2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Andrew Tridgell 1992-1998,
5 * Largely re-written : 2005
6 * Copyright (C) Jeremy Allison 1998 - 2005
7 * Copyright (C) Simo Sorce 2010
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, see <http://www.gnu.org/licenses/>.
24 #include "rpc_client/cli_pipe.h"
25 #include "rpc_server/srv_pipe_internal.h"
27 #include "../libcli/named_pipe_auth/npa_tstream.h"
28 #include "rpc_server/rpc_ncacn_np.h"
29 #include "librpc/gen_ndr/netlogon.h"
30 #include "librpc/gen_ndr/auth.h"
31 #include "../auth/auth_sam_reply.h"
34 #include "../lib/tsocket/tsocket.h"
35 #include "../lib/util/tevent_ntstatus.h"
36 #include "rpc_contexts.h"
39 #define DBGC_CLASS DBGC_RPC_SRV
41 static struct pipes_struct *InternalPipes;
44 * the following prototypes are declared here to avoid
45 * code being moved about too much for a patch to be
46 * disrupted / less obvious.
48 * these functions, and associated functions that they
49 * call, should be moved behind a .so module-loading
50 * system _anyway_. so that's the next step...
53 /****************************************************************************
54 Internal Pipe iterator functions.
55 ****************************************************************************/
57 struct pipes_struct *get_first_internal_pipe(void)
62 struct pipes_struct *get_next_internal_pipe(struct pipes_struct *p)
67 static void free_pipe_rpc_context_internal( PIPE_RPC_FNS *list )
69 PIPE_RPC_FNS *tmp = list;
81 bool check_open_pipes(void)
83 struct pipes_struct *p;
85 for (p = InternalPipes; p != NULL; p = p->next) {
86 if (num_pipe_handles(p) != 0) {
93 /****************************************************************************
95 ****************************************************************************/
97 int close_internal_rpc_pipe_hnd(struct pipes_struct *p)
100 DEBUG(0,("Invalid pipe in close_internal_rpc_pipe_hnd\n"));
104 TALLOC_FREE(p->auth.auth_ctx);
106 /* Free the handles database. */
107 close_policy_by_pipe(p);
109 free_pipe_rpc_context_internal( p->contexts );
111 DLIST_REMOVE(InternalPipes, p);
118 /****************************************************************************
119 Make an internal namedpipes structure
120 ****************************************************************************/
122 struct pipes_struct *make_internal_rpc_pipe_p(TALLOC_CTX *mem_ctx,
123 const struct ndr_syntax_id *syntax,
124 const struct tsocket_address *remote_address,
125 const struct auth_serversupplied_info *session_info,
126 struct messaging_context *msg_ctx)
128 struct pipes_struct *p;
129 struct pipe_rpc_fns *context_fns;
131 DEBUG(4,("Create pipe requested %s\n",
132 get_pipe_name_from_syntax(talloc_tos(), syntax)));
134 p = talloc_zero(mem_ctx, struct pipes_struct);
137 DEBUG(0,("ERROR! no memory for pipes_struct!\n"));
141 p->mem_ctx = talloc_named(p, 0, "pipe %s %p",
142 get_pipe_name_from_syntax(talloc_tos(),
144 if (p->mem_ctx == NULL) {
145 DEBUG(0,("open_rpc_pipe_p: talloc_init failed.\n"));
150 if (!init_pipe_handles(p, syntax)) {
151 DEBUG(0,("open_rpc_pipe_p: init_pipe_handles failed.\n"));
156 p->session_info = copy_serverinfo(p, session_info);
157 if (p->session_info == NULL) {
158 DEBUG(0, ("open_rpc_pipe_p: copy_serverinfo failed\n"));
159 close_policy_by_pipe(p);
164 p->msg_ctx = msg_ctx;
166 DLIST_ADD(InternalPipes, p);
168 p->remote_address = tsocket_address_copy(remote_address, p);
