2003-08-13 05:53:07 +04:00
/*
Unix SMB / CIFS implementation .
SMB parameters and setup
Copyright ( C ) Andrew Tridgell 1992 - 1998
Modified by Jeremy Allison 1995.
Copyright ( C ) Jeremy Allison 1995 - 2000.
Copyright ( C ) Luke Kennethc Casson Leighton 1996 - 2000.
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2002 - 2003
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
2004-11-02 03:24:21 +03:00
# include "system/time.h"
2005-04-25 10:33:20 +04:00
# include "auth/ntlmssp/ntlmssp.h"
2004-11-02 09:14:15 +03:00
# include "lib/crypto/crypto.h"
2005-02-10 08:09:35 +03:00
# include "pstring.h"
2003-08-13 05:53:07 +04:00
/*
This implements the X / Open SMB password encryption
It takes a password ( ' unix ' string ) , a 8 byte " crypt key "
2004-05-02 12:45:00 +04:00
and puts 24 bytes of encrypted password into p24
Returns False if password must have been truncated to create LM hash
*/
2004-06-01 12:30:34 +04:00
BOOL SMBencrypt ( const char * passwd , const uint8_t * c8 , uint8_t p24 [ 24 ] )
2003-08-13 05:53:07 +04:00
{
2004-05-02 12:45:00 +04:00
BOOL ret ;
2004-06-01 12:30:34 +04:00
uint8_t p21 [ 21 ] ;
2003-08-13 05:53:07 +04:00
memset ( p21 , ' \0 ' , 21 ) ;
2004-05-02 12:45:00 +04:00
ret = E_deshash ( passwd , p21 ) ;
2003-08-13 05:53:07 +04:00
SMBOWFencrypt ( p21 , c8 , p24 ) ;
# ifdef DEBUG_PASSWORD
DEBUG ( 100 , ( " SMBencrypt: lm#, challenge, response \n " ) ) ;
2004-11-21 20:47:09 +03:00
dump_data ( 100 , p21 , 16 ) ;
dump_data ( 100 , c8 , 8 ) ;
dump_data ( 100 , p24 , 24 ) ;
2003-08-13 05:53:07 +04:00
# endif
2004-05-02 12:45:00 +04:00
return ret ;
2003-08-13 05:53:07 +04:00
}
/**
* Creates the MD4 Hash of the users password in NT UNICODE .
* @ param passwd password in ' unix ' charset .
* @ param p16 return password hashed with md4 , caller allocated 16 byte buffer
*/
2004-06-01 12:30:34 +04:00
void E_md4hash ( const char * passwd , uint8_t p16 [ 16 ] )
2003-08-13 05:53:07 +04:00
{
int len ;
2004-10-08 12:13:00 +04:00
void * wpwd ;
2003-08-13 05:53:07 +04:00
2004-10-08 12:13:00 +04:00
len = push_ucs2_talloc ( NULL , & wpwd , passwd ) ;
r2552: Character set conversion and string handling updates.
The intial motivation for this commit was to merge in some of the
bugfixes present in Samba3's chrcnv and string handling code into
Samba4. However, along the way I found a lot of unused functions, and
decided to do a bit more...
The strlen_m code now does not use a fixed buffer, but more work is
needed to finish off other functions in str_util.c. These fixed
length buffers hav caused very nasty, hard to chase down bugs at some
sites.
The strupper_m() function has a strupper_talloc() to replace it (we
need to go around and fix more uses, but it's a start). Use of these
new functions will avoid bugs where the upper or lowercase version of
a string is a different length.
I have removed the push_*_allocate functions, which are replaced by
calls to push_*_talloc. Likewise, pstring and other 'fixed length'
wrappers are removed, where possible.
I have removed the first ('base pointer') argument, used by push_ucs2,
as the Samba4 way of doing things ensures that this is always on an
even boundary anyway. (It was used in only one place, in any case).
(This used to be commit dfecb0150627b500cb026b8a4932fe87902ca392)
2004-09-23 04:51:45 +04:00
SMB_ASSERT ( len > = 2 ) ;
len - = 2 ;
2004-10-08 12:13:00 +04:00
mdfour ( p16 , wpwd , len ) ;
talloc_free ( wpwd ) ;
2003-08-13 05:53:07 +04:00
}
/**
* Creates the DES forward - only Hash of the users password in DOS ASCII charset
* @ param passwd password in ' unix ' charset .
* @ param p16 return password hashed with DES , caller allocated 16 byte buffer
2004-05-02 12:45:00 +04:00
* @ return False if password was > 14 characters , and therefore may be incorrect , otherwise True
* @ note p16 is filled in regardless
2003-08-13 05:53:07 +04:00
*/
2004-06-01 12:30:34 +04:00
BOOL E_deshash ( const char * passwd , uint8_t p16 [ 16 ] )
2003-08-13 05:53:07 +04:00
{
2004-05-02 12:45:00 +04:00
BOOL ret = True ;
2003-08-13 05:53:07 +04:00
fstring dospwd ;
ZERO_STRUCT ( dospwd ) ;
/* Password must be converted to DOS charset - null terminated, uppercase. */
2003-11-26 04:16:41 +03:00
push_ascii ( dospwd , passwd , sizeof ( dospwd ) , STR_UPPER | STR_TERMINATE ) ;
2004-05-02 12:45:00 +04:00
2003-08-13 05:53:07 +04:00
/* Only the fisrt 14 chars are considered, password need not be null terminated. */
2004-05-29 12:11:46 +04:00
E_P16 ( ( const uint8_t * ) dospwd , p16 ) ;
2003-08-13 05:53:07 +04:00
2004-05-02 12:45:00 +04:00
if ( strlen ( dospwd ) > 14 ) {
ret = False ;
}
2003-08-13 05:53:07 +04:00
ZERO_STRUCT ( dospwd ) ;
2004-05-02 12:45:00 +04:00
return ret ;
2003-08-13 05:53:07 +04:00
}
/* Does both the NTLMv2 owfs of a user's password */
2004-06-01 12:30:34 +04:00
BOOL ntv2_owf_gen ( const uint8_t owf [ 16 ] ,
2004-05-02 12:45:00 +04:00
const char * user_in , const char * domain_in ,
BOOL upper_case_domain , /* Transform the domain into UPPER case */
2004-06-01 12:30:34 +04:00
uint8_t kr_buf [ 16 ] )
2003-08-13 05:53:07 +04:00
{
2004-10-08 12:13:00 +04:00
void * user ;
void * domain ;
2003-08-13 05:53:07 +04:00
size_t user_byte_len ;
size_t domain_byte_len ;
HMACMD5Context ctx ;
r2552: Character set conversion and string handling updates.
The intial motivation for this commit was to merge in some of the
bugfixes present in Samba3's chrcnv and string handling code into
Samba4. However, along the way I found a lot of unused functions, and
decided to do a bit more...
The strlen_m code now does not use a fixed buffer, but more work is
needed to finish off other functions in str_util.c. These fixed
length buffers hav caused very nasty, hard to chase down bugs at some
sites.
The strupper_m() function has a strupper_talloc() to replace it (we
need to go around and fix more uses, but it's a start). Use of these
new functions will avoid bugs where the upper or lowercase version of
a string is a different length.
I have removed the push_*_allocate functions, which are replaced by
calls to push_*_talloc. Likewise, pstring and other 'fixed length'
wrappers are removed, where possible.
I have removed the first ('base pointer') argument, used by push_ucs2,
as the Samba4 way of doing things ensures that this is always on an
even boundary anyway. (It was used in only one place, in any case).
(This used to be commit dfecb0150627b500cb026b8a4932fe87902ca392)
2004-09-23 04:51:45 +04:00
TALLOC_CTX * mem_ctx = talloc_init ( " ntv2_owf_gen for %s \\ %s " , domain_in , user_in ) ;
if ( ! mem_ctx ) {
return False ;
}
2003-08-13 05:53:07 +04:00
2005-03-06 11:24:34 +03:00
if ( ! user_in ) {
user_in = " " ;
}
if ( ! domain_in ) {
domain_in = " " ;
}
2004-10-08 12:13:00 +04:00
user_in = strupper_talloc ( mem_ctx , user_in ) ;
if ( user_in = = NULL ) {
talloc_free ( mem_ctx ) ;
return False ;
}
if ( upper_case_domain ) {
domain_in = strupper_talloc ( mem_ctx , domain_in ) ;
if ( domain_in = = NULL ) {
talloc_free ( mem_ctx ) ;
return False ;
}
}
r2552: Character set conversion and string handling updates.
The intial motivation for this commit was to merge in some of the
bugfixes present in Samba3's chrcnv and string handling code into
Samba4. However, along the way I found a lot of unused functions, and
decided to do a bit more...
The strlen_m code now does not use a fixed buffer, but more work is
needed to finish off other functions in str_util.c. These fixed
length buffers hav caused very nasty, hard to chase down bugs at some
sites.
The strupper_m() function has a strupper_talloc() to replace it (we
need to go around and fix more uses, but it's a start). Use of these
new functions will avoid bugs where the upper or lowercase version of
a string is a different length.
I have removed the push_*_allocate functions, which are replaced by
calls to push_*_talloc. Likewise, pstring and other 'fixed length'
wrappers are removed, where possible.
I have removed the first ('base pointer') argument, used by push_ucs2,
as the Samba4 way of doing things ensures that this is always on an
even boundary anyway. (It was used in only one place, in any case).
(This used to be commit dfecb0150627b500cb026b8a4932fe87902ca392)
2004-09-23 04:51:45 +04:00
user_byte_len = push_ucs2_talloc ( mem_ctx , & user , user_in ) ;
if ( user_byte_len = = ( ssize_t ) - 1 ) {
DEBUG ( 0 , ( " push_uss2_talloc() for user returned -1 (probably talloc() failure) \n " ) ) ;
talloc_free ( mem_ctx ) ;
2003-08-13 05:53:07 +04:00
return False ;
}
r2552: Character set conversion and string handling updates.
The intial motivation for this commit was to merge in some of the
bugfixes present in Samba3's chrcnv and string handling code into
Samba4. However, along the way I found a lot of unused functions, and
decided to do a bit more...
The strlen_m code now does not use a fixed buffer, but more work is
needed to finish off other functions in str_util.c. These fixed
length buffers hav caused very nasty, hard to chase down bugs at some
sites.
The strupper_m() function has a strupper_talloc() to replace it (we
need to go around and fix more uses, but it's a start). Use of these
new functions will avoid bugs where the upper or lowercase version of
a string is a different length.
I have removed the push_*_allocate functions, which are replaced by
calls to push_*_talloc. Likewise, pstring and other 'fixed length'
wrappers are removed, where possible.
I have removed the first ('base pointer') argument, used by push_ucs2,
as the Samba4 way of doing things ensures that this is always on an
even boundary anyway. (It was used in only one place, in any case).
(This used to be commit dfecb0150627b500cb026b8a4932fe87902ca392)
2004-09-23 04:51:45 +04:00
domain_byte_len = push_ucs2_talloc ( mem_ctx , & domain , domain_in ) ;
if ( domain_byte_len = = ( ssize_t ) - 1 ) {
DEBUG ( 0 , ( " push_ucs2_talloc() for domain returned -1 (probably talloc() failure) \n " ) ) ;
talloc_free ( mem_ctx ) ;
2003-08-13 05:53:07 +04:00
return False ;
}
SMB_ASSERT ( user_byte_len > = 2 ) ;
SMB_ASSERT ( domain_byte_len > = 2 ) ;
/* We don't want null termination */
user_byte_len = user_byte_len - 2 ;
domain_byte_len = domain_byte_len - 2 ;
hmac_md5_init_limK_to_64 ( owf , 16 , & ctx ) ;
2004-10-08 12:13:00 +04:00
hmac_md5_update ( user , user_byte_len , & ctx ) ;
hmac_md5_update ( domain , domain_byte_len , & ctx ) ;
2003-08-13 05:53:07 +04:00
hmac_md5_final ( kr_buf , & ctx ) ;
# ifdef DEBUG_PASSWORD
DEBUG ( 100 , ( " ntv2_owf_gen: user, domain, owfkey, kr \n " ) ) ;
2004-10-08 12:13:00 +04:00
dump_data ( 100 , user , user_byte_len ) ;
dump_data ( 100 , domain , domain_byte_len ) ;
2003-08-13 05:53:07 +04:00
dump_data ( 100 , owf , 16 ) ;
dump_data ( 100 , kr_buf , 16 ) ;
# endif
r2552: Character set conversion and string handling updates.
The intial motivation for this commit was to merge in some of the
bugfixes present in Samba3's chrcnv and string handling code into
Samba4. However, along the way I found a lot of unused functions, and
decided to do a bit more...
The strlen_m code now does not use a fixed buffer, but more work is
needed to finish off other functions in str_util.c. These fixed
length buffers hav caused very nasty, hard to chase down bugs at some
sites.
The strupper_m() function has a strupper_talloc() to replace it (we
need to go around and fix more uses, but it's a start). Use of these
new functions will avoid bugs where the upper or lowercase version of
a string is a different length.
I have removed the push_*_allocate functions, which are replaced by
calls to push_*_talloc. Likewise, pstring and other 'fixed length'
wrappers are removed, where possible.
