2 * Unix SMB/CIFS implementation.
4 * Copyright (C) Guenther Deschner 2008
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/libnetapi.h"
23 #include "lib/netapi/netapi.h"
24 #include "lib/netapi/netapi_private.h"
25 #include "lib/netapi/libnetapi.h"
27 /****************************************************************
28 ****************************************************************/
30 static void convert_USER_INFO_X_to_samr_user_info21(struct USER_INFO_X
*infoX
,
31 struct samr_UserInfo21
*info21
)
33 uint32_t fields_present
= 0;
34 struct samr_LogonHours zero_logon_hours
;
35 struct lsa_BinaryString zero_parameters
;
39 ZERO_STRUCT(zero_logon_hours
);
40 ZERO_STRUCT(zero_parameters
);
42 if (infoX
->usriX_flags
) {
43 fields_present
|= SAMR_FIELD_ACCT_FLAGS
;
45 if (infoX
->usriX_name
) {
46 fields_present
|= SAMR_FIELD_ACCOUNT_NAME
;
48 if (infoX
->usriX_password
) {
49 fields_present
|= SAMR_FIELD_NT_PASSWORD_PRESENT
;
51 if (infoX
->usriX_flags
) {
52 fields_present
|= SAMR_FIELD_ACCT_FLAGS
;
54 if (infoX
->usriX_name
) {
55 fields_present
|= SAMR_FIELD_FULL_NAME
;
57 if (infoX
->usriX_home_dir
) {
58 fields_present
|= SAMR_FIELD_HOME_DIRECTORY
;
60 if (infoX
->usriX_script_path
) {
61 fields_present
|= SAMR_FIELD_LOGON_SCRIPT
;
63 if (infoX
->usriX_comment
) {
64 fields_present
|= SAMR_FIELD_DESCRIPTION
;
66 if (infoX
->usriX_password_age
) {
67 fields_present
|= SAMR_FIELD_FORCE_PWD_CHANGE
;
69 if (infoX
->usriX_full_name
) {
70 fields_present
|= SAMR_FIELD_FULL_NAME
;
72 if (infoX
->usriX_usr_comment
) {
73 fields_present
|= SAMR_FIELD_COMMENT
;
75 if (infoX
->usriX_profile
) {
76 fields_present
|= SAMR_FIELD_PROFILE_PATH
;
78 if (infoX
->usriX_home_dir_drive
) {
79 fields_present
|= SAMR_FIELD_HOME_DRIVE
;
81 if (infoX
->usriX_primary_group_id
) {
82 fields_present
|= SAMR_FIELD_PRIMARY_GID
;
84 if (infoX
->usriX_country_code
) {
85 fields_present
|= SAMR_FIELD_COUNTRY_CODE
;
87 if (infoX
->usriX_workstations
) {
88 fields_present
|= SAMR_FIELD_WORKSTATIONS
;
91 unix_to_nt_time_abs(&password_age
, infoX
->usriX_password_age
);
93 /* TODO: infoX->usriX_priv */
94 init_samr_user_info21(info21
,
102 infoX
->usriX_full_name
,
103 infoX
->usriX_home_dir
,
104 infoX
->usriX_home_dir_drive
,
105 infoX
->usriX_script_path
,
106 infoX
->usriX_profile
,
107 infoX
->usriX_comment
,
108 infoX
->usriX_workstations
,
109 infoX
->usriX_usr_comment
,
111 infoX
->usriX_user_id
,
112 infoX
->usriX_primary_group_id
,
116 infoX
->usriX_bad_pw_count
,
117 infoX
->usriX_num_logons
,
118 infoX
->usriX_country_code
,
119 infoX
->usriX_code_page
,
122 infoX
->usriX_password_expired
);
125 /****************************************************************
126 ****************************************************************/
128 static NTSTATUS
construct_USER_INFO_X(uint32_t level
,
130 struct USER_INFO_X
*uX
)
132 struct USER_INFO_0
*u0
= NULL
;
133 struct USER_INFO_1
*u1
= NULL
;
134 struct USER_INFO_2
*u2
= NULL
;
135 struct USER_INFO_3
*u3
= NULL
;
136 struct USER_INFO_1003
*u1003
= NULL
;
137 struct USER_INFO_1006
*u1006
= NULL
;
138 struct USER_INFO_1007
*u1007
= NULL
;
139 struct USER_INFO_1009
*u1009
= NULL
;
140 struct USER_INFO_1011
*u1011
= NULL
;
141 struct USER_INFO_1012
*u1012
= NULL
;
142 struct USER_INFO_1014
*u1014
= NULL
;
143 struct USER_INFO_1024
*u1024
= NULL
;
144 struct USER_INFO_1051
*u1051
= NULL
;
145 struct USER_INFO_1052
*u1052
= NULL
;
146 struct USER_INFO_1053
*u1053
= NULL
;
148 if (!buffer
|| !uX
) {
149 return NT_STATUS_INVALID_PARAMETER
;
156 u0
= (struct USER_INFO_0
*)buffer
;
157 uX
->usriX_name
= u0
->usri0_name
;
160 u1
= (struct USER_INFO_1
*)buffer
;
161 uX
->usriX_name
= u1
->usri1_name
;
162 uX
->usriX_password
= u1
->usri1_password
;
163 uX
->usriX_password_age
= u1
->usri1_password_age
;
164 uX
->usriX_priv
= u1
->usri1_priv
;
165 uX
->usriX_home_dir
= u1
->usri1_home_dir
;
166 uX
->usriX_comment
= u1
->usri1_comment
;
167 uX
->usriX_flags
= u1
->usri1_flags
;
168 uX
->usriX_script_path
= u1
->usri1_script_path
;
171 u2
= (struct USER_INFO_2
*)buffer
;
172 uX
->usriX_name
= u2
->usri2_name
;
173 uX
->usriX_password
= u2
->usri2_password
;
174 uX
->usriX_password_age
= u2
->usri2_password_age
;
175 uX
->usriX_priv
= u2
->usri2_priv
;
176 uX
->usriX_home_dir
= u2
->usri2_home_dir
;
177 uX
->usriX_comment
= u2
->usri2_comment
;
178 uX
->usriX_flags
= u2
->usri2_flags
;
179 uX
->usriX_script_path
= u2
->usri2_script_path
;
180 uX
->usriX_auth_flags
= u2
->usri2_auth_flags
;
181 uX
->usriX_full_name
= u2
->usri2_full_name
;
182 uX
->usriX_usr_comment
= u2
->usri2_usr_comment
;
183 uX
->usriX_parms
= u2
->usri2_parms
;
184 uX
->usriX_workstations
= u2
->usri2_workstations
;
185 uX
->usriX_last_logon
= u2
->usri2_last_logon
;
186 uX
->usriX_last_logoff
= u2
->usri2_last_logoff
;
187 uX
->usriX_acct_expires
= u2
->usri2_acct_expires
;
188 uX
->usriX_max_storage
= u2
->usri2_max_storage
;
189 uX
->usriX_units_per_week
= u2
->usri2_units_per_week
;
190 uX
->usriX_logon_hours
= u2
->usri2_logon_hours
;
191 uX
->usriX_bad_pw_count
= u2
->usri2_bad_pw_count
;
192 uX
->usriX_num_logons
= u2
->usri2_num_logons
;
193 uX
->usriX_logon_server
= u2
->usri2_logon_server
;
194 uX
->usriX_country_code
= u2
->usri2_country_code
;
195 uX
->usriX_code_page
= u2
->usri2_code_page
;
198 u3
= (struct USER_INFO_3
*)buffer
;
199 uX
->usriX_name
= u3
->usri3_name
;
200 uX
->usriX_password_age
= u3
->usri3_password_age
;
201 uX
->usriX_priv
= u3
->usri3_priv
;
202 uX
->usriX_home_dir
= u3
->usri3_home_dir
;
203 uX
->usriX_comment
= u3
->usri3_comment
;
204 uX
->usriX_flags
= u3
->usri3_flags
;
205 uX
->usriX_script_path
= u3
->usri3_script_path
;
206 uX
->usriX_auth_flags
= u3
->usri3_auth_flags
;
207 uX
->usriX_full_name
= u3
->usri3_full_name
;
208 uX
->usriX_usr_comment
= u3
->usri3_usr_comment
;
209 uX
->usriX_parms
= u3
->usri3_parms
;
210 uX
->usriX_workstations
= u3
->usri3_workstations
;
211 uX
->usriX_last_logon
= u3
->usri3_last_logon
;
212 uX
->usriX_last_logoff
= u3
->usri3_last_logoff
;
213 uX
->usriX_acct_expires
= u3
->usri3_acct_expires
;
214 uX
->usriX_max_storage
= u3
->usri3_max_storage
;
215 uX
->usriX_units_per_week
= u3
->usri3_units_per_week
;
216 uX
->usriX_logon_hours
= u3
->usri3_logon_hours
;
217 uX
->usriX_bad_pw_count
= u3
->usri3_bad_pw_count
;
218 uX
->usriX_num_logons
= u3
->usri3_num_logons
;
219 uX
->usriX_logon_server
= u3
->usri3_logon_server
;
220 uX
->usriX_country_code
= u3
->usri3_country_code
;
221 uX
->usriX_code_page
= u3
->usri3_code_page
;
222 uX
->usriX_user_id
= u3
->usri3_user_id
;
223 uX
->usriX_primary_group_id
= u3
->usri3_primary_group_id
;
224 uX
->usriX_profile
= u3
->usri3_profile
;
225 uX
->usriX_home_dir_drive
= u3
->usri3_home_dir_drive
;
226 uX
->usriX_password_expired
= u3
->usri3_password_expired
;
229 u1003
= (struct USER_INFO_1003
*)buffer
;
230 uX
->usriX_password
= u1003
->usri1003_password
;
233 u1006
= (struct USER_INFO_1006
*)buffer
;
234 uX
->usriX_home_dir
= u1006
->usri1006_home_dir
;
237 u1007
= (struct USER_INFO_1007
*)buffer
;
238 uX
->usriX_comment
= u1007
->usri1007_comment
;
241 u1009
= (struct USER_INFO_1009
*)buffer
;
242 uX
->usriX_script_path
= u1009
->usri1009_script_path
;
245 u1011
= (struct USER_INFO_1011
*)buffer
;
246 uX
->usriX_full_name
= u1011
->usri1011_full_name
;
249 u1012
= (struct USER_INFO_1012
*)buffer
;
250 uX
->usriX_usr_comment
= u1012
->usri1012_usr_comment
;
253 u1014
= (struct USER_INFO_1014
*)buffer
;
254 uX
->usriX_workstations
= u1014
->usri1014_workstations
;
257 u1024
= (struct USER_INFO_1024
*)buffer
;
258 uX
->usriX_country_code
= u1024
->usri1024_country_code
;
261 u1051
= (struct USER_INFO_1051
*)buffer
;
262 uX
->usriX_primary_group_id
= u1051
->usri1051_primary_group_id
;
265 u1052
= (struct USER_INFO_1052
*)buffer
;
266 uX
->usriX_profile
= u1052
->usri1052_profile
;
269 u1053
= (struct USER_INFO_1053
*)buffer
;
270 uX
->usriX_home_dir_drive
= u1053
->usri1053_home_dir_drive
;
274 return NT_STATUS_INVALID_INFO_CLASS
;
280 /****************************************************************
281 ****************************************************************/
283 static NTSTATUS
set_user_info_USER_INFO_X(TALLOC_CTX
*ctx
,
284 struct rpc_pipe_client
*pipe_cli
,
285 DATA_BLOB
*session_key
,
286 struct policy_handle
*user_handle
,
287 struct USER_INFO_X
*uX
)
289 union samr_UserInfo user_info
;
290 struct samr_UserInfo21 info21
;
294 return NT_STATUS_INVALID_PARAMETER
;
297 convert_USER_INFO_X_to_samr_user_info21(uX
, &info21
);
299 ZERO_STRUCT(user_info
);
301 if (uX
->usriX_password
) {
303 user_info
.info25
.info
= info21
;
305 init_samr_CryptPasswordEx(uX
->usriX_password
,
307 &user_info
.info25
.password
);
309 status
= rpccli_samr_SetUserInfo2(pipe_cli
, ctx
,
314 if (NT_STATUS_EQUAL(status
, NT_STATUS(DCERPC_FAULT_INVALID_TAG
))) {
316 user_info
.info23
.info
= info21
;
318 init_samr_CryptPassword(uX
->usriX_password
,
320 &user_info
.info23
.password
);
322 status
= rpccli_samr_SetUserInfo2(pipe_cli
, ctx
,
329 user_info
.info21
= info21
;
331 status
= rpccli_samr_SetUserInfo(pipe_cli
, ctx
,
340 /****************************************************************
341 ****************************************************************/
343 WERROR
NetUserAdd_r(struct libnetapi_ctx
*ctx
,
344 struct NetUserAdd
*r
)
346 struct cli_state
*cli
= NULL
;
347 struct rpc_pipe_client
*pipe_cli
= NULL
;
350 POLICY_HND connect_handle
, domain_handle
, user_handle
;
351 struct lsa_String lsa_account_name
;
352 struct dom_sid2
*domain_sid
= NULL
;
353 union samr_UserInfo
*user_info
= NULL
;
354 struct samr_PwInfo pw_info
;
355 uint32_t access_granted
= 0;
357 struct USER_INFO_X uX
;
359 ZERO_STRUCT(connect_handle
);
360 ZERO_STRUCT(domain_handle
);
361 ZERO_STRUCT(user_handle
);
364 return WERR_INVALID_PARAM
;
367 switch (r
->in
.level
) {
374 werr
= WERR_NOT_SUPPORTED
;
