Begin stubs of built-in schannel provider.

diff --git a/dlls/secur32/Makefile.in b/dlls/secur32/Makefile.in
index 7190727..017816c 100644
--- a/dlls/secur32/Makefile.in
+++ b/dlls/secur32/Makefile.in
@@ -7,6 +7,7 @@
 IMPORTS   = user32 advapi32 kernel32 ntdll
 
 C_SRCS = \
+	schannel.c \
 	secur32.c \
 	thunks.c \
 	wrapper.c
diff --git a/dlls/secur32/schannel.c b/dlls/secur32/schannel.c
new file mode 100644
index 0000000..c6f80bbe
--- /dev/null
+++ b/dlls/secur32/schannel.c
@@ -0,0 +1,258 @@
+/* Copyright (C) 2005 Juan Lang
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
+ *
+ * This file implements the schannel provider, or, the SSL/TLS implementations.
+ * FIXME: It should be rather obvious that this file is empty of any
+ * implementation.
+ */
+#include <stdarg.h>
+#include "windef.h"
+#include "winbase.h"
+#include "sspi.h"
+#include "schannel.h"
+#include "secur32_priv.h"
+#include "wine/debug.h"
+
+WINE_DEFAULT_DEBUG_CHANNEL(secur32);
+
+static SECURITY_STATUS schan_QueryCredentialsAttributes(
+ PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
+{
+    SECURITY_STATUS ret;
+
+    switch (ulAttribute)
+    {
+    case SECPKG_ATTR_SUPPORTED_ALGS:
+        if (pBuffer)
+        {
+            /* FIXME: get from CryptoAPI */
+            FIXME("%ld: stub\n", ulAttribute);
+            ret = SEC_E_UNSUPPORTED_FUNCTION;
+        }
+        else
+            ret = SEC_E_INTERNAL_ERROR;
+        break;
+    case SECPKG_ATTR_CIPHER_STRENGTHS:
+        if (pBuffer)
+        {
+            /* FIXME: get from CryptoAPI */
+            FIXME("%ld: stub\n", ulAttribute);
+            ret = SEC_E_UNSUPPORTED_FUNCTION;
+        }
+        else
+            ret = SEC_E_INTERNAL_ERROR;
+        break;
+    case SECPKG_ATTR_SUPPORTED_PROTOCOLS:
+        if (pBuffer)
+        {
+            /* FIXME: get from OpenSSL? */
+            FIXME("%ld: stub\n", ulAttribute);
+            ret = SEC_E_UNSUPPORTED_FUNCTION;
+        }
+        else
+            ret = SEC_E_INTERNAL_ERROR;
+        break;
+    default:
+        ret = SEC_E_UNSUPPORTED_FUNCTION;
+    }
+    return ret;
+}
+
+static SECURITY_STATUS SEC_ENTRY schan_QueryCredentialsAttributesA(
+ PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
+{
+    SECURITY_STATUS ret;
+
+    TRACE("(%p, %ld, %p)\n", phCredential, ulAttribute, pBuffer);
+
+    switch (ulAttribute)
+    {
+    case SECPKG_CRED_ATTR_NAMES:
+        FIXME("SECPKG_CRED_ATTR_NAMES: stub\n");
+        ret = SEC_E_UNSUPPORTED_FUNCTION;
+        break;
+    default:
+        ret = schan_QueryCredentialsAttributes(phCredential, ulAttribute,
+         pBuffer);
+    }
+    return ret;
+}
+
+static SECURITY_STATUS SEC_ENTRY schan_QueryCredentialsAttributesW(
+ PCredHandle phCredential, ULONG ulAttribute, PVOID pBuffer)
+{
+    SECURITY_STATUS ret;
+
+    TRACE("(%p, %ld, %p)\n", phCredential, ulAttribute, pBuffer);
+
+    switch (ulAttribute)
+    {
+    case SECPKG_CRED_ATTR_NAMES:
+        FIXME("SECPKG_CRED_ATTR_NAMES: stub\n");
+        ret = SEC_E_UNSUPPORTED_FUNCTION;
+        break;
+    default:
+        ret = schan_QueryCredentialsAttributes(phCredential, ulAttribute,
+         pBuffer);
+    }
+    return ret;
+}
+
+static SECURITY_STATUS schan_AcquireCredentialsHandle(ULONG fCredentialUse,
+ PCredHandle phCredential, PTimeStamp ptsExpiry)
+{
+    SECURITY_STATUS ret;
+
+    if (fCredentialUse == SECPKG_CRED_BOTH)
+        ret = SEC_E_NO_CREDENTIALS;
+    else
+    {
+        /* For now, the only thing I'm interested in is the direction of the
+         * connection, so just store it.
+         */
+        phCredential->dwUpper = fCredentialUse;
+        /* According to MSDN, all versions prior to XP do this */
+        if (ptsExpiry)
+            ptsExpiry->QuadPart = 0;
+        ret = SEC_E_OK;
+    }
+    return ret;
+}
+
+static SECURITY_STATUS SEC_ENTRY schan_AcquireCredentialsHandleA(
+ SEC_CHAR *pszPrincipal, SEC_CHAR *pszPackage, ULONG fCredentialUse,
+ PLUID pLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn,
+ PVOID pGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
+{
+    TRACE("(%s, %s, 0x%08lx, %p, %p, %p, %p, %p, %p)\n",
+     debugstr_a(pszPrincipal), debugstr_a(pszPackage), fCredentialUse,
+     pLogonID, pAuthData, pGetKeyFn, pGetKeyArgument, phCredential, ptsExpiry);
+    return schan_AcquireCredentialsHandle(fCredentialUse, phCredential,
+     ptsExpiry);
+}
+
+static SECURITY_STATUS SEC_ENTRY schan_AcquireCredentialsHandleW(
