9b639cf2d6 2015-05-05 kinaba: /***********************************************************************\ 9b639cf2d6 2015-05-05 kinaba: * ntsecpkg.d * 9b639cf2d6 2015-05-05 kinaba: * * 9b639cf2d6 2015-05-05 kinaba: * Windows API header module * 9b639cf2d6 2015-05-05 kinaba: * * 9b639cf2d6 2015-05-05 kinaba: * Translated from MinGW Windows headers * 9b639cf2d6 2015-05-05 kinaba: * by Ellery Newcomer * 9b639cf2d6 2015-05-05 kinaba: * * 9b639cf2d6 2015-05-05 kinaba: * Placed into public domain * 9b639cf2d6 2015-05-05 kinaba: \***********************************************************************/ 9b639cf2d6 2015-05-05 kinaba: module win32.ntsecpkg; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: import win32.windef, win32.ntsecapi, win32.security, win32.ntdef, win32.sspi; 9b639cf2d6 2015-05-05 kinaba: import win32.winnt: GUID; 9b639cf2d6 2015-05-05 kinaba: import win32.winbase; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: extern(Windows): 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: enum :ULONG{ 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_DELEGATE = 1, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_MUTUAL_AUTH = 2, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_REPLAY_DETECT = 4, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_SEQUENCE_DETECT = 8, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_CONFIDENTIALITY = 16, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_USE_SESSION_KEY = 32, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_PROMPT_FOR_CREDS = 64, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_USE_SUPPLIED_CREDS = 128, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_ALLOCATE_MEMORY = 256, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_USE_DCE_STYLE = 512, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_DATAGRAM = 1024, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_CONNECTION = 2048, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_EXTENDED_ERROR = 16384, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_STREAM = 32768, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_INTEGRITY = 65536, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_MANUAL_CRED_VALIDATION = 524288, 9b639cf2d6 2015-05-05 kinaba: ISC_REQ_HTTP = 268435456, 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: enum ISC_RET_EXTENDED_ERROR = 16384; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: enum :ULONG{ 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_DELEGATE = 1, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_MUTUAL_AUTH = 2, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_REPLAY_DETECT = 4, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_SEQUENCE_DETECT = 8, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_CONFIDENTIALITY = 16, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_USE_SESSION_KEY = 32, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_ALLOCATE_MEMORY = 256, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_USE_DCE_STYLE = 512, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_DATAGRAM = 1024, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_CONNECTION = 2048, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_EXTENDED_ERROR = 32768, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_STREAM = 65536, 9b639cf2d6 2015-05-05 kinaba: ASC_REQ_INTEGRITY = 131072, 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: enum SECURITY_NATIVE_DREP = 16; 9b639cf2d6 2015-05-05 kinaba: enum SECURITY_NETWORK_DREP = 0; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: enum :ULONG{ 9b639cf2d6 2015-05-05 kinaba: SECPKG_STATE_ENCRYPTION_PERMITTED = 