2004-10-10 05:35:33 +04:00
/*
Unix SMB / CIFS implementation .
endpoint server for the drsuapi pipe
Copyright ( C ) Stefan Metzmacher 2004
2006-12-28 06:31:50 +03:00
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2006
2004-10-10 05:35:33 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 06:07:03 +04:00
the Free Software Foundation ; either version 3 of the License , or
2004-10-10 05:35:33 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 06:07:03 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2004-10-10 05:35:33 +04:00
*/
# include "includes.h"
2004-11-01 13:30:34 +03:00
# include "librpc/gen_ndr/ndr_drsuapi.h"
2004-11-02 10:42:47 +03:00
# include "rpc_server/dcerpc_server.h"
2004-10-10 05:35:33 +04:00
# include "rpc_server/common/common.h"
2005-12-28 18:38:36 +03:00
# include "dsdb/samdb/samdb.h"
2009-09-09 15:00:01 +04:00
# include "rpc_server/drsuapi/dcesrv_drsuapi.h"
2009-09-16 06:26:33 +04:00
# include "libcli/security/security.h"
2009-10-06 11:58:13 +04:00
# include "auth/auth.h"
2010-01-16 22:52:14 +03:00
# include "param/param.h"
2004-10-10 05:35:33 +04:00
2010-01-15 11:34:32 +03:00
# define DRSUAPI_UNSUPPORTED(fname) do { \
DEBUG ( 1 , ( __location__ " : Unsupported DRS call %s \n " , # fname ) ) ; \
if ( DEBUGLVL ( 2 ) ) NDR_PRINT_IN_DEBUG ( fname , r ) ; \
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ; \
} while ( 0 )
2004-10-10 05:35:33 +04:00
/*
drsuapi_DsBind
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsBind ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-10-10 05:35:33 +04:00
struct drsuapi_DsBind * r )
{
struct drsuapi_bind_state * b_state ;
struct dcesrv_handle * handle ;
2004-12-14 10:18:58 +03:00
struct drsuapi_DsBindInfoCtr * bind_info ;
struct GUID site_guid ;
2007-02-23 10:56:29 +03:00
struct ldb_result * site_res ;
struct ldb_dn * server_site_dn ;
2007-12-20 02:02:15 +03:00
static const char * site_attrs [ ] = { " objectGUID " , NULL } ;
2007-02-23 10:56:29 +03:00
struct ldb_result * ntds_res ;
struct ldb_dn * ntds_dn ;
2007-12-20 02:02:15 +03:00
static const char * ntds_attrs [ ] = { " ms-DS-ReplicationEpoch " , NULL } ;
2008-07-22 17:35:23 +04:00
uint32_t pid ;
2007-02-23 10:56:29 +03:00
uint32_t repl_epoch ;
int ret ;
2009-10-06 11:58:13 +04:00
struct auth_session_info * auth_info ;
WERROR werr ;
2004-10-10 05:35:33 +04:00
2004-10-14 15:11:21 +04:00
r - > out . bind_info = NULL ;
2004-10-10 05:35:33 +04:00
ZERO_STRUCTP ( r - > out . bind_handle ) ;
2007-02-23 10:56:29 +03:00
b_state = talloc_zero ( mem_ctx , struct drsuapi_bind_state ) ;
2006-04-29 15:48:56 +04:00
W_ERROR_HAVE_NO_MEMORY ( b_state ) ;
2004-10-10 05:35:33 +04:00
2009-10-06 11:58:13 +04:00
/* if this is a DC connecting, give them system level access */
werr = drs_security_level_check ( dce_call , NULL ) ;
if ( W_ERROR_IS_OK ( werr ) ) {
2010-01-09 13:43:16 +03:00
DEBUG ( 3 , ( __location__ " : doing DsBind with system_session \n " ) ) ;
2009-10-23 07:19:28 +04:00
auth_info = system_session ( dce_call - > conn - > dce_ctx - > lp_ctx ) ;
2009-10-06 11:58:13 +04:00
} else {
auth_info = dce_call - > conn - > auth_state . session_info ;
}
2007-02-23 10:56:29 +03:00
/*
* connect to the samdb
*/
2009-10-06 11:58:13 +04:00
b_state - > sam_ctx = samdb_connect ( b_state , dce_call - > event_ctx ,
dce_call - > conn - > dce_ctx - > lp_ctx , auth_info ) ;
2004-11-16 13:56:51 +03:00
if ( ! b_state - > sam_ctx ) {
return WERR_FOOBAR ;
}
2004-10-10 05:35:33 +04:00
2007-02-23 10:56:29 +03:00
/*
* find out the guid of our own site
*/
server_site_dn = samdb_server_site_dn ( b_state - > sam_ctx , mem_ctx ) ;
W_ERROR_HAVE_NO_MEMORY ( server_site_dn ) ;
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & site_res ,
2007-02-23 10:56:29 +03:00
server_site_dn , LDB_SCOPE_BASE , site_attrs ,
" (objectClass=*) " ) ;
if ( ret ! = LDB_SUCCESS ) {
return WERR_DS_DRA_INTERNAL_ERROR ;
}
if ( site_res - > count ! = 1 ) {
return WERR_DS_DRA_INTERNAL_ERROR ;
}
site_guid = samdb_result_guid ( site_res - > msgs [ 0 ] , " objectGUID " ) ;
/*
* lookup the local servers Replication Epoch
*/
ntds_dn = samdb_ntds_settings_dn ( b_state - > sam_ctx ) ;
W_ERROR_HAVE_NO_MEMORY ( ntds_dn ) ;
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & ntds_res ,
2007-02-23 10:56:29 +03:00
ntds_dn , LDB_SCOPE_BASE , ntds_attrs ,
" (objectClass=*) " ) ;
if ( ret ! = LDB_SUCCESS ) {
return WERR_DS_DRA_INTERNAL_ERROR ;
}
if ( ntds_res - > count ! = 1 ) {
return WERR_DS_DRA_INTERNAL_ERROR ;
}
repl_epoch = samdb_result_uint ( ntds_res - > msgs [ 0 ] , " ms-DS-ReplicationEpoch " , 0 ) ;
/*
2008-07-22 17:35:23 +04:00
* The " process identifier " of the client .
* According to the WSPP docs , sectin 5.35 , this is
* for informational and debugging purposes only .
* The assignment is implementation specific .
2007-02-23 10:56:29 +03:00
*/
2008-07-22 17:35:23 +04:00
pid = 0 ;
2007-02-23 10:56:29 +03:00
/*
* store the clients bind_guid
*/
if ( r - > in . bind_guid ) {
b_state - > remote_bind_guid = * r - > in . bind_guid ;
2004-10-10 05:35:33 +04:00
}
2007-02-23 10:56:29 +03:00
/*
* store the clients bind_info
*/
if ( r - > in . bind_info ) {
switch ( r - > in . bind_info - > length ) {
case 24 : {
struct drsuapi_DsBindInfo24 * info24 ;
info24 = & r - > in . bind_info - > info . info24 ;
b_state - > remote_info28 . supported_extensions = info24 - > supported_extensions ;
b_state - > remote_info28 . site_guid = info24 - > site_guid ;
2008-07-22 17:35:23 +04:00
b_state - > remote_info28 . pid = info24 - > pid ;
2007-02-23 10:56:29 +03:00
b_state - > remote_info28 . repl_epoch = 0 ;
break ;
}
case 28 :
b_state - > remote_info28 = r - > in . bind_info - > info . info28 ;
break ;
}
}
2004-10-10 05:35:33 +04:00
2007-02-23 10:56:29 +03:00
/*
* fill in our local bind info 28
*/
b_state - > local_info28 . supported_extensions = 0 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_BASE ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_ASYNC_REPLICATION ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_REMOVEAPI ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_MOVEREQ_V2 ;
#if 0 /* we don't support MSZIP compression (only decompression) */
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GETCHG_COMPRESS ;
# endif
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V1 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_RESTORE_USN_OPTIMIZATION ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_KCC_EXECUTE ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_ADDENTRY_V2 ;
2009-12-28 06:11:37 +03:00
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_LINKED_VALUE_REPLICATION ;
2007-02-23 10:56:29 +03:00
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V2 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_INSTANCE_TYPE_NOT_REQ_ON_MOD ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_CRYPTO_BIND ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GET_REPL_INFO ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_STRONG_ENCRYPTION ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V01 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_TRANSITIVE_MEMBERSHIP ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_ADD_SID_HISTORY ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_POST_BETA3 ;
2010-02-02 15:28:57 +03:00
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V5 ;
2007-02-23 10:56:29 +03:00
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GET_MEMBERSHIPS2 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V6 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_NONDOMAIN_NCS ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V8 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V5 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V6 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_ADDENTRYREPLY_V3 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V7 ;
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_VERIFY_OBJECT ;
#if 0 /* we don't support XPRESS compression yet */
b_state - > local_info28 . supported_extensions | = DRSUAPI_SUPPORTED_EXTENSION_XPRESS_COMPRESS ;
# endif
b_state - > local_info28 . site_guid = site_guid ;
2008-07-22 17:35:23 +04:00
b_state - > local_info28 . pid = pid ;
b_state - > local_info28 . repl_epoch = repl_epoch ;
2007-02-23 10:56:29 +03:00
/*
* allocate the return bind_info
*/
2005-01-27 10:08:20 +03:00
bind_info = talloc ( mem_ctx , struct drsuapi_DsBindInfoCtr ) ;
2006-04-29 15:48:56 +04:00
W_ERROR_HAVE_NO_MEMORY ( bind_info ) ;
2004-12-14 10:18:58 +03:00
2007-02-23 10:56:29 +03:00
bind_info - > length = 28 ;
bind_info - > info . info28 = b_state - > local_info28 ;
2004-12-14 10:18:58 +03:00
2007-02-23 10:56:29 +03:00
/*
* allocate a bind handle
*/
handle = dcesrv_handle_new ( dce_call - > context , DRSUAPI_BIND_HANDLE ) ;
W_ERROR_HAVE_NO_MEMORY ( handle ) ;
handle - > data = talloc_steal ( handle , b_state ) ;
2004-11-29 14:13:56 +03:00
2007-02-23 10:56:29 +03:00
/*
* prepare reply
*/
2004-11-29 14:13:56 +03:00
r - > out . bind_info = bind_info ;
2004-10-10 05:35:33 +04:00
* r - > out . bind_handle = handle - > wire_handle ;
2004-10-15 15:08:14 +04:00
return WERR_OK ;
2004-10-10 05:35:33 +04:00
}
/*
drsuapi_DsUnbind
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsUnbind ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-01-10 15:15:26 +03:00
struct drsuapi_DsUnbind * r )
2004-10-10 05:35:33 +04:00
{
struct dcesrv_handle * h ;
* r - > out . bind_handle = * r - > in . bind_handle ;
2004-10-15 15:08:14 +04:00
DCESRV_PULL_HANDLE_WERR ( h , r - > in . bind_handle , DRSUAPI_BIND_HANDLE ) ;
2004-10-10 05:35:33 +04:00
2005-01-10 15:15:26 +03:00
talloc_free ( h ) ;
2004-10-10 05:35:33 +04:00
ZERO_STRUCTP ( r - > out . bind_handle ) ;
2004-10-15 15:08:14 +04:00
return WERR_OK ;
2004-10-10 05:35:33 +04:00
}
/*
2004-11-29 14:13:56 +03:00
drsuapi_DsReplicaSync
2004-10-10 05:35:33 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsReplicaSync ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2009-09-09 12:04:07 +04:00
struct drsuapi_DsReplicaSync * r )
2004-10-10 05:35:33 +04:00
{
2009-09-20 02:08:19 +04:00
WERROR status ;
status = drs_security_level_check ( dce_call , " DsReplicaSync " ) ;
if ( ! W_ERROR_IS_OK ( status ) ) {
return status ;
2009-09-09 12:04:07 +04:00
}
2009-09-16 07:51:10 +04:00
dcesrv_irpc_forward_rpc_call ( dce_call , mem_ctx , r , NDR_DRSUAPI_DSREPLICASYNC ,
& ndr_table_drsuapi ,
" dreplsrv " , " DsReplicaSync " ) ;
2009-09-20 02:08:19 +04:00
2004-11-29 14:13:56 +03:00
return WERR_OK ;
2004-10-10 05:35:33 +04:00
}
2009-09-16 07:51:10 +04:00
2004-10-10 05:35:33 +04:00
/*
2009-09-11 14:14:11 +04:00
drsuapi_DsReplicaAdd
2004-10-10 05:35:33 +04:00
*/
2009-09-11 14:14:11 +04:00
static WERROR dcesrv_drsuapi_DsReplicaAdd ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct drsuapi_DsReplicaAdd * r )
2004-10-10 05:35:33 +04:00
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( drsuapi_DsReplicaAdd ) ;
2004-10-10 05:35:33 +04:00
}
/*
2009-09-11 14:14:11 +04:00
drsuapi_DsReplicaDel
2004-10-10 05:35:33 +04:00
*/
2009-09-11 14:14:11 +04:00
static WERROR dcesrv_drsuapi_DsReplicaDel ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct drsuapi_DsReplicaDel * r )
2004-10-10 05:35:33 +04:00
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( drsuapi_DsReplicaDel ) ;
2004-10-10 05:35:33 +04:00
}
/*
2009-09-11 14:14:11 +04:00
drsuapi_DsReplicaModify
2004-10-10 05:35:33 +04:00
*/
2009-09-11 14:14:11 +04:00
static WERROR dcesrv_drsuapi_DsReplicaMod ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct drsuapi_DsReplicaMod * r )
2004-10-10 05:35:33 +04:00
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( drsuapi_DsReplicaMod ) ;
2004-10-10 05:35:33 +04:00
}
/*
DRSUAPI_VERIFY_NAMES
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_DRSUAPI_VERIFY_NAMES ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-10-10 05:35:33 +04:00
struct DRSUAPI_VERIFY_NAMES * r )
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( DRSUAPI_VERIFY_NAMES ) ;
2004-10-10 05:35:33 +04:00
}
/*
2006-07-04 14:25:04 +04:00
drsuapi_DsGetMemberships
2004-10-10 05:35:33 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsGetMemberships ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2006-07-04 14:25:04 +04:00
struct drsuapi_DsGetMemberships * r )
2004-10-10 05:35:33 +04:00
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( drsuapi_DsGetMemberships ) ;
2004-10-10 05:35:33 +04:00
}
/*
DRSUAPI_INTER_DOMAIN_MOVE
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_DRSUAPI_INTER_DOMAIN_MOVE ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-10-10 05:35:33 +04:00
struct DRSUAPI_INTER_DOMAIN_MOVE * r )
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( DRSUAPI_INTER_DOMAIN_MOVE ) ;
2004-10-10 05:35:33 +04:00
}
/*
2007-01-03 22:09:34 +03:00
drsuapi_DsGetNT4ChangeLog
2004-10-10 05:35:33 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsGetNT4ChangeLog ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2007-01-03 22:09:34 +03:00
struct drsuapi_DsGetNT4ChangeLog * r )
2004-10-10 05:35:33 +04:00
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( drsuapi_DsGetNT4ChangeLog ) ;
2004-10-10 05:35:33 +04:00
}
/*
2005-10-24 02:20:42 +04:00
drsuapi_DsCrackNames
2004-10-10 05:35:33 +04:00
*/
2008-10-20 20:59:51 +04:00
static WERROR dcesrv_drsuapi_DsCrackNames ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-10-24 02:20:42 +04:00
struct drsuapi_DsCrackNames * r )
{
WERROR status ;
struct drsuapi_bind_state * b_state ;
struct dcesrv_handle * h ;
2008-10-17 22:08:59 +04:00
* r - > out . level_out = r - > in . level ;
2005-10-24 02:20:42 +04:00
DCESRV_PULL_HANDLE_WERR ( h , r - > in . bind_handle , DRSUAPI_BIND_HANDLE ) ;
b_state = h - > data ;
2008-10-17 22:08:59 +04:00
r - > out . ctr = talloc_zero ( mem_ctx , union drsuapi_DsNameCtr ) ;
W_ERROR_HAVE_NO_MEMORY ( r - > out . ctr ) ;
2005-10-24 02:20:42 +04:00
switch ( r - > in . level ) {
case 1 : {
struct drsuapi_DsNameCtr1 * ctr1 ;
struct drsuapi_DsNameInfo1 * names ;
int count ;
int i ;
ctr1 = talloc ( mem_ctx , struct drsuapi_DsNameCtr1 ) ;
2006-04-29 15:48:56 +04:00
W_ERROR_HAVE_NO_MEMORY ( ctr1 ) ;
2005-10-24 02:20:42 +04:00
2008-10-17 22:08:59 +04:00
count = r - > in . req - > req1 . count ;
2005-10-24 02:20:42 +04:00
names = talloc_array ( mem_ctx , struct drsuapi_DsNameInfo1 , count ) ;
2006-04-29 15:48:56 +04:00
W_ERROR_HAVE_NO_MEMORY ( names ) ;
2005-10-24 02:20:42 +04:00
for ( i = 0 ; i < count ; i + + ) {
status = DsCrackNameOneName ( b_state - > sam_ctx , mem_ctx ,
2008-10-17 22:08:59 +04:00
r - > in . req - > req1 . format_flags ,
r - > in . req - > req1 . format_offered ,
r - > in . req - > req1 . format_desired ,
r - > in . req - > req1 . names [ i ] . str ,
2005-10-24 02:20:42 +04:00
& names [ i ] ) ;
if ( ! W_ERROR_IS_OK ( status ) ) {
return status ;
}
}
ctr1 - > count = count ;
ctr1 - > array = names ;
2008-10-17 22:08:59 +04:00
r - > out . ctr - > ctr1 = ctr1 ;
2005-10-24 02:20:42 +04:00
return WERR_OK ;
}
}
return WERR_UNKNOWN_LEVEL ;
}
2004-10-10 05:35:33 +04:00
/*
2006-11-22 21:40:27 +03:00
drsuapi_DsRemoveDSServer
2004-10-10 05:35:33 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsRemoveDSServer ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2006-11-22 21:40:27 +03:00
struct drsuapi_DsRemoveDSServer * r )
2004-10-10 05:35:33 +04:00
{
2008-10-02 13:28:13 +04:00
struct drsuapi_bind_state * b_state ;
struct dcesrv_handle * h ;
struct ldb_dn * ntds_dn ;
int ret ;
bool ok ;
2009-09-20 02:08:19 +04:00
WERROR status ;
2008-10-02 13:28:13 +04:00
2009-09-09 15:00:01 +04:00
* r - > out . level_out = 1 ;
2008-10-02 13:28:13 +04:00
2009-09-20 02:08:19 +04:00
status = drs_security_level_check ( dce_call , " DsRemoveDSServer " ) ;
if ( ! W_ERROR_IS_OK ( status ) ) {
return status ;
2009-09-16 06:26:33 +04:00
}
2008-10-02 13:28:13 +04:00
DCESRV_PULL_HANDLE_WERR ( h , r - > in . bind_handle , DRSUAPI_BIND_HANDLE ) ;
b_state = h - > data ;
switch ( r - > in . level ) {
case 1 :
ntds_dn = ldb_dn_new ( mem_ctx , b_state - > sam_ctx , r - > in . req - > req1 . server_dn ) ;
W_ERROR_HAVE_NO_MEMORY ( ntds_dn ) ;
ok = ldb_dn_validate ( ntds_dn ) ;
if ( ! ok ) {
return WERR_FOOBAR ;
}
/* TODO: it's likely that we need more checks here */
ok = ldb_dn_add_child_fmt ( ntds_dn , " CN=NTDS Settings " ) ;
if ( ! ok ) {
return WERR_FOOBAR ;
}
if ( r - > in . req - > req1 . commit ) {
ret = ldb_delete ( b_state - > sam_ctx , ntds_dn ) ;
if ( ret ! = LDB_SUCCESS ) {
return WERR_FOOBAR ;
}
}
return WERR_OK ;
default :
break ;
}
return WERR_FOOBAR ;
2004-10-10 05:35:33 +04:00
}
/*
DRSUAPI_REMOVE_DS_DOMAIN
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_DRSUAPI_REMOVE_DS_DOMAIN ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-10-10 05:35:33 +04:00
struct DRSUAPI_REMOVE_DS_DOMAIN * r )
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( DRSUAPI_REMOVE_DS_DOMAIN ) ;
2004-10-10 05:35:33 +04:00
}
2006-12-22 10:04:06 +03:00
/* Obtain the site name from a server DN */
2008-10-20 20:59:51 +04:00
static const char * result_site_name ( struct ldb_dn * site_dn )
2006-12-22 10:04:06 +03:00
{
/* Format is cn=<NETBIOS name>,cn=Servers,cn=<site>,cn=sites.... */
const struct ldb_val * val = ldb_dn_get_component_val ( site_dn , 2 ) ;
const char * name = ldb_dn_get_component_name ( site_dn , 2 ) ;
if ( ! name | | ( ldb_attr_cmp ( name , " cn " ) ! = 0 ) ) {
/* Ensure this matches the format. This gives us a
* bit more confidence that a ' cn ' value will be a
* ascii string */
return NULL ;
}
if ( val ) {
return ( char * ) val - > data ;
}
return NULL ;
}
/*
drsuapi_DsGetDomainControllerInfo
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsGetDomainControllerInfo_1 ( struct drsuapi_bind_state * b_state ,
2006-12-22 10:04:06 +03:00
TALLOC_CTX * mem_ctx ,
struct drsuapi_DsGetDomainControllerInfo * r )
{
struct ldb_dn * sites_dn ;
struct ldb_result * res ;
const char * attrs_account_1 [ ] = { " cn " , " dnsHostName " , NULL } ;
const char * attrs_account_2 [ ] = { " cn " , " dnsHostName " , " objectGUID " , NULL } ;
const char * attrs_none [ ] = { NULL } ;
const char * attrs_site [ ] = { " objectGUID " , NULL } ;
const char * attrs_ntds [ ] = { " options " , " objectGUID " , NULL } ;
const char * attrs_1 [ ] = { " serverReference " , " cn " , " dnsHostName " , NULL } ;
const char * attrs_2 [ ] = { " serverReference " , " cn " , " dnsHostName " , " objectGUID " , NULL } ;
const char * * attrs ;
struct drsuapi_DsGetDCInfoCtr1 * ctr1 ;
struct drsuapi_DsGetDCInfoCtr2 * ctr2 ;
2009-11-21 20:57:24 +03:00
int ret ;
unsigned int i ;
2006-12-22 10:04:06 +03:00
2008-10-17 21:10:22 +04:00
* r - > out . level_out = r - > in . req - > req1 . level ;
r - > out . ctr = talloc ( mem_ctx , union drsuapi_DsGetDCInfoCtr ) ;
W_ERROR_HAVE_NO_MEMORY ( r - > out . ctr ) ;
2006-12-22 10:04:06 +03:00
2007-02-15 14:57:23 +03:00
sites_dn = samdb_sites_dn ( b_state - > sam_ctx , mem_ctx ) ;
2006-12-22 10:04:06 +03:00
if ( ! sites_dn ) {
return WERR_DS_OBJ_NOT_FOUND ;
}
2008-10-17 21:10:22 +04:00
switch ( * r - > out . level_out ) {
2006-12-22 10:04:06 +03:00
case - 1 :
2006-12-27 05:01:38 +03:00
/* this level is not like the others */
return WERR_UNKNOWN_LEVEL ;
2006-12-22 10:04:06 +03:00
case 1 :
attrs = attrs_1 ;
break ;
case 2 :
attrs = attrs_2 ;
break ;
default :
return WERR_UNKNOWN_LEVEL ;
}
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & res , sites_dn , LDB_SCOPE_SUBTREE , attrs ,
2006-12-22 10:04:06 +03:00
" objectClass=server " ) ;
if ( ret ) {
2007-04-23 11:26:08 +04:00
DEBUG ( 1 , ( " searching for servers in sites DN %s failed: %s \n " ,
ldb_dn_get_linearized ( sites_dn ) , ldb_errstring ( b_state - > sam_ctx ) ) ) ;
2006-12-22 10:04:06 +03:00
return WERR_GENERAL_FAILURE ;
}
2008-10-17 21:10:22 +04:00
switch ( * r - > out . level_out ) {
2006-12-22 10:04:06 +03:00
case 1 :
2008-10-17 21:10:22 +04:00
ctr1 = & r - > out . ctr - > ctr1 ;
2006-12-22 10:04:06 +03:00
ctr1 - > count = res - > count ;
ctr1 - > array = talloc_zero_array ( mem_ctx ,
struct drsuapi_DsGetDCInfo1 ,
res - > count ) ;
for ( i = 0 ; i < res - > count ; i + + ) {
struct ldb_dn * domain_dn ;
struct ldb_result * res_domain ;
struct ldb_result * res_account ;
2007-08-06 07:01:59 +04:00
struct ldb_dn * ntds_dn = ldb_dn_copy ( mem_ctx , res - > msgs [ i ] - > dn ) ;
2006-12-22 10:04:06 +03:00
struct ldb_dn * ref_dn
= ldb_msg_find_attr_as_dn ( b_state - > sam_ctx ,
mem_ctx , res - > msgs [ i ] ,
" serverReference " ) ;
if ( ! ntds_dn | | ! ldb_dn_add_child_fmt ( ntds_dn , " CN=NTDS Settings " ) ) {
return WERR_NOMEM ;
}
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & res_account , ref_dn ,
2006-12-22 10:04:06 +03:00
LDB_SCOPE_BASE , attrs_account_1 , " objectClass=computer " ) ;
2007-04-23 11:26:08 +04:00
if ( ret = = LDB_SUCCESS & & res_account - > count = = 1 ) {
2007-11-14 00:38:55 +03:00
const char * errstr ;
2006-12-22 10:04:06 +03:00
ctr1 - > array [ i ] . dns_name
= ldb_msg_find_attr_as_string ( res_account - > msgs [ 0 ] , " dNSHostName " , NULL ) ;
ctr1 - > array [ i ] . netbios_name
= ldb_msg_find_attr_as_string ( res_account - > msgs [ 0 ] , " cn " , NULL ) ;
ctr1 - > array [ i ] . computer_dn
= ldb_dn_get_linearized ( res_account - > msgs [ 0 ] - > dn ) ;
/* Determine if this is the PDC */
2007-11-14 00:38:55 +03:00
ret = samdb_search_for_parent_domain ( b_state - > sam_ctx ,
mem_ctx , res_account - > msgs [ 0 ] - > dn ,
& domain_dn , & errstr ) ;
2006-12-22 10:04:06 +03:00
2007-11-14 00:38:55 +03:00
if ( ret = = LDB_SUCCESS ) {
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & res_domain , domain_dn ,
2006-12-22 10:04:06 +03:00
LDB_SCOPE_BASE , attrs_none , " fSMORoleOwner=%s " ,
ldb_dn_get_linearized ( ntds_dn ) ) ;
if ( ret ) {
return WERR_GENERAL_FAILURE ;
}
if ( res_domain - > count = = 1 ) {
2007-10-07 02:25:41 +04:00
ctr1 - > array [ i ] . is_pdc = true ;
2006-12-22 10:04:06 +03:00
}
}
}
2007-04-23 11:26:08 +04:00
if ( ( ret ! = LDB_SUCCESS ) & & ( ret ! = LDB_ERR_NO_SUCH_OBJECT ) ) {
DEBUG ( 5 , ( " warning: searching for computer DN %s failed: %s \n " ,
ldb_dn_get_linearized ( ref_dn ) , ldb_errstring ( b_state - > sam_ctx ) ) ) ;
}
2006-12-22 10:04:06 +03:00
/* Look at server DN and extract site component */
ctr1 - > array [ i ] . site_name = result_site_name ( res - > msgs [ i ] - > dn ) ;
ctr1 - > array [ i ] . server_dn = ldb_dn_get_linearized ( res - > msgs [ i ] - > dn ) ;
2007-10-07 02:25:41 +04:00
ctr1 - > array [ i ] . is_enabled = true ;
2006-12-22 10:04:06 +03:00
}
break ;
case 2 :
2008-10-17 21:10:22 +04:00
ctr2 = & r - > out . ctr - > ctr2 ;
2006-12-22 10:04:06 +03:00
ctr2 - > count = res - > count ;
ctr2 - > array = talloc_zero_array ( mem_ctx ,
struct drsuapi_DsGetDCInfo2 ,
res - > count ) ;
for ( i = 0 ; i < res - > count ; i + + ) {
struct ldb_dn * domain_dn ;
struct ldb_result * res_domain ;
struct ldb_result * res_account ;
2007-08-06 07:01:59 +04:00
struct ldb_dn * ntds_dn = ldb_dn_copy ( mem_ctx , res - > msgs [ i ] - > dn ) ;
2006-12-22 10:04:06 +03:00
struct ldb_result * res_ntds ;
2007-08-06 07:01:59 +04:00
struct ldb_dn * site_dn = ldb_dn_copy ( mem_ctx , res - > msgs [ i ] - > dn ) ;
2006-12-22 10:04:06 +03:00
struct ldb_result * res_site ;
struct ldb_dn * ref_dn
= ldb_msg_find_attr_as_dn ( b_state - > sam_ctx ,
mem_ctx , res - > msgs [ i ] ,
" serverReference " ) ;
if ( ! ntds_dn | | ! ldb_dn_add_child_fmt ( ntds_dn , " CN=NTDS Settings " ) ) {
return WERR_NOMEM ;
}
/* Format is cn=<NETBIOS name>,cn=Servers,cn=<site>,cn=sites.... */
if ( ! site_dn | | ! ldb_dn_remove_child_components ( site_dn , 2 ) ) {
return WERR_NOMEM ;
}
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & res_ntds , ntds_dn ,
2006-12-22 10:04:06 +03:00
LDB_SCOPE_BASE , attrs_ntds , " objectClass=nTDSDSA " ) ;
2007-04-23 11:26:08 +04:00
if ( ret = = LDB_SUCCESS & & res_ntds - > count = = 1 ) {
2006-12-22 10:04:06 +03:00
ctr2 - > array [ i ] . is_gc
= ( ldb_msg_find_attr_as_int ( res_ntds - > msgs [ 0 ] , " options " , 0 ) = = 1 ) ;
ctr2 - > array [ i ] . ntds_guid
= samdb_result_guid ( res_ntds - > msgs [ 0 ] , " objectGUID " ) ;
ctr2 - > array [ i ] . ntds_dn = ldb_dn_get_linearized ( res_ntds - > msgs [ 0 ] - > dn ) ;
}
2007-04-23 11:26:08 +04:00
if ( ( ret ! = LDB_SUCCESS ) & & ( ret ! = LDB_ERR_NO_SUCH_OBJECT ) ) {
DEBUG ( 5 , ( " warning: searching for NTDS DN %s failed: %s \n " ,
ldb_dn_get_linearized ( ntds_dn ) , ldb_errstring ( b_state - > sam_ctx ) ) ) ;
}
2006-12-22 10:04:06 +03:00
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & res_site , site_dn ,
2006-12-22 10:04:06 +03:00
LDB_SCOPE_BASE , attrs_site , " objectClass=site " ) ;
2007-04-23 11:26:08 +04:00
if ( ret = = LDB_SUCCESS & & res_site - > count = = 1 ) {
2006-12-22 10:04:06 +03:00
ctr2 - > array [ i ] . site_guid
= samdb_result_guid ( res_site - > msgs [ 0 ] , " objectGUID " ) ;
ctr2 - > array [ i ] . site_dn = ldb_dn_get_linearized ( res_site - > msgs [ 0 ] - > dn ) ;
}
2007-04-23 11:26:08 +04:00
if ( ( ret ! = LDB_SUCCESS ) & & ( ret ! = LDB_ERR_NO_SUCH_OBJECT ) ) {
DEBUG ( 5 , ( " warning: searching for site DN %s failed: %s \n " ,
ldb_dn_get_linearized ( site_dn ) , ldb_errstring ( b_state - > sam_ctx ) ) ) ;
}
2006-12-22 10:04:06 +03:00
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & res_account , ref_dn ,
2006-12-22 10:04:06 +03:00
LDB_SCOPE_BASE , attrs_account_2 , " objectClass=computer " ) ;
2007-04-23 11:26:08 +04:00
if ( ret = = LDB_SUCCESS & & res_account - > count = = 1 ) {
2007-11-14 00:38:55 +03:00
const char * errstr ;
2006-12-22 10:04:06 +03:00
ctr2 - > array [ i ] . dns_name
= ldb_msg_find_attr_as_string ( res_account - > msgs [ 0 ] , " dNSHostName " , NULL ) ;
ctr2 - > array [ i ] . netbios_name
= ldb_msg_find_attr_as_string ( res_account - > msgs [ 0 ] , " cn " , NULL ) ;
ctr2 - > array [ i ] . computer_dn = ldb_dn_get_linearized ( res_account - > msgs [ 0 ] - > dn ) ;
ctr2 - > array [ i ] . computer_guid
= samdb_result_guid ( res_account - > msgs [ 0 ] , " objectGUID " ) ;
/* Determine if this is the PDC */
2007-11-14 00:38:55 +03:00
ret = samdb_search_for_parent_domain ( b_state - > sam_ctx ,
mem_ctx , res_account - > msgs [ 0 ] - > dn ,
& domain_dn , & errstr ) ;
2006-12-22 10:04:06 +03:00
2007-11-14 00:38:55 +03:00
if ( ret = = LDB_SUCCESS ) {
2008-09-23 22:30:06 +04:00
ret = ldb_search ( b_state - > sam_ctx , mem_ctx , & res_domain , domain_dn ,
2006-12-22 10:04:06 +03:00
LDB_SCOPE_BASE , attrs_none , " fSMORoleOwner=%s " ,
ldb_dn_get_linearized ( ntds_dn ) ) ;
2007-04-23 11:26:08 +04:00
if ( ret = = LDB_SUCCESS & & res_domain - > count = = 1 ) {
2007-10-07 02:25:41 +04:00
ctr2 - > array [ i ] . is_pdc = true ;
2006-12-22 10:04:06 +03:00
}
2007-04-23 11:26:08 +04:00
if ( ( ret ! = LDB_SUCCESS ) & & ( ret ! = LDB_ERR_NO_SUCH_OBJECT ) ) {
DEBUG ( 5 , ( " warning: searching for domain DN %s failed: %s \n " ,
ldb_dn_get_linearized ( domain_dn ) , ldb_errstring ( b_state - > sam_ctx ) ) ) ;
}
2006-12-22 10:04:06 +03:00
}
}
2007-04-23 11:26:08 +04:00
if ( ( ret ! = LDB_SUCCESS ) & & ( ret ! = LDB_ERR_NO_SUCH_OBJECT ) ) {
DEBUG ( 5 , ( " warning: searching for computer account DN %s failed: %s \n " ,
ldb_dn_get_linearized ( ref_dn ) , ldb_errstring ( b_state - > sam_ctx ) ) ) ;
}
2006-12-22 10:04:06 +03:00
/* Look at server DN and extract site component */
ctr2 - > array [ i ] . site_name = result_site_name ( res - > msgs [ i ] - > dn ) ;
ctr2 - > array [ i ] . server_dn = ldb_dn_get_linearized ( res - > msgs [ i ] - > dn ) ;
ctr2 - > array [ i ] . server_guid
= samdb_result_guid ( res - > msgs [ i ] , " objectGUID " ) ;
2007-10-07 02:25:41 +04:00
ctr2 - > array [ i ] . is_enabled = true ;
2006-12-22 10:04:06 +03:00
}
break ;
}
return WERR_OK ;
}
2004-10-10 05:35:33 +04:00
/*
2004-10-15 13:48:40 +04:00
drsuapi_DsGetDomainControllerInfo
2004-10-10 05:35:33 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsGetDomainControllerInfo ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-09-17 05:11:50 +04:00
struct drsuapi_DsGetDomainControllerInfo * r )
2004-10-10 05:35:33 +04:00
{
2006-12-22 10:04:06 +03:00
struct dcesrv_handle * h ;
struct drsuapi_bind_state * b_state ;
DCESRV_PULL_HANDLE_WERR ( h , r - > in . bind_handle , DRSUAPI_BIND_HANDLE ) ;
b_state = h - > data ;
switch ( r - > in . level ) {
case 1 :
2007-01-17 17:49:36 +03:00
return dcesrv_drsuapi_DsGetDomainControllerInfo_1 ( b_state , mem_ctx , r ) ;
2006-12-22 10:04:06 +03:00
}
return WERR_UNKNOWN_LEVEL ;
2004-10-10 05:35:33 +04:00
}
/*
2009-09-17 10:45:05 +04:00
drsuapi_DsExecuteKCC
2004-10-10 05:35:33 +04:00
*/
2009-09-17 10:45:05 +04:00
static WERROR dcesrv_drsuapi_DsExecuteKCC ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct drsuapi_DsExecuteKCC * r )
2004-10-10 05:35:33 +04:00
{
2009-11-11 23:25:13 +03:00
WERROR status ;
status = drs_security_level_check ( dce_call , " DsExecuteKCC " ) ;
if ( ! W_ERROR_IS_OK ( status ) ) {
return status ;
}
dcesrv_irpc_forward_rpc_call ( dce_call , mem_ctx , r , NDR_DRSUAPI_DSEXECUTEKCC ,
& ndr_table_drsuapi , " kccsrv " , " DsExecuteKCC " ) ;
return WERR_OK ;
2004-10-10 05:35:33 +04:00
}
/*
2004-12-07 15:20:28 +03:00
drsuapi_DsReplicaGetInfo
2004-10-10 05:35:33 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsReplicaGetInfo ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-12-07 15:20:28 +03:00
struct drsuapi_DsReplicaGetInfo * r )
2004-10-10 05:35:33 +04:00
{
2010-01-16 02:36:06 +03:00
enum security_user_level level ;
2010-01-15 11:36:16 +03:00
2010-01-16 22:52:14 +03:00
if ( ! lp_parm_bool ( dce_call - > conn - > dce_ctx - > lp_ctx , NULL ,
" drs " , " disable_sec_check " , false ) ) {
level = security_session_user_level ( dce_call - > conn - > auth_state . session_info ) ;
if ( level < SECURITY_ADMINISTRATOR ) {
DEBUG ( 1 , ( __location__ " : Administrator access required for DsReplicaGetInfo \n " ) ) ;
security_token_debug ( 2 , dce_call - > conn - > auth_state . session_info - > security_token ) ;
return WERR_DS_DRA_ACCESS_DENIED ;
}
2010-01-15 11:36:16 +03:00
}
dcesrv_irpc_forward_rpc_call ( dce_call , mem_ctx , r , NDR_DRSUAPI_DSREPLICAGETINFO ,
2010-01-16 02:36:06 +03:00
& ndr_table_drsuapi , " kccsrv " , " DsReplicaGetInfo " ) ;
2010-01-15 11:36:16 +03:00
return WERR_OK ;
2004-10-10 05:35:33 +04:00
}
/*
DRSUAPI_ADD_SID_HISTORY
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_DRSUAPI_ADD_SID_HISTORY ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-10-10 05:35:33 +04:00
struct DRSUAPI_ADD_SID_HISTORY * r )
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( DRSUAPI_ADD_SID_HISTORY ) ;
2004-10-10 05:35:33 +04:00
}
/*
2006-07-04 14:25:04 +04:00
drsuapi_DsGetMemberships2
2004-10-10 05:35:33 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_drsuapi_DsGetMemberships2 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2006-07-04 14:25:04 +04:00
struct drsuapi_DsGetMemberships2 * r )
2004-10-10 05:35:33 +04:00
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( drsuapi_DsGetMemberships2 ) ;
2004-10-10 05:35:33 +04:00
}
/*
DRSUAPI_REPLICA_VERIFY_OBJECTS
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_DRSUAPI_REPLICA_VERIFY_OBJECTS ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-10-10 05:35:33 +04:00
struct DRSUAPI_REPLICA_VERIFY_OBJECTS * r )
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( DRSUAPI_REPLICA_VERIFY_OBJECTS ) ;
2004-10-10 05:35:33 +04:00
}
/*
DRSUAPI_GET_OBJECT_EXISTENCE
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_DRSUAPI_GET_OBJECT_EXISTENCE ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-10-10 05:35:33 +04:00
struct DRSUAPI_GET_OBJECT_EXISTENCE * r )
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( DRSUAPI_GET_OBJECT_EXISTENCE ) ;
2004-10-10 05:35:33 +04:00
}
/*
2007-05-30 13:54:19 +04:00
drsuapi_QuerySitesByCost
2004-10-10 05:35:33 +04:00
*/
2007-05-30 13:54:19 +04:00
static WERROR dcesrv_drsuapi_QuerySitesByCost ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct drsuapi_QuerySitesByCost * r )
2004-10-10 05:35:33 +04:00
{
2010-01-15 11:34:32 +03:00
DRSUAPI_UNSUPPORTED ( drsuapi_QuerySitesByCost ) ;
2004-10-10 05:35:33 +04:00
}
/* include the generated boilerplate */
# include "librpc/gen_ndr/ndr_drsuapi_s.c"