I have removed the first ('base pointer') argument, used by push_ucs2,
as the Samba4 way of doing things ensures that this is always on an
even boundary anyway. (It was used in only one place, in any case).
(This used to be commit dfecb0150627b500cb026b8a4932fe87902ca392)
2004-09-23 04:51:45 +04:00
talloc_free ( mem_ctx ) ;
2003-08-13 05:53:07 +04:00
return True ;
}
/* Does the des encryption from the NT or LM MD4 hash. */
2004-06-01 12:30:34 +04:00
void SMBOWFencrypt ( const uint8_t passwd [ 16 ] , const uint8_t * c8 , uint8_t p24 [ 24 ] )
2003-08-13 05:53:07 +04:00
{
2004-06-01 12:30:34 +04:00
uint8_t p21 [ 21 ] ;
2003-08-13 05:53:07 +04:00
ZERO_STRUCT ( p21 ) ;
memcpy ( p21 , passwd , 16 ) ;
E_P24 ( p21 , c8 , p24 ) ;
}
/* Does the NT MD4 hash then des encryption. */
2004-06-01 12:30:34 +04:00
void SMBNTencrypt ( const char * passwd , uint8_t * c8 , uint8_t * p24 )
2003-08-13 05:53:07 +04:00
{
2004-06-01 12:30:34 +04:00
uint8_t p21 [ 21 ] ;
2003-08-13 05:53:07 +04:00
memset ( p21 , ' \0 ' , 21 ) ;
E_md4hash ( passwd , p21 ) ;
SMBOWFencrypt ( p21 , c8 , p24 ) ;
# ifdef DEBUG_PASSWORD
DEBUG ( 100 , ( " SMBNTencrypt: nt#, challenge, response \n " ) ) ;
2004-11-21 20:47:09 +03:00
dump_data ( 100 , p21 , 16 ) ;
dump_data ( 100 , c8 , 8 ) ;
dump_data ( 100 , p24 , 24 ) ;
2003-08-13 05:53:07 +04:00
# endif
}
2003-11-26 04:16:41 +03:00
/* Does the md5 encryption from the Key Response for NTLMv2. */
2004-06-01 12:30:34 +04:00
void SMBOWFencrypt_ntv2 ( const uint8_t kr [ 16 ] ,
2003-11-26 04:16:41 +03:00
const DATA_BLOB * srv_chal ,
2004-08-04 17:23:35 +04:00
const DATA_BLOB * smbcli_chal ,
2004-06-01 12:30:34 +04:00
uint8_t resp_buf [ 16 ] )
2003-08-13 05:53:07 +04:00
{
HMACMD5Context ctx ;
hmac_md5_init_limK_to_64 ( kr , 16 , & ctx ) ;
2003-11-26 04:16:41 +03:00
hmac_md5_update ( srv_chal - > data , srv_chal - > length , & ctx ) ;
2004-08-04 17:23:35 +04:00
hmac_md5_update ( smbcli_chal - > data , smbcli_chal - > length , & ctx ) ;
2003-08-13 05:53:07 +04:00
hmac_md5_final ( resp_buf , & ctx ) ;
# ifdef DEBUG_PASSWORD
2004-08-04 17:23:35 +04:00
DEBUG ( 100 , ( " SMBOWFencrypt_ntv2: srv_chal, smbcli_chal, resp_buf \n " ) ) ;
2003-11-26 04:16:41 +03:00
dump_data ( 100 , srv_chal - > data , srv_chal - > length ) ;
2004-08-04 17:23:35 +04:00
dump_data ( 100 , smbcli_chal - > data , smbcli_chal - > length ) ;
2003-08-13 05:53:07 +04:00
dump_data ( 100 , resp_buf , 16 ) ;
# endif
}
2004-06-01 12:30:34 +04:00
void SMBsesskeygen_ntv2 ( const uint8_t kr [ 16 ] ,
const uint8_t * nt_resp , uint8_t sess_key [ 16 ] )
2003-08-13 05:53:07 +04:00
{
2003-11-26 04:16:41 +03:00
/* a very nice, 128 bit, variable session key */
2003-08-13 05:53:07 +04:00
HMACMD5Context ctx ;
hmac_md5_init_limK_to_64 ( kr , 16 , & ctx ) ;
hmac_md5_update ( nt_resp , 16 , & ctx ) ;
2004-05-29 12:11:46 +04:00
hmac_md5_final ( ( uint8_t * ) sess_key , & ctx ) ;
2003-08-13 05:53:07 +04:00
# ifdef DEBUG_PASSWORD
DEBUG ( 100 , ( " SMBsesskeygen_ntv2: \n " ) ) ;
dump_data ( 100 , sess_key , 16 ) ;
# endif
}
2004-06-01 12:30:34 +04:00
