From 5302dc12184481514e143f0b3cf4167c84a32ddd Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Thu, 15 Nov 2001 01:18:10 +0000 Subject: Fix detection of RedHat 7.2. Remove unused old file. Test 42 byte reply to SMBntcreate (W2K does this). Jeremy. (This used to be commit a55a63a4ca55602ad9221af17c0bc8e185536433) --- source3/nsswitch/winbindd_glue.c | 442 --------------------------------------- 1 file changed, 442 deletions(-) delete mode 100644 source3/nsswitch/winbindd_glue.c (limited to 'source3/nsswitch') diff --git a/source3/nsswitch/winbindd_glue.c b/source3/nsswitch/winbindd_glue.c deleted file mode 100644 index 0c508ccf4b..0000000000 --- a/source3/nsswitch/winbindd_glue.c +++ /dev/null @@ -1,442 +0,0 @@ -/* - Unix SMB/Netbios implementation. - Version 2.0 - - Winbind daemon glue functions to connect new cli interface - to older style lsa_ and samr_ functions - - Copyright (C) tridge@samba.org 2001 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "winbindd.h" - -/**************************************************************************** -do a LSA Open Policy -****************************************************************************/ -BOOL wb_lsa_open_policy(char *server, BOOL sec_qos, uint32 des_access, - CLI_POLICY_HND *pol) -{ - struct nmb_name calling, called; - struct ntuser_creds creds; - struct in_addr dest_ip; - fstring dest_host; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - extern pstring global_myname; - - ZERO_STRUCTP(pol); - - pol->cli = (struct cli_state *)malloc(sizeof(struct cli_state)); - pol->mem_ctx = talloc_init(); - - ZERO_STRUCTP(pol->cli); - - if (!pol->cli || !pol->mem_ctx) - return False; - - /* Initialise RPC connection */ - - if (!cli_initialise(pol->cli)) - goto done; - - ZERO_STRUCT(creds); - creds.pwd.null_pwd = 1; - - cli_init_creds(pol->cli, &creds); - - /* Establish a SMB connection */ - - if (!resolve_srv_name(server, dest_host, &dest_ip)) { - goto done; - } - - make_nmb_name(&called, dns_to_netbios_name(dest_host), 0x20); - make_nmb_name(&calling, dns_to_netbios_name(global_myname), 0); - - if (!cli_establish_connection(pol->cli, dest_host, &dest_ip, &calling, - &called, "IPC$", "IPC", False, True)) { - goto done; - } - - if (!cli_nt_session_open (pol->cli, PIPE_LSARPC)) { - goto done; - } - - result = cli_lsa_open_policy(pol->cli, pol->mem_ctx, sec_qos, - des_access, &pol->handle); - - done: - if (!NT_STATUS_IS_OK(result) && pol->cli) { - if (pol->cli->initialised) - cli_shutdown(pol->cli); - SAFE_FREE(pol->cli); - } - - return NT_STATUS_IS_OK(result); -} - -/**************************************************************************** -do a LSA Enumerate Trusted Domain -****************************************************************************/ -BOOL wb_lsa_enum_trust_dom(CLI_POLICY_HND *hnd, uint32 *enum_ctx, - uint32 * num_doms, char ***names, DOM_SID **sids) -{ - NTSTATUS ret; - - ret = cli_lsa_enum_trust_dom(hnd->cli, hnd->mem_ctx, &hnd->handle, - enum_ctx, num_doms, names, sids); - - return NT_STATUS_IS_OK(ret); -} - -/**************************************************************************** -do a LSA Query Info Policy -****************************************************************************/ -BOOL wb_lsa_query_info_pol(CLI_POLICY_HND *hnd, uint16 info_class, - fstring domain_name, DOM_SID *domain_sid) -{ - NTSTATUS ret; - - ret = cli_lsa_query_info_policy(hnd->cli, hnd->mem_ctx, &hnd->handle, - info_class, domain_name, domain_sid); - - return NT_STATUS_IS_OK(ret); -} - -/**************************************************************************** -do a LSA Lookup Names -****************************************************************************/ -BOOL wb_lsa_lookup_names(CLI_POLICY_HND *hnd, int num_names, char **names, - DOM_SID **sids, uint32 **types, int *num_sids) -{ - NTSTATUS ret; - - ret = cli_lsa_lookup_names(hnd->cli, hnd->mem_ctx, &hnd->handle, - num_names, names, sids, types, num_sids); - - return NT_STATUS_IS_OK(ret); -} - -/**************************************************************************** -do a LSA Lookup SIDS -****************************************************************************/ -BOOL wb_lsa_lookup_sids(CLI_POLICY_HND *hnd, int num_sids, DOM_SID *sids, - char ***names, uint32 **types, int *num_names) -{ - NTSTATUS ret; - - ret = cli_lsa_lookup_sids(hnd->cli, hnd->mem_ctx, &hnd->handle, - num_sids, sids, names, types, num_names); - - return NT_STATUS_IS_OK(ret); -} - -/**************************************************************************** -lsa_close glue -****************************************************************************/ -BOOL wb_lsa_close(CLI_POLICY_HND *hnd) -{ - NTSTATUS ret; - - ret = cli_lsa_close(hnd->cli, hnd->mem_ctx, &hnd->handle); - - return NT_STATUS_IS_OK(ret); -} - - -/**************************************************************************** -samr_close glue -****************************************************************************/ -BOOL wb_samr_close(CLI_POLICY_HND *hnd) -{ - NTSTATUS ret; - - ret = cli_samr_close(hnd->cli, hnd->mem_ctx, &hnd->handle); - - return NT_STATUS_IS_OK(ret); -} - - -/**************************************************************************** -samr_connect glue -****************************************************************************/ -BOOL wb_samr_connect(char *server, uint32 access_mask, CLI_POLICY_HND *pol) -{ - struct nmb_name calling, called; - struct ntuser_creds creds; - struct in_addr dest_ip; - fstring dest_host; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - extern pstring global_myname; - - ZERO_STRUCTP(pol); - - pol->cli = (struct cli_state *)malloc(sizeof(struct cli_state)); - - ZERO_STRUCTP(pol->cli); - - pol->mem_ctx = talloc_init(); - - if (!pol->cli || !pol->mem_ctx) - return False; - - /* Initialise RPC connection */ - - if (!cli_initialise(pol->cli)) - goto done; - - ZERO_STRUCT(creds); - creds.pwd.null_pwd = 1; - - cli_init_creds(pol->cli, &creds); - - /* Establish a SMB connection */ - - if (!resolve_srv_name(server, dest_host, &dest_ip)) { - goto done; - } - - make_nmb_name(&called, dns_to_netbios_name(dest_host), 0x20); - make_nmb_name(&calling, dns_to_netbios_name(global_myname), 0); - - if (!cli_establish_connection(pol->cli, dest_host, &dest_ip, &calling, - &called, "IPC$", "IPC", False, True)) { - goto done; - } - - if (!cli_nt_session_open (pol->cli, PIPE_SAMR)) { - goto done; - } - - result = cli_samr_connect(pol->cli, pol->mem_ctx, - access_mask, &pol->handle); - - done: - if (!NT_STATUS_IS_OK(result) && pol->cli) { - if (pol->cli->initialised) - cli_shutdown(pol->cli); - SAFE_FREE(pol->cli); - } - - return NT_STATUS_IS_OK(result); -} - - -/**************************************************************************** -samr_open_domain glue -****************************************************************************/ -BOOL wb_samr_open_domain(CLI_POLICY_HND *connect_pol, uint32 ace_perms, - DOM_SID *sid, CLI_POLICY_HND *domain_pol) -{ - NTSTATUS ret; - - ret = cli_samr_open_domain(connect_pol->cli, - connect_pol->mem_ctx, - &connect_pol->handle, - ace_perms, - sid, - &domain_pol->handle); - - if NT_STATUS_IS_OK(ret) { - domain_pol->cli = connect_pol->cli; - domain_pol->mem_ctx = connect_pol->mem_ctx; - return True; - } - - return False; -} - -/**************************************************************************** -do a SAMR enumerate groups -****************************************************************************/ -NTSTATUS wb_samr_enum_dom_groups(CLI_POLICY_HND *pol, uint32 *start_idx, - uint32 size, struct acct_info **sam, - uint32 *num_sam_groups) -{ - return cli_samr_enum_dom_groups(pol->cli, pol->mem_ctx, &pol->handle, - start_idx, size, sam, num_sam_groups); -} - -/**************************************************************************** -do a SAMR query userinfo -****************************************************************************/ -BOOL wb_get_samr_query_userinfo(CLI_POLICY_HND *pol, uint32 info_level, - uint32 user_rid, SAM_USERINFO_CTR **ctr) -{ - POLICY_HND user_pol; - BOOL got_user_pol = False; - NTSTATUS result; - - result = cli_samr_open_user(pol->cli, pol->mem_ctx, - &pol->handle, MAXIMUM_ALLOWED_ACCESS, - user_rid, &user_pol); - if (!NT_STATUS_IS_OK(result)) - goto done; - - got_user_pol = True; - - result = cli_samr_query_userinfo(pol->cli, pol->mem_ctx, - &user_pol, info_level, ctr); - if (!NT_STATUS_IS_OK(result)) - goto done; - - done: - if (got_user_pol) cli_samr_close(pol->cli, pol->mem_ctx, &user_pol); - - return NT_STATUS_IS_OK(result); -} - -/**************************************************************************** -do a SAMR enumerate groups -****************************************************************************/ -BOOL wb_samr_open_user(CLI_POLICY_HND *pol, uint32 access_mask, uint32 rid, - POLICY_HND *user_pol) -{ - NTSTATUS ret; - - ret = cli_samr_open_user(pol->cli, pol->mem_ctx, &pol->handle, - access_mask, rid, user_pol); - - return NT_STATUS_IS_OK(ret); -} - -BOOL wb_samr_query_usergroups(CLI_POLICY_HND *pol, uint32 *num_groups, - DOM_GID **gid) -{ - NTSTATUS ret; - - ret = cli_samr_query_usergroups(pol->cli, pol->mem_ctx, &pol->handle, - num_groups, gid); - - return NT_STATUS_IS_OK(ret); -} - -BOOL wb_get_samr_query_groupinfo(CLI_POLICY_HND *pol, uint32 info_level, - uint32 group_rid, GROUP_INFO_CTR *ctr) -{ - POLICY_HND group_pol; - BOOL got_group_pol = False; - NTSTATUS result; - - result = cli_samr_open_group(pol->cli, pol->mem_ctx, - &pol->handle, MAXIMUM_ALLOWED_ACCESS, - group_rid, &group_pol); - if (!NT_STATUS_IS_OK(result)) - goto done; - - got_group_pol = True; - - result = cli_samr_query_groupinfo(pol->cli, pol->mem_ctx, - &group_pol, info_level, - ctr); - done: - if (got_group_pol) cli_samr_close(pol->cli, pol->mem_ctx, &group_pol); - - return NT_STATUS_IS_OK(result); -} - -BOOL wb_sam_query_groupmem(CLI_POLICY_HND *pol, uint32 group_rid, - uint32 *num_names, uint32 **rid_mem, - char ***names, uint32 **name_types) -{ - BOOL got_group_pol = False; - POLICY_HND group_pol; - NTSTATUS result; - uint32 i, total_names = 0; - - result = cli_samr_open_group(pol->cli, pol->mem_ctx, - &pol->handle, MAXIMUM_ALLOWED_ACCESS, - group_rid, &group_pol); - if (!NT_STATUS_IS_OK(result)) - goto done; - - got_group_pol = True; - - result = cli_samr_query_groupmem(pol->cli, pol->mem_ctx, - &group_pol, num_names, rid_mem, - name_types); - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Call cli_samr_lookup_rids() in bunches of ~1000 rids to avoid - crashing NT4. */ - -#define MAX_LOOKUP_RIDS 900 - - *names = talloc(pol->mem_ctx, *num_names * sizeof(char *)); - *name_types = talloc(pol->mem_ctx, *num_names * sizeof(uint32)); - - for (i = 0; i < *num_names; i += MAX_LOOKUP_RIDS) { - int num_lookup_rids = MIN(*num_names - i, MAX_LOOKUP_RIDS); - uint32 tmp_num_names = 0; - char **tmp_names = NULL; - uint32 *tmp_types = NULL; - - /* Lookup a chunk of rids */ - - result = cli_samr_lookup_rids(pol->cli, pol->mem_ctx, - &pol->handle, 1000, /* flags */ - num_lookup_rids, - &(*rid_mem)[i], - &tmp_num_names, - &tmp_names, &tmp_types); - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Copy result into array. The talloc system will take - care of freeing the temporary arrays later on. */ - - memcpy(&(*names)[i], tmp_names, sizeof(char *) * - tmp_num_names); - - memcpy(&(*name_types)[i], tmp_types, sizeof(uint32) * - tmp_num_names); - - total_names += tmp_num_names; - } - - *num_names = total_names; - - done: - if (got_group_pol) - cli_samr_close(pol->cli, pol->mem_ctx, &group_pol); - - return NT_STATUS_IS_OK(result); -} - -BOOL wb_samr_query_dom_info(CLI_POLICY_HND *pol, uint16 switch_value, - SAM_UNK_CTR *ctr) -{ - NTSTATUS ret; - - ret = cli_samr_query_dom_info(pol->cli, pol->mem_ctx, - &pol->handle, switch_value, ctr); - - return NT_STATUS_IS_OK(ret); -} - -/* Unlike all the others, the status code of this function is actually used - by winbindd. */ - -NTSTATUS wb_samr_query_dispinfo(CLI_POLICY_HND *pol, uint32 *start_ndx, - uint16 info_level, uint32 *num_entries, - SAM_DISPINFO_CTR *ctr) -{ - return cli_samr_query_dispinfo(pol->cli, pol->mem_ctx, - &pol->handle, start_ndx, - info_level, num_entries, - 0xffff, ctr); -} -- cgit