libnet_dssync: use ctr[1|6]->more_data
[Samba.git] / source / libnet / libnet_dssync.c
bloba251e418f9e14c8716b9f03748dd87877a88e6b9
1 /*
2 Unix SMB/CIFS implementation.
4 Copyright (C) Stefan (metze) Metzmacher 2005
5 Copyright (C) Guenther Deschner 2008
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "libnet/libnet_dssync.h"
25 /****************************************************************
26 ****************************************************************/
28 static int libnet_dssync_free_context(struct dssync_context *ctx)
30 if (!ctx) {
31 return 0;
34 if (is_valid_policy_hnd(&ctx->bind_handle) && ctx->cli) {
35 rpccli_drsuapi_DsUnbind(ctx->cli, ctx, &ctx->bind_handle, NULL);
38 return 0;
41 /****************************************************************
42 ****************************************************************/
44 NTSTATUS libnet_dssync_init_context(TALLOC_CTX *mem_ctx,
45 struct dssync_context **ctx_p)
47 struct dssync_context *ctx;
49 ctx = TALLOC_ZERO_P(mem_ctx, struct dssync_context);
50 NT_STATUS_HAVE_NO_MEMORY(ctx);
52 talloc_set_destructor(ctx, libnet_dssync_free_context);
54 *ctx_p = ctx;
56 return NT_STATUS_OK;
59 /****************************************************************
60 ****************************************************************/
62 static DATA_BLOB *decrypt_attr_val(TALLOC_CTX *mem_ctx,
63 DATA_BLOB *session_key,
64 uint32_t rid,
65 enum drsuapi_DsAttributeId id,
66 DATA_BLOB *raw_data)
68 bool rcrypt = false;
69 DATA_BLOB out_data;
71 ZERO_STRUCT(out_data);
73 switch (id) {
74 case DRSUAPI_ATTRIBUTE_dBCSPwd:
75 case DRSUAPI_ATTRIBUTE_unicodePwd:
76 case DRSUAPI_ATTRIBUTE_ntPwdHistory:
77 case DRSUAPI_ATTRIBUTE_lmPwdHistory:
78 rcrypt = true;
79 break;
80 case DRSUAPI_ATTRIBUTE_supplementalCredentials:
81 case DRSUAPI_ATTRIBUTE_priorValue:
82 case DRSUAPI_ATTRIBUTE_currentValue:
83 case DRSUAPI_ATTRIBUTE_trustAuthOutgoing:
84 case DRSUAPI_ATTRIBUTE_trustAuthIncoming:
85 case DRSUAPI_ATTRIBUTE_initialAuthOutgoing:
86 case DRSUAPI_ATTRIBUTE_initialAuthIncoming:
87 break;
88 default:
89 return raw_data;
92 out_data = decrypt_drsuapi_blob(mem_ctx, session_key, rcrypt,
93 rid, raw_data);
95 if (out_data.length) {
96 return (DATA_BLOB *)talloc_memdup(mem_ctx, &out_data, sizeof(DATA_BLOB));
99 return raw_data;
102 /****************************************************************
103 ****************************************************************/
105 static void parse_obj_identifier(struct drsuapi_DsReplicaObjectIdentifier *id,
106 uint32_t *rid)
108 if (!id || !rid) {
109 return;
112 *rid = 0;
114 if (id->sid.num_auths > 0) {
115 *rid = id->sid.sub_auths[id->sid.num_auths - 1];
119 /****************************************************************
120 ****************************************************************/
122 static void parse_obj_attribute(TALLOC_CTX *mem_ctx,
123 DATA_BLOB *session_key,
124 uint32_t rid,
125 struct drsuapi_DsReplicaAttribute *attr)
127 int i = 0;
129 for (i=0; i<attr->value_ctr.num_values; i++) {
131 DATA_BLOB *plain_data = NULL;
133 plain_data = decrypt_attr_val(mem_ctx,
134 session_key,
135 rid,
136 attr->attid,
137 attr->value_ctr.values[i].blob);
139 attr->value_ctr.values[i].blob = plain_data;
143 /****************************************************************
144 ****************************************************************/
