|
Packit |
1fb8d4 |
/**
|
|
Packit |
1fb8d4 |
* FreeRDP: A Remote Desktop Protocol Implementation
|
|
Packit |
1fb8d4 |
* NTLM over HTTP
|
|
Packit |
1fb8d4 |
*
|
|
Packit |
1fb8d4 |
* Copyright 2012 Fujitsu Technology Solutions GmbH
|
|
Packit |
1fb8d4 |
* Copyright 2012 Dmitrij Jasnov <dmitrij.jasnov@ts.fujitsu.com>
|
|
Packit |
1fb8d4 |
* Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
|
Packit |
1fb8d4 |
*
|
|
Packit |
1fb8d4 |
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
Packit |
1fb8d4 |
* you may not use this file except in compliance with the License.
|
|
Packit |
1fb8d4 |
* You may obtain a copy of the License at
|
|
Packit |
1fb8d4 |
*
|
|
Packit |
1fb8d4 |
* http://www.apache.org/licenses/LICENSE-2.0
|
|
Packit |
1fb8d4 |
*
|
|
Packit |
1fb8d4 |
* Unless required by applicable law or agreed to in writing, software
|
|
Packit |
1fb8d4 |
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
Packit |
1fb8d4 |
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
Packit |
1fb8d4 |
* See the License for the specific language governing permissions and
|
|
Packit |
1fb8d4 |
* limitations under the License.
|
|
Packit |
1fb8d4 |
*/
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
#ifdef HAVE_CONFIG_H
|
|
Packit |
1fb8d4 |
#include "config.h"
|
|
Packit |
1fb8d4 |
#endif
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
#include <winpr/crt.h>
|
|
Packit |
1fb8d4 |
#include <winpr/tchar.h>
|
|
Packit |
1fb8d4 |
#include <winpr/dsparse.h>
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
#include <freerdp/log.h>
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
#include "http.h"
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
#include "ntlm.h"
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
#define TAG FREERDP_TAG("core.gateway.ntlm")
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
struct rdp_ntlm
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
BOOL http;
|
|
Packit |
1fb8d4 |
CtxtHandle context;
|
|
Packit |
1fb8d4 |
ULONG cbMaxToken;
|
|
Packit |
1fb8d4 |
ULONG fContextReq;
|
|
Packit |
1fb8d4 |
ULONG pfContextAttr;
|
|
Packit |
1fb8d4 |
TimeStamp expiration;
|
|
Packit |
1fb8d4 |
PSecBuffer pBuffer;
|
|
Packit |
1fb8d4 |
SecBuffer inputBuffer[2];
|
|
Packit |
1fb8d4 |
SecBuffer outputBuffer[2];
|
|
Packit |
1fb8d4 |
BOOL haveContext;
|
|
Packit |
1fb8d4 |
BOOL haveInputBuffer;
|
|
Packit |
1fb8d4 |
LPTSTR ServicePrincipalName;
|
|
Packit |
1fb8d4 |
SecBufferDesc inputBufferDesc;
|
|
Packit |
1fb8d4 |
SecBufferDesc outputBufferDesc;
|
|
Packit |
1fb8d4 |
CredHandle credentials;
|
|
Packit |
1fb8d4 |
BOOL confidentiality;
|
|
Packit |
1fb8d4 |
SecPkgInfo* pPackageInfo;
|
|
Packit |
1fb8d4 |
SecurityFunctionTable* table;
|
|
Packit |
1fb8d4 |
SEC_WINNT_AUTH_IDENTITY identity;
|
|
Packit |
1fb8d4 |
SecPkgContext_Sizes ContextSizes;
|
|
Packit |
1fb8d4 |
SecPkgContext_Bindings* Bindings;
|
|
Packit |
1fb8d4 |
};
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
static ULONG cast_from_size_(size_t size, const char* fkt, const char* file, int line)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
if (size > ULONG_MAX)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG, "[%s %s:%d] Size %" PRIdz " is larger than INT_MAX %lu", fkt, file, line,
|
|
Packit Service |
5a9772 |
size, ULONG_MAX);
|
|
Packit |
1fb8d4 |
return 0;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit Service |
5a9772 |
return (ULONG)size;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
#define cast_from_size(size) cast_from_size_(size, __FUNCTION__, __FILE__, __LINE__)
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
BOOL ntlm_client_init(rdpNtlm* ntlm, BOOL http, LPCTSTR user, LPCTSTR domain, LPCTSTR password,
|
|
Packit |
1fb8d4 |
SecPkgContext_Bindings* Bindings)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
SECURITY_STATUS status;
|
|
Packit |
1fb8d4 |
ntlm->http = http;
|
|
Packit |
1fb8d4 |
ntlm->Bindings = Bindings;
|
|
Packit |
1fb8d4 |
