20#include <winpr/config.h>
22#include <winpr/assert.h>
29#include <winpr/ntlm.h>
30#include <winpr/print.h>
31#include <winpr/crypto.h>
32#include <winpr/sysinfo.h>
34#include "ntlm_compute.h"
37#define TAG WINPR_TAG("sspi.NTLM")
39#define NTLM_CheckAndLogRequiredCapacity(tag, s, nmemb, what) \
40 Stream_CheckAndLogRequiredCapacityEx(tag, WLOG_WARN, s, nmemb, 1, "%s(%s:%" PRIuz ") " what, \
41 __func__, __FILE__, (size_t)__LINE__)
43static char NTLM_CLIENT_SIGN_MAGIC[] =
"session key to client-to-server signing key magic constant";
44static char NTLM_SERVER_SIGN_MAGIC[] =
"session key to server-to-client signing key magic constant";
45static char NTLM_CLIENT_SEAL_MAGIC[] =
"session key to client-to-server sealing key magic constant";
46static char NTLM_SERVER_SEAL_MAGIC[] =
"session key to server-to-client sealing key magic constant";
48static const BYTE NTLM_NULL_BUFFER[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
49 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
60 WINPR_ASSERT(versionInfo);
62#if defined(WITH_WINPR_DEPRECATED)
63 OSVERSIONINFOA osVersionInfo = WINPR_C_ARRAY_INIT;
64 osVersionInfo.dwOSVersionInfoSize =
sizeof(OSVERSIONINFOA);
65 if (!GetVersionExA(&osVersionInfo))
67 versionInfo->ProductMajorVersion = (UINT8)osVersionInfo.dwMajorVersion;
68 versionInfo->ProductMinorVersion = (UINT8)osVersionInfo.dwMinorVersion;
69 versionInfo->ProductBuild = (UINT16)osVersionInfo.dwBuildNumber;
77 versionInfo->ProductMajorVersion = 10;
78 versionInfo->ProductMinorVersion = 0;
79 versionInfo->ProductBuild = 22631;
81 ZeroMemory(versionInfo->Reserved,
sizeof(versionInfo->Reserved));
82 versionInfo->NTLMRevisionCurrent = NTLMSSP_REVISION_W2K3;
97 WINPR_ASSERT(versionInfo);
99 if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
102 Stream_Read_UINT8(s, versionInfo->ProductMajorVersion);
103 Stream_Read_UINT8(s, versionInfo->ProductMinorVersion);
104 Stream_Read_UINT16(s, versionInfo->ProductBuild);
105 Stream_Read(s, versionInfo->Reserved,
sizeof(versionInfo->Reserved));
106 Stream_Read_UINT8(s, versionInfo->NTLMRevisionCurrent);
121 WINPR_ASSERT(versionInfo);
123 if (!Stream_CheckAndLogRequiredCapacityEx(
124 TAG, WLOG_WARN, s, 5ull +
sizeof(versionInfo->Reserved), 1ull,
125 "%s(%s:%" PRIuz
") NTLM_VERSION_INFO", __func__, __FILE__, (
size_t)__LINE__))
128 Stream_Write_UINT8(s, versionInfo->ProductMajorVersion);
129 Stream_Write_UINT8(s, versionInfo->ProductMinorVersion);
130 Stream_Write_UINT16(s, versionInfo->ProductBuild);
131 Stream_Write(s, versionInfo->Reserved,
sizeof(versionInfo->Reserved));
132 Stream_Write_UINT8(s, versionInfo->NTLMRevisionCurrent);
140#ifdef WITH_DEBUG_NTLM
143 WINPR_ASSERT(versionInfo);
145 WLog_VRB(TAG,
"VERSION ={");
146 WLog_VRB(TAG,
"\tProductMajorVersion: %" PRIu8
"", versionInfo->ProductMajorVersion);
147 WLog_VRB(TAG,
"\tProductMinorVersion: %" PRIu8
"", versionInfo->ProductMinorVersion);
148 WLog_VRB(TAG,
"\tProductBuild: %" PRIu16
"", versionInfo->ProductBuild);
149 WLog_VRB(TAG,
"\tReserved: 0x%02" PRIX8
"%02" PRIX8
"%02" PRIX8
"", versionInfo->Reserved[0],
150 versionInfo->Reserved[1], versionInfo->Reserved[2]);
151 WLog_VRB(TAG,
"\tNTLMRevisionCurrent: 0x%02" PRIX8
"", versionInfo->NTLMRevisionCurrent);
159 WINPR_ASSERT(challenge);
161 if (!Stream_CheckAndLogRequiredLength(TAG, s, 28))
164 Stream_Read_UINT8(s, challenge->RespType);
165 Stream_Read_UINT8(s, challenge->HiRespType);
166 Stream_Read_UINT16(s, challenge->Reserved1);
167 Stream_Read_UINT32(s, challenge->Reserved2);
168 Stream_Read(s, challenge->Timestamp, 8);
169 Stream_Read(s, challenge->ClientChallenge, 8);
170 Stream_Read_UINT32(s, challenge->Reserved3);
171 size = Stream_Length(s) - Stream_GetPosition(s);
173 if (size > UINT32_MAX)
175 WLog_ERR(TAG,
"NTLMv2_CLIENT_CHALLENGE::cbAvPairs too large, got %" PRIuz
"bytes", size);
179 challenge->cbAvPairs = (UINT32)size;
180 challenge->AvPairs = (
NTLM_AV_PAIR*)malloc(challenge->cbAvPairs);
182 if (!challenge->AvPairs)
184 WLog_ERR(TAG,
"NTLMv2_CLIENT_CHALLENGE::AvPairs failed to allocate %" PRIu32
"bytes",
185 challenge->cbAvPairs);
189 Stream_Read(s, challenge->AvPairs, size);
193static BOOL ntlm_write_ntlm_v2_client_challenge(
wStream* s,
199 WINPR_ASSERT(challenge);
201 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, 28,
"NTLMv2_CLIENT_CHALLENGE"))
204 Stream_Write_UINT8(s, challenge->RespType);
205 Stream_Write_UINT8(s, challenge->HiRespType);
206 Stream_Write_UINT16(s, challenge->Reserved1);
207 Stream_Write_UINT32(s, challenge->Reserved2);
208 Stream_Write(s, challenge->Timestamp, 8);
209 Stream_Write(s, challenge->ClientChallenge, 8);
210 Stream_Write_UINT32(s, challenge->Reserved3);
211 length = ntlm_av_pair_list_length(challenge->AvPairs, challenge->cbAvPairs);
213 if (!Stream_CheckAndLogRequiredLength(TAG, s, length))
216 Stream_Write(s, challenge->AvPairs, length);
223 WINPR_ASSERT(response);
225 if (!Stream_CheckAndLogRequiredLength(TAG, s, 16))
228 Stream_Read(s, response->Response, 16);
229 return ntlm_read_ntlm_v2_client_challenge(s, &(response->Challenge));
235 WINPR_ASSERT(response);
237 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, 16ull,
"NTLMv2_RESPONSE"))
240 Stream_Write(s, response->Response, 16);
241 return ntlm_write_ntlm_v2_client_challenge(s, &(response->Challenge));
249static void ntlm_current_time(BYTE* timestamp, WINPR_ATTR_UNUSED
size_t size)
253 WINPR_ASSERT(timestamp);
254 WINPR_ASSERT(size >=
sizeof(ft));
256 GetSystemTimeAsFileTime(&ft);
257 CopyMemory(timestamp, &(ft),
sizeof(ft));
268 WINPR_ASSERT(context);
270 if (memcmp(context->ChallengeTimestamp, NTLM_NULL_BUFFER, 8) != 0)
271 CopyMemory(context->Timestamp, context->ChallengeTimestamp, 8);
273 ntlm_current_time(context->Timestamp,
sizeof(context->Timestamp));
276static BOOL ntlm_fetch_ntlm_v2_hash(
NTLM_CONTEXT* context, BYTE* hash)
