ctdb-scripts: Ignore shellcheck SC2181 warning (use of $?)
[metze/samba/wip.git] / source3 / libsmb / passchange.c
index e8c412be46b4d5fc25195519ce3a384ad0d148aa..c89b7ca85d19f0ec80ed0aec0ba9fd883c3eb837 100644 (file)
@@ -2,22 +2,29 @@
    Unix SMB/CIFS implementation.
    SMB client password change routine
    Copyright (C) Andrew Tridgell 1994-1998
-   
+
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
-   
+
    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.
-   
+
    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
+#include "../librpc/gen_ndr/ndr_samr.h"
+#include "rpc_client/cli_pipe.h"
+#include "rpc_client/cli_samr.h"
+#include "libsmb/libsmb.h"
+#include "libsmb/clirap.h"
+#include "libsmb/nmblib.h"
+#include "../libcli/smb/smbXcli_base.h"
 
 /*************************************************************
  Change a password on a remote machine using IPC calls.
@@ -27,71 +34,39 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
                                const char *old_passwd, const char *new_passwd,
                                char **err_str)
 {
-       struct nmb_name calling, called;
        struct cli_state *cli = NULL;
+       struct cli_credentials *creds = NULL;
        struct rpc_pipe_client *pipe_hnd = NULL;
-       struct sockaddr_storage ss;
-       char *user, *domain, *p;
-
        NTSTATUS result;
        bool pass_must_change = False;
 
-       user = talloc_strdup(talloc_tos(), user_name);
-       SMB_ASSERT(user != NULL);
-       domain = talloc_strdup(talloc_tos(), "");
-       SMB_ASSERT(domain != NULL);
-
-       /* allow usernames of the form domain\\user or domain/user */
-       if ((p = strchr_m(user,'\\')) || (p = strchr_m(user,'/')) ||
-           (p = strchr_m(user,*lp_winbind_separator()))) {
-               *p = 0;
-               domain = user;
-               user = p+1;
-       }
-
        *err_str = NULL;
 
-       if(!resolve_name( remote_machine, &ss, 0x20, false)) {
-               if (asprintf(err_str, "Unable to find an IP address for machine "
-                        "%s.\n", remote_machine) == -1) {
-                       *err_str = NULL;
-               }
-               return NT_STATUS_UNSUCCESSFUL;
-       }
-
-       cli = cli_initialise();
-       if (!cli) {
-               return NT_STATUS_NO_MEMORY;
-       }
-
-       result = cli_connect(cli, remote_machine, &ss);
+       result = cli_connect_nb(remote_machine, NULL, 0, 0x20, NULL,
+                               SMB_SIGNING_IPC_DEFAULT, 0, &cli);
        if (!NT_STATUS_IS_OK(result)) {
                if (asprintf(err_str, "Unable to connect to SMB server on "
                         "machine %s. Error was : %s.\n",
                         remote_machine, nt_errstr(result))==-1) {
                        *err_str = NULL;
                }
-               cli_shutdown(cli);
                return result;
        }
 
-       make_nmb_name(&calling, global_myname() , 0x0);
-       make_nmb_name(&called , remote_machine, 0x20);
-
-       if (!cli_session_request(cli, &calling, &called)) {
-               if (asprintf(err_str, "machine %s rejected the session setup. "
-                        "Error was : %s.\n",
-                        remote_machine, cli_errstr(cli)) == -1) {
-                       *err_str = NULL;
-               }
-               result = cli_nt_error(cli);
-               cli_shutdown(cli);
-               return result;
-       }
-
-       cli->protocol = PROTOCOL_NT1;
-
-       result = cli_negprot(cli);
+       creds = cli_session_creds_init(cli,
+                                      user_name,
+                                      NULL, /* domain */
+                                      NULL, /* realm */
+                                      old_passwd,
+                                      false, /* use_kerberos */
+                                      false, /* fallback_after_kerberos */
+                                      false, /* use_ccache */
+                                      false); /* password_is_nt_hash */
+       SMB_ASSERT(creds != NULL);
+
+       result = smbXcli_negprot(cli->conn, cli->timeout,
+                                lp_client_ipc_min_protocol(),
+                                lp_client_ipc_max_protocol());
 
        if (!NT_STATUS_IS_OK(result)) {
                if (asprintf(err_str, "machine %s rejected the negotiate "
@@ -99,16 +74,13 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
                         remote_machine, nt_errstr(result)) == -1) {
                        *err_str = NULL;
                }
-               result = cli_nt_error(cli);
                cli_shutdown(cli);
                return result;
        }
 
        /* Given things like SMB signing, restrict anonymous and the like, 
           try an authenticated connection first */
-       result = cli_session_setup(cli, user_name,
-                                  old_passwd, strlen(old_passwd)+1,
-                                  old_passwd, strlen(old_passwd)+1, "");
+       result = cli_session_setup_creds(cli, creds);
 
        if (!NT_STATUS_IS_OK(result)) {
 
@@ -120,7 +92,7 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
                if (!NT_STATUS_EQUAL(result, NT_STATUS_PASSWORD_MUST_CHANGE) &&
                    !NT_STATUS_EQUAL(result, NT_STATUS_PASSWORD_EXPIRED)) {
                        if (asprintf(err_str, "Could not connect to machine %s: "
-                                "%s\n", remote_machine, cli_errstr(cli)) == -1) {
+                                "%s\n", remote_machine, nt_errstr(result)) == -1) {
                                *err_str = NULL;
                        }
                        cli_shutdown(cli);
@@ -135,32 +107,20 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
                 * Thanks to <Nicholas.S.Jenkins@cdc.com> for this fix.
                 */
 
