1 /**
2  * This file has no copyright assigned and is placed in the Public Domain.
3  * This file is part of the mingw-w64 runtime package.
4  * No warranty is given; refer to the file DISCLAIMER.PD within this package.
5  */
6 #ifndef _NTSECPKG_
7 #define _NTSECPKG_
8 
9 #ifdef __cplusplus
10 extern "C" {
11 #endif
12 
13   typedef PVOID *PLSA_CLIENT_REQUEST;
14 
15   typedef enum _LSA_TOKEN_INFORMATION_TYPE {
16     LsaTokenInformationNull,
17     LsaTokenInformationV1,
18     LsaTokenInformationV2
19   } LSA_TOKEN_INFORMATION_TYPE,*PLSA_TOKEN_INFORMATION_TYPE;
20 
21   typedef struct _LSA_TOKEN_INFORMATION_NULL {
22     LARGE_INTEGER ExpirationTime;
23     PTOKEN_GROUPS Groups;
24   } LSA_TOKEN_INFORMATION_NULL,*PLSA_TOKEN_INFORMATION_NULL;
25 
26   typedef struct _LSA_TOKEN_INFORMATION_V1 {
27     LARGE_INTEGER ExpirationTime;
28     TOKEN_USER User;
29     PTOKEN_GROUPS Groups;
30     TOKEN_PRIMARY_GROUP PrimaryGroup;
31     PTOKEN_PRIVILEGES Privileges;
32     TOKEN_OWNER Owner;
33     TOKEN_DEFAULT_DACL DefaultDacl;
34   } LSA_TOKEN_INFORMATION_V1,*PLSA_TOKEN_INFORMATION_V1;
35 
36   typedef LSA_TOKEN_INFORMATION_V1 LSA_TOKEN_INFORMATION_V2,*PLSA_TOKEN_INFORMATION_V2;
37   typedef NTSTATUS (NTAPI LSA_CREATE_LOGON_SESSION)(PLUID LogonId);
38   typedef NTSTATUS (NTAPI LSA_DELETE_LOGON_SESSION)(PLUID LogonId);
39   typedef NTSTATUS (NTAPI LSA_ADD_CREDENTIAL)(PLUID LogonId,ULONG AuthenticationPackage,PLSA_STRING PrimaryKeyValue,PLSA_STRING Credentials);
40   typedef NTSTATUS (NTAPI LSA_GET_CREDENTIALS)(PLUID LogonId,ULONG AuthenticationPackage,PULONG QueryContext,BOOLEAN RetrieveAllCredentials,PLSA_STRING PrimaryKeyValue,PULONG PrimaryKeyLength,PLSA_STRING Credentials);
41   typedef NTSTATUS (NTAPI LSA_DELETE_CREDENTIAL)(PLUID LogonId,ULONG AuthenticationPackage,PLSA_STRING PrimaryKeyValue);
42   typedef PVOID (NTAPI LSA_ALLOCATE_LSA_HEAP)(ULONG Length);
43   typedef VOID (NTAPI LSA_FREE_LSA_HEAP)(PVOID Base);
44   typedef PVOID (NTAPI LSA_ALLOCATE_PRIVATE_HEAP)(SIZE_T Length);
45   typedef VOID (NTAPI LSA_FREE_PRIVATE_HEAP)(PVOID Base);
46   typedef NTSTATUS (NTAPI LSA_ALLOCATE_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,ULONG LengthRequired,PVOID *ClientBaseAddress);
47   typedef NTSTATUS (NTAPI LSA_FREE_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,PVOID ClientBaseAddress);
48   typedef NTSTATUS (NTAPI LSA_COPY_TO_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,ULONG Length,PVOID ClientBaseAddress,PVOID BufferToCopy);
49   typedef NTSTATUS (NTAPI LSA_COPY_FROM_CLIENT_BUFFER)(PLSA_CLIENT_REQUEST ClientRequest,ULONG Length,PVOID BufferToCopy,PVOID ClientBaseAddress);
50 
51   typedef LSA_CREATE_LOGON_SESSION *PLSA_CREATE_LOGON_SESSION;
52   typedef LSA_DELETE_LOGON_SESSION *PLSA_DELETE_LOGON_SESSION;
53   typedef LSA_ADD_CREDENTIAL *PLSA_ADD_CREDENTIAL;
54   typedef LSA_GET_CREDENTIALS *PLSA_GET_CREDENTIALS;
55   typedef LSA_DELETE_CREDENTIAL *PLSA_DELETE_CREDENTIAL;
56   typedef LSA_ALLOCATE_LSA_HEAP *PLSA_ALLOCATE_LSA_HEAP;
57   typedef LSA_FREE_LSA_HEAP *PLSA_FREE_LSA_HEAP;
58   typedef LSA_ALLOCATE_PRIVATE_HEAP *PLSA_ALLOCATE_PRIVATE_HEAP;
59   typedef LSA_FREE_PRIVATE_HEAP *PLSA_FREE_PRIVATE_HEAP;
60   typedef LSA_ALLOCATE_CLIENT_BUFFER *PLSA_ALLOCATE_CLIENT_BUFFER;
61   typedef LSA_FREE_CLIENT_BUFFER *PLSA_FREE_CLIENT_BUFFER;
62   typedef LSA_COPY_TO_CLIENT_BUFFER *PLSA_COPY_TO_CLIENT_BUFFER;
63   typedef LSA_COPY_FROM_CLIENT_BUFFER *PLSA_COPY_FROM_CLIENT_BUFFER;
64 
65   typedef struct _LSA_DISPATCH_TABLE {
66     PLSA_CREATE_LOGON_SESSION CreateLogonSession;
67     PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
68     PLSA_ADD_CREDENTIAL AddCredential;
69     PLSA_GET_CREDENTIALS GetCredentials;
70     PLSA_DELETE_CREDENTIAL DeleteCredential;
71     PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
72     PLSA_FREE_LSA_HEAP FreeLsaHeap;
73     PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
74     PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
75     PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
76     PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
77   } LSA_DISPATCH_TABLE,*PLSA_DISPATCH_TABLE;
78 
79 #define LSA_AP_NAME_INITIALIZE_PACKAGE "LsaApInitializePackage\0"
80 #define LSA_AP_NAME_LOGON_USER "LsaApLogonUser\0"
81 #define LSA_AP_NAME_LOGON_USER_EX "LsaApLogonUserEx\0"
82 #define LSA_AP_NAME_CALL_PACKAGE "LsaApCallPackage\0"
83 #define LSA_AP_NAME_LOGON_TERMINATED "LsaApLogonTerminated\0"
84 #define LSA_AP_NAME_CALL_PACKAGE_UNTRUSTED "LsaApCallPackageUntrusted\0"
85 #define LSA_AP_NAME_CALL_PACKAGE_PASSTHROUGH "LsaApCallPackagePassthrough\0"
86 
87   typedef NTSTATUS (NTAPI LSA_AP_INITIALIZE_PACKAGE)(ULONG AuthenticationPackageId,PLSA_DISPATCH_TABLE LsaDispatchTable,PLSA_STRING Database,PLSA_STRING Confidentiality,PLSA_STRING *AuthenticationPackageName);
88   typedef NTSTATUS (NTAPI LSA_AP_LOGON_USER)(PLSA_CLIENT_REQUEST ClientRequest,SECURITY_LOGON_TYPE LogonType,PVOID AuthenticationInformation,PVOID ClientAuthenticationBase,ULONG AuthenticationInformationLength,PVOID *ProfileBuffer,PULONG ProfileBufferLength,PLUID LogonId,PNTSTATUS SubStatus,PLSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID *TokenInformation,PLSA_UNICODE_STRING *AccountName,PLSA_UNICODE_STRING *AuthenticatingAuthority);
