s3-talloc Change TALLOC_ARRAY() to talloc_array()
[samba.git] / source3 / utils / net_rpc_rights.c
index 2f02b40948366b6a106a1a2e99488e7be73efaaf..737bfb0e8684ba9d434f1cb6ee06e681fecdbdf3 100644 (file)
@@ -1,55 +1,61 @@
-/* 
-   Samba Unix/Linux SMB client library 
-   Distributed SMB/CIFS Server Management Utility 
+/*
+   Samba Unix/Linux SMB client library
+   Distributed SMB/CIFS Server Management Utility
    Copyright (C) Gerald (Jerry) Carter          2004
+   Copyright (C) Guenther Deschner              2008
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
-   
+
    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.
-   
+
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.  */
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
+*/
 #include "includes.h"
 #include "utils/net.h"
+#include "rpc_client/rpc_client.h"
+#include "../librpc/gen_ndr/ndr_lsa_c.h"
+#include "rpc_client/cli_lsarpc.h"
+#include "rpc_client/init_lsa.h"
+#include "../libcli/security/security.h"
 
 /********************************************************************
 ********************************************************************/
 
 static NTSTATUS sid_to_name(struct rpc_pipe_client *pipe_hnd,
                                TALLOC_CTX *mem_ctx,
-                               DOM_SID *sid,
+                               struct dom_sid *sid,
                                fstring name)
 {
-       POLICY_HND pol;
-       uint32 *sid_types;
-       NTSTATUS result;
-       char **domains, **names;
-
-       result = rpccli_lsa_open_policy(pipe_hnd, mem_ctx, True, 
-               SEC_RIGHTS_MAXIMUM_ALLOWED, &pol);
-               
-       if ( !NT_STATUS_IS_OK(result) )
-               return result;
+       struct policy_handle pol;
+       enum lsa_SidType *sid_types = NULL;
+       NTSTATUS status, result;
+       char **domains = NULL, **names = NULL;
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
+
+       status = rpccli_lsa_open_policy(pipe_hnd, mem_ctx, true,
+               SEC_FLAG_MAXIMUM_ALLOWED, &pol);
 
-       result = rpccli_lsa_lookup_sids(pipe_hnd, mem_ctx, &pol, 1, sid, &domains, &names, &sid_types);
-       
-       if ( NT_STATUS_IS_OK(result) ) {
+       if ( !NT_STATUS_IS_OK(status) )
+               return status;
+
+       status = rpccli_lsa_lookup_sids(pipe_hnd, mem_ctx, &pol, 1, sid, &domains, &names, &sid_types);
+
+       if ( NT_STATUS_IS_OK(status) ) {
                if ( *domains[0] )
                        fstr_sprintf( name, "%s\\%s", domains[0], names[0] );
                else
                        fstrcpy( name, names[0] );
        }
 
-       rpccli_lsa_close(pipe_hnd, mem_ctx, &pol);
-       return result;
+       dcerpc_lsa_Close(b, mem_ctx, &pol, &result);
+       return status;
 }
 
 /********************************************************************
@@ -57,32 +63,33 @@ static NTSTATUS sid_to_name(struct rpc_pipe_client *pipe_hnd,
 
 static NTSTATUS name_to_sid(struct rpc_pipe_client *pipe_hnd,
                            TALLOC_CTX *mem_ctx,
-                           DOM_SID *sid, const char *name)
+                           struct dom_sid *sid, const char *name)
 {
-       POLICY_HND pol;
-       uint32 *sid_types;
-       NTSTATUS result;
-       DOM_SID *sids;
+       struct policy_handle pol;
+       enum lsa_SidType *sid_types;
+       NTSTATUS status, result;
+       struct dom_sid *sids;
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
 
        /* maybe its a raw SID */
        if ( strncmp(name, "S-", 2) == 0 && string_to_sid(sid, name) ) {
                return NT_STATUS_OK;
        }
 
-       result = rpccli_lsa_open_policy(pipe_hnd, mem_ctx, True, 
-               SEC_RIGHTS_MAXIMUM_ALLOWED, &pol);
-               
-       if ( !NT_STATUS_IS_OK(result) )
-               return result;
+       status = rpccli_lsa_open_policy(pipe_hnd, mem_ctx, true,
+               SEC_FLAG_MAXIMUM_ALLOWED, &pol);
 
-       result = rpccli_lsa_lookup_names(pipe_hnd, mem_ctx, &pol, 1, &name,
-                                        NULL, &sids, &sid_types);
-       
-       if ( NT_STATUS_IS_OK(result) )
+       if ( !NT_STATUS_IS_OK(status) )
+               return status;
+
+       status = rpccli_lsa_lookup_names(pipe_hnd, mem_ctx, &pol, 1, &name,
+                                        NULL, 1, &sids, &sid_types);
+
+       if ( NT_STATUS_IS_OK(status) )
                sid_copy( sid, &sids[0] );
 
