mirror of
				https://github.com/samba-team/samba.git
				synced 2025-10-30 08:23:49 +03:00 
			
		
		
		
	Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Martin Schwenke <mschwenke@ddn.com>
		
			
				
	
	
		
			5923 lines
		
	
	
		
			144 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			5923 lines
		
	
	
		
			144 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | ||
|    Unix SMB/CIFS implementation.
 | ||
|    Inter-process communication and named pipe handling
 | ||
|    Copyright (C) Andrew Tridgell 1992-1998
 | ||
|    Copyright (C) Jeremy Allison 2007.
 | ||
| 
 | ||
|    SMB Version handling
 | ||
|    Copyright (C) John H Terpstra 1995-1998
 | ||
| 
 | ||
|    This program is free software; you can redistribute it and/or modify
 | ||
|    it under the terms of the GNU General Public License as published by
 | ||
|    the Free Software Foundation; either version 3 of the License, or
 | ||
|    (at your option) any later version.
 | ||
| 
 | ||
|    This program is distributed in the hope that it will be useful,
 | ||
|    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | ||
|    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | ||
|    GNU General Public License for more details.
 | ||
| 
 | ||
|    You should have received a copy of the GNU General Public License
 | ||
|    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | ||
|    */
 | ||
| /*
 | ||
|    This file handles the named pipe and mailslot calls
 | ||
|    in the SMBtrans protocol
 | ||
|    */
 | ||
| 
 | ||
| #include "includes.h"
 | ||
| #include "lib/util/util_file.h"
 | ||
| #include "smbd/smbd.h"
 | ||
| #include "smbd/globals.h"
 | ||
| #include "source3/smbd/smbXsrv_session.h"
 | ||
| #include "rpc_client/rpc_client.h"
 | ||
| #include "../librpc/gen_ndr/ndr_samr_c.h"
 | ||
| #include "../librpc/gen_ndr/ndr_spoolss_c.h"
 | ||
| #include "rpc_client/cli_spoolss.h"
 | ||
| #include "rpc_client/init_spoolss.h"
 | ||
| #include "../librpc/gen_ndr/ndr_srvsvc_c.h"
 | ||
| #include "../librpc/gen_ndr/rap.h"
 | ||
| #include "../lib/util/binsearch.h"
 | ||
| #include "../libcli/auth/libcli_auth.h"
 | ||
| #include "rpc_client/init_lsa.h"
 | ||
| #include "../libcli/security/security.h"
 | ||
| #include "printing.h"
 | ||
| #include "passdb/machine_sid.h"
 | ||
| #include "auth.h"
 | ||
| #include "rpc_server/rpc_ncacn_np.h"
 | ||
| #include "lib/util/string_wrappers.h"
 | ||
| #include "source3/printing/rap_jobid.h"
 | ||
| #include "source3/lib/substitute.h"
 | ||
| 
 | ||
| #ifdef CHECK_TYPES
 | ||
| #undef CHECK_TYPES
 | ||
| #endif
 | ||
| #define CHECK_TYPES 0
 | ||
| 
 | ||
| #define NERR_Success 0
 | ||
| #define NERR_badpass 86
 | ||
| #define NERR_notsupported 50
 | ||
| 
 | ||
| #define NERR_BASE (2100)
 | ||
| #define NERR_BufTooSmall (NERR_BASE+23)
 | ||
| #define NERR_JobNotFound (NERR_BASE+51)
 | ||
| #define NERR_DestNotFound (NERR_BASE+52)
 | ||
| 
 | ||
| #define ACCESS_READ 0x01
 | ||
| #define ACCESS_WRITE 0x02
 | ||
| #define ACCESS_CREATE 0x04
 | ||
| 
 | ||
| #define SHPWLEN 8		/* share password length */
 | ||
| 
 | ||
| /* Limit size of ipc replies */
 | ||
| 
 | ||
| static char *smb_realloc_limit(void *ptr, size_t size)
 | ||
| {
 | ||
| 	char *val;
 | ||
| 
 | ||
| 	size = MAX((size),4*1024);
 | ||
| 	val = (char *)SMB_REALLOC(ptr,size);
 | ||
| 	if (val) {
 | ||
| 		memset(val,'\0',size);
 | ||
| 	}
 | ||
| 	return val;
 | ||
| }
 | ||
| 
 | ||
| static bool api_Unsupported(struct smbd_server_connection *sconn,
 | ||
| 			    connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt, int mprcnt,
 | ||
| 				char **rdata, char **rparam,
 | ||
| 				int *rdata_len, int *rparam_len);
 | ||
| 
 | ||
| static bool api_TooSmall(struct smbd_server_connection *sconn,
 | ||
| 			 connection_struct *conn, uint64_t vuid, char *param, char *data,
 | ||
| 			 int mdrcnt, int mprcnt,
 | ||
| 			 char **rdata, char **rparam,
 | ||
| 			 int *rdata_len, int *rparam_len);
 | ||
| 
 | ||
| 
 | ||
| static int CopyExpanded(connection_struct *conn,
 | ||
| 			int snum, char **dst, char *src, int *p_space_remaining)
 | ||
| {
 | ||
| 	TALLOC_CTX *ctx = talloc_tos();
 | ||
| 	const struct loadparm_substitution *lp_sub =
 | ||
| 		loadparm_s3_global_substitution();
 | ||
| 	char *buf = NULL;
 | ||
| 	int l;
 | ||
| 
 | ||
| 	if (!src || !dst || !p_space_remaining || !(*dst) ||
 | ||
| 			*p_space_remaining <= 0) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 
 | ||
| 	buf = talloc_strdup(ctx, src);
 | ||
| 	if (!buf) {
 | ||
| 		*p_space_remaining = 0;
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	buf = talloc_string_sub(ctx, buf,"%S", lp_servicename(ctx, lp_sub, snum));
 | ||
| 	if (!buf) {
 | ||
| 		*p_space_remaining = 0;
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	buf = talloc_sub_full(ctx,
 | ||
| 				  lp_servicename(ctx, lp_sub, SNUM(conn)),
 | ||
| 				conn->session_info->unix_info->unix_name,
 | ||
| 				conn->connectpath,
 | ||
| 				conn->session_info->unix_token->gid,
 | ||
| 				conn->session_info->unix_info->sanitized_username,
 | ||
| 				conn->session_info->info->domain_name,
 | ||
| 				buf);
 | ||
| 	if (!buf) {
 | ||
| 		*p_space_remaining = 0;
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	l = push_ascii(*dst,buf,*p_space_remaining, STR_TERMINATE);
 | ||
| 	if (l == 0) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	(*dst) += l;
 | ||
| 	(*p_space_remaining) -= l;
 | ||
| 	return l;
 | ||
| }
 | ||
| 
 | ||
| static int CopyAndAdvance(char **dst, char *src, int *n)
 | ||
| {
 | ||
| 	int l;
 | ||
| 	if (!src || !dst || !n || !(*dst)) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	l = push_ascii(*dst,src,*n, STR_TERMINATE);
 | ||
| 	if (l == 0) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	(*dst) += l;
 | ||
| 	(*n) -= l;
 | ||
| 	return l;
 | ||
| }
 | ||
| 
 | ||
| static int StrlenExpanded(connection_struct *conn, int snum, char *s)
 | ||
| {
 | ||
| 	TALLOC_CTX *ctx = talloc_tos();
 | ||
| 	const struct loadparm_substitution *lp_sub =
 | ||
| 		loadparm_s3_global_substitution();
 | ||
| 	char *buf = NULL;
 | ||
| 	if (!s) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	buf = talloc_strdup(ctx,s);
 | ||
| 	if (!buf) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	buf = talloc_string_sub(ctx,buf,"%S",lp_servicename(ctx, lp_sub, snum));
 | ||
| 	if (!buf) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	buf = talloc_sub_full(ctx,
 | ||
| 				  lp_servicename(ctx, lp_sub, SNUM(conn)),
 | ||
| 				conn->session_info->unix_info->unix_name,
 | ||
| 				conn->connectpath,
 | ||
| 				conn->session_info->unix_token->gid,
 | ||
| 				conn->session_info->unix_info->sanitized_username,
 | ||
| 				conn->session_info->info->domain_name,
 | ||
| 				buf);
 | ||
| 	if (!buf) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	return strlen(buf) + 1;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************
 | ||
|  Return an SVAL at a pointer, or failval if beyond the end.
 | ||
| ****************************************************************/
 | ||
| 
 | ||
| static int get_safe_SVAL(
 | ||
| 	const char *buf_base,
 | ||
| 	size_t buf_len,
 | ||
| 	char *ptr,
 | ||
| 	size_t off,
 | ||
| 	int failval)
 | ||
| {
 | ||
| 	/*
 | ||
| 	 * Note we use off+1 here, not off+2 as SVAL accesses ptr[0]
 | ||
| 	 * and ptr[1], NOT ptr[2].
 | ||
| 	 */
 | ||
| 	if (!is_offset_safe(buf_base, buf_len, ptr, off+1)) {
 | ||
| 		return failval;
 | ||
| 	}
 | ||
| 	return SVAL(ptr,off);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************
 | ||
|  Return an IVAL at a pointer, or failval if beyond the end.
 | ||
| ****************************************************************/
 | ||
| 
 | ||
| static int get_safe_IVAL(
 | ||
| 	const char *buf_base,
 | ||
| 	size_t buf_len,
 | ||
| 	char *ptr,
 | ||
| 	size_t off,
 | ||
| 	int failval)
 | ||
| {
 | ||
| 	/*
 | ||
| 	 * Note we use off+3 here, not off+4 as IVAL accesses
 | ||
| 	 * ptr[0] ptr[1] ptr[2] ptr[3] NOT ptr[4].
 | ||
| 	 */
 | ||
| 	if (!is_offset_safe(buf_base, buf_len, ptr, off+3)) {
 | ||
| 		return failval;
 | ||
| 	}
 | ||
| 	return IVAL(ptr,off);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************
 | ||
|  Return a safe pointer into a buffer, or NULL.
 | ||
| ****************************************************************/
 | ||
| 
 | ||
| static char *get_safe_ptr(
 | ||
| 	const char *buf_base,
 | ||
| 	size_t buf_len,
 | ||
| 	char *ptr,
 | ||
| 	size_t off)
 | ||
| {
 | ||
| 	return is_offset_safe(buf_base, buf_len, ptr, off) ?
 | ||
| 			ptr + off : NULL;
 | ||
| }
 | ||
| 
 | ||
| /*******************************************************************
 | ||
|  Check a API string for validity when we only need to check the prefix.
 | ||
| ******************************************************************/
 | ||
| 
 | ||
| static bool prefix_ok(const char *str, const char *prefix)
 | ||
| {
 | ||
| 	return(strncmp(str,prefix,strlen(prefix)) == 0);
 | ||
| }
 | ||
| 
 | ||
| struct pack_desc {
 | ||
| 	const char *format;	    /* formatstring for structure */
 | ||
| 	const char *subformat;  /* subformat for structure */
 | ||
| 	char *base;	    /* baseaddress of buffer */
 | ||
| 	int buflen;	   /* remaining size for fixed part; on init: length of base */
 | ||
| 	int subcount;	    /* count of substructures */
 | ||
| 	char *structbuf;  /* pointer into buffer for remaining fixed part */
 | ||
| 	int stringlen;    /* remaining size for variable part */
 | ||
| 	char *stringbuf;  /* pointer into buffer for remaining variable part */
 | ||
| 	int neededlen;    /* total needed size */
 | ||
| 	int usedlen;	    /* total used size (usedlen <= neededlen and usedlen <= buflen) */
 | ||
| 	const char *curpos;	    /* current position; pointer into format or subformat */
 | ||
| 	int errcode;
 | ||
| };
 | ||
| 
 | ||
| static int get_counter(const char **p)
 | ||
| {
 | ||
| 	int i, n;
 | ||
| 	if (!p || !(*p)) {
 | ||
| 		return 1;
 | ||
| 	}
 | ||
| 	if (!isdigit((int)**p)) {
 | ||
| 		return 1;
 | ||
| 	}
 | ||
| 	for (n = 0;;) {
 | ||
| 		i = **p;
 | ||
| 		if (isdigit(i)) {
 | ||
| 			n = 10 * n + (i - '0');
 | ||
| 		} else {
 | ||
| 			return n;
 | ||
| 		}
 | ||
| 		(*p)++;
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| static int getlen(const char *p)
 | ||
| {
 | ||
| 	int n = 0;
 | ||
| 	if (!p) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 
 | ||
| 	while (*p) {
 | ||
| 		switch( *p++ ) {
 | ||
| 		case 'W':			/* word (2 byte) */
 | ||
| 			n += 2;
 | ||
| 			break;
 | ||
| 		case 'K':			/* status word? (2 byte) */
 | ||
| 			n += 2;
 | ||
| 			break;
 | ||
| 		case 'N':			/* count of substructures (word) at end */
 | ||
| 			n += 2;
 | ||
| 			break;
 | ||
| 		case 'D':			/* double word (4 byte) */
 | ||
| 		case 'z':			/* offset to zero terminated string (4 byte) */
 | ||
| 		case 'l':			/* offset to user data (4 byte) */
 | ||
| 			n += 4;
 | ||
| 			break;
 | ||
| 		case 'b':			/* offset to data (with counter) (4 byte) */
 | ||
| 			n += 4;
 | ||
| 			get_counter(&p);
 | ||
| 			break;
 | ||
| 		case 'B':			/* byte (with optional counter) */
 | ||
| 			n += get_counter(&p);
 | ||
| 			break;
 | ||
| 		}
 | ||
| 	}
 | ||
| 	return n;
 | ||
| }
 | ||
| 
 | ||
| static bool init_package(struct pack_desc *p, int count, int subcount)
 | ||
| {
 | ||
| 	int n = p->buflen;
 | ||
| 	int i;
 | ||
| 
 | ||
| 	if (!p->format || !p->base) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	i = count * getlen(p->format);
 | ||
| 	if (p->subformat) {
 | ||
| 		i += subcount * getlen(p->subformat);
 | ||
| 	}
 | ||
| 	p->structbuf = p->base;
 | ||
| 	p->neededlen = 0;
 | ||
| 	p->usedlen = 0;
 | ||
| 	p->subcount = 0;
 | ||
| 	p->curpos = p->format;
 | ||
| 	if (i > n) {
 | ||
| 		p->neededlen = i;
 | ||
| 		i = n = 0;
 | ||
| #if 0
 | ||
| 		/*
 | ||
| 		 * This is the old error code we used. Apparently
 | ||
| 		 * WinNT/2k systems return ERRbuftoosmall (2123) and
 | ||
| 		 * OS/2 needs this. I'm leaving this here so we can revert
 | ||
| 		 * if needed. JRA.
 | ||
| 		 */
 | ||
| 		p->errcode = ERRmoredata;
 | ||
| #else
 | ||
| 		p->errcode = ERRbuftoosmall;
 | ||
| #endif
 | ||
| 	} else {
 | ||
| 		p->errcode = NERR_Success;
 | ||
| 	}
 | ||
| 	p->buflen = i;
 | ||
| 	n -= i;
 | ||
| 	p->stringbuf = p->base + i;
 | ||
| 	p->stringlen = n;
 | ||
| 	return (p->errcode == NERR_Success);
 | ||
| }
 | ||
| 
 | ||
| static int package(struct pack_desc *p, ...)
 | ||
| {
 | ||
| 	va_list args;
 | ||
| 	int needed=0, stringneeded;
 | ||
| 	const char *str=NULL;
 | ||
| 	int is_string=0, stringused;
 | ||
| 	int32_t temp;
 | ||
| 
 | ||
| 	va_start(args,p);
 | ||
| 
 | ||
| 	if (!*p->curpos) {
 | ||
| 		if (!p->subcount) {
 | ||
| 			p->curpos = p->format;
 | ||
| 		} else {
 | ||
| 			p->curpos = p->subformat;
 | ||
| 			p->subcount--;
 | ||
| 		}
 | ||
| 	}
 | ||
| #if CHECK_TYPES
 | ||
| 	str = va_arg(args,char*);
 | ||
| 	SMB_ASSERT(strncmp(str,p->curpos,strlen(str)) == 0);
 | ||
| #endif
 | ||
| 	stringneeded = -1;
 | ||
| 
 | ||
| 	if (!p->curpos) {
 | ||
| 		va_end(args);
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 
 | ||
| 	switch( *p->curpos++ ) {
 | ||
| 		case 'W':			/* word (2 byte) */
 | ||
| 			needed = 2;
 | ||
| 			temp = va_arg(args,int);
 | ||
| 			if (p->buflen >= needed) {
 | ||
| 				SSVAL(p->structbuf,0,temp);
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 'K':			/* status word? (2 byte) */
 | ||
| 			needed = 2;
 | ||
| 			temp = va_arg(args,int);
 | ||
| 			if (p->buflen >= needed) {
 | ||
| 				SSVAL(p->structbuf,0,temp);
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 'N':			/* count of substructures (word) at end */
 | ||
| 			needed = 2;
 | ||
| 			p->subcount = va_arg(args,int);
 | ||
| 			if (p->buflen >= needed) {
 | ||
| 				SSVAL(p->structbuf,0,p->subcount);
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 'D':			/* double word (4 byte) */
 | ||
| 			needed = 4;
 | ||
| 			temp = va_arg(args,int);
 | ||
| 			if (p->buflen >= needed) {
 | ||
| 				SIVAL(p->structbuf,0,temp);
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 'B':			/* byte (with optional counter) */
 | ||
| 			needed = get_counter(&p->curpos);
 | ||
| 			{
 | ||
| 				char *s = va_arg(args,char*);
 | ||
| 				if (p->buflen >= needed) {
 | ||
| 					strlcpy(p->structbuf,s?s:"",needed);
 | ||
| 				}
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 'z':			/* offset to zero terminated string (4 byte) */
 | ||
| 			str = va_arg(args,char*);
 | ||
| 			stringneeded = (str ? strlen(str)+1 : 0);
 | ||
| 			is_string = 1;
 | ||
| 			break;
 | ||
| 		case 'l':			/* offset to user data (4 byte) */
 | ||
| 			str = va_arg(args,char*);
 | ||
| 			stringneeded = va_arg(args,int);
 | ||
| 			is_string = 0;
 | ||
| 			break;
 | ||
| 		case 'b':			/* offset to data (with counter) (4 byte) */
 | ||
| 			str = va_arg(args,char*);
 | ||
| 			stringneeded = get_counter(&p->curpos);
 | ||
| 			is_string = 0;
 | ||
| 			break;
 | ||
| 	}
 | ||
| 
 | ||
| 	va_end(args);
 | ||
| 	if (stringneeded >= 0) {
 | ||
| 		needed = 4;
 | ||
| 		if (p->buflen >= needed) {
 | ||
| 			stringused = stringneeded;
 | ||
| 			if (stringused > p->stringlen) {
 | ||
| 				stringused = (is_string ? p->stringlen : 0);
 | ||
| 				if (p->errcode == NERR_Success) {
 | ||
| 					p->errcode = ERRmoredata;
 | ||
| 				}
 | ||
| 			}
 | ||
| 			if (!stringused) {
 | ||
| 				SIVAL(p->structbuf,0,0);
 | ||
| 			} else {
 | ||
| 				SIVAL(p->structbuf,0,PTR_DIFF(p->stringbuf,p->base));
 | ||
| 				memcpy(p->stringbuf,str?str:"",stringused);
 | ||
| 				if (is_string) {
 | ||
| 					p->stringbuf[stringused-1] = '\0';
 | ||
| 				}
 | ||
| 				p->stringbuf += stringused;
 | ||
| 				p->stringlen -= stringused;
 | ||
| 				p->usedlen += stringused;
 | ||
| 			}
 | ||
| 		}
 | ||
| 		p->neededlen += stringneeded;
 | ||
| 	}
 | ||
| 
 | ||
| 	p->neededlen += needed;
 | ||
| 	if (p->buflen >= needed) {
 | ||
| 		p->structbuf += needed;
 | ||
| 		p->buflen -= needed;
 | ||
| 		p->usedlen += needed;
 | ||
| 	} else {
 | ||
| 		if (p->errcode == NERR_Success) {
 | ||
| 			p->errcode = ERRmoredata;
 | ||
| 		}
 | ||
| 	}
 | ||
| 	return 1;
 | ||
| }
 | ||
| 
 | ||
| #if CHECK_TYPES
 | ||
| #define PACK(desc,t,v) package(desc,t,v,0,0,0,0)
 | ||
| #define PACKl(desc,t,v,l) package(desc,t,v,l,0,0,0,0)
 | ||
| #else
 | ||
| #define PACK(desc,t,v) package(desc,v)
 | ||
| #define PACKl(desc,t,v,l) package(desc,v,l)
 | ||
| #endif
 | ||
| 
 | ||
| static void PACKI(struct pack_desc* desc, const char *t,int v)
 | ||
| {
 | ||
| 	PACK(desc,t,v);
 | ||
| }
 | ||
| 
 | ||
| static void PACKS(struct pack_desc* desc,const char *t,const char *v)
 | ||
| {
 | ||
| 	PACK(desc,t,v);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  Get a print queue.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static void PackDriverData(struct pack_desc* desc)
 | ||
| {
 | ||
| 	char drivdata[4+4+32];
 | ||
| 	SIVAL(drivdata,0,sizeof drivdata); /* cb */
 | ||
| 	SIVAL(drivdata,4,1000);	/* lVersion */
 | ||
| 	memset(drivdata+8,0,32);	/* szDeviceName */
 | ||
| 	push_ascii(drivdata+8,"NULL",32, STR_TERMINATE);
 | ||
| 	PACKl(desc,"l",drivdata,sizeof drivdata); /* pDriverData */
 | ||
| }
 | ||
| 
 | ||
| static int check_printq_info(struct pack_desc* desc,
 | ||
| 				unsigned int uLevel, char *id1, char *id2)
 | ||
| {
 | ||
| 	desc->subformat = NULL;
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0:
 | ||
| 			desc->format = "B13";
 | ||
| 			break;
 | ||
| 		case 1:
 | ||
| 			desc->format = "B13BWWWzzzzzWW";
 | ||
| 			break;
 | ||
| 		case 2:
 | ||
| 			desc->format = "B13BWWWzzzzzWN";
 | ||
| 			desc->subformat = "WB21BB16B10zWWzDDz";
 | ||
| 			break;
 | ||
| 		case 3:
 | ||
| 			desc->format = "zWWWWzzzzWWzzl";
 | ||
| 			break;
 | ||
| 		case 4:
 | ||
| 			desc->format = "zWWWWzzzzWNzzl";
 | ||
