LCOV - code coverage report
Current view: top level - source4/kdc - kpasswd_glue.c (source / functions) Hit Total Coverage
Test: coverage report for abartlet/fix-coverage dd10fb34 Lines: 16 22 72.7 %
Date: 2021-09-23 10:06:22 Functions: 1 1 100.0 %

          Line data    Source code
       1             : /*
       2             :    Unix SMB/CIFS implementation.
       3             : 
       4             :    kpasswd Server implementation
       5             : 
       6             :    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005
       7             :    Copyright (C) Andrew Tridgell        2005
       8             : 
       9             :    This program is free software; you can redistribute it and/or modify
      10             :    it under the terms of the GNU General Public License as published by
      11             :    the Free Software Foundation; either version 3 of the License, or
      12             :    (at your option) any later version.
      13             : 
      14             :    This program is distributed in the hope that it will be useful,
      15             :    but WITHOUT ANY WARRANTY; without even the implied warranty of
      16             :    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
      17             :    GNU General Public License for more details.
      18             : 
      19             :    You should have received a copy of the GNU General Public License
      20             :    along with this program.  If not, see <http://www.gnu.org/licenses/>.
      21             : */
      22             : 
      23             : #include "includes.h"
      24             : #include "dsdb/samdb/samdb.h"
      25             : #include "../lib/util/util_ldb.h"
      26             : #include "libcli/security/security.h"
      27             : #include "dsdb/common/util.h"
      28             : #include "auth/auth.h"
      29             : #include "kdc/kpasswd_glue.h"
      30             : 
      31             : /*
      32             :    A user password change
      33             : 
      34             :    Return true if there is a valid error packet (or success) formed in
      35             :    the error_blob
      36             : */
      37          19 : NTSTATUS samdb_kpasswd_change_password(TALLOC_CTX *mem_ctx,
      38             :                                        struct loadparm_context *lp_ctx,
      39             :                                        struct tevent_context *event_ctx,
      40             :                                        struct ldb_context *samdb,
      41             :                                        struct auth_session_info *session_info,
      42             :                                        const DATA_BLOB *password,
      43             :                                        enum samPwdChangeReason *reject_reason,
      44             :                                        struct samr_DomInfo1 **dominfo,
      45             :                                        const char **error_string,
      46             :                                        NTSTATUS *result)
      47             : {
      48             :         struct samr_Password *oldLmHash, *oldNtHash;
      49          19 :         const char * const attrs[] = { "dBCSPwd", "unicodePwd", NULL };
      50             :         struct ldb_message *msg;
      51             :         NTSTATUS status;
      52             :         int ret;
      53             : 
      54             :         /* Fetch the old hashes to get the old password in order to perform
      55             :          * the password change operation. Naturally it would be much better to
      56             :          * have a password hash from an authentication around but this doesn't
      57             :          * seem to be the case here. */
      58          19 :         ret = dsdb_search_one(samdb, mem_ctx, &msg, ldb_get_default_basedn(samdb),
      59             :                               LDB_SCOPE_SUBTREE,
      60             :                               attrs,
      61             :                               DSDB_SEARCH_NO_GLOBAL_CATALOG,
      62             :                               "(&(objectClass=user)(sAMAccountName=%s))",
      63          19 :                               session_info->info->account_name);
      64          19 :         if (ret != LDB_SUCCESS) {
      65           0 :                 *error_string = "No such user when changing password";
      66           0 :                 return NT_STATUS_NO_SUCH_USER;
      67             :         }
      68             : 
      69             :         /*
      70             :          * No need to check for password lockout here, the KDC will
      71             :          * have done that when issuing the ticket, which is not based
      72             :          * on the user's password
      73             :          */
      74          19 :         status = samdb_result_passwords_no_lockout(mem_ctx, lp_ctx, msg,
      75             :                                                    &oldLmHash, &oldNtHash);
      76          19 :         if (!NT_STATUS_IS_OK(status)) {
      77           0 :                 *error_string = "Not permitted to change password";
      78           0 :                 return NT_STATUS_ACCESS_DENIED;
      79             :         }
      80             : 
      81             :         /* Start a SAM with user privileges for the password change */
      82          19 :         samdb = samdb_connect(mem_ctx,
      83             :                               event_ctx,
      84             :                               lp_ctx,
      85             :                               session_info,
      86             :                               NULL,
      87             :                               0);
      88          19 :         if (!samdb) {
      89           0 :                 *error_string = "Failed to open samdb";
      90           0 :                 return NT_STATUS_ACCESS_DENIED;
      91             :         }
      92             : 
      93          19 :         DEBUG(3, ("Changing password of %s\\%s (%s)\n",
      94             :                   session_info->info->domain_name,
      95             :                   session_info->info->account_name,
      96             :                   dom_sid_string(mem_ctx, &session_info->security_token->sids[PRIMARY_USER_SID_INDEX])));
      97             : 
      98             :         /* Performs the password change */
      99          32 :         status = samdb_set_password_sid(samdb,
     100             :                                         mem_ctx,
     101          19 :                                         &session_info->security_token->sids[PRIMARY_USER_SID_INDEX],
     102             :                                         NULL,
     103             :                                         password,
     104             :                                         NULL,
     105             :                                         NULL,
     106             :                                         oldLmHash,
     107             :                                         oldNtHash, /* this is a user password change */
     108             :                                         reject_reason,
     109             :                                         dominfo);
     110          19 :         if (!NT_STATUS_IS_OK(status)) {
     111           2 :                 *error_string = nt_errstr(status);
     112             :         }
     113          19 :         *result = status;
     114             : 
     115          19 :         return NT_STATUS_OK;
     116             : }

Generated by: LCOV version 1.13