Coverage Report

Created: 2026-04-12 07:03

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/FreeRDP/winpr/libwinpr/sspi/NTLM/ntlm.c
Line
Count
Source
1
/**
2
 * WinPR: Windows Portable Runtime
3
 * NTLM Security Package
4
 *
5
 * Copyright 2011-2014 Marc-Andre Moreau <marcandre.moreau@gmail.com>
6
 *
7
 * Licensed under the Apache License, Version 2.0 (the "License");
8
 * you may not use this file except in compliance with the License.
9
 * You may obtain a copy of the License at
10
 *
11
 *     http://www.apache.org/licenses/LICENSE-2.0
12
 *
13
 * Unless required by applicable law or agreed to in writing, software
14
 * distributed under the License is distributed on an "AS IS" BASIS,
15
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16
 * See the License for the specific language governing permissions and
17
 * limitations under the License.
18
 */
19
20
#include <winpr/config.h>
21
22
#include <winpr/crt.h>
23
#include <winpr/assert.h>
24
#include <winpr/sspi.h>
25
#include <winpr/print.h>
26
#include <winpr/string.h>
27
#include <winpr/tchar.h>
28
#include <winpr/sysinfo.h>
29
#include <winpr/registry.h>
30
#include <winpr/endian.h>
31
#include <winpr/build-config.h>
32
33
#include "ntlm.h"
34
#include "ntlm_export.h"
35
#include "../sspi.h"
36
37
#include "ntlm_message.h"
38
39
#include "../../utils.h"
40
41
#include "../../log.h"
42
0
#define TAG WINPR_TAG("sspi.NTLM")
43
44
0
#define WINPR_KEY "Software\\%s\\WinPR\\NTLM"
45
46
static char* NTLM_PACKAGE_NAME = "NTLM";
47
48
0
#define check_context(ctx) check_context_((ctx), __FILE__, __func__, __LINE__)
49
static BOOL check_context_(NTLM_CONTEXT* context, const char* file, const char* fkt, size_t line)
50
0
{
51
0
  BOOL rc = TRUE;
52
0
  wLog* log = WLog_Get(TAG);
53
0
  const DWORD log_level = WLOG_ERROR;
54
55
0
  if (!context)
56
0
  {
57
0
    if (WLog_IsLevelActive(log, log_level))
58
0
      WLog_PrintTextMessage(log, log_level, line, file, fkt, "invalid context");
59
60
0
    return FALSE;
61
0
  }
62
63
0
  if (!context->RecvRc4Seal)
64
0
  {
65
0
    if (WLog_IsLevelActive(log, log_level))
66
0
      WLog_PrintTextMessage(log, log_level, line, file, fkt, "invalid context->RecvRc4Seal");
67
0
    rc = FALSE;
68
0
  }
69
0
  if (!context->SendRc4Seal)
70
0
  {
71
0
    if (WLog_IsLevelActive(log, log_level))
72
0
      WLog_PrintTextMessage(log, log_level, line, file, fkt, "invalid context->SendRc4Seal");
73
0
    rc = FALSE;
74
0
  }
75
76
0
  if (!context->SendSigningKey)
77
0
  {
78
0
    if (WLog_IsLevelActive(log, log_level))
79
0
      WLog_PrintTextMessage(log, log_level, line, file, fkt,
80
0
                            "invalid context->SendSigningKey");
81
0
    rc = FALSE;
82
0
  }
83
0
  if (!context->RecvSigningKey)
84
0
  {
85
0
    if (WLog_IsLevelActive(log, log_level))
86
0
      WLog_PrintTextMessage(log, log_level, line, file, fkt,
87
0
                            "invalid context->RecvSigningKey");
88
0
    rc = FALSE;
89
0
  }
90
0
  if (!context->SendSealingKey)
91
0
  {
92
0
    if (WLog_IsLevelActive(log, log_level))
93
0
      WLog_PrintTextMessage(log, log_level, line, file, fkt,
94
0
                            "invalid context->SendSealingKey");
95
0
    rc = FALSE;
96
0
  }
97
0
  if (!context->RecvSealingKey)
98
0
  {
99
0
    if (WLog_IsLevelActive(log, log_level))
100
0
      WLog_PrintTextMessage(log, log_level, line, file, fkt,
101
0
                            "invalid context->RecvSealingKey");
102
0
    rc = FALSE;
103
0
  }
104
0
  return rc;
105
0
}
106
107
static char* get_name(COMPUTER_NAME_FORMAT type)
108
0
{
109
0
  DWORD nSize = 0;
110
111
0
  if (GetComputerNameExA(type, nullptr, &nSize))
112
0
    return nullptr;
113
114
0
  if (GetLastError() != ERROR_MORE_DATA)
115
0
    return nullptr;
116
117
0
  char* computerName = calloc(1, nSize);
118
119
0
  if (!computerName)
120
0
    return nullptr;
121
122
0
  if (!GetComputerNameExA(type, computerName, &nSize))
123
0
  {
124
0
    free(computerName);
125
0
    return nullptr;
126
0
  }
127
128
0
  return computerName;
129
0
}
130
131
static int ntlm_SetContextWorkstation(NTLM_CONTEXT* context, char* Workstation)
132
0
{
133
0
  char* ws = Workstation;
134
0
  CHAR* computerName = nullptr;
135
136
0
  WINPR_ASSERT(context);
137
138
0
  if (!Workstation)
139
0
  {
140
0
    computerName = get_name(ComputerNameNetBIOS);
141
0
    if (!computerName)
142
0
      return -1;
143
0
    ws = computerName;
144
0
  }
145
146
0
  size_t len = 0;
147
0
  context->Workstation.Buffer = ConvertUtf8ToWCharAlloc(ws, &len);
148
149
0
  free(computerName);
150
151
0
  if (!context->Workstation.Buffer || (len > UINT16_MAX / sizeof(WCHAR)))
152
0
    return -1;
153
154
0
  context->Workstation.Length = (USHORT)(len * sizeof(WCHAR));
155
0
  return 1;
156
0
}
157
158
static int ntlm_SetContextServicePrincipalNameW(NTLM_CONTEXT* context, LPWSTR ServicePrincipalName)
159
0
{
160
0
  WINPR_ASSERT(context);
161
162
0
  if (!ServicePrincipalName)
163
0
  {
164
0
    context->ServicePrincipalName.Buffer = nullptr;
165
0
    context->ServicePrincipalName.Length = 0;
166
0
    return 1;
167
0
  }
168
169
0
  context->ServicePrincipalName.Length = (USHORT)(_wcslen(ServicePrincipalName) * 2);
170
0
  context->ServicePrincipalName.Buffer = (PWSTR)malloc(context->ServicePrincipalName.Length + 2);
171
172
0
  if (!context->ServicePrincipalName.Buffer)
173
0
    return -1;
174
175
0
  memcpy(context->ServicePrincipalName.Buffer, ServicePrincipalName,
176
0
         context->ServicePrincipalName.Length + 2);
177
0
  return 1;
178
0
}
179
180
static int ntlm_SetContextTargetName(NTLM_CONTEXT* context, char* TargetName)
181
0
{
182
0
  char* name = TargetName;
183
0
  DWORD nSize = 0;
184
0
  CHAR* computerName = nullptr;
185
186
0
  WINPR_ASSERT(context);
187
188
0
  if (!name)
189
0
  {
190
0
    if (GetComputerNameExA(ComputerNameNetBIOS, nullptr, &nSize) ||
191
0
        GetLastError() != ERROR_MORE_DATA)
192
0
      return -1;
193
194
0
    computerName = calloc(nSize, sizeof(CHAR));
195
196
0
    if (!computerName)
197
0
      return -1;
198
199
0
    if (!GetComputerNameExA(ComputerNameNetBIOS, computerName, &nSize))
200
0
    {
201
0
      free(computerName);
202
0
      return -1;
203
0
    }
204
205
0
    if (nSize > MAX_COMPUTERNAME_LENGTH)
206
0
      computerName[MAX_COMPUTERNAME_LENGTH] = '\0';
207
208
0
    name = computerName;
209
210
0
    if (!name)
211
0
      return -1;
212
213
0
    CharUpperA(name);
214
0
  }
215
216
0
  size_t len = 0;
217
0
  context->TargetName.pvBuffer = ConvertUtf8ToWCharAlloc(name, &len);
218
219
0
  if (!context->TargetName.pvBuffer || (len > UINT16_MAX / sizeof(WCHAR)))
220
0
  {
221
0
    free(context->TargetName.pvBuffer);
222
0
    context->TargetName.pvBuffer = nullptr;
223
224
0
    if (!TargetName)
225
0
      free(name);
226
227
0
    return -1;
228
0
  }
229
230
0
  context->TargetName.cbBuffer = (USHORT)(len * sizeof(WCHAR));
231
232
0
  if (!TargetName)
233
0
    free(name);
234
235
0
  return 1;
236
0
}
237
238
static NTLM_CONTEXT* ntlm_ContextNew(void)
239
0
{
240
0
  HKEY hKey = nullptr;
241
0
  DWORD dwType = 0;
242
0
  DWORD dwSize = 0;
243
0
  DWORD dwValue = 0;
244
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)calloc(1, sizeof(NTLM_CONTEXT));
245
246
0
  if (!context)
247
0
    return nullptr;
248
249
0
  context->NTLMv2 = TRUE;
250
0
  context->UseMIC = FALSE;
251
0
  context->SendVersionInfo = TRUE;
252
0
  context->SendSingleHostData = FALSE;
253
0
  context->SendWorkstationName = TRUE;
254
0
  context->NegotiateKeyExchange = TRUE;
255
0
  context->UseSamFileDatabase = TRUE;
256
257
0
  {
258
0
    char* key = winpr_getApplicatonDetailsRegKey(WINPR_KEY);
259
0
    if (key)
260
0
    {
261
0
      const LONG status =
262
0
          RegOpenKeyExA(HKEY_LOCAL_MACHINE, key, 0, KEY_READ | KEY_WOW64_64KEY, &hKey);
263
0
      free(key);
264
265
0
      if (status == ERROR_SUCCESS)
266
0
      {
267
0
        if (RegQueryValueEx(hKey, _T("NTLMv2"), nullptr, &dwType, (BYTE*)&dwValue,
268
0
                            &dwSize) == ERROR_SUCCESS)
269
0
          context->NTLMv2 = dwValue ? 1 : 0;
270
271
0
        if (RegQueryValueEx(hKey, _T("UseMIC"), nullptr, &dwType, (BYTE*)&dwValue,
272
0
                            &dwSize) == ERROR_SUCCESS)
273
0
          context->UseMIC = dwValue ? 1 : 0;
274
275
0
        if (RegQueryValueEx(hKey, _T("SendVersionInfo"), nullptr, &dwType, (BYTE*)&dwValue,
276
0
                            &dwSize) == ERROR_SUCCESS)
277
0
          context->SendVersionInfo = dwValue ? 1 : 0;
278
279
0
        if (RegQueryValueEx(hKey, _T("SendSingleHostData"), nullptr, &dwType,
280
0
                            (BYTE*)&dwValue, &dwSize) == ERROR_SUCCESS)
281
0
          context->SendSingleHostData = dwValue ? 1 : 0;
282
283
0
        if (RegQueryValueEx(hKey, _T("SendWorkstationName"), nullptr, &dwType,
284
0
                            (BYTE*)&dwValue, &dwSize) == ERROR_SUCCESS)
285
0
          context->SendWorkstationName = dwValue ? 1 : 0;
286
287
0
        if (RegQueryValueEx(hKey, _T("WorkstationName"), nullptr, &dwType, nullptr,
288
0
                            &dwSize) == ERROR_SUCCESS)
289
0
        {
290
0
          char* workstation = (char*)malloc(dwSize + 1);
291
292
0
          if (!workstation)
293
0
          {
294
0
            free(context);
295
0
            return nullptr;
296
0
          }
297
298
0
          const LONG rc = RegQueryValueExA(hKey, "WorkstationName", nullptr, &dwType,
299
0
                                           (BYTE*)workstation, &dwSize);
300
0
          if (rc != ERROR_SUCCESS)
301
0
            WLog_WARN(TAG, "Key ''WorkstationName' not found");
302
0
          workstation[dwSize] = '\0';
303
304
0
          if (ntlm_SetContextWorkstation(context, workstation) < 0)
305
0
          {
306
0
            free(workstation);
307
0
            free(context);
308
0
            return nullptr;
309
0
          }
310
311
0
          free(workstation);
312
0
        }
313
314
0
        RegCloseKey(hKey);
315
0
      }
316
0
    }
317
0
  }
318
319
  /*
320
   * Extended Protection is enabled by default in Windows 7,
321
   * but enabling it in WinPR breaks TS Gateway at this point
322
   */
323
0
  context->SuppressExtendedProtection = FALSE;
324
0
  const LONG status =
325
0
      RegOpenKeyEx(HKEY_LOCAL_MACHINE, _T("System\\CurrentControlSet\\Control\\LSA"), 0,
326
0
                   KEY_READ | KEY_WOW64_64KEY, &hKey);
327
328
0
  if (status == ERROR_SUCCESS)
329
0
  {
330
0
    if (RegQueryValueEx(hKey, _T("SuppressExtendedProtection"), nullptr, &dwType,
331
0
                        (BYTE*)&dwValue, &dwSize) == ERROR_SUCCESS)
332
0
      context->SuppressExtendedProtection = dwValue ? 1 : 0;
333
334
0
    RegCloseKey(hKey);
335
0
  }
336
337
0
  context->NegotiateFlags = 0;
338
0
  context->LmCompatibilityLevel = 3;
339
0
  ntlm_change_state(context, NTLM_STATE_INITIAL);
340
0
  FillMemory(context->MachineID, sizeof(context->MachineID), 0xAA);
341
342
0
  if (context->NTLMv2)
343
0
    context->UseMIC = TRUE;
344
345
0
  return context;
346
0
}
347
348
static void ntlm_ContextFree(NTLM_CONTEXT* context)
349
0
{
350
0
  if (!context)
351
0
    return;
352
353
0
  winpr_RC4_Free(context->SendRc4Seal);
354
0
  winpr_RC4_Free(context->RecvRc4Seal);
355
0
  sspi_SecBufferFree(&context->NegotiateMessage);
356
0
  sspi_SecBufferFree(&context->ChallengeMessage);
357
0
  sspi_SecBufferFree(&context->AuthenticateMessage);
358
0
  sspi_SecBufferFree(&context->ChallengeTargetInfo);
359
0
  sspi_SecBufferFree(&context->TargetName);
360
0
  sspi_SecBufferFree(&context->NtChallengeResponse);
361
0
  sspi_SecBufferFree(&context->LmChallengeResponse);
362
0
  free(context->ServicePrincipalName.Buffer);
363
0
  free(context->Workstation.Buffer);
364
365
  /* Zero sensitive key material before freeing the context */
366
0
  memset(context->NtlmHash, 0, sizeof(context->NtlmHash));
367
0
  memset(context->NtlmV2Hash, 0, sizeof(context->NtlmV2Hash));
368
0
  memset(context->SessionBaseKey, 0, sizeof(context->SessionBaseKey));
369
0
  memset(context->KeyExchangeKey, 0, sizeof(context->KeyExchangeKey));
370
0
  memset(context->RandomSessionKey, 0, sizeof(context->RandomSessionKey));
371
0
  memset(context->ExportedSessionKey, 0, sizeof(context->ExportedSessionKey));
372
0
  memset(context->EncryptedRandomSessionKey, 0, sizeof(context->EncryptedRandomSessionKey));
373
0
  memset(context->NtProofString, 0, sizeof(context->NtProofString));
374
0
  free(context);
375
0
}
376
377
static SECURITY_STATUS SEC_ENTRY ntlm_AcquireCredentialsHandleW(
378
    WINPR_ATTR_UNUSED SEC_WCHAR* pszPrincipal, WINPR_ATTR_UNUSED SEC_WCHAR* pszPackage,
379
    ULONG fCredentialUse, WINPR_ATTR_UNUSED void* pvLogonID, void* pAuthData,
380
    SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument, PCredHandle phCredential,
381
    WINPR_ATTR_UNUSED PTimeStamp ptsExpiry)
382
0
{
383
0
  SEC_WINPR_NTLM_SETTINGS* settings = nullptr;
384
385
0
  if ((fCredentialUse != SECPKG_CRED_OUTBOUND) && (fCredentialUse != SECPKG_CRED_INBOUND) &&
386
0
      (fCredentialUse != SECPKG_CRED_BOTH))
387
0
  {
388
0
    return SEC_E_INVALID_PARAMETER;
389
0
  }
390
391
0
  SSPI_CREDENTIALS* credentials = sspi_CredentialsNew();
392
393
0
  if (!credentials)
394
0
    return SEC_E_INTERNAL_ERROR;
395
396
0
  credentials->fCredentialUse = fCredentialUse;
397
0
  credentials->pGetKeyFn = pGetKeyFn;
398
0
  credentials->pvGetKeyArgument = pvGetKeyArgument;
399
400
0
  if (pAuthData)
401
0
  {
402
0
    UINT32 identityFlags = sspi_GetAuthIdentityFlags(pAuthData);
403
404
0
    if (sspi_CopyAuthIdentity(&(credentials->identity),
405
0
                              (const SEC_WINNT_AUTH_IDENTITY_INFO*)pAuthData) < 0)
406
0
    {
407
0
      sspi_CredentialsFree(credentials);
408
0
      return SEC_E_INVALID_PARAMETER;
409
0
    }
410
411
0
    if (identityFlags & SEC_WINNT_AUTH_IDENTITY_EXTENDED)
412
0
      settings = (((SEC_WINNT_AUTH_IDENTITY_WINPR*)pAuthData)->ntlmSettings);
413
0
  }
414
415
0
  if (settings)
416
0
  {
417
0
    if (settings->samFile)
418
0
    {
419
0
      credentials->ntlmSettings.samFile = _strdup(settings->samFile);
420
0
      if (!credentials->ntlmSettings.samFile)
421
0
      {
422
0
        sspi_CredentialsFree(credentials);
423
0
        return SEC_E_INSUFFICIENT_MEMORY;
424
0
      }
425
0
    }
426
0
    credentials->ntlmSettings.hashCallback = settings->hashCallback;
427
0
    credentials->ntlmSettings.hashCallbackArg = settings->hashCallbackArg;
428
0
  }
429
430
0
  sspi_SecureHandleSetLowerPointer(phCredential, (void*)credentials);
431
0
  sspi_SecureHandleSetUpperPointer(phCredential, (void*)NTLM_PACKAGE_NAME);
432
0
  return SEC_E_OK;
433
0
}
434
435
static SECURITY_STATUS SEC_ENTRY ntlm_AcquireCredentialsHandleA(
436
    SEC_CHAR* pszPrincipal, SEC_CHAR* pszPackage, ULONG fCredentialUse, void* pvLogonID,
437
    void* pAuthData, SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument, PCredHandle phCredential,
438
    PTimeStamp ptsExpiry)
439
0
{
440
0
  SECURITY_STATUS status = SEC_E_INSUFFICIENT_MEMORY;
441
0
  SEC_WCHAR* principal = nullptr;
442
0
  SEC_WCHAR* package = nullptr;
443
444
0
  if (pszPrincipal)
445
0
  {
446
0
