1 | /*
|
---|
2 | Unix SMB/CIFS implementation.
|
---|
3 |
|
---|
4 | code to encrypt/decrypt data using the user session key
|
---|
5 |
|
---|
6 | Copyright (C) Andrew Tridgell 2004
|
---|
7 |
|
---|
8 | This program is free software; you can redistribute it and/or modify
|
---|
9 | it under the terms of the GNU General Public License as published by
|
---|
10 | the Free Software Foundation; either version 3 of the License, or
|
---|
11 | (at your option) any later version.
|
---|
12 |
|
---|
13 | This program is distributed in the hope that it will be useful,
|
---|
14 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
16 | GNU General Public License for more details.
|
---|
17 |
|
---|
18 | You should have received a copy of the GNU General Public License
|
---|
19 | along with this program. If not, see <http://www.gnu.org/licenses/>.
|
---|
20 | */
|
---|
21 |
|
---|
22 | #include "includes.h"
|
---|
23 | #include "libcli/auth/libcli_auth.h"
|
---|
24 |
|
---|
25 | /*
|
---|
26 | encrypt or decrypt a blob of data using the user session key
|
---|
27 | as used in lsa_SetSecret
|
---|
28 |
|
---|
29 | before calling, the out blob must be initialised to be the same size
|
---|
30 | as the in blob
|
---|
31 | */
|
---|
32 | void sess_crypt_blob(DATA_BLOB *out, const DATA_BLOB *in, const DATA_BLOB *session_key,
|
---|
33 | bool forward)
|
---|
34 | {
|
---|
35 | int i, k;
|
---|
36 |
|
---|
37 | for (i=0,k=0;
|
---|
38 | i<in->length;
|
---|
39 | i += 8, k += 7) {
|
---|
40 | uint8_t bin[8], bout[8], key[7];
|
---|
41 |
|
---|
42 | memset(bin, 0, 8);
|
---|
43 | memcpy(bin, &in->data[i], MIN(8, in->length-i));
|
---|
44 |
|
---|
45 | if (k + 7 > session_key->length) {
|
---|
46 | k = (session_key->length - k);
|
---|
47 | }
|
---|
48 | memcpy(key, &session_key->data[k], 7);
|
---|
49 |
|
---|
50 | des_crypt56(bout, bin, key, forward?1:0);
|
---|
51 |
|
---|
52 | memcpy(&out->data[i], bout, MIN(8, in->length-i));
|
---|
53 | }
|
---|
54 | }
|
---|
55 |
|
---|
56 |
|
---|
57 | /*
|
---|
58 | a convenient wrapper around sess_crypt_blob() for strings, using the LSA convention
|
---|
59 |
|
---|
60 | note that we round the length to a multiple of 8. This seems to be needed for
|
---|
61 | compatibility with windows
|
---|
62 |
|
---|
63 | caller should free using data_blob_free()
|
---|
64 | */
|
---|
65 | DATA_BLOB sess_encrypt_string(const char *str, const DATA_BLOB *session_key)
|
---|
66 | {
|
---|
67 | DATA_BLOB ret, src;
|
---|
68 | int slen = strlen(str);
|
---|
69 | int dlen = (slen+7) & ~7;
|
---|
70 |
|
---|
71 | src = data_blob(NULL, 8+dlen);
|
---|
72 | if (!src.data) {
|
---|
73 | return data_blob(NULL, 0);
|
---|
74 | }
|
---|
75 |
|
---|
76 | ret = data_blob(NULL, 8+dlen);
|
---|
77 | if (!ret.data) {
|
---|
78 | data_blob_free(&src);
|
---|
79 | return data_blob(NULL, 0);
|
---|
80 | }
|
---|
81 |
|
---|
82 | SIVAL(src.data, 0, slen);
|
---|
83 | SIVAL(src.data, 4, 1);
|
---|
84 | memset(src.data+8, 0, dlen);
|
---|
85 | memcpy(src.data+8, str, slen);
|
---|
86 |
|
---|
87 | sess_crypt_blob(&ret, &src, session_key, true);
|
---|
88 |
|
---|
89 | data_blob_free(&src);
|
---|
90 |
|
---|
91 | return ret;
|
---|
92 | }
|
---|
93 |
|
---|
94 | /*
|
---|
95 | a convenient wrapper around sess_crypt_blob() for strings, using the LSA convention
|
---|
96 |
|
---|
97 | caller should free the returned string
|
---|
98 | */
|
---|
99 | char *sess_decrypt_string(TALLOC_CTX *mem_ctx,
|
---|
100 | DATA_BLOB *blob, const DATA_BLOB *session_key)
|
---|
101 | {
|
---|
102 | DATA_BLOB out;
|
---|
103 | int slen;
|
---|
104 | char *ret;
|
---|
105 |
|
---|
106 | if (blob->length < 8) {
|
---|
107 | return NULL;
|
---|
108 | }
|
---|
109 |
|
---|
110 | out = data_blob_talloc(mem_ctx, NULL, blob->length);
|
---|
111 | if (!out.data) {
|
---|
112 | return NULL;
|
---|
113 | }
|
---|
114 |
|
---|
115 | sess_crypt_blob(&out, blob, session_key, false);
|
---|
116 |
|
---|
117 | if (IVAL(out.data, 4) != 1) {
|
---|
118 | DEBUG(0,("Unexpected revision number %d in session crypted string\n",
|
---|
119 | IVAL(out.data, 4)));
|
---|
120 | data_blob_free(&out);
|
---|
121 | return NULL;
|
---|
122 | }
|
---|
123 |
|
---|
124 | slen = IVAL(out.data, 0);
|
---|
125 | if (slen > blob->length - 8) {
|
---|
126 | DEBUG(0,("Invalid crypt length %d\n", slen));
|
---|
127 | data_blob_free(&out);
|
---|
128 | return NULL;
|
---|
129 | }
|
---|
130 |
|
---|
131 | ret = talloc_strndup(mem_ctx, (const char *)(out.data+8), slen);
|
---|
132 |
|
---|
133 | data_blob_free(&out);
|
---|
134 |
|
---|
135 | DEBUG(0,("decrypted string '%s' of length %d\n", ret, slen));
|
---|
136 |
|
---|
137 | return ret;
|
---|
138 | }
|
---|
139 |
|
---|
140 | /*
|
---|
141 | a convenient wrapper around sess_crypt_blob() for DATA_BLOBs, using the LSA convention
|
---|
142 |
|
---|
143 | note that we round the length to a multiple of 8. This seems to be needed for
|
---|
144 | compatibility with windows
|
---|
145 |
|
---|
146 | caller should free using data_blob_free()
|
---|
147 | */
|
---|
148 | DATA_BLOB sess_encrypt_blob(TALLOC_CTX *mem_ctx, DATA_BLOB *blob_in, const DATA_BLOB *session_key)
|
---|
149 | {
|
---|
150 | DATA_BLOB ret, src;
|
---|
151 | int dlen = (blob_in->length+7) & ~7;
|
---|
152 |
|
---|
153 | src = data_blob_talloc(mem_ctx, NULL, 8+dlen);
|
---|
154 | if (!src.data) {
|
---|
155 | return data_blob(NULL, 0);
|
---|
156 | }
|
---|
157 |
|
---|
158 | ret = data_blob_talloc(mem_ctx, NULL, 8+dlen);
|
---|
159 | if (!ret.data) {
|
---|
160 | data_blob_free(&src);
|
---|
161 | return data_blob(NULL, 0);
|
---|
162 | }
|
---|
163 |
|
---|
164 | SIVAL(src.data, 0, blob_in->length);
|
---|
165 | SIVAL(src.data, 4, 1);
|
---|
166 | memset(src.data+8, 0, dlen);
|
---|
167 | memcpy(src.data+8, blob_in->data, blob_in->length);
|
---|
168 |
|
---|
169 | sess_crypt_blob(&ret, &src, session_key, true);
|
---|
170 |
|
---|
171 | data_blob_free(&src);
|
---|
172 |
|
---|
173 | return ret;
|
---|
174 | }
|
---|
175 |
|
---|
176 | /*
|
---|
177 | Decrypt a DATA_BLOB using the LSA convention
|
---|
178 | */
|
---|
179 | NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DATA_BLOB *session_key,
|
---|
180 | DATA_BLOB *ret)
|
---|
181 | {
|
---|
182 | DATA_BLOB out;
|
---|
183 | int slen;
|
---|
184 |
|
---|
185 | if (blob->length < 8) {
|
---|
186 | DEBUG(0, ("Unexpected length %d in session crypted secret (BLOB)\n",
|
---|
187 | (int)blob->length));
|
---|
188 | return NT_STATUS_INVALID_PARAMETER;
|
---|
189 | }
|
---|
190 |
|
---|
191 | out = data_blob_talloc(mem_ctx, NULL, blob->length);
|
---|
192 | if (!out.data) {
|
---|
193 | return NT_STATUS_NO_MEMORY;
|
---|
194 | }
|
---|
195 |
|
---|
196 | sess_crypt_blob(&out, blob, session_key, false);
|
---|
197 |
|
---|
198 | if (IVAL(out.data, 4) != 1) {
|
---|
199 | DEBUG(2,("Unexpected revision number %d in session crypted secret (BLOB)\n",
|
---|
200 | IVAL(out.data, 4)));
|
---|
201 | return NT_STATUS_UNKNOWN_REVISION;
|
---|
202 | }
|
---|
203 |
|
---|
204 | slen = IVAL(out.data, 0);
|
---|
205 | if (slen > blob->length - 8) {
|
---|
206 | DEBUG(0,("Invalid crypt length %d in session crypted secret (BLOB)\n", slen));
|
---|
207 | return NT_STATUS_WRONG_PASSWORD;
|
---|
208 | }
|
---|
209 |
|
---|
210 | *ret = data_blob_talloc(mem_ctx, out.data+8, slen);
|
---|
211 | if (slen && !ret->data) {
|
---|
212 | return NT_STATUS_NO_MEMORY;
|
---|
213 | }
|
---|
214 |
|
---|
215 | data_blob_free(&out);
|
---|
216 |
|
---|
217 | return NT_STATUS_OK;
|
---|
218 | }
|
---|