void SMBsesskeygen_ntv1 ( const uint8_t kr [ 16 ] , uint8_t sess_key [ 16 ] )
2003-08-13 05:53:07 +04:00
{
2003-11-26 04:16:41 +03:00
/* yes, this session key does not change - yes, this
is a problem - but it is 128 bits */
2004-05-29 12:11:46 +04:00
mdfour ( ( uint8_t * ) sess_key , kr , 16 ) ;
2003-08-13 05:53:07 +04:00
# ifdef DEBUG_PASSWORD
DEBUG ( 100 , ( " SMBsesskeygen_ntv1: \n " ) ) ;
dump_data ( 100 , sess_key , 16 ) ;
# endif
}
2004-06-01 12:30:34 +04:00
void SMBsesskeygen_lm_sess_key ( const uint8_t lm_hash [ 16 ] ,
const uint8_t lm_resp [ 24 ] , /* only uses 8 */
2004-05-25 21:50:17 +04:00
uint8_t sess_key [ 16 ] )
2003-11-26 04:16:41 +03:00
{
/* Calculate the LM session key (effective length 40 bits,
but changes with each session ) */
2004-06-01 12:30:34 +04:00
uint8_t p24 [ 24 ] ;
uint8_t p21 [ 21 ] ;
2004-05-02 16:42:01 +04:00
memset ( p21 , ' \0 ' , 21 ) ;
memcpy ( p21 , lm_hash , 8 ) ;
memset ( p21 + 8 , 0xbd , 8 ) ;
2003-11-26 04:16:41 +03:00
2004-05-02 16:42:01 +04:00
E_P24 ( p21 , lm_resp , p24 ) ;
2004-05-02 12:45:00 +04:00
memcpy ( sess_key , p24 , 16 ) ;
# ifdef DEBUG_PASSWORD
2004-05-02 16:42:01 +04:00
DEBUG ( 100 , ( " SMBsesskeygen_lm_sess_key: \n " ) ) ;
2004-05-02 12:45:00 +04:00
dump_data ( 100 , sess_key , 16 ) ;
# endif
}
2004-05-25 18:06:28 +04:00
DATA_BLOB NTLMv2_generate_names_blob ( TALLOC_CTX * mem_ctx ,
const char * hostname ,
2003-11-26 04:16:41 +03:00
const char * domain )
{
2004-05-25 18:06:28 +04:00
DATA_BLOB names_blob = data_blob_talloc ( mem_ctx , NULL , 0 ) ;
2003-11-26 04:16:41 +03:00
2004-06-28 10:46:27 +04:00
msrpc_gen ( mem_ctx , & names_blob , " aaa " ,
NTLMSSP_NAME_TYPE_DOMAIN , domain ,
NTLMSSP_NAME_TYPE_SERVER , hostname ,
0 , " " ) ;
2003-11-26 04:16:41 +03:00
return names_blob ;
}
2004-05-25 18:06:28 +04:00
static DATA_BLOB NTLMv2_generate_client_data ( TALLOC_CTX * mem_ctx , const DATA_BLOB * names_blob )
2003-11-26 04:16:41 +03:00
{
2004-06-01 12:30:34 +04:00
uint8_t client_chal [ 8 ] ;
2003-11-26 04:16:41 +03:00
DATA_BLOB response = data_blob ( NULL , 0 ) ;
2004-12-04 16:56:25 +03:00
uint8_t long_date [ 8 ] ;
2004-04-11 00:18:22 +04:00
NTTIME nttime ;
unix_to_nt_time ( & nttime , time ( NULL ) ) ;
2003-11-26 04:16:41 +03:00
2004-07-14 16:14:07 +04:00
generate_random_buffer ( client_chal , sizeof ( client_chal ) ) ;
2003-11-26 04:16:41 +03:00
2004-05-25 17:57:39 +04:00
push_nttime ( long_date , 0 , nttime ) ;
2003-11-26 04:16:41 +03:00
/* See http://www.ubiqx.org/cifs/SMB.html#SMB.8.5 */
2004-06-28 10:46:27 +04:00
msrpc_gen ( mem_ctx , & response , " ddbbdb " ,
0x00000101 , /* Header */
0 , /* 'Reserved' */
long_date , 8 , /* Timestamp */
client_chal , 8 , /* client challenge */
0 , /* Unknown */
names_blob - > data , names_blob - > length ) ; /* End of name list */
2003-11-26 04:16:41 +03:00
return response ;
}
2005-06-19 17:26:32 +04:00
static DATA_BLOB NTLMv2_generate_response ( TALLOC_CTX * out_mem_ctx ,
const uint8_t ntlm_v2_hash [ 16 ] ,
2003-11-26 04:16:41 +03:00
const DATA_BLOB * server_chal ,
const DATA_BLOB * names_blob )
2003-08-13 05:53:07 +04:00
{
2004-06-01 12:30:34 +04:00
uint8_t ntlmv2_response [ 16 ] ;
2003-08-13 05:53:07 +04:00
DATA_BLOB ntlmv2_client_data ;
DATA_BLOB final_response ;
2005-06-19 17:26:32 +04:00
TALLOC_CTX * mem_ctx = talloc_named ( out_mem_ctx , 0 ,
" NTLMv2_generate_response internal context " ) ;
2004-05-25 18:06:28 +04:00
if ( ! mem_ctx ) {
return data_blob ( NULL , 0 ) ;
}
2003-08-13 05:53:07 +04:00
/* NTLMv2 */
2003-11-26 04:16:41 +03:00
/* generate some data to pass into the response function - including
the hostname and domain name of the server */
2004-05-25 18:06:28 +04:00
ntlmv2_client_data = NTLMv2_generate_client_data ( mem_ctx , names_blob ) ;
2003-08-13 05:53:07 +04:00
/* Given that data, and the challenge from the server, generate a response */
2003-11-26 04:16:41 +03:00
SMBOWFencrypt_ntv2 ( ntlm_v2_hash , server_chal , & ntlmv2_client_data , ntlmv2_response ) ;
2003-08-13 05:53:07 +04:00
2005-06-19 17:26:32 +04:00
final_response = data_blob ( out_mem_ctx , sizeof ( ntlmv2_response ) + ntlmv2_client_data . length ) ;
2003-11-26 04:16:41 +03:00
2003-08-13 05:53:07 +04:00
memcpy ( final_response . data , ntlmv2_response , sizeof ( ntlmv2_response ) ) ;
2003-11-26 04:16:41 +03:00
memcpy ( final_response . data + sizeof ( ntlmv2_response ) ,
ntlmv2_client_data . data , ntlmv2_client_data . length ) ;
2005-01-27 10:08:20 +03:00
talloc_free ( mem_ctx ) ;
2003-08-13 05:53:07 +04:00
return final_response ;
}
2005-06-19 17:26:32 +04:00
static DATA_BLOB LMv2_generate_response ( TALLOC_CTX * mem_ctx ,
const uint8_t ntlm_v2_hash [ 16 ] ,
2003-11-26 04:16:41 +03:00
const DATA_BLOB * server_chal )
{
2004-06-01 12:30:34 +04:00
uint8_t lmv2_response [ 16 ] ;
2005-06-19 17:26:32 +04:00
DATA_BLOB lmv2_client_data = data_blob ( mem_ctx , 8 ) ;
DATA_BLOB final_response = data_blob ( mem_ctx , 24 ) ;
2003-11-26 04:16:41 +03:00
/* LMv2 */
/* client-supplied random data */
2004-07-14 16:14:07 +04:00
generate_random_buffer ( lmv2_client_data . data , lmv2_client_data . length ) ;
2003-11-26 04:16:41 +03:00
/* Given that data, and the challenge from the server, generate a response */
SMBOWFencrypt_ntv2 ( ntlm_v2_hash , server_chal , & lmv2_client_data , lmv2_response ) ;
memcpy ( final_response . data , lmv2_response , sizeof ( lmv2_response ) ) ;
/* after the first 16 bytes is the random data we generated above,
so the server can verify us with it */
memcpy ( final_response . data + sizeof ( lmv2_response ) ,
lmv2_client_data . data , lmv2_client_data . length ) ;
data_blob_free ( & lmv2_client_data ) ;
return final_response ;
}
2005-06-19 17:26:32 +04:00
BOOL SMBNTLMv2encrypt_hash ( TALLOC_CTX * mem_ctx ,
const char * user , const char * domain , const uint8_t nt_hash [ 16 ] ,
2004-11-12 02:24:30 +03:00
const DATA_BLOB * server_chal ,
const DATA_BLOB * names_blob ,
DATA_BLOB * lm_response , DATA_BLOB * nt_response ,
DATA_BLOB * lm_session_key , DATA_BLOB * user_session_key )
2003-08-13 05:53:07 +04:00
{
2004-06-01 12:30:34 +04:00
uint8_t ntlm_v2_hash [ 16 ] ;
2003-08-13 05:53:07 +04:00
/* We don't use the NT# directly. Instead we use it mashed up with
the username and domain .
