mirror of
https://github.com/reactos/reactos.git
synced 2025-02-25 01:39:30 +00:00
[lsalib]
Fix indentation. No code changes. svn path=/trunk/; revision=44776
This commit is contained in:
parent
e50eff1409
commit
2db30d58d2
1 changed files with 240 additions and 241 deletions
|
@ -28,97 +28,99 @@ extern HANDLE Secur32Heap;
|
|||
NTSTATUS WINAPI
|
||||
LsaDeregisterLogonProcess(HANDLE LsaHandle)
|
||||
{
|
||||
LSASS_REQUEST Request;
|
||||
LSASS_REPLY Reply;
|
||||
NTSTATUS Status;
|
||||
LSASS_REQUEST Request;
|
||||
LSASS_REPLY Reply;
|
||||
NTSTATUS Status;
|
||||
|
||||
Request.Header.u1.s1.DataLength = 0;
|
||||
Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
|
||||
Request.Type = LSASS_REQUEST_DEREGISTER_LOGON_PROCESS;
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request.Header,
|
||||
&Reply.Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return(Status);
|
||||
}
|
||||
Request.Header.u1.s1.DataLength = 0;
|
||||
Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
|
||||
Request.Type = LSASS_REQUEST_DEREGISTER_LOGON_PROCESS;
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request.Header,
|
||||
&Reply.Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (!NT_SUCCESS(Reply.Status))
|
||||
{
|
||||
return(Reply.Status);
|
||||
}
|
||||
if (!NT_SUCCESS(Reply.Status))
|
||||
{
|
||||
return Reply.Status;
|
||||
}
|
||||
|
||||
return(Status);
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS WINAPI
|
||||
LsaConnectUntrusted(PHANDLE LsaHandle)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_UNSUCCESSFUL;
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_UNSUCCESSFUL;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @implemented
|
||||
*/
|
||||
NTSTATUS WINAPI
|
||||
LsaCallAuthenticationPackage(HANDLE LsaHandle,
|
||||
ULONG AuthenticationPackage,
|
||||
PVOID ProtocolSubmitBuffer,
|
||||
ULONG SubmitBufferLength,
|
||||
PVOID* ProtocolReturnBuffer,
|
||||
PULONG ReturnBufferLength,
|
||||
PNTSTATUS ProtocolStatus)
|
||||
ULONG AuthenticationPackage,
|
||||
PVOID ProtocolSubmitBuffer,
|
||||
ULONG SubmitBufferLength,
|
||||
PVOID *ProtocolReturnBuffer,
|
||||
PULONG ReturnBufferLength,
|
||||
PNTSTATUS ProtocolStatus)
|
||||
{
|
||||
PLSASS_REQUEST Request;
|
||||
PLSASS_REPLY Reply;
|
||||
LSASS_REQUEST RawRequest;
|
||||
LSASS_REPLY RawReply;
|
||||
NTSTATUS Status;
|
||||
ULONG OutBufferSize;
|
||||
PLSASS_REQUEST Request;
|
||||
PLSASS_REPLY Reply;
|
||||
LSASS_REQUEST RawRequest;
|
||||
LSASS_REPLY RawReply;
|
||||
NTSTATUS Status;
|
||||
ULONG OutBufferSize;
|
||||
|
||||
Request = (PLSASS_REQUEST)&RawRequest;
|
||||
Reply = (PLSASS_REPLY)&RawReply;
|
||||
Request = (PLSASS_REQUEST)&RawRequest;
|
||||
Reply = (PLSASS_REPLY)&RawReply;
|
||||
|
||||
Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + SubmitBufferLength -
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request->Header.u1.s1.TotalLength =
|
||||
Request->Header.u1.s1.DataLength + sizeof(PORT_MESSAGE);
|
||||
Request->Type = LSASS_REQUEST_CALL_AUTHENTICATION_PACKAGE;
|
||||
Request->d.CallAuthenticationPackageRequest.AuthenticationPackage =
|
||||
AuthenticationPackage;
|
||||