-               result = cli_session_setup(cli, "", "", 0, "", 0, "");
+               result = cli_session_setup_anon(cli);
 
                if (!NT_STATUS_IS_OK(result)) {
                        if (asprintf(err_str, "machine %s rejected the session "
                                 "setup. Error was : %s.\n",        
-                                remote_machine, cli_errstr(cli)) == -1) {
+                                remote_machine, nt_errstr(result)) == -1) {
                                *err_str = NULL;
                        }
                        cli_shutdown(cli);
                        return result;
                }
-
-               result = cli_init_creds(cli, "", "", NULL);
-               if (!NT_STATUS_IS_OK(result)) {
-                       cli_shutdown(cli);
-                       return result;
-               }
-       } else {
-               result = cli_init_creds(cli, user, domain, old_passwd);
-               if (!NT_STATUS_IS_OK(result)) {
-                       cli_shutdown(cli);
-                       return result;
-               }
        }
 
-       result = cli_tcon_andx(cli, "IPC$", "IPC", "", 1);
+       result = cli_tree_connect(cli, "IPC$", "IPC", NULL);
        if (!NT_STATUS_IS_OK(result)) {
                if (asprintf(err_str, "machine %s rejected the tconX on the "
                             "IPC$ share. Error was : %s.\n",
@@ -174,13 +134,14 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
        /* Try not to give the password away too easily */
 
        if (!pass_must_change) {
-               result = cli_rpc_pipe_open_ntlmssp(cli,
-                                                  &ndr_table_samr.syntax_id,
-                                                  NCACN_NP,
-                                                  DCERPC_AUTH_LEVEL_PRIVACY,
-                                                  domain, user,
-                                                  old_passwd,
-                                                  &pipe_hnd);
+               result = cli_rpc_pipe_open_with_creds(cli,
+                                                     &ndr_table_samr,
+                                                     NCACN_NP,
+                                                     DCERPC_AUTH_TYPE_NTLMSSP,
+                                                     DCERPC_AUTH_LEVEL_PRIVACY,
+                                                     remote_machine,
+                                                     creds,
+                                                     &pipe_hnd);
        } else {
                /*
                 * If the user password must be changed the ntlmssp bind will
@@ -191,19 +152,19 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
                 * way.
                 */
                result = cli_rpc_pipe_open_noauth(
-                       cli, &ndr_table_samr.syntax_id, &pipe_hnd);
+                       cli, &ndr_table_samr, &pipe_hnd);
        }
 
        if (!NT_STATUS_IS_OK(result)) {
                if (lp_client_lanman_auth()) {
                        /* Use the old RAP method. */
                        if (!cli_oem_change_password(cli, user_name, new_passwd, old_passwd)) {
+                               result = cli_nt_error(cli);
                                if (asprintf(err_str, "machine %s rejected the "
                                         "password change: Error was : %s.\n",
-                                        remote_machine, cli_errstr(cli)) == -1) {
+                                        remote_machine, nt_errstr(result)) == -1) {
                                        *err_str = NULL;
                                }
-                               result = cli_nt_error(cli);
                                cli_shutdown(cli);
                                return result;
                        }
@@ -214,7 +175,6 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
                                 remote_machine, nt_errstr(result)) == -1) {
                                *err_str = NULL;
                        }
-                       result = cli_nt_error(cli);
                        cli_shutdown(cli);
                        return result;
                }
@@ -244,16 +204,10 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
        TALLOC_FREE(pipe_hnd);
 
        /* Try anonymous NTLMSSP... */
-       result = cli_init_creds(cli, "", "", NULL);
-       if (!NT_STATUS_IS_OK(result)) {
-               cli_shutdown(cli);
-               return result;
-       }
-
        result = NT_STATUS_UNSUCCESSFUL;
 
        /* OK, this is ugly, but... try an anonymous pipe. */
-       result = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
+       result = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr,
                                          &pipe_hnd);
 
        if ( NT_STATUS_IS_OK(result) &&
@@ -289,19 +243,20 @@ NTSTATUS remote_password_change(const char *remote_machine, const char *user_nam
                                cli_shutdown(cli);
                                return NT_STATUS_OK;
                        }
+
+                       result = cli_nt_error(cli);
                        if (asprintf(err_str, "machine %s rejected the password "
                                 "change: Error was : %s.\n",
-                                remote_machine, cli_errstr(cli)) == -1) {
+                                remote_machine, nt_errstr(result)) == -1) {
                                *err_str = NULL;
                        }
-                       result = cli_nt_error(cli);
                        cli_shutdown(cli);
                        return result;
                } else {
                        if (asprintf(err_str, "SAMR connection to machine %s "
                                 "failed. Error was %s, but LANMAN password "
-                                "changed are disabled\n",
-                               nt_errstr(result), remote_machine) == -1) {
+                                "changes are disabled\n",
+                               remote_machine, nt_errstr(result)) == -1) {
                                *err_str = NULL;
                        }
                        cli_shutdown(cli);