89   typedef NTSTATUS (NTAPI LSA_AP_LOGON_USER_EX)(PLSA_CLIENT_REQUEST ClientRequest,SECURITY_LOGON_TYPE LogonType,PVOID AuthenticationInformation,PVOID ClientAuthenticationBase,ULONG AuthenticationInformationLength,PVOID *ProfileBuffer,PULONG ProfileBufferLength,PLUID LogonId,PNTSTATUS SubStatus,PLSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID *TokenInformation,PUNICODE_STRING *AccountName,PUNICODE_STRING *AuthenticatingAuthority,PUNICODE_STRING *MachineName);
90   typedef NTSTATUS (NTAPI LSA_AP_CALL_PACKAGE)(PLSA_CLIENT_REQUEST ClientRequest,PVOID ProtocolSubmitBuffer,PVOID ClientBufferBase,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
91   typedef NTSTATUS (NTAPI LSA_AP_CALL_PACKAGE_PASSTHROUGH)(PLSA_CLIENT_REQUEST ClientRequest,PVOID ProtocolSubmitBuffer,PVOID ClientBufferBase,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
92   typedef VOID (NTAPI LSA_AP_LOGON_TERMINATED)(PLUID LogonId);
93 
94   typedef LSA_AP_CALL_PACKAGE LSA_AP_CALL_PACKAGE_UNTRUSTED;
95   typedef LSA_AP_INITIALIZE_PACKAGE *PLSA_AP_INITIALIZE_PACKAGE;
96   typedef LSA_AP_LOGON_USER *PLSA_AP_LOGON_USER;
97   typedef LSA_AP_LOGON_USER_EX *PLSA_AP_LOGON_USER_EX;
98   typedef LSA_AP_CALL_PACKAGE *PLSA_AP_CALL_PACKAGE;
99   typedef LSA_AP_CALL_PACKAGE_PASSTHROUGH *PLSA_AP_CALL_PACKAGE_PASSTHROUGH;
100   typedef LSA_AP_LOGON_TERMINATED *PLSA_AP_LOGON_TERMINATED;
101   typedef LSA_AP_CALL_PACKAGE_UNTRUSTED *PLSA_AP_CALL_PACKAGE_UNTRUSTED;
102 
103 #ifndef _SAM_CREDENTIAL_UPDATE_DEFINED
104 #define _SAM_CREDENTIAL_UPDATE_DEFINED
105 
106   typedef NTSTATUS (*PSAM_CREDENTIAL_UPDATE_NOTIFY_ROUTINE)(PUNICODE_STRING ClearPassword,PVOID OldCredentials,ULONG OldCredentialSize,ULONG UserAccountControl,PUNICODE_STRING UPN,PUNICODE_STRING UserName,PUNICODE_STRING NetbiosDomainName,PUNICODE_STRING DnsDomainName,PVOID *NewCredentials,ULONG *NewCredentialSize);
107 
108 #define SAM_CREDENTIAL_UPDATE_NOTIFY_ROUTINE "CredentialUpdateNotify"
109 
110   typedef BOOLEAN (*PSAM_CREDENTIAL_UPDATE_REGISTER_ROUTINE)(PUNICODE_STRING CredentialName);
111 
112 #define SAM_CREDENTIAL_UPDATE_REGISTER_ROUTINE "CredentialUpdateRegister"
113 
114   typedef VOID (*PSAM_CREDENTIAL_UPDATE_FREE_ROUTINE)(PVOID p);
115 
116 #define SAM_CREDENTIAL_UPDATE_FREE_ROUTINE "CredentialUpdateFree"
117 #endif
118 
119 #ifdef SECURITY_KERNEL
120 
121   typedef PVOID SEC_THREAD_START;
122   typedef PVOID SEC_ATTRS;
123 #else
124   typedef LPTHREAD_START_ROUTINE SEC_THREAD_START;
125   typedef LPSECURITY_ATTRIBUTES SEC_ATTRS;
126 #endif
127 
128 #define SecEqualLuid(L1,L2) ((((PLUID)L1)->LowPart==((PLUID)L2)->LowPart) && (((PLUID)L1)->HighPart==((PLUID)L2)->HighPart))
129 #define SecIsZeroLuid(L1) ((L1->LowPart | L1->HighPart)==0)
130 
131   typedef struct _SECPKG_CLIENT_INFO {
132     LUID LogonId;
133     ULONG ProcessID;
134     ULONG ThreadID;
135     BOOLEAN HasTcbPrivilege;
136     BOOLEAN Impersonating;
137     BOOLEAN Restricted;
138 
139     UCHAR ClientFlags;
140     SECURITY_IMPERSONATION_LEVEL ImpersonationLevel;
141 
142   } SECPKG_CLIENT_INFO,*PSECPKG_CLIENT_INFO;
143 
144 #define SECPKG_CLIENT_PROCESS_TERMINATED 0x01
145 #define SECPKG_CLIENT_THREAD_TERMINATED 0x02
146 
147   typedef struct _SECPKG_CALL_INFO {
148     ULONG ProcessId;
149     ULONG ThreadId;
150     ULONG Attributes;
151     ULONG CallCount;
152   } SECPKG_CALL_INFO,*PSECPKG_CALL_INFO;
153 
154 #define SECPKG_CALL_KERNEL_MODE 0x00000001
155 #define SECPKG_CALL_ANSI 0x00000002
156 #define SECPKG_CALL_URGENT 0x00000004
157 #define SECPKG_CALL_RECURSIVE 0x00000008
158 #define SECPKG_CALL_IN_PROC 0x00000010
159 #define SECPKG_CALL_CLEANUP 0x00000020
160 #define SECPKG_CALL_WOWCLIENT 0x00000040
161 #define SECPKG_CALL_THREAD_TERM 0x00000080
162 #define SECPKG_CALL_PROCESS_TERM 0x00000100
163 #define SECPKG_CALL_IS_TCB 0x00000200
164 
165   typedef struct _SECPKG_SUPPLEMENTAL_CRED {
166     UNICODE_STRING PackageName;
167     ULONG CredentialSize;
168     PUCHAR Credentials;
169   } SECPKG_SUPPLEMENTAL_CRED,*PSECPKG_SUPPLEMENTAL_CRED;
170 
171   typedef ULONG_PTR LSA_SEC_HANDLE;
172   typedef LSA_SEC_HANDLE *PLSA_SEC_HANDLE;
173   typedef struct _SECPKG_SUPPLEMENTAL_CRED_ARRAY {
174     ULONG CredentialCount;
175     SECPKG_SUPPLEMENTAL_CRED Credentials[1];
176   } SECPKG_SUPPLEMENTAL_CRED_ARRAY,*PSECPKG_SUPPLEMENTAL_CRED_ARRAY;
177 
178 #define SECBUFFER_UNMAPPED 0x40000000
179 
180 #define SECBUFFER_KERNEL_MAP 0x20000000
181 
182   typedef NTSTATUS (NTAPI LSA_CALLBACK_FUNCTION)(ULONG_PTR Argument1,ULONG_PTR Argument2,PSecBuffer InputBuffer,PSecBuffer OutputBuffer);
183 
184   typedef LSA_CALLBACK_FUNCTION *PLSA_CALLBACK_FUNCTION;
185 
186 #define PRIMARY_CRED_CLEAR_PASSWORD 0x1
187 #define PRIMARY_CRED_OWF_PASSWORD 0x2
188 #define PRIMARY_CRED_UPDATE 0x4
189 #define PRIMARY_CRED_CACHED_LOGON 0x8
190 #define PRIMARY_CRED_LOGON_NO_TCB 0x10
191 
192 #define PRIMARY_CRED_LOGON_PACKAGE_SHIFT 24
193 #define PRIMARY_CRED_PACKAGE_MASK 0xff000000
194 
195   typedef struct _SECPKG_PRIMARY_CRED {
196     LUID LogonId;
197     UNICODE_STRING DownlevelName;
198     UNICODE_STRING DomainName;
199     UNICODE_STRING Password;
200     UNICODE_STRING OldPassword;
201     PSID UserSid;
202     ULONG Flags;
203     UNICODE_STRING DnsDomainName;
