1 /**
2  * Windows API header module
3  *
4  * Translated from MinGW Windows headers
5  *
6  * Authors: Ellery Newcomer
7  * License: $(LINK2 http://www.boost.org/LICENSE_1_0.txt, Boost License 1.0)
8  * Source: $(DRUNTIMESRC core/sys/windows/_ntsecpkg.d)
9  */
10 /// Automatically imported and edited from the druntime module
11 /// core.sys.windows.ntsecpkg for the auto-generated win32 package.
12 module win32.ntsecpkg;
13 //version (Windows):
14 @system:
15 
16 import win32.windef, win32.ntsecapi, win32.security, win32.ntdef, win32.sspi;
17 import win32.basetyps : GUID;
18 import win32.winbase;
19 
20 extern(Windows):
21 
22 enum :ULONG{
23     ISC_REQ_DELEGATE = 1,
24     ISC_REQ_MUTUAL_AUTH = 2,
25     ISC_REQ_REPLAY_DETECT = 4,
26     ISC_REQ_SEQUENCE_DETECT = 8,
27     ISC_REQ_CONFIDENTIALITY  = 16,
28     ISC_REQ_USE_SESSION_KEY = 32,
29     ISC_REQ_PROMPT_FOR_CREDS = 64,
30     ISC_REQ_USE_SUPPLIED_CREDS  = 128,
31     ISC_REQ_ALLOCATE_MEMORY = 256,
32     ISC_REQ_USE_DCE_STYLE = 512,
33     ISC_REQ_DATAGRAM = 1024,
34     ISC_REQ_CONNECTION = 2048,
35     ISC_REQ_EXTENDED_ERROR = 16384,
36     ISC_REQ_STREAM = 32768,
37     ISC_REQ_INTEGRITY = 65536,
38     ISC_REQ_MANUAL_CRED_VALIDATION = 524288,
39     ISC_REQ_HTTP  = 268435456,
40 }
41 
42 enum ISC_RET_EXTENDED_ERROR = 16384;
43 
44 enum :ULONG{
45     ASC_REQ_DELEGATE = 1,
46     ASC_REQ_MUTUAL_AUTH = 2,
47     ASC_REQ_REPLAY_DETECT = 4,
48     ASC_REQ_SEQUENCE_DETECT = 8,
49     ASC_REQ_CONFIDENTIALITY = 16,
50     ASC_REQ_USE_SESSION_KEY = 32,
51     ASC_REQ_ALLOCATE_MEMORY = 256,
52     ASC_REQ_USE_DCE_STYLE = 512,
53     ASC_REQ_DATAGRAM = 1024,
54     ASC_REQ_CONNECTION = 2048,
55     ASC_REQ_EXTENDED_ERROR = 32768,
56     ASC_REQ_STREAM = 65536,
57     ASC_REQ_INTEGRITY = 131072,
58 }
59 
60 enum SECURITY_NATIVE_DREP  = 16;
61 enum SECURITY_NETWORK_DREP = 0;
62 
63 enum :ULONG{
64     SECPKG_STATE_ENCRYPTION_PERMITTED               = 0x01,
65     SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED        = 0x02,
66     SECPKG_STATE_DOMAIN_CONTROLLER                  = 0x04,
67     SECPKG_STATE_WORKSTATION                        = 0x08,
68     SECPKG_STATE_STANDALONE                         = 0x10,
69 }
70 
71 /* enum definitions for Secure Service Provider/Authentication Packages */
72 enum LSA_TOKEN_INFORMATION_TYPE {
73     LsaTokenInformationNull,
74     LsaTokenInformationV1
75 }
76 alias LSA_TOKEN_INFORMATION_TYPE* PLSA_TOKEN_INFORMATION_TYPE;
77 enum SECPKG_EXTENDED_INFORMATION_CLASS
78 {
79     SecpkgGssInfo = 1,
80     SecpkgContextThunks,
81     SecpkgMutualAuthLevel,
82     SecpkgMaxInfo
83 }
84 enum SECPKG_NAME_TYPE {
85     SecNameSamCompatible,
86     SecNameAlternateId,
87     SecNameFlat,
88     SecNameDN
89 }
90 
91 /* struct definitions for SSP/AP */
92 struct SECPKG_PRIMARY_CRED {
93     LUID LogonId;
94     UNICODE_STRING DownlevelName;
95     UNICODE_STRING DomainName;
96     UNICODE_STRING Password;
97     UNICODE_STRING OldPassword;
98     PSID UserSid;
99     ULONG Flags;
100     UNICODE_STRING DnsDomainName;
101     UNICODE_STRING Upn;
102     UNICODE_STRING LogonServer;
103     UNICODE_STRING Spare1;
104     UNICODE_STRING Spare2;
105     UNICODE_STRING Spare3;
106     UNICODE_STRING Spare4;
107 }
108 alias SECPKG_PRIMARY_CRED* PSECPKG_PRIMARY_CRED;
109 struct SECPKG_SUPPLEMENTAL_CRED {
110     UNICODE_STRING PackageName;
111     ULONG CredentialSize;
