2 Unix SMB/Netbios implementation.
4 SMB parameters and setup
5 Copyright (C) Andrew Tridgell 1992-1998
6 Modified by Jeremy Allison 1995.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 extern int DEBUGLEVEL;
32 #include "smbbyteorder.h"
34 #include "smbencrypt.h"
41 /****************************************************************************
42 Like strncpy but always null terminates. Make sure there is room!
43 The variable n should always be one less than the available size.
44 ****************************************************************************/
46 static char *StrnCpy(char *dest,const char *src, size_t n)
49 if (!dest) return(NULL);
54 while (n-- && (*d++ = *src++)) ;
59 static size_t skip_multibyte_char(char c)
65 static void strupper(char *s)
70 size_t skip = skip_multibyte_char( *s );
75 if (islower((unsigned char)*s))
76 *s = toupper((unsigned char)*s);
83 extern void SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, unsigned char p24[24]);
86 This implements the X/Open SMB password encryption
87 It takes a password, a 8 byte "crypt key" and puts 24 bytes of
88 encrypted password into p24
91 void SMBencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24)
93 unsigned char p14[15], p21[21];
97 StrnCpy((char *)p14,(char *)passwd,14);
99 strupper((char *)p14);
102 SMBOWFencrypt(p21, c8, p24);
104 #ifdef DEBUG_PASSWORD
105 DEBUG(100,("SMBencrypt: lm#, challenge, response\n"));
106 dump_data(100, (char *)p21, 16);
107 dump_data(100, (char *)c8, 8);
108 dump_data(100, (char *)p24, 24);
112 /* Routines for Windows NT MD4 Hash functions. */
113 static int _my_wcslen(int16_t *str)
122 * Convert a string into an NT UNICODE string.
123 * Note that regardless of processor type
124 * this must be in intel (little-endian)
128 static int _my_mbstowcs(int16_t *dst, unsigned char *src, int len)
133 for(i = 0; i < len; i++) {
145 * Creates the MD4 Hash of the users password in NT UNICODE.
148 static void E_md4hash(unsigned char *passwd, unsigned char *p16)
153 /* Password cannot be longer than 128 characters */
154 len = strlen((char *)passwd);
157 /* Password must be converted to NT unicode */
158 _my_mbstowcs(wpwd, passwd, len);
159 wpwd[len] = 0; /* Ensure string is null terminated */
160 /* Calculate length in bytes */
161 len = _my_wcslen(wpwd) * sizeof(int16_t);
163 mdfour(p16, (unsigned char *)wpwd, len);
166 /* Does the des encryption from the NT or LM MD4 hash. */
167 void SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, unsigned char p24[24])
169 unsigned char p21[21];
173 memcpy(p21, passwd, 16);
177 /* Does the NT MD4 hash then des encryption. */
178 void SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24)
180 unsigned char p21[21];
184 E_md4hash(passwd, p21);
185 SMBOWFencrypt(p21, c8, p24);
187 #ifdef DEBUG_PASSWORD
188 DEBUG(100,("SMBNTencrypt: nt#, challenge, response\n"));
189 dump_data(100, (char *)p21, 16);
190 dump_data(100, (char *)c8, 8);
191 dump_data(100, (char *)p24, 24);