| 			desc->subformat = "WWzWWDDzz";
 | ||
| 			break;
 | ||
| 		case 5:
 | ||
| 			desc->format = "z";
 | ||
| 			break;
 | ||
| 		case 51:
 | ||
| 			desc->format = "K";
 | ||
| 			break;
 | ||
| 		case 52:
 | ||
| 			desc->format = "WzzzzzzzzN";
 | ||
| 			desc->subformat = "z";
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			DEBUG(0,("check_printq_info: invalid level %d\n",
 | ||
| 				uLevel ));
 | ||
| 			return False;
 | ||
| 	}
 | ||
| 	if (id1 == NULL || strcmp(desc->format,id1) != 0) {
 | ||
| 		DEBUG(0,("check_printq_info: invalid format %s\n",
 | ||
| 			id1 ? id1 : "<NULL>" ));
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (desc->subformat && (id2 == NULL || strcmp(desc->subformat,id2) != 0)) {
 | ||
| 		DEBUG(0,("check_printq_info: invalid subformat %s\n",
 | ||
| 			id2 ? id2 : "<NULL>" ));
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| #define RAP_JOB_STATUS_QUEUED 0
 | ||
| #define RAP_JOB_STATUS_PAUSED 1
 | ||
| #define RAP_JOB_STATUS_SPOOLING 2
 | ||
| #define RAP_JOB_STATUS_PRINTING 3
 | ||
| #define RAP_JOB_STATUS_PRINTED 4
 | ||
| 
 | ||
| #define RAP_QUEUE_STATUS_PAUSED 1
 | ||
| #define RAP_QUEUE_STATUS_ERROR 2
 | ||
| 
 | ||
| /* turn a print job status into a on the wire status
 | ||
| */
 | ||
| static int printj_spoolss_status(int v)
 | ||
| {
 | ||
| 	if (v == JOB_STATUS_QUEUED)
 | ||
| 		return RAP_JOB_STATUS_QUEUED;
 | ||
| 	if (v & JOB_STATUS_PAUSED)
 | ||
| 		return RAP_JOB_STATUS_PAUSED;
 | ||
| 	if (v & JOB_STATUS_SPOOLING)
 | ||
| 		return RAP_JOB_STATUS_SPOOLING;
 | ||
| 	if (v & JOB_STATUS_PRINTING)
 | ||
| 		return RAP_JOB_STATUS_PRINTING;
 | ||
| 	return 0;
 | ||
| }
 | ||
| 
 | ||
| /* turn a print queue status into a on the wire status
 | ||
| */
 | ||
| static int printq_spoolss_status(int v)
 | ||
| {
 | ||
| 	if (v == PRINTER_STATUS_OK)
 | ||
| 		return 0;
 | ||
| 	if (v & PRINTER_STATUS_PAUSED)
 | ||
| 		return RAP_QUEUE_STATUS_PAUSED;
 | ||
| 	return RAP_QUEUE_STATUS_ERROR;
 | ||
| }
 | ||
| 
 | ||
| static void fill_spoolss_printjob_info(int uLevel,
 | ||
| 				       struct pack_desc *desc,
 | ||
| 				       struct spoolss_JobInfo2 *info2,
 | ||
| 				       int n)
 | ||
| {
 | ||
| 	time_t t = spoolss_Time_to_time_t(&info2->submitted);
 | ||
| 
 | ||
| 	/* the client expects localtime */
 | ||
| 	t -= get_time_zone(t);
 | ||
| 
 | ||
| 	PACKI(desc,"W",pjobid_to_rap(info2->printer_name, info2->job_id)); /* uJobId */
 | ||
| 	if (uLevel == 1) {
 | ||
| 		PACKS(desc,"B21", info2->user_name); /* szUserName */
 | ||
| 		PACKS(desc,"B","");		/* pad */
 | ||
| 		PACKS(desc,"B16","");	/* szNotifyName */
 | ||
| 		PACKS(desc,"B10","PM_Q_RAW"); /* szDataType */
 | ||
| 		PACKS(desc,"z","");		/* pszParms */
 | ||
| 		PACKI(desc,"W",n+1);		/* uPosition */
 | ||
| 		PACKI(desc,"W", printj_spoolss_status(info2->status)); /* fsStatus */
 | ||
| 		PACKS(desc,"z","");		/* pszStatus */
 | ||
| 		PACKI(desc,"D", t); /* ulSubmitted */
 | ||
| 		PACKI(desc,"D", info2->size); /* ulSize */
 | ||
| 		PACKS(desc,"z", info2->document_name); /* pszComment */
 | ||
| 	}
 | ||
| 	if (uLevel == 2 || uLevel == 3 || uLevel == 4) {
 | ||
| 		PACKI(desc,"W", info2->priority);		/* uPriority */
 | ||
| 		PACKS(desc,"z", info2->user_name); /* pszUserName */
 | ||
| 		PACKI(desc,"W",n+1);		/* uPosition */
 | ||
| 		PACKI(desc,"W", printj_spoolss_status(info2->status)); /* fsStatus */
 | ||
| 		PACKI(desc,"D",t); /* ulSubmitted */
 | ||
| 		PACKI(desc,"D", info2->size); /* ulSize */
 | ||
| 		PACKS(desc,"z","Samba");	/* pszComment */
 | ||
| 		PACKS(desc,"z", info2->document_name); /* pszDocument */
 | ||
| 		if (uLevel == 3) {
 | ||
| 			PACKS(desc,"z","");	/* pszNotifyName */
 | ||
| 			PACKS(desc,"z","PM_Q_RAW"); /* pszDataType */
 | ||
| 			PACKS(desc,"z","");	/* pszParms */
 | ||
| 			PACKS(desc,"z","");	/* pszStatus */
 | ||
| 			PACKS(desc,"z", info2->printer_name); /* pszQueue */
 | ||
| 			PACKS(desc,"z","lpd");	/* pszQProcName */
 | ||
| 			PACKS(desc,"z","");	/* pszQProcParms */
 | ||
| 			PACKS(desc,"z","NULL"); /* pszDriverName */
 | ||
| 			PackDriverData(desc);	/* pDriverData */
 | ||
| 			PACKS(desc,"z","");	/* pszPrinterName */
 | ||
| 		} else if (uLevel == 4) {   /* OS2 */
 | ||
| 			PACKS(desc,"z","");       /* pszSpoolFileName  */
 | ||
| 			PACKS(desc,"z","");       /* pszPortName       */
 | ||
| 			PACKS(desc,"z","");       /* pszStatus         */
 | ||
| 			PACKI(desc,"D",0);        /* ulPagesSpooled    */
 | ||
| 			PACKI(desc,"D",0);        /* ulPagesSent       */
 | ||
| 			PACKI(desc,"D",0);        /* ulPagesPrinted    */
 | ||
| 			PACKI(desc,"D",0);        /* ulTimePrinted     */
 | ||
| 			PACKI(desc,"D",0);        /* ulExtendJobStatus */
 | ||
| 			PACKI(desc,"D",0);        /* ulStartPage       */
 | ||
| 			PACKI(desc,"D",0);        /* ulEndPage         */
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| /********************************************************************
 | ||
|  Respond to the DosPrintQInfo command with a level of 52
 | ||
|  This is used to get printer driver information for Win9x clients
 | ||
|  ********************************************************************/
 | ||
| static void fill_printq_info_52(struct spoolss_DriverInfo3 *driver,
 | ||
| 				struct pack_desc* desc,	int count,
 | ||
| 				const char *printer_name)
 | ||
| {
 | ||
| 	int 				i;
 | ||
| 	fstring 			location;
 | ||
| 	trim_string(discard_const_p(char, driver->driver_path), "\\print$\\WIN40\\0\\", 0);
 | ||
| 	trim_string(discard_const_p(char, driver->data_file), "\\print$\\WIN40\\0\\", 0);
 | ||
| 	trim_string(discard_const_p(char, driver->help_file), "\\print$\\WIN40\\0\\", 0);
 | ||
| 
 | ||
| 	PACKI(desc, "W", 0x0400);                     /* don't know */
 | ||
| 	PACKS(desc, "z", driver->driver_name);        /* long printer name */
 | ||
| 	PACKS(desc, "z", driver->driver_path);  /* Driverfile Name */
 | ||
| 	PACKS(desc, "z", driver->data_file);    /* Datafile name */
 | ||
| 	PACKS(desc, "z", driver->monitor_name); /* language monitor */
 | ||
| 
 | ||
| 	fstrcpy(location, "\\\\%L\\print$\\WIN40\\0");
 | ||
| 	standard_sub_basic( "", "", location, sizeof(location)-1 );
 | ||
| 	PACKS(desc,"z", location);                          /* share to retrieve files */
 | ||
| 
 | ||
| 	PACKS(desc,"z", driver->default_datatype);    /* default data type */
 | ||
| 	PACKS(desc,"z", driver->help_file);           /* helpfile name */
 | ||
| 	PACKS(desc,"z", driver->driver_path);               /* driver name */
 | ||
| 
 | ||
| 	DEBUG(3,("Printer Driver Name: %s:\n",driver->driver_name));
 | ||
| 	DEBUG(3,("Driver: %s:\n",driver->driver_path));
 | ||
| 	DEBUG(3,("Data File: %s:\n",driver->data_file));
 | ||
| 	DEBUG(3,("Language Monitor: %s:\n",driver->monitor_name));
 | ||
| 	DEBUG(3,("Driver Location: %s:\n",location));
 | ||
| 	DEBUG(3,("Data Type: %s:\n",driver->default_datatype));
 | ||
| 	DEBUG(3,("Help File: %s:\n",driver->help_file));
 | ||
| 	PACKI(desc,"N",count);                     /* number of files to copy */
 | ||
| 
 | ||
| 	for ( i=0; i<count && driver->dependent_files && *driver->dependent_files[i]; i++)
 | ||
| 	{
 | ||
| 		trim_string(discard_const_p(char, driver->dependent_files[i]), "\\print$\\WIN40\\0\\", 0);
 | ||
| 		PACKS(desc,"z",driver->dependent_files[i]);         /* driver files to copy */
 | ||
| 		DEBUG(3,("Dependent File: %s:\n", driver->dependent_files[i]));
 | ||
| 	}
 | ||
| 
 | ||
| 	/* sanity check */
 | ||
| 	if ( i != count )
 | ||
| 		DEBUG(3,("fill_printq_info_52: file count specified by client [%d] != number of dependent files [%i]\n",
 | ||
| 			count, i));
 | ||
| 
 | ||
| 	DEBUG(3,("fill_printq_info on <%s> gave %d entries\n", printer_name, i));
 | ||
| 
 | ||
|         desc->errcode=NERR_Success;
 | ||
| 
 | ||
| }
 | ||
| 
 | ||
| static const char *strip_unc(const char *unc)
 | ||
| {
 | ||
| 	char *p;
 | ||
| 
 | ||
| 	if (unc == NULL) {
 | ||
| 		return NULL;
 | ||
| 	}
 | ||
| 
 | ||
| 	if ((p = strrchr(unc, '\\')) != NULL) {
 | ||
| 		return p+1;
 | ||
| 	}
 | ||
| 
 | ||
| 	return unc;
 | ||
| }
 | ||
| 
 | ||
| static void fill_printq_info(int uLevel,
 | ||
|  			     struct pack_desc* desc,
 | ||
| 			     int count,
 | ||
| 			     union spoolss_JobInfo *job_info,
 | ||
| 			     struct spoolss_DriverInfo3 *driver_info,
 | ||
| 			     struct spoolss_PrinterInfo2 *printer_info)
 | ||
| {
 | ||
| 	switch (uLevel) {
 | ||
| 	case 0:
 | ||
| 	case 1:
 | ||
| 	case 2:
 | ||
| 		PACKS(desc,"B13", strip_unc(printer_info->printername));
 | ||
| 		break;
 | ||
| 	case 3:
 | ||
| 	case 4:
 | ||
| 	case 5:
 | ||
| 		PACKS(desc,"z", strip_unc(printer_info->printername));
 | ||
| 		break;
 | ||
| 	case 51:
 | ||
| 		PACKI(desc,"K", printq_spoolss_status(printer_info->status));
 | ||
| 		break;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel == 1 || uLevel == 2) {
 | ||
| 		PACKS(desc,"B","");		/* alignment */
 | ||
| 		PACKI(desc,"W",5);		/* priority */
 | ||
| 		PACKI(desc,"W",0);		/* start time */
 | ||
| 		PACKI(desc,"W",0);		/* until time */
 | ||
| 		PACKS(desc,"z","");		/* pSepFile */
 | ||
| 		PACKS(desc,"z","lpd");	/* pPrProc */
 | ||
| 		PACKS(desc,"z", strip_unc(printer_info->printername)); /* pDestinations */
 | ||
| 		PACKS(desc,"z","");		/* pParms */
 | ||
| 		if (printer_info->printername == NULL) {
 | ||
| 			PACKS(desc,"z","UNKNOWN PRINTER");
 | ||
| 			PACKI(desc,"W",LPSTAT_ERROR);
 | ||
| 		} else {
 | ||
| 			PACKS(desc,"z", printer_info->comment);
 | ||
| 			PACKI(desc,"W", printq_spoolss_status(printer_info->status)); /* status */
 | ||
| 		}
 | ||
| 		PACKI(desc,(uLevel == 1 ? "W" : "N"),count);
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel == 3 || uLevel == 4) {
 | ||
| 		PACKI(desc,"W",5);		/* uPriority */
 | ||
| 		PACKI(desc,"W",0);		/* uStarttime */
 | ||
| 		PACKI(desc,"W",0);		/* uUntiltime */
 | ||
| 		PACKI(desc,"W",5);		/* pad1 */
 | ||
| 		PACKS(desc,"z","");		/* pszSepFile */
 | ||
| 		PACKS(desc,"z","WinPrint");	/* pszPrProc */
 | ||
| 		PACKS(desc,"z",NULL);		/* pszParms */
 | ||
| 		PACKS(desc,"z",NULL);		/* pszComment - don't ask.... JRA */
 | ||
| 		/* "don't ask" that it's done this way to fix corrupted
 | ||
| 		   Win9X/ME printer comments. */
 | ||
| 		PACKI(desc,"W", printq_spoolss_status(printer_info->status)); /* fsStatus */
 | ||
| 		PACKI(desc,(uLevel == 3 ? "W" : "N"),count);	/* cJobs */
 | ||
| 		PACKS(desc,"z", strip_unc(printer_info->printername)); /* pszPrinters */
 | ||
| 		PACKS(desc,"z", printer_info->drivername);		/* pszDriverName */
 | ||
| 		PackDriverData(desc);	/* pDriverData */
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel == 2 || uLevel == 4) {
 | ||
| 		int i;
 | ||
| 		for (i = 0; i < count; i++) {
 | ||
| 			fill_spoolss_printjob_info(uLevel == 2 ? 1 : 2, desc, &job_info[i].info2, i);
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel==52)
 | ||
| 		fill_printq_info_52(driver_info, desc, count, printer_info->printername);
 | ||
| }
 | ||
| 
 | ||
| /* This function returns the number of files for a given driver */
 | ||
| static int get_printerdrivernumber(const struct spoolss_DriverInfo3 *driver)
 | ||
| {
 | ||
| 	int 				result = 0;
 | ||
| 
 | ||
| 	/* count the number of files */
 | ||
| 	while (driver->dependent_files && *driver->dependent_files[result])
 | ||
| 		result++;
 | ||
| 
 | ||
| 	return result;
 | ||
| }
 | ||
| 
 | ||
| static bool api_DosPrintQGetInfo(struct smbd_server_connection *sconn,
 | ||
| 				 connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	char *QueueName = p;
 | ||
| 	unsigned int uLevel;
 | ||
| 	uint32_t count = 0;
 | ||
| 	char *str3;
 | ||
| 	struct pack_desc desc;
 | ||
| 	char* tmpdata=NULL;
 | ||
| 
 | ||
| 	WERROR werr = WERR_OK;
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct policy_handle handle;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	union spoolss_DriverInfo driver_info;
 | ||
| 	union spoolss_JobInfo *job_info = NULL;
 | ||
| 	union spoolss_PrinterInfo printer_info;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	p = skip_string(param,tpscnt,p);
 | ||
| 	if (!p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	str3 = get_safe_str_ptr(param,tpscnt,p,4);
 | ||
| 	/* str3 may be null here and is checked in check_printq_info(). */
 | ||
| 
 | ||
| 	/* remove any trailing username */
 | ||
| 	if ((p = strchr_m(QueueName,'%')))
 | ||
| 		*p = 0;
 | ||
| 
 | ||
| 	DEBUG(3,("api_DosPrintQGetInfo uLevel=%d name=%s\n",uLevel,QueueName));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (!prefix_ok(str1,"zWrLh"))
 | ||
| 		return False;
 | ||
| 	if (!check_printq_info(&desc,uLevel,str2,str3)) {
 | ||
| 		/*
 | ||
| 		 * Patch from Scott Moomaw <scott@bridgewater.edu>
 | ||
| 		 * to return the 'invalid info level' error if an
 | ||
| 		 * unknown level was requested.
 | ||
| 		 */
 | ||
| 		*rdata_len = 0;
 | ||
| 		*rparam_len = 6;
 | ||
| 		*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 		if (!*rparam) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		SSVALS(*rparam,0,ERRunknownlevel);
 | ||
| 		SSVAL(*rparam,2,0);
 | ||
| 		SSVAL(*rparam,4,0);
 | ||
| 		return(True);
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(handle);
 | ||
| 
 | ||
| 	if (QueueName == NULL || (strlen(QueueName) < 1)) {
 | ||
| 		desc.errcode = W_ERROR_V(WERR_INVALID_PARAMETER);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_DosPrintQGetInfo: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 					    QueueName,
 | ||
| 					    "RAW",
 | ||
| 					    devmode_ctr,
 | ||
| 					    PRINTER_ACCESS_USE,
 | ||
| 					    &handle,
 | ||
| 					    &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	werr = rpccli_spoolss_getprinter(cli, mem_ctx,
 | ||
| 					 &handle,
 | ||
| 					 2,
 | ||
| 					 0,
 | ||
| 					 &printer_info);
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel==52) {
 | ||
| 		uint32_t server_major_version;
 | ||
| 		uint32_t server_minor_version;
 | ||
| 
 | ||
| 		werr = rpccli_spoolss_getprinterdriver2(cli, mem_ctx,
 | ||
| 							&handle,
 | ||
| 							"Windows 4.0",
 | ||
| 							3, /* level */
 | ||
| 							0,
 | ||
| 							0, /* version */
 | ||
| 							0,
 | ||
| 							&driver_info,
 | ||
| 							&server_major_version,
 | ||
| 							&server_minor_version);
 | ||
| 		if (!W_ERROR_IS_OK(werr)) {
 | ||
| 			desc.errcode = W_ERROR_V(werr);
 | ||
| 			goto out;
 | ||
| 		}
 | ||
| 
 | ||
| 		count = get_printerdrivernumber(&driver_info.info3);
 | ||
| 		DEBUG(3,("api_DosPrintQGetInfo: Driver files count: %d\n",count));
 | ||
| 	} else {
 | ||
| 		uint32_t num_jobs;
 | ||
| 		werr = rpccli_spoolss_enumjobs(cli, mem_ctx,
 | ||
| 					       &handle,
 | ||
| 					       0, /* firstjob */
 | ||
| 					       0xff, /* numjobs */
 | ||
| 					       2, /* level */
 | ||
| 					       0, /* offered */
 | ||
| 					       &num_jobs,
 | ||
| 					       &job_info);
 | ||
| 		if (!W_ERROR_IS_OK(werr)) {
 | ||
| 			desc.errcode = W_ERROR_V(werr);
 | ||
| 			goto out;
 | ||
| 		}
 | ||
| 
 | ||
| 		count = num_jobs;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		desc.base = *rdata;
 | ||
| 		desc.buflen = mdrcnt;
 | ||
| 	} else {
 | ||
| 		/*
 | ||
| 		 * Don't return data but need to get correct length
 | ||
| 		 * init_package will return wrong size if buflen=0
 | ||
| 		 */
 | ||
| 		desc.buflen = getlen(desc.format);
 | ||
| 		desc.base = tmpdata = (char *) SMB_MALLOC (desc.buflen);
 | ||
| 	}
 | ||
| 
 | ||
| 	if (init_package(&desc,1,count)) {
 | ||
| 		desc.subcount = count;
 | ||
| 		fill_printq_info(uLevel,&desc,count, job_info, &driver_info.info3, &printer_info.info2);
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	/*
 | ||
| 	 * We must set the return code to ERRbuftoosmall
 | ||
| 	 * in order to support lanman style printing with Win NT/2k
 | ||
| 	 * clients       --jerry
 | ||
| 	 */
 | ||
| 	if (!mdrcnt && lp_disable_spoolss())
 | ||
| 		desc.errcode = ERRbuftoosmall;
 | ||
| 
 | ||
|  out:
 | ||
| 	if (b && is_valid_policy_hnd(&handle)) {
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		SAFE_FREE(tmpdata);
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,desc.neededlen);
 | ||
| 
 | ||
| 	DEBUG(4,("printqgetinfo: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	SAFE_FREE(tmpdata);
 | ||
| 
 | ||
| 	return(True);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  View list of all print jobs on all queues.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool api_DosPrintQEnum(struct smbd_server_connection *sconn,
 | ||
| 			      connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt, int mprcnt,
 | ||
| 				char **rdata, char** rparam,
 | ||
| 				int *rdata_len, int *rparam_len)
 | ||
| {
 | ||
| 	char *param_format = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *output_format1 = skip_string(param,tpscnt,param_format);
 | ||
| 	char *p = skip_string(param,tpscnt,output_format1);
 | ||
| 	unsigned int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	char *output_format2 = get_safe_str_ptr(param,tpscnt,p,4);
 | ||
| 	int i;
 | ||
| 	struct pack_desc desc;
 | ||
| 	int *subcntarr = NULL;
 | ||
| 	int queuecnt = 0, subcnt = 0, succnt = 0;
 | ||
| 
 | ||
| 	WERROR werr = WERR_OK;
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	uint32_t num_printers;
 | ||
| 	union spoolss_PrinterInfo *printer_info;
 | ||
| 	union spoolss_DriverInfo *driver_info;
 | ||
| 	union spoolss_JobInfo **job_info;
 | ||
| 
 | ||
| 	if (!param_format || !output_format1 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	DEBUG(3,("DosPrintQEnum uLevel=%d\n",uLevel));
 | ||
| 
 | ||
| 	if (!prefix_ok(param_format,"WrLeh")) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_printq_info(&desc,uLevel,output_format1,output_format2)) {
 | ||
| 		/*
 | ||
| 		 * Patch from Scott Moomaw <scott@bridgewater.edu>
 | ||
| 		 * to return the 'invalid info level' error if an
 | ||
| 		 * unknown level was requested.