-       rpccli_lsa_close(pipe_hnd, mem_ctx, &pol);
-       return result;
+       dcerpc_lsa_Close(b, mem_ctx, &pol, &result);
+       return status;
 }
 
 /********************************************************************
@@ -90,42 +97,63 @@ static NTSTATUS name_to_sid(struct rpc_pipe_client *pipe_hnd,
 
 static NTSTATUS enum_privileges(struct rpc_pipe_client *pipe_hnd,
                                TALLOC_CTX *ctx,
-                               POLICY_HND *pol )
+                               struct policy_handle *pol )
 {
-       NTSTATUS result;
+       NTSTATUS status, result;
        uint32 enum_context = 0;
        uint32 pref_max_length=0x1000;
-       uint32 count=0;
-       char   **privs_name;
-       uint32 *privs_high;
-       uint32 *privs_low;
        int i;
        uint16 lang_id=0;
        uint16 lang_id_sys=0;
        uint16 lang_id_desc;
-       fstring description;
-
-       result = rpccli_lsa_enum_privilege(pipe_hnd, ctx, pol, &enum_context, 
-               pref_max_length, &count, &privs_name, &privs_high, &privs_low);
-
-       if ( !NT_STATUS_IS_OK(result) )
+       struct lsa_StringLarge *description = NULL;
+       struct lsa_PrivArray priv_array;
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
+
+       status = dcerpc_lsa_EnumPrivs(b, ctx,
+                                     pol,
+                                     &enum_context,
+                                     &priv_array,
+                                     pref_max_length,
+                                     &result);
+
+       if ( !NT_STATUS_IS_OK(status) )
+               return status;
+       if (!NT_STATUS_IS_OK(result)) {
                return result;
+       }
 
        /* Print results */
-       
-       for (i = 0; i < count; i++) {
-               d_printf("%30s  ", privs_name[i] ? privs_name[i] : "*unknown*" );
-               
+
+       for (i = 0; i < priv_array.count; i++) {
+
+               struct lsa_String lsa_name;
+
+               d_printf("%30s  ",
+                       priv_array.privs[i].name.string ? priv_array.privs[i].name.string : "*unknown*" );
+
                /* try to get the description */
-               
-               if ( !NT_STATUS_IS_OK(rpccli_lsa_get_dispname(pipe_hnd, ctx, pol, 
-                       privs_name[i], lang_id, lang_id_sys, description, &lang_id_desc)) )
-               {
+
+               init_lsa_String(&lsa_name, priv_array.privs[i].name.string);
+
+               status = dcerpc_lsa_LookupPrivDisplayName(b, ctx,
+                                                         pol,
+                                                         &lsa_name,
+                                                         lang_id,
+                                                         lang_id_sys,
+                                                         &description,
+                                                         &lang_id_desc,
+                                                         &result);
+               if (!NT_STATUS_IS_OK(status)) {
                        d_printf("??????\n");
                        continue;
                }
-               
-               d_printf("%s\n", description );         
+               if (!NT_STATUS_IS_OK(result)) {
+                       d_printf("??????\n");
+                       continue;
+               }
+
+               d_printf("%s\n", description->string);
        }
 
        return NT_STATUS_OK;
@@ -136,27 +164,33 @@ static NTSTATUS enum_privileges(struct rpc_pipe_client *pipe_hnd,
 
 static NTSTATUS check_privilege_for_user(struct rpc_pipe_client *pipe_hnd,
                                        TALLOC_CTX *ctx,
-                                       POLICY_HND *pol,
-                                       DOM_SID *sid,
+                                       struct policy_handle *pol,
+                                       struct dom_sid *sid,
                                        const char *right)
 {
-       NTSTATUS result;
-       uint32 count;
-       char **rights;
+       NTSTATUS status, result;
+       struct lsa_RightSet rights;
        int i;
-
-       result = rpccli_lsa_enum_account_rights(pipe_hnd, ctx, pol, sid, &count, &rights);
-
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
+
+       status = dcerpc_lsa_EnumAccountRights(b, ctx,
+                                             pol,
+                                             sid,
+                                             &rights,
+                                             &result);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
        if (!NT_STATUS_IS_OK(result)) {
                return result;
        }
 
-       if (count == 0) {
+       if (rights.count == 0) {
                return NT_STATUS_OBJECT_NAME_NOT_FOUND;
        }
-               
-       for (i = 0; i < count; i++) {
-               if (StrCaseCmp(rights[i], right) == 0) {
+
+       for (i = 0; i < rights.count; i++) {
+               if (strcasecmp_m(rights.names[i].string, right) == 0) {
                        return NT_STATUS_OK;
                }
        }
@@ -169,24 +203,30 @@ static NTSTATUS check_privilege_for_user(struct rpc_pipe_client *pipe_hnd,
 
 static NTSTATUS enum_privileges_for_user(struct rpc_pipe_client *pipe_hnd,
                                        TALLOC_CTX *ctx,
-                                       POLICY_HND *pol,
-                                       DOM_SID *sid )
+                                       struct policy_handle *pol,
+                                       struct dom_sid *sid )
 {
-       NTSTATUS result;
-       uint32 count;
-       char **rights;
+       NTSTATUS status, result;
+       struct lsa_RightSet rights;
        int i;
-
-       result = rpccli_lsa_enum_account_rights(pipe_hnd, ctx, pol, sid, &count, &rights);
-
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
+
+       status = dcerpc_lsa_EnumAccountRights(b, ctx,
+                                             pol,
+                                             sid,
+                                             &rights,
+                                             &result);
+       if (!NT_STATUS_IS_OK(status))
+               return status;
        if (!NT_STATUS_IS_OK(result))
                return result;
 
-       if ( count == 0 )
-               d_printf("No privileges assigned\n");
-               
-       for (i = 0; i < count; i++) {
-               printf("%s\n", rights[i]);
+       if (rights.count == 0) {
+               d_printf(_("No privileges assigned\n"));
+       }
+
+       for (i = 0; i < rights.count; i++) {
+               printf("%s\n", rights.names[i].string);
        }
 
        return NT_STATUS_OK;
@@ -197,43 +237,49 @@ static NTSTATUS enum_privileges_for_user(struct rpc_pipe_client *pipe_hnd,
 
 static NTSTATUS enum_accounts_for_privilege(struct rpc_pipe_client *pipe_hnd,
                                                TALLOC_CTX *ctx,
-                                               POLICY_HND *pol,
+                                               struct policy_handle *pol,
                                                const char *privilege)
 {
-       NTSTATUS result;
+       NTSTATUS status, result;
        uint32 enum_context=0;
        uint32 pref_max_length=0x1000;
-       DOM_SID *sids;
-       uint32 count=0;
+       struct lsa_SidArray sid_array;
        int i;
        fstring name;
-
-       result = rpccli_lsa_enum_sids(pipe_hnd, ctx, pol, &enum_context, 
-               pref_max_length, &count, &sids);
-
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
+
+       status = dcerpc_lsa_EnumAccounts(b, ctx,
+                                        pol,
+                                        &enum_context,
+                                        &sid_array,
+                                        pref_max_length,
+                                        &result);
+       if (!NT_STATUS_IS_OK(status))
+               return status;
        if (!NT_STATUS_IS_OK(result))
                return result;
-               
+
        d_printf("%s:\n", privilege);
 
-       for ( i=0; i<count; i++ ) {
-       
-                  
-               result = check_privilege_for_user( pipe_hnd, ctx, pol, &sids[i], privilege);
-               
-               if ( ! NT_STATUS_IS_OK(result)) {
-                       if ( ! NT_STATUS_EQUAL(result, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
-                               return result;
+       for ( i=0; i<sid_array.num_sids; i++ ) {
+
+               status = check_privilege_for_user(pipe_hnd, ctx, pol,
+                                                 sid_array.sids[i].sid,
+                                                 privilege);
+
+               if ( ! NT_STATUS_IS_OK(status)) {
+                       if ( ! NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
+                               return status;
                        }
                        continue;
                }
 
-               /* try to convert the SID to a name.  Fall back to 
+               /* try to convert the SID to a name.  Fall back to
                   printing the raw SID if necessary */
-               result = sid_to_name( pipe_hnd, ctx, &sids[i], name );
-               if ( !NT_STATUS_IS_OK (result) )
-                       fstrcpy( name, sid_string_static(&sids[i]) );
-                       
+               status = sid_to_name( pipe_hnd, ctx, sid_array.sids[i].sid, name );
+               if ( !NT_STATUS_IS_OK (status) )
+                       sid_to_fstring(name, sid_array.sids[i].sid);
+
                d_printf("  %s\n", name);
        }
 
@@ -245,37 +291,42 @@ static NTSTATUS enum_accounts_for_privilege(struct rpc_pipe_client *pipe_hnd,
 