Request->d.CallAuthenticationPackageRequest.InBufferLength =
|
||||
SubmitBufferLength;
|
||||
memcpy(Request->d.CallAuthenticationPackageRequest.InBuffer,
|
||||
ProtocolSubmitBuffer,
|
||||
SubmitBufferLength);
|
||||
Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + SubmitBufferLength -
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request->Header.u1.s1.TotalLength =
|
||||
Request->Header.u1.s1.DataLength + sizeof(PORT_MESSAGE);
|
||||
Request->Type = LSASS_REQUEST_CALL_AUTHENTICATION_PACKAGE;
|
||||
Request->d.CallAuthenticationPackageRequest.AuthenticationPackage =
|
||||
AuthenticationPackage;
|
||||
Request->d.CallAuthenticationPackageRequest.InBufferLength =
|
||||
SubmitBufferLength;
|
||||
memcpy(Request->d.CallAuthenticationPackageRequest.InBuffer,
|
||||
ProtocolSubmitBuffer,
|
||||
SubmitBufferLength);
|
||||
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request->Header,
|
||||
&Reply->Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return(Status);
|
||||
}
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request->Header,
|
||||
&Reply->Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (!NT_SUCCESS(Reply->Status))
|
||||
{
|
||||
return(Reply->Status);
|
||||
}
|
||||
if (!NT_SUCCESS(Reply->Status))
|
||||
{
|
||||
return Reply->Status;
|
||||
}
|
||||
|
||||
OutBufferSize = Reply->d.CallAuthenticationPackageReply.OutBufferLength;
|
||||
*ProtocolReturnBuffer = RtlAllocateHeap(Secur32Heap,
|
||||
0,
|
||||
OutBufferSize);
|
||||
*ReturnBufferLength = OutBufferSize;
|
||||
memcpy(*ProtocolReturnBuffer,
|
||||
Reply->d.CallAuthenticationPackageReply.OutBuffer,
|
||||
*ReturnBufferLength);
|
||||
OutBufferSize = Reply->d.CallAuthenticationPackageReply.OutBufferLength;
|
||||
*ProtocolReturnBuffer = RtlAllocateHeap(Secur32Heap,
|
||||
0,
|
||||
OutBufferSize);
|
||||
*ReturnBufferLength = OutBufferSize;
|
||||
memcpy(*ProtocolReturnBuffer,
|
||||
Reply->d.CallAuthenticationPackageReply.OutBuffer,
|
||||
*ReturnBufferLength);
|
||||
|
||||
return(Status);
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
|
@ -128,7 +130,7 @@ LsaCallAuthenticationPackage(HANDLE LsaHandle,
|
|||
NTSTATUS WINAPI
|
||||
LsaFreeReturnBuffer(PVOID Buffer)
|
||||
{
|
||||
return(RtlFreeHeap(Secur32Heap, 0, Buffer));
|
||||
return RtlFreeHeap(Secur32Heap, 0, Buffer);
|
||||
}
|
||||
|
||||
|
||||
|
@ -137,36 +139,37 @@ LsaFreeReturnBuffer(PVOID Buffer)
|
|||
*/
|
||||
NTSTATUS WINAPI
|
||||
LsaLookupAuthenticationPackage(HANDLE LsaHandle,
|
||||
PLSA_STRING PackageName,
|
||||
PULONG AuthenticationPackage)
|
||||
PLSA_STRING PackageName,
|
||||
PULONG AuthenticationPackage)
|
||||
{
|
||||
NTSTATUS Status;
|
||||
PLSASS_REQUEST Request;
|
||||
LSASS_REQUEST RawRequest;
|
||||
LSASS_REPLY Reply;
|
||||
NTSTATUS Status;
|
||||
PLSASS_REQUEST Request;
|
||||
LSASS_REQUEST RawRequest;
|
||||
LSASS_REPLY Reply;
|
||||
|
||||
Request = (PLSASS_REQUEST)&RawRequest;
|
||||
Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + PackageName->Length -
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request->Header.u1.s1.TotalLength = Request->Header.u1.s1.DataLength +
