LCOV - code coverage report
Current view: top level - bin/default/source3/librpc/gen_ndr - ndr_secrets.c (source / functions) Hit Total Coverage
Test: coverage report for v4-17-test 1498b464 Lines: 435 679 64.1 %
Date: 2024-06-13 04:01:37 Functions: 18 31 58.1 %

          Line data    Source code
       1             : /* parser auto-generated by pidl */
       2             : 
       3             : #include "includes.h"
       4             : #include "bin/default/source3/librpc/gen_ndr/ndr_secrets.h"
       5             : 
       6             : #include "librpc/gen_ndr/ndr_misc.h"
       7             : #include "librpc/gen_ndr/ndr_samr.h"
       8             : #include "librpc/gen_ndr/ndr_lsa.h"
       9             : #include "librpc/gen_ndr/ndr_netlogon.h"
      10             : #include "librpc/gen_ndr/ndr_security.h"
      11           0 : _PUBLIC_ enum ndr_err_code ndr_push_TRUSTED_DOM_PASS(struct ndr_push *ndr, int ndr_flags, const struct TRUSTED_DOM_PASS *r)
      12             : {
      13             :         {
      14           0 :                 uint32_t _flags_save_STRUCT = ndr->flags;
      15           0 :                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_NOALIGN);
      16           0 :                 NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
      17           0 :                 if (ndr_flags & NDR_SCALARS) {
      18           0 :                         NDR_CHECK(ndr_push_align(ndr, 4));
      19           0 :                         NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, strlen_m_term(r->uni_name)));
      20           0 :                         NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->uni_name, 32, sizeof(uint16_t), CH_UTF16));
      21           0 :                         NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, strlen(r->pass)));
      22             :                         {
      23           0 :                                 uint32_t _flags_save_string = ndr->flags;
      24           0 :                                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
      25           0 :                                 NDR_CHECK(ndr_push_string(ndr, NDR_SCALARS, r->pass));
      26           0 :                                 ndr->flags = _flags_save_string;
      27             :                         }
      28           0 :                         NDR_CHECK(ndr_push_time_t(ndr, NDR_SCALARS, r->mod_time));
      29           0 :                         NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, &r->domain_sid));
      30           0 :                         NDR_CHECK(ndr_push_trailer_align(ndr, 4));
      31             :                 }
      32           0 :                 if (ndr_flags & NDR_BUFFERS) {
      33             :                 }
      34           0 :                 ndr->flags = _flags_save_STRUCT;
      35             :         }
      36           0 :         return NDR_ERR_SUCCESS;
      37             : }
      38             : 
      39           0 : _PUBLIC_ enum ndr_err_code ndr_pull_TRUSTED_DOM_PASS(struct ndr_pull *ndr, int ndr_flags, struct TRUSTED_DOM_PASS *r)
      40             : {
      41           0 :         uint32_t size_uni_name_0 = 0;
      42             :         {
      43           0 :                 uint32_t _flags_save_STRUCT = ndr->flags;
      44           0 :                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_NOALIGN);
      45           0 :                 NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
      46           0 :                 if (ndr_flags & NDR_SCALARS) {
      47           0 :                         NDR_CHECK(ndr_pull_align(ndr, 4));
      48           0 :                         NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->uni_name_len));
      49           0 :                         size_uni_name_0 = 32;
      50           0 :                         NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->uni_name, size_uni_name_0, sizeof(uint16_t), CH_UTF16));
      51           0 :                         NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->pass_len));
      52             :                         {
      53           0 :                                 uint32_t _flags_save_string = ndr->flags;
      54           0 :                                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
      55           0 :                                 NDR_CHECK(ndr_pull_string(ndr, NDR_SCALARS, &r->pass));
      56           0 :                                 ndr->flags = _flags_save_string;
      57             :                         }
      58           0 :                         NDR_CHECK(ndr_pull_time_t(ndr, NDR_SCALARS, &r->mod_time));
      59           0 :                         NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS, &r->domain_sid));
      60           0 :                         NDR_CHECK(ndr_pull_trailer_align(ndr, 4));
      61             :                 }
      62           0 :                 if (ndr_flags & NDR_BUFFERS) {
      63             :                 }
      64           0 :                 ndr->flags = _flags_save_STRUCT;
      65             :         }
      66           0 :         return NDR_ERR_SUCCESS;
      67             : }
      68             : 
      69           0 : static void ndr_print_flags_TRUSTED_DOM_PASS(struct ndr_print *ndr, const char *name, int unused, const struct TRUSTED_DOM_PASS *r)
      70             : {
      71           0 :         ndr_print_TRUSTED_DOM_PASS(ndr, name, r);
      72           0 : }
      73             : 
      74           0 : _PUBLIC_ void ndr_print_TRUSTED_DOM_PASS(struct ndr_print *ndr, const char *name, const struct TRUSTED_DOM_PASS *r)
      75             : {
      76           0 :         ndr_print_struct(ndr, name, "TRUSTED_DOM_PASS");
      77           0 :         if (r == NULL) { ndr_print_null(ndr); return; }
      78             :         {
      79           0 :                 uint32_t _flags_save_STRUCT = ndr->flags;
      80           0 :                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_NOALIGN);
      81           0 :                 ndr->depth++;
      82           0 :                 ndr_print_uint32(ndr, "uni_name_len", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?strlen_m_term(r->uni_name):r->uni_name_len);
      83           0 :                 ndr_print_string(ndr, "uni_name", r->uni_name);
      84           0 :                 ndr_print_uint32(ndr, "pass_len", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?strlen(r->pass):r->pass_len);
      85             :                 {
      86           0 :                         uint32_t _flags_save_string = ndr->flags;
      87           0 :                         ndr_set_flags(&ndr->flags, LIBNDR_FLAG_STR_ASCII|LIBNDR_FLAG_STR_NULLTERM);
      88           0 :                         ndr_print_string(ndr, "pass", r->pass);
      89           0 :                         ndr->flags = _flags_save_string;
      90             :                 }
      91           0 :                 ndr_print_time_t(ndr, "mod_time", r->mod_time);
      92           0 :                 ndr_print_dom_sid(ndr, "domain_sid", &r->domain_sid);
      93           0 :                 ndr->depth--;
      94           0 :                 ndr->flags = _flags_save_STRUCT;
      95             :         }
      96             : }
      97             : 
      98           0 : _PUBLIC_ enum ndr_err_code ndr_push_lsa_secret(struct ndr_push *ndr, int ndr_flags, const struct lsa_secret *r)
      99             : {
     100           0 :         NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
     101           0 :         if (ndr_flags & NDR_SCALARS) {
     102           0 :                 NDR_CHECK(ndr_push_align(ndr, 5));
     103           0 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->secret_current));
     104           0 :                 NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->secret_current_lastchange));
     105           0 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->secret_old));
     106           0 :                 NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->secret_old_lastchange));
     107           0 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd));
     108           0 :                 NDR_CHECK(ndr_push_trailer_align(ndr, 5));
     109             :         }
     110           0 :         if (ndr_flags & NDR_BUFFERS) {
     111           0 :                 if (r->secret_current) {
     112           0 :                         NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, *r->secret_current));
     113             :                 }
     114           0 :                 if (r->secret_old) {
     115           0 :                         NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, *r->secret_old));
     116             :                 }
     117           0 :                 if (r->sd) {
     118           0 :                         NDR_CHECK(ndr_push_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd));
     119             :                 }
     120             :         }
     121           0 :         return NDR_ERR_SUCCESS;
     122             : }
     123             : 
     124           0 : _PUBLIC_ enum ndr_err_code ndr_pull_lsa_secret(struct ndr_pull *ndr, int ndr_flags, struct lsa_secret *r)
