comparison src/ntlm.c @ 11375:7e98b3bf2fdf

[gaim-migrate @ 13601] ntlm api committer: Tailor Script <tailor@pidgin.im>
author Thomas Butter <tbutter>
date Tue, 30 Aug 2005 18:22:28 +0000
parents
children e2ebebcae270
comparison
equal deleted inserted replaced
11374:6d3d44c60a86 11375:7e98b3bf2fdf
1 /**
2 * @file ntlm.c
3 *
4 * gaim
5 *
6 * Copyright (C) 2005 Thomas Butter <butter@uni-mannheim.de>
7 *
8 * hashing done according to description of NTLM on
9 * http://www.innovation.ch/java/ntlm.html
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 */
25
26 #include <glib.h>
27 #include <stdlib.h>
28 #include "util.h"
29 #include "ntlm.h"
30 #include "cipher.h"
31 #include <string.h>
32
33 struct type1_message {
34 guint8 protocol[8]; /* 'N', 'T', 'L', 'M', 'S', 'S', 'P', '\0' */
35 guint8 type; /* 0x01 */
36 guint8 zero1[3];
37 short flags; /* 0xb203 */
38 guint8 zero2[2];
39
40 short dom_len1; /* domain string length */
41 short dom_len2; /* domain string length */
42 short dom_off; /* domain string offset */
43 guint8 zero3[2];
44
45 short host_len1; /* host string length */
46 short host_len2; /* host string length */
47 short host_off; /* host string offset (always 0x20) */
48 guint8 zero4[2];
49
50 /* guint8 host[*]; // host string (ASCII)
51 guint8 dom[*]; // domain string (ASCII) */
52 };
53
54 struct type2_message {
55 guint8 protocol[8]; /* 'N', 'T', 'L', 'M', 'S', 'S', 'P', '\0'*/
56 guint8 type; /* 0x02 */
57 guint8 zero1[7];
58 short msg_len; /* 0x28 */
59 guint8 zero2[2];
60 short flags; /* 0x8201 */
61 guint8 zero3[2];
62
63 guint8 nonce[8]; /* nonce */
64 guint8 zero[8];
65 };
66
67 struct type3_message {
68 guint8 protocol[8]; /* 'N', 'T', 'L', 'M', 'S', 'S', 'P', '\0'*/
69 guint8 type; /* 0x03 */
70 guint8 zero1[3];
71
72 short lm_resp_len1; /* LanManager response length (always 0x18)*/
73 short lm_resp_len2; /* LanManager response length (always 0x18)*/
74 short lm_resp_off; /* LanManager response offset */
75 guint8 zero2[2];
76
77 short nt_resp_len1; /* NT response length (always 0x18) */
78 short nt_resp_len2; /* NT response length (always 0x18) */
79 short nt_resp_off; /* NT response offset */
80 guint8 zero3[2];
81
82 short dom_len1; /* domain string length */
83 short dom_len2; /* domain string length */
84 short dom_off; /* domain string offset (always 0x40) */
85 guint8 zero4[2];
86
87 short user_len1; /* username string length */
88 short user_len2; /* username string length */
89 short user_off; /* username string offset */
90 guint8 zero5[2];
91
92 short host_len1; /* host string length */
93 short host_len2; /* host string length */
94 short host_off; /* host string offset */
95 guint8 zero6[6];
96
97 short msg_len; /* message length */
98 guint8 zero7[2];
99
100 short flags; /* 0x8201 */
101 guint8 zero8[2];
102
103 /* guint8 dom[*]; // domain string (unicode UTF-16LE)
104 guint8 user[*]; // username string (unicode UTF-16LE)
105 guint8 host[*]; // host string (unicode UTF-16LE)
106 guint8 lm_resp[*]; // LanManager response
107 guint8 nt_resp[*]; // NT response*/
108 };
109
110 gchar *gaim_ntlm_gen_type1(gchar *hostname, gchar *domain) {
111 char *msg = g_malloc0(sizeof(struct type1_message) + strlen(hostname) + strlen(domain));
112 struct type1_message *tmsg = (struct type1_message*)msg;
113 tmsg->protocol[0] = 'N';
114 tmsg->protocol[1] = 'T';
115 tmsg->protocol[2] = 'L';
116 tmsg->protocol[3] = 'M';
117 tmsg->protocol[4] = 'S';
118 tmsg->protocol[5] = 'S';
119 tmsg->protocol[6] = 'P';
120 tmsg->protocol[7] = '\0';
121 tmsg->type= 0x01;
122 tmsg->flags = 0xb202;
123 tmsg->dom_len1 = tmsg->dom_len2 = strlen(domain);
124 tmsg->dom_off = 32+strlen(hostname);
125 tmsg->host_len1 = tmsg->host_len2 = strlen(hostname);
126 tmsg->host_off= 32;
127 memcpy(msg+sizeof(struct type1_message),hostname,strlen(hostname));
128 memcpy(msg+sizeof(struct type1_message)+strlen(hostname),domain,strlen(domain));
129
130 return gaim_base64_encode(msg, sizeof(struct type1_message) + strlen(hostname) + strlen(domain));
131 }
132
133 gchar *gaim_ntlm_parse_type2(gchar *type2) {
134 int retlen;
135 static gchar nonce[8];
136 struct type2_message *tmsg = (struct type2_message*)gaim_base64_decode(type2, &retlen);
137 memcpy(nonce, tmsg->nonce, 8);
138 g_free(tmsg);
139 return nonce;
140 }
141
142 static void setup_des_key(unsigned char key_56[], char *key)
143 {
144 key[0] = key_56[0];
145 key[1] = ((key_56[0] << 7) & 0xFF) | (key_56[1] >> 1);
146 key[2] = ((key_56[1] << 6) & 0xFF) | (key_56[2] >> 2);
147 key[3] = ((key_56[2] << 5) & 0xFF) | (key_56[3] >> 3);
148 key[4] = ((key_56[3] << 4) & 0xFF) | (key_56[4] >> 4);
149 key[5] = ((key_56[4] << 3) & 0xFF) | (key_56[5] >> 5);
150 key[6] = ((key_56[5] << 2) & 0xFF) | (key_56[6] >> 6);
151 key[7] = (key_56[6] << 1) & 0xFF;
152 }
153
154 /*
155 * helper function for gaim cipher.c
156 */
157 static void des_ecb_encrypt(char *plaintext, char *result, char *key) {
158 GaimCipher *cipher;
159 GaimCipherContext *context;
160 int outlen;
161
162 cipher = gaim_ciphers_find_cipher("des");
163 context = gaim_cipher_context_new(cipher, NULL);
164 gaim_cipher_context_set_key(context, key);
165 gaim_cipher_context_encrypt(context, plaintext, 8, result, &outlen);
166 gaim_cipher_context_destroy(context);
167 }
168
169 /*
170 * takes a 21 byte array and treats it as 3 56-bit DES keys. The
171 * 8 byte plaintext is encrypted with each key and the resulting 24
172 * bytes are stored in the results array.
173 */
174 static void calc_resp(unsigned char *keys, unsigned char *plaintext, unsigned char *results)
175 {
176 gchar key[8];
177 setup_des_key(keys, key);
178 des_ecb_encrypt(plaintext, results, key);
179
180 setup_des_key(keys+7, key);
181 des_ecb_encrypt(plaintext, (results+8), key);
182
183 setup_des_key(keys+14, key);
184 des_ecb_encrypt(plaintext, (results+16), key);
185 }
186
187 gchar *gaim_ntlm_gen_type3(gchar *username, gchar *passw, gchar *hostname, gchar *domain, gchar *nonce) {
188 char lm_pw[14];
189 unsigned char lm_hpw[21];
190 gchar key[8];
191 struct type3_message *tmsg = g_malloc0(sizeof(struct type3_message)+
192 strlen(domain) + strlen(username) + strlen(hostname) + 24 +24);
193 int len = strlen(passw);
194 unsigned char lm_resp[24], nt_resp[24];
195 unsigned char magic[] = { 0x4B, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 };
196 unsigned char nt_hpw[21];
197 int lennt;
198 char nt_pw[128];
199 GaimCipher *cipher;
200 GaimCipherContext *context;
201 char *tmp = 0;
202 int idx = 0;
203
204 /* type3 message initialization */
205 tmsg->protocol[0] = 'N';
206 tmsg->protocol[1] = 'T';
207 tmsg->protocol[2] = 'L';
208 tmsg->protocol[3] = 'M';
209 tmsg->protocol[4] = 'S';
210 tmsg->protocol[5] = 'S';
211 tmsg->protocol[6] = 'P';
212 tmsg->type = 0x03;
213 tmsg->lm_resp_len1 = tmsg->lm_resp_len2 = 0x18;
214 tmsg->lm_resp_off = sizeof(struct type3_message) + strlen(domain) + strlen(username) + strlen(hostname);
215 tmsg->nt_resp_len1 = tmsg->nt_resp_len2 = 0x18;
216 tmsg->nt_resp_off = sizeof(struct type3_message) + strlen(domain) + strlen(username) + strlen(hostname) + 0x18;
217
218 tmsg->dom_len1 = tmsg->dom_len2 = strlen(domain);
219 tmsg->dom_off = 0x40;
220
221 tmsg->user_len1 = tmsg->user_len2 = strlen(username);
222 tmsg->user_off = sizeof(struct type3_message) + strlen(domain);
223
224 tmsg->host_len1 = tmsg->host_len2 = strlen(hostname);
225 tmsg->host_off = sizeof(struct type3_message) + strlen(domain) + strlen(username);
226
227 tmsg->msg_len = sizeof(struct type3_message) + strlen(domain) + strlen(username) + strlen(hostname) + 0x18 + 0x18;
228 tmsg->flags = 0x8200;
229
230 tmp = ((char*) tmsg) + sizeof(struct type3_message);
231 strcpy(tmp, domain);
232 tmp += strlen(domain);
233 strcpy(tmp, username);
234 tmp += strlen(username);
235 strcpy(tmp, hostname);
236 tmp += strlen(hostname);
237
238 if (len > 14) len = 14;
239
240 for (idx=0; idx<len; idx++)
241 lm_pw[idx] = g_ascii_toupper(passw[idx]);
242 for (; idx<14; idx++)
243 lm_pw[idx] = 0;
244
245 setup_des_key(lm_pw, key);
246 des_ecb_encrypt(magic, lm_hpw, key);
247
248 setup_des_key(lm_pw+7, key);
249 des_ecb_encrypt(magic, lm_hpw+8, key);
250
251 memset(lm_hpw+16, 0, 5);
252
253
254 lennt = strlen(passw);
255 for (idx=0; idx<lennt; idx++)
256 {
257 nt_pw[2*idx] = passw[idx];
258 nt_pw[2*idx+1] = 0;
259 }
260
261 cipher = gaim_ciphers_find_cipher("md4");
262 context = gaim_cipher_context_new(cipher, NULL);
263 gaim_cipher_context_append(context, nt_pw, 2*lennt);
264 gaim_cipher_context_digest(context, 21, nt_hpw, NULL);
265 gaim_cipher_context_destroy(context);
266
267 memset(nt_hpw+16, 0, 5);
268
269
270 calc_resp(lm_hpw, nonce, lm_resp);
271 calc_resp(nt_hpw, nonce, nt_resp);
272 memcpy(tmp, lm_resp, 0x18);
273 memcpy(tmp+0x18, nt_resp, 0x18);
274 tmp = gaim_base64_encode((guchar*) tmsg, tmsg->msg_len);
275 g_free(tmsg);
276 return tmp;
277 }