[cifs-protocol] [EXTERNAL] Re: [MS-SAMR] AEAD-AES-256-CBC-HMAC-SHA512 - TrackingID#2206210040006850

Andreas Schneider asn at samba.org
Wed Jul 6 14:55:28 UTC 2022


On Tuesday, July 5, 2022 8:52:20 PM CEST Jeff McCashland (He/him) wrote:
> Hi Andreas,

Hi Jeff,
 
> The server is returning STATUS_INVALID_PARAMETER because it appears the
> 'Cipher' is missing from the encrypted password structure. I see the
> AuthData and Salt, and cbCipher = 0x210, and I see PBKDF2Iterations =
> 0x20000, but no Cipher. What are you intending to send?

thank you very much. You detected two bugs in my client implementation. I've 
fixed them and uploaded new traces to the same workspace. I still get result  
NT_STATUS_INVALID_PARAMETER even with the issues fixed.

With SAMR SetUserInfo level 31 we do not use PBKDF2, so I set PBKDF2Iterations 
to 0 now. We use the session key to as the encryption key. The documentation 
is not clear which value for PBKDF2Iterations should be set in this case.


Could you please check the new traces? Thank you very much!


Best regards


	Andreas

 
> Best regards,
> Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft Protocol
> Open Specifications Team Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm |
> Time zone: (UTC-08:00) Pacific Time (US and Canada) Local country phone
> number found here: http://support.microsoft.com/globalenglish | Extension
> 1138300
> 
> -----Original Message-----
> From: Jeff McCashland (He/him)
> Sent: Thursday, June 30, 2022 11:35 AM
> To: 'Andreas Schneider' <asn at samba.org>
> Cc: cifs-protocol at lists.samba.org; Jeff McCashland
> <jeffm at microsoftsupport.com>; Obaid Farooqi <obaidf at microsoft.com> Subject:
> RE: [EXTERNAL] Re: [MS-SAMR] AEAD-AES-256-CBC-HMAC-SHA512 -
> TrackingID#2206210040006850
> 
> Thank you for the traces, Andreas!
> 
> I am analyzing them and sill let you know what I find.
> 
> Best regards,
> Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft Protocol
> Open Specifications Team Phone: +1 (425) 703-8300 x38300 | Hours: 9am-5pm |
> Time zone: (UTC-08:00) Pacific Time (US and Canada) Local country phone
> number found here: http://support.microsoft.com/globalenglish | Extension
> 1138300 We value your feedback.  My manager is Stacy Gray (stacygr), +1
> (469) 775-4055
> 
> -----Original Message-----
> From: Andreas Schneider <asn at samba.org>
> Sent: Wednesday, June 29, 2022 11:58 PM
> To: Jeff McCashland (He/him) <jeffm at microsoft.com>
> Cc: cifs-protocol at lists.samba.org; Jeff McCashland
> <jeffm at microsoftsupport.com>; Obaid Farooqi <obaidf at microsoft.com> Subject:
> Re: [EXTERNAL] Re: [MS-SAMR] AEAD-AES-256-CBC-HMAC-SHA512 -
> TrackingID#2206210040006850
> On Wednesday, June 29, 2022 7:44:30 PM CEST Jeff McCashland (He/him) wrote:
> > Hi Andreas,
> 
> Hi Jeff,
> 
> > Thank you for the clarification. A better approach would be to
> > determine why your Windows server is failing the operation. I would
> > like to collect LSASS traces from your Windows Server for analysis. I
> > think it would help if you use the test data for the trial run.
> > 
> > I have created a File Transfer workspace to exchange files related to
> > this issue (credentials and link below). If you still have the
> > instructions and tools from when I requested LSASS traces in March, you
> > can use those. Otherwise, you can find 'PartnerTTDRecorder_x86_x64.zip'
> > on the
> > workspace for download.
> 
> I've created a time trace and a network capture and uploaded it to the
> workspace.
