1 /*
2 * Copyright (c) 2015 Hendrik Leppkes
3 *
4 * This file is part of FFmpeg.
5 *
6 * FFmpeg is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * FFmpeg is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with FFmpeg; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
19 */
20
21 /** Based on the CURL SChannel module */
22
30
31 #define SECURITY_WIN32
32 #include <windows.h>
33 #include <security.h>
34 #include <schnlsp.h>
35
36 #define SCHANNEL_INITIAL_BUFFER_SIZE 4096
37 #define SCHANNEL_FREE_BUFFER_SIZE 1024
38
39 /* mingw does not define this symbol */
40 #ifndef SECBUFFER_ALERT
41 #define SECBUFFER_ALERT 17
42 #endif
43
47
50
53
56
60
64
65 SecPkgContext_StreamSizes
sizes;
66
71
74 {
78 }
79
81 unsigned long buffer_count)
82 {
83 desc->ulVersion = SECBUFFER_VERSION;
84 desc->pBuffers = buffers;
85 desc->cBuffers = buffer_count;
86 }
87
89 {
93
95 SecBufferDesc BuffDesc;
96 SecBuffer Buffer;
97 SECURITY_STATUS sspi_ret;
98 SecBuffer outbuf;
99 SecBufferDesc outbuf_desc;
100
101 DWORD dwshut = SCHANNEL_SHUTDOWN;
104
105 sspi_ret = ApplyControlToken(&
c->ctxt_handle, &BuffDesc);
106 if (sspi_ret != SEC_E_OK)
108
111
112 sspi_ret = InitializeSecurityContext(&
c->cred_handle, &
c->ctxt_handle,
s->host,
113 c->request_flags, 0, 0,
NULL, 0, &
c->ctxt_handle,
114 &outbuf_desc, &
c->context_flags, &
c->ctxt_timestamp);
115 if (sspi_ret == SEC_E_OK || sspi_ret == SEC_I_CONTEXT_EXPIRED) {
118 FreeContextBuffer(outbuf.pvBuffer);
119 if (
ret < 0 ||
ret != outbuf.cbBuffer)
121 }
122
124 }
125 return 0;
126 }
127
129 {
131
133
134 DeleteSecurityContext(&
c->ctxt_handle);
135 FreeCredentialsHandle(&
c->cred_handle);
136
138 c->enc_buf_size =
c->enc_buf_offset = 0;
139
141 c->dec_buf_size =
c->dec_buf_offset = 0;
142
144 return 0;
145 }
146
148 {
151 SECURITY_STATUS sspi_ret;
152 SecBuffer outbuf[3] = { 0 };
153 SecBufferDesc outbuf_desc;
154 SecBuffer inbuf[2];
155 SecBufferDesc inbuf_desc;
157
158 if (
c->enc_buf ==
NULL) {
159 c->enc_buf_offset = 0;
164 }
165
166 if (
c->dec_buf ==
NULL) {
167 c->dec_buf_offset = 0;
172 }
173
174 while (1) {
179 c->enc_buf_size =
c->enc_buf_offset = 0;
181 }
182 }
183
186 c->enc_buf_size -
c->enc_buf_offset);
190 }
191 c->enc_buf_offset +=
ret;
192 }
193
194 /* input buffers */
198
199 if (inbuf[0].pvBuffer ==
NULL) {
203 }
204
205 memcpy(inbuf[0].pvBuffer,
c->enc_buf,
c->enc_buf_offset);
206
207 /* output buffers */
212
213 sspi_ret = InitializeSecurityContext(&
c->cred_handle, &
c->ctxt_handle,
s->host,
c->request_flags,
214 0, 0, &inbuf_desc, 0,
NULL, &outbuf_desc, &
c->context_flags,
217
218 if (sspi_ret == SEC_E_INCOMPLETE_MESSAGE) {
221 continue;
222 }
223
224 /* remote requests a client certificate - attempt to continue without one anyway */
225 if (sspi_ret == SEC_I_INCOMPLETE_CREDENTIALS &&
226 !(
c->request_flags & ISC_REQ_USE_SUPPLIED_CREDS)) {
228 c->request_flags |= ISC_REQ_USE_SUPPLIED_CREDS;
230 continue;
231 }