 static NTSTATUS enum_privileges_for_accounts(struct rpc_pipe_client *pipe_hnd,
                                                TALLOC_CTX *ctx,
-                                               POLICY_HND *pol)
+                                               struct policy_handle *pol)
 {
-       NTSTATUS result;
+       NTSTATUS status, result;
        uint32 enum_context=0;
        uint32 pref_max_length=0x1000;
-       DOM_SID *sids;
-       uint32 count=0;
+       struct lsa_SidArray sid_array;
        int i;
        fstring name;
-
-       result = rpccli_lsa_enum_sids(pipe_hnd, ctx, pol, &enum_context, 
-               pref_max_length, &count, &sids);
-
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
+
+       status = dcerpc_lsa_EnumAccounts(b, ctx,
+                                        pol,
+                                        &enum_context,
+                                        &sid_array,
+                                        pref_max_length,
+                                        &result);
+       if (!NT_STATUS_IS_OK(status))
+               return status;
        if (!NT_STATUS_IS_OK(result))
                return result;
-               
-       for ( i=0; i<count; i++ ) {
-       
-               /* try to convert the SID to a name.  Fall back to 
+
+       for ( i=0; i<sid_array.num_sids; i++ ) {
+
+               /* try to convert the SID to a name.  Fall back to
                   printing the raw SID if necessary */
-                  
-               result = sid_to_name(pipe_hnd, ctx, &sids[i], name );
-               if ( !NT_STATUS_IS_OK (result) )
-                       fstrcpy( name, sid_string_static(&sids[i]) );
-                       
+
+               status = sid_to_name(pipe_hnd, ctx, sid_array.sids[i].sid, name);
+               if ( !NT_STATUS_IS_OK (status) )
+                       sid_to_fstring(name, sid_array.sids[i].sid);
+
                d_printf("%s\n", name);
-               
-               result = enum_privileges_for_user(pipe_hnd, ctx, pol, &sids[i] );
-               
-               if ( !NT_STATUS_IS_OK(result) )
-                       return result;
+
+               status = enum_privileges_for_user(pipe_hnd, ctx, pol,
+                                                 sid_array.sids[i].sid);
+               if ( !NT_STATUS_IS_OK(status) )
+                       return status;
 
                d_printf("\n");
        }
@@ -286,34 +337,36 @@ static NTSTATUS enum_privileges_for_accounts(struct rpc_pipe_client *pipe_hnd,
 /********************************************************************
 ********************************************************************/
 
-static NTSTATUS rpc_rights_list_internal(const DOM_SID *domain_sid,
-                                       const char *domain_name, 
+static NTSTATUS rpc_rights_list_internal(struct net_context *c,
+                                       const struct dom_sid *domain_sid,
+                                       const char *domain_name,
                                        struct cli_state *cli,
                                        struct rpc_pipe_client *pipe_hnd,
-                                       TALLOC_CTX *mem_ctx, 
+                                       TALLOC_CTX *mem_ctx,
                                        int argc,
                                        const char **argv )
 {
-       POLICY_HND pol;
-       NTSTATUS result;
-       DOM_SID sid;
+       struct policy_handle pol;
+       NTSTATUS status, result;
+       struct dom_sid sid;
        fstring privname;
-       fstring description;
+       struct lsa_String lsa_name;
+       struct lsa_StringLarge *description = NULL;
        uint16 lang_id = 0;
        uint16 lang_id_sys = 0;
        uint16 lang_id_desc;
-       
-       
-       result = rpccli_lsa_open_policy(pipe_hnd, mem_ctx, True, 
-               SEC_RIGHTS_MAXIMUM_ALLOWED, &pol);
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
+
+       status = rpccli_lsa_open_policy(pipe_hnd, mem_ctx, true,
+               SEC_FLAG_MAXIMUM_ALLOWED, &pol);
+
+       if ( !NT_STATUS_IS_OK(status) )
+               return status;
 
-       if ( !NT_STATUS_IS_OK(result) )
-               return result;
-       
        /* backwards compatibility; just list available privileges if no arguement */
-          
+
        if (argc == 0) {
-               result = enum_privileges(pipe_hnd, mem_ctx, &pol );
+               status = enum_privileges(pipe_hnd, mem_ctx, &pol );
                goto done;
        }
 
@@ -321,31 +374,45 @@ static NTSTATUS rpc_rights_list_internal(const DOM_SID *domain_sid,
                int i = 1;
 
                if (argv[1] == NULL) {
-                       result = enum_privileges(pipe_hnd, mem_ctx, &pol );
+                       status = enum_privileges(pipe_hnd, mem_ctx, &pol );
                        goto done;
                }
 
