Blame libfreerdp/core/gateway/ntlm.c

Packit 1fb8d4
/**
Packit 1fb8d4
 * FreeRDP: A Remote Desktop Protocol Implementation
Packit 1fb8d4
 * NTLM over HTTP
Packit 1fb8d4
 *
Packit 1fb8d4
 * Copyright 2012 Fujitsu Technology Solutions GmbH
Packit 1fb8d4
 * Copyright 2012 Dmitrij Jasnov <dmitrij.jasnov@ts.fujitsu.com>
Packit 1fb8d4
 * Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
Packit 1fb8d4
 *
Packit 1fb8d4
 * Licensed under the Apache License, Version 2.0 (the "License");
Packit 1fb8d4
 * you may not use this file except in compliance with the License.
Packit 1fb8d4
 * You may obtain a copy of the License at
Packit 1fb8d4
 *
Packit 1fb8d4
 *     http://www.apache.org/licenses/LICENSE-2.0
Packit 1fb8d4
 *
Packit 1fb8d4
 * Unless required by applicable law or agreed to in writing, software
Packit 1fb8d4
 * distributed under the License is distributed on an "AS IS" BASIS,
Packit 1fb8d4
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Packit 1fb8d4
 * See the License for the specific language governing permissions and
Packit 1fb8d4
 * limitations under the License.
Packit 1fb8d4
 */
Packit 1fb8d4
Packit 1fb8d4
#ifdef HAVE_CONFIG_H
Packit 1fb8d4
#include "config.h"
Packit 1fb8d4
#endif
Packit 1fb8d4
Packit 1fb8d4
#include <winpr/crt.h>
Packit 1fb8d4
#include <winpr/tchar.h>
Packit 1fb8d4
#include <winpr/dsparse.h>
Packit 1fb8d4
Packit 1fb8d4
#include <freerdp/log.h>
Packit 1fb8d4
Packit 1fb8d4
#include "http.h"
Packit 1fb8d4
Packit 1fb8d4
#include "ntlm.h"
Packit 1fb8d4
Packit 1fb8d4
#define TAG FREERDP_TAG("core.gateway.ntlm")
Packit 1fb8d4
Packit 1fb8d4
struct rdp_ntlm
Packit 1fb8d4
{
Packit 1fb8d4
	BOOL http;
Packit 1fb8d4
	CtxtHandle context;
Packit 1fb8d4
	ULONG cbMaxToken;
Packit 1fb8d4
	ULONG fContextReq;
Packit 1fb8d4
	ULONG pfContextAttr;
Packit 1fb8d4
	TimeStamp expiration;
Packit 1fb8d4
	PSecBuffer pBuffer;
Packit 1fb8d4
	SecBuffer inputBuffer[2];
Packit 1fb8d4
	SecBuffer outputBuffer[2];
Packit 1fb8d4
	BOOL haveContext;
Packit 1fb8d4
	BOOL haveInputBuffer;
Packit 1fb8d4
	LPTSTR ServicePrincipalName;
Packit 1fb8d4
	SecBufferDesc inputBufferDesc;
Packit 1fb8d4
	SecBufferDesc outputBufferDesc;
Packit 1fb8d4
	CredHandle credentials;
Packit 1fb8d4
	BOOL confidentiality;
Packit 1fb8d4
	SecPkgInfo* pPackageInfo;
Packit 1fb8d4
	SecurityFunctionTable* table;
Packit 1fb8d4
	SEC_WINNT_AUTH_IDENTITY identity;
Packit 1fb8d4
	SecPkgContext_Sizes ContextSizes;
Packit 1fb8d4
	SecPkgContext_Bindings* Bindings;
Packit 1fb8d4
};
Packit 1fb8d4
Packit 1fb8d4
static ULONG cast_from_size_(size_t size, const char* fkt, const char* file, int line)
Packit 1fb8d4
{
Packit 1fb8d4
	if (size > ULONG_MAX)
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG, "[%s %s:%d] Size %" PRIdz " is larger than INT_MAX %lu", fkt, file, line,
Packit Service 5a9772
		         size, ULONG_MAX);
Packit 1fb8d4
		return 0;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	return (ULONG)size;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
#define cast_from_size(size) cast_from_size_(size, __FUNCTION__, __FILE__, __LINE__)
Packit 1fb8d4
Packit 1fb8d4
BOOL ntlm_client_init(rdpNtlm* ntlm, BOOL http, LPCTSTR user, LPCTSTR domain, LPCTSTR password,
Packit 1fb8d4
                      SecPkgContext_Bindings* Bindings)
Packit 1fb8d4
{
Packit 1fb8d4
	SECURITY_STATUS status;
Packit 1fb8d4
	ntlm->http = http;
Packit 1fb8d4
