2 * secur32 private definitions.
4 * Copyright (C) 2004 Juan Lang
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #ifndef __SECUR32_PRIV_H__
22 #define __SECUR32_PRIV_H__
24 #include <sys/types.h>
25 #include "wine/list.h"
27 typedef struct _SecureProvider
33 SecurityFunctionTableA fnTableA
;
34 SecurityFunctionTableW fnTableW
;
37 typedef struct _SecurePackage
41 SecureProvider
*provider
;
44 typedef enum _helper_mode
{
50 typedef struct tag_arc4_info
{
52 unsigned char state
[256];
55 typedef struct _NegoHelper
{
67 unsigned long neg_flags
;
84 } NegoHelper
, *PNegoHelper
;
86 typedef enum _sign_direction
{
91 /* Allocates space for and initializes a new provider. If fnTableA or fnTableW
92 * is non-NULL, assumes the provider is built-in, and if moduleName is non-NULL,
93 * means must load the LSA/user mode functions tables from external SSP/AP module.
94 * Otherwise moduleName must not be NULL.
95 * Returns a pointer to the stored provider entry, for use adding packages.
97 SecureProvider
*SECUR32_addProvider(const SecurityFunctionTableA
*fnTableA
,
98 const SecurityFunctionTableW
*fnTableW
, PCWSTR moduleName
);
100 /* Allocates space for and adds toAdd packages with the given provider.
101 * provider must not be NULL, and either infoA or infoW may be NULL, but not
104 void SECUR32_addPackages(SecureProvider
*provider
, ULONG toAdd
,
105 const SecPkgInfoA
*infoA
, const SecPkgInfoW
*infoW
);
107 /* Tries to find the package named packageName. If it finds it, implicitly
108 * loads the package if it isn't already loaded.
110 SecurePackage
*SECUR32_findPackageW(PCWSTR packageName
);
112 /* Tries to find the package named packageName. (Thunks to _findPackageW)
114 SecurePackage
*SECUR32_findPackageA(PCSTR packageName
);
116 /* A few string helpers; will return NULL if str is NULL. Free return with
118 PWSTR
SECUR32_AllocWideFromMultiByte(PCSTR str
);
119 PSTR
SECUR32_AllocMultiByteFromWide(PCWSTR str
);
121 /* Initialization functions for built-in providers */
122 void SECUR32_initSchannelSP(void);
123 void SECUR32_initNegotiateSP(void);
124 void SECUR32_initNTLMSP(void);
126 /* Cleanup functions for built-in providers */
127 void SECUR32_deinitSchannelSP(void);
129 /* Functions from dispatcher.c used elsewhere in the code */
130 SECURITY_STATUS
fork_helper(PNegoHelper
*new_helper
, const char *prog
,
131 char * const argv
[]);
133 SECURITY_STATUS
run_helper(PNegoHelper helper
, char *buffer
,
134 unsigned int max_buflen
, int *buflen
);
136 void cleanup_helper(PNegoHelper helper
);
138 void check_version(PNegoHelper helper
);
140 /* Functions from base64_codec.c used elsewhere */
141 SECURITY_STATUS
encodeBase64(PBYTE in_buf
, int in_len
, char* out_buf
,
142 int max_len
, int *out_len
);
144 SECURITY_STATUS
decodeBase64(char *in_buf
, int in_len
, BYTE
*out_buf
,
145 int max_len
, int *out_len
);
147 /* Functions from util.c */
148 ULONG
ComputeCrc32(const BYTE
*pData
, INT iLen
, ULONG initial_crc
);
149 SECURITY_STATUS
SECUR32_CreateNTLMv1SessionKey(PBYTE password
, int len
, PBYTE session_key
);
150 SECURITY_STATUS
SECUR32_CreateNTLMv2SubKeys(PNegoHelper helper
);
151 arc4_info
*SECUR32_arc4Alloc(void);
152 void SECUR32_arc4Init(arc4_info
*a4i
, const BYTE
*key
, unsigned int keyLen
);
153 void SECUR32_arc4Process(arc4_info
*a4i
, BYTE
*inoutString
, unsigned int length
);
154 void SECUR32_arc4Cleanup(arc4_info
*a4i
);
156 /* NTLMSSP flags indicating the negotiated features */
157 #define NTLMSSP_NEGOTIATE_UNICODE 0x00000001
158 #define NTLMSSP_NEGOTIATE_OEM 0x00000002
159 #define NTLMSSP_REQUEST_TARGET 0x00000004
160 #define NTLMSSP_NEGOTIATE_SIGN 0x00000010
161 #define NTLMSSP_NEGOTIATE_SEAL 0x00000020
162 #define NTLMSSP_NEGOTIATE_DATAGRAM_STYLE 0x00000040
163 #define NTLMSSP_NEGOTIATE_LM_SESSION_KEY 0x00000080
164 #define NTLMSSP_NEGOTIATE_NTLM 0x00000200
165 #define NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED 0x00001000
166 #define NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED 0x00002000
167 #define NTLMSSP_NEGOTIATE_LOCAL_CALL 0x00004000
168 #define NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0x00008000
169 #define NTLMSSP_NEGOTIATE_TARGET_TYPE_DOMAIN 0x00010000
170 #define NTLMSSP_NEGOTIATE_TARGET_TYPE_SERVER 0x00020000
171 #define NTLMSSP_NEGOTIATE_NTLM2 0x00080000
172 #define NTLMSSP_NEGOTIATE_TARGET_INFO 0x00800000
173 #define NTLMSSP_NEGOTIATE_128 0x20000000
174 #define NTLMSSP_NEGOTIATE_KEY_EXCHANGE 0x40000000
175 #define NTLMSSP_NEGOTIATE_56 0x80000000
176 #endif /* ndef __SECUR32_PRIV_H__ */