378 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
379 &ndr_table_samr
.syntax_id
,
382 if (!W_ERROR_IS_OK(werr
)) {
386 status
= construct_USER_INFO_X(r
->in
.level
, r
->in
.buffer
, &uX
);
387 if (!NT_STATUS_IS_OK(status
)) {
388 werr
= ntstatus_to_werror(status
);
392 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
393 SAMR_ACCESS_ENUM_DOMAINS
|
394 SAMR_ACCESS_LOOKUP_DOMAIN
,
395 SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1
|
396 SAMR_DOMAIN_ACCESS_CREATE_USER
|
397 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
401 if (!W_ERROR_IS_OK(werr
)) {
405 init_lsa_String(&lsa_account_name
, uX
.usriX_name
);
407 status
= rpccli_samr_CreateUser2(pipe_cli
, ctx
,
413 SAMR_USER_ACCESS_SET_PASSWORD
|
414 SAMR_USER_ACCESS_SET_ATTRIBUTES
|
415 SAMR_USER_ACCESS_GET_ATTRIBUTES
,
419 if (!NT_STATUS_IS_OK(status
)) {
420 werr
= ntstatus_to_werror(status
);
424 status
= rpccli_samr_QueryUserInfo(pipe_cli
, ctx
,
428 if (!NT_STATUS_IS_OK(status
)) {
429 werr
= ntstatus_to_werror(status
);
433 if (!(user_info
->info16
.acct_flags
& ACB_NORMAL
)) {
434 werr
= WERR_INVALID_PARAM
;
438 status
= rpccli_samr_GetUserPwInfo(pipe_cli
, ctx
,
441 if (!NT_STATUS_IS_OK(status
)) {
442 werr
= ntstatus_to_werror(status
);
446 uX
.usriX_flags
|= ACB_NORMAL
;
448 status
= set_user_info_USER_INFO_X(ctx
, pipe_cli
,
449 &cli
->user_session_key
,
452 if (!NT_STATUS_IS_OK(status
)) {
453 werr
= ntstatus_to_werror(status
);
461 rpccli_samr_DeleteUser(pipe_cli
, ctx
,
469 if (is_valid_policy_hnd(&user_handle
)) {
470 rpccli_samr_Close(pipe_cli
, ctx
, &user_handle
);
473 if (ctx
->disable_policy_handle_cache
) {
474 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
475 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
481 /****************************************************************
482 ****************************************************************/
484 WERROR
NetUserAdd_l(struct libnetapi_ctx
*ctx
,
485 struct NetUserAdd
*r
)
487 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserAdd
);
490 /****************************************************************
491 ****************************************************************/
493 WERROR
NetUserDel_r(struct libnetapi_ctx
*ctx
,
494 struct NetUserDel
*r
)
496 struct cli_state
*cli
= NULL
;
497 struct rpc_pipe_client
*pipe_cli
= NULL
;
500 POLICY_HND connect_handle
, builtin_handle
, domain_handle
, user_handle
;
501 struct lsa_String lsa_account_name
;
502 struct samr_Ids user_rids
, name_types
;
503 struct dom_sid2
*domain_sid
= NULL
;
504 struct dom_sid2 user_sid
;
506 ZERO_STRUCT(connect_handle
);
507 ZERO_STRUCT(builtin_handle
);
508 ZERO_STRUCT(domain_handle
);
509 ZERO_STRUCT(user_handle
);
511 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
512 &ndr_table_samr
.syntax_id
,
516 if (!W_ERROR_IS_OK(werr
)) {
520 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
521 SAMR_ACCESS_ENUM_DOMAINS
|
522 SAMR_ACCESS_LOOKUP_DOMAIN
,
523 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
527 if (!W_ERROR_IS_OK(werr
)) {
531 status
= rpccli_samr_OpenDomain(pipe_cli
, ctx
,
533 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
534 CONST_DISCARD(DOM_SID
*, &global_sid_Builtin
),
536 if (!NT_STATUS_IS_OK(status
)) {
537 werr
= ntstatus_to_werror(status
);
541 init_lsa_String(&lsa_account_name
, r
->in
.user_name
);
543 status
= rpccli_samr_LookupNames(pipe_cli
, ctx
,
549 if (!NT_STATUS_IS_OK(status
)) {
550 werr
= ntstatus_to_werror(status
);
554 status
= rpccli_samr_OpenUser(pipe_cli
, ctx
,
559 if (!NT_STATUS_IS_OK(status
)) {
560 werr
= ntstatus_to_werror(status
);
564 sid_compose(&user_sid
, domain_sid
, user_rids
.ids
[0]);
566 status
= rpccli_samr_RemoveMemberFromForeignDomain(pipe_cli
, ctx
,
569 if (!NT_STATUS_IS_OK(status
)) {
570 werr
= ntstatus_to_werror(status
);
574 status
= rpccli_samr_DeleteUser(pipe_cli
, ctx
,
576 if (!NT_STATUS_IS_OK(status
)) {
577 werr
= ntstatus_to_werror(status
);
588 if (is_valid_policy_hnd(&user_handle
)) {
589 rpccli_samr_Close(pipe_cli
, ctx
, &user_handle
);
592 if (ctx
->disable_policy_handle_cache
) {
593 libnetapi_samr_close_builtin_handle(ctx
, &builtin_handle
);
594 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
595 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
601 /****************************************************************
602 ****************************************************************/
604 WERROR
NetUserDel_l(struct libnetapi_ctx
*ctx
,
605 struct NetUserDel
*r
)
607 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserDel
);
610 /****************************************************************
611 ****************************************************************/
613 static NTSTATUS
libnetapi_samr_lookup_user(TALLOC_CTX
*mem_ctx
,
614 struct rpc_pipe_client
*pipe_cli
,
615 struct policy_handle
*domain_handle
,
616 struct policy_handle
*builtin_handle
,
617 const char *user_name
,
618 const struct dom_sid
*domain_sid
,
621 struct samr_UserInfo21
**info21
,
622 struct sec_desc_buf
**sec_desc
,
623 uint32_t *auth_flag_p
)
627 struct policy_handle user_handle
;
628 union samr_UserInfo
*user_info
= NULL
;
629 struct samr_RidWithAttributeArray
*rid_array
= NULL
;
630 uint32_t access_mask
= SEC_STD_READ_CONTROL
|
631 SAMR_USER_ACCESS_GET_ATTRIBUTES
|
632 SAMR_USER_ACCESS_GET_NAME_ETC
;
634 ZERO_STRUCT(user_handle
);
640 access_mask
|= SAMR_USER_ACCESS_GET_LOGONINFO
|
641 SAMR_USER_ACCESS_GET_GROUPS
;
647 access_mask
|= SAMR_USER_ACCESS_GET_LOGONINFO
|
648 SAMR_USER_ACCESS_GET_GROUPS
|
649 SAMR_USER_ACCESS_GET_LOCALE
;
656 return NT_STATUS_INVALID_LEVEL
;
663 status
= rpccli_samr_OpenUser(pipe_cli
, mem_ctx
,
668 if (!NT_STATUS_IS_OK(status
)) {
672 status
= rpccli_samr_QueryUserInfo(pipe_cli
, mem_ctx
,
676 if (!NT_STATUS_IS_OK(status
)) {
680 status
= rpccli_samr_QuerySecurity(pipe_cli
, mem_ctx
,
684 if (!NT_STATUS_IS_OK(status
)) {
688 if (access_mask
& SAMR_USER_ACCESS_GET_GROUPS
) {
690 struct lsa_SidArray sid_array
;
691 struct samr_Ids alias_rids
;
693 uint32_t auth_flag
= 0;
696 status
= rpccli_samr_GetGroupsForUser(pipe_cli
, mem_ctx
,
699 if (!NT_STATUS_IS_OK(status
)) {
703 sid_array
.num_sids
= rid_array
->count
+ 1;
704 sid_array
.sids
= talloc_array(mem_ctx
, struct lsa_SidPtr
,
706 NT_STATUS_HAVE_NO_MEMORY(sid_array
.sids
);
708 for (i
=0; i
<rid_array
->count
; i
++) {
709 sid_compose(&sid
, domain_sid
, rid_array
->rids
[i
].rid
);
710 sid_array
.sids
[i
].sid
= sid_dup_talloc(mem_ctx
, &sid
);
711 NT_STATUS_HAVE_NO_MEMORY(sid_array
.sids
[i
].sid
);
714 sid_compose(&sid
, domain_sid
, rid
);
715 sid_array
.sids
[i
].sid
= sid_dup_talloc(mem_ctx
, &sid
);
716 NT_STATUS_HAVE_NO_MEMORY(sid_array
.sids
[i
].sid
);
718 status
= rpccli_samr_GetAliasMembership(pipe_cli
, mem_ctx
,
722 if (!NT_STATUS_IS_OK(status
)) {
726 for (i
=0; i
<alias_rids
.count
; i
++) {
727 switch (alias_rids
.ids
[i
]) {
728 case 550: /* Print Operators */
729 auth_flag
|= AF_OP_PRINT
;
731 case 549: /* Server Operators */
732 auth_flag
|= AF_OP_SERVER
;
734 case 548: /* Account Operators */
735 auth_flag
|= AF_OP_ACCOUNTS
;
743 *auth_flag_p
= auth_flag
;
747 *info21
= &user_info
->info21
;
750 if (is_valid_policy_hnd(&user_handle
)) {
751 rpccli_samr_Close(pipe_cli
, mem_ctx
, &user_handle
);
757 /****************************************************************
758 ****************************************************************/
760 static uint32_t samr_rid_to_priv_level(uint32_t rid
)
763 case DOMAIN_RID_ADMINISTRATOR
:
764 return USER_PRIV_ADMIN
;
765 case DOMAIN_RID_GUEST
:
766 return USER_PRIV_GUEST
;
768 return USER_PRIV_USER
;
772 /****************************************************************
773 ****************************************************************/
775 static uint32_t samr_acb_flags_to_netapi_flags(uint32_t acb
)
777 uint32_t fl
= UF_SCRIPT
; /* god knows why */
779 fl
|= ads_acb2uf(acb
);
784 /****************************************************************
785 ****************************************************************/
787 static NTSTATUS
info21_to_USER_INFO_1(TALLOC_CTX
*mem_ctx
,
788 const struct samr_UserInfo21
*i21
,
789 struct USER_INFO_1
*i
)
792 i
->usri1_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
793 NT_STATUS_HAVE_NO_MEMORY(i
->usri1_name
);
794 i
->usri1_password
= NULL
;
795 i
->usri1_password_age
= time(NULL
) - nt_time_to_unix(i21
->last_password_change
);
796 i
->usri1_priv
= samr_rid_to_priv_level(i21
->rid
);
797 i
->usri1_home_dir
= talloc_strdup(mem_ctx
, i21
->home_directory
.string
);
798 i
->usri1_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
799 i
->usri1_flags
= samr_acb_flags_to_netapi_flags(i21
->acct_flags
);
800 i
->usri1_script_path
= talloc_strdup(mem_ctx
, i21
->logon_script
.string
);
805 /****************************************************************
806 ****************************************************************/
808 static NTSTATUS
info21_to_USER_INFO_2(TALLOC_CTX
*mem_ctx
,
809 const struct samr_UserInfo21
*i21
,
811 struct USER_INFO_2
*i
)
815 i
->usri2_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
816 NT_STATUS_HAVE_NO_MEMORY(i
->usri2_name
);
817 i
->usri2_password
= NULL
;
818 i
->usri2_password_age
= time(NULL
) - nt_time_to_unix(i21
->last_password_change
);
819 i
->usri2_priv
= samr_rid_to_priv_level(i21
->rid
);
820 i
->usri2_home_dir
= talloc_strdup(mem_ctx
, i21
->home_directory
.string
);
821 i
->usri2_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
822 i
->usri2_flags
= samr_acb_flags_to_netapi_flags(i21
->acct_flags
);
823 i
->usri2_script_path
= talloc_strdup(mem_ctx
, i21
->logon_script
.string
);
824 i
->usri2_auth_flags
= auth_flag
;
825 i
->usri2_full_name
= talloc_strdup(mem_ctx
, i21
->full_name
.string
);
826 i
->usri2_usr_comment
= talloc_strdup(mem_ctx
, i21
->comment
.string
);
827 i
->usri2_parms
= talloc_strndup(mem_ctx
, (const char *)i21
->parameters
