goto done;
}
- status = rpccli_srvsvc_NetFileClose(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetFileClose(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.fileid,
&werr);
goto done;
}
- status = rpccli_srvsvc_NetFileGetInfo(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetFileGetInfo(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.fileid,
r->in.level,
break;
}
- status = rpccli_srvsvc_NetFileEnum(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetFileEnum(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.base_path,
r->in.user_name,
goto done;
}
- status = rpccli_netr_GetDcName(pipe_cli, ctx,
+ status = rpccli_netr_GetDcName(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.domain_name,
(const char **)r->out.buffer,
goto done;
}
- status = rpccli_netr_GetAnyDCName(pipe_cli, ctx,
+ status = rpccli_netr_GetAnyDCName(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.domain_name,
(const char **)r->out.buffer,
break;
}
- status = rpccli_samr_CreateDomainGroup(pipe_cli, ctx,
+ status = rpccli_samr_CreateDomainGroup(pipe_cli, talloc_tos(),
&domain_handle,
&lsa_group_name,
SEC_STD_DELETE |
init_lsa_String(&info.description,
info1->grpi1_comment);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFODESCRIPTION,
&info);
init_lsa_String(&info.description,
info2->grpi2_comment);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFODESCRIPTION,
&info);
if (info2->grpi2_attributes != 0) {
info.attributes.attributes = info2->grpi2_attributes;
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOATTRIBUTES,
&info);
init_lsa_String(&info.description,
info3->grpi3_comment);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFODESCRIPTION,
&info);
if (info3->grpi3_attributes != 0) {
info.attributes.attributes = info3->grpi3_attributes;
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOATTRIBUTES,
&info);
goto done;
failed:
- rpccli_samr_DeleteDomainGroup(pipe_cli, ctx,
+ rpccli_samr_DeleteDomainGroup(pipe_cli, talloc_tos(),
&group_handle);
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_group_name, r->in.group_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_group_name,
goto done;
}
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SEC_STD_DELETE |
SAMR_GROUP_ACCESS_GET_MEMBERS |
goto done;
}
- status = rpccli_samr_QueryGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOATTRIBUTES,
&info);
goto done;
}
#endif
- status = rpccli_samr_QueryGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_QueryGroupMember(pipe_cli, talloc_tos(),
&group_handle,
&rid_array);
if (!NT_STATUS_IS_OK(status)) {
struct lsa_Strings names;
struct samr_Ids member_types;
- status = rpccli_samr_LookupRids(pipe_cli, ctx,
+ status = rpccli_samr_LookupRids(pipe_cli, talloc_tos(),
&domain_handle,
rid_array->count,
rid_array->rids,
for (i=0; i < rid_array->count; i++) {
- status = rpccli_samr_DeleteGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_DeleteGroupMember(pipe_cli, talloc_tos(),
&group_handle,
rid_array->rids[i]);
if (!NT_STATUS_IS_OK(status)) {
}
}
- status = rpccli_samr_DeleteDomainGroup(pipe_cli, ctx,
+ status = rpccli_samr_DeleteDomainGroup(pipe_cli, talloc_tos(),
&group_handle);
if (!NT_STATUS_IS_OK(status)) {
werr = ntstatus_to_werror(status);
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_group_name, r->in.group_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_group_name,
goto done;
}
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_SET_INFO |
SAMR_GROUP_ACCESS_LOOKUP_INFO,
case 0:
g0 = (struct GROUP_INFO_0 *)r->in.buffer;
init_lsa_String(&info.name, g0->grpi0_name);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFONAME,
&info);
case 1:
g1 = (struct GROUP_INFO_1 *)r->in.buffer;
init_lsa_String(&info.description, g1->grpi1_comment);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFODESCRIPTION,
&info);
case 2:
g2 = (struct GROUP_INFO_2 *)r->in.buffer;
init_lsa_String(&info.description, g2->grpi2_comment);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFODESCRIPTION,
&info);
goto done;
}
info.attributes.attributes = g2->grpi2_attributes;
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOATTRIBUTES,
&info);
case 3:
g3 = (struct GROUP_INFO_3 *)r->in.buffer;
init_lsa_String(&info.description, g3->grpi3_comment);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFODESCRIPTION,
&info);
goto done;
