mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
7d068355aa
domains, this patch ensures that we always use the ADS backend when
security=ADS, and the remote server is capable.
The routines used for this behaviour have been upgraded to modern Samba
codeing standards.
This is a change in behaviour for mixed mode domains, and if the trusted
domain cannot be reached with our current krb5.conf file, we will show
that domain as disconnected.
This is in line with existing behaviour for native mode domains, and for
our primary domain.
As a consequence of testing this patch, I found that our kerberos error
handling was well below par - we would often throw away useful error
values. These changes move more routines to ADS_STATUS to return
kerberos errors.
Also found when valgrinding the setup, fix a few memory leaks.
While sniffing the resultant connections, I noticed we would query our
list of trusted domains twice - so I have reworked some of the code to
avoid that.
Andrew Bartlett
(This used to be commit 7c34de8096
)
1409 lines
32 KiB
C
1409 lines
32 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
RPC pipe client
|
|
Copyright (C) Tim Potter 2000-2001,
|
|
Copyright (C) Andrew Tridgell 1992-1997,2000,
|
|
Copyright (C) Luke Kenneth Casson Leighton 1996-1997,2000,
|
|
Copyright (C) Paul Ashton 1997,2000,
|
|
Copyright (C) Elrond 2000,
|
|
Copyright (C) Rafal Szczesniak 2002
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
/** @defgroup lsa LSA - Local Security Architecture
|
|
* @ingroup rpc_client
|
|
*
|
|
* @{
|
|
**/
|
|
|
|
/**
|
|
* @file cli_lsarpc.c
|
|
*
|
|
* RPC client routines for the LSA RPC pipe. LSA means "local
|
|
* security authority", which is half of a password database.
|
|
**/
|
|
|
|
/** Open a LSA policy handle
|
|
*
|
|
* @param cli Handle on an initialised SMB connection */
|
|
|
|
NTSTATUS cli_lsa_open_policy(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
BOOL sec_qos, uint32 des_access, POLICY_HND *pol)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_OPEN_POL q;
|
|
LSA_R_OPEN_POL r;
|
|
LSA_SEC_QOS qos;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Initialise input parameters */
|
|
|
|
if (sec_qos) {
|
|
init_lsa_sec_qos(&qos, 2, 1, 0);
|
|
init_q_open_pol(&q, '\\', 0, des_access, &qos);
|
|
} else {
|
|
init_q_open_pol(&q, '\\', 0, des_access, NULL);
|
|
}
|
|
|
|
/* Marshall data and send request */
|
|
|
|
if (!lsa_io_q_open_pol("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_OPENPOLICY, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_open_pol("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (NT_STATUS_IS_OK(result = r.status)) {
|
|
*pol = r.pol;
|
|
#ifdef __INSURE__
|
|
pol->marker = malloc(1);
|
|
#endif
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Open a LSA policy handle
|
|
*
|
|
* @param cli Handle on an initialised SMB connection
|
|
*/
|
|
|
|
NTSTATUS cli_lsa_open_policy2(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
BOOL sec_qos, uint32 des_access, POLICY_HND *pol)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_OPEN_POL2 q;
|
|
LSA_R_OPEN_POL2 r;
|
|
LSA_SEC_QOS qos;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Initialise input parameters */
|
|
|
|
if (sec_qos) {
|
|
init_lsa_sec_qos(&qos, 2, 1, 0);
|
|
init_q_open_pol2(&q, cli->srv_name_slash, 0, des_access,
|
|
&qos);
|
|
