1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-27 03:21:53 +03:00
samba-mirror/source3/libsmb/credentials.c
Luke Leighton 2225fe1376 debug info added
(This used to be commit a3f96555b4)
1997-10-13 13:35:37 +00:00

141 lines
3.6 KiB
C

/*
Unix SMB/Netbios implementation.
Version 1.9.
code to manipulate domain credentials
Copyright (C) Andrew Tridgell 1997
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "includes.h"
extern int DEBUGLEVEL;
/****************************************************************************
setup the session key.
Input: 8 byte challenge block
8 byte server challenge block
16 byte md4 encrypted password
Output:
8 byte session key
****************************************************************************/
void cred_session_key(DOM_CHAL *clnt_chal, DOM_CHAL *srv_chal, char *pass,
char *session_key)
{
uint32 sum[2];
char sum2[8];
char buf[8];
sum[0] = IVAL(clnt_chal->data, 0) + IVAL(srv_chal->data, 0);
sum[1] = IVAL(clnt_chal->data, 4) + IVAL(srv_chal->data, 4);
SIVAL(sum2,0,sum[0]);
SIVAL(sum2,4,sum[1]);
smbhash(pass , sum2, buf);
smbhash(pass+9, buf , session_key);
/* debug output*/
DEBUG(4,("cred_session_key\n"));
DEBUG(5,(" clnt_chal: "));
dump_data(5, clnt_chal->data, 8);
DEBUG(5,(" srv_chal: "));
dump_data(5, srv_chal->data, 8);
DEBUG(5,(" clnt_chal+srv_chal: "));
dump_data(5, sum2, 8);
DEBUG(5,(" session_key: "));
dump_data(5, session_key, 16);
}
/****************************************************************************
create a credential
Input:
8 byte sesssion key
8 byte stored credential
4 byte timestamp
Output:
8 byte credential
****************************************************************************/
void cred_create(char *session_key, DOM_CHAL *stored_cred, UTIME timestamp,
DOM_CHAL *cred)
{
char key2[7];
char buf[8];
char timecred[8];
memcpy(timecred, stored_cred->data, 8);
SIVAL(timecred, 0, IVAL(stored_cred, 0) + timestamp.time);
smbhash(session_key, timecred, buf);
memset(key2, 0, 7);
key2[0] = session_key[7];
smbhash(key2, buf, cred->data);
/* debug output*/
DEBUG(4,("cred_create\n"));
DEBUG(5,(" session_key: "));
dump_data(5, session_key, 16);
DEBUG(5,(" stored_cred: "));
dump_data(5, stored_cred->data, 8);
DEBUG(5,(" timecred: "));
dump_data(5, timecred, 8);
DEBUG(5,(" cred: "));
dump_data(5, cred->data, 8);
}
/****************************************************************************
check a supplied credential
Input:
8 byte received credential
8 byte sesssion key
8 byte stored credential
4 byte timestamp
Output:
returns 1 if computed credential matches received credential
returns 0 otherwise
****************************************************************************/
int cred_assert(DOM_CHAL *cred, char *session_key, DOM_CHAL *stored_cred,
UTIME timestamp)
{
DOM_CHAL cred2;
cred_create(session_key, stored_cred, timestamp, &cred2);
/* debug output*/
DEBUG(4,("cred_assert\n"));
DEBUG(5,(" challenge: "));
dump_data(5, cred->data, 16);
DEBUG(5,(" calculated: "));
dump_data(5, cred2.data, 8);
return memcmp(cred->data, cred2.data, 8) == 0;
}