summaryrefslogtreecommitdiff
path: root/libphobos/libdruntime/core/sys/windows/ntsecpkg.d
blob: 56803b043c4ba9e9ac2ddc3b5fa212fe9360c532 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
/**
 * Windows API header module
 *
 * Translated from MinGW Windows headers
 *
 * Authors: Ellery Newcomer
 * License: $(LINK2 http://www.boost.org/LICENSE_1_0.txt, Boost License 1.0)
 * Source: $(DRUNTIMESRC core/sys/windows/_ntsecpkg.d)
 */
module core.sys.windows.ntsecpkg;
version (Windows):

import core.sys.windows.windef, core.sys.windows.ntsecapi, core.sys.windows.security, core.sys.windows.ntdef, core.sys.windows.sspi;
import core.sys.windows.basetyps : GUID;
import core.sys.windows.winbase;

extern(Windows):

enum :ULONG{
    ISC_REQ_DELEGATE = 1,
    ISC_REQ_MUTUAL_AUTH = 2,
    ISC_REQ_REPLAY_DETECT = 4,
    ISC_REQ_SEQUENCE_DETECT = 8,
    ISC_REQ_CONFIDENTIALITY  = 16,
    ISC_REQ_USE_SESSION_KEY = 32,
    ISC_REQ_PROMPT_FOR_CREDS = 64,
    ISC_REQ_USE_SUPPLIED_CREDS  = 128,
    ISC_REQ_ALLOCATE_MEMORY = 256,
    ISC_REQ_USE_DCE_STYLE = 512,
    ISC_REQ_DATAGRAM = 1024,
    ISC_REQ_CONNECTION = 2048,
    ISC_REQ_EXTENDED_ERROR = 16384,
    ISC_REQ_STREAM = 32768,
    ISC_REQ_INTEGRITY = 65536,
    ISC_REQ_MANUAL_CRED_VALIDATION = 524288,
    ISC_REQ_HTTP  = 268435456,
}

enum ISC_RET_EXTENDED_ERROR = 16384;

enum :ULONG{
    ASC_REQ_DELEGATE = 1,
    ASC_REQ_MUTUAL_AUTH = 2,
    ASC_REQ_REPLAY_DETECT = 4,
    ASC_REQ_SEQUENCE_DETECT = 8,
    ASC_REQ_CONFIDENTIALITY = 16,
    ASC_REQ_USE_SESSION_KEY = 32,
    ASC_REQ_ALLOCATE_MEMORY = 256,
    ASC_REQ_USE_DCE_STYLE = 512,
    ASC_REQ_DATAGRAM = 1024,
    ASC_REQ_CONNECTION = 2048,
    ASC_REQ_EXTENDED_ERROR = 32768,
    ASC_REQ_STREAM = 65536,
    ASC_REQ_INTEGRITY = 131072,
}

enum SECURITY_NATIVE_DREP  = 16;
enum SECURITY_NETWORK_DREP = 0;

enum :ULONG{
    SECPKG_STATE_ENCRYPTION_PERMITTED               = 0x01,
    SECPKG_STATE_STRONG_ENCRYPTION_PERMITTED        = 0x02,
    SECPKG_STATE_DOMAIN_CONTROLLER                  = 0x04,
    SECPKG_STATE_WORKSTATION                        = 0x08,
    SECPKG_STATE_STANDALONE                         = 0x10,
}

/* enum definitions for Secure Service Provider/Authentication Packages */
enum LSA_TOKEN_INFORMATION_TYPE {
    LsaTokenInformationNull,
    LsaTokenInformationV1
}
alias LSA_TOKEN_INFORMATION_TYPE* PLSA_TOKEN_INFORMATION_TYPE;
enum SECPKG_EXTENDED_INFORMATION_CLASS
{
    SecpkgGssInfo = 1,
    SecpkgContextThunks,
    SecpkgMutualAuthLevel,
    SecpkgMaxInfo
}
enum SECPKG_NAME_TYPE {
    SecNameSamCompatible,
    SecNameAlternateId,
    SecNameFlat,
    SecNameDN
}

