206 lines
5.0 KiB
C
206 lines
5.0 KiB
C
/**
|
|
* WinPR: Windows Portable Runtime
|
|
* NTLM Utils
|
|
*
|
|
* Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <winpr/ntlm.h>
|
|
|
|
#include <winpr/crt.h>
|
|
#include <winpr/crypto.h>
|
|
|
|
/**
|
|
* Define NTOWFv1(Password, User, Domain) as
|
|
* MD4(UNICODE(Password))
|
|
* EndDefine
|
|
*/
|
|
|
|
BYTE* NTOWFv1W(LPWSTR Password, UINT32 PasswordLength, BYTE* NtHash)
|
|
{
|
|
BOOL allocate = !NtHash;
|
|
|
|
if (!Password)
|
|
return NULL;
|
|
|
|
if (!NtHash && !(NtHash = malloc(WINPR_MD4_DIGEST_LENGTH)))
|
|
return NULL;
|
|
|
|
if (!winpr_Digest(WINPR_MD_MD4, (BYTE*) Password, (size_t) PasswordLength, NtHash, WINPR_MD4_DIGEST_LENGTH))
|
|
{
|
|
if (allocate)
|
|
{
|
|
free(NtHash);
|
|
NtHash = NULL;
|
|
}
|
|
}
|
|
|
|
return NtHash;
|
|
}
|
|
|
|
BYTE* NTOWFv1A(LPSTR Password, UINT32 PasswordLength, BYTE* NtHash)
|
|
{
|
|
LPWSTR PasswordW = NULL;
|
|
|
|
if (!(PasswordW = (LPWSTR) calloc(PasswordLength, 2)))
|
|
return NULL;
|
|
|
|
MultiByteToWideChar(CP_ACP, 0, Password, PasswordLength, PasswordW, PasswordLength);
|
|
|
|
NtHash = NTOWFv1W(PasswordW, PasswordLength * 2, NtHash);
|
|
|
|
free(PasswordW);
|
|
|
|
return NtHash;
|
|
}
|
|
|
|
/**
|
|
* Define NTOWFv2(Password, User, Domain) as
|
|
* HMAC_MD5(MD4(UNICODE(Password)),
|
|
* UNICODE(ConcatenationOf(UpperCase(User), Domain)))
|
|
* EndDefine
|
|
*/
|
|
|
|
BYTE* NTOWFv2W(LPWSTR Password, UINT32 PasswordLength, LPWSTR User,
|
|
UINT32 UserLength, LPWSTR Domain, UINT32 DomainLength, BYTE* NtHash)
|
|
{
|
|
BYTE* buffer;
|
|
BYTE NtHashV1[16];
|
|
BYTE* result = NtHash;
|
|
|
|
if ((!User) || (!Password))
|
|
return NULL;
|
|
|
|
if (!NtHash && !(NtHash = (BYTE*) malloc(WINPR_MD4_DIGEST_LENGTH)))
|
|
return NULL;
|
|
|
|
if (!NTOWFv1W(Password, PasswordLength, NtHashV1))
|
|
{
|
|
free(NtHash);
|
|
return NULL;
|
|
}
|
|
|
|
if (!(buffer = (BYTE*) malloc(UserLength + DomainLength)))
|
|
{
|
|
free(NtHash);
|
|
return NULL;
|
|
}
|
|
|
|
/* Concatenate(UpperCase(User), Domain) */
|
|
|
|
CopyMemory(buffer, User, UserLength);
|
|
CharUpperBuffW((LPWSTR) buffer, UserLength / 2);
|
|
CopyMemory(&buffer[UserLength], Domain, DomainLength);
|
|
|
|
/* Compute the HMAC-MD5 hash of the above value using the NTLMv1 hash as the key, the result is the NTLMv2 hash */
|
|
if (!winpr_HMAC(WINPR_MD_MD5, NtHashV1, 16, buffer, UserLength + DomainLength, NtHash, WINPR_MD4_DIGEST_LENGTH))
|
|
result = NULL;
|
|
|
|
free(buffer);
|
|
|
|
return result;
|
|
}
|
|
|
|
BYTE* NTOWFv2A(LPSTR Password, UINT32 PasswordLength, LPSTR User,
|
|
UINT32 UserLength, LPSTR Domain, UINT32 DomainLength, BYTE* NtHash)
|
|
{
|
|
LPWSTR UserW = NULL;
|
|
LPWSTR DomainW = NULL;
|
|
LPWSTR PasswordW = NULL;
|
|
|
|
UserW = (LPWSTR) calloc(UserLength, 2);
|
|
DomainW = (LPWSTR) calloc(DomainLength, 2);
|
|
PasswordW = (LPWSTR) calloc(PasswordLength, 2);
|
|
|
|
if (!UserW || !DomainW || !PasswordW)
|
|
goto out_fail;
|
|
|
|
MultiByteToWideChar(CP_ACP, 0, User, UserLength, UserW, UserLength);
|
|
MultiByteToWideChar(CP_ACP, 0, Domain, DomainLength, DomainW, DomainLength);
|
|
MultiByteToWideChar(CP_ACP, 0, Password, PasswordLength, PasswordW, PasswordLength);
|
|
|
|
NtHash = NTOWFv2W(PasswordW, PasswordLength * 2, UserW, UserLength * 2, DomainW, DomainLength * 2, NtHash);
|
|
|
|
out_fail:
|
|
free(UserW);
|
|
free(DomainW);
|
|
free(PasswordW);
|
|
|
|
return NtHash;
|
|
}
|
|
|
|
BYTE* NTOWFv2FromHashW(BYTE* NtHashV1, LPWSTR User, UINT32 UserLength, LPWSTR Domain, UINT32 DomainLength, BYTE* NtHash)
|
|
{
|
|
BYTE* buffer;
|
|
BYTE* result = NtHash;
|
|
|
|
if (!User)
|
|
return NULL;
|
|
|
|
if (!NtHash && !(NtHash = (BYTE*) malloc(WINPR_MD4_DIGEST_LENGTH)))
|
|
return NULL;
|
|
|
|
if (!(buffer = (BYTE*) malloc(UserLength + DomainLength)))
|
|
{
|
|
free(NtHash);
|
|
return NULL;
|
|
}
|
|
|
|
/* Concatenate(UpperCase(User), Domain) */
|
|
|
|
CopyMemory(buffer, User, UserLength);
|
|
CharUpperBuffW((LPWSTR) buffer, UserLength / 2);
|
|
|
|
if (DomainLength > 0)
|
|
{
|
|
CopyMemory(&buffer[UserLength], Domain, DomainLength);
|
|
}
|
|
|
|
/* Compute the HMAC-MD5 hash of the above value using the NTLMv1 hash as the key, the result is the NTLMv2 hash */
|
|
if (!winpr_HMAC(WINPR_MD_MD5, NtHashV1, 16, buffer, UserLength + DomainLength, NtHash, WINPR_MD4_DIGEST_LENGTH))
|
|
result = NULL;
|
|
|
|
free(buffer);
|
|
|
|
return result;
|
|
}
|
|
|
|
BYTE* NTOWFv2FromHashA(BYTE* NtHashV1, LPSTR User, UINT32 UserLength, LPSTR Domain, UINT32 DomainLength, BYTE* NtHash)
|
|
{
|
|
LPWSTR UserW = NULL;
|
|
LPWSTR DomainW = NULL;
|
|
|
|
UserW = (LPWSTR) calloc(UserLength, 2);
|
|
DomainW = (LPWSTR) calloc(DomainLength, 2);
|
|
|
|
if (!UserW || !DomainW)
|
|
goto out_fail;
|
|
|
|
MultiByteToWideChar(CP_ACP, 0, User, UserLength, UserW, UserLength);
|
|
MultiByteToWideChar(CP_ACP, 0, Domain, DomainLength, DomainW, DomainLength);
|
|
|
|
NtHash = NTOWFv2FromHashW(NtHashV1, UserW, UserLength * 2, DomainW, DomainLength * 2, NtHash);
|
|
|
|
out_fail:
|
|
free(UserW);
|
|
free(DomainW);
|
|
|
|
return NtHash;
|
|
}
|