Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

508 lines
18 KiB

//+-----------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (c) Microsoft Corporation 1992 - 1996
//
// File: auth.h
//
// Contents: include file for auth.cxx for NTDigest
//
//
// History: KDamour 15Mar00 Stolen from msv_sspi\global.h
//
//------------------------------------------------------------------------
#ifndef NTDIGEST_AUTH_H
#define NTDIGEST_AUTH_H
// #include "nonce.h"
#if SECURITY_KERNEL
extern "C"
{
// #include <rc4.h> // How to use RC4 routine
#include <md5.h> // For md5init(), md5update(), md5final()
// #include <hmac.h>
}
#endif // SECURITY_KERNEL
#define MD5_HASH_BYTESIZE 16 // MD5 hash size
#define MD5_HASH_HEX_SIZE (2*MD5_HASH_BYTESIZE) // BYTES needed to store a Hash as hex Encoded
// Contains all of the pointers and lengths for directives used in
// calculating the digest access values. Usually the
// parameters point to an external buffer, pHTTPBuffer
enum DIGEST_TYPE
{
DIGEST_UNDEFINED, // Initial state
NO_DIGEST_SPECIFIED,
DIGEST_CLIENT,
DIGEST_SERVER,
SASL_SERVER,
SASL_CLIENT
};
enum QOP_TYPE
{
QOP_UNDEFINED, // Initial state
NO_QOP_SPECIFIED,
AUTH,
AUTH_INT,
AUTH_CONF
};
typedef QOP_TYPE *PQOP_TYPE;
enum ALGORITHM_TYPE
{
ALGORITHM_UNDEFINED, // Initial state
NO_ALGORITHM_SPECIFIED,
MD5,
MD5_SESS
};
enum CHARSET_TYPE
{
CHARSET_UNDEFINED, // Initial state
ISO_8859_1,
UTF_8, // UTF-8 encoding
UTF_8_SUBSET // ISO_8859_1 subset in UTF-8
};
enum CIPHER_TYPE
{
CIPHER_UNDEFINED,
CIPHER_3DES,
CIPHER_DES, // 56bit key
CIPHER_RC4_40,
CIPHER_RC4, // 128bit key
CIPHER_RC4_56
};
enum DIGESTMODE_TYPE
{
DIGESTMODE_UNDEFINED,
DIGESTMODE_HTTP,
DIGESTMODE_SASL
};
enum NAMEFORMAT_TYPE
{
NAMEFORMAT_UNKNOWN,
NAMEFORMAT_ACCOUNTNAME,
NAMEFORMAT_UPN,
NAMEFORMAT_NETBIOS
};
// For list of supported protocols
// Pack supported cyphers into a WORD (2 bytes)
#define SUPPORT_3DES 0x0001
#define SUPPORT_DES 0x0002
#define SUPPORT_RC4_40 0x0004
#define SUPPORT_RC4 0x0008
#define SUPPORT_RC4_56 0x0010
// Strings for the challenge and challengeResponse
#define STR_CIPHER_3DES "3des"
#define STR_CIPHER_DES "des"
#define STR_CIPHER_RC4_40 "rc4-40"
#define STR_CIPHER_RC4 "rc4"
#define STR_CIPHER_RC4_56 "rc4-56"
#define WSTR_CIPHER_HMAC_MD5 L"HMAC_MD5"
#define WSTR_CIPHER_RC4 L"RC4"
#define WSTR_CIPHER_DES L"DES"
#define WSTR_CIPHER_3DES L"3DES"
#define WSTR_CIPHER_MD5 L"MD5"
// Default string for realm directives in challenges
#define STR_DIGEST_DOMAIN "Digest"
#define WSTR_DIGEST_DOMAIN L"Digest"
typedef enum _eSignSealOp {
eSign, // MakeSignature is calling
eVerify, // VerifySignature is calling
eSeal, // SealMessage is calling
eUnseal // UnsealMessage is calling
} eSignSealOp;
// Supplimental credentals stored in the DC (pre-calculated Digest Hashes
#define SUPPCREDS_VERSION 1
#define NUMPRECALC_HEADERS 29
#define TOTALPRECALC_HEADERS (NUMPRECALC_HEADERS + 1)
// Supp Creds format '1' 0 version numhashes 0 0 0 0 0 0 0 0 0 0 0 0
#define SUPPCREDS_VERSIONLOC 2
#define SUPPCREDS_CNTLOC 3
// Format in supplimental credentials U UPPER() D LOWER() n normal passed in value
#define NAME_HEADER 0
#define NAME_ACCT 1
