diff options
author | Andrew Tridgell <tridge@samba.org> | 2004-01-20 06:07:09 +0000 |
---|---|---|
committer | Andrew Tridgell <tridge@samba.org> | 2004-01-20 06:07:09 +0000 |
commit | 8ae5b50a6e787767bc00d42533ca29d8fb136e2e (patch) | |
tree | d94e73574fb50c951921f7632fd32d9069962cc9 /source4/librpc/rpc/dcerpc_util.c | |
parent | 7a4da9654e30ea96b326448c3e9111c2a5604f58 (diff) | |
download | samba-8ae5b50a6e787767bc00d42533ca29d8fb136e2e.tar.gz samba-8ae5b50a6e787767bc00d42533ca29d8fb136e2e.tar.bz2 samba-8ae5b50a6e787767bc00d42533ca29d8fb136e2e.zip |
added code to the RPC-SPOOLSS test that demonstrates that policy
handles are not shared between open dcerpc connections, even when
those connections are on the same SMB socket. I have tested this with
w2k3, w2k and NT4. It seems that policy handles have a strict scope of
the dcerpc connection on which they were opened.
I realise that this goes against existing folk-law in the team, but it
seems that the previous testing (I'm not sure who did this?) was
wrong. Perhaps clients do send us policy handles from other
connections, but if they do then the correct thing to do is to fail
the operation with a dcerpc fault. I suspect that failing it with
exactly the right dcerpc fault code is important.
(This used to be commit 2ed24d29bafd9055d5782acdd595cd0f378a651a)
Diffstat (limited to 'source4/librpc/rpc/dcerpc_util.c')
-rw-r--r-- | source4/librpc/rpc/dcerpc_util.c | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/source4/librpc/rpc/dcerpc_util.c b/source4/librpc/rpc/dcerpc_util.c index 8efcefc8a7..1ef776125f 100644 --- a/source4/librpc/rpc/dcerpc_util.c +++ b/source4/librpc/rpc/dcerpc_util.c @@ -578,6 +578,11 @@ NTSTATUS dcerpc_pipe_connect_b(struct dcerpc_pipe **p, break; } + /* remember the binding string for possible secondary connections */ + if (NT_STATUS_IS_OK(status)) { + (*p)->binding_string = dcerpc_binding_string((*p)->mem_ctx, binding); + } + return status; } @@ -613,3 +618,37 @@ NTSTATUS dcerpc_pipe_connect(struct dcerpc_pipe **p, talloc_destroy(mem_ctx); return status; } + + +/* + create a secondary dcerpc connection on SMB + the secondary connection will be on the same SMB connection, but + use a new fnum +*/ +NTSTATUS dcerpc_secondary_smb(struct dcerpc_pipe *p, struct dcerpc_pipe **p2, + const char *pipe_name, + const char *pipe_uuid, + uint32 pipe_version) +{ + NTSTATUS status; + struct cli_tree *tree; + + tree = dcerpc_smb_tree(p); + if (!tree) { + return NT_STATUS_INVALID_PARAMETER; + } + + status = dcerpc_pipe_open_smb(p2, tree, pipe_name); + if (!NT_STATUS_IS_OK(status)) { + return status; + } + + (*p2)->flags = p->flags; + + status = dcerpc_bind_auth_none(*p2, pipe_uuid, pipe_version); + if (!NT_STATUS_IS_OK(status)) { + return status; + } + + return NT_STATUS_OK; +} |