ntlm->table = InitSecurityInterfaceEx(0);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ntlm->table)
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
sspi_SetAuthIdentity(&(ntlm->identity), user, domain, password);
|
|
Packit |
1fb8d4 |
status = ntlm->table->QuerySecurityPackageInfo(NTLM_SSP_NAME, &ntlm->pPackageInfo);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG, "QuerySecurityPackageInfo status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
ntlm->cbMaxToken = ntlm->pPackageInfo->cbMaxToken;
|
|
Packit Service |
5a9772 |
status = ntlm->table->AcquireCredentialsHandle(NULL, NTLM_SSP_NAME, SECPKG_CRED_OUTBOUND, NULL,
|
|
Packit Service |
5a9772 |
&ntlm->identity, NULL, NULL, &ntlm->credentials,
|
|
Packit Service |
5a9772 |
&ntlm->expiration);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG, "AcquireCredentialsHandle status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
ntlm->haveContext = FALSE;
|
|
Packit |
1fb8d4 |
ntlm->haveInputBuffer = FALSE;
|
|
Packit |
1fb8d4 |
ZeroMemory(&ntlm->inputBuffer, sizeof(SecBuffer));
|
|
Packit |
1fb8d4 |
ZeroMemory(&ntlm->outputBuffer, sizeof(SecBuffer));
|
|
Packit |
1fb8d4 |
ZeroMemory(&ntlm->ContextSizes, sizeof(SecPkgContext_Sizes));
|
|
Packit |
1fb8d4 |
ntlm->fContextReq = 0;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (ntlm->http)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
/* flags for HTTP authentication */
|
|
Packit |
1fb8d4 |
ntlm->fContextReq |= ISC_REQ_CONFIDENTIALITY;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
else
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
/**
|
|
Packit Service |
5a9772 |
* flags for RPC authentication:
|
|
Packit Service |
5a9772 |
* RPC_C_AUTHN_LEVEL_PKT_INTEGRITY:
|
|
Packit Service |
5a9772 |
* ISC_REQ_USE_DCE_STYLE | ISC_REQ_DELEGATE | ISC_REQ_MUTUAL_AUTH |
|
|
Packit Service |
5a9772 |
* ISC_REQ_REPLAY_DETECT | ISC_REQ_SEQUENCE_DETECT
|
|
Packit Service |
5a9772 |
*/
|
|
Packit |
1fb8d4 |
ntlm->fContextReq |= ISC_REQ_USE_DCE_STYLE;
|
|
Packit |
1fb8d4 |
ntlm->fContextReq |= ISC_REQ_DELEGATE | ISC_REQ_MUTUAL_AUTH;
|
|
Packit |
1fb8d4 |
ntlm->fContextReq |= ISC_REQ_REPLAY_DETECT | ISC_REQ_SEQUENCE_DETECT;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return TRUE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
BOOL ntlm_client_make_spn(rdpNtlm* ntlm, LPCTSTR ServiceClass, LPCTSTR hostname)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
BOOL status = FALSE;
|
|
Packit |
1fb8d4 |
DWORD SpnLength = 0;
|
|
Packit |
1fb8d4 |
LPTSTR hostnameX = NULL;
|
|
Packit |
1fb8d4 |
#ifdef UNICODE
|
|
Packit Service |
5a9772 |
ConvertToUnicode(CP_UTF8, 0, hostname, -1, (LPWSTR*)&hostnameX, 0);
|
|
Packit |
1fb8d4 |
#else
|
|
Packit |
1fb8d4 |
hostnameX = _strdup(hostname);
|
|
Packit |
1fb8d4 |
#endif
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!hostnameX)
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ServiceClass)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
ntlm->ServicePrincipalName = (LPTSTR)_tcsdup(hostnameX);
|
|
Packit |
1fb8d4 |
free(hostnameX);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ntlm->ServicePrincipalName)
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return TRUE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit Service |
5a9772 |
if (DsMakeSpn(ServiceClass, hostnameX, NULL, 0, NULL, &SpnLength, NULL) !=
|
|
Packit Service |
5a9772 |
ERROR_BUFFER_OVERFLOW)
|
|
Packit |
1fb8d4 |
goto error;
|
|
Packit |
1fb8d4 |
|
|
Packit Service |
5a9772 |
ntlm->ServicePrincipalName = (LPTSTR)calloc(SpnLength, sizeof(TCHAR));
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ntlm->ServicePrincipalName)
|
|
Packit |
1fb8d4 |
goto error;
|
|
Packit |
1fb8d4 |
|
|
Packit Service |
5a9772 |
if (DsMakeSpn(ServiceClass, hostnameX, NULL, 0, NULL, &SpnLength, ntlm->ServicePrincipalName) !=
|
|
Packit Service |
5a9772 |
ERROR_SUCCESS)
|
|
Packit |
1fb8d4 |
goto error;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
status = TRUE;
|
|
Packit |
1fb8d4 |
error:
|
|
Packit |
1fb8d4 |
free(hostnameX);
|
|
Packit |
1fb8d4 |
return status;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
/**
|
|
Packit |
1fb8d4 |
* SSPI Client Ceremony
|
|
Packit |
1fb8d4 |
*
|
|
Packit |
1fb8d4 |
* --------------
|
|
Packit |
1fb8d4 |
* ( Client Begin )
|
|
Packit |
1fb8d4 |
* --------------
|
|
Packit |
1fb8d4 |
* |
|
|
Packit |
1fb8d4 |
* |
|
|
Packit |
1fb8d4 |
* \|/
|
|
Packit |
1fb8d4 |
* -----------+--------------
|
|
Packit |
1fb8d4 |
* | AcquireCredentialsHandle |
|
|
Packit |
1fb8d4 |
* --------------------------
|
|
Packit |
1fb8d4 |
* |
|
|
Packit |
1fb8d4 |
* |
|
|
Packit |
1fb8d4 |
* \|/
|
|
Packit |
1fb8d4 |
* -------------+--------------
|
|
Packit |
1fb8d4 |
* +---------------> / InitializeSecurityContext /
|
|
Packit |
1fb8d4 |
* | ----------------------------
|
|
Packit |
1fb8d4 |
* | |
|
|
Packit |
1fb8d4 |
* | |
|
|
Packit |
1fb8d4 |
* | \|/
|
|
Packit |
1fb8d4 |
* --------------------------- ---------+------------- ----------------------
|
|
Packit |
1fb8d4 |
* / Receive blob from server / < Received security blob? > --Yes-> / Send blob to server /
|
|
Packit |
1fb8d4 |
* -------------+------------- ----------------------- ----------------------
|
|
Packit |
1fb8d4 |
* /|\ | |
|
|
Packit |
1fb8d4 |
* | No |
|
|
Packit |
1fb8d4 |
* Yes \|/ |
|
|
Packit |
1fb8d4 |
* | ------------+----------- |
|
|
Packit |
1fb8d4 |
* +---------------- < Received Continue Needed > <-----------------+
|
|
Packit |
1fb8d4 |
* ------------------------
|
|
Packit |
1fb8d4 |
* |
|
|
Packit |
1fb8d4 |
* No
|
|
Packit |
1fb8d4 |
* \|/
|
|
Packit |
1fb8d4 |
* ------+-------
|
|
Packit |
1fb8d4 |
* ( Client End )
|
|
Packit |
1fb8d4 |
* --------------
|
|
Packit |
1fb8d4 |
*/
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
BOOL ntlm_authenticate(rdpNtlm* ntlm, BOOL* pbContinueNeeded)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
SECURITY_STATUS status;
|
|
Packit |
1fb8d4 |
|
|
Packit Service |
5a9772 |
if ((!ntlm) || (!ntlm->table))
|
|
Packit Service |
5a9772 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG, "ntlm_authenticate: invalid ntlm context");
|
|
Packit Service |
5a9772 |
return FALSE;
|
|
Packit Service |
5a9772 |
}
|
|
Packit Service |
5a9772 |
|
|
Packit |
1fb8d4 |
if (ntlm->outputBuffer[0].pvBuffer)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
free(ntlm->outputBuffer[0].pvBuffer);
|
|
Packit |
1fb8d4 |
ntlm->outputBuffer[0].pvBuffer = NULL;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
ntlm->outputBufferDesc.ulVersion = SECBUFFER_VERSION;
|
|
Packit |
1fb8d4 |
ntlm->outputBufferDesc.cBuffers = 1;
|
|
Packit |
1fb8d4 |
ntlm->outputBufferDesc.pBuffers = ntlm->outputBuffer;
|
|
Packit |
1fb8d4 |
ntlm->outputBuffer[0].BufferType = SECBUFFER_TOKEN;
|
|
Packit |
1fb8d4 |
ntlm->outputBuffer[0].cbBuffer = ntlm->cbMaxToken;
|
|
Packit |
1fb8d4 |
ntlm->outputBuffer[0].pvBuffer = malloc(ntlm->outputBuffer[0].cbBuffer);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ntlm->outputBuffer[0].pvBuffer)
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (ntlm->haveInputBuffer)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
ntlm->inputBufferDesc.ulVersion = SECBUFFER_VERSION;
|
|
Packit |
1fb8d4 |
ntlm->inputBufferDesc.cBuffers = 1;
|
|
Packit |
1fb8d4 |
ntlm->inputBufferDesc.pBuffers = ntlm->inputBuffer;
|
|
Packit |
1fb8d4 |
ntlm->inputBuffer[0].BufferType = SECBUFFER_TOKEN;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (ntlm->Bindings)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
ntlm->inputBufferDesc.cBuffers++;
|
|
Packit |
1fb8d4 |
ntlm->inputBuffer[1].BufferType = SECBUFFER_CHANNEL_BINDINGS;
|
|
Packit |
1fb8d4 |
ntlm->inputBuffer[1].cbBuffer = ntlm->Bindings->BindingsLength;
|
|
Packit Service |
5a9772 |
ntlm->inputBuffer[1].pvBuffer = (void*)ntlm->Bindings->Bindings;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit Service |
5a9772 |
status = ntlm->table->InitializeSecurityContext(
|
|
Packit Service |