} else {
|
|
init_q_open_pol2(&q, cli->srv_name_slash, 0, des_access,
|
|
NULL);
|
|
}
|
|
|
|
/* Marshall data and send request */
|
|
|
|
if (!lsa_io_q_open_pol2("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_OPENPOLICY2, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_open_pol2("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (NT_STATUS_IS_OK(result = r.status)) {
|
|
*pol = r.pol;
|
|
#ifdef __INSURE__
|
|
pol->marker = (char *)malloc(1);
|
|
#endif
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Close a LSA policy handle */
|
|
|
|
NTSTATUS cli_lsa_close(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_CLOSE q;
|
|
LSA_R_CLOSE r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_lsa_q_close(&q, pol);
|
|
|
|
if (!lsa_io_q_close("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_CLOSE, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_close("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (NT_STATUS_IS_OK(result = r.status)) {
|
|
#ifdef __INSURE__
|
|
SAFE_FREE(pol->marker);
|
|
#endif
|
|
*pol = r.pol;
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Lookup a list of sids */
|
|
|
|
NTSTATUS cli_lsa_lookup_sids(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, int num_sids, const DOM_SID *sids,
|
|
char ***domains, char ***names, uint32 **types)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_LOOKUP_SIDS q;
|
|
LSA_R_LOOKUP_SIDS r;
|
|
DOM_R_REF ref;
|
|
LSA_TRANS_NAME_ENUM t_names;
|
|
NTSTATUS result;
|
|
int i;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_q_lookup_sids(mem_ctx, &q, pol, num_sids, sids, 1);
|
|
|
|
if (!lsa_io_q_lookup_sids("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_LOOKUPSIDS, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
ZERO_STRUCT(ref);
|
|
ZERO_STRUCT(t_names);
|
|
|
|
r.dom_ref = &ref;
|
|
r.names = &t_names;
|
|
|
|
if (!lsa_io_r_lookup_sids("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
result = r.status;
|
|
|
|
if (!NT_STATUS_IS_OK(result) &&
|
|
NT_STATUS_V(result) != NT_STATUS_V(STATUS_SOME_UNMAPPED)) {
|
|
|
|
/* An actual error occured */
|
|
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (r.mapped_count == 0) {
|
|
result = NT_STATUS_NONE_MAPPED;
|
|
goto done;
|
|
}
|
|
|
|
if (!((*domains) = (char **)talloc(mem_ctx, sizeof(char *) *
|
|
num_sids))) {
|
|
DEBUG(0, ("cli_lsa_lookup_sids(): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!((*names) = (char **)talloc(mem_ctx, sizeof(char *) *
|
|
num_sids))) {
|
|
DEBUG(0, ("cli_lsa_lookup_sids(): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!((*types) = (uint32 *)talloc(mem_ctx, sizeof(uint32) *
|
|
num_sids))) {
|
|
DEBUG(0, ("cli_lsa_lookup_sids(): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
for (i = 0; i < num_sids; i++) {
|
|
fstring name, dom_name;
|
|
uint32 dom_idx = t_names.name[i].domain_idx;
|
|
|
|
/* Translate optimised name through domain index array */
|
|
|
|
if (dom_idx != 0xffffffff) {
|
|
|
|
rpcstr_pull_unistr2_fstring(
|
|
dom_name, &ref.ref_dom[dom_idx].uni_dom_name);
|
|
rpcstr_pull_unistr2_fstring(
|
|
name, &t_names.uni_name[i]);
|
|
|
|
(*names)[i] = talloc_strdup(mem_ctx, name);
|
|
(*domains)[i] = talloc_strdup(mem_ctx, dom_name);
|
|
(*types)[i] = t_names.name[i].sid_name_use;
|
|
|
|
if (((*names)[i] == NULL) || ((*domains)[i] == NULL)) {
|
|
DEBUG(0, ("cli_lsa_lookup_sids(): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
} else {
|
|
(*names)[i] = NULL;
|
|
(*domains)[i] = NULL;
|
|
(*types)[i] = SID_NAME_UNKNOWN;
|
|
}
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Lookup a list of names */
|
|
|
|
NTSTATUS cli_lsa_lookup_names(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, int num_names,
|
|
const char **names, DOM_SID **sids,
|
|
uint32 **types)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_LOOKUP_NAMES q;
|
|
LSA_R_LOOKUP_NAMES r;
|
|
DOM_R_REF ref;
|
|
NTSTATUS result;
|
|
int i;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_q_lookup_names(mem_ctx, &q, pol, num_names, names);
|
|
|
|
if (!lsa_io_q_lookup_names("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_LOOKUPNAMES, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
ZERO_STRUCT(ref);
|
|
r.dom_ref = &ref;
|
|
|
|
if (!lsa_io_r_lookup_names("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
result = r.status;
|
|
|
|
if (!NT_STATUS_IS_OK(result) && NT_STATUS_V(result) !=
|
|
NT_STATUS_V(STATUS_SOME_UNMAPPED)) {
|
|
|
|
/* An actual error occured */
|
|
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (r.mapped_count == 0) {
|
|
result = NT_STATUS_NONE_MAPPED;
|
|
goto done;
|
|
}
|
|
|
|
if (!((*sids = (DOM_SID *)talloc(mem_ctx, sizeof(DOM_SID) *
|
|
num_names)))) {
|
|
DEBUG(0, ("cli_lsa_lookup_sids(): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!((*types = (uint32 *)talloc(mem_ctx, sizeof(uint32) *
|
|
num_names)))) {
|
|
DEBUG(0, ("cli_lsa_lookup_sids(): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
for (i = 0; i < num_names; i++) {
|
|
DOM_RID2 *t_rids = r.dom_rid;
|
|
uint32 dom_idx = t_rids[i].rid_idx;
|
|
uint32 dom_rid = t_rids[i].rid;
|
|
DOM_SID *sid = &(*sids)[i];
|
|
|
|
/* Translate optimised sid through domain index array */
|
|
|
|
if (dom_idx != 0xffffffff) {
|
|
|
|
sid_copy(sid, &ref.ref_dom[dom_idx].ref_dom.sid);
|
|
|
|
if (dom_rid != 0xffffffff) {
|
|
sid_append_rid(sid, dom_rid);
|
|
}
|
|
|
|
(*types)[i] = t_rids[i].type;
|
|
} else {
|
|
ZERO_STRUCTP(sid);
|
|
(*types)[i] = SID_NAME_UNKNOWN;
|
|
}
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Query info policy
|
|
*
|
|
* @param domain_sid - returned remote server's domain sid */
|
|
|
|
NTSTATUS cli_lsa_query_info_policy(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, uint16 info_class,
|
|
char **domain_name, DOM_SID **domain_sid)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_QUERY_INFO q;
|
|
LSA_R_QUERY_INFO r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_q_query(&q, pol, info_class);
|
|
|
|
if (!lsa_io_q_query("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_QUERYINFOPOLICY, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_query("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
switch (info_class) {
|
|
|
|
case 3:
|
|
if (domain_name && (r.dom.id3.buffer_dom_name != 0)) {
|
|
*domain_name = unistr2_tdup(mem_ctx,
|
|
&r.dom.id3.
|
|
uni_domain_name);
|
|
}
|
|
|
|
if (domain_sid && (r.dom.id3.buffer_dom_sid != 0)) {
|
|
*domain_sid = talloc(mem_ctx, sizeof(**domain_sid));
|
|
if (*domain_sid) {
|
|
sid_copy(*domain_sid, &r.dom.id3.dom_sid.sid);
|
|
}
|
|
}
|
|
|
|
break;
|
|
|
|
case 5:
|
|
|
|
if (domain_name && (r.dom.id5.buffer_dom_name != 0)) {
|
|
*domain_name = unistr2_tdup(mem_ctx,
|
|
&r.dom.id5.