    principal = ConvertUtf8ToWCharAlloc(pszPrincipal, nullptr);
447
0
    if (!principal)
448
0
      goto fail;
449
0
  }
450
0
  if (pszPackage)
451
0
  {
452
0
    package = ConvertUtf8ToWCharAlloc(pszPackage, nullptr);
453
0
    if (!package)
454
0
      goto fail;
455
0
  }
456
457
0
  status =
458
0
      ntlm_AcquireCredentialsHandleW(principal, package, fCredentialUse, pvLogonID, pAuthData,
459
0
                                     pGetKeyFn, pvGetKeyArgument, phCredential, ptsExpiry);
460
461
0
fail:
462
0
  free(principal);
463
0
  free(package);
464
465
0
  return status;
466
0
}
467
468
static SECURITY_STATUS SEC_ENTRY ntlm_FreeCredentialsHandle(PCredHandle phCredential)
469
0
{
470
0
  if (!phCredential)
471
0
    return SEC_E_INVALID_HANDLE;
472
473
0
  SSPI_CREDENTIALS* credentials =
474
0
      (SSPI_CREDENTIALS*)sspi_SecureHandleGetLowerPointer(phCredential);
475
0
  sspi_SecureHandleInvalidate(phCredential);
476
0
  if (!credentials)
477
0
    return SEC_E_INVALID_HANDLE;
478
479
0
  sspi_CredentialsFree(credentials);
480
0
  return SEC_E_OK;
481
0
}
482
483
static SECURITY_STATUS SEC_ENTRY ntlm_QueryCredentialsAttributesW(
484
    WINPR_ATTR_UNUSED PCredHandle phCredential, WINPR_ATTR_UNUSED ULONG ulAttribute,
485
    WINPR_ATTR_UNUSED void* pBuffer)
486
0
{
487
0
  if (ulAttribute == SECPKG_CRED_ATTR_NAMES)
488
0
  {
489
0
    return SEC_E_OK;
490
0
  }
491
492
0
  WLog_ERR(TAG, "TODO: Implement");
493
0
  return SEC_E_UNSUPPORTED_FUNCTION;
494
0
}
495
496
static SECURITY_STATUS SEC_ENTRY ntlm_QueryCredentialsAttributesA(PCredHandle phCredential,
497
                                                                  ULONG ulAttribute, void* pBuffer)
498
0
{
499
0
  return ntlm_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
500
0
}
501
502
/**
503
 * @see http://msdn.microsoft.com/en-us/library/windows/desktop/aa374707
504
 */
505
static SECURITY_STATUS SEC_ENTRY ntlm_AcceptSecurityContext(
506
    PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput, ULONG fContextReq,
507
    WINPR_ATTR_UNUSED ULONG TargetDataRep, PCtxtHandle phNewContext, PSecBufferDesc pOutput,
508
    WINPR_ATTR_UNUSED PULONG pfContextAttr, WINPR_ATTR_UNUSED PTimeStamp ptsTimeStamp)
509
0
{
510
0
  SECURITY_STATUS status = 0;
511
0
  SSPI_CREDENTIALS* credentials = nullptr;
512
0
  PSecBuffer input_buffer = nullptr;
513
0
  PSecBuffer output_buffer = nullptr;
514
515
  /* behave like windows SSPIs that don't want empty context */
516
0
  if (phContext && !phContext->dwLower && !phContext->dwUpper)
517
0
    return SEC_E_INVALID_HANDLE;
518
519
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
520
521
0
  if (!context)
522
0
  {
523
0
    context = ntlm_ContextNew();
524
525
0
    if (!context)
526
0
      return SEC_E_INSUFFICIENT_MEMORY;
527
528
0
    context->server = TRUE;
529
530
0
    if (fContextReq & ASC_REQ_CONFIDENTIALITY)
531
0
      context->confidentiality = TRUE;
532
533
0
    credentials = (SSPI_CREDENTIALS*)sspi_SecureHandleGetLowerPointer(phCredential);
534
0
    context->credentials = credentials;
535
0
    context->SamFile = credentials->ntlmSettings.samFile;
536
0
    context->HashCallback = credentials->ntlmSettings.hashCallback;
537
0
    context->HashCallbackArg = credentials->ntlmSettings.hashCallbackArg;
538
539
0
    ntlm_SetContextTargetName(context, nullptr);
540
0
    sspi_SecureHandleSetLowerPointer(phNewContext, context);
541
0
    sspi_SecureHandleSetUpperPointer(phNewContext, (void*)NTLM_PACKAGE_NAME);
542
0
  }
543
544
0
  switch (ntlm_get_state(context))
545
0
  {
546
0
    case NTLM_STATE_INITIAL:
547
0
    {
548
0
      ntlm_change_state(context, NTLM_STATE_NEGOTIATE);
549
550
0
      if (!pInput)
551
0
        return SEC_E_INVALID_TOKEN;
552
553
0
      if (pInput->cBuffers < 1)
554
0
        return SEC_E_INVALID_TOKEN;
555
556
0
      input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
557
558
0
      if (!input_buffer)
559
0
        return SEC_E_INVALID_TOKEN;
560
561
0
      if (input_buffer->cbBuffer < 1)
562
0
        return SEC_E_INVALID_TOKEN;
563
564
0
      status = ntlm_read_NegotiateMessage(context, input_buffer);
565
0
      if (status != SEC_I_CONTINUE_NEEDED)
566
0
        return status;
567
568
0
      if (ntlm_get_state(context) == NTLM_STATE_CHALLENGE)
569
0
      {
570
0
        if (!pOutput)
571
0
          return SEC_E_INVALID_TOKEN;
572
573
0
        if (pOutput->cBuffers < 1)
574
0
          return SEC_E_INVALID_TOKEN;
575
576
0
        output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
577
578
0
        if (!output_buffer->BufferType)
579
0
          return SEC_E_INVALID_TOKEN;
580
581
0
        if (output_buffer->cbBuffer < 1)
582
0
          return SEC_E_INSUFFICIENT_MEMORY;
583
584
0
        return ntlm_write_ChallengeMessage(context, output_buffer);
585
0
      }
586
587
0
      return SEC_E_OUT_OF_SEQUENCE;
588
0
    }
589
590
0
    case NTLM_STATE_AUTHENTICATE:
591
0
    {
592
0
      if (!pInput)
593
0
        return SEC_E_INVALID_TOKEN;
594
595
0
      if (pInput->cBuffers < 1)
596
0
        return SEC_E_INVALID_TOKEN;
597
598
0
      input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
599
600
0
      if (!input_buffer)
601
0
        return SEC_E_INVALID_TOKEN;
602
603
0
      if (input_buffer->cbBuffer < 1)
604
0
        return SEC_E_INVALID_TOKEN;
605
606
0
      status = ntlm_read_AuthenticateMessage(context, input_buffer);
607
608
0
      if (pOutput)
609
0
      {
610
0
        for (ULONG i = 0; i < pOutput->cBuffers; i++)
611
0
        {
612
0
          pOutput->pBuffers[i].cbBuffer = 0;
613
0
          pOutput->pBuffers[i].BufferType = SECBUFFER_TOKEN;
614
0
        }
615
0
      }
616
617
0
      return status;
618
0
    }
619
620
0
    default:
621
0
      return SEC_E_OUT_OF_SEQUENCE;
622
0
  }
623
0
}
624
625
static SECURITY_STATUS SEC_ENTRY
626
ntlm_ImpersonateSecurityContext(WINPR_ATTR_UNUSED PCtxtHandle phContext)
627
0
{
628
0
  return SEC_E_OK;
629
0
}
630
631
static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(
632
    PCredHandle phCredential, PCtxtHandle phContext, SEC_WCHAR* pszTargetName, ULONG fContextReq,
633
    WINPR_ATTR_UNUSED ULONG Reserved1, WINPR_ATTR_UNUSED ULONG TargetDataRep, PSecBufferDesc pInput,
634
    WINPR_ATTR_UNUSED ULONG Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput,
635
    WINPR_ATTR_UNUSED PULONG pfContextAttr, WINPR_ATTR_UNUSED PTimeStamp ptsExpiry)
636
0
{
637
0
  SECURITY_STATUS status = 0;
638
0
  SSPI_CREDENTIALS* credentials = nullptr;
639
0
  PSecBuffer input_buffer = nullptr;
640
0
  PSecBuffer output_buffer = nullptr;
641
642
  /* behave like windows SSPIs that don't want empty context */
643
0
  if (phContext && !phContext->dwLower && !phContext->dwUpper)
644
0
    return SEC_E_INVALID_HANDLE;
645
646
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
647
648
0
  if (pInput)
649
0
  {
650
0
    input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
651
0
  }
652
653
0
  if (!context)
654
0
  {
655
0
    context = ntlm_ContextNew();
656
657
0
    if (!context)
658
0
      return SEC_E_INSUFFICIENT_MEMORY;
659
660
0
    if (fContextReq & ISC_REQ_CONFIDENTIALITY)
661
0
      context->confidentiality = TRUE;
662
663
0
    credentials = (SSPI_CREDENTIALS*)sspi_SecureHandleGetLowerPointer(phCredential);
664
0
    context->credentials = credentials;
665
666
0
    if (context->Workstation.Length < 1)
667
0
    {
668
0
      if (ntlm_SetContextWorkstation(context, nullptr) < 0)
669
0
      {
670
0
        ntlm_ContextFree(context);
671
0
        return SEC_E_INTERNAL_ERROR;
672
0
      }
673
0
    }
674
675
0
    if (ntlm_SetContextServicePrincipalNameW(context, pszTargetName) < 0)
676
0
    {
677
0
      ntlm_ContextFree(context);
678
0
      return SEC_E_INTERNAL_ERROR;
679
0
    }
680
681
0
    sspi_SecureHandleSetLowerPointer(phNewContext, context);
682
0
    sspi_SecureHandleSetUpperPointer(phNewContext, NTLM_SSP_NAME);
683
0
  }
684
685
0
  if ((!input_buffer) || (ntlm_get_state(context) == NTLM_STATE_AUTHENTICATE))
686
0
  {
687
0
    if (!pOutput)
688
0
      return SEC_E_INVALID_TOKEN;
689
690
0
    if (pOutput->cBuffers < 1)
691
0
      return SEC_E_INVALID_TOKEN;
692
693
0
    output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
694
695
0
    if (!output_buffer)
696
0
      return SEC_E_INVALID_TOKEN;
697
698
0
    if (output_buffer->cbBuffer < 1)
699
0
      return SEC_E_INVALID_TOKEN;
700
701
0
    if (ntlm_get_state(context) == NTLM_STATE_INITIAL)
702
0
      ntlm_change_state(context, NTLM_STATE_NEGOTIATE);
703
704
0
    if (ntlm_get_state(context) == NTLM_STATE_NEGOTIATE)
705
0
      return ntlm_write_NegotiateMessage(context, output_buffer);
706
707
0
    return SEC_E_OUT_OF_SEQUENCE;
708
0
  }
709
0
  else
710
0
  {
711
0
    if (!input_buffer)
712
0
      return SEC_E_INVALID_TOKEN;
713
714
0
    if (input_buffer->cbBuffer < 1)
715
0
      return SEC_E_INVALID_TOKEN;
716
717
0
    PSecBuffer channel_bindings = sspi_FindSecBuffer(pInput, SECBUFFER_CHANNEL_BINDINGS);
718
719
0
    if (channel_bindings)
720
0
    {
721
0
      context->Bindings.BindingsLength = channel_bindings->cbBuffer;
722
0
      context->Bindings.Bindings = (SEC_CHANNEL_BINDINGS*)channel_bindings->pvBuffer;
723
0
    }
724
725
0
    if (ntlm_get_state(context) == NTLM_STATE_CHALLENGE)
726
0
    {
727
0
      status = ntlm_read_ChallengeMessage(context, input_buffer);
728
729
0
      if (status != SEC_I_CONTINUE_NEEDED)
730
0
        return status;
731
732
0
      if (!pOutput)
733
0
        return SEC_E_INVALID_TOKEN;
734
735
0
      if (pOutput->cBuffers < 1)
736
0
        return SEC_E_INVALID_TOKEN;
737
738
0
      output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
739
740
0
      if (!output_buffer)
741
0
        return SEC_E_INVALID_TOKEN;
742
743
0
      if (output_buffer->cbBuffer < 1)
744
0
        return SEC_E_INSUFFICIENT_MEMORY;
745
746
0
      if (ntlm_get_state(context) == NTLM_STATE_AUTHENTICATE)
747
0
        return ntlm_write_AuthenticateMessage(context, output_buffer);
748
0
    }
749
750
0
    return SEC_E_OUT_OF_SEQUENCE;
751
0
  }
752
753
0
  return SEC_E_OUT_OF_SEQUENCE;
754
0
}
755
756
/**
757
 * @see http://msdn.microsoft.com/en-us/library/windows/desktop/aa375512%28v=vs.85%29.aspx
758
 */
759
static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextA(
760
    PCredHandle phCredential, PCtxtHandle phContext, SEC_CHAR* pszTargetName, ULONG fContextReq,
761
    ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2,
762
    PCtxtHandle phNewContext, PSecBufferDesc pOutput, PULONG pfContextAttr, PTimeStamp ptsExpiry)
763
0
{
764
0
  SECURITY_STATUS status = 0;
765
0
  SEC_WCHAR* pszTargetNameW = nullptr;
766
767
0
  if (pszTargetName)
768
0
  {
769
0
    pszTargetNameW = ConvertUtf8ToWCharAlloc(pszTargetName, nullptr);
770
0
    if (!pszTargetNameW)
771
0
      return SEC_E_INTERNAL_ERROR;
772
0
  }
773
774
0
  status = ntlm_InitializeSecurityContextW(phCredential, phContext, pszTargetNameW, fContextReq,
775
0
                                           Reserved1, TargetDataRep, pInput, Reserved2,
776
0
                                           phNewContext, pOutput, pfContextAttr, ptsExpiry);
777
0
  free(pszTargetNameW);
778
0
  return status;
779
0
}
780
781
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa375354 */
782
783
static SECURITY_STATUS SEC_ENTRY ntlm_DeleteSecurityContext(PCtxtHandle phContext)
784
0
{
785
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
786
0
  sspi_SecureHandleInvalidate(phContext);
787
0
  ntlm_ContextFree(context);
788
0
  return SEC_E_OK;
789
0
}
790
791
SECURITY_STATUS ntlm_computeProofValue(NTLM_CONTEXT* ntlm, SecBuffer* ntproof)
792
0
{
793
0
  BYTE* blob = nullptr;
794
0
  SecBuffer* target = nullptr;
795
796
0
  WINPR_ASSERT(ntlm);
797
0
  WINPR_ASSERT(ntproof);
798
799
0
  target = &ntlm->ChallengeTargetInfo;
800
801
0
  if (!sspi_SecBufferAlloc(ntproof, 36 + target->cbBuffer))
802
0
    return SEC_E_INSUFFICIENT_MEMORY;
803
804
0
  blob = (BYTE*)ntproof->pvBuffer;
805
0
  CopyMemory(blob, ntlm->ServerChallenge, 8); /* Server challenge. */
806
0
  blob[8] = 1;                                /* Response version. */
807
0
  blob[9] = 1; /* Highest response version understood by the client. */
808
  /* Reserved 6B. */
809
0
  CopyMemory(&blob[16], ntlm->Timestamp, 8);       /* Time. */
810
0
  CopyMemory(&blob[24], ntlm->ClientChallenge, 8); /* Client challenge. */
811
  /* Reserved 4B. */
812
  /* Server name. */
813
0
  CopyMemory(&blob[36], target->pvBuffer, target->cbBuffer);
814
0
  return SEC_E_OK;
815
0
}
816
817
SECURITY_STATUS ntlm_computeMicValue(NTLM_CONTEXT* ntlm, SecBuffer* micvalue)
818
0
{
819
0
  BYTE* blob = nullptr;
820
0
  ULONG msgSize = 0;
821
822
0
  WINPR_ASSERT(ntlm);
823
0
  WINPR_ASSERT(micvalue);
824
825
0
  msgSize = ntlm->NegotiateMessage.cbBuffer + ntlm->ChallengeMessage.cbBuffer +
826
0
            ntlm->AuthenticateMessage.cbBuffer;
827
828
0
  if (!sspi_SecBufferAlloc(micvalue, msgSize))
829
0
    return SEC_E_INSUFFICIENT_MEMORY;
830
831
0
  blob = (BYTE*)micvalue->pvBuffer;
832
0
  CopyMemory(blob, ntlm->NegotiateMessage.pvBuffer, ntlm->NegotiateMessage.cbBuffer);
833
0
  blob += ntlm->NegotiateMessage.cbBuffer;
834
0
  CopyMemory(blob, ntlm->ChallengeMessage.pvBuffer, ntlm->ChallengeMessage.cbBuffer);
835
0
  blob += ntlm->ChallengeMessage.cbBuffer;
836
0
  CopyMemory(blob, ntlm->AuthenticateMessage.pvBuffer, ntlm->AuthenticateMessage.cbBuffer);
837
0
  blob += ntlm->MessageIntegrityCheckOffset;
838
0
  ZeroMemory(blob, 16);
839
0
  return SEC_E_OK;
840
0
}
841
842
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa379337/ */
843
844
static SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesW(PCtxtHandle phContext,
845
                                                              ULONG ulAttribute, void* pBuffer)
846
0
{
847
0
  if (!phContext)
848
0
    return SEC_E_INVALID_HANDLE;
849
850
0
  if (!pBuffer)
851
0
    return SEC_E_INSUFFICIENT_MEMORY;
852
853
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
854
0
  if (!check_context(context))
855
0
    return SEC_E_INVALID_HANDLE;
856
857
0
  if (ulAttribute == SECPKG_ATTR_SIZES)
858
0
  {
859
0
    SecPkgContext_Sizes* ContextSizes = (SecPkgContext_Sizes*)pBuffer;
860
0
    ContextSizes->cbMaxToken = 2010;
861
0
    ContextSizes->cbMaxSignature = 16;    /* the size of expected signature is 16 bytes */
862
0
    ContextSizes->cbBlockSize = 0;        /* no padding */
863
0
    ContextSizes->cbSecurityTrailer = 16; /* no security trailer appended in NTLM
864
                                contrary to Kerberos */
865
0
    return SEC_E_OK;
866
0
  }
867
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_IDENTITY)
868
0
  {
869
0
    SSPI_CREDENTIALS* credentials = nullptr;
870
0
    const SecPkgContext_AuthIdentity empty = WINPR_C_ARRAY_INIT;
871
0
    SecPkgContext_AuthIdentity* AuthIdentity = (SecPkgContext_AuthIdentity*)pBuffer;
872
873
0
    WINPR_ASSERT(AuthIdentity);
874
0
    *AuthIdentity = empty;
875
876
0
    context->UseSamFileDatabase = FALSE;
877
0
    credentials = context->credentials;
878
879
0
    if (credentials->identity.UserLength > 0)
880
0
    {
881
0
      if (ConvertWCharNToUtf8(credentials->identity.User, credentials->identity.UserLength,
882
0
                              AuthIdentity->User, ARRAYSIZE(AuthIdentity->User)) <= 0)
883
0
        return SEC_E_INTERNAL_ERROR;
884
0
    }
885
886
0
    if (credentials->identity.DomainLength > 0)
887
0
    {
888
0
      if (ConvertWCharNToUtf8(credentials->identity.Domain,
889
0
                              credentials->identity.DomainLength, AuthIdentity->Domain,
890
0
                              ARRAYSIZE(AuthIdentity->Domain)) <= 0)
891
0
        return SEC_E_INTERNAL_ERROR;
892
0
    }
893
894
0
    return SEC_E_OK;
895
0
  }
896
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_NTPROOF_VALUE)
897
0
  {
898
0
    return ntlm_computeProofValue(context, (SecBuffer*)pBuffer);
899
0
  }
900
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_RANDKEY)
901
0
  {
902
0
    SecBuffer* randkey = nullptr;
903
0
    randkey = (SecBuffer*)pBuffer;
904
905
0
    if (!sspi_SecBufferAlloc(randkey, 16))
906
0
      return (SEC_E_INSUFFICIENT_MEMORY);
907
908
0
    CopyMemory(randkey->pvBuffer, context->EncryptedRandomSessionKey, 16);
909
0
    return (SEC_E_OK);
910
0
  }
911
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_MIC)
912
0
  {
913
0
    SecBuffer* mic = (SecBuffer*)pBuffer;
914
0
    NTLM_AUTHENTICATE_MESSAGE* message = &context->AUTHENTICATE_MESSAGE;
915
916
0
    if (!sspi_SecBufferAlloc(mic, 16))
917
0
      return (SEC_E_INSUFFICIENT_MEMORY);
918
919
0
    CopyMemory(mic->pvBuffer, message->MessageIntegrityCheck, 16);
920
0
    return (SEC_E_OK);
921
0
  }
922
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_MIC_VALUE)
923
0
  {
924
0
    return ntlm_computeMicValue(context, (SecBuffer*)pBuffer);
925
0
  }
926
0
  else if (ulAttribute == SECPKG_ATTR_PACKAGE_INFO)
927
0
  {
928
0
    SecPkgContext_PackageInfo* PackageInfo = (SecPkgContext_PackageInfo*)pBuffer;
929
0
    size_t size = sizeof(SecPkgInfoA);
930
0
    SecPkgInfoA* pPackageInfo =
931
0
        (SecPkgInfoA*)sspi_ContextBufferAlloc(QuerySecurityPackageInfoIndex, size);
932
933
0
    if (!pPackageInfo)
934
0
      return SEC_E_INSUFFICIENT_MEMORY;
935
936
0
    pPackageInfo->fCapabilities = NTLM_SecPkgInfoA.fCapabilities;
937
0
    pPackageInfo->wVersion = NTLM_SecPkgInfoA.wVersion;
938
0
    pPackageInfo->wRPCID = NTLM_SecPkgInfoA.wRPCID;
939
0
    pPackageInfo->cbMaxToken = NTLM_SecPkgInfoA.cbMaxToken;
940
0
    pPackageInfo->Name = _strdup(NTLM_SecPkgInfoA.Name);
941
0
    pPackageInfo->Comment = _strdup(NTLM_SecPkgInfoA.Comment);
942
943
0
    if (!pPackageInfo->Name || !pPackageInfo->Comment)
944
0
    {
945
0
      sspi_ContextBufferFree(pPackageInfo);
946
0
      return SEC_E_INSUFFICIENT_MEMORY;
947
0
    }
948
0
    PackageInfo->PackageInfo = pPackageInfo;
949
0
    return SEC_E_OK;
950
0
  }
951
952
0
  WLog_ERR(TAG, "TODO: Implement ulAttribute=0x%08" PRIx32, ulAttribute);
953
0
  return SEC_E_UNSUPPORTED_FUNCTION;
954
0
}
955
956
static SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesA(PCtxtHandle phContext,
957
                                                              ULONG ulAttribute, void* pBuffer)
958
0
{
959
0
  return ntlm_QueryContextAttributesW(phContext, ulAttribute, pBuffer);
960
0
}
961
962
static SECURITY_STATUS SEC_ENTRY ntlm_SetContextAttributesW(PCtxtHandle phContext,
963
                                                            ULONG ulAttribute, void* pBuffer,
964
                                                            ULONG cbBuffer)
965
0
{
966
0
  if (!phContext)
967
0
    return SEC_E_INVALID_HANDLE;
968
969
0
  if (!pBuffer)
970
0
    return SEC_E_INVALID_PARAMETER;
971
972
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
973
0
  if (!context)
974
0
    return SEC_E_INVALID_HANDLE;
975
976
0
  if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_HASH)
977
0
  {
978
0
    SecPkgContext_AuthNtlmHash* AuthNtlmHash = (SecPkgContext_AuthNtlmHash*)pBuffer;
979
980
0
    if (cbBuffer < sizeof(SecPkgContext_AuthNtlmHash))
981
0
      return SEC_E_INVALID_PARAMETER;
982
983
0
    if (AuthNtlmHash->Version == 1)
984
0
      CopyMemory(context->NtlmHash, AuthNtlmHash->NtlmHash, 16);
985
0
    else if (AuthNtlmHash->Version == 2)
986
0
      CopyMemory(context->NtlmV2Hash, AuthNtlmHash->NtlmHash, 16);
987
988
0
    return SEC_E_OK;
989
0
  }
990
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_MESSAGE)
991
0
  {
992
0
    SecPkgContext_AuthNtlmMessage* AuthNtlmMessage = (SecPkgContext_AuthNtlmMessage*)pBuffer;
993
994
0
    if (cbBuffer < sizeof(SecPkgContext_AuthNtlmMessage))
995
0
      return SEC_E_INVALID_PARAMETER;
996
997
0
    if (AuthNtlmMessage->type == 1)
998
0
    {
999
0
      sspi_SecBufferFree(&context->NegotiateMessage);
1000
1001
0
      if (!sspi_SecBufferAlloc(&context->NegotiateMessage, AuthNtlmMessage->length))
1002
0
        return SEC_E_INSUFFICIENT_MEMORY;
1003
1004
0
      CopyMemory(context->NegotiateMessage.pvBuffer, AuthNtlmMessage->buffer,
1005
0
                 AuthNtlmMessage->length);
1006
0
    }
1007
0
    else if (AuthNtlmMessage->type == 2)
1008
0
    {
1009
0
      sspi_SecBufferFree(&context->ChallengeMessage);
1010
1011
0
      if (!sspi_SecBufferAlloc(&context->ChallengeMessage, AuthNtlmMessage->length))
1012
0
        return SEC_E_INSUFFICIENT_MEMORY;
1013
1014
0
      CopyMemory(context->ChallengeMessage.pvBuffer, AuthNtlmMessage->buffer,
1015
0
                 AuthNtlmMessage->length);
1016
0
    }
1017
0
    else if (AuthNtlmMessage->type == 3)
1018
0
    {
1019
0
      sspi_SecBufferFree(&context->AuthenticateMessage);
1020
1021
0
      if (!sspi_SecBufferAlloc(&context->AuthenticateMessage, AuthNtlmMessage->length))
1022
0
        return SEC_E_INSUFFICIENT_MEMORY;
1023
1024
0
      CopyMemory(context->AuthenticateMessage.pvBuffer, AuthNtlmMessage->buffer,
1025
0
                 AuthNtlmMessage->length);
1026
0
    }
1027
1028
0
    return SEC_E_OK;
1029
0
  }
1030
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_TIMESTAMP)
1031
0
  {
1032
0
    SecPkgContext_AuthNtlmTimestamp* AuthNtlmTimestamp =
1033
0
        (SecPkgContext_AuthNtlmTimestamp*)pBuffer;
1034
1035
0
    if (cbBuffer < sizeof(SecPkgContext_AuthNtlmTimestamp))
1036
0
      return SEC_E_INVALID_PARAMETER;
1037
1038
0
    if (AuthNtlmTimestamp->ChallengeOrResponse)
1039
0
      CopyMemory(context->ChallengeTimestamp, AuthNtlmTimestamp->Timestamp, 8);
1040
0
    else
1041
0
      CopyMemory(context->Timestamp, AuthNtlmTimestamp->Timestamp, 8);
1042
1043
0
    return SEC_E_OK;
1044
0
  }
1045
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_CLIENT_CHALLENGE)
1046
0
  {
1047
0
    SecPkgContext_AuthNtlmClientChallenge* AuthNtlmClientChallenge =
1048
0
        (SecPkgContext_AuthNtlmClientChallenge*)pBuffer;
1049
1050
0
    if (cbBuffer < sizeof(SecPkgContext_AuthNtlmClientChallenge))
1051
0
      return SEC_E_INVALID_PARAMETER;
1052
1053
0
    CopyMemory(context->ClientChallenge, AuthNtlmClientChallenge->ClientChallenge, 8);
1054
0
    return SEC_E_OK;
1055
0
  }
1056
0
  else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_SERVER_CHALLENGE)
1057
0
  {
1058
0
    SecPkgContext_AuthNtlmServerChallenge* AuthNtlmServerChallenge =
1059
0
        (SecPkgContext_AuthNtlmServerChallenge*)pBuffer;
1060
1061
0
    if (cbBuffer < sizeof(SecPkgContext_AuthNtlmServerChallenge))
1062
0
      return SEC_E_INVALID_PARAMETER;
1063
1064
0
    CopyMemory(context->ServerChallenge, AuthNtlmServerChallenge->ServerChallenge, 8);
1065
0
    return SEC_E_OK;
1066
0
  }
1067
1068
0
  WLog_ERR(TAG, "TODO: Implement ulAttribute=%08" PRIx32, ulAttribute);
1069
0
  return SEC_E_UNSUPPORTED_FUNCTION;
1070
0
}
1071
1072
static SECURITY_STATUS SEC_ENTRY ntlm_SetContextAttributesA(PCtxtHandle phContext,
1073
                                                            ULONG ulAttribute, void* pBuffer,
1074
                                                            ULONG cbBuffer)
1075
0
{
1076
0
  return ntlm_SetContextAttributesW(phContext, ulAttribute, pBuffer, cbBuffer);
1077
0
}
1078
1079
static SECURITY_STATUS SEC_ENTRY ntlm_SetCredentialsAttributesW(
1080
    WINPR_ATTR_UNUSED PCredHandle phCredential, WINPR_ATTR_UNUSED ULONG ulAttribute,
1081
    WINPR_ATTR_UNUSED void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1082
0
{
1083
0
  return SEC_E_UNSUPPORTED_FUNCTION;
1084
0
}
1085
1086
static SECURITY_STATUS SEC_ENTRY ntlm_SetCredentialsAttributesA(
1087
    WINPR_ATTR_UNUSED PCredHandle phCredential, WINPR_ATTR_UNUSED ULONG ulAttribute,
1088
    WINPR_ATTR_UNUSED void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1089
0
{
1090
0
  return SEC_E_UNSUPPORTED_FUNCTION;
1091
0
}
1092
1093
static SECURITY_STATUS SEC_ENTRY ntlm_RevertSecurityContext(WINPR_ATTR_UNUSED PCtxtHandle phContext)
1094
0
{
1095
0
  return SEC_E_OK;
1096
0
}
1097
1098
static SECURITY_STATUS SEC_ENTRY ntlm_EncryptMessage(PCtxtHandle phContext,
1099
                                                     WINPR_ATTR_UNUSED ULONG fQOP,
1100
                                                     PSecBufferDesc pMessage, ULONG MessageSeqNo)
1101
0
{
1102
0
  const UINT32 SeqNo = MessageSeqNo;
1103
0
  UINT32 value = 0;
1104
0
  BYTE digest[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
1105
0
  BYTE checksum[8] = WINPR_C_ARRAY_INIT;
1106
0
  ULONG version = 1;
1107
0
  PSecBuffer data_buffer = nullptr;
1108
0
  PSecBuffer signature_buffer = nullptr;
1109
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
1110
0
  if (!check_context(context))
1111
0
    return SEC_E_INVALID_HANDLE;
1112
1113
0
  for (ULONG index = 0; index < pMessage->cBuffers; index++)
1114
0
  {
1115
0
    SecBuffer* cur = &pMessage->pBuffers[index];
1116
1117
0
    if (cur->BufferType & SECBUFFER_DATA)
1118
0
      data_buffer = cur;
1119
0
    else if (cur->BufferType & SECBUFFER_TOKEN)
1120
0
      signature_buffer = cur;
1121
0
  }
1122
1123
0
  if (!data_buffer)
1124
0
    return SEC_E_INVALID_TOKEN;
1125
1126
0
  if (!signature_buffer)
1127
0
    return SEC_E_INVALID_TOKEN;
1128
1129
  /* Copy original data buffer */
1130
0
  ULONG length = data_buffer->cbBuffer;
1131
0
  void* data = malloc(length);
1132
1133
0
  if (!data)
1134
0
    return SEC_E_INSUFFICIENT_MEMORY;
1135
1136
0
  CopyMemory(data, data_buffer->pvBuffer, length);
1137
  /* Compute the HMAC-MD5 hash of ConcatenationOf(seq_num,data) using the client signing key */
1138
0
  WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
1139
1140
0
  BOOL success = FALSE;
1141
0
  {
1142
0
    if (!hmac)
1143
0
      goto hmac_fail;
1144
0
    if (!winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->SendSigningKey, WINPR_MD5_DIGEST_LENGTH))
1145
0
      goto hmac_fail;
1146
1147
0
    winpr_Data_Write_UINT32(&value, SeqNo);
1148
1149
0
    if (!winpr_HMAC_Update(hmac, (void*)&value, 4))
1150
0
      goto hmac_fail;
1151
0
    if (!winpr_HMAC_Update(hmac, data, length))
1152
0
      goto hmac_fail;
1153
0
    if (!winpr_HMAC_Final(hmac, digest, WINPR_MD5_DIGEST_LENGTH))
1154
0
      goto hmac_fail;
1155
0
  }
1156
1157
0
  success = TRUE;
1158
1159
0
hmac_fail:
1160
0
  winpr_HMAC_Free(hmac);
1161
0
  if (!success)
1162
0
  {
1163
0
    free(data);
1164
0
    return SEC_E_INSUFFICIENT_MEMORY;
1165
0
  }
1166
1167
  /* Encrypt message using with RC4, result overwrites original buffer */
1168
0
  if ((data_buffer->BufferType & SECBUFFER_READONLY) == 0)
1169
0
  {
1170
0
    if (context->confidentiality)
1171
0
    {
1172
0
      if (!winpr_RC4_Update(context->SendRc4Seal, length, (BYTE*)data,
1173
0
                            (BYTE*)data_buffer->pvBuffer))
1174
0
      {
1175
0
        free(data);
1176
0
        return SEC_E_INSUFFICIENT_MEMORY;
1177
0
      }
1178
0
    }
1179
0
    else
1180
0
      CopyMemory(data_buffer->pvBuffer, data, length);
1181
0
  }
1182
1183
#ifdef WITH_DEBUG_NTLM
1184
  WLog_DBG(TAG, "Data Buffer (length = %" PRIu32 ")", length);
1185
  winpr_HexDump(TAG, WLOG_DEBUG, data, length);
1186
  WLog_DBG(TAG, "Encrypted Data Buffer (length = %" PRIu32 ")", data_buffer->cbBuffer);
1187
  winpr_HexDump(TAG, WLOG_DEBUG, data_buffer->pvBuffer, data_buffer->cbBuffer);
1188
#endif
1189
0
  free(data);
1190
  /* RC4-encrypt first 8 bytes of digest */
1191
0
  if (!winpr_RC4_Update(context->SendRc4Seal, 8, digest, checksum))
1192
0
    return SEC_E_INSUFFICIENT_MEMORY;
1193
0
  if ((signature_buffer->BufferType & SECBUFFER_READONLY) == 0)
1194
0
  {
1195
0
    BYTE* signature = signature_buffer->pvBuffer;
1196
    /* Concatenate version, ciphertext and sequence number to build signature */
1197
0
    winpr_Data_Write_UINT32(signature, version);
1198
0
    CopyMemory(&signature[4], (void*)checksum, 8);
1199
0
    winpr_Data_Write_UINT32(&signature[12], SeqNo);
1200
0
  }
1201
0
  context->SendSeqNum++;
1202
#ifdef WITH_DEBUG_NTLM
1203
  WLog_DBG(TAG, "Signature (length = %" PRIu32 ")", signature_buffer->cbBuffer);
1204
  winpr_HexDump(TAG, WLOG_DEBUG, signature_buffer->pvBuffer, signature_buffer->cbBuffer);
1205
#endif
1206
0
  return SEC_E_OK;
1207
0
}
1208
1209
static SECURITY_STATUS SEC_ENTRY ntlm_DecryptMessage(PCtxtHandle phContext, PSecBufferDesc pMessage,
1210
                                                     ULONG MessageSeqNo,
1211
                                                     WINPR_ATTR_UNUSED PULONG pfQOP)
1212
0
{
1213
0
  const UINT32 SeqNo = (UINT32)MessageSeqNo;
1214
0
  UINT32 value = 0;
1215
0
  BYTE digest[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
1216
0
  BYTE checksum[8] = WINPR_C_ARRAY_INIT;
1217
0
  UINT32 version = 1;
1218
0
  BYTE expected_signature[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
1219
0
  PSecBuffer data_buffer = nullptr;
1220
0
  PSecBuffer signature_buffer = nullptr;
1221
0
  NTLM_CONTEXT* context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
1222
0
  if (!check_context(context))
1223
0
    return SEC_E_INVALID_HANDLE;
1224
1225
0
  for (ULONG index = 0; index < pMessage->cBuffers; index++)
1226
0
  {
1227
0
    if (pMessage->pBuffers[index].BufferType == SECBUFFER_DATA)
1228
0
      data_buffer = &pMessage->pBuffers[index];
1229
0
    else if (pMessage->pBuffers[index].BufferType == SECBUFFER_TOKEN)
1230
0
      signature_buffer = &pMessage->pBuffers[index];
1231
0
  }
1232
1233
0
  if (!data_buffer)
1234
0
    return SEC_E_INVALID_TOKEN;
1235
1236
0
  if (!signature_buffer)
1237
0
    return SEC_E_INVALID_TOKEN;
1238
1239
  /* Copy original data buffer */
1240
0
  const ULONG length = data_buffer->cbBuffer;
1241
0
  void* data = malloc(length);
1242
1243
0
  if (!data)
1244
0
    return SEC_E_INSUFFICIENT_MEMORY;
1245
1246
0
  CopyMemory(data, data_buffer->pvBuffer, length);
1247
1248
  /* Decrypt message using with RC4, result overwrites original buffer */
1249
1250
0
  if (context->confidentiality)
1251
0
  {
1252
0
    if (!winpr_RC4_Update(context->RecvRc4Seal, length, (BYTE*)data,
1253
0
                          (BYTE*)data_buffer->pvBuffer))
1254
0
    {
1255
0
      free(data);
1256
0
      return SEC_E_INSUFFICIENT_MEMORY;
1257
0
    }
1258
0
  }
1259
0
  else
1260
0
    CopyMemory(data_buffer->pvBuffer, data, length);
1261
1262
  /* Compute the HMAC-MD5 hash of ConcatenationOf(seq_num,data) using the client signing key */
1263
0
  WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
1264
1265
0
  BOOL success = FALSE;
1266
0
  {
1267
0
    if (!hmac)
1268
0
      goto hmac_fail;
1269
1270
0
    if (!winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->RecvSigningKey, WINPR_MD5_DIGEST_LENGTH))
1271
0
      goto hmac_fail;
1272
1273
0
    winpr_Data_Write_UINT32(&value, SeqNo);
1274
1275
0
    if (!winpr_HMAC_Update(hmac, (void*)&value, 4))
1276
0
      goto hmac_fail;
1277
0
    if (!winpr_HMAC_Update(hmac, data_buffer->pvBuffer, data_buffer->cbBuffer))
1278
0
      goto hmac_fail;
1279
0
    if (!winpr_HMAC_Final(hmac, digest, WINPR_MD5_DIGEST_LENGTH))
1280
0
      goto hmac_fail;
1281
1282
0
    success = TRUE;
1283
0
  }
1284
0
hmac_fail:
1285
0
  winpr_HMAC_Free(hmac);
1286
0
  if (!success)
1287
0
  {
1288
0
    free(data);
1289
0
    return SEC_E_INSUFFICIENT_MEMORY;
1290
0
  }
1291
1292
#ifdef WITH_DEBUG_NTLM
1293
  WLog_DBG(TAG, "Encrypted Data Buffer (length = %" PRIu32 ")", length);
1294
  winpr_HexDump(TAG, WLOG_DEBUG, data, length);
1295
  WLog_DBG(TAG, "Data Buffer (length = %" PRIu32 ")", data_buffer->cbBuffer);
1296
  winpr_HexDump(TAG, WLOG_DEBUG, data_buffer->pvBuffer, data_buffer->cbBuffer);
1297
#endif
1298
0
  free(data);
1299
  /* RC4-encrypt first 8 bytes of digest */
1300
0
  if (!winpr_RC4_Update(context->RecvRc4Seal, 8, digest, checksum))
1301
0
    return SEC_E_MESSAGE_ALTERED;
1302
1303
  /* Concatenate version, ciphertext and sequence number to build signature */
1304
0
  winpr_Data_Write_UINT32(expected_signature, version);
1305
0
  CopyMemory(&expected_signature[4], (void*)checksum, 8);
1306
0
  winpr_Data_Write_UINT32(&expected_signature[12], SeqNo);
1307
0
  context->RecvSeqNum++;
1308
1309
0
  if (memcmp(signature_buffer->pvBuffer, expected_signature, 16) != 0)
1310
0
  {
1311
    /* signature verification failed! */
1312
0
    WLog_ERR(TAG, "signature verification failed, something nasty is going on!");
1313
#ifdef WITH_DEBUG_NTLM
1314
    WLog_ERR(TAG, "Expected Signature:");
1315
    winpr_HexDump(TAG, WLOG_ERROR, expected_signature, 16);
1316
    WLog_ERR(TAG, "Actual Signature:");
1317
    winpr_HexDump(TAG, WLOG_ERROR, (BYTE*)signature_buffer->pvBuffer, 16);
1318
#endif
1319
0
    return SEC_E_MESSAGE_ALTERED;
1320
0
  }
1321
1322
0
  return SEC_E_OK;
1323
0
}
1324
1325
static SECURITY_STATUS SEC_ENTRY ntlm_MakeSignature(PCtxtHandle phContext,
1326
                                                    WINPR_ATTR_UNUSED ULONG fQOP,
1327
                                                    PSecBufferDesc pMessage, ULONG MessageSeqNo)
1328
0
{
1329
0
  SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
1330
0
  PSecBuffer data_buffer = nullptr;
1331
0
  PSecBuffer sig_buffer = nullptr;
1332
0
  UINT32 seq_no = 0;
1333
0
  BYTE digest[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
1334
0
  BYTE checksum[8] = WINPR_C_ARRAY_INIT;
1335
1336
0
  NTLM_CONTEXT* context = sspi_SecureHandleGetLowerPointer(phContext);
1337
0
  if (!check_context(context))
1338
0
    return SEC_E_INVALID_HANDLE;
1339
1340
0
  for (ULONG i = 0; i < pMessage->cBuffers; i++)
1341
0
  {
1342
0
    if (pMessage->pBuffers[i].BufferType == SECBUFFER_DATA)
1343
0
      data_buffer = &pMessage->pBuffers[i];
1344
0
    else if (pMessage->pBuffers[i].BufferType == SECBUFFER_TOKEN)
1345
0
      sig_buffer = &pMessage->pBuffers[i];
1346
0
  }
1347
1348
0
  if (!data_buffer || !sig_buffer)
1349
0
    return SEC_E_INVALID_TOKEN;
1350
1351
0
  WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
1352
1353
0
  if (!winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->SendSigningKey, WINPR_MD5_DIGEST_LENGTH))
1354
0
    goto fail;
1355
1356
0
  winpr_Data_Write_UINT32(&seq_no, MessageSeqNo);
1357
0
  if (!winpr_HMAC_Update(hmac, (BYTE*)&seq_no, 4))
1358
0
    goto fail;
1359
0
  if (!winpr_HMAC_Update(hmac, data_buffer->pvBuffer, data_buffer->cbBuffer))
1360
0
    goto fail;
1361
0
  if (!winpr_HMAC_Final(hmac, digest, WINPR_MD5_DIGEST_LENGTH))
1362
0
    goto fail;
1363
1364
0
  if (!winpr_RC4_Update(context->SendRc4Seal, 8, digest, checksum))
1365
0
    goto fail;
1366
1367
0
  BYTE* signature = sig_buffer->pvBuffer;
1368
0
  winpr_Data_Write_UINT32(signature, 1L);
1369
0
  CopyMemory(&signature[4], checksum, 8);
1370
0
  winpr_Data_Write_UINT32(&signature[12], seq_no);
1371
0
  sig_buffer->cbBuffer = 16;
1372
1373
0
  status = SEC_E_OK;
1374
1375
0
fail:
1376
0
  winpr_HMAC_Free(hmac);
1377
0
  return status;
1378
0
}
1379
1380
static SECURITY_STATUS SEC_ENTRY ntlm_VerifySignature(PCtxtHandle phContext,
1381
                                                      PSecBufferDesc pMessage, ULONG MessageSeqNo,
1382
                                                      WINPR_ATTR_UNUSED PULONG pfQOP)
1383
0
{
1384
0
  SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
1385
0
  PSecBuffer data_buffer = nullptr;
1386
0
  PSecBuffer sig_buffer = nullptr;
1387
0
  UINT32 seq_no = 0;
1388
0
  BYTE digest[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
1389
0
  BYTE checksum[8] = WINPR_C_ARRAY_INIT;
1390
0
  BYTE signature[16] = WINPR_C_ARRAY_INIT;
1391
1392
0
  NTLM_CONTEXT* context = sspi_SecureHandleGetLowerPointer(phContext);
1393
0
  if (!check_context(context))
1394
0
    return SEC_E_INVALID_HANDLE;
1395
1396
0
  for (ULONG i = 0; i < pMessage->cBuffers; i++)
1397
0
  {
1398
0
    if (pMessage->pBuffers[i].BufferType == SECBUFFER_DATA)
1399
0
      data_buffer = &pMessage->pBuffers[i];
1400
0
    else if (pMessage->pBuffers[i].BufferType == SECBUFFER_TOKEN)
1401
0
      sig_buffer = &pMessage->pBuffers[i];
1402
0
  }
1403
1404
0
  if (!data_buffer || !sig_buffer)
1405
0
    return SEC_E_INVALID_TOKEN;
1406
1407
0
  WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
1408
1409
0
  if (!winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->RecvSigningKey, WINPR_MD5_DIGEST_LENGTH))
1410
0
    goto fail;
1411
1412
0
  winpr_Data_Write_UINT32(&seq_no, MessageSeqNo);
1413
0
  if (!winpr_HMAC_Update(hmac, (BYTE*)&seq_no, 4))
1414
0
    goto fail;
1415
0
  if (!winpr_HMAC_Update(hmac, data_buffer->pvBuffer, data_buffer->cbBuffer))
1416
0
    goto fail;
1417
0
  if (!winpr_HMAC_Final(hmac, digest, WINPR_MD5_DIGEST_LENGTH))
1418
0
    goto fail;
1419
1420
0
  if (!winpr_RC4_Update(context->RecvRc4Seal, 8, digest, checksum))
1421
0
    goto fail;
1422
1423
0
  winpr_Data_Write_UINT32(signature, 1L);
1424
0
  CopyMemory(&signature[4], checksum, 8);
1425
0
  winpr_Data_Write_UINT32(&signature[12], seq_no);
1426
1427
0
  status = SEC_E_OK;
1428
0
  if (memcmp(sig_buffer->pvBuffer, signature, 16) != 0)
1429
0
    status = SEC_E_MESSAGE_ALTERED;
1430
1431
0
fail:
1432
0
  winpr_HMAC_Free(hmac);
1433
0
  return status;
1434
0
}
1435
1436
const SecurityFunctionTableA NTLM_SecurityFunctionTableA = {
1437
  3,                                /* dwVersion */
1438
  nullptr,                          /* EnumerateSecurityPackages */
1439
  ntlm_QueryCredentialsAttributesA, /* QueryCredentialsAttributes */
1440
  ntlm_AcquireCredentialsHandleA,   /* AcquireCredentialsHandle */
1441
  ntlm_FreeCredentialsHandle,       /* FreeCredentialsHandle */
1442
  nullptr,                          /* Reserved2 */
1443
  ntlm_InitializeSecurityContextA,  /* InitializeSecurityContext */
1444
  ntlm_AcceptSecurityContext,       /* AcceptSecurityContext */
1445
  nullptr,                          /* CompleteAuthToken */
1446
  ntlm_DeleteSecurityContext,       /* DeleteSecurityContext */
1447
  nullptr,                          /* ApplyControlToken */
1448
  ntlm_QueryContextAttributesA,     /* QueryContextAttributes */
1449
  ntlm_ImpersonateSecurityContext,  /* ImpersonateSecurityContext */
1450
  ntlm_RevertSecurityContext,       /* RevertSecurityContext */
1451
  ntlm_MakeSignature,               /* MakeSignature */
1452
  ntlm_VerifySignature,             /* VerifySignature */
1453
  nullptr,                          /* FreeContextBuffer */
1454
  nullptr,                          /* QuerySecurityPackageInfo */
1455
  nullptr,                          /* Reserved3 */
1456
  nullptr,                          /* Reserved4 */
1457
  nullptr,                          /* ExportSecurityContext */
1458
  nullptr,                          /* ImportSecurityContext */
1459
  nullptr,                          /* AddCredentials */
1460
  nullptr,                          /* Reserved8 */
1461
  nullptr,                          /* QuerySecurityContextToken */
1462
  ntlm_EncryptMessage,              /* EncryptMessage */
1463
  ntlm_DecryptMessage,              /* DecryptMessage */
1464
  ntlm_SetContextAttributesA,       /* SetContextAttributes */
1465
  ntlm_SetCredentialsAttributesA,   /* SetCredentialsAttributes */
1466
};
1467
1468
const SecurityFunctionTableW NTLM_SecurityFunctionTableW = {
1469
  3,                                /* dwVersion */
1470
  nullptr,                          /* EnumerateSecurityPackages */
1471
  ntlm_QueryCredentialsAttributesW, /* QueryCredentialsAttributes */
1472
  ntlm_AcquireCredentialsHandleW,   /* AcquireCredentialsHandle */
1473
  ntlm_FreeCredentialsHandle,       /* FreeCredentialsHandle */
1474
  nullptr,                          /* Reserved2 */
1475
  ntlm_InitializeSecurityContextW,  /* InitializeSecurityContext */
1476
  ntlm_AcceptSecurityContext,       /* AcceptSecurityContext */
1477
  nullptr,                          /* CompleteAuthToken */
1478
  ntlm_DeleteSecurityContext,       /* DeleteSecurityContext */
1479
  nullptr,                          /* ApplyControlToken */
1480
  ntlm_QueryContextAttributesW,     /* QueryContextAttributes */
1481
  ntlm_ImpersonateSecurityContext,  /* ImpersonateSecurityContext */
1482
  ntlm_RevertSecurityContext,       /* RevertSecurityContext */
1483
  ntlm_MakeSignature,               /* MakeSignature */
1484
  ntlm_VerifySignature,             /* VerifySignature */
1485
  nullptr,                          /* FreeContextBuffer */
1486
  nullptr,                          /* QuerySecurityPackageInfo */
1487
  nullptr,                          /* Reserved3 */
1488
  nullptr,                          /* Reserved4 */
1489
  nullptr,                          /* ExportSecurityContext */
1490
  nullptr,                          /* ImportSecurityContext */
1491
  nullptr,                          /* AddCredentials */
1492
  nullptr,                          /* Reserved8 */
1493
  nullptr,                          /* QuerySecurityContextToken */
1494
  ntlm_EncryptMessage,              /* EncryptMessage */
1495
  ntlm_DecryptMessage,              /* DecryptMessage */
1496
  ntlm_SetContextAttributesW,       /* SetContextAttributes */
1497
  ntlm_SetCredentialsAttributesW,   /* SetCredentialsAttributes */
1498
};
1499
1500
const SecPkgInfoA NTLM_SecPkgInfoA = {
1501
  0x00082B37,             /* fCapabilities */
1502
  1,                      /* wVersion */
1503
  0x000A,                 /* wRPCID */
1504
  0x00000B48,             /* cbMaxToken */
1505
  "NTLM",                 /* Name */
1506
  "NTLM Security Package" /* Comment */
1507
};
1508
1509
static WCHAR NTLM_SecPkgInfoW_NameBuffer[32] = WINPR_C_ARRAY_INIT;
1510
static WCHAR NTLM_SecPkgInfoW_CommentBuffer[32] = WINPR_C_ARRAY_INIT;
1511
1512
const SecPkgInfoW NTLM_SecPkgInfoW = {
1513
  0x00082B37,                    /* fCapabilities */
1514
  1,                             /* wVersion */
1515
  0x000A,                        /* wRPCID */
1516
  0x00000B48,                    /* cbMaxToken */
1517
  NTLM_SecPkgInfoW_NameBuffer,   /* Name */
1518
  NTLM_SecPkgInfoW_CommentBuffer /* Comment */
1519
};
1520
1521
char* ntlm_negotiate_flags_string(char* buffer, size_t size, UINT32 flags)
1522
0
{
1523
0
  if (!buffer || (size == 0))
1524
0
    return buffer;
1525
1526
0
  (void)_snprintf(buffer, size, "[0x%08" PRIx32 "] ", flags);
1527
1528
0
  for (int x = 0; x < 31; x++)
1529
0
  {
1530
0
    const UINT32 mask = 1u << x;
1531
0
    size_t len = strnlen(buffer, size);
1532
0
    if (flags & mask)
1533
0
    {
1534
0
      const char* str = ntlm_get_negotiate_string(mask);
1535
0
      const size_t flen = strlen(str);
1536
1537
0
      if ((len > 0) && (buffer[len - 1] != ' '))
1538
0
      {
1539
0
        if (size - len < 1)
1540
0
          break;
1541
0
        winpr_str_append("|", buffer, size, nullptr);
1542
0
        len++;
1543
0
      }
1544
1545
0
      if (size - len < flen)
1546
0
        break;
1547
0
      winpr_str_append(str, buffer, size, nullptr);
1548
0
    }
1549
0
  }
1550
1551
0
  return buffer;
1552
0
}
1553
1554
const char* ntlm_message_type_string(UINT32 messageType)
1555
0
{
1556
0
  switch (messageType)
1557
0
  {
1558
0
    case MESSAGE_TYPE_NEGOTIATE:
1559
0
      return "MESSAGE_TYPE_NEGOTIATE";
1560
0
    case MESSAGE_TYPE_CHALLENGE:
1561
0
      return "MESSAGE_TYPE_CHALLENGE";
1562
0
    case MESSAGE_TYPE_AUTHENTICATE:
1563
0
      return "MESSAGE_TYPE_AUTHENTICATE";
1564
0
    default:
1565
0
      return "MESSAGE_TYPE_UNKNOWN";
1566
0
  }
1567
0
}
1568
1569
const char* ntlm_state_string(NTLM_STATE state)
1570
0
{
1571
0
  switch (state)
1572
0
  {
1573
0
    case NTLM_STATE_INITIAL:
1574
0
      return "NTLM_STATE_INITIAL";
1575
0
    case NTLM_STATE_NEGOTIATE:
1576
0
      return "NTLM_STATE_NEGOTIATE";
1577
0
    case NTLM_STATE_CHALLENGE:
1578
0
      return "NTLM_STATE_CHALLENGE";
1579
0
    case NTLM_STATE_AUTHENTICATE:
1580
0
      return "NTLM_STATE_AUTHENTICATE";
1581
0
    case NTLM_STATE_FINAL:
1582
0
      return "NTLM_STATE_FINAL";
1583
0
    default:
1584
0
      return "NTLM_STATE_UNKNOWN";
1585
0
  }
1586
0
}
1587
void ntlm_change_state(NTLM_CONTEXT* ntlm, NTLM_STATE state)
1588
0
{
1589
0
  WINPR_ASSERT(ntlm);
1590
0
  WLog_DBG(TAG, "change state from %s to %s", ntlm_state_string(ntlm->state),
1591
0
           ntlm_state_string(state));
1592
0
  ntlm->state = state;
1593
0
}
1594
1595
NTLM_STATE ntlm_get_state(NTLM_CONTEXT* ntlm)
1596
0
{
1597
0
  WINPR_ASSERT(ntlm);
1598
0
  return ntlm->state;
1599
0
}
1600
1601
BOOL ntlm_reset_cipher_state(PSecHandle phContext)
1602
0
{
1603
0
  NTLM_CONTEXT* context = sspi_SecureHandleGetLowerPointer(phContext);
1604
1605
0
  if (context)
1606
0
  {
1607
0
    check_context(context);
1608
0
    winpr_RC4_Free(context->SendRc4Seal);
1609
0
    winpr_RC4_Free(context->RecvRc4Seal);
1610
0
    context->SendRc4Seal = winpr_RC4_New(context->RecvSealingKey, 16);
1611
0
    context->RecvRc4Seal = winpr_RC4_New(context->SendSealingKey, 16);
1612
1613
0
    if (!context->SendRc4Seal)
1614
0
    {
1615
0
      WLog_ERR(TAG, "Failed to allocate context->SendRc4Seal");
1616
0
      return FALSE;
1617
0
    }
1618
0
    if (!context->RecvRc4Seal)
1619
0
    {
1620
0
      WLog_ERR(TAG, "Failed to allocate context->RecvRc4Seal");
1621
0
      return FALSE;
1622
0
    }
1623
0
  }
1624
1625
0
  return TRUE;
1626
0
}
1627
1628
BOOL NTLM_init(void)
1629
0
{
1630
0
  InitializeConstWCharFromUtf8(NTLM_SecPkgInfoA.Name, NTLM_SecPkgInfoW_NameBuffer,
1631
0
                               ARRAYSIZE(NTLM_SecPkgInfoW_NameBuffer));
1632
0
  InitializeConstWCharFromUtf8(NTLM_SecPkgInfoA.Comment, NTLM_SecPkgInfoW_CommentBuffer,
1633
0
                               ARRAYSIZE(NTLM_SecPkgInfoW_CommentBuffer));
1634
1635
0
  return TRUE;
1636
0
}