2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 1997 Gabor Kincses <gabor@acm.org>
5 * 1997 - 2001 Brian Somers <brian@Awfulhak.org>
6 * based on work by Eric Rosenquist
7 * Strata Software Limited.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #include <openssl/des.h>
39 #include <sys/types.h>
42 #include <openssl/des.h>
46 #include <openssl/sha.h>
54 * Documentation & specifications:
56 * MS-CHAP (CHAP80) rfc2433
57 * MS-CHAP-V2 (CHAP81) rfc2759
58 * MPPE key management draft-ietf-pppext-mppe-keys-02.txt
61 static char SHA1_Pad1[40] =
62 {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
63 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
64 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
65 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
67 static char SHA1_Pad2[40] =
68 {0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2,
69 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2,
70 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2,
71 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2};
73 /* unused, for documentation only */
74 /* only NTResp is filled in for FreeBSD */
75 struct MS_ChapResponse {
76 u_char LANManResp[24];
78 u_char UseNT; /* If 1, ignore the LANMan response field */
82 Get7Bits(u_char *input, int startBit)
84 register unsigned int word;
86 word = (unsigned)input[startBit / 8] << 8;
87 word |= (unsigned)input[startBit / 8 + 1];
89 word >>= 15 - (startBit % 8 + 7);
94 /* IN 56 bit DES key missing parity bits
95 OUT 64 bit DES key with parity bits added */
97 MakeKey(u_char *key, u_char *des_key)
99 des_key[0] = Get7Bits(key, 0);
100 des_key[1] = Get7Bits(key, 7);
101 des_key[2] = Get7Bits(key, 14);
102 des_key[3] = Get7Bits(key, 21);
103 des_key[4] = Get7Bits(key, 28);
104 des_key[5] = Get7Bits(key, 35);
105 des_key[6] = Get7Bits(key, 42);
106 des_key[7] = Get7Bits(key, 49);
108 DES_set_odd_parity((DES_cblock *)des_key);
111 static void /* IN 8 octets IN 7 octest OUT 8 octets */
112 DesEncrypt(u_char *clear, u_char *key, u_char *cipher)
115 DES_key_schedule key_schedule;
117 MakeKey(key, des_key);
118 DES_set_key(&des_key, &key_schedule);
119 DES_ecb_encrypt((DES_cblock *)clear, (DES_cblock *)cipher, &key_schedule, 1);
122 static void /* IN 8 octets IN 16 octets OUT 24 octets */
123 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response)
125 char ZPasswordHash[21];
127 memset(ZPasswordHash, '\0', sizeof ZPasswordHash);
128 memcpy(ZPasswordHash, pwHash, 16);
130 DesEncrypt(challenge, ZPasswordHash + 0, response + 0);
131 DesEncrypt(challenge, ZPasswordHash + 7, response + 8);
132 DesEncrypt(challenge, ZPasswordHash + 14, response + 16);
136 NtPasswordHash(char *key, int keylen, char *hash)
140 MD4Init(&MD4context);
141 MD4Update(&MD4context, key, keylen);
142 MD4Final(hash, &MD4context);
146 HashNtPasswordHash(char *hash, char *hashhash)
150 MD4Init(&MD4context);
151 MD4Update(&MD4context, hash, 16);
152 MD4Final(hashhash, &MD4context);
156 ChallengeHash(char *PeerChallenge, char *AuthenticatorChallenge,
157 char *UserName, char *Challenge)
160 char Digest[SHA_DIGEST_LENGTH];
163 Name = strrchr(UserName, '\\');
171 SHA1_Update(&Context, PeerChallenge, 16);
172 SHA1_Update(&Context, AuthenticatorChallenge, 16);
173 SHA1_Update(&Context, Name, strlen(Name));
175 SHA1_Final(Digest, &Context);
176 memcpy(Challenge, Digest, 8);
180 GenerateNTResponse(char *AuthenticatorChallenge, char *PeerChallenge,
181 char *UserName, char *Password,
182 int PasswordLen, char *Response)
185 char PasswordHash[16];
187 ChallengeHash(PeerChallenge, AuthenticatorChallenge, UserName, Challenge);
188 NtPasswordHash(Password, PasswordLen, PasswordHash);
189 ChallengeResponse(Challenge, PasswordHash, Response);
195 SHA1_End(SHA_CTX *ctx, char *buf)
198 unsigned char digest[LENGTH];
199 static const char hex[]="0123456789abcdef";
202 buf = malloc(2*LENGTH + 1);
205 SHA1_Final(digest, ctx);
206 for (i = 0; i < LENGTH; i++) {
207 buf[i+i] = hex[digest[i] >> 4];
208 buf[i+i+1] = hex[digest[i] & 0x0f];
216 GenerateAuthenticatorResponse(char *Password, int PasswordLen,
217 char *NTResponse, char *PeerChallenge,
218 char *AuthenticatorChallenge, char *UserName,
219 char *AuthenticatorResponse)
222 char PasswordHash[16];
223 char PasswordHashHash[16];
225 u_char Digest[SHA_DIGEST_LENGTH];
229 * "Magic" constants used in response generation
232 {0x4D, 0x61, 0x67, 0x69, 0x63, 0x20, 0x73, 0x65, 0x72, 0x76,
233 0x65, 0x72, 0x20, 0x74, 0x6F, 0x20, 0x63, 0x6C, 0x69, 0x65,
234 0x6E, 0x74, 0x20, 0x73, 0x69, 0x67, 0x6E, 0x69, 0x6E, 0x67,
235 0x20, 0x63, 0x6F, 0x6E, 0x73, 0x74, 0x61, 0x6E, 0x74};
239 {0x50, 0x61, 0x64, 0x20, 0x74, 0x6F, 0x20, 0x6D, 0x61, 0x6B,
240 0x65, 0x20, 0x69, 0x74, 0x20, 0x64, 0x6F, 0x20, 0x6D, 0x6F,
241 0x72, 0x65, 0x20, 0x74, 0x68, 0x61, 0x6E, 0x20, 0x6F, 0x6E,
242 0x65, 0x20, 0x69, 0x74, 0x65, 0x72, 0x61, 0x74, 0x69, 0x6F,
245 * Hash the password with MD4
247 NtPasswordHash(Password, PasswordLen, PasswordHash);
251 HashNtPasswordHash(PasswordHash, PasswordHashHash);
254 SHA1_Update(&Context, PasswordHashHash, 16);
255 SHA1_Update(&Context, NTResponse, 24);
256 SHA1_Update(&Context, Magic1, 39);
257 SHA1_Final(Digest, &Context);
258 ChallengeHash(PeerChallenge, AuthenticatorChallenge, UserName, Challenge);
260 SHA1_Update(&Context, Digest, 20);
261 SHA1_Update(&Context, Challenge, 8);
262 SHA1_Update(&Context, Magic2, 41);
265 * Encode the value of 'Digest' as "S=" followed by
266 * 40 ASCII hexadecimal digits and return it in
267 * AuthenticatorResponse.
269 * "S=0123456789ABCDEF0123456789ABCDEF01234567"
271 AuthenticatorResponse[0] = 'S';
272 AuthenticatorResponse[1] = '=';
273 SHA1_End(&Context, AuthenticatorResponse + 2);
275 AuthenticatorResponse[i] = toupper(AuthenticatorResponse[i]);
280 GetMasterKey(char *PasswordHashHash, char *NTResponse, char *MasterKey)
282 char Digest[SHA_DIGEST_LENGTH];
284 static char Magic1[27] =
285 {0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74,
286 0x68, 0x65, 0x20, 0x4d, 0x50, 0x50, 0x45, 0x20, 0x4d,
287 0x61, 0x73, 0x74, 0x65, 0x72, 0x20, 0x4b, 0x65, 0x79};
290 SHA1_Update(&Context, PasswordHashHash, 16);
291 SHA1_Update(&Context, NTResponse, 24);
292 SHA1_Update(&Context, Magic1, 27);
293 SHA1_Final(Digest, &Context);
294 memcpy(MasterKey, Digest, 16);
298 GetAsymetricStartKey(char *MasterKey, char *SessionKey, int SessionKeyLength,
299 int IsSend, int IsServer)
301 char Digest[SHA_DIGEST_LENGTH];
305 static char Magic2[84] =
306 {0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69,
307 0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20,
308 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68,
309 0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20, 0x6b, 0x65, 0x79,
310 0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73,
311 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73, 0x69, 0x64, 0x65,
312 0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68,
313 0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20,
314 0x6b, 0x65, 0x79, 0x2e};
316 static char Magic3[84] =
317 {0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69,
318 0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20,
319 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68,
320 0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20,
321 0x6b, 0x65, 0x79, 0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68,
322 0x65, 0x20, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73,
323 0x69, 0x64, 0x65, 0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73,
324 0x20, 0x74, 0x68, 0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20,
325 0x6b, 0x65, 0x79, 0x2e};
342 SHA1_Update(&Context, MasterKey, 16);
343 SHA1_Update(&Context, SHA1_Pad1, 40);
344 SHA1_Update(&Context, s, 84);
345 SHA1_Update(&Context, SHA1_Pad2, 40);
346 SHA1_Final(Digest, &Context);
348 memcpy(SessionKey, Digest, SessionKeyLength);
352 GetNewKeyFromSHA(char *StartKey, char *SessionKey, long SessionKeyLength,
356 char Digest[SHA_DIGEST_LENGTH];
359 SHA1_Update(&Context, StartKey, SessionKeyLength);
360 SHA1_Update(&Context, SHA1_Pad1, 40);
361 SHA1_Update(&Context, SessionKey, SessionKeyLength);
362 SHA1_Update(&Context, SHA1_Pad2, 40);
363 SHA1_Final(Digest, &Context);
365 memcpy(InterimKey, Digest, SessionKeyLength);
370 Get_Key(char *InitialSessionKey, char *CurrentSessionKey,
371 int LengthOfDesiredKey)
374 char Digest[SHA_DIGEST_LENGTH];
377 SHA1_Update(&Context, InitialSessionKey, LengthOfDesiredKey);
378 SHA1_Update(&Context, SHA1_Pad1, 40);
379 SHA1_Update(&Context, CurrentSessionKey, LengthOfDesiredKey);
380 SHA1_Update(&Context, SHA1_Pad2, 40);
381 SHA1_Final(Digest, &Context);
383 memcpy(CurrentSessionKey, Digest, LengthOfDesiredKey);
387 /* passwordHash 16-bytes MD4 hashed password
388 challenge 8-bytes peer CHAP challenge
389 since passwordHash is in a 24-byte buffer, response is written in there */
391 mschap_NT(char *passwordHash, char *challenge)
395 ChallengeResponse(challenge, passwordHash, response);
396 memcpy(passwordHash, response, 24);
397 passwordHash[24] = 1; /* NT-style response */
401 mschap_LANMan(char *digest, char *challenge, char *secret)
403 static u_char salt[] = "KGS!@#$%"; /* RASAPI32.dll */
404 char SECRET[14], *ptr, *end;
407 end = SECRET + sizeof SECRET;
408 for (ptr = SECRET; *secret && ptr < end; ptr++, secret++)
409 *ptr = toupper(*secret);
411 memset(ptr, '\0', end - ptr);
413 DesEncrypt(salt, SECRET, hash);
414 DesEncrypt(salt, SECRET + 7, hash + 8);
416 ChallengeResponse(challenge, hash, digest);