2 Unix SMB/CIFS implementation.
5 Copyright (C) Tim Potter 2000
6 Copyright (C) Guenther Deschner 2008
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "rpcclient.h"
24 #include "../libcli/auth/libcli_auth.h"
25 #include "../librpc/gen_ndr/ndr_netlogon.h"
26 #include "../librpc/gen_ndr/ndr_netlogon_c.h"
27 #include "rpc_client/cli_netlogon.h"
29 #include "../libcli/auth/netlogon_creds_cli.h"
31 static WERROR
cmd_netlogon_logon_ctrl2(struct rpc_pipe_client
*cli
,
32 TALLOC_CTX
*mem_ctx
, int argc
,
35 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
37 const char *logon_server
= cli
->desthost
;
38 enum netr_LogonControlCode function_code
= NETLOGON_CONTROL_REDISCOVER
;
40 union netr_CONTROL_DATA_INFORMATION data
;
41 union netr_CONTROL_QUERY_INFORMATION query
;
42 const char *domain
= lp_workgroup();
43 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
45 #define fn_code_level(x, item) { x, #x, #item }
47 enum netr_LogonControlCode code
;
50 } supported_levels
[] = {
51 fn_code_level(NETLOGON_CONTROL_REDISCOVER
, domain
),
52 fn_code_level(NETLOGON_CONTROL_TC_QUERY
, domain
),
53 fn_code_level(NETLOGON_CONTROL_TRANSPORT_NOTIFY
, domain
),
54 fn_code_level(NETLOGON_CONTROL_FIND_USER
, user
),
55 fn_code_level(NETLOGON_CONTROL_CHANGE_PASSWORD
, domain
),
56 fn_code_level(NETLOGON_CONTROL_TC_VERIFY
, domain
),
57 fn_code_level(NETLOGON_CONTROL_SET_DBFLAG
, debug_level
),
61 if ((argc
> 5) || (argc
< 2)) {
62 fprintf(stderr
, "Usage: %s <logon_server> <function_code> "
63 "<level:1..4> <argument>\n", argv
[0]);
64 fprintf(stderr
, "Supported combinations:\n");
65 fprintf(stderr
, "function_code\targument\n");
66 for(i
=0; supported_levels
[i
].code
; i
++) {
67 fprintf(stderr
, "%7d\t\t%s\t(%s)\n",
68 supported_levels
[i
].code
,
69 supported_levels
[i
].argument
,
70 supported_levels
[i
].name
);
76 logon_server
= argv
[1];
80 function_code
= atoi(argv
[2]);
84 level
= atoi(argv
[3]);
91 switch (function_code
) {
92 case NETLOGON_CONTROL_REDISCOVER
:
93 case NETLOGON_CONTROL_TC_QUERY
:
94 case NETLOGON_CONTROL_CHANGE_PASSWORD
:
95 case NETLOGON_CONTROL_TRANSPORT_NOTIFY
:
96 case NETLOGON_CONTROL_TC_VERIFY
:
99 case NETLOGON_CONTROL_FIND_USER
:
102 case NETLOGON_CONTROL_SET_DBFLAG
:
103 data
.debug_level
= atoi(domain
);
108 status
= dcerpc_netr_LogonControl2(b
, mem_ctx
,
115 if (!NT_STATUS_IS_OK(status
)) {
116 return ntstatus_to_werror(status
);
119 if (!W_ERROR_IS_OK(werr
)) {
123 /* Display results */
128 static WERROR
cmd_netlogon_getanydcname(struct rpc_pipe_client
*cli
,
129 TALLOC_CTX
*mem_ctx
, int argc
,
132 const char *dcname
= NULL
;
136 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
139 fprintf(stderr
, "Usage: %s domainname\n", argv
[0]);
143 /* Make sure to wait for our DC's reply */
144 old_timeout
= rpccli_set_timeout(cli
, 30000); /* 30 seconds. */
145 rpccli_set_timeout(cli
, MAX(old_timeout
, 30000)); /* At least 30 sec */
147 status
= dcerpc_netr_GetAnyDCName(b
, mem_ctx
,
152 rpccli_set_timeout(cli
, old_timeout
);
154 if (!NT_STATUS_IS_OK(status
)) {
155 return ntstatus_to_werror(status
);
158 if (!W_ERROR_IS_OK(werr
)) {
162 /* Display results */
164 printf("%s\n", dcname
);
169 static WERROR
cmd_netlogon_getdcname(struct rpc_pipe_client
*cli
,
170 TALLOC_CTX
*mem_ctx
, int argc
,
173 const char *dcname
= NULL
;
177 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
180 fprintf(stderr
, "Usage: %s domainname\n", argv
[0]);
184 /* Make sure to wait for our DC's reply */
185 old_timeout
= rpccli_set_timeout(cli
, 30000); /* 30 seconds. */
186 rpccli_set_timeout(cli
, MAX(30000, old_timeout
)); /* At least 30 sec */
188 status
= dcerpc_netr_GetDcName(b
, mem_ctx
,
193 rpccli_set_timeout(cli
, old_timeout
);
195 if (!NT_STATUS_IS_OK(status
)) {
196 return ntstatus_to_werror(status
);
199 if (!W_ERROR_IS_OK(werr
)) {
203 /* Display results */
205 printf("%s\n", dcname
);
210 static WERROR
cmd_netlogon_dsr_getdcname(struct rpc_pipe_client
*cli
,
211 TALLOC_CTX
*mem_ctx
, int argc
,
215 WERROR werr
= WERR_OK
;
216 uint32_t flags
= DS_RETURN_DNS_NAME
;
217 const char *server_name
= cli
->desthost
;
218 const char *domain_name
;
219 struct GUID domain_guid
= GUID_zero();
220 struct GUID site_guid
= GUID_zero();
221 struct netr_DsRGetDCNameInfo
*info
= NULL
;
222 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
225 fprintf(stderr
, "Usage: %s [domain_name] [domain_guid] "
226 "[site_guid] [flags]\n", argv
[0]);
231 domain_name
= argv
[1];
234 if (!NT_STATUS_IS_OK(GUID_from_string(argv
[2], &domain_guid
))) {
235 return WERR_NOT_ENOUGH_MEMORY
;
240 if (!NT_STATUS_IS_OK(GUID_from_string(argv
[3], &site_guid
))) {
241 return WERR_NOT_ENOUGH_MEMORY
;
246 sscanf(argv
[4], "%x", &flags
);
248 result
= dcerpc_netr_DsRGetDCName(b
, mem_ctx
,
256 if (!NT_STATUS_IS_OK(result
)) {
257 return ntstatus_to_werror(result
);
260 if (W_ERROR_IS_OK(werr
)) {
261 d_printf("DsGetDcName gave: %s\n",
262 NDR_PRINT_STRUCT_STRING(mem_ctx
, netr_DsRGetDCNameInfo
, info
));
266 printf("rpccli_netlogon_dsr_getdcname returned %s\n",
272 static WERROR
cmd_netlogon_dsr_getdcnameex(struct rpc_pipe_client
*cli
,
273 TALLOC_CTX
*mem_ctx
, int argc
,
278 uint32_t flags
= DS_RETURN_DNS_NAME
;
279 const char *server_name
= cli
->desthost
;
280 const char *domain_name
;
281 const char *site_name
= NULL
;
282 struct GUID domain_guid
= GUID_zero();
283 struct netr_DsRGetDCNameInfo
*info
= NULL
;
284 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
287 fprintf(stderr
, "Usage: %s [domain_name] [domain_guid] "
288 "[site_name] [flags]\n", argv
[0]);
292 domain_name
= argv
[1];
295 if (!NT_STATUS_IS_OK(GUID_from_string(argv
[2], &domain_guid
))) {
296 return WERR_NOT_ENOUGH_MEMORY
;
305 sscanf(argv
[4], "%x", &flags
);
308 status
= dcerpc_netr_DsRGetDCNameEx(b
, mem_ctx
,
316 if (!NT_STATUS_IS_OK(status
)) {
317 return ntstatus_to_werror(status
);
320 if (!W_ERROR_IS_OK(result
)) {
324 d_printf("DsRGetDCNameEx gave %s\n",
325 NDR_PRINT_STRUCT_STRING(mem_ctx
, netr_DsRGetDCNameInfo
, info
));
330 static WERROR
cmd_netlogon_dsr_getdcnameex2(struct rpc_pipe_client
*cli
,
331 TALLOC_CTX
*mem_ctx
, int argc
,
336 uint32_t flags
= DS_RETURN_DNS_NAME
;
337 const char *server_name
= cli
->desthost
;
338 const char *domain_name
= NULL
;
339 const char *client_account
