File Annotation

Not logged in
9b639cf2d6 2015-05-05        kinaba: /***********************************************************************\
9b639cf2d6 2015-05-05        kinaba: *                                ntsecpkg.d                             *
9b639cf2d6 2015-05-05        kinaba: *                                                                       *
9b639cf2d6 2015-05-05        kinaba: *                       Windows API header module                       *
9b639cf2d6 2015-05-05        kinaba: *                                                                       *
9b639cf2d6 2015-05-05        kinaba: *                 Translated from MinGW Windows headers                 *
9b639cf2d6 2015-05-05        kinaba: *                           by Ellery Newcomer                          *
9b639cf2d6 2015-05-05        kinaba: *                                                                       *
9b639cf2d6 2015-05-05        kinaba: *                       Placed into public domain                       *
9b639cf2d6 2015-05-05        kinaba: \***********************************************************************/
9b639cf2d6 2015-05-05        kinaba: module win32.ntsecpkg;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: import win32.windef, win32.ntsecapi, win32.security, win32.ntdef, win32.sspi;
9b639cf2d6 2015-05-05        kinaba: import win32.winnt: GUID;
9b639cf2d6 2015-05-05        kinaba: import win32.winbase;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: extern(Windows):
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: enum :ULONG{
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_DELEGATE = 1,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_MUTUAL_AUTH = 2,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_REPLAY_DETECT = 4,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_SEQUENCE_DETECT = 8,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_CONFIDENTIALITY  = 16,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_USE_SESSION_KEY = 32,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_PROMPT_FOR_CREDS = 64,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_USE_SUPPLIED_CREDS  = 128,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_ALLOCATE_MEMORY = 256,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_USE_DCE_STYLE = 512,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_DATAGRAM = 1024,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_CONNECTION = 2048,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_EXTENDED_ERROR = 16384,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_STREAM = 32768,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_INTEGRITY = 65536,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_MANUAL_CRED_VALIDATION = 524288,
9b639cf2d6 2015-05-05        kinaba:     ISC_REQ_HTTP  = 268435456,
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: enum ISC_RET_EXTENDED_ERROR = 16384;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: enum :ULONG{
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_DELEGATE = 1,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_MUTUAL_AUTH = 2,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_REPLAY_DETECT = 4,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_SEQUENCE_DETECT = 8,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_CONFIDENTIALITY = 16,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_USE_SESSION_KEY = 32,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_ALLOCATE_MEMORY = 256,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_USE_DCE_STYLE = 512,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_DATAGRAM = 1024,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_CONNECTION = 2048,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_EXTENDED_ERROR = 32768,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_STREAM = 65536,
9b639cf2d6 2015-05-05        kinaba:     ASC_REQ_INTEGRITY = 131072,
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: enum SECURITY_NATIVE_DREP  = 16;
9b639cf2d6 2015-05-05        kinaba: enum SECURITY_NETWORK_DREP = 0;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: enum :ULONG{
9b639cf2d6 2015-05-05        kinaba:     SECPKG_STATE_ENCRYPTION_PERMITTED               = 0x01,
9b639cf2d6 2015-05-05        kinaba:     SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED        = 0x02,
