mirror of
https://github.com/reactos/wine.git
synced 2024-11-30 07:00:30 +00:00
1126 lines
36 KiB
C
1126 lines
36 KiB
C
/* Copyright (C) 2004 Juan Lang
|
|
*
|
|
* Implements secur32 functions that forward to (wrap) an SSP's implementation.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
#include <stdarg.h>
|
|
#include "windef.h"
|
|
#include "winbase.h"
|
|
#include "winnls.h"
|
|
#include "sspi.h"
|
|
#include "secur32_priv.h"
|
|
|
|
#include "wine/debug.h"
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(secur32);
|
|
|
|
/* Tries to allocate a new SecHandle, into which it stores package (in
|
|
* phSec->dwUpper) and a copy of realHandle (allocated with SECUR32_ALLOC,
|
|
* and stored in phSec->dwLower). SecHandle is equivalent to both a
|
|
* CredHandle and a CtxtHandle.
|
|
*/
|
|
static SECURITY_STATUS SECUR32_makeSecHandle(PSecHandle phSec,
|
|
SecurePackage *package, PSecHandle realHandle)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %p %p\n", phSec, package, realHandle);
|
|
|
|
if (phSec && package && realHandle)
|
|
{
|
|
PSecHandle newSec = (PSecHandle)SECUR32_ALLOC(sizeof(SecHandle));
|
|
|
|
if (newSec)
|
|
{
|
|
memcpy(newSec, realHandle, sizeof(*realHandle));
|
|
phSec->dwUpper = (ULONG_PTR)package;
|
|
phSec->dwLower = (ULONG_PTR)newSec;
|
|
ret = SEC_E_OK;
|
|
}
|
|
else
|
|
ret = SEC_E_INSUFFICIENT_MEMORY;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* AcquireCredentialsHandleA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI AcquireCredentialsHandleA(
|
|
SEC_CHAR *pszPrincipal, SEC_CHAR *pszPackage, ULONG fCredentialsUse,
|
|
PLUID pvLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn,
|
|
PVOID pvGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%s %s %d %p %p %p %p %p %p\n", debugstr_a(pszPrincipal),
|
|
debugstr_a(pszPackage), fCredentialsUse, pvLogonID, pAuthData, pGetKeyFn,
|
|
pvGetKeyArgument, phCredential, ptsExpiry);
|
|
if (pszPackage)
|
|
{
|
|
SecurePackage *package = SECUR32_findPackageA(pszPackage);
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableA.AcquireCredentialsHandleA)
|
|
{
|
|
CredHandle myCred;
|
|
|
|
ret = package->provider->fnTableA.AcquireCredentialsHandleA(
|
|
pszPrincipal, pszPackage, fCredentialsUse, pvLogonID,
|
|
pAuthData, pGetKeyFn, pvGetKeyArgument, &myCred,
|
|
ptsExpiry);
|
|
if (ret == SEC_E_OK)
|
|
{
|
|
ret = SECUR32_makeSecHandle(phCredential, package, &myCred);
|
|
if (ret != SEC_E_OK)
|
|
package->provider->fnTableW.FreeCredentialsHandle(
|
|
&myCred);
|
|
}
|
|
}
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* AcquireCredentialsHandleW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI AcquireCredentialsHandleW(
|
|
SEC_WCHAR *pszPrincipal, SEC_WCHAR *pszPackage, ULONG fCredentialsUse,
|
|
PLUID pvLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn,
|
|
PVOID pvGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%s %s %d %p %p %p %p %p %p\n", debugstr_w(pszPrincipal),
|
|
debugstr_w(pszPackage), fCredentialsUse, pvLogonID, pAuthData, pGetKeyFn,
|
|
pvGetKeyArgument, phCredential, ptsExpiry);
|
|
if (pszPackage)
|
|
{
|
|
SecurePackage *package = SECUR32_findPackageW(pszPackage);
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.AcquireCredentialsHandleW)
|
|
{
|
|
CredHandle myCred;
|
|
|
|
ret = package->provider->fnTableW.AcquireCredentialsHandleW(
|
|
pszPrincipal, pszPackage, fCredentialsUse, pvLogonID,
|
|
pAuthData, pGetKeyFn, pvGetKeyArgument, &myCred,
|
|
ptsExpiry);
|
|
if (ret == SEC_E_OK)
|
|
{
|
|
ret = SECUR32_makeSecHandle(phCredential, package, &myCred);
|
|
if (ret != SEC_E_OK)
|
|
package->provider->fnTableW.FreeCredentialsHandle(
|
|
&myCred);
|
|
}
|
|
}
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* FreeCredentialsHandle (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI FreeCredentialsHandle(
|
|
PCredHandle phCredential)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p\n", phCredential);
|
|
if (phCredential)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phCredential->dwUpper;
|
|
PCredHandle cred = (PCredHandle)phCredential->dwLower;
|
|
|
|
if (package && package->provider &&
|
|
package->provider->fnTableW.FreeCredentialsHandle)
|
|
ret = package->provider->fnTableW.FreeCredentialsHandle(cred);
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
SECUR32_FREE(cred);
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* QueryCredentialsAttributesA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI QueryCredentialsAttributesA(
|
|
PCredHandle phCredential, ULONG ulAttribute, void *pBuffer)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p\n", phCredential, ulAttribute, pBuffer);
|
|
if (phCredential)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phCredential->dwUpper;
|
|
PCredHandle cred = (PCredHandle)phCredential->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableA.QueryCredentialsAttributesA)
|
|
ret = package->provider->fnTableA.QueryCredentialsAttributesA(
|
|
cred, ulAttribute, pBuffer);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* QueryCredentialsAttributesW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI QueryCredentialsAttributesW(
|
|
PCredHandle phCredential, ULONG ulAttribute, void *pBuffer)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p\n", phCredential, ulAttribute, pBuffer);
|
|
if (phCredential)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phCredential->dwUpper;
|
|
PCredHandle cred = (PCredHandle)phCredential->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.QueryCredentialsAttributesW)
|
|
ret = package->provider->fnTableW.QueryCredentialsAttributesW(
|
|
cred, ulAttribute, pBuffer);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* InitializeSecurityContextA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI InitializeSecurityContextA(
|
|
PCredHandle phCredential, PCtxtHandle phContext,
|
|
SEC_CHAR *pszTargetName, ULONG fContextReq,
|
|
ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput,
|
|
ULONG Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput,
|
|
ULONG *pfContextAttr, PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
SecurePackage *package = NULL;
|
|
PCredHandle cred = NULL;
|
|
PCredHandle ctxt = NULL;
|
|
|
|
TRACE("%p %p %s %d %d %d %p %d %p %p %p %p\n", phCredential, phContext,
|
|
debugstr_a(pszTargetName), fContextReq, Reserved1, TargetDataRep, pInput,
|
|
Reserved1, phNewContext, pOutput, pfContextAttr, ptsExpiry);
|
|
|
|
if (phContext)
|
|
{
|
|
package = (SecurePackage *)phContext->dwUpper;
|
|
ctxt = (PCtxtHandle)phContext->dwLower;
|
|
}
|
|
if (phCredential)
|
|
{
|
|
package = (SecurePackage *)phCredential->dwUpper;
|
|
cred = (PCredHandle)phCredential->dwLower;
|
|
}
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableA.InitializeSecurityContextA)
|
|
{
|
|
CtxtHandle myCtxt;
|
|
|
|
if (phContext)
|
|
{
|
|
PCtxtHandle realCtxt = (PCtxtHandle)phContext->dwLower;
|
|
myCtxt.dwUpper = realCtxt->dwUpper;
|
|
myCtxt.dwLower = realCtxt->dwLower;
|
|
}
|
|
|
|
ret = package->provider->fnTableA.InitializeSecurityContextA(
|
|
cred, ctxt, pszTargetName, fContextReq,
|
|
Reserved1, TargetDataRep, pInput, Reserved2, phNewContext ? &myCtxt : NULL,
|
|
pOutput, pfContextAttr, ptsExpiry);
|
|
if ((ret == SEC_E_OK || ret == SEC_I_CONTINUE_NEEDED) && phNewContext)
|
|
{
|
|
SECURITY_STATUS ret2;
|
|
ret2 = SECUR32_makeSecHandle(phNewContext, package, &myCtxt);
|
|
if (ret2 != SEC_E_OK)
|
|
package->provider->fnTableA.DeleteSecurityContext(&myCtxt);
|
|
}
|
|
}
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* InitializeSecurityContextW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI InitializeSecurityContextW(
|
|
PCredHandle phCredential, PCtxtHandle phContext,
|
|
SEC_WCHAR *pszTargetName, ULONG fContextReq,
|
|
ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput,
|
|
ULONG Reserved2, PCtxtHandle phNewContext, PSecBufferDesc pOutput,
|
|
ULONG *pfContextAttr, PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
SecurePackage *package = NULL;
|
|
PCredHandle cred = NULL;
|
|
PCredHandle ctxt = NULL;
|
|
|
|
TRACE("%p %p %s %d %d %d %p %d %p %p %p %p\n", phCredential, phContext,
|
|
debugstr_w(pszTargetName), fContextReq, Reserved1, TargetDataRep, pInput,
|
|
Reserved1, phNewContext, pOutput, pfContextAttr, ptsExpiry);
|
|
|
|
if (phContext)
|
|
{
|
|
package = (SecurePackage *)phContext->dwUpper;
|
|
ctxt = (PCtxtHandle)phContext->dwLower;
|
|
}
|
|
if (phCredential)
|
|
{
|
|
package = (SecurePackage *)phCredential->dwUpper;
|
|
cred = (PCredHandle)phCredential->dwLower;
|
|
}
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.InitializeSecurityContextW)
|
|
{
|
|
CtxtHandle myCtxt;
|
|
|
|
if (phContext)
|
|
{
|
|
PCtxtHandle realCtxt = (PCtxtHandle)phContext->dwLower;
|
|
myCtxt.dwUpper = realCtxt->dwUpper;
|
|
myCtxt.dwLower = realCtxt->dwLower;
|
|
}
|
|
|
|
ret = package->provider->fnTableW.InitializeSecurityContextW(
|
|
cred, ctxt, pszTargetName, fContextReq,
|
|
Reserved1, TargetDataRep, pInput, Reserved2, phNewContext ? &myCtxt : NULL,
|
|
pOutput, pfContextAttr, ptsExpiry);
|
|
if ((ret == SEC_E_OK || ret == SEC_I_CONTINUE_NEEDED) && phNewContext)
|
|
{
|
|
SECURITY_STATUS ret2;
|
|
ret2 = SECUR32_makeSecHandle(phNewContext, package, &myCtxt);
|
|
if (ret2 != SEC_E_OK)
|
|
package->provider->fnTableW.DeleteSecurityContext(&myCtxt);
|
|
}
|
|
}
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* AcceptSecurityContext (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI AcceptSecurityContext(
|
|
PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput,
|
|
ULONG fContextReq, ULONG TargetDataRep, PCtxtHandle phNewContext,
|
|
PSecBufferDesc pOutput, ULONG *pfContextAttr, PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %p %p %d %d %p %p %p %p\n", phCredential, phContext, pInput,
|
|
fContextReq, TargetDataRep, phNewContext, pOutput, pfContextAttr,
|
|
ptsExpiry);
|
|
if (phCredential)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phCredential->dwUpper;
|
|
PCredHandle cred = (PCredHandle)phCredential->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.AcceptSecurityContext)
|
|
{
|
|
CtxtHandle myCtxt;
|
|
|
|
if(phContext)
|
|
{
|
|
PCtxtHandle realCtxt = (PCtxtHandle)phContext->dwLower;
|
|
TRACE("realCtx: %p\n", realCtxt);
|
|
myCtxt.dwUpper = realCtxt->dwUpper;
|
|
myCtxt.dwLower = realCtxt->dwLower;
|
|
}
|
|
|
|
ret = package->provider->fnTableW.AcceptSecurityContext(
|
|
cred, phContext ? &myCtxt : NULL, pInput, fContextReq,
|
|
TargetDataRep, &myCtxt, pOutput, pfContextAttr, ptsExpiry);
|
|
if (ret == SEC_E_OK || ret == SEC_I_CONTINUE_NEEDED)
|
|
{
|
|
SECURITY_STATUS ret2;
|
|
ret2 = SECUR32_makeSecHandle(phNewContext, package, &myCtxt);
|
|
if (ret2 != SEC_E_OK)
|
|
package->provider->fnTableW.DeleteSecurityContext(
|
|
&myCtxt);
|
|
}
|
|
}
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* CompleteAuthToken (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI CompleteAuthToken(PCtxtHandle phContext,
|
|
PSecBufferDesc pToken)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %p\n", phContext, pToken);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.CompleteAuthToken)
|
|
ret = package->provider->fnTableW.CompleteAuthToken(ctxt,
|
|
pToken);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* DeleteSecurityContext (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI DeleteSecurityContext(PCtxtHandle phContext)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p\n", phContext);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider &&
|
|
package->provider->fnTableW.DeleteSecurityContext)
|
|
ret = package->provider->fnTableW.DeleteSecurityContext(ctxt);
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
SECUR32_FREE(ctxt);
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* ApplyControlToken (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI ApplyControlToken(PCtxtHandle phContext,
|
|
PSecBufferDesc pInput)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %p\n", phContext, pInput);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.ApplyControlToken)
|
|
ret = package->provider->fnTableW.ApplyControlToken(
|
|
ctxt, pInput);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* QueryContextAttributesA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI QueryContextAttributesA(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void *pBuffer)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p\n", phContext, ulAttribute, pBuffer);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableA.QueryContextAttributesA)
|
|
ret = package->provider->fnTableA.QueryContextAttributesA(
|
|
ctxt, ulAttribute, pBuffer);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* QueryContextAttributesW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI QueryContextAttributesW(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void *pBuffer)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p\n", phContext, ulAttribute, pBuffer);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.QueryContextAttributesW)
|
|
ret = package->provider->fnTableW.QueryContextAttributesW(
|
|
ctxt, ulAttribute, pBuffer);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* ImpersonateSecurityContext (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI ImpersonateSecurityContext(PCtxtHandle phContext)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p\n", phContext);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.ImpersonateSecurityContext)
|
|
ret = package->provider->fnTableW.ImpersonateSecurityContext(
|
|
ctxt);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RevertSecurityContext (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI RevertSecurityContext(PCtxtHandle phContext)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p\n", phContext);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.RevertSecurityContext)
|
|
ret = package->provider->fnTableW.RevertSecurityContext(
|
|
ctxt);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* MakeSignature (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI MakeSignature(PCtxtHandle phContext, ULONG fQOP,
|
|
PSecBufferDesc pMessage, ULONG MessageSeqNo)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p %d\n", phContext, fQOP, pMessage, MessageSeqNo);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.MakeSignature)
|
|
ret = package->provider->fnTableW.MakeSignature(
|
|
ctxt, fQOP, pMessage, MessageSeqNo);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* VerifySignature (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI VerifySignature(PCtxtHandle phContext,
|
|
PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %p %d %p\n", phContext, pMessage, MessageSeqNo, pfQOP);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.VerifySignature)
|
|
ret = package->provider->fnTableW.VerifySignature(
|
|
ctxt, pMessage, MessageSeqNo, pfQOP);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* QuerySecurityPackageInfoA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI QuerySecurityPackageInfoA(SEC_CHAR *pszPackageName,
|
|
PSecPkgInfoA *ppPackageInfo)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%s %p\n", debugstr_a(pszPackageName), ppPackageInfo);
|
|
if (pszPackageName)
|
|
{
|
|
SecurePackage *package = SECUR32_findPackageA(pszPackageName);
|
|
|
|
if (package)
|
|
{
|
|
size_t bytesNeeded = sizeof(SecPkgInfoA);
|
|
int nameLen = 0, commentLen = 0;
|
|
|
|
if (package->infoW.Name)
|
|
{
|
|
nameLen = WideCharToMultiByte(CP_ACP, 0,
|
|
package->infoW.Name, -1, NULL, 0, NULL, NULL);
|
|
bytesNeeded += nameLen;
|
|
}
|
|
if (package->infoW.Comment)
|
|
{
|
|
commentLen = WideCharToMultiByte(CP_ACP, 0,
|
|
package->infoW.Comment, -1, NULL, 0, NULL, NULL);
|
|
bytesNeeded += commentLen;
|
|
}
|
|
*ppPackageInfo = (PSecPkgInfoA)SECUR32_ALLOC(bytesNeeded);
|
|
if (*ppPackageInfo)
|
|
{
|
|
PSTR nextString = (PSTR)((PBYTE)*ppPackageInfo +
|
|
sizeof(SecPkgInfoA));
|
|
|
|
memcpy(*ppPackageInfo, &package->infoW, sizeof(package->infoW));
|
|
if (package->infoW.Name)
|
|
{
|
|
(*ppPackageInfo)->Name = nextString;
|
|
nextString += WideCharToMultiByte(CP_ACP, 0,
|
|
package->infoW.Name, -1, nextString, nameLen, NULL, NULL);
|
|
}
|
|
else
|
|
(*ppPackageInfo)->Name = NULL;
|
|
if (package->infoW.Comment)
|
|
{
|
|
(*ppPackageInfo)->Comment = nextString;
|
|
nextString += WideCharToMultiByte(CP_ACP, 0,
|
|
package->infoW.Comment, -1, nextString, commentLen, NULL,
|
|
NULL);
|
|
}
|
|
else
|
|
(*ppPackageInfo)->Comment = NULL;
|
|
ret = SEC_E_OK;
|
|
}
|
|
else
|
|
ret = SEC_E_INSUFFICIENT_MEMORY;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* QuerySecurityPackageInfoW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI QuerySecurityPackageInfoW(SEC_WCHAR *pszPackageName,
|
|
PSecPkgInfoW *ppPackageInfo)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
SecurePackage *package = SECUR32_findPackageW(pszPackageName);
|
|
|
|
TRACE("%s %p\n", debugstr_w(pszPackageName), ppPackageInfo);
|
|
if (package)
|
|
{
|
|
size_t bytesNeeded = sizeof(SecPkgInfoW);
|
|
int nameLen = 0, commentLen = 0;
|
|
|
|
if (package->infoW.Name)
|
|
{
|
|
nameLen = lstrlenW(package->infoW.Name) + 1;
|
|
bytesNeeded += nameLen * sizeof(WCHAR);
|
|
}
|
|
if (package->infoW.Comment)
|
|
{
|
|
commentLen = lstrlenW(package->infoW.Comment) + 1;
|
|
bytesNeeded += commentLen * sizeof(WCHAR);
|
|
}
|
|
*ppPackageInfo = (PSecPkgInfoW)SECUR32_ALLOC(bytesNeeded);
|
|
if (*ppPackageInfo)
|
|
{
|
|
PWSTR nextString = (PWSTR)((PBYTE)*ppPackageInfo +
|
|
sizeof(SecPkgInfoW));
|
|
|
|
memcpy(*ppPackageInfo, &package->infoW, sizeof(package->infoW));
|
|
if (package->infoW.Name)
|
|
{
|
|
(*ppPackageInfo)->Name = nextString;
|
|
lstrcpynW(nextString, package->infoW.Name, nameLen);
|
|
nextString += nameLen;
|
|
}
|
|
else
|
|
(*ppPackageInfo)->Name = NULL;
|
|
if (package->infoW.Comment)
|
|
{
|
|
(*ppPackageInfo)->Comment = nextString;
|
|
lstrcpynW(nextString, package->infoW.Comment, commentLen);
|
|
nextString += commentLen;
|
|
}
|
|
else
|
|
(*ppPackageInfo)->Comment = NULL;
|
|
ret = SEC_E_OK;
|
|
}
|
|
else
|
|
ret = SEC_E_INSUFFICIENT_MEMORY;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* ExportSecurityContext (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI ExportSecurityContext(PCtxtHandle phContext,
|
|
ULONG fFlags, PSecBuffer pPackedContext, void **pToken)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p %p\n", phContext, fFlags, pPackedContext, pToken);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.ExportSecurityContext)
|
|
ret = package->provider->fnTableW.ExportSecurityContext(
|
|
ctxt, fFlags, pPackedContext, pToken);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* ImportSecurityContextA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI ImportSecurityContextA(SEC_CHAR *pszPackage,
|
|
PSecBuffer pPackedContext, void *Token, PCtxtHandle phContext)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
SecurePackage *package = SECUR32_findPackageA(pszPackage);
|
|
|
|
TRACE("%s %p %p %p\n", debugstr_a(pszPackage), pPackedContext, Token,
|
|
phContext);
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableA.ImportSecurityContextA)
|
|
{
|
|
CtxtHandle myCtxt;
|
|
|
|
ret = package->provider->fnTableA.ImportSecurityContextA(
|
|
pszPackage, pPackedContext, Token, &myCtxt);
|
|
if (ret == SEC_E_OK)
|
|
{
|
|
ret = SECUR32_makeSecHandle(phContext, package, &myCtxt);
|
|
if (ret != SEC_E_OK)
|
|
package->provider->fnTableW.DeleteSecurityContext(&myCtxt);
|
|
}
|
|
}
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
return ret;
|
|
|
|
}
|
|
|
|
/***********************************************************************
|
|
* ImportSecurityContextW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI ImportSecurityContextW(SEC_WCHAR *pszPackage,
|
|
PSecBuffer pPackedContext, void *Token, PCtxtHandle phContext)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
SecurePackage *package = SECUR32_findPackageW(pszPackage);
|
|
|
|
TRACE("%s %p %p %p\n", debugstr_w(pszPackage), pPackedContext, Token,
|
|
phContext);
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.ImportSecurityContextW)
|
|
{
|
|
CtxtHandle myCtxt;
|
|
|
|
ret = package->provider->fnTableW.ImportSecurityContextW(
|
|
pszPackage, pPackedContext, Token, &myCtxt);
|
|
if (ret == SEC_E_OK)
|
|
{
|
|
ret = SECUR32_makeSecHandle(phContext, package, &myCtxt);
|
|
if (ret != SEC_E_OK)
|
|
package->provider->fnTableW.DeleteSecurityContext(&myCtxt);
|
|
}
|
|
}
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_SECPKG_NOT_FOUND;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* AddCredentialsA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI AddCredentialsA(PCredHandle hCredentials,
|
|
SEC_CHAR *pszPrincipal, SEC_CHAR *pszPackage, ULONG fCredentialUse,
|
|
void *pAuthData, SEC_GET_KEY_FN pGetKeyFn, void *pvGetKeyArgument,
|
|
PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %s %s %d %p %p %p %p\n", hCredentials, debugstr_a(pszPrincipal),
|
|
debugstr_a(pszPackage), fCredentialUse, pAuthData, pGetKeyFn,
|
|
pvGetKeyArgument, ptsExpiry);
|
|
if (hCredentials)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)hCredentials->dwUpper;
|
|
PCredHandle cred = (PCtxtHandle)hCredentials->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableA.AddCredentialsA)
|
|
ret = package->provider->fnTableA.AddCredentialsA(
|
|
cred, pszPrincipal, pszPackage, fCredentialUse, pAuthData,
|
|
pGetKeyFn, pvGetKeyArgument, ptsExpiry);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* AddCredentialsW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI AddCredentialsW(PCredHandle hCredentials,
|
|
SEC_WCHAR *pszPrincipal, SEC_WCHAR *pszPackage, ULONG fCredentialUse,
|
|
void *pAuthData, SEC_GET_KEY_FN pGetKeyFn, void *pvGetKeyArgument,
|
|
PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %s %s %d %p %p %p %p\n", hCredentials, debugstr_w(pszPrincipal),
|
|
debugstr_w(pszPackage), fCredentialUse, pAuthData, pGetKeyFn,
|
|
pvGetKeyArgument, ptsExpiry);
|
|
if (hCredentials)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)hCredentials->dwUpper;
|
|
PCredHandle cred = (PCtxtHandle)hCredentials->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.AddCredentialsW)
|
|
ret = package->provider->fnTableW.AddCredentialsW(
|
|
cred, pszPrincipal, pszPackage, fCredentialUse, pAuthData,
|
|
pGetKeyFn, pvGetKeyArgument, ptsExpiry);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* QuerySecurityContextToken (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI QuerySecurityContextToken(PCtxtHandle phContext,
|
|
HANDLE *phToken)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %p\n", phContext, phToken);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.QuerySecurityContextToken)
|
|
ret = package->provider->fnTableW.QuerySecurityContextToken(
|
|
ctxt, phToken);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* EncryptMessage (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI EncryptMessage(PCtxtHandle phContext, ULONG fQOP,
|
|
PSecBufferDesc pMessage, ULONG MessageSeqNo)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p %d\n", phContext, fQOP, pMessage, MessageSeqNo);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.EncryptMessage)
|
|
ret = package->provider->fnTableW.EncryptMessage(
|
|
ctxt, fQOP, pMessage, MessageSeqNo);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* DecryptMessage (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI DecryptMessage(PCtxtHandle phContext,
|
|
PSecBufferDesc pMessage, ULONG MessageSeqNo, PULONG pfQOP)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %p %d %p\n", phContext, pMessage, MessageSeqNo, pfQOP);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.DecryptMessage)
|
|
ret = package->provider->fnTableW.DecryptMessage(
|
|
ctxt, pMessage, MessageSeqNo, pfQOP);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SetContextAttributesA (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI SetContextAttributesA(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void *pBuffer, ULONG cbBuffer)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p %d\n", phContext, ulAttribute, pBuffer, cbBuffer);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableA.SetContextAttributesA)
|
|
ret = package->provider->fnTableA.SetContextAttributesA(
|
|
ctxt, ulAttribute, pBuffer, cbBuffer);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SetContextAttributesW (SECUR32.@)
|
|
*/
|
|
SECURITY_STATUS WINAPI SetContextAttributesW(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void *pBuffer, ULONG cbBuffer)
|
|
{
|
|
SECURITY_STATUS ret;
|
|
|
|
TRACE("%p %d %p %d\n", phContext, ulAttribute, pBuffer, cbBuffer);
|
|
if (phContext)
|
|
{
|
|
SecurePackage *package = (SecurePackage *)phContext->dwUpper;
|
|
PCtxtHandle ctxt = (PCtxtHandle)phContext->dwLower;
|
|
|
|
if (package && package->provider)
|
|
{
|
|
if (package->provider->fnTableW.SetContextAttributesW)
|
|
ret = package->provider->fnTableW.SetContextAttributesW(
|
|
ctxt, ulAttribute, pBuffer, cbBuffer);
|
|
else
|
|
ret = SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
}
|
|
else
|
|
ret = SEC_E_INVALID_HANDLE;
|
|
return ret;
|
|
}
|