232
233 /* continue handshake */
234 if (sspi_ret == SEC_I_CONTINUE_NEEDED || sspi_ret == SEC_E_OK) {
235 for (
i = 0;
i < 3;
i++) {
236 if (outbuf[
i].BufferType == SECBUFFER_TOKEN && outbuf[
i].cbBuffer > 0) {
238 if (
ret < 0 ||
ret != outbuf[
i].cbBuffer) {
242 }
243 }
244
245 if (outbuf[
i].pvBuffer !=
NULL) {
246 FreeContextBuffer(outbuf[
i].pvBuffer);
247 outbuf[
i].pvBuffer =
NULL;
248 }
249 }
250 } else {
251 if (sspi_ret == SEC_E_WRONG_PRINCIPAL)
253 else
257 }
258
259 if (inbuf[1].BufferType == SECBUFFER_EXTRA && inbuf[1].cbBuffer > 0) {
260 if (
c->enc_buf_offset > inbuf[1].cbBuffer) {
261 memmove(
c->enc_buf, (
c->enc_buf +
c->enc_buf_offset) - inbuf[1].cbBuffer,
262 inbuf[1].cbBuffer);
263 c->enc_buf_offset = inbuf[1].cbBuffer;
264 if (sspi_ret == SEC_I_CONTINUE_NEEDED) {
266 continue;
267 }
268 }
269 } else {
270 c->enc_buf_offset = 0;
271 }
272
273 if (sspi_ret == SEC_I_CONTINUE_NEEDED) {
275 continue;
276 }
277
278 break;
279 }
280
281 return 0;
282
284 /* free any remaining output data */
285 for (
i = 0;
i < 3;
i++) {
286 if (outbuf[
i].pvBuffer !=
NULL) {
287 FreeContextBuffer(outbuf[
i].pvBuffer);
288 outbuf[
i].pvBuffer =
NULL;
289 }
290 }
291
293 }
294
296 {
299 SecBuffer outbuf;
300 SecBufferDesc outbuf_desc;
301 SECURITY_STATUS sspi_ret;
303
306
307 c->request_flags = ISC_REQ_SEQUENCE_DETECT | ISC_REQ_REPLAY_DETECT |
308 ISC_REQ_CONFIDENTIALITY | ISC_REQ_ALLOCATE_MEMORY |
309 ISC_REQ_STREAM;
310
311 sspi_ret = InitializeSecurityContext(&
c->cred_handle,
NULL,
s->host,
c->request_flags, 0, 0,
312 NULL, 0, &
c->ctxt_handle, &outbuf_desc, &
c->context_flags,
314 if (sspi_ret != SEC_I_CONTINUE_NEEDED) {
318 }
319
322 FreeContextBuffer(outbuf.pvBuffer);
323 if (
ret < 0 ||
ret != outbuf.cbBuffer) {
327 }
328
330
332 DeleteSecurityContext(&
c->ctxt_handle);
334 }
335
337 {
340 SECURITY_STATUS sspi_ret;
341 SCHANNEL_CRED schannel_cred = { 0 };
343
346
351 }
352
353 /* SChannel Options */
354 schannel_cred.dwVersion = SCHANNEL_CRED_VERSION;
355
357 schannel_cred.dwFlags = SCH_CRED_AUTO_CRED_VALIDATION |
358 SCH_CRED_REVOCATION_CHECK_CHAIN;
359 else
360 schannel_cred.dwFlags = SCH_CRED_MANUAL_CRED_VALIDATION |
361 SCH_CRED_IGNORE_NO_REVOCATION_CHECK |
362 SCH_CRED_IGNORE_REVOCATION_OFFLINE;
363
364 /* Get credential handle */
365 sspi_ret = AcquireCredentialsHandle(
NULL, (TCHAR *)UNISP_NAME, SECPKG_CRED_OUTBOUND,
368 if (sspi_ret != SEC_E_OK) {
372 }
373
377
379
380 return 0;
381
385 }
386
388 {
391 SECURITY_STATUS sspi_ret = SEC_E_OK;
392 SecBuffer inbuf[4];
393 SecBufferDesc inbuf_desc;
396
397 /* If we have some left-over data from previous network activity,
398 * return it first in case it is enough. It may contain
399 * data that is required to know whether this connection
400 * is still required or not, esp. in case of HTTP keep-alive
401 * connections. */
402 if (
c->dec_buf_offset > 0)
404
405 if (
c->sspi_close_notify)
407
408 if (!
c->connection_closed) {
409 size =
c->enc_buf_size -
c->enc_buf_offset;
410 if (size < SCHANNEL_FREE_BUFFER_SIZE || c->enc_buf_size < min_enc_buf_size) {
412 if (
c->enc_buf_size < min_enc_buf_size)
413 c->enc_buf_size = min_enc_buf_size;
416 c->enc_buf_size =
c->enc_buf_offset = 0;
418 }
419 }
420
423
425 c->enc_buf_size -
c->enc_buf_offset);
427 c->connection_closed = 1;
431 }
else if (
ret < 0) {
434 }
435
436 c->enc_buf_offset +=
ret;
437 }
438
439 while (
c->enc_buf_offset > 0 && sspi_ret == SEC_E_OK) {
440 /* input buffer */
442
443 /* additional buffers for possible output */
448
449 sspi_ret = DecryptMessage(&
c->ctxt_handle, &inbuf_desc, 0,
NULL);
450 if (sspi_ret == SEC_E_OK || sspi_ret == SEC_I_RENEGOTIATE ||
451 sspi_ret == SEC_I_CONTEXT_EXPIRED) {
452 /* handle decrypted data */
453 if (inbuf[1].BufferType == SECBUFFER_DATA) {
454 /* grow buffer if needed */
457 if (
c->dec_buf_size -
c->dec_buf_offset <
size ||
c->dec_buf_size <
len) {
458 c->dec_buf_size =
c->dec_buf_offset +
size;
459 if (
c->dec_buf_size <
len)
460 c->dec_buf_size =
len;
463 c->dec_buf_size =
c->dec_buf_offset = 0;
465 }
466 }
467
468 /* copy decrypted data to buffer */
469 size = inbuf[1].cbBuffer;
471 memcpy(
c->dec_buf +
c->dec_buf_offset, inbuf[1].pvBuffer,
size);
472 c->dec_buf_offset +=
size;
473 }
474 }
475 if (inbuf[3].BufferType == SECBUFFER_EXTRA && inbuf[3].cbBuffer > 0) {
476 if (
c->enc_buf_offset > inbuf[3].cbBuffer) {
477 memmove(
c->enc_buf, (
c->enc_buf +
c->enc_buf_offset) - inbuf[3].cbBuffer,
478 inbuf[3].cbBuffer);
479 c->enc_buf_offset = inbuf[3].cbBuffer;
480 }
481 } else
482 c->enc_buf_offset = 0;
483
484 if (sspi_ret == SEC_I_RENEGOTIATE) {
485 if (
c->enc_buf_offset) {
489 }
490
495 }
496 sspi_ret = SEC_E_OK;
497 continue;
498 } else if (sspi_ret == SEC_I_CONTEXT_EXPIRED) {
499 c->sspi_close_notify = 1;
500 if (!
c->connection_closed) {
501 c->connection_closed = 1;
503 }
506 }
507 } else if (sspi_ret == SEC_E_INCOMPLETE_MESSAGE) {
510 } else {
514 }
515 }
516
518
522 memcpy(buf,
c->dec_buf,
size);
523 memmove(
c->dec_buf,
c->dec_buf +
size,
c->dec_buf_offset -
size);
524 c->dec_buf_offset -=
size;
525
527 }
528
529 if (
ret == 0 && !
c->connection_closed)
531
533 }
534
536 {
539 SECURITY_STATUS sspi_ret;
540 int ret = 0, data_size;
542 SecBuffer outbuf[4];
543 SecBufferDesc outbuf_desc;
544
545 if (
c->sizes.cbMaximumMessage == 0) {
546 sspi_ret = QueryContextAttributes(&
c->ctxt_handle, SECPKG_ATTR_STREAM_SIZES, &
c->sizes);
547 if (sspi_ret != SEC_E_OK)
549 }
550
551 /* limit how much data we can consume */
553
554 data_size =
c->sizes.cbHeader +
len +
c->sizes.cbTrailer;
558
560 data,
c->sizes.cbHeader);
568
569 memcpy(outbuf[1].pvBuffer, buf,
len);
570
571 sspi_ret = EncryptMessage(&
c->ctxt_handle, 0, &outbuf_desc, 0);
572 if (sspi_ret == SEC_E_OK) {
573 len = outbuf[0].cbBuffer + outbuf[1].cbBuffer + outbuf[2].cbBuffer;
574
577
580 goto done;
584 goto done;
585 }
586 } else {
588 if (sspi_ret == SEC_E_INSUFFICIENT_MEMORY)
590 else
592 goto done;
593 }
594
595 done:
597 return ret < 0 ?
ret : outbuf[1].cbBuffer;
598 }
599
601 {
604 }
605
607 {
610 }
611
615 };
616
622 };
623
635 };