From 2f7d9fddf7102d76b182fbd50ccaf18cb5a10014 Mon Sep 17 00:00:00 2001 From: Matthias Dieter Wallnöfer Date: Sun, 9 Jun 2013 10:46:06 +0200 Subject: s4:samr RPC server - dcesrv_samr_SetUserInfo() - password expiration Also on level 26 this has to be handled the same as on levels 21, 23, 25. Reviewed-by: Andrew Bartlett --- source4/rpc_server/samr/dcesrv_samr.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/source4/rpc_server/samr/dcesrv_samr.c b/source4/rpc_server/samr/dcesrv_samr.c index 3826075ebc..7279fe02f7 100644 --- a/source4/rpc_server/samr/dcesrv_samr.c +++ b/source4/rpc_server/samr/dcesrv_samr.c @@ -3510,8 +3510,14 @@ static NTSTATUS dcesrv_samr_SetUserInfo(struct dcesrv_call_state *dce_call, TALL } if (r->in.info->info26.password_expired > 0) { + NTTIME t = 0; struct ldb_message_element *set_el; - if (samdb_msg_add_uint64(sam_ctx, mem_ctx, msg, "pwdLastSet", 0) != LDB_SUCCESS) { + if (r->in.info->info26.password_expired + == PASS_DONT_CHANGE_AT_NEXT_LOGON) { + unix_to_nt_time(&t, time(NULL)); + } + if (samdb_msg_add_uint64(sam_ctx, mem_ctx, msg, + "pwdLastSet", t) != LDB_SUCCESS) { return NT_STATUS_NO_MEMORY; } set_el = ldb_msg_find_element(msg, "pwdLastSet"); -- cgit