2 Unix SMB/CIFS implementation.
3 NT Domain Authentication SMB / MSRPC client
4 Copyright (C) Andrew Tridgell 1992-2000
5 Copyright (C) Jeremy Allison 1998.
6 Largely re-written by Jeremy Allison (C) 2005.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 /* LSA Request Challenge. Sends our challenge to server, then gets
25 server response. These are used to generate the credentials.
26 The sent and received challenges are stored in the netlog pipe
27 private data. Only call this via rpccli_netlogon_setup_creds(). JRA.
30 static NTSTATUS rpccli_net_req_chal(struct rpc_pipe_client *cli,
32 const char *server_name,
33 const char *clnt_name,
34 const DOM_CHAL *clnt_chal_in,
35 DOM_CHAL *srv_chal_out)
37 prs_struct qbuf, rbuf;
40 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
42 /* create and send a MSRPC command with api NET_REQCHAL */
44 DEBUG(4,("cli_net_req_chal: LSA Request Challenge from %s to %s\n",
45 clnt_name, server_name));
47 /* store the parameters */
48 init_q_req_chal(&q, server_name, clnt_name, clnt_chal_in);
50 /* Marshall data and send request */
51 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_REQCHAL,
56 NT_STATUS_UNSUCCESSFUL);
62 if (NT_STATUS_IS_OK(result)) {
63 /* Store the returned server challenge. */
64 *srv_chal_out = r.srv_chal;
71 /****************************************************************************
74 Send the client credential, receive back a server credential.
75 Ensure that the server credential returned matches the session key
76 encrypt of the server challenge originally received. JRA.
77 ****************************************************************************/
79 NTSTATUS rpccli_net_auth2(struct rpc_pipe_client *cli,
81 uint32 *neg_flags, DOM_CHAL *srv_chal)
83 prs_struct qbuf, rbuf;
86 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
89 if ( sec_chan == SEC_CHAN_DOMAIN )
90 fstr_sprintf( machine_acct, "%s$", lp_workgroup() );
92 fstrcpy( machine_acct, cli->mach_acct );
94 /* create and send a MSRPC command with api NET_AUTH2 */
96 DEBUG(4,("cli_net_auth2: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n",
97 cli->srv_name_slash, machine_acct, sec_chan, global_myname(),
98 credstr(cli->clnt_cred.challenge.data), *neg_flags));
100 /* store the parameters */
102 init_q_auth_2(&q, cli->srv_name_slash, machine_acct,
103 sec_chan, global_myname(), &cli->clnt_cred.challenge,
106 /* turn parameters into data stream */
108 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_AUTH2,
113 NT_STATUS_UNSUCCESSFUL);
117 if (NT_STATUS_IS_OK(result)) {
121 * Check the returned value using the initial
122 * server received challenge.
126 if (cred_assert( &r.srv_chal, cli->sess_key, srv_chal, zerotime) == 0) {
129 * Server replied with bad credential. Fail.
131 DEBUG(0,("cli_net_auth2: server %s replied with bad credential (bad machine \
132 password ?).\n", cli->cli->desthost ));
133 return NT_STATUS_ACCESS_DENIED;
135 *neg_flags = r.srv_flgs.neg_flags;
142 /****************************************************************************
145 Send the client credential, receive back a server credential.
146 The caller *must* ensure that the server credential returned matches the session key
147 encrypt of the server challenge originally received. JRA.
148 ****************************************************************************/
150 static NTSTATUS rpccli_net_auth2(struct rpc_pipe_client *cli,
152 const char *server_name,
153 const char *account_name,
154 uint16 sec_chan_type,
155 const char *computer_name,
156 uint32 *neg_flags_inout,
157 const DOM_CHAL *clnt_chal_in,
158 DOM_CHAL *srv_chal_out)
160 prs_struct qbuf, rbuf;
163 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
165 /* create and send a MSRPC command with api NET_AUTH2 */
167 DEBUG(4,("cli_net_auth2: srv:%s acct:%s sc:%x mc: %s neg: %x\n",
168 server_name, account_name, sec_chan_type, computer_name,
171 /* store the parameters */
173 init_q_auth_2(&q, server_name, account_name, sec_chan_type,
174 computer_name, clnt_chal_in, *neg_flags_inout);
176 /* turn parameters into data stream */
178 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_AUTH2,
183 NT_STATUS_UNSUCCESSFUL);
187 if (NT_STATUS_IS_OK(result)) {
188 *srv_chal_out = r.srv_chal;
189 *neg_flags_inout = r.srv_flgs.neg_flags;
195 #if 0 /* not currebntly used */
196 /****************************************************************************