	ntlm->Bindings = Bindings;
Packit 1fb8d4
	ntlm->table = InitSecurityInterfaceEx(0);
Packit 1fb8d4
Packit 1fb8d4
	if (!ntlm->table)
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	sspi_SetAuthIdentity(&(ntlm->identity), user, domain, password);
Packit 1fb8d4
	status = ntlm->table->QuerySecurityPackageInfo(NTLM_SSP_NAME, &ntlm->pPackageInfo);
Packit 1fb8d4
Packit 1fb8d4
	if (status != SEC_E_OK)
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG, "QuerySecurityPackageInfo status %s [0x%08" PRIX32 "]",
Packit 1fb8d4
		         GetSecurityStatusString(status), status);
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	ntlm->cbMaxToken = ntlm->pPackageInfo->cbMaxToken;
Packit Service 5a9772
	status = ntlm->table->AcquireCredentialsHandle(NULL, NTLM_SSP_NAME, SECPKG_CRED_OUTBOUND, NULL,
Packit Service 5a9772
	                                               &ntlm->identity, NULL, NULL, &ntlm->credentials,
Packit Service 5a9772
	                                               &ntlm->expiration);
Packit 1fb8d4
Packit 1fb8d4
	if (status != SEC_E_OK)
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG, "AcquireCredentialsHandle status %s [0x%08" PRIX32 "]",
Packit 1fb8d4
		         GetSecurityStatusString(status), status);
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	ntlm->haveContext = FALSE;
Packit 1fb8d4
	ntlm->haveInputBuffer = FALSE;
Packit 1fb8d4
	ZeroMemory(&ntlm->inputBuffer, sizeof(SecBuffer));
Packit 1fb8d4
	ZeroMemory(&ntlm->outputBuffer, sizeof(SecBuffer));
Packit 1fb8d4
	ZeroMemory(&ntlm->ContextSizes, sizeof(SecPkgContext_Sizes));
Packit 1fb8d4
	ntlm->fContextReq = 0;
Packit 1fb8d4
Packit 1fb8d4
	if (ntlm->http)
Packit 1fb8d4
	{
Packit 1fb8d4
		/* flags for HTTP authentication */
Packit 1fb8d4
		ntlm->fContextReq |= ISC_REQ_CONFIDENTIALITY;
Packit 1fb8d4
	}
Packit 1fb8d4
	else
Packit 1fb8d4
	{
Packit 1fb8d4
		/**
Packit Service 5a9772
		 * flags for RPC authentication:
Packit Service 5a9772
		 * RPC_C_AUTHN_LEVEL_PKT_INTEGRITY:
Packit Service 5a9772
		 * ISC_REQ_USE_DCE_STYLE | ISC_REQ_DELEGATE | ISC_REQ_MUTUAL_AUTH |
Packit Service 5a9772
		 * ISC_REQ_REPLAY_DETECT | ISC_REQ_SEQUENCE_DETECT
Packit Service 5a9772
		 */
Packit 1fb8d4
		ntlm->fContextReq |= ISC_REQ_USE_DCE_STYLE;
Packit 1fb8d4
		ntlm->fContextReq |= ISC_REQ_DELEGATE | ISC_REQ_MUTUAL_AUTH;
Packit 1fb8d4
		ntlm->fContextReq |= ISC_REQ_REPLAY_DETECT | ISC_REQ_SEQUENCE_DETECT;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return TRUE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
BOOL ntlm_client_make_spn(rdpNtlm* ntlm, LPCTSTR ServiceClass, LPCTSTR hostname)
Packit 1fb8d4
{
Packit 1fb8d4
	BOOL status = FALSE;
Packit 1fb8d4
	DWORD SpnLength = 0;
Packit 1fb8d4
	LPTSTR hostnameX = NULL;
Packit 1fb8d4
#ifdef UNICODE
Packit Service 5a9772
	ConvertToUnicode(CP_UTF8, 0, hostname, -1, (LPWSTR*)&hostnameX, 0);
Packit 1fb8d4
#else
Packit 1fb8d4
	hostnameX = _strdup(hostname);
Packit 1fb8d4
#endif
Packit 1fb8d4
Packit 1fb8d4
	if (!hostnameX)
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	if (!ServiceClass)
Packit 1fb8d4
	{
Packit Service 5a9772
		ntlm->ServicePrincipalName = (LPTSTR)_tcsdup(hostnameX);
Packit 1fb8d4
		free(hostnameX);
Packit 1fb8d4
Packit 1fb8d4
		if (!ntlm->ServicePrincipalName)
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
Packit 1fb8d4
		return TRUE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	if (DsMakeSpn(ServiceClass, hostnameX, NULL, 0, NULL, &SpnLength, NULL) !=
Packit Service 5a9772
	    ERROR_BUFFER_OVERFLOW)
Packit 1fb8d4
		goto error;
Packit 1fb8d4
Packit Service 5a9772
	ntlm->ServicePrincipalName = (LPTSTR)calloc(SpnLength, sizeof(TCHAR));
Packit 1fb8d4
Packit 1fb8d4
	if (!ntlm->ServicePrincipalName)
Packit 1fb8d4
		goto error;
Packit 1fb8d4
Packit Service 5a9772
	if (DsMakeSpn(ServiceClass, hostnameX, NULL, 0, NULL, &SpnLength, ntlm->ServicePrincipalName) !=
Packit Service 5a9772
	    ERROR_SUCCESS)
Packit 1fb8d4
		goto error;
Packit 1fb8d4
Packit 1fb8d4
	status = TRUE;
Packit 1fb8d4
error:
Packit 1fb8d4
	free(hostnameX);
Packit 1fb8d4
	return status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
/**
Packit 1fb8d4
 *                                        SSPI Client Ceremony
Packit 1fb8d4
 *
Packit 1fb8d4
 *                                           --------------
Packit 1fb8d4
 *                                          ( Client Begin )
Packit 1fb8d4
 *                                           --------------
Packit 1fb8d4
 *                                                 |
Packit 1fb8d4
 *                                                 |
Packit 1fb8d4
 *                                                \|/
Packit 1fb8d4
 *                                      -----------+--------------
Packit 1fb8d4
 *                                     | AcquireCredentialsHandle |
Packit 1fb8d4
 *                                      --------------------------
Packit 1fb8d4
 *                                                 |
Packit 1fb8d4
 *                                                 |
Packit 1fb8d4
 *                                                \|/
Packit 1fb8d4
 *                                    -------------+--------------
Packit 1fb8d4
 *                 +---------------> / InitializeSecurityContext /
Packit 1fb8d4
 *                 |                 ----------------------------
Packit 1fb8d4
 *                 |                               |
Packit 1fb8d4
 *                 |                               |
Packit 1fb8d4
 *                 |                              \|/
Packit 1fb8d4
 *     ---------------------------        ---------+-------------            ----------------------
Packit 1fb8d4
 *    / Receive blob from server /      < Received security blob? > --Yes-> / Send blob to server /
Packit 1fb8d4
 *    -------------+-------------         -----------------------           ----------------------
Packit 1fb8d4
 *                /|\                              |                                |
Packit 1fb8d4
 *                 |                               No                               |
Packit 1fb8d4
 *                Yes                             \|/                               |
Packit 1fb8d4
 *                 |                   ------------+-----------                     |
Packit 1fb8d4
 *                 +---------------- < Received Continue Needed > <-----------------+
Packit 1fb8d4
 *                                     ------------------------
Packit 1fb8d4
 *                                                 |
Packit 1fb8d4
 *                                                 No
Packit 1fb8d4
 *                                                \|/
Packit 1fb8d4
 *                                           ------+-------
Packit 1fb8d4
 *                                          (  Client End  )
Packit 1fb8d4
 *                                           --------------
Packit 1fb8d4
 */
Packit 1fb8d4
Packit 1fb8d4
BOOL ntlm_authenticate(rdpNtlm* ntlm, BOOL* pbContinueNeeded)
Packit 1fb8d4
{
Packit 1fb8d4
	SECURITY_STATUS status;
Packit 1fb8d4
Packit Service 5a9772
	if ((!ntlm) || (!ntlm->table))
Packit Service 5a9772
	{
Packit Service 5a9772
		WLog_ERR(TAG, "ntlm_authenticate: invalid ntlm context");
Packit Service 5a9772
		return FALSE;
Packit Service 5a9772
	}
Packit Service 5a9772
Packit 1fb8d4
	if (ntlm->outputBuffer[0].pvBuffer)
Packit 1fb8d4
	{
Packit 1fb8d4
		free(ntlm->outputBuffer[0].pvBuffer);
Packit 1fb8d4
		ntlm->outputBuffer[0].pvBuffer = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	ntlm->outputBufferDesc.ulVersion = SECBUFFER_VERSION;
Packit 1fb8d4
	ntlm->outputBufferDesc.cBuffers = 1;
Packit 1fb8d4
	ntlm->outputBufferDesc.pBuffers = ntlm->outputBuffer;
Packit 1fb8d4
	ntlm->outputBuffer[0].BufferType = SECBUFFER_TOKEN;
Packit 1fb8d4
	ntlm->outputBuffer[0].cbBuffer = ntlm->cbMaxToken;
Packit 1fb8d4
	ntlm->outputBuffer[0].pvBuffer = malloc(ntlm->outputBuffer[0].cbBuffer);
Packit 1fb8d4
Packit 1fb8d4
	if (!ntlm->outputBuffer[0].pvBuffer)
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	if (ntlm->haveInputBuffer)
Packit 1fb8d4
	{
Packit 1fb8d4
		ntlm->inputBufferDesc.ulVersion = SECBUFFER_VERSION;
Packit 1fb8d4
		ntlm->inputBufferDesc.cBuffers = 1;
Packit 1fb8d4
		ntlm->inputBufferDesc.pBuffers = ntlm->inputBuffer;
Packit 1fb8d4
		ntlm->inputBuffer[0].BufferType = SECBUFFER_TOKEN;
Packit 1fb8d4
Packit 1fb8d4
		if (ntlm->Bindings)
Packit 1fb8d4
		{
Packit 1fb8d4
			ntlm->inputBufferDesc.cBuffers++;
Packit 1fb8d4
			ntlm->inputBuffer[1].BufferType = SECBUFFER_CHANNEL_BINDINGS;
Packit 1fb8d4
			ntlm->inputBuffer[1].cbBuffer = ntlm->Bindings->BindingsLength;
Packit Service 5a9772
			ntlm->inputBuffer[1].pvBuffer = (void*)ntlm->Bindings->Bindings;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	status = ntlm->table->InitializeSecurityContext(
Packit Service 5a9772
	    &ntlm->credentials, (ntlm->haveContext) ? &ntlm->context : NULL,
Packit Service 5a9772
	    (ntlm->ServicePrincipalName) ? ntlm->ServicePrincipalName : NULL, ntlm->fContextReq, 0,
Packit Service 5a9772
	    SECURITY_NATIVE_DREP, (ntlm->haveInputBuffer) ? &ntlm->inputBufferDesc : NULL, 0,
Packit Service 5a9772
	    &ntlm->context, &ntlm->outputBufferDesc, &ntlm->pfContextAttr, &ntlm->expiration);
Packit Service 5a9772
	WLog_VRB(TAG, "InitializeSecurityContext status %s [0x%08" PRIX32 "]",
Packit 1fb8d4
	         GetSecurityStatusString(status), status);
Packit 1fb8d4
Packit 1fb8d4
	if ((status == SEC_I_COMPLETE_AND_CONTINUE) || (status == SEC_I_COMPLETE_NEEDED) ||
Packit 1fb8d4
	    (status == SEC_E_OK))
Packit 1fb8d4
	{
Packit 1fb8d4
		if ((status != SEC_E_OK) && ntlm->table->CompleteAuthToken)
Packit 1fb8d4
		{
Packit 1fb8d4
			SECURITY_STATUS cStatus;
Packit 1fb8d4
			cStatus = ntlm->table->CompleteAuthToken(&ntlm->context, &ntlm->outputBufferDesc);
Packit 1fb8d4
Packit 1fb8d4
			if (cStatus != SEC_E_OK)
Packit 1fb8d4
			{
Packit Service 5a9772
				WLog_WARN(TAG, "CompleteAuthToken status  %s [0x%08" PRIX32 "]",
Packit 1fb8d4
				          GetSecurityStatusString(cStatus), cStatus);
Packit 1fb8d4
				return FALSE;
Packit 1fb8d4
			}
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
		status = ntlm->table->QueryContextAttributes(&ntlm->context, SECPKG_ATTR_SIZES,
Packit Service 5a9772
		                                             &ntlm->ContextSizes);
Packit 1fb8d4
Packit 1fb8d4
		if (status != SEC_E_OK)
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_ERR(TAG, "QueryContextAttributes SECPKG_ATTR_SIZES failure %s [0x%08" PRIX32 "]",
Packit 1fb8d4
			         GetSecurityStatusString(status), status);
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
		if (status == SEC_I_COMPLETE_NEEDED)
Packit 1fb8d4
			status = SEC_E_OK;
Packit 1fb8d4
		else if (status == SEC_I_COMPLETE_AND_CONTINUE)
Packit 1fb8d4
			status = SEC_I_CONTINUE_NEEDED;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (ntlm->haveInputBuffer)
Packit 1fb8d4
	{
Packit 1fb8d4
		free(ntlm->inputBuffer[0].pvBuffer);
Packit 1fb8d4
		ntlm->inputBuffer[0].pvBuffer = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	ntlm->haveInputBuffer = TRUE;
Packit 1fb8d4
	ntlm->haveContext = TRUE;
Packit 1fb8d4
Packit 1fb8d4
	if (pbContinueNeeded)
Packit 1fb8d4
		*pbContinueNeeded = (status == SEC_I_CONTINUE_NEEDED) ? TRUE : FALSE;
Packit 1fb8d4
Packit 1fb8d4
	return TRUE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static void ntlm_client_uninit(rdpNtlm* ntlm)
Packit 1fb8d4
{
Packit 1fb8d4
	free(ntlm->identity.User);
Packit 1fb8d4
	ntlm->identity.User = NULL;
Packit 1fb8d4
	free(ntlm->identity.Domain);
Packit 1fb8d4
	ntlm->identity.Domain = NULL;
Packit 1fb8d4
	free(ntlm->identity.Password);
Packit 1fb8d4
	ntlm->identity.Password = NULL;
Packit 1fb8d4
	free(ntlm->ServicePrincipalName);
Packit 1fb8d4
	ntlm->ServicePrincipalName = NULL;
Packit 1fb8d4
Packit 1fb8d4
	if (ntlm->table)
Packit 1fb8d4
	{
Packit 1fb8d4
		SECURITY_STATUS status;
Packit 1fb8d4
		status = ntlm->table->FreeCredentialsHandle(&ntlm->credentials);
Packit 1fb8d4
Packit 1fb8d4
		if (status != SEC_E_OK)
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_WARN(TAG, "FreeCredentialsHandle status %s [0x%08" PRIX32 "]",
Packit 1fb8d4
			          GetSecurityStatusString(status), status);
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
		status = ntlm->table->FreeContextBuffer(ntlm->pPackageInfo);
Packit 1fb8d4
Packit 1fb8d4
		if (status != SEC_E_OK)
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_WARN(TAG, "FreeContextBuffer status %s [0x%08" PRIX32 "]",
Packit 1fb8d4
			          GetSecurityStatusString(status), status);
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
		status = ntlm->table->DeleteSecurityContext(&ntlm->context);
Packit 1fb8d4
Packit 1fb8d4
		if (status != SEC_E_OK)
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_WARN(TAG, "DeleteSecurityContext status %s [0x%08" PRIX32 "]",
Packit 1fb8d4
			          GetSecurityStatusString(status), status);
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
		ntlm->table = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
rdpNtlm* ntlm_new(void)
Packit 1fb8d4
{
Packit 1fb8d4
	rdpNtlm* ntlm;
Packit Service 5a9772
	ntlm = (rdpNtlm*)calloc(1, sizeof(rdpNtlm));
Packit 1fb8d4
	return ntlm;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
void ntlm_free(rdpNtlm* ntlm)
Packit 1fb8d4
{
Packit 1fb8d4
	if (!ntlm)
Packit 1fb8d4
		return;
Packit 1fb8d4
Packit 1fb8d4
	if (ntlm->outputBuffer[0].pvBuffer)
Packit 1fb8d4
	{
Packit 1fb8d4
		free(ntlm->outputBuffer[0].pvBuffer);
Packit 1fb8d4
		ntlm->outputBuffer[0].pvBuffer = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	ntlm_client_uninit(ntlm);
Packit 1fb8d4
	free(ntlm);
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
SSIZE_T ntlm_client_get_context_max_size(rdpNtlm* ntlm)
Packit 1fb8d4
{
Packit 1fb8d4
	if (!ntlm)
Packit 1fb8d4
		return -1;
Packit 1fb8d4
Packit 1fb8d4
	if (ntlm->ContextSizes.cbMaxSignature > UINT16_MAX)
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG,
Packit Service 5a9772
		         "QueryContextAttributes SECPKG_ATTR_SIZES ContextSizes.cbMaxSignature > 0xFFFF");
Packit 1fb8d4
		return -1;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return ntlm->ContextSizes.cbMaxSignature;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
SSIZE_T ntlm_client_query_auth_size(rdpNtlm* ntlm)
Packit 1fb8d4
{
Packit 1fb8d4
	SECURITY_STATUS status;
Packit 1fb8d4
Packit 1fb8d4
	if (!ntlm || !ntlm->table || !ntlm->table->QueryContextAttributes)
Packit 1fb8d4
		return -1;
Packit 1fb8d4
Packit Service 5a9772
	status =
Packit Service 5a9772
	    ntlm->table->QueryContextAttributes(&ntlm->context, SECPKG_ATTR_SIZES, &ntlm->ContextSizes);
Packit 1fb8d4
Packit 1fb8d4
	if (status != SEC_E_OK)
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG, "QueryContextAttributes SECPKG_ATTR_SIZES failure %s [0x%08" PRIX32 "]",
Packit 1fb8d4
		         GetSecurityStatusString(status), status);
Packit 1fb8d4
		return -1;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return ntlm_client_get_context_max_size(ntlm);
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
BOOL ntlm_client_encrypt(rdpNtlm* ntlm, ULONG fQOP, SecBufferDesc* Message, size_t sequence)
Packit 1fb8d4
{
Packit 1fb8d4
	SECURITY_STATUS encrypt_status;
Packit 1fb8d4
	const ULONG s = cast_from_size(sequence);
Packit 1fb8d4
Packit 1fb8d4
	if (!ntlm || !Message)
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	encrypt_status = ntlm->table->EncryptMessage(&ntlm->context, fQOP, Message, s);
Packit 1fb8d4
Packit 1fb8d4
	if (encrypt_status != SEC_E_OK)
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG, "EncryptMessage status %s [0x%08" PRIX32 "]",
Packit 1fb8d4
		         GetSecurityStatusString(encrypt_status), encrypt_status);
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return TRUE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
BOOL ntlm_client_set_input_buffer(rdpNtlm* ntlm, BOOL copy, const void* data, size_t size)
Packit 1fb8d4
{
Packit 1fb8d4
	if (!ntlm || !data || (size == 0))
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	ntlm->inputBuffer[0].cbBuffer = cast_from_size(size);
Packit 1fb8d4
Packit 1fb8d4
	if (copy)
Packit 1fb8d4
	{
Packit 1fb8d4
		ntlm->inputBuffer[0].pvBuffer = malloc(size);
Packit 1fb8d4
Packit 1fb8d4
		if (!ntlm->inputBuffer[0].pvBuffer)
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
Packit 1fb8d4
		memcpy(ntlm->inputBuffer[0].pvBuffer, data, size);
Packit 1fb8d4
	}
Packit 1fb8d4
	else
Packit 1fb8d4
		ntlm->inputBuffer[0].pvBuffer = (void*)data;
Packit 1fb8d4
Packit 1fb8d4
	return TRUE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
const SecBuffer* ntlm_client_get_output_buffer(rdpNtlm* ntlm)
Packit 1fb8d4
{
Packit 1fb8d4
	if (!ntlm)
Packit 1fb8d4
		return NULL;
Packit 1fb8d4
Packit 1fb8d4
	return &ntlm->outputBuffer[0];
Packit 1fb8d4
}