| /** |
| * This file has no copyright assigned and is placed in the Public Domain. |
| * This file is part of the mingw-w64 runtime package. |
| * No warranty is given; refer to the file DISCLAIMER.PD within this package. |
| */ |
| |
| #ifdef DEFINE_GUID |
| |
| #if !defined(INITGUID) || !defined(Audit_System_SecurityStateChange_defined) |
| DEFINE_GUID(Audit_System_SecurityStateChange, 0x0cce9210, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_System_SecurityStateChange_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_System_SecuritySubsystemExtension_defined) |
| DEFINE_GUID(Audit_System_SecuritySubsystemExtension, 0x0cce9211, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_System_SecuritySubsystemExtension_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_System_Integrity_defined) |
| DEFINE_GUID(Audit_System_Integrity, 0x0cce9212, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_System_Integrity_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_System_IPSecDriverEvents_defined) |
| DEFINE_GUID(Audit_System_IPSecDriverEvents, 0x0cce9213, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_System_IPSecDriverEvents_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_System_Others_defined) |
| DEFINE_GUID(Audit_System_Others, 0x0cce9214, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_System_Others_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_Logon_defined) |
| DEFINE_GUID(Audit_Logon_Logon, 0x0cce9215, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_Logon_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_Logoff_defined) |
| DEFINE_GUID(Audit_Logon_Logoff, 0x0cce9216, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_Logoff_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_AccountLockout_defined) |
| DEFINE_GUID(Audit_Logon_AccountLockout, 0x0cce9217, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_AccountLockout_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_IPSecMainMode_defined) |
| DEFINE_GUID(Audit_Logon_IPSecMainMode, 0x0cce9218, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_IPSecMainMode_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_IPSecQuickMode_defined) |
| DEFINE_GUID(Audit_Logon_IPSecQuickMode, 0x0cce9219, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_IPSecQuickMode_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_IPSecUserMode_defined) |
| DEFINE_GUID(Audit_Logon_IPSecUserMode, 0x0cce921a, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_IPSecUserMode_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_SpecialLogon_defined) |
| DEFINE_GUID(Audit_Logon_SpecialLogon, 0x0cce921b, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_SpecialLogon_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_Others_defined) |
| DEFINE_GUID(Audit_Logon_Others, 0x0cce921c, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_Others_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_FileSystem_defined) |
| DEFINE_GUID(Audit_ObjectAccess_FileSystem, 0x0cce921d, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_FileSystem_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_Registry_defined) |
| DEFINE_GUID(Audit_ObjectAccess_Registry, 0x0cce921e, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_Registry_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_Kernel_defined) |
| DEFINE_GUID(Audit_ObjectAccess_Kernel, 0x0cce921f, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_Kernel_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_Sam_defined) |
| DEFINE_GUID(Audit_ObjectAccess_Sam, 0x0cce9220, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_Sam_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_CertificationServices_defined) |
| DEFINE_GUID(Audit_ObjectAccess_CertificationServices, 0x0cce9221, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_CertificationServices_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_ApplicationGenerated_defined) |
| DEFINE_GUID(Audit_ObjectAccess_ApplicationGenerated, 0x0cce9222, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_ApplicationGenerated_defined |
| #endif |
| #endif |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_Handle_defined) |
| DEFINE_GUID(Audit_ObjectAccess_Handle, 0x0cce9223, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_Handle_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_Share_defined) |
| DEFINE_GUID(Audit_ObjectAccess_Share, 0x0cce9224, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_Share_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_FirewallPacketDrops_defined) |
| DEFINE_GUID(Audit_ObjectAccess_FirewallPacketDrops, 0x0cce9225, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_FirewallPacketDrops_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_FirewallConnection_defined) |
| DEFINE_GUID(Audit_ObjectAccess_FirewallConnection, 0x0cce9226, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_FirewallConnection_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_Other_defined) |
| DEFINE_GUID(Audit_ObjectAccess_Other, 0x0cce9227, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_Other_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PrivilegeUse_Sensitive_defined) |
| DEFINE_GUID(Audit_PrivilegeUse_Sensitive, 0x0cce9228, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PrivilegeUse_Sensitive_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PrivilegeUse_NonSensitive_defined) |
| DEFINE_GUID(Audit_PrivilegeUse_NonSensitive, 0x0cce9229, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PrivilegeUse_NonSensitive_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PrivilegeUse_Others_defined) |
| DEFINE_GUID(Audit_PrivilegeUse_Others, 0x0cce922a, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PrivilegeUse_Others_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DetailedTracking_ProcessCreation_defined) |
| DEFINE_GUID(Audit_DetailedTracking_ProcessCreation, 0x0cce922b, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DetailedTracking_ProcessCreation_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DetailedTracking_ProcessTermination_defined) |
| DEFINE_GUID(Audit_DetailedTracking_ProcessTermination, 0x0cce922c, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DetailedTracking_ProcessTermination_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DetailedTracking_DpapiActivity_defined) |
| DEFINE_GUID(Audit_DetailedTracking_DpapiActivity, 0x0cce922d, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DetailedTracking_DpapiActivity_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DetailedTracking_RpcCall_defined) |
| DEFINE_GUID(Audit_DetailedTracking_RpcCall, 0x0cce922e, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DetailedTracking_RpcCall_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PolicyChange_AuditPolicy_defined) |
| DEFINE_GUID(Audit_PolicyChange_AuditPolicy, 0x0cce922f, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PolicyChange_AuditPolicy_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PolicyChange_AuthenticationPolicy_defined) |
| DEFINE_GUID(Audit_PolicyChange_AuthenticationPolicy, 0x0cce9230, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PolicyChange_AuthenticationPolicy_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PolicyChange_AuthorizationPolicy_defined) |
| DEFINE_GUID(Audit_PolicyChange_AuthorizationPolicy, 0x0cce9231, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PolicyChange_AuthorizationPolicy_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PolicyChange_MpsscvRulePolicy_defined) |
| DEFINE_GUID(Audit_PolicyChange_MpsscvRulePolicy, 0x0cce9232, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PolicyChange_MpsscvRulePolicy_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PolicyChange_WfpIPSecPolicy_defined) |
| DEFINE_GUID(Audit_PolicyChange_WfpIPSecPolicy, 0x0cce9233, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PolicyChange_WfpIPSecPolicy_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PolicyChange_Others_defined) |
| DEFINE_GUID(Audit_PolicyChange_Others, 0x0cce9234, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PolicyChange_Others_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountManagement_UserAccount_defined) |
| DEFINE_GUID(Audit_AccountManagement_UserAccount, 0x0cce9235, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountManagement_UserAccount_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountManagement_ComputerAccount_defined) |
| DEFINE_GUID(Audit_AccountManagement_ComputerAccount, 0x0cce9236, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountManagement_ComputerAccount_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountManagement_SecurityGroup_defined) |
| DEFINE_GUID(Audit_AccountManagement_SecurityGroup, 0x0cce9237, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountManagement_SecurityGroup_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountManagement_DistributionGroup_defined) |
| DEFINE_GUID(Audit_AccountManagement_DistributionGroup, 0x0cce9238, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountManagement_DistributionGroup_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountManagement_ApplicationGroup_defined) |
| DEFINE_GUID(Audit_AccountManagement_ApplicationGroup, 0x0cce9239, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountManagement_ApplicationGroup_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountManagement_Others_defined) |
| DEFINE_GUID(Audit_AccountManagement_Others, 0x0cce923a, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountManagement_Others_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DSAccess_DSAccess_defined) |
| DEFINE_GUID(Audit_DSAccess_DSAccess, 0x0cce923b, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DSAccess_DSAccess_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DsAccess_AdAuditChanges_defined) |
| DEFINE_GUID(Audit_DsAccess_AdAuditChanges, 0x0cce923c, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DsAccess_AdAuditChanges_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Ds_Replication_defined) |
| DEFINE_GUID(Audit_Ds_Replication, 0x0cce923d, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Ds_Replication_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Ds_DetailedReplication_defined) |
| DEFINE_GUID(Audit_Ds_DetailedReplication, 0x0cce923e, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Ds_DetailedReplication_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountLogon_CredentialValidation_defined) |
| DEFINE_GUID(Audit_AccountLogon_CredentialValidation, 0x0cce923f, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountLogon_CredentialValidation_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountLogon_Kerberos_defined) |
| DEFINE_GUID(Audit_AccountLogon_Kerberos, 0x0cce9240, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountLogon_Kerberos_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountLogon_Others_defined) |
| DEFINE_GUID(Audit_AccountLogon_Others, 0x0cce9241, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountLogon_Others_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountLogon_KerbCredentialValidation_defined) |
| DEFINE_GUID(Audit_AccountLogon_KerbCredentialValidation, 0x0cce9242, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountLogon_KerbCredentialValidation_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_NPS_defined) |
| DEFINE_GUID(Audit_Logon_NPS, 0x0cce9243, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_NPS_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_DetailedFileShare_defined) |
| DEFINE_GUID(Audit_ObjectAccess_DetailedFileShare, 0x0cce9244, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_DetailedFileShare_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_RemovableStorage_defined) |
| DEFINE_GUID(Audit_ObjectAccess_RemovableStorage, 0x0cce9245, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_RemovableStorage_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_CbacStaging_defined) |
| DEFINE_GUID(Audit_ObjectAccess_CbacStaging, 0x0cce9246, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_CbacStaging_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_Claims_defined) |
| DEFINE_GUID(Audit_Logon_Claims, 0x0cce9247, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_Claims_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DetailedTracking_PnpActivity_defined) |