}
info.attributes.attributes = g3->grpi3_attributes;
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOATTRIBUTES,
&info);
case 1002:
g1002 = (struct GROUP_INFO_1002 *)r->in.buffer;
init_lsa_String(&info.description, g1002->grpi1002_comment);
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFODESCRIPTION,
&info);
case 1005:
g1005 = (struct GROUP_INFO_1005 *)r->in.buffer;
info.attributes.attributes = g1005->grpi1005_attributes;
- status = rpccli_samr_SetGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOATTRIBUTES,
&info);
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_group_name, r->in.group_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_group_name,
goto done;
}
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_LOOKUP_INFO,
rids.ids[0],
goto done;
}
- status = rpccli_samr_QueryGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOALL2,
&info);
if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_INFO_CLASS)) {
- status = rpccli_samr_QueryGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOALL,
&info);
}
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_group_name, r->in.group_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_group_name,
goto done;
}
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_ADD_MEMBER,
rids.ids[0],
init_lsa_String(&lsa_user_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_user_name,
goto done;
}
- status = rpccli_samr_AddGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_AddGroupMember(pipe_cli, talloc_tos(),
&group_handle,
rids.ids[0],
7); /* why ? */
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_group_name, r->in.group_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_group_name,
goto done;
}
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_REMOVE_MEMBER,
rids.ids[0],
init_lsa_String(&lsa_user_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_user_name,
goto done;
}
- status = rpccli_samr_DeleteGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_DeleteGroupMember(pipe_cli, talloc_tos(),
&group_handle,
rids.ids[0]);
if (!NT_STATUS_IS_OK(status)) {
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
goto done;
}
- status = rpccli_samr_QueryDomainInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryDomainInfo(pipe_cli, talloc_tos(),
&domain_handle,
2,
&domain_info);
init_lsa_String(&lsa_account_name, r->in.group_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
goto done;
}
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_GET_MEMBERS,
group_rids.ids[0],
goto done;
}
- status = rpccli_samr_QueryGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_QueryGroupMember(pipe_cli, talloc_tos(),
&group_handle,
&rid_array);
if (!NT_STATUS_IS_OK(status)) {
goto done;
}
- status = rpccli_samr_LookupRids(pipe_cli, ctx,
+ status = rpccli_samr_LookupRids(pipe_cli, talloc_tos(),
&domain_handle,
rid_array->count,
rid_array->rids,
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_account_name, r->in.group_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
goto done;
}
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_GET_MEMBERS |
SAMR_GROUP_ACCESS_ADD_MEMBER |
goto done;
}
- status = rpccli_samr_QueryGroupInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryGroupInfo(pipe_cli, talloc_tos(),
&group_handle,
GROUPINFOATTRIBUTES,
&group_info);
}
}
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
r->in.num_entries,
lsa_names,
member_rids = user_rids.ids;
num_member_rids = user_rids.count;
- status = rpccli_samr_QueryGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_QueryGroupMember(pipe_cli, talloc_tos(),
&group_handle,
&rid_array);
if (!NT_STATUS_IS_OK(status)) {
/* add list */
for (i=0; i < num_add_rids; i++) {
- status = rpccli_samr_AddGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_AddGroupMember(pipe_cli, talloc_tos(),
&group_handle,
add_rids[i],
7 /* ? */);
/* del list */
for (i=0; i < num_del_rids; i++) {
- status = rpccli_samr_DeleteGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_DeleteGroupMember(pipe_cli, talloc_tos(),
&group_handle,
del_rids[i]);
if (!NT_STATUS_IS_OK(status)) {
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
old_timeout = rpccli_set_timeout(pipe_cli, 600000);
- status = rpccli_wkssvc_NetrJoinDomain2(pipe_cli, ctx,
+ status = rpccli_wkssvc_NetrJoinDomain2(pipe_cli, talloc_tos(),
