ReactOS 0.4.15-dev-7953-g1f49173
negotiate.c File Reference
#include <stdarg.h>
#include <stdio.h>
#include <windef.h>
#include <winbase.h>
#include <sspi.h>
#include <rpc.h>
#include <rpcdce.h>
#include <secext.h>
#include "wine/test.h"
Include dependency graph for negotiate.c:

Go to the source code of this file.

Classes

struct  sspi_data
 

Macros

#define SECURITY_WIN32
 
#define NEGOTIATE_BASE_CAPS
 
#define NTLM_BASE_CAPS
 

Functions

static void cleanup_buffers (struct sspi_data *data)
 
static void setup_buffers (struct sspi_data *data, SecPkgInfoA *info)
 
static SECURITY_STATUS setup_client (struct sspi_data *data, SEC_CHAR *provider)
 
static SECURITY_STATUS setup_server (struct sspi_data *data, SEC_CHAR *provider)
 
static SECURITY_STATUS run_client (struct sspi_data *data, BOOL first)
 
static SECURITY_STATUS run_server (struct sspi_data *data, BOOL first)
 
static void communicate (struct sspi_data *from, struct sspi_data *to)
 
static void test_authentication (void)
 
 START_TEST (negotiate)
 

Macro Definition Documentation

◆ NEGOTIATE_BASE_CAPS

#define NEGOTIATE_BASE_CAPS
Value:
( \
#define SECPKG_FLAG_IMPERSONATION
Definition: sspi.h:134
#define SECPKG_FLAG_EXTENDED_ERROR
Definition: sspi.h:133
#define SECPKG_FLAG_PRIVACY
Definition: sspi.h:127
#define SECPKG_FLAG_MULTI_REQUIRED
Definition: sspi.h:131
#define SECPKG_FLAG_CONNECTION
Definition: sspi.h:130
#define SECPKG_FLAG_NEGOTIABLE
Definition: sspi.h:137
#define SECPKG_FLAG_INTEGRITY
Definition: sspi.h:126
#define SECPKG_FLAG_LOGON
Definition: sspi.h:139
#define SECPKG_FLAG_ACCEPT_WIN32_NAME
Definition: sspi.h:135
#define SECPKG_FLAG_GSS_COMPATIBLE
Definition: sspi.h:138

Definition at line 34 of file negotiate.c.

◆ NTLM_BASE_CAPS

◆ SECURITY_WIN32

#define SECURITY_WIN32

Definition at line 26 of file negotiate.c.

Function Documentation

◆ cleanup_buffers()

static void cleanup_buffers ( struct sspi_data data)
static

Definition at line 67 of file negotiate.c.