#define NAME_ACCT_DOWNCASE 2
#define NAME_ACCT_UPCASE 3
#define NAME_ACCT_DUCASE 4
#define NAME_ACCT_UDCASE 5
#define NAME_ACCT_NUCASE 6
#define NAME_ACCT_NDCASE 7
#define NAME_ACCTDNS 8
#define NAME_ACCTDNS_DOWNCASE 9
#define NAME_ACCTDNS_UPCASE 10
#define NAME_ACCTDNS_DUCASE 11
#define NAME_ACCTDNS_UDCASE 12
#define NAME_ACCTDNS_NUCASE 13
#define NAME_ACCTDNS_NDCASE 14
#define NAME_UPN 15
#define NAME_UPN_DOWNCASE 16
#define NAME_UPN_UPCASE 17
#define NAME_NT4 18
#define NAME_NT4_DOWNCASE 19
#define NAME_NT4_UPCASE 20
// Fixed realm to STR_DIGEST_DOMAIN
#define NAME_ACCT_FREALM 21
#define NAME_ACCT_FREALM_DOWNCASE 22
#define NAME_ACCT_FREALM_UPCASE 23
#define NAME_UPN_FREALM 24
#define NAME_UPN_FREALM_DOWNCASE 25
#define NAME_UPN_FREALM_UPCASE 26
#define NAME_NT4_FREALM 27
#define NAME_NT4_FREALM_DOWNCASE 28
#define NAME_NT4_FREALM_UPCASE 29
//
// value names used by MD5 authentication.
//
enum MD5_AUTH_NAME
{
MD5_AUTH_USERNAME = 0,
MD5_AUTH_REALM,
MD5_AUTH_NONCE,
MD5_AUTH_CNONCE,
MD5_AUTH_NC,
MD5_AUTH_ALGORITHM,
MD5_AUTH_QOP,
MD5_AUTH_METHOD,
MD5_AUTH_URI,
MD5_AUTH_RESPONSE,
MD5_AUTH_HENTITY,
MD5_AUTH_AUTHZID, // for SASL
// Above this list are Marshalled to DC as BlobData
MD5_AUTH_DOMAIN,
MD5_AUTH_STALE,
MD5_AUTH_OPAQUE,
MD5_AUTH_MAXBUF,
MD5_AUTH_CHARSET,
MD5_AUTH_CIPHER,
MD5_AUTH_DIGESTURI, // for SASL mapped to MD5_AUTH_URI
MD5_AUTH_RSPAUTH, // verify server has auth data
MD5_AUTH_NEXTNONCE,
MD5_AUTH_LAST
};
// Structure to pass around that contains the parameters for the Digest Calculation
typedef struct _DIGEST_PARAMETER
{
DIGEST_TYPE typeDigest;
USHORT usFlags; // Flags defined in DIGEST_BLOB_REQUEST
ALGORITHM_TYPE typeAlgorithm;
QOP_TYPE typeQOP;
CIPHER_TYPE typeCipher;
CHARSET_TYPE typeCharset;
STRING refstrParam[MD5_AUTH_LAST]; // referenced - points to non-owned memory- do not free up these Strings
USHORT usDirectiveCnt[MD5_AUTH_LAST]; // count of the number of times directive is utilized
UNICODE_STRING ustrRealm; // extracted from the digest auth directive values
UNICODE_STRING ustrUsername; // extracted from the digest auth directive values
// Info extracted from Username & Realm - used for auditing and open SAM useraccount
NAMEFORMAT_TYPE typeName;
UNICODE_STRING ustrCrackedAccountName; // SAMAccount name from extracted from ustrUsername & ustrRealm
UNICODE_STRING ustrCrackedDomain; // Domain from ustrUsername & ustrRealm
UNICODE_STRING ustrWorkstation; // Name of workstation/server making Digest request
STRING strUsernameEncoded; // contains a copy of the encoded string used in challengeresponse
STRING strRealmEncoded; // contains a copy of the realm
STRING strDirective[MD5_AUTH_LAST]; // NULL terminated strings that contain directive values
STRING strSessionKey; // String for Sessionkey (points to chSessionKey)
// STRINGS Alloced by DigestInit and Freed by DigestFree
STRING strResponse; // String for the BinHex Hashed Response
// Trust information for this request
ULONG ulTrustDirection;
ULONG ulTrustType;
ULONG ulTrustAttributes;
PSID pTrustSid;
UNICODE_STRING ustrTrustedForest;
} DIGEST_PARAMETER, *PDIGEST_PARAMETER;
// Structure to extract MD5 hashes and passwords for user accounts
typedef struct _USER_CREDENTIALS
{
UNICODE_STRING ustrUsername; // username value to use in H(Username:realm:password) calc
UNICODE_STRING ustrRealm; // realm value to use in H(username:realm:password)
// The following fields might be filled in
// Will check any precalculated hashes first and then try the password if available
BOOL fIsValidPasswd; // set true if password is valid
BOOL fIsValidDigestHash; // set true if hash is valid
BOOL fIsEncryptedPasswd; // set to TRUE is passwd encrypted
SHORT wHashSelected; // if hash valid, index to process
SHORT sHashTags[TOTALPRECALC_HEADERS]; // indicate which hashes match username format
UNICODE_STRING ustrPasswd;
STRING strDigestHash;
USHORT usDigestHashCnt; // number of pre-calc hashes in credential
} USER_CREDENTIALS, *PUSER_CREDENTIALS;
// Data to use GenericPassthrough to send to the DC for processing
// The server will create the data, BlobData, and it will be wraped for
// transport over GenericPassthrough to the DC. The DC will be presented
// with only the BlobData to process
// ALL directive-values have a NULL terminator attached to each directive
// ALL directive-values are UNQUOTED unq("X") -> X
// cbBlobSize has number of bytes to hold header and the string data
// cbCharValues has number of bytes to hold string data
// This way future revs can Version++, increase cbBlobSize, and append to message
//
// Data Format
//
// USHORT Version
// USHORT cbBlobSize
// USHORT DIGEST_TYPE
// USHORT cbCharValues
//
// CHAR[cbUserName+1] unq(username-value)
// CHAR[cbRealm+1] unq(realm-value)
// CHAR[cbNonce+1] unq(nonce-value)
// CHAR[cbCnonce+1] unq(cnonce-value)
// CHAR[cbNC+1] unq(nc-value)
// CHAR[cbAlgorithm+1] unq(algorithm-value)
// CHAR[cbQOP+1] unq(qop-value)
// CHAR[cbMethod+1] Method
// CHAR[cbURI+1] unq(digest-uri-value)
// CHAR[cbReqDigest+1] unq(request-digest)
// CHAR[cbHEntity+1] unq(H(entity-body)) * maybe NULL only for qop="auth"
// CHAR[cbAuthzId+1] unq(AuthzId-value)
//
//
#define DIGEST_BLOB_VERSION 1
#define DIGEST_BLOB_VALUES 12 // How many field-values are sent over
// Values for separators detweent field-values
#define COLONSTR ":"
#define COLONSTR_LEN 1
#define AUTHSTR "auth"
#define AUTHSTR_LEN 4
#define AUTHINTSTR "auth-int"
#define AUTHINTSTR_LEN 8
#define AUTHCONFSTR "auth-conf"
#define AUTHCONFSTR_LEN 9
#define MAX_AUTH_LENGTH AUTHCONFSTR_LEN
#define MD5STR "MD5"
#define MD5_SESSSTR "MD5-sess"
#define MD5_SESS_SASLSTR "md5-sess"
#define MD5_UTF8STR "utf-8"
#define URI_STR "uri"
#define DIGESTURI_STR "digest-uri"
// SASL paramters
#define AUTHENTICATESTR "AUTHENTICATE"
#define ZERO32STR "00000000000000000000000000000000"
#define SASL_C2S_SIGN_KEY "Digest session key to client-to-server signing key magic constant"
#define SASL_S2C_SIGN_KEY "Digest session key to server-to-client signing key magic constant"
#define SASL_C2S_SEAL_KEY "Digest H(A1) to client-to-server sealing key magic constant"
#define SASL_S2C_SEAL_KEY "Digest H(A1) to server-to-client sealing key magic constant"
// number of bytes to hold ChallengeResponse directives and symbols (actual count is 107) round up for padding
// 14 for charset