r->in.server,
r->in.domain,
r->in.account_ou,
old_timeout = rpccli_set_timeout(pipe_cli, 60000);
- status = rpccli_wkssvc_NetrUnjoinDomain2(pipe_cli, ctx,
+ status = rpccli_wkssvc_NetrUnjoinDomain2(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.account,
encrypted_password,
goto done;
}
- status = rpccli_wkssvc_NetrGetJoinInformation(pipe_cli, ctx,
+ status = rpccli_wkssvc_NetrGetJoinInformation(pipe_cli, talloc_tos(),
r->in.server_name,
&buffer,
(enum wkssvc_NetJoinStatus *)r->out.name_type,
&encrypted_password);
}
- status = rpccli_wkssvc_NetrGetJoinableOus2(pipe_cli, ctx,
+ status = rpccli_wkssvc_NetrGetJoinableOus2(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.domain,
r->in.account,
&encrypted_password);
}
- status = rpccli_wkssvc_NetrRenameMachineInDomain2(pipe_cli, ctx,
+ status = rpccli_wkssvc_NetrRenameMachineInDomain2(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.new_machine_name,
r->in.account,
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetJoinDomain, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUnjoinDomain, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGetJoinInformation, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGetJoinableOUs, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetRenameMachineInDomain, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetServerGetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetServerSetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGetDCName, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGetAnyDCName, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(DsGetDcName, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserAdd, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserDel, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserEnum, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserChangePassword, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserGetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserSetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserGetGroups, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserSetGroups, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserGetLocalGroups, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserModalsGet, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetUserModalsSet, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetQueryDisplayInformation, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupAdd, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupDel, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupEnum, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupSetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupGetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupAddUser, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupDelUser, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupGetUsers, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetGroupSetUsers, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupAdd, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupDel, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupGetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupSetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupEnum, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupAddMembers, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupDelMembers, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupGetMembers, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetLocalGroupSetMembers, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetRemoteTOD, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetShareAdd, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetShareDel, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetShareEnum, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetShareGetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetShareSetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetFileClose, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetFileGetInfo, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetFileEnum, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetShutdownInit, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(NetShutdownAbort, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(I_NetLogonControl, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
struct libnetapi_ctx *ctx = NULL;
NET_API_STATUS status;
WERROR werr;
+ TALLOC_CTX *frame = talloc_stackframe();
status = libnetapi_getctx(&ctx);
if (status != 0) {
+ TALLOC_FREE(frame);
return status;
}
NDR_PRINT_OUT_DEBUG(I_NetLogonControl2, &r);
}
+ TALLOC_FREE(frame);
return r.out.result;
}
init_lsa_String(&lsa_account_name, alias_name);
- status = rpccli_samr_CreateDomAlias(pipe_cli, ctx,
+ status = rpccli_samr_CreateDomAlias(pipe_cli, talloc_tos(),
&domain_handle,
&lsa_account_name,
SEC_STD_DELETE |
init_lsa_String(&alias_info.description, info1->lgrpi1_comment);
- status = rpccli_samr_SetAliasInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetAliasInfo(pipe_cli, talloc_tos(),
&alias_handle,
ALIASINFODESCRIPTION,
&alias_info);
done:
if (is_valid_policy_hnd(&alias_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &alias_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &alias_handle);
}
if (ctx->disable_policy_handle_cache) {
delete_alias:
- status = rpccli_samr_DeleteDomAlias(pipe_cli, ctx,
+ status = rpccli_samr_DeleteDomAlias(pipe_cli, talloc_tos(),
&alias_handle);
if (!NT_STATUS_IS_OK(status)) {
werr = ntstatus_to_werror(status);
done:
if (is_valid_policy_hnd(&alias_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &alias_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &alias_handle);
}
if (ctx->disable_policy_handle_cache) {
}
query_alias:
- status = rpccli_samr_QueryAliasInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryAliasInfo(pipe_cli, talloc_tos(),
&alias_handle,
ALIASINFOALL,
&alias_info);
done:
if (is_valid_policy_hnd(&alias_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &alias_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &alias_handle);
}
if (ctx->disable_policy_handle_cache) {
goto done;
}
- status = rpccli_samr_SetAliasInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetAliasInfo(pipe_cli, talloc_tos(),
&alias_handle,
alias_level,
alias_info);
done:
if (is_valid_policy_hnd(&alias_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &alias_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &alias_handle);
}
if (ctx->disable_policy_handle_cache) {
goto done;
}
- status = rpccli_samr_QueryDomainInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryDomainInfo(pipe_cli, talloc_tos(),
&builtin_handle,
2,
&builtin_info);
*r->out.total_entries += builtin_info->general.num_aliases;
}
- status = rpccli_samr_QueryDomainInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryDomainInfo(pipe_cli, talloc_tos(),
&domain_handle,
2,
&domain_info);
*r->out.total_entries += domain_info->general.num_aliases;
}
- status = rpccli_samr_EnumDomainAliases(pipe_cli, ctx,
+ status = rpccli_samr_EnumDomainAliases(pipe_cli, talloc_tos(),
&builtin_handle,
r->in.resume_handle,
&builtin_sam_array,
r->out.buffer);
}
- status = rpccli_samr_EnumDomainAliases(pipe_cli, ctx,
+ status = rpccli_samr_EnumDomainAliases(pipe_cli, talloc_tos(),
&domain_handle,
r->in.resume_handle,
&domain_sam_array,
struct lsa_SidArray current_sids;
- status = rpccli_samr_GetMembersInAlias(pipe_cli, ctx,
+ status = rpccli_samr_GetMembersInAlias(pipe_cli, talloc_tos(),
&alias_handle,
¤t_sids);
if (!NT_STATUS_IS_OK(status)) {
/* add list */
for (i=0; i < num_add_sids; i++) {
- status = rpccli_samr_AddAliasMember(pipe_cli, ctx,
+ status = rpccli_samr_AddAliasMember(pipe_cli, talloc_tos(),
&alias_handle,
&add_sids[i]);
if (!NT_STATUS_IS_OK(status)) {
/* del list */
for (i=0; i < num_del_sids; i++) {
- status = rpccli_samr_DeleteAliasMember(pipe_cli, ctx,
+ status = rpccli_samr_DeleteAliasMember(pipe_cli, talloc_tos(),
&alias_handle,
&del_sids[i]);
if (!NT_STATUS_IS_OK(status)) {
done:
if (is_valid_policy_hnd(&alias_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &alias_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &alias_handle);
}
if (ctx->disable_policy_handle_cache) {
goto done;
}
- status = rpccli_netr_LogonControl(pipe_cli, ctx,
+ status = rpccli_netr_LogonControl(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.function_code,
r->in.query_level,
switch (r->in.function_code) {
case NETLOGON_CONTROL_TC_VERIFY:
case NETLOGON_CONTROL_SET_DBFLAG:
- status = rpccli_netr_LogonControl2Ex(pipe_cli, ctx,
+ status = rpccli_netr_LogonControl2Ex(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.function_code,
r->in.query_level,
