mirror of
https://github.com/samba-team/samba.git
synced 2024-12-22 13:34:15 +03:00
s3-rpc_cli: pass down ndr_interface_table to cli_rpc_pipe_open_noauth().
Guenther Signed-off-by: Günther Deschner <gd@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
This commit is contained in:
parent
3dc3a6c848
commit
9813fe2b04
@ -119,7 +119,7 @@ static NTSTATUS connect_to_domain_password_server(struct cli_state **cli,
|
||||
DCERPC_AUTH_LEVEL_PRIVACY, domain, &netlogon_pipe);
|
||||
} else {
|
||||
result = cli_rpc_pipe_open_noauth(
|
||||
*cli, &ndr_table_netlogon.syntax_id, &netlogon_pipe);
|
||||
*cli, &ndr_table_netlogon, &netlogon_pipe);
|
||||
}
|
||||
|
||||
if (!NT_STATUS_IS_OK(result)) {
|
||||
|
@ -4218,7 +4218,7 @@ static bool browse_host_rpc(bool sort)
|
||||
int i;
|
||||
struct dcerpc_binding_handle *b;
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc,
|
||||
&pipe_hnd);
|
||||
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
|
@ -202,7 +202,7 @@ static NTSTATUS pipe_cm_connect(TALLOC_CTX *mem_ctx,
|
||||
return NT_STATUS_NO_MEMORY;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(ipc->cli, &table->syntax_id, &p->pipe);
|
||||
status = cli_rpc_pipe_open_noauth(ipc->cli, table, &p->pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
TALLOC_FREE(p);
|
||||
return status;
|
||||
|
@ -734,7 +734,7 @@ static NTSTATUS libnet_join_lookup_dc_rpc(TALLOC_CTX *mem_ctx,
|
||||
goto done;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(*cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(*cli, &ndr_table_lsarpc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0,("Error connecting to LSA pipe. Error was %s\n",
|
||||
@ -804,7 +804,7 @@ static NTSTATUS libnet_join_joindomain_rpc_unsecure(TALLOC_CTX *mem_ctx,
|
||||
fstring trust_passwd;
|
||||
NTSTATUS status;
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
return status;
|
||||
@ -893,7 +893,7 @@ static NTSTATUS libnet_join_joindomain_rpc(TALLOC_CTX *mem_ctx,
|
||||
|
||||
/* Open the domain */
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0,("Error connecting to SAM pipe. Error was %s\n",
|
||||
@ -1354,7 +1354,7 @@ static NTSTATUS libnet_join_unjoindomain_rpc(TALLOC_CTX *mem_ctx,
|
||||
|
||||
/* Open the domain */
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0,("Error connecting to SAM pipe. Error was %s\n",
|
||||
|
@ -277,7 +277,7 @@ net_share_enum_rpc(struct cli_state *cli,
|
||||
struct dcerpc_binding_handle *b;
|
||||
|
||||
/* Open the server service pipe */
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc.syntax_id,
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(1, ("net_share_enum_rpc pipe open fail!\n"));
|
||||
|
@ -792,7 +792,7 @@ SMBC_attr_server(TALLOC_CTX *ctx,
|
||||
ipc_srv->cli = ipc_cli;
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(
|
||||
ipc_srv->cli, &ndr_table_lsarpc.syntax_id, &pipe_hnd);
|
||||
ipc_srv->cli, &ndr_table_lsarpc, &pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(1, ("cli_nt_session_open fail!\n"));
|
||||
errno = ENOTSUP;
|
||||
|
@ -169,7 +169,7 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
|
||||
* way.
