winbind: Correcly pass !authoritative from wb_irpc_SamLogon
[Samba.git] / source4 / rpc_server / handles.c
blobaf49f4caf1c5cf718855da6e4e074dd25c3491bc
1 /*
2 Unix SMB/CIFS implementation.
4 server side dcerpc handle code
6 Copyright (C) Andrew Tridgell 2003
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "../lib/util/dlinklist.h"
24 #include "rpc_server/dcerpc_server.h"
25 #include "libcli/security/security.h"
26 #include "auth/session.h"
29 destroy a rpc handle
31 static int dcesrv_handle_destructor(struct dcesrv_handle *h)
33 DLIST_REMOVE(h->assoc_group->handles, h);
34 return 0;
39 allocate a new rpc handle
41 _PUBLIC_ struct dcesrv_handle *dcesrv_handle_new(struct dcesrv_connection_context *context,
42 uint8_t handle_type)
44 struct dcesrv_handle *h;
45 struct dom_sid *sid;
48 * For simplicty, ensure we abort here for an interface that has no handles (programmer error)
50 SMB_ASSERT((context->iface->flags & DCESRV_INTERFACE_FLAGS_HANDLES_NOT_USED) == 0);
52 sid = &context->conn->auth_state.session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
54 h = talloc_zero(context->conn->assoc_group, struct dcesrv_handle);
55 if (!h) {
56 return NULL;
58 h->data = NULL;
59 h->sid = dom_sid_dup(h, sid);
60 if (h->sid == NULL) {
61 talloc_free(h);
62 return NULL;
64 h->assoc_group = context->conn->assoc_group;
65 h->iface = context->iface;
66 h->wire_handle.handle_type = handle_type;
67 h->wire_handle.uuid = GUID_random();
69 DLIST_ADD(context->conn->assoc_group->handles, h);
71 talloc_set_destructor(h, dcesrv_handle_destructor);
73 return h;
76 /**
77 find an internal handle given a wire handle. If the wire handle is NULL then
78 allocate a new handle
80 _PUBLIC_ struct dcesrv_handle *dcesrv_handle_fetch(
81 struct dcesrv_connection_context *context,
82 struct policy_handle *p,
83 uint8_t handle_type)
85 struct dcesrv_handle *h;
86 struct dom_sid *sid;
89 * For simplicty, ensure we abort here for an interface that has no handles (programmer error)
91 SMB_ASSERT((context->iface->flags & DCESRV_INTERFACE_FLAGS_HANDLES_NOT_USED) == 0);
93 sid = &context->conn->auth_state.session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
95 if (ndr_policy_handle_empty(p)) {
96 /* TODO: we should probably return a NULL handle here */
97 return dcesrv_handle_new(context, handle_type);
100 for (h=context->conn->assoc_group->handles; h; h=h->next) {
101 if (h->wire_handle.handle_type == p->handle_type &&
102 GUID_equal(&p->uuid, &h->wire_handle.uuid)) {
103 if (handle_type != DCESRV_HANDLE_ANY &&
104 p->handle_type != handle_type) {
105 DEBUG(0,("client gave us the wrong handle type (%d should be %d)\n",
106 p->handle_type, handle_type));
107 return NULL;
109 if (!dom_sid_equal(h->sid, sid)) {
110 DEBUG(0,(__location__ ": Attempt to use invalid sid %s - %s\n",
111 dom_sid_string(context, h->sid),
112 dom_sid_string(context, sid)));
113 return NULL;
115 if (h->iface != context->iface) {
116 DEBUG(0,(__location__ ": Attempt to use invalid iface\n"));
117 return NULL;
119 return h;
123 return NULL;