3 * Unix SMB/Netbios implementation.
5 * RPC Pipe client / server routines
6 * Copyright (C) Andrew Tridgell 1992-1997,
7 * Copyright (C) Luke Kenneth Casson Leighton 1996-1997,
8 * Copyright (C) Paul Ashton 1997.
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
32 extern int DEBUGLEVEL;
35 /****************************************************************************
37 ****************************************************************************/
38 BOOL lsa_open_policy(struct cli_state *cli,
39 char *server_name, POLICY_HND *hnd,
46 BOOL valid_pol = False;
48 if (hnd == NULL) return False;
50 prs_init(&buf , 1024, 4, SAFETY_MARGIN, False);
51 prs_init(&rbuf, 0 , 4, SAFETY_MARGIN, True );
53 /* create and send a MSRPC command with api LSA_OPENPOLICY */
55 DEBUG(4,("LSA Open Policy\n"));
57 /* store the parameters */
60 make_lsa_sec_qos(&qos, 2, 1, 0, 0x20000000);
61 make_q_open_pol(&q_o, 0x5c, 0, 0, &qos);
65 make_q_open_pol(&q_o, 0x5c, 0, 0x1, NULL);
68 /* turn parameters into data stream */
69 lsa_io_q_open_pol("", &q_o, &buf, 0);
71 /* send the data on \PIPE\ */
72 if (rpc_api_pipe_req(cli, LSA_OPENPOLICY, &buf, &rbuf))
77 lsa_io_r_open_pol("", &r_o, &rbuf, 0);
80 if (p && r_o.status != 0)
82 /* report error code */
83 DEBUG(0,("LSA_OPENPOLICY: %s\n", get_nt_error_msg(r_o.status)));
89 /* ok, at last: we're happy. return the policy handle */
90 memcpy(hnd, r_o.pol.data, sizeof(hnd->data));
101 /****************************************************************************
102 do a LSA Lookup Names
103 ****************************************************************************/
104 BOOL lsa_lookup_names(struct cli_state *cli,
113 LSA_Q_LOOKUP_NAMES q_l;
114 BOOL valid_response = False;
116 if (hnd == NULL || num_sids == 0 || sids == NULL) return False;
118 prs_init(&buf , 1024, 4, SAFETY_MARGIN, False);
119 prs_init(&rbuf, 0 , 4, SAFETY_MARGIN, True );
121 /* create and send a MSRPC command with api LSA_LOOKUP_NAMES */
123 DEBUG(4,("LSA Lookup NAMEs\n"));
125 /* store the parameters */
126 make_q_lookup_names(&q_l, hnd, num_names, names);
128 /* turn parameters into data stream */
129 lsa_io_q_lookup_names("", &q_l, &buf, 0);
131 /* send the data on \PIPE\ */
132 if (rpc_api_pipe_req(cli, LSA_LOOKUPNAMES, &buf, &rbuf))
134 LSA_R_LOOKUP_NAMES r_l;
136 DOM_RID2 t_rids[MAX_LOOKUP_SIDS];
143 r_l.dom_rid = t_rids;
145 lsa_io_r_lookup_names("", &r_l, &rbuf, 0);
146 p = rbuf.offset != 0;
148 if (p && r_l.status != 0)
150 /* report error code */
151 DEBUG(0,("LSA_LOOKUP_NAMES: %s\n", get_nt_error_msg(r_l.status)));
157 if (r_l.undoc_buffer != 0 && ref.undoc_buffer != 0)
159 valid_response = True;
163 if (num_sids != NULL && valid_response)
165 (*num_sids) = r_l.num_entries;
170 for (i = 0; i < r_l.num_entries; i++)
172 if (t_rids[i].rid_idx >= ref.num_ref_doms_1 &&
173 t_rids[i].rid_idx != 0xffffffff)
175 DEBUG(0,("LSA_LOOKUP_NAMES: domain index %d out of bounds\n",
177 valid_response = False;
183 if (sids != NULL && valid_response && r_l.num_entries != 0)
