Milestone 5: deliver embedded RDP sessions and lifecycle hardening
This commit is contained in:
182
third_party/FreeRDP/winpr/libwinpr/utils/ntlm.c
vendored
Normal file
182
third_party/FreeRDP/winpr/libwinpr/utils/ntlm.c
vendored
Normal file
@@ -0,0 +1,182 @@
|
||||
/**
|
||||
* WinPR: Windows Portable Runtime
|
||||
* NTLM Utils
|
||||
*
|
||||
* Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
#include <winpr/config.h>
|
||||
|
||||
#include <winpr/ntlm.h>
|
||||
#include <winpr/assert.h>
|
||||
|
||||
#include <winpr/crt.h>
|
||||
#include <winpr/crypto.h>
|
||||
|
||||
/**
|
||||
* Define NTOWFv1(Password, User, Domain) as
|
||||
* MD4(UNICODE(Password))
|
||||
* EndDefine
|
||||
*/
|
||||
|
||||
BOOL NTOWFv1W(LPWSTR Password, UINT32 PasswordLength, BYTE* NtHash)
|
||||
{
|
||||
if (!Password || !NtHash)
|
||||
return FALSE;
|
||||
|
||||
if (!winpr_Digest(WINPR_MD_MD4, (BYTE*)Password, (size_t)PasswordLength, NtHash,
|
||||
WINPR_MD4_DIGEST_LENGTH))
|
||||
return FALSE;
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
BOOL NTOWFv1A(LPSTR Password, UINT32 PasswordLength, BYTE* NtHash)
|
||||
{
|
||||
LPWSTR PasswordW = nullptr;
|
||||
BOOL result = FALSE;
|
||||
size_t pwdCharLength = 0;
|
||||
|
||||
if (!NtHash)
|
||||
return FALSE;
|
||||
|
||||
PasswordW = ConvertUtf8NToWCharAlloc(Password, PasswordLength, &pwdCharLength);
|
||||
if (!PasswordW)
|
||||
return FALSE;
|
||||
|
||||
if (!NTOWFv1W(PasswordW, (UINT32)pwdCharLength * sizeof(WCHAR), NtHash))
|
||||
goto out_fail;
|
||||
|
||||
result = TRUE;
|
||||
out_fail:
|
||||
free(PasswordW);
|
||||
return result;
|
||||
}
|
||||
|
||||
/**
|
||||
* Define NTOWFv2(Password, User, Domain) as
|
||||
* HMAC_MD5(MD4(UNICODE(Password)),
|
||||
* UNICODE(ConcatenationOf(UpperCase(User), Domain)))
|
||||
* EndDefine
|
||||
*/
|
||||
|
||||
BOOL NTOWFv2W(LPWSTR Password, UINT32 PasswordLength, LPWSTR User, UINT32 UserLength, LPWSTR Domain,
|
||||
UINT32 DomainLength, BYTE* NtHash)
|
||||
{
|
||||
BYTE NtHashV1[WINPR_MD5_DIGEST_LENGTH];
|
||||
|
||||
if ((!User) || (!Password) || (!NtHash))
|
||||
return FALSE;
|
||||
|
||||
if (!NTOWFv1W(Password, PasswordLength, NtHashV1))
|
||||
return FALSE;
|
||||
|
||||
return NTOWFv2FromHashW(NtHashV1, User, UserLength, Domain, DomainLength, NtHash);
|
||||
}
|
||||
|
||||
BOOL NTOWFv2A(LPSTR Password, UINT32 PasswordLength, LPSTR User, UINT32 UserLength, LPSTR Domain,
|
||||
UINT32 DomainLength, BYTE* NtHash)
|
||||
{
|
||||
LPWSTR UserW = nullptr;
|
||||
LPWSTR DomainW = nullptr;
|
||||
LPWSTR PasswordW = nullptr;
|
||||
BOOL result = FALSE;
|
||||
size_t userCharLength = 0;
|
||||
size_t domainCharLength = 0;
|
||||
size_t pwdCharLength = 0;
|
||||
|
||||
if (!NtHash)
|
||||
return FALSE;
|
||||
|
||||
UserW = ConvertUtf8NToWCharAlloc(User, UserLength, &userCharLength);
|
||||
DomainW = ConvertUtf8NToWCharAlloc(Domain, DomainLength, &domainCharLength);
|
||||
PasswordW = ConvertUtf8NToWCharAlloc(Password, PasswordLength, &pwdCharLength);
|
||||
|
||||
if (!UserW || !DomainW || !PasswordW)
|
||||
goto out_fail;
|
||||
|
||||
if (!NTOWFv2W(PasswordW, (UINT32)pwdCharLength * sizeof(WCHAR), UserW,
|
||||
(UINT32)userCharLength * sizeof(WCHAR), DomainW,
|
||||
(UINT32)domainCharLength * sizeof(WCHAR), NtHash))
|
||||
goto out_fail;
|
||||
|
||||
result = TRUE;
|
||||
out_fail:
|
||||
free(UserW);
|
||||
free(DomainW);
|
||||
free(PasswordW);
|
||||
return result;
|
||||
}
|
||||
|
||||
BOOL NTOWFv2FromHashW(BYTE* NtHashV1, LPWSTR User, UINT32 UserLength, LPWSTR Domain,
|
||||
UINT32 DomainLength, BYTE* NtHash)
|
||||
{
|
||||
BYTE* buffer = nullptr;
|
||||
BYTE result = FALSE;
|
||||
|
||||
if (!User || !NtHash)
|
||||
return FALSE;
|
||||
|
||||
if (!(buffer = (BYTE*)malloc(UserLength + DomainLength)))
|
||||
return FALSE;
|
||||
|
||||
/* Concatenate(UpperCase(User), Domain) */
|
||||
CopyMemory(buffer, User, UserLength);
|
||||
CharUpperBuffW((LPWSTR)buffer, UserLength / 2);
|
||||
|
||||
if (DomainLength > 0)
|
||||
{
|
||||
CopyMemory(&buffer[UserLength], Domain, DomainLength);
|
||||
}
|
||||
|
||||
/* Compute the HMAC-MD5 hash of the above value using the NTLMv1 hash as the key, the result is
|
||||
* the NTLMv2 hash */
|
||||
if (!winpr_HMAC(WINPR_MD_MD5, NtHashV1, 16, buffer, UserLength + DomainLength, NtHash,
|
||||
WINPR_MD5_DIGEST_LENGTH))
|
||||
goto out_fail;
|
||||
|
||||
result = TRUE;
|
||||
out_fail:
|
||||
free(buffer);
|
||||
return result;
|
||||
}
|
||||
|
||||
BOOL NTOWFv2FromHashA(BYTE* NtHashV1, LPSTR User, UINT32 UserLength, LPSTR Domain,
|
||||
UINT32 DomainLength, BYTE* NtHash)
|
||||
{
|
||||
LPWSTR UserW = nullptr;
|
||||
LPWSTR DomainW = nullptr;
|
||||
BOOL result = FALSE;
|
||||
size_t userCharLength = 0;
|
||||
size_t domainCharLength = 0;
|
||||
if (!NtHash)
|
||||
return FALSE;
|
||||
|
||||
UserW = ConvertUtf8NToWCharAlloc(User, UserLength, &userCharLength);
|
||||
DomainW = ConvertUtf8NToWCharAlloc(Domain, DomainLength, &domainCharLength);
|
||||
|
||||
if (!UserW || !DomainW)
|
||||
goto out_fail;
|
||||
|
||||
if (!NTOWFv2FromHashW(NtHashV1, UserW, (UINT32)userCharLength * sizeof(WCHAR), DomainW,
|
||||
(UINT32)domainCharLength * sizeof(WCHAR), NtHash))
|
||||
goto out_fail;
|
||||
|
||||
result = TRUE;
|
||||
out_fail:
|
||||
free(UserW);
|
||||
free(DomainW);
|
||||
return result;
|
||||
}
|
||||
Reference in New Issue
Block a user