/* Unix SMB/CIFS implementation. Manually parsed structures found in DNSP Copyright (C) Andrew Tridgell 2010 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "librpc/gen_ndr/ndr_dnsp.h" /* print a dnsp_name */ _PUBLIC_ void ndr_print_dnsp_name(struct ndr_print *ndr, const char *name, const char *dns_name) { ndr->print(ndr, "%-25s: %s", name, dns_name); } /* pull a dnsp_name */ _PUBLIC_ enum ndr_err_code ndr_pull_dnsp_name(struct ndr_pull *ndr, int ndr_flags, const char **name) { uint8_t len, count, termination; int i; uint32_t total_len, raw_offset; char *ret; NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &len)); NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &count)); raw_offset = ndr->offset; ret = talloc_strdup(ndr->current_mem_ctx, ""); if (!ret) { return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp"); } total_len = 1; for (i=0; icurrent_mem_ctx, ret, char, newlen); if (!ret) { return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp"); } NDR_CHECK(ndr_pull_bytes(ndr, (uint8_t *)&ret[total_len-1], sublen)); if (i != count-1) { ret[newlen-2] = '.'; } ret[newlen-1] = 0; total_len = newlen; } NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &termination)); if (termination != 0) { return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp - not NUL terminated"); } if (ndr->offset > raw_offset + len) { return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp - overrun by %u bytes", ndr->offset - (raw_offset + len)); } /* there could be additional pad bytes */ while (ndr->offset < raw_offset + len) { uint8_t pad; NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &pad)); } (*name) = ret; return NDR_ERR_SUCCESS; } enum ndr_err_code ndr_push_dnsp_name(struct ndr_push *ndr, int ndr_flags, const char *name) { int count, total_len, i; /* count the dots */ for (count=i=0; name[i]; i++) { if (name[i] == '.') count++; } total_len = strlen(name) + 1; /* cope with names ending in '.' */ if (name[strlen(name)-1] != '.') { total_len++; count++; } if (total_len > 255 || count > 255) { return ndr_push_error(ndr, NDR_ERR_BUFSIZE, "dns_name of length %d larger than 255", total_len); } NDR_CHECK(ndr_push_uint8(ndr, ndr_flags, (uint8_t)total_len)); NDR_CHECK(ndr_push_uint8(ndr, ndr_flags, (uint8_t)count)); for (i=0; iprint(ndr, "%-25s: %s", name, dns_string); } /* pull a dnsp_string */ _PUBLIC_ enum ndr_err_code ndr_pull_dnsp_string(struct ndr_pull *ndr, int ndr_flags, const char **string) { uint8_t len; uint32_t total_len; char *ret; NDR_CHECK(ndr_pull_uint8(ndr, ndr_flags, &len)); ret = talloc_strdup(ndr->current_mem_ctx, ""); if (!ret) { return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp"); } total_len = 1; ret = talloc_zero_array(ndr->current_mem_ctx, char, len+1); if (!ret) { return ndr_pull_error(ndr, NDR_ERR_ALLOC, "Failed to pull dnsp"); } NDR_CHECK(ndr_pull_bytes(ndr, (uint8_t *)&ret[total_len-1], len)); total_len = len; (*string) = ret; NDR_PULL_ALIGN(ndr, 1); return NDR_ERR_SUCCESS; } enum ndr_err_code ndr_push_dnsp_string(struct ndr_push *ndr, int ndr_flags, const char *string) { int total_len; total_len = strlen(string) + 1; if (total_len > 255) { return ndr_push_error(ndr, NDR_ERR_BUFSIZE, "dns_name of length %d larger than 255", total_len); } NDR_CHECK(ndr_push_uint8(ndr, ndr_flags, (uint8_t)total_len)); NDR_CHECK(ndr_push_bytes(ndr, (const uint8_t *)string, total_len - 1)); NDR_PUSH_ALIGN(ndr, 1); return NDR_ERR_SUCCESS; }