| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
| |
samr_lookup_rids() moved to a dynamic memory structure not a
static one limited to 32 RIDs. cli_pipe.c reading wasn't checking
ERRmoredata when DOS error codes negotiated (this terminates
MSRPC code with prejudice).
|
|
|
|
|
|
| |
this format is what i would like _all_ these functions to be
(returning status codes, not BOOL) but that's a horrendous
amount of work at the moment :)
|
|
|
|
| |
HAVE_READLINE
|
| |
|
| |
|
| |
|
|
|
|
| |
domain info. adjusting net_srv_get_info function.
|
|
|
|
| |
into a separate module
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
- cleanup
- #defined report to sprintf as it's #defined to another function in
other uses of cmd_lsarpc.c
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
being called from rpcclient.c
improved add_groupmem command, but cannot test it against nt non-pdc!
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
simplest method to get rpcclient's reggetsec command working. the
buffers passed as arguments in do_reg_get_key_sec() do need to be
locally allocated not dynamically allocated, as two calls to
reg_get_key_sec() are needed. on the first, the server fills in the
size of the security descriptor buffer needed. on the second, the
server fills in the security descriptor buffer.
|
| |
|
| |
|
| |
|
|
|
|
| |
and command completion implemented.
|
| |
|
|
|
|
| |
of a pstrcpy into an fstring).
|
|
|
|
|
| |
to alignment, missing fields, etc. - it should now work correctly.
There is still the problem of decoding the private data field.
|
| |
|
|
|
|
|
|
| |
and of rpcclient eventlog funtion
Jean Francois
|
|
|
|
|
|
| |
Security or Application. That's a crude equivalent to the eventviewer.
Jean Francois
|
|
|
|
|
| |
Also added special "now" time to the "at" command, e.g.:
at now /i cmd ; pops up a command prompt
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
version of the NT command.
at { time [/INTERACTIVE] [{/EVERY|/NEXT}:5,Sun,...] command | [/DEL] [jobid] }
Examples (options used in abbreviated form):
at ; Shows all jobs
at 1 ; Detail on job 1
at /D ; Deletes all jobs
at /D 1 ; Deletes job 1
at 11:11:11AM /I /N:1 d:\humour\silly.exe ; First of next month
at 9:00AM /E:M,T,W,Th,F net send MATTY Hi ; Each weekday
at 11:00PM /E c:\winnt\backup.exe ; Every day
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Added SEC_CHAN_BDC
* Propagate sec_chan into the various functions which change trust account
passwords, so they can be used for domain control and inter-domain
trusts.
* Fix for endianness problem reported by Edan Idzerda <edan@mtu.edu>. A
BUFFER2 is really a "unibuf" in my terminology and we should treat it as
such.
* Added some more common NT structures (BIGINT, BUFHDR2, BUFFER4).
* Added NET_SAM_SYNC (-> NetDatabaseSync2) RPC for account replication.
Still experimental and incomplete, with a few too many NULL security
descriptors lying around (must go look at Jeremy's SD code). Haven't
worked out password encryption yet either.
However, the XXX_INFO structures I've added to rpc_netlogon.h are quite
nice as they give some insight into how these objects are stored in the
SAM.
|
| |
|
| |
|
|
|
|
| |
my corrections :)
|
|
|
|
|
|
| |
remember: only close handles that you've previously opened. if the
lsa_open_secret() succeeds then and only then can you close it.
if the lsa_open_policy2() succeeds then and only then can you close it.
|
|
|
|
|
|
|
|
|
|
| |
(-> LsarQuerySecret) on client side, including rpcclient command
"querysecret" for others to play with.
The major obstacle is working out the encryption algorithm used
for the secret value. It definitely uses the NT hash as part of the
key, and it seems the block size is 64 bits - probably DES based -
but I can't work out what's done in between. Help required.
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
last count (probably an ENUM / resume handle) should always be returned
even if there are no items being returned.
- got fed up of seven intendation levels in cmd_samr.c, maximum recommended
in *any* code is three! made some sub-fns instead.
|
| |
|
|
|
|
| |
rpcclient [-m messsage] [-t timeout] [-r or --reboot].
|
|
|
|
|
|
| |
(you can do "lookupdomain MYDOMAIN" and "lookupdomain BUILTIN" and the
results won't be too surprising), but it will come in useful testing the
new password database code I'm working on.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Added SAMR_LOOKUP_DOMAIN (-> SamrLookupDomainInSamServer)
* Added real SAMR_ENUM_DOM_GROUPS (corresponding to
SamrEnumerateGroupsInDomain). The existing one is just an alias for
SamrQueryDisplayInformation (see below).
* Added three extra info levels to SAMR_QUERY_DISPINFO. Info level 3 is
what was previously SAMR_ENUM_DOM_GROUPS; info levels 4 and 5 are
simple user/group list requests used by Win9x and I suspect (haven't
checked) the "low speed connection" User Manager.
* Added another two aliases for SAMR_QUERY_DISPINFO, opcodes 0x30 and
0x33. Usually the first is with info level 3 and the second 4 but there is
some overlap so indeed these should be implemented as just aliases.
* Return ERRDOS/ERRmoredata on extra data instead of
STATUS_BUFFER_OVERFLOW for Win95's benefit. On a named pipe this results
in an SMBreadX as usual.
Still need to fix SAMR_QUERY_DOMAIN_INFO which has a hard-coded number of
users and groups - which Win95 proceeds to truncate at.
|
| |
|
| |
|