2008-02-12 14:16:02 +03:00
/*
* Unix SMB / CIFS implementation .
* RPC Pipe client / server routines
* Copyright ( C ) Guenther Deschner 2008.
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation ; either version 3 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program ; if not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
2009-03-16 13:27:58 +03:00
# include "../libcli/auth/libcli_auth.h"
2010-05-18 20:59:45 +04:00
# include "rpc_client/init_samr.h"
2021-07-30 17:24:37 +03:00
# include "librpc/rpc/dcerpc_samr.h"
2008-02-12 14:16:02 +03:00
2019-05-29 18:16:26 +03:00
# include "lib/crypto/gnutls_helpers.h"
2018-11-05 20:10:55 +03:00
# include <gnutls/gnutls.h>
# include <gnutls/crypto.h>
2008-07-18 22:42:55 +04:00
/*************************************************************************
inits a samr_CryptPasswordEx structure
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2019-05-29 18:16:26 +03:00
NTSTATUS init_samr_CryptPasswordEx ( const char * pwd ,
DATA_BLOB * session_key ,
struct samr_CryptPasswordEx * pwd_buf )
2008-07-18 22:42:55 +04:00
{
2019-07-24 12:44:51 +03:00
return encode_rc4_passwd_buffer ( pwd , session_key , pwd_buf ) ;
2008-07-18 22:42:55 +04:00
}
/*************************************************************************
inits a samr_CryptPassword structure
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2019-05-29 17:22:11 +03:00
NTSTATUS init_samr_CryptPassword ( const char * pwd ,
DATA_BLOB * session_key ,
struct samr_CryptPassword * pwd_buf )
2008-07-18 22:42:55 +04:00
{
/* samr_CryptPassword */
2019-01-16 15:15:08 +03:00
gnutls_cipher_hd_t cipher_hnd = NULL ;
gnutls_datum_t sess_key = {
. data = session_key - > data ,
. size = session_key - > length ,
} ;
2019-05-29 17:22:11 +03:00
bool ok ;
2019-01-16 15:15:08 +03:00
int rc ;
2008-07-18 22:42:55 +04:00
2019-05-29 17:22:11 +03:00
ok = encode_pw_buffer ( pwd_buf - > data , pwd , STR_UNICODE ) ;
if ( ! ok ) {
return NT_STATUS_INTERNAL_ERROR ;
}
2019-01-16 15:15:08 +03:00
rc = gnutls_cipher_init ( & cipher_hnd ,
GNUTLS_CIPHER_ARCFOUR_128 ,
& sess_key ,
NULL ) ;
if ( rc ! = 0 ) {
return gnutls_error_to_ntstatus ( rc , NT_STATUS_ACCESS_DISABLED_BY_POLICY_OTHER ) ;
}
rc = gnutls_cipher_encrypt ( cipher_hnd ,
pwd_buf - > data ,
516 ) ;
gnutls_cipher_deinit ( cipher_hnd ) ;
if ( rc ! = 0 ) {
return gnutls_error_to_ntstatus ( rc , NT_STATUS_ACCESS_DISABLED_BY_POLICY_OTHER ) ;
}
2019-05-29 17:22:11 +03:00
return NT_STATUS_OK ;
2008-07-18 22:42:55 +04:00
}
2021-07-30 17:24:37 +03:00
NTSTATUS init_samr_CryptPasswordAES ( TALLOC_CTX * mem_ctx ,
const char * password ,
2022-10-07 15:35:15 +03:00
DATA_BLOB * salt ,
2021-07-30 17:24:37 +03:00
DATA_BLOB * session_key ,
struct samr_EncryptedPasswordAES * ppwd_buf )
{
uint8_t pw_data [ 514 ] = { 0 } ;
DATA_BLOB plaintext = {
. data = pw_data ,
. length = sizeof ( pw_data ) ,
} ;
DATA_BLOB ciphertext = data_blob_null ;
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
bool ok ;
if ( ppwd_buf = = NULL ) {
return NT_STATUS_INVALID_PARAMETER ;
}
ok = encode_pwd_buffer514_from_str ( pw_data , password , STR_UNICODE ) ;
if ( ! ok ) {
return NT_STATUS_INTERNAL_ERROR ;
}
status = samba_gnutls_aead_aes_256_cbc_hmac_sha512_encrypt (
mem_ctx ,
& plaintext ,
session_key ,
& samr_aes256_enc_key_salt ,
& samr_aes256_mac_key_salt ,
2022-10-07 15:35:15 +03:00
salt ,
2021-07-30 17:24:37 +03:00
& ciphertext ,
ppwd_buf - > auth_data ) ;
BURN_DATA ( pw_data ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
ppwd_buf - > cipher_len = ciphertext . length ;
ppwd_buf - > cipher = ciphertext . data ;
ppwd_buf - > PBKDF2Iterations = 0 ;
2022-10-07 15:35:15 +03:00
SMB_ASSERT ( salt - > length = = sizeof ( ppwd_buf - > salt ) ) ;
memcpy ( ppwd_buf - > salt , salt - > data , salt - > length ) ;
2021-07-30 17:24:37 +03:00
return NT_STATUS_OK ;
}