[KSECDD]
[reactos.git] / reactos / drivers / crypto / ksecdd / stubs.c
1 /*
2 * PROJECT: ReactOS Drivers
3 * COPYRIGHT: See COPYING in the top level directory
4 * PURPOSE: Kernel Security Support Provider Interface Driver
5 *
6 * PROGRAMMERS: Timo Kreuzer (timo.kreuzer@reactos.org)
7 */
8
9 /* INCLUDES *******************************************************************/
10
11 #include "ksecdd.h"
12
13 #define NDEBUG
14 #include <debug.h>
15
16
17 /* FUNCTIONS ******************************************************************/
18
19 SECURITY_STATUS
20 SEC_ENTRY
21 AcceptSecurityContext(
22 _In_opt_ PCredHandle phCredential,
23 _In_opt_ PCtxtHandle phContext,
24 _In_opt_ PSecBufferDesc pInput,
25 _In_ ULONG fContextReq,
26 _In_ ULONG TargetDataRep,
27 _In_opt_ PCtxtHandle phNewContext,
28 _In_opt_ PSecBufferDesc pOutput,
29 _Out_ PULONG pfContextAttr,
30 _Out_opt_ PTimeStamp ptsExpiry)
31 {
32 UNIMPLEMENTED_DBGBREAK();
33 return 0;
34 }
35
36 SECURITY_STATUS
37 SEC_ENTRY
38 AcquireCredentialsHandleW(
39 _In_opt_ PSSPI_SEC_STRING pPrincipal,
40 _In_ PSSPI_SEC_STRING pPackage,
41 _In_ ULONG fCredentialUse,
42 _In_opt_ PVOID pvLogonId,
43 _In_opt_ PVOID pAuthData,
44 _In_opt_ SEC_GET_KEY_FN pGetKeyFn,
45 _In_opt_ PVOID pvGetKeyArgument,
46 _Out_ PCredHandle phCredential,
47 _Out_opt_ PTimeStamp ptsExpiry)
48 {
49 UNIMPLEMENTED_DBGBREAK();
50 return 0;
51 }
52
53 SECURITY_STATUS
54 SEC_ENTRY
55 AddCredentialsW(
56 _In_ PCredHandle hCredentials,
57 _In_opt_ PSSPI_SEC_STRING pPrincipal,
58 _In_ PSSPI_SEC_STRING pPackage,
59 _In_ ULONG fCredentialUse,
60 _In_opt_ PVOID pAuthData,
61 _In_opt_ SEC_GET_KEY_FN pGetKeyFn,
62 _In_opt_ PVOID pvGetKeyArgument,
63 _Out_opt_ PTimeStamp ptsExpiry)
64 {
65 UNIMPLEMENTED_DBGBREAK();
66 return 0;
67 }
68
69 SECURITY_STATUS
70 SEC_ENTRY
71 ApplyControlToken(
72 _In_ PCtxtHandle phContext,
73 _In_ PSecBufferDesc pInput)
74 {
75 UNIMPLEMENTED_DBGBREAK();
76 return 0;
77 }
78
79 VOID
80 SEC_ENTRY
81 CredMarshalTargetInfo(VOID)
82 {
83 UNIMPLEMENTED_DBGBREAK();
84 }
85
86 SECURITY_STATUS
87 SEC_ENTRY
88 DeleteSecurityContext(
89 _In_ PCtxtHandle phContext)
90 {
91 UNIMPLEMENTED_DBGBREAK();
92 return 0;
93 }
94
95 VOID
96 SEC_ENTRY
97 EfsDecryptFek(VOID)
98 {
99 UNIMPLEMENTED_DBGBREAK();
100 }
101
102 VOID
103 SEC_ENTRY
104 EfsGenerateKey(VOID)
105 {
106 UNIMPLEMENTED_DBGBREAK();
107 }
108
109 SECURITY_STATUS
110 SEC_ENTRY
111 EnumerateSecurityPackagesW(
112 _Out_ PULONG pcPackages,
113 _Deref_out_ PSecPkgInfoW* ppPackageInfo)
114 {
115 UNIMPLEMENTED_DBGBREAK();
116 return 0;
117 }
118
119 SECURITY_STATUS
120 SEC_ENTRY
121 ExportSecurityContext(
122 _In_ PCtxtHandle phContext,
123 _In_ ULONG fFlags,
124 _Out_ PSecBuffer pPackedContext,
125 _Out_ PVOID* pToken)
126 {
127 UNIMPLEMENTED_DBGBREAK();
128 return 0;
129 }
130
131 SECURITY_STATUS
132 SEC_ENTRY
133 FreeContextBuffer(
134 _Inout_ PVOID pvContextBuffer)
135 {
136 UNIMPLEMENTED_DBGBREAK();
137 return 0;
138 }
139
140 SECURITY_STATUS
141 SEC_ENTRY
142 FreeCredentialsHandle(
143 _In_ PCredHandle phCredential)
144 {
145 UNIMPLEMENTED_DBGBREAK();
146 return 0;
147 }
148
149 VOID
150 SEC_ENTRY
151 GenerateDirEfs(VOID)
152 {
153 UNIMPLEMENTED_DBGBREAK();
154 }
155
156 VOID
157 SEC_ENTRY
158 GenerateSessionKey(VOID)
159 {
160 UNIMPLEMENTED_DBGBREAK();
161 }
162
163 VOID
164 SEC_ENTRY
165 GetSecurityUserInfo(VOID)
166 {
167 UNIMPLEMENTED_DBGBREAK();
168 }
169
170 SECURITY_STATUS
171 SEC_ENTRY
172 ImpersonateSecurityContext(
173 _In_ PCtxtHandle phContext)
174 {
175 UNIMPLEMENTED_DBGBREAK();
176 return 0;
177 }
178
179 SECURITY_STATUS
180 SEC_ENTRY
181 ImportSecurityContextW(
182 _In_ PSSPI_SEC_STRING pszPackage,
183 _In_ PSecBuffer pPackedContext,
184 _In_ PVOID Token,
185 _Out_ PCtxtHandle phContext)
186 {
187 UNIMPLEMENTED_DBGBREAK();
188 return 0;
189 }
190
191 SECURITY_STATUS
192 SEC_ENTRY
193 InitializeSecurityContextW(
194 _In_opt_ PCredHandle phCredential,
195 _In_opt_ PCtxtHandle phContext,
196 _In_opt_ PSSPI_SEC_STRING pTargetName,
197 _In_ ULONG fContextReq,
198 _In_ ULONG Reserved1,
199 _In_ ULONG TargetDataRep,
200 _In_opt_ PSecBufferDesc pInput,
201 _In_ ULONG Reserved2,
202 _Inout_opt_ PCtxtHandle phNewContext,
203 _Inout_opt_ PSecBufferDesc pOutput,
204 _Out_ PULONG pfContextAttr,
205 _Out_opt_ PTimeStamp ptsExpiry)
206 {
207 UNIMPLEMENTED_DBGBREAK();
208 return 0;
209 }
210
211 VOID
212 SEC_ENTRY
213 KSecRegisterSecurityProvider(VOID)
214 {
215 UNIMPLEMENTED_DBGBREAK();
216 }
217
218 VOID
219 SEC_ENTRY
220 KSecValidateBuffer(VOID)
221 {
222 UNIMPLEMENTED_DBGBREAK();
223 }
224
225 VOID
226 SEC_ENTRY
227 LsaEnumerateLogonSessions(VOID)
228 {
229 UNIMPLEMENTED_DBGBREAK();
230 }
231
232 VOID
233 SEC_ENTRY
234 LsaGetLogonSessionData(VOID)
235 {
236 UNIMPLEMENTED_DBGBREAK();
237 }
238
239 SECURITY_STATUS
240 SEC_ENTRY
241 MakeSignature(
242 _In_ PCtxtHandle phContext,
243 _In_ ULONG fQOP,
244 _In_ PSecBufferDesc pMessage,
245 _In_ ULONG MessageSeqNo)
246 {
247 UNIMPLEMENTED_DBGBREAK();
248 return 0;
249 }
250
251 VOID
252 SEC_ENTRY
253 MapSecurityError(VOID)
254 {
255 UNIMPLEMENTED_DBGBREAK();
256 }
257
258 SECURITY_STATUS
259 SEC_ENTRY
260 QueryContextAttributesW(
261 _In_ PCtxtHandle phContext,
262 _In_ ULONG ulAttribute,
263 _Out_ PVOID pBuffer)
264 {
265 UNIMPLEMENTED_DBGBREAK();
266 return 0;
267 }
268
269 SECURITY_STATUS
270 SEC_ENTRY
271 QueryCredentialsAttributesW(
272 _In_ PCredHandle phCredential,
273 _In_ ULONG ulAttribute,
274 _Inout_ PVOID pBuffer)
275 {
276 UNIMPLEMENTED_DBGBREAK();
277 return 0;
278 }
279
280 SECURITY_STATUS
281 SEC_ENTRY
282 QuerySecurityContextToken(
283 _In_ PCtxtHandle phContext,
284 _Out_ PVOID* Token)
285 {
286 UNIMPLEMENTED_DBGBREAK();
287 return 0;
288 }
289
290 SECURITY_STATUS
291 SEC_ENTRY
292 QuerySecurityPackageInfoW(
293 _In_ PSSPI_SEC_STRING pPackageName,
294 _Deref_out_ PSecPkgInfoW *ppPackageInfo)
295 {
296 UNIMPLEMENTED_DBGBREAK();
297 return 0;
298 }
299
300 SECURITY_STATUS
301 SEC_ENTRY
302 RevertSecurityContext(
303 _In_ PCtxtHandle phContext)
304 {
305 UNIMPLEMENTED_DBGBREAK();
306 return 0;
307 }
308
309 VOID
310 SEC_ENTRY
311 SealMessage(VOID)
312 {
313 UNIMPLEMENTED_DBGBREAK();
314 }
315
316 NTSTATUS
317 SEC_ENTRY
318 SecLookupAccountName(
319 _In_ PUNICODE_STRING Name,
320 _Inout_ PULONG SidSize,
321 _Out_ PSID Sid,
322 _Out_ PSID_NAME_USE NameUse,
323 _Out_opt_ PULONG DomainSize,
324 _Inout_opt_ PUNICODE_STRING ReferencedDomain)
325 {
326 UNIMPLEMENTED_DBGBREAK();
327 return 0;
328 }
329
330 NTSTATUS
331 SEC_ENTRY
332 SecLookupAccountSid(
333 _In_ PSID Sid,
334 _Out_ PULONG NameSize,
335 _Inout_ PUNICODE_STRING NameBuffer,
336 _Out_ PULONG DomainSize OPTIONAL,
337 _Out_opt_ PUNICODE_STRING DomainBuffer,
338 _Out_ PSID_NAME_USE NameUse)
339 {
340 UNIMPLEMENTED_DBGBREAK();
341 return 0;
342 }
343
344 NTSTATUS
345 SEC_ENTRY
346 SecLookupWellKnownSid(
347 _In_ WELL_KNOWN_SID_TYPE SidType,
348 _Out_ PSID Sid,
349 _In_ ULONG SidBufferSize,
350 _Inout_opt_ PULONG SidSize)
351 {
352 UNIMPLEMENTED_DBGBREAK();
353 return 0;
354 }
355
356 NTSTATUS
357 NTAPI
358 SecMakeSPN(
359 _In_ PUNICODE_STRING ServiceClass,
360 _In_ PUNICODE_STRING ServiceName,
361 _In_opt_ PUNICODE_STRING InstanceName,
362 _In_opt_ USHORT InstancePort,
363 _In_opt_ PUNICODE_STRING Referrer,
364 _Inout_ PUNICODE_STRING Spn,
365 _Out_opt_ PULONG Length,
366 _In_ BOOLEAN Allocate)
367 {
368 UNIMPLEMENTED_DBGBREAK();
369 return 0;
370 }
371
372 NTSTATUS
373 NTAPI
374 SecMakeSPNEx(
375 _In_ PUNICODE_STRING ServiceClass,
376 _In_ PUNICODE_STRING ServiceName,
377 _In_opt_ PUNICODE_STRING InstanceName,
378 _In_opt_ USHORT InstancePort,
379 _In_opt_ PUNICODE_STRING Referrer,
380 _In_opt_ PUNICODE_STRING TargetInfo,
381 _Inout_ PUNICODE_STRING Spn,
382 _Out_opt_ PULONG Length,
383 _In_ BOOLEAN Allocate)
384 {
385 UNIMPLEMENTED_DBGBREAK();
386 return 0;
387 }
388
389 VOID
390 SEC_ENTRY
391 SecSetPagingMode(VOID)
392 {
393 UNIMPLEMENTED_DBGBREAK();
394 }
395 VOID
396 SEC_ENTRY
397 UnsealMessage(VOID)
398 {
399 UNIMPLEMENTED_DBGBREAK();
400 }
401
402 SECURITY_STATUS
403 SEC_ENTRY
404 VerifySignature(
405 _In_ PCtxtHandle phContext,
406 _In_ PSecBufferDesc pMessage,
407 _In_ ULONG MessageSeqNo,
408 _Out_ PULONG pfQOP)
409 {
410 UNIMPLEMENTED_DBGBREAK();
411 return 0;
412 }