author | Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com> |
Fri, 19 Feb 2010 23:40:16 +0200 | |
branch | RCL_3 |
changeset 4 | 3b1da2848fc7 |
parent 0 | 1918ee327afb |
child 5 | d3bac044e0f0 |
permissions | -rw-r--r-- |
0 | 1 |
/**************************************************************************** |
2 |
** |
|
4
3b1da2848fc7
Revision: 201003
Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
parents:
0
diff
changeset
|
3 |
** Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies). |
0 | 4 |
** All rights reserved. |
5 |
** Contact: Nokia Corporation (qt-info@nokia.com) |
|
6 |
** |
|
7 |
** This file is part of the QtNetwork module of the Qt Toolkit. |
|
8 |
** |
|
9 |
** $QT_BEGIN_LICENSE:LGPL$ |
|
10 |
** No Commercial Usage |
|
11 |
** This file contains pre-release code and may not be distributed. |
|
12 |
** You may use this file in accordance with the terms and conditions |
|
13 |
** contained in the Technology Preview License Agreement accompanying |
|
14 |
** this package. |
|
15 |
** |
|
16 |
** GNU Lesser General Public License Usage |
|
17 |
** Alternatively, this file may be used under the terms of the GNU Lesser |
|
18 |
** General Public License version 2.1 as published by the Free Software |
|
19 |
** Foundation and appearing in the file LICENSE.LGPL included in the |
|
20 |
** packaging of this file. Please review the following information to |
|
21 |
** ensure the GNU Lesser General Public License version 2.1 requirements |
|
22 |
** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. |
|
23 |
** |
|
24 |
** In addition, as a special exception, Nokia gives you certain additional |
|
25 |
** rights. These rights are described in the Nokia Qt LGPL Exception |
|
26 |
** version 1.1, included in the file LGPL_EXCEPTION.txt in this package. |
|
27 |
** |
|
28 |
** If you have questions regarding the use of this file, please contact |
|
29 |
** Nokia at qt-info@nokia.com. |
|
30 |
** |
|
31 |
** |
|
32 |
** |
|
33 |
** |
|
34 |
** |
|
35 |
** |
|
36 |
** |
|
37 |
** |
|
38 |
** $QT_END_LICENSE$ |
|
39 |
** |
|
40 |
****************************************************************************/ |
|
41 |
||
42 |
#include <qauthenticator.h> |
|
43 |
#include <qauthenticator_p.h> |
|
44 |
#include <qdebug.h> |
|
45 |
#include <qhash.h> |
|
46 |
#include <qbytearray.h> |
|
47 |
#include <qcryptographichash.h> |
|
48 |
#include <qhttp.h> |
|
49 |
#include <qiodevice.h> |
|
50 |
#include <qdatastream.h> |
|
51 |
#include <qendian.h> |
|
52 |
#include <qstring.h> |
|
53 |
||
54 |
QT_BEGIN_NAMESPACE |
|
55 |
||
56 |
#include "../../3rdparty/des/des.cpp" |
|
57 |
||
58 |
static QByteArray qNtlmPhase1(); |
|
59 |
static QByteArray qNtlmPhase3(QAuthenticatorPrivate *ctx, const QByteArray& phase2data); |
|
60 |
||
61 |
/*! |
|
62 |
\class QAuthenticator |
|
63 |
\brief The QAuthenticator class provides an authentication object. |
|
64 |
\since 4.3 |
|
65 |
||
66 |
\reentrant |
|
67 |
\ingroup network |
|
68 |
\inmodule QtNetwork |
|
69 |
||
70 |
The QAuthenticator class is usually used in the |
|
71 |
\l{QNetworkAccessManager::}{authenticationRequired()} and |
|
72 |
\l{QNetworkAccessManager::}{proxyAuthenticationRequired()} signals of QNetworkAccessManager and |
|
73 |
QAbstractSocket. The class provides a way to pass back the required |
|
74 |
authentication information to the socket when accessing services that |
|
75 |
require authentication. |
|
76 |
||
77 |
QAuthenticator supports the following authentication methods: |
|
78 |
\list |
|
79 |
\o Basic |
|
80 |
\o NTLM version 1 |
|
81 |
\o Digest-MD5 |
|
82 |
\endlist |
|
83 |
||
84 |
Note that, in particular, NTLM version 2 is not supported. |
|
85 |
||
86 |
\sa QSslSocket |
|
87 |
*/ |
|
88 |
||
89 |
||
90 |
/*! |
|
91 |
Constructs an empty authentication object |
|
92 |
*/ |
|
93 |
QAuthenticator::QAuthenticator() |
|
94 |
: d(0) |
|
95 |
{ |
|
96 |
} |
|
97 |
||
98 |
/*! |
|
99 |
Destructs the object |
|
100 |
*/ |
|
101 |
QAuthenticator::~QAuthenticator() |
|
102 |
{ |
|
103 |
if (d && !d->ref.deref()) |
|
104 |
delete d; |
|
105 |
} |
|
106 |
||
107 |
/*! |
|
108 |
Constructs a copy of \a other. |
|
109 |
*/ |
|
110 |
QAuthenticator::QAuthenticator(const QAuthenticator &other) |
|
111 |
: d(other.d) |
|
112 |
{ |
|
113 |
if (d) |
|
114 |
d->ref.ref(); |
|
115 |
} |
|
116 |
||
117 |
/*! |
|
118 |
Assigns the contents of \a other to this authenticator. |
|
119 |