     125             : {
     126             :         uint32_t _ptr_secret_current;
     127           0 :         TALLOC_CTX *_mem_save_secret_current_0 = NULL;
     128             :         uint32_t _ptr_secret_old;
     129           0 :         TALLOC_CTX *_mem_save_secret_old_0 = NULL;
     130             :         uint32_t _ptr_sd;
     131           0 :         TALLOC_CTX *_mem_save_sd_0 = NULL;
     132           0 :         NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
     133           0 :         if (ndr_flags & NDR_SCALARS) {
     134           0 :                 NDR_CHECK(ndr_pull_align(ndr, 5));
     135           0 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_secret_current));
     136           0 :                 if (_ptr_secret_current) {
     137           0 :                         NDR_PULL_ALLOC(ndr, r->secret_current);
     138             :                 } else {
     139           0 :                         r->secret_current = NULL;
     140             :                 }
     141           0 :                 NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->secret_current_lastchange));
     142           0 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_secret_old));
     143           0 :                 if (_ptr_secret_old) {
     144           0 :                         NDR_PULL_ALLOC(ndr, r->secret_old);
     145             :                 } else {
     146           0 :                         r->secret_old = NULL;
     147             :                 }
     148           0 :                 NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->secret_old_lastchange));
     149           0 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_sd));
     150           0 :                 if (_ptr_sd) {
     151           0 :                         NDR_PULL_ALLOC(ndr, r->sd);
     152             :                 } else {
     153           0 :                         r->sd = NULL;
     154             :                 }
     155           0 :                 NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
     156             :         }
     157           0 :         if (ndr_flags & NDR_BUFFERS) {
     158           0 :                 if (r->secret_current) {
     159           0 :                         _mem_save_secret_current_0 = NDR_PULL_GET_MEM_CTX(ndr);
     160           0 :                         NDR_PULL_SET_MEM_CTX(ndr, r->secret_current, 0);
     161           0 :                         NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, r->secret_current));
     162           0 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_secret_current_0, 0);
     163             :                 }
     164           0 :                 if (r->secret_old) {
     165           0 :                         _mem_save_secret_old_0 = NDR_PULL_GET_MEM_CTX(ndr);
     166           0 :                         NDR_PULL_SET_MEM_CTX(ndr, r->secret_old, 0);
     167           0 :                         NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, r->secret_old));
     168           0 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_secret_old_0, 0);
     169             :                 }
     170           0 :                 if (r->sd) {
     171           0 :                         _mem_save_sd_0 = NDR_PULL_GET_MEM_CTX(ndr);
     172           0 :                         NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0);
     173           0 :                         NDR_CHECK(ndr_pull_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd));
     174           0 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_sd_0, 0);
     175             :                 }
     176             :         }
     177           0 :         return NDR_ERR_SUCCESS;
     178             : }
     179             : 
     180           0 : static void ndr_print_flags_lsa_secret(struct ndr_print *ndr, const char *name, int unused, const struct lsa_secret *r)
     181             : {
     182           0 :         ndr_print_lsa_secret(ndr, name, r);
     183           0 : }
     184             : 
     185           0 : _PUBLIC_ void ndr_print_lsa_secret(struct ndr_print *ndr, const char *name, const struct lsa_secret *r)
     186             : {
     187           0 :         ndr_print_struct(ndr, name, "lsa_secret");
     188           0 :         if (r == NULL) { ndr_print_null(ndr); return; }
     189           0 :         ndr->depth++;
     190           0 :         ndr_print_ptr(ndr, "secret_current", r->secret_current);
     191           0 :         ndr->depth++;
     192           0 :         if (r->secret_current) {
     193           0 :                 ndr_print_DATA_BLOB(ndr, "secret_current", *r->secret_current);
     194             :         }
     195           0 :         ndr->depth--;
     196           0 :         ndr_print_NTTIME(ndr, "secret_current_lastchange", r->secret_current_lastchange);
     197           0 :         ndr_print_ptr(ndr, "secret_old", r->secret_old);
     198           0 :         ndr->depth++;
     199           0 :         if (r->secret_old) {
     200           0 :                 ndr_print_DATA_BLOB(ndr, "secret_old", *r->secret_old);
     201             :         }
     202           0 :         ndr->depth--;
     203           0 :         ndr_print_NTTIME(ndr, "secret_old_lastchange", r->secret_old_lastchange);
     204           0 :         ndr_print_ptr(ndr, "sd", r->sd);
     205           0 :         ndr->depth++;
     206           0 :         if (r->sd) {
     207           0 :                 ndr_print_security_descriptor(ndr, "sd", r->sd);
     208             :         }
     209           0 :         ndr->depth--;
     210           0 :         ndr->depth--;
     211             : }
     212             : 
     213         124 : static enum ndr_err_code ndr_push_secrets_domain_info1_kerberos_key(struct ndr_push *ndr, int ndr_flags, const struct secrets_domain_info1_kerberos_key *r)
     214             : {
     215         124 :         NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
     216         124 :         if (ndr_flags & NDR_SCALARS) {
     217         124 :                 NDR_CHECK(ndr_push_align(ndr, 4));
     218         124 :                 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->keytype));
     219         124 :                 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->iteration_count));
     220             :                 {
     221         124 :                         uint32_t _flags_save_DATA_BLOB = ndr->flags;
     222         124 :                         ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     223         124 :                         NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->value));
     224         124 :                         ndr->flags = _flags_save_DATA_BLOB;
     225             :                 }
     226         124 :                 NDR_CHECK(ndr_push_trailer_align(ndr, 4));
     227             :         }
     228         124 :         if (ndr_flags & NDR_BUFFERS) {
     229             :         }
     230         124 :         return NDR_ERR_SUCCESS;
     231             : }
     232             : 
     233       18853 : static enum ndr_err_code ndr_pull_secrets_domain_info1_kerberos_key(struct ndr_pull *ndr, int ndr_flags, struct secrets_domain_info1_kerberos_key *r)
     234             : {
     235       18853 :         NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
     236       18853 :         if (ndr_flags & NDR_SCALARS) {
     237       18853 :                 NDR_CHECK(ndr_pull_align(ndr, 4));
     238       18853 :                 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->keytype));
     239       18853 :                 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->iteration_count));
     240             :                 {
     241       18853 :                         uint32_t _flags_save_DATA_BLOB = ndr->flags;
     242       18853 :                         ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     243       18853 :                         NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->value));
     244       18853 :                         ndr->flags = _flags_save_DATA_BLOB;
     245             :                 }
     246       18853 :                 NDR_CHECK(ndr_pull_trailer_align(ndr, 4));
     247             :         }
     248       18853 :         if (ndr_flags & NDR_BUFFERS) {
     249             :         }
     250       18853 :         return NDR_ERR_SUCCESS;
     251             : }
     252             : 
     253           1 : _PUBLIC_ void ndr_print_secrets_domain_info1_kerberos_key(struct ndr_print *ndr, const char *name, const struct secrets_domain_info1_kerberos_key *r)
     254             : {
     255           1 :         ndr_print_struct(ndr, name, "secrets_domain_info1_kerberos_key");
     256           1 :         if (r == NULL) { ndr_print_null(ndr); return; }
     257           1 :         ndr->depth++;
     258           1 :         ndr_print_uint32(ndr, "keytype", r->keytype);
     259           1 :         ndr_print_uint32(ndr, "iteration_count", r->iteration_count);
     260             :         {
     261           1 :                 uint32_t _flags_save_DATA_BLOB = ndr->flags;
     262           1 :                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     263           1 :                 ndr_print_DATA_BLOB(ndr, "value", r->value);
     264           1 :                 ndr->flags = _flags_save_DATA_BLOB;
     265             :         }
     266           1 :         ndr->depth--;
     267             : }
     268             : 
     269          42 : static enum ndr_err_code ndr_push_secrets_domain_info1_password(struct ndr_push *ndr, int ndr_flags, const struct secrets_domain_info1_password *r)
     270             : {
     271             :         uint32_t cntr_keys_0;
     272          42 :         NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
     273          42 :         if (ndr_flags & NDR_SCALARS) {
     274          42 :                 NDR_CHECK(ndr_push_align(ndr, 5));
     275          42 :                 NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->change_time));
     276          42 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->change_server, CH_UTF16)));
     277          42 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
     278          42 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->change_server, CH_UTF16)));
     279          42 :                 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->change_server, ndr_charset_length(r->change_server, CH_UTF16), sizeof(uint16_t), CH_UTF16));
     280             :                 {
     281          42 :                         uint32_t _flags_save_DATA_BLOB = ndr->flags;
     282          42 :                         ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     283          42 :                         NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->cleartext_blob));
     284          42 :                         ndr->flags = _flags_save_DATA_BLOB;
     285             :                 }
     286             :                 {
     287          42 :                         uint32_t _flags_save_samr_Password = ndr->flags;
     288          42 :                         ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     289          42 :                         NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, &r->nt_hash));
     290          42 :                         ndr->flags = _flags_save_samr_Password;
     291             :                 }
     292          42 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->salt_data));
     293          42 :                 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->default_iteration_count));
     294          42 :                 NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, r->num_keys));
     295         166 :                 for (cntr_keys_0 = 0; cntr_keys_0 < (r->num_keys); cntr_keys_0++) {
     296         124 :                         NDR_CHECK(ndr_push_secrets_domain_info1_kerberos_key(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
     297             :                 }
     298          42 :                 NDR_CHECK(ndr_push_trailer_align(ndr, 5));
     299             :         }
     300          42 :         if (ndr_flags & NDR_BUFFERS) {
     301          42 :                 if (r->salt_data) {
     302          41 :                         NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->salt_data, CH_UTF16)));
     303          41 :                         NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
     304          41 :                         NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->salt_data, CH_UTF16)));
     305          41 :                         NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->salt_data, ndr_charset_length(r->salt_data, CH_UTF16), sizeof(uint16_t), CH_UTF16));
     306             :                 }
     307             :         }
     308          42 :         return NDR_ERR_SUCCESS;
     309             : }
     310             : 
     311        6285 : static enum ndr_err_code ndr_pull_secrets_domain_info1_password(struct ndr_pull *ndr, int ndr_flags, struct secrets_domain_info1_password *r)
     312             : {
     313        6285 :         uint32_t size_change_server_0 = 0;
     314        6285 :         uint32_t length_change_server_0 = 0;
     315             :         uint32_t _ptr_salt_data;
     316        6285 :         uint32_t size_salt_data_1 = 0;
     317        6285 :         uint32_t length_salt_data_1 = 0;
     318        6285 :         TALLOC_CTX *_mem_save_salt_data_0 = NULL;
     319        6285 :         uint32_t size_keys_0 = 0;
     320             :         uint32_t cntr_keys_0;
     321        6285 :         TALLOC_CTX *_mem_save_keys_0 = NULL;
     322        6285 :         NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
     323        6285 :         if (ndr_flags & NDR_SCALARS) {
     324        6285 :                 NDR_CHECK(ndr_pull_align(ndr, 5));
     325        6285 :                 NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->change_time));
     326        6285 :                 NDR_CHECK(ndr_pull_array_size(ndr, &r->change_server));
     327        6285 :                 NDR_CHECK(ndr_pull_array_length(ndr, &r->change_server));
     328        6285 :                 NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->change_server, &size_change_server_0));
     329        6285 :                 NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->change_server, &length_change_server_0));
     330        6285 :                 if (length_change_server_0 > size_change_server_0) {
     331           0 :                         return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_change_server_0, length_change_server_0);
     332             :                 }
     333        6285 :                 NDR_CHECK(ndr_check_string_terminator(ndr, length_change_server_0, sizeof(uint16_t)));
     334        6285 :                 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->change_server, length_change_server_0, sizeof(uint16_t), CH_UTF16));
     335             :                 {
     336        6285 :                         uint32_t _flags_save_DATA_BLOB = ndr->flags;
     337        6285 :                         ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     338        6285 :                         NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->cleartext_blob));
     339        6285 :                         ndr->flags = _flags_save_DATA_BLOB;
     340             :                 }
     341             :                 {
     342        6285 :                         uint32_t _flags_save_samr_Password = ndr->flags;
     343        6285 :                         ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     344        6285 :                         NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, &r->nt_hash));
     345        6285 :                         ndr->flags = _flags_save_samr_Password;
     346             :                 }
     347        6285 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_salt_data));
     348        6285 :                 if (_ptr_salt_data) {
     349        6284 :                         NDR_PULL_ALLOC(ndr, r->salt_data);
     350             :                 } else {
     351           1 :                         r->salt_data = NULL;
     352             :                 }
     353        6285 :                 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->default_iteration_count));
     354        6285 :                 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->num_keys));
     355        6285 :                 size_keys_0 = r->num_keys;
     356        6285 :                 NDR_PULL_ALLOC_N(ndr, r->keys, size_keys_0);
     357        6285 :                 _mem_save_keys_0 = NDR_PULL_GET_MEM_CTX(ndr);
     358        6285 :                 NDR_PULL_SET_MEM_CTX(ndr, r->keys, 0);
     359       25138 :                 for (cntr_keys_0 = 0; cntr_keys_0 < (size_keys_0); cntr_keys_0++) {
     360       18853 :                         NDR_CHECK(ndr_pull_secrets_domain_info1_kerberos_key(ndr, NDR_SCALARS, &r->keys[cntr_keys_0]));
     361             :                 }
     362        6285 :                 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_keys_0, 0);
     363        6285 :                 NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
     364             :         }
     365        6285 :         if (ndr_flags & NDR_BUFFERS) {
     366        6285 :                 if (r->salt_data) {
     367        6284 :                         _mem_save_salt_data_0 = NDR_PULL_GET_MEM_CTX(ndr);
     368        6284 :                         NDR_PULL_SET_MEM_CTX(ndr, r->salt_data, 0);
     369        6284 :                         NDR_CHECK(ndr_pull_array_size(ndr, &r->salt_data));
     370        6284 :                         NDR_CHECK(ndr_pull_array_length(ndr, &r->salt_data));
     371        6284 :                         NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->salt_data, &size_salt_data_1));
     372        6284 :                         NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->salt_data, &length_salt_data_1));
     373        6284 :                         if (length_salt_data_1 > size_salt_data_1) {
     374           0 :                                 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_salt_data_1, length_salt_data_1);
     375             :                         }
     376        6284 :                         NDR_CHECK(ndr_check_string_terminator(ndr, length_salt_data_1, sizeof(uint16_t)));
     377        6284 :                         NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->salt_data, length_salt_data_1, sizeof(uint16_t), CH_UTF16));
     378        6284 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_salt_data_0, 0);
     379             :                 }
     380             :         }
     381        6285 :         return NDR_ERR_SUCCESS;
     382             : }
     383             : 
     384           1 : _PUBLIC_ void ndr_print_secrets_domain_info1_password(struct ndr_print *ndr, const char *name, const struct secrets_domain_info1_password *r)
     385             : {
     386             :         uint32_t cntr_keys_0;
     387           1 :         ndr_print_struct(ndr, name, "secrets_domain_info1_password");
     388           1 :         if (r == NULL) { ndr_print_null(ndr); return; }
     389           1 :         ndr->depth++;
     390           1 :         ndr_print_NTTIME(ndr, "change_time", r->change_time);
     391           1 :         ndr_print_string(ndr, "change_server", r->change_server);
     392             :         {
     393           1 :                 uint32_t _flags_save_DATA_BLOB = ndr->flags;
     394           1 :                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     395           1 :                 ndr_print_DATA_BLOB(ndr, "cleartext_blob", r->cleartext_blob);
     396           1 :                 ndr->flags = _flags_save_DATA_BLOB;
     397             :         }
     398             :         {
     399           1 :                 uint32_t _flags_save_samr_Password = ndr->flags;
     400           1 :                 ndr_set_flags(&ndr->flags, LIBNDR_FLAG_IS_SECRET);
     401           1 :                 ndr_print_samr_Password(ndr, "nt_hash", &r->nt_hash);
     402           1 :                 ndr->flags = _flags_save_samr_Password;
     403             :         }
     404           1 :         ndr_print_ptr(ndr, "salt_data", r->salt_data);
     405           1 :         ndr->depth++;
     406           1 :         if (r->salt_data) {
     407           0 :                 ndr_print_string(ndr, "salt_data", r->salt_data);
     408             :         }
     409           1 :         ndr->depth--;
     410           1 :         ndr_print_uint32(ndr, "default_iteration_count", r->default_iteration_count);
     411           1 :         ndr_print_uint16(ndr, "num_keys", r->num_keys);
     412           1 :         ndr->print(ndr, "%s: ARRAY(%d)", "keys", (int)r->num_keys);
     413           1 :         ndr->depth++;
     414           2 :         for (cntr_keys_0 = 0; cntr_keys_0 < (r->num_keys); cntr_keys_0++) {
     415           1 :                 ndr_print_secrets_domain_info1_kerberos_key(ndr, "keys", &r->keys[cntr_keys_0]);
     416             :         }
     417           1 :         ndr->depth--;
     418           1 :         ndr->depth--;
     419             : }
     420             : 
     421           0 : static enum ndr_err_code ndr_push_secrets_domain_info1_change(struct ndr_push *ndr, int ndr_flags, const struct secrets_domain_info1_change *r)
     422             : {
     423           0 :         NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
     424           0 :         if (ndr_flags & NDR_SCALARS) {
     425           0 :                 if (r->password == NULL) {
     426           0 :                         return ndr_push_error(ndr, NDR_ERR_INVALID_POINTER, "NULL [ref] pointer");
     427             :                 }
     428           0 :                 NDR_CHECK(ndr_push_align(ndr, 5));
     429           0 :                 NDR_CHECK(ndr_push_NTSTATUS(ndr, NDR_SCALARS, r->local_status));
     430           0 :                 NDR_CHECK(ndr_push_NTSTATUS(ndr, NDR_SCALARS, r->remote_status));
     431           0 :                 NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->change_time));
     432           0 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->change_server, CH_UTF16)));
     433           0 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
     434           0 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->change_server, CH_UTF16)));
     435           0 :                 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->change_server, ndr_charset_length(r->change_server, CH_UTF16), sizeof(uint16_t), CH_UTF16));
     436           0 :                 NDR_CHECK(ndr_push_ref_ptr(ndr)); /* r->password */
     437           0 :                 NDR_CHECK(ndr_push_trailer_align(ndr, 5));
     438             :         }
     439           0 :         if (ndr_flags & NDR_BUFFERS) {
     440           0 :                 NDR_CHECK(ndr_push_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
     441             :         }
     442           0 :         return NDR_ERR_SUCCESS;
     443             : }
     444             : 
     445           0 : static enum ndr_err_code ndr_pull_secrets_domain_info1_change(struct ndr_pull *ndr, int ndr_flags, struct secrets_domain_info1_change *r)
     446             : {
     447           0 :         uint32_t size_change_server_0 = 0;
     448           0 :         uint32_t length_change_server_0 = 0;
     449             :         uint32_t _ptr_password;
     450           0 :         TALLOC_CTX *_mem_save_password_0 = NULL;
     451           0 :         NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
     452           0 :         if (ndr_flags & NDR_SCALARS) {
     453           0 :                 NDR_CHECK(ndr_pull_align(ndr, 5));
     454           0 :                 NDR_CHECK(ndr_pull_NTSTATUS(ndr, NDR_SCALARS, &r->local_status));
     455           0 :                 NDR_CHECK(ndr_pull_NTSTATUS(ndr, NDR_SCALARS, &r->remote_status));
     456           0 :                 NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->change_time));
     457           0 :                 NDR_CHECK(ndr_pull_array_size(ndr, &r->change_server));
     458           0 :                 NDR_CHECK(ndr_pull_array_length(ndr, &r->change_server));
     459           0 :                 NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->change_server, &size_change_server_0));
     460           0 :                 NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->change_server, &length_change_server_0));
     461           0 :                 if (length_change_server_0 > size_change_server_0) {
     462           0 :                         return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_change_server_0, length_change_server_0);
     463             :                 }
     464           0 :                 NDR_CHECK(ndr_check_string_terminator(ndr, length_change_server_0, sizeof(uint16_t)));
     465           0 :                 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->change_server, length_change_server_0, sizeof(uint16_t), CH_UTF16));
     466           0 :                 NDR_CHECK(ndr_pull_ref_ptr(ndr, &_ptr_password));
     467           0 :                 if (_ptr_password) {
     468           0 :                         NDR_PULL_ALLOC(ndr, r->password);
     469             :                 } else {
     470           0 :                         r->password = NULL;
     471             :                 }
     472           0 :                 NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
     473             :         }
     474           0 :         if (ndr_flags & NDR_BUFFERS) {
     475           0 :                 _mem_save_password_0 = NDR_PULL_GET_MEM_CTX(ndr);
     476           0 :                 NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
     477           0 :                 NDR_CHECK(ndr_pull_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
     478           0 :                 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_password_0, 0);
     479             :         }
     480           0 :         return NDR_ERR_SUCCESS;
     481             : }
     482             : 
     483           0 : _PUBLIC_ void ndr_print_secrets_domain_info1_change(struct ndr_print *ndr, const char *name, const struct secrets_domain_info1_change *r)
     484             : {
     485           0 :         ndr_print_struct(ndr, name, "secrets_domain_info1_change");
     486           0 :         if (r == NULL) { ndr_print_null(ndr); return; }
     487           0 :         ndr->depth++;
     488           0 :         ndr_print_NTSTATUS(ndr, "local_status", r->local_status);
     489           0 :         ndr_print_NTSTATUS(ndr, "remote_status", r->remote_status);
     490           0 :         ndr_print_NTTIME(ndr, "change_time", r->change_time);
     491           0 :         ndr_print_string(ndr, "change_server", r->change_server);
     492           0 :         ndr_print_ptr(ndr, "password", r->password);
     493           0 :         ndr->depth++;
     494           0 :         ndr_print_secrets_domain_info1_password(ndr, "password", r->password);
     495           0 :         ndr->depth--;
     496           0 :         ndr->depth--;
     497             : }
     498             : 
     499          31 : _PUBLIC_ enum ndr_err_code ndr_push_secrets_domain_info1(struct ndr_push *ndr, int ndr_flags, const struct secrets_domain_info1 *r)
     500             : {
     501          31 :         NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
