Leaked source code of windows server 2003
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
/*++
Copyright (c) 1989 Microsoft Corporation
Module Name:
owf.c
Abstract:
Implentation of the one-way-functions used to implement password hashing.
CalculateLmOwfPassword CalculateNtOwfPassword
Author:
David Chalmers (Davidc) 10-21-91 David Arnold (DavidAr) 12-15-93 (Adapted for WfW RPC SSP)
Revision History:
--*/
#include <windows.h>
#include <descrypt.h>
#include <md4.h>
#include "encrypt.h"
BOOL CalculateLmOwfPassword( IN PLM_PASSWORD LmPassword, OUT PLM_OWF_PASSWORD LmOwfPassword )
/*++
Routine Description:
Takes the passed LmPassword and performs a one-way-function on it. The current implementation does this by using the password as a key to encrypt a known block of text.
Arguments:
LmPassword - The password to perform the one-way-function on.
LmOwfPassword - The hashed password is returned here
Return Values:
TRUE - The function was completed successfully. The hashed password is in LmOwfPassword.
FALSE - Something failed. The LmOwfPassword is undefined. --*/
{ char StdEncrPwd[] = "KGS!@#$%"; BLOCK_KEY Key[2]; PCHAR pKey;
// Copy the password into our key buffer and zero pad to fill the 2 keys
pKey = (PCHAR)(&Key[0]);
while (*LmPassword && (pKey < (PCHAR)(&Key[2]))) { *pKey++ = *LmPassword++; }
while (pKey < (PCHAR)(&Key[2])) { *pKey++ = 0; }
// Use the keys to encrypt the standard text
if (DES_ECB_LM(ENCR_KEY, (unsigned char *)&Key[0], (unsigned char *)StdEncrPwd, (unsigned char *)&LmOwfPassword->data[0] ) != CRYPT_OK) {
return (FALSE); }
if (DES_ECB_LM(ENCR_KEY, (unsigned char *)&Key[1], (unsigned char *)StdEncrPwd, (unsigned char *)&LmOwfPassword->data[1] ) != CRYPT_OK) {
return (FALSE); }
//
// clear our copy of the cleartext password
//
pKey = (PCHAR)(&Key[0]);
while (pKey < (PCHAR)(&Key[2])) { *pKey++ = 0; }
return(TRUE); }
BOOL CalculateNtOwfPassword( IN PNT_PASSWORD NtPassword, OUT PNT_OWF_PASSWORD NtOwfPassword )
/*++
Routine Description:
Takes the passed NtPassword and performs a one-way-function on it. Uses the RSA MD4 function
Arguments:
NtPassword - The password to perform the one-way-function on.
NtOwfPassword - The hashed password is returned here
Return Values:
TRUE - The function was completed successfully. The hashed password is in NtOwfPassword. --*/
{ MD4_CTX MD4_Context;
MD4Init(&MD4_Context);
MD4Update(&MD4_Context, (PCHAR)NtPassword->Buffer, NtPassword->Length);
MD4Final(&MD4_Context);
if (sizeof(*NtOwfPassword) != sizeof(MD4_Context.digest)) { return(FALSE); }
memcpy((PVOID)NtOwfPassword, (PVOID)MD4_Context.digest, sizeof(*NtOwfPassword));
return(TRUE); }
INT CompareLmPasswords ( IN PLM_OWF_PASSWORD LmOwfPassword1, IN PLM_OWF_PASSWORD LmOwfPassword2 )
/*++
Routine Description:
Compares 2 LM OWF passwords.
Arguments:
LmOwfPassword1 - The first password to compare
LmOwfPassword2 - The second password to compare
Return Values:
0 if they are equal, -1 if first is smaller (regarded as a string of bytes), 1 if first is greater
--*/
{ PBYTE p1 = (PBYTE)LmOwfPassword1; PBYTE p2 = (PBYTE)LmOwfPassword2; DWORD size = sizeof (LM_OWF_PASSWORD); CHAR diff;
while (size--) { diff = *p1++ - *p2++; if (diff) { return (INT)diff; } } return 0; }
INT CompareNtPasswords ( IN PNT_OWF_PASSWORD NtOwfPassword1, IN PNT_OWF_PASSWORD NtOwfPassword2 )
/*++
Routine Description:
Compares 2 NT OWF passwords.
Arguments:
NtOwfPassword1 - The first password to compare
NtOwfPassword2 - The second password to compare
Return Values:
0 if they are equal, -1 if first is smaller (regarded as a string of bytes), 1 if first is greater
--*/
{ PBYTE p1 = (PBYTE)NtOwfPassword1; PBYTE p2 = (PBYTE)NtOwfPassword2; DWORD size = sizeof (NT_OWF_PASSWORD); CHAR diff;
while (size--) { diff = *p1++ - *p2++; if (diff) { return (INT)diff; } } return 0; }
|