27#define KERBEROS_MAX_BUF 12000
34 FIXME(
"(%p %d %p)\n", phCredential, ulAttribute,
pBuffer);
43 FIXME(
"(%p, %d, %p)\n", phCredential, ulAttribute,
pBuffer);
54 pLogonID, pAuthData, pGetKeyFn, pGetKeyArgument, phCredential, ptsExpiry);
65 pLogonID, pAuthData, pGetKeyFn, pGetKeyArgument, phCredential, ptsExpiry);
76 FIXME(
"(%p %p %s 0x%08x %d %d %p %d %p %p %p %p)\n", phCredential, phContext,
debugstr_w(pszTargetName),
77 fContextReq,
Reserved1, TargetDataRep, pInput,
Reserved1, phNewContext, pOutput, pfContextAttr, ptsExpiry);
88 FIXME(
"%p %p %s %d %d %d %p %d %p %p %p %p\n", phCredential, phContext,
debugstr_a(pszTargetName), fContextReq,
89 Reserved1, TargetDataRep, pInput,
Reserved1, phNewContext, pOutput, pfContextAttr, ptsExpiry);
99 FIXME(
"(%p %p %p %d %d %p %p %p %p)\n", phCredential, phContext, pInput, fContextReq, TargetDataRep, phNewContext, pOutput,
100 pfContextAttr, ptsExpiry);
109 FIXME(
"(%p %p)\n", phContext, pToken);
118 FIXME(
"(%p)\n", phContext);
145 FIXME(
"(%p)\n", phContext);
154 FIXME(
"(%p)\n", phContext);
163 FIXME(
"(%p %d %p %d)\n", phContext, fQOP, pMessage, MessageSeqNo);
172 FIXME(
"(%p %p %d %p)\n", phContext, pMessage, MessageSeqNo, pfQOP);
181 FIXME(
"(%p)\n", phCredential);
190 FIXME(
"(%p %d %p %d)\n", phContext, fQOP, pMessage, MessageSeqNo);
199 FIXME(
"(%p %p %d %p)\n", phContext, pMessage, MessageSeqNo, pfQOP);
265#define KERBEROS_COMMENT \
266 {'M','i','c','r','o','s','o','f','t',' ','K','e','r','b','e','r','o','s',' ','V','1','.','0',0}
270#define KERBEROS_NAME {'K','e','r','b','e','r','o','s',0}
275 ( SECPKG_FLAG_INTEGRITY \
276 | SECPKG_FLAG_PRIVACY \
277 | SECPKG_FLAG_TOKEN_ONLY \
278 | SECPKG_FLAG_DATAGRAM \
279 | SECPKG_FLAG_CONNECTION \
280 | SECPKG_FLAG_MULTI_REQUIRED \
281 | SECPKG_FLAG_EXTENDED_ERROR \
282 | SECPKG_FLAG_IMPERSONATION \
283 | SECPKG_FLAG_ACCEPT_WIN32_NAME \
284 | SECPKG_FLAG_NEGOTIABLE \
285 | SECPKG_FLAG_GSS_COMPATIBLE \
286 | SECPKG_FLAG_LOGON \
287 | SECPKG_FLAG_MUTUAL_AUTH \
288 | SECPKG_FLAG_DELEGATION \
289 | SECPKG_FLAG_READONLY_WITH_CHECKSUM \
290 | SECPKG_FLAG_RESTRICTED_TOKENS \
291 | SECPKG_FLAG_APPCONTAINER_CHECKS)
#define WINE_DEFAULT_DEBUG_CHANNEL(t)
static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesA(CredHandle *phCredential, ULONG ulAttribute, void *pBuffer)
void SECUR32_initKerberosSP(void)
static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextW(CredHandle *phCredential, CtxtHandle *phContext, SEC_WCHAR *pszTargetName, ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep, SecBufferDesc *pInput, ULONG Reserved2, CtxtHandle *phNewContext, SecBufferDesc *pOutput, ULONG *pfContextAttr, TimeStamp *ptsExpiry)
static SECURITY_STATUS SEC_ENTRY kerberos_VerifySignature(CtxtHandle *phContext, SecBufferDesc *pMessage, ULONG MessageSeqNo, PULONG pfQOP)
static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesW(CtxtHandle *phContext, ULONG ulAttribute, void *pBuffer)
static WCHAR kerberos_name_W[]
static const SecPkgInfoW infoW
static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextA(CredHandle *phCredential, CtxtHandle *phContext, SEC_CHAR *pszTargetName, ULONG fContextReq, ULONG Reserved1, ULONG TargetDataRep, SecBufferDesc *pInput, ULONG Reserved2, CtxtHandle *phNewContext, SecBufferDesc *pOutput, ULONG *pfContextAttr, TimeStamp *ptsExpiry)
static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesA(CtxtHandle *phContext, ULONG ulAttribute, void *pBuffer)
static const SecPkgInfoA infoA
static SECURITY_STATUS SEC_ENTRY kerberos_EncryptMessage(CtxtHandle *phContext, ULONG fQOP, SecBufferDesc *pMessage, ULONG MessageSeqNo)
static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleA(SEC_CHAR *pszPrincipal, SEC_CHAR *pszPackage, ULONG fCredentialUse, LUID *pLogonID, void *pAuthData, SEC_GET_KEY_FN pGetKeyFn, void *pGetKeyArgument, CredHandle *phCredential, TimeStamp *ptsExpiry)
static SECURITY_STATUS SEC_ENTRY kerberos_AcceptSecurityContext(CredHandle *phCredential, CtxtHandle *phContext, SecBufferDesc *pInput, ULONG fContextReq, ULONG TargetDataRep, CtxtHandle *phNewContext, SecBufferDesc *pOutput, ULONG *pfContextAttr, TimeStamp *ptsExpiry)
static SECURITY_STATUS SEC_ENTRY kerberos_DecryptMessage(CtxtHandle *phContext, SecBufferDesc *pMessage, ULONG MessageSeqNo, PULONG pfQOP)
static SECURITY_STATUS SEC_ENTRY kerberos_RevertSecurityContext(CtxtHandle *phContext)
static const SecurityFunctionTableA kerberosTableA
static CHAR kerberos_comment_A[]
static SECURITY_STATUS SEC_ENTRY kerberos_MakeSignature(CtxtHandle *phContext, ULONG fQOP, SecBufferDesc *pMessage, ULONG MessageSeqNo)
static SECURITY_STATUS SEC_ENTRY kerberos_FreeCredentialsHandle(PCredHandle phCredential)
static SECURITY_STATUS SEC_ENTRY kerberos_ImpersonateSecurityContext(CtxtHandle *phContext)
static const SecurityFunctionTableW kerberosTableW
static char kerberos_name_A[]
static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesW(CredHandle *phCredential, ULONG ulAttribute, void *pBuffer)
static WCHAR kerberos_comment_W[]
static SECURITY_STATUS SEC_ENTRY kerberos_CompleteAuthToken(CtxtHandle *phContext, SecBufferDesc *pToken)
static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleW(SEC_WCHAR *pszPrincipal, SEC_WCHAR *pszPackage, ULONG fCredentialUse, LUID *pLogonID, void *pAuthData, SEC_GET_KEY_FN pGetKeyFn, void *pGetKeyArgument, CredHandle *phCredential, TimeStamp *ptsExpiry)
static SECURITY_STATUS SEC_ENTRY kerberos_DeleteSecurityContext(CtxtHandle *phContext)
void(SEC_ENTRY * SEC_GET_KEY_FN)(void *Arg, void *Principal, ULONG KeyVer, void **Key, SECURITY_STATUS *Status)
#define RPC_C_AUTHN_GSS_KERBEROS
SecureProvider * SECUR32_addProvider(const SecurityFunctionTableA *fnTableA, const SecurityFunctionTableW *fnTableW, PCWSTR moduleName) DECLSPEC_HIDDEN
void SECUR32_addPackages(SecureProvider *provider, ULONG toAdd, const SecPkgInfoA *infoA, const SecPkgInfoW *infoW) DECLSPEC_HIDDEN
SECURITY_STATUS WINAPI FreeContextBuffer(PVOID pv)
#define SEC_E_UNSUPPORTED_FUNCTION
#define SEC_E_NO_CREDENTIALS