| DEFINE_GUID(Audit_DetailedTracking_PnpActivity, 0x0cce9248, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DetailedTracking_PnpActivity_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_Groups_defined) |
| DEFINE_GUID(Audit_Logon_Groups, 0x0cce9249, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_Groups_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DetailedTracking_TokenRightAdjusted_defined) |
| DEFINE_GUID(Audit_DetailedTracking_TokenRightAdjusted, 0x0cce924a, 0x69ae, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DetailedTracking_TokenRightAdjusted_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_System_defined) |
| DEFINE_GUID(Audit_System, 0x69979848, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_System_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_Logon_defined) |
| DEFINE_GUID(Audit_Logon, 0x69979849, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_Logon_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_ObjectAccess_defined) |
| DEFINE_GUID(Audit_ObjectAccess, 0x6997984a, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_ObjectAccess_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PrivilegeUse_defined) |
| DEFINE_GUID(Audit_PrivilegeUse, 0x6997984b, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PrivilegeUse_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DetailedTracking_defined) |
| DEFINE_GUID(Audit_DetailedTracking, 0x6997984c, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DetailedTracking_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_PolicyChange_defined) |
| DEFINE_GUID(Audit_PolicyChange, 0x6997984d, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_PolicyChange_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountManagement_defined) |
| DEFINE_GUID(Audit_AccountManagement, 0x6997984e, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountManagement_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_DirectoryServiceAccess_defined) |
| DEFINE_GUID(Audit_DirectoryServiceAccess, 0x6997984f, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_DirectoryServiceAccess_defined |
| #endif |
| #endif |
| |
| #if !defined(INITGUID) || !defined(Audit_AccountLogon_defined) |
| DEFINE_GUID(Audit_AccountLogon, 0x69979850, 0x797a, 0x11d9, 0xbe, 0xd3, 0x50, 0x50, 0x54, 0x50, 0x30, 0x30); |
| #ifdef INITGUID |
| #define Audit_AccountLogon_defined |
| #endif |
| #endif |
| #endif |
| |
| #ifndef _NTSECAPI_ |
| #define _NTSECAPI_ |
| |
| #ifdef __cplusplus |
| extern "C" { |
| #endif |
| |
| #if !defined (_NTDEF_) && !defined (_NTSTATUS_PSDK) |
| #define _NTSTATUS_PSDK |
| typedef LONG NTSTATUS,*PNTSTATUS; |
| #endif |
| |
| #ifndef _NTLSA_IFS_ |
| typedef ULONG LSA_OPERATIONAL_MODE,*PLSA_OPERATIONAL_MODE; |
| #endif |
| |
| #define LSA_MODE_PASSWORD_PROTECTED (__MSABI_LONG(0x00000001)) |
| #define LSA_MODE_INDIVIDUAL_ACCOUNTS (__MSABI_LONG(0x00000002)) |
| #define LSA_MODE_MANDATORY_ACCESS (__MSABI_LONG(0x00000004)) |
| #define LSA_MODE_LOG_FULL (__MSABI_LONG(0x00000008)) |
| |
| #ifndef _NTLSA_IFS_ |
| typedef enum _SECURITY_LOGON_TYPE { |
| UndefinedLogonType = 0, |
| Interactive = 2, |
| Network, |
| Batch, |
| Service, |
| Proxy, |
| Unlock, |
| NetworkCleartext, |
| NewCredentials |
| #if _WIN32_WINNT >= 0x0501 |
| ,RemoteInteractive |
| ,CachedInteractive |
| #endif |
| #if _WIN32_WINNT >= 0x0502 |
| ,CachedRemoteInteractive |
| ,CachedUnlock |
| #endif |
| } SECURITY_LOGON_TYPE, *PSECURITY_LOGON_TYPE; |
| |
| #endif |
| |
| #ifndef _NTLSA_IFS_ |
| |
| #ifndef _NTLSA_AUDIT_ |
| #define _NTLSA_AUDIT_ |
| |
| typedef enum _SE_ADT_PARAMETER_TYPE { |
| SeAdtParmTypeNone = 0, |
| SeAdtParmTypeString, |
| SeAdtParmTypeFileSpec, |
| SeAdtParmTypeUlong, |
| SeAdtParmTypeSid, |
| SeAdtParmTypeLogonId, |
| SeAdtParmTypeNoLogonId, |
| SeAdtParmTypeAccessMask, |
| SeAdtParmTypePrivs, |
| SeAdtParmTypeObjectTypes, |
| SeAdtParmTypeHexUlong, |
| SeAdtParmTypePtr, |
| SeAdtParmTypeTime, |
| SeAdtParmTypeGuid, |
| SeAdtParmTypeLuid, |
| SeAdtParmTypeHexInt64, |
| SeAdtParmTypeStringList, |
| SeAdtParmTypeSidList, |
| SeAdtParmTypeDuration, |
| SeAdtParmTypeUserAccountControl, |
| SeAdtParmTypeNoUac, |
| SeAdtParmTypeMessage, |
| SeAdtParmTypeDateTime, |
| SeAdtParmTypeSockAddr, |
| SeAdtParmTypeSD, |
| SeAdtParmTypeLogonHours, |
| SeAdtParmTypeLogonIdNoSid, |
| SeAdtParmTypeUlongNoConv, |
| SeAdtParmTypeSockAddrNoPort, |
| SeAdtParmTypeAccessReason, |
| SeAdtParmTypeStagingReason, |
| SeAdtParmTypeResourceAttribute, |
| SeAdtParmTypeClaims, |
| SeAdtParmTypeLogonIdAsSid, |
| SeAdtParmTypeMultiSzString, |
| SeAdtParmTypeLogonIdEx |
| } SE_ADT_PARAMETER_TYPE, *PSE_ADT_PARAMETER_TYPE; |
| |
| #include <guiddef.h> |
| |
| #define SE_ADT_OBJECT_ONLY 0x1 |
| |
| typedef struct _SE_ADT_OBJECT_TYPE { |
| GUID ObjectType; |
| USHORT Flags; |
| USHORT Level; |
| ACCESS_MASK AccessMask; |
| } SE_ADT_OBJECT_TYPE,*PSE_ADT_OBJECT_TYPE; |
| |
| typedef struct _SE_ADT_PARAMETER_ARRAY_ENTRY { |
| SE_ADT_PARAMETER_TYPE Type; |
| ULONG Length; |
| ULONG_PTR Data[2]; |
| PVOID Address; |
| } SE_ADT_PARAMETER_ARRAY_ENTRY,*PSE_ADT_PARAMETER_ARRAY_ENTRY; |
| |
| typedef struct _SE_ADT_ACCESS_REASON { |
| ACCESS_MASK AccessMask; |
| ULONG AccessReasons[32]; |
| ULONG ObjectTypeIndex; |
| ULONG AccessGranted; |
| PSECURITY_DESCRIPTOR SecurityDescriptor; |
| } SE_ADT_ACCESS_REASON, *PSE_ADT_ACCESS_REASON; |
| |
| typedef struct _SE_ADT_CLAIMS { |
| ULONG Length; |
| PCLAIMS_BLOB Claims; |
| } SE_ADT_CLAIMS, *PSE_ADT_CLAIMS; |
| |
| #define SE_MAX_AUDIT_PARAMETERS 32 |
| #define SE_MAX_GENERIC_AUDIT_PARAMETERS 28 |
| |
| typedef struct _SE_ADT_PARAMETER_ARRAY { |
| ULONG CategoryId; |
| ULONG AuditId; |
| ULONG ParameterCount; |
| ULONG Length; |
| USHORT Type; |
| ULONG Flags; |
| SE_ADT_PARAMETER_ARRAY_ENTRY Parameters[SE_MAX_AUDIT_PARAMETERS]; |
| } SE_ADT_PARAMETER_ARRAY,*PSE_ADT_PARAMETER_ARRAY; |
| |
| typedef struct _SE_ADT_PARAMETER_ARRAY_EX { |
| ULONG CategoryId; |
| ULONG AuditId; |
| ULONG Version; |
| ULONG ParameterCount; |
| ULONG Length; |
| USHORT FlatSubCategoryId; |
| USHORT Type; |
| ULONG Flags; |
| SE_ADT_PARAMETER_ARRAY_ENTRY Parameters[SE_MAX_AUDIT_PARAMETERS]; |
| } SE_ADT_PARAMETER_ARRAY_EX, *PSE_ADT_PARAMETER_ARRAY_EX; |
| |
| #define SE_ADT_PARAMETERS_SELF_RELATIVE 0x00000001 |
| #define SE_ADT_PARAMETERS_SEND_TO_LSA 0x00000002 |
| #define SE_ADT_PARAMETER_EXTENSIBLE_AUDIT 0x00000004 |
| #define SE_ADT_PARAMETER_GENERIC_AUDIT 0x00000008 |
| #define SE_ADT_PARAMETER_WRITE_SYNCHRONOUS 0x00000010 |
| |
| #define LSAP_SE_ADT_PARAMETER_ARRAY_TRUE_SIZE(AuditParameters) (sizeof(SE_ADT_PARAMETER_ARRAY) - sizeof(SE_ADT_PARAMETER_ARRAY_ENTRY) * (SE_MAX_AUDIT_PARAMETERS - AuditParameters->ParameterCount)) |
| |
| #endif /* _NTLSA_AUDIT_ */ |
| #endif /* _NTLSA_IFS_ */ |
| |
| typedef enum _POLICY_AUDIT_EVENT_TYPE { |
| AuditCategorySystem = 0,AuditCategoryLogon,AuditCategoryObjectAccess,AuditCategoryPrivilegeUse,AuditCategoryDetailedTracking, |
| AuditCategoryPolicyChange,AuditCategoryAccountManagement,AuditCategoryDirectoryServiceAccess,AuditCategoryAccountLogon |
| } POLICY_AUDIT_EVENT_TYPE,*PPOLICY_AUDIT_EVENT_TYPE; |
| |
| #define POLICY_AUDIT_EVENT_UNCHANGED (__MSABI_LONG(0x00000000)) |
| #define POLICY_AUDIT_EVENT_SUCCESS (__MSABI_LONG(0x00000001)) |
| #define POLICY_AUDIT_EVENT_FAILURE (__MSABI_LONG(0x00000002)) |
| #define POLICY_AUDIT_EVENT_NONE (__MSABI_LONG(0x00000004)) |
| #define POLICY_AUDIT_EVENT_MASK (POLICY_AUDIT_EVENT_SUCCESS | POLICY_AUDIT_EVENT_FAILURE | POLICY_AUDIT_EVENT_UNCHANGED | POLICY_AUDIT_EVENT_NONE) |
| |
| #ifdef _NTDEF_ |
| typedef UNICODE_STRING LSA_UNICODE_STRING,*PLSA_UNICODE_STRING; |
| typedef STRING LSA_STRING,*PLSA_STRING; |
| typedef OBJECT_ATTRIBUTES LSA_OBJECT_ATTRIBUTES,*PLSA_OBJECT_ATTRIBUTES; |
| #else |
| |
| #ifndef _NO_W32_PSEUDO_MODIFIERS |
| #ifndef IN |
| #define IN |
| #endif |
| #ifndef OUT |
| #define OUT |
| #endif |
| #ifndef OPTIONAL |
| #define OPTIONAL |
| #endif |
| #endif |
| |
| typedef struct _LSA_UNICODE_STRING { |
| USHORT Length; |
| USHORT MaximumLength; |
| PWSTR Buffer; |
| } LSA_UNICODE_STRING,*PLSA_UNICODE_STRING; |
| |
| typedef struct _LSA_STRING { |
| USHORT Length; |
| USHORT MaximumLength; |
| PCHAR Buffer; |
| } LSA_STRING,*PLSA_STRING; |
| |
| typedef struct _LSA_OBJECT_ATTRIBUTES { |
| ULONG Length; |
| HANDLE RootDirectory; |
| PLSA_UNICODE_STRING ObjectName; |
| ULONG Attributes; |
| PVOID SecurityDescriptor; |
| PVOID SecurityQualityOfService; |
| } LSA_OBJECT_ATTRIBUTES,*PLSA_OBJECT_ATTRIBUTES; |
| #endif |
| |
| #define LSA_SUCCESS(Error) ((LONG)(Error) >= 0) |
| |
| #ifndef _NTLSA_IFS_ |
| NTSTATUS NTAPI LsaRegisterLogonProcess(PLSA_STRING LogonProcessName,PHANDLE LsaHandle,PLSA_OPERATIONAL_MODE SecurityMode); |
| NTSTATUS NTAPI LsaLogonUser(HANDLE LsaHandle,PLSA_STRING OriginName,SECURITY_LOGON_TYPE LogonType,ULONG AuthenticationPackage,PVOID AuthenticationInformation,ULONG AuthenticationInformationLength,PTOKEN_GROUPS LocalGroups,PTOKEN_SOURCE SourceContext,PVOID *ProfileBuffer,PULONG ProfileBufferLength,PLUID LogonId,PHANDLE Token,PQUOTA_LIMITS Quotas,PNTSTATUS SubStatus); |
| NTSTATUS NTAPI LsaLookupAuthenticationPackage(HANDLE LsaHandle,PLSA_STRING PackageName,PULONG AuthenticationPackage); |
| NTSTATUS NTAPI LsaFreeReturnBuffer (PVOID Buffer); |
| NTSTATUS NTAPI LsaCallAuthenticationPackage(HANDLE LsaHandle,ULONG AuthenticationPackage,PVOID ProtocolSubmitBuffer,ULONG SubmitBufferLength,PVOID *ProtocolReturnBuffer,PULONG ReturnBufferLength,PNTSTATUS ProtocolStatus); |
| NTSTATUS NTAPI LsaDeregisterLogonProcess(HANDLE LsaHandle); |
| NTSTATUS NTAPI LsaConnectUntrusted(PHANDLE LsaHandle); |
| NTSTATUS NTAPI LsaInsertProtectedProcessAddress(PVOID BufferAddress,ULONG BufferSize); |
| NTSTATUS NTAPI LsaRemoveProtectedProcessAddress(PVOID BufferAddress,ULONG BufferSize); |
| #endif |
| |
| #define POLICY_VIEW_LOCAL_INFORMATION __MSABI_LONG(0x00000001) |
| #define POLICY_VIEW_AUDIT_INFORMATION __MSABI_LONG(0x00000002) |
| #define POLICY_GET_PRIVATE_INFORMATION __MSABI_LONG(0x00000004) |
| #define POLICY_TRUST_ADMIN __MSABI_LONG(0x00000008) |
| #define POLICY_CREATE_ACCOUNT __MSABI_LONG(0x00000010) |
| #define POLICY_CREATE_SECRET __MSABI_LONG(0x00000020) |
| #define POLICY_CREATE_PRIVILEGE __MSABI_LONG(0x00000040) |
| #define POLICY_SET_DEFAULT_QUOTA_LIMITS __MSABI_LONG(0x00000080) |
| #define POLICY_SET_AUDIT_REQUIREMENTS __MSABI_LONG(0x00000100) |
| #define POLICY_AUDIT_LOG_ADMIN __MSABI_LONG(0x00000200) |
| #define POLICY_SERVER_ADMIN __MSABI_LONG(0x00000400) |
| #define POLICY_LOOKUP_NAMES __MSABI_LONG(0x00000800) |
| #define POLICY_NOTIFICATION __MSABI_LONG(0x00001000) |
| |
| #define POLICY_ALL_ACCESS (STANDARD_RIGHTS_REQUIRED | POLICY_VIEW_LOCAL_INFORMATION | POLICY_VIEW_AUDIT_INFORMATION | POLICY_GET_PRIVATE_INFORMATION | POLICY_TRUST_ADMIN | POLICY_CREATE_ACCOUNT | POLICY_CREATE_SECRET | POLICY_CREATE_PRIVILEGE | POLICY_SET_DEFAULT_QUOTA_LIMITS | POLICY_SET_AUDIT_REQUIREMENTS | POLICY_AUDIT_LOG_ADMIN | POLICY_SERVER_ADMIN | POLICY_LOOKUP_NAMES) |
| #define POLICY_READ (STANDARD_RIGHTS_READ | POLICY_VIEW_AUDIT_INFORMATION | POLICY_GET_PRIVATE_INFORMATION) |
| #define POLICY_WRITE (STANDARD_RIGHTS_WRITE | POLICY_TRUST_ADMIN | POLICY_CREATE_ACCOUNT | POLICY_CREATE_SECRET | POLICY_CREATE_PRIVILEGE | POLICY_SET_DEFAULT_QUOTA_LIMITS | POLICY_SET_AUDIT_REQUIREMENTS | POLICY_AUDIT_LOG_ADMIN | POLICY_SERVER_ADMIN) |
| #define POLICY_EXECUTE (STANDARD_RIGHTS_EXECUTE | POLICY_VIEW_LOCAL_INFORMATION | POLICY_LOOKUP_NAMES) |
| |
| typedef struct _LSA_TRUST_INFORMATION { |
| LSA_UNICODE_STRING Name; |
| PSID Sid; |
| } LSA_TRUST_INFORMATION,*PLSA_TRUST_INFORMATION; |
| |
| typedef struct _LSA_REFERENCED_DOMAIN_LIST { |
| ULONG Entries; |
| PLSA_TRUST_INFORMATION Domains; |
| } LSA_REFERENCED_DOMAIN_LIST,*PLSA_REFERENCED_DOMAIN_LIST; |
| |
| typedef struct _LSA_TRANSLATED_SID { |
| SID_NAME_USE Use; |
| ULONG RelativeId; |
| LONG DomainIndex; |
| } LSA_TRANSLATED_SID,*PLSA_TRANSLATED_SID; |
| |
| typedef struct _LSA_TRANSLATED_SID2 { |
| SID_NAME_USE Use; |
| PSID Sid; |
| LONG DomainIndex; |
| ULONG Flags; |
| } LSA_TRANSLATED_SID2,*PLSA_TRANSLATED_SID2; |
| |
| typedef struct _LSA_TRANSLATED_NAME { |
| SID_NAME_USE Use; |
| LSA_UNICODE_STRING Name; |
| LONG DomainIndex; |
| } LSA_TRANSLATED_NAME,*PLSA_TRANSLATED_NAME; |
| |
| typedef enum _POLICY_LSA_SERVER_ROLE { |
| PolicyServerRoleBackup = 2,PolicyServerRolePrimary |
| } POLICY_LSA_SERVER_ROLE,*PPOLICY_LSA_SERVER_ROLE; |
| |
| typedef ULONG POLICY_AUDIT_EVENT_OPTIONS,*PPOLICY_AUDIT_EVENT_OPTIONS; |