> 
> ./bin/rpcclient ncacn_np:earth.milkyway.site -U'Administrator%Secret007!' -c
> 'setuserinfo2 bob 31 Pa$$w0rd at 2'
> result was NT_STATUS_INVALID_PARAMETER
> 
> 
> Best regards
> 
> 
> 	Andreas
> 
> > To collect the needed traces:
> > 	1. From an elevated command prompt, execute: tasklist /FI "IMAGENAME
> 
> eq
> 
> > lsass.exe" 2. Note the PID of the lsass process from the output of the
> > above command. 3. Execute: C:\TTD\TTTracer.exe -attach PID, where PID
> > is the number from above. 4. Wait for a little window to pop up in top
> > left corner of your screen, titled "lsass01.run" 5. start a network
> > trace on the Server side
> > 
> > 	6. Repro the attempted operation
> > 	7. Stop the network trace and save it
> > 	8. CAREFULLY: uncheck the checkbox next to "Tracing" in the small
> > 
> > "lsass01.run" window. Do not close or exit the small window or you
> > will need to reboot. 9. The TTTracer.exe process will generate a trace
> > file, then print out the name and location of the file. Compress the
> > *.run file into a .zip archive before uploading with the matching network
> > trace.
> > 
> > Log in as: 2206210040006850_andreas at dtmxfer.onmicrosoft.com
> > 1-time: [KOGh3 at j
> > 
> > Workspace link:
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupp
> > ort.microsoft.com%2Ffiles%3Fworkspace%3DeyJ0eXAiOiJKV1QiLCJhbGciOiJSU&
> > amp;data=05%7C01%7Cjeffm%40microsoft.com%7Cfa8e39bd37b6446ac5cd08da5a6
> > 5e415%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637921690919606900%
> > 7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik
> > 1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9TMTXc4f4tyHxWSWcMxxs%2
> > F3k5Q1qy2mCH%2FulX%2F2Hmoc%3D&reserved=0
> > zI1NiJ9.eyJ3c2lkIjoiM2I3YTRiZjUtMTVlNi00ZDQ3LWJlMzUtMzMyZGMwMjI0NWNjIi
> > wic3Ii
> > OiIyMjA2MjEwMDQwMDA2ODUwIiwiYXBwaWQiOiI0ZTc2ODkxZC04NDUwLTRlNWUtYmUzOC
> > 1lYTNi
> > ZDZlZjIxZTUiLCJzdiI6InYxIiwicnMiOiJFeHRlcm5hbCIsInd0aWQiOiI5YWZlNDk3Yi
> > 01NzE1
> > LTRiYWYtYmRkNS1mNTIzYzliODQ4ZmQiLCJpc3MiOiJodHRwczovL2FwaS5kdG1uZWJ1bG
> > EubWlj
> > cm9zb2Z0LmNvbSIsImF1ZCI6Imh0dHA6Ly9zbWMiLCJleHAiOjE2NjQzMDAyMjUsIm5iZi
> > I6MTY1
> > NjUyNDIyNX0.WUjcO-UT6NMWT3eR4TJkmmwzbiHQLyqeinUgX-DmvUuQo4UaiIPFrNPoTF
> > N_czY2
> > -ihGY3N3bwnIt5AcE5f4JaR2qyT81r691J79n-IZgo8TFkdJMW6XjtVoIUkgOGh-RkyDKC
> > Ajhsj8
> > p6ddgiL-7UbxX58a7RWvOH9Yu0NzQdW8KKnyEUcFgFGPo42Sqy1igpkqxqcyAVOKFYicPR
> > f2ux39
> > SdHeoa9ptL78XLFsIuvNFkh6c77U1iEoaV3eqjQSu1rNriwv73cyu3WRJ0-dEiZDVpzHP7
> > 1JfdCE
> > lYBe8lDjmnEWPm0_99Iudoi4RjIgtclS4zdAS_X9efCBKkIeOA&wid=3b7a4bf5-15e6-4
> > d47-be
> > 35-332dc02245cc
> > 
> > Best regards,
> > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft
> > Protocol Open Specifications Team Phone: +1 (425) 703-8300 x38300 |
> > Hours: 9am-5pm | Time zone: (UTC-08:00) Pacific Time (US and Canada)
> > Local country phone number found here:
> > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsuppo
> > rt.microsoft.com%2Fglobalenglish&data=05%7C01%7Cjeffm%40microsoft.
> > com%7Cfa8e39bd37b6446ac5cd08da5a65e415%7C72f988bf86f141af91ab2d7cd011d
> > b47%7C1%7C0%7C637921690919606900%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wL
> > jAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&
> > amp;sdata=4fzxN9WyH8b16aKQOc7UbxtoMFPSo3CDa6JysWq%2BhKw%3D&reserve
> > d=0 | Extension
> > 1138300 We value your feedback.  My manager is Stacy Gray (stacygr),
> > +1
> > (469) 775-4055
> > 
> > -----Original Message-----
> > From: Andreas Schneider <asn at samba.org>
> > Sent: Wednesday, June 29, 2022 7:24 AM
> > To: Jeff McCashland (He/him) <jeffm at microsoft.com>
> > Cc: cifs-protocol at lists.samba.org; Jeff McCashland
> > <jeffm at microsoftsupport.com>; Obaid Farooqi <obaidf at microsoft.com>
> > Subject:
> > Re: [EXTERNAL] Re: [MS-SAMR] AEAD-AES-256-CBC-HMAC-SHA512 -
> > TrackingID#2206210040006850
> > 
> > On Tuesday, June 28, 2022 6:41:40 PM CEST Jeff McCashland (He/him) wrote:
> > > Hi Andreas,
> > 
> > Hi Jeff,
> > 
> > > Can you not use the test data provided in the RFC [AEX-CBC] that you
> > > originally referenced?
> > 
> > I have an implementation of AEAD-AES-256-CBC-HMAC-SHA512 and
> > implemented it in rpcclient, but it doesn't work against a Windows
> > server. There are so many little details which can be different.
> > 
> > ./bin/rpcclient ncacn_np:earth.milkyway.site
> > -U'Administrator%Secret007!' -c
> > 'setuserinfo2 bob 31 Pa$$w0rd at 2'
> > 
> > 
> > From MS-SAMR 3.2.2.4 AES Cipher Usage
> > 
> > ================
> > 
> > The data MUST be encrypted and decrypted using
> > 
> > AEAD-AES-256-CBC-HMAC-SHA512 as follows:
> >     Let IV be a random 16-byte number.
> >     
> >     Then the encryption is done as follows:
> >     
> >     Let enc_key ::= HMAC-SHA-512(CEK, SAM_AES256_ENC_KEY_STRING)
> >     
> >     Let mac_key ::= HMAC-SHA-512(CEK, SAM_AES256_MAC_KEY_STRING)
> >     
> >     Let Cipher ::= AES-CBC(enc_key, IV, secret_plaintext)
> >     
> >     Let AuthData ::= HMAC-SHA-512(mac_key, versionbyte + IV + Cipher +
> > 
> > versionbyte_length)
> > 
> > ================
> > 
> > As my implementation doesn't work against Windows it can be that my
> > size of SAM_AES256_ENC_KEY_STRING is wrong.
> > 
> > 2.2.1.18 has:
> >     SAM_AES256_ENC_KEY_STRING_LENGTH
> > 
> > sizeof(SAM_AES256_ENC_KEY_STRING)
> > 
> > The sizeof() in C would include the \0 terminator of a string, however
> > I think that actually strlen() is meant.
> > 
> > Same for the mac key ...
> > 
> > Also there is truncation of keys happening. Like the enc_key is
> > truncated to
> > 32 bytes.
> > 
> > For calculating the authdata it isn't clear what data type
> > versionbyte_length is. I would guess it is uint8_t but it could also
> > be uint32_t ...
> > 
> > Is the AuthData truncated to 32 byte? In the RFC it is, but in MS-SAMR
> > 2.2.6.32 the struct member for AuthData is 64 bytes. If truncation is
> > happening will the rest be filled with 0 bytes?
> > 
> > Either I provide you the all unclear details and you figure it out for me.
> > Or you provide the hexdumps and I figure it out and ask better
> > questions
> > 
> > :-)
> > 
> > Here is some pseudo C code of my implementation:
> > 
> > #define SAMR_AES_VERSION_BYTE 0x01
> > #define SAMR_AES_VERSION_BYTE_LEN 1
> > 
> > #define SAMR_AES256_ENC_KEY_STRING \
> > 
> >         "Microsoft SAM encryption key AEAD-AES-256-CBC-HMAC-SHA512 16"
> > 
> > #define SAMR_AES256_ENC_KEY_STRING_LEN 60
> > 
> > #define SAMR_AES256_MAC_KEY_STRING \
> > 
> >          "Microsoft SAM MAC key AEAD-AES-256-CBC-HMAC-SHA512 16"
> > 
> > #define SAMR_AES256_MAC_KEY_STRING_LEN 53
> > 
> > uint8_t version_byte = SAMR_AES_VERSION_BYTE; /* 0x01 */ uint8_t
> > version_byte_len = SAMR_AES_VERSION_BYTE_LEN; /* 1 */
> > 
> > uint8_t enc_key_data[64];
> > uint8_t mac_key_data[64];
> > 
> > /* Calculate encryption key */
> > /* cek_key is just 16 bytes if a SMB session key is used? */ rc =
> > gnutls_hmac_fast(GNUTLS_MAC_SHA512,
> > 
> >                       cek_key.data,
> >                       cek_key.size,
> >                       SAMR_AES256_ENC_KEY_STRING,
> >                       SAMR_AES256_ENC_KEY_STRING_LEN,
> >                       enc_key_data);
> > 
> > enc_key.data = mac_key_data;
> > enc_key.size = 32; /* truncation from 64 to 32 bytes */
> > 
> > /* Encrypt plaintext */
> > rc = gnutls_cipher_init(&cipher_hnd,
> > 
> >                         GNUTLS_CIPHER_AES_256_CBC,
> >                         &enc_key,
> >                         &iv);
> > 
> > rc = gnutls_cipher_encrypt2(cipher_hnd,
> > 
> >                             secret->data,
> >                             secret->length,
> >                             ctext,
> >                             ctext_len);
> > 
> > /* Calculate mac key */
> > rc = gnutls_hmac_fast(GNUTLS_MAC_SHA512,
> > 
> >                       cek_key.data,
> >                       cek_key.size,
> >                       SAMR_AES256_MAC_KEY_STRING,
> >                       SAMR_AES256_MAC_KEY_STRING_LEN,
> >                       mac_key_data);
> > 
> > mac_key.data = mac_key_data;
> > mac_key.size = 32; /* truncation from 64 to 32 bytes */
> > 
> > /* Generate auth tag */
> > rc = gnutls_hmac_init(&hmac_hnd,
> > 
> >                       GNUTLS_MAC_SHA512,
> >                       mac_key.data,
> >                       mac_key.size);
> > 
> > rc = gnutls_hmac(hmac_hnd,
> > 
> >                  &version_byte,
> >                  sizeof(uint8_t));
> > 
> > rc = gnutls_hmac(hmac_hnd,
> > 
> >                  iv.data,
> >                  iv.size);
> > 
> > rc = gnutls_hmac(hmac_hnd,
> > 
> >                  ctext,
> >                  ctext_len);
> > 
> > rc = gnutls_hmac(hmac_hnd,
> > 
> >                  &version_byte_len,
> >                  sizeof(uint8_t));
> > 
> > gnutls_hmac_deinit(hmac_hnd, auth_data);
> > /* Is auth_data truncated? */
> > 
> > 
> > Best regards
> > 
> > 	Andreas
> > 	
> > > It appears to have all or most of what you're looking for:
> > > K (secret input key)
> > > MAC_KEY
> > > ENC_KEY
> > > P (plaintext)
> > > IV (initialization vector)
> > > A (associated data)
> > > PS (padding string)
> > > AL (associated data length)
> > > S (ciphertext - intermediate)
> > > T (authentication tag)
> > > C (ciphertext)
> > > 
> > > Best regards,
> > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft
> > > Protocol Open Specifications Team Phone: +1 (425) 703-8300 x38300 |
> > > Hours: 9am-5pm
> > > 
> > > Time zone: (UTC-08:00) Pacific Time (US and Canada) Local country
> > > phone number found here:
> > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport
> > > .
> > > microsoft.com%2Fglobalenglish&data=05%7C01%7Cjeffm%40microsoft.c
> > > om%7C2
> > > aef7356a401488aa28b08da59db101c%7C72f988bf86f141af91ab2d7cd011db47%7
> > > C1%7C0
> > > %7C637921094670609275%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC
> > > JQIjoi
> > > V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3F5
> > > A%2B2t
> > > LvyvS8LOk%2FOx6BeqCckryLWLucxcaxKPNoCI%3D&reserved=0 | Extension
> > > 1138300 We value your feedback.  My manager is Stacy Gray (stacygr),
> > > +1
> > > (469) 775-4055
> > > 
> > > -----Original Message-----
> > > From: Jeff McCashland (He/him)
> > > Sent: Monday, June 27, 2022 11:55 AM
> > > To: Andreas Schneider <asn at samba.org>
> > > Cc: cifs-protocol at lists.samba.org; Jeff McCashland
> > > <jeffm at microsoftsupport.com>; Obaid Farooqi <obaidf at microsoft.com>
> > > Subject:
> > > RE: [EXTERNAL] Re: [MS-SAMR] AEAD-AES-256-CBC-HMAC-SHA512 -
> > > TrackingID#2206210040006850
> > > 
> > > Hi Andreas,
> > > 
> > > Our plan is to capture traffic where AEAD-AES-256-CBC-HMAC-SHA512 is
> > > used.
> > > 
> > > We're working on setting up a Windows repro. However, Windows uses
> > > LDAP instead of SAMR, so we're working out how to configure it to use
> > > SAMR.
> > > 
> > > I'll keep you posted.
> > > 
> > > Best regards,
> > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft
> > > Protocol Open Specifications Team Phone: +1 (425) 703-8300 x38300 |
> > > Hours: 9am-5pm
> > > 
> > > Time zone: (UTC-08:00) Pacific Time (US and Canada) Local country
> > > phone number found here:
> > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsupport
> > > .
> > > microsoft.com%2Fglobalenglish&data=05%7C01%7Cjeffm%40microsoft.c
> > > om%7C2
> > > aef7356a401488aa28b08da59db101c%7C72f988bf86f141af91ab2d7cd011db47%7
> > > C1%7C0
> > > %7C637921094670614268%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC
> > > JQIjoi
> > > V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=u4W
> > > bTdU%2
> > > F6GSFcjspR21MPDStD8Ag2dtpPeNJ5nEgFH8%3D&reserved=0 | Extension
> > > 1138300 We value your feedback.  My manager is Stacy Gray (stacygr),
> > > +1 (469)
> > > 775-4055
> > > 
> > > -----Original Message-----
> > > From: Andreas Schneider <asn at samba.org>
> > > Sent: Monday, June 27, 2022 4:56 AM
> > > To: Jeff McCashland (He/him) <jeffm at microsoft.com>
> > > Cc: cifs-protocol at lists.samba.org; Jeff McCashland
> > > <jeffm at microsoftsupport.com>; Obaid Farooqi <obaidf at microsoft.com>
> > > Subject:
> > > [EXTERNAL] Re: [MS-SAMR] AEAD-AES-256-CBC-HMAC-SHA512 -
> > > TrackingID#2206210040006850
> > > 
> > > On Wednesday, June 22, 2022 8:09:34 PM CEST Jeff McCashland (He/him)
> 
> wrote:
> > > > Hi Andreas,
> > > 
> > > Hi Jeff,
> > > 
> > > > I will research your question and see what we can come up with for
> > > > test data.
> > > 
> > > thank you very much. Looking forward to hear from you :-)
> > > 
> > > 	Andreas
> > > 	
> > > > Best regards,
> > > > Jeff McCashland (He/him) | Senior Escalation Engineer | Microsoft
> > > > Protocol Open Specifications Team Phone: +1 (425) 703-8300 x38300
> > > > 
> > > > Hours: 9am-5pm | Time zone: (UTC-08:00) Pacific Time (US and
> > > > Canada) Local country phone number found here:
> > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fs
> > > > uppo
> > > > rt.microsoft.com%2Fglobalenglish&data=05%7C01%7Cjeffm%40microsoft.
> > > > com%7Cb133cf48cfa147d4956b08da5833fc38%7C72f988bf86f141af91ab2d7cd
> > > > 011d
> > > > b47%7C1%7C0%7C637919277699900369%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiM
> > > > C4wL
> > > > jAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C
> > > > %7C&
> > > > amp;sdata=%2BJdN4TiV%2Bvqq4dqYGpq7mGhZ1vh3gQrrvgjqsBuBXbg%3D&r
> > > > eser
> > > > ved=0 | Extension
> > > > 1138300 We value your feedback.  My manager is Stacy Gray
> > > > (stacygr),
> > > > +1
> > > > (469) 775-4055
> > > > 
> > > > -----Original Message-----
> > > > From: Obaid Farooqi <obaidf at microsoft.com>
> > > > Sent: Tuesday, June 21, 2022 9:08 AM
> > > > To: Andreas Schneider <asn at samba.org>
> > > > Cc: cifs-protocol at lists.samba.org; Obaid Farooqi
> > > > <obaidf at microsoftsupport.com> Subject: [EXTERNAL] [MS-SAMR]
> > > > AEAD-AES-256-CBC-HMAC-SHA512 - TrackingID#2206210040006850
> > > > 
> > > > Hi Andreas:
> > > > Thanks for contacting Microsoft. I have created a case to track
> > > > this issue.
> > > > A member of the open specifications team will be in touch soon.
> > > > 
> > > > Regards,
> > > > Obaid Farooqi
> > > > Escalation Engineer | Microsoft
> > > > 
> > > > -----Original Message-----
> > > > From: Andreas Schneider <asn at samba.org>
> > > > Sent: Tuesday, June 21, 2022 8:00 AM
> > > > To: Interoperability Documentation Help <dochelp at microsoft.com>
> > > > Cc: cifs-protocol at lists.samba.org
> > > > Subject: [EXTERNAL] [MS-SAMR] AEAD-AES-256-CBC-HMAC-SHA512
> > > > 
> > > > Hello Dochelp,
> > > > 
> > > > I'm trying to implement support for AEAD-AES-256-CBC-HMAC-SHA512
> > > > from
> > > > [MS- SAMR] 3.2.2.4 AES Cipher Usage.
> > > > 
> > > > This is not really easy as there are some details unclear. I would
> > > > love to write a unit test for AEAD-AES-256-CBC-HMAC-SHA512.
> > > > 
> > > > Could you please provide hexdump of the buffers used in encryption
> > > > from a
> > > > SamrSetInformationUser2 level 31 from a test platform.
> > > > 
> > > > When it performs the following:
> > > > 
> > > > Let enc_key ::= HMAC-SHA-512(CEK, SAM_AES256_ENC_KEY_STRING) Let
> > > > mac_key ::= HMAC-SHA-512(CEK, SAM_AES256_MAC_KEY_STRING) Let
> > > > Cipher
> > > > 
> > > > ::= AES-CBC(enc_key, IV, secret_plaintext) Let AuthData ::=
> > > > 
> > > > HMAC-SHA-512(mac_key, versionbyte + IV + Cipher +
> > > > versionbyte_length)
> > > > 
> > > > 
> > > > I would like to have hexdumps of the following buffers:
> > > > 
> > > > * cek (16byte sesssion key)
> > > > * enc_key
> > > > * mac_key
> > > > * IV
> > > > * secret_plaintext
> > > > * cipher
> > > > * authdata
> > > > 
> > > > The RFC implementation provides something like that, see:
> > > > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> > > > tool
> > > > s.ietf%2F&data=05%7C01%7Cjeffm%40microsoft.com%7Cb133cf48cfa14
> > > > 7d49
> > > > 56b08da5833fc38%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63791
> > > > 9277
> > > > 699900369%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu
> > > > MzIi
> > > > LCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ihsJ1PYjg
> > > > 2cT7
> > > > 4D3zmlfdDV3UEVNtpJeOX%2BPWQYmg%2FI%3D&reserved=0
> > > > .org%2Fid%2Fdraft-mcgrew-aead-aes-cbc-hmac-sha2-03.html%23rfc.section.
> > > > 5.4&am
> > > > p;data=05%7C01%7Cjeffm%40microsoft.com%7C382019859d9f4eb7cc1b08da5
> > > > 3a03
> > > > c24%7C
> > > > 72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637914244951310820%7CUn
> > > > know
> > > > n%7CTW
> > > > FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX
> > > > VCI6
> > > > Mn0%3D
> > > > %7C3000%7C%7C%7C&sdata=jzVMJ8GS%2BP30uF6pHSTfJf8ioOzDOK69Y%2By
> > > > yFKD
> > > > zpKo%3
> > > > D&reserved=0
> > > > 
> > > > This would allow me to write a unit test and figure out the
> > > > details what in my implementation something goes wrong. I can then
> > > > provide feedback to improve the documentation.
> > > > 
> > > > 
> > > > Thank you very much!
> > > > 
> > > > 
> > > > Best regards
> > > > 
> > > >         Andreas Schneider
> > > > 
> > > > --
> > > > Andreas Schneider                      asn at samba.org
> > > > Samba Team
> > > > https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fw
> > > > ww.sam%2F&data=05%7C01%7Cjeffm%40microsoft.com%7Cfa8e39bd37b64
> > > > 46ac5cd08da5a65e415%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6
> > > > 37921690919606900%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQ
> > > > IjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sda
> > > > ta=gf3Xowal5D7zYZ5e26Z78ZLQNoea1hoWed09vWMnkxA%3D&reserved=0
> > > > ba%2F&data=05%7C01%7Cjeffm%40microsoft.com%7C2aef7356a401488aa
> > > > 28b08d
> > > > a59db101c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63792109467
> > > > 061926
> > > > 7%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB
> > > > TiI6Ik
> > > > 1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=UWJ4c8%2BpOSJ8UiaN%
> > > > 2FeH7l
> > > > marEwwyiVx1ECnPk03Awk4%3D&reserved=0
> > > > %2F&data=05%7C01%7Cjeffm%40microsoft.com%7Cb133cf48cfa147d4956
> > > > b08da
> > > > 583
> > > > 3fc38%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637919277699900
> > > > 369%7
> > > > CUn
> > > > known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik
> > > > 1haWw
> > > > iLC
> > > > JXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Q04le03I8jml11uEltlzIssEEkp
> > > > VMfFe
> > > > HjD Ydw2cPIU%3D&reserved=0.
> > > > org%2F&data=05%7C01%7Cjeffm%40microsoft.com%7C382019859d9f4eb7
> > > > cc1b
> > > > 08da53
> > > > a03c24%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63791424495131
> > > > 0820
> > > > %7CUnk
> > > > nown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1
> > > > haWw
> > > > iLCJXV
> > > > CI6Mn0%3D%7C3000%7C%7C%7C&sdata=0VU8ycMe9EFGOAEV7JROkmRRoQCDje
> > > > 5N%2Fx
> > > > AI
> > > > bz qpbI4%3D&reserved=0 GPG-ID:
> > > > 8DFF53E18F2ABC8D8F3C92237EE0FC4DCC014E3D


-- 
Andreas Schneider                      asn at samba.org
Samba Team                             www.samba.org
GPG-ID:     8DFF53E18F2ABC8D8F3C92237EE0FC4DCC014E3D





More information about the cifs-protocol mailing list