bcee06d42c
deprecated in favor of the POSIX-defined lowercase variants. o Change all occurrences of NTOHL() and associated marcros in the source tree to use the lowercase function variants. o Add missing license bits to sparc64's <machine/endian.h>. Approved by: jake o Clean up <machine/endian.h> files. o Remove unused __uint16_swap_uint32() from i386's <machine/endian.h>. o Remove prototypes for non-existent bswapXX() functions. o Include <machine/endian.h> in <arpa/inet.h> to define the POSIX-required ntohl() family of functions. o Do similar things to expose the ntohl() family in libstand, <netinet/in.h>, and <sys/param.h>. o Prepend underscores to the ntohl() family to help deal with complexities associated with having MD (asm and inline) versions, and having to prevent exposure of these functions in other headers that happen to make use of endian-specific defines. o Create weak aliases to the canonical function name to help deal with third-party software forgetting to include an appropriate header. o Remove some now unneeded pollution from <sys/types.h>. o Add missing <arpa/inet.h> includes in userland. Tested on: alpha, i386 Reviewed by: bde, jake, tmm
271 lines
8.4 KiB
C
271 lines
8.4 KiB
C
/*
|
|
* Copyright (c) 1999, Boris Popov
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by Boris Popov.
|
|
* 4. Neither the name of the author nor the names of any co-contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include <sys/types.h>
|
|
#include <arpa/inet.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <netncp/ncp_lib.h>
|
|
|
|
static void nw_passencrypt(char *old, char *new, char *out);
|
|
|
|
int
|
|
ncp_get_bindery_object_id(NWCONN_HANDLE connid, u_int16_t object_type,
|
|
const char *object_name, struct ncp_bindery_object *target)
|
|
{
|
|
int error;
|
|
DECLARE_RQ;
|
|
|
|
ncp_init_request_s(conn, 53);
|
|
ncp_add_word_hl(conn, object_type);
|
|
ncp_add_pstring(conn, object_name);
|
|
|
|
if ((error = ncp_request(connid, 23, conn)) != 0) {
|
|
return error;
|
|
}
|
|
if (conn->rpsize < 54) {
|
|
return EACCES;
|
|
}
|
|
target->object_id = ncp_reply_dword_hl(conn, 0);
|
|
target->object_type = ncp_reply_word_hl(conn, 4);
|
|
memcpy(target->object_name, ncp_reply_data(conn, 6), 48);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
ncp_read_property_value(NWCONN_HANDLE connid, int object_type,
|
|
const char *object_name, int segment, const char *prop_name,
|
|
struct nw_property *target)
|
|
{
|
|
int error;
|
|
struct ncp_buf conn;
|
|
ncp_init_request_s(&conn, 61);
|
|
ncp_add_word_hl(&conn, object_type);
|
|
ncp_add_pstring(&conn, object_name);
|
|
ncp_add_byte(&conn, segment);
|
|
ncp_add_pstring(&conn, prop_name);
|
|
|
|
if ((error = ncp_request(connid,23,&conn)) != 0) {
|
|
return error;
|
|
}
|
|
memcpy(&(target->value), ncp_reply_data(&conn, 0), 128);
|
|
target->more_flag = ncp_reply_byte(&conn, 128);
|
|
target->property_flag = ncp_reply_byte(&conn, 129);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