204     UNICODE_STRING Upn;
205     UNICODE_STRING LogonServer;
206     UNICODE_STRING Spare1;
207     UNICODE_STRING Spare2;
208     UNICODE_STRING Spare3;
209     UNICODE_STRING Spare4;
210   } SECPKG_PRIMARY_CRED,*PSECPKG_PRIMARY_CRED;
211 
212 #define MAX_CRED_SIZE 1024
213 
214 #define SECPKG_STATE_ENCRYPTION_PERMITTED 0x01
215 #define SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED 0x02
216 #define SECPKG_STATE_DOMAIN_CONTROLLER 0x04
217 #define SECPKG_STATE_WORKSTATION 0x08
218 #define SECPKG_STATE_STANDALONE 0x10
219 
220   typedef struct _SECPKG_PARAMETERS {
221     ULONG Version;
222     ULONG MachineState;
223     ULONG SetupMode;
224     PSID DomainSid;
225     UNICODE_STRING DomainName;
226     UNICODE_STRING DnsDomainName;
227     GUID DomainGuid;
228   } SECPKG_PARAMETERS,*PSECPKG_PARAMETERS;
229 
230   typedef enum _SECPKG_EXTENDED_INFORMATION_CLASS {
231     SecpkgGssInfo = 1,
232     SecpkgContextThunks,
233     SecpkgMutualAuthLevel,
234     SecpkgWowClientDll,
235     SecpkgExtraOids,
236     SecpkgMaxInfo
237   } SECPKG_EXTENDED_INFORMATION_CLASS;
238 
239   typedef struct _SECPKG_GSS_INFO {
240     ULONG EncodedIdLength;
241     UCHAR EncodedId[4];
242   } SECPKG_GSS_INFO,*PSECPKG_GSS_INFO;
243 
244   typedef struct _SECPKG_CONTEXT_THUNKS {
245     ULONG InfoLevelCount;
246     ULONG Levels[1];
247   } SECPKG_CONTEXT_THUNKS,*PSECPKG_CONTEXT_THUNKS;
248 
249   typedef struct _SECPKG_MUTUAL_AUTH_LEVEL {
250     ULONG MutualAuthLevel;
251   } SECPKG_MUTUAL_AUTH_LEVEL,*PSECPKG_MUTUAL_AUTH_LEVEL;
252 
253   typedef struct _SECPKG_WOW_CLIENT_DLL {
254     SECURITY_STRING WowClientDllPath;
255   } SECPKG_WOW_CLIENT_DLL,*PSECPKG_WOW_CLIENT_DLL;
256 
257 #define SECPKG_MAX_OID_LENGTH 32
258 
259   typedef struct _SECPKG_SERIALIZED_OID {
260     ULONG OidLength;
261     ULONG OidAttributes;
262     UCHAR OidValue[SECPKG_MAX_OID_LENGTH ];
263   } SECPKG_SERIALIZED_OID,*PSECPKG_SERIALIZED_OID;
264 
265   typedef struct _SECPKG_EXTRA_OIDS {
266     ULONG OidCount;
267     SECPKG_SERIALIZED_OID Oids[1 ];
268   } SECPKG_EXTRA_OIDS,*PSECPKG_EXTRA_OIDS;
269 
270   typedef struct _SECPKG_EXTENDED_INFORMATION {
271     SECPKG_EXTENDED_INFORMATION_CLASS Class;
272     union {
273       SECPKG_GSS_INFO GssInfo;
274       SECPKG_CONTEXT_THUNKS ContextThunks;
275       SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel;
276       SECPKG_WOW_CLIENT_DLL WowClientDll;
277       SECPKG_EXTRA_OIDS ExtraOids;
278     } Info;
279   } SECPKG_EXTENDED_INFORMATION,*PSECPKG_EXTENDED_INFORMATION;
280 
281 #define SECPKG_ATTR_SASL_CONTEXT 0x00010000
282 
283   typedef struct _SecPkgContext_SaslContext {
284     PVOID SaslContext;
285   } SecPkgContext_SaslContext,*PSecPkgContext_SaslContext;
286 
287 #define SECPKG_ATTR_THUNK_ALL 0x00010000
288 
289 #ifndef SECURITY_USER_DATA_DEFINED
290 #define SECURITY_USER_DATA_DEFINED
291 
292   typedef struct _SECURITY_USER_DATA {
293     SECURITY_STRING UserName;
294     SECURITY_STRING LogonDomainName;
295     SECURITY_STRING LogonServer;
296     PSID pSid;
297   } SECURITY_USER_DATA,*PSECURITY_USER_DATA;
298 
299   typedef SECURITY_USER_DATA SecurityUserData,*PSecurityUserData;
300 
301 #define UNDERSTANDS_LONG_NAMES 1
302 #define NO_LONG_NAMES 2
303 #endif
304 
305   typedef NTSTATUS (NTAPI LSA_IMPERSONATE_CLIENT)(VOID);
306   typedef NTSTATUS (NTAPI LSA_UNLOAD_PACKAGE)(VOID);
307   typedef NTSTATUS (NTAPI LSA_DUPLICATE_HANDLE)(HANDLE SourceHandle,PHANDLE DestionationHandle);
308   typedef NTSTATUS (NTAPI LSA_SAVE_SUPPLEMENTAL_CREDENTIALS)(PLUID LogonId,ULONG SupplementalCredSize,PVOID SupplementalCreds,BOOLEAN Synchronous);
309   typedef HANDLE (NTAPI LSA_CREATE_THREAD)(SEC_ATTRS SecurityAttributes,ULONG StackSize,SEC_THREAD_START StartFunction,PVOID ThreadParameter,ULONG CreationFlags,PULONG ThreadId);
310   typedef NTSTATUS (NTAPI LSA_GET_CLIENT_INFO)(PSECPKG_CLIENT_INFO ClientInfo);
311   typedef HANDLE (NTAPI LSA_REGISTER_NOTIFICATION)(SEC_THREAD_START StartFunction,PVOID Parameter,ULONG NotificationType,ULONG NotificationClass,ULONG NotificationFlags,ULONG IntervalMinutes,HANDLE WaitEvent);
312   typedef NTSTATUS (NTAPI LSA_CANCEL_NOTIFICATION)(HANDLE NotifyHandle);
313   typedef NTSTATUS (NTAPI LSA_MAP_BUFFER)(PSecBuffer InputBuffer,PSecBuffer OutputBuffer);
314   typedef NTSTATUS (NTAPI LSA_CREATE_TOKEN)(PLUID LogonId,PTOKEN_SOURCE TokenSource,SECURITY_LOGON_TYPE LogonType,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,LSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID TokenInformation,PTOKEN_GROUPS TokenGroups,PUNICODE_STRING AccountName,PUNICODE_STRING AuthorityName,PUNICODE_STRING Workstation,PUNICODE_STRING ProfilePath,PHANDLE Token,PNTSTATUS SubStatus);
315 
316   typedef enum _SECPKG_SESSIONINFO_TYPE {
317     SecSessionPrimaryCred
318   } SECPKG_SESSIONINFO_TYPE;
319 
320   typedef NTSTATUS (NTAPI LSA_CREATE_TOKEN_EX)(PLUID LogonId,PTOKEN_SOURCE TokenSource,SECURITY_LOGON_TYPE LogonType,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,LSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID TokenInformation,PTOKEN_GROUPS TokenGroups,PUNICODE_STRING Workstation,PUNICODE_STRING ProfilePath,PVOID SessionInformation,SECPKG_SESSIONINFO_TYPE SessionInformationType,PHANDLE Token,PNTSTATUS SubStatus);
321   typedef VOID (NTAPI LSA_AUDIT_LOGON)(NTSTATUS Status,NTSTATUS SubStatus,PUNICODE_STRING AccountName,PUNICODE_STRING AuthenticatingAuthority,PUNICODE_STRING WorkstationName,PSID UserSid,SECURITY_LOGON_TYPE LogonType,PTOKEN_SOURCE TokenSource,PLUID LogonId);
322   typedef NTSTATUS (NTAPI LSA_CALL_PACKAGE)(PUNICODE_STRING AuthenticationPackage,PVOID ProtocolSubmitBuffer,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
323   typedef NTSTATUS (NTAPI LSA_CALL_PACKAGEEX)(PUNICODE_STRING AuthenticationPackage,PVOID ClientBufferBase,PVOID ProtocolSubmitBuffer,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
324   typedef NTSTATUS (NTAPI LSA_CALL_PACKAGE_PASSTHROUGH)(PUNICODE_STRING AuthenticationPackage,PVOID ClientBufferBase,PVOID ProtocolSubmitBuffer,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus);
325   typedef BOOLEAN (NTAPI LSA_GET_CALL_INFO)(PSECPKG_CALL_INFO Info);
326   typedef PVOID (NTAPI LSA_CREATE_SHARED_MEMORY)(ULONG MaxSize,ULONG InitialSize);
327   typedef PVOID (NTAPI LSA_ALLOCATE_SHARED_MEMORY)(PVOID SharedMem,ULONG Size);
328   typedef VOID (NTAPI LSA_FREE_SHARED_MEMORY)(PVOID SharedMem,PVOID Memory);
329   typedef BOOLEAN (NTAPI LSA_DELETE_SHARED_MEMORY)(PVOID SharedMem);
330 
331   typedef enum _SECPKG_NAME_TYPE {
332     SecNameSamCompatible,
333     SecNameAlternateId,
334     SecNameFlat,
335     SecNameDN,
336     SecNameSPN
337   } SECPKG_NAME_TYPE;
338 
339   typedef NTSTATUS (NTAPI LSA_OPEN_SAM_USER)(PSECURITY_STRING Name,SECPKG_NAME_TYPE NameType,PSECURITY_STRING Prefix,BOOLEAN AllowGuest,ULONG Reserved,PVOID *UserHandle);
340   typedef NTSTATUS (NTAPI LSA_GET_USER_CREDENTIALS)(PVOID UserHandle,PVOID *PrimaryCreds,PULONG PrimaryCredsSize,PVOID *SupplementalCreds,PULONG SupplementalCredsSize);
341   typedef NTSTATUS (NTAPI LSA_GET_USER_AUTH_DATA)(PVOID UserHandle,PUCHAR *UserAuthData,PULONG UserAuthDataSize);
342   typedef NTSTATUS (NTAPI LSA_CLOSE_SAM_USER)(PVOID UserHandle);
343   typedef NTSTATUS (NTAPI LSA_GET_AUTH_DATA_FOR_USER)(PSECURITY_STRING Name,SECPKG_NAME_TYPE NameType,PSECURITY_STRING Prefix,PUCHAR *UserAuthData,PULONG UserAuthDataSize,PUNICODE_STRING UserFlatName);
344   typedef NTSTATUS (NTAPI LSA_CONVERT_AUTH_DATA_TO_TOKEN)(PVOID UserAuthData,ULONG UserAuthDataSize,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,PTOKEN_SOURCE TokenSource,SECURITY_LOGON_TYPE LogonType,PUNICODE_STRING AuthorityName,PHANDLE Token,PLUID LogonId,PUNICODE_STRING AccountName,PNTSTATUS SubStatus);
345   typedef NTSTATUS (NTAPI LSA_CRACK_SINGLE_NAME)(ULONG FormatOffered,BOOLEAN PerformAtGC,PUNICODE_STRING NameInput,PUNICODE_STRING Prefix,ULONG RequestedFormat,PUNICODE_STRING CrackedName,PUNICODE_STRING DnsDomainName,PULONG SubStatus);
346   typedef NTSTATUS (NTAPI LSA_AUDIT_ACCOUNT_LOGON)(ULONG AuditId,BOOLEAN Success,PUNICODE_STRING Source,PUNICODE_STRING ClientName,PUNICODE_STRING MappedName,NTSTATUS Status);
347   typedef NTSTATUS (NTAPI LSA_CLIENT_CALLBACK)(PCHAR Callback,ULONG_PTR Argument1,ULONG_PTR Argument2,PSecBuffer Input,PSecBuffer Output);
348   typedef NTSTATUS (NTAPI LSA_REGISTER_CALLBACK)(ULONG CallbackId,PLSA_CALLBACK_FUNCTION Callback);
349 
350 #define NOTIFIER_FLAG_NEW_THREAD 0x00000001
351 #define NOTIFIER_FLAG_ONE_SHOT 0x00000002
352 #define NOTIFIER_FLAG_SECONDS 0x80000000
353 
354 #define NOTIFIER_TYPE_INTERVAL 1
355 #define NOTIFIER_TYPE_HANDLE_WAIT 2
356 #define NOTIFIER_TYPE_STATE_CHANGE 3
357 #define NOTIFIER_TYPE_NOTIFY_EVENT 4
358 #define NOTIFIER_TYPE_IMMEDIATE 16
359 
360 #define NOTIFY_CLASS_PACKAGE_CHANGE 1
361 #define NOTIFY_CLASS_ROLE_CHANGE 2
362 #define NOTIFY_CLASS_DOMAIN_CHANGE 3
363 #define NOTIFY_CLASS_REGISTRY_CHANGE 4
364 
365   typedef struct _SECPKG_EVENT_PACKAGE_CHANGE {
366     ULONG ChangeType;
367     LSA_SEC_HANDLE PackageId;
368     SECURITY_STRING PackageName;
369   } SECPKG_EVENT_PACKAGE_CHANGE,*PSECPKG_EVENT_PACKAGE_CHANGE;
370 
371 #define SECPKG_PACKAGE_CHANGE_LOAD 0
372 #define SECPKG_PACKAGE_CHANGE_UNLOAD 1
373 #define SECPKG_PACKAGE_CHANGE_SELECT 2
374 
375   typedef struct _SECPKG_EVENT_ROLE_CHANGE {
376     ULONG PreviousRole;
377     ULONG NewRole;
378   } SECPKG_EVENT_ROLE_CHANGE,*PSECPKG_EVENT_ROLE_CHANGE;
379 
380   typedef struct _SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE;
381   typedef struct _SECPKG_PARAMETERS *PSECPKG_EVENT_DOMAIN_CHANGE;
382 
383   typedef struct _SECPKG_EVENT_NOTIFY {
384     ULONG EventClass;
385     ULONG Reserved;
386     ULONG EventDataSize;
387     PVOID EventData;
388     PVOID PackageParameter;
389   } SECPKG_EVENT_NOTIFY,*PSECPKG_EVENT_NOTIFY;
390 
391   typedef NTSTATUS (NTAPI LSA_UPDATE_PRIMARY_CREDENTIALS)(PSECPKG_PRIMARY_CRED PrimaryCredentials,PSECPKG_SUPPLEMENTAL_CRED_ARRAY Credentials);
392   typedef VOID (NTAPI LSA_PROTECT_MEMORY)(PVOID Buffer,ULONG BufferSize);
393   typedef NTSTATUS (NTAPI LSA_OPEN_TOKEN_BY_LOGON_ID)(PLUID LogonId,HANDLE *RetTokenHandle);
394   typedef NTSTATUS (NTAPI LSA_EXPAND_AUTH_DATA_FOR_DOMAIN)(PUCHAR UserAuthData,ULONG UserAuthDataSize,PVOID Reserved,PUCHAR *ExpandedAuthData,PULONG ExpandedAuthDataSize);
395 
396   typedef LSA_IMPERSONATE_CLIENT *PLSA_IMPERSONATE_CLIENT;
397   typedef LSA_UNLOAD_PACKAGE *PLSA_UNLOAD_PACKAGE;
398   typedef LSA_DUPLICATE_HANDLE *PLSA_DUPLICATE_HANDLE;
399   typedef LSA_SAVE_SUPPLEMENTAL_CREDENTIALS *PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS;
400   typedef LSA_CREATE_THREAD *PLSA_CREATE_THREAD;
401   typedef LSA_GET_CLIENT_INFO *PLSA_GET_CLIENT_INFO;
402   typedef LSA_REGISTER_NOTIFICATION *PLSA_REGISTER_NOTIFICATION;
403   typedef LSA_CANCEL_NOTIFICATION *PLSA_CANCEL_NOTIFICATION;
404   typedef LSA_MAP_BUFFER *PLSA_MAP_BUFFER;
405   typedef LSA_CREATE_TOKEN *PLSA_CREATE_TOKEN;
406   typedef LSA_AUDIT_LOGON *PLSA_AUDIT_LOGON;
407   typedef LSA_CALL_PACKAGE *PLSA_CALL_PACKAGE;
408   typedef LSA_CALL_PACKAGEEX *PLSA_CALL_PACKAGEEX;
409   typedef LSA_GET_CALL_INFO *PLSA_GET_CALL_INFO;
410   typedef LSA_CREATE_SHARED_MEMORY *PLSA_CREATE_SHARED_MEMORY;
411   typedef LSA_ALLOCATE_SHARED_MEMORY *PLSA_ALLOCATE_SHARED_MEMORY;
412   typedef LSA_FREE_SHARED_MEMORY *PLSA_FREE_SHARED_MEMORY;
413   typedef LSA_DELETE_SHARED_MEMORY *PLSA_DELETE_SHARED_MEMORY;
414   typedef LSA_OPEN_SAM_USER *PLSA_OPEN_SAM_USER;
415   typedef LSA_GET_USER_CREDENTIALS *PLSA_GET_USER_CREDENTIALS;
416   typedef LSA_GET_USER_AUTH_DATA *PLSA_GET_USER_AUTH_DATA;
417   typedef LSA_CLOSE_SAM_USER *PLSA_CLOSE_SAM_USER;
418   typedef LSA_CONVERT_AUTH_DATA_TO_TOKEN *PLSA_CONVERT_AUTH_DATA_TO_TOKEN;
419   typedef LSA_CLIENT_CALLBACK *PLSA_CLIENT_CALLBACK;
420   typedef LSA_REGISTER_CALLBACK *PLSA_REGISTER_CALLBACK;
421   typedef LSA_UPDATE_PRIMARY_CREDENTIALS *PLSA_UPDATE_PRIMARY_CREDENTIALS;
422   typedef LSA_GET_AUTH_DATA_FOR_USER *PLSA_GET_AUTH_DATA_FOR_USER;
423   typedef LSA_CRACK_SINGLE_NAME *PLSA_CRACK_SINGLE_NAME;
424   typedef LSA_AUDIT_ACCOUNT_LOGON *PLSA_AUDIT_ACCOUNT_LOGON;
425   typedef LSA_CALL_PACKAGE_PASSTHROUGH *PLSA_CALL_PACKAGE_PASSTHROUGH;
426   typedef LSA_PROTECT_MEMORY *PLSA_PROTECT_MEMORY;
427   typedef LSA_OPEN_TOKEN_BY_LOGON_ID *PLSA_OPEN_TOKEN_BY_LOGON_ID;
428   typedef LSA_EXPAND_AUTH_DATA_FOR_DOMAIN *PLSA_EXPAND_AUTH_DATA_FOR_DOMAIN;
429   typedef LSA_CREATE_TOKEN_EX *PLSA_CREATE_TOKEN_EX;
430 
431 #ifdef _WINCRED_H_
432 
433 #ifndef _ENCRYPTED_CREDENTIAL_DEFINED
434 #define _ENCRYPTED_CREDENTIAL_DEFINED
435 
436   typedef struct _ENCRYPTED_CREDENTIALW {
437     CREDENTIALW Cred;
438     ULONG ClearCredentialBlobSize;
439   } ENCRYPTED_CREDENTIALW,*PENCRYPTED_CREDENTIALW;
440 #endif
441 
442 #define CREDP_FLAGS_IN_PROCESS 0x01
443 #define CREDP_FLAGS_USE_MIDL_HEAP 0x02
444 #define CREDP_FLAGS_DONT_CACHE_TI 0x04
445 #define CREDP_FLAGS_CLEAR_PASSWORD 0x08
446 #define CREDP_FLAGS_USER_ENCRYPTED_PASSWORD 0x10
447 
448   typedef NTSTATUS (NTAPI CredReadFn)(PLUID LogonId,ULONG CredFlags,LPWSTR TargetName,ULONG Type,ULONG Flags,PENCRYPTED_CREDENTIALW *Credential);
449   typedef NTSTATUS (NTAPI CredReadDomainCredentialsFn)(PLUID LogonId,ULONG CredFlags,PCREDENTIAL_TARGET_INFORMATIONW TargetInfo,ULONG Flags,PULONG Count,PENCRYPTED_CREDENTIALW **Credential);
450   typedef VOID (NTAPI CredFreeCredentialsFn)(ULONG Count,PENCRYPTED_CREDENTIALW *Credentials);
451   typedef NTSTATUS (NTAPI CredWriteFn)(PLUID LogonId,ULONG CredFlags,PENCRYPTED_CREDENTIALW Credential,ULONG Flags);
452 
453   NTSTATUS CredMarshalTargetInfo (PCREDENTIAL_TARGET_INFORMATIONW InTargetInfo,PUSHORT *Buffer,PULONG BufferSize);
454   NTSTATUS CredUnmarshalTargetInfo (PUSHORT Buffer,ULONG BufferSize,PCREDENTIAL_TARGET_INFORMATIONW *RetTargetInfo,PULONG RetActualSize);
455 
456 #define CRED_MARSHALED_TI_SIZE_SIZE 12
457 #endif
458 
459   typedef struct _SEC_WINNT_AUTH_IDENTITY32 {
460     ULONG User;
461     ULONG UserLength;
462     ULONG Domain;
463     ULONG DomainLength;
464     ULONG Password;
465     ULONG PasswordLength;
466     ULONG Flags;
467   } SEC_WINNT_AUTH_IDENTITY32,*PSEC_WINNT_AUTH_IDENTITY32;
468 
469   typedef struct _SEC_WINNT_AUTH_IDENTITY_EX32 {
470     ULONG Version;
471     ULONG Length;
472     ULONG User;
473     ULONG UserLength;
474     ULONG Domain;
475     ULONG DomainLength;
476     ULONG Password;
477     ULONG PasswordLength;
478     ULONG Flags;
479     ULONG PackageList;
480     ULONG PackageListLength;
481   } SEC_WINNT_AUTH_IDENTITY_EX32,*PSEC_WINNT_AUTH_IDENTITY_EX32;
482 
483   typedef struct _LSA_SECPKG_FUNCTION_TABLE {
484     PLSA_CREATE_LOGON_SESSION CreateLogonSession;
485     PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
486     PLSA_ADD_CREDENTIAL AddCredential;
487     PLSA_GET_CREDENTIALS GetCredentials;
488     PLSA_DELETE_CREDENTIAL DeleteCredential;
489     PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
490     PLSA_FREE_LSA_HEAP FreeLsaHeap;
491     PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
492     PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
493     PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
494     PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
495     PLSA_IMPERSONATE_CLIENT ImpersonateClient;
496     PLSA_UNLOAD_PACKAGE UnloadPackage;
497     PLSA_DUPLICATE_HANDLE DuplicateHandle;
498     PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials;
499     PLSA_CREATE_THREAD CreateThread;
500     PLSA_GET_CLIENT_INFO GetClientInfo;
501     PLSA_REGISTER_NOTIFICATION RegisterNotification;
502     PLSA_CANCEL_NOTIFICATION CancelNotification;
503     PLSA_MAP_BUFFER MapBuffer;
504     PLSA_CREATE_TOKEN CreateToken;
505     PLSA_AUDIT_LOGON AuditLogon;
506     PLSA_CALL_PACKAGE CallPackage;
507     PLSA_FREE_LSA_HEAP FreeReturnBuffer;
508     PLSA_GET_CALL_INFO GetCallInfo;
509     PLSA_CALL_PACKAGEEX CallPackageEx;
510     PLSA_CREATE_SHARED_MEMORY CreateSharedMemory;
511     PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory;
512     PLSA_FREE_SHARED_MEMORY FreeSharedMemory;
513     PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory;
514     PLSA_OPEN_SAM_USER OpenSamUser;
515     PLSA_GET_USER_CREDENTIALS GetUserCredentials;
516     PLSA_GET_USER_AUTH_DATA GetUserAuthData;
517     PLSA_CLOSE_SAM_USER CloseSamUser;
518     PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken;
519     PLSA_CLIENT_CALLBACK ClientCallback;
520     PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials;
521     PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser;
522     PLSA_CRACK_SINGLE_NAME CrackSingleName;
523     PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon;
524     PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
525 #ifdef _WINCRED_H_
526     CredReadFn *CrediRead;
527     CredReadDomainCredentialsFn *CrediReadDomainCredentials;
528     CredFreeCredentialsFn *CrediFreeCredentials;
529 #else
530     PLSA_PROTECT_MEMORY DummyFunction1;
531     PLSA_PROTECT_MEMORY DummyFunction2;
532     PLSA_PROTECT_MEMORY DummyFunction3;
533 #endif
534     PLSA_PROTECT_MEMORY LsaProtectMemory;
535     PLSA_PROTECT_MEMORY LsaUnprotectMemory;
536     PLSA_OPEN_TOKEN_BY_LOGON_ID OpenTokenByLogonId;
537     PLSA_EXPAND_AUTH_DATA_FOR_DOMAIN ExpandAuthDataForDomain;
538     PLSA_ALLOCATE_PRIVATE_HEAP AllocatePrivateHeap;
539     PLSA_FREE_PRIVATE_HEAP FreePrivateHeap;
540     PLSA_CREATE_TOKEN_EX CreateTokenEx;
541 #ifdef _WINCRED_H_
542     CredWriteFn *CrediWrite;
543 #else
544     PLSA_PROTECT_MEMORY DummyFunction4;
545 #endif
546   } LSA_SECPKG_FUNCTION_TABLE,*PLSA_SECPKG_FUNCTION_TABLE;
547 
548   typedef struct _SECPKG_DLL_FUNCTIONS {
549     PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
550     PLSA_FREE_LSA_HEAP FreeHeap;
551     PLSA_REGISTER_CALLBACK RegisterCallback;
552   } SECPKG_DLL_FUNCTIONS,*PSECPKG_DLL_FUNCTIONS;
553 
554   typedef NTSTATUS (NTAPI SpInitializeFn)(ULONG_PTR PackageId,PSECPKG_PARAMETERS Parameters,PLSA_SECPKG_FUNCTION_TABLE FunctionTable);
555   typedef NTSTATUS (NTAPI SpShutdownFn)(VOID);
556   typedef NTSTATUS (NTAPI SpGetInfoFn)(PSecPkgInfo PackageInfo);
557   typedef NTSTATUS (NTAPI SpGetExtendedInformationFn)(SECPKG_EXTENDED_INFORMATION_CLASS Class,PSECPKG_EXTENDED_INFORMATION *ppInformation);
558   typedef NTSTATUS (NTAPI SpSetExtendedInformationFn)(SECPKG_EXTENDED_INFORMATION_CLASS Class,PSECPKG_EXTENDED_INFORMATION Info);
559   typedef NTSTATUS (LSA_AP_LOGON_USER_EX2)(PLSA_CLIENT_REQUEST ClientRequest,SECURITY_LOGON_TYPE LogonType,PVOID AuthenticationInformation,PVOID ClientAuthenticationBase,ULONG AuthenticationInformationLength,PVOID *ProfileBuffer,PULONG ProfileBufferLength,PLUID LogonId,PNTSTATUS SubStatus,PLSA_TOKEN_INFORMATION_TYPE TokenInformationType,PVOID *TokenInformation,PUNICODE_STRING *AccountName,PUNICODE_STRING *AuthenticatingAuthority,PUNICODE_STRING *MachineName,PSECPKG_PRIMARY_CRED PrimaryCredentials,PSECPKG_SUPPLEMENTAL_CRED_ARRAY *CachedCredentials);
560 
561   typedef LSA_AP_LOGON_USER_EX2 *PLSA_AP_LOGON_USER_EX2;
562 
563 #define LSA_AP_NAME_LOGON_USER_EX2 "LsaApLogonUserEx2\0"
564 
565   typedef NTSTATUS (NTAPI SpAcceptCredentialsFn)(SECURITY_LOGON_TYPE LogonType,PUNICODE_STRING AccountName,PSECPKG_PRIMARY_CRED PrimaryCredentials,PSECPKG_SUPPLEMENTAL_CRED SupplementalCredentials);
566 
567 #define SP_ACCEPT_CREDENTIALS_NAME "SpAcceptCredentials\0"
568 
569   typedef NTSTATUS (NTAPI SpAcquireCredentialsHandleFn)(PUNICODE_STRING PrincipalName,ULONG CredentialUseFlags,PLUID LogonId,PVOID AuthorizationData,PVOID GetKeyFunciton,PVOID GetKeyArgument,PLSA_SEC_HANDLE CredentialHandle,PTimeStamp ExpirationTime);
570   typedef NTSTATUS (NTAPI SpFreeCredentialsHandleFn)(LSA_SEC_HANDLE CredentialHandle);
571   typedef NTSTATUS (NTAPI SpQueryCredentialsAttributesFn)(LSA_SEC_HANDLE CredentialHandle,ULONG CredentialAttribute,PVOID Buffer);
572   typedef NTSTATUS (NTAPI SpSetCredentialsAttributesFn)(LSA_SEC_HANDLE CredentialHandle,ULONG CredentialAttribute,PVOID Buffer,ULONG BufferSize);
573   typedef NTSTATUS (NTAPI SpAddCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PUNICODE_STRING PrincipalName,PUNICODE_STRING Package,ULONG CredentialUseFlags,PVOID AuthorizationData,PVOID GetKeyFunciton,PVOID GetKeyArgument,PTimeStamp ExpirationTime);
574   typedef NTSTATUS (NTAPI SpSaveCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Credentials);
575   typedef NTSTATUS (NTAPI SpGetCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Credentials);
576   typedef NTSTATUS (NTAPI SpDeleteCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Key);
577   typedef NTSTATUS (NTAPI SpInitLsaModeContextFn)(LSA_SEC_HANDLE CredentialHandle,LSA_SEC_HANDLE ContextHandle,PUNICODE_STRING TargetName,ULONG ContextRequirements,ULONG TargetDataRep,PSecBufferDesc InputBuffers,PLSA_SEC_HANDLE NewContextHandle,PSecBufferDesc OutputBuffers,PULONG ContextAttributes,PTimeStamp ExpirationTime,PBOOLEAN MappedContext,PSecBuffer ContextData);
578   typedef NTSTATUS (NTAPI SpDeleteContextFn)(LSA_SEC_HANDLE ContextHandle);
579   typedef NTSTATUS (NTAPI SpApplyControlTokenFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc ControlToken);
580   typedef NTSTATUS (NTAPI SpAcceptLsaModeContextFn)(LSA_SEC_HANDLE CredentialHandle,LSA_SEC_HANDLE ContextHandle,PSecBufferDesc InputBuffer,ULONG ContextRequirements,ULONG TargetDataRep,PLSA_SEC_HANDLE NewContextHandle,PSecBufferDesc OutputBuffer,PULONG ContextAttributes,PTimeStamp ExpirationTime,PBOOLEAN MappedContext,PSecBuffer ContextData);
581   typedef NTSTATUS (NTAPI SpGetUserInfoFn)(PLUID LogonId,ULONG Flags,PSecurityUserData *UserData);
582   typedef NTSTATUS (NTAPI SpQueryContextAttributesFn)(LSA_SEC_HANDLE ContextHandle,ULONG ContextAttribute,PVOID Buffer);
583   typedef NTSTATUS (NTAPI SpSetContextAttributesFn)(LSA_SEC_HANDLE ContextHandle,ULONG ContextAttribute,PVOID Buffer,ULONG BufferSize);
584 
585   typedef struct _SECPKG_FUNCTION_TABLE {
586     PLSA_AP_INITIALIZE_PACKAGE InitializePackage;
587     PLSA_AP_LOGON_USER LogonUser;
588     PLSA_AP_CALL_PACKAGE CallPackage;
589     PLSA_AP_LOGON_TERMINATED LogonTerminated;
590     PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted;
591     PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
592     PLSA_AP_LOGON_USER_EX LogonUserEx;
593     PLSA_AP_LOGON_USER_EX2 LogonUserEx2;
594     SpInitializeFn *Initialize;
595     SpShutdownFn *Shutdown;
596     SpGetInfoFn *GetInfo;
597     SpAcceptCredentialsFn *AcceptCredentials;
598     SpAcquireCredentialsHandleFn *AcquireCredentialsHandle;
599     SpQueryCredentialsAttributesFn *QueryCredentialsAttributes;
600     SpFreeCredentialsHandleFn *FreeCredentialsHandle;
601     SpSaveCredentialsFn *SaveCredentials;
602     SpGetCredentialsFn *GetCredentials;
603     SpDeleteCredentialsFn *DeleteCredentials;
604     SpInitLsaModeContextFn *InitLsaModeContext;
605     SpAcceptLsaModeContextFn *AcceptLsaModeContext;
606     SpDeleteContextFn *DeleteContext;
607     SpApplyControlTokenFn *ApplyControlToken;
608     SpGetUserInfoFn *GetUserInfo;
609     SpGetExtendedInformationFn *GetExtendedInformation;
610     SpQueryContextAttributesFn *QueryContextAttributes;
611     SpAddCredentialsFn *AddCredentials;
612     SpSetExtendedInformationFn *SetExtendedInformation;
613     SpSetContextAttributesFn *SetContextAttributes;
614     SpSetCredentialsAttributesFn *SetCredentialsAttributes;
615   } SECPKG_FUNCTION_TABLE,*PSECPKG_FUNCTION_TABLE;
616 
617   typedef NTSTATUS (NTAPI SpInstanceInitFn)(ULONG Version,PSECPKG_DLL_FUNCTIONS FunctionTable,PVOID *UserFunctions);
618   typedef NTSTATUS (NTAPI SpInitUserModeContextFn)(LSA_SEC_HANDLE ContextHandle,PSecBuffer PackedContext);
619   typedef NTSTATUS (NTAPI SpMakeSignatureFn)(LSA_SEC_HANDLE ContextHandle,ULONG QualityOfProtection,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber);
620   typedef NTSTATUS (NTAPI SpVerifySignatureFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber,PULONG QualityOfProtection);
621   typedef NTSTATUS (NTAPI SpSealMessageFn)(LSA_SEC_HANDLE ContextHandle,ULONG QualityOfProtection,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber);
622   typedef NTSTATUS (NTAPI SpUnsealMessageFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc MessageBuffers,ULONG MessageSequenceNumber,PULONG QualityOfProtection);
623   typedef NTSTATUS (NTAPI SpGetContextTokenFn)(LSA_SEC_HANDLE ContextHandle,PHANDLE ImpersonationToken);
624   typedef NTSTATUS (NTAPI SpExportSecurityContextFn)(LSA_SEC_HANDLE phContext,ULONG fFlags,PSecBuffer pPackedContext,PHANDLE pToken);
625   typedef NTSTATUS (NTAPI SpImportSecurityContextFn)(PSecBuffer pPackedContext,HANDLE Token,PLSA_SEC_HANDLE phContext);
626   typedef NTSTATUS (NTAPI SpCompleteAuthTokenFn)(LSA_SEC_HANDLE ContextHandle,PSecBufferDesc InputBuffer);
627   typedef NTSTATUS (NTAPI SpFormatCredentialsFn)(PSecBuffer Credentials,PSecBuffer FormattedCredentials);
628   typedef NTSTATUS (NTAPI SpMarshallSupplementalCredsFn)(ULONG CredentialSize,PUCHAR Credentials,PULONG MarshalledCredSize,PVOID *MarshalledCreds);
629 
630   typedef struct _SECPKG_USER_FUNCTION_TABLE {
631     SpInstanceInitFn *InstanceInit;
632     SpInitUserModeContextFn *InitUserModeContext;
633     SpMakeSignatureFn *MakeSignature;
634     SpVerifySignatureFn *VerifySignature;
635     SpSealMessageFn *SealMessage;
636     SpUnsealMessageFn *UnsealMessage;
637     SpGetContextTokenFn *GetContextToken;
638     SpQueryContextAttributesFn *QueryContextAttributes;
639     SpCompleteAuthTokenFn *CompleteAuthToken;
640     SpDeleteContextFn *DeleteUserModeContext;
641     SpFormatCredentialsFn *FormatCredentials;
642     SpMarshallSupplementalCredsFn *MarshallSupplementalCreds;
643     SpExportSecurityContextFn *ExportContext;
644     SpImportSecurityContextFn *ImportContext;
645   } SECPKG_USER_FUNCTION_TABLE,*PSECPKG_USER_FUNCTION_TABLE;
646 
647   typedef NTSTATUS (SEC_ENTRY *SpLsaModeInitializeFn)(ULONG LsaVersion,PULONG PackageVersion,PSECPKG_FUNCTION_TABLE *ppTables,PULONG pcTables);
648   typedef NTSTATUS (SEC_ENTRY *SpUserModeInitializeFn)(ULONG LsaVersion,PULONG PackageVersion,PSECPKG_USER_FUNCTION_TABLE *ppTables,PULONG pcTables);
649 
650 #define SECPKG_LSAMODEINIT_NAME "SpLsaModeInitialize"
651 #define SECPKG_USERMODEINIT_NAME "SpUserModeInitialize"
652 
653 #define SECPKG_INTERFACE_VERSION 0x00010000
654 #define SECPKG_INTERFACE_VERSION_2 0x00020000
655 #define SECPKG_INTERFACE_VERSION_3 0x00040000
656 
657   typedef enum _KSEC_CONTEXT_TYPE {
658     KSecPaged,KSecNonPaged
659   } KSEC_CONTEXT_TYPE;
660 
661   typedef struct _KSEC_LIST_ENTRY {
662     LIST_ENTRY List;
663     LONG RefCount;
664     ULONG Signature;
665     PVOID OwningList;
666     PVOID Reserved;
667   } KSEC_LIST_ENTRY,*PKSEC_LIST_ENTRY;
668 
669 #define KsecInitializeListEntry(Entry,SigValue) ((PKSEC_LIST_ENTRY) Entry)->List.Flink = ((PKSEC_LIST_ENTRY) Entry)->List.Blink = NULL; ((PKSEC_LIST_ENTRY) Entry)->RefCount = 1; ((PKSEC_LIST_ENTRY) Entry)->Signature = SigValue; ((PKSEC_LIST_ENTRY) Entry)->OwningList = NULL; ((PKSEC_LIST_ENTRY) Entry)->Reserved = NULL;
670 
671   typedef PVOID (SEC_ENTRY KSEC_CREATE_CONTEXT_LIST)(KSEC_CONTEXT_TYPE Type);
672   typedef VOID (SEC_ENTRY KSEC_INSERT_LIST_ENTRY)(PVOID List,PKSEC_LIST_ENTRY Entry);
673   typedef NTSTATUS (SEC_ENTRY KSEC_REFERENCE_LIST_ENTRY)(PKSEC_LIST_ENTRY Entry,ULONG Signature,BOOLEAN RemoveNoRef);
674   typedef VOID (SEC_ENTRY KSEC_DEREFERENCE_LIST_ENTRY)(PKSEC_LIST_ENTRY Entry,BOOLEAN *Delete);
675   typedef NTSTATUS (SEC_ENTRY KSEC_SERIALIZE_WINNT_AUTH_DATA)(PVOID pvAuthData,PULONG Size,PVOID *SerializedData);
676   typedef NTSTATUS (SEC_ENTRY KSEC_SERIALIZE_SCHANNEL_AUTH_DATA)(PVOID pvAuthData,PULONG Size,PVOID *SerializedData);
677 
678   KSEC_CREATE_CONTEXT_LIST KSecCreateContextList;
679   KSEC_INSERT_LIST_ENTRY KSecInsertListEntry;
680   KSEC_REFERENCE_LIST_ENTRY KSecReferenceListEntry;
681   KSEC_DEREFERENCE_LIST_ENTRY KSecDereferenceListEntry;
682   KSEC_SERIALIZE_WINNT_AUTH_DATA KSecSerializeWinntAuthData;
683   KSEC_SERIALIZE_SCHANNEL_AUTH_DATA KSecSerializeSchannelAuthData;
684 
685   typedef KSEC_CREATE_CONTEXT_LIST *PKSEC_CREATE_CONTEXT_LIST;
686   typedef KSEC_INSERT_LIST_ENTRY *PKSEC_INSERT_LIST_ENTRY;
687   typedef KSEC_REFERENCE_LIST_ENTRY *PKSEC_REFERENCE_LIST_ENTRY;
688   typedef KSEC_DEREFERENCE_LIST_ENTRY *PKSEC_DEREFERENCE_LIST_ENTRY;
689   typedef KSEC_SERIALIZE_WINNT_AUTH_DATA *PKSEC_SERIALIZE_WINNT_AUTH_DATA;
690   typedef KSEC_SERIALIZE_SCHANNEL_AUTH_DATA *PKSEC_SERIALIZE_SCHANNEL_AUTH_DATA;
691 
692   typedef struct _SECPKG_KERNEL_FUNCTIONS {
693     PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
694     PLSA_FREE_LSA_HEAP FreeHeap;
695     PKSEC_CREATE_CONTEXT_LIST CreateContextList;
696     PKSEC_INSERT_LIST_ENTRY InsertListEntry;
697     PKSEC_REFERENCE_LIST_ENTRY ReferenceListEntry;
698     PKSEC_DEREFERENCE_LIST_ENTRY DereferenceListEntry;
699     PKSEC_SERIALIZE_WINNT_AUTH_DATA SerializeWinntAuthData;
700     PKSEC_SERIALIZE_SCHANNEL_AUTH_DATA SerializeSchannelAuthData;
701   } SECPKG_KERNEL_FUNCTIONS,*PSECPKG_KERNEL_FUNCTIONS;
702 
703   typedef NTSTATUS (NTAPI KspInitPackageFn)(PSECPKG_KERNEL_FUNCTIONS FunctionTable);
704   typedef NTSTATUS (NTAPI KspDeleteContextFn)(LSA_SEC_HANDLE ContextId,PLSA_SEC_HANDLE LsaContextId);
705   typedef NTSTATUS (NTAPI KspInitContextFn)(LSA_SEC_HANDLE ContextId,PSecBuffer ContextData,PLSA_SEC_HANDLE NewContextId);
706   typedef NTSTATUS (NTAPI KspMakeSignatureFn)(LSA_SEC_HANDLE ContextId,ULONG fQOP,PSecBufferDesc Message,ULONG MessageSeqNo);
707   typedef NTSTATUS (NTAPI KspVerifySignatureFn)(LSA_SEC_HANDLE ContextId,PSecBufferDesc Message,ULONG MessageSeqNo,PULONG pfQOP);
708   typedef NTSTATUS (NTAPI KspSealMessageFn)(LSA_SEC_HANDLE ContextId,ULONG fQOP,PSecBufferDesc Message,ULONG MessageSeqNo);
709   typedef NTSTATUS (NTAPI KspUnsealMessageFn)(LSA_SEC_HANDLE ContextId,PSecBufferDesc Message,ULONG MessageSeqNo,PULONG pfQOP);
710   typedef NTSTATUS (NTAPI KspGetTokenFn)(LSA_SEC_HANDLE ContextId,PHANDLE ImpersonationToken,PACCESS_TOKEN *RawToken);
711   typedef NTSTATUS (NTAPI KspQueryAttributesFn)(LSA_SEC_HANDLE ContextId,ULONG Attribute,PVOID Buffer);
712   typedef NTSTATUS (NTAPI KspCompleteTokenFn)(LSA_SEC_HANDLE ContextId,PSecBufferDesc Token);
713   typedef NTSTATUS (NTAPI KspMapHandleFn)(LSA_SEC_HANDLE ContextId,PLSA_SEC_HANDLE LsaContextId);
714   typedef NTSTATUS (NTAPI KspSetPagingModeFn)(BOOLEAN PagingMode);
715   typedef NTSTATUS (NTAPI KspSerializeAuthDataFn)(PVOID pvAuthData,PULONG Size,PVOID *SerializedData);
716 
717   typedef struct _SECPKG_KERNEL_FUNCTION_TABLE {
718     KspInitPackageFn *Initialize;
719     KspDeleteContextFn *DeleteContext;
720     KspInitContextFn *InitContext;
721     KspMapHandleFn *MapHandle;
722     KspMakeSignatureFn *Sign;
723     KspVerifySignatureFn *Verify;
724     KspSealMessageFn *Seal;
725     KspUnsealMessageFn *Unseal;
726     KspGetTokenFn *GetToken;
727     KspQueryAttributesFn *QueryAttributes;
728     KspCompleteTokenFn *CompleteToken;
729     SpExportSecurityContextFn *ExportContext;
730     SpImportSecurityContextFn *ImportContext;
731     KspSetPagingModeFn *SetPackagePagingMode;
732     KspSerializeAuthDataFn *SerializeAuthData;
733   } SECPKG_KERNEL_FUNCTION_TABLE,*PSECPKG_KERNEL_FUNCTION_TABLE;
734 
735   SECURITY_STATUS SEC_ENTRY KSecRegisterSecurityProvider(PSECURITY_STRING ProviderName,PSECPKG_KERNEL_FUNCTION_TABLE Table);
736 
737   extern SECPKG_KERNEL_FUNCTIONS KspKernelFunctions;
738 
739 #ifdef __cplusplus
740 }
741 #endif
742 #endif
743