author | weijun |
Tue, 29 May 2018 23:03:55 +0800 | |
branch | JDK-8199569-branch |
changeset 56624 | f06f611e3bb4 |
parent 56620 | 577947e5e394 |
child 56632 | 463c63f3497f |
permissions | -rw-r--r-- |
56552 | 1 |
/* |
2 |
* Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved. |
|
3 |
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
|
4 |
* |
|
5 |
* This code is free software; you can redistribute it and/or modify it |
|
6 |
* under the terms of the GNU General Public License version 2 only, as |
|
7 |
* published by the Free Software Foundation. Oracle designates this |
|
8 |
* particular file as subject to the "Classpath" exception as provided |
|
9 |
* by Oracle in the LICENSE file that accompanied this code. |
|
10 |
* |
|
11 |
* This code is distributed in the hope that it will be useful, but WITHOUT |
|
12 |
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
13 |
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
14 |
* version 2 for more details (a copy is included in the LICENSE file that |
|
15 |
* accompanied this code). |
|
16 |
* |
|
17 |
* You should have received a copy of the GNU General Public License version |
|
18 |
* 2 along with this work; if not, write to the Free Software Foundation, |
|
19 |
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
20 |
* |
|
21 |
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
|
22 |
* or visit www.oracle.com if you need additional information or have any |
|
23 |
* questions. |
|
24 |
*/ |
|
25 |
||
26 |
#define UNICODE |
|
27 |
#define _UNICODE |
|
28 |
||
29 |
#include <windows.h> |
|
30 |
#include <stdlib.h> |
|
31 |
#include <stdio.h> |
|
32 |
#include <stdlib.h> |
|
33 |
#include <string.h> |
|
34 |
||
35 |
#define GSS_DLL_FILE |
|
36 |
#include "gssapi.h" |
|
37 |
||
38 |
#define SECURITY_WIN32 |
|
56574 | 39 |
#include "sspi.h" |
56552 | 40 |
|
41 |
#pragma comment(lib, "secur32.lib") |
|
42 |
||
56574 | 43 |
#define DEBUG |
56552 | 44 |
|
45 |
#ifdef DEBUG |
|
46 |
TCHAR _bb[256]; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
47 |
#define SEC_SUCCESS(Status) \ |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
48 |
((Status) >= 0 ? TRUE: \ |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
49 |
(FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM|FORMAT_MESSAGE_IGNORE_INSERTS, \ |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
50 |
0, ss, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), _bb, 256, 0), \ |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
51 |
printf("SECURITY_STATUS: (%lx) %ls\n", ss, _bb), \ |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
52 |
FALSE)) |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
53 |
#define PP(fmt, ...) \ |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
54 |
fprintf(stdout, "SSPI (%ld): ", __LINE__); \ |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
55 |
fprintf(stdout, fmt, ##__VA_ARGS__); \ |
56562 | 56 |
fprintf(stdout, "\n"); \ |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
57 |
fflush(stdout) |
56552 | 58 |
#else |
59 |
#define SEC_SUCCESS(Status) ((Status) >= 0) |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
60 |
#define PP(dmt, ...) |
56552 | 61 |
#endif |
62 |
||
56624 | 63 |
gss_OID_desc KRB5_OID = {9, "\x2a\x86\x48\x86\xf7\x12\x01\x02\x02"}; |
64 |
gss_OID_desc SPNEGO_OID = {6, "\x2b\x06\x01\x05\x05\x02"}; |
|
65 |
gss_OID_desc USER_NAME_OID = {10, "\x2a\x86\x48\x86\xf7\x12\x01\x02\x01\x01"}; |
|
66 |
gss_OID_desc HOST_SERVICE_NAME_OID = {10, "\x2a\x86\x48\x86\xf7\x12\x01\x02\x01\x04"}; |
|
67 |
gss_OID_desc EXPORT_NAME_OID = {6, "\x2b\x06\x01\x05\x06\x04"}; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
68 |
|
56617 | 69 |
// gss_name_t is Name* |
56562 | 70 |
// gss_cred_id_t is Credentials*. One CredHandle for each mech. |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
71 |
// gss_ctx_id_t is Context* |
56552 | 72 |
|
73 |
typedef struct { |
|
74 |
TCHAR PackageName[20]; |
|
56617 | 75 |
SEC_WCHAR* name; |
76 |
} Name; |
|
77 |
||
78 |
typedef struct { |
|
79 |
TCHAR PackageName[20]; |
|
56552 | 80 |
CredHandle* phCred; |
56574 | 81 |
CtxtHandle hCtxt; |
56552 | 82 |
DWORD cbMaxMessage; |
83 |
SecPkgContext_Sizes SecPkgContextSizes; |
|
56562 | 84 |
SecPkgContext_NativeNames nnames; |
85 |
BOOLEAN established; |
|
56552 | 86 |
} Context; |
87 |
||
56562 | 88 |
typedef struct { |
89 |
TCHAR PackageName[20]; |
|
90 |
CredHandle* phCred; |
|
91 |
} OneCred; |
|
92 |
||
93 |
typedef struct { |
|
94 |
int count; |
|
95 |
OneCred* creds; |
|
56617 | 96 |
long time; |
56562 | 97 |
} Credential; |
98 |
||
56552 | 99 |
#ifdef __cplusplus |
100 |
extern "C" { |
|
101 |
#endif /* __cplusplus */ |
|
102 |
||
56555 | 103 |
/* This section holds supporting functions that are not exported */ |
104 |
||
105 |
long |
|
56624 | 106 |
SecondsUntil(TimeStamp *time) |
56555 | 107 |
{ |
108 |
ULARGE_INTEGER *a, *b; |
|
109 |
FILETIME fnow; |
|
110 |
GetSystemTimeAsFileTime(&fnow); |
|
111 |
a = (ULARGE_INTEGER*)time; |
|
112 |
b = (ULARGE_INTEGER*)&fnow; |
|
56562 | 113 |
PP("Difference %ld", (long)((a->QuadPart - b->QuadPart) / 10000000)); |
56617 | 114 |
//return (long)((a->QuadPart - b->QuadPart) / 10000000); |
115 |
// TODO: Above value is not meaningful, pretend it's 1 day. |
|
56620 | 116 |
return 86400L; |
56555 | 117 |
} |
118 |
||
119 |
void |
|
120 |
FillContextAfterEstablished(Context *pc) |
|
121 |
{ |
|
122 |
QueryContextAttributes( |
|
123 |
&pc->hCtxt, SECPKG_ATTR_SIZES, &pc->SecPkgContextSizes); |
|
124 |
} |
|
125 |
||
126 |
Context* |
|
127 |
NewContext(TCHAR* PackageName) |
|
128 |
{ |
|
129 |
SECURITY_STATUS ss; |
|
130 |
PSecPkgInfo pkgInfo; |
|
131 |
||
132 |
Context* out = (Context*)malloc(sizeof(Context)); |
|
133 |
ss = QuerySecurityPackageInfo(PackageName, &pkgInfo); |
|
134 |
if (!SEC_SUCCESS(ss)) { |
|
135 |
return NULL; |
|
136 |
} |
|
137 |
