1 /** 2 * Windows API header module 3 * 4 * Translated from MinGW Windows headers 5 * 6 * Authors: Ellery Newcomer 7 * License: $(LINK2 http://www.boost.org/LICENSE_1_0.txt, Boost License 1.0) 8 * Source: $(DRUNTIMESRC core/sys/windows/_ntsecpkg.d) 9 */ 10 /// Automatically imported and edited from the druntime module 11 /// core.sys.windows.ntsecpkg for the auto-generated win32 package. 12 module win32.ntsecpkg; 13 //version (Windows): 14 @system: 15 16 import win32.windef, win32.ntsecapi, win32.security, win32.ntdef, win32.sspi; 17 import win32.basetyps : GUID; 18 import win32.winbase; 19 20 extern(Windows): 21 22 enum :ULONG{ 23 ISC_REQ_DELEGATE = 1, 24 ISC_REQ_MUTUAL_AUTH = 2, 25 ISC_REQ_REPLAY_DETECT = 4, 26 ISC_REQ_SEQUENCE_DETECT = 8, 27 ISC_REQ_CONFIDENTIALITY = 16, 28 ISC_REQ_USE_SESSION_KEY = 32, 29 ISC_REQ_PROMPT_FOR_CREDS = 64, 30 ISC_REQ_USE_SUPPLIED_CREDS = 128, 31 ISC_REQ_ALLOCATE_MEMORY = 256, 32 ISC_REQ_USE_DCE_STYLE = 512, 33 ISC_REQ_DATAGRAM = 1024, 34 ISC_REQ_CONNECTION = 2048, 35 ISC_REQ_EXTENDED_ERROR = 16384, 36 ISC_REQ_STREAM = 32768, 37 ISC_REQ_INTEGRITY = 65536, 38 ISC_REQ_MANUAL_CRED_VALIDATION = 524288, 39 ISC_REQ_HTTP = 268435456, 40 } 41 42 enum ISC_RET_EXTENDED_ERROR = 16384; 43 44 enum :ULONG{ 45 ASC_REQ_DELEGATE = 1, 46 ASC_REQ_MUTUAL_AUTH = 2, 47 ASC_REQ_REPLAY_DETECT = 4, 48 ASC_REQ_SEQUENCE_DETECT = 8, 49 ASC_REQ_CONFIDENTIALITY = 16, 50 ASC_REQ_USE_SESSION_KEY = 32, 51 ASC_REQ_ALLOCATE_MEMORY = 256, 52 ASC_REQ_USE_DCE_STYLE = 512, 53 ASC_REQ_DATAGRAM = 1024, 54 ASC_REQ_CONNECTION = 2048, 55 ASC_REQ_EXTENDED_ERROR = 32768, 56 ASC_REQ_STREAM = 65536, 57 ASC_REQ_INTEGRITY = 131072, 58 } 59 60 enum SECURITY_NATIVE_DREP = 16; 61 enum SECURITY_NETWORK_DREP = 0; 62 63 enum :ULONG{ 64 SECPKG_STATE_ENCRYPTION_PERMITTED = 0x01, 65 SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED = 0x02, 66 SECPKG_STATE_DOMAIN_CONTROLLER = 0x04, 67 SECPKG_STATE_WORKSTATION = 0x08, 68 SECPKG_STATE_STANDALONE = 0x10, 69 } 70 71 /* enum definitions for Secure Service Provider/Authentication Packages */ 72 enum LSA_TOKEN_INFORMATION_TYPE { 73 LsaTokenInformationNull, 74 LsaTokenInformationV1 75 } 76 alias LSA_TOKEN_INFORMATION_TYPE* PLSA_TOKEN_INFORMATION_TYPE; 77 enum SECPKG_EXTENDED_INFORMATION_CLASS 78 { 79 SecpkgGssInfo = 1, 80 SecpkgContextThunks, 81 SecpkgMutualAuthLevel, 82 SecpkgMaxInfo 83 } 84 enum SECPKG_NAME_TYPE { 85 SecNameSamCompatible, 86 SecNameAlternateId, 87 SecNameFlat, 88 SecNameDN 89 } 90 91 /* struct definitions for SSP/AP */ 92 struct SECPKG_PRIMARY_CRED { 93 LUID LogonId; 94 UNICODE_STRING DownlevelName; 95 UNICODE_STRING DomainName; 96 UNICODE_STRING Password; 97 UNICODE_STRING OldPassword; 98 PSID UserSid; 99 ULONG Flags; 100 UNICODE_STRING DnsDomainName; 101 UNICODE_STRING Upn; 102 UNICODE_STRING LogonServer; 103 UNICODE_STRING Spare1; 104 UNICODE_STRING Spare2; 105 UNICODE_STRING Spare3; 106 UNICODE_STRING Spare4; 107 } 108 alias SECPKG_PRIMARY_CRED* PSECPKG_PRIMARY_CRED; 109 struct SECPKG_SUPPLEMENTAL_CRED { 110 UNICODE_STRING PackageName; 111 ULONG CredentialSize; 112 PUCHAR Credentials; 113 } 114 alias SECPKG_SUPPLEMENTAL_CRED* PSECPKG_SUPPLEMENTAL_CRED; 115 struct SECPKG_SUPPLEMENTAL_CRED_ARRAY { 116 ULONG CredentialCount; 117 SECPKG_SUPPLEMENTAL_CRED[1] Credentials; 118 } 119 alias SECPKG_SUPPLEMENTAL_CRED_ARRAY* PSECPKG_SUPPLEMENTAL_CRED_ARRAY; 120 struct SECPKG_PARAMETERS { 121 ULONG Version; 122 ULONG MachineState; 123 ULONG SetupMode; 124 PSID DomainSid; 125 UNICODE_STRING DomainName; 126 UNICODE_STRING DnsDomainName; 127 GUID DomainGuid; 128 } 129 alias SECPKG_PARAMETERS* PSECPKG_PARAMETERS,PSECPKG_EVENT_DOMAIN_CHANGE; 130 alias SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE; 131 struct SECPKG_CLIENT_INFO { 132 LUID LogonId; 133 ULONG ProcessID; 134 ULONG ThreadID; 135 BOOLEAN HasTcbPrivilege; 136 BOOLEAN Impersonating; 137 BOOLEAN Restricted; 138 } 139 alias SECPKG_CLIENT_INFO* PSECPKG_CLIENT_INFO; 140 struct SECURITY_USER_DATA { 141 SECURITY_STRING UserName; 142 SECURITY_STRING LogonDomainName; 143 SECURITY_STRING LogonServer; 144 PSID pSid; 145 } 146 alias SECURITY_USER_DATA* PSECURITY_USER_DATA,PSecurityUserData; 147 alias SECURITY_USER_DATA SecurityUserData; 148 struct SECPKG_GSS_INFO { 149 ULONG EncodedIdLength; 150 UCHAR[4] EncodedId; 151 } 152 alias SECPKG_GSS_INFO* PSECPKG_GSS_INFO; 153 struct SECPKG_CONTEXT_THUNKS { 154 ULONG InfoLevelCount; 155 ULONG[1] Levels; 156 } 157 alias SECPKG_CONTEXT_THUNKS* PSECPKG_CONTEXT_THUNKS; 158 struct SECPKG_MUTUAL_AUTH_LEVEL { 159 ULONG MutualAuthLevel; 160 } 161 alias SECPKG_MUTUAL_AUTH_LEVEL* PSECPKG_MUTUAL_AUTH_LEVEL; 162 struct SECPKG_CALL_INFO { 163 ULONG ProcessId; 164 ULONG ThreadId; 165 ULONG Attributes; 166 ULONG CallCount; 167 } 168 alias SECPKG_CALL_INFO* PSECPKG_CALL_INFO; 169 struct SECPKG_EXTENDED_INFORMATION { 170 SECPKG_EXTENDED_INFORMATION_CLASS Class; 171 union _Info{ 172 SECPKG_GSS_INFO GssInfo; 173 SECPKG_CONTEXT_THUNKS ContextThunks; 174 SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel; 175 } 176 _Info Info; 177 } 178 alias SECPKG_EXTENDED_INFORMATION* PSECPKG_EXTENDED_INFORMATION; 179 180 /* callbacks implemented by SSP/AP dlls and called by the LSA */ 181 alias void function(ULONG_PTR, ULONG_PTR, PSecBuffer, 182 PSecBuffer) PLSA_CALLBACK_FUNCTION; 183 184 /* misc typedefs used in the below prototypes */ 185 alias PVOID* PLSA_CLIENT_REQUEST; 186 alias ULONG_PTR LSA_SEC_HANDLE; 187 alias LSA_SEC_HANDLE* PLSA_SEC_HANDLE; 188 alias LPTHREAD_START_ROUTINE SEC_THREAD_START; 189 alias PSECURITY_ATTRIBUTES SEC_ATTRS; 190 191 /* functions used by SSP/AP obtainable by dispatch tables */ 192 alias NTSTATUS function(ULONG, PLSA_CALLBACK_FUNCTION) PLSA_REGISTER_CALLBACK; 193 alias NTSTATUS function(PLUID) PLSA_CREATE_LOGON_SESSION; 194 alias NTSTATUS function(PLUID) PLSA_DELETE_LOGON_SESSION; 195 alias NTSTATUS function(PLUID, ULONG, PLSA_STRING, 196 PLSA_STRING) PLSA_ADD_CREDENTIAL; 197 alias NTSTATUS function(PLUID, ULONG, PULONG, BOOLEAN, 198 PLSA_STRING, PULONG, PLSA_STRING) PLSA_GET_CREDENTIALS; 199 alias NTSTATUS function(PLUID, ULONG, PLSA_STRING) PLSA_DELETE_CREDENTIAL; 200 alias PVOID function(ULONG) PLSA_ALLOCATE_LSA_HEAP; 201 alias void function(PVOID) PLSA_FREE_LSA_HEAP; 202 alias NTSTATUS function(PLSA_CLIENT_REQUEST, 203 ULONG, PVOID*) PLSA_ALLOCATE_CLIENT_BUFFER; 204 alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID) PLSA_FREE_CLIENT_BUFFER; 205 alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG, 206 PVOID, PVOID) PLSA_COPY_TO_CLIENT_BUFFER; 207 alias NTSTATUS function(PLSA_CLIENT_REQUEST, 208 ULONG, PVOID, PVOID) PLSA_COPY_FROM_CLIENT_BUFFER; 209 alias NTSTATUS function() PLSA_IMPERSONATE_CLIENT; 210 alias NTSTATUS function() PLSA_UNLOAD_PACKAGE; 211 alias NTSTATUS function(HANDLE, PHANDLE) PLSA_DUPLICATE_HANDLE; 212 alias NTSTATUS function(PLUID, ULONG, 213 PVOID, BOOLEAN) PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS; 214 alias HANDLE function(SEC_ATTRS, ULONG, SEC_THREAD_START, 215 PVOID, ULONG, PULONG) PLSA_CREATE_THREAD; 216 alias NTSTATUS function(PSECPKG_CLIENT_INFO) PLSA_GET_CLIENT_INFO; 217 alias HANDLE function(SEC_THREAD_START, PVOID, 218 ULONG, ULONG, ULONG, ULONG, HANDLE) PLSA_REGISTER_NOTIFICATION; 219 alias NTSTATUS function(HANDLE) PLSA_CANCEL_NOTIFICATION; 220 alias NTSTATUS function(PSecBuffer, PSecBuffer) PLSA_MAP_BUFFER; 221 alias NTSTATUS function(PLUID, PTOKEN_SOURCE, 222 SECURITY_LOGON_TYPE, SECURITY_IMPERSONATION_LEVEL, LSA_TOKEN_INFORMATION_TYPE, 223 PVOID, PTOKEN_GROUPS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, 224 PUNICODE_STRING, PHANDLE, PNTSTATUS) PLSA_CREATE_TOKEN; 225 alias void function(NTSTATUS, NTSTATUS, PUNICODE_STRING, 226 PUNICODE_STRING, PUNICODE_STRING, PSID, SECURITY_LOGON_TYPE, 227 PTOKEN_SOURCE, PLUID) PLSA_AUDIT_LOGON; 228 alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG, 229 PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE; 230 alias BOOLEAN function(PSECPKG_CALL_INFO) PLSA_GET_CALL_INFO; 231 alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID, 232 ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGEEX; 233 alias PVOID function(ULONG, ULONG) PLSA_CREATE_SHARED_MEMORY; 234 alias PVOID function(PVOID, ULONG) PLSA_ALLOCATE_SHARED_MEMORY; 235 alias void function(PVOID, PVOID) PLSA_FREE_SHARED_MEMORY; 236 alias BOOLEAN function(PVOID) PLSA_DELETE_SHARED_MEMORY; 237 alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE, 238 PSECURITY_STRING, BOOLEAN, ULONG, PVOID*) PLSA_OPEN_SAM_USER; 239 alias NTSTATUS function(PVOID, PVOID *, PULONG, 240 PVOID *, PULONG) PLSA_GET_USER_CREDENTIALS; 241 alias NTSTATUS function(PVOID, PUCHAR *, PULONG) PLSA_GET_USER_AUTH_DATA; 242 alias NTSTATUS function(PVOID) PLSA_CLOSE_SAM_USER; 243 alias NTSTATUS function(PVOID, ULONG, 244 SECURITY_IMPERSONATION_LEVEL, PTOKEN_SOURCE, SECURITY_LOGON_TYPE, 245 PUNICODE_STRING, PHANDLE, PLUID, PUNICODE_STRING, PNTSTATUS) PLSA_CONVERT_AUTH_DATA_TO_TOKEN; 246 alias NTSTATUS function(PCHAR, ULONG_PTR, ULONG_PTR, 247 PSecBuffer, PSecBuffer) PLSA_CLIENT_CALLBACK; 248 alias NTSTATUS function(PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY) PLSA_UPDATE_PRIMARY_CREDENTIALS; 249 alias NTSTATUS function(PSECURITY_STRING, 250 SECPKG_NAME_TYPE, PSECURITY_STRING, PUCHAR *, PULONG, PUNICODE_STRING) PLSA_GET_AUTH_DATA_FOR_USER; 251 alias NTSTATUS function(ULONG, BOOLEAN, 252 PUNICODE_STRING, PUNICODE_STRING, ULONG, PUNICODE_STRING, PUNICODE_STRING, 253 PULONG) PLSA_CRACK_SINGLE_NAME; 254 alias NTSTATUS function(ULONG, BOOLEAN, 255 PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, NTSTATUS) PLSA_AUDIT_ACCOUNT_LOGON; 256 alias NTSTATUS function(PUNICODE_STRING, PVOID, 257 PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE_PASSTHROUGH; 258 259 /* Dispatch tables of functions used by SSP/AP */ 260 struct SECPKG_DLL_FUNCTIONS { 261 PLSA_ALLOCATE_LSA_HEAP AllocateHeap; 262 PLSA_FREE_LSA_HEAP FreeHeap; 263 PLSA_REGISTER_CALLBACK RegisterCallback; 264 } 265 alias SECPKG_DLL_FUNCTIONS* PSECPKG_DLL_FUNCTIONS; 266 struct LSA_DISPATCH_TABLE { 267 PLSA_CREATE_LOGON_SESSION CreateLogonSession; 268 PLSA_DELETE_LOGON_SESSION DeleteLogonSession; 269 PLSA_ADD_CREDENTIAL AddCredential; 270 PLSA_GET_CREDENTIALS GetCredentials; 271 PLSA_DELETE_CREDENTIAL DeleteCredential; 272 PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap; 273 PLSA_FREE_LSA_HEAP FreeLsaHeap; 274 PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer; 275 PLSA_FREE_CLIENT_BUFFER FreeClientBuffer; 276 PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer; 277 PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer; 278 } 279 alias LSA_DISPATCH_TABLE* PLSA_DISPATCH_TABLE; 280 struct LSA_SECPKG_FUNCTION_TABLE { 281 PLSA_CREATE_LOGON_SESSION CreateLogonSession; 282 PLSA_DELETE_LOGON_SESSION DeleteLogonSession; 283 PLSA_ADD_CREDENTIAL AddCredential; 284 PLSA_GET_CREDENTIALS GetCredentials; 285 PLSA_DELETE_CREDENTIAL DeleteCredential; 286 PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap; 287 PLSA_FREE_LSA_HEAP FreeLsaHeap; 288 PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer; 289 PLSA_FREE_CLIENT_BUFFER FreeClientBuffer; 290 PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer; 291 PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer; 292 PLSA_IMPERSONATE_CLIENT ImpersonateClient; 293 PLSA_UNLOAD_PACKAGE UnloadPackage; 294 PLSA_DUPLICATE_HANDLE DuplicateHandle; 295 PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials; 296 PLSA_CREATE_THREAD CreateThread; 297 PLSA_GET_CLIENT_INFO GetClientInfo; 298 PLSA_REGISTER_NOTIFICATION RegisterNotification; 299 PLSA_CANCEL_NOTIFICATION CancelNotification; 300 PLSA_MAP_BUFFER MapBuffer; 301 PLSA_CREATE_TOKEN CreateToken; 302 PLSA_AUDIT_LOGON AuditLogon; 303 PLSA_CALL_PACKAGE CallPackage; 304 PLSA_FREE_LSA_HEAP FreeReturnBuffer; 305 PLSA_GET_CALL_INFO GetCallInfo; 306 PLSA_CALL_PACKAGEEX CallPackageEx; 307 PLSA_CREATE_SHARED_MEMORY CreateSharedMemory; 308 PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory; 309 PLSA_FREE_SHARED_MEMORY FreeSharedMemory; 310 PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory; 311 PLSA_OPEN_SAM_USER OpenSamUser; 312 PLSA_GET_USER_CREDENTIALS GetUserCredentials; 313 PLSA_GET_USER_AUTH_DATA GetUserAuthData; 314 PLSA_CLOSE_SAM_USER CloseSamUser; 315 PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken; 316 PLSA_CLIENT_CALLBACK ClientCallback; 317 PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials; 318 PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser; 319 PLSA_CRACK_SINGLE_NAME CrackSingleName; 320 PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon; 321 PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough; 322 } 323 alias LSA_SECPKG_FUNCTION_TABLE* PLSA_SECPKG_FUNCTION_TABLE; 324 325 /* functions implemented by SSP/AP obtainable by dispatch tables */ 326 alias NTSTATUS function(ULONG, PLSA_DISPATCH_TABLE, 327 PLSA_STRING, PLSA_STRING, PLSA_STRING *) PLSA_AP_INITIALIZE_PACKAGE; 328 alias NTSTATUS function(LPWSTR, LPWSTR, LPWSTR, LPWSTR, 329 DWORD, DWORD, PHANDLE) PLSA_AP_LOGON_USER; 330 alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG, 331 PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE; 332 alias void function(PLUID) PLSA_AP_LOGON_TERMINATED; 333 alias NTSTATUS function(PLSA_CLIENT_REQUEST, 334 PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_UNTRUSTED; 335 alias NTSTATUS function(PUNICODE_STRING, 336 PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_PASSTHROUGH; 337 alias NTSTATUS function(PLSA_CLIENT_REQUEST, 338 SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS, 339 PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *, 340 PUNICODE_STRING *) PLSA_AP_LOGON_USER_EX; 341 alias NTSTATUS function(PLSA_CLIENT_REQUEST, 342 SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS, 343 PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *, 344 PUNICODE_STRING *, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY *) PLSA_AP_LOGON_USER_EX2; 345 alias NTSTATUS function(ULONG_PTR, PSECPKG_PARAMETERS, 346 PLSA_SECPKG_FUNCTION_TABLE) SpInitializeFn; 347 alias NTSTATUS function() SpShutDownFn; 348 alias NTSTATUS function(PSecPkgInfoW) SpGetInfoFn; 349 alias NTSTATUS function(SECURITY_LOGON_TYPE, 350 PUNICODE_STRING, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED) SpAcceptCredentialsFn; 351 alias NTSTATUS function(PUNICODE_STRING, ULONG, 352 PLUID, PVOID, PVOID, PVOID, PLSA_SEC_HANDLE, PTimeStamp) SpAcquireCredentialsHandleFn; 353 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryCredentialsAttributesFn; 354 alias NTSTATUS function(LSA_SEC_HANDLE) SpFreeCredentialsHandleFn; 355 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpSaveCredentialsFn; 356 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpGetCredentialsFn; 357 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpDeleteCredentialsFn; 358 alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE, 359 PUNICODE_STRING, ULONG, ULONG, PSecBufferDesc, PLSA_SEC_HANDLE, PSecBufferDesc, 360 PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpInitLsaModeContextFn; 361 alias NTSTATUS function(LSA_SEC_HANDLE, 362 LSA_SEC_HANDLE, PSecBufferDesc, ULONG, ULONG, PLSA_SEC_HANDLE, PSecBufferDesc, 363 PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpAcceptLsaModeContextFn; 364 alias NTSTATUS function(LSA_SEC_HANDLE) SpDeleteContextFn; 365 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpApplyControlTokenFn; 366 alias NTSTATUS function(PLUID, ULONG, PSecurityUserData *) SpGetUserInfoFn; 367 alias NTSTATUS function(SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION *) SpGetExtendedInformationFn; 368 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryContextAttributesFn; 369 alias NTSTATUS function(LSA_SEC_HANDLE, PUNICODE_STRING, 370 PUNICODE_STRING, ULONG, PVOID, PVOID, PVOID, PTimeStamp) SpAddCredentialsFn; 371 alias NTSTATUS function( 372 SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION) SpSetExtendedInformationFn; 373 alias NTSTATUS function(ULONG, PSECPKG_DLL_FUNCTIONS, 374 PVOID *) SpInstanceInitFn; 375 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpInitUserModeContextFn; 376 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, 377 PSecBufferDesc, ULONG) SpMakeSignatureFn; 378 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc, 379 ULONG, PULONG) SpVerifySignatureFn; 380 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc, 381 ULONG) SpSealMessageFn; 382 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc, 383 ULONG, PULONG) SpUnsealMessageFn; 384 alias NTSTATUS function(LSA_SEC_HANDLE, PHANDLE) SpGetContextTokenFn; 385 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpCompleteAuthTokenFn; 386 alias NTSTATUS function(PSecBuffer, PSecBuffer) SpFormatCredentialsFn; 387 alias NTSTATUS function(ULONG, PUCHAR, PULONG, 388 PVOID *) SpMarshallSupplementalCredsFn; 389 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, 390 PSecBuffer, PHANDLE) SpExportSecurityContextFn; 391 alias NTSTATUS function(PSecBuffer, HANDLE, 392 PLSA_SEC_HANDLE) SpImportSecurityContextFn; 393 394 /* Dispatch tables of functions implemented by SSP/AP */ 395 struct SECPKG_FUNCTION_TABLE { 396 PLSA_AP_INITIALIZE_PACKAGE InitializePackage; 397 PLSA_AP_LOGON_USER LogonUser; 398 PLSA_AP_CALL_PACKAGE CallPackage; 399 PLSA_AP_LOGON_TERMINATED LogonTerminated; 400 PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted; 401 PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough; 402 PLSA_AP_LOGON_USER_EX LogonUserEx; 403 PLSA_AP_LOGON_USER_EX2 LogonUserEx2; 404 SpInitializeFn *Initialize; 405 SpShutDownFn *Shutdown; 406 SpGetInfoFn *GetInfo; 407 SpAcceptCredentialsFn *AcceptCredentials; 408 SpAcquireCredentialsHandleFn *AcquireCredentialsHandle; 409 SpQueryCredentialsAttributesFn *QueryCredentialsAttributes; 410 SpFreeCredentialsHandleFn *FreeCredentialsHandle; 411 SpSaveCredentialsFn *SaveCredentials; 412 SpGetCredentialsFn *GetCredentials; 413 SpDeleteCredentialsFn *DeleteCredentials; 414 SpInitLsaModeContextFn *InitLsaModeContext; 415 SpAcceptLsaModeContextFn *AcceptLsaModeContext; 416 SpDeleteContextFn *DeleteContext; 417 SpApplyControlTokenFn *ApplyControlToken; 418 SpGetUserInfoFn *GetUserInfo; 419 SpGetExtendedInformationFn *GetExtendedInformation; 420 SpQueryContextAttributesFn *QueryContextAttributes; 421 SpAddCredentialsFn *AddCredentials; 422 SpSetExtendedInformationFn *SetExtendedInformation; 423 } 424 alias SECPKG_FUNCTION_TABLE* PSECPKG_FUNCTION_TABLE; 425 426 struct SECPKG_USER_FUNCTION_TABLE { 427 SpInstanceInitFn *InstanceInit; 428 SpInitUserModeContextFn *InitUserModeContext; 429 SpMakeSignatureFn *MakeSignature; 430 SpVerifySignatureFn *VerifySignature; 431 SpSealMessageFn *SealMessage; 432 SpUnsealMessageFn *UnsealMessage; 433 SpGetContextTokenFn *GetContextToken; 434 SpQueryContextAttributesFn *QueryContextAttributes; 435 SpCompleteAuthTokenFn *CompleteAuthToken; 436 SpDeleteContextFn *DeleteUserModeContext; 437 SpFormatCredentialsFn *FormatCredentials; 438 SpMarshallSupplementalCredsFn *MarshallSupplementalCreds; 439 SpExportSecurityContextFn *ExportContext; 440 SpImportSecurityContextFn *ImportContext; 441 } 442 alias SECPKG_USER_FUNCTION_TABLE* PSECPKG_USER_FUNCTION_TABLE; 443 444 /* Entry points to SSP/AP */ 445 alias NTSTATUS function(ULONG, PULONG, 446 PSECPKG_FUNCTION_TABLE *, PULONG) SpLsaModeInitializeFn; 447 alias NTSTATUS function(ULONG, PULONG, 448 PSECPKG_USER_FUNCTION_TABLE *, PULONG) SpUserModeInitializeFn; 449