亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? security.c

?? this sample is distantly related to the httpauth sample which demonstrates the use of the SSPI packa
?? C
字號:
/*++

Copyright 1996-1997 Microsoft Corporation

Module Name:

    security.c

Abstract:

    Handles communication with the SSP package.

Revision History:

--*/

#include <windows.h>
#include <winsock.h>
#include <stdio.h>
#include <stdlib.h>
#define SECURITY_WIN32
#include "sspi.h"
#include "issperr.h"
#include "security.h"
#include "collect.h"

static HINSTANCE g_hLib;
static DWORD g_cbMaxToken;
static PSecurityFunctionTable g_pFuncs;

// structure storing the state of the authentication sequence
//
typedef struct _AUTH_SEQ {
    BOOL _fNewConversation;
    CredHandle _hcred;
    BOOL _fHaveCredHandle;
    BOOL _fHaveCtxtHandle;
    struct _SecHandle  _hctxt;
} AUTH_SEQ, *PAUTH_SEQ;

#define SEC_SUCCESS(Status) ((Status) >= 0)

#define PACKAGE_NAME	"kerberos"
#define NT_DLL_NAME		"security.dll"

// Target name for the security package
// De-comment after filling appropriate principal name here.
//
// #define TOKEN_SOURCE_NAME       "<Domain>\\<User>"


BOOL InitPackage (DWORD *pcbMaxMessage)
/*++

 Routine Description:

    Finds, loads and initializes the security package

 Return Value:

    Returns TRUE is successful; otherwise FALSE is returned.

--*/
{
	FARPROC pInit;
	SECURITY_STATUS ss;
	PSecPkgInfo pkgInfo;

	// load and initialize the ntlm ssp
	//
	g_hLib = LoadLibrary (NT_DLL_NAME);
	if (NULL == g_hLib)  {
		fprintf (stderr, "Couldn't load dll: %u\n", GetLastError ());
		return(FALSE);
	}

	pInit = GetProcAddress (g_hLib, SECURITY_ENTRYPOINT);
	if (NULL == pInit)  {
		fprintf (stderr, "Couldn't get sec init routine: %u\n", GetLastError ());
		return(FALSE);
	}

	g_pFuncs = (PSecurityFunctionTable) pInit ();
	if (NULL == g_pFuncs)  {
		fprintf (stderr, "Couldn't init package\n");
		return(FALSE);
	}

	// Query for the package we're interested in
	//
	ss = g_pFuncs->QuerySecurityPackageInfo (PACKAGE_NAME, &pkgInfo);
	if (!SEC_SUCCESS(ss))  {
		fprintf (stderr, "Couldn't query package info for %s, error %u\n",
					PACKAGE_NAME, ss);
		return(FALSE);
	}

	g_cbMaxToken = pkgInfo->cbMaxToken;

	g_pFuncs->FreeContextBuffer (pkgInfo);

	*pcbMaxMessage = g_cbMaxToken;

	return TRUE;
}

BOOL TermPackage ()
{
	FreeLibrary (g_hLib);

	return(TRUE);
}

BOOL GenClientContext (
			DWORD dwKey,
			BYTE *pIn,
			DWORD cbIn,
			BYTE *pOut,
			DWORD *pcbOut,
			BOOL *pfDone)
/*++

 Routine Description:

    Optionally takes an input buffer coming from the server and returns
	a buffer of information to send back to the server.  Also returns
	an indication of whether or not the context is complete.

 Return Value:

    Returns TRUE is successful; otherwise FALSE is returned.

--*/
{
	SECURITY_STATUS	ss;
	TimeStamp		Lifetime;
	SecBufferDesc	OutBuffDesc;
	SecBuffer		OutSecBuff;
	SecBufferDesc	InBuffDesc;
	SecBuffer		InSecBuff;
	ULONG			ContextAttributes;
	PAUTH_SEQ		pAS;

	// Lookup pAS based on Key
	//
	if (!GetEntry (dwKey, (PVOID*) &pAS))
		return(FALSE);

	if (pAS->_fNewConversation)  {
		ss = g_pFuncs->AcquireCredentialsHandle (
							NULL,	// principal
							PACKAGE_NAME,
							SECPKG_CRED_OUTBOUND,
							NULL,	// LOGON id
							NULL,	// auth data
							NULL,	// get key fn
							NULL,	// get key arg
							&pAS->_hcred,
							&Lifetime
							);
		if (SEC_SUCCESS (ss))
			pAS->_fHaveCredHandle = TRUE;
		else {
			fprintf (stderr, "AcquireCreds failed: %u\n", ss);
			return(FALSE);
		}
	}

	// prepare output buffer
	//
	OutBuffDesc.ulVersion = 0;
	OutBuffDesc.cBuffers = 1;
	OutBuffDesc.pBuffers = &OutSecBuff;

	OutSecBuff.cbBuffer = *pcbOut;
	OutSecBuff.BufferType = SECBUFFER_TOKEN;
	OutSecBuff.pvBuffer = pOut;

	// prepare input buffer
	//
	if (!pAS->_fNewConversation)  {
		InBuffDesc.ulVersion = 0;
		InBuffDesc.cBuffers = 1;
		InBuffDesc.pBuffers = &InSecBuff;

		InSecBuff.cbBuffer = cbIn;
		InSecBuff.BufferType = SECBUFFER_TOKEN;
		InSecBuff.pvBuffer = pIn;
	}

	ss = g_pFuncs->InitializeSecurityContext (
						&pAS->_hcred,
						pAS->_fNewConversation ? NULL : &pAS->_hctxt,
						TOKEN_SOURCE_NAME,
						0,	// context requirements
						0,	// reserved1
						SECURITY_NATIVE_DREP,
						pAS->_fNewConversation ? NULL : &InBuffDesc,
						0,	// reserved2
						&pAS->_hctxt,
						&OutBuffDesc,
						&ContextAttributes,
						&Lifetime
						);
	if (!SEC_SUCCESS (ss))  {
		fprintf (stderr, "init context failed: %u\n", ss);
		return FALSE;
	}

	pAS->_fHaveCtxtHandle = TRUE;

	// Complete token -- if applicable
	//
	if ((SEC_I_COMPLETE_NEEDED == ss) || (SEC_I_COMPLETE_AND_CONTINUE == ss))  {
		if (g_pFuncs->CompleteAuthToken) {
			ss = g_pFuncs->CompleteAuthToken (&pAS->_hctxt, &OutBuffDesc);
			if (!SEC_SUCCESS(ss))  {
				fprintf (stderr, "complete failed: %u\n", ss);
				return FALSE;
			}
		}
		else {
			fprintf (stderr, "Complete not supported.\n");
			return FALSE;
		}
	}

	*pcbOut = OutSecBuff.cbBuffer;

	if (pAS->_fNewConversation)
		pAS->_fNewConversation = FALSE;

	*pfDone = !((SEC_I_CONTINUE_NEEDED == ss) ||
				(SEC_I_COMPLETE_AND_CONTINUE == ss));

	return TRUE;
}

BOOL GenServerContext (
			DWORD dwKey,
			BYTE *pIn,
			DWORD cbIn,
			BYTE *pOut,
			DWORD *pcbOut,
			BOOL *pfDone)
/*++

 Routine Description:

    Takes an input buffer coming from the client and returns a buffer
	to be sent to the client.  Also returns an indication of whether or
	not the context is complete.

 Return Value:

    Returns TRUE is successful; otherwise FALSE is returned.

--*/
{
	SECURITY_STATUS	ss;
	TimeStamp		Lifetime;
	SecBufferDesc	OutBuffDesc;
	SecBuffer		OutSecBuff;
	SecBufferDesc	InBuffDesc;
	SecBuffer		InSecBuff;
	ULONG			ContextAttributes;
	PAUTH_SEQ		pAS;

	// Lookup pAS based on Key
	//
	if (!GetEntry (dwKey, (PVOID*) &pAS))
		return(FALSE);

	if (pAS->_fNewConversation)  {
		ss = g_pFuncs->AcquireCredentialsHandle (
							NULL,	// principal
							PACKAGE_NAME,
							SECPKG_CRED_INBOUND,
							NULL,	// LOGON id
							NULL,	// auth data
							NULL,	// get key fn
							NULL,	// get key arg
							&pAS->_hcred,
							&Lifetime
							);
		if (SEC_SUCCESS (ss))
			pAS->_fHaveCredHandle = TRUE;
		else {
			fprintf (stderr, "AcquireCreds failed: %u\n", ss);
			return(FALSE);
		}
	}

	// prepare output buffer
	//
	OutBuffDesc.ulVersion = 0;
	OutBuffDesc.cBuffers = 1;
	OutBuffDesc.pBuffers = &OutSecBuff;

	OutSecBuff.cbBuffer = *pcbOut;
	OutSecBuff.BufferType = SECBUFFER_TOKEN;
	OutSecBuff.pvBuffer = pOut;

	// prepare input buffer
	//
	InBuffDesc.ulVersion = 0;
	InBuffDesc.cBuffers = 1;
	InBuffDesc.pBuffers = &InSecBuff;

	InSecBuff.cbBuffer = cbIn;
	InSecBuff.BufferType = SECBUFFER_TOKEN;
	InSecBuff.pvBuffer = pIn;

	ss = g_pFuncs->AcceptSecurityContext (
						&pAS->_hcred,
						pAS->_fNewConversation ? NULL : &pAS->_hctxt,
						&InBuffDesc,
						0,	// context requirements
						SECURITY_NATIVE_DREP,
						&pAS->_hctxt,
						&OutBuffDesc,
						&ContextAttributes,
						&Lifetime
						);
	if (!SEC_SUCCESS (ss))  {
		fprintf (stderr, "init context failed: %u\n", ss);
		return FALSE;
	}

	pAS->_fHaveCtxtHandle = TRUE;

	// Complete token -- if applicable
	//
	if ((SEC_I_COMPLETE_NEEDED == ss) || (SEC_I_COMPLETE_AND_CONTINUE == ss))  {
		if (g_pFuncs->CompleteAuthToken) {
			ss = g_pFuncs->CompleteAuthToken (&pAS->_hctxt, &OutBuffDesc);
			if (!SEC_SUCCESS(ss))  {
				fprintf (stderr, "complete failed: %u\n", ss);
				return FALSE;
			}
		}
		else {
			fprintf (stderr, "Complete not supported.\n");
			return FALSE;
		}
	}

	*pcbOut = OutSecBuff.cbBuffer;

	if (pAS->_fNewConversation)
		pAS->_fNewConversation = FALSE;

	*pfDone = !((SEC_I_CONTINUE_NEEDED == ss) ||
				(SEC_I_COMPLETE_AND_CONTINUE == ss));

	return TRUE;
}

BOOL ImpersonateContext (DWORD dwKey)
/*++

 Routine Description:

    Impersonates the client whose context is associated with the
	supplied key.

 Return Value:

    Returns TRUE is successful; otherwise FALSE is returned.

--*/
{
	SECURITY_STATUS	ss;
	PAUTH_SEQ		pAS;

	// Lookup pAS based on Key
	//
	if (!GetEntry (dwKey, (PVOID*) &pAS))
		return(FALSE);

	ss = g_pFuncs->ImpersonateSecurityContext (&pAS->_hctxt);
	if (!SEC_SUCCESS(ss)) {
		fprintf (stderr, "Impersonate failed: %u\n", ss);
		return(FALSE);
	}

	return(TRUE);
}

BOOL RevertContext (DWORD dwKey)
/*++

 Routine Description:

    Reverts to the original server context.

 Return Value:

    Returns TRUE is successful; otherwise FALSE is returned.

--*/
{
	SECURITY_STATUS ss;
	PAUTH_SEQ		pAS;

	// Lookup pAS based on Key
	//
	if (!GetEntry (dwKey, (PVOID*) &pAS))
		return(FALSE);

	ss = g_pFuncs->RevertSecurityContext (&pAS->_hctxt);
	if (!SEC_SUCCESS(ss)) {
		fprintf (stderr, "Revert failed: %u\n", ss);
		return(FALSE);
	}

	return(TRUE);
}

BOOL InitSession (DWORD dwKey)
/*++

 Routine Description:

    Initializes the context associated with a key and adds it to the
	collection.

 Return Value:

    Returns TRUE is successful; otherwise FALSE is returned.

--*/
{
	PAUTH_SEQ pAS;

	pAS = (PAUTH_SEQ) malloc (sizeof (AUTH_SEQ));
	if (NULL == pAS)
		return(FALSE);

	pAS->_fNewConversation = TRUE;
	pAS->_fHaveCredHandle = FALSE;
	pAS->_fHaveCtxtHandle = FALSE;
		
	if (!AddEntry (dwKey, (PVOID)pAS))  {
		free (pAS);
		return(FALSE);
	}

	return(TRUE);
}

BOOL TermSession (DWORD dwKey)
/*++

 Routine Description:

    Releases the resources associated with a key and removes it from
	the collection.

 Return Value:

    Returns TRUE is successful; otherwise FALSE is returned.

--*/
{
	PAUTH_SEQ pAS;

	if (!DeleteEntry (dwKey, (LPVOID*)&pAS))	
		return(FALSE);

	if (pAS->_fHaveCtxtHandle)
		g_pFuncs->DeleteSecurityContext (&pAS->_hctxt);

	if (pAS->_fHaveCredHandle)
		g_pFuncs->FreeCredentialHandle (&pAS->_hcred);

	free (pAS);
	
	return(TRUE);
}	

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久亚洲春色中文字幕久久久| 99r精品视频| eeuss鲁一区二区三区| 欧美日免费三级在线| 国产网站一区二区| 麻豆91在线观看| 欧美亚洲日本国产| 欧美高清在线视频| 久久狠狠亚洲综合| 欧美人狂配大交3d怪物一区| 国产精品卡一卡二| 国产91清纯白嫩初高中在线观看 | 日本一区二区三区四区在线视频| 亚洲高清一区二区三区| 不卡欧美aaaaa| 国产亚洲欧美色| 精品影视av免费| 777亚洲妇女| 亚洲成人av一区二区| 色94色欧美sute亚洲13| 中文字幕一区二区三区四区| 国产一区二区三区精品欧美日韩一区二区三区 | 中文字幕一区av| 国产成人亚洲综合a∨猫咪| 日韩欧美国产电影| 日韩精品一二区| 欧美一区三区四区| 日本欧美大码aⅴ在线播放| 欧美肥妇毛茸茸| 日日噜噜夜夜狠狠视频欧美人| 欧美男女性生活在线直播观看| 亚洲一二三区在线观看| 欧美亚洲国产bt| 亚洲成av人片一区二区三区| 欧美色区777第一页| 亚洲成人激情自拍| 欧美一区二区成人| 九九视频精品免费| 国产婷婷色一区二区三区| 国产99精品在线观看| 中文字幕一区二区三区四区| 91美女片黄在线| 亚洲一区二区高清| 91精品蜜臀在线一区尤物| 日韩福利视频导航| 欧美精品一区二区蜜臀亚洲| 国产福利电影一区二区三区| 亚洲国产精品高清| 色av一区二区| 日本美女视频一区二区| 精品国产亚洲一区二区三区在线观看| 日本亚洲电影天堂| 久久久美女艺术照精彩视频福利播放| 国产乱对白刺激视频不卡| 亚洲欧洲精品一区二区精品久久久 | www.99精品| 一区二区三区免费| 欧美一级国产精品| 丁香六月综合激情| 亚洲国产精品久久人人爱蜜臀| 91精品欧美久久久久久动漫| 国产一区二区精品久久91| 国产精品国产三级国产三级人妇| 在线看国产一区二区| 看国产成人h片视频| 亚洲一区二区三区四区不卡| 欧美一区二区视频观看视频| 丁香六月久久综合狠狠色| 亚洲风情在线资源站| 欧美不卡视频一区| 色综合久久综合中文综合网| 日本在线播放一区二区三区| 中文字幕在线免费不卡| 欧美一区二区在线视频| av电影天堂一区二区在线观看| 亚洲成a人片在线观看中文| 国产亚洲视频系列| 91麻豆精品久久久久蜜臀| 成人福利视频在线看| 日本一区中文字幕| 亚洲精品欧美综合四区| 久久久久国产精品人| 日韩一区二区三区在线观看| 91亚洲精品久久久蜜桃| 国产综合色视频| 五月婷婷久久综合| 亚洲素人一区二区| 国产亚洲成aⅴ人片在线观看 | 亚洲欧美偷拍卡通变态| 精品福利av导航| 欧美午夜精品久久久久久超碰 | 91精品婷婷国产综合久久性色| 成人av网在线| 国内欧美视频一区二区| 亚洲成人资源在线| 亚洲色图制服丝袜| 中文字幕一区二区不卡| 久久久亚洲综合| 日韩精品一区二区三区在线| 欧美夫妻性生活| 欧美午夜精品久久久久久超碰| 97精品久久久午夜一区二区三区| 韩日欧美一区二区三区| 毛片一区二区三区| 日韩不卡免费视频| 日韩激情视频在线观看| 亚洲国产精品天堂| 亚洲制服丝袜在线| 夜夜嗨av一区二区三区四季av| 中文字幕 久热精品 视频在线| 国产性做久久久久久| 久久综合九色综合欧美亚洲| 精品日韩一区二区三区| 日韩精品一区二| 欧美xxxxxxxxx| 精品av综合导航| 久久亚洲二区三区| 日本一区二区动态图| 国产精品高潮呻吟| 成人欧美一区二区三区小说| 国产精品卡一卡二卡三| 亚洲视频一区二区在线观看| 亚洲人成在线观看一区二区| 亚洲欧洲日韩女同| 亚洲aaa精品| 奇米影视一区二区三区| 久久99最新地址| 成人av电影免费观看| 99久久99久久综合| 欧美三级电影精品| 精品美女被调教视频大全网站| 欧美精品一区二区蜜臀亚洲| 中文字幕av不卡| 亚洲一区二区三区中文字幕| 三级在线观看一区二区| 狠狠色2019综合网| 99久免费精品视频在线观看| 91成人免费在线视频| 4438x成人网最大色成网站| 日韩亚洲电影在线| 国产精品私人自拍| 亚洲v中文字幕| 国产毛片精品一区| 色国产综合视频| 日韩一区二区电影在线| 国产喷白浆一区二区三区| 亚洲乱码国产乱码精品精可以看| 性久久久久久久| 国产精品中文字幕欧美| 日本电影亚洲天堂一区| 日韩一区二区影院| 亚洲欧洲av在线| 麻豆精品一二三| 色综合欧美在线视频区| 26uuu亚洲| 亚洲国产日日夜夜| 成人午夜看片网址| 91.com视频| 一区二区三区不卡在线观看| 韩国成人在线视频| 欧美色区777第一页| 国产人妖乱国产精品人妖| 亚洲444eee在线观看| jizzjizzjizz欧美| 日韩欧美一级二级三级久久久| 日韩一区有码在线| 国产呦萝稀缺另类资源| 欧美精品自拍偷拍动漫精品| 国产精品动漫网站| 九色综合国产一区二区三区| 欧美丝袜丝交足nylons| 中文成人av在线| 久久99精品一区二区三区三区| 欧美综合色免费| 国产精品狼人久久影院观看方式| 久久国产精品99精品国产| 日韩一级二级三级精品视频| 一区二区国产视频| 成人精品高清在线| 欧美精品一区二区久久久| 性久久久久久久久| 91成人免费网站| 亚洲天堂a在线| www.亚洲在线| 国产精品久久一级| 国产成人精品影视| 久久精品一区二区| 激情国产一区二区| 精品免费99久久| 青青草97国产精品免费观看无弹窗版 | 色视频欧美一区二区三区| 国产日韩av一区| 国产一区二区福利| www欧美成人18+| 国产在线播放一区| 欧美tickling挠脚心丨vk| 日韩国产精品91| 9191久久久久久久久久久| 视频一区二区三区入口| 欧美精选一区二区|