+ SEC_WCHAR *pszPrincipal, SEC_WCHAR *pszPackage, ULONG fCredentialUse,
+ PLUID pLogonID, PVOID pAuthData, SEC_GET_KEY_FN pGetKeyFn,
+ PVOID pGetKeyArgument, PCredHandle phCredential, PTimeStamp ptsExpiry)
+{
+    TRACE("(%s, %s, 0x%08lx, %p, %p, %p, %p, %p, %p)\n",
+     debugstr_w(pszPrincipal), debugstr_w(pszPackage), fCredentialUse,
+     pLogonID, pAuthData, pGetKeyFn, pGetKeyArgument, phCredential, ptsExpiry);
+    return schan_AcquireCredentialsHandle(fCredentialUse, phCredential,
+     ptsExpiry);
+}
+
+static SecurityFunctionTableA schanTableA = {
+    1,
+    NULL, /* EnumerateSecurityPackagesA */
+    schan_QueryCredentialsAttributesA,
+    schan_AcquireCredentialsHandleA,
+    NULL, /* FreeCredentialsHandle */
+    NULL, /* Reserved2 */
+    NULL, /* InitializeSecurityContextA */
+    NULL, /* AcceptSecurityContext */
+    NULL, /* CompleteAuthToken */
+    NULL, /* DeleteSecurityContext */
+    NULL, /* ApplyControlToken */
+    NULL, /* QueryContextAttributesA */
+    NULL, /* ImpersonateSecurityContext */
+    NULL, /* RevertSecurityContext */
+    NULL, /* MakeSignature */
+    NULL, /* VerifySignature */
+    FreeContextBuffer,
+    NULL, /* QuerySecurityPackageInfoA */
+    NULL, /* Reserved3 */
+    NULL, /* Reserved4 */
+    NULL, /* ExportSecurityContext */
+    NULL, /* ImportSecurityContextA */
+    NULL, /* AddCredentialsA */
+    NULL, /* Reserved8 */
+    NULL, /* QuerySecurityContextToken */
+    NULL, /* EncryptMessage */
+    NULL, /* DecryptMessage */
+    NULL, /* SetContextAttributesA */
+};
+
+static SecurityFunctionTableW schanTableW = {
+    1,
+    NULL, /* EnumerateSecurityPackagesW */
+    schan_QueryCredentialsAttributesW,
+    schan_AcquireCredentialsHandleW,
+    NULL, /* FreeCredentialsHandle */
+    NULL, /* Reserved2 */
+    NULL, /* InitializeSecurityContextW */
+    NULL, /* AcceptSecurityContext */
+    NULL, /* CompleteAuthToken */
+    NULL, /* DeleteSecurityContext */
+    NULL, /* ApplyControlToken */
+    NULL, /* QueryContextAttributesW */
+    NULL, /* ImpersonateSecurityContext */
+    NULL, /* RevertSecurityContext */
+    NULL, /* MakeSignature */
+    NULL, /* VerifySignature */
+    FreeContextBuffer,
+    NULL, /* QuerySecurityPackageInfoW */
+    NULL, /* Reserved3 */
+    NULL, /* Reserved4 */
+    NULL, /* ExportSecurityContext */
+    NULL, /* ImportSecurityContextW */
+    NULL, /* AddCredentialsW */
+    NULL, /* Reserved8 */
+    NULL, /* QuerySecurityContextToken */
+    NULL, /* EncryptMessage */
+    NULL, /* DecryptMessage */
+    NULL, /* SetContextAttributesW */
+};
+
+static const WCHAR schannelComment[] = { 'S','c','h','a','n','n','e','l',' ',
+ 'S','e','c','u','r','i','t','y',' ','P','a','c','k','a','g','e',0 };
+
+void SECUR32_initSchannelSP(void)
+{
+    SecureProvider *provider = SECUR32_addProvider(&schanTableA, &schanTableW,
+     NULL);
+
+    if (provider)
+    {
+        /* This is what Windows reports.  This shouldn't break any applications
+         * even though the functions are missing, because the wrapper will
+         * return SEC_E_UNSUPPORTED_FUNCTION if our function is NULL.
+         */
+        static const long caps =
+         SECPKG_FLAG_INTEGRITY |
+         SECPKG_FLAG_PRIVACY |
+         SECPKG_FLAG_CONNECTION |
+         SECPKG_FLAG_MULTI_REQUIRED |
+         SECPKG_FLAG_EXTENDED_ERROR |
+         SECPKG_FLAG_IMPERSONATION |
+         SECPKG_FLAG_ACCEPT_WIN32_NAME |
+         SECPKG_FLAG_STREAM;
+        static const short version = 1;
+        static const long maxToken = 16384;
+        SEC_WCHAR *uniSPName = (SEC_WCHAR *)UNISP_NAME_W,
+         *schannel = (SEC_WCHAR *)SCHANNEL_NAME_W;
+
+        const SecPkgInfoW info[] = {
+         { caps, version, UNISP_RPC_ID, maxToken, uniSPName, uniSPName },
+         { caps, version, UNISP_RPC_ID, maxToken, schannel,
+          (SEC_WCHAR *)schannelComment },
+        };
+
+        SECUR32_addPackages(provider, sizeof(info) / sizeof(info[0]), NULL,
+         info);
+    }
+}
diff --git a/dlls/secur32/secur32.c b/dlls/secur32/secur32.c
index 1a286c4..efe03c1 100644
--- a/dlls/secur32/secur32.c
+++ b/dlls/secur32/secur32.c
@@ -16,6 +16,7 @@
  * License along with this library; if not, write to the Free Software
  * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
  */
+#include <assert.h>
 #include <stdarg.h>
 #include "windef.h"
 #include "winbase.h"
@@ -457,8 +458,8 @@
     }
 }
 
-static void _copyPackageInfo(PSecPkgInfoW info, PSecPkgInfoA inInfoA,
- PSecPkgInfoW inInfoW)
+static void _copyPackageInfo(PSecPkgInfoW info, const SecPkgInfoA *inInfoA,
+ const SecPkgInfoW *inInfoW)
 {
     if (info && (inInfoA || inInfoW))
     {
@@ -479,6 +480,64 @@
     }
 }
 
+SecureProvider *SECUR32_addProvider(PSecurityFunctionTableA fnTableA,
+ PSecurityFunctionTableW fnTableW, PWSTR moduleName)
+{
+    SecureProvider *ret;
+
+    EnterCriticalSection(&cs);
+    providerTable = _resizeProviderTable(providerTable,
+     providerTable ? providerTable->numProviders + 1 : 1);
+    if (providerTable)
+    {
+        ret = &providerTable->table[providerTable->numProviders++];
+        ret->lib = NULL;
+        if (fnTableA || fnTableW)
+        {
+            _makeFnTableA(&ret->fnTableA, fnTableA, fnTableW);
+            _makeFnTableW(&ret->fnTableW, fnTableA, fnTableW);
+            ret->loaded = TRUE;
+        }
+        else
+        {
+            ret->moduleName = SECUR32_strdupW(moduleName);
+            ret->loaded = FALSE;
+        }
+    }
+    else
+        ret = NULL;
+    LeaveCriticalSection(&cs);
+    return ret;
+}
+
+void SECUR32_addPackages(SecureProvider *provider, ULONG toAdd,
+ const SecPkgInfoA *infoA, const SecPkgInfoW *infoW)
+{
+    assert(provider);
+    assert(infoA || infoW);
+
+    EnterCriticalSection(&cs);
+    packageTable = _resizePackageTable(packageTable,
+     packageTable ? packageTable->numPackages + toAdd : toAdd);
+    if (packageTable)
+    {
+        ULONG i;
+
+        for (i = 0; i < toAdd; i++)
+        {
+            SecurePackage *package =
+             &packageTable->table[packageTable->numPackages + i];
+
+            package->provider = provider;
+            _copyPackageInfo(&package->infoW,
+             infoA ? &infoA[i] : NULL,
+             infoW ? &infoW[i] : NULL);
+        }
+        packageTable->numPackages += toAdd;
+    }
+    LeaveCriticalSection(&cs);
+}
+
 static void _tryLoadProvider(PWSTR moduleName)
 {
     HMODULE lib = LoadLibraryW(moduleName);
@@ -514,33 +573,11 @@
                 ret = fnTableA->EnumerateSecurityPackagesA(&toAdd, &infoA);
             if (ret == SEC_E_OK && toAdd > 0 && (infoW || infoA))
             {
-                providerTable = _resizeProviderTable(providerTable,
-                 providerTable ? providerTable->numProviders + 1 : 1);
-                packageTable = _resizePackageTable(packageTable,
-                 packageTable ? packageTable->numPackages + toAdd : toAdd);
-                if (providerTable && packageTable)
-                {
-                    ULONG i;
-                    SecureProvider *provider =
-                     &providerTable->table[providerTable->numProviders];
+                SecureProvider *provider = SECUR32_addProvider(NULL, NULL,
+                 moduleName);
 