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request->Type = LSASS_REQUEST_LOOKUP_AUTHENTICATION_PACKAGE;
|
||||
Request = (PLSASS_REQUEST)&RawRequest;
|
||||
Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + PackageName->Length -
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request->Header.u1.s1.TotalLength = Request->Header.u1.s1.DataLength +
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request->Type = LSASS_REQUEST_LOOKUP_AUTHENTICATION_PACKAGE;
|
||||
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request->Header,
|
||||
&Reply.Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return(Status);
|
||||
}
|
||||
if (!NT_SUCCESS(Reply.Status))
|
||||
{
|
||||
return(Reply.Status);
|
||||
}
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request->Header,
|
||||
&Reply.Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return Status;
|
||||
}
|
||||
|
||||
*AuthenticationPackage = Reply.d.LookupAuthenticationPackageReply.Package;
|
||||
if (!NT_SUCCESS(Reply.Status))
|
||||
{
|
||||
return Reply.Status;
|
||||
}
|
||||
|
||||
return(Reply.Status);
|
||||
*AuthenticationPackage = Reply.d.LookupAuthenticationPackageReply.Package;
|
||||
|
||||
return Reply.Status;
|
||||
}
|
||||
|
||||
|
||||
|
@ -175,102 +178,102 @@ LsaLookupAuthenticationPackage(HANDLE LsaHandle,
|
|||
*/
|
||||
NTSTATUS WINAPI
|
||||
LsaLogonUser(HANDLE LsaHandle,
|
||||
PLSA_STRING OriginName,
|
||||
SECURITY_LOGON_TYPE LogonType,
|
||||
ULONG AuthenticationPackage,
|
||||
PVOID AuthenticationInformation,
|
||||
ULONG AuthenticationInformationLength,
|
||||
PTOKEN_GROUPS LocalGroups,
|
||||
PTOKEN_SOURCE SourceContext,
|
||||
PVOID* ProfileBuffer,
|
||||
PULONG ProfileBufferLength,
|
||||
PLUID LogonId,
|
||||
PHANDLE Token,
|
||||
PQUOTA_LIMITS Quotas,
|
||||
PNTSTATUS SubStatus)
|
||||
PLSA_STRING OriginName,
|
||||
SECURITY_LOGON_TYPE LogonType,
|
||||
ULONG AuthenticationPackage,
|
||||
PVOID AuthenticationInformation,
|
||||
ULONG AuthenticationInformationLength,
|
||||
PTOKEN_GROUPS LocalGroups,
|
||||
PTOKEN_SOURCE SourceContext,
|
||||
PVOID *ProfileBuffer,
|
||||
PULONG ProfileBufferLength,
|
||||
PLUID LogonId,
|
||||
PHANDLE Token,
|
||||
PQUOTA_LIMITS Quotas,
|
||||
PNTSTATUS SubStatus)
|
||||
{
|
||||
ULONG RequestLength;
|
||||
ULONG CurrentLength;
|
||||
PLSASS_REQUEST Request;
|
||||
LSASS_REQUEST RawMessage;
|
||||
PLSASS_REPLY Reply;
|
||||
LSASS_REPLY RawReply;
|
||||
NTSTATUS Status;
|
||||
ULONG RequestLength;
|
||||
ULONG CurrentLength;
|
||||
PLSASS_REQUEST Request;
|
||||
LSASS_REQUEST RawMessage;
|
||||
PLSASS_REPLY Reply;
|
||||
LSASS_REPLY RawReply;
|
||||
NTSTATUS Status;
|
||||
|
||||
RequestLength = sizeof(LSASS_REQUEST) - sizeof(PORT_MESSAGE);
|
||||
RequestLength = RequestLength + (OriginName->Length * sizeof(WCHAR));
|
||||
RequestLength = RequestLength + AuthenticationInformationLength;
|
||||
RequestLength = RequestLength +
|
||||
(LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
|
||||
RequestLength = sizeof(LSASS_REQUEST) - sizeof(PORT_MESSAGE);
|
||||
RequestLength = RequestLength + (OriginName->Length * sizeof(WCHAR));
|
||||
RequestLength = RequestLength + AuthenticationInformationLength;
|
||||
RequestLength = RequestLength +
|
||||
(LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
|
||||
|
||||
CurrentLength = 0;
|
||||
Request = (PLSASS_REQUEST)&RawMessage;
|
||||
CurrentLength = 0;
|
||||
Request = (PLSASS_REQUEST)&RawMessage;
|
||||
|
||||
Request->d.LogonUserRequest.OriginNameLength = OriginName->Length;
|
||||
Request->d.LogonUserRequest.OriginName = (PWSTR)&RawMessage + CurrentLength;
|
||||
memcpy((PWSTR)&RawMessage + CurrentLength,
|
||||
OriginName->Buffer,
|
||||
OriginName->Length * sizeof(WCHAR));
|
||||
CurrentLength = CurrentLength + (OriginName->Length * sizeof(WCHAR));
|
||||
Request->d.LogonUserRequest.OriginNameLength = OriginName->Length;
|
||||
Request->d.LogonUserRequest.OriginName = (PWSTR)&RawMessage + CurrentLength;
|
||||
memcpy((PWSTR)&RawMessage + CurrentLength,
|
||||
OriginName->Buffer,
|
||||
OriginName->Length * sizeof(WCHAR));
|
||||
CurrentLength = CurrentLength + (OriginName->Length * sizeof(WCHAR));
|
||||
|
||||
Request->d.LogonUserRequest.LogonType = LogonType;
|
||||
Request->d.LogonUserRequest.LogonType = LogonType;
|
||||
|
||||
Request->d.LogonUserRequest.AuthenticationPackage =
|
||||
AuthenticationPackage;
|
||||
Request->d.LogonUserRequest.AuthenticationPackage =
|
||||
AuthenticationPackage;
|
||||
|
||||
Request->d.LogonUserRequest.AuthenticationInformation =
|
||||
(PVOID)((ULONG_PTR)&RawMessage + CurrentLength);
|
||||
Request->d.LogonUserRequest.AuthenticationInformationLength =
|
||||
AuthenticationInformationLength;
|
||||
memcpy((PVOID)((ULONG_PTR)&RawMessage + CurrentLength),
|
||||
AuthenticationInformation,
|
||||
AuthenticationInformationLength);
|
||||
CurrentLength = CurrentLength + AuthenticationInformationLength;
|
||||
Request->d.LogonUserRequest.AuthenticationInformation =
|
||||
(PVOID)((ULONG_PTR)&RawMessage + CurrentLength);
|
||||
Request->d.LogonUserRequest.AuthenticationInformationLength =
|
||||
AuthenticationInformationLength;
|
||||
memcpy((PVOID)((ULONG_PTR)&RawMessage + CurrentLength),
|
||||
AuthenticationInformation,
|
||||
AuthenticationInformationLength);
|
||||
CurrentLength = CurrentLength + AuthenticationInformationLength;
|
||||
|
||||
Request->d.LogonUserRequest.LocalGroupsCount = LocalGroups->GroupCount;
|
||||
Request->d.LogonUserRequest.LocalGroups =
|
||||
(PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength;
|
||||
memcpy((PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength,
|
||||
LocalGroups->Groups,
|
||||
LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
|
||||
Request->d.LogonUserRequest.LocalGroupsCount = LocalGroups->GroupCount;
|
||||
Request->d.LogonUserRequest.LocalGroups =
|
||||
(PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength;
|
||||
memcpy((PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength,
|
||||
LocalGroups->Groups,
|
||||
LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
|
||||
|
||||
Request->d.LogonUserRequest.SourceContext = *SourceContext;
|
||||
Request->d.LogonUserRequest.SourceContext = *SourceContext;
|
||||
|
||||
Request->Type = LSASS_REQUEST_LOGON_USER;
|
||||
Request->Header.u1.s1.DataLength = RequestLength - sizeof(PORT_MESSAGE);
|
||||
Request->Header.u1.s1.TotalLength = RequestLength + sizeof(PORT_MESSAGE);
|
||||
Request->Type = LSASS_REQUEST_LOGON_USER;
|
||||
Request->Header.u1.s1.DataLength = RequestLength - sizeof(PORT_MESSAGE);
|
||||
Request->Header.u1.s1.TotalLength = RequestLength + sizeof(PORT_MESSAGE);
|
||||
|
||||
Reply = (PLSASS_REPLY)&RawReply;
|
||||
Reply = (PLSASS_REPLY)&RawReply;
|
||||
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request->Header,
|
||||
&Reply->Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return(Status);
|
||||
}
|
||||
Status = NtRequestWaitReplyPort(LsaHandle,
|
||||
&Request->Header,
|
||||
&Reply->Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return Status;
|
||||
}
|
||||
|
||||
*SubStatus = Reply->d.LogonUserReply.SubStatus;
|
||||
*SubStatus = Reply->d.LogonUserReply.SubStatus;
|
||||
|
||||
if (!NT_SUCCESS(Reply->Status))
|
||||
{
|
||||
return(Status);
|
||||
}
|
||||
if (!NT_SUCCESS(Reply->Status))
|
||||
{
|
||||
return Status;
|
||||
}
|
||||
|
||||
*ProfileBuffer = RtlAllocateHeap(Secur32Heap,
|
||||
0,
|
||||
Reply->d.LogonUserReply.ProfileBufferLength);
|
||||
memcpy(*ProfileBuffer,
|
||||
(PVOID)((ULONG)Reply->d.LogonUserReply.Data +
|
||||
(ULONG)Reply->d.LogonUserReply.ProfileBuffer),
|
||||
Reply->d.LogonUserReply.ProfileBufferLength);
|
||||
*LogonId = Reply->d.LogonUserReply.LogonId;
|
||||
*Token = Reply->d.LogonUserReply.Token;
|
||||
memcpy(Quotas,
|
||||
&Reply->d.LogonUserReply.Quotas,
|
||||
sizeof(Reply->d.LogonUserReply.Quotas));
|
||||
*ProfileBuffer = RtlAllocateHeap(Secur32Heap,
|
||||
0,
|
||||
Reply->d.LogonUserReply.ProfileBufferLength);
|
||||
memcpy(*ProfileBuffer,
|
||||
(PVOID)((ULONG)Reply->d.LogonUserReply.Data +
|
||||
(ULONG)Reply->d.LogonUserReply.ProfileBuffer),
|
||||
Reply->d.LogonUserReply.ProfileBufferLength);
|
||||
*LogonId = Reply->d.LogonUserReply.LogonId;
|
||||
*Token = Reply->d.LogonUserReply.Token;
|
||||
memcpy(Quotas,
|
||||
&Reply->d.LogonUserReply.Quotas,
|
||||
sizeof(Reply->d.LogonUserReply.Quotas));
|
||||
|
||||
return(Status);
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
|
@ -279,113 +282,109 @@ LsaLogonUser(HANDLE LsaHandle,
|
|||
*/
|
||||
NTSTATUS WINAPI
|
||||
LsaRegisterLogonProcess(PLSA_STRING LsaLogonProcessName,
|
||||
PHANDLE Handle,
|
||||
PLSA_OPERATIONAL_MODE OperationalMode)
|
||||
PHANDLE Handle,
|
||||
PLSA_OPERATIONAL_MODE OperationalMode)
|
||||
{
|
||||
UNICODE_STRING Portname = RTL_CONSTANT_STRING(L"\\SeLsaCommandPort");
|
||||
ULONG ConnectInfoLength;
|
||||
NTSTATUS Status;
|
||||
LSASS_REQUEST Request;
|
||||
LSASS_REPLY Reply;
|
||||
UNICODE_STRING Portname = RTL_CONSTANT_STRING(L"\\SeLsaCommandPort");
|
||||
ULONG ConnectInfoLength;
|
||||
NTSTATUS Status;
|
||||
LSASS_REQUEST Request;
|
||||
LSASS_REPLY Reply;
|
||||
|
||||
ConnectInfoLength = 0;
|
||||
Status = NtConnectPort(Handle,
|
||||
&Portname,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
&ConnectInfoLength);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return(Status);
|
||||
}
|
||||
ConnectInfoLength = 0;
|
||||
Status = NtConnectPort(Handle,
|
||||
&Portname,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