9b639cf2d6 2015-05-05        kinaba:     SECPKG_STATE_DOMAIN_CONTROLLER                  = 0x04,
9b639cf2d6 2015-05-05        kinaba:     SECPKG_STATE_WORKSTATION                        = 0x08,
9b639cf2d6 2015-05-05        kinaba:     SECPKG_STATE_STANDALONE                         = 0x10,
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* enum definitions for Secure Service Provider/Authentication Packages */
9b639cf2d6 2015-05-05        kinaba: enum LSA_TOKEN_INFORMATION_TYPE {
9b639cf2d6 2015-05-05        kinaba: 	LsaTokenInformationNull,
9b639cf2d6 2015-05-05        kinaba: 	LsaTokenInformationV1
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias LSA_TOKEN_INFORMATION_TYPE* PLSA_TOKEN_INFORMATION_TYPE;
9b639cf2d6 2015-05-05        kinaba: enum SECPKG_EXTENDED_INFORMATION_CLASS
9b639cf2d6 2015-05-05        kinaba: {
9b639cf2d6 2015-05-05        kinaba: 	SecpkgGssInfo = 1,
9b639cf2d6 2015-05-05        kinaba: 	SecpkgContextThunks,
9b639cf2d6 2015-05-05        kinaba: 	SecpkgMutualAuthLevel,
9b639cf2d6 2015-05-05        kinaba: 	SecpkgMaxInfo
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: enum SECPKG_NAME_TYPE {
9b639cf2d6 2015-05-05        kinaba: 	SecNameSamCompatible,
9b639cf2d6 2015-05-05        kinaba: 	SecNameAlternateId,
9b639cf2d6 2015-05-05        kinaba: 	SecNameFlat,
9b639cf2d6 2015-05-05        kinaba: 	SecNameDN
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* struct definitions for SSP/AP */
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_PRIMARY_CRED {
9b639cf2d6 2015-05-05        kinaba: 	LUID LogonId;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING DownlevelName;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING DomainName;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING Password;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING OldPassword;
9b639cf2d6 2015-05-05        kinaba: 	PSID UserSid;
9b639cf2d6 2015-05-05        kinaba: 	ULONG Flags;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING DnsDomainName;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING Upn;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING LogonServer;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING Spare1;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING Spare2;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING Spare3;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING Spare4;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_PRIMARY_CRED* PSECPKG_PRIMARY_CRED;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_SUPPLEMENTAL_CRED {
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING PackageName;
9b639cf2d6 2015-05-05        kinaba: 	ULONG CredentialSize;
9b639cf2d6 2015-05-05        kinaba: 	PUCHAR Credentials;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_SUPPLEMENTAL_CRED* PSECPKG_SUPPLEMENTAL_CRED;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_SUPPLEMENTAL_CRED_ARRAY {
9b639cf2d6 2015-05-05        kinaba: 	ULONG CredentialCount;
9b639cf2d6 2015-05-05        kinaba: 	SECPKG_SUPPLEMENTAL_CRED[1] Credentials;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_SUPPLEMENTAL_CRED_ARRAY* PSECPKG_SUPPLEMENTAL_CRED_ARRAY;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_PARAMETERS {
9b639cf2d6 2015-05-05        kinaba: 	ULONG Version;
9b639cf2d6 2015-05-05        kinaba: 	ULONG MachineState;
9b639cf2d6 2015-05-05        kinaba: 	ULONG SetupMode;
9b639cf2d6 2015-05-05        kinaba: 	PSID DomainSid;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING DomainName;
9b639cf2d6 2015-05-05        kinaba: 	UNICODE_STRING DnsDomainName;
9b639cf2d6 2015-05-05        kinaba: 	GUID DomainGuid;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_PARAMETERS* PSECPKG_PARAMETERS,PSECPKG_EVENT_DOMAIN_CHANGE;
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_CLIENT_INFO {
9b639cf2d6 2015-05-05        kinaba:   LUID LogonId;
9b639cf2d6 2015-05-05        kinaba:   ULONG ProcessID;
9b639cf2d6 2015-05-05        kinaba:   ULONG ThreadID;
9b639cf2d6 2015-05-05        kinaba:   BOOLEAN HasTcbPrivilege;
9b639cf2d6 2015-05-05        kinaba:   BOOLEAN Impersonating;
9b639cf2d6 2015-05-05        kinaba:   BOOLEAN Restricted;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_CLIENT_INFO* PSECPKG_CLIENT_INFO;
