summaryrefslogtreecommitdiff
path: root/source3/rpc_client/msrpc_lsarpc.c
blob: c361a7146ab3099d00ced0f40e0c42555a8d9940 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
/* 
   Unix SMB/Netbios implementation.
   Version 1.9.
   NT Domain Authentication SMB / MSRPC client
   Copyright (C) Andrew Tridgell 1994-1999
   Copyright (C) Luke Kenneth Casson Leighton 1996-1999
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 2 of the License, or
   (at your option) any later version.
   
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
   
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to the Free Software
   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/


#ifdef SYSLOG
#undef SYSLOG
#endif

#include "includes.h"
#include "nterr.h"

extern int DEBUGLEVEL;

#define DEBUG_TESTING

/****************************************************************************
nt lsa query secret
****************************************************************************/
BOOL msrpc_lsa_query_secret(struct cli_state *cli,
				const char* secret_name,
				STRING2 *secret,
				NTTIME *last_update)
{
	uint16 nt_pipe_fnum;
	fstring srv_name;
	BOOL res = True;
	BOOL res1;
	BOOL res2;

	POLICY_HND pol_sec;
	POLICY_HND lsa_pol;
	STRING2 enc_secret;

	fstrcpy(srv_name, "\\\\");
	fstrcat(srv_name, cli->desthost);
	strupper(srv_name);

	/* open LSARPC session. */
	res = res ? cli_nt_session_open(cli, PIPE_LSARPC, &nt_pipe_fnum) : False;

	/* lookup domain controller; receive a policy handle */
	res = res ? lsa_open_policy2(cli, nt_pipe_fnum,
				srv_name,
				&lsa_pol, False) : False;

	/* lookup domain controller; receive a policy handle */
	res1 = res ? lsa_open_secret(cli, nt_pipe_fnum,
				&lsa_pol,
				secret_name, 0x02000000, &pol_sec) : False;

	res2 = res1 ? lsa_query_secret(cli, nt_pipe_fnum,
			       &pol_sec, &enc_secret, last_update) : False;

	res1 = res1 ? lsa_close(cli, nt_pipe_fnum, &pol_sec) : False;

	res = res ? lsa_close(cli, nt_pipe_fnum, &lsa_pol) : False;

	/* close the session */
	cli_nt_session_close(cli, nt_pipe_fnum);

	res2 = res2 ? nt_decrypt_string2(secret, &enc_secret, (char*)(cli->pwd.smb_nt_pwd)) : False;

	return res2;
}