&werr);
break;
default:
- status = rpccli_netr_LogonControl2(pipe_cli, ctx,
+ status = rpccli_netr_LogonControl2(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.function_code,
r->in.query_level,
goto done;
}
- status = rpccli_srvsvc_NetSrvGetInfo(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetSrvGetInfo(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.level,
&info,
goto done;
}
- status = rpccli_srvsvc_NetSrvSetInfo(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetSrvSetInfo(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.level,
&info,
goto done;
}
- status = rpccli_srvsvc_NetRemoteTOD(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetRemoteTOD(pipe_cli, talloc_tos(),
r->in.server_name,
&info,
&werr);
goto done;
}
- status = rpccli_srvsvc_NetShareAdd(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetShareAdd(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.level,
&info,
goto done;
}
- status = rpccli_srvsvc_NetShareDel(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetShareDel(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.net_name,
r->in.reserved,
break;
}
- status = rpccli_srvsvc_NetShareEnumAll(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetShareEnumAll(pipe_cli, talloc_tos(),
r->in.server_name,
&info_ctr,
r->in.prefmaxlen,
goto done;
}
- status = rpccli_srvsvc_NetShareGetInfo(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetShareGetInfo(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.net_name,
r->in.level,
goto done;
}
- status = rpccli_srvsvc_NetShareSetInfo(pipe_cli, ctx,
+ status = rpccli_srvsvc_NetShareSetInfo(pipe_cli, talloc_tos(),
r->in.server_name,
r->in.net_name,
r->in.level,
init_lsa_StringLarge(&message, r->in.message);
- status = rpccli_initshutdown_Init(pipe_cli, ctx,
+ status = rpccli_initshutdown_Init(pipe_cli, talloc_tos(),
NULL,
&message,
r->in.timeout,
goto done;
}
- status = rpccli_initshutdown_Abort(pipe_cli, ctx,
+ status = rpccli_initshutdown_Abort(pipe_cli, talloc_tos(),
NULL,
&werr);
if (!NT_STATUS_IS_OK(status)) {
session_key,
&user_info.info25.password);
- status = rpccli_samr_SetUserInfo2(pipe_cli, ctx,
+ status = rpccli_samr_SetUserInfo2(pipe_cli, talloc_tos(),
user_handle,
25,
&user_info);
session_key,
&user_info.info23.password);
- status = rpccli_samr_SetUserInfo2(pipe_cli, ctx,
+ status = rpccli_samr_SetUserInfo2(pipe_cli, talloc_tos(),
user_handle,
23,
&user_info);
user_info.info21 = info21;
- status = rpccli_samr_SetUserInfo(pipe_cli, ctx,
+ status = rpccli_samr_SetUserInfo(pipe_cli, talloc_tos(),
user_handle,
21,
&user_info);
init_lsa_String(&lsa_account_name, uX.usriX_name);
- status = rpccli_samr_CreateUser2(pipe_cli, ctx,
+ status = rpccli_samr_CreateUser2(pipe_cli, talloc_tos(),
&domain_handle,
&lsa_account_name,
ACB_NORMAL,
goto done;
}
- status = rpccli_samr_QueryUserInfo(pipe_cli, ctx,
+ status = rpccli_samr_QueryUserInfo(pipe_cli, talloc_tos(),
&user_handle,
16,
&user_info);
goto done;
}
- status = rpccli_samr_GetUserPwInfo(pipe_cli, ctx,
+ status = rpccli_samr_GetUserPwInfo(pipe_cli, talloc_tos(),
&user_handle,
&pw_info);
if (!NT_STATUS_IS_OK(status)) {
goto done;
failed:
- rpccli_samr_DeleteUser(pipe_cli, ctx,
+ rpccli_samr_DeleteUser(pipe_cli, talloc_tos(),
&user_handle);
done:
if (is_valid_policy_hnd(&user_handle) && pipe_cli) {
- rpccli_samr_Close(pipe_cli, ctx, &user_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &user_handle);
}
if (ctx->disable_policy_handle_cache) {
goto done;
}
- status = rpccli_samr_OpenDomain(pipe_cli, ctx,
+ status = rpccli_samr_OpenDomain(pipe_cli, talloc_tos(),
&connect_handle,
SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT,
CONST_DISCARD(DOM_SID *, &global_sid_Builtin),
init_lsa_String(&lsa_account_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
goto done;
}
- status = rpccli_samr_OpenUser(pipe_cli, ctx,
+ status = rpccli_samr_OpenUser(pipe_cli, talloc_tos(),
&domain_handle,
SEC_STD_DELETE,
user_rids.ids[0],
sid_compose(&user_sid, domain_sid, user_rids.ids[0]);
- status = rpccli_samr_RemoveMemberFromForeignDomain(pipe_cli, ctx,
+ status = rpccli_samr_RemoveMemberFromForeignDomain(pipe_cli, talloc_tos(),
&builtin_handle,
&user_sid);
if (!NT_STATUS_IS_OK(status)) {
goto done;
}
- status = rpccli_samr_DeleteUser(pipe_cli, ctx,
+ status = rpccli_samr_DeleteUser(pipe_cli, talloc_tos(),