|
|
uni_domain_name);
|
|
}
|
|
|
|
if (domain_sid && (r.dom.id5.buffer_dom_sid != 0)) {
|
|
*domain_sid = talloc(mem_ctx, sizeof(**domain_sid));
|
|
if (*domain_sid) {
|
|
sid_copy(*domain_sid, &r.dom.id5.dom_sid.sid);
|
|
}
|
|
}
|
|
break;
|
|
|
|
default:
|
|
DEBUG(3, ("unknown info class %d\n", info_class));
|
|
break;
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Query info policy2
|
|
*
|
|
* @param domain_name - returned remote server's domain name
|
|
* @param dns_name - returned remote server's dns domain name
|
|
* @param forest_name - returned remote server's forest name
|
|
* @param domain_guid - returned remote server's domain guid
|
|
* @param domain_sid - returned remote server's domain sid */
|
|
|
|
NTSTATUS cli_lsa_query_info_policy2(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, uint16 info_class,
|
|
char **domain_name, char **dns_name,
|
|
char **forest_name, GUID **domain_guid,
|
|
DOM_SID **domain_sid)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_QUERY_INFO2 q;
|
|
LSA_R_QUERY_INFO2 r;
|
|
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
|
|
|
|
if (info_class != 12)
|
|
goto done;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_q_query2(&q, pol, info_class);
|
|
|
|
if (!lsa_io_q_query_info2("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_QUERYINFO2, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_query_info2("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
ZERO_STRUCTP(domain_guid);
|
|
|
|
if (domain_name && r.info.dns_dom_info.hdr_nb_dom_name.buffer) {
|
|
*domain_name = unistr2_tdup(mem_ctx,
|
|
&r.info.dns_dom_info
|
|
.uni_nb_dom_name);
|
|
}
|
|
if (dns_name && r.info.dns_dom_info.hdr_dns_dom_name.buffer) {
|
|
*dns_name = unistr2_tdup(mem_ctx,
|
|
&r.info.dns_dom_info
|
|
.uni_dns_dom_name);
|
|
}
|
|
if (forest_name && r.info.dns_dom_info.hdr_forest_name.buffer) {
|
|
*forest_name = unistr2_tdup(mem_ctx,
|
|
&r.info.dns_dom_info
|
|
.uni_forest_name);
|
|
}
|
|
|
|
if (domain_guid) {
|
|
*domain_guid = talloc(mem_ctx, sizeof(**domain_guid));
|
|
memcpy(*domain_guid,
|
|
&r.info.dns_dom_info.dom_guid,
|
|
sizeof(GUID));
|
|
}
|
|
|
|
if (domain_sid && r.info.dns_dom_info.ptr_dom_sid != 0) {
|
|
*domain_sid = talloc(mem_ctx, sizeof(**domain_sid));
|
|
if (*domain_sid) {
|
|
sid_copy(*domain_sid,
|
|
&r.info.dns_dom_info.dom_sid.sid);
|
|
}
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Enumerate list of trusted domains
|
|
*
|
|
* @param cli client state (cli_state) structure of the connection
|
|
* @param mem_ctx memory context
|
|
* @param pol opened lsa policy handle
|
|
* @param enum_ctx enumeration context ie. index of first returned domain entry
|
|
* @param pref_num_domains preferred max number of entries returned in one response
|
|
* @param num_domains total number of trusted domains returned by response
|
|
* @param domain_names returned trusted domain names
|
|
* @param domain_sids returned trusted domain sids
|
|
*
|
|
* @return nt status code of response
|
|
**/
|
|
|
|
NTSTATUS cli_lsa_enum_trust_dom(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, uint32 *enum_ctx,
|
|
uint32 *num_domains,
|
|
char ***domain_names, DOM_SID **domain_sids)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_ENUM_TRUST_DOM q;
|
|
LSA_R_ENUM_TRUST_DOM r;
|
|
NTSTATUS result;
|
|
int i;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
/* 64k is enough for about 2000 trusted domains */
|
|
init_q_enum_trust_dom(&q, pol, *enum_ctx, 0x10000);
|
|
|
|
if (!lsa_io_q_enum_trust_dom("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_ENUMTRUSTDOM, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_enum_trust_dom("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
result = r.status;
|
|
|
|
if (!NT_STATUS_IS_OK(result) &&
|
|
!NT_STATUS_EQUAL(result, NT_STATUS_NO_MORE_ENTRIES) &&
|
|
!NT_STATUS_EQUAL(result, STATUS_MORE_ENTRIES)) {
|
|
|
|
/* An actual error ocured */
|
|
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (r.num_domains) {
|
|
|
|
/* Allocate memory for trusted domain names and sids */
|
|
|
|
*domain_names = (char **)talloc(mem_ctx, sizeof(char *) *
|
|
r.num_domains);
|
|
|
|
if (!*domain_names) {
|
|
DEBUG(0, ("cli_lsa_enum_trust_dom(): out of memory\n"));
|
|
result = NT_STATUS_NO_MEMORY;
|
|
goto done;
|
|
}
|
|
|
|
*domain_sids = (DOM_SID *)talloc(mem_ctx, sizeof(DOM_SID) *
|
|
r.num_domains);
|
|
if (!domain_sids) {
|
|
DEBUG(0, ("cli_lsa_enum_trust_dom(): out of memory\n"));
|
|
result = NT_STATUS_NO_MEMORY;
|
|
goto done;
|
|
}
|
|
|
|
/* Copy across names and sids */
|
|
|
|
for (i = 0; i < r.num_domains; i++) {
|
|
fstring tmp;
|
|
|
|
unistr2_to_ascii(tmp, &r.uni_domain_name[i],
|
|
sizeof(tmp) - 1);
|
|
(*domain_names)[i] = talloc_strdup(mem_ctx, tmp);
|
|
sid_copy(&(*domain_sids)[i], &r.domain_sid[i].sid);
|
|
}
|
|
}
|
|
|
|
*num_domains = r.num_domains;
|
|
*enum_ctx = r.enum_context;
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
/** Enumerate privileges*/
|
|
|
|
NTSTATUS cli_lsa_enum_privilege(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, uint32 *enum_context, uint32 pref_max_length,
|
|
uint32 *count, char ***privs_name, uint32 **privs_high, uint32 **privs_low)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_ENUM_PRIVS q;
|
|
LSA_R_ENUM_PRIVS r;
|
|
NTSTATUS result;
|
|
int i;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_q_enum_privs(&q, pol, *enum_context, pref_max_length);
|
|
|
|
if (!lsa_io_q_enum_privs("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_ENUM_PRIVS, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_enum_privs("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
*enum_context = r.enum_context;
|
|
*count = r.count;
|
|
|
|
if (!((*privs_name = (char **)talloc(mem_ctx, sizeof(char *) * r.count)))) {
|
|
DEBUG(0, ("(cli_lsa_enum_privilege): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!((*privs_high = (uint32 *)talloc(mem_ctx, sizeof(uint32) * r.count)))) {
|
|
DEBUG(0, ("(cli_lsa_enum_privilege): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!((*privs_low = (uint32 *)talloc(mem_ctx, sizeof(uint32) * r.count)))) {
|
|
DEBUG(0, ("(cli_lsa_enum_privilege): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
for (i = 0; i < r.count; i++) {
|
|
fstring name;
|
|
|
|
rpcstr_pull_unistr2_fstring( name, &r.privs[i].name);
|
|
|
|
(*privs_name)[i] = talloc_strdup(mem_ctx, name);
|
|
|
|
(*privs_high)[i] = r.privs[i].luid_high;
|
|
(*privs_low)[i] = r.privs[i].luid_low;
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Get privilege name */
|
|
|
|
NTSTATUS cli_lsa_get_dispname(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, const char *name,
|
|
uint16 lang_id, uint16 lang_id_sys,
|
|
fstring description, uint16 *lang_id_desc)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_PRIV_GET_DISPNAME q;
|
|
LSA_R_PRIV_GET_DISPNAME r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_lsa_priv_get_dispname(&q, pol, name, lang_id, lang_id_sys);
|
|
|
|
if (!lsa_io_q_priv_get_dispname("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_PRIV_GET_DISPNAME, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_priv_get_dispname("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
rpcstr_pull_unistr2_fstring(description , &r.desc);
|
|
*lang_id_desc = r.lang_id;
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Enumerate list of SIDs */
|
|
|
|
NTSTATUS cli_lsa_enum_sids(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, uint32 *enum_ctx, uint32 pref_max_length,
|
|
uint32 *num_sids, DOM_SID **sids)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_ENUM_ACCOUNTS q;
|
|
LSA_R_ENUM_ACCOUNTS r;
|
|
NTSTATUS result;
|
|
int i;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_lsa_q_enum_accounts(&q, pol, *enum_ctx, pref_max_length);
|
|
|
|
if (!lsa_io_q_enum_accounts("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_ENUM_ACCOUNTS, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_enum_accounts("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
result = r.status;
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
if (r.sids.num_entries==0)
|
|
goto done;
|
|
|
|
/* Return output parameters */
|
|
|
|
*sids = (DOM_SID *)talloc(mem_ctx, sizeof(DOM_SID) * r.sids.num_entries);
|
|
if (!*sids) {
|
|
DEBUG(0, ("(cli_lsa_enum_sids): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Copy across names and sids */
|
|
|
|
for (i = 0; i < r.sids.num_entries; i++) {
|
|
sid_copy(&(*sids)[i], &r.sids.sid[i].sid);
|
|
}
|
|
|
|
*num_sids= r.sids.num_entries;
|
|
*enum_ctx = r.enum_context;
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Open a LSA user handle
|
|
*
|
|
* @param cli Handle on an initialised SMB connection */
|
|
|
|
NTSTATUS cli_lsa_open_account(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *dom_pol, DOM_SID *sid, uint32 des_access,
|
|
POLICY_HND *user_pol)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_OPENACCOUNT q;
|
|
LSA_R_OPENACCOUNT r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Initialise input parameters */
|
|
|
|
init_lsa_q_open_account(&q, dom_pol, sid, des_access);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
if (!lsa_io_q_open_account("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_OPENACCOUNT, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_open_account("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (NT_STATUS_IS_OK(result = r.status)) {
|
|
*user_pol = r.pol;
|
|
}
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Enumerate user privileges
|
|
*
|
|
* @param cli Handle on an initialised SMB connection */
|
|
|
|
NTSTATUS cli_lsa_enum_privsaccount(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, uint32 *count, LUID_ATTR **set)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_ENUMPRIVSACCOUNT q;
|
|
LSA_R_ENUMPRIVSACCOUNT r;
|
|
NTSTATUS result;
|
|
int i;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Initialise input parameters */
|
|
|
|
init_lsa_q_enum_privsaccount(&q, pol);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
if (!lsa_io_q_enum_privsaccount("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_ENUMPRIVSACCOUNT, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_enum_privsaccount("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
if (r.count == 0)
|
|
goto done;
|
|
|
|
if (!((*set = (LUID_ATTR *)talloc(mem_ctx, sizeof(LUID_ATTR) * r.count)))) {
|
|
DEBUG(0, ("(cli_lsa_enum_privsaccount): out of memory\n"));
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
for (i=0; i<r.count; i++) {
|
|
(*set)[i].luid.low = r.set->set[i].luid.low;
|
|
(*set)[i].luid.high = r.set->set[i].luid.high;
|
|
(*set)[i].attr = r.set->set[i].attr;
|
|
}
|
|
|
|
*count=r.count;
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Get a privilege value given its name */
|
|
|
|
NTSTATUS cli_lsa_lookupprivvalue(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, const char *name, LUID *luid)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_LOOKUPPRIVVALUE q;
|
|
LSA_R_LOOKUPPRIVVALUE r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_lsa_q_lookupprivvalue(&q, pol, name);
|
|
|
|
if (!lsa_io_q_lookupprivvalue("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_LOOKUPPRIVVALUE, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_lookupprivvalue("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
(*luid).low=r.luid.low;
|
|
(*luid).high=r.luid.high;
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
/** Query LSA security object */
|
|
|
|
NTSTATUS cli_lsa_query_secobj(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, uint32 sec_info,
|
|
SEC_DESC_BUF **psdb)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_QUERY_SEC_OBJ q;
|
|
LSA_R_QUERY_SEC_OBJ r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
|
|
init_q_query_sec_obj(&q, pol, sec_info);
|
|
|
|
if (!lsa_io_q_query_sec_obj("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_QUERYSECOBJ, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_query_sec_obj("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
/* Return output parameters */
|
|
|
|
if (psdb)
|
|
*psdb = r.buf;
|
|
|
|
done:
|
|
prs_mem_free(&qbuf);
|
|
prs_mem_free(&rbuf);
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
/* Enumerate account rights This is similar to enum_privileges but
|
|
takes a SID directly, avoiding the open_account call.
|
|
*/
|
|
|
|
NTSTATUS cli_lsa_enum_account_rights(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, DOM_SID sid,
|
|
uint32 *count, char ***privs_name)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_ENUM_ACCT_RIGHTS q;
|
|
LSA_R_ENUM_ACCT_RIGHTS r;
|
|
NTSTATUS result;
|
|
int i;
|
|
|
|
ZERO_STRUCT(q);
|
|
ZERO_STRUCT(r);
|
|
|
|
/* Initialise parse structures */
|
|
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
init_q_enum_acct_rights(&q, pol, 2, &sid);
|
|
|
|
if (!lsa_io_q_enum_acct_rights("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_ENUMACCTRIGHTS, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!lsa_io_r_enum_acct_rights("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
|
|
*count = r.count;
|
|
if (! *count) {
|
|
goto done;
|
|
}
|
|
|
|
*privs_name = (char **)talloc(mem_ctx, (*count) * sizeof(char **));
|
|
for (i=0;i<*count;i++) {
|
|
pull_ucs2_talloc(mem_ctx, &(*privs_name)[i], r.rights.strings[i].string.buffer);
|
|
}
|
|
|
|
done:
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
|
|
/* add account rights to an account. */
|
|
|
|
NTSTATUS cli_lsa_add_account_rights(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, DOM_SID sid,
|
|
uint32 count, const char **privs_name)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_ADD_ACCT_RIGHTS q;
|
|
LSA_R_ADD_ACCT_RIGHTS r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
|
|
/* Initialise parse structures */
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
init_q_add_acct_rights(&q, pol, &sid, count, privs_name);
|
|
|
|
if (!lsa_io_q_add_acct_rights("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_ADDACCTRIGHTS, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_add_acct_rights("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
done:
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
/* remove account rights for an account. */
|
|
|
|
NTSTATUS cli_lsa_remove_account_rights(struct cli_state *cli, TALLOC_CTX *mem_ctx,
|
|
POLICY_HND *pol, DOM_SID sid, BOOL removeall,
|
|
uint32 count, const char **privs_name)
|
|
{
|
|
prs_struct qbuf, rbuf;
|
|
LSA_Q_REMOVE_ACCT_RIGHTS q;
|
|
LSA_R_REMOVE_ACCT_RIGHTS r;
|
|
NTSTATUS result;
|
|
|
|
ZERO_STRUCT(q);
|
|
|
|
/* Initialise parse structures */
|
|
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
|
|
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
|
|
|
|
/* Marshall data and send request */
|
|
init_q_remove_acct_rights(&q, pol, &sid, removeall?1:0, count, privs_name);
|
|
|
|
if (!lsa_io_q_remove_acct_rights("", &q, &qbuf, 0) ||
|
|
!rpc_api_pipe_req(cli, LSA_REMOVEACCTRIGHTS, &qbuf, &rbuf)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
/* Unmarshall response */
|
|
|
|
if (!lsa_io_r_remove_acct_rights("", &r, &rbuf, 0)) {
|
|
result = NT_STATUS_UNSUCCESSFUL;
|
|
goto done;
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(result = r.status)) {
|
|
goto done;
|
|
}
|
|
done:
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
#if 0
|
|
|
|
