Artifact f28bac35de29964ec88bb20baf1f3d95ac764224
- File
src/win32/ntsecpkg.d
-
2015-05-05 06:49:05
- part of checkin
[9b639cf2d6]
on branch trunk
- Working version for update to 2.067.
The problem was __gshared. Replacing it with TLS fixed the issue. Remaining problem is that "hack.d"'s CloseHandle hack is not working anymore.
(user: kinaba) [annotate]
-
2015-05-05 06:49:05
- part of checkin
[9b639cf2d6]
on branch trunk
- Working version for update to 2.067.
/***********************************************************************\ * ntsecpkg.d * * * * Windows API header module * * * * Translated from MinGW Windows headers * * by Ellery Newcomer * * * * Placed into public domain * \***********************************************************************/ module win32.ntsecpkg; import win32.windef, win32.ntsecapi, win32.security, win32.ntdef, win32.sspi; import win32.winnt: GUID; import win32.winbase; extern(Windows): enum :ULONG{ ISC_REQ_DELEGATE = 1, ISC_REQ_MUTUAL_AUTH = 2, ISC_REQ_REPLAY_DETECT = 4, ISC_REQ_SEQUENCE_DETECT = 8, ISC_REQ_CONFIDENTIALITY = 16, ISC_REQ_USE_SESSION_KEY = 32, ISC_REQ_PROMPT_FOR_CREDS = 64, ISC_REQ_USE_SUPPLIED_CREDS = 128, ISC_REQ_ALLOCATE_MEMORY = 256, ISC_REQ_USE_DCE_STYLE = 512, ISC_REQ_DATAGRAM = 1024, ISC_REQ_CONNECTION = 2048, ISC_REQ_EXTENDED_ERROR = 16384, ISC_REQ_STREAM = 32768, ISC_REQ_INTEGRITY = 65536, ISC_REQ_MANUAL_CRED_VALIDATION = 524288, ISC_REQ_HTTP = 268435456, } enum ISC_RET_EXTENDED_ERROR = 16384; enum :ULONG{ ASC_REQ_DELEGATE = 1, ASC_REQ_MUTUAL_AUTH = 2, ASC_REQ_REPLAY_DETECT = 4, ASC_REQ_SEQUENCE_DETECT = 8, ASC_REQ_CONFIDENTIALITY = 16, ASC_REQ_USE_SESSION_KEY = 32, ASC_REQ_ALLOCATE_MEMORY = 256, ASC_REQ_USE_DCE_STYLE = 512, ASC_REQ_DATAGRAM = 1024, ASC_REQ_CONNECTION = 2048, ASC_REQ_EXTENDED_ERROR = 32768, ASC_REQ_STREAM = 65536, ASC_REQ_INTEGRITY = 131072, } enum SECURITY_NATIVE_DREP = 16; enum SECURITY_NETWORK_DREP = 0; enum :ULONG{ SECPKG_STATE_ENCRYPTION_PERMITTED = 0x01, SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED = 0x02, SECPKG_STATE_DOMAIN_CONTROLLER = 0x04, SECPKG_STATE_WORKSTATION = 0x08, SECPKG_STATE_STANDALONE = 0x10, } /* enum definitions for Secure Service Provider/Authentication Packages */ enum LSA_TOKEN_INFORMATION_TYPE { LsaTokenInformationNull, LsaTokenInformationV1 } alias LSA_TOKEN_INFORMATION_TYPE* PLSA_TOKEN_INFORMATION_TYPE; enum SECPKG_EXTENDED_INFORMATION_CLASS { SecpkgGssInfo = 1, SecpkgContextThunks, SecpkgMutualAuthLevel, SecpkgMaxInfo } enum SECPKG_NAME_TYPE { SecNameSamCompatible, SecNameAlternateId, SecNameFlat, SecNameDN } /* struct definitions for SSP/AP */ struct SECPKG_PRIMARY_CRED { LUID LogonId; UNICODE_STRING DownlevelName; UNICODE_STRING DomainName; UNICODE_STRING Password; UNICODE_STRING OldPassword; PSID UserSid; ULONG Flags; UNICODE_STRING DnsDomainName; UNICODE_STRING Upn; UNICODE_STRING LogonServer; UNICODE_STRING Spare1; UNICODE_STRING Spare2; UNICODE_STRING Spare3; UNICODE_STRING Spare4; } alias SECPKG_PRIMARY_CRED* PSECPKG_PRIMARY_CRED; struct SECPKG_SUPPLEMENTAL_CRED { UNICODE_STRING PackageName; ULONG CredentialSize; PUCHAR Credentials; } alias SECPKG_SUPPLEMENTAL_CRED* PSECPKG_SUPPLEMENTAL_CRED; struct SECPKG_SUPPLEMENTAL_CRED_ARRAY { ULONG CredentialCount; SECPKG_SUPPLEMENTAL_CRED[1] Credentials; } alias SECPKG_SUPPLEMENTAL_CRED_ARRAY* PSECPKG_SUPPLEMENTAL_CRED_ARRAY; struct SECPKG_PARAMETERS { ULONG Version; ULONG MachineState; ULONG SetupMode; PSID DomainSid; UNICODE_STRING DomainName; UNICODE_STRING DnsDomainName; GUID DomainGuid; } alias