wine/dlls/secur32/secur32_priv.h
2023-11-23 22:51:07 +01:00

244 lines
6 KiB
C

/*
* secur32 private definitions.
*
* Copyright (C) 2004 Juan Lang
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
*/
#ifndef __SECUR32_PRIV_H__
#define __SECUR32_PRIV_H__
#include <sys/types.h>
#include <limits.h>
#include "schannel.h"
#include "ntsecapi.h"
#include "ntsecpkg.h"
#include "wine/list.h"
typedef struct _SecureProvider
{
struct list entry;
BOOL loaded;
PWSTR moduleName;
HMODULE lib;
SecurityFunctionTableA fnTableA;
SecurityFunctionTableW fnTableW;
} SecureProvider;
typedef struct _SecurePackage
{
struct list entry;
SecPkgInfoW infoW;
SecureProvider *provider;
} SecurePackage;
/* Allocates space for and initializes a new provider. If fnTableA or fnTableW
* is non-NULL, assumes the provider is built-in, and if moduleName is non-NULL,
* means must load the LSA/user mode functions tables from external SSP/AP module.
* Otherwise moduleName must not be NULL.
* Returns a pointer to the stored provider entry, for use adding packages.
*/
SecureProvider *SECUR32_addProvider(const SecurityFunctionTableA *fnTableA,
const SecurityFunctionTableW *fnTableW, PCWSTR moduleName);
/* Allocates space for and adds toAdd packages with the given provider.
* provider must not be NULL, and either infoA or infoW may be NULL, but not
* both.
*/
void SECUR32_addPackages(SecureProvider *provider, ULONG toAdd,
const SecPkgInfoA *infoA, const SecPkgInfoW *infoW);
/* Tries to find the package named packageName. If it finds it, implicitly
* loads the package if it isn't already loaded.
*/
SecurePackage *SECUR32_findPackageW(PCWSTR packageName);
/* Tries to find the package named packageName. (Thunks to _findPackageW)
*/
SecurePackage *SECUR32_findPackageA(PCSTR packageName);
/* Initialization functions for built-in providers */
void SECUR32_initSchannelSP(void);
void load_auth_packages(void);
NTSTATUS NTAPI nego_SpLsaModeInitialize(ULONG, PULONG, PSECPKG_FUNCTION_TABLE *, PULONG);
NTSTATUS NTAPI nego_SpUserModeInitialize(ULONG, PULONG, PSECPKG_USER_FUNCTION_TABLE *, PULONG);
SECPKG_FUNCTION_TABLE *lsa_find_package(const char *name, SECPKG_USER_FUNCTION_TABLE **user_api);
/* Cleanup functions for built-in providers */
void SECUR32_deinitSchannelSP(void);
/* schannel internal interface */
typedef UINT64 schan_session;
typedef struct schan_credentials
{
ULONG credential_use;
DWORD enabled_protocols;
UINT64 credentials;
} schan_credentials;
struct session_params
{
schan_session session;
};
struct allocate_certificate_credentials_params
{
schan_credentials *c;
ULONG cert_encoding;
ULONG cert_size;
BYTE *cert_blob;
ULONG key_size;
BYTE *key_blob;
};
struct create_session_params
{
schan_credentials *cred;
schan_session *session;
};
struct free_certificate_credentials_params
{
schan_credentials *c;
};
struct get_application_protocol_params
{
schan_session session;
SecPkgContext_ApplicationProtocol *protocol;
};
struct get_connection_info_params
{
schan_session session;
SecPkgContext_ConnectionInfo *info;
};
struct get_cipher_info_params
{
schan_session session;
SecPkgContext_CipherInfo *info;
};
struct get_session_peer_certificate_params
{
schan_session session;
BYTE *buffer; /* Starts with array of ULONG sizes, followed by contiguous data blob. */
ULONG *bufsize;
ULONG *retcount;
};
struct get_unique_channel_binding_params
{
schan_session session;
void *buffer;
ULONG *bufsize;
};
enum control_token
{
CONTROL_TOKEN_NONE,
CONTROL_TOKEN_SHUTDOWN,
CONTROL_TOKEN_ALERT,
};
struct handshake_params
{
schan_session session;
SecBufferDesc *input;
ULONG input_size;
SecBufferDesc *output;
ULONG *input_offset;
int *output_buffer_idx;
ULONG *output_offset;
enum control_token control_token;
unsigned int alert_type;
unsigned int alert_number;
};
struct recv_params
{
schan_session session;
SecBufferDesc *input;
ULONG input_size;
void *buffer;
ULONG *length;
};
struct send_params
{
schan_session session;
SecBufferDesc *output;
const void *buffer;
ULONG length;
int *output_buffer_idx;
ULONG *output_offset;
};
struct set_application_protocols_params
{
schan_session session;
unsigned char *buffer;
unsigned int buflen;
};
struct set_dtls_mtu_params
{
schan_session session;
unsigned int mtu;
};
struct set_session_target_params
{
schan_session session;
const char *target;
};
struct set_dtls_timeouts_params
{
schan_session session;
unsigned int retrans_timeout;
unsigned int total_timeout;
};
enum schan_funcs
{
unix_process_attach,
unix_process_detach,
unix_allocate_certificate_credentials,
unix_create_session,
unix_dispose_session,
unix_free_certificate_credentials,
unix_get_application_protocol,
unix_get_cipher_info,
unix_get_connection_info,
unix_get_enabled_protocols,
unix_get_key_signature_algorithm,
unix_get_max_message_size,
unix_get_session_cipher_block_size,
unix_get_session_peer_certificate,
unix_get_unique_channel_binding,
unix_handshake,
unix_recv,
unix_send,
unix_set_application_protocols,
unix_set_dtls_mtu,
unix_set_session_target,
unix_set_dtls_timeouts,
};
#endif /* __SECUR32_PRIV_H__ */