From: Stefan Metzmacher Date: Mon, 28 Oct 2024 15:30:19 +0000 (+0100) Subject: s4:rpc_server/netlogon: make use of netlogon_creds_decrypt_samr_CryptPassword X-Git-Tag: ldb-2.9.2~11 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=dc7ab826ef37d46d0bb852e049c0ab03a704e439;p=thirdparty%2Fsamba.git s4:rpc_server/netlogon: make use of netlogon_creds_decrypt_samr_CryptPassword This will make it easier to implement netr_ServerAuthenticateKerberos() later... BUG: https://bugzilla.samba.org/show_bug.cgi?id=15425 Signed-off-by: Stefan Metzmacher Reviewed-by: Douglas Bagnall (cherry picked from commit f1c1b8661a9121e1ff02784955c98d9f33bca8bd) --- diff --git a/source4/rpc_server/netlogon/dcerpc_netlogon.c b/source4/rpc_server/netlogon/dcerpc_netlogon.c index fa859e1125e..2597ee90eab 100644 --- a/source4/rpc_server/netlogon/dcerpc_netlogon.c +++ b/source4/rpc_server/netlogon/dcerpc_netlogon.c @@ -1063,6 +1063,10 @@ static NTSTATUS dcesrv_netr_ServerPasswordSet2(struct dcesrv_call_state *dce_cal DATA_BLOB dec_blob = data_blob_null; DATA_BLOB enc_blob = data_blob_null; struct samr_CryptPassword password_buf; + enum dcerpc_AuthType auth_type = DCERPC_AUTH_TYPE_NONE; + enum dcerpc_AuthLevel auth_level = DCERPC_AUTH_LEVEL_NONE; + + dcesrv_call_auth_info(dce_call, &auth_type, &auth_level); nt_status = dcesrv_netr_creds_server_step_check(dce_call, mem_ctx, @@ -1080,16 +1084,10 @@ static NTSTATUS dcesrv_netr_ServerPasswordSet2(struct dcesrv_call_state *dce_cal memcpy(password_buf.data, r->in.new_password->data, 512); SIVAL(password_buf.data, 512, r->in.new_password->length); - if (creds->negotiate_flags & NETLOGON_NEG_SUPPORTS_AES) { - nt_status = netlogon_creds_aes_decrypt(creds, - password_buf.data, - 516); - } else { - nt_status = netlogon_creds_arcfour_crypt(creds, - password_buf.data, - 516); - } - + nt_status = netlogon_creds_decrypt_samr_CryptPassword(creds, + &password_buf, + auth_type, + auth_level); if (!NT_STATUS_IS_OK(nt_status)) { return nt_status; }