summaryrefslogtreecommitdiffstats
path: root/source/include/rpc_lsa.h
Commit message (Collapse)AuthorAgeFilesLines
* Minor fixes.Andrew Bartlett2003-03-151-1/+1
| | | | | | | | - signed/unsigned - quieten warning about assignment as truth value - whitespace Andrew Bartlett
* added the 'lsaenumacctwithright' command to rpcclient. This allows youAndrew Tridgell2003-02-101-1/+17
| | | | | to lookup what SIDs have a particular privilege (that is how privileges are stored).
* added the LSA privileges server backend stubs. Right now they just logAndrew Tridgell2003-02-061-2/+0
| | | | what was requested.
* added LsaRemoveAccountRightsAndrew Tridgell2003-01-281-3/+20
| | | | | this now gives us complete remove privileges control in the client libs, so we are in good shape for starting on the server side.
* cleaned up the lsa_enum_acct_rights function and added aAndrew Tridgell2003-01-281-5/+20
| | | | | | lsa_add_acct_rights function. This allows us to add privileges remotely to accounts using rpcclient.
* added cli_lsa_enum_account_rights() call. Note that this is inAndrew Tridgell2003-01-151-0/+17
| | | | | | | | | | | principal similar to the existing cli_lsa_enum_privsaccount() call, except that cli_lsa_enum_account_rights() doesn't require a call to open_account first. There is also the minor matter that cli_lsa_enum_account_rights() works whereas cli_lsa_enum_privsaccount() doesn't! this call can be used to find what privileges an account or group has. This is a first step towards proper privileges support in Samba.
* Add LSA RPC 0x2E, lsa_query_info2. Only level implemented is 0x0c, whichJim McDonough2002-07-301-0/+38
| | | | | is netbios and dns domain info. Also add code to set/fetch the domain GUID from secrets.tdb (although set is not yet called by anyone).
* (this should have been part of the previous commit)Andrew Bartlett2002-07-081-13/+0
| | | | | | | | | | Add a function to display 'sid types' as strings - makes rpcclient outptut and DEBUG() logs much eaiser to understand. Move the enum for SID types to smb.h, becouse is really isn't LSA specific any more. Andrew Bartlett
* Partly based on the work by mimir (Rafal SzczesniakAndrew Bartlett2002-04-141-2/+2
| | | | | | | | | | | | | | <mimir@diament.ists.pwr.wroc.pl>) this patch allows samba to correctly enumerate its trusted domains - by exaimining the keys in the secrets.tdb file. This patch has been tested with both NT4 and rpcclient/wbinfo, and adds some extra functionality to talloc and rpc_parse to allow it to deal with already unicode strings. Finally, this cleans up some const warnings that were in net_rpc.c by pushing another dash of const into the rpc client code. Andrew Bartlett
* Removed version number from file header.Tim Potter2002-01-301-1/+1
| | | | Changed "SMB/Netbios" to "SMB/CIFS" in file header.
* Move the lsa code across to the changed args for lookup_name, and surround itAndrew Bartlett2002-01-261-4/+2
| | | | | | | | | | | | in become_root()/unbecome_root(). Also only allocate the memory the client reqests - and don't allow the client to trigger an SMB_ASSERT if they ask for 'more'. Up the maximum number of sids allowed, and note that this is an arbiary guess, and can be raised without consequence. Andrew Bartlett
* Correct4ed comment.Tim Potter2002-01-111-1/+1
|
* Doc.Martin Pool2002-01-021-2/+1
|
* there is no unknown field in LSA_SEC_QOSJean-François Micouleau2001-12-171-1/+0
| | | | | | | | | | | | | some cleanup of the lsa_open_policy and lsa_open_policy2 parser. the length fields are not correct but that's what NT send. We don't anymore underflow or overflow the decoding. added the domain admins group to the default SD. we are now checking the desired access flag in the lsa_open_policy_X() calls and in most functions also. J.F.
* add lsa_query_secobj server code. level 4 is the ACL, level 1 is theJean-François Micouleau2001-12-141-16/+47
| | | | | | | | | owner. that's basic stuff. got the POLICY_ define from TNG but they are also in an include file in the NT SDK. J.F.
* Changed again how the privilege list is handled in the group mapping code.Jean-François Micouleau2001-11-291-0/+42
| | | | | | | | | | | | | | | | This time it's a PRIVILEGE_SET struct instead of a simple uint32 array. It makes much more sense. Also added a uint32 systemaccount to the GROUP_MAP struct as some privilege showing in USRMGR.EXE are not real privs but a bitmask flag. I guess it's an heritage from NT 3.0 ! I could setup an NT 3.1 box to verify, but I'm too lazy (yes I still have my CDs). Added 3 more LSA calls: SetSystemAccount, AddPrivileges and RemovePrivileges, we can manage all this privilege from UserManager. Time to change the NT_USER_TOKEN struct and add checks in all the rpc functions. Fun, fun, fun. J.F.
* added lsaenumprivsaccount and lsalookupprivvalue to rpcclientJean-François Micouleau2001-11-241-0/+13
| | | | | | and more to come ... J.F.
* Oops.Tim Potter2001-09-141-1/+1
|
* Discovered a whole lot more opcodes on the LSA pipe while writing a rpcTim Potter2001-09-131-6/+38
| | | | | | | | scanner. There's lots of quota, privilege, and trusted domain goodness waiting to be reverse engineered here! Unfortunately the scanner can crash LSASS.EXE on NT4 just by writing packets containing 0xdeadbeef. )-:
* the next stage in the NTSTATUS/WERROR change. smbd and nmbd now compile, but ↵Andrew Tridgell2001-09-041-1/+0
| | | | the client code still needs some work
* started converting NTSTATUS to be a structure on systems with gcc in order ↵Andrew Tridgell2001-08-271-16/+16
| | | | to make it type incompatible with BOOL so we catch errors sooner. This has already found a number of bugs
* implement:Jean-François Micouleau2001-07-091-2/+150
| | | | | | | | | | | | | LSA_ENUM_PRIVS LSA_PRIV_GET_DISPNAME LSA_ENUM_ACCOUNTS LSA_OPENACCOUNT LSA_ENUMPRIVSACCOUNT LSA_GETSYSTEMACCOUNT It's a work in progress. nobody should expect it to work J.F.
* Added LsaGetConnectedCredentials patch from Manoj Naik <manoj@almaden.ibm.com>.Jeremy Allison2001-06-291-0/+28
| | | | Jeremy.
* Merge of new 2.2 code into HEAD (Gerald I hate you :-) :-). Allows new SAMRJeremy Allison2001-03-111-0/+1
| | | | | | RPC code to merge with new passdb code. Currently rpcclient doesn't compile. I'm working on it... Jeremy.
* Started conversion of lsa server code to canonical format (as srv_reg andJeremy Allison2001-02-261-0/+19
| | | | | srv_samr have been). Jeremy.
* Fixed "object picker can't determine if object in domain" bug seen from W2KJeremy Allison2001-01-251-7/+26
| | | | | | | clients. Did this by importing Samba-TNG code that correctly handles LSA lookups. *MANY* thanks to Luke, Sander, Elrond and the rest of the TNG gang ! Jeremy
* Merge of various fixes from the tng headers.Tim Potter2001-01-111-5/+5
|
* make protoTim Potter2000-12-131-2/+2
| | | | Updates for dynamic sized lookup names/sids
* Merged in Tim's changes : Removed static limit of MAX_LOOKUP_SIDS in rpc ↵Jeremy Allison2000-12-121-5/+5
| | | | | | | server and client lsa_lookup_names() and lsa_lookup_sids(). Jeremy.
* Port of lsa_lookup_sids() and lsa_lookup_names() rpc client functions fromTim Potter2000-12-081-1/+1
| | | | | | | | | TNG branch. Re-instated lsa_lookup_sids and lsa_lookup_names functions in rpcclient. This requires most samba binaries to link in another handful of object files due to uncessary coupling between modules. )-:
* Some code moved back from TNG - updates to LSA stuff. Not yet used butJeremy Allison2000-09-201-2/+19
| | | | | will be needed soon. Jeremy.
* Fix for the SID history problem when using a Win2k domain controllerJeremy Allison2000-09-061-1/+1
| | | | | with security=domain. Also fixed to dynamically allocate the SIDs and GIDs. Jeremy.
* first pass at updating head branch to be to be the same as the SAMBA_2_0 branchAndrew Tridgell1999-12-131-91/+32
|
* added regqueryval command (experimental) to get reg_io_q_info() andLuke Leighton1999-11-181-1/+1
| | | | | | | | reg_io_r_info() working properly. previously they weren't well understood (well, they were the first of the registry functions i did, back in december 97, ok??? :-) set ntversion to 0x1 in SAMQUERY, so that we reply same as NT4 srv.
* added lsaenumdomains command.Luke Leighton1999-11-011-8/+10
| | | | | attempting to get blood out of a stone^H^H^H^H^H^H^H^H^H^H^H^H^H^H^H^H^H querysecret to work, it keeps returning access denied.