5a9772 |
&ntlm->credentials, (ntlm->haveContext) ? &ntlm->context : NULL,
|
|
Packit Service |
5a9772 |
(ntlm->ServicePrincipalName) ? ntlm->ServicePrincipalName : NULL, ntlm->fContextReq, 0,
|
|
Packit Service |
5a9772 |
SECURITY_NATIVE_DREP, (ntlm->haveInputBuffer) ? &ntlm->inputBufferDesc : NULL, 0,
|
|
Packit Service |
5a9772 |
&ntlm->context, &ntlm->outputBufferDesc, &ntlm->pfContextAttr, &ntlm->expiration);
|
|
Packit Service |
5a9772 |
WLog_VRB(TAG, "InitializeSecurityContext status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if ((status == SEC_I_COMPLETE_AND_CONTINUE) || (status == SEC_I_COMPLETE_NEEDED) ||
|
|
Packit |
1fb8d4 |
(status == SEC_E_OK))
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
if ((status != SEC_E_OK) && ntlm->table->CompleteAuthToken)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
SECURITY_STATUS cStatus;
|
|
Packit |
1fb8d4 |
cStatus = ntlm->table->CompleteAuthToken(&ntlm->context, &ntlm->outputBufferDesc);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (cStatus != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_WARN(TAG, "CompleteAuthToken status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(cStatus), cStatus);
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
status = ntlm->table->QueryContextAttributes(&ntlm->context, SECPKG_ATTR_SIZES,
|
|
Packit Service |
5a9772 |
&ntlm->ContextSizes);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG, "QueryContextAttributes SECPKG_ATTR_SIZES failure %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status == SEC_I_COMPLETE_NEEDED)
|
|
Packit |
1fb8d4 |
status = SEC_E_OK;
|
|
Packit |
1fb8d4 |
else if (status == SEC_I_COMPLETE_AND_CONTINUE)
|
|
Packit |
1fb8d4 |
status = SEC_I_CONTINUE_NEEDED;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (ntlm->haveInputBuffer)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
free(ntlm->inputBuffer[0].pvBuffer);
|
|
Packit |
1fb8d4 |
ntlm->inputBuffer[0].pvBuffer = NULL;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
ntlm->haveInputBuffer = TRUE;
|
|
Packit |
1fb8d4 |
ntlm->haveContext = TRUE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (pbContinueNeeded)
|
|
Packit |
1fb8d4 |
*pbContinueNeeded = (status == SEC_I_CONTINUE_NEEDED) ? TRUE : FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return TRUE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
static void ntlm_client_uninit(rdpNtlm* ntlm)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
free(ntlm->identity.User);
|
|
Packit |
1fb8d4 |
ntlm->identity.User = NULL;
|
|
Packit |
1fb8d4 |
free(ntlm->identity.Domain);
|
|
Packit |
1fb8d4 |
ntlm->identity.Domain = NULL;
|
|
Packit |
1fb8d4 |
free(ntlm->identity.Password);
|
|
Packit |
1fb8d4 |
ntlm->identity.Password = NULL;
|
|
Packit |
1fb8d4 |
free(ntlm->ServicePrincipalName);
|
|
Packit |
1fb8d4 |
ntlm->ServicePrincipalName = NULL;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (ntlm->table)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
SECURITY_STATUS status;
|
|
Packit |
1fb8d4 |
status = ntlm->table->FreeCredentialsHandle(&ntlm->credentials);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_WARN(TAG, "FreeCredentialsHandle status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
status = ntlm->table->FreeContextBuffer(ntlm->pPackageInfo);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_WARN(TAG, "FreeContextBuffer status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
status = ntlm->table->DeleteSecurityContext(&ntlm->context);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_WARN(TAG, "DeleteSecurityContext status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
ntlm->table = NULL;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
rdpNtlm* ntlm_new(void)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
rdpNtlm* ntlm;
|
|
Packit Service |
5a9772 |
ntlm = (rdpNtlm*)calloc(1, sizeof(rdpNtlm));
|
|
Packit |
1fb8d4 |
return ntlm;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
void ntlm_free(rdpNtlm* ntlm)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
if (!ntlm)
|
|
Packit |
1fb8d4 |
return;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (ntlm->outputBuffer[0].pvBuffer)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
free(ntlm->outputBuffer[0].pvBuffer);
|
|
Packit |
1fb8d4 |
ntlm->outputBuffer[0].pvBuffer = NULL;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
ntlm_client_uninit(ntlm);
|
|
Packit |
1fb8d4 |
free(ntlm);
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
SSIZE_T ntlm_client_get_context_max_size(rdpNtlm* ntlm)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
if (!ntlm)
|
|
Packit |
1fb8d4 |
return -1;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (ntlm->ContextSizes.cbMaxSignature > UINT16_MAX)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG,
|
|
Packit Service |
5a9772 |
"QueryContextAttributes SECPKG_ATTR_SIZES ContextSizes.cbMaxSignature > 0xFFFF");
|
|
Packit |
1fb8d4 |
return -1;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return ntlm->ContextSizes.cbMaxSignature;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
SSIZE_T ntlm_client_query_auth_size(rdpNtlm* ntlm)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
SECURITY_STATUS status;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ntlm || !ntlm->table || !ntlm->table->QueryContextAttributes)
|
|
Packit |
1fb8d4 |
return -1;
|
|
Packit |
1fb8d4 |
|
|
Packit Service |
5a9772 |
status =
|
|
Packit Service |
5a9772 |
ntlm->table->QueryContextAttributes(&ntlm->context, SECPKG_ATTR_SIZES, &ntlm->ContextSizes);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG, "QueryContextAttributes SECPKG_ATTR_SIZES failure %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(status), status);
|
|
Packit |
1fb8d4 |
return -1;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return ntlm_client_get_context_max_size(ntlm);
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
BOOL ntlm_client_encrypt(rdpNtlm* ntlm, ULONG fQOP, SecBufferDesc* Message, size_t sequence)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
SECURITY_STATUS encrypt_status;
|
|
Packit |
1fb8d4 |
const ULONG s = cast_from_size(sequence);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ntlm || !Message)
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
encrypt_status = ntlm->table->EncryptMessage(&ntlm->context, fQOP, Message, s);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (encrypt_status != SEC_E_OK)
|
|
Packit |
1fb8d4 |
{
|
|
Packit Service |
5a9772 |
WLog_ERR(TAG, "EncryptMessage status %s [0x%08" PRIX32 "]",
|
|
Packit |
1fb8d4 |
GetSecurityStatusString(encrypt_status), encrypt_status);
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return TRUE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
BOOL ntlm_client_set_input_buffer(rdpNtlm* ntlm, BOOL copy, const void* data, size_t size)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
if (!ntlm || !data || (size == 0))
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
ntlm->inputBuffer[0].cbBuffer = cast_from_size(size);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (copy)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
ntlm->inputBuffer[0].pvBuffer = malloc(size);
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
if (!ntlm->inputBuffer[0].pvBuffer)
|
|
Packit |
1fb8d4 |
return FALSE;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
memcpy(ntlm->inputBuffer[0].pvBuffer, data, size);
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
else
|
|
Packit |
1fb8d4 |
ntlm->inputBuffer[0].pvBuffer = (void*)data;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return TRUE;
|
|
Packit |
1fb8d4 |
}
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
const SecBuffer* ntlm_client_get_output_buffer(rdpNtlm* ntlm)
|
|
Packit |
1fb8d4 |
{
|
|
Packit |
1fb8d4 |
if (!ntlm)
|
|
Packit |
1fb8d4 |
return NULL;
|
|
Packit |
1fb8d4 |
|
|
Packit |
1fb8d4 |
return &ntlm->outputBuffer[0];
|
|
Packit |
1fb8d4 |
}
|