2 Unix SMB/CIFS implementation.
4 Copyright (C) Rafal Szczesniak 2005
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 a composite function for domain handling on samr and lsa pipes
25 #include "libcli/composite/composite.h"
26 #include "libnet/libnet.h"
27 #include "librpc/gen_ndr/ndr_samr_c.h"
28 #include "librpc/gen_ndr/ndr_lsa_c.h"
31 struct domain_open_samr_state {
32 struct libnet_context *ctx;
33 struct dcerpc_pipe *pipe;
34 struct libnet_RpcConnect rpcconn;
35 struct samr_Connect connect;
36 struct samr_LookupDomain lookup;
37 struct samr_OpenDomain open;
38 struct samr_Close close;
39 struct lsa_String domain_name;
41 struct policy_handle connect_handle;
42 struct policy_handle domain_handle;
44 /* information about the progress */
45 void (*monitor_fn)(struct monitor_msg*);
49 static void continue_domain_open_close(struct rpc_request *req);
50 static void continue_domain_open_connect(struct rpc_request *req);
51 static void continue_domain_open_lookup(struct rpc_request *req);
52 static void continue_domain_open_open(struct rpc_request *req);
56 * Stage 0.5 (optional): Connect to samr rpc pipe
58 static void continue_domain_open_rpc_connect(struct composite_context *ctx)
60 struct composite_context *c;
61 struct domain_open_samr_state *s;
62 struct rpc_request *conn_req;
64 c = talloc_get_type(ctx->async.private_data, struct composite_context);
65 s = talloc_get_type(c->private_data, struct domain_open_samr_state);
67 c->status = libnet_RpcConnect_recv(ctx, s->ctx, c, &s->rpcconn);
68 if (!composite_is_ok(c)) return;
70 s->pipe = s->rpcconn.out.dcerpc_pipe;
72 /* preparing parameters for samr_Connect rpc call */
73 s->connect.in.system_name = 0;
74 s->connect.in.access_mask = s->access_mask;
75 s->connect.out.connect_handle = &s->connect_handle;
78 conn_req = dcerpc_samr_Connect_send(s->pipe, c, &s->connect);
79 if (composite_nomem(conn_req, c)) return;
81 /* callback handler */
82 composite_continue_rpc(c, conn_req, continue_domain_open_connect, c);
87 * Stage 0.5 (optional): Close existing (in libnet context) domain
90 static void continue_domain_open_close(struct rpc_request *req)
92 struct composite_context *c;
93 struct domain_open_samr_state *s;
94 struct rpc_request *conn_req;
96 c = talloc_get_type(req->async.private_data, struct composite_context);
97 s = talloc_get_type(c->private_data, struct domain_open_samr_state);
99 /* receive samr_Close reply */
100 c->status = dcerpc_ndr_request_recv(req);
101 if (!composite_is_ok(c)) return;
103 /* reset domain handle and associated data in libnet_context */
104 s->ctx->samr.name = NULL;
105 s->ctx->samr.access_mask = 0;
106 ZERO_STRUCT(s->ctx->samr.handle);
108 /* preparing parameters for samr_Connect rpc call */
109 s->connect.in.system_name = 0;
110 s->connect.in.access_mask = s->access_mask;
111 s->connect.out.connect_handle = &s->connect_handle;
114 conn_req = dcerpc_samr_Connect_send(s->pipe, c, &s->connect);
115 if (composite_nomem(conn_req, c)) return;
117 /* callback handler */
118 composite_continue_rpc(c, conn_req, continue_domain_open_connect, c);
123 * Stage 1: Connect to SAM server.
125 static void continue_domain_open_connect(struct rpc_request *req)
127 struct composite_context *c;
128 struct domain_open_samr_state *s;
129 struct rpc_request *lookup_req;
130 struct samr_LookupDomain *r;
132 c = talloc_get_type(req->async.private_data, struct composite_context);
133 s = talloc_get_type(c->private_data, struct domain_open_samr_state);
135 /* receive samr_Connect reply */
136 c->status = dcerpc_ndr_request_recv(req);
137 if (!composite_is_ok(c)) return;
141 /* prepare for samr_LookupDomain call */
142 r->in.connect_handle = &s->connect_handle;
143 r->in.domain_name = &s->domain_name;
145 lookup_req = dcerpc_samr_LookupDomain_send(s->pipe, c, r);
146 if (composite_nomem(lookup_req, c)) return;
148 composite_continue_rpc(c, lookup_req, continue_domain_open_lookup, c);
153 * Stage 2: Lookup domain by name.
