summaryrefslogtreecommitdiff
path: root/source4/rpc_server/drsuapi/drsuapi_cracknames.c
blob: 1a31d541bae5e06dfa013058f92092f45c4896a3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/* 
   Unix SMB/CIFS implementation.

   endpoint server for the drsuapi pipe
   DsCrackNames()

   Copyright (C) Stefan Metzmacher 2004
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 2 of the License, or
   (at your option) any later version.
   
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
   
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to the Free Software
   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/

#include "includes.h"
#include "rpc_server/common/common.h"
#include "rpc_server/drsuapi/dcesrv_drsuapi.h"


static NTSTATUS DsCrackNameOneName(struct drsuapi_bind_state *b_state, TALLOC_CTX *mem_ctx,
			uint32 format_offered, uint32 format_desired, const char *name,
			struct drsuapi_DsNameInfo1 *info1)
{
	info1->status = DRSUAPI_DS_NAME_STATUS_RESOLVE_ERROR;
	info1->dns_domain_name = NULL;
	info1->result_name = NULL;

	/* TODO: fill crack the correct names in all cases! */
	switch (format_offered) {
		case DRSUAPI_DS_NAME_FORMAT_CANONICAL: {
			int ret;
			char *str;

			str = talloc_asprintf(mem_ctx, "%s/", lp_realm());
			NTSTATUS_TALLOC_CHECK(str);

			ret = strcasecmp(str, name);
			talloc_free(str);
			if (ret != 0) {
				info1->status = DRSUAPI_DS_NAME_STATUS_NOT_FOUND;
				return NT_STATUS_OK;
			}

			info1->status = DRSUAPI_DS_NAME_STATUS_DOMAIN_ONLY;
			info1->dns_domain_name = talloc_asprintf(mem_ctx, "%s", lp_realm());
			NTSTATUS_TALLOC_CHECK(info1->dns_domain_name);
			switch (format_desired) {
				case DRSUAPI_DS_NAME_FORMAT_NT4_ACCOUNT:
					info1->status = DRSUAPI_DS_NAME_STATUS_OK;
					info1->result_name = talloc_asprintf(mem_ctx, "%s\\",
										lp_workgroup());
					NTSTATUS_TALLOC_CHECK(info1->result_name);
					return NT_STATUS_OK;
				default:
					return NT_STATUS_OK;
			}
			return NT_STATUS_INVALID_PARAMETER;
		}
		default: {
			info1->status = DRSUAPI_DS_NAME_STATUS_NOT_FOUND;
			return NT_STATUS_OK;
		}
	}

	return NT_STATUS_INVALID_PARAMETER;
}

/* 
  drsuapi_DsCrackNames 
*/
NTSTATUS dcesrv_drsuapi_DsCrackNames(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx,
		       struct drsuapi_DsCrackNames *r)
{
	NTSTATUS status;
	struct drsuapi_bind_state *b_state;
	struct dcesrv_handle *h;

	r->out.level = r->in.level;
	ZERO_STRUCT(r->out.ctr);

	DCESRV_PULL_HANDLE(h, r->in.bind_handle, DRSUAPI_BIND_HANDLE);
	b_state = h->data;

	switch (r->in.level) {
		case 1: {
			struct drsuapi_DsNameInfo1 *names;
			int count;
			int i;

			r->out.ctr.ctr1 = talloc_p(mem_ctx, struct drsuapi_DsNameCtr1);
			NTSTATUS_TALLOC_CHECK(r->out.ctr.ctr1);

			r->out.ctr.ctr1->count = 0;
			r->out.ctr.ctr1->array = NULL;

			count = r->in.req.req1.count;
			names = talloc_array_p(mem_ctx, struct drsuapi_DsNameInfo1, count);
			NTSTATUS_TALLOC_CHECK(names);

			for (i=0; i < count; i++) {
				status = DsCrackNameOneName(b_state, mem_ctx,
							    r->in.req.req1.format_offered,
							    r->in.req.req1.format_desired,
							    r->in.req.req1.names[i].str,
							    &names[i]);
				if (!NT_STATUS_IS_OK(status)) {
					return status;
				}
			}

			r->out.ctr.ctr1->count = count;
			r->out.ctr.ctr1->array = names;

			return NT_STATUS_OK;
		}
	}
	
	return NT_STATUS_INVALID_LEVEL;
}