[SCM] Samba Shared Repository - branch master updated
Andrew Bartlett
abartlet at samba.org
Fri Jul 26 03:06:04 UTC 2019
The branch, master has been updated
via 1f923e067db s3:rpc_server: Only dump passwords in developer builds
via 93d424528f1 netlogon: Fix potential use of uninitialized variable
via 1c84bda3616 s3:rpc_server: Use a stackframe for temporary memory
via 52b3f921ad2 s3:utils: Use a stackframe for temporary memory
via 9158a6ba869 s3:rpcclient: Use a stackframe for temporary memory
via fa09e811ca6 s3:lib: Use the passed mem_ctx instead of talloc_tos()
via 9ede63fbada lib:crypto: Don't build RC4 if we have GnuTLS >= 3.4.7
via 14c4a075875 lib:crypto: Remove arcfour.h from crypto.h
via fc4ae06001f lib:crypto: Use GnuTLS RC4 in py_crypto
via 301544ab2b0 s4:torture: Use init_samr_CryptPassword in testjoin RPC test
via 5740e9516f3 s4:torture: Use samba_gnutls_arcfour_confounded_md5() in test_ChangePasswordRandomBytes
via 82a6480611f s4:torture: Use GnuTLS RC4 in test_ChangePasswordRandomBytes
via 19d9c2c01a5 s4:torture: Use init_samr_CryptPassword in test_ChangePasswordRandomBytes
via 8380668be79 s4:torture: clarify comments and variable names in "ChangePasswordUser3 tests
via 5b7c21fca57 s4:torture: Use init_samr_CryptPassword in test_ChangePasswordUser3
via a476a2e3322 s4:torture: Use GnuTLS RC4 in test_ChangePasswordUser2_ntstatus
via 9cbdf7b2e5f s4_torture: Use GnuTLS RC4 in test_ChangePasswordUser2
via 1b1c302a7db s4:torture: Use init_samr_CryptPassword in test_ChangePasswordUser2_ntstatus
via dfda49472e0 s4:torture: Use init_samr_CryptPassword in test_ChangePasswordUser2
via b512b597449 s4:torture: Use GnuTLS RC4 in test_OemChangePasswordUser2
via f45ba47afb1 s4:torture: Use init_samr_CryptPassword in test_SetUserPass_level_ex
via 3b9496d9054 s4:torture: Use init_samr_CryptPassword in test_SetUserPass_25
via e398ecbd8e3 s4:torture: Use init_samr_CryptPassword in test_SetUserPassEx
via b0b9cabc4de s4:torture: Use init_samr_CryptPassword in test_SetUserPass_23
via 70e05d7eb78 s4:torture: Use init_samr_CryptPassword in test_SetUserPass
via 80f5beb4804 s4:torture: Use init_samr_CryptPassword(Ex) in samba3rpc test
via 811c412da5c s4:torture: Use GnuTLS RC4 for RAP SAM test
via 4326e7de6ba s4:rpc_server: Use GnuTLS RC4 for samr password
via 9363abfb5fc s4:rpc_server: Use samba_gnutls_arcfour_confounded_md5() in samr_set_password_ex()
via 359ae5be0d2 s3:utils: Use GnuTLS RC4 in ntlm_auth
via cd0b5e5d937 s3:rpc_server: Use GnuTLS RC4 to decrypt samr password buffers
via d31f6a6803c s3:rpc_server: Use GnuTLS RC4 in samr password check
via a95647e12ac s3:rpc_client: Use init_samr_CryptPassword in cli_samr rpc_client
via 0947d8388de s3:libsmb: Use GnuTLS RC4 in clirap
via 7bd502dcdb4 auth:ntlmssp: Use GnuTLS RC4 for ntlmssp signing
via cb4025a5023 auth:ntlmssp: Use GnuTLS RC4 in ntlmssp client
via bcf7808d3aa libcli:auth: Use samba_gnutls_arcfour_confounded_md5() in decode_wkssvc_join_password_buffer()
via 85e2a3c96ad libcli:auth: Use samba_gnutls_arcfour_confounded_md5() in encode_wkssvc_join_password_buffer()
via f4a16bfba8d libcli:auth: Add test for (encode|decode)_wkssvc_join_password_buffer
via 576bcf61555 libcli:auth: Return WERROR for encode_wkssvc_join_password_buffer()
via 9ea736590d9 s4:libnet: Use GnuTLS RC4 in libnet_ChangePassword_samr()
via cdb4e127652 s4:libnet: Use GnuTLS RC4 in libnet_SetPassword_samr_handle_23()
via 18937f9ceb5 s4:libnet: Use GnuTLS RC4 in libnet_SetPassword_samr_handle_24()
via e44ba0397c7 s4:libnet: Use encode_rc4_passwd_buffer() in libnet_SetPassword_samr_handle_25()
via 5afa402bb7b s4:libnet: Use encode_rc4_passwd_buffer() in libnet_SetPassword_samr_handle_26()
via f0c0cf299eb s3:rpc_client: Use encode_rc4_passwd_buffer() in init_samr_CryptPasswordEx()
via fe00b3735a7 libcli:auth: Add test for encode_rc4_passwd_buffer()
via 06d46c447e6 libcli:auth: Add encode_rc4_passwd_buffer()
via 79ca72ec3d1 libcli:auth: Pass samr_CryptPasswordEx to decode_rc4_passwd_buffer()
via 89f8b028e2d libcli:auth: Rename encode_or_decode_arc4_passwd_buffer()
via dea160820a3 libcli:auth: Use samba_gnutls_arcfour_confounded_md5() for rc4 passwd buffer
via 95db9a81db0 s3:rpc_client: Use GnuTLS RC4 in init_samr_CryptPassword()
via 2075019ca90 s3:rpc_client: Use samba_gnutls_arcfour_confounded_md5 in init_samr_CryptPasswordEx
via 7ccc76f951a libcli:auth: Add test for decoding an RC4 password buffer
via 57dd415ba49 libcli:auth: Return NTSTATUS for encode_or_decode_arc4_passwd_buffer()
via 7915a48e53c s3:rpc_client: Return NTSTATUS for init_samr_CryptPasswordEx()
via 4b9b1dbe9c8 s3:rpc_client: Return NTSTATUS for init_samr_CryptPassword()
via baa96ef2094 lib:crypto: Document samba_gnutls_arcfour_confounded_md5()
via e43678b84a3 lib:crypto: Document gnutls_error_to_werror()
via 5e62358fbf9 lib:crypto: Document gnutls_error_to_ntstatus()
from 3913b9a4088 s3/lib: clang: Fix 'access to field results in a deref of a null pointer'
https://git.samba.org/?p=samba.git;a=shortlog;h=master
- Log -----------------------------------------------------------------
commit 1f923e067dbe358c17cbccfe179baa811aa3b8b3
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 16 16:13:17 2019 +0200
s3:rpc_server: Only dump passwords in developer builds
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
Autobuild-User(master): Andrew Bartlett <abartlet at samba.org>
Autobuild-Date(master): Fri Jul 26 03:05:01 UTC 2019 on sn-devel-184
commit 93d424528f1c3d0d50ebd8a784f4624b2721d416
Author: David Disseldorp <ddiss at samba.org>
Date: Fri Jul 12 17:29:23 2019 +0200
netlogon: Fix potential use of uninitialized variable
The _netr_NetrEnumerateTrustedDomains()->dcerpc_lsa_open_policy2() error
path checks the policy handle and closes it if non-empty. The policy
handle may be uninitialized in this code-path - fix this.
Signed-off-by: David Disseldorp <ddiss at samba.org>
Reviewed-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 1c84bda361678cb6c4685cff17a2d5a5026f2bce
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 16 16:02:12 2019 +0200
s3:rpc_server: Use a stackframe for temporary memory
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 52b3f921ad2d04cb30232a6aadf261c9fc9aafb2
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 16 15:49:43 2019 +0200
s3:utils: Use a stackframe for temporary memory
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 9158a6ba8693070f3b2b71dd15089488869ab6cd
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 16 15:45:51 2019 +0200
s3:rpcclient: Use a stackframe for temporary memory
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit fa09e811ca6fb08a66940380b310ce9794397071
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 16 15:20:23 2019 +0200
s3:lib: Use the passed mem_ctx instead of talloc_tos()
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 9ede63fbada7842cd9ae120936bc6bd4b6ad16ac
Author: Andreas Schneider <asn at samba.org>
Date: Fri Feb 22 13:28:01 2019 +0100
lib:crypto: Don't build RC4 if we have GnuTLS >= 3.4.7
We have a GnuTLS DCEPRC backupkey implementation for the server and the
test. However this is only working with GnuTLS >= 3.4.7. So we need to
keep this around till we can require at least GnuTLS in a newer version.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 14c4a075875860e709a9e2e52aad83aa4c58a5ad
Author: Andreas Schneider <asn at samba.org>
Date: Tue Feb 26 18:18:36 2019 +0100
lib:crypto: Remove arcfour.h from crypto.h
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit fc4ae06001fbb0045318a8cec7af6af81241c60e
Author: Andreas Schneider <asn at samba.org>
Date: Fri Feb 22 12:59:13 2019 +0100
lib:crypto: Use GnuTLS RC4 in py_crypto
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 301544ab2b0c85752d5307f2daab59652c08e1e0
Author: Andreas Schneider <asn at samba.org>
Date: Fri Feb 22 13:06:34 2019 +0100
s4:torture: Use init_samr_CryptPassword in testjoin RPC test
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 5740e9516f3587e3a9f72cf52cfe1eedd940b2a9
Author: Andrew Bartlett <abartlet at samba.org>
Date: Thu Jul 25 13:07:48 2019 +1200
s4:torture: Use samba_gnutls_arcfour_confounded_md5() in test_ChangePasswordRandomBytes
This ensures GnuTLS is used as the underlying RC4 crypto engine
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andreas Schneider <asn at samba.org>
commit 82a6480611f791a3c26fcf70975e6f8b3b1757ad
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 16:01:31 2019 +0200
s4:torture: Use GnuTLS RC4 in test_ChangePasswordRandomBytes
Signed-off-by: Andreas Schneider <asn at samba.org>
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 19d9c2c01a54957bc3852e2565d92c1cdd89498b
Author: Andrew Bartlett <abartlet at samba.org>
Date: Thu Jul 25 17:43:23 2019 +1200
s4:torture: Use init_samr_CryptPassword in test_ChangePasswordRandomBytes
This allows the use of GnuTLS for the underlying RC4 crypto
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andreas Schneider <asn at samba.org>
commit 8380668be7963b74cbbd31bfab3d01d1f3089034
Author: Andrew Bartlett <abartlet at samba.org>
Date: Thu Jul 25 17:18:50 2019 +1200
s4:torture: clarify comments and variable names in "ChangePasswordUser3 tests
There is no session key here, the buffers are directly encrypted
with the long-term passwords.