out->phCred = NULL; |
|
138 |
out->cbMaxMessage = pkgInfo->cbMaxToken; |
|
56562 | 139 |
PP(" QuerySecurityPackageInfo %ls goes %ld", PackageName, out->cbMaxMessage); |
56555 | 140 |
wcscpy(out->PackageName, PackageName); |
141 |
FreeContextBuffer(pkgInfo); |
|
142 |
return out; |
|
143 |
} |
|
144 |
||
145 |
int |
|
146 |
flagSspi2Gss(int fin) |
|
147 |
{ |
|
148 |
int fout = 0; |
|
149 |
if (fin & ISC_REQ_MUTUAL_AUTH) fout |= GSS_C_MUTUAL_FLAG; |
|
150 |
if (fin & ISC_REQ_CONFIDENTIALITY) fout |= GSS_C_CONF_FLAG; |
|
151 |
if (fin & ISC_REQ_DELEGATE) fout |= GSS_C_DELEG_FLAG; |
|
152 |
if (fin & ISC_REQ_INTEGRITY) fout |= GSS_C_INTEG_FLAG; |
|
153 |
if (fin & ISC_REQ_REPLAY_DETECT) fout |= GSS_C_REPLAY_FLAG; |
|
154 |
if (fin & ISC_REQ_SEQUENCE_DETECT) fout |= GSS_C_SEQUENCE_FLAG; |
|
155 |
return fout; |
|
156 |
} |
|
157 |
||
158 |
int |
|
159 |
flagGss2Sspi(int fin) |
|
160 |
{ |
|
161 |
int fout = 0; |
|
162 |
if (fin & GSS_C_MUTUAL_FLAG) fout |= ISC_RET_MUTUAL_AUTH; |
|
163 |
if (fin & GSS_C_CONF_FLAG) fout |= ISC_RET_CONFIDENTIALITY; |
|
164 |
if (fin & GSS_C_DELEG_FLAG) fout |= ISC_RET_DELEGATE; |
|
165 |
if (fin & GSS_C_INTEG_FLAG) fout |= ISC_RET_INTEGRITY; |
|
166 |
if (fin & GSS_C_REPLAY_FLAG) fout |= ISC_RET_REPLAY_DETECT; |
|
167 |
if (fin & GSS_C_SEQUENCE_FLAG) fout |= ISC_RET_SEQUENCE_DETECT; |
|
168 |
return fout; |
|
169 |
} |
|
170 |
||
56562 | 171 |
BOOLEAN |
172 |
isKerberosOID(gss_OID mech) { |
|
56624 | 173 |
return mech->length == KRB5_OID.length |
174 |
&& !memcmp(mech->elements, KRB5_OID.elements, KRB5_OID.length); |
|
56562 | 175 |
} |
176 |
||
177 |
BOOLEAN |
|
178 |
isNegotiateOID(gss_OID mech) { |
|
56624 | 179 |
return mech->length == SPNEGO_OID.length |
180 |
&& !memcmp(mech->elements, SPNEGO_OID.elements, SPNEGO_OID.length); |
|
56562 | 181 |
} |
182 |
||
183 |
void |
|
184 |
displayOID(gss_OID mech) |
|
185 |
{ |
|
186 |
if (isKerberosOID(mech)) { |
|
187 |
PP("Kerberos OID"); |
|
188 |
} else if (isNegotiateOID(mech)) { |
|
189 |
PP("SPNEGO OID"); |
|
190 |
} else { |
|
191 |
PP("UNKNOWN %d", mech->length); |
|
192 |
} |
|
193 |
} |
|
194 |
||
195 |
void |
|
196 |
displayOidSet(gss_OID_set mechs) |
|
197 |
{ |
|
198 |
if (mechs == NULL) { |
|
199 |
PP("OID set is NULL"); |
|
200 |
return; |
|
201 |
} |
|
202 |
PP("set.count is %d", (int)mechs->count); |
|
203 |
for (int i = 0; i < mechs->count; i++) { |
|
204 |
displayOID(&mechs->elements[i]); |
|
205 |
} |
|
206 |
} |
|
207 |
||
56555 | 208 |
/* End support section */ |
209 |
||
210 |
/* This section holds exported functions that currently have no implementation */ |
|
211 |
||
212 |
__declspec(dllexport) OM_uint32 |
|
213 |
gss_release_name(OM_uint32 *minor_status, |
|
214 |
gss_name_t *name) |
|
215 |
{ |
|
56574 | 216 |
PP(">>>> Calling gss_release_name %p...", *name); |
56562 | 217 |
if (name != NULL && *name != GSS_C_NO_NAME) { |
56617 | 218 |
Name* name1 = (Name*)*name; |
219 |
if (name1->name != NULL) { |
|
220 |
delete[] name1->name; |
|
56574 | 221 |
} |
56617 | 222 |
delete name1; |
56574 | 223 |
*name = GSS_C_NO_NAME; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
224 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
225 |
return GSS_S_COMPLETE; |
56552 | 226 |
} |
227 |
||
56555 | 228 |
__declspec(dllexport) OM_uint32 |
229 |
gss_import_name(OM_uint32 *minor_status, |
|
230 |
gss_buffer_t input_name_buffer, |
|
231 |
gss_OID input_name_type, |
|
232 |
gss_name_t *output_name) |
|
233 |
{ |
|
56562 | 234 |
PP(">>>> Calling gss_import_name..."); |
56620 | 235 |
Name* name1 = new Name; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
236 |
if (input_name_buffer == NULL || input_name_buffer->value == NULL |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
237 |
|| input_name_buffer->length == 0) { |
56562 | 238 |
return GSS_S_CALL_INACCESSIBLE_READ; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
239 |
} |
56552 | 240 |
int len = (int)input_name_buffer->length; |
56620 | 241 |
LPSTR input = (LPSTR)input_name_buffer->value; |
242 |
BOOLEAN isNegotiate = true; |
|
243 |
if (input_name_type != NULL |
|
56624 | 244 |
&& input_name_type->length == EXPORT_NAME_OID.length |
245 |
&& !memcmp(input_name_type->elements, EXPORT_NAME_OID.elements, |
|
246 |
EXPORT_NAME_OID.length)) { |
|
56620 | 247 |
len -= (int)input[3] + 8; |
248 |
isNegotiate = (int)input[3] == 6; |
|
249 |
input = input + (int)input[3] + 8; |
|
250 |
} |
|
251 |
||
56574 | 252 |
SEC_WCHAR* name = new SEC_WCHAR[len + 1]; |
253 |
if (name == NULL) { |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
254 |
goto err; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
255 |
} |
56620 | 256 |
|
257 |
if (MultiByteToWideChar(CP_ACP, 0, input, len, name, len) == 0) { |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
258 |
goto err; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
259 |
} |
56574 | 260 |
name[len] = 0; |
56620 | 261 |
if (input_name_type != NULL |
56624 | 262 |
&& input_name_type->length == HOST_SERVICE_NAME_OID.length |
263 |
&& !memcmp(input_name_type->elements, HOST_SERVICE_NAME_OID.elements, |
|
264 |
HOST_SERVICE_NAME_OID.length)) { |
|
56552 | 265 |
for (int i = 0; i < len; i++) { |
56574 | 266 |
if (name[i] == '@') { |
267 |
name[i] = '/'; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
268 |
break; |
56552 | 269 |
} |
270 |
} |
|
271 |
} |
|
56617 | 272 |
name1->name = name; |
56620 | 273 |
lstrcpy(name1->PackageName, isNegotiate ? L"Negotiate" : L"Kerberos"); // TODO |
56617 | 274 |
*output_name = (gss_name_t) name1; |
56552 | 275 |
return GSS_S_COMPLETE; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
276 |
err: |
56574 | 277 |
if (name != NULL) { |
278 |
delete[] name; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
279 |
} |
56620 | 280 |
delete name1; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
281 |
return GSS_S_FAILURE; |
56552 | 282 |
} |
283 |