= NULL
;
341 const char *site_name
= NULL
;
342 struct GUID domain_guid
= GUID_zero();
343 struct netr_DsRGetDCNameInfo
*info
= NULL
;
344 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
347 fprintf(stderr
, "Usage: %s [client_account] [acb_mask] "
348 "[domain_name] [domain_guid] [site_name] "
349 "[flags]\n", argv
[0]);
354 client_account
= argv
[1];
358 mask
= atoi(argv
[2]);
362 domain_name
= argv
[3];
366 if (!NT_STATUS_IS_OK(GUID_from_string(argv
[4], &domain_guid
))) {
367 return WERR_NOT_ENOUGH_MEMORY
;
376 sscanf(argv
[6], "%x", &flags
);
379 status
= dcerpc_netr_DsRGetDCNameEx2(b
, mem_ctx
,
389 if (!NT_STATUS_IS_OK(status
)) {
390 return ntstatus_to_werror(status
);
393 if (!W_ERROR_IS_OK(result
)) {
397 d_printf("DsRGetDCNameEx2 gave %s\n",
398 NDR_PRINT_STRUCT_STRING(mem_ctx
, netr_DsRGetDCNameInfo
, info
));
404 static WERROR
cmd_netlogon_dsr_getsitename(struct rpc_pipe_client
*cli
,
405 TALLOC_CTX
*mem_ctx
, int argc
,
410 const char *sitename
= NULL
;
411 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
414 fprintf(stderr
, "Usage: %s computername\n", argv
[0]);
418 status
= dcerpc_netr_DsRGetSiteName(b
, mem_ctx
,
422 if (!NT_STATUS_IS_OK(status
)) {
423 return ntstatus_to_werror(status
);
426 if (!W_ERROR_IS_OK(werr
)) {
427 printf("rpccli_netlogon_dsr_gesitename returned %s\n",
428 nt_errstr(werror_to_ntstatus(werr
)));
432 printf("Computer %s is on Site: %s\n", argv
[1], sitename
);
437 static WERROR
cmd_netlogon_logon_ctrl(struct rpc_pipe_client
*cli
,
438 TALLOC_CTX
*mem_ctx
, int argc
,
441 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
443 const char *logon_server
= cli
->desthost
;
444 enum netr_LogonControlCode function_code
= 1;
446 union netr_CONTROL_QUERY_INFORMATION info
;
447 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
450 fprintf(stderr
, "Usage: %s <logon_server> <function_code> "
451 "<level>\n", argv
[0]);
456 logon_server
= argv
[1];
460 function_code
= atoi(argv
[2]);
464 level
= atoi(argv
[3]);
467 status
= dcerpc_netr_LogonControl(b
, mem_ctx
,
473 if (!NT_STATUS_IS_OK(status
)) {
474 return ntstatus_to_werror(status
);
477 if (!W_ERROR_IS_OK(werr
)) {
481 /* Display results */
486 /* Log on a domain user */
488 static NTSTATUS
cmd_netlogon_sam_logon(struct rpc_pipe_client
*cli
,
489 TALLOC_CTX
*mem_ctx
, int argc
,
492 NTSTATUS result
= NT_STATUS_UNSUCCESSFUL
;
493 int logon_type
= NetlogonNetworkInformation
;
494 const char *username
, *password
;
495 uint32_t logon_param
= 0;
496 const char *workstation
= NULL
;
497 struct netr_SamInfo3
*info3
= NULL
;
498 uint8_t authoritative
= 0;
501 /* Check arguments */
503 if (argc
< 3 || argc
> 6) {
504 fprintf(stderr
, "Usage: samlogon <username> <password> [workstation]"
505 "[logon_type (1 or 2)] [logon_parameter]\n");
513 workstation
= argv
[3];
516 sscanf(argv
[4], "%i", &logon_type
);
519 sscanf(argv
[5], "%x", &logon_param
);
521 if (rpcclient_netlogon_creds
== NULL
) {
522 result
= NT_STATUS_UNSUCCESSFUL
;
526 /* Perform the sam logon */
528 result
= rpccli_netlogon_password_logon(rpcclient_netlogon_creds
,
540 if (!NT_STATUS_IS_OK(result
))