185 (*sids) = (DOM_SID*)malloc((*num_sids) * sizeof(DOM_SID));
188 if (sids != NULL && (*sids) != NULL)
191 /* take each name, construct a SID */
192 for (i = 0; i < (*num_sids); i++)
194 uint32 dom_idx = t_rids[i].rid_idx;
195 uint32 dom_rid = t_rids[i].rid;
196 DOM_SID *sid = &(*sids)[i];
197 if (dom_idx != 0xffffffff)
199 sid_copy(sid, &ref.ref_dom[dom_idx].ref_dom.sid);
200 sid_append_rid(sid, dom_rid);
213 return valid_response;
216 /****************************************************************************
218 ****************************************************************************/
219 BOOL lsa_lookup_sids(struct cli_state *cli,
228 LSA_Q_LOOKUP_SIDS q_l;
229 BOOL valid_response = False;
231 if (hnd == NULL || num_sids == 0 || sids == NULL) return False;
233 prs_init(&buf , 1024, 4, SAFETY_MARGIN, False);
234 prs_init(&rbuf, 0 , 4, SAFETY_MARGIN, True );
236 /* create and send a MSRPC command with api LSA_LOOKUP_SIDS */
238 DEBUG(4,("LSA Lookup SIDs\n"));
240 /* store the parameters */
241 make_q_lookup_sids(&q_l, hnd, num_sids, sids, 1);
243 /* turn parameters into data stream */
244 lsa_io_q_lookup_sids("", &q_l, &buf, 0);
246 /* send the data on \PIPE\ */
247 if (rpc_api_pipe_req(cli, LSA_LOOKUPSIDS, &buf, &rbuf))
249 LSA_R_LOOKUP_SIDS r_l;
251 LSA_TRANS_NAME_ENUM t_names;
255 r_l.names = &t_names;
257 lsa_io_r_lookup_sids("", &r_l, &rbuf, 0);
258 p = rbuf.offset != 0;
260 if (p && r_l.status != 0)
262 /* report error code */
263 DEBUG(0,("LSA_LOOKUP_SIDS: %s\n", get_nt_error_msg(r_l.status)));
269 if (t_names.ptr_trans_names != 0 && ref.undoc_buffer != 0)
271 valid_response = True;
275 if (num_names != NULL && valid_response)
277 (*num_names) = t_names.num_entries;
282 for (i = 0; i < t_names.num_entries; i++)
284 if (t_names.name[i].domain_idx >= ref.num_ref_doms_1)
286 DEBUG(0,("LSA_LOOKUP_SIDS: domain index out of bounds\n"));
287 valid_response = False;
293 if (names != NULL && valid_response && t_names.num_entries != 0)
295 (*names) = (char**)malloc((*num_names) * sizeof(char*));
298 if (names != NULL && (*names) != NULL)
301 /* take each name, construct a \DOMAIN\name string */
302 for (i = 0; i < (*num_names); i++)
307 uint32 dom_idx = t_names.name[i].domain_idx;
309 if (dom_idx != 0xffffffff)
311 fstrcpy(dom_name, unistr2_to_str(&ref.ref_dom[dom_idx].uni_dom_name));
312 fstrcpy(name , unistr2_to_str(&t_names.uni_name[i]));
314 memset(full_name, 0, sizeof(full_name));
316 slprintf(full_name, sizeof(full_name)-1, "%s\\%s",
319 (*names)[i] = strdup(full_name);
332 return valid_response;
335 /****************************************************************************
336 do a LSA Query Info Policy
337 ****************************************************************************/
338 BOOL lsa_query_info_pol(struct cli_state *cli,
339 POLICY_HND *hnd, uint16 info_class,
340 fstring domain_name, DOM_SID *domain_sid)
344 LSA_Q_QUERY_INFO q_q;
345 BOOL valid_response = False;
347 ZERO_STRUCTP(domain_sid);
350 if (hnd == NULL || domain_name == NULL || domain_sid == NULL) return False;
352 prs_init(&buf , 1024, 4, SAFETY_MARGIN, False);
353 prs_init(&rbuf, 0 , 4, SAFETY_MARGIN, True );
355 /* create and send a MSRPC command with api LSA_QUERYINFOPOLICY */
357 DEBUG(4,("LSA Query Info Policy\n"));
359 /* store the parameters */
360 make_q_query(&q_q, hnd, info_class);
362 /* turn parameters into data stream */
363 lsa_io_q_query("", &q_q, &buf, 0);
365 /* send the data on \PIPE\ */
366 if (rpc_api_pipe_req(cli, LSA_QUERYINFOPOLICY, &buf, &rbuf))
368 LSA_R_QUERY_INFO r_q;
371 lsa_io_r_query("", &r_q, &rbuf, 0);
372 p = rbuf.offset != 0;
374 if (p && r_q.status != 0)
376 /* report error code */
377 DEBUG(0,("LSA_QUERYINFOPOLICY: %s\n", get_nt_error_msg(r_q.status)));
381 if (p && r_q.info_class != q_q.info_class)
383 /* report different info classes */
384 DEBUG(0,("LSA_QUERYINFOPOLICY: error info_class (q,r) differ - (%x,%x)\n",
385 q_q.info_class, r_q.info_class));
392 /* ok, at last: we're happy. */
393 switch (r_q.info_class)
397 if (r_q.dom.id3.buffer_dom_name != 0)
399 char *dom_name = unistrn2(r_q.dom.id3.uni_domain_name.buffer,
400 r_q.dom.id3.uni_domain_name.uni_str_len);
401 fstrcpy(domain_name, dom_name);
403 if (r_q.dom.id3.buffer_dom_sid != 0)
405 *domain_sid = r_q.dom.id3.dom_sid.sid;
408 valid_response = True;
413 if (r_q.dom.id5.buffer_dom_name != 0)
415 char *dom_name = unistrn2(r_q.dom.id5.uni_domain_name.buffer,
416 r_q.dom.id5.uni_domain_name.uni_str_len);
417 fstrcpy(domain_name, dom_name);
419 if (r_q.dom.id5.buffer_dom_sid != 0)
421 *domain_sid = r_q.dom.id5.dom_sid.sid;
424 valid_response = True;
429 DEBUG(3,("LSA_QUERYINFOPOLICY: unknown info class\n"));
436 sid_to_string(sid_str, domain_sid);
437 DEBUG(3,("LSA_QUERYINFOPOLICY (level %x): domain:%s domain sid:%s\n",
438 r_q.info_class, domain_name, sid_str));
445 return valid_response;
448 /****************************************************************************
450 ****************************************************************************/
451 BOOL lsa_close(struct cli_state *cli, POLICY_HND *hnd)
456 BOOL valid_close = False;
458 if (hnd == NULL) return False;
460 /* create and send a MSRPC command with api LSA_OPENPOLICY */
462 prs_init(&buf , 1024, 4, SAFETY_MARGIN, False);
463 prs_init(&rbuf, 0 , 4, SAFETY_MARGIN, True );
465 DEBUG(4,("LSA Close\n"));
467 /* store the parameters */
468 make_lsa_q_close(&q_c, hnd);
470 /* turn parameters into data stream */
471 lsa_io_q_close("", &q_c, &buf, 0);
473 /* send the data on \PIPE\ */
474 if (rpc_api_pipe_req(cli, LSA_CLOSE, &buf, &rbuf))
479 lsa_io_r_close("", &r_c, &rbuf, 0);
480 p = rbuf.offset != 0;
482 if (p && r_c.status != 0)
484 /* report error code */
485 DEBUG(0,("LSA_CLOSE: %s\n", get_nt_error_msg(r_c.status)));
491 /* check that the returned policy handle is all zeros */
495 for (i = 0; i < sizeof(r_c.pol.data); i++)
497 if (r_c.pol.data[i] != 0)
505 DEBUG(0,("LSA_CLOSE: non-zero handle returned\n"));