                while ( argv[i] != NULL ) {
-                       fstrcpy( privname, argv[i] );
+                       fstrcpy(privname, argv[i]);
+                       init_lsa_String(&lsa_name, argv[i]);
                        i++;
-               
+
                        /* verify that this is a valid privilege for error reporting */
-                       
-                       result = rpccli_lsa_get_dispname(pipe_hnd, mem_ctx, &pol, privname, lang_id, 
-                               lang_id_sys, description, &lang_id_desc);
-                       
+                       status = dcerpc_lsa_LookupPrivDisplayName(b, mem_ctx,
+                                                                 &pol,
+                                                                 &lsa_name,
+                                                                 lang_id,
+                                                                 lang_id_sys,
+                                                                 &description,
+                                                                 &lang_id_desc,
+                                                                 &result);
+                       if (!NT_STATUS_IS_OK(status)) {
+                               continue;
+                       }
+                       status = result;
                        if ( !NT_STATUS_IS_OK(result) ) {
-                               if ( NT_STATUS_EQUAL( result, NT_STATUS_NO_SUCH_PRIVILEGE ) ) 
-                                       d_fprintf(stderr, "No such privilege exists: %s.\n", privname);
+                               if ( NT_STATUS_EQUAL(result, NT_STATUS_NO_SUCH_PRIVILEGE))
+                                       d_fprintf(stderr, _("No such privilege "
+                                                 "exists: %s.\n"), privname);
                                else
-                                       d_fprintf(stderr, "Error resolving privilege display name [%s].\n", nt_errstr(result));
+                                       d_fprintf(stderr, _("Error resolving "
+                                                 "privilege display name "
+                                                 "[%s].\n"),
+                                                 nt_errstr(result));
                                continue;
                        }
-                       
-                       result = enum_accounts_for_privilege(pipe_hnd, mem_ctx, &pol, privname);
-                       if (!NT_STATUS_IS_OK(result)) {
-                               d_fprintf(stderr, "Error enumerating accounts for privilege %s [%s].\n", 
-                                       privname, nt_errstr(result));
+
+                       status = enum_accounts_for_privilege(pipe_hnd, mem_ctx, &pol, privname);
+                       if (!NT_STATUS_IS_OK(status)) {
+                               d_fprintf(stderr, _("Error enumerating "
+                                         "accounts for privilege %s [%s].\n"),
+                                         privname, nt_errstr(status));
                                continue;
                        }
                }
@@ -353,22 +420,22 @@ static NTSTATUS rpc_rights_list_internal(const DOM_SID *domain_sid,
        }
 
        /* special case to enumerate all privileged SIDs with associated rights */
-       
+
        if (strequal( argv[0], "accounts")) {
                int i = 1;
 
                if (argv[1] == NULL) {
-                       result = enum_privileges_for_accounts(pipe_hnd, mem_ctx, &pol);
+                       status = enum_privileges_for_accounts(pipe_hnd, mem_ctx, &pol);
                        goto done;
                }
 
                while (argv[i] != NULL) {
-                       result = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[i]);
-                       if (!NT_STATUS_IS_OK(result)) {
+                       status = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[i]);
+                       if (!NT_STATUS_IS_OK(status)) {
                                goto done;
                        }
-                       result = enum_privileges_for_user(pipe_hnd, mem_ctx, &pol, &sid);
-                       if (!NT_STATUS_IS_OK(result)) {
+                       status = enum_privileges_for_user(pipe_hnd, mem_ctx, &pol, &sid);
+                       if (!NT_STATUS_IS_OK(status)) {
                                goto done;
                        }
                        i++;
@@ -379,235 +446,323 @@ static NTSTATUS rpc_rights_list_internal(const DOM_SID *domain_sid,
        /* backward comaptibility: if no keyword provided, treat the key
           as an account name */
        if (argc > 1) {
-               d_printf("Usage: net rpc rights list [[accounts|privileges] [name|SID]]\n");
-               result = NT_STATUS_OK;
+               d_printf("%s net rpc rights list [[accounts|privileges] "
+                        "[name|SID]]\n", _("Usage:"));
+               status = NT_STATUS_OK;
                goto done;
        }
 
-       result = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[0]);
-       if (!NT_STATUS_IS_OK(result)) {
+       status = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[0]);
+       if (!NT_STATUS_IS_OK(status)) {
                goto done;
        }
-       result = enum_privileges_for_user(pipe_hnd, mem_ctx, &pol, &sid );
+       status = enum_privileges_for_user(pipe_hnd, mem_ctx, &pol, &sid );
 
 done:
-       rpccli_lsa_close(pipe_hnd, mem_ctx, &pol);
+       dcerpc_lsa_Close(b, mem_ctx, &pol, &result);
 
-       return result;
+       return status;
 }
 
 /********************************************************************
 ********************************************************************/
 
-static NTSTATUS rpc_rights_grant_internal(const DOM_SID *domain_sid,
-                                       const char *domain_name, 
+static NTSTATUS rpc_rights_grant_internal(struct net_context *c,
+                                       const struct dom_sid *domain_sid,
+                                       const char *domain_name,
                                        struct cli_state *cli,
                                        struct rpc_pipe_client *pipe_hnd,
-                                       TALLOC_CTX *mem_ctx, 
+                                       TALLOC_CTX *mem_ctx,
                                        int argc,
                                        const char **argv )
 {
-       POLICY_HND dom_pol;
-       NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
+       struct policy_handle dom_pol;
+       NTSTATUS status, result;
+       struct lsa_RightSet rights;
+       int i;
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
 
-       DOM_SID sid;
+       struct dom_sid sid;
 
        if (argc < 2 ) {
-               d_printf("Usage: net rpc rights grant <name|SID> <rights...>\n");
+               d_printf("%s\n%s",
+                        _("Usage:"),
+                        _(" net rpc rights grant <name|SID> <rights...>\n"));
                return NT_STATUS_OK;
        }
 
-       result = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[0]);
-       if (!NT_STATUS_IS_OK(result))
-               return result;  
+       status = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[0]);
+       if (NT_STATUS_EQUAL(status, NT_STATUS_NONE_MAPPED))
+               status = NT_STATUS_NO_SUCH_USER;
 
-       result = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, True, 
-                                    SEC_RIGHTS_MAXIMUM_ALLOWED,
+       if (!NT_STATUS_IS_OK(status))
+               goto done;
+
+       status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, true,
+                                    SEC_FLAG_MAXIMUM_ALLOWED,
                                     &dom_pol);
 
-       if (!NT_STATUS_IS_OK(result))
-               return result;  
+       if (!NT_STATUS_IS_OK(status))
+               return status;
+
+       rights.count = argc-1;
+       rights.names = talloc_array(mem_ctx, struct lsa_StringLarge,
+                                   rights.count);
+       if (!rights.names) {
+               return NT_STATUS_NO_MEMORY;
+       }
 
-       result = rpccli_lsa_add_account_rights(pipe_hnd, mem_ctx, &dom_pol, sid, 
-                                           argc-1, argv+1);
+       for (i=0; i<argc-1; i++) {
+               init_lsa_StringLarge(&rights.names[i], argv[i+1]);
+       }
 
-       if (!NT_STATUS_IS_OK(result))
+       status = dcerpc_lsa_AddAccountRights(b, mem_ctx,
+                                            &dom_pol,
+                                            &sid,
+                                            &rights,
+                                            &result);
+       if (!NT_STATUS_IS_OK(status))
                goto done;
-               
-       d_printf("Successfully granted rights.\n");
+       if (!NT_STATUS_IS_OK(result)) {
+               status = result;
+               goto done;
+       }
+
+       d_printf(_("Successfully granted rights.\n"));
 
  done:
-       if ( !NT_STATUS_IS_OK(result) ) {
-               d_fprintf(stderr, "Failed to grant privileges for %s (%s)\n", 
-                       argv[0], nt_errstr(result));
+       if ( !NT_STATUS_IS_OK(status) ) {
+               d_fprintf(stderr, _("Failed to grant privileges for %s (%s)\n"),
+                       argv[0], nt_errstr(status));
        }
-               
-       rpccli_lsa_close(pipe_hnd, mem_ctx, &dom_pol);
-       
-       return result;
+
+       dcerpc_lsa_Close(b, mem_ctx, &dom_pol, &result);
+
+       return status;
 }
 
 /********************************************************************
 ********************************************************************/
 
-static NTSTATUS rpc_rights_revoke_internal(const DOM_SID *domain_sid,
-                                       const char *domain_name, 
+static NTSTATUS rpc_rights_revoke_internal(struct net_context *c,
+                                       const struct dom_sid *domain_sid,
+                                       const char *domain_name,
                                        struct cli_state *cli,
                                        struct rpc_pipe_client *pipe_hnd,
-                                       TALLOC_CTX *mem_ctx, 
+                                       TALLOC_CTX *mem_ctx,
                                        int argc,
                                        const char **argv )
 {
-       POLICY_HND dom_pol;
-       NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
-
-       DOM_SID sid;
+       struct policy_handle dom_pol;
+       NTSTATUS status, result;
+       struct lsa_RightSet rights;
+       struct dom_sid sid;
+       int i;
+       struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
 
        if (argc < 2 ) {
-               d_printf("Usage: net rpc rights revoke <name|SID> <rights...>\n");
+               d_printf("%s\n%s",
+                        _("Usage:"),
+                        _(" net rpc rights revoke <name|SID> <rights...>\n"));
                return NT_STATUS_OK;
        }
 
-       result = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[0]);
-       if (!NT_STATUS_IS_OK(result))
-               return result;  
+       status = name_to_sid(pipe_hnd, mem_ctx, &sid, argv[0]);
+       if (!NT_STATUS_IS_OK(status))
+               return status;
 
-       result = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, True, 
-                                    SEC_RIGHTS_MAXIMUM_ALLOWED,
+       status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, true,
+                                    SEC_FLAG_MAXIMUM_ALLOWED,
                                     &dom_pol);
 
-       if (!NT_STATUS_IS_OK(result))
-               return result;  
+       if (!NT_STATUS_IS_OK(status))
+               return status;
 
-       result = rpccli_lsa_remove_account_rights(pipe_hnd, mem_ctx, &dom_pol, sid, 
-                                              False, argc-1, argv+1);
+       rights.count = argc-1;
+       rights.names = talloc_array(mem_ctx, struct lsa_StringLarge,
+                                   rights.count);
+       if (!rights.names) {
+               return NT_STATUS_NO_MEMORY;
+       }
 
