2 * Unix SMB/CIFS implementation.
3 * RPC Pipe client / server routines
4 * Copyright (C) Guenther Deschner 2008.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 /*******************************************************************
24 ********************************************************************/
26 void init_netr_SamBaseInfo(struct netr_SamBaseInfo
*r
,
30 NTTIME last_password_change
,
31 NTTIME allow_password_change
,
32 NTTIME force_password_change
,
33 const char *account_name
,
34 const char *full_name
,
35 const char *logon_script
,
36 const char *profile_path
,
37 const char *home_directory
,
38 const char *home_drive
,
40 uint16_t bad_password_count
,
43 struct samr_RidWithAttributeArray groups
,
45 struct netr_UserSessionKey key
,
46 const char *logon_server
,
48 struct dom_sid2
*domain_sid
,
49 struct netr_LMSessionKey LMSessKey
,
52 r
->last_logon
= last_logon
;
53 r
->last_logoff
= last_logoff
;
54 r
->acct_expiry
= acct_expiry
;
55 r
->last_password_change
= last_password_change
;
56 r
->allow_password_change
= allow_password_change
;
57 r
->force_password_change
= force_password_change
;
58 init_lsa_String(&r
->account_name
, account_name
);
59 init_lsa_String(&r
->full_name
, full_name
);
60 init_lsa_String(&r
->logon_script
, logon_script
);
61 init_lsa_String(&r
->profile_path
, profile_path
);
62 init_lsa_String(&r
->home_directory
, home_directory
);
63 init_lsa_String(&r
->home_drive
, home_drive
);
64 r
->logon_count
= logon_count
;
65 r
->bad_password_count
= bad_password_count
;
67 r
->primary_gid
= primary_gid
;
69 r
->user_flags
= user_flags
;
71 init_lsa_StringLarge(&r
->logon_server
, logon_server
);
72 init_lsa_StringLarge(&r
->domain
, domain
);
73 r
->domain_sid
= domain_sid
;
74 r
->LMSessKey
= LMSessKey
;
75 r
->acct_flags
= acct_flags
;
78 /*******************************************************************
80 ********************************************************************/
82 void init_netr_SamInfo3(struct netr_SamInfo3
*r
,
86 NTTIME last_password_change
,
87 NTTIME allow_password_change
,
88 NTTIME force_password_change
,
89 const char *account_name
,
90 const char *full_name
,
91 const char *logon_script
,
92 const char *profile_path
,
93 const char *home_directory
,
94 const char *home_drive
,
96 uint16_t bad_password_count
,
99 struct samr_RidWithAttributeArray groups
,
101 struct netr_UserSessionKey key
,
102 const char *logon_server
,
104 struct dom_sid2
*domain_sid
,
105 struct netr_LMSessionKey LMSessKey
,
108 struct netr_SidAttr
*sids
)
110 init_netr_SamBaseInfo(&r
->base
,
114 last_password_change
,
115 allow_password_change
,
116 force_password_change
,
135 r
->sidcount
= sidcount
;
139 /*******************************************************************
141 ********************************************************************/
143 void init_netr_IdentityInfo(struct netr_IdentityInfo
*r
,
144 const char *domain_name
,
145 uint32_t parameter_control
,
146 uint32_t logon_id_low
,
147 uint32_t logon_id_high
,
148 const char *account_name
,
149 const char *workstation
)
151 init_lsa_String(&r
->domain_name
, domain_name
);
152 r
->parameter_control
= parameter_control
;
153 r
->logon_id_low
= logon_id_low
;
154 r
->logon_id_high
= logon_id_high
;
155 init_lsa_String(&r
->account_name
, account_name
);
156 init_lsa_String(&r
->workstation
, workstation
);
159 /*******************************************************************
161 This is a network logon packet. The log_id parameters
162 are what an NT server would generate for LUID once the
163 user is logged on. I don't think we care about them.
165 Note that this has no access to the NT and LM hashed passwords,
166 so it forwards the challenge, and the NT and LM responses (24
167 bytes each) over the secure channel to the Domain controller
168 for it to say yea or nay. This is the preferred method of
169 checking for a logon as it doesn't export the password
170 hashes to anyone who has compromised the secure channel. JRA.
172 ********************************************************************/
174 void init_netr_NetworkInfo(struct netr_NetworkInfo
*r
,
175 const char *domain_name
,
176 uint32_t parameter_control
,
177 uint32_t logon_id_low
,
178 uint32_t logon_id_high
,
179 const char *account_name
,
180 const char *workstation
,
181 uint8_t challenge
[8],
182 struct netr_ChallengeResponse nt
,
183 struct netr_ChallengeResponse lm
)
185 init_netr_IdentityInfo(&r
->identity_info
,
192 memcpy(r
->challenge
, challenge
, 8);
197 /*******************************************************************
199 ********************************************************************/
201 void init_netr_PasswordInfo(struct netr_PasswordInfo
*r
,
202 const char *domain_name
,
203 uint32_t parameter_control
,
204 uint32_t logon_id_low
,
205 uint32_t logon_id_high
,
206 const char *account_name
,
207 const char *workstation
,
208 struct samr_Password lmpassword
,
209 struct samr_Password ntpassword
)
211 init_netr_IdentityInfo(&r
->identity_info
,
218 r
->lmpassword
= lmpassword
;
219 r
->ntpassword
= ntpassword
;