279 WINPR_SAM* sam =
nullptr;
280 WINPR_SAM_ENTRY* entry =
nullptr;
283 WINPR_ASSERT(context);
286 credentials = context->credentials;
287 sam = SamOpen(context->SamFile, TRUE);
292 entry = SamLookupUserW(
293 sam, (LPWSTR)credentials->identity.User, credentials->identity.UserLength *
sizeof(WCHAR),
294 (LPWSTR)credentials->identity.Domain, credentials->identity.DomainLength *
sizeof(WCHAR));
298 entry = SamLookupUserW(sam, (LPWSTR)credentials->identity.User,
299 credentials->identity.UserLength *
sizeof(WCHAR),
nullptr, 0);
305#ifdef WITH_DEBUG_NTLM
306 WLog_VRB(TAG,
"NTLM Hash:");
307 winpr_HexDump(TAG, WLOG_DEBUG, entry->NtHash, 16);
309 rc = NTOWFv2FromHashW(entry->NtHash, (LPWSTR)credentials->identity.User,
310 credentials->identity.UserLength *
sizeof(WCHAR),
311 (LPWSTR)credentials->identity.Domain,
312 credentials->identity.DomainLength *
sizeof(WCHAR), hash);
315 SamFreeEntry(sam, entry);
318 WLog_ERR(TAG,
"Error: Could not find user in SAM database");
323static int hexchar2nibble(WCHAR wc)
325#if defined(__BIG_ENDIAN__)
332 const BYTE b = cnv.b[0];
357 return wc - L
'a' + 10;
364 return wc - L
'A' + 10;
369static int ntlm_convert_password_hash(
NTLM_CONTEXT* context, BYTE* hash,
size_t hashlen)
371 const size_t required_len = 2ull * hashlen;
373 WINPR_ASSERT(context);
379 const ULONG PasswordHashLength = credentials->identity.PasswordLength -
380 SSPI_CREDENTIALS_HASH_LENGTH_OFFSET;
382 if (PasswordHashLength != required_len)
385 "PasswordHash has invalid length %" PRIu32
" must be exactly %" PRIuz
" bytes",
386 PasswordHashLength, required_len);
390 const WCHAR* PasswordHash = credentials->identity.Password;
391 for (
size_t x = 0; x < hashlen; x++)
393 const int hi = hexchar2nibble(PasswordHash[2 * x]);
396 WLog_ERR(TAG,
"PasswordHash has an invalid value at position %" PRIuz, 2 * x);
399 const int lo = hexchar2nibble(PasswordHash[2 * x + 1]);
402 WLog_ERR(TAG,
"PasswordHash has an invalid value at position %" PRIuz, 2 * x + 1);
405 const BYTE val = (BYTE)((hi << 4) | lo);
412static BOOL ntlm_compute_ntlm_v2_hash(
NTLM_CONTEXT* context, BYTE* hash)
416 WINPR_ASSERT(context);
419 credentials = context->credentials;
420#ifdef WITH_DEBUG_NTLM
424 WLog_VRB(TAG,
"Password (length = %" PRIu32
")", credentials->identity.PasswordLength * 2);
425 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.Password,
426 credentials->identity.PasswordLength * 2);
427 WLog_VRB(TAG,
"Username (length = %" PRIu32
")", credentials->identity.UserLength * 2);
428 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.User,
429 credentials->identity.UserLength * 2);
430 WLog_VRB(TAG,
"Domain (length = %" PRIu32
")", credentials->identity.DomainLength * 2);
431 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)credentials->identity.Domain,
432 credentials->identity.DomainLength * 2);
435 WLog_VRB(TAG,
"Strange, NTLM_CONTEXT is missing valid credentials...");
437 WLog_VRB(TAG,