199 Send the client credential, receive back a server credential.
200 The caller *must* ensure that the server credential returned matches the session key
201 encrypt of the server challenge originally received. JRA.
202 ****************************************************************************/
204 static NTSTATUS rpccli_net_auth3(struct rpc_pipe_client *cli,
206 const char *server_name,
207 const char *account_name,
208 uint16 sec_chan_type,
209 const char *computer_name,
210 uint32 *neg_flags_inout,
211 const DOM_CHAL *clnt_chal_in,
212 DOM_CHAL *srv_chal_out)
214 prs_struct qbuf, rbuf;
217 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
219 /* create and send a MSRPC command with api NET_AUTH2 */
221 DEBUG(4,("cli_net_auth3: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n",
222 server_name, account_name, sec_chan_type, computer_name,
223 credstr(clnt_chal_in->data), *neg_flags_inout));
225 /* store the parameters */
226 init_q_auth_3(&q, server_name, account_name, sec_chan_type,
227 computer_name, clnt_chal_in, *neg_flags_inout);
229 /* turn parameters into data stream */
231 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_AUTH3,
236 NT_STATUS_UNSUCCESSFUL);
238 if (NT_STATUS_IS_OK(result)) {
239 *srv_chal_out = r.srv_chal;
240 *neg_flags_inout = r.srv_flgs.neg_flags;
245 #endif /* not currebntly used */
247 /****************************************************************************
248 Wrapper function that uses the auth and auth2 calls to set up a NETLOGON
249 credentials chain. Stores the credentials in the struct dcinfo in the
250 netlogon pipe struct.
251 ****************************************************************************/
253 NTSTATUS rpccli_netlogon_setup_creds(struct rpc_pipe_client *cli,
254 const char *server_name,
256 const char *clnt_name,
257 const char *machine_account,
258 const unsigned char machine_pwd[16],
259 uint32 sec_chan_type,
260 uint32 *neg_flags_inout)
262 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
263 DOM_CHAL clnt_chal_send;
264 DOM_CHAL srv_chal_recv;
267 SMB_ASSERT(cli->pipe_idx == PI_NETLOGON);
271 return NT_STATUS_INVALID_PARAMETER;
274 /* Ensure we don't reuse any of this state. */
277 /* Store the machine account password we're going to use. */
278 memcpy(dc->mach_pw, machine_pwd, 16);
280 fstrcpy(dc->remote_machine, "\\\\");
281 fstrcat(dc->remote_machine, server_name);
283 fstrcpy(dc->domain, domain);
285 fstr_sprintf( dc->mach_acct, "%s$", machine_account);
287 /* Create the client challenge. */
288 generate_random_buffer(clnt_chal_send.data, 8);
290 /* Get the server challenge. */
291 result = rpccli_net_req_chal(cli,
298 if (!NT_STATUS_IS_OK(result)) {
302 /* Calculate the session key and client credentials */
303 creds_client_init(*neg_flags_inout,
311 * Send client auth-2 challenge and receive server repy.
314 result = rpccli_net_auth2(cli,
321 &clnt_chal_send, /* input. */
322 &srv_chal_recv); /* output */
324 if (!NT_STATUS_IS_OK(result)) {
329 * Check the returned value using the initial
330 * server received challenge.
333 if (!creds_client_check(dc, &srv_chal_recv)) {
335 * Server replied with bad credential. Fail.
337 DEBUG(0,("rpccli_netlogon_setup_creds: server %s "
338 "replied with bad credential\n",
339 cli->cli->desthost ));
340 return NT_STATUS_ACCESS_DENIED;
343 DEBUG(5,("rpccli_netlogon_setup_creds: server %s credential "
344 "chain established.\n",
345 cli->cli->desthost ));
350 /* Logon Control 2 */
352 NTSTATUS rpccli_netlogon_logon_ctrl2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
355 prs_struct qbuf, rbuf;
358 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
364 /* Initialise input parameters */
366 slprintf(server, sizeof(fstring)-1, "\\\\%s", cli->cli->desthost);
367 init_net_q_logon_ctrl2(&q, server, query_level);
369 /* Marshall data and send request */
371 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_LOGON_CTRL2,
374 net_io_q_logon_ctrl2,
375 net_io_r_logon_ctrl2,
376 NT_STATUS_UNSUCCESSFUL);
384 WERROR rpccli_netlogon_getanydcname(struct rpc_pipe_client *cli,
385 TALLOC_CTX *mem_ctx, const char *mydcname,
386 const char *domainname, char **newdcname)
388 prs_struct qbuf, rbuf;
389 NET_Q_GETANYDCNAME q;
390 NET_R_GETANYDCNAME r;
392 fstring mydcname_slash;
397 /* Initialise input parameters */
399 slprintf(mydcname_slash, sizeof(fstring)-1, "\\\\%s", mydcname);
400 init_net_q_getanydcname(&q, mydcname_slash, domainname);
402 /* Marshall data and send request */
404 CLI_DO_RPC_WERR(cli, mem_ctx, PI_NETLOGON, NET_GETANYDCNAME,
407 net_io_q_getanydcname,
408 net_io_r_getanydcname,
409 WERR_GENERAL_FAILURE);
413 if (W_ERROR_IS_OK(result) && newdcname) {
414 *newdcname = rpcstr_pull_unistr2_talloc(mem_ctx, &r.uni_dcname);
415 W_ERROR_HAVE_NO_MEMORY(*newdcname);
423 WERROR rpccli_netlogon_getdcname(struct rpc_pipe_client *cli,
424 TALLOC_CTX *mem_ctx, const char *mydcname,
425 const char *domainname, char **newdcname)
427 prs_struct qbuf, rbuf;
431 fstring mydcname_slash;
436 /* Initialise input parameters */
438 slprintf(mydcname_slash, sizeof(fstring)-1, "\\\\%s", mydcname);
439 init_net_q_getdcname(&q, mydcname_slash, domainname);
441 /* Marshall data and send request */
443 CLI_DO_RPC_WERR(cli, mem_ctx, PI_NETLOGON, NET_GETDCNAME,
448 WERR_GENERAL_FAILURE);
452 if (W_ERROR_IS_OK(result) && newdcname) {
453 *newdcname = rpcstr_pull_unistr2_talloc(mem_ctx, &r.uni_dcname);
454 W_ERROR_HAVE_NO_MEMORY(*newdcname);
460 static WERROR pull_domain_controller_info_from_getdcname_reply(TALLOC_CTX *mem_ctx,
461 struct DS_DOMAIN_CONTROLLER_INFO **info_out,
462 NET_R_DSR_GETDCNAME *r)
464 struct DS_DOMAIN_CONTROLLER_INFO *info;
466 info = TALLOC_ZERO_P(mem_ctx, struct DS_DOMAIN_CONTROLLER_INFO);
471 if (&r->uni_dc_unc) {
474 tmp = rpcstr_pull_unistr2_talloc(mem_ctx, &r->uni_dc_unc);
476 return WERR_GENERAL_FAILURE;
478 if (*tmp == '\\') tmp += 1;
479 if (*tmp == '\\') tmp += 1;
481 info->domain_controller_name = talloc_strdup(mem_ctx, tmp);
482 if (info->domain_controller_name == NULL) {
483 return WERR_GENERAL_FAILURE;
487 if (&r->uni_dc_address) {
490 tmp = rpcstr_pull_unistr2_talloc(mem_ctx, &r->uni_dc_address);
492 return WERR_GENERAL_FAILURE;
494 if (*tmp == '\\') tmp += 1;
495 if (*tmp == '\\') tmp += 1;
497 info->domain_controller_address = talloc_strdup(mem_ctx, tmp);
498 if (info->domain_controller_address == NULL) {
499 return WERR_GENERAL_FAILURE;
503 info->domain_controller_address_type = r->dc_address_type;
505 info->domain_guid = (struct GUID *)talloc_memdup(
