1998-06-08 23:38:57 +04:00
# ifndef _PROTO_H_
# define _PROTO_H_
1998-05-08 20:49:10 +04:00
/* This file is automatically generated with "make proto". DO NOT EDIT */
1998-08-09 18:58:51 +04:00
/*The following definitions come from client/client.c */
1998-11-09 23:33:37 +03:00
void do_list ( const char * mask , uint16 attribute , void ( * fn ) ( file_info * ) , BOOL rec , BOOL dirs ) ;
1999-01-27 22:37:29 +03:00
struct cli_state * do_connect ( char * server , char * share , int smb_port ) ;
1998-08-09 18:58:51 +04:00
/*The following definitions come from client/clitar.c */
1998-11-09 06:45:49 +03:00
void cmd_block ( void ) ;
void cmd_tarmode ( void ) ;
void cmd_setmode ( void ) ;
void cmd_tar ( void ) ;
int process_tar ( void ) ;
1998-08-09 18:58:51 +04:00
int tar_parseargs ( int argc , char * argv [ ] , char * Optarg , int Optind ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from groupdb/aliasdb.c */
BOOL initialise_alias_db ( void ) ;
LOCAL_GRP * iterate_getaliasgid ( gid_t gid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
LOCAL_GRP * iterate_getaliasrid ( uint32 rid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
1998-11-29 23:03:33 +03:00
LOCAL_GRP * iterate_getaliasntnam ( const char * name , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL add_domain_alias ( LOCAL_GRP * * alss , int * num_alss , LOCAL_GRP * als ) ;
1998-11-29 23:03:33 +03:00
BOOL iterate_getuseraliasntnam ( const char * user_name , LOCAL_GRP * * alss , int * num_alss ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL enumdomaliases ( LOCAL_GRP * * alss , int * num_alss ) ;
void * startaliasent ( BOOL update ) ;
void endaliasent ( void * vp ) ;
LOCAL_GRP * getaliasent ( void * vp , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
BOOL add_alias_entry ( LOCAL_GRP * newgrp ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL mod_alias_entry ( LOCAL_GRP * als ) ;
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
BOOL del_alias_entry ( uint32 rid ) ;
BOOL add_alias_member ( uint32 rid , DOM_SID * member_sid ) ;
BOOL del_alias_member ( uint32 rid , DOM_SID * member_sid ) ;
1998-11-29 23:03:33 +03:00
LOCAL_GRP * getaliasntnam ( const char * name , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
LOCAL_GRP * getaliasrid ( uint32 alias_rid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
LOCAL_GRP * getaliasgid ( gid_t gid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
1998-11-29 23:03:33 +03:00
BOOL getuseraliasntnam ( const char * user_name , LOCAL_GRP * * als , int * num_alss ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
void aldb_init_als ( LOCAL_GRP * als ) ;
1998-11-24 00:51:05 +03:00
BOOL make_alias_line ( char * p , int max_len ,
LOCAL_GRP * als ,
LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from groupdb/aliasfile.c */
struct aliasdb_ops * file_initialise_alias_db ( void ) ;
1998-12-08 03:25:04 +03:00
/*The following definitions come from groupdb/aliasldap.c */
struct aliasdb_ops * ldap_initialise_alias_db ( void ) ;
1998-11-24 00:51:05 +03:00
/*The following definitions come from groupdb/aliasunix.c */
1998-11-29 23:03:33 +03:00
BOOL get_unixalias_members ( struct group * grp ,
1998-11-24 00:51:05 +03:00
int * num_mem , LOCAL_GRP_MEMBER * * members ) ;
struct aliasdb_ops * unix_initialise_alias_db ( void ) ;
1998-11-30 18:08:58 +03:00
/*The following definitions come from groupdb/builtindb.c */
BOOL initialise_builtin_db ( void ) ;
LOCAL_GRP * iterate_getbuiltingid ( gid_t gid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
LOCAL_GRP * iterate_getbuiltinrid ( uint32 rid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
LOCAL_GRP * iterate_getbuiltinntnam ( const char * name , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
BOOL add_domain_builtin ( LOCAL_GRP * * blts , int * num_blts , LOCAL_GRP * blt ) ;
BOOL iterate_getuserbuiltinntnam ( const char * user_name , LOCAL_GRP * * blts , int * num_blts ) ;
BOOL enumdombuiltins ( LOCAL_GRP * * blts , int * num_blts ) ;
void * startbuiltinent ( BOOL update ) ;
void endbuiltinent ( void * vp ) ;
LOCAL_GRP * getbuiltinent ( void * vp , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
BOOL add_builtin_entry ( LOCAL_GRP * newblt ) ;
BOOL mod_builtin_entry ( LOCAL_GRP * blt ) ;
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
BOOL add_builtin_member ( uint32 rid , DOM_SID * member_sid ) ;
BOOL del_builtin_member ( uint32 rid , DOM_SID * member_sid ) ;
1998-11-30 18:08:58 +03:00
LOCAL_GRP * getbuiltinntnam ( const char * name , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
LOCAL_GRP * getbuiltinrid ( uint32 builtin_rid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
LOCAL_GRP * getbuiltingid ( gid_t gid , LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
BOOL getuserbuiltinntnam ( const char * user_name , LOCAL_GRP * * blt , int * num_blts ) ;
void bidb_init_blt ( LOCAL_GRP * blt ) ;
BOOL make_builtin_line ( char * p , int max_len ,
LOCAL_GRP * blt ,
LOCAL_GRP_MEMBER * * mem , int * num_mem ) ;
1998-12-08 03:25:04 +03:00
/*The following definitions come from groupdb/builtinldap.c */
struct aliasdb_ops * ldap_initialise_builtin_db ( void ) ;
1998-11-30 18:08:58 +03:00
/*The following definitions come from groupdb/builtinunix.c */
BOOL get_unixbuiltin_members ( struct group * grp ,
int * num_mem , LOCAL_GRP_MEMBER * * members ) ;
struct aliasdb_ops * unix_initialise_builtin_db ( void ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from groupdb/groupdb.c */
BOOL initialise_group_db ( void ) ;
DOMAIN_GRP * iterate_getgroupgid ( gid_t gid , DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
DOMAIN_GRP * iterate_getgrouprid ( uint32 rid , DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
1998-11-29 23:03:33 +03:00
DOMAIN_GRP * iterate_getgroupntnam ( const char * name , DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL add_domain_group ( DOMAIN_GRP * * grps , int * num_grps , DOMAIN_GRP * grp ) ;
1998-11-29 23:03:33 +03:00
BOOL iterate_getusergroupsnam ( const char * user_name , DOMAIN_GRP * * grps , int * num_grps ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL enumdomgroups ( DOMAIN_GRP * * grps , int * num_grps ) ;
void * startgroupent ( BOOL update ) ;
void endgroupent ( void * vp ) ;
DOMAIN_GRP * getgroupent ( void * vp , DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
BOOL add_group_entry ( DOMAIN_GRP * newgrp ) ;
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
BOOL del_group_entry ( uint32 rid ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL mod_group_entry ( DOMAIN_GRP * grp ) ;
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
BOOL add_group_member ( uint32 rid , uint32 member_rid ) ;
BOOL del_group_member ( uint32 rid , uint32 member_rid ) ;
1998-11-29 23:03:33 +03:00
DOMAIN_GRP * getgroupntnam ( const char * name , DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
DOMAIN_GRP * getgrouprid ( uint32 group_rid , DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
DOMAIN_GRP * getgroupgid ( gid_t gid , DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
1998-11-29 23:03:33 +03:00
BOOL getusergroupsntnam ( const char * user_name , DOMAIN_GRP * * grp , int * num_grps ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
void gpdb_init_grp ( DOMAIN_GRP * grp ) ;
1998-11-24 00:51:05 +03:00
BOOL make_group_line ( char * p , int max_len ,
DOMAIN_GRP * grp ,
DOMAIN_GRP_MEMBER * * mem , int * num_mem ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from groupdb/groupfile.c */
struct groupdb_ops * file_initialise_group_db ( void ) ;
1998-12-08 03:25:04 +03:00
/*The following definitions come from groupdb/groupldap.c */
struct groupdb_ops * ldap_initialise_group_db ( void ) ;
1998-11-24 00:51:05 +03:00
/*The following definitions come from groupdb/groupunix.c */
BOOL get_unixgroup_members ( struct group * grp ,
int * num_mem , DOMAIN_GRP_MEMBER * * members ) ;
struct groupdb_ops * unix_initialise_group_db ( void ) ;
1998-08-14 06:02:40 +04:00
/*The following definitions come from lib/access.c */
BOOL allow_access ( char * deny_list , char * allow_list ,
char * cname , char * caddr ) ;
BOOL check_access ( int sock , char * allow_list , char * deny_list ) ;
1998-08-16 08:08:47 +04:00
/*The following definitions come from lib/bitmap.c */
struct bitmap * bitmap_allocate ( int n ) ;
BOOL bitmap_set ( struct bitmap * bm , unsigned i ) ;
BOOL bitmap_clear ( struct bitmap * bm , unsigned i ) ;
1998-10-04 08:48:17 +04:00
BOOL bitmap_query ( struct bitmap * bm , unsigned i ) ;
1998-08-16 08:08:47 +04:00
int bitmap_find ( struct bitmap * bm , unsigned ofs ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/charcnv.c */
1998-05-08 20:49:10 +04:00
char * unix2dos_format ( char * str , BOOL overwrite ) ;
char * dos2unix_format ( char * str , BOOL overwrite ) ;
void interpret_character_set ( char * str ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/charset.c */
1998-05-08 20:49:10 +04:00
void charset_initialise ( void ) ;
void codepage_initialise ( int client_codepage ) ;
void add_char_string ( char * s ) ;
1998-10-07 02:03:04 +04:00
/*The following definitions come from lib/crc32.c */
1998-10-10 00:31:52 +04:00
uint32 crc32_calc_buffer ( uint32 count , char * buffer ) ;
1998-10-07 02:03:04 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/debug.c */
1998-08-01 00:16:35 +04:00
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL dbg_interactive ( void ) ;
1998-08-15 05:19:26 +04:00
void sig_usr2 ( int sig ) ;
void sig_usr1 ( int sig ) ;
1998-08-01 00:16:35 +04:00
void setup_logging ( char * pname , BOOL interactive ) ;
void reopen_logs ( void ) ;
void force_check_log_size ( void ) ;
1998-08-14 06:02:40 +04:00
void dbgflush ( void ) ;
1998-08-01 00:16:35 +04:00
BOOL dbghdr ( int level , char * file , char * func , int line ) ;
1998-12-16 21:50:54 +03:00
dbg_Token dbg_char2token ( dbg_Token * state , int c ) ;
1998-08-01 00:16:35 +04:00
1998-11-29 23:03:33 +03:00
/*The following definitions come from lib/domain_namemap.c */
BOOL pwdb_rid_is_user ( uint32 rid ) ;
BOOL map_unix_group_name ( char * group_name , DOM_NAME_MAP * grp_info ) ;
BOOL map_unix_alias_name ( char * alias_name , DOM_NAME_MAP * grp_info ) ;
BOOL map_nt_alias_name ( char * ntalias_name , char * nt_domain , DOM_NAME_MAP * grp_info ) ;
BOOL map_nt_group_name ( char * ntgroup_name , char * nt_domain , DOM_NAME_MAP * grp_info ) ;
BOOL map_alias_sid ( DOM_SID * psid , DOM_NAME_MAP * grp_info ) ;
BOOL map_group_sid ( DOM_SID * psid , DOM_NAME_MAP * grp_info ) ;
BOOL lookupsmbpwnam ( const char * unix_usr_name , DOM_NAME_MAP * grp ) ;
BOOL lookupsmbpwuid ( uid_t uid , DOM_NAME_MAP * gmep ) ;
1999-02-09 22:51:44 +03:00
BOOL lookupsmbpwntnam ( const char * fullntname , DOM_NAME_MAP * gmep ) ;
1998-11-29 23:03:33 +03:00
BOOL lookupsmbpwsid ( DOM_SID * sid , DOM_NAME_MAP * gmep ) ;
BOOL lookupsmbgrpnam ( const char * unix_grp_name , DOM_NAME_MAP * grp ) ;
BOOL lookupsmbgrpsid ( DOM_SID * sid , DOM_NAME_MAP * gmep ) ;
BOOL lookupsmbgrpgid ( gid_t gid , DOM_NAME_MAP * gmep ) ;
1998-11-26 00:17:20 +03:00
/*The following definitions come from lib/doscalls.c */
int dos_unlink ( char * fname ) ;
int dos_open ( char * fname , int flags , mode_t mode ) ;
DIR * dos_opendir ( char * dname ) ;
char * dos_readdirname ( DIR * p ) ;
int dos_stat ( char * fname , SMB_STRUCT_STAT * sbuf ) ;
int dos_lstat ( char * fname , SMB_STRUCT_STAT * sbuf ) ;
int dos_mkdir ( char * dname , mode_t mode ) ;
int dos_rmdir ( char * dname ) ;
int dos_chdir ( char * dname ) ;
int dos_utime ( char * fname , struct utimbuf * times ) ;
1998-12-01 19:22:09 +03:00
int copy_reg ( char * source , const char * dest ) ;
1998-11-26 00:17:20 +03:00
int dos_rename ( char * from , char * to ) ;
int dos_chmod ( char * fname , mode_t mode ) ;
char * dos_getwd ( char * unix_path ) ;
BOOL dos_file_exist ( char * fname , SMB_STRUCT_STAT * sbuf ) ;
BOOL dos_directory_exist ( char * dname , SMB_STRUCT_STAT * st ) ;
time_t dos_file_modtime ( char * fname ) ;
SMB_OFF_T dos_file_size ( char * file_name ) ;
int dos_ChDir ( char * path ) ;
char * dos_GetWd ( char * path ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/fault.c */
1998-05-08 20:49:10 +04:00
void fault_setup ( void ( * fn ) ( void * ) ) ;
1998-08-09 18:20:02 +04:00
/*The following definitions come from lib/genrand.c */
void generate_random_buffer ( unsigned char * out , int len , BOOL re_seed ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/getsmbpass.c */
1998-05-08 20:49:10 +04:00
char * getsmbpass ( char * prompt ) ;
1999-04-30 09:37:55 +04:00
/*The following definitions come from lib/hmacmd5.c */
void hmac_md5_init_rfc2104 ( uchar * key , int key_len , HMACMD5Context * ctx ) ;
1999-06-29 22:47:06 +04:00
void hmac_md5_init_limK_to_64 ( const uchar * key , int key_len ,
HMACMD5Context * ctx ) ;
void hmac_md5_update ( const uchar * text , int text_len , HMACMD5Context * ctx ) ;
1999-10-25 23:03:27 +04:00
void hmac_md5_final ( uchar * digest , HMACMD5Context * ctx ) ;
1999-04-30 09:37:55 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/interface.c */
1998-05-08 20:49:10 +04:00
void load_interfaces ( void ) ;
void iface_set_default ( char * ip , char * bcast , char * nmask ) ;
BOOL ismyip ( struct in_addr ip ) ;
BOOL is_local_net ( struct in_addr from ) ;
int iface_count ( void ) ;
BOOL we_are_multihomed ( void ) ;
struct interface * get_interface ( int n ) ;
struct in_addr * iface_n_ip ( int n ) ;
1998-08-30 09:43:59 +04:00
unsigned iface_hash ( void ) ;
1998-05-08 20:49:10 +04:00
struct in_addr * iface_bcast ( struct in_addr ip ) ;
struct in_addr * iface_ip ( struct in_addr ip ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/kanji.c */
1998-05-08 20:49:10 +04:00
void interpret_coding_system ( char * str ) ;
1998-10-21 00:08:35 +04:00
BOOL is_multibyte_codepage ( void ) ;
1998-05-08 20:49:10 +04:00
void initialize_multibyte_vectors ( int client_codepage ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/md4.c */
1998-05-11 19:56:01 +04:00
1999-11-21 22:59:56 +03:00
void mdfour ( unsigned char * out , const unsigned char * in , int n ) ;
1998-05-11 19:56:01 +04:00
1999-04-30 09:37:55 +04:00
/*The following definitions come from lib/md5.c */
void MD5Init ( struct MD5Context * ctx ) ;
void MD5Update ( struct MD5Context * ctx , uchar const * buf , unsigned len ) ;
void MD5Final ( uchar digest [ 16 ] , struct MD5Context * ctx ) ;
void MD5Transform ( uint32 buf [ 4 ] , const uchar inext [ 64 ] ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/membuffer.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
void mem_init ( struct mem_buf * buf , int margin ) ;
1998-10-20 22:27:49 +04:00
void mem_create ( struct mem_buf * buf , char * data , int offset , int size , int margin , BOOL dynamic ) ;
1998-08-09 17:25:34 +04:00
BOOL mem_alloc_data ( struct mem_buf * buf , int size ) ;
BOOL mem_buf_copy ( char * copy_into , struct mem_buf * buf ,
uint32 offset , uint32 len ) ;
BOOL mem_buf_init ( struct mem_buf * * buf , uint32 margin ) ;
void mem_buf_free ( struct mem_buf * * buf ) ;
void mem_free_data ( struct mem_buf * buf ) ;
1999-10-25 23:03:27 +04:00
BOOL mem_realloc_data ( struct mem_buf * buf , size_t new_size ) ;
1998-08-09 17:25:34 +04:00
BOOL mem_grow_data ( struct mem_buf * * buf , BOOL io , int new_size , BOOL force_grow ) ;
uint32 mem_buf_len ( struct mem_buf * buf ) ;
char * mem_data ( struct mem_buf * * buf , uint32 offset ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/netmask.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
int get_netmask ( struct in_addr * ipaddr , struct in_addr * nmask ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/pidfile.c */
1998-05-08 20:49:10 +04:00
1998-09-29 01:43:48 +04:00
pid_t pidfile_pid ( char * name ) ;
1998-08-09 17:25:34 +04:00
void pidfile_create ( char * name ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/replace.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
char * rep_inet_ntoa ( struct in_addr ip ) ;
1998-05-08 20:49:10 +04:00
1998-11-29 23:03:33 +03:00
/*The following definitions come from lib/sids.c */
void get_sam_domain_name ( void ) ;
BOOL get_member_domain_sid ( void ) ;
void generate_wellknown_sids ( void ) ;
1999-11-20 22:43:37 +03:00
BOOL generate_sam_sid ( char * domain_name , DOM_SID * sid ) ;
1998-11-29 23:03:33 +03:00
BOOL map_domain_name_to_sid ( DOM_SID * sid , char * * nt_domain ) ;
BOOL map_domain_sid_to_name ( DOM_SID * sid , char * nt_domain ) ;
1998-12-01 19:22:09 +03:00
BOOL split_domain_name ( const char * fullname , char * domain , char * name ) ;
1999-11-16 20:27:41 +03:00
BOOL enumtrustdoms ( char * * * doms , uint32 * num_entries ) ;
1999-11-16 02:46:27 +03:00
BOOL enumdomains ( char * * * doms , uint32 * num_entries ) ;
1998-11-29 23:03:33 +03:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/signal.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
void BlockSignals ( BOOL block , int signum ) ;
void CatchSignal ( int signum , void ( * handler ) ( int ) ) ;
void CatchChild ( void ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/slprintf.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
int vslprintf ( char * str , int n , char * format , va_list ap ) ;
1998-05-08 20:49:10 +04:00
1998-08-14 21:38:29 +04:00
/*The following definitions come from lib/smbrun.c */
int smbrun ( char * cmd , char * outfile , BOOL shared ) ;
1998-10-28 15:04:34 +03:00
/*The following definitions come from lib/snprintf.c */
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/system.c */
1998-05-08 20:49:10 +04:00
1998-08-29 01:46:29 +04:00
int sys_select ( int maxfd , fd_set * fds , struct timeval * tval ) ;
int sys_select ( int maxfd , fd_set * fds , struct timeval * tval ) ;
1998-11-26 00:17:20 +03:00
int sys_stat ( const char * fname , SMB_STRUCT_STAT * sbuf ) ;
1998-09-03 22:40:31 +04:00
int sys_fstat ( int fd , SMB_STRUCT_STAT * sbuf ) ;
1998-11-26 00:17:20 +03:00
int sys_lstat ( const char * fname , SMB_STRUCT_STAT * sbuf ) ;
1998-09-03 22:40:31 +04:00
int sys_ftruncate ( int fd , SMB_OFF_T offset ) ;
1998-09-12 01:42:18 +04:00
SMB_OFF_T sys_lseek ( int fd , SMB_OFF_T offset , int whence ) ;
1998-09-17 23:16:12 +04:00
int sys_fseek ( FILE * fp , SMB_OFF_T offset , int whence ) ;
SMB_OFF_T sys_ftell ( FILE * fp ) ;
1998-11-17 23:50:07 +03:00
int sys_creat ( const char * path , mode_t mode ) ;
int sys_open ( const char * path , int oflag , mode_t mode ) ;
FILE * sys_fopen ( const char * path , const char * type ) ;
void * sys_mmap ( void * addr , size_t len , int prot , int flags , int fd , SMB_OFF_T offset ) ;
1998-08-09 17:25:34 +04:00
int sys_waitpid ( pid_t pid , int * status , int options ) ;
1998-10-02 16:34:14 +04:00
char * sys_getwd ( char * s ) ;
1998-11-26 00:17:20 +03:00
int sys_chown ( const char * fname , uid_t uid , gid_t gid ) ;
int sys_chroot ( const char * dname ) ;
struct hostent * sys_gethostbyname ( const char * name ) ;
1998-09-26 03:40:49 +04:00
BOOL set_process_capability ( uint32 cap_flag , BOOL enable ) ;
BOOL set_inherited_process_capability ( uint32 cap_flag , BOOL enable ) ;
long sys_random ( void ) ;
void sys_srandom ( unsigned int seed ) ;
1998-09-30 00:24:17 +04:00
int sys_getgroups ( int setlen , gid_t * gidset ) ;
1999-07-07 02:08:55 +04:00
struct passwd * copy_passwd_struct ( struct passwd * pass ) ;
struct passwd * sys_getpwnam ( const char * name ) ;
struct passwd * sys_getpwuid ( uid_t uid ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/time.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
void GetTimeOfDay ( struct timeval * tval ) ;
void TimeInit ( void ) ;
int TimeDiff ( time_t t ) ;
struct tm * LocalTime ( time_t * t ) ;
1999-11-08 23:58:06 +03:00
time_t nt_time_to_unix ( const NTTIME * nt ) ;
1998-08-09 17:25:34 +04:00
time_t interpret_long_date ( char * p ) ;
1998-11-10 22:05:00 +03:00
void unix_to_nt_time ( NTTIME * nt , time_t t ) ;
1999-02-01 05:36:24 +03:00
void init_nt_time ( NTTIME * nt ) ;
1998-08-09 17:25:34 +04:00
void put_long_date ( char * p , time_t t ) ;
BOOL null_mtime ( time_t mtime ) ;
void put_dos_date ( char * buf , int offset , time_t unixdate ) ;
void put_dos_date2 ( char * buf , int offset , time_t unixdate ) ;
void put_dos_date3 ( char * buf , int offset , time_t unixdate ) ;
time_t make_unix_date ( void * date_ptr ) ;
time_t make_unix_date2 ( void * date_ptr ) ;
time_t make_unix_date3 ( void * date_ptr ) ;
char * http_timestring ( time_t t ) ;
char * timestring ( void ) ;
1998-09-02 00:11:54 +04:00
time_t get_create_time ( SMB_STRUCT_STAT * st , BOOL fake_dirs ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/ufc.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
char * ufc_crypt ( char * key , char * salt ) ;
1998-05-08 20:49:10 +04:00
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
/*The following definitions come from lib/unix_sec_ctxt.c */
void init_sec_ctxt ( void ) ;
BOOL become_unix_sec_ctxt ( struct unix_sec_ctxt const * ctxt ) ;
BOOL unbecome_unix_sec_ctxt ( void ) ;
void become_unix_root_sec_ctxt ( void ) ;
void unbecome_unix_root_sec_ctxt ( void ) ;
1998-08-10 11:04:53 +04:00
/*The following definitions come from lib/username.c */
1999-05-06 22:13:23 +04:00
struct passwd * hashed_getpwnam ( const char * name ) ;
char * uidtoname ( uid_t uid ) ;
1998-08-10 11:04:53 +04:00
char * get_home_dir ( char * user ) ;
BOOL map_username ( char * user ) ;
1999-06-13 08:49:13 +04:00
const struct passwd * Get_Pwnam ( char * user , BOOL allow_change ) ;
1998-08-10 11:04:53 +04:00
BOOL user_in_list ( char * user , char * list ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from lib/util.c */
1998-05-08 20:49:10 +04:00
1998-12-09 19:30:37 +03:00
BOOL init_myworkgroup ( void ) ;
1998-08-09 17:25:34 +04:00
char * tmpdir ( void ) ;
1998-09-30 00:24:17 +04:00
BOOL in_group ( gid_t group , gid_t current_gid , int ngroups , gid_t * groups ) ;
1998-12-04 19:30:00 +03:00
uint32 get_number ( const char * tmp ) ;
1998-11-10 21:14:16 +03:00
char * Atoic ( char * p , int * n , char * c ) ;
1998-11-26 00:17:20 +03:00
uint32 * add_num_to_list ( uint32 * * num , int * count , int val ) ;
1998-11-10 21:14:16 +03:00
char * get_numlist ( char * p , uint32 * * num , int * count ) ;
1998-08-09 17:25:34 +04:00
void putip ( void * dest , void * src ) ;
1998-09-26 01:01:52 +04:00
char * dns_to_netbios_name ( char * dns_name ) ;
1998-08-09 17:25:34 +04:00
int name_mangle ( char * In , char * Out , char name_type ) ;
1998-09-02 00:11:54 +04:00
BOOL file_exist ( char * fname , SMB_STRUCT_STAT * sbuf ) ;
1998-12-01 19:22:09 +03:00
int file_rename ( char * from , char * to ) ;
1998-08-09 17:25:34 +04:00
time_t file_modtime ( char * fname ) ;
1998-09-02 00:11:54 +04:00
BOOL directory_exist ( char * dname , SMB_STRUCT_STAT * st ) ;
1998-09-03 22:40:31 +04:00
SMB_OFF_T file_size ( char * file_name ) ;
1998-11-09 23:33:37 +03:00
char * attrib_string ( uint16 mode ) ;
1998-08-09 17:25:34 +04:00
void unix_format ( char * fname ) ;
void dos_format ( char * fname ) ;
void show_msg ( char * buf ) ;
int smb_len ( char * buf ) ;
void _smb_setlen ( char * buf , int len ) ;
void smb_setlen ( char * buf , int len ) ;
int set_message ( char * buf , int num_words , int num_bytes , BOOL zero ) ;
int smb_buflen ( char * buf ) ;
char * smb_buf ( char * buf ) ;
int smb_offset ( char * p , char * buf ) ;
void dos_clean_name ( char * s ) ;
void unix_clean_name ( char * s ) ;
BOOL reduce_name ( char * s , char * dir , BOOL widelinks ) ;
void expand_mask ( char * Mask , BOOL doext ) ;
1998-09-03 22:40:31 +04:00
void make_dir_struct ( char * buf , char * mask , char * fname , SMB_OFF_T size , int mode , time_t date ) ;
1998-08-09 17:25:34 +04:00
void close_low_fds ( void ) ;
1998-11-10 21:14:16 +03:00
int set_blocking ( int fd , BOOL set ) ;
1998-08-09 17:25:34 +04:00
int TvalDiff ( struct timeval * tvalold , struct timeval * tvalnew ) ;
1998-09-03 22:40:31 +04:00
SMB_OFF_T transfer_file ( int infd , int outfd , SMB_OFF_T n , char * header , int headlen , int align ) ;
1998-08-09 17:25:34 +04:00
int name_extract ( char * buf , int ofs , char * name ) ;
1998-10-05 16:34:57 +04:00
int name_len ( char * s1 ) ;
1998-10-03 12:28:05 +04:00
void msleep ( int t ) ;
1998-08-09 17:25:34 +04:00
BOOL do_match ( char * str , char * regexp , int case_sig ) ;
BOOL mask_match ( char * str , char * regexp , int case_sig , BOOL trans2 ) ;
void become_daemon ( void ) ;
BOOL yesno ( char * p ) ;
1998-09-03 22:40:31 +04:00
int set_filelen ( int fd , SMB_OFF_T len ) ;
1998-09-11 05:24:30 +04:00
void * Realloc ( void * p , size_t size ) ;
1998-08-09 17:25:34 +04:00
BOOL get_myname ( char * my_name , struct in_addr * ip ) ;
BOOL ip_equal ( struct in_addr ip1 , struct in_addr ip2 ) ;
int interpret_protocol ( char * str , int def ) ;
uint32 interpret_addr ( char * str ) ;
struct in_addr * interpret_addr2 ( char * str ) ;
BOOL zero_ip ( struct in_addr ip ) ;
1998-11-10 21:14:16 +03:00
BOOL matchname ( char * remotehost , struct in_addr addr ) ;
1998-08-09 17:25:34 +04:00
void standard_sub_basic ( char * str ) ;
1998-08-14 21:38:29 +04:00
void standard_sub ( connection_struct * conn , char * str ) ;
1998-08-09 17:25:34 +04:00
BOOL same_net ( struct in_addr ip1 , struct in_addr ip2 , struct in_addr mask ) ;
1998-11-12 09:12:19 +03:00
struct hostent * Get_Hostbyname ( const char * name ) ;
1998-08-09 17:25:34 +04:00
BOOL process_exists ( int pid ) ;
1998-12-03 20:41:14 +03:00
int get_unixgroups ( char * user , uid_t uid , gid_t gid , int * p_ngroups , gid_t * * p_groups ) ;
1999-02-03 03:49:24 +03:00
BOOL get_unix_grps ( int * p_ngroups , struct group * * p_groups ) ;
void free_unix_grps ( int ngroups , struct group * p_groups ) ;
1998-09-30 00:24:17 +04:00
char * gidtoname ( gid_t gid ) ;
1998-11-29 23:03:33 +03:00
BOOL nametogid ( const char * name , gid_t * gid ) ;
BOOL nametouid ( const char * name , uid_t * uid ) ;
1998-08-21 15:37:40 +04:00
void smb_panic ( char * why ) ;
1998-11-26 00:17:20 +03:00
char * readdirname ( DIR * p ) ;
1998-08-09 17:25:34 +04:00
BOOL is_in_path ( char * name , name_compare_entry * namelist ) ;
void set_namearray ( name_compare_entry * * ppname_array , char * namelist ) ;
void free_namearray ( name_compare_entry * name_array ) ;
1998-09-04 04:23:28 +04:00
BOOL fcntl_lock ( int fd , int op , SMB_OFF_T offset , SMB_OFF_T count , int type ) ;
1998-08-09 17:25:34 +04:00
BOOL is_myname ( char * s ) ;
void set_remote_arch ( enum remote_arch_types type ) ;
enum remote_arch_types get_remote_arch ( void ) ;
1999-03-14 04:25:11 +03:00
char * align4 ( char * q , char * base ) ;
1998-08-09 17:25:34 +04:00
char * align2 ( char * q , char * base ) ;
1999-11-08 23:58:06 +03:00
void out_ascii ( FILE * f , const unsigned char * buf , int len ) ;
void out_struct ( FILE * f , const char * buf1 , int len , int per_line ) ;
void out_data ( FILE * f , const char * buf1 , int len , int per_line ) ;
1999-06-29 22:47:06 +04:00
void print_asc ( int level , unsigned char const * buf , int len ) ;
void dump_data ( int level , const char * buf1 , int len ) ;
1998-08-09 17:25:34 +04:00
char * tab_depth ( int depth ) ;
1998-10-03 17:12:08 +04:00
int str_checksum ( const char * s ) ;
1998-09-11 05:24:30 +04:00
void zero_free ( void * p , size_t size ) ;
1998-10-16 10:16:10 +04:00
int set_maxfiles ( int requested_max ) ;
1998-11-11 17:23:55 +03:00
void reg_get_subkey ( char * full_keyname , char * key_name , char * subkey_name ) ;
1999-10-30 00:24:18 +04:00
BOOL reg_split_key ( const char * full_keyname , uint32 * reg_type , char * key_name ) ;
1998-11-12 19:07:00 +03:00
BOOL become_user_permanently ( uid_t uid , gid_t gid ) ;
1999-11-16 01:11:10 +03:00
/*The following definitions come from lib/util_array.c */
1999-11-03 22:58:47 +03:00
void free_void_array ( uint32 num_entries , void * * entries ,
void ( free_item ) ( void * ) ) ;
1999-11-06 22:52:04 +03:00
void * add_item_to_array ( uint32 * len , void * * * array , const void * item ,
void * ( item_dup ) ( const void * ) , BOOL alloc_anyway ) ;
1999-10-21 22:25:12 +04:00
void free_char_array ( uint32 num_entries , char * * entries ) ;
1999-11-06 22:52:04 +03:00
char * add_chars_to_array ( uint32 * len , char * * * array , const char * name ) ;
1999-11-23 21:57:07 +03:00
void free_uint32_array ( uint32 num_entries , uint32 * * entries ) ;
uint32 * add_uint32s_to_array ( uint32 * len , uint32 * * * array , const uint32 * name ) ;
1999-11-03 22:58:47 +03:00
void free_unistr_array ( uint32 num_entries , UNISTR2 * * entries ) ;
1999-11-06 22:52:04 +03:00
UNISTR2 * add_unistr_to_array ( uint32 * len , UNISTR2 * * * array , UNISTR2 * name ) ;
1999-11-02 00:09:24 +03:00
void free_sid_array ( uint32 num_entries , DOM_SID * * entries ) ;
1999-11-06 22:52:04 +03:00
DOM_SID * add_sid_to_array ( uint32 * len , DOM_SID * * * array , const DOM_SID * sid ) ;
1999-11-09 22:35:30 +03:00
void free_devmode ( DEVICEMODE * devmode ) ;
1999-11-09 01:00:41 +03:00
void free_printer_info_2 ( PRINTER_INFO_2 * printer ) ;
1999-11-06 22:52:04 +03:00
void free_print2_array ( uint32 num_entries , PRINTER_INFO_2 * * entries ) ;
PRINTER_INFO_2 * add_print2_to_array ( uint32 * len , PRINTER_INFO_2 * * * array ,
const PRINTER_INFO_2 * prt ) ;
void free_print1_array ( uint32 num_entries , PRINTER_INFO_1 * * entries ) ;
PRINTER_INFO_1 * add_print1_to_array ( uint32 * len , PRINTER_INFO_1 * * * array ,
const PRINTER_INFO_1 * prt ) ;
1999-11-09 01:00:41 +03:00
void free_job1_array ( uint32 num_entries , JOB_INFO_1 * * entries ) ;
JOB_INFO_1 * add_job1_to_array ( uint32 * len , JOB_INFO_1 * * * array ,
const JOB_INFO_1 * job ) ;
void free_job2_array ( uint32 num_entries , JOB_INFO_2 * * entries ) ;
JOB_INFO_2 * add_job2_to_array ( uint32 * len , JOB_INFO_2 * * * array ,
const JOB_INFO_2 * job ) ;
1998-05-08 20:49:10 +04:00
1998-11-10 21:14:16 +03:00
/*The following definitions come from lib/util_file.c */
BOOL do_file_lock ( int fd , int waitsecs , int type ) ;
BOOL file_lock ( int fd , int type , int secs , int * plock_depth ) ;
BOOL file_unlock ( int fd , int * plock_depth ) ;
1999-07-13 23:54:40 +04:00
void * startfileent ( char * pfile , char * s_readbuf , int bufsize ,
1998-11-10 21:14:16 +03:00
int * file_lock_depth , BOOL update ) ;
1999-07-13 23:54:40 +04:00
void endfileent ( void * vp , int * file_lock_depth ) ;
1998-11-10 21:14:16 +03:00
SMB_BIG_UINT getfilepwpos ( void * vp ) ;
BOOL setfilepwpos ( void * vp , SMB_BIG_UINT tok ) ;
int getfileline ( void * vp , char * linebuf , int linebuf_size ) ;
char * fgets_slash ( char * s2 , int maxlen , FILE * f ) ;
1999-07-14 23:21:44 +04:00
BOOL file_modified ( const char * filename , time_t * lastmodified ) ;
void * open_file_if_modified ( const char * filename , char * mode , time_t * lastmodified ) ;
1998-11-10 21:14:16 +03:00
1999-11-24 21:15:50 +03:00
/*The following definitions come from lib/util_hnd.c */
BOOL init_policy_hnd ( int num_pol_hnds ) ;
1999-11-24 23:24:33 +03:00
BOOL register_policy_hnd ( POLICY_HND * hnd ) ;
1999-11-24 21:15:50 +03:00
BOOL open_policy_hnd ( POLICY_HND * hnd ) ;
1999-11-24 23:24:33 +03:00
int find_policy_by_hnd ( const POLICY_HND * hnd ) ;
1999-11-24 21:15:50 +03:00
BOOL set_policy_samr_rid ( POLICY_HND * hnd , uint32 rid ) ;
BOOL set_policy_samr_pol_status ( POLICY_HND * hnd , uint32 pol_status ) ;
BOOL set_policy_samr_sid ( POLICY_HND * hnd , DOM_SID * sid ) ;
BOOL get_policy_samr_sid ( POLICY_HND * hnd , DOM_SID * sid ) ;
uint32 get_policy_samr_rid ( POLICY_HND * hnd ) ;
BOOL set_policy_reg_name ( POLICY_HND * hnd , fstring name ) ;
BOOL get_policy_reg_name ( POLICY_HND * hnd , fstring name ) ;
1999-11-28 00:50:11 +03:00
BOOL set_policy_con ( POLICY_HND * hnd , struct cli_connection * con ,
void ( * free_fn ) ( struct cli_connection * ) ) ;
BOOL get_policy_con ( const POLICY_HND * hnd , struct cli_connection * * con ) ;
1999-11-24 21:15:50 +03:00
BOOL close_policy_hnd ( POLICY_HND * hnd ) ;
1998-11-29 23:03:33 +03:00
/*The following definitions come from lib/util_pwdb.c */
uint32 lookup_wk_group_name ( const char * group_name , const char * domain ,
DOM_SID * sid , uint8 * type ) ;
uint32 lookup_wk_user_name ( const char * user_name , const char * domain ,
DOM_SID * sid , uint8 * type ) ;
uint32 lookup_builtin_alias_name ( const char * alias_name , const char * domain ,
