Commit 519f5cc2 authored by Dmitry Timoshkov's avatar Dmitry Timoshkov Committed by Alexandre Julliard

secur32: Add a better stub for LsaApCallPackageUntrusted(NegGetCallerName).

parent 021547ca
......@@ -98,6 +98,10 @@ NTSTATUS WINAPI LsaCallAuthenticationPackage(HANDLE lsa_handle, ULONG package_id
TRACE("%p,%lu,%p,%lu,%p,%p,%p\n", lsa_handle, package_id, in_buffer,
in_buffer_length, out_buffer, out_buffer_length, status);
if (out_buffer) *out_buffer = NULL;
if (out_buffer_length) *out_buffer_length = 0;
if (status) *status = STATUS_SUCCESS;
for (i = 0; i < loaded_packages_count; i++)
{
if (loaded_packages[i].package_id == package_id)
......@@ -110,7 +114,7 @@ NTSTATUS WINAPI LsaCallAuthenticationPackage(HANDLE lsa_handle, ULONG package_id
}
}
return STATUS_INVALID_PARAMETER;
return STATUS_NO_SUCH_PACKAGE;
}
static struct lsa_handle *alloc_lsa_handle(ULONG magic)
......
......@@ -71,9 +71,23 @@ static WCHAR negotiate_comment_W[] =
static NTSTATUS NTAPI nego_LsaApCallPackageUntrusted( PLSA_CLIENT_REQUEST req, void *in_buf,
void *client_buf_base, ULONG in_buf_len, void **out_buf, ULONG *out_buf_len, NTSTATUS *ret_status )
{
ULONG *MessageType;
FIXME("%p, %p, %p, %lu, %p, %p, %p: stub\n", req, in_buf, client_buf_base, in_buf_len, out_buf, out_buf_len, ret_status);
if (!in_buf || in_buf_len < sizeof(*MessageType) || !out_buf || !out_buf_len || !ret_status)
return STATUS_INVALID_PARAMETER;
MessageType = in_buf;
switch (*MessageType)
{
case 1: /* NegGetCallerName */
*ret_status = STATUS_NO_SUCH_LOGON_SESSION;
return STATUS_SUCCESS;
default:
return SEC_E_UNSUPPORTED_FUNCTION;
}
}
static NTSTATUS NTAPI nego_LsaApInitializePackage( ULONG package_id, PLSA_DISPATCH_TABLE dispatch,
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment