You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
234 lines
4.6 KiB
234 lines
4.6 KiB
/*++
|
|
|
|
Copyright (c) 1989 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
owf.c
|
|
|
|
Abstract:
|
|
|
|
Implentation of the one-way-functions used to implement password hashing.
|
|
|
|
CalculateLmOwfPassword
|
|
CalculateNtOwfPassword
|
|
|
|
Author:
|
|
|
|
David Chalmers (Davidc) 10-21-91
|
|
David Arnold (DavidAr) 12-15-93 (Adapted for WfW RPC SSP)
|
|
|
|
Revision History:
|
|
|
|
--*/
|
|
|
|
#include <windows.h>
|
|
#include <descrypt.h>
|
|
#include <md4.h>
|
|
|
|
#include "encrypt.h"
|
|
|
|
|
|
BOOL
|
|
CalculateLmOwfPassword(
|
|
IN PLM_PASSWORD LmPassword,
|
|
OUT PLM_OWF_PASSWORD LmOwfPassword
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Takes the passed LmPassword and performs a one-way-function on it.
|
|
The current implementation does this by using the password as a key
|
|
to encrypt a known block of text.
|
|
|
|
Arguments:
|
|
|
|
LmPassword - The password to perform the one-way-function on.
|
|
|
|
LmOwfPassword - The hashed password is returned here
|
|
|
|
Return Values:
|
|
|
|
TRUE - The function was completed successfully. The hashed
|
|
password is in LmOwfPassword.
|
|
|
|
FALSE - Something failed. The LmOwfPassword is undefined.
|
|
--*/
|
|
|
|
{
|
|
char StdEncrPwd[] = "KGS!@#$%";
|
|
BLOCK_KEY Key[2];
|
|
PCHAR pKey;
|
|
|
|
// Copy the password into our key buffer and zero pad to fill the 2 keys
|
|
|
|
pKey = (PCHAR)(&Key[0]);
|
|
|
|
while (*LmPassword && (pKey < (PCHAR)(&Key[2]))) {
|
|
*pKey++ = *LmPassword++;
|
|
}
|
|
|
|
while (pKey < (PCHAR)(&Key[2])) {
|
|
*pKey++ = 0;
|
|
}
|
|
|
|
|
|
// Use the keys to encrypt the standard text
|
|
|
|
if (DES_ECB_LM(ENCR_KEY,
|
|
(unsigned char *)&Key[0],
|
|
(unsigned char *)StdEncrPwd,
|
|
(unsigned char *)&LmOwfPassword->data[0]
|
|
) != CRYPT_OK) {
|
|
|
|
return (FALSE);
|
|
}
|
|
|
|
if (DES_ECB_LM(ENCR_KEY,
|
|
(unsigned char *)&Key[1],
|
|
(unsigned char *)StdEncrPwd,
|
|
(unsigned char *)&LmOwfPassword->data[1]
|
|
) != CRYPT_OK) {
|
|
|
|
return (FALSE);
|
|
}
|
|
|
|
//
|
|
// clear our copy of the cleartext password
|
|
//
|
|
|
|
pKey = (PCHAR)(&Key[0]);
|
|
|
|
while (pKey < (PCHAR)(&Key[2])) {
|
|
*pKey++ = 0;
|
|
}
|
|
|
|
return(TRUE);
|
|
}
|
|
|
|
|
|
BOOL
|
|
CalculateNtOwfPassword(
|
|
IN PNT_PASSWORD NtPassword,
|
|
OUT PNT_OWF_PASSWORD NtOwfPassword
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Takes the passed NtPassword and performs a one-way-function on it.
|
|
Uses the RSA MD4 function
|
|
|
|
Arguments:
|
|
|
|
NtPassword - The password to perform the one-way-function on.
|
|
|
|
NtOwfPassword - The hashed password is returned here
|
|
|
|
Return Values:
|
|
|
|
TRUE - The function was completed successfully. The hashed
|
|
password is in NtOwfPassword.
|
|
--*/
|
|
|
|
{
|
|
MD4_CTX MD4_Context;
|
|
|
|
|
|
MD4Init(&MD4_Context);
|
|
|
|
MD4Update(&MD4_Context, (PCHAR)NtPassword->Buffer, NtPassword->Length);
|
|
|
|
MD4Final(&MD4_Context);
|
|
|
|
if (sizeof(*NtOwfPassword) != sizeof(MD4_Context.digest)) {
|
|
return(FALSE);
|
|
}
|
|
|
|
memcpy((PVOID)NtOwfPassword, (PVOID)MD4_Context.digest, sizeof(*NtOwfPassword));
|
|
|
|
return(TRUE);
|
|
}
|
|
|
|
INT
|
|
CompareLmPasswords (
|
|
IN PLM_OWF_PASSWORD LmOwfPassword1,
|
|
IN PLM_OWF_PASSWORD LmOwfPassword2
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Compares 2 LM OWF passwords.
|
|
|
|
Arguments:
|
|
|
|
LmOwfPassword1 - The first password to compare
|
|
|
|
LmOwfPassword2 - The second password to compare
|
|
|
|
Return Values:
|
|
|
|
0 if they are equal, -1 if first is smaller (regarded as a string of bytes),
|
|
1 if first is greater
|
|
|
|
--*/
|
|
|
|
{
|
|
PBYTE p1 = (PBYTE)LmOwfPassword1;
|
|
PBYTE p2 = (PBYTE)LmOwfPassword2;
|
|
DWORD size = sizeof (LM_OWF_PASSWORD);
|
|
CHAR diff;
|
|
|
|
while (size--) {
|
|
diff = *p1++ - *p2++;
|
|
if (diff) {
|
|
return (INT)diff;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
INT
|
|
CompareNtPasswords (
|
|
IN PNT_OWF_PASSWORD NtOwfPassword1,
|
|
IN PNT_OWF_PASSWORD NtOwfPassword2
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Compares 2 NT OWF passwords.
|
|
|
|
Arguments:
|
|
|
|
NtOwfPassword1 - The first password to compare
|
|
|
|
NtOwfPassword2 - The second password to compare
|
|
|
|
Return Values:
|
|
|
|
0 if they are equal, -1 if first is smaller (regarded as a string of bytes),
|
|
1 if first is greater
|
|
|
|
--*/
|
|
|
|
{
|
|
PBYTE p1 = (PBYTE)NtOwfPassword1;
|
|
PBYTE p2 = (PBYTE)NtOwfPassword2;
|
|
DWORD size = sizeof (NT_OWF_PASSWORD);
|
|
CHAR diff;
|
|
|
|
while (size--) {
|
|
diff = *p1++ - *p2++;
|
|
if (diff) {
|
|
return (INT)diff;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|