1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-11 05:18:09 +03:00

Some old stuff hanging around since the CIFS conference. Big cleanup of

rpcclient code.  Refactored cmd_* functions to move common mem_ctx and pipe
opening stuff up one level.  Moved rpcclient.h into rpcclient directory and
out of includes/smb.h
(This used to be commit a40facba96)
This commit is contained in:
Tim Potter 2001-10-12 05:56:23 +00:00
parent d726eb216a
commit 439c7e0ca2
9 changed files with 294 additions and 1047 deletions

View File

@ -1563,7 +1563,6 @@ typedef struct {
#include "ntdomain.h"
#include "client.h"
#include "rpcclient.h"
/*
* Size of new password account encoding string. This is enough space to

View File

@ -21,14 +21,13 @@
*/
#include "includes.h"
extern pstring server;
#include "rpcclient.h"
/* Check DFS is supported by the remote server */
static NTSTATUS cmd_dfs_exist(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_dfs_exist(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
BOOL dfs_exists;
NTSTATUS result;
@ -37,34 +36,17 @@ static NTSTATUS cmd_dfs_exist(struct cli_state *cli, int argc, char **argv)
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_dfs_exist: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETDFS)) {
DEBUG(0, ("Could not initialize netdfs pipe!\n"));
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
result = cli_dfs_exist(cli, mem_ctx, &dfs_exists);
if (NT_STATUS_IS_OK(result))
printf("dfs is %spresent\n", dfs_exists ? "" : "not ");
cli_nt_session_close(cli);
done:
talloc_destroy(mem_ctx);
return result;
}
static NTSTATUS cmd_dfs_add(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_dfs_add(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
NTSTATUS result;
char *entrypath, *servername, *sharename, *comment;
uint32 flags = 0;
@ -80,32 +62,15 @@ static NTSTATUS cmd_dfs_add(struct cli_state *cli, int argc, char **argv)
sharename = argv[3];
comment = argv[4];
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_dfs_add: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETDFS)) {
DEBUG(0, ("Could not initialize netdfs pipe!\n"));
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
result = cli_dfs_add(cli, mem_ctx, entrypath, servername,
sharename, comment, flags);
cli_nt_session_close(cli);
done:
talloc_destroy(mem_ctx);
return result;
}
static NTSTATUS cmd_dfs_remove(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_dfs_remove(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
NTSTATUS result;
char *entrypath, *servername, *sharename;
@ -118,26 +83,9 @@ static NTSTATUS cmd_dfs_remove(struct cli_state *cli, int argc, char **argv)
servername = argv[2];
sharename = argv[3];
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_dfs_remove: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETDFS)) {
DEBUG(0, ("Could not initialize netdfs pipe!\n"));
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
result = cli_dfs_remove(cli, mem_ctx, entrypath, servername,
sharename);
cli_nt_session_close(cli);
done:
talloc_destroy(mem_ctx);
return result;
}
@ -221,9 +169,9 @@ static void display_dfs_info_ctr(DFS_INFO_CTR *ctr)
/* Enumerate dfs shares */
static NTSTATUS cmd_dfs_enum(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_dfs_enum(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
DFS_INFO_CTR ctr;
NTSTATUS result;
uint32 info_level = 1;
@ -236,44 +184,25 @@ static NTSTATUS cmd_dfs_enum(struct cli_state *cli, int argc, char **argv)
if (argc == 2)
info_level = atoi(argv[1]);
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_dfs_enum: talloc_init failed\n"));
return NT_STATUS_NO_MEMORY;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETDFS)) {
DEBUG(0, ("Could not initialize netdfs pipe!\n"));
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* Call RPC function */
result = cli_dfs_enum(cli, mem_ctx, info_level, &ctr);
if (NT_STATUS_IS_OK(result)) {
/* Print results */
if (NT_STATUS_IS_OK(result))
display_dfs_info_ctr(&ctr);
}
cli_nt_session_close(cli);
done:
talloc_destroy(mem_ctx);
return result;
}
static NTSTATUS cmd_dfs_getinfo(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_dfs_getinfo(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
NTSTATUS result;
char *entrypath, *servername, *sharename;
uint32 info_level = 1;
DFS_INFO_CTR ctr;
if (argc < 4 || argc > 5) {
printf("Usage: %s entrypath servername sharename [info_level]\n", argv[0]);
printf("Usage: %s entrypath servername sharename "
"[info_level]\n", argv[0]);
return NT_STATUS_OK;
}
@ -284,32 +213,12 @@ static NTSTATUS cmd_dfs_getinfo(struct cli_state *cli, int argc, char **argv)
if (argc == 5)
info_level = atoi(argv[4]);
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_dfs_getinfo: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETDFS)) {
DEBUG(0, ("Could not initialize netdfs pipe!\n"));
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* Call RPC function */
result = cli_dfs_get_info(cli, mem_ctx, entrypath, servername,
sharename, info_level, &ctr);
if (NT_STATUS_IS_OK(result)) {
/* Print results */
if (NT_STATUS_IS_OK(result))
display_dfs_info_ctr(&ctr);
}
cli_nt_session_close(cli);
done:
talloc_destroy(mem_ctx);
return result;
}
@ -319,11 +228,11 @@ struct cmd_set dfs_commands[] = {
{ "DFS" },
{ "dfsexist", cmd_dfs_exist, "Query DFS support", "" },
{ "dfsadd", cmd_dfs_add, "Add a DFS share", "" },
{ "dfsremove", cmd_dfs_remove, "Remove a DFS share", "" },
{ "dfsgetinfo", cmd_dfs_getinfo, "Query DFS share info", "" },
{ "dfsenum", cmd_dfs_enum, "Enumerate dfs shares", "" },
{ "dfsexist", cmd_dfs_exist, PIPE_NETDFS, "Query DFS support", "" },
{ "dfsadd", cmd_dfs_add, PIPE_NETDFS, "Add a DFS share", "" },
{ "dfsremove", cmd_dfs_remove, PIPE_NETDFS, "Remove a DFS share", "" },
{ "dfsgetinfo", cmd_dfs_getinfo, PIPE_NETDFS, "Query DFS share info", "" },
{ "dfsenum", cmd_dfs_enum, PIPE_NETDFS, "Enumerate dfs shares", "" },
{ NULL }
};