SECPKG_PARAMETERS* PSECPKG_PARAMETERS,PSECPKG_EVENT_DOMAIN_CHANGE; alias SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE; struct SECPKG_CLIENT_INFO { LUID LogonId; ULONG ProcessID; ULONG ThreadID; BOOLEAN HasTcbPrivilege; BOOLEAN Impersonating; BOOLEAN Restricted; } alias SECPKG_CLIENT_INFO* PSECPKG_CLIENT_INFO; struct SECURITY_USER_DATA { SECURITY_STRING UserName; SECURITY_STRING LogonDomainName; SECURITY_STRING LogonServer; PSID pSid; } alias SECURITY_USER_DATA* PSECURITY_USER_DATA,PSecurityUserData; alias SECURITY_USER_DATA SecurityUserData; struct SECPKG_GSS_INFO { ULONG EncodedIdLength; UCHAR[4] EncodedId; } alias SECPKG_GSS_INFO* PSECPKG_GSS_INFO; struct SECPKG_CONTEXT_THUNKS { ULONG InfoLevelCount; ULONG[1] Levels; } alias SECPKG_CONTEXT_THUNKS* PSECPKG_CONTEXT_THUNKS; struct SECPKG_MUTUAL_AUTH_LEVEL { ULONG MutualAuthLevel; } alias SECPKG_MUTUAL_AUTH_LEVEL* PSECPKG_MUTUAL_AUTH_LEVEL; struct SECPKG_CALL_INFO { ULONG ProcessId; ULONG ThreadId; ULONG Attributes; ULONG CallCount; } alias SECPKG_CALL_INFO* PSECPKG_CALL_INFO; struct SECPKG_EXTENDED_INFORMATION { SECPKG_EXTENDED_INFORMATION_CLASS Class; union _Info{ SECPKG_GSS_INFO GssInfo; SECPKG_CONTEXT_THUNKS ContextThunks; SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel; } _Info Info; } alias SECPKG_EXTENDED_INFORMATION* PSECPKG_EXTENDED_INFORMATION; /* callbacks implemented by SSP/AP dlls and called by the LSA */ alias void function(ULONG_PTR, ULONG_PTR, PSecBuffer, PSecBuffer) PLSA_CALLBACK_FUNCTION; /* misc typedefs used in the below prototypes */ alias PVOID* PLSA_CLIENT_REQUEST; alias ULONG LSA_SEC_HANDLE; alias ULONG* PLSA_SEC_HANDLE; alias LPTHREAD_START_ROUTINE SEC_THREAD_START; alias PSECURITY_ATTRIBUTES SEC_ATTRS; /* functions used by SSP/AP obtainable by dispatch tables */ alias NTSTATUS function(ULONG, PLSA_CALLBACK_FUNCTION) PLSA_REGISTER_CALLBACK; alias NTSTATUS function(PLUID) PLSA_CREATE_LOGON_SESSION; alias NTSTATUS function(PLUID) PLSA_DELETE_LOGON_SESSION; alias NTSTATUS function(PLUID, ULONG, PLSA_STRING, PLSA_STRING) PLSA_ADD_CREDENTIAL; alias NTSTATUS function(PLUID, ULONG, PULONG, BOOLEAN, PLSA_STRING, PULONG, PLSA_STRING) PLSA_GET_CREDENTIALS; alias NTSTATUS function(PLUID, ULONG, PLSA_STRING) PLSA_DELETE_CREDENTIAL; alias PVOID function(ULONG) PLSA_ALLOCATE_LSA_HEAP; alias void function(PVOID) PLSA_FREE_LSA_HEAP; alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG, PVOID*) PLSA_ALLOCATE_CLIENT_BUFFER; alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID) PLSA_FREE_CLIENT_BUFFER; alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG, PVOID, PVOID) PLSA_COPY_TO_CLIENT_BUFFER; alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG, PVOID, PVOID) PLSA_COPY_FROM_CLIENT_BUFFER; alias NTSTATUS function() PLSA_IMPERSONATE_CLIENT; alias NTSTATUS function() PLSA_UNLOAD_PACKAGE; alias NTSTATUS function(HANDLE, PHANDLE) PLSA_DUPLICATE_HANDLE; alias NTSTATUS function(PLUID, ULONG, PVOID, BOOLEAN) PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS; alias HANDLE function(SEC_ATTRS, ULONG, SEC_THREAD_START, PVOID, ULONG, PULONG) PLSA_CREATE_THREAD; alias NTSTATUS function(PSECPKG_CLIENT_INFO) PLSA_GET_CLIENT_INFO; alias HANDLE function(SEC_THREAD_START, PVOID, ULONG, ULONG, ULONG, ULONG, HANDLE) PLSA_REGISTER_NOTIFICATION; alias NTSTATUS function(HANDLE) PLSA_CANCEL_NOTIFICATION; alias NTSTATUS function(PSecBuffer, PSecBuffer) PLSA_MAP_BUFFER; alias NTSTATUS function(PLUID, PTOKEN_SOURCE, SECURITY_LOGON_TYPE, SECURITY_IMPERSONATION_LEVEL, LSA_TOKEN_INFORMATION_TYPE, PVOID, PTOKEN_GROUPS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, PHANDLE, PNTSTATUS) PLSA_CREATE_TOKEN; alias void function(NTSTATUS, NTSTATUS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, PSID, SECURITY_LOGON_TYPE, PTOKEN_SOURCE, PLUID) PLSA_AUDIT_LOGON; alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE; alias BOOLEAN function(PSECPKG_CALL_INFO) PLSA_GET_CALL_INFO; alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGEEX; alias PVOID function(ULONG, ULONG) PLSA_CREATE_SHARED_MEMORY; alias PVOID function(PVOID, ULONG) PLSA_ALLOCATE_SHARED_MEMORY; alias void function(PVOID, PVOID) PLSA_FREE_SHARED_MEMORY; alias BOOLEAN function(PVOID) PLSA_DELETE_SHARED_MEMORY; alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE, PSECURITY_STRING, BOOLEAN, ULONG, PVOID*) PLSA_OPEN_SAM_USER; alias NTSTATUS function(PVOID, PVOID *, PULONG, PVOID *, PULONG) PLSA_GET_USER_CREDENTIALS; alias NTSTATUS function(PVOID, PUCHAR *, PULONG) PLSA_GET_USER_AUTH_DATA; alias NTSTATUS function(PVOID) PLSA_CLOSE_SAM_USER; alias NTSTATUS function(PVOID, ULONG, SECURITY_IMPERSONATION_LEVEL, PTOKEN_SOURCE, SECURITY_LOGON_TYPE, PUNICODE_STRING, PHANDLE, PLUID, PUNICODE_STRING, PNTSTATUS) PLSA_CONVERT_AUTH_DATA_TO_TOKEN; alias NTSTATUS function(PCHAR, ULONG_PTR, ULONG_PTR, PSecBuffer, PSecBuffer) PLSA_CLIENT_CALLBACK; alias NTSTATUS function(PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY) PLSA_UPDATE_PRIMARY_CREDENTIALS; alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE, PSECURITY_STRING, PUCHAR *, PULONG, PUNICODE_STRING) PLSA_GET_AUTH_DATA_FOR_USER; alias NTSTATUS function(ULONG, BOOLEAN, PUNICODE_STRING, PUNICODE_STRING, ULONG, PUNICODE_STRING, PUNICODE_STRING, PULONG) PLSA_CRACK_SINGLE_NAME; alias NTSTATUS function(ULONG, BOOLEAN, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, NTSTATUS) PLSA_AUDIT_ACCOUNT_LOGON; alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE_PASSTHROUGH; /* Dispatch tables of functions used by SSP/AP */ struct SECPKG_DLL_FUNCTIONS { PLSA_ALLOCATE_LSA_HEAP AllocateHeap; PLSA_FREE_LSA_HEAP FreeHeap; PLSA_REGISTER_CALLBACK RegisterCallback; } alias SECPKG_DLL_FUNCTIONS* PSECPKG_DLL_FUNCTIONS; struct LSA_DISPATCH_TABLE { PLSA_CREATE_LOGON_SESSION CreateLogonSession; PLSA_DELETE_LOGON_SESSION DeleteLogonSession; PLSA_ADD_CREDENTIAL AddCredential; PLSA_GET_CREDENTIALS GetCredentials; PLSA_DELETE_CREDENTIAL DeleteCredential; PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap; PLSA_FREE_LSA_HEAP FreeLsaHeap; PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer; PLSA_FREE_CLIENT_BUFFER FreeClientBuffer; PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer; PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer; } alias LSA_DISPATCH_TABLE* PLSA_DISPATCH_TABLE; struct LSA_SECPKG_FUNCTION_TABLE { PLSA_CREATE_LOGON_SESSION CreateLogonSession; PLSA_DELETE_LOGON_SESSION DeleteLogonSession; PLSA_ADD_CREDENTIAL AddCredential; PLSA_GET_CREDENTIALS GetCredentials; PLSA_DELETE_CREDENTIAL DeleteCredential; PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap; PLSA_FREE_LSA_HEAP FreeLsaHeap; PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer; PLSA_FREE_CLIENT_BUFFER FreeClientBuffer; PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer; PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer; PLSA_IMPERSONATE_CLIENT ImpersonateClient; PLSA_UNLOAD_PACKAGE UnloadPackage; PLSA_DUPLICATE_HANDLE DuplicateHandle; PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials; PLSA_CREATE_THREAD CreateThread; PLSA_GET_CLIENT_INFO GetClientInfo; PLSA_REGISTER_NOTIFICATION RegisterNotification; PLSA_CANCEL_NOTIFICATION CancelNotification; PLSA_MAP_BUFFER MapBuffer; PLSA_CREATE_TOKEN CreateToken; PLSA_AUDIT_LOGON AuditLogon; PLSA_CALL_PACKAGE CallPackage; PLSA_FREE_LSA_HEAP FreeReturnBuffer; PLSA_GET_CALL_INFO GetCallInfo; PLSA_CALL_PACKAGEEX CallPackageEx; PLSA_CREATE_SHARED_MEMORY CreateSharedMemory; PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory; PLSA_FREE_SHARED_MEMORY FreeSharedMemory; PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory; PLSA_OPEN_SAM_USER OpenSamUser; PLSA_GET_USER_CREDENTIALS GetUserCredentials; PLSA_GET_USER_AUTH_DATA GetUserAuthData; PLSA_CLOSE_SAM_USER CloseSamUser; PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken; PLSA_CLIENT_CALLBACK ClientCallback; PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials; PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser; PLSA_CRACK_SINGLE_NAME CrackSingleName; PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon; PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough; } alias LSA_SECPKG_FUNCTION_TABLE* PLSA_SECPKG_FUNCTION_TABLE; /* functions implemented by SSP/AP obtainable by dispatch tables */ alias NTSTATUS function(ULONG, PLSA_DISPATCH_TABLE, PLSA_STRING, PLSA_STRING, PLSA_STRING *) PLSA_AP_INITIALIZE_PACKAGE; alias NTSTATUS function(LPWSTR, LPWSTR, LPWSTR, LPWSTR, DWORD, DWORD, PHANDLE) PLSA_AP_LOGON_USER; alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE; alias void function(PLUID) PLSA_AP_LOGON_TERMINATED; alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_UNTRUSTED; alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_PASSTHROUGH; alias NTSTATUS function(PLSA_CLIENT_REQUEST, SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS, PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *, PUNICODE_STRING *) PLSA_AP_LOGON_USER_EX; alias NTSTATUS function(PLSA_CLIENT_REQUEST, SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS, PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *, PUNICODE_STRING *, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY *) PLSA_AP_LOGON_USER_EX2; alias NTSTATUS function(ULONG_PTR, PSECPKG_PARAMETERS, PLSA_SECPKG_FUNCTION_TABLE) SpInitializeFn; alias NTSTATUS function() SpShutDownFn; alias NTSTATUS function(PSecPkgInfoW) SpGetInfoFn; alias NTSTATUS function(SECURITY_LOGON_TYPE, PUNICODE_STRING, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED) SpAcceptCredentialsFn; alias NTSTATUS function(PUNICODE_STRING, ULONG, PLUID, PVOID, PVOID, PVOID, PLSA_SEC_HANDLE, PTimeStamp) SpAcquireCredentialsHandleFn; alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryCredentialsAttributesFn; alias NTSTATUS function(LSA_SEC_HANDLE) SpFreeCredentialsHandleFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpSaveCredentialsFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpGetCredentialsFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpDeleteCredentialsFn; alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE, PUNICODE_STRING, ULONG, ULONG, PSecBufferDesc, PLSA_SEC_HANDLE, PSecBufferDesc, PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpInitLsaModeContextFn; alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE, PSecBufferDesc, ULONG, ULONG, PLSA_SEC_HANDLE, PSecBufferDesc, PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpAcceptLsaModeContextFn; alias NTSTATUS function(LSA_SEC_HANDLE) SpDeleteContextFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpApplyControlTokenFn; alias NTSTATUS function(PLUID, ULONG, PSecurityUserData *) SpGetUserInfoFn; alias NTSTATUS function(SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION *) SpGetExtendedInformationFn; alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryContextAttributesFn; alias NTSTATUS function(LSA_SEC_HANDLE, PUNICODE_STRING, PUNICODE_STRING, ULONG, PVOID, PVOID, PVOID, PTimeStamp) SpAddCredentialsFn; alias NTSTATUS function( SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION) SpSetExtendedInformationFn; alias NTSTATUS function(ULONG, PSECPKG_DLL_FUNCTIONS, PVOID *) SpInstanceInitFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpInitUserModeContextFn; alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc, ULONG) SpMakeSignatureFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc, ULONG, PULONG) SpVerifySignatureFn; alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc, ULONG) SpSealMessageFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc, ULONG, PULONG) SpUnsealMessageFn; alias NTSTATUS function(LSA_SEC_HANDLE, PHANDLE) SpGetContextTokenFn; alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpCompleteAuthTokenFn; alias NTSTATUS function(PSecBuffer, PSecBuffer) SpFormatCredentialsFn; alias NTSTATUS function(ULONG, PUCHAR, PULONG, PVOID *) SpMarshallSupplementalCredsFn; alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBuffer, PHANDLE) SpExportSecurityContextFn; alias NTSTATUS function(PSecBuffer, HANDLE, PLSA_SEC_HANDLE) SpImportSecurityContextFn; /* Dispatch tables of functions implemented by SSP/AP */ struct SECPKG_FUNCTION_TABLE { PLSA_AP_INITIALIZE_PACKAGE InitializePackage; PLSA_AP_LOGON_USER LogonUser; PLSA_AP_CALL_PACKAGE CallPackage; PLSA_AP_LOGON_TERMINATED LogonTerminated; PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted; PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough; PLSA_AP_LOGON_USER_EX LogonUserEx; PLSA_AP_LOGON_USER_EX2 LogonUserEx2; SpInitializeFn *Initialize; SpShutDownFn *Shutdown; SpGetInfoFn *GetInfo; SpAcceptCredentialsFn *AcceptCredentials; SpAcquireCredentialsHandleFn *AcquireCredentialsHandle; SpQueryCredentialsAttributesFn *QueryCredentialsAttributes; SpFreeCredentialsHandleFn *FreeCredentialsHandle; SpSaveCredentialsFn *SaveCredentials; SpGetCredentialsFn *GetCredentials; SpDeleteCredentialsFn *DeleteCredentials; SpInitLsaModeContextFn *InitLsaModeContext; SpAcceptLsaModeContextFn *AcceptLsaModeContext; SpDeleteContextFn *DeleteContext; SpApplyControlTokenFn *ApplyControlToken; SpGetUserInfoFn *GetUserInfo; SpGetExtendedInformationFn *GetExtendedInformation; SpQueryContextAttributesFn *QueryContextAttributes; SpAddCredentialsFn *AddCredentials; SpSetExtendedInformationFn *SetExtendedInformation; } alias SECPKG_FUNCTION_TABLE* PSECPKG_FUNCTION_TABLE; struct SECPKG_USER_FUNCTION_TABLE { SpInstanceInitFn *InstanceInit; SpInitUserModeContextFn *InitUserModeContext; SpMakeSignatureFn *MakeSignature; SpVerifySignatureFn *VerifySignature; SpSealMessageFn *SealMessage; SpUnsealMessageFn *UnsealMessage; SpGetContextTokenFn *GetContextToken; SpQueryContextAttributesFn *QueryContextAttributes; SpCompleteAuthTokenFn *CompleteAuthToken; SpDeleteContextFn *DeleteUserModeContext; SpFormatCredentialsFn *FormatCredentials; SpMarshallSupplementalCredsFn *MarshallSupplementalCreds; SpExportSecurityContextFn *ExportContext; SpImportSecurityContextFn *ImportContext; } alias SECPKG_USER_FUNCTION_TABLE* PSECPKG_USER_FUNCTION_TABLE; /* Entry points to SSP/AP */ alias NTSTATUS function(ULONG, PULONG, PSECPKG_FUNCTION_TABLE *, PULONG) SpLsaModeInitializeFn; alias NTSTATUS function(ULONG, PULONG, PSECPKG_USER_FUNCTION_TABLE *, PULONG) SpUserModeInitializeFn;