comparison fuhtark_test/include/winapi/ntsecpkg.h @ 1500:91c8c3b7cbf0

add: futhark tests for generating vulkan api
author sam <sam@basx.dev>
date Wed, 26 Nov 2025 21:36:48 +0700
parents
children
comparison
equal deleted inserted replaced
1499:1f58458b7ef7 1500:91c8c3b7cbf0
1 /**
2 * This file has no copyright assigned and is placed in the Public Domain.
3 * This file is part of the w64 mingw-runtime package.
4 * No warranty is given; refer to the file DISCLAIMER within this package.
5 */
6 #ifndef _NTSECPKG_
7 #define _NTSECPKG_
8
9 #ifdef __cplusplus
10 extern "C" {
11 #endif
12
13 typedef PVOID *PLSA_CLIENT_REQUEST;
14
15 typedef enum _LSA_TOKEN_INFORMATION_TYPE {
16 LsaTokenInformationNull,LsaTokenInformationV1,LsaTokenInformationV2
17 } LSA_TOKEN_INFORMATION_TYPE,*PLSA_TOKEN_INFORMATION_TYPE;
18
19 typedef struct _LSA_TOKEN_INFORMATION_NULL {
20 LARGE_INTEGER ExpirationTime;
21 PTOKEN_GROUPS Groups;
22 } LSA_TOKEN_INFORMATION_NULL,*PLSA_TOKEN_INFORMATION_NULL;
23
24 typedef struct _LSA_TOKEN_INFORMATION_V1 {
25 LARGE_INTEGER ExpirationTime;
26 TOKEN_USER User;
27 PTOKEN_GROUPS Groups;
28 TOKEN_PRIMARY_GROUP PrimaryGroup;
29 PTOKEN_PRIVILEGES Privileges;
30 TOKEN_OWNER Owner;
31 TOKEN_DEFAULT_DACL DefaultDacl;
32 } LSA_TOKEN_INFORMATION_V1,*PLSA_TOKEN_INFORMATION_V1;
33
34 typedef LSA_TOKEN_INFORMATION_V1 LSA_TOKEN_INFORMATION_V2,*PLSA_TOKEN_INFORMATION_V2;
35 typedef NTSTATUS (NTAPI LSA_CREATE_LOGON_SESSION)(PLUID LogonId);
36 typedef NTSTATUS (NTAPI LSA_DELETE_LOGON_SESSION)(PLUID LogonId);
37 typedef NTSTATUS (NTAPI LSA_ADD_CREDENTIAL)(PLUID LogonId,ULONG AuthenticationPackage,PLSA_STRING PrimaryKeyValue,PLSA_STRING Credentials);
38 typedef NTSTATUS (NTAPI LSA_GET_CREDENTIALS)(PLUID LogonId,ULONG AuthenticationPackage,PULONG QueryContext,BOOLEAN RetrieveAllCredentials,PLSA_STRING PrimaryKeyValue,PULONG PrimaryKeyLength,PLSA_STRING Credentials);
39 typedef NTSTATUS (NTAPI LSA_DELETE_CREDENTIAL)(PLUID LogonId,ULONG AuthenticationPackage,PLSA_STRING PrimaryKeyValue);
40 typedef PVOID (NTAPI LSA_ALLOCATE_LSA_HEAP)(ULONG Length);
41 typedef VOID (NTAPI LSA_FREE_LSA_HEAP)(PVOID Base);
42 typedef PVOID (NTAPI LSA_ALLOCATE_PRIVATE_HEAP)(SIZE_T Length);
43 typedef VOID (NTAPI LSA_FREE_PRIVATE_HEAP)(PVOID Base);
44 typedef NTSTATUS (NTAPI LSA_ALLOCATE_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,ULONG LengthRequired,PVOID *ClientBaseAddress);
45 typedef NTSTATUS (NTAPI LSA_FREE_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,PVOID ClientBaseAddress);
46 typedef NTSTATUS (NTAPI LSA_COPY_TO_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,ULONG Length,PVOID ClientBaseAddress,PVOID BufferToCopy);
47 typedef NTSTATUS (NTAPI LSA_COPY_FROM_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,ULONG Length,PVOID BufferToCopy,PVOID ClientBaseAddress);
48
49 typedef LSA_CREATE_LOGON_SESSION *PLSA_CREATE_LOGON_SESSION;
50 typedef LSA_DELETE_LOGON_SESSION *PLSA_DELETE_LOGON_SESSION;
51 typedef LSA_ADD_CREDENTIAL *PLSA_ADD_CREDENTIAL;
52 typedef LSA_GET_CREDENTIALS *PLSA_GET_CREDENTIALS;
53 typedef LSA_DELETE_CREDENTIAL *PLSA_DELETE_CREDENTIAL;
54 typedef LSA_ALLOCATE_LSA_HEAP *PLSA_ALLOCATE_LSA_HEAP;
55 typedef LSA_FREE_LSA_HEAP *PLSA_FREE_LSA_HEAP;
56 typedef LSA_ALLOCATE_PRIVATE_HEAP *PLSA_ALLOCATE_PRIVATE_HEAP;
57 typedef LSA_FREE_PRIVATE_HEAP *PLSA_FREE_PRIVATE_HEAP;
58 typedef LSA_ALLOCATE_CLIENT_BUFFER *PLSA_ALLOCATE_CLIENT_BUFFER;
59 typedef LSA_FREE_CLIENT_BUFFER *PLSA_FREE_CLIENT_BUFFER;
60 typedef LSA_COPY_TO_CLIENT_BUFFER *PLSA_COPY_TO_CLIENT_BUFFER;
61 typedef LSA_COPY_FROM_CLIENT_BUFFER *PLSA_COPY_FROM_CLIENT_BUFFER;
62
63 typedef struct _LSA_DISPATCH_TABLE {
64 PLSA_CREATE_LOGON_SESSION CreateLogonSession;
65 PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
66 PLSA_ADD_CREDENTIAL AddCredential;
67 PLSA_GET_CREDENTIALS GetCredentials;
68 PLSA_DELETE_CREDENTIAL DeleteCredential;
69 PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
70 PLSA_FREE_LSA_HEAP FreeLsaHeap;
71 PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
72 PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
73 PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
74 PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
75 } LSA_DISPATCH_TABLE,*PLSA_DISPATCH_TABLE;
76
77 #define LSA_AP_NAME_INITIALIZE_PACKAGE "LsaApInitializePackage\0"
78 #define LSA_AP_NAME_LOGON_USER "LsaApLogonUser\0"
79 #define LSA_AP_NAME_LOGON_USER_EX "LsaApLogonUserEx\0"
80 #define LSA_AP_NAME_CALL_PACKAGE "LsaApCallPackage\0"
81 #define LSA_AP_NAME_LOGON_TERMINATED "LsaApLogonTerminated\0"
82 #define LSA_AP_NAME_CALL_PACKAGE_UNTRUSTED "LsaApCallPackageUntrusted\0"
83 #define LSA_AP_NAME_CALL_PACKAGE_PASSTHROUGH "LsaApCallPackagePassthrough\0"
84
85 typedef NTSTATUS (NTAPI LSA_AP_INITIALIZE_PACKAGE)(ULONG AuthenticationPackageId,PLSA_DISPATCH_TABLE LsaDispatchTable,PLSA_STRING Database,PLSA_STRING Confidentiality,PLSA_STRING *AuthenticationPackageName);
