Windows NT 4.0 source code leak
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

305 lines
6.9 KiB

//+---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1992 - 1995.
//
// File: cred.c
//
// Contents:
//
// Classes:
//
// Functions:
//
// History: 8-07-95 RichardW Created
//
//----------------------------------------------------------------------------
#include "pctsspi.h"
#include "encode.h"
#define LockCredential(p) EnterCriticalSection(&((PPctCredential) p)->csLock)
#define UnlockCredential(p) LeaveCriticalSection(&((PPctCredential) p)->csLock)
PPctCredential
PctpValidateCredentialHandle(
PCredHandle phCred)
{
PPctCredential pCred = NULL;
BOOL fReturn;
fReturn = FALSE;
if (phCred)
{
try
{
pCred = (PPctCredential) phCred->dwUpper;
if (pCred->Magic == PCT_CRED_MAGIC)
{
fReturn = 1;
}
}
except (EXCEPTION_EXECUTE_HANDLER)
{
pCred = NULL;
}
}
if (fReturn)
{
return(pCred);
}
return(NULL);
}
PPctCredential
PctCreateCredential(
PPCT_CREDENTIAL_CERTIFICATE pCertData)
{
PPctCredential pCred;
PUCHAR pTmp;
long Result;
pCred = LocalAlloc(LMEM_FIXED | LMEM_ZEROINIT, sizeof(PctCredential));
if (pCred)
{
pCred->Magic = PCT_CRED_MAGIC;
InitializeCriticalSection(&pCred->csLock);
pCred->RefCount = 0;
if (pCertData)
{
pTmp = LocalAlloc( LMEM_FIXED, pCertData->cbPrivateKey );
if (!pTmp)
{
LocalFree( pCred );
return( NULL );
}
CopyMemory( pTmp, pCertData->pPrivateKey, pCertData->cbPrivateKey );
Result = DecodePrivateKeyFile( &pCred->pPrivateKey,
pTmp,
pCertData->cbPrivateKey,
pCertData->pszPassword );
if (Result < 0)
{
return( NULL );
}
pCred->pCertificate = LocalAlloc(LMEM_FIXED, pCertData->cbCertificate);
if (pCred->pCertificate)
{
//
// BUGBUG
//
CopyMemory( pCred->pCertificate,
pCertData->pCertificate + 17,
pCertData->cbCertificate - 17);
pCred->cbCertificate = pCertData->cbCertificate - 17;
}
}
}
return(pCred);
}
VOID
PctDeleteCredential(
PPctCredential pCred)
{
DeleteCriticalSection(&pCred->csLock);
if (pCred->pCertificate)
{
LocalFree(pCred->pCertificate);
}
pCred->Magic = 'eerF';
LocalFree(pCred);
}
VOID
PctReferenceCredential(
PPctCredential pCred)
{
LockCredential(pCred);
pCred->RefCount++;
UnlockCredential(pCred);
}
VOID
PctDereferenceCredential(
PPctCredential pCred)
{
LONG Ref;
LockCredential(pCred);
PCT_ASSERT(pCred->Magic == PCT_CRED_MAGIC);
Ref = --pCred->RefCount;
UnlockCredential(pCred);
if (Ref)
{
return;
}
PctDeleteCredential(pCred);
}
SECURITY_STATUS SEC_ENTRY
PctAcquireCredentialsHandleW(
SEC_WCHAR SEC_FAR * pszPrincipal, // Name of principal
SEC_WCHAR SEC_FAR * pszPackageName, // Name of package
unsigned long fCredentialUse, // Flags indicating use
void SEC_FAR * pvLogonId, // Pointer to logon ID
void SEC_FAR * pAuthData, // Package specific data
SEC_GET_KEY_FN pGetKeyFn, // Pointer to GetKey() func
void SEC_FAR * pvGetKeyArgument, // Value to pass to GetKey()
PCredHandle phCredential, // (out) Cred Handle
PTimeStamp ptsExpiry // (out) Lifetime (optional)
)
{
PCHAR pszAnsiPrincipal;
DWORD cchPrincipal;
SECURITY_STATUS scRet;
if (_wcsicmp(pszPackageName, PCTSP_NAME_W))
{
return(SEC_E_SECPKG_NOT_FOUND);
}
if (pszPrincipal)
{
cchPrincipal = wcslen(pszPrincipal) + 1;
pszAnsiPrincipal = LocalAlloc(LMEM_FIXED, cchPrincipal * 2);
if (!pszAnsiPrincipal)
{
return(SEC_E_INSUFFICIENT_MEMORY);
}
WideCharToMultiByte(
CP_ACP, 0,
pszPrincipal, cchPrincipal,
pszAnsiPrincipal, cchPrincipal * 2,
NULL, NULL );
}
else
{
pszAnsiPrincipal = NULL;
}
scRet = PctAcquireCredentialsHandleA(
pszAnsiPrincipal, PCTSP_NAME_A,
fCredentialUse, pvLogonId,
pAuthData, pGetKeyFn,
pvGetKeyArgument, phCredential, ptsExpiry);
if (pszAnsiPrincipal)
{
LocalFree(pszAnsiPrincipal);
}
return(scRet);
}
SECURITY_STATUS SEC_ENTRY
PctAcquireCredentialsHandleA(
SEC_CHAR SEC_FAR * pszPrincipal, // Name of principal
SEC_CHAR SEC_FAR * pszPackageName, // Name of package
unsigned long fCredentialUse, // Flags indicating use
void SEC_FAR * pvLogonId, // Pointer to logon ID
void SEC_FAR * pAuthData, // Package specific data
SEC_GET_KEY_FN pGetKeyFn, // Pointer to GetKey() func
void SEC_FAR * pvGetKeyArgument, // Value to pass to GetKey()
PCredHandle phCredential, // (out) Cred Handle
PTimeStamp ptsExpiry // (out) Lifetime (optional)
)
{
PPctCredential pCred;
if (_stricmp(pszPackageName, PCTSP_NAME_A))
{
return(SEC_E_SECPKG_NOT_FOUND);
}
if (fCredentialUse & SECPKG_CRED_INBOUND)
{
if (!pAuthData)
{
return(SEC_E_NO_CREDENTIALS);
}
if ((!PctCacheLockedAndLoaded()) &&
(!PctInitSessionCache(PCT_DEF_SERVER_CACHE_SIZE)))
{
return(SEC_E_INSUFFICIENT_MEMORY);
}
}
else
{
if ((!PctCacheLockedAndLoaded()) &&
(!PctInitSessionCache(PCT_DEF_CLIENT_CACHE_SIZE)))
{
return(SEC_E_INSUFFICIENT_MEMORY);
}
}
pCred = PctCreateCredential(pAuthData);
if (pCred)
{
PctReferenceCredential(pCred);
phCredential->dwUpper = (DWORD) pCred;
phCredential->dwLower = 0;
pCred->Type = fCredentialUse;
return(SEC_E_OK);
}
return(SEC_E_INSUFFICIENT_MEMORY);
}
SECURITY_STATUS SEC_ENTRY
PctFreeCredentialHandle(
PCredHandle phCredential // Handle to free
)
{
PPctCredential pCred;
pCred = PctpValidateCredentialHandle(phCredential);
if (pCred)
{
PctDereferenceCredential(pCred);
return(SEC_E_OK);
}
return(SEC_E_INVALID_HANDLE);
}