Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) NTLM Client and Server CodeDemonstrates the NTLM authentication algorithm for both client and server.
#include <C_CkNtlmW.h> void ChilkatSample(void) { HCkNtlmW ntlmClient; HCkNtlmW ntlmServer; const wchar_t *type1Msg; const wchar_t *type1Info; const wchar_t *type2Msg; const wchar_t *type2Info; const wchar_t *type3Msg; BOOL success; const wchar_t *clientUsername; const wchar_t *expectedType3Msg; // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. ntlmClient = CkNtlmW_Create(); ntlmServer = CkNtlmW_Create(); // The NTLM protocol begins by the client sending the server // a Type1 message. CkNtlmW_putWorkstation(ntlmClient,L"MyWorkstation"); type1Msg = CkNtlmW_genType1(ntlmClient); wprintf(L"Type1 message from client to server:\n"); wprintf(L"%s\n",type1Msg); // If the server wishes to examine the information embedded within the // Type1 message, it may call ParseType1. // This step is not necessary, it is only for informational purposes.. type1Info = CkNtlmW_parseType1(ntlmServer,type1Msg); wprintf(L"---\n"); wprintf(L"%s\n",type1Info); // The server now generates a Type2 message to be sent to the client. // The Type2 message requires a TargetName. A TargetName is // the authentication realm in which the authenticating account // has membership (a domain name for domain accounts, or server name // for local machine accounts). CkNtlmW_putTargetName(ntlmServer,L"myAuthRealm"); type2Msg = CkNtlmW_genType2(ntlmServer,type1Msg); if (CkNtlmW_getLastMethodSuccess(ntlmServer) != TRUE) { wprintf(L"%s\n",CkNtlmW_lastErrorText(ntlmServer)); CkNtlmW_Dispose(ntlmClient); CkNtlmW_Dispose(ntlmServer); return; } wprintf(L"Type2 message from server to client:\n"); wprintf(L"%s\n",type2Msg); // The client may examine the information embedded in the Type2 message // by calling ParseType2, which returns XML. This is only for informational purposes // and is not required. type2Info = CkNtlmW_parseType2(ntlmClient,type2Msg); wprintf(L"---\n"); wprintf(L"%s\n",type2Info); // The client will now generate the final Type3 message to be sent to the server. // This requires the Username and Password: CkNtlmW_putUserName(ntlmClient,L"test123"); CkNtlmW_putPassword(ntlmClient,L"myPassword"); type3Msg = CkNtlmW_genType3(ntlmClient,type2Msg); if (CkNtlmW_getLastMethodSuccess(ntlmClient) != TRUE) { wprintf(L"%s\n",CkNtlmW_lastErrorText(ntlmClient)); CkNtlmW_Dispose(ntlmClient); CkNtlmW_Dispose(ntlmServer); return; } wprintf(L"Type3 message from client to server:\n"); wprintf(L"%s\n",type3Msg); // The server may verify the response by first "loading" the Type3 message. // This sets the various properties such as Username, Domain, Workstation, // and ClientChallenge to the values embedded within theType3 message. // The server may then use the Username to lookup the password. // Looking up the password is dependent on your infrastructure. Perhaps your // usernames/passwords are stored in a secure database. If that's the case, you would // write code to issue a query to get the password string for the given username. // Once the password is obtained, set the Password property and then // generate the Type3 response again. If the server's Type3 response matches // the client's Type3 response, then the client's password is correct. success = CkNtlmW_LoadType3(ntlmServer,type3Msg); if (success != TRUE) { wprintf(L"%s\n",CkNtlmW_lastErrorText(ntlmServer)); CkNtlmW_Dispose(ntlmClient); CkNtlmW_Dispose(ntlmServer); return; } // The Username property now contains the username that was embedded within // the Type3 message. It can be used to lookup the password. clientUsername = CkNtlmW_userName(ntlmServer); // For this example, we'll simply set the password to a literal string: CkNtlmW_putPassword(ntlmServer,L"myPassword"); // The server may generate the Type3 message again, using the client's correct // password: expectedType3Msg = CkNtlmW_genType3(ntlmServer,type2Msg); wprintf(L"Expected Type3 Message:\n"); wprintf(L"%s\n",expectedType3Msg); // If the Type3 message received from the client is exactly the same as the // expected Type3 message, then the client must've used the same password, // and authentication is successful CkNtlmW_Dispose(ntlmClient); CkNtlmW_Dispose(ntlmServer); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.