2 Unix SMB/CIFS implementation.
4 Copyright (C) Tim Potter 2000-2001,
5 Copyright (C) Andrew Tridgell 1992-1997,2000,
6 Copyright (C) Rafal Szczesniak 2002.
7 Copyright (C) Jeremy Allison 2005.
8 Copyright (C) Guenther Deschner 2008.
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include "../libcli/auth/libcli_auth.h"
26 #include "../librpc/gen_ndr/cli_samr.h"
27 #include "rpc_client/cli_samr.h"
28 #include "../lib/crypto/arcfour.h"
30 /* User change password */
32 NTSTATUS
rpccli_samr_chgpasswd_user(struct rpc_pipe_client
*cli
,
34 struct policy_handle
*user_handle
,
35 const char *newpassword
,
36 const char *oldpassword
)
38 NTSTATUS result
= NT_STATUS_UNSUCCESSFUL
;
39 struct samr_Password hash1
, hash2
, hash3
, hash4
, hash5
, hash6
;
41 uchar old_nt_hash
[16];
42 uchar old_lm_hash
[16];
43 uchar new_nt_hash
[16];
44 uchar new_lm_hash
[16];
46 ZERO_STRUCT(old_nt_hash
);
47 ZERO_STRUCT(old_lm_hash
);
48 ZERO_STRUCT(new_nt_hash
);
49 ZERO_STRUCT(new_lm_hash
);
51 DEBUG(10,("rpccli_samr_chgpasswd_user\n"));
53 E_md4hash(oldpassword
, old_nt_hash
);
54 E_md4hash(newpassword
, new_nt_hash
);
56 E_deshash(oldpassword
, old_lm_hash
);
57 E_deshash(newpassword
, new_lm_hash
);
59 E_old_pw_hash(new_lm_hash
, old_lm_hash
, hash1
.hash
);
60 E_old_pw_hash(old_lm_hash
, new_lm_hash
, hash2
.hash
);
61 E_old_pw_hash(new_nt_hash
, old_nt_hash
, hash3
.hash
);
62 E_old_pw_hash(old_nt_hash
, new_nt_hash
, hash4
.hash
);
63 E_old_pw_hash(old_lm_hash
, new_nt_hash
, hash5
.hash
);
64 E_old_pw_hash(old_nt_hash
, new_lm_hash
, hash6
.hash
);
66 result
= rpccli_samr_ChangePasswordUser(cli
, mem_ctx
,
83 /* User change password */
85 NTSTATUS
rpccli_samr_chgpasswd_user2(struct rpc_pipe_client
*cli
,
88 const char *newpassword
,
89 const char *oldpassword
)
91 NTSTATUS result
= NT_STATUS_UNSUCCESSFUL
;
92 struct samr_CryptPassword new_nt_password
;
93 struct samr_CryptPassword new_lm_password
;
94 struct samr_Password old_nt_hash_enc
;
95 struct samr_Password old_lanman_hash_enc
;
97 uchar old_nt_hash
[16];
98 uchar old_lanman_hash
[16];
99 uchar new_nt_hash
[16];
100 uchar new_lanman_hash
[16];
101 struct lsa_String server
, account
;
103 DEBUG(10,("rpccli_samr_chgpasswd_user2\n"));
105 init_lsa_String(&server
, cli
->srv_name_slash
);
106 init_lsa_String(&account
, username
);
108 /* Calculate the MD4 hash (NT compatible) of the password */
109 E_md4hash(oldpassword
, old_nt_hash
);
110 E_md4hash(newpassword
, new_nt_hash
);
112 if (lp_client_lanman_auth() &&
113 E_deshash(newpassword
, new_lanman_hash
) &&
114 E_deshash(oldpassword
, old_lanman_hash
)) {
115 /* E_deshash returns false for 'long' passwords (> 14
116 DOS chars). This allows us to match Win2k, which
117 does not store a LM hash for these passwords (which
118 would reduce the effective password length to 14) */
120 encode_pw_buffer(new_lm_password
.data
, newpassword
, STR_UNICODE
);
122 arcfour_crypt(new_lm_password
.data
, old_nt_hash
, 516);
123 E_old_pw_hash(new_nt_hash
, old_lanman_hash
, old_lanman_hash_enc
.hash
);
125 ZERO_STRUCT(new_lm_password
);
126 ZERO_STRUCT(old_lanman_hash_enc
);
129 encode_pw_buffer(new_nt_password
.data
, newpassword
, STR_UNICODE
);
131 arcfour_crypt(new_nt_password
.data
, old_nt_hash
, 516);
132 E_old_pw_hash(new_nt_hash
, old_nt_hash
, old_nt_hash_enc
.hash
);
134 result
= rpccli_samr_ChangePasswordUser2(cli
, mem_ctx
,
141 &old_lanman_hash_enc
);
146 /* User change password given blobs */
148 NTSTATUS
rpccli_samr_chng_pswd_auth_crap(struct rpc_pipe_client
*cli
,
150 const char *username
,
151 DATA_BLOB new_nt_password_blob
,
152 DATA_BLOB old_nt_hash_enc_blob
,
153 DATA_BLOB new_lm_password_blob
,
154 DATA_BLOB old_lm_hash_enc_blob
)
156 NTSTATUS result
= NT_STATUS_UNSUCCESSFUL
;
157 struct samr_CryptPassword new_nt_password
;
158 struct samr_CryptPassword new_lm_password
;
159 struct samr_Password old_nt_hash_enc
;
160 struct samr_Password old_lm_hash_enc
;
161 struct lsa_String server
, account
;
163 DEBUG(10,("rpccli_samr_chng_pswd_auth_crap\n"));
165 init_lsa_String(&server
, cli
->srv_name_slash
);
166 init_lsa_String(&account
, username
);
168 if (new_nt_password_blob
.length
> 0) {
169 memcpy(&new_nt_password
.data
, new_nt_password_blob
.data
, 516);
171 ZERO_STRUCT(new_nt_password_blob
);
174 if (new_lm_password_blob
.length
> 0) {
175 memcpy(&new_lm_password
.data
, new_lm_password_blob
.data
, 516);
177 ZERO_STRUCT(new_lm_password
);
180 if (old_nt_hash_enc_blob
.length
> 0) {
181 memcpy(&old_nt_hash_enc
.hash
, old_nt_hash_enc_blob
.data
, 16);
183 ZERO_STRUCT(old_nt_hash_enc
);
186 if (old_lm_hash_enc_blob
.length
> 0) {
187 memcpy(&old_lm_hash_enc
.hash
, old_lm_hash_enc_blob
.data
, 16);
189 ZERO_STRUCT(old_lm_hash_enc
);
192 result
= rpccli_samr_ChangePasswordUser2(cli
, mem_ctx
,
204 /* change password 3 */
206 NTSTATUS
rpccli_samr_chgpasswd_user3(struct rpc_pipe_client
*cli
,
208 const char *username
,
209 const char *newpassword
,
210 const char *oldpassword
,
211 struct samr_DomInfo1
**dominfo1
,
212 struct userPwdChangeFailureInformation
**reject
)
216 struct samr_CryptPassword new_nt_password
;
217 struct samr_CryptPassword new_lm_password
;
218 struct samr_Password old_nt_hash_enc
;
219 struct samr_Password old_lanman_hash_enc
;
221 uchar old_nt_hash
[16];
222 uchar old_lanman_hash
[16];
223 uchar new_nt_hash
[16];
224 uchar new_lanman_hash
[16];
226 struct lsa_String server
, account
;
228 DEBUG(10,("rpccli_samr_chgpasswd_user3\n"));
230 init_lsa_String(&server
, cli
->srv_name_slash
);
231 init_lsa_String(&account
, username
);
233 /* Calculate the MD4 hash (NT compatible) of the password */
234 E_md4hash(oldpassword
, old_nt_hash
);
235 E_md4hash(newpassword
, new_nt_hash
);
237 if (lp_client_lanman_auth() &&
238 E_deshash(newpassword
, new_lanman_hash
) &&
239 E_deshash(oldpassword
, old_lanman_hash
)) {
240 /* E_deshash returns false for 'long' passwords (> 14
241 DOS chars). This allows us to match Win2k, which
242 does not store a LM hash for these passwords (which
243 would reduce the effective password length to 14) */
245 encode_pw_buffer(new_lm_password
.data
, newpassword
, STR_UNICODE
);
247 arcfour_crypt(new_lm_password
.data
, old_nt_hash
, 516);
248 E_old_pw_hash(new_nt_hash
, old_lanman_hash
, old_lanman_hash_enc
.hash
);
250 ZERO_STRUCT(new_lm_password
);
251 ZERO_STRUCT(old_lanman_hash_enc
);
254 encode_pw_buffer(new_nt_password
.data
, newpassword
, STR_UNICODE
);
256 arcfour_crypt(new_nt_password
.data
, old_nt_hash
, 516);
257 E_old_pw_hash(new_nt_hash
, old_nt_hash
, old_nt_hash_enc
.hash
);
259 status
= rpccli_samr_ChangePasswordUser3(cli
, mem_ctx
,
266 &old_lanman_hash_enc
,
273 /* This function returns the bizzare set of (max_entries, max_size) required
274 for the QueryDisplayInfo RPC to actually work against a domain controller
275 with large (10k and higher) numbers of users. These values were
276 obtained by inspection using ethereal and NT4 running User Manager. */
278 void get_query_dispinfo_params(int loop_count
, uint32
*max_entries
,
298 default: /* loop_count >= 4 */
305 NTSTATUS
rpccli_try_samr_connects(struct rpc_pipe_client
*cli
,
307 uint32_t access_mask
,
308 struct policy_handle
*connect_pol
)
311 union samr_ConnectInfo info_in
, info_out
;
312 struct samr_ConnectInfo1 info1
;
313 uint32_t lvl_out
= 0;
317 info1
.client_version
= SAMR_CONNECT_W2K
;
318 info_in
.info1
= info1
;
320 status
= rpccli_samr_Connect5(cli
, mem_ctx
,
328 if (NT_STATUS_IS_OK(status
)) {
332 status
= rpccli_samr_Connect4(cli
, mem_ctx
,
337 if (NT_STATUS_IS_OK(status
)) {
341 status
= rpccli_samr_Connect2(cli
, mem_ctx
,