&user_handle);
if (!NT_STATUS_IS_OK(status)) {
werr = ntstatus_to_werror(status);
done:
if (is_valid_policy_hnd(&user_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &user_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &user_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_account_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
done:
if (is_valid_policy_hnd(&user_handle) && pipe_cli) {
- rpccli_samr_Close(pipe_cli, ctx, &user_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &user_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_account_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
goto done;
}
- status = rpccli_samr_OpenUser(pipe_cli, ctx,
+ status = rpccli_samr_OpenUser(pipe_cli, talloc_tos(),
&domain_handle,
user_mask,
user_rids.ids[0],
done:
if (is_valid_policy_hnd(&user_handle) && pipe_cli) {
- rpccli_samr_Close(pipe_cli, ctx, &user_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &user_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_account_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
goto done;
}
- status = rpccli_samr_OpenUser(pipe_cli, ctx,
+ status = rpccli_samr_OpenUser(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_USER_ACCESS_GET_GROUPS,
user_rids.ids[0],
goto done;
}
- status = rpccli_samr_GetGroupsForUser(pipe_cli, ctx,
+ status = rpccli_samr_GetGroupsForUser(pipe_cli, talloc_tos(),
&user_handle,
&rid_array);
if (!NT_STATUS_IS_OK(status)) {
rids[i] = rid_array->rids[i].rid;
}
- status = rpccli_samr_LookupRids(pipe_cli, ctx,
+ status = rpccli_samr_LookupRids(pipe_cli, talloc_tos(),
&domain_handle,
rid_array->count,
rids,
init_lsa_String(&lsa_account_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
goto done;
}
- status = rpccli_samr_OpenUser(pipe_cli, ctx,
+ status = rpccli_samr_OpenUser(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_USER_ACCESS_GET_GROUPS,
user_rids.ids[0],
}
}
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
r->in.num_entries,
lsa_names,
member_rids = group_rids.ids;
num_member_rids = group_rids.count;
- status = rpccli_samr_GetGroupsForUser(pipe_cli, ctx,
+ status = rpccli_samr_GetGroupsForUser(pipe_cli, talloc_tos(),
&user_handle,
&rid_array);
if (!NT_STATUS_IS_OK(status)) {
/* add list */
for (i=0; i < num_add_rids; i++) {
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_ADD_MEMBER,
add_rids[i],
goto done;
}
- status = rpccli_samr_AddGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_AddGroupMember(pipe_cli, talloc_tos(),
&group_handle,
user_rids.ids[0],
7 /* ? */);
}
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
}
/* del list */
for (i=0; i < num_del_rids; i++) {
- status = rpccli_samr_OpenGroup(pipe_cli, ctx,
+ status = rpccli_samr_OpenGroup(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_GROUP_ACCESS_REMOVE_MEMBER,
del_rids[i],
goto done;
}
- status = rpccli_samr_DeleteGroupMember(pipe_cli, ctx,
+ status = rpccli_samr_DeleteGroupMember(pipe_cli, talloc_tos(),
&group_handle,
user_rids.ids[0]);
if (!NT_STATUS_IS_OK(status)) {
}
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
}
done:
if (is_valid_policy_hnd(&group_handle)) {
- rpccli_samr_Close(pipe_cli, ctx, &group_handle);
+ rpccli_samr_Close(pipe_cli, talloc_tos(), &group_handle);
}
if (ctx->disable_policy_handle_cache) {
init_lsa_String(&lsa_account_name, r->in.user_name);
- status = rpccli_samr_LookupNames(pipe_cli, ctx,
+ status = rpccli_samr_LookupNames(pipe_cli, talloc_tos(),
&domain_handle,
1,
&lsa_account_name,
goto done;
}
- status = rpccli_samr_OpenUser(pipe_cli, ctx,
+ status = rpccli_samr_OpenUser(pipe_cli, talloc_tos(),
&domain_handle,
SAMR_USER_ACCESS_GET_GROUPS,
user_rids.ids[0],
goto done;
}
- status = rpccli_samr_GetGroupsForUser(pipe_cli, ctx,
+ status = rpccli_samr_GetGroupsForUser(pipe_cli, talloc_tos(),
&user_handle,
&rid_array);
if (!NT_STATUS_IS_OK(status)) {
}
}
- status = rpccli_samr_GetAliasMembership(pipe_cli, ctx,
+ status = rpccli_samr_GetAliasMembership(pipe_cli, talloc_tos(),
&domain_handle,
&sid_array,
&domain_rids);
}
}
- status = rpccli_samr_GetAliasMembership(pipe_cli, ctx,
+ status = rpccli_samr_GetAliasMembership(pipe_cli, talloc_tos(),
&builtin_handle,
&sid_array,
&builtin_rids);
}
}
- status = rpccli_samr_LookupRids(pipe_cli, ctx,
+ status = rpccli_samr_LookupRids(pipe_cli, talloc_tos(),
&builtin_handle,
num_rids,
rids,