Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

94 lines
3.1 KiB

  1. /****************************************************************************/
  2. // asmapi.h
  3. //
  4. // Security Manager API
  5. //
  6. // Copyright (C) 1997-1999 Microsoft Corporation
  7. /****************************************************************************/
  8. #ifndef _H_ASMAPI
  9. #define _H_ASMAPI
  10. #include <anmapi.h>
  11. #include "license.h"
  12. #include <tssec.h>
  13. #include <at120ex.h>
  14. #ifdef __cplusplus
  15. extern "C" {
  16. #endif /* __cplusplus */
  17. void RDPCALL SM_OnConnected(PVOID, UINT32, UINT32, PRNS_UD_SC_NET, UINT32);
  18. void RDPCALL SM_OnDisconnected(PVOID, UINT32, UINT32);
  19. unsigned RDPCALL SM_GetDataSize(void);
  20. NTSTATUS RDPCALL SM_Init(PVOID pSMHandle,
  21. PTSHARE_WD pWDHandle,
  22. BOOLEAN bOldShadow);
  23. BOOL RDPCALL SM_Register(PVOID pSMHandle,
  24. PUINT32 pMaxPDUSize,
  25. PUINT32 pUserID);
  26. void RDPCALL SM_Term(PVOID pSMHandle);
  27. NTSTATUS RDPCALL SM_Connect(PVOID pSMHandle,
  28. PRNS_UD_CS_SEC pUserDataIn,
  29. PRNS_UD_CS_NET pNetUserData,
  30. BOOLEAN bOldShadow);
  31. BOOL RDPCALL SM_Disconnect(PVOID pSMHandle);
  32. NTSTATUS __fastcall SM_AllocBuffer(PVOID pSMHandle,
  33. PPVOID ppBuffer,
  34. UINT32 bufferLen,
  35. BOOLEAN fWait,
  36. BOOLEAN fForceEncypt);
  37. void __fastcall SM_FreeBuffer(PVOID pSMHandle, PVOID pBuffer, BOOLEAN fForceEncrypt);
  38. BOOL __fastcall SM_SendData(PVOID, PVOID, UINT32, UINT32, UINT32, BOOL, UINT16, BOOLEAN);
  39. void RDPCALL SM_Dead(PVOID pSMHandle, BOOL dead);
  40. NTSTATUS RDPCALL SM_GetSecurityData(PVOID pSMHandle, PSD_IOCTL pSdIoctl);
  41. NTSTATUS RDPCALL SM_SetSecurityData(PVOID pSMHandle, PSECINFO pSecInfo);
  42. void RDPCALL SM_LicenseOK(PVOID pSMHandle);
  43. void RDPCALL SM_DecodeFastPathInput(void *, BYTE *, unsigned, BOOL, unsigned, BOOL);
  44. BOOLEAN __fastcall SM_MCSSendDataCallback(BYTE *pData,
  45. unsigned DataLength,
  46. void *UserDefined,
  47. UserHandle hUser,
  48. BOOLEAN bUniform,
  49. ChannelHandle hChannel,
  50. MCSPriority Priority,
  51. UserID SenderID,
  52. Segmentation Segmentation);
  53. BOOL RDPCALL SM_IsSecurityExchangeCompleted(PVOID, CERT_TYPE *);
  54. // Used for shadowing
  55. VOID RDPCALL SM_GetEncryptionMethods(PVOID pSMHandle, PRNS_UD_CS_SEC pSecurityData);
  56. NTSTATUS RDPCALL SM_GetDefaultSecuritySettings(PRNS_UD_CS_SEC pClientSecurityData);
  57. NTSTATUS RDPCALL SM_SetEncryptionParams(PVOID pSMHandle, ULONG ulLevel,
  58. ULONG ulMethod);
  59. NTSTATUS RDPCALL SM_SetSafeChecksumMethod(
  60. PVOID pSMHandle,
  61. BOOLEAN fSafeChecksumMethod
  62. );
  63. #ifdef __cplusplus
  64. }
  65. #endif /* __cplusplus */
  66. #endif // _H_ASMAPI