&ConnectInfoLength);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
return Status;
|
||||
}
|
||||
|
||||
Request.Type = LSASS_REQUEST_REGISTER_LOGON_PROCESS;
|
||||
Request.Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) -
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
|
||||
Request.Type = LSASS_REQUEST_REGISTER_LOGON_PROCESS;
|
||||
Request.Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) -
|
||||
sizeof(PORT_MESSAGE);
|
||||
Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
|
||||
|
||||
Request.d.RegisterLogonProcessRequest.Length = LsaLogonProcessName->Length;
|
||||
memcpy(Request.d.RegisterLogonProcessRequest.LogonProcessNameBuffer,
|
||||
LsaLogonProcessName->Buffer,
|
||||
Request.d.RegisterLogonProcessRequest.Length);
|
||||
Request.d.RegisterLogonProcessRequest.Length = LsaLogonProcessName->Length;
|
||||
memcpy(Request.d.RegisterLogonProcessRequest.LogonProcessNameBuffer,
|
||||
LsaLogonProcessName->Buffer,
|
||||
Request.d.RegisterLogonProcessRequest.Length);
|
||||
|
||||
Status = NtRequestWaitReplyPort(*Handle,
|
||||
&Request.Header,
|
||||
&Reply.Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
NtClose(*Handle);
|
||||
*Handle = NULL;
|
||||
return(Status);
|
||||
}
|
||||
Status = NtRequestWaitReplyPort(*Handle,
|
||||
&Request.Header,
|
||||
&Reply.Header);
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
NtClose(*Handle);
|
||||
*Handle = NULL;
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (!NT_SUCCESS(Reply.Status))
|
||||
{
|
||||
NtClose(*Handle);
|
||||
*Handle = NULL;
|
||||
return(Status);
|
||||
}
|
||||
if (!NT_SUCCESS(Reply.Status))
|
||||
{
|
||||
NtClose(*Handle);
|
||||
*Handle = NULL;
|
||||
return Status;
|
||||
}
|
||||
|
||||
*OperationalMode = Reply.d.RegisterLogonProcessReply.OperationalMode;
|
||||
*OperationalMode = Reply.d.RegisterLogonProcessReply.OperationalMode;
|
||||
|
||||
return(Reply.Status);
|
||||
return Reply.Status;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
WINAPI
|
||||
LsaEnumerateLogonSessions(
|
||||
PULONG LogonSessionCount,
|
||||
PLUID * LogonSessionList
|
||||
)
|
||||
LsaEnumerateLogonSessions(PULONG LogonSessionCount,
|
||||
PLUID *LogonSessionList)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
WINAPI
|
||||
LsaGetLogonSessionData(
|
||||
PLUID LogonId,
|
||||
PSECURITY_LOGON_SESSION_DATA * ppLogonSessionData
|
||||
)
|
||||
LsaGetLogonSessionData(PLUID LogonId,
|
||||
PSECURITY_LOGON_SESSION_DATA *ppLogonSessionData)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
WINAPI
|
||||
LsaRegisterPolicyChangeNotification(
|
||||
POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
|
||||
HANDLE NotificationEventHandle
|
||||
)
|
||||
LsaRegisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
|
||||
HANDLE NotificationEventHandle)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
WINAPI
|
||||
LsaUnregisterPolicyChangeNotification(
|
||||
POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
|
||||
HANDLE NotificationEventHandle
|
||||
)
|
||||
LsaUnregisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
|
||||
HANDLE NotificationEventHandle)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue