Blame winpr/libwinpr/sspi/NTLM/ntlm.c

Packit Service fa4841
/**
Packit Service fa4841
 * WinPR: Windows Portable Runtime
Packit Service fa4841
 * NTLM Security Package
Packit Service fa4841
 *
Packit Service fa4841
 * Copyright 2011-2014 Marc-Andre Moreau <marcandre.moreau@gmail.com>
Packit Service fa4841
 *
Packit Service fa4841
 * Licensed under the Apache License, Version 2.0 (the "License");
Packit Service fa4841
 * you may not use this file except in compliance with the License.
Packit Service fa4841
 * You may obtain a copy of the License at
Packit Service fa4841
 *
Packit Service fa4841
 *     http://www.apache.org/licenses/LICENSE-2.0
Packit Service fa4841
 *
Packit Service fa4841
 * Unless required by applicable law or agreed to in writing, software
Packit Service fa4841
 * distributed under the License is distributed on an "AS IS" BASIS,
Packit Service fa4841
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Packit Service fa4841
 * See the License for the specific language governing permissions and
Packit Service fa4841
 * limitations under the License.
Packit Service fa4841
 */
Packit Service fa4841
Packit Service fa4841
#ifdef HAVE_CONFIG_H
Packit Service fa4841
#include "config.h"
Packit Service fa4841
#endif
Packit Service fa4841
Packit Service fa4841
#include <winpr/crt.h>
Packit Service fa4841
#include <winpr/sspi.h>
Packit Service fa4841
#include <winpr/print.h>
Packit Service fa4841
#include <winpr/tchar.h>
Packit Service fa4841
#include <winpr/sysinfo.h>
Packit Service fa4841
#include <winpr/registry.h>
Packit Service fa4841
#include <winpr/endian.h>
Packit Service fa4841
#include <freerdp/build-config.h>
Packit Service fa4841
Packit Service fa4841
#include "ntlm.h"
Packit Service fa4841
#include "../sspi.h"
Packit Service fa4841
Packit Service fa4841
#include "ntlm_message.h"
Packit Service fa4841
Packit Service fa4841
#include "../../log.h"
Packit Service fa4841
#define TAG WINPR_TAG("sspi.NTLM")
Packit Service fa4841
Packit Service b1ea74
#define WINPR_KEY "Software\\" FREERDP_VENDOR_STRING "\\" FREERDP_PRODUCT_STRING "\\WinPR\\NTLM"
Packit Service fa4841
Packit Service fa4841
static const char* NTLM_PACKAGE_NAME = "NTLM";
Packit Service fa4841
Packit Service fa4841
static int ntlm_SetContextWorkstation(NTLM_CONTEXT* context, char* Workstation)
Packit Service fa4841
{
Packit Service fa4841
	int status;
Packit Service fa4841
	char* ws = Workstation;
Packit Service fa4841
	DWORD nSize = 0;
Packit Service fa4841
	CHAR* computerName;
Packit Service fa4841
Packit Service fa4841
	if (!Workstation)
Packit Service fa4841
	{
Packit Service b1ea74
		if (GetComputerNameExA(ComputerNameNetBIOS, NULL, &nSize) ||
Packit Service b1ea74
		    GetLastError() != ERROR_MORE_DATA)
Packit Service fa4841
			return -1;
Packit Service fa4841
Packit Service fa4841
		computerName = calloc(nSize, sizeof(CHAR));
Packit Service fa4841
Packit Service fa4841
		if (!computerName)
Packit Service fa4841
			return -1;
Packit Service fa4841
Packit Service fa4841
		if (!GetComputerNameExA(ComputerNameNetBIOS, computerName, &nSize))
Packit Service fa4841
		{
Packit Service fa4841
			free(computerName);
Packit Service fa4841
			return -1;
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		if (nSize > MAX_COMPUTERNAME_LENGTH)
Packit Service fa4841
			computerName[MAX_COMPUTERNAME_LENGTH] = '\0';
Packit Service fa4841
Packit Service fa4841
		ws = computerName;
Packit Service fa4841
Packit Service fa4841
		if (!ws)
Packit Service fa4841
			return -1;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	context->Workstation.Buffer = NULL;
Packit Service fa4841
	status = ConvertToUnicode(CP_UTF8, 0, ws, -1, &context->Workstation.Buffer, 0);
Packit Service fa4841
Packit Service fa4841
	if (!Workstation)
Packit Service fa4841
		free(ws);
Packit Service fa4841
Packit Service fa4841
	if (status <= 0)
Packit Service fa4841
		return -1;
Packit Service fa4841
Packit Service fa4841
	context->Workstation.Length = (USHORT)(status - 1);
Packit Service fa4841
	context->Workstation.Length *= 2;
Packit Service fa4841
	return 1;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static int ntlm_SetContextServicePrincipalNameW(NTLM_CONTEXT* context, LPWSTR ServicePrincipalName)
Packit Service fa4841
{
Packit Service fa4841
	if (!ServicePrincipalName)
Packit Service fa4841
	{
Packit Service fa4841
		context->ServicePrincipalName.Buffer = NULL;
Packit Service fa4841
		context->ServicePrincipalName.Length = 0;
Packit Service fa4841
		return 1;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	context->ServicePrincipalName.Length = (USHORT)(_wcslen(ServicePrincipalName) * 2);
Packit Service b1ea74
	context->ServicePrincipalName.Buffer = (PWSTR)malloc(context->ServicePrincipalName.Length + 2);
Packit Service fa4841
Packit Service fa4841
	if (!context->ServicePrincipalName.Buffer)
Packit Service fa4841
		return -1;
Packit Service fa4841
Packit Service fa4841
	CopyMemory(context->ServicePrincipalName.Buffer, ServicePrincipalName,
Packit Service fa4841
	           context->ServicePrincipalName.Length + 2);
Packit Service fa4841
	return 1;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static int ntlm_SetContextTargetName(NTLM_CONTEXT* context, char* TargetName)
Packit Service fa4841
{
Packit Service fa4841
	int status;
Packit Service fa4841
	char* name = TargetName;
Packit Service fa4841
	DWORD nSize = 0;
Packit Service fa4841
	CHAR* computerName = NULL;
Packit Service fa4841
Packit Service fa4841
	if (!name)
Packit Service fa4841
	{
Packit Service b1ea74
		if (GetComputerNameExA(ComputerNameNetBIOS, NULL, &nSize) ||
Packit Service b1ea74
		    GetLastError() != ERROR_MORE_DATA)
Packit Service fa4841
			return -1;
Packit Service fa4841
Packit Service fa4841
		computerName = calloc(nSize, sizeof(CHAR));
Packit Service fa4841
Packit Service fa4841
		if (!computerName)
Packit Service fa4841
			return -1;
Packit Service fa4841
Packit Service fa4841
		if (!GetComputerNameExA(ComputerNameNetBIOS, computerName, &nSize))
Packit Service fa4841
		{
Packit Service fa4841
			free(computerName);
Packit Service fa4841
			return -1;
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		if (nSize > MAX_COMPUTERNAME_LENGTH)
Packit Service fa4841
			computerName[MAX_COMPUTERNAME_LENGTH] = '\0';
Packit Service fa4841
Packit Service fa4841
		name = computerName;
Packit Service fa4841
Packit Service fa4841
		if (!name)
Packit Service fa4841
			return -1;
Packit Service fa4841
Packit Service fa4841
		CharUpperA(name);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	context->TargetName.pvBuffer = NULL;
Packit Service b1ea74
	status = ConvertToUnicode(CP_UTF8, 0, name, -1, (LPWSTR*)&context->TargetName.pvBuffer, 0);
Packit Service fa4841
Packit Service fa4841
	if (status <= 0)
Packit Service fa4841
	{
Packit Service fa4841
		if (!TargetName)
Packit Service fa4841
			free(name);
Packit Service fa4841
Packit Service fa4841
		return -1;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	context->TargetName.cbBuffer = (USHORT)((status - 1) * 2);
Packit Service fa4841
Packit Service fa4841
	if (!TargetName)
Packit Service fa4841
		free(name);
Packit Service fa4841
Packit Service fa4841
	return 1;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static NTLM_CONTEXT* ntlm_ContextNew(void)
Packit Service fa4841
{
Packit Service fa4841
	HKEY hKey;
Packit Service fa4841
	LONG status;
Packit Service fa4841
	DWORD dwType;
Packit Service fa4841
	DWORD dwSize;
Packit Service fa4841
	DWORD dwValue;
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service b1ea74
	context = (NTLM_CONTEXT*)calloc(1, sizeof(NTLM_CONTEXT));
Packit Service fa4841
Packit Service fa4841
	if (!context)
Packit Service fa4841
		return NULL;
Packit Service fa4841
Packit Service fa4841
	context->NTLMv2 = TRUE;
Packit Service fa4841
	context->UseMIC = FALSE;
Packit Service fa4841
	context->SendVersionInfo = TRUE;
Packit Service fa4841
	context->SendSingleHostData = FALSE;
Packit Service fa4841
	context->SendWorkstationName = TRUE;
Packit Service fa4841
	context->NegotiateKeyExchange = TRUE;
Packit Service fa4841
	context->UseSamFileDatabase = TRUE;
Packit Service fa4841
	status = RegOpenKeyExA(HKEY_LOCAL_MACHINE, WINPR_KEY, 0, KEY_READ | KEY_WOW64_64KEY, &hKey);
Packit Service fa4841
Packit Service fa4841
	if (status == ERROR_SUCCESS)
Packit Service fa4841
	{
Packit Service b1ea74
		if (RegQueryValueEx(hKey, _T("NTLMv2"), NULL, &dwType, (BYTE*)&dwValue, &dwSize) ==
Packit Service b1ea74
		    ERROR_SUCCESS)
Packit Service fa4841
			context->NTLMv2 = dwValue ? 1 : 0;
Packit Service fa4841
Packit Service b1ea74
		if (RegQueryValueEx(hKey, _T("UseMIC"), NULL, &dwType, (BYTE*)&dwValue, &dwSize) ==
Packit Service b1ea74
		    ERROR_SUCCESS)
Packit Service fa4841
			context->UseMIC = dwValue ? 1 : 0;
Packit Service fa4841
Packit Service b1ea74
		if (RegQueryValueEx(hKey, _T("SendVersionInfo"), NULL, &dwType, (BYTE*)&dwValue, &dwSize) ==
Packit Service b1ea74
		    ERROR_SUCCESS)
Packit Service fa4841
			context->SendVersionInfo = dwValue ? 1 : 0;
Packit Service fa4841
Packit Service b1ea74
		if (RegQueryValueEx(hKey, _T("SendSingleHostData"), NULL, &dwType, (BYTE*)&dwValue,
Packit Service fa4841
		                    &dwSize) == ERROR_SUCCESS)
Packit Service fa4841
			context->SendSingleHostData = dwValue ? 1 : 0;
Packit Service fa4841
Packit Service b1ea74
		if (RegQueryValueEx(hKey, _T("SendWorkstationName"), NULL, &dwType, (BYTE*)&dwValue,
Packit Service fa4841
		                    &dwSize) == ERROR_SUCCESS)
Packit Service fa4841
			context->SendWorkstationName = dwValue ? 1 : 0;
Packit Service fa4841
Packit Service b1ea74
		if (RegQueryValueEx(hKey, _T("WorkstationName"), NULL, &dwType, NULL, &dwSize) ==
Packit Service b1ea74
		    ERROR_SUCCESS)
Packit Service fa4841
		{
Packit Service b1ea74
			char* workstation = (char*)malloc(dwSize + 1);
Packit Service fa4841
Packit Service fa4841
			if (!workstation)
Packit Service fa4841
			{
Packit Service fa4841
				free(context);
Packit Service fa4841
				return NULL;
Packit Service fa4841
			}
Packit Service fa4841
Packit Service b1ea74
			status = RegQueryValueExA(hKey, "WorkstationName", NULL, &dwType, (BYTE*)workstation,
Packit Service b1ea74
			                          &dwSize);
Packit Service fa4841
			workstation[dwSize] = '\0';
Packit Service fa4841
Packit Service fa4841
			if (ntlm_SetContextWorkstation(context, workstation) < 0)
Packit Service fa4841
			{
Packit Service fa4841
				free(workstation);
Packit Service fa4841
				free(context);
Packit Service fa4841
				return NULL;
Packit Service fa4841
			}
Packit Service fa4841
Packit Service fa4841
			free(workstation);
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		RegCloseKey(hKey);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	/*
Packit Service fa4841
	 * Extended Protection is enabled by default in Windows 7,
Packit Service fa4841
	 * but enabling it in WinPR breaks TS Gateway at this point
Packit Service fa4841
	 */
Packit Service fa4841
	context->SuppressExtendedProtection = FALSE;
Packit Service fa4841
	status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, _T("System\\CurrentControlSet\\Control\\LSA"), 0,
Packit Service fa4841
	                      KEY_READ | KEY_WOW64_64KEY, &hKey);
Packit Service fa4841
Packit Service fa4841
	if (status == ERROR_SUCCESS)
Packit Service fa4841
	{
Packit Service b1ea74
		if (RegQueryValueEx(hKey, _T("SuppressExtendedProtection"), NULL, &dwType, (BYTE*)&dwValue,
Packit Service fa4841
		                    &dwSize) == ERROR_SUCCESS)
Packit Service fa4841
			context->SuppressExtendedProtection = dwValue ? 1 : 0;
Packit Service fa4841
Packit Service fa4841
		RegCloseKey(hKey);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	context->NegotiateFlags = 0;
Packit Service fa4841
	context->LmCompatibilityLevel = 3;
Packit Service fa4841
	context->state = NTLM_STATE_INITIAL;
Packit Service fa4841
	FillMemory(context->MachineID, sizeof(context->MachineID), 0xAA);
Packit Service fa4841
Packit Service fa4841
	if (context->NTLMv2)
Packit Service fa4841
		context->UseMIC = TRUE;
Packit Service fa4841
Packit Service fa4841
	return context;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static void ntlm_ContextFree(NTLM_CONTEXT* context)
Packit Service fa4841
{
Packit Service fa4841
	if (!context)
Packit Service fa4841
		return;
Packit Service fa4841
Packit Service fa4841
	winpr_RC4_Free(context->SendRc4Seal);
Packit Service fa4841
	winpr_RC4_Free(context->RecvRc4Seal);
Packit Service fa4841
	sspi_SecBufferFree(&context->NegotiateMessage);
Packit Service fa4841
	sspi_SecBufferFree(&context->ChallengeMessage);
Packit Service fa4841
	sspi_SecBufferFree(&context->AuthenticateMessage);
Packit Service fa4841
	sspi_SecBufferFree(&context->ChallengeTargetInfo);
Packit Service fa4841
	sspi_SecBufferFree(&context->TargetName);
Packit Service fa4841
	sspi_SecBufferFree(&context->NtChallengeResponse);
Packit Service fa4841
	sspi_SecBufferFree(&context->LmChallengeResponse);
Packit Service fa4841
	free(context->ServicePrincipalName.Buffer);
Packit Service fa4841
	free(context->Workstation.Buffer);
Packit Service fa4841
	free(context);
Packit Service fa4841
}
Packit Service fa4841
Packit Service b1ea74
static SECURITY_STATUS SEC_ENTRY ntlm_AcquireCredentialsHandleW(
Packit Service b1ea74
    SEC_WCHAR* pszPrincipal, SEC_WCHAR* pszPackage, ULONG fCredentialUse, void* pvLogonID,
Packit Service b1ea74
    void* pAuthData, SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument, PCredHandle phCredential,
Packit Service b1ea74
    PTimeStamp ptsExpiry)
Packit Service fa4841
{
Packit Service fa4841
	SSPI_CREDENTIALS* credentials;
Packit Service fa4841
	SEC_WINNT_AUTH_IDENTITY* identity;
Packit Service fa4841
Packit Service b1ea74
	if ((fCredentialUse != SECPKG_CRED_OUTBOUND) && (fCredentialUse != SECPKG_CRED_INBOUND) &&
Packit Service fa4841
	    (fCredentialUse != SECPKG_CRED_BOTH))
Packit Service fa4841
	{
Packit Service fa4841
		return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	credentials = sspi_CredentialsNew();
Packit Service fa4841
Packit Service fa4841
	if (!credentials)
Packit Service fa4841
		return SEC_E_INTERNAL_ERROR;
Packit Service fa4841
Packit Service fa4841
	credentials->fCredentialUse = fCredentialUse;
Packit Service fa4841
	credentials->pGetKeyFn = pGetKeyFn;
Packit Service fa4841
	credentials->pvGetKeyArgument = pvGetKeyArgument;
Packit Service b1ea74
	identity = (SEC_WINNT_AUTH_IDENTITY*)pAuthData;
Packit Service fa4841
Packit Service fa4841
	if (identity)
Packit Service fa4841
		sspi_CopyAuthIdentity(&(credentials->identity), identity);
Packit Service fa4841
Packit Service b1ea74
	sspi_SecureHandleSetLowerPointer(phCredential, (void*)credentials);
Packit Service b1ea74
	sspi_SecureHandleSetUpperPointer(phCredential, (void*)NTLM_PACKAGE_NAME);
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service b1ea74
static SECURITY_STATUS SEC_ENTRY ntlm_AcquireCredentialsHandleA(
Packit Service b1ea74
    SEC_CHAR* pszPrincipal, SEC_CHAR* pszPackage, ULONG fCredentialUse, void* pvLogonID,
Packit Service b1ea74
    void* pAuthData, SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument, PCredHandle phCredential,
Packit Service b1ea74
    PTimeStamp ptsExpiry)
Packit Service fa4841
{
Packit Service fa4841
	SSPI_CREDENTIALS* credentials;
Packit Service fa4841
	SEC_WINNT_AUTH_IDENTITY* identity;
Packit Service fa4841
Packit Service b1ea74
	if ((fCredentialUse != SECPKG_CRED_OUTBOUND) && (fCredentialUse != SECPKG_CRED_INBOUND) &&
Packit Service fa4841
	    (fCredentialUse != SECPKG_CRED_BOTH))
Packit Service fa4841
	{
Packit Service fa4841
		return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	credentials = sspi_CredentialsNew();
Packit Service fa4841
Packit Service fa4841
	if (!credentials)
Packit Service fa4841
		return SEC_E_INTERNAL_ERROR;
Packit Service fa4841
Packit Service fa4841
	credentials->fCredentialUse = fCredentialUse;
Packit Service fa4841
	credentials->pGetKeyFn = pGetKeyFn;
Packit Service fa4841
	credentials->pvGetKeyArgument = pvGetKeyArgument;
Packit Service b1ea74
	identity = (SEC_WINNT_AUTH_IDENTITY*)pAuthData;
Packit Service fa4841
Packit Service fa4841
	if (identity)
Packit Service fa4841
		sspi_CopyAuthIdentity(&(credentials->identity), identity);
Packit Service fa4841
Packit Service b1ea74
	sspi_SecureHandleSetLowerPointer(phCredential, (void*)credentials);
Packit Service b1ea74
	sspi_SecureHandleSetUpperPointer(phCredential, (void*)NTLM_PACKAGE_NAME);
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_FreeCredentialsHandle(PCredHandle phCredential)
Packit Service fa4841
{
Packit Service fa4841
	SSPI_CREDENTIALS* credentials;
Packit Service fa4841
Packit Service fa4841
	if (!phCredential)
Packit Service fa4841
		return SEC_E_INVALID_HANDLE;
Packit Service fa4841
Packit Service b1ea74
	credentials = (SSPI_CREDENTIALS*)sspi_SecureHandleGetLowerPointer(phCredential);
Packit Service fa4841
Packit Service fa4841
	if (!credentials)
Packit Service fa4841
		return SEC_E_INVALID_HANDLE;
Packit Service fa4841
Packit Service fa4841
	sspi_CredentialsFree(credentials);
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_QueryCredentialsAttributesW(PCredHandle phCredential,
Packit Service b1ea74
                                                                  ULONG ulAttribute, void* pBuffer)
Packit Service fa4841
{
Packit Service fa4841
	if (ulAttribute == SECPKG_CRED_ATTR_NAMES)
Packit Service fa4841
	{
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	return SEC_E_UNSUPPORTED_FUNCTION;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_QueryCredentialsAttributesA(PCredHandle phCredential,
Packit Service b1ea74
                                                                  ULONG ulAttribute, void* pBuffer)
Packit Service fa4841
{
Packit Service fa4841
	return ntlm_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 * @see http://msdn.microsoft.com/en-us/library/windows/desktop/aa374707
Packit Service fa4841
 */
Packit Service b1ea74
static SECURITY_STATUS SEC_ENTRY
Packit Service b1ea74
ntlm_AcceptSecurityContext(PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput,
Packit Service b1ea74
                           ULONG fContextReq, ULONG TargetDataRep, PCtxtHandle phNewContext,
Packit Service b1ea74
                           PSecBufferDesc pOutput, PULONG pfContextAttr, PTimeStamp ptsTimeStamp)
Packit Service fa4841
{
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service fa4841
	SECURITY_STATUS status;
Packit Service fa4841
	SSPI_CREDENTIALS* credentials;
Packit Service fa4841
	PSecBuffer input_buffer;
Packit Service fa4841
	PSecBuffer output_buffer;
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service fa4841
	if (!context)
Packit Service fa4841
	{
Packit Service fa4841
		context = ntlm_ContextNew();
Packit Service fa4841
Packit Service fa4841
		if (!context)
Packit Service fa4841
			return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service fa4841
		context->server = TRUE;
Packit Service fa4841
Packit Service fa4841
		if (fContextReq & ASC_REQ_CONFIDENTIALITY)
Packit Service fa4841
			context->confidentiality = TRUE;
Packit Service fa4841
Packit Service b1ea74
		credentials = (SSPI_CREDENTIALS*)sspi_SecureHandleGetLowerPointer(phCredential);
Packit Service fa4841
		context->credentials = credentials;
Packit Service fa4841
		ntlm_SetContextTargetName(context, NULL);
Packit Service fa4841
		sspi_SecureHandleSetLowerPointer(phNewContext, context);
Packit Service b1ea74
		sspi_SecureHandleSetUpperPointer(phNewContext, (void*)NTLM_PACKAGE_NAME);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	if (context->state == NTLM_STATE_INITIAL)
Packit Service fa4841
	{
Packit Service fa4841
		context->state = NTLM_STATE_NEGOTIATE;
Packit Service fa4841
Packit Service fa4841
		if (!pInput)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (pInput->cBuffers < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
Packit Service fa4841
Packit Service fa4841
		if (!input_buffer)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (input_buffer->cbBuffer < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		status = ntlm_read_NegotiateMessage(context, input_buffer);
Packit Service fa4841
Packit Service fa4841
		if (context->state == NTLM_STATE_CHALLENGE)
Packit Service fa4841
		{
Packit Service fa4841
			if (!pOutput)
Packit Service fa4841
				return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
			if (pOutput->cBuffers < 1)
Packit Service fa4841
				return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
			output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
Packit Service fa4841
Packit Service fa4841
			if (!output_buffer->BufferType)
Packit Service fa4841
				return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
			if (output_buffer->cbBuffer < 1)
Packit Service fa4841
				return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service fa4841
			return ntlm_write_ChallengeMessage(context, output_buffer);
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OUT_OF_SEQUENCE;
Packit Service fa4841
	}
Packit Service fa4841
	else if (context->state == NTLM_STATE_AUTHENTICATE)
Packit Service fa4841
	{
Packit Service fa4841
		if (!pInput)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (pInput->cBuffers < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
Packit Service fa4841
Packit Service fa4841
		if (!input_buffer)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (input_buffer->cbBuffer < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		status = ntlm_read_AuthenticateMessage(context, input_buffer);
Packit Service fa4841
Packit Service fa4841
		if (pOutput)
Packit Service fa4841
		{
Packit Service fa4841
			ULONG i;
Packit Service fa4841
Packit Service fa4841
			for (i = 0; i < pOutput->cBuffers; i++)
Packit Service fa4841
			{
Packit Service fa4841
				pOutput->pBuffers[i].cbBuffer = 0;
Packit Service fa4841
				pOutput->pBuffers[i].BufferType = SECBUFFER_TOKEN;
Packit Service fa4841
			}
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		return status;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	return SEC_E_OUT_OF_SEQUENCE;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_ImpersonateSecurityContext(PCtxtHandle phContext)
Packit Service fa4841
{
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service b1ea74
static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextW(
Packit Service b1ea74
    PCredHandle phCredential, PCtxtHandle phContext, SEC_WCHAR* pszTargetName, ULONG fContextReq,
Packit Service b1ea74
    ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2,
Packit Service b1ea74
    PCtxtHandle phNewContext, PSecBufferDesc pOutput, PULONG pfContextAttr, PTimeStamp ptsExpiry)
Packit Service fa4841
{
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service fa4841
	SECURITY_STATUS status;
Packit Service fa4841
	SSPI_CREDENTIALS* credentials;
Packit Service fa4841
	PSecBuffer input_buffer = NULL;
Packit Service fa4841
	PSecBuffer output_buffer = NULL;
Packit Service fa4841
	PSecBuffer channel_bindings = NULL;
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service fa4841
	if (!context)
Packit Service fa4841
	{
Packit Service fa4841
		context = ntlm_ContextNew();
Packit Service fa4841
Packit Service fa4841
		if (!context)
Packit Service fa4841
			return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service fa4841
		if (fContextReq & ISC_REQ_CONFIDENTIALITY)
Packit Service fa4841
			context->confidentiality = TRUE;
Packit Service fa4841
Packit Service b1ea74
		credentials = (SSPI_CREDENTIALS*)sspi_SecureHandleGetLowerPointer(phCredential);
Packit Service fa4841
		context->credentials = credentials;
Packit Service fa4841
Packit Service fa4841
		if (context->Workstation.Length < 1)
Packit Service fa4841
		{
Packit Service fa4841
			if (ntlm_SetContextWorkstation(context, NULL) < 0)
Packit Service fa4841
			{
Packit Service fa4841
				ntlm_ContextFree(context);
Packit Service fa4841
				return SEC_E_INTERNAL_ERROR;
Packit Service fa4841
			}
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		if (ntlm_SetContextServicePrincipalNameW(context, pszTargetName) < 0)
Packit Service fa4841
		{
Packit Service fa4841
			ntlm_ContextFree(context);
Packit Service fa4841
			return SEC_E_INTERNAL_ERROR;
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		sspi_SecureHandleSetLowerPointer(phNewContext, context);
Packit Service b1ea74
		sspi_SecureHandleSetUpperPointer(phNewContext, (void*)NTLM_PACKAGE_NAME);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	if ((!pInput) || (context->state == NTLM_STATE_AUTHENTICATE))
Packit Service fa4841
	{
Packit Service fa4841
		if (!pOutput)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (pOutput->cBuffers < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
Packit Service fa4841
Packit Service fa4841
		if (!output_buffer)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (output_buffer->cbBuffer < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (context->state == NTLM_STATE_INITIAL)
Packit Service fa4841
			context->state = NTLM_STATE_NEGOTIATE;
Packit Service fa4841
Packit Service fa4841
		if (context->state == NTLM_STATE_NEGOTIATE)
Packit Service fa4841
			return ntlm_write_NegotiateMessage(context, output_buffer);
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OUT_OF_SEQUENCE;
Packit Service fa4841
	}
Packit Service fa4841
	else
Packit Service fa4841
	{
Packit Service fa4841
		if (pInput->cBuffers < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
Packit Service fa4841
Packit Service fa4841
		if (!input_buffer)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		if (input_buffer->cbBuffer < 1)
Packit Service fa4841
			return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
		channel_bindings = sspi_FindSecBuffer(pInput, SECBUFFER_CHANNEL_BINDINGS);
Packit Service fa4841
Packit Service fa4841
		if (channel_bindings)
Packit Service fa4841
		{
Packit Service fa4841
			context->Bindings.BindingsLength = channel_bindings->cbBuffer;
Packit Service b1ea74
			context->Bindings.Bindings = (SEC_CHANNEL_BINDINGS*)channel_bindings->pvBuffer;
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		if (context->state == NTLM_STATE_CHALLENGE)
Packit Service fa4841
		{
Packit Service fa4841
			status = ntlm_read_ChallengeMessage(context, input_buffer);
Packit Service fa4841
Packit Service fa4841
			if (!pOutput)
Packit Service fa4841
				return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
			if (pOutput->cBuffers < 1)
Packit Service fa4841
				return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
			output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
Packit Service fa4841
Packit Service fa4841
			if (!output_buffer)
Packit Service fa4841
				return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
			if (output_buffer->cbBuffer < 1)
Packit Service fa4841
				return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service fa4841
			if (context->state == NTLM_STATE_AUTHENTICATE)
Packit Service fa4841
				return ntlm_write_AuthenticateMessage(context, output_buffer);
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OUT_OF_SEQUENCE;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	return SEC_E_OUT_OF_SEQUENCE;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
/**
Packit Service fa4841
 * @see http://msdn.microsoft.com/en-us/library/windows/desktop/aa375512%28v=vs.85%29.aspx
Packit Service fa4841
 */
Packit Service b1ea74
static SECURITY_STATUS SEC_ENTRY ntlm_InitializeSecurityContextA(
Packit Service b1ea74
    PCredHandle phCredential, PCtxtHandle phContext, SEC_CHAR* pszTargetName, ULONG fContextReq,
Packit Service b1ea74
    ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2,
Packit Service b1ea74
    PCtxtHandle phNewContext, PSecBufferDesc pOutput, PULONG pfContextAttr, PTimeStamp ptsExpiry)
Packit Service fa4841
{
Packit Service fa4841
	SECURITY_STATUS status;
Packit Service fa4841
	SEC_WCHAR* pszTargetNameW = NULL;
Packit Service fa4841
Packit Service fa4841
	if (pszTargetName)
Packit Service fa4841
	{
Packit Service fa4841
		if (ConvertToUnicode(CP_UTF8, 0, pszTargetName, -1, &pszTargetNameW, 0) <= 0)
Packit Service fa4841
			return SEC_E_INTERNAL_ERROR;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	status = ntlm_InitializeSecurityContextW(phCredential, phContext, pszTargetNameW, fContextReq,
Packit Service b1ea74
	                                         Reserved1, TargetDataRep, pInput, Reserved2,
Packit Service b1ea74
	                                         phNewContext, pOutput, pfContextAttr, ptsExpiry);
Packit Service fa4841
	free(pszTargetNameW);
Packit Service fa4841
	return status;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_CompleteAuthToken(PCtxtHandle phContext,
Packit Service b1ea74
                                                        PSecBufferDesc pToken)
Packit Service fa4841
{
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service fa4841
	SECURITY_STATUS status = SEC_E_OK;
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service fa4841
	if (!context)
Packit Service fa4841
		return SEC_E_INVALID_HANDLE;
Packit Service fa4841
Packit Service fa4841
	if (context->server)
Packit Service fa4841
	{
Packit Service fa4841
		status = ntlm_server_AuthenticateComplete(context);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	return status;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa375354 */
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_DeleteSecurityContext(PCtxtHandle phContext)
Packit Service fa4841
{
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service fa4841
	if (!context)
Packit Service fa4841
		return SEC_E_INVALID_HANDLE;
Packit Service fa4841
Packit Service fa4841
	ntlm_ContextFree(context);
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
SECURITY_STATUS ntlm_computeProofValue(NTLM_CONTEXT* ntlm, SecBuffer* ntproof)
Packit Service fa4841
{
Packit Service fa4841
	BYTE* blob;
Packit Service fa4841
	SecBuffer* target = &ntlm->ChallengeTargetInfo;
Packit Service fa4841
Packit Service fa4841
	if (!sspi_SecBufferAlloc(ntproof, 36 + target->cbBuffer))
Packit Service fa4841
		return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service fa4841
	blob = (BYTE*)ntproof->pvBuffer;
Packit Service fa4841
	CopyMemory(blob, ntlm->ServerChallenge, 8); /* Server challenge. */