547 /* Change the trust account password */
549 static NTSTATUS
cmd_netlogon_change_trust_pw(struct rpc_pipe_client
*cli
,
550 TALLOC_CTX
*mem_ctx
, int argc
,
553 NTSTATUS result
= NT_STATUS_UNSUCCESSFUL
;
554 const char *dcname
= cli
->desthost
;
556 /* Check arguments */
559 fprintf(stderr
, "Usage: change_trust_pw");
563 result
= trust_pw_change(rpcclient_netlogon_creds
,
569 if (!NT_STATUS_IS_OK(result
))
576 static WERROR
cmd_netlogon_gettrustrid(struct rpc_pipe_client
*cli
,
577 TALLOC_CTX
*mem_ctx
, int argc
,
580 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
581 WERROR werr
= WERR_GEN_FAILURE
;
582 const char *server_name
= cli
->desthost
;
583 const char *domain_name
= lp_workgroup();
585 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
587 if (argc
< 1 || argc
> 3) {
588 fprintf(stderr
, "Usage: %s <server_name> <domain_name>\n",
594 server_name
= argv
[1];
598 domain_name
= argv
[2];
601 status
= dcerpc_netr_LogonGetTrustRid(b
, mem_ctx
,
606 if (!NT_STATUS_IS_OK(status
)) {
607 werr
= ntstatus_to_werror(status
);
611 if (W_ERROR_IS_OK(werr
)) {
612 printf("Rid: %d\n", rid
);
618 static WERROR
cmd_netlogon_dsr_enumtrustdom(struct rpc_pipe_client
*cli
,
619 TALLOC_CTX
*mem_ctx
, int argc
,
622 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
623 WERROR werr
= WERR_GEN_FAILURE
;
624 const char *server_name
= cli
->desthost
;
625 uint32_t trust_flags
= NETR_TRUST_FLAG_IN_FOREST
;
626 struct netr_DomainTrustList trusts
;
627 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
629 if (argc
< 1 || argc
> 3) {
630 fprintf(stderr
, "Usage: %s <server_name> <trust_flags>\n",
636 server_name
= argv
[1];
640 sscanf(argv
[2], "%x", &trust_flags
);
643 status
= dcerpc_netr_DsrEnumerateDomainTrusts(b
, mem_ctx
,
648 if (!NT_STATUS_IS_OK(status
)) {
649 werr
= ntstatus_to_werror(status
);
653 if (W_ERROR_IS_OK(werr
)) {
656 printf("%d domains returned\n", trusts
.count
);
658 for (i
=0; i
<trusts
.count
; i
++ ) {
660 trusts
.array
[i
].dns_name
,
661 trusts
.array
[i
].netbios_name
);
668 static WERROR
cmd_netlogon_deregisterdnsrecords(struct rpc_pipe_client
*cli
,
669 TALLOC_CTX
*mem_ctx
, int argc
,
672 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
673 WERROR werr
= WERR_GEN_FAILURE
;
674 const char *server_name
= cli
->desthost
;
675 const char *domain
= lp_workgroup();
676 const char *dns_host
= NULL
;
677 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
679 if (argc
< 1 || argc
> 4) {
680 fprintf(stderr
, "Usage: %s <server_name> <domain_name> "
681 "<dns_host>\n", argv
[0]);
686 server_name
= argv
[1];
697 status
= dcerpc_netr_DsrDeregisterDNSHostRecords(b
, mem_ctx
,
704 if (!NT_STATUS_IS_OK(status
)) {
705 werr
= ntstatus_to_werror(status
);
709 if (W_ERROR_IS_OK(werr
)) {
716 static WERROR
cmd_netlogon_dsr_getforesttrustinfo(struct rpc_pipe_client
*cli
,
717 TALLOC_CTX
*mem_ctx
, int argc
,
720 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
721 WERROR werr
= WERR_GEN_FAILURE
;
722 const char *server_name
= cli
->desthost
;
723 const char *trusted_domain_name
= NULL
;
724 struct lsa_ForestTrustInformation
*info
= NULL
;
726 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