*/ |
|
120 |
QAuthenticator &QAuthenticator::operator=(const QAuthenticator &other) |
|
121 |
{ |
|
122 |
if (d == other.d) |
|
123 |
return *this; |
|
124 |
detach(); |
|
125 |
d->user = other.d->user; |
|
126 |
d->password = other.d->password; |
|
127 |
return *this; |
|
128 |
} |
|
129 |
||
130 |
/*! |
|
131 |
Returns true if this authenticator is identical to \a other; otherwise |
|
132 |
returns false. |
|
133 |
*/ |
|
134 |
bool QAuthenticator::operator==(const QAuthenticator &other) const |
|
135 |
{ |
|
136 |
if (d == other.d) |
|
137 |
return true; |
|
138 |
return d->user == other.d->user |
|
139 |
&& d->password == other.d->password |
|
140 |
&& d->realm == other.d->realm |
|
141 |
&& d->method == other.d->method; |
|
142 |
} |
|
143 |
||
144 |
/*! |
|
145 |
\fn bool QAuthenticator::operator!=(const QAuthenticator &other) const |
|
146 |
||
147 |
Returns true if this authenticator is different from \a other; otherwise |
|
148 |
returns false. |
|
149 |
*/ |
|
150 |
||
151 |
/*! |
|
152 |
returns the user used for authentication. |
|
153 |
*/ |
|
154 |
QString QAuthenticator::user() const |
|
155 |
{ |
|
156 |
return d ? d->user : QString(); |
|
157 |
} |
|
158 |
||
159 |
/*! |
|
160 |
Sets the \a user used for authentication. |
|
161 |
*/ |
|
162 |
void QAuthenticator::setUser(const QString &user) |
|
163 |
{ |
|
164 |
detach(); |
|
165 |
d->user = user; |
|
166 |
} |
|
167 |
||
168 |
/*! |
|
169 |
returns the password used for authentication. |
|
170 |
*/ |
|
171 |
QString QAuthenticator::password() const |
|
172 |
{ |
|
173 |
return d ? d->password : QString(); |
|
174 |
} |
|
175 |
||
176 |
/*! |
|
177 |
Sets the \a password used for authentication. |
|
178 |
*/ |
|
179 |
void QAuthenticator::setPassword(const QString &password) |
|
180 |
{ |
|
181 |
detach(); |
|
182 |
d->password = password; |
|
183 |
} |
|
184 |
||
185 |
/*! |
|
186 |
\internal |
|
187 |
*/ |
|
188 |
void QAuthenticator::detach() |
|
189 |
{ |
|
190 |
if (!d) { |
|
191 |
d = new QAuthenticatorPrivate; |
|
192 |
d->ref = 1; |
|
193 |
return; |
|
194 |
} |
|
195 |
||
196 |
qAtomicDetach(d); |
|
197 |
d->phase = QAuthenticatorPrivate::Start; |
|
198 |
} |
|
199 |
||
200 |
/*! |
|
201 |
returns the realm requiring authentication. |
|
202 |
*/ |
|
203 |
QString QAuthenticator::realm() const |
|
204 |
{ |
|
205 |
return d ? d->realm : QString(); |
|
206 |
} |
|
207 |
||
208 |
||
209 |
/*! |
|
210 |
returns true if the authenticator is null. |
|
211 |
*/ |
|
212 |
bool QAuthenticator::isNull() const |
|
213 |
{ |
|
214 |
return !d; |
|
215 |
} |
|
216 |
||
217 |
QAuthenticatorPrivate::QAuthenticatorPrivate() |
|
218 |
: ref(0) |
|
219 |
, method(None) |
|
220 |
, phase(Start) |
|
221 |
, nonceCount(0) |
|
222 |
{ |
|
223 |
cnonce = QCryptographicHash::hash(QByteArray::number(qrand(), 16) + QByteArray::number(qrand(), 16), |
|
224 |
QCryptographicHash::Md5).toHex(); |
|
225 |
nonceCount = 0; |
|
226 |
} |
|
227 |
||
228 |
#ifndef QT_NO_HTTP |
|
229 |
void QAuthenticatorPrivate::parseHttpResponse(const QHttpResponseHeader &header, bool isProxy) |
|
230 |
{ |
|
231 |
QList<QPair<QString, QString> > values = header.values(); |
|
232 |
const char *search = isProxy ? "proxy-authenticate" : "www-authenticate"; |
|
233 |
||
234 |
method = None; |
|
235 |
/* |
|
236 |
Fun from the HTTP 1.1 specs, that we currently ignore: |
|
237 |
||
238 |
User agents are advised to take special care in parsing the WWW- |
|
239 |
Authenticate field value as it might contain more than one challenge, |
|
240 |
or if more than one WWW-Authenticate header field is provided, the |
|
241 |
contents of a challenge itself can contain a comma-separated list of |
|
242 |
authentication parameters. |
|
243 |
*/ |
|
244 |
||
245 |
QString headerVal; |
|
246 |
for (int i = 0; i < values.size(); ++i) { |
|
247 |
const QPair<QString, QString> ¤t = values.at(i); |
|
248 |
if (current.first.toLower() != QLatin1String(search)) |
|
249 |
continue; |
|
250 |
QString str = current.second; |
|
251 |
if (method < Basic && str.startsWith(QLatin1String("Basic"), Qt::CaseInsensitive)) { |
|
252 |
method = Basic; headerVal = str.mid(6); |
|
253 |
} else if (method < Ntlm && str.startsWith(QLatin1String("NTLM"), Qt::CaseInsensitive)) { |
|
254 |
method = Ntlm; |
|
255 |
headerVal = str.mid(5); |
|
256 |
} else if (method < DigestMd5 && str.startsWith(QLatin1String("Digest"), Qt::CaseInsensitive)) { |
|
257 |