169 if (p->remote_address == NULL) {
173 p->client_id = talloc_zero(p, struct client_address);
174 if (p->client_id == NULL) {
178 if (tsocket_address_is_inet(p->remote_address, "ip")) {
179 p->client_id->name = tsocket_address_inet_addr_string(p->remote_address,
182 p->client_id->name = talloc_strdup(p->client_id, "");
184 if (p->client_id->name == NULL) {
187 strlcpy(p->client_id->addr,
188 p->client_id->name, sizeof(p->client_id->addr));
190 p->endian = RPC_LITTLE_ENDIAN;
192 p->transport = NCALRPC;
194 context_fns = SMB_MALLOC_P(struct pipe_rpc_fns);
195 if (context_fns == NULL) {
196 DEBUG(0,("malloc() failed!\n"));
200 context_fns->next = context_fns->prev = NULL;
201 context_fns->n_cmds = rpc_srv_get_pipe_num_cmds(syntax);
202 context_fns->cmds = rpc_srv_get_pipe_cmds(syntax);
203 context_fns->context_id = 0;
204 context_fns->syntax = *syntax;
206 /* add to the list of open contexts */
207 DLIST_ADD(p->contexts, context_fns);
209 DEBUG(4,("Created internal pipe %s\n",
210 get_pipe_name_from_syntax(talloc_tos(), syntax)));
212 talloc_set_destructor(p, close_internal_rpc_pipe_hnd);
217 static NTSTATUS rpcint_dispatch(struct pipes_struct *p,
220 const DATA_BLOB *in_data,
223 struct pipe_rpc_fns *fns = find_pipe_fns_by_context(p->contexts, 0);
224 uint32_t num_cmds = fns->n_cmds;
225 const struct api_struct *cmds = fns->cmds;
232 for (i = 0; i < num_cmds; i++) {
233 if (cmds[i].opnum == opnum && cmds[i].fn != NULL) {
239 return NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE;
242 p->in_data.data = *in_data;
243 p->out_data.rdata = data_blob_null;
246 p->in_data.data = data_blob_null;
248 data_blob_free(&p->out_data.rdata);
249 talloc_free_children(p->mem_ctx);
250 return NT_STATUS_RPC_CALL_FAILED;
253 if (p->fault_state) {
254 p->fault_state = false;
255 data_blob_free(&p->out_data.rdata);
256 talloc_free_children(p->mem_ctx);
257 return NT_STATUS_RPC_CALL_FAILED;
260 if (p->bad_handle_fault_state) {
261 p->bad_handle_fault_state = false;
262 data_blob_free(&p->out_data.rdata);
263 talloc_free_children(p->mem_ctx);
264 return NT_STATUS_RPC_SS_CONTEXT_MISMATCH;
267 if (p->rng_fault_state) {
268 p->rng_fault_state = false;
269 data_blob_free(&p->out_data.rdata);
270 talloc_free_children(p->mem_ctx);
271 return NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE;
274 *out_data = p->out_data.rdata;
275 talloc_steal(mem_ctx, out_data->data);
276 p->out_data.rdata = data_blob_null;
278 talloc_free_children(p->mem_ctx);
282 struct rpcint_bh_state {
283 struct pipes_struct *p;
286 static bool rpcint_bh_is_connected(struct dcerpc_binding_handle *h)
288 struct rpcint_bh_state *hs = dcerpc_binding_handle_data(h,
289 struct rpcint_bh_state);
298 static uint32_t rpcint_bh_set_timeout(struct dcerpc_binding_handle *h,
301 /* TODO: implement timeouts */
305 struct rpcint_bh_raw_call_state {
311 static struct tevent_req *rpcint_bh_raw_call_send(TALLOC_CTX *mem_ctx,
312 struct tevent_context *ev,
313 struct dcerpc_binding_handle *h,
314 const struct GUID *object,
317 const uint8_t *in_data,
320 struct rpcint_bh_state *hs =
321 dcerpc_binding_handle_data(h,
322 struct rpcint_bh_state);
323 struct tevent_req *req;
324 struct rpcint_bh_raw_call_state *state;
328 req = tevent_req_create(mem_ctx, &state,
329 struct rpcint_bh_raw_call_state);
333 state->in_data.data = discard_const_p(uint8_t, in_data);
334 state->in_data.length = in_length;
336 ok = rpcint_bh_is_connected(h);
338 tevent_req_nterror(req, NT_STATUS_INVALID_CONNECTION);
339 return tevent_req_post(req, ev);
342 /* TODO: allow async */
343 status = rpcint_dispatch(hs->p, state, opnum,
346 if (!NT_STATUS_IS_OK(status)) {
347 tevent_req_nterror(req, status);
348 return tevent_req_post(req, ev);
351 tevent_req_done(req);
352 return tevent_req_post(req, ev);
355 static NTSTATUS rpcint_bh_raw_call_recv(struct tevent_req *req,
361 struct rpcint_bh_raw_call_state *state =
363 struct rpcint_bh_raw_call_state);
366 if (tevent_req_is_nterror(req, &status)) {
367 tevent_req_received(req);
371 *out_data = talloc_move(mem_ctx, &state->out_data.data);
372 *out_length = state->out_data.length;
374 tevent_req_received(req);
378 struct rpcint_bh_disconnect_state {
382 static struct tevent_req *rpcint_bh_disconnect_send(TALLOC_CTX *mem_ctx,
383 struct tevent_context *ev,
384 struct dcerpc_binding_handle *h)
386 struct rpcint_bh_state *hs = dcerpc_binding_handle_data(h,
387 struct rpcint_bh_state);
388 struct tevent_req *req;
389 struct rpcint_bh_disconnect_state *state;
392 req = tevent_req_create(mem_ctx, &state,
393 struct rpcint_bh_disconnect_state);
398 ok = rpcint_bh_is_connected(h);
400 tevent_req_nterror(req, NT_STATUS_INVALID_CONNECTION);
401 return tevent_req_post(req, ev);
405 * TODO: do a real async disconnect ...
407 * For now the caller needs to free pipes_struct
411 tevent_req_done(req);
412 return tevent_req_post(req, ev);
415 static NTSTATUS rpcint_bh_disconnect_recv(struct tevent_req *req)
419 if (tevent_req_is_nterror(req, &status)) {
420 tevent_req_received(req);
424 tevent_req_received(req);
428 static bool rpcint_bh_ref_alloc(struct dcerpc_binding_handle *h)
433 static void rpcint_bh_do_ndr_print(struct dcerpc_binding_handle *h,
435 const void *_struct_ptr,
436 const struct ndr_interface_call *call)
438 void *struct_ptr = discard_const(_struct_ptr);
440 if (DEBUGLEVEL < 11) {
444 if (ndr_flags & NDR_IN) {
445 ndr_print_function_debug(call->ndr_print,
450 if (ndr_flags & NDR_OUT) {
451 ndr_print_function_debug(call->ndr_print,
458 static const struct dcerpc_binding_handle_ops rpcint_bh_ops = {
460 .is_connected = rpcint_bh_is_connected,
461 .set_timeout = rpcint_bh_set_timeout,
462 .raw_call_send = rpcint_bh_raw_call_send,
463 .raw_call_recv = rpcint_bh_raw_call_recv,
464 .disconnect_send = rpcint_bh_disconnect_send,
465 .disconnect_recv = rpcint_bh_disconnect_recv,
467 .ref_alloc = rpcint_bh_ref_alloc,
468 .do_ndr_print = rpcint_bh_do_ndr_print,
471 static NTSTATUS rpcint_binding_handle_ex(TALLOC_CTX *mem_ctx,
472 const struct ndr_syntax_id *abstract_syntax,
473 const struct ndr_interface_table *ndr_table,
474 const struct tsocket_address *remote_address,
475 const struct auth_serversupplied_info *session_info,
476 struct messaging_context *msg_ctx,
477 struct dcerpc_binding_handle **binding_handle)
479 struct dcerpc_binding_handle *h;
480 struct rpcint_bh_state *hs;
483 abstract_syntax = &ndr_table->syntax_id;
486 h = dcerpc_binding_handle_create(mem_ctx,
491 struct rpcint_bh_state,
494 return NT_STATUS_NO_MEMORY;
496 hs->p = make_internal_rpc_pipe_p(hs,
503 return NT_STATUS_NO_MEMORY;
510 * @brief Create a new DCERPC Binding Handle which uses a local dispatch function.
512 * @param[in] mem_ctx The memory context to use.
514 * @param[in] ndr_table Normally the ndr_table_<name>.
516 * @param[in] remote_address The info about the connected client.
518 * @param[in] serversupplied_info The server supplied authentication function.
520 * @param[in] msg_ctx The messaging context that can be used by the server
522 * @param[out] binding_handle A pointer to store the connected
523 * dcerpc_binding_handle
525 * @return NT_STATUS_OK on success, a corresponding NT status if an
529 * struct dcerpc_binding_handle *winreg_binding;
532 * status = rpcint_binding_handle(tmp_ctx,
540 NTSTATUS rpcint_binding_handle(TALLOC_CTX *mem_ctx,
541 const struct ndr_interface_table *ndr_table,
542 const struct tsocket_address *remote_address,
543 const struct auth_serversupplied_info *session_info,
544 struct messaging_context *msg_ctx,
545 struct dcerpc_binding_handle **binding_handle)
547 return rpcint_binding_handle_ex(mem_ctx, NULL, ndr_table, remote_address,
548 session_info, msg_ctx, binding_handle);
554 * @brief Create a new RPC client context which uses a local transport.
556 * This creates a local transport. It is a shortcut to directly call the server
557 * functions and avoid marshalling.
558 * NOTE: this function should be used only by rpc_pipe_open_interface()
560 * @param[in] mem_ctx The memory context to use.
562 * @param[in] abstract_syntax Normally the syntax_id of the autogenerated
565 * @param[in] serversupplied_info The server supplied authentication function.
567 * @param[in] remote_address The client address information.
569 * @param[in] msg_ctx The messaging context to use.
571 * @param[out] presult A pointer to store the connected rpc client pipe.
573 * @return NT_STATUS_OK on success, a corresponding NT status if an
576 static NTSTATUS rpc_pipe_open_internal(TALLOC_CTX *mem_ctx,
577 const struct ndr_syntax_id *abstract_syntax,
578 const struct auth_serversupplied_info *serversupplied_info,
579 const struct tsocket_address *remote_address,
580 struct messaging_context *msg_ctx,
581 struct rpc_pipe_client **presult)
583 struct rpc_pipe_client *result;
586 result = talloc_zero(mem_ctx, struct rpc_pipe_client);
587 if (result == NULL) {
588 return NT_STATUS_NO_MEMORY;
591 result->abstract_syntax = *abstract_syntax;
592 result->transfer_syntax = ndr_transfer_syntax;
594 if (remote_address == NULL) {
595 struct tsocket_address *local;
598 rc = tsocket_address_inet_from_strings(mem_ctx,
605 return NT_STATUS_NO_MEMORY;
608 remote_address = local;
611 result->max_xmit_frag = -1;
612 result->max_recv_frag = -1;
614 status = rpcint_binding_handle_ex(result,
620 &result->binding_handle);
621 if (!NT_STATUS_IS_OK(status)) {
630 /****************************************************************************
631 * External pipes functions
632 ***************************************************************************/
635 struct np_proxy_state *make_external_rpc_pipe_p(TALLOC_CTX *mem_ctx,
636 const char *pipe_name,
637 const struct tsocket_address *local_address,
638 const struct tsocket_address *remote_address,
639 const struct auth_serversupplied_info *session_info)
641 struct np_proxy_state *result;
643 const char *socket_dir;
644 struct tevent_context *ev;
645 struct tevent_req *subreq;
646 struct auth_session_info_transport *session_info_t;
647 struct auth_session_info *session_info_npa;
648 struct auth_user_info_dc *user_info_dc;
649 union netr_Validation val;
655 result = talloc(mem_ctx, struct np_proxy_state);
656 if (result == NULL) {
657 DEBUG(0, ("talloc failed\n"));
661 result->read_queue = tevent_queue_create(result, "np_read");
662 if (result->read_queue == NULL) {
663 DEBUG(0, ("tevent_queue_create failed\n"));
667 result->write_queue = tevent_queue_create(result, "np_write");
668 if (result->write_queue == NULL) {
669 DEBUG(0, ("tevent_queue_create failed\n"));
673 ev = s3_tevent_context_init(talloc_tos());
675 DEBUG(0, ("s3_tevent_context_init failed\n"));
679 socket_dir = lp_parm_const_string(
680 GLOBAL_SECTION_SNUM, "external_rpc_pipe", "socket_dir",
682 if (socket_dir == NULL) {
683 DEBUG(0, ("externan_rpc_pipe:socket_dir not set\n"));
686 socket_np_dir = talloc_asprintf(talloc_tos(), "%s/np", socket_dir);
687 if (socket_np_dir == NULL) {
688 DEBUG(0, ("talloc_asprintf failed\n"));
692 session_info_npa = talloc_zero(talloc_tos(), struct auth_session_info);
693 if (session_info_npa == NULL) {
694 DEBUG(0, ("talloc failed\n"));
698 /* Send the named_pipe_auth server the user's full token */
699 session_info_npa->security_token = session_info->security_token;
700 session_info_npa->session_key = session_info->session_key;
702 val.sam3 = session_info->info3;
704 /* Convert into something we can build a struct
705 * auth_session_info from. Most of the work here
706 * will be to convert the SIDS, which we will then ignore, but
707 * this is the easier way to handle it */
708 status = make_user_info_dc_netlogon_validation(talloc_tos(), "", 3, &val, &user_info_dc);
709 if (!NT_STATUS_IS_OK(status)) {
710 DEBUG(0, ("conversion of info3 into user_info_dc failed!\n"));
714 session_info_npa->info = talloc_move(session_info_npa, &user_info_dc->info);
715 talloc_free(user_info_dc);
717 session_info_t = talloc_zero(talloc_tos(), struct auth_session_info_transport);
718 if (session_info_npa == NULL) {
719 DEBUG(0, ("talloc failed\n"));
723 session_info_t->session_info = talloc_steal(session_info_t, session_info_npa);
726 subreq = tstream_npa_connect_send(talloc_tos(), ev,
729 remote_address, /* client_addr */
730 NULL, /* client_name */
731 local_address, /* server_addr */
732 NULL, /* server_name */
734 if (subreq == NULL) {
736 DEBUG(0, ("tstream_npa_connect_send to %s for pipe %s and "
737 "user %s\\%s failed\n",
738 socket_np_dir, pipe_name, session_info_t->session_info->info->domain_name,
739 session_info_t->session_info->info->account_name));
742 ok = tevent_req_poll(subreq, ev);
745 DEBUG(0, ("tevent_req_poll to %s for pipe %s and user %s\\%s "
746 "failed for tstream_npa_connect: %s\n",
747 socket_np_dir, pipe_name, session_info_t->session_info->info->domain_name,
748 session_info_t->session_info->info->account_name,
753 ret = tstream_npa_connect_recv(subreq, &sys_errno,
757 &result->device_state,
758 &result->allocation_size);
761 DEBUG(0, ("tstream_npa_connect_recv to %s for pipe %s and "
762 "user %s\\%s failed: %s\n",
763 socket_np_dir, pipe_name, session_info_t->session_info->info->domain_name,
764 session_info_t->session_info->info->account_name,
765 strerror(sys_errno)));
776 static NTSTATUS rpc_pipe_open_external(TALLOC_CTX *mem_ctx,
777 const char *pipe_name,
778 const struct ndr_syntax_id *abstract_syntax,
779 const struct auth_serversupplied_info *session_info,
780 struct rpc_pipe_client **_result)
782 struct tsocket_address *local, *remote;
783 struct rpc_pipe_client *result = NULL;
784 struct np_proxy_state *proxy_state = NULL;
785 struct pipe_auth_data *auth;
789 /* this is an internal connection, fake up ip addresses */
790 ret = tsocket_address_inet_from_strings(talloc_tos(), "ip",
793 return NT_STATUS_NO_MEMORY;
795 ret = tsocket_address_inet_from_strings(talloc_tos(), "ip",
798 return NT_STATUS_NO_MEMORY;
801 proxy_state = make_external_rpc_pipe_p(mem_ctx, pipe_name,
802 local, remote, session_info);
804 return NT_STATUS_UNSUCCESSFUL;
807 result = talloc_zero(mem_ctx, struct rpc_pipe_client);
808 if (result == NULL) {
809 status = NT_STATUS_NO_MEMORY;
813 result->abstract_syntax = *abstract_syntax;
814 result->transfer_syntax = ndr_transfer_syntax;
816 result->desthost = get_myname(result);
817 result->srv_name_slash = talloc_asprintf_strupper_m(
818 result, "\\\\%s", result->desthost);
819 if ((result->desthost == NULL) || (result->srv_name_slash == NULL)) {
820 status = NT_STATUS_NO_MEMORY;
824 result->max_xmit_frag = RPC_MAX_PDU_FRAG_LEN;
825 result->max_recv_frag = RPC_MAX_PDU_FRAG_LEN;
827 status = rpc_transport_tstream_init(result,
830 if (!NT_STATUS_IS_OK(status)) {
834 result->binding_handle = rpccli_bh_create(result);
835 if (result->binding_handle == NULL) {
836 status = NT_STATUS_NO_MEMORY;
837 DEBUG(0, ("Failed to create binding handle.\n"));
841 result->auth = talloc_zero(result, struct pipe_auth_data);
843 status = NT_STATUS_NO_MEMORY;
846 result->auth->auth_type = DCERPC_AUTH_TYPE_NONE;
847 result->auth->auth_level = DCERPC_AUTH_LEVEL_NONE;
849 status = rpccli_anon_bind_data(result, &auth);
850 if (!NT_STATUS_IS_OK(status)) {
851 DEBUG(0, ("Failed to initialize anonymous bind.\n"));
855 status = rpc_pipe_bind(result, auth);
856 if (!NT_STATUS_IS_OK(status)) {
857 DEBUG(0, ("Failed to bind external pipe.\n"));
862 if (!NT_STATUS_IS_OK(status)) {
865 TALLOC_FREE(proxy_state);
871 * @brief Create a new RPC client context which uses a local dispatch function
872 * or a remote transport, depending on rpc_server configuration for the
875 * @param[in] mem_ctx The memory context to use.
877 * @param[in] abstract_syntax Normally the syntax_id of the autogenerated
880 * @param[in] serversupplied_info The server supplied authentication function.
882 * @param[in] remote_address The client address information.
884 * @param[in] msg_ctx The messaging context to use.
886 * @param[out] presult A pointer to store the connected rpc client pipe.
888 * @return NT_STATUS_OK on success, a corresponding NT status if an
892 * struct rpc_pipe_client *winreg_pipe;
895 * status = rpc_pipe_open_interface(tmp_ctx,
896 * &ndr_table_winreg.syntax_id,
903 NTSTATUS rpc_pipe_open_interface(TALLOC_CTX *mem_ctx,
904 const struct ndr_syntax_id *syntax,
905 const struct auth_serversupplied_info *session_info,
906 const struct tsocket_address *remote_address,
907 struct messaging_context *msg_ctx,
908 struct rpc_pipe_client **cli_pipe)
910 struct rpc_pipe_client *cli = NULL;
911 const char *server_type;
912 const char *pipe_name;
916 if (cli_pipe && rpccli_is_connected(*cli_pipe)) {
919 TALLOC_FREE(*cli_pipe);
922 tmp_ctx = talloc_stackframe();
923 if (tmp_ctx == NULL) {
924 return NT_STATUS_NO_MEMORY;
927 pipe_name = get_pipe_name_from_syntax(tmp_ctx, syntax);
928 if (pipe_name == NULL) {
929 status = NT_STATUS_INVALID_PARAMETER;
933 while (pipe_name[0] == '\\') {
937 DEBUG(5, ("Connecting to %s pipe.\n", pipe_name));
939 server_type = lp_parm_const_string(GLOBAL_SECTION_SNUM,
940 "rpc_server", pipe_name,
943 if (strcasecmp_m(server_type, "embedded") == 0) {
944 status = rpc_pipe_open_internal(tmp_ctx,
945 syntax, session_info,
946 remote_address, msg_ctx,
948 if (!NT_STATUS_IS_OK(status)) {
951 } else if (strcasecmp_m(server_type, "daemon") == 0 ||
952 strcasecmp_m(server_type, "external") == 0) {
953 /* It would be nice to just use rpc_pipe_open_ncalrpc() but
954 * for now we need to use the special proxy setup to connect
957 status = rpc_pipe_open_external(tmp_ctx,
961 if (!NT_STATUS_IS_OK(status)) {
965 status = NT_STATUS_NOT_IMPLEMENTED;
966 DEBUG(0, ("Wrong servertype specified in config file: %s",
971 status = NT_STATUS_OK;
973 if (NT_STATUS_IS_OK(status)) {
974 *cli_pipe = talloc_move(mem_ctx, &cli);
976 TALLOC_FREE(tmp_ctx);