1 #ifndef _LIBCLI_AUTH_PROTO_H__
2 #define _LIBCLI_AUTH_PROTO_H__
4 #undef _PRINTF_ATTRIBUTE
5 #define _PRINTF_ATTRIBUTE(a1, a2) PRINTF_ATTRIBUTE(a1, a2)
7 /* this file contains prototypes for functions that are private
8 * to this subsystem or library. These functions should not be
9 * used outside this particular subsystem! */
12 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/credentials.c */
14 void netlogon_creds_des_encrypt_LMKey(struct netlogon_creds_CredentialState
*creds
, struct netr_LMSessionKey
*key
);
15 void netlogon_creds_des_decrypt_LMKey(struct netlogon_creds_CredentialState
*creds
, struct netr_LMSessionKey
*key
);
16 void netlogon_creds_des_encrypt(struct netlogon_creds_CredentialState
*creds
, struct samr_Password
*pass
);
17 void netlogon_creds_des_decrypt(struct netlogon_creds_CredentialState
*creds
, struct samr_Password
*pass
);
18 void netlogon_creds_arcfour_crypt(struct netlogon_creds_CredentialState
*creds
, uint8_t *data
, size_t len
);
20 /*****************************************************************
21 The above functions are common to the client and server interface
22 next comes the client specific functions
23 ******************************************************************/
24 struct netlogon_creds_CredentialState
*netlogon_creds_client_init(TALLOC_CTX
*mem_ctx
,
25 const char *client_account
,
26 const char *client_computer_name
,
27 const struct netr_Credential
*client_challenge
,
28 const struct netr_Credential
*server_challenge
,
29 const struct samr_Password
*machine_password
,
30 struct netr_Credential
*initial_credential
,
31 uint32_t negotiate_flags
);
32 struct netlogon_creds_CredentialState
*netlogon_creds_client_init_session_key(TALLOC_CTX
*mem_ctx
,
33 const uint8_t session_key
[16]);
34 void netlogon_creds_client_authenticator(struct netlogon_creds_CredentialState
*creds
,
35 struct netr_Authenticator
*next
);
36 bool netlogon_creds_client_check(struct netlogon_creds_CredentialState
*creds
,
37 const struct netr_Credential
*received_credentials
);
38 struct netlogon_creds_CredentialState
*netlogon_creds_copy(TALLOC_CTX
*mem_ctx
,
39 struct netlogon_creds_CredentialState
*creds_in
);
41 /*****************************************************************
42 The above functions are common to the client and server interface
43 next comes the server specific functions
44 ******************************************************************/
45 struct netlogon_creds_CredentialState
*netlogon_creds_server_init(TALLOC_CTX
*mem_ctx
,
46 const char *client_account
,
47 const char *client_computer_name
,
48 uint16_t secure_channel_type
,
49 const struct netr_Credential
*client_challenge
,
50 const struct netr_Credential
*server_challenge
,
51 const struct samr_Password
*machine_password
,
52 struct netr_Credential
*credentials_in
,
53 struct netr_Credential
*credentials_out
,
54 uint32_t negotiate_flags
);
55 NTSTATUS
netlogon_creds_server_step_check(struct netlogon_creds_CredentialState
*creds
,
56 struct netr_Authenticator
*received_authenticator
,
57 struct netr_Authenticator
*return_authenticator
) ;
58 void netlogon_creds_decrypt_samlogon(struct netlogon_creds_CredentialState
*creds
,
59 uint16_t validation_level
,
60 union netr_Validation
*validation
) ;
62 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/session.c */
64 void sess_crypt_blob(DATA_BLOB
*out
, const DATA_BLOB
*in
, const DATA_BLOB
*session_key
,
66 DATA_BLOB
sess_encrypt_string(const char *str
, const DATA_BLOB
*session_key
);
67 char *sess_decrypt_string(TALLOC_CTX
*mem_ctx
,
68 DATA_BLOB
*blob
, const DATA_BLOB
*session_key
);
69 DATA_BLOB
sess_encrypt_blob(TALLOC_CTX
*mem_ctx
, DATA_BLOB
*blob_in
, const DATA_BLOB
*session_key
);
70 NTSTATUS
sess_decrypt_blob(TALLOC_CTX
*mem_ctx
, const DATA_BLOB
*blob
, const DATA_BLOB
*session_key
,
73 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/smbencrypt.c */
75 void SMBencrypt_hash(const uint8_t lm_hash
[16], const uint8_t *c8
, uint8_t p24
[24]);
76 bool SMBencrypt(const char *passwd
, const uint8_t *c8
, uint8_t p24
[24]);
79 * Creates the MD4 Hash of the users password in NT UNICODE.
80 * @param passwd password in 'unix' charset.
81 * @param p16 return password hashed with md4, caller allocated 16 byte buffer
83 bool E_md4hash(const char *passwd
, uint8_t p16
[16]);
86 * Creates the MD5 Hash of a combination of 16 byte salt and 16 byte NT hash.
87 * @param 16 byte salt.
88 * @param 16 byte NT hash.
89 * @param 16 byte return hashed with md5, caller allocated 16 byte buffer
91 void E_md5hash(const uint8_t salt
[16], const uint8_t nthash
[16], uint8_t hash_out
[16]);
94 * Creates the DES forward-only Hash of the users password in DOS ASCII charset
95 * @param passwd password in 'unix' charset.
96 * @param p16 return password hashed with DES, caller allocated 16 byte buffer
97 * @return false if password was > 14 characters, and therefore may be incorrect, otherwise true
98 * @note p16 is filled in regardless
100 bool E_deshash(const char *passwd
, uint8_t p16
[16]);
103 * Creates the MD4 and DES (LM) Hash of the users password.
104 * MD4 is of the NT Unicode, DES is of the DOS UPPERCASE password.
105 * @param passwd password in 'unix' charset.
106 * @param nt_p16 return password hashed with md4, caller allocated 16 byte buffer
107 * @param p16 return password hashed with des, caller allocated 16 byte buffer
109 void nt_lm_owf_gen(const char *pwd
, uint8_t nt_p16
[16], uint8_t p16
[16]);
110 bool ntv2_owf_gen(const uint8_t owf
[16],
111 const char *user_in
, const char *domain_in
,
112 bool upper_case_domain
, /* Transform the domain into UPPER case */
114 void SMBOWFencrypt(const uint8_t passwd
[16], const uint8_t *c8
, uint8_t p24
[24]);
115 void SMBNTencrypt_hash(const uint8_t nt_hash
[16], uint8_t *c8
, uint8_t *p24
);
116 void SMBNTencrypt(const char *passwd
, uint8_t *c8
, uint8_t *p24
);
117 void SMBOWFencrypt_ntv2(const uint8_t kr
[16],
118 const DATA_BLOB
*srv_chal
,
119 const DATA_BLOB
*smbcli_chal
,
120 uint8_t resp_buf
[16]);
121 void SMBsesskeygen_ntv2(const uint8_t kr
[16],
122 const uint8_t * nt_resp
, uint8_t sess_key
[16]);
123 void SMBsesskeygen_ntv1(const uint8_t kr
[16], uint8_t sess_key
[16]);
124 void SMBsesskeygen_lm_sess_key(const uint8_t lm_hash
[16],
125 const uint8_t lm_resp
[24], /* only uses 8 */
126 uint8_t sess_key
[16]);
127 DATA_BLOB
NTLMv2_generate_names_blob(TALLOC_CTX
*mem_ctx
,
128 const char *hostname
,
130 bool SMBNTLMv2encrypt_hash(TALLOC_CTX
*mem_ctx
,
131 const char *user
, const char *domain
, const uint8_t nt_hash
[16],
132 const DATA_BLOB
*server_chal
,
133 const DATA_BLOB
*names_blob
,
134 DATA_BLOB
*lm_response
, DATA_BLOB
*nt_response
,
135 DATA_BLOB
*lm_session_key
, DATA_BLOB
*user_session_key
) ;
136 bool SMBNTLMv2encrypt(TALLOC_CTX
*mem_ctx
,
137 const char *user
, const char *domain
,
138 const char *password
,
139 const DATA_BLOB
*server_chal
,
140 const DATA_BLOB
*names_blob
,
141 DATA_BLOB
*lm_response
, DATA_BLOB
*nt_response
,
142 DATA_BLOB
*lm_session_key
, DATA_BLOB
*user_session_key
) ;
144 /***********************************************************
145 encode a password buffer with a unicode password. The buffer
146 is filled with random data to make it harder to attack.
147 ************************************************************/
148 bool encode_pw_buffer(uint8_t buffer
[516], const char *password
, int string_flags
);
150 /***********************************************************
151 decode a password buffer
152 *new_pw_len is the length in bytes of the possibly mulitbyte
153 returned password including termination.
154 ************************************************************/
155 bool decode_pw_buffer(TALLOC_CTX
*ctx
,
156 uint8_t in_buffer
[516],
159 charset_t string_charset
);
161 /***********************************************************
162 Decode an arc4 encrypted password change buffer.
163 ************************************************************/
164 void encode_or_decode_arc4_passwd_buffer(unsigned char pw_buf
[532], const DATA_BLOB
*psession_key
);
166 /***********************************************************
167 encode a password buffer with an already unicode password. The
168 rest of the buffer is filled with random data to make it harder to attack.
169 ************************************************************/
170 bool set_pw_in_buffer(uint8_t buffer
[516], DATA_BLOB
*password
);
172 /***********************************************************
173 decode a password buffer
174 *new_pw_size is the length in bytes of the extracted unicode password
175 ************************************************************/
176 bool extract_pw_from_buffer(TALLOC_CTX
*mem_ctx
,
177 uint8_t in_buffer
[516], DATA_BLOB
*new_pass
);
178 void encode_wkssvc_join_password_buffer(TALLOC_CTX
*mem_ctx
,
180 DATA_BLOB
*session_key
,
181 struct wkssvc_PasswordBuffer
**pwd_buf
);
182 WERROR
decode_wkssvc_join_password_buffer(TALLOC_CTX
*mem_ctx
,
183 struct wkssvc_PasswordBuffer
*pwd_buf
,
184 DATA_BLOB
*session_key
,
187 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/smbdes.c */
189 void des_crypt56(uint8_t out
[8], const uint8_t in
[8], const uint8_t key
[7], int forw
);
190 void E_P16(const uint8_t *p14
,uint8_t *p16
);
191 void E_P24(const uint8_t *p21
, const uint8_t *c8
, uint8_t *p24
);
192 void D_P16(const uint8_t *p14
, const uint8_t *in
, uint8_t *out
);
193 void E_old_pw_hash( uint8_t *p14
, const uint8_t *in
, uint8_t *out
);
194 void des_crypt128(uint8_t out
[8], const uint8_t in
[8], const uint8_t key
[16]);
195 void des_crypt64(uint8_t out
[8], const uint8_t in
[8], const uint8_t key
[8], int forw
);
196 void des_crypt112(uint8_t out
[8], const uint8_t in
[8], const uint8_t key
[14], int forw
);
197 void des_crypt112_16(uint8_t out
[16], const uint8_t in
[16], const uint8_t key
[14], int forw
);
198 void sam_rid_crypt(unsigned int rid
, const uint8_t *in
, uint8_t *out
, int forw
);
199 #undef _PRINTF_ATTRIBUTE
200 #define _PRINTF_ATTRIBUTE(a1, a2)