* Fixed LSA Lookup Names. There were a few too many NULL pointers in aMatthew Chapman1999-03-241-2/+4
| | | | negative response, which tended to crash lsass.exe.
* Implemented encryption algorithm used for a number of RPC buffers.Matthew Chapman1999-03-191-1/+1
| | | | | | | (actually, decryption only currently because I need to get some sleep). Basically another Microsoft twist on DES; the "master key" is the user's NT hash MD4'd and subsets of this are chosen as the 56-bit DES keys.
* Adding LSA_OPENSECRET (-> LsarOpenSecret) and LSA_QUERYSECRETMatthew Chapman1999-03-181-1/+59
| | | | | | | | | | (-> LsarQuerySecret) on client side, including rpcclient command "querysecret" for others to play with. The major obstacle is working out the encryption algorithm used for the secret value. It definitely uses the NT hash as part of the key, and it seems the block size is 64 bits - probably DES based - but I can't work out what's done in between. Help required.
* fix for potential lsass.exe crashing due to negative response fromLuke Leighton1998-12-201-1/+1
| | | | | | LsaLookupNames being incorrect. this is a bit wierd: why would the lsass.exe on the nt _client_ crash due to an LsaLookupNames response from a samba _server_?
* LsaLookupNames client call (first used as lookupnames command in rpcclient).Luke Leighton1998-11-251-23/+20
|
* rpcclient registry commands.Luke Leighton1998-11-101-11/+8
|
* bug-fixing against:Luke Leighton1998-10-151-4/+24
| | | | | | | | | | | | | | | | | | AS/U: it returns dce/rpc "first" and "last" bits _clear_ in a bind/ack response, when they should be set in a (small) packet. they also, in the bind/ack do not set a secondary address string at all, so we can't check against that... Win95: client-side dce/rpc code is a bit odd. it does a "WaitNamedPipeState" and has slightly different pipe-naming (\PIPE\LANMAN is joined by \PIPE\SRVSVC, \PIPE\WINREG etc whereas nt just has \PIPE\LANMAN and \PIPE\). Win95-USRMGR.EXE: added LsaOpenPolicy (renamed existing to LsaOpenPolicy2). added SamrConnect (renamed existing to SamrConnect2).
* lsa_lookup_sids command added. severe debugging needed on lookup_sidsLuke Leighton1998-09-301-19/+40
| | | | | | | | | code. added "quality of service" capability to lsa_open_policy code. different lsa_open_policy queries are *not* dealt with in the server code. answers like "0xC000 0022" - access denied - will have to be made to lsa_lookup_sids calls when a "quality of service" request is *not* specified in the lsa_open_policy call.
* added in some pdb_xxx routines that are needed by nispass.cLuke Leighton1998-09-291-11/+12
|
* expanded MAX_LOOKUP_SIDS to 30 (I saw 21 in a packet)Andrew Tridgell1998-08-221-1/+1
|
* loadparm.c: Removed 'domain other sids' parameter.Jeremy Allison1998-06-091-4/+4
| | | | | | | | | | | lib/rpc/include/rpc_lsa.h: Changed #defines for RPC calls - moved some, made LSA_LOOKUPNAMES correct. lib/rpc/include/rpc_misc.h: Changed DOMAIN_ALIAS_xxx to BUILTIN_ALIAS_xxx. Changed bitmasks for uid to rid to be 1 bit. lib/rpc/parse/parse_misc.c: Changed make_unistr2 to put length as given, max length as one more. lib/rpc/server/srv_netlog.c: Removed 'domain other sids' parameter. lib/rpc/server/srv_samr.c: Changed DOMAIN_ALIAS_xxx to BUILTIN_ALIAS_xxx. lib/rpc/server/srv_util.c: Changed DOMAIN_ALIAS_xxx to BUILTIN_ALIAS_xxx. Jeremy.
* "For I have laboured mightily on Luke's code, and hath brokenJeremy Allison1998-03-111-0/+288
all I saw" - the book of Jeremy, chapter 1 :-). So here is the mega-merge of the NTDOM branch server code. It doesn't include the new client side pieces, we'll look at that later. This should give the same functionality, server wise, as the NTDOM branch does, only merged into the main branch. Any fixes to domain controler functionality should be added to the main branch, not the NTDOM branch. This code compiles without warnings on gcc2.8, but will need further testing before we are sure all the working functionality of the NTDOM server branch has been correctly carried over. I hereby declare the server side of the NTDOM branch dead (and all who sail in her :-). Jeremy.