146 static void libnet_dssync_decrypt_attributes(TALLOC_CTX *mem_ctx,
147 DATA_BLOB *session_key,
148 struct drsuapi_DsReplicaObjectListItemEx *cur)
150 for (; cur; cur = cur->next_object) {
152 uint32_t i;
153 uint32_t rid = 0;
155 parse_obj_identifier(cur->object.identifier, &rid);
157 for (i=0; i < cur->object.attribute_ctr.num_attributes; i++) {
159 struct drsuapi_DsReplicaAttribute *attr;
161 attr = &cur->object.attribute_ctr.attributes[i];
163 if (attr->value_ctr.num_values < 1) {
164 continue;
167 if (!attr->value_ctr.values[0].blob) {
168 continue;
171 parse_obj_attribute(mem_ctx,
172 session_key,
173 rid,
174 attr);
178 /****************************************************************
179 ****************************************************************/
181 static NTSTATUS libnet_dssync_bind(TALLOC_CTX *mem_ctx,
182 struct dssync_context *ctx)
184 NTSTATUS status;
185 WERROR werr;
187 struct GUID bind_guid;
188 struct drsuapi_DsBindInfoCtr bind_info;
189 struct drsuapi_DsBindInfo28 info28;
191 ZERO_STRUCT(info28);
193 GUID_from_string(DRSUAPI_DS_BIND_GUID, &bind_guid);
195 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_BASE;
196 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_ASYNC_REPLICATION;
197 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_REMOVEAPI;
198 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_MOVEREQ_V2;
199 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GETCHG_COMPRESS;
200 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V1;
201 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_RESTORE_USN_OPTIMIZATION;
202 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_KCC_EXECUTE;
203 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_ADDENTRY_V2;
204 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_LINKED_VALUE_REPLICATION;
205 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V2;
206 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_INSTANCE_TYPE_NOT_REQ_ON_MOD;
207 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_CRYPTO_BIND;
208 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GET_REPL_INFO;
209 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_STRONG_ENCRYPTION;
210 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_DCINFO_V01;
211 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_TRANSITIVE_MEMBERSHIP;
212 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_ADD_SID_HISTORY;
213 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_POST_BETA3;
214 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GET_MEMBERSHIPS2;
215 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V6;
216 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_NONDOMAIN_NCS;
217 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREQ_V8;
218 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V5;
219 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V6;
220 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_ADDENTRYREPLY_V3;
221 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_GETCHGREPLY_V7;
222 info28.supported_extensions |= DRSUAPI_SUPPORTED_EXTENSION_VERIFY_OBJECT;
223 info28.site_guid = GUID_zero();
224 info28.u1 = 508;
225 info28.repl_epoch = 0;
227 bind_info.length = 28;
228 bind_info.info.info28 = info28;
230 status = rpccli_drsuapi_DsBind(ctx->cli, mem_ctx,
231 &bind_guid,
232 &bind_info,
233 &ctx->bind_handle,
234 &werr);
236 if (!NT_STATUS_IS_OK(status)) {
