From a42afcdcc7ab9aa9ed193ae36d3dbb10843447f0 Mon Sep 17 00:00:00 2001 From: Luke Leighton Date: Thu, 15 Oct 1998 05:47:29 +0000 Subject: bug-fixing against: AS/U: it returns dce/rpc "first" and "last" bits _clear_ in a bind/ack response, when they should be set in a (small) packet. they also, in the bind/ack do not set a secondary address string at all, so we can't check against that... Win95: client-side dce/rpc code is a bit odd. it does a "WaitNamedPipeState" and has slightly different pipe-naming (\PIPE\LANMAN is joined by \PIPE\SRVSVC, \PIPE\WINREG etc whereas nt just has \PIPE\LANMAN and \PIPE\). Win95-USRMGR.EXE: added LsaOpenPolicy (renamed existing to LsaOpenPolicy2). added SamrConnect (renamed existing to SamrConnect2). (This used to be commit a7fccd807b938cbb51002ebae8c7a48b40dbb655) --- source3/rpc_server/srv_lsa.c | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) (limited to 'source3/rpc_server/srv_lsa.c') diff --git a/source3/rpc_server/srv_lsa.c b/source3/rpc_server/srv_lsa.c index 2e5ebc9e68..93584b5acf 100644 --- a/source3/rpc_server/srv_lsa.c +++ b/source3/rpc_server/srv_lsa.c @@ -30,6 +30,28 @@ extern int DEBUGLEVEL; extern DOM_SID global_machine_sid; +/*************************************************************************** +lsa_reply_open_policy2 + ***************************************************************************/ +static void lsa_reply_open_policy2(prs_struct *rdata) +{ + int i; + LSA_R_OPEN_POL2 r_o; + + ZERO_STRUCT(r_o); + + /* set up the LSA QUERY INFO response */ + + for (i = 4; i < POL_HND_SIZE; i++) + { + r_o.pol.data[i] = i; + } + r_o.status = 0x0; + + /* store the response in the SMB stream */ + lsa_io_r_open_pol2("", &r_o, rdata, 0); +} + /*************************************************************************** lsa_reply_open_policy ***************************************************************************/ @@ -279,6 +301,25 @@ static void lsa_reply_lookup_rids(prs_struct *rdata, lsa_io_r_lookup_rids("", &r_l, rdata, 0); } +/*************************************************************************** +api_lsa_open_policy + ***************************************************************************/ +static void api_lsa_open_policy2( uint16 vuid, prs_struct *data, + prs_struct *rdata ) +{ + LSA_Q_OPEN_POL2 q_o; + + ZERO_STRUCT(q_o); + + /* grab the server, object attributes and desired access flag...*/ + lsa_io_q_open_pol2("", &q_o, data, 0); + + /* lkclXXXX having decoded it, ignore all fields in the open policy! */ + + /* return a 20 byte policy handle */ + lsa_reply_open_policy2(rdata); +} + /*************************************************************************** api_lsa_open_policy ***************************************************************************/ @@ -513,6 +554,7 @@ static void api_lsa_open_secret( uint16 vuid, prs_struct *data, ***************************************************************************/ static struct api_struct api_lsa_cmds[] = { + { "LSA_OPENPOLICY2" , LSA_OPENPOLICY2 , api_lsa_open_policy2 }, { "LSA_OPENPOLICY" , LSA_OPENPOLICY , api_lsa_open_policy }, { "LSA_QUERYINFOPOLICY" , LSA_QUERYINFOPOLICY , api_lsa_query_info }, { "LSA_ENUMTRUSTDOM" , LSA_ENUMTRUSTDOM , api_lsa_enum_trust_dom }, -- cgit