| |
| typedef enum _POLICY_INFORMATION_CLASS { |
| PolicyAuditLogInformation = 1, |
| PolicyAuditEventsInformation, |
| PolicyPrimaryDomainInformation, |
| PolicyPdAccountInformation, |
| PolicyAccountDomainInformation, |
| PolicyLsaServerRoleInformation, |
| PolicyReplicaSourceInformation, |
| PolicyDefaultQuotaInformation, |
| PolicyModificationInformation, |
| PolicyAuditFullSetInformation, |
| PolicyAuditFullQueryInformation, |
| PolicyDnsDomainInformation, |
| PolicyDnsDomainInformationInt, |
| PolicyLocalAccountDomainInformation, |
| PolicyMachineAccountInformation, |
| PolicyMachineAccountInformation2, |
| PolicyLastEntry |
| } POLICY_INFORMATION_CLASS, *PPOLICY_INFORMATION_CLASS; |
| |
| typedef struct _POLICY_AUDIT_LOG_INFO { |
| ULONG AuditLogPercentFull; |
| ULONG MaximumLogSize; |
| LARGE_INTEGER AuditRetentionPeriod; |
| BOOLEAN AuditLogFullShutdownInProgress; |
| LARGE_INTEGER TimeToShutdown; |
| ULONG NextAuditRecordId; |
| } POLICY_AUDIT_LOG_INFO,*PPOLICY_AUDIT_LOG_INFO; |
| |
| typedef struct _POLICY_AUDIT_EVENTS_INFO { |
| BOOLEAN AuditingMode; |
| PPOLICY_AUDIT_EVENT_OPTIONS EventAuditingOptions; |
| ULONG MaximumAuditEventCount; |
| } POLICY_AUDIT_EVENTS_INFO,*PPOLICY_AUDIT_EVENTS_INFO; |
| |
| typedef struct _POLICY_AUDIT_SUBCATEGORIES_INFO { |
| ULONG MaximumSubCategoryCount; |
| PPOLICY_AUDIT_EVENT_OPTIONS EventAuditingOptions; |
| } POLICY_AUDIT_SUBCATEGORIES_INFO, *PPOLICY_AUDIT_SUBCATEGORIES_INFO; |
| |
| typedef struct _POLICY_AUDIT_CATEGORIES_INFO { |
| ULONG MaximumCategoryCount; |
| PPOLICY_AUDIT_SUBCATEGORIES_INFO SubCategoriesInfo; |
| } POLICY_AUDIT_CATEGORIES_INFO, *PPOLICY_AUDIT_CATEGORIES_INFO; |
| |
| typedef struct _POLICY_ACCOUNT_DOMAIN_INFO { |
| LSA_UNICODE_STRING DomainName; |
| PSID DomainSid; |
| } POLICY_ACCOUNT_DOMAIN_INFO,*PPOLICY_ACCOUNT_DOMAIN_INFO; |
| |
| typedef struct _POLICY_PRIMARY_DOMAIN_INFO { |
| LSA_UNICODE_STRING Name; |
| PSID Sid; |
| } POLICY_PRIMARY_DOMAIN_INFO,*PPOLICY_PRIMARY_DOMAIN_INFO; |
| |
| typedef struct _POLICY_DNS_DOMAIN_INFO { |
| LSA_UNICODE_STRING Name; |
| LSA_UNICODE_STRING DnsDomainName; |
| LSA_UNICODE_STRING DnsForestName; |
| GUID DomainGuid; |
| PSID Sid; |
| } POLICY_DNS_DOMAIN_INFO,*PPOLICY_DNS_DOMAIN_INFO; |
| |
| typedef struct _POLICY_PD_ACCOUNT_INFO { |
| LSA_UNICODE_STRING Name; |
| } POLICY_PD_ACCOUNT_INFO,*PPOLICY_PD_ACCOUNT_INFO; |
| |
| typedef struct _POLICY_LSA_SERVER_ROLE_INFO { |
| POLICY_LSA_SERVER_ROLE LsaServerRole; |
| } POLICY_LSA_SERVER_ROLE_INFO,*PPOLICY_LSA_SERVER_ROLE_INFO; |
| |
| typedef struct _POLICY_REPLICA_SOURCE_INFO { |
| LSA_UNICODE_STRING ReplicaSource; |
| LSA_UNICODE_STRING ReplicaAccountName; |
| } POLICY_REPLICA_SOURCE_INFO,*PPOLICY_REPLICA_SOURCE_INFO; |
| |
| typedef struct _POLICY_DEFAULT_QUOTA_INFO { |
| QUOTA_LIMITS QuotaLimits; |
| } POLICY_DEFAULT_QUOTA_INFO,*PPOLICY_DEFAULT_QUOTA_INFO; |
| |
| typedef struct _POLICY_MODIFICATION_INFO { |
| LARGE_INTEGER ModifiedId; |
| LARGE_INTEGER DatabaseCreationTime; |
| } POLICY_MODIFICATION_INFO,*PPOLICY_MODIFICATION_INFO; |
| |
| typedef struct _POLICY_AUDIT_FULL_SET_INFO { |
| BOOLEAN ShutDownOnFull; |
| } POLICY_AUDIT_FULL_SET_INFO,*PPOLICY_AUDIT_FULL_SET_INFO; |
| |
| typedef struct _POLICY_AUDIT_FULL_QUERY_INFO { |
| BOOLEAN ShutDownOnFull; |
| BOOLEAN LogIsFull; |
| } POLICY_AUDIT_FULL_QUERY_INFO,*PPOLICY_AUDIT_FULL_QUERY_INFO; |
| |
| typedef enum _POLICY_DOMAIN_INFORMATION_CLASS { |
| #if _WIN32_WINNT <= 0x0500 |
| PolicyDomainQualityOfServiceInformation = 1, |
| #endif |
| PolicyDomainEfsInformation = 2 |
| ,PolicyDomainKerberosTicketInformation |
| } POLICY_DOMAIN_INFORMATION_CLASS, *PPOLICY_DOMAIN_INFORMATION_CLASS; |
| |
| typedef struct _POLICY_DOMAIN_EFS_INFO { |
| ULONG InfoLength; |
| PUCHAR EfsBlob; |
| } POLICY_DOMAIN_EFS_INFO,*PPOLICY_DOMAIN_EFS_INFO; |
| |
| #define POLICY_KERBEROS_VALIDATE_CLIENT 0x00000080 |
| |
| typedef struct _POLICY_DOMAIN_KERBEROS_TICKET_INFO { |
| ULONG AuthenticationOptions; |
| LARGE_INTEGER MaxServiceTicketAge; |
| LARGE_INTEGER MaxTicketAge; |
| LARGE_INTEGER MaxRenewAge; |
| LARGE_INTEGER MaxClockSkew; |
| LARGE_INTEGER Reserved; |
| } POLICY_DOMAIN_KERBEROS_TICKET_INFO,*PPOLICY_DOMAIN_KERBEROS_TICKET_INFO; |
| |
| typedef struct _POLICY_MACHINE_ACCT_INFO { |
| ULONG Rid; |
| PSID Sid; |
| } POLICY_MACHINE_ACCT_INFO, *PPOLICY_MACHINE_ACCT_INFO; |
| |
| typedef struct _POLICY_MACHINE_ACCT_INFO2 { |
| ULONG Rid; |
| PSID Sid; |
| GUID ObjectGuid; |
| } POLICY_MACHINE_ACCT_INFO2, *PPOLICY_MACHINE_ACCT_INFO2; |
| |
| typedef enum _POLICY_NOTIFICATION_INFORMATION_CLASS { |
| PolicyNotifyAuditEventsInformation = 1, |
| PolicyNotifyAccountDomainInformation, |
| PolicyNotifyServerRoleInformation, |
| PolicyNotifyDnsDomainInformation, |
| PolicyNotifyDomainEfsInformation, |
| PolicyNotifyDomainKerberosTicketInformation, |
| PolicyNotifyMachineAccountPasswordInformation, |
| PolicyNotifyGlobalSaclInformation, |
| PolicyNotifyMax |
| } POLICY_NOTIFICATION_INFORMATION_CLASS, *PPOLICY_NOTIFICATION_INFORMATION_CLASS; |
| |
| typedef PVOID LSA_HANDLE,*PLSA_HANDLE; |
| |
| #define LSAD_AES_CRYPT_SHA512_HASH_SIZE 64 |
| #define LSAD_AES_KEY_SIZE 16 |
| #define LSAD_AES_SALT_SIZE 16 |
| #define LSAD_AES_BLOCK_SIZE 16 |
| |
| typedef enum _TRUSTED_INFORMATION_CLASS { |
| TrustedDomainNameInformation = 1, |
| TrustedControllersInformation, |
| TrustedPosixOffsetInformation, |
| TrustedPasswordInformation, |
| TrustedDomainInformationBasic, |
| TrustedDomainInformationEx, |
| TrustedDomainAuthInformation, |
| TrustedDomainFullInformation, |
| TrustedDomainAuthInformationInternal, |
| TrustedDomainFullInformationInternal, |
| TrustedDomainInformationEx2Internal, |
| TrustedDomainFullInformation2Internal, |
| TrustedDomainSupportedEncryptionTypes, |
| TrustedDomainAuthInformationInternalAes, |
| TrustedDomainFullInformationInternalAes |
| } TRUSTED_INFORMATION_CLASS,*PTRUSTED_INFORMATION_CLASS; |
| |
| typedef struct _TRUSTED_DOMAIN_NAME_INFO { |
| LSA_UNICODE_STRING Name; |
| } TRUSTED_DOMAIN_NAME_INFO,*PTRUSTED_DOMAIN_NAME_INFO; |
| |
| typedef struct _TRUSTED_CONTROLLERS_INFO { |
| ULONG Entries; |
| PLSA_UNICODE_STRING Names; |
| } TRUSTED_CONTROLLERS_INFO,*PTRUSTED_CONTROLLERS_INFO; |
| |
| typedef struct _TRUSTED_POSIX_OFFSET_INFO { |
| ULONG Offset; |
| } TRUSTED_POSIX_OFFSET_INFO,*PTRUSTED_POSIX_OFFSET_INFO; |
| |
| typedef struct _TRUSTED_PASSWORD_INFO { |
| LSA_UNICODE_STRING Password; |
| LSA_UNICODE_STRING OldPassword; |
| } TRUSTED_PASSWORD_INFO,*PTRUSTED_PASSWORD_INFO; |
| |
| typedef LSA_TRUST_INFORMATION TRUSTED_DOMAIN_INFORMATION_BASIC; |
| typedef PLSA_TRUST_INFORMATION PTRUSTED_DOMAIN_INFORMATION_BASIC; |
| |
| #define TRUST_DIRECTION_DISABLED 0x00000000 |
| #define TRUST_DIRECTION_INBOUND 0x00000001 |
| #define TRUST_DIRECTION_OUTBOUND 0x00000002 |
| #define TRUST_DIRECTION_BIDIRECTIONAL (TRUST_DIRECTION_INBOUND | TRUST_DIRECTION_OUTBOUND) |
| |
| #define TRUST_TYPE_DOWNLEVEL 0x00000001 |
| #define TRUST_TYPE_UPLEVEL 0x00000002 |
| #define TRUST_TYPE_MIT 0x00000003 |
| #define TRUST_TYPE_AAD 0x00000005 |
| |
| #define TRUST_ATTRIBUTE_NON_TRANSITIVE 0x00000001 |
| #define TRUST_ATTRIBUTE_UPLEVEL_ONLY 0x00000002 |
| #define TRUST_ATTRIBUTE_QUARANTINED_DOMAIN 0x00000004 |
| #define TRUST_ATTRIBUTE_FOREST_TRANSITIVE 0x00000008 |
| #define TRUST_ATTRIBUTE_CROSS_ORGANIZATION 0x00000010 |
| #define TRUST_ATTRIBUTE_WITHIN_FOREST 0x00000020 |
| #define TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL 0x00000040 |
| |
| #if _WIN32_WINNT >= 0x0600 |
| #define TRUST_ATTRIBUTE_TRUST_USES_RC4_ENCRYPTION 0x00000080 |
| #define TRUST_ATTRIBUTE_TRUST_USES_AES_KEYS 0x00000100 |
| #endif |
| |
| #if _WIN32_WINNT >= 0x0602 |
| #define TRUST_ATTRIBUTE_CROSS_ORGANIZATION_NO_TGT_DELEGATION 0x00000200 |
| #define TRUST_ATTRIBUTE_PIM_TRUST 0x00000400 |
| #endif |
| |
| #if _WIN32_WINNT >= 0x0603 |
| #define TRUST_ATTRIBUTE_CROSS_ORGANIZATION_ENABLE_TGT_DELEGATION 0x00000800 |
| #endif |
| |
| #define TRUST_ATTRIBUTES_VALID 0xFF03FFFF |
| #define TRUST_ATTRIBUTES_USER 0xFF000000 |
| |
| typedef struct _TRUSTED_DOMAIN_INFORMATION_EX { |
| LSA_UNICODE_STRING Name; |
| LSA_UNICODE_STRING FlatName; |
| PSID Sid; |
| ULONG TrustDirection; |
| ULONG TrustType; |
| ULONG TrustAttributes; |
| } TRUSTED_DOMAIN_INFORMATION_EX,*PTRUSTED_DOMAIN_INFORMATION_EX; |
| |
| typedef struct _TRUSTED_DOMAIN_INFORMATION_EX2 { |
| LSA_UNICODE_STRING Name; |
| LSA_UNICODE_STRING FlatName; |
| PSID Sid; |
| ULONG TrustDirection; |
| ULONG TrustType; |
| ULONG TrustAttributes; |
| ULONG ForestTrustLength; |
| PUCHAR ForestTrustInfo; |
| } TRUSTED_DOMAIN_INFORMATION_EX2,*PTRUSTED_DOMAIN_INFORMATION_EX2; |
| |
| #define TRUST_AUTH_TYPE_NONE 0 |
| #define TRUST_AUTH_TYPE_NT4OWF 1 |
| #define TRUST_AUTH_TYPE_CLEAR 2 |
| #define TRUST_AUTH_TYPE_VERSION 3 |
| |
| typedef struct _LSA_AUTH_INFORMATION { |
| LARGE_INTEGER LastUpdateTime; |
| ULONG AuthType; |
| ULONG AuthInfoLength; |
| PUCHAR AuthInfo; |
| } LSA_AUTH_INFORMATION,*PLSA_AUTH_INFORMATION; |
| |
| typedef struct _TRUSTED_DOMAIN_AUTH_INFORMATION { |
| ULONG IncomingAuthInfos; |
| PLSA_AUTH_INFORMATION IncomingAuthenticationInformation; |
| PLSA_AUTH_INFORMATION IncomingPreviousAuthenticationInformation; |
| ULONG OutgoingAuthInfos; |
| PLSA_AUTH_INFORMATION OutgoingAuthenticationInformation; |
| PLSA_AUTH_INFORMATION OutgoingPreviousAuthenticationInformation; |
| } TRUSTED_DOMAIN_AUTH_INFORMATION,*PTRUSTED_DOMAIN_AUTH_INFORMATION; |
| |
| typedef struct _TRUSTED_DOMAIN_FULL_INFORMATION { |
| TRUSTED_DOMAIN_INFORMATION_EX Information; |
| TRUSTED_POSIX_OFFSET_INFO PosixOffset; |
| TRUSTED_DOMAIN_AUTH_INFORMATION AuthInformation; |
| } TRUSTED_DOMAIN_FULL_INFORMATION,*PTRUSTED_DOMAIN_FULL_INFORMATION; |
| |
| typedef struct _TRUSTED_DOMAIN_FULL_INFORMATION2 { |
| TRUSTED_DOMAIN_INFORMATION_EX2 Information; |
| TRUSTED_POSIX_OFFSET_INFO PosixOffset; |
| TRUSTED_DOMAIN_AUTH_INFORMATION AuthInformation; |
| } TRUSTED_DOMAIN_FULL_INFORMATION2,*PTRUSTED_DOMAIN_FULL_INFORMATION2; |
| |
| typedef struct _TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES { |
| ULONG SupportedEncryptionTypes; |
| } TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES,*PTRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES; |
| |
| typedef enum { |
| ForestTrustTopLevelName, |
| ForestTrustTopLevelNameEx, |
| ForestTrustDomainInfo, |
| ForestTrustBinaryInfo, |
| ForestTrustScannerInfo, |
| ForestTrustRecordTypeLast = ForestTrustScannerInfo |
| } LSA_FOREST_TRUST_RECORD_TYPE; |
| |
| #define LSA_FTRECORD_DISABLED_REASONS (__MSABI_LONG(0x0000FFFF)) |
| |
| #define LSA_TLN_DISABLED_NEW (__MSABI_LONG(0x00000001)) |
| #define LSA_TLN_DISABLED_ADMIN (__MSABI_LONG(0x00000002)) |
| #define LSA_TLN_DISABLED_CONFLICT (__MSABI_LONG(0x00000004)) |
| |
| #define LSA_SID_DISABLED_ADMIN (__MSABI_LONG(0x00000001)) |
| #define LSA_SID_DISABLED_CONFLICT (__MSABI_LONG(0x00000002)) |
| #define LSA_NB_DISABLED_ADMIN (__MSABI_LONG(0x00000004)) |
| #define LSA_NB_DISABLED_CONFLICT (__MSABI_LONG(0x00000008)) |
| |
| #define LSA_SCANNER_INFO_DISABLE_AUTH_TARGET_VALIDATION (__MSABI_LONG(0x00000001)) |
| #define LSA_SCANNER_INFO_ADMIN_ALL_FLAGS (LSA_SCANNER_INFO_DISABLE_AUTH_TARGET_VALIDATION) |
| |
| typedef struct _LSA_FOREST_TRUST_DOMAIN_INFO { |
| PSID Sid; |
| LSA_UNICODE_STRING DnsName; |
| LSA_UNICODE_STRING NetbiosName; |
| } LSA_FOREST_TRUST_DOMAIN_INFO,*PLSA_FOREST_TRUST_DOMAIN_INFO; |
| |
| typedef struct _LSA_FOREST_TRUST_SCANNER_INFO { |
| #ifdef __WIDL__ |
| [unique] PISID DomainSid; |
| #else |
| PSID DomainSid; |
| #endif |
| LSA_UNICODE_STRING DnsName; |
| LSA_UNICODE_STRING NetbiosName; |
| } LSA_FOREST_TRUST_SCANNER_INFO,*PLSA_FOREST_TRUST_SCANNER_INFO; |
| |
| #define MAX_FOREST_TRUST_BINARY_DATA_SIZE (128*1024) |
| |
| typedef struct _LSA_FOREST_TRUST_BINARY_DATA { |
| ULONG Length; |
| PUCHAR Buffer; |
| } LSA_FOREST_TRUST_BINARY_DATA,*PLSA_FOREST_TRUST_BINARY_DATA; |
| |
| typedef struct _LSA_FOREST_TRUST_RECORD { |
| ULONG Flags; |
| LSA_FOREST_TRUST_RECORD_TYPE ForestTrustType; |
| LARGE_INTEGER Time; |
| union { |
| LSA_UNICODE_STRING TopLevelName; |
| LSA_FOREST_TRUST_DOMAIN_INFO DomainInfo; |
| LSA_FOREST_TRUST_BINARY_DATA Data; |
| } ForestTrustData; |
| } LSA_FOREST_TRUST_RECORD,*PLSA_FOREST_TRUST_RECORD; |
| |
| typedef struct _LSA_FOREST_TRUST_RECORD2 { |
| ULONG Flags; |
| LSA_FOREST_TRUST_RECORD_TYPE ForestTrustType; |
| LARGE_INTEGER Time; |
| #ifdef __WIDL__ |
