1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
pub const KERB_CHECKSUM_HMAC_MD5: i32 = -138;
pub const KERB_CHECKSUM_HMAC_MD5_SIGN_SIZE: usize = 16;
pub const HMAC_SHA1_96_AES128: i32 = 15;
pub const HMAC_SHA1_96_AES256: i32 = 16;
pub const HMAC_SHA1_96_AES_SIGN_SIZE: usize = 12;
#[derive(Clone, Debug, PartialEq)]
pub struct PAC_SIGNATURE_DATA {
pub SignatureType: i32,
pub Signature: Vec<u8>,
pub RODCIdentifier: Option<u16>,
}
impl PAC_SIGNATURE_DATA {
pub fn new_empty(SignatureType: i32) -> Self {
let zero_vec = match SignatureType {
KERB_CHECKSUM_HMAC_MD5 => vec![0; KERB_CHECKSUM_HMAC_MD5_SIGN_SIZE],
_ => vec![0; HMAC_SHA1_96_AES_SIGN_SIZE],
};
return Self {
SignatureType,
Signature: zero_vec,
RODCIdentifier: None,
};
}
pub fn build(mut self) -> Vec<u8> {
let mut data = Vec::new();
data.append(&mut self.SignatureType.to_le_bytes().to_vec());
data.append(&mut self.Signature);
return data;
}
}
#[cfg(test)]
mod test {
use super::*;
#[test]
fn test_build() {
let pac_sig = PAC_SIGNATURE_DATA {
SignatureType: KERB_CHECKSUM_HMAC_MD5,
Signature: vec![0; 16],
RODCIdentifier: None,
};
assert_eq!(
vec![
0x76, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
],
pac_sig.build()
)
}
#[test]
fn test_new_empty() {
let pac_sig = PAC_SIGNATURE_DATA {
SignatureType: KERB_CHECKSUM_HMAC_MD5,
Signature: vec![0; 16],
RODCIdentifier: None,
};
assert_eq!(pac_sig, PAC_SIGNATURE_DATA::new_empty(KERB_CHECKSUM_HMAC_MD5));
let pac_sig = PAC_SIGNATURE_DATA {
SignatureType: HMAC_SHA1_96_AES128,
Signature: vec![0; 12],
RODCIdentifier: None,
};
assert_eq!(pac_sig, PAC_SIGNATURE_DATA::new_empty(HMAC_SHA1_96_AES128));
let pac_sig = PAC_SIGNATURE_DATA {
SignatureType: HMAC_SHA1_96_AES256,
Signature: vec![0; 12],
RODCIdentifier: None,
};
assert_eq!(pac_sig, PAC_SIGNATURE_DATA::new_empty(HMAC_SHA1_96_AES256));
}
}