Changeset 272 for branches/samba-3.2.x/source/rpc_server/srv_samr_nt.c
- Timestamp:
- Jun 16, 2009, 5:52:30 PM (17 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.2.x/source/rpc_server/srv_samr_nt.c
r235 r272 863 863 sid_string_dbg(&pol_sid))); 864 864 865 status = access_check_samr_function(acc_granted,866 STD_RIGHT_READ_CONTROL_ACCESS,867 "_samr_QuerySecurity");868 if (!NT_STATUS_IS_OK(status)) {869 return status;870 }871 872 865 /* Check what typ of SID is beeing queried (e.g Domain SID, User SID, Group SID) */ 873 866 … … 1166 1159 num_groups, groups); 1167 1160 1161 1162 1163 1164 1165 1166 1168 1167 samr_array->count = num_groups; 1169 1168 samr_array->entries = samr_entries; … … 1234 1233 DEBUG(5,("_samr_EnumDomainAliases: %d\n", __LINE__)); 1235 1234 1235 1236 1237 1238 1239 1240 1236 1241 samr_array->count = num_aliases; 1237 1242 samr_array->entries = samr_entries; … … 1471 1476 if (!find_policy_by_hnd(p, r->in.domain_handle, (void **)(void *)&info)) 1472 1477 return NT_STATUS_INVALID_HANDLE; 1473 1474 status = access_check_samr_function(info->acc_granted,1475 SA_RIGHT_DOMAIN_ENUM_ACCOUNTS,1476 "_samr_QueryDisplayInfo");1477 if (!NT_STATUS_IS_OK(status)) {1478 return status;1479 }1480 1478 1481 1479 /* … … 2121 2119 return NT_STATUS_INVALID_HANDLE; 2122 2120 2123 status = access_check_samr_function(acc_granted,2124 0, /* Don't know the acc_bits yet */2125 "_samr__LookupRids");2126 if (!NT_STATUS_IS_OK(status)) {2127 return status;2128 }2129 2130 2121 if (num_rids > 1000) { 2131 2122 DEBUG(0, ("Got asked for %d rids (more than 1000) -- according " … … 2700 2691 return NT_STATUS_INVALID_HANDLE; 2701 2692 2702 status = access_check_samr_function(info->acc_granted,2703 SAMR_USER_ACCESS_GET_ATTRIBUTES,2704 "_samr_QueryUserInfo");2705 if (!NT_STATUS_IS_OK(status)) {2706 return status;2707 }2708 2709 2693 domain_sid = info->sid; 2710 2694 … … 2949 2933 return NT_STATUS_INVALID_HANDLE; 2950 2934 } 2951 2952 status = access_check_samr_function(info->acc_granted,2953 SA_RIGHT_SAM_LOOKUP_DOMAIN,2954 "_samr_QueryDomainInfo" );2955 2956 if ( !NT_STATUS_IS_OK(status) )2957 return status;2958 2935 2959 2936 switch (r->in.level) { … … 5671 5648 time_t u_logout; 5672 5649 time_t u_lock_duration, u_reset_time; 5673 NTSTATUS result;5674 5650 5675 5651 DEBUG(5,("_samr_SetDomainInfo: %d\n", __LINE__)); … … 5678 5654 if (!find_policy_by_hnd(p, r->in.domain_handle, (void **)(void *)&info)) 5679 5655 return NT_STATUS_INVALID_HANDLE; 5680 5681 /* We do have different access bits for info5682 * levels here, but we're really just looking for5683 * GENERIC_RIGHTS_DOMAIN_WRITE access. Unfortunately5684 * this maps to different specific bits. So5685 * assume if we have SA_RIGHT_DOMAIN_SET_INFO_15686 * set we are ok. */5687 5688 result = access_check_samr_function(info->acc_granted,5689 SA_RIGHT_DOMAIN_SET_INFO_1,5690 "_samr_SetDomainInfo");5691 5692 if (!NT_STATUS_IS_OK(result))5693 return result;5694 5656 5695 5657 DEBUG(5,("_samr_SetDomainInfo: level: %d\n", r->in.level)); … … 5750 5712 uint32_t num_account = 0; 5751 5713 struct samr_displayentry *entries = NULL; 5752 NTSTATUS status;5753 5714 5754 5715 DEBUG(5,("_samr_GetDisplayEnumerationIndex: %d\n", __LINE__)); … … 5757 5718 if (!find_policy_by_hnd(p, r->in.domain_handle, (void **)(void *)&info)) { 5758 5719 return NT_STATUS_INVALID_HANDLE; 5759 }5760 5761 status = access_check_samr_function(info->acc_granted,5762 SA_RIGHT_DOMAIN_ENUM_ACCOUNTS,5763 "_samr_GetDisplayEnumerationIndex");5764 if (!NT_STATUS_IS_OK(status)) {5765 return status;5766 5720 } 5767 5721
Note:
See TracChangeset
for help on using the changeset viewer.
