/src/FreeRDP/winpr/libwinpr/sspi/NTLM/ntlm_compute.c
Line | Count | Source (jump to first uncovered line) |
1 | | /** |
2 | | * WinPR: Windows Portable Runtime |
3 | | * NTLM Security Package (Compute) |
4 | | * |
5 | | * Copyright 2011-2014 Marc-Andre Moreau <marcandre.moreau@gmail.com> |
6 | | * |
7 | | * Licensed under the Apache License, Version 2.0 (the "License"); |
8 | | * you may not use this file except in compliance with the License. |
9 | | * You may obtain a copy of the License at |
10 | | * |
11 | | * http://www.apache.org/licenses/LICENSE-2.0 |
12 | | * |
13 | | * Unless required by applicable law or agreed to in writing, software |
14 | | * distributed under the License is distributed on an "AS IS" BASIS, |
15 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
16 | | * See the License for the specific language governing permissions and |
17 | | * limitations under the License. |
18 | | */ |
19 | | |
20 | | #include <winpr/config.h> |
21 | | |
22 | | #include <winpr/assert.h> |
23 | | |
24 | | #include "ntlm.h" |
25 | | #include "../sspi.h" |
26 | | |
27 | | #include <winpr/crt.h> |
28 | | #include <winpr/sam.h> |
29 | | #include <winpr/ntlm.h> |
30 | | #include <winpr/print.h> |
31 | | #include <winpr/crypto.h> |
32 | | #include <winpr/sysinfo.h> |
33 | | |
34 | | #include "ntlm_compute.h" |
35 | | |
36 | | #include "../../log.h" |
37 | 0 | #define TAG WINPR_TAG("sspi.NTLM") |
38 | | |
39 | | #define NTLM_CheckAndLogRequiredCapacity(tag, s, nmemb, what) \ |
40 | 0 | Stream_CheckAndLogRequiredCapacityEx(tag, WLOG_WARN, s, nmemb, 1, "%s(%s:%" PRIuz ") " what, \ |
41 | 0 | __func__, __FILE__, (size_t)__LINE__) |
42 | | |
43 | | static char NTLM_CLIENT_SIGN_MAGIC[] = "session key to client-to-server signing key magic constant"; |
44 | | static char NTLM_SERVER_SIGN_MAGIC[] = "session key to server-to-client signing key magic constant"; |
45 | | static char NTLM_CLIENT_SEAL_MAGIC[] = "session key to client-to-server sealing key magic constant"; |
46 | | static char NTLM_SERVER_SEAL_MAGIC[] = "session key to server-to-client sealing key magic constant"; |
47 | | |
48 | | static const BYTE NTLM_NULL_BUFFER[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
49 | | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; |
50 | | |
51 | | /** |
52 | | * Populate VERSION structure msdn{cc236654} |
53 | | * @param versionInfo A pointer to the version struct |
54 | | * |
55 | | * @return \b TRUE for success, \b FALSE for failure |
56 | | */ |
57 | | |
58 | | BOOL ntlm_get_version_info(NTLM_VERSION_INFO* versionInfo) |
59 | 0 | { |
60 | 0 | WINPR_ASSERT(versionInfo); |
61 | | |
62 | | #if defined(WITH_WINPR_DEPRECATED) |
63 | | OSVERSIONINFOA osVersionInfo = { 0 }; |
64 | | osVersionInfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFOA); |
65 | | if (!GetVersionExA(&osVersionInfo)) |
66 | | return FALSE; |
67 | | versionInfo->ProductMajorVersion = (UINT8)osVersionInfo.dwMajorVersion; |
68 | | versionInfo->ProductMinorVersion = (UINT8)osVersionInfo.dwMinorVersion; |
69 | | versionInfo->ProductBuild = (UINT16)osVersionInfo.dwBuildNumber; |
70 | | #else |
71 | | /* Always return fixed version number. |
72 | | * |
73 | | * ProductVersion is fixed since windows 10 to Major 10, Minor 0 |
74 | | * ProductBuild taken from https://en.wikipedia.org/wiki/Windows_11_version_history |
75 | | * with most recent (pre) release build number |
76 | | */ |
77 | 0 | versionInfo->ProductMajorVersion = 10; |
78 | 0 | versionInfo->ProductMinorVersion = 0; |
79 | 0 | versionInfo->ProductBuild = 22631; |
80 | 0 | #endif |
81 | 0 | ZeroMemory(versionInfo->Reserved, sizeof(versionInfo->Reserved)); |
82 | 0 | versionInfo->NTLMRevisionCurrent = NTLMSSP_REVISION_W2K3; |
83 | 0 | return TRUE; |
84 | 0 | } |
85 | | |
86 | | /** |
87 | | * Read VERSION structure. msdn{cc236654} |
88 | | * @param s A pointer to a stream to read |
89 | | * @param versionInfo A pointer to the struct to read data to |
90 | | * |
91 | | * @return \b TRUE for success, \b FALSE for failure |
92 | | */ |
93 | | |
94 | | BOOL ntlm_read_version_info(wStream* s, NTLM_VERSION_INFO* versionInfo) |
95 | 0 | { |
96 | 0 | WINPR_ASSERT(s); |
97 | 0 | WINPR_ASSERT(versionInfo); |
98 | | |
99 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 8)) |
100 | 0 | return FALSE; |
101 | | |
102 | 0 | Stream_Read_UINT8(s, versionInfo->ProductMajorVersion); /* ProductMajorVersion (1 byte) */ |
103 | 0 | Stream_Read_UINT8(s, versionInfo->ProductMinorVersion); /* ProductMinorVersion (1 byte) */ |
104 | 0 | Stream_Read_UINT16(s, versionInfo->ProductBuild); /* ProductBuild (2 bytes) */ |
105 | 0 | Stream_Read(s, versionInfo->Reserved, sizeof(versionInfo->Reserved)); /* Reserved (3 bytes) */ |
