ULONG MessageType;
NTSTATUS Status;
- TRACE("()\n");
+ TRACE("LsaApCallPackage()\n");
if (SubmitBufferLength < sizeof(MSV1_0_PROTOCOL_MESSAGE_TYPE))
return STATUS_INVALID_PARAMETER;
OUT PULONG ReturnBufferLength,
OUT PNTSTATUS ProtocolStatus)
{
- TRACE("()\n");
+ TRACE("LsaApCallPackagePassthrough()\n");
return STATUS_NOT_IMPLEMENTED;
}
OUT PULONG ReturnBufferLength,
OUT PNTSTATUS ProtocolStatus)
{
- TRACE("()\n");
+ TRACE("LsaApCallPackageUntrusted()\n");
return STATUS_NOT_IMPLEMENTED;
}
PANSI_STRING NameString;
PCHAR NameBuffer;
- TRACE("(%lu %p %p %p %p)\n",
+ TRACE("LsaApInitializePackage(%lu %p %p %p %p)\n",
AuthenticationPackageId, LsaDispatchTable, Database,
Confidentiality, AuthenticationPackageName);
NTAPI
LsaApLogonTerminated(IN PLUID LogonId)
{
- TRACE("()\n");
+ TRACE("LsaApLogonTerminated()\n");
}
*ProfileBuffer = NULL;
*ProfileBufferLength = 0;
*SubStatus = STATUS_SUCCESS;
+ *AccountName = NULL;
+ *AuthenticatingAuthority = NULL;
if (LogonType == Interactive ||
LogonType == Batch ||
}
}
+ /* Return the authenticating authority */
+ *AuthenticatingAuthority = DispatchTable.AllocateLsaHeap(sizeof(UNICODE_STRING));
+ if (*AuthenticatingAuthority != NULL)
+ {
+ (*AuthenticatingAuthority)->Buffer = DispatchTable.AllocateLsaHeap(LogonInfo->LogonDomainName.Length +
+ sizeof(UNICODE_NULL));
+ if ((*AuthenticatingAuthority)->Buffer != NULL)
+ {
+ (*AuthenticatingAuthority)->MaximumLength = LogonInfo->LogonDomainName.Length +
+ sizeof(UNICODE_NULL);
+ RtlCopyUnicodeString(*AuthenticatingAuthority, &LogonInfo->LogonDomainName);
+ }
+ }
+
if (!NT_SUCCESS(Status))
{
if (SessionCreated != FALSE)