diff options
Diffstat (limited to 'source/samrd/srv_samr_passdb.c')
-rw-r--r-- | source/samrd/srv_samr_passdb.c | 807 |
1 files changed, 414 insertions, 393 deletions
diff --git a/source/samrd/srv_samr_passdb.c b/source/samrd/srv_samr_passdb.c index c855dba9b07..63d9077e965 100644 --- a/source/samrd/srv_samr_passdb.c +++ b/source/samrd/srv_samr_passdb.c @@ -33,25 +33,25 @@ extern int DEBUGLEVEL; /**************************************************************************** set samr sid ****************************************************************************/ -static BOOL set_policy_samr_sid(struct policy_cache *cache, POLICY_HND *hnd, - const DOM_SID *sid) +static BOOL set_policy_samr_sid(struct policy_cache *cache, POLICY_HND * hnd, + const DOM_SID * sid) { pstring sidstr; DOM_SID *dev = sid_dup(sid); - DEBUG(3,("Setting policy sid=%s\n", sid_to_string(sidstr, sid))); + DEBUG(3, ("Setting policy sid=%s\n", sid_to_string(sidstr, sid))); if (dev != NULL) { - if (set_policy_state(cache, hnd, NULL, (void*)dev)) + if (set_policy_state(cache, hnd, NULL, (void *)dev)) { - DEBUG(3,("Service setting policy sid=%s\n", sidstr)); + DEBUG(3, ("Service setting policy sid=%s\n", sidstr)); return True; } free(dev); return True; } - DEBUG(3,("Error setting policy sid\n")); + DEBUG(3, ("Error setting policy sid\n")); return False; } @@ -59,19 +59,20 @@ static BOOL set_policy_samr_sid(struct policy_cache *cache, POLICY_HND *hnd, get samr sid ****************************************************************************/ static BOOL get_policy_samr_sid(struct policy_cache *cache, - const POLICY_HND *hnd, DOM_SID *sid) + const POLICY_HND * hnd, DOM_SID * sid) { - DOM_SID *dev = (DOM_SID*)get_policy_state_info(cache, hnd); + DOM_SID *dev = (DOM_SID *) get_policy_state_info(cache, hnd); if (dev != NULL) { pstring tmp; sid_copy(sid, dev); - DEBUG(3,("Getting policy sid=%s\n", sid_to_string(tmp, sid))); + DEBUG(3, + ("Getting policy sid=%s\n", sid_to_string(tmp, sid))); return True; } - DEBUG(3,("Error getting policy sid\n")); + DEBUG(3, ("Error getting policy sid\n")); return False; } @@ -80,11 +81,10 @@ static BOOL get_policy_samr_sid(struct policy_cache *cache, dynamically returns the correct user info..... JRA. ********************************************************************/ -static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf, - int start_idx, - int *total_entries, int *num_entries, - int max_num_entries, - uint16 acb_mask) +static BOOL get_sampwd_entries(SAM_USER_INFO_21 * pw_buf, + int start_idx, + int *total_entries, int *num_entries, + int max_num_entries, uint16 acb_mask) { void *vp = NULL; struct sam_passwd *pwd = NULL; @@ -92,16 +92,19 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf, (*num_entries) = 0; (*total_entries) = 0; - if (pw_buf == NULL) return False; + if (pw_buf == NULL) + return False; vp = startsmbpwent(False); if (!vp) { - DEBUG(0, ("get_sampwd_entries: Unable to open SMB password database.\n")); + DEBUG(0, + ("get_sampwd_entries: Unable to open SMB password database.\n")); return False; } - while (((pwd = getsam21pwent(vp)) != NULL) && (*num_entries) < max_num_entries) + while (((pwd = getsam21pwent(vp)) != NULL) + && (*num_entries) < max_num_entries) { int user_name_len; @@ -110,7 +113,8 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf, /* skip the requested number of entries. not very efficient, but hey... */ - if (acb_mask == 0 || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask)) + if (acb_mask == 0 + || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask)) { start_idx--; } @@ -118,31 +122,35 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf, } user_name_len = strlen(pwd->nt_name); - make_unistr2(&(pw_buf[(*num_entries)].uni_user_name), pwd->nt_name, user_name_len); - make_uni_hdr(&(pw_buf[(*num_entries)].hdr_user_name), user_name_len); + make_unistr2(&(pw_buf[(*num_entries)].uni_user_name), + pwd->nt_name, user_name_len); + make_uni_hdr(&(pw_buf[(*num_entries)].hdr_user_name), + user_name_len); pw_buf[(*num_entries)].user_rid = pwd->user_rid; - bzero( pw_buf[(*num_entries)].nt_pwd , 16); + bzero(pw_buf[(*num_entries)].nt_pwd, 16); /* Now check if the NT compatible password is available. */ if (pwd->smb_nt_passwd != NULL) { - memcpy( pw_buf[(*num_entries)].nt_pwd , pwd->smb_nt_passwd, 16); + memcpy(pw_buf[(*num_entries)].nt_pwd, + pwd->smb_nt_passwd, 16); } - pw_buf[(*num_entries)].acb_info = (uint16)pwd->acct_ctrl; + pw_buf[(*num_entries)].acb_info = (uint16) pwd->acct_ctrl; DEBUG(5, ("entry idx: %d user %s, rid 0x%x, acb %x", - (*num_entries), pwd->nt_name, - pwd->user_rid, pwd->acct_ctrl)); + (*num_entries), pwd->nt_name, + pwd->user_rid, pwd->acct_ctrl)); - if (acb_mask == 0 || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask)) + if (acb_mask == 0 + || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask)) { - DEBUG(5,(" acb_mask %x accepts\n", acb_mask)); + DEBUG(5, (" acb_mask %x accepts\n", acb_mask)); (*num_entries)++; } else { - DEBUG(5,(" acb_mask %x rejects\n", acb_mask)); + DEBUG(5, (" acb_mask %x rejects\n", acb_mask)); } (*total_entries)++; @@ -156,22 +164,21 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf, /******************************************************************* opens a samr group by rid, returns a policy handle. ********************************************************************/ -static uint32 samr_open_by_sid( const POLICY_HND *parent_pol, - const DOM_SID *dom_sid, - POLICY_HND *pol, - uint32 access_mask, - uint32 rid) +static uint32 samr_open_by_sid(const POLICY_HND * parent_pol, + const DOM_SID * dom_sid, + POLICY_HND * pol, + uint32 access_mask, uint32 rid) { DOM_SID sid; - + /* get a (unique) handle. open a policy on it. */ if (!open_policy_hnd_link(get_global_hnd_cache(), - parent_pol, pol, access_mask)) + parent_pol, pol, access_mask)) { return NT_STATUS_ACCESS_DENIED; } - DEBUG(0,("TODO: verify that the rid exists\n")); + DEBUG(0, ("TODO: verify that the rid exists\n")); /* associate a SID with the (unique) handle. */ sid_copy(&sid, dom_sid); @@ -191,7 +198,7 @@ static uint32 samr_open_by_sid( const POLICY_HND *parent_pol, /******************************************************************* _samr_close ********************************************************************/ -uint32 _samr_close(POLICY_HND *hnd) +uint32 _samr_close(POLICY_HND * hnd) { /* close the policy handle */ if (close_policy_hnd(get_global_hnd_cache(), hnd)) @@ -204,18 +211,19 @@ uint32 _samr_close(POLICY_HND *hnd) /******************************************************************* samr_reply_unknown_2d ********************************************************************/ -uint32 _samr_unknown_2d(const POLICY_HND *domain_pol, const DOM_SID *sid) +uint32 _samr_unknown_2d(const POLICY_HND * domain_pol, const DOM_SID * sid) { DOM_SID dom_sid; /* associate the domain SID with the (unique) handle. */ - if (!get_policy_samr_sid(get_global_hnd_cache(), domain_pol, &dom_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), domain_pol, &dom_sid)) { return NT_STATUS_ACCESS_DENIED; } - DEBUG(0,("_samr_unknown_2d: not implemented, returning OK\n")); - DEBUG(5,("_samr_unknown_2d: %d\n", __LINE__)); + DEBUG(0, ("_samr_unknown_2d: not implemented, returning OK\n")); + DEBUG(5, ("_samr_unknown_2d: %d\n", __LINE__)); return NT_STATUS_NOPROBLEMO; } @@ -223,10 +231,9 @@ uint32 _samr_unknown_2d(const POLICY_HND *domain_pol, const DOM_SID *sid) /******************************************************************* samr_reply_open_domain ********************************************************************/ -uint32 _samr_open_domain(const POLICY_HND *connect_pol, - uint32 ace_perms, - const DOM_SID *sid, - POLICY_HND *domain_pol) +uint32 _samr_open_domain(const POLICY_HND * connect_pol, + uint32 ace_perms, + const DOM_SID * sid, POLICY_HND * domain_pol) { /* find the connection policy handle. */ if (find_policy_by_hnd(get_global_hnd_cache(), connect_pol) == -1) @@ -236,13 +243,12 @@ uint32 _samr_open_domain(const POLICY_HND *connect_pol, /* get a (unique) handle. open a policy on it. */ if (!open_policy_hnd_link(get_global_hnd_cache(), - connect_pol, domain_pol, ace_perms)) + connect_pol, domain_pol, ace_perms)) { return NT_STATUS_ACCESS_DENIED; } - policy_hnd_set_name(get_global_hnd_cache(), - domain_pol, "sam_domain"); + policy_hnd_set_name(get_global_hnd_cache(), domain_pol, "sam_domain"); /* associate the domain SID with the (unique) handle. */ if (!set_policy_samr_sid(get_global_hnd_cache(), domain_pol, sid)) @@ -251,7 +257,7 @@ uint32 _samr_open_domain(const POLICY_HND *connect_pol, return NT_STATUS_ACCESS_DENIED; } - DEBUG(5,("_samr_open_domain: %d\n", __LINE__)); + DEBUG(5, ("_samr_open_domain: %d\n", __LINE__)); return NT_STATUS_NOPROBLEMO; } @@ -259,10 +265,9 @@ uint32 _samr_open_domain(const POLICY_HND *connect_pol, /******************************************************************* samr_reply_get_usrdom_pwinfo ********************************************************************/ -uint32 _samr_get_usrdom_pwinfo(const POLICY_HND *user_pol, - uint16 *unknown_0, - uint16 *unknown_1, - uint32 *unknown_2) +uint32 _samr_get_usrdom_pwinfo(const POLICY_HND * user_pol, + uint16 * unknown_0, + uint16 * unknown_1, uint32 * unknown_2) { uint32 rid; DOM_SID sid; @@ -279,7 +284,7 @@ uint32 _samr_get_usrdom_pwinfo(const POLICY_HND *user_pol, *unknown_1 = 0x0015; *unknown_2 = 0x00000000; - DEBUG(5,("samr_get_usrdom_pwinfo: %d\n", __LINE__)); + DEBUG(5, ("samr_get_usrdom_pwinfo: %d\n", __LINE__)); return NT_STATUS_NOPROBLEMO; } @@ -287,7 +292,7 @@ uint32 _samr_get_usrdom_pwinfo(const POLICY_HND *user_pol, /******************************************************************* samr_reply_query_sec_obj ********************************************************************/ -uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf) +uint32 _samr_query_sec_obj(const POLICY_HND * user_pol, SEC_DESC_BUF * buf) { DOM_SID usr_sid; @@ -297,7 +302,7 @@ uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf) return NT_STATUS_INVALID_HANDLE; } - SMB_ASSERT_ARRAY(usr_sid.sub_auths, usr_sid.num_auths+1); + SMB_ASSERT_ARRAY(usr_sid.sub_auths, usr_sid.num_auths + 1); #if 0 /* maybe need another 1 or 2 (S-1-5-0x20-0x220 and S-1-5-20-0x224) */ @@ -305,13 +310,11 @@ uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf) make_dom_sid3(&sid_stuff->sid[0], 0x035b, 0x0002, &global_sid_S_1_1); make_dom_sid3(&sid_stuff->sid[1], 0x0044, 0x0002, &usr_sid); - make_sam_sid_stuff(sid_stuff, - 0x0001, 0x8004, - 0x00000014, 0x0002, 0x0070, - 2); + make_sam_sid_stuff(sid_stuff, + 0x0001, 0x8004, 0x00000014, 0x0002, 0x0070, 2); #endif - DEBUG(5,("samr_query_sec_obj: %d\n", __LINE__)); + DEBUG(5, ("samr_query_sec_obj: %d\n", __LINE__)); return samr_make_usr_obj_sd(buf, &usr_sid); } @@ -319,9 +322,9 @@ uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf) /******************************************************************* makes a SAM_ENTRY / UNISTR2* structure. ********************************************************************/ -static void make_samr_dom_users(SAM_ENTRY **sam, UNISTR2 **uni_acct_name, - uint32 num_sam_entries, - SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES]) +static void make_samr_dom_users(SAM_ENTRY ** sam, UNISTR2 ** uni_acct_name, + uint32 num_sam_entries, + SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES]) { uint32 i; @@ -333,12 +336,16 @@ static void make_samr_dom_users(SAM_ENTRY **sam, UNISTR2 **uni_acct_name, return; } - (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); - (*uni_acct_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_acct_name)[0])); + (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); + + (*uni_acct_name) = + (UNISTR2 *) Realloc(NULL, + num_sam_entries * + sizeof((*uni_acct_name)[0])); if ((*sam) == NULL || (*uni_acct_name) == NULL) { - DEBUG(0,("NULL pointers in SAMR_R_QUERY_DISPINFO\n")); + DEBUG(0, ("NULL pointers in SAMR_R_QUERY_DISPINFO\n")); return; } @@ -348,18 +355,18 @@ static void make_samr_dom_users(SAM_ENTRY **sam, UNISTR2 **uni_acct_name, pass[i].uni_user_name.uni_str_len, pass[i].user_rid); - copy_unistr2(&((*uni_acct_name)[i]), &(pass[i].uni_user_name)); + copy_unistr2(&((*uni_acct_name)[i]), + &(pass[i].uni_user_name)); } } /******************************************************************* samr_reply_enum_dom_users ********************************************************************/ -uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx, - uint16 acb_mask, uint16 unk_1, uint32 size, - SAM_ENTRY **sam, - UNISTR2 **uni_acct_name, - uint32 *num_sam_users) +uint32 _samr_enum_dom_users(const POLICY_HND * pol, uint32 * start_idx, + uint16 acb_mask, uint16 unk_1, uint32 size, + SAM_ENTRY ** sam, + UNISTR2 ** uni_acct_name, uint32 * num_sam_users) { SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES]; int total_entries; @@ -371,12 +378,11 @@ uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx, return NT_STATUS_INVALID_HANDLE; } - DEBUG(5,("samr_reply_enum_dom_users: %d\n", __LINE__)); + DEBUG(5, ("samr_reply_enum_dom_users: %d\n", __LINE__)); become_root(True); ret = get_sampwd_entries(pass, (*start_idx), &total_entries, - num_sam_users, - MAX_SAM_ENTRIES, acb_mask); + num_sam_users, MAX_SAM_ENTRIES, acb_mask); unbecome_root(True); if (!ret) { @@ -386,7 +392,7 @@ uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx, (*start_idx) += (*num_sam_users); make_samr_dom_users(sam, uni_acct_name, (*num_sam_users), pass); - DEBUG(5,("samr_enum_dom_users: %d\n", __LINE__)); + DEBUG(5, ("samr_enum_dom_users: %d\n", __LINE__)); return NT_STATUS_NOPROBLEMO; } @@ -394,7 +400,7 @@ uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx, /******************************************************************* samr_reply_add_groupmem ********************************************************************/ -uint32 _samr_add_groupmem(const POLICY_HND *pol, uint32 rid, uint32 unknown) +uint32 _samr_add_groupmem(const POLICY_HND * pol, uint32 rid, uint32 unknown) { DOM_SID group_sid; uint32 group_rid; @@ -409,14 +415,14 @@ uint32 _samr_add_groupmem(const POLICY_HND *pol, uint32 rid, uint32 unknown) sid_to_string(group_sid_str, &group_sid); sid_split_rid(&group_sid, &group_rid); - DEBUG(10,("sid is %s\n", group_sid_str)); + DEBUG(10, ("sid is %s\n", group_sid_str)); if (!sid_equal(&group_sid, &global_sam_sid)) { return NT_STATUS_NO_SUCH_GROUP; } - DEBUG(10,("lookup on Domain SID\n")); + DEBUG(10, ("lookup on Domain SID\n")); if (!add_group_member(group_rid, rid)) { @@ -429,7 +435,7 @@ uint32 _samr_add_groupmem(const POLICY_HND *pol, uint32 rid, uint32 unknown) /******************************************************************* samr_reply_del_groupmem ********************************************************************/ -uint32 _samr_del_groupmem(const POLICY_HND *pol, uint32 rid) +uint32 _samr_del_groupmem(const POLICY_HND * pol, uint32 rid) { DOM_SID group_sid; uint32 group_rid; @@ -444,13 +450,13 @@ uint32 _samr_del_groupmem(const POLICY_HND *pol, uint32 rid) sid_to_string(group_sid_str, &group_sid); sid_split_rid(&group_sid, &group_rid); - DEBUG(10,("sid is %s\n", group_sid_str)); + DEBUG(10, ("sid is %s\n", group_sid_str)); if (!sid_equal(&group_sid, &global_sam_sid)) { return NT_STATUS_NO_SUCH_GROUP; } - DEBUG(10,("lookup on Domain SID\n")); + DEBUG(10, ("lookup on Domain SID\n")); if (!del_group_member(group_rid, rid)) { @@ -463,25 +469,26 @@ uint32 _samr_del_groupmem(const POLICY_HND *pol, uint32 rid) /******************************************************************* samr_reply_add_aliasmem ********************************************************************/ -uint32 _samr_add_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid) +uint32 _samr_add_aliasmem(const POLICY_HND * alias_pol, const DOM_SID * sid) { DOM_SID alias_sid; uint32 alias_rid; fstring alias_sid_str; /* find the policy handle. open a policy on it. */ - if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), alias_pol, &alias_sid)) { return NT_STATUS_INVALID_HANDLE; } sid_to_string(alias_sid_str, &alias_sid); sid_split_rid(&alias_sid, &alias_rid); - DEBUG(10,("sid is %s\n", alias_sid_str)); + DEBUG(10, ("sid is %s\n", alias_sid_str)); if (sid_equal(&alias_sid, &global_sam_sid)) { - DEBUG(10,("add member on Domain SID\n")); + DEBUG(10, ("add member on Domain SID\n")); if (!add_alias_member(alias_rid, sid)) { @@ -490,7 +497,7 @@ uint32 _samr_add_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid) } else if (sid_equal(&alias_sid, global_sid_builtin)) { - DEBUG(10,("add member on BUILTIN SID\n")); + DEBUG(10, ("add member on BUILTIN SID\n")); if (!add_builtin_member(alias_rid, sid)) { @@ -508,25 +515,26 @@ uint32 _samr_add_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid) /******************************************************************* samr_reply_del_aliasmem ********************************************************************/ -uint32 _samr_del_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid) +uint32 _samr_del_aliasmem(const POLICY_HND * alias_pol, const DOM_SID * sid) { DOM_SID alias_sid; uint32 alias_rid; fstring alias_sid_str; /* find the policy handle. open a policy on it. */ - if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), alias_pol, &alias_sid)) { return NT_STATUS_INVALID_HANDLE; } sid_to_string(alias_sid_str, &alias_sid); sid_split_rid(&alias_sid, &alias_rid); - DEBUG(10,("sid is %s\n", alias_sid_str)); + DEBUG(10, ("sid is %s\n", alias_sid_str)); if (sid_equal(&alias_sid, &global_sam_sid)) { - DEBUG(10,("del member on Domain SID\n")); + DEBUG(10, ("del member on Domain SID\n")); if (!del_alias_member(alias_rid, sid)) { @@ -535,7 +543,7 @@ uint32 _samr_del_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid) } else if (sid_equal(&alias_sid, global_sid_builtin)) { - DEBUG(10,("del member on BUILTIN SID\n")); + DEBUG(10, ("del member on BUILTIN SID\n")); if (!del_builtin_member(alias_rid, sid)) { @@ -553,12 +561,12 @@ uint32 _samr_del_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid) /****************************************************************** makes a SAMR_R_ENUM_DOMAINS structure. ********************************************************************/ -static void make_enum_domains(SAM_ENTRY **sam, UNISTR2 **uni_dom_name, - uint32 num_sam_entries, char **doms) +static void make_enum_domains(SAM_ENTRY ** sam, UNISTR2 ** uni_dom_name, + uint32 num_sam_entries, char **doms) { uint32 i; - DEBUG(5,("make_enum_domains\n")); + DEBUG(5, ("make_enum_domains\n")); (*sam) = NULL; (*uni_dom_name) = NULL; @@ -568,12 +576,16 @@ static void make_enum_domains(SAM_ENTRY **sam, UNISTR2 **uni_dom_name, return; } - (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); - (*uni_dom_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_dom_name)[0])); + (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); + + (*uni_dom_name) = + (UNISTR2 *) Realloc(NULL, + num_sam_entries * + sizeof((*uni_dom_name)[0])); if ((*sam) == NULL || (*uni_dom_name) == NULL) { - DEBUG(0,("NULL pointers in make_enum_domains\n")); + DEBUG(0, ("NULL pointers in make_enum_domains\n")); return; } @@ -590,7 +602,7 @@ static void make_enum_domains(SAM_ENTRY **sam, UNISTR2 **uni_dom_name, /************************************************************************** enumerates all domains for which the SAM server is responsible ***************************************************************************/ -static BOOL enumdomains(char ***doms, uint32 *num_entries) +static BOOL enumdomains(char ***doms, uint32 * num_entries) { add_chars_to_array(num_entries, doms, global_sam_name); add_chars_to_array(num_entries, doms, "Builtin"); @@ -601,13 +613,12 @@ static BOOL enumdomains(char ***doms, uint32 *num_entries) /******************************************************************* samr_reply_enum_domains ********************************************************************/ -uint32 _samr_enum_domains(const POLICY_HND *pol, uint32 *start_idx, - uint32 size, - SAM_ENTRY **sam, - UNISTR2 **uni_acct_name, - uint32 *num_sam_users) +uint32 _samr_enum_domains(const POLICY_HND * pol, uint32 * start_idx, + uint32 size, + SAM_ENTRY ** sam, + UNISTR2 ** uni_acct_name, uint32 * num_sam_users) { - char **doms = NULL; + char **doms = NULL; uint32 num_entries = 0; /* find the connection policy handle. */ @@ -616,7 +627,7 @@ uint32 _samr_enum_domains(const POLICY_HND *pol, uint32 *start_idx, return NT_STATUS_INVALID_HANDLE; } - DEBUG(5,("samr_reply_enum_domains:\n")); + DEBUG(5, ("samr_reply_enum_domains:\n")); if (!enumdomains(&doms, &num_entries)) { @@ -636,12 +647,12 @@ uint32 _samr_enum_domains(const POLICY_HND *pol, uint32 *start_idx, /******************************************************************* makes a SAMR_R_ENUM_DOM_GROUPS structure. ********************************************************************/ -static void make_samr_dom_groups(SAM_ENTRY **sam, UNISTR2 **uni_grp_name, - uint32 num_sam_entries, DOMAIN_GRP *grps) +static void make_samr_dom_groups(SAM_ENTRY ** sam, UNISTR2 ** uni_grp_name, + uint32 num_sam_entries, DOMAIN_GRP * grps) { uint32 i; - DEBUG(5,("make_samr_dom_groups\n")); + DEBUG(5, ("make_samr_dom_groups\n")); (*sam) = NULL; (*uni_grp_name) = NULL; @@ -651,12 +662,16 @@ static void make_samr_dom_groups(SAM_ENTRY **sam, UNISTR2 **uni_grp_name, return; } - (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); - (*uni_grp_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_grp_name)[0])); + (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); + + (*uni_grp_name) = + (UNISTR2 *) Realloc(NULL, + num_sam_entries * + sizeof((*uni_grp_name)[0])); if ((*sam) == NULL || (*uni_grp_name) == NULL) { - DEBUG(0,("NULL pointers in SAMR_R_ENUM_DOM_GROUPS\n")); + DEBUG(0, ("NULL pointers in SAMR_R_ENUM_DOM_GROUPS\n")); return; } @@ -672,11 +687,11 @@ static void make_samr_dom_groups(SAM_ENTRY **sam, UNISTR2 **uni_grp_name, /******************************************************************* samr_reply_enum_dom_groups ********************************************************************/ -uint32 _samr_enum_dom_groups(const POLICY_HND *pol, - uint32 *start_idx, uint32 size, - SAM_ENTRY **sam, - UNISTR2 **uni_acct_name, - uint32 *num_sam_groups) +uint32 _samr_enum_dom_groups(const POLICY_HND * pol, + uint32 * start_idx, uint32 size, + SAM_ENTRY ** sam, + UNISTR2 ** uni_acct_name, + uint32 * num_sam_groups) { DOMAIN_GRP *grps = NULL; int num_entries = 0; @@ -692,7 +707,7 @@ uint32 _samr_enum_dom_groups(const POLICY_HND *pol, sid_to_string(sid_str, &sid); - DEBUG(5,("samr_reply_enum_dom_groups: sid %s\n", sid_str)); + DEBUG(5, ("samr_reply_enum_dom_groups: sid %s\n", sid_str)); if (!sid_equal(&sid, &global_sam_sid)) { @@ -720,12 +735,12 @@ uint32 _samr_enum_dom_groups(const POLICY_HND *pol, /******************************************************************* makes a SAMR_R_ENUM_DOM_ALIASES structure. ********************************************************************/ -static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name, - uint32 num_sam_entries, LOCAL_GRP *alss) +static void make_samr_dom_aliases(SAM_ENTRY ** sam, UNISTR2 ** uni_grp_name, + uint32 num_sam_entries, LOCAL_GRP * alss) { uint32 i; - DEBUG(5,("make_samr_r_enum_dom_aliases\n")); + DEBUG(5, ("make_samr_r_enum_dom_aliases\n")); (*sam) = NULL; (*uni_grp_name) = NULL; @@ -735,12 +750,16 @@ static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name, return; } - (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); - (*uni_grp_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_grp_name)[0])); + (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0])); + + (*uni_grp_name) = + (UNISTR2 *) Realloc(NULL, + num_sam_entries * + sizeof((*uni_grp_name)[0])); if ((*sam) == NULL || (*uni_grp_name) == NULL) { - DEBUG(0,("NULL pointers in SAMR_R_ENUM_DOM_ALIASES\n")); + DEBUG(0, ("NULL pointers in SAMR_R_ENUM_DOM_ALIASES\n")); return; } @@ -748,7 +767,7 @@ static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name, { int len = strlen(alss[i].name); - make_sam_entry(&((*sam)[i]), len, alss[i].rid); + make_sam_entry(&((*sam)[i]), len, alss[i].rid); make_unistr2(&((*uni_grp_name)[i]), alss[i].name, len); } } @@ -756,11 +775,11 @@ static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name, /******************************************************************* samr_reply_enum_dom_aliases ********************************************************************/ -uint32 _samr_enum_dom_aliases(const POLICY_HND *pol, - uint32 *start_idx, uint32 size, - SAM_ENTRY **sam, - UNISTR2 **uni_acct_name, - uint32 *num_sam_aliases) +uint32 _samr_enum_dom_aliases(const POLICY_HND * pol, + uint32 * start_idx, uint32 size, + SAM_ENTRY ** sam, + UNISTR2 ** uni_acct_name, + uint32 * num_sam_aliases) { LOCAL_GRP *alss = NULL; int num_entries = 0; @@ -775,7 +794,7 @@ uint32 _samr_enum_dom_aliases(const POLICY_HND *pol, sid_to_string(sid_str, &sid); - DEBUG(5,("samr_reply_enum_dom_aliases: sid %s\n", sid_str)); + DEBUG(5, ("samr_reply_enum_dom_aliases: sid %s\n", sid_str)); /* well-known aliases */ if (sid_equal(&sid, global_sid_builtin)) @@ -804,7 +823,7 @@ uint32 _samr_enum_dom_aliases(const POLICY_HND *pol, return NT_STATUS_ACCESS_DENIED; } } - + (*start_idx) += num_entries; (*num_sam_aliases) = num_entries; @@ -818,13 +837,12 @@ uint32 _samr_enum_dom_aliases(const POLICY_HND *pol, /******************************************************************* samr_reply_query_dispinfo ********************************************************************/ -uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, - uint32 start_idx, - uint32 max_entries, - uint32 max_size, - uint32 *data_size, - uint32 *num_entries, - SAM_DISPINFO_CTR *ctr) +uint32 _samr_query_dispinfo(const POLICY_HND * domain_pol, uint16 level, + uint32 start_idx, + uint32 max_entries, + uint32 max_size, + uint32 * data_size, + uint32 * num_entries, SAM_DISPINFO_CTR * ctr) { SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES]; DOMAIN_GRP *grps = NULL; @@ -833,7 +851,7 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, int num_sam_entries = 0; int total_entries = 0; - DEBUG(5,("samr_reply_query_dispinfo: %d\n", __LINE__)); + DEBUG(5, ("samr_reply_query_dispinfo: %d\n", __LINE__)); (*num_entries) = 0; (*data_size) = 0; @@ -841,7 +859,7 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, /* find the policy handle. open a policy on it. */ if (find_policy_by_hnd(get_global_hnd_cache(), domain_pol) == -1) { - DEBUG(5,("samr_reply_query_dispinfo: invalid handle\n")); + DEBUG(5, ("samr_reply_query_dispinfo: invalid handle\n")); return NT_STATUS_INVALID_HANDLE; } @@ -860,12 +878,13 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, become_root(True); ret = get_sampwd_entries(pass, start_idx, - &total_entries, &num_sam_entries, - MAX_SAM_ENTRIES, acb_mask); + &total_entries, + &num_sam_entries, + MAX_SAM_ENTRIES, acb_mask); unbecome_root(True); if (!ret) { - DEBUG(5,("get_sampwd_entries: failed\n")); + DEBUG(5, ("get_sampwd_entries: failed\n")); return NT_STATUS_ACCESS_DENIED; } break; @@ -883,10 +902,13 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, return NT_STATUS_ACCESS_DENIED; } - if (start_idx < num_sam_entries) { + if (start_idx < num_sam_entries) + { grps = sam_grps + start_idx; num_sam_entries -= start_idx; - } else { + } + else + { num_sam_entries = 0; } break; @@ -904,8 +926,8 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, if ((*num_entries) > MAX_SAM_ENTRIES) { (*num_entries) = MAX_SAM_ENTRIES; - DEBUG(5,("limiting number of entries to %d\n", - (*num_entries))); + DEBUG(5, ("limiting number of entries to %d\n", + (*num_entries))); } (*data_size) = max_size; @@ -961,7 +983,7 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, } } - DEBUG(5,("samr_reply_query_dispinfo: %d\n", __LINE__)); + DEBUG(5, ("samr_reply_query_dispinfo: %d\n", __LINE__)); safe_free(sam_grps); @@ -977,9 +999,9 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level, /******************************************************************* samr_reply_delete_dom_user ********************************************************************/ -uint32 _samr_delete_dom_user(POLICY_HND *user_pol) +uint32 _samr_delete_dom_user(POLICY_HND * user_pol) { - DEBUG(0,("samr_delete_dom_user: not implemented\n")); + DEBUG(0, ("samr_delete_dom_user: not implemented\n")); return NT_STATUS_ACCESS_DENIED; } @@ -987,30 +1009,31 @@ uint32 _samr_delete_dom_user(POLICY_HND *user_pol) /******************************************************************* samr_reply_delete_dom_group ********************************************************************/ -uint32 _samr_delete_dom_group(POLICY_HND *group_pol) +uint32 _samr_delete_dom_group(POLICY_HND * group_pol) { DOM_SID group_sid; uint32 group_rid; fstring group_sid_str; - DEBUG(5,("samr_delete_dom_group: %d\n", __LINE__)); + DEBUG(5, ("samr_delete_dom_group: %d\n", __LINE__)); /* find the policy handle. open a policy on it. */ - if (!get_policy_samr_sid(get_global_hnd_cache(), group_pol, &group_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), group_pol, &group_sid)) { return NT_STATUS_INVALID_HANDLE; } sid_to_string(group_sid_str, &group_sid); sid_split_rid(&group_sid, &group_rid); - DEBUG(10,("sid is %s\n", group_sid_str)); + DEBUG(10, ("sid is %s\n", group_sid_str)); if (!sid_equal(&group_sid, &global_sam_sid)) { return NT_STATUS_NO_SUCH_GROUP; } - DEBUG(10,("lookup on Domain SID\n")); + DEBUG(10, ("lookup on Domain SID\n")); if (!del_group_entry(group_rid)) { @@ -1024,10 +1047,8 @@ uint32 _samr_delete_dom_group(POLICY_HND *group_pol) /******************************************************************* samr_reply_query_groupmem ********************************************************************/ -uint32 _samr_query_groupmem(const POLICY_HND *group_pol, - uint32 *num_mem, - uint32 **rid, - uint32 **attr) +uint32 _samr_query_groupmem(const POLICY_HND * group_pol, + uint32 * num_mem, uint32 ** rid, uint32 ** attr) { DOMAIN_GRP_MEMBER *mem_grp = NULL; DOMAIN_GRP *grp = NULL; @@ -1036,55 +1057,56 @@ uint32 _samr_query_groupmem(const POLICY_HND *group_pol, uint32 group_rid; fstring group_sid_str; - DEBUG(5,("samr_query_groupmem: %d\n", __LINE__)); + DEBUG(5, ("samr_query_groupmem: %d\n", __LINE__)); (*rid) = NULL; (*attr) = NULL; (*num_mem) = 0; /* find the policy handle. open a policy on it. */ - if (!get_policy_samr_sid(get_global_hnd_cache(), group_pol, &group_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), group_pol, &group_sid)) { return NT_STATUS_INVALID_HANDLE; } sid_to_string(group_sid_str, &group_sid); sid_split_rid(&group_sid, &group_rid); - DEBUG(10,("sid is %s\n", group_sid_str)); + DEBUG(10, ("sid is %s\n", group_sid_str)); if (!sid_equal(&group_sid, &global_sam_sid)) { return NT_STATUS_NO_SUCH_GROUP; } - DEBUG(10,("lookup on Domain SID\n")); + DEBUG(10, ("lookup on Domain SID\n")); become_root(True); grp = getgrouprid(group_rid, &mem_grp, &num_rids); unbecome_root(True); - if (grp == NULL) - { - return NT_STATUS_NO_SUCH_GROUP; - } + if (grp == NULL) + { + return NT_STATUS_NO_SUCH_GROUP; + } if (num_rids > 0) { - (*rid) = malloc(num_rids * sizeof(uint32)); + (*rid) = malloc(num_rids * sizeof(uint32)); (*attr) = malloc(num_rids * sizeof(uint32)); if (mem_grp != NULL && (*rid) != NULL && (*attr) != NULL) { int i; for (i = 0; i < num_rids; i++) { - (*rid) [i] = mem_grp[i].rid; + (*rid)[i] = mem_grp[i].rid; (*attr)[i] = mem_grp[i].attr; } } } safe_free(mem_grp); - + (*num_mem) = num_rids; return NT_STATUS_NOPROBLEMO; @@ -1093,9 +1115,8 @@ uint32 _samr_query_groupmem(const POLICY_HND *group_pol, /******************************************************************* samr_set_groupinfo ********************************************************************/ -uint32 _samr_set_groupinfo(const POLICY_HND *pol, - uint16 switch_level, - const GROUP_INFO_CTR* ctr) +uint32 _samr_set_groupinfo(const POLICY_HND * pol, + uint16 switch_level, const GROUP_INFO_CTR * ctr) { return NT_STATUS_ACCESS_DENIED; } @@ -1103,9 +1124,8 @@ uint32 _samr_set_groupinfo(const POLICY_HND *pol, /******************************************************************* samr_reply_query_groupinfo ********************************************************************/ -uint32 _samr_query_groupinfo(const POLICY_HND *pol, - uint16 switch_level, - GROUP_INFO_CTR* ctr) +uint32 _samr_query_groupinfo(const POLICY_HND * pol, + uint16 switch_level, GROUP_INFO_CTR * ctr) { /* find the policy handle. open a policy on it. */ if ((find_policy_by_hnd(get_global_hnd_cache(), pol) == -1)) @@ -1119,15 +1139,15 @@ uint32 _samr_query_groupinfo(const POLICY_HND *pol, { ctr->switch_value1 = 1; make_samr_group_info1(&ctr->group.info1, - "fake account name", - "fake account description", 2); + "fake account name", + "fake account description", 2); break; } case 4: { ctr->switch_value1 = 4; make_samr_group_info4(&ctr->group.info4, - "fake account description"); + "fake account description"); break; } default: @@ -1143,9 +1163,8 @@ uint32 _samr_query_groupinfo(const POLICY_HND *pol, /******************************************************************* samr_reply_query_aliasinfo ********************************************************************/ -uint32 _samr_query_aliasinfo(const POLICY_HND *alias_pol, - uint16 switch_level, - ALIAS_INFO_CTR *ctr) +uint32 _samr_query_aliasinfo(const POLICY_HND * alias_pol, + uint16 switch_level, ALIAS_INFO_CTR * ctr) { /* find the policy handle. open a policy on it. */ if ((find_policy_by_hnd(get_global_hnd_cache(), alias_pol) == -1)) @@ -1159,7 +1178,7 @@ uint32 _samr_query_aliasinfo(const POLICY_HND *alias_pol, { ctr->switch_value1 = 3; make_samr_alias_info3(&ctr->alias.info3, - "<fake account description>"); + "<fake account description>"); break; } default: @@ -1175,9 +1194,9 @@ uint32 _samr_query_aliasinfo(const POLICY_HND *alias_pol, /******************************************************************* samr_reply_query_useraliases ********************************************************************/ -uint32 _samr_query_useraliases(const POLICY_HND *pol, - const uint32 *ptr_sid, const DOM_SID2 *sid, - uint32 *num_aliases, uint32 **rid) +uint32 _samr_query_useraliases(const POLICY_HND * pol, + const uint32 * ptr_sid, const DOM_SID2 * sid, + uint32 * num_aliases, uint32 ** rid) { LOCAL_GRP *mem_grp = NULL; int num_rids = 0; @@ -1189,7 +1208,7 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol, fstring dom_sid_str; fstring usr_sid_str; - DEBUG(5,("samr_query_useraliases: %d\n", __LINE__)); + DEBUG(5, ("samr_query_useraliases: %d\n", __LINE__)); (*rid) = NULL; (*num_aliases) = 0; @@ -1199,7 +1218,7 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol, { return NT_STATUS_INVALID_HANDLE; } - sid_to_string(dom_sid_str, &dom_sid ); + sid_to_string(dom_sid_str, &dom_sid); sid_to_string(sam_sid_str, &global_sam_sid); usr_sid = sid[0].sid; @@ -1216,16 +1235,16 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol, return NT_STATUS_NO_SUCH_USER; } - DEBUG(10,("sid is %s\n", dom_sid_str)); + DEBUG(10, ("sid is %s\n", dom_sid_str)); if (sid_equal(&dom_sid, global_sid_builtin)) { BOOL ret; - DEBUG(10,("lookup on S-1-5-20\n")); + DEBUG(10, ("lookup on S-1-5-20\n")); become_root(True); ret = getuserbuiltinntnam(sam_pass->nt_name, &mem_grp, - &num_rids); + &num_rids); unbecome_root(True); if (!ret) @@ -1236,11 +1255,11 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol, else if (sid_equal(&dom_sid, &usr_sid)) { BOOL ret; - DEBUG(10,("lookup on Domain SID\n")); + DEBUG(10, ("lookup on Domain SID\n")); become_root(True); ret = getuseraliasntnam(sam_pass->nt_name, &mem_grp, - &num_rids); + &num_rids); unbecome_root(True); if (!ret) @@ -1250,7 +1269,7 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol, } else { - return NT_STATUS_NO_SUCH_USER; /* no user (in domain) */ + return NT_STATUS_NO_SUCH_USER; /* no user (in domain) */ } if (num_rids > 0) @@ -1275,31 +1294,32 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol, /******************************************************************* samr_reply_delete_dom_alias ********************************************************************/ -uint32 _samr_delete_dom_alias(POLICY_HND *alias_pol) +uint32 _samr_delete_dom_alias(POLICY_HND * alias_pol) { DOM_SID alias_sid; uint32 alias_rid; fstring alias_sid_str; - DEBUG(5,("samr_delete_dom_alias: %d\n", __LINE__)); + DEBUG(5, ("samr_delete_dom_alias: %d\n", __LINE__)); /* find the policy handle. open a policy on it. */ - if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), alias_pol, &alias_sid)) { return NT_STATUS_INVALID_HANDLE; } - sid_to_string(alias_sid_str, &alias_sid ); + sid_to_string(alias_sid_str, &alias_sid); sid_split_rid(&alias_sid, &alias_rid); - DEBUG(10,("sid is %s\n", alias_sid_str)); + DEBUG(10, ("sid is %s\n", alias_sid_str)); if (!sid_equal(&alias_sid, &global_sam_sid)) { return NT_STATUS_NO_SUCH_ALIAS; } - DEBUG(10,("lookup on Domain SID\n")); + DEBUG(10, ("lookup on Domain SID\n")); if (!del_alias_entry(alias_rid)) { @@ -1313,8 +1333,8 @@ uint32 _samr_delete_dom_alias(POLICY_HND *alias_pol) /******************************************************************* samr_reply_query_aliasmem ********************************************************************/ -uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol, - uint32 *num_mem, DOM_SID2 **sid) +uint32 _samr_query_aliasmem(const POLICY_HND * alias_pol, + uint32 * num_mem, DOM_SID2 ** sid) { LOCAL_GRP_MEMBER *mem_grp = NULL; LOCAL_GRP *grp = NULL; @@ -1323,24 +1343,25 @@ uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol, uint32 alias_rid; fstring alias_sid_str; - DEBUG(5,("samr_query_aliasmem: %d\n", __LINE__)); + DEBUG(5, ("samr_query_aliasmem: %d\n", __LINE__)); (*sid) = NULL; (*num_mem) = 0; /* find the policy handle. open a policy on it. */ - if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), alias_pol, &alias_sid)) { return NT_STATUS_INVALID_HANDLE; } - sid_to_string(alias_sid_str, &alias_sid ); + sid_to_string(alias_sid_str, &alias_sid); sid_split_rid(&alias_sid, &alias_rid); - DEBUG(10,("sid is %s\n", alias_sid_str)); + DEBUG(10, ("sid is %s\n", alias_sid_str)); if (sid_equal(&alias_sid, global_sid_builtin)) { - DEBUG(10,("lookup on S-1-5-20\n")); + DEBUG(10, ("lookup on S-1-5-20\n")); become_root(True); grp = getbuiltinrid(alias_rid, &mem_grp, &num_sids); @@ -1348,7 +1369,7 @@ uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol, } else if (sid_equal(&alias_sid, &global_sam_sid)) { - DEBUG(10,("lookup on Domain SID\n")); + DEBUG(10, ("lookup on Domain SID\n")); become_root(True); grp = getaliasrid(alias_rid, &mem_grp, &num_sids); @@ -1390,17 +1411,14 @@ uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol, /******************************************************************* samr_reply_lookup_names ********************************************************************/ -uint32 _samr_lookup_names(const POLICY_HND *pol, - - uint32 num_names1, - uint32 flags, - uint32 ptr, - const UNISTR2 *uni_name, - - uint32 *num_rids1, - uint32 rid[MAX_SAM_ENTRIES], - uint32 *num_types1, - uint32 type[MAX_SAM_ENTRIES]) +uint32 _samr_lookup_names(const POLICY_HND * pol, + uint32 num_names1, + uint32 flags, + uint32 ptr, + const UNISTR2 * uni_name, + uint32 * num_rids1, + uint32 rid[MAX_SAM_ENTRIES], + uint32 * num_types1, uint32 type[MAX_SAM_ENTRIES]) { int i; int num_rids = num_names1; @@ -1408,7 +1426,7 @@ uint32 _samr_lookup_names(const POLICY_HND *pol, fstring tmp; BOOL found_one = False; - DEBUG(5,("samr_lookup_names: %d\n", __LINE__)); + DEBUG(5, ("samr_lookup_names: %d\n", __LINE__)); if (!get_policy_samr_sid(get_global_hnd_cache(), pol, &pol_sid)) { @@ -1416,12 +1434,14 @@ uint32 _samr_lookup_names(const POLICY_HND *pol, } sid_to_string(tmp, &pol_sid); - DEBUG(5,("pol_sid: %s\n", tmp)); + DEBUG(5, ("pol_sid: %s\n", tmp)); if (num_rids > MAX_SAM_ENTRIES) { num_rids = MAX_SAM_ENTRIES; - DEBUG(5,("samr_lookup_names: truncating entries to %d\n", num_rids)); + DEBUG(5, + ("samr_lookup_names: truncating entries to %d\n", + num_rids)); } for (i = 0; i < num_rids; i++) @@ -1429,7 +1449,7 @@ uint32 _samr_lookup_names(const POLICY_HND *pol, DOM_SID sid; fstring name; uint32 status1; - unistr2_to_ascii(name, &uni_name[i], sizeof(name)-1); + unistr2_to_ascii(name, &uni_name[i], sizeof(name) - 1); status1 = lookup_name(name, &sid, &(type[i])); if (status1 == 0x0) @@ -1439,13 +1459,13 @@ uint32 _samr_lookup_names(const POLICY_HND *pol, } if ((status1 != 0x0) || !sid_equal(&pol_sid, &sid)) { - rid [i] = 0xffffffff; + rid[i] = 0xffffffff; type[i] = SID_NAME_UNKNOWN; } sid_to_string(tmp, &sid); - DEBUG(10,("name: %s sid: %s rid: %x type: %d\n", - name, tmp, rid[i], type[i])); + DEBUG(10, ("name: %s sid: %s rid: %x type: %d\n", + name, tmp, rid[i], type[i])); } if (!found_one) @@ -1462,24 +1482,23 @@ uint32 _samr_lookup_names(const POLICY_HND *pol, /******************************************************************* samr_reply_chgpasswd_user ********************************************************************/ -uint32 _samr_chgpasswd_user( const UNISTR2 *uni_dest_host, - const UNISTR2 *uni_user_name, - const char nt_newpass[516], - const uchar nt_oldhash[16], - const char lm_newpass[516], - const uchar lm_oldhash[16]) +uint32 _samr_chgpasswd_user(const UNISTR2 * uni_dest_host, + const UNISTR2 * uni_user_name, + const char nt_newpass[516], + const uchar nt_oldhash[16], + const char lm_newpass[516], + const uchar lm_oldhash[16]) { fstring user_name; fstring wks; - unistr2_to_ascii(user_name, uni_user_name, sizeof(user_name)-1); - unistr2_to_ascii(wks, uni_dest_host, sizeof(wks)-1); + unistr2_to_ascii(user_name, uni_user_name, sizeof(user_name) - 1); + unistr2_to_ascii(wks, uni_dest_host, sizeof(wks) - 1); - DEBUG(5,("samr_chgpasswd_user: user: %s wks: %s\n", user_name, wks)); + DEBUG(5, ("samr_chgpasswd_user: user: %s wks: %s\n", user_name, wks)); if (!pass_oem_change(user_name, - lm_newpass, lm_oldhash, - nt_newpass, nt_oldhash)) + lm_newpass, lm_oldhash, nt_newpass, nt_oldhash)) { return NT_STATUS_WRONG_PASSWORD; } @@ -1491,8 +1510,8 @@ uint32 _samr_chgpasswd_user( const UNISTR2 *uni_dest_host, /******************************************************************* samr_reply_get_dom_pwinfo ********************************************************************/ -uint32 _samr_get_dom_pwinfo(const UNISTR2 *uni_srv_name, - uint16 *unk_0, uint16 *unk_1, uint16 *unk_2) +uint32 _samr_get_dom_pwinfo(const UNISTR2 * uni_srv_name, + uint16 * unk_0, uint16 * unk_1, uint16 * unk_2) { /* absolutely no idea what to do, here */ *unk_0 = 0; @@ -1505,23 +1524,27 @@ uint32 _samr_get_dom_pwinfo(const UNISTR2 *uni_srv_name, /******************************************************************* makes a SAMR_R_LOOKUP_RIDS structure. ********************************************************************/ -static BOOL make_samr_lookup_rids( uint32 num_names, char *const *name, - UNIHDR **hdr_name, UNISTR2** uni_name) +static BOOL make_samr_lookup_rids(uint32 num_names, char *const *name, + UNIHDR ** hdr_name, UNISTR2 ** uni_name) { uint32 i; - if (name == NULL) return False; + if (name == NULL) + return False; *uni_name = NULL; *hdr_name = NULL; if (num_names != 0) { - (*hdr_name) = (UNIHDR*)malloc(num_names * sizeof((*hdr_name)[0])); + (*hdr_name) = (UNIHDR *) malloc(num_names * sizeof((*hdr_name)[0])); if ((*hdr_name) == NULL) { return False; } - (*uni_name) = (UNISTR2*)malloc(num_names * sizeof((*uni_name)[0])); + + (*uni_name) = + (UNISTR2 *) malloc(num_names * + sizeof((*uni_name)[0])); if ((*uni_name) == NULL) { free(*uni_name); @@ -1533,7 +1556,7 @@ static BOOL make_samr_lookup_rids( uint32 num_names, char *const *name, for (i = 0; i < num_names; i++) { int len = name[i] != NULL ? strlen(name[i]) : 0; - DEBUG(10,("name[%d]:%s\n", i, name[i])); + DEBUG(10, ("name[%d]:%s\n", i, name[i])); make_uni_hdr(&((*hdr_name)[i]), len); make_unistr2(&((*uni_name)[i]), name[i], len); } @@ -1544,19 +1567,19 @@ static BOOL make_samr_lookup_rids( uint32 num_names, char *const *name, /******************************************************************* samr_reply_lookup_rids ********************************************************************/ -uint32 _samr_lookup_rids(const POLICY_HND *pol, - uint32 num_rids, uint32 flags, - const uint32 *rids, - uint32 *num_names, - UNIHDR **hdr_name, UNISTR2** uni_name, - uint32 **types) +uint32 _samr_lookup_rids(const POLICY_HND * pol, + uint32 num_rids, uint32 flags, + const uint32 * rids, + uint32 * num_names, + UNIHDR ** hdr_name, UNISTR2 ** uni_name, + uint32 ** types) { char **grp_names = NULL; DOM_SID pol_sid; BOOL found_one = False; - int i; + int i; - DEBUG(5,("samr_lookup_rids: %d\n", __LINE__)); + DEBUG(5, ("samr_lookup_rids: %d\n", __LINE__)); /* find the policy handle. open a policy on it. */ if (find_policy_by_hnd(get_global_hnd_cache(), pol) == -1) @@ -1623,9 +1646,9 @@ uint32 _samr_lookup_rids(const POLICY_HND *pol, /******************************************************************* samr_reply_open_user ********************************************************************/ -uint32 _samr_open_user(const POLICY_HND *domain_pol, - uint32 access_mask, uint32 user_rid, - POLICY_HND *user_pol) +uint32 _samr_open_user(const POLICY_HND * domain_pol, + uint32 access_mask, uint32 user_rid, + POLICY_HND * user_pol) { struct sam_passwd *sam_pass; DOM_SID sid; @@ -1657,14 +1680,14 @@ uint32 _samr_open_user(const POLICY_HND *domain_pol, } return samr_open_by_sid(domain_pol, &sid, user_pol, - access_mask, user_rid); + access_mask, user_rid); } /************************************************************************* get_user_info_10 *************************************************************************/ -static BOOL get_user_info_10(SAM_USER_INFO_10 *id10, uint32 user_rid) +static BOOL get_user_info_10(SAM_USER_INFO_10 * id10, uint32 user_rid) { struct sam_passwd *sam_pass; @@ -1674,13 +1697,13 @@ static BOOL get_user_info_10(SAM_USER_INFO_10 *id10, uint32 user_rid) if (sam_pass == NULL) { - DEBUG(4,("User 0x%x not found\n", user_rid)); + DEBUG(4, ("User 0x%x not found\n", user_rid)); return False; } - DEBUG(3,("User:[%s]\n", sam_pass->nt_name)); + DEBUG(3, ("User:[%s]\n", sam_pass->nt_name)); - make_sam_user_info10(id10, sam_pass->acct_ctrl); + make_sam_user_info10(id10, sam_pass->acct_ctrl); return True; } @@ -1688,7 +1711,7 @@ static BOOL get_user_info_10(SAM_USER_INFO_10 *id10, uint32 user_rid) /************************************************************************* get_user_info_21 *************************************************************************/ -static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid) +static BOOL get_user_info_12(SAM_USER_INFO_12 * id12, uint32 user_rid) { struct sam_passwd *sam_pass; @@ -1698,11 +1721,11 @@ static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid) if (sam_pass == NULL) { - DEBUG(4,("User 0x%x not found\n", user_rid)); + DEBUG(4, ("User 0x%x not found\n", user_rid)); return False; } - DEBUG(3,("User:[%s] %x\n", sam_pass->nt_name, sam_pass->acct_ctrl)); + DEBUG(3, ("User:[%s] %x\n", sam_pass->nt_name, sam_pass->acct_ctrl)); if (IS_BITS_SET_ALL(sam_pass->acct_ctrl, ACB_DISABLED)) { @@ -1710,7 +1733,7 @@ static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid) } make_sam_user_info12(id12, sam_pass->smb_passwd, - sam_pass->smb_nt_passwd); + sam_pass->smb_nt_passwd); return True; } @@ -1718,7 +1741,7 @@ static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid) /************************************************************************* get_user_info_21 *************************************************************************/ -static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid) +static BOOL get_user_info_21(SAM_USER_INFO_21 * id21, uint32 user_rid) { struct sam_passwd *sam_pass; LOGON_HRS hrs; @@ -1730,11 +1753,11 @@ static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid) if (sam_pass == NULL) { - DEBUG(4,("User 0x%x not found\n", user_rid)); + DEBUG(4, ("User 0x%x not found\n", user_rid)); return False; } - DEBUG(3,("User:[%s]\n", sam_pass->nt_name)); + DEBUG(3, ("User:[%s]\n", sam_pass->nt_name)); /* create a LOGON_HRS structure */ hrs.len = sam_pass->hours_len; @@ -1744,35 +1767,22 @@ static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid) hrs.hours[i] = sam_pass->hours[i]; } - make_sam_user_info21A(id21, - - &sam_pass->logon_time, - &sam_pass->logoff_time, - &sam_pass->kickoff_time, - &sam_pass->pass_last_set_time, - &sam_pass->pass_can_change_time, - &sam_pass->pass_must_change_time, - - sam_pass->nt_name, /* user_name */ - sam_pass->full_name, /* full_name */ - sam_pass->home_dir, /* home_dir */ - sam_pass->dir_drive, /* dir_drive */ - sam_pass->logon_script, /* logon_script */ - sam_pass->profile_path, /* profile_path */ - sam_pass->acct_desc, /* description */ - sam_pass->workstations, /* workstations user can log in from */ - sam_pass->unknown_str, /* don't know, yet */ - sam_pass->munged_dial, /* dialin info. contains dialin path and tel no */ - - sam_pass->user_rid, /* RID user_id */ - sam_pass->group_rid, /* RID group_id */ - sam_pass->acct_ctrl, - - sam_pass->unknown_3, /* unknown_3 */ - sam_pass->logon_divs, /* divisions per week */ - &hrs, /* logon hours */ - sam_pass->unknown_5, - sam_pass->unknown_6); + make_sam_user_info21A(id21, &sam_pass->logon_time, &sam_pass->logoff_time, &sam_pass->kickoff_time, &sam_pass->pass_last_set_time, &sam_pass->pass_can_change_time, &sam_pass->pass_must_change_time, sam_pass->nt_name, /* user_name */ + sam_pass->full_name, /* full_name */ + sam_pass->home_dir, /* home_dir */ + sam_pass->dir_drive, /* dir_drive */ + sam_pass->logon_script, /* logon_script */ + sam_pass->profile_path, /* profile_path */ + sam_pass->acct_desc, /* description */ + sam_pass->workstations, /* workstations user can log in from */ + sam_pass->unknown_str, /* don't know, yet */ + sam_pass->munged_dial, /* dialin info. contains dialin path and tel no */ + sam_pass->user_rid, /* RID user_id */ + sam_pass->group_rid, /* RID group_id */ + sam_pass->acct_ctrl, sam_pass->unknown_3, /* unknown_3 */ + sam_pass->logon_divs, /* divisions per week */ + &hrs, /* logon hours */ + sam_pass->unknown_5, sam_pass->unknown_6); return True; } @@ -1780,8 +1790,8 @@ static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid) /******************************************************************* samr_reply_query_userinfo ********************************************************************/ -uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value, - SAM_USERINFO_CTR *ctr) +uint32 _samr_query_userinfo(const POLICY_HND * pol, uint16 switch_value, + SAM_USERINFO_CTR * ctr) { uint32 rid = 0x0; DOM_SID group_sid; @@ -1793,7 +1803,7 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value, } sid_split_rid(&group_sid, &rid); - DEBUG(5,("samr_reply_query_userinfo: rid:0x%x\n", rid)); + DEBUG(5, ("samr_reply_query_userinfo: rid:0x%x\n", rid)); /* ok! user info levels (lots: see MSDEV help), off we go... */ ctr->switch_value = switch_value; @@ -1801,8 +1811,11 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value, { case 0x10: { - ctr->info.id = (SAM_USER_INFO_10*)Realloc(NULL, - sizeof(*ctr->info.id10)); + ctr->info.id = (SAM_USER_INFO_10 *) Realloc(NULL, + sizeof + (*ctr-> + info. + id10)); if (ctr->info.id == NULL) { return NT_STATUS_NO_MEMORY; @@ -1818,26 +1831,32 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value, case 0x11: { NTTIME expire; - info = (void*)&id11; - - expire.low = 0xffffffff; + info = (void *)&id11; + + expire.low = 0xffffffff; expire.high = 0x7fffffff; - ctr->info.id = (SAM_USER_INFO_11*)Realloc(NULL, - sizeof(*ctr->info.id11)); + ctr->info.id = (SAM_USER_INFO_11 *) Realloc(NULL, + sizeof + (*ctr-> + info. + id11)); make_sam_user_info11(ctr->info.id11, &expire, - "BROOKFIELDS$", /* name */ - 0x03ef, /* user rid */ - 0x201, /* group rid */ - 0x0080); /* acb info */ + "BROOKFIELDS$", /* name */ + 0x03ef, /* user rid */ + 0x201, /* group rid */ + 0x0080); /* acb info */ break; } #endif case 0x12: { - ctr->info.id = (SAM_USER_INFO_12*)Realloc(NULL, - sizeof(*ctr->info.id12)); + ctr->info.id = (SAM_USER_INFO_12 *) Realloc(NULL, + sizeof + (*ctr-> + info. + id12)); if (ctr->info.id == NULL) { return NT_STATUS_NO_MEMORY; @@ -1850,8 +1869,11 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value, } case 21: { - ctr->info.id = (SAM_USER_INFO_21*)Realloc(NULL, - sizeof(*ctr->info.id21)); + ctr->info.id = (SAM_USER_INFO_21 *) Realloc(NULL, + sizeof + (*ctr-> + info. + id21)); if (ctr->info.id == NULL) { return NT_STATUS_NO_MEMORY; @@ -1875,7 +1897,7 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value, /******************************************************************* set_user_info_12 ********************************************************************/ -static BOOL set_user_info_12(const SAM_USER_INFO_12 *id12, uint32 rid) +static BOOL set_user_info_12(const SAM_USER_INFO_12 * id12, uint32 rid) { struct sam_passwd *pwd = getsam21pwrid(rid); struct sam_passwd new_pwd; @@ -1898,7 +1920,7 @@ static BOOL set_user_info_12(const SAM_USER_INFO_12 *id12, uint32 rid) memcpy(nt_hash, id12->nt_pwd, sizeof(nt_hash)); memcpy(lm_hash, id12->lm_pwd, sizeof(lm_hash)); - new_pwd.smb_passwd = lm_hash; + new_pwd.smb_passwd = lm_hash; new_pwd.smb_nt_passwd = nt_hash; return mod_sam21pwd_entry(&new_pwd, True); @@ -1907,7 +1929,7 @@ static BOOL set_user_info_12(const SAM_USER_INFO_12 *id12, uint32 rid) /******************************************************************* set_user_info_24 ********************************************************************/ -static BOOL set_user_info_24(const SAM_USER_INFO_24 *id24, uint32 rid) +static BOOL set_user_info_24(const SAM_USER_INFO_24 * id24, uint32 rid) { struct sam_passwd *pwd = getsam21pwrid(rid); struct sam_passwd new_pwd; @@ -1934,7 +1956,7 @@ static BOOL set_user_info_24(const SAM_USER_INFO_24 *id24, uint32 rid) nt_lm_owf_genW(&new_pw, nt_hash, lm_hash); - new_pwd.smb_passwd = lm_hash; + new_pwd.smb_passwd = lm_hash; new_pwd.smb_nt_passwd = nt_hash; return mod_sam21pwd_entry(&new_pwd, True); @@ -1943,7 +1965,7 @@ static BOOL set_user_info_24(const SAM_USER_INFO_24 *id24, uint32 rid) /******************************************************************* set_user_info_23 ********************************************************************/ -static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid) +static BOOL set_user_info_23(const SAM_USER_INFO_23 * id23, uint32 rid) { struct sam_passwd *pwd = getsam21pwrid(rid); struct sam_passwd new_pwd; @@ -1966,7 +1988,7 @@ static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid) copy_sam_passwd(&new_pwd, pwd); copy_id23_to_sam_passwd(&new_pwd, id23); - if (!decode_pw_buffer(id23->pass, (char*)new_pw.buffer, 256, &len)) + if (!decode_pw_buffer(id23->pass, (char *)new_pw.buffer, 256, &len)) { return False; } @@ -1976,7 +1998,7 @@ static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid) nt_lm_owf_genW(&new_pw, nt_hash, lm_hash); - new_pwd.smb_passwd = lm_hash; + new_pwd.smb_passwd = lm_hash; new_pwd.smb_nt_passwd = nt_hash; return mod_sam21pwd_entry(&new_pwd, True); @@ -1985,14 +2007,14 @@ static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid) /******************************************************************* samr_reply_set_userinfo ********************************************************************/ -uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value, - SAM_USERINFO_CTR *ctr) +uint32 _samr_set_userinfo(const POLICY_HND * pol, uint16 switch_value, + SAM_USERINFO_CTR * ctr) { uchar user_sess_key[16]; uint32 rid = 0x0; DOM_SID sid; - DEBUG(5,("samr_reply_set_userinfo: %d\n", __LINE__)); + DEBUG(5, ("samr_reply_set_userinfo: %d\n", __LINE__)); /* search for the handle */ if (find_policy_by_hnd(get_global_hnd_cache(), pol) == -1) @@ -2013,11 +2035,11 @@ uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value, sid_split_rid(&sid, &rid); - DEBUG(5,("samr_reply_set_userinfo: rid:0x%x\n", rid)); + DEBUG(5, ("samr_reply_set_userinfo: rid:0x%x\n", rid)); if (ctr == NULL) { - DEBUG(5,("samr_reply_set_userinfo: NULL info level\n")); + DEBUG(5, ("samr_reply_set_userinfo: NULL info level\n")); return NT_STATUS_INVALID_INFO_CLASS; } @@ -2049,7 +2071,8 @@ uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value, { SAM_USER_INFO_23 *id23 = ctr->info.id23; SamOEMhash(id23->pass, user_sess_key, 1); - dump_data_pw("pass buff:\n", id23->pass, sizeof(id23->pass)); + dump_data_pw("pass buff:\n", id23->pass, + sizeof(id23->pass)); dbgflush(); if (!set_user_info_23(id23, rid)) @@ -2071,7 +2094,7 @@ uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value, /******************************************************************* set_user_info_10 ********************************************************************/ -static BOOL set_user_info_10(const SAM_USER_INFO_10 *id10, uint32 rid) +static BOOL set_user_info_10(const SAM_USER_INFO_10 * id10, uint32 rid) { struct sam_passwd *pwd = getsam21pwrid(rid); struct sam_passwd new_pwd; @@ -2096,13 +2119,13 @@ static BOOL set_user_info_10(const SAM_USER_INFO_10 *id10, uint32 rid) /******************************************************************* samr_reply_set_userinfo2 ********************************************************************/ -uint32 _samr_set_userinfo2(const POLICY_HND *pol, uint16 switch_value, - SAM_USERINFO_CTR *ctr) +uint32 _samr_set_userinfo2(const POLICY_HND * pol, uint16 switch_value, + SAM_USERINFO_CTR * ctr) { DOM_SID sid; uint32 rid = 0x0; - DEBUG(5,("samr_reply_set_userinfo2: %d\n", __LINE__)); + DEBUG(5, ("samr_reply_set_userinfo2: %d\n", __LINE__)); /* find the policy handle. open a policy on it. */ if (!get_policy_samr_sid(get_global_hnd_cache(), pol, &sid)) @@ -2112,11 +2135,11 @@ uint32 _samr_set_userinfo2(const POLICY_HND *pol, uint16 switch_value, sid_split_rid(&sid, &rid); - DEBUG(5,("samr_reply_set_userinfo2: rid:0x%x\n", rid)); + DEBUG(5, ("samr_reply_set_userinfo2: rid:0x%x\n", rid)); if (ctr == NULL) { - DEBUG(5,("samr_reply_set_userinfo2: NULL info level\n")); + DEBUG(5, ("samr_reply_set_userinfo2: NULL info level\n")); return NT_STATUS_INVALID_INFO_CLASS; } @@ -2148,9 +2171,8 @@ uint32 _samr_set_userinfo2(const POLICY_HND *pol, uint16 switch_value, /******************************************************************* samr_reply_query_usergroups ********************************************************************/ -uint32 _samr_query_usergroups(const POLICY_HND *pol, - uint32 *num_groups, - DOM_GID **gids) +uint32 _samr_query_usergroups(const POLICY_HND * pol, + uint32 * num_groups, DOM_GID ** gids) { DOMAIN_GRP *mem_grp = NULL; struct sam_passwd *sam_pass; @@ -2158,7 +2180,7 @@ uint32 _samr_query_usergroups(const POLICY_HND *pol, uint32 rid; BOOL ret; - DEBUG(5,("samr_query_usergroups: %d\n", __LINE__)); + DEBUG(5, ("samr_query_usergroups: %d\n", __LINE__)); /* find the policy handle. open a policy on it. */ if (!get_policy_samr_sid(get_global_hnd_cache(), pol, &sid)) @@ -2200,10 +2222,10 @@ uint32 _samr_query_usergroups(const POLICY_HND *pol, /******************************************************************* _samr_create_dom_alias ********************************************************************/ -uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol, - const UNISTR2 *uni_acct_name, - uint32 access_mask, - POLICY_HND *alias_pol, uint32 *rid) +uint32 _samr_create_dom_alias(const POLICY_HND * domain_pol, + const UNISTR2 * uni_acct_name, + uint32 access_mask, + POLICY_HND * alias_pol, uint32 * rid) { uint32 status; DOM_SID dom_sid; @@ -2218,7 +2240,8 @@ uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol, } /* find the domain sid */ - if (!get_policy_samr_sid(get_global_hnd_cache(), domain_pol, &dom_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), domain_pol, &dom_sid)) { return NT_STATUS_OBJECT_TYPE_MISMATCH; } @@ -2228,13 +2251,13 @@ uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol, return NT_STATUS_ACCESS_DENIED; } - unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name)-1); + unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name) - 1); fstrcpy(grp.comment, ""); *rid = grp.rid = 0xffffffff; *rid = grp.rid; status = samr_open_by_sid(domain_pol, &dom_sid, alias_pol, - access_mask, grp.rid); + access_mask, grp.rid); if (status != 0x0) { @@ -2252,10 +2275,10 @@ uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol, /******************************************************************* _samr_create_dom_group ********************************************************************/ -uint32 _samr_create_dom_group(const POLICY_HND *domain_pol, - const UNISTR2 *uni_acct_name, - uint32 access_mask, - POLICY_HND *group_pol, uint32 *rid) +uint32 _samr_create_dom_group(const POLICY_HND * domain_pol, + const UNISTR2 * uni_acct_name, + uint32 access_mask, + POLICY_HND * group_pol, uint32 * rid) { uint32 status; DOM_SID dom_sid; @@ -2270,7 +2293,8 @@ uint32 _samr_create_dom_group(const POLICY_HND *domain_pol, } /* find the domain sid */ - if (!get_policy_samr_sid(get_global_hnd_cache(), domain_pol, &dom_sid)) + if (!get_policy_samr_sid + (get_global_hnd_cache(), domain_pol, &dom_sid)) { return NT_STATUS_OBJECT_TYPE_MISMATCH; } @@ -2280,14 +2304,14 @@ uint32 _samr_create_dom_group(const POLICY_HND *domain_pol, return NT_STATUS_ACCESS_DENIED; } - unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name)-1); + unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name) - 1); fstrcpy(grp.comment, ""); *rid = grp.rid = 0xffffffff; grp.attr = 0x07; *rid = grp.rid; status = samr_open_by_sid(domain_pol, &dom_sid, group_pol, - access_mask, grp.rid); + access_mask, grp.rid); if (status != 0x0) { return status; @@ -2304,14 +2328,13 @@ uint32 _samr_create_dom_group(const POLICY_HND *domain_pol, /******************************************************************* _samr_query_dom_info ********************************************************************/ -uint32 _samr_query_dom_info(const POLICY_HND *domain_pol, - uint16 switch_value, - SAM_UNK_CTR *ctr) +uint32 _samr_query_dom_info(const POLICY_HND * domain_pol, + uint16 switch_value, SAM_UNK_CTR * ctr) { /* find the policy handle. open a policy on it. */ if (find_policy_by_hnd(get_global_hnd_cache(), domain_pol) == -1) { - DEBUG(5,("samr_reply_query_dom_info: invalid handle\n")); + DEBUG(5, ("samr_reply_query_dom_info: invalid handle\n")); return NT_STATUS_INVALID_HANDLE; } @@ -2341,7 +2364,8 @@ uint32 _samr_query_dom_info(const POLICY_HND *domain_pol, { extern fstring global_sam_name; extern pstring global_myname; - make_unk_info2(&(ctr->info.inf2), global_sam_name, global_myname); + make_unk_info2(&(ctr->info.inf2), global_sam_name, + global_myname); break; } case 0x01: @@ -2361,11 +2385,11 @@ uint32 _samr_query_dom_info(const POLICY_HND *domain_pol, /******************************************************************* _samr_create_user ********************************************************************/ -uint32 _samr_create_user(const POLICY_HND *domain_pol, - const UNISTR2 *uni_username, - uint16 acb_info, uint32 access_mask, - POLICY_HND *user_pol, - uint32 *unknown_0, uint32 *user_rid) +uint32 _samr_create_user(const POLICY_HND * domain_pol, + const UNISTR2 * uni_username, + uint16 acb_info, uint32 access_mask, + POLICY_HND * user_pol, + uint32 * unknown_0, uint32 * user_rid) { DOM_SID sid; @@ -2393,7 +2417,7 @@ uint32 _samr_create_user(const POLICY_HND *domain_pol, return NT_STATUS_ACCESS_DENIED; } - unistr2_to_ascii(user_name, uni_username, sizeof(user_name)-1); + unistr2_to_ascii(user_name, uni_username, sizeof(user_name) - 1); sam_pass = getsam21pwntnam(user_name); @@ -2404,12 +2428,11 @@ uint32 _samr_create_user(const POLICY_HND *domain_pol, } if (!local_password_change(user_name, True, - acb_info | ACB_DISABLED | ACB_PWNOTREQ, 0xffff, - NULL, - err_str, sizeof(err_str), - msg_str, sizeof(msg_str))) + acb_info | ACB_DISABLED | ACB_PWNOTREQ, + 0xffff, NULL, err_str, sizeof(err_str), + msg_str, sizeof(msg_str))) { - DEBUG(0,("%s\n", err_str)); + DEBUG(0, ("%s\n", err_str)); return NT_STATUS_ACCESS_DENIED; } @@ -2424,19 +2447,18 @@ uint32 _samr_create_user(const POLICY_HND *domain_pol, *user_rid = sam_pass->user_rid; return samr_open_by_sid(domain_pol, &sid, user_pol, - access_mask, *user_rid); + access_mask, *user_rid); } /******************************************************************* _samr_connect_anon ********************************************************************/ -uint32 _samr_connect_anon(const UNISTR2 *srv_name, uint32 access_mask, - POLICY_HND *connect_pol) - +uint32 _samr_connect_anon(const UNISTR2 * srv_name, uint32 access_mask, + POLICY_HND * connect_pol) { /* get a (unique) handle. open a policy on it. */ if (!open_policy_hnd(get_global_hnd_cache(), - get_sec_ctx(), connect_pol, access_mask)) + get_sec_ctx(), connect_pol, access_mask)) { return NT_STATUS_ACCESS_DENIED; } @@ -2450,12 +2472,12 @@ uint32 _samr_connect_anon(const UNISTR2 *srv_name, uint32 access_mask, /******************************************************************* _samr_connect ********************************************************************/ -uint32 _samr_connect(const UNISTR2 *srv_name, uint32 access_mask, - POLICY_HND *connect_pol) +uint32 _samr_connect(const UNISTR2 * srv_name, uint32 access_mask, + POLICY_HND * connect_pol) { /* get a (unique) handle. open a policy on it. */ if (!open_policy_hnd(get_global_hnd_cache(), - get_sec_ctx(), connect_pol, access_mask)) + get_sec_ctx(), connect_pol, access_mask)) { return NT_STATUS_ACCESS_DENIED; } @@ -2469,9 +2491,9 @@ uint32 _samr_connect(const UNISTR2 *srv_name, uint32 access_mask, /******************************************************************* _samr_open_alias ********************************************************************/ -uint32 _samr_open_alias(const POLICY_HND *domain_pol, - uint32 access_mask, uint32 alias_rid, - POLICY_HND *alias_pol) +uint32 _samr_open_alias(const POLICY_HND * domain_pol, + uint32 access_mask, uint32 alias_rid, + POLICY_HND * alias_pol) { DOM_SID sid; @@ -2488,15 +2510,15 @@ uint32 _samr_open_alias(const POLICY_HND *domain_pol, return NT_STATUS_ACCESS_DENIED; } - return samr_open_by_sid(domain_pol, &sid, alias_pol, access_mask, alias_rid); + return samr_open_by_sid(domain_pol, &sid, alias_pol, access_mask, + alias_rid); } /******************************************************************* _samr_open_group ********************************************************************/ -uint32 _samr_open_group(const POLICY_HND *domain_pol, uint32 access_mask, - uint32 group_rid, - POLICY_HND *group_pol) +uint32 _samr_open_group(const POLICY_HND * domain_pol, uint32 access_mask, + uint32 group_rid, POLICY_HND * group_pol) { DOM_SID sid; @@ -2512,15 +2534,15 @@ uint32 _samr_open_group(const POLICY_HND *domain_pol, uint32 access_mask, return NT_STATUS_ACCESS_DENIED; } - return samr_open_by_sid(domain_pol, &sid, group_pol, access_mask, group_rid); + return samr_open_by_sid(domain_pol, &sid, group_pol, access_mask, + group_rid); } /******************************************************************* _samr_lookup_domain ********************************************************************/ -uint32 _samr_lookup_domain(const POLICY_HND *connect_pol, - const UNISTR2 *uni_domain, - DOM_SID *dom_sid) +uint32 _samr_lookup_domain(const POLICY_HND * connect_pol, + const UNISTR2 * uni_domain, DOM_SID * dom_sid) { fstring domain; @@ -2550,10 +2572,9 @@ uint32 _samr_lookup_domain(const POLICY_HND *connect_pol, BOOL pwdbsam_initialise(void) { - return initialise_password_db() && + return initialise_password_db() && initialise_sam_password_db() && initialise_passgrp_db() && initialise_group_db() && - initialise_alias_db() && - initialise_builtin_db(); + initialise_alias_db() && initialise_builtin_db(); } |