86 typedef NTSTATUS (NTAPI LSA_AP_LOGON_USER)(PLSA_CLIENT_REQUEST ClientRequest,SECURITY_LOGON_TYPE LogonType,PVOID AuthenticationInformation,PVOID ClientAuthenticationBase,ULONG AuthenticationInformationLength,PVOID *ProfileBuffer,PULONG ProfileBufferLength,PLUID LogonId,PNTSTATUS SubStatus,PLSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID *TokenInformation,PLSA_UNICODE_STRING *AccountName,PLSA_UNICODE_STRING *AuthenticatingAuthority);
87 typedef NTSTATUS (NTAPI LSA_AP_LOGON_USER_EX)(PLSA_CLIENT_REQUEST ClientRequest,SECURITY_LOGON_TYPE LogonType,PVOID AuthenticationInformation,PVOID ClientAuthenticationBase,ULONG AuthenticationInformationLength,PVOID *ProfileBuffer,PULONG ProfileBufferLength,PLUID LogonId,PNTSTATUS SubStatus,PLSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID *TokenInformation,PUNICODE_STRING *AccountName,PUNICODE_STRING *AuthenticatingAuthority,PUNICODE_STRING *MachineName);
88 typedef NTSTATUS (NTAPI LSA_AP_CALL_PACKAGE)(PLSA_CLIENT_REQUEST ClientRequest,PVOID ProtocolSubmitBuffer,PVOID ClientBufferBase,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
89 typedef NTSTATUS (NTAPI LSA_AP_CALL_PACKAGE_PASSTHROUGH)(PLSA_CLIENT_REQUEST ClientRequest,PVOID ProtocolSubmitBuffer,PVOID ClientBufferBase,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
90 typedef VOID (NTAPI LSA_AP_LOGON_TERMINATED)(PLUID LogonId);
91
92 typedef LSA_AP_CALL_PACKAGE LSA_AP_CALL_PACKAGE_UNTRUSTED;
93 typedef LSA_AP_INITIALIZE_PACKAGE *PLSA_AP_INITIALIZE_PACKAGE;
94 typedef LSA_AP_LOGON_USER *PLSA_AP_LOGON_USER;
95 typedef LSA_AP_LOGON_USER_EX *PLSA_AP_LOGON_USER_EX;
96 typedef LSA_AP_CALL_PACKAGE *PLSA_AP_CALL_PACKAGE;
97 typedef LSA_AP_CALL_PACKAGE_PASSTHROUGH *PLSA_AP_CALL_PACKAGE_PASSTHROUGH;
98 typedef LSA_AP_LOGON_TERMINATED *PLSA_AP_LOGON_TERMINATED;
99 typedef LSA_AP_CALL_PACKAGE_UNTRUSTED *PLSA_AP_CALL_PACKAGE_UNTRUSTED;
100
101 #ifndef _SAM_CREDENTIAL_UPDATE_DEFINED
102 #define _SAM_CREDENTIAL_UPDATE_DEFINED
103
104 typedef NTSTATUS (*PSAM_CREDENTIAL_UPDATE_NOTIFY_ROUTINE)(PUNICODE_STRING ClearPassword,PVOID OldCredentials,ULONG OldCredentialSize,ULONG UserAccountControl,PUNICODE_STRING UPN,PUNICODE_STRING UserName,PUNICODE_STRING NetbiosDomainName,PUNICODE_STRING DnsDomainName,PVOID *NewCredentials,ULONG *NewCredentialSize);
105
106 #define SAM_CREDENTIAL_UPDATE_NOTIFY_ROUTINE "CredentialUpdateNotify"
107
108 typedef BOOLEAN (*PSAM_CREDENTIAL_UPDATE_REGISTER_ROUTINE)(PUNICODE_STRING CredentialName);
109
110 #define SAM_CREDENTIAL_UPDATE_REGISTER_ROUTINE "CredentialUpdateRegister"
111
112 typedef VOID (*PSAM_CREDENTIAL_UPDATE_FREE_ROUTINE)(PVOID p);
113
114 #define SAM_CREDENTIAL_UPDATE_FREE_ROUTINE "CredentialUpdateFree"
115 #endif
116
117 #ifdef SECURITY_KERNEL
118
119 typedef PVOID SEC_THREAD_START;
120 typedef PVOID SEC_ATTRS;
121 #else
122 typedef LPTHREAD_START_ROUTINE SEC_THREAD_START;
123 typedef LPSECURITY_ATTRIBUTES SEC_ATTRS;
124 #endif
125
126 #define SecEqualLuid(L1,L2) ((((PLUID)L1)->LowPart==((PLUID)L2)->LowPart) && (((PLUID)L1)->HighPart==((PLUID)L2)->HighPart))
127 #define SecIsZeroLuid(L1) ((L1->LowPart | L1->HighPart)==0)
128
129 typedef struct _SECPKG_CLIENT_INFO {
130 LUID LogonId;
131 ULONG ProcessID;
132 ULONG ThreadID;
133 BOOLEAN HasTcbPrivilege;
134 BOOLEAN Impersonating;
135 BOOLEAN Restricted;
136
137 UCHAR ClientFlags;
138 SECURITY_IMPERSONATION_LEVEL ImpersonationLevel;
139
140 } SECPKG_CLIENT_INFO,*PSECPKG_CLIENT_INFO;
141
142 #define SECPKG_CLIENT_PROCESS_TERMINATED 0x01
143 #define SECPKG_CLIENT_THREAD_TERMINATED 0x02
144
145 typedef struct _SECPKG_CALL_INFO {
146 ULONG ProcessId;
147 ULONG ThreadId;
148 ULONG Attributes;
149 ULONG CallCount;
150 } SECPKG_CALL_INFO,*PSECPKG_CALL_INFO;
151
152 #define SECPKG_CALL_KERNEL_MODE 0x00000001
153 #define SECPKG_CALL_ANSI 0x00000002
154 #define SECPKG_CALL_URGENT 0x00000004
155 #define SECPKG_CALL_RECURSIVE 0x00000008
156 #define SECPKG_CALL_IN_PROC 0x00000010
157 #define SECPKG_CALL_CLEANUP 0x00000020
158 #define SECPKG_CALL_WOWCLIENT 0x00000040
159 #define SECPKG_CALL_THREAD_TERM 0x00000080
160 #define SECPKG_CALL_PROCESS_TERM 0x00000100
161 #define SECPKG_CALL_IS_TCB 0x00000200
162
163 typedef struct _SECPKG_SUPPLEMENTAL_CRED {
164 UNICODE_STRING PackageName;
165 ULONG CredentialSize;
166 PUCHAR Credentials;
167 } SECPKG_SUPPLEMENTAL_CRED,*PSECPKG_SUPPLEMENTAL_CRED;
168
169 typedef ULONG_PTR LSA_SEC_HANDLE;
170 typedef LSA_SEC_HANDLE *PLSA_SEC_HANDLE;
171 typedef struct _SECPKG_SUPPLEMENTAL_CRED_ARRAY {
172 ULONG CredentialCount;
173 SECPKG_SUPPLEMENTAL_CRED Credentials[1];
174 } SECPKG_SUPPLEMENTAL_CRED_ARRAY,*PSECPKG_SUPPLEMENTAL_CRED_ARRAY;
175
176 #define SECBUFFER_UNMAPPED 0x40000000
177
178 #define SECBUFFER_KERNEL_MAP 0x20000000
179
180 typedef NTSTATUS (NTAPI LSA_CALLBACK_FUNCTION)(ULONG_PTR Argument1,ULONG_PTR Argument2,PSecBuffer InputBuffer,PSecBuffer OutputBuffer);
181
182 typedef LSA_CALLBACK_FUNCTION *PLSA_CALLBACK_FUNCTION;
183
184 #define PRIMARY_CRED_CLEAR_PASSWORD 0x1
185 #define PRIMARY_CRED_OWF_PASSWORD 0x2
186 #define PRIMARY_CRED_UPDATE 0x4
187 #define PRIMARY_CRED_CACHED_LOGON 0x8
188 #define PRIMARY_CRED_LOGON_NO_TCB 0x10
189
190 #define PRIMARY_CRED_LOGON_PACKAGE_SHIFT 24
191 #define PRIMARY_CRED_PACKAGE_MASK 0xff000000
192
193 typedef struct _SECPKG_PRIMARY_CRED {
194 LUID LogonId;
195 UNICODE_STRING DownlevelName;
196 UNICODE_STRING DomainName;
197 UNICODE_STRING Password;
198 UNICODE_STRING OldPassword;
199 PSID UserSid;
200 ULONG Flags;
201 UNICODE_STRING DnsDomainName;
202 UNICODE_STRING Upn;
203 UNICODE_STRING LogonServer;
204 UNICODE_STRING Spare1;
205 UNICODE_STRING Spare2;
206 UNICODE_STRING Spare3;
207 UNICODE_STRING Spare4;
208 } SECPKG_PRIMARY_CRED,*PSECPKG_PRIMARY_CRED;
209
210 #define MAX_CRED_SIZE 1024
211
212 #define SECPKG_STATE_ENCRYPTION_PERMITTED 0x01
213 #define SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED 0x02
214 #define SECPKG_STATE_DOMAIN_CONTROLLER 0x04
215 #define SECPKG_STATE_WORKSTATION 0x08
216 #define SECPKG_STATE_STANDALONE 0x10
217
218 typedef struct _SECPKG_PARAMETERS {
219 ULONG Version;
220 ULONG MachineState;
221 ULONG SetupMode;
222 PSID DomainSid;
223 UNICODE_STRING DomainName;
224 UNICODE_STRING DnsDomainName;
225 GUID DomainGuid;
226 } SECPKG_PARAMETERS,*PSECPKG_PARAMETERS;
227
228 typedef enum _SECPKG_EXTENDED_INFORMATION_CLASS {
229 SecpkgGssInfo = 1,SecpkgContextThunks,SecpkgMutualAuthLevel,SecpkgWowClientDll,SecpkgExtraOids,SecpkgMaxInfo
230 } SECPKG_EXTENDED_INFORMATION_CLASS;
231
232 typedef struct _SECPKG_GSS_INFO {
233 ULONG EncodedIdLength;
234 UCHAR EncodedId[4];
235 } SECPKG_GSS_INFO,*PSECPKG_GSS_INFO;
236
237 typedef struct _SECPKG_CONTEXT_THUNKS {
238 ULONG InfoLevelCount;
239 ULONG Levels[1];
240 } SECPKG_CONTEXT_THUNKS,*PSECPKG_CONTEXT_THUNKS;
241
242 typedef struct _SECPKG_MUTUAL_AUTH_LEVEL {
243 ULONG MutualAuthLevel;
244 } SECPKG_MUTUAL_AUTH_LEVEL,*PSECPKG_MUTUAL_AUTH_LEVEL;
245
246 typedef struct _SECPKG_WOW_CLIENT_DLL {
247 SECURITY_STRING WowClientDllPath;
248 } SECPKG_WOW_CLIENT_DLL,*PSECPKG_WOW_CLIENT_DLL;
249
250 #define SECPKG_MAX_OID_LENGTH 32
251
252 typedef struct _SECPKG_SERIALIZED_OID {
253 ULONG OidLength;
254 ULONG OidAttributes;
255 UCHAR OidValue[SECPKG_MAX_OID_LENGTH ];
256 } SECPKG_SERIALIZED_OID,*PSECPKG_SERIALIZED_OID;
257
258 typedef struct _SECPKG_EXTRA_OIDS {
259 ULONG OidCount;
260 SECPKG_SERIALIZED_OID Oids[1 ];
261 } SECPKG_EXTRA_OIDS,*PSECPKG_EXTRA_OIDS;
262
263 typedef struct _SECPKG_EXTENDED_INFORMATION {
264 SECPKG_EXTENDED_INFORMATION_CLASS Class;
265 union {
266 SECPKG_GSS_INFO GssInfo;
267 SECPKG_CONTEXT_THUNKS ContextThunks;
268 SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel;
269 SECPKG_WOW_CLIENT_DLL WowClientDll;
270 SECPKG_EXTRA_OIDS ExtraOids;
271 } Info;
272 } SECPKG_EXTENDED_INFORMATION,*PSECPKG_EXTENDED_INFORMATION;
273
274 #define SECPKG_ATTR_SASL_CONTEXT 0x00010000
275
276 typedef struct _SecPkgContext_SaslContext {
277 PVOID SaslContext;
278 } SecPkgContext_SaslContext,*PSecPkgContext_SaslContext;
279
280 #define SECPKG_ATTR_THUNK_ALL 0x00010000
281
282 #ifndef SECURITY_USER_DATA_DEFINED
283 #define SECURITY_USER_DATA_DEFINED
284
285 typedef struct _SECURITY_USER_DATA {
286 SECURITY_STRING UserName;
287 SECURITY_STRING LogonDomainName;
288 SECURITY_STRING LogonServer;
289 PSID pSid;
290 } SECURITY_USER_DATA,*PSECURITY_USER_DATA;
291
292 typedef SECURITY_USER_DATA SecurityUserData,*PSecurityUserData;
293
294 #define UNDERSTANDS_LONG_NAMES 1
295 #define NO_LONG_NAMES 2
296 #endif
297
298 typedef NTSTATUS (NTAPI LSA_IMPERSONATE_CLIENT)(VOID);
299 typedef NTSTATUS (NTAPI LSA_UNLOAD_PACKAGE)(VOID);
300 typedef NTSTATUS (NTAPI LSA_DUPLICATE_HANDLE)(HANDLE SourceHandle,PHANDLE DestionationHandle);
301 typedef NTSTATUS (NTAPI LSA_SAVE_SUPPLEMENTAL_CREDENTIALS)(PLUID LogonId,ULONG SupplementalCredSize,PVOID SupplementalCreds,BOOLEAN Synchronous);
302 typedef HANDLE (NTAPI LSA_CREATE_THREAD)(SEC_ATTRS SecurityAttributes,ULONG StackSize,SEC_THREAD_START StartFunction,PVOID ThreadParameter,ULONG CreationFlags,PULONG ThreadId);
303 typedef NTSTATUS (NTAPI LSA_GET_CLIENT_INFO)(PSECPKG_CLIENT_INFO ClientInfo);
304 typedef HANDLE (NTAPI LSA_REGISTER_NOTIFICATION)(SEC_THREAD_START StartFunction,PVOID Parameter,ULONG NotificationType,ULONG NotificationClass,ULONG NotificationFlags,ULONG IntervalMinutes,HANDLE WaitEvent);
305 typedef NTSTATUS (NTAPI LSA_CANCEL_NOTIFICATION)(HANDLE NotifyHandle);
306 typedef NTSTATUS (NTAPI LSA_MAP_BUFFER)(PSecBuffer InputBuffer,PSecBuffer OutputBuffer);
307 typedef NTSTATUS (NTAPI LSA_CREATE_TOKEN)(PLUID LogonId,PTOKEN_SOURCE TokenSource,SECURITY_LOGON_TYPE LogonType,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,LSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID TokenInformation,PTOKEN_GROUPS TokenGroups,PUNICODE_STRING AccountName,PUNICODE_STRING AuthorityName,PUNICODE_STRING Workstation,PUNICODE_STRING ProfilePath,PHANDLE Token,PNTSTATUS SubStatus);
308
309 typedef enum _SECPKG_SESSIONINFO_TYPE {
310 SecSessionPrimaryCred
311 } SECPKG_SESSIONINFO_TYPE;
312
313 typedef NTSTATUS (NTAPI LSA_CREATE_TOKEN_EX)(PLUID LogonId,PTOKEN_SOURCE TokenSource,SECURITY_LOGON_TYPE LogonType,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,LSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID TokenInformation,PTOKEN_GROUPS TokenGroups,PUNICODE_STRING Workstation,PUNICODE_STRING ProfilePath,PVOID SessionInformation,SECPKG_SESSIONINFO_TYPE SessionInformationType,PHANDLE Token,PNTSTATUS SubStatus);
314 typedef VOID (NTAPI LSA_AUDIT_LOGON)(NTSTATUS Status,NTSTATUS SubStatus,PUNICODE_STRING AccountName,PUNICODE_STRING AuthenticatingAuthority,PUNICODE_STRING WorkstationName,PSID UserSid,SECURITY_LOGON_TYPE LogonType,PTOKEN_SOURCE TokenSource,PLUID LogonId);
315 typedef NTSTATUS (NTAPI LSA_CALL_PACKAGE)(PUNICODE_STRING AuthenticationPackage,PVOID ProtocolSubmitBuffer,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
316 typedef NTSTATUS (NTAPI LSA_CALL_PACKAGEEX)(PUNICODE_STRING AuthenticationPackage,PVOID ClientBufferBase,PVOID ProtocolSubmitBuffer,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
317 typedef NTSTATUS (NTAPI LSA_CALL_PACKAGE_PASSTHROUGH)(PUNICODE_STRING AuthenticationPackage,PVOID ClientBufferBase,PVOID ProtocolSubmitBuffer,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
318 typedef BOOLEAN (NTAPI LSA_GET_CALL_INFO)(PSECPKG_CALL_INFO Info);
319 typedef PVOID (NTAPI LSA_CREATE_SHARED_MEMORY)(ULONG MaxSize,ULONG InitialSize);
320 typedef PVOID (NTAPI LSA_ALLOCATE_SHARED_MEMORY)(PVOID SharedMem,ULONG Size);
321 typedef VOID (NTAPI LSA_FREE_SHARED_MEMORY)(PVOID SharedMem,PVOID Memory);
322 typedef BOOLEAN (NTAPI LSA_DELETE_SHARED_MEMORY)(PVOID SharedMem);
323
324 typedef enum _SECPKG_NAME_TYPE {
325 SecNameSamCompatible,SecNameAlternateId,SecNameFlat,SecNameDN,SecNameSPN
326 } SECPKG_NAME_TYPE;
327
328 typedef NTSTATUS (NTAPI LSA_OPEN_SAM_USER)(PSECURITY_STRING Name,SECPKG_NAME_TYPE NameType,PSECURITY_STRING Prefix,BOOLEAN AllowGuest,ULONG Reserved,PVOID *UserHandle);
329 typedef NTSTATUS (NTAPI LSA_GET_USER_CREDENTIALS)(PVOID UserHandle,PVOID *PrimaryCreds,PULONG PrimaryCredsSize,PVOID *SupplementalCreds,PULONG SupplementalCredsSize);
330 typedef NTSTATUS (NTAPI LSA_GET_USER_AUTH_DATA)(PVOID UserHandle,PUCHAR *UserAuthData,PULONG UserAuthDataSize);
331 typedef NTSTATUS (NTAPI LSA_CLOSE_SAM_USER)(PVOID UserHandle);
332 typedef NTSTATUS (NTAPI LSA_GET_AUTH_DATA_FOR_USER)(PSECURITY_STRING Name,SECPKG_NAME_TYPE NameType,PSECURITY_STRING Prefix,PUCHAR *UserAuthData,PULONG UserAuthDataSize,PUNICODE_STRING UserFlatName);
333 typedef NTSTATUS (NTAPI LSA_CONVERT_AUTH_DATA_TO_TOKEN)(PVOID UserAuthData,ULONG UserAuthDataSize,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,PTOKEN_SOURCE TokenSource,SECURITY_LOGON_TYPE LogonType,PUNICODE_STRING AuthorityName,PHANDLE Token,PLUID LogonId,PUNICODE_STRING AccountName,PNTSTATUS SubStatus);
334 typedef NTSTATUS (NTAPI LSA_CRACK_SINGLE_NAME)(ULONG FormatOffered,BOOLEAN PerformAtGC,PUNICODE_STRING NameInput,PUNICODE_STRING Prefix,ULONG RequestedFormat,PUNICODE_STRING CrackedName,PUNICODE_STRING DnsDomainName,PULONG SubStatus);
335 typedef NTSTATUS (NTAPI LSA_AUDIT_ACCOUNT_LOGON)(ULONG AuditId,BOOLEAN Success,PUNICODE_STRING Source,PUNICODE_STRING ClientName,PUNICODE_STRING MappedName,NTSTATUS Status);
336 typedef NTSTATUS (NTAPI LSA_CLIENT_CALLBACK)(PCHAR Callback,ULONG_PTR Argument1,ULONG_PTR Argument2,PSecBuffer Input,PSecBuffer Output);
337 typedef NTSTATUS (NTAPI LSA_REGISTER_CALLBACK)(ULONG CallbackId,PLSA_CALLBACK_FUNCTION Callback);
338
339 #define NOTIFIER_FLAG_NEW_THREAD 0x00000001
340 #define NOTIFIER_FLAG_ONE_SHOT 0x00000002
341 #define NOTIFIER_FLAG_SECONDS 0x80000000
342
343 #define NOTIFIER_TYPE_INTERVAL 1
344 #define NOTIFIER_TYPE_HANDLE_WAIT 2
345 #define NOTIFIER_TYPE_STATE_CHANGE 3
346 #define NOTIFIER_TYPE_NOTIFY_EVENT 4
347 #define NOTIFIER_TYPE_IMMEDIATE 16
348
349 #define NOTIFY_CLASS_PACKAGE_CHANGE 1
350 #define NOTIFY_CLASS_ROLE_CHANGE 2
351 #define NOTIFY_CLASS_DOMAIN_CHANGE 3
352 #define NOTIFY_CLASS_REGISTRY_CHANGE 4
353
354 typedef struct _SECPKG_EVENT_PACKAGE_CHANGE {
355 ULONG ChangeType;
356 LSA_SEC_HANDLE PackageId;
357 SECURITY_STRING PackageName;
358 } SECPKG_EVENT_PACKAGE_CHANGE,*PSECPKG_EVENT_PACKAGE_CHANGE;
359
360 #define SECPKG_PACKAGE_CHANGE_LOAD 0
361 #define SECPKG_PACKAGE_CHANGE_UNLOAD 1
362 #define SECPKG_PACKAGE_CHANGE_SELECT 2
363
364 typedef struct _SECPKG_EVENT_ROLE_CHANGE {
365 ULONG PreviousRole;
366 ULONG NewRole;
367 } SECPKG_EVENT_ROLE_CHANGE,*PSECPKG_EVENT_ROLE_CHANGE;
368
369 typedef struct _SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE;
370 typedef struct _SECPKG_PARAMETERS *PSECPKG_EVENT_DOMAIN_CHANGE;
371
372 typedef struct _SECPKG_EVENT_NOTIFY {
373 ULONG EventClass;
374 ULONG Reserved;
375 ULONG EventDataSize;
376 PVOID EventData;
377 PVOID PackageParameter;
378 } SECPKG_EVENT_NOTIFY,*PSECPKG_EVENT_NOTIFY;
379
380 typedef NTSTATUS (NTAPI LSA_UPDATE_PRIMARY_CREDENTIALS)(PSECPKG_PRIMARY_CRED PrimaryCredentials,PSECPKG_SUPPLEMENTAL_CRED_ARRAY Credentials);
381 typedef VOID (NTAPI LSA_PROTECT_MEMORY)(PVOID Buffer,ULONG BufferSize);
382 typedef NTSTATUS (NTAPI LSA_OPEN_TOKEN_BY_LOGON_ID)(PLUID LogonId,HANDLE *RetTokenHandle);
383 typedef NTSTATUS (NTAPI LSA_EXPAND_AUTH_DATA_FOR_DOMAIN)(PUCHAR UserAuthData,ULONG UserAuthDataSize,PVOID Reserved,PUCHAR *ExpandedAuthData,PULONG ExpandedAuthDataSize);
384
