summaryrefslogtreecommitdiff
path: root/examples/libmsrpc/test/sam/enable.c
blob: bb91fb241c9a352d47a712d7212ea15f11facbb0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
/*enable a user*/

#include "libmsrpc.h"
#include "test_util.h"

int main(int argc, char **argv) {
   CacServerHandle *hnd = NULL;
   TALLOC_CTX *mem_ctx = NULL;

   struct SamOpenUser ou;

   fstring tmp;

   mem_ctx = talloc_init("cac_samgroup");

   hnd = cac_NewServerHandle(True);

   cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);

   cac_parse_cmd_line(argc, argv, hnd);

   if(!cac_Connect(hnd, NULL)) {
      fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
      exit(-1);
   }

   struct SamOpenDomain sod;
   ZERO_STRUCT(sod);

   sod.in.access = MAXIMUM_ALLOWED_ACCESS; 

   if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) {
      fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status));
      goto done;
   }

   ZERO_STRUCT(ou);
   printf("Enter username: ");
   cactest_readline(stdin, tmp);

   ou.in.name = talloc_strdup(mem_ctx, tmp);
   ou.in.access = MAXIMUM_ALLOWED_ACCESS;
   ou.in.dom_hnd = sod.out.dom_hnd;

   if(!cac_SamOpenUser(hnd, mem_ctx, &ou)) {
      fprintf(stderr, "Could not open user. Error: %s\n", nt_errstr(hnd->status));
      goto done;
   }

   /*enable the user*/
   if(!cac_SamEnableUser(hnd, mem_ctx, ou.out.user_hnd)) {
      fprintf(stderr, "Could not enable user: %s\n", nt_errstr(hnd->status));
   }

done:
   cac_SamClose(hnd, mem_ctx, sod.out.dom_hnd);

   cac_FreeHandle(hnd);

   talloc_destroy(mem_ctx);
   
   return 0;
}