.array
, i21
->parameters
.size
/2);
828 i
->usri2_workstations
= talloc_strdup(mem_ctx
, i21
->workstations
.string
);
829 i
->usri2_last_logon
= nt_time_to_unix(i21
->last_logon
);
830 i
->usri2_last_logoff
= nt_time_to_unix(i21
->last_logoff
);
831 i
->usri2_acct_expires
= nt_time_to_unix(i21
->acct_expiry
);
832 i
->usri2_max_storage
= USER_MAXSTORAGE_UNLIMITED
; /* FIXME */
833 i
->usri2_units_per_week
= i21
->logon_hours
.units_per_week
;
834 i
->usri2_logon_hours
= (uint8_t *)talloc_memdup(mem_ctx
, i21
->logon_hours
.bits
, 21);
835 i
->usri2_bad_pw_count
= i21
->bad_password_count
;
836 i
->usri2_num_logons
= i21
->logon_count
;
837 i
->usri2_logon_server
= talloc_strdup(mem_ctx
, "\\\\*");
838 i
->usri2_country_code
= i21
->country_code
;
839 i
->usri2_code_page
= i21
->code_page
;
844 /****************************************************************
845 ****************************************************************/
847 static NTSTATUS
info21_to_USER_INFO_3(TALLOC_CTX
*mem_ctx
,
848 const struct samr_UserInfo21
*i21
,
850 struct USER_INFO_3
*i
)
854 i
->usri3_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
855 NT_STATUS_HAVE_NO_MEMORY(i
->usri3_name
);
856 i
->usri3_password_age
= time(NULL
) - nt_time_to_unix(i21
->last_password_change
);
857 i
->usri3_priv
= samr_rid_to_priv_level(i21
->rid
);
858 i
->usri3_home_dir
= talloc_strdup(mem_ctx
, i21
->home_directory
.string
);
859 i
->usri3_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
860 i
->usri3_flags
= samr_acb_flags_to_netapi_flags(i21
->acct_flags
);
861 i
->usri3_script_path
= talloc_strdup(mem_ctx
, i21
->logon_script
.string
);
862 i
->usri3_auth_flags
= auth_flag
;
863 i
->usri3_full_name
= talloc_strdup(mem_ctx
, i21
->full_name
.string
);
864 i
->usri3_usr_comment
= talloc_strdup(mem_ctx
, i21
->comment
.string
);
865 i
->usri3_parms
= talloc_strndup(mem_ctx
, (const char *)i21
->parameters
.array
, i21
->parameters
.size
/2);
866 i
->usri3_workstations
= talloc_strdup(mem_ctx
, i21
->workstations
.string
);
867 i
->usri3_last_logon
= nt_time_to_unix(i21
->last_logon
);
868 i
->usri3_last_logoff
= nt_time_to_unix(i21
->last_logoff
);
869 i
->usri3_acct_expires
= nt_time_to_unix(i21
->acct_expiry
);
870 i
->usri3_max_storage
= USER_MAXSTORAGE_UNLIMITED
; /* FIXME */
871 i
->usri3_units_per_week
= i21
->logon_hours
.units_per_week
;
872 i
->usri3_logon_hours
= (uint8_t *)talloc_memdup(mem_ctx
, i21
->logon_hours
.bits
, 21);
873 i
->usri3_bad_pw_count
= i21
->bad_password_count
;
874 i
->usri3_num_logons
= i21
->logon_count
;
875 i
->usri3_logon_server
= talloc_strdup(mem_ctx
, "\\\\*");
876 i
->usri3_country_code
= i21
->country_code
;
877 i
->usri3_code_page
= i21
->code_page
;
878 i
->usri3_user_id
= i21
->rid
;
879 i
->usri3_primary_group_id
= i21
->primary_gid
;
880 i
->usri3_profile
= talloc_strdup(mem_ctx
, i21
->profile_path
.string
);
881 i
->usri3_home_dir_drive
= talloc_strdup(mem_ctx
, i21
->home_drive
.string
);
882 i
->usri3_password_expired
= i21
->password_expired
;
887 /****************************************************************
888 ****************************************************************/
890 static NTSTATUS
info21_to_USER_INFO_4(TALLOC_CTX
*mem_ctx
,
891 const struct samr_UserInfo21
*i21
,
893 struct dom_sid
*domain_sid
,
894 struct USER_INFO_4
*i
)
900 i
->usri4_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
901 NT_STATUS_HAVE_NO_MEMORY(i
->usri4_name
);
902 i
->usri4_password_age
= time(NULL
) - nt_time_to_unix(i21
->last_password_change
);
903 i
->usri4_password
= NULL
;
904 i
->usri4_priv
= samr_rid_to_priv_level(i21
->rid
);
905 i
->usri4_home_dir
= talloc_strdup(mem_ctx
, i21
->home_directory
.string
);
906 i
->usri4_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
907 i
->usri4_flags
= samr_acb_flags_to_netapi_flags(i21
->acct_flags
);
908 i
->usri4_script_path
= talloc_strdup(mem_ctx
, i21
->logon_script
.string
);
909 i
->usri4_auth_flags
= auth_flag
;
910 i
->usri4_full_name
= talloc_strdup(mem_ctx
, i21
->full_name
.string
);
911 i
->usri4_usr_comment
= talloc_strdup(mem_ctx
, i21
->comment
.string
);
912 i
->usri4_parms
= talloc_strndup(mem_ctx
, (const char *)i21
->parameters
.array
, i21
->parameters
.size
/2);
913 i
->usri4_workstations
= talloc_strdup(mem_ctx
, i21
->workstations
.string
);
914 i
->usri4_last_logon
= nt_time_to_unix(i21
->last_logon
);
915 i
->usri4_last_logoff
= nt_time_to_unix(i21
->last_logoff
);
916 i
->usri4_acct_expires
= nt_time_to_unix(i21
->acct_expiry
);
917 i
->usri4_max_storage
= USER_MAXSTORAGE_UNLIMITED
; /* FIXME */
918 i
->usri4_units_per_week
= i21
->logon_hours
.units_per_week
;
919 i
->usri4_logon_hours
= (uint8_t *)talloc_memdup(mem_ctx
, i21
->logon_hours
.bits
, 21);
920 i
->usri4_bad_pw_count
= i21
->bad_password_count
;
921 i
->usri4_num_logons
= i21
->logon_count
;
922 i
->usri4_logon_server
= talloc_strdup(mem_ctx
, "\\\\*");
923 i
->usri4_country_code
= i21
->country_code
;
924 i
->usri4_code_page
= i21
->code_page
;
925 if (!sid_compose(&sid
, domain_sid
, i21
->rid
)) {
926 return NT_STATUS_NO_MEMORY
;
928 i
->usri4_user_sid
= (struct domsid
*)sid_dup_talloc(mem_ctx
, &sid
);
929 i
->usri4_primary_group_id
= i21
->primary_gid
;
930 i
->usri4_profile
= talloc_strdup(mem_ctx
, i21
->profile_path
.string
);
931 i
->usri4_home_dir_drive
= talloc_strdup(mem_ctx
, i21
->home_drive
.string
);
932 i
->usri4_password_expired
= i21
->password_expired
;
937 /****************************************************************
938 ****************************************************************/
940 static NTSTATUS
info21_to_USER_INFO_10(TALLOC_CTX
*mem_ctx
,
941 const struct samr_UserInfo21
*i21
,
942 struct USER_INFO_10
*i
)
946 i
->usri10_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
947 NT_STATUS_HAVE_NO_MEMORY(i
->usri10_name
);
948 i
->usri10_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
949 i
->usri10_full_name
= talloc_strdup(mem_ctx
, i21
->full_name
.string
);
950 i
->usri10_usr_comment
= talloc_strdup(mem_ctx
, i21
->comment
.string
);
955 /****************************************************************
956 ****************************************************************/
958 static NTSTATUS
info21_to_USER_INFO_11(TALLOC_CTX
*mem_ctx
,
959 const struct samr_UserInfo21
*i21
,
961 struct USER_INFO_11
*i
)
965 i
->usri11_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
966 NT_STATUS_HAVE_NO_MEMORY(i
->usri11_name
);
967 i
->usri11_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
968 i
->usri11_usr_comment
= talloc_strdup(mem_ctx
, i21
->comment
.string
);
969 i
->usri11_full_name
= talloc_strdup(mem_ctx
, i21
->full_name
.string
);
970 i
->usri11_priv
= samr_rid_to_priv_level(i21
->rid
);
971 i
->usri11_auth_flags
= auth_flag
;
972 i
->usri11_password_age
= time(NULL
) - nt_time_to_unix(i21
->last_password_change
);
973 i
->usri11_home_dir
= talloc_strdup(mem_ctx
, i21
->home_directory
.string
);
974 i
->usri11_parms
= talloc_strndup(mem_ctx
, (const char *)i21
->parameters
.array
, i21
->parameters
.size
/2);
975 i
->usri11_last_logon
= nt_time_to_unix(i21
->last_logon
);
976 i
->usri11_last_logoff
= nt_time_to_unix(i21
->last_logoff
);
977 i
->usri11_bad_pw_count
= i21
->bad_password_count
;
978 i
->usri11_num_logons
= i21
->logon_count
;
979 i
->usri11_logon_server
= talloc_strdup(mem_ctx
, "\\\\*");
980 i
->usri11_country_code
= i21
->country_code
;
981 i
->usri11_workstations
= talloc_strdup(mem_ctx
, i21
->workstations
.string
);
982 i
->usri11_max_storage
= USER_MAXSTORAGE_UNLIMITED
; /* FIXME */
983 i
->usri11_units_per_week
= i21
->logon_hours
.units_per_week
;
984 i
->usri11_logon_hours
= (uint8_t *)talloc_memdup(mem_ctx
, i21
->logon_hours
.bits
, 21);
985 i
->usri11_code_page
= i21
->code_page
;
990 /****************************************************************
991 ****************************************************************/
993 static NTSTATUS
info21_to_USER_INFO_20(TALLOC_CTX
*mem_ctx
,
994 const struct samr_UserInfo21
*i21
,
995 struct USER_INFO_20
*i
)
999 i
->usri20_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
1000 NT_STATUS_HAVE_NO_MEMORY(i
->usri20_name
);
1001 i
->usri20_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
1002 i
->usri20_full_name
= talloc_strdup(mem_ctx
, i21
->full_name
.string
);
1003 i
->usri20_flags
= samr_acb_flags_to_netapi_flags(i21
->acct_flags
);
1004 i
->usri20_user_id
= i21
->rid
;
1006 return NT_STATUS_OK
;
1009 /****************************************************************
1010 ****************************************************************/
1012 static NTSTATUS
info21_to_USER_INFO_23(TALLOC_CTX
*mem_ctx
,
1013 const struct samr_UserInfo21
*i21
,
1014 struct dom_sid
*domain_sid
,
1015 struct USER_INFO_23
*i
)
1021 i
->usri23_name
= talloc_strdup(mem_ctx
, i21
->account_name
.string
);
1022 NT_STATUS_HAVE_NO_MEMORY(i
->usri23_name
);
1023 i
->usri23_comment
= talloc_strdup(mem_ctx
, i21
->description
.string
);
1024 i
->usri23_full_name
= talloc_strdup(mem_ctx
, i21
->full_name
.string
);
1025 i
->usri23_flags
= samr_acb_flags_to_netapi_flags(i21
->acct_flags
);
1026 if (!sid_compose(&sid
, domain_sid
, i21
->rid
)) {
1027 return NT_STATUS_NO_MEMORY
;
1029 i
->usri23_user_sid
= (struct domsid
*)sid_dup_talloc(mem_ctx
, &sid
);
1031 return NT_STATUS_OK
;
1034 /****************************************************************
1035 ****************************************************************/
1037 static NTSTATUS
libnetapi_samr_lookup_user_map_USER_INFO(TALLOC_CTX
*mem_ctx
,
1038 struct rpc_pipe_client
*pipe_cli
,
1039 struct dom_sid
*domain_sid
,
1040 struct policy_handle
*domain_handle
,
1041 struct policy_handle
*builtin_handle
,
1042 const char *user_name
,
1046 uint32_t *num_entries
)
1050 struct samr_UserInfo21
*info21
= NULL
;
1051 struct sec_desc_buf
*sec_desc
= NULL
;
1052 uint32_t auth_flag
= 0;