112     PUCHAR Credentials;
113 }
114 alias SECPKG_SUPPLEMENTAL_CRED* PSECPKG_SUPPLEMENTAL_CRED;
115 struct SECPKG_SUPPLEMENTAL_CRED_ARRAY {
116     ULONG CredentialCount;
117     SECPKG_SUPPLEMENTAL_CRED[1] Credentials;
118 }
119 alias SECPKG_SUPPLEMENTAL_CRED_ARRAY* PSECPKG_SUPPLEMENTAL_CRED_ARRAY;
120 struct SECPKG_PARAMETERS {
121     ULONG Version;
122     ULONG MachineState;
123     ULONG SetupMode;
124     PSID DomainSid;
125     UNICODE_STRING DomainName;
126     UNICODE_STRING DnsDomainName;
127     GUID DomainGuid;
128 }
129 alias SECPKG_PARAMETERS* PSECPKG_PARAMETERS,PSECPKG_EVENT_DOMAIN_CHANGE;
130 alias SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE;
131 struct SECPKG_CLIENT_INFO {
132   LUID LogonId;
133   ULONG ProcessID;
134   ULONG ThreadID;
135   BOOLEAN HasTcbPrivilege;
136   BOOLEAN Impersonating;
137   BOOLEAN Restricted;
138 }
139 alias SECPKG_CLIENT_INFO* PSECPKG_CLIENT_INFO;
140 struct SECURITY_USER_DATA {
141     SECURITY_STRING UserName;
142     SECURITY_STRING LogonDomainName;
143     SECURITY_STRING LogonServer;
144     PSID pSid;
145 }
146 alias SECURITY_USER_DATA* PSECURITY_USER_DATA,PSecurityUserData;
147 alias SECURITY_USER_DATA SecurityUserData;
148 struct SECPKG_GSS_INFO {
149     ULONG EncodedIdLength;
150     UCHAR[4] EncodedId;
151 }
152 alias SECPKG_GSS_INFO* PSECPKG_GSS_INFO;
153 struct SECPKG_CONTEXT_THUNKS {
154     ULONG InfoLevelCount;
155     ULONG[1] Levels;
156 }
157 alias SECPKG_CONTEXT_THUNKS* PSECPKG_CONTEXT_THUNKS;
158 struct SECPKG_MUTUAL_AUTH_LEVEL {
159     ULONG MutualAuthLevel;
160 }
161 alias SECPKG_MUTUAL_AUTH_LEVEL* PSECPKG_MUTUAL_AUTH_LEVEL;
162 struct SECPKG_CALL_INFO {
163     ULONG ProcessId;
164     ULONG ThreadId;
165     ULONG Attributes;
166     ULONG CallCount;
167 }
168 alias SECPKG_CALL_INFO* PSECPKG_CALL_INFO;
169 struct SECPKG_EXTENDED_INFORMATION {
170     SECPKG_EXTENDED_INFORMATION_CLASS Class;
171     union _Info{
172         SECPKG_GSS_INFO GssInfo;
173         SECPKG_CONTEXT_THUNKS ContextThunks;
174         SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel;
175     }
176     _Info Info;
177 }
178 alias SECPKG_EXTENDED_INFORMATION* PSECPKG_EXTENDED_INFORMATION;
179 
180 /* callbacks implemented by SSP/AP dlls and called by the LSA */
181 alias void function(ULONG_PTR, ULONG_PTR, PSecBuffer,
182  PSecBuffer) PLSA_CALLBACK_FUNCTION;
183 
184 /* misc typedefs used in the below prototypes */
185 alias PVOID* PLSA_CLIENT_REQUEST;
186 alias ULONG_PTR LSA_SEC_HANDLE;
187 alias LSA_SEC_HANDLE* PLSA_SEC_HANDLE;
188 alias LPTHREAD_START_ROUTINE SEC_THREAD_START;
189 alias PSECURITY_ATTRIBUTES SEC_ATTRS;
190 
191 /* functions used by SSP/AP obtainable by dispatch tables */
192 alias NTSTATUS function(ULONG, PLSA_CALLBACK_FUNCTION) PLSA_REGISTER_CALLBACK;
193 alias NTSTATUS function(PLUID) PLSA_CREATE_LOGON_SESSION;
194 alias NTSTATUS function(PLUID) PLSA_DELETE_LOGON_SESSION;
195 alias NTSTATUS function(PLUID, ULONG, PLSA_STRING,
196  PLSA_STRING) PLSA_ADD_CREDENTIAL;
197 alias NTSTATUS function(PLUID, ULONG, PULONG, BOOLEAN,
198  PLSA_STRING, PULONG, PLSA_STRING) PLSA_GET_CREDENTIALS;
199 alias NTSTATUS function(PLUID, ULONG, PLSA_STRING) PLSA_DELETE_CREDENTIAL;
200 alias PVOID function(ULONG) PLSA_ALLOCATE_LSA_HEAP;
201 alias void function(PVOID) PLSA_FREE_LSA_HEAP;
202 alias NTSTATUS function(PLSA_CLIENT_REQUEST,
203  ULONG, PVOID*) PLSA_ALLOCATE_CLIENT_BUFFER;
204 alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID) PLSA_FREE_CLIENT_BUFFER;
205 alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG,
206  PVOID, PVOID) PLSA_COPY_TO_CLIENT_BUFFER;
207 alias NTSTATUS function(PLSA_CLIENT_REQUEST,
208  ULONG, PVOID, PVOID) PLSA_COPY_FROM_CLIENT_BUFFER;
209 alias NTSTATUS function() PLSA_IMPERSONATE_CLIENT;
210 alias NTSTATUS function() PLSA_UNLOAD_PACKAGE;
211 alias NTSTATUS function(HANDLE, PHANDLE) PLSA_DUPLICATE_HANDLE;
212 alias NTSTATUS function(PLUID, ULONG,
213  PVOID, BOOLEAN) PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS;
214 alias HANDLE function(SEC_ATTRS, ULONG, SEC_THREAD_START,
215  PVOID, ULONG, PULONG) PLSA_CREATE_THREAD;
216 alias NTSTATUS function(PSECPKG_CLIENT_INFO) PLSA_GET_CLIENT_INFO;
217 alias HANDLE function(SEC_THREAD_START, PVOID,
218  ULONG, ULONG, ULONG, ULONG, HANDLE) PLSA_REGISTER_NOTIFICATION;
219 alias NTSTATUS function(HANDLE) PLSA_CANCEL_NOTIFICATION;
220 alias NTSTATUS function(PSecBuffer, PSecBuffer) PLSA_MAP_BUFFER;
221 alias NTSTATUS function(PLUID, PTOKEN_SOURCE,
222  SECURITY_LOGON_TYPE, SECURITY_IMPERSONATION_LEVEL, LSA_TOKEN_INFORMATION_TYPE,
223  PVOID, PTOKEN_GROUPS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING,
224  PUNICODE_STRING, PHANDLE, PNTSTATUS) PLSA_CREATE_TOKEN;
225 alias void function(NTSTATUS, NTSTATUS, PUNICODE_STRING,
226  PUNICODE_STRING, PUNICODE_STRING, PSID, SECURITY_LOGON_TYPE,
227  PTOKEN_SOURCE, PLUID) PLSA_AUDIT_LOGON;
228 alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
229  PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE;
230 alias BOOLEAN function(PSECPKG_CALL_INFO) PLSA_GET_CALL_INFO;
231 alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID,
232  ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGEEX;
233 alias PVOID function(ULONG, ULONG) PLSA_CREATE_SHARED_MEMORY;
234 alias PVOID function(PVOID, ULONG) PLSA_ALLOCATE_SHARED_MEMORY;
235 alias void function(PVOID, PVOID) PLSA_FREE_SHARED_MEMORY;
236 alias BOOLEAN function(PVOID) PLSA_DELETE_SHARED_MEMORY;
237 alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE,
238  PSECURITY_STRING, BOOLEAN, ULONG, PVOID*) PLSA_OPEN_SAM_USER;
239 alias NTSTATUS function(PVOID, PVOID *, PULONG,
240  PVOID *, PULONG) PLSA_GET_USER_CREDENTIALS;
241 alias NTSTATUS function(PVOID, PUCHAR *, PULONG) PLSA_GET_USER_AUTH_DATA;
242 alias NTSTATUS function(PVOID) PLSA_CLOSE_SAM_USER;
243 alias NTSTATUS function(PVOID, ULONG,
244  SECURITY_IMPERSONATION_LEVEL, PTOKEN_SOURCE, SECURITY_LOGON_TYPE,
245  PUNICODE_STRING, PHANDLE, PLUID, PUNICODE_STRING, PNTSTATUS) PLSA_CONVERT_AUTH_DATA_TO_TOKEN;
246 alias NTSTATUS function(PCHAR, ULONG_PTR, ULONG_PTR,
247  PSecBuffer, PSecBuffer) PLSA_CLIENT_CALLBACK;
248 alias NTSTATUS function(PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY) PLSA_UPDATE_PRIMARY_CREDENTIALS;
249 alias NTSTATUS function(PSECURITY_STRING,
250  SECPKG_NAME_TYPE, PSECURITY_STRING, PUCHAR *, PULONG, PUNICODE_STRING) PLSA_GET_AUTH_DATA_FOR_USER;
251 alias NTSTATUS function(ULONG, BOOLEAN,
252  PUNICODE_STRING, PUNICODE_STRING, ULONG, PUNICODE_STRING, PUNICODE_STRING,
253  PULONG) PLSA_CRACK_SINGLE_NAME;
254 alias NTSTATUS function(ULONG, BOOLEAN,
255  PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, NTSTATUS) PLSA_AUDIT_ACCOUNT_LOGON;
256 alias NTSTATUS function(PUNICODE_STRING, PVOID,
257  PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE_PASSTHROUGH;
258 
259 /* Dispatch tables of functions used by SSP/AP */
260 struct SECPKG_DLL_FUNCTIONS {
261     PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
262     PLSA_FREE_LSA_HEAP FreeHeap;
263     PLSA_REGISTER_CALLBACK RegisterCallback;
264 }
265 alias SECPKG_DLL_FUNCTIONS* PSECPKG_DLL_FUNCTIONS;
266 struct LSA_DISPATCH_TABLE {
267     PLSA_CREATE_LOGON_SESSION CreateLogonSession;
268     PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
269     PLSA_ADD_CREDENTIAL AddCredential;
270     PLSA_GET_CREDENTIALS GetCredentials;
271     PLSA_DELETE_CREDENTIAL DeleteCredential;
272     PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
273     PLSA_FREE_LSA_HEAP FreeLsaHeap;
274     PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
275     PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
276     PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
277     PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
278 }
279 alias LSA_DISPATCH_TABLE* PLSA_DISPATCH_TABLE;
280 struct LSA_SECPKG_FUNCTION_TABLE {
281     PLSA_CREATE_LOGON_SESSION CreateLogonSession;
282     PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
283     PLSA_ADD_CREDENTIAL AddCredential;
284     PLSA_GET_CREDENTIALS GetCredentials;
285     PLSA_DELETE_CREDENTIAL DeleteCredential;
286     PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
287     PLSA_FREE_LSA_HEAP FreeLsaHeap;
288     PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
289     PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
290     PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
291     PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
292     PLSA_IMPERSONATE_CLIENT ImpersonateClient;
293     PLSA_UNLOAD_PACKAGE UnloadPackage;
294     PLSA_DUPLICATE_HANDLE DuplicateHandle;
295     PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials;
296     PLSA_CREATE_THREAD CreateThread;
297     PLSA_GET_CLIENT_INFO GetClientInfo;
298     PLSA_REGISTER_NOTIFICATION RegisterNotification;
299     PLSA_CANCEL_NOTIFICATION CancelNotification;
300     PLSA_MAP_BUFFER MapBuffer;
301     PLSA_CREATE_TOKEN CreateToken;
302     PLSA_AUDIT_LOGON AuditLogon;
303     PLSA_CALL_PACKAGE CallPackage;
304     PLSA_FREE_LSA_HEAP FreeReturnBuffer;
305     PLSA_GET_CALL_INFO GetCallInfo;
306     PLSA_CALL_PACKAGEEX CallPackageEx;
307     PLSA_CREATE_SHARED_MEMORY CreateSharedMemory;
308     PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory;
309     PLSA_FREE_SHARED_MEMORY FreeSharedMemory;
310     PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory;
311     PLSA_OPEN_SAM_USER OpenSamUser;
312     PLSA_GET_USER_CREDENTIALS GetUserCredentials;
313     PLSA_GET_USER_AUTH_DATA GetUserAuthData;
314     PLSA_CLOSE_SAM_USER CloseSamUser;
315     PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken;
316     PLSA_CLIENT_CALLBACK ClientCallback;
317     PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials;
318     PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser;
319     PLSA_CRACK_SINGLE_NAME CrackSingleName;
320     PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon;
321     PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
322 }
323 alias LSA_SECPKG_FUNCTION_TABLE* PLSA_SECPKG_FUNCTION_TABLE;
324 
325 /* functions implemented by SSP/AP obtainable by dispatch tables */
326 alias NTSTATUS function(ULONG, PLSA_DISPATCH_TABLE,
327  PLSA_STRING, PLSA_STRING, PLSA_STRING *) PLSA_AP_INITIALIZE_PACKAGE;
328 alias NTSTATUS function(LPWSTR, LPWSTR, LPWSTR, LPWSTR,
329  DWORD, DWORD, PHANDLE) PLSA_AP_LOGON_USER;
330 alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
331  PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE;
332 alias void function(PLUID) PLSA_AP_LOGON_TERMINATED;
333 alias NTSTATUS function(PLSA_CLIENT_REQUEST,
334  PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_UNTRUSTED;
335 alias NTSTATUS function(PUNICODE_STRING,
336  PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_PASSTHROUGH;
337 alias NTSTATUS function(PLSA_CLIENT_REQUEST,
338  SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
339  PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
340  PUNICODE_STRING *) PLSA_AP_LOGON_USER_EX;
341 alias NTSTATUS function(PLSA_CLIENT_REQUEST,
342  SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
343  PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
344  PUNICODE_STRING *, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY *) PLSA_AP_LOGON_USER_EX2;
345 alias NTSTATUS function(ULONG_PTR, PSECPKG_PARAMETERS,
346  PLSA_SECPKG_FUNCTION_TABLE) SpInitializeFn;
347 alias NTSTATUS function() SpShutDownFn;
348 alias NTSTATUS function(PSecPkgInfoW) SpGetInfoFn;
349 alias NTSTATUS function(SECURITY_LOGON_TYPE,
350  PUNICODE_STRING, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED) SpAcceptCredentialsFn;
351 alias NTSTATUS function(PUNICODE_STRING, ULONG,
352  PLUID, PVOID, PVOID, PVOID, PLSA_SEC_HANDLE, PTimeStamp) SpAcquireCredentialsHandleFn;
353 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryCredentialsAttributesFn;
354 alias NTSTATUS function(LSA_SEC_HANDLE) SpFreeCredentialsHandleFn;
355 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpSaveCredentialsFn;
356 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpGetCredentialsFn;
357 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpDeleteCredentialsFn;
358 alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE,
359  PUNICODE_STRING, ULONG, ULONG, PSecBufferDesc, PLSA_SEC_HANDLE, PSecBufferDesc,
360  PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpInitLsaModeContextFn;
361 alias NTSTATUS function(LSA_SEC_HANDLE,
362  LSA_SEC_HANDLE, PSecBufferDesc, ULONG, ULONG, PLSA_SEC_HANDLE, PSecBufferDesc,
363  PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpAcceptLsaModeContextFn;
364 alias NTSTATUS function(LSA_SEC_HANDLE) SpDeleteContextFn;
365 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpApplyControlTokenFn;
366 alias NTSTATUS function(PLUID, ULONG, PSecurityUserData *) SpGetUserInfoFn;
367 alias NTSTATUS function(SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION *) SpGetExtendedInformationFn;
368 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryContextAttributesFn;
369 alias NTSTATUS function(LSA_SEC_HANDLE, PUNICODE_STRING,
370  PUNICODE_STRING, ULONG, PVOID, PVOID, PVOID, PTimeStamp) SpAddCredentialsFn;
371 alias NTSTATUS function(
372  SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION) SpSetExtendedInformationFn;
373 alias NTSTATUS function(ULONG, PSECPKG_DLL_FUNCTIONS,
374  PVOID *) SpInstanceInitFn;
375 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpInitUserModeContextFn;
376 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
377  PSecBufferDesc, ULONG) SpMakeSignatureFn;
378 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
379  ULONG, PULONG) SpVerifySignatureFn;
380 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc,
381  ULONG) SpSealMessageFn;
382 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
383  ULONG, PULONG) SpUnsealMessageFn;
384 alias NTSTATUS function(LSA_SEC_HANDLE, PHANDLE) SpGetContextTokenFn;
385 alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpCompleteAuthTokenFn;
386 alias NTSTATUS function(PSecBuffer, PSecBuffer) SpFormatCredentialsFn;
387 alias NTSTATUS function(ULONG, PUCHAR, PULONG,
388  PVOID *) SpMarshallSupplementalCredsFn;
389 alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
390  PSecBuffer, PHANDLE) SpExportSecurityContextFn;
391 alias NTSTATUS function(PSecBuffer, HANDLE,
392  PLSA_SEC_HANDLE) SpImportSecurityContextFn;
393 
394 /* Dispatch tables of functions implemented by SSP/AP */
395 struct SECPKG_FUNCTION_TABLE {
396     PLSA_AP_INITIALIZE_PACKAGE InitializePackage;
397     PLSA_AP_LOGON_USER LogonUser;
398     PLSA_AP_CALL_PACKAGE CallPackage;
399     PLSA_AP_LOGON_TERMINATED LogonTerminated;
400     PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted;
401     PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
402     PLSA_AP_LOGON_USER_EX LogonUserEx;
403     PLSA_AP_LOGON_USER_EX2 LogonUserEx2;
404     SpInitializeFn *Initialize;
405     SpShutDownFn *Shutdown;
406     SpGetInfoFn *GetInfo;
407     SpAcceptCredentialsFn *AcceptCredentials;
408     SpAcquireCredentialsHandleFn *AcquireCredentialsHandle;
409     SpQueryCredentialsAttributesFn *QueryCredentialsAttributes;
410     SpFreeCredentialsHandleFn *FreeCredentialsHandle;
411     SpSaveCredentialsFn *SaveCredentials;
412     SpGetCredentialsFn *GetCredentials;
413     SpDeleteCredentialsFn *DeleteCredentials;
414     SpInitLsaModeContextFn *InitLsaModeContext;
415     SpAcceptLsaModeContextFn *AcceptLsaModeContext;
416     SpDeleteContextFn *DeleteContext;
417     SpApplyControlTokenFn *ApplyControlToken;
418     SpGetUserInfoFn *GetUserInfo;
419     SpGetExtendedInformationFn *GetExtendedInformation;
420     SpQueryContextAttributesFn *QueryContextAttributes;
421     SpAddCredentialsFn *AddCredentials;
422     SpSetExtendedInformationFn *SetExtendedInformation;
423 }
424 alias SECPKG_FUNCTION_TABLE* PSECPKG_FUNCTION_TABLE;
425 
426 struct SECPKG_USER_FUNCTION_TABLE {
427     SpInstanceInitFn *InstanceInit;
428     SpInitUserModeContextFn *InitUserModeContext;
429     SpMakeSignatureFn *MakeSignature;
430     SpVerifySignatureFn *VerifySignature;
431     SpSealMessageFn *SealMessage;
432     SpUnsealMessageFn *UnsealMessage;
433     SpGetContextTokenFn *GetContextToken;
434     SpQueryContextAttributesFn *QueryContextAttributes;
435     SpCompleteAuthTokenFn *CompleteAuthToken;
436     SpDeleteContextFn *DeleteUserModeContext;
437     SpFormatCredentialsFn *FormatCredentials;
438     SpMarshallSupplementalCredsFn *MarshallSupplementalCreds;
439     SpExportSecurityContextFn *ExportContext;
440     SpImportSecurityContextFn *ImportContext;
441 }
442 alias SECPKG_USER_FUNCTION_TABLE* PSECPKG_USER_FUNCTION_TABLE;
443 
444 /* Entry points to SSP/AP */
445 alias NTSTATUS function(ULONG, PULONG,
446  PSECPKG_FUNCTION_TABLE *, PULONG) SpLsaModeInitializeFn;
447 alias NTSTATUS function(ULONG, PULONG,
448  PSECPKG_USER_FUNCTION_TABLE *, PULONG) SpUserModeInitializeFn;
449