method = DigestMd5; |
|
258 |
headerVal = str.mid(7); |
|
259 |
} |
|
260 |
} |
|
261 |
||
262 |
challenge = headerVal.trimmed().toLatin1(); |
|
263 |
QHash<QByteArray, QByteArray> options = parseDigestAuthenticationChallenge(challenge); |
|
264 |
||
265 |
switch(method) { |
|
266 |
case Basic: |
|
267 |
realm = QString::fromLatin1(options.value("realm")); |
|
268 |
if (user.isEmpty()) |
|
269 |
phase = Done; |
|
270 |
break; |
|
271 |
case Ntlm: |
|
272 |
// #### extract from header |
|
273 |
realm = QString(); |
|
274 |
break; |
|
275 |
case DigestMd5: { |
|
276 |
realm = QString::fromLatin1(options.value("realm")); |
|
277 |
if (options.value("stale").toLower() == "true") |
|
278 |
phase = Start; |
|
279 |
if (user.isEmpty()) |
|
280 |
phase = Done; |
|
281 |
break; |
|
282 |
} |
|
283 |
default: |
|
284 |
realm = QString(); |
|
285 |
challenge = QByteArray(); |
|
286 |
phase = Invalid; |
|
287 |
} |
|
288 |
} |
|
289 |
#endif |
|
290 |
||
291 |
QByteArray QAuthenticatorPrivate::calculateResponse(const QByteArray &requestMethod, const QByteArray &path) |
|
292 |
{ |
|
293 |
QByteArray response; |
|
294 |
const char *methodString = 0; |
|
295 |
switch(method) { |
|
296 |
case QAuthenticatorPrivate::None: |
|
297 |
methodString = ""; |
|
298 |
phase = Done; |
|
299 |
break; |
|
300 |
case QAuthenticatorPrivate::Plain: |
|
301 |
response = '\0' + user.toUtf8() + '\0' + password.toUtf8(); |
|
302 |
phase = Done; |
|
303 |
break; |
|
304 |
case QAuthenticatorPrivate::Basic: |
|
305 |
methodString = "Basic "; |
|
306 |
response = user.toLatin1() + ':' + password.toLatin1(); |
|
307 |
response = response.toBase64(); |
|
308 |
phase = Done; |
|
309 |
break; |
|
310 |
case QAuthenticatorPrivate::Login: |
|
311 |
if (challenge.contains("VXNlciBOYW1lAA==")) { |
|
312 |
response = user.toUtf8().toBase64(); |
|
313 |
phase = Phase2; |
|
314 |
} else if (challenge.contains("UGFzc3dvcmQA")) { |
|
315 |
response = password.toUtf8().toBase64(); |
|
316 |
phase = Done; |
|
317 |
} |
|
318 |
break; |
|
319 |
case QAuthenticatorPrivate::CramMd5: |
|
320 |
break; |
|
321 |
case QAuthenticatorPrivate::DigestMd5: |
|
322 |
methodString = "Digest "; |
|
323 |
response = digestMd5Response(challenge, requestMethod, path); |
|
324 |
phase = Done; |
|
325 |
break; |
|
326 |
case QAuthenticatorPrivate::Ntlm: |
|
327 |
methodString = "NTLM "; |
|
328 |
if (challenge.isEmpty()) { |
|
329 |
response = qNtlmPhase1().toBase64(); |
|
330 |
if (user.isEmpty()) |
|
331 |
phase = Done; |
|
332 |
else |
|
333 |
phase = Phase2; |
|
334 |
} else { |
|
335 |
response = qNtlmPhase3(this, QByteArray::fromBase64(challenge)).toBase64(); |
|
336 |
phase = Done; |
|
337 |
} |
|
338 |
||
339 |
break; |
|
340 |
} |
|
341 |
return QByteArray(methodString) + response; |
|
342 |
} |
|
343 |
||
344 |
||
345 |
// ---------------------------- Digest Md5 code ---------------------------------------- |
|
346 |
||
347 |
QHash<QByteArray, QByteArray> QAuthenticatorPrivate::parseDigestAuthenticationChallenge(const QByteArray &challenge) |
|
348 |
{ |
|
349 |
QHash<QByteArray, QByteArray> options; |
|
350 |
// parse the challenge |
|
351 |
const char *d = challenge.constData(); |
|
352 |
const char *end = d + challenge.length(); |
|
353 |
while (d < end) { |
|
354 |
while (d < end && (*d == ' ' || *d == '\n' || *d == '\r')) |
|
355 |
++d; |
|
356 |
const char *start = d; |
|
357 |
while (d < end && *d != '=') |
|
358 |
++d; |
|
359 |
QByteArray key = QByteArray(start, d - start); |
|
360 |
++d; |
|
361 |
if (d >= end) |
|
362 |
break; |
|
363 |
bool quote = (*d == '"'); |
|
364 |
if (quote) |
|
365 |
++d; |
|
366 |
if (d >= end) |
|
367 |
break; |
|
368 |
start = d; |
|
369 |
QByteArray value; |
|
370 |
while (d < end) { |
|
371 |
bool backslash = false; |
|
372 |
if (*d == '\\' && d < end - 1) { |
|
373 |
++d; |
|
374 |
backslash = true; |
|
375 |
} |
|
376 |
if (!backslash) { |
|
377 |
if (quote) { |
|
378 |
if (*d == '"') |
|
379 |
break; |
|
380 |
} else { |
|
381 |
if (*d == ',') |
|
382 |
break; |
|
383 |
} |
|
384 |
} |
|
385 |
value += *d; |
|
386 |
++d; |
|
387 |
} |
|
388 |
while (d < end && *d != ',') |
|
389 |
++d; |
|
390 |
++d; |
|
391 |
options[key] = value; |
|
392 |
} |
|
393 |
||
394 |
QByteArray qop = options.value("qop"); |
|
395 |
if (!qop.isEmpty()) { |
|
396 |
QList<QByteArray> qopoptions = qop.split(','); |
|
397 |
if (!qopoptions.contains("auth")) |
|
398 |
return QHash<QByteArray, QByteArray>(); |
|
399 |
// #### can't do auth-int currently |
|
400 |
// if (qop.contains("auth-int")) |
|
401 |
// qop = "auth-int"; |
|
402 |
// else if (qop.contains("auth")) |
|
403 |
// qop = "auth"; |
|
404 |
// else |
|
405 |
// qop = QByteArray(); |
|
406 |
options["qop"] = "auth"; |
|
407 |
} |
|
408 |
||
409 |
return options; |
|
410 |
} |
|
411 |
||
412 |
/* |
|
413 |
Digest MD5 implementation |
|
414 |
||
415 |
Code taken from RFC 2617 |
|
416 |
||
417 |
Currently we don't support the full SASL authentication mechanism (which includes cyphers) |
|
418 |
*/ |
|
419 |
||
420 |
||
421 |
/* calculate request-digest/response-digest as per HTTP Digest spec */ |
|
422 |
static QByteArray digestMd5ResponseHelper( |
|
423 |
const QByteArray &alg, |
|
424 |
const QByteArray &userName, |
|
425 |
const QByteArray &realm, |
|
426 |
const QByteArray &password, |
|
427 |
const QByteArray &nonce, /* nonce from server */ |
|
428 |
const QByteArray &nonceCount, /* 8 hex digits */ |
|
429 |
const QByteArray &cNonce, /* client nonce */ |
|
430 |
const QByteArray &qop, /* qop-value: "", "auth", "auth-int" */ |
|
431 |
const QByteArray &method, /* method from the request */ |
|
432 |
const QByteArray &digestUri, /* requested URL */ |
|
433 |
const QByteArray &hEntity /* H(entity body) if qop="auth-int" */ |
|
434 |
) |
|
435 |
{ |
|
436 |
QCryptographicHash hash(QCryptographicHash::Md5); |
|
437 |
hash.addData(userName); |
|
438 |
hash.addData(":", 1); |
|
439 |
hash.addData(realm); |
|
440 |
hash.addData(":", 1); |
|
441 |
hash.addData(password); |
|
442 |
QByteArray ha1 = hash.result(); |
|
443 |
if (alg.toLower() == "md5-sess") { |
|
444 |
hash.reset(); |
|
445 |
// RFC 2617 contains an error, it was: |
|
446 |
// hash.addData(ha1); |
|
447 |
// but according to the errata page at http://www.rfc-editor.org/errata_list.php, ID 1649, it |
|
448 |
// must be the following line: |
|
449 |
hash.addData(ha1.toHex()); |
|
450 |
hash.addData(":", 1); |
|
451 |
hash.addData(nonce); |
|
452 |
hash.addData(":", 1); |
|
453 |
hash.addData(cNonce); |
|
454 |
ha1 = hash.result(); |
|
455 |
}; |
|
456 |
ha1 = ha1.toHex(); |
|
457 |
||
458 |
// calculate H(A2) |
|
459 |
hash.reset(); |
|
460 |
hash.addData(method); |
|
461 |
hash.addData(":", 1); |
|
462 |
hash.addData(digestUri); |
|
463 |
if (qop.toLower() == "auth-int") { |
|
464 |
hash.addData(":", 1); |
|
465 |
hash.addData(hEntity); |
|
466 |
} |
|
467 |
QByteArray ha2hex = hash.result().toHex(); |
|
468 |
||
469 |
// calculate response |
|
470 |
hash.reset(); |
|
471 |
hash.addData(ha1); |
|
472 |
hash.addData(":", 1); |
|
473 |
hash.addData(nonce); |
|
474 |
hash.addData(":", 1); |
|
475 |
if (!qop.isNull()) { |
|
476 |
hash.addData(nonceCount); |
|
477 |
hash.addData(":", 1); |
|
478 |
hash.addData(cNonce); |
|
479 |
hash.addData(":", 1); |
|
480 |
hash.addData(qop); |
|
481 |
hash.addData(":", 1); |
|
482 |
} |
|
483 |
hash.addData(ha2hex); |
|
484 |
return hash.result().toHex(); |
|
485 |
} |
|
486 |
||
487 |
QByteArray QAuthenticatorPrivate::digestMd5Response(const QByteArray &challenge, const QByteArray &method, const QByteArray &path) |
|
488 |
{ |
|
489 |
QHash<QByteArray,QByteArray> options = parseDigestAuthenticationChallenge(challenge); |
|
490 |
||
491 |
++nonceCount; |
|
492 |
QByteArray nonceCountString = QByteArray::number(nonceCount, 16); |
|
493 |
while (nonceCountString.length() < 8) |
|
494 |
nonceCountString.prepend('0'); |
|
495 |
||
496 |
QByteArray nonce = options.value("nonce"); |
|
497 |
QByteArray opaque = options.value("opaque"); |
|
498 |
QByteArray qop = options.value("qop"); |
|
499 |
||
500 |
// qDebug() << "calculating digest: method=" << method << "path=" << path; |
|
501 |
QByteArray response = digestMd5ResponseHelper(options.value("algorithm"), user.toLatin1(), |
|
502 |
realm.toLatin1(), password.toLatin1(), |
|
503 |
nonce, nonceCountString, |
|
504 |
cnonce, qop, method, |
|
505 |
path, QByteArray()); |
|
506 |
||
507 |
||
508 |
QByteArray credentials; |
|
509 |
credentials += "username=\"" + user.toLatin1() + "\", "; |
|
510 |
credentials += "realm=\"" + realm.toLatin1() + "\", "; |
|
511 |
credentials += "nonce=\"" + nonce + "\", "; |
|
512 |
credentials += "uri=\"" + path + "\", "; |
|
513 |
if (!opaque.isEmpty()) |
|
514 |
credentials += "opaque=\"" + opaque + "\", "; |
|
515 |
credentials += "response=\"" + response + '\"'; |
|
516 |
if (!options.value("algorithm").isEmpty()) |
|
517 |
credentials += ", algorithm=" + options.value("algorithm"); |
|
518 |
if (!options.value("qop").isEmpty()) { |
|
519 |
credentials += ", qop=" + qop + ", "; |
|
520 |
credentials += "nc=" + nonceCountString + ", "; |
|
521 |
credentials += "cnonce=\"" + cnonce + '\"'; |
|
522 |
} |
|
523 |
||
524 |
return credentials; |
|
525 |
} |
|
526 |
||
527 |
// ---------------------------- Digest Md5 code ---------------------------------------- |
|
528 |
||
529 |
||
530 |
||
531 |
/* |
|
532 |
* NTLM message flags. |
|
533 |
* |
|
534 |
* Copyright (c) 2004 Andrey Panin <pazke@donpac.ru> |
|
535 |
* |
|
536 |
* This software is released under the MIT license. |
|
537 |
*/ |
|
538 |
||
539 |
/* |
|
540 |
* Indicates that Unicode strings are supported for use in security |
|
541 |
* buffer data. |
|
542 |
*/ |
|
543 |
#define NTLMSSP_NEGOTIATE_UNICODE 0x00000001 |
|
544 |
||
545 |
/* |
|
546 |
* Indicates that OEM strings are supported for use in security buffer data. |
|
547 |
*/ |
|
548 |
#define NTLMSSP_NEGOTIATE_OEM 0x00000002 |
|
549 |
||
550 |
/* |
|
551 |
* Requests that the server's authentication realm be included in the |
|
552 |
* Type 2 message. |
|
553 |
*/ |
|
554 |
#define NTLMSSP_REQUEST_TARGET 0x00000004 |
|
555 |
||
556 |
/* |
|
557 |
* Specifies that authenticated communication between the client and server |
|
558 |
* should carry a digital signature (message integrity). |
|
559 |
*/ |
|
560 |
#define NTLMSSP_NEGOTIATE_SIGN 0x00000010 |
|
561 |
||
562 |
/* |
|
563 |
* Specifies that authenticated communication between the client and server |
|
564 |
* should be encrypted (message confidentiality). |
|
565 |
*/ |
|
566 |
#define NTLMSSP_NEGOTIATE_SEAL 0x00000020 |
|
567 |
||
568 |
/* |
|
569 |
* Indicates that datagram authentication is being used. |
|
570 |
*/ |
|
571 |
#define NTLMSSP_NEGOTIATE_DATAGRAM 0x00000040 |
|
572 |
||
573 |
/* |
|
574 |
* Indicates that the LAN Manager session key should be |
|
575 |
* used for signing and sealing authenticated communications. |
|
576 |
*/ |
|
577 |
#define NTLMSSP_NEGOTIATE_LM_KEY 0x00000080 |
|
578 |
||
579 |
/* |
|
580 |
* Indicates that NTLM authentication is being used. |
|
581 |
*/ |
|
582 |
#define NTLMSSP_NEGOTIATE_NTLM 0x00000200 |
|
583 |
||
584 |
/* |
|
585 |
* Sent by the client in the Type 1 message to indicate that the name of the |
|
586 |
* domain in which the client workstation has membership is included in the |
|
587 |
* message. This is used by the server to determine whether the client is |
|
588 |
* eligible for local authentication. |
|
589 |
*/ |
|
590 |
#define NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED 0x00001000 |
|
591 |
||
592 |
/* |
|
593 |
* Sent by the client in the Type 1 message to indicate that the client |
|
594 |
* workstation's name is included in the message. This is used by the server |
|
595 |
* to determine whether the client is eligible for local authentication. |
|
596 |
*/ |
|
597 |
#define NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED 0x00002000 |
|
598 |
||
599 |
/* |
|
600 |
* Sent by the server to indicate that the server and client are on the same |
|
601 |
* machine. Implies that the client may use the established local credentials |
|
602 |
* for authentication instead of calculating a response to the challenge. |
|
603 |
*/ |
|
604 |
#define NTLMSSP_NEGOTIATE_LOCAL_CALL 0x00004000 |
|
605 |
||
606 |
/* |
|
607 |
* Indicates that authenticated communication between the client and server |
|
608 |
* should be signed with a "dummy" signature. |
|
609 |
*/ |
|
610 |
#define NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0x00008000 |
|
611 |
||
612 |
/* |
|
613 |
* Sent by the server in the Type 2 message to indicate that the target |
|
614 |
* authentication realm is a domain. |
|
615 |
*/ |
|
616 |
#define NTLMSSP_TARGET_TYPE_DOMAIN 0x00010000 |
|
617 |
||
618 |
/* |
|
619 |
* Sent by the server in the Type 2 message to indicate that the target |
|
620 |
* authentication realm is a server. |
|
621 |
*/ |
|
622 |
#define NTLMSSP_TARGET_TYPE_SERVER 0x00020000 |
|
623 |
||
624 |
/* |
|
625 |
* Sent by the server in the Type 2 message to indicate that the target |
|
626 |
* authentication realm is a share. Presumably, this is for share-level |
|
627 |
* authentication. Usage is unclear. |
|
628 |
*/ |
|
629 |
#define NTLMSSP_TARGET_TYPE_SHARE 0x00040000 |
|
630 |
||
631 |
/* |
|
632 |
* Indicates that the NTLM2 signing and sealing scheme should be used for |
|
633 |
* protecting authenticated communications. Note that this refers to a |
|
634 |
* particular session security scheme, and is not related to the use of |
|
635 |
* NTLMv2 authentication. |
|
636 |
*/ |
|
637 |
#define NTLMSSP_NEGOTIATE_NTLM2 0x00080000 |
|
638 |
||
639 |
/* |
|
640 |
* Sent by the server in the Type 2 message to indicate that it is including |
|
641 |
* a Target Information block in the message. The Target Information block |
|
642 |
* is used in the calculation of the NTLMv2 response. |
|
643 |
*/ |
|
644 |
#define NTLMSSP_NEGOTIATE_TARGET_INFO 0x00800000 |
|
645 |
||
646 |
/* |
|
647 |
* Indicates that 128-bit encryption is supported. |
|
648 |
*/ |
|
649 |
#define NTLMSSP_NEGOTIATE_128 0x20000000 |
|
650 |
||
651 |
/* |
|
652 |
* Indicates that the client will provide an encrypted master session key in |
|
653 |
* the "Session Key" field of the Type 3 message. This is used in signing and |
|
654 |
* sealing, and is RC4-encrypted using the previous session key as the |
|
655 |
* encryption key. |
|
656 |
*/ |
|
657 |
#define NTLMSSP_NEGOTIATE_KEY_EXCHANGE 0x40000000 |
|
658 |
||
659 |
/* |
|
660 |
* Indicates that 56-bit encryption is supported. |
|
661 |
*/ |
|
662 |
#define NTLMSSP_NEGOTIATE_56 0x80000000 |
|
663 |
||
664 |
||
665 |
/* usage: |
|
666 |
// fill up ctx with what we know. |
|
667 |
QByteArray response = qNtlmPhase1(ctx); |
|
668 |
// send response (b64 encoded??) |
|
669 |
// get response from server (b64 decode?) |
|
670 |
Phase2Block pb; |
|
671 |
qNtlmDecodePhase2(response, pb); |
|
672 |
response = qNtlmPhase3(ctx, pb); |
|
673 |
// send response (b64 encoded??) |
|
674 |
*/ |
|
675 |
||
676 |
/* |
|
677 |
TODO: |
|
678 |
- Fix unicode handling |
|
679 |
- add v2 handling |
|
680 |
*/ |
|
681 |
||
682 |
class QNtlmBuffer { |
|
683 |
public: |
|
684 |
QNtlmBuffer() : len(0), maxLen(0), offset(0) {} |
|
685 |
quint16 len; |
|
686 |
quint16 maxLen; |
|
687 |
quint32 offset; |
|
688 |
enum { Size = 8 }; |
|
689 |
}; |
|
690 |
||
691 |
class QNtlmPhase1BlockBase |
|
692 |
{ |
|
693 |
public: |
|
694 |
char magic[8]; |
|
695 |
quint32 type; |
|
696 |
quint32 flags; |
|
697 |
QNtlmBuffer domain; |
|
698 |
QNtlmBuffer workstation; |
|
699 |
enum { Size = 32 }; |
|
700 |
}; |
|
701 |
||
702 |
// ################# check paddings |
|
703 |
class QNtlmPhase2BlockBase |
|
704 |
{ |
|
705 |
public: |
|
706 |
char magic[8]; |
|
707 |
quint32 type; |
|
708 |
QNtlmBuffer targetName; |
|
709 |
quint32 flags; |
|
710 |
unsigned char challenge[8]; |
|
711 |
quint32 context[2]; |
|
712 |
QNtlmBuffer targetInfo; |
|
713 |
enum { Size = 48 }; |
|
714 |
}; |
|
715 |
||
716 |
class QNtlmPhase3BlockBase { |
|
717 |
public: |
|
718 |
char magic[8]; |
|
719 |
quint32 type; |
|
720 |
QNtlmBuffer lmResponse; |
|
721 |
QNtlmBuffer ntlmResponse; |
|
722 |
QNtlmBuffer domain; |
|
723 |
QNtlmBuffer user; |
|
724 |
QNtlmBuffer workstation; |
|
725 |
QNtlmBuffer sessionKey; |
|
726 |
quint32 flags; |
|
727 |
enum { Size = 64 }; |
|
728 |
}; |
|
729 |
||
730 |
static void qStreamNtlmBuffer(QDataStream& ds, const QByteArray& s) |
|
731 |
{ |
|
732 |
ds.writeRawData(s.constData(), s.size()); |
|
733 |
} |
|
734 |
||
735 |
||
736 |
static void qStreamNtlmString(QDataStream& ds, const QString& s, bool unicode) |
|
737 |
{ |
|
738 |
if (!unicode) { |
|
739 |
qStreamNtlmBuffer(ds, s.toLatin1()); |
|
740 |
return; |
|
741 |
} |
|
742 |
const ushort *d = s.utf16(); |
|
743 |
for (int i = 0; i < s.length(); ++i) |
|
744 |
ds << d[i]; |
|
745 |
} |
|
746 |
||
747 |
||
748 |
||
749 |
static int qEncodeNtlmBuffer(QNtlmBuffer& buf, int offset, const QByteArray& s) |
|
750 |
{ |
|
751 |
buf.len = s.size(); |
|
752 |
buf.maxLen = buf.len; |
|
753 |
buf.offset = (offset + 1) & ~1; |
|
754 |
return buf.offset + buf.len; |
|
755 |
} |
|
756 |
||
757 |
||
758 |
static int qEncodeNtlmString(QNtlmBuffer& buf, int offset, const QString& s, bool unicode) |
|
759 |
{ |
|
760 |
if (!unicode) |
|
761 |
return qEncodeNtlmBuffer(buf, offset, s.toLatin1()); |
|
762 |
buf.len = 2 * s.length(); |
|
763 |
buf.maxLen = buf.len; |
|
764 |
buf.offset = (offset + 1) & ~1; |
|
765 |
return buf.offset + buf.len; |
|
766 |
} |
|
767 |
||
768 |
||
769 |
static QDataStream& operator<<(QDataStream& s, const QNtlmBuffer& b) |
|
770 |
{ |
|
771 |
s << b.len << b.maxLen << b.offset; |
|
772 |
return s; |
|
773 |
} |
|
774 |
||
775 |
static QDataStream& operator>>(QDataStream& s, QNtlmBuffer& b) |
|
776 |
{ |
|
777 |
s >> b.len >> b.maxLen >> b.offset; |
|
778 |
return s; |
|
779 |
} |
|
780 |
||
781 |
||
782 |
class QNtlmPhase1Block : public QNtlmPhase1BlockBase |
|
783 |
{ // request |
|
784 |
public: |
|
785 |
QNtlmPhase1Block() { |
|
786 |
qstrncpy(magic, "NTLMSSP", 8); |
|
787 |
type = 1; |
|
788 |
flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_NTLM | NTLMSSP_REQUEST_TARGET; |
|
789 |
} |
|
790 |
||
791 |
// extracted |
|
792 |
QString domainStr, workstationStr; |
|
793 |
}; |
|
794 |
||
795 |
||
796 |
class QNtlmPhase2Block : public QNtlmPhase2BlockBase |
|
797 |
{ // challenge |
|
798 |
public: |
|
799 |
QNtlmPhase2Block() { |
|
800 |
magic[0] = 0; |
|
801 |
type = 0xffffffff; |
|
802 |
} |
|
803 |
||
804 |
// extracted |
|
805 |
QString targetNameStr, targetInfoStr; |
|
806 |
}; |
|
807 |
||
808 |
||
809 |
||
810 |
class QNtlmPhase3Block : public QNtlmPhase3BlockBase { // response |
|
811 |
public: |
|
812 |
QNtlmPhase3Block() { |
|
813 |
qstrncpy(magic, "NTLMSSP", 8); |
|
814 |
type = 3; |
|
815 |
flags = NTLMSSP_NEGOTIATE_UNICODE | NTLMSSP_NEGOTIATE_NTLM | NTLMSSP_NEGOTIATE_TARGET_INFO; |
|
816 |
} |
|
817 |
||
818 |
// extracted |
|
819 |
QByteArray lmResponseBuf, ntlmResponseBuf; |
|
820 |
QString domainStr, userStr, workstationStr, sessionKeyStr; |
|
821 |
}; |
|
822 |
||
823 |
||
824 |
static QDataStream& operator<<(QDataStream& s, const QNtlmPhase1Block& b) { |
|
825 |
bool unicode = (b.flags & NTLMSSP_NEGOTIATE_UNICODE); |
|
826 |
||
827 |
s.writeRawData(b.magic, sizeof(b.magic)); |
|
828 |
s << b.type; |
|
829 |
s << b.flags; |
|
830 |
s << b.domain; |
|
831 |
s << b.workstation; |
|
832 |
if (!b.domainStr.isEmpty()) |
|
833 |
qStreamNtlmString(s, b.domainStr, unicode); |
|
834 |
if (!b.workstationStr.isEmpty()) |
|
835 |
qStreamNtlmString(s, b.workstationStr, unicode); |
|
836 |
return s; |
|
837 |
} |
|
838 |
||
839 |
||
840 |
static QDataStream& operator<<(QDataStream& s, const QNtlmPhase3Block& b) { |
|
841 |
bool unicode = (b.flags & NTLMSSP_NEGOTIATE_UNICODE); |
|
842 |
s.writeRawData(b.magic, sizeof(b.magic)); |
|
843 |
s << b.type; |
|
844 |
s << b.lmResponse; |
|
845 |
s << b.ntlmResponse; |
|
846 |
s << b.domain; |
|
847 |
s << b.user; |
|
848 |
s << b.workstation; |
|
849 |
s << b.sessionKey; |
|
850 |
s << b.flags; |
|
851 |
||
852 |
if (!b.domainStr.isEmpty()) |
|
853 |
qStreamNtlmString(s, b.domainStr, unicode); |
|
854 |
||
855 |
qStreamNtlmString(s, b.userStr, unicode); |
|
856 |
||
857 |
if (!b.workstationStr.isEmpty()) |
|
858 |
qStreamNtlmString(s, b.workstationStr, unicode); |
|
859 |
||
860 |
// Send auth info |
|
861 |
qStreamNtlmBuffer(s, b.lmResponseBuf); |
|
862 |
qStreamNtlmBuffer(s, b.ntlmResponseBuf); |
|
863 |
||
864 |
||
865 |
return s; |
|
866 |
} |
|
867 |
||
868 |
||
869 |
static QByteArray qNtlmPhase1() |
|
870 |
{ |
|
871 |
QByteArray rc; |
|
872 |
QDataStream ds(&rc, QIODevice::WriteOnly); |
|
873 |
ds.setByteOrder(QDataStream::LittleEndian); |
|
874 |
QNtlmPhase1Block pb; |
|
875 |
ds << pb; |
|
876 |
return rc; |
|
877 |
} |
|
878 |
||
879 |
||
880 |
static QByteArray qStringAsUcs2Le(const QString& src) |
|
881 |
{ |
|
882 |
QByteArray rc(2*src.length(), 0); |
|
883 |
const unsigned short *s = src.utf16(); |
|
884 |
unsigned short *d = (unsigned short*)rc.data(); |
|
885 |
for (int i = 0; i < src.length(); ++i) { |
|
886 |
d[i] = qToLittleEndian(s[i]); |
|
887 |
} |
|
888 |
return rc; |
|
889 |
} |
|
890 |
||
891 |
||
892 |
static QString qStringFromUcs2Le(const QByteArray& src) |
|
893 |
{ |
|
894 |
Q_ASSERT(src.size() % 2 == 0); |
|
895 |
unsigned short *d = (unsigned short*)src.data(); |
|
896 |
for (int i = 0; i < src.length() / 2; ++i) { |
|
897 |
d[i] = qFromLittleEndian(d[i]); |
|
898 |
} |
|
899 |
return QString((const QChar *)src.data(), src.size()/2); |
|
900 |
} |
|
901 |
||
902 |
||
903 |
static QByteArray qEncodeNtlmResponse(const QAuthenticatorPrivate *ctx, const QNtlmPhase2Block& ch) |
|
904 |
{ |
|
905 |
QCryptographicHash md4(QCryptographicHash::Md4); |
|
906 |
QByteArray asUcs2Le = qStringAsUcs2Le(ctx->password); |
|
907 |
md4.addData(asUcs2Le.data(), asUcs2Le.size()); |
|
908 |
||
909 |
unsigned char md4hash[22]; |
|
910 |
memset(md4hash, 0, sizeof(md4hash)); |
|
911 |
QByteArray hash = md4.result(); |
|
912 |
Q_ASSERT(hash.size() == 16); |
|
913 |
memcpy(md4hash, hash.constData(), 16); |
|
914 |
||
915 |
QByteArray rc(24, 0); |
|
916 |
deshash((unsigned char *)rc.data(), md4hash, (unsigned char *)ch.challenge); |
|
917 |
deshash((unsigned char *)rc.data() + 8, md4hash + 7, (unsigned char *)ch.challenge); |
|
918 |
deshash((unsigned char *)rc.data() + 16, md4hash + 14, (unsigned char *)ch.challenge); |
|
919 |
||
920 |
hash.fill(0); |
|
921 |
return rc; |
|
922 |
} |
|
923 |
||
924 |
||
925 |
static QByteArray qEncodeLmResponse(const QAuthenticatorPrivate *ctx, const QNtlmPhase2Block& ch) |
|
926 |
{ |
|
927 |
QByteArray hash(21, 0); |
|
928 |
QByteArray key(14, 0); |
|
929 |
qstrncpy(key.data(), ctx->password.toUpper().toLatin1(), 14); |
|
930 |
const char *block = "KGS!@#$%"; |
|
931 |
||
932 |
deshash((unsigned char *)hash.data(), (unsigned char *)key.data(), (unsigned char *)block); |
|
933 |
deshash((unsigned char *)hash.data() + 8, (unsigned char *)key.data() + 7, (unsigned char *)block); |
|
934 |
key.fill(0); |
|
935 |
||
936 |
QByteArray rc(24, 0); |
|
937 |
deshash((unsigned char *)rc.data(), (unsigned char *)hash.data(), ch.challenge); |
|
938 |
deshash((unsigned char *)rc.data() + 8, (unsigned char *)hash.data() + 7, ch.challenge); |
|
939 |
deshash((unsigned char *)rc.data() + 16, (unsigned char *)hash.data() + 14, ch.challenge); |
|
940 |
||
941 |
hash.fill(0); |
|
942 |
return rc; |
|
943 |
} |
|
944 |
||
945 |
||
946 |
static bool qNtlmDecodePhase2(const QByteArray& data, QNtlmPhase2Block& ch) |
|
947 |
{ |
|
948 |
Q_ASSERT(QNtlmPhase2BlockBase::Size == sizeof(QNtlmPhase2BlockBase)); |
|
949 |
if (data.size() < QNtlmPhase2BlockBase::Size) |
|
950 |
return false; |
|
951 |
||
952 |
||
953 |
QDataStream ds(data); |
|
954 |
ds.setByteOrder(QDataStream::LittleEndian); |
|
955 |
if (ds.readRawData(ch.magic, 8) < 8) |
|
956 |
return false; |
|
957 |
if (strncmp(ch.magic, "NTLMSSP", 8) != 0) |
|
958 |
return false; |
|
959 |
||
960 |
ds >> ch.type; |
|
961 |
if (ch.type != 2) |
|
962 |
return false; |
|
963 |
||
964 |
ds >> ch.targetName; |
|
965 |
ds >> ch.flags; |
|
966 |
if (ds.readRawData((char *)ch.challenge, 8) < 8) |
|
967 |
return false; |
|
968 |
ds >> ch.context[0] >> ch.context[1]; |
|
969 |
ds >> ch.targetInfo; |
|
970 |
||
971 |
if (ch.targetName.len > 0) { |
|
972 |
if (ch.targetName.len + ch.targetName.offset >= (unsigned)data.size()) |
|
973 |
return false; |
|
974 |
||
975 |
ch.targetNameStr = qStringFromUcs2Le(data.mid(ch.targetName.offset, ch.targetName.len)); |
|
976 |
} |
|
977 |
||
978 |
if (ch.targetInfo.len > 0) { |
|
979 |
// UNUSED right now |
|
980 |
} |
|
981 |
||
982 |
return true; |
|
983 |
} |
|
984 |
||
985 |
||
986 |
static QByteArray qNtlmPhase3(QAuthenticatorPrivate *ctx, const QByteArray& phase2data) |
|
987 |
{ |
|
988 |
QNtlmPhase2Block ch; |
|
989 |
if (!qNtlmDecodePhase2(phase2data, ch)) |
|
990 |
return QByteArray(); |
|
991 |
||
992 |
QByteArray rc; |
|
993 |
QDataStream ds(&rc, QIODevice::WriteOnly); |
|
994 |
ds.setByteOrder(QDataStream::LittleEndian); |
|
995 |
QNtlmPhase3Block pb; |
|
996 |
||
997 |
bool unicode = ch.flags & NTLMSSP_NEGOTIATE_UNICODE; |
|
998 |
||
999 |
ctx->realm = ch.targetNameStr; |
|
1000 |
||
1001 |
pb.flags = NTLMSSP_NEGOTIATE_NTLM; |
|
1002 |
if (unicode) |
|
1003 |
pb.flags |= NTLMSSP_NEGOTIATE_UNICODE; |
|
1004 |
else |
|
1005 |
pb.flags |= NTLMSSP_NEGOTIATE_OEM; |
|
1006 |
||
1007 |
||
1008 |
int offset = QNtlmPhase3BlockBase::Size; |
|
1009 |
Q_ASSERT(QNtlmPhase3BlockBase::Size == sizeof(QNtlmPhase3BlockBase)); |
|
1010 |
||
1011 |
offset = qEncodeNtlmString(pb.domain, offset, ctx->realm, unicode); |
|
1012 |
pb.domainStr = ctx->realm; |
|
1013 |
offset = qEncodeNtlmString(pb.user, offset, ctx->user, unicode); |
|
1014 |
pb.userStr = ctx->user; |
|
1015 |
||
1016 |
offset = qEncodeNtlmString(pb.workstation, offset, ctx->workstation, unicode); |
|
1017 |
pb.workstationStr = ctx->workstation; |
|
1018 |
||
1019 |
// Get LM response |
|
1020 |
pb.lmResponseBuf = qEncodeLmResponse(ctx, ch); |
|
1021 |
offset = qEncodeNtlmBuffer(pb.lmResponse, offset, pb.lmResponseBuf); |
|
1022 |
||
1023 |
// Get NTLM response |
|
1024 |
pb.ntlmResponseBuf = qEncodeNtlmResponse(ctx, ch); |
|
1025 |
offset = qEncodeNtlmBuffer(pb.ntlmResponse, offset, pb.ntlmResponseBuf); |
|
1026 |
||
1027 |
||
1028 |
// Encode and send |
|
1029 |
ds << pb; |
|
1030 |
||
1031 |
return rc; |
|
1032 |
} |
|
1033 |
||
1034 |
||
1035 |
||
1036 |
QT_END_NAMESPACE |