InitializeSecurityContextA function (sspi.h)
The InitializeSecurityContext (General) function initiates the client side, outbound security context from a credential handle. The function is used to build a security context between the client application and a remote peer. InitializeSecurityContext (General) returns a token that the client must pass to the remote peer, which the peer in turn submits to the local security implementation through the AcceptSecurityContext (General) call. The token generated should be considered opaque by all callers.
Typically, the InitializeSecurityContext (General) function is called in a loop until a sufficient security context is established.
For information about using this function with a specific security support provider (SSP), see the following topics.
|InitializeSecurityContext (CredSSP)||Initiates the client side, outbound security context from a credential handle by using the Credential Security Support Provider (CredSSP).|
|InitializeSecurityContext (Digest)||Initiates the client side, outbound security context from a credential handle by using the Digest security package.|
|InitializeSecurityContext (Kerberos)||Initiates the client side, outbound security context from a credential handle by using the Kerberos security package.|
|InitializeSecurityContext (Negotiate)||Initiates the client side, outbound security context from a credential handle by using the Negotiate security package.|
|InitializeSecurityContext (NTLM)||Initiates the client side, outbound security context from a credential handle by using the NTLM security package.|
|InitializeSecurityContext (Schannel)||Initiates the client side, outbound security context from a credential handle by using the Schannel security package.|
SECURITY_STATUS SEC_ENTRY InitializeSecurityContextA( [in, optional] PCredHandle phCredential, [in, optional] PCtxtHandle phContext, SEC_CHAR *pszTargetName, [in] unsigned long fContextReq, [in] unsigned long Reserved1, [in] unsigned long TargetDataRep, [in, optional] PSecBufferDesc pInput, [in] unsigned long Reserved2, [in, out, optional] PCtxtHandle phNewContext, [in, out, optional] PSecBufferDesc pOutput, [out] unsigned long *pfContextAttr, [out, optional] PTimeStamp ptsExpiry );
[in, optional] phCredential
A handle to the credentials returned by AcquireCredentialsHandle (General). This handle is used to build the security context. The InitializeSecurityContext (General) function requires at least OUTBOUND credentials.
[in, optional] phContext
A pointer to a CtxtHandle structure. On the first call to InitializeSecurityContext (General), this pointer is NULL. On the second call, this parameter is a pointer to the handle to the partially formed context returned in the phNewContext parameter by the first call.
This parameter is optional with the Microsoft Digest SSP and can be set to NULL.
When using the Schannel SSP, on the first call to InitializeSecurityContext (General), specify NULL. On future calls, specify the token received in the phNewContext parameter after the first call to this function.
Bit flags that indicate requests for the context. Not all packages can support all requirements. Flags used for this parameter are prefixed with ISC_REQ_, for example, ISC_REQ_DELEGATE. This parameter can be one or more of the following attributes flags.
||The security package allocates output buffers for you. When you have finished using the output buffers, free them by calling the FreeContextBuffer function.|
||Encrypt messages by using the EncryptMessage function.|
||The security context will not handle formatting messages. This value is the default for the Kerberos, Negotiate, and NTLM security packages.|
||The server can use the context to authenticate to other servers as the client. The ISC_REQ_MUTUAL_AUTH flag must be set for this flag to work. Valid for Kerberos. Ignore this flag for constrained delegation.|
||When errors occur, the remote party will be notified.|
||Use Digest for HTTP. Omit this flag to use Digest as a SASL mechanism.|
||Sign messages and verify signatures by using the EncryptMessage and MakeSignature functions.|
||Schannel must not authenticate the server automatically.|
The mutual authentication policy of the service will be satisfied.
Caution This does not necessarily mean that mutual authentication is performed, only that the authentication policy of the service is satisfied. To ensure that mutual authentication is performed, call the QueryContextAttributes (General) function.
If this flag is set, the ISC_REQ_INTEGRITY flag is ignored.
This value is supported only by the Negotiate and Kerberos security packages.
||Detect replayed messages that have been encoded by using the EncryptMessage or MakeSignature functions.|
||Detect messages received out of sequence.|
||Support a stream-oriented connection.|
A new session key must be negotiated.
This value is supported only by the Kerberos security package.
||Schannel must not attempt to supply credentials for the client automatically.|
The requested attributes may not be supported by the client. For more information, see the pfContextAttr parameter.
For further descriptions of the various attributes, see Context Requirements.
This parameter is reserved and must be set to zero.
The data representation, such as byte ordering, on the target. This parameter can be either SECURITY_NATIVE_DREP or SECURITY_NETWORK_DREP.
This parameter is not used with Digest or Schannel. Set it to zero.
[in, optional] pInput
A pointer to a SecBufferDesc structure that contains pointers to the buffers supplied as input to the package. Unless the client context was initiated by the server, the value of this parameter must be NULL on the first call to the function. On subsequent calls to the function or when the client context was initiated by the server, the value of this parameter is a pointer to a buffer allocated with enough memory to hold the token returned by the remote computer.
This parameter is reserved and must be set to zero.
[in, out, optional] phNewContext
A pointer to a CtxtHandle structure. On the first call to InitializeSecurityContext (General), this pointer receives the new context handle. On the second call, phNewContext can be the same as the handle specified in the phContext parameter.
When using the Schannel SSP, on calls after the first call, pass the handle returned here as the phContext parameter and specify NULL for phNewContext.
[in, out, optional] pOutput
A pointer to a SecBufferDesc structure that contains pointers to the SecBuffer structure that receives the output data. If a buffer was typed as SEC_READWRITE in the input, it will be there on output. The system will allocate a buffer for the security token if requested (through ISC_REQ_ALLOCATE_MEMORY) and fill in the address in the buffer descriptor for the security token.
When using the Microsoft Digest SSP, this parameter receives the challenge response that must be sent to the server.
When using the Schannel SSP, if the ISC_REQ_ALLOCATE_MEMORY flag is specified, the Schannel SSP will allocate memory for the buffer and put the appropriate information in the SecBufferDesc. In addition, the caller must pass in a buffer of type SECBUFFER_ALERT. On output, if an alert is generated, this buffer contains information about that alert, and the function fails.
Flags used for this parameter are prefixed with ISC_RET, such as ISC_RET_DELEGATE.
For a list of valid values, see the fContextReq parameter.
Do not check for security-related attributes until the final function call returns successfully. Attribute flags that are not related to security, such as the ASC_RET_ALLOCATED_MEMORY flag, can be checked before the final return.
[out, optional] ptsExpiry
A pointer to a TimeStamp structure that receives the expiration time of the context. It is recommended that the security package always return this value in local time. This parameter is optional and NULL should be passed for short-lived clients.
There is no expiration time for Microsoft Digest SSP security contexts or credentials.
If the function succeeds, the function returns one of the following success codes.
||The client must call CompleteAuthToken and then pass the output to the server. The client then waits for a returned token and passes it, in another call, to InitializeSecurityContext (General).|
||The client must finish building the message and then call the CompleteAuthToken function.|
||The client must send the output token to the server and wait for a return token. The returned token is then passed in another call to InitializeSecurityContext (General). The output token can be empty.|
||Use with Schannel. The server has requested client authentication, and the supplied credentials either do not include a certificate or the certificate was not issued by a certification authority that is trusted by the server. For more information, see Remarks.|
Use with Schannel. Data for the whole message was not read from the wire.
When this value is returned, the pInput buffer contains a SecBuffer structure with a BufferType member of SECBUFFER_MISSING. The cbBuffer member of SecBuffer contains a value that indicates the number of additional bytes that the function must read from the client before this function succeeds. While this number is not always accurate, using it can help improve performance by avoiding multiple calls to this function.
||The security context was successfully initialized. There is no need for another InitializeSecurityContext (General) call. If the function returns an output token, that is, if the SECBUFFER_TOKEN in pOutput is of nonzero length, that token must be sent to the server.|
If the function fails, the function returns one of the following error codes.
||There is not enough memory available to complete the requested action.|
||An error occurred that did not map to an SSPI error code.|
||The handle passed to the function is not valid.|
||The error is due to a malformed input token, such as a token corrupted in transit, a token of incorrect size, or a token passed into the wrong security package. Passing a token to the wrong package can happen if the client and server did not negotiate the proper security package.|
||The logon failed.|
||No authority could be contacted for authentication. The domain name of the authenticating party could be wrong, the domain could be unreachable, or there might have been a trust relationship failure.|
||No credentials are available in the security package.|
||The target was not recognized.|
||A context attribute flag that is not valid (ISC_REQ_DELEGATE or ISC_REQ_PROMPT_FOR_CREDS) was specified in the fContextReq parameter.|
||The principal that received the authentication request is not the same as the one passed into the pszTargetName parameter. This indicates a failure in mutual authentication.|
The caller is responsible for determining whether the final context attributes are sufficient. If, for example, confidentiality was requested, but could not be established, some applications may choose to shut down the connection immediately.
If attributes of the security context are not sufficient, the client must free the partially created context by calling the DeleteSecurityContext function.
The InitializeSecurityContext (General) function is used by a client to initialize an outbound context.
For a two-leg security context, the calling sequence is as follows:
- The client calls the function with phContext set to NULL and fills in the buffer descriptor with the input message.
- The security package examines the parameters and constructs an opaque token, placing it in the TOKEN element in the buffer array. If the fContextReq parameter includes the ISC_REQ_ALLOCATE_MEMORY flag, the security package allocates the memory and returns the pointer in the TOKEN element.
- The client sends the token returned in the pOutput buffer to the target server. The server then passes the token as an input argument in a call to the AcceptSecurityContext (General) function.
- AcceptSecurityContext (General) may return a token, which the server sends to the client for a second call to InitializeSecurityContext (General) if the first call returned SEC_I_CONTINUE_NEEDED.
- The client calls the function as described earlier, but the package returns the SEC_I_CONTINUE_NEEDED success code.
- The client sends the output token to the server and waits for the server's reply.
- Upon receipt of the server's response, the client calls InitializeSecurityContext (General) again, with phContext set to the handle that was returned from the last call. The token received from the server is supplied in the pInput parameter.
If the function returns one of the error responses, the server's response is not accepted, and the session is not established.
If the function returns SEC_I_CONTINUE_NEEDED, SEC_I_COMPLETE_NEEDED, or SEC_I_COMPLETE_AND_CONTINUE, steps 2 and 3 are repeated.
To initialize a security context, more than one call to this function may be required, depending on the underlying authentication mechanism as well as the choices specified in the fContextReq parameter.
The fContextReq and pfContextAttributes parameters are bitmasks that represent various context attributes. For a description of the various attributes, see Context Requirements. The pfContextAttributes parameter is valid on any successful return, but only on the final successful return should you examine the flags that pertain to security aspects of the context. Intermediate returns can set, for example, the ISC_RET_ALLOCATED_MEMORY flag.
If the ISC_REQ_USE_SUPPLIED_CREDS flag is set, the security package must look for a SECBUFFER_PKG_PARAMS buffer type in the pInput input buffer. This is not a generic solution, but it allows for a strong pairing of security package and application when appropriate.
If ISC_REQ_ALLOCATE_MEMORY was specified, the caller must free the memory by calling the FreeContextBuffer function.
For example, the input token could be the challenge from a LAN Manager. In this case, the output token would be the NTLM-encrypted response to the challenge.
The action the client takes depends on the return code from this function. If the return code is SEC_E_OK, there will be no second InitializeSecurityContext (General) call, and no response from the server is expected. If the return code is SEC_I_CONTINUE_NEEDED, the client expects a token in response from the server and passes it in a second call to InitializeSecurityContext (General). The SEC_I_COMPLETE_NEEDED return code indicates that the client must finish building the message and call the CompleteAuthToken function. The SEC_I_COMPLETE_AND_CONTINUE code incorporates both of these actions.
If InitializeSecurityContext (General) returns success on the first (or only) call, then the caller must eventually call the DeleteSecurityContext function on the returned handle, even if the call fails on a later leg of the authentication exchange.
The client may call InitializeSecurityContext (General) again after it has completed successfully. This indicates to the security package that a reauthentication is wanted.
Kernel mode callers have the following differences: the target name is a Unicode string that must be allocated in virtual memory by using VirtualAlloc; it must not be allocated from the pool. Buffers passed and supplied in pInput and pOutput must be in virtual memory, not in the pool.
When using the Schannel SSP, if the function returns SEC_I_INCOMPLETE_CREDENTIALS, check that you specified a valid and trusted certificate in your credentials. The certificate is specified when calling the AcquireCredentialsHandle (General) function. The certificate must be a client authentication certificate issued by a certification authority (CA) trusted by the server. To obtain a list of the CAs trusted by the server, call the QueryContextAttributes (General) function and specify the SECPKG_ATTR_ISSUER_LIST_EX attribute.
When using the Schannel SSP, after a client application receives an authentication certificate from a CA that is trusted by the server, the application creates a new credential by calling the AcquireCredentialsHandle (General) function and then calling InitializeSecurityContext (General) again, specifying the new credential in the phCredential parameter.
The sspi.h header defines InitializeSecurityContext as an alias which automatically selects the ANSI or Unicode version of this function based on the definition of the UNICODE preprocessor constant. Mixing usage of the encoding-neutral alias with code that not encoding-neutral can lead to mismatches that result in compilation or runtime errors. For more information, see Conventions for Function Prototypes.
|Minimum supported client||Windows XP [desktop apps only]|
|Minimum supported server||Windows Server 2003 [desktop apps only]|
|Header||sspi.h (include Security.h)|