20#include <winpr/config.h>
26#include <winpr/assert.h>
27#include <winpr/print.h>
28#include <winpr/stream.h>
29#include <winpr/sysinfo.h>
31#include "ntlm_compute.h"
33#include "ntlm_message.h"
36#define TAG WINPR_TAG("sspi.NTLM")
38#define NTLM_CheckAndLogRequiredCapacity(tag, s, nmemb, what) \
39 Stream_CheckAndLogRequiredCapacityEx(tag, WLOG_WARN, s, nmemb, 1, "%s(%s:%" PRIuz ") " what, \
40 __func__, __FILE__, (size_t)__LINE__)
42static const char NTLM_SIGNATURE[8] = {
'N',
'T',
'L',
'M',
'S',
'S',
'P',
'\0' };
46const char* ntlm_get_negotiate_string(UINT32 flag)
48 if (flag & NTLMSSP_NEGOTIATE_56)
49 return "NTLMSSP_NEGOTIATE_56";
50 if (flag & NTLMSSP_NEGOTIATE_KEY_EXCH)
51 return "NTLMSSP_NEGOTIATE_KEY_EXCH";
52 if (flag & NTLMSSP_NEGOTIATE_128)
53 return "NTLMSSP_NEGOTIATE_128";
54 if (flag & NTLMSSP_RESERVED1)
55 return "NTLMSSP_RESERVED1";
56 if (flag & NTLMSSP_RESERVED2)
57 return "NTLMSSP_RESERVED2";
58 if (flag & NTLMSSP_RESERVED3)
59 return "NTLMSSP_RESERVED3";
60 if (flag & NTLMSSP_NEGOTIATE_VERSION)
61 return "NTLMSSP_NEGOTIATE_VERSION";
62 if (flag & NTLMSSP_RESERVED4)
63 return "NTLMSSP_RESERVED4";
64 if (flag & NTLMSSP_NEGOTIATE_TARGET_INFO)
65 return "NTLMSSP_NEGOTIATE_TARGET_INFO";
66 if (flag & NTLMSSP_REQUEST_NON_NT_SESSION_KEY)
67 return "NTLMSSP_REQUEST_NON_NT_SESSION_KEY";
68 if (flag & NTLMSSP_RESERVED5)
69 return "NTLMSSP_RESERVED5";
70 if (flag & NTLMSSP_NEGOTIATE_IDENTIFY)
71 return "NTLMSSP_NEGOTIATE_IDENTIFY";
72 if (flag & NTLMSSP_NEGOTIATE_EXTENDED_SESSION_SECURITY)
73 return "NTLMSSP_NEGOTIATE_EXTENDED_SESSION_SECURITY";
74 if (flag & NTLMSSP_RESERVED6)
75 return "NTLMSSP_RESERVED6";
76 if (flag & NTLMSSP_TARGET_TYPE_SERVER)
77 return "NTLMSSP_TARGET_TYPE_SERVER";
78 if (flag & NTLMSSP_TARGET_TYPE_DOMAIN)
79 return "NTLMSSP_TARGET_TYPE_DOMAIN";
80 if (flag & NTLMSSP_NEGOTIATE_ALWAYS_SIGN)
81 return "NTLMSSP_NEGOTIATE_ALWAYS_SIGN";
82 if (flag & NTLMSSP_RESERVED7)
83 return "NTLMSSP_RESERVED7";
84 if (flag & NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED)
85 return "NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED";
86 if (flag & NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED)
87 return "NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED";
88 if (flag & NTLMSSP_NEGOTIATE_ANONYMOUS)
89 return "NTLMSSP_NEGOTIATE_ANONYMOUS";
90 if (flag & NTLMSSP_RESERVED8)
91 return "NTLMSSP_RESERVED8";
92 if (flag & NTLMSSP_NEGOTIATE_NTLM)
93 return "NTLMSSP_NEGOTIATE_NTLM";
94 if (flag & NTLMSSP_RESERVED9)
95 return "NTLMSSP_RESERVED9";
96 if (flag & NTLMSSP_NEGOTIATE_LM_KEY)
97 return "NTLMSSP_NEGOTIATE_LM_KEY";
98 if (flag & NTLMSSP_NEGOTIATE_DATAGRAM)
99 return "NTLMSSP_NEGOTIATE_DATAGRAM";
100 if (flag & NTLMSSP_NEGOTIATE_SEAL)
101 return "NTLMSSP_NEGOTIATE_SEAL";
102 if (flag & NTLMSSP_NEGOTIATE_SIGN)
103 return "NTLMSSP_NEGOTIATE_SIGN";
104 if (flag & NTLMSSP_RESERVED10)
105 return "NTLMSSP_RESERVED10";
106 if (flag & NTLMSSP_REQUEST_TARGET)
107 return "NTLMSSP_REQUEST_TARGET";
108 if (flag & NTLMSSP_NEGOTIATE_OEM)
109 return "NTLMSSP_NEGOTIATE_OEM";
110 if (flag & NTLMSSP_NEGOTIATE_UNICODE)
111 return "NTLMSSP_NEGOTIATE_UNICODE";
112 return "NTLMSSP_NEGOTIATE_UNKNOWN";
115#if defined(WITH_DEBUG_NTLM)
118 WINPR_ASSERT(fields);
121 WLog_VRB(TAG,
"%s (Len: %" PRIu16
" MaxLen: %" PRIu16
" BufferOffset: %" PRIu32
")", name,
122 fields->Len, fields->MaxLen, fields->BufferOffset);
125 winpr_HexDump(TAG, WLOG_TRACE, fields->Buffer, fields->Len);
128static void ntlm_print_negotiate_flags(UINT32 flags)
130 WLog_VRB(TAG,
"negotiateFlags \"0x%08" PRIX32
"\"", flags);
132 for (
int i = 31; i >= 0; i--)
134 if ((flags >> i) & 1)
136 const char* str = ntlm_get_negotiate_string(1 << i);
137 WLog_VRB(TAG,
"\t%s (%d),", str, (31 - i));
142static void ntlm_print_negotiate_message(
const SecBuffer* NegotiateMessage,
145 WINPR_ASSERT(NegotiateMessage);
146 WINPR_ASSERT(message);
148 WLog_VRB(TAG,
"NEGOTIATE_MESSAGE (length = %" PRIu32
")", NegotiateMessage->cbBuffer);
149 winpr_HexDump(TAG, WLOG_TRACE, NegotiateMessage->pvBuffer, NegotiateMessage->cbBuffer);
150 ntlm_print_negotiate_flags(message->NegotiateFlags);
152 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
153 ntlm_print_version_info(&(message->Version));
156static void ntlm_print_challenge_message(
const SecBuffer* ChallengeMessage,
160 WINPR_ASSERT(ChallengeMessage);
161 WINPR_ASSERT(message);
163 WLog_VRB(TAG,
"CHALLENGE_MESSAGE (length = %" PRIu32
")", ChallengeMessage->cbBuffer);
164 winpr_HexDump(TAG, WLOG_TRACE, ChallengeMessage->pvBuffer, ChallengeMessage->cbBuffer);
165 ntlm_print_negotiate_flags(message->NegotiateFlags);
167 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
168 ntlm_print_version_info(&(message->Version));
170 ntlm_print_message_fields(&(message->TargetName),
"TargetName");
171 ntlm_print_message_fields(&(message->TargetInfo),
"TargetInfo");
173 if (ChallengeTargetInfo && (ChallengeTargetInfo->cbBuffer > 0))
175 WLog_VRB(TAG,
"ChallengeTargetInfo (%" PRIu32
"):", ChallengeTargetInfo->cbBuffer);
176 ntlm_print_av_pair_list(ChallengeTargetInfo->pvBuffer, ChallengeTargetInfo->cbBuffer);
180static void ntlm_print_authenticate_message(
const SecBuffer* AuthenticateMessage,
184 WINPR_ASSERT(AuthenticateMessage);
185 WINPR_ASSERT(message);
187 WLog_VRB(TAG,
"AUTHENTICATE_MESSAGE (length = %" PRIu32
")", AuthenticateMessage->cbBuffer);
188 winpr_HexDump(TAG, WLOG_TRACE, AuthenticateMessage->pvBuffer, AuthenticateMessage->cbBuffer);
189 ntlm_print_negotiate_flags(message->NegotiateFlags);
191 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
192 ntlm_print_version_info(&(message->Version));
194 if (AuthenticateTargetInfo && (AuthenticateTargetInfo->cbBuffer > 0))
196 WLog_VRB(TAG,
"AuthenticateTargetInfo (%" PRIu32
"):", AuthenticateTargetInfo->cbBuffer);
197 ntlm_print_av_pair_list(AuthenticateTargetInfo->pvBuffer, AuthenticateTargetInfo->cbBuffer);
200 ntlm_print_message_fields(&(message->DomainName),
"DomainName");
201 ntlm_print_message_fields(&(message->UserName),
"UserName");
202 ntlm_print_message_fields(&(message->Workstation),
"Workstation");
203 ntlm_print_message_fields(&(message->LmChallengeResponse),
"LmChallengeResponse");
204 ntlm_print_message_fields(&(message->NtChallengeResponse),
"NtChallengeResponse");
205 ntlm_print_message_fields(&(message->EncryptedRandomSessionKey),
"EncryptedRandomSessionKey");
207 if (flags & MSV_AV_FLAGS_MESSAGE_INTEGRITY_CHECK)
209 WLog_VRB(TAG,
"MessageIntegrityCheck (length = 16)");
210 winpr_HexDump(TAG, WLOG_TRACE, message->MessageIntegrityCheck,
211 sizeof(message->MessageIntegrityCheck));
215static void ntlm_print_authentication_complete(
const NTLM_CONTEXT* context)
217 WINPR_ASSERT(context);
219 WLog_VRB(TAG,
"ClientChallenge");
220 winpr_HexDump(TAG, WLOG_TRACE, context->ClientChallenge, 8);
221 WLog_VRB(TAG,
"ServerChallenge");
222 winpr_HexDump(TAG, WLOG_TRACE, context->ServerChallenge, 8);
223 WLog_VRB(TAG,
"SessionBaseKey");
224 winpr_HexDump(TAG, WLOG_TRACE, context->SessionBaseKey, 16);
225 WLog_VRB(TAG,
"KeyExchangeKey");
226 winpr_HexDump(TAG, WLOG_TRACE, context->KeyExchangeKey, 16);
227 WLog_VRB(TAG,
"ExportedSessionKey");
228 winpr_HexDump(TAG, WLOG_TRACE, context->ExportedSessionKey, 16);
229 WLog_VRB(TAG,
"RandomSessionKey");
230 winpr_HexDump(TAG, WLOG_TRACE, context->RandomSessionKey, 16);
231 WLog_VRB(TAG,
"ClientSigningKey");
232 winpr_HexDump(TAG, WLOG_TRACE, context->ClientSigningKey, 16);
233 WLog_VRB(TAG,
"ClientSealingKey");
234 winpr_HexDump(TAG, WLOG_TRACE, context->ClientSealingKey, 16);
235 WLog_VRB(TAG,
"ServerSigningKey");
236 winpr_HexDump(TAG, WLOG_TRACE, context->ServerSigningKey, 16);
237 WLog_VRB(TAG,
"ServerSealingKey");
238 winpr_HexDump(TAG, WLOG_TRACE, context->ServerSealingKey, 16);
239 WLog_VRB(TAG,
"Timestamp");
240 winpr_HexDump(TAG, WLOG_TRACE, context->Timestamp, 8);
247 WINPR_ASSERT(header);
249 if (!Stream_CheckAndLogRequiredLength(TAG, s, 12))
252 Stream_Read(s, header->Signature, 8);
253 Stream_Read_UINT32(s, header->MessageType);
255 if (strncmp((
char*)header->Signature, NTLM_SIGNATURE, 8) != 0)
257 char Signature[
sizeof(header->Signature) * 3 + 1] = WINPR_C_ARRAY_INIT;
258 winpr_BinToHexStringBuffer(header->Signature,
sizeof(header->Signature), Signature,
259 sizeof(Signature), TRUE);
261 WLog_ERR(TAG,
"NTLM_MESSAGE_HEADER Invalid signature, got %s, expected %s", Signature,
266 if (header->MessageType != expected)
268 WLog_ERR(TAG,
"NTLM_MESSAGE_HEADER Invalid message type, got %s, expected %s",
269 ntlm_message_type_string(header->MessageType), ntlm_message_type_string(expected));
279 WINPR_ASSERT(header);
281 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s,
sizeof(NTLM_SIGNATURE) + 4ull,
282 "NTLM_MESSAGE_HEADER::header"))
285 Stream_Write(s, header->Signature,
sizeof(NTLM_SIGNATURE));
286 Stream_Write_UINT32(s, header->MessageType);
293 WINPR_ASSERT(header);
295 CopyMemory(header->Signature, NTLM_SIGNATURE,
sizeof(NTLM_SIGNATURE));
296 header->MessageType = MessageType;
303 WINPR_ASSERT(fields);
305 if (!Stream_CheckAndLogRequiredLength(TAG, s, 8))
308 ntlm_free_message_fields_buffer(fields);
310 Stream_Read_UINT16(s, fields->Len);
311 Stream_Read_UINT16(s, fields->MaxLen);
312 Stream_Read_UINT32(s, fields->BufferOffset);
320 WINPR_ASSERT(fields);
322 MaxLen = fields->MaxLen;
323 if (fields->MaxLen < 1)
324 MaxLen = fields->Len;
326 if (!NTLM_CheckAndLogRequiredCapacity(TAG, (s), 8,
"NTLM_MESSAGE_FIELDS::header"))
329 Stream_Write_UINT16(s, fields->Len);
330 Stream_Write_UINT16(s, MaxLen);
331 Stream_Write_UINT32(s, fields->BufferOffset);
338 WINPR_ASSERT(fields);
342 const UINT32 offset = fields->BufferOffset + fields->Len;
344 if (fields->BufferOffset > UINT32_MAX - fields->Len)
347 "NTLM_MESSAGE_FIELDS::BufferOffset %" PRIu32
348 " too large, maximum allowed is %" PRIu32,
349 fields->BufferOffset, UINT32_MAX - fields->Len);
353 if (offset > Stream_Length(s))
356 "NTLM_MESSAGE_FIELDS::Buffer offset %" PRIu32
" beyond received data %" PRIuz,
357 offset, Stream_Length(s));
361 fields->Buffer = (PBYTE)malloc(fields->Len);
365 WLog_ERR(TAG,
"NTLM_MESSAGE_FIELDS::Buffer allocation of %" PRIu16
"bytes failed",
370 if (!Stream_SetPosition(s, fields->BufferOffset))
372 Stream_Read(s, fields->Buffer, fields->Len);
381 WINPR_ASSERT(fields);
385 if (!Stream_SetPosition(s, fields->BufferOffset))
387 if (!NTLM_CheckAndLogRequiredCapacity(TAG, (s), fields->Len,
"NTLM_MESSAGE_FIELDS::Len"))
390 Stream_Write(s, fields->Buffer, fields->Len);
401 free(fields->Buffer);
404 fields->Buffer =
nullptr;
405 fields->BufferOffset = 0;
410static BOOL ntlm_read_negotiate_flags(
wStream* s, UINT32* flags, UINT32 required,
const char* name)
412 UINT32 NegotiateFlags = 0;
413 char buffer[1024] = WINPR_C_ARRAY_INIT;
418 if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
421 Stream_Read_UINT32(s, NegotiateFlags);
423 if ((NegotiateFlags & required) != required)
425 WLog_ERR(TAG,
"%s::NegotiateFlags invalid flags 0x08%" PRIx32
", 0x%08" PRIx32
" required",
426 name, NegotiateFlags, required);
430 WLog_DBG(TAG,
"Read flags %s",
431 ntlm_negotiate_flags_string(buffer, ARRAYSIZE(buffer), NegotiateFlags));
432 *flags = NegotiateFlags;
436static BOOL ntlm_write_negotiate_flags(
wStream* s, UINT32 flags,
const char* name)
438 char buffer[1024] = WINPR_C_ARRAY_INIT;
442 if (!Stream_CheckAndLogRequiredCapacityEx(TAG, WLOG_WARN, s, 4ull, 1ull,
443 "%s(%s:%" PRIuz
") %s::NegotiateFlags", __func__,
444 __FILE__, (
size_t)__LINE__, name))
447 WLog_DBG(TAG,
"Write flags %s", ntlm_negotiate_flags_string(buffer, ARRAYSIZE(buffer), flags));
448 Stream_Write_UINT32(s, flags);
452static BOOL ntlm_read_message_integrity_check(
wStream* s,
size_t* offset, BYTE* data,
size_t size,
453 WINPR_ATTR_UNUSED
const char* name)
456 WINPR_ASSERT(offset);
458 WINPR_ASSERT(size == WINPR_MD5_DIGEST_LENGTH);
461 *offset = Stream_GetPosition(s);
463 if (!Stream_CheckAndLogRequiredLength(TAG, s, size))
466 Stream_Read(s, data, size);
470static BOOL ntlm_write_message_integrity_check(
wStream* s,
size_t offset,
const BYTE* data,
471 size_t size, WINPR_ATTR_UNUSED
const char* name)
477 WINPR_ASSERT(size == WINPR_MD5_DIGEST_LENGTH);
480 pos = Stream_GetPosition(s);
482 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, offset,
"MessageIntegrityCheck::offset"))
485 if (!Stream_SetPosition(s, offset))
487 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, size,
"MessageIntegrityCheck::size"))
490 Stream_Write(s, data, size);
491 return Stream_SetPosition(s, pos);
502 WINPR_ASSERT(context);
503 WINPR_ASSERT(buffer);
505 message = &context->NEGOTIATE_MESSAGE;
506 WINPR_ASSERT(message);
510 s = Stream_StaticConstInit(&sbuffer, buffer->pvBuffer, buffer->cbBuffer);
513 return SEC_E_INTERNAL_ERROR;
515 if (!ntlm_read_message_header(s, &message->header, MESSAGE_TYPE_NEGOTIATE))
516 return SEC_E_INVALID_TOKEN;
518 if (!ntlm_read_negotiate_flags(s, &message->NegotiateFlags,
519 NTLMSSP_REQUEST_TARGET | NTLMSSP_NEGOTIATE_NTLM |
520 NTLMSSP_NEGOTIATE_UNICODE,
521 "NTLM_NEGOTIATE_MESSAGE"))
522 return SEC_E_INVALID_TOKEN;
524 context->NegotiateFlags = message->NegotiateFlags;
529 if (!ntlm_read_message_fields(s, &(message->DomainName)))
530 return SEC_E_INVALID_TOKEN;
536 if (!ntlm_read_message_fields(s, &(message->Workstation)))
537 return SEC_E_INVALID_TOKEN;
540 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
542 if (!ntlm_read_version_info(s, &(message->Version)))
543 return SEC_E_INVALID_TOKEN;
546 if (!ntlm_read_message_fields_buffer(s, &message->DomainName))
547 return SEC_E_INVALID_TOKEN;
549 if (!ntlm_read_message_fields_buffer(s, &message->Workstation))
550 return SEC_E_INVALID_TOKEN;
552 length = Stream_GetPosition(s);
553 WINPR_ASSERT(length <= UINT32_MAX);
554 buffer->cbBuffer = (ULONG)length;
556 if (!sspi_SecBufferAlloc(&context->NegotiateMessage, (ULONG)length))
557 return SEC_E_INTERNAL_ERROR;
559 CopyMemory(context->NegotiateMessage.pvBuffer, buffer->pvBuffer, buffer->cbBuffer);
560 context->NegotiateMessage.BufferType = buffer->BufferType;
561#if defined(WITH_DEBUG_NTLM)
562 ntlm_print_negotiate_message(&context->NegotiateMessage, message);
564 ntlm_change_state(context, NTLM_STATE_CHALLENGE);
565 return SEC_I_CONTINUE_NEEDED;
576 WINPR_ASSERT(context);
577 WINPR_ASSERT(buffer);
579 message = &context->NEGOTIATE_MESSAGE;
580 WINPR_ASSERT(message);
584 s = Stream_StaticInit(&sbuffer, buffer->pvBuffer, buffer->cbBuffer);
587 return SEC_E_INTERNAL_ERROR;
589 if (!ntlm_populate_message_header(&message->header, MESSAGE_TYPE_NEGOTIATE))
590 return SEC_E_INTERNAL_ERROR;
594 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_56;
595 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_VERSION;
596 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_LM_KEY;
597 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_OEM;
600 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_KEY_EXCH;
601 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_128;
602 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_EXTENDED_SESSION_SECURITY;
603 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_ALWAYS_SIGN;
604 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_NTLM;
605 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_SIGN;
606 message->NegotiateFlags |= NTLMSSP_REQUEST_TARGET;
607 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_UNICODE;
609 if (context->confidentiality)
610 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_SEAL;
612 if (context->SendVersionInfo)
613 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_VERSION;
615 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
617 if (!ntlm_get_version_info(&(message->Version)))
618 return SEC_E_INTERNAL_ERROR;
621 context->NegotiateFlags = message->NegotiateFlags;
623 if (!ntlm_write_message_header(s, &message->header))
624 return SEC_E_INTERNAL_ERROR;
626 if (!ntlm_write_negotiate_flags(s, message->NegotiateFlags,
"NTLM_NEGOTIATE_MESSAGE"))
627 return SEC_E_INTERNAL_ERROR;
631 if (!ntlm_write_message_fields(s, &(message->DomainName)))
632 return SEC_E_INTERNAL_ERROR;
636 if (!ntlm_write_message_fields(s, &(message->Workstation)))
637 return SEC_E_INTERNAL_ERROR;
639 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
641 if (!ntlm_write_version_info(s, &(message->Version)))
642 return SEC_E_INTERNAL_ERROR;
645 length = Stream_GetPosition(s);
646 WINPR_ASSERT(length <= UINT32_MAX);
647 buffer->cbBuffer = (ULONG)length;
649 if (!sspi_SecBufferAlloc(&context->NegotiateMessage, (ULONG)length))
650 return SEC_E_INTERNAL_ERROR;
652 CopyMemory(context->NegotiateMessage.pvBuffer, buffer->pvBuffer, buffer->cbBuffer);
653 context->NegotiateMessage.BufferType = buffer->BufferType;
654#if defined(WITH_DEBUG_NTLM)
655 ntlm_print_negotiate_message(&context->NegotiateMessage, message);
657 ntlm_change_state(context, NTLM_STATE_CHALLENGE);
658 return SEC_I_CONTINUE_NEEDED;
663 SECURITY_STATUS status = SEC_E_INVALID_TOKEN;
667 size_t StartOffset = 0;
668 size_t PayloadOffset = 0;
673 if (!context || !buffer)
674 return SEC_E_INTERNAL_ERROR;
676 if (!ntlm_generate_client_challenge(context))
677 return SEC_E_INTERNAL_ERROR;
678 message = &context->CHALLENGE_MESSAGE;
679 WINPR_ASSERT(message);
683 s = Stream_StaticConstInit(&sbuffer, buffer->pvBuffer, buffer->cbBuffer);
686 return SEC_E_INTERNAL_ERROR;
688 StartOffset = Stream_GetPosition(s);
690 if (!ntlm_read_message_header(s, &message->header, MESSAGE_TYPE_CHALLENGE))
693 if (!ntlm_read_message_fields(s, &(message->TargetName)))
696 if (!ntlm_read_negotiate_flags(s, &message->NegotiateFlags, 0,
"NTLM_CHALLENGE_MESSAGE"))
699 context->NegotiateFlags = message->NegotiateFlags;
701 if (!Stream_CheckAndLogRequiredLength(TAG, s, 16))
704 Stream_Read(s, message->ServerChallenge, 8);
705 CopyMemory(context->ServerChallenge, message->ServerChallenge, 8);
706 Stream_Read(s, message->Reserved, 8);
708 if (!ntlm_read_message_fields(s, &(message->TargetInfo)))
711 if (context->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
713 if (!ntlm_read_version_info(s, &(message->Version)))
718 PayloadOffset = Stream_GetPosition(s);
720 status = SEC_E_INTERNAL_ERROR;
721 if (message->TargetName.Len > 0)
723 if (!ntlm_read_message_fields_buffer(s, &(message->TargetName)))
727 if (message->TargetInfo.Len > 0)
729 size_t cbAvTimestamp = 0;
731 if (!ntlm_read_message_fields_buffer(s, &(message->TargetInfo)))
734 context->ChallengeTargetInfo.pvBuffer = message->TargetInfo.Buffer;
735 context->ChallengeTargetInfo.cbBuffer = message->TargetInfo.Len;
736 AvTimestamp = ntlm_av_pair_get((
NTLM_AV_PAIR*)message->TargetInfo.Buffer,
737 message->TargetInfo.Len, MsvAvTimestamp, &cbAvTimestamp);
741 PBYTE ptr = ntlm_av_pair_get_value_pointer(AvTimestamp);
747 context->UseMIC = TRUE;
749 CopyMemory(context->ChallengeTimestamp, ptr, 8);
753 length = (PayloadOffset - StartOffset) + message->TargetName.Len + message->TargetInfo.Len;
754 if (length > buffer->cbBuffer)
757 if (!sspi_SecBufferAlloc(&context->ChallengeMessage, (ULONG)length))
760 if (context->ChallengeMessage.pvBuffer)
761 CopyMemory(context->ChallengeMessage.pvBuffer, Stream_Buffer(s) + StartOffset, length);