"Workstation (length = %" PRIu16
")", context->Workstation.Length);
438 winpr_HexDump(TAG, WLOG_TRACE, (BYTE*)context->Workstation.Buffer, context->Workstation.Length);
439 WLog_VRB(TAG,
"NTOWFv2, NTLMv2 Hash");
440 winpr_HexDump(TAG, WLOG_TRACE, context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH);
443 if (memcmp(context->NtlmV2Hash, NTLM_NULL_BUFFER, 16) != 0)
448 else if (memcmp(context->NtlmHash, NTLM_NULL_BUFFER, 16) != 0)
450 return NTOWFv2FromHashW(context->NtlmHash, (LPWSTR)credentials->identity.User,
451 credentials->identity.UserLength * 2,
452 (LPWSTR)credentials->identity.Domain,
453 credentials->identity.DomainLength * 2, hash);
455 else if (credentials->identity.PasswordLength > SSPI_CREDENTIALS_HASH_LENGTH_OFFSET)
458 if (ntlm_convert_password_hash(context, context->NtlmHash,
sizeof(context->NtlmHash)) < 0)
461 return NTOWFv2FromHashW(context->NtlmHash, (LPWSTR)credentials->identity.User,
462 credentials->identity.UserLength * 2,
463 (LPWSTR)credentials->identity.Domain,
464 credentials->identity.DomainLength * 2, hash);
466 else if (credentials->identity.Password)
469 (LPWSTR)credentials->identity.Password, credentials->identity.PasswordLength * 2,
470 (LPWSTR)credentials->identity.User, credentials->identity.UserLength * 2,
471 (LPWSTR)credentials->identity.Domain, credentials->identity.DomainLength * 2, hash);
473 else if (context->HashCallback)
475 SecBuffer proofValue = WINPR_C_ARRAY_INIT;
478 if (ntlm_computeProofValue(context, &proofValue) != SEC_E_OK)
481 if (ntlm_computeMicValue(context, &micValue) != SEC_E_OK)
483 sspi_SecBufferFree(&proofValue);
487 const SECURITY_STATUS ret = context->HashCallback(
488 context->HashCallbackArg, &credentials->identity, &proofValue,
489 context->EncryptedRandomSessionKey, context->AUTHENTICATE_MESSAGE.MessageIntegrityCheck,
491 sspi_SecBufferFree(&proofValue);
492 sspi_SecBufferFree(&micValue);
493 return ret == SEC_E_OK;
495 else if (context->UseSamFileDatabase)
497 return ntlm_fetch_ntlm_v2_hash(context, hash);
503SECURITY_STATUS ntlm_compute_lm_v2_response(
NTLM_CONTEXT* context)
505 BYTE* response =
nullptr;
506 BYTE value[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
508 WINPR_ASSERT(context);
510 if (context->LmCompatibilityLevel < 2)
512 if (!sspi_SecBufferAlloc(&context->LmChallengeResponse, 24))
513 return SEC_E_INSUFFICIENT_MEMORY;
515 ZeroMemory(context->LmChallengeResponse.pvBuffer, 24);
521 if (!ntlm_compute_ntlm_v2_hash(context, context->NtlmV2Hash))
522 return SEC_E_NO_CREDENTIALS;
525 CopyMemory(value, context->ServerChallenge, 8);
526 CopyMemory(&value[8], context->ClientChallenge, 8);
528 if (!sspi_SecBufferAlloc(&context->LmChallengeResponse, 24))
529 return SEC_E_INSUFFICIENT_MEMORY;
531 response = (BYTE*)context->LmChallengeResponse.pvBuffer;
533 if (!winpr_HMAC(WINPR_MD_MD5, (
void*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH, (BYTE*)value,
534 WINPR_MD5_DIGEST_LENGTH, response, WINPR_MD5_DIGEST_LENGTH))
535 return SEC_E_ALGORITHM_MISMATCH;
539 CopyMemory(&response[16], context->ClientChallenge, 8);
553SECURITY_STATUS ntlm_compute_ntlm_v2_response(
NTLM_CONTEXT* context)
555 SecBuffer ntlm_v2_temp = WINPR_C_ARRAY_INIT;
556 SecBuffer ntlm_v2_temp_chal = WINPR_C_ARRAY_INIT;
558 WINPR_ASSERT(context);
560 PSecBuffer TargetInfo = &context->ChallengeTargetInfo;
561 SECURITY_STATUS ret = SEC_E_INSUFFICIENT_MEMORY;
563 if (!sspi_SecBufferAlloc(&ntlm_v2_temp, TargetInfo->cbBuffer + 28))
566 ZeroMemory(ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
568 BYTE* blob = (BYTE*)ntlm_v2_temp.pvBuffer;
571 ret = SEC_E_NO_CREDENTIALS;
572 if (!ntlm_compute_ntlm_v2_hash(context, (BYTE*)context->NtlmV2Hash))
580 CopyMemory(&blob[8], context->Timestamp, 8);
581 CopyMemory(&blob[16], context->ClientChallenge, 8);
583 CopyMemory(&blob[28], TargetInfo->pvBuffer, TargetInfo->cbBuffer);
584#ifdef WITH_DEBUG_NTLM
585 WLog_VRB(TAG,
"NTLMv2 Response Temp Blob");
586 winpr_HexDump(TAG, WLOG_TRACE, ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
590 ret = SEC_E_INSUFFICIENT_MEMORY;
591 if (!sspi_SecBufferAlloc(&ntlm_v2_temp_chal, ntlm_v2_temp.cbBuffer + 8))
595 BYTE* blob = (BYTE*)ntlm_v2_temp_chal.pvBuffer;
596 CopyMemory(blob, context->ServerChallenge, 8);
597 CopyMemory(&blob[8], ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
598 if (!winpr_HMAC(WINPR_MD_MD5, (BYTE*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH,
599 (BYTE*)ntlm_v2_temp_chal.pvBuffer, ntlm_v2_temp_chal.cbBuffer,
600 context->NtProofString, WINPR_MD5_DIGEST_LENGTH))
606 if (!sspi_SecBufferAlloc(&context->NtChallengeResponse, ntlm_v2_temp.cbBuffer + 16))
610 BYTE* blob = (BYTE*)context->NtChallengeResponse.pvBuffer;
611 CopyMemory(blob, context->NtProofString, WINPR_MD5_DIGEST_LENGTH);
612 CopyMemory(&blob[16], ntlm_v2_temp.pvBuffer, ntlm_v2_temp.cbBuffer);
615 if (!winpr_HMAC(WINPR_MD_MD5, (BYTE*)context->NtlmV2Hash, WINPR_MD5_DIGEST_LENGTH,
616 context->NtProofString, WINPR_MD5_DIGEST_LENGTH, context->SessionBaseKey,
617 WINPR_MD5_DIGEST_LENGTH))
621 sspi_SecBufferFree(&ntlm_v2_temp);
622 sspi_SecBufferFree(&ntlm_v2_temp_chal);
634BOOL ntlm_rc4k(BYTE* key,
size_t length, BYTE* plaintext, BYTE* ciphertext)
636 WINPR_RC4_CTX* rc4 = winpr_RC4_New(key, 16);
641 const BOOL rc = winpr_RC4_Update(rc4, length, plaintext, ciphertext);
651BOOL ntlm_generate_client_challenge(
NTLM_CONTEXT* context)
653 WINPR_ASSERT(context);
656 if (memcmp(context->ClientChallenge, NTLM_NULL_BUFFER,
sizeof(context->ClientChallenge)) != 0)
659 return winpr_RAND(context->ClientChallenge,
sizeof(context->ClientChallenge)) >= 0;
667BOOL ntlm_generate_server_challenge(
NTLM_CONTEXT* context)
669 WINPR_ASSERT(context);
671 if (memcmp(context->ServerChallenge, NTLM_NULL_BUFFER,
sizeof(context->ServerChallenge)) != 0)
674 return winpr_RAND(context->ServerChallenge,
sizeof(context->ServerChallenge)) >= 0;
682BOOL ntlm_generate_key_exchange_key(
NTLM_CONTEXT* context)
684 WINPR_ASSERT(context);
685 WINPR_ASSERT(
sizeof(context->KeyExchangeKey) ==
sizeof(context->SessionBaseKey));
688 CopyMemory(context->KeyExchangeKey, context->SessionBaseKey,
sizeof(context->KeyExchangeKey));
697BOOL ntlm_generate_random_session_key(
NTLM_CONTEXT* context)
699 WINPR_ASSERT(context);
700 return winpr_RAND(context->RandomSessionKey,
sizeof(context->RandomSessionKey)) >= 0;
708BOOL ntlm_generate_exported_session_key(
NTLM_CONTEXT* context)
710 WINPR_ASSERT(context);
711 WINPR_ASSERT(
sizeof(context->ExportedSessionKey) >=
sizeof(context->RandomSessionKey));
713 CopyMemory(context->ExportedSessionKey, context->RandomSessionKey,
714 sizeof(context->ExportedSessionKey));
723BOOL ntlm_encrypt_random_session_key(
NTLM_CONTEXT* context)
727 WINPR_ASSERT(context);
728 return ntlm_rc4k(context->KeyExchangeKey, 16, context->RandomSessionKey,
729 context->EncryptedRandomSessionKey);
737BOOL ntlm_decrypt_random_session_key(
NTLM_CONTEXT* context)
739 WINPR_ASSERT(context);
749 if (context->NegotiateKeyExchange)
751 WINPR_ASSERT(
sizeof(context->EncryptedRandomSessionKey) ==
752 sizeof(context->RandomSessionKey));
753 return ntlm_rc4k(context->KeyExchangeKey,
sizeof(context->EncryptedRandomSessionKey),
754 context->EncryptedRandomSessionKey, context->RandomSessionKey);
758 WINPR_ASSERT(
sizeof(context->RandomSessionKey) ==
sizeof(context->KeyExchangeKey));
759 CopyMemory(context->RandomSessionKey, context->KeyExchangeKey,
760 sizeof(context->RandomSessionKey));
775static BOOL ntlm_generate_signing_key(BYTE* exported_session_key,
const SecBuffer* sign_magic,
780 BYTE* value =
nullptr;
782 WINPR_ASSERT(exported_session_key);
783 WINPR_ASSERT(sign_magic);
784 WINPR_ASSERT(signing_key);
786 length = WINPR_MD5_DIGEST_LENGTH + sign_magic->cbBuffer;
787 value = (BYTE*)malloc(length);
793 CopyMemory(value, exported_session_key, WINPR_MD5_DIGEST_LENGTH);
794 CopyMemory(&value[WINPR_MD5_DIGEST_LENGTH], sign_magic->pvBuffer, sign_magic->cbBuffer);
796 rc = winpr_Digest(WINPR_MD_MD5, value, length, signing_key, WINPR_MD5_DIGEST_LENGTH);
810BOOL ntlm_generate_client_signing_key(
NTLM_CONTEXT* context)
812 const SecBuffer signMagic = {
sizeof(NTLM_CLIENT_SIGN_MAGIC), 0, NTLM_CLIENT_SIGN_MAGIC };
814 WINPR_ASSERT(context);
815 return ntlm_generate_signing_key(context->ExportedSessionKey, &signMagic,
816 context->ClientSigningKey);
826BOOL ntlm_generate_server_signing_key(
NTLM_CONTEXT* context)
828 const SecBuffer signMagic = {
sizeof(NTLM_SERVER_SIGN_MAGIC), 0, NTLM_SERVER_SIGN_MAGIC };
830 WINPR_ASSERT(context);
831 return ntlm_generate_signing_key(context->ExportedSessionKey, &signMagic,
832 context->ServerSigningKey);
842BOOL ntlm_generate_client_sealing_key(
NTLM_CONTEXT* context)
844 const SecBuffer sealMagic = {
sizeof(NTLM_CLIENT_SEAL_MAGIC), 0, NTLM_CLIENT_SEAL_MAGIC };
846 WINPR_ASSERT(context);
847 return ntlm_generate_signing_key(context->ExportedSessionKey, &sealMagic,
848 context->ClientSealingKey);
858BOOL ntlm_generate_server_sealing_key(
NTLM_CONTEXT* context)
860 const SecBuffer sealMagic = {
sizeof(NTLM_SERVER_SEAL_MAGIC), 0, NTLM_SERVER_SEAL_MAGIC };
862 WINPR_ASSERT(context);
863 return ntlm_generate_signing_key(context->ExportedSessionKey, &sealMagic,
864 context->ServerSealingKey);
874 WINPR_ASSERT(context);
877 context->SendSigningKey = context->ServerSigningKey;
878 context->RecvSigningKey = context->ClientSigningKey;
879 context->SendSealingKey = context->ClientSealingKey;
880 context->RecvSealingKey = context->ServerSealingKey;
881 context->SendRc4Seal =
882 winpr_RC4_New(context->ServerSealingKey,
sizeof(context->ServerSealingKey));
883 context->RecvRc4Seal =
884 winpr_RC4_New(context->ClientSealingKey,
sizeof(context->ClientSealingKey));
888 context->SendSigningKey = context->ClientSigningKey;
889 context->RecvSigningKey = context->ServerSigningKey;
890 context->SendSealingKey = context->ServerSealingKey;
891 context->RecvSealingKey = context->ClientSealingKey;
892 context->SendRc4Seal =
893 winpr_RC4_New(context->ClientSealingKey,
sizeof(context->ClientSealingKey));
894 context->RecvRc4Seal =
895 winpr_RC4_New(context->ServerSealingKey,
sizeof(context->ServerSealingKey));
897 if (!context->SendRc4Seal)
899 WLog_ERR(TAG,
"Failed to allocate context->SendRc4Seal");
902 if (!context->RecvRc4Seal)
904 WLog_ERR(TAG,
"Failed to allocate context->RecvRc4Seal");
910BOOL ntlm_compute_message_integrity_check(
NTLM_CONTEXT* context, BYTE* mic, UINT32 size)
917 WINPR_HMAC_CTX* hmac = winpr_HMAC_New();
919 WINPR_ASSERT(context);
921 WINPR_ASSERT(size >= WINPR_MD5_DIGEST_LENGTH);
923 memset(mic, 0, size);
927 if (!winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->ExportedSessionKey, WINPR_MD5_DIGEST_LENGTH))
930 if (!winpr_HMAC_Update(hmac, (BYTE*)context->NegotiateMessage.pvBuffer,
931 context->NegotiateMessage.cbBuffer))
933 if (!winpr_HMAC_Update(hmac, (BYTE*)context->ChallengeMessage.pvBuffer,
934 context->ChallengeMessage.cbBuffer))
937 if (context->MessageIntegrityCheckOffset > 0)
939 const BYTE* auth = (BYTE*)context->AuthenticateMessage.pvBuffer;
940 const BYTE data[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
941 const size_t rest = context->MessageIntegrityCheckOffset +
sizeof(data);
943 WINPR_ASSERT(rest <= context->AuthenticateMessage.cbBuffer);
944 if (!winpr_HMAC_Update(hmac, &auth[0], context->MessageIntegrityCheckOffset))
946 if (!winpr_HMAC_Update(hmac, data,
sizeof(data)))
948 if (!winpr_HMAC_Update(hmac, &auth[rest], context->AuthenticateMessage.cbBuffer - rest))
953 if (!winpr_HMAC_Update(hmac, (BYTE*)context->AuthenticateMessage.pvBuffer,
954 context->AuthenticateMessage.cbBuffer))
957 rc = winpr_HMAC_Final(hmac, mic, WINPR_MD5_DIGEST_LENGTH);
960 winpr_HMAC_Free(hmac);