2 Unix SMB/Netbios implementation.
4 SMB parameters and setup
5 Copyright (C) Andrew Tridgell 1992-1998
6 Modified by Jeremy Allison 1995.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 extern int DEBUGLEVEL;
31 #include "smbbyteorder.h"
33 #include "smbencrypt.h"
40 /****************************************************************************
41 Like strncpy but always null terminates. Make sure there is room!
42 The variable n should always be one less than the available size.
43 ****************************************************************************/
45 static char *StrnCpy(char *dest,const char *src, size_t n)
48 if (!dest) return(NULL);
53 while (n-- && (*d++ = *src++)) ;
58 static size_t skip_multibyte_char(char c)
65 /*******************************************************************
66 safe string copy into a known length string. maxlength does not
67 include the terminating zero.
68 ********************************************************************/
70 static void strupper(char *s)
75 size_t skip = skip_multibyte_char( *s );
80 if (islower((unsigned char)*s))
81 *s = toupper((unsigned char)*s);
88 extern void SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, unsigned char p24[24]);
91 This implements the X/Open SMB password encryption
92 It takes a password, a 8 byte "crypt key" and puts 24 bytes of
93 encrypted password into p24
96 void SMBencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24)
98 unsigned char p14[15], p21[21];
102 StrnCpy((char *)p14,(char *)passwd,14);
104 strupper((char *)p14);
107 SMBOWFencrypt(p21, c8, p24);
109 #ifdef DEBUG_PASSWORD
110 DEBUG(100,("SMBencrypt: lm#, challenge, response\n"));
111 dump_data(100, (char *)p21, 16);
112 dump_data(100, (char *)c8, 8);
113 dump_data(100, (char *)p24, 24);
117 /* Routines for Windows NT MD4 Hash functions. */
118 static int _my_wcslen(int16_t *str)
127 * Convert a string into an NT UNICODE string.
128 * Note that regardless of processor type
129 * this must be in intel (little-endian)
133 static int _my_mbstowcs(int16_t *dst, unsigned char *src, int len)
138 for(i = 0; i < len; i++) {
150 * Creates the MD4 Hash of the users password in NT UNICODE.
153 static void E_md4hash(uchar *passwd, uchar *p16)
158 /* Password cannot be longer than 128 characters */
159 len = strlen((char *)passwd);
162 /* Password must be converted to NT unicode */
163 _my_mbstowcs(wpwd, passwd, len);
164 wpwd[len] = 0; /* Ensure string is null terminated */
165 /* Calculate length in bytes */
166 len = _my_wcslen(wpwd) * sizeof(int16_t);
168 mdfour(p16, (unsigned char *)wpwd, len);
171 /* Does the des encryption from the NT or LM MD4 hash. */
172 void SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, unsigned char p24[24])
174 unsigned char p21[21];
178 memcpy(p21, passwd, 16);
182 /* Does the NT MD4 hash then des encryption. */
184 void SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24)
186 unsigned char p21[21];
190 E_md4hash(passwd, p21);
191 SMBOWFencrypt(p21, c8, p24);
193 #ifdef DEBUG_PASSWORD
194 DEBUG(100,("SMBNTencrypt: nt#, challenge, response\n"));
195 dump_data(100, (char *)p21, 16);
196 dump_data(100, (char *)c8, 8);
197 dump_data(100, (char *)p24, 24);