 | ||
| 		 */
 | ||
| 		*rdata_len = 0;
 | ||
| 		*rparam_len = 6;
 | ||
| 		*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 		if (!*rparam) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		SSVALS(*rparam,0,ERRunknownlevel);
 | ||
| 		SSVAL(*rparam,2,0);
 | ||
| 		SSVAL(*rparam,4,0);
 | ||
| 		return(True);
 | ||
| 	}
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_DosPrintQEnum: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	werr = rpccli_spoolss_enumprinters(cli, mem_ctx,
 | ||
| 					   PRINTER_ENUM_LOCAL,
 | ||
| 					   cli->srv_name_slash,
 | ||
| 					   2,
 | ||
| 					   0,
 | ||
| 					   &num_printers,
 | ||
| 					   &printer_info);
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	queuecnt = num_printers;
 | ||
| 
 | ||
| 	job_info = talloc_array(mem_ctx, union spoolss_JobInfo *, num_printers);
 | ||
| 	if (job_info == NULL) {
 | ||
| 		goto err;
 | ||
| 	}
 | ||
| 
 | ||
| 	driver_info = talloc_array(mem_ctx, union spoolss_DriverInfo, num_printers);
 | ||
| 	if (driver_info == NULL) {
 | ||
| 		goto err;
 | ||
| 	}
 | ||
| 
 | ||
| 	if((subcntarr = SMB_MALLOC_ARRAY(int,queuecnt)) == NULL) {
 | ||
| 		DEBUG(0,("api_DosPrintQEnum: malloc fail !\n"));
 | ||
| 		goto err;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			goto err;
 | ||
| 		}
 | ||
| 	}
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 
 | ||
| 	subcnt = 0;
 | ||
| 	for (i = 0; i < num_printers; i++) {
 | ||
| 
 | ||
| 		uint32_t num_jobs;
 | ||
| 		struct policy_handle handle;
 | ||
| 		const char *printername;
 | ||
| 
 | ||
| 		printername = talloc_strdup(mem_ctx, printer_info[i].info2.printername);
 | ||
| 		if (printername == NULL) {
 | ||
| 			goto err;
 | ||
| 		}
 | ||
| 
 | ||
| 		ZERO_STRUCT(handle);
 | ||
| 		ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 		status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 						    printername,
 | ||
| 						    "RAW",
 | ||
| 						    devmode_ctr,
 | ||
| 						    PRINTER_ACCESS_USE,
 | ||
| 						    &handle,
 | ||
| 						    &werr);
 | ||
| 		if (!NT_STATUS_IS_OK(status)) {
 | ||
| 			desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 			goto out;
 | ||
| 		}
 | ||
| 		if (!W_ERROR_IS_OK(werr)) {
 | ||
| 			desc.errcode = W_ERROR_V(werr);
 | ||
| 			goto out;
 | ||
| 		}
 | ||
| 
 | ||
| 		werr = rpccli_spoolss_enumjobs(cli, mem_ctx,
 | ||
| 					       &handle,
 | ||
| 					       0, /* firstjob */
 | ||
| 					       0xff, /* numjobs */
 | ||
| 					       2, /* level */
 | ||
| 					       0, /* offered */
 | ||
| 					       &num_jobs,
 | ||
| 					       &job_info[i]);
 | ||
| 		if (!W_ERROR_IS_OK(werr)) {
 | ||
| 			desc.errcode = W_ERROR_V(werr);
 | ||
| 			goto out;
 | ||
| 		}
 | ||
| 
 | ||
| 		if (uLevel==52) {
 | ||
| 			uint32_t server_major_version;
 | ||
| 			uint32_t server_minor_version;
 | ||
| 
 | ||
| 			werr = rpccli_spoolss_getprinterdriver2(cli, mem_ctx,
 | ||
| 								&handle,
 | ||
| 								"Windows 4.0",
 | ||
| 								3, /* level */
 | ||
| 								0,
 | ||
| 								0, /* version */
 | ||
| 								0,
 | ||
| 								&driver_info[i],
 | ||
| 								&server_major_version,
 | ||
| 								&server_minor_version);
 | ||
| 			if (!W_ERROR_IS_OK(werr)) {
 | ||
| 				desc.errcode = W_ERROR_V(werr);
 | ||
| 				goto out;
 | ||
| 			}
 | ||
| 		}
 | ||
| 
 | ||
| 		subcntarr[i] = num_jobs;
 | ||
| 		subcnt += subcntarr[i];
 | ||
| 
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	if (init_package(&desc,queuecnt,subcnt)) {
 | ||
| 		for (i = 0; i < num_printers; i++) {
 | ||
| 			fill_printq_info(uLevel,&desc,subcntarr[i], job_info[i], &driver_info[i].info3, &printer_info[i].info2);
 | ||
| 			if (desc.errcode == NERR_Success) {
 | ||
| 				succnt = i;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
|  out:
 | ||
| 	SAFE_FREE(subcntarr);
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		goto err;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,succnt);
 | ||
| 	SSVAL(*rparam,6,queuecnt);
 | ||
| 
 | ||
| 	return True;
 | ||
| 
 | ||
|   err:
 | ||
| 
 | ||
| 	SAFE_FREE(subcntarr);
 | ||
| 
 | ||
| 	return False;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  Get info level for a server list query.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool check_session_info(int uLevel, char* id)
 | ||
| {
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0:
 | ||
| 			if (strcmp(id,"B16") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 1:
 | ||
| 			if (strcmp(id,"B16BBDz") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			return False;
 | ||
| 	}
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| struct srv_info_struct {
 | ||
| 	fstring name;
 | ||
| 	uint32_t type;
 | ||
| 	fstring comment;
 | ||
| 	fstring domain;
 | ||
| 	bool server_added;
 | ||
| };
 | ||
| 
 | ||
| /*******************************************************************
 | ||
|  Get server info lists from the files saved by nmbd. Return the
 | ||
|  number of entries.
 | ||
| ******************************************************************/
 | ||
| 
 | ||
| static int get_session_info(uint32_t servertype,
 | ||
| 			   struct srv_info_struct **servers,
 | ||
| 			   const char *domain)
 | ||
| {
 | ||
| 	int count=0;
 | ||
| 	int alloced=0;
 | ||
| 	char **lines;
 | ||
| 	bool local_list_only;
 | ||
| 	int i;
 | ||
| 	char *slist_cache_path = cache_path(talloc_tos(), SERVER_LIST);
 | ||
| 	if (slist_cache_path == NULL) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 
 | ||
| 	lines = file_lines_load(slist_cache_path, NULL, 0, NULL);
 | ||
| 	if (!lines) {
 | ||
| 		DEBUG(4, ("Can't open %s - %s\n",
 | ||
| 			  slist_cache_path, strerror(errno)));
 | ||
| 		TALLOC_FREE(slist_cache_path);
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 	TALLOC_FREE(slist_cache_path);
 | ||
| 
 | ||
| 	/* request for everything is code for request all servers */
 | ||
| 	if (servertype == SV_TYPE_ALL) {
 | ||
| 		servertype &= ~(SV_TYPE_DOMAIN_ENUM|SV_TYPE_LOCAL_LIST_ONLY);
 | ||
| 	}
 | ||
| 
 | ||
| 	local_list_only = (servertype & SV_TYPE_LOCAL_LIST_ONLY);
 | ||
| 
 | ||
| 	DEBUG(4,("Servertype search: %8x\n",servertype));
 | ||
| 
 | ||
| 	for (i=0;lines[i];i++) {
 | ||
| 		fstring stype;
 | ||
| 		struct srv_info_struct *s;
 | ||
| 		const char *ptr = lines[i];
 | ||
| 		bool ok = True;
 | ||
| 		TALLOC_CTX *frame = NULL;
 | ||
| 		char *p;
 | ||
| 
 | ||
| 		if (!*ptr) {
 | ||
| 			continue;
 | ||
| 		}
 | ||
| 
 | ||
| 		if (count == alloced) {
 | ||
| 			alloced += 10;
 | ||
| 			*servers = SMB_REALLOC_ARRAY(*servers,struct srv_info_struct, alloced);
 | ||
| 			if (!*servers) {
 | ||
| 				DEBUG(0,("get_session_info: failed to enlarge servers info struct!\n"));
 | ||
| 				TALLOC_FREE(lines);
 | ||
| 				return 0;
 | ||
| 			}
 | ||
| 			memset((char *)((*servers)+count),'\0',sizeof(**servers)*(alloced-count));
 | ||
| 		}
 | ||
| 		s = &(*servers)[count];
 | ||
| 
 | ||
| 		frame = talloc_stackframe();
 | ||
| 		s->name[0] = '\0';
 | ||
| 		if (!next_token_talloc(frame,&ptr,&p, NULL)) {
 | ||
| 			TALLOC_FREE(frame);
 | ||
| 			continue;
 | ||
| 		}
 | ||
| 		fstrcpy(s->name, p);
 | ||
| 
 | ||
| 		stype[0] = '\0';
 | ||
| 		if (!next_token_talloc(frame,&ptr, &p, NULL)) {
 | ||
| 			TALLOC_FREE(frame);
 | ||
| 			continue;
 | ||
| 		}
 | ||
| 		fstrcpy(stype, p);
 | ||
| 
 | ||
| 		s->comment[0] = '\0';
 | ||
| 		if (!next_token_talloc(frame,&ptr, &p, NULL)) {
 | ||
| 			TALLOC_FREE(frame);
 | ||
| 			continue;
 | ||
| 		}
 | ||
| 		fstrcpy(s->comment, p);
 | ||
| 		string_truncate(s->comment, MAX_SERVER_STRING_LENGTH);
 | ||
| 
 | ||
| 		s->domain[0] = '\0';
 | ||
| 		if (!next_token_talloc(frame,&ptr,&p, NULL)) {
 | ||
| 			/* this allows us to cope with an old nmbd */
 | ||
| 			fstrcpy(s->domain,lp_workgroup());
 | ||
| 		} else {
 | ||
| 			fstrcpy(s->domain, p);
 | ||
| 		}
 | ||
| 		TALLOC_FREE(frame);
 | ||
| 
 | ||
| 		if (sscanf(stype,"%X",&s->type) != 1) {
 | ||
| 			DEBUG(4,("r:host file "));
 | ||
| 			ok = False;
 | ||
| 		}
 | ||
| 
 | ||
| 		/* Filter the servers/domains we return based on what was asked for. */
 | ||
| 
 | ||
| 		/* Check to see if we are being asked for a local list only. */
 | ||
| 		if(local_list_only && ((s->type & SV_TYPE_LOCAL_LIST_ONLY) == 0)) {
 | ||
| 			DEBUG(4,("r: local list only"));
 | ||
| 			ok = False;
 | ||
| 		}
 | ||
| 
 | ||
| 		/* doesn't match up: don't want it */
 | ||
| 		if (!(servertype & s->type)) {
 | ||
| 			DEBUG(4,("r:serv type "));
 | ||
| 			ok = False;
 | ||
| 		}
 | ||
| 
 | ||
| 		if ((servertype & SV_TYPE_DOMAIN_ENUM) !=
 | ||
| 				(s->type & SV_TYPE_DOMAIN_ENUM)) {
 | ||
| 			DEBUG(4,("s: dom mismatch "));
 | ||
| 			ok = False;
 | ||
| 		}
 | ||
| 
 | ||
| 		if (!strequal(domain, s->domain) && !(servertype & SV_TYPE_DOMAIN_ENUM)) {
 | ||
| 			ok = False;
 | ||
| 		}
 | ||
| 
 | ||
| 		/* We should never return a server type with a SV_TYPE_LOCAL_LIST_ONLY set. */
 | ||
| 		s->type &= ~SV_TYPE_LOCAL_LIST_ONLY;
 | ||
| 
 | ||
| 		if (ok) {
 | ||
| 			DEBUG(4,("**SV** %20s %8x %25s %15s\n",
 | ||
| 				s->name, s->type, s->comment, s->domain));
 | ||
| 			s->server_added = True;
 | ||
| 			count++;
 | ||
| 		} else {
 | ||
| 			DEBUG(4,("%20s %8x %25s %15s\n",
 | ||
| 				s->name, s->type, s->comment, s->domain));
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	TALLOC_FREE(lines);
 | ||
| 	return count;
 | ||
| }
 | ||
| 
 | ||
| /*******************************************************************
 | ||
|  Fill in a server info structure.
 | ||
| ******************************************************************/
 | ||
| 
 | ||
| static int fill_srv_info(struct srv_info_struct *service,
 | ||
| 			 int uLevel, char **buf, int *buflen,
 | ||
| 			 char **stringbuf, int *stringspace, char *baseaddr)
 | ||
| {
 | ||
| 	int struct_len;
 | ||
| 	char* p;
 | ||
| 	char* p2;
 | ||
| 	int l2;
 | ||
| 	int len;
 | ||
| 
 | ||
| 	switch (uLevel) {
 | ||
| 		case 0:
 | ||
| 			struct_len = 16;
 | ||
| 			break;
 | ||
| 		case 1:
 | ||
| 			struct_len = 26;
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			return -1;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!buf) {
 | ||
| 		len = 0;
 | ||
| 		switch (uLevel) {
 | ||
| 			case 1:
 | ||
| 				len = strlen(service->comment)+1;
 | ||
| 				break;
 | ||
| 		}
 | ||
| 
 | ||
| 		*buflen = struct_len;
 | ||
| 		*stringspace = len;
 | ||
| 		return struct_len + len;
 | ||
| 	}
 | ||
| 
 | ||
| 	len = struct_len;
 | ||
| 	p = *buf;
 | ||
| 	if (*buflen < struct_len) {
 | ||
| 		return -1;
 | ||
| 	}
 | ||
| 	if (stringbuf) {
 | ||
| 		p2 = *stringbuf;
 | ||
| 		l2 = *stringspace;
 | ||
| 	} else {
 | ||
| 		p2 = p + struct_len;
 | ||
| 		l2 = *buflen - struct_len;
 | ||
| 	}
 | ||
| 	if (!baseaddr) {
 | ||
| 		baseaddr = p;
 | ||
| 	}
 | ||
| 
 | ||
| 	switch (uLevel) {
 | ||
| 		case 0:
 | ||
| 			push_ascii(p,service->name, MAX_NETBIOSNAME_LEN, STR_TERMINATE);
 | ||
| 			break;
 | ||
| 
 | ||
| 		case 1:
 | ||
| 			push_ascii(p,service->name,MAX_NETBIOSNAME_LEN, STR_TERMINATE);
 | ||
| 			SIVAL(p,18,service->type);
 | ||
| 			SIVAL(p,22,PTR_DIFF(p2,baseaddr));
 | ||
| 			len += CopyAndAdvance(&p2,service->comment,&l2);
 | ||
| 			break;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (stringbuf) {
 | ||
| 		*buf = p + struct_len;
 | ||
| 		*buflen -= struct_len;
 | ||
| 		*stringbuf = p2;
 | ||
| 		*stringspace = l2;
 | ||
| 	} else {
 | ||
| 		*buf = p2;
 | ||
| 		*buflen -= len;
 | ||
| 	}
 | ||
| 	return len;
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| static int srv_comp(struct srv_info_struct *s1,struct srv_info_struct *s2)
 | ||
| {
 | ||
| 	return strcasecmp_m(s1->name,s2->name);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  View list of servers available (or possibly domains). The info is
 | ||
|  extracted from lists saved by nmbd on the local host.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RNetServerEnum2(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt, int mprcnt, char **rdata,
 | ||
| 				char **rparam, int *rdata_len, int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param, tpscnt, param, 2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel = get_safe_SVAL(param, tpscnt, p, 0, -1);
 | ||
| 	int buf_len = get_safe_SVAL(param,tpscnt, p, 2, 0);
 | ||
| 	uint32_t servertype = get_safe_IVAL(param,tpscnt,p,4, 0);
 | ||
| 	char *p2;
 | ||
| 	int data_len, fixed_len, string_len;
 | ||
| 	int f_len = 0, s_len = 0;
 | ||
| 	struct srv_info_struct *servers=NULL;
 | ||
| 	int counted=0,total=0;
 | ||
| 	int i,missed;
 | ||
| 	fstring domain;
 | ||
| 	bool domain_request;
 | ||
| 	bool local_request;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* If someone sets all the bits they don't really mean to set
 | ||
| 	   DOMAIN_ENUM and LOCAL_LIST_ONLY, they just want all the
 | ||
| 	   known servers. */
 | ||
| 
 | ||
| 	if (servertype == SV_TYPE_ALL) {
 | ||
| 		servertype &= ~(SV_TYPE_DOMAIN_ENUM|SV_TYPE_LOCAL_LIST_ONLY);
 | ||
| 	}
 | ||
| 
 | ||
| 	/* If someone sets SV_TYPE_LOCAL_LIST_ONLY but hasn't set
 | ||
| 	   any other bit (they may just set this bit on its own) they
 | ||
| 	   want all the locally seen servers. However this bit can be
 | ||
| 	   set on its own so set the requested servers to be
 | ||
| 	   ALL - DOMAIN_ENUM. */
 | ||
| 
 | ||
| 	if ((servertype & SV_TYPE_LOCAL_LIST_ONLY) && !(servertype & SV_TYPE_DOMAIN_ENUM)) {
 | ||
| 		servertype = SV_TYPE_ALL & ~(SV_TYPE_DOMAIN_ENUM);
 | ||
| 	}
 | ||
| 
 | ||
| 	domain_request = ((servertype & SV_TYPE_DOMAIN_ENUM) != 0);
 | ||
| 	local_request = ((servertype & SV_TYPE_LOCAL_LIST_ONLY) != 0);
 | ||
| 
 | ||
| 	p += 8;
 | ||
| 
 | ||
| 	if (!prefix_ok(str1,"WrLehD")) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_session_info(uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(4, ("server request level: %s %8x ", str2, servertype));
 | ||
| 	DEBUG(4, ("domains_req:%s ", BOOLSTR(domain_request)));
 | ||
| 	DEBUG(4, ("local_only:%s\n", BOOLSTR(local_request)));
 | ||
| 
 | ||
| 	if (strcmp(str1, "WrLehDz") == 0) {
 | ||
| 		if (skip_string(param,tpscnt,p) == NULL) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		pull_ascii_fstring(domain, p);
 | ||
| 	} else {
 | ||
| 		fstrcpy(domain, lp_workgroup());
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(4, ("domain [%s]\n", domain));
 | ||
| 
 | ||
| 	if (lp_browse_list()) {
 | ||
| 		total = get_session_info(servertype,&servers,domain);
 | ||
| 	}
 | ||
| 
 | ||
| 	data_len = fixed_len = string_len = 0;
 | ||
| 	missed = 0;
 | ||
| 
 | ||
| 	TYPESAFE_QSORT(servers, total, srv_comp);
 | ||
| 
 | ||
| 	{
 | ||
| 		char *lastname=NULL;
 | ||
| 
 | ||
| 		for (i=0;i<total;i++) {
 | ||
| 			struct srv_info_struct *s = &servers[i];
 | ||
| 
 | ||
| 			if (lastname && strequal(lastname,s->name)) {
 | ||
| 				continue;
 | ||
| 			}
 | ||
| 			lastname = s->name;
 | ||
| 			data_len += fill_srv_info(s,uLevel,0,&f_len,0,&s_len,0);
 | ||
| 			DEBUG(4,("fill_srv_info[%d] %20s %8x %25s %15s\n",
 | ||
| 				i, s->name, s->type, s->comment, s->domain));
 | ||
| 
 | ||
| 			if (data_len < buf_len) {
 | ||
| 				counted++;
 | ||
| 				fixed_len += f_len;
 | ||
| 				string_len += s_len;
 | ||
| 			} else {
 | ||
| 				missed++;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = fixed_len + string_len;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	p2 = (*rdata) + fixed_len;	/* auxiliary data (strings) will go here */
 | ||
| 	p = *rdata;
 | ||
| 	f_len = fixed_len;
 | ||
| 	s_len = string_len;
 | ||
| 
 | ||
| 	{
 | ||
| 		char *lastname=NULL;
 | ||
| 		int count2 = counted;
 | ||
| 
 | ||
| 		for (i = 0; i < total && count2;i++) {
 | ||
| 			struct srv_info_struct *s = &servers[i];
 | ||
| 
 | ||
| 			if (lastname && strequal(lastname,s->name)) {
 | ||
| 				continue;
 | ||
| 			}
 | ||
| 			lastname = s->name;
 | ||
| 			fill_srv_info(s,uLevel,&p,&f_len,&p2,&s_len,*rdata);
 | ||
| 			DEBUG(4,("fill_srv_info[%d] %20s %8x %25s %15s\n",
 | ||
| 				i, s->name, s->type, s->comment, s->domain));
 | ||
| 			count2--;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVAL(*rparam,0,(missed == 0 ? NERR_Success : ERRmoredata));
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,counted);
 | ||
| 	SSVAL(*rparam,6,counted+missed);
 | ||
| 
 | ||
| 	SAFE_FREE(servers);
 | ||
| 
 | ||
| 	DEBUG(3,("NetServerEnum2 domain = %s uLevel=%d counted=%d total=%d\n",
 | ||
| 		domain,uLevel,counted,counted+missed));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static int srv_name_match(const char *n1, const char *n2)
 | ||
| {
 | ||
| 	/*
 | ||
| 	 * [MS-RAP] footnote <88> for Section 3.2.5.15 says:
 | ||
| 	 *
 | ||
| 	 *  In Windows, FirstNameToReturn need not be an exact match:
 | ||
| 	 *  the server will return a list of servers that exist on
 | ||
| 	 *  the network greater than or equal to the FirstNameToReturn.
 | ||
| 	 */
 | ||
| 	int ret = strcasecmp_m(n1, n2);
 | ||
| 
 | ||
| 	if (ret <= 0) {
 | ||
| 		return 0;
 | ||
| 	}
 | ||
| 
 | ||
| 	return ret;
 | ||
| }
 | ||
| 
 | ||
| static bool api_RNetServerEnum3(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt, int mprcnt, char **rdata,
 | ||
| 				char **rparam, int *rdata_len, int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param, tpscnt, param, 2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel = get_safe_SVAL(param, tpscnt, p, 0, -1);
 | ||
| 	int buf_len = get_safe_SVAL(param,tpscnt, p, 2, 0);
 | ||
| 	uint32_t servertype = get_safe_IVAL(param,tpscnt,p,4, 0);
 | ||
| 	char *p2;
 | ||
| 	int data_len, fixed_len, string_len;
 | ||
| 	int f_len = 0, s_len = 0;
 | ||
| 	struct srv_info_struct *servers=NULL;
 | ||
| 	int counted=0,first=0,total=0;
 | ||
| 	int i,missed;
 | ||
| 	fstring domain;
 | ||
| 	fstring first_name;
 | ||
| 	bool domain_request;
 | ||
| 	bool local_request;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* If someone sets all the bits they don't really mean to set
 | ||
| 	   DOMAIN_ENUM and LOCAL_LIST_ONLY, they just want all the
 | ||
| 	   known servers. */
 | ||
| 
 | ||
| 	if (servertype == SV_TYPE_ALL) {
 | ||
| 		servertype &= ~(SV_TYPE_DOMAIN_ENUM|SV_TYPE_LOCAL_LIST_ONLY);
 | ||
| 	}
 | ||
| 
 | ||
| 	/* If someone sets SV_TYPE_LOCAL_LIST_ONLY but hasn't set
 | ||
| 	   any other bit (they may just set this bit on its own) they
 | ||
| 	   want all the locally seen servers. However this bit can be
 | ||
| 	   set on its own so set the requested servers to be
 | ||
| 	   ALL - DOMAIN_ENUM. */
 | ||
| 
 | ||
| 	if ((servertype & SV_TYPE_LOCAL_LIST_ONLY) && !(servertype & SV_TYPE_DOMAIN_ENUM)) {
 | ||
| 		servertype = SV_TYPE_ALL & ~(SV_TYPE_DOMAIN_ENUM);
 | ||
| 	}
 | ||
| 
 | ||
| 	domain_request = ((servertype & SV_TYPE_DOMAIN_ENUM) != 0);
 | ||
| 	local_request = ((servertype & SV_TYPE_LOCAL_LIST_ONLY) != 0);
 | ||
| 
 | ||
| 	p += 8;
 | ||
| 
 | ||
| 	if (strcmp(str1, "WrLehDzz") != 0) {
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	if (!check_session_info(uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(4, ("server request level: %s %8x ", str2, servertype));
 | ||
| 	DEBUG(4, ("domains_req:%s ", BOOLSTR(domain_request)));
 | ||
| 	DEBUG(4, ("local_only:%s\n", BOOLSTR(local_request)));
 | ||
| 
 | ||
| 	if (skip_string(param,tpscnt,p) == NULL) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	pull_ascii_fstring(domain, p);
 | ||
| 	if (domain[0] == '\0') {
 | ||
| 		fstrcpy(domain, lp_workgroup());
 | ||
| 	}
 | ||
| 	p = skip_string(param,tpscnt,p);
 | ||
| 	if (skip_string(param,tpscnt,p) == NULL) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	pull_ascii_fstring(first_name, p);
 | ||
| 
 | ||
| 	DEBUG(4, ("domain: '%s' first_name: '%s'\n",
 | ||
| 		  domain, first_name));
 | ||
| 
 | ||
| 	if (lp_browse_list()) {
 | ||
| 		total = get_session_info(servertype,&servers,domain);
 | ||
| 	}
 | ||
| 
 | ||
| 	data_len = fixed_len = string_len = 0;
 | ||
| 	missed = 0;
 | ||
| 
 | ||
| 	TYPESAFE_QSORT(servers, total, srv_comp);
 | ||
| 
 | ||
| 	if (first_name[0] != '\0') {
 | ||
| 		struct srv_info_struct *first_server = NULL;
 | ||
| 
 | ||
| 		BINARY_ARRAY_SEARCH(servers, total, name, first_name,
 | ||
| 				    srv_name_match, first_server);
 | ||
| 		if (first_server) {
 | ||
| 			first = PTR_DIFF(first_server, servers) / sizeof(*servers);
 | ||
| 			/*
 | ||
| 			 * The binary search may not find the exact match
 | ||
| 			 * so we need to search backward to find the first match
 | ||
| 			 *
 | ||
| 			 * This implements the strange matching windows
 | ||
| 			 * implements. (see the comment in srv_name_match().
