summaryrefslogtreecommitdiffstats
path: root/winpr/libwinpr/utils/ntlm.c
diff options
context:
space:
mode:
Diffstat (limited to 'winpr/libwinpr/utils/ntlm.c')
-rw-r--r--winpr/libwinpr/utils/ntlm.c182
1 files changed, 182 insertions, 0 deletions
diff --git a/winpr/libwinpr/utils/ntlm.c b/winpr/libwinpr/utils/ntlm.c
new file mode 100644
index 0000000..25e0e5a
--- /dev/null
+++ b/winpr/libwinpr/utils/ntlm.c
@@ -0,0 +1,182 @@
+/**
+ * WinPR: Windows Portable Runtime
+ * NTLM Utils
+ *
+ * Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <winpr/config.h>
+
+#include <winpr/ntlm.h>
+#include <winpr/assert.h>
+
+#include <winpr/crt.h>
+#include <winpr/crypto.h>
+
+/**
+ * Define NTOWFv1(Password, User, Domain) as
+ * MD4(UNICODE(Password))
+ * EndDefine
+ */
+
+BOOL NTOWFv1W(LPWSTR Password, UINT32 PasswordLength, BYTE* NtHash)
+{
+ if (!Password || !NtHash)
+ return FALSE;
+
+ if (!winpr_Digest(WINPR_MD_MD4, (BYTE*)Password, (size_t)PasswordLength, NtHash,
+ WINPR_MD4_DIGEST_LENGTH))
+ return FALSE;
+
+ return TRUE;
+}
+
+BOOL NTOWFv1A(LPSTR Password, UINT32 PasswordLength, BYTE* NtHash)
+{
+ LPWSTR PasswordW = NULL;
+ BOOL result = FALSE;
+ size_t pwdCharLength = 0;
+
+ if (!NtHash)
+ return FALSE;
+
+ PasswordW = ConvertUtf8NToWCharAlloc(Password, PasswordLength, &pwdCharLength);
+ if (!PasswordW)
+ return FALSE;
+
+ if (!NTOWFv1W(PasswordW, (UINT32)pwdCharLength * sizeof(WCHAR), NtHash))
+ goto out_fail;
+
+ result = TRUE;
+out_fail:
+ free(PasswordW);
+ return result;
+}
+
+/**
+ * Define NTOWFv2(Password, User, Domain) as
+ * HMAC_MD5(MD4(UNICODE(Password)),
+ * UNICODE(ConcatenationOf(UpperCase(User), Domain)))
+ * EndDefine
+ */
+
+BOOL NTOWFv2W(LPWSTR Password, UINT32 PasswordLength, LPWSTR User, UINT32 UserLength, LPWSTR Domain,
+ UINT32 DomainLength, BYTE* NtHash)
+{
+ BYTE NtHashV1[WINPR_MD5_DIGEST_LENGTH];
+
+ if ((!User) || (!Password) || (!NtHash))
+ return FALSE;
+
+ if (!NTOWFv1W(Password, PasswordLength, NtHashV1))
+ return FALSE;
+
+ return NTOWFv2FromHashW(NtHashV1, User, UserLength, Domain, DomainLength, NtHash);
+}
+
+BOOL NTOWFv2A(LPSTR Password, UINT32 PasswordLength, LPSTR User, UINT32 UserLength, LPSTR Domain,
+ UINT32 DomainLength, BYTE* NtHash)
+{
+ LPWSTR UserW = NULL;
+ LPWSTR DomainW = NULL;
+ LPWSTR PasswordW = NULL;
+ BOOL result = FALSE;
+ size_t userCharLength = 0;
+ size_t domainCharLength = 0;
+ size_t pwdCharLength = 0;
+
+ if (!NtHash)
+ return FALSE;
+
+ UserW = ConvertUtf8NToWCharAlloc(User, UserLength, &userCharLength);
+ DomainW = ConvertUtf8NToWCharAlloc(Domain, DomainLength, &domainCharLength);
+ PasswordW = ConvertUtf8NToWCharAlloc(Password, PasswordLength, &pwdCharLength);
+
+ if (!UserW || !DomainW || !PasswordW)
+ goto out_fail;
+
+ if (!NTOWFv2W(PasswordW, (UINT32)pwdCharLength * sizeof(WCHAR), UserW,
+ (UINT32)userCharLength * sizeof(WCHAR), DomainW,
+ (UINT32)domainCharLength * sizeof(WCHAR), NtHash))
+ goto out_fail;
+
+ result = TRUE;
+out_fail:
+ free(UserW);
+ free(DomainW);
+ free(PasswordW);
+ return result;
+}
+
+BOOL NTOWFv2FromHashW(BYTE* NtHashV1, LPWSTR User, UINT32 UserLength, LPWSTR Domain,
+ UINT32 DomainLength, BYTE* NtHash)
+{
+ BYTE* buffer = NULL;
+ BYTE result = FALSE;
+
+ if (!User || !NtHash)
+ return FALSE;
+
+ if (!(buffer = (BYTE*)malloc(UserLength + DomainLength)))
+ return FALSE;
+
+ /* Concatenate(UpperCase(User), Domain) */
+ CopyMemory(buffer, User, UserLength);
+ CharUpperBuffW((LPWSTR)buffer, UserLength / 2);
+
+ if (DomainLength > 0)
+ {
+ CopyMemory(&buffer[UserLength], Domain, DomainLength);
+ }
+
+ /* Compute the HMAC-MD5 hash of the above value using the NTLMv1 hash as the key, the result is
+ * the NTLMv2 hash */
+ if (!winpr_HMAC(WINPR_MD_MD5, NtHashV1, 16, buffer, UserLength + DomainLength, NtHash,
+ WINPR_MD5_DIGEST_LENGTH))
+ goto out_fail;
+
+ result = TRUE;
+out_fail:
+ free(buffer);
+ return result;
+}
+
+BOOL NTOWFv2FromHashA(BYTE* NtHashV1, LPSTR User, UINT32 UserLength, LPSTR Domain,
+ UINT32 DomainLength, BYTE* NtHash)
+{
+ LPWSTR UserW = NULL;
+ LPWSTR DomainW = NULL;
+ BOOL result = FALSE;
+ size_t userCharLength = 0;
+ size_t domainCharLength = 0;
+ if (!NtHash)
+ return FALSE;
+
+ UserW = ConvertUtf8NToWCharAlloc(User, UserLength, &userCharLength);
+ DomainW = ConvertUtf8NToWCharAlloc(Domain, DomainLength, &domainCharLength);
+
+ if (!UserW || !DomainW)
+ goto out_fail;
+
+ if (!NTOWFv2FromHashW(NtHashV1, UserW, (UINT32)userCharLength * sizeof(WCHAR), DomainW,
+ (UINT32)domainCharLength * sizeof(WCHAR), NtHash))
+ goto out_fail;
+
+ result = TRUE;
+out_fail:
+ free(UserW);
+ free(DomainW);
+ return result;
+}