FreeRDP
Loading...
Searching...
No Matches
ntlm_compute.c
1
20#include <winpr/config.h>
21
22#include <winpr/assert.h>
23
24#include "ntlm.h"
25#include "../sspi.h"
26
27#include <winpr/crt.h>
28#include <winpr/sam.h>
29#include <winpr/ntlm.h>
30#include <winpr/print.h>
31#include <winpr/crypto.h>
32#include <winpr/sysinfo.h>
33
34#include "ntlm_compute.h"
35
36#include "../../log.h"
37#define TAG WINPR_TAG("sspi.NTLM")
38
39#define NTLM_CheckAndLogRequiredCapacity(tag, s, nmemb, what) \
40 Stream_CheckAndLogRequiredCapacityEx(tag, WLOG_WARN, s, nmemb, 1, "%s(%s:%" PRIuz ") " what, \
41 __func__, __FILE__, (size_t)__LINE__)
42
43static char NTLM_CLIENT_SIGN_MAGIC[] = "session key to client-to-server signing key magic constant";
44static char NTLM_SERVER_SIGN_MAGIC[] = "session key to server-to-client signing key magic constant";
45static char NTLM_CLIENT_SEAL_MAGIC[] = "session key to client-to-server sealing key magic constant";
46static char NTLM_SERVER_SEAL_MAGIC[] = "session key to server-to-client sealing key magic constant";
47
48static const BYTE NTLM_NULL_BUFFER[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
49 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
50
58BOOL ntlm_get_version_info(NTLM_VERSION_INFO* versionInfo)
59{
60 WINPR_ASSERT(versionInfo);
61
62#if defined(WITH_WINPR_DEPRECATED)
63 OSVERSIONINFOA osVersionInfo = WINPR_C_ARRAY_INIT;
64 osVersionInfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFOA);
65 if (!GetVersionExA(&osVersionInfo))
66 return FALSE;
67 versionInfo->ProductMajorVersion = (UINT8)osVersionInfo.dwMajorVersion;
68 versionInfo->ProductMinorVersion = (UINT8)osVersionInfo.dwMinorVersion;
69 versionInfo->ProductBuild = (UINT16)osVersionInfo.dwBuildNumber;
70#else
71 /* Always return fixed version number.
72 *
73 * ProductVersion is fixed since windows 10 to Major 10, Minor 0
74 * ProductBuild taken from https://en.wikipedia.org/wiki/Windows_11_version_history
75 * with most recent (pre) release build number
76 */
77 versionInfo->ProductMajorVersion = 10;
78 versionInfo->ProductMinorVersion = 0;
79 versionInfo->ProductBuild = 22631;
80#endif
81 ZeroMemory(versionInfo->Reserved, sizeof(versionInfo->Reserved));
82 versionInfo->NTLMRevisionCurrent = NTLMSSP_REVISION_W2K3;
83 return TRUE;
84}
85
94BOOL ntlm_read_version_info(wStream* s, NTLM_VERSION_INFO* versionInfo)
95{
96 WINPR_ASSERT(s);
97 WINPR_ASSERT(versionInfo);
98
99 if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
100 return FALSE;
101
102 Stream_Read_UINT8(s, versionInfo->ProductMajorVersion); /* ProductMajorVersion (1 byte) */
103 Stream_Read_UINT8(s, versionInfo->ProductMinorVersion); /* ProductMinorVersion (1 byte) */
104 Stream_Read_UINT16(s, versionInfo->ProductBuild); /* ProductBuild (2 bytes) */
105 Stream_Read(s, versionInfo->Reserved, sizeof(versionInfo->Reserved)); /* Reserved (3 bytes) */
106 Stream_Read_UINT8(s, versionInfo->NTLMRevisionCurrent); /* NTLMRevisionCurrent (1 byte) */
107 return TRUE;
108}
109
118BOOL ntlm_write_version_info(wStream* s, const NTLM_VERSION_INFO* versionInfo)
119{
120 WINPR_ASSERT(s);
121 WINPR_ASSERT(versionInfo);
122
123 if (!Stream_CheckAndLogRequiredCapacityEx(
124 TAG, WLOG_WARN, s, 5ull + sizeof(versionInfo->Reserved), 1ull,
125 "%s(%s:%" PRIuz ") NTLM_VERSION_INFO", __func__, __FILE__, (size_t)__LINE__))
126 return FALSE;
127