ncp_scan_bindery_object(NWCONN_HANDLE connid, u_int32_t last_id,
|
|
u_int16_t object_type, char *search_string,
|
|
struct ncp_bindery_object *target)
|
|
{
|
|
int error;
|
|
DECLARE_RQ;
|
|
|
|
ncp_init_request_s(conn, 55);
|
|
ncp_add_dword_hl(conn, last_id);
|
|
ncp_add_word_hl(conn, object_type);
|
|
ncp_add_pstring(conn, search_string);
|
|
error = ncp_request(connid, 23, conn);
|
|
if (error) return error;
|
|
target->object_id = ncp_reply_dword_hl(conn, 0);
|
|
target->object_type = ncp_reply_word_hl(conn, 4);
|
|
memcpy(target->object_name, ncp_reply_data(conn, 6),NCP_BINDERY_NAME_LEN);
|
|
target->object_flags = ncp_reply_byte(conn, 54);
|
|
target->object_security = ncp_reply_byte(conn, 55);
|
|
target->object_has_prop = ncp_reply_byte(conn, 56);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
ncp_get_bindery_object_name(NWCONN_HANDLE connid, u_int32_t object_id,
|
|
struct ncp_bindery_object *target)
|
|
{
|
|
int error;
|
|
DECLARE_RQ;
|
|
|
|
ncp_init_request_s(conn, 54);
|
|
ncp_add_dword_hl(conn, object_id);
|
|
if ((error = ncp_request(connid, 23, conn)) != 0)
|
|
return error;
|
|
target->object_id = ncp_reply_dword_hl(conn, 0);
|
|
target->object_type = ncp_reply_word_hl(conn, 4);
|
|
memcpy(target->object_name, ncp_reply_data(conn, 6), 48);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
ncp_change_obj_passwd(NWCONN_HANDLE connid,
|
|
const struct ncp_bindery_object *object,
|
|
const u_char *key,
|
|
const u_char *oldpasswd,
|
|
const u_char *newpasswd)
|
|
{
|
|
long id = htonl(object->object_id);
|
|
u_char cryptkey[8];
|
|
u_char newpwd[16]; /* new passwd as stored by server */
|
|
u_char oldpwd[16]; /* old passwd as stored by server */
|
|
u_char len;
|
|
DECLARE_RQ;
|
|
|
|
memcpy(cryptkey, key, 8);
|
|
nw_keyhash((u_char *)&id, oldpasswd, strlen(oldpasswd), oldpwd);
|
|
nw_keyhash((u_char *)&id, newpasswd, strlen(newpasswd), newpwd);
|
|
nw_encrypt(cryptkey, oldpwd, cryptkey);
|
|
nw_passencrypt(oldpwd, newpwd, newpwd);
|
|
nw_passencrypt(oldpwd + 8, newpwd + 8, newpwd + 8);
|
|
if ((len = strlen(newpasswd)) > 63) {
|
|
len = 63;
|
|
}
|
|
len = ((len ^ oldpwd[0] ^ oldpwd[1]) & 0x7f) | 0x40;
|
|
|
|
ncp_init_request_s(conn, 75);
|
|
ncp_add_mem(conn, cryptkey, 8);
|
|
ncp_add_word_hl(conn, object->object_type);
|
|
ncp_add_pstring(conn, object->object_name);
|
|
ncp_add_byte(conn, len);
|
|
ncp_add_mem(conn, newpwd, 16);
|
|
return ncp_request(connid, 23, conn);
|
|
}
|
|
|
|
/*
|
|
* target is a 8-byte buffer
|
|
*/
|
|
int
|
|
ncp_get_encryption_key(NWCONN_HANDLE cH, char *target) {
|
|
int error;
|
|
DECLARE_RQ;
|
|
|
|
ncp_init_request_s(conn, 23);
|
|
|
|
error = ncp_request(cH, 23, conn);
|
|
if (error)
|
|
return error;
|
|
if (conn->rpsize < 8)
|
|
return EACCES;
|
|
memcpy(target, ncp_reply_data(conn, 0), 8);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
ncp_keyed_verify_password(NWCONN_HANDLE cH, char *key, char *passwd,
|
|
struct ncp_bindery_object *objinfo)
|
|
{
|
|
u_long id = htonl(objinfo->object_id);
|
|
u_char cryptkey[8];
|
|
u_char buf[128];
|
|
DECLARE_RQ;
|
|
|
|
nw_keyhash((u_char *)&id, passwd, strlen(passwd), buf);
|
|
nw_encrypt(key, buf, cryptkey);
|
|
|
|
ncp_init_request_s(conn, 74);
|
|
ncp_add_mem(conn, cryptkey, sizeof(cryptkey));
|
|
ncp_add_word_hl(conn, objinfo->object_type);
|
|
ncp_add_pstring(conn, objinfo->object_name);
|
|
|
|
return ncp_request(cH, 23, conn);
|
|
}
|
|
|
|
static char passkeys[256 + 16] = {
|
|
0x0f, 0x08, 0x05, 0x07, 0x0c, 0x02, 0x0e, 0x09,
|
|
0x00, 0x01, 0x06, 0x0d, 0x03, 0x04, 0x0b, 0x0a,
|
|
0x02, 0x0c, 0x0e, 0x06, 0x0f, 0x00, 0x01, 0x08,
|
|
0x0d, 0x03, 0x0a, 0x04, 0x09, 0x0b, 0x05, 0x07,
|
|
0x05, 0x02, 0x09, 0x0f, 0x0c, 0x04, 0x0d, 0x00,
|
|
0x0e, 0x0a, 0x06, 0x08, 0x0b, 0x01, 0x03, 0x07,
|
|
0x0f, 0x0d, 0x02, 0x06, 0x07, 0x08, 0x05, 0x09,
|
|
0x00, 0x04, 0x0c, 0x03, 0x01, 0x0a, 0x0b, 0x0e,
|
|
0x05, 0x0e, 0x02, 0x0b, 0x0d, 0x0a, 0x07, 0x00,
|
|
0x08, 0x06, 0x04, 0x01, 0x0f, 0x0c, 0x03, 0x09,
|
|
0x08, 0x02, 0x0f, 0x0a, 0x05, 0x09, 0x06, 0x0c,
|
|
0x00, 0x0b, 0x01, 0x0d, 0x07, 0x03, 0x04, 0x0e,
|
|
0x0e, 0x08, 0x00, 0x09, 0x04, 0x0b, 0x02, 0x07,
|
|
0x0c, 0x03, 0x0a, 0x05, 0x0d, 0x01, 0x06, 0x0f,
|
|
0x01, 0x04, 0x08, 0x0a, 0x0d, 0x0b, 0x07, 0x0e,
|
|
0x05, 0x0f, 0x03, 0x09, 0x00, 0x02, 0x06, 0x0c,
|
|
0x05, 0x03, 0x0c, 0x08, 0x0b, 0x02, 0x0e, 0x0a,
|
|
0x04, 0x01, 0x0d, 0x00, 0x06, 0x07, 0x0f, 0x09,
|
|
0x06, 0x00, 0x0b, 0x0e, 0x0d, 0x04, 0x0c, 0x0f,
|
|
0x07, 0x02, 0x08, 0x0a, 0x01, 0x05, 0x03, 0x09,
|
|
0x0b, 0x05, 0x0a, 0x0e, 0x0f, 0x01, 0x0c, 0x00,
|
|
0x06, 0x04, 0x02, 0x09, 0x03, 0x0d, 0x07, 0x08,
|
|
0x07, 0x02, 0x0a, 0x00, 0x0e, 0x08, 0x0f, 0x04,
|
|
0x0c, 0x0b, 0x09, 0x01, 0x05, 0x0d, 0x03, 0x06,
|
|
0x07, 0x04, 0x0f, 0x09, 0x05, 0x01, 0x0c, 0x0b,
|
|
0x00, 0x03, 0x08, 0x0e, 0x02, 0x0a, 0x06, 0x0d,
|
|
0x09, 0x04, 0x08, 0x00, 0x0a, 0x03, 0x01, 0x0c,
|
|
0x05, 0x0f, 0x07, 0x02, 0x0b, 0x0e, 0x06, 0x0d,
|
|
0x09, 0x05, 0x04, 0x07, 0x0e, 0x08, 0x03, 0x01,
|
|
0x0d, 0x0b, 0x0c, 0x02, 0x00, 0x0f, 0x06, 0x0a,
|
|
0x09, 0x0a, 0x0b, 0x0d, 0x05, 0x03, 0x0f, 0x00,
|
|
0x01, 0x0c, 0x08, 0x07, 0x06, 0x04, 0x0e, 0x02,
|
|
0x03, 0x0e, 0x0f, 0x02, 0x0d, 0x0c, 0x04, 0x05,
|
|
0x09, 0x06, 0x00, 0x01, 0x0b, 0x07, 0x0a, 0x08
|
|
};
|
|
|
|
static void
|
|
nw_passencrypt(char *old, char *new, char *out)
|
|
{
|
|
char *p, v;
|
|
char copy[8];
|
|
int i, di, ax;
|
|
|
|
#define HIGH(x) (((x) >> 4) & 0xf)
|
|
#define LOW(x) ((x) & 0xf)
|
|
memcpy(copy, new, 8);
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
for (di = 0, ax = 0, p = old; di < 8; di++, ax += 0x20, p++) {
|
|
v = copy[di] ^ *p;
|
|
copy[di] = (passkeys[HIGH(v) + ax + 0x10] << 4) |
|
|
passkeys[LOW(v) + ax];
|
|
}
|
|
v = old[7];
|
|
for (p = old + 7; p > old; p--) {
|
|
*p = HIGH(p[-1]) | ((*p) << 4);
|
|
}
|
|
*old = HIGH(v) | (*old) << 4;
|
|
bzero(out, 8);
|
|
|
|
for (di = 0; di < 16; di++) {
|
|
v = passkeys[di + 0x100];
|
|
v = (v & 1) ? HIGH(copy[v / 2]) : LOW(copy[v / 2]);
|
|
out[di / 2] |= ((di & 1) ? v << 4 : v);
|
|
}
|
|
memcpy(copy, out, 8);
|
|
}
|
|
}
|