s4-drs: use parentGUID attribute in getncchanges
[Samba/nascimento.git] / source4 / rpc_server / drsuapi / getncchanges.c
blobcb0a145639ca5d10ef87049e1613026bbad7e27e
1 /*
2 Unix SMB/CIFS implementation.
4 implement the DRSUpdateRefs call
6 Copyright (C) Anatoliy Atanasov 2009
7 Copyright (C) Andrew Tridgell 2009
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "rpc_server/dcerpc_server.h"
25 #include "dsdb/samdb/samdb.h"
26 #include "param/param.h"
27 #include "librpc/gen_ndr/ndr_drsblobs.h"
28 #include "rpc_server/drsuapi/dcesrv_drsuapi.h"
29 #include "rpc_server/dcerpc_server_proto.h"
30 #include "../libcli/drsuapi/drsuapi.h"
31 #include "libcli/security/security.h"
33 /*
34 drsuapi_DsGetNCChanges for one object
36 static WERROR get_nc_changes_build_object(struct drsuapi_DsReplicaObjectListItemEx *obj,
37 struct ldb_message *msg,
38 struct ldb_context *sam_ctx,
39 struct ldb_dn *ncRoot_dn,
40 struct dsdb_schema *schema,
41 DATA_BLOB *session_key,
42 uint64_t highest_usn,
43 uint32_t replica_flags)
45 const struct ldb_val *md_value;
46 int i, n;
47 struct ldb_dn *obj_dn;
48 struct replPropertyMetaDataBlob md;
49 struct dom_sid *sid;
50 uint32_t rid = 0;
51 enum ndr_err_code ndr_err;
52 uint32_t *attids;
53 const char *rdn;
54 const struct dsdb_attribute *rdn_sa;
56 if (ldb_dn_compare(ncRoot_dn, msg->dn) == 0) {
57 obj->is_nc_prefix = true;
58 obj->parent_object_guid = NULL;
59 } else {
60 obj->is_nc_prefix = false;
61 obj->parent_object_guid = talloc(obj, struct GUID);
62 if (obj->parent_object_guid == NULL) {
63 return WERR_DS_DRA_INTERNAL_ERROR;
65 *obj->parent_object_guid = samdb_result_guid(msg, "parentGUID");
66 if (GUID_all_zero(obj->parent_object_guid)) {
67 DEBUG(0,(__location__ ": missing parentGUID for %s\n",
68 ldb_dn_get_linearized(msg->dn)));
69 return WERR_DS_DRA_INTERNAL_ERROR;
72 obj->next_object = NULL;
74 md_value = ldb_msg_find_ldb_val(msg, "replPropertyMetaData");
75 if (!md_value) {
76 /* nothing to send */
77 return WERR_OK;
80 ndr_err = ndr_pull_struct_blob(md_value, obj,
81 lp_iconv_convenience(ldb_get_opaque(sam_ctx, "loadparm")), &md,
82 (ndr_pull_flags_fn_t)ndr_pull_replPropertyMetaDataBlob);
83 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
84 return WERR_DS_DRA_INTERNAL_ERROR;
87 if (md.version != 1) {
88 return WERR_DS_DRA_INTERNAL_ERROR;
91 rdn = ldb_dn_get_rdn_name(msg->dn);
92 if (rdn == NULL) {
93 DEBUG(0,(__location__ ": No rDN for %s\n", ldb_dn_get_linearized(msg->dn)));
94 return WERR_DS_DRA_INTERNAL_ERROR;
97 rdn_sa = dsdb_attribute_by_lDAPDisplayName(schema, rdn);
98 if (rdn_sa == NULL) {
99 DEBUG(0,(__location__ ": Can't find dsds_attribute for rDN %s in %s\n",
100 rdn, ldb_dn_get_linearized(msg->dn)));
101 return WERR_DS_DRA_INTERNAL_ERROR;
104 obj->meta_data_ctr = talloc(obj, struct drsuapi_DsReplicaMetaDataCtr);
105 attids = talloc_array(obj, uint32_t, md.ctr.ctr1.count);
107 obj->object.identifier = talloc(obj, struct drsuapi_DsReplicaObjectIdentifier);
108 obj_dn = ldb_msg_find_attr_as_dn(sam_ctx, obj, msg, "distinguishedName");
109 obj->object.identifier->dn = ldb_dn_get_linearized(obj_dn);
110 obj->object.identifier->guid = samdb_result_guid(msg, "objectGUID");
111 sid = samdb_result_dom_sid(obj, msg, "objectSid");
112 if (sid) {
113 dom_sid_split_rid(NULL, sid, NULL, &rid);
114 obj->object.identifier->sid = *sid;
115 } else {
116 ZERO_STRUCT(obj->object.identifier->sid);
119 obj->meta_data_ctr->meta_data = talloc_array(obj, struct drsuapi_DsReplicaMetaData, md.ctr.ctr1.count);
120 for (n=i=0; i<md.ctr.ctr1.count; i++) {
121 /* if the attribute has not changed, and it is not the
122 instanceType then don't include it */
123 if (md.ctr.ctr1.array[i].local_usn < highest_usn &&
124 md.ctr.ctr1.array[i].attid != DRSUAPI_ATTRIBUTE_instanceType) continue;
126 /* don't include the rDN */
127 if (md.ctr.ctr1.array[i].attid == rdn_sa->attributeID_id) continue;
129 obj->meta_data_ctr->meta_data[n].originating_change_time = md.ctr.ctr1.array[i].originating_change_time;
130 obj->meta_data_ctr->meta_data[n].version = md.ctr.ctr1.array[i].version;
131 obj->meta_data_ctr->meta_data[n].originating_invocation_id = md.ctr.ctr1.array[i].originating_invocation_id;
132 obj->meta_data_ctr->meta_data[n].originating_usn = md.ctr.ctr1.array[i].originating_usn;
133 attids[n] = md.ctr.ctr1.array[i].attid;
134 n++;
138 note that if n==0 we still need to send the change, as it
139 could be a rename, which changes the uSNChanged, but not any
140 of the replicated attributes
143 obj->meta_data_ctr->count = n;
145 obj->object.flags = DRSUAPI_DS_REPLICA_OBJECT_FROM_MASTER;
146 obj->object.attribute_ctr.num_attributes = obj->meta_data_ctr->count;
147 obj->object.attribute_ctr.attributes = talloc_array(obj, struct drsuapi_DsReplicaAttribute,
148 obj->object.attribute_ctr.num_attributes);
151 * Note that the meta_data array and the attributes array must
152 * be the same size and in the same order
154 for (i=0; i<obj->object.attribute_ctr.num_attributes; i++) {
155 struct ldb_message_element *el;
156 WERROR werr;
157 const struct dsdb_attribute *sa;
159 sa = dsdb_attribute_by_attributeID_id(schema, attids[i]);
160 if (!sa) {
161 DEBUG(0,("Unable to find attributeID %u in schema\n", attids[i]));
162 return WERR_DS_DRA_INTERNAL_ERROR;
165 el = ldb_msg_find_element(msg, sa->lDAPDisplayName);
166 if (el == NULL) {
167 /* this happens for attributes that have been removed */
168 DEBUG(5,("No element '%s' for attributeID %u in message\n",
169 sa->lDAPDisplayName, attids[i]));
170 ZERO_STRUCT(obj->object.attribute_ctr.attributes[i]);
171 obj->object.attribute_ctr.attributes[i].attid = attids[i];
172 } else {
173 werr = dsdb_attribute_ldb_to_drsuapi(sam_ctx, schema, el, obj,
174 &obj->object.attribute_ctr.attributes[i]);
175 if (!W_ERROR_IS_OK(werr)) {
176 DEBUG(0,("Unable to convert %s to DRS object - %s\n",
177 sa->lDAPDisplayName, win_errstr(werr)));
178 return werr;
180 /* if DRSUAPI_DRS_SPECIAL_SECRET_PROCESSING is set
181 * check if attribute is secret and send a null value
183 if (replica_flags & DRSUAPI_DRS_SPECIAL_SECRET_PROCESSING) {
184 drsuapi_process_secret_attribute(&obj->object.attribute_ctr.attributes[i],
185 &obj->meta_data_ctr->meta_data[i]);
187 /* some attributes needs to be encrypted
188 before being sent */
189 werr = drsuapi_encrypt_attribute(obj, session_key, rid,
190 &obj->object.attribute_ctr.attributes[i]);
191 if (!W_ERROR_IS_OK(werr)) {
192 DEBUG(0,("Unable to encrypt %s in DRS object - %s\n",
193 sa->lDAPDisplayName, win_errstr(werr)));
194 return werr;
199 return WERR_OK;
203 load replUpToDateVector from a DN
205 static WERROR load_udv(struct ldb_context *sam_ctx, TALLOC_CTX *mem_ctx,
206 struct ldb_dn *dn, struct replUpToDateVectorBlob *ouv)
208 const char *attrs[] = { "replUpToDateVector", NULL };
209 struct ldb_result *res = NULL;
210 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
211 struct ldb_message_element *el;
212 enum ndr_err_code ndr_err;
214 ZERO_STRUCTP(ouv);
216 if (ldb_search(sam_ctx, tmp_ctx, &res, dn, LDB_SCOPE_BASE, attrs, NULL) != LDB_SUCCESS ||
217 res->count < 1) {
218 DEBUG(0,("load_udv: failed to read partition object\n"));
219 talloc_free(tmp_ctx);
220 return WERR_DS_DRA_INTERNAL_ERROR;
223 el = ldb_msg_find_element(res->msgs[0], "replUpToDateVector");
224 if (el == NULL || el->num_values < 1) {
225 talloc_free(tmp_ctx);
226 ouv->version = 2;
227 return WERR_OK;
230 ndr_err = ndr_pull_struct_blob(&el->values[0],
231 mem_ctx, lp_iconv_convenience(ldb_get_opaque(sam_ctx, "loadparm")),
232 ouv,
233 (ndr_pull_flags_fn_t)ndr_pull_replUpToDateVectorBlob);
234 talloc_free(tmp_ctx);
235 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
236 DEBUG(0,(__location__ ": Failed to parse replUpToDateVector for %s\n",
237 ldb_dn_get_linearized(dn)));
238 return WERR_DS_DRA_INTERNAL_ERROR;
241 return WERR_OK;
246 fill in the cursors return based on the replUpToDateVector for the ncRoot_dn
248 static WERROR get_nc_changes_udv(struct ldb_context *sam_ctx,
249 struct ldb_dn *ncRoot_dn,
250 struct drsuapi_DsReplicaCursor2CtrEx *udv,
251 uint64_t highestUSN)
253 WERROR werr;
254 struct drsuapi_DsReplicaCursor2 *tmp_cursor;
255 NTTIME now;
256 time_t t = time(NULL);
257 struct replUpToDateVectorBlob ouv;
259 werr = load_udv(sam_ctx, udv, ncRoot_dn, &ouv);
260 if (!W_ERROR_IS_OK(werr)) {
261 return werr;
264 tmp_cursor = talloc(udv, struct drsuapi_DsReplicaCursor2);
265 tmp_cursor->source_dsa_invocation_id = *(samdb_ntds_invocation_id(sam_ctx));
266 tmp_cursor->highest_usn = highestUSN;
267 unix_to_nt_time(&now, t);
268 tmp_cursor->last_sync_success = now;
270 udv->count = ouv.ctr.ctr2.count + 1;
271 udv->cursors = talloc_steal(udv, ouv.ctr.ctr2.cursors);
272 udv->cursors = talloc_realloc(udv, udv->cursors, struct drsuapi_DsReplicaCursor2, udv->count);
273 if (!udv->cursors) {
274 return WERR_DS_DRA_INTERNAL_ERROR;
276 udv->cursors[udv->count - 1] = *tmp_cursor;
278 qsort(udv->cursors, udv->count,
279 sizeof(struct drsuapi_DsReplicaCursor2),
280 (comparison_fn_t)drsuapi_DsReplicaCursor2_compare);
282 return WERR_OK;
285 /* state of a partially completed getncchanges call */
286 struct drsuapi_getncchanges_state {
287 struct ldb_result *site_res;
288 uint32_t num_sent;
289 struct ldb_dn *ncRoot_dn;
290 uint64_t min_usn;
291 uint64_t highest_usn;
295 drsuapi_DsGetNCChanges
297 see MS-DRSR 4.1.10.5.2 for basic logic of this function
299 WERROR dcesrv_drsuapi_DsGetNCChanges(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx,
300 struct drsuapi_DsGetNCChanges *r)
302 struct drsuapi_DsReplicaObjectIdentifier *ncRoot;
303 int ret;
304 int i;
305 struct dsdb_schema *schema;
306 struct drsuapi_DsReplicaOIDMapping_Ctr *ctr;
307 struct drsuapi_DsReplicaObjectListItemEx **currentObject;
308 NTSTATUS status;
309 DATA_BLOB session_key;
310 const char *attrs[] = { "*", "distinguishedName",
311 "ntSecurityDescriptor",
312 "replPropertyMetaData",
313 "lmPwdHistory",
314 "ntPwdHistory",
315 "supplementalCredentials",
316 "unicodePwd",
317 "parentGUID",
318 NULL };
319 WERROR werr;
320 struct dcesrv_handle *h;
321 struct drsuapi_bind_state *b_state;
322 struct drsuapi_getncchanges_state *getnc_state;
323 struct drsuapi_DsGetNCChangesRequest8 *req8;
324 uint32_t options;
326 DCESRV_PULL_HANDLE_WERR(h, r->in.bind_handle, DRSUAPI_BIND_HANDLE);
327 b_state = h->data;
329 *r->out.level_out = 6;
330 /* TODO: linked attributes*/
331 r->out.ctr->ctr6.linked_attributes_count = 0;
332 r->out.ctr->ctr6.linked_attributes = NULL;
334 r->out.ctr->ctr6.object_count = 0;
335 r->out.ctr->ctr6.nc_object_count = 0;
336 r->out.ctr->ctr6.more_data = false;
337 r->out.ctr->ctr6.uptodateness_vector = NULL;
339 /* a RODC doesn't allow for any replication */
340 if (samdb_rodc(ldb_get_opaque(b_state->sam_ctx, "loadparm"))) {
341 DEBUG(0,(__location__ ": DsGetNCChanges attempt on RODC\n"));
342 return WERR_DS_DRA_SOURCE_DISABLED;
345 /* Check request revision.
346 TODO: Adding mappings to req8 from the other levels
348 if (r->in.level != 8) {
349 DEBUG(0,(__location__ ": Request for DsGetNCChanges with unsupported level %u\n",
350 r->in.level));
351 return WERR_REVISION_MISMATCH;
354 req8 = &r->in.req->req8;
356 /* Perform access checks. */
357 /* TODO: we need to support a sync on a specific non-root
358 * DN. We'll need to find the real partition root here */
359 ncRoot = req8->naming_context;
360 if (ncRoot == NULL) {
361 DEBUG(0,(__location__ ": Request for DsGetNCChanges with no NC\n"));
362 return WERR_DS_DRA_INVALID_PARAMETER;
365 if (samdb_ntds_options(b_state->sam_ctx, &options) != LDB_SUCCESS) {
366 return WERR_DS_DRA_INTERNAL_ERROR;
369 if ((options & DS_NTDSDSA_OPT_DISABLE_OUTBOUND_REPL) &&
370 !(req8->replica_flags & DRSUAPI_DRS_SYNC_FORCED)) {
371 return WERR_DS_DRA_SOURCE_DISABLED;
375 if (req8->replica_flags & DRSUAPI_DS_REPLICA_NEIGHBOUR_FULL_SYNC_PACKET) {
376 /* Ignore the _in_ uptpdateness vector*/
377 req8->uptodateness_vector = NULL;
380 werr = drs_security_level_check(dce_call, "DsGetNCChanges");
381 if (!W_ERROR_IS_OK(werr)) {
382 return werr;
385 getnc_state = b_state->getncchanges_state;
387 /* see if a previous replication has been abandoned */
388 if (getnc_state) {
389 struct ldb_dn *new_dn = ldb_dn_new(getnc_state, b_state->sam_ctx, ncRoot->dn);
390 if (ldb_dn_compare(new_dn, getnc_state->ncRoot_dn) != 0) {
391 DEBUG(0,(__location__ ": DsGetNCChanges 2nd replication on different DN %s %s\n",
392 ldb_dn_get_linearized(new_dn),
393 ldb_dn_get_linearized(getnc_state->ncRoot_dn)));
394 talloc_free(getnc_state);
395 getnc_state = NULL;
399 if (getnc_state == NULL) {
400 getnc_state = talloc_zero(b_state, struct drsuapi_getncchanges_state);
401 if (getnc_state == NULL) {
402 return WERR_NOMEM;
404 b_state->getncchanges_state = getnc_state;
407 /* we need the session key for encrypting password attributes */
408 status = dcesrv_inherited_session_key(dce_call->conn, &session_key);
409 if (!NT_STATUS_IS_OK(status)) {
410 DEBUG(0,(__location__ ": Failed to get session key\n"));
411 return WERR_DS_DRA_INTERNAL_ERROR;
414 /* we don't yet support extended operations */
415 if (req8->extended_op != DRSUAPI_EXOP_NONE) {
416 DEBUG(0,(__location__ ": Request for DsGetNCChanges extended op 0x%x\n",
417 (unsigned)req8->extended_op));
418 return WERR_DS_DRA_NOT_SUPPORTED;
422 TODO: MS-DRSR section 4.1.10.1.1
423 Work out if this is the start of a new cycle */
425 if (getnc_state->site_res == NULL) {
426 char* search_filter;
427 enum ldb_scope scope = LDB_SCOPE_SUBTREE;
429 getnc_state->min_usn = req8->highwatermark.highest_usn;
431 /* Construct response. */
432 search_filter = talloc_asprintf(mem_ctx,
433 "(uSNChanged>=%llu)",
434 (unsigned long long)(getnc_state->min_usn+1));
436 if (req8->replica_flags & DRSUAPI_DS_REPLICA_NEIGHBOUR_CRITICAL_ONLY) {
437 search_filter = talloc_asprintf(mem_ctx,
438 "(&%s(isCriticalSystemObject=TRUE))",
439 search_filter);
442 if (req8->replica_flags & DRSUAPI_DS_REPLICA_NEIGHBOUR_ASYNC_REP) {
443 scope = LDB_SCOPE_BASE;
446 DEBUG(6,(__location__ ": getncchanges on %s using filter %s\n",
447 ldb_dn_get_linearized(getnc_state->ncRoot_dn), search_filter));
448 ret = drsuapi_search_with_extended_dn(b_state->sam_ctx, getnc_state, &getnc_state->site_res,
449 getnc_state->ncRoot_dn, scope, attrs,
450 "uSNChanged",
451 search_filter);
452 if (ret != LDB_SUCCESS) {
453 return WERR_DS_DRA_INTERNAL_ERROR;
457 /* Prefix mapping */
458 schema = dsdb_get_schema(b_state->sam_ctx);
459 if (!schema) {
460 DEBUG(0,("No schema in sam_ctx\n"));
461 return WERR_DS_DRA_INTERNAL_ERROR;
464 r->out.ctr->ctr6.naming_context = talloc(mem_ctx, struct drsuapi_DsReplicaObjectIdentifier);
465 *r->out.ctr->ctr6.naming_context = *ncRoot;
467 if (dsdb_find_guid_by_dn(b_state->sam_ctx, getnc_state->ncRoot_dn,
468 &r->out.ctr->ctr6.naming_context->guid) != LDB_SUCCESS) {
469 DEBUG(0,(__location__ ": Failed to find GUID of ncRoot_dn %s\n",
470 ldb_dn_get_linearized(getnc_state->ncRoot_dn)));
471 return WERR_DS_DRA_INTERNAL_ERROR;
474 /* find the SID if there is one */
475 dsdb_find_sid_by_dn(b_state->sam_ctx, getnc_state->ncRoot_dn, &r->out.ctr->ctr6.naming_context->sid);
477 dsdb_get_oid_mappings_drsuapi(schema, true, mem_ctx, &ctr);
478 r->out.ctr->ctr6.mapping_ctr = *ctr;
480 r->out.ctr->ctr6.source_dsa_guid = *(samdb_ntds_objectGUID(b_state->sam_ctx));
481 r->out.ctr->ctr6.source_dsa_invocation_id = *(samdb_ntds_invocation_id(b_state->sam_ctx));
483 r->out.ctr->ctr6.old_highwatermark = req8->highwatermark;
484 r->out.ctr->ctr6.new_highwatermark = req8->highwatermark;
486 r->out.ctr->ctr6.first_object = NULL;
487 currentObject = &r->out.ctr->ctr6.first_object;
489 for(i=getnc_state->num_sent;
490 i<getnc_state->site_res->count &&
491 (r->out.ctr->ctr6.object_count < req8->max_object_count);
492 i++) {
493 int uSN;
494 struct drsuapi_DsReplicaObjectListItemEx *obj;
495 obj = talloc_zero(mem_ctx, struct drsuapi_DsReplicaObjectListItemEx);
497 uSN = ldb_msg_find_attr_as_int(getnc_state->site_res->msgs[i], "uSNChanged", -1);
498 if (uSN > r->out.ctr->ctr6.new_highwatermark.tmp_highest_usn) {
499 r->out.ctr->ctr6.new_highwatermark.tmp_highest_usn = uSN;
501 if (uSN > getnc_state->highest_usn) {
502 getnc_state->highest_usn = uSN;
505 werr = get_nc_changes_build_object(obj, getnc_state->site_res->msgs[i],
506 b_state->sam_ctx, getnc_state->ncRoot_dn,
507 schema, &session_key, getnc_state->min_usn,
508 req8->replica_flags);
509 if (!W_ERROR_IS_OK(werr)) {
510 return werr;
513 if (obj->meta_data_ctr == NULL) {
514 DEBUG(0,(__location__ ": getncchanges skipping send of object %s\n",
515 ldb_dn_get_linearized(getnc_state->site_res->msgs[i]->dn)));
516 /* no attributes to send */
517 talloc_free(obj);
518 continue;
521 r->out.ctr->ctr6.object_count++;
523 *currentObject = obj;
524 currentObject = &obj->next_object;
527 getnc_state->num_sent += r->out.ctr->ctr6.object_count;
529 r->out.ctr->ctr6.nc_object_count = getnc_state->site_res->count;
531 /* the client can us to call UpdateRefs on its behalf to
532 re-establish monitoring of the NC */
533 if ((req8->replica_flags & DRSUAPI_DRS_ADD_REF) &&
534 !GUID_all_zero(&req8->destination_dsa_guid)) {
535 struct drsuapi_DsReplicaUpdateRefsRequest1 ureq;
536 ureq.naming_context = ncRoot;
537 ureq.dest_dsa_dns_name = talloc_asprintf(mem_ctx, "%s._msdcs.%s",
538 GUID_string(mem_ctx, &req8->destination_dsa_guid),
539 lp_realm(dce_call->conn->dce_ctx->lp_ctx));
540 if (!ureq.dest_dsa_dns_name) {
541 return WERR_NOMEM;
543 ureq.dest_dsa_guid = req8->destination_dsa_guid;
544 ureq.options = DRSUAPI_DS_REPLICA_UPDATE_ADD_REFERENCE |
545 DRSUAPI_DS_REPLICA_UPDATE_ASYNCHRONOUS_OPERATION |
546 DRSUAPI_DS_REPLICA_UPDATE_GETCHG_CHECK;
547 werr = drsuapi_UpdateRefs(b_state, mem_ctx, &ureq);
548 if (!W_ERROR_IS_OK(werr)) {
549 DEBUG(0,(__location__ ": Failed UpdateRefs in DsGetNCChanges - %s\n",
550 win_errstr(werr)));
554 if (i < getnc_state->site_res->count) {
555 r->out.ctr->ctr6.more_data = true;
556 } else {
557 r->out.ctr->ctr6.uptodateness_vector = talloc(mem_ctx, struct drsuapi_DsReplicaCursor2CtrEx);
558 r->out.ctr->ctr6.uptodateness_vector->version = 2;
559 r->out.ctr->ctr6.uptodateness_vector->reserved1 = 0;
560 r->out.ctr->ctr6.uptodateness_vector->reserved2 = 0;
562 r->out.ctr->ctr6.new_highwatermark.highest_usn = r->out.ctr->ctr6.new_highwatermark.tmp_highest_usn;
564 werr = get_nc_changes_udv(b_state->sam_ctx, getnc_state->ncRoot_dn,
565 r->out.ctr->ctr6.uptodateness_vector,
566 getnc_state->highest_usn);
567 if (!W_ERROR_IS_OK(werr)) {
568 return werr;
571 talloc_free(getnc_state);
572 b_state->getncchanges_state = NULL;
575 DEBUG(2,("DsGetNCChanges with uSNChanged >= %llu flags 0x%08x on %s gave %u objects (done %d/%d)\n",
576 (unsigned long long)(req8->highwatermark.highest_usn+1),
577 req8->replica_flags,
578 ncRoot->dn, r->out.ctr->ctr6.object_count,
579 i, r->out.ctr->ctr6.more_data?getnc_state->site_res->count:i));
581 return WERR_OK;