237 return status;
240 if (!W_ERROR_IS_OK(werr)) {
241 return werror_to_ntstatus(werr);
244 return status;
247 /****************************************************************
248 ****************************************************************/
250 static NTSTATUS libnet_dssync_lookup_nc(TALLOC_CTX *mem_ctx,
251 struct dssync_context *ctx)
253 NTSTATUS status;
254 WERROR werr;
255 int32_t level = 1;
256 union drsuapi_DsNameRequest req;
257 int32_t level_out;
258 struct drsuapi_DsNameString names[1];
259 union drsuapi_DsNameCtr ctr;
261 names[0].str = talloc_asprintf(mem_ctx, "%s\\", ctx->domain_name);
262 NT_STATUS_HAVE_NO_MEMORY(names[0].str);
264 req.req1.codepage = 1252; /* german */
265 req.req1.language = 0x00000407; /* german */
266 req.req1.count = 1;
267 req.req1.names = names;
268 req.req1.format_flags = DRSUAPI_DS_NAME_FLAG_NO_FLAGS;
269 req.req1.format_offered = DRSUAPI_DS_NAME_FORMAT_UKNOWN;
270 req.req1.format_desired = DRSUAPI_DS_NAME_FORMAT_FQDN_1779;
272 status = rpccli_drsuapi_DsCrackNames(ctx->cli, mem_ctx,
273 &ctx->bind_handle,
274 level,
275 &req,
276 &level_out,
277 &ctr,
278 &werr);
279 if (!NT_STATUS_IS_OK(status)) {
280 ctx->error_message = talloc_asprintf(mem_ctx,
281 "Failed to lookup DN for domain name: %s",
282 get_friendly_werror_msg(werr));
283 return status;
286 if (!W_ERROR_IS_OK(werr)) {
287 return werror_to_ntstatus(werr);
290 if (ctr.ctr1->count != 1) {
291 return NT_STATUS_UNSUCCESSFUL;
294 if (ctr.ctr1->array[0].status != DRSUAPI_DS_NAME_STATUS_OK) {
295 return NT_STATUS_UNSUCCESSFUL;
298 ctx->nc_dn = talloc_strdup(mem_ctx, ctr.ctr1->array[0].result_name);
299 NT_STATUS_HAVE_NO_MEMORY(ctx->nc_dn);
301 if (!ctx->dns_domain_name) {
302 ctx->dns_domain_name = talloc_strdup_upper(mem_ctx,
303 ctr.ctr1->array[0].dns_domain_name);
304 NT_STATUS_HAVE_NO_MEMORY(ctx->dns_domain_name);
307 return NT_STATUS_OK;
310 /****************************************************************
311 ****************************************************************/
313 static NTSTATUS libnet_dssync_init(TALLOC_CTX *mem_ctx,
314 struct dssync_context *ctx)
316 NTSTATUS status;
318 status = libnet_dssync_bind(mem_ctx, ctx);
319 if (!NT_STATUS_IS_OK(status)) {
320 return status;
323 if (!ctx->nc_dn) {
324 status = libnet_dssync_lookup_nc(mem_ctx, ctx);
327 return status;
330 /****************************************************************
331 ****************************************************************/
333 static NTSTATUS libnet_dssync_process(TALLOC_CTX *mem_ctx,
334 struct dssync_context *ctx)
336 NTSTATUS status;
337 WERROR werr;
339 int32_t level = 8;
340 int32_t level_out = 0;
341 union drsuapi_DsGetNCChangesRequest req;
342 union drsuapi_DsGetNCChangesCtr ctr;
343 struct drsuapi_DsReplicaObjectIdentifier nc;
344 struct dom_sid null_sid;
346 struct drsuapi_DsGetNCChangesCtr1 *ctr1 = NULL;
347 struct drsuapi_DsGetNCChangesCtr6 *ctr6 = NULL;
348 int32_t out_level = 0;
349 int y;
351 ZERO_STRUCT(null_sid);
352 ZERO_STRUCT(req);
354 nc.dn = ctx->nc_dn;
355 nc.guid = GUID_zero();
356 nc.sid = null_sid;
358 req.req8.naming_context = &nc;
359 req.req8.replica_flags = DRSUAPI_DS_REPLICA_NEIGHBOUR_WRITEABLE |
360 DRSUAPI_DS_REPLICA_NEIGHBOUR_SYNC_ON_STARTUP |
361 DRSUAPI_DS_REPLICA_NEIGHBOUR_DO_SCHEDULED_SYNCS |
362 DRSUAPI_DS_REPLICA_NEIGHBOUR_RETURN_OBJECT_PARENTS |
363 DRSUAPI_DS_REPLICA_NEIGHBOUR_NEVER_SYNCED;