9b639cf2d6 2015-05-05        kinaba: struct SECURITY_USER_DATA {
9b639cf2d6 2015-05-05        kinaba: 	SECURITY_STRING UserName;
9b639cf2d6 2015-05-05        kinaba: 	SECURITY_STRING LogonDomainName;
9b639cf2d6 2015-05-05        kinaba: 	SECURITY_STRING LogonServer;
9b639cf2d6 2015-05-05        kinaba: 	PSID pSid;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECURITY_USER_DATA* PSECURITY_USER_DATA,PSecurityUserData;
9b639cf2d6 2015-05-05        kinaba: alias SECURITY_USER_DATA SecurityUserData;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_GSS_INFO {
9b639cf2d6 2015-05-05        kinaba: 	ULONG EncodedIdLength;
9b639cf2d6 2015-05-05        kinaba: 	UCHAR[4] EncodedId;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_GSS_INFO* PSECPKG_GSS_INFO;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_CONTEXT_THUNKS {
9b639cf2d6 2015-05-05        kinaba: 	ULONG InfoLevelCount;
9b639cf2d6 2015-05-05        kinaba: 	ULONG[1] Levels;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_CONTEXT_THUNKS* PSECPKG_CONTEXT_THUNKS;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_MUTUAL_AUTH_LEVEL {
9b639cf2d6 2015-05-05        kinaba: 	ULONG MutualAuthLevel;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_MUTUAL_AUTH_LEVEL* PSECPKG_MUTUAL_AUTH_LEVEL;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_CALL_INFO {
9b639cf2d6 2015-05-05        kinaba: 	ULONG ProcessId;
9b639cf2d6 2015-05-05        kinaba: 	ULONG ThreadId;
9b639cf2d6 2015-05-05        kinaba: 	ULONG Attributes;
9b639cf2d6 2015-05-05        kinaba: 	ULONG CallCount;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_CALL_INFO* PSECPKG_CALL_INFO;
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_EXTENDED_INFORMATION {
9b639cf2d6 2015-05-05        kinaba: 	SECPKG_EXTENDED_INFORMATION_CLASS Class;
9b639cf2d6 2015-05-05        kinaba: 	union _Info{
9b639cf2d6 2015-05-05        kinaba: 		SECPKG_GSS_INFO GssInfo;
9b639cf2d6 2015-05-05        kinaba: 		SECPKG_CONTEXT_THUNKS ContextThunks;
9b639cf2d6 2015-05-05        kinaba: 		SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel;
9b639cf2d6 2015-05-05        kinaba: 	}
9b639cf2d6 2015-05-05        kinaba:     _Info Info;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_EXTENDED_INFORMATION* PSECPKG_EXTENDED_INFORMATION;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* callbacks implemented by SSP/AP dlls and called by the LSA */
9b639cf2d6 2015-05-05        kinaba: alias void function(ULONG_PTR, ULONG_PTR, PSecBuffer,
9b639cf2d6 2015-05-05        kinaba:  PSecBuffer) PLSA_CALLBACK_FUNCTION;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* misc typedefs used in the below prototypes */
9b639cf2d6 2015-05-05        kinaba: alias PVOID* PLSA_CLIENT_REQUEST;
9b639cf2d6 2015-05-05        kinaba: alias ULONG LSA_SEC_HANDLE;
9b639cf2d6 2015-05-05        kinaba: alias ULONG* PLSA_SEC_HANDLE;
9b639cf2d6 2015-05-05        kinaba: alias LPTHREAD_START_ROUTINE SEC_THREAD_START;
9b639cf2d6 2015-05-05        kinaba: alias PSECURITY_ATTRIBUTES SEC_ATTRS;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* functions used by SSP/AP obtainable by dispatch tables */
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, PLSA_CALLBACK_FUNCTION) PLSA_REGISTER_CALLBACK;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID) PLSA_CREATE_LOGON_SESSION;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID) PLSA_DELETE_LOGON_SESSION;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID, ULONG, PLSA_STRING,
9b639cf2d6 2015-05-05        kinaba:  PLSA_STRING) PLSA_ADD_CREDENTIAL;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID, ULONG, PULONG, BOOLEAN,
9b639cf2d6 2015-05-05        kinaba:  PLSA_STRING, PULONG, PLSA_STRING) PLSA_GET_CREDENTIALS;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID, ULONG, PLSA_STRING) PLSA_DELETE_CREDENTIAL;
9b639cf2d6 2015-05-05        kinaba: alias PVOID function(ULONG) PLSA_ALLOCATE_LSA_HEAP;
9b639cf2d6 2015-05-05        kinaba: alias void function(PVOID) PLSA_FREE_LSA_HEAP;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST,
9b639cf2d6 2015-05-05        kinaba:  ULONG, PVOID*) PLSA_ALLOCATE_CLIENT_BUFFER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID) PLSA_FREE_CLIENT_BUFFER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG,
9b639cf2d6 2015-05-05        kinaba:  PVOID, PVOID) PLSA_COPY_TO_CLIENT_BUFFER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST,
9b639cf2d6 2015-05-05        kinaba:  ULONG, PVOID, PVOID) PLSA_COPY_FROM_CLIENT_BUFFER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function() PLSA_IMPERSONATE_CLIENT;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function() PLSA_UNLOAD_PACKAGE;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(HANDLE, PHANDLE) PLSA_DUPLICATE_HANDLE;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID, ULONG,
9b639cf2d6 2015-05-05        kinaba:  PVOID, BOOLEAN) PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS;
9b639cf2d6 2015-05-05        kinaba: alias HANDLE function(SEC_ATTRS, ULONG, SEC_THREAD_START,
9b639cf2d6 2015-05-05        kinaba:  PVOID, ULONG, PULONG) PLSA_CREATE_THREAD;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSECPKG_CLIENT_INFO) PLSA_GET_CLIENT_INFO;
9b639cf2d6 2015-05-05        kinaba: alias HANDLE function(SEC_THREAD_START, PVOID,
9b639cf2d6 2015-05-05        kinaba:  ULONG, ULONG, ULONG, ULONG, HANDLE) PLSA_REGISTER_NOTIFICATION;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(HANDLE) PLSA_CANCEL_NOTIFICATION;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSecBuffer, PSecBuffer) PLSA_MAP_BUFFER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID, PTOKEN_SOURCE,
9b639cf2d6 2015-05-05        kinaba:  SECURITY_LOGON_TYPE, SECURITY_IMPERSONATION_LEVEL, LSA_TOKEN_INFORMATION_TYPE,
9b639cf2d6 2015-05-05        kinaba:  PVOID, PTOKEN_GROUPS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, PHANDLE, PNTSTATUS) PLSA_CREATE_TOKEN;
9b639cf2d6 2015-05-05        kinaba: alias void function(NTSTATUS, NTSTATUS, PUNICODE_STRING,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, PUNICODE_STRING, PSID, SECURITY_LOGON_TYPE,
9b639cf2d6 2015-05-05        kinaba:  PTOKEN_SOURCE, PLUID) PLSA_AUDIT_LOGON;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
9b639cf2d6 2015-05-05        kinaba:  PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE;
9b639cf2d6 2015-05-05        kinaba: alias BOOLEAN function(PSECPKG_CALL_INFO) PLSA_GET_CALL_INFO;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID,
9b639cf2d6 2015-05-05        kinaba:  ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGEEX;
9b639cf2d6 2015-05-05        kinaba: alias PVOID function(ULONG, ULONG) PLSA_CREATE_SHARED_MEMORY;
9b639cf2d6 2015-05-05        kinaba: alias PVOID function(PVOID, ULONG) PLSA_ALLOCATE_SHARED_MEMORY;
9b639cf2d6 2015-05-05        kinaba: alias void function(PVOID, PVOID) PLSA_FREE_SHARED_MEMORY;
9b639cf2d6 2015-05-05        kinaba: alias BOOLEAN function(PVOID) PLSA_DELETE_SHARED_MEMORY;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE,
9b639cf2d6 2015-05-05        kinaba:  PSECURITY_STRING, BOOLEAN, ULONG, PVOID*) PLSA_OPEN_SAM_USER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PVOID, PVOID *, PULONG,
9b639cf2d6 2015-05-05        kinaba:  PVOID *, PULONG) PLSA_GET_USER_CREDENTIALS;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PVOID, PUCHAR *, PULONG) PLSA_GET_USER_AUTH_DATA;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PVOID) PLSA_CLOSE_SAM_USER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PVOID, ULONG,
9b639cf2d6 2015-05-05        kinaba:  SECURITY_IMPERSONATION_LEVEL, PTOKEN_SOURCE, SECURITY_LOGON_TYPE,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, PHANDLE, PLUID, PUNICODE_STRING, PNTSTATUS) PLSA_CONVERT_AUTH_DATA_TO_TOKEN;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PCHAR, ULONG_PTR, ULONG_PTR,
9b639cf2d6 2015-05-05        kinaba:  PSecBuffer, PSecBuffer) PLSA_CLIENT_CALLBACK;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY) PLSA_UPDATE_PRIMARY_CREDENTIALS;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSECURITY_STRING,
9b639cf2d6 2015-05-05        kinaba:  SECPKG_NAME_TYPE, PSECURITY_STRING, PUCHAR *, PULONG, PUNICODE_STRING) PLSA_GET_AUTH_DATA_FOR_USER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, BOOLEAN,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, PUNICODE_STRING, ULONG, PUNICODE_STRING, PUNICODE_STRING,
9b639cf2d6 2015-05-05        kinaba:  PULONG) PLSA_CRACK_SINGLE_NAME;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, BOOLEAN,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, NTSTATUS) PLSA_AUDIT_ACCOUNT_LOGON;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID,
9b639cf2d6 2015-05-05        kinaba:  PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE_PASSTHROUGH;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* Dispatch tables of functions used by SSP/AP */
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_DLL_FUNCTIONS {
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_FREE_LSA_HEAP FreeHeap;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_REGISTER_CALLBACK RegisterCallback;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_DLL_FUNCTIONS* PSECPKG_DLL_FUNCTIONS;
9b639cf2d6 2015-05-05        kinaba: struct LSA_DISPATCH_TABLE {
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CREATE_LOGON_SESSION CreateLogonSession;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ADD_CREDENTIAL AddCredential;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_GET_CREDENTIALS GetCredentials;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_DELETE_CREDENTIAL DeleteCredential;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_FREE_LSA_HEAP FreeLsaHeap;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias LSA_DISPATCH_TABLE* PLSA_DISPATCH_TABLE;
9b639cf2d6 2015-05-05        kinaba: struct LSA_SECPKG_FUNCTION_TABLE {
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CREATE_LOGON_SESSION CreateLogonSession;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ADD_CREDENTIAL AddCredential;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_GET_CREDENTIALS GetCredentials;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_DELETE_CREDENTIAL DeleteCredential;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_FREE_LSA_HEAP FreeLsaHeap;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_IMPERSONATE_CLIENT ImpersonateClient;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_UNLOAD_PACKAGE UnloadPackage;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_DUPLICATE_HANDLE DuplicateHandle;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CREATE_THREAD CreateThread;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_GET_CLIENT_INFO GetClientInfo;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_REGISTER_NOTIFICATION RegisterNotification;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CANCEL_NOTIFICATION CancelNotification;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_MAP_BUFFER MapBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CREATE_TOKEN CreateToken;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AUDIT_LOGON AuditLogon;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CALL_PACKAGE CallPackage;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_FREE_LSA_HEAP FreeReturnBuffer;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_GET_CALL_INFO GetCallInfo;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CALL_PACKAGEEX CallPackageEx;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CREATE_SHARED_MEMORY CreateSharedMemory;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_FREE_SHARED_MEMORY FreeSharedMemory;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_OPEN_SAM_USER OpenSamUser;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_GET_USER_CREDENTIALS GetUserCredentials;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_GET_USER_AUTH_DATA GetUserAuthData;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CLOSE_SAM_USER CloseSamUser;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CLIENT_CALLBACK ClientCallback;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CRACK_SINGLE_NAME CrackSingleName;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias LSA_SECPKG_FUNCTION_TABLE* PLSA_SECPKG_FUNCTION_TABLE;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* functions implemented by SSP/AP obtainable by dispatch tables */
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, PLSA_DISPATCH_TABLE,
9b639cf2d6 2015-05-05        kinaba:  PLSA_STRING, PLSA_STRING, PLSA_STRING *) PLSA_AP_INITIALIZE_PACKAGE;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LPWSTR, LPWSTR, LPWSTR, LPWSTR,
9b639cf2d6 2015-05-05        kinaba:  DWORD, DWORD, PHANDLE) PLSA_AP_LOGON_USER;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
9b639cf2d6 2015-05-05        kinaba:  PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE;
9b639cf2d6 2015-05-05        kinaba: alias void function(PLUID) PLSA_AP_LOGON_TERMINATED;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST,
9b639cf2d6 2015-05-05        kinaba:  PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_UNTRUSTED;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PUNICODE_STRING,
9b639cf2d6 2015-05-05        kinaba:  PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_PASSTHROUGH;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST,
9b639cf2d6 2015-05-05        kinaba:  SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
9b639cf2d6 2015-05-05        kinaba:  PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING *) PLSA_AP_LOGON_USER_EX;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST,
9b639cf2d6 2015-05-05        kinaba:  SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
9b639cf2d6 2015-05-05        kinaba:  PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING *, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY *) PLSA_AP_LOGON_USER_EX2;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG_PTR, PSECPKG_PARAMETERS,
9b639cf2d6 2015-05-05        kinaba:  PLSA_SECPKG_FUNCTION_TABLE) SpInitializeFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function() SpShutDownFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSecPkgInfoW) SpGetInfoFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(SECURITY_LOGON_TYPE,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED) SpAcceptCredentialsFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PUNICODE_STRING, ULONG,
9b639cf2d6 2015-05-05        kinaba:  PLUID, PVOID, PVOID, PVOID, PLSA_SEC_HANDLE, PTimeStamp) SpAcquireCredentialsHandleFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryCredentialsAttributesFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE) SpFreeCredentialsHandleFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpSaveCredentialsFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpGetCredentialsFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpDeleteCredentialsFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, ULONG, ULONG, PSecBufferDesc, PLSA_SEC_HANDLE, PSecBufferDesc,
9b639cf2d6 2015-05-05        kinaba:  PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpInitLsaModeContextFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE,
9b639cf2d6 2015-05-05        kinaba:  LSA_SEC_HANDLE, PSecBufferDesc, ULONG, ULONG, PLSA_SEC_HANDLE, PSecBufferDesc,
9b639cf2d6 2015-05-05        kinaba:  PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpAcceptLsaModeContextFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE) SpDeleteContextFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpApplyControlTokenFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PLUID, ULONG, PSecurityUserData *) SpGetUserInfoFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION *) SpGetExtendedInformationFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryContextAttributesFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PUNICODE_STRING,
9b639cf2d6 2015-05-05        kinaba:  PUNICODE_STRING, ULONG, PVOID, PVOID, PVOID, PTimeStamp) SpAddCredentialsFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(
9b639cf2d6 2015-05-05        kinaba:  SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION) SpSetExtendedInformationFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, PSECPKG_DLL_FUNCTIONS,
9b639cf2d6 2015-05-05        kinaba:  PVOID *) SpInstanceInitFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpInitUserModeContextFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
9b639cf2d6 2015-05-05        kinaba:  PSecBufferDesc, ULONG) SpMakeSignatureFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
9b639cf2d6 2015-05-05        kinaba:  ULONG, PULONG) SpVerifySignatureFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc,
9b639cf2d6 2015-05-05        kinaba:  ULONG) SpSealMessageFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
9b639cf2d6 2015-05-05        kinaba:  ULONG, PULONG) SpUnsealMessageFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PHANDLE) SpGetContextTokenFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpCompleteAuthTokenFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSecBuffer, PSecBuffer) SpFormatCredentialsFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, PUCHAR, PULONG,
9b639cf2d6 2015-05-05        kinaba:  PVOID *) SpMarshallSupplementalCredsFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
9b639cf2d6 2015-05-05        kinaba:  PSecBuffer, PHANDLE) SpExportSecurityContextFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(PSecBuffer, HANDLE,
9b639cf2d6 2015-05-05        kinaba:  PLSA_SEC_HANDLE) SpImportSecurityContextFn;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* Dispatch tables of functions implemented by SSP/AP */
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_FUNCTION_TABLE {
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_INITIALIZE_PACKAGE InitializePackage;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_LOGON_USER LogonUser;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_CALL_PACKAGE CallPackage;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_LOGON_TERMINATED LogonTerminated;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_LOGON_USER_EX LogonUserEx;
9b639cf2d6 2015-05-05        kinaba: 	PLSA_AP_LOGON_USER_EX2 LogonUserEx2;
9b639cf2d6 2015-05-05        kinaba: 	SpInitializeFn *Initialize;
9b639cf2d6 2015-05-05        kinaba: 	SpShutDownFn *Shutdown;
9b639cf2d6 2015-05-05        kinaba: 	SpGetInfoFn *GetInfo;
9b639cf2d6 2015-05-05        kinaba: 	SpAcceptCredentialsFn *AcceptCredentials;
9b639cf2d6 2015-05-05        kinaba: 	SpAcquireCredentialsHandleFn *AcquireCredentialsHandle;
9b639cf2d6 2015-05-05        kinaba: 	SpQueryCredentialsAttributesFn *QueryCredentialsAttributes;
9b639cf2d6 2015-05-05        kinaba: 	SpFreeCredentialsHandleFn *FreeCredentialsHandle;
9b639cf2d6 2015-05-05        kinaba: 	SpSaveCredentialsFn *SaveCredentials;
9b639cf2d6 2015-05-05        kinaba: 	SpGetCredentialsFn *GetCredentials;
9b639cf2d6 2015-05-05        kinaba: 	SpDeleteCredentialsFn *DeleteCredentials;
9b639cf2d6 2015-05-05        kinaba: 	SpInitLsaModeContextFn *InitLsaModeContext;
9b639cf2d6 2015-05-05        kinaba: 	SpAcceptLsaModeContextFn *AcceptLsaModeContext;
9b639cf2d6 2015-05-05        kinaba: 	SpDeleteContextFn *DeleteContext;
9b639cf2d6 2015-05-05        kinaba: 	SpApplyControlTokenFn *ApplyControlToken;
9b639cf2d6 2015-05-05        kinaba: 	SpGetUserInfoFn *GetUserInfo;
9b639cf2d6 2015-05-05        kinaba: 	SpGetExtendedInformationFn *GetExtendedInformation;
9b639cf2d6 2015-05-05        kinaba: 	SpQueryContextAttributesFn *QueryContextAttributes;
9b639cf2d6 2015-05-05        kinaba: 	SpAddCredentialsFn *AddCredentials;
9b639cf2d6 2015-05-05        kinaba: 	SpSetExtendedInformationFn *SetExtendedInformation;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_FUNCTION_TABLE* PSECPKG_FUNCTION_TABLE;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: struct SECPKG_USER_FUNCTION_TABLE {
9b639cf2d6 2015-05-05        kinaba: 	SpInstanceInitFn *InstanceInit;
9b639cf2d6 2015-05-05        kinaba: 	SpInitUserModeContextFn *InitUserModeContext;
9b639cf2d6 2015-05-05        kinaba: 	SpMakeSignatureFn *MakeSignature;
9b639cf2d6 2015-05-05        kinaba: 	SpVerifySignatureFn *VerifySignature;
9b639cf2d6 2015-05-05        kinaba: 	SpSealMessageFn *SealMessage;
9b639cf2d6 2015-05-05        kinaba: 	SpUnsealMessageFn *UnsealMessage;
9b639cf2d6 2015-05-05        kinaba: 	SpGetContextTokenFn *GetContextToken;
9b639cf2d6 2015-05-05        kinaba: 	SpQueryContextAttributesFn *QueryContextAttributes;
9b639cf2d6 2015-05-05        kinaba: 	SpCompleteAuthTokenFn *CompleteAuthToken;
9b639cf2d6 2015-05-05        kinaba: 	SpDeleteContextFn *DeleteUserModeContext;
9b639cf2d6 2015-05-05        kinaba: 	SpFormatCredentialsFn *FormatCredentials;
9b639cf2d6 2015-05-05        kinaba: 	SpMarshallSupplementalCredsFn *MarshallSupplementalCreds;
9b639cf2d6 2015-05-05        kinaba: 	SpExportSecurityContextFn *ExportContext;
9b639cf2d6 2015-05-05        kinaba: 	SpImportSecurityContextFn *ImportContext;
9b639cf2d6 2015-05-05        kinaba: }
9b639cf2d6 2015-05-05        kinaba: alias SECPKG_USER_FUNCTION_TABLE* PSECPKG_USER_FUNCTION_TABLE;
9b639cf2d6 2015-05-05        kinaba: 
9b639cf2d6 2015-05-05        kinaba: /* Entry points to SSP/AP */
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, PULONG,
9b639cf2d6 2015-05-05        kinaba:  PSECPKG_FUNCTION_TABLE *, PULONG) SpLsaModeInitializeFn;
9b639cf2d6 2015-05-05        kinaba: alias NTSTATUS function(ULONG, PULONG,
9b639cf2d6 2015-05-05        kinaba:  PSECPKG_USER_FUNCTION_TABLE *, PULONG) SpUserModeInitializeFn;
9b639cf2d6 2015-05-05        kinaba: