- Implement AddAccessAllowedAceEx, AddAccessDeniedAceEx and AddAuditAccessAceEx.

- Add GetCurrentHwProfileW stub.

svn path=/trunk/; revision=10840
This commit is contained in:
Eric Kohl 2004-09-13 12:14:55 +00:00
parent 00443884ee
commit 44e5201910
4 changed files with 110 additions and 14 deletions

View file

@ -1,4 +1,4 @@
; $Id: advapi32.def,v 1.21 2004/08/23 21:16:25 gvg Exp $
; $Id: advapi32.def,v 1.22 2004/09/13 12:14:55 ekohl Exp $
;
; advapi32.def
;
@ -12,12 +12,12 @@ AccessCheck@32
AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW@44
AddAccessAllowedAce@16
;AddAccessAllowedAceEx@20
AddAccessAllowedAceEx@20
AddAccessDeniedAce@16
;AddAccessDeniedAceEx@20
AddAccessDeniedAceEx@20
AddAce@20
AddAuditAccessAce@24
;AddAuditAccessAceEx@28
AddAuditAccessAceEx@28
AdjustTokenGroups@24
AdjustTokenPrivileges@24
AllocateAndInitializeSid@44
@ -127,7 +127,7 @@ GetAclInformation@16
;GetAuditedPermissionsFromSDA
;GetAuditedPermissionsFromSDW
GetCurrentHwProfileA@4
;GetCurrentHwProfileW@4
GetCurrentHwProfileW@4
;GetEffectiveAccessRightsA
;GetEffectiveAccessRightsW
;GetEffectiveRightsFromAclA@12
@ -179,7 +179,7 @@ GetUserNameW@8
;I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW@20
ImpersonateLoggedOnUser@4
;ImpersonateNamedPipeClient@4
ImpersonateNamedPipeClient@4
ImpersonateSelf@4
InitializeAcl@12
InitializeSecurityDescriptor@8

View file

@ -1,4 +1,4 @@
; $Id: advapi32.edf,v 1.41 2004/08/23 21:16:25 gvg Exp $
; $Id: advapi32.edf,v 1.42 2004/09/13 12:14:55 ekohl Exp $
;
; advapi32.edf
;
@ -12,9 +12,12 @@ AccessCheck=AccessCheck@32
AccessCheckAndAuditAlarmA=AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW=AccessCheckAndAuditAlarmW@44
AddAccessAllowedAce=AddAccessAllowedAce@16
AddAccessAllowedAceEx=AddAccessAllowedAceEx@20
AddAccessDeniedAce=AddAccessDeniedAce@16
AddAccessDeniedAceEx=AddAccessDeniedAceEx@20
AddAce=AddAce@20
AddAuditAccessAce=AddAuditAccessAce@24
AddAuditAccessAceEx=AddAuditAccessAceEx@28
AdjustTokenGroups=AdjustTokenGroups@24
AdjustTokenPrivileges=AdjustTokenPrivileges@24
AllocateAndInitializeSid=AllocateAndInitializeSid@44
@ -123,7 +126,7 @@ GetAclInformation=GetAclInformation@16
;GetAuditedPermissionsFromSDA
;GetAuditedPermissionsFromSDW
GetCurrentHwProfileA=GetCurrentHwProfileA@4
;GetCurrentHwProfileW=GetCurrentHwProfileW@4
GetCurrentHwProfileW=GetCurrentHwProfileW@4
;GetEffectiveAccessRightsA
;GetEffectiveAccessRightsW
;GetEffectiveRightsFromAclA=GetEffectiveRightsFromAclA@12
@ -175,7 +178,7 @@ GetUserNameW=GetUserNameW@8
;I_ScSetServiceBitsA=I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW=I_ScSetServiceBitsW@20
ImpersonateLoggedOnUser=ImpersonateLoggedOnUser@4
;ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4
ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4
ImpersonateSelf=ImpersonateSelf@4
InitializeAcl=InitializeAcl@12
InitializeSecurityDescriptor=InitializeSecurityDescriptor@8

View file

@ -1,8 +1,8 @@
/* $Id: hwprofiles.c,v 1.3 2004/08/15 17:03:14 chorns Exp $
/* $Id: hwprofiles.c,v 1.4 2004/09/13 12:13:35 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
* FILE: lib/advapi32/misc/sysfun.c
* FILE: lib/advapi32/misc/hwprofiles.c
* PURPOSE: advapi32.dll Hardware Functions
* PROGRAMMER: Steven Edwards
* UPDATE HISTORY:
@ -27,6 +27,14 @@
BOOL STDCALL
GetCurrentHwProfileA(LPHW_PROFILE_INFOA pInfo)
{
DPRINT("GetCurrentHwProfileA stub\n");
return 1;
DPRINT("GetCurrentHwProfileA stub\n");
return TRUE;
}
BOOL STDCALL
GetCurrentHwProfileW(LPHW_PROFILE_INFOW pInfo)
{
DPRINT("GetCurrentHwProfileW stub\n");
return TRUE;
}

View file

@ -1,4 +1,4 @@
/* $Id: ac.c,v 1.10 2004/08/15 17:03:15 chorns Exp $
/* $Id: ac.c,v 1.11 2004/09/13 12:14:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -136,6 +136,33 @@ AddAccessAllowedAce (
}
/*
* @implemented
*/
BOOL STDCALL
AddAccessAllowedAceEx(PACL pAcl,
DWORD dwAceRevision,
DWORD AceFlags,
DWORD AccessMask,
PSID pSid)
{
NTSTATUS Status;
Status = RtlAddAccessAllowedAceEx(pAcl,
dwAceRevision,
AceFlags,
AccessMask,
pSid);
if (!NT_SUCCESS(Status))
{
SetLastError(RtlNtStatusToDosError(Status));
return FALSE;
}
return TRUE;
}
/*
* @implemented
*/
@ -164,6 +191,33 @@ AddAccessDeniedAce (
}
/*
* @implemented
*/
BOOL STDCALL
AddAccessDeniedAceEx(PACL pAcl,
DWORD dwAceRevision,
DWORD AceFlags,
DWORD AccessMask,
PSID pSid)
{
NTSTATUS Status;
Status = RtlAddAccessDeniedAceEx(pAcl,
dwAceRevision,
AceFlags,
AccessMask,
pSid);
if (!NT_SUCCESS(Status))
{
SetLastError(RtlNtStatusToDosError(Status));
return FALSE;
}
return TRUE;
}
/*
* @implemented
*/
@ -226,6 +280,37 @@ AddAuditAccessAce (
}
/*
* @implemented
*/
BOOL STDCALL
AddAuditAccessAceEx(PACL pAcl,
DWORD dwAceRevision,
DWORD AceFlags,
DWORD dwAccessMask,
PSID pSid,
BOOL bAuditSuccess,
BOOL bAuditFailure)
{
NTSTATUS Status;
Status = RtlAddAuditAccessAceEx(pAcl,
dwAceRevision,
AceFlags,
dwAccessMask,
pSid,
bAuditSuccess,
bAuditFailure);
if (!NT_SUCCESS(Status))
{
SetLastError(RtlNtStatusToDosError(Status));
return FALSE;
}
return TRUE;
}
/*
* @implemented
*/