 | ||
| 			 */
 | ||
| 			for (;first > 0;) {
 | ||
| 				int ret;
 | ||
| 				ret = strcasecmp_m(first_name,
 | ||
| 						 servers[first-1].name);
 | ||
| 				if (ret > 0) {
 | ||
| 					break;
 | ||
| 				}
 | ||
| 				first--;
 | ||
| 			}
 | ||
| 		} else {
 | ||
| 			/* we should return no entries */
 | ||
| 			first = total;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	{
 | ||
| 		char *lastname=NULL;
 | ||
| 
 | ||
| 		for (i=first;i<total;i++) {
 | ||
| 			struct srv_info_struct *s = &servers[i];
 | ||
| 
 | ||
| 			if (lastname && strequal(lastname,s->name)) {
 | ||
| 				continue;
 | ||
| 			}
 | ||
| 			lastname = s->name;
 | ||
| 			data_len += fill_srv_info(s,uLevel,0,&f_len,0,&s_len,0);
 | ||
| 			DEBUG(4,("fill_srv_info[%d] %20s %8x %25s %15s\n",
 | ||
| 				i, s->name, s->type, s->comment, s->domain));
 | ||
| 
 | ||
| 			if (data_len < buf_len) {
 | ||
| 				counted++;
 | ||
| 				fixed_len += f_len;
 | ||
| 				string_len += s_len;
 | ||
| 			} else {
 | ||
| 				missed++;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = fixed_len + string_len;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	p2 = (*rdata) + fixed_len;	/* auxiliary data (strings) will go here */
 | ||
| 	p = *rdata;
 | ||
| 	f_len = fixed_len;
 | ||
| 	s_len = string_len;
 | ||
| 
 | ||
| 	{
 | ||
| 		char *lastname=NULL;
 | ||
| 		int count2 = counted;
 | ||
| 
 | ||
| 		for (i = first; i < total && count2;i++) {
 | ||
| 			struct srv_info_struct *s = &servers[i];
 | ||
| 
 | ||
| 			if (lastname && strequal(lastname,s->name)) {
 | ||
| 				continue;
 | ||
| 			}
 | ||
| 			lastname = s->name;
 | ||
| 			fill_srv_info(s,uLevel,&p,&f_len,&p2,&s_len,*rdata);
 | ||
| 			DEBUG(4,("fill_srv_info[%d] %20s %8x %25s %15s\n",
 | ||
| 				i, s->name, s->type, s->comment, s->domain));
 | ||
| 			count2--;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVAL(*rparam,0,(missed == 0 ? NERR_Success : ERRmoredata));
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,counted);
 | ||
| 	SSVAL(*rparam,6,counted+missed);
 | ||
| 
 | ||
| 	DEBUG(3,("NetServerEnum3 domain = %s uLevel=%d first=%d[%s => %s] counted=%d total=%d\n",
 | ||
| 		domain,uLevel,first,first_name,
 | ||
| 		first < total ? servers[first].name : "",
 | ||
| 		counted,counted+missed));
 | ||
| 
 | ||
| 	SAFE_FREE(servers);
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   command 0x34 - suspected of being a "Lookup Names" stub api
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RNetGroupGetUsers(struct smbd_server_connection *sconn,
 | ||
| 				  connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt, int mprcnt, char **rdata,
 | ||
| 				char **rparam, int *rdata_len, int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	int buf_len = get_safe_SVAL(param,tpscnt,p,2,0);
 | ||
| 	int counted=0;
 | ||
| 	int missed=0;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(5,("RNetGroupGetUsers: %s %s %s %d %d\n",
 | ||
| 		str1, str2, p, uLevel, buf_len));
 | ||
| 
 | ||
| 	if (!prefix_ok(str1,"zWrLeh")) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,0x08AC); /* informational warning message */
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,counted);
 | ||
| 	SSVAL(*rparam,6,counted+missed);
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   get info about a share
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| static bool check_share_info(int uLevel, char* id)
 | ||
| {
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0:
 | ||
| 			if (strcmp(id,"B13") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 1:
 | ||
| 			/* Level-2 descriptor is allowed (and ignored) */
 | ||
| 			if (strcmp(id,"B13BWz") != 0 &&
 | ||
| 			    strcmp(id,"B13BWzWWWzB9B") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 2:
 | ||
| 			if (strcmp(id,"B13BWzWWWzB9B") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		case 91:
 | ||
| 			if (strcmp(id,"B13BWzWWWzB9BB9BWzWWzWW") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			return False;
 | ||
| 	}
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static int fill_share_info(connection_struct *conn, int snum, int uLevel,
 | ||
|  			   char** buf, int* buflen,
 | ||
|  			   char** stringbuf, int* stringspace, char* baseaddr)
 | ||
| {
 | ||
| 	const struct loadparm_substitution *lp_sub =
 | ||
| 		loadparm_s3_global_substitution();
 | ||
| 	int struct_len;
 | ||
| 	char* p;
 | ||
| 	char* p2;
 | ||
| 	int l2;
 | ||
| 	int len;
 | ||
| 
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0:
 | ||
| 			struct_len = 13;
 | ||
| 			break;
 | ||
| 		case 1:
 | ||
| 			struct_len = 20;
 | ||
| 			break;
 | ||
| 		case 2:
 | ||
| 			struct_len = 40;
 | ||
| 			break;
 | ||
| 		case 91:
 | ||
| 			struct_len = 68;
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			return -1;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!buf) {
 | ||
| 		len = 0;
 | ||
| 
 | ||
| 		if (uLevel > 0) {
 | ||
| 			len += StrlenExpanded(conn,snum,lp_comment(talloc_tos(), lp_sub, snum));
 | ||
| 		}
 | ||
| 		if (uLevel > 1) {
 | ||
| 			len += strlen(lp_path(talloc_tos(), lp_sub, snum)) + 1;
 | ||
| 		}
 | ||
| 		if (buflen) {
 | ||
| 			*buflen = struct_len;
 | ||
| 		}
 | ||
| 		if (stringspace) {
 | ||
| 			*stringspace = len;
 | ||
| 		}
 | ||
| 		return struct_len + len;
 | ||
| 	}
 | ||
| 
 | ||
| 	len = struct_len;
 | ||
| 	p = *buf;
 | ||
| 	if ((*buflen) < struct_len) {
 | ||
| 		return -1;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (stringbuf) {
 | ||
| 		p2 = *stringbuf;
 | ||
| 		l2 = *stringspace;
 | ||
| 	} else {
 | ||
| 		p2 = p + struct_len;
 | ||
| 		l2 = (*buflen) - struct_len;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!baseaddr) {
 | ||
| 		baseaddr = p;
 | ||
| 	}
 | ||
| 
 | ||
| 	push_ascii(p,lp_servicename(talloc_tos(), lp_sub, snum),13, STR_TERMINATE);
 | ||
| 
 | ||
| 	if (uLevel > 0) {
 | ||
| 		int type;
 | ||
| 
 | ||
| 		SCVAL(p,13,0);
 | ||
| 		type = STYPE_DISKTREE;
 | ||
| 		if (lp_printable(snum)) {
 | ||
| 			type = STYPE_PRINTQ;
 | ||
| 		}
 | ||
| 		if (strequal("IPC",lp_fstype(snum))) {
 | ||
| 			type = STYPE_IPC;
 | ||
| 		}
 | ||
| 		SSVAL(p,14,type);		/* device type */
 | ||
| 		SIVAL(p,16,PTR_DIFF(p2,baseaddr));
 | ||
| 		len += CopyExpanded(conn,snum,&p2,lp_comment(talloc_tos(), lp_sub, snum),&l2);
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel > 1) {
 | ||
| 		SSVAL(p,20,ACCESS_READ|ACCESS_WRITE|ACCESS_CREATE); /* permissions */
 | ||
| 		SSVALS(p,22,-1);		/* max uses */
 | ||
| 		SSVAL(p,24,1); /* current uses */
 | ||
| 		SIVAL(p,26,PTR_DIFF(p2,baseaddr)); /* local pathname */
 | ||
| 		len += CopyAndAdvance(&p2,lp_path(talloc_tos(),lp_sub, snum),&l2);
 | ||
| 		memset(p+30,0,SHPWLEN+2); /* passwd (reserved), pad field */
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel > 2) {
 | ||
| 		memset(p+40,0,SHPWLEN+2);
 | ||
| 		SSVAL(p,50,0);
 | ||
| 		SIVAL(p,52,0);
 | ||
| 		SSVAL(p,56,0);
 | ||
| 		SSVAL(p,58,0);
 | ||
| 		SIVAL(p,60,0);
 | ||
| 		SSVAL(p,64,0);
 | ||
| 		SSVAL(p,66,0);
 | ||
| 	}
 | ||
| 
 | ||
| 	if (stringbuf) {
 | ||
| 		(*buf) = p + struct_len;
 | ||
| 		(*buflen) -= struct_len;
 | ||
| 		(*stringbuf) = p2;
 | ||
| 		(*stringspace) = l2;
 | ||
| 	} else {
 | ||
| 		(*buf) = p2;
 | ||
| 		(*buflen) -= len;
 | ||
| 	}
 | ||
| 
 | ||
| 	return len;
 | ||
| }
 | ||
| 
 | ||
| static bool api_RNetShareGetInfo(struct smbd_server_connection *sconn,
 | ||
| 				 connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *netname_in = skip_string(param,tpscnt,str2);
 | ||
| 	char *netname = NULL;
 | ||
| 	char *p = skip_string(param,tpscnt,netname);
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	int snum;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !netname_in || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	snum = find_service(talloc_tos(), netname_in, &netname);
 | ||
| 	if (snum < 0 || !netname) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (!prefix_ok(str1,"zWrLh")) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_share_info(uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p = *rdata;
 | ||
| 	*rdata_len = fill_share_info(conn,snum,uLevel,&p,&mdrcnt,0,0,0);
 | ||
| 	if (*rdata_len < 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVAL(*rparam,0,NERR_Success);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 	SSVAL(*rparam,4,*rdata_len);
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   View the list of available shares.
 | ||
| 
 | ||
|   This function is the server side of the NetShareEnum() RAP call.
 | ||
|   It fills the return buffer with share names and share comments.
 | ||
|   Note that the return buffer normally (in all known cases) allows only
 | ||
|   twelve byte strings for share names (plus one for a nul terminator).
 | ||
|   Share names longer than 12 bytes must be skipped.
 | ||
|  ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RNetShareEnum(struct smbd_server_connection *sconn,
 | ||
| 			      connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int                mdrcnt,
 | ||
| 				int                mprcnt,
 | ||
| 				char             **rdata,
 | ||
| 				char             **rparam,
 | ||
| 				int               *rdata_len,
 | ||
| 				int               *rparam_len )
 | ||
| {
 | ||
| 	const struct loadparm_substitution *lp_sub =
 | ||
| 		loadparm_s3_global_substitution();
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	int buf_len = get_safe_SVAL(param,tpscnt,p,2,0);
 | ||
| 	char *p2;
 | ||
| 	int count = 0;
 | ||
| 	int total=0,counted=0;
 | ||
| 	bool missed = False;
 | ||
| 	int i;
 | ||
| 	int data_len, fixed_len, string_len;
 | ||
| 	int f_len = 0, s_len = 0;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!prefix_ok(str1,"WrLeh")) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_share_info(uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* Ensure all the usershares are loaded. */
 | ||
| 	become_root();
 | ||
| 	delete_and_reload_printers();
 | ||
| 	load_registry_shares();
 | ||
| 	count = load_usershare_shares(NULL, connections_snum_used);
 | ||
| 	unbecome_root();
 | ||
| 
 | ||
| 	data_len = fixed_len = string_len = 0;
 | ||
| 	for (i=0;i<count;i++) {
 | ||
| 		fstring servicename_dos;
 | ||
| 		if (!(lp_browseable(i) && lp_snum_ok(i))) {
 | ||
| 			continue;
 | ||
| 		}
 | ||
| 		push_ascii_fstring(servicename_dos, lp_servicename(talloc_tos(), lp_sub, i));
 | ||
| 		/* Maximum name length = 13. */
 | ||
| 		if( lp_browseable( i ) && lp_snum_ok( i ) && (strlen(servicename_dos) < 13)) {
 | ||
| 			total++;
 | ||
| 			data_len += fill_share_info(conn,i,uLevel,0,&f_len,0,&s_len,0);
 | ||
| 			if (data_len < buf_len) {
 | ||
| 				counted++;
 | ||
| 				fixed_len += f_len;
 | ||
| 				string_len += s_len;
 | ||
| 			} else {
 | ||
| 				missed = True;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = fixed_len + string_len;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	p2 = (*rdata) + fixed_len;	/* auxiliary data (strings) will go here */
 | ||
| 	p = *rdata;
 | ||
| 	f_len = fixed_len;
 | ||
| 	s_len = string_len;
 | ||
| 
 | ||
| 	for( i = 0; i < count; i++ ) {
 | ||
| 		fstring servicename_dos;
 | ||
| 		if (!(lp_browseable(i) && lp_snum_ok(i))) {
 | ||
| 			continue;
 | ||
| 		}
 | ||
| 
 | ||
| 		push_ascii_fstring(servicename_dos,
 | ||
| 				   lp_servicename(talloc_tos(), lp_sub, i));
 | ||
| 		if (lp_browseable(i) && lp_snum_ok(i) && (strlen(servicename_dos) < 13)) {
 | ||
| 			if (fill_share_info( conn,i,uLevel,&p,&f_len,&p2,&s_len,*rdata ) < 0) {
 | ||
| 				break;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVAL(*rparam,0,missed ? ERRmoredata : NERR_Success);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,counted);
 | ||
| 	SSVAL(*rparam,6,total);
 | ||
| 
 | ||
| 	DEBUG(3,("RNetShareEnum gave %d entries of %d (%d %d %d %d)\n",
 | ||
| 		counted,total,uLevel,
 | ||
| 		buf_len,*rdata_len,mdrcnt));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   Add a share
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RNetShareAdd(struct smbd_server_connection *sconn,
 | ||
| 			     connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	fstring sharename;
 | ||
| 	fstring comment;
 | ||
| 	char *pathname = NULL;
 | ||
| 	unsigned int offset;
 | ||
| 	int res = ERRunsup;
 | ||
| 	size_t converted_size;
 | ||
| 
 | ||
| 	WERROR werr = WERR_OK;
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	union srvsvc_NetShareInfo info;
 | ||
| 	struct srvsvc_NetShareInfo2 info2;
 | ||
| 	struct dcerpc_binding_handle *b;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (!prefix_ok(str1,RAP_WShareAdd_REQ)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_share_info(uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (uLevel != 2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* Do we have a string ? */
 | ||
| 	if (skip_string(data,mdrcnt,data) == NULL) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	pull_ascii_fstring(sharename,data);
 | ||
| 
 | ||
| 	if (mdrcnt < 28) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* only support disk share adds */
 | ||
| 	if (SVAL(data,14)!=STYPE_DISKTREE) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	offset = IVAL(data, 16);
 | ||
| 	if (offset >= mdrcnt) {
 | ||
| 		res = ERRinvalidparam;
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* Do we have a string ? */
 | ||
| 	if (skip_string(data,mdrcnt,data+offset) == NULL) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	pull_ascii_fstring(comment, offset? (data+offset) : "");
 | ||
| 
 | ||
| 	offset = IVAL(data, 26);
 | ||
| 
 | ||
| 	if (offset >= mdrcnt) {
 | ||
| 		res = ERRinvalidparam;
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* Do we have a string ? */
 | ||
| 	if (skip_string(data,mdrcnt,data+offset) == NULL) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!pull_ascii_talloc(talloc_tos(), &pathname,
 | ||
| 			       offset ? (data+offset) : "", &converted_size))
 | ||
| 	{
 | ||
| 		DEBUG(0,("api_RNetShareAdd: pull_ascii_talloc failed: %s\n",
 | ||
| 			 strerror(errno)));
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!pathname) {
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx, &ndr_table_srvsvc,
 | ||
| 					conn->session_info,
 | ||
| 					conn->sconn->remote_address,
 | ||
| 					conn->sconn->local_address,
 | ||
| 					conn->sconn->msg_ctx,
 | ||
| 					&cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_RNetShareAdd: could not connect to srvsvc: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		res = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	info2.name		= sharename;
 | ||
| 	info2.type		= STYPE_DISKTREE;
 | ||
| 	info2.comment		= comment;
 | ||
| 	info2.permissions	= 0;
 | ||
| 	info2.max_users		= 0;
 | ||
| 	info2.current_users	= 0;
 | ||
| 	info2.path		= pathname;
 | ||
| 	info2.password		= NULL;
 | ||
| 
 | ||
| 	info.info2 = &info2;
 | ||
| 
 | ||
| 	status = dcerpc_srvsvc_NetShareAdd(b, mem_ctx,
 | ||
| 					   cli->srv_name_slash,
 | ||
| 					   2,
 | ||
| 					   &info,
 | ||
| 					   NULL,
 | ||
| 					   &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		res = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		res = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVAL(*rparam,0,NERR_Success);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 	SSVAL(*rparam,4,*rdata_len);
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	return True;
 | ||
| 
 | ||
|   out:
 | ||
| 
 | ||
| 	*rparam_len = 4;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	*rdata_len = 0;
 | ||
| 	SSVAL(*rparam,0,res);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   view list of groups available
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RNetGroupEnum(struct smbd_server_connection *sconn,
 | ||
| 			      connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	int i;
 | ||
| 	int errflags=0;
 | ||
| 	int resume_context, cli_buf_size;
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 
 | ||
| 	uint32_t num_groups;
 | ||
| 	uint32_t resume_handle;
 | ||
| 	struct rpc_pipe_client *samr_pipe = NULL;
 | ||
| 	struct policy_handle samr_handle, domain_handle;
 | ||
| 	NTSTATUS status, result;
 | ||
| 	struct dcerpc_binding_handle *b;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (strcmp(str1,"WrLeh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* parameters
 | ||
| 	 * W-> resume context (number of users to skip)
 | ||
| 	 * r -> return parameter pointer to receive buffer
 | ||
| 	 * L -> length of receive buffer
 | ||
| 	 * e -> return parameter number of entries
 | ||
| 	 * h -> return parameter total number of users
 | ||
| 	 */
 | ||
| 
 | ||
| 	if (strcmp("B21",str2) != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(
 | ||
| 		talloc_tos(), &ndr_table_samr,
 | ||
| 		conn->session_info, conn->sconn->remote_address,
 | ||
| 		conn->sconn->local_address, conn->sconn->msg_ctx, &samr_pipe);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: Could not connect to samr: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	b = samr_pipe->binding_handle;
 | ||
| 
 | ||
| 	status = dcerpc_samr_Connect2(b, talloc_tos(), lp_netbios_name(),
 | ||
| 				      SAMR_ACCESS_LOOKUP_DOMAIN, &samr_handle,
 | ||
| 				      &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_Connect2 failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_Connect2 failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_samr_OpenDomain(b, talloc_tos(), &samr_handle,
 | ||
| 					SAMR_DOMAIN_ACCESS_ENUM_ACCOUNTS,
 | ||
| 					get_global_sam_sid(), &domain_handle,
 | ||
| 					&result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_OpenDomain failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		dcerpc_samr_Close(b, talloc_tos(), &samr_handle, &result);
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_OpenDomain failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		dcerpc_samr_Close(b, talloc_tos(), &samr_handle, &result);
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	resume_context = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	cli_buf_size= get_safe_SVAL(param,tpscnt,p,2,0);
 | ||
| 	DEBUG(10,("api_RNetGroupEnum:resume context: %d, client buffer size: "
 | ||
| 		  "%d\n", resume_context, cli_buf_size));
 | ||
| 
 | ||
| 	*rdata_len = cli_buf_size;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	p = *rdata;
 | ||
| 
 | ||
| 	errflags = NERR_Success;
 | ||
| 	num_groups = 0;
 | ||
| 	resume_handle = 0;
 | ||
| 
 | ||
| 	while (true) {
 | ||
| 		struct samr_SamArray *sam_entries;
 | ||
| 		uint32_t num_entries;
 | ||
| 
 | ||
| 		status = dcerpc_samr_EnumDomainGroups(b, talloc_tos(),
 | ||
| 						      &domain_handle,
 | ||
| 						      &resume_handle,
 | ||
| 						      &sam_entries, 1,
 | ||
| 						      &num_entries,
 | ||
| 						      &result);
 | ||
| 		if (!NT_STATUS_IS_OK(status)) {
 | ||
| 			DEBUG(10, ("dcerpc_samr_EnumDomainGroups returned "
 | ||
| 				   "%s\n", nt_errstr(status)));
 | ||
| 			break;
 | ||
| 		}
 | ||
| 		if (!NT_STATUS_IS_OK(result)) {
 | ||
| 			status = result;
 | ||
| 			DEBUG(10, ("dcerpc_samr_EnumDomainGroups returned "
 | ||
| 				   "%s\n", nt_errstr(result)));
 | ||
| 			break;
 | ||
| 		}
 | ||
| 
 | ||
| 		if (num_entries == 0) {
 | ||
| 			DEBUG(10, ("dcerpc_samr_EnumDomainGroups returned "
 | ||
| 				   "no entries -- done\n"));
 | ||
| 			break;
 | ||
| 		}
 | ||
| 
 | ||
| 		for(i=0; i<num_entries; i++) {
 | ||
| 			const char *name;
 | ||
| 
 | ||
| 			name = sam_entries->entries[i].name.string;
 | ||
| 
 | ||
| 			if( ((PTR_DIFF(p,*rdata)+21) > *rdata_len) ) {
 | ||
| 				/* set overflow error */
 | ||
| 				DEBUG(3,("overflow on entry %d group %s\n", i,
 | ||
| 					 name));
 | ||
| 				errflags=234;
 | ||
| 				break;
 | ||
| 			}
 | ||
| 
 | ||
| 			/* truncate the name at 21 chars. */
 | ||
| 			memset(p, 0, 21);
 | ||
| 			strlcpy(p, name, 21);
 | ||
| 			DEBUG(10,("adding entry %d group %s\n", i, p));
 | ||
| 			p += 21;
 | ||
| 			p += 5; /* Both NT4 and W2k3SP1 do padding here.  No
 | ||
| 				 * idea why... */
 | ||
| 			num_groups += 1;
 | ||
| 		}
 | ||
| 
 | ||
| 		if (errflags != NERR_Success) {
 | ||
| 			break;
 | ||
| 		}
 | ||
| 
 | ||
| 		TALLOC_FREE(sam_entries);
 | ||
| 	}
 | ||
| 
 | ||
| 	dcerpc_samr_Close(b, talloc_tos(), &domain_handle, &result);
 | ||
| 	dcerpc_samr_Close(b, talloc_tos(), &samr_handle, &result);
 | ||
| 
 | ||
| 	*rdata_len = PTR_DIFF(p,*rdata);
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
|   	SSVAL(*rparam, 0, errflags);
 | ||
|   	SSVAL(*rparam, 2, 0);		/* converter word */
 | ||
| 	SSVAL(*rparam, 4, num_groups);	/* is this right?? */
 | ||
| 	SSVAL(*rparam, 6, resume_context+num_groups);	/* is this right?? */
 | ||
| 
 | ||
| 	return(True);
 | ||
| }
 | ||
| 
 | ||
| /*******************************************************************
 | ||
|  Get groups that a user is a member of.
