _mem_save_dns_domain_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
292 24473 : NDR_PULL_SET_MEM_CTX(ndr, r->dns_domain_name, 0);
293 24473 : NDR_CHECK(ndr_pull_array_size(ndr, &r->dns_domain_name));
294 24473 : NDR_CHECK(ndr_pull_array_length(ndr, &r->dns_domain_name));
295 24473 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->dns_domain_name, &size_dns_domain_name_1));
296 24473 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->dns_domain_name, &length_dns_domain_name_1));
297 24473 : if (length_dns_domain_name_1 > size_dns_domain_name_1) {
298 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_dns_domain_name_1, length_dns_domain_name_1);
299 : }
300 24473 : NDR_CHECK(ndr_check_string_terminator(ndr, length_dns_domain_name_1, sizeof(uint8_t)));
301 24473 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->dns_domain_name, length_dns_domain_name_1, sizeof(uint8_t), CH_UTF8));
302 24473 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_dns_domain_name_0, 0);
303 : }
304 43351 : if (r->full_name) {
305 43149 : _mem_save_full_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
306 43149 : NDR_PULL_SET_MEM_CTX(ndr, r->full_name, 0);
307 43149 : NDR_CHECK(ndr_pull_array_size(ndr, &r->full_name));
308 43149 : NDR_CHECK(ndr_pull_array_length(ndr, &r->full_name));
309 43149 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->full_name, &size_full_name_1));
310 43149 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->full_name, &length_full_name_1));
311 43149 : if (length_full_name_1 > size_full_name_1) {
312 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_full_name_1, length_full_name_1);
313 : }
314 43149 : NDR_CHECK(ndr_check_string_terminator(ndr, length_full_name_1, sizeof(uint8_t)));
315 43149 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->full_name, length_full_name_1, sizeof(uint8_t), CH_UTF8));
316 43149 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_full_name_0, 0);
317 : }
318 43351 : if (r->logon_script) {
319 43149 : _mem_save_logon_script_0 = NDR_PULL_GET_MEM_CTX(ndr);
320 43149 : NDR_PULL_SET_MEM_CTX(ndr, r->logon_script, 0);
321 43149 : NDR_CHECK(ndr_pull_array_size(ndr, &r->logon_script));
322 43149 : NDR_CHECK(ndr_pull_array_length(ndr, &r->logon_script));
323 43149 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->logon_script, &size_logon_script_1));
324 43149 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->logon_script, &length_logon_script_1));
325 43149 : if (length_logon_script_1 > size_logon_script_1) {
326 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_logon_script_1, length_logon_script_1);
327 : }
328 43149 : NDR_CHECK(ndr_check_string_terminator(ndr, length_logon_script_1, sizeof(uint8_t)));
329 43149 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->logon_script, length_logon_script_1, sizeof(uint8_t), CH_UTF8));
330 43149 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_logon_script_0, 0);
331 : }
332 43351 : if (r->profile_path) {
333 43149 : _mem_save_profile_path_0 = NDR_PULL_GET_MEM_CTX(ndr);
334 43149 : NDR_PULL_SET_MEM_CTX(ndr, r->profile_path, 0);
335 43149 : NDR_CHECK(ndr_pull_array_size(ndr, &r->profile_path));
336 43149 : NDR_CHECK(ndr_pull_array_length(ndr, &r->profile_path));
337 43149 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->profile_path, &size_profile_path_1));
338 43149 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->profile_path, &length_profile_path_1));
339 43149 : if (length_profile_path_1 > size_profile_path_1) {
340 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_profile_path_1, length_profile_path_1);
341 : }
342 43149 : NDR_CHECK(ndr_check_string_terminator(ndr, length_profile_path_1, sizeof(uint8_t)));
343 43149 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->profile_path, length_profile_path_1, sizeof(uint8_t), CH_UTF8));
344 43149 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_profile_path_0, 0);
345 : }
346 43351 : if (r->home_directory) {
347 43149 : _mem_save_home_directory_0 = NDR_PULL_GET_MEM_CTX(ndr);
348 43149 : NDR_PULL_SET_MEM_CTX(ndr, r->home_directory, 0);
349 43149 : NDR_CHECK(ndr_pull_array_size(ndr, &r->home_directory));
350 43149 : NDR_CHECK(ndr_pull_array_length(ndr, &r->home_directory));
351 43149 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->home_directory, &size_home_directory_1));
352 43149 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->home_directory, &length_home_directory_1));
353 43149 : if (length_home_directory_1 > size_home_directory_1) {
354 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_home_directory_1, length_home_directory_1);
355 : }
356 43149 : NDR_CHECK(ndr_check_string_terminator(ndr, length_home_directory_1, sizeof(uint8_t)));
357 43149 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->home_directory, length_home_directory_1, sizeof(uint8_t), CH_UTF8));
358 43149 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_home_directory_0, 0);
359 : }
360 43351 : if (r->home_drive) {
361 43149 : _mem_save_home_drive_0 = NDR_PULL_GET_MEM_CTX(ndr);
362 43149 : NDR_PULL_SET_MEM_CTX(ndr, r->home_drive, 0);
363 43149 : NDR_CHECK(ndr_pull_array_size(ndr, &r->home_drive));
364 43149 : NDR_CHECK(ndr_pull_array_length(ndr, &r->home_drive));
365 43149 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->home_drive, &size_home_drive_1));
366 43149 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->home_drive, &length_home_drive_1));
367 43149 : if (length_home_drive_1 > size_home_drive_1) {
368 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_home_drive_1, length_home_drive_1);
369 : }
370 43149 : NDR_CHECK(ndr_check_string_terminator(ndr, length_home_drive_1, sizeof(uint8_t)));
371 43149 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->home_drive, length_home_drive_1, sizeof(uint8_t), CH_UTF8));
372 43149 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_home_drive_0, 0);
373 : }
374 43351 : if (r->logon_server) {
375 43149 : _mem_save_logon_server_0 = NDR_PULL_GET_MEM_CTX(ndr);
376 43149 : NDR_PULL_SET_MEM_CTX(ndr, r->logon_server, 0);
377 43149 : NDR_CHECK(ndr_pull_array_size(ndr, &r->logon_server));
378 43149 : NDR_CHECK(ndr_pull_array_length(ndr, &r->logon_server));
379 43149 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->logon_server, &size_logon_server_1));
380 43149 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->logon_server, &length_logon_server_1));
381 43149 : if (length_logon_server_1 > size_logon_server_1) {
382 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_logon_server_1, length_logon_server_1);
383 : }
384 43149 : NDR_CHECK(ndr_check_string_terminator(ndr, length_logon_server_1, sizeof(uint8_t)));
385 43149 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->logon_server, length_logon_server_1, sizeof(uint8_t), CH_UTF8));
386 43149 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_logon_server_0, 0);
387 : }
388 : }
389 43351 : return NDR_ERR_SUCCESS;
390 : }
391 :
392 0 : static void ndr_print_flags_auth_user_info(struct ndr_print *ndr, const char *name, int unused, const struct auth_user_info *r)
393 : {
394 0 : ndr_print_auth_user_info(ndr, name, r);
395 0 : }
396 :
397 0 : _PUBLIC_ void ndr_print_auth_user_info(struct ndr_print *ndr, const char *name, const struct auth_user_info *r)
398 : {
399 0 : ndr_print_struct(ndr, name, "auth_user_info");
400 0 : if (r == NULL) { ndr_print_null(ndr); return; }
401 0 : ndr->depth++;
402 0 : ndr_print_ptr(ndr, "account_name", r->account_name);
403 0 : ndr->depth++;
404 0 : if (r->account_name) {
405 0 : ndr_print_string(ndr, "account_name", r->account_name);
406 : }
407 0 : ndr->depth--;
408 0 : ndr_print_ptr(ndr, "user_principal_name", r->user_principal_name);
409 0 : ndr->depth++;
410 0 : if (r->user_principal_name) {
411 0 : ndr_print_string(ndr, "user_principal_name", r->user_principal_name);
412 : }
413 0 : ndr->depth--;
414 0 : ndr_print_uint8(ndr, "user_principal_constructed", r->user_principal_constructed);
415 0 : ndr_print_ptr(ndr, "domain_name", r->domain_name);
416 0 : ndr->depth++;
417 0 : if (r->domain_name) {
418 0 : ndr_print_string(ndr, "domain_name", r->domain_name);
419 : }
420 0 : ndr->depth--;
421 0 : ndr_print_ptr(ndr, "dns_domain_name", r->dns_domain_name);
422 0 : ndr->depth++;
423 0 : if (r->dns_domain_name) {
424 0 : ndr_print_string(ndr, "dns_domain_name", r->dns_domain_name);
425 : }
426 0 : ndr->depth--;
427 0 : ndr_print_ptr(ndr, "full_name", r->full_name);
428 0 : ndr->depth++;
429 0 : if (r->full_name) {
430 0 : ndr_print_string(ndr, "full_name", r->full_name);
431 : }
432 0 : ndr->depth--;
433 0 : ndr_print_ptr(ndr, "logon_script", r->logon_script);
434 0 : ndr->depth++;
435 0 : if (r->logon_script) {
436 0 : ndr_print_string(ndr, "logon_script", r->logon_script);
437 : }
438 0 : ndr->depth--;
439 0 : ndr_print_ptr(ndr, "profile_path", r->profile_path);
440 0 : ndr->depth++;
441 0 : if (r->profile_path) {
442 0 : ndr_print_string(ndr, "profile_path", r->profile_path);
443 : }
444 0 : ndr->depth--;
445 0 : ndr_print_ptr(ndr, "home_directory", r->home_directory);
446 0 : ndr->depth++;
447 0 : if (r->home_directory) {
448 0 : ndr_print_string(ndr, "home_directory", r->home_directory);
449 : }
450 0 : ndr->depth--;
451 0 : ndr_print_ptr(ndr, "home_drive", r->home_drive);
452 0 : ndr->depth++;
453 0 : if (r->home_drive) {
454 0 : ndr_print_string(ndr, "home_drive", r->home_drive);
455 : }
456 0 : ndr->depth--;
457 0 : ndr_print_ptr(ndr, "logon_server", r->logon_server);
458 0 : ndr->depth++;
459 0 : if (r->logon_server) {
460 0 : ndr_print_string(ndr, "logon_server", r->logon_server);
461 : }
462 0 : ndr->depth--;
463 0 : ndr_print_NTTIME(ndr, "last_logon", r->last_logon);
464 0 : ndr_print_NTTIME(ndr, "last_logoff", r->last_logoff);
465 0 : ndr_print_NTTIME(ndr, "acct_expiry", r->acct_expiry);
466 0 : ndr_print_NTTIME(ndr, "last_password_change", r->last_password_change);
467 0 : ndr_print_NTTIME(ndr, "allow_password_change", r->allow_password_change);
468 0 : ndr_print_NTTIME(ndr, "force_password_change", r->force_password_change);
469 0 : ndr_print_uint16(ndr, "logon_count", r->logon_count);
470 0 : ndr_print_uint16(ndr, "bad_password_count", r->bad_password_count);
471 0 : ndr_print_uint32(ndr, "acct_flags", r->acct_flags);
472 0 : ndr_print_uint8(ndr, "authenticated", r->authenticated);
473 0 : ndr->depth--;
474 : }
475 :
476 0 : _PUBLIC_ enum ndr_err_code ndr_push_auth_user_info_torture(struct ndr_push *ndr, int ndr_flags, const struct auth_user_info_torture *r)
477 : {
478 : uint32_t cntr_dc_sids_0;
479 0 : NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
480 0 : if (ndr_flags & NDR_SCALARS) {
481 0 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, r->num_dc_sids));
482 0 : NDR_CHECK(ndr_push_align(ndr, 4));
483 0 : NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->num_dc_sids));
484 0 : for (cntr_dc_sids_0 = 0; cntr_dc_sids_0 < (r->num_dc_sids); cntr_dc_sids_0++) {
485 0 : NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, &r->dc_sids[cntr_dc_sids_0]));
486 : }
487 0 : NDR_CHECK(ndr_push_trailer_align(ndr, 4));
488 : }
489 0 : if (ndr_flags & NDR_BUFFERS) {
490 : }
491 0 : return NDR_ERR_SUCCESS;
492 : }
493 :
494 0 : _PUBLIC_ enum ndr_err_code ndr_pull_auth_user_info_torture(struct ndr_pull *ndr, int ndr_flags, struct auth_user_info_torture *r)
495 : {
496 0 : uint32_t size_dc_sids_0 = 0;
497 : uint32_t cntr_dc_sids_0;
498 0 : TALLOC_CTX *_mem_save_dc_sids_0 = NULL;
499 0 : NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
500 0 : if (ndr_flags & NDR_SCALARS) {
501 0 : NDR_CHECK(ndr_pull_array_size(ndr, &r->dc_sids));
502 0 : NDR_CHECK(ndr_pull_align(ndr, 4));
503 0 : NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->num_dc_sids));
504 0 : NDR_CHECK(ndr_get_array_size(ndr, (void*)&r->dc_sids, &size_dc_sids_0));
505 0 : NDR_PULL_ALLOC_N(ndr, r->dc_sids, size_dc_sids_0);
506 0 : _mem_save_dc_sids_0 = NDR_PULL_GET_MEM_CTX(ndr);
507 0 : NDR_PULL_SET_MEM_CTX(ndr, r->dc_sids, 0);
508 0 : for (cntr_dc_sids_0 = 0; cntr_dc_sids_0 < (size_dc_sids_0); cntr_dc_sids_0++) {
509 0 : NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS, &r->dc_sids[cntr_dc_sids_0]));
510 : }
511 0 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_dc_sids_0, 0);
512 0 : if (r->dc_sids) {
513 0 : NDR_CHECK(ndr_check_steal_array_size(ndr, (void*)&r->dc_sids, r->num_dc_sids));
514 : }
515 0 : NDR_CHECK(ndr_pull_trailer_align(ndr, 4));
516 : }
517 0 : if (ndr_flags & NDR_BUFFERS) {
518 : }
519 0 : return NDR_ERR_SUCCESS;
520 : }
521 :
522 0 : static void ndr_print_flags_auth_user_info_torture(struct ndr_print *ndr, const char *name, int unused, const struct auth_user_info_torture *r)
523 : {
524 0 : ndr_print_auth_user_info_torture(ndr, name, r);
525 0 : }
526 :
527 0 : _PUBLIC_ void ndr_print_auth_user_info_torture(struct ndr_print *ndr, const char *name, const struct auth_user_info_torture *r)
528 : {
529 : uint32_t cntr_dc_sids_0;
530 0 : ndr_print_struct(ndr, name, "auth_user_info_torture");
531 0 : if (r == NULL) { ndr_print_null(ndr); return; }
532 0 : ndr->depth++;
533 0 : ndr_print_uint32(ndr, "num_dc_sids", r->num_dc_sids);
534 0 : ndr->print(ndr, "%s: ARRAY(%d)", "dc_sids", (int)r->num_dc_sids);
535 0 : ndr->depth++;
536 0 : for (cntr_dc_sids_0 = 0; cntr_dc_sids_0 < (r->num_dc_sids); cntr_dc_sids_0++) {
537 0 : ndr_print_dom_sid(ndr, "dc_sids", &r->dc_sids[cntr_dc_sids_0]);
538 : }
539 0 : ndr->depth--;
540 0 : ndr->depth--;
541 : }
542 :
543 39392 : _PUBLIC_ enum ndr_err_code ndr_push_auth_user_info_unix(struct ndr_push *ndr, int ndr_flags, const struct auth_user_info_unix *r)
544 : {
545 39392 : NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
546 39392 : if (ndr_flags & NDR_SCALARS) {
547 39392 : NDR_CHECK(ndr_push_align(ndr, 5));
548 39392 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->unix_name));
549 39392 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->sanitized_username));
550 39392 : NDR_CHECK(ndr_push_trailer_align(ndr, 5));
551 : }
552 39392 : if (ndr_flags & NDR_BUFFERS) {
553 39392 : if (r->unix_name) {
554 39392 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->unix_name, CH_UTF8)));
555 39392 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
556 39392 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->unix_name, CH_UTF8)));
557 39392 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->unix_name, ndr_charset_length(r->unix_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
558 : }
559 39392 : if (r->sanitized_username) {
560 39392 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->sanitized_username, CH_UTF8)));
561 39392 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
562 39392 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->sanitized_username, CH_UTF8)));
563 39392 : NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->sanitized_username, ndr_charset_length(r->sanitized_username, CH_UTF8), sizeof(uint8_t), CH_UTF8));
564 : }
565 : }
566 39392 : return NDR_ERR_SUCCESS;
567 : }
568 :
569 26702 : _PUBLIC_ enum ndr_err_code ndr_pull_auth_user_info_unix(struct ndr_pull *ndr, int ndr_flags, struct auth_user_info_unix *r)
570 : {
571 : uint32_t _ptr_unix_name;
572 26702 : uint32_t size_unix_name_1 = 0;
573 26702 : uint32_t length_unix_name_1 = 0;
574 26702 : TALLOC_CTX *_mem_save_unix_name_0 = NULL;
575 : uint32_t _ptr_sanitized_username;
576 26702 : uint32_t size_sanitized_username_1 = 0;
577 26702 : uint32_t length_sanitized_username_1 = 0;
578 26702 : TALLOC_CTX *_mem_save_sanitized_username_0 = NULL;
579 26702 : NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
580 26702 : if (ndr_flags & NDR_SCALARS) {
581 26702 : NDR_CHECK(ndr_pull_align(ndr, 5));
582 26702 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_unix_name));
583 26702 : if (_ptr_unix_name) {
584 26702 : NDR_PULL_ALLOC(ndr, r->unix_name);
585 : } else {
586 0 : r->unix_name = NULL;
587 : }
588 26702 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sanitized_username));
589 26702 : if (_ptr_sanitized_username) {
590 26702 : NDR_PULL_ALLOC(ndr, r->sanitized_username);
591 : } else {
592 0 : r->sanitized_username = NULL;
593 : }
594 26702 : NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
595 : }
596 26702 : if (ndr_flags & NDR_BUFFERS) {
597 26702 : if (r->unix_name) {
598 26702 : _mem_save_unix_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
599 26702 : NDR_PULL_SET_MEM_CTX(ndr, r->unix_name, 0);
600 26702 : NDR_CHECK(ndr_pull_array_size(ndr, &r->unix_name));
601 26702 : NDR_CHECK(ndr_pull_array_length(ndr, &r->unix_name));
602 26702 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->unix_name, &size_unix_name_1));
603 26702 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->unix_name, &length_unix_name_1));
604 26702 : if (length_unix_name_1 > size_unix_name_1) {
605 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_unix_name_1, length_unix_name_1);
606 : }
607 26702 : NDR_CHECK(ndr_check_string_terminator(ndr, length_unix_name_1, sizeof(uint8_t)));
608 26702 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->unix_name, length_unix_name_1, sizeof(uint8_t), CH_UTF8));
609 26702 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_unix_name_0, 0);
610 : }
611 26702 : if (r->sanitized_username) {
612 26702 : _mem_save_sanitized_username_0 = NDR_PULL_GET_MEM_CTX(ndr);
613 26702 : NDR_PULL_SET_MEM_CTX(ndr, r->sanitized_username, 0);
614 26702 : NDR_CHECK(ndr_pull_array_size(ndr, &r->sanitized_username));
615 26702 : NDR_CHECK(ndr_pull_array_length(ndr, &r->sanitized_username));
616 26702 : NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->sanitized_username, &size_sanitized_username_1));
617 26702 : NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->sanitized_username, &length_sanitized_username_1));
618 26702 : if (length_sanitized_username_1 > size_sanitized_username_1) {
619 0 : return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_sanitized_username_1, length_sanitized_username_1);
620 : }
621 26702 : NDR_CHECK(ndr_check_string_terminator(ndr, length_sanitized_username_1, sizeof(uint8_t)));
622 26702 : NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->sanitized_username, length_sanitized_username_1, sizeof(uint8_t), CH_UTF8));
623 26702 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sanitized_username_0, 0);
624 : }
625 : }
626 26702 : return NDR_ERR_SUCCESS;
627 : }
628 :
629 0 : static void ndr_print_flags_auth_user_info_unix(struct ndr_print *ndr, const char *name, int unused, const struct auth_user_info_unix *r)
630 : {
631 0 : ndr_print_auth_user_info_unix(ndr, name, r);
632 0 : }
633 :
634 0 : _PUBLIC_ void ndr_print_auth_user_info_unix(struct ndr_print *ndr, const char *name, const struct auth_user_info_unix *r)
635 : {
636 0 : ndr_print_struct(ndr, name, "auth_user_info_unix");
637 0 : if (r == NULL) { ndr_print_null(ndr); return; }
638 0 : ndr->depth++;
639 0 : ndr_print_ptr(ndr, "unix_name", r->unix_name);
640 0 : ndr->depth++;
641 0 : if (r->unix_name) {
642 0 : ndr_print_string(ndr, "unix_name", r->unix_name);
643 : }
644 0 : ndr->depth--;
645 0 : ndr_print_ptr(ndr, "sanitized_username", r->sanitized_username);
646 0 : ndr->depth++;
647 0 : if (r->sanitized_username) {
648 0 : ndr_print_string(ndr, "sanitized_username", r->sanitized_username);
649 : }
650 0 : ndr->depth--;
651 0 : ndr->depth--;
652 : }
653 :
654 57604 : static enum ndr_err_code ndr_push_ticket_type(struct ndr_push *ndr, int ndr_flags, enum ticket_type r)
655 : {
656 57604 : NDR_CHECK(ndr_push_enum_uint1632(ndr, NDR_SCALARS, r));
657 57604 : return NDR_ERR_SUCCESS;
658 : }
659 :
660 43351 : static enum ndr_err_code ndr_pull_ticket_type(struct ndr_pull *ndr, int ndr_flags, enum ticket_type *r)
661 : {
662 : uint16_t v;
663 43351 : NDR_CHECK(ndr_pull_enum_uint1632(ndr, NDR_SCALARS, &v));
664 43351 : *r = v;
665 43351 : return NDR_ERR_SUCCESS;
666 : }
667 :
668 0 : _PUBLIC_ void ndr_print_ticket_type(struct ndr_print *ndr, const char *name, enum ticket_type r)
669 : {
670 0 : const char *val = NULL;
671 :
672 0 : switch (r) {
673 0 : case TICKET_TYPE_UNKNOWN: val = "TICKET_TYPE_UNKNOWN"; break;
674 0 : case TICKET_TYPE_TGT: val = "TICKET_TYPE_TGT"; break;
675 0 : case TICKET_TYPE_NON_TGT: val = "TICKET_TYPE_NON_TGT"; break;
676 : }
677 0 : ndr_print_enum(ndr, name, "ENUM", val, r);
678 0 : }
679 :
680 0 : _PUBLIC_ enum ndr_err_code ndr_push_auth_user_info_dc(struct ndr_push *ndr, int ndr_flags, const struct auth_user_info_dc *r)
681 : {
682 : uint32_t cntr_sids_0;
683 0 : NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
684 0 : if (ndr_flags & NDR_SCALARS) {
685 0 : NDR_CHECK(ndr_push_align(ndr, 5));
686 0 : NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->num_sids));
687 0 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, r->num_sids));
688 0 : for (cntr_sids_0 = 0; cntr_sids_0 < (r->num_sids); cntr_sids_0++) {
689 0 : NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, &r->sids[cntr_sids_0]));
690 : }
691 0 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->info));
692 0 : NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->user_session_key));
693 0 : NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->lm_session_key));
694 0 : NDR_CHECK(ndr_push_ticket_type(ndr, NDR_SCALARS, r->ticket_type));
695 0 : NDR_CHECK(ndr_push_trailer_align(ndr, 5));
696 : }
697 0 : if (ndr_flags & NDR_BUFFERS) {
698 0 : if (r->info) {
699 0 : NDR_CHECK(ndr_push_auth_user_info(ndr, NDR_SCALARS|NDR_BUFFERS, r->info));
700 : }
701 : }
702 0 : return NDR_ERR_SUCCESS;
703 : }
704 :
705 0 : _PUBLIC_ enum ndr_err_code ndr_pull_auth_user_info_dc(struct ndr_pull *ndr, int ndr_flags, struct auth_user_info_dc *r)
706 : {
707 0 : uint32_t size_sids_0 = 0;
708 : uint32_t cntr_sids_0;
709 0 : TALLOC_CTX *_mem_save_sids_0 = NULL;
710 : uint32_t _ptr_info;
711 0 : TALLOC_CTX *_mem_save_info_0 = NULL;
712 0 : NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
713 0 : if (ndr_flags & NDR_SCALARS) {
714 0 : NDR_CHECK(ndr_pull_align(ndr, 5));
715 0 : NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->num_sids));
716 0 : NDR_CHECK(ndr_pull_array_size(ndr, &r->sids));
717 0 : NDR_CHECK(ndr_get_array_size(ndr, (void*)&r->sids, &size_sids_0));
718 0 : NDR_PULL_ALLOC_N(ndr, r->sids, size_sids_0);
719 0 : _mem_save_sids_0 = NDR_PULL_GET_MEM_CTX(ndr);
720 0 : NDR_PULL_SET_MEM_CTX(ndr, r->sids, 0);
721 0 : for (cntr_sids_0 = 0; cntr_sids_0 < (size_sids_0); cntr_sids_0++) {
722 0 : NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS, &r->sids[cntr_sids_0]));
723 : }
724 0 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sids_0, 0);
725 0 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_info));
726 0 : if (_ptr_info) {
727 0 : NDR_PULL_ALLOC(ndr, r->info);
728 : } else {
729 0 : r->info = NULL;
730 : }
731 0 : NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->user_session_key));
732 0 : NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->lm_session_key));
733 0 : NDR_CHECK(ndr_pull_ticket_type(ndr, NDR_SCALARS, &r->ticket_type));
734 0 : if (r->sids) {
735 0 : NDR_CHECK(ndr_check_steal_array_size(ndr, (void*)&r->sids, r->num_sids));
736 : }
737 0 : NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
738 : }
739 0 : if (ndr_flags & NDR_BUFFERS) {
740 0 : if (r->info) {
741 0 : _mem_save_info_0 = NDR_PULL_GET_MEM_CTX(ndr);
742 0 : NDR_PULL_SET_MEM_CTX(ndr, r->info, 0);
743 0 : NDR_CHECK(ndr_pull_auth_user_info(ndr, NDR_SCALARS|NDR_BUFFERS, r->info));
744 0 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_info_0, 0);
745 : }
746 : }
747 0 : return NDR_ERR_SUCCESS;
748 : }
749 :
750 0 : static void ndr_print_flags_auth_user_info_dc(struct ndr_print *ndr, const char *name, int unused, const struct auth_user_info_dc *r)
751 : {
752 0 : ndr_print_auth_user_info_dc(ndr, name, r);
753 0 : }
754 :
755 0 : _PUBLIC_ void ndr_print_auth_user_info_dc(struct ndr_print *ndr, const char *name, const struct auth_user_info_dc *r)
756 : {
757 : uint32_t cntr_sids_0;
758 0 : ndr_print_struct(ndr, name, "auth_user_info_dc");
759 0 : if (r == NULL) { ndr_print_null(ndr); return; }
760 0 : ndr->depth++;
761 0 : ndr_print_uint32(ndr, "num_sids", r->num_sids);
762 0 : ndr->print(ndr, "%s: ARRAY(%d)", "sids", (int)r->num_sids);
763 0 : ndr->depth++;
764 0 : for (cntr_sids_0 = 0; cntr_sids_0 < (r->num_sids); cntr_sids_0++) {
765 0 : ndr_print_dom_sid(ndr, "sids", &r->sids[cntr_sids_0]);
766 : }
767 0 : ndr->depth--;
768 0 : ndr_print_ptr(ndr, "info", r->info);
769 0 : ndr->depth++;
770 0 : if (r->info) {
771 0 : ndr_print_auth_user_info(ndr, "info", r->info);
772 : }
773 0 : ndr->depth--;
774 0 : ndr_print_ticket_type(ndr, "ticket_type", r->ticket_type);
775 0 : ndr->depth--;
776 : }
777 :
778 57604 : _PUBLIC_ enum ndr_err_code ndr_push_auth_session_info(struct ndr_push *ndr, int ndr_flags, const struct auth_session_info *r)
779 : {
780 57604 : NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
781 57604 : if (ndr_flags & NDR_SCALARS) {
782 57604 : NDR_CHECK(ndr_push_align(ndr, 5));
783 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->security_token));
784 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->unix_token));
785 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->info));
786 57604 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->unix_info));
787 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
788 : /* [ignore] 'torture' */
789 57604 : NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->session_key));
790 57604 : NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
791 : /* [ignore] 'credentials' */
792 57604 : NDR_CHECK(ndr_push_GUID(ndr, NDR_SCALARS, &r->unique_session_token));
793 57604 : NDR_CHECK(ndr_push_ticket_type(ndr, NDR_SCALARS, r->ticket_type));
794 57604 : NDR_CHECK(ndr_push_trailer_align(ndr, 5));
795 : }
796 57604 : if (ndr_flags & NDR_BUFFERS) {
797 57604 : if (r->security_token) {
798 57604 : NDR_CHECK(ndr_push_security_token(ndr, NDR_SCALARS, r->security_token));
799 : }
800 57604 : if (r->unix_token) {
801 39392 : NDR_CHECK(ndr_push_security_unix_token(ndr, NDR_SCALARS, r->unix_token));
802 : }
803 57604 : if (r->info) {
804 57604 : NDR_CHECK(ndr_push_auth_user_info(ndr, NDR_SCALARS|NDR_BUFFERS, r->info));
805 : }
806 57604 : if (r->unix_info) {
807 39392 : NDR_CHECK(ndr_push_auth_user_info_unix(ndr, NDR_SCALARS|NDR_BUFFERS, r->unix_info));
808 : }
809 : /* [ignore] 'torture' */
810 : /* [ignore] 'credentials' */
811 : }
812 57604 : return NDR_ERR_SUCCESS;
813 : }
814 :
815 43351 : _PUBLIC_ enum ndr_err_code ndr_pull_auth_session_info(struct ndr_pull *ndr, int ndr_flags, struct auth_session_info *r)
816 : {
817 : uint32_t _ptr_security_token;
818 43351 : TALLOC_CTX *_mem_save_security_token_0 = NULL;
819 : uint32_t _ptr_unix_token;
820 43351 : TALLOC_CTX *_mem_save_unix_token_0 = NULL;
821 : uint32_t _ptr_info;
822 43351 : TALLOC_CTX *_mem_save_info_0 = NULL;
823 : uint32_t _ptr_unix_info;
824 43351 : TALLOC_CTX *_mem_save_unix_info_0 = NULL;
825 : uint32_t _ptr_torture;
826 : uint32_t _ptr_credentials;
827 43351 : NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
828 43351 : if (ndr_flags & NDR_SCALARS) {
829 43351 : NDR_CHECK(ndr_pull_align(ndr, 5));
830 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_security_token));
831 43351 : if (_ptr_security_token) {
832 43351 : NDR_PULL_ALLOC(ndr, r->security_token);
833 : } else {
834 0 : r->security_token = NULL;
835 : }
836 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_unix_token));
837 43351 : if (_ptr_unix_token) {
838 26702 : NDR_PULL_ALLOC(ndr, r->unix_token);
839 : } else {
840 16649 : r->unix_token = NULL;
841 : }
842 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_info));
843 43351 : if (_ptr_info) {
844 43351 : NDR_PULL_ALLOC(ndr, r->info);
845 : } else {
846 0 : r->info = NULL;
847 : }
848 43351 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_unix_info));
849 43351 : if (_ptr_unix_info) {
850 26702 : NDR_PULL_ALLOC(ndr, r->unix_info);
851 : } else {
852 16649 : r->unix_info = NULL;
853 : }
854 43351 : NDR_CHECK(ndr_pull_uint3264(ndr, NDR_SCALARS, &_ptr_torture));
855 43351 : _ptr_torture = 0;
856 43351 : if (_ptr_torture) {
857 : } else {
858 43351 : r->torture = NULL;
859 : }
860 : /* [ignore] 'torture' */
861 43351 : NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->session_key));
862 43351 : NDR_CHECK(ndr_pull_uint3264(ndr, NDR_SCALARS, &_ptr_credentials));
863 43351 : _ptr_credentials = 0;
864 43351 : if (_ptr_credentials) {
865 : } else {
866 43351 : r->credentials = NULL;
867 : }
868 : /* [ignore] 'credentials' */
869 43351 : NDR_CHECK(ndr_pull_GUID(ndr, NDR_SCALARS, &r->unique_session_token));
870 43351 : NDR_CHECK(ndr_pull_ticket_type(ndr, NDR_SCALARS, &r->ticket_type));
871 43351 : NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
872 : }
873 43351 : if (ndr_flags & NDR_BUFFERS) {
874 43351 : if (r->security_token) {
875 43351 : _mem_save_security_token_0 = NDR_PULL_GET_MEM_CTX(ndr);
876 43351 : NDR_PULL_SET_MEM_CTX(ndr, r->security_token, 0);
877 43351 : NDR_CHECK(ndr_pull_security_token(ndr, NDR_SCALARS, r->security_token));
878 43351 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_security_token_0, 0);
879 : }
880 43351 : if (r->unix_token) {
881 26702 : _mem_save_unix_token_0 = NDR_PULL_GET_MEM_CTX(ndr);
882 26702 : NDR_PULL_SET_MEM_CTX(ndr, r->unix_token, 0);
883 26702 : NDR_CHECK(ndr_pull_security_unix_token(ndr, NDR_SCALARS, r->unix_token));
884 26702 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_unix_token_0, 0);
885 : }
886 43351 : if (r->info) {
887 43351 : _mem_save_info_0 = NDR_PULL_GET_MEM_CTX(ndr);
888 43351 : NDR_PULL_SET_MEM_CTX(ndr, r->info, 0);
889 43351 : NDR_CHECK(ndr_pull_auth_user_info(ndr, NDR_SCALARS|NDR_BUFFERS, r->info));
890 43351 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_info_0, 0);
891 : }
892 43351 : if (r->unix_info) {
893 26702 : _mem_save_unix_info_0 = NDR_PULL_GET_MEM_CTX(ndr);
894 26702 : NDR_PULL_SET_MEM_CTX(ndr, r->unix_info, 0);
895 26702 : NDR_CHECK(ndr_pull_auth_user_info_unix(ndr, NDR_SCALARS|NDR_BUFFERS, r->unix_info));
896 26702 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_unix_info_0, 0);
897 : }
898 : /* [ignore] 'torture' */
899 : /* [ignore] 'credentials' */
900 : }
901 43351 : return NDR_ERR_SUCCESS;
902 : }
903 :
904 0 : static void ndr_print_flags_auth_session_info(struct ndr_print *ndr, const char *name, int unused, const struct auth_session_info *r)
905 : {
906 0 : ndr_print_auth_session_info(ndr, name, r);
907 0 : }
908 :
909 0 : _PUBLIC_ void ndr_print_auth_session_info(struct ndr_print *ndr, const char *name, const struct auth_session_info *r)
910 : {
911 0 : ndr_print_struct(ndr, name, "auth_session_info");
912 0 : if (r == NULL) { ndr_print_null(ndr); return; }
913 0 : ndr->depth++;
914 0 : ndr_print_ptr(ndr, "security_token", r->security_token);
915 0 : ndr->depth++;
916 0 : if (r->security_token) {
917 0 : ndr_print_security_token(ndr, "security_token", r->security_token);
918 : }
919 0 : ndr->depth--;
920 0 : ndr_print_ptr(ndr, "unix_token", r->unix_token);
921 0 : ndr->depth++;
922 0 : if (r->unix_token) {
923 0 : ndr_print_security_unix_token(ndr, "unix_token", r->unix_token);
924 : }
925 0 : ndr->depth--;
926 0 : ndr_print_ptr(ndr, "info", r->info);
927 0 : ndr->depth++;
928 0 : if (r->info) {
929 0 : ndr_print_auth_user_info(ndr, "info", r->info);
930 : }
931 0 : ndr->depth--;
932 0 : ndr_print_ptr(ndr, "unix_info", r->unix_info);
933 0 : ndr->depth++;
934 0 : if (r->unix_info) {
935 0 : ndr_print_auth_user_info_unix(ndr, "unix_info", r->unix_info);
936 : }
937 0 : ndr->depth--;
938 0 : ndr_print_ptr(ndr, "torture", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NULL:r->torture);
939 : /* [ignore] 'torture' */
940 0 : ndr_print_ptr(ndr, "credentials", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NULL:r->credentials);
941 : /* [ignore] 'credentials' */
942 0 : ndr_print_GUID(ndr, "unique_session_token", &r->unique_session_token);
943 0 : ndr_print_ticket_type(ndr, "ticket_type", r->ticket_type);
944 0 : ndr->depth--;
945 : }
946 :
947 10986 : _PUBLIC_ enum ndr_err_code ndr_push_auth_session_info_transport(struct ndr_push *ndr, int ndr_flags, const struct auth_session_info_transport *r)
948 : {
949 10986 : NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
950 10986 : if (ndr_flags & NDR_SCALARS) {
951 10986 : NDR_CHECK(ndr_push_align(ndr, 5));
952 10986 : NDR_CHECK(ndr_push_unique_ptr(ndr, r->session_info));
953 10986 : NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->exported_gssapi_credentials));
954 10986 : NDR_CHECK(ndr_push_trailer_align(ndr, 5));
955 : }
956 10986 : if (ndr_flags & NDR_BUFFERS) {
957 10986 : if (r->session_info) {
958 10986 : NDR_CHECK(ndr_push_auth_session_info(ndr, NDR_SCALARS|NDR_BUFFERS, r->session_info));
959 : }
960 : }
961 10986 : return NDR_ERR_SUCCESS;
962 : }
963 :
964 6323 : _PUBLIC_ enum ndr_err_code ndr_pull_auth_session_info_transport(struct ndr_pull *ndr, int ndr_flags, struct auth_session_info_transport *r)
965 : {
966 : uint32_t _ptr_session_info;
967 6323 : TALLOC_CTX *_mem_save_session_info_0 = NULL;
968 6323 : NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
969 6323 : if (ndr_flags & NDR_SCALARS) {
970 6323 : NDR_CHECK(ndr_pull_align(ndr, 5));
971 6323 : NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_session_info));
972 6323 : if (_ptr_session_info) {
973 6323 : NDR_PULL_ALLOC(ndr, r->session_info);
974 : } else {
975 0 : r->session_info = NULL;
976 : }
977 6323 : NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->exported_gssapi_credentials));
978 6323 : NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
979 : }
980 6323 : if (ndr_flags & NDR_BUFFERS) {
981 6323 : if (r->session_info) {
982 6323 : _mem_save_session_info_0 = NDR_PULL_GET_MEM_CTX(ndr);
983 6323 : NDR_PULL_SET_MEM_CTX(ndr, r->session_info, 0);
984 6323 : NDR_CHECK(ndr_pull_auth_session_info(ndr, NDR_SCALARS|NDR_BUFFERS, r->session_info));
985 6323 : NDR_PULL_SET_MEM_CTX(ndr, _mem_save_session_info_0, 0);
986 : }
987 : }
988 6323 : return NDR_ERR_SUCCESS;
989 : }
990 :
991 0 : static void ndr_print_flags_auth_session_info_transport(struct ndr_print *ndr, const char *name, int unused, const struct auth_session_info_transport *r)
992 : {
993 0 : ndr_print_auth_session_info_transport(ndr, name, r);
994 0 : }
995 :
996 0 : _PUBLIC_ void ndr_print_auth_session_info_transport(struct ndr_print *ndr, const char *name, const struct auth_session_info_transport *r)
997 : {
998 0 : ndr_print_struct(ndr, name, "auth_session_info_transport");
999 0 : if (r == NULL) { ndr_print_null(ndr); return; }
1000 0 : ndr->depth++;
1001 0 : ndr_print_ptr(ndr, "session_info", r->session_info);
1002 0 : ndr->depth++;
1003 0 : if (r->session_info) {
1004 0 : ndr_print_auth_session_info(ndr, "session_info", r->session_info);
1005 : }
1006 0 : ndr->depth--;
1007 0 : ndr->depth--;
1008 : }
1009 :
1010 : #ifndef SKIP_NDR_TABLE_auth
1011 : static const struct ndr_interface_public_struct auth_public_structs[] = {
1012 : {
1013 : .name = "auth_user_info",
1014 : .struct_size = sizeof(struct auth_user_info ),
1015 : .ndr_push = (ndr_push_flags_fn_t) ndr_push_auth_user_info,
1016 : .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_auth_user_info,
1017 : .ndr_print = (ndr_print_function_t) ndr_print_flags_auth_user_info,
1018 : },
1019 : {
1020 : .name = "auth_user_info_torture",
1021 : .struct_size = sizeof(struct auth_user_info_torture ),
1022 : .ndr_push = (ndr_push_flags_fn_t) ndr_push_auth_user_info_torture,
1023 : .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_auth_user_info_torture,
1024 : .ndr_print = (ndr_print_function_t) ndr_print_flags_auth_user_info_torture,
1025 : },
1026 : {
1027 : .name = "auth_user_info_unix",
1028 : .struct_size = sizeof(struct auth_user_info_unix ),
1029 : .ndr_push = (ndr_push_flags_fn_t) ndr_push_auth_user_info_unix,
1030 : .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_auth_user_info_unix,
1031 : .ndr_print = (ndr_print_function_t) ndr_print_flags_auth_user_info_unix,
1032 : },
1033 : {
1034 : .name = "auth_user_info_dc",
1035 : .struct_size = sizeof(struct auth_user_info_dc ),
1036 : .ndr_push = (ndr_push_flags_fn_t) ndr_push_auth_user_info_dc,
1037 : .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_auth_user_info_dc,
1038 : .ndr_print = (ndr_print_function_t) ndr_print_flags_auth_user_info_dc,
1039 : },
1040 : {
1041 : .name = "auth_session_info",
1042 : .struct_size = sizeof(struct auth_session_info ),
1043 : .ndr_push = (ndr_push_flags_fn_t) ndr_push_auth_session_info,
1044 : .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_auth_session_info,
1045 : .ndr_print = (ndr_print_function_t) ndr_print_flags_auth_session_info,
1046 : },
1047 : {
1048 : .name = "auth_session_info_transport",
1049 : .struct_size = sizeof(struct auth_session_info_transport ),
1050 : .ndr_push = (ndr_push_flags_fn_t) ndr_push_auth_session_info_transport,
1051 : .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_auth_session_info_transport,
1052 : .ndr_print = (ndr_print_function_t) ndr_print_flags_auth_session_info_transport,
1053 : },
1054 : { .name = NULL }
1055 : };
1056 :
1057 : static const struct ndr_interface_call auth_calls[] = {
1058 : { .name = NULL }
1059 : };
1060 :
1061 : static const char * const auth_endpoint_strings[] = {
1062 : "ncacn_np:[\\pipe\\auth]",
1063 : };
1064 :
1065 : static const struct ndr_interface_string_array auth_endpoints = {
1066 : .count = 1,
1067 : .names = auth_endpoint_strings
1068 : };
1069 :
1070 : static const char * const auth_authservice_strings[] = {
1071 : "host",
1072 : };
1073 :
1074 : static const struct ndr_interface_string_array auth_authservices = {
1075 : .count = 1,
1076 : .names = auth_authservice_strings
1077 : };
1078 :
1079 :
1080 : const struct ndr_interface_table ndr_table_auth = {
1081 : .name = "auth",
1082 : .num_calls = 0,
1083 : .calls = auth_calls,
1084 : .num_public_structs = 6,
1085 : .public_structs = auth_public_structs,
1086 : .endpoints = &auth_endpoints,
1087 : .authservices = &auth_authservices
1088 : };
1089 :
1090 : #endif /* SKIP_NDR_TABLE_auth */
|