506 mem_ctx, &r->domain_guid, sizeof(struct GUID));
507 if (!info->domain_guid) {
508 return WERR_GENERAL_FAILURE;
511 if (&r->uni_domain_name) {
512 info->domain_name = rpcstr_pull_unistr2_talloc(mem_ctx, &r->uni_domain_name);
513 if (!info->domain_name) {
514 return WERR_GENERAL_FAILURE;
518 if (&r->uni_forest_name) {
519 info->dns_forest_name = rpcstr_pull_unistr2_talloc(mem_ctx, &r->uni_forest_name);
520 if (!info->dns_forest_name) {
521 return WERR_GENERAL_FAILURE;
525 info->flags = r->dc_flags;
527 if (&r->uni_dc_site_name) {
528 info->dc_site_name = rpcstr_pull_unistr2_talloc(mem_ctx, &r->uni_dc_site_name);
529 if (!info->dc_site_name) {
530 return WERR_GENERAL_FAILURE;
534 if (&r->uni_client_site_name) {
535 info->client_site_name = rpcstr_pull_unistr2_talloc(mem_ctx, &r->uni_client_site_name);
536 if (!info->client_site_name) {
537 return WERR_GENERAL_FAILURE;
548 WERROR rpccli_netlogon_dsr_getdcname(struct rpc_pipe_client *cli,
550 const char *server_name,
551 const char *domain_name,
552 struct GUID *domain_guid,
553 struct GUID *site_guid,
555 struct DS_DOMAIN_CONTROLLER_INFO **info_out)
557 prs_struct qbuf, rbuf;
558 NET_Q_DSR_GETDCNAME q;
559 NET_R_DSR_GETDCNAME r;
565 /* Initialize input parameters */
567 tmp_str = talloc_asprintf(mem_ctx, "\\\\%s", server_name);
568 if (tmp_str == NULL) {
572 init_net_q_dsr_getdcname(&q, tmp_str, domain_name, domain_guid,
575 /* Marshall data and send request */
577 CLI_DO_RPC_WERR(cli, mem_ctx, PI_NETLOGON, NET_DSR_GETDCNAME,
580 net_io_q_dsr_getdcname,
581 net_io_r_dsr_getdcname,
582 WERR_GENERAL_FAILURE);
584 if (!W_ERROR_IS_OK(r.result)) {
588 r.result = pull_domain_controller_info_from_getdcname_reply(mem_ctx, info_out, &r);
589 if (!W_ERROR_IS_OK(r.result)) {
596 /* Dsr_GetSiteName */
598 WERROR rpccli_netlogon_dsr_getsitename(struct rpc_pipe_client *cli,
600 const char *computer_name,
603 prs_struct qbuf, rbuf;
604 NET_Q_DSR_GETSITENAME q;
605 NET_R_DSR_GETSITENAME r;
610 /* Initialize input parameters */
612 init_net_q_dsr_getsitename(&q, computer_name);
614 /* Marshall data and send request */
616 CLI_DO_RPC_WERR(cli, mem_ctx, PI_NETLOGON, NET_DSR_GETSITENAME,
619 net_io_q_dsr_getsitename,
620 net_io_r_dsr_getsitename,
621 WERR_GENERAL_FAILURE);
623 if (!W_ERROR_IS_OK(r.result)) {
627 if ((site_name != NULL) &&
628 ((*site_name = rpcstr_pull_unistr2_talloc(
629 mem_ctx, &r.uni_site_name)) == NULL)) {
630 return WERR_GENERAL_FAILURE;
638 /* Sam synchronisation */
640 NTSTATUS rpccli_netlogon_sam_sync(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
641 uint32 database_id, uint32 next_rid, uint32 *num_deltas,
642 SAM_DELTA_HDR **hdr_deltas,
643 SAM_DELTA_CTR **deltas)
645 prs_struct qbuf, rbuf;
648 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
655 ZERO_STRUCT(ret_creds);
657 /* Initialise input parameters */
659 creds_client_step(cli->dc, &clnt_creds);
661 init_net_q_sam_sync(&q, cli->dc->remote_machine, global_myname(),
662 &clnt_creds, &ret_creds, database_id, next_rid);
664 /* Marshall data and send request */
666 CLI_DO_RPC_COPY_SESS_KEY(cli, mem_ctx, PI_NETLOGON, NET_SAM_SYNC,
671 NT_STATUS_UNSUCCESSFUL);
676 *num_deltas = r.num_deltas2;
677 *hdr_deltas = r.hdr_deltas;
680 if (!NT_STATUS_IS_ERR(result)) {
681 /* Check returned credentials. */
682 if (!creds_client_check(cli->dc, &r.srv_creds.challenge)) {
683 DEBUG(0,("cli_netlogon_sam_sync: credentials chain check failed\n"));
684 return NT_STATUS_ACCESS_DENIED;
691 /* Sam synchronisation */
693 NTSTATUS rpccli_netlogon_sam_deltas(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
694 uint32 database_id, uint64 seqnum,
696 SAM_DELTA_HDR **hdr_deltas,
697 SAM_DELTA_CTR **deltas)
699 prs_struct qbuf, rbuf;
702 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
708 /* Initialise input parameters */
710 creds_client_step(cli->dc, &clnt_creds);
712 init_net_q_sam_deltas(&q, cli->dc->remote_machine,
713 global_myname(), &clnt_creds,
714 database_id, seqnum);
716 /* Marshall data and send request */
718 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_SAM_DELTAS,
723 NT_STATUS_UNSUCCESSFUL);
728 *num_deltas = r.num_deltas2;
729 *hdr_deltas = r.hdr_deltas;
732 if (!NT_STATUS_IS_ERR(result)) {
733 /* Check returned credentials. */
734 if (!creds_client_check(cli->dc, &r.srv_creds.challenge)) {
735 DEBUG(0,("cli_netlogon_sam_sync: credentials chain check failed\n"));
736 return NT_STATUS_ACCESS_DENIED;
743 /* Logon domain user */
745 NTSTATUS rpccli_netlogon_sam_logon(struct rpc_pipe_client *cli,
747 uint32 logon_parameters,
749 const char *username,
750 const char *password,
751 const char *workstation,
754 prs_struct qbuf, rbuf;
757 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
761 NET_USER_INFO_3 user;
762 int validation_level = 3;
763 fstring clnt_name_slash;
767 ZERO_STRUCT(ret_creds);
770 fstr_sprintf( clnt_name_slash, "\\\\%s", workstation );
772 fstr_sprintf( clnt_name_slash, "\\\\%s", global_myname() );
775 /* Initialise input parameters */
777 creds_client_step(cli->dc, &clnt_creds);
779 q.validation_level = validation_level;
781 ctr.switch_value = logon_type;
783 switch (logon_type) {
784 case INTERACTIVE_LOGON_TYPE: {
785 unsigned char lm_owf_user_pwd[16], nt_owf_user_pwd[16];
787 nt_lm_owf_gen(password, nt_owf_user_pwd, lm_owf_user_pwd);
789 init_id_info1(&ctr.auth.id1, domain,
790 logon_parameters, /* param_ctrl */
791 0xdead, 0xbeef, /* LUID? */
792 username, clnt_name_slash,
793 (const char *)cli->dc->sess_key, lm_owf_user_pwd,
798 case NET_LOGON_TYPE: {
800 unsigned char local_lm_response[24];
801 unsigned char local_nt_response[24];
803 generate_random_buffer(chal, 8);
805 SMBencrypt(password, chal, local_lm_response);
806 SMBNTencrypt(password, chal, local_nt_response);
808 init_id_info2(&ctr.auth.id2, domain,
809 logon_parameters, /* param_ctrl */
810 0xdead, 0xbeef, /* LUID? */
811 username, clnt_name_slash, chal,
812 local_lm_response, 24, local_nt_response, 24);
816 DEBUG(0, ("switch value %d not supported\n",
818 return NT_STATUS_INVALID_INFO_CLASS;
823 init_sam_info(&q.sam_id, cli->dc->remote_machine, global_myname(),
824 &clnt_creds, &ret_creds, logon_type,
827 /* Marshall data and send request */
829 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_SAMLOGON,
834 NT_STATUS_UNSUCCESSFUL);
840 if (r.buffer_creds) {
841 /* Check returned credentials if present. */
842 if (!creds_client_check(cli->dc, &r.srv_creds.challenge)) {
843 DEBUG(0,("rpccli_netlogon_sam_logon: credentials chain check failed\n"));
844 return NT_STATUS_ACCESS_DENIED;
853 * Logon domain user with an 'network' SAM logon
855 * @param info3 Pointer to a NET_USER_INFO_3 already allocated by the caller.
858 NTSTATUS rpccli_netlogon_sam_network_logon(struct rpc_pipe_client *cli,
860 uint32 logon_parameters,
862 const char *username,
864 const char *workstation,
866 DATA_BLOB lm_response,
867 DATA_BLOB nt_response,
868 NET_USER_INFO_3 *info3)
870 prs_struct qbuf, rbuf;
873 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
875 int validation_level = 3;
876 const char *workstation_name_slash;
877 const char *server_name_slash;
886 ZERO_STRUCT(ret_creds);
888 creds_client_step(cli->dc, &clnt_creds);
890 if (server[0] != '\\' && server[1] != '\\') {
891 server_name_slash = talloc_asprintf(mem_ctx, "\\\\%s", server);
893 server_name_slash = server;
896 if (workstation[0] != '\\' && workstation[1] != '\\') {
897 workstation_name_slash = talloc_asprintf(mem_ctx, "\\\\%s", workstation);
899 workstation_name_slash = workstation;
902 if (!workstation_name_slash || !server_name_slash) {
903 DEBUG(0, ("talloc_asprintf failed!\n"));
904 return NT_STATUS_NO_MEMORY;
907 /* Initialise input parameters */
909 q.validation_level = validation_level;
911 ctr.switch_value = NET_LOGON_TYPE;
913 init_id_info2(&ctr.auth.id2, domain,
914 logon_parameters, /* param_ctrl */
915 0xdead, 0xbeef, /* LUID? */
916 username, workstation_name_slash, (const uchar*)chal,
917 lm_response.data, lm_response.length, nt_response.data, nt_response.length);
919 init_sam_info(&q.sam_id, server_name_slash, global_myname(),
920 &clnt_creds, &ret_creds, NET_LOGON_TYPE,
925 /* Marshall data and send request */
927 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_SAMLOGON,
932 NT_STATUS_UNSUCCESSFUL);
934 if (memcmp(zeros, info3->user_sess_key, 16) != 0) {
935 SamOEMhash(info3->user_sess_key, cli->dc->sess_key, 16);
937 memset(info3->user_sess_key, '\0', 16);
940 if (memcmp(zeros, info3->lm_sess_key, 8) != 0) {
941 SamOEMhash(info3->lm_sess_key, cli->dc->sess_key, 8);
943 memset(info3->lm_sess_key, '\0', 8);
946 for (i=0; i < 7; i++) {
947 memset(&info3->unknown[i], '\0', 4);
954 if (r.buffer_creds) {
955 /* Check returned credentials if present. */
956 if (!creds_client_check(cli->dc, &r.srv_creds.challenge)) {
957 DEBUG(0,("rpccli_netlogon_sam_network_logon: credentials chain check failed\n"));
958 return NT_STATUS_ACCESS_DENIED;
965 NTSTATUS rpccli_netlogon_sam_network_logon_ex(struct rpc_pipe_client *cli,
967 uint32 logon_parameters,
969 const char *username,
971 const char *workstation,
973 DATA_BLOB lm_response,
974 DATA_BLOB nt_response,
975 NET_USER_INFO_3 *info3)
977 prs_struct qbuf, rbuf;
978 NET_Q_SAM_LOGON_EX q;
979 NET_R_SAM_LOGON_EX r;
980 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
982 int validation_level = 3;
983 const char *workstation_name_slash;
984 const char *server_name_slash;
992 if (server[0] != '\\' && server[1] != '\\') {
993 server_name_slash = talloc_asprintf(mem_ctx, "\\\\%s", server);
995 server_name_slash = server;
998 if (workstation[0] != '\\' && workstation[1] != '\\') {
999 workstation_name_slash = talloc_asprintf(mem_ctx, "\\\\%s", workstation);
1001 workstation_name_slash = workstation;
1004 if (!workstation_name_slash || !server_name_slash) {
1005 DEBUG(0, ("talloc_asprintf failed!\n"));
1006 return NT_STATUS_NO_MEMORY;
1009 /* Initialise input parameters */
1011 q.validation_level = validation_level;
1013 ctr.switch_value = NET_LOGON_TYPE;
1015 init_id_info2(&ctr.auth.id2, domain,
1016 logon_parameters, /* param_ctrl */
1017 0xdead, 0xbeef, /* LUID? */
1018 username, workstation_name_slash, (const uchar*)chal,
1019 lm_response.data, lm_response.length, nt_response.data,
1020 nt_response.length);
1022 init_sam_info_ex(&q.sam_id, server_name_slash, global_myname(),
1023 NET_LOGON_TYPE, &ctr);
1027 /* Marshall data and send request */
1029 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_SAMLOGON_EX,
1031 net_io_q_sam_logon_ex,
1032 net_io_r_sam_logon_ex,
1033 NT_STATUS_UNSUCCESSFUL);
1035 if (memcmp(zeros, info3->user_sess_key, 16) != 0) {
1036 SamOEMhash(info3->user_sess_key, cli->dc->sess_key, 16);
1038 memset(info3->user_sess_key, '\0', 16);
1041 if (memcmp(zeros, info3->lm_sess_key, 8) != 0) {
1042 SamOEMhash(info3->lm_sess_key, cli->dc->sess_key, 8);
1044 memset(info3->lm_sess_key, '\0', 8);
1047 for (i=0; i < 7; i++) {
1048 memset(&info3->unknown[i], '\0', 4);
1051 /* Return results */
1058 /***************************************************************************
1059 LSA Server Password Set.
1060 ****************************************************************************/
1062 NTSTATUS rpccli_net_srv_pwset(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx,
1063 const char *machine_name, const uint8 hashed_mach_pwd[16])
1067 DOM_CRED clnt_creds;
1070 uint16 sec_chan_type = 2;
1073 creds_client_step(cli->dc, &clnt_creds);
1075 DEBUG(4,("cli_net_srv_pwset: srv:%s acct:%s sc: %d mc: %s\n",
1076 cli->dc->remote_machine, cli->dc->mach_acct, sec_chan_type, machine_name));
1078 /* store the parameters */
1079 init_q_srv_pwset(&q, cli->dc->remote_machine, (const char *)cli->dc->sess_key,
1080 cli->dc->mach_acct, sec_chan_type, machine_name,
1081 &clnt_creds, hashed_mach_pwd);
1083 CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_SRVPWSET,
1088 NT_STATUS_UNSUCCESSFUL);
1092 if (!NT_STATUS_IS_OK(result)) {
1093 /* report error code */
1094 DEBUG(0,("cli_net_srv_pwset: %s\n", nt_errstr(result)));
1097 /* Always check returned credentials. */
1098 if (!creds_client_check(cli->dc, &r.srv_cred.challenge)) {
1099 DEBUG(0,("rpccli_net_srv_pwset: credentials chain check failed\n"));
1100 return NT_STATUS_ACCESS_DENIED;