2 Unix SMB/Netbios implementation.
4 SMB parameters and setup
5 Copyright (C) Andrew Tridgell 1992-1998
6 Modified by Jeremy Allison 1995.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 extern int DEBUGLEVEL;
31 #include "smbbyteorder.h"
33 #include "smbencrypt.h"
37 typedef unsigned char uchar;
38 typedef signed short int16;
44 /****************************************************************************
45 Like strncpy but always null terminates. Make sure there is room!
46 The variable n should always be one less than the available size.
47 ****************************************************************************/
49 static char *StrnCpy(char *dest,const char *src, size_t n)
52 if (!dest) return(NULL);
57 while (n-- && (*d++ = *src++)) ;
62 static size_t skip_multibyte_char(char c)
69 /*******************************************************************
70 safe string copy into a known length string. maxlength does not
71 include the terminating zero.
72 ********************************************************************/
74 static void strupper(char *s)
79 size_t skip = skip_multibyte_char( *s );
84 if (islower((unsigned char)*s))
85 *s = toupper((unsigned char)*s);
92 extern void SMBOWFencrypt(uchar passwd[16], uchar *c8, uchar p24[24]);
95 This implements the X/Open SMB password encryption
96 It takes a password, a 8 byte "crypt key" and puts 24 bytes of
97 encrypted password into p24
100 void SMBencrypt(uchar *passwd, uchar *c8, uchar *p24)
102 uchar p14[15], p21[21];
106 StrnCpy((char *)p14,(char *)passwd,14);
108 strupper((char *)p14);
111 SMBOWFencrypt(p21, c8, p24);
113 #ifdef DEBUG_PASSWORD
114 DEBUG(100,("SMBencrypt: lm#, challenge, response\n"));
115 dump_data(100, (char *)p21, 16);
116 dump_data(100, (char *)c8, 8);
117 dump_data(100, (char *)p24, 24);
121 /* Routines for Windows NT MD4 Hash functions. */
122 static int _my_wcslen(int16 *str)
131 * Convert a string into an NT UNICODE string.
132 * Note that regardless of processor type
133 * this must be in intel (little-endian)
137 static int _my_mbstowcs(int16 *dst, uchar *src, int len)
142 for(i = 0; i < len; i++) {
154 * Creates the MD4 Hash of the users password in NT UNICODE.
157 static void E_md4hash(uchar *passwd, uchar *p16)
162 /* Password cannot be longer than 128 characters */
163 len = strlen((char *)passwd);
166 /* Password must be converted to NT unicode */
167 _my_mbstowcs(wpwd, passwd, len);
168 wpwd[len] = 0; /* Ensure string is null terminated */
169 /* Calculate length in bytes */
170 len = _my_wcslen(wpwd) * sizeof(int16);
172 mdfour(p16, (unsigned char *)wpwd, len);
175 /* Does the des encryption from the NT or LM MD4 hash. */
176 void SMBOWFencrypt(uchar passwd[16], uchar *c8, uchar p24[24])
182 memcpy(p21, passwd, 16);
186 /* Does the NT MD4 hash then des encryption. */
188 void SMBNTencrypt(uchar *passwd, uchar *c8, uchar *p24)
194 E_md4hash(passwd, p21);
195 SMBOWFencrypt(p21, c8, p24);
197 #ifdef DEBUG_PASSWORD
198 DEBUG(100,("SMBNTencrypt: nt#, challenge, response\n"));
199 dump_data(100, (char *)p21, 16);
200 dump_data(100, (char *)c8, 8);
201 dump_data(100, (char *)p24, 24);
207 BOOL make_oem_passwd_hash(char data[516], const char *passwd, uchar old_pw_hash[16], BOOL unicode)
209 int new_pw_len = strlen(passwd) * (unicode ? 2 : 1);
211 if (new_pw_len > 512)
213 DEBUG(0,("make_oem_passwd_hash: new password is too long.\n"));
218 * Now setup the data area.
219 * We need to generate a random fill
220 * for this area to make it harder to
223 generate_random_buffer((unsigned char *)data, 516, False);
226 struni2( &data[512 - new_pw_len], passwd);
230 fstrcpy( &data[512 - new_pw_len], passwd);
232 SIVAL(data, 512, new_pw_len);
234 #ifdef DEBUG_PASSWORD
235 DEBUG(100,("make_oem_passwd_hash\n"));
236 dump_data(100, data, 516);
238 SamOEMhash( (unsigned char *)data, (unsigned char *)old_pw_hash, True);