||
56555 | 284 |
__declspec(dllexport) OM_uint32 |
285 |
gss_compare_name(OM_uint32 *minor_status, |
|
286 |
gss_name_t name1, |
|
287 |
gss_name_t name2, |
|
288 |
int *name_equal) |
|
289 |
{ |
|
56562 | 290 |
PP(">>>> Calling gss_compare_name..."); |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
291 |
if (name1 == NULL || name2 == NULL) { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
292 |
*name_equal = 0; |
56562 | 293 |
return GSS_S_CALL_INACCESSIBLE_READ; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
294 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
295 |
|
56617 | 296 |
SEC_WCHAR* names1 = ((Name*)name1)->name; |
297 |
SEC_WCHAR* names2 = ((Name*)name2)->name; |
|
56574 | 298 |
if (lstrcmp(names1, names2)) { |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
299 |
*name_equal = 0; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
300 |
} else { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
301 |
*name_equal = 1; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
302 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
303 |
return GSS_S_COMPLETE; |
56552 | 304 |
} |
305 |
||
56555 | 306 |
__declspec(dllexport) OM_uint32 |
307 |
gss_canonicalize_name(OM_uint32 *minor_status, |
|
308 |
gss_name_t input_name, |
|
309 |
gss_OID mech_type, |
|
310 |
gss_name_t *output_name) |
|
311 |
{ |
|
56562 | 312 |
PP(">>>> Calling gss_canonicalize_name..."); |
56617 | 313 |
Name* names1 = (Name*)input_name; |
314 |
Name* names2 = new Name; |
|
56574 | 315 |
PP("new name at %p", names2); |
56617 | 316 |
names2->name = new SEC_WCHAR[lstrlen(names1->name) + 1]; |
317 |
wcscpy(names2->PackageName, isNegotiateOID(mech_type) |
|
318 |
? L"Negotiate" : L"Kerberos"); |
|
319 |
lstrcpy(names2->name, names1->name); |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
320 |
*output_name = (gss_name_t)names2; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
321 |
return GSS_S_COMPLETE; |
56552 | 322 |
} |
323 |
||
56555 | 324 |
__declspec(dllexport) OM_uint32 |
325 |
gss_export_name(OM_uint32 *minor_status, |
|
326 |
gss_name_t input_name, |
|
327 |
gss_buffer_t exported_name) |
|
328 |
{ |
|
56562 | 329 |
PP(">>>> Calling gss_export_name..."); |
56617 | 330 |
Name* name1 = (Name*)input_name; |
331 |
SEC_WCHAR* names = name1->name; |
|
332 |
TCHAR mech = name1->PackageName[0]; |
|
333 |
PP("name is %ls %ls", name1->PackageName, name1->name); |
|
56574 | 334 |
int len = (int)wcslen(names); |
56617 | 335 |
if (len < 256) { |
336 |
// 04 01 00 ** 06 ** OID len:int32 name |
|
56624 | 337 |
int mechLen = mech == 'K' ? KRB5_OID.length : SPNEGO_OID.length; |
56617 | 338 |
char* buffer = new char[10 + mechLen + len]; |
339 |
buffer[0] = 4; |
|
340 |
buffer[1] = 1; |
|
341 |
buffer[2] = 0; |
|
342 |
buffer[3] = 2 + mechLen; |
|
343 |
buffer[4] = 6; |
|
344 |
buffer[5] = mechLen; |
|
56624 | 345 |
memcpy(buffer + 6, mech == 'K' ? KRB5_OID.elements : SPNEGO_OID.elements, 9); |
56617 | 346 |
buffer[6 + mechLen] = buffer[7 + mechLen] = buffer[8 + mechLen] = 0; |
347 |
buffer[9 + mechLen] = (char)len; |
|
348 |
WideCharToMultiByte(CP_ACP, 0, names, len, buffer+10+mechLen, len, NULL, NULL); |
|
349 |
exported_name->length = 10 + mechLen + len; |
|
350 |
exported_name->value = buffer; |
|
351 |
return GSS_S_COMPLETE; |
|
352 |
} else { |
|
353 |
return GSS_S_FAILURE; |
|
354 |
} |
|
56552 | 355 |
} |
356 |
||
56555 | 357 |
__declspec(dllexport) OM_uint32 |
358 |
gss_display_name(OM_uint32 *minor_status, |
|
359 |
gss_name_t input_name, |
|
360 |
gss_buffer_t output_name_buffer, |
|
361 |
gss_OID *output_name_type) |
|
362 |
{ |
|
56562 | 363 |
PP(">>>> Calling gss_display_name..."); |
56617 | 364 |
SEC_WCHAR* names = ((Name*)input_name)->name; |
56574 | 365 |
int len = (int)wcslen(names); |
56552 | 366 |
char* buffer = new char[len+1]; |
56574 | 367 |
WideCharToMultiByte(CP_ACP, 0, names, len, buffer, len, NULL, NULL); |
56552 | 368 |
buffer[len] = 0; |
56620 | 369 |
output_name_buffer->length = len; |
56552 | 370 |
output_name_buffer->value = buffer; |
56574 | 371 |
PP("Name found: %ls", names); |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
372 |
PP("%d [%s]", len, buffer); |
56552 | 373 |
if (output_name_type != NULL) { |
56624 | 374 |
*output_name_type = &USER_NAME_OID; |
56552 | 375 |
} |
376 |
return GSS_S_COMPLETE; |
|
377 |
} |
|
378 |
||
56555 | 379 |
__declspec(dllexport) OM_uint32 |
380 |
gss_acquire_cred(OM_uint32 *minor_status, |
|
381 |
gss_name_t desired_name, |
|
382 |
OM_uint32 time_req, |
|
383 |
gss_OID_set desired_mech, |
|
384 |
gss_cred_usage_t cred_usage, |
|
385 |
gss_cred_id_t *output_cred_handle, |
|
386 |
gss_OID_set *actual_mechs, |
|
387 |
OM_uint32 *time_rec) |
|
388 |
{ |
|
56562 | 389 |
PP(">>>> Calling gss_acquire_cred..."); |
56552 | 390 |
SECURITY_STATUS ss; |
391 |
TimeStamp ts; |
|
56617 | 392 |
ts.QuadPart = 0; |
56552 | 393 |
cred_usage = 0; |
56562 | 394 |
PP("AcquireCredentialsHandle with %d %p", cred_usage, desired_mech); |
395 |
displayOidSet(desired_mech); |
|
396 |
Credential* cred = new Credential(); |
|
397 |
cred->count = (int)desired_mech->count; |
|
398 |
cred->creds = new OneCred[cred->count]; |
|
399 |
for (int i = 0; i < cred->count; i++) { |
|
400 |
TCHAR* name = isKerberosOID(&desired_mech->elements[i]) |
|
401 |
? L"Kerberos" : L"Negotiate"; |
|
402 |
wcscpy(cred->creds[i].PackageName, name); |
|
403 |
cred->creds[i].phCred = new CredHandle(); |
|
404 |
ss = AcquireCredentialsHandle( |
|
405 |
NULL, |
|
406 |
name, |
|
407 |
cred_usage == 0 ? SECPKG_CRED_BOTH : |
|
408 |
(cred_usage == 1 ? SECPKG_CRED_OUTBOUND : SECPKG_CRED_INBOUND), |
|
409 |
NULL, |
|
410 |
NULL, |
|
411 |
NULL, |
|
412 |
NULL, |
|
413 |
cred->creds[i].phCred, |
|
414 |
&ts); |
|
415 |
} |
|
416 |
actual_mechs = &desired_mech; // dup? |
|
56552 | 417 |
*output_cred_handle = (void*)cred; |
56624 | 418 |
cred->time = SecondsUntil(&ts); |