1054 struct USER_INFO_0 info0
;
1055 struct USER_INFO_1 info1
;
1056 struct USER_INFO_2 info2
;
1057 struct USER_INFO_3 info3
;
1058 struct USER_INFO_4 info4
;
1059 struct USER_INFO_10 info10
;
1060 struct USER_INFO_11 info11
;
1061 struct USER_INFO_20 info20
;
1062 struct USER_INFO_23 info23
;
1076 return NT_STATUS_INVALID_LEVEL
;
1080 info0
.usri0_name
= talloc_strdup(mem_ctx
, user_name
);
1081 NT_STATUS_HAVE_NO_MEMORY(info0
.usri0_name
);
1083 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_0
, info0
,
1084 (struct USER_INFO_0
**)buffer
, num_entries
);
1086 return NT_STATUS_OK
;
1089 status
= libnetapi_samr_lookup_user(mem_ctx
, pipe_cli
,
1100 if (!NT_STATUS_IS_OK(status
)) {
1106 /* already returned above */
1109 status
= info21_to_USER_INFO_1(mem_ctx
, info21
, &info1
);
1110 NT_STATUS_NOT_OK_RETURN(status
);
1112 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_1
, info1
,
1113 (struct USER_INFO_1
**)buffer
, num_entries
);
1117 status
= info21_to_USER_INFO_2(mem_ctx
, info21
, auth_flag
, &info2
);
1118 NT_STATUS_NOT_OK_RETURN(status
);
1120 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_2
, info2
,
1121 (struct USER_INFO_2
**)buffer
, num_entries
);
1125 status
= info21_to_USER_INFO_3(mem_ctx
, info21
, auth_flag
, &info3
);
1126 NT_STATUS_NOT_OK_RETURN(status
);
1128 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_3
, info3
,
1129 (struct USER_INFO_3
**)buffer
, num_entries
);
1133 status
= info21_to_USER_INFO_4(mem_ctx
, info21
, auth_flag
, domain_sid
, &info4
);
1134 NT_STATUS_NOT_OK_RETURN(status
);
1136 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_4
, info4
,
1137 (struct USER_INFO_4
**)buffer
, num_entries
);
1141 status
= info21_to_USER_INFO_10(mem_ctx
, info21
, &info10
);
1142 NT_STATUS_NOT_OK_RETURN(status
);
1144 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_10
, info10
,
1145 (struct USER_INFO_10
**)buffer
, num_entries
);
1149 status
= info21_to_USER_INFO_11(mem_ctx
, info21
, auth_flag
, &info11
);
1150 NT_STATUS_NOT_OK_RETURN(status
);
1152 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_11
, info11
,
1153 (struct USER_INFO_11
**)buffer
, num_entries
);
1157 status
= info21_to_USER_INFO_20(mem_ctx
, info21
, &info20
);
1158 NT_STATUS_NOT_OK_RETURN(status
);
1160 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_20
, info20
,
1161 (struct USER_INFO_20
**)buffer
, num_entries
);
1165 status
= info21_to_USER_INFO_23(mem_ctx
, info21
, domain_sid
, &info23
);
1166 NT_STATUS_NOT_OK_RETURN(status
);
1168 ADD_TO_ARRAY(mem_ctx
, struct USER_INFO_23
, info23
,
1169 (struct USER_INFO_23
**)buffer
, num_entries
);
1172 return NT_STATUS_INVALID_LEVEL
;
1179 /****************************************************************
1180 ****************************************************************/
1182 WERROR
NetUserEnum_r(struct libnetapi_ctx
*ctx
,
1183 struct NetUserEnum
*r
)
1185 struct cli_state
*cli
= NULL
;
1186 struct rpc_pipe_client
*pipe_cli
= NULL
;
1187 struct policy_handle connect_handle
;
1188 struct dom_sid2
*domain_sid
= NULL
;
1189 struct policy_handle domain_handle
, builtin_handle
;
1190 struct samr_SamArray
*sam
= NULL
;
1191 uint32_t filter
= ACB_NORMAL
;
1193 uint32_t entries_read
= 0;
1195 NTSTATUS status
= NT_STATUS_OK
;
1198 ZERO_STRUCT(connect_handle
);
1199 ZERO_STRUCT(domain_handle
);
1200 ZERO_STRUCT(builtin_handle
);
1202 if (!r
->out
.buffer
) {
1203 return WERR_INVALID_PARAM
;
1206 *r
->out
.buffer
= NULL
;
1207 *r
->out
.entries_read
= 0;
1209 switch (r
->in
.level
) {
1221 return WERR_UNKNOWN_LEVEL
;
1224 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
1225 &ndr_table_samr
.syntax_id
,
1228 if (!W_ERROR_IS_OK(werr
)) {
1232 werr
= libnetapi_samr_open_builtin_domain(ctx
, pipe_cli
,
1233 SAMR_ACCESS_ENUM_DOMAINS
|
1234 SAMR_ACCESS_LOOKUP_DOMAIN
,
1235 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
|
1236 SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS
,
1239 if (!W_ERROR_IS_OK(werr
)) {
1243 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
1244 SAMR_ACCESS_ENUM_DOMAINS
|
1245 SAMR_ACCESS_LOOKUP_DOMAIN
,
1246 SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2
|
1247 SAMR_DOMAIN_ACCESS_ENUM_ACCOUNTS
|
1248 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
1252 if (!W_ERROR_IS_OK(werr
)) {
1256 switch (r
->in
.filter
) {
1257 case FILTER_NORMAL_ACCOUNT
:
1258 filter
= ACB_NORMAL
;
1260 case FILTER_TEMP_DUPLICATE_ACCOUNT
:
1261 filter
= ACB_TEMPDUP
;
1263 case FILTER_INTERDOMAIN_TRUST_ACCOUNT
:
1264 filter
= ACB_DOMTRUST
;
1266 case FILTER_WORKSTATION_TRUST_ACCOUNT
:
1267 filter
= ACB_WSTRUST
;
1269 case FILTER_SERVER_TRUST_ACCOUNT
:
1270 filter
= ACB_SVRTRUST
;
1276 status
= rpccli_samr_EnumDomainUsers(pipe_cli
,
1279 r
->in
.resume_handle
,
1284 werr
= ntstatus_to_werror(status
);
1285 if (NT_STATUS_IS_ERR(status
)) {
1289 for (i
=0; i
< sam
->count
; i
++) {
1291 status
= libnetapi_samr_lookup_user_map_USER_INFO(ctx
, pipe_cli
,
1295 sam
->entries
[i
].name
.string
,
1296 sam
->entries
[i
].idx
,
1299 r
->out
.entries_read
);
1300 if (!NT_STATUS_IS_OK(status
)) {
1301 werr
= ntstatus_to_werror(status
);
1312 if (NT_STATUS_IS_OK(status
) ||
1313 NT_STATUS_IS_ERR(status
)) {
1315 if (ctx
->disable_policy_handle_cache
) {
1316 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
1317 libnetapi_samr_close_builtin_handle(ctx
, &builtin_handle
);
1318 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
1325 /****************************************************************
1326 ****************************************************************/
1328 WERROR
NetUserEnum_l(struct libnetapi_ctx
*ctx
,
1329 struct NetUserEnum
*r
)
1331 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserEnum
);
1334 /****************************************************************
1335 ****************************************************************/
1337 static WERROR
convert_samr_dispinfo_to_NET_DISPLAY_USER(TALLOC_CTX
*mem_ctx
,
1338 struct samr_DispInfoGeneral
*info
,
1339 uint32_t *entries_read
,
1342 struct NET_DISPLAY_USER
*user
= NULL
;
1345 user
= TALLOC_ZERO_ARRAY(mem_ctx
,
1346 struct NET_DISPLAY_USER
,
1348 W_ERROR_HAVE_NO_MEMORY(user
);
1350 for (i
= 0; i
< info
->count
; i
++) {
1351 user
[i
].usri1_name
= talloc_strdup(mem_ctx
,
1352 info
->entries
[i
].account_name
.string
);
1353 user
[i
].usri1_comment
= talloc_strdup(mem_ctx
,
1354 info
->entries
[i
].description
.string
);
1355 user
[i
].usri1_flags
=
1356 info
->entries
[i
].acct_flags
;
1357 user
[i
].usri1_full_name
= talloc_strdup(mem_ctx
,
1358 info
->entries
[i
].full_name
.string
);
1359 user
[i
].usri1_user_id
=
1360 info
->entries
[i
].rid
;
1361 user
[i
].usri1_next_index
=
1362 info
->entries
[i
].idx
;
1364 if (!user
[i
].usri1_name
) {
1369 *buffer
= talloc_memdup(mem_ctx
, user
,
1370 sizeof(struct NET_DISPLAY_USER
) * info
->count
);
1371 W_ERROR_HAVE_NO_MEMORY(*buffer
);
1373 *entries_read
= info
->count
;
1378 /****************************************************************
1379 ****************************************************************/
1381 static WERROR
convert_samr_dispinfo_to_NET_DISPLAY_MACHINE(TALLOC_CTX
*mem_ctx
,
1382 struct samr_DispInfoFull
*info
,
1383 uint32_t *entries_read
,
1386 struct NET_DISPLAY_MACHINE
*machine
= NULL
;
1389 machine
= TALLOC_ZERO_ARRAY(mem_ctx
,
1390 struct NET_DISPLAY_MACHINE
,
1392 W_ERROR_HAVE_NO_MEMORY(machine
);
1394 for (i
= 0; i
< info
->count
; i
++) {
1395 machine
[i
].usri2_name
= talloc_strdup(mem_ctx
,
1396 info
->entries
[i
].account_name
.string
);
1397 machine
[i
].usri2_comment
= talloc_strdup(mem_ctx
,
1398 info
->entries
[i
].description
.string
);
1399 machine
[i
].usri2_flags
=
1400 info
->entries
[i
].acct_flags
;
1401 machine
[i
].usri2_user_id
=
1402 info
->entries
[i
].rid
;
1403 machine
[i
].usri2_next_index
=
1404 info
->entries
[i
].idx
;
1406 if (!machine
[i
].usri2_name
) {
1411 *buffer
= talloc_memdup(mem_ctx
, machine
,
1412 sizeof(struct NET_DISPLAY_MACHINE
) * info
->count
);
1413 W_ERROR_HAVE_NO_MEMORY(*buffer
);
1415 *entries_read
= info
->count
;
1420 /****************************************************************
1421 ****************************************************************/
1423 static WERROR
convert_samr_dispinfo_to_NET_DISPLAY_GROUP(TALLOC_CTX
*mem_ctx
,
1424 struct samr_DispInfoFullGroups
*info
,
1425 uint32_t *entries_read
,
1428 struct NET_DISPLAY_GROUP
*group
= NULL
;
1431 group
= TALLOC_ZERO_ARRAY(mem_ctx
,
1432 struct NET_DISPLAY_GROUP
,
1434 W_ERROR_HAVE_NO_MEMORY(group
);
1436 for (i
= 0; i
< info
->count
; i
++) {
1437 group
[i
].grpi3_name
= talloc_strdup(mem_ctx
,
1438 info
->entries
[i
].account_name
.string
);
1439 group
[i
].grpi3_comment
= talloc_strdup(mem_ctx
,
1440 info
->entries
[i
].description
.string
);
1441 group
[i
].grpi3_group_id
=
1442 info
->entries
[i
].rid
;
1443 group
[i
].grpi3_attributes
=
1444 info
->entries
[i
].acct_flags
;
1445 group
[i
].grpi3_next_index
=
1446 info
->entries
[i
].idx
;
1448 if (!group
[i
].grpi3_name
) {
1453 *buffer
= talloc_memdup(mem_ctx
, group
,
1454 sizeof(struct NET_DISPLAY_GROUP
) * info
->count
);
1455 W_ERROR_HAVE_NO_MEMORY(*buffer
);
1457 *entries_read
= info
->count
;
1463 /****************************************************************
1464 ****************************************************************/
1466 static WERROR
convert_samr_dispinfo_to_NET_DISPLAY(TALLOC_CTX
*mem_ctx
,
1467 union samr_DispInfo
*info
,
1469 uint32_t *entries_read
,
1474 return convert_samr_dispinfo_to_NET_DISPLAY_USER(mem_ctx
,
1479 return convert_samr_dispinfo_to_NET_DISPLAY_MACHINE(mem_ctx
,
1484 return convert_samr_dispinfo_to_NET_DISPLAY_GROUP(mem_ctx
,
1489 return WERR_UNKNOWN_LEVEL
;
1495 /****************************************************************
1496 ****************************************************************/
1498 WERROR
NetQueryDisplayInformation_r(struct libnetapi_ctx