364 req.req8.max_object_count = 402;
365 req.req8.max_ndr_size = 402116;
367 for (y=0; ;y++) {
369 bool last_query = true;
371 if (level == 8) {
372 DEBUG(1,("start[%d] tmp_higest_usn: %llu , highest_usn: %llu\n",y,
373 (long long)req.req8.highwatermark.tmp_highest_usn,
374 (long long)req.req8.highwatermark.highest_usn));
377 status = rpccli_drsuapi_DsGetNCChanges(ctx->cli, mem_ctx,
378 &ctx->bind_handle,
379 level,
380 &req,
381 &level_out,
382 &ctr,
383 &werr);
384 if (!NT_STATUS_IS_OK(status)) {
385 ctx->error_message = talloc_asprintf(mem_ctx,
386 "Failed to get NC Changes: %s",
387 get_friendly_werror_msg(werr));
388 goto out;
391 if (!W_ERROR_IS_OK(werr)) {
392 status = werror_to_ntstatus(werr);
393 goto out;
396 if (level_out == 1) {
397 out_level = 1;
398 ctr1 = &ctr.ctr1;
399 } else if (level_out == 2) {
400 out_level = 1;
401 ctr1 = ctr.ctr2.ctr.mszip1.ctr1;
404 status = cli_get_session_key(mem_ctx, ctx->cli, &ctx->session_key);
405 if (!NT_STATUS_IS_OK(status)) {
406 ctx->error_message = talloc_asprintf(mem_ctx,
407 "Failed to get Session Key: %s",
408 nt_errstr(status));
409 return status;
412 if (out_level == 1) {
413 DEBUG(1,("end[%d] tmp_highest_usn: %llu , highest_usn: %llu\n",y,
414 (long long)ctr1->new_highwatermark.tmp_highest_usn,
415 (long long)ctr1->new_highwatermark.highest_usn));
417 libnet_dssync_decrypt_attributes(mem_ctx,
418 &ctx->session_key,
419 ctr1->first_object);
421 if (ctr1->more_data) {
422 req.req5.highwatermark = ctr1->new_highwatermark;
423 last_query = false;
426 if (ctx->processing_fn) {
427 status = ctx->processing_fn(mem_ctx,
428 ctr1->first_object,
429 &ctr1->mapping_ctr,
430 last_query,
431 ctx);
432 if (!NT_STATUS_IS_OK(status)) {
433 ctx->error_message = talloc_asprintf(mem_ctx,
434 "Failed to call processing function: %s",
435 nt_errstr(status));
436 goto out;
440 if (!last_query) {
441 continue;
445 if (level_out == 6) {
446 out_level = 6;
447 ctr6 = &ctr.ctr6;
448 } else if (level_out == 7
449 && ctr.ctr7.level == 6
450 && ctr.ctr7.type == DRSUAPI_COMPRESSION_TYPE_MSZIP) {
451 out_level = 6;
452 ctr6 = ctr.ctr7.ctr.mszip6.ctr6;
455 if (out_level == 6) {
456 DEBUG(1,("end[%d] tmp_highest_usn: %llu , highest_usn: %llu\n",y,
457 (long long)ctr6->new_highwatermark.tmp_highest_usn,
458 (long long)ctr6->new_highwatermark.highest_usn));
460 libnet_dssync_decrypt_attributes(mem_ctx,
461 &ctx->session_key,
462 ctr6->first_object);
464 if (ctr6->more_data) {
465 req.req8.highwatermark = ctr6->new_highwatermark;
466 last_query = false;
469 if (ctx->processing_fn) {
470 status = ctx->processing_fn(mem_ctx,
471 ctr6->first_object,
472 &ctr6->mapping_ctr,
473 last_query,
474 ctx);
475 if (!NT_STATUS_IS_OK(status)) {
476 ctx->error_message = talloc_asprintf(mem_ctx,
477 "Failed to call processing function: %s",
478 nt_errstr(status));
479 goto out;
483 if (!last_query) {
484 continue;
488 break;
491 out:
492 return status;
495 /****************************************************************
496 ****************************************************************/
498 NTSTATUS libnet_dssync(TALLOC_CTX *mem_ctx,
499 struct dssync_context *ctx)
501 NTSTATUS status;
503 status = libnet_dssync_init(mem_ctx, ctx);
504 if (!NT_STATUS_IS_OK(status)) {
505 goto out;
508 status = libnet_dssync_process(mem_ctx, ctx);
509 if (!NT_STATUS_IS_OK(status)) {
510 goto out;
513 out:
514 return status;