762#if defined(WITH_DEBUG_NTLM)
763 ntlm_print_challenge_message(&context->ChallengeMessage, message,
nullptr);
769 if (!ntlm_construct_authenticate_target_info(context))
772 sspi_SecBufferFree(&context->ChallengeTargetInfo);
773 context->ChallengeTargetInfo.pvBuffer = context->AuthenticateTargetInfo.pvBuffer;
774 context->ChallengeTargetInfo.cbBuffer = context->AuthenticateTargetInfo.cbBuffer;
777 ntlm_generate_timestamp(context);
780 const SECURITY_STATUS rc = ntlm_compute_lm_v2_response(context);
789 const SECURITY_STATUS rc2 =
790 ntlm_compute_ntlm_v2_response(context);
798 if (!ntlm_generate_key_exchange_key(context))
800 if (!ntlm_generate_random_session_key(context))
802 if (!ntlm_generate_exported_session_key(context))
804 if (!ntlm_encrypt_random_session_key(context))
808 status = SEC_E_ENCRYPT_FAILURE;
809 if (!ntlm_generate_client_signing_key(context))
811 if (!ntlm_generate_server_signing_key(context))
814 if (!ntlm_generate_client_sealing_key(context))
816 if (!ntlm_generate_server_sealing_key(context))
819 if (!ntlm_init_rc4_seal_states(context))
821#if defined(WITH_DEBUG_NTLM)
822 ntlm_print_authentication_complete(context);
824 ntlm_change_state(context, NTLM_STATE_AUTHENTICATE);
825 status = SEC_I_CONTINUE_NEEDED;
827 ntlm_free_message_fields_buffer(&(message->TargetName));
836 UINT32 PayloadOffset = 0;
840 WINPR_ASSERT(context);
841 WINPR_ASSERT(buffer);
843 message = &context->CHALLENGE_MESSAGE;
844 WINPR_ASSERT(message);
848 s = Stream_StaticInit(&sbuffer, buffer->pvBuffer, buffer->cbBuffer);
851 return SEC_E_INTERNAL_ERROR;
853 if (!ntlm_get_version_info(&(message->Version)))
854 return SEC_E_INTERNAL_ERROR;
855 if (!ntlm_generate_server_challenge(context))
856 return SEC_E_INTERNAL_ERROR;
857 ntlm_generate_timestamp(context);
859 if (!ntlm_construct_challenge_target_info(context))
860 return SEC_E_INTERNAL_ERROR;
862 CopyMemory(message->ServerChallenge, context->ServerChallenge, 8);
863 message->NegotiateFlags = context->NegotiateFlags;
864 if (!ntlm_populate_message_header(&message->header, MESSAGE_TYPE_CHALLENGE))
865 return SEC_E_INTERNAL_ERROR;
868 if (!ntlm_write_message_header(s, &message->header))
869 return SEC_E_INTERNAL_ERROR;
871 if (message->NegotiateFlags & NTLMSSP_REQUEST_TARGET)
873 message->TargetName.Len = (UINT16)context->TargetName.cbBuffer;
874 message->TargetName.Buffer = (PBYTE)context->TargetName.pvBuffer;
877 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_TARGET_INFO;
879 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_TARGET_INFO)
881 message->TargetInfo.Len = (UINT16)context->ChallengeTargetInfo.cbBuffer;
882 message->TargetInfo.Buffer = (PBYTE)context->ChallengeTargetInfo.pvBuffer;
887 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
890 message->TargetName.BufferOffset = PayloadOffset;
891 message->TargetInfo.BufferOffset = message->TargetName.BufferOffset + message->TargetName.Len;
893 if (!ntlm_write_message_fields(s, &(message->TargetName)))
894 return SEC_E_INTERNAL_ERROR;
896 if (!ntlm_write_negotiate_flags(s, message->NegotiateFlags,
"NTLM_CHALLENGE_MESSAGE"))
897 return SEC_E_INTERNAL_ERROR;
899 if (!NTLM_CheckAndLogRequiredCapacity(TAG, s, 16,
"NTLM_CHALLENGE_MESSAGE::ServerChallenge"))
900 return SEC_E_INTERNAL_ERROR;
902 Stream_Write(s, message->ServerChallenge, 8);
903 Stream_Write(s, message->Reserved, 8);
906 if (!ntlm_write_message_fields(s, &(message->TargetInfo)))
907 return SEC_E_INTERNAL_ERROR;
909 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
911 if (!ntlm_write_version_info(s, &(message->Version)))
912 return SEC_E_INTERNAL_ERROR;
916 if (message->NegotiateFlags & NTLMSSP_REQUEST_TARGET)
918 if (!ntlm_write_message_fields_buffer(s, &(message->TargetName)))
919 return SEC_E_INTERNAL_ERROR;
922 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_TARGET_INFO)
924 if (!ntlm_write_message_fields_buffer(s, &(message->TargetInfo)))
925 return SEC_E_INTERNAL_ERROR;
928 length = Stream_GetPosition(s);
929 WINPR_ASSERT(length <= UINT32_MAX);
930 buffer->cbBuffer = (ULONG)length;
932 if (!sspi_SecBufferAlloc(&context->ChallengeMessage, (ULONG)length))
933 return SEC_E_INTERNAL_ERROR;
935 CopyMemory(context->ChallengeMessage.pvBuffer, Stream_Buffer(s), length);
936#if defined(WITH_DEBUG_NTLM)
937 ntlm_print_challenge_message(&context->ChallengeMessage, message,
938 &context->ChallengeTargetInfo);
940 ntlm_change_state(context, NTLM_STATE_AUTHENTICATE);
941 return SEC_I_CONTINUE_NEEDED;
946 SECURITY_STATUS status = SEC_E_INVALID_TOKEN;
952 size_t PayloadBufferOffset = 0;
957 WINPR_ASSERT(context);
958 WINPR_ASSERT(buffer);
960 credentials = context->credentials;
961 WINPR_ASSERT(credentials);
963 message = &context->AUTHENTICATE_MESSAGE;
964 WINPR_ASSERT(message);
