summaryrefslogtreecommitdiffstats
path: root/source/samrd/srv_samr_passdb.c
diff options
context:
space:
mode:
Diffstat (limited to 'source/samrd/srv_samr_passdb.c')
-rw-r--r--source/samrd/srv_samr_passdb.c807
1 files changed, 414 insertions, 393 deletions
diff --git a/source/samrd/srv_samr_passdb.c b/source/samrd/srv_samr_passdb.c
index c855dba9b07..63d9077e965 100644
--- a/source/samrd/srv_samr_passdb.c
+++ b/source/samrd/srv_samr_passdb.c
@@ -33,25 +33,25 @@ extern int DEBUGLEVEL;
/****************************************************************************
set samr sid
****************************************************************************/
-static BOOL set_policy_samr_sid(struct policy_cache *cache, POLICY_HND *hnd,
- const DOM_SID *sid)
+static BOOL set_policy_samr_sid(struct policy_cache *cache, POLICY_HND * hnd,
+ const DOM_SID * sid)
{
pstring sidstr;
DOM_SID *dev = sid_dup(sid);
- DEBUG(3,("Setting policy sid=%s\n", sid_to_string(sidstr, sid)));
+ DEBUG(3, ("Setting policy sid=%s\n", sid_to_string(sidstr, sid)));
if (dev != NULL)
{
- if (set_policy_state(cache, hnd, NULL, (void*)dev))
+ if (set_policy_state(cache, hnd, NULL, (void *)dev))
{
- DEBUG(3,("Service setting policy sid=%s\n", sidstr));
+ DEBUG(3, ("Service setting policy sid=%s\n", sidstr));
return True;
}
free(dev);
return True;
}
- DEBUG(3,("Error setting policy sid\n"));
+ DEBUG(3, ("Error setting policy sid\n"));
return False;
}
@@ -59,19 +59,20 @@ static BOOL set_policy_samr_sid(struct policy_cache *cache, POLICY_HND *hnd,
get samr sid
****************************************************************************/
static BOOL get_policy_samr_sid(struct policy_cache *cache,
- const POLICY_HND *hnd, DOM_SID *sid)
+ const POLICY_HND * hnd, DOM_SID * sid)
{
- DOM_SID *dev = (DOM_SID*)get_policy_state_info(cache, hnd);
+ DOM_SID *dev = (DOM_SID *) get_policy_state_info(cache, hnd);
if (dev != NULL)
{
pstring tmp;
sid_copy(sid, dev);
- DEBUG(3,("Getting policy sid=%s\n", sid_to_string(tmp, sid)));
+ DEBUG(3,
+ ("Getting policy sid=%s\n", sid_to_string(tmp, sid)));
return True;
}
- DEBUG(3,("Error getting policy sid\n"));
+ DEBUG(3, ("Error getting policy sid\n"));
return False;
}
@@ -80,11 +81,10 @@ static BOOL get_policy_samr_sid(struct policy_cache *cache,
dynamically returns the correct user info..... JRA.
********************************************************************/
-static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf,
- int start_idx,
- int *total_entries, int *num_entries,
- int max_num_entries,
- uint16 acb_mask)
+static BOOL get_sampwd_entries(SAM_USER_INFO_21 * pw_buf,
+ int start_idx,
+ int *total_entries, int *num_entries,
+ int max_num_entries, uint16 acb_mask)
{
void *vp = NULL;
struct sam_passwd *pwd = NULL;
@@ -92,16 +92,19 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf,
(*num_entries) = 0;
(*total_entries) = 0;
- if (pw_buf == NULL) return False;
+ if (pw_buf == NULL)
+ return False;
vp = startsmbpwent(False);
if (!vp)
{
- DEBUG(0, ("get_sampwd_entries: Unable to open SMB password database.\n"));
+ DEBUG(0,
+ ("get_sampwd_entries: Unable to open SMB password database.\n"));
return False;
}
- while (((pwd = getsam21pwent(vp)) != NULL) && (*num_entries) < max_num_entries)
+ while (((pwd = getsam21pwent(vp)) != NULL)
+ && (*num_entries) < max_num_entries)
{
int user_name_len;
@@ -110,7 +113,8 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf,
/* skip the requested number of entries.
not very efficient, but hey...
*/
- if (acb_mask == 0 || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask))
+ if (acb_mask == 0
+ || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask))
{
start_idx--;
}
@@ -118,31 +122,35 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf,
}
user_name_len = strlen(pwd->nt_name);
- make_unistr2(&(pw_buf[(*num_entries)].uni_user_name), pwd->nt_name, user_name_len);
- make_uni_hdr(&(pw_buf[(*num_entries)].hdr_user_name), user_name_len);
+ make_unistr2(&(pw_buf[(*num_entries)].uni_user_name),
+ pwd->nt_name, user_name_len);
+ make_uni_hdr(&(pw_buf[(*num_entries)].hdr_user_name),
+ user_name_len);
pw_buf[(*num_entries)].user_rid = pwd->user_rid;
- bzero( pw_buf[(*num_entries)].nt_pwd , 16);
+ bzero(pw_buf[(*num_entries)].nt_pwd, 16);
/* Now check if the NT compatible password is available. */
if (pwd->smb_nt_passwd != NULL)
{
- memcpy( pw_buf[(*num_entries)].nt_pwd , pwd->smb_nt_passwd, 16);
+ memcpy(pw_buf[(*num_entries)].nt_pwd,
+ pwd->smb_nt_passwd, 16);
}
- pw_buf[(*num_entries)].acb_info = (uint16)pwd->acct_ctrl;
+ pw_buf[(*num_entries)].acb_info = (uint16) pwd->acct_ctrl;
DEBUG(5, ("entry idx: %d user %s, rid 0x%x, acb %x",
- (*num_entries), pwd->nt_name,
- pwd->user_rid, pwd->acct_ctrl));
+ (*num_entries), pwd->nt_name,
+ pwd->user_rid, pwd->acct_ctrl));
- if (acb_mask == 0 || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask))
+ if (acb_mask == 0
+ || IS_BITS_SET_SOME(pwd->acct_ctrl, acb_mask))
{
- DEBUG(5,(" acb_mask %x accepts\n", acb_mask));
+ DEBUG(5, (" acb_mask %x accepts\n", acb_mask));
(*num_entries)++;
}
else
{
- DEBUG(5,(" acb_mask %x rejects\n", acb_mask));
+ DEBUG(5, (" acb_mask %x rejects\n", acb_mask));
}
(*total_entries)++;
@@ -156,22 +164,21 @@ static BOOL get_sampwd_entries(SAM_USER_INFO_21 *pw_buf,
/*******************************************************************
opens a samr group by rid, returns a policy handle.
********************************************************************/
-static uint32 samr_open_by_sid( const POLICY_HND *parent_pol,
- const DOM_SID *dom_sid,
- POLICY_HND *pol,
- uint32 access_mask,
- uint32 rid)
+static uint32 samr_open_by_sid(const POLICY_HND * parent_pol,
+ const DOM_SID * dom_sid,
+ POLICY_HND * pol,
+ uint32 access_mask, uint32 rid)
{
DOM_SID sid;
-
+
/* get a (unique) handle. open a policy on it. */
if (!open_policy_hnd_link(get_global_hnd_cache(),
- parent_pol, pol, access_mask))
+ parent_pol, pol, access_mask))
{
return NT_STATUS_ACCESS_DENIED;
}
- DEBUG(0,("TODO: verify that the rid exists\n"));
+ DEBUG(0, ("TODO: verify that the rid exists\n"));
/* associate a SID with the (unique) handle. */
sid_copy(&sid, dom_sid);
@@ -191,7 +198,7 @@ static uint32 samr_open_by_sid( const POLICY_HND *parent_pol,
/*******************************************************************
_samr_close
********************************************************************/
-uint32 _samr_close(POLICY_HND *hnd)
+uint32 _samr_close(POLICY_HND * hnd)
{
/* close the policy handle */
if (close_policy_hnd(get_global_hnd_cache(), hnd))
@@ -204,18 +211,19 @@ uint32 _samr_close(POLICY_HND *hnd)
/*******************************************************************
samr_reply_unknown_2d
********************************************************************/
-uint32 _samr_unknown_2d(const POLICY_HND *domain_pol, const DOM_SID *sid)
+uint32 _samr_unknown_2d(const POLICY_HND * domain_pol, const DOM_SID * sid)
{
DOM_SID dom_sid;
/* associate the domain SID with the (unique) handle. */
- if (!get_policy_samr_sid(get_global_hnd_cache(), domain_pol, &dom_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), domain_pol, &dom_sid))
{
return NT_STATUS_ACCESS_DENIED;
}
- DEBUG(0,("_samr_unknown_2d: not implemented, returning OK\n"));
- DEBUG(5,("_samr_unknown_2d: %d\n", __LINE__));
+ DEBUG(0, ("_samr_unknown_2d: not implemented, returning OK\n"));
+ DEBUG(5, ("_samr_unknown_2d: %d\n", __LINE__));
return NT_STATUS_NOPROBLEMO;
}
@@ -223,10 +231,9 @@ uint32 _samr_unknown_2d(const POLICY_HND *domain_pol, const DOM_SID *sid)
/*******************************************************************
samr_reply_open_domain
********************************************************************/
-uint32 _samr_open_domain(const POLICY_HND *connect_pol,
- uint32 ace_perms,
- const DOM_SID *sid,
- POLICY_HND *domain_pol)
+uint32 _samr_open_domain(const POLICY_HND * connect_pol,
+ uint32 ace_perms,
+ const DOM_SID * sid, POLICY_HND * domain_pol)
{
/* find the connection policy handle. */
if (find_policy_by_hnd(get_global_hnd_cache(), connect_pol) == -1)
@@ -236,13 +243,12 @@ uint32 _samr_open_domain(const POLICY_HND *connect_pol,
/* get a (unique) handle. open a policy on it. */
if (!open_policy_hnd_link(get_global_hnd_cache(),
- connect_pol, domain_pol, ace_perms))
+ connect_pol, domain_pol, ace_perms))
{
return NT_STATUS_ACCESS_DENIED;
}
- policy_hnd_set_name(get_global_hnd_cache(),
- domain_pol, "sam_domain");
+ policy_hnd_set_name(get_global_hnd_cache(), domain_pol, "sam_domain");
/* associate the domain SID with the (unique) handle. */
if (!set_policy_samr_sid(get_global_hnd_cache(), domain_pol, sid))
@@ -251,7 +257,7 @@ uint32 _samr_open_domain(const POLICY_HND *connect_pol,
return NT_STATUS_ACCESS_DENIED;
}
- DEBUG(5,("_samr_open_domain: %d\n", __LINE__));
+ DEBUG(5, ("_samr_open_domain: %d\n", __LINE__));
return NT_STATUS_NOPROBLEMO;
}
@@ -259,10 +265,9 @@ uint32 _samr_open_domain(const POLICY_HND *connect_pol,
/*******************************************************************
samr_reply_get_usrdom_pwinfo
********************************************************************/
-uint32 _samr_get_usrdom_pwinfo(const POLICY_HND *user_pol,
- uint16 *unknown_0,
- uint16 *unknown_1,
- uint32 *unknown_2)
+uint32 _samr_get_usrdom_pwinfo(const POLICY_HND * user_pol,
+ uint16 * unknown_0,
+ uint16 * unknown_1, uint32 * unknown_2)
{
uint32 rid;
DOM_SID sid;
@@ -279,7 +284,7 @@ uint32 _samr_get_usrdom_pwinfo(const POLICY_HND *user_pol,
*unknown_1 = 0x0015;
*unknown_2 = 0x00000000;
- DEBUG(5,("samr_get_usrdom_pwinfo: %d\n", __LINE__));
+ DEBUG(5, ("samr_get_usrdom_pwinfo: %d\n", __LINE__));
return NT_STATUS_NOPROBLEMO;
}
@@ -287,7 +292,7 @@ uint32 _samr_get_usrdom_pwinfo(const POLICY_HND *user_pol,
/*******************************************************************
samr_reply_query_sec_obj
********************************************************************/
-uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf)
+uint32 _samr_query_sec_obj(const POLICY_HND * user_pol, SEC_DESC_BUF * buf)
{
DOM_SID usr_sid;
@@ -297,7 +302,7 @@ uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf)
return NT_STATUS_INVALID_HANDLE;
}
- SMB_ASSERT_ARRAY(usr_sid.sub_auths, usr_sid.num_auths+1);
+ SMB_ASSERT_ARRAY(usr_sid.sub_auths, usr_sid.num_auths + 1);
#if 0
/* maybe need another 1 or 2 (S-1-5-0x20-0x220 and S-1-5-20-0x224) */
@@ -305,13 +310,11 @@ uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf)
make_dom_sid3(&sid_stuff->sid[0], 0x035b, 0x0002, &global_sid_S_1_1);
make_dom_sid3(&sid_stuff->sid[1], 0x0044, 0x0002, &usr_sid);
- make_sam_sid_stuff(sid_stuff,
- 0x0001, 0x8004,
- 0x00000014, 0x0002, 0x0070,
- 2);
+ make_sam_sid_stuff(sid_stuff,
+ 0x0001, 0x8004, 0x00000014, 0x0002, 0x0070, 2);
#endif
- DEBUG(5,("samr_query_sec_obj: %d\n", __LINE__));
+ DEBUG(5, ("samr_query_sec_obj: %d\n", __LINE__));
return samr_make_usr_obj_sd(buf, &usr_sid);
}
@@ -319,9 +322,9 @@ uint32 _samr_query_sec_obj(const POLICY_HND *user_pol, SEC_DESC_BUF *buf)
/*******************************************************************
makes a SAM_ENTRY / UNISTR2* structure.
********************************************************************/
-static void make_samr_dom_users(SAM_ENTRY **sam, UNISTR2 **uni_acct_name,
- uint32 num_sam_entries,
- SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES])
+static void make_samr_dom_users(SAM_ENTRY ** sam, UNISTR2 ** uni_acct_name,
+ uint32 num_sam_entries,
+ SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES])
{
uint32 i;
@@ -333,12 +336,16 @@ static void make_samr_dom_users(SAM_ENTRY **sam, UNISTR2 **uni_acct_name,
return;
}
- (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
- (*uni_acct_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_acct_name)[0]));
+ (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
+
+ (*uni_acct_name) =
+ (UNISTR2 *) Realloc(NULL,
+ num_sam_entries *
+ sizeof((*uni_acct_name)[0]));
if ((*sam) == NULL || (*uni_acct_name) == NULL)
{
- DEBUG(0,("NULL pointers in SAMR_R_QUERY_DISPINFO\n"));
+ DEBUG(0, ("NULL pointers in SAMR_R_QUERY_DISPINFO\n"));
return;
}
@@ -348,18 +355,18 @@ static void make_samr_dom_users(SAM_ENTRY **sam, UNISTR2 **uni_acct_name,
pass[i].uni_user_name.uni_str_len,
pass[i].user_rid);
- copy_unistr2(&((*uni_acct_name)[i]), &(pass[i].uni_user_name));
+ copy_unistr2(&((*uni_acct_name)[i]),
+ &(pass[i].uni_user_name));
}
}
/*******************************************************************
samr_reply_enum_dom_users
********************************************************************/
-uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx,
- uint16 acb_mask, uint16 unk_1, uint32 size,
- SAM_ENTRY **sam,
- UNISTR2 **uni_acct_name,
- uint32 *num_sam_users)
+uint32 _samr_enum_dom_users(const POLICY_HND * pol, uint32 * start_idx,
+ uint16 acb_mask, uint16 unk_1, uint32 size,
+ SAM_ENTRY ** sam,
+ UNISTR2 ** uni_acct_name, uint32 * num_sam_users)
{
SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES];
int total_entries;
@@ -371,12 +378,11 @@ uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx,
return NT_STATUS_INVALID_HANDLE;
}
- DEBUG(5,("samr_reply_enum_dom_users: %d\n", __LINE__));
+ DEBUG(5, ("samr_reply_enum_dom_users: %d\n", __LINE__));
become_root(True);
ret = get_sampwd_entries(pass, (*start_idx), &total_entries,
- num_sam_users,
- MAX_SAM_ENTRIES, acb_mask);
+ num_sam_users, MAX_SAM_ENTRIES, acb_mask);
unbecome_root(True);
if (!ret)
{
@@ -386,7 +392,7 @@ uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx,
(*start_idx) += (*num_sam_users);
make_samr_dom_users(sam, uni_acct_name, (*num_sam_users), pass);
- DEBUG(5,("samr_enum_dom_users: %d\n", __LINE__));
+ DEBUG(5, ("samr_enum_dom_users: %d\n", __LINE__));
return NT_STATUS_NOPROBLEMO;
}
@@ -394,7 +400,7 @@ uint32 _samr_enum_dom_users( const POLICY_HND *pol, uint32 *start_idx,
/*******************************************************************
samr_reply_add_groupmem
********************************************************************/
-uint32 _samr_add_groupmem(const POLICY_HND *pol, uint32 rid, uint32 unknown)
+uint32 _samr_add_groupmem(const POLICY_HND * pol, uint32 rid, uint32 unknown)
{
DOM_SID group_sid;
uint32 group_rid;
@@ -409,14 +415,14 @@ uint32 _samr_add_groupmem(const POLICY_HND *pol, uint32 rid, uint32 unknown)
sid_to_string(group_sid_str, &group_sid);
sid_split_rid(&group_sid, &group_rid);
- DEBUG(10,("sid is %s\n", group_sid_str));
+ DEBUG(10, ("sid is %s\n", group_sid_str));
if (!sid_equal(&group_sid, &global_sam_sid))
{
return NT_STATUS_NO_SUCH_GROUP;
}
- DEBUG(10,("lookup on Domain SID\n"));
+ DEBUG(10, ("lookup on Domain SID\n"));
if (!add_group_member(group_rid, rid))
{
@@ -429,7 +435,7 @@ uint32 _samr_add_groupmem(const POLICY_HND *pol, uint32 rid, uint32 unknown)
/*******************************************************************
samr_reply_del_groupmem
********************************************************************/
-uint32 _samr_del_groupmem(const POLICY_HND *pol, uint32 rid)
+uint32 _samr_del_groupmem(const POLICY_HND * pol, uint32 rid)
{
DOM_SID group_sid;
uint32 group_rid;
@@ -444,13 +450,13 @@ uint32 _samr_del_groupmem(const POLICY_HND *pol, uint32 rid)
sid_to_string(group_sid_str, &group_sid);
sid_split_rid(&group_sid, &group_rid);
- DEBUG(10,("sid is %s\n", group_sid_str));
+ DEBUG(10, ("sid is %s\n", group_sid_str));
if (!sid_equal(&group_sid, &global_sam_sid))
{
return NT_STATUS_NO_SUCH_GROUP;
}
- DEBUG(10,("lookup on Domain SID\n"));
+ DEBUG(10, ("lookup on Domain SID\n"));
if (!del_group_member(group_rid, rid))
{
@@ -463,25 +469,26 @@ uint32 _samr_del_groupmem(const POLICY_HND *pol, uint32 rid)
/*******************************************************************
samr_reply_add_aliasmem
********************************************************************/
-uint32 _samr_add_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid)
+uint32 _samr_add_aliasmem(const POLICY_HND * alias_pol, const DOM_SID * sid)
{
DOM_SID alias_sid;
uint32 alias_rid;
fstring alias_sid_str;
/* find the policy handle. open a policy on it. */
- if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), alias_pol, &alias_sid))
{
return NT_STATUS_INVALID_HANDLE;
}
sid_to_string(alias_sid_str, &alias_sid);
sid_split_rid(&alias_sid, &alias_rid);
- DEBUG(10,("sid is %s\n", alias_sid_str));
+ DEBUG(10, ("sid is %s\n", alias_sid_str));
if (sid_equal(&alias_sid, &global_sam_sid))
{
- DEBUG(10,("add member on Domain SID\n"));
+ DEBUG(10, ("add member on Domain SID\n"));
if (!add_alias_member(alias_rid, sid))
{
@@ -490,7 +497,7 @@ uint32 _samr_add_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid)
}
else if (sid_equal(&alias_sid, global_sid_builtin))
{
- DEBUG(10,("add member on BUILTIN SID\n"));
+ DEBUG(10, ("add member on BUILTIN SID\n"));
if (!add_builtin_member(alias_rid, sid))
{
@@ -508,25 +515,26 @@ uint32 _samr_add_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid)
/*******************************************************************
samr_reply_del_aliasmem
********************************************************************/
-uint32 _samr_del_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid)
+uint32 _samr_del_aliasmem(const POLICY_HND * alias_pol, const DOM_SID * sid)
{
DOM_SID alias_sid;
uint32 alias_rid;
fstring alias_sid_str;
/* find the policy handle. open a policy on it. */
- if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), alias_pol, &alias_sid))
{
return NT_STATUS_INVALID_HANDLE;
}
sid_to_string(alias_sid_str, &alias_sid);
sid_split_rid(&alias_sid, &alias_rid);
- DEBUG(10,("sid is %s\n", alias_sid_str));
+ DEBUG(10, ("sid is %s\n", alias_sid_str));
if (sid_equal(&alias_sid, &global_sam_sid))
{
- DEBUG(10,("del member on Domain SID\n"));
+ DEBUG(10, ("del member on Domain SID\n"));
if (!del_alias_member(alias_rid, sid))
{
@@ -535,7 +543,7 @@ uint32 _samr_del_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid)
}
else if (sid_equal(&alias_sid, global_sid_builtin))
{
- DEBUG(10,("del member on BUILTIN SID\n"));
+ DEBUG(10, ("del member on BUILTIN SID\n"));
if (!del_builtin_member(alias_rid, sid))
{
@@ -553,12 +561,12 @@ uint32 _samr_del_aliasmem(const POLICY_HND *alias_pol, const DOM_SID *sid)
/******************************************************************
makes a SAMR_R_ENUM_DOMAINS structure.
********************************************************************/
-static void make_enum_domains(SAM_ENTRY **sam, UNISTR2 **uni_dom_name,
- uint32 num_sam_entries, char **doms)
+static void make_enum_domains(SAM_ENTRY ** sam, UNISTR2 ** uni_dom_name,
+ uint32 num_sam_entries, char **doms)
{
uint32 i;
- DEBUG(5,("make_enum_domains\n"));
+ DEBUG(5, ("make_enum_domains\n"));
(*sam) = NULL;
(*uni_dom_name) = NULL;
@@ -568,12 +576,16 @@ static void make_enum_domains(SAM_ENTRY **sam, UNISTR2 **uni_dom_name,
return;
}
- (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
- (*uni_dom_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_dom_name)[0]));
+ (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
+
+ (*uni_dom_name) =
+ (UNISTR2 *) Realloc(NULL,
+ num_sam_entries *
+ sizeof((*uni_dom_name)[0]));
if ((*sam) == NULL || (*uni_dom_name) == NULL)
{
- DEBUG(0,("NULL pointers in make_enum_domains\n"));
+ DEBUG(0, ("NULL pointers in make_enum_domains\n"));
return;
}
@@ -590,7 +602,7 @@ static void make_enum_domains(SAM_ENTRY **sam, UNISTR2 **uni_dom_name,
/**************************************************************************
enumerates all domains for which the SAM server is responsible
***************************************************************************/
-static BOOL enumdomains(char ***doms, uint32 *num_entries)
+static BOOL enumdomains(char ***doms, uint32 * num_entries)
{
add_chars_to_array(num_entries, doms, global_sam_name);
add_chars_to_array(num_entries, doms, "Builtin");
@@ -601,13 +613,12 @@ static BOOL enumdomains(char ***doms, uint32 *num_entries)
/*******************************************************************
samr_reply_enum_domains
********************************************************************/
-uint32 _samr_enum_domains(const POLICY_HND *pol, uint32 *start_idx,
- uint32 size,
- SAM_ENTRY **sam,
- UNISTR2 **uni_acct_name,
- uint32 *num_sam_users)
+uint32 _samr_enum_domains(const POLICY_HND * pol, uint32 * start_idx,
+ uint32 size,
+ SAM_ENTRY ** sam,
+ UNISTR2 ** uni_acct_name, uint32 * num_sam_users)
{
- char **doms = NULL;
+ char **doms = NULL;
uint32 num_entries = 0;
/* find the connection policy handle. */
@@ -616,7 +627,7 @@ uint32 _samr_enum_domains(const POLICY_HND *pol, uint32 *start_idx,
return NT_STATUS_INVALID_HANDLE;
}
- DEBUG(5,("samr_reply_enum_domains:\n"));
+ DEBUG(5, ("samr_reply_enum_domains:\n"));
if (!enumdomains(&doms, &num_entries))
{
@@ -636,12 +647,12 @@ uint32 _samr_enum_domains(const POLICY_HND *pol, uint32 *start_idx,
/*******************************************************************
makes a SAMR_R_ENUM_DOM_GROUPS structure.
********************************************************************/
-static void make_samr_dom_groups(SAM_ENTRY **sam, UNISTR2 **uni_grp_name,
- uint32 num_sam_entries, DOMAIN_GRP *grps)
+static void make_samr_dom_groups(SAM_ENTRY ** sam, UNISTR2 ** uni_grp_name,
+ uint32 num_sam_entries, DOMAIN_GRP * grps)
{
uint32 i;
- DEBUG(5,("make_samr_dom_groups\n"));
+ DEBUG(5, ("make_samr_dom_groups\n"));
(*sam) = NULL;
(*uni_grp_name) = NULL;
@@ -651,12 +662,16 @@ static void make_samr_dom_groups(SAM_ENTRY **sam, UNISTR2 **uni_grp_name,
return;
}
- (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
- (*uni_grp_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_grp_name)[0]));
+ (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
+
+ (*uni_grp_name) =
+ (UNISTR2 *) Realloc(NULL,
+ num_sam_entries *
+ sizeof((*uni_grp_name)[0]));
if ((*sam) == NULL || (*uni_grp_name) == NULL)
{
- DEBUG(0,("NULL pointers in SAMR_R_ENUM_DOM_GROUPS\n"));
+ DEBUG(0, ("NULL pointers in SAMR_R_ENUM_DOM_GROUPS\n"));
return;
}
@@ -672,11 +687,11 @@ static void make_samr_dom_groups(SAM_ENTRY **sam, UNISTR2 **uni_grp_name,
/*******************************************************************
samr_reply_enum_dom_groups
********************************************************************/
-uint32 _samr_enum_dom_groups(const POLICY_HND *pol,
- uint32 *start_idx, uint32 size,
- SAM_ENTRY **sam,
- UNISTR2 **uni_acct_name,
- uint32 *num_sam_groups)
+uint32 _samr_enum_dom_groups(const POLICY_HND * pol,
+ uint32 * start_idx, uint32 size,
+ SAM_ENTRY ** sam,
+ UNISTR2 ** uni_acct_name,
+ uint32 * num_sam_groups)
{
DOMAIN_GRP *grps = NULL;
int num_entries = 0;
@@ -692,7 +707,7 @@ uint32 _samr_enum_dom_groups(const POLICY_HND *pol,
sid_to_string(sid_str, &sid);
- DEBUG(5,("samr_reply_enum_dom_groups: sid %s\n", sid_str));
+ DEBUG(5, ("samr_reply_enum_dom_groups: sid %s\n", sid_str));
if (!sid_equal(&sid, &global_sam_sid))
{
@@ -720,12 +735,12 @@ uint32 _samr_enum_dom_groups(const POLICY_HND *pol,
/*******************************************************************
makes a SAMR_R_ENUM_DOM_ALIASES structure.
********************************************************************/
-static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name,
- uint32 num_sam_entries, LOCAL_GRP *alss)
+static void make_samr_dom_aliases(SAM_ENTRY ** sam, UNISTR2 ** uni_grp_name,
+ uint32 num_sam_entries, LOCAL_GRP * alss)
{
uint32 i;
- DEBUG(5,("make_samr_r_enum_dom_aliases\n"));
+ DEBUG(5, ("make_samr_r_enum_dom_aliases\n"));
(*sam) = NULL;
(*uni_grp_name) = NULL;
@@ -735,12 +750,16 @@ static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name,
return;
}
- (*sam) = (SAM_ENTRY*)Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
- (*uni_grp_name) = (UNISTR2*)Realloc(NULL, num_sam_entries * sizeof((*uni_grp_name)[0]));
+ (*sam) = (SAM_ENTRY *) Realloc(NULL, num_sam_entries * sizeof((*sam)[0]));
+
+ (*uni_grp_name) =
+ (UNISTR2 *) Realloc(NULL,
+ num_sam_entries *
+ sizeof((*uni_grp_name)[0]));
if ((*sam) == NULL || (*uni_grp_name) == NULL)
{
- DEBUG(0,("NULL pointers in SAMR_R_ENUM_DOM_ALIASES\n"));
+ DEBUG(0, ("NULL pointers in SAMR_R_ENUM_DOM_ALIASES\n"));
return;
}
@@ -748,7 +767,7 @@ static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name,
{
int len = strlen(alss[i].name);
- make_sam_entry(&((*sam)[i]), len, alss[i].rid);
+ make_sam_entry(&((*sam)[i]), len, alss[i].rid);
make_unistr2(&((*uni_grp_name)[i]), alss[i].name, len);
}
}
@@ -756,11 +775,11 @@ static void make_samr_dom_aliases(SAM_ENTRY **sam, UNISTR2 **uni_grp_name,
/*******************************************************************
samr_reply_enum_dom_aliases
********************************************************************/
-uint32 _samr_enum_dom_aliases(const POLICY_HND *pol,
- uint32 *start_idx, uint32 size,
- SAM_ENTRY **sam,
- UNISTR2 **uni_acct_name,
- uint32 *num_sam_aliases)
+uint32 _samr_enum_dom_aliases(const POLICY_HND * pol,
+ uint32 * start_idx, uint32 size,
+ SAM_ENTRY ** sam,
+ UNISTR2 ** uni_acct_name,
+ uint32 * num_sam_aliases)
{
LOCAL_GRP *alss = NULL;
int num_entries = 0;
@@ -775,7 +794,7 @@ uint32 _samr_enum_dom_aliases(const POLICY_HND *pol,
sid_to_string(sid_str, &sid);
- DEBUG(5,("samr_reply_enum_dom_aliases: sid %s\n", sid_str));
+ DEBUG(5, ("samr_reply_enum_dom_aliases: sid %s\n", sid_str));
/* well-known aliases */
if (sid_equal(&sid, global_sid_builtin))
@@ -804,7 +823,7 @@ uint32 _samr_enum_dom_aliases(const POLICY_HND *pol,
return NT_STATUS_ACCESS_DENIED;
}
}
-
+
(*start_idx) += num_entries;
(*num_sam_aliases) = num_entries;
@@ -818,13 +837,12 @@ uint32 _samr_enum_dom_aliases(const POLICY_HND *pol,
/*******************************************************************
samr_reply_query_dispinfo
********************************************************************/
-uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
- uint32 start_idx,
- uint32 max_entries,
- uint32 max_size,
- uint32 *data_size,
- uint32 *num_entries,
- SAM_DISPINFO_CTR *ctr)
+uint32 _samr_query_dispinfo(const POLICY_HND * domain_pol, uint16 level,
+ uint32 start_idx,
+ uint32 max_entries,
+ uint32 max_size,
+ uint32 * data_size,
+ uint32 * num_entries, SAM_DISPINFO_CTR * ctr)
{
SAM_USER_INFO_21 pass[MAX_SAM_ENTRIES];
DOMAIN_GRP *grps = NULL;
@@ -833,7 +851,7 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
int num_sam_entries = 0;
int total_entries = 0;
- DEBUG(5,("samr_reply_query_dispinfo: %d\n", __LINE__));
+ DEBUG(5, ("samr_reply_query_dispinfo: %d\n", __LINE__));
(*num_entries) = 0;
(*data_size) = 0;
@@ -841,7 +859,7 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
/* find the policy handle. open a policy on it. */
if (find_policy_by_hnd(get_global_hnd_cache(), domain_pol) == -1)
{
- DEBUG(5,("samr_reply_query_dispinfo: invalid handle\n"));
+ DEBUG(5, ("samr_reply_query_dispinfo: invalid handle\n"));
return NT_STATUS_INVALID_HANDLE;
}
@@ -860,12 +878,13 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
become_root(True);
ret = get_sampwd_entries(pass, start_idx,
- &total_entries, &num_sam_entries,
- MAX_SAM_ENTRIES, acb_mask);
+ &total_entries,
+ &num_sam_entries,
+ MAX_SAM_ENTRIES, acb_mask);
unbecome_root(True);
if (!ret)
{
- DEBUG(5,("get_sampwd_entries: failed\n"));
+ DEBUG(5, ("get_sampwd_entries: failed\n"));
return NT_STATUS_ACCESS_DENIED;
}
break;
@@ -883,10 +902,13 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
return NT_STATUS_ACCESS_DENIED;
}
- if (start_idx < num_sam_entries) {
+ if (start_idx < num_sam_entries)
+ {
grps = sam_grps + start_idx;
num_sam_entries -= start_idx;
- } else {
+ }
+ else
+ {
num_sam_entries = 0;
}
break;
@@ -904,8 +926,8 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
if ((*num_entries) > MAX_SAM_ENTRIES)
{
(*num_entries) = MAX_SAM_ENTRIES;
- DEBUG(5,("limiting number of entries to %d\n",
- (*num_entries)));
+ DEBUG(5, ("limiting number of entries to %d\n",
+ (*num_entries)));
}
(*data_size) = max_size;
@@ -961,7 +983,7 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
}
}
- DEBUG(5,("samr_reply_query_dispinfo: %d\n", __LINE__));
+ DEBUG(5, ("samr_reply_query_dispinfo: %d\n", __LINE__));
safe_free(sam_grps);
@@ -977,9 +999,9 @@ uint32 _samr_query_dispinfo( const POLICY_HND *domain_pol, uint16 level,
/*******************************************************************
samr_reply_delete_dom_user
********************************************************************/
-uint32 _samr_delete_dom_user(POLICY_HND *user_pol)
+uint32 _samr_delete_dom_user(POLICY_HND * user_pol)
{
- DEBUG(0,("samr_delete_dom_user: not implemented\n"));
+ DEBUG(0, ("samr_delete_dom_user: not implemented\n"));
return NT_STATUS_ACCESS_DENIED;
}
@@ -987,30 +1009,31 @@ uint32 _samr_delete_dom_user(POLICY_HND *user_pol)
/*******************************************************************
samr_reply_delete_dom_group
********************************************************************/
-uint32 _samr_delete_dom_group(POLICY_HND *group_pol)
+uint32 _samr_delete_dom_group(POLICY_HND * group_pol)
{
DOM_SID group_sid;
uint32 group_rid;
fstring group_sid_str;
- DEBUG(5,("samr_delete_dom_group: %d\n", __LINE__));
+ DEBUG(5, ("samr_delete_dom_group: %d\n", __LINE__));
/* find the policy handle. open a policy on it. */
- if (!get_policy_samr_sid(get_global_hnd_cache(), group_pol, &group_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), group_pol, &group_sid))
{
return NT_STATUS_INVALID_HANDLE;
}
sid_to_string(group_sid_str, &group_sid);
sid_split_rid(&group_sid, &group_rid);
- DEBUG(10,("sid is %s\n", group_sid_str));
+ DEBUG(10, ("sid is %s\n", group_sid_str));
if (!sid_equal(&group_sid, &global_sam_sid))
{
return NT_STATUS_NO_SUCH_GROUP;
}
- DEBUG(10,("lookup on Domain SID\n"));
+ DEBUG(10, ("lookup on Domain SID\n"));
if (!del_group_entry(group_rid))
{
@@ -1024,10 +1047,8 @@ uint32 _samr_delete_dom_group(POLICY_HND *group_pol)
/*******************************************************************
samr_reply_query_groupmem
********************************************************************/
-uint32 _samr_query_groupmem(const POLICY_HND *group_pol,
- uint32 *num_mem,
- uint32 **rid,
- uint32 **attr)
+uint32 _samr_query_groupmem(const POLICY_HND * group_pol,
+ uint32 * num_mem, uint32 ** rid, uint32 ** attr)
{
DOMAIN_GRP_MEMBER *mem_grp = NULL;
DOMAIN_GRP *grp = NULL;
@@ -1036,55 +1057,56 @@ uint32 _samr_query_groupmem(const POLICY_HND *group_pol,
uint32 group_rid;
fstring group_sid_str;
- DEBUG(5,("samr_query_groupmem: %d\n", __LINE__));
+ DEBUG(5, ("samr_query_groupmem: %d\n", __LINE__));
(*rid) = NULL;
(*attr) = NULL;
(*num_mem) = 0;
/* find the policy handle. open a policy on it. */
- if (!get_policy_samr_sid(get_global_hnd_cache(), group_pol, &group_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), group_pol, &group_sid))
{
return NT_STATUS_INVALID_HANDLE;
}
sid_to_string(group_sid_str, &group_sid);
sid_split_rid(&group_sid, &group_rid);
- DEBUG(10,("sid is %s\n", group_sid_str));
+ DEBUG(10, ("sid is %s\n", group_sid_str));
if (!sid_equal(&group_sid, &global_sam_sid))
{
return NT_STATUS_NO_SUCH_GROUP;
}
- DEBUG(10,("lookup on Domain SID\n"));
+ DEBUG(10, ("lookup on Domain SID\n"));
become_root(True);
grp = getgrouprid(group_rid, &mem_grp, &num_rids);
unbecome_root(True);
- if (grp == NULL)
- {
- return NT_STATUS_NO_SUCH_GROUP;
- }
+ if (grp == NULL)
+ {
+ return NT_STATUS_NO_SUCH_GROUP;
+ }
if (num_rids > 0)
{
- (*rid) = malloc(num_rids * sizeof(uint32));
+ (*rid) = malloc(num_rids * sizeof(uint32));
(*attr) = malloc(num_rids * sizeof(uint32));
if (mem_grp != NULL && (*rid) != NULL && (*attr) != NULL)
{
int i;
for (i = 0; i < num_rids; i++)
{
- (*rid) [i] = mem_grp[i].rid;
+ (*rid)[i] = mem_grp[i].rid;
(*attr)[i] = mem_grp[i].attr;
}
}
}
safe_free(mem_grp);
-
+
(*num_mem) = num_rids;
return NT_STATUS_NOPROBLEMO;
@@ -1093,9 +1115,8 @@ uint32 _samr_query_groupmem(const POLICY_HND *group_pol,
/*******************************************************************
samr_set_groupinfo
********************************************************************/
-uint32 _samr_set_groupinfo(const POLICY_HND *pol,
- uint16 switch_level,
- const GROUP_INFO_CTR* ctr)
+uint32 _samr_set_groupinfo(const POLICY_HND * pol,
+ uint16 switch_level, const GROUP_INFO_CTR * ctr)
{
return NT_STATUS_ACCESS_DENIED;
}
@@ -1103,9 +1124,8 @@ uint32 _samr_set_groupinfo(const POLICY_HND *pol,
/*******************************************************************
samr_reply_query_groupinfo
********************************************************************/
-uint32 _samr_query_groupinfo(const POLICY_HND *pol,
- uint16 switch_level,
- GROUP_INFO_CTR* ctr)
+uint32 _samr_query_groupinfo(const POLICY_HND * pol,
+ uint16 switch_level, GROUP_INFO_CTR * ctr)
{
/* find the policy handle. open a policy on it. */
if ((find_policy_by_hnd(get_global_hnd_cache(), pol) == -1))
@@ -1119,15 +1139,15 @@ uint32 _samr_query_groupinfo(const POLICY_HND *pol,
{
ctr->switch_value1 = 1;
make_samr_group_info1(&ctr->group.info1,
- "fake account name",
- "fake account description", 2);
+ "fake account name",
+ "fake account description", 2);
break;
}
case 4:
{
ctr->switch_value1 = 4;
make_samr_group_info4(&ctr->group.info4,
- "fake account description");
+ "fake account description");
break;
}
default:
@@ -1143,9 +1163,8 @@ uint32 _samr_query_groupinfo(const POLICY_HND *pol,
/*******************************************************************
samr_reply_query_aliasinfo
********************************************************************/
-uint32 _samr_query_aliasinfo(const POLICY_HND *alias_pol,
- uint16 switch_level,
- ALIAS_INFO_CTR *ctr)
+uint32 _samr_query_aliasinfo(const POLICY_HND * alias_pol,
+ uint16 switch_level, ALIAS_INFO_CTR * ctr)
{
/* find the policy handle. open a policy on it. */
if ((find_policy_by_hnd(get_global_hnd_cache(), alias_pol) == -1))
@@ -1159,7 +1178,7 @@ uint32 _samr_query_aliasinfo(const POLICY_HND *alias_pol,
{
ctr->switch_value1 = 3;
make_samr_alias_info3(&ctr->alias.info3,
- "<fake account description>");
+ "<fake account description>");
break;
}
default:
@@ -1175,9 +1194,9 @@ uint32 _samr_query_aliasinfo(const POLICY_HND *alias_pol,
/*******************************************************************
samr_reply_query_useraliases
********************************************************************/
-uint32 _samr_query_useraliases(const POLICY_HND *pol,
- const uint32 *ptr_sid, const DOM_SID2 *sid,
- uint32 *num_aliases, uint32 **rid)
+uint32 _samr_query_useraliases(const POLICY_HND * pol,
+ const uint32 * ptr_sid, const DOM_SID2 * sid,
+ uint32 * num_aliases, uint32 ** rid)
{
LOCAL_GRP *mem_grp = NULL;
int num_rids = 0;
@@ -1189,7 +1208,7 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol,
fstring dom_sid_str;
fstring usr_sid_str;
- DEBUG(5,("samr_query_useraliases: %d\n", __LINE__));
+ DEBUG(5, ("samr_query_useraliases: %d\n", __LINE__));
(*rid) = NULL;
(*num_aliases) = 0;
@@ -1199,7 +1218,7 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol,
{
return NT_STATUS_INVALID_HANDLE;
}
- sid_to_string(dom_sid_str, &dom_sid );
+ sid_to_string(dom_sid_str, &dom_sid);
sid_to_string(sam_sid_str, &global_sam_sid);
usr_sid = sid[0].sid;
@@ -1216,16 +1235,16 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol,
return NT_STATUS_NO_SUCH_USER;
}
- DEBUG(10,("sid is %s\n", dom_sid_str));
+ DEBUG(10, ("sid is %s\n", dom_sid_str));
if (sid_equal(&dom_sid, global_sid_builtin))
{
BOOL ret;
- DEBUG(10,("lookup on S-1-5-20\n"));
+ DEBUG(10, ("lookup on S-1-5-20\n"));
become_root(True);
ret = getuserbuiltinntnam(sam_pass->nt_name, &mem_grp,
- &num_rids);
+ &num_rids);
unbecome_root(True);
if (!ret)
@@ -1236,11 +1255,11 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol,
else if (sid_equal(&dom_sid, &usr_sid))
{
BOOL ret;
- DEBUG(10,("lookup on Domain SID\n"));
+ DEBUG(10, ("lookup on Domain SID\n"));
become_root(True);
ret = getuseraliasntnam(sam_pass->nt_name, &mem_grp,
- &num_rids);
+ &num_rids);
unbecome_root(True);
if (!ret)
@@ -1250,7 +1269,7 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol,
}
else
{
- return NT_STATUS_NO_SUCH_USER; /* no user (in domain) */
+ return NT_STATUS_NO_SUCH_USER; /* no user (in domain) */
}
if (num_rids > 0)
@@ -1275,31 +1294,32 @@ uint32 _samr_query_useraliases(const POLICY_HND *pol,
/*******************************************************************
samr_reply_delete_dom_alias
********************************************************************/
-uint32 _samr_delete_dom_alias(POLICY_HND *alias_pol)
+uint32 _samr_delete_dom_alias(POLICY_HND * alias_pol)
{
DOM_SID alias_sid;
uint32 alias_rid;
fstring alias_sid_str;
- DEBUG(5,("samr_delete_dom_alias: %d\n", __LINE__));
+ DEBUG(5, ("samr_delete_dom_alias: %d\n", __LINE__));
/* find the policy handle. open a policy on it. */
- if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), alias_pol, &alias_sid))
{
return NT_STATUS_INVALID_HANDLE;
}
- sid_to_string(alias_sid_str, &alias_sid );
+ sid_to_string(alias_sid_str, &alias_sid);
sid_split_rid(&alias_sid, &alias_rid);
- DEBUG(10,("sid is %s\n", alias_sid_str));
+ DEBUG(10, ("sid is %s\n", alias_sid_str));
if (!sid_equal(&alias_sid, &global_sam_sid))
{
return NT_STATUS_NO_SUCH_ALIAS;
}
- DEBUG(10,("lookup on Domain SID\n"));
+ DEBUG(10, ("lookup on Domain SID\n"));
if (!del_alias_entry(alias_rid))
{
@@ -1313,8 +1333,8 @@ uint32 _samr_delete_dom_alias(POLICY_HND *alias_pol)
/*******************************************************************
samr_reply_query_aliasmem
********************************************************************/
-uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol,
- uint32 *num_mem, DOM_SID2 **sid)
+uint32 _samr_query_aliasmem(const POLICY_HND * alias_pol,
+ uint32 * num_mem, DOM_SID2 ** sid)
{
LOCAL_GRP_MEMBER *mem_grp = NULL;
LOCAL_GRP *grp = NULL;
@@ -1323,24 +1343,25 @@ uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol,
uint32 alias_rid;
fstring alias_sid_str;
- DEBUG(5,("samr_query_aliasmem: %d\n", __LINE__));
+ DEBUG(5, ("samr_query_aliasmem: %d\n", __LINE__));
(*sid) = NULL;
(*num_mem) = 0;
/* find the policy handle. open a policy on it. */
- if (!get_policy_samr_sid(get_global_hnd_cache(), alias_pol, &alias_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), alias_pol, &alias_sid))
{
return NT_STATUS_INVALID_HANDLE;
}
- sid_to_string(alias_sid_str, &alias_sid );
+ sid_to_string(alias_sid_str, &alias_sid);
sid_split_rid(&alias_sid, &alias_rid);
- DEBUG(10,("sid is %s\n", alias_sid_str));
+ DEBUG(10, ("sid is %s\n", alias_sid_str));
if (sid_equal(&alias_sid, global_sid_builtin))
{
- DEBUG(10,("lookup on S-1-5-20\n"));
+ DEBUG(10, ("lookup on S-1-5-20\n"));
become_root(True);
grp = getbuiltinrid(alias_rid, &mem_grp, &num_sids);
@@ -1348,7 +1369,7 @@ uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol,
}
else if (sid_equal(&alias_sid, &global_sam_sid))
{
- DEBUG(10,("lookup on Domain SID\n"));
+ DEBUG(10, ("lookup on Domain SID\n"));
become_root(True);
grp = getaliasrid(alias_rid, &mem_grp, &num_sids);
@@ -1390,17 +1411,14 @@ uint32 _samr_query_aliasmem(const POLICY_HND *alias_pol,
/*******************************************************************
samr_reply_lookup_names
********************************************************************/
-uint32 _samr_lookup_names(const POLICY_HND *pol,
-
- uint32 num_names1,
- uint32 flags,
- uint32 ptr,
- const UNISTR2 *uni_name,
-
- uint32 *num_rids1,
- uint32 rid[MAX_SAM_ENTRIES],
- uint32 *num_types1,
- uint32 type[MAX_SAM_ENTRIES])
+uint32 _samr_lookup_names(const POLICY_HND * pol,
+ uint32 num_names1,
+ uint32 flags,
+ uint32 ptr,
+ const UNISTR2 * uni_name,
+ uint32 * num_rids1,
+ uint32 rid[MAX_SAM_ENTRIES],
+ uint32 * num_types1, uint32 type[MAX_SAM_ENTRIES])
{
int i;
int num_rids = num_names1;
@@ -1408,7 +1426,7 @@ uint32 _samr_lookup_names(const POLICY_HND *pol,
fstring tmp;
BOOL found_one = False;
- DEBUG(5,("samr_lookup_names: %d\n", __LINE__));
+ DEBUG(5, ("samr_lookup_names: %d\n", __LINE__));
if (!get_policy_samr_sid(get_global_hnd_cache(), pol, &pol_sid))
{
@@ -1416,12 +1434,14 @@ uint32 _samr_lookup_names(const POLICY_HND *pol,
}
sid_to_string(tmp, &pol_sid);
- DEBUG(5,("pol_sid: %s\n", tmp));
+ DEBUG(5, ("pol_sid: %s\n", tmp));
if (num_rids > MAX_SAM_ENTRIES)
{
num_rids = MAX_SAM_ENTRIES;
- DEBUG(5,("samr_lookup_names: truncating entries to %d\n", num_rids));
+ DEBUG(5,
+ ("samr_lookup_names: truncating entries to %d\n",
+ num_rids));
}
for (i = 0; i < num_rids; i++)
@@ -1429,7 +1449,7 @@ uint32 _samr_lookup_names(const POLICY_HND *pol,
DOM_SID sid;
fstring name;
uint32 status1;
- unistr2_to_ascii(name, &uni_name[i], sizeof(name)-1);
+ unistr2_to_ascii(name, &uni_name[i], sizeof(name) - 1);
status1 = lookup_name(name, &sid, &(type[i]));
if (status1 == 0x0)
@@ -1439,13 +1459,13 @@ uint32 _samr_lookup_names(const POLICY_HND *pol,
}
if ((status1 != 0x0) || !sid_equal(&pol_sid, &sid))
{
- rid [i] = 0xffffffff;
+ rid[i] = 0xffffffff;
type[i] = SID_NAME_UNKNOWN;
}
sid_to_string(tmp, &sid);
- DEBUG(10,("name: %s sid: %s rid: %x type: %d\n",
- name, tmp, rid[i], type[i]));
+ DEBUG(10, ("name: %s sid: %s rid: %x type: %d\n",
+ name, tmp, rid[i], type[i]));
}
if (!found_one)
@@ -1462,24 +1482,23 @@ uint32 _samr_lookup_names(const POLICY_HND *pol,
/*******************************************************************
samr_reply_chgpasswd_user
********************************************************************/
-uint32 _samr_chgpasswd_user( const UNISTR2 *uni_dest_host,
- const UNISTR2 *uni_user_name,
- const char nt_newpass[516],
- const uchar nt_oldhash[16],
- const char lm_newpass[516],
- const uchar lm_oldhash[16])
+uint32 _samr_chgpasswd_user(const UNISTR2 * uni_dest_host,
+ const UNISTR2 * uni_user_name,
+ const char nt_newpass[516],
+ const uchar nt_oldhash[16],
+ const char lm_newpass[516],
+ const uchar lm_oldhash[16])
{
fstring user_name;
fstring wks;
- unistr2_to_ascii(user_name, uni_user_name, sizeof(user_name)-1);
- unistr2_to_ascii(wks, uni_dest_host, sizeof(wks)-1);
+ unistr2_to_ascii(user_name, uni_user_name, sizeof(user_name) - 1);
+ unistr2_to_ascii(wks, uni_dest_host, sizeof(wks) - 1);
- DEBUG(5,("samr_chgpasswd_user: user: %s wks: %s\n", user_name, wks));
+ DEBUG(5, ("samr_chgpasswd_user: user: %s wks: %s\n", user_name, wks));
if (!pass_oem_change(user_name,
- lm_newpass, lm_oldhash,
- nt_newpass, nt_oldhash))
+ lm_newpass, lm_oldhash, nt_newpass, nt_oldhash))
{
return NT_STATUS_WRONG_PASSWORD;
}
@@ -1491,8 +1510,8 @@ uint32 _samr_chgpasswd_user( const UNISTR2 *uni_dest_host,
/*******************************************************************
samr_reply_get_dom_pwinfo
********************************************************************/
-uint32 _samr_get_dom_pwinfo(const UNISTR2 *uni_srv_name,
- uint16 *unk_0, uint16 *unk_1, uint16 *unk_2)
+uint32 _samr_get_dom_pwinfo(const UNISTR2 * uni_srv_name,
+ uint16 * unk_0, uint16 * unk_1, uint16 * unk_2)
{
/* absolutely no idea what to do, here */
*unk_0 = 0;
@@ -1505,23 +1524,27 @@ uint32 _samr_get_dom_pwinfo(const UNISTR2 *uni_srv_name,
/*******************************************************************
makes a SAMR_R_LOOKUP_RIDS structure.
********************************************************************/
-static BOOL make_samr_lookup_rids( uint32 num_names, char *const *name,
- UNIHDR **hdr_name, UNISTR2** uni_name)
+static BOOL make_samr_lookup_rids(uint32 num_names, char *const *name,
+ UNIHDR ** hdr_name, UNISTR2 ** uni_name)
{
uint32 i;
- if (name == NULL) return False;
+ if (name == NULL)
+ return False;
*uni_name = NULL;
*hdr_name = NULL;
if (num_names != 0)
{
- (*hdr_name) = (UNIHDR*)malloc(num_names * sizeof((*hdr_name)[0]));
+ (*hdr_name) = (UNIHDR *) malloc(num_names * sizeof((*hdr_name)[0]));
if ((*hdr_name) == NULL)
{
return False;
}
- (*uni_name) = (UNISTR2*)malloc(num_names * sizeof((*uni_name)[0]));
+
+ (*uni_name) =
+ (UNISTR2 *) malloc(num_names *
+ sizeof((*uni_name)[0]));
if ((*uni_name) == NULL)
{
free(*uni_name);
@@ -1533,7 +1556,7 @@ static BOOL make_samr_lookup_rids( uint32 num_names, char *const *name,
for (i = 0; i < num_names; i++)
{
int len = name[i] != NULL ? strlen(name[i]) : 0;
- DEBUG(10,("name[%d]:%s\n", i, name[i]));
+ DEBUG(10, ("name[%d]:%s\n", i, name[i]));
make_uni_hdr(&((*hdr_name)[i]), len);
make_unistr2(&((*uni_name)[i]), name[i], len);
}
@@ -1544,19 +1567,19 @@ static BOOL make_samr_lookup_rids( uint32 num_names, char *const *name,
/*******************************************************************
samr_reply_lookup_rids
********************************************************************/
-uint32 _samr_lookup_rids(const POLICY_HND *pol,
- uint32 num_rids, uint32 flags,
- const uint32 *rids,
- uint32 *num_names,
- UNIHDR **hdr_name, UNISTR2** uni_name,
- uint32 **types)
+uint32 _samr_lookup_rids(const POLICY_HND * pol,
+ uint32 num_rids, uint32 flags,
+ const uint32 * rids,
+ uint32 * num_names,
+ UNIHDR ** hdr_name, UNISTR2 ** uni_name,
+ uint32 ** types)
{
char **grp_names = NULL;
DOM_SID pol_sid;
BOOL found_one = False;
- int i;
+ int i;
- DEBUG(5,("samr_lookup_rids: %d\n", __LINE__));
+ DEBUG(5, ("samr_lookup_rids: %d\n", __LINE__));
/* find the policy handle. open a policy on it. */
if (find_policy_by_hnd(get_global_hnd_cache(), pol) == -1)
@@ -1623,9 +1646,9 @@ uint32 _samr_lookup_rids(const POLICY_HND *pol,
/*******************************************************************
samr_reply_open_user
********************************************************************/
-uint32 _samr_open_user(const POLICY_HND *domain_pol,
- uint32 access_mask, uint32 user_rid,
- POLICY_HND *user_pol)
+uint32 _samr_open_user(const POLICY_HND * domain_pol,
+ uint32 access_mask, uint32 user_rid,
+ POLICY_HND * user_pol)
{
struct sam_passwd *sam_pass;
DOM_SID sid;
@@ -1657,14 +1680,14 @@ uint32 _samr_open_user(const POLICY_HND *domain_pol,
}
return samr_open_by_sid(domain_pol, &sid, user_pol,
- access_mask, user_rid);
+ access_mask, user_rid);
}
/*************************************************************************
get_user_info_10
*************************************************************************/
-static BOOL get_user_info_10(SAM_USER_INFO_10 *id10, uint32 user_rid)
+static BOOL get_user_info_10(SAM_USER_INFO_10 * id10, uint32 user_rid)
{
struct sam_passwd *sam_pass;
@@ -1674,13 +1697,13 @@ static BOOL get_user_info_10(SAM_USER_INFO_10 *id10, uint32 user_rid)
if (sam_pass == NULL)
{
- DEBUG(4,("User 0x%x not found\n", user_rid));
+ DEBUG(4, ("User 0x%x not found\n", user_rid));
return False;
}
- DEBUG(3,("User:[%s]\n", sam_pass->nt_name));
+ DEBUG(3, ("User:[%s]\n", sam_pass->nt_name));
- make_sam_user_info10(id10, sam_pass->acct_ctrl);
+ make_sam_user_info10(id10, sam_pass->acct_ctrl);
return True;
}
@@ -1688,7 +1711,7 @@ static BOOL get_user_info_10(SAM_USER_INFO_10 *id10, uint32 user_rid)
/*************************************************************************
get_user_info_21
*************************************************************************/
-static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid)
+static BOOL get_user_info_12(SAM_USER_INFO_12 * id12, uint32 user_rid)
{
struct sam_passwd *sam_pass;
@@ -1698,11 +1721,11 @@ static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid)
if (sam_pass == NULL)
{
- DEBUG(4,("User 0x%x not found\n", user_rid));
+ DEBUG(4, ("User 0x%x not found\n", user_rid));
return False;
}
- DEBUG(3,("User:[%s] %x\n", sam_pass->nt_name, sam_pass->acct_ctrl));
+ DEBUG(3, ("User:[%s] %x\n", sam_pass->nt_name, sam_pass->acct_ctrl));
if (IS_BITS_SET_ALL(sam_pass->acct_ctrl, ACB_DISABLED))
{
@@ -1710,7 +1733,7 @@ static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid)
}
make_sam_user_info12(id12, sam_pass->smb_passwd,
- sam_pass->smb_nt_passwd);
+ sam_pass->smb_nt_passwd);
return True;
}
@@ -1718,7 +1741,7 @@ static BOOL get_user_info_12(SAM_USER_INFO_12 *id12, uint32 user_rid)
/*************************************************************************
get_user_info_21
*************************************************************************/
-static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid)
+static BOOL get_user_info_21(SAM_USER_INFO_21 * id21, uint32 user_rid)
{
struct sam_passwd *sam_pass;
LOGON_HRS hrs;
@@ -1730,11 +1753,11 @@ static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid)
if (sam_pass == NULL)
{
- DEBUG(4,("User 0x%x not found\n", user_rid));
+ DEBUG(4, ("User 0x%x not found\n", user_rid));
return False;
}
- DEBUG(3,("User:[%s]\n", sam_pass->nt_name));
+ DEBUG(3, ("User:[%s]\n", sam_pass->nt_name));
/* create a LOGON_HRS structure */
hrs.len = sam_pass->hours_len;
@@ -1744,35 +1767,22 @@ static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid)
hrs.hours[i] = sam_pass->hours[i];
}
- make_sam_user_info21A(id21,
-
- &sam_pass->logon_time,
- &sam_pass->logoff_time,
- &sam_pass->kickoff_time,
- &sam_pass->pass_last_set_time,
- &sam_pass->pass_can_change_time,
- &sam_pass->pass_must_change_time,
-
- sam_pass->nt_name, /* user_name */
- sam_pass->full_name, /* full_name */
- sam_pass->home_dir, /* home_dir */
- sam_pass->dir_drive, /* dir_drive */
- sam_pass->logon_script, /* logon_script */
- sam_pass->profile_path, /* profile_path */
- sam_pass->acct_desc, /* description */
- sam_pass->workstations, /* workstations user can log in from */
- sam_pass->unknown_str, /* don't know, yet */
- sam_pass->munged_dial, /* dialin info. contains dialin path and tel no */
-
- sam_pass->user_rid, /* RID user_id */
- sam_pass->group_rid, /* RID group_id */
- sam_pass->acct_ctrl,
-
- sam_pass->unknown_3, /* unknown_3 */
- sam_pass->logon_divs, /* divisions per week */
- &hrs, /* logon hours */
- sam_pass->unknown_5,
- sam_pass->unknown_6);
+ make_sam_user_info21A(id21, &sam_pass->logon_time, &sam_pass->logoff_time, &sam_pass->kickoff_time, &sam_pass->pass_last_set_time, &sam_pass->pass_can_change_time, &sam_pass->pass_must_change_time, sam_pass->nt_name, /* user_name */
+ sam_pass->full_name, /* full_name */
+ sam_pass->home_dir, /* home_dir */
+ sam_pass->dir_drive, /* dir_drive */
+ sam_pass->logon_script, /* logon_script */
+ sam_pass->profile_path, /* profile_path */
+ sam_pass->acct_desc, /* description */
+ sam_pass->workstations, /* workstations user can log in from */
+ sam_pass->unknown_str, /* don't know, yet */
+ sam_pass->munged_dial, /* dialin info. contains dialin path and tel no */
+ sam_pass->user_rid, /* RID user_id */
+ sam_pass->group_rid, /* RID group_id */
+ sam_pass->acct_ctrl, sam_pass->unknown_3, /* unknown_3 */
+ sam_pass->logon_divs, /* divisions per week */
+ &hrs, /* logon hours */
+ sam_pass->unknown_5, sam_pass->unknown_6);
return True;
}
@@ -1780,8 +1790,8 @@ static BOOL get_user_info_21(SAM_USER_INFO_21 *id21, uint32 user_rid)
/*******************************************************************
samr_reply_query_userinfo
********************************************************************/
-uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value,
- SAM_USERINFO_CTR *ctr)
+uint32 _samr_query_userinfo(const POLICY_HND * pol, uint16 switch_value,
+ SAM_USERINFO_CTR * ctr)
{
uint32 rid = 0x0;
DOM_SID group_sid;
@@ -1793,7 +1803,7 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value,
}
sid_split_rid(&group_sid, &rid);
- DEBUG(5,("samr_reply_query_userinfo: rid:0x%x\n", rid));
+ DEBUG(5, ("samr_reply_query_userinfo: rid:0x%x\n", rid));
/* ok! user info levels (lots: see MSDEV help), off we go... */
ctr->switch_value = switch_value;
@@ -1801,8 +1811,11 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value,
{
case 0x10:
{
- ctr->info.id = (SAM_USER_INFO_10*)Realloc(NULL,
- sizeof(*ctr->info.id10));
+ ctr->info.id = (SAM_USER_INFO_10 *) Realloc(NULL,
+ sizeof
+ (*ctr->
+ info.
+ id10));
if (ctr->info.id == NULL)
{
return NT_STATUS_NO_MEMORY;
@@ -1818,26 +1831,32 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value,
case 0x11:
{
NTTIME expire;
- info = (void*)&id11;
-
- expire.low = 0xffffffff;
+ info = (void *)&id11;
+
+ expire.low = 0xffffffff;
expire.high = 0x7fffffff;
- ctr->info.id = (SAM_USER_INFO_11*)Realloc(NULL,
- sizeof(*ctr->info.id11));
+ ctr->info.id = (SAM_USER_INFO_11 *) Realloc(NULL,
+ sizeof
+ (*ctr->
+ info.
+ id11));
make_sam_user_info11(ctr->info.id11, &expire,
- "BROOKFIELDS$", /* name */
- 0x03ef, /* user rid */
- 0x201, /* group rid */
- 0x0080); /* acb info */
+ "BROOKFIELDS$", /* name */
+ 0x03ef, /* user rid */
+ 0x201, /* group rid */
+ 0x0080); /* acb info */
break;
}
#endif
case 0x12:
{
- ctr->info.id = (SAM_USER_INFO_12*)Realloc(NULL,
- sizeof(*ctr->info.id12));
+ ctr->info.id = (SAM_USER_INFO_12 *) Realloc(NULL,
+ sizeof
+ (*ctr->
+ info.
+ id12));
if (ctr->info.id == NULL)
{
return NT_STATUS_NO_MEMORY;
@@ -1850,8 +1869,11 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value,
}
case 21:
{
- ctr->info.id = (SAM_USER_INFO_21*)Realloc(NULL,
- sizeof(*ctr->info.id21));
+ ctr->info.id = (SAM_USER_INFO_21 *) Realloc(NULL,
+ sizeof
+ (*ctr->
+ info.
+ id21));
if (ctr->info.id == NULL)
{
return NT_STATUS_NO_MEMORY;
@@ -1875,7 +1897,7 @@ uint32 _samr_query_userinfo(const POLICY_HND *pol, uint16 switch_value,
/*******************************************************************
set_user_info_12
********************************************************************/
-static BOOL set_user_info_12(const SAM_USER_INFO_12 *id12, uint32 rid)
+static BOOL set_user_info_12(const SAM_USER_INFO_12 * id12, uint32 rid)
{
struct sam_passwd *pwd = getsam21pwrid(rid);
struct sam_passwd new_pwd;
@@ -1898,7 +1920,7 @@ static BOOL set_user_info_12(const SAM_USER_INFO_12 *id12, uint32 rid)
memcpy(nt_hash, id12->nt_pwd, sizeof(nt_hash));
memcpy(lm_hash, id12->lm_pwd, sizeof(lm_hash));
- new_pwd.smb_passwd = lm_hash;
+ new_pwd.smb_passwd = lm_hash;
new_pwd.smb_nt_passwd = nt_hash;
return mod_sam21pwd_entry(&new_pwd, True);
@@ -1907,7 +1929,7 @@ static BOOL set_user_info_12(const SAM_USER_INFO_12 *id12, uint32 rid)
/*******************************************************************
set_user_info_24
********************************************************************/
-static BOOL set_user_info_24(const SAM_USER_INFO_24 *id24, uint32 rid)
+static BOOL set_user_info_24(const SAM_USER_INFO_24 * id24, uint32 rid)
{
struct sam_passwd *pwd = getsam21pwrid(rid);
struct sam_passwd new_pwd;
@@ -1934,7 +1956,7 @@ static BOOL set_user_info_24(const SAM_USER_INFO_24 *id24, uint32 rid)
nt_lm_owf_genW(&new_pw, nt_hash, lm_hash);
- new_pwd.smb_passwd = lm_hash;
+ new_pwd.smb_passwd = lm_hash;
new_pwd.smb_nt_passwd = nt_hash;
return mod_sam21pwd_entry(&new_pwd, True);
@@ -1943,7 +1965,7 @@ static BOOL set_user_info_24(const SAM_USER_INFO_24 *id24, uint32 rid)
/*******************************************************************
set_user_info_23
********************************************************************/
-static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid)
+static BOOL set_user_info_23(const SAM_USER_INFO_23 * id23, uint32 rid)
{
struct sam_passwd *pwd = getsam21pwrid(rid);
struct sam_passwd new_pwd;
@@ -1966,7 +1988,7 @@ static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid)
copy_sam_passwd(&new_pwd, pwd);
copy_id23_to_sam_passwd(&new_pwd, id23);
- if (!decode_pw_buffer(id23->pass, (char*)new_pw.buffer, 256, &len))
+ if (!decode_pw_buffer(id23->pass, (char *)new_pw.buffer, 256, &len))
{
return False;
}
@@ -1976,7 +1998,7 @@ static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid)
nt_lm_owf_genW(&new_pw, nt_hash, lm_hash);
- new_pwd.smb_passwd = lm_hash;
+ new_pwd.smb_passwd = lm_hash;
new_pwd.smb_nt_passwd = nt_hash;
return mod_sam21pwd_entry(&new_pwd, True);
@@ -1985,14 +2007,14 @@ static BOOL set_user_info_23(const SAM_USER_INFO_23 *id23, uint32 rid)
/*******************************************************************
samr_reply_set_userinfo
********************************************************************/
-uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value,
- SAM_USERINFO_CTR *ctr)
+uint32 _samr_set_userinfo(const POLICY_HND * pol, uint16 switch_value,
+ SAM_USERINFO_CTR * ctr)
{
uchar user_sess_key[16];
uint32 rid = 0x0;
DOM_SID sid;
- DEBUG(5,("samr_reply_set_userinfo: %d\n", __LINE__));
+ DEBUG(5, ("samr_reply_set_userinfo: %d\n", __LINE__));
/* search for the handle */
if (find_policy_by_hnd(get_global_hnd_cache(), pol) == -1)
@@ -2013,11 +2035,11 @@ uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value,
sid_split_rid(&sid, &rid);
- DEBUG(5,("samr_reply_set_userinfo: rid:0x%x\n", rid));
+ DEBUG(5, ("samr_reply_set_userinfo: rid:0x%x\n", rid));
if (ctr == NULL)
{
- DEBUG(5,("samr_reply_set_userinfo: NULL info level\n"));
+ DEBUG(5, ("samr_reply_set_userinfo: NULL info level\n"));
return NT_STATUS_INVALID_INFO_CLASS;
}
@@ -2049,7 +2071,8 @@ uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value,
{
SAM_USER_INFO_23 *id23 = ctr->info.id23;
SamOEMhash(id23->pass, user_sess_key, 1);
- dump_data_pw("pass buff:\n", id23->pass, sizeof(id23->pass));
+ dump_data_pw("pass buff:\n", id23->pass,
+ sizeof(id23->pass));
dbgflush();
if (!set_user_info_23(id23, rid))
@@ -2071,7 +2094,7 @@ uint32 _samr_set_userinfo(const POLICY_HND *pol, uint16 switch_value,
/*******************************************************************
set_user_info_10
********************************************************************/
-static BOOL set_user_info_10(const SAM_USER_INFO_10 *id10, uint32 rid)
+static BOOL set_user_info_10(const SAM_USER_INFO_10 * id10, uint32 rid)
{
struct sam_passwd *pwd = getsam21pwrid(rid);
struct sam_passwd new_pwd;
@@ -2096,13 +2119,13 @@ static BOOL set_user_info_10(const SAM_USER_INFO_10 *id10, uint32 rid)
/*******************************************************************
samr_reply_set_userinfo2
********************************************************************/
-uint32 _samr_set_userinfo2(const POLICY_HND *pol, uint16 switch_value,
- SAM_USERINFO_CTR *ctr)
+uint32 _samr_set_userinfo2(const POLICY_HND * pol, uint16 switch_value,
+ SAM_USERINFO_CTR * ctr)
{
DOM_SID sid;
uint32 rid = 0x0;
- DEBUG(5,("samr_reply_set_userinfo2: %d\n", __LINE__));
+ DEBUG(5, ("samr_reply_set_userinfo2: %d\n", __LINE__));
/* find the policy handle. open a policy on it. */
if (!get_policy_samr_sid(get_global_hnd_cache(), pol, &sid))
@@ -2112,11 +2135,11 @@ uint32 _samr_set_userinfo2(const POLICY_HND *pol, uint16 switch_value,
sid_split_rid(&sid, &rid);
- DEBUG(5,("samr_reply_set_userinfo2: rid:0x%x\n", rid));
+ DEBUG(5, ("samr_reply_set_userinfo2: rid:0x%x\n", rid));
if (ctr == NULL)
{
- DEBUG(5,("samr_reply_set_userinfo2: NULL info level\n"));
+ DEBUG(5, ("samr_reply_set_userinfo2: NULL info level\n"));
return NT_STATUS_INVALID_INFO_CLASS;
}
@@ -2148,9 +2171,8 @@ uint32 _samr_set_userinfo2(const POLICY_HND *pol, uint16 switch_value,
/*******************************************************************
samr_reply_query_usergroups
********************************************************************/
-uint32 _samr_query_usergroups(const POLICY_HND *pol,
- uint32 *num_groups,
- DOM_GID **gids)
+uint32 _samr_query_usergroups(const POLICY_HND * pol,
+ uint32 * num_groups, DOM_GID ** gids)
{
DOMAIN_GRP *mem_grp = NULL;
struct sam_passwd *sam_pass;
@@ -2158,7 +2180,7 @@ uint32 _samr_query_usergroups(const POLICY_HND *pol,
uint32 rid;
BOOL ret;
- DEBUG(5,("samr_query_usergroups: %d\n", __LINE__));
+ DEBUG(5, ("samr_query_usergroups: %d\n", __LINE__));
/* find the policy handle. open a policy on it. */
if (!get_policy_samr_sid(get_global_hnd_cache(), pol, &sid))
@@ -2200,10 +2222,10 @@ uint32 _samr_query_usergroups(const POLICY_HND *pol,
/*******************************************************************
_samr_create_dom_alias
********************************************************************/
-uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol,
- const UNISTR2 *uni_acct_name,
- uint32 access_mask,
- POLICY_HND *alias_pol, uint32 *rid)
+uint32 _samr_create_dom_alias(const POLICY_HND * domain_pol,
+ const UNISTR2 * uni_acct_name,
+ uint32 access_mask,
+ POLICY_HND * alias_pol, uint32 * rid)