-                    EnterCriticalSection(&cs);
-                    provider->moduleName = SECUR32_strdupW(moduleName);
-                    provider->lib = NULL;
-                    for (i = 0; i < toAdd; i++)
-                    {
-                        SecurePackage *package =
-                         &packageTable->table[packageTable->numPackages + i];
-
-                        package->provider = provider;
-                        _copyPackageInfo(&package->infoW,
-                         infoA ? &infoA[i] : NULL,
-                         infoW ? &infoW[i] : NULL);
-                    }
-                    packageTable->numPackages += toAdd;
-                    providerTable->numProviders++;
-                    LeaveCriticalSection(&cs);
-                }
+                if (provider)
+                    SECUR32_addPackages(provider, toAdd, infoA, infoW);
                 if (infoW)
                     fnTableW->FreeContextBuffer(infoW);
                 else
@@ -569,6 +606,9 @@
 
     TRACE("\n");
     InitializeCriticalSection(&cs);
+    /* First load built-in providers */
+    SECUR32_initSchannelSP();
+    /* Now load providers from registry */
     apiRet = RegOpenKeyExW(HKEY_LOCAL_MACHINE, securityProvidersKeyW, 0,
      KEY_READ, &key);
     if (apiRet == ERROR_SUCCESS)
@@ -605,7 +645,7 @@
 
 SecurePackage *SECUR32_findPackageW(PWSTR packageName)
 {
-    SecurePackage *ret;
+    SecurePackage *ret = NULL;
 
     if (packageTable && packageName)
     {
@@ -614,7 +654,7 @@
         for (i = 0, ret = NULL; !ret && i < packageTable->numPackages; i++)
             if (!lstrcmpiW(packageTable->table[i].infoW.Name, packageName))
                 ret = &packageTable->table[i];
-        if (ret && ret->provider && !ret->provider->lib)
+        if (ret && ret->provider && !ret->provider->loaded)
         {
             ret->provider->lib = LoadLibraryW(ret->provider->moduleName);
             if (ret->provider->lib)
@@ -634,13 +674,12 @@
                     fnTableW = pInitSecurityInterfaceW();
                 _makeFnTableA(&ret->provider->fnTableA, fnTableA, fnTableW);
                 _makeFnTableW(&ret->provider->fnTableW, fnTableA, fnTableW);
+                ret->provider->loaded = TRUE;
             }
             else
                 ret = NULL;
         }
     }
-    else
-        ret = NULL;
     return ret;
 }
 
diff --git a/dlls/secur32/secur32_priv.h b/dlls/secur32/secur32_priv.h
index 281cf46..74dad46 100644
--- a/dlls/secur32/secur32_priv.h
+++ b/dlls/secur32/secur32_priv.h
@@ -34,6 +34,7 @@
 
 typedef struct _SecureProvider
 {
+    BOOL                    loaded;
     PWSTR                   moduleName;
     HMODULE                 lib;
     SecurityFunctionTableA  fnTableA;
@@ -46,6 +47,21 @@
     SecureProvider *provider;
 } SecurePackage;
 
+/* Allocates space for and initializes a new provider.  If fnTableA or fnTableW
+ * is non-NULL, assumes the provider is built-in (and is thus already loaded.)
+ * Otherwise moduleName must not be NULL.
+ * Returns a pointer to the stored provider entry, for use adding packages.
+ */
+SecureProvider *SECUR32_addProvider(PSecurityFunctionTableA fnTableA,
+ PSecurityFunctionTableW fnTableW, PWSTR moduleName);
+
+/* Allocates space for and adds toAdd packages with the given provider.
+ * provider must not be NULL, and either infoA or infoW may be NULL, but not
+ * both.
+ */
+void SECUR32_addPackages(SecureProvider *provider, ULONG toAdd,
+ const SecPkgInfoA *infoA, const SecPkgInfoW *infoW);
+
 /* Tries to find the package named packageName.  If it finds it, implicitly
  * loads the package if it isn't already loaded.
  */
@@ -61,4 +77,7 @@
 PWSTR SECUR32_AllocWideFromMultiByte(PCSTR str);
 PSTR  SECUR32_AllocMultiByteFromWide(PCWSTR str);
 
+/* Initialization functions for built-in providers */
+void SECUR32_initSchannelSP(void);
+
 #endif /* ndef __SECUR32_PRIV_H__ */