106 | 0 | Stream_Read_UINT8(s, versionInfo->NTLMRevisionCurrent); /* NTLMRevisionCurrent (1 byte) */ |
107 | 0 | return TRUE; |
108 | 0 | } |
109 | | |
110 | | /** |
111 | | * Write VERSION structure. msdn{cc236654} |
112 | | * @param s A pointer to the stream to write to |
113 | | * @param versionInfo A pointer to the buffer to read the data from |
114 | | * |
115 | | * @return \b TRUE for success, \b FALSE for failure |
116 | | */ |
117 | | |
118 | | BOOL ntlm_write_version_info(wStream* s, const NTLM_VERSION_INFO* versionInfo) |
119 | 0 | { |
120 | 0 | WINPR_ASSERT(s); |
121 | 0 | WINPR_ASSERT(versionInfo); |
122 | | |
123 | 0 | if (!Stream_CheckAndLogRequiredCapacityEx( |
124 | 0 | TAG, WLOG_WARN, s, 5ull + sizeof(versionInfo->Reserved), 1ull, |
125 | 0 | "%s(%s:%" PRIuz ") NTLM_VERSION_INFO", __func__, __FILE__, (size_t)__LINE__)) |
126 | 0 | return FALSE; |
127 | | |
128 | 0 | Stream_Write_UINT8(s, versionInfo->ProductMajorVersion); /* ProductMajorVersion (1 byte) */ |
129 | 0 | Stream_Write_UINT8(s, versionInfo->ProductMinorVersion); /* ProductMinorVersion (1 byte) */ |
130 | 0 | Stream_Write_UINT16(s, versionInfo->ProductBuild); /* ProductBuild (2 bytes) */ |
131 | 0 | Stream_Write(s, versionInfo->Reserved, sizeof(versionInfo->Reserved)); /* Reserved (3 bytes) */ |
132 | 0 | Stream_Write_UINT8(s, versionInfo->NTLMRevisionCurrent); /* NTLMRevisionCurrent (1 byte) */ |
133 | 0 | return TRUE; |
134 | 0 | } |
135 | | |
136 | | /** |
137 | | * Print VERSION structure. msdn{cc236654} |
138 | | * @param versionInfo A pointer to the struct containing the data to print |
139 | | */ |
140 | | #ifdef WITH_DEBUG_NTLM |
141 | | void ntlm_print_version_info(const NTLM_VERSION_INFO* versionInfo) |
142 | | { |
143 | | WINPR_ASSERT(versionInfo); |
144 | | |
145 | | WLog_VRB(TAG, "VERSION ={"); |
146 | | WLog_VRB(TAG, "\tProductMajorVersion: %" PRIu8 "", versionInfo->ProductMajorVersion); |
147 | | WLog_VRB(TAG, "\tProductMinorVersion: %" PRIu8 "", versionInfo->ProductMinorVersion); |
148 | | WLog_VRB(TAG, "\tProductBuild: %" PRIu16 "", versionInfo->ProductBuild); |
149 | | WLog_VRB(TAG, "\tReserved: 0x%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "", versionInfo->Reserved[0], |
150 | | versionInfo->Reserved[1], versionInfo->Reserved[2]); |
151 | | WLog_VRB(TAG, "\tNTLMRevisionCurrent: 0x%02" PRIX8 "", versionInfo->NTLMRevisionCurrent); |
152 | | } |
153 | | #endif |
154 | | |
155 | | static BOOL ntlm_read_ntlm_v2_client_challenge(wStream* s, NTLMv2_CLIENT_CHALLENGE* challenge) |
156 | 0 | { |
157 | 0 | size_t size = 0; |
158 | 0 | WINPR_ASSERT(s); |
159 | 0 | WINPR_ASSERT(challenge); |
160 | | |
161 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 28)) |
162 | 0 | return FALSE; |
163 | | |
164 | 0 | Stream_Read_UINT8(s, challenge->RespType); |
165 | 0 | Stream_Read_UINT8(s, challenge->HiRespType); |
166 | 0 | Stream_Read_UINT16(s, challenge->Reserved1); |
167 | 0 | Stream_Read_UINT32(s, challenge->Reserved2); |
168 | 0 | Stream_Read(s, challenge->Timestamp, 8); |
169 | 0 | Stream_Read(s, challenge->ClientChallenge, 8); |
170 | 0 | Stream_Read_UINT32(s, challenge->Reserved3); |
171 | 0 | size = Stream_Length(s) - Stream_GetPosition(s); |
172 | |
|
173 | 0 | if (size > UINT32_MAX) |
174 | 0 | { |
175 | 0 | WLog_ERR(TAG, "NTLMv2_CLIENT_CHALLENGE::cbAvPairs too large, got %" PRIuz "bytes", size); |
176 | 0 | return FALSE; |
177 | 0 | } |
178 | | |
179 | 0 | challenge->cbAvPairs = (UINT32)size; |
180 | 0 | challenge->AvPairs = (NTLM_AV_PAIR*)malloc(challenge->cbAvPairs); |
181 | |
|
182 | 0 | if (!challenge->AvPairs) |
183 | 0 | { |
184 | 0 | WLog_ERR(TAG, "NTLMv2_CLIENT_CHALLENGE::AvPairs failed to allocate %" PRIu32 "bytes", |
185 | 0 | challenge->cbAvPairs); |
186 | 0 | return FALSE; |
187 | 0 | } |
188 | | |
189 | 0 | Stream_Read(s, challenge->AvPairs, size); |
190 | 0 | return TRUE; |
191 | 0 | } |
192 | | |
193 | | static BOOL ntlm_write_ntlm_v2_client_challenge(wStream* s, |
194 | | const NTLMv2_CLIENT_CHALLENGE* challenge) |
195 | 0 | { |
196 | 0 | ULONG length = 0; |
197 | |
|
198 | 0 | WINPR_ASSERT(s); |
199 | 0 | WINPR_ASSERT(challenge); |
200 | | |
201 | 0 | if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, 28, "NTLMv2_CLIENT_CHALLENGE")) |
202 | 0 | return FALSE; |
203 | | |
204 | 0 | Stream_Write_UINT8(s, challenge->RespType); |
205 | 0 | Stream_Write_UINT8(s, challenge->HiRespType); |
206 | 0 | Stream_Write_UINT16(s, challenge->Reserved1); |
207 | 0 | Stream_Write_UINT32(s, challenge->Reserved2); |
208 | 0 | Stream_Write(s, challenge->Timestamp, 8); |
209 | 0 | Stream_Write(s, challenge->ClientChallenge, 8); |
210 | 0 | Stream_Write_UINT32(s, challenge->Reserved3); |
211 | 0 | length = ntlm_av_pair_list_length(challenge->AvPairs, challenge->cbAvPairs); |
212 | |
|
213 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, length)) |
214 | 0 | return FALSE; |
215 | | |
216 | 0 | Stream_Write(s, challenge->AvPairs, length); |
217 | 0 | return TRUE; |
218 | 0 | } |
219 | | |
220 | | BOOL ntlm_read_ntlm_v2_response(wStream* s, NTLMv2_RESPONSE* response) |
221 | 0 | { |
222 | 0 | WINPR_ASSERT(s); |
223 | 0 | WINPR_ASSERT(response); |
224 | | |
225 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 16)) |
226 | 0 | return FALSE; |
227 | | |
228 | 0 | Stream_Read(s, response->Response, 16); |
229 | 0 | return ntlm_read_ntlm_v2_client_challenge(s, &(response->Challenge)); |
230 | 0 | } |
231 | | |
232 | | BOOL ntlm_write_ntlm_v2_response(wStream* s, const NTLMv2_RESPONSE* response) |
233 | 0 | { |
234 | 0 | WINPR_ASSERT(s); |
235 | 0 | WINPR_ASSERT(response); |
236 | | |
237 | 0 | if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, 16ull, "NTLMv2_RESPONSE")) |
238 | 0 | return FALSE; |
239 | | |
240 | 0 | Stream_Write(s, response->Response, 16); |
241 | 0 | return ntlm_write_ntlm_v2_client_challenge(s, &(response->Challenge)); |
242 | 0 | } |
243 | | |
244 | | /** |
245 | | * Get current time, in tenths of microseconds since midnight of January 1, 1601. |
246 | | * @param[out] timestamp 64-bit little-endian timestamp |
247 | | */ |
248 | | |
249 | | void ntlm_current_time(BYTE* timestamp) |
250 | 0 | { |
251 | 0 | FILETIME ft = { 0 }; |
252 | |
|
253 | 0 | WINPR_ASSERT(timestamp); |
254 | | |
255 | 0 | GetSystemTimeAsFileTime(&ft); |
256 | 0 | CopyMemory(timestamp, &(ft), sizeof(ft)); |
257 | 0 | } |
258 | | |
259 | | /** |
260 | | * Generate timestamp for AUTHENTICATE_MESSAGE. |
261 | | * |
262 | | * @param context A pointer to the NTLM context |
263 | | */ |
264 | | |
265 | | void ntlm_generate_timestamp(NTLM_CONTEXT* context) |
266 | 0 | { |
267 | 0 | WINPR_ASSERT(context); |
268 | | |
269 | 0 | if (memcmp(context->ChallengeTimestamp, NTLM_NULL_BUFFER, 8) != 0) |
270 | 0 | CopyMemory(context->Timestamp, context->ChallengeTimestamp, 8); |
271 | 0 | else |
272 | 0 | ntlm_current_time(context->Timestamp); |
273 | 0 | } |
274 | | |
275 | | static BOOL ntlm_fetch_ntlm_v2_hash(NTLM_CONTEXT* context, BYTE* hash) |
276 | 0 | { |
277 | 0 | BOOL rc = FALSE; |
278 | 0 | WINPR_SAM* sam = NULL; |
279 | 0 | WINPR_SAM_ENTRY* entry = NULL; |
280 | 0 | SSPI_CREDENTIALS* credentials = NULL; |
281 | |
|
282 | 0 | WINPR_ASSERT(context); |
283 | 0 | WINPR_ASSERT(hash); |
284 | | |
285 | 0 | credentials = context->credentials; |
286 | 0 | sam = SamOpen(context->SamFile, TRUE); |
287 | |
|
288 | 0 | if (!sam) |
289 | 0 | goto fail; |
290 | | |
291 | 0 | entry = SamLookupUserW( |
292 | 0 | sam, (LPWSTR)credentials->identity.User, credentials->identity.UserLength * sizeof(WCHAR), |
293 | 0 | (LPWSTR)credentials->identity.Domain, credentials->identity.DomainLength * sizeof(WCHAR)); |
294 | |
|
295 | 0 | if (!entry) |
296 | 0 | { |
297 | 0 | entry = SamLookupUserW(sam, (LPWSTR)credentials->identity.User, |
298 | 0 | credentials->identity.UserLength * sizeof(WCHAR), NULL, 0); |
299 | 0 | } |
300 | |
|
301 | 0 | if (!entry) |
302 | 0 | goto fail; |
303 | | |
304 | | #ifdef WITH_DEBUG_NTLM |
305 | | WLog_VRB(TAG, "NTLM Hash:"); |
306 | | winpr_HexDump(TAG, WLOG_DEBUG, entry->NtHash, 16); |
307 | | #endif |
308 | 0 | NTOWFv2FromHashW(entry->NtHash, (LPWSTR)credentials->identity.User, |
309 | 0 | credentials->identity.UserLength * sizeof(WCHAR), |
310 | 0 | (LPWSTR)credentials->identity.Domain, |
311 | 0 | credentials->identity.DomainLength * sizeof(WCHAR), hash); |
312 | |
|
313 | 0 | rc = TRUE; |
314 | |
|
315 | 0 | fail: |
316 | 0 | SamFreeEntry(sam, entry); |
317 | 0 | SamClose(sam); |
318 | 0 | if (!rc) |
319 | 0 | WLog_ERR(TAG, "Error: Could not find user in SAM database"); |
320 | |
|
321 | 0 | return rc; |
322 | 0 | } |
323 | | |
324 | | static int hexchar2nibble(WCHAR wc) |
325 | 0 | { |
326 | | #if defined(__BIG_ENDIAN__) |
327 | | union |
328 | | { |
329 | | BYTE b[2]; |
330 | | WCHAR w; |
331 | | } cnv; |
332 | | cnv.w = wc; |
333 | | const BYTE b = cnv.b[0]; |
334 | | cnv.b[0] = cnv.b[1]; |
335 | | cnv.b[1] = b; |
336 | | wc = cnv.w; |
337 | | #endif |
338 | |
|
339 | 0 | switch (wc) |
340 | 0 | { |
341 | 0 | case L'0': |
342 | 0 | case L'1': |
343 | 0 | case L'2': |
344 | 0 | case L'3': |
345 | 0 | case L'4': |
346 | 0 | case L'5': |
347 | 0 | case L'6': |
348 | 0 | case L'7': |
349 | 0 | case L'8': |
350 | 0 | case L'9': |
351 | 0 | return wc - L'0'; |
352 | 0 | case L'a': |
353 | 0 | case L'b': |
354 | 0 | case L'c': |
355 | 0 | case L'd': |
356 | 0 | case L'e': |
357 | 0 | case L'f': |
358 | 0 | return wc - L'a' + 10; |
359 | 0 | case L'A': |
360 | 0 | case L'B': |
361 | 0 | case L'C': |
362 | 0 | case L'D': |
363 | 0 | case L'E': |
364 | 0 | case L'F': |
365 | 0 | return wc - L'A' + 10; |
366 | 0 | default: |
367 | 0 | return -1; |
368 | 0 | } |
369 | 0 | } |
370 | | static int ntlm_convert_password_hash(NTLM_CONTEXT* context, BYTE* hash, size_t hashlen) |
371 | 0 | { |
372 | 0 | const size_t required_len = 2ull * hashlen; |
373 | |
|
374 | 0 | WINPR_ASSERT(context); |
375 | 0 | WINPR_ASSERT(hash); |
376 | | |
377 | 0 | SSPI_CREDENTIALS* credentials = context->credentials; |
378 | | /* Password contains a password hash of length (PasswordLength - |
379 | | * SSPI_CREDENTIALS_HASH_LENGTH_OFFSET) */ |
380 | 0 | const ULONG PasswordHashLength = credentials->identity.PasswordLength - |
381 | 0 | /* Macro [globalScope] */ SSPI_CREDENTIALS_HASH_LENGTH_OFFSET; |
382 | |
|
383 | 0 | if (PasswordHashLength != required_len) |
384 | 0 | { |
385 | 0 | WLog_ERR(TAG, |
386 | 0 | "PasswordHash has invalid length %" PRIu32 " must be exactly %" PRIuz " bytes", |
387 | 0 | PasswordHashLength, required_len); |
388 | 0 | return -1; |
389 | 0 | } |
390 | | |
391 | 0 | const WCHAR* PasswordHash = credentials->identity.Password; |
392 | 0 | for (size_t x = 0; x < hashlen; x++) |
393 | 0 | { |
394 | 0 | const int hi = hexchar2nibble(PasswordHash[2 * x]); |
395 | 0 | if (hi < 0) |
396 | 0 | { |
397 | 0 | WLog_ERR(TAG, "PasswordHash has an invalid value at position %" PRIuz, 2 * x); |
398 | 0 | return -1; |
399 | 0 | } |
400 | 0 | const int lo = hexchar2nibble(PasswordHash[2 * x + 1]); |
401 | 0 | if (lo < 0) |
402 | 0 | { |
403 | 0 | WLog_ERR(TAG, "PasswordHash has an invalid value at position %" PRIuz, 2 * x + 1); |
404 | 0 | return -1; |
405 | 0 | } |
406 | 0 | const BYTE val = (BYTE)((hi << 4) | lo); |
407 | 0 | hash[x] = val; |
408 | 0 | } |
409 | | |
410 | 0 | return 1; |
411 | 0 | } |
412 | | |
413 | | static BOOL ntlm_compute_ntlm_v2_hash(NTLM_CONTEXT* context, BYTE* hash) |
414 | 0 | { |
415 | 0 | SSPI_CREDENTIALS* credentials = NULL; |
416 | |
|
417 | 0 | WINPR_ASSERT(context); |
418 | 0 | WINPR_ASSERT(hash); |
419 | | |
420 | 0 | credentials = context->credentials; |
421 | | #ifdef WITH_DEBUG_NTLM |
422 | | |
423 | | if (credentials) |
424 | | { |
425 | | WLog_VRB(TAG, "Password (length = %" PRIu32 ")", credentials->identity.PasswordLength * 2); |
426 | | winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.Password, |
427 | | credentials->identity.PasswordLength * 2); |
428 | | WLog_VRB(TAG, "Username (length = %" PRIu32 ")", credentials->identity.UserLength * 2); |
429 | | winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.User, |
430 | | credentials->identity.UserLength * 2); |
431 | | WLog_VRB(TAG, "Domain (length = %" PRIu32 ")", credentials->identity.DomainLength * 2); |
432 | | winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.Domain, |
433 | | credentials->identity.DomainLength * 2); |
434 | | } |
435 | | else |
436 | | WLog_VRB(TAG, "Strange, NTLM_CONTEXT is missing valid credentials..."); |
437 | | |
438 | | WLog_VRB(TAG, "Workstation (length = %" PRIu16 ")", context->Workstation.Length); |
439 | | winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)context->Workstation.Buffer, context->Workstation.Length); |
440 | | WLog_VRB(TAG, "NTOWFv2, NTLMv2 Hash"); |
441 | | winpr_HexDump(TAG, WLOG_TRACE, context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH); |
442 | | #endif |
443 | |
|
444 | 0 | if (memcmp(context->NtlmV2Hash, NTLM_NULL_BUFFER, 16) != 0) |
445 | 0 | return TRUE; |
446 | | |
447 | 0 | if (!credentials) |
448 | 0 | return FALSE; |
449 | 0 | else if (memcmp(context->NtlmHash, NTLM_NULL_BUFFER, 16) != 0) |
450 | 0 | { |
451 | 0 | NTOWFv2FromHashW(context->NtlmHash, (LPWSTR)credentials->identity.User, |
452 | 0 | credentials->identity.UserLength * 2, (LPWSTR)credentials->identity.Domain, |
453 | 0 | credentials->identity.DomainLength * 2, hash); |
454 | 0 | } |
455 | 0 | else if (credentials->identity.PasswordLength > SSPI_CREDENTIALS_HASH_LENGTH_OFFSET) |
456 | 0 | { |
457 | | /* Special case for WinPR: password hash */ |
458 | 0 | if (ntlm_convert_password_hash(context, context->NtlmHash, sizeof(context->NtlmHash)) < 0) |
459 | 0 | return FALSE; |
460 | | |
461 | 0 | NTOWFv2FromHashW(context->NtlmHash, (LPWSTR)credentials->identity.User, |
462 | 0 | credentials->identity.UserLength * 2, (LPWSTR)credentials->identity.Domain, |
463 | 0 | credentials->identity.DomainLength * 2, hash); |
464 | 0 | } |
465 | 0 | else if (credentials->identity.Password) |
466 | 0 | { |
467 | 0 | NTOWFv2W((LPWSTR)credentials->identity.Password, credentials->identity.PasswordLength * 2, |
468 | 0 | (LPWSTR)credentials->identity.User, credentials->identity.UserLength * 2, |
469 | 0 | (LPWSTR)credentials->identity.Domain, credentials->identity.DomainLength * 2, |
470 | 0 | hash); |
471 | 0 | } |
472 | 0 | else if (context->HashCallback) |
473 | 0 | { |
474 | 0 | int ret = 0; |
475 | 0 | SecBuffer proofValue; |
476 | 0 | SecBuffer micValue; |
477 | |
|
478 | 0 | if (ntlm_computeProofValue(context, &proofValue) != SEC_E_OK) |
479 | 0 | return FALSE; |
480 | | |
481 | 0 | if (ntlm_computeMicValue(context, &micValue) != SEC_E_OK) |
482 | 0 | { |
483 | 0 | sspi_SecBufferFree(&proofValue); |
484 | 0 | return FALSE; |
485 | 0 | } |
486 | | |
487 | 0 | ret = context->HashCallback(context->HashCallbackArg, &credentials->identity, &proofValue, |
488 | 0 | context->EncryptedRandomSessionKey, |
489 | 0 | context->AUTHENTICATE_MESSAGE.MessageIntegrityCheck, &micValue, |
490 | 0 | hash); |
491 | 0 | sspi_SecBufferFree(&proofValue); |
492 | 0 | sspi_SecBufferFree(&micValue); |
493 | 0 | return ret ? TRUE : FALSE; |
494 | 0 | } |
495 | 0 | else if (context->UseSamFileDatabase) |
496 | 0 | { |
497 | 0 | return ntlm_fetch_ntlm_v2_hash(context, hash); |
498 | 0 | } |
499 | | |
500 | 0 | return TRUE; |
501 | 0 | } |
502 | | |
503 | | SECURITY_STATUS ntlm_compute_lm_v2_response(NTLM_CONTEXT* context) |
504 | 0 | { |
505 | 0 | BYTE* response = NULL; |
506 | 0 | BYTE value[WINPR_MD5_DIGEST_LENGTH] = { 0 }; |
507 | |
|
508 | 0 | WINPR_ASSERT(context); |
509 | | |
510 | 0 | if (context->LmCompatibilityLevel < 2) |
511 | 0 | { |
512 | 0 | if (!sspi_SecBufferAlloc(&context->LmChallengeResponse, 24)) |
513 | 0 | return SEC_E_INSUFFICIENT_MEMORY; |
514 | | |
515 | 0 | ZeroMemory(context->LmChallengeResponse.pvBuffer, 24); |
516 | 0 | return SEC_E_OK; |
517 | 0 | } |
518 | | |
519 | | /* Compute the NTLMv2 hash */ |
520 | | |
521 | 0 | if (!ntlm_compute_ntlm_v2_hash(context, context->NtlmV2Hash)) |
522 | 0 | return SEC_E_NO_CREDENTIALS; |
523 | | |
524 | | /* Concatenate the server and client challenges */ |
525 | 0 | CopyMemory(value, context->ServerChallenge, 8); |
526 | 0 | CopyMemory(&value[8], context->ClientChallenge, 8); |
527 | |
|
528 | 0 | if (!sspi_SecBufferAlloc(&context->LmChallengeResponse, 24)) |
529 | 0 | return SEC_E_INSUFFICIENT_MEMORY; |
530 | | |
531 | 0 | response = (BYTE*)context->LmChallengeResponse.pvBuffer; |
532 | | /* Compute the HMAC-MD5 hash of the resulting value using the NTLMv2 hash as the key */ |
533 | 0 | winpr_HMAC(WINPR_MD_MD5, (void*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH, (BYTE*)value, |
534 | 0 | WINPR_MD5_DIGEST_LENGTH, response, WINPR_MD5_DIGEST_LENGTH); |
535 | | /* Concatenate the resulting HMAC-MD5 hash and the client challenge, giving us the LMv2 response |
536 | | * (24 bytes) */ |
537 | 0 | CopyMemory(&response[16], context->ClientChallenge, 8); |
538 | 0 | return SEC_E_OK; |
539 | 0 | } |
540 | | |
541 | | /** |
542 | | * Compute NTLMv2 Response. |
543 | | * |
544 | | * NTLMv2_RESPONSE msdn{cc236653} |
545 | | * NTLMv2 Authentication msdn{cc236700} |
546 | | * |
547 | | * @param context A pointer to the NTLM context |
548 | | * @return \b TRUE for success, \b FALSE for failure |
549 | | */ |
550 | | |
551 | | SECURITY_STATUS ntlm_compute_ntlm_v2_response(NTLM_CONTEXT* context) |
552 | 0 | { |
553 | 0 | SecBuffer ntlm_v2_temp = { 0 }; |
554 | 0 | SecBuffer ntlm_v2_temp_chal = { 0 }; |
555 | |
|
556 | 0 | WINPR_ASSERT(context); |
557 | | |
558 | 0 | PSecBuffer TargetInfo = &context->ChallengeTargetInfo; |
559 | 0 | SECURITY_STATUS ret = SEC_E_INSUFFICIENT_MEMORY; |
560 | |
|
561 | 0 | if (!sspi_SecBufferAlloc(&ntlm_v2_temp, TargetInfo->cbBuffer + 28)) |
562 | 0 | goto exit; |
563 | | |
564 | 0 | ZeroMemory(ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer); |
565 | 0 | BYTE* blob = (BYTE*)ntlm_v2_temp.pvBuffer; |
566 | | |
567 | | /* Compute the NTLMv2 hash */ |
568 | 0 | ret = SEC_E_NO_CREDENTIALS; |
569 | 0 | if (!ntlm_compute_ntlm_v2_hash(context, (BYTE*)context->NtlmV2Hash)) |
570 | 0 | goto exit; |
571 | | |
572 | | /* Construct temp */ |
573 | 0 | blob[0] = 1; /* RespType (1 byte) */ |
574 | 0 | blob[1] = 1; /* HighRespType (1 byte) */ |
575 | | /* Reserved1 (2 bytes) */ |
576 | | /* Reserved2 (4 bytes) */ |
577 | 0 | CopyMemory(&blob[8], context->Timestamp, 8); /* Timestamp (8 bytes) */ |
578 | 0 | CopyMemory(&blob[16], context->ClientChallenge, 8); /* ClientChallenge (8 bytes) */ |
579 | | /* Reserved3 (4 bytes) */ |
580 | 0 | CopyMemory(&blob[28], TargetInfo->pvBuffer, TargetInfo->cbBuffer); |
581 | | #ifdef WITH_DEBUG_NTLM |
582 | | WLog_VRB(TAG, "NTLMv2 Response Temp Blob"); |
583 | | winpr_HexDump(TAG, WLOG_TRACE, ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer); |
584 | | #endif |
585 | | |
586 | | /* Concatenate server challenge with temp */ |
587 | 0 | ret = SEC_E_INSUFFICIENT_MEMORY; |
588 | 0 | if (!sspi_SecBufferAlloc(&ntlm_v2_temp_chal, ntlm_v2_temp.cbBuffer + 8)) |
589 | 0 | goto exit; |
590 | | |
591 | 0 | blob = (BYTE*)ntlm_v2_temp_chal.pvBuffer; |
592 | 0 | CopyMemory(blob, context->ServerChallenge, 8); |
593 | 0 | CopyMemory(&blob[8], ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer); |
594 | 0 | winpr_HMAC(WINPR_MD_MD5, (BYTE*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH, |
595 | 0 | (BYTE*)ntlm_v2_temp_chal.pvBuffer, ntlm_v2_temp_chal.cbBuffer, |
596 | 0 | context->NtProofString, WINPR_MD5_DIGEST_LENGTH); |
597 | | |
598 | | /* NtChallengeResponse, Concatenate NTProofStr with temp */ |
599 | |
|
600 | 0 | if (!sspi_SecBufferAlloc(&context->NtChallengeResponse, ntlm_v2_temp.cbBuffer + 16)) |
601 | 0 | goto exit; |
602 | | |
603 | 0 | blob = (BYTE*)context->NtChallengeResponse.pvBuffer; |
604 | 0 | CopyMemory(blob, context->NtProofString, WINPR_MD5_DIGEST_LENGTH); |
605 | 0 | CopyMemory(&blob[16], ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer); |
606 | | /* Compute SessionBaseKey, the HMAC-MD5 hash of NTProofStr using the NTLMv2 hash as the key */ |
607 | 0 | winpr_HMAC(WINPR_MD_MD5, (BYTE*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH, |
608 | 0 | context->NtProofString, WINPR_MD5_DIGEST_LENGTH, context->SessionBaseKey, |
609 | 0 | WINPR_MD5_DIGEST_LENGTH); |
610 | 0 | ret = SEC_E_OK; |
611 | 0 | exit: |
612 | 0 | sspi_SecBufferFree(&ntlm_v2_temp); |
613 | 0 | sspi_SecBufferFree(&ntlm_v2_temp_chal); |
614 | 0 | return ret; |
615 | 0 | } |
616 | | |
617 | | /** |
618 | | * Encrypt the given plain text using RC4 and the given key. |
619 | | * @param key RC4 key |
620 | | * @param length text length |
621 | | * @param plaintext plain text |
622 | | * @param ciphertext cipher text |
623 | | */ |
624 | | |
625 | | void ntlm_rc4k(BYTE* key, size_t length, BYTE* plaintext, BYTE* ciphertext) |
626 | 0 | { |
627 | 0 | WINPR_RC4_CTX* rc4 = winpr_RC4_New(key, 16); |
628 | |
|
629 | 0 | if (rc4) |
630 | 0 | { |
631 | 0 | winpr_RC4_Update(rc4, length, plaintext, ciphertext); |
632 | 0 | winpr_RC4_Free(rc4); |
633 | 0 | } |
634 | 0 | } |
635 | | |
636 | | /** |
637 | | * Generate client challenge (8-byte nonce). |
638 | | * @param context A pointer to the NTLM context |
639 | | */ |
640 | | |
641 | | void ntlm_generate_client_challenge(NTLM_CONTEXT* context) |
642 | 0 | { |
643 | 0 | WINPR_ASSERT(context); |
644 | | |
645 | | /* ClientChallenge is used in computation of LMv2 and NTLMv2 responses */ |
646 | 0 | if (memcmp(context->ClientChallenge, NTLM_NULL_BUFFER, sizeof(context->ClientChallenge)) == 0) |
647 | 0 | winpr_RAND(context->ClientChallenge, sizeof(context->ClientChallenge)); |
648 | 0 | } |
649 | | |
650 | | /** |
651 | | * Generate server challenge (8-byte nonce). |
652 | | * @param context A pointer to the NTLM context |
653 | | */ |
654 | | |
655 | | void ntlm_generate_server_challenge(NTLM_CONTEXT* context) |
656 | 0 | { |
657 | 0 | WINPR_ASSERT(context); |
658 | | |
659 | 0 | if (memcmp(context->ServerChallenge, NTLM_NULL_BUFFER, sizeof(context->ServerChallenge)) == 0) |
660 | 0 | winpr_RAND(context->ServerChallenge, sizeof(context->ServerChallenge)); |
661 | 0 | } |
662 | | |
663 | | /** |
664 | | * Generate KeyExchangeKey (the 128-bit SessionBaseKey). msdn{cc236710} |
665 | | * @param context A pointer to the NTLM context |
666 | | */ |
667 | | |
668 | | void ntlm_generate_key_exchange_key(NTLM_CONTEXT* context) |
669 | 0 | { |
670 | 0 | WINPR_ASSERT(context); |
671 | 0 | WINPR_ASSERT(sizeof(context->KeyExchangeKey) == sizeof(context->SessionBaseKey)); |
672 | | |
673 | | /* In NTLMv2, KeyExchangeKey is the 128-bit SessionBaseKey */ |
674 | 0 | CopyMemory(context->KeyExchangeKey, context->SessionBaseKey, sizeof(context->KeyExchangeKey)); |
675 | 0 | } |
676 | | |
677 | | /** |
678 | | * Generate RandomSessionKey (16-byte nonce). |
679 | | * @param context A pointer to the NTLM context |
680 | | */ |
681 | | |
682 | | void ntlm_generate_random_session_key(NTLM_CONTEXT* context) |
683 | 0 | { |
684 | 0 | WINPR_ASSERT(context); |
685 | 0 | winpr_RAND(context->RandomSessionKey, sizeof(context->RandomSessionKey)); |
686 | 0 | } |
687 | | |
688 | | /** |
689 | | * Generate ExportedSessionKey (the RandomSessionKey, exported) |
690 | | * @param context A pointer to the NTLM context |
691 | | */ |
692 | | |
693 | | void ntlm_generate_exported_session_key(NTLM_CONTEXT* context) |
694 | 0 | { |
695 | 0 | WINPR_ASSERT(context); |
696 | | |
697 | 0 | CopyMemory(context->ExportedSessionKey, context->RandomSessionKey, |
698 | 0 | sizeof(context->ExportedSessionKey)); |
699 | 0 | } |
700 | | |
701 | | /** |
702 | | * Encrypt RandomSessionKey (RC4-encrypted RandomSessionKey, using KeyExchangeKey as the key). |
703 | | * @param context A pointer to the NTLM context |
704 | | */ |
705 | | |
706 | | void ntlm_encrypt_random_session_key(NTLM_CONTEXT* context) |
707 | 0 | { |
708 | | /* In NTLMv2, EncryptedRandomSessionKey is the ExportedSessionKey RC4-encrypted with the |
709 | | * KeyExchangeKey */ |
710 | 0 | WINPR_ASSERT(context); |
711 | 0 | ntlm_rc4k(context->KeyExchangeKey, 16, context->RandomSessionKey, |
712 | 0 | context->EncryptedRandomSessionKey); |
713 | 0 | } |
714 | | |
715 | | /** |
716 | | * Decrypt RandomSessionKey (RC4-encrypted RandomSessionKey, using KeyExchangeKey as the key). |
717 | | * @param context A pointer to the NTLM context |
718 | | */ |
719 | | |
720 | | void ntlm_decrypt_random_session_key(NTLM_CONTEXT* context) |
721 | 0 | { |
722 | 0 | WINPR_ASSERT(context); |
723 | | |
724 | | /* In NTLMv2, EncryptedRandomSessionKey is the ExportedSessionKey RC4-encrypted with the |
725 | | * KeyExchangeKey */ |
726 | | |
727 | | /** |
728 | | * if (NegotiateFlags & NTLMSSP_NEGOTIATE_KEY_EXCH) |
729 | | * Set RandomSessionKey to RC4K(KeyExchangeKey, |
730 | | * AUTHENTICATE_MESSAGE.EncryptedRandomSessionKey) else Set RandomSessionKey to KeyExchangeKey |
731 | | */ |
732 | 0 | if (context->NegotiateKeyExchange) |
733 | 0 | { |
734 | 0 | WINPR_ASSERT(sizeof(context->EncryptedRandomSessionKey) == |
735 | 0 | sizeof(context->RandomSessionKey)); |
736 | 0 | ntlm_rc4k(context->KeyExchangeKey, sizeof(context->EncryptedRandomSessionKey), |
737 | 0 | context->EncryptedRandomSessionKey, context->RandomSessionKey); |
738 | 0 | } |
739 | 0 | else |
740 | 0 | { |
741 | 0 | WINPR_ASSERT(sizeof(context->RandomSessionKey) == sizeof(context->KeyExchangeKey)); |
742 | 0 | CopyMemory(context->RandomSessionKey, context->KeyExchangeKey, |
743 | 0 | sizeof(context->RandomSessionKey)); |
744 | 0 | } |
745 | 0 | } |
746 | | |
747 | | /** |
748 | | * Generate signing key msdn{cc236711} |
749 | | * |
750 | | * @param exported_session_key ExportedSessionKey |
751 | | * @param sign_magic Sign magic string |
752 | | * @param signing_key Destination signing key |
753 | | * |
754 | | * @return \b TRUE for success, \b FALSE for failure |
755 | | */ |
756 | | |
757 | | static BOOL ntlm_generate_signing_key(BYTE* exported_session_key, const SecBuffer* sign_magic, |
758 | | BYTE* signing_key) |
759 | 0 | { |
760 | 0 | BOOL rc = FALSE; |
761 | 0 | size_t length = 0; |
762 | 0 | BYTE* value = NULL; |
763 | |
|
764 | 0 | WINPR_ASSERT(exported_session_key); |
765 | 0 | WINPR_ASSERT(sign_magic); |
766 | 0 | WINPR_ASSERT(signing_key); |
767 | | |
768 | 0 | length = WINPR_MD5_DIGEST_LENGTH + sign_magic->cbBuffer; |
769 | 0 | value = (BYTE*)malloc(length); |
770 | |
|
771 | 0 | if (!value) |
772 | 0 | goto out; |
773 | | |
774 | | /* Concatenate ExportedSessionKey with sign magic */ |
775 | 0 | CopyMemory(value, exported_session_key, WINPR_MD5_DIGEST_LENGTH); |
776 | 0 | CopyMemory(&value[WINPR_MD5_DIGEST_LENGTH], sign_magic->pvBuffer, sign_magic->cbBuffer); |
777 | |
|
778 | 0 | rc = winpr_Digest(WINPR_MD_MD5, value, length, signing_key, WINPR_MD5_DIGEST_LENGTH); |
779 | |
|
780 | 0 | out: |
781 | 0 | free(value); |
782 | 0 | return rc; |
783 | 0 | } |
784 | | |
785 | | /** |
786 | | * Generate client signing key (ClientSigningKey). msdn{cc236711} |
787 | | * @param context A pointer to the NTLM context |
788 | | * |
789 | | * @return \b TRUE for success, \b FALSE for failure |
790 | | */ |
791 | | |
792 | | BOOL ntlm_generate_client_signing_key(NTLM_CONTEXT* context) |
793 | 0 | { |
794 | 0 | const SecBuffer signMagic = { sizeof(NTLM_CLIENT_SIGN_MAGIC), 0, NTLM_CLIENT_SIGN_MAGIC }; |
795 | |
|
796 | 0 | WINPR_ASSERT(context); |
797 | 0 | return ntlm_generate_signing_key(context->ExportedSessionKey, &signMagic, |
798 | 0 | context->ClientSigningKey); |
799 | 0 | } |
800 | | |
801 | | /** |
802 | | * Generate server signing key (ServerSigningKey). msdn{cc236711} |
803 | | * @param context A pointer to the NTLM context |
804 | | * |
805 | | * @return \b TRUE for success, \b FALSE for failure |
806 | | */ |
807 | | |
808 | | BOOL ntlm_generate_server_signing_key(NTLM_CONTEXT* context) |
809 | 0 | { |
810 | 0 | const SecBuffer signMagic = { sizeof(NTLM_SERVER_SIGN_MAGIC), 0, NTLM_SERVER_SIGN_MAGIC }; |
811 | |
|
812 | 0 | WINPR_ASSERT(context); |
813 | 0 | return ntlm_generate_signing_key(context->ExportedSessionKey, &signMagic, |
814 | 0 | context->ServerSigningKey); |
815 | 0 | } |
816 | | |
817 | | /** |
818 | | * Generate client sealing key (ClientSealingKey). msdn{cc236712} |
819 | | * @param context A pointer to the NTLM context |
820 | | * |
821 | | * @return \b TRUE for success, \b FALSE for failure |
822 | | */ |
823 | | |
824 | | BOOL ntlm_generate_client_sealing_key(NTLM_CONTEXT* context) |
825 | 0 | { |
826 | 0 | const SecBuffer sealMagic = { sizeof(NTLM_CLIENT_SEAL_MAGIC), 0, NTLM_CLIENT_SEAL_MAGIC }; |
827 | |
|
828 | 0 | WINPR_ASSERT(context); |
829 | 0 | return ntlm_generate_signing_key(context->ExportedSessionKey, &sealMagic, |
830 | 0 | context->ClientSealingKey); |
831 | 0 | } |
832 | | |
833 | | /** |
834 | | * Generate server sealing key (ServerSealingKey). msdn{cc236712} |
835 | | * @param context A pointer to the NTLM context |
836 | | * |
837 | | * @return \b TRUE for success, \b FALSE for failure |
838 | | */ |
839 | | |
840 | | BOOL ntlm_generate_server_sealing_key(NTLM_CONTEXT* context) |
841 | 0 | { |
842 | 0 | const SecBuffer sealMagic = { sizeof(NTLM_SERVER_SEAL_MAGIC), 0, NTLM_SERVER_SEAL_MAGIC }; |
843 | |
|
844 | 0 | WINPR_ASSERT(context); |
845 | 0 | return ntlm_generate_signing_key(context->ExportedSessionKey, &sealMagic, |
846 | 0 | context->ServerSealingKey); |
847 | 0 | } |
848 | | |
849 | | /** |
850 | | * Initialize RC4 stream cipher states for sealing. |
851 | | * @param context A pointer to the NTLM context |
852 | | */ |
853 | | |
854 | | BOOL ntlm_init_rc4_seal_states(NTLM_CONTEXT* context) |
855 | 0 | { |
856 | 0 | WINPR_ASSERT(context); |
857 | 0 | if (context->server) |
858 | 0 | { |
859 | 0 | context->SendSigningKey = context->ServerSigningKey; |
860 | 0 | context->RecvSigningKey = context->ClientSigningKey; |
861 | 0 | context->SendSealingKey = context->ClientSealingKey; |
862 | 0 | context->RecvSealingKey = context->ServerSealingKey; |
863 | 0 | context->SendRc4Seal = |
864 | 0 | winpr_RC4_New(context->ServerSealingKey, sizeof(context->ServerSealingKey)); |
865 | 0 | context->RecvRc4Seal = |
866 | 0 | winpr_RC4_New(context->ClientSealingKey, sizeof(context->ClientSealingKey)); |
867 | 0 | } |
868 | 0 | else |
869 | 0 | { |
870 | 0 | context->SendSigningKey = context->ClientSigningKey; |
871 | 0 | context->RecvSigningKey = context->ServerSigningKey; |
872 | 0 | context->SendSealingKey = context->ServerSealingKey; |
873 | 0 | context->RecvSealingKey = context->ClientSealingKey; |
874 | 0 | context->SendRc4Seal = |
875 | 0 | winpr_RC4_New(context->ClientSealingKey, sizeof(context->ClientSealingKey)); |
876 | 0 | context->RecvRc4Seal = |
877 | 0 | winpr_RC4_New(context->ServerSealingKey, sizeof(context->ServerSealingKey)); |
878 | 0 | } |
879 | 0 | if (!context->SendRc4Seal) |
880 | 0 | { |
881 | 0 | WLog_ERR(TAG, "Failed to allocate context->SendRc4Seal"); |
882 | 0 | return FALSE; |
883 | 0 | } |
884 | 0 | if (!context->RecvRc4Seal) |
885 | 0 | { |
886 | 0 | WLog_ERR(TAG, "Failed to allocate context->RecvRc4Seal"); |
887 | 0 | return FALSE; |
888 | 0 | } |
889 | 0 | return TRUE; |
890 | 0 | } |
891 | | |
892 | | BOOL ntlm_compute_message_integrity_check(NTLM_CONTEXT* context, BYTE* mic, UINT32 size) |
893 | 0 | { |
894 | 0 | BOOL rc = FALSE; |
895 | | /* |
896 | | * Compute the HMAC-MD5 hash of ConcatenationOf(NEGOTIATE_MESSAGE, |
897 | | * CHALLENGE_MESSAGE, AUTHENTICATE_MESSAGE) using the ExportedSessionKey |
898 | | */ |
899 | 0 | WINPR_HMAC_CTX* hmac = winpr_HMAC_New(); |
900 | |
|
901 | 0 | WINPR_ASSERT(context); |
902 | 0 | WINPR_ASSERT(mic); |
903 | 0 | WINPR_ASSERT(size >= WINPR_MD5_DIGEST_LENGTH); |
904 | | |
905 | 0 | memset(mic, 0, size); |
906 | 0 | if (!hmac) |
907 | 0 | return FALSE; |
908 | | |
909 | 0 | if (winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->ExportedSessionKey, WINPR_MD5_DIGEST_LENGTH)) |
910 | 0 | { |
911 | 0 | winpr_HMAC_Update(hmac, (BYTE*)context->NegotiateMessage.pvBuffer, |
912 | 0 | context->NegotiateMessage.cbBuffer); |
913 | 0 | winpr_HMAC_Update(hmac, (BYTE*)context->ChallengeMessage.pvBuffer, |
914 | 0 | context->ChallengeMessage.cbBuffer); |
915 | |
|
916 | 0 | if (context->MessageIntegrityCheckOffset > 0) |
917 | 0 | { |
918 | 0 | const BYTE* auth = (BYTE*)context->AuthenticateMessage.pvBuffer; |
919 | 0 | const BYTE data[WINPR_MD5_DIGEST_LENGTH] = { 0 }; |
920 | 0 | const size_t rest = context->MessageIntegrityCheckOffset + sizeof(data); |
921 | |
|
922 | 0 | WINPR_ASSERT(rest <= context->AuthenticateMessage.cbBuffer); |
923 | 0 | winpr_HMAC_Update(hmac, &auth[0], context->MessageIntegrityCheckOffset); |
924 | 0 | winpr_HMAC_Update(hmac, data, sizeof(data)); |
925 | 0 | winpr_HMAC_Update(hmac, &auth[rest], context->AuthenticateMessage.cbBuffer - rest); |
926 | 0 | } |
927 | 0 | else |
928 | 0 | { |
929 | 0 | winpr_HMAC_Update(hmac, (BYTE*)context->AuthenticateMessage.pvBuffer, |
930 | 0 | context->AuthenticateMessage.cbBuffer); |
931 | 0 | } |
932 | 0 | winpr_HMAC_Final(hmac, mic, WINPR_MD5_DIGEST_LENGTH); |
933 | 0 | rc = TRUE; |
934 | 0 | } |
935 | | |
936 | 0 | winpr_HMAC_Free(hmac); |
937 | 0 | return rc; |
938 | 0 | } |