windows-nt/Source/XPSP1/NT/ds/security/inc/keysvcc.h
2020-09-26 16:20:57 +08:00

200 lines
9.1 KiB
C

//depot/Lab03_N/DS/security/inc/keysvcc.h#8 - edit change 8790 (text)
//depot/Lab03_N/DS/security/inc/keysvcc.h#5 - edit change 6380 (text)
//+-------------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (C) Microsoft Corporation, 1997 - 1999
//
// File: keysvcc.h
//
//--------------------------------------------------------------------------
#ifndef __keysvcc_h__
#define __keysvcc_h__
#ifdef __cplusplus
extern "C"{
#endif
#define KEYSVC_DEFAULT_ENDPOINT TEXT("\\pipe\\keysvc")
#define KEYSVC_DEFAULT_PROT_SEQ TEXT("ncacn_np")
#define KEYSVC_LOCAL_ENDPOINT TEXT("keysvc")
#define KEYSVC_LOCAL_PROT_SEQ TEXT("ncalrpc")
#define KEYSVC_LEGACY_ENDPOINT TEXT("\\pipe\\ntsvcs")
#define KEYSVC_LEGACY_PROT_SEQ TEXT("ncacn_np")
typedef void *KEYSVCC_HANDLE;
/****************************************
* Client API for Key Service
****************************************/
ULONG KeyOpenKeyService(
/* [in] */ LPSTR pszMachineName,
/* [in] */ KEYSVC_TYPE ulOwnerType,
/* [in] */ LPWSTR pwszOwnerName,
/* [in] */ void *pAuthentication,
/* [out][in] */ void *pReserved,
/* [out] */ KEYSVCC_HANDLE *phKeySvcCli);
ULONG KeyEnumerateProviders(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [out][in] */ void *pReserved,
/* [out][in] */ ULONG *pcProviderCount,
/* [size_is][size_is][out][in] */ PKEYSVC_PROVIDER_INFO *ppProviders);
ULONG KeyEnumerateProviderTypes(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [out][in] */ void *pReserved,
/* [out][in] */ ULONG *pcProviderCount,
/* [size_is][size_is][out][in] */ PKEYSVC_PROVIDER_INFO *ppProviders);
ULONG KeyEnumerateProvContainers(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ KEYSVC_PROVIDER_INFO Provider,
/* [in, out] */ void *pReserved,
/* [in, out] */ ULONG *pcContainerCount,
/* [in, out][size_is(,*pcContainerCount)] */
PKEYSVC_UNICODE_STRING *ppContainers);
ULONG KeyCloseKeyService(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [out][in] */ void *pReserved);
ULONG KeyGetDefaultProvider(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ ULONG ulProvType,
/* [in] */ ULONG ulFlags,
/* [out][in] */ void *pReserved,
/* [out] */ ULONG *pulDefType,
/* [out] */ PKEYSVC_PROVIDER_INFO *ppProvider);
ULONG KeySetDefaultProvider(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ ULONG ulFlags,
/* [out][in] */ void *pReserved,
/* [in] */ KEYSVC_PROVIDER_INFO Provider);
ULONG KeyEnroll(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ LPSTR pszMachineName, //IN Required: name of the remote machine
/* [in] */ BOOL fKeyService, //IN Required: Whether the function is called remotely
/* [in] */ DWORD dwPurpose, //IN Required: Indicates type of request - enroll/renew
/* [in] */ LPWSTR pwszAcctName, //IN Optional: Account name the service runs under
/* [in] */ void *pAuthentication, //RESERVED must be NULL
/* [in] */ BOOL fEnroll, //IN Required: Whether it is enrollment or renew
/* [in] */ LPWSTR pwszCALocation, //IN Required: The ca machine name
/* [in] */ LPWSTR pwszCAName, //IN Required: The ca name
/* [in] */ BOOL fNewKey, //IN Required: Set the TRUE if new private key is needed
/* [in] */ PCERT_REQUEST_PVK_NEW pKeyNew, //IN Required: The private key information
/* [in] */ CERT_BLOB *pCert, //IN Optional: The old certificate if renewing
/* [in] */ PCERT_REQUEST_PVK_NEW pRenewKey, //IN Optional: The new private key information
/* [in] */ LPWSTR pwszHashAlg, //IN Optional: The hash algorithm
/* [in] */ LPWSTR pwszDesStore, //IN Optional: The destination store
/* [in] */ DWORD dwStoreFlags, //IN Optional: Flags for cert store.
/* [in] */ PCERT_ENROLL_INFO pRequestInfo, //IN Required: The information about the cert request
/* [in] */ LPWSTR pwszAttributes, //IN Optional: Attribute string for request
/* [in] */ DWORD dwFlags, //RESERVED must be 0
/* [in] */ BYTE *pReserved, //RESERVED must be NULL
/* [out] */ CERT_BLOB *pPKCS7Blob, //OUT Optional: The PKCS7 from the CA
/* [out] */ CERT_BLOB *pHashBlob, //OUT Optioanl: The SHA1 hash of the enrolled/renewed certificate
/* [out] */ DWORD *pdwStatus); //OUT Optional: The status of the enrollment/renewal
ULONG KeyEnroll_V2(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ LPSTR pszMachineName, //IN Required: name of the remote machine
/* [in] */ BOOL fKeyService, //IN Required: Whether the function is called remotely
/* [in] */ DWORD dwPurpose, //IN Required: Indicates type of request - enroll/renew
/* [in] */ DWORD dwFlags, //IN Required: Flags for enrollment
/* [in] */ LPWSTR pwszAcctName, //IN Optional: Account name the service runs under
/* [in] */ void *pAuthentication, //RESERVED must be NULL
/* [in] */ BOOL fEnroll, //IN Required: Whether it is enrollment or renew
/* [in] */ LPWSTR pwszCALocation, //IN Required: The ca machine names to attempt to enroll with
/* [in] */ LPWSTR pwszCAName, //IN Required: The ca names to attempt to enroll with
/* [in] */ BOOL fNewKey, //IN Required: Set the TRUE if new private key is needed
/* [in] */ PCERT_REQUEST_PVK_NEW pKeyNew, //IN Required: The private key information
/* [in] */ CERT_BLOB *pCert, //IN Optional: The old certificate if renewing
/* [in] */ PCERT_REQUEST_PVK_NEW pRenewKey, //IN Optional: The new private key information
/* [in] */ LPWSTR pwszHashAlg, //IN Optional: The hash algorithm
/* [in] */ LPWSTR pwszDesStore, //IN Optional: The destination store
/* [in] */ DWORD dwStoreFlags, //IN Optional: Flags for cert store.
/* [in] */ PCERT_ENROLL_INFO pRequestInfo, //IN Required: The information about the cert request
/* [in] */ LPWSTR pwszAttributes, //IN Optional: Attribute string for request
/* [in] */ DWORD dwReservedFlags, //RESERVED must be 0
/* [in] */ BYTE *pReserved, //RESERVED must be NULL
/* [in][out] */ HANDLE *phRequest, //IN OUT Optional: A handle to a created request
/* [out] */ CERT_BLOB *pPKCS7Blob, //OUT Optional: The PKCS7 from the CA
/* [out] */ CERT_BLOB *pHashBlob, //OUT Optioanl: The SHA1 hash of the enrolled/renewed certificate
/* [out] */ DWORD *pdwStatus); //OUT Optional: The status of the enrollment/renewal
ULONG KeyExportCert(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ LPWSTR pwszPassword,
/* [in] */ LPWSTR pwszCertStore,
/* [in] */ ULONG cHashCount,
/* [size_is][in] */ KEYSVC_CERT_HASH *pHashes,
/* [in] */ ULONG ulFlags,
/* [in, out] */ void *pReserved,
/* [out] */ PKEYSVC_BLOB *ppPFXBlob);
ULONG KeyImportCert(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ LPWSTR pwszPassword,
/* [in] */ LPWSTR pwszCertStore,
/* [in] */ PKEYSVC_BLOB pPFXBlob,
/* [in] */ ULONG ulFlags,
/* [in, out] */ void *pReserved);
ULONG KeyEnumerateAvailableCertTypes(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [out][in] */ void *pReserved,
/* [out][in] */ ULONG *pcCertTypeCount,
/* [in, out][size_is(,*pcCertTypeCount)] */
PKEYSVC_UNICODE_STRING *ppCertTypes);
ULONG KeyEnumerateCAs(
/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [out][in] */ void *pReserved,
/* [in] */ ULONG ulFlags,
/* [out][in] */ ULONG *pcCACount,
/* [in, out][size_is(,*pcCACount)] */
PKEYSVC_UNICODE_STRING *ppCAs);
ULONG KeyQueryRequestStatus
(/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ HANDLE hRequest,
/* [out, ref] */ CRYPTUI_WIZ_QUERY_CERT_REQUEST_INFO *pQueryInfo);
ULONG RKeyOpenKeyService
( /* [in] */ LPSTR pszMachineName,
/* [in] */ KEYSVC_TYPE OwnerType,
/* [in] */ LPWSTR pwszOwnerName,
/* [in] */ void *pAuthentication,
/* [out][in] */ void *pReserved,
/* [out] */ KEYSVCC_HANDLE *phKeySvcCli);
ULONG RKeyCloseKeyService
(/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [out][in] */ void *pReserved);
ULONG RKeyPFXInstall
(/* [in] */ KEYSVCC_HANDLE hKeySvcCli,
/* [in] */ PKEYSVC_BLOB pPFX,
/* [in] */ PKEYSVC_UNICODE_STRING pPassword,
/* [in] */ ULONG ulFlags);
#ifdef __cplusplus
}
#endif
#endif