smbd: rename sconn->raw_thread_pool to sconn->pool
[samba.git] / source3 / rpcclient / cmd_drsuapi.c
1 /*
2    Unix SMB/CIFS implementation.
3    RPC pipe client
4
5    Copyright (C) Guenther Deschner 2008
6
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22 #include "rpcclient.h"
23 #include "../librpc/gen_ndr/ndr_drsuapi_c.h"
24
25 static WERROR cracknames(struct rpc_pipe_client *cli,
26                          TALLOC_CTX *mem_ctx,
27                          struct policy_handle *bind_handle,
28                          enum drsuapi_DsNameFormat format_offered,
29                          enum drsuapi_DsNameFormat format_desired,
30                          int argc,
31                          const char **argv,
32                          union drsuapi_DsNameCtr *ctr)
33 {
34         NTSTATUS status;
35         WERROR werr;
36         int i;
37         uint32_t level = 1;
38         union drsuapi_DsNameRequest req;
39         uint32_t level_out;
40         struct drsuapi_DsNameString *names;
41         struct dcerpc_binding_handle *b = cli->binding_handle;
42
43         names = talloc_zero_array(mem_ctx, struct drsuapi_DsNameString, argc);
44         W_ERROR_HAVE_NO_MEMORY(names);
45
46         for (i=0; i<argc; i++) {
47                 names[i].str = argv[i];
48         }
49
50         req.req1.codepage       = 1252; /* german */
51         req.req1.language       = 0x00000407; /* german */
52         req.req1.count          = argc;
53         req.req1.names          = names;
54         req.req1.format_flags   = DRSUAPI_DS_NAME_FLAG_NO_FLAGS;
55         req.req1.format_offered = format_offered;
56         req.req1.format_desired = format_desired;
57
58         status = dcerpc_drsuapi_DsCrackNames(b, mem_ctx,
59                                              bind_handle,
60                                              level,
61                                              &req,
62                                              &level_out,
63                                              ctr,
64                                              &werr);
65         if (!NT_STATUS_IS_OK(status)) {
66                 return ntstatus_to_werror(status);
67         }
68
69         if (!W_ERROR_IS_OK(werr)) {
70                 return werr;
71         }
72
73         return WERR_OK;
74 }
75
76 static WERROR cmd_drsuapi_cracknames(struct rpc_pipe_client *cli,
77                                      TALLOC_CTX *mem_ctx, int argc,
78                                      const char **argv)
79 {
80         NTSTATUS status;
81         WERROR werr;
82         int i;
83
84         struct GUID bind_guid;
85         struct policy_handle bind_handle;
86         struct dcerpc_binding_handle *b = cli->binding_handle;
87
88         union drsuapi_DsNameCtr ctr;
89
90         if (argc < 2) {
91                 printf("usage: %s name\n", argv[0]);
92                 return WERR_OK;
93         }
94
95         GUID_from_string(DRSUAPI_DS_BIND_GUID, &bind_guid);
96
97         status = dcerpc_drsuapi_DsBind(b, mem_ctx,
98                                        &bind_guid,
99                                        NULL,
100                                        &bind_handle,
101                                        &werr);
102
103         if (!NT_STATUS_IS_OK(status)) {
104                 return ntstatus_to_werror(status);
105         }
106
107         if (!W_ERROR_IS_OK(werr)) {
108                 return werr;
109         }
110
111         werr = cracknames(cli, mem_ctx,
112                           &bind_handle,
113                           DRSUAPI_DS_NAME_FORMAT_UNKNOWN,
114                           DRSUAPI_DS_NAME_FORMAT_FQDN_1779,
115                           1,
116                           argv+1,
117                           &ctr);
118
119         if (!W_ERROR_IS_OK(werr)) {
120                 goto out;
121         }
122
123         for (i=0; i < ctr.ctr1->count; i++) {
124                 printf("status: %d\n",
125                         ctr.ctr1->array[i].status);
126                 printf("dns_domain_name: %s\n",
127                         ctr.ctr1->array[i].dns_domain_name);
128                 printf("result_name: %s\n",
129                         ctr.ctr1->array[i].result_name);
130         }
131
132  out:
133         if (is_valid_policy_hnd(&bind_handle)) {
134                 WERROR _werr;
135                 dcerpc_drsuapi_DsUnbind(b, mem_ctx, &bind_handle, &_werr);
136         }
137
138         return werr;
139 }
140
141 static void display_domain_controller_info_01(struct drsuapi_DsGetDCConnection01 *r)
142 {
143         printf("client_ip_address:\t%s\n", r->client_ip_address);
144         printf("unknown2:\t%d\n", r->unknown2);
145         printf("connection_time:\t%d\n", r->connection_time);
146         printf("unknown4:\t%d\n", r->unknown4);
147         printf("unknown5:\t%d\n", r->unknown5);
148         printf("unknown6:\t%d\n", r->unknown6);
149         printf("client_account:\t%s\n", r->client_account);
150 }
151
152 static void display_domain_controller_info_1(struct drsuapi_DsGetDCInfo1 *r)
153 {
154         printf("netbios_name:\t%s\n", r->netbios_name);
155         printf("dns_name:\t%s\n", r->dns_name);
156         printf("site_name:\t%s\n", r->site_name);
157         printf("computer_dn:\t%s\n", r->computer_dn);
158         printf("server_dn:\t%s\n", r->server_dn);
159         printf("is_pdc:\t\t%s\n", r->is_pdc ? "true" : "false");
160         printf("is_enabled:\t%s\n", r->is_enabled ? "true" : "false");
161 }
162
163 static void display_domain_controller_info_2(struct drsuapi_DsGetDCInfo2 *r)
164 {
165         printf("netbios_name:\t%s\n", r->netbios_name);
166         printf("dns_name:\t%s\n", r->dns_name);
167         printf("site_name:\t%s\n", r->site_name);
168         printf("site_dn:\t%s\n", r->site_dn);
169         printf("computer_dn:\t%s\n", r->computer_dn);
170         printf("server_dn:\t%s\n", r->server_dn);
171         printf("ntds_dn:\t%s\n", r->ntds_dn);
172         printf("is_pdc:\t\t%s\n", r->is_pdc ? "true" : "false");
173         printf("is_enabled:\t%s\n", r->is_enabled ? "true" : "false");
174         printf("is_gc:\t\t%s\n", r->is_gc ? "true" : "false");
175         printf("site_guid:\t%s\n", GUID_string(talloc_tos(), &r->site_guid));
176         printf("computer_guid:\t%s\n", GUID_string(talloc_tos(), &r->computer_guid));
177         printf("server_guid:\t%s\n", GUID_string(talloc_tos(), &r->server_guid));
178         printf("ntds_guid:\t%s\n", GUID_string(talloc_tos(), &r->ntds_guid));
179 }
180
181 static void display_domain_controller_info_3(struct drsuapi_DsGetDCInfo3 *r)
182 {
183         printf("netbios_name:\t%s\n", r->netbios_name);
184         printf("dns_name:\t%s\n", r->dns_name);
185         printf("site_name:\t%s\n", r->site_name);
186         printf("site_dn:\t%s\n", r->site_dn);
187         printf("computer_dn:\t%s\n", r->computer_dn);
188         printf("server_dn:\t%s\n", r->server_dn);
189         printf("ntds_dn:\t%s\n", r->ntds_dn);
190         printf("is_pdc:\t\t%s\n", r->is_pdc ? "true" : "false");
191         printf("is_enabled:\t%s\n", r->is_enabled ? "true" : "false");
192         printf("is_gc:\t\t%s\n", r->is_gc ? "true" : "false");
193         printf("is_rodc:\t%s\n", r->is_rodc ? "true" : "false");
194         printf("site_guid:\t%s\n", GUID_string(talloc_tos(), &r->site_guid));
195         printf("computer_guid:\t%s\n", GUID_string(talloc_tos(), &r->computer_guid));
196         printf("server_guid:\t%s\n", GUID_string(talloc_tos(), &r->server_guid));
197         printf("ntds_guid:\t%s\n", GUID_string(talloc_tos(), &r->ntds_guid));
198 }
199
200 static void display_domain_controller_info(int32_t level,
201                                            union drsuapi_DsGetDCInfoCtr *ctr)
202 {
203         int i;
204
205         switch (level) {
206                 case DRSUAPI_DC_CONNECTION_CTR_01:
207                         for (i=0; i<ctr->ctr01.count; i++) {
208                                 printf("----------\n");
209                                 display_domain_controller_info_01(&ctr->ctr01.array[i]);
210                         }
211                         break;
212                 case DRSUAPI_DC_INFO_CTR_1:
213                         for (i=0; i<ctr->ctr1.count; i++) {
214                                 printf("----------\n");
215                                 display_domain_controller_info_1(&ctr->ctr1.array[i]);
216                         }
217                         break;
218                 case DRSUAPI_DC_INFO_CTR_2:
219                         for (i=0; i<ctr->ctr2.count; i++) {
220                                 printf("----------\n");
221                                 display_domain_controller_info_2(&ctr->ctr2.array[i]);
222                         }
223                         break;
224                 case DRSUAPI_DC_INFO_CTR_3:
225                         for (i=0; i<ctr->ctr3.count; i++) {
226                                 printf("----------\n");
227                                 display_domain_controller_info_3(&ctr->ctr3.array[i]);
228                         }
229                         break;
230                 default:
231                         break;
232         }
233 }
234
235 static WERROR cmd_drsuapi_getdcinfo(struct rpc_pipe_client *cli,
236                                     TALLOC_CTX *mem_ctx, int argc,
237                                     const char **argv)
238 {
239         NTSTATUS status;
240         WERROR werr;
241
242         struct GUID bind_guid;
243         struct policy_handle bind_handle;
244         struct dcerpc_binding_handle *b = cli->binding_handle;
245
246         const char *domain = NULL;
247         int32_t level = 1;
248         int32_t level_out;
249         union drsuapi_DsGetDCInfoRequest req;
250         union drsuapi_DsGetDCInfoCtr ctr;
251
252         if (argc < 2) {
253                 printf("usage: %s domain [level]\n", argv[0]);
254                 return WERR_OK;
255         }
256
257         domain = argv[1];
258         if (argc >= 3) {
259                 level = atoi(argv[2]);
260         }
261
262         GUID_from_string(DRSUAPI_DS_BIND_GUID, &bind_guid);
263
264         status = dcerpc_drsuapi_DsBind(b, mem_ctx,
265                                        &bind_guid,
266                                        NULL,
267                                        &bind_handle,
268                                        &werr);
269
270         if (!NT_STATUS_IS_OK(status)) {
271                 return ntstatus_to_werror(status);
272         }
273
274         if (!W_ERROR_IS_OK(werr)) {
275                 return werr;
276         }
277
278         req.req1.domain_name = domain;
279         req.req1.level = level;
280
281         status = dcerpc_drsuapi_DsGetDomainControllerInfo(b, mem_ctx,
282                                                           &bind_handle,
283                                                           1,
284                                                           &req,
285                                                           &level_out,
286                                                           &ctr,
287                                                           &werr);
288         if (!NT_STATUS_IS_OK(status)) {
289                 werr = ntstatus_to_werror(status);
290                 goto out;
291         }
292
293         if (!W_ERROR_IS_OK(werr)) {
294                 goto out;
295         }
296
297         display_domain_controller_info(level_out, &ctr);
298  out:
299         if (is_valid_policy_hnd(&bind_handle)) {
300                 WERROR _werr;
301                 dcerpc_drsuapi_DsUnbind(b, mem_ctx, &bind_handle, &_werr);
302         }
303
304         return werr;
305 }
306
307 static WERROR cmd_drsuapi_writeaccountspn(struct rpc_pipe_client *cli,
308                                           TALLOC_CTX *mem_ctx, int argc,
309                                           const char **argv)
310 {
311         NTSTATUS status;
312         WERROR werr;
313
314         struct GUID bind_guid;
315         struct policy_handle bind_handle;
316         struct dcerpc_binding_handle *b = cli->binding_handle;
317         struct drsuapi_DsNameString *spn_names = NULL;
318
319         int i = 0;
320         uint32_t level_out;
321         union drsuapi_DsWriteAccountSpnRequest req;
322         union drsuapi_DsWriteAccountSpnResult result;
323
324         if (argc < 4) {
325                 printf("usage: %s [add|replace|delete] dn [spn_names]+\n", argv[0]);
326                 return WERR_OK;
327         }
328
329         req.req1.unknown1 = 0;  /* Unused, must be 0 */
330         req.req1.object_dn = argv[2];
331         req.req1.count = argc - 3;
332
333         if (strcmp(argv[1], "add") == 0) {
334                 req.req1.operation = DRSUAPI_DS_SPN_OPERATION_ADD;
335         } else if (strcmp(argv[1], "replace") == 0) {
336                 req.req1.operation = DRSUAPI_DS_SPN_OPERATION_REPLACE;
337         } else if (strcmp(argv[1], "delete") == 0) {
338                 req.req1.operation = DRSUAPI_DS_SPN_OPERATION_DELETE;
339         } else {
340                 printf("usage: %s [add|replace|delete] dn [spn_names]+\n", argv[0]);
341                 return WERR_OK;
342         }
343
344         spn_names = talloc_zero_array(mem_ctx,
345                                       struct drsuapi_DsNameString,
346                                       req.req1.count);
347         W_ERROR_HAVE_NO_MEMORY(spn_names);
348
349         for (i=0; i<req.req1.count; i++) {
350                 spn_names[i].str = argv[i + 3];
351         }
352
353         req.req1.spn_names = spn_names;
354
355         GUID_from_string(DRSUAPI_DS_BIND_GUID, &bind_guid);
356
357         status = dcerpc_drsuapi_DsBind(b, mem_ctx,
358                                        &bind_guid,
359                                        NULL,
360                                        &bind_handle,
361                                        &werr);
362
363         if (!NT_STATUS_IS_OK(status)) {
364                 return ntstatus_to_werror(status);
365         }
366
367         if (!W_ERROR_IS_OK(werr)) {
368                 return werr;
369         }
370
371         status = dcerpc_drsuapi_DsWriteAccountSpn(b, mem_ctx,
372                                                   &bind_handle,
373                                                   1,
374                                                   &req,
375                                                   &level_out,
376                                                   &result,
377                                                   &werr);
378
379         if (!NT_STATUS_IS_OK(status)) {
380                 werr = ntstatus_to_werror(status);
381                 goto out;
382         }
383
384         if (!W_ERROR_IS_OK(werr)) {
385                 goto out;
386         }
387
388  out:
389         if (is_valid_policy_hnd(&bind_handle)) {
390                 WERROR _werr;
391                 dcerpc_drsuapi_DsUnbind(b, mem_ctx, &bind_handle, &_werr);
392         }
393
394         return werr;
395 }
396
397 static WERROR cmd_drsuapi_getncchanges(struct rpc_pipe_client *cli,
398                                        TALLOC_CTX *mem_ctx, int argc,
399                                        const char **argv)
400 {
401         NTSTATUS status;
402         WERROR werr;
403
404         struct policy_handle bind_handle;
405         struct dcerpc_binding_handle *b = cli->binding_handle;
406
407         struct GUID bind_guid;
408         struct drsuapi_DsBindInfoCtr bind_info;
409         struct drsuapi_DsBindInfo28 info28;
410
411         const char *nc_dn = NULL;
412
413         DATA_BLOB session_key;
414
415         uint32_t level = 8;
416         bool single = false;
417         uint32_t level_out = 0;
418         union drsuapi_DsGetNCChangesRequest req;
419         union drsuapi_DsGetNCChangesCtr ctr;
420         struct drsuapi_DsReplicaObjectIdentifier nc;
421
422         struct drsuapi_DsGetNCChangesCtr1 *ctr1 = NULL;
423         struct drsuapi_DsGetNCChangesCtr6 *ctr6 = NULL;
424         uint32_t out_level = 0;
425         int y;
426
427         uint32_t supported_extensions = 0;
428         uint32_t replica_flags  = DRSUAPI_DRS_WRIT_REP |
429                                   DRSUAPI_DRS_INIT_SYNC |
430                                   DRSUAPI_DRS_PER_SYNC |
431                                   DRSUAPI_DRS_GET_ANC |
432                                   DRSUAPI_DRS_NEVER_SYNCED;
433
434         if (argc > 3) {
435                 printf("usage: %s [naming_context_or_object_dn [single]]\n", argv[0]);
436                 return WERR_OK;
437         }
438
439         if (argc >= 2) {
440                 nc_dn = argv[1];
441         }
442
443         if (argc == 3) {
444                 if (strequal(argv[2], "single")) {
445                         single = true;
446                 } else {
447                         printf("warning: ignoring unknown argument '%s'\n",
448                                argv[2]);
449                 }
450         }
451
452         ZERO_STRUCT(info28);
453
454         ZERO_STRUCT(req);
455
456         GUID_from_string(DRSUAPI_DS_BIND_GUID, &bind_guid);
457
458         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_BASE;
459         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_ASYNC_REPLICATION;
460         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_REMOVEAPI;
461         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_MOVEREQ_V2;
462         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GETCHG_COMPRESS;
463         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V1;
464         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_RESTORE_USN_OPTIMIZATION;
465         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_KCC_EXECUTE;
466         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_ADDENTRY_V2;
467         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_LINKED_VALUE_REPLICATION;
468         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V2;
469         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_INSTANCE_TYPE_NOT_REQ_ON_MOD;
470         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_CRYPTO_BIND;
471         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GET_REPL_INFO;
472         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_STRONG_ENCRYPTION;
473         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V01;
474         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_TRANSITIVE_MEMBERSHIP;
475         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_ADD_SID_HISTORY;
476         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_POST_BETA3;
477         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GET_MEMBERSHIPS2;
478         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V6;
479         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_NONDOMAIN_NCS;
480         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V8;
481         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V5;
482         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V6;
483         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_ADDENTRYREPLY_V3;
484         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V7;
485         info28.supported_extensions     |= DRSUAPI_SUPPORTED_EXTENSION_VERIFY_OBJECT;
486         info28.site_guid                = GUID_zero();
487         info28.pid                      = 0;
488         info28.repl_epoch               = 0;
489
490         bind_info.length = 28;
491         bind_info.info.info28 = info28;
492
493         status = dcerpc_drsuapi_DsBind(b, mem_ctx,
494                                        &bind_guid,
495                                        &bind_info,
496                                        &bind_handle,
497                                        &werr);
498
499         if (!NT_STATUS_IS_OK(status)) {
500                 return ntstatus_to_werror(status);
501         }
502
503         if (!W_ERROR_IS_OK(werr)) {
504                 return werr;
505         }
506
507         if (bind_info.length == 24) {
508                 supported_extensions = bind_info.info.info24.supported_extensions;
509         } else if (bind_info.length == 28) {
510                 supported_extensions = bind_info.info.info28.supported_extensions;
511         } else if (bind_info.length == 32) {
512                 supported_extensions = bind_info.info.info32.supported_extensions;
513         } else if (bind_info.length == 48) {
514                 supported_extensions = bind_info.info.info48.supported_extensions;
515         } else if (bind_info.length == 52) {
516                 supported_extensions = bind_info.info.info52.supported_extensions;
517         }
518
519         if (!nc_dn) {
520
521                 union drsuapi_DsNameCtr crack_ctr;
522                 const char *name;
523
524                 name = talloc_asprintf(mem_ctx, "%s\\", lp_workgroup());
525                 W_ERROR_HAVE_NO_MEMORY(name);
526
527                 werr = cracknames(cli, mem_ctx,
528                                   &bind_handle,
529                                   DRSUAPI_DS_NAME_FORMAT_UNKNOWN,
530                                   DRSUAPI_DS_NAME_FORMAT_FQDN_1779,
531                                   1,
532                                   &name,
533                                   &crack_ctr);
534                 if (!W_ERROR_IS_OK(werr)) {
535                         return werr;
536                 }
537
538                 if (crack_ctr.ctr1->count != 1) {
539                         return WERR_NO_SUCH_DOMAIN;
540                 }
541
542                 if (crack_ctr.ctr1->array[0].status != DRSUAPI_DS_NAME_STATUS_OK) {
543                         return WERR_NO_SUCH_DOMAIN;
544                 }
545
546                 nc_dn = talloc_strdup(mem_ctx, crack_ctr.ctr1->array[0].result_name);
547                 W_ERROR_HAVE_NO_MEMORY(nc_dn);
548
549                 printf("using: %s\n", nc_dn);
550         }
551
552         nc.dn = nc_dn;
553         nc.guid = GUID_zero();
554         nc.sid = (struct dom_sid) {0};
555
556         if (supported_extensions & DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V8) {
557                 level = 8;
558                 req.req8.naming_context         = &nc;
559                 req.req8.replica_flags          = replica_flags;
560                 req.req8.max_object_count       = 402;
561                 req.req8.max_ndr_size           = 402116;
562                 if (single) {
563                         req.req8.extended_op    = DRSUAPI_EXOP_REPL_OBJ;
564                 }
565         } else {
566                 level = 5;
567                 req.req5.naming_context         = &nc;
568                 req.req5.replica_flags          = replica_flags;
569                 req.req5.max_object_count       = 402;
570                 req.req5.max_ndr_size           = 402116;
571                 if (single) {
572                         req.req5.extended_op    = DRSUAPI_EXOP_REPL_OBJ;
573                 }
574         }
575
576         for (y=0; ;y++) {
577
578                 if (level == 8) {
579                         DEBUG(1,("start[%d] tmp_higest_usn: %llu , highest_usn: %llu\n",y,
580                                 (long long)req.req8.highwatermark.tmp_highest_usn,
581                                 (long long)req.req8.highwatermark.highest_usn));
582                 }
583
584                 status = dcerpc_drsuapi_DsGetNCChanges(b, mem_ctx,
585                                                        &bind_handle,
586                                                        level,
587                                                        &req,
588                                                        &level_out,
589                                                        &ctr,
590                                                        &werr);
591                 if (!NT_STATUS_IS_OK(status)) {
592                         werr = ntstatus_to_werror(status);
593                         printf("Failed to get NC Changes: %s",
594                                 get_friendly_nt_error_msg(status));
595                         goto out;
596                 }
597
598                 if (!W_ERROR_IS_OK(werr)) {
599                         printf("Failed to get NC Changes: %s",
600                                 get_friendly_werror_msg(werr));
601                         goto out;
602                 }
603
604                 if (level_out == 1) {
605                         out_level = 1;
606                         ctr1 = &ctr.ctr1;
607                 } else if (level_out == 2 && ctr.ctr2.mszip1.ts) {
608                         out_level = 1;
609                         ctr1 = &ctr.ctr2.mszip1.ts->ctr1;
610                 }
611
612                 status = cli_get_session_key(mem_ctx, cli, &session_key);
613                 if (!NT_STATUS_IS_OK(status)) {
614                         printf("Failed to get Session Key: %s",
615                                 nt_errstr(status));
616                         return ntstatus_to_werror(status);
617                 }
618
619                 if (out_level == 1) {
620                         DEBUG(1,("end[%d] tmp_highest_usn: %llu , highest_usn: %llu\n",y,
621                                 (long long)ctr1->new_highwatermark.tmp_highest_usn,
622                                 (long long)ctr1->new_highwatermark.highest_usn));
623 #if 0
624                         libnet_dssync_decrypt_attributes(mem_ctx,
625                                                          &session_key,
626                                                          ctr1->first_object);
627 #endif
628                         if (ctr1->more_data) {
629                                 req.req5.highwatermark = ctr1->new_highwatermark;
630                                 continue;
631                         }
632                 }
633
634                 if (level_out == 6) {
635                         out_level = 6;
636                         ctr6 = &ctr.ctr6;
637                 } else if (level_out == 7
638                            && ctr.ctr7.level == 6
639                            && ctr.ctr7.type == DRSUAPI_COMPRESSION_TYPE_MSZIP
640                            && ctr.ctr7.ctr.mszip6.ts) {
641                         out_level = 6;
642                         ctr6 = &ctr.ctr7.ctr.mszip6.ts->ctr6;
643                 } else if (level_out == 7
644                            && ctr.ctr7.level == 6
645                            && ctr.ctr7.type == DRSUAPI_COMPRESSION_TYPE_XPRESS
646                            && ctr.ctr7.ctr.xpress6.ts) {
647                         out_level = 6;
648                         ctr6 = &ctr.ctr7.ctr.xpress6.ts->ctr6;
649                 }
650
651                 if (out_level == 6) {
652                         DEBUG(1,("end[%d] tmp_highest_usn: %llu , highest_usn: %llu\n",y,
653                                 (long long)ctr6->new_highwatermark.tmp_highest_usn,
654                                 (long long)ctr6->new_highwatermark.highest_usn));
655 #if 0
656                         libnet_dssync_decrypt_attributes(mem_ctx,
657                                                          &session_key,
658                                                          ctr6->first_object);
659 #endif
660                         if (ctr6->more_data) {
661                                 req.req8.highwatermark = ctr6->new_highwatermark;
662                                 continue;
663                         }
664                 }
665
666                 break;
667         }
668
669  out:
670         return werr;
671 }
672
673 /* List of commands exported by this module */
674
675 struct cmd_set drsuapi_commands[] = {
676
677         { "DRSUAPI" },
678         { "dscracknames", RPC_RTYPE_WERROR, NULL, cmd_drsuapi_cracknames, &ndr_table_drsuapi, NULL, "Crack Name", "" },
679         { "dsgetdcinfo", RPC_RTYPE_WERROR, NULL, cmd_drsuapi_getdcinfo, &ndr_table_drsuapi, NULL, "Get Domain Controller Info", "" },
680         { "dsgetncchanges", RPC_RTYPE_WERROR, NULL, cmd_drsuapi_getncchanges, &ndr_table_drsuapi, NULL, "Get NC Changes", "" },
681         { "dswriteaccountspn", RPC_RTYPE_WERROR, NULL, cmd_drsuapi_writeaccountspn, &ndr_table_drsuapi, NULL, "Write Account SPN", "" },
682         { NULL }
683 };