-       if (!NT_STATUS_IS_OK(result))
+       for (i=0; i<argc-1; i++) {
+               init_lsa_StringLarge(&rights.names[i], argv[i+1]);
+       }
+
+       status = dcerpc_lsa_RemoveAccountRights(b, mem_ctx,
+                                               &dom_pol,
+                                               &sid,
+                                               false,
+                                               &rights,
+                                               &result);
+       if (!NT_STATUS_IS_OK(status))
+               goto done;
+       if (!NT_STATUS_IS_OK(result)) {
+               status = result;
                goto done;
+       }
 
-       d_printf("Successfully revoked rights.\n");
+       d_printf(_("Successfully revoked rights.\n"));
 
 done:
-       if ( !NT_STATUS_IS_OK(result) ) {
-               d_fprintf(stderr, "Failed to revoke privileges for %s (%s)\n", 
-                       argv[0], nt_errstr(result));
+       if ( !NT_STATUS_IS_OK(status) ) {
+               d_fprintf(stderr,_("Failed to revoke privileges for %s (%s)\n"),
+                       argv[0], nt_errstr(status));
        }
-       
-       rpccli_lsa_close(pipe_hnd, mem_ctx, &dom_pol);
 
-       return result;
-}      
+       dcerpc_lsa_Close(b, mem_ctx, &dom_pol, &result);
+
+       return status;
+}
 
 
 /********************************************************************
 ********************************************************************/
 
-static int rpc_rights_list( int argc, const char **argv )
+static int rpc_rights_list(struct net_context *c, int argc, const char **argv )
 {
-       return run_rpc_command( NULL, PI_LSARPC, 0, 
+       if (c->display_usage) {
+               d_printf("%s\n%s",
+                        _("Usage:"),
+                        _("net rpc rights list [{accounts|privileges} "
+                          "[name|SID]]\n"
+                          "    View available/assigned privileges\n"));
+               return 0;
+       }
+
+       return run_rpc_command(c, NULL, &ndr_table_lsarpc.syntax_id, 0,
                rpc_rights_list_internal, argc, argv );
 }
 
 /********************************************************************
 ********************************************************************/
 
-static int rpc_rights_grant( int argc, const char **argv )
+static int rpc_rights_grant(struct net_context *c, int argc, const char **argv )
 {
-       return run_rpc_command( NULL, PI_LSARPC, 0, 
+       if (c->display_usage) {
+               d_printf("%s\n%s",
+                        _("Usage:"),
+                        _("net rpc rights grant <name|SID> <right>\n"
+                          "    Assign privilege[s]\n"));
+               d_printf(_("For example:\n"
+                          "    net rpc rights grant 'VALE\\biddle' "
+                          "SePrintOperatorPrivilege SeDiskOperatorPrivilege\n"
+                          "    would grant the printer admin and disk manager "
+                          "rights to the user 'VALE\\biddle'\n"));
+               return 0;
+       }
+
+       return run_rpc_command(c, NULL, &ndr_table_lsarpc.syntax_id, 0,
                rpc_rights_grant_internal, argc, argv );
 }
 
 /********************************************************************
 ********************************************************************/
 
-static int rpc_rights_revoke( int argc, const char **argv )
+static int rpc_rights_revoke(struct net_context *c, int argc, const char **argv)
 {
-       return run_rpc_command( NULL, PI_LSARPC, 0, 
-               rpc_rights_revoke_internal, argc, argv );
-}
-
-/********************************************************************
-********************************************************************/
+       if (c->display_usage) {
+               d_printf("%s\n%s",
+                        _("Usage:"),
+                        _("net rpc rights revoke <name|SID> <right>\n"
+                          "    Revoke privilege[s]\n"));
+               d_printf(_("For example:\n"
+                          "    net rpc rights revoke 'VALE\\biddle' "
+                          "SePrintOperatorPrivilege SeDiskOperatorPrivilege\n"
+                          "    would revoke the printer admin and disk manager"
+                          " rights from the user 'VALE\\biddle'\n"));
+               return 0;
+       }
 
-static int net_help_rights( int argc, const char **argv )
-{
-       d_printf("net rpc rights list [{accounts|privileges} [name|SID]]   View available or assigned privileges\n");
-       d_printf("net rpc rights grant <name|SID> <right>                  Assign privilege[s]\n");
-       d_printf("net rpc rights revoke <name|SID> <right>                 Revoke privilege[s]\n");
-       
-       d_printf("\nBoth 'grant' and 'revoke' require a SID and a list of privilege names.\n");
-       d_printf("For example\n");
-       d_printf("\n  net rpc rights grant 'VALE\\biddle' SePrintOperatorPrivilege SeDiskOperatorPrivilege\n");
-       d_printf("\nwould grant the printer admin and disk manager rights to the user 'VALE\\biddle'\n\n");
-       
-       
-       return -1;
+       return run_rpc_command(c, NULL, &ndr_table_lsarpc.syntax_id, 0,
+               rpc_rights_revoke_internal, argc, argv );
 }
 
