ReactOS 0.4.15-dev-8109-gd7be748
negotiate.c
Go to the documentation of this file.
1/*
2 * Copyright 2005 Kai Blin
3 * Copyright 2012 Hans Leidekker for CodeWeavers
4 *
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
9 *
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
14 *
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
18 *
19 * This file implements a Negotiate provider that simply forwards to
20 * the NTLM provider.
21 */
22
23#include "precomp.h"
24
25#include <wine/debug.h>
27
28/***********************************************************************
29 * QueryCredentialsAttributesA
30 */
32 PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
33{
34 FIXME("%p, %u, %p\n", phCredential, ulAttribute, pBuffer);
36}
37
38/***********************************************************************
39 * QueryCredentialsAttributesW
40 */
42 PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
43{
44 FIXME("%p, %u, %p\n", phCredential, ulAttribute, pBuffer);
46}
47
48/***********************************************************************
49 * AcquireCredentialsHandleW
50 */
52 SEC_WCHAR *pszPrincipal, SEC_WCHAR *pszPackage, ULONG fCredentialUse,
53 PLUID pLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn,
54 PVOID pGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry )
55{
56 static SEC_WCHAR ntlmW[] = {'N','T','L','M',0};
58
59 TRACE("%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p\n",
60 debugstr_w(pszPrincipal), debugstr_w(pszPackage), fCredentialUse,
61 pLogonID, pAuthData, pGetKeyFn, pGetKeyArgument, phCredential, ptsExpiry);
62
63 FIXME("forwarding to NTLM\n");
64 ret = ntlm_AcquireCredentialsHandleW( pszPrincipal, ntlmW, fCredentialUse,
65 pLogonID, pAuthData, pGetKeyFn, pGetKeyArgument,
66 phCredential, ptsExpiry );
67 if (ret == SEC_E_OK)
68 {
69 NtlmCredentials *cred = (NtlmCredentials *)phCredential->dwLower;
70 cred->no_cached_credentials = (pAuthData == NULL);
71 }
72 return ret;
73}
74
75/***********************************************************************
76 * AcquireCredentialsHandleA
77 */
79 SEC_CHAR *pszPrincipal, SEC_CHAR *pszPackage, ULONG fCredentialUse,
80 PLUID pLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn,
81 PVOID pGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry )
82{
84 SEC_WCHAR *user = NULL, *domain = NULL, *passwd = NULL, *package = NULL;
86
87 TRACE("%s, %s, 0x%08x, %p, %p, %p, %p, %p, %p\n",
88 debugstr_a(pszPrincipal), debugstr_a(pszPackage), fCredentialUse,
89 pLogonID, pAuthData, pGetKeyFn, pGetKeyArgument, phCredential, ptsExpiry);
90
91 if (pszPackage)
92 {
93 int package_len = MultiByteToWideChar( CP_ACP, 0, pszPackage, -1, NULL, 0 );
94 package = HeapAlloc( GetProcessHeap(), 0, package_len * sizeof(SEC_WCHAR) );
95 if (!package) return SEC_E_INSUFFICIENT_MEMORY;
96 MultiByteToWideChar( CP_ACP, 0, pszPackage, -1, package, package_len );
97 }
98 if (pAuthData)
99 {
101 int user_len, domain_len, passwd_len;
102
104 {
105 identityW = HeapAlloc( GetProcessHeap(), 0, sizeof(*identityW) );
106 if (!identityW) goto done;
107
108 if (!identity->UserLength) user_len = 0;
109 else
110 {
111 user_len = MultiByteToWideChar( CP_ACP, 0, (LPCSTR)identity->User,
112 identity->UserLength, NULL, 0 );
113 user = HeapAlloc( GetProcessHeap(), 0, user_len * sizeof(SEC_WCHAR) );
