Changeset 988 for vendor/current/source3/winbindd/winbindd.h
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/source3/winbindd/winbindd.h
r740 r988 26 26 #include "nsswitch/winbind_struct_protocol.h" 27 27 #include "nsswitch/libwbclient/wbclient.h" 28 #include "librpc/gen_ndr/wbint.h" 28 #include "librpc/gen_ndr/dcerpc.h" 29 #include "librpc/gen_ndr/winbind.h" 29 30 30 31 #include "talloc_dict.h" 31 #include "smb_ldap.h"32 32 33 33 #include "../lib/util/tevent_ntstatus.h" … … 68 68 struct tevent_queue *out_queue; 69 69 struct winbindd_response *response; /* Respose to client */ 70 bool getpwent_initialized; /* Has getpwent_state been 71 * initialized? */ 72 bool getgrent_initialized; /* Has getgrent_state been 73 * initialized? */ 70 struct tevent_req *io_req; /* wb_req_read_* or wb_resp_write_* */ 74 71 75 72 struct getpwent_state *pwent_state; /* State for getpwent() */ … … 107 104 struct cli_state *cli; 108 105 106 enum dcerpc_AuthLevel auth_level; 107 109 108 struct rpc_pipe_client *samr_pipe; 110 109 struct policy_handle sam_connect_handle, sam_domain_handle; … … 115 114 116 115 struct rpc_pipe_client *netlogon_pipe; 116 struct netlogon_creds_cli_context *netlogon_creds; 117 uint32_t netlogon_flags; 118 bool netlogon_force_reauth; 117 119 }; 118 120 … … 139 141 struct dcerpc_binding_handle *binding_handle; 140 142 141 struct t imed_event*lockout_policy_event;142 struct t imed_event*machine_password_change_event;143 struct tevent_timer *lockout_policy_event; 144 struct tevent_timer *machine_password_change_event; 143 145 144 146 const struct winbindd_child_dispatch_table *table; … … 148 150 149 151 struct winbindd_domain { 150 fstring name;/* Domain name (NetBIOS) */151 fstring alt_name;/* alt Domain name, if any (FQDN for ADS) */152 fstring forest_name;/* Name of the AD forest we're in */152 char *name; /* Domain name (NetBIOS) */ 153 char *alt_name; /* alt Domain name, if any (FQDN for ADS) */ 154 char *forest_name; /* Name of the AD forest we're in */ 153 155 struct dom_sid sid; /* SID for this domain */ 154 uint32 domain_flags; /* Domain flags from netlogon.h */155 uint32 domain_type; /* Domain type from netlogon.h */156 uint32 domain_trust_attribs; /* Trust attribs from netlogon.h */156 uint32_t domain_flags; /* Domain flags from netlogon.h */ 157 uint32_t domain_type; /* Domain type from netlogon.h */ 158 uint32_t domain_trust_attribs; /* Trust attribs from netlogon.h */ 157 159 bool initialized; /* Did we already ask for the domain mode? */ 158 160 bool native_mode; /* is this a win2k domain in native mode ? */ … … 160 162 bool primary; /* is this our primary domain ? */ 161 163 bool internal; /* BUILTIN and member SAM */ 164 bool rodc; /* Are we an RODC for this AD domain? (do some operations locally) */ 162 165 bool online; /* is this domain available ? */ 163 166 time_t startup_time; /* When we set "startup" true. monotonic clock */ 164 167 bool startup; /* are we in the first 30 seconds after startup_time ? */ 165 168 166 bool can_do_samlogon_ex; /* Due to the lack of finer control what type167 * of DC we have, let us try to do a168 * credential-chain less samlogon_ex call169 * with AD and schannel. If this fails with170 * DCERPC_FAULT_OP_RNG_ERROR, then set this171 * to False. This variable is around so that172 * we don't have to try _ex every time. */173 174 169 bool can_do_ncacn_ip_tcp; 175 bool can_do_validation6;176 170 177 171 /* Lookup methods for this domain (LDAP or RPC) */ … … 186 180 void *private_data; 187 181 188 /*189 * idmap config settings, used to tell the idmap child which190 * special domain config to use for a mapping191 */192 bool have_idmap_config;193 uint32_t id_range_low, id_range_high;194 195 182 /* A working DC */ 196 183 pid_t dc_probe_pid; /* Child we're using to detect the DC. */ 197 fstringdcname;184 char *dcname; 198 185 struct sockaddr_storage dcaddr; 199 186 … … 201 188 202 189 time_t last_seq_check; 203 uint32 sequence_number;190 uint32_t sequence_number; 204 191 NTSTATUS last_status; 205 192 … … 214 201 /* Callback we use to try put us back online. */ 215 202 216 uint32 check_online_timeout;217 struct t imed_event*check_online_event;203 uint32_t check_online_timeout; 204 struct tevent_timer *check_online_event; 218 205 219 206 /* Linked list info */ … … 238 225 NTSTATUS (*query_user_list)(struct winbindd_domain *domain, 239 226 TALLOC_CTX *mem_ctx, 240 uint32 *num_entries,227 uint32_t *num_entries, 241 228 struct wbint_userinfo **info); 242 229 … … 244 231 NTSTATUS (*enum_dom_groups)(struct winbindd_domain *domain, 245 232 TALLOC_CTX *mem_ctx, 246 uint32 *num_entries,233 uint32_t *num_entries, 247 234 struct wb_acct_info **info); 248 235 … … 250 237 NTSTATUS (*enum_local_groups)(struct winbindd_domain *domain, 251 238 TALLOC_CTX *mem_ctx, 252 uint32 *num_entries,239 uint32_t *num_entries, 253 240 struct wb_acct_info **info); 254 241 … … 273 260 TALLOC_CTX *mem_ctx, 274 261 const struct dom_sid *domain_sid, 275 uint32 *rids,262 uint32_t *rids, 276 263 size_t num_rids, 277 264 char **domain_name, … … 291 278 TALLOC_CTX *mem_ctx, 292 279 const struct dom_sid *user_sid, 293 uint32 *num_groups, struct dom_sid **user_gids);280 uint32_t *num_groups, struct dom_sid **user_gids); 294 281 295 282 /* Lookup all aliases that the sids delivered are member of. This is … … 297 284 NTSTATUS (*lookup_useraliases)(struct winbindd_domain *domain, 298 285 TALLOC_CTX *mem_ctx, 299 uint32 num_sids,286 uint32_t num_sids, 300 287 const struct dom_sid *sids, 301 uint32 *num_aliases,302 uint32 **alias_rids);288 uint32_t *num_aliases, 289 uint32_t **alias_rids); 303 290 304 291 /* find all members of the group with the specified group_rid */ … … 307 294 const struct dom_sid *group_sid, 308 295 enum lsa_SidType type, 309 uint32 *num_names,296 uint32_t *num_names, 310 297 struct dom_sid **sid_mem, char ***names, 311 uint32 **name_types);298 uint32_t **name_types); 312 299 313 300 /* return the current global sequence number */ 314 NTSTATUS (*sequence_number)(struct winbindd_domain *domain, uint32 *seq);301 NTSTATUS (*sequence_number)(struct winbindd_domain *domain, uint32_t *seq); 315 302 316 303 /* return the lockout policy */ … … 353 340 const char *dns_name; 354 341 struct dom_sid sid; 355 uint32 trust_flags;356 uint32 trust_attribs;357 uint32 trust_type;342 uint32_t trust_flags; 343 uint32_t trust_attribs; 344 uint32_t trust_type; 358 345 }; 359 346 … … 388 375 time_t renew_until; 389 376 time_t refresh_time; 390 struct t imed_event*event;377 struct tevent_timer *event; 391 378 }; 392 379 … … 396 383 #define WINBINDD_RESCAN_FREQ lp_winbind_cache_time() 397 384 #define WINBINDD_PAM_AUTH_KRB5_RENEW_TIME 2592000 /* one month */ 398 #define DOM_SEQUENCE_NONE ((uint32)-1) 399 400 #define winbind_event_context server_event_context 385 #define DOM_SEQUENCE_NONE ((uint32_t)-1) 401 386 402 387 #endif /* _WINBINDD_H */
Note:
See TracChangeset
for help on using the changeset viewer.