#define CB_CHALRESP 375
#define CB_CHAL 400
// Number of characters in the NonceCount (hex digits)
#define NCNUM 8
#define NCFIRST "00000001"
// Flags used in DIGEST_PARAMETER usFlags and in Digest_blob_request
#define FLAG_CRACKNAME_ON_DC 0x00000001 // Name in Username & Realm needs to be processed on DC
#define FLAG_AUTHZID_PROVIDED 0x00000002
#define FLAG_SERVERS_DOMAIN 0x00000004 // Indicate on Server's DC (first hop from server) so expand group membership
#define FLAG_NOBS_DECODE 0x00000008 // if set to one, the wire communication is done without backslash encoding
#define FLAG_BS_ENCODE_CLIENT_BROKEN 0x00000010 // set to TRUE if backslash encoding is possibly boken on client
#define FLAG_QUOTE_QOP 0x00000020 // set according to the context if quote the QOP - client side only
// For Context Flags
#define FLAG_CONTEXT_AUTHZID_PROVIDED 0x00000002
#define FLAG_CONTEXT_QUOTE_QOP 0x00000004 // for compat quote the QOP directive on ChallengeResponse
#define FLAG_CONTEXT_NOBS_DECODE 0x00000008 // if set to one, the wire communication is done without backslash encoding
#define FLAG_CONTEXT_PARTIAL 0x00000010 // set if context is only partial - not valid for auth processing
#define FLAG_CONTEXT_REFCOUNT 0x00000020 // a securitycontext handle was issued by ASC/ISC - ref count app count
#define FLAG_CONTEXT_SERVER 0x00000040 // context was created in ASC server side if set, otherwise in ISC client
// Overlay header for getting values in Generic Passthrough request
typedef struct _DIGEST_BLOB_REQUEST
{
ULONG MessageType;
USHORT version;
USHORT cbBlobSize;
USHORT digest_type;
USHORT qop_type;
USHORT alg_type;
USHORT charset_type;
USHORT cbCharValues;
USHORT name_format;
USHORT usFlags;
USHORT cbAccountName;
USHORT cbCrackedDomain;
USHORT cbWorkstation;
USHORT ulReserved3;
ULONG64 pad1;
char cCharValues; // dummy char to mark start of field-values
} DIGEST_BLOB_REQUEST, *PDIGEST_BLOB_REQUEST;
// Supported MesageTypes
#define VERIFY_DIGEST_MESSAGE 0x1a // No specific value is needed
#define VERIFY_DIGEST_MESSAGE_RESPONSE 0x0a // No specific value is needed
// The response for the GenericPassthrough call is the status of the Digest Authentication
// Note: This is a fixed length response header - Authdata length not static
// Format for data sent back
// DIGEST_BLOB_RESPONSE AuthData UnicodeStringAccountName
typedef struct _DIGEST_BLOB_RESPONSE
{
ULONG MessageType;
USHORT version;
NTSTATUS Status; // Information on Success of Digest Auth
USHORT SessionKeyMaxLength;
ULONG ulAuthDataSize;
USHORT usAcctNameSize; // size of the NetBIOS name (after AuthData)
USHORT ulReserved1;
ULONG ulBlobSize; // size of entire blob sent as response
ULONG ulReserved3;
char SessionKey[MD5_HASH_HEX_SIZE + 1];
ULONG64 pad1;
char cAuthData; // Start of AuthData opaque data
// Place group info here for LogonUser
} DIGEST_BLOB_RESPONSE, *PDIGEST_BLOB_RESPONSE;
// SASL MAC block
// Total of 16 bytes per rfc2831 sect 2.3
// first 10 bytes of HMAC-MD5 [ RFC 2104]
// 2-byte message type number fixed to value 1 (0x0001)
// 4-byte sequence number
// NOTE: This is using WORD as a 2 byte value and DWORD as a 4 byte value!
#define HMAC_MD5_HASH_BYTESIZE 16 // MHAC-MD5 hash size per RFC 2104
#define SASL_MAC_HMAC_SIZE 10
#define SASL_MAC_MSG_SIZE 2
#define SASL_MAC_SEQ_SIZE 4
typedef struct _SASL_MAC_BLOCK
{
UCHAR hmacMD5[SASL_MAC_HMAC_SIZE];
WORD wMsgType;
DWORD dwSeqNumber;
} SASL_MAC_BLOCK, *PSASL_MAC_BLOCK;
// The SASL MAC Block is 16 bytes: RFC 2831 sect 2.4
#define MAC_BLOCK_SIZE sizeof(SASL_MAC_BLOCK)
#define MAX_PADDING 8 // max padding is currently 8 for DES
// Perform Digest Access Calculation
NTSTATUS NTAPI DigestCalculation(IN PDIGEST_PARAMETER pDigest, IN PUSER_CREDENTIALS pUserCreds);
// Simple checks for enough data for Digest calculation
NTSTATUS NTAPI DigestIsValid(IN PDIGEST_PARAMETER pDigest);
// Initialize the DIGEST_PARAMETER structure
NTSTATUS NTAPI DigestInit(IN PDIGEST_PARAMETER pDigest);
// Clear out the digest & free memory from Digest struct
NTSTATUS NTAPI DigestFree(IN PDIGEST_PARAMETER pDigest);
// Perform Digest Access Calculation for ChallengeResponse
NTSTATUS NTAPI DigestCalcChalRsp(IN PDIGEST_PARAMETER pDigest,
IN PUSER_CREDENTIALS pUserCreds,
BOOL bIsChallenge);
NTSTATUS PrecalcDigestHash(
IN PUNICODE_STRING pustrUsername,
IN PUNICODE_STRING pustrRealm,
IN PUNICODE_STRING pustrPassword,
OUT PCHAR pHexHash,
IN OUT PUSHORT piHashSize);
NTSTATUS PrecalcForms(
IN PUNICODE_STRING pustrUsername,
IN PUNICODE_STRING pustrRealm,
IN PUNICODE_STRING pustrPassword,
IN BOOL fFixedRealm,
OUT PCHAR pHexHash,
IN OUT PUSHORT piHashSize);
// Creates the Output SecBuffer for the Challenge Response
NTSTATUS NTAPI DigestCreateChalResp(IN PDIGEST_PARAMETER pDigest,
IN PUSER_CREDENTIALS pUserCreds,
OUT PSecBuffer OutBuffer);
// Parse input string into Parameter section of Digest
NTSTATUS DigestParser2(PSecBuffer pInputBuf, PSTR *pNameTable,UINT cNameTable, PDIGEST_PARAMETER pDigest);
// Hash and Encode upto 7 STRINGS SOut = Hex(H(S1 ":" S2 ... ":" S7))
NTSTATUS NTAPI DigestHash7(IN PSTRING pS1, IN PSTRING pS2, IN PSTRING pS3,
IN PSTRING pS4, IN PSTRING pS5, IN PSTRING pS6, IN PSTRING pS7,
IN BOOL fHexOut,
OUT PSTRING pSOut);
// Formatted printout of Digest Parameters
NTSTATUS DigestPrint(PDIGEST_PARAMETER pDigest);
#ifndef SECURITY_KERNEL
// Processed parsed digest auth message and fill in string values
NTSTATUS NTAPI DigestDecodeDirectiveStrings(IN OUT PDIGEST_PARAMETER pDigest);
// Determine H(A1) for Digest Access
NTSTATUS NTAPI DigestCalcHA1(IN PDIGEST_PARAMETER pDigest, PUSER_CREDENTIALS pUserCreds);
// Encode the Digest Access Parameters fields into a BYTE Buffer
NTSTATUS NTAPI BlobEncodeRequest(IN PDIGEST_PARAMETER pDigest, OUT BYTE **ppBuffer, OUT USHORT *cbBuffer);
// Decode the Digest Access Parameters fields from a BYTE Buffer
NTSTATUS NTAPI BlobDecodeRequest(IN USHORT cbMessageRequest,
IN BYTE *pBuffer,
PDIGEST_PARAMETER pDigest);
// Free BYTE Buffer from BlobEncodeRequest
VOID NTAPI BlobFreeRequest(BYTE *pBuffer);
#endif // SECURITY_KERNEL
#endif // NTDIGEST_AUTH_H