|
||||
*/
|
||||
result = cli_rpc_pipe_open_noauth(
|
||||
cli, &ndr_table_samr.syntax_id, &pipe_hnd);
|
||||
cli, &ndr_table_samr, &pipe_hnd);
|
||||
}
|
||||
|
||||
if (!NT_STATUS_IS_OK(result)) {
|
||||
@ -230,7 +230,7 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
|
||||
result = NT_STATUS_UNSUCCESSFUL;
|
||||
|
||||
/* OK, this is ugly, but... try an anonymous pipe. */
|
||||
result = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
|
||||
result = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr,
|
||||
&pipe_hnd);
|
||||
|
||||
if ( NT_STATUS_IS_OK(result) &&
|
||||
|
@ -289,7 +289,7 @@ static bool enumerate_domain_trusts( TALLOC_CTX *mem_ctx, const char *domain,
|
||||
|
||||
/* open the LSARPC_PIPE */
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&lsa_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto done;
|
||||
|
@ -182,7 +182,7 @@ NTSTATUS change_trust_account_password( const char *domain, const char *remote_m
|
||||
/* Shouldn't we open this with schannel ? JRA. */
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(
|
||||
cli, &ndr_table_netlogon.syntax_id, &netlogon_pipe);
|
||||
cli, &ndr_table_netlogon, &netlogon_pipe);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(0,("modify_trust_password: unable to open the domain client session to machine %s. Error was : %s.\n",
|
||||
dc_name, nt_errstr(nt_status)));
|
||||
|
@ -2920,11 +2920,11 @@ NTSTATUS cli_rpc_pipe_open_noauth_transport(struct cli_state *cli,
|
||||
****************************************************************************/
|
||||
|
||||
NTSTATUS cli_rpc_pipe_open_noauth(struct cli_state *cli,
|
||||
const struct ndr_syntax_id *interface,
|
||||
const struct ndr_interface_table *table,
|
||||
struct rpc_pipe_client **presult)
|
||||
{
|
||||
return cli_rpc_pipe_open_noauth_transport(cli, NCACN_NP,
|
||||
interface, presult);
|
||||
&table->syntax_id, presult);
|
||||
}
|
||||
|
||||
/****************************************************************************
|
||||
|
@ -77,7 +77,7 @@ NTSTATUS rpc_pipe_open_ncalrpc(TALLOC_CTX *mem_ctx, const char *socket_path,
|
||||
struct dcerpc_binding_handle *rpccli_bh_create(struct rpc_pipe_client *c);
|
||||
|
||||
NTSTATUS cli_rpc_pipe_open_noauth(struct cli_state *cli,
|
||||
const struct ndr_syntax_id *interface,
|
||||
const struct ndr_interface_table *table,
|
||||
struct rpc_pipe_client **presult);
|
||||
|
||||
NTSTATUS cli_rpc_pipe_open_noauth_transport(struct cli_state *cli,
|
||||
|
@ -217,7 +217,7 @@ NTSTATUS get_schannel_session_key(struct cli_state *cli,
|
||||
struct rpc_pipe_client *netlogon_pipe = NULL;
|
||||
NTSTATUS status;
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon,
|
||||
&netlogon_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
return status;
|
||||
|
@ -2493,7 +2493,7 @@ static bool spoolss_connect_to_client(struct rpc_pipe_client **pp_pipe,
|
||||
* Now start the NT Domain stuff :-).
|
||||
*/
|
||||
|
||||
ret = cli_rpc_pipe_open_noauth(the_cli, &ndr_table_spoolss.syntax_id, pp_pipe);
|
||||
ret = cli_rpc_pipe_open_noauth(the_cli, &ndr_table_spoolss, pp_pipe);
|
||||
if (!NT_STATUS_IS_OK(ret)) {
|
||||
DEBUG(2,("spoolss_connect_to_client: unable to open the spoolss pipe on machine %s. Error was : %s.\n",
|
||||
remote_machine, nt_errstr(ret)));
|
||||
|
@ -3453,7 +3453,7 @@ static WERROR cmd_spoolss_printercmp(struct rpc_pipe_client *cli,
|
||||
if ( !NT_STATUS_IS_OK(nt_status) )
|
||||
return WERR_GENERAL_FAILURE;
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli_server2, &ndr_table_spoolss.syntax_id,
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli_server2, &ndr_table_spoolss,
|
||||
&cli2);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
printf("failed to open spoolss pipe on server %s (%s)\n",
|
||||
|
@ -36,14 +36,14 @@ static NTSTATUS cmd_testme(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
|
||||
d_printf("testme\n");
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(rpc_pipe_np_smb_conn(cli),
|
||||
&ndr_table_lsarpc.syntax_id,
|
||||
&ndr_table_lsarpc,
|
||||
&lsa_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto done;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(rpc_pipe_np_smb_conn(cli),
|
||||
&ndr_table_samr.syntax_id,
|
||||
&ndr_table_samr,
|
||||
&samr_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto done;
|
||||
|
@ -167,7 +167,7 @@ static void fetch_machine_sid(struct cli_state *cli)
|
||||
goto error;
|
||||
}
|
||||
|
||||
result = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
result = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&lsapipe);
|
||||
if (!NT_STATUS_IS_OK(result)) {
|
||||
fprintf(stderr, "could not initialise lsa pipe. Error was %s\n", nt_errstr(result) );
|
||||
|
@ -82,7 +82,7 @@ bool run_async_echo(int dummy)
|
||||
printf("torture_open_connection failed\n");
|
||||
goto fail;
|
||||
}
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_rpcecho.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_rpcecho,
|
||||
&p);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
printf("Could not open echo pipe: %s\n", nt_errstr(status));
|
||||
|
@ -1957,7 +1957,7 @@ static int net_ads_printer_publish(struct net_context *c, int argc, const char *
|
||||
SAFE_FREE(srv_cn_escaped);
|
||||
SAFE_FREE(printername_escaped);
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd);
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss, &pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
d_fprintf(stderr, _("Unable to open a connection to the spoolss pipe on %s\n"),
|
||||
servername);
|
||||
|
@ -82,7 +82,7 @@ NTSTATUS net_get_remote_domain_sid(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
||||
union lsa_PolicyInformation *info = NULL;
|
||||
struct dcerpc_binding_handle *b;
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&lsa_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
d_fprintf(stderr, _("Could not initialise lsa pipe\n"));
|
||||
@ -212,7 +212,7 @@ int run_rpc_command(struct net_context *c,
|
||||
c->opt_password, &pipe_hnd);
|
||||
} else {
|
||||
nt_status = cli_rpc_pipe_open_noauth(
|
||||
cli, &table->syntax_id,
|
||||
cli, table,
|
||||
&pipe_hnd);
|
||||
}
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
@ -348,7 +348,7 @@ static NTSTATUS rpc_oldjoin_internals(struct net_context *c,
|
||||
NTSTATUS result;
|
||||
enum netr_SchannelType sec_channel_type;
|
||||
|
||||
result = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon.syntax_id,
|
||||
result = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(result)) {
|
||||
DEBUG(0,("rpc_oldjoin_internals: netlogon pipe open to machine %s failed. "
|
||||
@ -1958,7 +1958,7 @@ static NTSTATUS get_sid_from_name(struct cli_state *cli,
|
||||
NTSTATUS status, result;
|
||||
struct dcerpc_binding_handle *b;
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto done;
|
||||
@ -2951,7 +2951,7 @@ static NTSTATUS rpc_list_alias_members(struct net_context *c,
|
||||
}
|
||||
|
||||
result = cli_rpc_pipe_open_noauth(rpc_pipe_np_smb_conn(pipe_hnd),
|
||||
&ndr_table_lsarpc.syntax_id,
|
||||
&ndr_table_lsarpc,
|
||||
&lsa_pipe);
|
||||
if (!NT_STATUS_IS_OK(result)) {
|
||||
d_fprintf(stderr, _("Couldn't open LSA pipe. Error was %s\n"),
|
||||
@ -6188,7 +6188,7 @@ static NTSTATUS rpc_trustdom_get_pdc(struct net_context *c,
|
||||
|
||||
/* Try netr_GetDcName */
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon,
|
||||
&netr);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
return status;
|
||||
@ -6335,7 +6335,7 @@ static int rpc_trustdom_establish(struct net_context *c, int argc,
|
||||
* Call LsaOpenPolicy and LsaQueryInfo
|
||||
*/
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(0, ("Could not initialise lsa pipe. Error was %s\n", nt_errstr(nt_status) ));
|
||||
@ -6612,7 +6612,7 @@ static int rpc_trustdom_vampire(struct net_context *c, int argc,
|
||||
return -1;
|
||||
};
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(0, ("Could not initialise lsa pipe. Error was %s\n",
|
||||
@ -6790,7 +6790,7 @@ static int rpc_trustdom_list(struct net_context *c, int argc, const char **argv)
|
||||
return -1;
|
||||
};
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(0, ("Could not initialise lsa pipe. Error was %s\n",
|
||||
@ -6906,7 +6906,7 @@ static int rpc_trustdom_list(struct net_context *c, int argc, const char **argv)
|
||||
/*
|
||||
* Open \PIPE\samr and get needed policy handles
|
||||
*/
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(0, ("Could not initialise samr pipe. Error was %s\n", nt_errstr(nt_status)));
|
||||
|
@ -245,7 +245,7 @@ int net_rpc_join_newstyle(struct net_context *c, int argc, const char **argv)
|
||||
|
||||
/* Fetch domain sid */
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0, ("Error connecting to LSA pipe. Error was %s\n",
|
||||
@ -280,7 +280,7 @@ int net_rpc_join_newstyle(struct net_context *c, int argc, const char **argv)
|
||||
}
|
||||
|
||||
/* Create domain user */
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0, ("Error connecting to SAM pipe. Error was %s\n",
|
||||
@ -447,7 +447,7 @@ int net_rpc_join_newstyle(struct net_context *c, int argc, const char **argv)
|
||||
|
||||
/* Now check the whole process from top-to-bottom */
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0,("Error connecting to NETLOGON pipe. Error was %s\n",
|
||||
|
@ -85,7 +85,7 @@ static NTSTATUS net_sh_run(struct net_context *c,
|
||||
return NT_STATUS_NO_MEMORY;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(ctx->cli, &cmd->table->syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(ctx->cli, cmd->table,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
d_fprintf(stderr, _("Could not open pipe: %s\n"),
|
||||
|
@ -210,7 +210,7 @@ static NTSTATUS connect_and_get_info(TALLOC_CTX *mem_ctx,
|
||||
return status;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(*cli, &ndr_table_lsarpc.syntax_id, pipe_hnd);
|
||||
status = cli_rpc_pipe_open_noauth(*cli, &ndr_table_lsarpc, pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0, ("Failed to initialise lsa pipe with error [%s]\n",
|
||||
nt_errstr(status)));
|
||||
|
@ -45,7 +45,7 @@ NTSTATUS net_rpc_lookup_name(struct net_context *c,
|
||||
|
||||
ZERO_STRUCT(pol);
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&lsa_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
d_fprintf(stderr, _("Could not initialise lsa pipe\n"));
|
||||
@ -256,7 +256,7 @@ NTSTATUS connect_dst_pipe(struct net_context *c, struct cli_state **cli_dst,
|
||||
return nt_status;
|
||||
}
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli_tmp, &table->syntax_id,
|
||||
nt_status = cli_rpc_pipe_open_noauth(cli_tmp, table,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
DEBUG(0, ("couldn't not initialize pipe\n"));
|
||||
@ -571,7 +571,7 @@ static NTSTATUS net_scan_dc_noad(struct net_context *c,
|
||||
ZERO_STRUCTP(dc_info);
|
||||
ZERO_STRUCT(pol);
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
return status;
|
||||
@ -634,7 +634,7 @@ NTSTATUS net_scan_dc(struct net_context *c,
|
||||
|
||||
ZERO_STRUCTP(dc_info);
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_dssetup.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_dssetup,
|
||||
&dssetup_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(10,("net_scan_dc: failed to open dssetup pipe with %s, "
|
||||
|
@ -122,7 +122,7 @@ static struct con_struct *create_cs(struct net_context *c,
|
||||
}
|
||||
|
||||
nt_status = cli_rpc_pipe_open_noauth(cs->cli,
|
||||
&ndr_table_lsarpc.syntax_id,
|
||||
&ndr_table_lsarpc,
|
||||
&cs->lsapipe);
|
||||
|
||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||
|
@ -96,7 +96,7 @@ static NTSTATUS cli_lsa_lookup_sid(struct cli_state *cli,
|
||||
goto tcon_fail;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&p);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto fail;
|
||||
@ -146,7 +146,7 @@ static NTSTATUS cli_lsa_lookup_name(struct cli_state *cli,
|
||||
goto tcon_fail;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc,
|
||||
&p);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto fail;
|
||||
@ -187,14 +187,13 @@ static NTSTATUS cli_lsa_lookup_domain_sid(struct cli_state *cli,
|
||||
struct policy_handle handle;
|
||||
NTSTATUS status, result;
|
||||
TALLOC_CTX *frame = talloc_stackframe();
|
||||
const struct ndr_syntax_id *lsarpc_syntax = &ndr_table_lsarpc.syntax_id;
|
||||
|
||||
status = cli_tree_connect(cli, "IPC$", "?????", "", 0);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto done;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, lsarpc_syntax, &rpc_pipe);
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc, &rpc_pipe);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto tdis;
|
||||
}
|
||||
|
@ -58,7 +58,7 @@ static bool cli_open_policy_hnd(void)
|
||||
NTSTATUS ret;
|
||||
cli_ipc = connect_one("IPC$");
|
||||
ret = cli_rpc_pipe_open_noauth(cli_ipc,
|
||||
&ndr_table_lsarpc.syntax_id,
|
||||
&ndr_table_lsarpc,
|
||||
&global_pipe_hnd);
|
||||
if (!NT_STATUS_IS_OK(ret)) {
|
||||
return False;
|
||||
|
@ -177,7 +177,7 @@ static bool get_rpc_shares(struct cli_state *cli,
|
||||
return False;
|
||||
}
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc,
|
||||
&pipe_hnd);
|
||||
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
|
@ -2006,7 +2006,7 @@ static void set_dc_type_and_flags_connect( struct winbindd_domain *domain )
|
||||
DEBUG(5, ("set_dc_type_and_flags_connect: domain %s\n", domain->name ));
|
||||
|
||||
status = cli_rpc_pipe_open_noauth(domain->conn.cli,
|
||||
&ndr_table_dssetup.syntax_id,
|
||||
&ndr_table_dssetup,
|
||||
&cli);
|
||||
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
@ -2057,7 +2057,7 @@ static void set_dc_type_and_flags_connect( struct winbindd_domain *domain )
|
||||
|
||||
no_dssetup:
|
||||
status = cli_rpc_pipe_open_noauth(domain->conn.cli,
|
||||
&ndr_table_lsarpc.syntax_id, &cli);
|
||||
&ndr_table_lsarpc, &cli);
|
||||
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(5, ("set_dc_type_and_flags_connect: Could not bind to "
|
||||
@ -2375,7 +2375,7 @@ NTSTATUS cm_connect_sam(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx,
|
||||
anonymous:
|
||||
|
||||
/* Finally fall back to anonymous. */
|
||||
status = cli_rpc_pipe_open_noauth(conn->cli, &ndr_table_samr.syntax_id,
|
||||
status = cli_rpc_pipe_open_noauth(conn->cli, &ndr_table_samr,
|
||||
&conn->samr_pipe);
|
||||
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
@ -2602,7 +2602,7 @@ NTSTATUS cm_connect_lsa(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx,
|
||||
anonymous:
|
||||
|
||||
result = cli_rpc_pipe_open_noauth(conn->cli,
|
||||
&ndr_table_lsarpc.syntax_id,
|
||||
&ndr_table_lsarpc,
|
||||
&conn->lsa_pipe);
|
||||
if (!NT_STATUS_IS_OK(result)) {
|
||||
result = NT_STATUS_PIPE_NOT_AVAILABLE;
|
||||
@ -2688,7 +2688,7 @@ NTSTATUS cm_connect_netlogon(struct winbindd_domain *domain,
|
||||
TALLOC_FREE(conn->netlogon_pipe);
|
||||
|
||||
result = cli_rpc_pipe_open_noauth(conn->cli,
|
||||
&ndr_table_netlogon.syntax_id,
|
||||
&ndr_table_netlogon,
|
||||
&netlogon_pipe);
|
||||
if (!NT_STATUS_IS_OK(result)) {
|
||||
return result;
|
||||
|
Loading…
Reference in New Issue
Block a user