/* struct definitions for SSP/AP */
struct SECPKG_PRIMARY_CRED {
    LUID LogonId;
    UNICODE_STRING DownlevelName;
    UNICODE_STRING DomainName;
    UNICODE_STRING Password;
    UNICODE_STRING OldPassword;
    PSID UserSid;
    ULONG Flags;
    UNICODE_STRING DnsDomainName;
    UNICODE_STRING Upn;
    UNICODE_STRING LogonServer;
    UNICODE_STRING Spare1;
    UNICODE_STRING Spare2;
    UNICODE_STRING Spare3;
    UNICODE_STRING Spare4;
}
alias SECPKG_PRIMARY_CRED* PSECPKG_PRIMARY_CRED;
struct SECPKG_SUPPLEMENTAL_CRED {
    UNICODE_STRING PackageName;
    ULONG CredentialSize;
    PUCHAR Credentials;
}
alias SECPKG_SUPPLEMENTAL_CRED* PSECPKG_SUPPLEMENTAL_CRED;
struct SECPKG_SUPPLEMENTAL_CRED_ARRAY {
    ULONG CredentialCount;
    SECPKG_SUPPLEMENTAL_CRED[1] Credentials;
}
alias SECPKG_SUPPLEMENTAL_CRED_ARRAY* PSECPKG_SUPPLEMENTAL_CRED_ARRAY;
struct SECPKG_PARAMETERS {
    ULONG Version;
    ULONG MachineState;
    ULONG SetupMode;
    PSID DomainSid;
    UNICODE_STRING DomainName;
    UNICODE_STRING DnsDomainName;
    GUID DomainGuid;
}
alias SECPKG_PARAMETERS* PSECPKG_PARAMETERS,PSECPKG_EVENT_DOMAIN_CHANGE;
alias SECPKG_PARAMETERS SECPKG_EVENT_DOMAIN_CHANGE;
struct SECPKG_CLIENT_INFO {
  LUID LogonId;
  ULONG ProcessID;
  ULONG ThreadID;
  BOOLEAN HasTcbPrivilege;
  BOOLEAN Impersonating;
  BOOLEAN Restricted;
}
alias SECPKG_CLIENT_INFO* PSECPKG_CLIENT_INFO;
struct SECURITY_USER_DATA {
    SECURITY_STRING UserName;
    SECURITY_STRING LogonDomainName;
    SECURITY_STRING LogonServer;
    PSID pSid;
}
alias SECURITY_USER_DATA* PSECURITY_USER_DATA,PSecurityUserData;
alias SECURITY_USER_DATA SecurityUserData;
struct SECPKG_GSS_INFO {
    ULONG EncodedIdLength;
    UCHAR[4] EncodedId;
}
alias SECPKG_GSS_INFO* PSECPKG_GSS_INFO;
struct SECPKG_CONTEXT_THUNKS {
    ULONG InfoLevelCount;
    ULONG[1] Levels;
}
alias SECPKG_CONTEXT_THUNKS* PSECPKG_CONTEXT_THUNKS;
struct SECPKG_MUTUAL_AUTH_LEVEL {
    ULONG MutualAuthLevel;
}
alias SECPKG_MUTUAL_AUTH_LEVEL* PSECPKG_MUTUAL_AUTH_LEVEL;
struct SECPKG_CALL_INFO {
    ULONG ProcessId;
    ULONG ThreadId;
    ULONG Attributes;
    ULONG CallCount;
}
alias SECPKG_CALL_INFO* PSECPKG_CALL_INFO;
struct SECPKG_EXTENDED_INFORMATION {
    SECPKG_EXTENDED_INFORMATION_CLASS Class;
    union _Info{
        SECPKG_GSS_INFO GssInfo;
        SECPKG_CONTEXT_THUNKS ContextThunks;
        SECPKG_MUTUAL_AUTH_LEVEL MutualAuthLevel;
    }
    _Info Info;
}
alias SECPKG_EXTENDED_INFORMATION* PSECPKG_EXTENDED_INFORMATION;

/* callbacks implemented by SSP/AP dlls and called by the LSA */
alias void function(ULONG_PTR, ULONG_PTR, PSecBuffer,
 PSecBuffer) PLSA_CALLBACK_FUNCTION;

/* misc typedefs used in the below prototypes */
alias PVOID* PLSA_CLIENT_REQUEST;
alias ULONG_PTR LSA_SEC_HANDLE;
alias LSA_SEC_HANDLE* PLSA_SEC_HANDLE;
alias LPTHREAD_START_ROUTINE SEC_THREAD_START;
alias PSECURITY_ATTRIBUTES SEC_ATTRS;

/* functions used by SSP/AP obtainable by dispatch tables */
alias NTSTATUS function(ULONG, PLSA_CALLBACK_FUNCTION) PLSA_REGISTER_CALLBACK;
alias NTSTATUS function(PLUID) PLSA_CREATE_LOGON_SESSION;
alias NTSTATUS function(PLUID) PLSA_DELETE_LOGON_SESSION;
alias NTSTATUS function(PLUID, ULONG, PLSA_STRING,
 PLSA_STRING) PLSA_ADD_CREDENTIAL;
alias NTSTATUS function(PLUID, ULONG, PULONG, BOOLEAN,
 PLSA_STRING, PULONG, PLSA_STRING) PLSA_GET_CREDENTIALS;
alias NTSTATUS function(PLUID, ULONG, PLSA_STRING) PLSA_DELETE_CREDENTIAL;
alias PVOID function(ULONG) PLSA_ALLOCATE_LSA_HEAP;
alias void function(PVOID) PLSA_FREE_LSA_HEAP;
alias NTSTATUS function(PLSA_CLIENT_REQUEST,
 ULONG, PVOID*) PLSA_ALLOCATE_CLIENT_BUFFER;
alias NTSTATUS function(PLSA_CLIENT_REQUEST, PVOID) PLSA_FREE_CLIENT_BUFFER;
alias NTSTATUS function(PLSA_CLIENT_REQUEST, ULONG,
 PVOID, PVOID) PLSA_COPY_TO_CLIENT_BUFFER;
alias NTSTATUS function(PLSA_CLIENT_REQUEST,
 ULONG, PVOID, PVOID) PLSA_COPY_FROM_CLIENT_BUFFER;
alias NTSTATUS function() PLSA_IMPERSONATE_CLIENT;
alias NTSTATUS function() PLSA_UNLOAD_PACKAGE;
alias NTSTATUS function(HANDLE, PHANDLE) PLSA_DUPLICATE_HANDLE;
alias NTSTATUS function(PLUID, ULONG,
 PVOID, BOOLEAN) PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS;
alias HANDLE function(SEC_ATTRS, ULONG, SEC_THREAD_START,
 PVOID, ULONG, PULONG) PLSA_CREATE_THREAD;
alias NTSTATUS function(PSECPKG_CLIENT_INFO) PLSA_GET_CLIENT_INFO;
alias HANDLE function(SEC_THREAD_START, PVOID,
 ULONG, ULONG, ULONG, ULONG, HANDLE) PLSA_REGISTER_NOTIFICATION;
alias NTSTATUS function(HANDLE) PLSA_CANCEL_NOTIFICATION;
alias NTSTATUS function(PSecBuffer, PSecBuffer) PLSA_MAP_BUFFER;
alias NTSTATUS function(PLUID, PTOKEN_SOURCE,
 SECURITY_LOGON_TYPE, SECURITY_IMPERSONATION_LEVEL, LSA_TOKEN_INFORMATION_TYPE,
 PVOID, PTOKEN_GROUPS, PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING,
 PUNICODE_STRING, PHANDLE, PNTSTATUS) PLSA_CREATE_TOKEN;
alias void function(NTSTATUS, NTSTATUS, PUNICODE_STRING,
 PUNICODE_STRING, PUNICODE_STRING, PSID, SECURITY_LOGON_TYPE,
 PTOKEN_SOURCE, PLUID) PLSA_AUDIT_LOGON;
alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
 PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE;
alias BOOLEAN function(PSECPKG_CALL_INFO) PLSA_GET_CALL_INFO;
alias NTSTATUS function(PUNICODE_STRING, PVOID, PVOID,
 ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGEEX;
alias PVOID function(ULONG, ULONG) PLSA_CREATE_SHARED_MEMORY;
alias PVOID function(PVOID, ULONG) PLSA_ALLOCATE_SHARED_MEMORY;
alias void function(PVOID, PVOID) PLSA_FREE_SHARED_MEMORY;
alias BOOLEAN function(PVOID) PLSA_DELETE_SHARED_MEMORY;
alias NTSTATUS function(PSECURITY_STRING, SECPKG_NAME_TYPE,
 PSECURITY_STRING, BOOLEAN, ULONG, PVOID*) PLSA_OPEN_SAM_USER;
alias NTSTATUS function(PVOID, PVOID *, PULONG,
 PVOID *, PULONG) PLSA_GET_USER_CREDENTIALS;
alias NTSTATUS function(PVOID, PUCHAR *, PULONG) PLSA_GET_USER_AUTH_DATA;
alias NTSTATUS function(PVOID) PLSA_CLOSE_SAM_USER;
alias NTSTATUS function(PVOID, ULONG,
 SECURITY_IMPERSONATION_LEVEL, PTOKEN_SOURCE, SECURITY_LOGON_TYPE,
 PUNICODE_STRING, PHANDLE, PLUID, PUNICODE_STRING, PNTSTATUS) PLSA_CONVERT_AUTH_DATA_TO_TOKEN;
alias NTSTATUS function(PCHAR, ULONG_PTR, ULONG_PTR,
 PSecBuffer, PSecBuffer) PLSA_CLIENT_CALLBACK;
alias NTSTATUS function(PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY) PLSA_UPDATE_PRIMARY_CREDENTIALS;
alias NTSTATUS function(PSECURITY_STRING,
 SECPKG_NAME_TYPE, PSECURITY_STRING, PUCHAR *, PULONG, PUNICODE_STRING) PLSA_GET_AUTH_DATA_FOR_USER;
alias NTSTATUS function(ULONG, BOOLEAN,
 PUNICODE_STRING, PUNICODE_STRING, ULONG, PUNICODE_STRING, PUNICODE_STRING,
 PULONG) PLSA_CRACK_SINGLE_NAME;
alias NTSTATUS function(ULONG, BOOLEAN,
 PUNICODE_STRING, PUNICODE_STRING, PUNICODE_STRING, NTSTATUS) PLSA_AUDIT_ACCOUNT_LOGON;
alias NTSTATUS function(PUNICODE_STRING, PVOID,
 PVOID, ULONG, PVOID*, PULONG, PNTSTATUS) PLSA_CALL_PACKAGE_PASSTHROUGH;