968 s = Stream_StaticConstInit(&sbuffer, buffer->pvBuffer, buffer->cbBuffer);
971 return SEC_E_INTERNAL_ERROR;
973 if (!ntlm_read_message_header(s, &message->header, MESSAGE_TYPE_AUTHENTICATE))
976 if (!ntlm_read_message_fields(
977 s, &(message->LmChallengeResponse)))
980 if (!ntlm_read_message_fields(
981 s, &(message->NtChallengeResponse)))
984 if (!ntlm_read_message_fields(s, &(message->DomainName)))
987 if (!ntlm_read_message_fields(s, &(message->UserName)))
990 if (!ntlm_read_message_fields(s, &(message->Workstation)))
993 if (!ntlm_read_message_fields(
995 &(message->EncryptedRandomSessionKey)))
998 if (!ntlm_read_negotiate_flags(s, &message->NegotiateFlags, 0,
"NTLM_AUTHENTICATE_MESSAGE"))
1001 context->NegotiateKeyExchange = (message->NegotiateFlags & NTLMSSP_NEGOTIATE_KEY_EXCH) != 0;
1003 if ((context->NegotiateKeyExchange && !message->EncryptedRandomSessionKey.Len) ||
1004 (!context->NegotiateKeyExchange && message->EncryptedRandomSessionKey.Len))
1007 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
1009 if (!ntlm_read_version_info(s, &(message->Version)))
1013 PayloadBufferOffset = Stream_GetPosition(s);
1015 status = SEC_E_INTERNAL_ERROR;
1016 if (!ntlm_read_message_fields_buffer(s, &(message->DomainName)))
1019 if (!ntlm_read_message_fields_buffer(s, &(message->UserName)))
1022 if (!ntlm_read_message_fields_buffer(s, &(message->Workstation)))
1025 if (!ntlm_read_message_fields_buffer(s,
1026 &(message->LmChallengeResponse)))
1029 if (!ntlm_read_message_fields_buffer(s,
1030 &(message->NtChallengeResponse)))
1033 if (message->NtChallengeResponse.Len > 0)
1035 size_t cbAvFlags = 0;
1037 wStream* snt = Stream_StaticConstInit(&ssbuffer, message->NtChallengeResponse.Buffer,
1038 message->NtChallengeResponse.Len);
1043 status = SEC_E_INVALID_TOKEN;
1044 if (!ntlm_read_ntlm_v2_response(snt, &(context->NTLMv2Response)))
1046 status = SEC_E_INTERNAL_ERROR;
1048 context->NtChallengeResponse.pvBuffer = message->NtChallengeResponse.Buffer;
1049 context->NtChallengeResponse.cbBuffer = message->NtChallengeResponse.Len;
1050 sspi_SecBufferFree(&(context->ChallengeTargetInfo));
1051 context->ChallengeTargetInfo.pvBuffer = (
void*)context->NTLMv2Response.Challenge.AvPairs;
1052 context->ChallengeTargetInfo.cbBuffer = message->NtChallengeResponse.Len - (28 + 16);
1053 CopyMemory(context->ClientChallenge, context->NTLMv2Response.Challenge.ClientChallenge, 8);
1055 ntlm_av_pair_get(context->NTLMv2Response.Challenge.AvPairs,
1056 context->NTLMv2Response.Challenge.cbAvPairs, MsvAvFlags, &cbAvFlags);
1059 flags = winpr_Data_Get_UINT32(ntlm_av_pair_get_value_pointer(AvFlags));
1062 if (!ntlm_read_message_fields_buffer(
1063 s, &(message->EncryptedRandomSessionKey)))
1066 if (message->EncryptedRandomSessionKey.Len > 0)
1068 if (message->EncryptedRandomSessionKey.Len != 16)
1071 CopyMemory(context->EncryptedRandomSessionKey, message->EncryptedRandomSessionKey.Buffer,
1075 length = Stream_GetPosition(s);
1076 WINPR_ASSERT(length <= UINT32_MAX);
1078 if (!sspi_SecBufferAlloc(&context->AuthenticateMessage, (ULONG)length))
1081 CopyMemory(context->AuthenticateMessage.pvBuffer, Stream_Buffer(s), length);
1082 buffer->cbBuffer = (ULONG)length;
1083 if (!Stream_SetPosition(s, PayloadBufferOffset))
1086 if (flags & MSV_AV_FLAGS_MESSAGE_INTEGRITY_CHECK)
1088 status = SEC_E_INVALID_TOKEN;
1089 if (!ntlm_read_message_integrity_check(
1090 s, &context->MessageIntegrityCheckOffset, message->MessageIntegrityCheck,
1091 sizeof(message->MessageIntegrityCheck),
"NTLM_AUTHENTICATE_MESSAGE"))
1095 status = SEC_E_INTERNAL_ERROR;
1097#if defined(WITH_DEBUG_NTLM)
1098 ntlm_print_authenticate_message(&context->AuthenticateMessage, message, flags,
nullptr);
1101 if (message->UserName.Len > 0)
1103 credentials->identity.User = (UINT16*)malloc(message->UserName.Len);
1105 if (!credentials->identity.User)
1108 CopyMemory(credentials->identity.User, message->UserName.Buffer, message->UserName.Len);
1109 credentials->identity.UserLength = message->UserName.Len / 2;
1112 if (message->DomainName.Len > 0)
1114 credentials->identity.Domain = (UINT16*)malloc(message->DomainName.Len);
1116 if (!credentials->identity.Domain)
1119 CopyMemory(credentials->identity.Domain, message->DomainName.Buffer,
1120 message->DomainName.Len);
1121 credentials->identity.DomainLength = message->DomainName.Len / 2;
1124 if (context->NegotiateFlags & NTLMSSP_NEGOTIATE_LM_KEY)
1126 const SECURITY_STATUS rc = ntlm_compute_lm_v2_response(context);
1132 const SECURITY_STATUS rc = ntlm_compute_ntlm_v2_response(context);
1138 if (!ntlm_generate_key_exchange_key(context))
1139 return SEC_E_INTERNAL_ERROR;
1141 if (!ntlm_decrypt_random_session_key(context))
1142 return SEC_E_INTERNAL_ERROR;
1144 if (!ntlm_generate_exported_session_key(context))
1145 return SEC_E_INTERNAL_ERROR;
1147 if (flags & MSV_AV_FLAGS_MESSAGE_INTEGRITY_CHECK)
1149 BYTE messageIntegrityCheck[16] = WINPR_C_ARRAY_INIT;
1151 if (!ntlm_compute_message_integrity_check(context, messageIntegrityCheck,
1152 sizeof(messageIntegrityCheck)))
1153 return SEC_E_INTERNAL_ERROR;
1155 &((PBYTE)context->AuthenticateMessage.pvBuffer)[context->MessageIntegrityCheckOffset],
1156 message->MessageIntegrityCheck,
sizeof(message->MessageIntegrityCheck));
1158 if (memcmp(messageIntegrityCheck, message->MessageIntegrityCheck,
1159 sizeof(message->MessageIntegrityCheck)) != 0)
1161 WLog_ERR(TAG,
"Message Integrity Check (MIC) verification failed!");
1162#ifdef WITH_DEBUG_NTLM
1163 WLog_ERR(TAG,
"Expected MIC:");
1164 winpr_HexDump(TAG, WLOG_ERROR, messageIntegrityCheck,
sizeof(messageIntegrityCheck));
1165 WLog_ERR(TAG,
"Actual MIC:");
1166 winpr_HexDump(TAG, WLOG_ERROR, message->MessageIntegrityCheck,
1167 sizeof(message->MessageIntegrityCheck));
1169 return SEC_E_MESSAGE_ALTERED;
1184#ifdef WITH_DEBUG_NTLM
1185 WLog_VRB(TAG,
"No MIC present, using NtProofString for verification.");
1188 if (memcmp(context->NTLMv2Response.Response, context->NtProofString, 16) != 0)
1190 WLog_ERR(TAG,
"NtProofString verification failed!");
1191#ifdef WITH_DEBUG_NTLM
1192 WLog_ERR(TAG,
"Expected NtProofString:");
1193 winpr_HexDump(TAG, WLOG_ERROR, context->NtProofString,
sizeof(context->NtProofString));
1194 WLog_ERR(TAG,
"Actual NtProofString:");
1195 winpr_HexDump(TAG, WLOG_ERROR, context->NTLMv2Response.Response,
1196 sizeof(context->NTLMv2Response));
1198 return SEC_E_LOGON_DENIED;
1203 if (!ntlm_generate_client_signing_key(context))
1204 return SEC_E_INTERNAL_ERROR;
1205 if (!ntlm_generate_server_signing_key(context))
1206 return SEC_E_INTERNAL_ERROR;
1208 if (!ntlm_generate_client_sealing_key(context))
1209 return SEC_E_INTERNAL_ERROR;
1210 if (!ntlm_generate_server_sealing_key(context))
1211 return SEC_E_INTERNAL_ERROR;
1213 if (!ntlm_init_rc4_seal_states(context))
1214 return SEC_E_INTERNAL_ERROR;
1215#if defined(WITH_DEBUG_NTLM)
1216 ntlm_print_authentication_complete(context);
1218 ntlm_change_state(context, NTLM_STATE_FINAL);
1219 ntlm_free_message_fields_buffer(&(message->DomainName));
1220 ntlm_free_message_fields_buffer(&(message->UserName));
1221 ntlm_free_message_fields_buffer(&(message->Workstation));
1222 ntlm_free_message_fields_buffer(&(message->LmChallengeResponse));
1223 ntlm_free_message_fields_buffer(&(message->NtChallengeResponse));
1224 ntlm_free_message_fields_buffer(&(message->EncryptedRandomSessionKey));
1243 UINT32 PayloadBufferOffset = 0;
1248 WINPR_ASSERT(context);
1249 WINPR_ASSERT(buffer);
1251 credentials = context->credentials;
1252 WINPR_ASSERT(credentials);
1254 message = &context->AUTHENTICATE_MESSAGE;
1255 WINPR_ASSERT(message);
1259 s = Stream_StaticInit(&sbuffer, buffer->pvBuffer, buffer->cbBuffer);
1262 return SEC_E_INTERNAL_ERROR;
1264 if (context->NTLMv2)
1266 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_56;
1268 if (context->SendVersionInfo)
1269 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_VERSION;
1272 if (context->UseMIC)
1273 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_TARGET_INFO;
1275 if (context->SendWorkstationName)
1276 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED;
1278 if (context->confidentiality)
1279 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_SEAL;
1281 if (context->CHALLENGE_MESSAGE.NegotiateFlags & NTLMSSP_NEGOTIATE_KEY_EXCH)
1282 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_KEY_EXCH;
1284 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_128;
1285 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_EXTENDED_SESSION_SECURITY;
1286 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_ALWAYS_SIGN;
1287 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_NTLM;
1288 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_SIGN;
1289 message->NegotiateFlags |= NTLMSSP_REQUEST_TARGET;
1290 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_UNICODE;
1292 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
1294 if (!ntlm_get_version_info(&(message->Version)))
1295 return SEC_E_INTERNAL_ERROR;
1298 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED)
1300 message->Workstation.Len = context->Workstation.Length;
1301 message->Workstation.Buffer = (BYTE*)context->Workstation.Buffer;
1304 if (credentials->identity.DomainLength > 0)
1306 message->NegotiateFlags |= NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED;
1307 message->DomainName.Len = (UINT16)credentials->identity.DomainLength *
sizeof(WCHAR);
1308 message->DomainName.Buffer = (BYTE*)credentials->identity.Domain;
1311 message->UserName.Len = (UINT16)credentials->identity.UserLength *
sizeof(WCHAR);
1312 message->UserName.Buffer = (BYTE*)credentials->identity.User;
1313 message->LmChallengeResponse.Len = (UINT16)context->LmChallengeResponse.cbBuffer;
1314 message->LmChallengeResponse.Buffer = (BYTE*)context->LmChallengeResponse.pvBuffer;
1315 message->NtChallengeResponse.Len = (UINT16)context->NtChallengeResponse.cbBuffer;
1316 message->NtChallengeResponse.Buffer = (BYTE*)context->NtChallengeResponse.pvBuffer;
1318 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_KEY_EXCH)
1320 message->EncryptedRandomSessionKey.Len = 16;
1321 message->EncryptedRandomSessionKey.Buffer = context->EncryptedRandomSessionKey;
1324 PayloadBufferOffset = 64;
1326 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
1327 PayloadBufferOffset += 8;
1329 if (context->UseMIC)
1330 PayloadBufferOffset += 16;
1332 message->DomainName.BufferOffset = PayloadBufferOffset;
1333 message->UserName.BufferOffset = message->DomainName.BufferOffset + message->DomainName.Len;
1334 message->Workstation.BufferOffset = message->UserName.BufferOffset + message->UserName.Len;
1335 message->LmChallengeResponse.BufferOffset =
1336 message->Workstation.BufferOffset + message->Workstation.Len;
1337 message->NtChallengeResponse.BufferOffset =
1338 message->LmChallengeResponse.BufferOffset + message->LmChallengeResponse.Len;
1339 message->EncryptedRandomSessionKey.BufferOffset =
1340 message->NtChallengeResponse.BufferOffset + message->NtChallengeResponse.Len;
1341 if (!ntlm_populate_message_header(&message->header, MESSAGE_TYPE_AUTHENTICATE))
1342 return SEC_E_INVALID_TOKEN;
1343 if (!ntlm_write_message_header(s, &message->header))
1344 return SEC_E_INTERNAL_ERROR;
1345 if (!ntlm_write_message_fields(
1346 s, &(message->LmChallengeResponse)))
1347 return SEC_E_INTERNAL_ERROR;
1348 if (!ntlm_write_message_fields(
1349 s, &(message->NtChallengeResponse)))
1350 return SEC_E_INTERNAL_ERROR;
1351 if (!ntlm_write_message_fields(s, &(message->DomainName)))
1352 return SEC_E_INTERNAL_ERROR;
1353 if (!ntlm_write_message_fields(s, &(message->UserName)))
1354 return SEC_E_INTERNAL_ERROR;
1355 if (!ntlm_write_message_fields(s, &(message->Workstation)))
1356 return SEC_E_INTERNAL_ERROR;
1357 if (!ntlm_write_message_fields(
1359 &(message->EncryptedRandomSessionKey)))
1360 return SEC_E_INTERNAL_ERROR;
1361 if (!ntlm_write_negotiate_flags(s, message->NegotiateFlags,
"NTLM_AUTHENTICATE_MESSAGE"))
1362 return SEC_E_INTERNAL_ERROR;
1364 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_VERSION)
1366 if (!ntlm_write_version_info(s, &(message->Version)))
1367 return SEC_E_INTERNAL_ERROR;
1370 if (context->UseMIC)
1372 const BYTE data[WINPR_MD5_DIGEST_LENGTH] = WINPR_C_ARRAY_INIT;
1374 context->MessageIntegrityCheckOffset = Stream_GetPosition(s);
1375 if (!ntlm_write_message_integrity_check(s, Stream_GetPosition(s), data,
sizeof(data),
1376 "NTLM_AUTHENTICATE_MESSAGE"))
1377 return SEC_E_INTERNAL_ERROR;
1380 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED)
1382 if (!ntlm_write_message_fields_buffer(s, &(message->DomainName)))
1383 return SEC_E_INTERNAL_ERROR;
1386 if (!ntlm_write_message_fields_buffer(s, &(message->UserName)))
1387 return SEC_E_INTERNAL_ERROR;
1389 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED)
1391 if (!ntlm_write_message_fields_buffer(s, &(message->Workstation)))
1392 return SEC_E_INTERNAL_ERROR;
1395 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_LM_KEY)
1397 if (!ntlm_write_message_fields_buffer(
1398 s, &(message->LmChallengeResponse)))
1399 return SEC_E_INTERNAL_ERROR;
1401 if (!ntlm_write_message_fields_buffer(
1402 s, &(message->NtChallengeResponse)))
1403 return SEC_E_INTERNAL_ERROR;
1405 if (message->NegotiateFlags & NTLMSSP_NEGOTIATE_KEY_EXCH)
1407 if (!ntlm_write_message_fields_buffer(
1408 s, &(message->EncryptedRandomSessionKey)))
1409 return SEC_E_INTERNAL_ERROR;
1412 length = Stream_GetPosition(s);
1413 WINPR_ASSERT(length <= UINT32_MAX);
1415 if (!sspi_SecBufferAlloc(&context->AuthenticateMessage, (ULONG)length))
1416 return SEC_E_INTERNAL_ERROR;
1418 CopyMemory(context->AuthenticateMessage.pvBuffer, Stream_Buffer(s), length);
1419 buffer->cbBuffer = (ULONG)length;
1421 if (context->UseMIC)
1424 if (!ntlm_compute_message_integrity_check(context, message->MessageIntegrityCheck,
1425 sizeof(message->MessageIntegrityCheck)))
1426 return SEC_E_INTERNAL_ERROR;
1427 if (!ntlm_write_message_integrity_check(
1428 s, context->MessageIntegrityCheckOffset, message->MessageIntegrityCheck,
1429 sizeof(message->MessageIntegrityCheck),
"NTLM_AUTHENTICATE_MESSAGE"))
1430 return SEC_E_INTERNAL_ERROR;
1433#if defined(WITH_DEBUG_NTLM)
1434 ntlm_print_authenticate_message(&context->AuthenticateMessage, message,
1435 context->UseMIC ? MSV_AV_FLAGS_MESSAGE_INTEGRITY_CHECK : 0,
1436 &context->AuthenticateTargetInfo);
1438 ntlm_change_state(context, NTLM_STATE_FINAL);