/** An example of how to use the routines in this file. Fetch a DOMAIN
|
|
sid. Does complete cli setup / teardown anonymously. */
|
|
|
|
BOOL fetch_domain_sid( char *domain, char *remote_machine, DOM_SID *psid)
|
|
{
|
|
extern pstring global_myname;
|
|
struct cli_state cli;
|
|
NTSTATUS result;
|
|
POLICY_HND lsa_pol;
|
|
BOOL ret = False;
|
|
|
|
ZERO_STRUCT(cli);
|
|
if(cli_initialise(&cli) == False) {
|
|
DEBUG(0,("fetch_domain_sid: unable to initialize client connection.\n"));
|
|
return False;
|
|
}
|
|
|
|
if(!resolve_name( remote_machine, &cli.dest_ip, 0x20)) {
|
|
DEBUG(0,("fetch_domain_sid: Can't resolve address for %s\n", remote_machine));
|
|
goto done;
|
|
}
|
|
|
|
if (!cli_connect(&cli, remote_machine, &cli.dest_ip)) {
|
|
DEBUG(0,("fetch_domain_sid: unable to connect to SMB server on \
|
|
machine %s. Error was : %s.\n", remote_machine, cli_errstr(&cli) ));
|
|
goto done;
|
|
}
|
|
|
|
if (!attempt_netbios_session_request(&cli, global_myname, remote_machine, &cli.dest_ip)) {
|
|
DEBUG(0,("fetch_domain_sid: machine %s rejected the NetBIOS session request.\n",
|
|
remote_machine));
|
|
goto done;
|
|
}
|
|
|
|
cli.protocol = PROTOCOL_NT1;
|
|
|
|
if (!cli_negprot(&cli)) {
|
|
DEBUG(0,("fetch_domain_sid: machine %s rejected the negotiate protocol. \
|
|
Error was : %s.\n", remote_machine, cli_errstr(&cli) ));
|
|
goto done;
|
|
}
|
|
|
|
if (cli.protocol != PROTOCOL_NT1) {
|
|
DEBUG(0,("fetch_domain_sid: machine %s didn't negotiate NT protocol.\n",
|
|
remote_machine));
|
|
goto done;
|
|
}
|
|
|
|
/*
|
|
* Do an anonymous session setup.
|
|
*/
|
|
|
|
if (!cli_session_setup(&cli, "", "", 0, "", 0, "")) {
|
|
DEBUG(0,("fetch_domain_sid: machine %s rejected the session setup. \
|
|
Error was : %s.\n", remote_machine, cli_errstr(&cli) ));
|
|
goto done;
|
|
}
|
|
|
|
if (!(cli.sec_mode & NEGOTIATE_SECURITY_USER_LEVEL)) {
|
|
DEBUG(0,("fetch_domain_sid: machine %s isn't in user level security mode\n",
|
|
remote_machine));
|
|
goto done;
|
|
}
|
|
|
|
if (!cli_send_tconX(&cli, "IPC$", "IPC", "", 1)) {
|
|
DEBUG(0,("fetch_domain_sid: machine %s rejected the tconX on the IPC$ share. \
|
|
Error was : %s.\n", remote_machine, cli_errstr(&cli) ));
|
|
goto done;
|
|
}
|
|
|
|
/* Fetch domain sid */
|
|
|
|
if (!cli_nt_session_open(&cli, PI_LSARPC)) {
|
|
DEBUG(0, ("fetch_domain_sid: Error connecting to SAM pipe\n"));
|
|
goto done;
|
|
}
|
|
|
|
result = cli_lsa_open_policy(&cli, cli.mem_ctx, True, SEC_RIGHTS_QUERY_VALUE, &lsa_pol);
|
|
if (!NT_STATUS_IS_OK(result)) {
|
|
DEBUG(0, ("fetch_domain_sid: Error opening lsa policy handle. %s\n",
|
|
nt_errstr(result) ));
|
|
goto done;
|
|
}
|
|
|
|
result = cli_lsa_query_info_policy(&cli, cli.mem_ctx, &lsa_pol, 5, domain, psid);
|
|
if (!NT_STATUS_IS_OK(result)) {
|
|
DEBUG(0, ("fetch_domain_sid: Error querying lsa policy handle. %s\n",
|
|
nt_errstr(result) ));
|
|
goto done;
|
|
}
|
|
|
|
ret = True;
|
|
|
|
done:
|
|
|
|
cli_shutdown(&cli);
|
|
return ret;
|
|
}
|
|
|
|
#endif
|
|
|
|
/** @} **/
|