2 * secur32 private definitions.
4 * Copyright (C) 2004 Juan Lang
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #ifndef __SECUR32_PRIV_H__
22 #define __SECUR32_PRIV_H__
24 #include <sys/types.h>
25 #include "wine/list.h"
27 /* Memory allocation functions for memory accessible by callers of secur32.
28 * The details are implementation specific.
30 #define SECUR32_ALLOC(bytes) HeapAlloc(GetProcessHeap(), 0, (bytes))
31 #define SECUR32_FREE(p) HeapFree(GetProcessHeap(), 0, (p))
33 typedef struct _SecureProvider
39 SecurityFunctionTableA fnTableA;
40 SecurityFunctionTableW fnTableW;
43 typedef struct _SecurePackage
47 SecureProvider *provider;
50 typedef enum _helper_mode {
58 typedef struct tag_arc4_info {
60 unsigned char state[256];
63 typedef struct _NegoHelper {
75 BOOL valid_session_key;
76 unsigned long neg_flags;
83 } NegoHelper, *PNegoHelper;
85 /* Allocates space for and initializes a new provider. If fnTableA or fnTableW
86 * is non-NULL, assumes the provider is built-in (and is thus already loaded.)
87 * Otherwise moduleName must not be NULL.
88 * Returns a pointer to the stored provider entry, for use adding packages.
90 SecureProvider *SECUR32_addProvider(const SecurityFunctionTableA *fnTableA,
91 const SecurityFunctionTableW *fnTableW, const PWSTR moduleName);
93 /* Allocates space for and adds toAdd packages with the given provider.
94 * provider must not be NULL, and either infoA or infoW may be NULL, but not
97 void SECUR32_addPackages(SecureProvider *provider, ULONG toAdd,
98 const SecPkgInfoA *infoA, const SecPkgInfoW *infoW);
100 /* Tries to find the package named packageName. If it finds it, implicitly
101 * loads the package if it isn't already loaded.
103 SecurePackage *SECUR32_findPackageW(PWSTR packageName);
105 /* Tries to find the package named packageName. (Thunks to _findPackageW)
107 SecurePackage *SECUR32_findPackageA(PSTR packageName);
109 /* A few string helpers; will return NULL if str is NULL. Free return with
111 PWSTR SECUR32_strdupW(PCWSTR str);
112 PWSTR SECUR32_AllocWideFromMultiByte(PCSTR str);
113 PSTR SECUR32_AllocMultiByteFromWide(PCWSTR str);
115 /* Initialization functions for built-in providers */
116 void SECUR32_initSchannelSP(void);
117 void SECUR32_initNegotiateSP(void);
118 void SECUR32_initNTLMSP(void);
120 /* Functions from dispatcher.c used elsewhere in the code */
121 SECURITY_STATUS fork_helper(PNegoHelper *new_helper, const char *prog,
122 char * const argv[]);
124 SECURITY_STATUS run_helper(PNegoHelper helper, char *buffer,
125 unsigned int max_buflen, int *buflen);
127 void cleanup_helper(PNegoHelper helper);
129 void check_version(PNegoHelper helper);
131 /* Functions from base64_codec.c used elsewhere */
132 SECURITY_STATUS encodeBase64(PBYTE in_buf, int in_len, char* out_buf,
133 int max_len, int *out_len);
135 SECURITY_STATUS decodeBase64(char *in_buf, int in_len, BYTE *out_buf,
136 int max_len, int *out_len);
138 /* Functions from util.c */
139 ULONG ComputeCrc32(const BYTE *pData, INT iLen);
140 SECURITY_STATUS SECUR32_CreateNTLMv1SessionKey(const char* password, PBYTE session_key);
141 arc4_info *SECUR32_arc4Alloc(void);
142 void SECUR32_arc4Init(arc4_info *a4i, const BYTE *key, unsigned int keyLen);
143 void SECUR32_arc4Process(arc4_info *a4i, BYTE *inoutString, unsigned int length);
145 /* NTLMSSP flags indicating the negotiated features */
146 #define NTLMSSP_NEGOTIATE_UNICODE 0x00000001
147 #define NTLMSSP_NEGOTIATE_OEM 0x00000002
148 #define NTLMSSP_REQUEST_TARGET 0x00000004
149 #define NTLMSSP_NEGOTIATE_SIGN 0x00000010
150 #define NTLMSSP_NEGOTIATE_SEAL 0x00000020
151 #define NTLMSSP_NEGOTIATE_DATAGRAM_STYLE 0x00000040
152 #define NTLMSSP_NEGOTIATE_LM_SESSION_KEY 0x00000080
153 #define NTLMSSP_NEGOTIATE_NTLM 0x00000200
154 #define NTLMSSP_NEGOTIATE_DOMAIN_SUPPLIED 0x00001000
155 #define NTLMSSP_NEGOTIATE_WORKSTATION_SUPPLIED 0x00002000
156 #define NTLMSSP_NEGOTIATE_LOCAL_CALL 0x00004000
157 #define NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0x00008000
158 #define NTLMSSP_NEGOTIATE_TARGET_TYPE_DOMAIN 0x00010000
159 #define NTLMSSP_NEGOTIATE_TARGET_TYPE_SERVER 0x00020000
160 #define NTLMSSP_NEGOTIATE_NTLM2 0x00080000
161 #define NTLMSSP_NEGOTIATE_TARGET_INFO 0x00800000
162 #define NTLMSSP_NEGOTIATE_128 0x20000000
163 #define NTLMSSP_NEGOTIATE_KEY_EXCHANGE 0x40000000
164 #define NTLMSSP_NEGOTIATE_56 0x80000000
165 #endif /* ndef __SECUR32_PRIV_H__ */