114 if (!user) goto done;
115 MultiByteToWideChar( CP_ACP, 0, (LPCSTR)identity->User, identity->UserLength,
116 user, user_len );
117 }
118 if (!identity->DomainLength) domain_len = 0;
119 else
120 {
121 domain_len = MultiByteToWideChar( CP_ACP, 0, (LPCSTR)identity->Domain,
122 identity->DomainLength, NULL, 0 );
123 domain = HeapAlloc( GetProcessHeap(), 0, domain_len * sizeof(SEC_WCHAR) );
124 if (!domain) goto done;
125 MultiByteToWideChar( CP_ACP, 0, (LPCSTR)identity->Domain, identity->DomainLength,
126 domain, domain_len );
127 }
128 if (!identity->PasswordLength) passwd_len = 0;
129 else
130 {
131 passwd_len = MultiByteToWideChar( CP_ACP, 0, (LPCSTR)identity->Password,
132 identity->PasswordLength, NULL, 0 );
133 passwd = HeapAlloc( GetProcessHeap(), 0, passwd_len * sizeof(SEC_WCHAR) );
134 if (!passwd) goto done;
135 MultiByteToWideChar( CP_ACP, 0, (LPCSTR)identity->Password, identity->PasswordLength,
136 passwd, passwd_len );
137 }
138 identityW->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
139 identityW->User = user;
140 identityW->UserLength = user_len;
141 identityW->Domain = domain;
142 identityW->DomainLength = domain_len;
143 identityW->Password = passwd;
144 identityW->PasswordLength = passwd_len;
145 }
146 else identityW = (SEC_WINNT_AUTH_IDENTITY_W *)identity;
147 }
148 ret = nego_AcquireCredentialsHandleW( NULL, package, fCredentialUse, pLogonID, identityW,
149 pGetKeyFn, pGetKeyArgument, phCredential, ptsExpiry );
150done:
151 HeapFree( GetProcessHeap(), 0, package );
154 HeapFree( GetProcessHeap(), 0, passwd );
155 HeapFree( GetProcessHeap(), 0, identityW );
156 return ret;
157}
158
159/***********************************************************************
160 * InitializeSecurityContextW
161 */
163 PCredHandle phCredential, PCtxtHandle phContext, SEC_WCHAR *pszTargetName,
164 ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep,
165 PSecBufferDesc pInput, ULONG Reserved2, PCtxtHandle phNewContext,
166 PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry )
167{
168 TRACE("%p, %p, %s, 0x%08x, %u, %u, %p, %u, %p, %p, %p, %p\n",
169 phCredential, phContext, debugstr_w(pszTargetName), fContextReq,
170 Reserved1, TargetDataRep, pInput, Reserved1, phNewContext, pOutput,
171 pfContextAttr, ptsExpiry);
172
173 return ntlm_InitializeSecurityContextW( phCredential, phContext, pszTargetName,
174 fContextReq, Reserved1, TargetDataRep,
175 pInput, Reserved2, phNewContext,
176 pOutput, pfContextAttr, ptsExpiry );
177}
178
179/***********************************************************************
180 * InitializeSecurityContextA
181 */
183 PCredHandle phCredential, PCtxtHandle phContext, SEC_CHAR *pszTargetName,
184 ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep,
185 PSecBufferDesc pInput, ULONG Reserved2, PCtxtHandle phNewContext,
186 PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry )
187{
190
191 TRACE("%p, %p, %s, 0x%08x, %u, %u, %p, %u, %p, %p, %p, %p\n",
192 phCredential, phContext, debugstr_a(pszTargetName), fContextReq,
193 Reserved1, TargetDataRep, pInput, Reserved1, phNewContext, pOutput,
194 pfContextAttr, ptsExpiry);
195
196 if (pszTargetName)
197 {
198 int target_len = MultiByteToWideChar( CP_ACP, 0, pszTargetName, -1, NULL, 0 );
199 target = HeapAlloc(GetProcessHeap(), 0, target_len * sizeof(SEC_WCHAR) );
201 MultiByteToWideChar( CP_ACP, 0, pszTargetName, -1, target, target_len );
202 }
203 ret = nego_InitializeSecurityContextW( phCredential, phContext, target, fContextReq,
204 Reserved1, TargetDataRep, pInput, Reserved2,
205 phNewContext, pOutput, pfContextAttr, ptsExpiry );
207 return ret;
208}
209
210/***********************************************************************
211 * AcceptSecurityContext
212 */
214 PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput,
215 ULONG fContextReq, ULONG TargetDataRep, PCtxtHandle phNewContext,
216 PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
217{
218 TRACE("%p, %p, %p, 0x%08x, %u, %p, %p, %p, %p\n", phCredential, phContext,
219 pInput, fContextReq, TargetDataRep, phNewContext, pOutput, pfContextAttr,
220 ptsExpiry);
221
222 return ntlm_AcceptSecurityContext( phCredential, phContext, pInput,
223 fContextReq, TargetDataRep, phNewContext,
224 pOutput, pfContextAttr, ptsExpiry );
225}
226
227/***********************************************************************
228 * CompleteAuthToken
229 */
231 PSecBufferDesc pToken)
232{
234
235 TRACE("%p %p\n", phContext, pToken);
236 if (phContext)
237 {
239 }
240 else
241 {
243 }
244 return ret;
245}
246
247/***********************************************************************
248 * DeleteSecurityContext
249 */
251{
252 TRACE("%p\n", phContext);
253
254 return ntlm_DeleteSecurityContext( phContext );
255}
256
257/***********************************************************************
258 * ApplyControlToken
259 */
261 PSecBufferDesc pInput)
262{
264
265 TRACE("%p %p\n", phContext, pInput);
266 if (phContext)
267 {
269 }
270 else
271 {
273 }
274 return ret;
275}
276
277/***********************************************************************
278 * QueryContextAttributesW
279 */
281 PCtxtHandle phContext, ULONG ulAttribute, void *pBuffer)
282{
283 TRACE("%p, %u, %p\n", phContext, ulAttribute, pBuffer);
284
285 switch (ulAttribute)
286 {
288 {
290 sizes->cbMaxToken = 2888;
291 sizes->cbMaxSignature = 16;
292 sizes->cbSecurityTrailer = 16;
293 sizes->cbBlockSize = 0;
294 return SEC_E_OK;
295 }
297 {
299 info->PackageInfo = ntlm_package_infoW;
300 info->NegotiationState = SECPKG_NEGOTIATION_COMPLETE;
301 return SEC_E_OK;
302 }
303 default:
304 return ntlm_QueryContextAttributesW( phContext, ulAttribute, pBuffer );
305 }
306}
307
308/***********************************************************************
309 * QueryContextAttributesA
310 */
312 ULONG ulAttribute, void *pBuffer)
313{
314 TRACE("%p, %u, %p\n", phContext, ulAttribute, pBuffer);
315
316 switch (ulAttribute)
317 {
319 {
321 sizes->cbMaxToken = 2888;
322 sizes->cbMaxSignature = 16;
323 sizes->cbSecurityTrailer = 16;
324 sizes->cbBlockSize = 0;
325 return SEC_E_OK;
326 }
328 {
330 info->PackageInfo = ntlm_package_infoA;
331 info->NegotiationState = SECPKG_NEGOTIATION_COMPLETE;
332 return SEC_E_OK;
333 }
334 default:
335 return ntlm_QueryContextAttributesA( phContext, ulAttribute, pBuffer );
336 }
337}
338
339/***********************************************************************
340 * ImpersonateSecurityContext
341 */
343{
345
346 TRACE("%p\n", phContext);
347 if (phContext)
348 {
350 }
351 else
352 {
354 }
355 return ret;
356}
357
358/***********************************************************************
359 * RevertSecurityContext
360 */
362{
364
365 TRACE("%p\n", phContext);
366 if (phContext)
367 {
369 }
370 else
371 {
373 }
374 return ret;
375}
376
377/***********************************************************************
378 * MakeSignature
379 */
381 ULONG fQOP, PSecBufferDesc pMessage, ULONG MessageSeqNo)
382{
383 TRACE("%p, 0x%08x, %p, %u\n", phContext, fQOP, pMessage, MessageSeqNo);
384
385 return ntlm_MakeSignature( phContext, fQOP, pMessage, MessageSeqNo );
386}
387
388/***********************************************************************
389 * VerifySignature
390 */
392 PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
393{
394 TRACE("%p, %p, %u, %p\n", phContext, pMessage, MessageSeqNo, pfQOP);
395
396 return ntlm_VerifySignature( phContext, pMessage, MessageSeqNo, pfQOP );
397}
398
399/***********************************************************************
400 * FreeCredentialsHandle
401 */
403{
404 TRACE("%p\n", phCredential);
405
406 return ntlm_FreeCredentialsHandle( phCredential );
407}
408
409/***********************************************************************
410 * EncryptMessage
411 */
413 ULONG fQOP, PSecBufferDesc pMessage, ULONG MessageSeqNo)
414{
415 TRACE("%p, 0x%08x, %p, %u\n", phContext, fQOP, pMessage, MessageSeqNo);
416
417 return ntlm_EncryptMessage( phContext, fQOP, pMessage, MessageSeqNo );
418}
419
420/***********************************************************************
421 * DecryptMessage
422 */
424 PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
425{
426 TRACE("%p, %p, %u, %p\n", phContext, pMessage, MessageSeqNo, pfQOP);
427
428 return ntlm_DecryptMessage( phContext, pMessage, MessageSeqNo, pfQOP );
429}
430
432 1,
433 NULL, /* EnumerateSecurityPackagesA */
434 nego_QueryCredentialsAttributesA, /* QueryCredentialsAttributesA */
435 nego_AcquireCredentialsHandleA, /* AcquireCredentialsHandleA */
436 nego_FreeCredentialsHandle, /* FreeCredentialsHandle */
437 NULL, /* Reserved2 */
438 nego_InitializeSecurityContextA, /* InitializeSecurityContextA */
439 nego_AcceptSecurityContext, /* AcceptSecurityContext */
440 nego_CompleteAuthToken, /* CompleteAuthToken */
441 nego_DeleteSecurityContext, /* DeleteSecurityContext */
442 nego_ApplyControlToken, /* ApplyControlToken */
443 nego_QueryContextAttributesA, /* QueryContextAttributesA */
444 nego_ImpersonateSecurityContext, /* ImpersonateSecurityContext */
445 nego_RevertSecurityContext, /* RevertSecurityContext */
446 nego_MakeSignature, /* MakeSignature */
447 nego_VerifySignature, /* VerifySignature */
448 FreeContextBuffer, /* FreeContextBuffer */
449 NULL, /* QuerySecurityPackageInfoA */
450 NULL, /* Reserved3 */
451 NULL, /* Reserved4 */
452 NULL, /* ExportSecurityContext */
453 NULL, /* ImportSecurityContextA */
454 NULL, /* AddCredentialsA */
455 NULL, /* Reserved8 */
456 NULL, /* QuerySecurityContextToken */
457 nego_EncryptMessage, /* EncryptMessage */
458 nego_DecryptMessage, /* DecryptMessage */
459 NULL, /* SetContextAttributesA */
460};
461
463 1,
464 NULL, /* EnumerateSecurityPackagesW */
465 nego_QueryCredentialsAttributesW, /* QueryCredentialsAttributesW */
466 nego_AcquireCredentialsHandleW, /* AcquireCredentialsHandleW */
467 nego_FreeCredentialsHandle, /* FreeCredentialsHandle */
468 NULL, /* Reserved2 */
469 nego_InitializeSecurityContextW, /* InitializeSecurityContextW */
470 nego_AcceptSecurityContext, /* AcceptSecurityContext */
471 nego_CompleteAuthToken, /* CompleteAuthToken */
472 nego_DeleteSecurityContext, /* DeleteSecurityContext */
473 nego_ApplyControlToken, /* ApplyControlToken */
474 nego_QueryContextAttributesW, /* QueryContextAttributesW */
475 nego_ImpersonateSecurityContext, /* ImpersonateSecurityContext */
476 nego_RevertSecurityContext, /* RevertSecurityContext */
477 nego_MakeSignature, /* MakeSignature */
478 nego_VerifySignature, /* VerifySignature */
479 FreeContextBuffer, /* FreeContextBuffer */
480 NULL, /* QuerySecurityPackageInfoW */
481 NULL, /* Reserved3 */
482 NULL, /* Reserved4 */
483 NULL, /* ExportSecurityContext */
484 NULL, /* ImportSecurityContextW */
485 NULL, /* AddCredentialsW */
486 NULL, /* Reserved8 */
487 NULL, /* QuerySecurityContextToken */
488 nego_EncryptMessage, /* EncryptMessage */
489 nego_DecryptMessage, /* DecryptMessage */
490 NULL, /* SetContextAttributesW */
491};
492
493#define NEGO_MAX_TOKEN 12000
494
495static WCHAR nego_name_W[] = {'N','e','g','o','t','i','a','t','e',0};
496static char nego_name_A[] = "Negotiate";
497
499 {'M','i','c','r','o','s','o','f','t',' ','P','a','c','k','a','g','e',' ',
500 'N','e','g','o','t','i','a','t','o','r',0};
501static CHAR negotiate_comment_A[] = "Microsoft Package Negotiator";
502
503#define CAPS ( \
504 SECPKG_FLAG_INTEGRITY | \
505 SECPKG_FLAG_PRIVACY | \
506 SECPKG_FLAG_CONNECTION | \
507 SECPKG_FLAG_MULTI_REQUIRED | \
508 SECPKG_FLAG_EXTENDED_ERROR | \
509 SECPKG_FLAG_IMPERSONATION | \
510 SECPKG_FLAG_ACCEPT_WIN32_NAME | \
511 SECPKG_FLAG_NEGOTIABLE | \
512 SECPKG_FLAG_GSS_COMPATIBLE | \
513 SECPKG_FLAG_LOGON | \
514 SECPKG_FLAG_RESTRICTED_TOKENS )
515
517{
519
524 SECUR32_addPackages(provider, 1L, &infoA, &infoW);
525}
#define WINE_DEFAULT_DEBUG_CHANNEL(t)
Definition: precomp.h:23
void user(int argc, const char *argv[])
Definition: cmds.c:1350
@ Reserved2
Definition: bcd.h:202
@ Reserved1
Definition: bcd.h:201
#define FIXME(fmt,...)
Definition: debug.h:114
#define NULL
Definition: types.h:112
#define GetProcessHeap()
Definition: compat.h:736
#define CP_ACP
Definition: compat.h:109
#define HeapAlloc
Definition: compat.h:733
#define HeapFree(x, y, z)
Definition: compat.h:735
#define MultiByteToWideChar
Definition: compat.h:110
#define SEC_ENTRY
Definition: stubs.c:6
static SECURITY_STATUS SEC_ENTRY nego_QueryCredentialsAttributesA(PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
Definition: negotiate.c:31
#define NEGO_MAX_TOKEN
Definition: negotiate.c:493
static SECURITY_STATUS SEC_ENTRY nego_DecryptMessage(PCtxtHandle phContext, PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
Definition: negotiate.c:423
static SECURITY_STATUS SEC_ENTRY nego_VerifySignature(PCtxtHandle phContext, PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
Definition: negotiate.c:391
static SECURITY_STATUS SEC_ENTRY nego_ApplyControlToken(PCtxtHandle phContext, PSecBufferDesc pInput)
Definition: negotiate.c:260
static const SecurityFunctionTableA negoTableA
Definition: negotiate.c:431
static SECURITY_STATUS SEC_ENTRY nego_AcceptSecurityContext(PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput, ULONG fContextReq, ULONG TargetDataRep, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
Definition: negotiate.c:213
static SECURITY_STATUS SEC_ENTRY nego_QueryCredentialsAttributesW(PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
Definition: negotiate.c:41
static SECURITY_STATUS SEC_ENTRY nego_InitializeSecurityContextW(PCredHandle phCredential, PCtxtHandle phContext, SEC_WCHAR *pszTargetName, ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
Definition: negotiate.c:162
static SECURITY_STATUS SEC_ENTRY nego_AcquireCredentialsHandleW(SEC_WCHAR *pszPrincipal, SEC_WCHAR *pszPackage, ULONG fCredentialUse, PLUID pLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn, PVOID pGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
Definition: negotiate.c:51
static SECURITY_STATUS SEC_ENTRY nego_EncryptMessage(PCtxtHandle phContext, ULONG fQOP, PSecBufferDesc pMessage, ULONG MessageSeqNo)
Definition: negotiate.c:412
static SECURITY_STATUS SEC_ENTRY nego_QueryContextAttributesA(PCtxtHandle phContext, ULONG ulAttribute, void *pBuffer)
Definition: negotiate.c:311
static SECURITY_STATUS SEC_ENTRY nego_DeleteSecurityContext(PCtxtHandle phContext)
Definition: negotiate.c:250
static SECURITY_STATUS SEC_ENTRY nego_RevertSecurityContext(PCtxtHandle phContext)
Definition: negotiate.c:361
static WCHAR negotiate_comment_W[]
Definition: negotiate.c:498
void SECUR32_initNegotiateSP(void)
Definition: negotiate.c:516
static SECURITY_STATUS SEC_ENTRY nego_QueryContextAttributesW(PCtxtHandle phContext, ULONG ulAttribute, void *pBuffer)
Definition: negotiate.c:280
static WCHAR nego_name_W[]
Definition: negotiate.c:495
static const SecurityFunctionTableW negoTableW
Definition: negotiate.c:462
static char nego_name_A[]
Definition: negotiate.c:496
static SECURITY_STATUS SEC_ENTRY nego_ImpersonateSecurityContext(PCtxtHandle phContext)
Definition: negotiate.c:342
static CHAR negotiate_comment_A[]
Definition: negotiate.c:501
static SECURITY_STATUS SEC_ENTRY nego_AcquireCredentialsHandleA(SEC_CHAR *pszPrincipal, SEC_CHAR *pszPackage, ULONG fCredentialUse, PLUID pLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn, PVOID pGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
Definition: negotiate.c:78
static SECURITY_STATUS SEC_ENTRY nego_CompleteAuthToken(PCtxtHandle phContext, PSecBufferDesc pToken)
Definition: negotiate.c:230
static SECURITY_STATUS SEC_ENTRY nego_MakeSignature(PCtxtHandle phContext, ULONG fQOP, PSecBufferDesc pMessage, ULONG MessageSeqNo)
Definition: negotiate.c:380
static SECURITY_STATUS SEC_ENTRY nego_FreeCredentialsHandle(PCredHandle phCredential)
Definition: negotiate.c:402
static SECURITY_STATUS SEC_ENTRY nego_InitializeSecurityContextA(PCredHandle phCredential, PCtxtHandle phContext, SEC_CHAR *pszTargetName, ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
Definition: negotiate.c:182
SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesW(PCtxtHandle phContext, ULONG ulAttribute, void *pBuffer)
Definition: ntlm.c:1427
SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(PCredHandle phCredential, PCtxtHandle phContext, SEC_WCHAR *pszTargetName, ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
Definition: ntlm.c:484
SECURITY_STATUS SEC_ENTRY ntlm_AcceptSecurityContext(PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput, ULONG fContextReq, ULONG TargetDataRep, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
Definition: ntlm.c:1029
SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesA(PCtxtHandle phContext, ULONG ulAttribute, void *pBuffer)
Definition: ntlm.c:1482
SECURITY_STATUS SEC_ENTRY ntlm_VerifySignature(PCtxtHandle phContext, PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
Definition: ntlm.c:1697
SECURITY_STATUS SEC_ENTRY ntlm_FreeCredentialsHandle(PCredHandle phCredential)
Definition: ntlm.c:1767
SecPkgInfoW * ntlm_package_infoW
Definition: ntlm.c:2024
SECURITY_STATUS SEC_ENTRY ntlm_AcquireCredentialsHandleW(SEC_WCHAR *pszPrincipal, SEC_WCHAR *pszPackage, ULONG fCredentialUse, PLUID pLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn, PVOID pGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
Definition: ntlm.c:127
SECURITY_STATUS SEC_ENTRY ntlm_MakeSignature(PCtxtHandle phContext, ULONG fQOP, PSecBufferDesc pMessage, ULONG MessageSeqNo)
Definition: ntlm.c:1662
SECURITY_STATUS SEC_ENTRY ntlm_DecryptMessage(PCtxtHandle phContext, PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
Definition: ntlm.c:1863
SECURITY_STATUS SEC_ENTRY ntlm_EncryptMessage(PCtxtHandle phContext, ULONG fQOP, PSecBufferDesc pMessage, ULONG MessageSeqNo)
Definition: ntlm.c:1792
SECURITY_STATUS SEC_ENTRY ntlm_DeleteSecurityContext(PCtxtHandle phContext)
Definition: ntlm.c:1398
SecPkgInfoA * ntlm_package_infoA
Definition: ntlm.c:2023
GLenum target
Definition: glext.h:7315
static const SecPkgInfoW infoW
Definition: kerberos.c:293
static const SecPkgInfoA infoA
Definition: kerberos.c:302
#define CAPS
Definition: kerberos.c:274
#define debugstr_a
Definition: kernel32.h:31
#define debugstr_w
Definition: kernel32.h:32
static const struct @546 sizes[]
LONG SECURITY_STATUS
Definition: sspi.h:34
CHAR SEC_CHAR
Definition: sspi.h:30
#define SECPKG_ATTR_NEGOTIATION_INFO
Definition: sspi.h:533
void(SEC_ENTRY * SEC_GET_KEY_FN)(void *Arg, void *Principal, ULONG KeyVer, void **Key, SECURITY_STATUS *Status)
Definition: sspi.h:189
#define SECPKG_ATTR_SIZES
Definition: sspi.h:521
#define SECPKG_NEGOTIATION_COMPLETE
Definition: sspi.h:701
WCHAR SEC_WCHAR
Definition: sspi.h:29
PVOID pBuffer
static const WCHAR ntlmW[]
#define SEC_WINNT_AUTH_IDENTITY_UNICODE
Definition: rpcdce.h:310
#define SEC_WINNT_AUTH_IDENTITY_ANSI
Definition: rpcdce.h:309
#define RPC_C_AUTHN_GSS_NEGOTIATE
Definition: rpcdce.h:157
SecureProvider * SECUR32_addProvider(const SecurityFunctionTableA *fnTableA, const SecurityFunctionTableW *fnTableW, PCWSTR moduleName) DECLSPEC_HIDDEN
Definition: secur32_wine.c:314
void SECUR32_addPackages(SecureProvider *provider, ULONG toAdd, const SecPkgInfoA *infoA, const SecPkgInfoW *infoW) DECLSPEC_HIDDEN
Definition: secur32_wine.c:362
#define TRACE(s)
Definition: solgame.cpp:4
SECURITY_STATUS WINAPI FreeContextBuffer(PVOID pv)
Definition: sspi.c:699
int no_cached_credentials
Definition: ntlm.h:65
ULONG_PTR dwLower
Definition: sspi.h:53
Definition: cookie.c:42
uint32_t * PULONG
Definition: typedefs.h:59
uint32_t ULONG
Definition: typedefs.h:59
int ret
#define SEC_E_OK
Definition: winerror.h:2356
#define SEC_E_INVALID_HANDLE
Definition: winerror.h:2910
#define SEC_E_UNSUPPORTED_FUNCTION
Definition: winerror.h:2911
#define SEC_E_INSUFFICIENT_MEMORY
Definition: winerror.h:2909
const char * LPCSTR
Definition: xmlstorage.h:183
__wchar_t WCHAR
Definition: xmlstorage.h:180
char CHAR
Definition: xmlstorage.h:175