Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

316 lines
7.5 KiB

/*++
Copyright (c) 1995 Microsoft Corporation
Module Name:
simssl.h
Abstract:
This module contains class declarations/definitions for
CEncryptCtx (some code stolen from internet server)
Revision History:
--*/
#ifndef _SIMSSL_H_
#define _SIMSSL_H_
class CEncryptCtx
{
private:
//
// is this the client side
//
BOOL m_IsClient;
//
// indicates whether we are starting a new session
//
BOOL m_IsNewSSLSession;
//
// should this session be encypted
//
BOOL m_IsEncrypted;
//
// Handle to user's security context for encryption
//
CtxtHandle m_hSealCtxt;
//
// Pointers to cached credential blocks
//
//
// Array of credential handles - Note this comes form the credential cache
// and should not be deleted. m_phCredInUse is the pointer to the
// credential handle that is in use
//
PVOID m_phCreds;
CredHandle* m_phCredInUse;
DWORD m_iCredInUse;
//
// ecryption header and trailer lengths
//
DWORD m_cbSealHeaderSize;
DWORD m_cbSealTrailerSize;
//
// indicates whether we have context handles opened
//
BOOL m_haveSSLCtxtHandle;
//
// Have we been authenticated ? we will consider an
// SSL session to be authenticated, if we have a non-null
// NT token.
//
BOOL m_IsAuthenticated;
//
// SSL access perms - should we map client certs to NT accounts
//
DWORD m_dwSslAccessPerms;
//
// NT token - non-NULL if client cert was mapped successfully
//
HANDLE m_hSSPToken;
//
// Key size used - 40 bit vs 128 bit etc
//
DWORD m_dwKeySize;
//
// Have we been authenticated, if so did we use the
// anonymous token
//
static BOOL m_IsSecureCapable;
//
// static variables used by all class instances
//
static WCHAR wszServiceName[16];
#if 0
static char szLsaPrefix[16];
#endif
//
// hSecurity - NULL when security.dll/secur32.dll is not loaded
//
static HINSTANCE m_hSecurity;
//
// hLsa - NULL for Win95, set for NT
//
static HINSTANCE m_hLsa;
//
// shared context callback for instance mapper
//
static PVOID m_psmcMapContext;
//
// internal routine to implement public Converse
//
DWORD EncryptConverse(
IN PVOID InBuffer,
IN DWORD InBufferSize,
OUT LPBYTE OutBuffer,
OUT PDWORD OutBufferSize,
OUT PBOOL MoreBlobsExpected,
IN CredHandle* pCredHandle,
OUT PULONG pcbExtra
);
public:
CEncryptCtx( BOOL IsClient = FALSE, DWORD dwSslAccessPerms = 0 );
~CEncryptCtx();
//
// routines used to initialize and terminate use of this class
//
static BOOL WINAPI Initialize( LPSTR pszServiceName,
IMDCOM* pImdcom,
PVOID psmcMapContext = NULL,
PVOID pvAdminBase = NULL /*,
LPSTR pszLsaPrefix */ );
static VOID WINAPI Terminate( VOID );
//
// routine to set the magic bits required by the IIS Admin tool
//
static void WINAPI GetAdminInfoEncryptCaps( PDWORD pdwEncCaps );
//
// returns whether sspi packages and credentials have been installed
//
static BOOL IsSecureCapable( void ) { return m_IsSecureCapable; }
//
// returns whether session is encrypted or not
//
BOOL IsEncrypted( void ) { return m_IsEncrypted; }
//
// returns whether session has successfully authenticated
//
BOOL IsAuthenticated( void ) { return m_IsAuthenticated; }
//
// returns key size used in SSL session
//
DWORD QueryKeySize() { return m_dwKeySize; }
//
// Encryption routines
//
BOOL WINAPI SealMessage(
IN LPBYTE Message,
IN DWORD cbMessage,
OUT LPBYTE pbuffOut,
OUT DWORD *pcbBuffOut
);
BOOL WINAPI UnsealMessage(
IN LPBYTE Message,
IN DWORD cbMessage,
OUT LPBYTE *DecryptedMessage,
OUT PDWORD DecryptedMessageSize,
OUT PDWORD ExpectedMessageSize,
OUT LPBYTE *NextSealMessage = NULL
);
//
// SSL specific routines. This is used for processing SSL negotiation
// packets.
//
DWORD WINAPI Converse(
IN PVOID InBuffer,
IN DWORD InBufferSize,
OUT LPBYTE OutBuffer,
OUT PDWORD OutBufferSize,
OUT PBOOL MoreBlobsExpected,
IN LPSTR LocalIpAddr,
IN LPSTR LocalPort,
IN LPVOID lpvInstance,
IN DWORD dwInstance,
OUT PULONG pcbExtra
);
//
// resets the user name
//
void WINAPI Reset( void );
//
// returns the size of the encryption header for this session
//
DWORD GetSealHeaderSize( void )
{ return m_haveSSLCtxtHandle ? m_cbSealHeaderSize : 0 ; }
//
// returns the size of the encryption trailer for this session
//
DWORD GetSealTrailerSize( void )
{ return m_haveSSLCtxtHandle ? m_cbSealTrailerSize : 0 ; }
//
// return the NT token mapped from the client cert
//
HANDLE QueryCertificateToken() { return m_hSSPToken; }
//
// decrypts read buffer, concatenating all decrypted data at the
// head of the buffer.
//
DWORD WINAPI DecryptInputBuffer(
IN LPBYTE pBuffer,
IN DWORD cbInBuffer,
OUT DWORD* pcbOutBuffer,
OUT DWORD* pcbParsable,
OUT DWORD* pcbExpected
);
//
// verifies the intended host name matches the name contained in the cert
// This function, checks a given hostname against the current certificate
// stored in an active SSPI Context Handle. If the certificate containts
// a common name, and it matches the passed in hostname, this function
// will return TRUE.
//
BOOL CheckCertificateCommonName(
IN LPSTR pszHostName
);
BOOL CheckCertificateSubjectName(
IN LPSTR pszHostName
);
//
// Check if the certificate is issued by a trusted authority
//
BOOL CheckCertificateTrust();
//
// verifies the ccertificate has not expired
// returns TRUE if the cert is valid
//
BOOL CheckCertificateExpired(
void
);
//
// check that a server cert is installed
//
BOOL CheckServerCert(
IN LPSTR LocalIpAddr,
IN LPSTR LocalPort,
IN LPVOID lpvInstance,
IN DWORD dwInstance);
}; // CSslCtx
//
// blkcred.cpp
//
#endif // _SECURITY_H_