     502          31 :         if (ndr_flags & NDR_SCALARS) {
     503          31 :                 if (r->password == NULL) {
     504           0 :                         return ndr_push_error(ndr, NDR_ERR_INVALID_POINTER, "NULL [ref] pointer");
     505             :                 }
     506          31 :                 NDR_CHECK(ndr_push_align(ndr, 8));
     507          31 :                 NDR_CHECK(ndr_push_hyper(ndr, NDR_SCALARS, 0));
     508          31 :                 NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->join_time));
     509          31 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF16)));
     510          31 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
     511          31 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->computer_name, CH_UTF16)));
     512          31 :                 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->computer_name, ndr_charset_length(r->computer_name, CH_UTF16), sizeof(uint16_t), CH_UTF16));
     513          31 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF16)));
     514          31 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
     515          31 :                 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF16)));
     516          31 :                 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->account_name, ndr_charset_length(r->account_name, CH_UTF16), sizeof(uint16_t), CH_UTF16));
     517          31 :                 NDR_CHECK(ndr_push_netr_SchannelType(ndr, NDR_SCALARS, r->secure_channel_type));
     518          31 :                 NDR_CHECK(ndr_push_lsa_DnsDomainInfo(ndr, NDR_SCALARS, &r->domain_info));
     519          31 :                 NDR_CHECK(ndr_push_netr_TrustFlags(ndr, NDR_SCALARS, r->trust_flags));
     520          31 :                 NDR_CHECK(ndr_push_lsa_TrustType(ndr, NDR_SCALARS, r->trust_type));
     521          31 :                 NDR_CHECK(ndr_push_lsa_TrustAttributes(ndr, NDR_SCALARS, r->trust_attributes));
     522          31 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, NULL));
     523          31 :                 NDR_CHECK(ndr_push_kerb_EncTypes(ndr, NDR_SCALARS, r->supported_enc_types));
     524          31 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->salt_principal));
     525          31 :                 NDR_CHECK(ndr_push_NTTIME(ndr, NDR_SCALARS, r->password_last_change));
     526          31 :                 NDR_CHECK(ndr_push_hyper(ndr, NDR_SCALARS, r->password_changes));
     527          31 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->next_change));
     528          31 :                 NDR_CHECK(ndr_push_ref_ptr(ndr)); /* r->password */
     529          31 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->old_password));
     530          31 :                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->older_password));
     531          31 :                 NDR_CHECK(ndr_push_trailer_align(ndr, 8));
     532             :         }
     533          31 :         if (ndr_flags & NDR_BUFFERS) {
     534          31 :                 NDR_CHECK(ndr_push_lsa_DnsDomainInfo(ndr, NDR_BUFFERS, &r->domain_info));
     535             :                 if (NULL) {
     536             :                         NDR_CHECK(ndr_push_lsa_ForestTrustInformation(ndr, NDR_SCALARS|NDR_BUFFERS, NULL));
     537             :                 }
     538          31 :                 if (r->salt_principal) {
     539          30 :                         NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->salt_principal, CH_UTF16)));
     540          30 :                         NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, 0));
     541          30 :                         NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->salt_principal, CH_UTF16)));
     542          30 :                         NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->salt_principal, ndr_charset_length(r->salt_principal, CH_UTF16), sizeof(uint16_t), CH_UTF16));
     543             :                 }
     544          31 :                 if (r->next_change) {
     545           0 :                         NDR_CHECK(ndr_push_secrets_domain_info1_change(ndr, NDR_SCALARS|NDR_BUFFERS, r->next_change));
     546             :                 }
     547          31 :                 NDR_CHECK(ndr_push_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
     548          31 :                 if (r->old_password) {
     549           9 :                         NDR_CHECK(ndr_push_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->old_password));
     550             :                 }
     551          31 :                 if (r->older_password) {
     552           2 :                         NDR_CHECK(ndr_push_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->older_password));
     553             :                 }
     554             :         }
     555          31 :         return NDR_ERR_SUCCESS;
     556             : }
     557             : 
     558        3332 : _PUBLIC_ enum ndr_err_code ndr_pull_secrets_domain_info1(struct ndr_pull *ndr, int ndr_flags, struct secrets_domain_info1 *r)
     559             : {
     560        3332 :         uint32_t size_computer_name_0 = 0;
     561        3332 :         uint32_t length_computer_name_0 = 0;
     562        3332 :         uint32_t size_account_name_0 = 0;
     563        3332 :         uint32_t length_account_name_0 = 0;
     564             :         uint32_t _ptr_reserved_routing;
     565        3332 :         TALLOC_CTX *_mem_save_reserved_routing_0 = NULL;
     566             :         uint32_t _ptr_salt_principal;
     567        3332 :         uint32_t size_salt_principal_1 = 0;
     568        3332 :         uint32_t length_salt_principal_1 = 0;
     569        3332 :         TALLOC_CTX *_mem_save_salt_principal_0 = NULL;
     570             :         uint32_t _ptr_next_change;
     571        3332 :         TALLOC_CTX *_mem_save_next_change_0 = NULL;
     572             :         uint32_t _ptr_password;
     573        3332 :         TALLOC_CTX *_mem_save_password_0 = NULL;
     574             :         uint32_t _ptr_old_password;
     575        3332 :         TALLOC_CTX *_mem_save_old_password_0 = NULL;
     576             :         uint32_t _ptr_older_password;
     577        3332 :         TALLOC_CTX *_mem_save_older_password_0 = NULL;
     578        3332 :         NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
     579        3332 :         if (ndr_flags & NDR_SCALARS) {
     580        3332 :                 NDR_CHECK(ndr_pull_align(ndr, 8));
     581        3332 :                 NDR_CHECK(ndr_pull_hyper(ndr, NDR_SCALARS, &r->reserved_flags));
     582        3332 :                 NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->join_time));
     583        3332 :                 NDR_CHECK(ndr_pull_array_size(ndr, &r->computer_name));
     584        3332 :                 NDR_CHECK(ndr_pull_array_length(ndr, &r->computer_name));
     585        3332 :                 NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->computer_name, &size_computer_name_0));
     586        3332 :                 NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->computer_name, &length_computer_name_0));
     587        3332 :                 if (length_computer_name_0 > size_computer_name_0) {
     588           0 :                         return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_computer_name_0, length_computer_name_0);
     589             :                 }
     590        3332 :                 NDR_CHECK(ndr_check_string_terminator(ndr, length_computer_name_0, sizeof(uint16_t)));
     591        3332 :                 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->computer_name, length_computer_name_0, sizeof(uint16_t), CH_UTF16));
     592        3332 :                 NDR_CHECK(ndr_pull_array_size(ndr, &r->account_name));
     593        3332 :                 NDR_CHECK(ndr_pull_array_length(ndr, &r->account_name));
     594        3332 :                 NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->account_name, &size_account_name_0));
     595        3332 :                 NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->account_name, &length_account_name_0));
     596        3332 :                 if (length_account_name_0 > size_account_name_0) {
     597           0 :                         return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_account_name_0, length_account_name_0);
     598             :                 }
     599        3332 :                 NDR_CHECK(ndr_check_string_terminator(ndr, length_account_name_0, sizeof(uint16_t)));
     600        3332 :                 NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->account_name, length_account_name_0, sizeof(uint16_t), CH_UTF16));
     601        3332 :                 NDR_CHECK(ndr_pull_netr_SchannelType(ndr, NDR_SCALARS, &r->secure_channel_type));
     602        3332 :                 NDR_CHECK(ndr_pull_lsa_DnsDomainInfo(ndr, NDR_SCALARS, &r->domain_info));
     603        3332 :                 NDR_CHECK(ndr_pull_netr_TrustFlags(ndr, NDR_SCALARS, &r->trust_flags));
     604        3332 :                 NDR_CHECK(ndr_pull_lsa_TrustType(ndr, NDR_SCALARS, &r->trust_type));
     605        3332 :                 NDR_CHECK(ndr_pull_lsa_TrustAttributes(ndr, NDR_SCALARS, &r->trust_attributes));
