Line data Source code
1 : /*
2 : * Unix SMB/CIFS implementation.
3 : * Version 3.0
4 : * NTLMSSP Signing routines
5 : * Copyright (C) Luke Kenneth Casson Leighton 1996-2001
6 : * Copyright (C) Andrew Bartlett <abartlet@samba.org> 2003-2005
7 : *
8 : * This program is free software; you can redistribute it and/or modify
9 : * it under the terms of the GNU General Public License as published by
10 : * the Free Software Foundation; either version 3 of the License, or
11 : * (at your option) any later version.
12 : *
13 : * This program is distributed in the hope that it will be useful,
14 : * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 : * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 : * GNU General Public License for more details.
17 : *
18 : * You should have received a copy of the GNU General Public License
19 : * along with this program; if not, see <http://www.gnu.org/licenses/>.
20 : */
21 :
22 : #include "includes.h"
23 : #include "auth/ntlmssp/ntlmssp.h"
24 : #include "auth/gensec/gensec.h"
25 : #include "auth/gensec/gensec_internal.h"
26 : #include "auth/ntlmssp/ntlmssp_private.h"
27 :
28 33 : NTSTATUS gensec_ntlmssp_magic(struct gensec_security *gensec_security,
29 : const DATA_BLOB *first_packet)
30 : {
31 33 : if (ntlmssp_blob_matches_magic(first_packet)) {
32 33 : return NT_STATUS_OK;
33 : } else {
34 0 : return NT_STATUS_INVALID_PARAMETER;
35 : }
36 : }
37 :
38 : /**
39 : * Return the NTLMSSP master session key
40 : *
41 : * @param ntlmssp_state NTLMSSP State
42 : */
43 :
44 11138 : NTSTATUS gensec_ntlmssp_session_key(struct gensec_security *gensec_security,
45 : TALLOC_CTX *mem_ctx,
46 : DATA_BLOB *session_key)
47 : {
48 7936 : struct gensec_ntlmssp_context *gensec_ntlmssp =
49 11138 : talloc_get_type_abort(gensec_security->private_data,
50 : struct gensec_ntlmssp_context);
51 11138 : struct ntlmssp_state *ntlmssp_state = gensec_ntlmssp->ntlmssp_state;
52 :
53 11138 : if (ntlmssp_state->expected_state != NTLMSSP_DONE) {
54 0 : return NT_STATUS_NO_USER_SESSION_KEY;
55 : }
56 :
57 11138 : if (!ntlmssp_state->session_key.data) {
58 10 : return NT_STATUS_NO_USER_SESSION_KEY;
59 : }
60 11128 : *session_key = data_blob_talloc(mem_ctx, ntlmssp_state->session_key.data, ntlmssp_state->session_key.length);
61 11128 : if (!session_key->data) {
62 0 : return NT_STATUS_NO_MEMORY;
63 : }
64 :
65 11128 : return NT_STATUS_OK;
66 : }
67 :
68 726926 : bool gensec_ntlmssp_have_feature(struct gensec_security *gensec_security,
69 : uint32_t feature)
70 : {
71 639708 : struct gensec_ntlmssp_context *gensec_ntlmssp =
72 726926 : talloc_get_type_abort(gensec_security->private_data,
73 : struct gensec_ntlmssp_context);
74 726926 : struct ntlmssp_state *ntlmssp_state = gensec_ntlmssp->ntlmssp_state;
75 :
76 726926 : if (feature & GENSEC_FEATURE_SIGN) {
77 356519 : if (!ntlmssp_state->session_key.length) {
78 30 : return false;
79 : }
80 356489 : if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_SIGN) {
81 355357 : return true;
82 : }
83 : }
84 371539 : if (feature & GENSEC_FEATURE_SEAL) {
85 188181 : if (!ntlmssp_state->session_key.length) {
86 0 : return false;
87 : }
88 188181 : if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_SEAL) {
89 166818 : return true;
90 : }
91 : }
92 204721 : if (feature & GENSEC_FEATURE_SESSION_KEY) {
93 2797 : if (ntlmssp_state->session_key.length) {
94 2797 : return true;
95 : }
96 : }
97 201924 : if (feature & GENSEC_FEATURE_DCE_STYLE) {
98 137512 : return true;
99 : }
100 64412 : if (feature & GENSEC_FEATURE_ASYNC_REPLIES) {
101 18687 : if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
102 18319 : return true;
103 : }
104 : }
105 46093 : if (feature & GENSEC_FEATURE_SIGN_PKT_HEADER) {
106 2863 : return true;
107 : }
108 43230 : if (feature & GENSEC_FEATURE_NEW_SPNEGO) {
109 20367 : if (!ntlmssp_state->session_key.length) {
110 10 : return false;
111 : }
112 20357 : if (!(ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_SIGN)) {
113 259 : return false;
114 : }
115 20098 : return ntlmssp_state->new_spnego;
116 : }
117 :
118 22863 : return false;
119 : }
120 :
121 20613 : NTSTATUS gensec_ntlmssp_start(struct gensec_security *gensec_security)
122 : {
123 : struct gensec_ntlmssp_context *gensec_ntlmssp;
124 :
125 20613 : gensec_ntlmssp = talloc_zero(gensec_security,
126 : struct gensec_ntlmssp_context);
127 20613 : if (!gensec_ntlmssp) {
128 0 : return NT_STATUS_NO_MEMORY;
129 : }
130 :
131 20613 : gensec_security->private_data = gensec_ntlmssp;
132 20613 : return NT_STATUS_OK;
133 : }
134 :
135 26552 : NTSTATUS gensec_ntlmssp_sign_packet(struct gensec_security *gensec_security,
136 : TALLOC_CTX *sig_mem_ctx,
137 : const uint8_t *data, size_t length,
138 : const uint8_t *whole_pdu, size_t pdu_length,
139 : DATA_BLOB *sig)
140 : {
141 20755 : struct gensec_ntlmssp_context *gensec_ntlmssp =
142 26552 : talloc_get_type_abort(gensec_security->private_data,
143 : struct gensec_ntlmssp_context);
144 : NTSTATUS nt_status;
145 :
146 26552 : nt_status = ntlmssp_sign_packet(gensec_ntlmssp->ntlmssp_state,
147 : sig_mem_ctx,
148 : data, length,
149 : whole_pdu, pdu_length,
150 : sig);
151 :
152 26552 : return nt_status;
153 : }
154 :
155 26078 : NTSTATUS gensec_ntlmssp_check_packet(struct gensec_security *gensec_security,
156 : const uint8_t *data, size_t length,
157 : const uint8_t *whole_pdu, size_t pdu_length,
158 : const DATA_BLOB *sig)
159 : {
160 20369 : struct gensec_ntlmssp_context *gensec_ntlmssp =
161 26078 : talloc_get_type_abort(gensec_security->private_data,
162 : struct gensec_ntlmssp_context);
163 : NTSTATUS nt_status;
164 :
165 26078 : nt_status = ntlmssp_check_packet(gensec_ntlmssp->ntlmssp_state,
166 : data, length,
167 : whole_pdu, pdu_length,
168 : sig);
169 :
170 26078 : return nt_status;
171 : }
172 :
173 26986 : NTSTATUS gensec_ntlmssp_seal_packet(struct gensec_security *gensec_security,
174 : TALLOC_CTX *sig_mem_ctx,
175 : uint8_t *data, size_t length,
176 : const uint8_t *whole_pdu, size_t pdu_length,
177 : DATA_BLOB *sig)
178 : {
179 26984 : struct gensec_ntlmssp_context *gensec_ntlmssp =
180 26986 : talloc_get_type_abort(gensec_security->private_data,
181 : struct gensec_ntlmssp_context);
182 : NTSTATUS nt_status;
183 :
184 26986 : nt_status = ntlmssp_seal_packet(gensec_ntlmssp->ntlmssp_state,
185 : sig_mem_ctx,
186 : data, length,
187 : whole_pdu, pdu_length,
188 : sig);
189 :
190 26986 : return nt_status;
191 : }
192 :
193 : /*
194 : wrappers for the ntlmssp_*() functions
195 : */
196 26985 : NTSTATUS gensec_ntlmssp_unseal_packet(struct gensec_security *gensec_security,
197 : uint8_t *data, size_t length,
198 : const uint8_t *whole_pdu, size_t pdu_length,
199 : const DATA_BLOB *sig)
200 : {
201 26983 : struct gensec_ntlmssp_context *gensec_ntlmssp =
202 26985 : talloc_get_type_abort(gensec_security->private_data,
203 : struct gensec_ntlmssp_context);
204 : NTSTATUS nt_status;
205 :
206 26985 : nt_status = ntlmssp_unseal_packet(gensec_ntlmssp->ntlmssp_state,
207 : data, length,
208 : whole_pdu, pdu_length,
209 : sig);
210 :
211 26985 : return nt_status;
212 : }
213 :
214 31781 : size_t gensec_ntlmssp_sig_size(struct gensec_security *gensec_security, size_t data_size)
215 : {
216 31781 : return NTLMSSP_SIG_SIZE;
217 : }
218 :
219 108782 : NTSTATUS gensec_ntlmssp_wrap(struct gensec_security *gensec_security,
220 : TALLOC_CTX *out_mem_ctx,
221 : const DATA_BLOB *in,
222 : DATA_BLOB *out)
223 : {
224 73200 : struct gensec_ntlmssp_context *gensec_ntlmssp =
225 108782 : talloc_get_type_abort(gensec_security->private_data,
226 : struct gensec_ntlmssp_context);
227 :
228 108782 : return ntlmssp_wrap(gensec_ntlmssp->ntlmssp_state,
229 : out_mem_ctx,
230 : in, out);
231 : }
232 :
233 :
234 108782 : NTSTATUS gensec_ntlmssp_unwrap(struct gensec_security *gensec_security,
235 : TALLOC_CTX *out_mem_ctx,
236 : const DATA_BLOB *in,
237 : DATA_BLOB *out)
238 : {
239 73200 : struct gensec_ntlmssp_context *gensec_ntlmssp =
240 108782 : talloc_get_type_abort(gensec_security->private_data,
241 : struct gensec_ntlmssp_context);
242 :
243 108782 : return ntlmssp_unwrap(gensec_ntlmssp->ntlmssp_state,
244 : out_mem_ctx,
245 : in, out);
246 : }
|