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andreas Schneider <asn at samba.org>
commit 5b7c21fca576bf6e44233d69b47273058b9197c8
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 16:01:02 2019 +0200
s4:torture: Use init_samr_CryptPassword in test_ChangePasswordUser3
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit a476a2e3322a550e2857cb5a66096fa3e46416d3
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 16:00:32 2019 +0200
s4:torture: Use GnuTLS RC4 in test_ChangePasswordUser2_ntstatus
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 9cbdf7b2e5f734e9b5e0e447d54d720d18977950
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 16:24:18 2019 +0200
s4_torture: Use GnuTLS RC4 in test_ChangePasswordUser2
This uses STR_ASCII as string encodings.
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 1b1c302a7db23bf4377b8fa742ebf7ae913e3511
Author: Andrew Bartlett <abartlet at samba.org>
Date: Thu Jul 25 16:52:41 2019 +1200
s4:torture: Use init_samr_CryptPassword in test_ChangePasswordUser2_ntstatus
This allows the use of GnuTLS for the RC4 crypto operation
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andreas Schneider <asn at samba.org>
commit dfda49472e0b4a81653963e80d8d65788f80a591
Author: Andrew Bartlett <abartlet at samba.org>
Date: Thu Jul 25 16:46:06 2019 +1200
s4:torture: Use init_samr_CryptPassword in test_ChangePasswordUser2
This allows the use of GnuTLS for the RC4 crypto operation
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andreas Schneider <asn at samba.org>
commit b512b5974494fe41010800f60df0f248b8ea850e
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 16:49:53 2019 +0200
s4:torture: Use GnuTLS RC4 in test_OemChangePasswordUser2
This uses STR_ASCII for password encoding!
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit f45ba47afb11c1f7bbb8c5c84670395500e1afc1
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 15:59:19 2019 +0200
s4:torture: Use init_samr_CryptPassword in test_SetUserPass_level_ex
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 3b9496d905408b75c21919b35b2105e2b0b0325f
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 15:58:38 2019 +0200
s4:torture: Use init_samr_CryptPassword in test_SetUserPass_25
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit e398ecbd8e32bb428073f3635d9178abfae28255
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 15:58:06 2019 +0200
s4:torture: Use init_samr_CryptPassword in test_SetUserPassEx
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit b0b9cabc4de64497140d33d0fdaf2927f2915987
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 15:57:25 2019 +0200
s4:torture: Use init_samr_CryptPassword in test_SetUserPass_23
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 70e05d7eb78a0c363dbd72cbbf4f3a264636c840
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 15:56:08 2019 +0200
s4:torture: Use init_samr_CryptPassword in test_SetUserPass
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 80f5beb4804c694ee6e5f5b450e751f538677593
Author: Andreas Schneider <asn at samba.org>
Date: Thu Feb 21 10:21:39 2019 +0100
s4:torture: Use init_samr_CryptPassword(Ex) in samba3rpc test
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 811c412da5c24d7274f9aa4c7d653bbb1191e6a6
Author: Andreas Schneider <asn at samba.org>
Date: Wed Feb 20 15:52:49 2019 +0100
s4:torture: Use GnuTLS RC4 for RAP SAM test
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 4326e7de6ba0ce02ab23af7297d2f7242988daa4
Author: Andreas Schneider <asn at samba.org>
Date: Tue Feb 19 17:40:29 2019 +0100
s4:rpc_server: Use GnuTLS RC4 for samr password
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 9363abfb5fcfeff30295ce0cf94c18941a6c4e9f
Author: Andrew Bartlett <abartlet at samba.org>
Date: Thu Jul 25 12:50:57 2019 +1200
s4:rpc_server: Use samba_gnutls_arcfour_confounded_md5() in samr_set_password_ex()
This allows the use of GnuTLS for the underlying RC4 crypto operations.
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andreas Schneider <asn at samba.org>
commit 359ae5be0d21e7ab235035aab65710c9459e9593
Author: Andreas Schneider <asn at samba.org>
Date: Thu Jan 17 12:40:21 2019 +0100
s3:utils: Use GnuTLS RC4 in ntlm_auth
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit cd0b5e5d9377bc79b4468081f3999ad39be3cb8f
Author: Andreas Schneider <asn at samba.org>
Date: Wed May 15 14:04:31 2019 +0200
s3:rpc_server: Use GnuTLS RC4 to decrypt samr password buffers
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit d31f6a6803c86b8de0a97927731091f5a7bee4f1
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jan 16 17:40:13 2019 +0100
s3:rpc_server: Use GnuTLS RC4 in samr password check
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit a95647e12ac75ffda42d95b41144596a078aebd6
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jan 16 12:41:32 2019 +0100
s3:rpc_client: Use init_samr_CryptPassword in cli_samr rpc_client
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 0947d8388def40b01b322d0deee4dba386983410
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jan 15 18:14:17 2019 +0100
s3:libsmb: Use GnuTLS RC4 in clirap
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 7bd502dcdb44c7d0f8a56b2ba489ae8cf2b886bd
Author: Andreas Schneider <asn at samba.org>
Date: Thu Dec 6 18:11:14 2018 +0100
auth:ntlmssp: Use GnuTLS RC4 for ntlmssp signing
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit cb4025a50232f24139f21d87e50b6e6ea69238ba
Author: Andreas Schneider <asn at samba.org>
Date: Fri Nov 9 12:29:55 2018 +0100
auth:ntlmssp: Use GnuTLS RC4 in ntlmssp client
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit bcf7808d3aa8a5932a40955e4b764f55061e07d7
Author: Andreas Schneider <asn at samba.org>
Date: Mon Jul 8 18:21:18 2019 +0200
libcli:auth: Use samba_gnutls_arcfour_confounded_md5() in decode_wkssvc_join_password_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 85e2a3c96ad9acc1a85db189f6418c9d880b4718
Author: Andreas Schneider <asn at samba.org>
Date: Mon Jul 8 18:03:00 2019 +0200
libcli:auth: Use samba_gnutls_arcfour_confounded_md5() in encode_wkssvc_join_password_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit f4a16bfba8d87de883d3d2e54cdc825fc5e01c2b
Author: Andreas Schneider <asn at samba.org>
Date: Mon Jul 8 17:36:58 2019 +0200
libcli:auth: Add test for (encode|decode)_wkssvc_join_password_buffer
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 576bcf61555fb641b2919ad84a6b26b242b57061
Author: Andreas Schneider <asn at samba.org>
Date: Wed May 29 15:50:45 2019 +0200
libcli:auth: Return WERROR for encode_wkssvc_join_password_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 9ea736590d9b22a7518f86b18e8c55b0d0e213d5
Author: Andreas Schneider <asn at samba.org>
Date: Thu Jul 25 15:15:46 2019 +1200
s4:libnet: Use GnuTLS RC4 in libnet_ChangePassword_samr()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit cdb4e12765266ae767021d932870fbfcd55ccbf6
Author: Andreas Schneider <asn at samba.org>
Date: Fri Feb 1 13:38:21 2019 +0100
s4:libnet: Use GnuTLS RC4 in libnet_SetPassword_samr_handle_23()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 18937f9ceb5aca23899555c5a34fe359f6fcb126
Author: Andreas Schneider <asn at samba.org>
Date: Fri Feb 1 13:38:21 2019 +0100
s4:libnet: Use GnuTLS RC4 in libnet_SetPassword_samr_handle_24()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit e44ba0397c7558e1da6a46cc38237a3b0e5cef49
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 9 13:11:54 2019 +0200
s4:libnet: Use encode_rc4_passwd_buffer() in libnet_SetPassword_samr_handle_25()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 5afa402bb7ba11a8eefc6e14047eeec1f3327681
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 9 13:01:49 2019 +0200
s4:libnet: Use encode_rc4_passwd_buffer() in libnet_SetPassword_samr_handle_26()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit f0c0cf299eb99e7b78be2f04141b6d415bf525e2
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jul 24 11:44:51 2019 +0200
s3:rpc_client: Use encode_rc4_passwd_buffer() in init_samr_CryptPasswordEx()
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit fe00b3735a7e8ae16fb6443965769f1e947a6aa6
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 9 13:06:49 2019 +0200
libcli:auth: Add test for encode_rc4_passwd_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 06d46c447e69a6b384c0089863c343b4924c7caf
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 9 13:01:10 2019 +0200
libcli:auth: Add encode_rc4_passwd_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 79ca72ec3d13fea5d2ad608415757ca9870035a3
Author: Andreas Schneider <asn at samba.org>
Date: Tue Jul 9 12:53:31 2019 +0200
libcli:auth: Pass samr_CryptPasswordEx to decode_rc4_passwd_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 89f8b028e2d595348f9996854488d7aa552ae905
Author: Andreas Schneider <asn at samba.org>
Date: Fri Jul 5 10:12:43 2019 +0200
libcli:auth: Rename encode_or_decode_arc4_passwd_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit dea160820a393be51985a4e761a3f73da83972e7
Author: Andreas Schneider <asn at samba.org>
Date: Fri Jul 5 10:09:32 2019 +0200
libcli:auth: Use samba_gnutls_arcfour_confounded_md5() for rc4 passwd buffer
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 95db9a81db093488e625b4ef385a184a5e517ede
Author: Andreas Schneider <asn at samba.org>
Date: Wed Jan 16 13:15:08 2019 +0100
s3:rpc_client: Use GnuTLS RC4 in init_samr_CryptPassword()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 2075019ca90d7d474003c87b2f0202239891eba5
Author: Andreas Schneider <asn at samba.org>
Date: Thu Jul 4 16:22:48 2019 +0200
s3:rpc_client: Use samba_gnutls_arcfour_confounded_md5 in init_samr_CryptPasswordEx
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 7ccc76f951a626a25d553ac85c5bf30eb29ffa2b
Author: Andreas Schneider <asn at samba.org>