*ctx
,
1499 struct NetQueryDisplayInformation
*r
)
1501 struct cli_state
*cli
= NULL
;
1502 struct rpc_pipe_client
*pipe_cli
= NULL
;
1503 struct policy_handle connect_handle
;
1504 struct dom_sid2
*domain_sid
= NULL
;
1505 struct policy_handle domain_handle
;
1506 union samr_DispInfo info
;
1508 uint32_t total_size
= 0;
1509 uint32_t returned_size
= 0;
1511 NTSTATUS status
= NT_STATUS_OK
;
1515 *r
->out
.entries_read
= 0;
1517 ZERO_STRUCT(connect_handle
);
1518 ZERO_STRUCT(domain_handle
);
1520 switch (r
->in
.level
) {
1526 return WERR_UNKNOWN_LEVEL
;
1529 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
1530 &ndr_table_samr
.syntax_id
,
1533 if (!W_ERROR_IS_OK(werr
)) {
1537 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
1538 SAMR_ACCESS_ENUM_DOMAINS
|
1539 SAMR_ACCESS_LOOKUP_DOMAIN
,
1540 SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2
|
1541 SAMR_DOMAIN_ACCESS_ENUM_ACCOUNTS
|
1542 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
1546 if (!W_ERROR_IS_OK(werr
)) {
1550 status
= rpccli_samr_QueryDisplayInfo2(pipe_cli
,
1555 r
->in
.entries_requested
,
1560 werr
= ntstatus_to_werror(status
);
1561 if (NT_STATUS_IS_ERR(status
)) {
1565 werr_tmp
= convert_samr_dispinfo_to_NET_DISPLAY(ctx
, &info
,
1567 r
->out
.entries_read
,
1569 if (!W_ERROR_IS_OK(werr_tmp
)) {
1578 if (NT_STATUS_IS_OK(status
) ||
1579 NT_STATUS_IS_ERR(status
)) {
1581 if (ctx
->disable_policy_handle_cache
) {
1582 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
1583 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
1591 /****************************************************************
1592 ****************************************************************/
1595 WERROR
NetQueryDisplayInformation_l(struct libnetapi_ctx
*ctx
,
1596 struct NetQueryDisplayInformation
*r
)
1598 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetQueryDisplayInformation
);
1601 /****************************************************************
1602 ****************************************************************/
1604 WERROR
NetUserChangePassword_r(struct libnetapi_ctx
*ctx
,
1605 struct NetUserChangePassword
*r
)
1607 return WERR_NOT_SUPPORTED
;
1610 /****************************************************************
1611 ****************************************************************/
1613 WERROR
NetUserChangePassword_l(struct libnetapi_ctx
*ctx
,
1614 struct NetUserChangePassword
*r
)
1616 return WERR_NOT_SUPPORTED
;
1619 /****************************************************************
1620 ****************************************************************/
1622 WERROR
NetUserGetInfo_r(struct libnetapi_ctx
*ctx
,
1623 struct NetUserGetInfo
*r
)
1625 struct cli_state
*cli
= NULL
;
1626 struct rpc_pipe_client
*pipe_cli
= NULL
;
1630 struct policy_handle connect_handle
, domain_handle
, builtin_handle
, user_handle
;
1631 struct lsa_String lsa_account_name
;
1632 struct dom_sid2
*domain_sid
= NULL
;
1633 struct samr_Ids user_rids
, name_types
;
1634 uint32_t num_entries
= 0;
1636 ZERO_STRUCT(connect_handle
);
1637 ZERO_STRUCT(domain_handle
);
1638 ZERO_STRUCT(builtin_handle
);
1639 ZERO_STRUCT(user_handle
);
1641 if (!r
->out
.buffer
) {
1642 return WERR_INVALID_PARAM
;
1645 switch (r
->in
.level
) {
1657 werr
= WERR_UNKNOWN_LEVEL
;
1661 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
1662 &ndr_table_samr
.syntax_id
,
1665 if (!W_ERROR_IS_OK(werr
)) {
1669 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
1670 SAMR_ACCESS_ENUM_DOMAINS
|
1671 SAMR_ACCESS_LOOKUP_DOMAIN
,
1672 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
1676 if (!W_ERROR_IS_OK(werr
)) {
1680 werr
= libnetapi_samr_open_builtin_domain(ctx
, pipe_cli
,
1681 SAMR_ACCESS_ENUM_DOMAINS
|
1682 SAMR_ACCESS_LOOKUP_DOMAIN
,
1683 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
|
1684 SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS
,
1687 if (!W_ERROR_IS_OK(werr
)) {
1691 init_lsa_String(&lsa_account_name
, r
->in
.user_name
);
1693 status
= rpccli_samr_LookupNames(pipe_cli
, ctx
,
1699 if (!NT_STATUS_IS_OK(status
)) {
1700 werr
= ntstatus_to_werror(status
);
1704 status
= libnetapi_samr_lookup_user_map_USER_INFO(ctx
, pipe_cli
,
1713 if (!NT_STATUS_IS_OK(status
)) {
1714 werr
= ntstatus_to_werror(status
);
1723 if (is_valid_policy_hnd(&user_handle
)) {
1724 rpccli_samr_Close(pipe_cli
, ctx
, &user_handle
);
1727 if (ctx
->disable_policy_handle_cache
) {
1728 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
1729 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
1735 /****************************************************************
1736 ****************************************************************/
1738 WERROR
NetUserGetInfo_l(struct libnetapi_ctx
*ctx
,
1739 struct NetUserGetInfo
*r
)
1741 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserGetInfo
);
1744 /****************************************************************
1745 ****************************************************************/
1747 WERROR
NetUserSetInfo_r(struct libnetapi_ctx
*ctx
,
1748 struct NetUserSetInfo
*r
)
1750 struct cli_state
*cli
= NULL
;
1751 struct rpc_pipe_client
*pipe_cli
= NULL
;
1755 struct policy_handle connect_handle
, domain_handle
, builtin_handle
, user_handle
;
1756 struct lsa_String lsa_account_name
;
1757 struct dom_sid2
*domain_sid
= NULL
;
1758 struct samr_Ids user_rids
, name_types
;
1759 uint32_t user_mask
= 0;
1761 struct USER_INFO_X uX
;
1763 ZERO_STRUCT(connect_handle
);
1764 ZERO_STRUCT(domain_handle
);
1765 ZERO_STRUCT(builtin_handle
);
1766 ZERO_STRUCT(user_handle
);
1768 if (!r
->in
.buffer
) {
1769 return WERR_INVALID_PARAM
;
1772 switch (r
->in
.level
) {
1774 user_mask
= SAMR_USER_ACCESS_SET_ATTRIBUTES
;
1777 user_mask
= SAMR_USER_ACCESS_SET_PASSWORD
;
1786 user_mask
= SAMR_USER_ACCESS_SET_ATTRIBUTES
;
1790 user_mask
= SAMR_USER_ACCESS_SET_LOC_COM
;
1792 user_mask
= SAMR_USER_ACCESS_SET_ATTRIBUTES
|
1793 SAMR_USER_ACCESS_GET_GROUPS
;
1796 user_mask
= STD_RIGHT_READ_CONTROL_ACCESS
|
1797 STD_RIGHT_WRITE_DAC_ACCESS
|
1798 SAMR_USER_ACCESS_GET_GROUPS
|
1799 SAMR_USER_ACCESS_SET_PASSWORD
|
1800 SAMR_USER_ACCESS_SET_ATTRIBUTES
|
1801 SAMR_USER_ACCESS_GET_ATTRIBUTES
|
1802 SAMR_USER_ACCESS_SET_LOC_COM
;
1814 werr
= WERR_NOT_SUPPORTED
;
1817 werr
= WERR_UNKNOWN_LEVEL
;
1821 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
1822 &ndr_table_samr
.syntax_id
,
1825 if (!W_ERROR_IS_OK(werr
)) {
1829 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
1830 SAMR_ACCESS_ENUM_DOMAINS
|
1831 SAMR_ACCESS_LOOKUP_DOMAIN
,
1832 SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1
|
1833 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
1837 if (!W_ERROR_IS_OK(werr
)) {
1841 werr
= libnetapi_samr_open_builtin_domain(ctx
, pipe_cli
,
1842 SAMR_ACCESS_ENUM_DOMAINS
|
1843 SAMR_ACCESS_LOOKUP_DOMAIN
,
1844 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
|
1845 SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS
,
1848 if (!W_ERROR_IS_OK(werr
)) {
1852 init_lsa_String(&lsa_account_name
, r
->in
.user_name
);
1854 status
= rpccli_samr_LookupNames(pipe_cli
, ctx
,
1860 if (!NT_STATUS_IS_OK(status
)) {
1861 werr
= ntstatus_to_werror(status
);
1865 status
= rpccli_samr_OpenUser(pipe_cli
, ctx
,
1870 if (!NT_STATUS_IS_OK(status
)) {
1871 werr
= ntstatus_to_werror(status
);
1875 status
= construct_USER_INFO_X(r
->in
.level
, r
->in
.buffer
, &uX
);
1876 if (!NT_STATUS_IS_OK(status
)) {
1877 werr
= ntstatus_to_werror(status
);
1881 status
= set_user_info_USER_INFO_X(ctx
, pipe_cli
,
1882 &cli
->user_session_key
,
1885 if (!NT_STATUS_IS_OK(status
)) {
1886 werr
= ntstatus_to_werror(status
);
1897 if (is_valid_policy_hnd(&user_handle
)) {
1898 rpccli_samr_Close(pipe_cli
, ctx
, &user_handle
);
1901 if (ctx
->disable_policy_handle_cache
) {
1902 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
1903 libnetapi_samr_close_builtin_handle(ctx
, &builtin_handle
);
1904 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
1910 /****************************************************************
1911 ****************************************************************/
1913 WERROR
NetUserSetInfo_l(struct libnetapi_ctx
*ctx
,
1914 struct NetUserSetInfo
*r
)
1916 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserSetInfo
);
1919 /****************************************************************
1920 ****************************************************************/
1922 static NTSTATUS
query_USER_MODALS_INFO_rpc(TALLOC_CTX
*mem_ctx
,
1923 struct rpc_pipe_client
*pipe_cli
,
1924 struct policy_handle
*domain_handle
,
1925 struct samr_DomInfo1
*info1
,
1926 struct samr_DomInfo3
*info3
,
1927 struct samr_DomInfo5
*info5
,
1928 struct samr_DomInfo6
*info6
,
1929 struct samr_DomInfo7
*info7
,
1930 struct samr_DomInfo12
*info12
)
1933 union samr_DomainInfo
*dom_info
= NULL
;
1936 status
= rpccli_samr_QueryDomainInfo(pipe_cli
, mem_ctx
,
1940 NT_STATUS_NOT_OK_RETURN(status
);
1942 *info1
= dom_info
->info1
;
1946 status
= rpccli_samr_QueryDomainInfo(pipe_cli
, mem_ctx
,
1950 NT_STATUS_NOT_OK_RETURN(status
);
1952 *info3
= dom_info
->info3
;
1956 status
= rpccli_samr_QueryDomainInfo(pipe_cli
, mem_ctx
,
1960 NT_STATUS_NOT_OK_RETURN(status
);
1962 *info5
= dom_info
->info5
;
1966 status
= rpccli_samr_QueryDomainInfo(pipe_cli
, mem_ctx
,
1970 NT_STATUS_NOT_OK_RETURN(status
);
1972 *info6
= dom_info
->info6
;
1976 status
= rpccli_samr_QueryDomainInfo(pipe_cli
, mem_ctx
,
1980 NT_STATUS_NOT_OK_RETURN(status
);
1982 *info7
= dom_info
->info7
;
1986 status
= rpccli_samr_QueryDomainInfo2(pipe_cli
, mem_ctx
,
1990 NT_STATUS_NOT_OK_RETURN(status
);
1992 *info12
= dom_info
->info12
;
1995 return NT_STATUS_OK
;
1998 /****************************************************************
1999 ****************************************************************/
2001 static NTSTATUS
query_USER_MODALS_INFO_0(TALLOC_CTX
*mem_ctx
,