68{
69 unsigned int i;
70
71 if (data->in_buf)
72 {
73 for (i = 0; i < data->in_buf->cBuffers; ++i)
74 HeapFree( GetProcessHeap(), 0, data->in_buf->pBuffers[i].pvBuffer );
75 HeapFree( GetProcessHeap(), 0, data->in_buf->pBuffers );
76 HeapFree( GetProcessHeap(), 0, data->in_buf );
77 }
78 if (data->out_buf)
79 {
80 for (i = 0; i < data->out_buf->cBuffers; ++i)
81 HeapFree( GetProcessHeap(), 0, data->out_buf->pBuffers[i].pvBuffer );
82 HeapFree( GetProcessHeap(), 0, data->out_buf->pBuffers );
83 HeapFree( GetProcessHeap(), 0, data->out_buf );
84 }
85}
#define GetProcessHeap()
Definition: compat.h:736
#define HeapFree(x, y, z)
Definition: compat.h:735
GLint GLenum GLsizei GLsizei GLsizei GLint GLsizei const GLvoid * data
Definition: gl.h:1950
GLsizei GLenum const GLvoid GLsizei GLenum GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLint GLint GLint GLshort GLshort GLshort GLubyte GLubyte GLubyte GLuint GLuint GLuint GLushort GLushort GLushort GLbyte GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLfloat GLint GLint GLint GLint GLshort GLshort GLshort GLshort GLubyte GLubyte GLubyte GLubyte GLuint GLuint GLuint GLuint GLushort GLushort GLushort GLushort GLboolean const GLdouble const GLfloat const GLint const GLshort const GLbyte const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLdouble const GLfloat const GLfloat const GLint const GLint const GLshort const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort GLenum GLenum GLenum GLfloat GLenum GLint GLenum GLenum GLenum GLfloat GLenum GLenum GLint GLenum GLfloat GLenum GLint GLint GLushort GLenum GLenum GLfloat GLenum GLenum GLint GLfloat const GLubyte GLenum GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLint GLint GLsizei GLsizei GLint GLenum GLenum const GLvoid GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLenum const GLdouble GLenum GLenum const GLfloat GLenum GLenum const GLint GLsizei GLuint GLfloat GLuint GLbitfield GLfloat GLint GLuint GLboolean GLenum GLfloat GLenum GLbitfield GLenum GLfloat GLfloat GLint GLint const GLfloat GLenum GLfloat GLfloat GLint GLint GLfloat GLfloat GLint GLint const GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat const GLdouble const GLfloat const GLdouble const GLfloat GLint i
Definition: glfuncs.h:248

Referenced by test_authentication().

◆ communicate()

static void communicate ( struct sspi_data from,
struct sspi_data to 
)
static

Definition at line 205 of file negotiate.c.

206{
207 trace( "running communicate\n" );
208 memset( to->in_buf->pBuffers[0].pvBuffer, 0, to->max_token );
209 memcpy( to->in_buf->pBuffers[0].pvBuffer, from->out_buf->pBuffers[0].pvBuffer,
210 from->out_buf->pBuffers[0].cbBuffer );
211 to->in_buf->pBuffers[0].cbBuffer = from->out_buf->pBuffers[0].cbBuffer;
212 memset( from->out_buf->pBuffers[0].pvBuffer, 0, from->max_token );
213}
#define trace
Definition: atltest.h:70
#define memcpy(s1, s2, n)
Definition: mkisofs.h:878
#define memset(x, y, z)
Definition: compat.h:39
CardRegion * from
Definition: spigame.cpp:19
PSecBufferDesc in_buf
Definition: negotiate.c:61
ULONG max_token
Definition: negotiate.c:64

Referenced by test_authentication().

◆ run_client()

static SECURITY_STATUS run_client ( struct sspi_data data,
BOOL  first 
)
static

Definition at line 154 of file negotiate.c.

155{
157 TimeStamp ttl;
158 ULONG attr;
159
160 trace( "running client for the %s time\n", first ? "first" : "second" );
161
162 data->out_buf->pBuffers[0].cbBuffer = data->max_token;
163 data->out_buf->pBuffers[0].BufferType = SECBUFFER_TOKEN;
164
165 ret = InitializeSecurityContextA( first ? &data->cred : NULL, first ? NULL : &data->ctxt,
166 NULL, 0, 0, SECURITY_NETWORK_DREP, first ? NULL : data->in_buf,
167 0, &data->ctxt, data->out_buf, &attr, &ttl );
169 {
170 CompleteAuthToken( &data->ctxt, data->out_buf );
173 else if (ret == SEC_I_COMPLETE_NEEDED)
174 ret = SEC_E_OK;
175 }
176 ok( data->out_buf->pBuffers[0].BufferType == SECBUFFER_TOKEN,
177 "buffer type changed from SECBUFFER_TOKEN to %u\n", data->out_buf->pBuffers[0].BufferType );
178 ok( data->out_buf->pBuffers[0].cbBuffer < data->max_token,
179 "InitializeSecurityContext didn't change buffer size\n" );
180 return ret;
181}
#define ok(value,...)
Definition: atltest.h:57
#define NULL
Definition: types.h:112
const GLint * first
Definition: glext.h:5794
LONG SECURITY_STATUS
Definition: sspi.h:34
#define SECBUFFER_TOKEN
Definition: sspi.h:161
#define SECURITY_NETWORK_DREP
Definition: sspi.h:474
Definition: cookie.c:202
uint32_t ULONG
Definition: typedefs.h:59
int ret
#define SEC_E_OK
Definition: winerror.h:2356
#define SEC_I_COMPLETE_NEEDED
Definition: winerror.h:2928
#define SEC_I_CONTINUE_NEEDED
Definition: winerror.h:2927
#define SEC_I_COMPLETE_AND_CONTINUE
Definition: winerror.h:2929
SECURITY_STATUS WINAPI CompleteAuthToken(PCtxtHandle phContext, PSecBufferDesc pToken)
Definition: wrapper.c:420
SECURITY_STATUS WINAPI InitializeSecurityContextA(PCredHandle phCredential, PCtxtHandle phContext, SEC_CHAR *pszTargetName, ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
Definition: wrapper.c:237

Referenced by test_authentication().

◆ run_server()

static SECURITY_STATUS run_server ( struct sspi_data data,
BOOL  first 
)
static

Definition at line 183 of file negotiate.c.

184{
186 TimeStamp ttl;
187 ULONG attr;
188
189 trace( "running server for the %s time\n", first ? "first" : "second" );
190
191 ret = AcceptSecurityContext( &data->cred, first ? NULL : &data->ctxt,
192 data->in_buf, 0, SECURITY_NETWORK_DREP,
193 &data->ctxt, data->out_buf, &attr, &ttl );
195 {
196 CompleteAuthToken( &data->ctxt, data->out_buf );
199 else if (ret == SEC_I_COMPLETE_NEEDED)
200 ret = SEC_E_OK;
201 }
202 return ret;
203}
SECURITY_STATUS WINAPI AcceptSecurityContext(PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput, ULONG fContextReq, ULONG TargetDataRep, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
Definition: wrapper.c:365

Referenced by test_authentication().

◆ setup_buffers()

static void setup_buffers ( struct sspi_data data,
SecPkgInfoA info 
)
static

Definition at line 87 of file negotiate.c.

88{
90
91 data->in_buf = HeapAlloc( GetProcessHeap(), 0, sizeof(SecBufferDesc) );
92 data->out_buf = HeapAlloc( GetProcessHeap(), 0, sizeof(SecBufferDesc) );
93 data->max_token = info->cbMaxToken;
94
95 data->in_buf->ulVersion = SECBUFFER_VERSION;
96 data->in_buf->cBuffers = 1;
97 data->in_buf->pBuffers = buffer;
98
99 buffer->cbBuffer = info->cbMaxToken;
100 buffer->BufferType = SECBUFFER_TOKEN;
101 buffer->pvBuffer = HeapAlloc( GetProcessHeap(), 0, info->cbMaxToken );
102
103 buffer = HeapAlloc( GetProcessHeap(), 0, sizeof(SecBuffer) );
104
105 data->out_buf->ulVersion = SECBUFFER_VERSION;
106 data->out_buf->cBuffers = 1;
107 data->out_buf->pBuffers = buffer;
108
109 buffer->cbBuffer = info->cbMaxToken;
110 buffer->BufferType = SECBUFFER_TOKEN;
111 buffer->pvBuffer = HeapAlloc( GetProcessHeap(), 0, info->cbMaxToken );
112}
#define HeapAlloc
Definition: compat.h:733
GLuint buffer
Definition: glext.h:5915
#define SECBUFFER_VERSION
Definition: sspi.h:187

Referenced by setup_client(), and setup_server().

◆ setup_client()

static SECURITY_STATUS setup_client ( struct sspi_data data,
SEC_CHAR provider 
)
static

Definition at line 114 of file negotiate.c.

115{
118 TimeStamp ttl;
119
120 trace( "setting up client\n" );
121
122 ret = QuerySecurityPackageInfoA( provider, &info );
123 ok( ret == SEC_E_OK, "QuerySecurityPackageInfo returned %08x\n", ret );
124
127
129 data->id, NULL, NULL, &data->cred, &ttl );
130 ok( ret == SEC_E_OK, "AcquireCredentialsHandleA returned %08x\n", ret );
131 return ret;
132}
static void setup_buffers(struct sspi_data *data, SecPkgInfoA *info)
Definition: negotiate.c:87
#define SECPKG_CRED_OUTBOUND
Definition: sspi.h:291
SECURITY_STATUS WINAPI FreeContextBuffer(PVOID pv)
Definition: sspi.c:699
SECURITY_STATUS WINAPI AcquireCredentialsHandleA(SEC_CHAR *pszPrincipal, SEC_CHAR *pszPackage, ULONG fCredentialsUse, PLUID pvLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn, PVOID pvGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
Definition: wrapper.c:59
SECURITY_STATUS WINAPI QuerySecurityPackageInfoA(SEC_CHAR *pszPackageName, PSecPkgInfoA *ppPackageInfo)
Definition: wrapper.c:683

Referenced by test_authentication().

◆ setup_server()

static SECURITY_STATUS setup_server ( struct sspi_data data,
SEC_CHAR provider 
)
static

Definition at line 134 of file negotiate.c.

135{
138 TimeStamp ttl;
139
140 trace( "setting up server\n" );
141
142 ret = QuerySecurityPackageInfoA( provider, &info );
143 ok( ret == SEC_E_OK, "QuerySecurityPackageInfo returned %08x\n", ret );
144
147
149 NULL, NULL, NULL, &data->cred, &ttl );
150 ok( ret == SEC_E_OK, "AcquireCredentialsHandleA returned %08x\n", ret );
151 return ret;
152}
#define SECPKG_CRED_INBOUND
Definition: sspi.h:290

Referenced by test_authentication().

◆ START_TEST()

START_TEST ( negotiate  )

Definition at line 349 of file negotiate.c.

350{
352
353 if (QuerySecurityPackageInfoA( (SEC_CHAR *)"Negotiate", &info ))
354 {
355 ok( 0, "Negotiate package not installed, skipping test\n" );
356 return;
357 }
358 ok( info->fCapabilities == NEGOTIATE_BASE_CAPS ||
363 "got %08x\n", info->fCapabilities );
364 ok( info->wVersion == 1, "got %u\n", info->wVersion );
365 ok( info->wRPCID == RPC_C_AUTHN_GSS_NEGOTIATE, "got %u\n", info->wRPCID );
366 ok( !lstrcmpA( info->Name, "Negotiate" ), "got %s\n", info->Name );
368
370}
int WINAPI lstrcmpA(LPCSTR lpString1, LPCSTR lpString2)
Definition: lstring.c:18
static void test_authentication(void)
Definition: negotiate.c:215
#define NEGOTIATE_BASE_CAPS
Definition: negotiate.c:34
#define SECPKG_FLAG_APPCONTAINER_CHECKS
Definition: sspi.h:149
CHAR SEC_CHAR
Definition: sspi.h:30
#define SECPKG_FLAG_RESTRICTED_TOKENS
Definition: sspi.h:145
#define SECPKG_FLAG_READONLY_WITH_CHECKSUM
Definition: sspi.h:144
#define RPC_C_AUTHN_GSS_NEGOTIATE
Definition: rpcdce.h:157

◆ test_authentication()

static void test_authentication ( void  )
static

Definition at line 215 of file negotiate.c.

216{
218 status_s = SEC_I_CONTINUE_NEEDED, status;
219 struct sspi_data client, server;
224 BOOL first = TRUE;
225
226 memset(&client, 0, sizeof(client));
227 memset(&server, 0, sizeof(server));
228
229 id.User = (unsigned char *)"user";
230 id.UserLength = strlen( "user" );
231 id.Domain = (unsigned char *)"domain";
232 id.DomainLength = strlen( "domain" );
233 id.Password = (unsigned char *)"password";
234 id.PasswordLength = strlen( "password" );
236
237 client.id = &id;
238 if ((status = setup_client( &client, (SEC_CHAR *)"Negotiate" )))
239 {
240 skip( "setup_client returned %08x, skipping test\n", status );
241 return;
242 }
243 if ((status = setup_server( &server, (SEC_CHAR *)"Negotiate" )))
244 {
245 skip( "setup_server returned %08x, skipping test\n", status );
247 return;
248 }
249
250 while (status_c == SEC_I_CONTINUE_NEEDED && status_s == SEC_I_CONTINUE_NEEDED)
251 {
252 status_c = run_client( &client, first );
253 ok( status_c == SEC_E_OK || status_c == SEC_I_CONTINUE_NEEDED,
254 "client returned %08x, more tests will fail\n", status_c );
255
257
258 status_s = run_server( &server, first );
259 ok( status_s == SEC_E_OK || status_s == SEC_I_CONTINUE_NEEDED ||
260 status_s == SEC_E_LOGON_DENIED,
261 "server returned %08x, more tests will fail\n", status_s );
262
264 trace( "looping\n");
265 first = FALSE;
266 }
267 if (status_c != SEC_E_OK)
268 {
269 skip( "authentication failed, skipping remaining tests\n" );
270 goto done;
271 }
272
273 sizes.cbMaxToken = 0xdeadbeef;
274 sizes.cbMaxSignature = 0xdeadbeef;
275 sizes.cbSecurityTrailer = 0xdeadbeef;
276 sizes.cbBlockSize = 0xdeadbeef;
278 ok( status_c == SEC_E_OK, "pQueryContextAttributesA returned %08x\n", status_c );
279 ok( sizes.cbMaxToken == 2888 || sizes.cbMaxToken == 1904,
280 "expected 2888 or 1904, got %u\n", sizes.cbMaxToken );
281 ok( sizes.cbMaxSignature == 16, "expected 16, got %u\n", sizes.cbMaxSignature );
282 ok( sizes.cbSecurityTrailer == 16, "expected 16, got %u\n", sizes.cbSecurityTrailer );
283 ok( !sizes.cbBlockSize, "expected 0, got %u\n", sizes.cbBlockSize );
284
285 memset( &info, 0, sizeof(info) );
287 ok( status_c == SEC_E_OK, "QueryContextAttributesA returned %08x\n", status_c );
288
289 pi = info.PackageInfo;
290 ok( info.NegotiationState == SECPKG_NEGOTIATION_COMPLETE, "got %u\n", info.NegotiationState );
291 ok( pi != NULL, "expected non-NULL PackageInfo\n" );
292 if (pi)
293 {
294 UINT expected, got;
295 char *eob;
296
297 ok( pi->fCapabilities == NTLM_BASE_CAPS ||
299 pi->fCapabilities == (NTLM_BASE_CAPS|SECPKG_FLAG_RESTRICTED_TOKENS) ||
304 "got %08x\n", pi->fCapabilities );
305 ok( pi->wVersion == 1, "got %u\n", pi->wVersion );
306 ok( pi->wRPCID == RPC_C_AUTHN_WINNT, "got %u\n", pi->wRPCID );
307 ok( !lstrcmpA( pi->Name, "NTLM" ), "got %s\n", pi->Name );
308
309 expected = sizeof(*pi) + lstrlenA(pi->Name) + 1 + lstrlenA(pi->Comment) + 1;
310 got = HeapSize(GetProcessHeap(), 0, pi);
311 ok( got == expected, "got %u, expected %u\n", got, expected );
312 eob = (char *)pi + expected;
313 ok( pi->Name + lstrlenA(pi->Name) < eob, "Name doesn't fit into allocated block\n" );
314 ok( pi->Comment + lstrlenA(pi->Comment) < eob, "Comment doesn't fit into allocated block\n" );
315
317 ok( status == SEC_E_OK, "FreeContextBuffer error %#x\n", status );
318 }
319
320done:
323
324 if (client.ctxt.dwLower || client.ctxt.dwUpper)
325 {
326 status_c = DeleteSecurityContext( &client.ctxt );
327 ok( status_c == SEC_E_OK, "DeleteSecurityContext returned %08x\n", status_c );
328 }
329
330 if (server.ctxt.dwLower || server.ctxt.dwUpper)
331 {
332 status_s = DeleteSecurityContext( &server.ctxt );
333 ok( status_s == SEC_E_OK, "DeleteSecurityContext returned %08x\n", status_s );
334 }
335
336 if (client.cred.dwLower || client.cred.dwUpper)
337 {
338 status_c = FreeCredentialsHandle( &client.cred );
339 ok( status_c == SEC_E_OK, "FreeCredentialsHandle returned %08x\n", status_c );
340 }
341
342 if (server.cred.dwLower || server.cred.dwUpper)
343 {
344 status_s = FreeCredentialsHandle(&server.cred);
345 ok( status_s == SEC_E_OK, "FreeCredentialsHandle returned %08x\n", status_s );
346 }
347}
ACPI_SIZE strlen(const char *String)
Definition: utclib.c:269
#define skip(...)
Definition: atltest.h:64
#define TRUE
Definition: types.h:120
#define FALSE
Definition: types.h:117
unsigned int BOOL
Definition: ntddk_ex.h:94
GLuint id
Definition: glext.h:5910
int WINAPI lstrlenA(LPCSTR lpString)
Definition: lstring.c:145
BOOL expected
Definition: store.c:2063
static refpint_t pi[]
Definition: server.c:96
static SECURITY_STATUS run_server(struct sspi_data *data, BOOL first)
Definition: negotiate.c:183
static void cleanup_buffers(struct sspi_data *data)
Definition: negotiate.c:67
static SECURITY_STATUS setup_client(struct sspi_data *data, SEC_CHAR *provider)
Definition: negotiate.c:114
#define NTLM_BASE_CAPS
Definition: negotiate.c:46
static SECURITY_STATUS run_client(struct sspi_data *data, BOOL first)
Definition: negotiate.c:154
static void communicate(struct sspi_data *from, struct sspi_data *to)
Definition: negotiate.c:205
static SECURITY_STATUS setup_server(struct sspi_data *data, SEC_CHAR *provider)
Definition: negotiate.c:134
static const struct @542 sizes[]
unsigned int UINT
Definition: ndis.h:50
#define SECPKG_ATTR_NEGOTIATION_INFO
Definition: sspi.h:533
#define SECPKG_FLAG_APPLY_LOOPBACK
Definition: sspi.h:150
#define SECPKG_ATTR_SIZES
Definition: sspi.h:521
#define SECPKG_NEGOTIATION_COMPLETE
Definition: sspi.h:701
#define SEC_WINNT_AUTH_IDENTITY_ANSI
Definition: rpcdce.h:309
#define RPC_C_AUTHN_WINNT
Definition: rpcdce.h:158
static FILE * client
Definition: client.c:41
Definition: ps.c:97
static rfbScreenInfoPtr server
Definition: vnc.c:74
SIZE_T WINAPI HeapSize(HANDLE, DWORD, LPCVOID)
#define SEC_E_LOGON_DENIED
Definition: winerror.h:2921
SECURITY_STATUS WINAPI QueryContextAttributesA(PCtxtHandle phContext, ULONG ulAttribute, void *pBuffer)
Definition: wrapper.c:505
SECURITY_STATUS WINAPI DeleteSecurityContext(PCtxtHandle phContext)
Definition: wrapper.c:450
SECURITY_STATUS WINAPI FreeCredentialsHandle(PCredHandle phCredential)
Definition: wrapper.c:151

Referenced by START_TEST().