155 static void continue_domain_open_lookup(struct rpc_request *req)
157 struct composite_context *c;
158 struct domain_open_samr_state *s;
159 struct rpc_request *opendom_req;
160 struct samr_OpenDomain *r;
162 c = talloc_get_type(req->async.private_data, struct composite_context);
163 s = talloc_get_type(c->private_data, struct domain_open_samr_state);
165 /* receive samr_LookupDomain reply */
166 c->status = dcerpc_ndr_request_recv(req);
170 /* check the rpc layer status */
171 if (!composite_is_ok(c));
173 /* check the rpc call itself status */
174 if (!NT_STATUS_IS_OK(s->lookup.out.result)) {
175 composite_error(c, s->lookup.out.result);
179 /* prepare for samr_OpenDomain call */
180 r->in.connect_handle = &s->connect_handle;
181 r->in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
182 r->in.sid = s->lookup.out.sid;
183 r->out.domain_handle = &s->domain_handle;
185 opendom_req = dcerpc_samr_OpenDomain_send(s->pipe, c, r);
186 if (composite_nomem(opendom_req, c)) return;
188 composite_continue_rpc(c, opendom_req, continue_domain_open_open, c);
193 * Stage 3: Open domain.
195 static void continue_domain_open_open(struct rpc_request *req)
197 struct composite_context *c;
198 struct domain_open_samr_state *s;
200 c = talloc_get_type(req->async.private_data, struct composite_context);
201 s = talloc_get_type(c->private_data, struct domain_open_samr_state);
203 /* receive samr_OpenDomain reply */
204 c->status = dcerpc_ndr_request_recv(req);
205 if (!composite_is_ok(c)) return;
212 * Sends asynchronous DomainOpenSamr request
214 * @param ctx initialised libnet context
215 * @param io arguments and results of the call
216 * @param monitor pointer to monitor function that is passed monitor message
219 struct composite_context *libnet_DomainOpenSamr_send(struct libnet_context *ctx,
220 struct libnet_DomainOpen *io,
221 void (*monitor)(struct monitor_msg*))
223 struct composite_context *c;
224 struct domain_open_samr_state *s;
225 struct composite_context *rpcconn_req;
226 struct rpc_request *close_req, *conn_req;
228 c = composite_create(ctx, ctx->event_ctx);
229 if (c == NULL) return NULL;
231 s = talloc_zero(c, struct domain_open_samr_state);
232 if (composite_nomem(s, c)) return c;
235 s->monitor_fn = monitor;
238 s->pipe = ctx->samr.pipe;
239 s->access_mask = io->in.access_mask;
240 s->domain_name.string = talloc_strdup(c, io->in.domain_name);
242 /* check, if there's samr pipe opened already, before opening a domain */
243 if (ctx->samr.pipe == NULL) {
245 /* attempting to connect a domain controller */
246 s->rpcconn.level = LIBNET_RPC_CONNECT_DC;
247 s->rpcconn.in.name = io->in.domain_name;
248 s->rpcconn.in.dcerpc_iface = &dcerpc_table_samr;
250 /* send rpc pipe connect request */
251 rpcconn_req = libnet_RpcConnect_send(ctx, c, &s->rpcconn);
252 if (composite_nomem(rpcconn_req, c)) return c;
254 composite_continue(c, rpcconn_req, continue_domain_open_rpc_connect, c);
258 /* libnet context's domain handle is not empty, so check out what
259 was opened first, before doing anything */
260 if (!policy_handle_empty(&ctx->samr.handle)) {
261 if (strequal(ctx->samr.name, io->in.domain_name) &&
262 ctx->samr.access_mask == io->in.access_mask) {
264 /* this domain is already opened */
269 /* another domain or access rights have been
270 requested - close the existing handle first */
271 s->close.in.handle = &ctx->samr.handle;
273 /* send request to close domain handle */
274 close_req = dcerpc_samr_Close_send(s->pipe, c, &s->close);
275 if (composite_nomem(close_req, c)) return c;
277 /* callback handler */
278 composite_continue_rpc(c, close_req, continue_domain_open_close, c);
283 /* preparing parameters for samr_Connect rpc call */
284 s->connect.in.system_name = 0;
285 s->connect.in.access_mask = s->access_mask;
286 s->connect.out.connect_handle = &s->connect_handle;
289 conn_req = dcerpc_samr_Connect_send(s->pipe, c, &s->connect);
290 if (composite_nomem(conn_req, c)) return c;
292 /* callback handler */
293 composite_continue_rpc(c, conn_req, continue_domain_open_connect, c);
299 * Waits for and receives result of asynchronous DomainOpenSamr call
301 * @param c composite context returned by asynchronous DomainOpen call
302 * @param ctx initialised libnet context
303 * @param mem_ctx memory context of the call
304 * @param io pointer to results (and arguments) of the call
305 * @return nt status code of execution
308 NTSTATUS libnet_DomainOpenSamr_recv(struct composite_context *c, struct libnet_context *ctx,
309 TALLOC_CTX *mem_ctx, struct libnet_DomainOpen *io)
312 struct domain_open_samr_state *s;
314 /* wait for results of sending request */
315 status = composite_wait(c);
317 if (NT_STATUS_IS_OK(status) && io) {
318 s = talloc_get_type(c->private_data, struct domain_open_samr_state);
319 io->out.domain_handle = s->domain_handle;
321 /* store the resulting handle and related data for use by other
323 ctx->samr.handle = s->domain_handle;
324 ctx->samr.name = talloc_steal(ctx, s->domain_name.string);
325 ctx->samr.access_mask = s->access_mask;
333 struct domain_open_lsa_state {
335 uint32_t access_mask;
336 struct libnet_context *ctx;
337 struct libnet_RpcConnect rpcconn;
338 struct lsa_OpenPolicy2 openpol;
339 struct policy_handle handle;
340 struct dcerpc_pipe *pipe;
342 /* information about the progress */
343 void (*monitor_fn)(struct monitor_msg*);
347 static void continue_rpc_connect_lsa(struct composite_context *ctx);
348 static void continue_lsa_policy_open(struct rpc_request *req);
352 * Sends asynchronous DomainOpenLsa request
354 * @param ctx initialised libnet context
355 * @param io arguments and results of the call
356 * @param monitor pointer to monitor function that is passed monitor message
359 struct composite_context* libnet_DomainOpenLsa_send(struct libnet_context *ctx,
360 struct libnet_DomainOpen *io,
361 void (*monitor)(struct monitor_msg*))
363 struct composite_context *c;
364 struct domain_open_lsa_state *s;
365 struct composite_context *rpcconn_req;
366 struct rpc_request *openpol_req;
367 struct lsa_QosInfo *qos;
369 /* create composite context and state */
370 c = composite_create(ctx, ctx->event_ctx);
371 if (c == NULL) return c;
373 s = talloc_zero(c, struct domain_open_lsa_state);
374 if (composite_nomem(s, c)) return c;
378 /* store arguments in the state structure */
379 s->name = talloc_strdup(c, io->in.domain_name);
380 s->access_mask = io->in.access_mask;
383 /* check, if there's lsa pipe opened already, before opening a handle */
384 if (ctx->lsa.pipe == NULL) {
386 /* attempting to connect a domain controller */
387 s->rpcconn.level = LIBNET_RPC_CONNECT_DC;
388 s->rpcconn.in.name = talloc_strdup(c, io->in.domain_name);
389 s->rpcconn.in.dcerpc_iface = &dcerpc_table_lsarpc;
391 /* send rpc pipe connect request */
392 rpcconn_req = libnet_RpcConnect_send(ctx, c, &s->rpcconn);
393 if (composite_nomem(rpcconn_req, c)) return c;
395 composite_continue(c, rpcconn_req, continue_rpc_connect_lsa, c);
399 s->pipe = ctx->lsa.pipe;
401 /* preparing parameters for lsa_OpenPolicy2 rpc call */
402 s->openpol.in.system_name = s->name;
403 s->openpol.in.access_mask = s->access_mask;
404 s->openpol.in.attr = talloc_zero(c, struct lsa_ObjectAttribute);
406 qos = talloc_zero(c, struct lsa_QosInfo);
408 qos->impersonation_level = 2;
409 qos->context_mode = 1;
410 qos->effective_only = 0;
412 s->openpol.in.attr->sec_qos = qos;
413 s->openpol.out.handle = &s->handle;
415 /* send rpc request */
416 openpol_req = dcerpc_lsa_OpenPolicy2_send(s->pipe, c, &s->openpol);
417 if (composite_nomem(openpol_req, c)) return c;
419 composite_continue_rpc(c, openpol_req, continue_lsa_policy_open, c);
425 Stage 0.5 (optional): Rpc pipe connected, send lsa open policy request
427 static void continue_rpc_connect_lsa(struct composite_context *ctx)
429 struct composite_context *c;
430 struct domain_open_lsa_state *s;
431 struct lsa_QosInfo *qos;
432 struct rpc_request *openpol_req;
434 c = talloc_get_type(ctx->async.private_data, struct composite_context);
435 s = talloc_get_type(c->private_data, struct domain_open_lsa_state);
437 /* receive rpc connection */
438 c->status = libnet_RpcConnect_recv(ctx, s->ctx, c, &s->rpcconn);
439 if (!composite_is_ok(c)) return;
441 /* RpcConnect function leaves the pipe in libnet context,
442 so get it from there */
443 s->pipe = s->ctx->lsa.pipe;
445 /* prepare lsa_OpenPolicy2 call */
446 s->openpol.in.system_name = s->name;
447 s->openpol.in.access_mask = s->access_mask;
448 s->openpol.in.attr = talloc_zero(c, struct lsa_ObjectAttribute);
450 qos = talloc_zero(c, struct lsa_QosInfo);
452 qos->impersonation_level = 2;
453 qos->context_mode = 1;
454 qos->effective_only = 0;
456 s->openpol.in.attr->sec_qos = qos;
457 s->openpol.out.handle = &s->handle;
459 /* send rpc request */
460 openpol_req = dcerpc_lsa_OpenPolicy2_send(s->pipe, c, &s->openpol);
461 if (composite_nomem(openpol_req, c)) return;
463 composite_continue_rpc(c, openpol_req, continue_lsa_policy_open, c);
468 Stage 1: Lsa policy opened - we're done, if successfully
470 static void continue_lsa_policy_open(struct rpc_request *req)
472 struct composite_context *c;
473 struct domain_open_lsa_state *s;
475 c = talloc_get_type(req->async.private_data, struct composite_context);
476 s = talloc_get_type(c->private_data, struct domain_open_lsa_state);
478 c->status = dcerpc_ndr_request_recv(req);
479 if (!composite_is_ok(c)) return;
486 * Receives result of asynchronous DomainOpenLsa call
488 * @param c composite context returned by asynchronous DomainOpenLsa call
489 * @param ctx initialised libnet context
490 * @param mem_ctx memory context of the call
491 * @param io pointer to results (and arguments) of the call
492 * @return nt status code of execution
495 NTSTATUS libnet_DomainOpenLsa_recv(struct composite_context *c, struct libnet_context *ctx,
496 TALLOC_CTX *mem_ctx, struct libnet_DomainOpen *io)
499 struct domain_open_lsa_state *s;
501 status = composite_wait(c);
503 if (NT_STATUS_IS_OK(status) && io) {
504 /* everything went fine - get the results and
505 return the error string */
506 s = talloc_get_type(c->private_data, struct domain_open_lsa_state);
507 io->out.domain_handle = s->handle;
509 ctx->lsa.handle = s->handle;
510 ctx->lsa.name = talloc_steal(ctx, s->name);
511 ctx->lsa.access_mask = s->access_mask;
513 io->out.error_string = talloc_strdup(mem_ctx, "Success");
515 } else if (!NT_STATUS_IS_OK(status)) {
516 /* there was an error, so provide nt status code description */
517 io->out.error_string = talloc_asprintf(mem_ctx,
518 "Failed to open domain: %s",
528 * Sends a request to open a domain in desired service
530 * @param ctx initalised libnet context
531 * @param io arguments and results of the call
532 * @param monitor pointer to monitor function that is passed monitor message
535 struct composite_context* libnet_DomainOpen_send(struct libnet_context *ctx,
536 struct libnet_DomainOpen *io,
537 void (*monitor)(struct monitor_msg*))
539 struct composite_context *c;
541 switch (io->in.type) {
543 /* reques to open a policy handle on \pipe\lsarpc */
544 c = libnet_DomainOpenLsa_send(ctx, io, monitor);
549 /* request to open a domain policy handle on \pipe\samr */
550 c = libnet_DomainOpenSamr_send(ctx, io, monitor);
559 * Receive result of domain open request
561 * @param c composite context returned by DomainOpen_send function
562 * @param ctx initialised libnet context
563 * @param mem_ctx memory context of the call
564 * @param io results and arguments of the call
567 NTSTATUS libnet_DomainOpen_recv(struct composite_context *c, struct libnet_context *ctx,
568 TALLOC_CTX *mem_ctx, struct libnet_DomainOpen *io)
572 switch (io->in.type) {
574 status = libnet_DomainOpenLsa_recv(c, ctx, mem_ctx, io);
579 status = libnet_DomainOpenSamr_recv(c, ctx, mem_ctx, io);
588 * Synchronous version of DomainOpen call
590 * @param ctx initialised libnet context
591 * @param mem_ctx memory context for the call
592 * @param io arguments and results of the call
593 * @return nt status code of execution
596 NTSTATUS libnet_DomainOpen(struct libnet_context *ctx,
598 struct libnet_DomainOpen *io)
600 struct composite_context *c = libnet_DomainOpen_send(ctx, io, NULL);
601 return libnet_DomainOpen_recv(c, ctx, mem_ctx, io);
605 struct domain_close_lsa_state {
606 struct dcerpc_pipe *pipe;
607 struct lsa_Close close;
608 struct policy_handle handle;
610 void (*monitor_fn)(struct monitor_msg*);
614 static void continue_lsa_close(struct rpc_request *req);
617 struct composite_context* libnet_DomainCloseLsa_send(struct libnet_context *ctx,
618 struct libnet_DomainClose *io,
619 void (*monitor)(struct monitor_msg*))
621 struct composite_context *c;
622 struct domain_close_lsa_state *s;
623 struct rpc_request *close_req;
625 /* composite context and state structure allocation */
626 c = composite_create(ctx, ctx->event_ctx);
627 if (c == NULL) return c;
629 s = talloc_zero(c, struct domain_close_lsa_state);
630 if (composite_nomem(s, c)) return c;
633 s->monitor_fn = monitor;
635 /* TODO: check if lsa pipe pointer is non-null */
637 if (!strequal(ctx->lsa.name, io->in.domain_name)) {
638 composite_error(c, NT_STATUS_INVALID_PARAMETER);
642 /* get opened lsarpc pipe pointer */
643 s->pipe = ctx->lsa.pipe;
645 /* prepare close handle call arguments */
646 s->close.in.handle = &ctx->lsa.handle;
647 s->close.out.handle = &s->handle;
649 /* send the request */
650 close_req = dcerpc_lsa_Close_send(s->pipe, c, &s->close);
651 if (composite_nomem(close_req, c)) return c;
653 composite_continue_rpc(c, close_req, continue_lsa_close, c);
659 Stage 1: Receive result of lsa close call
661 static void continue_lsa_close(struct rpc_request *req)
663 struct composite_context *c;
664 struct domain_close_lsa_state *s;
666 c = talloc_get_type(req->async.private_data, struct composite_context);
667 s = talloc_get_type(c->private_data, struct domain_close_lsa_state);
669 c->status = dcerpc_ndr_request_recv(req);
670 if (!composite_is_ok(c)) return;
676 NTSTATUS libnet_DomainCloseLsa_recv(struct composite_context *c, struct libnet_context *ctx,
677 TALLOC_CTX *mem_ctx, struct libnet_DomainClose *io)
681 status = composite_wait(c);
683 if (NT_STATUS_IS_OK(status) && io) {
684 /* policy handle closed successfully */
686 ctx->lsa.name = NULL;
687 ZERO_STRUCT(ctx->lsa.handle);
689 io->out.error_string = talloc_asprintf(mem_ctx, "Success");
691 } else if (!NT_STATUS_IS_OK(status)) {
692 /* there was an error, so return description of the status code */
693 io->out.error_string = talloc_asprintf(mem_ctx, "Error: %s", nt_errstr(status));
701 struct domain_close_samr_state {
702 struct samr_Close close;
703 struct policy_handle handle;
705 void (*monitor_fn)(struct monitor_msg*);
709 static void continue_samr_close(struct rpc_request *req);
712 struct composite_context* libnet_DomainCloseSamr_send(struct libnet_context *ctx,
713 struct libnet_DomainClose *io,
714 void (*monitor)(struct monitor_msg*))
716 struct composite_context *c;
717 struct domain_close_samr_state *s;
718 struct rpc_request *close_req;
720 /* composite context and state structure allocation */
721 c = composite_create(ctx, ctx->event_ctx);
722 if (c == NULL) return c;
724 s = talloc_zero(c, struct domain_close_samr_state);
725 if (composite_nomem(s, c)) return c;
728 s->monitor_fn = monitor;
730 /* TODO: check if samr pipe pointer is non-null */
732 if (!strequal(ctx->samr.name, io->in.domain_name)) {
733 composite_error(c, NT_STATUS_INVALID_PARAMETER);
737 /* prepare close domain handle call arguments */
738 ZERO_STRUCT(s->close);
739 s->close.in.handle = &ctx->samr.handle;
740 s->close.out.handle = &s->handle;
742 /* send the request */
743 close_req = dcerpc_samr_Close_send(ctx->samr.pipe, ctx, &s->close);
744 if (composite_nomem(close_req, c)) return c;
746 composite_continue_rpc(c, close_req, continue_samr_close, c);
752 Stage 1: Receive result of samr close call
754 static void continue_samr_close(struct rpc_request *req)
756 struct composite_context *c;
757 struct domain_close_samr_state *s;
759 c = talloc_get_type(req->async.private_data, struct composite_context);
760 s = talloc_get_type(c->private_data, struct domain_close_samr_state);
762 c->status = dcerpc_ndr_request_recv(req);
763 if (!composite_is_ok(c)) return;
769 NTSTATUS libnet_DomainCloseSamr_recv(struct composite_context *c, struct libnet_context *ctx,
770 TALLOC_CTX *mem_ctx, struct libnet_DomainClose *io)
774 status = composite_wait(c);
776 if (NT_STATUS_IS_OK(status) && io) {
777 /* domain policy handle closed successfully */
779 ZERO_STRUCT(ctx->samr.handle);
780 ctx->samr.name = NULL;
782 io->out.error_string = talloc_asprintf(mem_ctx, "Success");
784 } else if (!NT_STATUS_IS_OK(status)) {
785 /* there was an error, so return description of the status code */
786 io->out.error_string = talloc_asprintf(mem_ctx, "Error: %s", nt_errstr(status));
794 struct composite_context* libnet_DomainClose_send(struct libnet_context *ctx,
795 struct libnet_DomainClose *io,
796 void (*monitor)(struct monitor_msg*))
798 struct composite_context *c;
800 switch (io->in.type) {
802 /* request to close policy handle on \pipe\lsarpc */
803 c = libnet_DomainCloseLsa_send(ctx, io, monitor);
808 /* request to close domain policy handle on \pipe\samr */
809 c = libnet_DomainCloseSamr_send(ctx, io, monitor);
817 NTSTATUS libnet_DomainClose_recv(struct composite_context *c, struct libnet_context *ctx,
818 TALLOC_CTX *mem_ctx, struct libnet_DomainClose *io)
822 switch (io->in.type) {
824 /* receive result of closing lsa policy handle */
825 status = libnet_DomainCloseLsa_recv(c, ctx, mem_ctx, io);
830 /* receive result of closing samr domain policy handle */
831 status = libnet_DomainCloseSamr_recv(c, ctx, mem_ctx, io);
839 NTSTATUS libnet_DomainClose(struct libnet_context *ctx, TALLOC_CTX *mem_ctx,
840 struct libnet_DomainClose *io)
842 struct composite_context *c;
844 c = libnet_DomainClose_send(ctx, io, NULL);
845 return libnet_DomainClose_recv(c, ctx, mem_ctx, io);
849 struct domain_list_state {
850 struct libnet_context *ctx;
851 struct libnet_RpcConnect rpcconn;
852 struct samr_Connect samrconn;
853 struct samr_EnumDomains enumdom;
854 struct samr_Close samrclose;
855 const char *hostname;
856 struct policy_handle connect_handle;
858 struct domainlist *domains;
859 uint32_t resume_handle;
862 void (*monitor_fn)(struct monitor_msg*);
866 static void continue_rpc_connect(struct composite_context *c);
867 static void continue_samr_connect(struct rpc_request *c);
868 static void continue_samr_enum_domains(struct rpc_request *req);
869 static void continue_samr_close_handle(struct rpc_request *req);
871 static struct domainlist* get_domain_list(TALLOC_CTX *mem_ctx, struct domain_list_state *s);
875 Stage 1: Receive connected rpc pipe and send connection
876 request to SAMR service
878 static void continue_rpc_connect(struct composite_context *ctx)
880 struct composite_context *c;
881 struct domain_list_state *s;
882 struct rpc_request *samrconn_req;
884 c = talloc_get_type(ctx->async.private_data, struct composite_context);
885 s = talloc_get_type(c->private_data, struct domain_list_state);
887 c->status = libnet_RpcConnect_recv(ctx, s->ctx, c, &s->rpcconn);
888 if (!composite_is_ok(c)) return;
890 s->samrconn.in.system_name = 0;
891 s->samrconn.in.access_mask = SEC_GENERIC_READ; /* should be enough */
892 s->samrconn.out.connect_handle = &s->connect_handle;
894 samrconn_req = dcerpc_samr_Connect_send(s->ctx->samr.pipe, c, &s->samrconn);
895 if (composite_nomem(samrconn_req, c)) return;
897 composite_continue_rpc(c, samrconn_req, continue_samr_connect, c);
902 Stage 2: Receive policy handle to the connected SAMR service and issue
903 a request to enumerate domain databases available
905 static void continue_samr_connect(struct rpc_request *req)
907 struct composite_context *c;
908 struct domain_list_state *s;
909 struct rpc_request *enumdom_req;
911 c = talloc_get_type(req->async.private_data, struct composite_context);
912 s = talloc_get_type(c->private_data, struct domain_list_state);
914 c->status = dcerpc_ndr_request_recv(req);
915 if (!composite_is_ok(c)) return;
917 s->enumdom.in.connect_handle = &s->connect_handle;
918 s->enumdom.in.resume_handle = &s->resume_handle;
919 s->enumdom.in.buf_size = s->buf_size;
920 s->enumdom.out.resume_handle = &s->resume_handle;
922 enumdom_req = dcerpc_samr_EnumDomains_send(s->ctx->samr.pipe, c, &s->enumdom);
923 if (composite_nomem(enumdom_req, c)) return;
925 composite_continue_rpc(c, enumdom_req, continue_samr_enum_domains, c);
930 Stage 3: Receive domain names available and repeat the request
931 enumeration is not complete yet. Close samr connection handle
934 static void continue_samr_enum_domains(struct rpc_request *req)
936 struct composite_context *c;
937 struct domain_list_state *s;
938 struct rpc_request *enumdom_req;
939 struct rpc_request *samrclose_req;
941 c = talloc_get_type(req->async.private_data, struct composite_context);
942 s = talloc_get_type(c->private_data, struct domain_list_state);
944 c->status = dcerpc_ndr_request_recv(req);
945 if (!composite_is_ok(c)) return;
947 if (NT_STATUS_IS_OK(s->enumdom.out.result)) {
949 s->domains = get_domain_list(c, s);
951 } else if (NT_STATUS_EQUAL(s->enumdom.out.result, STATUS_MORE_ENTRIES)) {
953 s->domains = get_domain_list(c, s);
955 /* prepare next round of enumeration */
956 s->enumdom.in.connect_handle = &s->connect_handle;
957 s->enumdom.in.resume_handle = &s->resume_handle;
958 s->enumdom.in.buf_size = s->ctx->samr.buf_size;
959 s->enumdom.out.resume_handle = &s->resume_handle;
961 /* send the request */
962 enumdom_req = dcerpc_samr_EnumDomains_send(s->ctx->samr.pipe, c, &s->enumdom);
963 if (composite_nomem(enumdom_req, c)) return;
965 composite_continue_rpc(c, enumdom_req, continue_samr_enum_domains, c);
968 composite_error(c, s->enumdom.out.result);
972 /* close samr connection handle */
973 s->samrclose.in.handle = &s->connect_handle;
974 s->samrclose.out.handle = &s->connect_handle;
976 /* send the request */
977 samrclose_req = dcerpc_samr_Close_send(s->ctx->samr.pipe, c, &s->samrclose);
978 if (composite_nomem(samrclose_req, c)) return;
980 composite_continue_rpc(c, samrclose_req, continue_samr_close_handle, c);
985 Stage 4: Receive result of closing samr connection handle.
987 static void continue_samr_close_handle(struct rpc_request *req)
989 struct composite_context *c;
990 struct domain_list_state *s;
992 c = talloc_get_type(req->async.private_data, struct composite_context);
993 s = talloc_get_type(c->private_data, struct domain_list_state);
995 c->status = dcerpc_ndr_request_recv(req);
996 if (!composite_is_ok(c)) return;
998 /* did everything go fine ? */
999 if (!NT_STATUS_IS_OK(s->samrclose.out.result)) {
1000 composite_error(c, s->samrclose.out.result);
1008 Utility function to copy domain names from result of samr_EnumDomains call
1010 static struct domainlist* get_domain_list(TALLOC_CTX *mem_ctx, struct domain_list_state *s)
1013 if (mem_ctx == NULL || s == NULL) return NULL;
1015 /* prepare domains array */
1016 if (s->domains == NULL) {
1017 s->domains = talloc_array(mem_ctx, struct domainlist,
1018 s->enumdom.out.num_entries);
1020 s->domains = talloc_realloc(mem_ctx, s->domains, struct domainlist,
1021 s->count + s->enumdom.out.num_entries);
1024 /* copy domain names returned from samr_EnumDomains call */
1025 for (i = s->count; i < s->count + s->enumdom.out.num_entries; i++)
1027 struct lsa_String *domain_name = &s->enumdom.out.sam->entries[i - s->count].name;
1029 /* strdup name as a child of allocated array to make it follow the array
1030 in case of talloc_steal or talloc_free */
1031 s->domains[i].name = talloc_strdup(s->domains, domain_name->string);
1032 s->domains[i].sid = NULL; /* this is to be filled out later */
1035 /* number of entries returned (domains enumerated) */
1036 s->count += s->enumdom.out.num_entries;
1043 * Sends a request to list domains on given host
1045 * @param ctx initalised libnet context
1046 * @param mem_ctx memory context
1047 * @param io arguments and results of the call
1048 * @param monitor pointer to monitor function that is passed monitor messages
1051 struct composite_context* libnet_DomainList_send(struct libnet_context *ctx,
1052 TALLOC_CTX *mem_ctx,
1053 struct libnet_DomainList *io,
1054 void (*monitor)(struct monitor_msg*))
1056 struct composite_context *c;
1057 struct domain_list_state *s;
1058 struct composite_context *rpcconn_req;
1059 struct rpc_request *samrconn_req;
1061 /* composite context and state structure allocation */
1062 c = composite_create(ctx, ctx->event_ctx);
1063 if (c == NULL) return c;
1065 s = talloc_zero(c, struct domain_list_state);
1066 if (composite_nomem(s, c)) return c;
1068 c->private_data = s;
1069 s->monitor_fn = monitor;
1072 s->hostname = talloc_strdup(c, io->in.hostname);
1073 if (composite_nomem(s->hostname, c)) return c;
1075 /* check whether samr pipe has already been opened */
1076 if (ctx->samr.pipe == NULL) {
1077 /* prepare rpc connect call */
1078 s->rpcconn.level = LIBNET_RPC_CONNECT_SERVER;
1079 s->rpcconn.in.name = s->hostname;
1080 s->rpcconn.in.dcerpc_iface = &dcerpc_table_samr;
1082 rpcconn_req = libnet_RpcConnect_send(ctx, c, &s->rpcconn);
1083 if (composite_nomem(rpcconn_req, c)) return c;
1085 composite_continue(c, rpcconn_req, continue_rpc_connect, c);
1088 /* prepare samr_Connect call */
1089 s->samrconn.in.system_name = 0;
1090 s->samrconn.in.access_mask = SEC_GENERIC_READ;
1091 s->samrconn.out.connect_handle = &s->connect_handle;
1093 samrconn_req = dcerpc_samr_Connect_send(s->ctx->samr.pipe, c, &s->samrconn);
1094 if (composite_nomem(samrconn_req, c)) return c;
1096 composite_continue_rpc(c, samrconn_req, continue_samr_connect, c);
1104 * Receive result of domain list request
1106 * @param c composite context returned by DomainList_send function
1107 * @param ctx initialised libnet context
1108 * @param mem_ctx memory context of the call
1109 * @param io results and arguments of the call
1112 NTSTATUS libnet_DomainList_recv(struct composite_context *c, struct libnet_context *ctx,
1113 TALLOC_CTX *mem_ctx, struct libnet_DomainList *io)
1116 struct domain_list_state *s;
1118 status = composite_wait(c);
1120 s = talloc_get_type(c->private_data, struct domain_list_state);
1122 if (NT_STATUS_IS_OK(status) && ctx && mem_ctx && io) {
1123 /* fetch the results to be returned by io structure */
1124 io->out.count = s->count;
1125 io->out.domains = talloc_steal(mem_ctx, s->domains);
1126 io->out.error_string = talloc_asprintf(mem_ctx, "Success");
1128 } else if (!NT_STATUS_IS_OK(status)) {
1129 /* there was an error, so return description of the status code */
1130 io->out.error_string = talloc_asprintf(mem_ctx, "Error: %s", nt_errstr(status));
1139 * Synchronous version of DomainList call
1141 * @param ctx initialised libnet context
1142 * @param mem_ctx memory context for the call
1143 * @param io arguments and results of the call
1144 * @return nt status code of execution
1147 NTSTATUS libnet_DomainList(struct libnet_context *ctx, TALLOC_CTX *mem_ctx,
1148 struct libnet_DomainList *io)
1150 struct composite_context *c;
1152 c = libnet_DomainList_send(ctx, mem_ctx, io, NULL);
1153 return libnet_DomainList_recv(c, ctx, mem_ctx, io);