diff options
author | Andrew Tridgell <tridge@samba.org> | 2004-12-19 06:41:27 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:07:31 -0500 |
commit | 424844da3216dca58df5fe1aa5ccf224444242e6 (patch) | |
tree | e4db6f9f1010ee7aa6804f942b740958ef2eeefd /source4/rpc_server/lsa | |
parent | 9b3ea6dc4e13a91e2f87123e1a8e6a8b6e091b76 (diff) | |
download | samba-424844da3216dca58df5fe1aa5ccf224444242e6.tar.gz samba-424844da3216dca58df5fe1aa5ccf224444242e6.tar.bz2 samba-424844da3216dca58df5fe1aa5ccf224444242e6.zip |
r4278: - added server support for lsa_EnumPrivsAccount()
(This used to be commit a80c82d2635fce42482982d904f265199a000e10)
Diffstat (limited to 'source4/rpc_server/lsa')
-rw-r--r-- | source4/rpc_server/lsa/dcesrv_lsa.c | 58 |
1 files changed, 52 insertions, 6 deletions
diff --git a/source4/rpc_server/lsa/dcesrv_lsa.c b/source4/rpc_server/lsa/dcesrv_lsa.c index f784837d1a..d636802695 100644 --- a/source4/rpc_server/lsa/dcesrv_lsa.c +++ b/source4/rpc_server/lsa/dcesrv_lsa.c @@ -59,7 +59,7 @@ struct lsa_account_state { uint32_t access_mask; struct dom_sid *account_sid; const char *account_sid_str; - const char *account_name; + const char *account_dn; }; @@ -794,10 +794,11 @@ static NTSTATUS lsa_OpenAccount(struct dcesrv_call_state *dce_call, TALLOC_CTX * } /* check it really exists */ - astate->account_name = samdb_search_string(state->sam_ctx, astate, - NULL, "sAMAccountName", - "objectSid=%s", astate->account_sid_str); - if (astate->account_name == NULL) { + astate->account_dn = samdb_search_string(state->sam_ctx, astate, + NULL, "dn", + "(&(objectSid=%s)(objectClass=group))", + astate->account_sid_str); + if (astate->account_dn == NULL) { talloc_free(astate); return NT_STATUS_NO_SUCH_USER; } @@ -827,7 +828,52 @@ static NTSTATUS lsa_EnumPrivsAccount(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx, struct lsa_EnumPrivsAccount *r) { - DCESRV_FAULT(DCERPC_FAULT_OP_RNG_ERROR); + struct dcesrv_handle *h; + struct lsa_account_state *astate; + int ret, i; + struct ldb_message **res; + const char * const attrs[] = { "privilege", NULL}; + struct ldb_message_element *el; + + DCESRV_PULL_HANDLE(h, r->in.handle, LSA_HANDLE_ACCOUNT); + + astate = h->data; + + r->out.privs = talloc_p(mem_ctx, struct lsa_PrivilegeSet); + r->out.privs->count = 0; + r->out.privs->unknown = 0; + r->out.privs->set = NULL; + + ret = samdb_search(astate->policy->sam_ctx, mem_ctx, NULL, &res, attrs, + "dn=%s", astate->account_dn); + if (ret != 1) { + return NT_STATUS_OK; + } + + el = ldb_msg_find_element(res[0], "privilege"); + if (el == NULL || el->num_values == 0) { + return NT_STATUS_OK; + } + + r->out.privs->set = talloc_array_p(r->out.privs, + struct lsa_LUIDAttribute, el->num_values); + if (r->out.privs->set == NULL) { + return NT_STATUS_NO_MEMORY; + } + + for (i=0;i<el->num_values;i++) { + int id = sec_privilege_id(el->values[i].data); + if (id == -1) { + return NT_STATUS_INTERNAL_DB_CORRUPTION; + } + r->out.privs->set[i].attribute = 0; + r->out.privs->set[i].luid.low = id; + r->out.privs->set[i].luid.high = 0; + } + + r->out.privs->count = el->num_values; + + return NT_STATUS_OK; } |