128 Stream_Write_UINT8(s, versionInfo->ProductMajorVersion); /* ProductMajorVersion (1 byte) */
129 Stream_Write_UINT8(s, versionInfo->ProductMinorVersion); /* ProductMinorVersion (1 byte) */
130 Stream_Write_UINT16(s, versionInfo->ProductBuild); /* ProductBuild (2 bytes) */
131 Stream_Write(s, versionInfo->Reserved, sizeof(versionInfo->Reserved)); /* Reserved (3 bytes) */
132 Stream_Write_UINT8(s, versionInfo->NTLMRevisionCurrent); /* NTLMRevisionCurrent (1 byte) */
133 return TRUE;
134}
135
140#ifdef WITH_DEBUG_NTLM
141void ntlm_print_version_info(const NTLM_VERSION_INFO* versionInfo)
142{
143 WINPR_ASSERT(versionInfo);
144
145 WLog_VRB(TAG, "VERSION ={");
146 WLog_VRB(TAG, "\tProductMajorVersion: %" PRIu8 "", versionInfo->ProductMajorVersion);
147 WLog_VRB(TAG, "\tProductMinorVersion: %" PRIu8 "", versionInfo->ProductMinorVersion);
148 WLog_VRB(TAG, "\tProductBuild: %" PRIu16 "", versionInfo->ProductBuild);
149 WLog_VRB(TAG, "\tReserved: 0x%02" PRIX8 "%02" PRIX8 "%02" PRIX8 "", versionInfo->Reserved[0],
150 versionInfo->Reserved[1], versionInfo->Reserved[2]);
151 WLog_VRB(TAG, "\tNTLMRevisionCurrent: 0x%02" PRIX8 "", versionInfo->NTLMRevisionCurrent);
152}
153#endif
154
155static BOOL ntlm_read_ntlm_v2_client_challenge(wStream* s, NTLMv2_CLIENT_CHALLENGE* challenge)
156{
157 size_t size = 0;
158 WINPR_ASSERT(s);
159 WINPR_ASSERT(challenge);
160
161 if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
162 return FALSE;
163
164 Stream_Read_UINT8(s, challenge->RespType);
165 Stream_Read_UINT8(s, challenge->HiRespType);
166 Stream_Read_UINT16(s, challenge->Reserved1);
167 Stream_Read_UINT32(s, challenge->Reserved2);
168 Stream_Read(s, challenge->Timestamp, 8);
169 Stream_Read(s, challenge->ClientChallenge, 8);
170 Stream_Read_UINT32(s, challenge->Reserved3);
171 size = Stream_Length(s) - Stream_GetPosition(s);
172
173 if (size > UINT32_MAX)
174 {
175 WLog_ERR(TAG, "NTLMv2_CLIENT_CHALLENGE::cbAvPairs too large, got %" PRIuz "bytes", size);
176 return FALSE;
177 }
178
179 challenge->cbAvPairs = (UINT32)size;
180 challenge->AvPairs = (NTLM_AV_PAIR*)malloc(challenge->cbAvPairs);
181
182 if (!challenge->AvPairs)
183 {
184 WLog_ERR(TAG, "NTLMv2_CLIENT_CHALLENGE::AvPairs failed to allocate %" PRIu32 "bytes",
185 challenge->cbAvPairs);
186 return FALSE;
187 }
188
189 Stream_Read(s, challenge->AvPairs, size);
190 return TRUE;
191}
192
193static BOOL ntlm_write_ntlm_v2_client_challenge(wStream* s,
194 const NTLMv2_CLIENT_CHALLENGE* challenge)
195{
196 ULONG length = 0;
197
198 WINPR_ASSERT(s);
199 WINPR_ASSERT(challenge);
200
201 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, 28, "NTLMv2_CLIENT_CHALLENGE"))
202 return FALSE;
203
204 Stream_Write_UINT8(s, challenge->RespType);
205 Stream_Write_UINT8(s, challenge->HiRespType);
206 Stream_Write_UINT16(s, challenge->Reserved1);
207 Stream_Write_UINT32(s, challenge->Reserved2);
208 Stream_Write(s, challenge->Timestamp, 8);
209 Stream_Write(s, challenge->ClientChallenge, 8);
210 Stream_Write_UINT32(s, challenge->Reserved3);
211 length = ntlm_av_pair_list_length(challenge->AvPairs, challenge->cbAvPairs);
212
213 if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
214 return FALSE;
215
216 Stream_Write(s, challenge->AvPairs, length);
217 return TRUE;
218}
219
220BOOL ntlm_read_ntlm_v2_response(wStream* s, NTLMv2_RESPONSE* response)
221{
222 WINPR_ASSERT(s);
223 WINPR_ASSERT(response);
224
225 if (!Stream_CheckAndLogRequiredLength(TAG, s, 16))
