/* * Unix SMB/CIFS implementation. * RPC Pipe client / server routines * Copyright (C) Andrew Tridgell 1992-1997. * Copyright (C) Luke Kenneth Casson Leighton 1996-1997. * Copyright (C) Paul Ashton 1997. * Copyright (C) Jeremy Allison 2001. * Copyright (C) Gerald Carter 2002. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see <http://www.gnu.org/licenses/>. */ /* Implementation of registry functions. */ #include "includes.h" #undef DBGC_CLASS #define DBGC_CLASS DBGC_RPC_SRV /******************************************************************** Fill in a DS_DOMINFO_CTR structure ********************************************************************/ static NTSTATUS fill_dsrole_dominfo_basic(TALLOC_CTX *ctx, DSROLE_PRIMARY_DOMAIN_INFO_BASIC **info) { DSROLE_PRIMARY_DOMAIN_INFO_BASIC *basic; const char *netbios_domain = ""; fstring dnsdomain; DEBUG(10,("fill_dsrole_dominfo_basic: enter\n")); if ( !(basic = TALLOC_ZERO_P(ctx, DSROLE_PRIMARY_DOMAIN_INFO_BASIC)) ) { DEBUG(0,("fill_dsrole_dominfo_basic: FATAL error! talloc_xero() failed\n")); return NT_STATUS_NO_MEMORY; } switch ( lp_server_role() ) { case ROLE_STANDALONE: basic->machine_role = DSROLE_STANDALONE_SRV; basic->netbios_ptr = 1; netbios_domain = get_global_sam_name(); break; case ROLE_DOMAIN_MEMBER: basic->netbios_ptr = 1; netbios_domain = lp_workgroup(); basic->machine_role = DSROLE_DOMAIN_MEMBER_SRV; break; case ROLE_DOMAIN_BDC: basic->netbios_ptr = 1; netbios_domain = get_global_sam_name(); basic->machine_role = DSROLE_BDC; break; case ROLE_DOMAIN_PDC: basic->netbios_ptr = 1; netbios_domain = get_global_sam_name(); basic->machine_role = DSROLE_PDC; break; } /* always set netbios name */ init_unistr2( &basic->netbios_domain, netbios_domain, UNI_STR_TERMINATE); if ( secrets_fetch_domain_guid( lp_workgroup(), &basic->domain_guid ) ) basic->flags |= DSROLE_PRIMARY_DOMAIN_GUID_PRESENT; /* fill in some additional fields if we are a member of an AD domain */ if ( lp_security() == SEC_ADS ) { fstrcpy( dnsdomain, lp_realm() ); strlower_m( dnsdomain ); basic->dnsname_ptr = 1; init_unistr2( &basic->dns_domain, dnsdomain, UNI_STR_TERMINATE); /* FIXME!! We really should fill in the correct forest name. Should get this information from winbindd. */ basic->forestname_ptr = 1; init_unistr2( &basic->forest_domain, dnsdomain, UNI_STR_TERMINATE); } else { /* security = domain should not fill in the dns or forest name */ basic->dnsname_ptr = 0; basic->forestname_ptr = 0; } *info = basic; return NT_STATUS_OK; } /******************************************************************** Implement the DsroleGetPrimaryDomainInfo() call ********************************************************************/ NTSTATUS _dsrole_get_primary_dominfo(pipes_struct *p, DS_Q_GETPRIMDOMINFO *q_u, DS_R_GETPRIMDOMINFO *r_u) { NTSTATUS result = NT_STATUS_OK; uint32 level = q_u->level; switch ( level ) { case DsRolePrimaryDomainInfoBasic: r_u->level = DsRolePrimaryDomainInfoBasic; r_u->ptr = 1; result = fill_dsrole_dominfo_basic( p->mem_ctx, &r_u->info.basic ); break; default: DEBUG(0,("_dsrole_get_primary_dominfo: Unsupported info level [%d]!\n", level)); result = NT_STATUS_INVALID_LEVEL; } return result; }