728 if (argc
< 1 || argc
> 4) {
729 fprintf(stderr
, "Usage: %s <server_name> <trusted_domain_name> "
730 "<flags>\n", argv
[0]);
735 server_name
= argv
[1];
739 trusted_domain_name
= argv
[2];
743 sscanf(argv
[3], "%x", &flags
);
746 status
= dcerpc_netr_DsRGetForestTrustInformation(b
, mem_ctx
,
752 if (!NT_STATUS_IS_OK(status
)) {
753 werr
= ntstatus_to_werror(status
);
757 if (W_ERROR_IS_OK(werr
)) {
764 static NTSTATUS
cmd_netlogon_enumtrusteddomains(struct rpc_pipe_client
*cli
,
765 TALLOC_CTX
*mem_ctx
, int argc
,
768 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
770 const char *server_name
= cli
->desthost
;
771 struct netr_Blob blob
;
772 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
775 if (argc
< 1 || argc
> 3) {
776 fprintf(stderr
, "Usage: %s <server_name>\n", argv
[0]);
781 server_name
= argv
[1];
784 status
= dcerpc_netr_NetrEnumerateTrustedDomains(b
, mem_ctx
,
788 if (!NT_STATUS_IS_OK(status
)) {
792 if (!NT_STATUS_IS_OK(result
)) {
798 dump_data(1, blob
.data
, blob
.length
);
803 static WERROR
cmd_netlogon_enumtrusteddomainsex(struct rpc_pipe_client
*cli
,
804 TALLOC_CTX
*mem_ctx
, int argc
,
807 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
808 WERROR werr
= WERR_GEN_FAILURE
;
809 const char *server_name
= cli
->desthost
;
810 struct netr_DomainTrustList list
;
811 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
813 if (argc
< 1 || argc
> 3) {
814 fprintf(stderr
, "Usage: %s <server_name>\n", argv
[0]);
819 server_name
= argv
[1];
822 status
= dcerpc_netr_NetrEnumerateTrustedDomainsEx(b
, mem_ctx
,
826 if (!NT_STATUS_IS_OK(status
)) {
827 werr
= ntstatus_to_werror(status
);
831 if (W_ERROR_IS_OK(werr
)) {
838 static WERROR
cmd_netlogon_getdcsitecoverage(struct rpc_pipe_client
*cli
,
839 TALLOC_CTX
*mem_ctx
, int argc
,
842 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
843 WERROR werr
= WERR_GEN_FAILURE
;
844 const char *server_name
= cli
->desthost
;
845 struct DcSitesCtr
*ctr
= NULL
;
846 struct dcerpc_binding_handle
*b
= cli
->binding_handle
;
848 if (argc
< 1 || argc
> 3) {
849 fprintf(stderr
, "Usage: %s <server_name>\n", argv
[0]);
854 server_name
= argv
[1];
857 status
= dcerpc_netr_DsrGetDcSiteCoverageW(b
, mem_ctx
,
861 if (!NT_STATUS_IS_OK(status
)) {
862 werr
= ntstatus_to_werror(status
);
866 if (W_ERROR_IS_OK(werr
) && ctr
->num_sites
) {
868 printf("sites covered by this DC: %d\n", ctr
->num_sites
);
869 for (i
=0; i
<ctr
->num_sites
; i
++) {
870 printf("%s\n", ctr
->sites
[i
].string
);
877 static NTSTATUS
cmd_netlogon_capabilities(struct rpc_pipe_client
*cli
,
878 TALLOC_CTX
*mem_ctx
, int argc
,
881 struct netlogon_creds_cli_lck
*lck
;
882 union netr_Capabilities capabilities
;
886 fprintf(stderr
, "Usage: %s\n", argv
[0]);
890 status
= netlogon_creds_cli_lck(rpcclient_netlogon_creds
,
891 NETLOGON_CREDS_CLI_LCK_EXCLUSIVE
,
893 if (!NT_STATUS_IS_OK(status
)) {
894 fprintf(stderr
, "netlogon_creds_cli_lck failed: %s\n",
899 status
= netlogon_creds_cli_check(rpcclient_netlogon_creds
,
902 if (!NT_STATUS_IS_OK(status
)) {
903 fprintf(stderr
, "netlogon_creds_cli_check failed: %s\n",