Date: Fri Jul 5 09:39:02 2019 +0200
libcli:auth: Add test for decoding an RC4 password buffer
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 57dd415ba49b9621deddf604a5bf148c10ebc37e
Author: Andreas Schneider <asn at samba.org>
Date: Wed May 29 14:57:52 2019 +0200
libcli:auth: Return NTSTATUS for encode_or_decode_arc4_passwd_buffer()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 7915a48e53c8f72ba56da2f433427b961feeb16f
Author: Andreas Schneider <asn at samba.org>
Date: Wed May 29 17:16:26 2019 +0200
s3:rpc_client: Return NTSTATUS for init_samr_CryptPasswordEx()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 4b9b1dbe9c8c988a39b1318a4f7aac031bc1ea8b
Author: Andreas Schneider <asn at samba.org>
Date: Wed May 29 16:22:11 2019 +0200
s3:rpc_client: Return NTSTATUS for init_samr_CryptPassword()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14031
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit baa96ef20945638fb5ee76b03543c7b611e9c7d7
Author: Andreas Schneider <asn at samba.org>
Date: Thu Jul 18 13:33:54 2019 +0200
lib:crypto: Document samba_gnutls_arcfour_confounded_md5()
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit e43678b84a3434b977f44b265599f1d9207d3b78
Author: Andreas Schneider <asn at samba.org>
Date: Thu Jul 18 13:27:57 2019 +0200
lib:crypto: Document gnutls_error_to_werror()
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
commit 5e62358fbf9ed107ed4a5eb82b62e82ae5638262
Author: Andreas Schneider <asn at samba.org>
Date: Thu Jul 18 09:03:51 2019 +0200
lib:crypto: Document gnutls_error_to_ntstatus()
Signed-off-by: Andreas Schneider <asn at samba.org>
Reviewed-by: Andrew Bartlett <abartlet at samba.org>
-----------------------------------------------------------------------
Summary of changes:
auth/ntlmssp/ntlmssp_client.c | 28 +-
auth/ntlmssp/ntlmssp_private.h | 5 +-
auth/ntlmssp/ntlmssp_sign.c | 212 ++++++++++++---
lib/crypto/crypto.h | 1 -
lib/crypto/gnutls_helpers.h | 50 ++++
lib/crypto/py_crypto.c | 34 ++-
lib/crypto/wscript_build | 32 ++-
libcli/auth/proto.h | 18 +-
libcli/auth/smbencrypt.c | 215 +++++++--------
libcli/auth/tests/test_rc4_passwd_buffer.c | 336 +++++++++++++++++++++++
libcli/auth/wscript_build | 9 +
selftest/tests.py | 2 +
source3/lib/netapi/joindomain.c | 44 ++--
source3/lib/netapi/user.c | 26 +-
source3/libnet/libnet_join.c | 19 +-
source3/libsmb/clirap.c | 27 +-
source3/rpc_client/cli_samr.c | 59 ++++-
source3/rpc_client/init_samr.c | 87 +++---
source3/rpc_client/init_samr.h | 12 +-
source3/rpc_server/netlogon/srv_netlog_nt.c | 30 ++-
source3/rpc_server/samr/srv_samr_chgpasswd.c | 30 ++-
source3/rpc_server/samr/srv_samr_nt.c | 82 +++++-
source3/rpcclient/cmd_samr.c | 62 +++--
source3/utils/net_rpc.c | 30 ++-
source3/utils/ntlm_auth.c | 45 +++-
source3/wscript_build | 2 +-
source4/libnet/libnet_passwd.c | 258 ++++++++++++------
source4/rpc_server/samr/samr_password.c | 139 +++++++---
source4/torture/rap/sam.c | 19 +-
source4/torture/rpc/samba3rpc.c | 43 ++-
source4/torture/rpc/samr.c | 380 +++++++++++++++++++--------
source4/torture/rpc/testjoin.c | 11 +-
source4/torture/rpc/wkssvc.c | 20 +-
33 files changed, 1772 insertions(+), 595 deletions(-)
create mode 100644 libcli/auth/tests/test_rc4_passwd_buffer.c
Changeset truncated at 500 lines:
diff --git a/auth/ntlmssp/ntlmssp_client.c b/auth/ntlmssp/ntlmssp_client.c
index df891f8d933..b8d1190466b 100644
--- a/auth/ntlmssp/ntlmssp_client.c
+++ b/auth/ntlmssp/ntlmssp_client.c
@@ -690,17 +690,43 @@ NTSTATUS ntlmssp_client_challenge(struct gensec_security *gensec_security,
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_KEY_EXCH) {
/* Make up a new session key */
uint8_t client_session_key[16];
+ gnutls_cipher_hd_t cipher_hnd;
+ gnutls_datum_t enc_session_key = {
+ .data = session_key.data,
+ .size = session_key.length,
+ };
+
generate_secret_buffer(client_session_key, sizeof(client_session_key));
/* Encrypt the new session key with the old one */
encrypted_session_key = data_blob_talloc(ntlmssp_state,
client_session_key, sizeof(client_session_key));
dump_data_pw("KEY_EXCH session key:\n", encrypted_session_key.data, encrypted_session_key.length);
- arcfour_crypt(encrypted_session_key.data, session_key.data, encrypted_session_key.length);
+
+ rc = gnutls_cipher_init(&cipher_hnd,
+ GNUTLS_CIPHER_ARCFOUR_128,
+ &enc_session_key,
+ NULL);
+ if (rc < 0) {
+ nt_status = gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ ZERO_ARRAY(client_session_key);
+ goto done;
+ }
+ rc = gnutls_cipher_encrypt(cipher_hnd,
+ encrypted_session_key.data,
+ encrypted_session_key.length);
+ gnutls_cipher_deinit(cipher_hnd);
+ if (rc < 0) {
+ nt_status = gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ ZERO_ARRAY(client_session_key);
+ goto done;
+ }
+
dump_data_pw("KEY_EXCH session key (enc):\n", encrypted_session_key.data, encrypted_session_key.length);
/* Mark the new session key as the 'real' session key */
session_key = data_blob_talloc(mem_ctx, client_session_key, sizeof(client_session_key));
+ ZERO_ARRAY(client_session_key);
}
/* this generates the actual auth packet */
diff --git a/auth/ntlmssp/ntlmssp_private.h b/auth/ntlmssp/ntlmssp_private.h
index 95ec6374f51..4d84e3347b6 100644
--- a/auth/ntlmssp/ntlmssp_private.h
+++ b/auth/ntlmssp/ntlmssp_private.h
@@ -20,14 +20,15 @@
/* For structures internal to the NTLMSSP implementation that should not be exposed */
-#include "../lib/crypto/arcfour.h"
+#include <gnutls/gnutls.h>
+#include <gnutls/crypto.h>
struct auth_session_info;
struct ntlmssp_crypt_direction {
uint32_t seq_num;
uint8_t sign_key[16];
- struct arcfour_state seal_state;
+ gnutls_cipher_hd_t seal_state;
};
union ntlmssp_crypt_state {
diff --git a/auth/ntlmssp/ntlmssp_sign.c b/auth/ntlmssp/ntlmssp_sign.c
index 8ba2e246b34..89f1aa04f7a 100644
--- a/auth/ntlmssp/ntlmssp_sign.c
+++ b/auth/ntlmssp/ntlmssp_sign.c
@@ -47,9 +47,9 @@
*/
static void dump_arc4_state(const char *description,
- struct arcfour_state *state)
+ gnutls_cipher_hd_t *state)
{
- dump_data_pw(description, state->sbox, sizeof(state->sbox));
+ DBG_DEBUG("%s\n", description);
}
static NTSTATUS calc_ntlmv2_key(uint8_t subkey[16],
@@ -90,13 +90,13 @@ static NTSTATUS ntlmssp_make_packet_signature(struct ntlmssp_state *ntlmssp_stat
enum ntlmssp_direction direction,
DATA_BLOB *sig, bool encrypt_sig)
{
- NTSTATUS status;
+ NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
+ int rc;
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
gnutls_hmac_hd_t hmac_hnd = NULL;
uint8_t digest[16];
uint8_t seq_num[4];
- int rc;
*sig = data_blob_talloc(sig_mem_ctx, NULL, NTLMSSP_SIG_SIZE);
if (!sig->data) {
@@ -158,14 +158,24 @@ static NTSTATUS ntlmssp_make_packet_signature(struct ntlmssp_state *ntlmssp_stat
if (encrypt_sig && (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_KEY_EXCH)) {
switch (direction) {
case NTLMSSP_SEND:
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm2.sending.seal_state,
- digest, 8);
+ rc = gnutls_cipher_encrypt(ntlmssp_state->crypt->ntlm2.sending.seal_state,
+ digest,
+ 8);
break;
case NTLMSSP_RECEIVE:
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm2.receiving.seal_state,
- digest, 8);
+ rc = gnutls_cipher_encrypt(ntlmssp_state->crypt->ntlm2.receiving.seal_state,
+ digest,
+ 8);
break;
}
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_encrypt for NTLMv2 EXCH "
+ "%s packet signature failed: %s\n",
+ direction == NTLMSSP_SEND ?
+ "send" : "receive",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
}
SIVAL(sig->data, 0, NTLMSSP_SIGN_VERSION);
@@ -194,8 +204,15 @@ static NTSTATUS ntlmssp_make_packet_signature(struct ntlmssp_state *ntlmssp_stat
dump_arc4_state("ntlmssp hash: \n",
&ntlmssp_state->crypt->ntlm.seal_state);
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm.seal_state,
- sig->data+4, sig->length-4);
+ rc = gnutls_cipher_encrypt(ntlmssp_state->crypt->ntlm.seal_state,
+ sig->data + 4,
+ sig->length - 4);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_encrypt for NTLM packet "
+ "signature failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
}
return NT_STATUS_OK;
@@ -317,6 +334,8 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
const uint8_t *whole_pdu, size_t pdu_length,
DATA_BLOB *sig)
{
+ int rc;
+
if (!(ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_SEAL)) {
DEBUG(3, ("NTLMSSP Sealing not negotiated - cannot seal packet!\n"));
return NT_STATUS_INVALID_PARAMETER;
@@ -353,11 +372,25 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
return nt_status;
}
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm2.sending.seal_state,
- data, length);
+ rc = gnutls_cipher_encrypt(ntlmssp_state->crypt->ntlm2.sending.seal_state,
+ data,
+ length);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_encrypt ntlmv2 sealing the data "
+ "failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_KEY_EXCH) {
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm2.sending.seal_state,
- sig->data+4, 8);
+ rc = gnutls_cipher_encrypt(ntlmssp_state->crypt->ntlm2.sending.seal_state,
+ sig->data + 4,
+ 8);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_encrypt ntlmv2 sealing "
+ "the EXCH signature data failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
}
} else {
NTSTATUS status;
@@ -381,17 +414,30 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
* is not constant, but is is rather updated with
* each iteration
*/
-
dump_arc4_state("ntlmv1 arc4 state:\n",
&ntlmssp_state->crypt->ntlm.seal_state);
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm.seal_state,
- data, length);
+ rc = gnutls_cipher_encrypt(ntlmssp_state->crypt->ntlm.seal_state,
+ data,
+ length);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_encrypt ntlmv1 sealing data"
+ "failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
dump_arc4_state("ntlmv1 arc4 state:\n",
&ntlmssp_state->crypt->ntlm.seal_state);
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm.seal_state,
- sig->data+4, sig->length-4);
+ rc = gnutls_cipher_encrypt(ntlmssp_state->crypt->ntlm.seal_state,
+ sig->data + 4,
+ sig->length - 4);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_encrypt ntlmv1 sealing signing "
+ "data failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
ntlmssp_state->crypt->ntlm.seq_num++;
}
@@ -412,6 +458,8 @@ NTSTATUS ntlmssp_unseal_packet(struct ntlmssp_state *ntlmssp_state,
const DATA_BLOB *sig)
{
NTSTATUS status;
+ int rc;
+
if (!ntlmssp_state->session_key.length) {
DEBUG(3, ("NO session key, cannot unseal packet\n"));
return NT_STATUS_NO_USER_SESSION_KEY;
@@ -422,14 +470,29 @@ NTSTATUS ntlmssp_unseal_packet(struct ntlmssp_state *ntlmssp_state,
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
/* First unseal the data. */
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm2.receiving.seal_state,
- data, length);
+ rc = gnutls_cipher_decrypt(ntlmssp_state->crypt->ntlm2.receiving.seal_state,
+ data,
+ length);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_decrypt ntlmv2 unsealing the "
+ "data failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
dump_data_pw("ntlmv2 clear data\n", data, length);
} else {
- arcfour_crypt_sbox(&ntlmssp_state->crypt->ntlm.seal_state,
- data, length);
+ rc = gnutls_cipher_decrypt(ntlmssp_state->crypt->ntlm.seal_state,
+ data,
+ length);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_decrypt ntlmv1 unsealing the "
+ "data failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
dump_data_pw("ntlmv1 clear data\n", data, length);
}
+
status = ntlmssp_check_packet(ntlmssp_state,
data, length,
whole_pdu, pdu_length,
@@ -555,6 +618,8 @@ NTSTATUS ntlmssp_unwrap(struct ntlmssp_state *ntlmssp_state,
NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
bool reset_seqnums)
{
+ int rc;
+
DEBUG(3, ("NTLMSSP Sign/Seal - Initialising with flags:\n"));
debug_ntlmssp_flags(ntlmssp_state->neg_flags);
@@ -584,12 +649,16 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
const char *send_seal_const;
const char *recv_sign_const;
const char *recv_seal_const;
- uint8_t send_seal_key[16];
- DATA_BLOB send_seal_blob = data_blob_const(send_seal_key,
- sizeof(send_seal_key));
- uint8_t recv_seal_key[16];
- DATA_BLOB recv_seal_blob = data_blob_const(recv_seal_key,
- sizeof(recv_seal_key));
+ uint8_t send_seal_key[16] = {0};
+ gnutls_datum_t send_seal_blob = {
+ .data = send_seal_key,
+ .size = sizeof(send_seal_key),
+ };
+ uint8_t recv_seal_key[16] = {0};
+ gnutls_datum_t recv_seal_blob = {
+ .data = recv_seal_key,
+ .size = sizeof(recv_seal_key),
+ };
NTSTATUS status;
switch (ntlmssp_state->role) {
@@ -648,10 +717,22 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
if (!NT_STATUS_IS_OK(status)) {
return status;
}
- dump_data_pw("NTLMSSP send seal key:\n", send_seal_key, 16);
+ dump_data_pw("NTLMSSP send seal key:\n",
+ send_seal_key,
+ sizeof(send_seal_key));
- arcfour_init(&ntlmssp_state->crypt->ntlm2.sending.seal_state,
- &send_seal_blob);
+ if (ntlmssp_state->crypt->ntlm2.sending.seal_state != NULL) {
+ gnutls_cipher_deinit(ntlmssp_state->crypt->ntlm2.sending.seal_state);
+ }
+ rc = gnutls_cipher_init(&ntlmssp_state->crypt->ntlm2.sending.seal_state,
+ GNUTLS_CIPHER_ARCFOUR_128,
+ &send_seal_blob,
+ NULL);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_init failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
dump_arc4_state("NTLMSSP send seal arc4 state:\n",
&ntlmssp_state->crypt->ntlm2.sending.seal_state);
@@ -677,10 +758,22 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
if (!NT_STATUS_IS_OK(status)) {
return status;
}
- dump_data_pw("NTLMSSP recv seal key:\n", recv_seal_key, 16);
+ dump_data_pw("NTLMSSP recv seal key:\n",
+ recv_seal_key,
+ sizeof(recv_seal_key));
- arcfour_init(&ntlmssp_state->crypt->ntlm2.receiving.seal_state,
- &recv_seal_blob);
+ if (ntlmssp_state->crypt->ntlm2.receiving.seal_state != NULL) {
+ gnutls_cipher_deinit(ntlmssp_state->crypt->ntlm2.receiving.seal_state);
+ }
+ rc = gnutls_cipher_init(&ntlmssp_state->crypt->ntlm2.receiving.seal_state,
+ GNUTLS_CIPHER_ARCFOUR_128,
+ &recv_seal_blob,
+ NULL);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_init failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
dump_arc4_state("NTLMSSP recv seal arc4 state:\n",
&ntlmssp_state->crypt->ntlm2.receiving.seal_state);
@@ -690,8 +783,10 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
ntlmssp_state->crypt->ntlm2.receiving.seq_num = 0;
}
} else {
- uint8_t weak_session_key[8];
- DATA_BLOB seal_session_key = ntlmssp_state->session_key;
+ gnutls_datum_t seal_session_key = {
+ .data = ntlmssp_state->session_key.data,
+ .size = ntlmssp_state->session_key.length,
+ };
bool do_weak = false;
DEBUG(5, ("NTLMSSP Sign/Seal - using NTLM1\n"));
@@ -709,14 +804,19 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
* Nothing to weaken.
* We certainly don't want to 'extend' the length...
*/
- if (seal_session_key.length < 16) {
+ if (ntlmssp_state->session_key.length < 16) {
/* TODO: is this really correct? */
do_weak = false;
}
if (do_weak) {
+ uint8_t weak_session_key[8];
+
memcpy(weak_session_key, seal_session_key.data, 8);
- seal_session_key = data_blob_const(weak_session_key, 8);
+ seal_session_key = (gnutls_datum_t) {
+ .data = weak_session_key,
+ .size = sizeof(weak_session_key),
+ };
/*
* LM key doesn't support 128 bit crypto, so this is
@@ -732,8 +832,18 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
}
}
- arcfour_init(&ntlmssp_state->crypt->ntlm.seal_state,
- &seal_session_key);
+ if (ntlmssp_state->crypt->ntlm.seal_state != NULL) {
+ gnutls_cipher_deinit(ntlmssp_state->crypt->ntlm.seal_state);
+ }
+ rc = gnutls_cipher_init(&ntlmssp_state->crypt->ntlm.seal_state,
+ GNUTLS_CIPHER_ARCFOUR_128,
+ &seal_session_key,
+ NULL);
+ if (rc < 0) {
+ DBG_ERR("gnutls_cipher_init failed: %s\n",
+ gnutls_strerror(rc));
+ return gnutls_error_to_ntstatus(rc, NT_STATUS_NTLM_BLOCKED);
+ }
dump_arc4_state("NTLMv1 arc4 state:\n",
&ntlmssp_state->crypt->ntlm.seal_state);
@@ -746,6 +856,24 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
return NT_STATUS_OK;
}
+static int ntlmssp_crypt_free_gnutls_cipher_state(union ntlmssp_crypt_state *c)
+{
+ if (c->ntlm2.sending.seal_state != NULL) {
+ gnutls_cipher_deinit(c->ntlm2.sending.seal_state);
+ c->ntlm2.sending.seal_state = NULL;
+ }
+ if (c->ntlm2.receiving.seal_state != NULL) {
+ gnutls_cipher_deinit(c->ntlm2.receiving.seal_state);
+ c->ntlm2.receiving.seal_state = NULL;
+ }
+ if (c->ntlm.seal_state != NULL) {
+ gnutls_cipher_deinit(c->ntlm.seal_state);
+ c->ntlm.seal_state = NULL;
+ }
+
+ return 0;
+}
+
NTSTATUS ntlmssp_sign_init(struct ntlmssp_state *ntlmssp_state)
{
if (ntlmssp_state->session_key.length < 8) {
@@ -758,6 +886,8 @@ NTSTATUS ntlmssp_sign_init(struct ntlmssp_state *ntlmssp_state)
if (ntlmssp_state->crypt == NULL) {
return NT_STATUS_NO_MEMORY;
}
+ talloc_set_destructor(ntlmssp_state->crypt,
+ ntlmssp_crypt_free_gnutls_cipher_state);
return ntlmssp_sign_reset(ntlmssp_state, true);
}
diff --git a/lib/crypto/crypto.h b/lib/crypto/crypto.h
index 12aebaecefd..d7409f9a46d 100644
--- a/lib/crypto/crypto.h
+++ b/lib/crypto/crypto.h
@@ -21,7 +21,6 @@
#define _SAMBA_CRYPTO_H_
#include "../lib/crypto/md4.h"
-#include "../lib/crypto/arcfour.h"
#include "../lib/crypto/aes.h"
#include "../lib/crypto/aes_cmac_128.h"
#include "../lib/crypto/aes_ccm_128.h"
diff --git a/lib/crypto/gnutls_helpers.h b/lib/crypto/gnutls_helpers.h
index 8a2a49baf73..45dec2b5db6 100644
--- a/lib/crypto/gnutls_helpers.h
+++ b/lib/crypto/gnutls_helpers.h
@@ -32,6 +32,21 @@
#define GNUTLS_FIPS140_SET_STRICT_MODE()
#endif
+#ifdef DOXYGEN
+/**
+ * @brief Convert a gnutls error code to a corresponding NTSTATUS.
+ *
+ * @param[in] gnutls_rc The GnuTLS return code.
+ *
+ * @param[in] blocked_status The NTSTATUS return code which should be returned
+ * in case the e.g. the cipher might be blocked due
+ * to FIPS mode.
+ *
+ * @return A corresponding NTSTATUS code.
+ */
+NTSTATUS gnutls_error_to_ntstatus(int gnutls_rc,
+ NTSTATUS blocked_status);
+#else
NTSTATUS _gnutls_error_to_ntstatus(int gnutls_rc,
NTSTATUS blocked_status,
const char *function,
@@ -39,7 +54,23 @@ NTSTATUS _gnutls_error_to_ntstatus(int gnutls_rc,
#define gnutls_error_to_ntstatus(gnutls_rc, blocked_status) \
_gnutls_error_to_ntstatus(gnutls_rc, blocked_status, \
__FUNCTION__, __location__)
+#endif
+#ifdef DOXYGEN
+/**
+ * @brief Convert a gnutls error code to a corresponding WERROR.
+ *
+ * @param[in] gnutls_rc The GnuTLS return code.
+ *
+ * @param[in] blocked_werr The WERROR code which should be returned if e.g
+ * the cipher we want to used it not allowed to be
+ * used because of FIPS mode.
+ *
+ * @return A corresponding WERROR code.
+ */
+WERROR gnutls_error_to_werror(int gnutls_rc,
+ WERROR blocked_werr);
--
Samba Shared Repository
More information about the samba-cvs
mailing list