#ifdef SIGNATURES /* * ncpsign.c * * Arne de Bruijn (arne@knoware.nl), 1997 * */ #include #include "ncplib.h" #include "ncpsign.h" #define rol32(i,c) (((((i)&0xffffffff)<>(32-c))) /* i386: 32-bit, little endian, handles mis-alignment */ #ifdef __i386__ #define GET_LE32(p) (*(int *)(p)) #define PUT_LE32(p,v) { *(int *)(p)=v; } #else #define GET_LE32(p) DVAL_LH(p,0) #define PUT_LE32(p,v) DSET_LH(p,0,v) #endif #define min(a,b) ((a)<(b)?(a):(b)) static void nwsign(char *r_data1, char *r_data2, char *outdata) { int i; unsigned int w0,w1,w2,w3; static int rbit[4]={0, 2, 1, 3}; #ifdef __i386__ unsigned int *data2=(int *)r_data2; #else unsigned int data2[16]; for (i=0;i<16;i++) data2[i]=GET_LE32(r_data2+(i<<2)); #endif w0=GET_LE32(r_data1); w1=GET_LE32(r_data1+4); w2=GET_LE32(r_data1+8); w3=GET_LE32(r_data1+12); for (i=0;i<16;i+=4) { w0=rol32(w0 + ((w1 & w2) | ((~w1) & w3)) + data2[i+0],3); w3=rol32(w3 + ((w0 & w1) | ((~w0) & w2)) + data2[i+1],7); w2=rol32(w2 + ((w3 & w0) | ((~w3) & w1)) + data2[i+2],11); w1=rol32(w1 + ((w2 & w3) | ((~w2) & w0)) + data2[i+3],19); } for (i=0;i<4;i++) { w0=rol32(w0 + (((w2 | w3) & w1) | (w2 & w3)) + 0x5a827999 + data2[i+0],3); w3=rol32(w3 + (((w1 | w2) & w0) | (w1 & w2)) + 0x5a827999 + data2[i+4],5); w2=rol32(w2 + (((w0 | w1) & w3) | (w0 & w1)) + 0x5a827999 + data2[i+8],9); w1=rol32(w1 + (((w3 | w0) & w2) | (w3 & w0)) + 0x5a827999 + data2[i+12],13); } for (i=0;i<4;i++) { w0=rol32(w0 + ((w1 ^ w2) ^ w3) + 0x6ed9eba1 + data2[rbit[i]+0],3); w3=rol32(w3 + ((w0 ^ w1) ^ w2) + 0x6ed9eba1 + data2[rbit[i]+8],9); w2=rol32(w2 + ((w3 ^ w0) ^ w1) + 0x6ed9eba1 + data2[rbit[i]+4],11); w1=rol32(w1 + ((w2 ^ w3) ^ w0) + 0x6ed9eba1 + data2[rbit[i]+12],15); } PUT_LE32(outdata,(w0+GET_LE32(r_data1)) & 0xffffffff); PUT_LE32(outdata+4,(w1+GET_LE32(r_data1+4)) & 0xffffffff); PUT_LE32(outdata+8,(w2+GET_LE32(r_data1+8)) & 0xffffffff); PUT_LE32(outdata+12,(w3+GET_LE32(r_data1+12)) & 0xffffffff); } /* * Initialize packet signatures * The first 16 bytes of logindata are the shuffled password, * the last 8 bytes the encryption key as received from the server. */ void sign_init(const char *logindata, char *sign_root) { char initlast[16]={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef, 0xfe,0xdc,0xba,0x98,0x76,0x54,0x32,0x10}; char *initdata="Authorized NetWare Client"; char msg[64]; char hash[16]; memset(msg, 0, 64); memcpy(msg, logindata, 24); memcpy(msg + 24, initdata, 25); nwsign(initlast, msg, hash); memcpy(sign_root, hash, 8); } /* * Make a signature for the current packet and add it at the end of the * packet. */ void sign_packet(struct ncp_conn *conn, int *size) { char data[64]; memset(data,0,64); memcpy(data,conn->sign_root,8); PUT_LE32(data+8,(*size)); memcpy(data+12,conn->packet+sizeof(struct ncp_request_header)-1, min((*size)-sizeof(struct ncp_request_header)+1,52)); nwsign(conn->sign_last,data,conn->sign_last); memcpy(conn->packet+(*size),conn->sign_last,8); (*size)+=8; } #endif