0x01, 9b639cf2d6 2015-05-05 kinaba: SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED = 0x02, 9b639cf2d6 2015-05-05 kinaba: SECPKG_STATE_DOMAIN_CONTROLLER = 0x04, 9b639cf2d6 2015-05-05 kinaba: SECPKG_STATE_WORKSTATION = 0x08, 9b639cf2d6 2015-05-05 kinaba: SECPKG_STATE_STANDALONE = 0x10, 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* enum definitions for Secure Service Provider/Authentication Packages */ 9b639cf2d6 2015-05-05 kinaba: enum LSA_TOKEN_INFORMATION_TYPE { 9b639cf2d6 2015-05-05 kinaba: LsaTokenInformationNull, 9b639cf2d6 2015-05-05 kinaba: LsaTokenInformationV1 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias LSA_TOKEN_INFORMATION_TYPE* PLSA_TOKEN_INFORMATION_TYPE; 9b639cf2d6 2015-05-05 kinaba: enum SECPKG_EXTENDED_INFORMATION_CLASS 9b639cf2d6 2015-05-05 kinaba: { 9b639cf2d6 2015-05-05 kinaba: SecpkgGssInfo = 1, 9b639cf2d6 2015-05-05 kinaba: SecpkgContextThunks, 9b639cf2d6 2015-05-05 kinaba: SecpkgMutualAuthLevel, 9b639cf2d6 2015-05-05 kinaba: SecpkgMaxInfo 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: enum SECPKG_NAME_TYPE { 9b639cf2d6 2015-05-05 kinaba: SecNameSamCompatible, 9b639cf2d6 2015-05-05 kinaba: SecNameAlternateId, 9b639cf2d6 2015-05-05 kinaba: SecNameFlat, 9b639cf2d6 2015-05-05 kinaba: SecNameDN 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* struct definitions for SSP/AP */ 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_PRIMARY_CRED { 9b639cf2d6 2015-05-05 kinaba: LUID LogonId; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING DownlevelName; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING DomainName; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING Password; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING OldPassword; 9b639cf2d6 2015-05-05 kinaba: PSID UserSid; 9b639cf2d6 2015-05-05 kinaba: ULONG Flags; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING DnsDomainName; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING Upn; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING LogonServer; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING Spare1; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING Spare2; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING Spare3; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING Spare4; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_PRIMARY_CRED* PSECPKG_PRIMARY_CRED; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_SUPPLEMENTAL_CRED { 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING PackageName; 9b639cf2d6 2015-05-05 kinaba: ULONG CredentialSize; 9b639cf2d6 2015-05-05 kinaba: PUCHAR Credentials; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_SUPPLEMENTAL_CRED* PSECPKG_SUPPLEMENTAL_CRED; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_SUPPLEMENTAL_CRED_ARRAY { 9b639cf2d6 2015-05-05 kinaba: ULONG CredentialCount; 9b639cf2d6 2015-05-05 kinaba: SECPKG_SUPPLEMENTAL_CRED[1] Credentials; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_SUPPLEMENTAL_CRED_ARRAY* PSECPKG_SUPPLEMENTAL_CRED_ARRAY; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_PARAMETERS { 9b639cf2d6 2015-05-05 kinaba: ULONG Version; 9b639cf2d6 2015-05-05 kinaba: ULONG MachineState; 9b639cf2d6 2015-05-05 kinaba: ULONG SetupMode; 9b639cf2d6 2015-05-05 kinaba: PSID DomainSid; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING DomainName; 9b639cf2d6 2015-05-05 kinaba: UNICODE_STRING DnsDomainName; 9b639cf2d6 2015-05-05 kinaba: GUID DomainGuid; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_PARAMETERS* PSECPKG_PARAMETERS,PSECPKG_EVENT_DOMAIN_CHANGE; 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_CLIENT_INFO { 9b639cf2d6 2015-05-05 kinaba: LUID LogonId; 9b639cf2d6 2015-05-05 kinaba: ULONG ProcessID; 9b639cf2d6 2015-05-05 kinaba: ULONG ThreadID; 9b639cf2d6 2015-05-05 kinaba: BOOLEAN HasTcbPrivilege; 9b639cf2d6 2015-05-05 kinaba: BOOLEAN Impersonating; 9b639cf2d6 2015-05-05 kinaba: BOOLEAN Restricted; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_CLIENT_INFO* PSECPKG_CLIENT_INFO; 9b639cf2d6 2015-05-05 kinaba: struct SECURITY_USER_DATA { 9b639cf2d6 2015-05-05 kinaba: SECURITY_STRING UserName; 9b639cf2d6 2015-05-05 kinaba: SECURITY_STRING LogonDomainName; 9b639cf2d6 2015-05-05 kinaba: SECURITY_STRING LogonServer; 9b639cf2d6 2015-05-05 kinaba: PSID pSid; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECURITY_USER_DATA* PSECURITY_USER_DATA,PSecurityUserData; 9b639cf2d6 2015-05-05 kinaba: alias SECURITY_USER_DATA SecurityUserData; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_GSS_INFO { 9b639cf2d6 2015-05-05 kinaba: ULONG EncodedIdLength; 9b639cf2d6 2015-05-05 kinaba: UCHAR[4] EncodedId; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_GSS_INFO* PSECPKG_GSS_INFO; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_CONTEXT_THUNKS { 9b639cf2d6 2015-05-05 kinaba: ULONG InfoLevelCount; 9b639cf2d6 2015-05-05 kinaba: ULONG[1] Levels; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_CONTEXT_THUNKS* PSECPKG_CONTEXT_THUNKS; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_MUTUAL_AUTH_LEVEL { 9b639cf2d6 2015-05-05 kinaba: ULONG MutualAuthLevel; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_MUTUAL_AUTH_LEVEL* PSECPKG_MUTUAL_AUTH_LEVEL; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_CALL_INFO { 9b639cf2d6 2015-05-05 kinaba: ULONG ProcessId; 9b639cf2d6 2015-05-05 kinaba: ULONG ThreadId; 9b639cf2d6 2015-05-05 kinaba: ULONG Attributes; 9b639cf2d6 2015-05-05 kinaba: ULONG CallCount; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_CALL_INFO* PSECPKG_CALL_INFO; 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_EXTENDED_INFORMATION { 9b639cf2d6 2015-05-05 kinaba: SECPKG_EXTENDED_INFORMATION_CLASS Class; 9b639cf2d6 2015-05-05 kinaba: union _Info{ 9b639cf2d6 2015-05-05 kinaba: SECPKG_GSS_INFO GssInfo; 9b639cf2d6 2015-05-05 kinaba: SECPKG_CONTEXT_THUNKS ContextThunks; 9b639cf2d6 2015-05-05 kinaba: SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: _Info Info; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_EXTENDED_INFORMATION* PSECPKG_EXTENDED_INFORMATION; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* callbacks implemented by SSP/AP dlls and called by the LSA */ 9b639cf2d6 2015-05-05 kinaba: alias void function(ULONG_PTR, ULONG_PTR, PSecBuffer, 9b639cf2d6 2015-05-05 kinaba: PSecBuffer) PLSA_CALLBACK_FUNCTION; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* misc typedefs used in the below prototypes */ 9b639cf2d6 2015-05-05 kinaba: alias PVOID* PLSA_CLIENT_REQUEST; 9b639cf2d6 2015-05-05 kinaba: alias ULONG LSA_SEC_HANDLE; 9b639cf2d6 2015-05-05 kinaba: alias ULONG* PLSA_SEC_HANDLE; 9b639cf2d6 2015-05-05 kinaba: alias LPTHREAD_START_ROUTINE SEC_THREAD_START; 9b639cf2d6 2015-05-05 kinaba: alias PSECURITY_ATTRIBUTES SEC_ATTRS; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* functions used by SSP/AP obtainable by dispatch tables */ 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, PLSA_CALLBACK_FUNCTION) PLSA_REGISTER_CALLBACK; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID) PLSA_CREATE_LOGON_SESSION; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID) PLSA_DELETE_LOGON_SESSION; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID, ULONG, PLSA_STRING, 9b639cf2d6 2015-05-05 kinaba: PLSA_STRING) PLSA_ADD_CREDENTIAL; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID, ULONG, PULONG, BOOLEAN, 9b639cf2d6 2015-05-05 kinaba: PLSA_STRING, PULONG, PLSA_STRING) PLSA_GET_CREDENTIALS; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID, ULONG, PLSA_STRING) PLSA_DELETE_CREDENTIAL; 9b639cf2d6 2015-05-05 kinaba: alias PVOID function(ULONG) PLSA_ALLOCATE_LSA_HEAP; 9b639cf2d6 2015-05-05 kinaba: alias void function(PVOID) PLSA_FREE_LSA_HEAP; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, 9b639cf2d6 2015-05-05 kinaba: ULONG, PVOID*) PLSA_ALLOCATE_CLIENT_BUFFER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID) PLSA_FREE_CLIENT_BUFFER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG, 9b639cf2d6 2015-05-05 kinaba: PVOID, PVOID) PLSA_COPY_TO_CLIENT_BUFFER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, 9b639cf2d6 2015-05-05 kinaba: ULONG, PVOID, PVOID) PLSA_COPY_FROM_CLIENT_BUFFER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function() PLSA_IMPERSONATE_CLIENT; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function() PLSA_UNLOAD_PACKAGE; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(HANDLE, PHANDLE) PLSA_DUPLICATE_HANDLE; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID, ULONG, 9b639cf2d6 2015-05-05 kinaba: PVOID, BOOLEAN) PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS; 9b639cf2d6 2015-05-05 kinaba: alias HANDLE function(SEC_ATTRS, ULONG, SEC_THREAD_START, 9b639cf2d6 2015-05-05 kinaba: PVOID, ULONG, PULONG) PLSA_CREATE_THREAD; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSECPKG_CLIENT_INFO) PLSA_GET_CLIENT_INFO; 9b639cf2d6 2015-05-05 kinaba: alias HANDLE function(SEC_THREAD_START, PVOID, 9b639cf2d6 2015-05-05 kinaba: ULONG, ULONG, ULONG, ULONG, HANDLE) PLSA_REGISTER_NOTIFICATION; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(HANDLE) PLSA_CANCEL_NOTIFICATION; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSecBuffer, PSecBuffer) PLSA_MAP_BUFFER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID, PTOKEN_SOURCE, 9b639cf2d6 2015-05-05 kinaba: SECURITY_LOGON_TYPE, SECURITY_IMPERSONATION_LEVEL, LSA_TOKEN_INFORMATION_TYPE, 9b639cf2d6 2015-05-05 kinaba: PVOID, PTOKEN_GROUPS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, PHANDLE, PNTSTATUS) PLSA_CREATE_TOKEN; 9b639cf2d6 2015-05-05 kinaba: alias void function(NTSTATUS, NTSTATUS, PUNICODE_STRING, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, PUNICODE_STRING, PSID, SECURITY_LOGON_TYPE, 9b639cf2d6 2015-05-05 kinaba: PTOKEN_SOURCE, PLUID) PLSA_AUDIT_LOGON; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG, 9b639cf2d6 2015-05-05 kinaba: PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE; 9b639cf2d6 2015-05-05 kinaba: alias BOOLEAN function(PSECPKG_CALL_INFO) PLSA_GET_CALL_INFO; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID, 9b639cf2d6 2015-05-05 kinaba: ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGEEX; 9b639cf2d6 2015-05-05 kinaba: alias PVOID function(ULONG, ULONG) PLSA_CREATE_SHARED_MEMORY; 9b639cf2d6 2015-05-05 kinaba: alias PVOID function(PVOID, ULONG) PLSA_ALLOCATE_SHARED_MEMORY; 9b639cf2d6 2015-05-05 kinaba: alias void function(PVOID, PVOID) PLSA_FREE_SHARED_MEMORY; 9b639cf2d6 2015-05-05 kinaba: alias BOOLEAN function(PVOID) PLSA_DELETE_SHARED_MEMORY; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE, 9b639cf2d6 2015-05-05 kinaba: PSECURITY_STRING, BOOLEAN, ULONG, PVOID*) PLSA_OPEN_SAM_USER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PVOID, PVOID *, PULONG, 9b639cf2d6 2015-05-05 kinaba: PVOID *, PULONG) PLSA_GET_USER_CREDENTIALS; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PVOID, PUCHAR *, PULONG) PLSA_GET_USER_AUTH_DATA; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PVOID) PLSA_CLOSE_SAM_USER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PVOID, ULONG, 9b639cf2d6 2015-05-05 kinaba: SECURITY_IMPERSONATION_LEVEL, PTOKEN_SOURCE, SECURITY_LOGON_TYPE, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, PHANDLE, PLUID, PUNICODE_STRING, PNTSTATUS) PLSA_CONVERT_AUTH_DATA_TO_TOKEN; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PCHAR, ULONG_PTR, ULONG_PTR, 9b639cf2d6 2015-05-05 kinaba: PSecBuffer, PSecBuffer) PLSA_CLIENT_CALLBACK; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY) PLSA_UPDATE_PRIMARY_CREDENTIALS; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSECURITY_STRING, 9b639cf2d6 2015-05-05 kinaba: SECPKG_NAME_TYPE, PSECURITY_STRING, PUCHAR *, PULONG, PUNICODE_STRING) PLSA_GET_AUTH_DATA_FOR_USER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, BOOLEAN, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, PUNICODE_STRING, ULONG, PUNICODE_STRING, PUNICODE_STRING, 9b639cf2d6 2015-05-05 kinaba: PULONG) PLSA_CRACK_SINGLE_NAME; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, BOOLEAN, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, NTSTATUS) PLSA_AUDIT_ACCOUNT_LOGON; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID, 9b639cf2d6 2015-05-05 kinaba: PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE_PASSTHROUGH; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* Dispatch tables of functions used by SSP/AP */ 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_DLL_FUNCTIONS { 9b639cf2d6 2015-05-05 kinaba: PLSA_ALLOCATE_LSA_HEAP AllocateHeap; 9b639cf2d6 2015-05-05 kinaba: PLSA_FREE_LSA_HEAP FreeHeap; 9b639cf2d6 2015-05-05 kinaba: PLSA_REGISTER_CALLBACK RegisterCallback; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_DLL_FUNCTIONS* PSECPKG_DLL_FUNCTIONS; 9b639cf2d6 2015-05-05 kinaba: struct LSA_DISPATCH_TABLE { 9b639cf2d6 2015-05-05 kinaba: PLSA_CREATE_LOGON_SESSION CreateLogonSession; 9b639cf2d6 2015-05-05 kinaba: PLSA_DELETE_LOGON_SESSION DeleteLogonSession; 9b639cf2d6 2015-05-05 kinaba: PLSA_ADD_CREDENTIAL AddCredential; 9b639cf2d6 2015-05-05 kinaba: PLSA_GET_CREDENTIALS GetCredentials; 9b639cf2d6 2015-05-05 kinaba: PLSA_DELETE_CREDENTIAL DeleteCredential; 9b639cf2d6 2015-05-05 kinaba: PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap; 9b639cf2d6 2015-05-05 kinaba: PLSA_FREE_LSA_HEAP FreeLsaHeap; 9b639cf2d6 2015-05-05 kinaba: PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_FREE_CLIENT_BUFFER FreeClientBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias LSA_DISPATCH_TABLE* PLSA_DISPATCH_TABLE; 9b639cf2d6 2015-05-05 kinaba: struct LSA_SECPKG_FUNCTION_TABLE { 9b639cf2d6 2015-05-05 kinaba: PLSA_CREATE_LOGON_SESSION CreateLogonSession; 9b639cf2d6 2015-05-05 kinaba: PLSA_DELETE_LOGON_SESSION DeleteLogonSession; 9b639cf2d6 2015-05-05 kinaba: PLSA_ADD_CREDENTIAL AddCredential; 9b639cf2d6 2015-05-05 kinaba: PLSA_GET_CREDENTIALS GetCredentials; 9b639cf2d6 2015-05-05 kinaba: PLSA_DELETE_CREDENTIAL DeleteCredential; 9b639cf2d6 2015-05-05 kinaba: PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap; 9b639cf2d6 2015-05-05 kinaba: PLSA_FREE_LSA_HEAP FreeLsaHeap; 9b639cf2d6 2015-05-05 kinaba: PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_FREE_CLIENT_BUFFER FreeClientBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_IMPERSONATE_CLIENT ImpersonateClient; 9b639cf2d6 2015-05-05 kinaba: PLSA_UNLOAD_PACKAGE UnloadPackage; 9b639cf2d6 2015-05-05 kinaba: PLSA_DUPLICATE_HANDLE DuplicateHandle; 9b639cf2d6 2015-05-05 kinaba: PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials; 9b639cf2d6 2015-05-05 kinaba: PLSA_CREATE_THREAD CreateThread; 9b639cf2d6 2015-05-05 kinaba: PLSA_GET_CLIENT_INFO GetClientInfo; 9b639cf2d6 2015-05-05 kinaba: PLSA_REGISTER_NOTIFICATION RegisterNotification; 9b639cf2d6 2015-05-05 kinaba: PLSA_CANCEL_NOTIFICATION CancelNotification; 9b639cf2d6 2015-05-05 kinaba: PLSA_MAP_BUFFER MapBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_CREATE_TOKEN CreateToken; 9b639cf2d6 2015-05-05 kinaba: PLSA_AUDIT_LOGON AuditLogon; 9b639cf2d6 2015-05-05 kinaba: PLSA_CALL_PACKAGE CallPackage; 9b639cf2d6 2015-05-05 kinaba: PLSA_FREE_LSA_HEAP FreeReturnBuffer; 9b639cf2d6 2015-05-05 kinaba: PLSA_GET_CALL_INFO GetCallInfo; 9b639cf2d6 2015-05-05 kinaba: PLSA_CALL_PACKAGEEX CallPackageEx; 9b639cf2d6 2015-05-05 kinaba: PLSA_CREATE_SHARED_MEMORY CreateSharedMemory; 9b639cf2d6 2015-05-05 kinaba: PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory; 9b639cf2d6 2015-05-05 kinaba: PLSA_FREE_SHARED_MEMORY FreeSharedMemory; 9b639cf2d6 2015-05-05 kinaba: PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory; 9b639cf2d6 2015-05-05 kinaba: PLSA_OPEN_SAM_USER OpenSamUser; 9b639cf2d6 2015-05-05 kinaba: PLSA_GET_USER_CREDENTIALS GetUserCredentials; 9b639cf2d6 2015-05-05 kinaba: PLSA_GET_USER_AUTH_DATA GetUserAuthData; 9b639cf2d6 2015-05-05 kinaba: PLSA_CLOSE_SAM_USER CloseSamUser; 9b639cf2d6 2015-05-05 kinaba: PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken; 9b639cf2d6 2015-05-05 kinaba: PLSA_CLIENT_CALLBACK ClientCallback; 9b639cf2d6 2015-05-05 kinaba: PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials; 9b639cf2d6 2015-05-05 kinaba: PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser; 9b639cf2d6 2015-05-05 kinaba: PLSA_CRACK_SINGLE_NAME CrackSingleName; 9b639cf2d6 2015-05-05 kinaba: PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon; 9b639cf2d6 2015-05-05 kinaba: PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias LSA_SECPKG_FUNCTION_TABLE* PLSA_SECPKG_FUNCTION_TABLE; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* functions implemented by SSP/AP obtainable by dispatch tables */ 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, PLSA_DISPATCH_TABLE, 9b639cf2d6 2015-05-05 kinaba: PLSA_STRING, PLSA_STRING, PLSA_STRING *) PLSA_AP_INITIALIZE_PACKAGE; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LPWSTR, LPWSTR, LPWSTR, LPWSTR, 9b639cf2d6 2015-05-05 kinaba: DWORD, DWORD, PHANDLE) PLSA_AP_LOGON_USER; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG, 9b639cf2d6 2015-05-05 kinaba: PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE; 9b639cf2d6 2015-05-05 kinaba: alias void function(PLUID) PLSA_AP_LOGON_TERMINATED; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, 9b639cf2d6 2015-05-05 kinaba: PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_UNTRUSTED; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PUNICODE_STRING, 9b639cf2d6 2015-05-05 kinaba: PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_PASSTHROUGH; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, 9b639cf2d6 2015-05-05 kinaba: SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS, 9b639cf2d6 2015-05-05 kinaba: PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING *) PLSA_AP_LOGON_USER_EX; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLSA_CLIENT_REQUEST, 9b639cf2d6 2015-05-05 kinaba: SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS, 9b639cf2d6 2015-05-05 kinaba: PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING *, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY *) PLSA_AP_LOGON_USER_EX2; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG_PTR, PSECPKG_PARAMETERS, 9b639cf2d6 2015-05-05 kinaba: PLSA_SECPKG_FUNCTION_TABLE) SpInitializeFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function() SpShutDownFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSecPkgInfoW) SpGetInfoFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(SECURITY_LOGON_TYPE, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED) SpAcceptCredentialsFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PUNICODE_STRING, ULONG, 9b639cf2d6 2015-05-05 kinaba: PLUID, PVOID, PVOID, PVOID, PLSA_SEC_HANDLE, PTimeStamp) SpAcquireCredentialsHandleFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryCredentialsAttributesFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE) SpFreeCredentialsHandleFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpSaveCredentialsFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpGetCredentialsFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpDeleteCredentialsFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, ULONG, ULONG, PSecBufferDesc, PLSA_SEC_HANDLE, PSecBufferDesc, 9b639cf2d6 2015-05-05 kinaba: PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpInitLsaModeContextFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, 9b639cf2d6 2015-05-05 kinaba: LSA_SEC_HANDLE, PSecBufferDesc, ULONG, ULONG, PLSA_SEC_HANDLE, PSecBufferDesc, 9b639cf2d6 2015-05-05 kinaba: PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpAcceptLsaModeContextFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE) SpDeleteContextFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpApplyControlTokenFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PLUID, ULONG, PSecurityUserData *) SpGetUserInfoFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION *) SpGetExtendedInformationFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryContextAttributesFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PUNICODE_STRING, 9b639cf2d6 2015-05-05 kinaba: PUNICODE_STRING, ULONG, PVOID, PVOID, PVOID, PTimeStamp) SpAddCredentialsFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function( 9b639cf2d6 2015-05-05 kinaba: SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION) SpSetExtendedInformationFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, PSECPKG_DLL_FUNCTIONS, 9b639cf2d6 2015-05-05 kinaba: PVOID *) SpInstanceInitFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpInitUserModeContextFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, 9b639cf2d6 2015-05-05 kinaba: PSecBufferDesc, ULONG) SpMakeSignatureFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc, 9b639cf2d6 2015-05-05 kinaba: ULONG, PULONG) SpVerifySignatureFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc, 9b639cf2d6 2015-05-05 kinaba: ULONG) SpSealMessageFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc, 9b639cf2d6 2015-05-05 kinaba: ULONG, PULONG) SpUnsealMessageFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PHANDLE) SpGetContextTokenFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpCompleteAuthTokenFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSecBuffer, PSecBuffer) SpFormatCredentialsFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, PUCHAR, PULONG, 9b639cf2d6 2015-05-05 kinaba: PVOID *) SpMarshallSupplementalCredsFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, 9b639cf2d6 2015-05-05 kinaba: PSecBuffer, PHANDLE) SpExportSecurityContextFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(PSecBuffer, HANDLE, 9b639cf2d6 2015-05-05 kinaba: PLSA_SEC_HANDLE) SpImportSecurityContextFn; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* Dispatch tables of functions implemented by SSP/AP */ 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_FUNCTION_TABLE { 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_INITIALIZE_PACKAGE InitializePackage; 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_LOGON_USER LogonUser; 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_CALL_PACKAGE CallPackage; 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_LOGON_TERMINATED LogonTerminated; 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted; 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough; 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_LOGON_USER_EX LogonUserEx; 9b639cf2d6 2015-05-05 kinaba: PLSA_AP_LOGON_USER_EX2 LogonUserEx2; 9b639cf2d6 2015-05-05 kinaba: SpInitializeFn *Initialize; 9b639cf2d6 2015-05-05 kinaba: SpShutDownFn *Shutdown; 9b639cf2d6 2015-05-05 kinaba: SpGetInfoFn *GetInfo; 9b639cf2d6 2015-05-05 kinaba: SpAcceptCredentialsFn *AcceptCredentials; 9b639cf2d6 2015-05-05 kinaba: SpAcquireCredentialsHandleFn *AcquireCredentialsHandle; 9b639cf2d6 2015-05-05 kinaba: SpQueryCredentialsAttributesFn *QueryCredentialsAttributes; 9b639cf2d6 2015-05-05 kinaba: SpFreeCredentialsHandleFn *FreeCredentialsHandle; 9b639cf2d6 2015-05-05 kinaba: SpSaveCredentialsFn *SaveCredentials; 9b639cf2d6 2015-05-05 kinaba: SpGetCredentialsFn *GetCredentials; 9b639cf2d6 2015-05-05 kinaba: SpDeleteCredentialsFn *DeleteCredentials; 9b639cf2d6 2015-05-05 kinaba: SpInitLsaModeContextFn *InitLsaModeContext; 9b639cf2d6 2015-05-05 kinaba: SpAcceptLsaModeContextFn *AcceptLsaModeContext; 9b639cf2d6 2015-05-05 kinaba: SpDeleteContextFn *DeleteContext; 9b639cf2d6 2015-05-05 kinaba: SpApplyControlTokenFn *ApplyControlToken; 9b639cf2d6 2015-05-05 kinaba: SpGetUserInfoFn *GetUserInfo; 9b639cf2d6 2015-05-05 kinaba: SpGetExtendedInformationFn *GetExtendedInformation; 9b639cf2d6 2015-05-05 kinaba: SpQueryContextAttributesFn *QueryContextAttributes; 9b639cf2d6 2015-05-05 kinaba: SpAddCredentialsFn *AddCredentials; 9b639cf2d6 2015-05-05 kinaba: SpSetExtendedInformationFn *SetExtendedInformation; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_FUNCTION_TABLE* PSECPKG_FUNCTION_TABLE; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: struct SECPKG_USER_FUNCTION_TABLE { 9b639cf2d6 2015-05-05 kinaba: SpInstanceInitFn *InstanceInit; 9b639cf2d6 2015-05-05 kinaba: SpInitUserModeContextFn *InitUserModeContext; 9b639cf2d6 2015-05-05 kinaba: SpMakeSignatureFn *MakeSignature; 9b639cf2d6 2015-05-05 kinaba: SpVerifySignatureFn *VerifySignature; 9b639cf2d6 2015-05-05 kinaba: SpSealMessageFn *SealMessage; 9b639cf2d6 2015-05-05 kinaba: SpUnsealMessageFn *UnsealMessage; 9b639cf2d6 2015-05-05 kinaba: SpGetContextTokenFn *GetContextToken; 9b639cf2d6 2015-05-05 kinaba: SpQueryContextAttributesFn *QueryContextAttributes; 9b639cf2d6 2015-05-05 kinaba: SpCompleteAuthTokenFn *CompleteAuthToken; 9b639cf2d6 2015-05-05 kinaba: SpDeleteContextFn *DeleteUserModeContext; 9b639cf2d6 2015-05-05 kinaba: SpFormatCredentialsFn *FormatCredentials; 9b639cf2d6 2015-05-05 kinaba: SpMarshallSupplementalCredsFn *MarshallSupplementalCreds; 9b639cf2d6 2015-05-05 kinaba: SpExportSecurityContextFn *ExportContext; 9b639cf2d6 2015-05-05 kinaba: SpImportSecurityContextFn *ImportContext; 9b639cf2d6 2015-05-05 kinaba: } 9b639cf2d6 2015-05-05 kinaba: alias SECPKG_USER_FUNCTION_TABLE* PSECPKG_USER_FUNCTION_TABLE; 9b639cf2d6 2015-05-05 kinaba: 9b639cf2d6 2015-05-05 kinaba: /* Entry points to SSP/AP */ 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, PULONG, 9b639cf2d6 2015-05-05 kinaba: PSECPKG_FUNCTION_TABLE *, PULONG) SpLsaModeInitializeFn; 9b639cf2d6 2015-05-05 kinaba: alias NTSTATUS function(ULONG, PULONG, 9b639cf2d6 2015-05-05 kinaba: PSECPKG_USER_FUNCTION_TABLE *, PULONG) SpUserModeInitializeFn; 9b639cf2d6 2015-05-05 kinaba: