/*
Unix SMB/CIFS implementation.
Manually parsed structures found in DNSP
Copyright (C) Andrew Tridgell 2010
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see .
*/
#include "includes.h"
#include "librpc/gen_ndr/ndr_dnsp.h"
/*
print a dnsp_name
*/
_PUBLIC_ void ndr_print_dnsp_name(struct ndr_print *ndr, const char *name,
const char *dns_name)
{
ndr->print(ndr, "%-25s: %s", name, dns_name);
}
/*
pull a dnsp_name
*/
_PUBLIC_ enum ndr_err_code ndr_pull_dnsp_name(struct ndr_pull *ndr, int ndr_flags, const char **name)
{
uint8_t len, count, termination;
int i;
uint32_t total_len, raw_offset;
char *ret;
NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &len));
NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &count));
raw_offset = ndr->offset;
ret = talloc_strdup(ndr->current_mem_ctx, "");
if (!ret) {
return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp");
}
total_len = 1;
for (i=0; icurrent_mem_ctx, ret, char, newlen);
if (!ret) {
return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp");
}
NDR_CHECK(ndr_pull_bytes(ndr, (uint8_t *)&ret[total_len-1], sublen));
if (i != count-1) {
ret[newlen-2] = '.';
}
ret[newlen-1] = 0;
total_len = newlen;
}
NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &termination));
if (termination != 0) {
return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp - not NUL terminated");
}
if (ndr->offset > raw_offset + len) {
return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp - overrun by %u bytes",
ndr->offset - (raw_offset + len));
}
/* there could be additional pad bytes */
while (ndr->offset < raw_offset + len) {
uint8_t pad;
NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &pad));
}
(*name) = ret;
return NDR_ERR_SUCCESS;
}
enum ndr_err_code ndr_push_dnsp_name(struct ndr_push *ndr, int ndr_flags, const char *name)
{
int count, total_len, i;
/* count the dots */
for (count=i=0; name[i]; i++) {
if (name[i] == '.') count++;
}
total_len = strlen(name) + 1 + 1;
if (total_len > 255 || count > 255) {
return ndr_push_error(ndr, NDR_ERR_BUFSIZE,
"dns_name of length %d larger than 255", total_len);
}
NDR_CHECK(ndr_push_uint8(ndr, ndr_flags, (uint8_t)total_len));
NDR_CHECK(ndr_push_uint8(ndr, ndr_flags, (uint8_t)count));
for (i=0; iprint(ndr, "%-25s: %s", name, dns_string);
}
/*
pull a dnsp_string
*/
_PUBLIC_ enum ndr_err_code ndr_pull_dnsp_string(struct ndr_pull *ndr, int ndr_flags, const char **string)
{
uint8_t len;
uint32_t total_len;
char *ret;
NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &len));
ret = talloc_strdup(ndr->current_mem_ctx, "");
if (!ret) {
return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp");
}
total_len = 1;
ret = talloc_zero_array(ndr->current_mem_ctx, char, len+1);
if (!ret) {
return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp");
}
NDR_CHECK(ndr_pull_bytes(ndr, (uint8_t *)&ret[total_len-1], len));
total_len = len;
(*string) = ret;
NDR_PULL_ALIGN(ndr, 1);
return NDR_ERR_SUCCESS;
}
enum ndr_err_code ndr_push_dnsp_string(struct ndr_push *ndr, int ndr_flags, const char *string)
{
int total_len;
total_len = strlen(string) + 1;
if (total_len > 255) {
return ndr_push_error(ndr, NDR_ERR_BUFSIZE,
"dns_name of length %d larger than 255", total_len);
}
NDR_CHECK(ndr_push_uint8(ndr, ndr_flags, (uint8_t)total_len));
NDR_CHECK(ndr_push_bytes(ndr, (const uint8_t *)string, total_len - 1));
NDR_PUSH_ALIGN(ndr, 1);
return NDR_ERR_SUCCESS;
}