 | ||
| ******************************************************************/
 | ||
| 
 | ||
| static bool api_NetUserGetGroups(struct smbd_server_connection *sconn,
 | ||
| 				 connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *UserName = skip_string(param,tpscnt,str2);
 | ||
| 	char *p = skip_string(param,tpscnt,UserName);
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	const char *level_string;
 | ||
| 	int count=0;
 | ||
| 	bool ret = False;
 | ||
| 	uint32_t i;
 | ||
| 	char *endp = NULL;
 | ||
| 
 | ||
| 	struct rpc_pipe_client *samr_pipe = NULL;
 | ||
| 	struct policy_handle samr_handle, domain_handle, user_handle;
 | ||
| 	struct lsa_String name;
 | ||
| 	struct lsa_Strings names;
 | ||
| 	struct samr_Ids type, rid;
 | ||
| 	struct samr_RidWithAttributeArray *rids;
 | ||
| 	NTSTATUS status, result;
 | ||
| 	struct dcerpc_binding_handle *b;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !UserName || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 
 | ||
| 	if ( strcmp(str1,"zWrLeh") != 0 )
 | ||
| 		return False;
 | ||
| 
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0:
 | ||
| 			level_string = "B21";
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (strcmp(level_string,str2) != 0)
 | ||
| 		return False;
 | ||
| 
 | ||
| 	*rdata_len = mdrcnt + 1024;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,NERR_Success);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	p = *rdata;
 | ||
| 	endp = *rdata + *rdata_len;
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(
 | ||
| 		talloc_tos(), &ndr_table_samr,
 | ||
| 		conn->session_info, conn->sconn->remote_address,
 | ||
| 		conn->sconn->local_address, conn->sconn->msg_ctx, &samr_pipe);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: Could not connect to samr: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	b = samr_pipe->binding_handle;
 | ||
| 
 | ||
| 	status = dcerpc_samr_Connect2(b, talloc_tos(), lp_netbios_name(),
 | ||
| 				      SAMR_ACCESS_LOOKUP_DOMAIN, &samr_handle,
 | ||
| 				      &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_Connect2 failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_Connect2 failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_samr_OpenDomain(b, talloc_tos(), &samr_handle,
 | ||
| 					SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT,
 | ||
| 					get_global_sam_sid(), &domain_handle,
 | ||
| 					&result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_OpenDomain failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		goto close_sam;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_OpenDomain failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		goto close_sam;
 | ||
| 	}
 | ||
| 
 | ||
| 	name.string = UserName;
 | ||
| 
 | ||
| 	status = dcerpc_samr_LookupNames(b, talloc_tos(),
 | ||
| 					 &domain_handle, 1, &name,
 | ||
| 					 &rid, &type,
 | ||
| 					 &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_LookupNames failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		goto close_domain;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_LookupNames failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		goto close_domain;
 | ||
| 	}
 | ||
| 	if (rid.count != 1) {
 | ||
| 		status = NT_STATUS_INVALID_NETWORK_RESPONSE;
 | ||
| 		goto close_domain;
 | ||
| 	}
 | ||
| 	if (type.count != 1) {
 | ||
| 		status = NT_STATUS_INVALID_NETWORK_RESPONSE;
 | ||
| 		goto close_domain;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (type.ids[0] != SID_NAME_USER) {
 | ||
| 		DEBUG(10, ("%s is a %s, not a user\n", UserName,
 | ||
| 			   sid_type_lookup(type.ids[0])));
 | ||
| 		goto close_domain;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_samr_OpenUser(b, talloc_tos(),
 | ||
| 				      &domain_handle,
 | ||
| 				      SAMR_USER_ACCESS_GET_GROUPS,
 | ||
| 				      rid.ids[0], &user_handle,
 | ||
| 				      &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_LookupNames failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		goto close_domain;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_LookupNames failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		goto close_domain;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_samr_GetGroupsForUser(b, talloc_tos(),
 | ||
| 					      &user_handle, &rids,
 | ||
| 					      &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_LookupNames failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		goto close_user;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_LookupNames failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		goto close_user;
 | ||
| 	}
 | ||
| 
 | ||
| 	for (i=0; i<rids->count; i++) {
 | ||
| 
 | ||
| 		status = dcerpc_samr_LookupRids(b, talloc_tos(),
 | ||
| 						&domain_handle,
 | ||
| 						1, &rids->rids[i].rid,
 | ||
| 						&names, &type,
 | ||
| 						&result);
 | ||
| 		if (NT_STATUS_IS_OK(status) && NT_STATUS_IS_OK(result) && (names.count == 1)) {
 | ||
| 			strlcpy(p, names.names[0].string, PTR_DIFF(endp,p));
 | ||
| 			p += 21;
 | ||
| 			count++;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = PTR_DIFF(p,*rdata);
 | ||
| 
 | ||
| 	SSVAL(*rparam,4,count);	/* is this right?? */
 | ||
| 	SSVAL(*rparam,6,count);	/* is this right?? */
 | ||
| 
 | ||
| 	ret = True;
 | ||
| 
 | ||
|  close_user:
 | ||
| 	dcerpc_samr_Close(b, talloc_tos(), &user_handle, &result);
 | ||
|  close_domain:
 | ||
| 	dcerpc_samr_Close(b, talloc_tos(), &domain_handle, &result);
 | ||
|  close_sam:
 | ||
| 	dcerpc_samr_Close(b, talloc_tos(), &samr_handle, &result);
 | ||
| 
 | ||
| 	return ret;
 | ||
| }
 | ||
| 
 | ||
| /*******************************************************************
 | ||
|  Get all users.
 | ||
| ******************************************************************/
 | ||
| 
 | ||
| static bool api_RNetUserEnum(struct smbd_server_connection *sconn,
 | ||
| 			     connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	int count_sent=0;
 | ||
| 	int num_users=0;
 | ||
| 	int errflags=0;
 | ||
| 	int i, resume_context, cli_buf_size;
 | ||
| 	uint32_t resume_handle;
 | ||
| 
 | ||
| 	struct rpc_pipe_client *samr_pipe = NULL;
 | ||
| 	struct policy_handle samr_handle, domain_handle;
 | ||
| 	NTSTATUS status, result;
 | ||
| 
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	char *endp = NULL;
 | ||
| 
 | ||
| 	struct dcerpc_binding_handle *b;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (strcmp(str1,"WrLeh") != 0)
 | ||
| 		return False;
 | ||
| 	/* parameters
 | ||
| 	  * W-> resume context (number of users to skip)
 | ||
| 	  * r -> return parameter pointer to receive buffer
 | ||
| 	  * L -> length of receive buffer
 | ||
| 	  * e -> return parameter number of entries
 | ||
| 	  * h -> return parameter total number of users
 | ||
| 	  */
 | ||
| 
 | ||
| 	resume_context = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	cli_buf_size= get_safe_SVAL(param,tpscnt,p,2,0);
 | ||
| 	DEBUG(10,("api_RNetUserEnum:resume context: %d, client buffer size: %d\n",
 | ||
| 			resume_context, cli_buf_size));
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp("B21",str2) != 0)
 | ||
| 		return False;
 | ||
| 
 | ||
| 	*rdata_len = cli_buf_size;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	p = *rdata;
 | ||
| 	endp = *rdata + *rdata_len;
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(
 | ||
| 		talloc_tos(), &ndr_table_samr,
 | ||
| 		conn->session_info, conn->sconn->remote_address,
 | ||
| 		conn->sconn->local_address, conn->sconn->msg_ctx, &samr_pipe);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: Could not connect to samr: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	b = samr_pipe->binding_handle;
 | ||
| 
 | ||
| 	status = dcerpc_samr_Connect2(b, talloc_tos(), lp_netbios_name(),
 | ||
| 				      SAMR_ACCESS_LOOKUP_DOMAIN, &samr_handle,
 | ||
| 				      &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_Connect2 failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_Connect2 failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_samr_OpenDomain(b, talloc_tos(), &samr_handle,
 | ||
| 					SAMR_DOMAIN_ACCESS_ENUM_ACCOUNTS,
 | ||
| 					get_global_sam_sid(), &domain_handle,
 | ||
| 					&result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_OpenDomain failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		dcerpc_samr_Close(b, talloc_tos(), &samr_handle, &result);
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		DEBUG(0, ("api_RNetUserEnum: samr_OpenDomain failed: %s\n",
 | ||
| 			  nt_errstr(result)));
 | ||
| 		dcerpc_samr_Close(b, talloc_tos(), &samr_handle, &result);
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	errflags=NERR_Success;
 | ||
| 
 | ||
| 	resume_handle = 0;
 | ||
| 
 | ||
| 	while (true) {
 | ||
| 		struct samr_SamArray *sam_entries;
 | ||
| 		uint32_t num_entries;
 | ||
| 
 | ||
| 		status = dcerpc_samr_EnumDomainUsers(b, talloc_tos(),
 | ||
| 						     &domain_handle,
 | ||
| 						     &resume_handle,
 | ||
| 						     0, &sam_entries, 1,
 | ||
| 						     &num_entries,
 | ||
| 						     &result);
 | ||
| 
 | ||
| 		if (!NT_STATUS_IS_OK(status)) {
 | ||
| 			DEBUG(10, ("dcerpc_samr_EnumDomainUsers returned "
 | ||
| 				   "%s\n", nt_errstr(status)));
 | ||
| 			break;
 | ||
| 		}
 | ||
| 		if (!NT_STATUS_IS_OK(result)) {
 | ||
| 			DEBUG(10, ("dcerpc_samr_EnumDomainUsers returned "
 | ||
| 				   "%s\n", nt_errstr(result)));
 | ||
| 			break;
 | ||
| 		}
 | ||
| 
 | ||
| 		if (num_entries == 0) {
 | ||
| 			DEBUG(10, ("dcerpc_samr_EnumDomainUsers returned "
 | ||
| 				   "no entries -- done\n"));
 | ||
| 			break;
 | ||
| 		}
 | ||
| 
 | ||
| 		for (i=0; i<num_entries; i++) {
 | ||
| 			const char *name;
 | ||
| 
 | ||
| 			name = sam_entries->entries[i].name.string;
 | ||
| 
 | ||
| 			if(((PTR_DIFF(p,*rdata)+21)<=*rdata_len)
 | ||
| 			   &&(strlen(name)<=21)) {
 | ||
| 				strlcpy(p,name,PTR_DIFF(endp,p));
 | ||
| 				DEBUG(10,("api_RNetUserEnum:adding entry %d "
 | ||
| 					  "username %s\n",count_sent,p));
 | ||
| 				p += 21;
 | ||
| 				count_sent++;
 | ||
| 			} else {
 | ||
| 				/* set overflow error */
 | ||
| 				DEBUG(10,("api_RNetUserEnum:overflow on entry %d "
 | ||
| 					  "username %s\n",count_sent,name));
 | ||
| 				errflags=234;
 | ||
| 				break;
 | ||
| 			}
 | ||
| 		}
 | ||
| 
 | ||
| 		if (errflags != NERR_Success) {
 | ||
| 			break;
 | ||
| 		}
 | ||
| 
 | ||
| 		TALLOC_FREE(sam_entries);
 | ||
| 	}
 | ||
| 
 | ||
| 	dcerpc_samr_Close(b, talloc_tos(), &domain_handle, &result);
 | ||
| 	dcerpc_samr_Close(b, talloc_tos(), &samr_handle, &result);
 | ||
| 
 | ||
| 	*rdata_len = PTR_DIFF(p,*rdata);
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,errflags);
 | ||
| 	SSVAL(*rparam,2,0);	      /* converter word */
 | ||
| 	SSVAL(*rparam,4,count_sent);  /* is this right?? */
 | ||
| 	SSVAL(*rparam,6,num_users); /* is this right?? */
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  Get the time of day info.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool api_NetRemoteTOD(struct smbd_server_connection *sconn,
 | ||
| 			     connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	struct tm *t;
 | ||
| 	time_t unixdate = time(NULL);
 | ||
| 	char *p;
 | ||
| 
 | ||
| 	*rparam_len = 4;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = 21;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,NERR_Success);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	p = *rdata;
 | ||
| 
 | ||
| 	srv_put_dos_date3(p,0,unixdate); /* this is the time that is looked at
 | ||
| 					    by NT in a "net time" operation,
 | ||
| 					    it seems to ignore the one below */
 | ||
| 
 | ||
| 	/* the client expects to get localtime, not GMT, in this bit
 | ||
| 		(I think, this needs testing) */
 | ||
| 	t = localtime(&unixdate);
 | ||
| 	if (!t) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	SIVAL(p,4,0);		/* msecs ? */
 | ||
| 	SCVAL(p,8,t->tm_hour);
 | ||
| 	SCVAL(p,9,t->tm_min);
 | ||
| 	SCVAL(p,10,t->tm_sec);
 | ||
| 	SCVAL(p,11,0);		/* hundredths of seconds */
 | ||
| 	SSVALS(p,12,get_time_zone(unixdate)/60); /* timezone in minutes from GMT */
 | ||
| 	SSVAL(p,14,10000);		/* timer interval in 0.0001 of sec */
 | ||
| 	SCVAL(p,16,t->tm_mday);
 | ||
| 	SCVAL(p,17,t->tm_mon + 1);
 | ||
| 	SSVAL(p,18,1900+t->tm_year);
 | ||
| 	SCVAL(p,20,t->tm_wday);
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   Set the user password (SamOEM version - gets plaintext).
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool api_SamOEMChangePassword(struct smbd_server_connection *sconn,
 | ||
| 				     connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	fstring user;
 | ||
| 	char *p = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	NTSTATUS status, result;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct lsa_AsciiString server, account;
 | ||
| 	struct samr_CryptPassword password;
 | ||
| 	struct samr_Password hash;
 | ||
| 	int errcode = NERR_badpass;
 | ||
| 	int bufsize;
 | ||
| 	struct dcerpc_binding_handle *b;
 | ||
| 
 | ||
| 	*rparam_len = 4;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,NERR_badpass);
 | ||
| 
 | ||
| 	/*
 | ||
| 	 * Check the parameter definition is correct.
 | ||
| 	 */
 | ||
| 
 | ||
| 	/* Do we have a string ? */
 | ||
| 	if (skip_string(param,tpscnt,p) == 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if(!strequal(p, "zsT")) {
 | ||
| 		DEBUG(0,("api_SamOEMChangePassword: Invalid parameter string %s\n", p));
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p = skip_string(param, tpscnt, p);
 | ||
| 	if (!p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* Do we have a string ? */
 | ||
| 	if (skip_string(param,tpscnt,p) == 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if(!strequal(p, "B516B16")) {
 | ||
| 		DEBUG(0,("api_SamOEMChangePassword: Invalid data parameter string %s\n", p));
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p = skip_string(param,tpscnt,p);
 | ||
| 	if (!p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	/* Do we have a string ? */
 | ||
| 	if (skip_string(param,tpscnt,p) == 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p += pull_ascii_fstring(user,p);
 | ||
| 
 | ||
| 	DEBUG(3,("api_SamOEMChangePassword: Change password for <%s>\n",user));
 | ||
| 
 | ||
| 	if (tdscnt != 532) {
 | ||
| 		errcode = W_ERROR_V(WERR_INVALID_PARAMETER);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	bufsize = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	if (bufsize != 532) {
 | ||
| 		errcode = W_ERROR_V(WERR_INVALID_PARAMETER);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	memcpy(password.data, data, 516);
 | ||
| 	memcpy(hash.hash, data+516, 16);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx, &ndr_table_samr,
 | ||
| 					conn->session_info,
 | ||
| 					conn->sconn->remote_address,
 | ||
| 					conn->sconn->local_address,
 | ||
| 					conn->sconn->msg_ctx,
 | ||
| 					&cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_SamOEMChangePassword: could not connect to samr: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	init_lsa_AsciiString(&server, lp_netbios_name());
 | ||
| 	init_lsa_AsciiString(&account, user);
 | ||
| 
 | ||
| 	status = dcerpc_samr_OemChangePasswordUser2(b, mem_ctx,
 | ||
| 						    &server,
 | ||
| 						    &account,
 | ||
| 						    &password,
 | ||
| 						    &hash,
 | ||
| 						    &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(result));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	errcode = NERR_Success;
 | ||
|  out:
 | ||
| 	SSVAL(*rparam,0,errcode);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	return(True);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   delete a print job
 | ||
|   Form: <W> <>
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RDosPrintJobDel(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	int function = get_safe_SVAL(param,tpscnt,param,0,0);
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	uint32_t jobid;
 | ||
| 	fstring sharename;
 | ||
| 	int errcode;
 | ||
| 	WERROR werr = WERR_OK;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct policy_handle handle;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	enum spoolss_JobControl command;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	/*
 | ||
| 	 * We use 1 here not 2 as we're checking
 | ||
| 	 * the last byte we want to access is safe.
 | ||
| 	 */
 | ||
| 	if (!is_offset_safe(param,tpscnt,p,1)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if(!rap_to_pjobid(SVAL(p,0), sharename, &jobid))
 | ||
| 		return False;
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (!(strcsequal(str1,"W") && strcsequal(str2,"")))
 | ||
| 		return(False);
 | ||
| 
 | ||
| 	*rparam_len = 4;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	ZERO_STRUCT(handle);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_RDosPrintJobDel: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 					    sharename,
 | ||
| 					    "RAW",
 | ||
| 					    devmode_ctr,
 | ||
| 					    JOB_ACCESS_ADMINISTER,
 | ||
| 					    &handle,
 | ||
| 					    &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* FIXME: formerly NERR_JobNotFound was returned if job did not exist
 | ||
| 	 * and NERR_DestNotFound if share did not exist */
 | ||
| 
 | ||
| 	errcode = NERR_Success;
 | ||
| 
 | ||
| 	switch (function) {
 | ||
| 	case 81:		/* delete */
 | ||
| 		command = SPOOLSS_JOB_CONTROL_DELETE;
 | ||
| 		break;
 | ||
| 	case 82:		/* pause */
 | ||
| 		command = SPOOLSS_JOB_CONTROL_PAUSE;
 | ||
| 		break;
 | ||
| 	case 83:		/* resume */
 | ||
| 		command = SPOOLSS_JOB_CONTROL_RESUME;
 | ||
| 		break;
 | ||
| 	default:
 | ||
| 		errcode = NERR_notsupported;
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_SetJob(b, mem_ctx,
 | ||
| 				       &handle,
 | ||
| 				       jobid,
 | ||
| 				       NULL, /* unique ptr ctr */
 | ||
| 				       command,
 | ||
| 				       &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
|  out:
 | ||
| 	if (b && is_valid_policy_hnd(&handle)) {
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,errcode);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	return(True);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   Purge a print queue - or pause or resume it.