| [switch_type(LSA_FOREST_TRUST_RECORD_TYPE), switch_is(ForestTrustType)] |
| #endif |
| union { |
| #ifdef __WIDL__ |
| [case(ForestTrustTopLevelName, ForestTrustTopLevelNameEx)] LSA_UNICODE_STRING TopLevelName; |
| [case(ForestTrustDomainInfo)] LSA_FOREST_TRUST_DOMAIN_INFO DomainInfo; |
| [case(ForestTrustBinaryInfo)] LSA_FOREST_TRUST_BINARY_DATA BinaryData; |
| [case(ForestTrustScannerInfo)] LSA_FOREST_TRUST_SCANNER_INFO ScannerInfo; |
| #else |
| LSA_UNICODE_STRING TopLevelName; |
| LSA_FOREST_TRUST_DOMAIN_INFO DomainInfo; |
| LSA_FOREST_TRUST_BINARY_DATA BinaryData; |
| LSA_FOREST_TRUST_SCANNER_INFO ScannerInfo; |
| #endif |
| } ForestTrustData; |
| } LSA_FOREST_TRUST_RECORD2,*PLSA_FOREST_TRUST_RECORD2; |
| |
| #define MAX_RECORDS_IN_FOREST_TRUST_INFO 4000 |
| |
| typedef struct _LSA_FOREST_TRUST_INFORMATION { |
| ULONG RecordCount; |
| PLSA_FOREST_TRUST_RECORD *Entries; |
| } LSA_FOREST_TRUST_INFORMATION,*PLSA_FOREST_TRUST_INFORMATION; |
| |
| typedef struct _LSA_FOREST_TRUST_INFORMATION2 { |
| #ifdef __WIDL__ |
| [range(0, MAX_RECORDS_IN_FOREST_TRUST_INFO)] ULONG RecordCount; |
| [size_is(RecordCount)] PLSA_FOREST_TRUST_RECORD2 *Entries; |
| #else |
| ULONG RecordCount; |
| PLSA_FOREST_TRUST_RECORD2 *Entries; |
| #endif |
| } LSA_FOREST_TRUST_INFORMATION2,*PLSA_FOREST_TRUST_INFORMATION2; |
| |
| typedef enum { |
| CollisionTdo,CollisionXref,CollisionOther |
| } LSA_FOREST_TRUST_COLLISION_RECORD_TYPE; |
| |
| typedef struct _LSA_FOREST_TRUST_COLLISION_RECORD { |
| ULONG Index; |
| LSA_FOREST_TRUST_COLLISION_RECORD_TYPE Type; |
| ULONG Flags; |
| LSA_UNICODE_STRING Name; |
| } LSA_FOREST_TRUST_COLLISION_RECORD,*PLSA_FOREST_TRUST_COLLISION_RECORD; |
| |
| typedef struct _LSA_FOREST_TRUST_COLLISION_INFORMATION { |
| ULONG RecordCount; |
| PLSA_FOREST_TRUST_COLLISION_RECORD *Entries; |
| } LSA_FOREST_TRUST_COLLISION_INFORMATION,*PLSA_FOREST_TRUST_COLLISION_INFORMATION; |
| |
| typedef ULONG LSA_ENUMERATION_HANDLE,*PLSA_ENUMERATION_HANDLE; |
| |
| typedef struct _LSA_ENUMERATION_INFORMATION { |
| PSID Sid; |
| } LSA_ENUMERATION_INFORMATION,*PLSA_ENUMERATION_INFORMATION; |
| |
| NTSTATUS NTAPI LsaFreeMemory(PVOID Buffer); |
| NTSTATUS NTAPI LsaClose(LSA_HANDLE ObjectHandle); |
| |
| #if (_WIN32_WINNT >= 0x0600) |
| typedef struct _LSA_LAST_INTER_LOGON_INFO { |
| LARGE_INTEGER LastSuccessfulLogon; |
| LARGE_INTEGER LastFailedLogon; |
| ULONG FailedAttemptCountSinceLastSuccessfulLogon; |
| } LSA_LAST_INTER_LOGON_INFO,*PLSA_LAST_INTER_LOGON_INFO; |
| #endif |
| |
| typedef struct _SECURITY_LOGON_SESSION_DATA { |
| ULONG Size; |
| LUID LogonId; |
| LSA_UNICODE_STRING UserName; |
| LSA_UNICODE_STRING LogonDomain; |
| LSA_UNICODE_STRING AuthenticationPackage; |
| ULONG LogonType; |
| ULONG Session; |
| PSID Sid; |
| LARGE_INTEGER LogonTime; |
| LSA_UNICODE_STRING LogonServer; |
| LSA_UNICODE_STRING DnsDomainName; |
| LSA_UNICODE_STRING Upn; |
| #if (_WIN32_WINNT >= 0x0600) |
| ULONG UserFlags; |
| LSA_LAST_INTER_LOGON_INFO LastLogonInfo; |
| LSA_UNICODE_STRING LogonScript; |
| LSA_UNICODE_STRING ProfilePath; |
| LSA_UNICODE_STRING HomeDirectory; |
| LSA_UNICODE_STRING HomeDirectoryDrive; |
| LARGE_INTEGER LogoffTime; |
| LARGE_INTEGER KickOffTime; |
| LARGE_INTEGER PasswordLastSet; |
| LARGE_INTEGER PasswordCanChange; |
| LARGE_INTEGER PasswordMustChange; |
| #endif |
| } SECURITY_LOGON_SESSION_DATA,*PSECURITY_LOGON_SESSION_DATA; |
| |
| NTSTATUS NTAPI LsaEnumerateLogonSessions(PULONG LogonSessionCount,PLUID *LogonSessionList); |
| NTSTATUS NTAPI LsaGetLogonSessionData(PLUID LogonId,PSECURITY_LOGON_SESSION_DATA *ppLogonSessionData); |
| NTSTATUS NTAPI LsaOpenPolicy(PLSA_UNICODE_STRING SystemName,PLSA_OBJECT_ATTRIBUTES ObjectAttributes,ACCESS_MASK DesiredAccess,PLSA_HANDLE PolicyHandle); |
| NTSTATUS NTAPI LsaQueryInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_INFORMATION_CLASS InformationClass,PVOID *Buffer); |
| NTSTATUS NTAPI LsaSetInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_INFORMATION_CLASS InformationClass,PVOID Buffer); |
| NTSTATUS NTAPI LsaQueryDomainInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_DOMAIN_INFORMATION_CLASS InformationClass,PVOID *Buffer); |
| NTSTATUS NTAPI LsaSetDomainInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_DOMAIN_INFORMATION_CLASS InformationClass,PVOID Buffer); |
| NTSTATUS NTAPI LsaRegisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,HANDLE NotificationEventHandle); |
| NTSTATUS NTAPI LsaUnregisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,HANDLE NotificationEventHandle); |
| NTSTATUS NTAPI LsaEnumerateTrustedDomains(LSA_HANDLE PolicyHandle,PLSA_ENUMERATION_HANDLE EnumerationContext,PVOID *Buffer,ULONG PreferedMaximumLength,PULONG CountReturned); |
| NTSTATUS NTAPI LsaLookupNames(LSA_HANDLE PolicyHandle,ULONG Count,PLSA_UNICODE_STRING Names,PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,PLSA_TRANSLATED_SID *Sids); |
| NTSTATUS NTAPI LsaLookupNames2(LSA_HANDLE PolicyHandle,ULONG Flags,ULONG Count,PLSA_UNICODE_STRING Names,PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,PLSA_TRANSLATED_SID2 *Sids); |
| NTSTATUS NTAPI LsaLookupSids(LSA_HANDLE PolicyHandle,ULONG Count,PSID *Sids,PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,PLSA_TRANSLATED_NAME *Names); |
| NTSTATUS NTAPI LsaLookupSids2(LSA_HANDLE PolicyHandle,ULONG LookupOptions,ULONG Count,PSID *Sids,PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,PLSA_TRANSLATED_NAME *Names); |
| NTSTATUS NTAPI LsaSetCAPs(PLSA_UNICODE_STRING CAPDNs,ULONG CAPDNCount,ULONG Flags); |
| NTSTATUS NTAPI LsaGetAppliedCAPIDs(PLSA_UNICODE_STRING SystemName,PSID **CAPIDs,PULONG CAPIDCount); |
| |
| #define MAXIMUM_CAPES_PER_CAP 0x7f |
| |
| #define CENTRAL_ACCESS_POLICY_OWNER_RIGHTS_PRESENT_FLAG 0x00000001 |
| #define CENTRAL_ACCESS_POLICY_STAGED_OWNER_RIGHTS_PRESENT_FLAG 0x00000100 |
| #define CENTRAL_ACCESS_POLICY_STAGED_FLAG 0x00010000 |
| #define STAGING_FLAG(Effective) ((Effective & 0xf) << 8) |
| |
| #define CENTRAL_ACCESS_POLICY_VALID_FLAG_MASK (CENTRAL_ACCESS_POLICY_OWNER_RIGHTS_PRESENT_FLAG | \ |
| CENTRAL_ACCESS_POLICY_STAGED_OWNER_RIGHTS_PRESENT_FLAG | \ |
| CENTRAL_ACCESS_POLICY_STAGED_FLAG) |
| |
| #define LSASETCAPS_RELOAD_FLAG 0x00000001 |
| #define LSASETCAPS_VALID_FLAG_MASK LSASETCAPS_RELOAD_FLAG |
| |
| typedef struct _CENTRAL_ACCESS_POLICY_ENTRY { |
| LSA_UNICODE_STRING Name; |
| LSA_UNICODE_STRING Description; |
| LSA_UNICODE_STRING ChangeId; |
| ULONG LengthAppliesTo; |
| PUCHAR AppliesTo; |
| ULONG LengthSD; |
| PSECURITY_DESCRIPTOR SD; |
| ULONG LengthStagedSD; |
| PSECURITY_DESCRIPTOR StagedSD; |
| ULONG Flags; |
| } CENTRAL_ACCESS_POLICY_ENTRY, *PCENTRAL_ACCESS_POLICY_ENTRY; |
| |
| typedef const CENTRAL_ACCESS_POLICY_ENTRY *PCCENTRAL_ACCESS_POLICY_ENTRY; |
| |
| typedef struct _CENTRAL_ACCESS_POLICY { |
| PSID CAPID; |
| LSA_UNICODE_STRING Name; |
| LSA_UNICODE_STRING Description; |
| LSA_UNICODE_STRING ChangeId; |
| ULONG Flags; |
| ULONG CAPECount; |
| PCENTRAL_ACCESS_POLICY_ENTRY *CAPEs; |
| } CENTRAL_ACCESS_POLICY, *PCENTRAL_ACCESS_POLICY; |
| |
| typedef const CENTRAL_ACCESS_POLICY *PCCENTRAL_ACCESS_POLICY; |
| |
| NTSTATUS NTAPI LsaQueryCAPs(PSID *CAPIDs,ULONG CAPIDCount,PCENTRAL_ACCESS_POLICY *CAPs,PULONG CAPCount); |
| |
| #define SE_INTERACTIVE_LOGON_NAME TEXT("SeInteractiveLogonRight") |
| #define SE_NETWORK_LOGON_NAME TEXT("SeNetworkLogonRight") |
| #define SE_BATCH_LOGON_NAME TEXT("SeBatchLogonRight") |
| #define SE_SERVICE_LOGON_NAME TEXT("SeServiceLogonRight") |
| #define SE_DENY_INTERACTIVE_LOGON_NAME TEXT("SeDenyInteractiveLogonRight") |
| #define SE_DENY_NETWORK_LOGON_NAME TEXT("SeDenyNetworkLogonRight") |
| #define SE_DENY_BATCH_LOGON_NAME TEXT("SeDenyBatchLogonRight") |
| #define SE_DENY_SERVICE_LOGON_NAME TEXT("SeDenyServiceLogonRight") |
| #define SE_REMOTE_INTERACTIVE_LOGON_NAME TEXT("SeRemoteInteractiveLogonRight") |
| #define SE_DENY_REMOTE_INTERACTIVE_LOGON_NAME TEXT("SeDenyRemoteInteractiveLogonRight") |
| |
| NTSTATUS NTAPI LsaEnumerateAccountsWithUserRight(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING UserRight,PVOID *Buffer,PULONG CountReturned); |
| NTSTATUS NTAPI LsaEnumerateAccountRights(LSA_HANDLE PolicyHandle,PSID AccountSid,PLSA_UNICODE_STRING *UserRights,PULONG CountOfRights); |
| NTSTATUS NTAPI LsaAddAccountRights(LSA_HANDLE PolicyHandle,PSID AccountSid,PLSA_UNICODE_STRING UserRights,ULONG CountOfRights); |
| NTSTATUS NTAPI LsaRemoveAccountRights(LSA_HANDLE PolicyHandle,PSID AccountSid,BOOLEAN AllRights,PLSA_UNICODE_STRING UserRights,ULONG CountOfRights); |
| NTSTATUS NTAPI LsaOpenTrustedDomainByName(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,ACCESS_MASK DesiredAccess,PLSA_HANDLE TrustedDomainHandle); |
| NTSTATUS NTAPI LsaQueryTrustedDomainInfo(LSA_HANDLE PolicyHandle,PSID TrustedDomainSid,TRUSTED_INFORMATION_CLASS InformationClass,PVOID *Buffer); |
| NTSTATUS NTAPI LsaSetTrustedDomainInformation(LSA_HANDLE PolicyHandle,PSID TrustedDomainSid,TRUSTED_INFORMATION_CLASS InformationClass,PVOID Buffer); |
| NTSTATUS NTAPI LsaDeleteTrustedDomain(LSA_HANDLE PolicyHandle,PSID TrustedDomainSid); |
| NTSTATUS NTAPI LsaQueryTrustedDomainInfoByName(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,TRUSTED_INFORMATION_CLASS InformationClass,PVOID *Buffer); |
| NTSTATUS NTAPI LsaSetTrustedDomainInfoByName(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,TRUSTED_INFORMATION_CLASS InformationClass,PVOID Buffer); |
| NTSTATUS NTAPI LsaEnumerateTrustedDomainsEx(LSA_HANDLE PolicyHandle,PLSA_ENUMERATION_HANDLE EnumerationContext,PVOID *Buffer,ULONG PreferedMaximumLength,PULONG CountReturned); |
| NTSTATUS NTAPI LsaCreateTrustedDomainEx(LSA_HANDLE PolicyHandle,PTRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation,PTRUSTED_DOMAIN_AUTH_INFORMATION AuthenticationInformation,ACCESS_MASK DesiredAccess,PLSA_HANDLE TrustedDomainHandle); |
| NTSTATUS NTAPI LsaQueryForestTrustInformation(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,PLSA_FOREST_TRUST_INFORMATION *ForestTrustInfo); |
| NTSTATUS NTAPI LsaSetForestTrustInformation(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo,BOOLEAN CheckOnly,PLSA_FOREST_TRUST_COLLISION_INFORMATION *CollisionInfo); |
| |
| #ifdef TESTING_MATCHING_ROUTINE |
| NTSTATUS NTAPI LsaForestTrustFindMatch(LSA_HANDLE PolicyHandle,ULONG Type,PLSA_UNICODE_STRING Name,PLSA_UNICODE_STRING *Match); |
| #endif |
| |
| NTSTATUS NTAPI LsaStorePrivateData(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING KeyName,PLSA_UNICODE_STRING PrivateData); |
| NTSTATUS NTAPI LsaRetrievePrivateData(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING KeyName,PLSA_UNICODE_STRING *PrivateData); |
| ULONG NTAPI LsaNtStatusToWinError(NTSTATUS Status); |
| NTSTATUS NTAPI LsaQueryForestTrustInformation2(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,LSA_FOREST_TRUST_RECORD_TYPE HighestRecordType,PLSA_FOREST_TRUST_INFORMATION2 *ForestTrustInfo); |
| NTSTATUS NTAPI LsaSetForestTrustInformation2(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,LSA_FOREST_TRUST_RECORD_TYPE HighestRecordType,PLSA_FOREST_TRUST_INFORMATION2 ForestTrustInfo,BOOLEAN CheckOnly,PLSA_FOREST_TRUST_COLLISION_INFORMATION *CollisionInfo); |
| |
| #ifndef _NTLSA_IFS_ |
| #define _NTLSA_IFS_ |
| #endif |
| |
| enum NEGOTIATE_MESSAGES { |
| NegEnumPackagePrefixes = 0, |
| NegGetCallerName = 1, |
| NegTransferCredentials = 2, |
| NegMsgReserved1 = 3, |
| NegCallPackageMax |
| }; |
| |
| #define NEGOTIATE_MAX_PREFIX 32 |
| |
| typedef struct _NEGOTIATE_PACKAGE_PREFIX { |
| ULONG_PTR PackageId; |
| PVOID PackageDataA; |
| PVOID PackageDataW; |
| ULONG_PTR PrefixLen; |
| UCHAR Prefix[NEGOTIATE_MAX_PREFIX ]; |
| } NEGOTIATE_PACKAGE_PREFIX,*PNEGOTIATE_PACKAGE_PREFIX; |
| |
| typedef struct _NEGOTIATE_PACKAGE_PREFIXES { |
| ULONG MessageType; |
| ULONG PrefixCount; |
| ULONG Offset; |
| ULONG Pad; |
| } NEGOTIATE_PACKAGE_PREFIXES,*PNEGOTIATE_PACKAGE_PREFIXES; |
| |
| typedef struct _NEGOTIATE_CALLER_NAME_REQUEST { |
| ULONG MessageType; |
| LUID LogonId; |
| } NEGOTIATE_CALLER_NAME_REQUEST,*PNEGOTIATE_CALLER_NAME_REQUEST; |
| |
| typedef struct _NEGOTIATE_CALLER_NAME_RESPONSE { |
| ULONG MessageType; |
| PWSTR CallerName; |
| } NEGOTIATE_CALLER_NAME_RESPONSE,*PNEGOTIATE_CALLER_NAME_RESPONSE; |
| |
| #ifndef _NTDEF_ |
| #ifndef __UNICODE_STRING_DEFINED |
| #define __UNICODE_STRING_DEFINED |
| typedef LSA_UNICODE_STRING UNICODE_STRING,*PUNICODE_STRING; |
| #endif |
| #ifndef __STRING_DEFINED |
| #define __STRING_DEFINED |
| typedef LSA_STRING STRING,*PSTRING; |
| #endif |
| #endif |
| |
| #ifndef _DOMAIN_PASSWORD_INFORMATION_DEFINED |
| #define _DOMAIN_PASSWORD_INFORMATION_DEFINED |
| typedef struct _DOMAIN_PASSWORD_INFORMATION { |
| USHORT MinPasswordLength; |
| USHORT PasswordHistoryLength; |
| ULONG PasswordProperties; |
| LARGE_INTEGER MaxPasswordAge; |
| LARGE_INTEGER MinPasswordAge; |
| } DOMAIN_PASSWORD_INFORMATION,*PDOMAIN_PASSWORD_INFORMATION; |
| #endif |
| |
| #define DOMAIN_PASSWORD_COMPLEX __MSABI_LONG(0x00000001) |
| #define DOMAIN_PASSWORD_NO_ANON_CHANGE __MSABI_LONG(0x00000002) |
| #define DOMAIN_PASSWORD_NO_CLEAR_CHANGE __MSABI_LONG(0x00000004) |
| #define DOMAIN_LOCKOUT_ADMINS __MSABI_LONG(0x00000008) |
| #define DOMAIN_PASSWORD_STORE_CLEARTEXT __MSABI_LONG(0x00000010) |
| #define DOMAIN_REFUSE_PASSWORD_CHANGE __MSABI_LONG(0x00000020) |
| |
| #if _WIN32_WINNT >= 0x0502 |
| #define DOMAIN_NO_LM_OWF_CHANGE __MSABI_LONG(0x00000040) |
| #endif |
| |
| #ifndef _PASSWORD_NOTIFICATION_DEFINED |
| #define _PASSWORD_NOTIFICATION_DEFINED |
| typedef NTSTATUS (*PSAM_PASSWORD_NOTIFICATION_ROUTINE)(PUNICODE_STRING UserName,ULONG RelativeId,PUNICODE_STRING NewPassword); |
| |
| #define SAM_PASSWORD_CHANGE_NOTIFY_ROUTINE "PasswordChangeNotify" |
| |
| typedef BOOLEAN (*PSAM_INIT_NOTIFICATION_ROUTINE)(); |
| |
| #define SAM_INIT_NOTIFICATION_ROUTINE "InitializeChangeNotify" |
| #define SAM_PASSWORD_FILTER_ROUTINE "PasswordFilter" |
| |
| typedef BOOLEAN (*PSAM_PASSWORD_FILTER_ROUTINE)(PUNICODE_STRING AccountName,PUNICODE_STRING FullName,PUNICODE_STRING Password,BOOLEAN SetOperation); |
| #endif |
| |
| #define MSV1_0_PACKAGE_NAME "MICROSOFT_AUTHENTICATION_PACKAGE_V1_0" |
| #define MSV1_0_PACKAGE_NAMEW L"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0" |
| #define MSV1_0_PACKAGE_NAMEW_LENGTH sizeof(MSV1_0_PACKAGE_NAMEW) - sizeof(WCHAR) |
| |
| #define MSV1_0_SUBAUTHENTICATION_KEY "SYSTEM\\CurrentControlSet\\Control\\Lsa\\MSV1_0" |
| #define MSV1_0_SUBAUTHENTICATION_VALUE "Auth" |
| |
| typedef enum _MSV1_0_LOGON_SUBMIT_TYPE { |
| MsV1_0InteractiveLogon = 2, |
| MsV1_0Lm20Logon, |
| MsV1_0NetworkLogon, |
| MsV1_0SubAuthLogon, |
| MsV1_0WorkstationUnlockLogon = 7, |
| MsV1_0S4ULogon = 12, |
| MsV1_0VirtualLogon = 82, |
| MsV1_0NoElevationLogon, |
| MsV1_0LuidLogon |
| } MSV1_0_LOGON_SUBMIT_TYPE,*PMSV1_0_LOGON_SUBMIT_TYPE; |
| |
| typedef enum _MSV1_0_PROFILE_BUFFER_TYPE { |
| MsV1_0InteractiveProfile = 2,MsV1_0Lm20LogonProfile,MsV1_0SmartCardProfile |
| } MSV1_0_PROFILE_BUFFER_TYPE,*PMSV1_0_PROFILE_BUFFER_TYPE; |
| |
| typedef struct _MSV1_0_INTERACTIVE_LOGON { |
| MSV1_0_LOGON_SUBMIT_TYPE MessageType; |
| UNICODE_STRING LogonDomainName; |
| UNICODE_STRING UserName; |
| UNICODE_STRING Password; |
| } MSV1_0_INTERACTIVE_LOGON,*PMSV1_0_INTERACTIVE_LOGON; |
| |
| typedef struct _MSV1_0_INTERACTIVE_PROFILE { |
| MSV1_0_PROFILE_BUFFER_TYPE MessageType; |
| USHORT LogonCount; |
| USHORT BadPasswordCount; |
| LARGE_INTEGER LogonTime; |
| LARGE_INTEGER LogoffTime; |
| LARGE_INTEGER KickOffTime; |
| LARGE_INTEGER PasswordLastSet; |
| LARGE_INTEGER PasswordCanChange; |
| LARGE_INTEGER PasswordMustChange; |
| UNICODE_STRING LogonScript; |
| UNICODE_STRING HomeDirectory; |
| UNICODE_STRING FullName; |
| UNICODE_STRING ProfilePath; |
| UNICODE_STRING HomeDirectoryDrive; |
| UNICODE_STRING LogonServer; |
| ULONG UserFlags; |
| } MSV1_0_INTERACTIVE_PROFILE,*PMSV1_0_INTERACTIVE_PROFILE; |
| |
| #define MSV1_0_CHALLENGE_LENGTH 8 |
| #define MSV1_0_USER_SESSION_KEY_LENGTH 16 |
| #define MSV1_0_LANMAN_SESSION_KEY_LENGTH 8 |
| |
| #define MSV1_0_CLEARTEXT_PASSWORD_ALLOWED 0x02 |
| #define MSV1_0_UPDATE_LOGON_STATISTICS 0x04 |
| #define MSV1_0_RETURN_USER_PARAMETERS 0x08 |
| #define MSV1_0_DONT_TRY_GUEST_ACCOUNT 0x10 |
| #define MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT 0x20 |
| #define MSV1_0_RETURN_PASSWORD_EXPIRY 0x40 |
| |
| #define MSV1_0_USE_CLIENT_CHALLENGE 0x80 |
| #define MSV1_0_TRY_GUEST_ACCOUNT_ONLY 0x100 |
| #define MSV1_0_RETURN_PROFILE_PATH 0x200 |
| #define MSV1_0_TRY_SPECIFIED_DOMAIN_ONLY 0x400 |
| #define MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT 0x800 |
| #define MSV1_0_DISABLE_PERSONAL_FALLBACK 0x00001000 |
| #define MSV1_0_ALLOW_FORCE_GUEST 0x00002000 |
| #define MSV1_0_CLEARTEXT_PASSWORD_SUPPLIED 0x00004000 |
| #define MSV1_0_USE_DOMAIN_FOR_ROUTING_ONLY 0x00008000 |
| #define MSV1_0_SUBAUTHENTICATION_DLL_EX 0x00100000 |
| #define MSV1_0_ALLOW_MSVCHAPV2 0x00010000 |
| |
| #if _WIN32_WINNT >= 0x0600 |
| #define MSV1_0_S4U2SELF 0x00020000 |
| #define MSV1_0_CHECK_LOGONHOURS_FOR_S4U 0x00040000 |
| #endif |
| |
| #if _WIN32_WINNT >= 0x0602 |
| #define MSV1_0_INTERNET_DOMAIN 0x00080000 |
| #endif |
| |
| #define MSV1_0_SUBAUTHENTICATION_DLL 0xFF000000 |
| #define MSV1_0_SUBAUTHENTICATION_DLL_SHIFT 24 |
| #define MSV1_0_MNS_LOGON 0x01000000 |
| |
| #define MSV1_0_SUBAUTHENTICATION_DLL_RAS 2 |
| #define MSV1_0_SUBAUTHENTICATION_DLL_IIS 132 |
| |
| typedef struct _MSV1_0_LM20_LOGON { |
| MSV1_0_LOGON_SUBMIT_TYPE MessageType; |
| UNICODE_STRING LogonDomainName; |
| UNICODE_STRING UserName; |
| UNICODE_STRING Workstation; |
| UCHAR ChallengeToClient[MSV1_0_CHALLENGE_LENGTH]; |
| STRING CaseSensitiveChallengeResponse; |
| STRING CaseInsensitiveChallengeResponse; |
| ULONG ParameterControl; |
| } MSV1_0_LM20_LOGON,*PMSV1_0_LM20_LOGON; |
| |
| typedef struct _MSV1_0_SUBAUTH_LOGON{ |
| MSV1_0_LOGON_SUBMIT_TYPE MessageType; |
| UNICODE_STRING LogonDomainName; |
| UNICODE_STRING UserName; |
| UNICODE_STRING Workstation; |
| UCHAR ChallengeToClient[MSV1_0_CHALLENGE_LENGTH]; |
| STRING AuthenticationInfo1; |
| STRING AuthenticationInfo2; |
| ULONG ParameterControl; |
| ULONG SubAuthPackageId; |
| } MSV1_0_SUBAUTH_LOGON,*PMSV1_0_SUBAUTH_LOGON; |
| |
| #if _WIN32_WINNT >= 0x0600 |
| |
| #define MSV1_0_S4U_LOGON_FLAG_CHECK_LOGONHOURS 0x2 |
| |
| typedef struct _MSV1_0_S4U_LOGON { |
| MSV1_0_LOGON_SUBMIT_TYPE MessageType; |
| ULONG Flags; |
| UNICODE_STRING UserPrincipalName; |
| UNICODE_STRING DomainName; |
| } MSV1_0_S4U_LOGON, *PMSV1_0_S4U_LOGON; |
| |
| #endif |
| |
| #define LOGON_GUEST 0x01 |
| #define LOGON_NOENCRYPTION 0x02 |
| #define LOGON_CACHED_ACCOUNT 0x04 |
| #define LOGON_USED_LM_PASSWORD 0x08 |
| #define LOGON_EXTRA_SIDS 0x20 |
| #define LOGON_SUBAUTH_SESSION_KEY 0x40 |
| #define LOGON_SERVER_TRUST_ACCOUNT 0x80 |
| #define LOGON_NTLMV2_ENABLED 0x100 |
| #define LOGON_RESOURCE_GROUPS 0x200 |
| #define LOGON_PROFILE_PATH_RETURNED 0x400 |
| #define LOGON_NT_V2 0x800 |
| #define LOGON_LM_V2 0x1000 |
| #define LOGON_NTLM_V2 0x2000 |
| |
| #if _WIN32_WINNT >= 0x0600 |
| #define LOGON_OPTIMIZED 0x4000 |
| #define LOGON_WINLOGON 0x8000 |
| #define LOGON_PKINIT 0x10000 |
| #define LOGON_NO_OPTIMIZED 0x20000 |
| #endif |
| |
| #if _WIN32_WINNT >= 0x0602 |
| #define LOGON_NO_ELEVATION 0x40000 |
| #define LOGON_MANAGED_SERVICE 0x80000 |
| #endif |
| |
| #define MSV1_0_SUBAUTHENTICATION_FLAGS 0xFF000000 |
| |
| #define LOGON_GRACE_LOGON 0x01000000 |
| |
| typedef struct _MSV1_0_LM20_LOGON_PROFILE { |
| MSV1_0_PROFILE_BUFFER_TYPE MessageType; |
| LARGE_INTEGER KickOffTime; |
| LARGE_INTEGER LogoffTime; |
| ULONG UserFlags; |
| UCHAR UserSessionKey[MSV1_0_USER_SESSION_KEY_LENGTH]; |
| UNICODE_STRING LogonDomainName; |
| UCHAR LanmanSessionKey[MSV1_0_LANMAN_SESSION_KEY_LENGTH]; |
| UNICODE_STRING LogonServer; |
| UNICODE_STRING UserParameters; |
| } MSV1_0_LM20_LOGON_PROFILE,*PMSV1_0_LM20_LOGON_PROFILE; |
| |
| #define MSV1_0_OWF_PASSWORD_LENGTH 16 |
| #define MSV1_0_SHA_PASSWORD_LENGTH 20 |
| #define MSV1_0_CREDENTIAL_KEY_LENGTH 20 |
| #define MSV1_0_CRED_LM_PRESENT 0x1 |
| #define MSV1_0_CRED_NT_PRESENT 0x2 |
| #define MSV1_0_CRED_REMOVED 0x4 |
| #define MSV1_0_CRED_CREDKEY_PRESENT 0x8 |
| #define MSV1_0_CRED_SHA_PRESENT 0x10 |
| |
| #define MSV1_0_CRED_VERSION 0 |
| #define MSV1_0_CRED_VERSION_V2 2 |
| #define MSV1_0_CRED_VERSION_V3 4 |
| #define MSV1_0_CRED_VERSION_IUM 0xffff0001 |
| #define MSV1_0_CRED_VERSION_REMOTE 0xffff0002 |
| #define MSV1_0_CRED_VERSION_ARSO 0xffff0003 |
| #define MSV1_0_CRED_VERSION_RESERVED_1 0xfffffffe |
| #define MSV1_0_CRED_VERSION_INVALID 0xffffffff |
| |
| typedef enum _MSV1_0_CREDENTIAL_KEY_TYPE { |
| InvalidCredKey, |
| DeprecatedIUMCredKey, |
| DomainUserCredKey, |
| LocalUserCredKey, |
| ExternallySuppliedCredKey |
| } MSV1_0_CREDENTIAL_KEY_TYPE; |
| |
| typedef struct _MSV1_0_CREDENTIAL_KEY { |
| UCHAR Data[MSV1_0_CREDENTIAL_KEY_LENGTH]; |
| } MSV1_0_CREDENTIAL_KEY, *PMSV1_0_CREDENTIAL_KEY; |
| |
| typedef struct _MSV1_0_SUPPLEMENTAL_CREDENTIAL { |
| ULONG Version; |
| ULONG Flags; |
| UCHAR LmPassword[MSV1_0_OWF_PASSWORD_LENGTH]; |
| UCHAR NtPassword[MSV1_0_OWF_PASSWORD_LENGTH]; |
| } MSV1_0_SUPPLEMENTAL_CREDENTIAL,*PMSV1_0_SUPPLEMENTAL_CREDENTIAL; |
| |
| typedef struct _MSV1_0_SUPPLEMENTAL_CREDENTIAL_V2 { |
| ULONG Version; |
| ULONG Flags; |
| UCHAR NtPassword[MSV1_0_OWF_PASSWORD_LENGTH]; |
| MSV1_0_CREDENTIAL_KEY CredentialKey; |
| } MSV1_0_SUPPLEMENTAL_CREDENTIAL_V2, *PMSV1_0_SUPPLEMENTAL_CREDENTIAL_V2; |
| |
| typedef struct _MSV1_0_SUPPLEMENTAL_CREDENTIAL_V3 { |
| ULONG Version; |
| ULONG Flags; |
| MSV1_0_CREDENTIAL_KEY_TYPE CredentialKeyType; |
| UCHAR NtPassword[MSV1_0_OWF_PASSWORD_LENGTH]; |
| MSV1_0_CREDENTIAL_KEY CredentialKey; |
| UCHAR ShaPassword[MSV1_0_SHA_PASSWORD_LENGTH]; |
| } MSV1_0_SUPPLEMENTAL_CREDENTIAL_V3, *PMSV1_0_SUPPLEMENTAL_CREDENTIAL_V3; |
| |
| typedef struct _MSV1_0_IUM_SUPPLEMENTAL_CREDENTIAL { |
| ULONG Version; |
| ULONG EncryptedCredsSize; |
| UCHAR EncryptedCreds[1]; |
| } MSV1_0_IUM_SUPPLEMENTAL_CREDENTIAL, *PMSV1_0_IUM_SUPPLEMENTAL_CREDENTIAL; |
| |
| #define MSV1_0_IUM_SUPPLEMENTAL_CREDENTIAL_SIZE(Creds) \ |
| (FIELD_OFFSET(MSV1_0_IUM_SUPPLEMENTAL_CREDENTIAL, EncryptedCreds) + (Creds)->EncryptedCredsSize) |
| |
| typedef struct _MSV1_0_REMOTE_SUPPLEMENTAL_CREDENTIAL { |
| ULONG Version; |
| ULONG Flags; |
| MSV1_0_CREDENTIAL_KEY CredentialKey; |
| MSV1_0_CREDENTIAL_KEY_TYPE CredentialKeyType; |
| ULONG EncryptedCredsSize; |
| UCHAR EncryptedCreds[1]; |
| } MSV1_0_REMOTE_SUPPLEMENTAL_CREDENTIAL, *PMSV1_0_REMOTE_SUPPLEMENTAL_CREDENTIAL; |
| |
| #define MSV1_0_NTLM3_RESPONSE_LENGTH 16 |
| #define MSV1_0_NTLM3_OWF_LENGTH 16 |
| |
| #define MSV1_0_MAX_NTLM3_LIFE 129600 |
| #define MSV1_0_MAX_AVL_SIZE 64000 |
| |
| #define MSV1_0_AV_FLAG_FORCE_GUEST 0x00000001 |
| |
| #if _WIN32_WINNT >= 0x0600 |
| #define MSV1_0_AV_FLAG_MIC_HANDSHAKE_MESSAGES 0x00000002 |
| #endif |
| |
| #if _WIN32_WINNT >= 0x0601 |
| #define MSV1_0_AV_FLAG_UNVERIFIED_TARGET 0x00000004 |
| #endif |
| |
| typedef struct _MSV1_0_NTLM3_RESPONSE { |
| UCHAR Response[MSV1_0_NTLM3_RESPONSE_LENGTH]; |
| UCHAR RespType; |
| UCHAR HiRespType; |
| USHORT Flags; |
| ULONG MsgWord; |
| ULONGLONG TimeStamp; |
| UCHAR ChallengeFromClient[MSV1_0_CHALLENGE_LENGTH]; |
| ULONG AvPairsOff; |
| UCHAR Buffer[1]; |
| } MSV1_0_NTLM3_RESPONSE,*PMSV1_0_NTLM3_RESPONSE; |
| |
| #define MSV1_0_NTLM3_INPUT_LENGTH (sizeof(MSV1_0_NTLM3_RESPONSE) - MSV1_0_NTLM3_RESPONSE_LENGTH) |
| #define MSV1_0_NTLM3_MIN_NT_RESPONSE_LENGTH RTL_SIZEOF_THROUGH_FIELD(MSV1_0_NTLM3_RESPONSE,AvPairsOff) |
| |
| /* MsvAvSingleHost present in MS-NLMP specifications but not in WinSDK */ |
| typedef enum { |
| MsvAvEOL, |
| MsvAvNbComputerName, |
| MsvAvNbDomainName, |
| MsvAvDnsComputerName, |
| MsvAvDnsDomainName |
| #if _WIN32_WINNT >= 0x0501 |
| ,MsvAvDnsTreeName |
| ,MsvAvFlags |
| #if _WIN32_WINNT >= 0x0600 |
| ,MsvAvTimestamp |
| ,MsvAvRestrictions |
| ,MsvAvSingleHost = MsvAvRestrictions |
| ,MsvAvTargetName |
| ,MsvAvChannelBindings |
| #endif |
| #endif |
| } MSV1_0_AVID; |
| |
| typedef struct _MSV1_0_AV_PAIR { |
| USHORT AvId; |
| USHORT AvLen; |
| } MSV1_0_AV_PAIR,*PMSV1_0_AV_PAIR; |
| |
| typedef enum _MSV1_0_PROTOCOL_MESSAGE_TYPE { |
| MsV1_0Lm20ChallengeRequest = 0, |
| MsV1_0Lm20GetChallengeResponse, |
| MsV1_0EnumerateUsers, |
| MsV1_0GetUserInfo, |
| MsV1_0ReLogonUsers, |
| MsV1_0ChangePassword, |
| MsV1_0ChangeCachedPassword, |
| MsV1_0GenericPassthrough, |
| MsV1_0CacheLogon, |
| MsV1_0SubAuth, |
| MsV1_0DeriveCredential, |
| MsV1_0CacheLookup, |
| #if _WIN32_WINNT >= 0x0501 |
| MsV1_0SetProcessOption, |
| #endif |
| #if _WIN32_WINNT >= 0x0600 |
| MsV1_0ConfigLocalAliases, |
| MsV1_0ClearCachedCredentials, |
| #endif |
| #if _WIN32_WINNT >= 0x0601 |
| MsV1_0LookupToken, |
| #endif |
| #if _WIN32_WINNT >= 0x0602 |
| MsV1_0ValidateAuth, |
| MsV1_0CacheLookupEx, |
| MsV1_0GetCredentialKey, |
| MsV1_0SetThreadOption, |
| #endif |
| #if _WIN32_WINNT >= 0x0A00 |
| MsV1_0DecryptDpapiMasterKey, |
| MsV1_0GetStrongCredentialKey, |
| MsV1_0TransferCred, |
| MsV1_0ProvisionTbal, |
| MsV1_0DeleteTbalSecrets |
| #endif |
| } MSV1_0_PROTOCOL_MESSAGE_TYPE,*PMSV1_0_PROTOCOL_MESSAGE_TYPE; |
| |
| typedef struct _MSV1_0_CHANGEPASSWORD_REQUEST { |
| MSV1_0_PROTOCOL_MESSAGE_TYPE MessageType; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING AccountName; |
| UNICODE_STRING OldPassword; |
| UNICODE_STRING NewPassword; |
| BOOLEAN Impersonating; |
| } MSV1_0_CHANGEPASSWORD_REQUEST,*PMSV1_0_CHANGEPASSWORD_REQUEST; |
| |
| typedef struct _MSV1_0_CHANGEPASSWORD_RESPONSE { |
| MSV1_0_PROTOCOL_MESSAGE_TYPE MessageType; |
| BOOLEAN PasswordInfoValid; |
| DOMAIN_PASSWORD_INFORMATION DomainPasswordInfo; |
| } MSV1_0_CHANGEPASSWORD_RESPONSE,*PMSV1_0_CHANGEPASSWORD_RESPONSE; |
| |
| typedef struct _MSV1_0_PASSTHROUGH_REQUEST { |
| MSV1_0_PROTOCOL_MESSAGE_TYPE MessageType; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING PackageName; |
| ULONG DataLength; |
| PUCHAR LogonData; |
| ULONG Pad; |
| } MSV1_0_PASSTHROUGH_REQUEST,*PMSV1_0_PASSTHROUGH_REQUEST; |
| |
| typedef struct _MSV1_0_PASSTHROUGH_RESPONSE { |
| MSV1_0_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Pad; |
| ULONG DataLength; |
| PUCHAR ValidationData; |
| } MSV1_0_PASSTHROUGH_RESPONSE,*PMSV1_0_PASSTHROUGH_RESPONSE; |
| |
| typedef struct _MSV1_0_SUBAUTH_REQUEST{ |
| MSV1_0_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG SubAuthPackageId; |
| ULONG SubAuthInfoLength; |
| PUCHAR SubAuthSubmitBuffer; |
| } MSV1_0_SUBAUTH_REQUEST,*PMSV1_0_SUBAUTH_REQUEST; |
| |
| typedef struct _MSV1_0_SUBAUTH_RESPONSE{ |
| MSV1_0_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG SubAuthInfoLength; |
| PUCHAR SubAuthReturnBuffer; |
| } MSV1_0_SUBAUTH_RESPONSE,*PMSV1_0_SUBAUTH_RESPONSE; |
| |
| #define RtlGenRandom SystemFunction036 |
| #define RtlEncryptMemory SystemFunction040 |
| #define RtlDecryptMemory SystemFunction041 |
| |
| BOOLEAN WINAPI RtlGenRandom(PVOID RandomBuffer,ULONG RandomBufferLength); |
| |
| #define RTL_ENCRYPT_MEMORY_SIZE 8 |
| #define RTL_ENCRYPT_OPTION_CROSS_PROCESS 0x01 |
| #define RTL_ENCRYPT_OPTION_SAME_LOGON 0x02 |
| #define RTL_ENCRYPT_OPTION_FOR_SYSTEM 0x04 |
| |
| NTSTATUS WINAPI RtlEncryptMemory(PVOID Memory,ULONG MemorySize,ULONG OptionFlags); |
| NTSTATUS WINAPI RtlDecryptMemory(PVOID Memory,ULONG MemorySize,ULONG OptionFlags); |
| |
| #define KERBEROS_VERSION 5 |
| #define KERBEROS_REVISION 6 |
| |
| #define KERB_ETYPE_NULL 0 |
| #define KERB_ETYPE_DES_CBC_CRC 1 |
| #define KERB_ETYPE_DES_CBC_MD4 2 |
| #define KERB_ETYPE_DES_CBC_MD5 3 |
| #define KERB_ETYPE_AES128_CTS_HMAC_SHA1_96 17 |
| #define KERB_ETYPE_AES256_CTS_HMAC_SHA1_96 18 |
| |
| #define KERB_ETYPE_RC4_MD4 -128 |
| #define KERB_ETYPE_RC4_PLAIN2 -129 |
| #define KERB_ETYPE_RC4_LM -130 |
| #define KERB_ETYPE_RC4_SHA -131 |
| #define KERB_ETYPE_DES_PLAIN -132 |
| #define KERB_ETYPE_RC4_HMAC_OLD -133 |
| #define KERB_ETYPE_RC4_PLAIN_OLD -134 |
| #define KERB_ETYPE_RC4_HMAC_OLD_EXP -135 |
| #define KERB_ETYPE_RC4_PLAIN_OLD_EXP -136 |
| #define KERB_ETYPE_RC4_PLAIN -140 |
| #define KERB_ETYPE_RC4_PLAIN_EXP -141 |
| #define KERB_ETYPE_AES128_CTS_HMAC_SHA1_96_PLAIN -148 |
| #define KERB_ETYPE_AES256_CTS_HMAC_SHA1_96_PLAIN -149 |
| |
| #define KERB_ETYPE_DSA_SHA1_CMS 9 |
| #define KERB_ETYPE_RSA_MD5_CMS 10 |
| #define KERB_ETYPE_RSA_SHA1_CMS 11 |
| #define KERB_ETYPE_RC2_CBC_ENV 12 |
| #define KERB_ETYPE_RSA_ENV 13 |
| #define KERB_ETYPE_RSA_ES_OEAP_ENV 14 |
| #define KERB_ETYPE_DES_EDE3_CBC_ENV 15 |
| |
| #define KERB_ETYPE_DSA_SIGN 8 |
| #define KERB_ETYPE_RSA_PRIV 9 |
| #define KERB_ETYPE_RSA_PUB 10 |
| #define KERB_ETYPE_RSA_PUB_MD5 11 |
| #define KERB_ETYPE_RSA_PUB_SHA1 12 |
| #define KERB_ETYPE_PKCS7_PUB 13 |
| |
| #define KERB_ETYPE_DES3_CBC_MD5 5 |
| #define KERB_ETYPE_DES3_CBC_SHA1 7 |
| #define KERB_ETYPE_DES3_CBC_SHA1_KD 16 |
| |
| #define KERB_ETYPE_DES_CBC_MD5_NT 20 |
| #define KERB_ETYPE_RC4_HMAC_NT 23 |
| #define KERB_ETYPE_RC4_HMAC_NT_EXP 24 |
| |
| #define KERB_CHECKSUM_NONE 0 |
| #define KERB_CHECKSUM_CRC32 1 |
| #define KERB_CHECKSUM_MD4 2 |
| #define KERB_CHECKSUM_KRB_DES_MAC 4 |
| #define KERB_CHECKSUM_KRB_DES_MAC_K 5 |
| #define KERB_CHECKSUM_MD5 7 |
| #define KERB_CHECKSUM_MD5_DES 8 |
| #define KERB_CHECKSUM_SHA1_NEW 14 |
| #define KERB_CHECKSUM_HMAC_SHA1_96_AES128 15 |
| #define KERB_CHECKSUM_HMAC_SHA1_96_AES256 16 |
| |
| #define KERB_CHECKSUM_LM -130 |
| #define KERB_CHECKSUM_SHA1 -131 |
| #define KERB_CHECKSUM_REAL_CRC32 -132 |
| #define KERB_CHECKSUM_DES_MAC -133 |
| #define KERB_CHECKSUM_DES_MAC_MD5 -134 |
| #define KERB_CHECKSUM_MD25 -135 |
| #define KERB_CHECKSUM_RC4_MD5 -136 |
| #define KERB_CHECKSUM_MD5_HMAC -137 |
| #define KERB_CHECKSUM_HMAC_MD5 -138 |
| #define KERB_CHECKSUM_SHA256 -139 |
| #define KERB_CHECKSUM_SHA384 -140 |
| #define KERB_CHECKSUM_SHA512 -141 |
| #define KERB_CHECKSUM_HMAC_SHA1_96_AES128_Ki -150 |
| #define KERB_CHECKSUM_HMAC_SHA1_96_AES256_Ki -151 |
| |
| #define AUTH_REQ_ALLOW_FORWARDABLE 0x00000001 |
| #define AUTH_REQ_ALLOW_PROXIABLE 0x00000002 |
| #define AUTH_REQ_ALLOW_POSTDATE 0x00000004 |
| #define AUTH_REQ_ALLOW_RENEWABLE 0x00000008 |
| #define AUTH_REQ_ALLOW_NOADDRESS 0x00000010 |
| #define AUTH_REQ_ALLOW_ENC_TKT_IN_SKEY 0x00000020 |
| #define AUTH_REQ_ALLOW_VALIDATE 0x00000040 |
| #define AUTH_REQ_VALIDATE_CLIENT 0x00000080 |
| #define AUTH_REQ_OK_AS_DELEGATE 0x00000100 |
| #define AUTH_REQ_PREAUTH_REQUIRED 0x00000200 |
| #define AUTH_REQ_TRANSITIVE_TRUST 0x00000400 |
| #define AUTH_REQ_ALLOW_S4U_DELEGATE 0x00000800 |
| |
| #define AUTH_REQ_PER_USER_FLAGS (AUTH_REQ_ALLOW_FORWARDABLE | AUTH_REQ_ALLOW_PROXIABLE | AUTH_REQ_ALLOW_POSTDATE | AUTH_REQ_ALLOW_RENEWABLE | AUTH_REQ_ALLOW_VALIDATE) |
| |
| #define KERB_TICKET_FLAGS_reserved 0x80000000 |
| #define KERB_TICKET_FLAGS_forwardable 0x40000000 |
| #define KERB_TICKET_FLAGS_forwarded 0x20000000 |
| #define KERB_TICKET_FLAGS_proxiable 0x10000000 |
| #define KERB_TICKET_FLAGS_proxy 0x08000000 |
| #define KERB_TICKET_FLAGS_may_postdate 0x04000000 |
| #define KERB_TICKET_FLAGS_postdated 0x02000000 |
| #define KERB_TICKET_FLAGS_invalid 0x01000000 |
| #define KERB_TICKET_FLAGS_renewable 0x00800000 |
| #define KERB_TICKET_FLAGS_initial 0x00400000 |
| #define KERB_TICKET_FLAGS_pre_authent 0x00200000 |
| #define KERB_TICKET_FLAGS_hw_authent 0x00100000 |
| #define KERB_TICKET_FLAGS_ok_as_delegate 0x00040000 |
| #define KERB_TICKET_FLAGS_name_canonicalize 0x00010000 |
| #if _WIN32_WINNT == 0x0501 |
| #define KERB_TICKET_FLAGS_cname_in_pa_data 0x00040000 |
| #endif |
| #define KERB_TICKET_FLAGS_enc_pa_rep 0x00010000 |
| #define KERB_TICKET_FLAGS_reserved1 0x00000001 |
| |
| #define KRB_NT_UNKNOWN 0 |
| #define KRB_NT_PRINCIPAL 1 |
| #define KRB_NT_PRINCIPAL_AND_ID -131 |
| #define KRB_NT_SRV_INST 2 |
| #define KRB_NT_SRV_INST_AND_ID -132 |
| #define KRB_NT_SRV_HST 3 |
| #define KRB_NT_SRV_XHST 4 |
| #define KRB_NT_UID 5 |
| #define KRB_NT_ENTERPRISE_PRINCIPAL 10 |
| #define KRB_NT_WELLKNOWN 11 |
| #define KRB_NT_MS_BRANCH_ID -133 |
| #define KRB_NT_ENT_PRINCIPAL_AND_ID -130 |
| #define KRB_NT_MS_PRINCIPAL -128 |
| #define KRB_NT_MS_PRINCIPAL_AND_ID -129 |
| |
| #define KERB_IS_MS_PRINCIPAL(_x_) (((_x_) <= KRB_NT_MS_PRINCIPAL) || ((_x_) >= KRB_NT_ENTERPRISE_PRINCIPAL)) |
| |
| #if _WIN32_WINNT >= 0x0600 |
| #define KRB_NT_X500_PRINCIPAL 6 |
| #endif |
| |
| #define KRB_WELLKNOWN_STRING L"WELLKNOWN" |
| #define KRB_ANONYMOUS_STRING L"ANONYMOUS" |
| |
| #ifndef MICROSOFT_KERBEROS_NAME_A |
| |
| #define MICROSOFT_KERBEROS_NAME_A "Kerberos" |
| #define MICROSOFT_KERBEROS_NAME_W L"Kerberos" |
| #ifdef WIN32_CHICAGO |
| #define MICROSOFT_KERBEROS_NAME MICROSOFT_KERBEROS_NAME_A |
| #else |
| #define MICROSOFT_KERBEROS_NAME MICROSOFT_KERBEROS_NAME_W |
| #endif |
| #endif |
| |
| #define KERB_WRAP_NO_ENCRYPT 0x80000001 |
| |
| typedef enum _KERB_LOGON_SUBMIT_TYPE { |
| KerbInteractiveLogon = 2, |
| KerbSmartCardLogon = 6, |
| KerbWorkstationUnlockLogon = 7, |
| KerbSmartCardUnlockLogon = 8, |
| KerbProxyLogon = 9, |
| KerbTicketLogon = 10, |
| KerbTicketUnlockLogon = 11, |
| KerbS4ULogon = 12, |
| #if (_WIN32_WINNT >= 0x0600) |
| KerbCertificateLogon = 13, |
| KerbCertificateS4ULogon = 14, |
| KerbCertificateUnlockLogon = 15, |
| #endif |
| #if (_WIN32_WINNT >= 0x0602) |
| KerbNoElevationLogon = 83, |
| KerbLuidLogon = 84 |
| #endif |
| } KERB_LOGON_SUBMIT_TYPE,*PKERB_LOGON_SUBMIT_TYPE; |
| |
| typedef struct _KERB_INTERACTIVE_LOGON { |
| KERB_LOGON_SUBMIT_TYPE MessageType; |
| UNICODE_STRING LogonDomainName; |
| UNICODE_STRING UserName; |
| UNICODE_STRING Password; |
| } KERB_INTERACTIVE_LOGON,*PKERB_INTERACTIVE_LOGON; |
| |
| typedef struct _KERB_INTERACTIVE_UNLOCK_LOGON { |
| KERB_INTERACTIVE_LOGON Logon; |
| LUID LogonId; |
| } KERB_INTERACTIVE_UNLOCK_LOGON,*PKERB_INTERACTIVE_UNLOCK_LOGON; |
| |
| typedef struct _KERB_SMART_CARD_LOGON { |
| KERB_LOGON_SUBMIT_TYPE MessageType; |
| UNICODE_STRING Pin; |
| ULONG CspDataLength; |
| PUCHAR CspData; |
| } KERB_SMART_CARD_LOGON,*PKERB_SMART_CARD_LOGON; |
| |
| typedef struct _KERB_SMART_CARD_UNLOCK_LOGON { |
| KERB_SMART_CARD_LOGON Logon; |
| LUID LogonId; |
| } KERB_SMART_CARD_UNLOCK_LOGON,*PKERB_SMART_CARD_UNLOCK_LOGON; |
| |
| typedef struct _KERB_TICKET_LOGON { |
| KERB_LOGON_SUBMIT_TYPE MessageType; |
| ULONG Flags; |
| ULONG ServiceTicketLength; |
| ULONG TicketGrantingTicketLength; |
| PUCHAR ServiceTicket; |
| PUCHAR TicketGrantingTicket; |
| } KERB_TICKET_LOGON,*PKERB_TICKET_LOGON; |
| |
| #define KERB_LOGON_FLAG_ALLOW_EXPIRED_TICKET 0x1 |
| #define KERB_LOGON_FLAG_REDIRECTED 0x2 |
| |
| typedef struct _KERB_TICKET_UNLOCK_LOGON { |
| KERB_TICKET_LOGON Logon; |
| LUID LogonId; |
| } KERB_TICKET_UNLOCK_LOGON,*PKERB_TICKET_UNLOCK_LOGON; |
| |
| #if _WIN32_WINNT >= 0x0600 |
| #define KERB_S4U_LOGON_FLAG_CHECK_LOGONHOURS 0x2 |
| #define KERB_S4U_LOGON_FLAG_IDENTIFY 0x8 |
| #endif |
| |
| typedef struct _KERB_S4U_LOGON { |
| KERB_LOGON_SUBMIT_TYPE MessageType; |
| ULONG Flags; |
| UNICODE_STRING ClientUpn; |
| UNICODE_STRING ClientRealm; |
| } KERB_S4U_LOGON,*PKERB_S4U_LOGON; |
| |
| typedef enum _KERB_PROFILE_BUFFER_TYPE { |
| KerbInteractiveProfile = 2,KerbSmartCardProfile = 4,KerbTicketProfile = 6 |
| } KERB_PROFILE_BUFFER_TYPE,*PKERB_PROFILE_BUFFER_TYPE; |
| |
| typedef struct _KERB_INTERACTIVE_PROFILE { |
| KERB_PROFILE_BUFFER_TYPE MessageType; |
| USHORT LogonCount; |
| USHORT BadPasswordCount; |
| LARGE_INTEGER LogonTime; |
| LARGE_INTEGER LogoffTime; |
| LARGE_INTEGER KickOffTime; |
| LARGE_INTEGER PasswordLastSet; |
| LARGE_INTEGER PasswordCanChange; |
| LARGE_INTEGER PasswordMustChange; |
| UNICODE_STRING LogonScript; |
| UNICODE_STRING HomeDirectory; |
| UNICODE_STRING FullName; |
| UNICODE_STRING ProfilePath; |
| UNICODE_STRING HomeDirectoryDrive; |
| UNICODE_STRING LogonServer; |
| ULONG UserFlags; |
| } KERB_INTERACTIVE_PROFILE,*PKERB_INTERACTIVE_PROFILE; |
| |
| typedef struct _KERB_SMART_CARD_PROFILE { |
| KERB_INTERACTIVE_PROFILE Profile; |
| ULONG CertificateSize; |
| PUCHAR CertificateData; |
| } KERB_SMART_CARD_PROFILE,*PKERB_SMART_CARD_PROFILE; |
| |
| typedef struct KERB_CRYPTO_KEY { |
| LONG KeyType; |
| ULONG Length; |
| PUCHAR Value; |
| } KERB_CRYPTO_KEY,*PKERB_CRYPTO_KEY; |
| |
| typedef struct KERB_CRYPTO_KEY32 { |
| LONG KeyType; |
| ULONG Length; |
| ULONG Offset; |
| } KERB_CRYPTO_KEY32,*PKERB_CRYPTO_KEY32; |
| |
| typedef struct _KERB_TICKET_PROFILE { |
| KERB_INTERACTIVE_PROFILE Profile; |
| KERB_CRYPTO_KEY SessionKey; |
| } KERB_TICKET_PROFILE,*PKERB_TICKET_PROFILE; |
| |
| typedef enum _KERB_PROTOCOL_MESSAGE_TYPE { |
| KerbDebugRequestMessage = 0, |
| KerbQueryTicketCacheMessage, |
| KerbChangeMachinePasswordMessage, |
| KerbVerifyPacMessage, |
| KerbRetrieveTicketMessage, |
| KerbUpdateAddressesMessage, |
| KerbPurgeTicketCacheMessage, |
| KerbChangePasswordMessage, |
| KerbRetrieveEncodedTicketMessage, |
| KerbDecryptDataMessage, |
| KerbAddBindingCacheEntryMessage, |
| KerbSetPasswordMessage, |
| KerbSetPasswordExMessage, |
| #if _WIN32_WINNT >= 0x0501 |
| KerbVerifyCredentialsMessage, |
| KerbQueryTicketCacheExMessage, |
| KerbPurgeTicketCacheExMessage, |
| #endif |
| #if _WIN32_WINNT >= 0x0502 |
| KerbRefreshSmartcardCredentialsMessage, |
| KerbAddExtraCredentialsMessage, |
| KerbQuerySupplementalCredentialsMessage, |
| #endif |
| #if _WIN32_WINNT >= 0x0600 |
| KerbTransferCredentialsMessage, |
| KerbQueryTicketCacheEx2Message, |
| KerbSubmitTicketMessage, |
| KerbAddExtraCredentialsExMessage, |
| #endif |
| #if _WIN32_WINNT >= 0x0602 |
| KerbQueryKdcProxyCacheMessage, |
| KerbPurgeKdcProxyCacheMessage, |
| KerbQueryTicketCacheEx3Message, |
| KerbCleanupMachinePkinitCredsMessage, |
| KerbAddBindingCacheEntryExMessage, |
| KerbQueryBindingCacheMessage, |
| KerbPurgeBindingCacheMessage, |
| KerbPinKdcMessage, |
| KerbUnpinAllKdcsMessage, |
| KerbQueryDomainExtendedPoliciesMessage, |
| KerbQueryS4U2ProxyCacheMessage |
| #endif |
| #if _WIN32_WINNT >= 0x0A00 |
| ,KerbRetrieveKeyTabMessage |
| ,KerbRefreshPolicyMessage |
| ,KerbPrintCloudKerberosDebugMessage |
| #endif |
| } KERB_PROTOCOL_MESSAGE_TYPE,*PKERB_PROTOCOL_MESSAGE_TYPE; |
| |
| typedef struct _KERB_QUERY_TKT_CACHE_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| } KERB_QUERY_TKT_CACHE_REQUEST,*PKERB_QUERY_TKT_CACHE_REQUEST; |
| |
| typedef struct _KERB_TICKET_CACHE_INFO { |
| UNICODE_STRING ServerName; |
| UNICODE_STRING RealmName; |
| LARGE_INTEGER StartTime; |
| LARGE_INTEGER EndTime; |
| LARGE_INTEGER RenewTime; |
| LONG EncryptionType; |
| ULONG TicketFlags; |
| } KERB_TICKET_CACHE_INFO,*PKERB_TICKET_CACHE_INFO; |
| |
| typedef struct _KERB_TICKET_CACHE_INFO_EX { |
| UNICODE_STRING ClientName; |
| UNICODE_STRING ClientRealm; |
| UNICODE_STRING ServerName; |
| UNICODE_STRING ServerRealm; |
| LARGE_INTEGER StartTime; |
| LARGE_INTEGER EndTime; |
| LARGE_INTEGER RenewTime; |
| LONG EncryptionType; |
| ULONG TicketFlags; |
| } KERB_TICKET_CACHE_INFO_EX,*PKERB_TICKET_CACHE_INFO_EX; |
| |
| typedef struct _KERB_TICKET_CACHE_INFO_EX2 { |
| UNICODE_STRING ClientName; |
| UNICODE_STRING ClientRealm; |
| UNICODE_STRING ServerName; |
| UNICODE_STRING ServerRealm; |
| LARGE_INTEGER StartTime; |
| LARGE_INTEGER EndTime; |
| LARGE_INTEGER RenewTime; |
| LONG EncryptionType; |
| ULONG TicketFlags; |
| ULONG SessionKeyType; |
| } KERB_TICKET_CACHE_INFO_EX2,*PKERB_TICKET_CACHE_INFO_EX2; |
| |
| #if _WIN32_WINNT >= 0x0602 |
| typedef struct _KERB_TICKET_CACHE_INFO_EX3 { |
| UNICODE_STRING ClientName; |
| UNICODE_STRING ClientRealm; |
| UNICODE_STRING ServerName; |
| UNICODE_STRING ServerRealm; |
| LARGE_INTEGER StartTime; |
| LARGE_INTEGER EndTime; |
| LARGE_INTEGER RenewTime; |
| LONG EncryptionType; |
| ULONG TicketFlags; |
| ULONG SessionKeyType; |
| ULONG BranchId; |
| ULONG CacheFlags; |
| UNICODE_STRING KdcCalled; |
| } KERB_TICKET_CACHE_INFO_EX3, *PKERB_TICKET_CACHE_INFO_EX3; |
| #endif |
| |
| typedef struct _KERB_QUERY_TKT_CACHE_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfTickets; |
| KERB_TICKET_CACHE_INFO Tickets[ANYSIZE_ARRAY]; |
| } KERB_QUERY_TKT_CACHE_RESPONSE,*PKERB_QUERY_TKT_CACHE_RESPONSE; |
| |
| typedef struct _KERB_QUERY_TKT_CACHE_EX_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfTickets; |
| KERB_TICKET_CACHE_INFO_EX Tickets[ANYSIZE_ARRAY]; |
| } KERB_QUERY_TKT_CACHE_EX_RESPONSE,*PKERB_QUERY_TKT_CACHE_EX_RESPONSE; |
| |
| typedef struct _KERB_QUERY_TKT_CACHE_EX2_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfTickets; |
| KERB_TICKET_CACHE_INFO_EX2 Tickets[ANYSIZE_ARRAY]; |
| } KERB_QUERY_TKT_CACHE_EX2_RESPONSE,*PKERB_QUERY_TKT_CACHE_EX2_RESPONSE; |
| |
| #if _WIN32_WINNT >= 0x0602 |
| typedef struct _KERB_QUERY_TKT_CACHE_EX3_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfTickets; |
| KERB_TICKET_CACHE_INFO_EX3 Tickets[ANYSIZE_ARRAY]; |
| } KERB_QUERY_TKT_CACHE_EX3_RESPONSE, *PKERB_QUERY_TKT_CACHE_EX3_RESPONSE; |
| #endif |
| |
| #ifndef __SECHANDLE_DEFINED__ |
| typedef struct _SecHandle { |
| ULONG_PTR dwLower; |
| ULONG_PTR dwUpper; |
| } SecHandle,*PSecHandle; |
| |
| #define __SECHANDLE_DEFINED__ |
| #endif |
| |
| #define KERB_USE_DEFAULT_TICKET_FLAGS 0x0 |
| |
| #define KERB_RETRIEVE_TICKET_DEFAULT 0x0 |
| #define KERB_RETRIEVE_TICKET_DONT_USE_CACHE 0x1 |
| #define KERB_RETRIEVE_TICKET_USE_CACHE_ONLY 0x2 |
| #define KERB_RETRIEVE_TICKET_USE_CREDHANDLE 0x4 |
| #define KERB_RETRIEVE_TICKET_AS_KERB_CRED 0x8 |
| #define KERB_RETRIEVE_TICKET_WITH_SEC_CRED 0x10 |
| |
| #if _WIN32_WINNT >= 0x0600 |
| #define KERB_RETRIEVE_TICKET_CACHE_TICKET 0x20 |
| #endif |
| |
| #if _WIN32_WINNT >= 0x0601 |
| #define KERB_RETRIEVE_TICKET_MAX_LIFETIME 0x40 |
| #endif |
| |
| #define KERB_ETYPE_DEFAULT 0x0 |
| |
| typedef struct _KERB_AUTH_DATA { |
| ULONG Type; |
| ULONG Length; |
| PUCHAR Data; |
| } KERB_AUTH_DATA,*PKERB_AUTH_DATA; |
| |
| typedef struct _KERB_NET_ADDRESS { |
| ULONG Family; |
| ULONG Length; |
| PCHAR Address; |
| } KERB_NET_ADDRESS,*PKERB_NET_ADDRESS; |
| |
| typedef struct _KERB_NET_ADDRESSES { |
| ULONG Number; |
| KERB_NET_ADDRESS Addresses[ANYSIZE_ARRAY]; |
| } KERB_NET_ADDRESSES,*PKERB_NET_ADDRESSES; |
| |
| typedef struct _KERB_EXTERNAL_NAME { |
| SHORT NameType; |
| USHORT NameCount; |
| UNICODE_STRING Names[ANYSIZE_ARRAY]; |
| } KERB_EXTERNAL_NAME,*PKERB_EXTERNAL_NAME; |
| |
| typedef struct _KERB_EXTERNAL_TICKET { |
| PKERB_EXTERNAL_NAME ServiceName; |
| PKERB_EXTERNAL_NAME TargetName; |
| PKERB_EXTERNAL_NAME ClientName; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING TargetDomainName; |
| UNICODE_STRING AltTargetDomainName; |
| KERB_CRYPTO_KEY SessionKey; |
| ULONG TicketFlags; |
| ULONG Flags; |
| LARGE_INTEGER KeyExpirationTime; |
| LARGE_INTEGER StartTime; |
| LARGE_INTEGER EndTime; |
| LARGE_INTEGER RenewUntil; |
| LARGE_INTEGER TimeSkew; |
| ULONG EncodedTicketSize; |
| PUCHAR EncodedTicket; |
| } KERB_EXTERNAL_TICKET,*PKERB_EXTERNAL_TICKET; |
| |
| typedef struct _KERB_RETRIEVE_TKT_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| UNICODE_STRING TargetName; |
| ULONG TicketFlags; |
| ULONG CacheOptions; |
| LONG EncryptionType; |
| SecHandle CredentialsHandle; |
| } KERB_RETRIEVE_TKT_REQUEST,*PKERB_RETRIEVE_TKT_REQUEST; |
| |
| typedef struct _KERB_RETRIEVE_TKT_RESPONSE { |
| KERB_EXTERNAL_TICKET Ticket; |
| } KERB_RETRIEVE_TKT_RESPONSE,*PKERB_RETRIEVE_TKT_RESPONSE; |
| |
| typedef struct _KERB_PURGE_TKT_CACHE_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| UNICODE_STRING ServerName; |
| UNICODE_STRING RealmName; |
| } KERB_PURGE_TKT_CACHE_REQUEST,*PKERB_PURGE_TKT_CACHE_REQUEST; |
| |
| #define KERB_PURGE_ALL_TICKETS 1 |
| |
| typedef struct _KERB_PURGE_TKT_CACHE_EX_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| ULONG Flags; |
| KERB_TICKET_CACHE_INFO_EX TicketTemplate; |
| } KERB_PURGE_TKT_CACHE_EX_REQUEST,*PKERB_PURGE_TKT_CACHE_EX_REQUEST; |
| |
| typedef struct _KERB_SUBMIT_TKT_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| ULONG Flags; |
| KERB_CRYPTO_KEY32 Key; |
| ULONG KerbCredSize; |
| ULONG KerbCredOffset; |
| } KERB_SUBMIT_TKT_REQUEST, *PKERB_SUBMIT_TKT_REQUEST; |
| |
| #if _WIN32_WINNT >= 0x0602 |
| |
| typedef struct _KERB_QUERY_KDC_PROXY_CACHE_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| LUID LogonId; |
| } KERB_QUERY_KDC_PROXY_CACHE_REQUEST, *PKERB_QUERY_KDC_PROXY_CACHE_REQUEST; |
| |
| typedef struct _KDC_PROXY_CACHE_ENTRY_DATA { |
| ULONG64 SinceLastUsed; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING ProxyServerName; |
| UNICODE_STRING ProxyServerVdir; |
| USHORT ProxyServerPort; |
| LUID LogonId; |
| UNICODE_STRING CredUserName; |
| UNICODE_STRING CredDomainName; |
| BOOLEAN GlobalCache; |
| } KDC_PROXY_CACHE_ENTRY_DATA, *PKDC_PROXY_CACHE_ENTRY_DATA; |
| |
| typedef struct _KERB_QUERY_KDC_PROXY_CACHE_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfEntries; |
| PKDC_PROXY_CACHE_ENTRY_DATA Entries; |
| } KERB_QUERY_KDC_PROXY_CACHE_RESPONSE, *PKERB_QUERY_KDC_PROXY_CACHE_RESPONSE; |
| |
| typedef struct _KERB_PURGE_KDC_PROXY_CACHE_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| LUID LogonId; |
| } KERB_PURGE_KDC_PROXY_CACHE_REQUEST, *PKERB_PURGE_KDC_PROXY_CACHE_REQUEST; |
| |
| typedef struct _KERB_PURGE_KDC_PROXY_CACHE_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfPurged; |
| } KERB_PURGE_KDC_PROXY_CACHE_RESPONSE, *PKERB_PURGE_KDC_PROXY_CACHE_RESPONSE; |
| |
| #define KERB_S4U2PROXY_CACHE_ENTRY_INFO_FLAG_NEGATIVE 0x1 |
| |
| typedef struct _KERB_S4U2PROXY_CACHE_ENTRY_INFO { |
| UNICODE_STRING ServerName; |
| ULONG Flags; |
| NTSTATUS LastStatus; |
| LARGE_INTEGER Expiry; |
| } KERB_S4U2PROXY_CACHE_ENTRY_INFO, *PKERB_S4U2PROXY_CACHE_ENTRY_INFO; |
| |
| #define KERB_S4U2PROXY_CRED_FLAG_NEGATIVE 0x1 |
| |
| typedef struct _KERB_S4U2PROXY_CRED { |
| UNICODE_STRING UserName; |
| UNICODE_STRING DomainName; |
| ULONG Flags; |
| NTSTATUS LastStatus; |
| LARGE_INTEGER Expiry; |
| ULONG CountOfEntries; |
| PKERB_S4U2PROXY_CACHE_ENTRY_INFO Entries; |
| } KERB_S4U2PROXY_CRED, *PKERB_S4U2PROXY_CRED; |
| |
| typedef struct _KERB_QUERY_S4U2PROXY_CACHE_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| LUID LogonId; |
| } KERB_QUERY_S4U2PROXY_CACHE_REQUEST, *PKERB_QUERY_S4U2PROXY_CACHE_REQUEST; |
| |
| typedef struct _KERB_QUERY_S4U2PROXY_CACHE_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfCreds; |
| PKERB_S4U2PROXY_CRED Creds; |
| } KERB_QUERY_S4U2PROXY_CACHE_RESPONSE, *PKERB_QUERY_S4U2PROXY_CACHE_RESPONSE; |
| |
| #endif |
| |
| #if _WIN32_WINNT >= 0x0A00 |
| |
| typedef struct _KERB_RETRIEVE_KEY_TAB_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| UNICODE_STRING UserName; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING Password; |
| } KERB_RETRIEVE_KEY_TAB_REQUEST, *PKERB_RETRIEVE_KEY_TAB_REQUEST; |
| |
| typedef struct _KERB_RETRIEVE_KEY_TAB_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG KeyTabLength; |
| PUCHAR KeyTab; |
| } KERB_RETRIEVE_KEY_TAB_RESPONSE, *PKERB_RETRIEVE_KEY_TAB_RESPONSE; |
| |
| #define KERB_REFRESH_POLICY_KERBEROS 0x1 |
| #define KERB_REFRESH_POLICY_KDC 0x2 |
| |
| typedef struct _KERB_REFRESH_POLICY_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| } KERB_REFRESH_POLICY_REQUEST, *PKERB_REFRESH_POLICY_REQUEST; |
| |
| typedef struct _KERB_REFRESH_POLICY_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| } KERB_REFRESH_POLICY_RESPONSE, *PKERB_REFRESH_POLICY_RESPONSE; |
| |
| typedef struct _KERB_CLOUD_KERBEROS_DEBUG_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| } KERB_CLOUD_KERBEROS_DEBUG_REQUEST, *PKERB_CLOUD_KERBEROS_DEBUG_REQUEST; |
| |
| typedef struct _KERB_CLOUD_KERBEROS_DEBUG_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Version; |
| ULONG Length; |
| ULONG Data[ANYSIZE_ARRAY]; |
| } KERB_CLOUD_KERBEROS_DEBUG_RESPONSE, *PKERB_CLOUD_KERBEROS_DEBUG_RESPONSE; |
| |
| #define KERB_CLOUD_KERBEROS_DEBUG_DATA_VERSION 1 |
| |
| typedef struct _KERB_CLOUD_KERBEROS_DEBUG_DATA_V0 { |
| unsigned int EnabledByPolicy : 1; |
| unsigned int AsRepCallbackPresent : 1; |
| unsigned int AsRepCallbackUsed : 1; |
| unsigned int CloudReferralTgtAvailable : 1; |
| unsigned int SpnOracleConfigured : 1; |
| unsigned int KdcProxyPresent : 1; |
| } KERB_CLOUD_KERBEROS_DEBUG_DATA_V0, *PKERB_CLOUD_KERBEROS_DEBUG_DATA_V0; |
| |
| typedef struct _KERB_CLOUD_KERBEROS_DEBUG_DATA { |
| unsigned int EnabledByPolicy : 1; |
| unsigned int AsRepCallbackPresent : 1; |
| unsigned int AsRepCallbackUsed : 1; |
| unsigned int CloudReferralTgtAvailable : 1; |
| unsigned int SpnOracleConfigured : 1; |
| unsigned int KdcProxyPresent : 1; |
| unsigned int PublicKeyCredsPresent : 1; |
| unsigned int PasswordKeysPresent : 1; |
| unsigned int PasswordPresent : 1; |
| unsigned int AsRepSourceCred : 8; |
| } KERB_CLOUD_KERBEROS_DEBUG_DATA, *PKERB_CLOUD_KERBEROS_DEBUG_DATA; |
| |
| #endif /* _WIN32_WINNT >= 0x0A00 */ |
| |
| typedef struct _KERB_CHANGEPASSWORD_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING AccountName; |
| UNICODE_STRING OldPassword; |
| UNICODE_STRING NewPassword; |
| BOOLEAN Impersonating; |
| } KERB_CHANGEPASSWORD_REQUEST,*PKERB_CHANGEPASSWORD_REQUEST; |
| |
| typedef struct _KERB_SETPASSWORD_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| SecHandle CredentialsHandle; |
| ULONG Flags; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING AccountName; |
| UNICODE_STRING Password; |
| } KERB_SETPASSWORD_REQUEST,*PKERB_SETPASSWORD_REQUEST; |
| |
| typedef struct _KERB_SETPASSWORD_EX_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| SecHandle CredentialsHandle; |
| ULONG Flags; |
| UNICODE_STRING AccountRealm; |
| UNICODE_STRING AccountName; |
| UNICODE_STRING Password; |
| UNICODE_STRING ClientRealm; |
| UNICODE_STRING ClientName; |
| BOOLEAN Impersonating; |
| UNICODE_STRING KdcAddress; |
| ULONG KdcAddressType; |
| } KERB_SETPASSWORD_EX_REQUEST,*PKERB_SETPASSWORD_EX_REQUEST; |
| |
| #define DS_UNKNOWN_ADDRESS_TYPE 0 |
| #define KERB_SETPASS_USE_LOGONID 1 |
| #define KERB_SETPASS_USE_CREDHANDLE 2 |
| |
| typedef struct _KERB_DECRYPT_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| ULONG Flags; |
| LONG CryptoType; |
| LONG KeyUsage; |
| KERB_CRYPTO_KEY Key; |
| ULONG EncryptedDataSize; |
| ULONG InitialVectorSize; |
| PUCHAR InitialVector; |
| PUCHAR EncryptedData; |
| } KERB_DECRYPT_REQUEST,*PKERB_DECRYPT_REQUEST; |
| |
| #define KERB_DECRYPT_FLAG_DEFAULT_KEY 0x00000001 |
| |
| typedef struct _KERB_DECRYPT_RESPONSE { |
| UCHAR DecryptedData[ANYSIZE_ARRAY]; |
| } KERB_DECRYPT_RESPONSE,*PKERB_DECRYPT_RESPONSE; |
| |
| typedef struct _KERB_ADD_BINDING_CACHE_ENTRY_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| UNICODE_STRING RealmName; |
| UNICODE_STRING KdcAddress; |
| ULONG AddressType; |
| } KERB_ADD_BINDING_CACHE_ENTRY_REQUEST,*PKERB_ADD_BINDING_CACHE_ENTRY_REQUEST; |
| |
| typedef struct _KERB_REFRESH_SCCRED_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| UNICODE_STRING CredentialBlob; |
| LUID LogonId; |
| ULONG Flags; |
| } KERB_REFRESH_SCCRED_REQUEST,*PKERB_REFRESH_SCCRED_REQUEST; |
| |
| #define KERB_REFRESH_SCCRED_RELEASE 0x0 |
| #define KERB_REFRESH_SCCRED_GETTGT 0x1 |
| |
| typedef struct _KERB_ADD_CREDENTIALS_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| UNICODE_STRING UserName; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING Password; |
| LUID LogonId; |
| ULONG Flags; |
| } KERB_ADD_CREDENTIALS_REQUEST,*PKERB_ADD_CREDENTIALS_REQUEST; |
| |
| #define KERB_REQUEST_ADD_CREDENTIAL 1 |
| #define KERB_REQUEST_REPLACE_CREDENTIAL 2 |
| #define KERB_REQUEST_REMOVE_CREDENTIAL 4 |
| |
| #if _WIN32_WINNT >= 0x0600 |
| |
| typedef struct _KERB_ADD_CREDENTIALS_REQUEST_EX { |
| KERB_ADD_CREDENTIALS_REQUEST Credentials; |
| ULONG PrincipalNameCount; |
| UNICODE_STRING PrincipalNames[1]; |
| } KERB_ADD_CREDENTIALS_REQUEST_EX, *PKERB_ADD_CREDENTIALS_REQUEST_EX; |
| |
| #endif |
| |
| typedef struct _KERB_TRANSFER_CRED_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID OriginLogonId; |
| LUID DestinationLogonId; |
| ULONG Flags; |
| } KERB_TRANSFER_CRED_REQUEST,*PKERB_TRANSFER_CRED_REQUEST; |
| |
| #define KERB_TRANSFER_CRED_WITH_TICKETS 1 |
| #define KERB_TRANSFER_CRED_CLEANUP_CREDENTIALS 2 |
| |
| #if _WIN32_WINNT >= 0x0602 |
| |
| typedef struct _KERB_CLEANUP_MACHINE_PKINIT_CREDS_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| LUID LogonId; |
| } KERB_CLEANUP_MACHINE_PKINIT_CREDS_REQUEST, *PKERB_CLEANUP_MACHINE_PKINIT_CREDS_REQUEST; |
| |
| typedef struct _KERB_BINDING_CACHE_ENTRY_DATA { |
| ULONG64 DiscoveryTime; |
| UNICODE_STRING RealmName; |
| UNICODE_STRING KdcAddress; |
| ULONG AddressType; |
| ULONG Flags; |
| ULONG DcFlags; |
| ULONG CacheFlags; |
| UNICODE_STRING KdcName; |
| } KERB_BINDING_CACHE_ENTRY_DATA, *PKERB_BINDING_CACHE_ENTRY_DATA; |
| |
| typedef struct _KERB_QUERY_BINDING_CACHE_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG CountOfEntries; |
| PKERB_BINDING_CACHE_ENTRY_DATA Entries; |
| } KERB_QUERY_BINDING_CACHE_RESPONSE, *PKERB_QUERY_BINDING_CACHE_RESPONSE; |
| |
| typedef struct _KERB_ADD_BINDING_CACHE_ENTRY_EX_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| UNICODE_STRING RealmName; |
| UNICODE_STRING KdcAddress; |
| ULONG AddressType; |
| ULONG DcFlags; |
| } KERB_ADD_BINDING_CACHE_ENTRY_EX_REQUEST, *PKERB_ADD_BINDING_CACHE_ENTRY_EX_REQUEST; |
| |
| typedef struct _KERB_QUERY_BINDING_CACHE_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| } KERB_QUERY_BINDING_CACHE_REQUEST, *PKERB_QUERY_BINDING_CACHE_REQUEST; |
| |
| typedef struct _KERB_PURGE_BINDING_CACHE_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| } KERB_PURGE_BINDING_CACHE_REQUEST, *PKERB_PURGE_BINDING_CACHE_REQUEST; |
| |
| typedef struct _KERB_QUERY_DOMAIN_EXTENDED_POLICIES_REQUEST { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| UNICODE_STRING DomainName; |
| } KERB_QUERY_DOMAIN_EXTENDED_POLICIES_REQUEST, *PKERB_QUERY_DOMAIN_EXTENDED_POLICIES_REQUEST; |
| |
| #define KERB_QUERY_DOMAIN_EXTENDED_POLICIES_RESPONSE_FLAG_DAC_DISABLED 1 |
| |
| typedef struct _KERB_QUERY_DOMAIN_EXTENDED_POLICIES_RESPONSE { |
| KERB_PROTOCOL_MESSAGE_TYPE MessageType; |
| ULONG Flags; |
| ULONG ExtendedPolicies; |
| ULONG DsFlags; |
| } KERB_QUERY_DOMAIN_EXTENDED_POLICIES_RESPONSE, *PKERB_QUERY_DOMAIN_EXTENDED_POLICIES_RESPONSE; |
| |
| typedef enum _KERB_CERTIFICATE_INFO_TYPE { |
| CertHashInfo = 1 |
| } KERB_CERTIFICATE_INFO_TYPE, *PKERB_CERTIFICATE_INFO_TYPE; |
| |
| typedef struct _KERB_CERTIFICATE_HASHINFO { |
| USHORT StoreNameLength; |
| USHORT HashLength; |
| } KERB_CERTIFICATE_HASHINFO, *PKERB_CERTIFICATE_HASHINFO; |
| |
| typedef struct _KERB_CERTIFICATE_INFO { |
| ULONG CertInfoSize; |
| ULONG InfoType; |
| } KERB_CERTIFICATE_INFO, *PKERB_CERTIFICATE_INFO; |
| |
| #endif |
| |
| #define PER_USER_POLICY_UNCHANGED 0x00 |
| #define PER_USER_AUDIT_SUCCESS_INCLUDE 0x01 |
| #define PER_USER_AUDIT_SUCCESS_EXCLUDE 0x02 |
| #define PER_USER_AUDIT_FAILURE_INCLUDE 0x04 |
| #define PER_USER_AUDIT_FAILURE_EXCLUDE 0x08 |
| #define PER_USER_AUDIT_NONE 0x10 |
| |
| #define VALID_PER_USER_AUDIT_POLICY_FLAG (PER_USER_AUDIT_SUCCESS_INCLUDE | PER_USER_AUDIT_SUCCESS_EXCLUDE | PER_USER_AUDIT_FAILURE_INCLUDE | PER_USER_AUDIT_FAILURE_EXCLUDE | PER_USER_AUDIT_NONE) |
| |
| typedef struct _AUDIT_POLICY_INFORMATION { |
| GUID AuditSubCategoryGuid; |
| ULONG AuditingInformation; |
| GUID AuditCategoryGuid; |
| } AUDIT_POLICY_INFORMATION, *PAUDIT_POLICY_INFORMATION; |
| typedef const PAUDIT_POLICY_INFORMATION PCAUDIT_POLICY_INFORMATION, LPCAUDIT_POLICY_INFORMATION; |
| |
| #define AUDIT_SET_SYSTEM_POLICY 0x0001 |
| #define AUDIT_QUERY_SYSTEM_POLICY 0x0002 |
| #define AUDIT_SET_USER_POLICY 0x0004 |
| #define AUDIT_QUERY_USER_POLICY 0x0008 |
| #define AUDIT_ENUMERATE_USERS 0x0010 |
| #define AUDIT_SET_MISC_POLICY 0x0020 |
| #define AUDIT_QUERY_MISC_POLICY 0x0040 |
| |
| #define AUDIT_GENERIC_ALL (STANDARD_RIGHTS_REQUIRED | AUDIT_SET_SYSTEM_POLICY | AUDIT_QUERY_SYSTEM_POLICY | \ |
| AUDIT_SET_USER_POLICY | AUDIT_QUERY_USER_POLICY | AUDIT_ENUMERATE_USERS | \ |
| AUDIT_SET_MISC_POLICY | AUDIT_QUERY_MISC_POLICY) |
| |
| #define AUDIT_GENERIC_READ (STANDARD_RIGHTS_READ | AUDIT_QUERY_SYSTEM_POLICY | AUDIT_QUERY_USER_POLICY | \ |
| AUDIT_ENUMERATE_USERS | AUDIT_QUERY_MISC_POLICY) |
| |
| #define AUDIT_GENERIC_WRITE (STANDARD_RIGHTS_WRITE | AUDIT_SET_USER_POLICY | AUDIT_SET_MISC_POLICY | \ |
| AUDIT_SET_SYSTEM_POLICY) |
| |
| #define AUDIT_GENERIC_EXECUTE STANDARD_RIGHTS_EXECUTE |
| |
| typedef struct _POLICY_AUDIT_SID_ARRAY { |
| ULONG UsersCount; |
| PSID *UserSidArray; |
| } POLICY_AUDIT_SID_ARRAY, *PPOLICY_AUDIT_SID_ARRAY; |
| |
| #if _WIN32_WINNT >= 0x0600 |
| |
| #define KERB_CERTIFICATE_LOGON_FLAG_CHECK_DUPLICATES 0x1 |
| #define KERB_CERTIFICATE_LOGON_FLAG_USE_CERTIFICATE_INFO 0x2 |
| |
| typedef struct _KERB_CERTIFICATE_LOGON { |
| KERB_LOGON_SUBMIT_TYPE MessageType; |
| UNICODE_STRING DomainName; |
| UNICODE_STRING UserName; |
| UNICODE_STRING Pin; |
| ULONG Flags; |
| ULONG CspDataLength; |
| PUCHAR CspData; |
| } KERB_CERTIFICATE_LOGON, *PKERB_CERTIFICATE_LOGON; |
| |
| typedef struct _KERB_CERTIFICATE_UNLOCK_LOGON { |
| KERB_CERTIFICATE_LOGON Logon; |
| LUID LogonId; |
| } KERB_CERTIFICATE_UNLOCK_LOGON, *PKERB_CERTIFICATE_UNLOCK_LOGON; |
| |
| #define KERB_CERTIFICATE_S4U_LOGON_FLAG_CHECK_DUPLICATES 0x1 |
| #define KERB_CERTIFICATE_S4U_LOGON_FLAG_CHECK_LOGONHOURS 0x2 |
| #define KERB_CERTIFICATE_S4U_LOGON_FLAG_FAIL_IF_NT_AUTH_POLICY_REQUIRED 0x4 |
| #define KERB_CERTIFICATE_S4U_LOGON_FLAG_IDENTIFY 0x8 |
| |
| typedef struct _KERB_CERTIFICATE_S4U_LOGON { |
| KERB_LOGON_SUBMIT_TYPE MessageType; |
| ULONG Flags; |
| UNICODE_STRING UserPrincipalName; |
| UNICODE_STRING DomainName; |
| ULONG CertificateLength; |
| PUCHAR Certificate; |
| } KERB_CERTIFICATE_S4U_LOGON, *PKERB_CERTIFICATE_S4U_LOGON; |
| |
| typedef struct _KERB_SMARTCARD_CSP_INFO { |
| DWORD dwCspInfoLen; |
| DWORD MessageType; |
| __C89_NAMELESS union { |
| PVOID ContextInformation; |
| ULONG64 SpaceHolderForWow64; |
| }; |
| DWORD flags; |
| DWORD KeySpec; |
| ULONG nCardNameOffset; |
| ULONG nReaderNameOffset; |
| ULONG nContainerNameOffset; |
| ULONG nCSPNameOffset; |
| TCHAR bBuffer; |
| } KERB_SMARTCARD_CSP_INFO, *PKERB_SMARTCARD_CSP_INFO; |
| |
| #endif |
| |
| BOOLEAN WINAPI AuditComputeEffectivePolicyBySid( |
| const PSID pSid, |
| const GUID *pSubCategoryGuids, |
| ULONG PolicyCount, |
| PAUDIT_POLICY_INFORMATION *ppAuditPolicy |
| ); |
| |
| VOID WINAPI AuditFree( |
| PVOID Buffer |
| ); |
| |
| BOOLEAN WINAPI AuditSetSystemPolicy( |
| PCAUDIT_POLICY_INFORMATION pAuditPolicy, |
| ULONG PolicyCount |
| ); |
| |
| BOOLEAN WINAPI AuditQuerySystemPolicy( |
| const GUID *pSubCategoryGuids, |
| ULONG PolicyCount, |
| PAUDIT_POLICY_INFORMATION *ppAuditPolicy |
| ); |
| |
| BOOLEAN WINAPI AuditSetPerUserPolicy( |
| const PSID pSid, |
| PCAUDIT_POLICY_INFORMATION pAuditPolicy, |
| ULONG PolicyCount |
| ); |
| |
| BOOLEAN WINAPI AuditQueryPerUserPolicy( |
| const PSID pSid, |
| const GUID *pSubCategoryGuids, |
| ULONG PolicyCount, |
| PAUDIT_POLICY_INFORMATION *ppAuditPolicy |
| ); |
| |
| BOOLEAN WINAPI AuditComputeEffectivePolicyByToken( |
| HANDLE hTokenHandle, |
| const GUID *pSubCategoryGuids, |
| ULONG PolicyCount, |
| PAUDIT_POLICY_INFORMATION *ppAuditPolicy |
| ); |
| |
| BOOLEAN WINAPI AuditEnumerateCategories( |
| GUID **ppAuditCategoriesArray, |
| PULONG pCountReturned |
| ); |
| |
| BOOLEAN WINAPI AuditEnumeratePerUserPolicy( |
| PPOLICY_AUDIT_SID_ARRAY *ppAuditSidArray |
| ); |
| |
| BOOLEAN WINAPI AuditEnumerateSubCategories( |
| const GUID *pAuditCategoryGuid, |
| BOOLEAN bRetrieveAllSubCategories, |
| GUID **ppAuditSubCategoriesArray, |
| PULONG pCountReturned |
| ); |
| |
| BOOLEAN WINAPI AuditLookupCategoryGuidFromCategoryId( |
| POLICY_AUDIT_EVENT_TYPE AuditCategoryId, |
| GUID *pAuditCategoryGuid |
| ); |
| |
| BOOLEAN WINAPI AuditQuerySecurity( |
| SECURITY_INFORMATION SecurityInformation, |
| PSECURITY_DESCRIPTOR *ppSecurityDescriptor |
| ); |
| |
| #define AuditLookupSubCategoryName __MINGW_NAME_AW(AuditLookupSubCategoryName) |
| #define AuditLookupCategoryName __MINGW_NAME_AW(AuditLookupCategoryName) |
| |
| BOOLEAN WINAPI AuditLookupSubCategoryNameA( |
| const GUID *pAuditSubCategoryGuid, |
| LPSTR *ppszSubCategoryName |
| ); |
| |
| BOOLEAN WINAPI AuditLookupSubCategoryNameW( |
| const GUID *pAuditSubCategoryGuid, |
| LPWSTR *ppszSubCategoryName |
| ); |
| |
| BOOLEAN WINAPI AuditLookupCategoryNameA( |
| const GUID *pAuditCategoryGuid, |
| LPSTR *ppszCategoryName |
| ); |
| |
| BOOLEAN WINAPI AuditLookupCategoryNameW( |
| const GUID *pAuditCategoryGuid, |
| LPWSTR *ppszCategoryName |
| ); |
| |
| BOOLEAN WINAPI AuditLookupCategoryIdFromCategoryGuid( |
| const GUID *pAuditCategoryGuid, |
| PPOLICY_AUDIT_EVENT_TYPE pAuditCategoryId |
| ); |
| |
| BOOLEAN WINAPI AuditSetSecurity( |
| SECURITY_INFORMATION SecurityInformation, |
| PSECURITY_DESCRIPTOR pSecurityDescriptor |
| ); |
| |
| BOOLEAN NTAPI AuditSetGlobalSaclW( |
| PCWSTR ObjectTypeName, |
| PACL Acl |
| ); |
| |
| BOOLEAN NTAPI AuditSetGlobalSaclA( |
| PCSTR ObjectTypeName, |
| PACL Acl |
| ); |
| |
| #define AuditSetGlobalSacl __MINGW_NAME_AW(AuditSetGlobalSacl) |
| |
| BOOLEAN NTAPI AuditQueryGlobalSaclW( |
| PCWSTR ObjectTypeName, |
| PACL *Acl |
| ); |
| |
| BOOLEAN NTAPI AuditQueryGlobalSaclA( |
| PCSTR ObjectTypeName, |
| PACL *Acl |
| ); |
| |
| #define AuditQueryGlobalSacl __MINGW_NAME_AW(AuditQueryGlobalSacl) |
| |
| #if _WIN32_WINNT >= 0x0601 |
| |
| #define PKU2U_PACKAGE_NAME_A "pku2u" |
| #define PKU2U_PACKAGE_NAME L"pku2u" |
| #define PKU2U_PACKAGE_NAME_W PKU2U_PACKAGE_NAME |
| |
| typedef struct _PKU2U_CERT_BLOB { |
| ULONG CertOffset; |
| USHORT CertLength; |
| } PKU2U_CERT_BLOB, *PPKU2U_CERT_BLOB; |
| |
| #define PKU2U_CREDUI_CONTEXT_VERSION 0x4154414454524543 |
| |
| typedef struct _PKU2U_CREDUI_CONTEXT { |
| ULONG64 Version; |
| USHORT cbHeaderLength; |
| ULONG cbStructureLength; |
| USHORT CertArrayCount; |
| ULONG CertArrayOffset; |
| } PKU2U_CREDUI_CONTEXT, *PPKU2U_CREDUI_CONTEXT; |
| |
| typedef enum _PKU2U_LOGON_SUBMIT_TYPE { |
| Pku2uCertificateS4ULogon = 14 |
| } PKU2U_LOGON_SUBMIT_TYPE, *PPKU2U_LOGON_SUBMIT_TYPE; |
| |
| typedef struct _PKU2U_CERTIFICATE_S4U_LOGON { |
| PKU2U_LOGON_SUBMIT_TYPE MessageType; |
| ULONG Flags; |
| UNICODE_STRING UserPrincipalName; |
| UNICODE_STRING DomainName; |
| ULONG CertificateLength; |
| PUCHAR Certificate; |
| } PKU2U_CERTIFICATE_S4U_LOGON, *PPKU2U_CERTIFICATE_S4U_LOGON; |
| |
| #endif |
| |
| #ifdef __cplusplus |
| } |
| #endif |
| #endif |