View File

@ -21,124 +21,85 @@
*/
#include "includes.h"
extern pstring server;
#include "rpcclient.h"
/* Look up domain related information on a remote host */
static NTSTATUS cmd_lsa_query_info_policy(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_lsa_query_info_policy(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
POLICY_HND pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_policy_hnd = False;
DOM_SID dom_sid;
fstring sid_str, domain_name;
uint32 info_class = 3;
TALLOC_CTX *mem_ctx;
if (argc > 2) {
printf("Usage: %s [info_class]\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_lsa_query_info_poicy: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
if (argc == 2) {
if (argc == 2)
info_class = atoi(argv[1]);
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_LSARPC)) {
DEBUG(0, ("Could not initialize samr pipe!\n"));
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
result = cli_lsa_open_policy(cli, mem_ctx, True,
SEC_RIGHTS_MAXIMUM_ALLOWED,
&pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_policy_hnd = True;
if (!NT_STATUS_IS_OK(result))
goto done;
/* Lookup info policy */
result = cli_lsa_query_info_policy(cli, mem_ctx, &pol, info_class,
domain_name, &dom_sid);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
sid_to_string(sid_str, &dom_sid);
if (domain_name[0]) {
if (domain_name[0])
printf("domain %s has sid %s\n", domain_name, sid_str);
} else {
else
printf("could not query info for level %d\n", info_class);
}
done:
if (got_policy_hnd) {
cli_lsa_close(cli, mem_ctx, &pol);
}
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
done:
return result;
}
/* Resolve a list of names to a list of sids */
static NTSTATUS cmd_lsa_lookup_names(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_lsa_lookup_names(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
POLICY_HND pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_policy_hnd = False;
DOM_SID *sids;
uint32 *types;
int num_names, i;
TALLOC_CTX *mem_ctx;
if (argc == 1) {
printf("Usage: %s [name1 [name2 [...]]]\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_lsa_lookup_names: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_LSARPC)) {
DEBUG(0, ("Could not initialize samr pipe!\n"));
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
result = cli_lsa_open_policy(cli, mem_ctx, True,
SEC_RIGHTS_MAXIMUM_ALLOWED,
&pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_policy_hnd = True;
if (!NT_STATUS_IS_OK(result))
goto done;
/* Lookup the names */
result = cli_lsa_lookup_names(cli, mem_ctx, &pol, argc - 1,
&argv[1], &sids, &types, &num_names);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
/* Print results */
@ -151,76 +112,52 @@ static NTSTATUS cmd_lsa_lookup_names(struct cli_state *cli, int argc, char **arg
}
done:
if (got_policy_hnd) {
cli_lsa_close(cli, mem_ctx, &pol);
}
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Resolve a list of SIDs to a list of names */
static NTSTATUS cmd_lsa_lookup_sids(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_lsa_lookup_sids(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_policy_hnd = False;
DOM_SID *sids;
char **names;
uint32 *types;
int num_names, i;
TALLOC_CTX *mem_ctx;
if (argc == 1) {
printf("Usage: %s [sid1 [sid2 [...]]]\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_lsa_lookup_sids: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_LSARPC)) {
DEBUG(0, ("Could not initialize samr pipe!\n"));
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
result = cli_lsa_open_policy(cli, mem_ctx, True,
SEC_RIGHTS_MAXIMUM_ALLOWED,
&pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_policy_hnd = True;
if (!NT_STATUS_IS_OK(result))
goto done;
/* Convert arguments to sids */
sids = (DOM_SID *)talloc(mem_ctx, sizeof(DOM_SID) * (argc - 1));
if (!sids) {
printf("out of memory\n");
printf("could not allocate memory for %d sids\n", argc - 1);
goto done;
}
for (i = 0; i < argc - 1; i++) {
for (i = 0; i < argc - 1; i++)
string_to_sid(&sids[i], argv[i + 1]);
}
/* Lookup the SIDs */
result = cli_lsa_lookup_sids(cli, mem_ctx, &pol, argc - 1, sids,
&names, &types, &num_names);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
/* Print results */
@ -232,77 +169,44 @@ static NTSTATUS cmd_lsa_lookup_sids(struct cli_state *cli, int argc, char **argv
"*unknown*", types[i]);
}
#if 0 /* JERRY */
SAFE_FREE(sids);
SAFE_FREE(types);
for (i = 0; i < num_names; i++) {
SAFE_FREE(names[i]);
}
SAFE_FREE(names);
#endif
done:
if (got_policy_hnd) {
cli_lsa_close(cli, mem_ctx, &pol);
}
cli_nt_session_close(cli);
talloc_destroy (mem_ctx);
return result;
}
/* Enumerate list of trusted domains */
static NTSTATUS cmd_lsa_enum_trust_dom(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_lsa_enum_trust_dom(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
POLICY_HND pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_policy_hnd = False;
DOM_SID *domain_sids;
char **domain_names;
uint32 enum_ctx = 0;
uint32 num_domains;
int i;
TALLOC_CTX *mem_ctx;
if (argc != 1) {
printf("Usage: %s\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_lsa_enum_trust_dom: talloc_init failed\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_LSARPC)) {
DEBUG(0, ("Could not initialize samr pipe!\n"));
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
result = cli_lsa_open_policy(cli, mem_ctx, True,
SEC_RIGHTS_MAXIMUM_ALLOWED,
&pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_policy_hnd = True;
if (!NT_STATUS_IS_OK(result))
goto done;
/* Lookup list of trusted domains */
result = cli_lsa_enum_trust_dom(cli, mem_ctx, &pol, &enum_ctx,
&num_domains, &domain_names,
&domain_sids);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
/* Print results */
@ -315,14 +219,6 @@ static NTSTATUS cmd_lsa_enum_trust_dom(struct cli_state *cli, int argc, char **a
}
done:
if (got_policy_hnd) {
cli_lsa_close(cli, mem_ctx, &pol);
}
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
@ -332,10 +228,10 @@ struct cmd_set lsarpc_commands[] = {
{ "LSARPC" },
{ "lsaquery", cmd_lsa_query_info_policy, "Query info policy", "" },
{ "lookupsids", cmd_lsa_lookup_sids, "Convert SIDs to names", "" },
{ "lookupnames", cmd_lsa_lookup_names, "Convert names to SIDs", "" },
{ "enumtrust", cmd_lsa_enum_trust_dom, "Enumerate trusted domains", "" },
{ "lsaquery", cmd_lsa_query_info_policy, PIPE_LSARPC, "Query info policy", "" },
{ "lookupsids", cmd_lsa_lookup_sids, PIPE_LSARPC, "Convert SIDs to names", "" },
{ "lookupnames", cmd_lsa_lookup_names, PIPE_LSARPC, "Convert names to SIDs", "" },
{ "enumtrust", cmd_lsa_enum_trust_dom, PIPE_LSARPC, "Enumerate trusted domains", "" },
{ NULL }
};

View File

@ -21,35 +21,24 @@
*/
#include "includes.h"
#include "rpcclient.h"
static NTSTATUS cmd_netlogon_logon_ctrl2(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_netlogon_logon_ctrl2(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
uint32 query_level = 1;
TALLOC_CTX *mem_ctx;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
if (argc > 1) {
printf("Usage: %s\n", argv[0]);
fprintf(stderr, "Usage: %s\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_srvsvc_srv_query_info: talloc_init failed\n"));
goto done;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETLOGON)) {
DEBUG(0, ("Could not initialize srvsvc pipe!\n"));
goto done;
}
result = cli_netlogon_logon_ctrl2(cli, mem_ctx, query_level);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
/* Display results */
@ -57,32 +46,20 @@ static NTSTATUS cmd_netlogon_logon_ctrl2(struct cli_state *cli, int argc,
return result;
}
static NTSTATUS cmd_netlogon_logon_ctrl(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_netlogon_logon_ctrl(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
#if 0
uint32 query_level = 1;
#endif
TALLOC_CTX *mem_ctx;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
if (argc > 1) {
printf("Usage: %s\n", argv[0]);
fprintf(stderr, "Usage: %s\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_srvsvc_srv_query_info: talloc_init failed\n"));
goto done;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETLOGON)) {
DEBUG(0, ("Could not initialize netlogon pipe!\n"));
goto done;
}
#if 0
result = cli_netlogon_logon_ctrl(cli, mem_ctx, query_level);
if (!NT_STATUS_IS_OK(result)) {
@ -92,7 +69,6 @@ static NTSTATUS cmd_netlogon_logon_ctrl(struct cli_state *cli, int argc,
/* Display results */
done:
return result;
}
@ -110,25 +86,25 @@ static void display_sam_sync(uint32 num_deltas, SAM_DELTA_HDR *hdr_deltas,
unistr2_to_ascii(name,
&deltas[i].domain_info.uni_dom_name,
sizeof(name) - 1);
DEBUG(0, ("Domain: %s\n", name));
printf("Domain: %s\n", name);
break;
case SAM_DELTA_GROUP_INFO:
unistr2_to_ascii(name,
&deltas[i].group_info.uni_grp_name,
sizeof(name) - 1);
DEBUG(0, ("Group: %s\n", name));
printf("Group: %s\n", name);
break;
case SAM_DELTA_ACCOUNT_INFO:
unistr2_to_ascii(name,
&deltas[i].account_info.uni_acct_name,
sizeof(name) - 1);
DEBUG(0, ("Account: %s\n", name));
printf("Account: %s\n", name);
break;
case SAM_DELTA_ALIAS_INFO:
unistr2_to_ascii(name,
&deltas[i].alias_info.uni_als_name,
sizeof(name) - 1);
DEBUG(0, ("Alias: %s\n", name));
printf("Alias: %s\n", name);
break;
case SAM_DELTA_ALIAS_MEM: {
SAM_ALIAS_MEM_INFO *alias = &deltas[i].als_mem_info;
@ -138,7 +114,7 @@ static void display_sam_sync(uint32 num_deltas, SAM_DELTA_HDR *hdr_deltas,
sid_to_string(sid_str, &alias->sids[j].sid);
DEBUG(0, ("%s\n", sid_str));
printf("%s\n", sid_str);
}
break;
}
@ -146,20 +122,20 @@ static void display_sam_sync(uint32 num_deltas, SAM_DELTA_HDR *hdr_deltas,
SAM_GROUP_MEM_INFO *group = &deltas[i].grp_mem_info;
for (j = 0; j < group->num_members; j++)
DEBUG(0, ("rid 0x%x, attrib 0x%08x\n",
group->rids[j], group->attribs[j]));
printf("rid 0x%x, attrib 0x%08x\n",
group->rids[j], group->attribs[j]);
break;
}
case SAM_DELTA_SAM_STAMP: {
SAM_DELTA_STAMP *stamp = &deltas[i].stamp;
DEBUG(0, ("sam sequence update: 0x%04x\n",
stamp->seqnum));
printf("sam sequence update: 0x%04x\n",
stamp->seqnum);
break;
}
default:
DEBUG(0, ("unknown delta type 0x%02x\n",
hdr_deltas[i].type));
printf("unknown delta type 0x%02x\n",
hdr_deltas[i].type);
break;
}
}
@ -167,18 +143,18 @@ static void display_sam_sync(uint32 num_deltas, SAM_DELTA_HDR *hdr_deltas,
/* Perform sam synchronisation */
static NTSTATUS cmd_netlogon_sam_sync(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_netlogon_sam_sync(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
unsigned char trust_passwd[16];
TALLOC_CTX *mem_ctx;
uint32 database_id = 0, num_deltas;
SAM_DELTA_HDR *hdr_deltas;
SAM_DELTA_CTR *deltas;
if (argc > 2) {
printf("Usage: %s [database_id]\n", argv[0]);
fprintf(stderr, "Usage: %s [database_id]\n", argv[0]);
return NT_STATUS_OK;
}
@ -186,34 +162,22 @@ static NTSTATUS cmd_netlogon_sam_sync(struct cli_state *cli, int argc,
database_id = atoi(argv[1]);
if (!secrets_init()) {
DEBUG(0, ("Unable to initialise secrets database\n"));
fprintf(stderr, "Unable to initialise secrets database\n");
return result;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("talloc_init failed\n"));
return result;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETLOGON)) {
DEBUG(0, ("Could not initialize netlogon pipe!\n"));
goto done;
}
/* Initialise session credentials */
if (!secrets_fetch_trust_account_password(lp_workgroup(), trust_passwd,
NULL)) {
DEBUG(0, ("could not fetch trust account password\n"));
fprintf(stderr, "could not fetch trust account password\n");
goto done;
}
result = cli_nt_setup_creds(cli, trust_passwd);
if (!NT_STATUS_IS_OK(result)) {
DEBUG(0, ("Error initialising session creds\n"));
fprintf(stderr, "Error initialising session creds\n");
goto done;
}
@ -221,36 +185,33 @@ static NTSTATUS cmd_netlogon_sam_sync(struct cli_state *cli, int argc,
result = cli_netlogon_sam_sync(cli, mem_ctx, database_id,
&num_deltas, &hdr_deltas, &deltas);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
/* Display results */
display_sam_sync(num_deltas, hdr_deltas, deltas);
done:
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Perform sam delta synchronisation */
static NTSTATUS cmd_netlogon_sam_deltas(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_netlogon_sam_deltas(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
unsigned char trust_passwd[16];
TALLOC_CTX *mem_ctx = NULL;
uint32 database_id, num_deltas, tmp;
SAM_DELTA_HDR *hdr_deltas;
SAM_DELTA_CTR *deltas;
UINT64_S seqnum;
if (argc != 3) {
printf("Usage: %s database_id seqnum\n", argv[0]);
fprintf(stderr, "Usage: %s database_id seqnum\n", argv[0]);
return NT_STATUS_OK;
}
@ -261,34 +222,22 @@ static NTSTATUS cmd_netlogon_sam_deltas(struct cli_state *cli, int argc,
seqnum.high = 0;
if (!secrets_init()) {
DEBUG(0, ("Unable to initialise secrets database\n"));
fprintf(stderr, "Unable to initialise secrets database\n");
goto done;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("talloc_init failed\n"));
goto done;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETLOGON)) {
DEBUG(0, ("Could not initialize netlogon pipe!\n"));
goto done;
}
/* Initialise session credentials */
if (!secrets_fetch_trust_account_password(lp_workgroup(), trust_passwd,
NULL)) {
DEBUG(0, ("could not fetch trust account password\n"));
fprintf(stderr, "could not fetch trust account password\n");
goto done;
}
result = cli_nt_setup_creds(cli, trust_passwd);
if (!NT_STATUS_IS_OK(result)) {
DEBUG(0, ("Error initialising session creds\n"));
fprintf(stderr, "Error initialising session creds\n");
goto done;
}
@ -297,18 +246,15 @@ static NTSTATUS cmd_netlogon_sam_deltas(struct cli_state *cli, int argc,
result = cli_netlogon_sam_deltas(cli, mem_ctx, database_id,
seqnum, &num_deltas,
&hdr_deltas, &deltas);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
/* Display results */
display_sam_sync(num_deltas, hdr_deltas, deltas);
done:
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
@ -318,10 +264,10 @@ struct cmd_set netlogon_commands[] = {
{ "NETLOGON" },
{ "logonctrl2", cmd_netlogon_logon_ctrl2, "Logon Control 2", "" },
{ "logonctrl", cmd_netlogon_logon_ctrl, "Logon Control", "" },
{ "samsync", cmd_netlogon_sam_sync, "Sam Synchronisation", "" },
{ "samdeltas", cmd_netlogon_sam_deltas, "Query Sam Deltas", "" },
{ "logonctrl2", cmd_netlogon_logon_ctrl2, PIPE_NETLOGON, "Logon Control 2", "" },
{ "logonctrl", cmd_netlogon_logon_ctrl, PIPE_NETLOGON, "Logon Control", "" },
{ "samsync", cmd_netlogon_sam_sync, PIPE_NETLOGON, "Sam Synchronisation", "" },
{ "samdeltas", cmd_netlogon_sam_deltas, PIPE_NETLOGON, "Query Sam Deltas", "" },
{ NULL }
};

View File

@ -21,15 +21,8 @@
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#ifdef SYSLOG
#undef SYSLOG
#endif
#include "includes.h"
extern int smb_tidx;
extern FILE* out_hnd;
#include "rpcclient.h"
/*
* keys. of the form:
@ -902,7 +895,8 @@ static void cmd_reg_get_key_sec(struct client_info *info)
/****************************************************************************
nt registry shutdown
****************************************************************************/
static NTSTATUS cmd_reg_shutdown(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_reg_shutdown(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
fstring msg;
@ -911,7 +905,6 @@ static NTSTATUS cmd_reg_shutdown(struct cli_state *cli, int argc, char **argv)
int opt;
int ret;
char *srv_name;
TALLOC_CTX *mem_ctx;
ret = asprintf (&srv_name, "\\\\%s", cli->desthost);
if (ret < 0) {
@ -920,18 +913,6 @@ static NTSTATUS cmd_reg_shutdown(struct cli_state *cli, int argc, char **argv)
}
strupper(srv_name);
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_getprinter: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_WINREG)) {
fprintf (stderr, "Could not initialize winreg pipe!\n");
goto done;
}
*msg = 0;
optind = 0; /* TODO: test if this hack works on other systems too --simo */
@ -974,23 +955,19 @@ static NTSTATUS cmd_reg_shutdown(struct cli_state *cli, int argc, char **argv)
else
DEBUG(5,("cmd_reg_shutdown: query failed\n"));
cli_nt_session_close(cli);
done:
talloc_destroy(mem_ctx);
return result;
}
/****************************************************************************
abort a shutdown
****************************************************************************/
static NTSTATUS cmd_reg_abort_shutdown(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_reg_abort_shutdown(struct cli_state *cli,
TALLOC_CTX *mem_ctx, int argc,
char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
int ret;
char *srv_name;
TALLOC_CTX *mem_ctx;
ret = asprintf(&srv_name, "\\\\%s", cli->desthost);
if (ret < 0) {
@ -999,18 +976,6 @@ static NTSTATUS cmd_reg_abort_shutdown(struct cli_state *cli, int argc, char **a
}
strupper(srv_name);
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_getprinter: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_WINREG)) {
fprintf (stderr, "Could not initialize winreg pipe!\n");
goto done;
}
result = cli_reg_abort_shutdown(cli, mem_ctx, srv_name);
if (NT_STATUS_IS_OK(result))
@ -1018,11 +983,6 @@ static NTSTATUS cmd_reg_abort_shutdown(struct cli_state *cli, int argc, char **a
else
DEBUG(5,("cmd_reg_abort_shutdown: query failed\n"));
cli_nt_session_close(cli);
done:
talloc_destroy(mem_ctx);
return result;
}
@ -1032,10 +992,10 @@ struct cmd_set reg_commands[] = {
{ "REG" },
{ "shutdown", cmd_reg_shutdown, "Remote Shutdown",
{ "shutdown", cmd_reg_shutdown, PIPE_WINREG, "Remote Shutdown",
"[-m message] [-t timeout] [-r] [-f] (-r == reboot, -f == force)" },
{ "abortshutdown", cmd_reg_abort_shutdown, "Abort Shutdown",
{ "abortshutdown", cmd_reg_abort_shutdown, PIPE_WINREG, "Abort Shutdown",
"" },
/*
{ "regenum", cmd_reg_enum, "Registry Enumeration",

View File

@ -24,6 +24,7 @@
*/
#include "includes.h"
#include "rpcclient.h"
extern DOM_SID domain_sid;
@ -138,20 +139,17 @@ void display_sam_info_1(SAM_ENTRY1 *e1, SAM_STR1 *s1)
/**********************************************************************
* Query user information
*/
static NTSTATUS cmd_samr_query_user(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_samr_query_user(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol, user_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
uint32 info_level = 21;
BOOL got_connect_pol = False,
got_domain_pol = False,
got_user_pol = False;
SAM_USERINFO_CTR *user_ctr;
fstring server;
TALLOC_CTX *mem_ctx;
fstring server;
uint32 user_rid;
if (argc != 2) {
printf("Usage: %s rid\n", argv[0]);
return NT_STATUS_OK;
@ -159,68 +157,42 @@ static NTSTATUS cmd_samr_query_user(struct cli_state *cli, int argc, char **argv
sscanf(argv[1], "%i", &user_rid);
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_samr_query_user: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
slprintf (server, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (server);
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
&connect_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_connect_pol = True;
if (!NT_STATUS_IS_OK(result))
goto done;
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
MAXIMUM_ALLOWED_ACCESS,
&domain_sid, &domain_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_domain_pol = True;
if (!NT_STATUS_IS_OK(result))
goto done;
result = cli_samr_open_user(cli, mem_ctx, &domain_pol,
MAXIMUM_ALLOWED_ACCESS,
user_rid, &user_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_user_pol = True;
if (!NT_STATUS_IS_OK(result))
goto done;
ZERO_STRUCT(user_ctr);
result = cli_samr_query_userinfo(cli, mem_ctx, &user_pol,
info_level, &user_ctr);
if (!NT_STATUS_IS_OK(result)) {
if (!NT_STATUS_IS_OK(result))
goto done;
}
display_sam_user_info_21(user_ctr->info.id21);
done:
if (got_user_pol) cli_samr_close(cli, mem_ctx, &user_pol);
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
@ -270,16 +242,15 @@ static void display_group_info_ctr(GROUP_INFO_CTR *ctr)
/***********************************************************************
* Query group information
*/
static NTSTATUS cmd_samr_query_group(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_samr_query_group(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol, group_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
uint32 info_level = 1;
BOOL got_connect_pol = False, got_domain_pol = False,
got_group_pol = False;
GROUP_INFO_CTR group_ctr;
fstring server;
TALLOC_CTX *mem_ctx;
uint32 group_rid;
if (argc != 2) {
@ -289,48 +260,30 @@ static NTSTATUS cmd_samr_query_group(struct cli_state *cli, int argc, char **arg
group_rid = atoi(argv[1]);
if (!(mem_ctx=talloc_init())) {
DEBUG(0,("cmd_samr_query_group: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
slprintf (server, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (server);
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
&connect_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_connect_pol = True;
if (!NT_STATUS_IS_OK(result))
goto done;
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
MAXIMUM_ALLOWED_ACCESS,
&domain_sid, &domain_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_domain_pol = True;
if (!NT_STATUS_IS_OK(result))
goto done;
result = cli_samr_open_group(cli, mem_ctx, &domain_pol,
MAXIMUM_ALLOWED_ACCESS,
group_rid, &group_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_group_pol = True;
if (!NT_STATUS_IS_OK(result))
goto done;
ZERO_STRUCT(group_ctr);
@ -343,56 +296,34 @@ static NTSTATUS cmd_samr_query_group(struct cli_state *cli, int argc, char **arg
display_group_info_ctr(&group_ctr);
done:
if (got_group_pol) cli_samr_close(cli, mem_ctx, &group_pol);
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Query groups a user is a member of */
static NTSTATUS cmd_samr_query_usergroups(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_samr_query_usergroups(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol,
domain_pol,
user_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_connect_pol = False,
got_domain_pol = False,
got_user_pol = False;
uint32 num_groups,
user_rid;
DOM_GID *user_gids;
int i;
fstring server;
TALLOC_CTX *mem_ctx;
if (argc != 2) {
printf("Usage: %s rid\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_samr_query_usergroups: talloc_init returned NULL!\n"));
return NT_STATUS_NO_MEMORY;
}
sscanf(argv[1], "%i", &user_rid);
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
slprintf (server, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (server);
@ -402,8 +333,6 @@ static NTSTATUS cmd_samr_query_usergroups(struct cli_state *cli, int argc, char
goto done;
}
got_connect_pol = True;
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
MAXIMUM_ALLOWED_ACCESS,
&domain_sid, &domain_pol);
@ -411,8 +340,6 @@ static NTSTATUS cmd_samr_query_usergroups(struct cli_state *cli, int argc, char
goto done;
}
got_domain_pol = True;
result = cli_samr_open_user(cli, mem_ctx, &domain_pol,
MAXIMUM_ALLOWED_ACCESS,
user_rid, &user_pol);
@ -420,8 +347,6 @@ static NTSTATUS cmd_samr_query_usergroups(struct cli_state *cli, int argc, char
goto done;
}
got_user_pol = True;
result = cli_samr_query_usergroups(cli, mem_ctx, &user_pol,
&num_groups, &user_gids);
if (!NT_STATUS_IS_OK(result)) {
@ -434,52 +359,30 @@ static NTSTATUS cmd_samr_query_usergroups(struct cli_state *cli, int argc, char
}
done:
if (got_user_pol) cli_samr_close(cli, mem_ctx, &user_pol);
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Query members of a group */
static NTSTATUS cmd_samr_query_groupmem(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_samr_query_groupmem(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol, group_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_connect_pol = False,
got_domain_pol = False,
got_group_pol = False;
uint32 num_members, *group_rids, *group_attrs, group_rid;
int i;
fstring server;
TALLOC_CTX *mem_ctx;
if (argc != 2) {
printf("Usage: %s rid\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_samr_query_groupmem: talloc_init returned NULL!\n"));
return NT_STATUS_NO_MEMORY;
}
sscanf(argv[1], "%i", &group_rid);
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
slprintf (server, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (server);
@ -489,8 +392,6 @@ static NTSTATUS cmd_samr_query_groupmem(struct cli_state *cli, int argc, char **
goto done;
}
got_connect_pol = True;
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
MAXIMUM_ALLOWED_ACCESS,
&domain_sid, &domain_pol);
@ -498,8 +399,6 @@ static NTSTATUS cmd_samr_query_groupmem(struct cli_state *cli, int argc, char **
goto done;
}
got_domain_pol = True;
result = cli_samr_open_group(cli, mem_ctx, &domain_pol,
MAXIMUM_ALLOWED_ACCESS,
group_rid, &group_pol);
@ -507,8 +406,6 @@ static NTSTATUS cmd_samr_query_groupmem(struct cli_state *cli, int argc, char **
goto done;
}
got_group_pol = True;
result = cli_samr_query_groupmem(cli, mem_ctx, &group_pol,
&num_members, &group_rids,
&group_attrs);
@ -522,25 +419,17 @@ static NTSTATUS cmd_samr_query_groupmem(struct cli_state *cli, int argc, char **
}
done:
if (got_group_pol) cli_samr_close(cli, mem_ctx, &group_pol);
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Enumerate domain groups */
static NTSTATUS cmd_samr_enum_dom_groups(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_enum_dom_groups(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_connect_pol = False, got_domain_pol = False;
TALLOC_CTX *mem_ctx;
uint32 start_idx, size, num_dom_groups, i;
struct acct_info *dom_groups;
@ -549,22 +438,8 @@ static NTSTATUS cmd_samr_enum_dom_groups(struct cli_state *cli, int argc,
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("cmd_samr_enum_dom_groups: talloc_init returned "
"NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Get sam policy handle */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
@ -573,8 +448,6 @@ static NTSTATUS cmd_samr_enum_dom_groups(struct cli_state *cli, int argc,
goto done;
}
got_connect_pol = True;
/* Get domain policy handle */
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
@ -584,8 +457,6 @@ static NTSTATUS cmd_samr_enum_dom_groups(struct cli_state *cli, int argc,
goto done;
}
got_domain_pol = True;
/* Enumerate domain groups */
start_idx = 0;
@ -600,24 +471,16 @@ static NTSTATUS cmd_samr_enum_dom_groups(struct cli_state *cli, int argc,
dom_groups[i].rid);
done:
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Query alias membership */
static NTSTATUS cmd_samr_query_aliasmem(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_query_aliasmem(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol, alias_pol;
BOOL got_connect_pol = False, got_domain_pol = False,
got_alias_pol = False;
TALLOC_CTX *mem_ctx;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
uint32 alias_rid, num_members, i;
DOM_SID *alias_sids;
@ -627,24 +490,10 @@ static NTSTATUS cmd_samr_query_aliasmem(struct cli_state *cli, int argc,
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init())) {
DEBUG(0,("cmd_samr_query_aliasmem: talloc_init() "
"returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
sscanf(argv[1], "%i", &alias_rid);
/* Initialise RPC connection */
fetch_domain_sid(cli);
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Open SAMR handle */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
@ -653,8 +502,6 @@ static NTSTATUS cmd_samr_query_aliasmem(struct cli_state *cli, int argc,
goto done;
}
got_connect_pol = True;
/* Open handle on domain */
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
@ -664,8 +511,6 @@ static NTSTATUS cmd_samr_query_aliasmem(struct cli_state *cli, int argc,
goto done;
}
got_domain_pol = True;
/* Open handle on alias */
result = cli_samr_open_alias(cli, mem_ctx, &domain_pol,
@ -675,8 +520,6 @@ static NTSTATUS cmd_samr_query_aliasmem(struct cli_state *cli, int argc,
goto done;
}
got_alias_pol = True;
result = cli_samr_query_aliasmem(cli, mem_ctx, &alias_pol,
&num_members, &alias_sids);
if (!NT_STATUS_IS_OK(result)) {
@ -691,25 +534,17 @@ static NTSTATUS cmd_samr_query_aliasmem(struct cli_state *cli, int argc,
}
done:
if (got_alias_pol) cli_samr_close(cli, mem_ctx, &alias_pol);
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Query display info */
static NTSTATUS cmd_samr_query_dispinfo(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_query_dispinfo(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_connect_pol = False, got_domain_pol = False;
TALLOC_CTX *mem_ctx;
uint32 start_idx, max_entries, num_entries, i;
uint16 info_level = 1;
SAM_DISPINFO_CTR ctr;
@ -720,22 +555,8 @@ static NTSTATUS cmd_samr_query_dispinfo(struct cli_state *cli, int argc,
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("cmd_samr_query_dispinfo: talloc_init returned "
"NULL!\n"));
return NT_STATUS_NO_MEMORY;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Get sam policy handle */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
@ -744,8 +565,6 @@ static NTSTATUS cmd_samr_query_dispinfo(struct cli_state *cli, int argc,
goto done;
}
got_connect_pol = True;
/* Get domain policy handle */
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
@ -755,8 +574,6 @@ static NTSTATUS cmd_samr_query_dispinfo(struct cli_state *cli, int argc,
goto done;
}
got_domain_pol = True;
/* Query display info */
start_idx = 0;
@ -777,24 +594,17 @@ static NTSTATUS cmd_samr_query_dispinfo(struct cli_state *cli, int argc,
}
done:
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Query domain info */
static NTSTATUS cmd_samr_query_dominfo(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_query_dominfo(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_connect_pol = False, got_domain_pol = False;
TALLOC_CTX *mem_ctx;
uint16 switch_value = 2;
SAM_UNK_CTR ctr;
@ -806,22 +616,8 @@ static NTSTATUS cmd_samr_query_dominfo(struct cli_state *cli, int argc,
if (argc == 2)
switch_value = atoi(argv[1]);
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("cmd_samr_query_dispinfo: talloc_init returned "
"NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Get sam policy handle */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
@ -830,8 +626,6 @@ static NTSTATUS cmd_samr_query_dominfo(struct cli_state *cli, int argc,
goto done;
}
got_connect_pol = True;
/* Get domain policy handle */
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
@ -841,8 +635,6 @@ static NTSTATUS cmd_samr_query_dominfo(struct cli_state *cli, int argc,
goto done;
}
got_domain_pol = True;
/* Query domain info */
result = cli_samr_query_dom_info(cli, mem_ctx, &domain_pol,
@ -864,25 +656,17 @@ static NTSTATUS cmd_samr_query_dominfo(struct cli_state *cli, int argc,
}
done:
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Create domain user */
static NTSTATUS cmd_samr_create_dom_user(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_create_dom_user(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND connect_pol, domain_pol, user_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
BOOL got_connect_pol = False, got_domain_pol = False,
got_user_pol = False;
TALLOC_CTX *mem_ctx;
char *acct_name;
uint16 acb_info;
uint32 unknown, user_rid;
@ -894,22 +678,8 @@ static NTSTATUS cmd_samr_create_dom_user(struct cli_state *cli, int argc,
acct_name = argv[1];
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("cmd_samr_query_dispinfo: talloc_init returned "
"NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Get sam policy handle */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
@ -918,8 +688,6 @@ static NTSTATUS cmd_samr_create_dom_user(struct cli_state *cli, int argc,
goto done;
}
got_connect_pol = True;
/* Get domain policy handle */
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
@ -929,8 +697,6 @@ static NTSTATUS cmd_samr_create_dom_user(struct cli_state *cli, int argc,
goto done;
}
got_domain_pol = True;
/* Create domain user */
acb_info = ACB_NORMAL;
@ -943,29 +709,19 @@ static NTSTATUS cmd_samr_create_dom_user(struct cli_state *cli, int argc,
goto done;
}
got_user_pol = True;
done:
if (got_user_pol) cli_samr_close(cli, mem_ctx, &user_pol);
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Lookup sam names */
static NTSTATUS cmd_samr_lookup_names(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_lookup_names(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
POLICY_HND connect_pol, domain_pol;
BOOL got_connect_pol = False, got_domain_pol = False;
uint32 flags = 0x000003e8;
uint32 flags = 0x000003e8; /* Unknown */
uint32 num_rids, num_names, *name_types, *rids;
char **names;
int i;
@ -975,40 +731,25 @@ static NTSTATUS cmd_samr_lookup_names(struct cli_state *cli, int argc,
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("cmd_samr_lookup_names: talloc_init failed\n"));
return result;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Get sam policy and domain handles */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
&connect_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_connect_pol = True;
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
MAXIMUM_ALLOWED_ACCESS,
&domain_sid, &domain_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_domain_pol = True;
/* Look up names */
num_names = argc - 1;
@ -1020,6 +761,7 @@ static NTSTATUS cmd_samr_lookup_names(struct cli_state *cli, int argc,
result = cli_samr_lookup_names(cli, mem_ctx, &domain_pol,
flags, num_names, names,
&num_rids, &rids, &name_types);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -1031,25 +773,18 @@ static NTSTATUS cmd_samr_lookup_names(struct cli_state *cli, int argc,
name_types[i]);
done:
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Lookup sam rids */
static NTSTATUS cmd_samr_lookup_rids(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_lookup_rids(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
POLICY_HND connect_pol, domain_pol;
BOOL got_connect_pol = False, got_domain_pol = False;
uint32 flags = 0x000003e8;
uint32 flags = 0x000003e8; /* Unknown */
uint32 num_rids, num_names, *rids, *name_types;
char **names;
int i;
@ -1059,40 +794,25 @@ static NTSTATUS cmd_samr_lookup_rids(struct cli_state *cli, int argc,
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("cmd_samr_lookup_rids: talloc_init failed\n"));
return result;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
fprintf (stderr, "Could not initialize samr pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Get sam policy and domain handles */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
&connect_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_connect_pol = True;
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
MAXIMUM_ALLOWED_ACCESS,
&domain_sid, &domain_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
got_domain_pol = True;
/* Look up rids */
num_rids = argc - 1;
@ -1104,6 +824,7 @@ static NTSTATUS cmd_samr_lookup_rids(struct cli_state *cli, int argc,
result = cli_samr_lookup_rids(cli, mem_ctx, &domain_pol,
flags, num_rids, rids,
&num_names, &names, &name_types);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -1114,21 +835,15 @@ static NTSTATUS cmd_samr_lookup_rids(struct cli_state *cli, int argc,
printf("rid %x: %s (%d)\n", rids[i], names[i], name_types[i]);
done:
if (got_domain_pol) cli_samr_close(cli, mem_ctx, &domain_pol);
if (got_connect_pol) cli_samr_close(cli, mem_ctx, &connect_pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Delete domain user */
static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
TALLOC_CTX *mem_ctx;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
POLICY_HND connect_pol, domain_pol, user_pol;
@ -1137,25 +852,13 @@ static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli, int argc,
return NT_STATUS_OK;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("cmd_samr_delete_dom_user: talloc_init failed\n"));
return result;
}
fetch_domain_sid(cli);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SAMR)) {
DEBUG(0, ("cmd_samr_delete_dom_user: could not open samr pipe!\n"));
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Get sam policy and domain handles */
result = cli_samr_connect(cli, mem_ctx, MAXIMUM_ALLOWED_ACCESS,
&connect_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -1163,6 +866,7 @@ static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli, int argc,
result = cli_samr_open_domain(cli, mem_ctx, &connect_pol,
MAXIMUM_ALLOWED_ACCESS,
&domain_sid, &domain_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -1171,12 +875,13 @@ static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli, int argc,
{
uint32 *user_rids, num_rids, *name_types;
uint32 flags = 0x000003e8;
uint32 flags = 0x000003e8; /* Unknown */
result = cli_samr_lookup_names(cli, mem_ctx, &domain_pol,
flags, 1, &argv[1],
&num_rids, &user_rids,
&name_types);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -1184,6 +889,7 @@ static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli, int argc,
result = cli_samr_open_user(cli, mem_ctx, &domain_pol,
MAXIMUM_ALLOWED_ACCESS,
user_rids[0], &user_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -1192,6 +898,7 @@ static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli, int argc,
/* Delete user */
result = cli_samr_delete_dom_user(cli, mem_ctx, &user_pol);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -1199,9 +906,6 @@ static NTSTATUS cmd_samr_delete_dom_user(struct cli_state *cli, int argc,
/* Display results */
done:
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}

View File

@ -24,11 +24,7 @@
*/
#include "includes.h"
extern pstring server;
extern pstring global_myname;
extern pstring username, password;
extern pstring workgroup;
#include "rpcclient.h"
struct table_node {
char *long_archi;
@ -78,8 +74,9 @@ BOOL get_short_archi(char *short_archi, char *long_archi)
/**********************************************************************
* dummy function -- placeholder
*/
static NTSTATUS cmd_spoolss_not_implemented (struct cli_state *cli,
int argc, char **argv)
static NTSTATUS cmd_spoolss_not_implemented(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
printf ("(*) This command is not currently implemented.\n");
return NT_STATUS_OK;
@ -140,13 +137,14 @@ static void display_sec_desc(SEC_DESC *sec)
/***********************************************************************
* Get printer information
*/
static NTSTATUS cmd_spoolss_open_printer_ex(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_open_printer_ex(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
pstring printername;
fstring servername, user;
POLICY_HND hnd;
TALLOC_CTX *mem_ctx;
if (argc != 2) {
printf("Usage: %s <printername>\n", argv[0]);
@ -156,26 +154,11 @@ static NTSTATUS cmd_spoolss_open_printer_ex(struct cli_state *cli, int argc, cha
if (!cli)
return NT_STATUS_UNSUCCESSFUL;
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_open_printer_ex: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
slprintf (servername, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (servername);
fstrcpy (user, cli->user_name);
fstrcpy (printername, argv[1]);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS)) {
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Open the printer handle */
result = cli_spoolss_open_printer_ex (cli, mem_ctx, printername, "",
MAXIMUM_ALLOWED_ACCESS, servername, user, &hnd);
@ -188,9 +171,6 @@ static NTSTATUS cmd_spoolss_open_printer_ex(struct cli_state *cli, int argc, cha
}
}
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
@ -330,14 +310,15 @@ static void display_print_info_3(PRINTER_INFO_3 *i3)
/* Enumerate printers */
static NTSTATUS cmd_spoolss_enum_printers(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_enum_printers(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
uint32 info_level = 1;
PRINTER_INFO_CTR ctr;
int returned;
uint32 i = 0;
TALLOC_CTX *mem_ctx;
if (argc > 2)
{
@ -345,24 +326,10 @@ static NTSTATUS cmd_spoolss_enum_printers(struct cli_state *cli, int argc, char
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_enum_printers: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
if (argc == 2) {
info_level = atoi(argv[1]);
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS)) {
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Enumerate printers -- Should we enumerate types other
than PRINTER_ENUM_LOCAL? Maybe accept as a parameter? --jerry */
ZERO_STRUCT(ctr);
@ -401,9 +368,6 @@ static NTSTATUS cmd_spoolss_enum_printers(struct cli_state *cli, int argc, char
}
}
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
@ -440,37 +404,24 @@ static void display_port_info_2(PORT_INFO_2 *i2)
/* Enumerate ports */
static NTSTATUS cmd_spoolss_enum_ports(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_enum_ports(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
uint32 info_level = 1;
PORT_INFO_CTR ctr;
int returned;
TALLOC_CTX *mem_ctx;
if (argc > 2) {
printf("Usage: %s [level]\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_enum_ports: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
if (argc == 2) {
info_level = atoi(argv[1]);
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS)) {
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Enumerate ports */
ZERO_STRUCT(ctr);
@ -494,16 +445,15 @@ static NTSTATUS cmd_spoolss_enum_ports(struct cli_state *cli, int argc, char **a
}
}
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/***********************************************************************
* Get printer information
*/
static NTSTATUS cmd_spoolss_getprinter(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_getprinter(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND pol;
NTSTATUS result;
@ -513,27 +463,12 @@ static NTSTATUS cmd_spoolss_getprinter(struct cli_state *cli, int argc, char **a
fstring printername,
servername,
user;
TALLOC_CTX *mem_ctx;
if (argc == 1 || argc > 3) {
printf("Usage: %s <printername> [level]\n", argv[0]);
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_getprinter: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS)) {
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Open a printer handle */
if (argc == 3) {
info_level = atoi(argv[2]);
@ -584,9 +519,6 @@ static NTSTATUS cmd_spoolss_getprinter(struct cli_state *cli, int argc, char **a
if (opened_hnd)
cli_spoolss_close_printer(cli, mem_ctx, &pol);
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
@ -703,7 +635,9 @@ static void display_print_driver_3(DRIVER_INFO_3 *i1)
/***********************************************************************
* Get printer information
*/
static NTSTATUS cmd_spoolss_getdriver(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_getdriver(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND pol;
NTSTATUS result;
@ -714,7 +648,6 @@ static NTSTATUS cmd_spoolss_getdriver(struct cli_state *cli, int argc, char **ar
servername,
user;
uint32 i;
TALLOC_CTX *mem_ctx;
if ((argc == 1) || (argc > 3))
{
@ -722,20 +655,6 @@ static NTSTATUS cmd_spoolss_getdriver(struct cli_state *cli, int argc, char **ar
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_getdriver: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS))
{
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* get the arguments need to open the printer handle */
slprintf (servername, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (servername);
@ -783,12 +702,9 @@ static NTSTATUS cmd_spoolss_getdriver(struct cli_state *cli, int argc, char **ar
}
}
/* cleanup */
if (opened_hnd)
cli_spoolss_close_printer (cli, mem_ctx, &pol);
cli_nt_session_close (cli);
talloc_destroy(mem_ctx);
return result;
@ -797,7 +713,9 @@ static NTSTATUS cmd_spoolss_getdriver(struct cli_state *cli, int argc, char **ar
/***********************************************************************
* Get printer information
*/
static NTSTATUS cmd_spoolss_enum_drivers(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_enum_drivers(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result = NT_STATUS_OK;
uint32 info_level = 1;
@ -805,7 +723,6 @@ static NTSTATUS cmd_spoolss_enum_drivers(struct cli_state *cli, int argc, char *
fstring servername;
uint32 i, j,
returned;
TALLOC_CTX *mem_ctx;
if (argc > 2)
{
@ -813,20 +730,6 @@ static NTSTATUS cmd_spoolss_enum_drivers(struct cli_state *cli, int argc, char *
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_enum_drivers: talloc_init returned NULL!\n"));
return NT_STATUS_NO_MEMORY;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS))
{
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* get the arguments need to open the printer handle */
slprintf (servername, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (servername);
@ -877,11 +780,6 @@ static NTSTATUS cmd_spoolss_enum_drivers(struct cli_state *cli, int argc, char *
}
}
/* cleanup */
cli_nt_session_close (cli);
talloc_destroy(mem_ctx);
return result;
}
@ -902,12 +800,13 @@ static void display_printdriverdir_1(DRIVER_DIRECTORY_1 *i1)
/***********************************************************************
* Get printer driver directory information
*/
static NTSTATUS cmd_spoolss_getdriverdir(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_getdriverdir(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result;
fstring env;
DRIVER_DIRECTORY_CTR ctr;
TALLOC_CTX *mem_ctx;
if (argc > 2)
{
@ -915,20 +814,6 @@ static NTSTATUS cmd_spoolss_getdriverdir(struct cli_state *cli, int argc, char *
return NT_STATUS_OK;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS))
{
fprintf (stderr, "Could not initialize spoolss pipe!\n");
return NT_STATUS_UNSUCCESSFUL;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_getdriverdir: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* get the arguments need to open the printer handle */
if (argc == 2)
fstrcpy (env, argv[1]);
@ -944,12 +829,7 @@ static NTSTATUS cmd_spoolss_getdriverdir(struct cli_state *cli, int argc, char *
display_printdriverdir_1 (ctr.info1);
/* cleanup */
cli_nt_session_close (cli);
talloc_destroy(mem_ctx);
return result;
}
/*******************************************************************************
@ -1060,7 +940,9 @@ static BOOL init_drv_info_3_members (
}
static NTSTATUS cmd_spoolss_addprinterdriver (struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_addprinterdriver(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result;
uint32 level = 3;
@ -1068,7 +950,6 @@ static NTSTATUS cmd_spoolss_addprinterdriver (struct cli_state *cli, int argc, c
DRIVER_INFO_3 info3;
fstring arch;
fstring driver_name;
TALLOC_CTX *mem_ctx = NULL;
/* parse the command arguements */
if (argc != 3)
@ -1080,21 +961,6 @@ static NTSTATUS cmd_spoolss_addprinterdriver (struct cli_state *cli, int argc, c
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_addprinterdriver: talloc_init returned NULL!\n"));
return NT_STATUS_NO_MEMORY;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS))
{
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Fill in the DRIVER_INFO_3 struct */
ZERO_STRUCT(info3);
@ -1122,23 +988,19 @@ static NTSTATUS cmd_spoolss_addprinterdriver (struct cli_state *cli, int argc, c
rpcstr_pull(driver_name, info3.name.buffer, sizeof(driver_name), 0, STR_TERMINATE);
printf ("Printer Driver %s successfully installed.\n", driver_name);
/* cleanup */
cli_nt_session_close (cli);
talloc_destroy(mem_ctx);
return result;
}
static NTSTATUS cmd_spoolss_addprinterex (struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_addprinterex(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result;
uint32 level = 2;
PRINTER_INFO_CTR ctr;
PRINTER_INFO_2 info2;
fstring servername;
TALLOC_CTX *mem_ctx = NULL;
/* parse the command arguements */
if (argc != 5)
@ -1147,25 +1009,9 @@ static NTSTATUS cmd_spoolss_addprinterex (struct cli_state *cli, int argc, char
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_addprinterex: talloc_init returned NULL!\n"));
return NT_STATUS_NO_MEMORY;
}
slprintf (servername, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (servername);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS))
{
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* Fill in the DRIVER_INFO_3 struct */
ZERO_STRUCT(info2);
#if 0 /* JERRY */
@ -1197,21 +1043,17 @@ static NTSTATUS cmd_spoolss_addprinterex (struct cli_state *cli, int argc, char
ctr.printers_2 = &info2;
result = cli_spoolss_addprinterex (cli, mem_ctx, level, &ctr);
if (!NT_STATUS_IS_OK(result)) {
cli_nt_session_close (cli);
return result;
}
printf ("Printer %s successfully installed.\n", argv[1]);
/* cleanup */
cli_nt_session_close (cli);
talloc_destroy(mem_ctx);
return result;
}
static NTSTATUS cmd_spoolss_setdriver (struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_setdriver(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
POLICY_HND pol;
NTSTATUS result;
@ -1222,7 +1064,6 @@ static NTSTATUS cmd_spoolss_setdriver (struct cli_state *cli, int argc, char **a
fstring servername,
printername,
user;
TALLOC_CTX *mem_ctx = NULL;
/* parse the command arguements */
if (argc != 3)
@ -1231,26 +1072,11 @@ static NTSTATUS cmd_spoolss_setdriver (struct cli_state *cli, int argc, char **a
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_setdriver: talloc_init returned NULL!\n"));
return NT_STATUS_NO_MEMORY;
}
slprintf (servername, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (servername);
slprintf (printername, sizeof(fstring)-1, "%s\\%s", servername, argv[1]);
fstrcpy (user, cli->user_name);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS))
{
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* get a printer handle */
result = cli_spoolss_open_printer_ex(cli, mem_ctx, printername, "",
MAXIMUM_ALLOWED_ACCESS, servername, user, &pol);
@ -1283,18 +1109,17 @@ done:
/* cleanup */
if (opened_hnd)
cli_spoolss_close_printer(cli, mem_ctx, &pol);
cli_nt_session_close (cli);
talloc_destroy(mem_ctx);
return result;
}
static NTSTATUS cmd_spoolss_deletedriver (struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_spoolss_deletedriver(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
fstring servername;
TALLOC_CTX *mem_ctx = NULL;
int i;
/* parse the command arguements */
@ -1304,23 +1129,9 @@ static NTSTATUS cmd_spoolss_deletedriver (struct cli_state *cli, int argc, char
return NT_STATUS_OK;
}
if (!(mem_ctx=talloc_init()))
{
DEBUG(0,("cmd_spoolss_deletedriver: talloc_init returned NULL!\n"));
return NT_STATUS_UNSUCCESSFUL;
}
slprintf (servername, sizeof(fstring)-1, "\\\\%s", cli->desthost);
strupper (servername);
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SPOOLSS))
{
fprintf (stderr, "Could not initialize spoolss pipe!\n");
talloc_destroy(mem_ctx);
return NT_STATUS_UNSUCCESSFUL;
}
/* delete the driver for all architectures */
for (i=0; archi_table[i].long_archi; i++)
{
@ -1335,11 +1146,6 @@ static NTSTATUS cmd_spoolss_deletedriver (struct cli_state *cli, int argc, char
printf ("Driver %s removed for arch [%s].\n", argv[1], archi_table[i].long_archi);
}
/* cleanup */
cli_nt_session_close (cli);
talloc_destroy(mem_ctx);
return NT_STATUS_OK;
}
@ -1349,20 +1155,20 @@ struct cmd_set spoolss_commands[] = {
{ "SPOOLSS" },
{ "adddriver", cmd_spoolss_addprinterdriver, "Add a print driver", "" },
{ "addprinter", cmd_spoolss_addprinterex, "Add a printer", "" },
{ "deldriver", cmd_spoolss_deletedriver, "Delete a printer driver", "" },
{ "enumdata", cmd_spoolss_not_implemented, "Enumerate printer data (*)", "" },
{ "enumjobs", cmd_spoolss_not_implemented, "Enumerate print jobs (*)", "" },
{ "enumports", cmd_spoolss_enum_ports, "Enumerate printer ports", "" },
{ "enumdrivers", cmd_spoolss_enum_drivers, "Enumerate installed printer drivers", "" },
{ "enumprinters", cmd_spoolss_enum_printers, "Enumerate printers", "" },
{ "getdata", cmd_spoolss_not_implemented, "Get print driver data (*)", "" },
{ "getdriver", cmd_spoolss_getdriver, "Get print driver information", "" },
{ "getdriverdir", cmd_spoolss_getdriverdir, "Get print driver upload directory", "" },
{ "getprinter", cmd_spoolss_getprinter, "Get printer info", "" },
{ "openprinter", cmd_spoolss_open_printer_ex, "Open printer handle", "" },
{ "setdriver", cmd_spoolss_setdriver, "Set printer driver", "" },
{ "adddriver", cmd_spoolss_addprinterdriver, PIPE_SPOOLSS, "Add a print driver", "" },
{ "addprinter", cmd_spoolss_addprinterex, PIPE_SPOOLSS, "Add a printer", "" },
{ "deldriver", cmd_spoolss_deletedriver, PIPE_SPOOLSS, "Delete a printer driver", "" },
{ "enumdata", cmd_spoolss_not_implemented, PIPE_SPOOLSS, "Enumerate printer data (*)", "" },
{ "enumjobs", cmd_spoolss_not_implemented, PIPE_SPOOLSS, "Enumerate print jobs (*)", "" },
{ "enumports", cmd_spoolss_enum_ports, PIPE_SPOOLSS, "Enumerate printer ports", "" },
{ "enumdrivers", cmd_spoolss_enum_drivers, PIPE_SPOOLSS, "Enumerate installed printer drivers", "" },
{ "enumprinters", cmd_spoolss_enum_printers, PIPE_SPOOLSS, "Enumerate printers", "" },
{ "getdata", cmd_spoolss_not_implemented, PIPE_SPOOLSS, "Get print driver data (*)", "" },
{ "getdriver", cmd_spoolss_getdriver, PIPE_SPOOLSS, "Get print driver information", "" },
{ "getdriverdir", cmd_spoolss_getdriverdir, PIPE_SPOOLSS, "Get print driver upload directory", "" },
{ "getprinter", cmd_spoolss_getprinter, PIPE_SPOOLSS, "Get printer info", "" },
{ "openprinter", cmd_spoolss_open_printer_ex, PIPE_SPOOLSS, "Open printer handle", "" },
{ "setdriver", cmd_spoolss_setdriver, PIPE_SPOOLSS, "Set printer driver", "" },
{ NULL }
};

View File

@ -23,6 +23,7 @@
*/
#include "includes.h"
#include "rpcclient.h"
/* Display server query info */
@ -180,12 +181,12 @@ static void display_srv_info_102(SRV_INFO_102 *sv102)
/* Server query info */
static NTSTATUS cmd_srvsvc_srv_query_info(struct cli_state *cli, int argc,
char **argv)
static NTSTATUS cmd_srvsvc_srv_query_info(struct cli_state *cli,
TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
uint32 info_level = 101;
SRV_INFO_CTR ctr;
TALLOC_CTX *mem_ctx;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
if (argc > 2) {
@ -196,20 +197,9 @@ static NTSTATUS cmd_srvsvc_srv_query_info(struct cli_state *cli, int argc,
if (argc == 2)
info_level = atoi(argv[1]);
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("cmd_srvsvc_srv_query_info: talloc_init failed\n"));
return result;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_SRVSVC)) {
DEBUG(0, ("Could not initialize srvsvc pipe!\n"));
goto done;
}
result = cli_srvsvc_net_srv_get_info(cli, mem_ctx, info_level,
&ctr);
if (!NT_STATUS_IS_OK(result)) {
goto done;
}
@ -229,8 +219,6 @@ static NTSTATUS cmd_srvsvc_srv_query_info(struct cli_state *cli, int argc,
}
done:
talloc_destroy(mem_ctx);
return result;
}
@ -240,7 +228,7 @@ struct cmd_set srvsvc_commands[] = {
{ "SRVSVC" },
{ "srvinfo", cmd_srvsvc_srv_query_info, "Server query info", "" },
{ "srvinfo", cmd_srvsvc_srv_query_info, PIPE_SRVSVC, "Server query info", "" },
{ NULL }
};

View File

@ -21,6 +21,7 @@
*/
#include "includes.h"
#include "rpcclient.h"
extern pstring debugf;
@ -266,7 +267,8 @@ void init_rpcclient_creds(struct ntuser_creds *creds, char* username,
/* Display help on commands */
static NTSTATUS cmd_help(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_help(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
struct cmd_list *tmp;
struct cmd_set *tmp_set;
@ -324,7 +326,8 @@ static NTSTATUS cmd_help(struct cli_state *cli, int argc, char **argv)
/* Change the debug level */
static NTSTATUS cmd_debuglevel(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_debuglevel(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
if (argc > 2) {
printf("Usage: %s [debuglevel]\n", argv[0]);
@ -340,7 +343,8 @@ static NTSTATUS cmd_debuglevel(struct cli_state *cli, int argc, char **argv)
return NT_STATUS_OK;
}
static NTSTATUS cmd_quit(struct cli_state *cli, int argc, char **argv)
static NTSTATUS cmd_quit(struct cli_state *cli, TALLOC_CTX *mem_ctx,
int argc, char **argv)
{
exit(0);
return NT_STATUS_OK; /* NOTREACHED */
@ -389,7 +393,7 @@ static struct cmd_set *rpcclient_command_list[] = {
NULL
};
void add_command_set(struct cmd_set *cmd_set)
static void add_command_set(struct cmd_set *cmd_set)
{
struct cmd_list *entry;
@ -404,10 +408,11 @@ void add_command_set(struct cmd_set *cmd_set)
DLIST_ADD(cmd_list, entry);
}
static NTSTATUS do_cmd(struct cli_state *cli, struct cmd_set *cmd_entry, char *cmd)
static NTSTATUS do_cmd(struct cli_state *cli, struct cmd_set *cmd_entry,
char *cmd)
{
char *p = cmd, **argv = NULL;
NTSTATUS result;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
pstring buf;
int argc = 0, i;
@ -428,10 +433,12 @@ static NTSTATUS do_cmd(struct cli_state *cli, struct cmd_set *cmd_entry, char *c
/* Create argument list */
argv = (char **)malloc(sizeof(char *) * argc);
memset(argv, 0, sizeof(char *) * argc);
if (!argv) {
fprintf(stderr, "out of memory\n");
return NT_STATUS_NO_MEMORY;
result = NT_STATUS_NO_MEMORY;
goto done;
}
p = cmd;
@ -441,21 +448,52 @@ static NTSTATUS do_cmd(struct cli_state *cli, struct cmd_set *cmd_entry, char *c
}
/* Call the function */
if (cmd_entry->fn) {
result = cmd_entry->fn(cli, argc, argv);
}
else {
fprintf (stderr, "Invalid command\n");
result = NT_STATUS_INVALID_PARAMETER;
}
if (cmd_entry->fn) {
TALLOC_CTX *mem_ctx;
/* Create mem_ctx */
if (!(mem_ctx = talloc_init())) {
DEBUG(0, ("talloc_init() failed\n"));
goto done;
}
/* Open pipe */
if (cmd_entry->pipe)
if (!cli_nt_session_open(cli, cmd_entry->pipe)) {
DEBUG(0, ("Could not initialise %s\n",
cmd_entry->pipe));
goto done;
}
/* Run command */
result = cmd_entry->fn(cli, mem_ctx, argc, argv);
/* Cleanup */
if (cmd_entry->pipe)
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
} else {
fprintf (stderr, "Invalid command\n");
goto done;
}
done:
/* Cleanup */
for (i = 0; i < argc; i++) {
SAFE_FREE(argv[i]);
}
if (argv) {
for (i = 0; i < argc; i++)
SAFE_FREE(argv[i]);
SAFE_FREE(argv);
SAFE_FREE(argv);
}
return result;
}
@ -490,8 +528,9 @@ static NTSTATUS process_cmd(struct cli_state *cli, char *cmd)
while(temp_set->name) {
if (strequal(buf, temp_set->name)) {
found = True;
found = True;
result = do_cmd(cli, temp_set, cmd);
goto done;
}
temp_set++;