2002 struct rpc_pipe_client
*pipe_cli
,
2003 struct policy_handle
*domain_handle
,
2004 struct USER_MODALS_INFO_0
*info0
)
2007 struct samr_DomInfo1 dom_info1
;
2008 struct samr_DomInfo3 dom_info3
;
2010 ZERO_STRUCTP(info0
);
2012 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2021 NT_STATUS_NOT_OK_RETURN(status
);
2023 info0
->usrmod0_min_passwd_len
=
2024 dom_info1
.min_password_length
;
2025 info0
->usrmod0_max_passwd_age
=
2026 nt_time_to_unix_abs((NTTIME
*)&dom_info1
.max_password_age
);
2027 info0
->usrmod0_min_passwd_age
=
2028 nt_time_to_unix_abs((NTTIME
*)&dom_info1
.min_password_age
);
2029 info0
->usrmod0_password_hist_len
=
2030 dom_info1
.password_history_length
;
2032 info0
->usrmod0_force_logoff
=
2033 nt_time_to_unix_abs(&dom_info3
.force_logoff_time
);
2035 return NT_STATUS_OK
;
2038 /****************************************************************
2039 ****************************************************************/
2041 static NTSTATUS
query_USER_MODALS_INFO_1(TALLOC_CTX
*mem_ctx
,
2042 struct rpc_pipe_client
*pipe_cli
,
2043 struct policy_handle
*domain_handle
,
2044 struct USER_MODALS_INFO_1
*info1
)
2047 struct samr_DomInfo6 dom_info6
;
2048 struct samr_DomInfo7 dom_info7
;
2050 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2059 NT_STATUS_NOT_OK_RETURN(status
);
2061 info1
->usrmod1_primary
=
2062 talloc_strdup(mem_ctx
, dom_info6
.primary
.string
);
2064 info1
->usrmod1_role
= dom_info7
.role
;
2066 return NT_STATUS_OK
;
2069 /****************************************************************
2070 ****************************************************************/
2072 static NTSTATUS
query_USER_MODALS_INFO_2(TALLOC_CTX
*mem_ctx
,
2073 struct rpc_pipe_client
*pipe_cli
,
2074 struct policy_handle
*domain_handle
,
2075 struct dom_sid
*domain_sid
,
2076 struct USER_MODALS_INFO_2
*info2
)
2079 struct samr_DomInfo5 dom_info5
;
2081 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2090 NT_STATUS_NOT_OK_RETURN(status
);
2092 info2
->usrmod2_domain_name
=
2093 talloc_strdup(mem_ctx
, dom_info5
.domain_name
.string
);
2094 info2
->usrmod2_domain_id
=
2095 (struct domsid
*)sid_dup_talloc(mem_ctx
, domain_sid
);
2097 NT_STATUS_HAVE_NO_MEMORY(info2
->usrmod2_domain_name
);
2098 NT_STATUS_HAVE_NO_MEMORY(info2
->usrmod2_domain_id
);
2100 return NT_STATUS_OK
;
2103 /****************************************************************
2104 ****************************************************************/
2106 static NTSTATUS
query_USER_MODALS_INFO_3(TALLOC_CTX
*mem_ctx
,
2107 struct rpc_pipe_client
*pipe_cli
,
2108 struct policy_handle
*domain_handle
,
2109 struct USER_MODALS_INFO_3
*info3
)
2112 struct samr_DomInfo12 dom_info12
;
2114 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2123 NT_STATUS_NOT_OK_RETURN(status
);
2125 info3
->usrmod3_lockout_duration
=
2126 nt_time_to_unix_abs(&dom_info12
.lockout_duration
);
2127 info3
->usrmod3_lockout_observation_window
=
2128 nt_time_to_unix_abs(&dom_info12
.lockout_window
);
2129 info3
->usrmod3_lockout_threshold
=
2130 dom_info12
.lockout_threshold
;
2132 return NT_STATUS_OK
;
2135 /****************************************************************
2136 ****************************************************************/
2138 static NTSTATUS
query_USER_MODALS_INFO_to_buffer(TALLOC_CTX
*mem_ctx
,
2139 struct rpc_pipe_client
*pipe_cli
,
2141 struct policy_handle
*domain_handle
,
2142 struct dom_sid
*domain_sid
,
2147 struct USER_MODALS_INFO_0 info0
;
2148 struct USER_MODALS_INFO_1 info1
;
2149 struct USER_MODALS_INFO_2 info2
;
2150 struct USER_MODALS_INFO_3 info3
;
2153 return ERROR_INSUFFICIENT_BUFFER
;
2158 status
= query_USER_MODALS_INFO_0(mem_ctx
,
2162 NT_STATUS_NOT_OK_RETURN(status
);
2164 *buffer
= (uint8_t *)talloc_memdup(mem_ctx
, &info0
,
2169 status
= query_USER_MODALS_INFO_1(mem_ctx
,
2173 NT_STATUS_NOT_OK_RETURN(status
);
2175 *buffer
= (uint8_t *)talloc_memdup(mem_ctx
, &info1
,
2179 status
= query_USER_MODALS_INFO_2(mem_ctx
,
2184 NT_STATUS_NOT_OK_RETURN(status
);
2186 *buffer
= (uint8_t *)talloc_memdup(mem_ctx
, &info2
,
2190 status
= query_USER_MODALS_INFO_3(mem_ctx
,
2194 NT_STATUS_NOT_OK_RETURN(status
);
2196 *buffer
= (uint8_t *)talloc_memdup(mem_ctx
, &info3
,
2203 NT_STATUS_HAVE_NO_MEMORY(*buffer
);
2205 return NT_STATUS_OK
;
2208 /****************************************************************
2209 ****************************************************************/
2211 WERROR
NetUserModalsGet_r(struct libnetapi_ctx
*ctx
,
2212 struct NetUserModalsGet
*r
)
2214 struct cli_state
*cli
= NULL
;
2215 struct rpc_pipe_client
*pipe_cli
= NULL
;
2219 struct policy_handle connect_handle
, domain_handle
;
2220 struct dom_sid2
*domain_sid
= NULL
;
2221 uint32_t access_mask
= SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
;
2223 ZERO_STRUCT(connect_handle
);
2224 ZERO_STRUCT(domain_handle
);
2226 if (!r
->out
.buffer
) {
2227 return WERR_INVALID_PARAM
;
2230 switch (r
->in
.level
) {
2232 access_mask
|= SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1
|
2233 SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2
;
2237 access_mask
|= SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2
;
2240 access_mask
|= SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1
;
2243 werr
= WERR_UNKNOWN_LEVEL
;
2247 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
2248 &ndr_table_samr
.syntax_id
,
2251 if (!W_ERROR_IS_OK(werr
)) {
2255 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
2256 SAMR_ACCESS_ENUM_DOMAINS
|
2257 SAMR_ACCESS_LOOKUP_DOMAIN
,
2262 if (!W_ERROR_IS_OK(werr
)) {
2269 /* 3: 12 (DomainInfo2) */
2271 status
= query_USER_MODALS_INFO_to_buffer(ctx
,
2277 if (!NT_STATUS_IS_OK(status
)) {
2278 werr
= ntstatus_to_werror(status
);
2287 if (ctx
->disable_policy_handle_cache
) {
2288 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
2289 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
2295 /****************************************************************
2296 ****************************************************************/
2298 WERROR
NetUserModalsGet_l(struct libnetapi_ctx
*ctx
,
2299 struct NetUserModalsGet
*r
)
2301 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserModalsGet
);
2304 /****************************************************************
2305 ****************************************************************/
2307 static NTSTATUS
set_USER_MODALS_INFO_rpc(TALLOC_CTX
*mem_ctx
,
2308 struct rpc_pipe_client
*pipe_cli
,
2309 struct policy_handle
*domain_handle
,
2310 struct samr_DomInfo1
*info1
,
2311 struct samr_DomInfo3
*info3
,
2312 struct samr_DomInfo12
*info12
)
2315 union samr_DomainInfo dom_info
;
2319 ZERO_STRUCT(dom_info
);
2321 dom_info
.info1
= *info1
;
2323 status
= rpccli_samr_SetDomainInfo(pipe_cli
, mem_ctx
,
2327 NT_STATUS_NOT_OK_RETURN(status
);
2332 ZERO_STRUCT(dom_info
);
2334 dom_info
.info3
= *info3
;
2336 status
= rpccli_samr_SetDomainInfo(pipe_cli
, mem_ctx
,
2341 NT_STATUS_NOT_OK_RETURN(status
);
2346 ZERO_STRUCT(dom_info
);
2348 dom_info
.info12
= *info12
;
2350 status
= rpccli_samr_SetDomainInfo(pipe_cli
, mem_ctx
,
2355 NT_STATUS_NOT_OK_RETURN(status
);
2358 return NT_STATUS_OK
;
2361 /****************************************************************
2362 ****************************************************************/
2364 static NTSTATUS
set_USER_MODALS_INFO_0_buffer(TALLOC_CTX
*mem_ctx
,
2365 struct rpc_pipe_client
*pipe_cli
,
2366 struct policy_handle
*domain_handle
,
2367 struct USER_MODALS_INFO_0
*info0
)
2370 struct samr_DomInfo1 dom_info_1
;
2371 struct samr_DomInfo3 dom_info_3
;
2373 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2382 NT_STATUS_NOT_OK_RETURN(status
);
2384 dom_info_1
.min_password_length
=
2385 info0
->usrmod0_min_passwd_len
;
2386 dom_info_1
.password_history_length
=
2387 info0
->usrmod0_password_hist_len
;
2389 unix_to_nt_time_abs((NTTIME
*)&dom_info_1
.max_password_age
,
2390 info0
->usrmod0_max_passwd_age
);
2391 unix_to_nt_time_abs((NTTIME
*)&dom_info_1
.min_password_age
,
2392 info0
->usrmod0_min_passwd_age
);
2394 unix_to_nt_time_abs(&dom_info_3
.force_logoff_time
,
2395 info0
->usrmod0_force_logoff
);
2397 return set_USER_MODALS_INFO_rpc(mem_ctx
,
2405 /****************************************************************
2406 ****************************************************************/
2408 static NTSTATUS
set_USER_MODALS_INFO_3_buffer(TALLOC_CTX
*mem_ctx
,
2409 struct rpc_pipe_client
*pipe_cli
,
2410 struct policy_handle
*domain_handle
,
2411 struct USER_MODALS_INFO_3
*info3
)
2414 struct samr_DomInfo12 dom_info_12
;
2416 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2425 NT_STATUS_NOT_OK_RETURN(status
);
2427 unix_to_nt_time_abs((NTTIME
*)&dom_info_12
.lockout_duration
,
2428 info3
->usrmod3_lockout_duration
);
2429 unix_to_nt_time_abs((NTTIME
*)&dom_info_12
.lockout_window
,
2430 info3
->usrmod3_lockout_observation_window
);
2431 dom_info_12
.lockout_threshold
= info3
->usrmod3_lockout_threshold
;
2433 return set_USER_MODALS_INFO_rpc(mem_ctx
,
2441 /****************************************************************
2442 ****************************************************************/
2444 static NTSTATUS
set_USER_MODALS_INFO_1001_buffer(TALLOC_CTX
*mem_ctx
,
2445 struct rpc_pipe_client
*pipe_cli
,
2446 struct policy_handle
*domain_handle
,
2447 struct USER_MODALS_INFO_1001
*info1001
)
2450 struct samr_DomInfo1 dom_info_1
;
2452 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2461 NT_STATUS_NOT_OK_RETURN(status
);
2463 dom_info_1
.min_password_length
=
2464 info1001
->usrmod1001_min_passwd_len
;
2466 return set_USER_MODALS_INFO_rpc(mem_ctx
,
2474 /****************************************************************
2475 ****************************************************************/
2477 static NTSTATUS
set_USER_MODALS_INFO_1002_buffer(TALLOC_CTX
*mem_ctx
,
2478 struct rpc_pipe_client
*pipe_cli
,