226 return FALSE;
227
228 Stream_Read(s, response->Response, 16);
229 return ntlm_read_ntlm_v2_client_challenge(s, &(response->Challenge));
230}
231
232BOOL ntlm_write_ntlm_v2_response(wStream* s, const NTLMv2_RESPONSE* response)
233{
234 WINPR_ASSERT(s);
235 WINPR_ASSERT(response);
236
237 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, 16ull, "NTLMv2_RESPONSE"))
238 return FALSE;
239
240 Stream_Write(s, response->Response, 16);
241 return ntlm_write_ntlm_v2_client_challenge(s, &(response->Challenge));
242}
243
249static void ntlm_current_time(BYTE* timestamp, WINPR_ATTR_UNUSED size_t size)
250{
251 FILETIME ft = WINPR_C_ARRAY_INIT;
252
253 WINPR_ASSERT(timestamp);
254 WINPR_ASSERT(size >= sizeof(ft));
255
256 GetSystemTimeAsFileTime(&ft);
257 CopyMemory(timestamp, &(ft), sizeof(ft));
258}
259
266void ntlm_generate_timestamp(NTLM_CONTEXT* context)
267{
268 WINPR_ASSERT(context);
269
270 if (memcmp(context->ChallengeTimestamp, NTLM_NULL_BUFFER, 8) != 0)
271 CopyMemory(context->Timestamp, context->ChallengeTimestamp, 8);
272 else
273 ntlm_current_time(context->Timestamp, sizeof(context->Timestamp));
274}
275
276static BOOL ntlm_fetch_ntlm_v2_hash(NTLM_CONTEXT* context, BYTE* hash)
277{
278 BOOL rc = FALSE;
279 WINPR_SAM* sam = nullptr;
280 WINPR_SAM_ENTRY* entry = nullptr;
281 SSPI_CREDENTIALS* credentials = nullptr;
282
283 WINPR_ASSERT(context);
284 WINPR_ASSERT(hash);
285
286 credentials = context->credentials;
287 sam = SamOpen(context->SamFile, TRUE);
288
289 if (!sam)
290 goto fail;
291
292 entry = SamLookupUserW(
293 sam, (LPWSTR)credentials->identity.User, credentials->identity.UserLength * sizeof(WCHAR),
294 (LPWSTR)credentials->identity.Domain, credentials->identity.DomainLength * sizeof(WCHAR));
295
296 if (!entry)
297 {
298 entry = SamLookupUserW(sam, (LPWSTR)credentials->identity.User,
299 credentials->identity.UserLength * sizeof(WCHAR), nullptr, 0);
300 }
301
302 if (!entry)
303 goto fail;
304
305#ifdef WITH_DEBUG_NTLM
306 WLog_VRB(TAG, "NTLM Hash:");
307 winpr_HexDump(TAG, WLOG_DEBUG, entry->NtHash, 16);
308#endif
309 rc = NTOWFv2FromHashW(entry->NtHash, (LPWSTR)credentials->identity.User,
310 credentials->identity.UserLength * sizeof(WCHAR),
311 (LPWSTR)credentials->identity.Domain,
312 credentials->identity.DomainLength * sizeof(WCHAR), hash);
313
314fail:
315 SamFreeEntry(sam, entry);
316 SamClose(sam);
317 if (!rc)
318 WLog_ERR(TAG, "Error: Could not find user in SAM database");
319
320 return rc;
321}
322
323static int hexchar2nibble(WCHAR wc)
324{
325#if defined(__BIG_ENDIAN__)
326 union
327 {
328 BYTE b[2];
329 WCHAR w;
330 } cnv;
331 cnv.w = wc;
332 const BYTE b = cnv.b[0];
333 cnv.b[0] = cnv.b[1];
334 cnv.b[1] = b;
335 wc = cnv.w;
336#endif
337
338 switch (wc)
339 {
340 case L'0':
341 case L'1':
342 case L'2':
343 case L'3':
344 case L'4':
345 case L'5':
346 case L'6':
347 case L'7':
348 case L'8':
349 case L'9':
350 return wc - L'0';
351 case L'a':
352 case L'b':
353 case L'c':
354 case L'd':
355 case L'e':
356 case L'f':
357 return wc - L'a' + 10;
358 case L'A':
359 case L'B':
360 case L'C':
361 case L'D':
362 case L'E':
363 case L'F':
364 return wc - L'A' + 10;
365 default:
366 return -1;
367 }
368}
369static int ntlm_convert_password_hash(NTLM_CONTEXT* context, BYTE* hash, size_t hashlen)
370{
371 const size_t required_len = 2ull * hashlen;
372
373 WINPR_ASSERT(context);
374 WINPR_ASSERT(hash);
375
376 SSPI_CREDENTIALS* credentials = context->credentials;
377 /* Password contains a password hash of length (PasswordLength -
378 * SSPI_CREDENTIALS_HASH_LENGTH_OFFSET) */
379 const ULONG PasswordHashLength = credentials->identity.PasswordLength -
380 /* Macro [globalScope] */ SSPI_CREDENTIALS_HASH_LENGTH_OFFSET;
381
382 if (PasswordHashLength != required_len)
383 {
384 WLog_ERR(TAG,
385 "PasswordHash has invalid length %" PRIu32 " must be exactly %" PRIuz " bytes",
386 PasswordHashLength, required_len);
387 return -1;
388 }
389
390 const WCHAR* PasswordHash = credentials->identity.Password;
391 for (size_t x = 0; x < hashlen; x++)
392 {
393 const int hi = hexchar2nibble(PasswordHash[2 * x]);
394 if (hi < 0)
395 {
396 WLog_ERR(TAG, "PasswordHash has an invalid value at position %" PRIuz, 2 * x);
397 return -1;
398 }
399 const int lo = hexchar2nibble(PasswordHash[2 * x + 1]);
400 if (lo < 0)
401 {
402 WLog_ERR(TAG, "PasswordHash has an invalid value at position %" PRIuz, 2 * x + 1);
403 return -1;
404 }
405 const BYTE val = (BYTE)((hi << 4) | lo);
406 hash[x] = val;
407 }
408
409 return 1;
410}
411
412static BOOL ntlm_compute_ntlm_v2_hash(NTLM_CONTEXT* context, BYTE* hash)
413{
414 SSPI_CREDENTIALS* credentials = nullptr;
415
416 WINPR_ASSERT(context);
417 WINPR_ASSERT(hash);
418
419 credentials = context->credentials;
420#ifdef WITH_DEBUG_NTLM
421
422 if (credentials)
423 {
424 WLog_VRB(TAG, "Password (length = %" PRIu32 ")", credentials->identity.PasswordLength * 2);
425 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.Password,
426 credentials->identity.PasswordLength * 2);
427 WLog_VRB(TAG, "Username (length = %" PRIu32 ")", credentials->identity.UserLength * 2);
428 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.User,
429 credentials->identity.UserLength * 2);
430 WLog_VRB(TAG, "Domain (length = %" PRIu32 ")", credentials->identity.DomainLength * 2);
431 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.Domain,
432 credentials->identity.DomainLength * 2);
433 }
434 else
435 WLog_VRB(TAG, "Strange, NTLM_CONTEXT is missing valid credentials...");
436
437 WLog_VRB(TAG, "Workstation (length = %" PRIu16 ")", context->Workstation.Length);
438 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)context->Workstation.Buffer, context->Workstation.Length);
439 WLog_VRB(TAG, "NTOWFv2, NTLMv2 Hash");
440 winpr_HexDump(TAG, WLOG_TRACE, context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH);
441#endif
442
443 if (memcmp(context->NtlmV2Hash, NTLM_NULL_BUFFER, 16) != 0)
444 return TRUE;
445
446 if (!credentials)
447 return FALSE;
448 else if (memcmp(context->NtlmHash, NTLM_NULL_BUFFER, 16) != 0)
449 {
450 return NTOWFv2FromHashW(context->NtlmHash, (LPWSTR)credentials->identity.User,
451 credentials->identity.UserLength * 2,
452 (LPWSTR)credentials->identity.Domain,
453 credentials->identity.DomainLength * 2, hash);
454 }
455 else if (credentials->identity.PasswordLength > SSPI_CREDENTIALS_HASH_LENGTH_OFFSET)
456 {
457 /* Special case for WinPR: password hash */
458 if (ntlm_convert_password_hash(context, context->NtlmHash, sizeof(context->NtlmHash)) < 0)
459 return FALSE;
460
461 return NTOWFv2FromHashW(context->NtlmHash, (LPWSTR)credentials->identity.User,
462 credentials->identity.UserLength * 2,
463 (LPWSTR)credentials->identity.Domain,
464 credentials->identity.DomainLength * 2, hash);
465 }
466 else if (credentials->identity.Password)
467 {
468 return NTOWFv2W(
469 (LPWSTR)credentials->identity.Password, credentials->identity.PasswordLength * 2,
470 (LPWSTR)credentials->identity.User, credentials->identity.UserLength * 2,
471 (LPWSTR)credentials->identity.Domain, credentials->identity.DomainLength * 2, hash);
472 }
473 else if (context->HashCallback)
474 {
475 SecBuffer proofValue = WINPR_C_ARRAY_INIT;
476 SecBuffer micValue = WINPR_C_ARRAY_INIT;
477
478 if (ntlm_computeProofValue(context, &proofValue) != SEC_E_OK)
479 return FALSE;
480
481 if (ntlm_computeMicValue(context, &micValue) != SEC_E_OK)
482 {
483 sspi_SecBufferFree(&proofValue);
484 return FALSE;
485 }
486
487 const SECURITY_STATUS ret = context->HashCallback(
488 context->HashCallbackArg, &credentials->identity, &proofValue,
489 context->EncryptedRandomSessionKey, context->AUTHENTICATE_MESSAGE.MessageIntegrityCheck,
490 &micValue, hash);
491 sspi_SecBufferFree(&proofValue);
492 sspi_SecBufferFree(&micValue);
493 return ret == SEC_E_OK;
494 }
495 else if (context->UseSamFileDatabase)
496 {
497 return ntlm_fetch_ntlm_v2_hash(context, hash);
498 }
499
500 return TRUE;
501}
502
503SECURITY_STATUS ntlm_compute_lm_v2_response(NTLM_CONTEXT* context)
504{
505 BYTE* response = nullptr;
506 BYTE value[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
507
508 WINPR_ASSERT(context);
509
510 if (context->LmCompatibilityLevel < 2)
511 {
512 if (!sspi_SecBufferAlloc(&context->LmChallengeResponse, 24))
513 return SEC_E_INSUFFICIENT_MEMORY;
514
515 ZeroMemory(context->LmChallengeResponse.pvBuffer, 24);
516 return SEC_E_OK;
517 }
518
519 /* Compute the NTLMv2 hash */
520
521 if (!ntlm_compute_ntlm_v2_hash(context, context->NtlmV2Hash))
522 return SEC_E_NO_CREDENTIALS;
523
524 /* Concatenate the server and client challenges */
525 CopyMemory(value, context->ServerChallenge, 8);
526 CopyMemory(&value[8], context->ClientChallenge, 8);
527
528 if (!sspi_SecBufferAlloc(&context->LmChallengeResponse, 24))
529 return SEC_E_INSUFFICIENT_MEMORY;
530
531 response = (BYTE*)context->LmChallengeResponse.pvBuffer;
532 /* Compute the HMAC-MD5 hash of the resulting value using the NTLMv2 hash as the key */
533 if (!winpr_HMAC(WINPR_MD_MD5, (void*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH, (BYTE*)value,
534 WINPR_MD5_DIGEST_LENGTH, response, WINPR_MD5_DIGEST_LENGTH))
535 return SEC_E_ALGORITHM_MISMATCH;
536
537 /* Concatenate the resulting HMAC-MD5 hash and the client challenge, giving us the LMv2 response
538 * (24 bytes) */
539 CopyMemory(&response[16], context->ClientChallenge, 8);
540 return SEC_E_OK;
541}
542
553SECURITY_STATUS ntlm_compute_ntlm_v2_response(NTLM_CONTEXT* context)
554{
555 SecBuffer ntlm_v2_temp = WINPR_C_ARRAY_INIT;
556 SecBuffer ntlm_v2_temp_chal = WINPR_C_ARRAY_INIT;
557
558 WINPR_ASSERT(context);
559
560 PSecBuffer TargetInfo = &context->ChallengeTargetInfo;
561 SECURITY_STATUS ret = SEC_E_INSUFFICIENT_MEMORY;
562
563 if (!sspi_SecBufferAlloc(&ntlm_v2_temp, TargetInfo->cbBuffer + 28))
564 goto exit;
565
566 ZeroMemory(ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
567 {
568 BYTE* blob = (BYTE*)ntlm_v2_temp.pvBuffer;
569
570 /* Compute the NTLMv2 hash */
571 ret = SEC_E_NO_CREDENTIALS;
572 if (!ntlm_compute_ntlm_v2_hash(context, (BYTE*)context->NtlmV2Hash))
573 goto exit;
574
575 /* Construct temp */
576 blob[0] = 1; /* RespType (1 byte) */
577 blob[1] = 1; /* HighRespType (1 byte) */
578 /* Reserved1 (2 bytes) */
579 /* Reserved2 (4 bytes) */
580 CopyMemory(&blob[8], context->Timestamp, 8); /* Timestamp (8 bytes) */
581 CopyMemory(&blob[16], context->ClientChallenge, 8); /* ClientChallenge (8 bytes) */
582 /* Reserved3 (4 bytes) */
583 CopyMemory(&blob[28], TargetInfo->pvBuffer, TargetInfo->cbBuffer);
584#ifdef WITH_DEBUG_NTLM
585 WLog_VRB(TAG, "NTLMv2 Response Temp Blob");
586 winpr_HexDump(TAG, WLOG_TRACE, ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
587#endif
588 }
589 /* Concatenate server challenge with temp */
590 ret = SEC_E_INSUFFICIENT_MEMORY;
591 if (!sspi_SecBufferAlloc(&ntlm_v2_temp_chal, ntlm_v2_temp.cbBuffer + 8))
592 goto exit;
593
594 {
595 BYTE* blob = (BYTE*)ntlm_v2_temp_chal.pvBuffer;
596 CopyMemory(blob, context->ServerChallenge, 8);
597 CopyMemory(&blob[8], ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
598 if (!winpr_HMAC(WINPR_MD_MD5, (BYTE*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH,
599 (BYTE*)ntlm_v2_temp_chal.pvBuffer, ntlm_v2_temp_chal.cbBuffer,
600 context->NtProofString, WINPR_MD5_DIGEST_LENGTH))
601 goto exit;
602 }
603
604 /* NtChallengeResponse, Concatenate NTProofStr with temp */
605
606 if (!sspi_SecBufferAlloc(&context->NtChallengeResponse, ntlm_v2_temp.cbBuffer + 16))
607 goto exit;
608
609 {
610 BYTE* blob = (BYTE*)context->NtChallengeResponse.pvBuffer;
611 CopyMemory(blob, context->NtProofString, WINPR_MD5_DIGEST_LENGTH);
612 CopyMemory(&blob[16], ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
613 }
614 /* Compute SessionBaseKey, the HMAC-MD5 hash of NTProofStr using the NTLMv2 hash as the key */
615 if (!winpr_HMAC(WINPR_MD_MD5, (BYTE*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH,
616 context->NtProofString, WINPR_MD5_DIGEST_LENGTH, context->SessionBaseKey,
617 WINPR_MD5_DIGEST_LENGTH))
618 goto exit;
619 ret = SEC_E_OK;
620exit:
621 sspi_SecBufferFree(&ntlm_v2_temp);
622 sspi_SecBufferFree(&ntlm_v2_temp_chal);
623 return ret;
624}
625
634BOOL ntlm_rc4k(BYTE* key, size_t length, BYTE* plaintext, BYTE* ciphertext)
635{
636 WINPR_RC4_CTX* rc4 = winpr_RC4_New(key, 16);
637
638 if (!rc4)
639 return FALSE;
640
641 const BOOL rc = winpr_RC4_Update(rc4, length, plaintext, ciphertext);
642 winpr_RC4_Free(rc4);
643 return rc;
644}
645
651BOOL ntlm_generate_client_challenge(NTLM_CONTEXT* context)
652{
653 WINPR_ASSERT(context);
654
655 /* ClientChallenge is used in computation of LMv2 and NTLMv2 responses */
656 if (memcmp(context->ClientChallenge, NTLM_NULL_BUFFER, sizeof(context->ClientChallenge)) != 0)
657 return TRUE;
658
659 return winpr_RAND(context->ClientChallenge, sizeof(context->ClientChallenge)) >= 0;
660}
661
667BOOL ntlm_generate_server_challenge(NTLM_CONTEXT* context)
668{
669 WINPR_ASSERT(context);
670
671 if (memcmp(context->ServerChallenge, NTLM_NULL_BUFFER, sizeof(context->ServerChallenge)) != 0)
672 return TRUE;
673
674 return winpr_RAND(context->ServerChallenge, sizeof(context->ServerChallenge)) >= 0;
675}
676
682BOOL ntlm_generate_key_exchange_key(NTLM_CONTEXT* context)
683{
684 WINPR_ASSERT(context);
685 WINPR_ASSERT(sizeof(context->KeyExchangeKey) == sizeof(context->SessionBaseKey));
686
687 /* In NTLMv2, KeyExchangeKey is the 128-bit SessionBaseKey */
688 CopyMemory(context->KeyExchangeKey, context->SessionBaseKey, sizeof(context->KeyExchangeKey));
689 return TRUE;
690}
691
697BOOL ntlm_generate_random_session_key(NTLM_CONTEXT* context)
698{
699 WINPR_ASSERT(context);
700 return winpr_RAND(context->RandomSessionKey, sizeof(context->RandomSessionKey)) >= 0;
701}
702
708BOOL ntlm_generate_exported_session_key(NTLM_CONTEXT* context)
709{
710 WINPR_ASSERT(context);
711 WINPR_ASSERT(sizeof(context->ExportedSessionKey) >= sizeof(context->RandomSessionKey));
712
713 CopyMemory(context->ExportedSessionKey, context->RandomSessionKey,
714 sizeof(context->ExportedSessionKey));
715 return TRUE;
716}
717
723BOOL ntlm_encrypt_random_session_key(NTLM_CONTEXT* context)
724{
725 /* In NTLMv2, EncryptedRandomSessionKey is the ExportedSessionKey RC4-encrypted with the
726 * KeyExchangeKey */
727 WINPR_ASSERT(context);
728 return ntlm_rc4k(context->KeyExchangeKey, 16, context->RandomSessionKey,
729 context->EncryptedRandomSessionKey);
730}
731
737BOOL ntlm_decrypt_random_session_key(NTLM_CONTEXT* context)
738{
739 WINPR_ASSERT(context);
740
741 /* In NTLMv2, EncryptedRandomSessionKey is the ExportedSessionKey RC4-encrypted with the
742 * KeyExchangeKey */
743
749 if (context->NegotiateKeyExchange)
750 {
751 WINPR_ASSERT(sizeof(context->EncryptedRandomSessionKey) ==
752 sizeof(context->RandomSessionKey));
753 return ntlm_rc4k(context->KeyExchangeKey, sizeof(context->EncryptedRandomSessionKey),
754 context->EncryptedRandomSessionKey, context->RandomSessionKey);
755 }
756 else
757 {
758 WINPR_ASSERT(sizeof(context->RandomSessionKey) == sizeof(context->KeyExchangeKey));
759 CopyMemory(context->RandomSessionKey, context->KeyExchangeKey,
760 sizeof(context->RandomSessionKey));
761 }
762 return TRUE;
763}
764
775static BOOL ntlm_generate_signing_key(BYTE* exported_session_key, const SecBuffer* sign_magic,
776 BYTE* signing_key)
777{
778 BOOL rc = FALSE;
779 size_t length = 0;
780 BYTE* value = nullptr;
781
782 WINPR_ASSERT(exported_session_key);
783 WINPR_ASSERT(sign_magic);
784 WINPR_ASSERT(signing_key);
785
786 length = WINPR_MD5_DIGEST_LENGTH + sign_magic->cbBuffer;
787 value = (BYTE*)malloc(length);
788
789 if (!value)
790 goto out;
791
792 /* Concatenate ExportedSessionKey with sign magic */
793 CopyMemory(value, exported_session_key, WINPR_MD5_DIGEST_LENGTH);
794 CopyMemory(&value[WINPR_MD5_DIGEST_LENGTH], sign_magic->pvBuffer, sign_magic->cbBuffer);
795
796 rc = winpr_Digest(WINPR_MD_MD5, value, length, signing_key, WINPR_MD5_DIGEST_LENGTH);
797
798out:
799 free(value);
800 return rc;
801}
802
810BOOL ntlm_generate_client_signing_key(NTLM_CONTEXT* context)
811{
812 const SecBuffer signMagic = { sizeof(NTLM_CLIENT_SIGN_MAGIC), 0, NTLM_CLIENT_SIGN_MAGIC };
813
814 WINPR_ASSERT(context);
815 return ntlm_generate_signing_key(context->ExportedSessionKey, &signMagic,
816 context->ClientSigningKey);
817}
818
826BOOL ntlm_generate_server_signing_key(NTLM_CONTEXT* context)
827{
828 const SecBuffer signMagic = { sizeof(NTLM_SERVER_SIGN_MAGIC), 0, NTLM_SERVER_SIGN_MAGIC };
829
830 WINPR_ASSERT(context);
831 return ntlm_generate_signing_key(context->ExportedSessionKey, &signMagic,
832 context->ServerSigningKey);
833}
834
842BOOL ntlm_generate_client_sealing_key(NTLM_CONTEXT* context)
843{
844 const SecBuffer sealMagic = { sizeof(NTLM_CLIENT_SEAL_MAGIC), 0, NTLM_CLIENT_SEAL_MAGIC };
845
846 WINPR_ASSERT(context);
847 return ntlm_generate_signing_key(context->ExportedSessionKey, &sealMagic,
848 context->ClientSealingKey);
849}
850
858BOOL ntlm_generate_server_sealing_key(NTLM_CONTEXT* context)
859{
860 const SecBuffer sealMagic = { sizeof(NTLM_SERVER_SEAL_MAGIC), 0, NTLM_SERVER_SEAL_MAGIC };
861
862 WINPR_ASSERT(context);
863 return ntlm_generate_signing_key(context->ExportedSessionKey, &sealMagic,
864 context->ServerSealingKey);
865}
866
872BOOL ntlm_init_rc4_seal_states(NTLM_CONTEXT* context)
873{
874 WINPR_ASSERT(context);
875 if (context->server)
876 {
877 context->SendSigningKey = context->ServerSigningKey;
878 context->RecvSigningKey = context->ClientSigningKey;
879 context->SendSealingKey = context->ClientSealingKey;
880 context->RecvSealingKey = context->ServerSealingKey;
881 context->SendRc4Seal =
882 winpr_RC4_New(context->ServerSealingKey, sizeof(context->ServerSealingKey));
883 context->RecvRc4Seal =
884 winpr_RC4_New(context->ClientSealingKey, sizeof(context->ClientSealingKey));
885 }
886 else
887 {
888 context->SendSigningKey = context->ClientSigningKey;
889 context->RecvSigningKey = context->ServerSigningKey;
890 context->SendSealingKey = context->ServerSealingKey;
891 context->RecvSealingKey = context->ClientSealingKey;
892 context->SendRc4Seal =
893 winpr_RC4_New(context->ClientSealingKey, sizeof(context->ClientSealingKey));
894 context->RecvRc4Seal =
895 winpr_RC4_New(context->ServerSealingKey, sizeof(context->ServerSealingKey));
896 }
897 if (!context->SendRc4Seal)
898 {
899 WLog_ERR(TAG, "Failed to allocate context->SendRc4Seal");
900 return FALSE;
901 }
902 if (!context->RecvRc4Seal)
903 {
904 WLog_ERR(TAG, "Failed to allocate context->RecvRc4Seal");
905 return FALSE;
906 }
907 return TRUE;
908}
909
910BOOL ntlm_compute_message_integrity_check(NTLM_CONTEXT* context, BYTE* mic, UINT32 size)
911{
912 BOOL rc = FALSE;
913 /*
914 * Compute the HMAC-MD5 hash of ConcatenationOf(NEGOTIATE_MESSAGE,
915 * CHALLENGE_MESSAGE, AUTHENTICATE_MESSAGE) using the ExportedSessionKey
916 */
917 WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
918
919 WINPR_ASSERT(context);
920 WINPR_ASSERT(mic);
921 WINPR_ASSERT(size >= WINPR_MD5_DIGEST_LENGTH);
922
923 memset(mic, 0, size);
924 if (!hmac)
925 return FALSE;
926
927 if (!winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->ExportedSessionKey, WINPR_MD5_DIGEST_LENGTH))
928 goto fail;
929
930 if (!winpr_HMAC_Update(hmac, (BYTE*)context->NegotiateMessage.pvBuffer,
931 context->NegotiateMessage.cbBuffer))
932 goto fail;
933 if (!winpr_HMAC_Update(hmac, (BYTE*)context->ChallengeMessage.pvBuffer,
934 context->ChallengeMessage.cbBuffer))
935 goto fail;
936
937 if (context->MessageIntegrityCheckOffset > 0)
938 {
939 const BYTE* auth = (BYTE*)context->AuthenticateMessage.pvBuffer;
940 const BYTE data[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
941 const size_t rest = context->MessageIntegrityCheckOffset + sizeof(data);
942
943 WINPR_ASSERT(rest <= context->AuthenticateMessage.cbBuffer);
944 if (!winpr_HMAC_Update(hmac, &auth[0], context->MessageIntegrityCheckOffset))
945 goto fail;
946 if (!winpr_HMAC_Update(hmac, data, sizeof(data)))
947 goto fail;
948 if (!winpr_HMAC_Update(hmac, &auth[rest], context->AuthenticateMessage.cbBuffer - rest))
949 goto fail;
950 }
951 else
952 {
953 if (!winpr_HMAC_Update(hmac, (BYTE*)context->AuthenticateMessage.pvBuffer,
954 context->AuthenticateMessage.cbBuffer))
955 goto fail;
956 }
957 rc = winpr_HMAC_Final(hmac, mic, WINPR_MD5_DIGEST_LENGTH);
958
959fail:
960 winpr_HMAC_Free(hmac);
961 return rc;
962}