source: trunk/src/schannel/lsamode.c@ 21373

Last change on this file since 21373 was 21373, checked in by vladest, 15 years ago

Added SCHANNEL api for security

File size: 5.2 KB
Line 
1/*
2 * LSA-mode functions of the SChannel security provider
3 *
4 * Copyright 2007 Yuval Fledel
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19 */
20
21
22#include <stdarg.h>
23
24#include "ntstatus.h"
25#define WIN32_NO_STATUS
26#include "windef.h"
27#include "winbase.h"
28#include "winnt.h"
29#include "ntdef.h"
30
31#include "sspi.h"
32#include "ntsecapi.h"
33#include "ntsecpkg.h"
34#include "schannel.h"
35
36#include "wine/debug.h"
37
38WINE_DEFAULT_DEBUG_CHANNEL(schannel);
39
40/***********************************************************************
41 * SpGetInfoUnified
42 */
43static NTSTATUS WINAPI SpGetInfoUnified(PSecPkgInfoW PackageInfo)
44{
45 TRACE("(%p)\n", PackageInfo);
46
47 PackageInfo->fCapabilities = SECPKG_FLAG_MUTUAL_AUTH |
48 SECPKG_FLAG_INTEGRITY | SECPKG_FLAG_PRIVACY |
49 SECPKG_FLAG_CONNECTION | SECPKG_FLAG_MULTI_REQUIRED |
50 SECPKG_FLAG_EXTENDED_ERROR | SECPKG_FLAG_IMPERSONATION |
51 SECPKG_FLAG_ACCEPT_WIN32_NAME | SECPKG_FLAG_STREAM;
52 PackageInfo->wVersion = 1;
53 PackageInfo->wRPCID = UNISP_RPC_ID;
54 PackageInfo->cbMaxToken = 0x4000;
55 PackageInfo->Name = (LPWSTR)UNISP_NAME_W;
56 PackageInfo->Comment = (LPWSTR)UNISP_NAME_W;
57
58 return STATUS_SUCCESS;
59}
60
61static SEC_WCHAR schannelCommentW[] = { 'S','c','h','a','n','n','e','l',
62 ' ','S','e','c','u','r','i','t','y',' ','P','a','c','k','a','g','e',0 };
63
64/***********************************************************************
65 * SpGetInfoSChannel
66 */
67static NTSTATUS WINAPI SpGetInfoSChannel(PSecPkgInfoW PackageInfo)
68{
69 TRACE("(%p)\n", PackageInfo);
70
71 PackageInfo->fCapabilities = SECPKG_FLAG_MUTUAL_AUTH |
72 SECPKG_FLAG_INTEGRITY | SECPKG_FLAG_PRIVACY |
73 SECPKG_FLAG_CONNECTION | SECPKG_FLAG_MULTI_REQUIRED |
74 SECPKG_FLAG_EXTENDED_ERROR | SECPKG_FLAG_IMPERSONATION |
75 SECPKG_FLAG_ACCEPT_WIN32_NAME | SECPKG_FLAG_STREAM;
76 PackageInfo->wVersion = 1;
77 PackageInfo->wRPCID = UNISP_RPC_ID;
78 PackageInfo->cbMaxToken = 0x4000;
79 PackageInfo->Name = (LPWSTR)SCHANNEL_NAME_W;
80 PackageInfo->Comment = schannelCommentW;
81
82 return STATUS_SUCCESS;
83}
84
85static SECPKG_FUNCTION_TABLE secPkgFunctionTable[2] =
86{ {
87 NULL, /* InitializePackage */
88 NULL, /* LsaLogonUser */
89 NULL, /* CallPackage */
90 NULL, /* LogonTerminated */
91 NULL, /* CallPackageUntrusted */
92 NULL, /* CallPackagePassthrough */
93 NULL, /* LogonUserEx */
94 NULL, /* LogonUserEx2 */
95 NULL, /* Initialize */
96 NULL, /* Shutdown */
97 SpGetInfoUnified,
98 NULL, /* AcceptCredentials */
99 NULL, /* SpAcquireCredentialsHandle */
100 NULL, /* SpQueryCredentialsAttributes */
101 NULL, /* FreeCredentialsHandle */
102 NULL, /* SaveCredentials */
103 NULL, /* GetCredentials */
104 NULL, /* DeleteCredentials */
105 NULL, /* InitLsaModeContext */
106 NULL, /* AcceptLsaModeContext */
107 NULL, /* DeleteContext */
108 NULL, /* ApplyControlToken */
109 NULL, /* GetUserInfo */
110 NULL, /* GetExtendedInformation */
111 NULL, /* SpQueryContextAttributes */
112 NULL, /* SpAddCredentials */
113 NULL, /* SetExtendedInformation */
114 NULL, /* SetContextAttributes */
115 NULL, /* SetCredentialsAttributes */
116 }, {
117 NULL, /* InitializePackage */
118 NULL, /* LsaLogonUser */
119 NULL, /* CallPackage */
120 NULL, /* LogonTerminated */
121 NULL, /* CallPackageUntrusted */
122 NULL, /* CallPackagePassthrough */
123 NULL, /* LogonUserEx */
124 NULL, /* LogonUserEx2 */
125 NULL, /* Initialize */
126 NULL, /* Shutdown */
127 SpGetInfoSChannel,
128 NULL, /* AcceptCredentials */
129 NULL, /* SpAcquireCredentialsHandle */
130 NULL, /* SpQueryCredentialsAttributes */
131 NULL, /* FreeCredentialsHandle */
132 NULL, /* SaveCredentials */
133 NULL, /* GetCredentials */
134 NULL, /* DeleteCredentials */
135 NULL, /* InitLsaModeContext */
136 NULL, /* AcceptLsaModeContext */
137 NULL, /* DeleteContext */
138 NULL, /* ApplyControlToken */
139 NULL, /* GetUserInfo */
140 NULL, /* GetExtendedInformation */
141 NULL, /* SpQueryContextAttributes */
142 NULL, /* SpAddCredentials */
143 NULL, /* SetExtendedInformation */
144 NULL, /* SetContextAttributes */
145 NULL, /* SetCredentialsAttributes */
146 }
147};
148
149/***********************************************************************
150 * SpLsaModeInitialize (SCHANNEL.@)
151 */
152NTSTATUS WINAPI SpLsaModeInitialize(ULONG LsaVersion, PULONG PackageVersion,
153 PSECPKG_FUNCTION_TABLE *ppTables, PULONG pcTables)
154{
155 TRACE("(%u, %p, %p, %p)\n", LsaVersion, PackageVersion, ppTables, pcTables);
156
157 *PackageVersion = SECPKG_INTERFACE_VERSION_3;
158 *pcTables = 2;
159 *ppTables = secPkgFunctionTable;
160
161 return STATUS_SUCCESS;
162}
Note: See TracBrowser for help on using the repository browser.