diff options
Diffstat (limited to 'source4/rpc_server/dcesrv_crypto_schannel.c')
-rw-r--r-- | source4/rpc_server/dcesrv_crypto_schannel.c | 170 |
1 files changed, 170 insertions, 0 deletions
diff --git a/source4/rpc_server/dcesrv_crypto_schannel.c b/source4/rpc_server/dcesrv_crypto_schannel.c new file mode 100644 index 0000000000..a9256fb664 --- /dev/null +++ b/source4/rpc_server/dcesrv_crypto_schannel.c @@ -0,0 +1,170 @@ +/* + Unix SMB/CIFS implementation. + + server side dcerpc authentication code - schannel auth/crypto code + + Copyright (C) Andrew Tridgell 2004 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +*/ + +#include "includes.h" + +struct srv_schannel_state { + TALLOC_CTX *mem_ctx; + struct dcerpc_bind_schannel bind_info; + struct schannel_state *state; +}; + +/* + start crypto state +*/ +static NTSTATUS dcesrv_crypto_schannel_start(struct dcesrv_auth *auth, DATA_BLOB *auth_blob) +{ + struct srv_schannel_state *schannel = NULL; + NTSTATUS status; + TALLOC_CTX *mem_ctx; + uint8_t session_key[16]; + + mem_ctx = talloc_init("schannel_start"); + if (!mem_ctx) { + return NT_STATUS_NO_MEMORY; + } + + schannel = talloc_p(mem_ctx, struct srv_schannel_state); + if (!schannel) { + talloc_destroy(mem_ctx); + return NT_STATUS_NO_MEMORY; + } + + schannel->mem_ctx = mem_ctx; + + /* parse the schannel startup blob */ + status = ndr_pull_struct_blob(auth_blob, mem_ctx, &schannel->bind_info, + (ndr_pull_flags_fn_t)ndr_pull_dcerpc_bind_schannel); + if (!NT_STATUS_IS_OK(status)) { + talloc_destroy(mem_ctx); + return NT_STATUS_INVALID_PARAMETER; + } + + /* pull the session key for this client */ + status = schannel_fetch_session_key(mem_ctx, schannel->bind_info.hostname, session_key); + if (!NT_STATUS_IS_OK(status)) { + talloc_destroy(mem_ctx); + return NT_STATUS_INVALID_HANDLE; + } + + /* start up the schannel server code */ + status = schannel_start(&schannel->state, session_key, False); + if (!NT_STATUS_IS_OK(status)) { + talloc_destroy(mem_ctx); + return NT_STATUS_INVALID_HANDLE; + } + + auth->crypto_ctx.private_data = schannel; + + return status; +} + +/* + update crypto state +*/ +static NTSTATUS dcesrv_crypto_schannel_update(struct dcesrv_auth *auth, TALLOC_CTX *out_mem_ctx, + const DATA_BLOB in, DATA_BLOB *out) +{ + return NT_STATUS_OK; +} + +/* + seal a packet +*/ +static NTSTATUS dcesrv_crypto_schannel_seal(struct dcesrv_auth *auth, TALLOC_CTX *sig_mem_ctx, + uint8_t *data, size_t length, DATA_BLOB *sig) +{ + struct srv_schannel_state *srv_schannel_state = auth->crypto_ctx.private_data; + + return schannel_seal_packet(srv_schannel_state->state, sig_mem_ctx, data, length, sig); +} + +/* + sign a packet +*/ +static NTSTATUS dcesrv_crypto_schannel_sign(struct dcesrv_auth *auth, TALLOC_CTX *sig_mem_ctx, + const uint8_t *data, size_t length, DATA_BLOB *sig) +{ + struct srv_schannel_state *srv_schannel_state = auth->crypto_ctx.private_data; + + return schannel_sign_packet(srv_schannel_state->state, sig_mem_ctx, data, length, sig); +} + +/* + check a packet signature +*/ +static NTSTATUS dcesrv_crypto_schannel_check_sig(struct dcesrv_auth *auth, TALLOC_CTX *sig_mem_ctx, + const uint8_t *data, size_t length, const DATA_BLOB *sig) +{ + struct srv_schannel_state *srv_schannel_state = auth->crypto_ctx.private_data; + + return schannel_check_packet(srv_schannel_state->state, data, length, sig); +} + +/* + unseal a packet +*/ +static NTSTATUS dcesrv_crypto_schannel_unseal(struct dcesrv_auth *auth, TALLOC_CTX *sig_mem_ctx, + uint8_t *data, size_t length, DATA_BLOB *sig) +{ + struct srv_schannel_state *srv_schannel_state = auth->crypto_ctx.private_data; + + return schannel_unseal_packet(srv_schannel_state->state, sig_mem_ctx, data, length, sig); +} + +/* + end crypto state +*/ +static void dcesrv_crypto_schannel_end(struct dcesrv_auth *auth) +{ + struct srv_schannel_state *srv_schannel_state = auth->crypto_ctx.private_data; + + if (srv_schannel_state == NULL) { + return; + } + + schannel_end(&srv_schannel_state->state); + + talloc_destroy(srv_schannel_state->mem_ctx); + + auth->crypto_ctx.private_data = NULL; +} + +static const struct dcesrv_crypto_ops dcesrv_crypto_schannel_ops = { + .name = "schannel", + .auth_type = DCERPC_AUTH_TYPE_SCHANNEL, + .start = dcesrv_crypto_schannel_start, + .update = dcesrv_crypto_schannel_update, + .seal = dcesrv_crypto_schannel_seal, + .sign = dcesrv_crypto_schannel_sign, + .check_sig = dcesrv_crypto_schannel_check_sig, + .unseal = dcesrv_crypto_schannel_unseal, + .end = dcesrv_crypto_schannel_end +}; + +/* + startup the cryptographic side of an authenticated dcerpc server +*/ +const struct dcesrv_crypto_ops *dcesrv_crypto_schannel_get_ops(void) +{ + return &dcesrv_crypto_schannel_ops; +} |