Blame libfreerdp/core/gateway/rpc_bind.c

Packit Service fa4841
/**
Packit Service fa4841
 * FreeRDP: A Remote Desktop Protocol Implementation
Packit Service fa4841
 * RPC Secure Context Binding
Packit Service fa4841
 *
Packit Service fa4841
 * Copyright 2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
Packit Service fa4841
 *
Packit Service fa4841
 * Licensed under the Apache License, Version 2.0 (the "License");
Packit Service fa4841
 * you may not use this file except in compliance with the License.
Packit Service fa4841
 * You may obtain a copy of the License at
Packit Service fa4841
 *
Packit Service fa4841
 *     http://www.apache.org/licenses/LICENSE-2.0
Packit Service fa4841
 *
Packit Service fa4841
 * Unless required by applicable law or agreed to in writing, software
Packit Service fa4841
 * distributed under the License is distributed on an "AS IS" BASIS,
Packit Service fa4841
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Packit Service fa4841
 * See the License for the specific language governing permissions and
Packit Service fa4841
 * limitations under the License.
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
#ifdef HAVE_CONFIG_H
Packit Service fa4841
#include "config.h"
Packit Service fa4841
#endif
Packit Service fa4841
Packit Service fa4841
#include <winpr/crt.h>
Packit Service fa4841
Packit Service fa4841
#include <freerdp/log.h>
Packit Service fa4841
Packit Service fa4841
#include "rpc_client.h"
Packit Service fa4841
Packit Service fa4841
#include "rpc_bind.h"
Packit Service fa4841
Packit Service fa4841
#define TAG FREERDP_TAG("core.gateway.rpc")
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 * Connection-Oriented RPC Protocol Client Details:
Packit Service fa4841
 * http://msdn.microsoft.com/en-us/library/cc243724/
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
/* Syntax UUIDs */
Packit Service fa4841
Packit Service bb5c11
const p_uuid_t TSGU_UUID =
Packit Service bb5c11
{
Packit Service bb5c11
	0x44E265DD, /* time_low */
Packit Service bb5c11
	0x7DAF, /* time_mid */
Packit Service bb5c11
	0x42CD, /* time_hi_and_version */
Packit Service bb5c11
	0x85, /* clock_seq_hi_and_reserved */
Packit Service bb5c11
	0x60, /* clock_seq_low */
Packit Service fa4841
	{ 0x3C, 0xDB, 0x6E, 0x7A, 0x27, 0x29 } /* node[6] */
Packit Service fa4841
};
Packit Service fa4841
Packit Service bb5c11
const p_uuid_t NDR_UUID =
Packit Service bb5c11
{
Packit Service bb5c11
	0x8A885D04, /* time_low */
Packit Service bb5c11
	0x1CEB, /* time_mid */
Packit Service bb5c11
	0x11C9, /* time_hi_and_version */
Packit Service bb5c11
	0x9F, /* clock_seq_hi_and_reserved */
Packit Service bb5c11
	0xE8, /* clock_seq_low */
Packit Service fa4841
	{ 0x08, 0x00, 0x2B, 0x10, 0x48, 0x60 } /* node[6] */
Packit Service fa4841
};
Packit Service fa4841
Packit Service bb5c11
const p_uuid_t BTFN_UUID =
Packit Service bb5c11
{
Packit Service bb5c11
	0x6CB71C2C, /* time_low */
Packit Service bb5c11
	0x9812, /* time_mid */
Packit Service bb5c11
	0x4540, /* time_hi_and_version */
Packit Service bb5c11
	0x03, /* clock_seq_hi_and_reserved */
Packit Service bb5c11
	0x00, /* clock_seq_low */
Packit Service fa4841
	{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } /* node[6] */
Packit Service fa4841
};
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 *           Secure Connection-Oriented RPC Packet Sequence
Packit Service fa4841
 *
Packit Service fa4841
 *     Client                                              Server
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |-------------------SECURE_BIND-------------------->|
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |<----------------SECURE_BIND_ACK-------------------|
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |--------------------RPC_AUTH_3-------------------->|
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |------------------REQUEST_PDU_#1------------------>|
Packit Service fa4841
 *        |------------------REQUEST_PDU_#2------------------>|
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |                        ...                        |
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |<-----------------RESPONSE_PDU_#1------------------|
Packit Service fa4841
 *        |<-----------------RESPONSE_PDU_#2------------------|
Packit Service fa4841
 *        |                                                   |
Packit Service fa4841
 *        |                        ...                        |
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 * SECURE_BIND: RPC bind PDU with sec_trailer and auth_token. Auth_token is generated by calling
Packit Service fa4841
 * the implementation equivalent of the abstract GSS_Init_sec_context call. Upon receiving that, the
Packit Service fa4841
 * server calls the implementation equivalent of the abstract GSS_Accept_sec_context call, which
Packit Service fa4841
 * returns an auth_token and continue status in this example. Assume the following:
Packit Service fa4841
 *
Packit Service fa4841
 * 1) The client chooses the auth_context_id field in the sec_trailer sent with this PDU to be 1.
Packit Service fa4841
 *
Packit Service fa4841
 * 2) The client uses the RPC_C_AUTHN_LEVEL_PKT_PRIVACY authentication level and the
Packit Service fa4841
 *    Authentication Service (AS) NTLM.
Packit Service fa4841
 *
Packit Service fa4841
 * 3) The client sets the PFC_SUPPORT_HEADER_SIGN flag in the PDU header.
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
int rpc_send_bind_pdu(rdpRpc* rpc)
Packit Service fa4841
{
Packit Service fa4841
	BOOL continueNeeded = FALSE;
Packit Service fa4841
	int status = -1;
Packit Service fa4841
	BYTE* buffer = NULL;
Packit Service fa4841
	UINT32 offset;
Packit Service fa4841
	UINT32 length;
Packit Service fa4841
	RpcClientCall* clientCall;
Packit Service fa4841
	p_cont_elem_t* p_cont_elem;
Packit Service fa4841
	rpcconn_bind_hdr_t* bind_pdu = NULL;
Packit Service fa4841
	BOOL promptPassword = FALSE;
Packit Service fa4841
	rdpSettings* settings = rpc->settings;
Packit Service bb5c11
	freerdp* instance = (freerdp*) settings->instance;
Packit Service fa4841
	RpcVirtualConnection* connection = rpc->VirtualConnection;
Packit Service fa4841
	RpcInChannel* inChannel = connection->DefaultInChannel;
Packit Service fa4841
	const SecBuffer* sbuffer = NULL;
Packit Service fa4841
	WLog_DBG(TAG, "Sending Bind PDU");
Packit Service fa4841
	ntlm_free(rpc->ntlm);
Packit Service fa4841
	rpc->ntlm = ntlm_new();
Packit Service fa4841
Packit Service fa4841
	if (!rpc->ntlm)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service bb5c11
	if ((!settings->GatewayPassword) || (!settings->GatewayUsername)
Packit Service bb5c11
	    || (!strlen(settings->GatewayPassword)) || (!strlen(settings->GatewayUsername)))
Packit Service fa4841
	{
Packit Service fa4841
		promptPassword = TRUE;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	if (promptPassword)
Packit Service fa4841
	{
Packit Service bb5c11
		if (instance->GatewayAuthenticate)
Packit Service fa4841
		{
Packit Service bb5c11
			BOOL proceed = instance->GatewayAuthenticate(instance,
Packit Service bb5c11
			               &settings->GatewayUsername, &settings->GatewayPassword, &settings->GatewayDomain);
Packit Service fa4841
Packit Service fa4841
			if (!proceed)
Packit Service fa4841
			{
Packit Service bb5c11
				freerdp_set_last_error(instance->context, FREERDP_ERROR_CONNECT_CANCELLED);
Packit Service fa4841
				return 0;
Packit Service fa4841
			}
Packit Service fa4841
Packit Service fa4841
			if (settings->GatewayUseSameCredentials)
Packit Service fa4841
			{
Packit Service fa4841
				settings->Username = _strdup(settings->GatewayUsername);
Packit Service fa4841
				settings->Domain = _strdup(settings->GatewayDomain);
Packit Service fa4841
				settings->Password = _strdup(settings->GatewayPassword);
Packit Service fa4841
Packit Service fa4841
				if (!settings->Username || !settings->Domain || settings->Password)
Packit Service fa4841
					goto fail;
Packit Service fa4841
			}
Packit Service fa4841
		}
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	if (!ntlm_client_init(rpc->ntlm, FALSE, settings->GatewayUsername, settings->GatewayDomain,
Packit Service fa4841
	                      settings->GatewayPassword, NULL))
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	if (!ntlm_client_make_spn(rpc->ntlm, NULL, settings->GatewayHostname))
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	if (!ntlm_authenticate(rpc->ntlm, &continueNeeded))
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	if (!continueNeeded)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service bb5c11
	bind_pdu = (rpcconn_bind_hdr_t*) calloc(1, sizeof(rpcconn_bind_hdr_t));
Packit Service fa4841
Packit Service fa4841
	if (!bind_pdu)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	sbuffer = ntlm_client_get_output_buffer(rpc->ntlm);
Packit Service fa4841
Packit Service fa4841
	if (!sbuffer)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service bb5c11
	rpc_pdu_header_init(rpc, (rpcconn_hdr_t*) bind_pdu);
Packit Service bb5c11
	bind_pdu->auth_length = (UINT16) sbuffer->cbBuffer;
Packit Service fa4841
	bind_pdu->auth_verifier.auth_value = sbuffer->pvBuffer;
Packit Service bb5c11
	bind_pdu->ptype = PTYPE_BIND;
Packit Service bb5c11
	bind_pdu->pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG | PFC_SUPPORT_HEADER_SIGN | PFC_CONC_MPX;
Packit Service bb5c11
	bind_pdu->call_id = 2;
Packit Service fa4841
	bind_pdu->max_xmit_frag = rpc->max_xmit_frag;
Packit Service fa4841
	bind_pdu->max_recv_frag = rpc->max_recv_frag;
Packit Service fa4841
	bind_pdu->assoc_group_id = 0;
Packit Service fa4841
	bind_pdu->p_context_elem.n_context_elem = 2;
Packit Service fa4841
	bind_pdu->p_context_elem.reserved = 0;
Packit Service fa4841
	bind_pdu->p_context_elem.reserved2 = 0;
Packit Service bb5c11
	bind_pdu->p_context_elem.p_cont_elem = calloc(bind_pdu->p_context_elem.n_context_elem,
Packit Service bb5c11
	                                       sizeof(p_cont_elem_t));
Packit Service fa4841
Packit Service fa4841
	if (!bind_pdu->p_context_elem.p_cont_elem)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	p_cont_elem = &bind_pdu->p_context_elem.p_cont_elem[0];
Packit Service fa4841
	p_cont_elem->p_cont_id = 0;
Packit Service fa4841
	p_cont_elem->n_transfer_syn = 1;
Packit Service fa4841
	p_cont_elem->reserved = 0;
Packit Service fa4841
	CopyMemory(&(p_cont_elem->abstract_syntax.if_uuid), &TSGU_UUID, sizeof(p_uuid_t));
Packit Service fa4841
	p_cont_elem->abstract_syntax.if_version = TSGU_SYNTAX_IF_VERSION;
Packit Service fa4841
	p_cont_elem->transfer_syntaxes = malloc(sizeof(p_syntax_id_t));
Packit Service fa4841
Packit Service fa4841
	if (!p_cont_elem->transfer_syntaxes)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	CopyMemory(&(p_cont_elem->transfer_syntaxes[0].if_uuid), &NDR_UUID, sizeof(p_uuid_t));
Packit Service fa4841
	p_cont_elem->transfer_syntaxes[0].if_version = NDR_SYNTAX_IF_VERSION;
Packit Service fa4841
	p_cont_elem = &bind_pdu->p_context_elem.p_cont_elem[1];
Packit Service fa4841
	p_cont_elem->p_cont_id = 1;
Packit Service fa4841
	p_cont_elem->n_transfer_syn = 1;
Packit Service fa4841
	p_cont_elem->reserved = 0;
Packit Service fa4841
	CopyMemory(&(p_cont_elem->abstract_syntax.if_uuid), &TSGU_UUID, sizeof(p_uuid_t));
Packit Service fa4841
	p_cont_elem->abstract_syntax.if_version = TSGU_SYNTAX_IF_VERSION;
Packit Service fa4841
	p_cont_elem->transfer_syntaxes = malloc(sizeof(p_syntax_id_t));
Packit Service fa4841
Packit Service fa4841
	if (!p_cont_elem->transfer_syntaxes)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	CopyMemory(&(p_cont_elem->transfer_syntaxes[0].if_uuid), &BTFN_UUID, sizeof(p_uuid_t));
Packit Service fa4841
	p_cont_elem->transfer_syntaxes[0].if_version = BTFN_SYNTAX_IF_VERSION;
Packit Service fa4841
	offset = 116;
Packit Service fa4841
	bind_pdu->auth_verifier.auth_pad_length = rpc_offset_align(&offset, 4);
Packit Service fa4841
	bind_pdu->auth_verifier.auth_type = RPC_C_AUTHN_WINNT;
Packit Service fa4841
	bind_pdu->auth_verifier.auth_level = RPC_C_AUTHN_LEVEL_PKT_INTEGRITY;
Packit Service fa4841
	bind_pdu->auth_verifier.auth_reserved = 0x00;
Packit Service fa4841
	bind_pdu->auth_verifier.auth_context_id = 0x00000000;
Packit Service bb5c11
	offset += (8 + bind_pdu->auth_length);
Packit Service bb5c11
	bind_pdu->frag_length = offset;
Packit Service bb5c11
	buffer = (BYTE*) malloc(bind_pdu->frag_length);
Packit Service fa4841
Packit Service fa4841
	if (!buffer)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	CopyMemory(buffer, bind_pdu, 24);
Packit Service fa4841
	CopyMemory(&buffer[24], &bind_pdu->p_context_elem, 4);
Packit Service fa4841
	CopyMemory(&buffer[28], &bind_pdu->p_context_elem.p_cont_elem[0], 24);
Packit Service fa4841
	CopyMemory(&buffer[52], bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes, 20);
Packit Service fa4841
	CopyMemory(&buffer[72], &bind_pdu->p_context_elem.p_cont_elem[1], 24);
Packit Service fa4841
	CopyMemory(&buffer[96], bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes, 20);
Packit Service fa4841
	offset = 116;
Packit Service fa4841
	rpc_offset_pad(&offset, bind_pdu->auth_verifier.auth_pad_length);
Packit Service fa4841
	CopyMemory(&buffer[offset], &bind_pdu->auth_verifier.auth_type, 8);
Packit Service bb5c11
	CopyMemory(&buffer[offset + 8], bind_pdu->auth_verifier.auth_value, bind_pdu->auth_length);
Packit Service bb5c11
	offset += (8 + bind_pdu->auth_length);
Packit Service bb5c11
	length = bind_pdu->frag_length;
Packit Service bb5c11
	clientCall = rpc_client_call_new(bind_pdu->call_id, 0);
Packit Service fa4841
Packit Service fa4841
	if (!clientCall)
Packit Service fa4841
		goto fail;
Packit Service fa4841
Packit Service fa4841
	if (ArrayList_Add(rpc->client->ClientCallList, clientCall) < 0)
Packit Service fa4841
	{
Packit Service fa4841
		rpc_client_call_free(clientCall);
Packit Service fa4841
		goto fail;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	status = rpc_in_channel_send_pdu(inChannel, buffer, length);
Packit Service fa4841
fail:
Packit Service fa4841
Packit Service fa4841
	if (bind_pdu)
Packit Service fa4841
	{
Packit Service fa4841
		if (bind_pdu->p_context_elem.p_cont_elem)
Packit Service fa4841
		{
Packit Service fa4841
			free(bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes);
Packit Service fa4841
			free(bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes);
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		free(bind_pdu->p_context_elem.p_cont_elem);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	free(bind_pdu);
Packit Service fa4841
	free(buffer);
Packit Service fa4841
	return (status > 0) ? 1 : -1;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 * Maximum Transmit/Receive Fragment Size Negotiation
Packit Service fa4841
 *
Packit Service bb5c11
 * The client determines, and then sends in the bind PDU, its desired maximum size for transmitting fragments,
Packit Service bb5c11
 * and its desired maximum receive fragment size. Similarly, the server determines its desired maximum sizes
Packit Service bb5c11
 * for transmitting and receiving fragments. Transmit and receive sizes may be different to help preserve buffering.
Packit Service bb5c11
 * When the server receives the client’s values, it sets its operational transmit size to the minimum of the client’s
Packit Service bb5c11
 * receive size (from the bind PDU) and its own desired transmit size. Then it sets its actual receive size to the
Packit Service bb5c11
 * minimum of the client’s transmit size (from the bind) and its own desired receive size. The server then returns its
Packit Service bb5c11
 * operational values in the bind_ack PDU. The client then sets its operational values from the received bind_ack PDU.
Packit Service bb5c11
 * The received transmit size becomes the client’s receive size, and the received receive size becomes the client’s
Packit Service bb5c11
 * transmit size. Either party may use receive buffers larger than negotiated — although this will not provide any
Packit Service bb5c11
 * advantage — but may not transmit larger fragments than negotiated.
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 *
Packit Service fa4841
 * SECURE_BIND_ACK: RPC bind_ack PDU with sec_trailer and auth_token. The PFC_SUPPORT_HEADER_SIGN
Packit Service fa4841
 * flag in the PDU header is also set in this example. Auth_token is generated by the server in the
Packit Service fa4841
 * previous step. Upon receiving that PDU, the client calls the implementation equivalent of the
Packit Service bb5c11
 * abstract GSS_Init_sec_context call, which returns an auth_token and continue status in this example.
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
int rpc_recv_bind_ack_pdu(rdpRpc* rpc, BYTE* buffer, UINT32 length)
Packit Service fa4841
{
Packit Service fa4841
	BOOL continueNeeded = FALSE;
Packit Service fa4841
	BYTE* auth_data;
Packit Service fa4841
	rpcconn_hdr_t* header;
Packit Service bb5c11
	header = (rpcconn_hdr_t*) buffer;
Packit Service fa4841
	WLog_DBG(TAG, "Receiving BindAck PDU");
Packit Service fa4841
Packit Service fa4841
	if (!rpc || !rpc->ntlm)
Packit Service fa4841
		return -1;
Packit Service fa4841
Packit Service fa4841
	rpc->max_recv_frag = header->bind_ack.max_xmit_frag;
Packit Service fa4841
	rpc->max_xmit_frag = header->bind_ack.max_recv_frag;
Packit Service fa4841
	auth_data = buffer + (header->common.frag_length - header->common.auth_length);
Packit Service fa4841
Packit Service fa4841
	if (!ntlm_client_set_input_buffer(rpc->ntlm, TRUE, auth_data, header->common.auth_length))
Packit Service fa4841
		return -1;
Packit Service fa4841
Packit Service fa4841
	if (!ntlm_authenticate(rpc->ntlm, &continueNeeded))
Packit Service fa4841
		return -1;
Packit Service fa4841
Packit Service fa4841
	if (continueNeeded)
Packit Service fa4841
		return -1;
Packit Service fa4841
Packit Service bb5c11
	return (int) length;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 * RPC_AUTH_3: The client knows that this is an NTLM that uses three legs. It sends an rpc_auth_3
Packit Service fa4841
 * PDU with the auth_token obtained in the previous step. Upon receiving this PDU, the server calls
Packit Service fa4841
 * the implementation equivalent of the abstract GSS_Accept_sec_context call, which returns success
Packit Service fa4841
 * status in this example.
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
int rpc_send_rpc_auth_3_pdu(rdpRpc* rpc)
Packit Service fa4841
{
Packit Service fa4841
	int status = -1;
Packit Service fa4841
	BYTE* buffer;
Packit Service fa4841
	UINT32 offset;
Packit Service fa4841
	UINT32 length;
Packit Service fa4841
	const SecBuffer* sbuffer;
Packit Service fa4841
	RpcClientCall* clientCall;
Packit Service fa4841
	rpcconn_rpc_auth_3_hdr_t* auth_3_pdu;
Packit Service fa4841
	RpcVirtualConnection* connection = rpc->VirtualConnection;
Packit Service fa4841
	RpcInChannel* inChannel = connection->DefaultInChannel;
Packit Service fa4841
	WLog_DBG(TAG, "Sending RpcAuth3 PDU");
Packit Service bb5c11
	auth_3_pdu = (rpcconn_rpc_auth_3_hdr_t*) calloc(1, sizeof(rpcconn_rpc_auth_3_hdr_t));
Packit Service fa4841
Packit Service fa4841
	if (!auth_3_pdu)
Packit Service fa4841
		return -1;
Packit Service fa4841
Packit Service fa4841
	sbuffer = ntlm_client_get_output_buffer(rpc->ntlm);
Packit Service fa4841
Packit Service fa4841
	if (!sbuffer)
Packit Service fa4841
	{
Packit Service fa4841
		free(auth_3_pdu);
Packit Service fa4841
		return -1;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service bb5c11
	rpc_pdu_header_init(rpc, (rpcconn_hdr_t*) auth_3_pdu);
Packit Service bb5c11
	auth_3_pdu->auth_length = (UINT16) sbuffer->cbBuffer;
Packit Service fa4841
	auth_3_pdu->auth_verifier.auth_value = sbuffer->pvBuffer;
Packit Service bb5c11
	auth_3_pdu->ptype = PTYPE_RPC_AUTH_3;
Packit Service bb5c11
	auth_3_pdu->pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG | PFC_CONC_MPX;
Packit Service bb5c11
	auth_3_pdu->call_id = 2;
Packit Service fa4841
	auth_3_pdu->max_xmit_frag = rpc->max_xmit_frag;
Packit Service fa4841
	auth_3_pdu->max_recv_frag = rpc->max_recv_frag;
Packit Service fa4841
	offset = 20;
Packit Service fa4841
	auth_3_pdu->auth_verifier.auth_pad_length = rpc_offset_align(&offset, 4);
Packit Service fa4841
	auth_3_pdu->auth_verifier.auth_type = RPC_C_AUTHN_WINNT;
Packit Service fa4841
	auth_3_pdu->auth_verifier.auth_level = RPC_C_AUTHN_LEVEL_PKT_INTEGRITY;
Packit Service fa4841
	auth_3_pdu->auth_verifier.auth_reserved = 0x00;
Packit Service fa4841
	auth_3_pdu->auth_verifier.auth_context_id = 0x00000000;
Packit Service bb5c11
	offset += (8 + auth_3_pdu->auth_length);
Packit Service bb5c11
	auth_3_pdu->frag_length = offset;
Packit Service bb5c11
	buffer = (BYTE*) malloc(auth_3_pdu->frag_length);
Packit Service fa4841
Packit Service fa4841
	if (!buffer)
Packit Service fa4841
	{
Packit Service fa4841
		free(auth_3_pdu);
Packit Service fa4841
		return -1;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	CopyMemory(buffer, auth_3_pdu, 20);
Packit Service fa4841
	offset = 20;
Packit Service fa4841
	rpc_offset_pad(&offset, auth_3_pdu->auth_verifier.auth_pad_length);
Packit Service fa4841
	CopyMemory(&buffer[offset], &auth_3_pdu->auth_verifier.auth_type, 8);
Packit Service bb5c11
	CopyMemory(&buffer[offset + 8], auth_3_pdu->auth_verifier.auth_value, auth_3_pdu->auth_length);
Packit Service bb5c11
	offset += (8 + auth_3_pdu->auth_length);
Packit Service bb5c11
	length = auth_3_pdu->frag_length;
Packit Service bb5c11
	clientCall = rpc_client_call_new(auth_3_pdu->call_id, 0);
Packit Service fa4841
Packit Service fa4841
	if (ArrayList_Add(rpc->client->ClientCallList, clientCall) >= 0)
Packit Service fa4841
	{
Packit Service fa4841
		status = rpc_in_channel_send_pdu(inChannel, buffer, length);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	free(auth_3_pdu);
Packit Service fa4841
	free(buffer);
Packit Service fa4841
	return (status > 0) ? 1 : -1;
Packit Service fa4841
}