DOM_SID * sid , uint8 * type ) ;
char * pwdb_encode_acct_ctrl ( uint16 acct_ctrl , size_t length ) ;
uint16 pwdb_decode_acct_ctrl ( const char * p ) ;
time_t pwdb_get_last_set_time ( const char * p ) ;
void pwdb_set_logon_time ( char * p , int max_len , time_t t ) ;
void pwdb_set_logoff_time ( char * p , int max_len , time_t t ) ;
void pwdb_set_kickoff_time ( char * p , int max_len , time_t t ) ;
void pwdb_set_can_change_time ( char * p , int max_len , time_t t ) ;
void pwdb_set_must_change_time ( char * p , int max_len , time_t t ) ;
void pwdb_set_last_set_time ( char * p , int max_len , time_t t ) ;
void pwdb_sethexpwd ( char * p , const char * pwd , uint16 acct_ctrl ) ;
1999-03-25 16:54:31 +03:00
BOOL pwdb_gethexpwd ( const char * p , char * pwd , uint32 * acct_ctrl ) ;
1998-12-01 22:34:58 +03:00
BOOL pwdb_initialise ( BOOL is_server ) ;
1999-07-14 23:21:44 +04:00
char * lookup_wk_alias_rid ( uint32 rid ) ;
char * lookup_wk_user_rid ( uint32 rid ) ;
char * lookup_wk_group_rid ( uint32 rid ) ;
1998-11-29 23:03:33 +03:00
1998-11-10 21:14:16 +03:00
/*The following definitions come from lib/util_sid.c */
1998-11-29 23:03:33 +03:00
char * sid_to_string ( pstring sidstr_out , const DOM_SID * sid ) ;
BOOL string_to_sid ( DOM_SID * sidout , const char * sidstr ) ;
1998-11-10 21:14:16 +03:00
BOOL sid_append_rid ( DOM_SID * sid , uint32 rid ) ;
BOOL sid_split_rid ( DOM_SID * sid , uint32 * rid ) ;
1998-11-29 23:03:33 +03:00
void sid_copy ( DOM_SID * sid1 , const DOM_SID * sid2 ) ;
BOOL sid_front_equal ( const DOM_SID * sid1 , const DOM_SID * sid2 ) ;
BOOL sid_equal ( const DOM_SID * sid1 , const DOM_SID * sid2 ) ;
int sid_size ( const DOM_SID * sid ) ;
1999-11-02 00:09:24 +03:00
DOM_SID * sid_dup ( const DOM_SID * src ) ;
1999-11-20 22:43:37 +03:00
BOOL read_sid ( char * domain_name , DOM_SID * sid ) ;
BOOL write_sid ( char * domain_name , DOM_SID * sid ) ;
BOOL create_new_sid ( DOM_SID * sid ) ;
1998-11-10 21:14:16 +03:00
/*The following definitions come from lib/util_sock.c */
BOOL is_a_socket ( int fd ) ;
void set_socket_options ( int fd , char * options ) ;
void close_sockets ( void ) ;
ssize_t write_socket ( int fd , char * buf , size_t len ) ;
ssize_t read_udp_socket ( int fd , char * buf , size_t len ) ;
ssize_t read_with_timeout ( int fd , char * buf , size_t mincnt , size_t maxcnt , unsigned int time_out ) ;
BOOL send_keepalive ( int client ) ;
ssize_t read_data ( int fd , char * buffer , size_t N ) ;
ssize_t write_data ( int fd , char * buffer , size_t N ) ;
ssize_t read_smb_length ( int fd , char * inbuf , unsigned int timeout ) ;
BOOL receive_smb ( int fd , char * buffer , unsigned int timeout ) ;
BOOL client_receive_smb ( int fd , char * buffer , unsigned int timeout ) ;
BOOL send_smb ( int fd , char * buffer ) ;
BOOL send_one_packet ( char * buf , int len , struct in_addr ip , int port , int type ) ;
int open_socket_in ( int type , int port , int dlevel , uint32 socket_addr ) ;
int open_socket_out ( int type , struct in_addr * addr , int port , int timeout ) ;
void reset_globals_after_fork ( void ) ;
char * client_name ( int fd ) ;
char * client_addr ( int fd ) ;
1999-09-22 01:04:03 +04:00
/*The following definitions come from lib/util_status.c */
BOOL get_connection_status ( struct connect_record * * crec ,
uint32 * connection_count ) ;
BOOL get_session_count ( struct connect_record * * srec , uint32 * session_count ) ;
1998-11-10 21:14:16 +03:00
/*The following definitions come from lib/util_str.c */
void set_first_token ( char * ptr ) ;
1998-11-17 23:50:07 +03:00
BOOL next_token ( char * * ptr , char * buff , char * sep , size_t bufsize ) ;
1998-11-10 21:14:16 +03:00
char * * toktocliplist ( int * ctok , char * sep ) ;
1998-11-12 09:12:19 +03:00
int StrCaseCmp ( const char * s , const char * t ) ;
1998-11-17 23:50:07 +03:00
int StrnCaseCmp ( const char * s , const char * t , size_t n ) ;
1998-11-12 09:12:19 +03:00
BOOL strequal ( const char * s1 , const char * s2 ) ;
1998-11-17 23:50:07 +03:00
BOOL strnequal ( const char * s1 , const char * s2 , size_t n ) ;
BOOL strcsequal ( const char * s1 , const char * s2 ) ;
1998-11-10 21:14:16 +03:00
void strlower ( char * s ) ;
void strupper ( char * s ) ;
void strnorm ( char * s ) ;
BOOL strisnormal ( char * s ) ;
void string_replace ( char * s , char oldc , char newc ) ;
1998-11-26 00:17:20 +03:00
char * skip_string ( char * buf , size_t n ) ;
1998-11-17 23:50:07 +03:00
size_t str_charnum ( const char * s ) ;
BOOL trim_string ( char * s , const char * front , const char * back ) ;
BOOL strhasupper ( const char * s ) ;
BOOL strhaslower ( const char * s ) ;
size_t count_chars ( const char * s , char c ) ;
char * safe_strcpy ( char * dest , const char * src , size_t maxlength ) ;
char * safe_strcat ( char * dest , const char * src , size_t maxlength ) ;
char * StrCpy ( char * dest , const char * src ) ;
char * StrnCpy ( char * dest , const char * src , size_t n ) ;
1999-10-25 23:03:27 +04:00
char * strncpyn ( char * dest , char * src , size_t n , char c ) ;
1998-11-17 23:50:07 +03:00
size_t strhex_to_str ( char * p , size_t len , const char * strhex ) ;
1998-11-10 21:14:16 +03:00
BOOL in_list ( char * s , char * list , BOOL casesensitive ) ;
1998-11-17 23:50:07 +03:00
BOOL string_init ( char * * dest , const char * src ) ;
1998-11-10 21:14:16 +03:00
void string_free ( char * * s ) ;
1998-11-17 23:50:07 +03:00
BOOL string_set ( char * * dest , const char * src ) ;
1998-11-23 06:36:10 +03:00
void string_sub ( char * s , const char * pattern , const char * insert ) ;
void all_string_sub ( char * s , const char * pattern , const char * insert ) ;
1999-11-20 23:54:29 +03:00
void split_at_first_component ( char * path , char * front , char sep , char * back ) ;
1998-11-11 17:23:55 +03:00
void split_at_last_component ( char * path , char * front , char sep , char * back ) ;
1999-02-16 21:04:21 +03:00
char * bit_field_to_str ( uint32 type , struct field_info * bs ) ;
char * enum_field_to_str ( uint32 type , struct field_info * bs , BOOL first_default ) ;
1998-11-10 21:14:16 +03:00
/*The following definitions come from lib/util_unistr.c */
1999-02-12 03:16:09 +03:00
char * ascii_to_unibuf ( char * dest , const char * src , int maxlen ) ;
1999-10-25 23:03:27 +04:00
const char * unibuf_to_ascii ( char * dest , const char * src , int maxlen ) ;
1999-02-12 03:16:09 +03:00
void ascii_to_unistr ( uint16 * dest , const char * src , int maxlen ) ;
void unistr_to_ascii ( char * dest , const uint16 * src , int len ) ;
1999-10-25 23:03:27 +04:00
void unistr2_to_ascii ( char * dest , const UNISTR2 * str , size_t maxlen ) ;
1999-02-12 03:16:09 +03:00
char * skip_unibuf ( char * srcbuf , int len ) ;
char * uni_strncpy ( char * destbuf , const char * srcbuf , int len ) ;
uint32 buffer2_to_uint32 ( const BUFFER2 * str ) ;
1999-10-25 23:03:27 +04:00
void buffer2_to_multistr ( char * dest , const BUFFER2 * str , size_t maxlen ) ;
1999-10-31 02:34:38 +04:00
void buffer4_to_str ( char * dest , const BUFFER4 * str , size_t maxlen ) ;
1999-11-04 00:51:29 +03:00
BOOL copy_unistr2 ( UNISTR2 * str , const UNISTR2 * from ) ;
UNISTR2 * unistr2_dup ( const UNISTR2 * name ) ;
void unistr2_free ( UNISTR2 * name ) ;
1998-11-10 21:14:16 +03:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from libsmb/clientgen.c */
1998-05-08 20:49:10 +04:00
1999-11-25 01:45:09 +03:00
void copy_user_creds ( struct user_credentials * to , const struct user_credentials * from ) ;
1999-01-27 22:37:29 +03:00
int cli_set_port ( struct cli_state * cli , int port ) ;
1998-08-09 17:25:34 +04:00
char * cli_errstr ( struct cli_state * cli ) ;
1999-06-24 22:58:08 +04:00
void cli_safe_smb_errstr ( struct cli_state * cli , char * msg , size_t len ) ;
BOOL get_safe_rap_errstr ( int rap_error , char * err_msg , size_t msglen ) ;
void cli_safe_errstr ( struct cli_state * cli , char * err_msg , size_t msglen ) ;
1999-02-11 21:50:13 +03:00
BOOL cli_send_trans ( struct cli_state * cli , int trans ,
char * name , int pipe_name_len ,
int fid , int flags ,
uint16 * setup , int lsetup , int msetup ,
char * param , int lparam , int mparam ,
char * data , int ldata , int mdata ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_api_pipe ( struct cli_state * cli , char * pipe_name , int pipe_name_len ,
uint16 * setup , uint32 setup_count , uint32 max_setup_count ,
char * params , uint32 param_count , uint32 max_param_count ,
char * data , uint32 data_count , uint32 max_data_count ,
char * * rparam , uint32 * rparam_count ,
char * * rdata , uint32 * rdata_count ) ;
1998-08-25 10:52:26 +04:00
BOOL cli_api ( struct cli_state * cli ,
char * param , int prcnt , int mprcnt ,
char * data , int drcnt , int mdrcnt ,
char * * rparam , int * rprcnt ,
char * * rdata , int * rdrcnt ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_NetWkstaUserLogon ( struct cli_state * cli , char * user , char * workstation ) ;
1998-10-03 17:12:08 +04:00
BOOL cli_RNetShareEnum ( struct cli_state * cli , void ( * fn ) ( const char * , uint32 , const char * ) ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_NetServerEnum ( struct cli_state * cli , char * workgroup , uint32 stype ,
1998-10-04 15:25:06 +04:00
void ( * fn ) ( const char * , uint32 , const char * ) ) ;
1999-06-29 22:47:06 +04:00
BOOL cli_session_setup_x ( struct cli_state * cli ,
char * user ,
char * pass , int passlen ,
char * ntpass , int ntpasslen ,
char * user_domain ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_session_setup ( struct cli_state * cli ,
1999-06-29 22:47:06 +04:00
char * user ,
char * pass , int passlen ,
char * ntpass , int ntpasslen ,
char * user_domain ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_ulogoff ( struct cli_state * cli ) ;
BOOL cli_send_tconX ( struct cli_state * cli ,
char * share , char * dev , char * pass , int passlen ) ;
BOOL cli_tdis ( struct cli_state * cli ) ;
1998-10-03 13:39:11 +04:00
BOOL cli_rename ( struct cli_state * cli , char * fname_src , char * fname_dst ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_unlink ( struct cli_state * cli , char * fname ) ;
BOOL cli_mkdir ( struct cli_state * cli , char * dname ) ;
BOOL cli_rmdir ( struct cli_state * cli , char * dname ) ;
1999-11-24 23:24:33 +03:00
int cli_nt_create ( struct cli_state * cli , const char * fname ) ;
int cli_open ( struct cli_state * cli , const char * fname ,
int flags , int share_mode ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_close ( struct cli_state * cli , int fnum ) ;
BOOL cli_lock ( struct cli_state * cli , int fnum , uint32 offset , uint32 len , int timeout ) ;
BOOL cli_unlock ( struct cli_state * cli , int fnum , uint32 offset , uint32 len , int timeout ) ;
1998-10-03 19:01:11 +04:00
size_t cli_read ( struct cli_state * cli , int fnum , char * buf , off_t offset , size_t size ) ;
1998-10-19 21:32:10 +04:00
ssize_t cli_write ( struct cli_state * cli ,
1998-11-09 06:45:49 +03:00
int fnum , uint16 write_mode ,
char * buf , off_t offset , size_t size ) ;
1998-10-03 12:28:05 +04:00
BOOL cli_getattrE ( struct cli_state * cli , int fd ,
1998-11-09 23:33:37 +03:00
uint16 * attr , size_t * size ,
1998-10-03 12:28:05 +04:00
time_t * c_time , time_t * a_time , time_t * m_time ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_getatr ( struct cli_state * cli , char * fname ,
1998-11-09 23:33:37 +03:00
uint16 * attr , size_t * size , time_t * t ) ;
BOOL cli_setatr ( struct cli_state * cli , char * fname , uint16 attr , time_t t ) ;
1998-10-04 08:33:56 +04:00
BOOL cli_qpathinfo ( struct cli_state * cli , const char * fname ,
1998-10-02 16:34:14 +04:00
time_t * c_time , time_t * a_time , time_t * m_time ,
1998-11-09 23:33:37 +03:00
size_t * size , uint16 * mode ) ;
1998-10-08 06:28:21 +04:00
BOOL cli_qpathinfo2 ( struct cli_state * cli , const char * fname ,
1998-08-09 17:25:34 +04:00
time_t * c_time , time_t * a_time , time_t * m_time ,
1998-11-09 23:33:37 +03:00
time_t * w_time , size_t * size , uint16 * mode ,
1998-10-24 12:08:05 +04:00
SMB_INO_T * ino ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_qfileinfo ( struct cli_state * cli , int fnum ,
1998-11-09 23:33:37 +03:00
uint16 * mode , size_t * size ,
1998-10-24 12:08:05 +04:00
time_t * c_time , time_t * a_time , time_t * m_time ,
time_t * w_time , SMB_INO_T * ino ) ;
1998-11-09 23:33:37 +03:00
int cli_list ( struct cli_state * cli , const char * Mask , uint16 attribute ,
1998-11-09 06:45:49 +03:00
void ( * fn ) ( file_info * , const char * ) ) ;
1998-11-12 09:12:19 +03:00
BOOL cli_oem_change_password ( struct cli_state * cli , const char * user , const char * new_password ,
const char * old_password ) ;
1998-08-09 17:25:34 +04:00
BOOL cli_negprot ( struct cli_state * cli ) ;
1998-09-26 01:01:52 +04:00
BOOL cli_session_request ( struct cli_state * cli ,
1998-10-04 15:25:06 +04:00
struct nmb_name * calling , struct nmb_name * called ) ;
1998-11-12 09:12:19 +03:00
BOOL cli_connect ( struct cli_state * cli , const char * host , struct in_addr * ip ) ;
1999-11-25 01:45:09 +03:00
void cli_init_creds ( struct cli_state * cli , const struct user_credentials * usr ) ;
1998-11-09 06:45:49 +03:00
struct cli_state * cli_initialise ( struct cli_state * cli ) ;
1999-08-03 21:21:34 +04:00
void cli_close_socket ( struct cli_state * cli ) ;
1998-08-09 17:25:34 +04:00
void cli_shutdown ( struct cli_state * cli ) ;
1998-10-03 12:28:05 +04:00
int cli_error ( struct cli_state * cli , uint8 * eclass , uint32 * num ) ;
1998-08-09 17:25:34 +04:00
void cli_sockopt ( struct cli_state * cli , char * options ) ;
1998-09-30 00:24:17 +04:00
uint16 cli_setpid ( struct cli_state * cli , uint16 pid ) ;
1998-09-26 01:01:52 +04:00
BOOL cli_reestablish_connection ( struct cli_state * cli ) ;
BOOL cli_establish_connection ( struct cli_state * cli ,
char * dest_host , struct in_addr * dest_ip ,
struct nmb_name * calling , struct nmb_name * called ,
char * service , char * service_type ,
BOOL do_shutdown , BOOL do_tcon ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL cli_connect_serverlist ( struct cli_state * cli , char * p ) ;
1998-10-04 14:14:21 +04:00
int cli_printjob_del ( struct cli_state * cli , int job ) ;
1998-10-04 13:42:51 +04:00
int cli_print_queue ( struct cli_state * cli ,
void ( * fn ) ( struct print_job_info * ) ) ;
1998-11-09 06:45:49 +03:00
BOOL cli_chkpath ( struct cli_state * cli , char * path ) ;
BOOL cli_message_start ( struct cli_state * cli , char * host , char * username ,
int * grp ) ;
BOOL cli_message_text ( struct cli_state * cli , char * msg , int len , int grp ) ;
BOOL cli_message_end ( struct cli_state * cli , int grp ) ;
BOOL cli_dskattr ( struct cli_state * cli , int * bsize , int * total , int * avail ) ;
1998-05-08 20:49:10 +04:00
1999-10-21 20:53:50 +04:00
/*The following definitions come from libsmb/clienttrust.c */
BOOL change_trust_account_password ( char * domain , char * remote_machine_list ,
uint16 sec_chan ) ;
1998-08-09 18:37:32 +04:00
/*The following definitions come from libsmb/credentials.c */
char * credstr ( uchar * cred ) ;
void cred_session_key ( DOM_CHAL * clnt_chal , DOM_CHAL * srv_chal , char * pass ,
uchar session_key [ 8 ] ) ;
void cred_create ( uchar session_key [ 8 ] , DOM_CHAL * stor_cred , UTIME timestamp ,
DOM_CHAL * cred ) ;
int cred_assert ( DOM_CHAL * cred , uchar session_key [ 8 ] , DOM_CHAL * stored_cred ,
UTIME timestamp ) ;
BOOL clnt_deal_with_creds ( uchar sess_key [ 8 ] ,
DOM_CRED * sto_clnt_cred , DOM_CRED * rcv_srv_cred ) ;
BOOL deal_with_creds ( uchar sess_key [ 8 ] ,
DOM_CRED * sto_clnt_cred ,
DOM_CRED * rcv_clnt_cred , DOM_CRED * rtn_srv_cred ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from libsmb/namequery.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
BOOL name_status ( int fd , char * name , int name_type , BOOL recurse ,
struct in_addr to_ip , char * master , char * rname ,
void ( * fn ) ( struct packet_struct * ) ) ;
1998-11-12 09:12:19 +03:00
struct in_addr * name_query ( int fd , const char * name , int name_type , BOOL bcast , BOOL recurse ,
1998-08-09 17:25:34 +04:00
struct in_addr to_ip , int * count , void ( * fn ) ( struct packet_struct * ) ) ;
FILE * startlmhosts ( char * fname ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL getlmhostsent ( FILE * fp , pstring name , int * name_type , struct in_addr * ipaddr ) ;
1998-08-09 17:25:34 +04:00
void endlmhosts ( FILE * fp ) ;
1998-11-12 09:12:19 +03:00
BOOL resolve_name ( const char * name , struct in_addr * return_ip , int name_type ) ;
1999-11-27 02:04:19 +03:00
BOOL resolve_srv_name ( const char * srv_name , fstring dest_host ,
struct in_addr * ip ) ;
1998-10-08 10:21:33 +04:00
BOOL find_master_ip ( char * group , struct in_addr * master_ip ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from libsmb/nmblib.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
void debug_nmb_packet ( struct packet_struct * p ) ;
1998-11-14 04:04:13 +03:00
char * nmb_namestr ( struct nmb_name * n ) ;
1999-06-24 23:02:37 +04:00
void nmb_safe_namestr ( struct nmb_name * n , char * str , size_t len ) ;
1998-08-09 17:25:34 +04:00
struct packet_struct * copy_packet ( struct packet_struct * packet ) ;
void free_packet ( struct packet_struct * packet ) ;
struct packet_struct * read_packet ( int fd , enum packet_type packet_type ) ;
1998-11-12 09:12:19 +03:00
void make_nmb_name ( struct nmb_name * n , const char * name , int type , const char * this_scope ) ;
1998-08-09 17:25:34 +04:00
BOOL nmb_name_equal ( struct nmb_name * n1 , struct nmb_name * n2 ) ;
BOOL send_packet ( struct packet_struct * p ) ;
struct packet_struct * receive_packet ( int fd , enum packet_type type , int t ) ;
1998-08-30 12:45:23 +04:00
void sort_query_replies ( char * data , int n , struct in_addr ip ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from libsmb/nterr.c */
1998-05-08 20:49:10 +04:00
1999-06-24 22:58:08 +04:00
void get_safe_nt_error_msg ( uint32 nt_code , char * msg , size_t len ) ;
1998-08-09 17:25:34 +04:00
char * get_nt_error_msg ( uint32 nt_code ) ;
1998-05-08 20:49:10 +04:00
1998-11-12 10:06:48 +03:00
/*The following definitions come from libsmb/passchange.c */
BOOL remote_password_change ( const char * remote_machine , const char * user_name ,
1998-11-13 02:49:32 +03:00
const char * old_passwd , const char * new_passwd ,
char * err_str , size_t err_str_len ) ;
1998-11-12 10:06:48 +03:00
1998-09-26 01:01:52 +04:00
/*The following definitions come from libsmb/pwd_cache.c */
void pwd_init ( struct pwd_info * pwd ) ;
void pwd_obfuscate_key ( struct pwd_info * pwd , uint32 int_key , char * str_key ) ;
void pwd_read ( struct pwd_info * pwd , char * passwd_report , BOOL do_encrypt ) ;
void pwd_set_nullpwd ( struct pwd_info * pwd ) ;
void pwd_set_cleartext ( struct pwd_info * pwd , char * clr ) ;
void pwd_get_cleartext ( struct pwd_info * pwd , char * clr ) ;
1998-09-29 01:43:48 +04:00
void pwd_set_lm_nt_16 ( struct pwd_info * pwd , uchar lm_pwd [ 16 ] , uchar nt_pwd [ 16 ] ) ;
void pwd_get_lm_nt_16 ( struct pwd_info * pwd , uchar lm_pwd [ 16 ] , uchar nt_pwd [ 16 ] ) ;
1998-09-26 01:01:52 +04:00
void pwd_make_lm_nt_16 ( struct pwd_info * pwd , char * clr ) ;
1999-06-29 22:47:06 +04:00
void pwd_make_lm_nt_owf2 ( struct pwd_info * pwd , const uchar srv_key [ 8 ] ,
const char * user , const char * server , const char * domain ) ;
1998-09-29 01:43:48 +04:00
void pwd_make_lm_nt_owf ( struct pwd_info * pwd , uchar cryptkey [ 8 ] ) ;
1999-06-29 22:47:06 +04:00
void pwd_get_lm_nt_owf ( struct pwd_info * pwd , uchar lm_owf [ 24 ] ,
you know what? this sort of thing makes me laugh. hmm, what functions
have we got. and what data do we have. hmm.. i wonder what the NTLMv2
user session key can be... hmmm... weell.... there's some hidden data
here, generated from the user password that doesn't go over-the-wire,
so that's _got_ to be involved. and... that bit of data took a lot of
computation to produce, so it's probably _also_ involved... and md4 no, md5?
no, how about hmac_md5 yes let's try that one (the other's didn't work)
oh goodie, it worked!
i love it when this sort of thing happens. took all of fifteen minutes to
guess it. tried concatenating client and server challenges. tried
concatenating _random_ bits of client and server challenges. tried
md5 of the above. tried hmac_md5 of the above. eventually, it boils down
to this:
kr = MD4(NT#,username,domainname)
hmacntchal=hmac_md5(kr, nt server challenge)
sess_key = hmac_md5(kr, hmacntchal);
(This used to be commit ab174759cd210fe1be888d0c589a5b2669f7ff1e)
1999-11-21 22:24:01 +03:00
uchar * nt_owf , size_t * nt_owf_len ,
uchar * sess_key ) ;
1998-09-26 01:01:52 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from libsmb/smbdes.c */
1998-05-08 20:49:10 +04:00
1999-11-25 08:34:12 +03:00
void smbhash ( unsigned char * out , const uchar * in , const uchar * key , int forw ) ;
1998-08-09 17:25:34 +04:00
void E_P16 ( unsigned char * p14 , unsigned char * p16 ) ;
void E_P24 ( unsigned char * p21 , unsigned char * c8 , unsigned char * p24 ) ;
void D_P16 ( unsigned char * p14 , unsigned char * in , unsigned char * out ) ;
void E_old_pw_hash ( unsigned char * p14 , unsigned char * in , unsigned char * out ) ;
void cred_hash1 ( unsigned char * out , unsigned char * in , unsigned char * key ) ;
void cred_hash2 ( unsigned char * out , unsigned char * in , unsigned char * key ) ;
void cred_hash3 ( unsigned char * out , unsigned char * in , unsigned char * key , int forw ) ;
void SamOEMhash ( unsigned char * data , unsigned char * key , int val ) ;
1999-07-22 14:55:09 +04:00
void sam_pwd_hash ( uint32 rid , const uchar * in , uchar * out , int forw ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from libsmb/smbencrypt.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
void SMBencrypt ( uchar * passwd , uchar * c8 , uchar * p24 ) ;
1999-06-29 22:47:06 +04:00
void SMBNTencrypt ( uchar * passwd , uchar * c8 , uchar * p24 ) ;
1998-08-09 17:25:34 +04:00
void E_md4hash ( uchar * passwd , uchar * p16 ) ;
1999-11-19 04:37:16 +03:00
void lm_owf_genW ( const UNISTR2 * pwd , uchar p16 [ 16 ] ) ;
1999-06-29 22:47:06 +04:00
void lm_owf_gen ( const char * pwd , uchar p16 [ 16 ] ) ;
1999-11-19 04:37:16 +03:00
void nt_owf_genW ( const UNISTR2 * pwd , uchar nt_p16 [ 16 ] ) ;
1999-06-29 22:47:06 +04:00
void nt_owf_gen ( const char * pwd , uchar nt_p16 [ 16 ] ) ;
1999-11-19 04:37:16 +03:00
void nt_lm_owf_genW ( const UNISTR2 * pwd , uchar nt_p16 [ 16 ] , uchar lm_p16 [ 16 ] ) ;
1999-06-29 22:47:06 +04:00
void nt_lm_owf_gen ( const char * pwd , uchar nt_p16 [ 16 ] , uchar lm_p16 [ 16 ] ) ;
1998-09-30 00:24:17 +04:00
void SMBOWFencrypt ( uchar passwd [ 16 ] , uchar * c8 , uchar p24 [ 24 ] ) ;
1999-06-29 22:47:06 +04:00
void SMBOWFencrypt_ntv2 ( const uchar kr [ 16 ] ,
const uchar * srv_chal , int srv_chal_len ,
const uchar * cli_chal , int cli_chal_len ,
char resp_buf [ 16 ] ) ;
1999-11-21 22:59:56 +03:00
void SMBsesskeygen_ntv2 ( const uchar kr [ 16 ] ,
const uchar * nt_resp ,
char sess_key [ 16 ] ) ;
void SMBsesskeygen_ntv1 ( const uchar kr [ 16 ] ,
const uchar * nt_resp ,
char sess_key [ 16 ] ) ;
1999-06-29 22:47:06 +04:00
void SMBgenclientchals ( char * lm_cli_chal ,
char * nt_cli_chal , int * nt_cli_chal_len ,
1999-07-07 01:29:54 +04:00
const char * srv , const char * dom ) ;
1999-06-29 22:47:06 +04:00
void ntv2_owf_gen ( const uchar owf [ 16 ] ,
const char * user_n ,
const char * domain_n ,
uchar kr_buf [ 16 ] ) ;
1998-10-08 01:42:24 +04:00
void NTLMSSPOWFencrypt ( uchar passwd [ 8 ] , uchar * ntlmchalresp , uchar p24 [ 24 ] ) ;
1998-11-12 09:12:19 +03:00
BOOL make_oem_passwd_hash ( char data [ 516 ] , const char * passwd , uchar old_pw_hash [ 16 ] , BOOL unicode ) ;
1999-11-25 08:34:12 +03:00
BOOL nt_decrypt_string2 ( STRING2 * out , const STRING2 * in , const uchar * key ) ;
1999-10-15 22:46:22 +04:00
void create_ntlmssp_resp ( struct pwd_info * pwd ,
char * domain , char * user_name , char * my_name ,
uint32 ntlmssp_cli_flgs ,
prs_struct * auth_resp ) ;
1999-11-05 00:41:36 +03:00
BOOL decode_pw_buffer ( const char buffer [ 516 ] , char * new_passwd ,
1999-11-19 04:37:16 +03:00
int new_passwd_size , uint32 * new_pw_len ) ;
1999-11-05 00:41:36 +03:00
BOOL encode_pw_buffer ( char buffer [ 516 ] , const char * new_pass ,
int new_pw_len , BOOL nt_pass_set ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from libsmb/smberr.c */
1998-05-08 20:49:10 +04:00
1998-12-09 19:28:04 +03:00
char * smb_err_msg ( uint8 class , uint32 num ) ;
1999-06-24 22:58:08 +04:00
BOOL smb_safe_err_msg ( uint8 class , uint32 num , char * ret , size_t len ) ;
BOOL smb_safe_errstr ( char * inbuf , char * msg , size_t len ) ;
1998-08-09 17:25:34 +04:00
char * smb_errstr ( char * inbuf ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from locking/locking.c */
1998-05-08 20:49:10 +04:00
1998-08-15 11:27:34 +04:00
BOOL is_locked ( files_struct * fsp , connection_struct * conn ,
1998-09-04 04:23:28 +04:00
SMB_OFF_T count , SMB_OFF_T offset , int lock_type ) ;
1998-08-15 11:27:34 +04:00
BOOL do_lock ( files_struct * fsp , connection_struct * conn ,
1998-09-04 04:23:28 +04:00
SMB_OFF_T count , SMB_OFF_T offset , int lock_type ,
1998-08-09 17:25:34 +04:00
int * eclass , uint32 * ecode ) ;
1998-08-15 11:27:34 +04:00
BOOL do_unlock ( files_struct * fsp , connection_struct * conn ,
1998-09-04 04:23:28 +04:00
SMB_OFF_T count , SMB_OFF_T offset , int * eclass , uint32 * ecode ) ;
1998-08-09 17:25:34 +04:00
BOOL locking_init ( int read_only ) ;
BOOL locking_end ( void ) ;
1998-08-14 21:38:29 +04:00
BOOL lock_share_entry ( connection_struct * conn ,
1998-09-01 00:20:54 +04:00
SMB_DEV_T dev , SMB_INO_T inode , int * ptok ) ;
1998-08-14 21:38:29 +04:00
BOOL unlock_share_entry ( connection_struct * conn ,
1998-09-01 00:20:54 +04:00
SMB_DEV_T dev , SMB_INO_T inode , int token ) ;
1998-08-14 21:38:29 +04:00
int get_share_modes ( connection_struct * conn ,
1998-09-01 00:20:54 +04:00
int token , SMB_DEV_T dev , SMB_INO_T inode ,
1998-08-09 17:25:34 +04:00
share_mode_entry * * shares ) ;
1998-08-15 11:27:34 +04:00
void del_share_mode ( int token , files_struct * fsp ) ;
BOOL set_share_mode ( int token , files_struct * fsp , uint16 port , uint16 op_type ) ;
1998-10-23 07:34:50 +04:00
BOOL remove_share_oplock ( int token , files_struct * fsp ) ;
BOOL modify_share_mode ( int token , files_struct * fsp , int new_mode ) ;
1998-08-09 17:25:34 +04:00
int share_mode_forall ( void ( * fn ) ( share_mode_entry * , char * ) ) ;
void share_status ( FILE * f ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from locking/locking_shm.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
struct share_ops * locking_shm_init ( int ronly ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from locking/locking_slow.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
struct share_ops * locking_slow_init ( int ronly ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from locking/shmem.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
struct shmem_ops * smb_shm_open ( int ronly ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from locking/shmem_sysv.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
struct shmem_ops * sysv_shm_open ( int ronly ) ;
1998-05-08 20:49:10 +04:00
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from mem_man/mem_man.c */
void * smb_mem_malloc ( size_t size , char * file , int line ) ;
char * smb_mem_strdup ( char * s , char * file , int line ) ;
int smb_mem_free ( void * ptr , char * file , int line ) ;
void smb_mem_write_info ( void * ptr , FILE * outfile ) ;
size_t smb_mem_query_size ( void * ptr ) ;
size_t smb_mem_query_real_size ( void * ptr ) ;
char * smb_mem_query_file ( void * ptr ) ;
int smb_mem_query_line ( void * ptr ) ;
int smb_mem_test ( void * ptr ) ;
void smb_mem_write_status ( FILE * outfile ) ;
void smb_mem_write_verbose ( FILE * outfile ) ;
void smb_mem_write_errors ( FILE * outfile ) ;
void smb_mem_set_multiplier ( int multiplier ) ;
void * smb_mem_resize ( void * ptr , size_t newsize ) ;
1998-08-09 18:08:42 +04:00
/*The following definitions come from nmbd/asyncdns.c */
int asyncdns_fd ( void ) ;
void kill_async_dns_child ( void ) ;
void start_async_dns ( void ) ;
void run_dns_queue ( void ) ;
BOOL queue_dns_query ( struct packet_struct * p , struct nmb_name * question ,
struct name_record * * n ) ;
BOOL queue_dns_query ( struct packet_struct * p , struct nmb_name * question ,
struct name_record * * n ) ;
void kill_async_dns_child ( void ) ;
/*The following definitions come from nmbd/nmbd.c */
BOOL reload_services ( BOOL test ) ;
/*The following definitions come from nmbd/nmbd_become_dmb.c */
void add_domain_names ( time_t t ) ;
/*The following definitions come from nmbd/nmbd_become_lmb.c */
void insert_permanent_name_into_unicast ( struct subnet_record * subrec ,
struct nmb_name * nmbname , uint16 nb_type ) ;
void unbecome_local_master_browser ( struct subnet_record * subrec , struct work_record * work ,
BOOL force_new_election ) ;
void become_local_master_browser ( struct subnet_record * subrec , struct work_record * work ) ;
void set_workgroup_local_master_browser_name ( struct work_record * work , char * newname ) ;
/*The following definitions come from nmbd/nmbd_browserdb.c */
void update_browser_death_time ( struct browse_cache_record * browc ) ;
struct browse_cache_record * create_browser_in_lmb_cache ( char * work_name ,
char * browser_name ,
struct in_addr ip ) ;
struct browse_cache_record * find_browser_in_lmb_cache ( char * browser_name ) ;
void expire_lmb_browsers ( time_t t ) ;
/*The following definitions come from nmbd/nmbd_browsesync.c */
void dmb_expire_and_sync_browser_lists ( time_t t ) ;
void announce_and_sync_with_domain_master_browser ( struct subnet_record * subrec ,
struct work_record * work ) ;
void collect_all_workgroup_names_from_wins_server ( time_t t ) ;
1998-08-30 19:58:17 +04:00
void sync_all_dmbs ( time_t t ) ;
1998-08-09 18:08:42 +04:00
/*The following definitions come from nmbd/nmbd_elections.c */
void check_master_browser_exists ( time_t t ) ;
void run_elections ( time_t t ) ;
void process_election ( struct subnet_record * subrec , struct packet_struct * p , char * buf ) ;
BOOL check_elections ( void ) ;
/*The following definitions come from nmbd/nmbd_incomingdgrams.c */
void tell_become_backup ( void ) ;
void process_host_announce ( struct subnet_record * subrec , struct packet_struct * p , char * buf ) ;
void process_workgroup_announce ( struct subnet_record * subrec , struct packet_struct * p , char * buf ) ;
void process_local_master_announce ( struct subnet_record * subrec , struct packet_struct * p , char * buf ) ;
void process_master_browser_announce ( struct subnet_record * subrec ,
struct packet_struct * p , char * buf ) ;
void process_lm_host_announce ( struct subnet_record * subrec , struct packet_struct * p , char * buf ) ;
void process_get_backup_list_request ( struct subnet_record * subrec ,
struct packet_struct * p , char * buf ) ;
void process_reset_browser ( struct subnet_record * subrec ,
struct packet_struct * p , char * buf ) ;
void process_announce_request ( struct subnet_record * subrec , struct packet_struct * p , char * buf ) ;
void process_lm_announce_request ( struct subnet_record * subrec , struct packet_struct * p , char * buf ) ;
/*The following definitions come from nmbd/nmbd_incomingrequests.c */
void process_name_release_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void process_name_refresh_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void process_name_registration_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void process_node_status_request ( struct subnet_record * subrec , struct packet_struct * p ) ;
void process_name_query_request ( struct subnet_record * subrec , struct packet_struct * p ) ;
/*The following definitions come from nmbd/nmbd_lmhosts.c */
void load_lmhosts_file ( char * fname ) ;
BOOL find_name_in_lmhosts ( struct nmb_name * nmbname , struct name_record * * namerecp ) ;
/*The following definitions come from nmbd/nmbd_logonnames.c */
void add_logon_names ( void ) ;
/*The following definitions come from nmbd/nmbd_mynames.c */
BOOL register_my_workgroup_and_names ( void ) ;
void release_my_names ( void ) ;
void refresh_my_names ( time_t t ) ;
/*The following definitions come from nmbd/nmbd_namelistdb.c */
void set_samba_nb_type ( void ) ;
void remove_name_from_namelist ( struct subnet_record * subrec ,
struct name_record * namerec ) ;
struct name_record * find_name_on_subnet ( struct subnet_record * subrec ,
struct nmb_name * nmbname ,
BOOL self_only ) ;
struct name_record * find_name_for_remote_broadcast_subnet (
struct nmb_name * nmbname ,
BOOL self_only ) ;
void update_name_ttl ( struct name_record * namerec , int ttl ) ;
struct name_record * add_name_to_subnet ( struct subnet_record * subrec ,
char * name ,
int type ,
uint16 nb_flags ,
int ttl ,
enum name_source source ,
int num_ips ,
struct in_addr * iplist ) ;
void standard_success_register ( struct subnet_record * subrec ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname , uint16 nb_flags , int ttl ,
struct in_addr registered_ip ) ;
void standard_fail_register ( struct subnet_record * subrec ,
struct response_record * rrec ,
struct nmb_name * nmbname ) ;
BOOL find_ip_in_name_record ( struct name_record * namerec , struct in_addr ip ) ;
void add_ip_to_name_record ( struct name_record * namerec , struct in_addr new_ip ) ;
void remove_ip_from_name_record ( struct name_record * namerec ,
struct in_addr remove_ip ) ;
void standard_success_release ( struct subnet_record * subrec ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname ,
struct in_addr released_ip ) ;
void expire_names_on_subnet ( struct subnet_record * subrec , time_t t ) ;
void expire_names ( time_t t ) ;
void add_samba_names_to_subnet ( struct subnet_record * subrec ) ;
void dump_all_namelists ( void ) ;
/*The following definitions come from nmbd/nmbd_namequery.c */
BOOL query_name ( struct subnet_record * subrec , char * name , int type ,
query_name_success_function success_fn ,
query_name_fail_function fail_fn ,
struct userdata_struct * userdata ) ;
BOOL query_name_from_wins_server ( struct in_addr ip_to ,
char * name , int type ,
query_name_success_function success_fn ,
query_name_fail_function fail_fn ,
struct userdata_struct * userdata ) ;
/*The following definitions come from nmbd/nmbd_nameregister.c */
BOOL register_name ( struct subnet_record * subrec ,
char * name , int type , uint16 nb_flags ,
register_name_success_function success_fn ,
register_name_fail_function fail_fn ,
struct userdata_struct * userdata ) ;
BOOL refresh_name ( struct subnet_record * subrec , struct name_record * namerec ,
refresh_name_success_function success_fn ,
refresh_name_fail_function fail_fn ,
struct userdata_struct * userdata ) ;
/*The following definitions come from nmbd/nmbd_namerelease.c */
BOOL release_name ( struct subnet_record * subrec , struct name_record * namerec ,
release_name_success_function success_fn ,
release_name_fail_function fail_fn ,
struct userdata_struct * userdata ) ;
/*The following definitions come from nmbd/nmbd_nodestatus.c */
BOOL node_status ( struct subnet_record * subrec , struct nmb_name * nmbname ,
struct in_addr send_ip , node_status_success_function success_fn ,
node_status_fail_function fail_fn , struct userdata_struct * userdata ) ;
/*The following definitions come from nmbd/nmbd_packets.c */
uint16 get_nb_flags ( char * buf ) ;
void set_nb_flags ( char * buf , uint16 nb_flags ) ;
struct response_record * queue_register_name ( struct subnet_record * subrec ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
register_name_success_function success_fn ,
register_name_fail_function fail_fn ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname ,
uint16 nb_flags ) ;
struct response_record * queue_register_multihomed_name ( struct subnet_record * subrec ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
register_name_success_function success_fn ,
register_name_fail_function fail_fn ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname ,
uint16 nb_flags ,
struct in_addr register_ip ) ;
struct response_record * queue_release_name ( struct subnet_record * subrec ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
release_name_success_function success_fn ,
release_name_fail_function fail_fn ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname ,
uint16 nb_flags ,
struct in_addr release_ip ) ;
struct response_record * queue_refresh_name ( struct subnet_record * subrec ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
refresh_name_success_function success_fn ,
refresh_name_fail_function fail_fn ,
struct userdata_struct * userdata ,
struct name_record * namerec ,
struct in_addr refresh_ip ) ;
struct response_record * queue_query_name ( struct subnet_record * subrec ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
query_name_success_function success_fn ,
query_name_fail_function fail_fn ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname ) ;
struct response_record * queue_query_name_from_wins_server ( struct in_addr to_ip ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
query_name_success_function success_fn ,
query_name_fail_function fail_fn ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname ) ;
struct response_record * queue_node_status ( struct subnet_record * subrec ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
node_status_success_function success_fn ,
node_status_fail_function fail_fn ,
struct userdata_struct * userdata ,
struct nmb_name * nmbname ,
struct in_addr send_ip ) ;
void reply_netbios_packet ( struct packet_struct * orig_packet ,
int rcode , enum netbios_reply_type_code rcv_code , int opcode ,
int ttl , char * data , int len ) ;
void run_packet_queue ( void ) ;
void retransmit_or_expire_response_records ( time_t t ) ;
BOOL listen_for_packets ( BOOL run_election ) ;
BOOL send_mailslot ( BOOL unique , char * mailslot , char * buf , int len ,
char * srcname , int src_type ,
char * dstname , int dest_type ,
1998-08-30 21:04:24 +04:00
struct in_addr dest_ip , struct in_addr src_ip ,
int dest_port ) ;
1998-08-09 18:08:42 +04:00
/*The following definitions come from nmbd/nmbd_processlogon.c */
void process_logon_packet ( struct packet_struct * p , char * buf , int len ,
char * mailslot ) ;
/*The following definitions come from nmbd/nmbd_responserecordsdb.c */
void remove_response_record ( struct subnet_record * subrec ,
struct response_record * rrec ) ;
struct response_record * make_response_record ( struct subnet_record * subrec ,
struct packet_struct * p ,
response_function resp_fn ,
timeout_response_function timeout_fn ,
success_function success_fn ,
fail_function fail_fn ,
struct userdata_struct * userdata ) ;
struct response_record * find_response_record ( struct subnet_record * * ppsubrec ,
uint16 id ) ;
BOOL is_refresh_already_queued ( struct subnet_record * subrec , struct name_record * namerec ) ;
/*The following definitions come from nmbd/nmbd_sendannounce.c */
void send_browser_reset ( int reset_type , char * to_name , int to_type , struct in_addr to_ip ) ;
void broadcast_announce_request ( struct subnet_record * subrec , struct work_record * work ) ;
void announce_my_server_names ( time_t t ) ;
void announce_my_lm_server_names ( time_t t ) ;
void reset_announce_timer ( void ) ;
void announce_myself_to_domain_master_browser ( time_t t ) ;
void announce_my_servers_removed ( void ) ;
void announce_remote ( time_t t ) ;
void browse_sync_remote ( time_t t ) ;
/*The following definitions come from nmbd/nmbd_serverlistdb.c */
void remove_all_servers ( struct work_record * work ) ;
struct server_record * find_server_in_workgroup ( struct work_record * work , char * name ) ;
void remove_server_from_workgroup ( struct work_record * work , struct server_record * servrec ) ;
struct server_record * create_server_on_workgroup ( struct work_record * work ,
char * name , int servertype ,
int ttl , char * comment ) ;
void update_server_ttl ( struct server_record * servrec , int ttl ) ;
void expire_servers ( struct work_record * work , time_t t ) ;
void write_browse_list ( time_t t , BOOL force_write ) ;
/*The following definitions come from nmbd/nmbd_subnetdb.c */
BOOL create_subnets ( void ) ;
BOOL we_are_a_wins_client ( void ) ;
struct subnet_record * get_next_subnet_maybe_unicast ( struct subnet_record * subrec ) ;
struct subnet_record * get_next_subnet_maybe_unicast_or_wins_server ( struct subnet_record * subrec ) ;
1998-08-30 19:58:17 +04:00
/*The following definitions come from nmbd/nmbd_synclists.c */
void sync_browse_lists ( struct work_record * work ,
char * name , int nm_type ,
struct in_addr ip , BOOL local , BOOL servers ) ;
void sync_check_completion ( void ) ;
1998-08-09 18:08:42 +04:00
/*The following definitions come from nmbd/nmbd_winsproxy.c */
void make_wins_proxy_name_query_request ( struct subnet_record * subrec ,
struct packet_struct * incoming_packet ,
struct nmb_name * question_name ) ;
/*The following definitions come from nmbd/nmbd_winsserver.c */
BOOL packet_is_for_wins_server ( struct packet_struct * packet ) ;
BOOL initialise_wins ( void ) ;
void wins_process_name_refresh_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void wins_process_name_registration_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void wins_process_multihomed_name_registration_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void send_wins_name_query_response ( int rcode , struct packet_struct * p ,
struct name_record * namerec ) ;
void wins_process_name_query_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void wins_process_name_release_request ( struct subnet_record * subrec ,
struct packet_struct * p ) ;
void initiate_wins_processing ( time_t t ) ;
1998-09-17 10:36:08 +04:00
void wins_write_database ( BOOL background ) ;
1998-08-09 18:08:42 +04:00
/*The following definitions come from nmbd/nmbd_workgroupdb.c */
struct work_record * find_workgroup_on_subnet ( struct subnet_record * subrec ,
fstring name ) ;
struct work_record * create_workgroup_on_subnet ( struct subnet_record * subrec ,
fstring name , int ttl ) ;
void update_workgroup_ttl ( struct work_record * work , int ttl ) ;
void initiate_myworkgroup_startup ( struct subnet_record * subrec , struct work_record * work ) ;
void dump_workgroups ( BOOL force_write ) ;
void expire_workgroups_and_servers ( time_t t ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from param/loadparm.c */
1998-05-08 20:49:10 +04:00
1999-07-22 09:00:08 +04:00
struct vfs_options * lp_vfsoptions ( int i ) ;
1998-05-08 20:49:10 +04:00
char * lp_logfile ( void ) ;
char * lp_smbrun ( void ) ;
char * lp_configfile ( void ) ;
char * lp_smb_passwd_file ( void ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
char * lp_smb_passgrp_file ( void ) ;
char * lp_smb_group_file ( void ) ;
char * lp_smb_alias_file ( void ) ;
1998-05-08 20:49:10 +04:00
char * lp_serverstring ( void ) ;
char * lp_printcapname ( void ) ;
char * lp_lockdir ( void ) ;
char * lp_rootdir ( void ) ;
char * lp_defaultservice ( void ) ;
char * lp_msg_command ( void ) ;
char * lp_hosts_equiv ( void ) ;
char * lp_auto_services ( void ) ;
char * lp_passwd_program ( void ) ;
char * lp_passwd_chat ( void ) ;
char * lp_passwordserver ( void ) ;
char * lp_name_resolve_order ( void ) ;
char * lp_workgroup ( void ) ;
1999-11-16 20:27:41 +03:00
char * lp_trusted_domains ( void ) ;
char * lp_trusting_domains ( void ) ;
1998-05-08 20:49:10 +04:00
char * lp_username_map ( void ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
char * lp_aliasname_map ( void ) ;
1998-09-08 23:21:04 +04:00
char * lp_groupname_map ( void ) ;
1998-11-29 23:03:33 +03:00
char * lp_builtinname_map ( void ) ;
1999-07-14 23:21:44 +04:00
char * lp_builtinrid_file ( void ) ;
1998-11-29 23:03:33 +03:00
char * lp_ntusrname_map ( void ) ;
1998-05-08 20:49:10 +04:00
char * lp_logon_script ( void ) ;
char * lp_logon_path ( void ) ;
char * lp_logon_drive ( void ) ;
char * lp_logon_home ( void ) ;
char * lp_remote_announce ( void ) ;
char * lp_remote_browse_sync ( void ) ;
char * lp_wins_server ( void ) ;
char * lp_interfaces ( void ) ;
char * lp_socket_address ( void ) ;
char * lp_nis_home_map_name ( void ) ;
char * lp_netbios_aliases ( void ) ;
char * lp_driverfile ( void ) ;
1998-08-21 15:37:40 +04:00
char * lp_panic_action ( void ) ;
1999-04-27 14:43:32 +04:00
char * lp_nt_forms ( void ) ;
char * lp_nt_drivers_file ( void ) ;
1999-07-12 22:46:15 +04:00
char * lp_dfs_map ( void ) ;
1998-05-08 20:49:10 +04:00
char * lp_ldap_server ( void ) ;
char * lp_ldap_suffix ( void ) ;
1998-12-08 03:25:04 +03:00
char * lp_ldap_bind_as ( void ) ;
char * lp_ldap_passwd_file ( void ) ;
1998-06-16 05:35:52 +04:00
int lp_ssl_version ( void ) ;
char * lp_ssl_hosts ( void ) ;
char * lp_ssl_hosts_resign ( void ) ;
char * lp_ssl_cacertdir ( void ) ;
char * lp_ssl_cacertfile ( void ) ;
char * lp_ssl_cert ( void ) ;
char * lp_ssl_privkey ( void ) ;
char * lp_ssl_client_cert ( void ) ;
char * lp_ssl_client_privkey ( void ) ;
char * lp_ssl_ciphers ( void ) ;
BOOL lp_ssl_enabled ( void ) ;
BOOL lp_ssl_reqClientCert ( void ) ;
BOOL lp_ssl_reqServerCert ( void ) ;
BOOL lp_ssl_compatibility ( void ) ;
1998-05-08 20:49:10 +04:00
BOOL lp_dns_proxy ( void ) ;
BOOL lp_wins_support ( void ) ;
BOOL lp_we_are_a_wins_server ( void ) ;
BOOL lp_wins_proxy ( void ) ;
BOOL lp_local_master ( void ) ;
BOOL lp_domain_logons ( void ) ;
BOOL lp_load_printers ( void ) ;
BOOL lp_use_rhosts ( void ) ;
BOOL lp_readprediction ( void ) ;
BOOL lp_readbmpx ( void ) ;
BOOL lp_readraw ( void ) ;
BOOL lp_writeraw ( void ) ;
BOOL lp_null_passwords ( void ) ;
BOOL lp_strip_dot ( void ) ;
BOOL lp_encrypted_passwords ( void ) ;
BOOL lp_update_encrypted ( void ) ;
1999-06-29 22:47:06 +04:00
BOOL lp_client_ntlmv2 ( void ) ;
1999-05-01 05:41:28 +04:00
BOOL lp_server_ntlmv2 ( void ) ;
1998-05-08 20:49:10 +04:00
BOOL lp_syslog_only ( void ) ;
1998-08-03 23:07:55 +04:00
BOOL lp_timestamp_logs ( void ) ;
1998-05-08 20:49:10 +04:00
BOOL lp_browse_list ( void ) ;
BOOL lp_unix_realname ( void ) ;
BOOL lp_nis_home_map ( void ) ;
BOOL lp_bind_interfaces_only ( void ) ;
BOOL lp_unix_password_sync ( void ) ;
BOOL lp_passwd_chat_debug ( void ) ;
1998-07-31 01:18:57 +04:00
BOOL lp_ole_locking_compat ( void ) ;
1998-09-05 07:14:40 +04:00
BOOL lp_nt_smb_support ( void ) ;
1998-10-18 23:45:05 +04:00
BOOL lp_nt_pipe_support ( void ) ;
1998-09-06 05:37:14 +04:00
BOOL lp_stat_cache ( void ) ;
1998-05-08 20:49:10 +04:00
int lp_os_level ( void ) ;
int lp_max_ttl ( void ) ;
int lp_max_wins_ttl ( void ) ;
int lp_min_wins_ttl ( void ) ;
int lp_max_log_size ( void ) ;
1998-09-30 05:49:24 +04:00
int lp_max_open_files ( void ) ;
1998-05-08 20:49:10 +04:00
int lp_maxxmit ( void ) ;
int lp_maxmux ( void ) ;
int lp_passwordlevel ( void ) ;
int lp_usernamelevel ( void ) ;
int lp_readsize ( void ) ;
int lp_shmem_size ( void ) ;
int lp_deadtime ( void ) ;
int lp_maxprotocol ( void ) ;
int lp_security ( void ) ;
int lp_maxdisksize ( void ) ;
int lp_lpqcachetime ( void ) ;
int lp_syslog ( void ) ;
int lp_client_code_page ( void ) ;
int lp_lm_announce ( void ) ;
int lp_lm_interval ( void ) ;
1998-05-27 04:30:52 +04:00
int lp_machine_password_timeout ( void ) ;
1998-08-03 23:07:55 +04:00
int lp_change_notify_timeout ( void ) ;
1998-08-29 01:46:29 +04:00
int lp_stat_cache_size ( void ) ;
1998-11-10 23:51:25 +03:00
int lp_map_to_guest ( void ) ;
1998-05-08 20:49:10 +04:00
int lp_ldap_port ( void ) ;
char * lp_preexec ( int ) ;
char * lp_postexec ( int ) ;
char * lp_rootpreexec ( int ) ;
char * lp_rootpostexec ( int ) ;
char * lp_servicename ( int ) ;
char * lp_pathname ( int ) ;
char * lp_dontdescend ( int ) ;
char * lp_username ( int ) ;
char * lp_guestaccount ( int ) ;
char * lp_invalid_users ( int ) ;
char * lp_valid_users ( int ) ;
char * lp_admin_users ( int ) ;
char * lp_printcommand ( int ) ;
char * lp_lpqcommand ( int ) ;
char * lp_lprmcommand ( int ) ;
char * lp_lppausecommand ( int ) ;
char * lp_lpresumecommand ( int ) ;
1998-07-16 04:06:29 +04:00
char * lp_queuepausecommand ( int ) ;
char * lp_queueresumecommand ( int ) ;
1998-05-08 20:49:10 +04:00
char * lp_printername ( int ) ;
char * lp_printerdriver ( int ) ;
char * lp_hostsallow ( int ) ;
char * lp_hostsdeny ( int ) ;
char * lp_magicscript ( int ) ;
char * lp_magicoutput ( int ) ;
char * lp_comment ( int ) ;
char * lp_force_user ( int ) ;
char * lp_force_group ( int ) ;
char * lp_readlist ( int ) ;
char * lp_writelist ( int ) ;
1998-09-20 19:48:35 +04:00
char * lp_fstype ( int ) ;
1999-04-04 11:24:14 +04:00
char * lp_vfsobj ( int ) ;
1998-05-08 20:49:10 +04:00
char * lp_mangled_map ( int ) ;
char * lp_veto_files ( int ) ;
char * lp_hide_files ( int ) ;
char * lp_veto_oplocks ( int ) ;
char * lp_driverlocation ( int ) ;
BOOL lp_revalidate ( int ) ;
BOOL lp_casesensitive ( int ) ;
BOOL lp_preservecase ( int ) ;
BOOL lp_shortpreservecase ( int ) ;
BOOL lp_casemangle ( int ) ;
BOOL lp_status ( int ) ;
BOOL lp_hide_dot_files ( int ) ;
BOOL lp_browseable ( int ) ;
BOOL lp_readonly ( int ) ;
BOOL lp_no_set_dir ( int ) ;
BOOL lp_guest_ok ( int ) ;
BOOL lp_guest_only ( int ) ;
BOOL lp_print_ok ( int ) ;
BOOL lp_postscript ( int ) ;
BOOL lp_map_hidden ( int ) ;
BOOL lp_map_archive ( int ) ;
BOOL lp_locking ( int ) ;
BOOL lp_strict_locking ( int ) ;
BOOL lp_share_modes ( int ) ;
BOOL lp_oplocks ( int ) ;
BOOL lp_onlyuser ( int ) ;
BOOL lp_manglednames ( int ) ;
BOOL lp_widelinks ( int ) ;
BOOL lp_symlinks ( int ) ;
BOOL lp_syncalways ( int ) ;
1998-07-28 22:15:31 +04:00
BOOL lp_strict_sync ( int ) ;
1998-05-08 20:49:10 +04:00
BOOL lp_map_system ( int ) ;
BOOL lp_delete_readonly ( int ) ;
BOOL lp_fake_oplocks ( int ) ;
BOOL lp_recursive_veto_delete ( int ) ;
BOOL lp_dos_filetimes ( int ) ;
BOOL lp_dos_filetime_resolution ( int ) ;
BOOL lp_fake_dir_create_times ( int ) ;
1998-09-08 23:21:04 +04:00
BOOL lp_blocking_locks ( int ) ;
1998-05-08 20:49:10 +04:00
int lp_create_mode ( int ) ;
int lp_force_create_mode ( int ) ;
int lp_dir_mode ( int ) ;
int lp_force_dir_mode ( int ) ;
int lp_max_connections ( int ) ;
int lp_defaultcase ( int ) ;
int lp_minprintspace ( int ) ;
int lp_printing ( int ) ;
char lp_magicchar ( int ) ;
1999-03-06 01:03:04 +03:00
char * lp_mysql_host ( void ) ;
char * lp_mysql_user ( void ) ;
char * lp_mysql_passfile ( void ) ;
char * lp_mysql_db ( void ) ;
char * lp_mysql_table ( void ) ;
1998-05-08 20:49:10 +04:00
BOOL lp_add_home ( char * pszHomename , int iDefaultService , char * pszHomedir ) ;
int lp_add_service ( char * pszService , int iDefaultService ) ;
BOOL lp_add_printer ( char * pszPrintername , int iDefaultService ) ;
BOOL lp_file_list_changed ( void ) ;
void * lp_local_ptr ( int snum , void * ptr ) ;
BOOL lp_do_parameter ( int snum , char * pszParmName , char * pszParmValue ) ;
BOOL lp_is_default ( int snum , struct parm_struct * parm ) ;
struct parm_struct * lp_next_parameter ( int snum , int * i , int allparameters ) ;
BOOL lp_snum_ok ( int iService ) ;
1998-08-14 21:38:29 +04:00
void lp_add_one_printer ( char * name , char * comment ) ;
1998-05-08 20:49:10 +04:00
BOOL lp_loaded ( void ) ;
void lp_killunused ( BOOL ( * snumused ) ( int ) ) ;
BOOL lp_load ( char * pszFname , BOOL global_only , BOOL save_defaults , BOOL add_ipc ) ;
int lp_numservices ( void ) ;
void lp_dump ( FILE * f , BOOL show_defaults ) ;
int lp_servicenumber ( char * pszServiceName ) ;
char * volume_label ( int snum ) ;
void lp_remove_service ( int snum ) ;
void lp_copy_service ( int snum , char * new_name ) ;
int lp_default_server_announce ( void ) ;
int lp_major_announce_version ( void ) ;
int lp_minor_announce_version ( void ) ;
void lp_set_name_resolve_order ( char * new_order ) ;
1998-09-18 21:50:18 +04:00
void lp_set_kernel_oplocks ( BOOL val ) ;
1998-09-30 05:49:24 +04:00
BOOL lp_kernel_oplocks ( void ) ;
1998-11-24 00:51:05 +03:00
int lp_server_role ( void ) ;
1999-04-20 07:44:06 +04:00
BOOL lp_domain_master ( void ) ;
BOOL lp_preferred_master ( void ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from param/params.c */
BOOL pm_process ( char * FileName ,
BOOL ( * sfunc ) ( char * ) ,
BOOL ( * pfunc ) ( char * , char * ) ) ;
1998-08-14 06:02:40 +04:00
/*The following definitions come from passdb/ldap.c */
1999-01-15 08:00:26 +03:00
BOOL ldap_connect ( void ) ;
void ldap_disconnect ( void ) ;
1998-12-08 03:25:04 +03:00
BOOL ldap_search_for ( char * filter ) ;
BOOL ldap_search_by_name ( const char * user ) ;
BOOL ldap_search_by_uid ( int uid ) ;
BOOL ldap_get_attribute ( char * attribute , char * value ) ;
1998-12-08 03:33:05 +03:00
struct smb_passwd * ldap_getpw ( void ) ;
1999-01-15 08:00:26 +03:00
BOOL ldap_allocaterid ( uint32 * rid ) ;
1998-12-08 03:25:04 +03:00
struct smb_passdb_ops * ldap_initialise_password_db ( void ) ;
1998-08-14 06:02:40 +04:00
1999-03-24 20:26:08 +03:00
/*The following definitions come from passdb/mysqlpass.c */
int mysql_db_lock_connect ( MYSQL * handle ) ;
void * mysql_startpwent ( BOOL update ) ;
void mysql_endpwent ( void * ptr ) ;
SMB_BIG_UINT mysql_getpwpos ( void * vp ) ;
BOOL mysql_setpwpos ( void * vp , SMB_BIG_UINT pos ) ;
void * mysql_fill_smb_passwd ( MYSQL_ROW * row ) ;
struct smb_passwd * mysql_getsmbpwent ( void * vp ) ;
void * mysql_fetch_passwd ( void * ( * filler ) ( MYSQL_ROW * ) , char * where ) ;
void * mysql_getpwuid ( void * ( * filler ) ( MYSQL_ROW * ) , uid_t uid ) ;
struct smb_passwd * mysql_getsmbpwuid ( uid_t uid ) ;
void * mysql_getpwnam ( void * ( * filler ) ( MYSQL_ROW * ) , char * field , const char * name ) ;
struct smb_passwd * mysql_getsmbpwnam ( const char * unix_name ) ;
BOOL mysql_del_smb ( MYSQL * handle , char * unix_name ) ;
BOOL mysql_add_smb ( MYSQL * handle , struct smb_passwd * smb ) ;
BOOL mysql_mod_smb ( MYSQL * handle , struct smb_passwd * smb , BOOL override ) ;
BOOL mysql_add_smbpwd_entry ( struct smb_passwd * smb ) ;
BOOL mysql_mod_smbpwd_entry ( struct smb_passwd * smb , BOOL override ) ;
struct smb_passdb_ops * mysql_initialise_password_db ( void ) ;
/*The following definitions come from passdb/mysqlsampass.c */
void * mysql_fill_sam_passwd ( MYSQL_ROW * row ) ;
struct sam_passwd * mysql_getsampwent ( void * vp ) ;
struct sam_passwd * mysql_getsampwrid ( uint32 rid ) ;
struct sam_passwd * mysql_getsampwuid ( uid_t uid ) ;
struct sam_passwd * mysql_getsampwntnam ( const char * nt_name ) ;
struct sam_disp_info * mysql_getsamdispntnam ( const char * nt_name ) ;
struct sam_disp_info * mysql_getsamdisprid ( uint32 rid ) ;
struct sam_disp_info * mysql_getsamdispent ( void * vp ) ;
BOOL mysql_add_sampwd_entry ( struct sam_passwd * sam ) ;
BOOL mysql_mod_sampwd_entry ( struct sam_passwd * sam , BOOL override ) ;
struct sam_passdb_ops * mysql_initialise_sam_password_db ( void ) ;
1998-08-14 06:02:40 +04:00
/*The following definitions come from passdb/nispass.c */
1998-11-25 22:57:04 +03:00
struct passdb_ops * nisplus_initialise_password_db ( void ) ;
1998-08-14 06:02:40 +04:00
1998-08-10 11:04:53 +04:00
/*The following definitions come from passdb/pass_check.c */
void dfs_unlogin ( void ) ;
BOOL pass_check ( char * user , char * password , int pwlen , struct passwd * pwd ,
BOOL ( * fn ) ( char * , char * ) ) ;
1998-08-09 18:20:02 +04:00
/*The following definitions come from passdb/passdb.c */
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL initialise_password_db ( void ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * iterate_getsmbpwuid ( uid_t unix_uid ) ;
1998-11-26 02:11:25 +03:00
struct smb_passwd * iterate_getsmbpwnam ( const char * name ) ;
1998-08-09 18:20:02 +04:00
void * startsmbpwent ( BOOL update ) ;
void endsmbpwent ( void * vp ) ;
1998-11-29 23:03:33 +03:00
SMB_BIG_UINT getsmbpwpos ( void * vp ) ;
BOOL setsmbpwpos ( void * vp , SMB_BIG_UINT tok ) ;
1998-08-09 18:20:02 +04:00
struct smb_passwd * getsmbpwent ( void * vp ) ;
BOOL add_smbpwd_entry ( struct smb_passwd * newpwd ) ;
BOOL mod_smbpwd_entry ( struct smb_passwd * pwd , BOOL override ) ;
1998-11-26 02:11:25 +03:00
struct smb_passwd * getsmbpwnam ( const char * name ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * getsmbpwuid ( uid_t unix_uid ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
void pwdb_init_smb ( struct smb_passwd * user ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * pwdb_smb_map_names ( struct smb_passwd * smb ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from passdb/passgrp.c */
BOOL initialise_passgrp_db ( void ) ;
struct smb_passwd * iterate_getsmbgrprid ( uint32 user_rid ,
uint32 * * grps , int * num_grps ,
uint32 * * alss , int * num_alss ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * iterate_getsmbgrpuid ( uid_t unix_uid ,
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
uint32 * * grps , int * num_grps ,
uint32 * * alss , int * num_alss ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * iterate_getsmbgrpntnam ( const char * nt_name ,
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
uint32 * * grps , int * num_grps ,
uint32 * * alss , int * num_alss ) ;
void * startsmbgrpent ( BOOL update ) ;
void endsmbgrpent ( void * vp ) ;
struct smb_passwd * getsmbgrpent ( void * vp ,
uint32 * * grps , int * num_grps ,
uint32 * * alss , int * num_alss ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * getsmbgrpntnam ( char * name ,
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
uint32 * * grps , int * num_grps ,
uint32 * * alss , int * num_alss ) ;
struct smb_passwd * getsmbgrprid ( uint32 user_rid ,
uint32 * * grps , int * num_grps ,
uint32 * * alss , int * num_alss ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * getsmbgrpuid ( uid_t unix_uid ,
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
uint32 * * grps , int * num_grps ,
uint32 * * alss , int * num_alss ) ;
1998-08-09 18:20:02 +04:00
1998-12-08 03:25:04 +03:00
/*The following definitions come from passdb/passgrpldap.c */
struct passgrp_ops * ldap_initialise_password_grp ( void ) ;
1998-11-29 23:03:33 +03:00
/*The following definitions come from passdb/sampass.c */
struct sam_passdb_ops * file_initialise_sam_password_db ( void ) ;
/*The following definitions come from passdb/sampassdb.c */
BOOL initialise_sam_password_db ( void ) ;
void * startsam21pwent ( BOOL update ) ;
void endsam21pwent ( void * vp ) ;
struct sam_passwd * getsam21pwent ( void * vp ) ;
1999-03-25 16:54:31 +03:00
BOOL mod_sam21pwd_entry ( struct sam_passwd * pwd , BOOL override ) ;
1998-12-01 19:04:24 +03:00
struct sam_passwd * iterate_getsam21pwntnam ( const char * ntname ) ;
1998-11-29 23:03:33 +03:00
struct sam_passwd * iterate_getsam21pwrid ( uint32 rid ) ;
struct sam_passwd * iterate_getsam21pwuid ( uid_t uid ) ;
struct sam_disp_info * getsamdisprid ( uint32 rid ) ;
struct sam_passwd * getsam21pwntnam ( const char * name ) ;
struct sam_passwd * getsam21pwrid ( uint32 rid ) ;
void pwdb_init_sam ( struct sam_passwd * user ) ;
struct sam_disp_info * pwdb_sam_to_dispinfo ( struct sam_passwd * user ) ;
1999-03-26 00:32:04 +03:00
void copy_id23_to_sam_passwd ( struct sam_passwd * to , const SAM_USER_INFO_23 * from ) ;
1999-03-25 23:56:28 +03:00
void copy_sam_passwd ( struct sam_passwd * to , const struct sam_passwd * from ) ;
1998-11-29 23:03:33 +03:00
struct smb_passwd * pwdb_sam_to_smb ( struct sam_passwd * user ) ;
struct sam_passwd * pwdb_smb_to_sam ( struct smb_passwd * user ) ;
struct sam_passwd * pwdb_sam_map_names ( struct sam_passwd * sam ) ;
1998-12-08 03:25:04 +03:00
/*The following definitions come from passdb/sampassldap.c */
BOOL ldap_search_by_rid ( uint32 rid ) ;
BOOL ldap_search_by_ntname ( const char * ntname ) ;
struct sam_passdb_ops * ldap_initialise_sam_password_db ( void ) ;
1998-08-09 18:20:02 +04:00
/*The following definitions come from passdb/smbpass.c */
1999-02-08 03:24:57 +03:00
struct smb_passwd * getsmbfilepwent ( void * vp ) ;
1998-11-29 23:03:33 +03:00
struct smb_passdb_ops * file_initialise_password_db ( void ) ;
1998-08-09 18:20:02 +04:00
1998-11-12 10:06:48 +03:00
/*The following definitions come from passdb/smbpasschange.c */
1999-03-09 04:21:57 +03:00
BOOL local_password_change ( char * user_name ,
BOOL add_user ,
uint16 acb_info , uint16 acb_mask ,
char * new_passwd ,
char * err_str , size_t err_str_len ,
char * msg_str , size_t msg_str_len ) ;
1998-11-12 10:06:48 +03:00
1998-08-09 18:20:02 +04:00
/*The following definitions come from passdb/smbpassfile.c */
BOOL trust_password_lock ( char * domain , char * name , BOOL update ) ;
BOOL trust_password_unlock ( void ) ;
BOOL trust_password_delete ( char * domain , char * name ) ;
BOOL get_trust_account_password ( unsigned char * ret_pwd , time_t * pass_last_set_time ) ;
BOOL set_trust_account_password ( unsigned char * md4_new_pwd ) ;
1998-10-16 10:16:10 +04:00
BOOL trust_get_passwd ( unsigned char trust_passwd [ 16 ] , char * domain , char * myname ) ;
1998-08-09 18:20:02 +04:00
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from passdb/smbpassgroup.c */
struct passgrp_ops * file_initialise_password_grp ( void ) ;
1998-11-24 00:51:05 +03:00
/*The following definitions come from passdb/smbpassgroupunix.c */
struct passgrp_ops * unix_initialise_password_grp ( void ) ;
1999-04-27 14:43:32 +04:00
/*The following definitions come from printing/nt_printing.c */
int get_ntforms ( nt_forms_struct * * list ) ;
1999-06-22 22:42:10 +04:00
int write_ntforms ( nt_forms_struct * * list , int number ) ;
1999-09-27 17:12:55 +04:00
void add_a_form ( nt_forms_struct * * list , FORM form , int * count ) ;
1999-06-22 22:42:10 +04:00
void update_a_form ( nt_forms_struct * * list , FORM form , int count ) ;
1999-05-04 02:00:33 +04:00
int get_ntdrivers ( connection_struct * conn , fstring * * list , char * architecture ) ;
1999-04-27 14:43:32 +04:00
void get_short_archi ( char * short_archi , char * long_archi ) ;
void dump_a_param ( NT_PRINTER_PARAM * param ) ;
BOOL add_a_specific_param ( NT_PRINTER_INFO_LEVEL_2 * info_2 , NT_PRINTER_PARAM * param ) ;
BOOL unlink_specific_param_if_exist ( NT_PRINTER_INFO_LEVEL_2 * info_2 , NT_PRINTER_PARAM * param ) ;
uint32 add_a_printer ( NT_PRINTER_INFO_LEVEL printer , uint32 level ) ;
uint32 get_a_printer ( NT_PRINTER_INFO_LEVEL * printer , uint32 level , fstring sharename ) ;
uint32 free_a_printer ( NT_PRINTER_INFO_LEVEL printer , uint32 level ) ;
uint32 add_a_printer_driver ( NT_PRINTER_DRIVER_INFO_LEVEL driver , uint32 level ) ;
uint32 get_a_printer_driver ( NT_PRINTER_DRIVER_INFO_LEVEL * driver , uint32 level ,
fstring printername , fstring architecture ) ;
uint32 free_a_printer_driver ( NT_PRINTER_DRIVER_INFO_LEVEL driver , uint32 level ) ;
BOOL get_specific_param_by_index ( NT_PRINTER_INFO_LEVEL printer , uint32 level , uint32 param_index ,
fstring value , uint8 * * data , uint32 * type , uint32 * len ) ;
BOOL get_specific_param ( NT_PRINTER_INFO_LEVEL printer , uint32 level ,
fstring value , uint8 * * data , uint32 * type , uint32 * len ) ;
void init_devicemode ( NT_DEVICEMODE * nt_devmode ) ;
1998-08-15 07:26:52 +04:00
/*The following definitions come from printing/pcap.c */
BOOL pcap_printername_ok ( char * pszPrintername , char * pszPrintcapname ) ;
void pcap_printer_fn ( void ( * fn ) ( char * , char * ) ) ;
/*The following definitions come from printing/print_svid.c */
void sysv_printer_fn ( void ( * fn ) ( char * , char * ) ) ;
int sysv_printername_ok ( char * name ) ;
/*The following definitions come from printing/printing.c */
void lpq_reset ( int snum ) ;
void print_file ( connection_struct * conn , files_struct * file ) ;
int get_printqueue ( int snum ,
connection_struct * conn , print_queue_struct * * queue ,
print_status_struct * status ) ;
void del_printqueue ( connection_struct * conn , int snum , int jobid ) ;
void status_printjob ( connection_struct * conn , int snum , int jobid , int status ) ;
int printjob_encode ( int snum , int job ) ;
void printjob_decode ( int jobid , int * snum , int * job ) ;
void status_printqueue ( connection_struct * conn , int snum , int status ) ;
void load_printers ( void ) ;
1999-04-01 09:22:58 +04:00
/*The following definitions come from profile/profile.c */
BOOL profile_setup ( BOOL rdonly ) ;
1999-04-23 18:47:45 +04:00
/*The following definitions come from rpc_client/cli_atsvc.c */
BOOL at_add_job ( struct cli_state * cli , uint16 fnum ,
char * server_name , AT_JOB_INFO * info , char * command ,
uint32 * jobid ) ;
BOOL at_del_job ( struct cli_state * cli , uint16 fnum ,
char * server_name , uint32 min_jobid , uint32 max_jobid ) ;
BOOL at_enum_jobs ( struct cli_state * cli , uint16 fnum ,
char * server_name , uint32 * num_jobs ,
1999-11-27 02:04:19 +03:00
AT_ENUM_INFO * jobs , char * * * commands ) ;
1999-04-23 18:47:45 +04:00
BOOL at_query_job ( struct cli_state * cli , uint16 fnum , char * server_name ,
uint32 jobid , AT_JOB_INFO * job , fstring command ) ;
1999-11-19 03:12:16 +03:00
/*The following definitions come from rpc_client/cli_brs.c */
BOOL do_brs_query_info ( struct cli_state * cli , uint16 fnum ,
const char * server_name , uint32 switch_value ,
void * id ) ;
1999-11-24 23:24:33 +03:00
/*The following definitions come from rpc_client/cli_connect.c */
1999-11-28 00:50:11 +03:00
void cli_connection_free ( struct cli_connection * con ) ;
void cli_connection_unlink ( struct cli_connection * con ) ;
BOOL cli_connection_init_list ( char * servers , const char * pipe_name ,
struct cli_connection * * con ) ;
BOOL cli_connection_init ( const char * server_name , const char * pipe_name ,
struct cli_connection * * con ) ;
BOOL cli_connection_get ( const POLICY_HND * pol , struct cli_connection * * con ) ;
1999-11-25 08:26:48 +03:00
BOOL cli_pol_link ( POLICY_HND * to , const POLICY_HND * from ) ;
BOOL cli_get_usr_sesskey ( const POLICY_HND * pol , uchar sess_key [ 16 ] ) ;
1999-11-28 00:50:11 +03:00
BOOL rpc_hnd_pipe_req ( const POLICY_HND * hnd , uint8 op_num ,
prs_struct * data , prs_struct * rdata ) ;
BOOL rpc_con_pipe_req ( struct cli_connection * con , uint8 op_num ,
prs_struct * data , prs_struct * rdata ) ;
1999-11-24 23:24:33 +03:00
1999-05-04 02:00:33 +04:00
/*The following definitions come from rpc_client/cli_eventlog.c */
BOOL do_event_open ( struct cli_state * cli , uint16 fnum , char * log , POLICY_HND * hnd ) ;
BOOL do_event_close ( struct cli_state * cli , uint16 fnum , POLICY_HND * hnd ) ;
BOOL do_event_numofeventlogrec ( struct cli_state * cli , uint16 fnum , POLICY_HND * hnd , uint32 * number ) ;
BOOL do_event_readeventlog ( struct cli_state * cli , uint16 fnum , POLICY_HND * hnd ,
uint32 number , uint32 flags , uint32 offset ,
uint32 * number_of_bytes , EVENTLOGRECORD * ev ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_client/cli_login.c */
1999-10-19 23:55:43 +04:00
uint32 cli_nt_setup_creds ( struct cli_state * cli , uint16 fnum ,
1999-03-12 08:47:06 +03:00
const char * trust_acct ,
1999-10-19 23:55:43 +04:00
const char * srv_name ,
1999-03-12 08:47:06 +03:00
unsigned char trust_pwd [ 16 ] ,
uint16 sec_chan ) ;
1999-04-08 09:35:53 +04:00
BOOL cli_nt_srv_pwset ( struct cli_state * cli , uint16 fnum ,
unsigned char * new_hashof_trust_pwd , uint16 sec_chan ) ;
1998-12-07 23:23:41 +03:00
BOOL cli_nt_login_interactive ( struct cli_state * cli , uint16 fnum , char * domain , char * username ,
1998-11-29 23:03:33 +03:00
uint32 luid_low , char * password ,
1998-08-09 17:25:34 +04:00
NET_ID_INFO_CTR * ctr , NET_USER_INFO_3 * user_info3 ) ;
1998-12-07 23:23:41 +03:00
BOOL cli_nt_login_network ( struct cli_state * cli , uint16 fnum , char * domain , char * username ,
1998-11-29 23:03:33 +03:00
uint32 luid_low , char lm_chal [ 8 ] , char lm_chal_resp [ 24 ] ,
1998-08-09 17:25:34 +04:00
char nt_chal_resp [ 24 ] ,
NET_ID_INFO_CTR * ctr , NET_USER_INFO_3 * user_info3 ) ;
1998-12-07 23:23:41 +03:00
BOOL cli_nt_logoff ( struct cli_state * cli , uint16 fnum , NET_ID_INFO_CTR * ctr ) ;
1998-08-09 17:25:34 +04:00
1998-09-26 01:01:52 +04:00
/*The following definitions come from rpc_client/cli_lsarpc.c */
1999-11-20 22:43:37 +03:00
BOOL get_domain_sids ( const char * myname ,
DOM_SID * sid3 , DOM_SID * sid5 , char * servers ) ;
BOOL get_trust_sid_and_domain ( const char * myname , char * server ,
DOM_SID * sid ,
char * domain , size_t len ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_open_policy ( const char * server_name , POLICY_HND * hnd ,
1998-09-30 23:09:57 +04:00
BOOL sec_qos ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_open_policy2 ( const char * server_name , POLICY_HND * hnd ,
1999-11-02 01:25:38 +03:00
BOOL sec_qos ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_open_secret ( const POLICY_HND * hnd ,
1999-11-23 21:57:07 +03:00
const char * secret_name ,
uint32 des_access ,
POLICY_HND * hnd_secret ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_query_secret ( POLICY_HND * hnd , STRING2 * secret ,
1999-03-19 18:09:25 +03:00
NTTIME * last_update ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_lookup_names ( POLICY_HND * hnd ,
1998-11-25 22:57:04 +03:00
int num_names ,
1999-10-21 22:25:12 +04:00
char * * names ,
1998-11-25 22:57:04 +03:00
DOM_SID * * sids ,
1998-12-14 23:23:20 +03:00
uint8 * * types ,
1998-11-25 22:57:04 +03:00
int * num_sids ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_lookup_sids ( POLICY_HND * hnd ,
1998-09-30 23:09:57 +04:00
int num_sids ,
DOM_SID * * sids ,
1998-11-11 17:23:55 +03:00
char * * * names ,
1998-12-14 23:23:20 +03:00
uint8 * * types ,
1998-11-11 17:23:55 +03:00
int * num_names ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_query_info_pol ( POLICY_HND * hnd , uint16 info_class ,
1998-11-11 17:23:55 +03:00
fstring domain_name , DOM_SID * domain_sid ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_enum_trust_dom ( POLICY_HND * hnd , uint32 * enum_ctx ,
1999-11-02 01:25:38 +03:00
uint32 * num_doms , char * * * names ,
DOM_SID * * * sids ) ;
1999-11-24 23:24:33 +03:00
BOOL lsa_close ( POLICY_HND * hnd ) ;
1998-09-26 01:01:52 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_client/cli_netlogon.c */
1998-12-07 23:23:41 +03:00
BOOL cli_net_logon_ctrl2 ( struct cli_state * cli , uint16 nt_pipe_fnum , uint32 status_level ) ;
1999-10-19 23:55:43 +04:00
uint32 cli_net_auth2 ( struct cli_state * cli , uint16 nt_pipe_fnum ,
const char * trust_acct ,
const char * srv_name , uint16 sec_chan ,
1999-03-12 08:47:06 +03:00
uint32 neg_flags , DOM_CHAL * srv_chal ) ;
1999-10-19 23:55:43 +04:00
uint32 cli_net_req_chal ( struct cli_state * cli , uint16 nt_pipe_fnum ,
const char * srv_name ,
DOM_CHAL * clnt_chal , DOM_CHAL * srv_chal ) ;
1999-04-08 09:35:53 +04:00
BOOL cli_net_srv_pwset ( struct cli_state * cli , uint16 nt_pipe_fnum ,
uint8 hashed_mach_pwd [ 16 ] , uint16 sec_chan_type ) ;
1998-12-07 23:23:41 +03:00
BOOL cli_net_sam_logon ( struct cli_state * cli , uint16 nt_pipe_fnum , NET_ID_INFO_CTR * ctr ,
1998-08-09 17:25:34 +04:00
NET_USER_INFO_3 * user_info3 ) ;
1998-12-07 23:23:41 +03:00
BOOL cli_net_sam_logoff ( struct cli_state * cli , uint16 nt_pipe_fnum , NET_ID_INFO_CTR * ctr ) ;
1999-10-26 20:46:45 +04:00
BOOL cli_net_sam_sync ( struct cli_state * cli , uint16 nt_pipe_fnum ,
const char * srv_name ,
uint32 database_id ,
uint32 * num_deltas ,
SAM_DELTA_HDR * hdr_deltas ,
SAM_DELTA_CTR * deltas ) ;
1999-09-22 01:28:27 +04:00
BOOL do_sam_sync ( struct cli_state * cli , uchar trust_passwd [ 16 ] ,
1999-10-26 20:46:45 +04:00
const char * acct_name ,
1999-10-21 20:53:50 +04:00
const char * srv_name ,
1999-07-21 04:32:09 +04:00
SAM_DELTA_HDR hdr_deltas [ MAX_SAM_DELTAS ] ,
SAM_DELTA_CTR deltas [ MAX_SAM_DELTAS ] ,
uint32 * num_deltas ) ;
1999-09-22 01:28:27 +04:00
/*The following definitions come from rpc_client/cli_netlogon_sync.c */
1999-07-22 14:55:09 +04:00
BOOL synchronise_passdb ( void ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_client/cli_pipe.c */
1999-10-08 02:10:29 +04:00
BOOL create_rpc_bind_resp ( struct pwd_info * pwd ,
char * domain , char * user_name , char * my_name ,
uint32 ntlmssp_cli_flgs ,
uint32 rpc_call_id ,
prs_struct * rhdr ,
prs_struct * rhdr_autha ,
prs_struct * auth_resp ) ;
1999-11-08 23:58:06 +03:00
BOOL rpc_api_pipe_req ( struct cli_state * cli , uint16 fnum , uint8 op_num ,
1998-08-09 17:25:34 +04:00
prs_struct * data , prs_struct * rdata ) ;
1998-10-17 01:36:19 +04:00
void cli_nt_set_ntlmssp_flgs ( struct cli_state * cli , uint32 ntlmssp_flgs ) ;
1999-11-24 23:24:33 +03:00
BOOL cli_nt_session_open ( struct cli_state * cli , const char * pipe_name ,
uint16 * fnum ) ;
1999-11-08 23:58:06 +03:00
void cli_nt_session_close ( struct cli_state * cli , uint16 fnum ) ;
1998-08-09 17:25:34 +04:00
1998-11-10 22:05:00 +03:00
/*The following definitions come from rpc_client/cli_reg.c */
1999-11-25 02:40:20 +03:00
BOOL reg_connect ( const char * srv_name ,
1999-10-30 00:24:18 +04:00
const char * full_keyname ,
char * key_name ,
1998-11-11 17:23:55 +03:00
POLICY_HND * reg_hnd ) ;
1999-11-28 00:50:11 +03:00
BOOL reg_open_hkcr ( struct cli_connection * con ,
1999-11-25 02:40:20 +03:00
uint16 unknown_0 , uint32 level ,
1999-10-29 20:24:11 +04:00
POLICY_HND * hnd ) ;
1999-11-28 00:50:11 +03:00
BOOL reg_open_hklm ( struct cli_connection * con ,
1999-11-25 02:40:20 +03:00
uint16 unknown_0 , uint32 level ,
1998-11-10 22:05:00 +03:00
POLICY_HND * hnd ) ;
1999-11-28 00:50:11 +03:00
BOOL reg_open_hku ( struct cli_connection * con ,
1999-11-25 02:40:20 +03:00
uint16 unknown_0 , uint32 level ,
1998-11-10 22:05:00 +03:00
POLICY_HND * hnd ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_flush_key ( POLICY_HND * hnd ) ;
BOOL reg_query_key ( POLICY_HND * hnd ,
1999-10-16 00:00:30 +04:00
char * key_class , uint32 * class_len ,
1998-11-10 22:05:00 +03:00
uint32 * num_subkeys , uint32 * max_subkeylen ,
uint32 * max_subkeysize , uint32 * num_values ,
uint32 * max_valnamelen , uint32 * max_valbufsize ,
uint32 * sec_desc , NTTIME * mod_time ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_unknown_1a ( POLICY_HND * hnd , uint32 * unk ) ;
BOOL reg_query_info ( POLICY_HND * hnd ,
1999-11-18 03:26:11 +03:00
const char * val_name ,
1999-11-18 22:29:08 +03:00
uint32 * type , BUFFER2 * buffer ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_set_key_sec ( POLICY_HND * hnd ,
1999-11-24 21:09:33 +03:00
uint32 sec_info ,
1999-08-04 00:30:25 +04:00
uint32 sec_buf_size , SEC_DESC * sec_buf ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_get_key_sec ( POLICY_HND * hnd ,
1999-11-24 21:09:33 +03:00
uint32 sec_info ,
1999-08-04 00:30:25 +04:00
uint32 * sec_buf_size , SEC_DESC_BUF * sec_buf ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_delete_val ( POLICY_HND * hnd , char * val_name ) ;
BOOL reg_delete_key ( POLICY_HND * hnd , char * key_name ) ;
BOOL reg_create_key ( POLICY_HND * hnd ,
1998-11-10 22:05:00 +03:00
char * key_name , char * key_class ,
1998-11-13 02:35:05 +03:00
SEC_ACCESS * sam_access ,
1998-11-10 22:05:00 +03:00
POLICY_HND * key ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_enum_key ( POLICY_HND * hnd ,
1998-11-10 22:05:00 +03:00
int key_index , char * key_name ,
uint32 * unk_1 , uint32 * unk_2 ,
time_t * mod_time ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_create_val ( POLICY_HND * hnd ,
1998-11-10 22:05:00 +03:00
char * val_name , uint32 type , BUFFER3 * data ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_enum_val ( POLICY_HND * hnd ,
1998-11-10 22:05:00 +03:00
int val_index , int max_valnamelen , int max_valbufsize ,
fstring val_name ,
uint32 * val_type , BUFFER2 * value ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_open_entry ( POLICY_HND * hnd ,
1998-11-10 22:05:00 +03:00
char * key_name , uint32 unk_0 ,
POLICY_HND * key_hnd ) ;
1999-11-25 02:40:20 +03:00
BOOL reg_close ( POLICY_HND * hnd ) ;
BOOL reg_shutdown ( const char * srv_name ,
const char * msg , uint32 timeout , uint16 flags ) ;
1998-11-10 22:05:00 +03:00
1998-09-26 02:20:05 +04:00
/*The following definitions come from rpc_client/cli_samr.c */
1999-11-28 00:50:11 +03:00
BOOL samr_chgpasswd_user ( struct cli_connection * con ,
1998-10-10 03:31:50 +04:00
char * srv_name , char * user_name ,
1998-10-21 20:58:34 +04:00
char nt_newpass [ 516 ] , uchar nt_oldhash [ 16 ] ,
char lm_newpass [ 516 ] , uchar lm_oldhash [ 16 ] ) ;
1999-11-28 00:50:11 +03:00
BOOL samr_unknown_38 ( struct cli_connection * con , char * srv_name ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_dom_info ( POLICY_HND * domain_pol , uint16 switch_value ,
1999-08-29 20:36:21 +04:00
SAM_UNK_CTR * ctr ) ;
1999-11-25 08:26:48 +03:00
uint32 samr_enum_domains ( POLICY_HND * pol ,
1999-11-16 01:43:08 +03:00
uint32 * start_idx , uint32 size ,
struct acct_info * * sam ,
uint32 * num_sam_domains ) ;
1999-11-25 08:26:48 +03:00
uint32 samr_enum_dom_groups ( POLICY_HND * pol ,
1999-10-29 00:34:28 +04:00
uint32 * start_idx , uint32 size ,
1998-12-04 19:30:00 +03:00
struct acct_info * * sam ,
1999-10-25 21:10:54 +04:00
uint32 * num_sam_groups ) ;
1999-11-25 08:26:48 +03:00
uint32 samr_enum_dom_aliases ( POLICY_HND * pol ,
1999-11-02 00:09:24 +03:00
uint32 * start_idx , uint32 size ,
1998-12-04 19:30:00 +03:00
struct acct_info * * sam ,
1999-10-25 21:10:54 +04:00
uint32 * num_sam_aliases ) ;
1999-11-25 08:26:48 +03:00
uint32 samr_enum_dom_users ( POLICY_HND * pol , uint32 * start_idx ,
1998-09-26 02:20:05 +04:00
uint16 acb_mask , uint16 unk_1 , uint32 size ,
1998-09-26 03:14:20 +04:00
struct acct_info * * sam ,
1999-10-25 21:10:54 +04:00
uint32 * num_sam_users ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_connect ( const char * srv_name , uint32 unknown_0 ,
1998-09-26 02:20:05 +04:00
POLICY_HND * connect_pol ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_open_user ( const POLICY_HND * pol ,
1999-11-08 23:58:06 +03:00
uint32 unk_0 , uint32 rid ,
1998-09-26 02:20:05 +04:00
POLICY_HND * user_pol ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_open_alias ( const POLICY_HND * domain_pol ,
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
uint32 flags , uint32 rid ,
1998-12-04 01:20:30 +03:00
POLICY_HND * alias_pol ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_del_aliasmem ( POLICY_HND * alias_pol , DOM_SID * sid ) ;
BOOL samr_add_aliasmem ( POLICY_HND * alias_pol , DOM_SID * sid ) ;
BOOL samr_delete_dom_alias ( POLICY_HND * alias_pol ) ;
BOOL samr_create_dom_user ( POLICY_HND * domain_pol , const char * acct_name ,
1999-03-20 00:20:19 +03:00
uint32 unk_0 , uint32 unk_1 ,
POLICY_HND * user_pol , uint32 * rid ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_create_dom_alias ( POLICY_HND * domain_pol , const char * acct_name ,
1998-12-04 01:20:30 +03:00
POLICY_HND * alias_pol , uint32 * rid ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_aliasinfo ( POLICY_HND * alias_pol , uint16 switch_value ,
1999-11-02 00:09:24 +03:00
ALIAS_INFO_CTR * ctr ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_set_aliasinfo ( POLICY_HND * alias_pol , ALIAS_INFO_CTR * ctr ) ;
BOOL samr_open_group ( const POLICY_HND * domain_pol ,
1998-12-05 01:00:39 +03:00
uint32 flags , uint32 rid ,
1998-12-03 23:50:33 +03:00
POLICY_HND * group_pol ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_del_groupmem ( POLICY_HND * group_pol , uint32 rid ) ;
BOOL samr_add_groupmem ( POLICY_HND * group_pol , uint32 rid ) ;
BOOL samr_delete_dom_group ( POLICY_HND * group_pol ) ;
BOOL samr_create_dom_group ( POLICY_HND * domain_pol , const char * acct_name ,
1998-12-03 23:50:33 +03:00
POLICY_HND * group_pol , uint32 * rid ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_set_groupinfo ( POLICY_HND * group_pol , GROUP_INFO_CTR * ctr ) ;
BOOL samr_open_domain ( const POLICY_HND * connect_pol ,
1999-11-08 23:58:06 +03:00
uint32 ace_perms ,
const DOM_SID * sid ,
1998-09-26 02:20:05 +04:00
POLICY_HND * domain_pol ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_lookup_domain ( POLICY_HND * pol , const char * dom_name ,
1999-02-24 04:52:30 +03:00
DOM_SID * dom_sid ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_lookup_names ( POLICY_HND * pol , uint32 flags ,
1999-10-21 22:25:12 +04:00
uint32 num_names , char * * names ,
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
uint32 * num_rids ,
uint32 rid [ MAX_LOOKUP_SIDS ] ,
uint32 type [ MAX_LOOKUP_SIDS ] ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_lookup_rids ( const POLICY_HND * pol , uint32 flags ,
1998-12-04 19:30:00 +03:00
uint32 num_rids , uint32 * rids ,
1998-12-03 20:29:03 +03:00
uint32 * num_names ,
1999-10-21 22:25:12 +04:00
char * * * names ,
uint32 * * type ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_aliasmem ( const POLICY_HND * alias_pol ,
1998-12-04 19:30:00 +03:00
uint32 * num_mem , DOM_SID2 * sid ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_useraliases ( const POLICY_HND * pol ,
1999-11-08 23:58:06 +03:00
uint32 * ptr_sid , DOM_SID2 * sid ,
1999-10-21 22:25:12 +04:00
uint32 * num_aliases , uint32 * * rid ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_groupmem ( POLICY_HND * group_pol ,
1999-10-21 23:02:57 +04:00
uint32 * num_mem , uint32 * * rid , uint32 * * attr ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_usergroups ( POLICY_HND * pol , uint32 * num_groups ,
1999-10-21 22:25:12 +04:00
DOM_GID * * gid ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_query_groupinfo ( POLICY_HND * pol ,
1998-12-04 19:30:00 +03:00
uint16 switch_value , GROUP_INFO_CTR * ctr ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_set_userinfo2 ( POLICY_HND * pol , uint16 switch_value ,
1999-11-18 22:29:08 +03:00
void * usr ) ;
1999-11-25 08:26:48 +03:00
BOOL samr_set_userinfo ( POLICY_HND * pol , uint16 switch_value , void * usr ) ;
BOOL samr_query_userinfo ( POLICY_HND * pol , uint16 switch_value , void * usr ) ;
BOOL samr_close ( POLICY_HND * hnd ) ;
BOOL samr_query_dispinfo ( POLICY_HND * pol_domain , uint16 level ,
1999-09-15 01:15:39 +04:00
uint32 * num_entries ,
SAM_DISPINFO_CTR * ctr ) ;
1998-09-26 02:20:05 +04:00
1999-11-05 21:40:38 +03:00
/*The following definitions come from rpc_client/cli_spoolss.c */
1999-11-06 22:52:04 +03:00
BOOL spoolss_enum_printers ( struct cli_state * cli , uint16 fnum ,
1999-11-07 00:08:35 +03:00
uint32 flags , const char * servername ,
1999-11-06 22:52:04 +03:00
uint32 level ,
uint32 * count ,
void * * * printers ) ;
1999-11-09 22:35:30 +03:00
uint32 spoolss_enum_jobs ( struct cli_state * cli , uint16 fnum ,
const PRINTER_HND * hnd ,
uint32 firstjob ,
uint32 numofjobs ,
uint32 level ,
uint32 * buf_size ,
uint32 * count ,
void * * * jobs ) ;
1999-11-06 21:11:19 +03:00
BOOL spoolss_open_printer_ex ( struct cli_state * cli , uint16 fnum ,
1999-11-09 22:35:30 +03:00
const char * printername ,
1999-11-06 21:11:19 +03:00
uint32 cbbuf , uint32 devmod , uint32 des_access ,
1999-11-09 22:35:30 +03:00
const char * station ,
const char * username ,
1999-11-06 21:11:19 +03:00
PRINTER_HND * hnd ) ;
BOOL spoolss_closeprinter ( struct cli_state * cli , uint16 fnum , PRINTER_HND * hnd ) ;
1999-11-05 21:40:38 +03:00
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
/*The following definitions come from rpc_client/cli_srvsvc.c */
1999-11-28 01:19:51 +03:00
BOOL do_srv_net_srv_tprt_enum (
const char * srv_name ,
1999-10-31 02:34:38 +04:00
uint32 switch_value , SRV_TPRT_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-11-28 01:19:51 +03:00
BOOL do_srv_net_srv_conn_enum ( char * srv_name , char * qual_name ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 switch_value , SRV_CONN_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-11-28 01:19:51 +03:00
BOOL do_srv_net_srv_sess_enum ( char * srv_name , char * qual_name , char * user_name ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 switch_value , SRV_SESS_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-11-28 01:19:51 +03:00
BOOL do_srv_net_srv_share_enum ( char * srv_name ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 switch_value , SRV_SHARE_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-11-28 01:19:51 +03:00
BOOL do_srv_net_srv_file_enum ( char * srv_name , char * qual_name , uint32 file_id ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 switch_value , SRV_FILE_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-11-28 01:19:51 +03:00
BOOL do_srv_net_srv_get_info ( char * srv_name , uint32 switch_value ,
SRV_INFO_CTR * ctr ) ;
BOOL do_srv_net_remote_tod ( char * srv_name , TIME_OF_DAY_INFO * tod ) ;
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
1998-12-09 02:29:37 +03:00
/*The following definitions come from rpc_client/cli_svcctl.c */
1999-11-25 02:11:03 +03:00
BOOL svc_open_sc_man ( const char * srv_name , char * db_name ,
1998-12-09 02:29:37 +03:00
uint32 des_access ,
POLICY_HND * hnd ) ;
1999-11-25 02:11:03 +03:00
BOOL svc_open_service ( POLICY_HND * scm_hnd ,
1999-10-31 07:11:17 +03:00
const char * srv_name ,
1999-01-29 00:11:15 +03:00
uint32 des_access ,
POLICY_HND * hnd ) ;
1999-11-25 02:11:03 +03:00
BOOL svc_enum_svcs ( POLICY_HND * hnd ,
1998-12-09 02:29:37 +03:00
uint32 services_type , uint32 services_state ,
1999-01-27 23:31:58 +03:00
uint32 * buf_size , uint32 * resume_hnd ,
uint32 * dos_error ,
ENUM_SRVC_STATUS * * svcs , uint32 * num_svcs ) ;
1999-11-25 02:11:03 +03:00
BOOL svc_stop_service ( POLICY_HND * hnd ,
1999-11-01 20:52:11 +03:00
uint32 unknown ) ;
1999-11-25 02:11:03 +03:00
BOOL svc_start_service ( POLICY_HND * hnd ,
1999-10-31 08:23:32 +03:00
uint32 argc ,
char * * argv ) ;
1999-11-25 02:11:03 +03:00
BOOL svc_query_svc_cfg ( POLICY_HND * hnd ,
1999-01-29 00:11:15 +03:00
QUERY_SERVICE_CONFIG * cfg ,
uint32 * buf_size ) ;
1999-11-25 02:11:03 +03:00
BOOL svc_close ( POLICY_HND * hnd ) ;
BOOL svc_change_svc_cfg ( POLICY_HND * hnd ,
1999-11-24 02:05:47 +03:00
uint32 service_type , uint32 start_type ,
uint32 unknown_0 ,
uint32 error_control ,
char * bin_path_name , char * load_order_grp ,
uint32 tag_id ,
char * dependencies , char * service_start_name ,
char * password ,
char * disp_name ) ;
1998-12-09 02:29:37 +03:00
1998-09-26 01:20:37 +04:00
/*The following definitions come from rpc_client/cli_wkssvc.c */
1999-11-28 01:34:12 +03:00
BOOL wks_query_info ( char * srv_name , uint32 switch_value ,
1998-09-26 01:20:37 +04:00
WKS_INFO_100 * wks100 ) ;
1999-11-23 21:57:07 +03:00
/*The following definitions come from rpc_client/msrpc_lsarpc.c */
1999-11-24 23:24:33 +03:00
BOOL msrpc_lsa_query_secret ( const char * srv_name ,
1999-11-23 21:57:07 +03:00
const char * secret_name ,
STRING2 * secret ,
NTTIME * last_update ) ;
1999-11-20 22:43:37 +03:00
/*The following definitions come from rpc_client/msrpc_samr.c */
1999-11-27 23:29:16 +03:00
BOOL req_user_info ( const POLICY_HND * pol_dom ,
1999-11-20 22:43:37 +03:00
const char * domain ,
const DOM_SID * sid ,
uint32 user_rid ,
USER_INFO_FN ( usr_inf ) ) ;
1999-11-25 08:26:48 +03:00
uint32 sam_query_usergroups (
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_dom ,
const char * domain ,
const DOM_SID * sid ,
uint32 user_rid ,
const char * user_name ,
uint32 * num_groups ,
DOM_GID * * gid ,
char * * * name ,
uint32 * * type ,
USER_MEM_FN ( usr_mem ) ) ;
1999-11-27 23:29:16 +03:00
void msrpc_sam_user ( const POLICY_HND * pol_dom , const POLICY_HND * pol_blt ,
const char * domain ,
const DOM_SID * sid1 ,
const DOM_SID * blt_sid1 ,
uint32 user_rid ,
char * user_name ,
USER_FN ( usr_fn ) ,
USER_INFO_FN ( usr_inf_fn ) ,
USER_MEM_FN ( usr_grp_fn ) ,
USER_MEM_FN ( usr_als_fn ) ) ;
BOOL msrpc_sam_query_user ( const char * srv_name ,
const char * domain ,
const DOM_SID * sid ,
char * user_name ,
USER_FN ( usr_fn ) ,
USER_INFO_FN ( usr_inf_fn ) ,
USER_MEM_FN ( usr_grp_fn ) ,
USER_MEM_FN ( usr_als_fn ) ) ;
1999-11-25 08:26:48 +03:00
int msrpc_sam_enum_users ( const char * srv_name ,
1999-11-20 22:43:37 +03:00
const char * domain ,
const DOM_SID * sid1 ,
struct acct_info * * sam ,
uint32 * num_sam_entries ,
USER_FN ( usr_fn ) ,
USER_INFO_FN ( usr_inf_fn ) ,
USER_MEM_FN ( usr_grp_fn ) ,
USER_MEM_FN ( usr_als_fn ) ) ;
1999-11-25 08:26:48 +03:00
BOOL sam_query_dominfo ( const char * srv_name ,
1999-11-20 22:43:37 +03:00
const DOM_SID * sid1 ,
uint32 switch_value , SAM_UNK_CTR * ctr ) ;
1999-11-25 08:26:48 +03:00
BOOL query_aliasinfo (
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_dom ,
const char * domain ,
const DOM_SID * sid ,
uint32 alias_rid ,
ALIAS_INFO_FN ( grp_inf ) ) ;
1999-11-25 08:26:48 +03:00
BOOL sam_query_aliasmem ( const char * srv_name ,
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_dom ,
uint32 alias_rid ,
uint32 * num_names ,
DOM_SID * * * sids ,
char * * * name ,
uint8 * * type ) ;
1999-11-25 08:26:48 +03:00
BOOL req_aliasmem_info ( const char * srv_name ,
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_dom ,
const char * domain ,
const DOM_SID * sid ,
uint32 alias_rid ,
const char * alias_name ,
ALIAS_MEM_FN ( als_mem ) ) ;
1999-11-25 08:26:48 +03:00
BOOL sam_query_groupmem (
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_dom ,
uint32 group_rid ,
uint32 * num_names ,
uint32 * * rid_mem ,
char * * * name ,
uint32 * * type ) ;
1999-11-25 08:26:48 +03:00
BOOL query_groupinfo ( const POLICY_HND * pol_dom ,
1999-11-20 22:43:37 +03:00
const char * domain ,
const DOM_SID * sid ,
uint32 group_rid ,
GROUP_INFO_FN ( grp_inf ) ) ;
1999-11-25 08:26:48 +03:00
BOOL req_groupmem_info ( const POLICY_HND * pol_dom ,
1999-11-20 22:43:37 +03:00
const char * domain ,
const DOM_SID * sid ,
uint32 group_rid ,
const char * group_name ,
GROUP_MEM_FN ( grp_mem ) ) ;
1999-11-25 08:26:48 +03:00
uint32 msrpc_sam_enum_domains ( const char * srv_name ,
1999-11-20 22:43:37 +03:00
struct acct_info * * sam ,
uint32 * num_sam_entries ,
DOMAIN_FN ( dom_fn ) ) ;
1999-11-25 08:26:48 +03:00
uint32 msrpc_sam_enum_groups ( const char * srv_name ,
1999-11-20 22:43:37 +03:00
const char * domain ,
const DOM_SID * sid1 ,
struct acct_info * * sam ,
uint32 * num_sam_entries ,
GROUP_FN ( grp_fn ) ,
GROUP_INFO_FN ( grp_inf_fn ) ,
GROUP_MEM_FN ( grp_mem_fn ) ) ;
1999-11-25 08:26:48 +03:00
uint32 msrpc_sam_enum_aliases ( const char * srv_name ,
1999-11-20 22:43:37 +03:00
const char * domain ,
const DOM_SID * sid1 ,
struct acct_info * * sam ,
uint32 * num_sam_entries ,
ALIAS_FN ( als_fn ) ,
ALIAS_INFO_FN ( als_inf_fn ) ,
ALIAS_MEM_FN ( als_mem_fn ) ) ;
1999-11-25 08:26:48 +03:00
BOOL create_samr_domain_user ( POLICY_HND * pol_open_domain ,
1999-11-20 22:43:37 +03:00
const char * acct_name , uint16 acb_info ,
uint32 * rid ) ;
1999-11-25 08:26:48 +03:00
BOOL create_samr_domain_alias ( POLICY_HND * pol_open_domain ,
1999-11-20 22:43:37 +03:00
const char * acct_name , const char * acct_desc ,
uint32 * rid ) ;
1999-11-25 08:26:48 +03:00
BOOL create_samr_domain_group (
1999-11-20 22:43:37 +03:00
POLICY_HND * pol_open_domain ,
const char * acct_name , const char * acct_desc ,
uint32 * rid ) ;
1999-11-25 08:26:48 +03:00
BOOL get_samr_query_usergroups ( const POLICY_HND * pol_open_domain ,
1999-11-20 22:43:37 +03:00
uint32 user_rid ,
uint32 * num_groups , DOM_GID * * gid ) ;
1999-11-25 08:26:48 +03:00
BOOL delete_samr_dom_group (
1999-11-20 22:43:37 +03:00
POLICY_HND * pol_open_domain ,
uint32 group_rid ) ;
1999-11-25 08:26:48 +03:00
BOOL get_samr_query_groupmem (
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_open_domain ,
uint32 group_rid , uint32 * num_mem ,
uint32 * * rid , uint32 * * attr ) ;
1999-11-25 08:26:48 +03:00
BOOL delete_samr_dom_alias (
1999-11-20 22:43:37 +03:00
POLICY_HND * pol_open_domain ,
uint32 alias_rid ) ;
1999-11-25 08:26:48 +03:00
BOOL get_samr_query_aliasmem (
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_open_domain ,
uint32 alias_rid , uint32 * num_mem , DOM_SID2 * sid ) ;
1999-11-25 08:26:48 +03:00
BOOL set_samr_set_userinfo2 (
1999-11-20 22:43:37 +03:00
POLICY_HND * pol_open_domain ,
uint32 info_level ,
uint32 user_rid , void * usr ) ;
1999-11-25 08:26:48 +03:00
BOOL set_samr_set_userinfo (
1999-11-20 22:43:37 +03:00
POLICY_HND * pol_open_domain ,
uint32 info_level ,
uint32 user_rid , void * usr ) ;
1999-11-25 08:26:48 +03:00
BOOL get_samr_query_userinfo (
1999-11-27 23:29:16 +03:00
const POLICY_HND * pol_open_domain ,
1999-11-20 22:43:37 +03:00
uint32 info_level ,
uint32 user_rid , void * usr ) ;
1999-11-25 08:26:48 +03:00
BOOL get_samr_query_groupinfo (
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_open_domain ,
uint32 info_level ,
uint32 group_rid , GROUP_INFO_CTR * ctr ) ;
1999-11-25 08:26:48 +03:00
BOOL get_samr_query_aliasinfo (
1999-11-20 22:43:37 +03:00
const POLICY_HND * pol_open_domain ,
uint32 info_level ,
uint32 alias_rid , ALIAS_INFO_CTR * ctr ) ;
1999-11-25 08:26:48 +03:00
BOOL msrpc_sam_create_dom_user ( const char * srv_name , DOM_SID * sid1 ,
1999-11-21 20:11:00 +03:00
char * acct_name , uint16 acb_info ,
uint32 * rid ) ;
1999-11-27 02:04:19 +03:00
BOOL msrpc_sam_query_dispinfo ( const char * srv_name , const char * domain ,
DOM_SID * sid1 ,
uint16 switch_value ,
uint32 * num_entries , SAM_DISPINFO_CTR * ctr ,
DISP_FN ( disp_fn ) ) ;
1999-11-20 22:43:37 +03:00
1999-04-23 18:47:45 +04:00
/*The following definitions come from rpc_parse/parse_at.c */
1999-10-15 22:46:22 +04:00
BOOL make_at_q_add_job ( AT_Q_ADD_JOB * q_a , char * server ,
1999-04-23 18:47:45 +04:00
AT_JOB_INFO * info , char * command ) ;
1999-10-15 22:46:22 +04:00
BOOL at_io_job_info ( char * desc , AT_JOB_INFO * info , prs_struct * ps , int depth ) ;
BOOL at_io_q_add_job ( char * desc , AT_Q_ADD_JOB * q_a , prs_struct * ps , int depth ) ;
BOOL at_io_r_add_job ( char * desc , AT_R_ADD_JOB * r_a , prs_struct * ps , int depth ) ;
BOOL make_at_q_del_job ( AT_Q_DEL_JOB * q_a , char * server , uint32 min_jobid ,
1999-04-23 18:47:45 +04:00
uint32 max_jobid ) ;
1999-10-15 22:46:22 +04:00
BOOL at_io_q_del_job ( char * desc , AT_Q_DEL_JOB * q_d , prs_struct * ps , int depth ) ;
BOOL at_io_r_del_job ( char * desc , AT_R_DEL_JOB * r_d , prs_struct * ps , int depth ) ;
BOOL make_at_q_enum_jobs ( AT_Q_ENUM_JOBS * q_e , char * server ) ;
BOOL at_io_q_enum_jobs ( char * desc , AT_Q_ENUM_JOBS * q_e , prs_struct * ps , int depth ) ;
BOOL at_io_r_enum_jobs ( char * desc , AT_R_ENUM_JOBS * r_e , prs_struct * ps , int depth ) ;
BOOL make_at_q_query_job ( AT_Q_QUERY_JOB * q_q , char * server , uint32 jobid ) ;
BOOL at_io_q_query_job ( char * desc , AT_Q_QUERY_JOB * q_q , prs_struct * ps , int depth ) ;
BOOL at_io_r_query_job ( char * desc , AT_R_QUERY_JOB * r_q , prs_struct * ps , int depth ) ;
1999-04-23 18:47:45 +04:00
1999-11-19 03:12:16 +03:00
/*The following definitions come from rpc_parse/parse_brs.c */
BOOL make_brs_q_query_info ( BRS_Q_QUERY_INFO * q_u ,
const char * server , uint16 switch_value ) ;
BOOL brs_io_q_query_info ( char * desc , BRS_Q_QUERY_INFO * q_u , prs_struct * ps , int depth ) ;
BOOL make_brs_info_100 ( BRS_INFO_100 * inf ) ;
BOOL make_brs_r_query_info ( BRS_R_QUERY_INFO * r_u ,
uint32 switch_value , void * inf ,
int status ) ;
BOOL brs_io_r_query_info ( char * desc , BRS_R_QUERY_INFO * r_u , prs_struct * ps , int depth ) ;
1999-05-04 02:00:33 +04:00
/*The following definitions come from rpc_parse/parse_eventlog.c */
1999-10-15 22:46:22 +04:00
BOOL make_eventlog_q_open ( EVENTLOG_Q_OPEN * q_u , char * journal , char * unk ) ;
BOOL eventlog_io_q_open ( char * desc , EVENTLOG_Q_OPEN * q_u , prs_struct * ps , int depth ) ;
BOOL eventlog_io_r_open ( char * desc , EVENTLOG_R_OPEN * r_u , prs_struct * ps , int depth ) ;
BOOL make_eventlog_q_close ( EVENTLOG_Q_CLOSE * q_u , POLICY_HND * pol ) ;
BOOL eventlog_io_q_close ( char * desc , EVENTLOG_Q_CLOSE * q_u , prs_struct * ps , int depth ) ;
BOOL eventlog_io_r_close ( char * desc , EVENTLOG_R_CLOSE * r_u , prs_struct * ps , int depth ) ;
BOOL make_eventlog_q_numofeventlogrec ( EVENTLOG_Q_NUMOFEVENTLOGREC * q_u , POLICY_HND * pol ) ;
BOOL eventlog_io_q_numofeventlogrec ( char * desc , EVENTLOG_Q_NUMOFEVENTLOGREC * q_u , prs_struct * ps , int depth ) ;
BOOL eventlog_io_r_numofeventlogrec ( char * desc , EVENTLOG_R_NUMOFEVENTLOGREC * r_u , prs_struct * ps , int depth ) ;
BOOL make_eventlog_q_readeventlog ( EVENTLOG_Q_READEVENTLOG * q_u , POLICY_HND * pol ,
1999-05-04 02:00:33 +04:00
uint32 flags , uint32 offset , uint32 number_of_bytes ) ;
1999-10-15 22:46:22 +04:00
BOOL eventlog_io_q_readeventlog ( char * desc , EVENTLOG_Q_READEVENTLOG * q_u , prs_struct * ps , int depth ) ;
BOOL eventlog_io_r_readeventlog ( char * desc , EVENTLOG_R_READEVENTLOG * r_u , prs_struct * ps , int depth ) ;
1999-05-04 02:00:33 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_lsa.c */
1999-10-15 22:46:22 +04:00
BOOL make_lsa_trans_name ( LSA_TRANS_NAME * trn , UNISTR2 * uni_name ,
1998-10-22 22:15:23 +04:00
uint32 sid_name_use , char * name , uint32 idx ) ;
1999-10-15 22:46:22 +04:00
BOOL make_lsa_sec_qos ( LSA_SEC_QOS * qos , uint16 imp_lev , uint8 ctxt , uint8 eff ,
1998-09-30 23:09:57 +04:00
uint32 unknown ) ;
1999-10-15 22:46:22 +04:00
BOOL make_lsa_obj_attr ( LSA_OBJ_ATTR * attr , uint32 attributes , LSA_SEC_QOS * qos ) ;
BOOL make_q_open_pol ( LSA_Q_OPEN_POL * r_q , uint16 system_name ,
1998-09-30 23:09:57 +04:00
uint32 attributes ,
uint32 desired_access ,
LSA_SEC_QOS * qos ) ;
1999-10-15 22:46:22 +04:00
BOOL lsa_io_q_open_pol ( char * desc , LSA_Q_OPEN_POL * r_q , prs_struct * ps , int depth ) ;
BOOL lsa_io_r_open_pol ( char * desc , LSA_R_OPEN_POL * r_p , prs_struct * ps , int depth ) ;
1999-11-02 01:25:38 +03:00
BOOL make_q_open_pol2 ( LSA_Q_OPEN_POL2 * r_q , const char * server_name ,
1998-10-15 09:47:29 +04:00
uint32 attributes ,
uint32 desired_access ,
LSA_SEC_QOS * qos ) ;
1999-10-15 22:46:22 +04:00
BOOL lsa_io_q_open_pol2 ( char * desc , LSA_Q_OPEN_POL2 * r_q , prs_struct * ps , int depth ) ;
BOOL lsa_io_r_open_pol2 ( char * desc , LSA_R_OPEN_POL2 * r_p , prs_struct * ps , int depth ) ;
BOOL make_q_query ( LSA_Q_QUERY_INFO * q_q , POLICY_HND * hnd , uint16 info_class ) ;
BOOL lsa_io_q_query ( char * desc , LSA_Q_QUERY_INFO * q_q , prs_struct * ps , int depth ) ;
1999-11-23 21:57:07 +03:00
BOOL make_q_open_secret ( LSA_Q_OPEN_SECRET * q_o , const POLICY_HND * pol_hnd ,
const char * secret_name , uint32 desired_access ) ;
1999-10-15 22:46:22 +04:00
BOOL lsa_io_q_open_secret ( char * desc , LSA_Q_OPEN_SECRET * q_o , prs_struct * ps , int depth ) ;
BOOL lsa_io_r_open_secret ( char * desc , LSA_R_OPEN_SECRET * r_o , prs_struct * ps , int depth ) ;
BOOL lsa_io_secret_value ( char * desc , LSA_SECRET_VALUE * value , prs_struct * ps , int depth ) ;
BOOL lsa_io_secret_info ( char * desc , LSA_SECRET_INFO * info , prs_struct * ps , int depth ) ;
BOOL make_q_query_secret ( LSA_Q_QUERY_SECRET * q_q , POLICY_HND * pol ) ;
BOOL lsa_io_q_query_secret ( char * desc , LSA_Q_QUERY_SECRET * q_q , prs_struct * ps , int depth ) ;
BOOL lsa_io_r_query_secret ( char * desc , LSA_R_QUERY_SECRET * r_q , prs_struct * ps , int depth ) ;
1999-11-02 01:25:38 +03:00
BOOL make_q_enum_trust_dom ( LSA_Q_ENUM_TRUST_DOM * q_e ,
POLICY_HND * pol ,
uint32 enum_context , uint32 preferred_len ) ;
1999-10-15 22:46:22 +04:00
BOOL lsa_io_q_enum_trust_dom ( char * desc , LSA_Q_ENUM_TRUST_DOM * q_e , prs_struct * ps , int depth ) ;
BOOL make_r_enum_trust_dom ( LSA_R_ENUM_TRUST_DOM * r_e ,
1999-11-02 01:25:38 +03:00
int32 enum_context ,
char * domain_name , DOM_SID * domain_sid ,
uint32 status ) ;
BOOL lsa_io_r_enum_trust_dom ( char * desc , LSA_R_ENUM_TRUST_DOM * r_e , prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL lsa_io_r_query ( char * desc , LSA_R_QUERY_INFO * r_q , prs_struct * ps , int depth ) ;
1999-10-25 23:03:27 +04:00
BOOL make_lsa_sid_enum ( LSA_SID_ENUM * sen , uint32 num_entries , DOM_SID * * sids ) ;
1999-10-15 22:46:22 +04:00
BOOL make_q_lookup_sids ( LSA_Q_LOOKUP_SIDS * q_l , POLICY_HND * hnd ,
1998-09-30 23:09:57 +04:00
int num_sids , DOM_SID * * sids ,
uint16 level ) ;
1999-10-15 22:46:22 +04:00
BOOL lsa_io_q_lookup_sids ( char * desc , LSA_Q_LOOKUP_SIDS * q_s , prs_struct * ps , int depth ) ;
BOOL lsa_io_r_lookup_sids ( char * desc , LSA_R_LOOKUP_SIDS * r_s , prs_struct * ps , int depth ) ;
BOOL make_q_lookup_names ( LSA_Q_LOOKUP_NAMES * q_l , POLICY_HND * hnd ,
1999-10-25 23:03:27 +04:00
uint32 num_names , char * * names ) ;
1999-10-15 22:46:22 +04:00
BOOL lsa_io_q_lookup_names ( char * desc , LSA_Q_LOOKUP_NAMES * q_r , prs_struct * ps , int depth ) ;
BOOL lsa_io_r_lookup_names ( char * desc , LSA_R_LOOKUP_NAMES * r_r , prs_struct * ps , int depth ) ;
BOOL make_lsa_q_close ( LSA_Q_CLOSE * q_c , POLICY_HND * hnd ) ;
BOOL lsa_io_q_close ( char * desc , LSA_Q_CLOSE * q_c , prs_struct * ps , int depth ) ;
BOOL lsa_io_r_close ( char * desc , LSA_R_CLOSE * r_c , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_misc.c */
1999-10-15 22:46:22 +04:00
BOOL smb_io_bigint ( char * desc , BIGINT * bigint , prs_struct * ps , int depth ) ;
BOOL smb_io_time ( char * desc , NTTIME * nttime , prs_struct * ps , int depth ) ;
BOOL smb_io_lookup_level ( char * desc , LOOKUP_LEVEL * level , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
uint32 get_enum_hnd ( ENUM_HND * enh ) ;
1999-10-15 22:46:22 +04:00
BOOL make_enum_hnd ( ENUM_HND * enh , uint32 hnd ) ;
BOOL smb_io_enum_hnd ( char * desc , ENUM_HND * hnd , prs_struct * ps , int depth ) ;
BOOL smb_io_dom_sid ( char * desc , DOM_SID * sid , prs_struct * ps , int depth ) ;
1999-11-08 23:58:06 +03:00
BOOL make_dom_sid2 ( DOM_SID2 * sid2 , const DOM_SID * sid ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_dom_sid2 ( char * desc , DOM_SID2 * sid , prs_struct * ps , int depth ) ;
BOOL make_str_hdr ( STRHDR * hdr , int max_len , int len , uint32 buffer ) ;
BOOL smb_io_strhdr ( char * desc , STRHDR * hdr , prs_struct * ps , int depth ) ;
BOOL make_strhdr2 ( STRHDR2 * hdr , uint32 max_len , uint32 len , uint32 buffer ) ;
BOOL smb_io_strhdr2 ( char * desc , STRHDR2 * hdr , prs_struct * ps , int depth ) ;
BOOL make_uni_hdr ( UNIHDR * hdr , int len ) ;
BOOL smb_io_unihdr ( char * desc , UNIHDR * hdr , prs_struct * ps , int depth ) ;
BOOL make_buf_hdr ( BUFHDR * hdr , int max_len , int len ) ;
BOOL smb_io_hdrbuf_pre ( char * desc , BUFHDR * hdr , prs_struct * ps , int depth , uint32 * offset ) ;
BOOL smb_io_hdrbuf_post ( char * desc , BUFHDR * hdr , prs_struct * ps , int depth ,
1998-11-12 22:21:20 +03:00
uint32 ptr_hdrbuf , uint32 max_len , uint32 len ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_hdrbuf ( char * desc , BUFHDR * hdr , prs_struct * ps , int depth ) ;
BOOL make_bufhdr2 ( BUFHDR2 * hdr , uint32 info_level , uint32 length , uint32 buffer ) ;
BOOL smb_io_bufhdr2 ( char * desc , BUFHDR2 * hdr , prs_struct * ps , int depth ) ;
BOOL make_uni_hdr2 ( UNIHDR2 * hdr , int len ) ;
BOOL smb_io_unihdr2 ( char * desc , UNIHDR2 * hdr2 , prs_struct * ps , int depth ) ;
BOOL make_unistr ( UNISTR * str , char * buf ) ;
BOOL smb_io_unistr ( char * desc , UNISTR * uni , prs_struct * ps , int depth ) ;
BOOL make_buffer3_uint32 ( BUFFER3 * str , uint32 val ) ;
1999-10-25 23:03:27 +04:00
BOOL make_buffer3_str ( BUFFER3 * str , const char * buf , int len ) ;
1999-10-15 22:46:22 +04:00
BOOL make_buffer3_hex ( BUFFER3 * str , char * buf ) ;
BOOL make_buffer3_bytes ( BUFFER3 * str , uint8 * buf , int len ) ;
BOOL smb_io_buffer3 ( char * desc , BUFFER3 * buf3 , prs_struct * ps , int depth ) ;
1999-10-31 02:34:38 +04:00
BOOL make_buffer4_str ( BUFFER4 * str , const char * buf , int len ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_buffer4 ( char * desc , BUFFER4 * buf4 , uint32 buffer , prs_struct * ps , int depth ) ;
BOOL init_buffer5 ( BUFFER5 * * str ) ;
BOOL clear_buffer5 ( BUFFER5 * * str ) ;
BOOL make_buffer5 ( BUFFER5 * str , char * buf , int len ) ;
BOOL smb_io_buffer5 ( char * desc , BUFFER5 * buf5 , prs_struct * ps , int depth ) ;
1999-11-17 00:14:53 +03:00
BOOL make_buffer2_multi ( BUFFER2 * str , char * const * const buf , uint32 num ) ;
1999-10-15 22:46:22 +04:00
BOOL make_buffer2 ( BUFFER2 * str , const char * buf , int len ) ;
BOOL smb_io_buffer2 ( char * desc , BUFFER2 * buf2 , uint32 buffer , prs_struct * ps , int depth ) ;
1999-11-04 01:14:38 +03:00
BOOL make_buf_unistr2 ( UNISTR2 * str , uint32 * ptr , const char * buf ) ;
1999-11-24 02:05:47 +03:00
BOOL make_string2 ( STRING2 * str , const char * buf , int len ) ;
BOOL make_buf_string2 ( STRING2 * str , uint32 * ptr , const char * buf ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_string2 ( char * desc , STRING2 * str2 , uint32 buffer , prs_struct * ps , int depth ) ;
BOOL make_unistr2 ( UNISTR2 * str , const char * buf , int len ) ;
BOOL smb_io_unistr2 ( char * desc , UNISTR2 * uni2 , uint32 buffer , prs_struct * ps , int depth ) ;
BOOL make_dom_rid2 ( DOM_RID2 * rid2 , uint32 rid , uint8 type , uint32 idx ) ;
BOOL smb_io_dom_rid2 ( char * desc , DOM_RID2 * rid2 , prs_struct * ps , int depth ) ;
BOOL make_dom_rid3 ( DOM_RID3 * rid3 , uint32 rid , uint8 type ) ;
BOOL smb_io_dom_rid3 ( char * desc , DOM_RID3 * rid3 , prs_struct * ps , int depth ) ;
BOOL make_log_info ( DOM_LOG_INFO * log ,
1999-03-14 04:25:11 +03:00
const char * logon_srv , const char * acct_name ,
uint16 sec_chan , const char * comp_name ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_log_info ( char * desc , DOM_LOG_INFO * log , prs_struct * ps , int depth ) ;
BOOL smb_io_chal ( char * desc , DOM_CHAL * chal , prs_struct * ps , int depth ) ;
BOOL smb_io_cred ( char * desc , DOM_CRED * cred , prs_struct * ps , int depth ) ;
BOOL make_clnt_info2 ( DOM_CLNT_INFO2 * clnt ,
1998-08-09 17:25:34 +04:00
char * logon_srv , char * comp_name ,
DOM_CRED * clnt_cred ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_clnt_info2 ( char * desc , DOM_CLNT_INFO2 * clnt , prs_struct * ps , int depth ) ;
BOOL make_clnt_info ( DOM_CLNT_INFO * clnt ,
1998-08-09 17:25:34 +04:00
char * logon_srv , char * acct_name ,
uint16 sec_chan , char * comp_name ,
DOM_CRED * cred ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_clnt_info ( char * desc , DOM_CLNT_INFO * clnt , prs_struct * ps , int depth ) ;
BOOL make_owf_info ( OWF_INFO * hash , uint8 data [ 16 ] ) ;
BOOL smb_io_owf_info ( char * desc , OWF_INFO * hash , prs_struct * ps , int depth ) ;
BOOL smb_io_gid ( char * desc , DOM_GID * gid , prs_struct * ps , int depth ) ;
BOOL smb_io_pol_hnd ( char * desc , POLICY_HND * pol , prs_struct * ps , int depth ) ;
BOOL smb_io_dom_query_3 ( char * desc , DOM_QUERY_3 * d_q , prs_struct * ps , int depth ) ;
BOOL smb_io_dom_query_5 ( char * desc , DOM_QUERY_3 * d_q , prs_struct * ps , int depth ) ;
BOOL smb_io_unistr3 ( char * desc , UNISTR3 * name , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_net.c */
1999-10-15 22:46:22 +04:00
BOOL net_io_q_logon_ctrl2 ( char * desc , NET_Q_LOGON_CTRL2 * q_l , prs_struct * ps , int depth ) ;
BOOL make_r_logon_ctrl2 ( NET_R_LOGON_CTRL2 * r_l , uint32 query_level ,
1998-08-09 17:25:34 +04:00
uint32 flags , uint32 pdc_status , uint32 logon_attempts ,
uint32 tc_status , char * trusted_domain_name ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_r_logon_ctrl2 ( char * desc , NET_R_LOGON_CTRL2 * r_l , prs_struct * ps , int depth ) ;
BOOL make_r_trust_dom ( NET_R_TRUST_DOM_LIST * r_t ,
1999-11-16 20:27:41 +03:00
uint32 num_doms , char * * dom_name ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_r_trust_dom ( char * desc , NET_R_TRUST_DOM_LIST * r_t , prs_struct * ps , int depth ) ;
BOOL net_io_q_trust_dom ( char * desc , NET_Q_TRUST_DOM_LIST * q_l , prs_struct * ps , int depth ) ;
BOOL make_q_req_chal ( NET_Q_REQ_CHAL * q_c ,
1999-10-19 23:55:43 +04:00
const char * logon_srv , const char * logon_clnt ,
1998-08-09 17:25:34 +04:00
DOM_CHAL * clnt_chal ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_q_req_chal ( char * desc , NET_Q_REQ_CHAL * q_c , prs_struct * ps , int depth ) ;
BOOL net_io_r_req_chal ( char * desc , NET_R_REQ_CHAL * r_c , prs_struct * ps , int depth ) ;
1999-11-16 20:27:41 +03:00
BOOL make_q_auth ( NET_Q_AUTH * q_a ,
const char * logon_srv , const char * acct_name ,
uint16 sec_chan , const char * comp_name ,
DOM_CHAL * clnt_chal ) ;
BOOL net_io_q_auth ( char * desc , NET_Q_AUTH * q_a , prs_struct * ps , int depth ) ;
BOOL net_io_r_auth ( char * desc , NET_R_AUTH * r_a , prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL make_q_auth_2 ( NET_Q_AUTH_2 * q_a ,
1999-03-12 08:47:06 +03:00
const char * logon_srv , const char * acct_name ,
uint16 sec_chan , const char * comp_name ,
1998-08-09 17:25:34 +04:00
DOM_CHAL * clnt_chal , uint32 clnt_flgs ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_q_auth_2 ( char * desc , NET_Q_AUTH_2 * q_a , prs_struct * ps , int depth ) ;
BOOL net_io_r_auth_2 ( char * desc , NET_R_AUTH_2 * r_a , prs_struct * ps , int depth ) ;
BOOL make_q_srv_pwset ( NET_Q_SRV_PWSET * q_s , char * logon_srv , char * acct_name ,
1998-08-09 17:25:34 +04:00
uint16 sec_chan , char * comp_name , DOM_CRED * cred , char nt_cypher [ 16 ] ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_q_srv_pwset ( char * desc , NET_Q_SRV_PWSET * q_s , prs_struct * ps , int depth ) ;
BOOL net_io_r_srv_pwset ( char * desc , NET_R_SRV_PWSET * r_s , prs_struct * ps , int depth ) ;
BOOL make_id_info1 ( NET_ID_INFO_1 * id , char * domain_name ,
1998-10-16 03:51:07 +04:00
uint32 param_ctrl , uint32 log_id_low , uint32 log_id_high ,
char * user_name , char * wksta_name ,
char sess_key [ 16 ] ,
unsigned char lm_cypher [ 16 ] , unsigned char nt_cypher [ 16 ] ) ;
1999-10-15 22:46:22 +04:00
BOOL make_id_info2 ( NET_ID_INFO_2 * id , char * domain_name ,
1998-08-09 17:25:34 +04:00
uint32 param_ctrl , uint32 log_id_low , uint32 log_id_high ,
char * user_name , char * wksta_name ,
unsigned char lm_challenge [ 8 ] ,
unsigned char lm_chal_resp [ 24 ] ,
unsigned char nt_chal_resp [ 24 ] ) ;
1999-10-15 22:46:22 +04:00
BOOL make_sam_info ( DOM_SAM_INFO * sam ,
1998-08-09 17:25:34 +04:00
char * logon_srv , char * comp_name , DOM_CRED * clnt_cred ,
DOM_CRED * rtn_cred , uint16 logon_level ,
NET_ID_INFO_CTR * ctr , uint16 validation_level ) ;
1999-10-15 22:46:22 +04:00
BOOL make_net_user_info3 ( NET_USER_INFO_3 * usr ,
1998-08-09 17:25:34 +04:00
NTTIME * logon_time ,
NTTIME * logoff_time ,
NTTIME * kickoff_time ,
NTTIME * pass_last_set_time ,
NTTIME * pass_can_change_time ,
NTTIME * pass_must_change_time ,
char * user_name ,
char * full_name ,
char * logon_script ,
char * profile_path ,
char * home_dir ,
char * dir_drive ,
uint16 logon_count ,
uint16 bad_pw_count ,
uint32 user_id ,
uint32 group_id ,
uint32 num_groups ,
DOM_GID * gids ,
uint32 user_flgs ,
char sess_key [ 16 ] ,
char * logon_srv ,
char * logon_dom ,
DOM_SID * dom_sid ,
char * other_sids ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_q_sam_logon ( char * desc , NET_Q_SAM_LOGON * q_l , prs_struct * ps , int depth ) ;
BOOL net_io_r_sam_logon ( char * desc , NET_R_SAM_LOGON * r_l , prs_struct * ps , int depth ) ;
BOOL net_io_q_sam_logoff ( char * desc , NET_Q_SAM_LOGOFF * q_l , prs_struct * ps , int depth ) ;
BOOL net_io_r_sam_logoff ( char * desc , NET_R_SAM_LOGOFF * r_l , prs_struct * ps , int depth ) ;
1999-11-02 02:16:07 +03:00
BOOL make_q_sam_sync ( NET_Q_SAM_SYNC * q_s ,
const char * srv_name ,
const char * cli_name ,
DOM_CRED * cli_creds , uint32 database_id ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_q_sam_sync ( char * desc , NET_Q_SAM_SYNC * q_s , prs_struct * ps , int depth ) ;
BOOL make_sam_delta_hdr ( SAM_DELTA_HDR * delta , uint16 type , uint32 rid ) ;
BOOL make_sam_account_info ( SAM_ACCOUNT_INFO * info , char * user_name ,
1999-04-08 09:35:53 +04:00
char * full_name , uint32 user_rid , uint32 group_rid ,
char * home_dir , char * dir_drive , char * logon_script ,
char * acct_desc , uint32 acb_info , char * profile ) ;
1999-10-15 22:46:22 +04:00
BOOL net_io_r_sam_sync ( char * desc , uint8 sess_key [ 16 ] ,
1999-07-21 04:32:09 +04:00
NET_R_SAM_SYNC * r_s , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_prs.c */
void prs_debug ( prs_struct * ps , int depth , char * desc , char * fn_name ) ;
void prs_init ( prs_struct * ps , uint32 size ,
uint8 align , uint32 margin ,
BOOL io ) ;
void prs_mem_free ( prs_struct * ps ) ;
1998-10-08 01:42:24 +04:00
void prs_link ( prs_struct * prev , prs_struct * ps , prs_struct * next ) ;
1998-08-09 17:25:34 +04:00
void prs_align ( prs_struct * ps ) ;
BOOL prs_grow ( prs_struct * ps ) ;
1999-10-15 22:46:22 +04:00
BOOL _prs_uint8 ( char * name , prs_struct * ps , int depth , uint8 * data8 ) ;
BOOL _prs_uint16 ( char * name , prs_struct * ps , int depth , uint16 * data16 ) ;
BOOL _prs_hash1 ( prs_struct * ps , uint32 offset , uint8 sess_key [ 16 ] ) ;
BOOL _prs_uint32 ( char * name , prs_struct * ps , int depth , uint32 * data32 ) ;
BOOL _prs_uint8s ( BOOL charmode , char * name , prs_struct * ps , int depth , uint8 * data8s , int len ) ;
BOOL _prs_uint16s ( BOOL charmode , char * name , prs_struct * ps , int depth , uint16 * data16s , int len ) ;
BOOL _prs_uint32s ( BOOL charmode , char * name , prs_struct * ps , int depth , uint32 * data32s , int len ) ;
BOOL _prs_buffer2 ( BOOL charmode , char * name , prs_struct * ps , int depth , BUFFER2 * str ) ;
BOOL _prs_string2 ( BOOL charmode , char * name , prs_struct * ps , int depth , STRING2 * str ) ;
BOOL _prs_unistr2 ( BOOL charmode , char * name , prs_struct * ps , int depth , UNISTR2 * str ) ;
BOOL _prs_unistr3 ( BOOL charmode , char * name , UNISTR3 * str , prs_struct * ps , int depth ) ;
BOOL _prs_unistr ( char * name , prs_struct * ps , int depth , UNISTR * str ) ;
BOOL _prs_string ( char * name , prs_struct * ps , int depth , char * str , uint16 len , uint16 max_buf_size ) ;
BOOL _prs_uint16_pre ( char * name , prs_struct * ps , int depth , uint16 * data16 , uint32 * offset ) ;
BOOL _prs_uint16_post ( char * name , prs_struct * ps , int depth , uint16 * data16 ,
1998-11-10 22:05:00 +03:00
uint32 ptr_uint16 , uint32 start_offset ) ;
1999-10-15 22:46:22 +04:00
BOOL _prs_uint32_pre ( char * name , prs_struct * ps , int depth , uint32 * data32 , uint32 * offset ) ;
BOOL _prs_uint32_post ( char * name , prs_struct * ps , int depth , uint32 * data32 ,
1998-11-12 22:21:20 +03:00
uint32 ptr_uint32 , uint32 data_size ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_reg.c */
1999-10-29 20:24:11 +04:00
BOOL make_reg_q_open_hkcr ( REG_Q_OPEN_HKCR * q_o ,
uint16 unknown_0 , uint32 level ) ;
BOOL reg_io_q_open_hkcr ( char * desc , REG_Q_OPEN_HKCR * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_open_hkcr ( char * desc , REG_R_OPEN_HKCR * r_r , prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL make_reg_q_open_hklm ( REG_Q_OPEN_HKLM * q_o ,
1998-11-10 22:05:00 +03:00
uint16 unknown_0 , uint32 level ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_open_hklm ( char * desc , REG_Q_OPEN_HKLM * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_open_hklm ( char * desc , REG_R_OPEN_HKLM * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_flush_key ( REG_Q_FLUSH_KEY * q_u , POLICY_HND * pol ) ;
BOOL reg_io_q_flush_key ( char * desc , REG_Q_FLUSH_KEY * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_flush_key ( char * desc , REG_R_FLUSH_KEY * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_create_key ( REG_Q_CREATE_KEY * q_c , POLICY_HND * hnd ,
1999-10-16 00:00:30 +04:00
char * key_name , char * key_class ,
1998-11-13 04:38:41 +03:00
SEC_ACCESS * sam_access ,
1999-08-04 00:30:25 +04:00
SEC_DESC_BUF * sec_buf ,
int sec_len , SEC_DESC * sec ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_create_key ( char * desc , REG_Q_CREATE_KEY * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_create_key ( char * desc , REG_R_CREATE_KEY * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_delete_val ( REG_Q_DELETE_VALUE * q_c , POLICY_HND * hnd ,
1998-11-11 03:57:13 +03:00
char * name ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_delete_val ( char * desc , REG_Q_DELETE_VALUE * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_delete_val ( char * desc , REG_R_DELETE_VALUE * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_delete_key ( REG_Q_DELETE_KEY * q_c , POLICY_HND * hnd ,
1998-11-11 01:14:05 +03:00
char * name ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_delete_key ( char * desc , REG_Q_DELETE_KEY * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_delete_key ( char * desc , REG_R_DELETE_KEY * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_query_key ( REG_Q_QUERY_KEY * q_o , POLICY_HND * hnd ,
1998-11-10 22:05:00 +03:00
uint32 max_class_len ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_query_key ( char * desc , REG_Q_QUERY_KEY * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_query_key ( char * desc , REG_R_QUERY_KEY * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_unk_1a ( REG_Q_UNK_1A * q_o , POLICY_HND * hnd ) ;
BOOL reg_io_q_unk_1a ( char * desc , REG_Q_UNK_1A * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_unk_1a ( char * desc , REG_R_UNK_1A * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_open_hku ( REG_Q_OPEN_HKU * q_o ,
1998-11-10 22:05:00 +03:00
uint16 unknown_0 , uint32 level ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_open_hku ( char * desc , REG_Q_OPEN_HKU * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_open_hku ( char * desc , REG_R_OPEN_HKU * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_close ( REG_Q_CLOSE * q_c , POLICY_HND * hnd ) ;
BOOL reg_io_q_close ( char * desc , REG_Q_CLOSE * q_u , prs_struct * ps , int depth ) ;
BOOL reg_io_r_close ( char * desc , REG_R_CLOSE * r_u , prs_struct * ps , int depth ) ;
BOOL make_reg_q_set_key_sec ( REG_Q_SET_KEY_SEC * q_i , POLICY_HND * pol ,
1999-11-24 21:09:33 +03:00
uint32 sec_info ,
1999-08-04 00:30:25 +04:00
uint32 buf_len , SEC_DESC * sec_desc ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_set_key_sec ( char * desc , REG_Q_SET_KEY_SEC * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_set_key_sec ( char * desc , REG_R_SET_KEY_SEC * r_q , prs_struct * ps , int depth ) ;
BOOL make_reg_q_get_key_sec ( REG_Q_GET_KEY_SEC * q_i , POLICY_HND * pol ,
1999-11-24 21:09:33 +03:00
uint32 sec_info ,
1999-08-04 00:30:25 +04:00
uint32 buf_len , SEC_DESC_BUF * sec_buf ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_get_key_sec ( char * desc , REG_Q_GET_KEY_SEC * r_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_get_key_sec ( char * desc , REG_R_GET_KEY_SEC * r_q , prs_struct * ps , int depth ) ;
1999-11-18 03:26:11 +03:00
BOOL make_reg_q_info ( REG_Q_INFO * q_i , POLICY_HND * pol , const char * val_name ,
uint8 major , uint8 minor ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_info ( char * desc , REG_Q_INFO * r_q , prs_struct * ps , int depth ) ;
BOOL make_reg_r_info ( REG_R_INFO * r_r ,
1999-11-18 20:57:21 +03:00
uint32 * type , BUFFER2 * buf ,
1998-08-09 17:25:34 +04:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_r_info ( char * desc , REG_R_INFO * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_enum_val ( REG_Q_ENUM_VALUE * q_i , POLICY_HND * pol ,
1998-11-10 22:05:00 +03:00
uint32 val_idx , uint32 max_val_len ,
uint32 max_buf_len ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_enum_val ( char * desc , REG_Q_ENUM_VALUE * q_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_enum_val ( char * desc , REG_R_ENUM_VALUE * r_q , prs_struct * ps , int depth ) ;
BOOL make_reg_q_create_val ( REG_Q_CREATE_VALUE * q_i , POLICY_HND * pol ,
1998-11-10 22:05:00 +03:00
char * val_name , uint32 type ,
BUFFER3 * val ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_create_val ( char * desc , REG_Q_CREATE_VALUE * q_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_create_val ( char * desc , REG_R_CREATE_VALUE * r_q , prs_struct * ps , int depth ) ;
BOOL make_reg_q_enum_key ( REG_Q_ENUM_KEY * q_i , POLICY_HND * pol , uint32 key_idx ) ;
BOOL reg_io_q_enum_key ( char * desc , REG_Q_ENUM_KEY * q_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_enum_key ( char * desc , REG_R_ENUM_KEY * r_q , prs_struct * ps , int depth ) ;
BOOL make_reg_q_open_entry ( REG_Q_OPEN_ENTRY * r_q , POLICY_HND * pol ,
1998-11-10 22:05:00 +03:00
char * key_name , uint32 unk ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_open_entry ( char * desc , REG_Q_OPEN_ENTRY * r_q , prs_struct * ps , int depth ) ;
BOOL make_reg_r_open_entry ( REG_R_OPEN_ENTRY * r_r ,
1998-08-09 17:25:34 +04:00
POLICY_HND * pol , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_r_open_entry ( char * desc , REG_R_OPEN_ENTRY * r_r , prs_struct * ps , int depth ) ;
BOOL make_reg_q_shutdown ( REG_Q_SHUTDOWN * q_i ,
1999-11-25 02:40:20 +03:00
const char * msg , uint32 timeout , uint16 flags ) ;
1999-10-15 22:46:22 +04:00
BOOL reg_io_q_shutdown ( char * desc , REG_Q_SHUTDOWN * q_q , prs_struct * ps , int depth ) ;
BOOL reg_io_r_shutdown ( char * desc , REG_R_SHUTDOWN * r_q , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_rpc.c */
1999-10-15 22:46:22 +04:00
BOOL make_rpc_hdr ( RPC_HDR * hdr , enum RPC_PKT_TYPE pkt_type , uint8 flags ,
1998-08-09 17:25:34 +04:00
uint32 call_id , int data_len , int auth_len ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_hdr ( char * desc , RPC_HDR * rpc , prs_struct * ps , int depth ) ;
1999-11-16 01:11:10 +03:00
BOOL smb_io_rpc_hdr_fault ( char * desc , RPC_HDR_FAULT * rpc , prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL make_rpc_hdr_rb ( RPC_HDR_RB * rpc ,
1998-08-09 17:25:34 +04:00
uint16 max_tsize , uint16 max_rsize , uint32 assoc_gid ,
uint32 num_elements , uint16 context_id , uint8 num_syntaxes ,
RPC_IFACE * abstract , RPC_IFACE * transfer ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_hdr_rb ( char * desc , RPC_HDR_RB * rpc , prs_struct * ps , int depth ) ;
BOOL make_rpc_hdr_ba ( RPC_HDR_BA * rpc ,
1998-08-09 17:25:34 +04:00
uint16 max_tsize , uint16 max_rsize , uint32 assoc_gid ,
char * pipe_addr ,
uint8 num_results , uint16 result , uint16 reason ,
RPC_IFACE * transfer ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_hdr_ba ( char * desc , RPC_HDR_BA * rpc , prs_struct * ps , int depth ) ;
BOOL make_rpc_hdr_req ( RPC_HDR_REQ * hdr , uint32 alloc_hint , uint16 opnum ) ;
BOOL smb_io_rpc_hdr_req ( char * desc , RPC_HDR_REQ * rpc , prs_struct * ps , int depth ) ;
BOOL smb_io_rpc_hdr_resp ( char * desc , RPC_HDR_RESP * rpc , prs_struct * ps , int depth ) ;
BOOL make_rpc_hdr_autha ( RPC_HDR_AUTHA * rai ,
1998-10-08 01:42:24 +04:00
uint16 max_tsize , uint16 max_rsize ,
uint8 auth_type , uint8 auth_level ,
uint8 stub_type_len ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_hdr_autha ( char * desc , RPC_HDR_AUTHA * rai , prs_struct * ps , int depth ) ;
1998-10-19 21:32:10 +04:00
BOOL rpc_hdr_auth_chk ( RPC_HDR_AUTH * rai ) ;
1999-10-15 22:46:22 +04:00
BOOL make_rpc_hdr_auth ( RPC_HDR_AUTH * rai ,
1998-10-08 01:42:24 +04:00
uint8 auth_type , uint8 auth_level ,
1998-10-14 10:29:20 +04:00
uint8 stub_type_len ,
uint32 ptr ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_hdr_auth ( char * desc , RPC_HDR_AUTH * rai , prs_struct * ps , int depth ) ;
1999-07-27 01:47:23 +04:00
BOOL rpc_auth_ntlmssp_verifier_chk ( RPC_AUTH_NTLMSSP_VERIFIER * rav ,
1998-10-19 21:32:10 +04:00
char * signature , uint32 msg_type ) ;
1999-10-15 22:46:22 +04:00
BOOL make_rpc_auth_ntlmssp_verifier ( RPC_AUTH_NTLMSSP_VERIFIER * rav ,
1998-10-09 03:57:46 +04:00
char * signature , uint32 msg_type ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_auth_ntlmssp_verifier ( char * desc , RPC_AUTH_NTLMSSP_VERIFIER * rav , prs_struct * ps , int depth ) ;
BOOL make_rpc_auth_ntlmssp_neg ( RPC_AUTH_NTLMSSP_NEG * neg ,
1998-10-07 02:03:04 +04:00
uint32 neg_flgs ,
fstring myname , fstring domain ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_auth_ntlmssp_neg ( char * desc , RPC_AUTH_NTLMSSP_NEG * neg , prs_struct * ps , int depth ) ;
BOOL make_rpc_auth_ntlmssp_chal ( RPC_AUTH_NTLMSSP_CHAL * chl ,
1998-10-07 02:03:04 +04:00
uint32 neg_flags ,
uint8 challenge [ 8 ] ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_auth_ntlmssp_chal ( char * desc , RPC_AUTH_NTLMSSP_CHAL * chl , prs_struct * ps , int depth ) ;
BOOL make_rpc_auth_ntlmssp_resp ( RPC_AUTH_NTLMSSP_RESP * rsp ,
1999-06-29 22:47:06 +04:00
uchar lm_resp [ 24 ] ,
uchar * nt_resp , size_t nt_len ,
1998-10-07 02:03:04 +04:00
char * domain , char * user , char * wks ,
uint32 neg_flags ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_auth_ntlmssp_resp ( char * desc , RPC_AUTH_NTLMSSP_RESP * rsp , prs_struct * ps , int depth ) ;
1998-10-21 05:35:01 +04:00
BOOL rpc_auth_ntlmssp_chk ( RPC_AUTH_NTLMSSP_CHK * chk , uint32 crc32 , uint32 seq_num ) ;
1999-10-15 22:46:22 +04:00
BOOL make_rpc_auth_ntlmssp_chk ( RPC_AUTH_NTLMSSP_CHK * chk ,
1998-10-09 03:57:46 +04:00
uint32 ver , uint32 crc32 , uint32 seq_num ) ;
1999-10-15 22:46:22 +04:00
BOOL smb_io_rpc_auth_ntlmssp_chk ( char * desc , RPC_AUTH_NTLMSSP_CHK * chk , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_samr.c */
1999-10-15 22:46:22 +04:00
BOOL make_samr_q_close_hnd ( SAMR_Q_CLOSE_HND * q_c , POLICY_HND * hnd ) ;
BOOL samr_io_q_close_hnd ( char * desc , SAMR_Q_CLOSE_HND * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_close_hnd ( char * desc , SAMR_R_CLOSE_HND * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_lookup_domain ( SAMR_Q_LOOKUP_DOMAIN * q_u ,
1999-02-24 04:52:30 +03:00
POLICY_HND * pol , const char * dom_name ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_lookup_domain ( char * desc , SAMR_Q_LOOKUP_DOMAIN * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_lookup_domain ( char * desc , SAMR_R_LOOKUP_DOMAIN * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_open_domain ( SAMR_Q_OPEN_DOMAIN * q_u ,
1999-11-08 23:58:06 +03:00
const POLICY_HND * connect_pol , uint32 flags ,
const DOM_SID * sid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_open_domain ( char * desc , SAMR_Q_OPEN_DOMAIN * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_open_domain ( char * desc , SAMR_R_OPEN_DOMAIN * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_unknown_2c ( SAMR_Q_UNKNOWN_2C * q_u , POLICY_HND * user_pol ) ;
BOOL samr_io_q_unknown_2c ( char * desc , SAMR_Q_UNKNOWN_2C * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_unknown_2c ( SAMR_R_UNKNOWN_2C * q_u , uint32 status ) ;
BOOL samr_io_r_unknown_2c ( char * desc , SAMR_R_UNKNOWN_2C * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_unknown_3 ( SAMR_Q_UNKNOWN_3 * q_u ,
1998-09-26 02:20:05 +04:00
POLICY_HND * user_pol , uint16 switch_value ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_unknown_3 ( char * desc , SAMR_Q_UNKNOWN_3 * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_query_dom_info ( SAMR_Q_QUERY_DOMAIN_INFO * q_u ,
1998-09-26 02:20:05 +04:00
POLICY_HND * domain_pol , uint16 switch_value ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_dom_info ( char * desc , SAMR_Q_QUERY_DOMAIN_INFO * q_u , prs_struct * ps , int depth ) ;
BOOL make_unk_info3 ( SAM_UNK_INFO_3 * u_3 ) ;
BOOL sam_io_unk_info3 ( char * desc , SAM_UNK_INFO_3 * u_3 , prs_struct * ps , int depth ) ;
BOOL make_unk_info6 ( SAM_UNK_INFO_6 * u_6 ) ;
BOOL sam_io_unk_info6 ( char * desc , SAM_UNK_INFO_6 * u_6 , prs_struct * ps , int depth ) ;
BOOL make_unk_info7 ( SAM_UNK_INFO_7 * u_7 ) ;
BOOL sam_io_unk_info7 ( char * desc , SAM_UNK_INFO_7 * u_7 , prs_struct * ps , int depth ) ;
BOOL make_unk_info2 ( SAM_UNK_INFO_2 * u_2 , char * domain , char * server ) ;
BOOL sam_io_unk_info2 ( char * desc , SAM_UNK_INFO_2 * u_2 , prs_struct * ps , int depth ) ;
BOOL make_unk_info1 ( SAM_UNK_INFO_1 * u_1 ) ;
BOOL sam_io_unk_info1 ( char * desc , SAM_UNK_INFO_1 * u_1 , prs_struct * ps , int depth ) ;
BOOL make_samr_r_query_dom_info ( SAMR_R_QUERY_DOMAIN_INFO * r_u ,
1998-10-22 01:11:16 +04:00
uint16 switch_value , SAM_UNK_CTR * ctr ,
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_dom_info ( char * desc , SAMR_R_QUERY_DOMAIN_INFO * r_u , prs_struct * ps , int depth ) ;
BOOL make_dom_sid3 ( DOM_SID3 * sid3 , uint16 unk_0 , uint16 unk_1 , DOM_SID * sid ) ;
BOOL make_samr_r_unknown_3 ( SAMR_R_UNKNOWN_3 * r_u ,
1998-08-09 17:25:34 +04:00
uint16 unknown_2 , uint16 unknown_3 ,
uint32 unknown_4 , uint16 unknown_6 , uint16 unknown_7 ,
int num_sid3s , DOM_SID3 sid3 [ MAX_SAM_SIDS ] ,
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_unknown_3 ( char * desc , SAMR_R_UNKNOWN_3 * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_enum_dom_users ( SAMR_Q_ENUM_DOM_USERS * q_e , POLICY_HND * pol ,
1999-01-30 00:22:08 +03:00
uint32 start_idx ,
1998-09-26 02:20:05 +04:00
uint16 acb_mask , uint16 unk_1 , uint32 size ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_enum_dom_users ( char * desc , SAMR_Q_ENUM_DOM_USERS * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_enum_dom_users ( SAMR_R_ENUM_DOM_USERS * r_u ,
1999-02-03 03:49:24 +03:00
uint32 next_idx ,
1998-08-09 17:25:34 +04:00
uint32 num_sam_entries , SAM_USER_INFO_21 pass [ MAX_SAM_ENTRIES ] , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_enum_dom_users ( char * desc , SAMR_R_ENUM_DOM_USERS * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_query_dispinfo ( SAMR_Q_QUERY_DISPINFO * q_e , POLICY_HND * pol ,
1999-02-24 04:52:30 +03:00
uint16 switch_level , uint32 start_idx ,
uint32 max_entries ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_dispinfo ( char * desc , SAMR_Q_QUERY_DISPINFO * q_e , prs_struct * ps , int depth ) ;
BOOL make_sam_dispinfo_1 ( SAM_DISPINFO_1 * sam , uint32 * num_entries ,
1999-02-24 04:52:30 +03:00
uint32 * data_size , uint32 start_idx ,
SAM_USER_INFO_21 pass [ MAX_SAM_ENTRIES ] ) ;
1999-10-15 22:46:22 +04:00
BOOL make_sam_dispinfo_2 ( SAM_DISPINFO_2 * sam , uint32 * num_entries ,
1999-02-24 04:52:30 +03:00
uint32 * data_size , uint32 start_idx ,
SAM_USER_INFO_21 pass [ MAX_SAM_ENTRIES ] ) ;
1999-10-15 22:46:22 +04:00
BOOL make_sam_dispinfo_3 ( SAM_DISPINFO_3 * sam , uint32 * num_entries ,
1999-02-24 04:52:30 +03:00
uint32 * data_size , uint32 start_idx ,
DOMAIN_GRP * grp ) ;
1999-10-15 22:46:22 +04:00
BOOL make_sam_dispinfo_4 ( SAM_DISPINFO_4 * sam , uint32 * num_entries ,
1999-02-24 04:52:30 +03:00
uint32 * data_size , uint32 start_idx ,
SAM_USER_INFO_21 pass [ MAX_SAM_ENTRIES ] ) ;
1999-10-15 22:46:22 +04:00
BOOL make_sam_dispinfo_5 ( SAM_DISPINFO_5 * sam , uint32 * num_entries ,
1999-02-24 04:52:30 +03:00
uint32 * data_size , uint32 start_idx ,
DOMAIN_GRP * grp ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_r_query_dispinfo ( SAMR_R_QUERY_DISPINFO * r_u ,
1999-02-24 04:52:30 +03:00
uint32 num_entries , uint32 data_size ,
uint16 switch_level , SAM_DISPINFO_CTR * ctr ,
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_dispinfo ( char * desc , SAMR_R_QUERY_DISPINFO * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_open_group ( SAMR_Q_OPEN_GROUP * q_c ,
1999-11-08 23:58:06 +03:00
const POLICY_HND * hnd , uint32 unk , uint32 rid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_open_group ( char * desc , SAMR_Q_OPEN_GROUP * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_open_group ( char * desc , SAMR_R_OPEN_GROUP * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_group_info1 ( GROUP_INFO1 * gr1 ,
1999-10-29 21:37:27 +04:00
char * acct_name , char * acct_desc ,
uint32 num_members ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_group_info1 ( char * desc , GROUP_INFO1 * gr1 , prs_struct * ps , int depth ) ;
BOOL make_samr_group_info4 ( GROUP_INFO4 * gr4 , const char * acct_desc ) ;
BOOL samr_io_group_info4 ( char * desc , GROUP_INFO4 * gr4 , prs_struct * ps , int depth ) ;
BOOL samr_group_info_ctr ( char * desc , GROUP_INFO_CTR * ctr , prs_struct * ps , int depth ) ;
BOOL make_samr_q_create_dom_group ( SAMR_Q_CREATE_DOM_GROUP * q_e ,
1998-12-03 20:29:03 +03:00
POLICY_HND * pol ,
1998-12-03 23:50:33 +03:00
const char * acct_desc ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_create_dom_group ( char * desc , SAMR_Q_CREATE_DOM_GROUP * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_create_dom_group ( SAMR_R_CREATE_DOM_GROUP * r_u , POLICY_HND * pol ,
1998-12-03 20:29:03 +03:00
uint32 rid , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_create_dom_group ( char * desc , SAMR_R_CREATE_DOM_GROUP * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_delete_dom_group ( SAMR_Q_DELETE_DOM_GROUP * q_c , POLICY_HND * hnd ) ;
BOOL samr_io_q_delete_dom_group ( char * desc , SAMR_Q_DELETE_DOM_GROUP * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_delete_dom_group ( SAMR_R_DELETE_DOM_GROUP * r_u ,
1998-12-05 02:06:27 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_delete_dom_group ( char * desc , SAMR_R_DELETE_DOM_GROUP * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_del_groupmem ( SAMR_Q_DEL_GROUPMEM * q_e ,
1998-12-05 02:06:27 +03:00
POLICY_HND * pol ,
uint32 rid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_del_groupmem ( char * desc , SAMR_Q_DEL_GROUPMEM * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_del_groupmem ( SAMR_R_DEL_GROUPMEM * r_u , POLICY_HND * pol ,
1998-12-05 02:06:27 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_del_groupmem ( char * desc , SAMR_R_DEL_GROUPMEM * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_add_groupmem ( SAMR_Q_ADD_GROUPMEM * q_e ,
1998-12-03 20:29:03 +03:00
POLICY_HND * pol ,
uint32 rid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_add_groupmem ( char * desc , SAMR_Q_ADD_GROUPMEM * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_add_groupmem ( SAMR_R_ADD_GROUPMEM * r_u , POLICY_HND * pol ,
1998-12-03 20:29:03 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_add_groupmem ( char * desc , SAMR_R_ADD_GROUPMEM * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_set_groupinfo ( SAMR_Q_SET_GROUPINFO * q_e ,
1998-12-03 20:29:03 +03:00
POLICY_HND * pol , GROUP_INFO_CTR * ctr ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_set_groupinfo ( char * desc , SAMR_Q_SET_GROUPINFO * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_set_groupinfo ( SAMR_R_SET_GROUPINFO * r_u ,
1998-12-03 20:29:03 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_set_groupinfo ( char * desc , SAMR_R_SET_GROUPINFO * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_query_groupinfo ( SAMR_Q_QUERY_GROUPINFO * q_e ,
1998-12-02 04:13:02 +03:00
POLICY_HND * pol ,
uint16 switch_level ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_groupinfo ( char * desc , SAMR_Q_QUERY_GROUPINFO * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_query_groupinfo ( SAMR_R_QUERY_GROUPINFO * r_u , GROUP_INFO_CTR * ctr ,
1998-12-02 04:13:02 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_groupinfo ( char * desc , SAMR_R_QUERY_GROUPINFO * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_query_groupmem ( SAMR_Q_QUERY_GROUPMEM * q_c , POLICY_HND * hnd ) ;
BOOL samr_io_q_query_groupmem ( char * desc , SAMR_Q_QUERY_GROUPMEM * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_query_groupmem ( SAMR_R_QUERY_GROUPMEM * r_u ,
1998-12-02 04:13:02 +03:00
uint32 num_entries , uint32 * rid , uint32 * attr , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_groupmem ( char * desc , SAMR_R_QUERY_GROUPMEM * r_u , prs_struct * ps , int depth ) ;
1999-10-21 23:02:57 +04:00
void samr_free_r_query_groupmem ( SAMR_R_QUERY_GROUPMEM * r_u ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_q_query_usergroups ( SAMR_Q_QUERY_USERGROUPS * q_u ,
1998-12-01 19:04:24 +03:00
POLICY_HND * hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_usergroups ( char * desc , SAMR_Q_QUERY_USERGROUPS * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_query_usergroups ( SAMR_R_QUERY_USERGROUPS * r_u ,
1998-12-01 19:04:24 +03:00
uint32 num_gids , DOM_GID * gid , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_usergroups ( char * desc , SAMR_R_QUERY_USERGROUPS * r_u , prs_struct * ps , int depth ) ;
1999-11-16 01:43:08 +03:00
BOOL make_samr_q_enum_domains ( SAMR_Q_ENUM_DOMAINS * q_e , POLICY_HND * pol ,
uint32 start_idx , uint32 size ) ;
BOOL samr_io_q_enum_domains ( char * desc , SAMR_Q_ENUM_DOMAINS * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_enum_domains ( SAMR_R_ENUM_DOMAINS * r_u ,
uint32 next_idx ,
uint32 num_sam_entries , char * * doms , uint32 status ) ;
BOOL samr_io_r_enum_domains ( char * desc , SAMR_R_ENUM_DOMAINS * r_u , prs_struct * ps , int depth ) ;
1999-10-25 20:22:08 +04:00
BOOL make_samr_q_enum_dom_groups ( SAMR_Q_ENUM_DOM_GROUPS * q_e , POLICY_HND * pol ,
uint32 start_idx , uint32 size ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_enum_dom_groups ( char * desc , SAMR_Q_ENUM_DOM_GROUPS * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_enum_dom_groups ( SAMR_R_ENUM_DOM_GROUPS * r_u ,
1999-10-25 20:22:08 +04:00
uint32 next_idx ,
1999-11-03 02:31:16 +03:00
uint32 num_sam_entries , DOMAIN_GRP * grps , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_enum_dom_groups ( char * desc , SAMR_R_ENUM_DOM_GROUPS * r_u , prs_struct * ps , int depth ) ;
1999-10-25 20:22:08 +04:00
BOOL make_samr_q_enum_dom_aliases ( SAMR_Q_ENUM_DOM_ALIASES * q_e , POLICY_HND * pol ,
uint32 start_idx , uint32 size ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_enum_dom_aliases ( char * desc , SAMR_Q_ENUM_DOM_ALIASES * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_enum_dom_aliases ( SAMR_R_ENUM_DOM_ALIASES * r_u ,
1999-10-25 20:22:08 +04:00
uint32 next_idx ,
1999-11-03 02:31:16 +03:00
uint32 num_sam_entries , LOCAL_GRP * alss , uint32 status ) ;
BOOL samr_io_r_enum_dom_aliases ( char * desc , SAMR_R_ENUM_DOM_ALIASES * r_u , prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_alias_info3 ( ALIAS_INFO3 * al3 , const char * acct_desc ) ;
BOOL samr_io_alias_info3 ( char * desc , ALIAS_INFO3 * al3 , prs_struct * ps , int depth ) ;
BOOL samr_alias_info_ctr ( char * desc , ALIAS_INFO_CTR * ctr , prs_struct * ps , int depth ) ;
BOOL make_samr_q_query_aliasinfo ( SAMR_Q_QUERY_ALIASINFO * q_e ,
1998-09-26 02:20:05 +04:00
POLICY_HND * pol ,
uint16 switch_level ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_aliasinfo ( char * desc , SAMR_Q_QUERY_ALIASINFO * q_e , prs_struct * ps , int depth ) ;
BOOL make_samr_r_query_aliasinfo ( SAMR_R_QUERY_ALIASINFO * r_u , ALIAS_INFO_CTR * ctr ,
1998-08-09 17:25:34 +04:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_aliasinfo ( char * desc , SAMR_R_QUERY_ALIASINFO * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_set_aliasinfo ( SAMR_Q_SET_ALIASINFO * q_u , POLICY_HND * hnd ,
1998-12-01 19:04:24 +03:00
ALIAS_INFO_CTR * ctr ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_set_aliasinfo ( char * desc , SAMR_Q_SET_ALIASINFO * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_set_aliasinfo ( char * desc , SAMR_R_SET_ALIASINFO * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_query_useraliases ( SAMR_Q_QUERY_USERALIASES * q_u ,
1999-11-08 23:58:06 +03:00
const POLICY_HND * hnd ,
1999-10-21 22:25:12 +04:00
uint32 * ptr_sid , DOM_SID2 * sid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_useraliases ( char * desc , SAMR_Q_QUERY_USERALIASES * q_u , prs_struct * ps , int depth ) ;
1999-10-21 22:25:12 +04:00
void samr_free_q_query_useraliases ( SAMR_Q_QUERY_USERALIASES * q_u ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_r_query_useraliases ( SAMR_R_QUERY_USERALIASES * r_u ,
1998-08-09 17:25:34 +04:00
uint32 num_rids , uint32 * rid , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_useraliases ( char * desc , SAMR_R_QUERY_USERALIASES * r_u , prs_struct * ps , int depth ) ;
1999-10-21 22:25:12 +04:00
void samr_free_r_query_useraliases ( SAMR_R_QUERY_USERALIASES * r_u ) ;
1999-11-08 23:58:06 +03:00
BOOL make_samr_q_open_alias ( SAMR_Q_OPEN_ALIAS * q_u , const POLICY_HND * pol ,
1998-12-01 19:04:24 +03:00
uint32 unknown_0 , uint32 rid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_open_alias ( char * desc , SAMR_Q_OPEN_ALIAS * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_open_alias ( char * desc , SAMR_R_OPEN_ALIAS * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_lookup_rids ( SAMR_Q_LOOKUP_RIDS * q_u ,
1999-11-08 23:58:06 +03:00
const POLICY_HND * pol , uint32 flags ,
1998-12-04 19:30:00 +03:00
uint32 num_rids , uint32 * rid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_lookup_rids ( char * desc , SAMR_Q_LOOKUP_RIDS * q_u , prs_struct * ps , int depth ) ;
1999-10-21 23:02:57 +04:00
void samr_free_q_lookup_rids ( SAMR_Q_LOOKUP_RIDS * q_u ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_r_lookup_rids ( SAMR_R_LOOKUP_RIDS * r_u ,
1998-12-03 20:29:03 +03:00
uint32 num_names , fstring * name , uint8 * type ,
1998-08-09 17:25:34 +04:00
uint32 status ) ;
1999-10-21 20:53:50 +04:00
BOOL samr_io_r_lookup_rids ( char * desc , SAMR_R_LOOKUP_RIDS * r_u , prs_struct * ps , int depth ) ;
void samr_free_r_lookup_rids ( SAMR_R_LOOKUP_RIDS * r_u ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_q_delete_alias ( SAMR_Q_DELETE_DOM_ALIAS * q_u , POLICY_HND * hnd ) ;
BOOL samr_io_q_delete_alias ( char * desc , SAMR_Q_DELETE_DOM_ALIAS * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_delete_alias ( char * desc , SAMR_R_DELETE_DOM_ALIAS * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_create_dom_alias ( SAMR_Q_CREATE_DOM_ALIAS * q_u , POLICY_HND * hnd ,
1998-12-04 01:20:30 +03:00
const char * acct_desc ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_create_dom_alias ( char * desc , SAMR_Q_CREATE_DOM_ALIAS * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_create_dom_alias ( SAMR_R_CREATE_DOM_ALIAS * r_u , POLICY_HND * pol ,
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
uint32 rid , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_create_dom_alias ( char * desc , SAMR_R_CREATE_DOM_ALIAS * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_add_aliasmem ( SAMR_Q_ADD_ALIASMEM * q_u , POLICY_HND * hnd ,
1998-12-01 19:04:24 +03:00
DOM_SID * sid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_add_aliasmem ( char * desc , SAMR_Q_ADD_ALIASMEM * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_add_aliasmem ( char * desc , SAMR_R_ADD_ALIASMEM * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_del_aliasmem ( SAMR_Q_DEL_ALIASMEM * q_u , POLICY_HND * hnd ,
1998-12-05 00:48:06 +03:00
DOM_SID * sid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_del_aliasmem ( char * desc , SAMR_Q_DEL_ALIASMEM * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_del_aliasmem ( char * desc , SAMR_R_DEL_ALIASMEM * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_delete_dom_alias ( SAMR_Q_DELETE_DOM_ALIAS * q_c , POLICY_HND * hnd ) ;
BOOL samr_io_q_delete_dom_alias ( char * desc , SAMR_Q_DELETE_DOM_ALIAS * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_delete_dom_alias ( SAMR_R_DELETE_DOM_ALIAS * r_u ,
1998-12-05 02:06:27 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_delete_dom_alias ( char * desc , SAMR_R_DELETE_DOM_ALIAS * r_u , prs_struct * ps , int depth ) ;
1999-11-08 23:58:06 +03:00
BOOL make_samr_q_query_aliasmem ( SAMR_Q_QUERY_ALIASMEM * q_c ,
const POLICY_HND * hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_aliasmem ( char * desc , SAMR_Q_QUERY_ALIASMEM * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_query_aliasmem ( SAMR_R_QUERY_ALIASMEM * r_u ,
1998-12-02 01:18:48 +03:00
uint32 num_sids , DOM_SID2 * sid , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_aliasmem ( char * desc , SAMR_R_QUERY_ALIASMEM * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_lookup_names ( SAMR_Q_LOOKUP_NAMES * q_u ,
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
POLICY_HND * pol , uint32 flags ,
1999-10-21 22:25:12 +04:00
uint32 num_names , char * * name ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_lookup_names ( char * desc , SAMR_Q_LOOKUP_NAMES * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_lookup_names ( SAMR_R_LOOKUP_NAMES * r_u ,
1998-12-01 19:04:24 +03:00
uint32 num_rids , uint32 * rid , uint8 * type , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_lookup_names ( char * desc , SAMR_R_LOOKUP_NAMES * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_open_user ( SAMR_Q_OPEN_USER * q_u ,
1999-11-08 23:58:06 +03:00
const POLICY_HND * pol ,
1998-09-26 02:20:05 +04:00
uint32 unk_0 , uint32 rid ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_open_user ( char * desc , SAMR_Q_OPEN_USER * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_open_user ( char * desc , SAMR_R_OPEN_USER * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_create_user ( SAMR_Q_CREATE_USER * q_u ,
1999-03-20 00:20:19 +03:00
POLICY_HND * pol ,
const char * name ,
uint16 acb_info , uint32 unk_1 ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_create_user ( char * desc , SAMR_Q_CREATE_USER * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_create_user ( SAMR_R_CREATE_USER * r_u ,
1999-03-25 16:54:31 +03:00
POLICY_HND * user_pol ,
uint32 unk_0 , uint32 user_rid ,
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_create_user ( char * desc , SAMR_R_CREATE_USER * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_query_userinfo ( SAMR_Q_QUERY_USERINFO * q_u ,
1998-09-26 02:20:05 +04:00
POLICY_HND * hnd , uint16 switch_value ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_query_userinfo ( char * desc , SAMR_Q_QUERY_USERINFO * q_u , prs_struct * ps , int depth ) ;
BOOL make_sam_user_info10 ( SAM_USER_INFO_10 * usr ,
1998-10-22 01:11:16 +04:00
uint32 acb_info ) ;
1999-10-15 22:46:22 +04:00
BOOL sam_io_user_info10 ( char * desc , SAM_USER_INFO_10 * usr , prs_struct * ps , int depth ) ;
BOOL make_sam_user_info11 ( SAM_USER_INFO_11 * usr ,
1998-10-22 01:11:16 +04:00
NTTIME * expiry ,
char * mach_acct ,
uint32 rid_user ,
uint32 rid_group ,
uint16 acct_ctrl ) ;
1999-10-15 22:46:22 +04:00
BOOL sam_io_user_info11 ( char * desc , SAM_USER_INFO_11 * usr , prs_struct * ps , int depth ) ;
BOOL make_sam_user_info24 ( SAM_USER_INFO_24 * usr ,
1999-03-25 18:14:30 +03:00
char newpass [ 516 ] ) ;
1999-11-05 00:41:36 +03:00
BOOL make_sam_user_info23W ( SAM_USER_INFO_23 * usr ,
NTTIME * logon_time , /* all zeros */
NTTIME * logoff_time , /* all zeros */
NTTIME * kickoff_time , /* all zeros */
NTTIME * pass_last_set_time , /* all zeros */
NTTIME * pass_can_change_time , /* all zeros */
NTTIME * pass_must_change_time , /* all zeros */
UNISTR2 * user_name , /* NULL */
UNISTR2 * full_name ,
UNISTR2 * home_dir ,
UNISTR2 * dir_drive ,
UNISTR2 * log_scr ,
UNISTR2 * prof_path ,
UNISTR2 * desc ,
UNISTR2 * wkstas ,
UNISTR2 * unk_str ,
UNISTR2 * mung_dial ,
uint32 user_rid , /* 0x0000 0000 */
uint32 group_rid ,
uint16 acb_info ,
uint32 unknown_3 ,
uint16 logon_divs ,
LOGON_HRS * hrs ,
uint32 unknown_5 ,
char newpass [ 516 ] ,
uint32 unknown_6 ) ;
BOOL make_sam_user_info23A ( SAM_USER_INFO_23 * usr ,
1999-03-25 16:54:31 +03:00
NTTIME * logon_time , /* all zeros */
NTTIME * logoff_time , /* all zeros */
NTTIME * kickoff_time , /* all zeros */
NTTIME * pass_last_set_time , /* all zeros */
NTTIME * pass_can_change_time , /* all zeros */
NTTIME * pass_must_change_time , /* all zeros */
char * user_name , /* NULL */
char * full_name ,
char * home_dir ,
char * dir_drive ,
1999-11-05 21:40:38 +03:00
char * log_scr ,
char * prof_path ,
char * desc ,
char * wkstas ,
char * unk_str ,
char * mung_dial ,
1999-03-25 16:54:31 +03:00
uint32 user_rid , /* 0x0000 0000 */
uint32 group_rid ,
uint16 acb_info ,
uint32 unknown_3 ,
uint16 logon_divs ,
LOGON_HRS * hrs ,
uint32 unknown_5 ,
char newpass [ 516 ] ,
uint32 unknown_6 ) ;
1999-10-15 22:46:22 +04:00
BOOL make_sam_user_info21 ( SAM_USER_INFO_21 * usr ,
1998-08-09 17:25:34 +04:00
NTTIME * logon_time ,
NTTIME * logoff_time ,
NTTIME * kickoff_time ,
NTTIME * pass_last_set_time ,
NTTIME * pass_can_change_time ,
NTTIME * pass_must_change_time ,
char * user_name ,
char * full_name ,
char * home_dir ,
char * dir_drive ,
1999-11-05 21:40:38 +03:00
char * log_scr ,
char * prof_path ,
char * desc ,
char * wkstas ,
char * unk_str ,
char * mung_dial ,
1998-08-09 17:25:34 +04:00
uint32 user_rid ,
uint32 group_rid ,
uint16 acb_info ,
uint32 unknown_3 ,
uint16 logon_divs ,
LOGON_HRS * hrs ,
uint32 unknown_5 ,
uint32 unknown_6 ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_r_query_userinfo ( SAMR_R_QUERY_USERINFO * r_u ,
1998-08-09 17:25:34 +04:00
uint16 switch_value , void * info , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_r_query_userinfo ( char * desc , SAMR_R_QUERY_USERINFO * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_set_userinfo ( SAMR_Q_SET_USERINFO * q_u ,
1999-03-25 16:54:31 +03:00
POLICY_HND * hnd ,
uint16 switch_value , void * info ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_set_userinfo ( char * desc , SAMR_Q_SET_USERINFO * q_u , prs_struct * ps , int depth ) ;
1999-11-04 03:09:15 +03:00
void free_samr_q_set_userinfo ( SAMR_Q_SET_USERINFO * q_u ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_r_set_userinfo ( SAMR_R_SET_USERINFO * r_u , uint32 status ) ;
BOOL samr_io_r_set_userinfo ( char * desc , SAMR_R_SET_USERINFO * r_u , prs_struct * ps , int depth ) ;
1999-11-18 22:29:08 +03:00
BOOL make_samr_q_set_userinfo2 ( SAMR_Q_SET_USERINFO2 * q_u ,
POLICY_HND * hnd ,
uint16 switch_value , void * info ) ;
BOOL samr_io_q_set_userinfo2 ( char * desc , SAMR_Q_SET_USERINFO2 * q_u , prs_struct * ps , int depth ) ;
void free_samr_q_set_userinfo2 ( SAMR_Q_SET_USERINFO2 * q_u ) ;
BOOL make_samr_r_set_userinfo2 ( SAMR_R_SET_USERINFO2 * r_u ,
uint32 status ) ;
BOOL samr_io_r_set_userinfo2 ( char * desc , SAMR_R_SET_USERINFO2 * r_u , prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL make_samr_q_connect ( SAMR_Q_CONNECT * q_u ,
1999-11-08 23:58:06 +03:00
const char * srv_name , uint32 unknown_0 ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_connect ( char * desc , SAMR_Q_CONNECT * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_connect ( char * desc , SAMR_R_CONNECT * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_connect_anon ( SAMR_Q_CONNECT_ANON * q_u ) ;
BOOL samr_io_q_connect_anon ( char * desc , SAMR_Q_CONNECT_ANON * q_u , prs_struct * ps , int depth ) ;
BOOL samr_io_r_connect_anon ( char * desc , SAMR_R_CONNECT_ANON * r_u , prs_struct * ps , int depth ) ;
BOOL make_samr_q_unknown_38 ( SAMR_Q_UNKNOWN_38 * q_u , char * srv_name ) ;
BOOL samr_io_q_unknown_38 ( char * desc , SAMR_Q_UNKNOWN_38 * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_unknown_38 ( SAMR_R_UNKNOWN_38 * r_u ) ;
BOOL samr_io_r_unknown_38 ( char * desc , SAMR_R_UNKNOWN_38 * r_u , prs_struct * ps , int depth ) ;
BOOL make_enc_passwd ( SAMR_ENC_PASSWD * pwd , char pass [ 512 ] ) ;
BOOL samr_io_enc_passwd ( char * desc , SAMR_ENC_PASSWD * pwd , prs_struct * ps , int depth ) ;
BOOL make_enc_hash ( SAMR_ENC_HASH * hsh , uchar hash [ 16 ] ) ;
BOOL samr_io_enc_hash ( char * desc , SAMR_ENC_HASH * hsh , prs_struct * ps , int depth ) ;
BOOL make_samr_q_chgpasswd_user ( SAMR_Q_CHGPASSWD_USER * q_u ,
1998-10-10 03:31:50 +04:00
char * dest_host , char * user_name ,
1998-10-21 20:58:34 +04:00
char nt_newpass [ 516 ] , uchar nt_oldhash [ 16 ] ,
char lm_newpass [ 516 ] , uchar lm_oldhash [ 16 ] ) ;
1999-10-15 22:46:22 +04:00
BOOL samr_io_q_chgpasswd_user ( char * desc , SAMR_Q_CHGPASSWD_USER * q_u , prs_struct * ps , int depth ) ;
BOOL make_samr_r_chgpasswd_user ( SAMR_R_CHGPASSWD_USER * r_u , uint32 status ) ;
BOOL samr_io_r_chgpasswd_user ( char * desc , SAMR_R_CHGPASSWD_USER * r_u , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
1998-11-10 22:05:00 +03:00
/*The following definitions come from rpc_parse/parse_sec.c */
1999-10-15 22:46:22 +04:00
BOOL make_sec_access ( SEC_ACCESS * t , uint32 mask ) ;
BOOL sec_io_access ( char * desc , SEC_ACCESS * t , prs_struct * ps , int depth ) ;
BOOL make_sec_ace ( SEC_ACE * t , DOM_SID * sid , uint8 type , SEC_ACCESS mask , uint8 flag ) ;
BOOL sec_io_ace ( char * desc , SEC_ACE * t , prs_struct * ps , int depth ) ;
BOOL make_sec_acl ( SEC_ACL * t , uint16 revision , int num_aces , SEC_ACE * ace ) ;
1999-08-04 00:30:25 +04:00
void free_sec_acl ( SEC_ACL * t ) ;
1999-10-15 22:46:22 +04:00
BOOL sec_io_acl ( char * desc , SEC_ACL * t , prs_struct * ps , int depth ) ;
1999-08-04 00:30:25 +04:00
int make_sec_desc ( SEC_DESC * t , uint16 revision , uint16 type ,
1999-02-24 01:39:54 +03:00
DOM_SID * owner_sid , DOM_SID * grp_sid ,
1999-08-04 00:30:25 +04:00
SEC_ACL * sacl , SEC_ACL * dacl ) ;
void free_sec_desc ( SEC_DESC * t ) ;
1999-10-15 22:46:22 +04:00
BOOL make_sec_desc_buf ( SEC_DESC_BUF * buf , int len , SEC_DESC * data ) ;
1999-08-04 00:30:25 +04:00
void free_sec_desc_buf ( SEC_DESC_BUF * buf ) ;
1999-10-15 22:46:22 +04:00
BOOL sec_io_desc_buf ( char * desc , SEC_DESC_BUF * sec , prs_struct * ps , int depth ) ;
1998-11-10 22:05:00 +03:00
1999-04-27 14:43:32 +04:00
/*The following definitions come from rpc_parse/parse_spoolss.c */
1999-10-15 22:46:22 +04:00
BOOL make_systemtime ( SYSTEMTIME * systime , struct tm * unixtime ) ;
BOOL smb_io_notify_info_data_strings ( char * desc , SPOOL_NOTIFY_INFO_DATA * data ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-11-06 21:11:19 +03:00
BOOL spoolss_io_r_open_printer_ex ( char * desc , SPOOL_R_OPEN_PRINTER_EX * r_u , prs_struct * ps , int depth ) ;
BOOL make_spoolss_q_open_printer_ex ( SPOOL_Q_OPEN_PRINTER_EX * q_u ,
1999-11-09 22:35:30 +03:00
const char * printername ,
1999-11-06 21:11:19 +03:00
uint32 cbbuf , uint32 devmod , uint32 des_access ,
1999-11-09 22:35:30 +03:00
const char * station ,
const char * username ) ;
1999-11-06 21:11:19 +03:00
BOOL spoolss_io_q_open_printer_ex ( char * desc , SPOOL_Q_OPEN_PRINTER_EX * q_u , prs_struct * ps , int depth ) ;
1999-11-05 21:40:38 +03:00
BOOL make_spoolss_q_getprinterdata ( SPOOL_Q_GETPRINTERDATA * q_u ,
PRINTER_HND * handle ,
char * valuename ,
uint32 size ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_q_getprinterdata ( char * desc , SPOOL_Q_GETPRINTERDATA * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_getprinterdata ( char * desc , SPOOL_R_GETPRINTERDATA * r_u , prs_struct * ps , int depth ) ;
1999-11-06 21:11:19 +03:00
BOOL make_spoolss_q_closeprinter ( SPOOL_Q_CLOSEPRINTER * q_u , PRINTER_HND * hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_q_closeprinter ( char * desc , SPOOL_Q_CLOSEPRINTER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_closeprinter ( char * desc , SPOOL_R_CLOSEPRINTER * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_startdocprinter ( char * desc , SPOOL_Q_STARTDOCPRINTER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_startdocprinter ( char * desc , SPOOL_R_STARTDOCPRINTER * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_enddocprinter ( char * desc , SPOOL_Q_ENDDOCPRINTER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_enddocprinter ( char * desc , SPOOL_R_ENDDOCPRINTER * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_startpageprinter ( char * desc , SPOOL_Q_STARTPAGEPRINTER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_startpageprinter ( char * desc , SPOOL_R_STARTPAGEPRINTER * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_endpageprinter ( char * desc , SPOOL_Q_ENDPAGEPRINTER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_endpageprinter ( char * desc , SPOOL_R_ENDPAGEPRINTER * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_writeprinter ( char * desc , SPOOL_Q_WRITEPRINTER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_writeprinter ( char * desc , SPOOL_R_WRITEPRINTER * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_rffpcnex ( char * desc , SPOOL_Q_RFFPCNEX * q_u ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_r_rffpcnex ( char * desc , SPOOL_R_RFFPCNEX * r_u ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_q_rfnpcnex ( char * desc , SPOOL_Q_RFNPCNEX * q_u ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_r_rfnpcnex ( char * desc ,
1999-04-27 14:43:32 +04:00
SPOOL_R_RFNPCNEX * r_u ,
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_free_buffer ( BUFFER * buffer ) ;
BOOL spoolss_io_q_getprinterdriver2 ( char * desc ,
1999-04-27 14:43:32 +04:00
SPOOL_Q_GETPRINTERDRIVER2 * q_u ,
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_r_getprinterdriver2 ( char * desc , SPOOL_R_GETPRINTERDRIVER2 * r_u ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-11-06 22:52:04 +03:00
BOOL make_spoolss_q_enumprinters ( SPOOL_Q_ENUMPRINTERS * q_u ,
uint32 flags ,
const char * servername ,
uint32 level ,
uint32 size ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_q_enumprinters ( char * desc , SPOOL_Q_ENUMPRINTERS * q_u ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-11-09 01:00:41 +03:00
void free_r_enumprinters ( SPOOL_R_ENUMPRINTERS * r_u ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_r_enumprinters ( char * desc ,
1999-04-27 14:43:32 +04:00
SPOOL_R_ENUMPRINTERS * r_u ,
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_r_getprinter ( char * desc ,
1999-04-27 14:43:32 +04:00
SPOOL_R_GETPRINTER * r_u ,
prs_struct * ps , int depth ) ;
1999-11-05 21:40:38 +03:00
BOOL make_spoolss_q_getprinter ( SPOOL_Q_GETPRINTER * q_u ,
PRINTER_HND * hnd ,
uint32 level ,
uint32 buf_size ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_q_getprinter ( char * desc , SPOOL_Q_GETPRINTER * q_u ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_r_setprinter ( char * desc , SPOOL_R_SETPRINTER * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_setprinter ( char * desc , SPOOL_Q_SETPRINTER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_fcpn ( char * desc , SPOOL_R_FCPN * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_fcpn ( char * desc , SPOOL_Q_FCPN * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_addjob ( char * desc , SPOOL_R_ADDJOB * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_addjob ( char * desc , SPOOL_Q_ADDJOB * q_u , prs_struct * ps , int depth ) ;
1999-11-09 01:00:41 +03:00
void free_r_enumjobs ( SPOOL_R_ENUMJOBS * r_u ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_r_enumjobs ( char * desc , SPOOL_R_ENUMJOBS * r_u , prs_struct * ps , int depth ) ;
1999-11-09 22:35:30 +03:00
BOOL make_spoolss_q_enumjobs ( SPOOL_Q_ENUMJOBS * q_u , const PRINTER_HND * hnd ,
1999-11-09 01:00:41 +03:00
uint32 firstjob ,
uint32 numofjobs ,
uint32 level ,
uint32 buf_size ) ;
1999-10-15 22:46:22 +04:00
BOOL spoolss_io_q_enumjobs ( char * desc , SPOOL_Q_ENUMJOBS * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_schedulejob ( char * desc , SPOOL_R_SCHEDULEJOB * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_schedulejob ( char * desc , SPOOL_Q_SCHEDULEJOB * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_setjob ( char * desc , SPOOL_R_SETJOB * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_setjob ( char * desc , SPOOL_Q_SETJOB * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_enumdrivers ( char * desc , SPOOL_R_ENUMPRINTERDRIVERS * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_enumprinterdrivers ( char * desc , SPOOL_Q_ENUMPRINTERDRIVERS * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_enumforms ( char * desc , SPOOL_R_ENUMFORMS * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_enumforms ( char * desc , SPOOL_Q_ENUMFORMS * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_enumports ( char * desc , SPOOL_R_ENUMPORTS * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_enumports ( char * desc , SPOOL_Q_ENUMPORTS * q_u , prs_struct * ps , int depth ) ;
BOOL spool_io_printer_info_level_2 ( char * desc , SPOOL_PRINTER_INFO_LEVEL_2 * * q_u , prs_struct * ps , int depth ) ;
BOOL spool_io_printer_info_level ( char * desc , SPOOL_PRINTER_INFO_LEVEL * il , prs_struct * ps , int depth ) ;
BOOL spool_io_user_level_1 ( char * desc , SPOOL_USER_LEVEL_1 * * q_u , prs_struct * ps , int depth ) ;
BOOL spool_io_user_level ( char * desc , SPOOL_USER_LEVEL * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_addprinterex ( char * desc , SPOOL_Q_ADDPRINTEREX * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_addprinterex ( char * desc , SPOOL_R_ADDPRINTEREX * r_u , prs_struct * ps , int depth ) ;
BOOL spool_io_printer_driver_info_level_3 ( char * desc , SPOOL_PRINTER_DRIVER_INFO_LEVEL_3 * * q_u ,
1999-04-27 14:43:32 +04:00
prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL uniarray_2_ascarray ( BUFFER5 * buf5 , char * * * ar ) ;
BOOL smb_io_unibuffer ( char * desc , UNISTR2 * buffer , prs_struct * ps , int depth ) ;
BOOL spool_io_printer_driver_info_level ( char * desc , SPOOL_PRINTER_DRIVER_INFO_LEVEL * il , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_addprinterdriver ( char * desc , SPOOL_Q_ADDPRINTERDRIVER * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_addprinterdriver ( char * desc , SPOOL_R_ADDPRINTERDRIVER * q_u , prs_struct * ps , int depth ) ;
BOOL uni_2_asc_printer_driver_3 ( SPOOL_PRINTER_DRIVER_INFO_LEVEL_3 * uni ,
1999-04-27 14:43:32 +04:00
NT_PRINTER_DRIVER_INFO_LEVEL_3 * * asc ) ;
1999-10-15 22:46:22 +04:00
BOOL uni_2_asc_printer_info_2 ( SPOOL_PRINTER_INFO_LEVEL_2 * uni ,
1999-04-27 14:43:32 +04:00
NT_PRINTER_INFO_LEVEL_2 * * asc ) ;
1999-10-15 22:46:22 +04:00
BOOL convert_printer_info ( SPOOL_PRINTER_INFO_LEVEL uni ,
1999-04-27 14:43:32 +04:00
NT_PRINTER_INFO_LEVEL * printer ,
uint32 level ) ;
1999-10-15 22:46:22 +04:00
BOOL convert_printer_driver_info ( SPOOL_PRINTER_DRIVER_INFO_LEVEL uni ,
1999-04-27 14:43:32 +04:00
NT_PRINTER_DRIVER_INFO_LEVEL * printer ,
uint32 level ) ;
1999-10-15 22:46:22 +04:00
BOOL convert_devicemode ( DEVICEMODE devmode , NT_DEVICEMODE * nt_devmode ) ;
BOOL spoolss_io_r_getprinterdriverdir ( char * desc , SPOOL_R_GETPRINTERDRIVERDIR * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_getprinterdriverdir ( char * desc , SPOOL_Q_GETPRINTERDRIVERDIR * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_enumprintprocessors ( char * desc , SPOOL_R_ENUMPRINTPROCESSORS * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_enumprintprocessors ( char * desc , SPOOL_Q_ENUMPRINTPROCESSORS * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_enumprintmonitors ( char * desc , SPOOL_R_ENUMPRINTMONITORS * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_enumprintmonitors ( char * desc , SPOOL_Q_ENUMPRINTMONITORS * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_enumprinterdata ( char * desc , SPOOL_R_ENUMPRINTERDATA * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_enumprinterdata ( char * desc , SPOOL_Q_ENUMPRINTERDATA * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_setprinterdata ( char * desc , SPOOL_Q_SETPRINTERDATA * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_setprinterdata ( char * desc , SPOOL_R_SETPRINTERDATA * r_u , prs_struct * ps , int depth ) ;
BOOL convert_specific_param ( NT_PRINTER_PARAM * * param , UNISTR2 value , uint32 type , uint8 * data , uint32 len ) ;
BOOL spoolss_io_q_addform ( char * desc , SPOOL_Q_ADDFORM * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_addform ( char * desc , SPOOL_R_ADDFORM * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_setform ( char * desc , SPOOL_Q_SETFORM * q_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_setform ( char * desc , SPOOL_R_SETFORM * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_r_getjob ( char * desc , SPOOL_R_GETJOB * r_u , prs_struct * ps , int depth ) ;
BOOL spoolss_io_q_getjob ( char * desc , SPOOL_Q_GETJOB * q_u , prs_struct * ps , int depth ) ;
1999-04-27 14:43:32 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_srv.c */
1999-10-15 22:46:22 +04:00
BOOL make_srv_share_info1_str ( SH_INFO_1_STR * sh1 , char * net_name , char * remark ) ;
BOOL make_srv_share_info1 ( SH_INFO_1 * sh1 , char * net_name , uint32 type , char * remark ) ;
BOOL make_srv_share_info2_str ( SH_INFO_2_STR * sh2 ,
1998-08-09 17:25:34 +04:00
char * net_name , char * remark ,
1999-10-25 23:03:27 +04:00
char * path , char * pass ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_share_info2 ( SH_INFO_2 * sh2 ,
1998-08-09 17:25:34 +04:00
char * net_name , uint32 type , char * remark ,
uint32 perms , uint32 max_uses , uint32 num_uses ,
1999-10-25 23:03:27 +04:00
char * path , char * pass ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_q_net_share_enum ( SRV_Q_NET_SHARE_ENUM * q_n ,
1999-11-04 01:14:38 +03:00
const char * srv_name ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 share_level , SRV_SHARE_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL srv_io_q_net_share_enum ( char * desc , SRV_Q_NET_SHARE_ENUM * q_n , prs_struct * ps , int depth ) ;
BOOL srv_io_r_net_share_enum ( char * desc , SRV_R_NET_SHARE_ENUM * r_n , prs_struct * ps , int depth ) ;
BOOL make_srv_sess_info0_str ( SESS_INFO_0_STR * ss0 , char * name ) ;
BOOL make_srv_sess_info0 ( SESS_INFO_0 * ss0 , char * name ) ;
BOOL make_srv_sess_info1_str ( SESS_INFO_1_STR * ss1 , char * name , char * user ) ;
BOOL make_srv_sess_info1 ( SESS_INFO_1 * ss1 ,
1998-08-09 17:25:34 +04:00
char * name , char * user ,
uint32 num_opens , uint32 open_time , uint32 idle_time ,
uint32 user_flags ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_q_net_sess_enum ( SRV_Q_NET_SESS_ENUM * q_n ,
1999-11-04 01:14:38 +03:00
const char * srv_name , const char * qual_name ,
1999-08-19 00:33:49 +04:00
char * user_name ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 sess_level , SRV_SESS_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL srv_io_q_net_sess_enum ( char * desc , SRV_Q_NET_SESS_ENUM * q_n , prs_struct * ps , int depth ) ;
BOOL srv_io_r_net_sess_enum ( char * desc , SRV_R_NET_SESS_ENUM * r_n , prs_struct * ps , int depth ) ;
BOOL make_srv_conn_info0 ( CONN_INFO_0 * ss0 , uint32 id ) ;
BOOL make_srv_conn_info1_str ( CONN_INFO_1_STR * ss1 , char * usr_name , char * net_name ) ;
BOOL make_srv_conn_info1 ( CONN_INFO_1 * ss1 ,
1998-08-09 17:25:34 +04:00
uint32 id , uint32 type ,
uint32 num_opens , uint32 num_users , uint32 open_time ,
char * usr_name , char * net_name ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_q_net_conn_enum ( SRV_Q_NET_CONN_ENUM * q_n ,
1999-11-04 01:14:38 +03:00
const char * srv_name , const char * qual_name ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 conn_level , SRV_CONN_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL srv_io_q_net_conn_enum ( char * desc , SRV_Q_NET_CONN_ENUM * q_n , prs_struct * ps , int depth ) ;
BOOL srv_io_r_net_conn_enum ( char * desc , SRV_R_NET_CONN_ENUM * r_n , prs_struct * ps , int depth ) ;
1999-10-31 02:34:38 +04:00
BOOL make_srv_tprt_info0_str ( TPRT_INFO_0_STR * tp0 ,
char * trans_name ,
char * trans_addr , uint32 trans_addr_len ,
char * addr_name ) ;
BOOL make_srv_tprt_info0 ( TPRT_INFO_0 * tp0 ,
uint32 num_vcs , uint32 trans_addr_len ,
char * trans_name , char * trans_addr ,
char * addr_name ) ;
1999-11-04 00:51:29 +03:00
void free_srv_tprt_info_0 ( SRV_TPRT_INFO_0 * tp0 ) ;
void free_srv_tprt_ctr ( SRV_TPRT_INFO_CTR * ctr ) ;
1999-10-31 02:34:38 +04:00
BOOL make_srv_q_net_tprt_enum ( SRV_Q_NET_TPRT_ENUM * q_n ,
1999-11-04 01:14:38 +03:00
const char * srv_name ,
1999-10-31 02:34:38 +04:00
uint32 tprt_level , SRV_TPRT_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
BOOL srv_io_q_net_tprt_enum ( char * desc , SRV_Q_NET_TPRT_ENUM * q_n , prs_struct * ps , int depth ) ;
BOOL srv_io_r_net_tprt_enum ( char * desc , SRV_R_NET_TPRT_ENUM * r_n , prs_struct * ps , int depth ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_file_info3_str ( FILE_INFO_3_STR * fi3 , char * user_name , char * path_name ) ;
BOOL make_srv_file_info3 ( FILE_INFO_3 * fl3 ,
1998-08-09 17:25:34 +04:00
uint32 id , uint32 perms , uint32 num_locks ,
char * path_name , char * user_name ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_q_net_file_enum ( SRV_Q_NET_FILE_ENUM * q_n ,
1999-11-04 01:14:38 +03:00
const char * srv_name , const char * qual_name ,
uint32 file_id ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
uint32 file_level , SRV_FILE_INFO_CTR * ctr ,
uint32 preferred_len ,
ENUM_HND * hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL srv_io_q_net_file_enum ( char * desc , SRV_Q_NET_FILE_ENUM * q_n , prs_struct * ps , int depth ) ;
BOOL srv_io_r_net_file_enum ( char * desc , SRV_R_NET_FILE_ENUM * r_n , prs_struct * ps , int depth ) ;
BOOL make_srv_info_101 ( SRV_INFO_101 * sv101 , uint32 platform_id , char * name ,
1998-08-09 17:25:34 +04:00
uint32 ver_major , uint32 ver_minor ,
uint32 srv_type , char * comment ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_info_102 ( SRV_INFO_102 * sv102 , uint32 platform_id , char * name ,
1998-08-09 17:25:34 +04:00
char * comment , uint32 ver_major , uint32 ver_minor ,
uint32 srv_type , uint32 users , uint32 disc , uint32 hidden ,
uint32 announce , uint32 ann_delta , uint32 licenses ,
char * usr_path ) ;
1999-10-15 22:46:22 +04:00
BOOL make_srv_q_net_srv_get_info ( SRV_Q_NET_SRV_GET_INFO * srv ,
Makefile.in :
- added srvsvc client files
clientgen.c :
- replaced cli_error(cli, int *cls, int *err) with
cli_error(cli, uint8 cls, uint32 *err). this version detects
32 bit status messages. the DOS error "MORE_DATA", the
equivalent of the 32 bit *warning* 0x8000 0005
(STATUS_BUFFER_OVERFLOW), was being processed as an error,
terminating the cli_receive_trans() call.
cli_pipe.c :
- replaced calls that had been incorrectly modified from
32 bit warnings (0x8000 0005 - STATUS_BUFFER_OVERFLOW)
to 8 bit DOS errors (0x01 0xEA - MORE_DATA).
the use of the old version of cli_error (DOS only)
instead of the new one (DOS and 32 bit) caused the
dce/rpc client code to fail.
- replaced 2 space indentation with tab indentation in all functions.
cli_srvsvc.c :
cmd_srvsvc.c :
- added these files back in, fixing them up to use jeremy's
modified versions of the dce/rpc client functions.
parse_srv.c :
- added back in some "unused" functions required by dce/rpc
client-side code. it would be helpful if all such "unused"
functions could be added back in.
rpcclient.c :
- added "session", "file", "share", "connection" enumeration
functions back in. these are equivalent to nt's "NetXXXXXEnum"
Win32 (MSDN) functions.
- added "srvinfo" function back in. this is equivalent to
nt's NetServerGetInfo Win32 (MSDN) function.
(This used to be commit bcf39ffdcc64e049bca2d70a394a99976291e81d)
1998-10-03 01:09:23 +04:00
char * server_name , uint32 switch_value ) ;
1999-10-15 22:46:22 +04:00
BOOL srv_io_q_net_srv_get_info ( char * desc , SRV_Q_NET_SRV_GET_INFO * q_n , prs_struct * ps , int depth ) ;
BOOL make_srv_r_net_srv_get_info ( SRV_R_NET_SRV_GET_INFO * srv ,
1998-08-09 17:25:34 +04:00
uint32 switch_value , SRV_INFO_CTR * ctr , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL srv_io_r_net_srv_get_info ( char * desc , SRV_R_NET_SRV_GET_INFO * r_n , prs_struct * ps , int depth ) ;
BOOL make_srv_q_net_remote_tod ( SRV_Q_NET_REMOTE_TOD * q_t , char * server_name ) ;
BOOL srv_io_q_net_remote_tod ( char * desc , SRV_Q_NET_REMOTE_TOD * q_n , prs_struct * ps , int depth ) ;
BOOL make_time_of_day_info ( TIME_OF_DAY_INFO * tod , uint32 elapsedt , uint32 msecs ,
1998-08-09 17:25:34 +04:00
uint32 hours , uint32 mins , uint32 secs , uint32 hunds ,
uint32 zone , uint32 tintervals , uint32 day ,
uint32 month , uint32 year , uint32 weekday ) ;
1999-10-15 22:46:22 +04:00
BOOL srv_io_r_net_remote_tod ( char * desc , SRV_R_NET_REMOTE_TOD * r_n , prs_struct * ps , int depth ) ;
1998-08-09 17:25:34 +04:00
1998-12-08 03:25:04 +03:00
/*The following definitions come from rpc_parse/parse_svc.c */
1999-10-15 22:46:22 +04:00
BOOL make_svc_q_open_sc_man ( SVC_Q_OPEN_SC_MAN * q_u ,
1999-11-25 02:11:03 +03:00
const char * server , const char * database ,
1998-12-09 02:29:37 +03:00
uint32 des_access ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_q_open_sc_man ( char * desc , SVC_Q_OPEN_SC_MAN * q_u , prs_struct * ps , int depth ) ;
BOOL make_svc_r_open_sc_man ( SVC_R_OPEN_SC_MAN * r_u , POLICY_HND * hnd ,
1998-12-08 03:25:04 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_r_open_sc_man ( char * desc , SVC_R_OPEN_SC_MAN * r_u , prs_struct * ps , int depth ) ;
BOOL make_svc_q_open_service ( SVC_Q_OPEN_SERVICE * q_u ,
1998-12-10 02:16:37 +03:00
POLICY_HND * hnd ,
1999-10-31 07:11:17 +03:00
const char * server ,
1998-12-10 02:16:37 +03:00
uint32 des_access ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_q_open_service ( char * desc , SVC_Q_OPEN_SERVICE * q_u , prs_struct * ps , int depth ) ;
BOOL make_svc_r_open_service ( SVC_R_OPEN_SERVICE * r_u , POLICY_HND * hnd ,
1998-12-10 02:16:37 +03:00
uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_r_open_service ( char * desc , SVC_R_OPEN_SERVICE * r_u , prs_struct * ps , int depth ) ;
1999-11-01 20:52:11 +03:00
BOOL make_svc_q_stop_service ( SVC_Q_STOP_SERVICE * q_c , POLICY_HND * hnd ,
uint32 unk ) ;
BOOL svc_io_q_stop_service ( char * desc , SVC_Q_STOP_SERVICE * q_s , prs_struct * ps , int depth ) ;
BOOL svc_io_r_stop_service ( char * desc , SVC_R_STOP_SERVICE * r_s , prs_struct * ps , int depth ) ;
1999-10-31 08:23:32 +03:00
BOOL make_svc_q_start_service ( SVC_Q_START_SERVICE * q_c , POLICY_HND * hnd ,
uint32 argc ,
char * * argv ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_q_start_service ( char * desc , SVC_Q_START_SERVICE * q_s , prs_struct * ps , int depth ) ;
BOOL svc_io_r_start_service ( char * desc , SVC_R_START_SERVICE * r_s , prs_struct * ps , int depth ) ;
BOOL make_svc_query_svc_cfg ( QUERY_SERVICE_CONFIG * q_u ,
1999-11-23 23:32:52 +03:00
uint32 service_type , uint32 start_type ,
1998-12-10 02:16:37 +03:00
uint32 error_control ,
char * bin_path_name , char * load_order_grp ,
uint32 tag_id ,
char * dependencies , char * service_start_name ,
1998-12-14 23:23:20 +03:00
char * disp_name ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_query_svc_cfg ( char * desc , QUERY_SERVICE_CONFIG * q_u , prs_struct * ps , int depth ) ;
BOOL make_svc_q_enum_svcs_status ( SVC_Q_ENUM_SVCS_STATUS * q_c , POLICY_HND * hnd ,
1999-11-23 23:32:52 +03:00
uint32 service_type , uint32 service_state ,
1998-12-09 19:28:04 +03:00
uint32 buf_size , uint32 resume_hnd ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_q_enum_svcs_status ( char * desc , SVC_Q_ENUM_SVCS_STATUS * q_u , prs_struct * ps , int depth ) ;
BOOL make_svc_r_enum_svcs_status ( SVC_R_ENUM_SVCS_STATUS * r_c ,
1998-12-09 19:28:04 +03:00
ENUM_SRVC_STATUS * svcs , uint32 more_buf_size ,
uint32 num_svcs , uint32 resume_hnd ,
uint32 dos_status ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_r_enum_svcs_status ( char * desc , SVC_R_ENUM_SVCS_STATUS * svc , prs_struct * ps , int depth ) ;
BOOL svc_io_svc_status ( char * desc , SVC_STATUS * svc , prs_struct * ps , int depth ) ;
BOOL make_svc_q_query_svc_config ( SVC_Q_QUERY_SVC_CONFIG * q_c , POLICY_HND * hnd ,
1998-12-14 23:23:20 +03:00
uint32 buf_size ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_q_query_svc_config ( char * desc , SVC_Q_QUERY_SVC_CONFIG * q_u , prs_struct * ps , int depth ) ;
BOOL make_svc_r_query_svc_config ( SVC_R_QUERY_SVC_CONFIG * r_c ,
1999-01-29 00:11:15 +03:00
QUERY_SERVICE_CONFIG * cfg ,
1998-12-14 23:23:20 +03:00
uint32 buf_size ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_r_query_svc_config ( char * desc , SVC_R_QUERY_SVC_CONFIG * r_u , prs_struct * ps , int depth ) ;
BOOL svc_io_q_query_disp_name ( char * desc , SVC_Q_QUERY_DISP_NAME * q_u , prs_struct * ps , int depth ) ;
BOOL make_svc_r_query_disp_name ( SVC_R_QUERY_DISP_NAME * r_d ,
1999-03-16 09:24:24 +03:00
char * disp_name , uint32 status ) ;
1999-10-15 22:46:22 +04:00
BOOL svc_io_r_query_disp_name ( char * desc , SVC_R_QUERY_DISP_NAME * r_u , prs_struct * ps , int depth ) ;
BOOL make_svc_q_close ( SVC_Q_CLOSE * q_c , POLICY_HND * hnd ) ;
BOOL svc_io_q_close ( char * desc , SVC_Q_CLOSE * q_u , prs_struct * ps , int depth ) ;
BOOL svc_io_r_close ( char * desc , SVC_R_CLOSE * r_u , prs_struct * ps , int depth ) ;
1999-11-24 02:05:47 +03:00
BOOL make_svc_q_change_svc_config ( SVC_Q_CHANGE_SVC_CONFIG * q_u , POLICY_HND * hnd ,
uint32 service_type , uint32 start_type ,
uint32 unknown_0 ,
uint32 error_control ,
char * bin_path_name , char * load_order_grp ,
uint32 tag_id ,
char * dependencies , char * service_start_name ,
char * password ,
char * disp_name ) ;
BOOL svc_io_q_change_svc_config ( char * desc , SVC_Q_CHANGE_SVC_CONFIG * q_u , prs_struct * ps , int depth ) ;
BOOL make_svc_r_change_svc_config ( SVC_R_CHANGE_SVC_CONFIG * r_c ,
uint32 unknown_0 , uint32 status ) ;
BOOL svc_io_r_change_svc_config ( char * desc , SVC_R_CHANGE_SVC_CONFIG * r_u , prs_struct * ps , int depth ) ;
1998-12-08 03:25:04 +03:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_parse/parse_wks.c */
1998-05-08 20:49:10 +04:00
1999-10-15 22:46:22 +04:00
BOOL make_wks_q_query_info ( WKS_Q_QUERY_INFO * q_u ,
1998-09-26 01:20:37 +04:00
char * server , uint16 switch_value ) ;
1999-10-15 22:46:22 +04:00
BOOL wks_io_q_query_info ( char * desc , WKS_Q_QUERY_INFO * q_u , prs_struct * ps , int depth ) ;
BOOL make_wks_info_100 ( WKS_INFO_100 * inf ,
1998-08-09 17:25:34 +04:00
uint32 platform_id , uint32 ver_major , uint32 ver_minor ,
char * my_name , char * domain_name ) ;
1999-10-15 22:46:22 +04:00
BOOL make_wks_r_query_info ( WKS_R_QUERY_INFO * r_u ,
1998-08-09 17:25:34 +04:00
uint32 switch_value , WKS_INFO_100 * wks100 ,
int status ) ;
1999-10-15 22:46:22 +04:00
BOOL wks_io_r_query_info ( char * desc , WKS_R_QUERY_INFO * r_u , prs_struct * ps , int depth ) ;
1998-05-08 20:49:10 +04:00
1999-11-19 04:01:07 +03:00
/*The following definitions come from rpc_server/srv_brs.c */
BOOL api_brs_rpc ( pipes_struct * p , prs_struct * data ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from rpc_server/srv_lookup.c */
int make_dom_gids ( DOMAIN_GRP * mem , int num_members , DOM_GID * * ppgids ) ;
int get_domain_user_groups ( DOMAIN_GRP_MEMBER * * grp_members , uint32 group_rid ) ;
1998-11-24 00:51:05 +03:00
uint32 lookup_builtin_sid ( DOM_SID * sid , char * name , uint8 * type ) ;
uint32 lookup_added_sid ( DOM_SID * sid , char * name , uint8 * type ) ;
uint32 lookup_sid ( DOM_SID * sid , char * name , uint8 * type ) ;
uint32 lookup_wk_group_sid ( DOM_SID * sid , char * group_name , uint8 * type ) ;
uint32 lookup_group_sid ( DOM_SID * sid , char * group_name , uint8 * type ) ;
uint32 lookup_wk_alias_sid ( DOM_SID * sid , char * alias_name , uint8 * type ) ;
uint32 lookup_alias_sid ( DOM_SID * sid , char * alias_name , uint8 * type ) ;
uint32 lookup_wk_user_sid ( DOM_SID * sid , char * user_name , uint8 * type ) ;
uint32 lookup_user_sid ( DOM_SID * sid , char * user_name , uint8 * type ) ;
1998-11-29 23:03:33 +03:00
uint32 lookup_added_group_name ( const char * grp_name , const char * domain ,
DOM_SID * sid , uint8 * type ) ;
uint32 lookup_added_alias_name ( const char * als_name , const char * domain ,
DOM_SID * sid , uint8 * type ) ;
uint32 lookup_added_user_rids ( char * nt_name ,
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
uint32 * usr_rid , uint32 * grp_rid ) ;
1998-11-24 00:51:05 +03:00
uint32 lookup_name ( char * name , DOM_SID * sid , uint8 * type ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_server/srv_lsa.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
BOOL api_ntlsa_rpc ( pipes_struct * p , prs_struct * data ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_server/srv_netlog.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
BOOL api_netlog_rpc ( pipes_struct * p , prs_struct * data ) ;
1998-05-08 20:49:10 +04:00
1998-11-12 19:07:00 +03:00
/*The following definitions come from rpc_server/srv_pipe.c */
BOOL create_rpc_reply ( pipes_struct * p ,
uint32 data_start , uint32 data_end ) ;
BOOL rpc_command ( pipes_struct * p , prs_struct * pd ) ;
BOOL api_rpcTNP ( pipes_struct * p , char * rpc_name , struct api_struct * api_rpc_cmds ,
prs_struct * data ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_server/srv_pipe_hnd.c */
1998-05-08 20:49:10 +04:00
1998-09-30 05:49:24 +04:00
void set_pipe_handle_offset ( int max_open_files ) ;
1998-08-17 07:06:20 +04:00
void reset_chain_p ( void ) ;
1998-08-09 17:25:34 +04:00
void init_rpc_pipe_hnd ( void ) ;
1998-08-17 07:06:20 +04:00
pipes_struct * open_rpc_pipe_p ( char * pipe_name ,
1998-08-17 07:52:05 +04:00
connection_struct * conn , uint16 vuid ) ;
1998-10-17 00:08:56 +04:00
ssize_t write_pipe ( pipes_struct * p , char * data , size_t n ) ;
1998-08-17 07:06:20 +04:00
int read_pipe ( pipes_struct * p , char * data , uint32 pos , int n ) ;
1998-10-15 09:47:29 +04:00
BOOL wait_rpc_pipe_hnd_state ( pipes_struct * p , uint16 priority ) ;
1998-08-09 17:25:34 +04:00
BOOL set_rpc_pipe_hnd_state ( pipes_struct * p , uint16 device_state ) ;
1998-08-17 07:06:20 +04:00
BOOL close_rpc_pipe_hnd ( pipes_struct * p , connection_struct * conn ) ;
pipes_struct * get_rpc_pipe_p ( char * buf , int where ) ;
pipes_struct * get_rpc_pipe ( int pnum ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_server/srv_reg.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
BOOL api_reg_rpc ( pipes_struct * p , prs_struct * data ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_server/srv_samr.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
BOOL api_samr_rpc ( pipes_struct * p , prs_struct * data ) ;
1998-05-08 20:49:10 +04:00
1999-04-27 14:43:32 +04:00
/*The following definitions come from rpc_server/srv_spoolss.c */
void init_printer_hnd ( void ) ;
uint32 size_of_notify_info_data ( uint16 type , uint16 field ) ;
BOOL type_of_notify_info_data ( uint16 type , uint16 field ) ;
BOOL api_spoolss_rpc ( pipes_struct * p , prs_struct * data ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
/*The following definitions come from rpc_server/srv_srvsvc.c */
1998-05-18 15:54:00 +04:00
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
BOOL api_srvsvc_rpc ( pipes_struct * p , prs_struct * data ) ;
1998-08-09 17:25:34 +04:00
1998-12-08 03:25:04 +03:00
/*The following definitions come from rpc_server/srv_svcctl.c */
BOOL api_svcctl_rpc ( pipes_struct * p , prs_struct * data ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from rpc_server/srv_wkssvc.c */
BOOL api_wkssvc_rpc ( pipes_struct * p , prs_struct * data ) ;
1999-04-23 18:47:45 +04:00
/*The following definitions come from rpcclient/cmd_atsvc.c */
1999-11-22 22:02:39 +03:00
void cmd_at ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-04-23 18:47:45 +04:00
1999-11-19 03:12:16 +03:00
/*The following definitions come from rpcclient/cmd_brs.c */
1999-11-22 22:02:39 +03:00
void cmd_brs_query_info ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-19 03:12:16 +03:00
1999-05-04 02:00:33 +04:00
/*The following definitions come from rpcclient/cmd_eventlog.c */
1999-11-22 22:02:39 +03:00
void cmd_eventlog ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-05-04 02:00:33 +04:00
1998-09-26 01:01:52 +04:00
/*The following definitions come from rpcclient/cmd_lsarpc.c */
1999-11-22 22:02:39 +03:00
void cmd_lsa_enum_trust_dom ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_lsa_query_info ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_lsa_lookup_names ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_lsa_lookup_sids ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_lsa_query_secret ( struct client_info * info , int argc , char * argv [ ] ) ;
1998-09-26 01:01:52 +04:00
1998-10-16 03:51:07 +04:00
/*The following definitions come from rpcclient/cmd_netlogon.c */
1999-11-22 22:02:39 +03:00
void cmd_netlogon_login_test ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_netlogon_domain_test ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_sync ( struct client_info * info , int argc , char * argv [ ] ) ;
1998-10-16 03:51:07 +04:00
1998-11-10 22:05:00 +03:00
/*The following definitions come from rpcclient/cmd_reg.c */
1999-11-27 03:02:03 +03:00
void split_server_keyname ( char * srv_name , char * key , const char * arg ) ;
1999-11-25 02:40:20 +03:00
BOOL msrpc_reg_enum_key ( const char * srv_name , const char * full_keyname ,
1999-10-30 00:24:18 +04:00
REG_FN ( reg_fn ) ,
REG_KEY_FN ( reg_key_fn ) ,
REG_VAL_FN ( reg_val_fn ) ) ;
1999-11-22 22:02:39 +03:00
void cmd_reg_enum ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_query_info ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_query_key ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_create_val ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_delete_val ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_delete_key ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_create_key ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_test_key_sec ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_get_key_sec ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_reg_shutdown ( struct client_info * info , int argc , char * argv [ ] ) ;
1998-11-10 22:05:00 +03:00
1998-09-26 02:20:05 +04:00
/*The following definitions come from rpcclient/cmd_samr.c */
1999-11-22 22:02:39 +03:00
void cmd_sam_ntchange_pwd ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_test ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_lookup_domain ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_del_aliasmem ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_delete_dom_alias ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_add_aliasmem ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-23 21:57:07 +03:00
void cmd_sam_create_dom_trusting ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-22 22:02:39 +03:00
void cmd_sam_create_dom_user ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_create_dom_alias ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_del_groupmem ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_delete_dom_group ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_add_groupmem ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_create_dom_group ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_enum_users ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_query_groupmem ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_query_group ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_query_user ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_set_userinfo2 ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_set_userinfo ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_query_dispinfo ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_query_dominfo ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_query_aliasmem ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_query_alias ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_enum_aliases ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_enum_groups ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_sam_enum_domains ( struct client_info * info , int argc , char * argv [ ] ) ;
1998-09-26 02:20:05 +04:00
1999-11-05 21:40:38 +03:00
/*The following definitions come from rpcclient/cmd_spoolss.c */
1999-11-07 00:08:35 +03:00
BOOL msrpc_spoolss_enum_printers ( struct cli_state * cli ,
1999-11-09 22:35:30 +03:00
const char * srv_name ,
1999-11-07 00:08:35 +03:00
uint32 level ,
uint32 * num ,
void * * * ctr ,
PRINT_INFO_FN ( fn ) ) ;
1999-11-22 22:02:39 +03:00
void cmd_spoolss_enum_printers ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_spoolss_open_printer_ex ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-09 22:35:30 +03:00
BOOL msrpc_spoolss_enum_jobs ( struct cli_state * cli ,
const char * srv_name ,
const char * user_name ,
const char * printer_name ,
uint32 level ,
uint32 * num ,
void * * * ctr ,
JOB_INFO_FN ( fn ) ) ;
1999-11-22 22:02:39 +03:00
void cmd_spoolss_enum_jobs ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-05 21:40:38 +03:00
1998-10-05 19:41:41 +04:00
/*The following definitions come from rpcclient/cmd_srvsvc.c */
1999-10-01 22:11:57 +04:00
BOOL net_srv_get_info ( struct client_info * info ,
uint32 info_level ,
SRV_INFO_CTR * ctr ) ;
1999-11-22 22:02:39 +03:00
void cmd_srv_query_info ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-28 01:19:51 +03:00
BOOL msrpc_srv_enum_tprt ( const char * dest_srv ,
1999-11-04 01:14:38 +03:00
uint32 info_level ,
SRV_TPRT_INFO_CTR * ctr ,
1999-11-04 03:09:15 +03:00
TPRT_INFO_FN ( tprt_fn ) ) ;
1999-11-22 22:02:39 +03:00
void cmd_srv_enum_tprt ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_srv_enum_conn ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_srv_enum_shares ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_srv_enum_sess ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_srv_enum_files ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_time ( struct client_info * info , int argc , char * argv [ ] ) ;
1998-10-05 19:41:41 +04:00
1998-12-09 02:29:37 +03:00
/*The following definitions come from rpcclient/cmd_svcctl.c */
1999-11-08 23:58:06 +03:00
void svc_display_query_svc_cfg ( const QUERY_SERVICE_CONFIG * cfg ) ;
1999-11-25 02:11:03 +03:00
BOOL svc_query_service ( POLICY_HND * pol_scm ,
1999-10-31 07:11:17 +03:00
const char * svc_name ,
SVC_QUERY_FN ( svc_query_fn ) ) ;
1999-11-22 22:02:39 +03:00
void cmd_svc_info ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-25 02:11:03 +03:00
BOOL msrpc_svc_enum ( const char * srv_name ,
1999-10-31 07:11:17 +03:00
ENUM_SRVC_STATUS * * svcs ,
uint32 * num_svcs ,
SVC_INFO_FN ( info_fn ) ,
SVC_QUERY_FN ( query_fn ) ) ;
1999-11-22 22:02:39 +03:00
void cmd_svc_enum ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_svc_stop ( struct client_info * info , int argc , char * argv [ ] ) ;
void cmd_svc_start ( struct client_info * info , int argc , char * argv [ ] ) ;
1999-11-24 02:05:47 +03:00
void cmd_svc_set ( struct client_info * info , int argc , char * argv [ ] ) ;
1998-12-09 02:29:37 +03:00
1998-09-26 01:20:37 +04:00
/*The following definitions come from rpcclient/cmd_wkssvc.c */
1999-11-22 22:02:39 +03:00
void cmd_wks_query_info ( struct client_info * info , int argc , char * argv [ ] ) ;
1998-09-26 01:20:37 +04:00
1998-09-26 02:20:05 +04:00
/*The following definitions come from rpcclient/display.c */
1998-12-04 19:30:00 +03:00
char * get_sid_name_use_str ( uint8 sid_name_use ) ;
1998-09-26 02:20:05 +04:00
char * get_file_mode_str ( uint32 share_mode ) ;
char * get_file_oplock_str ( uint32 op_type ) ;
char * get_share_type_str ( uint32 type ) ;
char * get_server_type_str ( uint32 type ) ;
1999-11-08 23:58:06 +03:00
void display_srv_info_101 ( FILE * out_hnd , enum action_type action ,
SRV_INFO_101 * const sv101 ) ;
void display_srv_info_102 ( FILE * out_hnd , enum action_type action , SRV_INFO_102 * const sv102 ) ;
void display_srv_info_ctr ( FILE * out_hnd , enum action_type action , SRV_INFO_CTR * const ctr ) ;
void display_conn_info_0 ( FILE * out_hnd , enum action_type action ,
CONN_INFO_0 * const info0 ) ;
void display_conn_info_1 ( FILE * out_hnd , enum action_type action ,
CONN_INFO_1 * const info1 , CONN_INFO_1_STR * const str1 ) ;
void display_srv_conn_info_0_ctr ( FILE * out_hnd , enum action_type action ,
SRV_CONN_INFO_0 * const ctr ) ;
void display_srv_conn_info_1_ctr ( FILE * out_hnd , enum action_type action ,
SRV_CONN_INFO_1 * const ctr ) ;
void display_srv_conn_info_ctr ( FILE * out_hnd , enum action_type action ,
SRV_CONN_INFO_CTR * const ctr ) ;
void display_tprt_info_0 ( FILE * out_hnd , enum action_type action ,
TPRT_INFO_0 * const info0 , TPRT_INFO_0_STR * const str0 ) ;
void display_srv_tprt_info_0_ctr ( FILE * out_hnd , enum action_type action ,
const SRV_TPRT_INFO_0 * const ctr ) ;
void display_srv_tprt_info_ctr ( FILE * out_hnd , enum action_type action ,
const SRV_TPRT_INFO_CTR * const ctr ) ;
void display_share_info_1 ( FILE * out_hnd , enum action_type action ,
SH_INFO_1 * const info1 , SH_INFO_1_STR * const str1 ) ;
void display_share_info_2 ( FILE * out_hnd , enum action_type action ,
SH_INFO_2 * const info2 , SH_INFO_2_STR * const str2 ) ;
void display_srv_share_info_1_ctr ( FILE * out_hnd , enum action_type action ,
SRV_SHARE_INFO_1 * const ctr ) ;
void display_srv_share_info_2_ctr ( FILE * out_hnd , enum action_type action ,
SRV_SHARE_INFO_2 * const ctr ) ;
void display_srv_share_info_ctr ( FILE * out_hnd , enum action_type action ,
SRV_SHARE_INFO_CTR * const ctr ) ;
void display_file_info_3 ( FILE * out_hnd , enum action_type action ,
FILE_INFO_3 * const info3 , FILE_INFO_3_STR * const str3 ) ;
void display_srv_file_info_3_ctr ( FILE * out_hnd , enum action_type action ,
SRV_FILE_INFO_3 * const ctr ) ;
void display_srv_file_info_ctr ( FILE * out_hnd , enum action_type action ,
SRV_FILE_INFO_CTR * const ctr ) ;
void display_sess_info_0 ( FILE * out_hnd , enum action_type action ,
SESS_INFO_0 * const info0 , SESS_INFO_0_STR * const str0 ) ;
void display_sess_info_1 ( FILE * out_hnd , enum action_type action ,
SESS_INFO_1 * const info1 , SESS_INFO_1_STR * const str1 ) ;
void display_srv_sess_info_0_ctr ( FILE * out_hnd , enum action_type action ,
SRV_SESS_INFO_0 * const ctr ) ;
void display_srv_sess_info_1_ctr ( FILE * out_hnd , enum action_type action ,
SRV_SESS_INFO_1 * const ctr ) ;
void display_srv_sess_info_ctr ( FILE * out_hnd , enum action_type action ,
SRV_SESS_INFO_CTR * const ctr ) ;
void display_server ( FILE * out_hnd , enum action_type action ,
char * const sname , uint32 type , char * const comment ) ;
void display_share ( FILE * out_hnd , enum action_type action ,
char * const sname , uint32 type , char * const comment ) ;
void display_share2 ( FILE * out_hnd , enum action_type action ,
char * const sname , uint32 type , char * const comment ,
uint32 perms , uint32 max_uses , uint32 num_uses ,
char * const path , char * const passwd ) ;
void display_name ( FILE * out_hnd , enum action_type action ,
char * const sname ) ;
void display_alias_members ( FILE * out_hnd , enum action_type action ,
uint32 num_mem , char * const * const sid_mem ,
uint8 * const type ) ;
void display_alias_rid_info ( FILE * out_hnd , enum action_type action ,
DOM_SID * const sid ,
uint32 num_rids , uint32 * const rid ) ;
void display_group_members ( FILE * out_hnd , enum action_type action ,
uint32 num_mem , char * const * const name , uint32 * const type ) ;
void display_group_info1 ( FILE * out_hnd , enum action_type action , GROUP_INFO1 * const info1 ) ;
void display_group_info4 ( FILE * out_hnd , enum action_type action , GROUP_INFO4 * const info4 ) ;
void display_group_info_ctr ( FILE * out_hnd , enum action_type action ,
GROUP_INFO_CTR * const ctr ) ;
void display_group_rid_info ( FILE * out_hnd , enum action_type action ,
uint32 num_gids , DOM_GID * const gid ) ;
void display_alias_name_info ( FILE * out_hnd , enum action_type action ,
uint32 num_aliases , fstring * const alias_name , const uint32 * const num_als_usrs ) ;
void display_alias_info3 ( FILE * out_hnd , enum action_type action , ALIAS_INFO3 * const info3 ) ;
void display_alias_info_ctr ( FILE * out_hnd , enum action_type action ,
ALIAS_INFO_CTR * const ctr ) ;
void display_sam_user_info_21 ( FILE * out_hnd , enum action_type action , SAM_USER_INFO_21 * const usr ) ;
1998-11-13 02:35:05 +03:00
char * get_sec_mask_str ( uint32 type ) ;
1999-11-08 23:58:06 +03:00
void display_sec_access ( FILE * out_hnd , enum action_type action , SEC_ACCESS * const info ) ;
void display_sec_ace ( FILE * out_hnd , enum action_type action , SEC_ACE * const ace ) ;
void display_sec_acl ( FILE * out_hnd , enum action_type action , SEC_ACL * const sec_acl ) ;
void display_sec_desc ( FILE * out_hnd , enum action_type action , SEC_DESC * const sec ) ;
1998-11-10 22:05:00 +03:00
char * get_reg_val_type_str ( uint32 type ) ;
1999-11-08 23:58:06 +03:00
void display_reg_value_info ( FILE * out_hnd , enum action_type action ,
const char * val_name ,
uint32 val_type , const BUFFER2 * value ) ;
void display_reg_key_info ( FILE * out_hnd , enum action_type action ,
1999-10-30 00:24:18 +04:00
const char * key_name , time_t key_mod_time ) ;
1999-01-30 00:22:08 +03:00
char * get_svc_start_type_str ( uint32 type ) ;
1999-11-08 23:58:06 +03:00
void display_query_svc_cfg ( FILE * out_hnd , enum action_type action ,
const QUERY_SERVICE_CONFIG * const cfg ) ;
void display_svc_info ( FILE * out_hnd , enum action_type action ,
const ENUM_SRVC_STATUS * const svc ) ;
void display_at_enum_info ( FILE * out_hnd , enum action_type action ,
1999-11-27 02:04:19 +03:00
uint32 num_jobs , const AT_ENUM_INFO * const jobs ,
char * const * const commands ) ;
1999-11-08 23:58:06 +03:00
void display_at_job_info ( FILE * out_hnd , enum action_type action ,
AT_JOB_INFO * const job , fstring command ) ;
void display_eventlog_eventrecord ( FILE * out_hnd , enum action_type action , EVENTLOGRECORD * const ev ) ;
void display_sam_sync_ctr ( FILE * out_hnd , enum action_type action ,
SAM_DELTA_HDR * const delta ,
SAM_DELTA_CTR * const ctr ) ;
void display_sam_sync ( FILE * out_hnd , enum action_type action ,
SAM_DELTA_HDR * const deltas ,
SAM_DELTA_CTR * const ctr ,
1999-07-21 04:32:09 +04:00
uint32 num ) ;
1999-11-08 23:58:06 +03:00
void display_sam_unk_info_2 ( FILE * out_hnd , enum action_type action ,
SAM_UNK_INFO_2 * const info2 ) ;
void display_sam_unk_ctr ( FILE * out_hnd , enum action_type action ,
uint32 switch_value , SAM_UNK_CTR * const ctr ) ;
1999-11-27 02:04:19 +03:00
void display_sam_info_1 ( FILE * out_hnd , enum action_type action ,
SAM_ENTRY1 * const e1 , SAM_STR1 * const s1 ) ;
void display_sam_info_1_ctr ( FILE * out_hnd , enum action_type action ,
uint32 count , SAM_DISPINFO_1 * const ctr ) ;
void display_sam_disp_info_ctr ( FILE * out_hnd , enum action_type action ,
uint16 level , uint32 count ,
SAM_DISPINFO_CTR * const ctr ) ;
1999-11-08 23:58:06 +03:00
void display_print_info_0 ( FILE * out_hnd , enum action_type action ,
PRINTER_INFO_0 * const i0 ) ;
void display_print_info_1 ( FILE * out_hnd , enum action_type action ,
PRINTER_INFO_1 * const i1 ) ;
void display_printer_info_0_ctr ( FILE * out_hnd , enum action_type action ,
uint32 count , PRINTER_INFO_0 * const * const ctr ) ;
void display_printer_info_1_ctr ( FILE * out_hnd , enum action_type action ,
uint32 count , PRINTER_INFO_1 * const * const ctr ) ;
void display_printer_info_ctr ( FILE * out_hnd , enum action_type action ,
uint32 level , uint32 count ,
void * const * const ctr ) ;
1999-11-09 22:35:30 +03:00
void display_job_info_2 ( FILE * out_hnd , enum action_type action ,
JOB_INFO_2 * const i2 ) ;
void display_job_info_1 ( FILE * out_hnd , enum action_type action ,
JOB_INFO_1 * const i1 ) ;
void display_job_info_2_ctr ( FILE * out_hnd , enum action_type action ,
uint32 count , JOB_INFO_2 * const * const ctr ) ;
void display_job_info_1_ctr ( FILE * out_hnd , enum action_type action ,
uint32 count , JOB_INFO_1 * const * const ctr ) ;
void display_job_info_ctr ( FILE * out_hnd , enum action_type action ,
uint32 level , uint32 count ,
void * const * const ctr ) ;
1998-09-26 02:20:05 +04:00
1998-09-26 01:01:52 +04:00
/*The following definitions come from rpcclient/rpcclient.c */
1999-11-27 23:29:16 +03:00
void readline_init ( void ) ;
1998-09-26 01:01:52 +04:00
1998-08-19 05:49:34 +04:00
/*The following definitions come from smbd/blocking.c */
BOOL push_blocking_lock_request ( char * inbuf , int length , int lock_timeout , int lock_num ) ;
void remove_pending_lock_requests_by_fid ( files_struct * fsp ) ;
void remove_pending_lock_requests_by_mid ( int mid ) ;
void process_blocking_lock_queue ( time_t t ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/chgpasswd.c */
BOOL chgpasswd ( char * name , char * oldpass , char * newpass , BOOL as_root ) ;
BOOL chgpasswd ( char * name , char * oldpass , char * newpass , BOOL as_root ) ;
1998-10-19 21:32:10 +04:00
BOOL check_lanman_password ( char * user , uchar * pass1 ,
uchar * pass2 , struct smb_passwd * * psmbpw ) ;
BOOL change_lanman_password ( struct smb_passwd * smbpw , uchar * pass1 , uchar * pass2 ) ;
BOOL pass_oem_change ( char * user ,
uchar * lmdata , uchar * lmhash ,
uchar * ntdata , uchar * nthash ) ;
BOOL check_oem_password ( char * user ,
uchar * lmdata , uchar * lmhash ,
uchar * ntdata , uchar * nthash ,
1998-08-09 17:25:34 +04:00
struct smb_passwd * * psmbpw , char * new_passwd ,
int new_passwd_size ) ;
BOOL change_oem_password ( struct smb_passwd * smbpw , char * new_passwd , BOOL override ) ;
1998-08-17 17:11:34 +04:00
/*The following definitions come from smbd/close.c */
void close_file ( files_struct * fsp , BOOL normal_close ) ;
void close_directory ( files_struct * fsp ) ;
1998-08-17 10:13:32 +04:00
/*The following definitions come from smbd/conn.c */
void conn_init ( void ) ;
int conn_num_open ( void ) ;
BOOL conn_snum_used ( int snum ) ;
connection_struct * conn_find ( int cnum ) ;
connection_struct * conn_new ( void ) ;
void conn_close_all ( void ) ;
BOOL conn_idle_all ( time_t t , int deadtime ) ;
void conn_free ( connection_struct * conn ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/connection.c */
1998-08-14 21:38:29 +04:00
BOOL yield_connection ( connection_struct * conn , char * name , int max_connections ) ;
BOOL claim_connection ( connection_struct * conn , char * name , int max_connections , BOOL Clear ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/dfree.c */
1998-09-18 04:12:15 +04:00
SMB_BIG_UINT sys_disk_free ( char * path , SMB_BIG_UINT * bsize , SMB_BIG_UINT * dfree , SMB_BIG_UINT * dsize ) ;
1998-08-09 17:25:34 +04:00
1999-07-12 22:46:15 +04:00
/*The following definitions come from smbd/dfs.c */
BOOL init_dfs_table ( void ) ;
1999-07-16 00:44:24 +04:00
int under_dfs ( connection_struct * conn , const char * path ,
1999-07-21 04:32:09 +04:00
char * local_path , size_t local_plen ) ;
1999-07-12 22:46:15 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/dir.c */
void init_dptrs ( void ) ;
char * dptr_path ( int key ) ;
char * dptr_wcard ( int key ) ;
BOOL dptr_set_wcard ( int key , char * wcard ) ;
BOOL dptr_set_attr ( int key , uint16 attr ) ;
uint16 dptr_attr ( int key ) ;
void dptr_close ( int key ) ;
1998-08-14 21:38:29 +04:00
void dptr_closecnum ( connection_struct * conn ) ;
void dptr_idlecnum ( connection_struct * conn ) ;
1998-08-09 17:25:34 +04:00
void dptr_closepath ( char * path , int pid ) ;
1998-08-14 21:38:29 +04:00
int dptr_create ( connection_struct * conn , char * path , BOOL expect_close , int pid ) ;
1998-08-09 17:25:34 +04:00
BOOL dptr_fill ( char * buf1 , unsigned int key ) ;
BOOL dptr_zero ( char * buf ) ;
void * dptr_fetch ( char * buf , int * num ) ;
void * dptr_fetch_lanman2 ( int dptr_num ) ;
1998-09-02 00:11:54 +04:00
BOOL dir_check_ftype ( connection_struct * conn , int mode , SMB_STRUCT_STAT * st , int dirtype ) ;
1998-09-03 22:40:31 +04:00
BOOL get_dir_entry ( connection_struct * conn , char * mask , int dirtype , char * fname ,
SMB_OFF_T * size , int * mode , time_t * date , BOOL check_descend ) ;
1998-08-14 21:38:29 +04:00
void * OpenDir ( connection_struct * conn , char * name , BOOL use_veto ) ;
1998-08-09 17:25:34 +04:00
void CloseDir ( void * p ) ;
char * ReadDirName ( void * p ) ;
BOOL SeekDir ( void * p , int pos ) ;
int TellDir ( void * p ) ;
void DirCacheAdd ( char * path , char * name , char * dname , int snum ) ;
char * DirCacheCheck ( char * path , char * name , int snum ) ;
void DirCacheFlush ( int snum ) ;
1998-08-17 11:40:06 +04:00
/*The following definitions come from smbd/dosmode.c */
mode_t unix_mode ( connection_struct * conn , int dosmode ) ;
1998-09-02 00:11:54 +04:00
int dos_mode ( connection_struct * conn , char * path , SMB_STRUCT_STAT * sbuf ) ;
int file_chmod ( connection_struct * conn , char * fname , int dosmode , SMB_STRUCT_STAT * st ) ;
1998-08-17 17:11:34 +04:00
int file_utime ( connection_struct * conn , char * fname , struct utimbuf * times ) ;
BOOL set_filetime ( connection_struct * conn , char * fname , time_t mtime ) ;
/*The following definitions come from smbd/error.c */
int cached_error_packet ( char * inbuf , char * outbuf , files_struct * fsp , int line ) ;
int unix_error_packet ( char * inbuf , char * outbuf , int def_class , uint32 def_code , int line ) ;
int error_packet ( char * inbuf , char * outbuf , int error_class , uint32 error_code , int line ) ;
1998-08-17 11:40:06 +04:00
1998-08-17 11:15:54 +04:00
/*The following definitions come from smbd/fileio.c */
1998-09-03 22:40:31 +04:00
SMB_OFF_T seek_file ( files_struct * fsp , SMB_OFF_T pos ) ;
1998-09-11 05:24:30 +04:00
ssize_t read_file ( files_struct * fsp , char * data , SMB_OFF_T pos , size_t n ) ;
ssize_t write_file ( files_struct * fsp , char * data , size_t n ) ;
1999-04-20 07:44:06 +04:00
void sys_sync_file ( int fd ) ;
1998-08-17 11:40:06 +04:00
/*The following definitions come from smbd/filename.c */
1998-08-28 00:38:53 +04:00
void print_stat_cache_statistics ( void ) ;
1999-07-16 00:44:24 +04:00
BOOL unix_dfs_convert ( char * name , connection_struct * conn ,
char * saved_last_component ,
BOOL * bad_path , SMB_STRUCT_STAT * pst ) ;
BOOL unix_convert ( char * name , connection_struct * conn ,
char * saved_last_component ,
BOOL * bad_path , SMB_STRUCT_STAT * pst ) ;
1998-08-17 11:40:06 +04:00
BOOL check_name ( char * name , connection_struct * conn ) ;
1998-08-17 11:15:54 +04:00
1998-08-15 11:27:34 +04:00
/*The following definitions come from smbd/files.c */
1998-08-16 07:04:06 +04:00
files_struct * file_new ( void ) ;
1998-09-02 00:11:54 +04:00
file_fd_struct * fd_get_already_open ( SMB_STRUCT_STAT * sbuf ) ;
1998-08-15 11:27:34 +04:00
file_fd_struct * fd_get_new ( void ) ;
void file_close_conn ( connection_struct * conn ) ;
void file_init ( void ) ;
void file_close_user ( int vuid ) ;
1998-09-01 00:20:54 +04:00
files_struct * file_find_dit ( SMB_DEV_T dev , SMB_INO_T inode , struct timeval * tval ) ;
1998-10-23 07:34:50 +04:00
files_struct * file_find_di_first ( SMB_DEV_T dev , SMB_INO_T inode ) ;
files_struct * file_find_di_next ( files_struct * start_fsp ) ;
1998-08-15 11:27:34 +04:00
files_struct * file_find_print ( void ) ;
void file_sync_all ( connection_struct * conn ) ;
1998-09-05 07:14:40 +04:00
void fd_ptr_free ( file_fd_struct * fd_ptr ) ;
1998-08-15 11:27:34 +04:00
void file_free ( files_struct * fsp ) ;
1998-08-17 07:52:05 +04:00
files_struct * file_fsp ( char * buf , int where ) ;
void file_chain_reset ( void ) ;
1998-08-18 02:59:53 +04:00
void file_chain_save ( void ) ;
void file_chain_restore ( void ) ;
1998-08-15 11:27:34 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/ipc.c */
1998-08-14 21:38:29 +04:00
int reply_trans ( connection_struct * conn , char * inbuf , char * outbuf , int size , int bufsize ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/mangle.c */
BOOL is_mangled ( char * s ) ;
BOOL is_8_3 ( char * fname , BOOL check_case ) ;
void reset_mangled_cache ( void ) ;
BOOL check_mangled_cache ( char * s ) ;
1998-09-03 07:14:31 +04:00
void mangle_name_83 ( char * s ) ;
BOOL name_map_mangle ( char * OutName , BOOL need83 , int snum ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/message.c */
1998-05-08 20:49:10 +04:00
1998-08-14 21:38:29 +04:00
int reply_sends ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_sendstrt ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_sendtxt ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_sendend ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
1998-05-08 20:49:10 +04:00
1998-08-17 11:15:54 +04:00
/*The following definitions come from smbd/negprot.c */
int reply_negprot ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size ,
int dum_buffsize ) ;
1998-11-03 05:25:28 +03:00
/*The following definitions come from smbd/noquotas.c */
1998-11-06 21:40:51 +03:00
BOOL disk_quotas ( char * path , SMB_BIG_UINT * bsize , SMB_BIG_UINT * dfree , SMB_BIG_UINT * dsize ) ;
1998-11-03 05:25:28 +03:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/nttrans.c */
1998-07-17 02:46:06 +04:00
1998-11-20 01:37:33 +03:00
void fail_next_srvsvc_open ( void ) ;
1998-08-14 21:38:29 +04:00
int reply_ntcreate_and_X ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_ntcancel ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_nttranss ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
1998-08-15 11:27:34 +04:00
void remove_pending_change_notify_requests_by_fid ( files_struct * fsp ) ;
1998-08-03 23:07:55 +04:00
void process_pending_change_notify_queue ( time_t t ) ;
1998-08-14 21:38:29 +04:00
int reply_nttrans ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
1998-07-17 02:46:06 +04:00
1998-08-17 17:11:34 +04:00
/*The following definitions come from smbd/open.c */
void fd_add_to_uid_cache ( file_fd_struct * fd_ptr , uid_t u ) ;
1999-04-04 11:24:14 +04:00
uint16 fd_attempt_close ( files_struct * fsp ) ;
void open_file_shared ( files_struct * fsp , connection_struct * conn ,
char * fname , int share_mode , int ofun ,
mode_t mode , int oplock_request , int * Access ,
int * action ) ;
1998-08-17 17:11:34 +04:00
int open_directory ( files_struct * fsp , connection_struct * conn ,
1998-09-18 03:06:57 +04:00
char * fname , int smb_ofun , mode_t unixmode , int * action ) ;
1998-08-17 17:11:34 +04:00
BOOL check_file_sharing ( connection_struct * conn , char * fname , BOOL rename_op ) ;
/*The following definitions come from smbd/oplock.c */
1998-12-07 23:23:41 +03:00
BOOL setup_kernel_oplock_pipe ( void ) ;
1998-08-17 17:11:34 +04:00
BOOL open_oplock_ipc ( void ) ;
1998-09-23 05:48:45 +04:00
BOOL receive_local_message ( fd_set * fds , char * buffer , int buffer_len , int timeout ) ;
BOOL set_file_oplock ( files_struct * fsp ) ;
int setup_oplock_select_set ( fd_set * fds ) ;
BOOL process_local_message ( char * buffer , int buf_size ) ;
1998-08-17 17:11:34 +04:00
BOOL request_oplock_break ( share_mode_entry * share_entry ,
1998-09-01 00:20:54 +04:00
SMB_DEV_T dev , SMB_INO_T inode ) ;
1998-08-17 17:11:34 +04:00
BOOL attempt_close_oplocked_file ( files_struct * fsp ) ;
1998-09-23 05:48:45 +04:00
void check_kernel_oplocks ( void ) ;
1998-08-17 17:11:34 +04:00
1998-08-09 18:58:51 +04:00
/*The following definitions come from smbd/password.c */
void generate_next_challenge ( char * challenge ) ;
1998-09-29 01:43:48 +04:00
BOOL set_challenge ( unsigned char * challenge ) ;
1998-08-09 18:58:51 +04:00
user_struct * get_valid_user_struct ( uint16 vuid ) ;
void invalidate_vuid ( uint16 vuid ) ;
char * validated_username ( uint16 vuid ) ;
1999-03-25 16:54:31 +03:00
uint16 register_vuid ( uid_t uid , gid_t gid , char * unix_name , char * requested_name , BOOL guest , uchar user_sess_key [ 16 ] ) ;
1998-08-09 18:58:51 +04:00
void add_session_user ( char * user ) ;
1998-10-19 21:32:10 +04:00
BOOL smb_password_ok ( struct smb_passwd * smb_pass , uchar chal [ 8 ] ,
1999-06-29 22:47:06 +04:00
const char * user , const char * domain ,
uchar * lm_pass , size_t lm_pwd_len ,
1999-11-21 22:59:56 +03:00
uchar * nt_pass , size_t nt_pwd_len ,
uchar sess_key [ 16 ] ) ;
1999-11-21 20:11:00 +03:00
BOOL pass_check_smb ( struct smb_passwd * smb_pass , char * domain , uchar * chal ,
1999-06-29 22:47:06 +04:00
uchar * lm_pwd , size_t lm_pwd_len ,
uchar * nt_pwd , size_t nt_pwd_len ,
1999-03-25 16:54:31 +03:00
struct passwd * pwd , uchar user_sess_key [ 16 ] ) ;
BOOL password_ok ( char * user , char * password , int pwlen , struct passwd * pwd ,
uchar user_sess_key [ 16 ] ) ;
1998-08-09 18:58:51 +04:00
BOOL user_ok ( char * user , int snum ) ;
BOOL authorise_login ( int snum , char * user , char * password , int pwlen ,
BOOL * guest , BOOL * force , uint16 vuid ) ;
BOOL check_hosts_equiv ( char * user ) ;
struct cli_state * server_client ( void ) ;
struct cli_state * server_cryptkey ( void ) ;
BOOL server_validate ( char * user , char * domain ,
char * pass , int passlen ,
char * ntpass , int ntpasslen ) ;
1999-11-20 23:54:29 +03:00
BOOL domain_client_validate ( char * user , char * domain , char * server_list ,
char * acct_name , uint16 acct_type ,
1999-11-21 20:27:20 +03:00
char * smb_apasswd , int smb_apasslen ,
char * smb_ntpasswd , int smb_ntpasslen ,
uchar user_sess_key [ 16 ] ) ;
1998-08-09 18:58:51 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/pipes.c */
1998-05-08 20:49:10 +04:00
1998-08-14 21:38:29 +04:00
int reply_open_pipe_and_X ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
1999-11-16 01:11:10 +03:00
int reply_pipe_write ( char * inbuf , char * outbuf , int length , int bufsize ) ;
1998-10-07 19:22:49 +04:00
int reply_pipe_write_and_X ( char * inbuf , char * outbuf , int length , int bufsize ) ;
1998-05-08 20:49:10 +04:00
int reply_pipe_read_and_X ( char * inbuf , char * outbuf , int length , int bufsize ) ;
1998-08-14 21:38:29 +04:00
int reply_pipe_close ( connection_struct * conn , char * inbuf , char * outbuf ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/predict.c */
1998-05-08 20:49:10 +04:00
1999-04-04 11:24:14 +04:00
ssize_t read_predict ( files_struct * fsp , int fd , SMB_OFF_T offset , char * buf , char * * ptr , size_t num ) ;
void do_read_prediction ( connection_struct * conn ) ;
1998-05-08 20:49:10 +04:00
void invalidate_read_prediction ( int fd ) ;
1998-08-17 17:11:34 +04:00
/*The following definitions come from smbd/process.c */
1998-09-23 05:48:45 +04:00
BOOL push_oplock_pending_smb_message ( char * buf , int msg_len ) ;
BOOL receive_next_smb ( char * inbuf , int bufsize , int timeout ) ;
1998-08-17 17:11:34 +04:00
void process_smb ( char * inbuf , char * outbuf ) ;
char * smb_fn_name ( int type ) ;
void construct_reply_common ( char * inbuf , char * outbuf ) ;
1998-08-20 23:28:37 +04:00
int chain_reply ( char * inbuf , char * outbuf , int size , int bufsize ) ;
1998-08-17 17:11:34 +04:00
void smbd_process ( void ) ;
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/reply.c */
1998-05-08 20:49:10 +04:00
int reply_special ( char * inbuf , char * outbuf ) ;
1998-08-14 21:38:29 +04:00
int reply_tcon ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_tcon_and_X ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
1998-05-08 20:49:10 +04:00
int reply_unknown ( char * inbuf , char * outbuf ) ;
1998-08-14 21:38:29 +04:00
int reply_ioctl ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_sesssetup_and_X ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_chkpth ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_getatr ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_setatr ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_dskattr ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_search ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_fclose ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_open ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_open_and_X ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_ulogoffX ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_mknew ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_ctemp ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_unlink ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_readbraw ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
1998-08-20 23:28:37 +04:00
int reply_lockread ( connection_struct * conn , char * inbuf , char * outbuf , int length , int dum_buffsiz ) ;
1998-08-14 21:38:29 +04:00
int reply_read ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_read_and_X ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_writebraw ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_writeunlock ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_write ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_write_and_X ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_lseek ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_flush ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_exit ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_close ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_writeclose ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_lock ( connection_struct * conn ,
1998-08-20 23:28:37 +04:00
char * inbuf , char * outbuf , int length , int dum_buffsize ) ;
1998-08-14 21:38:29 +04:00
int reply_unlock ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_tdis ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_echo ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_printopen ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_printclose ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_printqueue ( connection_struct * conn ,
char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_printwrite ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_mkdir ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_rmdir ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int rename_internals ( connection_struct * conn ,
char * inbuf , char * outbuf , char * name ,
char * newname , BOOL replace_if_exists ) ;
int reply_mv ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_copy ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_setdir ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_lockingX ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_readbmpx ( connection_struct * conn , char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_writebmpx ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_writebs ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_setattrE ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
int reply_getattrE ( connection_struct * conn , char * inbuf , char * outbuf , int dum_size , int dum_buffsize ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/server.c */
1998-05-08 20:49:10 +04:00
1998-08-17 17:11:34 +04:00
BOOL reload_services ( BOOL test ) ;
void exit_server ( char * reason ) ;
/*The following definitions come from smbd/service.c */
1998-08-14 21:38:29 +04:00
BOOL become_service ( connection_struct * conn , BOOL do_chdir ) ;
1998-05-08 20:49:10 +04:00
int find_service ( char * service ) ;
1998-08-14 21:38:29 +04:00
connection_struct * make_connection ( char * service , char * user , char * password , int pwlen , char * dev , uint16 vuid , int * ecode ) ;
void close_cnum ( connection_struct * conn , uint16 vuid ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/ssl.c */
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
int sslutil_init ( int isServer ) ;
int sslutil_accept ( int fd ) ;
int sslutil_fd_is_ssl ( int fd ) ;
int sslutil_connect ( int fd ) ;
int sslutil_disconnect ( int fd ) ;
int sslutil_negotiate_ssl ( int fd , int msg_type ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/trans2.c */
1998-05-08 20:49:10 +04:00
1998-07-29 04:27:23 +04:00
void mask_convert ( char * mask ) ;
1998-08-14 21:38:29 +04:00
int reply_findclose ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_findnclose ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_transs2 ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
int reply_trans2 ( connection_struct * conn ,
char * inbuf , char * outbuf , int length , int bufsize ) ;
1998-05-08 20:49:10 +04:00
1998-08-09 17:25:34 +04:00
/*The following definitions come from smbd/uid.c */
1998-05-08 20:49:10 +04:00
void init_uid ( void ) ;
BOOL become_guest ( void ) ;
1998-08-14 21:38:29 +04:00
BOOL become_user ( connection_struct * conn , uint16 vuid ) ;
1998-05-08 20:49:10 +04:00
BOOL unbecome_user ( void ) ;
void become_root ( BOOL save_dir ) ;
void unbecome_root ( BOOL restore_dir ) ;
1998-08-09 18:37:32 +04:00
1999-04-04 11:24:14 +04:00
/*The following definitions come from smbd/vfs-wrap.c */
1999-04-20 07:44:06 +04:00
int vfswrap_dummy_connect ( struct vfs_connection_struct * conn , char * service ,
char * user ) ;
void vfswrap_dummy_disconnect ( void ) ;
1999-04-04 11:24:14 +04:00
SMB_BIG_UINT vfswrap_disk_free ( char * path , SMB_BIG_UINT * bsize ,
SMB_BIG_UINT * dfree , SMB_BIG_UINT * dsize ) ;
DIR * vfswrap_opendir ( char * fname ) ;
struct dirent * vfswrap_readdir ( DIR * dirp ) ;
int vfswrap_mkdir ( char * path , mode_t mode ) ;
int vfswrap_rmdir ( char * path ) ;
1999-04-08 07:13:33 +04:00
int vfswrap_closedir ( DIR * dirp ) ;
1999-04-04 11:24:14 +04:00
int vfswrap_open ( char * fname , int flags , mode_t mode ) ;
int vfswrap_close ( int fd ) ;
ssize_t vfswrap_read ( int fd , char * data , size_t n ) ;
ssize_t vfswrap_write ( int fd , char * data , size_t n ) ;
SMB_OFF_T vfswrap_lseek ( int filedes , SMB_OFF_T offset , int whence ) ;
int vfswrap_rename ( char * old , char * new ) ;
1999-04-20 07:44:06 +04:00
void vfswrap_sync_file ( int fd ) ;
1999-04-04 11:24:14 +04:00
int vfswrap_stat ( char * fname , SMB_STRUCT_STAT * sbuf ) ;
int vfswrap_fstat ( int fd , SMB_STRUCT_STAT * sbuf ) ;
int vfswrap_lstat ( char * path ,
SMB_STRUCT_STAT * sbuf ) ;
BOOL vfswrap_fcntl_lock ( int fd , int op , SMB_OFF_T offset , SMB_OFF_T count ,
int type ) ;
int vfswrap_unlink ( char * path ) ;
int vfswrap_chmod ( char * path , mode_t mode ) ;
int vfswrap_utime ( char * path , struct utimbuf * times ) ;
/*The following definitions come from smbd/vfs.c */
int vfs_init_default ( connection_struct * conn ) ;
1999-04-20 07:44:06 +04:00
BOOL vfs_init_custom ( connection_struct * conn ) ;
1999-04-04 11:24:14 +04:00
BOOL vfs_file_exist ( connection_struct * conn , char * fname , SMB_STRUCT_STAT * sbuf ) ;
ssize_t vfs_write_data ( files_struct * fsp , char * buffer , size_t N ) ;
SMB_OFF_T vfs_transfer_file ( int in_fd , files_struct * in_fsp ,
int out_fd , files_struct * out_fsp ,
SMB_OFF_T n , char * header , int headlen , int align ) ;
char * vfs_readdirname ( connection_struct * conn , void * p ) ;
1998-10-05 16:17:01 +04:00
/*The following definitions come from smbwrapper/realcalls.c */
int real_utime ( const char * name , struct utimbuf * buf ) ;
int real_utimes ( const char * name , struct timeval tv [ 2 ] ) ;
1998-10-19 05:05:49 +04:00
/*The following definitions come from smbwrapper/shared.c */
void smbw_setup_shared ( void ) ;
char * smbw_getshared ( const char * name ) ;
void smbw_setshared ( const char * name , const char * val ) ;
1998-10-20 10:43:59 +04:00
int smbw_setenv ( const char * name , const char * value ) ;
1998-10-24 10:36:22 +04:00
int smbw_shared_fd ( int fd ) ;
1998-10-19 05:05:49 +04:00
1998-10-04 08:33:56 +04:00
/*The following definitions come from smbwrapper/smbw.c */
void smbw_init ( void ) ;
int smbw_fd ( int fd ) ;
1998-10-24 10:36:22 +04:00
int smbw_local_fd ( int fd ) ;
1998-10-04 08:33:56 +04:00
ino_t smbw_inode ( const char * name ) ;
void clean_fname ( char * name ) ;
char * smbw_parse_path ( const char * fname , char * server , char * share , char * path ) ;
int smbw_path ( const char * path ) ;
int smbw_errno ( struct cli_state * c ) ;
struct smbw_server * smbw_server ( char * server , char * share ) ;
struct smbw_file * smbw_file ( int fd ) ;
int smbw_open ( const char * fname , int flags , mode_t mode ) ;
1998-10-05 16:17:01 +04:00
ssize_t smbw_pread ( int fd , void * buf , size_t count , off_t ofs ) ;
1998-10-04 08:33:56 +04:00
ssize_t smbw_read ( int fd , void * buf , size_t count ) ;
ssize_t smbw_write ( int fd , void * buf , size_t count ) ;
1998-10-05 16:17:01 +04:00
ssize_t smbw_pwrite ( int fd , void * buf , size_t count , off_t ofs ) ;
1998-10-04 08:33:56 +04:00
int smbw_close ( int fd ) ;
int smbw_fcntl ( int fd , int cmd , long arg ) ;
int smbw_access ( const char * name , int mode ) ;
int smbw_readlink ( const char * path , char * buf , size_t bufsize ) ;
int smbw_unlink ( const char * fname ) ;
int smbw_rename ( const char * oldname , const char * newname ) ;
int smbw_utime ( const char * fname , void * buf ) ;
1998-10-05 16:17:01 +04:00
int smbw_utimes ( const char * fname , void * buf ) ;
1998-10-04 08:33:56 +04:00
int smbw_chown ( const char * fname , uid_t owner , gid_t group ) ;
int smbw_chmod ( const char * fname , mode_t newmode ) ;
off_t smbw_lseek ( int fd , off_t offset , int whence ) ;
1998-10-04 13:42:51 +04:00
int smbw_dup ( int fd ) ;
int smbw_dup2 ( int fd , int fd2 ) ;
1998-10-07 02:03:04 +04:00
int smbw_fork ( void ) ;
1998-10-04 08:33:56 +04:00
/*The following definitions come from smbwrapper/smbw_dir.c */
struct smbw_dir * smbw_dir ( int fd ) ;
int smbw_dirp ( DIR * dirp ) ;
int smbw_dir_open ( const char * fname ) ;
int smbw_dir_fstat ( int fd , struct stat * st ) ;
int smbw_dir_close ( int fd ) ;
int smbw_getdents ( unsigned int fd , struct dirent * dirp , int count ) ;
int smbw_chdir ( const char * name ) ;
off_t smbw_dir_lseek ( int fd , off_t offset , int whence ) ;
int smbw_mkdir ( const char * fname , mode_t mode ) ;
int smbw_rmdir ( const char * fname ) ;
char * smbw_getcwd ( char * buf , size_t size ) ;
int smbw_fchdir ( unsigned int fd ) ;
DIR * smbw_opendir ( const char * fname ) ;
struct dirent * smbw_readdir ( DIR * dirp ) ;
int smbw_closedir ( DIR * dirp ) ;
void smbw_seekdir ( DIR * dirp , off_t offset ) ;
off_t smbw_telldir ( DIR * dirp ) ;
/*The following definitions come from smbwrapper/smbw_stat.c */
void smbw_setup_stat ( struct stat * st , char * fname , size_t size , int mode ) ;
BOOL smbw_getatr ( struct smbw_server * srv , char * path ,
1998-11-09 23:33:37 +03:00
uint16 * mode , size_t * size ,
1998-10-24 12:08:05 +04:00
time_t * c_time , time_t * a_time , time_t * m_time ,
SMB_INO_T * ino ) ;
1998-10-04 13:42:51 +04:00
int smbw_stat_printjob ( struct smbw_server * srv , char * path ,
size_t * size , time_t * m_time ) ;
1998-10-04 08:33:56 +04:00
int smbw_fstat ( int fd , struct stat * st ) ;
int smbw_stat ( const char * fname , struct stat * st ) ;
1998-08-09 18:37:32 +04:00
/*The following definitions come from web/cgi.c */
void cgi_load_variables ( FILE * f1 ) ;
char * cgi_variable ( char * name ) ;
1998-11-12 02:47:03 +03:00
BOOL am_root ( void ) ;
1998-11-14 05:29:38 +03:00
char * cgi_user_name ( void ) ;
1998-08-09 18:37:32 +04:00
void cgi_setup ( char * rootdir , int auth_required ) ;
char * cgi_baseurl ( void ) ;
char * cgi_pathinfo ( void ) ;
char * cgi_remote_host ( void ) ;
char * cgi_remote_addr ( void ) ;
BOOL cgi_waspost ( void ) ;
/*The following definitions come from web/diagnose.c */
BOOL nmbd_running ( void ) ;
BOOL smbd_running ( void ) ;
/*The following definitions come from web/startstop.c */
void start_smbd ( void ) ;
void start_nmbd ( void ) ;
void stop_smbd ( void ) ;
void stop_nmbd ( void ) ;
1998-09-29 01:43:48 +04:00
void kill_pid ( pid_t pid ) ;
1998-08-09 18:37:32 +04:00
/*The following definitions come from web/statuspage.c */
void status_page ( void ) ;
/*The following definitions come from web/swat.c */
1998-06-08 23:38:57 +04:00
# endif /* _PROTO_H_ */