 /********************************************************************
 ********************************************************************/
 
-int net_rpc_rights(int argc, const char **argv) 
+int net_rpc_rights(struct net_context *c, int argc, const char **argv)
 {
        struct functable func[] = {
-               {"list", rpc_rights_list},
-               {"grant", rpc_rights_grant},
-               {"revoke", rpc_rights_revoke},
-               {NULL, NULL}
+               {
+                       "list",
+                       rpc_rights_list,
+                       NET_TRANSPORT_RPC,
+                       N_("View available/assigned privileges"),
+                       N_("net rpc rights list\n"
+                          "    View available/assigned privileges")
+               },
+               {
+                       "grant",
+                       rpc_rights_grant,
+                       NET_TRANSPORT_RPC,
+                       N_("Assign privilege[s]"),
+                       N_("net rpc rights grant\n"
+                          "    Assign privilege[s]")
+               },
+               {
+                       "revoke",
+                       rpc_rights_revoke,
+                       NET_TRANSPORT_RPC,
+                       N_("Revoke privilege[s]"),
+                       N_("net rpc rights revoke\n"
+                          "    Revoke privilege[s]")
+               },
+               {NULL, NULL, 0, NULL, NULL}
        };
-       
-       if ( argc )
-               return net_run_function( argc, argv, func, net_help_rights );
-               
-       return net_help_rights( argc, argv );
+
+       return net_run_function(c, argc, argv, "net rpc rights", func);
 }
 
-static NTSTATUS rpc_sh_rights_list(TALLOC_CTX *mem_ctx, struct rpc_sh_ctx *ctx,
+static NTSTATUS rpc_sh_rights_list(struct net_context *c,
+                                  TALLOC_CTX *mem_ctx, struct rpc_sh_ctx *ctx,
                                   struct rpc_pipe_client *pipe_hnd,
                                   int argc, const char **argv)
 {
-       return rpc_rights_list_internal(ctx->domain_sid, ctx->domain_name,
+       return rpc_rights_list_internal(c, ctx->domain_sid, ctx->domain_name,
                                        ctx->cli, pipe_hnd, mem_ctx,
                                        argc, argv);
 }
 
-static NTSTATUS rpc_sh_rights_grant(TALLOC_CTX *mem_ctx,
+static NTSTATUS rpc_sh_rights_grant(struct net_context *c,
+                                   TALLOC_CTX *mem_ctx,
                                    struct rpc_sh_ctx *ctx,
                                    struct rpc_pipe_client *pipe_hnd,
                                    int argc, const char **argv)
 {
-       return rpc_rights_grant_internal(ctx->domain_sid, ctx->domain_name,
+       return rpc_rights_grant_internal(c, ctx->domain_sid, ctx->domain_name,
                                         ctx->cli, pipe_hnd, mem_ctx,
                                         argc, argv);
 }
 
-static NTSTATUS rpc_sh_rights_revoke(TALLOC_CTX *mem_ctx,
+static NTSTATUS rpc_sh_rights_revoke(struct net_context *c,
+                                    TALLOC_CTX *mem_ctx,
                                     struct rpc_sh_ctx *ctx,
                                     struct rpc_pipe_client *pipe_hnd,
                                     int argc, const char **argv)
 {
-       return rpc_rights_revoke_internal(ctx->domain_sid, ctx->domain_name,
+       return rpc_rights_revoke_internal(c, ctx->domain_sid, ctx->domain_name,
                                          ctx->cli, pipe_hnd, mem_ctx,
                                          argc, argv);
 }
 
-struct rpc_sh_cmd *net_rpc_rights_cmds(TALLOC_CTX *mem_ctx,
+struct rpc_sh_cmd *net_rpc_rights_cmds(struct net_context *c, TALLOC_CTX *mem_ctx,
                                       struct rpc_sh_ctx *ctx)
 {
        static struct rpc_sh_cmd cmds[] = {
 
-       { "list", NULL, PI_LSARPC, rpc_sh_rights_list,
-         "View available or assigned privileges" },
+       { "list", NULL, &ndr_table_lsarpc.syntax_id, rpc_sh_rights_list,
+         N_("View available or assigned privileges") },
 
-       { "grant", NULL, PI_LSARPC, rpc_sh_rights_grant,
-         "Assign privilege[s]" },
+       { "grant", NULL, &ndr_table_lsarpc.syntax_id, rpc_sh_rights_grant,
+         N_("Assign privilege[s]") },
 
-       { "revoke", NULL, PI_LSARPC, rpc_sh_rights_revoke,
-         "Revoke privilege[s]" },
+       { "revoke", NULL, &ndr_table_lsarpc.syntax_id, rpc_sh_rights_revoke,
+         N_("Revoke privilege[s]") },
 
        { NULL, NULL, 0, NULL, NULL }
        };
 
        return cmds;
-};
+}