385 typedef LSA_IMPERSONATE_CLIENT *PLSA_IMPERSONATE_CLIENT;
386 typedef LSA_UNLOAD_PACKAGE *PLSA_UNLOAD_PACKAGE;
387 typedef LSA_DUPLICATE_HANDLE *PLSA_DUPLICATE_HANDLE;
388 typedef LSA_SAVE_SUPPLEMENTAL_CREDENTIALS *PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS;
389 typedef LSA_CREATE_THREAD *PLSA_CREATE_THREAD;
390 typedef LSA_GET_CLIENT_INFO *PLSA_GET_CLIENT_INFO;
391 typedef LSA_REGISTER_NOTIFICATION *PLSA_REGISTER_NOTIFICATION;
392 typedef LSA_CANCEL_NOTIFICATION *PLSA_CANCEL_NOTIFICATION;
393 typedef LSA_MAP_BUFFER *PLSA_MAP_BUFFER;
394 typedef LSA_CREATE_TOKEN *PLSA_CREATE_TOKEN;
395 typedef LSA_AUDIT_LOGON *PLSA_AUDIT_LOGON;
396 typedef LSA_CALL_PACKAGE *PLSA_CALL_PACKAGE;
397 typedef LSA_CALL_PACKAGEEX *PLSA_CALL_PACKAGEEX;
398 typedef LSA_GET_CALL_INFO *PLSA_GET_CALL_INFO;
399 typedef LSA_CREATE_SHARED_MEMORY *PLSA_CREATE_SHARED_MEMORY;
400 typedef LSA_ALLOCATE_SHARED_MEMORY *PLSA_ALLOCATE_SHARED_MEMORY;
401 typedef LSA_FREE_SHARED_MEMORY *PLSA_FREE_SHARED_MEMORY;
402 typedef LSA_DELETE_SHARED_MEMORY *PLSA_DELETE_SHARED_MEMORY;
403 typedef LSA_OPEN_SAM_USER *PLSA_OPEN_SAM_USER;
404 typedef LSA_GET_USER_CREDENTIALS *PLSA_GET_USER_CREDENTIALS;
405 typedef LSA_GET_USER_AUTH_DATA *PLSA_GET_USER_AUTH_DATA;
406 typedef LSA_CLOSE_SAM_USER *PLSA_CLOSE_SAM_USER;
407 typedef LSA_CONVERT_AUTH_DATA_TO_TOKEN *PLSA_CONVERT_AUTH_DATA_TO_TOKEN;
408 typedef LSA_CLIENT_CALLBACK *PLSA_CLIENT_CALLBACK;
409 typedef LSA_REGISTER_CALLBACK *PLSA_REGISTER_CALLBACK;
410 typedef LSA_UPDATE_PRIMARY_CREDENTIALS *PLSA_UPDATE_PRIMARY_CREDENTIALS;
411 typedef LSA_GET_AUTH_DATA_FOR_USER *PLSA_GET_AUTH_DATA_FOR_USER;
412 typedef LSA_CRACK_SINGLE_NAME *PLSA_CRACK_SINGLE_NAME;
413 typedef LSA_AUDIT_ACCOUNT_LOGON *PLSA_AUDIT_ACCOUNT_LOGON;
414 typedef LSA_CALL_PACKAGE_PASSTHROUGH *PLSA_CALL_PACKAGE_PASSTHROUGH;
415 typedef LSA_PROTECT_MEMORY *PLSA_PROTECT_MEMORY;
416 typedef LSA_OPEN_TOKEN_BY_LOGON_ID *PLSA_OPEN_TOKEN_BY_LOGON_ID;
417 typedef LSA_EXPAND_AUTH_DATA_FOR_DOMAIN *PLSA_EXPAND_AUTH_DATA_FOR_DOMAIN;
418 typedef LSA_CREATE_TOKEN_EX *PLSA_CREATE_TOKEN_EX;
419
420 #ifdef _WINCRED_H_
421
422 #ifndef _ENCRYPTED_CREDENTIAL_DEFINED
423 #define _ENCRYPTED_CREDENTIAL_DEFINED
424
425 typedef struct _ENCRYPTED_CREDENTIALW {
426 CREDENTIALW Cred;
427 ULONG ClearCredentialBlobSize;
428 } ENCRYPTED_CREDENTIALW,*PENCRYPTED_CREDENTIALW;
429 #endif
430
431 #define CREDP_FLAGS_IN_PROCESS 0x01
432 #define CREDP_FLAGS_USE_MIDL_HEAP 0x02
433 #define CREDP_FLAGS_DONT_CACHE_TI 0x04
434 #define CREDP_FLAGS_CLEAR_PASSWORD 0x08
435 #define CREDP_FLAGS_USER_ENCRYPTED_PASSWORD 0x10
436
437 typedef NTSTATUS (NTAPI CredReadFn)(PLUID LogonId,ULONG CredFlags,LPWSTR TargetName,ULONG Type,ULONG Flags,PENCRYPTED_CREDENTIALW *Credential);
438 typedef NTSTATUS (NTAPI CredReadDomainCredentialsFn)(PLUID LogonId,ULONG CredFlags,PCREDENTIAL_TARGET_INFORMATIONW TargetInfo,ULONG Flags,PULONG Count,PENCRYPTED_CREDENTIALW **Credential);
439 typedef VOID (NTAPI CredFreeCredentialsFn)(ULONG Count,PENCRYPTED_CREDENTIALW *Credentials);
440 typedef NTSTATUS (NTAPI CredWriteFn)(PLUID LogonId,ULONG CredFlags,PENCRYPTED_CREDENTIALW Credential,ULONG Flags);
441
442 NTSTATUS CredMarshalTargetInfo (PCREDENTIAL_TARGET_INFORMATIONW InTargetInfo,PUSHORT *Buffer,PULONG BufferSize);
443 NTSTATUS CredUnmarshalTargetInfo (PUSHORT Buffer,ULONG BufferSize,PCREDENTIAL_TARGET_INFORMATIONW *RetTargetInfo,PULONG RetActualSize);
444
445 #define CRED_MARSHALED_TI_SIZE_SIZE 12
446 #endif
447
448 typedef struct _SEC_WINNT_AUTH_IDENTITY32 {
449 ULONG User;
450 ULONG UserLength;
451 ULONG Domain;
452 ULONG DomainLength;
453 ULONG Password;
454 ULONG PasswordLength;
455 ULONG Flags;
456 } SEC_WINNT_AUTH_IDENTITY32,*PSEC_WINNT_AUTH_IDENTITY32;
457
458 typedef struct _SEC_WINNT_AUTH_IDENTITY_EX32 {
459 ULONG Version;
460 ULONG Length;
461 ULONG User;
462 ULONG UserLength;
463 ULONG Domain;
464 ULONG DomainLength;
465 ULONG Password;
466 ULONG PasswordLength;
467 ULONG Flags;
468 ULONG PackageList;
469 ULONG PackageListLength;
470 } SEC_WINNT_AUTH_IDENTITY_EX32,*PSEC_WINNT_AUTH_IDENTITY_EX32;
471
472 typedef struct _LSA_SECPKG_FUNCTION_TABLE {
473 PLSA_CREATE_LOGON_SESSION CreateLogonSession;
474 PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
475 PLSA_ADD_CREDENTIAL AddCredential;
476 PLSA_GET_CREDENTIALS GetCredentials;
477 PLSA_DELETE_CREDENTIAL DeleteCredential;
478 PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
479 PLSA_FREE_LSA_HEAP FreeLsaHeap;
480 PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
481 PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
482 PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
483 PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
484 PLSA_IMPERSONATE_CLIENT ImpersonateClient;
485 PLSA_UNLOAD_PACKAGE UnloadPackage;
486 PLSA_DUPLICATE_HANDLE DuplicateHandle;
487 PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials;
488 PLSA_CREATE_THREAD CreateThread;
489 PLSA_GET_CLIENT_INFO GetClientInfo;
490 PLSA_REGISTER_NOTIFICATION RegisterNotification;
491 PLSA_CANCEL_NOTIFICATION CancelNotification;
492 PLSA_MAP_BUFFER MapBuffer;
493 PLSA_CREATE_TOKEN CreateToken;
494 PLSA_AUDIT_LOGON AuditLogon;
495 PLSA_CALL_PACKAGE CallPackage;
496 PLSA_FREE_LSA_HEAP FreeReturnBuffer;
497 PLSA_GET_CALL_INFO GetCallInfo;
498 PLSA_CALL_PACKAGEEX CallPackageEx;
499 PLSA_CREATE_SHARED_MEMORY CreateSharedMemory;
500 PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory;
501 PLSA_FREE_SHARED_MEMORY FreeSharedMemory;
502 PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory;
503 PLSA_OPEN_SAM_USER OpenSamUser;
504 PLSA_GET_USER_CREDENTIALS GetUserCredentials;
505 PLSA_GET_USER_AUTH_DATA GetUserAuthData;
506 PLSA_CLOSE_SAM_USER CloseSamUser;
507 PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken;
508 PLSA_CLIENT_CALLBACK ClientCallback;
509 PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials;
510 PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser;
511 PLSA_CRACK_SINGLE_NAME CrackSingleName;
512 PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon;
513 PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
514 #ifdef _WINCRED_H_
515 CredReadFn *CrediRead;
516 CredReadDomainCredentialsFn *CrediReadDomainCredentials;
517 CredFreeCredentialsFn *CrediFreeCredentials;
518 #else
519 PLSA_PROTECT_MEMORY DummyFunction1;
520 PLSA_PROTECT_MEMORY DummyFunction2;
521 PLSA_PROTECT_MEMORY DummyFunction3;
522 #endif
523 PLSA_PROTECT_MEMORY LsaProtectMemory;
524 PLSA_PROTECT_MEMORY LsaUnprotectMemory;
525 PLSA_OPEN_TOKEN_BY_LOGON_ID OpenTokenByLogonId;
526 PLSA_EXPAND_AUTH_DATA_FOR_DOMAIN ExpandAuthDataForDomain;
527 PLSA_ALLOCATE_PRIVATE_HEAP AllocatePrivateHeap;
528 PLSA_FREE_PRIVATE_HEAP FreePrivateHeap;
529 PLSA_CREATE_TOKEN_EX CreateTokenEx;
530 #ifdef _WINCRED_H_
531 CredWriteFn *CrediWrite;
532 #else
533 PLSA_PROTECT_MEMORY DummyFunction4;
534 #endif
535 } LSA_SECPKG_FUNCTION_TABLE,*PLSA_SECPKG_FUNCTION_TABLE;
536
537 typedef struct _SECPKG_DLL_FUNCTIONS {
538 PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
539 PLSA_FREE_LSA_HEAP FreeHeap;
540 PLSA_REGISTER_CALLBACK RegisterCallback;
541 } SECPKG_DLL_FUNCTIONS,*PSECPKG_DLL_FUNCTIONS;
542
543 typedef NTSTATUS (NTAPI SpInitializeFn)(ULONG_PTR PackageId,PSECPKG_PARAMETERS Parameters,PLSA_SECPKG_FUNCTION_TABLE FunctionTable);
544 typedef NTSTATUS (NTAPI SpShutdownFn)(VOID);
545 typedef NTSTATUS (NTAPI SpGetInfoFn)(PSecPkgInfo PackageInfo);
546 typedef NTSTATUS (NTAPI SpGetExtendedInformationFn)(SECPKG_EXTENDED_INFORMATION_CLASS Class,PSECPKG_EXTENDED_INFORMATION *ppInformation);
547 typedef NTSTATUS (NTAPI SpSetExtendedInformationFn)(SECPKG_EXTENDED_INFORMATION_CLASS Class,PSECPKG_EXTENDED_INFORMATION Info);
548 typedef NTSTATUS (LSA_AP_LOGON_USER_EX2)(PLSA_CLIENT_REQUEST ClientRequest,SECURITY_LOGON_TYPE LogonType,PVOID AuthenticationInformation,PVOID ClientAuthenticationBase,ULONG AuthenticationInformationLength,PVOID *ProfileBuffer,PULONG ProfileBufferLength,PLUID LogonId,PNTSTATUS SubStatus,PLSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID *TokenInformation,PUNICODE_STRING *AccountName,PUNICODE_STRING *AuthenticatingAuthority,PUNICODE_STRING *MachineName,PSECPKG_PRIMARY_CRED PrimaryCredentials,PSECPKG_SUPPLEMENTAL_CRED_ARRAY *CachedCredentials);
549
550 typedef LSA_AP_LOGON_USER_EX2 *PLSA_AP_LOGON_USER_EX2;
551
552 #define LSA_AP_NAME_LOGON_USER_EX2 "LsaApLogonUserEx2\0"
553
554 typedef NTSTATUS (NTAPI SpAcceptCredentialsFn)(SECURITY_LOGON_TYPE LogonType,PUNICODE_STRING AccountName,PSECPKG_PRIMARY_CRED PrimaryCredentials,PSECPKG_SUPPLEMENTAL_CRED SupplementalCredentials);
555
556 #define SP_ACCEPT_CREDENTIALS_NAME "SpAcceptCredentials\0"
557
558 typedef NTSTATUS (NTAPI SpAcquireCredentialsHandleFn)(PUNICODE_STRING PrincipalName,ULONG CredentialUseFlags,PLUID LogonId,PVOID AuthorizationData,PVOID GetKeyFunciton,PVOID GetKeyArgument,PLSA_SEC_HANDLE CredentialHandle,PTimeStamp ExpirationTime);
559 typedef NTSTATUS (NTAPI SpFreeCredentialsHandleFn)(LSA_SEC_HANDLE CredentialHandle);
560 typedef NTSTATUS (NTAPI SpQueryCredentialsAttributesFn)(LSA_SEC_HANDLE CredentialHandle,ULONG CredentialAttribute,PVOID Buffer);
561 typedef NTSTATUS (NTAPI SpSetCredentialsAttributesFn)(LSA_SEC_HANDLE CredentialHandle,ULONG CredentialAttribute,PVOID Buffer,ULONG BufferSize);
562 typedef NTSTATUS (NTAPI SpAddCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PUNICODE_STRING PrincipalName,PUNICODE_STRING Package,ULONG CredentialUseFlags,PVOID AuthorizationData,PVOID GetKeyFunciton,PVOID GetKeyArgument,PTimeStamp ExpirationTime);
563 typedef NTSTATUS (NTAPI SpSaveCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Credentials);
564 typedef NTSTATUS (NTAPI SpGetCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Credentials);
565 typedef NTSTATUS (NTAPI SpDeleteCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Key);
566 typedef NTSTATUS (NTAPI SpInitLsaModeContextFn)(LSA_SEC_HANDLE CredentialHandle,LSA_SEC_HANDLE ContextHandle,PUNICODE_STRING TargetName,ULONG ContextRequirements,ULONG TargetDataRep,PSecBufferDesc InputBuffers,PLSA_SEC_HANDLE NewContextHandle,PSecBufferDesc OutputBuffers,PULONG ContextAttributes,PTimeStamp ExpirationTime,PBOOLEAN MappedContext,PSecBuffer ContextData);
567 typedef NTSTATUS (NTAPI SpDeleteContextFn)(LSA_SEC_HANDLE ContextHandle);
568 typedef NTSTATUS (NTAPI SpApplyControlTokenFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc ControlToken);
569 typedef NTSTATUS (NTAPI SpAcceptLsaModeContextFn)(LSA_SEC_HANDLE CredentialHandle,LSA_SEC_HANDLE ContextHandle,PSecBufferDesc InputBuffer,ULONG ContextRequirements,ULONG TargetDataRep,PLSA_SEC_HANDLE NewContextHandle,PSecBufferDesc OutputBuffer,PULONG ContextAttributes,PTimeStamp ExpirationTime,PBOOLEAN MappedContext,PSecBuffer ContextData);
570 typedef NTSTATUS (NTAPI SpGetUserInfoFn)(PLUID LogonId,ULONG Flags,PSecurityUserData *UserData);
571 typedef NTSTATUS (NTAPI SpQueryContextAttributesFn)(LSA_SEC_HANDLE ContextHandle,ULONG ContextAttribute,PVOID Buffer);
572 typedef NTSTATUS (NTAPI SpSetContextAttributesFn)(LSA_SEC_HANDLE ContextHandle,ULONG ContextAttribute,PVOID Buffer,ULONG BufferSize);
573
574 typedef struct _SECPKG_FUNCTION_TABLE {
575 PLSA_AP_INITIALIZE_PACKAGE InitializePackage;
576 PLSA_AP_LOGON_USER LogonUser;
577 PLSA_AP_CALL_PACKAGE CallPackage;
578 PLSA_AP_LOGON_TERMINATED LogonTerminated;
579 PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted;
580 PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
581 PLSA_AP_LOGON_USER_EX LogonUserEx;
582 PLSA_AP_LOGON_USER_EX2 LogonUserEx2;
583 SpInitializeFn *Initialize;
584 SpShutdownFn *Shutdown;
585 SpGetInfoFn *GetInfo;
586 SpAcceptCredentialsFn *AcceptCredentials;
587 SpAcquireCredentialsHandleFn *AcquireCredentialsHandle;
588 SpQueryCredentialsAttributesFn *QueryCredentialsAttributes;
589 SpFreeCredentialsHandleFn *FreeCredentialsHandle;
590 SpSaveCredentialsFn *SaveCredentials;
591 SpGetCredentialsFn *GetCredentials;
592 SpDeleteCredentialsFn *DeleteCredentials;
593 SpInitLsaModeContextFn *InitLsaModeContext;
594 SpAcceptLsaModeContextFn *AcceptLsaModeContext;
595 SpDeleteContextFn *DeleteContext;
596 SpApplyControlTokenFn *ApplyControlToken;
597 SpGetUserInfoFn *GetUserInfo;
598 SpGetExtendedInformationFn *GetExtendedInformation;
599 SpQueryContextAttributesFn *QueryContextAttributes;
600 SpAddCredentialsFn *AddCredentials;
601 SpSetExtendedInformationFn *SetExtendedInformation;
602 SpSetContextAttributesFn *SetContextAttributes;
603 SpSetCredentialsAttributesFn *SetCredentialsAttributes;
604 } SECPKG_FUNCTION_TABLE,*PSECPKG_FUNCTION_TABLE;
605
606 typedef NTSTATUS (NTAPI SpInstanceInitFn)(ULONG Version,PSECPKG_DLL_FUNCTIONS FunctionTable,PVOID *UserFunctions);
607 typedef NTSTATUS (NTAPI SpInitUserModeContextFn)(LSA_SEC_HANDLE ContextHandle,PSecBuffer PackedContext);
608 typedef NTSTATUS (NTAPI SpMakeSignatureFn)(LSA_SEC_HANDLE ContextHandle,ULONG QualityOfProtection,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber);
609 typedef NTSTATUS (NTAPI SpVerifySignatureFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber,PULONG QualityOfProtection);
610 typedef NTSTATUS (NTAPI SpSealMessageFn)(LSA_SEC_HANDLE ContextHandle,ULONG QualityOfProtection,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber);
611 typedef NTSTATUS (NTAPI SpUnsealMessageFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber,PULONG QualityOfProtection);
612 typedef NTSTATUS (NTAPI SpGetContextTokenFn)(LSA_SEC_HANDLE ContextHandle,PHANDLE ImpersonationToken);
613 typedef NTSTATUS (NTAPI SpExportSecurityContextFn)(LSA_SEC_HANDLE phContext,ULONG fFlags,PSecBuffer pPackedContext,PHANDLE pToken);
614 typedef NTSTATUS (NTAPI SpImportSecurityContextFn)(PSecBuffer pPackedContext,HANDLE Token,PLSA_SEC_HANDLE phContext);
615 typedef NTSTATUS (NTAPI SpCompleteAuthTokenFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc InputBuffer);
616 typedef NTSTATUS (NTAPI SpFormatCredentialsFn)(PSecBuffer Credentials,PSecBuffer FormattedCredentials);
617 typedef NTSTATUS (NTAPI SpMarshallSupplementalCredsFn)(ULONG CredentialSize,PUCHAR Credentials,PULONG MarshalledCredSize,PVOID *MarshalledCreds);
618
619 typedef struct _SECPKG_USER_FUNCTION_TABLE {
620 SpInstanceInitFn *InstanceInit;
621 SpInitUserModeContextFn *InitUserModeContext;
622 SpMakeSignatureFn *MakeSignature;
623 SpVerifySignatureFn *VerifySignature;
624 SpSealMessageFn *SealMessage;
625 SpUnsealMessageFn *UnsealMessage;
626 SpGetContextTokenFn *GetContextToken;
627 SpQueryContextAttributesFn *QueryContextAttributes;
628 SpCompleteAuthTokenFn *CompleteAuthToken;
629 SpDeleteContextFn *DeleteUserModeContext;
630 SpFormatCredentialsFn *FormatCredentials;
631 SpMarshallSupplementalCredsFn *MarshallSupplementalCreds;
632 SpExportSecurityContextFn *ExportContext;
633 SpImportSecurityContextFn *ImportContext;
634 } SECPKG_USER_FUNCTION_TABLE,*PSECPKG_USER_FUNCTION_TABLE;
635
636 typedef NTSTATUS (SEC_ENTRY *SpLsaModeInitializeFn)(ULONG LsaVersion,PULONG PackageVersion,PSECPKG_FUNCTION_TABLE *ppTables,PULONG pcTables);
637 typedef NTSTATUS (SEC_ENTRY *SpUserModeInitializeFn)(ULONG LsaVersion,PULONG PackageVersion,PSECPKG_USER_FUNCTION_TABLE *ppTables,PULONG pcTables);
638
639 #define SECPKG_LSAMODEINIT_NAME "SpLsaModeInitialize"
640 #define SECPKG_USERMODEINIT_NAME "SpUserModeInitialize"
641
642 #define SECPKG_INTERFACE_VERSION 0x00010000
643 #define SECPKG_INTERFACE_VERSION_2 0x00020000
644 #define SECPKG_INTERFACE_VERSION_3 0x00040000
645
646 typedef enum _KSEC_CONTEXT_TYPE {
647 KSecPaged,KSecNonPaged
648 } KSEC_CONTEXT_TYPE;
649
650 typedef struct _KSEC_LIST_ENTRY {
651 LIST_ENTRY List;
652 LONG RefCount;
653 ULONG Signature;
654 PVOID OwningList;
655 PVOID Reserved;
656 } KSEC_LIST_ENTRY,*PKSEC_LIST_ENTRY;
657
658 #define KsecInitializeListEntry(Entry,SigValue) ((PKSEC_LIST_ENTRY) Entry)->List.Flink = ((PKSEC_LIST_ENTRY) Entry)->List.Blink = NULL; ((PKSEC_LIST_ENTRY) Entry)->RefCount = 1; ((PKSEC_LIST_ENTRY) Entry)->Signature = SigValue; ((PKSEC_LIST_ENTRY) Entry)->OwningList = NULL; ((PKSEC_LIST_ENTRY) Entry)->Reserved = NULL;
659
660 typedef PVOID (SEC_ENTRY KSEC_CREATE_CONTEXT_LIST)(KSEC_CONTEXT_TYPE Type);
661 typedef VOID (SEC_ENTRY KSEC_INSERT_LIST_ENTRY)(PVOID List,PKSEC_LIST_ENTRY Entry);
662 typedef NTSTATUS (SEC_ENTRY KSEC_REFERENCE_LIST_ENTRY)(PKSEC_LIST_ENTRY Entry,ULONG Signature,BOOLEAN RemoveNoRef);
663 typedef VOID (SEC_ENTRY KSEC_DEREFERENCE_LIST_ENTRY)(PKSEC_LIST_ENTRY Entry,BOOLEAN *Delete);
664 typedef NTSTATUS (SEC_ENTRY KSEC_SERIALIZE_WINNT_AUTH_DATA)(PVOID pvAuthData,PULONG Size,PVOID *SerializedData);
665 typedef NTSTATUS (SEC_ENTRY KSEC_SERIALIZE_SCHANNEL_AUTH_DATA)(PVOID pvAuthData,PULONG Size,PVOID *SerializedData);
666
667 KSEC_CREATE_CONTEXT_LIST KSecCreateContextList;
668 KSEC_INSERT_LIST_ENTRY KSecInsertListEntry;
669 KSEC_REFERENCE_LIST_ENTRY KSecReferenceListEntry;
670 KSEC_DEREFERENCE_LIST_ENTRY KSecDereferenceListEntry;
671 KSEC_SERIALIZE_WINNT_AUTH_DATA KSecSerializeWinntAuthData;
672 KSEC_SERIALIZE_SCHANNEL_AUTH_DATA KSecSerializeSchannelAuthData;
673
674 typedef KSEC_CREATE_CONTEXT_LIST *PKSEC_CREATE_CONTEXT_LIST;
675 typedef KSEC_INSERT_LIST_ENTRY *PKSEC_INSERT_LIST_ENTRY;
676 typedef KSEC_REFERENCE_LIST_ENTRY *PKSEC_REFERENCE_LIST_ENTRY;
677 typedef KSEC_DEREFERENCE_LIST_ENTRY *PKSEC_DEREFERENCE_LIST_ENTRY;
678 typedef KSEC_SERIALIZE_WINNT_AUTH_DATA *PKSEC_SERIALIZE_WINNT_AUTH_DATA;
679 typedef KSEC_SERIALIZE_SCHANNEL_AUTH_DATA *PKSEC_SERIALIZE_SCHANNEL_AUTH_DATA;
680
681 typedef struct _SECPKG_KERNEL_FUNCTIONS {
682 PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
683 PLSA_FREE_LSA_HEAP FreeHeap;
684 PKSEC_CREATE_CONTEXT_LIST CreateContextList;
685 PKSEC_INSERT_LIST_ENTRY InsertListEntry;
686 PKSEC_REFERENCE_LIST_ENTRY ReferenceListEntry;
687 PKSEC_DEREFERENCE_LIST_ENTRY DereferenceListEntry;
688 PKSEC_SERIALIZE_WINNT_AUTH_DATA SerializeWinntAuthData;
689 PKSEC_SERIALIZE_SCHANNEL_AUTH_DATA SerializeSchannelAuthData;
690 } SECPKG_KERNEL_FUNCTIONS,*PSECPKG_KERNEL_FUNCTIONS;
691
692 typedef NTSTATUS (NTAPI KspInitPackageFn)(PSECPKG_KERNEL_FUNCTIONS FunctionTable);
693 typedef NTSTATUS (NTAPI KspDeleteContextFn)(LSA_SEC_HANDLE ContextId,PLSA_SEC_HANDLE LsaContextId);
694 typedef NTSTATUS (NTAPI KspInitContextFn)(LSA_SEC_HANDLE ContextId,PSecBuffer ContextData,PLSA_SEC_HANDLE NewContextId);
695 typedef NTSTATUS (NTAPI KspMakeSignatureFn)(LSA_SEC_HANDLE ContextId,ULONG fQOP,PSecBufferDesc Message,ULONG MessageSeqNo);
696 typedef NTSTATUS (NTAPI KspVerifySignatureFn)(LSA_SEC_HANDLE ContextId,PSecBufferDesc Message,ULONG MessageSeqNo,PULONG pfQOP);
697 typedef NTSTATUS (NTAPI KspSealMessageFn)(LSA_SEC_HANDLE ContextId,ULONG fQOP,PSecBufferDesc Message,ULONG MessageSeqNo);
698 typedef NTSTATUS (NTAPI KspUnsealMessageFn)(LSA_SEC_HANDLE ContextId,PSecBufferDesc Message,ULONG MessageSeqNo,PULONG pfQOP);
699 typedef NTSTATUS (NTAPI KspGetTokenFn)(LSA_SEC_HANDLE ContextId,PHANDLE ImpersonationToken,PACCESS_TOKEN *RawToken);
700 typedef NTSTATUS (NTAPI KspQueryAttributesFn)(LSA_SEC_HANDLE ContextId,ULONG Attribute,PVOID Buffer);
701 typedef NTSTATUS (NTAPI KspCompleteTokenFn)(LSA_SEC_HANDLE ContextId,PSecBufferDesc Token);
702 typedef NTSTATUS (NTAPI KspMapHandleFn)(LSA_SEC_HANDLE ContextId,PLSA_SEC_HANDLE LsaContextId);
703 typedef NTSTATUS (NTAPI KspSetPagingModeFn)(BOOLEAN PagingMode);
704 typedef NTSTATUS (NTAPI KspSerializeAuthDataFn)(PVOID pvAuthData,PULONG Size,PVOID *SerializedData);
705
706 typedef struct _SECPKG_KERNEL_FUNCTION_TABLE {
707 KspInitPackageFn *Initialize;
708 KspDeleteContextFn *DeleteContext;
709 KspInitContextFn *InitContext;
710 KspMapHandleFn *MapHandle;
711 KspMakeSignatureFn *Sign;
712 KspVerifySignatureFn *Verify;
713 KspSealMessageFn *Seal;
714 KspUnsealMessageFn *Unseal;
715 KspGetTokenFn *GetToken;
716 KspQueryAttributesFn *QueryAttributes;
717 KspCompleteTokenFn *CompleteToken;
718 SpExportSecurityContextFn *ExportContext;
719 SpImportSecurityContextFn *ImportContext;
720 KspSetPagingModeFn *SetPackagePagingMode;
721 KspSerializeAuthDataFn *SerializeAuthData;
722 } SECPKG_KERNEL_FUNCTION_TABLE,*PSECPKG_KERNEL_FUNCTION_TABLE;
723
724 SECURITY_STATUS SEC_ENTRY KSecRegisterSecurityProvider(PSECURITY_STRING ProviderName,PSECPKG_KERNEL_FUNCTION_TABLE Table);
725
726 extern SECPKG_KERNEL_FUNCTIONS KspKernelFunctions;
727
728 #ifdef __cplusplus
729 }
730 #endif
731 #endif