source: trunk/BOOTCODE/REGULAR/PASSWORD.ASM@ 43

Last change on this file since 43 was 40, checked in by Ben Rietbroek, 12 years ago

Converting to JWasm -- phase 3 (not working) [2012-02-16]

WARNING!!

All commits upto and including the commit of [2012-05-13] contain
a severe bug!! Building from these sources and then disabling
the 'force LBA' feature while also using the drive-letter feature or
editing the label can DESTROY THE MBR on ALL ATTACHED DISKS!!
DO NOT DISABLE 'FORCE LBA USAGE' WHEN BUILT FROM THE THESE COMMITS!!

Problems

o Problem with location of BSS
o Problem with segments

Info

o Adjusted DISCLAIM.TXT

File size: 6.3 KB
Line 
1; AiR-BOOT (c) Copyright 1998-2008 M. Kiewitz
2;
3; This file is part of AiR-BOOT
4;
5; AiR-BOOT is free software: you can redistribute it and/or modify it under
6; the terms of the GNU General Public License as published by the Free
7; Software Foundation, either version 3 of the License, or (at your option)
8; any later version.
9;
10; AiR-BOOT is distributed in the hope that it will be useful, but WITHOUT ANY
11; WARRANTY: without even the implied warranty of MERCHANTABILITY or FITNESS
12; FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
13; details.
14;
15; You should have received a copy of the GNU General Public License along with
16; AiR-BOOT. If not, see <http://www.gnu.org/licenses/>.
17;
18;---------------------------------------------------------------------------
19; AiR-BOOT / PASSWORD
20;---------------------------------------------------------------------------
21
22IFDEF ModuleNames
23DB 'PASSWORD',0
24ENDIF
25
26
27; Don't ask me, what I'm doing in here to encode the passwords. I don't even
28; know by myself anymore. It's some kind of hash and I hope that it isn't weak
29; and some mad uber-hacker-god will laugh about it - but i bet so ;-)
30
31PASSWORD_AskSystemPwd Proc Near Uses ax bx si di
32 ; Asks System Password, if set...
33 test CFG_PasswordSystem, 1
34 jz PASP_NoPassword
35 mov ax, 0ABABh
36 mov si, offset TXT_ProtectedSystem
37 xor di, di ; May Access With ANY correct password
38 call PASSWORD_AskSpecifiedPassword
39 PASP_NoPassword:
40 ret
41PASSWORD_AskSystemPwd EndP
42
43PASSWORD_AskChangeBootPwd Proc Near Uses ax bx si di
44 ; Asks System Password, if set...
45 test CFG_PasswordChangeBoot, 1
46 jz PACBP_NoPassword
47 test TimedBootUsed, 1
48 jnz PACBP_NoPassword
49 mov ax, 0ABABh
50 mov si, offset TXT_ProtectedBootUp
51 xor di, di ; May Access With ANY correct password
52 call PASSWORD_AskSpecifiedPassword
53 PACBP_NoPassword:
54 ret
55PASSWORD_AskChangeBootPwd EndP
56
57;CFG_MasterPassword dw 0101Fh ; Encoded Password (this is just CR)
58; dw 07A53h
59; dw 0E797h
60; dw 0A896h
61; BUGBUG - If unspecified password to ask, check if one of our two are CR
62; And if that's the case, we need to skip over checking that one.
63; If both are CR, return to caller
64
65
66; In: ax - Magic for AskPassword Subroutine
67; si - Text to show, when asking for password
68; di - which password to check, use 0 to check any of both
69; Destroyed: None
70PASSWORD_AskSpecifiedPassword Proc Near Uses cx dx ds si es di bp
71 local AskPasswordMiss:byte, AskPasswordText:word, AskPasswordMagic:word, AskPasswordWhich:word
72 mov AskPasswordMagic, ax
73 mov AskPasswordText, si
74 mov AskPasswordWhich, di
75 mov ax, cs
76 mov ds, ax
77 mov es, ax
78 mov di, offset TempPasswordEntry
79 mov al, 32
80 mov cx, 8
81 rep stosb ; Generates empty password
82 mov AskPasswordMiss, 0
83 mov ax, AskPasswordWhich
84 or ax, ax
85 jnz PASP_BadBoyRetry ; Only check one
86 ; Encode empty Password...
87 mov si, offset TempPasswordEntry
88 call PASSWORD_Encode
89 mov di, offset CFG_MasterPassword
90 mov si, offset PasswordSpace ; Check Thiz Out
91 mov cx, 8
92 repe cmpsb
93 je PASP_DualCorrect1
94 jmp PASP_LetUserGuessPassword
95 PASP_DualCorrect1:
96 mov si, offset PasswordSpace ; Check Thiz Out
97 mov cx, 8
98 repe cmpsb
99 je PASP_CorrectPass
100 jmp PASP_LetUserGuessPassword
101
102 PASP_BadBoyRetry:
103 ; Encode given Password...
104 mov si, offset TempPasswordEntry
105 call PASSWORD_Encode
106
107 ; ...and compare it to the specified on-board one
108 mov di, AskPasswordWhich
109 or di, di
110 jnz PASP_OnlyCheckSpecified
111 mov di, offset CFG_MasterPassword
112 mov si, offset PasswordSpace ; Check Thiz Out
113 mov cx, 8
114 repe cmpsb
115 je PASP_CorrectPass
116 mov di, offset CFG_BootPassword
117 PASP_OnlyCheckSpecified:
118 mov si, offset PasswordSpace ; Check Thiz Other Thingie Out
119 mov cx, 8
120 repe cmpsb
121 je PASP_CorrectPass
122
123 PASP_LetUserGuessPassword: ; ;-)))
124 mov ax, AskPasswordMagic
125 mov si, AskPasswordText
126 mov di, offset TempPasswordEntry
127 call SETUP_LetEnterPassword
128 inc AskPasswordMiss
129 cmp AskPasswordMiss, 10
130 jae PASP_BadBoyAlert
131 jmp PASP_BadBoyRetry
132
133 PASP_BadBoyAlert: ; Whaddayawant ;)
134 mov ax, 0ABABh
135 mov cx, 0B03h
136 mov si, offset TXT_TooManyTries
137 call SETUP_ShowErrorBox
138 jmp MBR_HaltSystem
139
140 PASP_CorrectPass:
141 ret
142PASSWORD_AskSpecifiedPassword EndP
143
144PasswordSpace db 16 dup (0) ; Space for Password-Encoding...
145 dw 0BABEh ; All of these 8 bytes are insider
146 dw 0FC77h ; jokes. I bet no one will solve
147 dw 0632Fh ; all of them =) they are used by
148 dw 0CD09h ; the algo, so don't remove them.
149
150; In: SI - Pointer to Password, fixed len (8 bytes)
151; Out: Password-Space filled with encoded password
152; Destroyed: None
153PASSWORD_Encode Proc Near Uses ax cx ds si es di
154 mov ax, cs
155 mov es, ax
156 mov di, offset PasswordSpace
157 mov cx, 8
158 PE_HashLoop:
159 lodsb
160 mov es:[di], al
161 xor al, 0ABh
162 and al, 7
163 mov es:[di+8], al ; Init Hash Table
164 inc di
165 loop PE_HashLoop
166
167 mov si, offset PasswordSpace
168 mov cx, 8
169 PE_ContinueLoop:
170 mov al, ds:[si]
171 ;movzx bx, ds:[si+8]
172 mov bl,ds:[si+8]
173 mov bh,0
174
175 add bl, 16
176 mov ah, ds:[si+bx]
177
178 xor al, ds:[si-1]
179 xor al, ah
180 mov ds:[si], al
181
182 inc si
183 loop PE_ContinueLoop
184 ret
185PASSWORD_Encode EndP
Note: See TracBrowser for help on using the repository browser.