     606        3332 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_reserved_routing));
     607        3332 :                 if (_ptr_reserved_routing) {
     608           0 :                         NDR_PULL_ALLOC(ndr, r->reserved_routing);
     609             :                 } else {
     610        3332 :                         r->reserved_routing = NULL;
     611             :                 }
     612        3332 :                 NDR_CHECK(ndr_pull_kerb_EncTypes(ndr, NDR_SCALARS, &r->supported_enc_types));
     613        3332 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_salt_principal));
     614        3332 :                 if (_ptr_salt_principal) {
     615        3331 :                         NDR_PULL_ALLOC(ndr, r->salt_principal);
     616             :                 } else {
     617           1 :                         r->salt_principal = NULL;
     618             :                 }
     619        3332 :                 NDR_CHECK(ndr_pull_NTTIME(ndr, NDR_SCALARS, &r->password_last_change));
     620        3332 :                 NDR_CHECK(ndr_pull_hyper(ndr, NDR_SCALARS, &r->password_changes));
     621        3332 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_next_change));
     622        3332 :                 if (_ptr_next_change) {
     623           0 :                         NDR_PULL_ALLOC(ndr, r->next_change);
     624             :                 } else {
     625        3332 :                         r->next_change = NULL;
     626             :                 }
     627        3332 :                 NDR_CHECK(ndr_pull_ref_ptr(ndr, &_ptr_password));
     628        3332 :                 if (_ptr_password) {
     629        3332 :                         NDR_PULL_ALLOC(ndr, r->password);
     630             :                 } else {
     631           0 :                         r->password = NULL;
     632             :                 }
     633        3332 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_old_password));
     634        3332 :                 if (_ptr_old_password) {
     635        1596 :                         NDR_PULL_ALLOC(ndr, r->old_password);
     636             :                 } else {
     637        1736 :                         r->old_password = NULL;
     638             :                 }
     639        3332 :                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_older_password));
     640        3332 :                 if (_ptr_older_password) {
     641        1357 :                         NDR_PULL_ALLOC(ndr, r->older_password);
     642             :                 } else {
     643        1975 :                         r->older_password = NULL;
     644             :                 }
     645        3332 :                 NDR_CHECK(ndr_pull_trailer_align(ndr, 8));
     646             :         }
     647        3332 :         if (ndr_flags & NDR_BUFFERS) {
     648        3332 :                 NDR_CHECK(ndr_pull_lsa_DnsDomainInfo(ndr, NDR_BUFFERS, &r->domain_info));
     649        3332 :                 if (r->reserved_routing) {
     650           0 :                         _mem_save_reserved_routing_0 = NDR_PULL_GET_MEM_CTX(ndr);
     651           0 :                         NDR_PULL_SET_MEM_CTX(ndr, r->reserved_routing, 0);
     652           0 :                         NDR_CHECK(ndr_pull_lsa_ForestTrustInformation(ndr, NDR_SCALARS|NDR_BUFFERS, r->reserved_routing));
     653           0 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_reserved_routing_0, 0);
     654             :                 }
     655        3332 :                 if (r->salt_principal) {
     656        3331 :                         _mem_save_salt_principal_0 = NDR_PULL_GET_MEM_CTX(ndr);
     657        3331 :                         NDR_PULL_SET_MEM_CTX(ndr, r->salt_principal, 0);
     658        3331 :                         NDR_CHECK(ndr_pull_array_size(ndr, &r->salt_principal));
     659        3331 :                         NDR_CHECK(ndr_pull_array_length(ndr, &r->salt_principal));
     660        3331 :                         NDR_CHECK(ndr_steal_array_size(ndr, (void*)&r->salt_principal, &size_salt_principal_1));
     661        3331 :                         NDR_CHECK(ndr_steal_array_length(ndr, (void*)&r->salt_principal, &length_salt_principal_1));
     662        3331 :                         if (length_salt_principal_1 > size_salt_principal_1) {
     663           0 :                                 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", size_salt_principal_1, length_salt_principal_1);
     664             :                         }
     665        3331 :                         NDR_CHECK(ndr_check_string_terminator(ndr, length_salt_principal_1, sizeof(uint16_t)));
     666        3331 :                         NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->salt_principal, length_salt_principal_1, sizeof(uint16_t), CH_UTF16));
     667        3331 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_salt_principal_0, 0);
     668             :                 }
     669        3332 :                 if (r->next_change) {
     670           0 :                         _mem_save_next_change_0 = NDR_PULL_GET_MEM_CTX(ndr);
     671           0 :                         NDR_PULL_SET_MEM_CTX(ndr, r->next_change, 0);
     672           0 :                         NDR_CHECK(ndr_pull_secrets_domain_info1_change(ndr, NDR_SCALARS|NDR_BUFFERS, r->next_change));
     673           0 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_next_change_0, 0);
     674             :                 }
     675        3332 :                 _mem_save_password_0 = NDR_PULL_GET_MEM_CTX(ndr);
     676        3332 :                 NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
     677        3332 :                 NDR_CHECK(ndr_pull_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
     678        3332 :                 NDR_PULL_SET_MEM_CTX(ndr, _mem_save_password_0, 0);
     679        3332 :                 if (r->old_password) {
     680        1596 :                         _mem_save_old_password_0 = NDR_PULL_GET_MEM_CTX(ndr);
     681        1596 :                         NDR_PULL_SET_MEM_CTX(ndr, r->old_password, 0);
     682        1596 :                         NDR_CHECK(ndr_pull_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->old_password));
     683        1596 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_old_password_0, 0);
     684             :                 }
     685        3332 :                 if (r->older_password) {
     686        1357 :                         _mem_save_older_password_0 = NDR_PULL_GET_MEM_CTX(ndr);
     687        1357 :                         NDR_PULL_SET_MEM_CTX(ndr, r->older_password, 0);
     688        1357 :                         NDR_CHECK(ndr_pull_secrets_domain_info1_password(ndr, NDR_SCALARS|NDR_BUFFERS, r->older_password));
     689        1357 :                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_older_password_0, 0);
     690             :                 }
     691             :         }
     692        3332 :         return NDR_ERR_SUCCESS;
     693             : }
     694             : 
     695           0 : static void ndr_print_flags_secrets_domain_info1(struct ndr_print *ndr, const char *name, int unused, const struct secrets_domain_info1 *r)
     696             : {
     697           0 :         ndr_print_secrets_domain_info1(ndr, name, r);
     698           0 : }
     699             : 
     700           1 : _PUBLIC_ void ndr_print_secrets_domain_info1(struct ndr_print *ndr, const char *name, const struct secrets_domain_info1 *r)
     701             : {
     702           1 :         ndr_print_struct(ndr, name, "secrets_domain_info1");
     703           1 :         if (r == NULL) { ndr_print_null(ndr); return; }
     704           1 :         ndr->depth++;
     705           1 :         ndr_print_hyper(ndr, "reserved_flags", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?0:r->reserved_flags);
     706           1 :         ndr_print_NTTIME(ndr, "join_time", r->join_time);
     707           1 :         ndr_print_string(ndr, "computer_name", r->computer_name);
     708           1 :         ndr_print_string(ndr, "account_name", r->account_name);
     709           1 :         ndr_print_netr_SchannelType(ndr, "secure_channel_type", r->secure_channel_type);
     710           1 :         ndr_print_lsa_DnsDomainInfo(ndr, "domain_info", &r->domain_info);
     711           1 :         ndr_print_netr_TrustFlags(ndr, "trust_flags", r->trust_flags);
     712           1 :         ndr_print_lsa_TrustType(ndr, "trust_type", r->trust_type);
     713           1 :         ndr_print_lsa_TrustAttributes(ndr, "trust_attributes", r->trust_attributes);
     714           1 :         ndr_print_ptr(ndr, "reserved_routing", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NULL:r->reserved_routing);
     715           1 :         ndr->depth++;
     716           1 :         if ((ndr->flags & LIBNDR_PRINT_SET_VALUES)?NULL:r->reserved_routing) {
     717           0 :                 ndr_print_lsa_ForestTrustInformation(ndr, "reserved_routing", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?NULL:r->reserved_routing);
     718             :         }
     719           1 :         ndr->depth--;
     720           1 :         ndr_print_kerb_EncTypes(ndr, "supported_enc_types", r->supported_enc_types);
     721           1 :         ndr_print_ptr(ndr, "salt_principal", r->salt_principal);
     722           1 :         ndr->depth++;
     723           1 :         if (r->salt_principal) {
     724           0 :                 ndr_print_string(ndr, "salt_principal", r->salt_principal);
     725             :         }
     726           1 :         ndr->depth--;
     727           1 :         ndr_print_NTTIME(ndr, "password_last_change", r->password_last_change);
     728           1 :         ndr_print_hyper(ndr, "password_changes", r->password_changes);
     729           1 :         ndr_print_ptr(ndr, "next_change", r->next_change);
     730           1 :         ndr->depth++;
     731           1 :         if (r->next_change) {
     732           0 :                 ndr_print_secrets_domain_info1_change(ndr, "next_change", r->next_change);
     733             :         }
     734           1 :         ndr->depth--;
     735           1 :         ndr_print_ptr(ndr, "password", r->password);
     736           1 :         ndr->depth++;
     737           1 :         ndr_print_secrets_domain_info1_password(ndr, "password", r->password);
     738           1 :         ndr->depth--;
     739           1 :         ndr_print_ptr(ndr, "old_password", r->old_password);
     740           1 :         ndr->depth++;
     741           1 :         if (r->old_password) {
     742           0 :                 ndr_print_secrets_domain_info1_password(ndr, "old_password", r->old_password);
     743             :         }
     744           1 :         ndr->depth--;
     745           1 :         ndr_print_ptr(ndr, "older_password", r->older_password);
     746           1 :         ndr->depth++;
     747           1 :         if (r->older_password) {
     748           0 :                 ndr_print_secrets_domain_info1_password(ndr, "older_password", r->older_password);
     749             :         }
     750           1 :         ndr->depth--;
     751           1 :         ndr->depth--;
     752             : }
     753             : 
     754          31 : static enum ndr_err_code ndr_push_secrets_domain_info_version(struct ndr_push *ndr, int ndr_flags, enum secrets_domain_info_version r)
     755             : {
     756          31 :         NDR_CHECK(ndr_push_enum_uint32(ndr, NDR_SCALARS, r));
     757          31 :         return NDR_ERR_SUCCESS;
     758             : }
     759             : 
     760        3332 : static enum ndr_err_code ndr_pull_secrets_domain_info_version(struct ndr_pull *ndr, int ndr_flags, enum secrets_domain_info_version *r)
     761             : {
     762             :         uint32_t v;
     763        3332 :         NDR_CHECK(ndr_pull_enum_uint32(ndr, NDR_SCALARS, &v));
     764        3332 :         *r = v;
     765        3332 :         return NDR_ERR_SUCCESS;
     766             : }
     767             : 
     768           1 : _PUBLIC_ void ndr_print_secrets_domain_info_version(struct ndr_print *ndr, const char *name, enum secrets_domain_info_version r)
     769             : {
     770           1 :         const char *val = NULL;
     771             : 
     772           1 :         switch (r) {
     773           1 :                 case SECRETS_DOMAIN_INFO_VERSION_1: val = "SECRETS_DOMAIN_INFO_VERSION_1"; break;
     774             :         }
     775           1 :         ndr_print_enum(ndr, name, "ENUM", val, r);
     776           1 : }
     777             : 
     778          62 : static enum ndr_err_code ndr_push_secrets_domain_infoU(struct ndr_push *ndr, int ndr_flags, const union secrets_domain_infoU *r)
     779             : {
     780             :         uint32_t level;
     781          62 :         NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
     782          62 :         if (ndr_flags & NDR_SCALARS) {
     783             :                 /* This token is not used again (except perhaps below in the NDR_BUFFERS case) */
     784          31 :                 NDR_CHECK(ndr_push_steal_switch_value(ndr, r, &level));
     785          31 :                 NDR_CHECK(ndr_push_union_align(ndr, 5));
     786          31 :                 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, level));
     787          31 :                 NDR_CHECK(ndr_push_union_align(ndr, 5));
     788          31 :                 switch (level) {
     789          31 :                         case SECRETS_DOMAIN_INFO_VERSION_1: {
     790          31 :                                 NDR_CHECK(ndr_push_unique_ptr(ndr, r->info1));
     791          31 :                         break; }
     792             : 
     793           0 :                         default: {
     794           0 :                         break; }
     795             : 
     796             :                 }
     797          19 :         }
     798          62 :         if (ndr_flags & NDR_BUFFERS) {
     799          31 :                 if (!(ndr_flags & NDR_SCALARS)) {
     800             :                         /* We didn't get it above, and the token is not needed after this. */
     801          31 :                         NDR_CHECK(ndr_push_steal_switch_value(ndr, r, &level));
     802             :                 }
     803          31 :                 switch (level) {
     804          31 :                         case SECRETS_DOMAIN_INFO_VERSION_1:
     805          31 :                                 if (r->info1) {
     806          31 :                                         NDR_CHECK(ndr_push_secrets_domain_info1(ndr, NDR_SCALARS|NDR_BUFFERS, r->info1));
     807             :                                 }
     808          31 :                         break;
     809             : 
     810           0 :                         default:
     811           0 :                         break;
     812             : 
     813             :                 }
     814          19 :         }
     815          62 :         return NDR_ERR_SUCCESS;
     816             : }
     817             : 
     818        6664 : static enum ndr_err_code ndr_pull_secrets_domain_infoU(struct ndr_pull *ndr, int ndr_flags, union secrets_domain_infoU *r)
     819             : {
     820             :         uint32_t level;
     821             :         uint32_t _level;
     822        6664 :         TALLOC_CTX *_mem_save_info1_0 = NULL;
     823             :         uint32_t _ptr_info1;
     824        6664 :         NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
     825        6664 :         if (ndr_flags & NDR_SCALARS) {
     826             :                 /* This token is not used again (except perhaps below in the NDR_BUFFERS case) */
     827        3332 :                 NDR_CHECK(ndr_pull_steal_switch_value(ndr, r, &level));
     828        3332 :                 NDR_CHECK(ndr_pull_union_align(ndr, 5));
     829        3332 :                 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &_level));
     830        3332 :                 if (_level != level) {
     831           0 :                         return ndr_pull_error(ndr, NDR_ERR_BAD_SWITCH, "Bad switch value %u for r at %s", _level, __location__);
     832             :                 }
     833        3332 :                 NDR_CHECK(ndr_pull_union_align(ndr, 5));
     834        3332 :                 switch (level) {
     835        3332 :                         case SECRETS_DOMAIN_INFO_VERSION_1: {
     836        3332 :                                 NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_info1));
     837        3332 :                                 if (_ptr_info1) {
     838        3332 :                                         NDR_PULL_ALLOC(ndr, r->info1);
     839             :                                 } else {
     840           0 :                                         r->info1 = NULL;
     841             :                                 }
     842        3332 :                         break; }
     843             : 
     844           0 :                         default: {
     845           0 :                         break; }
     846             : 
     847             :                 }
     848        1672 :         }
     849        6664 :         if (ndr_flags & NDR_BUFFERS) {
     850        3332 :                 if (!(ndr_flags & NDR_SCALARS)) {
     851             :                         /* We didn't get it above, and the token is not needed after this. */
     852        3332 :                         NDR_CHECK(ndr_pull_steal_switch_value(ndr, r, &level));
     853             :                 }
     854        3332 :                 switch (level) {
     855        3332 :                         case SECRETS_DOMAIN_INFO_VERSION_1:
     856        3332 :                                 if (r->info1) {
     857        3332 :                                         _mem_save_info1_0 = NDR_PULL_GET_MEM_CTX(ndr);
     858        3332 :                                         NDR_PULL_SET_MEM_CTX(ndr, r->info1, 0);
     859        3332 :                                         NDR_CHECK(ndr_pull_secrets_domain_info1(ndr, NDR_SCALARS|NDR_BUFFERS, r->info1));
     860        3332 :                                         NDR_PULL_SET_MEM_CTX(ndr, _mem_save_info1_0, 0);
     861             :                                 }
     862        3332 :                         break;
     863             : 
     864           0 :                         default:
     865           0 :                         break;
     866             : 
     867             :                 }
     868        1672 :         }
     869        6664 :         return NDR_ERR_SUCCESS;
     870             : }
     871             : 
     872           1 : _PUBLIC_ void ndr_print_secrets_domain_infoU(struct ndr_print *ndr, const char *name, const union secrets_domain_infoU *r)
     873             : {
     874             :         uint32_t level;
     875           1 :         level = ndr_print_steal_switch_value(ndr, r);
     876           1 :         ndr_print_union(ndr, name, level, "secrets_domain_infoU");
     877           1 :         switch (level) {
     878           1 :                 case SECRETS_DOMAIN_INFO_VERSION_1:
     879           1 :                         ndr_print_ptr(ndr, "info1", r->info1);
     880           1 :                         ndr->depth++;
     881           1 :                         if (r->info1) {
     882           1 :                                 ndr_print_secrets_domain_info1(ndr, "info1", r->info1);
     883             :                         }
     884           1 :                         ndr->depth--;
     885           1 :                 break;
     886             : 
     887           0 :                 default:
     888           0 :                 break;
     889             : 
     890             :         }
     891           1 : }
     892             : 
     893          31 : _PUBLIC_ enum ndr_err_code ndr_push_secrets_domain_infoB(struct ndr_push *ndr, int ndr_flags, const struct secrets_domain_infoB *r)
     894             : {
     895          31 :         NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
     896          31 :         if (ndr_flags & NDR_SCALARS) {
     897          31 :                 NDR_CHECK(ndr_push_align(ndr, 5));
     898          31 :                 NDR_CHECK(ndr_push_secrets_domain_info_version(ndr, NDR_SCALARS, r->version));
     899          31 :                 NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, 0));
     900          31 :                 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->info, r->version));
     901          31 :                 NDR_CHECK(ndr_push_secrets_domain_infoU(ndr, NDR_SCALARS, &r->info));
     902          31 :                 NDR_CHECK(ndr_push_trailer_align(ndr, 5));
     903             :         }
     904          31 :         if (ndr_flags & NDR_BUFFERS) {
     905          31 :                 NDR_CHECK(ndr_push_set_switch_value(ndr, &r->info, r->version));
     906          31 :                 NDR_CHECK(ndr_push_secrets_domain_infoU(ndr, NDR_BUFFERS, &r->info));
     907             :         }
     908          31 :         return NDR_ERR_SUCCESS;
     909             : }
     910             : 
     911        3332 : _PUBLIC_ enum ndr_err_code ndr_pull_secrets_domain_infoB(struct ndr_pull *ndr, int ndr_flags, struct secrets_domain_infoB *r)
     912             : {
     913        3332 :         NDR_PULL_CHECK_FLAGS(ndr, ndr_flags);
     914        3332 :         if (ndr_flags & NDR_SCALARS) {
     915        3332 :                 NDR_CHECK(ndr_pull_align(ndr, 5));
     916        3332 :                 NDR_CHECK(ndr_pull_secrets_domain_info_version(ndr, NDR_SCALARS, &r->version));
     917        3332 :                 NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->reserved));
     918        3332 :                 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->info, r->version));
     919        3332 :                 NDR_CHECK(ndr_pull_secrets_domain_infoU(ndr, NDR_SCALARS, &r->info));
     920        3332 :                 NDR_CHECK(ndr_pull_trailer_align(ndr, 5));
     921             :         }
     922        3332 :         if (ndr_flags & NDR_BUFFERS) {
     923        3332 :                 NDR_CHECK(ndr_pull_set_switch_value(ndr, &r->info, r->version));
     924        3332 :                 NDR_CHECK(ndr_pull_secrets_domain_infoU(ndr, NDR_BUFFERS, &r->info));
     925             :         }
     926        3332 :         return NDR_ERR_SUCCESS;
     927             : }
     928             : 
     929           0 : static void ndr_print_flags_secrets_domain_infoB(struct ndr_print *ndr, const char *name, int unused, const struct secrets_domain_infoB *r)
     930             : {
     931           0 :         ndr_print_secrets_domain_infoB(ndr, name, r);
     932           0 : }
     933             : 
     934           1 : _PUBLIC_ void ndr_print_secrets_domain_infoB(struct ndr_print *ndr, const char *name, const struct secrets_domain_infoB *r)
     935             : {
     936           1 :         ndr_print_struct(ndr, name, "secrets_domain_infoB");
     937           1 :         if (r == NULL) { ndr_print_null(ndr); return; }
     938           1 :         ndr->depth++;
     939           1 :         ndr_print_secrets_domain_info_version(ndr, "version", r->version);
     940           1 :         ndr_print_uint32(ndr, "reserved", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?0:r->reserved);
     941           1 :         ndr_print_set_switch_value(ndr, &r->info, r->version);
     942           1 :         ndr_print_secrets_domain_infoU(ndr, "info", &r->info);
     943           1 :         ndr->depth--;
     944             : }
     945             : 
     946             : #ifndef SKIP_NDR_TABLE_secrets
     947             : static const struct ndr_interface_public_struct secrets_public_structs[] = {
     948             :         {
     949             :                 .name = "TRUSTED_DOM_PASS",
     950             :                 .struct_size = sizeof(struct TRUSTED_DOM_PASS ),
     951             :                 .ndr_push = (ndr_push_flags_fn_t) ndr_push_TRUSTED_DOM_PASS,
     952             :                 .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_TRUSTED_DOM_PASS,
     953             :                 .ndr_print = (ndr_print_function_t) ndr_print_flags_TRUSTED_DOM_PASS,
     954             :         },
     955             :         {
     956             :                 .name = "lsa_secret",
     957             :                 .struct_size = sizeof(struct lsa_secret ),
     958             :                 .ndr_push = (ndr_push_flags_fn_t) ndr_push_lsa_secret,
     959             :                 .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_lsa_secret,
     960             :                 .ndr_print = (ndr_print_function_t) ndr_print_flags_lsa_secret,
     961             :         },
     962             :         {
     963             :                 .name = "secrets_domain_info1",
     964             :                 .struct_size = sizeof(struct secrets_domain_info1 ),
     965             :                 .ndr_push = (ndr_push_flags_fn_t) ndr_push_secrets_domain_info1,
     966             :                 .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_secrets_domain_info1,
     967             :                 .ndr_print = (ndr_print_function_t) ndr_print_flags_secrets_domain_info1,
     968             :         },
     969             :         {
     970             :                 .name = "secrets_domain_infoB",
     971             :                 .struct_size = sizeof(struct secrets_domain_infoB ),
     972             :                 .ndr_push = (ndr_push_flags_fn_t) ndr_push_secrets_domain_infoB,
     973             :                 .ndr_pull = (ndr_pull_flags_fn_t) ndr_pull_secrets_domain_infoB,
     974             :                 .ndr_print = (ndr_print_function_t) ndr_print_flags_secrets_domain_infoB,
     975             :         },
     976             :         { .name = NULL }
     977             : };
     978             : 
     979             : static const struct ndr_interface_call secrets_calls[] = {
     980             :         { .name = NULL }
     981             : };
     982             : 
     983             : static const char * const secrets_endpoint_strings[] = {
     984             :         "ncacn_np:[\\pipe\\secrets]", 
     985             : };
     986             : 
     987             : static const struct ndr_interface_string_array secrets_endpoints = {
     988             :         .count  = 1,
     989             :         .names  = secrets_endpoint_strings
     990             : };
     991             : 
     992             : static const char * const secrets_authservice_strings[] = {
     993             :         "host", 
     994             : };
     995             : 
     996             : static const struct ndr_interface_string_array secrets_authservices = {
     997             :         .count  = 1,
     998             :         .names  = secrets_authservice_strings
     999             : };
    1000             : 
    1001             : 
    1002             : const struct ndr_interface_table ndr_table_secrets = {
    1003             :         .name           = "secrets",
    1004             :         .num_calls      = 0,
    1005             :         .calls          = secrets_calls,
    1006             :         .num_public_structs     = 4,
    1007             :         .public_structs         = secrets_public_structs,
    1008             :         .endpoints      = &secrets_endpoints,
    1009             :         .authservices   = &secrets_authservices
    1010             : };
    1011             : 
    1012             : #endif /* SKIP_NDR_TABLE_secrets */

Generated by: LCOV version 1.13