This prevents username swapping during the auth exchange
*/
2004-05-02 12:45:00 +04:00
if ( ! ntv2_owf_gen ( nt_hash , user , domain , True , ntlm_v2_hash ) ) {
2003-08-13 05:53:07 +04:00
return False ;
}
2003-11-26 04:16:41 +03:00
if ( nt_response ) {
2005-06-19 17:26:32 +04:00
* nt_response = NTLMv2_generate_response ( mem_ctx ,
ntlm_v2_hash , server_chal ,
2003-11-26 04:16:41 +03:00
names_blob ) ;
2004-05-02 12:45:00 +04:00
if ( user_session_key ) {
2005-06-19 17:26:32 +04:00
* user_session_key = data_blob ( mem_ctx , 16 ) ;
2003-11-26 04:16:41 +03:00
/* The NTLMv2 calculations also provide a session key, for signing etc later */
/* use only the first 16 bytes of nt_response for session key */
2004-05-02 12:45:00 +04:00
SMBsesskeygen_ntv2 ( ntlm_v2_hash , nt_response - > data , user_session_key - > data ) ;
2003-11-26 04:16:41 +03:00
}
}
2003-08-13 05:53:07 +04:00
/* LMv2 */
2003-11-26 04:16:41 +03:00
if ( lm_response ) {
2005-06-19 17:26:32 +04:00
* lm_response = LMv2_generate_response ( mem_ctx ,
ntlm_v2_hash , server_chal ) ;
2004-11-10 13:58:15 +03:00
if ( lm_session_key ) {
2005-06-19 17:26:32 +04:00
* lm_session_key = data_blob ( mem_ctx , 16 ) ;
2004-11-10 13:58:15 +03:00
/* The NTLMv2 calculations also provide a session key, for signing etc later */
/* use only the first 16 bytes of lm_response for session key */
SMBsesskeygen_ntv2 ( ntlm_v2_hash , lm_response - > data , lm_session_key - > data ) ;
}
2003-11-26 04:16:41 +03:00
}
2003-08-13 05:53:07 +04:00
return True ;
}
2005-06-19 17:26:32 +04:00
BOOL SMBNTLMv2encrypt ( TALLOC_CTX * mem_ctx ,
const char * user , const char * domain ,
const char * password ,
2004-11-12 02:24:30 +03:00
const DATA_BLOB * server_chal ,
const DATA_BLOB * names_blob ,
DATA_BLOB * lm_response , DATA_BLOB * nt_response ,
DATA_BLOB * lm_session_key , DATA_BLOB * user_session_key )
{
uint8_t nt_hash [ 16 ] ;
E_md4hash ( password , nt_hash ) ;
2005-06-19 17:26:32 +04:00
return SMBNTLMv2encrypt_hash ( mem_ctx ,
user , domain , nt_hash , server_chal , names_blob ,
2004-11-12 02:24:30 +03:00
lm_response , nt_response , lm_session_key , user_session_key ) ;
}
2003-08-13 05:53:07 +04:00
/***********************************************************
2004-04-21 09:01:31 +04:00
encode a password buffer with a unicode password . The buffer
is filled with random data to make it harder to attack .
2003-08-13 05:53:07 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2004-11-22 10:54:16 +03:00
BOOL encode_pw_buffer ( uint8_t buffer [ 516 ] , const char * password , int string_flags )
2003-08-13 05:53:07 +04:00
{
2004-06-01 12:30:34 +04:00
uint8_t new_pw [ 512 ] ;
2004-04-21 09:01:31 +04:00
size_t new_pw_len ;
2003-08-13 05:53:07 +04:00
r2552: Character set conversion and string handling updates.
The intial motivation for this commit was to merge in some of the
bugfixes present in Samba3's chrcnv and string handling code into
Samba4. However, along the way I found a lot of unused functions, and
decided to do a bit more...
The strlen_m code now does not use a fixed buffer, but more work is
needed to finish off other functions in str_util.c. These fixed
length buffers hav caused very nasty, hard to chase down bugs at some
sites.
The strupper_m() function has a strupper_talloc() to replace it (we
need to go around and fix more uses, but it's a start). Use of these
new functions will avoid bugs where the upper or lowercase version of
a string is a different length.