56552 | 419 |
if (time_rec != NULL) { |
56617 | 420 |
*time_rec = cred->time; |
56552 | 421 |
} |
422 |
||
56562 | 423 |
if (desired_name != NULL) { |
424 |
gss_name_t realname; |
|
425 |
gss_inquire_cred(minor_status, *output_cred_handle, &realname, |
|
426 |
NULL, NULL, NULL); |
|
56617 | 427 |
SEC_WCHAR* dnames = ((Name*)desired_name)->name; |
428 |
SEC_WCHAR* rnames = ((Name*)realname)->name; |
|
56574 | 429 |
PP("comp name %ls %ls", dnames, rnames); |
430 |
int cmp = lstrcmp(dnames, rnames); |
|
56562 | 431 |
gss_release_name(minor_status, &realname); |
432 |
return cmp ? GSS_S_FAILURE : GSS_S_COMPLETE; // Only support default cred |
|
433 |
} |
|
434 |
||
56552 | 435 |
return GSS_S_COMPLETE; |
436 |
} |
|
437 |
||
56555 | 438 |
__declspec(dllexport) OM_uint32 |
439 |
gss_release_cred(OM_uint32 *minor_status, |
|
440 |
gss_cred_id_t *cred_handle) |
|
441 |
{ |
|
56562 | 442 |
PP(">>>> Calling gss_release_cred..."); |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
443 |
if (cred_handle && *cred_handle) { |
56562 | 444 |
Credential* cred = (Credential*)*cred_handle; |
445 |
for (int i = 0; i < cred->count; i++) { |
|
446 |
FreeCredentialsHandle(cred->creds[i].phCred); |
|
447 |
delete cred->creds[i].phCred; |
|
448 |
} |
|
449 |
delete cred; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
450 |
*cred_handle = GSS_C_NO_CREDENTIAL; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
451 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
452 |
return GSS_S_COMPLETE; |
56552 | 453 |
} |
454 |
||
56555 | 455 |
__declspec(dllexport) OM_uint32 |
456 |
gss_inquire_cred(OM_uint32 *minor_status, |
|
457 |
gss_cred_id_t cred_handle, |
|
458 |
gss_name_t *name, |
|
459 |
OM_uint32 *lifetime, |
|
460 |
gss_cred_usage_t *cred_usage, |
|
461 |
gss_OID_set *mechanisms) |
|
462 |
{ |
|
56562 | 463 |
PP(">>>> Calling gss_inquire_cred..."); |
464 |
CredHandle* cred = ((Credential*)cred_handle)->creds[0].phCred; |
|
56552 | 465 |
SECURITY_STATUS ss; |
466 |
if (name) { |
|
56574 | 467 |
SecPkgCredentials_Names snames; |
468 |
ss = QueryCredentialsAttributes(cred, SECPKG_CRED_ATTR_NAMES, &snames); |
|
469 |
SEC_WCHAR* names = new SEC_WCHAR[lstrlen(snames.sUserName) + 1]; |
|
470 |
lstrcpy(names, snames.sUserName); |
|
471 |
FreeContextBuffer(&snames); |
|
472 |
PP("new name at %p", names); |
|
56617 | 473 |
Name* name1 = new Name; |
474 |
name1->name = names; |
|
475 |
lstrcpy(name1->PackageName, ((Credential*)cred_handle)->creds[0].PackageName); |
|
476 |
*name = (gss_name_t) name1; |
|
477 |
} |
|
478 |
if (lifetime) { |
|
479 |
*lifetime = ((Credential*)cred_handle)->time; |
|
56552 | 480 |
} |
481 |
// Others inquiries not supported yet |
|
482 |
return GSS_S_COMPLETE; |
|
483 |
} |
|
484 |
||
56555 | 485 |
__declspec(dllexport) OM_uint32 |
486 |
gss_import_sec_context(OM_uint32 *minor_status, |
|
487 |
gss_buffer_t interprocess_token, |
|
488 |
gss_ctx_id_t *context_handle) |
|
489 |
{ |
|
56562 | 490 |
PP(">>>> Calling UNIMPLEMENTED gss_import_sec_context..."); |
56552 | 491 |
return GSS_S_FAILURE; |
492 |
} |
|
493 |
||
56555 | 494 |
__declspec(dllexport) OM_uint32 |
495 |
gss_init_sec_context(OM_uint32 *minor_status, |
|
496 |
gss_cred_id_t initiator_cred_handle, |
|
497 |
gss_ctx_id_t *context_handle, |
|
498 |
gss_name_t target_name, |
|
499 |
gss_OID mech_type, |
|
500 |
OM_uint32 req_flags, |
|
501 |
OM_uint32 time_req, |
|
502 |
gss_channel_bindings_t input_chan_bindings, |
|
503 |
gss_buffer_t input_token, |
|
504 |
gss_OID *actual_mech_type, |
|
505 |
gss_buffer_t output_token, |
|
506 |
OM_uint32 *ret_flags, |
|
507 |
OM_uint32 *time_rec) |
|
508 |
{ |
|
56562 | 509 |
PP(">>>> Calling gss_init_sec_context..."); |
56552 | 510 |
SECURITY_STATUS ss; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
511 |
TimeStamp Lifetime; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
512 |
SecBufferDesc InBuffDesc; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
513 |
SecBuffer InSecBuff; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
514 |
SecBufferDesc OutBuffDesc; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
515 |
SecBuffer OutSecBuff; |
56552 | 516 |
|
517 |
Context* pc; |
|
518 |
if (input_token->length == 0) { |
|
56562 | 519 |
TCHAR* name = isKerberosOID(mech_type) ? L"Kerberos" : L"Negotiate"; |
520 |
pc = NewContext(name); |
|
521 |
Credential* cred = (Credential*)initiator_cred_handle; |
|
522 |
if (cred != NULL) { |
|
523 |
for (int i = 0; i < cred->count; i++) { |
|
524 |
if (!lstrcmp(cred->creds[i].PackageName, name)) { |
|
525 |
pc->phCred = cred->creds[i].phCred; |
|
526 |
} |
|
527 |
} |
|
528 |
} |
|
56552 | 529 |
*context_handle = (gss_ctx_id_t) pc; |
530 |
} else { |
|
531 |
pc = (Context*)*context_handle; |
|
532 |
} |
|
533 |
||
534 |
output_token->length = pc->cbMaxMessage; |
|
535 |
output_token->value = new char[pc->cbMaxMessage]; |
|
536 |
||
56620 | 537 |
DWORD outFlag; |
56552 | 538 |
TCHAR outName[100]; |
539 |
||
540 |
OM_uint32 minor; |
|
541 |
gss_buffer_desc tn; |
|
542 |
gss_display_name(&minor, target_name, &tn, NULL); |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
543 |
MultiByteToWideChar(CP_ACP, 0, (LPCCH)tn.value, (int)tn.length, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
544 |
outName, (int)tn.length); |
56552 | 545 |
outName[tn.length] = 0; |
546 |
||
547 |
BOOL pfDone; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
548 |
int flag = flagGss2Sspi(req_flags); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
549 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
550 |
OutBuffDesc.ulVersion = SECBUFFER_VERSION; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
551 |
OutBuffDesc.cBuffers = 1; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
552 |
OutBuffDesc.pBuffers = &OutSecBuff; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
553 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
554 |
OutSecBuff.cbBuffer = (ULONG)output_token->length; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
555 |
OutSecBuff.BufferType = SECBUFFER_TOKEN; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
556 |
OutSecBuff.pvBuffer = output_token->value; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
557 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
558 |
if (input_token->value) { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
559 |
InBuffDesc.ulVersion = SECBUFFER_VERSION; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
560 |
InBuffDesc.cBuffers = 1; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
561 |
InBuffDesc.pBuffers = &InSecBuff; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
562 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
563 |
InSecBuff.BufferType = SECBUFFER_TOKEN; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
564 |
InSecBuff.cbBuffer = (ULONG)input_token->length; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
565 |
InSecBuff.pvBuffer = input_token->value; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
566 |
} else { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
567 |
if (!pc->phCred) { |
56562 | 568 |
PP("No credentials %p provided, acquire %ls automatically", |
569 |
pc->phCred, pc->PackageName); |
|
570 |
CredHandle* newCred = new CredHandle(); |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
571 |
ss = AcquireCredentialsHandle( |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
572 |
NULL, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
573 |
pc->PackageName, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
574 |
SECPKG_CRED_OUTBOUND, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
575 |
NULL, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
576 |
NULL, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
577 |
NULL, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
578 |
NULL, |
56562 | 579 |
newCred, |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
580 |
&Lifetime); |
56562 | 581 |
pc->phCred = newCred; |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
582 |
PP("end"); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
583 |
if (!(SEC_SUCCESS(ss))) { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
584 |
PP("Failed"); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
585 |
return GSS_S_FAILURE; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
586 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
587 |
} else { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
588 |
PP("Credentials OK"); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
589 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
590 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
591 |
ss = InitializeSecurityContext( |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
592 |
pc->phCred, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
593 |
input_token->value ? &pc->hCtxt : NULL, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
594 |
outName, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
595 |
flag, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
596 |
0, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
597 |
SECURITY_NATIVE_DREP, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
598 |
input_token->value ? &InBuffDesc : NULL, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
599 |
0, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
600 |
&pc->hCtxt, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
601 |
&OutBuffDesc, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
602 |
&outFlag, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
603 |
&Lifetime); |
56552 | 604 |
|
605 |
if (!SEC_SUCCESS(ss)) { |
|
606 |
return GSS_S_FAILURE; |
|
607 |
} |
|
608 |
||
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
609 |
if ((SEC_I_COMPLETE_NEEDED == ss) |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
610 |
|| (SEC_I_COMPLETE_AND_CONTINUE == ss)) { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
611 |
ss = CompleteAuthToken(&pc->hCtxt, &OutBuffDesc); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
612 |
if (!SEC_SUCCESS(ss)) { |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
613 |
return GSS_S_FAILURE; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
614 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
615 |
} |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
616 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
617 |
output_token->length = OutSecBuff.cbBuffer; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
618 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
619 |
pfDone = !((SEC_I_CONTINUE_NEEDED == ss) || |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
620 |
(SEC_I_COMPLETE_AND_CONTINUE == ss)); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
621 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
622 |
if (ss == SEC_E_OK) FillContextAfterEstablished(pc); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
623 |
|
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
624 |
outFlag = flagSspi2Gss(outFlag); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
625 |
|
56552 | 626 |
*ret_flags = (OM_uint32)outFlag; |
627 |
if (ss == SEC_I_CONTINUE_NEEDED) { |
|
628 |
return GSS_S_CONTINUE_NEEDED; |
|
629 |
} else { |
|
56562 | 630 |
pc->established = true; |
631 |
QueryContextAttributes(&pc->hCtxt, SECPKG_ATTR_NATIVE_NAMES, &pc->nnames); |
|
56552 | 632 |
*ret_flags |= GSS_C_PROT_READY_FLAG; |
633 |
return GSS_S_COMPLETE; |
|
634 |
} |
|
635 |
} |
|
636 |
||
56555 | 637 |
__declspec(dllexport) OM_uint32 |
638 |
gss_accept_sec_context(OM_uint32 *minor_status, |
|
639 |
gss_ctx_id_t *context_handle, |
|
640 |
gss_cred_id_t acceptor_cred_handle, |
|
641 |
gss_buffer_t input_token, |
|
642 |
gss_channel_bindings_t input_chan_bindings, |
|
643 |
gss_name_t *src_name, |
|
644 |
gss_OID *mech_type, |
|
645 |
gss_buffer_t output_token, |
|
646 |
OM_uint32 *ret_flags, |
|
647 |
OM_uint32 *time_rec, |
|
648 |
gss_cred_id_t *delegated_cred_handle) |
|
649 |
{ |
|
56562 | 650 |
PP(">>>> Calling UNIMPLEMENTED gss_accept_sec_context..."); |
56552 | 651 |
return GSS_S_FAILURE; |
652 |
} |
|
653 |
||
56555 | 654 |
__declspec(dllexport) OM_uint32 |
655 |
gss_inquire_context(OM_uint32 *minor_status, |
|
656 |
gss_ctx_id_t context_handle, |
|
657 |
gss_name_t *src_name, |
|
658 |
gss_name_t *targ_name, |
|
659 |
OM_uint32 *lifetime_rec, |
|
660 |
gss_OID *mech_type, |
|
661 |
OM_uint32 *ctx_flags, |
|
662 |
int *locally_initiated, |
|
663 |
int *open) |
|
664 |
{ |
|
56562 | 665 |
PP(">>>> Calling UNIMPLEMENTED gss_inquire_context..."); |
56552 | 666 |
Context* pc = (Context*) context_handle; |
56562 | 667 |
if (!pc->established) { |
668 |
return GSS_S_NO_CONTEXT; |
|
669 |
} |
|
670 |
if (src_name != NULL) { |
|
56617 | 671 |
Name* n1 = new Name; |
672 |
n1->name = new SEC_WCHAR[lstrlen(pc->nnames.sClientName) + 1]; |
|
673 |
PP("new name at %p", n1->name); |
|
674 |
lstrcpy(n1->name, pc->nnames.sClientName); |
|
675 |
lstrcpy(n1->PackageName, pc->PackageName); |
|
676 |
*src_name = (gss_name_t) n1; |
|
56562 | 677 |
} |
678 |
if (targ_name != NULL) { |
|
56617 | 679 |
Name* n1 = new Name; |
680 |
n1->name = new SEC_WCHAR[lstrlen(pc->nnames.sServerName) + 1]; |
|
681 |
PP("new name at %p", n1->name); |
|
682 |
lstrcpy(n1->name, pc->nnames.sServerName); |
|
683 |
lstrcpy(n1->PackageName, pc->PackageName); |
|
684 |
*targ_name = (gss_name_t) n1; |
|
56562 | 685 |
} |
56624 | 686 |
if (lifetime_rec != NULL) { |
687 |
SecPkgContext_Lifespan ls; |
|
688 |
QueryContextAttributes(&pc->hCtxt, SECPKG_ATTR_LIFESPAN, &ls); |
|
689 |
*lifetime_rec = SecondsUntil(&ls.tsExpiry); |
|
690 |
} |
|
691 |
if (mech_type != NULL) { |
|
692 |
// |
|
693 |
} |
|
56562 | 694 |
// TODO: other inquiries |
695 |
return GSS_S_COMPLETE; |
|
56552 | 696 |
} |
697 |
||
56555 | 698 |
__declspec(dllexport) OM_uint32 |
699 |
gss_delete_sec_context(OM_uint32 *minor_status, |
|
700 |
gss_ctx_id_t *context_handle, |
|
701 |
gss_buffer_t output_token) |
|
702 |
{ |
|
56574 | 703 |
PP(">>>> Calling gss_delete_sec_context..."); |
704 |
Context* pc = (Context*) *context_handle; |
|
705 |
DeleteSecurityContext(&pc->hCtxt); |
|
706 |
if (pc->phCred != NULL) { |
|
707 |
FreeCredentialsHandle(pc->phCred); |
|
708 |
pc->phCred = NULL; |
|
709 |
} |
|
710 |
FreeContextBuffer(&pc->nnames); |
|
711 |
return GSS_S_COMPLETE; |
|
56552 | 712 |
} |
713 |
||
56555 | 714 |
__declspec(dllexport) OM_uint32 |
715 |
gss_context_time(OM_uint32 *minor_status, |
|
716 |
gss_ctx_id_t context_handle, |
|
717 |
OM_uint32 *time_rec) |
|
718 |
{ |
|
56624 | 719 |
PP(">>>> Calling IMPLEMENTED gss_context_time..."); |
56552 | 720 |
Context* pc = (Context*) context_handle; |
56624 | 721 |
SecPkgContext_Lifespan ls; |
722 |
QueryContextAttributes(&pc->hCtxt, SECPKG_ATTR_LIFESPAN, &ls); |
|
723 |
*time_rec = SecondsUntil(&ls.tsExpiry); |
|
724 |
return GSS_S_COMPLETE; |
|
56552 | 725 |
} |
726 |
||
56555 | 727 |
__declspec(dllexport) OM_uint32 |
728 |
gss_wrap_size_limit(OM_uint32 *minor_status, |
|
729 |
gss_ctx_id_t context_handle, |
|
730 |
int conf_req_flag, |
|
731 |
gss_qop_t qop_req, |
|
732 |
OM_uint32 req_output_size, |
|
733 |
OM_uint32 *max_input_size) |
|
734 |
{ |
|
56562 | 735 |
PP(">>>> Calling gss_wrap_size_limit..."); |
56552 | 736 |
Context* pc = (Context*) context_handle; |
737 |
*max_input_size = pc->cbMaxMessage; |
|
738 |
return GSS_S_COMPLETE; |
|
739 |
} |
|
740 |
||
56555 | 741 |
__declspec(dllexport) OM_uint32 |
742 |
gss_export_sec_context(OM_uint32 *minor_status, |
|
743 |
gss_ctx_id_t *context_handle, |
|
744 |
gss_buffer_t interprocess_token) |
|
745 |
{ |
|
56562 | 746 |
PP(">>>> Calling UNIMPLEMENTED gss_export_sec_context..."); |
56552 | 747 |
return GSS_S_FAILURE; |
748 |
} |
|
749 |
||
56555 | 750 |
__declspec(dllexport) OM_uint32 |
751 |
gss_get_mic(OM_uint32 *minor_status, |
|
752 |
gss_ctx_id_t context_handle, |
|
753 |
gss_qop_t qop_req, |
|
754 |
gss_buffer_t message_buffer, |
|
755 |
gss_buffer_t msg_token) |
|
756 |
{ |
|
56562 | 757 |
PP(">>>> Calling gss_get_mic..."); |
56552 | 758 |
Context* pc = (Context*) context_handle; |
759 |
||
760 |
SECURITY_STATUS ss; |
|
761 |
SecBufferDesc BuffDesc; |
|
762 |
SecBuffer SecBuff[2]; |
|
763 |
||
764 |
BuffDesc.cBuffers = 2; |
|
765 |
BuffDesc.pBuffers = SecBuff; |
|
766 |
BuffDesc.ulVersion = SECBUFFER_VERSION; |
|
767 |
||
768 |
SecBuff[0].BufferType = SECBUFFER_DATA; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
769 |
SecBuff[0].cbBuffer = (ULONG)message_buffer->length; |
56552 | 770 |
SecBuff[0].pvBuffer = message_buffer->value; |
771 |
||
772 |
SecBuff[1].BufferType = SECBUFFER_TOKEN; |
|
773 |
SecBuff[1].cbBuffer = pc->SecPkgContextSizes.cbMaxSignature; |
|
774 |
SecBuff[1].pvBuffer = msg_token->value = malloc(SecBuff[1].cbBuffer); |
|
775 |
||
776 |
ss = MakeSignature(&pc->hCtxt, 0, &BuffDesc, 0); |
|
777 |
||
778 |
if (!SEC_SUCCESS(ss)) { |
|
779 |
free(SecBuff[1].pvBuffer); |
|
780 |
return GSS_S_FAILURE; |
|
781 |
} |
|
782 |
||
783 |
msg_token->length = SecBuff[1].cbBuffer; |
|
784 |
return GSS_S_COMPLETE; |
|
785 |
} |
|
786 |
||
56555 | 787 |
__declspec(dllexport) OM_uint32 |
788 |
gss_verify_mic(OM_uint32 *minor_status, |
|
789 |
gss_ctx_id_t context_handle, |
|
790 |
gss_buffer_t message_buffer, |
|
791 |
gss_buffer_t token_buffer, |
|
792 |
gss_qop_t *qop_state) |
|
793 |
{ |
|
56562 | 794 |
PP(">>>> Calling gss_verify_mic..."); |
56552 | 795 |
Context* pc = (Context*) context_handle; |
796 |
||
797 |
SECURITY_STATUS ss; |
|
798 |
SecBufferDesc BuffDesc; |
|
799 |
SecBuffer SecBuff[2]; |
|
800 |
ULONG qop; |
|
801 |
||
802 |
BuffDesc.ulVersion = 0; |
|
803 |
BuffDesc.cBuffers = 2; |
|
804 |
BuffDesc.pBuffers = SecBuff; |
|
805 |
||
806 |
SecBuff[0].BufferType = SECBUFFER_TOKEN; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
807 |
SecBuff[0].cbBuffer = (ULONG)token_buffer->length; |
56552 | 808 |
SecBuff[0].pvBuffer = token_buffer->value; |
809 |
||
810 |
SecBuff[1].BufferType = SECBUFFER_DATA; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
811 |
SecBuff[1].cbBuffer = (ULONG)message_buffer->length; |
56552 | 812 |
SecBuff[1].pvBuffer = message_buffer->value; |
813 |
||
814 |
ss = VerifySignature(&pc->hCtxt, &BuffDesc, 0, &qop); |
|
815 |
*qop_state = qop; |
|
816 |
||
817 |
if (ss == SEC_E_OK) { |
|
818 |
return GSS_S_COMPLETE; |
|
819 |
} else if (ss == SEC_E_OUT_OF_SEQUENCE) { |
|
820 |
return GSS_S_UNSEQ_TOKEN; |
|
821 |
} else { |
|
822 |
return GSS_S_BAD_SIG; |
|
823 |
} |
|
824 |
} |
|
825 |
||
56555 | 826 |
__declspec(dllexport) OM_uint32 |
827 |
gss_wrap(OM_uint32 *minor_status, |
|
828 |
gss_ctx_id_t context_handle, |
|
829 |
int conf_req_flag, |
|
830 |
gss_qop_t qop_req, |
|
831 |
gss_buffer_t input_message_buffer, |
|
832 |
int *conf_state, |
|
833 |
gss_buffer_t output_message_buffer) |
|
834 |
{ |
|
56562 | 835 |
PP(">>>> Calling gss_wrap..."); |
56552 | 836 |
Context* pc = (Context*) context_handle; |
837 |
||
838 |
SECURITY_STATUS ss; |
|
839 |
SecBufferDesc BuffDesc; |
|
840 |
SecBuffer SecBuff[3]; |
|
841 |
||
842 |
BuffDesc.ulVersion = SECBUFFER_VERSION; |
|
843 |
BuffDesc.cBuffers = 3; |
|
844 |
BuffDesc.pBuffers = SecBuff; |
|
845 |
||
846 |
SecBuff[0].BufferType = SECBUFFER_TOKEN; |
|
847 |
SecBuff[0].cbBuffer = pc->SecPkgContextSizes.cbSecurityTrailer; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
848 |
output_message_buffer->value = SecBuff[0].pvBuffer = malloc( |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
849 |
pc->SecPkgContextSizes.cbSecurityTrailer |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
850 |
+ input_message_buffer->length |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
851 |
+ pc->SecPkgContextSizes.cbBlockSize);; |
56552 | 852 |
|
853 |
SecBuff[1].BufferType = SECBUFFER_DATA; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
854 |
SecBuff[1].cbBuffer = (ULONG)input_message_buffer->length; |
56552 | 855 |
SecBuff[1].pvBuffer = malloc(SecBuff[1].cbBuffer); |
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
856 |
memcpy(SecBuff[1].pvBuffer, input_message_buffer->value, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
857 |
input_message_buffer->length); |
56552 | 858 |
|
859 |
SecBuff[2].BufferType = SECBUFFER_PADDING; |
|
860 |
SecBuff[2].cbBuffer = pc->SecPkgContextSizes.cbBlockSize; |
|
861 |
SecBuff[2].pvBuffer = malloc(SecBuff[2].cbBuffer); |
|
862 |
||
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
863 |
ss = EncryptMessage(&pc->hCtxt, conf_req_flag ? 0 : SECQOP_WRAP_NO_ENCRYPT, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
864 |
&BuffDesc, 0); |
56552 | 865 |
*conf_state = conf_req_flag; |
866 |
||
867 |
if (!SEC_SUCCESS(ss)) { |
|
868 |
free(SecBuff[0].pvBuffer); |
|
869 |
free(SecBuff[1].pvBuffer); |
|
870 |
free(SecBuff[2].pvBuffer); |
|
871 |
return GSS_S_FAILURE; |
|
872 |
} |
|
873 |
||
874 |
memcpy((PBYTE)SecBuff[0].pvBuffer + SecBuff[0].cbBuffer, SecBuff[1].pvBuffer, |
|
875 |
SecBuff[1].cbBuffer); |
|
876 |
memcpy((PBYTE)SecBuff[0].pvBuffer + SecBuff[0].cbBuffer + SecBuff[1].cbBuffer, |
|
877 |
SecBuff[2].pvBuffer, SecBuff[2].cbBuffer); |
|
878 |
||
879 |
output_message_buffer->length = SecBuff[1].cbBuffer + SecBuff[0].cbBuffer |
|
880 |
+ SecBuff[2].cbBuffer; |
|
881 |
free(SecBuff[1].pvBuffer); |
|
882 |
free(SecBuff[2].pvBuffer); |
|
883 |
||
884 |
return GSS_S_COMPLETE; |
|
885 |
} |
|
886 |
||
56555 | 887 |
__declspec(dllexport) OM_uint32 |
888 |
gss_unwrap(OM_uint32 *minor_status, |
|
889 |
gss_ctx_id_t context_handle, |
|
890 |
gss_buffer_t input_message_buffer, |
|
891 |
gss_buffer_t output_message_buffer, |
|
892 |
int *conf_state, |
|
893 |
gss_qop_t *qop_state) |
|
894 |
{ |
|
56562 | 895 |
PP(">>>> Calling gss_unwrap..."); |
56552 | 896 |
Context* pc = (Context*) context_handle; |
897 |
||
898 |
SECURITY_STATUS ss; |
|
899 |
SecBufferDesc BuffDesc; |
|
900 |
SecBuffer SecBuff[2]; |
|
901 |
ULONG ulQop = 0; |
|
902 |
||
903 |
BuffDesc.cBuffers = 2; |
|
904 |
BuffDesc.pBuffers = SecBuff; |
|
905 |
BuffDesc.ulVersion = SECBUFFER_VERSION; |
|
906 |
||
907 |
SecBuff[0].BufferType = SECBUFFER_STREAM; |
|
56554
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
908 |
SecBuff[0].cbBuffer = (ULONG)input_message_buffer->length; |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
909 |
output_message_buffer->value = SecBuff[0].pvBuffer |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
910 |
= malloc(input_message_buffer->length); |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
911 |
memcpy(SecBuff[0].pvBuffer, input_message_buffer->value, |
9b381f73498a
inline GenClientContext, macro redefition, new functions
weijun
parents:
56553
diff
changeset
|
912 |
input_message_buffer->length); |
56552 | 913 |
|
914 |
SecBuff[1].BufferType = SECBUFFER_DATA; |
|
915 |
SecBuff[1].cbBuffer = 0; |
|
916 |
SecBuff[1].pvBuffer = NULL; |
|
917 |
||
918 |
ss = DecryptMessage(&pc->hCtxt, &BuffDesc, 0, &ulQop); |
|
919 |
if (!SEC_SUCCESS(ss)) { |
|
920 |
free(SecBuff[0].pvBuffer); |
|
921 |
return GSS_S_FAILURE; |
|
922 |
} |
|
923 |
output_message_buffer->length = SecBuff[1].cbBuffer; |
|
924 |
output_message_buffer->value = SecBuff[1].pvBuffer; |
|
925 |
*conf_state = ulQop == SECQOP_WRAP_NO_ENCRYPT ? 0 : 1; |
|
926 |
return GSS_S_COMPLETE; |
|
927 |
} |
|
928 |
||
56555 | 929 |
__declspec(dllexport) OM_uint32 |
930 |
gss_indicate_mechs(OM_uint32 *minor_status, |
|
931 |
gss_OID_set *mech_set) |
|
932 |
{ |
|
56562 | 933 |
PP(">>>> Calling gss_indicate_mechs..."); |
56552 | 934 |
OM_uint32 minor = 0; |
935 |
OM_uint32 major = GSS_S_COMPLETE; |
|
936 |
BOOLEAN hasSpnego = false, hasKerberos = false; |
|
937 |
||
938 |
ULONG ccPackages; |
|
939 |
PSecPkgInfo packages; |
|
940 |
EnumerateSecurityPackages(&ccPackages, &packages); |
|
56562 | 941 |
PP("EnumerateSecurityPackages returns %ld", ccPackages); |
942 |
||
56552 | 943 |
PSecPkgInfo pkgInfo; |
944 |
SECURITY_STATUS ss = QuerySecurityPackageInfo(L"Negotiate", &pkgInfo); |
|
945 |
if (ss == SEC_E_OK) { |
|
56562 | 946 |
hasSpnego = true; |
56552 | 947 |
} |
948 |
ss = QuerySecurityPackageInfo(L"Kerberos", &pkgInfo); |
|
949 |
if (ss == SEC_E_OK) { |
|
950 |
hasKerberos = true; |
|
951 |
} |
|
952 |
||
56620 | 953 |
if (gss_create_empty_oid_set(minor_status, mech_set)) { |
56552 | 954 |
major = GSS_S_FAILURE; |
955 |
goto done; |
|
956 |
} |
|
957 |
||
958 |
if (hasKerberos) { |
|
56624 | 959 |
gss_add_oid_set_member(minor_status, &KRB5_OID, mech_set); |
56620 | 960 |
} |
56552 | 961 |
if (hasSpnego) { |
56624 | 962 |
gss_add_oid_set_member(minor_status, &SPNEGO_OID, mech_set); |
56620 | 963 |
} |
56552 | 964 |
done: |
965 |
if (major != GSS_S_COMPLETE) { |
|
966 |
// (void) generic_gss_release_oid_set(&minor, ©); |
|
967 |
} |
|
968 |
||
969 |
return (major); |
|
970 |
} |
|
971 |
||
56555 | 972 |
__declspec(dllexport) OM_uint32 |
973 |
gss_inquire_names_for_mech(OM_uint32 *minor_status, |
|
974 |
const gss_OID mechanism, |
|
975 |
gss_OID_set *name_types) |
|
976 |
{ |
|
56620 | 977 |
PP(">>>> Calling IMPLEMENTED gss_inquire_names_for_mech..."); |
978 |
gss_create_empty_oid_set(minor_status, name_types); |
|
56624 | 979 |
gss_add_oid_set_member(minor_status, &USER_NAME_OID, name_types); |
980 |
gss_add_oid_set_member(minor_status, &HOST_SERVICE_NAME_OID, name_types); |
|
981 |
gss_add_oid_set_member(minor_status, &EXPORT_NAME_OID, name_types); |
|
56620 | 982 |
return GSS_S_COMPLETE; |
56552 | 983 |
} |
984 |
||
56555 | 985 |
__declspec(dllexport) OM_uint32 |
986 |
gss_add_oid_set_member(OM_uint32 *minor_status, |
|
987 |
gss_OID member_oid, |
|
988 |
gss_OID_set *oid_set) |
|
989 |
{ |
|
56562 | 990 |
PP(">>>> Calling gss_add_oid_set_member..."); |
991 |
if (member_oid == NULL || member_oid->length == 0 |
|
992 |
|| member_oid->elements == NULL) { |
|
993 |
return GSS_S_CALL_INACCESSIBLE_READ; |
|
994 |
} |
|
995 |
||
996 |
if (oid_set == NULL) { |
|
997 |
return GSS_S_CALL_INACCESSIBLE_WRITE; |
|
998 |
} |
|
999 |
||
1000 |
int count = (int)(*oid_set)->count; |
|
1001 |
for (int i = 0; i < count; i++) { |
|
1002 |
if ((*oid_set)->elements[i].length == member_oid->length |
|
1003 |
&& !memcmp((*oid_set)->elements[i].elements, member_oid->elements, member_oid->length)) { |
|
1004 |
// already there |
|
1005 |
return GSS_S_COMPLETE; |
|
1006 |
} |
|
1007 |
} |
|
1008 |
gss_OID existing = (*oid_set)->elements; |
|
1009 |
gss_OID newcopy = new gss_OID_desc[count + 1]; |
|
1010 |
if (newcopy == NULL) { |
|
1011 |
return GSS_S_FAILURE; |
|
1012 |
} |
|
1013 |
if (existing) { |
|
1014 |
memcpy(newcopy, existing, count * sizeof(gss_OID_desc)); |
|
1015 |
} |
|
1016 |
newcopy[count].length = member_oid->length; |
|
1017 |
newcopy[count].elements = new char[member_oid->length]; |
|
1018 |
if (newcopy[count].elements == NULL) { |
|
1019 |
delete[] newcopy; |
|
1020 |
return GSS_S_FAILURE; |
|
1021 |
} |
|
1022 |
memcpy(newcopy[count].elements, member_oid->elements, member_oid->length); |
|
1023 |
(*oid_set)->elements = newcopy; |
|
1024 |
(*oid_set)->count++; |
|
1025 |
if (existing) { |
|
1026 |
delete[] existing; |
|
1027 |
} |
|
1028 |
||
1029 |
return GSS_S_COMPLETE; |
|
56552 | 1030 |
} |
1031 |
||
56555 | 1032 |
__declspec(dllexport) OM_uint32 |
1033 |
gss_display_status(OM_uint32 *minor_status, |
|
1034 |
OM_uint32 status_value, |
|
1035 |
int status_type, |
|
1036 |
gss_OID mech_type, |
|
1037 |
OM_uint32 *message_context, |
|
1038 |
gss_buffer_t status_string) |
|
1039 |
{ |
|
56562 | 1040 |
PP(">>>> Calling UNIMPLEMENTED gss_display_status..."); |
1041 |
status_string->value = new char[8]; |
|
1042 |
memcpy(status_string->value, "Nothing", 8); |
|
1043 |
status_string->length = 7; |
|
1044 |
return GSS_S_COMPLETE; |
|
56552 | 1045 |
} |
1046 |
||
56555 | 1047 |
__declspec(dllexport) OM_uint32 |
1048 |
gss_create_empty_oid_set(OM_uint32 *minor_status, |
|
1049 |
gss_OID_set *oid_set) |
|
1050 |
{ |
|
56562 | 1051 |
PP(">>>> Calling gss_create_empty_oid_set..."); |
1052 |
if (oid_set == NULL) { |
|
1053 |
return GSS_S_CALL_INACCESSIBLE_WRITE; |
|
1054 |
} |
|
1055 |
||
1056 |
if (*oid_set = new gss_OID_set_desc) { |
|
1057 |
memset(*oid_set, 0, sizeof(gss_OID_set_desc)); |
|
1058 |
return GSS_S_COMPLETE; |
|
1059 |
} |
|
56552 | 1060 |
return GSS_S_FAILURE; |
1061 |
} |
|
1062 |
||
56555 | 1063 |
__declspec(dllexport) OM_uint32 |
1064 |
gss_release_oid_set(OM_uint32 *minor_status, |
|
1065 |
gss_OID_set *set) |
|
1066 |
{ |
|
56562 | 1067 |
PP(">>>> Calling gss_release_oid_set..."); |
1068 |
if (set == NULL || *set == GSS_C_NO_OID_SET) { |
|
1069 |
return GSS_S_COMPLETE; |
|
1070 |
} |
|
1071 |
for (int i = 0; i < (*set)->count; i++) { |
|
1072 |
delete[] (*set)->elements[i].elements; |
|
1073 |
} |
|
1074 |
delete[] (*set)->elements; |
|
1075 |
delete *set; |
|
1076 |
*set = GSS_C_NO_OID_SET; |
|
1077 |
return GSS_S_COMPLETE; |
|
56552 | 1078 |
} |
1079 |
||
56555 | 1080 |
__declspec(dllexport) OM_uint32 |
1081 |
gss_release_buffer(OM_uint32 *minor_status, |
|
1082 |
gss_buffer_t buffer) |
|
1083 |
{ |
|
56562 | 1084 |
PP(">>>> Calling gss_release_buffer..."); |
1085 |
if (buffer == NULL) { |
|
1086 |
return GSS_S_COMPLETE; |
|
1087 |
} |
|
1088 |
if (buffer->value) { |
|
1089 |
delete[] buffer->value; |
|
1090 |
buffer->value = NULL; |
|
1091 |
buffer->length = 0; |
|
1092 |
} |
|
1093 |
return GSS_S_COMPLETE; |
|
56552 | 1094 |
} |
1095 |
||
56555 | 1096 |
/* End implemented section */ |
1097 |
||
56552 | 1098 |
#ifdef __cplusplus |
1099 |
} |
|
1100 |
#endif |