1998-03-12 00:11:04 +03:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2002-08-17 20:05:44 +04:00
RPC pipe client
Copyright ( C ) Tim Potter 2000 - 2001 ,
Copyright ( C ) Andrew Tridgell 1992 - 1997 , 2000 ,
Copyright ( C ) Rafal Szczesniak 2002.
2005-09-30 21:13:37 +04:00
Copyright ( C ) Jeremy Allison 2005.
1998-03-12 00:11:04 +03:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
1998-03-12 00:11:04 +03:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
2002-08-17 20:05:44 +04:00
/* Connect to SAMR database */
2002-07-15 14:35:28 +04:00
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_connect ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
uint32 access_mask , POLICY_HND * connect_pol )
1998-12-03 23:50:33 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_CONNECT q ;
SAMR_R_CONNECT r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1998-03-12 00:11:04 +03:00
2005-06-09 02:10:34 +04:00
DEBUG ( 10 , ( " cli_samr_connect to %s \n " , cli - > cli - > desthost ) ) ;
2003-06-10 03:15:34 +04:00
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
2005-06-09 02:10:34 +04:00
init_samr_q_connect ( & q , cli - > cli - > desthost , access_mask ) ;
2002-08-17 20:05:44 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CONNECT ,
q , r ,
qbuf , rbuf ,
samr_io_q_connect ,
samr_io_r_connect ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* connect_pol = r . connect_pol ;
1998-03-12 00:11:04 +03:00
}
2002-08-17 20:05:44 +04:00
return result ;
1998-03-12 00:11:04 +03:00
}
2002-08-17 20:05:44 +04:00
/* Connect to SAMR database */
2001-03-11 03:32:10 +03:00
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_connect4 ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2002-08-17 20:05:44 +04:00
uint32 access_mask , POLICY_HND * connect_pol )
1999-02-24 04:52:30 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_CONNECT4 q ;
SAMR_R_CONNECT4 r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1999-02-24 04:52:30 +03:00
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1999-02-24 04:52:30 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
2005-09-30 21:13:37 +04:00
init_samr_q_connect4 ( & q , cli - > cli - > desthost , access_mask ) ;
2002-08-17 20:05:44 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CONNECT4 ,
q , r ,
qbuf , rbuf ,
samr_io_q_connect4 ,
samr_io_r_connect4 ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* connect_pol = r . connect_pol ;
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
}
2002-08-17 20:05:44 +04:00
return result ;
- lib/unix_sec_ctxt.c
attempt at taking lib/uid.c and getting a unix security context
change module that is independent of "cnums" and "snums".
a security context is needed for pipes, not just IPC$ or other
services.
- group database API
added add_group/alias_member, del_group/alias_member,
del_group/alias_entry functions. del_builtin_entry() is
deliberately set to NULL to cause an exception, you cannot
delete builtin aliases.
- parse_lsa.c srv_lsa.c
fixed lookup_names code, it was a load of trash and didn't do
anything.
- cmd_samr.c rpcclient.c srv_samr.c
added "deletegroup", "deletealias", "delaliasmem", "delgroupmem",
"addgroupmem", "addaliasmem", "createalias", "creategroup", to
both client and server code.
server code calls into unix stubs right now, which don't actually
do anything. the only instance where they are expected to do
anything is in appliance mode NOT even in the ldap code or anything.
client code modified to call samr_lookup_names() for group code
(because we can) and lsa_lookup_names() for alias code (because
we have to).
- srv_lookup.c
oops, lookup on unsplit name, we got lookup on DOMAIN, DOMAIN\name
instead of DOMAIN, name.
(This used to be commit b8175702ef61b8b37b078f38e81452c00a5e2986)
1998-12-07 20:23:48 +03:00
}
2002-08-17 20:05:44 +04:00
/* Close SAMR handle */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_close ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
POLICY_HND * connect_pol )
1998-03-12 00:11:04 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_CLOSE_HND q ;
SAMR_R_CLOSE_HND r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1998-03-12 00:11:04 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_close \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_close_hnd ( & q , connect_pol ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CLOSE_HND ,
q , r ,
qbuf , rbuf ,
samr_io_q_close_hnd ,
samr_io_r_close_hnd ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* connect_pol = r . pol ;
1999-12-13 16:27:58 +03:00
}
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
return result ;
}
/* Open handle on a domain */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_open_domain ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
POLICY_HND * connect_pol , uint32 access_mask ,
const DOM_SID * domain_sid ,
POLICY_HND * domain_pol )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_OPEN_DOMAIN q ;
SAMR_R_OPEN_DOMAIN r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_open_domain with sid %s \n " , sid_string_static ( domain_sid ) ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_open_domain ( & q , connect_pol , access_mask , domain_sid ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_OPEN_DOMAIN ,
q , r ,
qbuf , rbuf ,
samr_io_q_open_domain ,
samr_io_r_open_domain ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* domain_pol = r . domain_pol ;
1999-12-13 16:27:58 +03:00
}
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
return result ;
}
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_open_user ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol , uint32 access_mask ,
uint32 user_rid , POLICY_HND * user_pol )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_OPEN_USER q ;
SAMR_R_OPEN_USER r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_open_user with rid 0x%x \n " , user_rid ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_open_user ( & q , domain_pol , access_mask , user_rid ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_OPEN_USER ,
q , r ,
qbuf , rbuf ,
samr_io_q_open_user ,
samr_io_r_open_user ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* user_pol = r . user_pol ;
1999-12-13 16:27:58 +03:00
}
1999-10-21 20:53:50 +04:00
2002-08-17 20:05:44 +04:00
return result ;
}
/* Open handle on a group */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_open_group ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol , uint32 access_mask ,
uint32 group_rid , POLICY_HND * group_pol )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_OPEN_GROUP q ;
SAMR_R_OPEN_GROUP r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_open_group with rid 0x%x \n " , group_rid ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_open_group ( & q , domain_pol , access_mask , group_rid ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_OPEN_GROUP ,
q , r ,
qbuf , rbuf ,
samr_io_q_open_group ,
samr_io_r_open_group ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* group_pol = r . pol ;
1998-03-12 00:11:04 +03:00
}
2002-08-17 20:05:44 +04:00
return result ;
1998-03-12 00:11:04 +03:00
}
2004-02-24 21:00:41 +03:00
/* Create domain group */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_create_dom_group ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-24 21:00:41 +03:00
POLICY_HND * domain_pol ,
const char * group_name ,
uint32 access_mask , POLICY_HND * group_pol )
{
prs_struct qbuf , rbuf ;
SAMR_Q_CREATE_DOM_GROUP q ;
SAMR_R_CREATE_DOM_GROUP r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_create_dom_group \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_create_dom_group ( & q , domain_pol , group_name , access_mask ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CREATE_DOM_GROUP ,
q , r ,
qbuf , rbuf ,
samr_io_q_create_dom_group ,
samr_io_r_create_dom_group ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-24 21:00:41 +03:00
/* Return output parameters */
result = r . status ;
if ( NT_STATUS_IS_OK ( result ) )
* group_pol = r . pol ;
return result ;
}
2004-02-28 21:41:16 +03:00
/* Add a domain group member */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_add_groupmem ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-28 21:41:16 +03:00
POLICY_HND * group_pol , uint32 rid )
{
prs_struct qbuf , rbuf ;
SAMR_Q_ADD_GROUPMEM q ;
SAMR_R_ADD_GROUPMEM r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_add_groupmem \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_add_groupmem ( & q , group_pol , rid ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_ADD_GROUPMEM ,
q , r ,
qbuf , rbuf ,
samr_io_q_add_groupmem ,
samr_io_r_add_groupmem ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-28 21:41:16 +03:00
/* Return output parameters */
result = r . status ;
return result ;
}
/* Delete a domain group member */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_del_groupmem ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-28 21:41:16 +03:00
POLICY_HND * group_pol , uint32 rid )
{
prs_struct qbuf , rbuf ;
SAMR_Q_DEL_GROUPMEM q ;
SAMR_R_DEL_GROUPMEM r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_del_groupmem \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_del_groupmem ( & q , group_pol , rid ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_DEL_GROUPMEM ,
q , r ,
qbuf , rbuf ,
samr_io_q_del_groupmem ,
samr_io_r_del_groupmem ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-28 21:41:16 +03:00
/* Return output parameters */
result = r . status ;
return result ;
}
2002-08-17 20:05:44 +04:00
/* Query user info */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_query_userinfo ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
2006-02-04 01:19:41 +03:00
const POLICY_HND * user_pol ,
uint16 switch_value ,
2005-06-09 02:10:34 +04:00
SAM_USERINFO_CTR * * ctr )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_USERINFO q ;
SAMR_R_QUERY_USERINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_userinfo \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_query_userinfo ( & q , user_pol , switch_value ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_USERINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_userinfo ,
samr_io_r_query_userinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
2001-03-11 03:32:10 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
2001-03-11 03:32:10 +03:00
2002-08-17 20:05:44 +04:00
result = r . status ;
* ctr = r . ctr ;
return result ;
}
2004-02-24 21:00:41 +03:00
/* Set group info */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_set_groupinfo ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-24 21:00:41 +03:00
POLICY_HND * group_pol , GROUP_INFO_CTR * ctr )
{
prs_struct qbuf , rbuf ;
SAMR_Q_SET_GROUPINFO q ;
SAMR_R_SET_GROUPINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_set_groupinfo \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_set_groupinfo ( & q , group_pol , ctr ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_SET_GROUPINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_set_groupinfo ,
samr_io_r_set_groupinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-24 21:00:41 +03:00
/* Return output parameters */
result = r . status ;
return result ;
}
2002-08-17 20:05:44 +04:00
/* Query group info */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_query_groupinfo ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2002-08-17 20:05:44 +04:00
POLICY_HND * group_pol , uint32 info_level ,
2002-12-08 15:03:42 +03:00
GROUP_INFO_CTR * * ctr )
1998-12-04 19:30:00 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_GROUPINFO q ;
SAMR_R_QUERY_GROUPINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1998-12-04 19:30:00 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_groupinfo \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_query_groupinfo ( & q , group_pol , info_level ) ;
1998-12-04 19:30:00 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_GROUPINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_groupinfo ,
samr_io_r_query_groupinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
2002-12-08 15:03:42 +03:00
* ctr = r . ctr ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
result = r . status ;
return result ;
}
/* Query user groups */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_query_usergroups ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * user_pol ,
uint32 * num_groups ,
DOM_GID * * gid )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_USERGROUPS q ;
SAMR_R_QUERY_USERGROUPS r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_usergroups \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_query_usergroups ( & q , user_pol ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_USERGROUPS ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_usergroups ,
samr_io_r_query_usergroups ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* num_groups = r . num_entries ;
* gid = r . gid ;
1999-12-13 16:27:58 +03:00
}
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
return result ;
}
2004-02-28 21:41:16 +03:00
/* Set alias info */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_set_aliasinfo ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-28 21:41:16 +03:00
POLICY_HND * alias_pol , ALIAS_INFO_CTR * ctr )
{
prs_struct qbuf , rbuf ;
SAMR_Q_SET_ALIASINFO q ;
SAMR_R_SET_ALIASINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_set_aliasinfo \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_set_aliasinfo ( & q , alias_pol , ctr ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_SET_ALIASINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_set_aliasinfo ,
samr_io_r_set_aliasinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-28 21:41:16 +03:00
/* Return output parameters */
result = r . status ;
return result ;
}
2002-08-17 20:05:44 +04:00
/* Query user aliases */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_query_useraliases ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * dom_pol , uint32 num_sids ,
DOM_SID2 * sid ,
uint32 * num_aliases , uint32 * * als_rids )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_USERALIASES q ;
SAMR_R_QUERY_USERALIASES r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2005-01-15 12:15:28 +03:00
int i ;
uint32 * sid_ptrs ;
2002-08-17 20:05:44 +04:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_useraliases \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
2007-04-30 06:39:34 +04:00
if ( num_sids ) {
sid_ptrs = TALLOC_ARRAY ( mem_ctx , uint32 , num_sids ) ;
if ( sid_ptrs = = NULL )
return NT_STATUS_NO_MEMORY ;
} else {
sid_ptrs = NULL ;
}
2005-01-15 12:15:28 +03:00
for ( i = 0 ; i < num_sids ; i + + )
sid_ptrs [ i ] = 1 ;
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
2005-01-15 12:26:21 +03:00
init_samr_q_query_useraliases ( & q , dom_pol , num_sids , sid_ptrs , sid ) ;
2002-08-17 20:05:44 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_USERALIASES ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_useraliases ,
samr_io_r_query_useraliases ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* num_aliases = r . num_entries ;
* als_rids = r . rid ;
1998-12-04 19:30:00 +03:00
}
2002-08-17 20:05:44 +04:00
return result ;
1998-12-04 19:30:00 +03:00
}
2002-08-17 20:05:44 +04:00
/* Query user groups */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_query_groupmem ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * group_pol , uint32 * num_mem ,
uint32 * * rid , uint32 * * attr )
1998-11-29 23:03:33 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_GROUPMEM q ;
SAMR_R_QUERY_GROUPMEM r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1998-11-29 23:03:33 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_groupmem \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-12-03 23:50:33 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-11-29 23:03:33 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_query_groupmem ( & q , group_pol ) ;
1998-11-29 23:03:33 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_GROUPMEM ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_groupmem ,
samr_io_r_query_groupmem ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* num_mem = r . num_entries ;
* rid = r . rid ;
* attr = r . attr ;
1999-12-13 16:27:58 +03:00
}
1998-11-29 23:03:33 +03:00
2002-08-17 20:05:44 +04:00
return result ;
}
/**
* Enumerate domain users
*
* @ param cli client state structure
* @ param mem_ctx talloc context
* @ param pol opened domain policy handle
* @ param start_idx starting index of enumeration , returns context for
next enumeration
* @ param acb_mask account control bit mask ( to enumerate some particular
* kind of accounts )
* @ param size max acceptable size of response
* @ param dom_users returned array of domain user names
* @ param rids returned array of domain user RIDs
* @ param num_dom_users numer returned entries
*
* @ return NTSTATUS returned in rpc response
* */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_enum_dom_users ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2006-02-27 13:32:45 +03:00
POLICY_HND * pol , uint32 * start_idx , uint32 acb_mask ,
2002-08-17 20:05:44 +04:00
uint32 size , char * * * dom_users , uint32 * * rids ,
uint32 * num_dom_users )
{
2003-02-26 03:06:59 +03:00
prs_struct qbuf ;
prs_struct rbuf ;
2002-08-17 20:05:44 +04:00
SAMR_Q_ENUM_DOM_USERS q ;
SAMR_R_ENUM_DOM_USERS r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
int i ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_enum_dom_users starting at index %u \n " , ( unsigned int ) * start_idx ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
2003-04-24 17:55:51 +04:00
/* always init this */
* num_dom_users = 0 ;
2003-02-26 03:06:59 +03:00
/* Fill query structure with parameters */
2006-02-27 13:32:45 +03:00
init_samr_q_enum_dom_users ( & q , pol , * start_idx , acb_mask , size ) ;
2002-08-17 20:05:44 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_ENUM_DOM_USERS ,
q , r ,
qbuf , rbuf ,
samr_io_q_enum_dom_users ,
samr_io_r_enum_dom_users ,
NT_STATUS_UNSUCCESSFUL ) ;
2003-02-26 03:06:59 +03:00
result = r . status ;
if ( ! NT_STATUS_IS_OK ( result ) & &
NT_STATUS_V ( result ) ! = NT_STATUS_V ( STATUS_MORE_ENTRIES ) )
goto done ;
2002-08-17 20:05:44 +04:00
* start_idx = r . next_idx ;
* num_dom_users = r . num_entries2 ;
if ( r . num_entries2 ) {
/* allocate memory needed to return received data */
2004-12-07 21:25:53 +03:00
* rids = TALLOC_ARRAY ( mem_ctx , uint32 , r . num_entries2 ) ;
2002-08-17 20:05:44 +04:00
if ( ! * rids ) {
DEBUG ( 0 , ( " Error in cli_samr_enum_dom_users(): out of memory \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2004-12-07 21:25:53 +03:00
* dom_users = TALLOC_ARRAY ( mem_ctx , char * , r . num_entries2 ) ;
2002-08-17 20:05:44 +04:00
if ( ! * dom_users ) {
DEBUG ( 0 , ( " Error in cli_samr_enum_dom_users(): out of memory \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
/* fill output buffers with rpc response */
for ( i = 0 ; i < r . num_entries2 ; i + + ) {
fstring conv_buf ;
( * rids ) [ i ] = r . sam [ i ] . rid ;
unistr2_to_ascii ( conv_buf , & ( r . uni_acct_name [ i ] ) , sizeof ( conv_buf ) - 1 ) ;
( * dom_users ) [ i ] = talloc_strdup ( mem_ctx , conv_buf ) ;
}
}
2003-02-26 03:06:59 +03:00
done :
2002-08-17 20:05:44 +04:00
return result ;
2003-09-22 21:53:59 +04:00
}
1998-11-29 23:03:33 +03:00
2002-08-17 20:05:44 +04:00
/* Enumerate domain groups */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_enum_dom_groups ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * pol , uint32 * start_idx ,
uint32 size , struct acct_info * * dom_groups ,
uint32 * num_dom_groups )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_ENUM_DOM_GROUPS q ;
SAMR_R_ENUM_DOM_GROUPS r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
uint32 name_idx , i ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_enum_dom_groups starting at index %u \n " , ( unsigned int ) * start_idx ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_enum_dom_groups ( & q , pol , * start_idx , size ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_ENUM_DOM_GROUPS ,
q , r ,
qbuf , rbuf ,
samr_io_q_enum_dom_groups ,
samr_io_r_enum_dom_groups ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
result = r . status ;
if ( ! NT_STATUS_IS_OK ( result ) & &
NT_STATUS_V ( result ) ! = NT_STATUS_V ( STATUS_MORE_ENTRIES ) )
goto done ;
* num_dom_groups = r . num_entries2 ;
2003-04-25 06:02:01 +04:00
if ( * num_dom_groups = = 0 )
goto done ;
2004-12-07 21:25:53 +03:00
if ( ! ( ( * dom_groups ) = TALLOC_ARRAY ( mem_ctx , struct acct_info , * num_dom_groups ) ) ) {
2003-04-25 06:02:01 +04:00
result = NT_STATUS_NO_MEMORY ;
2002-08-17 20:05:44 +04:00
goto done ;
1999-12-13 16:27:58 +03:00
}
1998-11-29 23:03:33 +03:00
2003-04-25 06:02:01 +04:00
memset ( * dom_groups , 0 , sizeof ( struct acct_info ) * ( * num_dom_groups ) ) ;
2002-08-17 20:05:44 +04:00
name_idx = 0 ;
for ( i = 0 ; i < * num_dom_groups ; i + + ) {
( * dom_groups ) [ i ] . rid = r . sam [ i ] . rid ;
if ( r . sam [ i ] . hdr_name . buffer ) {
unistr2_to_ascii ( ( * dom_groups ) [ i ] . acct_name ,
& r . uni_grp_name [ name_idx ] ,
sizeof ( fstring ) - 1 ) ;
name_idx + + ;
}
* start_idx = r . next_idx ;
1998-11-29 23:03:33 +03:00
}
2002-08-17 20:05:44 +04:00
done :
return result ;
1998-11-29 23:03:33 +03:00
}
2002-08-17 20:05:44 +04:00
/* Enumerate domain groups */
2001-03-11 03:32:10 +03:00
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_enum_als_groups ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * pol , uint32 * start_idx ,
uint32 size , struct acct_info * * dom_aliases ,
uint32 * num_dom_aliases )
1998-12-04 19:30:00 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_ENUM_DOM_ALIASES q ;
SAMR_R_ENUM_DOM_ALIASES r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
uint32 name_idx , i ;
1998-12-04 19:30:00 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_enum_als_groups starting at index %u \n " , ( unsigned int ) * start_idx ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_enum_dom_aliases ( & q , pol , * start_idx , size ) ;
1998-12-04 19:30:00 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_ENUM_DOM_ALIASES ,
q , r ,
qbuf , rbuf ,
samr_io_q_enum_dom_aliases ,
samr_io_r_enum_dom_aliases ,
NT_STATUS_UNSUCCESSFUL ) ;
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
result = r . status ;
1999-12-13 16:27:58 +03:00
2002-08-17 20:05:44 +04:00
if ( ! NT_STATUS_IS_OK ( result ) & &
NT_STATUS_V ( result ) ! = NT_STATUS_V ( STATUS_MORE_ENTRIES ) ) {
goto done ;
1999-12-13 16:27:58 +03:00
}
2003-04-25 06:02:01 +04:00
* num_dom_aliases = r . num_entries2 ;
2002-08-17 20:05:44 +04:00
2003-04-25 06:02:01 +04:00
if ( * num_dom_aliases = = 0 )
goto done ;
2004-12-07 21:25:53 +03:00
if ( ! ( ( * dom_aliases ) = TALLOC_ARRAY ( mem_ctx , struct acct_info , * num_dom_aliases ) ) ) {
2003-04-25 06:02:01 +04:00
result = NT_STATUS_NO_MEMORY ;
2002-08-17 20:05:44 +04:00
goto done ;
1999-12-13 16:27:58 +03:00
}
2003-04-25 06:02:01 +04:00
memset ( * dom_aliases , 0 , sizeof ( struct acct_info ) * * num_dom_aliases ) ;
2002-08-17 20:05:44 +04:00
name_idx = 0 ;
2003-04-25 06:02:01 +04:00
for ( i = 0 ; i < * num_dom_aliases ; i + + ) {
1998-12-04 19:30:00 +03:00
2003-04-25 06:02:01 +04:00
( * dom_aliases ) [ i ] . rid = r . sam [ i ] . rid ;
2002-08-17 20:05:44 +04:00
if ( r . sam [ i ] . hdr_name . buffer ) {
2003-04-25 06:02:01 +04:00
unistr2_to_ascii ( ( * dom_aliases ) [ i ] . acct_name ,
2002-08-17 20:05:44 +04:00
& r . uni_grp_name [ name_idx ] ,
sizeof ( fstring ) - 1 ) ;
1999-12-13 16:27:58 +03:00
name_idx + + ;
1998-12-04 19:30:00 +03:00
}
2002-08-17 20:05:44 +04:00
* start_idx = r . next_idx ;
1998-12-04 19:30:00 +03:00
}
2002-08-17 20:05:44 +04:00
done :
return result ;
1998-12-04 19:30:00 +03:00
}
2002-08-17 20:05:44 +04:00
/* Query alias members */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_query_aliasmem ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * alias_pol , uint32 * num_mem ,
DOM_SID * * sids )
1998-03-12 00:11:04 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_ALIASMEM q ;
SAMR_R_QUERY_ALIASMEM r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
uint32 i ;
1998-03-12 00:11:04 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_aliasmem \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-12-03 23:50:33 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_query_aliasmem ( & q , alias_pol ) ;
1998-03-12 00:11:04 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_ALIASMEM ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_aliasmem ,
samr_io_r_query_aliasmem ,
NT_STATUS_UNSUCCESSFUL ) ;
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
1999-12-13 16:27:58 +03:00
}
2002-08-17 20:05:44 +04:00
* num_mem = r . num_sids ;
2003-10-20 19:42:09 +04:00
if ( * num_mem = = 0 ) {
* sids = NULL ;
result = NT_STATUS_OK ;
goto done ;
}
2004-12-07 21:25:53 +03:00
if ( ! ( * sids = TALLOC_ARRAY ( mem_ctx , DOM_SID , * num_mem ) ) ) {
2002-08-17 20:05:44 +04:00
result = NT_STATUS_UNSUCCESSFUL ;
goto done ;
1998-03-12 00:11:04 +03:00
}
2002-08-17 20:05:44 +04:00
for ( i = 0 ; i < * num_mem ; i + + ) {
( * sids ) [ i ] = r . sid [ i ] . sid ;
}
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
done :
return result ;
1998-12-04 19:30:00 +03:00
}
2002-08-17 20:05:44 +04:00
/* Open handle on an alias */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_open_alias ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol , uint32 access_mask ,
uint32 alias_rid , POLICY_HND * alias_pol )
1998-12-04 19:30:00 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_OPEN_ALIAS q ;
SAMR_R_OPEN_ALIAS r ;
NTSTATUS result ;
1998-12-04 19:30:00 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_open_alias with rid 0x%x \n " , alias_rid ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_open_alias ( & q , domain_pol , access_mask , alias_rid ) ;
1998-12-04 19:30:00 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_OPEN_ALIAS ,
q , r ,
qbuf , rbuf ,
samr_io_q_open_alias ,
samr_io_r_open_alias ,
NT_STATUS_UNSUCCESSFUL ) ;
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1998-12-04 19:30:00 +03:00
2002-08-17 20:05:44 +04:00
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* alias_pol = r . pol ;
1999-12-13 16:27:58 +03:00
}
2002-08-17 20:05:44 +04:00
return result ;
}
2004-02-28 21:41:16 +03:00
/* Create an alias */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_create_dom_alias ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-28 21:41:16 +03:00
POLICY_HND * domain_pol , const char * name ,
POLICY_HND * alias_pol )
{
prs_struct qbuf , rbuf ;
SAMR_Q_CREATE_DOM_ALIAS q ;
SAMR_R_CREATE_DOM_ALIAS r ;
NTSTATUS result ;
DEBUG ( 10 , ( " cli_samr_create_dom_alias named %s \n " , name ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_create_dom_alias ( & q , domain_pol , name ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CREATE_DOM_ALIAS ,
q , r ,
qbuf , rbuf ,
samr_io_q_create_dom_alias ,
samr_io_r_create_dom_alias ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-28 21:41:16 +03:00
/* Return output parameters */
if ( NT_STATUS_IS_OK ( result = r . status ) ) {
* alias_pol = r . alias_pol ;
}
return result ;
}
/* Add an alias member */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_add_aliasmem ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-28 21:41:16 +03:00
POLICY_HND * alias_pol , DOM_SID * member )
{
prs_struct qbuf , rbuf ;
SAMR_Q_ADD_ALIASMEM q ;
SAMR_R_ADD_ALIASMEM r ;
NTSTATUS result ;
DEBUG ( 10 , ( " cli_samr_add_aliasmem " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_add_aliasmem ( & q , alias_pol , member ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_ADD_ALIASMEM ,
q , r ,
qbuf , rbuf ,
samr_io_q_add_aliasmem ,
samr_io_r_add_aliasmem ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-28 21:41:16 +03:00
result = r . status ;
return result ;
}
/* Delete an alias member */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_del_aliasmem ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-02-28 21:41:16 +03:00
POLICY_HND * alias_pol , DOM_SID * member )
{
prs_struct qbuf , rbuf ;
SAMR_Q_DEL_ALIASMEM q ;
SAMR_R_DEL_ALIASMEM r ;
NTSTATUS result ;
DEBUG ( 10 , ( " cli_samr_del_aliasmem " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_del_aliasmem ( & q , alias_pol , member ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_DEL_ALIASMEM ,
q , r ,
qbuf , rbuf ,
samr_io_q_del_aliasmem ,
samr_io_r_del_aliasmem ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-02-28 21:41:16 +03:00
result = r . status ;
return result ;
}
2003-06-12 20:21:22 +04:00
/* Query alias info */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_query_alias_info ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2003-06-12 20:21:22 +04:00
POLICY_HND * alias_pol , uint16 switch_value ,
ALIAS_INFO_CTR * ctr )
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_ALIASINFO q ;
SAMR_R_QUERY_ALIASINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2005-06-09 02:10:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_alias_info \n " ) ) ;
2003-06-12 20:21:22 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_query_aliasinfo ( & q , alias_pol , switch_value ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_ALIASINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_aliasinfo ,
samr_io_r_query_aliasinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
2003-06-12 20:21:22 +04:00
/* Return output parameters */
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
}
2005-05-03 18:01:39 +04:00
* ctr = * r . ctr ;
2003-06-12 20:21:22 +04:00
2005-09-30 21:13:37 +04:00
done :
2003-06-12 20:21:22 +04:00
return result ;
}
2002-08-17 20:05:44 +04:00
/* Query domain info */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_query_dom_info ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol ,
uint16 switch_value ,
SAM_UNK_CTR * ctr )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_DOMAIN_INFO q ;
SAMR_R_QUERY_DOMAIN_INFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_dom_info \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
2006-05-05 12:04:28 +04:00
init_samr_q_query_domain_info ( & q , domain_pol , switch_value ) ;
2002-08-17 20:05:44 +04:00
r . ctr = ctr ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_DOMAIN_INFO ,
q , r ,
qbuf , rbuf ,
2006-05-05 12:04:28 +04:00
samr_io_q_query_domain_info ,
samr_io_r_query_domain_info ,
2005-09-30 21:13:37 +04:00
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1999-11-18 22:29:08 +03:00
2002-08-17 20:05:44 +04:00
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
}
done :
return result ;
1999-11-18 22:29:08 +03:00
}
2006-05-05 12:26:34 +04:00
/* Query domain info2 */
NTSTATUS rpccli_samr_query_dom_info2 ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol ,
uint16 switch_value ,
SAM_UNK_CTR * ctr )
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_DOMAIN_INFO2 q ;
SAMR_R_QUERY_DOMAIN_INFO2 r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_query_dom_info2 \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_query_domain_info2 ( & q , domain_pol , switch_value ) ;
r . ctr = ctr ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_DOMAIN_INFO2 ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_domain_info2 ,
samr_io_r_query_domain_info2 ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
}
done :
return result ;
}
2006-02-05 00:44:57 +03:00
/* Set domain info */
NTSTATUS rpccli_samr_set_domain_info ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol ,
uint16 switch_value ,
SAM_UNK_CTR * ctr )
{
prs_struct qbuf , rbuf ;
SAMR_Q_SET_DOMAIN_INFO q ;
SAMR_R_SET_DOMAIN_INFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_set_domain_info \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_set_domain_info ( & q , domain_pol , switch_value , ctr ) ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_SET_DOMAIN_INFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_set_domain_info ,
samr_io_r_set_domain_info ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
}
done :
return result ;
}
2004-01-26 11:45:02 +03:00
/* User change password */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_chgpasswd_user ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
const char * username ,
const char * newpassword ,
const char * oldpassword )
2004-01-26 11:45:02 +03:00
{
uchar new_nt_password [ 516 ] ;
uchar new_lm_password [ 516 ] ;
uchar old_nt_hash [ 16 ] ;
uchar old_lanman_hash [ 16 ] ;
uchar old_nt_hash_enc [ 16 ] ;
uchar old_lanman_hash_enc [ 16 ] ;
uchar new_nt_hash [ 16 ] ;
uchar new_lanman_hash [ 16 ] ;
2005-09-30 21:13:37 +04:00
DEBUG ( 10 , ( " rpccli_samr_chgpasswd_user \n " ) ) ;
2004-01-26 11:45:02 +03:00
/* Calculate the MD4 hash (NT compatible) of the password */
E_md4hash ( oldpassword , old_nt_hash ) ;
E_md4hash ( newpassword , new_nt_hash ) ;
if ( lp_client_lanman_auth ( )
& & E_deshash ( newpassword , new_lanman_hash )
& & E_deshash ( oldpassword , old_lanman_hash ) ) {
/* E_deshash returns false for 'long' passwords (> 14
DOS chars ) . This allows us to match Win2k , which
does not store a LM hash for these passwords ( which
would reduce the effective password length to 14 ) */
encode_pw_buffer ( new_lm_password , newpassword , STR_UNICODE ) ;
SamOEMhash ( new_lm_password , old_nt_hash , 516 ) ;
E_old_pw_hash ( new_nt_hash , old_lanman_hash , old_lanman_hash_enc ) ;
} else {
ZERO_STRUCT ( new_lm_password ) ;
ZERO_STRUCT ( old_lanman_hash_enc ) ;
}
encode_pw_buffer ( new_nt_password , newpassword , STR_UNICODE ) ;
SamOEMhash ( new_nt_password , old_nt_hash , 516 ) ;
E_old_pw_hash ( new_nt_hash , old_nt_hash , old_nt_hash_enc ) ;
2007-04-22 21:00:58 +04:00
return rpccli_samr_chng_pswd_auth_crap ( cli , mem_ctx , username ,
data_blob_const ( new_nt_password , sizeof ( new_nt_password ) ) ,
data_blob_const ( old_nt_hash_enc , sizeof ( old_nt_hash_enc ) ) ,
data_blob_const ( new_lm_password , sizeof ( new_lm_password ) ) ,
data_blob_const ( old_lanman_hash_enc , sizeof ( old_lanman_hash_enc ) ) ) ;
2004-01-26 11:45:02 +03:00
}
2006-07-13 13:29:25 +04:00
/* User change passwd with auth crap */
NTSTATUS rpccli_samr_chng_pswd_auth_crap ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
const char * username ,
DATA_BLOB new_nt_password ,
DATA_BLOB old_nt_hash_enc ,
DATA_BLOB new_lm_password ,
DATA_BLOB old_lm_hash_enc )
{
prs_struct qbuf , rbuf ;
SAMR_Q_CHGPASSWD_USER q ;
SAMR_R_CHGPASSWD_USER r ;
char * srv_name_slash ;
if ( ! ( srv_name_slash = talloc_asprintf ( mem_ctx , " \\ \\ %s " ,
cli - > cli - > desthost ) ) ) {
return NT_STATUS_NO_MEMORY ;
}
DEBUG ( 5 , ( " rpccli_samr_chng_pswd_auth_crap on server: %s \n " ,
srv_name_slash ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_chgpasswd_user ( & q , srv_name_slash , username ,
new_nt_password . data ,
old_nt_hash_enc . data ,
new_lm_password . data ,
old_lm_hash_enc . data ) ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CHGPASSWD_USER ,
q , r ,
qbuf , rbuf ,
samr_io_q_chgpasswd_user ,
samr_io_r_chgpasswd_user ,
NT_STATUS_UNSUCCESSFUL ) ;
return r . status ;
}
2005-11-30 02:23:02 +03:00
/* change password 3 */
NTSTATUS rpccli_samr_chgpasswd3 ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
const char * username ,
const char * newpassword ,
const char * oldpassword ,
2006-02-11 02:09:00 +03:00
SAM_UNK_INFO_1 * info ,
SAMR_CHANGE_REJECT * reject )
2005-11-30 02:23:02 +03:00
{
prs_struct qbuf , rbuf ;
2006-02-11 02:09:00 +03:00
SAMR_Q_CHGPASSWD_USER3 q ;
SAMR_R_CHGPASSWD_USER3 r ;
2005-11-30 02:23:02 +03:00
uchar new_nt_password [ 516 ] ;
uchar new_lm_password [ 516 ] ;
uchar old_nt_hash [ 16 ] ;
uchar old_lanman_hash [ 16 ] ;
uchar old_nt_hash_enc [ 16 ] ;
uchar old_lanman_hash_enc [ 16 ] ;
uchar new_nt_hash [ 16 ] ;
uchar new_lanman_hash [ 16 ] ;
char * srv_name_slash = talloc_asprintf ( mem_ctx , " \\ \\ %s " , cli - > cli - > desthost ) ;
2006-02-11 02:09:00 +03:00
DEBUG ( 10 , ( " rpccli_samr_chgpasswd_user3 \n " ) ) ;
2005-11-30 02:23:02 +03:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Calculate the MD4 hash (NT compatible) of the password */
E_md4hash ( oldpassword , old_nt_hash ) ;
E_md4hash ( newpassword , new_nt_hash ) ;
if ( lp_client_lanman_auth ( )
& & E_deshash ( newpassword , new_lanman_hash )
& & E_deshash ( oldpassword , old_lanman_hash ) ) {
/* E_deshash returns false for 'long' passwords (> 14
DOS chars ) . This allows us to match Win2k , which
does not store a LM hash for these passwords ( which
would reduce the effective password length to 14 ) */
encode_pw_buffer ( new_lm_password , newpassword , STR_UNICODE ) ;
SamOEMhash ( new_lm_password , old_nt_hash , 516 ) ;
E_old_pw_hash ( new_nt_hash , old_lanman_hash , old_lanman_hash_enc ) ;
} else {
ZERO_STRUCT ( new_lm_password ) ;
ZERO_STRUCT ( old_lanman_hash_enc ) ;
}
encode_pw_buffer ( new_nt_password , newpassword , STR_UNICODE ) ;
SamOEMhash ( new_nt_password , old_nt_hash , 516 ) ;
E_old_pw_hash ( new_nt_hash , old_nt_hash , old_nt_hash_enc ) ;
/* Marshall data and send request */
2006-02-11 02:09:00 +03:00
init_samr_q_chgpasswd_user3 ( & q , srv_name_slash , username ,
new_nt_password ,
old_nt_hash_enc ,
new_lm_password ,
old_lanman_hash_enc ) ;
r . info = info ;
r . reject = reject ;
2005-11-30 02:23:02 +03:00
2006-02-11 02:09:00 +03:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CHGPASSWD_USER3 ,
2005-11-30 02:23:02 +03:00
q , r ,
qbuf , rbuf ,
2006-02-11 02:09:00 +03:00
samr_io_q_chgpasswd_user3 ,
samr_io_r_chgpasswd_user3 ,
2005-11-30 02:23:02 +03:00
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
2006-02-11 03:08:57 +03:00
return r . status ;
2005-11-30 02:23:02 +03:00
}
2003-01-29 23:15:35 +03:00
/* This function returns the bizzare set of (max_entries, max_size) required
for the QueryDisplayInfo RPC to actually work against a domain controller
with large ( 10 k and higher ) numbers of users . These values were
obtained by inspection using ethereal and NT4 running User Manager . */
void get_query_dispinfo_params ( int loop_count , uint32 * max_entries ,
uint32 * max_size )
{
switch ( loop_count ) {
case 0 :
* max_entries = 512 ;
* max_size = 16383 ;
break ;
case 1 :
* max_entries = 1024 ;
* max_size = 32766 ;
break ;
case 2 :
* max_entries = 2048 ;
* max_size = 65532 ;
break ;
case 3 :
* max_entries = 4096 ;
* max_size = 131064 ;
break ;
default : /* loop_count >= 4 */
* max_entries = 4096 ;
* max_size = 131071 ;
break ;
}
}
2002-08-17 20:05:44 +04:00
/* Query display info */
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_query_dispinfo ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol , uint32 * start_idx ,
uint16 switch_value , uint32 * num_entries ,
uint32 max_entries , uint32 max_size ,
SAM_DISPINFO_CTR * ctr )
1999-11-18 22:29:08 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_DISPINFO q ;
SAMR_R_QUERY_DISPINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1999-11-18 22:29:08 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_dispinfo for start_idx = %u \n " , * start_idx ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1999-11-18 22:29:08 +03:00
2003-05-08 03:09:18 +04:00
* num_entries = 0 ;
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1999-11-18 22:29:08 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_query_dispinfo ( & q , domain_pol , switch_value ,
2003-01-29 23:15:35 +03:00
* start_idx , max_entries , max_size ) ;
1999-11-18 22:29:08 +03:00
2002-08-17 20:05:44 +04:00
r . ctr = ctr ;
1999-11-18 22:29:08 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_DISPINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_dispinfo ,
samr_io_r_query_dispinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
1999-11-18 22:29:08 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
2006-10-17 03:42:15 +04:00
result = r . status ;
2002-08-17 20:05:44 +04:00
if ( ! NT_STATUS_IS_OK ( result ) & &
NT_STATUS_V ( result ) ! = NT_STATUS_V ( STATUS_MORE_ENTRIES ) ) {
goto done ;
1999-12-13 16:27:58 +03:00
}
2002-08-17 20:05:44 +04:00
* num_entries = r . num_entries ;
* start_idx + = r . num_entries ; /* No next_idx in this structure! */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
done :
return result ;
1998-03-12 00:11:04 +03:00
}
2006-09-18 23:18:29 +04:00
/* Query display info2 */
NTSTATUS rpccli_samr_query_dispinfo2 ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol , uint32 * start_idx ,
uint16 switch_value , uint32 * num_entries ,
uint32 max_entries , uint32 max_size ,
SAM_DISPINFO_CTR * ctr )
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_DISPINFO q ;
SAMR_R_QUERY_DISPINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_query_dispinfo2 for start_idx = %u \n " , * start_idx ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
* num_entries = 0 ;
/* Marshall data and send request */
init_samr_q_query_dispinfo ( & q , domain_pol , switch_value ,
* start_idx , max_entries , max_size ) ;
r . ctr = ctr ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_DISPINFO2 ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_dispinfo ,
samr_io_r_query_dispinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
2006-10-17 03:42:15 +04:00
result = r . status ;
2006-09-18 23:18:29 +04:00
if ( ! NT_STATUS_IS_OK ( result ) & &
NT_STATUS_V ( result ) ! = NT_STATUS_V ( STATUS_MORE_ENTRIES ) ) {
goto done ;
}
* num_entries = r . num_entries ;
* start_idx + = r . num_entries ; /* No next_idx in this structure! */
done :
return result ;
}
/* Query display info */
NTSTATUS rpccli_samr_query_dispinfo3 ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol , uint32 * start_idx ,
uint16 switch_value , uint32 * num_entries ,
uint32 max_entries , uint32 max_size ,
SAM_DISPINFO_CTR * ctr )
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_DISPINFO q ;
SAMR_R_QUERY_DISPINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_query_dispinfo3 for start_idx = %u \n " , * start_idx ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
* num_entries = 0 ;
/* Marshall data and send request */
init_samr_q_query_dispinfo ( & q , domain_pol , switch_value ,
* start_idx , max_entries , max_size ) ;
r . ctr = ctr ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_DISPINFO3 ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_dispinfo ,
samr_io_r_query_dispinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
2006-10-17 03:42:15 +04:00
result = r . status ;
2006-09-18 23:18:29 +04:00
if ( ! NT_STATUS_IS_OK ( result ) & &
NT_STATUS_V ( result ) ! = NT_STATUS_V ( STATUS_MORE_ENTRIES ) ) {
goto done ;
}
* num_entries = r . num_entries ;
* start_idx + = r . num_entries ; /* No next_idx in this structure! */
done :
return result ;
}
2006-09-19 19:53:44 +04:00
/* Query display info index */
NTSTATUS rpccli_samr_get_dispenum_index ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol ,
uint16 switch_value ,
const char * name ,
uint32 * idx )
{
prs_struct qbuf , rbuf ;
SAMR_Q_GET_DISPENUM_INDEX q ;
SAMR_R_GET_DISPENUM_INDEX r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_get_dispenum_index for name = %s \n " , name ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_get_dispenum_index ( & q , domain_pol , switch_value , name ) ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_GET_DISPENUM_INDEX ,
q , r ,
qbuf , rbuf ,
samr_io_q_get_dispenum_index ,
samr_io_r_get_dispenum_index ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
* idx = 0 ;
2006-10-17 03:42:15 +04:00
result = r . status ;
if ( ! NT_STATUS_IS_ERR ( result ) ) {
* idx = r . idx ;
}
return result ;
}
NTSTATUS rpccli_samr_get_dispenum_index2 ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol ,
uint16 switch_value ,
const char * name ,
uint32 * idx )
{
prs_struct qbuf , rbuf ;
SAMR_Q_GET_DISPENUM_INDEX q ;
SAMR_R_GET_DISPENUM_INDEX r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_get_dispenum_index2 for name = %s \n " , name ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_get_dispenum_index ( & q , domain_pol , switch_value , name ) ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_GET_DISPENUM_INDEX2 ,
q , r ,
qbuf , rbuf ,
samr_io_q_get_dispenum_index ,
samr_io_r_get_dispenum_index ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
* idx = 0 ;
result = r . status ;
2006-09-19 19:53:44 +04:00
2006-10-17 03:42:15 +04:00
if ( ! NT_STATUS_IS_ERR ( result ) ) {
2006-09-19 19:53:44 +04:00
* idx = r . idx ;
}
return result ;
}
2006-09-18 23:18:29 +04:00
2002-08-17 20:05:44 +04:00
/* Lookup rids. Note that NT4 seems to crash if more than ~1000 rids are
looked up in one packet . */
2001-03-11 03:32:10 +03:00
2005-06-09 02:10:34 +04:00
NTSTATUS rpccli_samr_lookup_rids ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx ,
POLICY_HND * domain_pol ,
uint32 num_rids , uint32 * rids ,
uint32 * num_names , char * * * names ,
uint32 * * name_types )
1999-11-04 03:09:15 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_LOOKUP_RIDS q ;
SAMR_R_LOOKUP_RIDS r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
uint32 i ;
1999-11-04 03:09:15 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_lookup_rids \n " ) ) ;
2002-08-17 20:05:44 +04:00
if ( num_rids > 1000 ) {
DEBUG ( 2 , ( " cli_samr_lookup_rids: warning: NT4 can crash if "
" more than ~1000 rids are looked up at once. \n " ) ) ;
}
1999-11-04 03:09:15 +03:00
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1999-11-04 03:09:15 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1999-11-04 03:09:15 +03:00
2005-02-20 18:15:33 +03:00
init_samr_q_lookup_rids ( mem_ctx , & q , domain_pol , 1000 , num_rids , rids ) ;
2002-08-17 20:05:44 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_LOOKUP_RIDS ,
q , r ,
qbuf , rbuf ,
samr_io_q_lookup_rids ,
samr_io_r_lookup_rids ,
NT_STATUS_UNSUCCESSFUL ) ;
1999-12-13 16:27:58 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1999-11-04 03:09:15 +03:00
2005-02-20 17:26:58 +03:00
result = r . status ;
if ( ! NT_STATUS_IS_OK ( result ) & &
! NT_STATUS_EQUAL ( result , STATUS_SOME_UNMAPPED ) )
2002-08-17 20:05:44 +04:00
goto done ;
if ( r . num_names1 = = 0 ) {
* num_names = 0 ;
* names = NULL ;
goto done ;
1999-12-13 16:27:58 +03:00
}
2002-08-17 20:05:44 +04:00
* num_names = r . num_names1 ;
2004-12-07 21:25:53 +03:00
* names = TALLOC_ARRAY ( mem_ctx , char * , r . num_names1 ) ;
* name_types = TALLOC_ARRAY ( mem_ctx , uint32 , r . num_names1 ) ;
1999-11-04 03:09:15 +03:00
2006-06-17 11:43:56 +04:00
if ( ( * names = = NULL ) | | ( * name_types = = NULL ) ) {
TALLOC_FREE ( * names ) ;
TALLOC_FREE ( * name_types ) ;
return NT_STATUS_NO_MEMORY ;
}
2002-08-17 20:05:44 +04:00
for ( i = 0 ; i < r . num_names1 ; i + + ) {
fstring tmp ;
1999-12-13 16:27:58 +03:00
2002-08-17 20:05:44 +04:00
unistr2_to_ascii ( tmp , & r . uni_name [ i ] , sizeof ( tmp ) - 1 ) ;
( * names ) [ i ] = talloc_strdup ( mem_ctx , tmp ) ;
( * name_types ) [ i ] = r . type [ i ] ;
1999-11-04 03:09:15 +03:00
}
2002-08-17 20:05:44 +04:00
done :
1999-11-04 03:09:15 +03:00
2002-08-17 20:05:44 +04:00
return result ;
1999-11-04 03:09:15 +03:00
}
2002-08-17 20:05:44 +04:00
/* Lookup names */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_lookup_names ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2002-08-17 20:05:44 +04:00
POLICY_HND * domain_pol , uint32 flags ,
uint32 num_names , const char * * names ,
uint32 * num_rids , uint32 * * rids ,
uint32 * * rid_types )
1998-03-12 00:11:04 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_LOOKUP_NAMES q ;
SAMR_R_LOOKUP_NAMES r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
uint32 i ;
1998-03-12 00:11:04 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_lookup_names \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-12-03 23:50:33 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_lookup_names ( mem_ctx , & q , domain_pol , flags ,
num_names , names ) ;
1998-03-12 00:11:04 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_LOOKUP_NAMES ,
q , r ,
qbuf , rbuf ,
samr_io_q_lookup_names ,
samr_io_r_lookup_names ,
NT_STATUS_UNSUCCESSFUL ) ;
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
1999-12-13 16:27:58 +03:00
}
2002-08-17 20:05:44 +04:00
if ( r . num_rids1 = = 0 ) {
* num_rids = 0 ;
goto done ;
1998-03-12 00:11:04 +03:00
}
2002-08-17 20:05:44 +04:00
* num_rids = r . num_rids1 ;
2004-12-07 21:25:53 +03:00
* rids = TALLOC_ARRAY ( mem_ctx , uint32 , r . num_rids1 ) ;
* rid_types = TALLOC_ARRAY ( mem_ctx , uint32 , r . num_rids1 ) ;
1999-12-13 16:27:58 +03:00
2006-06-17 11:43:56 +04:00
if ( ( * rids = = NULL ) | | ( * rid_types = = NULL ) ) {
TALLOC_FREE ( * rids ) ;
TALLOC_FREE ( * rid_types ) ;
return NT_STATUS_NO_MEMORY ;
}
2002-08-17 20:05:44 +04:00
for ( i = 0 ; i < r . num_rids1 ; i + + ) {
( * rids ) [ i ] = r . rids [ i ] ;
( * rid_types ) [ i ] = r . types [ i ] ;
}
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
done :
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
return result ;
}
2001-03-11 03:32:10 +03:00
2002-08-17 20:05:44 +04:00
/* Create a domain user */
2001-03-11 03:32:10 +03:00
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_create_dom_user ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2002-08-17 20:05:44 +04:00
POLICY_HND * domain_pol , const char * acct_name ,
uint32 acb_info , uint32 unknown ,
POLICY_HND * user_pol , uint32 * rid )
1998-03-12 00:11:04 +03:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_CREATE_USER q ;
SAMR_R_CREATE_USER r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1998-03-12 00:11:04 +03:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_create_dom_user %s \n " , acct_name ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
init_samr_q_create_user ( & q , domain_pol , acct_name , acb_info , unknown ) ;
1998-03-12 00:11:04 +03:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_CREATE_USER ,
q , r ,
qbuf , rbuf ,
samr_io_q_create_user ,
samr_io_r_create_user ,
NT_STATUS_UNSUCCESSFUL ) ;
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
}
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
if ( user_pol )
* user_pol = r . user_pol ;
if ( rid )
* rid = r . user_rid ;
done :
return result ;
}
/* Set userinfo */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_set_userinfo ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2006-02-04 01:19:41 +03:00
const POLICY_HND * user_pol , uint16 switch_value ,
2003-11-23 02:38:41 +03:00
DATA_BLOB * sess_key , SAM_USERINFO_CTR * ctr )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_SET_USERINFO q ;
SAMR_R_SET_USERINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_set_userinfo \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
2003-11-23 02:38:41 +03:00
if ( ! sess_key - > length ) {
DEBUG ( 1 , ( " No user session key \n " ) ) ;
Changes all over the shop, but all towards:
- NTLM2 support in the server
- KEY_EXCH support in the server
- variable length session keys.
In detail:
- NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).
* This is known as 'NTLMv2 session security' *
(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes. We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)
This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed. This also needs to be turned off for
'security=server', which does not support this.
- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.
- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.
- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation.
- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.
- The other big change is to allow variable length session keys. We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter. However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.
* This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *
- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe. This
should help reduce some of the 'it just doesn't work' issues.
- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer. (just allocate)
REMEMBER to make clean after this commit - I have changed plenty of data structures...
(This used to be commit f3bbc87b0dac63426cda6fac7a295d3aad810ecc)
2003-11-22 16:19:38 +03:00
return NT_STATUS_NO_USER_SESSION_KEY ;
}
2002-08-17 20:05:44 +04:00
/* Initialise parse structures */
2005-09-30 21:13:37 +04:00
prs_init ( & qbuf , RPC_MAX_PDU_FRAG_LEN , mem_ctx , MARSHALL ) ;
2002-08-17 20:05:44 +04:00
prs_init ( & rbuf , 0 , mem_ctx , UNMARSHALL ) ;
/* Marshall data and send request */
q . ctr = ctr ;
init_samr_q_set_userinfo ( & q , user_pol , sess_key , switch_value ,
ctr - > info . id ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_SET_USERINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_set_userinfo ,
samr_io_r_set_userinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
1999-12-13 16:27:58 +03:00
}
1998-03-12 00:11:04 +03:00
2002-08-17 20:05:44 +04:00
done :
return result ;
}
/* Set userinfo2 */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_set_userinfo2 ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2006-02-04 01:19:41 +03:00
const POLICY_HND * user_pol , uint16 switch_value ,
2003-11-23 02:38:41 +03:00
DATA_BLOB * sess_key , SAM_USERINFO_CTR * ctr )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_SET_USERINFO2 q ;
SAMR_R_SET_USERINFO2 r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_set_userinfo2 \n " ) ) ;
2003-11-23 02:38:41 +03:00
if ( ! sess_key - > length ) {
DEBUG ( 1 , ( " No user session key \n " ) ) ;
Changes all over the shop, but all towards:
- NTLM2 support in the server
- KEY_EXCH support in the server
- variable length session keys.
In detail:
- NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).
* This is known as 'NTLMv2 session security' *
(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes. We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)
This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed. This also needs to be turned off for
'security=server', which does not support this.
- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.
- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.
- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation.
- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.
- The other big change is to allow variable length session keys. We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter. However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.
* This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *
- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe. This
should help reduce some of the 'it just doesn't work' issues.
- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer. (just allocate)
REMEMBER to make clean after this commit - I have changed plenty of data structures...
(This used to be commit f3bbc87b0dac63426cda6fac7a295d3aad810ecc)
2003-11-22 16:19:38 +03:00
return NT_STATUS_NO_USER_SESSION_KEY ;
}
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_set_userinfo2 ( & q , user_pol , sess_key , switch_value , ctr ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_SET_USERINFO2 ,
q , r ,
qbuf , rbuf ,
samr_io_q_set_userinfo2 ,
samr_io_r_set_userinfo2 ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
if ( ! NT_STATUS_IS_OK ( result = r . status ) ) {
goto done ;
}
done :
return result ;
1998-03-12 00:11:04 +03:00
}
2004-04-19 00:22:31 +04:00
/* Delete domain group */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_delete_dom_group ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-04-19 00:22:31 +04:00
POLICY_HND * group_pol )
{
prs_struct qbuf , rbuf ;
SAMR_Q_DELETE_DOM_GROUP q ;
SAMR_R_DELETE_DOM_GROUP r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_delete_dom_group \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_delete_dom_group ( & q , group_pol ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_DELETE_DOM_GROUP ,
q , r ,
qbuf , rbuf ,
samr_io_q_delete_dom_group ,
samr_io_r_delete_dom_group ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-04-19 00:22:31 +04:00
/* Return output parameters */
result = r . status ;
return result ;
}
/* Delete domain alias */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_delete_dom_alias ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2004-04-19 00:22:31 +04:00
POLICY_HND * alias_pol )
{
prs_struct qbuf , rbuf ;
SAMR_Q_DELETE_DOM_ALIAS q ;
SAMR_R_DELETE_DOM_ALIAS r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_delete_dom_alias \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_delete_dom_alias ( & q , alias_pol ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_DELETE_DOM_ALIAS ,
q , r ,
qbuf , rbuf ,
samr_io_q_delete_dom_alias ,
samr_io_r_delete_dom_alias ,
NT_STATUS_UNSUCCESSFUL ) ;
2004-04-19 00:22:31 +04:00
/* Return output parameters */
result = r . status ;
return result ;
}
2002-08-17 20:05:44 +04:00
/* Delete domain user */
2001-03-11 03:32:10 +03:00
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_delete_dom_user ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2002-08-17 20:05:44 +04:00
POLICY_HND * user_pol )
1999-09-15 01:04:02 +04:00
{
2002-08-17 20:05:44 +04:00
prs_struct qbuf , rbuf ;
SAMR_Q_DELETE_DOM_USER q ;
SAMR_R_DELETE_DOM_USER r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
1999-09-15 01:04:02 +04:00
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_delete_dom_user \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
1999-09-15 01:04:02 +04:00
2002-08-17 20:05:44 +04:00
/* Marshall data and send request */
1999-09-15 01:04:02 +04:00
2002-08-17 20:05:44 +04:00
init_samr_q_delete_dom_user ( & q , user_pol ) ;
1999-09-15 01:04:02 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_DELETE_DOM_USER ,
q , r ,
qbuf , rbuf ,
samr_io_q_delete_dom_user ,
samr_io_r_delete_dom_user ,
NT_STATUS_UNSUCCESSFUL ) ;
1999-09-15 01:04:02 +04:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1999-09-15 01:04:02 +04:00
2002-08-17 20:05:44 +04:00
result = r . status ;
return result ;
}
2005-02-28 13:55:13 +03:00
/* Remove foreign SID */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_remove_sid_foreign_domain ( struct rpc_pipe_client * cli ,
2005-02-28 13:55:13 +03:00
TALLOC_CTX * mem_ctx ,
POLICY_HND * user_pol ,
DOM_SID * sid )
{
prs_struct qbuf , rbuf ;
SAMR_Q_REMOVE_SID_FOREIGN_DOMAIN q ;
SAMR_R_REMOVE_SID_FOREIGN_DOMAIN r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_remove_sid_foreign_domain \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_remove_sid_foreign_domain ( & q , user_pol , sid ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_REMOVE_SID_FOREIGN_DOMAIN ,
q , r ,
qbuf , rbuf ,
samr_io_q_remove_sid_foreign_domain ,
samr_io_r_remove_sid_foreign_domain ,
NT_STATUS_UNSUCCESSFUL ) ;
2005-02-28 13:55:13 +03:00
/* Return output parameters */
result = r . status ;
return result ;
}
2002-08-17 20:05:44 +04:00
/* Query user security object */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_query_sec_obj ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2006-03-06 18:22:00 +03:00
POLICY_HND * user_pol , uint32 sec_info ,
2002-08-17 20:05:44 +04:00
TALLOC_CTX * ctx , SEC_DESC_BUF * * sec_desc_buf )
{
prs_struct qbuf , rbuf ;
SAMR_Q_QUERY_SEC_OBJ q ;
SAMR_R_QUERY_SEC_OBJ r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_query_sec_obj \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
2006-03-06 18:22:00 +03:00
init_samr_q_query_sec_obj ( & q , user_pol , sec_info ) ;
2002-08-17 20:05:44 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_QUERY_SEC_OBJECT ,
q , r ,
qbuf , rbuf ,
samr_io_q_query_sec_obj ,
samr_io_r_query_sec_obj ,
NT_STATUS_UNSUCCESSFUL ) ;
1999-09-15 01:04:02 +04:00
2002-08-17 20:05:44 +04:00
/* Return output parameters */
1999-12-13 16:27:58 +03:00
2002-08-17 20:05:44 +04:00
result = r . status ;
* sec_desc_buf = dup_sec_desc_buf ( ctx , r . buf ) ;
1999-09-15 01:04:02 +04:00
2002-08-17 20:05:44 +04:00
return result ;
}
2006-03-06 18:22:00 +03:00
/* Set user security object */
NTSTATUS rpccli_samr_set_sec_obj ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
POLICY_HND * user_pol , uint32 sec_info ,
SEC_DESC_BUF * sec_desc_buf )
{
prs_struct qbuf , rbuf ;
SAMR_Q_SET_SEC_OBJ q ;
SAMR_R_SET_SEC_OBJ r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_set_sec_obj \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_set_sec_obj ( & q , user_pol , sec_info , sec_desc_buf ) ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_SET_SEC_OBJECT ,
q , r ,
qbuf , rbuf ,
samr_io_q_set_sec_obj ,
samr_io_r_set_sec_obj ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
result = r . status ;
return result ;
}
2002-08-17 20:05:44 +04:00
/* Get domain password info */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_get_dom_pwinfo ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2005-11-22 16:58:51 +03:00
uint16 * min_pwd_length , uint32 * password_properties )
2002-08-17 20:05:44 +04:00
{
prs_struct qbuf , rbuf ;
SAMR_Q_GET_DOM_PWINFO q ;
SAMR_R_GET_DOM_PWINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_get_dom_pwinfo \n " ) ) ;
2002-08-17 20:05:44 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
2005-09-30 21:13:37 +04:00
init_samr_q_get_dom_pwinfo ( & q , cli - > cli - > desthost ) ;
2002-08-17 20:05:44 +04:00
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_GET_DOM_PWINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_get_dom_pwinfo ,
samr_io_r_get_dom_pwinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 20:05:44 +04:00
/* Return output parameters */
result = r . status ;
if ( NT_STATUS_IS_OK ( result ) ) {
2005-11-22 16:58:51 +03:00
if ( min_pwd_length )
* min_pwd_length = r . min_pwd_length ;
if ( password_properties )
* password_properties = r . password_properties ;
2002-08-17 20:05:44 +04:00
}
return result ;
1999-09-15 01:04:02 +04:00
}
2003-04-14 05:17:05 +04:00
2006-02-16 16:18:17 +03:00
/* Get domain password info */
NTSTATUS rpccli_samr_get_usrdom_pwinfo ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
POLICY_HND * pol , uint16 * min_pwd_length ,
uint32 * password_properties , uint32 * unknown1 )
{
prs_struct qbuf , rbuf ;
SAMR_Q_GET_USRDOM_PWINFO q ;
SAMR_R_GET_USRDOM_PWINFO r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
DEBUG ( 10 , ( " cli_samr_get_usrdom_pwinfo \n " ) ) ;
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_get_usrdom_pwinfo ( & q , pol ) ;
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_GET_USRDOM_PWINFO ,
q , r ,
qbuf , rbuf ,
samr_io_q_get_usrdom_pwinfo ,
samr_io_r_get_usrdom_pwinfo ,
NT_STATUS_UNSUCCESSFUL ) ;
/* Return output parameters */
result = r . status ;
if ( NT_STATUS_IS_OK ( result ) ) {
if ( min_pwd_length )
* min_pwd_length = r . min_pwd_length ;
if ( password_properties )
* password_properties = r . password_properties ;
if ( unknown1 )
* unknown1 = r . unknown_1 ;
}
return result ;
}
2003-04-14 05:17:05 +04:00
/* Lookup Domain Name */
2005-09-30 21:13:37 +04:00
NTSTATUS rpccli_samr_lookup_domain ( struct rpc_pipe_client * cli , TALLOC_CTX * mem_ctx ,
2003-04-14 05:17:05 +04:00
POLICY_HND * user_pol , char * domain_name ,
DOM_SID * sid )
{
prs_struct qbuf , rbuf ;
SAMR_Q_LOOKUP_DOMAIN q ;
SAMR_R_LOOKUP_DOMAIN r ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2003-06-10 03:15:34 +04:00
DEBUG ( 10 , ( " cli_samr_lookup_domain \n " ) ) ;
2003-04-14 05:17:05 +04:00
ZERO_STRUCT ( q ) ;
ZERO_STRUCT ( r ) ;
/* Marshall data and send request */
init_samr_q_lookup_domain ( & q , user_pol , domain_name ) ;
2005-09-30 21:13:37 +04:00
CLI_DO_RPC ( cli , mem_ctx , PI_SAMR , SAMR_LOOKUP_DOMAIN ,
q , r ,
qbuf , rbuf ,
samr_io_q_lookup_domain ,
samr_io_r_lookup_domain ,
NT_STATUS_UNSUCCESSFUL ) ;
2003-04-14 05:17:05 +04:00
/* Return output parameters */
result = r . status ;
if ( NT_STATUS_IS_OK ( result ) )
sid_copy ( sid , & r . dom_sid . sid ) ;
return result ;
}