{
uint32 status;
DOM_SID dom_sid;
@@ -2218,7 +2240,8 @@ uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol,
}
/* find the domain sid */
- if (!get_policy_samr_sid(get_global_hnd_cache(), domain_pol, &dom_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), domain_pol, &dom_sid))
{
return NT_STATUS_OBJECT_TYPE_MISMATCH;
}
@@ -2228,13 +2251,13 @@ uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol,
return NT_STATUS_ACCESS_DENIED;
}
- unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name)-1);
+ unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name) - 1);
fstrcpy(grp.comment, "");
*rid = grp.rid = 0xffffffff;
*rid = grp.rid;
status = samr_open_by_sid(domain_pol, &dom_sid, alias_pol,
- access_mask, grp.rid);
+ access_mask, grp.rid);
if (status != 0x0)
{
@@ -2252,10 +2275,10 @@ uint32 _samr_create_dom_alias(const POLICY_HND *domain_pol,
/*******************************************************************
_samr_create_dom_group
********************************************************************/
-uint32 _samr_create_dom_group(const POLICY_HND *domain_pol,
- const UNISTR2 *uni_acct_name,
- uint32 access_mask,
- POLICY_HND *group_pol, uint32 *rid)
+uint32 _samr_create_dom_group(const POLICY_HND * domain_pol,
+ const UNISTR2 * uni_acct_name,
+ uint32 access_mask,
+ POLICY_HND * group_pol, uint32 * rid)
{
uint32 status;
DOM_SID dom_sid;
@@ -2270,7 +2293,8 @@ uint32 _samr_create_dom_group(const POLICY_HND *domain_pol,
}
/* find the domain sid */
- if (!get_policy_samr_sid(get_global_hnd_cache(), domain_pol, &dom_sid))
+ if (!get_policy_samr_sid
+ (get_global_hnd_cache(), domain_pol, &dom_sid))
{
return NT_STATUS_OBJECT_TYPE_MISMATCH;
}
@@ -2280,14 +2304,14 @@ uint32 _samr_create_dom_group(const POLICY_HND *domain_pol,
return NT_STATUS_ACCESS_DENIED;
}
- unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name)-1);
+ unistr2_to_ascii(grp.name, uni_acct_name, sizeof(grp.name) - 1);
fstrcpy(grp.comment, "");
*rid = grp.rid = 0xffffffff;
grp.attr = 0x07;
*rid = grp.rid;
status = samr_open_by_sid(domain_pol, &dom_sid, group_pol,
- access_mask, grp.rid);
+ access_mask, grp.rid);
if (status != 0x0)
{
return status;
@@ -2304,14 +2328,13 @@ uint32 _samr_create_dom_group(const POLICY_HND *domain_pol,
/*******************************************************************
_samr_query_dom_info
********************************************************************/
-uint32 _samr_query_dom_info(const POLICY_HND *domain_pol,
- uint16 switch_value,
- SAM_UNK_CTR *ctr)
+uint32 _samr_query_dom_info(const POLICY_HND * domain_pol,
+ uint16 switch_value, SAM_UNK_CTR * ctr)
{
/* find the policy handle. open a policy on it. */
if (find_policy_by_hnd(get_global_hnd_cache(), domain_pol) == -1)
{
- DEBUG(5,("samr_reply_query_dom_info: invalid handle\n"));
+ DEBUG(5, ("samr_reply_query_dom_info: invalid handle\n"));
return NT_STATUS_INVALID_HANDLE;
}
@@ -2341,7 +2364,8 @@ uint32 _samr_query_dom_info(const POLICY_HND *domain_pol,
{
extern fstring global_sam_name;
extern pstring global_myname;
- make_unk_info2(&(ctr->info.inf2), global_sam_name, global_myname);
+ make_unk_info2(&(ctr->info.inf2), global_sam_name,
+ global_myname);
break;
}
case 0x01:
@@ -2361,11 +2385,11 @@ uint32 _samr_query_dom_info(const POLICY_HND *domain_pol,
/*******************************************************************
_samr_create_user
********************************************************************/
-uint32 _samr_create_user(const POLICY_HND *domain_pol,
- const UNISTR2 *uni_username,
- uint16 acb_info, uint32 access_mask,
- POLICY_HND *user_pol,
- uint32 *unknown_0, uint32 *user_rid)
+uint32 _samr_create_user(const POLICY_HND * domain_pol,
+ const UNISTR2 * uni_username,
+ uint16 acb_info, uint32 access_mask,
+ POLICY_HND * user_pol,
+ uint32 * unknown_0, uint32 * user_rid)
{
DOM_SID sid;
@@ -2393,7 +2417,7 @@ uint32 _samr_create_user(const POLICY_HND *domain_pol,
return NT_STATUS_ACCESS_DENIED;
}
- unistr2_to_ascii(user_name, uni_username, sizeof(user_name)-1);
+ unistr2_to_ascii(user_name, uni_username, sizeof(user_name) - 1);
sam_pass = getsam21pwntnam(user_name);
@@ -2404,12 +2428,11 @@ uint32 _samr_create_user(const POLICY_HND *domain_pol,
}
if (!local_password_change(user_name, True,
- acb_info | ACB_DISABLED | ACB_PWNOTREQ, 0xffff,
- NULL,
- err_str, sizeof(err_str),
- msg_str, sizeof(msg_str)))
+ acb_info | ACB_DISABLED | ACB_PWNOTREQ,
+ 0xffff, NULL, err_str, sizeof(err_str),
+ msg_str, sizeof(msg_str)))
{
- DEBUG(0,("%s\n", err_str));
+ DEBUG(0, ("%s\n", err_str));
return NT_STATUS_ACCESS_DENIED;
}
@@ -2424,19 +2447,18 @@ uint32 _samr_create_user(const POLICY_HND *domain_pol,
*user_rid = sam_pass->user_rid;
return samr_open_by_sid(domain_pol, &sid, user_pol,
- access_mask, *user_rid);
+ access_mask, *user_rid);
}
/*******************************************************************
_samr_connect_anon
********************************************************************/
-uint32 _samr_connect_anon(const UNISTR2 *srv_name, uint32 access_mask,
- POLICY_HND *connect_pol)
-
+uint32 _samr_connect_anon(const UNISTR2 * srv_name, uint32 access_mask,
+ POLICY_HND * connect_pol)
{
/* get a (unique) handle. open a policy on it. */
if (!open_policy_hnd(get_global_hnd_cache(),
- get_sec_ctx(), connect_pol, access_mask))
+ get_sec_ctx(), connect_pol, access_mask))
{
return NT_STATUS_ACCESS_DENIED;
}
@@ -2450,12 +2472,12 @@ uint32 _samr_connect_anon(const UNISTR2 *srv_name, uint32 access_mask,
/*******************************************************************
_samr_connect
********************************************************************/
-uint32 _samr_connect(const UNISTR2 *srv_name, uint32 access_mask,
- POLICY_HND *connect_pol)
+uint32 _samr_connect(const UNISTR2 * srv_name, uint32 access_mask,
+ POLICY_HND * connect_pol)
{
/* get a (unique) handle. open a policy on it. */
if (!open_policy_hnd(get_global_hnd_cache(),
- get_sec_ctx(), connect_pol, access_mask))
+ get_sec_ctx(), connect_pol, access_mask))
{
return NT_STATUS_ACCESS_DENIED;
}
@@ -2469,9 +2491,9 @@ uint32 _samr_connect(const UNISTR2 *srv_name, uint32 access_mask,
/*******************************************************************
_samr_open_alias
********************************************************************/
-uint32 _samr_open_alias(const POLICY_HND *domain_pol,
- uint32 access_mask, uint32 alias_rid,
- POLICY_HND *alias_pol)
+uint32 _samr_open_alias(const POLICY_HND * domain_pol,
+ uint32 access_mask, uint32 alias_rid,
+ POLICY_HND * alias_pol)
{
DOM_SID sid;
@@ -2488,15 +2510,15 @@ uint32 _samr_open_alias(const POLICY_HND *domain_pol,
return NT_STATUS_ACCESS_DENIED;
}
- return samr_open_by_sid(domain_pol, &sid, alias_pol, access_mask, alias_rid);
+ return samr_open_by_sid(domain_pol, &sid, alias_pol, access_mask,
+ alias_rid);
}
/*******************************************************************
_samr_open_group
********************************************************************/
-uint32 _samr_open_group(const POLICY_HND *domain_pol, uint32 access_mask,
- uint32 group_rid,
- POLICY_HND *group_pol)
+uint32 _samr_open_group(const POLICY_HND * domain_pol, uint32 access_mask,
+ uint32 group_rid, POLICY_HND * group_pol)
{
DOM_SID sid;
@@ -2512,15 +2534,15 @@ uint32 _samr_open_group(const POLICY_HND *domain_pol, uint32 access_mask,
return NT_STATUS_ACCESS_DENIED;
}
- return samr_open_by_sid(domain_pol, &sid, group_pol, access_mask, group_rid);
+ return samr_open_by_sid(domain_pol, &sid, group_pol, access_mask,
+ group_rid);
}
/*******************************************************************
_samr_lookup_domain
********************************************************************/
-uint32 _samr_lookup_domain(const POLICY_HND *connect_pol,
- const UNISTR2 *uni_domain,
- DOM_SID *dom_sid)
+uint32 _samr_lookup_domain(const POLICY_HND * connect_pol,
+ const UNISTR2 * uni_domain, DOM_SID * dom_sid)
{
fstring domain;
@@ -2550,10 +2572,9 @@ uint32 _samr_lookup_domain(const POLICY_HND *connect_pol,
BOOL pwdbsam_initialise(void)
{
- return initialise_password_db() &&
+ return initialise_password_db() &&
initialise_sam_password_db() &&
initialise_passgrp_db() &&
initialise_group_db() &&
- initialise_alias_db() &&
- initialise_builtin_db();
+ initialise_alias_db() && initialise_builtin_db();
}