910 printf("capabilities: 0x%08x\n", capabilities
.server_capabilities
);
915 /* List of commands exported by this module */
917 struct cmd_set netlogon_commands
[] = {
921 { "logonctrl2", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_logon_ctrl2
, &ndr_table_netlogon
, NULL
, "Logon Control 2", "" },
922 { "getanydcname", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_getanydcname
, &ndr_table_netlogon
, NULL
, "Get trusted DC name", "" },
923 { "getdcname", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_getdcname
, &ndr_table_netlogon
, NULL
, "Get trusted PDC name", "" },
924 { "dsr_getdcname", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_dsr_getdcname
, &ndr_table_netlogon
, NULL
, "Get trusted DC name", "" },
925 { "dsr_getdcnameex", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_dsr_getdcnameex
, &ndr_table_netlogon
, NULL
, "Get trusted DC name", "" },
926 { "dsr_getdcnameex2", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_dsr_getdcnameex2
, &ndr_table_netlogon
, NULL
, "Get trusted DC name", "" },
927 { "dsr_getsitename", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_dsr_getsitename
, &ndr_table_netlogon
, NULL
, "Get sitename", "" },
928 { "dsr_getforesttrustinfo", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_dsr_getforesttrustinfo
, &ndr_table_netlogon
, NULL
, "Get Forest Trust Info", "" },
929 { "logonctrl", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_logon_ctrl
, &ndr_table_netlogon
, NULL
, "Logon Control", "" },
930 { "samlogon", RPC_RTYPE_NTSTATUS
, cmd_netlogon_sam_logon
, NULL
, &ndr_table_netlogon
, NULL
, "Sam Logon", "", .use_netlogon_creds
= true, },
931 { "change_trust_pw", RPC_RTYPE_NTSTATUS
, cmd_netlogon_change_trust_pw
, NULL
, &ndr_table_netlogon
, NULL
, "Change Trust Account Password", "", .use_netlogon_creds
= true, },
932 { "gettrustrid", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_gettrustrid
, &ndr_table_netlogon
, NULL
, "Get trust rid", "" },
933 { "dsr_enumtrustdom", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_dsr_enumtrustdom
, &ndr_table_netlogon
, NULL
, "Enumerate trusted domains", "" },
934 { "dsenumdomtrusts", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_dsr_enumtrustdom
, &ndr_table_netlogon
, NULL
, "Enumerate all trusted domains in an AD forest", "" },
935 { "deregisterdnsrecords", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_deregisterdnsrecords
, &ndr_table_netlogon
, NULL
, "Deregister DNS records", "" },
936 { "netrenumtrusteddomains", RPC_RTYPE_NTSTATUS
, cmd_netlogon_enumtrusteddomains
, NULL
, &ndr_table_netlogon
, NULL
, "Enumerate trusted domains", "" },
937 { "netrenumtrusteddomainsex", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_enumtrusteddomainsex
, &ndr_table_netlogon
, NULL
, "Enumerate trusted domains", "" },
938 { "getdcsitecoverage", RPC_RTYPE_WERROR
, NULL
, cmd_netlogon_getdcsitecoverage
, &ndr_table_netlogon
, NULL
, "Get the Site-Coverage from a DC", "" },
939 { "capabilities", RPC_RTYPE_NTSTATUS
, cmd_netlogon_capabilities
, NULL
, &ndr_table_netlogon
, NULL
, "Return Capabilities", "", .use_netlogon_creds
= true, },