2479 struct policy_handle
*domain_handle
,
2480 struct USER_MODALS_INFO_1002
*info1002
)
2483 struct samr_DomInfo1 dom_info_1
;
2485 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2494 NT_STATUS_NOT_OK_RETURN(status
);
2496 unix_to_nt_time_abs((NTTIME
*)&dom_info_1
.max_password_age
,
2497 info1002
->usrmod1002_max_passwd_age
);
2499 return set_USER_MODALS_INFO_rpc(mem_ctx
,
2507 /****************************************************************
2508 ****************************************************************/
2510 static NTSTATUS
set_USER_MODALS_INFO_1003_buffer(TALLOC_CTX
*mem_ctx
,
2511 struct rpc_pipe_client
*pipe_cli
,
2512 struct policy_handle
*domain_handle
,
2513 struct USER_MODALS_INFO_1003
*info1003
)
2516 struct samr_DomInfo1 dom_info_1
;
2518 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2527 NT_STATUS_NOT_OK_RETURN(status
);
2529 unix_to_nt_time_abs((NTTIME
*)&dom_info_1
.min_password_age
,
2530 info1003
->usrmod1003_min_passwd_age
);
2532 return set_USER_MODALS_INFO_rpc(mem_ctx
,
2540 /****************************************************************
2541 ****************************************************************/
2543 static NTSTATUS
set_USER_MODALS_INFO_1004_buffer(TALLOC_CTX
*mem_ctx
,
2544 struct rpc_pipe_client
*pipe_cli
,
2545 struct policy_handle
*domain_handle
,
2546 struct USER_MODALS_INFO_1004
*info1004
)
2549 struct samr_DomInfo3 dom_info_3
;
2551 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2560 NT_STATUS_NOT_OK_RETURN(status
);
2562 unix_to_nt_time_abs(&dom_info_3
.force_logoff_time
,
2563 info1004
->usrmod1004_force_logoff
);
2565 return set_USER_MODALS_INFO_rpc(mem_ctx
,
2573 /****************************************************************
2574 ****************************************************************/
2576 static NTSTATUS
set_USER_MODALS_INFO_1005_buffer(TALLOC_CTX
*mem_ctx
,
2577 struct rpc_pipe_client
*pipe_cli
,
2578 struct policy_handle
*domain_handle
,
2579 struct USER_MODALS_INFO_1005
*info1005
)
2582 struct samr_DomInfo1 dom_info_1
;
2584 status
= query_USER_MODALS_INFO_rpc(mem_ctx
,
2593 NT_STATUS_NOT_OK_RETURN(status
);
2595 dom_info_1
.password_history_length
=
2596 info1005
->usrmod1005_password_hist_len
;
2598 return set_USER_MODALS_INFO_rpc(mem_ctx
,
2606 /****************************************************************
2607 ****************************************************************/
2609 static NTSTATUS
set_USER_MODALS_INFO_buffer(TALLOC_CTX
*mem_ctx
,
2610 struct rpc_pipe_client
*pipe_cli
,
2612 struct policy_handle
*domain_handle
,
2613 struct dom_sid
*domain_sid
,
2616 struct USER_MODALS_INFO_0
*info0
;
2617 struct USER_MODALS_INFO_3
*info3
;
2618 struct USER_MODALS_INFO_1001
*info1001
;
2619 struct USER_MODALS_INFO_1002
*info1002
;
2620 struct USER_MODALS_INFO_1003
*info1003
;
2621 struct USER_MODALS_INFO_1004
*info1004
;
2622 struct USER_MODALS_INFO_1005
*info1005
;
2625 return ERROR_INSUFFICIENT_BUFFER
;
2630 info0
= (struct USER_MODALS_INFO_0
*)buffer
;
2631 return set_USER_MODALS_INFO_0_buffer(mem_ctx
,
2636 info3
= (struct USER_MODALS_INFO_3
*)buffer
;
2637 return set_USER_MODALS_INFO_3_buffer(mem_ctx
,
2642 info1001
= (struct USER_MODALS_INFO_1001
*)buffer
;
2643 return set_USER_MODALS_INFO_1001_buffer(mem_ctx
,
2648 info1002
= (struct USER_MODALS_INFO_1002
*)buffer
;
2649 return set_USER_MODALS_INFO_1002_buffer(mem_ctx
,
2654 info1003
= (struct USER_MODALS_INFO_1003
*)buffer
;
2655 return set_USER_MODALS_INFO_1003_buffer(mem_ctx
,
2660 info1004
= (struct USER_MODALS_INFO_1004
*)buffer
;
2661 return set_USER_MODALS_INFO_1004_buffer(mem_ctx
,
2666 info1005
= (struct USER_MODALS_INFO_1005
*)buffer
;
2667 return set_USER_MODALS_INFO_1005_buffer(mem_ctx
,
2676 return NT_STATUS_OK
;
2679 /****************************************************************
2680 ****************************************************************/
2682 WERROR
NetUserModalsSet_r(struct libnetapi_ctx
*ctx
,
2683 struct NetUserModalsSet
*r
)
2685 struct cli_state
*cli
= NULL
;
2686 struct rpc_pipe_client
*pipe_cli
= NULL
;
2690 struct policy_handle connect_handle
, domain_handle
;
2691 struct dom_sid2
*domain_sid
= NULL
;
2692 uint32_t access_mask
= SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
;
2694 ZERO_STRUCT(connect_handle
);
2695 ZERO_STRUCT(domain_handle
);
2697 if (!r
->in
.buffer
) {
2698 return WERR_INVALID_PARAM
;
2701 switch (r
->in
.level
) {
2703 access_mask
|= SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1
|
2704 SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2
|
2705 SAMR_DOMAIN_ACCESS_SET_INFO_1
|
2706 SAMR_DOMAIN_ACCESS_SET_INFO_2
;
2713 access_mask
|= SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1
|
2714 SAMR_DOMAIN_ACCESS_SET_INFO_1
;
2717 access_mask
|= SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2
|
2718 SAMR_DOMAIN_ACCESS_SET_INFO_2
;
2724 werr
= WERR_NOT_SUPPORTED
;
2727 werr
= WERR_UNKNOWN_LEVEL
;
2731 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
2732 &ndr_table_samr
.syntax_id
,
2735 if (!W_ERROR_IS_OK(werr
)) {
2739 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
2740 SAMR_ACCESS_ENUM_DOMAINS
|
2741 SAMR_ACCESS_LOOKUP_DOMAIN
,
2746 if (!W_ERROR_IS_OK(werr
)) {
2750 status
= set_USER_MODALS_INFO_buffer(ctx
,
2756 if (!NT_STATUS_IS_OK(status
)) {
2757 werr
= ntstatus_to_werror(status
);
2766 if (ctx
->disable_policy_handle_cache
) {
2767 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
2768 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
2774 /****************************************************************
2775 ****************************************************************/
2777 WERROR
NetUserModalsSet_l(struct libnetapi_ctx
*ctx
,
2778 struct NetUserModalsSet
*r
)
2780 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserModalsSet
);
2783 /****************************************************************
2784 ****************************************************************/
2786 NTSTATUS
add_GROUP_USERS_INFO_X_buffer(TALLOC_CTX
*mem_ctx
,
2788 const char *group_name
,
2789 uint32_t attributes
,
2791 uint32_t *num_entries
)
2793 struct GROUP_USERS_INFO_0 u0
;
2794 struct GROUP_USERS_INFO_1 u1
;
2799 u0
.grui0_name
= talloc_strdup(mem_ctx
, group_name
);
2800 NT_STATUS_HAVE_NO_MEMORY(u0
.grui0_name
);
2802 u0
.grui0_name
= NULL
;
2805 ADD_TO_ARRAY(mem_ctx
, struct GROUP_USERS_INFO_0
, u0
,
2806 (struct GROUP_USERS_INFO_0
**)buffer
, num_entries
);
2810 u1
.grui1_name
= talloc_strdup(mem_ctx
, group_name
);
2811 NT_STATUS_HAVE_NO_MEMORY(u1
.grui1_name
);
2813 u1
.grui1_name
= NULL
;
2816 u1
.grui1_attributes
= attributes
;
2818 ADD_TO_ARRAY(mem_ctx
, struct GROUP_USERS_INFO_1
, u1
,
2819 (struct GROUP_USERS_INFO_1
**)buffer
, num_entries
);
2822 return NT_STATUS_INVALID_INFO_CLASS
;
2825 return NT_STATUS_OK
;
2828 /****************************************************************
2829 ****************************************************************/
2831 WERROR
NetUserGetGroups_r(struct libnetapi_ctx
*ctx
,
2832 struct NetUserGetGroups
*r
)
2834 struct cli_state
*cli
= NULL
;
2835 struct rpc_pipe_client
*pipe_cli
= NULL
;
2836 struct policy_handle connect_handle
, domain_handle
, user_handle
;
2837 struct lsa_String lsa_account_name
;
2838 struct dom_sid2
*domain_sid
= NULL
;
2839 struct samr_Ids user_rids
, name_types
;
2840 struct samr_RidWithAttributeArray
*rid_array
= NULL
;
2841 struct lsa_Strings names
;
2842 struct samr_Ids types
;
2843 uint32_t *rids
= NULL
;
2846 uint32_t entries_read
= 0;
2848 NTSTATUS status
= NT_STATUS_OK
;
2851 ZERO_STRUCT(connect_handle
);
2852 ZERO_STRUCT(domain_handle
);
2854 if (!r
->out
.buffer
) {
2855 return WERR_INVALID_PARAM
;
2858 *r
->out
.buffer
= NULL
;
2859 *r
->out
.entries_read
= 0;
2860 *r
->out
.total_entries
= 0;
2862 switch (r
->in
.level
) {
2867 return WERR_UNKNOWN_LEVEL
;
2870 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
2871 &ndr_table_samr
.syntax_id
,
2874 if (!W_ERROR_IS_OK(werr
)) {
2878 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
2879 SAMR_ACCESS_ENUM_DOMAINS
|
2880 SAMR_ACCESS_LOOKUP_DOMAIN
,
2881 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
2885 if (!W_ERROR_IS_OK(werr
)) {
2889 init_lsa_String(&lsa_account_name
, r
->in
.user_name
);
2891 status
= rpccli_samr_LookupNames(pipe_cli
, ctx
,
2897 if (!NT_STATUS_IS_OK(status
)) {
2898 werr
= ntstatus_to_werror(status
);
2902 status
= rpccli_samr_OpenUser(pipe_cli
, ctx
,
2904 SAMR_USER_ACCESS_GET_GROUPS
,
2907 if (!NT_STATUS_IS_OK(status
)) {
2908 werr
= ntstatus_to_werror(status
);
2912 status
= rpccli_samr_GetGroupsForUser(pipe_cli
, ctx
,
2915 if (!NT_STATUS_IS_OK(status
)) {
2916 werr
= ntstatus_to_werror(status
);
2920 rids
= talloc_array(ctx
, uint32_t, rid_array
->count
);
2926 for (i
=0; i
< rid_array
->count
; i
++) {
2927 rids
[i
] = rid_array
->rids
[i
].rid
;
2930 status
= rpccli_samr_LookupRids(pipe_cli
, ctx
,
2936 if (!NT_STATUS_IS_OK(status
) &&
2937 !NT_STATUS_EQUAL(status
, STATUS_SOME_UNMAPPED
)) {
2938 werr
= ntstatus_to_werror(status
);
2942 for (i
=0; i
< names
.count
; i
++) {
2943 status
= add_GROUP_USERS_INFO_X_buffer(ctx
,
2945 names
.names
[i
].string
,
2946 rid_array
->rids
[i
].attributes
,
2949 if (!NT_STATUS_IS_OK(status
)) {
2950 werr
= ntstatus_to_werror(status
);
2955 *r
->out
.entries_read
= entries_read
;
2956 *r
->out
.total_entries
= entries_read
;
2963 if (ctx
->disable_policy_handle_cache
) {
2964 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
2965 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
2971 /****************************************************************
2972 ****************************************************************/
2974 WERROR
NetUserGetGroups_l(struct libnetapi_ctx
*ctx
,
2975 struct NetUserGetGroups
*r
)
2977 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserGetGroups
);
2980 /****************************************************************
