/* Unix SMB/Netbios implementation. Version 1.9. code to manipulate domain credentials Copyright (C) Andrew Tridgell 1997 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" extern int DEBUGLEVEL; /**************************************************************************** setup the session key. Input: 8 byte challenge block 8 byte server challenge block 16 byte md4 encrypted password Output: 8 byte session key ****************************************************************************/ void cred_session_key(DOM_CHAL *clnt_chal, DOM_CHAL *srv_chal, char *pass, char *session_key) { uint32 sum[2]; char sum2[8]; char buf[8]; sum[0] = IVAL(clnt_chal->data, 0) + IVAL(srv_chal->data, 0); sum[1] = IVAL(clnt_chal->data, 4) + IVAL(srv_chal->data, 4); SIVAL(sum2,0,sum[0]); SIVAL(sum2,4,sum[1]); smbhash(pass , sum2, buf); smbhash(pass+9, buf , session_key); /* debug output*/ DEBUG(4,("cred_session_key\n")); DEBUG(5,(" clnt_chal: ")); dump_data(5, clnt_chal->data, 8); DEBUG(5,(" srv_chal: ")); dump_data(5, srv_chal->data, 8); DEBUG(5,(" clnt_chal+srv_chal: ")); dump_data(5, sum2, 8); DEBUG(5,(" session_key: ")); dump_data(5, session_key, 16); } /**************************************************************************** create a credential Input: 8 byte sesssion key 8 byte stored credential 4 byte timestamp Output: 8 byte credential ****************************************************************************/ void cred_create(char *session_key, DOM_CHAL *stored_cred, UTIME timestamp, DOM_CHAL *cred) { char key2[7]; char buf[8]; char timecred[8]; memcpy(timecred, stored_cred->data, 8); SIVAL(timecred, 0, IVAL(stored_cred, 0) + timestamp.time); smbhash(session_key, timecred, buf); memset(key2, 0, 7); key2[0] = session_key[7]; smbhash(key2, buf, cred->data); /* debug output*/ DEBUG(4,("cred_create\n")); DEBUG(5,(" session_key: ")); dump_data(5, session_key, 16); DEBUG(5,(" stored_cred: ")); dump_data(5, stored_cred->data, 8); DEBUG(5,(" timecred: ")); dump_data(5, timecred, 8); DEBUG(5,(" cred: ")); dump_data(5, cred->data, 8); } /**************************************************************************** check a supplied credential Input: 8 byte received credential 8 byte sesssion key 8 byte stored credential 4 byte timestamp Output: returns 1 if computed credential matches received credential returns 0 otherwise ****************************************************************************/ int cred_assert(DOM_CHAL *cred, char *session_key, DOM_CHAL *stored_cred, UTIME timestamp) { DOM_CHAL cred2; cred_create(session_key, stored_cred, timestamp, &cred2); /* debug output*/ DEBUG(4,("cred_assert\n")); DEBUG(5,(" challenge: ")); dump_data(5, cred->data, 16); DEBUG(5,(" calculated: ")); dump_data(5, cred2.data, 8); return memcmp(cred->data, cred2.data, 8) == 0; }