Packit Service b1ea74
	blob[8] = 1;                                /* Response version. */
Packit Service fa4841
	blob[9] = 1; /* Highest response version understood by the client. */
Packit Service fa4841
	/* Reserved 6B. */
Packit Service b1ea74
	CopyMemory(&blob[16], ntlm->Timestamp, 8);       /* Time. */
Packit Service fa4841
	CopyMemory(&blob[24], ntlm->ClientChallenge, 8); /* Client challenge. */
Packit Service fa4841
	/* Reserved 4B. */
Packit Service fa4841
	/* Server name. */
Packit Service fa4841
	CopyMemory(&blob[36], target->pvBuffer, target->cbBuffer);
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
SECURITY_STATUS ntlm_computeMicValue(NTLM_CONTEXT* ntlm, SecBuffer* micvalue)
Packit Service fa4841
{
Packit Service fa4841
	BYTE* blob;
Packit Service fa4841
	ULONG msgSize = ntlm->NegotiateMessage.cbBuffer + ntlm->ChallengeMessage.cbBuffer +
Packit Service fa4841
	                ntlm->AuthenticateMessage.cbBuffer;
Packit Service fa4841
Packit Service fa4841
	if (!sspi_SecBufferAlloc(micvalue, msgSize))
Packit Service fa4841
		return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service b1ea74
	blob = (BYTE*)micvalue->pvBuffer;
Packit Service fa4841
	CopyMemory(blob, ntlm->NegotiateMessage.pvBuffer, ntlm->NegotiateMessage.cbBuffer);
Packit Service fa4841
	blob += ntlm->NegotiateMessage.cbBuffer;
Packit Service fa4841
	CopyMemory(blob, ntlm->ChallengeMessage.pvBuffer, ntlm->ChallengeMessage.cbBuffer);
Packit Service fa4841
	blob += ntlm->ChallengeMessage.cbBuffer;
Packit Service fa4841
	CopyMemory(blob, ntlm->AuthenticateMessage.pvBuffer, ntlm->AuthenticateMessage.cbBuffer);
Packit Service fa4841
	blob += ntlm->MessageIntegrityCheckOffset;
Packit Service fa4841
	ZeroMemory(blob, 16);
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
/* http://msdn.microsoft.com/en-us/library/windows/desktop/aa379337/ */
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesW(PCtxtHandle phContext,
Packit Service b1ea74
                                                              ULONG ulAttribute, void* pBuffer)
Packit Service fa4841
{
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service fa4841
Packit Service fa4841
	if (!phContext)
Packit Service fa4841
		return SEC_E_INVALID_HANDLE;
Packit Service fa4841
Packit Service fa4841
	if (!pBuffer)
Packit Service fa4841
		return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service fa4841
	if (ulAttribute == SECPKG_ATTR_SIZES)
Packit Service fa4841
	{
Packit Service b1ea74
		SecPkgContext_Sizes* ContextSizes = (SecPkgContext_Sizes*)pBuffer;
Packit Service fa4841
		ContextSizes->cbMaxToken = 2010;
Packit Service b1ea74
		ContextSizes->cbMaxSignature = 16;    /* the size of expected signature is 16 bytes */
Packit Service b1ea74
		ContextSizes->cbBlockSize = 0;        /* no padding */
Packit Service fa4841
		ContextSizes->cbSecurityTrailer = 16; /* no security trailer appended in NTLM
Packit Service b1ea74
		                            contrary to Kerberos */
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_IDENTITY)
Packit Service fa4841
	{
Packit Service fa4841
		int status;
Packit Service fa4841
		char* UserA = NULL;
Packit Service fa4841
		char* DomainA = NULL;
Packit Service fa4841
		SSPI_CREDENTIALS* credentials;
Packit Service b1ea74
		SecPkgContext_AuthIdentity* AuthIdentity = (SecPkgContext_AuthIdentity*)pBuffer;
Packit Service fa4841
		context->UseSamFileDatabase = FALSE;
Packit Service fa4841
		credentials = context->credentials;
Packit Service fa4841
		ZeroMemory(AuthIdentity, sizeof(SecPkgContext_AuthIdentity));
Packit Service fa4841
		UserA = AuthIdentity->User;
Packit Service fa4841
Packit Service fa4841
		if (credentials->identity.UserLength > 0)
Packit Service fa4841
		{
Packit Service b1ea74
			status = ConvertFromUnicode(CP_UTF8, 0, (WCHAR*)credentials->identity.User,
Packit Service b1ea74
			                            credentials->identity.UserLength, &UserA, 256, NULL, NULL);
Packit Service fa4841
Packit Service fa4841
			if (status <= 0)
Packit Service fa4841
				return SEC_E_INTERNAL_ERROR;
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		DomainA = AuthIdentity->Domain;
Packit Service fa4841
Packit Service fa4841
		if (credentials->identity.DomainLength > 0)
Packit Service fa4841
		{
Packit Service b1ea74
			status =
Packit Service b1ea74
			    ConvertFromUnicode(CP_UTF8, 0, (WCHAR*)credentials->identity.Domain,
Packit Service b1ea74
			                       credentials->identity.DomainLength, &DomainA, 256, NULL, NULL);
Packit Service fa4841
Packit Service fa4841
			if (status <= 0)
Packit Service fa4841
				return SEC_E_INTERNAL_ERROR;
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_NTPROOF_VALUE)
Packit Service fa4841
	{
Packit Service fa4841
		return ntlm_computeProofValue(context, (SecBuffer*)pBuffer);
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_RANDKEY)
Packit Service fa4841
	{
Packit Service fa4841
		SecBuffer* randkey;
Packit Service b1ea74
		randkey = (SecBuffer*)pBuffer;
Packit Service fa4841
Packit Service fa4841
		if (!sspi_SecBufferAlloc(randkey, 16))
Packit Service fa4841
			return (SEC_E_INSUFFICIENT_MEMORY);
Packit Service fa4841
Packit Service fa4841
		CopyMemory(randkey->pvBuffer, context->EncryptedRandomSessionKey, 16);
Packit Service fa4841
		return (SEC_E_OK);
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_MIC)
Packit Service fa4841
	{
Packit Service fa4841
		SecBuffer* mic;
Packit Service fa4841
		NTLM_AUTHENTICATE_MESSAGE* message;
Packit Service b1ea74
		mic = (SecBuffer*)pBuffer;
Packit Service fa4841
		message = &context->AUTHENTICATE_MESSAGE;
Packit Service fa4841
Packit Service fa4841
		if (!sspi_SecBufferAlloc(mic, 16))
Packit Service fa4841
			return (SEC_E_INSUFFICIENT_MEMORY);
Packit Service fa4841
Packit Service fa4841
		CopyMemory(mic->pvBuffer, message->MessageIntegrityCheck, 16);
Packit Service fa4841
		return (SEC_E_OK);
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_MIC_VALUE)
Packit Service fa4841
	{
Packit Service b1ea74
		return ntlm_computeMicValue(context, (SecBuffer*)pBuffer);
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	return SEC_E_UNSUPPORTED_FUNCTION;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_QueryContextAttributesA(PCtxtHandle phContext,
Packit Service b1ea74
                                                              ULONG ulAttribute, void* pBuffer)
Packit Service fa4841
{
Packit Service fa4841
	return ntlm_QueryContextAttributesW(phContext, ulAttribute, pBuffer);
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_SetContextAttributesW(PCtxtHandle phContext,
Packit Service b1ea74
                                                            ULONG ulAttribute, void* pBuffer,
Packit Service b1ea74
                                                            ULONG cbBuffer)
Packit Service fa4841
{
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service fa4841
Packit Service fa4841
	if (!phContext)
Packit Service fa4841
		return SEC_E_INVALID_HANDLE;
Packit Service fa4841
Packit Service fa4841
	if (!pBuffer)
Packit Service fa4841
		return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service fa4841
	if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_HASH)
Packit Service fa4841
	{
Packit Service b1ea74
		SecPkgContext_AuthNtlmHash* AuthNtlmHash = (SecPkgContext_AuthNtlmHash*)pBuffer;
Packit Service fa4841
Packit Service fa4841
		if (cbBuffer < sizeof(SecPkgContext_AuthNtlmHash))
Packit Service fa4841
			return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
Packit Service fa4841
		if (AuthNtlmHash->Version == 1)
Packit Service fa4841
			CopyMemory(context->NtlmHash, AuthNtlmHash->NtlmHash, 16);
Packit Service fa4841
		else if (AuthNtlmHash->Version == 2)
Packit Service fa4841
			CopyMemory(context->NtlmV2Hash, AuthNtlmHash->NtlmHash, 16);
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_SAM_FILE)
Packit Service fa4841
	{
Packit Service b1ea74
		const char* filename = (char*)pBuffer;
Packit Service fa4841
		free(context->SamFile);
Packit Service fa4841
		context->SamFile = NULL;
Packit Service fa4841
Packit Service fa4841
		if (filename)
Packit Service fa4841
		{
Packit Service fa4841
			context->SamFile = _strdup(filename);
Packit Service fa4841
Packit Service fa4841
			if (!context->SamFile)
Packit Service fa4841
				return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_MESSAGE)
Packit Service fa4841
	{
Packit Service b1ea74
		SecPkgContext_AuthNtlmMessage* AuthNtlmMessage = (SecPkgContext_AuthNtlmMessage*)pBuffer;
Packit Service fa4841
Packit Service fa4841
		if (cbBuffer < sizeof(SecPkgContext_AuthNtlmMessage))
Packit Service fa4841
			return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
Packit Service fa4841
		if (AuthNtlmMessage->type == 1)
Packit Service fa4841
		{
Packit Service fa4841
			sspi_SecBufferFree(&context->NegotiateMessage);
Packit Service fa4841
Packit Service fa4841
			if (!sspi_SecBufferAlloc(&context->NegotiateMessage, AuthNtlmMessage->length))
Packit Service fa4841
				return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service b1ea74
			CopyMemory(context->NegotiateMessage.pvBuffer, AuthNtlmMessage->buffer,
Packit Service b1ea74
			           AuthNtlmMessage->length);
Packit Service fa4841
		}
Packit Service fa4841
		else if (AuthNtlmMessage->type == 2)
Packit Service fa4841
		{
Packit Service fa4841
			sspi_SecBufferFree(&context->ChallengeMessage);
Packit Service fa4841
Packit Service fa4841
			if (!sspi_SecBufferAlloc(&context->ChallengeMessage, AuthNtlmMessage->length))
Packit Service fa4841
				return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service b1ea74
			CopyMemory(context->ChallengeMessage.pvBuffer, AuthNtlmMessage->buffer,
Packit Service b1ea74
			           AuthNtlmMessage->length);
Packit Service fa4841
		}
Packit Service fa4841
		else if (AuthNtlmMessage->type == 3)
Packit Service fa4841
		{
Packit Service fa4841
			sspi_SecBufferFree(&context->AuthenticateMessage);
Packit Service fa4841
Packit Service fa4841
			if (!sspi_SecBufferAlloc(&context->AuthenticateMessage, AuthNtlmMessage->length))
Packit Service fa4841
				return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service b1ea74
			CopyMemory(context->AuthenticateMessage.pvBuffer, AuthNtlmMessage->buffer,
Packit Service b1ea74
			           AuthNtlmMessage->length);
Packit Service fa4841
		}
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_TIMESTAMP)
Packit Service fa4841
	{
Packit Service b1ea74
		SecPkgContext_AuthNtlmTimestamp* AuthNtlmTimestamp =
Packit Service b1ea74
		    (SecPkgContext_AuthNtlmTimestamp*)pBuffer;
Packit Service fa4841
Packit Service fa4841
		if (cbBuffer < sizeof(SecPkgContext_AuthNtlmTimestamp))
Packit Service fa4841
			return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
Packit Service fa4841
		if (AuthNtlmTimestamp->ChallengeOrResponse)
Packit Service fa4841
			CopyMemory(context->ChallengeTimestamp, AuthNtlmTimestamp->Timestamp, 8);
Packit Service fa4841
		else
Packit Service fa4841
			CopyMemory(context->Timestamp, AuthNtlmTimestamp->Timestamp, 8);
Packit Service fa4841
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_CLIENT_CHALLENGE)
Packit Service fa4841
	{
Packit Service fa4841
		SecPkgContext_AuthNtlmClientChallenge* AuthNtlmClientChallenge =
Packit Service b1ea74
		    (SecPkgContext_AuthNtlmClientChallenge*)pBuffer;
Packit Service fa4841
Packit Service fa4841
		if (cbBuffer < sizeof(SecPkgContext_AuthNtlmClientChallenge))
Packit Service fa4841
			return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
Packit Service fa4841
		CopyMemory(context->ClientChallenge, AuthNtlmClientChallenge->ClientChallenge, 8);
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_SERVER_CHALLENGE)
Packit Service fa4841
	{
Packit Service fa4841
		SecPkgContext_AuthNtlmServerChallenge* AuthNtlmServerChallenge =
Packit Service b1ea74
		    (SecPkgContext_AuthNtlmServerChallenge*)pBuffer;
Packit Service fa4841
Packit Service fa4841
		if (cbBuffer < sizeof(SecPkgContext_AuthNtlmServerChallenge))
Packit Service fa4841
			return SEC_E_INVALID_PARAMETER;
Packit Service fa4841
Packit Service fa4841
		CopyMemory(context->ServerChallenge, AuthNtlmServerChallenge->ServerChallenge, 8);
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_HASH_CB)
Packit Service fa4841
	{
Packit Service fa4841
		context->HashCallback = (psPeerComputeNtlmHash)pBuffer;
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
	else if (ulAttribute == SECPKG_ATTR_AUTH_NTLM_HASH_CB_DATA)
Packit Service fa4841
	{
Packit Service fa4841
		context->HashCallbackArg = pBuffer;
Packit Service fa4841
		return SEC_E_OK;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	return SEC_E_UNSUPPORTED_FUNCTION;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_SetContextAttributesA(PCtxtHandle phContext,
Packit Service b1ea74
                                                            ULONG ulAttribute, void* pBuffer,
Packit Service b1ea74
                                                            ULONG cbBuffer)
Packit Service fa4841
{
Packit Service fa4841
	return ntlm_SetContextAttributesW(phContext, ulAttribute, pBuffer, cbBuffer);
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_RevertSecurityContext(PCtxtHandle phContext)
Packit Service fa4841
{
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_EncryptMessage(PCtxtHandle phContext, ULONG fQOP,
Packit Service b1ea74
                                                     PSecBufferDesc pMessage, ULONG MessageSeqNo)
Packit Service fa4841
{
Packit Service b1ea74
	ULONG index;
Packit Service fa4841
	int length;
Packit Service fa4841
	void* data;
Packit Service fa4841
	UINT32 SeqNo;
Packit Service fa4841
	UINT32 value;
Packit Service fa4841
	BYTE digest[WINPR_MD5_DIGEST_LENGTH];
Packit Service fa4841
	BYTE checksum[8];
Packit Service fa4841
	BYTE* signature;
Packit Service fa4841
	ULONG version = 1;
Packit Service fa4841
	WINPR_HMAC_CTX* hmac;
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service fa4841
	PSecBuffer data_buffer = NULL;
Packit Service fa4841
	PSecBuffer signature_buffer = NULL;
Packit Service fa4841
	SeqNo = MessageSeqNo;
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service b1ea74
	for (index = 0; index < pMessage->cBuffers; index++)
Packit Service fa4841
	{
Packit Service b1ea74
		SecBuffer* cur = &pMessage->pBuffers[index];
Packit Service b1ea74
Packit Service b1ea74
		if (cur->BufferType & SECBUFFER_DATA)
Packit Service b1ea74
			data_buffer = cur;
Packit Service b1ea74
		else if (cur->BufferType & SECBUFFER_TOKEN)
Packit Service b1ea74
			signature_buffer = cur;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	if (!data_buffer)
Packit Service fa4841
		return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
	if (!signature_buffer)
Packit Service fa4841
		return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
	/* Copy original data buffer */
Packit Service fa4841
	length = data_buffer->cbBuffer;
Packit Service fa4841
	data = malloc(length);
Packit Service fa4841
Packit Service fa4841
	if (!data)
Packit Service fa4841
		return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service fa4841
	CopyMemory(data, data_buffer->pvBuffer, length);
Packit Service fa4841
	/* Compute the HMAC-MD5 hash of ConcatenationOf(seq_num,data) using the client signing key */
Packit Service fa4841
	hmac = winpr_HMAC_New();
Packit Service fa4841
Packit Service b1ea74
	if (hmac &&
Packit Service b1ea74
	    winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->SendSigningKey, WINPR_MD5_DIGEST_LENGTH))
Packit Service fa4841
	{
Packit Service fa4841
		Data_Write_UINT32(&value, SeqNo);
Packit Service b1ea74
		winpr_HMAC_Update(hmac, (void*)&value, 4);
Packit Service b1ea74
		winpr_HMAC_Update(hmac, (void*)data, length);
Packit Service fa4841
		winpr_HMAC_Final(hmac, digest, WINPR_MD5_DIGEST_LENGTH);
Packit Service fa4841
		winpr_HMAC_Free(hmac);
Packit Service fa4841
	}
Packit Service fa4841
	else
Packit Service fa4841
	{
Packit Service fa4841
		winpr_HMAC_Free(hmac);
Packit Service fa4841
		free(data);
Packit Service fa4841
		return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	/* Encrypt message using with RC4, result overwrites original buffer */
Packit Service b1ea74
	if ((data_buffer->BufferType & SECBUFFER_READONLY) == 0)
Packit Service b1ea74
	{
Packit Service b1ea74
		if (context->confidentiality)
Packit Service b1ea74
			winpr_RC4_Update(context->SendRc4Seal, length, (BYTE*)data,
Packit Service b1ea74
			                 (BYTE*)data_buffer->pvBuffer);
Packit Service b1ea74
		else
Packit Service b1ea74
			CopyMemory(data_buffer->pvBuffer, data, length);
Packit Service b1ea74
	}
Packit Service fa4841
Packit Service fa4841
#ifdef WITH_DEBUG_NTLM
Packit Service fa4841
	WLog_DBG(TAG, "Data Buffer (length = %d)", length);
Packit Service fa4841
	winpr_HexDump(TAG, WLOG_DEBUG, data, length);
Packit Service b1ea74
	WLog_DBG(TAG, "Encrypted Data Buffer (length = %" PRIu32 ")", data_buffer->cbBuffer);
Packit Service fa4841
	winpr_HexDump(TAG, WLOG_DEBUG, data_buffer->pvBuffer, data_buffer->cbBuffer);
Packit Service fa4841
#endif
Packit Service fa4841
	free(data);
Packit Service fa4841
	/* RC4-encrypt first 8 bytes of digest */
Packit Service fa4841
	winpr_RC4_Update(context->SendRc4Seal, 8, digest, checksum);
Packit Service b1ea74
	if ((signature_buffer->BufferType & SECBUFFER_READONLY) == 0)
Packit Service b1ea74
	{
Packit Service b1ea74
		signature = (BYTE*)signature_buffer->pvBuffer;
Packit Service b1ea74
		/* Concatenate version, ciphertext and sequence number to build signature */
Packit Service b1ea74
		Data_Write_UINT32(signature, version);
Packit Service b1ea74
		CopyMemory(&signature[4], (void*)checksum, 8);
Packit Service b1ea74
		Data_Write_UINT32(&signature[12], SeqNo);
Packit Service b1ea74
	}
Packit Service fa4841
	context->SendSeqNum++;
Packit Service fa4841
#ifdef WITH_DEBUG_NTLM
Packit Service b1ea74
	WLog_DBG(TAG, "Signature (length = %" PRIu32 ")", signature_buffer->cbBuffer);
Packit Service fa4841
	winpr_HexDump(TAG, WLOG_DEBUG, signature_buffer->pvBuffer, signature_buffer->cbBuffer);
Packit Service fa4841
#endif
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_DecryptMessage(PCtxtHandle phContext, PSecBufferDesc pMessage,
Packit Service b1ea74
                                                     ULONG MessageSeqNo, PULONG pfQOP)
Packit Service fa4841
{
Packit Service fa4841
	int index;
Packit Service fa4841
	int length;
Packit Service fa4841
	void* data;
Packit Service fa4841
	UINT32 SeqNo;
Packit Service fa4841
	UINT32 value;
Packit Service fa4841
	BYTE digest[WINPR_MD5_DIGEST_LENGTH];
Packit Service fa4841
	BYTE checksum[8];
Packit Service fa4841
	UINT32 version = 1;
Packit Service fa4841
	WINPR_HMAC_CTX* hmac;
Packit Service fa4841
	NTLM_CONTEXT* context;
Packit Service fa4841
	BYTE expected_signature[WINPR_MD5_DIGEST_LENGTH];
Packit Service fa4841
	PSecBuffer data_buffer = NULL;
Packit Service fa4841
	PSecBuffer signature_buffer = NULL;
Packit Service b1ea74
	SeqNo = (UINT32)MessageSeqNo;
Packit Service b1ea74
	context = (NTLM_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
Packit Service fa4841
Packit Service b1ea74
	for (index = 0; index < (int)pMessage->cBuffers; index++)
Packit Service fa4841
	{
Packit Service fa4841
		if (pMessage->pBuffers[index].BufferType == SECBUFFER_DATA)
Packit Service fa4841
			data_buffer = &pMessage->pBuffers[index];
Packit Service fa4841
		else if (pMessage->pBuffers[index].BufferType == SECBUFFER_TOKEN)
Packit Service fa4841
			signature_buffer = &pMessage->pBuffers[index];
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	if (!data_buffer)
Packit Service fa4841
		return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
	if (!signature_buffer)
Packit Service fa4841
		return SEC_E_INVALID_TOKEN;
Packit Service fa4841
Packit Service fa4841
	/* Copy original data buffer */
Packit Service fa4841
	length = data_buffer->cbBuffer;
Packit Service fa4841
	data = malloc(length);
Packit Service fa4841
Packit Service fa4841
	if (!data)
Packit Service fa4841
		return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
Packit Service fa4841
	CopyMemory(data, data_buffer->pvBuffer, length);
Packit Service fa4841
Packit Service fa4841
	/* Decrypt message using with RC4, result overwrites original buffer */
Packit Service fa4841
Packit Service fa4841
	if (context->confidentiality)
Packit Service b1ea74
		winpr_RC4_Update(context->RecvRc4Seal, length, (BYTE*)data, (BYTE*)data_buffer->pvBuffer);
Packit Service fa4841
	else
Packit Service fa4841
		CopyMemory(data_buffer->pvBuffer, data, length);
Packit Service fa4841
Packit Service fa4841
	/* Compute the HMAC-MD5 hash of ConcatenationOf(seq_num,data) using the client signing key */
Packit Service fa4841
	hmac = winpr_HMAC_New();
Packit Service fa4841
Packit Service b1ea74
	if (hmac &&
Packit Service b1ea74
	    winpr_HMAC_Init(hmac, WINPR_MD_MD5, context->RecvSigningKey, WINPR_MD5_DIGEST_LENGTH))
Packit Service fa4841
	{
Packit Service fa4841
		Data_Write_UINT32(&value, SeqNo);
Packit Service b1ea74
		winpr_HMAC_Update(hmac, (void*)&value, 4);
Packit Service b1ea74
		winpr_HMAC_Update(hmac, (void*)data_buffer->pvBuffer, data_buffer->cbBuffer);
Packit Service fa4841
		winpr_HMAC_Final(hmac, digest, WINPR_MD5_DIGEST_LENGTH);
Packit Service fa4841
		winpr_HMAC_Free(hmac);
Packit Service fa4841
	}
Packit Service fa4841
	else
Packit Service fa4841
	{
Packit Service fa4841
		winpr_HMAC_Free(hmac);
Packit Service fa4841
		free(data);
Packit Service fa4841
		return SEC_E_INSUFFICIENT_MEMORY;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
#ifdef WITH_DEBUG_NTLM
Packit Service fa4841
	WLog_DBG(TAG, "Encrypted Data Buffer (length = %d)", length);
Packit Service fa4841
	winpr_HexDump(TAG, WLOG_DEBUG, data, length);
Packit Service b1ea74
	WLog_DBG(TAG, "Data Buffer (length = %" PRIu32 ")", data_buffer->cbBuffer);
Packit Service fa4841
	winpr_HexDump(TAG, WLOG_DEBUG, data_buffer->pvBuffer, data_buffer->cbBuffer);
Packit Service fa4841
#endif
Packit Service fa4841
	free(data);
Packit Service fa4841
	/* RC4-encrypt first 8 bytes of digest */
Packit Service fa4841
	winpr_RC4_Update(context->RecvRc4Seal, 8, digest, checksum);
Packit Service fa4841
	/* Concatenate version, ciphertext and sequence number to build signature */
Packit Service fa4841
	Data_Write_UINT32(expected_signature, version);
Packit Service b1ea74
	CopyMemory(&expected_signature[4], (void*)checksum, 8);
Packit Service fa4841
	Data_Write_UINT32(&expected_signature[12], SeqNo);
Packit Service fa4841
	context->RecvSeqNum++;
Packit Service fa4841
Packit Service fa4841
	if (memcmp(signature_buffer->pvBuffer, expected_signature, 16) != 0)
Packit Service fa4841
	{
Packit Service fa4841
		/* signature verification failed! */
Packit Service fa4841
		WLog_ERR(TAG, "signature verification failed, something nasty is going on!");
Packit Service b1ea74
#ifdef WITH_DEBUG_NTLM
Packit Service fa4841
		WLog_ERR(TAG, "Expected Signature:");
Packit Service fa4841
		winpr_HexDump(TAG, WLOG_ERROR, expected_signature, 16);
Packit Service fa4841
		WLog_ERR(TAG, "Actual Signature:");
Packit Service b1ea74
		winpr_HexDump(TAG, WLOG_ERROR, (BYTE*)signature_buffer->pvBuffer, 16);
Packit Service b1ea74
#endif
Packit Service fa4841
		return SEC_E_MESSAGE_ALTERED;
Packit Service fa4841
	}
Packit Service fa4841
Packit Service fa4841
	return SEC_E_OK;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_MakeSignature(PCtxtHandle phContext, ULONG fQOP,
Packit Service b1ea74
                                                    PSecBufferDesc pMessage, ULONG MessageSeqNo)
Packit Service fa4841
{
Packit Service fa4841
	return SEC_E_UNSUPPORTED_FUNCTION;
Packit Service fa4841
}
Packit Service fa4841
Packit Service fa4841
static SECURITY_STATUS SEC_ENTRY ntlm_VerifySignature(PCtxtHandle phContext,
Packit Service b1ea74
                                                      PSecBufferDesc pMessage, ULONG MessageSeqNo,
Packit Service b1ea74
                                                      PULONG pfQOP)
Packit Service fa4841
{
Packit Service fa4841
	return SEC_E_UNSUPPORTED_FUNCTION;
Packit Service fa4841
}
Packit Service fa4841
Packit Service b1ea74
const SecurityFunctionTableA NTLM_SecurityFunctionTableA = {
Packit Service b1ea74
	1,                                /* dwVersion */
Packit Service b1ea74
	NULL,                             /* EnumerateSecurityPackages */
Packit Service fa4841
	ntlm_QueryCredentialsAttributesA, /* QueryCredentialsAttributes */
Packit Service b1ea74
	ntlm_AcquireCredentialsHandleA,   /* AcquireCredentialsHandle */
Packit Service b1ea74
	ntlm_FreeCredentialsHandle,       /* FreeCredentialsHandle */
Packit Service b1ea74
	NULL,                             /* Reserved2 */
Packit Service b1ea74
	ntlm_InitializeSecurityContextA,  /* InitializeSecurityContext */
Packit Service b1ea74
	ntlm_AcceptSecurityContext,       /* AcceptSecurityContext */
Packit Service b1ea74
	ntlm_CompleteAuthToken,           /* CompleteAuthToken */
Packit Service b1ea74
	ntlm_DeleteSecurityContext,       /* DeleteSecurityContext */
Packit Service b1ea74
	NULL,                             /* ApplyControlToken */
Packit Service b1ea74
	ntlm_QueryContextAttributesA,     /* QueryContextAttributes */
Packit Service b1ea74
	ntlm_ImpersonateSecurityContext,  /* ImpersonateSecurityContext */
Packit Service b1ea74
	ntlm_RevertSecurityContext,       /* RevertSecurityContext */
Packit Service b1ea74
	ntlm_MakeSignature,               /* MakeSignature */
Packit Service b1ea74
	ntlm_VerifySignature,             /* VerifySignature */
Packit Service b1ea74
	NULL,                             /* FreeContextBuffer */
Packit Service b1ea74
	NULL,                             /* QuerySecurityPackageInfo */
Packit Service b1ea74
	NULL,                             /* Reserved3 */
Packit Service b1ea74
	NULL,                             /* Reserved4 */
Packit Service b1ea74
	NULL,                             /* ExportSecurityContext */
Packit Service b1ea74
	NULL,                             /* ImportSecurityContext */
Packit Service b1ea74
	NULL,                             /* AddCredentials */
Packit Service b1ea74
	NULL,                             /* Reserved8 */
Packit Service b1ea74
	NULL,                             /* QuerySecurityContextToken */
Packit Service b1ea74
	ntlm_EncryptMessage,              /* EncryptMessage */
Packit Service b1ea74
	ntlm_DecryptMessage,              /* DecryptMessage */
Packit Service b1ea74
	ntlm_SetContextAttributesA,       /* SetContextAttributes */
Packit Service fa4841
};
Packit Service fa4841
Packit Service b1ea74
const SecurityFunctionTableW NTLM_SecurityFunctionTableW = {
Packit Service b1ea74
	1,                                /* dwVersion */
Packit Service b1ea74
	NULL,                             /* EnumerateSecurityPackages */
Packit Service fa4841
	ntlm_QueryCredentialsAttributesW, /* QueryCredentialsAttributes */
Packit Service b1ea74
	ntlm_AcquireCredentialsHandleW,   /* AcquireCredentialsHandle */
Packit Service b1ea74
	ntlm_FreeCredentialsHandle,       /* FreeCredentialsHandle */
Packit Service b1ea74
	NULL,                             /* Reserved2 */
Packit Service b1ea74
	ntlm_InitializeSecurityContextW,  /* InitializeSecurityContext */
Packit Service b1ea74
	ntlm_AcceptSecurityContext,       /* AcceptSecurityContext */
Packit Service b1ea74
	ntlm_CompleteAuthToken,           /* CompleteAuthToken */
Packit Service b1ea74
	ntlm_DeleteSecurityContext,       /* DeleteSecurityContext */
Packit Service b1ea74
	NULL,                             /* ApplyControlToken */
Packit Service b1ea74
	ntlm_QueryContextAttributesW,     /* QueryContextAttributes */
Packit Service b1ea74
	ntlm_ImpersonateSecurityContext,  /* ImpersonateSecurityContext */
Packit Service b1ea74
	ntlm_RevertSecurityContext,       /* RevertSecurityContext */
Packit Service b1ea74
	ntlm_MakeSignature,               /* MakeSignature */
Packit Service b1ea74
	ntlm_VerifySignature,             /* VerifySignature */
Packit Service b1ea74
	NULL,                             /* FreeContextBuffer */
Packit Service b1ea74
	NULL,                             /* QuerySecurityPackageInfo */
Packit Service b1ea74
	NULL,                             /* Reserved3 */
Packit Service b1ea74
	NULL,                             /* Reserved4 */
Packit Service b1ea74
	NULL,                             /* ExportSecurityContext */
Packit Service b1ea74
	NULL,                             /* ImportSecurityContext */
Packit Service b1ea74
	NULL,                             /* AddCredentials */
Packit Service b1ea74
	NULL,                             /* Reserved8 */
Packit Service b1ea74
	NULL,                             /* QuerySecurityContextToken */
Packit Service b1ea74
	ntlm_EncryptMessage,              /* EncryptMessage */
Packit Service b1ea74
	ntlm_DecryptMessage,              /* DecryptMessage */
Packit Service b1ea74
	ntlm_SetContextAttributesA,       /* SetContextAttributes */
Packit Service fa4841
};
Packit Service fa4841
Packit Service b1ea74
const SecPkgInfoA NTLM_SecPkgInfoA = {
Packit Service b1ea74
	0x00082B37,             /* fCapabilities */
Packit Service b1ea74
	1,                      /* wVersion */
Packit Service b1ea74
	0x000A,                 /* wRPCID */
Packit Service b1ea74
	0x00000B48,             /* cbMaxToken */
Packit Service b1ea74
	"NTLM",                 /* Name */
Packit Service fa4841
	"NTLM Security Package" /* Comment */
Packit Service fa4841
};
Packit Service fa4841
Packit Service fa4841
static WCHAR NTLM_SecPkgInfoW_Name[] = { 'N', 'T', 'L', 'M', '\0' };
Packit Service fa4841
Packit Service b1ea74
static WCHAR NTLM_SecPkgInfoW_Comment[] = {
Packit Service b1ea74
	'N', 'T', 'L', 'M', ' ', 'S', 'e', 'c', 'u', 'r', 'i',
Packit Service b1ea74
	't', 'y', ' ', 'P', 'a', 'c', 'k', 'a', 'g', 'e', '\0'
Packit Service fa4841
};
Packit Service fa4841
Packit Service b1ea74
const SecPkgInfoW NTLM_SecPkgInfoW = {
Packit Service b1ea74
	0x00082B37,              /* fCapabilities */
Packit Service b1ea74
	1,                       /* wVersion */
Packit Service b1ea74
	0x000A,                  /* wRPCID */
Packit Service b1ea74
	0x00000B48,              /* cbMaxToken */
Packit Service b1ea74
	NTLM_SecPkgInfoW_Name,   /* Name */
Packit Service fa4841
	NTLM_SecPkgInfoW_Comment /* Comment */
Packit Service fa4841
};