1/**
2 * Windows API header module
3 *
4 * Translated from MinGW Windows headers
5 *
6 * Authors: Ellery Newcomer
7 * License: $(LINK2 http://www.boost.org/LICENSE_1_0.txt, Boost License 1.0)
8 * Source: $(DRUNTIMESRC core/sys/windows/_ntsecpkg.d)
9 */
10module core.sys.windows.ntsecpkg;
11version (Windows):
12@system:
13
14import core.sys.windows.windef, core.sys.windows.ntsecapi, core.sys.windows.security, core.sys.windows.ntdef, core.sys.windows.sspi;
15import core.sys.windows.basetyps : GUID;
16import core.sys.windows.winbase;
17
18extern(Windows):
19
20enum :ULONG{
21    ISC_REQ_DELEGATE = 1,
22    ISC_REQ_MUTUAL_AUTH = 2,
23    ISC_REQ_REPLAY_DETECT = 4,
24    ISC_REQ_SEQUENCE_DETECT = 8,
25    ISC_REQ_CONFIDENTIALITY  = 16,
26    ISC_REQ_USE_SESSION_KEY = 32,
27    ISC_REQ_PROMPT_FOR_CREDS = 64,
28    ISC_REQ_USE_SUPPLIED_CREDS  = 128,
29    ISC_REQ_ALLOCATE_MEMORY = 256,
30    ISC_REQ_USE_DCE_STYLE = 512,
31    ISC_REQ_DATAGRAM = 1024,
32    ISC_REQ_CONNECTION = 2048,
33    ISC_REQ_EXTENDED_ERROR = 16384,
34    ISC_REQ_STREAM = 32768,
35    ISC_REQ_INTEGRITY = 65536,
36    ISC_REQ_MANUAL_CRED_VALIDATION = 524288,
37    ISC_REQ_HTTP  = 268435456,
38}
39
40enum ISC_RET_EXTENDED_ERROR = 16384;
41
42enum :ULONG{
43    ASC_REQ_DELEGATE = 1,
44    ASC_REQ_MUTUAL_AUTH = 2,
45    ASC_REQ_REPLAY_DETECT = 4,
46    ASC_REQ_SEQUENCE_DETECT = 8,
47    ASC_REQ_CONFIDENTIALITY = 16,
48    ASC_REQ_USE_SESSION_KEY = 32,
49    ASC_REQ_ALLOCATE_MEMORY = 256,
50    ASC_REQ_USE_DCE_STYLE = 512,
51    ASC_REQ_DATAGRAM = 1024,
52    ASC_REQ_CONNECTION = 2048,
53    ASC_REQ_EXTENDED_ERROR = 32768,
54    ASC_REQ_STREAM = 65536,
55    ASC_REQ_INTEGRITY = 131072,
56}
57
58enum SECURITY_NATIVE_DREP  = 16;
59enum SECURITY_NETWORK_DREP = 0;
60
61enum :ULONG{
62    SECPKG_STATE_ENCRYPTION_PERMITTED               = 0x01,
63    SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED        = 0x02,
64    SECPKG_STATE_DOMAIN_CONTROLLER                  = 0x04,
65    SECPKG_STATE_WORKSTATION                        = 0x08,
66    SECPKG_STATE_STANDALONE                         = 0x10,
67}
68
69/* enum definitions for Secure Service Provider/Authentication Packages */
70enum LSA_TOKEN_INFORMATION_TYPE {
71    LsaTokenInformationNull,
72    LsaTokenInformationV1
73}
74alias LSA_TOKEN_INFORMATION_TYPE* PLSA_TOKEN_INFORMATION_TYPE;
75enum SECPKG_EXTENDED_INFORMATION_CLASS
76{
77    SecpkgGssInfo = 1,
78    SecpkgContextThunks,
79    SecpkgMutualAuthLevel,
80    SecpkgMaxInfo
81}
82enum SECPKG_NAME_TYPE {
83    SecNameSamCompatible,
84    SecNameAlternateId,
85    SecNameFlat,
86    SecNameDN
87}
88
89/* struct definitions for SSP/AP */
90struct SECPKG_PRIMARY_CRED {
91    LUID LogonId;
92    UNICODE_STRING DownlevelName;
93    UNICODE_STRING DomainName;
94    UNICODE_STRING Password;
95    UNICODE_STRING OldPassword;
96    PSID UserSid;
97    ULONG Flags;
98    UNICODE_STRING DnsDomainName;
99    UNICODE_STRING Upn;
100    UNICODE_STRING LogonServer;
101    UNICODE_STRING Spare1;
102    UNICODE_STRING Spare2;
103    UNICODE_STRING Spare3;
104    UNICODE_STRING Spare4;
105}
106alias SECPKG_PRIMARY_CRED* PSECPKG_PRIMARY_CRED;
107struct SECPKG_SUPPLEMENTAL_CRED {
108    UNICODE_STRING PackageName;
109    ULONG CredentialSize;
110    PUCHAR Credentials;
111}
112alias SECPKG_SUPPLEMENTAL_CRED* PSECPKG_SUPPLEMENTAL_CRED;
113struct SECPKG_SUPPLEMENTAL_CRED_ARRAY {
114    ULONG CredentialCount;
115    SECPKG_SUPPLEMENTAL_CRED[1] Credentials;
116}
117alias SECPKG_SUPPLEMENTAL_CRED_ARRAY* PSECPKG_SUPPLEMENTAL_CRED_ARRAY;
118struct SECPKG_PARAMETERS {
119    ULONG Version;
120    ULONG MachineState;
121    ULONG SetupMode;
122    PSID DomainSid;
123    UNICODE_STRING DomainName;
124    UNICODE_STRING DnsDomainName;
125    GUID DomainGuid;
126}
127alias SECPKG_PARAMETERS* PSECPKG_PARAMETERS,PSECPKG_EVENT_DOMAIN_CHANGE;
128alias SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE;
129struct SECPKG_CLIENT_INFO {
130  LUID LogonId;
131  ULONG ProcessID;
132  ULONG ThreadID;
133  BOOLEAN HasTcbPrivilege;
134  BOOLEAN Impersonating;
135  BOOLEAN Restricted;
136}
137alias SECPKG_CLIENT_INFO* PSECPKG_CLIENT_INFO;
138struct SECURITY_USER_DATA {
139    SECURITY_STRING UserName;
140    SECURITY_STRING LogonDomainName;
141    SECURITY_STRING LogonServer;
142    PSID pSid;
143}
144alias SECURITY_USER_DATA* PSECURITY_USER_DATA,PSecurityUserData;
145alias SECURITY_USER_DATA SecurityUserData;
146struct SECPKG_GSS_INFO {
147    ULONG EncodedIdLength;
148    UCHAR[4] EncodedId;
149}
150alias SECPKG_GSS_INFO* PSECPKG_GSS_INFO;
151struct SECPKG_CONTEXT_THUNKS {
152    ULONG InfoLevelCount;
153    ULONG[1] Levels;
154}
155alias SECPKG_CONTEXT_THUNKS* PSECPKG_CONTEXT_THUNKS;
156struct SECPKG_MUTUAL_AUTH_LEVEL {
157    ULONG MutualAuthLevel;
158}
159alias SECPKG_MUTUAL_AUTH_LEVEL* PSECPKG_MUTUAL_AUTH_LEVEL;
160struct SECPKG_CALL_INFO {
161    ULONG ProcessId;
162    ULONG ThreadId;
163    ULONG Attributes;
164    ULONG CallCount;
165}
166alias SECPKG_CALL_INFO* PSECPKG_CALL_INFO;
167struct SECPKG_EXTENDED_INFORMATION {
168    SECPKG_EXTENDED_INFORMATION_CLASS Class;
169    union _Info{
170        SECPKG_GSS_INFO GssInfo;
171        SECPKG_CONTEXT_THUNKS ContextThunks;
172        SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel;
173    }
174    _Info Info;
175}
176alias SECPKG_EXTENDED_INFORMATION* PSECPKG_EXTENDED_INFORMATION;
177
178/* callbacks implemented by SSP/AP dlls and called by the LSA */
179alias void function(ULONG_PTR, ULONG_PTR, PSecBuffer,
180 PSecBuffer) PLSA_CALLBACK_FUNCTION;
181
182/* misc typedefs used in the below prototypes */
183alias PVOID* PLSA_CLIENT_REQUEST;
184alias ULONG_PTR LSA_SEC_HANDLE;
185alias LSA_SEC_HANDLE* PLSA_SEC_HANDLE;
186alias LPTHREAD_START_ROUTINE SEC_THREAD_START;
187alias PSECURITY_ATTRIBUTES SEC_ATTRS;
188
189/* functions used by SSP/AP obtainable by dispatch tables */
190alias NTSTATUS function(ULONG, PLSA_CALLBACK_FUNCTION) PLSA_REGISTER_CALLBACK;
191alias NTSTATUS function(PLUID) PLSA_CREATE_LOGON_SESSION;
192alias NTSTATUS function(PLUID) PLSA_DELETE_LOGON_SESSION;
193alias NTSTATUS function(PLUID, ULONG, PLSA_STRING,
194 PLSA_STRING) PLSA_ADD_CREDENTIAL;
195alias NTSTATUS function(PLUID, ULONG, PULONG, BOOLEAN,
196 PLSA_STRING, PULONG, PLSA_STRING) PLSA_GET_CREDENTIALS;
197alias NTSTATUS function(PLUID, ULONG, PLSA_STRING) PLSA_DELETE_CREDENTIAL;
198alias PVOID function(ULONG) PLSA_ALLOCATE_LSA_HEAP;
199alias void function(PVOID) PLSA_FREE_LSA_HEAP;
200alias NTSTATUS function(PLSA_CLIENT_REQUEST,
201 ULONG, PVOID*) PLSA_ALLOCATE_CLIENT_BUFFER;
202alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID) PLSA_FREE_CLIENT_BUFFER;
203alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG,
204 PVOID, PVOID) PLSA_COPY_TO_CLIENT_BUFFER;
205alias NTSTATUS function(PLSA_CLIENT_REQUEST,
206 ULONG, PVOID, PVOID) PLSA_COPY_FROM_CLIENT_BUFFER;
207alias NTSTATUS function() PLSA_IMPERSONATE_CLIENT;
208alias NTSTATUS function() PLSA_UNLOAD_PACKAGE;
209alias NTSTATUS function(HANDLE, PHANDLE) PLSA_DUPLICATE_HANDLE;
210alias NTSTATUS function(PLUID, ULONG,
211 PVOID, BOOLEAN) PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS;
212alias HANDLE function(SEC_ATTRS, ULONG, SEC_THREAD_START,
213 PVOID, ULONG, PULONG) PLSA_CREATE_THREAD;
214alias NTSTATUS function(PSECPKG_CLIENT_INFO) PLSA_GET_CLIENT_INFO;
215alias HANDLE function(SEC_THREAD_START, PVOID,
216 ULONG, ULONG, ULONG, ULONG, HANDLE) PLSA_REGISTER_NOTIFICATION;
217alias NTSTATUS function(HANDLE) PLSA_CANCEL_NOTIFICATION;
218alias NTSTATUS function(PSecBuffer, PSecBuffer) PLSA_MAP_BUFFER;
219alias NTSTATUS function(PLUID, PTOKEN_SOURCE,
220 SECURITY_LOGON_TYPE, SECURITY_IMPERSONATION_LEVEL, LSA_TOKEN_INFORMATION_TYPE,
221 PVOID, PTOKEN_GROUPS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING,
222 PUNICODE_STRING, PHANDLE, PNTSTATUS) PLSA_CREATE_TOKEN;
223alias void function(NTSTATUS, NTSTATUS, PUNICODE_STRING,
224 PUNICODE_STRING, PUNICODE_STRING, PSID, SECURITY_LOGON_TYPE,
225 PTOKEN_SOURCE, PLUID) PLSA_AUDIT_LOGON;
226alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
227 PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE;
228alias BOOLEAN function(PSECPKG_CALL_INFO) PLSA_GET_CALL_INFO;
229alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID,
230 ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGEEX;
231alias PVOID function(ULONG, ULONG) PLSA_CREATE_SHARED_MEMORY;
232alias PVOID function(PVOID, ULONG) PLSA_ALLOCATE_SHARED_MEMORY;
233alias void function(PVOID, PVOID) PLSA_FREE_SHARED_MEMORY;
234alias BOOLEAN function(PVOID) PLSA_DELETE_SHARED_MEMORY;
235alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE,
236 PSECURITY_STRING, BOOLEAN, ULONG, PVOID*) PLSA_OPEN_SAM_USER;
237alias NTSTATUS function(PVOID, PVOID *, PULONG,
238 PVOID *, PULONG) PLSA_GET_USER_CREDENTIALS;
239alias NTSTATUS function(PVOID, PUCHAR *, PULONG) PLSA_GET_USER_AUTH_DATA;
240alias NTSTATUS function(PVOID) PLSA_CLOSE_SAM_USER;
241alias NTSTATUS function(PVOID, ULONG,
242 SECURITY_IMPERSONATION_LEVEL, PTOKEN_SOURCE, SECURITY_LOGON_TYPE,
243 PUNICODE_STRING, PHANDLE, PLUID, PUNICODE_STRING, PNTSTATUS) PLSA_CONVERT_AUTH_DATA_TO_TOKEN;
244alias NTSTATUS function(PCHAR, ULONG_PTR, ULONG_PTR,
245 PSecBuffer, PSecBuffer) PLSA_CLIENT_CALLBACK;
246alias NTSTATUS function(PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY) PLSA_UPDATE_PRIMARY_CREDENTIALS;
247alias NTSTATUS function(PSECURITY_STRING,
248 SECPKG_NAME_TYPE, PSECURITY_STRING, PUCHAR *, PULONG, PUNICODE_STRING) PLSA_GET_AUTH_DATA_FOR_USER;
249alias NTSTATUS function(ULONG, BOOLEAN,
250 PUNICODE_STRING, PUNICODE_STRING, ULONG, PUNICODE_STRING, PUNICODE_STRING,
251 PULONG) PLSA_CRACK_SINGLE_NAME;
252alias NTSTATUS function(ULONG, BOOLEAN,
253 PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, NTSTATUS) PLSA_AUDIT_ACCOUNT_LOGON;
254alias NTSTATUS function(PUNICODE_STRING, PVOID,
255 PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE_PASSTHROUGH;
256
257/* Dispatch tables of functions used by SSP/AP */
258struct SECPKG_DLL_FUNCTIONS {
259    PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
260    PLSA_FREE_LSA_HEAP FreeHeap;
261    PLSA_REGISTER_CALLBACK RegisterCallback;
262}
263alias SECPKG_DLL_FUNCTIONS* PSECPKG_DLL_FUNCTIONS;
264struct LSA_DISPATCH_TABLE {
265    PLSA_CREATE_LOGON_SESSION CreateLogonSession;
266    PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
267    PLSA_ADD_CREDENTIAL AddCredential;
268    PLSA_GET_CREDENTIALS GetCredentials;
269    PLSA_DELETE_CREDENTIAL DeleteCredential;
270    PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
271    PLSA_FREE_LSA_HEAP FreeLsaHeap;
272    PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
273    PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
274    PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
275    PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
276}
277alias LSA_DISPATCH_TABLE* PLSA_DISPATCH_TABLE;
278struct LSA_SECPKG_FUNCTION_TABLE {
279    PLSA_CREATE_LOGON_SESSION CreateLogonSession;
280    PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
281    PLSA_ADD_CREDENTIAL AddCredential;
282    PLSA_GET_CREDENTIALS GetCredentials;
283    PLSA_DELETE_CREDENTIAL DeleteCredential;
284    PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
285    PLSA_FREE_LSA_HEAP FreeLsaHeap;
286    PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
287    PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
288    PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
289    PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
290    PLSA_IMPERSONATE_CLIENT ImpersonateClient;
291    PLSA_UNLOAD_PACKAGE UnloadPackage;
292    PLSA_DUPLICATE_HANDLE DuplicateHandle;
293    PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials;
294    PLSA_CREATE_THREAD CreateThread;
295    PLSA_GET_CLIENT_INFO GetClientInfo;
296    PLSA_REGISTER_NOTIFICATION RegisterNotification;
297    PLSA_CANCEL_NOTIFICATION CancelNotification;
298    PLSA_MAP_BUFFER MapBuffer;
299    PLSA_CREATE_TOKEN CreateToken;
300    PLSA_AUDIT_LOGON AuditLogon;
301    PLSA_CALL_PACKAGE CallPackage;
302    PLSA_FREE_LSA_HEAP FreeReturnBuffer;
303    PLSA_GET_CALL_INFO GetCallInfo;
304    PLSA_CALL_PACKAGEEX CallPackageEx;
305    PLSA_CREATE_SHARED_MEMORY CreateSharedMemory;
306    PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory;
307    PLSA_FREE_SHARED_MEMORY FreeSharedMemory;
308    PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory;
309    PLSA_OPEN_SAM_USER OpenSamUser;
310    PLSA_GET_USER_CREDENTIALS GetUserCredentials;
311    PLSA_GET_USER_AUTH_DATA GetUserAuthData;
312    PLSA_CLOSE_SAM_USER CloseSamUser;
313    PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken;
314    PLSA_CLIENT_CALLBACK ClientCallback;
315    PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials;
316    PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser;
317    PLSA_CRACK_SINGLE_NAME CrackSingleName;
318    PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon;
319    PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
320}
321alias LSA_SECPKG_FUNCTION_TABLE* PLSA_SECPKG_FUNCTION_TABLE;
322
323/* functions implemented by SSP/AP obtainable by dispatch tables */
324alias NTSTATUS function(ULONG, PLSA_DISPATCH_TABLE,
325 PLSA_STRING, PLSA_STRING, PLSA_STRING *) PLSA_AP_INITIALIZE_PACKAGE;
326alias NTSTATUS function(LPWSTR, LPWSTR, LPWSTR, LPWSTR,
327 DWORD, DWORD, PHANDLE) PLSA_AP_LOGON_USER;
328alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
329 PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE;
330alias void function(PLUID) PLSA_AP_LOGON_TERMINATED;
331alias NTSTATUS function(PLSA_CLIENT_REQUEST,
332 PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_UNTRUSTED;
333alias NTSTATUS function(PUNICODE_STRING,
334 PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_PASSTHROUGH;
335alias NTSTATUS function(PLSA_CLIENT_REQUEST,
336 SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
337 PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
338 PUNICODE_STRING *) PLSA_AP_LOGON_USER_EX;
339alias NTSTATUS function(PLSA_CLIENT_REQUEST,
340 SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
341 PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
342 PUNICODE_STRING *, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY *) PLSA_AP_LOGON_USER_EX2;
343alias NTSTATUS function(ULONG_PTR, PSECPKG_PARAMETERS,
344 PLSA_SECPKG_FUNCTION_TABLE) SpInitializeFn;
345alias NTSTATUS function() SpShutDownFn;
346alias NTSTATUS function(PSecPkgInfoW) SpGetInfoFn;
347alias NTSTATUS function(SECURITY_LOGON_TYPE,
348 PUNICODE_STRING, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED) SpAcceptCredentialsFn;
349alias NTSTATUS function(PUNICODE_STRING, ULONG,
350 PLUID, PVOID, PVOID, PVOID, PLSA_SEC_HANDLE, PTimeStamp) SpAcquireCredentialsHandleFn;
351alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryCredentialsAttributesFn;
352alias NTSTATUS function(LSA_SEC_HANDLE) SpFreeCredentialsHandleFn;
353alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpSaveCredentialsFn;
354alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpGetCredentialsFn;
355alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpDeleteCredentialsFn;
356alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE,
357 PUNICODE_STRING, ULONG, ULONG, PSecBufferDesc, PLSA_SEC_HANDLE, PSecBufferDesc,
358 PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpInitLsaModeContextFn;
359alias NTSTATUS function(LSA_SEC_HANDLE,
360 LSA_SEC_HANDLE, PSecBufferDesc, ULONG, ULONG, PLSA_SEC_HANDLE, PSecBufferDesc,
361 PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpAcceptLsaModeContextFn;
362alias NTSTATUS function(LSA_SEC_HANDLE) SpDeleteContextFn;
363alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpApplyControlTokenFn;
364alias NTSTATUS function(PLUID, ULONG, PSecurityUserData *) SpGetUserInfoFn;
365alias NTSTATUS function(SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION *) SpGetExtendedInformationFn;
366alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryContextAttributesFn;
367alias NTSTATUS function(LSA_SEC_HANDLE, PUNICODE_STRING,
368 PUNICODE_STRING, ULONG, PVOID, PVOID, PVOID, PTimeStamp) SpAddCredentialsFn;
369alias NTSTATUS function(
370 SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION) SpSetExtendedInformationFn;
371alias NTSTATUS function(ULONG, PSECPKG_DLL_FUNCTIONS,
372 PVOID *) SpInstanceInitFn;
373alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpInitUserModeContextFn;
374alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
375 PSecBufferDesc, ULONG) SpMakeSignatureFn;
376alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
377 ULONG, PULONG) SpVerifySignatureFn;
378alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc,
379 ULONG) SpSealMessageFn;
380alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
381 ULONG, PULONG) SpUnsealMessageFn;
382alias NTSTATUS function(LSA_SEC_HANDLE, PHANDLE) SpGetContextTokenFn;
383alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpCompleteAuthTokenFn;
384alias NTSTATUS function(PSecBuffer, PSecBuffer) SpFormatCredentialsFn;
385alias NTSTATUS function(ULONG, PUCHAR, PULONG,
386 PVOID *) SpMarshallSupplementalCredsFn;
387alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
388 PSecBuffer, PHANDLE) SpExportSecurityContextFn;
389alias NTSTATUS function(PSecBuffer, HANDLE,
390 PLSA_SEC_HANDLE) SpImportSecurityContextFn;
391
392/* Dispatch tables of functions implemented by SSP/AP */
393struct SECPKG_FUNCTION_TABLE {
394    PLSA_AP_INITIALIZE_PACKAGE InitializePackage;
395    PLSA_AP_LOGON_USER LogonUser;
396    PLSA_AP_CALL_PACKAGE CallPackage;
397    PLSA_AP_LOGON_TERMINATED LogonTerminated;
398    PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted;
399    PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
400    PLSA_AP_LOGON_USER_EX LogonUserEx;
401    PLSA_AP_LOGON_USER_EX2 LogonUserEx2;
402    SpInitializeFn *Initialize;
403    SpShutDownFn *Shutdown;
404    SpGetInfoFn *GetInfo;
405    SpAcceptCredentialsFn *AcceptCredentials;
406    SpAcquireCredentialsHandleFn *AcquireCredentialsHandle;
407    SpQueryCredentialsAttributesFn *QueryCredentialsAttributes;
408    SpFreeCredentialsHandleFn *FreeCredentialsHandle;
409    SpSaveCredentialsFn *SaveCredentials;
410    SpGetCredentialsFn *GetCredentials;
411    SpDeleteCredentialsFn *DeleteCredentials;
412    SpInitLsaModeContextFn *InitLsaModeContext;
413    SpAcceptLsaModeContextFn *AcceptLsaModeContext;
414    SpDeleteContextFn *DeleteContext;
415    SpApplyControlTokenFn *ApplyControlToken;
416    SpGetUserInfoFn *GetUserInfo;
417    SpGetExtendedInformationFn *GetExtendedInformation;
418    SpQueryContextAttributesFn *QueryContextAttributes;
419    SpAddCredentialsFn *AddCredentials;
420    SpSetExtendedInformationFn *SetExtendedInformation;
421}
422alias SECPKG_FUNCTION_TABLE* PSECPKG_FUNCTION_TABLE;
423
424struct SECPKG_USER_FUNCTION_TABLE {
425    SpInstanceInitFn *InstanceInit;
426    SpInitUserModeContextFn *InitUserModeContext;
427    SpMakeSignatureFn *MakeSignature;
428    SpVerifySignatureFn *VerifySignature;
429    SpSealMessageFn *SealMessage;
430    SpUnsealMessageFn *UnsealMessage;
431    SpGetContextTokenFn *GetContextToken;
432    SpQueryContextAttributesFn *QueryContextAttributes;
433    SpCompleteAuthTokenFn *CompleteAuthToken;
434    SpDeleteContextFn *DeleteUserModeContext;
435    SpFormatCredentialsFn *FormatCredentials;
436    SpMarshallSupplementalCredsFn *MarshallSupplementalCreds;
437    SpExportSecurityContextFn *ExportContext;
438    SpImportSecurityContextFn *ImportContext;
439}
440alias SECPKG_USER_FUNCTION_TABLE* PSECPKG_USER_FUNCTION_TABLE;
441
442/* Entry points to SSP/AP */
443alias NTSTATUS function(ULONG, PULONG,
444 PSECPKG_FUNCTION_TABLE *, PULONG) SpLsaModeInitializeFn;
445alias NTSTATUS function(ULONG, PULONG,
446 PSECPKG_USER_FUNCTION_TABLE *, PULONG) SpUserModeInitializeFn;
447
448