added stubs for SetSecurityInfo(), GetInheritanceSourceA/W() and FreeInheritedFromArray()

svn path=/trunk/; revision=12092
This commit is contained in:
Thomas Bluemel 2004-12-13 19:06:28 +00:00
parent 1d2f603b9d
commit 3340e6eecd
3 changed files with 98 additions and 12 deletions

View file

@ -1,4 +1,4 @@
; $Id: advapi32.def,v 1.26 2004/12/11 00:21:33 weiden Exp $ ; $Id: advapi32.def,v 1.27 2004/12/13 19:06:27 weiden Exp $
; ;
; advapi32.def ; advapi32.def
; ;
@ -122,6 +122,7 @@ EnumServicesStatusW@32
EqualPrefixSid@8 EqualPrefixSid@8
EqualSid@8 EqualSid@8
FindFirstFreeAce@8 FindFirstFreeAce@8
FreeInheritedFromArray@12
FreeSid@4 FreeSid@4
GetAce@12 GetAce@12
GetAclInformation@16 GetAclInformation@16
@ -143,6 +144,8 @@ GetCurrentHwProfileW@4
;GetExplicitEntriesFromAclW@12 ;GetExplicitEntriesFromAclW@12
GetFileSecurityA@20 GetFileSecurityA@20
GetFileSecurityW@20 GetFileSecurityW@20
GetInheritanceSourceA@40
GetInheritanceSourceW@40
GetKernelObjectSecurity@20 GetKernelObjectSecurity@20
GetLengthSid@4 GetLengthSid@4
;GetMultipleTrusteeA@4 ;GetMultipleTrusteeA@4
@ -376,7 +379,7 @@ SetSecurityDescriptorDacl@16
SetSecurityDescriptorGroup@12 SetSecurityDescriptorGroup@12
SetSecurityDescriptorOwner@12 SetSecurityDescriptorOwner@12
SetSecurityDescriptorSacl@16 SetSecurityDescriptorSacl@16
;SetSecurityInfo@28 SetSecurityInfo@28
SetServiceBits@16 SetServiceBits@16
SetServiceObjectSecurity@12 SetServiceObjectSecurity@12
SetServiceStatus@8 SetServiceStatus@8

View file

@ -1,4 +1,4 @@
/* $Id: ac.c,v 1.11 2004/09/13 12:14:11 ekohl Exp $ /* $Id: ac.c,v 1.12 2004/12/13 19:06:28 weiden Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -8,6 +8,8 @@
#include "advapi32.h" #include "advapi32.h"
#define NDEBUG
#include <debug.h>
/* --- ACL --- */ /* --- ACL --- */
@ -375,4 +377,66 @@ GetAce (
return TRUE; return TRUE;
} }
/*
* @unimplemented
*/
DWORD
STDCALL
GetInheritanceSourceW (
LPWSTR pObjectName,
SE_OBJECT_TYPE ObjectType,
SECURITY_INFORMATION SecurityInfo,
BOOL Container,
GUID** pObjectClassGuids OPTIONAL,
DWORD GuidCount,
PACL pAcl,
PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,
PGENERIC_MAPPING pGenericMapping,
PINHERITED_FROMW pInheritArray
)
{
DPRINT1("%s() not implemented!\n", __FUNCTION__);
return ERROR_CALL_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
DWORD
STDCALL
GetInheritanceSourceA (
LPSTR pObjectName,
SE_OBJECT_TYPE ObjectType,
SECURITY_INFORMATION SecurityInfo,
BOOL Container,
GUID** pObjectClassGuids OPTIONAL,
DWORD GuidCount,
PACL pAcl,
PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,
PGENERIC_MAPPING pGenericMapping,
PINHERITED_FROM pInheritArray
)
{
DPRINT1("%s() not implemented!\n", __FUNCTION__);
return ERROR_CALL_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
DWORD
STDCALL
FreeInheritedFromArray (
PINHERITED_FROM pInheritArray,
USHORT AceCnt,
PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL
)
{
DPRINT1("%s() not implemented!\n", __FUNCTION__);
return ERROR_CALL_NOT_IMPLEMENTED;
}
/* EOF */ /* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: misc.c,v 1.29 2004/12/13 07:09:56 royce Exp $ /* $Id: misc.c,v 1.30 2004/12/13 19:06:28 weiden Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -541,14 +541,14 @@ GetUserNameW ( LPWSTR lpszName, LPDWORD lpSize )
if ( dwLastError != ERROR_NO_TOKEN if ( dwLastError != ERROR_NO_TOKEN
&& dwLastError != ERROR_NO_IMPERSONATION_TOKEN ) && dwLastError != ERROR_NO_IMPERSONATION_TOKEN )
{ {
// don't call SetLastError(), /* don't call SetLastError(),
// as OpenThreadToken() ought to have set one as OpenThreadToken() ought to have set one */
return FALSE; return FALSE;
} }
if ( !OpenProcessToken ( GetCurrentProcess(), TOKEN_QUERY, &hToken ) ) if ( !OpenProcessToken ( GetCurrentProcess(), TOKEN_QUERY, &hToken ) )
{ {
// don't call SetLastError(), /* don't call SetLastError(),
// as OpenProcessToken() ought to have set one as OpenProcessToken() ought to have set one */
return FALSE; return FALSE;
} }
} }
@ -569,8 +569,8 @@ GetUserNameW ( LPWSTR lpszName, LPDWORD lpSize )
} }
if ( !GetTokenInformation ( hToken, TokenUser, tu_buf, tu_len, &tu_len ) ) if ( !GetTokenInformation ( hToken, TokenUser, tu_buf, tu_len, &tu_len ) )
{ {
// don't call SetLastError(), /* don't call SetLastError(),
// as GetTokenInformation() ought to have set one as GetTokenInformation() ought to have set one */
LocalFree ( tu_buf ); LocalFree ( tu_buf );
CloseHandle ( hToken ); CloseHandle ( hToken );
return FALSE; return FALSE;
@ -603,8 +603,8 @@ GetUserNameW ( LPWSTR lpszName, LPDWORD lpSize )
} }
if ( !LookupAccountSidW ( NULL, token_user->User.Sid, lpszName, &an_len, domain_name, &dn_len, &snu ) ) if ( !LookupAccountSidW ( NULL, token_user->User.Sid, lpszName, &an_len, domain_name, &dn_len, &snu ) )
{ {
// don't call SetLastError(), /* don't call SetLastError(),
// as LookupAccountSid() ought to have set one as LookupAccountSid() ought to have set one */
LocalFree ( domain_name ); LocalFree ( domain_name );
CloseHandle ( hToken ); CloseHandle ( hToken );
return FALSE; return FALSE;
@ -1023,6 +1023,25 @@ GetSecurityInfo(HANDLE handle,
} }
/**********************************************************************
* SetSecurityInfo EXPORTED
*
* @unimplemented
*/
DWORD
WINAPI
SetSecurityInfo(HANDLE handle,
SE_OBJECT_TYPE ObjectType,
SECURITY_INFORMATION SecurityInfo,
PSID psidOwner,
PSID psidGroup,
PACL pDacl,
PACL pSacl)
{
DPRINT1("SetSecurityInfo: stub\n");
return ERROR_CALL_NOT_IMPLEMENTED;
}
/****************************************************************************** /******************************************************************************
* GetSecurityInfoExW EXPORTED * GetSecurityInfoExW EXPORTED