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| static bool api_WPrintQueueCtrl(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	int function = get_safe_SVAL(param,tpscnt,param,0,0);
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *QueueName = skip_string(param,tpscnt,str2);
 | ||
| 	int errcode = NERR_notsupported;
 | ||
| 	WERROR werr = WERR_OK;
 | ||
| 	NTSTATUS status;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct policy_handle handle;
 | ||
| 	struct spoolss_SetPrinterInfoCtr info_ctr;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	struct sec_desc_buf secdesc_ctr;
 | ||
| 	enum spoolss_PrinterControl command = SPOOLSS_PRINTER_CONTROL_UNPAUSE;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !QueueName) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (!(strcsequal(str1,"z") && strcsequal(str2,"")))
 | ||
| 		return(False);
 | ||
| 
 | ||
| 	*rparam_len = 4;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	if (skip_string(param,tpscnt,QueueName) == NULL) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(handle);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_WPrintQueueCtrl: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 					    QueueName,
 | ||
| 					    NULL,
 | ||
| 					    devmode_ctr,
 | ||
| 					    PRINTER_ACCESS_ADMINISTER,
 | ||
| 					    &handle,
 | ||
| 					    &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	switch (function) {
 | ||
| 	case 74: /* Pause queue */
 | ||
| 		command = SPOOLSS_PRINTER_CONTROL_PAUSE;
 | ||
| 		break;
 | ||
| 	case 75: /* Resume queue */
 | ||
| 		command = SPOOLSS_PRINTER_CONTROL_RESUME;
 | ||
| 		break;
 | ||
| 	case 103: /* Purge */
 | ||
| 		command = SPOOLSS_PRINTER_CONTROL_PURGE;
 | ||
| 		break;
 | ||
| 	default:
 | ||
| 		werr = WERR_NOT_SUPPORTED;
 | ||
| 		break;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(info_ctr);
 | ||
| 	ZERO_STRUCT(secdesc_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_SetPrinter(b, mem_ctx,
 | ||
| 					   &handle,
 | ||
| 					   &info_ctr,
 | ||
| 					   &devmode_ctr,
 | ||
| 					   &secdesc_ctr,
 | ||
| 					   command,
 | ||
| 					   &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	errcode = W_ERROR_V(werr);
 | ||
| 
 | ||
|  out:
 | ||
| 
 | ||
| 	if (b && is_valid_policy_hnd(&handle)) {
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,errcode);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	return(True);
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   set the property of a print job (undocumented?)
 | ||
|   ? function = 0xb -> set name of print job
 | ||
|   ? function = 0x6 -> move print job up/down
 | ||
|   Form: <WWsTP> <WWzWWDDzzzzzzzzzzlz>
 | ||
|   or   <WWsTP> <WB21BB16B10zWWzDDz>
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static int check_printjob_info(struct pack_desc* desc,
 | ||
| 			       int uLevel, char* id)
 | ||
| {
 | ||
| 	desc->subformat = NULL;
 | ||
| 	switch( uLevel ) {
 | ||
| 	case 0: desc->format = "W"; break;
 | ||
| 	case 1: desc->format = "WB21BB16B10zWWzDDz"; break;
 | ||
| 	case 2: desc->format = "WWzWWDDzz"; break;
 | ||
| 	case 3: desc->format = "WWzWWDDzzzzzzzzzzlz"; break;
 | ||
| 	case 4: desc->format = "WWzWWDDzzzzzDDDDDDD"; break;
 | ||
| 	default:
 | ||
| 		DEBUG(0,("check_printjob_info: invalid level %d\n",
 | ||
| 			uLevel ));
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (id == NULL || strcmp(desc->format,id) != 0) {
 | ||
| 		DEBUG(0,("check_printjob_info: invalid format %s\n",
 | ||
| 			id ? id : "<NULL>" ));
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static bool api_PrintJobInfo(struct smbd_server_connection *sconn,
 | ||
| 			     connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	struct pack_desc desc;
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	uint32_t jobid;
 | ||
| 	fstring sharename;
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,2,-1);
 | ||
| 	int function = get_safe_SVAL(param,tpscnt,p,4,-1);
 | ||
| 	int errcode;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	WERROR werr;
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct policy_handle handle;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	struct spoolss_JobInfoContainer ctr;
 | ||
| 	union spoolss_JobInfo info;
 | ||
| 	struct spoolss_SetJobInfo1 info1;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	/*
 | ||
| 	 * We use 1 here not 2 as we're checking
 | ||
| 	 * the last byte we want to access is safe.
 | ||
| 	 */
 | ||
| 	if (!is_offset_safe(param,tpscnt,p,1)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if(!rap_to_pjobid(SVAL(p,0), sharename, &jobid))
 | ||
| 		return False;
 | ||
| 	*rparam_len = 4;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if ((strcmp(str1,"WWsTP")) ||
 | ||
| 	    (!check_printjob_info(&desc,uLevel,str2)))
 | ||
| 		return(False);
 | ||
| 
 | ||
| 	errcode = NERR_notsupported;
 | ||
| 
 | ||
| 	switch (function) {
 | ||
| 	case 0xb:
 | ||
| 		/* change print job name, data gives the name */
 | ||
| 		break;
 | ||
| 	default:
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(handle);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_PrintJobInfo: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 					    sharename,
 | ||
| 					    "RAW",
 | ||
| 					    devmode_ctr,
 | ||
| 					    PRINTER_ACCESS_USE,
 | ||
| 					    &handle,
 | ||
| 					    &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	werr = rpccli_spoolss_getjob(cli, mem_ctx,
 | ||
| 				     &handle,
 | ||
| 				     jobid,
 | ||
| 				     1, /* level */
 | ||
| 				     0, /* offered */
 | ||
| 				     &info);
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(ctr);
 | ||
| 
 | ||
| 	info1.job_id		= info.info1.job_id;
 | ||
| 	info1.printer_name	= info.info1.printer_name;
 | ||
| 	info1.user_name		= info.info1.user_name;
 | ||
| 	info1.document_name	= data;
 | ||
| 	info1.data_type		= info.info1.data_type;
 | ||
| 	info1.text_status	= info.info1.text_status;
 | ||
| 	info1.status		= info.info1.status;
 | ||
| 	info1.priority		= info.info1.priority;
 | ||
| 	info1.position		= info.info1.position;
 | ||
| 	info1.total_pages	= info.info1.total_pages;
 | ||
| 	info1.pages_printed	= info.info1.pages_printed;
 | ||
| 	info1.submitted		= info.info1.submitted;
 | ||
| 
 | ||
| 	ctr.level = 1;
 | ||
| 	ctr.info.info1 = &info1;
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_SetJob(b, mem_ctx,
 | ||
| 				       &handle,
 | ||
| 				       jobid,
 | ||
| 				       &ctr,
 | ||
| 				       0,
 | ||
| 				       &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	errcode = NERR_Success;
 | ||
|  out:
 | ||
| 
 | ||
| 	if (b && is_valid_policy_hnd(&handle)) {
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVALS(*rparam,0,errcode);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	return(True);
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  Get info about the server.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RNetServerGetInfo(struct smbd_server_connection *sconn,
 | ||
| 				  connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	char *p2;
 | ||
| 	int struct_len;
 | ||
| 
 | ||
| 	NTSTATUS status;
 | ||
| 	WERROR werr;
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	union srvsvc_NetSrvInfo info;
 | ||
| 	int errcode;
 | ||
| 	struct dcerpc_binding_handle *b;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(4,("NetServerGetInfo level %d\n",uLevel));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (!prefix_ok(str1,"WrLh")) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0:
 | ||
| 			if (strcmp(str2,"B16") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			struct_len = 16;
 | ||
| 			break;
 | ||
| 		case 1:
 | ||
| 			if (strcmp(str2,"B16BBDz") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			struct_len = 26;
 | ||
| 			break;
 | ||
| 		case 2:
 | ||
| 			if (strcmp(str2,"B16BBDzDDDWWzWWWWWWWBB21zWWWWWWWWWWWWWWWWWWWWWWz")!= 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			struct_len = 134;
 | ||
| 			break;
 | ||
| 		case 3:
 | ||
| 			if (strcmp(str2,"B16BBDzDDDWWzWWWWWWWBB21zWWWWWWWWWWWWWWWWWWWWWWzDWz") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			struct_len = 144;
 | ||
| 			break;
 | ||
| 		case 20:
 | ||
| 			if (strcmp(str2,"DN") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			struct_len = 6;
 | ||
| 			break;
 | ||
| 		case 50:
 | ||
| 			if (strcmp(str2,"B16BBDzWWzzz") != 0) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			struct_len = 42;
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = mdrcnt;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	p = *rdata;
 | ||
| 	p2 = p + struct_len;
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx, &ndr_table_srvsvc,
 | ||
| 					conn->session_info,
 | ||
| 					conn->sconn->remote_address,
 | ||
| 					conn->sconn->local_address,
 | ||
| 					conn->sconn->msg_ctx,
 | ||
| 					&cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_RNetServerGetInfo: could not connect to srvsvc: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	status = dcerpc_srvsvc_NetSrvGetInfo(b, mem_ctx,
 | ||
| 					     NULL,
 | ||
| 					     101,
 | ||
| 					     &info,
 | ||
| 					     &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (info.info101 == NULL) {
 | ||
| 		errcode = W_ERROR_V(WERR_INVALID_PARAMETER);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel != 20) {
 | ||
| 		size_t len = 0;
 | ||
| 		status = srvstr_push(NULL, 0, p, info.info101->server_name, 16,
 | ||
| 			STR_ASCII|STR_UPPER|STR_TERMINATE, &len);
 | ||
| 		if (!NT_STATUS_IS_OK(status)) {
 | ||
| 			errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 			goto out;
 | ||
| 		}
 | ||
|   	}
 | ||
| 	p += 16;
 | ||
| 	if (uLevel > 0) {
 | ||
| 		SCVAL(p,0,info.info101->version_major);
 | ||
| 		SCVAL(p,1,info.info101->version_minor);
 | ||
| 		SIVAL(p,2,info.info101->server_type);
 | ||
| 
 | ||
| 		if (mdrcnt == struct_len) {
 | ||
| 			SIVAL(p,6,0);
 | ||
| 		} else {
 | ||
| 			SIVAL(p,6,PTR_DIFF(p2,*rdata));
 | ||
| 			if (mdrcnt - struct_len <= 0) {
 | ||
| 				return false;
 | ||
| 			}
 | ||
| 			push_ascii(p2,
 | ||
| 				info.info101->comment,
 | ||
| 				MIN(mdrcnt - struct_len,
 | ||
| 					MAX_SERVER_STRING_LENGTH),
 | ||
| 				STR_TERMINATE);
 | ||
| 			p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 			if (!p2) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel > 1) {
 | ||
| 		return False;		/* not yet implemented */
 | ||
| 	}
 | ||
| 
 | ||
| 	errcode = NERR_Success;
 | ||
| 
 | ||
|  out:
 | ||
| 
 | ||
| 	*rdata_len = PTR_DIFF(p2,*rdata);
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVAL(*rparam,0,errcode);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 	SSVAL(*rparam,4,*rdata_len);
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  Get info about the server.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool api_NetWkstaGetInfo(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	char *p2;
 | ||
| 	char *endp;
 | ||
| 	int level = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(4,("NetWkstaGetInfo level %d\n",level));
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (!(level==10 && strcsequal(str1,"WrLh") && strcsequal(str2,"zzzBBzz"))) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = mdrcnt + 1024;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,NERR_Success);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	p = *rdata;
 | ||
| 	endp = *rdata + *rdata_len;
 | ||
| 
 | ||
| 	p2 = get_safe_ptr(*rdata,*rdata_len,p,22);
 | ||
| 	if (!p2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	SIVAL(p,0,PTR_DIFF(p2,*rdata)); /* host name */
 | ||
| 	strlcpy(p2,get_local_machine_name(),PTR_DIFF(endp,p2));
 | ||
| 	if (!strupper_m(p2)) {
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 	if (!p2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p += 4;
 | ||
| 
 | ||
| 	SIVAL(p,0,PTR_DIFF(p2,*rdata));
 | ||
| 	strlcpy(p2,conn->session_info->unix_info->sanitized_username,PTR_DIFF(endp,p2));
 | ||
| 	p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 	if (!p2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p += 4;
 | ||
| 
 | ||
| 	SIVAL(p,0,PTR_DIFF(p2,*rdata)); /* login domain */
 | ||
| 	strlcpy(p2,lp_workgroup(),PTR_DIFF(endp,p2));
 | ||
| 	if (!strupper_m(p2)) {
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 	p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 	if (!p2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p += 4;
 | ||
| 
 | ||
| 	SCVAL(p,0,SAMBA_MAJOR_NBT_ANNOUNCE_VERSION); /* system version - e.g 4 in 4.1 */
 | ||
| 	SCVAL(p,1,SAMBA_MINOR_NBT_ANNOUNCE_VERSION); /* system version - e.g .1 in 4.1 */
 | ||
| 	p += 2;
 | ||
| 
 | ||
| 	SIVAL(p,0,PTR_DIFF(p2,*rdata));
 | ||
| 	strlcpy(p2,lp_workgroup(),PTR_DIFF(endp,p2));	/* don't know.  login domain?? */
 | ||
| 	p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 	if (!p2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p += 4;
 | ||
| 
 | ||
| 	SIVAL(p,0,PTR_DIFF(p2,*rdata)); /* don't know */
 | ||
| 	strlcpy(p2,"",PTR_DIFF(endp,p2));
 | ||
| 	p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 	if (!p2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	p += 4;
 | ||
| 
 | ||
| 	*rdata_len = PTR_DIFF(p2,*rdata);
 | ||
| 
 | ||
| 	SSVAL(*rparam,4,*rdata_len);
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   get info about a user
 | ||
| 
 | ||
|     struct user_info_11 {
 | ||
|         char                usri11_name[21];  0-20
 | ||
|         char                usri11_pad;       21
 | ||
|         char                *usri11_comment;  22-25
 | ||
|         char            *usri11_usr_comment;  26-29
 | ||
|         unsigned short      usri11_priv;      30-31
 | ||
|         unsigned long       usri11_auth_flags; 32-35
 | ||
|         long                usri11_password_age; 36-39
 | ||
|         char                *usri11_homedir; 40-43
 | ||
|         char            *usri11_parms; 44-47
 | ||
|         long                usri11_last_logon; 48-51
 | ||
|         long                usri11_last_logoff; 52-55
 | ||
|         unsigned short      usri11_bad_pw_count; 56-57
 | ||
|         unsigned short      usri11_num_logons; 58-59
 | ||
|         char                *usri11_logon_server; 60-63
 | ||
|         unsigned short      usri11_country_code; 64-65
 | ||
|         char            *usri11_workstations; 66-69
 | ||
|         unsigned long       usri11_max_storage; 70-73
 | ||
|         unsigned short      usri11_units_per_week; 74-75
 | ||
|         unsigned char       *usri11_logon_hours; 76-79
 | ||
|         unsigned short      usri11_code_page; 80-81
 | ||
|     };
 | ||
| 
 | ||
| where:
 | ||
| 
 | ||
|   usri11_name specifies the user name for which information is retrieved
 | ||
| 
 | ||
|   usri11_pad aligns the next data structure element to a word boundary
 | ||
| 
 | ||
|   usri11_comment is a null terminated ASCII comment
 | ||
| 
 | ||
|   usri11_user_comment is a null terminated ASCII comment about the user
 | ||
| 
 | ||
|   usri11_priv specifies the level of the privilege assigned to the user.
 | ||
|        The possible values are:
 | ||
| 
 | ||
| Name             Value  Description
 | ||
| USER_PRIV_GUEST  0      Guest privilege
 | ||
| USER_PRIV_USER   1      User privilege
 | ||
| USER_PRV_ADMIN   2      Administrator privilege
 | ||
| 
 | ||
|   usri11_auth_flags specifies the account operator privileges. The
 | ||
|        possible values are:
 | ||
| 
 | ||
| Name            Value   Description
 | ||
| AF_OP_PRINT     0       Print operator
 | ||
| 
 | ||
| 
 | ||
| Leach, Naik                                        [Page 28]
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| INTERNET-DRAFT   CIFS Remote Admin Protocol     January 10, 1997
 | ||
| 
 | ||
| 
 | ||
| AF_OP_COMM      1       Communications operator
 | ||
| AF_OP_SERVER    2       Server operator
 | ||
| AF_OP_ACCOUNTS  3       Accounts operator
 | ||
| 
 | ||
| 
 | ||
|   usri11_password_age specifies how many seconds have elapsed since the
 | ||
|        password was last changed.
 | ||
| 
 | ||
|   usri11_home_dir points to a null terminated ASCII string that contains
 | ||
|        the path name of the user's home directory.
 | ||
| 
 | ||
|   usri11_parms points to a null terminated ASCII string that is set
 | ||
|        aside for use by applications.
 | ||
| 
 | ||
|   usri11_last_logon specifies the time when the user last logged on.
 | ||
|        This value is stored as the number of seconds elapsed since
 | ||
|        00:00:00, January 1, 1970.
 | ||
| 
 | ||
|   usri11_last_logoff specifies the time when the user last logged off.
 | ||
|        This value is stored as the number of seconds elapsed since
 | ||
|        00:00:00, January 1, 1970. A value of 0 means the last logoff
 | ||
|        time is unknown.
 | ||
| 
 | ||
|   usri11_bad_pw_count specifies the number of incorrect passwords
 | ||
|        entered since the last successful logon.
 | ||
| 
 | ||
|   usri11_log1_num_logons specifies the number of times this user has
 | ||
|        logged on. A value of -1 means the number of logons is unknown.
 | ||
| 
 | ||
|   usri11_logon_server points to a null terminated ASCII string that
 | ||
|        contains the name of the server to which logon requests are sent.
 | ||
|        A null string indicates logon requests should be sent to the
 | ||
|        domain controller.
 | ||
| 
 | ||
|   usri11_country_code specifies the country code for the user's language
 | ||
|        of choice.
 | ||
| 
 | ||
|   usri11_workstations points to a null terminated ASCII string that
 | ||
|        contains the names of workstations the user may log on from.
 | ||
|        There may be up to 8 workstations, with the names separated by
 | ||
|        commas. A null strings indicates there are no restrictions.
 | ||
| 
 | ||
|   usri11_max_storage specifies the maximum amount of disk space the user
 | ||
|        can occupy. A value of 0xffffffff indicates there are no
 | ||
|        restrictions.
 | ||
| 
 | ||
|   usri11_units_per_week specifies the equal number of time units into
 | ||
|        which a week is divided. This value must be equal to 168.
 | ||
| 
 | ||
|   usri11_logon_hours points to a 21 byte (168 bits) string that
 | ||
|        specifies the time during which the user can log on. Each bit
 | ||
|        represents one unique hour in a week. The first bit (bit 0, word
 | ||
|        0) is Sunday, 0:00 to 0:59, the second bit (bit 1, word 0) is
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| Leach, Naik                                        [Page 29]
 | ||
| 
 | ||
| 
 | ||
| 
 | ||
| INTERNET-DRAFT   CIFS Remote Admin Protocol     January 10, 1997
 | ||
| 
 | ||
| 
 | ||
|        Sunday, 1:00 to 1:59 and so on. A null pointer indicates there
 | ||
|        are no restrictions.
 | ||
| 
 | ||
|   usri11_code_page specifies the code page for the user's language of
 | ||
|        choice
 | ||
| 
 | ||
| All of the pointers in this data structure need to be treated
 | ||
| specially. The  pointer is a 32 bit pointer. The higher 16 bits need
 | ||
| to be ignored. The converter word returned in the parameters section
 | ||
| needs to be subtracted from the lower 16 bits to calculate an offset
 | ||
| into the return buffer where this ASCII string resides.
 | ||
| 
 | ||
| There is no auxiliary data in the response.
 | ||
| 
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| #define usri11_name           0
 | ||
| #define usri11_pad            21
 | ||
| #define usri11_comment        22
 | ||
| #define usri11_usr_comment    26
 | ||
| #define usri11_full_name      30
 | ||
| #define usri11_priv           34
 | ||
| #define usri11_auth_flags     36
 | ||
| #define usri11_password_age   40
 | ||
| #define usri11_homedir        44
 | ||
| #define usri11_parms          48
 | ||
| #define usri11_last_logon     52
 | ||
| #define usri11_last_logoff    56
 | ||
| #define usri11_bad_pw_count   60
 | ||
| #define usri11_num_logons     62
 | ||
| #define usri11_logon_server   64
 | ||
| #define usri11_country_code   68
 | ||
| #define usri11_workstations   70
 | ||
| #define usri11_max_storage    74
 | ||
| #define usri11_units_per_week 78
 | ||
| #define usri11_logon_hours    80
 | ||
| #define usri11_code_page      84
 | ||
| #define usri11_end            86
 | ||
| 
 | ||
| static bool api_RNetUserGetInfo(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *UserName = skip_string(param,tpscnt,str2);
 | ||
| 	char *p = skip_string(param,tpscnt,UserName);
 | ||
| 	int uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	char *p2;
 | ||
| 	char *endp;
 | ||
| 	const char *level_string;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	NTSTATUS status, result;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct policy_handle connect_handle, domain_handle, user_handle;
 | ||
| 	struct lsa_String domain_name;
 | ||
| 	struct dom_sid2 *domain_sid;
 | ||
| 	struct lsa_String names;
 | ||
| 	struct samr_Ids rids;
 | ||
| 	struct samr_Ids types;
 | ||
| 	int errcode = W_ERROR_V(WERR_NERR_USERNOTFOUND);
 | ||
| 	uint32_t rid;
 | ||
| 	union samr_UserInfo *info;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !UserName || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(4,("RNetUserGetInfo level=%d\n", uLevel));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"zWrLh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0: level_string = "B21"; break;
 | ||
| 		case 1: level_string = "B21BB16DWzzWz"; break;
 | ||
| 		case 2: level_string = "B21BB16DWzzWzDzzzzDDDDWb21WWzWW"; break;
 | ||
| 		case 10: level_string = "B21Bzzz"; break;
 | ||
| 		case 11: level_string = "B21BzzzWDDzzDDWWzWzDWb21W"; break;
 | ||
| 		default: return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (strcmp(level_string,str2) != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = mdrcnt + 1024;
 | ||
| 	*rdata = smb_realloc_limit(*rdata,*rdata_len);
 | ||
| 	if (!*rdata) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	p = *rdata;
 | ||
| 	endp = *rdata + *rdata_len;
 | ||
| 	p2 = get_safe_ptr(*rdata,*rdata_len,p,usri11_end);
 | ||
| 	if (!p2) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(connect_handle);
 | ||
| 	ZERO_STRUCT(domain_handle);
 | ||
| 	ZERO_STRUCT(user_handle);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx, &ndr_table_samr,
 | ||
| 					conn->session_info,
 | ||
| 					conn->sconn->remote_address,
 | ||
| 					conn->sconn->local_address,
 | ||
| 					conn->sconn->msg_ctx,
 | ||
| 					&cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_RNetUserGetInfo: could not connect to samr: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	status = dcerpc_samr_Connect2(b, mem_ctx,
 | ||
| 				      lp_netbios_name(),
 | ||
| 				      SAMR_ACCESS_CONNECT_TO_SERVER |
 | ||
| 				      SAMR_ACCESS_ENUM_DOMAINS |
 | ||
| 				      SAMR_ACCESS_LOOKUP_DOMAIN,
 | ||
| 				      &connect_handle,
 | ||
| 				      &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(result));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	init_lsa_String(&domain_name, get_global_sam_name());
 | ||
| 
 | ||
| 	status = dcerpc_samr_LookupDomain(b, mem_ctx,
 | ||
| 					  &connect_handle,
 | ||
| 					  &domain_name,
 | ||
| 					  &domain_sid,
 | ||
| 					  &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(result));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_samr_OpenDomain(b, mem_ctx,
 | ||
| 					&connect_handle,
 | ||
| 					SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT,
 | ||
| 					domain_sid,
 | ||
| 					&domain_handle,
 | ||
| 					&result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(result));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	init_lsa_String(&names, UserName);
 | ||
| 
 | ||
| 	status = dcerpc_samr_LookupNames(b, mem_ctx,
 | ||
| 					 &domain_handle,
 | ||
| 					 1,
 | ||
| 					 &names,
 | ||
| 					 &rids,
 | ||
| 					 &types,
 | ||
| 					 &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(result));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (rids.count != 1) {
 | ||
| 		errcode = W_ERROR_V(WERR_NO_SUCH_USER);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (rids.count != types.count) {
 | ||
| 		errcode = W_ERROR_V(WERR_INVALID_PARAMETER);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (types.ids[0] != SID_NAME_USER) {
 | ||
| 		errcode = W_ERROR_V(WERR_INVALID_PARAMETER);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	rid = rids.ids[0];
 | ||
| 
 | ||
| 	status = dcerpc_samr_OpenUser(b, mem_ctx,
 | ||
| 				      &domain_handle,
 | ||
| 				      SAMR_USER_ACCESS_GET_LOCALE |
 | ||
| 				      SAMR_USER_ACCESS_GET_LOGONINFO |
 | ||
| 				      SAMR_USER_ACCESS_GET_ATTRIBUTES |
 | ||
| 				      SAMR_USER_ACCESS_GET_GROUPS |
 | ||
| 				      SAMR_USER_ACCESS_GET_GROUP_MEMBERSHIP |
 | ||
| 				      SEC_STD_READ_CONTROL,
 | ||
| 				      rid,
 | ||
| 				      &user_handle,
 | ||
| 				      &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(result));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_samr_QueryUserInfo2(b, mem_ctx,
 | ||
| 					    &user_handle,
 | ||
| 					    UserAllInformation,
 | ||
| 					    &info,
 | ||
| 					    &result);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!NT_STATUS_IS_OK(result)) {
 | ||
| 		errcode = W_ERROR_V(ntstatus_to_werror(result));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset(p,0,21);
 | ||
| 	fstrcpy(p+usri11_name,UserName); /* 21 bytes - user name */
 | ||
| 
 | ||
| 	if (uLevel > 0) {
 | ||
| 		SCVAL(p,usri11_pad,0); /* padding - 1 byte */
 | ||
| 		*p2 = 0;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel >= 10) {
 | ||
| 		SIVAL(p,usri11_comment,PTR_DIFF(p2,p)); /* comment */
 | ||
| 		strlcpy(p2,"Comment",PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 
 | ||
| 		SIVAL(p,usri11_usr_comment,PTR_DIFF(p2,p)); /* user_comment */
 | ||
| 		strlcpy(p2,"UserComment",PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 
 | ||
| 		/* EEK! the cifsrap.txt doesn't have this in!!!! */
 | ||
| 		SIVAL(p,usri11_full_name,PTR_DIFF(p2,p)); /* full name */
 | ||
| 		strlcpy(p2,info->info21.full_name.string,PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel == 11) {
 | ||
| 		const char *homedir = info->info21.home_directory.string;
 | ||
| 		/* modelled after NTAS 3.51 reply */
 | ||
| 		SSVAL(p,usri11_priv,
 | ||
| 			(get_current_uid(conn) == sec_initial_uid())?
 | ||
| 			USER_PRIV_ADMIN:USER_PRIV_USER);
 | ||
| 		SIVAL(p,usri11_auth_flags,AF_OP_PRINT);		/* auth flags */
 | ||
| 		SIVALS(p,usri11_password_age,-1);		/* password age */
 | ||
| 		SIVAL(p,usri11_homedir,PTR_DIFF(p2,p)); /* home dir */
 | ||
| 		strlcpy(p2, homedir, PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		SIVAL(p,usri11_parms,PTR_DIFF(p2,p)); /* parms */
 | ||
| 		strlcpy(p2,"",PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		SIVAL(p,usri11_last_logon,0);		/* last logon */
 | ||
| 		SIVAL(p,usri11_last_logoff,0);		/* last logoff */
 | ||
| 		SSVALS(p,usri11_bad_pw_count,-1);	/* bad pw counts */
 | ||
| 		SSVALS(p,usri11_num_logons,-1);		/* num logons */
 | ||
| 		SIVAL(p,usri11_logon_server,PTR_DIFF(p2,p)); /* logon server */
 | ||
| 		strlcpy(p2,"\\\\*",PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		SSVAL(p,usri11_country_code,0);		/* country code */
 | ||
| 
 | ||
| 		SIVAL(p,usri11_workstations,PTR_DIFF(p2,p)); /* workstations */
 | ||
| 		strlcpy(p2,"",PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 
 | ||
| 		SIVALS(p,usri11_max_storage,-1);		/* max storage */
 | ||
| 		SSVAL(p,usri11_units_per_week,168);		/* units per week */
 | ||
| 		SIVAL(p,usri11_logon_hours,PTR_DIFF(p2,p)); /* logon hours */
 | ||
| 
 | ||
| 		/* a simple way to get logon hours at all times. */
 | ||
| 		memset(p2,0xff,21);
 | ||
| 		SCVAL(p2,21,0);           /* fix zero termination */
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 
 | ||
| 		SSVAL(p,usri11_code_page,0);		/* code page */
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel == 1 || uLevel == 2) {
 | ||
| 		memset(p+22,' ',16);	/* password */
 | ||
| 		SIVALS(p,38,-1);		/* password age */
 | ||
| 		SSVAL(p,42,
 | ||
| 			(get_current_uid(conn) == sec_initial_uid())?
 | ||
| 			USER_PRIV_ADMIN:USER_PRIV_USER);
 | ||
| 		SIVAL(p,44,PTR_DIFF(p2,*rdata)); /* home dir */
 | ||
| 		strlcpy(p2, info->info21.home_directory.string,
 | ||
| 			PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		SIVAL(p,48,PTR_DIFF(p2,*rdata)); /* comment */
 | ||
| 		*p2++ = 0;
 | ||
| 		SSVAL(p,52,0);		/* flags */
 | ||
| 		SIVAL(p,54,PTR_DIFF(p2,*rdata));		/* script_path */
 | ||
| 		strlcpy(p2, info->info21.logon_script.string,
 | ||
| 			PTR_DIFF(endp,p2));
 | ||
| 		p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 		if (!p2) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		if (uLevel == 2) {
 | ||
| 			SIVAL(p,58,0);		/* auth_flags */
 | ||
| 			SIVAL(p,62,PTR_DIFF(p2,*rdata)); /* full_name */
 | ||
| 			strlcpy(p2,info->info21.full_name.string,PTR_DIFF(endp,p2));
 | ||
| 			p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 			if (!p2) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			SIVAL(p,66,0);		/* urs_comment */
 | ||
| 			SIVAL(p,70,PTR_DIFF(p2,*rdata)); /* parms */
 | ||
| 			strlcpy(p2,"",PTR_DIFF(endp,p2));
 | ||
| 			p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 			if (!p2) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			SIVAL(p,74,0);		/* workstations */
 | ||
| 			SIVAL(p,78,0);		/* last_logon */
 | ||
| 			SIVAL(p,82,0);		/* last_logoff */
 | ||
| 			SIVALS(p,86,-1);		/* acct_expires */
 | ||
| 			SIVALS(p,90,-1);		/* max_storage */
 | ||
| 			SSVAL(p,94,168);	/* units_per_week */
 | ||
| 			SIVAL(p,96,PTR_DIFF(p2,*rdata)); /* logon_hours */
 | ||
| 			memset(p2,-1,21);
 | ||
| 			p2 += 21;
 | ||
| 			SSVALS(p,100,-1);	/* bad_pw_count */
 | ||
| 			SSVALS(p,102,-1);	/* num_logons */
 | ||
| 			SIVAL(p,104,PTR_DIFF(p2,*rdata)); /* logon_server */
 | ||
| 			{
 | ||
| 				TALLOC_CTX *ctx = talloc_tos();
 | ||
| 				int space_rem = *rdata_len - (p2 - *rdata);
 | ||
| 				char *tmp;
 | ||
| 
 | ||
| 				if (space_rem <= 0) {
 | ||
| 					return false;
 | ||
| 				}
 | ||
| 				tmp = talloc_strdup(ctx, "\\\\%L");
 | ||
| 				if (!tmp) {
 | ||
| 					return false;
 | ||
| 				}
 | ||
| 				tmp = talloc_sub_basic(ctx,
 | ||
| 						"",
 | ||
| 						"",
 | ||
| 						tmp);
 | ||
| 				if (!tmp) {
 | ||
| 					return false;
 | ||
| 				}
 | ||
| 
 | ||
| 				push_ascii(p2,
 | ||
| 					tmp,
 | ||
| 					space_rem,
 | ||
| 					STR_TERMINATE);
 | ||
| 			}
 | ||
| 			p2 = skip_string(*rdata,*rdata_len,p2);
 | ||
| 			if (!p2) {
 | ||
| 				return False;
 | ||
| 			}
 | ||
| 			SSVAL(p,108,49);	/* country_code */
 | ||
| 			SSVAL(p,110,860);	/* code page */
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	errcode = NERR_Success;
 | ||
| 
 | ||
|  out:
 | ||
| 	*rdata_len = PTR_DIFF(p2,*rdata);
 | ||
| 
 | ||
| 	if (b && is_valid_policy_hnd(&user_handle)) {
 | ||
| 		dcerpc_samr_Close(b, mem_ctx, &user_handle, &result);
 | ||
| 	}
 | ||
| 	if (b && is_valid_policy_hnd(&domain_handle)) {
 | ||
| 		dcerpc_samr_Close(b, mem_ctx, &domain_handle, &result);
 | ||
| 	}
 | ||
| 	if (b && is_valid_policy_hnd(&connect_handle)) {
 | ||
| 		dcerpc_samr_Close(b, mem_ctx, &connect_handle, &result);
 | ||
| 	}
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,errcode);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 	SSVAL(*rparam,4,*rdata_len);	/* is this right?? */
 | ||
| 
 | ||
| 	return(True);
 | ||
| }
 | ||
| 
 | ||
| static bool api_WWkstaUserLogon(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel;
 | ||
| 	struct pack_desc desc;
 | ||
| 	char* name;
 | ||
| 	struct auth_session_info *si = NULL;
 | ||
| 	NTSTATUS status;
 | ||
| 
 | ||
| 	status = smbXsrv_session_info_lookup(conn->sconn->client,
 | ||
| 					     vuid,
 | ||
| 					     &si);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		return false;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	DBG_INFO("Username of UID %ju is %s\n",
 | ||
| 		 (uintmax_t)si->unix_token->uid,
 | ||
| 		 si->unix_info->unix_name);
 | ||
| 
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 	name = get_safe_str_ptr(param,tpscnt,p,2);
 | ||
| 	if (!name) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	DEBUG(3,("WWkstaUserLogon uLevel=%d name=%s\n",uLevel,name));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"OOWb54WrLh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (uLevel != 1 || strcmp(str2,"WB21BWDWWDDDDDDDzzzD") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 	desc.subformat = NULL;
 | ||
| 	desc.format = str2;
 | ||
| 
 | ||
| 	if (init_package(&desc,1,0)) {
 | ||
| 		PACKI(&desc,"W",0);		/* code */
 | ||
| 		PACKS(&desc,"B21",name);	/* eff. name */
 | ||
| 		PACKS(&desc,"B","");		/* pad */
 | ||
| 		PACKI(&desc,"W",
 | ||
| 			(get_current_uid(conn) == sec_initial_uid())?
 | ||
| 			USER_PRIV_ADMIN:USER_PRIV_USER);
 | ||
| 		PACKI(&desc,"D",0);		/* auth flags XXX */
 | ||
| 		PACKI(&desc,"W",0);		/* num logons */
 | ||
| 		PACKI(&desc,"W",0);		/* bad pw count */
 | ||
| 		PACKI(&desc,"D",0);		/* last logon */
 | ||
| 		PACKI(&desc,"D",-1);		/* last logoff */
 | ||
| 		PACKI(&desc,"D",-1);		/* logoff time */
 | ||
| 		PACKI(&desc,"D",-1);		/* kickoff time */
 | ||
| 		PACKI(&desc,"D",0);		/* password age */
 | ||
| 		PACKI(&desc,"D",0);		/* password can change */
 | ||
| 		PACKI(&desc,"D",-1);		/* password must change */
 | ||
| 
 | ||
| 		{
 | ||
| 			fstring mypath;
 | ||
| 			fstrcpy(mypath,"\\\\");
 | ||
| 			fstrcat(mypath,get_local_machine_name());
 | ||
| 			if (!strupper_m(mypath)) {
 | ||
| 				return false;
 | ||
| 			}
 | ||
| 			PACKS(&desc,"z",mypath); /* computer */
 | ||
| 		}
 | ||
| 
 | ||
| 		PACKS(&desc,"z",lp_workgroup());/* domain */
 | ||
| 		PACKS(&desc,"z", si->info->logon_script); /* script path */
 | ||
| 		PACKI(&desc,"D",0x00000000);		/* reserved */
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,desc.neededlen);
 | ||
| 
 | ||
| 	DEBUG(4,("WWkstaUserLogon: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  api_WAccessGetUserPerms
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| static bool api_WAccessGetUserPerms(struct smbd_server_connection *sconn,
 | ||
| 				    connection_struct *conn,uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *user = skip_string(param,tpscnt,str2);
 | ||
| 	char *resource = skip_string(param,tpscnt,user);
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !user || !resource) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (skip_string(param,tpscnt,resource) == NULL) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	DEBUG(3,("WAccessGetUserPerms user=%s resource=%s\n",user,resource));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"zzh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (strcmp(str2,"") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,0);		/* errorcode */
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 	SSVAL(*rparam,4,0x7f);	/* permission flags */
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|   api_WPrintJobEnumerate
 | ||
|   ****************************************************************************/
 | ||
| 
 | ||
| static bool api_WPrintJobGetInfo(struct smbd_server_connection *sconn,
 | ||
| 				 connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel;
 | ||
| 	fstring sharename;
 | ||
| 	uint32_t jobid;
 | ||
| 	struct pack_desc desc;
 | ||
| 	char *tmpdata=NULL;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	WERROR werr;
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct policy_handle handle;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	union spoolss_JobInfo info;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,2,-1);
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 	memset((char *)&status,'\0',sizeof(status));
 | ||
| 
 | ||
| 	DEBUG(3,("WPrintJobGetInfo uLevel=%d uJobId=0x%X\n",uLevel,SVAL(p,0)));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"WWrLh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_printjob_info(&desc,uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if(!rap_to_pjobid(SVAL(p,0), sharename, &jobid)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(handle);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_WPrintJobGetInfo: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 					    sharename,
 | ||
| 					    "RAW",
 | ||
| 					    devmode_ctr,
 | ||
| 					    PRINTER_ACCESS_USE,
 | ||
| 					    &handle,
 | ||
| 					    &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	werr = rpccli_spoolss_getjob(cli, mem_ctx,
 | ||
| 				     &handle,
 | ||
| 				     jobid,
 | ||
| 				     2, /* level */
 | ||
| 				     0, /* offered */
 | ||
| 				     &info);
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		desc.base = *rdata;
 | ||
| 		desc.buflen = mdrcnt;
 | ||
| 	} else {
 | ||
| 		/*
 | ||
| 		 * Don't return data but need to get correct length
 | ||
| 		 *  init_package will return wrong size if buflen=0
 | ||
| 		 */
 | ||
| 		desc.buflen = getlen(desc.format);
 | ||
| 		desc.base = tmpdata = (char *)SMB_MALLOC( desc.buflen );
 | ||
| 	}
 | ||
| 
 | ||
| 	if (init_package(&desc,1,0)) {
 | ||
| 		fill_spoolss_printjob_info(uLevel, &desc, &info.info2, info.info2.position);
 | ||
| 		*rdata_len = desc.usedlen;
 | ||
| 	} else {
 | ||
| 		desc.errcode = NERR_JobNotFound;
 | ||
| 		*rdata_len = 0;
 | ||
| 	}
 | ||
|  out:
 | ||
| 	if (b && is_valid_policy_hnd(&handle)) {
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,desc.neededlen);
 | ||
| 
 | ||
| 	SAFE_FREE(tmpdata);
 | ||
| 
 | ||
| 	DEBUG(4,("WPrintJobGetInfo: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static bool api_WPrintJobEnumerate(struct smbd_server_connection *sconn,
 | ||
| 				   connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	char *name = p;
 | ||
| 	int uLevel;
 | ||
| 	int i, succnt=0;
 | ||
| 	struct pack_desc desc;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	WERROR werr;
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct policy_handle handle;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	uint32_t count = 0;
 | ||
| 	union spoolss_JobInfo *info;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	p = skip_string(param,tpscnt,p);
 | ||
| 	if (!p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	DEBUG(3,("WPrintJobEnumerate uLevel=%d name=%s\n",uLevel,name));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"zWrLeh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel > 2) {
 | ||
| 		return False;	/* defined only for uLevel 0,1,2 */
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!check_printjob_info(&desc,uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(handle);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_WPrintJobEnumerate: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 					    name,
 | ||
| 					    NULL,
 | ||
| 					    devmode_ctr,
 | ||
| 					    PRINTER_ACCESS_USE,
 | ||
| 					    &handle,
 | ||
| 					    &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	werr = rpccli_spoolss_enumjobs(cli, mem_ctx,
 | ||
| 				       &handle,
 | ||
| 				       0, /* firstjob */
 | ||
| 				       0xff, /* numjobs */
 | ||
| 				       2, /* level */
 | ||
| 				       0, /* offered */
 | ||
| 				       &count,
 | ||
| 				       &info);
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 
 | ||
| 	if (init_package(&desc,count,0)) {
 | ||
| 		succnt = 0;
 | ||
| 		for (i = 0; i < count; i++) {
 | ||
| 			fill_spoolss_printjob_info(uLevel, &desc, &info[i].info2, i);
 | ||
| 			if (desc.errcode == NERR_Success) {
 | ||
| 				succnt = i+1;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
|  out:
 | ||
| 	if (b && is_valid_policy_hnd(&handle)) {
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,succnt);
 | ||
| 	SSVAL(*rparam,6,count);
 | ||
| 
 | ||
| 	DEBUG(4,("WPrintJobEnumerate: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static int check_printdest_info(struct pack_desc* desc,
 | ||
| 				int uLevel, char* id)
 | ||
| {
 | ||
| 	desc->subformat = NULL;
 | ||
| 	switch( uLevel ) {
 | ||
| 		case 0:
 | ||
| 			desc->format = "B9";
 | ||
| 			break;
 | ||
| 		case 1:
 | ||
| 			desc->format = "B9B21WWzW";
 | ||
| 			break;
 | ||
| 		case 2:
 | ||
| 			desc->format = "z";
 | ||
| 			break;
 | ||
| 		case 3:
 | ||
| 			desc->format = "zzzWWzzzWW";
 | ||
| 			break;
 | ||
| 		default:
 | ||
| 			DEBUG(0,("check_printdest_info: invalid level %d\n",
 | ||
| 				uLevel));
 | ||
| 			return False;
 | ||
| 	}
 | ||
| 	if (id == NULL || strcmp(desc->format,id) != 0) {
 | ||
| 		DEBUG(0,("check_printdest_info: invalid string %s\n",
 | ||
| 			id ? id : "<NULL>" ));
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static void fill_printdest_info(struct spoolss_PrinterInfo2 *info2, int uLevel,
 | ||
| 				struct pack_desc* desc)
 | ||
| {
 | ||
| 	char buf[100];
 | ||
| 
 | ||
| 	strncpy(buf, info2->printername, sizeof(buf)-1);
 | ||
| 	buf[sizeof(buf)-1] = 0;
 | ||
| 	(void)strupper_m(buf);
 | ||
| 
 | ||
| 	if (uLevel <= 1) {
 | ||
| 		PACKS(desc,"B9",buf);	/* szName */
 | ||
| 		if (uLevel == 1) {
 | ||
| 			PACKS(desc,"B21","");	/* szUserName */
 | ||
| 			PACKI(desc,"W",0);		/* uJobId */
 | ||
| 			PACKI(desc,"W",0);		/* fsStatus */
 | ||
| 			PACKS(desc,"z","");	/* pszStatus */
 | ||
| 			PACKI(desc,"W",0);		/* time */
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	if (uLevel == 2 || uLevel == 3) {
 | ||
| 		PACKS(desc,"z",buf);		/* pszPrinterName */
 | ||
| 		if (uLevel == 3) {
 | ||
| 			PACKS(desc,"z","");	/* pszUserName */
 | ||
| 			PACKS(desc,"z","");	/* pszLogAddr */
 | ||
| 			PACKI(desc,"W",0);		/* uJobId */
 | ||
| 			PACKI(desc,"W",0);		/* fsStatus */
 | ||
| 			PACKS(desc,"z","");	/* pszStatus */
 | ||
| 			PACKS(desc,"z","");	/* pszComment */
 | ||
| 			PACKS(desc,"z","NULL"); /* pszDrivers */
 | ||
| 			PACKI(desc,"W",0);		/* time */
 | ||
| 			PACKI(desc,"W",0);		/* pad1 */
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| static bool api_WPrintDestGetInfo(struct smbd_server_connection *sconn,
 | ||
| 				  connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	char* PrinterName = p;
 | ||
| 	int uLevel;
 | ||
| 	struct pack_desc desc;
 | ||
| 	char *tmpdata=NULL;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	WERROR werr;
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct policy_handle handle;
 | ||
| 	struct spoolss_DevmodeContainer devmode_ctr;
 | ||
| 	union spoolss_PrinterInfo info;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	p = skip_string(param,tpscnt,p);
 | ||
| 	if (!p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	DEBUG(3,("WPrintDestGetInfo uLevel=%d PrinterName=%s\n",uLevel,PrinterName));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"zWrLh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_printdest_info(&desc,uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(handle);
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_WPrintDestGetInfo: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	ZERO_STRUCT(devmode_ctr);
 | ||
| 
 | ||
| 	status = dcerpc_spoolss_OpenPrinter(b, mem_ctx,
 | ||
| 					    PrinterName,
 | ||
| 					    NULL,
 | ||
| 					    devmode_ctr,
 | ||
| 					    PRINTER_ACCESS_USE,
 | ||
| 					    &handle,
 | ||
| 					    &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		*rdata_len = 0;
 | ||
| 		desc.errcode = NERR_DestNotFound;
 | ||
| 		desc.neededlen = 0;
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		*rdata_len = 0;
 | ||
| 		desc.errcode = NERR_DestNotFound;
 | ||
| 		desc.neededlen = 0;
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	werr = rpccli_spoolss_getprinter(cli, mem_ctx,
 | ||
| 					 &handle,
 | ||
| 					 2,
 | ||
| 					 0,
 | ||
| 					 &info);
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		*rdata_len = 0;
 | ||
| 		desc.errcode = NERR_DestNotFound;
 | ||
| 		desc.neededlen = 0;
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 		desc.base = *rdata;
 | ||
| 		desc.buflen = mdrcnt;
 | ||
| 	} else {
 | ||
| 		/*
 | ||
| 		 * Don't return data but need to get correct length
 | ||
| 		 * init_package will return wrong size if buflen=0
 | ||
| 		 */
 | ||
| 		desc.buflen = getlen(desc.format);
 | ||
| 		desc.base = tmpdata = (char *)SMB_MALLOC( desc.buflen );
 | ||
| 	}
 | ||
| 	if (init_package(&desc,1,0)) {
 | ||
| 		fill_printdest_info(&info.info2, uLevel,&desc);
 | ||
| 	}
 | ||
| 
 | ||
|  out:
 | ||
| 	if (b && is_valid_policy_hnd(&handle)) {
 | ||
| 		dcerpc_spoolss_ClosePrinter(b, mem_ctx, &handle, &werr);
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	*rparam_len = 6;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,desc.neededlen);
 | ||
| 
 | ||
| 	DEBUG(4,("WPrintDestGetInfo: errorcode %d\n",desc.errcode));
 | ||
| 	SAFE_FREE(tmpdata);
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static bool api_WPrintDestEnum(struct smbd_server_connection *sconn,
 | ||
| 			       connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel;
 | ||
| 	int queuecnt;
 | ||
| 	int i, n, succnt=0;
 | ||
| 	struct pack_desc desc;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	WERROR werr;
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	union spoolss_PrinterInfo *info;
 | ||
| 	uint32_t count;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	DEBUG(3,("WPrintDestEnum uLevel=%d\n",uLevel));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"WrLeh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (!check_printdest_info(&desc,uLevel,str2)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	queuecnt = 0;
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_spoolss,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("api_WPrintDestEnum: could not connect to spoolss: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	werr = rpccli_spoolss_enumprinters(cli, mem_ctx,
 | ||
| 					   PRINTER_ENUM_LOCAL,
 | ||
| 					   cli->srv_name_slash,
 | ||
| 					   2,
 | ||
| 					   0,
 | ||
| 					   &count,
 | ||
| 					   &info);
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		*rdata_len = 0;
 | ||
| 		desc.errcode = NERR_DestNotFound;
 | ||
| 		desc.neededlen = 0;
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	queuecnt = count;
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 	if (init_package(&desc,queuecnt,0)) {
 | ||
| 		succnt = 0;
 | ||
| 		n = 0;
 | ||
| 		for (i = 0; i < count; i++) {
 | ||
| 			fill_printdest_info(&info[i].info2, uLevel,&desc);
 | ||
| 			n++;
 | ||
| 			if (desc.errcode == NERR_Success) {
 | ||
| 				succnt = n;
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
|  out:
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,succnt);
 | ||
| 	SSVAL(*rparam,6,queuecnt);
 | ||
| 
 | ||
| 	DEBUG(4,("WPrintDestEnumerate: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static bool api_WPrintDriverEnum(struct smbd_server_connection *sconn,
 | ||
| 				 connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel;
 | ||
| 	int succnt;
 | ||
| 	struct pack_desc desc;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	DEBUG(3,("WPrintDriverEnum uLevel=%d\n",uLevel));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"WrLeh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (uLevel != 0 || strcmp(str2,"B41") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 	if (init_package(&desc,1,0)) {
 | ||
| 		PACKS(&desc,"B41","NULL");
 | ||
| 	}
 | ||
| 
 | ||
| 	succnt = (desc.errcode == NERR_Success ? 1 : 0);
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,succnt);
 | ||
| 	SSVAL(*rparam,6,1);
 | ||
| 
 | ||
| 	DEBUG(4,("WPrintDriverEnum: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static bool api_WPrintQProcEnum(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel;
 | ||
| 	int succnt;
 | ||
| 	struct pack_desc desc;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	DEBUG(3,("WPrintQProcEnum uLevel=%d\n",uLevel));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"WrLeh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (uLevel != 0 || strcmp(str2,"B13") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 	desc.format = str2;
 | ||
| 	if (init_package(&desc,1,0)) {
 | ||
| 		PACKS(&desc,"B13","lpd");
 | ||
| 	}
 | ||
| 
 | ||
| 	succnt = (desc.errcode == NERR_Success ? 1 : 0);
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,succnt);
 | ||
| 	SSVAL(*rparam,6,1);
 | ||
| 
 | ||
| 	DEBUG(4,("WPrintQProcEnum: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static bool api_WPrintPortEnum(struct smbd_server_connection *sconn,
 | ||
| 			       connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel;
 | ||
| 	int succnt;
 | ||
| 	struct pack_desc desc;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	DEBUG(3,("WPrintPortEnum uLevel=%d\n",uLevel));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,"WrLeh") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (uLevel != 0 || strcmp(str2,"B9") != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 	memset((char *)&desc,'\0',sizeof(desc));
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 	desc.format = str2;
 | ||
| 	if (init_package(&desc,1,0)) {
 | ||
| 		PACKS(&desc,"B13","lp0");
 | ||
| 	}
 | ||
| 
 | ||
| 	succnt = (desc.errcode == NERR_Success ? 1 : 0);
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0);
 | ||
| 	SSVAL(*rparam,4,succnt);
 | ||
| 	SSVAL(*rparam,6,1);
 | ||
| 
 | ||
| 	DEBUG(4,("WPrintPortEnum: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  List open sessions
 | ||
|  ****************************************************************************/
 | ||
| 
 | ||
| static bool api_RNetSessionEnum(struct smbd_server_connection *sconn,
 | ||
| 				connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt,int mprcnt,
 | ||
| 				char **rdata,char **rparam,
 | ||
| 				int *rdata_len,int *rparam_len)
 | ||
| 
 | ||
| {
 | ||
| 	char *str1 = get_safe_str_ptr(param,tpscnt,param,2);
 | ||
| 	char *str2 = skip_string(param,tpscnt,str1);
 | ||
| 	char *p = skip_string(param,tpscnt,str2);
 | ||
| 	int uLevel;
 | ||
| 	struct pack_desc desc;
 | ||
| 	int i;
 | ||
| 
 | ||
| 	TALLOC_CTX *mem_ctx = talloc_tos();
 | ||
| 	WERROR werr;
 | ||
| 	NTSTATUS status;
 | ||
| 	struct rpc_pipe_client *cli = NULL;
 | ||
| 	struct dcerpc_binding_handle *b = NULL;
 | ||
| 	struct srvsvc_NetSessInfoCtr info_ctr;
 | ||
| 	uint32_t totalentries, resume_handle = 0;
 | ||
| 	uint32_t count = 0;
 | ||
| 
 | ||
| 	if (!str1 || !str2 || !p) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	ZERO_STRUCT(desc);
 | ||
| 
 | ||
| 	uLevel = get_safe_SVAL(param,tpscnt,p,0,-1);
 | ||
| 
 | ||
| 	DEBUG(3,("RNetSessionEnum uLevel=%d\n",uLevel));
 | ||
| 	DEBUG(7,("RNetSessionEnum req string=%s\n",str1));
 | ||
| 	DEBUG(7,("RNetSessionEnum ret string=%s\n",str2));
 | ||
| 
 | ||
| 	/* check it's a supported variant */
 | ||
| 	if (strcmp(str1,RAP_NetSessionEnum_REQ) != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	if (uLevel != 2 || strcmp(str2,RAP_SESSION_INFO_L2) != 0) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = rpc_pipe_open_interface(mem_ctx,
 | ||
| 					 &ndr_table_srvsvc,
 | ||
| 					 conn->session_info,
 | ||
| 					 conn->sconn->remote_address,
 | ||
| 					 conn->sconn->local_address,
 | ||
| 					 conn->sconn->msg_ctx,
 | ||
| 					 &cli);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("RNetSessionEnum: could not connect to srvsvc: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 	b = cli->binding_handle;
 | ||
| 
 | ||
| 	info_ctr.level = 1;
 | ||
| 	info_ctr.ctr.ctr1 = talloc_zero(talloc_tos(), struct srvsvc_NetSessCtr1);
 | ||
| 	if (info_ctr.ctr.ctr1 == NULL) {
 | ||
| 		desc.errcode = W_ERROR_V(WERR_NOT_ENOUGH_MEMORY);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	status = dcerpc_srvsvc_NetSessEnum(b, mem_ctx,
 | ||
| 					   cli->srv_name_slash,
 | ||
| 					   NULL, /* client */
 | ||
| 					   NULL, /* user */
 | ||
| 					   &info_ctr,
 | ||
| 					   (uint32_t)-1, /* max_buffer */
 | ||
| 					   &totalentries,
 | ||
| 					   &resume_handle,
 | ||
| 					   &werr);
 | ||
| 	if (!NT_STATUS_IS_OK(status)) {
 | ||
| 		DEBUG(0,("RNetSessionEnum: dcerpc_srvsvc_NetSessEnum failed: %s\n",
 | ||
| 			  nt_errstr(status)));
 | ||
| 		desc.errcode = W_ERROR_V(ntstatus_to_werror(status));
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (!W_ERROR_IS_OK(werr)) {
 | ||
| 		DEBUG(0,("RNetSessionEnum: dcerpc_srvsvc_NetSessEnum failed: %s\n",
 | ||
| 			  win_errstr(werr)));
 | ||
| 		desc.errcode = W_ERROR_V(werr);
 | ||
| 		goto out;
 | ||
| 	}
 | ||
| 
 | ||
| 	count = info_ctr.ctr.ctr1->count;
 | ||
| 
 | ||
|  out:
 | ||
| 	if (mdrcnt > 0) {
 | ||
| 		*rdata = smb_realloc_limit(*rdata,mdrcnt);
 | ||
| 		if (!*rdata) {
 | ||
| 			return False;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	desc.base = *rdata;
 | ||
| 	desc.buflen = mdrcnt;
 | ||
| 	desc.format = str2;
 | ||
| 	if (!init_package(&desc, count,0)) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	for(i=0; i < count; i++) {
 | ||
| 		PACKS(&desc, "z", info_ctr.ctr.ctr1->array[i].client);
 | ||
| 		PACKS(&desc, "z", info_ctr.ctr.ctr1->array[i].user);
 | ||
| 		PACKI(&desc, "W", 1); /* num conns */
 | ||
| 		PACKI(&desc, "W", info_ctr.ctr.ctr1->array[i].num_open);
 | ||
| 		PACKI(&desc, "W", 1); /* num users */
 | ||
| 		PACKI(&desc, "D", 0); /* session time */
 | ||
| 		PACKI(&desc, "D", 0); /* idle time */
 | ||
| 		PACKI(&desc, "D", 0); /* flags */
 | ||
| 		PACKS(&desc, "z", "Unknown Client"); /* client type string */
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = desc.usedlen;
 | ||
| 
 | ||
| 	*rparam_len = 8;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 	SSVALS(*rparam,0,desc.errcode);
 | ||
| 	SSVAL(*rparam,2,0); /* converter */
 | ||
| 	SSVAL(*rparam,4, count); /* count */
 | ||
| 
 | ||
| 	DEBUG(4,("RNetSessionEnum: errorcode %d\n",desc.errcode));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  The buffer was too small.
 | ||
|  ****************************************************************************/
 | ||
| 
 | ||
| static bool api_TooSmall(struct smbd_server_connection *sconn,
 | ||
| 			 connection_struct *conn,uint64_t vuid, char *param, char *data,
 | ||
| 			 int mdrcnt, int mprcnt,
 | ||
| 			 char **rdata, char **rparam,
 | ||
| 			 int *rdata_len, int *rparam_len)
 | ||
| {
 | ||
| 	*rparam_len = MIN(*rparam_len,mprcnt);
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,NERR_BufTooSmall);
 | ||
| 
 | ||
| 	DEBUG(3,("Supplied buffer too small in API command\n"));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  The request is not supported.
 | ||
|  ****************************************************************************/
 | ||
| 
 | ||
| static bool api_Unsupported(struct smbd_server_connection *sconn,
 | ||
| 			    connection_struct *conn, uint64_t vuid,
 | ||
| 				char *param, int tpscnt,
 | ||
| 				char *data, int tdscnt,
 | ||
| 				int mdrcnt, int mprcnt,
 | ||
| 				char **rdata, char **rparam,
 | ||
| 				int *rdata_len, int *rparam_len)
 | ||
| {
 | ||
| 	*rparam_len = 4;
 | ||
| 	*rparam = smb_realloc_limit(*rparam,*rparam_len);
 | ||
| 	if (!*rparam) {
 | ||
| 		return False;
 | ||
| 	}
 | ||
| 
 | ||
| 	*rdata_len = 0;
 | ||
| 
 | ||
| 	SSVAL(*rparam,0,NERR_notsupported);
 | ||
| 	SSVAL(*rparam,2,0);		/* converter word */
 | ||
| 
 | ||
| 	DEBUG(3,("Unsupported API command\n"));
 | ||
| 
 | ||
| 	return True;
 | ||
| }
 | ||
| 
 | ||
| static const struct {
 | ||
| 	const char *name;
 | ||
| 	int id;
 | ||
| 	bool (*fn)(struct smbd_server_connection *sconn,
 | ||
| 		   connection_struct *, uint64_t,
 | ||
| 			char *, int,
 | ||
| 			char *, int,
 | ||
| 			int,int,char **,char **,int *,int *);
 | ||
| 	bool auth_user;		/* Deny anonymous access? */
 | ||
| } api_commands[] = {
 | ||
| 	{
 | ||
| 		.name = "RNetShareEnum",
 | ||
| 		.id = RAP_WshareEnum,
 | ||
| 		.fn = api_RNetShareEnum,
 | ||
| 		.auth_user = true,
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RNetShareGetInfo",
 | ||
| 		.id = RAP_WshareGetInfo,
 | ||
| 		.fn = api_RNetShareGetInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RNetShareAdd",
 | ||
| 		.id = RAP_WshareAdd,
 | ||
| 		.fn = api_RNetShareAdd
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RNetSessionEnum",
 | ||
| 		.id = RAP_WsessionEnum,
 | ||
| 		.fn = api_RNetSessionEnum,
 | ||
| 		.auth_user = true,
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RNetServerGetInfo",
 | ||
| 		.id = RAP_WserverGetInfo,
 | ||
| 		.fn = api_RNetServerGetInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RNetGroupEnum",
 | ||
| 		.id = RAP_WGroupEnum,
 | ||
| 		.fn = api_RNetGroupEnum, True
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RNetGroupGetUsers",
 | ||
| 		.id = RAP_WGroupGetUsers,
 | ||
| 		.fn = api_RNetGroupGetUsers,
 | ||
| 		.auth_user = true},
 | ||
| 	{
 | ||
| 		.name = "RNetUserEnum",
 | ||
| 		.id = RAP_WUserEnum,
 | ||
| 		.fn = api_RNetUserEnum,
 | ||
| 		.auth_user = true,
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RNetUserGetInfo",
 | ||
| 		.id = RAP_WUserGetInfo,
 | ||
| 		.fn = api_RNetUserGetInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "NetUserGetGroups",
 | ||
| 		.id = RAP_WUserGetGroups,
 | ||
| 		.fn = api_NetUserGetGroups
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "NetWkstaGetInfo",
 | ||
| 		.id = RAP_WWkstaGetInfo,
 | ||
| 		.fn = api_NetWkstaGetInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "DosPrintQEnum",
 | ||
| 		.id = RAP_WPrintQEnum,
 | ||
| 		.fn = api_DosPrintQEnum,
 | ||
| 		.auth_user = true,
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "DosPrintQGetInfo",
 | ||
| 		.id = RAP_WPrintQGetInfo,
 | ||
| 		.fn = api_DosPrintQGetInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintQueuePause",
 | ||
| 		.id = RAP_WPrintQPause,
 | ||
| 		.fn = api_WPrintQueueCtrl
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintQueueResume",
 | ||
| 		.id = RAP_WPrintQContinue,
 | ||
| 		.fn = api_WPrintQueueCtrl
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintJobEnumerate",
 | ||
| 		.id = RAP_WPrintJobEnum,
 | ||
| 		.fn = api_WPrintJobEnumerate
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintJobGetInfo",
 | ||
| 		.id = RAP_WPrintJobGetInfo,
 | ||
| 		.fn = api_WPrintJobGetInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RDosPrintJobDel",
 | ||
| 		.id = RAP_WPrintJobDel,
 | ||
| 		.fn = api_RDosPrintJobDel
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RDosPrintJobPause",
 | ||
| 		.id = RAP_WPrintJobPause,
 | ||
| 		.fn = api_RDosPrintJobDel
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "RDosPrintJobResume",
 | ||
| 		.id = RAP_WPrintJobContinue,
 | ||
| 		.fn = api_RDosPrintJobDel
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintDestEnum",
 | ||
| 		.id = RAP_WPrintDestEnum,
 | ||
| 		.fn = api_WPrintDestEnum
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintDestGetInfo",
 | ||
| 		.id = RAP_WPrintDestGetInfo,
 | ||
| 		.fn = api_WPrintDestGetInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "NetRemoteTOD",
 | ||
| 		.id = RAP_NetRemoteTOD,
 | ||
| 		.fn = api_NetRemoteTOD
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintQueuePurge",
 | ||
| 		.id = RAP_WPrintQPurge,
 | ||
| 		.fn = api_WPrintQueueCtrl
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "NetServerEnum2",
 | ||
| 		.id = RAP_NetServerEnum2,
 | ||
| 		.fn = api_RNetServerEnum2
 | ||
| 	}, /* anon OK */
 | ||
| 	{
 | ||
| 		.name = "NetServerEnum3",
 | ||
| 		.id = RAP_NetServerEnum3,
 | ||
| 		.fn = api_RNetServerEnum3
 | ||
| 	}, /* anon OK */
 | ||
| 	{
 | ||
| 		.name = "WAccessGetUserPerms",
 | ||
| 		.id = RAP_WAccessGetUserPerms,
 | ||
| 		.fn = api_WAccessGetUserPerms
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WWkstaUserLogon",
 | ||
| 		.id = RAP_WWkstaUserLogon,
 | ||
| 		.fn = api_WWkstaUserLogon
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "PrintJobInfo",
 | ||
| 		.id = RAP_WPrintJobSetInfo,
 | ||
| 		.fn = api_PrintJobInfo
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintDriverEnum",
 | ||
| 		.id = RAP_WPrintDriverEnum,
 | ||
| 		.fn = api_WPrintDriverEnum
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintQProcEnum",
 | ||
| 		.id = RAP_WPrintQProcessorEnum,
 | ||
| 		.fn = api_WPrintQProcEnum
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "WPrintPortEnum",
 | ||
| 		.id = RAP_WPrintPortEnum,
 | ||
| 		.fn = api_WPrintPortEnum
 | ||
| 	},
 | ||
| 	{
 | ||
| 		.name = "SamOEMChangePassword",
 | ||
| 		.id = RAP_SamOEMChgPasswordUser2_P,
 | ||
| 		.fn = api_SamOEMChangePassword
 | ||
| 	}, /* anon OK */
 | ||
| 	{
 | ||
| 		.name = NULL,
 | ||
| 		.id   = -1,
 | ||
| 		.fn   = api_Unsupported}
 | ||
| 	/*
 | ||
| 	 * The following RAP calls are not implemented by Samba:
 | ||
| 	 *   RAP_WFileEnum2 - anon not OK
 | ||
| 	 */
 | ||
| };
 | ||
| 
 | ||
| 
 | ||
| /****************************************************************************
 | ||
|  Handle remote api calls.
 | ||
| ****************************************************************************/
 | ||
| 
 | ||
| void api_reply(connection_struct *conn, uint64_t vuid,
 | ||
| 	       struct smb_request *req,
 | ||
| 	       char *data, char *params,
 | ||
| 	       int tdscnt, int tpscnt,
 | ||
| 	       int mdrcnt, int mprcnt)
 | ||
| {
 | ||
| 	int api_command;
 | ||
| 	char *rdata = NULL;
 | ||
| 	char *rparam = NULL;
 | ||
| 	const char *name1 = NULL;
 | ||
| 	const char *name2 = NULL;
 | ||
| 	int rdata_len = 0;
 | ||
| 	int rparam_len = 0;
 | ||
| 	bool reply=False;
 | ||
| 	int i;
 | ||
| 
 | ||
| 	if (!params) {
 | ||
| 		DEBUG(0,("ERROR: NULL params in api_reply()\n"));
 | ||
| 		reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
 | ||
| 		return;
 | ||
| 	}
 | ||
| 
 | ||
| 	if (tpscnt < 2) {
 | ||
| 		reply_nterror(req, NT_STATUS_INVALID_PARAMETER);
 | ||
| 		return;
 | ||
| 	}
 | ||
| 	api_command = SVAL(params,0);
 | ||
| 	/* Is there a string at position params+2 ? */
 | ||
| 	if (skip_string(params,tpscnt,params+2)) {
 | ||
| 		name1 = params + 2;
 | ||
| 	} else {
 | ||
| 		name1 = "";
 | ||
| 	}
 | ||
| 	name2 = skip_string(params,tpscnt,params+2);
 | ||
| 	if (!name2) {
 | ||
| 		name2 = "";
 | ||
| 	}
 | ||
| 
 | ||
| 	DEBUG(3,("Got API command %d of form <%s> <%s> (tdscnt=%d,tpscnt=%d,mdrcnt=%d,mprcnt=%d)\n",
 | ||
| 		api_command,
 | ||
| 		name1,
 | ||
| 		name2,
 | ||
| 		tdscnt,tpscnt,mdrcnt,mprcnt));
 | ||
| 
 | ||
| 	for (i=0;api_commands[i].name;i++) {
 | ||
| 		if (api_commands[i].id == api_command && api_commands[i].fn) {
 | ||
| 			DEBUG(3,("Doing %s\n",api_commands[i].name));
 | ||
| 			break;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	/* Check whether this api call can be done anonymously */
 | ||
| 
 | ||
| 	if (api_commands[i].auth_user && lp_restrict_anonymous()) {
 | ||
| 		struct auth_session_info *si = NULL;
 | ||
| 		NTSTATUS status;
 | ||
| 
 | ||
| 		status = smbXsrv_session_info_lookup(conn->sconn->client,
 | ||
| 						     vuid,
 | ||
| 						     &si);
 | ||
| 		if (!NT_STATUS_IS_OK(status)) {
 | ||
| 			reply_nterror(req, NT_STATUS_ACCESS_DENIED);
 | ||
| 			return;
 | ||
| 		}
 | ||
| 
 | ||
| 		if (security_session_user_level(si, NULL) < SECURITY_USER) {
 | ||
| 			reply_nterror(req, NT_STATUS_ACCESS_DENIED);
 | ||
| 			return;
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	rdata = (char *)SMB_MALLOC(1024);
 | ||
| 	if (rdata) {
 | ||
| 		memset(rdata,'\0',1024);
 | ||
| 	}
 | ||
| 
 | ||
| 	rparam = (char *)SMB_MALLOC(1024);
 | ||
| 	if (rparam) {
 | ||
| 		memset(rparam,'\0',1024);
 | ||
| 	}
 | ||
| 
 | ||
| 	if(!rdata || !rparam) {
 | ||
| 		DEBUG(0,("api_reply: malloc fail !\n"));
 | ||
| 		SAFE_FREE(rdata);
 | ||
| 		SAFE_FREE(rparam);
 | ||
| 		reply_nterror(req, NT_STATUS_NO_MEMORY);
 | ||
| 		return;
 | ||
| 	}
 | ||
| 
 | ||
| 	reply = api_commands[i].fn(req->sconn, conn,
 | ||
| 				vuid,
 | ||
| 				params,tpscnt,	/* params + length */
 | ||
| 				data,tdscnt,	/* data + length */
 | ||
| 				mdrcnt,mprcnt,
 | ||
| 				&rdata,&rparam,&rdata_len,&rparam_len);
 | ||
| 
 | ||
| 
 | ||
| 	if (rdata_len > mdrcnt || rparam_len > mprcnt) {
 | ||
| 		reply = api_TooSmall(req->sconn,conn,vuid,params,data,
 | ||
| 				     mdrcnt,mprcnt,
 | ||
| 					&rdata,&rparam,&rdata_len,&rparam_len);
 | ||
| 	}
 | ||
| 
 | ||
| 	/* if we get False back then it's actually unsupported */
 | ||
| 	if (!reply) {
 | ||
| 		reply = api_Unsupported(req->sconn,conn,vuid,params,tpscnt,
 | ||
| 					data,
 | ||
| 					tdscnt,mdrcnt,mprcnt,
 | ||
| 			&rdata,&rparam,&rdata_len,&rparam_len);
 | ||
| 	}
 | ||
| 
 | ||
| 	/* If api_Unsupported returns false we can't return anything. */
 | ||
| 	if (reply) {
 | ||
| 		send_trans_reply(conn, req, rparam, rparam_len,
 | ||
| 				 rdata, rdata_len, False);
 | ||
| 	}
 | ||
| 
 | ||
| 	SAFE_FREE(rdata);
 | ||
| 	SAFE_FREE(rparam);
 | ||
| 	return;
 | ||
| }
 |