s4:drsuapi: check the source_dsa_invocation_id (bug #9508)
[Samba/gebeck_regimport.git] / source4 / rpc_server / handles.c
blobbe9f16ce733d3804ce03856f198f3ca6a310e8d7
1 /*
2 Unix SMB/CIFS implementation.
4 server side dcerpc handle code
6 Copyright (C) Andrew Tridgell 2003
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "../lib/util/dlinklist.h"
24 #include "rpc_server/dcerpc_server.h"
25 #include "libcli/security/security.h"
26 #include "auth/session.h"
29 destroy a rpc handle
31 static int dcesrv_handle_destructor(struct dcesrv_handle *h)
33 DLIST_REMOVE(h->assoc_group->handles, h);
34 return 0;
39 allocate a new rpc handle
41 _PUBLIC_ struct dcesrv_handle *dcesrv_handle_new(struct dcesrv_connection_context *context,
42 uint8_t handle_type)
44 struct dcesrv_handle *h;
45 struct dom_sid *sid;
47 sid = &context->conn->auth_state.session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
49 h = talloc(context->assoc_group, struct dcesrv_handle);
50 if (!h) {
51 return NULL;
53 h->data = NULL;
54 h->sid = dom_sid_dup(h, sid);
55 if (h->sid == NULL) {
56 talloc_free(h);
57 return NULL;
59 h->assoc_group = context->assoc_group;
60 h->iface = context->iface;
61 h->wire_handle.handle_type = handle_type;
62 h->wire_handle.uuid = GUID_random();
64 DLIST_ADD(context->assoc_group->handles, h);
66 talloc_set_destructor(h, dcesrv_handle_destructor);
68 return h;
71 /**
72 find an internal handle given a wire handle. If the wire handle is NULL then
73 allocate a new handle
75 _PUBLIC_ struct dcesrv_handle *dcesrv_handle_fetch(
76 struct dcesrv_connection_context *context,
77 struct policy_handle *p,
78 uint8_t handle_type)
80 struct dcesrv_handle *h;
81 struct dom_sid *sid;
83 sid = &context->conn->auth_state.session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
85 if (ndr_policy_handle_empty(p)) {
86 /* TODO: we should probably return a NULL handle here */
87 return dcesrv_handle_new(context, handle_type);
90 for (h=context->assoc_group->handles; h; h=h->next) {
91 if (h->wire_handle.handle_type == p->handle_type &&
92 GUID_equal(&p->uuid, &h->wire_handle.uuid)) {
93 if (handle_type != DCESRV_HANDLE_ANY &&
94 p->handle_type != handle_type) {
95 DEBUG(0,("client gave us the wrong handle type (%d should be %d)\n",
96 p->handle_type, handle_type));
97 return NULL;
99 if (!dom_sid_equal(h->sid, sid)) {
100 DEBUG(0,(__location__ ": Attempt to use invalid sid %s - %s\n",
101 dom_sid_string(context, h->sid),
102 dom_sid_string(context, sid)));
103 return NULL;
105 if (h->iface != context->iface) {
106 DEBUG(0,(__location__ ": Attempt to use invalid iface\n"));
107 return NULL;
109 return h;
113 return NULL;