/* Dispatch tables of functions used by SSP/AP */
struct SECPKG_DLL_FUNCTIONS {
    PLSA_ALLOCATE_LSA_HEAP AllocateHeap;
    PLSA_FREE_LSA_HEAP FreeHeap;
    PLSA_REGISTER_CALLBACK RegisterCallback;
}
alias SECPKG_DLL_FUNCTIONS* PSECPKG_DLL_FUNCTIONS;
struct LSA_DISPATCH_TABLE {
    PLSA_CREATE_LOGON_SESSION CreateLogonSession;
    PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
    PLSA_ADD_CREDENTIAL AddCredential;
    PLSA_GET_CREDENTIALS GetCredentials;
    PLSA_DELETE_CREDENTIAL DeleteCredential;
    PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
    PLSA_FREE_LSA_HEAP FreeLsaHeap;
    PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
    PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
    PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
    PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
}
alias LSA_DISPATCH_TABLE* PLSA_DISPATCH_TABLE;
struct LSA_SECPKG_FUNCTION_TABLE {
    PLSA_CREATE_LOGON_SESSION CreateLogonSession;
    PLSA_DELETE_LOGON_SESSION DeleteLogonSession;
    PLSA_ADD_CREDENTIAL AddCredential;
    PLSA_GET_CREDENTIALS GetCredentials;
    PLSA_DELETE_CREDENTIAL DeleteCredential;
    PLSA_ALLOCATE_LSA_HEAP AllocateLsaHeap;
    PLSA_FREE_LSA_HEAP FreeLsaHeap;
    PLSA_ALLOCATE_CLIENT_BUFFER AllocateClientBuffer;
    PLSA_FREE_CLIENT_BUFFER FreeClientBuffer;
    PLSA_COPY_TO_CLIENT_BUFFER CopyToClientBuffer;
    PLSA_COPY_FROM_CLIENT_BUFFER CopyFromClientBuffer;
    PLSA_IMPERSONATE_CLIENT ImpersonateClient;
    PLSA_UNLOAD_PACKAGE UnloadPackage;
    PLSA_DUPLICATE_HANDLE DuplicateHandle;
    PLSA_SAVE_SUPPLEMENTAL_CREDENTIALS SaveSupplementalCredentials;
    PLSA_CREATE_THREAD CreateThread;
    PLSA_GET_CLIENT_INFO GetClientInfo;
    PLSA_REGISTER_NOTIFICATION RegisterNotification;
    PLSA_CANCEL_NOTIFICATION CancelNotification;
    PLSA_MAP_BUFFER MapBuffer;
    PLSA_CREATE_TOKEN CreateToken;
    PLSA_AUDIT_LOGON AuditLogon;
    PLSA_CALL_PACKAGE CallPackage;
    PLSA_FREE_LSA_HEAP FreeReturnBuffer;
    PLSA_GET_CALL_INFO GetCallInfo;
    PLSA_CALL_PACKAGEEX CallPackageEx;
    PLSA_CREATE_SHARED_MEMORY CreateSharedMemory;
    PLSA_ALLOCATE_SHARED_MEMORY AllocateSharedMemory;
    PLSA_FREE_SHARED_MEMORY FreeSharedMemory;
    PLSA_DELETE_SHARED_MEMORY DeleteSharedMemory;
    PLSA_OPEN_SAM_USER OpenSamUser;
    PLSA_GET_USER_CREDENTIALS GetUserCredentials;
    PLSA_GET_USER_AUTH_DATA GetUserAuthData;
    PLSA_CLOSE_SAM_USER CloseSamUser;
    PLSA_CONVERT_AUTH_DATA_TO_TOKEN ConvertAuthDataToToken;
    PLSA_CLIENT_CALLBACK ClientCallback;
    PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials;
    PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser;
    PLSA_CRACK_SINGLE_NAME CrackSingleName;
    PLSA_AUDIT_ACCOUNT_LOGON AuditAccountLogon;
    PLSA_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
}
alias LSA_SECPKG_FUNCTION_TABLE* PLSA_SECPKG_FUNCTION_TABLE;

/* functions implemented by SSP/AP obtainable by dispatch tables */
alias NTSTATUS function(ULONG, PLSA_DISPATCH_TABLE,
 PLSA_STRING, PLSA_STRING, PLSA_STRING *) PLSA_AP_INITIALIZE_PACKAGE;
alias NTSTATUS function(LPWSTR, LPWSTR, LPWSTR, LPWSTR,
 DWORD, DWORD, PHANDLE) PLSA_AP_LOGON_USER;
alias NTSTATUS function(PUNICODE_STRING, PVOID, ULONG,
 PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE;
alias void function(PLUID) PLSA_AP_LOGON_TERMINATED;
alias NTSTATUS function(PLSA_CLIENT_REQUEST,
 PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_UNTRUSTED;
alias NTSTATUS function(PUNICODE_STRING,
 PVOID, PVOID, ULONG, PVOID *, PULONG, PNTSTATUS) PLSA_AP_CALL_PACKAGE_PASSTHROUGH;
alias NTSTATUS function(PLSA_CLIENT_REQUEST,
 SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
 PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
 PUNICODE_STRING *) PLSA_AP_LOGON_USER_EX;
alias NTSTATUS function(PLSA_CLIENT_REQUEST,
 SECURITY_LOGON_TYPE, PVOID, PVOID, ULONG, PVOID *, PULONG, PLUID, PNTSTATUS,
 PLSA_TOKEN_INFORMATION_TYPE, PVOID *, PUNICODE_STRING *, PUNICODE_STRING *,
 PUNICODE_STRING *, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED_ARRAY *) PLSA_AP_LOGON_USER_EX2;
alias NTSTATUS function(ULONG_PTR, PSECPKG_PARAMETERS,
 PLSA_SECPKG_FUNCTION_TABLE) SpInitializeFn;
alias NTSTATUS function() SpShutDownFn;
alias NTSTATUS function(PSecPkgInfoW) SpGetInfoFn;
alias NTSTATUS function(SECURITY_LOGON_TYPE,
 PUNICODE_STRING, PSECPKG_PRIMARY_CRED, PSECPKG_SUPPLEMENTAL_CRED) SpAcceptCredentialsFn;
alias NTSTATUS function(PUNICODE_STRING, ULONG,
 PLUID, PVOID, PVOID, PVOID, PLSA_SEC_HANDLE, PTimeStamp) SpAcquireCredentialsHandleFn;
alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryCredentialsAttributesFn;
alias NTSTATUS function(LSA_SEC_HANDLE) SpFreeCredentialsHandleFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpSaveCredentialsFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpGetCredentialsFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpDeleteCredentialsFn;
alias NTSTATUS function(LSA_SEC_HANDLE, LSA_SEC_HANDLE,
 PUNICODE_STRING, ULONG, ULONG, PSecBufferDesc, PLSA_SEC_HANDLE, PSecBufferDesc,
 PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpInitLsaModeContextFn;
alias NTSTATUS function(LSA_SEC_HANDLE,
 LSA_SEC_HANDLE, PSecBufferDesc, ULONG, ULONG, PLSA_SEC_HANDLE, PSecBufferDesc,
 PULONG, PTimeStamp, PBOOLEAN, PSecBuffer) SpAcceptLsaModeContextFn;
alias NTSTATUS function(LSA_SEC_HANDLE) SpDeleteContextFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpApplyControlTokenFn;
alias NTSTATUS function(PLUID, ULONG, PSecurityUserData *) SpGetUserInfoFn;
alias NTSTATUS function(SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION *) SpGetExtendedInformationFn;
alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PVOID) SpQueryContextAttributesFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PUNICODE_STRING,
 PUNICODE_STRING, ULONG, PVOID, PVOID, PVOID, PTimeStamp) SpAddCredentialsFn;
alias NTSTATUS function(
 SECPKG_EXTENDED_INFORMATION_CLASS, PSECPKG_EXTENDED_INFORMATION) SpSetExtendedInformationFn;
alias NTSTATUS function(ULONG, PSECPKG_DLL_FUNCTIONS,
 PVOID *) SpInstanceInitFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBuffer) SpInitUserModeContextFn;
alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
 PSecBufferDesc, ULONG) SpMakeSignatureFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
 ULONG, PULONG) SpVerifySignatureFn;
alias NTSTATUS function(LSA_SEC_HANDLE, ULONG, PSecBufferDesc,
 ULONG) SpSealMessageFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc,
 ULONG, PULONG) SpUnsealMessageFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PHANDLE) SpGetContextTokenFn;
alias NTSTATUS function(LSA_SEC_HANDLE, PSecBufferDesc) SpCompleteAuthTokenFn;
alias NTSTATUS function(PSecBuffer, PSecBuffer) SpFormatCredentialsFn;
alias NTSTATUS function(ULONG, PUCHAR, PULONG,
 PVOID *) SpMarshallSupplementalCredsFn;
alias NTSTATUS function(LSA_SEC_HANDLE, ULONG,
 PSecBuffer, PHANDLE) SpExportSecurityContextFn;
alias NTSTATUS function(PSecBuffer, HANDLE,
 PLSA_SEC_HANDLE) SpImportSecurityContextFn;

/* Dispatch tables of functions implemented by SSP/AP */
struct SECPKG_FUNCTION_TABLE {
    PLSA_AP_INITIALIZE_PACKAGE InitializePackage;
    PLSA_AP_LOGON_USER LogonUser;
    PLSA_AP_CALL_PACKAGE CallPackage;
    PLSA_AP_LOGON_TERMINATED LogonTerminated;
    PLSA_AP_CALL_PACKAGE_UNTRUSTED CallPackageUntrusted;
    PLSA_AP_CALL_PACKAGE_PASSTHROUGH CallPackagePassthrough;
    PLSA_AP_LOGON_USER_EX LogonUserEx;
    PLSA_AP_LOGON_USER_EX2 LogonUserEx2;
    SpInitializeFn *Initialize;
    SpShutDownFn *Shutdown;
    SpGetInfoFn *GetInfo;
    SpAcceptCredentialsFn *AcceptCredentials;
    SpAcquireCredentialsHandleFn *AcquireCredentialsHandle;
    SpQueryCredentialsAttributesFn *QueryCredentialsAttributes;
    SpFreeCredentialsHandleFn *FreeCredentialsHandle;
    SpSaveCredentialsFn *SaveCredentials;
    SpGetCredentialsFn *GetCredentials;
    SpDeleteCredentialsFn *DeleteCredentials;
    SpInitLsaModeContextFn *InitLsaModeContext;
    SpAcceptLsaModeContextFn *AcceptLsaModeContext;
    SpDeleteContextFn *DeleteContext;
    SpApplyControlTokenFn *ApplyControlToken;
    SpGetUserInfoFn *GetUserInfo;
    SpGetExtendedInformationFn *GetExtendedInformation;
    SpQueryContextAttributesFn *QueryContextAttributes;
    SpAddCredentialsFn *AddCredentials;
    SpSetExtendedInformationFn *SetExtendedInformation;
}
alias SECPKG_FUNCTION_TABLE* PSECPKG_FUNCTION_TABLE;

struct SECPKG_USER_FUNCTION_TABLE {
    SpInstanceInitFn *InstanceInit;
    SpInitUserModeContextFn *InitUserModeContext;
    SpMakeSignatureFn *MakeSignature;
    SpVerifySignatureFn *VerifySignature;
    SpSealMessageFn *SealMessage;
    SpUnsealMessageFn *UnsealMessage;
    SpGetContextTokenFn *GetContextToken;
    SpQueryContextAttributesFn *QueryContextAttributes;
    SpCompleteAuthTokenFn *CompleteAuthToken;
    SpDeleteContextFn *DeleteUserModeContext;
    SpFormatCredentialsFn *FormatCredentials;
    SpMarshallSupplementalCredsFn *MarshallSupplementalCreds;
    SpExportSecurityContextFn *ExportContext;
    SpImportSecurityContextFn *ImportContext;
}
alias SECPKG_USER_FUNCTION_TABLE* PSECPKG_USER_FUNCTION_TABLE;

/* Entry points to SSP/AP */
alias NTSTATUS function(ULONG, PULONG,
 PSECPKG_FUNCTION_TABLE *, PULONG) SpLsaModeInitializeFn;
alias NTSTATUS function(ULONG, PULONG,
 PSECPKG_USER_FUNCTION_TABLE *, PULONG) SpUserModeInitializeFn;