2001-01-03 08:19:21 +03:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2001-01-03 08:19:21 +03:00
client dgram calls
Copyright ( C ) Andrew Tridgell 1994 - 1998
Copyright ( C ) Richard Sharpe 2001
Copyright ( C ) John Terpstra 2001
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2001-01-03 08:19:21 +03:00
( at your option ) any later version .
2011-01-01 17:13:30 +03:00
2001-01-03 08:19:21 +03:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2011-01-01 17:13:30 +03:00
2001-01-03 08:19:21 +03:00
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2001-01-03 08:19:21 +03:00
*/
# include "includes.h"
2011-05-06 13:47:43 +04:00
# include "libsmb/libsmb.h"
2011-04-28 19:38:09 +04:00
# include "../lib/util/tevent_ntstatus.h"
2010-05-18 21:40:31 +04:00
# include "libsmb/clidgram.h"
2011-03-23 16:18:59 +03:00
# include "libsmb/nmblib.h"
2018-01-15 18:12:15 +03:00
# include "libsmb/unexpected.h"
2011-03-24 17:31:06 +03:00
# include "messages.h"
2011-11-02 23:07:42 +04:00
# include "librpc/gen_ndr/samr.h"
2012-07-20 03:36:18 +04:00
# include "../lib/util/pidfile.h"
2001-01-03 08:19:21 +03:00
/*
* cli_send_mailslot , send a mailslot for client code . . .
*/
2011-01-01 17:29:11 +03:00
static bool cli_prep_mailslot ( bool unique , const char * mailslot ,
2015-05-10 02:59:45 +03:00
uint16_t priority ,
2005-06-09 02:10:34 +04:00
char * buf , int len ,
2007-10-25 01:16:54 +04:00
const char * srcname , int src_type ,
2005-06-09 02:10:34 +04:00
const char * dstname , int dest_type ,
2010-11-14 07:32:36 +03:00
const struct sockaddr_storage * dest_ss ,
2011-01-01 17:29:11 +03:00
int dgm_id ,
struct packet_struct * p )
2001-01-03 08:19:21 +03:00
{
2011-01-01 17:29:11 +03:00
struct dgram_packet * dgram = & p - > packet . dgram ;
2005-06-09 02:10:34 +04:00
char * ptr , * p2 ;
char tmp [ 4 ] ;
2007-10-25 01:16:54 +04:00
char addr [ INET6_ADDRSTRLEN ] ;
2005-06-09 02:10:34 +04:00
2011-01-01 17:29:11 +03:00
ZERO_STRUCTP ( p ) ;
2005-06-09 02:10:34 +04:00
/*
* Next , build the DGRAM . . .
*/
/* DIRECT GROUP or UNIQUE datagram. */
2007-10-25 01:16:54 +04:00
dgram - > header . msg_type = unique ? 0x10 : 0x11 ;
2005-06-09 02:10:34 +04:00
dgram - > header . flags . node_type = M_NODE ;
dgram - > header . flags . first = True ;
dgram - > header . flags . more = False ;
2010-11-14 07:32:36 +03:00
dgram - > header . dgm_id = dgm_id ;
2005-06-09 02:10:34 +04:00
/* source ip is filled by nmbd */
dgram - > header . dgm_length = 0 ; /* Let build_dgram() handle this. */
dgram - > header . packet_offset = 0 ;
2007-10-25 01:16:54 +04:00
2005-06-09 02:10:34 +04:00
make_nmb_name ( & dgram - > source_name , srcname , src_type ) ;
make_nmb_name ( & dgram - > dest_name , dstname , dest_type ) ;
ptr = & dgram - > data [ 0 ] ;
/* Setup the smb part. */
ptr - = 4 ; /* XXX Ugliness because of handling of tcp SMB length. */
memcpy ( tmp , ptr , 4 ) ;
2007-12-14 03:44:24 +03:00
if ( smb_size + 17 * 2 + strlen ( mailslot ) + 1 + len > MAX_DGRAM_SIZE ) {
DEBUG ( 0 , ( " cli_send_mailslot: Cannot write beyond end of packet \n " ) ) ;
return False ;
}
2007-12-27 04:12:36 +03:00
cli_set_message ( ptr , 17 , strlen ( mailslot ) + 1 + len , True ) ;
2005-06-09 02:10:34 +04:00
memcpy ( ptr , tmp , 4 ) ;
SCVAL ( ptr , smb_com , SMBtrans ) ;
SSVAL ( ptr , smb_vwv1 , len ) ;
SSVAL ( ptr , smb_vwv11 , len ) ;
SSVAL ( ptr , smb_vwv12 , 70 + strlen ( mailslot ) ) ;
SSVAL ( ptr , smb_vwv13 , 3 ) ;
SSVAL ( ptr , smb_vwv14 , 1 ) ;
SSVAL ( ptr , smb_vwv15 , priority ) ;
SSVAL ( ptr , smb_vwv16 , 2 ) ;
p2 = smb_buf ( ptr ) ;
fstrcpy ( p2 , mailslot ) ;
2007-04-03 00:10:21 +04:00
p2 = skip_string ( ptr , MAX_DGRAM_SIZE , p2 ) ;
2007-03-31 02:25:08 +04:00
if ( ! p2 ) {
return False ;
}
2005-06-09 02:10:34 +04:00
memcpy ( p2 , buf , len ) ;
p2 + = len ;
dgram - > datasize = PTR_DIFF ( p2 , ptr + 4 ) ; /* +4 for tcp length. */
2011-01-01 17:29:11 +03:00
p - > packet_type = DGRAM_PACKET ;
p - > ip = ( ( const struct sockaddr_in * ) dest_ss ) - > sin_addr ;
p - > timestamp = time ( NULL ) ;
2005-06-09 02:10:34 +04:00
DEBUG ( 4 , ( " send_mailslot: Sending to mailslot %s from %s " ,
mailslot , nmb_namestr ( & dgram - > source_name ) ) ) ;
2007-10-25 01:16:54 +04:00
print_sockaddr ( addr , sizeof ( addr ) , dest_ss ) ;
DEBUGADD ( 4 , ( " to %s IP %s \n " , nmb_namestr ( & dgram - > dest_name ) , addr ) ) ;
2005-06-09 02:10:34 +04:00
2011-01-01 17:29:11 +03:00
return true ;
2001-01-03 08:19:21 +03:00
}
2008-04-17 01:52:34 +04:00
2011-01-02 07:57:09 +03:00
static char * mailslot_name ( TALLOC_CTX * mem_ctx , struct in_addr dc_ip )
2008-04-17 01:52:34 +04:00
{
2008-04-21 12:55:23 +04:00
return talloc_asprintf ( mem_ctx , " %s%X " ,
NBT_MAILSLOT_GETDC , dc_ip . s_addr ) ;
2008-04-17 01:52:34 +04:00
}
2011-01-01 18:18:48 +03:00
static bool prep_getdc_request ( const struct sockaddr_storage * dc_ss ,
2018-03-10 20:06:03 +03:00
const char * account_name ,
uint32_t account_flags ,
2011-01-01 18:18:48 +03:00
const char * domain_name ,
const struct dom_sid * sid ,
uint32_t nt_version ,
2011-01-02 14:42:47 +03:00
const char * my_mailslot ,
2011-01-01 18:18:48 +03:00
int dgm_id ,
struct packet_struct * p )
2008-04-17 01:52:34 +04:00
{
2011-01-01 18:18:48 +03:00
TALLOC_CTX * frame = talloc_stackframe ( ) ;
2008-09-24 00:21:52 +04:00
struct nbt_netlogon_packet packet ;
struct NETLOGON_SAM_LOGON_REQUEST * s ;
2008-04-21 12:55:23 +04:00
enum ndr_err_code ndr_err ;
2011-01-01 18:18:48 +03:00
DATA_BLOB blob = data_blob_null ;
2008-04-21 12:55:23 +04:00
struct dom_sid my_sid ;
2011-01-01 18:18:48 +03:00
bool ret = false ;
2008-04-17 01:52:34 +04:00
2011-01-01 17:29:11 +03:00
ZERO_STRUCT ( packet ) ;
ZERO_STRUCT ( my_sid ) ;
2011-01-01 18:18:48 +03:00
if ( sid ! = NULL ) {
2008-04-21 12:55:23 +04:00
my_sid = * sid ;
}
2008-04-17 01:52:34 +04:00
2008-09-24 00:21:52 +04:00
packet . command = LOGON_SAM_LOGON_REQUEST ;
2008-04-21 12:55:23 +04:00
s = & packet . req . logon ;
s - > request_count = 0 ;
2011-06-09 09:31:03 +04:00
s - > computer_name = lp_netbios_name ( ) ;
2018-03-10 20:06:03 +03:00
s - > user_name = account_name ;
2008-04-21 12:55:23 +04:00
s - > mailslot_name = my_mailslot ;
2018-03-10 20:06:03 +03:00
s - > acct_control = account_flags ;
2008-04-21 12:55:23 +04:00
s - > sid = my_sid ;
2008-04-24 23:28:03 +04:00
s - > nt_version = nt_version ;
2008-04-21 12:55:23 +04:00
s - > lmnt_token = 0xffff ;
s - > lm20_token = 0xffff ;
if ( DEBUGLEVEL > = 10 ) {
2008-09-24 00:21:52 +04:00
NDR_PRINT_DEBUG ( nbt_netlogon_packet , & packet ) ;
2008-04-17 01:52:34 +04:00
}
2011-01-01 18:18:48 +03:00
ndr_err = ndr_push_struct_blob ( & blob , talloc_tos ( ) , & packet ,
2008-09-24 00:21:52 +04:00
( ndr_push_flags_fn_t ) ndr_push_nbt_netlogon_packet ) ;
2008-04-21 12:55:23 +04:00
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2011-01-01 18:18:48 +03:00
goto fail ;
}
ret = cli_prep_mailslot ( false , NBT_MAILSLOT_NTLOGON , 0 ,
( char * ) blob . data , blob . length ,
2011-06-09 09:31:03 +04:00
lp_netbios_name ( ) , 0 , domain_name , 0x1c ,
2011-01-01 18:18:48 +03:00
dc_ss , dgm_id , p ) ;
fail :
TALLOC_FREE ( frame ) ;
return ret ;
}
2011-01-02 16:43:18 +03:00
static bool parse_getdc_response (
struct packet_struct * packet ,
TALLOC_CTX * mem_ctx ,
const char * domain_name ,
uint32_t * nt_version ,
const char * * dc_name ,
struct netlogon_samlogon_response * * samlogon_response )
2008-04-17 01:52:34 +04:00
{
2008-04-21 12:55:23 +04:00
DATA_BLOB blob ;
2011-01-02 16:43:18 +03:00
struct netlogon_samlogon_response * r ;
2008-04-21 12:55:23 +04:00
union dgram_message_body p ;
enum ndr_err_code ndr_err ;
2008-09-24 00:21:52 +04:00
NTSTATUS status ;
2008-04-17 01:52:34 +04:00
2008-04-24 23:29:48 +04:00
const char * returned_dc = NULL ;
const char * returned_domain = NULL ;
2008-04-21 12:55:23 +04:00
blob = data_blob_const ( packet - > packet . dgram . data ,
packet - > packet . dgram . datasize ) ;
if ( blob . length < 4 ) {
2011-01-02 16:43:18 +03:00
DEBUG ( 1 , ( " invalid length: %d \n " , ( int ) blob . length ) ) ;
return false ;
2008-04-17 01:52:34 +04:00
}
2008-04-21 12:55:23 +04:00
if ( RIVAL ( blob . data , 0 ) ! = DGRAM_SMB ) {
2011-01-02 16:43:18 +03:00
DEBUG ( 1 , ( " invalid packet \n " ) ) ;
return false ;
2008-04-21 12:55:23 +04:00
}
blob . data + = 4 ;
blob . length - = 4 ;
2010-05-10 02:42:06 +04:00
ndr_err = ndr_pull_union_blob_all ( & blob , mem_ctx , & p , DGRAM_SMB ,
2008-04-21 12:55:23 +04:00
( ndr_pull_flags_fn_t ) ndr_pull_dgram_smb_packet ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2011-01-02 16:43:18 +03:00
DEBUG ( 1 , ( " failed to parse packet \n " ) ) ;
return false ;
2008-04-21 12:55:23 +04:00
}
if ( p . smb . smb_command ! = SMB_TRANSACTION ) {
2011-01-02 16:43:18 +03:00
DEBUG ( 1 , ( " invalid smb_command: %d \n " , p . smb . smb_command ) ) ;
return false ;
2008-04-21 12:55:23 +04:00
}
2008-05-07 20:57:43 +04:00
if ( DEBUGLEVEL > = 10 ) {
NDR_PRINT_DEBUG ( dgram_smb_packet , & p ) ;
}
2008-04-21 12:55:23 +04:00
blob = p . smb . body . trans . data ;
2011-06-07 05:44:43 +04:00
r = talloc_zero ( mem_ctx , struct netlogon_samlogon_response ) ;
2008-12-03 12:40:04 +03:00
if ( ! r ) {
2011-01-02 16:43:18 +03:00
return false ;
2008-12-03 12:40:04 +03:00
}
2008-09-24 00:21:52 +04:00
2011-01-06 04:12:00 +03:00
status = pull_netlogon_samlogon_response ( & blob , r , r ) ;
2008-09-24 00:21:52 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-01-02 16:43:18 +03:00
TALLOC_FREE ( r ) ;
return false ;
2008-04-21 12:55:23 +04:00
}
2008-12-03 12:40:04 +03:00
map_netlogon_samlogon_response ( r ) ;
2008-09-24 00:21:52 +04:00
/* do we still need this ? */
2008-12-03 12:40:04 +03:00
* nt_version = r - > ntver ;
2008-09-24 00:21:52 +04:00
2008-12-03 12:40:04 +03:00
returned_domain = r - > data . nt5_ex . domain_name ;
returned_dc = r - > data . nt5_ex . pdc_name ;
2008-04-24 23:29:48 +04:00
if ( ! strequal ( returned_domain , domain_name ) ) {
2008-04-21 12:55:23 +04:00
DEBUG ( 3 , ( " GetDC: Expected domain %s, got %s \n " ,
2008-04-24 23:29:48 +04:00
domain_name , returned_domain ) ) ;
2011-01-02 16:43:18 +03:00
TALLOC_FREE ( r ) ;
return false ;
2008-04-21 12:55:23 +04:00
}
2011-01-02 16:43:18 +03:00
if ( * returned_dc = = ' \\ ' ) returned_dc + = 1 ;
if ( * returned_dc = = ' \\ ' ) returned_dc + = 1 ;
2008-04-24 23:29:48 +04:00
* dc_name = talloc_strdup ( mem_ctx , returned_dc ) ;
2008-04-21 12:55:23 +04:00
if ( ! * dc_name ) {
2011-01-02 16:43:18 +03:00
TALLOC_FREE ( r ) ;
return false ;
2008-04-17 01:52:34 +04:00
}
2008-12-03 12:40:04 +03:00
if ( samlogon_response ) {
* samlogon_response = r ;
} else {
TALLOC_FREE ( r ) ;
2008-04-24 23:37:42 +04:00
}
2008-04-17 01:52:34 +04:00
DEBUG ( 10 , ( " GetDC gave name %s for domain %s \n " ,
2008-04-24 23:29:48 +04:00
* dc_name , returned_domain ) ) ;
2008-04-17 01:52:34 +04:00
return True ;
2011-01-02 16:43:18 +03:00
}
2011-01-02 07:57:09 +03:00
2011-01-02 14:49:08 +03:00
struct nbt_getdc_state {
struct tevent_context * ev ;
struct messaging_context * msg_ctx ;
struct nb_packet_reader * reader ;
const char * my_mailslot ;
pid_t nmbd_pid ;
const struct sockaddr_storage * dc_addr ;
const char * domain_name ;
const struct dom_sid * sid ;
uint32_t nt_version ;
const char * dc_name ;
struct netlogon_samlogon_response * samlogon_response ;
struct packet_struct p ;
} ;
static void nbt_getdc_got_reader ( struct tevent_req * subreq ) ;
static void nbt_getdc_got_response ( struct tevent_req * subreq ) ;
struct tevent_req * nbt_getdc_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct messaging_context * msg_ctx ,
const struct sockaddr_storage * dc_addr ,
const char * domain_name ,
const struct dom_sid * sid ,
2018-03-10 20:06:03 +03:00
const char * account_name ,
uint32_t account_flags ,
2011-01-02 14:49:08 +03:00
uint32_t nt_version )
{
struct tevent_req * req , * subreq ;
struct nbt_getdc_state * state ;
uint16_t dgm_id ;
2018-03-10 20:01:08 +03:00
bool ok ;
2011-01-02 14:49:08 +03:00
req = tevent_req_create ( mem_ctx , & state , struct nbt_getdc_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > ev = ev ;
state - > msg_ctx = msg_ctx ;
state - > dc_addr = dc_addr ;
state - > domain_name = domain_name ;
state - > sid = sid ;
state - > nt_version = nt_version ;
if ( dc_addr - > ss_family ! = AF_INET ) {
tevent_req_nterror ( req , NT_STATUS_NOT_SUPPORTED ) ;
return tevent_req_post ( req , ev ) ;
}
state - > my_mailslot = mailslot_name (
2011-05-06 00:42:05 +04:00
state , ( ( const struct sockaddr_in * ) dc_addr ) - > sin_addr ) ;
2011-01-02 14:49:08 +03:00
if ( tevent_req_nomem ( state - > my_mailslot , req ) ) {
return tevent_req_post ( req , ev ) ;
}
2014-02-03 06:57:21 +04:00
state - > nmbd_pid = pidfile_pid ( lp_pid_directory ( ) , " nmbd " ) ;
2011-01-02 14:49:08 +03:00
if ( state - > nmbd_pid = = 0 ) {
DEBUG ( 3 , ( " No nmbd found \n " ) ) ;
tevent_req_nterror ( req , NT_STATUS_NOT_SUPPORTED ) ;
return tevent_req_post ( req , ev ) ;
}
generate_random_buffer ( ( uint8_t * ) ( void * ) & dgm_id , sizeof ( dgm_id ) ) ;
2018-03-10 20:06:03 +03:00
ok = prep_getdc_request ( dc_addr , account_name , account_flags ,
domain_name , sid , nt_version ,
state - > my_mailslot , dgm_id & 0x7fff ,
& state - > p ) ;
2018-03-10 20:06:03 +03:00
2018-03-10 20:01:08 +03:00
if ( ! ok ) {
2011-01-02 14:49:08 +03:00
DEBUG ( 3 , ( " prep_getdc_request failed \n " ) ) ;
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER ) ;
return tevent_req_post ( req , ev ) ;
}
subreq = nb_packet_reader_send ( state , ev , DGRAM_PACKET , - 1 ,
state - > my_mailslot ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
tevent_req_set_callback ( subreq , nbt_getdc_got_reader , req ) ;
return req ;
}
static void nbt_getdc_got_reader ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data (
subreq , struct tevent_req ) ;
struct nbt_getdc_state * state = tevent_req_data (
req , struct nbt_getdc_state ) ;
NTSTATUS status ;
status = nb_packet_reader_recv ( subreq , state , & state - > reader ) ;
TALLOC_FREE ( subreq ) ;
if ( tevent_req_nterror ( req , status ) ) {
DEBUG ( 10 , ( " nb_packet_reader_recv returned %s \n " ,
nt_errstr ( status ) ) ) ;
return ;
}
status = messaging_send_buf (
state - > msg_ctx , pid_to_procid ( state - > nmbd_pid ) ,
MSG_SEND_PACKET , ( uint8_t * ) & state - > p , sizeof ( state - > p ) ) ;
if ( tevent_req_nterror ( req , status ) ) {
DEBUG ( 10 , ( " messaging_send_buf returned %s \n " ,
nt_errstr ( status ) ) ) ;
return ;
}
subreq = nb_packet_read_send ( state , state - > ev , state - > reader ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return ;
}
tevent_req_set_callback ( subreq , nbt_getdc_got_response , req ) ;
}
static void nbt_getdc_got_response ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data (
subreq , struct tevent_req ) ;
struct nbt_getdc_state * state = tevent_req_data (
req , struct nbt_getdc_state ) ;
struct packet_struct * p ;
NTSTATUS status ;
bool ret ;
2018-01-16 17:50:19 +03:00
status = nb_packet_read_recv ( subreq , state , & p ) ;
2011-01-02 14:49:08 +03:00
TALLOC_FREE ( subreq ) ;
if ( tevent_req_nterror ( req , status ) ) {
return ;
}
ret = parse_getdc_response ( p , state , state - > domain_name ,
& state - > nt_version , & state - > dc_name ,
& state - > samlogon_response ) ;
if ( ! ret ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_NETWORK_RESPONSE ) ;
return ;
}
tevent_req_done ( req ) ;
}
NTSTATUS nbt_getdc_recv ( struct tevent_req * req , TALLOC_CTX * mem_ctx ,
uint32_t * nt_version , const char * * dc_name ,
struct netlogon_samlogon_response * * samlogon_response )
{
struct nbt_getdc_state * state = tevent_req_data (
req , struct nbt_getdc_state ) ;
NTSTATUS status ;
if ( tevent_req_is_nterror ( req , & status ) ) {
return status ;
}
if ( nt_version ! = NULL ) {
* nt_version = state - > nt_version ;
}
if ( dc_name ! = NULL ) {
* dc_name = talloc_move ( mem_ctx , & state - > dc_name ) ;
}
if ( samlogon_response ! = NULL ) {
* samlogon_response = talloc_move (
mem_ctx , & state - > samlogon_response ) ;
}
return NT_STATUS_OK ;
}
NTSTATUS nbt_getdc ( struct messaging_context * msg_ctx ,
2012-05-23 03:25:14 +04:00
uint32_t timeout_in_seconds ,
2011-01-02 14:49:08 +03:00
const struct sockaddr_storage * dc_addr ,
const char * domain_name ,
const struct dom_sid * sid ,
2018-03-10 20:06:03 +03:00
const char * account_name ,
uint32_t account_flags ,
2011-01-02 14:49:08 +03:00
uint32_t nt_version ,
TALLOC_CTX * mem_ctx ,
uint32_t * pnt_version ,
const char * * dc_name ,
struct netlogon_samlogon_response * * samlogon_response )
{
TALLOC_CTX * frame = talloc_stackframe ( ) ;
struct tevent_context * ev ;
struct tevent_req * req ;
NTSTATUS status = NT_STATUS_NO_MEMORY ;
2013-02-18 12:08:19 +04:00
ev = samba_tevent_context_init ( frame ) ;
2011-01-02 14:49:08 +03:00
if ( ev = = NULL ) {
goto fail ;
}
req = nbt_getdc_send ( ev , ev , msg_ctx , dc_addr , domain_name ,
2018-03-10 20:06:03 +03:00
sid , account_name , account_flags , nt_version ) ;
2011-01-02 14:49:08 +03:00
if ( req = = NULL ) {
goto fail ;
}
2012-05-23 03:25:14 +04:00
if ( ! tevent_req_set_endtime ( req , ev ,
timeval_current_ofs ( timeout_in_seconds , 0 ) ) ) {
goto fail ;
}
2011-01-02 14:49:08 +03:00
if ( ! tevent_req_poll_ntstatus ( req , ev , & status ) ) {
goto fail ;
}
status = nbt_getdc_recv ( req , mem_ctx , pnt_version , dc_name ,
samlogon_response ) ;
fail :
TALLOC_FREE ( frame ) ;
return status ;
}