2981 ****************************************************************/
2983 WERROR
NetUserSetGroups_r(struct libnetapi_ctx
*ctx
,
2984 struct NetUserSetGroups
*r
)
2986 struct cli_state
*cli
= NULL
;
2987 struct rpc_pipe_client
*pipe_cli
= NULL
;
2988 struct policy_handle connect_handle
, domain_handle
, user_handle
, group_handle
;
2989 struct lsa_String lsa_account_name
;
2990 struct dom_sid2
*domain_sid
= NULL
;
2991 struct samr_Ids user_rids
, name_types
;
2992 struct samr_Ids group_rids
;
2993 struct samr_RidWithAttributeArray
*rid_array
= NULL
;
2994 struct lsa_String
*lsa_names
= NULL
;
2996 uint32_t *add_rids
= NULL
;
2997 uint32_t *del_rids
= NULL
;
2998 size_t num_add_rids
= 0;
2999 size_t num_del_rids
= 0;
3001 uint32_t *member_rids
= NULL
;
3002 size_t num_member_rids
= 0;
3004 struct GROUP_USERS_INFO_0
*i0
= NULL
;
3005 struct GROUP_USERS_INFO_1
*i1
= NULL
;
3009 NTSTATUS status
= NT_STATUS_OK
;
3012 ZERO_STRUCT(connect_handle
);
3013 ZERO_STRUCT(domain_handle
);
3015 if (!r
->in
.buffer
) {
3016 return WERR_INVALID_PARAM
;
3019 switch (r
->in
.level
) {
3024 return WERR_UNKNOWN_LEVEL
;
3027 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
3028 &ndr_table_samr
.syntax_id
,
3031 if (!W_ERROR_IS_OK(werr
)) {
3035 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
3036 SAMR_ACCESS_ENUM_DOMAINS
|
3037 SAMR_ACCESS_LOOKUP_DOMAIN
,
3038 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
,
3042 if (!W_ERROR_IS_OK(werr
)) {
3046 init_lsa_String(&lsa_account_name
, r
->in
.user_name
);
3048 status
= rpccli_samr_LookupNames(pipe_cli
, ctx
,
3054 if (!NT_STATUS_IS_OK(status
)) {
3055 werr
= ntstatus_to_werror(status
);
3059 status
= rpccli_samr_OpenUser(pipe_cli
, ctx
,
3061 SAMR_USER_ACCESS_GET_GROUPS
,
3064 if (!NT_STATUS_IS_OK(status
)) {
3065 werr
= ntstatus_to_werror(status
);
3069 switch (r
->in
.level
) {
3071 i0
= (struct GROUP_USERS_INFO_0
*)r
->in
.buffer
;
3074 i1
= (struct GROUP_USERS_INFO_1
*)r
->in
.buffer
;
3078 lsa_names
= talloc_array(ctx
, struct lsa_String
, r
->in
.num_entries
);
3084 for (i
=0; i
< r
->in
.num_entries
; i
++) {
3086 switch (r
->in
.level
) {
3088 init_lsa_String(&lsa_names
[i
], i0
->grui0_name
);
3092 init_lsa_String(&lsa_names
[i
], i1
->grui1_name
);
3098 status
= rpccli_samr_LookupNames(pipe_cli
, ctx
,
3104 if (!NT_STATUS_IS_OK(status
)) {
3105 werr
= ntstatus_to_werror(status
);
3109 member_rids
= group_rids
.ids
;
3110 num_member_rids
= group_rids
.count
;
3112 status
= rpccli_samr_GetGroupsForUser(pipe_cli
, ctx
,
3115 if (!NT_STATUS_IS_OK(status
)) {
3116 werr
= ntstatus_to_werror(status
);
3122 for (i
=0; i
< r
->in
.num_entries
; i
++) {
3123 bool already_member
= false;
3124 for (k
=0; k
< rid_array
->count
; k
++) {
3125 if (member_rids
[i
] == rid_array
->rids
[k
].rid
) {
3126 already_member
= true;
3130 if (!already_member
) {
3131 if (!add_rid_to_array_unique(ctx
,
3133 &add_rids
, &num_add_rids
)) {
3134 werr
= WERR_GENERAL_FAILURE
;
3142 for (k
=0; k
< rid_array
->count
; k
++) {
3143 bool keep_member
= false;
3144 for (i
=0; i
< r
->in
.num_entries
; i
++) {
3145 if (member_rids
[i
] == rid_array
->rids
[k
].rid
) {
3151 if (!add_rid_to_array_unique(ctx
,
3152 rid_array
->rids
[k
].rid
,
3153 &del_rids
, &num_del_rids
)) {
3154 werr
= WERR_GENERAL_FAILURE
;
3162 for (i
=0; i
< num_add_rids
; i
++) {
3163 status
= rpccli_samr_OpenGroup(pipe_cli
, ctx
,
3165 SAMR_GROUP_ACCESS_ADD_MEMBER
,
3168 if (!NT_STATUS_IS_OK(status
)) {
3169 werr
= ntstatus_to_werror(status
);
3173 status
= rpccli_samr_AddGroupMember(pipe_cli
, ctx
,
3177 if (!NT_STATUS_IS_OK(status
)) {
3178 werr
= ntstatus_to_werror(status
);
3182 if (is_valid_policy_hnd(&group_handle
)) {
3183 rpccli_samr_Close(pipe_cli
, ctx
, &group_handle
);
3189 for (i
=0; i
< num_del_rids
; i
++) {
3190 status
= rpccli_samr_OpenGroup(pipe_cli
, ctx
,
3192 SAMR_GROUP_ACCESS_REMOVE_MEMBER
,
3195 if (!NT_STATUS_IS_OK(status
)) {
3196 werr
= ntstatus_to_werror(status
);
3200 status
= rpccli_samr_DeleteGroupMember(pipe_cli
, ctx
,
3203 if (!NT_STATUS_IS_OK(status
)) {
3204 werr
= ntstatus_to_werror(status
);
3208 if (is_valid_policy_hnd(&group_handle
)) {
3209 rpccli_samr_Close(pipe_cli
, ctx
, &group_handle
);
3220 if (is_valid_policy_hnd(&group_handle
)) {
3221 rpccli_samr_Close(pipe_cli
, ctx
, &group_handle
);
3224 if (ctx
->disable_policy_handle_cache
) {
3225 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
3226 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
3232 /****************************************************************
3233 ****************************************************************/
3235 WERROR
NetUserSetGroups_l(struct libnetapi_ctx
*ctx
,
3236 struct NetUserSetGroups
*r
)
3238 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserSetGroups
);
3241 /****************************************************************
3242 ****************************************************************/
3244 static NTSTATUS
add_LOCALGROUP_USERS_INFO_X_buffer(TALLOC_CTX
*mem_ctx
,
3246 const char *group_name
,
3248 uint32_t *num_entries
)
3250 struct LOCALGROUP_USERS_INFO_0 u0
;
3254 u0
.lgrui0_name
= talloc_strdup(mem_ctx
, group_name
);
3255 NT_STATUS_HAVE_NO_MEMORY(u0
.lgrui0_name
);
3257 ADD_TO_ARRAY(mem_ctx
, struct LOCALGROUP_USERS_INFO_0
, u0
,
3258 (struct LOCALGROUP_USERS_INFO_0
**)buffer
, num_entries
);
3261 return NT_STATUS_INVALID_INFO_CLASS
;
3264 return NT_STATUS_OK
;
3267 /****************************************************************
3268 ****************************************************************/
3270 WERROR
NetUserGetLocalGroups_r(struct libnetapi_ctx
*ctx
,
3271 struct NetUserGetLocalGroups
*r
)
3273 struct cli_state
*cli
= NULL
;
3274 struct rpc_pipe_client
*pipe_cli
= NULL
;
3275 struct policy_handle connect_handle
, domain_handle
, user_handle
,
3277 struct lsa_String lsa_account_name
;
3278 struct dom_sid2
*domain_sid
= NULL
;
3279 struct samr_Ids user_rids
, name_types
;
3280 struct samr_RidWithAttributeArray
*rid_array
= NULL
;
3281 struct lsa_Strings names
;
3282 struct samr_Ids types
;
3283 uint32_t *rids
= NULL
;
3284 size_t num_rids
= 0;
3285 struct dom_sid user_sid
;
3286 struct lsa_SidArray sid_array
;
3287 struct samr_Ids domain_rids
;
3288 struct samr_Ids builtin_rids
;
3291 uint32_t entries_read
= 0;
3293 NTSTATUS status
= NT_STATUS_OK
;
3296 ZERO_STRUCT(connect_handle
);
3297 ZERO_STRUCT(domain_handle
);
3299 if (!r
->out
.buffer
) {
3300 return WERR_INVALID_PARAM
;
3303 *r
->out
.buffer
= NULL
;
3304 *r
->out
.entries_read
= 0;
3305 *r
->out
.total_entries
= 0;
3307 switch (r
->in
.level
) {
3312 return WERR_UNKNOWN_LEVEL
;
3315 werr
= libnetapi_open_pipe(ctx
, r
->in
.server_name
,
3316 &ndr_table_samr
.syntax_id
,
3319 if (!W_ERROR_IS_OK(werr
)) {
3323 werr
= libnetapi_samr_open_domain(ctx
, pipe_cli
,
3324 SAMR_ACCESS_ENUM_DOMAINS
|
3325 SAMR_ACCESS_LOOKUP_DOMAIN
,
3326 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
|
3327 SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS
,
3331 if (!W_ERROR_IS_OK(werr
)) {
3335 werr
= libnetapi_samr_open_builtin_domain(ctx
, pipe_cli
,
3336 SAMR_ACCESS_ENUM_DOMAINS
|
3337 SAMR_ACCESS_LOOKUP_DOMAIN
,
3338 SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT
|
3339 SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS
,
3342 if (!W_ERROR_IS_OK(werr
)) {
3346 init_lsa_String(&lsa_account_name
, r
->in
.user_name
);
3348 status
= rpccli_samr_LookupNames(pipe_cli
, ctx
,
3354 if (!NT_STATUS_IS_OK(status
)) {
3355 werr
= ntstatus_to_werror(status
);
3359 status
= rpccli_samr_OpenUser(pipe_cli
, ctx
,
3361 SAMR_USER_ACCESS_GET_GROUPS
,
3364 if (!NT_STATUS_IS_OK(status
)) {
3365 werr
= ntstatus_to_werror(status
);
3369 status
= rpccli_samr_GetGroupsForUser(pipe_cli
, ctx
,
3372 if (!NT_STATUS_IS_OK(status
)) {
3373 werr
= ntstatus_to_werror(status
);
3377 if (!sid_compose(&user_sid
, domain_sid
, user_rids
.ids
[0])) {
3382 sid_array
.num_sids
= rid_array
->count
+ 1;
3383 sid_array
.sids
= TALLOC_ARRAY(ctx
, struct lsa_SidPtr
, sid_array
.num_sids
);
3384 if (!sid_array
.sids
) {
3389 sid_array
.sids
[0].sid
= sid_dup_talloc(ctx
, &user_sid
);
3390 if (!sid_array
.sids
[0].sid
) {
3395 for (i
=0; i
< rid_array
->count
; i
++) {
3398 if (!sid_compose(&sid
, domain_sid
, rid_array
->rids
[i
].rid
)) {
3403 sid_array
.sids
[i
+1].sid
= sid_dup_talloc(ctx
, &sid
);
3404 if (!sid_array
.sids
[i
+1].sid
) {
3410 status
= rpccli_samr_GetAliasMembership(pipe_cli
, ctx
,
3414 if (!NT_STATUS_IS_OK(status
)) {
3415 werr
= ntstatus_to_werror(status
);
3419 for (i
=0; i
< domain_rids
.count
; i
++) {
3420 if (!add_rid_to_array_unique(ctx
, domain_rids
.ids
[i
],
3421 &rids
, &num_rids
)) {
3427 status
= rpccli_samr_GetAliasMembership(pipe_cli
, ctx
,
3431 if (!NT_STATUS_IS_OK(status
)) {
3432 werr
= ntstatus_to_werror(status
);
3436 for (i
=0; i
< builtin_rids
.count
; i
++) {
3437 if (!add_rid_to_array_unique(ctx
, builtin_rids
.ids
[i
],
3438 &rids
, &num_rids
)) {
3444 status
= rpccli_samr_LookupRids(pipe_cli
, ctx
,
3450 if (!NT_STATUS_IS_OK(status
)) {
3451 werr
= ntstatus_to_werror(status
);
3455 for (i
=0; i
< names
.count
; i
++) {
3456 status
= add_LOCALGROUP_USERS_INFO_X_buffer(ctx
,
3458 names
.names
[i
].string
,
3461 if (!NT_STATUS_IS_OK(status
)) {
3462 werr
= ntstatus_to_werror(status
);
3467 *r
->out
.entries_read
= entries_read
;
3468 *r
->out
.total_entries
= entries_read
;
3475 if (ctx
->disable_policy_handle_cache
) {
3476 libnetapi_samr_close_domain_handle(ctx
, &domain_handle
);
3477 libnetapi_samr_close_connect_handle(ctx
, &connect_handle
);
3483 /****************************************************************
3484 ****************************************************************/
3486 WERROR
NetUserGetLocalGroups_l(struct libnetapi_ctx
*ctx
,
3487 struct NetUserGetLocalGroups
*r
)
3489 LIBNETAPI_REDIRECT_TO_LOCALHOST(ctx
, r
, NetUserGetLocalGroups
);