I have removed the push_*_allocate functions, which are replaced by
calls to push_*_talloc. Likewise, pstring and other 'fixed length'
wrappers are removed, where possible.
I have removed the first ('base pointer') argument, used by push_ucs2,
as the Samba4 way of doing things ensures that this is always on an
even boundary anyway. (It was used in only one place, in any case).
(This used to be commit dfecb0150627b500cb026b8a4932fe87902ca392)
2004-09-23 04:51:45 +04:00
new_pw_len = push_string ( new_pw ,
2004-04-21 09:01:31 +04:00
password ,
sizeof ( new_pw ) , string_flags ) ;
memcpy ( & buffer [ 512 - new_pw_len ] , new_pw , new_pw_len ) ;
2004-11-22 10:54:16 +03:00
generate_random_buffer ( buffer , 512 - new_pw_len ) ;
2003-08-13 05:53:07 +04:00
/*
* The length of the new password is in the last 4 bytes of
* the data buffer .
*/
2004-04-21 09:01:31 +04:00
SIVAL ( buffer , 512 , new_pw_len ) ;
ZERO_STRUCT ( new_pw ) ;
2003-08-13 05:53:07 +04:00
return True ;
}
2004-04-22 10:18:40 +04:00
2003-08-13 05:53:07 +04:00
/***********************************************************
decode a password buffer
* new_pw_len is the length in bytes of the possibly mulitbyte
returned password including termination .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2004-11-22 10:59:14 +03:00
BOOL decode_pw_buffer ( uint8_t in_buffer [ 516 ] , char * new_pwrd ,
2004-05-25 20:24:13 +04:00
int new_pwrd_size , uint32_t * new_pw_len ,
2004-05-02 12:45:00 +04:00
int string_flags )
2003-08-13 05:53:07 +04:00
{
int byte_len = 0 ;
/*
Warning ! ! ! : This function is called from some rpc call .
2004-05-02 12:45:00 +04:00
The password IN the buffer may be a UNICODE string .
2003-08-13 05:53:07 +04:00
The password IN new_pwrd is an ASCII string
If you reuse that code somewhere else check first .
*/
/* The length of the new password is in the last 4 bytes of the data buffer. */
byte_len = IVAL ( in_buffer , 512 ) ;
# ifdef DEBUG_PASSWORD
dump_data ( 100 , in_buffer , 516 ) ;
# endif
2004-05-02 12:45:00 +04:00
/* Password cannot be longer than the size of the password buffer */
if ( ( byte_len < 0 ) | | ( byte_len > 512 ) ) {
2003-08-13 05:53:07 +04:00
return False ;
}
2004-05-02 12:45:00 +04:00
/* decode into the return buffer. Buffer length supplied */
r2552: Character set conversion and string handling updates.
The intial motivation for this commit was to merge in some of the
bugfixes present in Samba3's chrcnv and string handling code into
Samba4. However, along the way I found a lot of unused functions, and
decided to do a bit more...
The strlen_m code now does not use a fixed buffer, but more work is
needed to finish off other functions in str_util.c. These fixed
length buffers hav caused very nasty, hard to chase down bugs at some
sites.
The strupper_m() function has a strupper_talloc() to replace it (we
need to go around and fix more uses, but it's a start). Use of these
new functions will avoid bugs where the upper or lowercase version of
a string is a different length.
I have removed the push_*_allocate functions, which are replaced by
calls to push_*_talloc. Likewise, pstring and other 'fixed length'
wrappers are removed, where possible.
I have removed the first ('base pointer') argument, used by push_ucs2,
as the Samba4 way of doing things ensures that this is always on an
even boundary anyway. (It was used in only one place, in any case).
(This used to be commit dfecb0150627b500cb026b8a4932fe87902ca392)
2004-09-23 04:51:45 +04:00
* new_pw_len = pull_string ( new_pwrd , & in_buffer [ 512 - byte_len ] , new_pwrd_size ,
2004-05-02 12:45:00 +04:00
byte_len , string_flags ) ;
2003-08-13 05:53:07 +04:00
# ifdef DEBUG_PASSWORD
DEBUG ( 100 , ( " decode_pw_buffer: new_pwrd: " ) ) ;
2004-11-22 10:59:14 +03:00
dump_data ( 100 , ( const uint8_t * ) new_pwrd , * new_pw_len ) ;
2003-08-13 05:53:07 +04:00
DEBUG ( 100 , ( " multibyte len:%d \n " , * new_pw_len ) ) ;
DEBUG ( 100 , ( " original char len:%d \n " , byte_len / 2 ) ) ;
# endif
return True ;
}