/*
* Unix SMB/CIFS implementation.
* RPC Pipe client / server routines
*
* Copyright (C) Andrew Tridgell 1992-1997,
* Copyright (C) Gerald (Jerry) Carter 2006.
* Copyright (C) Guenther Deschner 2007-2008.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see .
*/
/* This is the implementation of the wks interface. */
#include "includes.h"
#include "librpc/gen_ndr/libnet_join.h"
#include "libnet/libnet_join.h"
#include "../libcli/auth/libcli_auth.h"
#include "../librpc/gen_ndr/srv_wkssvc.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_RPC_SRV
struct dom_usr {
char *name;
char *domain;
time_t login_time;
};
#ifdef HAVE_GETUTXENT
#include
struct usrinfo {
char *name;
struct timeval login_time;
};
static int usr_info_cmp(const struct usrinfo *usr1, const struct usrinfo *usr2)
{
/* Called from qsort to compare two users in a usrinfo_t array for
* sorting by login time. Return >0 if usr1 login time was later than
* usr2 login time, <0 if it was earlier */
return timeval_compare(&usr1->login_time, &usr2->login_time);
}
/*******************************************************************
Get a list of the names of all users logged into this machine
********************************************************************/
static char **get_logged_on_userlist(TALLOC_CTX *mem_ctx)
{
char **users;
int i, num_users = 0;
struct usrinfo *usr_infos = NULL;
struct utmpx *u;
while ((u = getutxent()) != NULL) {
struct usrinfo *tmp;
if (u->ut_type != USER_PROCESS) {
continue;
}
for (i = 0; i < num_users; i++) {
/* getutxent can return multiple user entries for the
* same user, so ignore any dups */
if (strcmp(u->ut_user, usr_infos[i].name) == 0) {
break;
}
}
if (i < num_users) {
continue;
}
tmp = talloc_realloc(mem_ctx, usr_infos, struct usrinfo,
num_users+1);
if (tmp == NULL) {
TALLOC_FREE(tmp);
endutxent();
return NULL;
}
usr_infos = tmp;
usr_infos[num_users].name = talloc_strdup(usr_infos,
u->ut_user);
if (usr_infos[num_users].name == NULL) {
TALLOC_FREE(usr_infos);
endutxent();
return NULL;
}
usr_infos[num_users].login_time.tv_sec = u->ut_tv.tv_sec;
usr_infos[num_users].login_time.tv_usec = u->ut_tv.tv_usec;
num_users += 1;
}
/* Sort the user list by time, oldest first */
TYPESAFE_QSORT(usr_infos, num_users, usr_info_cmp);
users = (char**)talloc_array(mem_ctx, char*, num_users);
if (users) {
for (i = 0; i < num_users; i++) {
users[i] = talloc_move(users, &usr_infos[i].name);
}
}
TALLOC_FREE(usr_infos);
endutxent();
errno = 0;
return users;
}
#else
static char **get_logged_on_userlist(TALLOC_CTX *mem_ctx)
{
return NULL;
}
#endif
static int dom_user_cmp(const struct dom_usr *usr1, const struct dom_usr *usr2)
{
/* Called from qsort to compare two domain users in a dom_usr_t array
* for sorting by login time. Return >0 if usr1 login time was later
* than usr2 login time, <0 if it was earlier */
return (usr1->login_time - usr2->login_time);
}
/*******************************************************************
Get a list of the names of all users of this machine who are
logged into the domain.
This should return a list of the users on this machine who are
logged into the domain (i.e. have been authenticated by the domain's
password server) but that doesn't fit well with the normal Samba
scenario where accesses out to the domain are made through smbclient
with each such session individually authenticated. So about the best
we can do currently is to list sessions of local users connected to
this server, which means that to get themself included in the list a
local user must create a session to the local samba server by running:
smbclient \\\\localhost\\share
FIXME: find a better way to get local users logged into the domain
in this list.
********************************************************************/
static struct dom_usr *get_domain_userlist(TALLOC_CTX *mem_ctx)
{
struct sessionid *session_list = NULL;
char *machine_name, *p, *nm;
const char *sep;
struct dom_usr *users, *tmp;
int i, num_users, num_sessions;
sep = lp_winbind_separator();
if (!sep) {
sep = "\\";
}
num_sessions = list_sessions(mem_ctx, &session_list);
if (num_sessions == 0) {
errno = 0;
return NULL;
}
users = talloc_array(mem_ctx, struct dom_usr, num_sessions);
if (users == NULL) {
TALLOC_FREE(session_list);
return NULL;
}
for (i=num_users=0; iplatform_id = PLATFORM_ID_NT; /* unknown */
info100->version_major = lp_major_announce_version();
info100->version_minor = lp_minor_announce_version();
info100->server_name = talloc_asprintf_strupper_m(
info100, "%s", global_myname());
info100->domain_name = talloc_asprintf_strupper_m(
info100, "%s", lp_workgroup());
return info100;
}
/*******************************************************************
RPC Workstation Service request NetWkstaGetInfo with level 101.
Returns to the requester:
- As per NetWkstaGetInfo with level 100, plus:
- The LANMAN directory path (not currently supported).
Returns a filled in wkssvc_NetWkstaInfo101 struct.
********************************************************************/
static struct wkssvc_NetWkstaInfo101 *create_wks_info_101(TALLOC_CTX *mem_ctx)
{
struct wkssvc_NetWkstaInfo101 *info101;
info101 = talloc(mem_ctx, struct wkssvc_NetWkstaInfo101);
if (info101 == NULL) {
return NULL;
}
info101->platform_id = PLATFORM_ID_NT; /* unknown */
info101->version_major = lp_major_announce_version();
info101->version_minor = lp_minor_announce_version();
info101->server_name = talloc_asprintf_strupper_m(
info101, "%s", global_myname());
info101->domain_name = talloc_asprintf_strupper_m(
info101, "%s", lp_workgroup());
info101->lan_root = "";
return info101;
}
/*******************************************************************
RPC Workstation Service request NetWkstaGetInfo with level 102.
Returns to the requester:
- As per NetWkstaGetInfo with level 101, plus:
- The number of logged in users.
Returns a filled in wkssvc_NetWkstaInfo102 struct.
********************************************************************/
static struct wkssvc_NetWkstaInfo102 *create_wks_info_102(TALLOC_CTX *mem_ctx)
{
struct wkssvc_NetWkstaInfo102 *info102;
char **users;
info102 = talloc(mem_ctx, struct wkssvc_NetWkstaInfo102);
if (info102 == NULL) {
return NULL;
}
info102->platform_id = PLATFORM_ID_NT; /* unknown */
info102->version_major = lp_major_announce_version();
info102->version_minor = lp_minor_announce_version();
info102->server_name = talloc_asprintf_strupper_m(
info102, "%s", global_myname());
info102->domain_name = talloc_asprintf_strupper_m(
info102, "%s", lp_workgroup());
info102->lan_root = "";
users = get_logged_on_userlist(talloc_tos());
info102->logged_on_users = talloc_array_length(users);
TALLOC_FREE(users);
return info102;
}
/********************************************************************
Handling for RPC Workstation Service request NetWkstaGetInfo
********************************************************************/
WERROR _wkssvc_NetWkstaGetInfo(pipes_struct *p, struct wkssvc_NetWkstaGetInfo *r)
{
switch (r->in.level) {
case 100:
/* Level 100 can be allowed from anyone including anonymous
* so no access checks are needed for this case */
r->out.info->info100 = create_wks_info_100(p->mem_ctx);
if (r->out.info->info100 == NULL) {
return WERR_NOMEM;
}
break;
case 101:
/* Level 101 can be allowed from any logged in user */
if (!nt_token_check_sid(&global_sid_Authenticated_Users,
p->server_info->ptok)) {
DEBUG(1,("User not allowed for NetWkstaGetInfo level "
"101\n"));
DEBUGADD(3,(" - does not have sid for Authenticated "
"Users %s:\n",
sid_string_dbg(
&global_sid_Authenticated_Users)));
debug_nt_user_token(DBGC_CLASS, 3,
p->server_info->ptok);
return WERR_ACCESS_DENIED;
}
r->out.info->info101 = create_wks_info_101(p->mem_ctx);
if (r->out.info->info101 == NULL) {
return WERR_NOMEM;
}
break;
case 102:
/* Level 102 Should only be allowed from a domain administrator */
if (!nt_token_check_sid(&global_sid_Builtin_Administrators,
p->server_info->ptok)) {
DEBUG(1,("User not allowed for NetWkstaGetInfo level "
"102\n"));
DEBUGADD(3,(" - does not have sid for Administrators "
"group %s, sids are:\n",
sid_string_dbg(&global_sid_Builtin_Administrators)));
debug_nt_user_token(DBGC_CLASS, 3,
p->server_info->ptok);
return WERR_ACCESS_DENIED;
}
r->out.info->info102 = create_wks_info_102(p->mem_ctx);
if (r->out.info->info102 == NULL) {
return WERR_NOMEM;
}
break;
default:
return WERR_UNKNOWN_LEVEL;
}
return WERR_OK;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetWkstaSetInfo(pipes_struct *p, struct wkssvc_NetWkstaSetInfo *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
RPC Workstation Service request NetWkstaEnumUsers with level 0:
Returns to the requester:
- the user names of the logged in users.
Returns a filled in wkssvc_NetWkstaEnumUsersCtr0 struct.
********************************************************************/
static struct wkssvc_NetWkstaEnumUsersCtr0 *create_enum_users0(
TALLOC_CTX *mem_ctx)
{
struct wkssvc_NetWkstaEnumUsersCtr0 *ctr0;
char **users;
int i, num_users;
ctr0 = talloc(mem_ctx, struct wkssvc_NetWkstaEnumUsersCtr0);
if (ctr0 == NULL) {
return NULL;
}
users = get_logged_on_userlist(talloc_tos());
if (users == NULL && errno != 0) {
DEBUG(1,("get_logged_on_userlist error %d: %s\n",
errno, strerror(errno)));
TALLOC_FREE(ctr0);
return NULL;
}
num_users = talloc_array_length(users);
ctr0->entries_read = num_users;
ctr0->user0 = talloc_array(ctr0, struct wkssvc_NetrWkstaUserInfo0,
num_users);
if (ctr0->user0 == NULL) {
TALLOC_FREE(ctr0);
TALLOC_FREE(users);
return NULL;
}
for (i=0; iuser0[i].user_name = talloc_move(ctr0->user0, &users[i]);
}
TALLOC_FREE(users);
return ctr0;
}
/********************************************************************
RPC Workstation Service request NetWkstaEnumUsers with level 1.
Returns to the requester:
- the user names of the logged in users,
- the domain or machine each is logged into,
- the password server that was used to authenticate each,
- other domains each user is logged into (not currently supported).
Returns a filled in wkssvc_NetWkstaEnumUsersCtr1 struct.
********************************************************************/
static struct wkssvc_NetWkstaEnumUsersCtr1 *create_enum_users1(
TALLOC_CTX *mem_ctx)
{
struct wkssvc_NetWkstaEnumUsersCtr1 *ctr1;
char **users;
struct dom_usr *dom_users;
const char *pwd_server;
char *pwd_tmp;
int i, j, num_users, num_dom_users;
ctr1 = talloc(mem_ctx, struct wkssvc_NetWkstaEnumUsersCtr1);
if (ctr1 == NULL) {
return NULL;
}
users = get_logged_on_userlist(talloc_tos());
if (users == NULL && errno != 0) {
DEBUG(1,("get_logged_on_userlist error %d: %s\n",
errno, strerror(errno)));
TALLOC_FREE(ctr1);
return NULL;
}
num_users = talloc_array_length(users);
dom_users = get_domain_userlist(talloc_tos());
if (dom_users == NULL && errno != 0) {
TALLOC_FREE(ctr1);
TALLOC_FREE(users);
return NULL;
}
num_dom_users = talloc_array_length(dom_users);
ctr1->user1 = talloc_array(ctr1, struct wkssvc_NetrWkstaUserInfo1,
num_users+num_dom_users);
if (ctr1->user1 == NULL) {
TALLOC_FREE(ctr1);
TALLOC_FREE(users);
TALLOC_FREE(dom_users);
return NULL;
}
pwd_server = "";
if ((pwd_tmp = talloc_strdup(ctr1->user1, lp_passwordserver()))) {
/* The configured password server is a full DNS name but
* for the logon server we need to return just the first
* component (machine name) of it in upper-case */
char *p = strchr(pwd_tmp, '.');
if (p) {
*p = '\0';
} else {
p = pwd_tmp + strlen(pwd_tmp);
}
while (--p >= pwd_tmp) {
*p = toupper(*p);
}
pwd_server = pwd_tmp;
}
/* Put in local users first */
for (i=0; iuser1[i].user_name = talloc_move(ctr1->user1, &users[i]);
/* For a local user the domain name and logon server are
* both returned as the local machine's NetBIOS name */
ctr1->user1[i].logon_domain = ctr1->user1[i].logon_server =
talloc_asprintf_strupper_m(ctr1->user1, "%s", global_myname());
ctr1->user1[i].other_domains = NULL; /* Maybe in future? */
}
/* Now domain users */
for (j=0; juser1[i].user_name =
talloc_strdup(ctr1->user1, dom_users[j].name);
ctr1->user1[i].logon_domain =
talloc_strdup(ctr1->user1, dom_users[j].domain);
ctr1->user1[i].logon_server = pwd_server;
ctr1->user1[i++].other_domains = NULL; /* Maybe in future? */
}
ctr1->entries_read = i;
TALLOC_FREE(users);
TALLOC_FREE(dom_users);
return ctr1;
}
/********************************************************************
Handling for RPC Workstation Service request NetWkstaEnumUsers
(a.k.a Windows NetWkstaUserEnum)
********************************************************************/
WERROR _wkssvc_NetWkstaEnumUsers(pipes_struct *p, struct wkssvc_NetWkstaEnumUsers *r)
{
/* This with any level should only be allowed from a domain administrator */
if (!nt_token_check_sid(&global_sid_Builtin_Administrators,
p->server_info->ptok)) {
DEBUG(1,("User not allowed for NetWkstaEnumUsers\n"));
DEBUGADD(3,(" - does not have sid for Administrators group "
"%s\n", sid_string_dbg(
&global_sid_Builtin_Administrators)));
debug_nt_user_token(DBGC_CLASS, 3, p->server_info->ptok);
return WERR_ACCESS_DENIED;
}
switch (r->in.info->level) {
case 0:
r->out.info->ctr.user0 = create_enum_users0(p->mem_ctx);
if (r->out.info->ctr.user0 == NULL) {
return WERR_NOMEM;
}
r->out.info->level = r->in.info->level;
*r->out.entries_read = r->out.info->ctr.user0->entries_read;
*r->out.resume_handle = 0;
break;
case 1:
r->out.info->ctr.user1 = create_enum_users1(p->mem_ctx);
if (r->out.info->ctr.user1 == NULL) {
return WERR_NOMEM;
}
r->out.info->level = r->in.info->level;
*r->out.entries_read = r->out.info->ctr.user1->entries_read;
*r->out.resume_handle = 0;
break;
default:
return WERR_UNKNOWN_LEVEL;
}
return WERR_OK;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrWkstaUserGetInfo(pipes_struct *p, struct wkssvc_NetrWkstaUserGetInfo *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrWkstaUserSetInfo(pipes_struct *p, struct wkssvc_NetrWkstaUserSetInfo *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetWkstaTransportEnum(pipes_struct *p, struct wkssvc_NetWkstaTransportEnum *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrWkstaTransportAdd(pipes_struct *p, struct wkssvc_NetrWkstaTransportAdd *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrWkstaTransportDel(pipes_struct *p, struct wkssvc_NetrWkstaTransportDel *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrUseAdd(pipes_struct *p, struct wkssvc_NetrUseAdd *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrUseGetInfo(pipes_struct *p, struct wkssvc_NetrUseGetInfo *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrUseDel(pipes_struct *p, struct wkssvc_NetrUseDel *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrUseEnum(pipes_struct *p, struct wkssvc_NetrUseEnum *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrMessageBufferSend(pipes_struct *p, struct wkssvc_NetrMessageBufferSend *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrWorkstationStatisticsGet(pipes_struct *p, struct wkssvc_NetrWorkstationStatisticsGet *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrLogonDomainNameAdd(pipes_struct *p, struct wkssvc_NetrLogonDomainNameAdd *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrLogonDomainNameDel(pipes_struct *p, struct wkssvc_NetrLogonDomainNameDel *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrJoinDomain(pipes_struct *p, struct wkssvc_NetrJoinDomain *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrUnjoinDomain(pipes_struct *p, struct wkssvc_NetrUnjoinDomain *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrRenameMachineInDomain(pipes_struct *p, struct wkssvc_NetrRenameMachineInDomain *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrValidateName(pipes_struct *p, struct wkssvc_NetrValidateName *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrGetJoinInformation(pipes_struct *p, struct wkssvc_NetrGetJoinInformation *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrGetJoinableOus(pipes_struct *p, struct wkssvc_NetrGetJoinableOus *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
_wkssvc_NetrJoinDomain2
********************************************************************/
WERROR _wkssvc_NetrJoinDomain2(pipes_struct *p,
struct wkssvc_NetrJoinDomain2 *r)
{
struct libnet_JoinCtx *j = NULL;
char *cleartext_pwd = NULL;
char *admin_domain = NULL;
char *admin_account = NULL;
WERROR werr;
struct nt_user_token *token = p->server_info->ptok;
if (!r->in.domain_name) {
return WERR_INVALID_PARAM;
}
if (!r->in.admin_account || !r->in.encrypted_password) {
return WERR_INVALID_PARAM;
}
if (!user_has_privileges(token, &se_machine_account) &&
!nt_token_check_domain_rid(token, DOMAIN_RID_ADMINS) &&
!nt_token_check_sid(&global_sid_Builtin_Administrators, token)) {
DEBUG(5,("_wkssvc_NetrJoinDomain2: account doesn't have "
"sufficient privileges\n"));
return WERR_ACCESS_DENIED;
}
if ((r->in.join_flags & WKSSVC_JOIN_FLAGS_MACHINE_PWD_PASSED) ||
(r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_UNSECURE)) {
return WERR_NOT_SUPPORTED;
}
werr = decode_wkssvc_join_password_buffer(
p->mem_ctx, r->in.encrypted_password,
&p->server_info->user_session_key, &cleartext_pwd);
if (!W_ERROR_IS_OK(werr)) {
return werr;
}
split_domain_user(p->mem_ctx,
r->in.admin_account,
&admin_domain,
&admin_account);
werr = libnet_init_JoinCtx(p->mem_ctx, &j);
if (!W_ERROR_IS_OK(werr)) {
return werr;
}
j->in.domain_name = r->in.domain_name;
j->in.account_ou = r->in.account_ou;
j->in.join_flags = r->in.join_flags;
j->in.admin_account = admin_account;
j->in.admin_password = cleartext_pwd;
j->in.debug = true;
j->in.modify_config = lp_config_backend_is_registry();
j->in.msg_ctx = smbd_messaging_context();
become_root();
werr = libnet_Join(p->mem_ctx, j);
unbecome_root();
if (!W_ERROR_IS_OK(werr)) {
DEBUG(5,("_wkssvc_NetrJoinDomain2: libnet_Join failed with: %s\n",
j->out.error_string ? j->out.error_string :
win_errstr(werr)));
}
TALLOC_FREE(j);
return werr;
}
/********************************************************************
_wkssvc_NetrUnjoinDomain2
********************************************************************/
WERROR _wkssvc_NetrUnjoinDomain2(pipes_struct *p,
struct wkssvc_NetrUnjoinDomain2 *r)
{
struct libnet_UnjoinCtx *u = NULL;
char *cleartext_pwd = NULL;
char *admin_domain = NULL;
char *admin_account = NULL;
WERROR werr;
struct nt_user_token *token = p->server_info->ptok;
if (!r->in.account || !r->in.encrypted_password) {
return WERR_INVALID_PARAM;
}
if (!user_has_privileges(token, &se_machine_account) &&
!nt_token_check_domain_rid(token, DOMAIN_RID_ADMINS) &&
!nt_token_check_sid(&global_sid_Builtin_Administrators, token)) {
DEBUG(5,("_wkssvc_NetrUnjoinDomain2: account doesn't have "
"sufficient privileges\n"));
return WERR_ACCESS_DENIED;
}
werr = decode_wkssvc_join_password_buffer(
p->mem_ctx, r->in.encrypted_password,
&p->server_info->user_session_key, &cleartext_pwd);
if (!W_ERROR_IS_OK(werr)) {
return werr;
}
split_domain_user(p->mem_ctx,
r->in.account,
&admin_domain,
&admin_account);
werr = libnet_init_UnjoinCtx(p->mem_ctx, &u);
if (!W_ERROR_IS_OK(werr)) {
return werr;
}
u->in.domain_name = lp_realm();
u->in.unjoin_flags = r->in.unjoin_flags |
WKSSVC_JOIN_FLAGS_JOIN_TYPE;
u->in.admin_account = admin_account;
u->in.admin_password = cleartext_pwd;
u->in.debug = true;
u->in.modify_config = lp_config_backend_is_registry();
u->in.msg_ctx = smbd_messaging_context();
become_root();
werr = libnet_Unjoin(p->mem_ctx, u);
unbecome_root();
if (!W_ERROR_IS_OK(werr)) {
DEBUG(5,("_wkssvc_NetrUnjoinDomain2: libnet_Unjoin failed with: %s\n",
u->out.error_string ? u->out.error_string :
win_errstr(werr)));
}
TALLOC_FREE(u);
return werr;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrRenameMachineInDomain2(pipes_struct *p, struct wkssvc_NetrRenameMachineInDomain2 *r)
{
/* for now just return not supported */
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrValidateName2(pipes_struct *p, struct wkssvc_NetrValidateName2 *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrGetJoinableOus2(pipes_struct *p, struct wkssvc_NetrGetJoinableOus2 *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrAddAlternateComputerName(pipes_struct *p, struct wkssvc_NetrAddAlternateComputerName *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrRemoveAlternateComputerName(pipes_struct *p, struct wkssvc_NetrRemoveAlternateComputerName *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrSetPrimaryComputername(pipes_struct *p, struct wkssvc_NetrSetPrimaryComputername *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}
/********************************************************************
********************************************************************/
WERROR _wkssvc_NetrEnumerateComputerNames(pipes_struct *p, struct wkssvc_NetrEnumerateComputerNames *r)
{
/* FIXME: Add implementation code here */
p->rng_fault_state = True;
return WERR_NOT_SUPPORTED;
}