- Implement AddAccessAllowedAceEx, AddAccessDeniedAceEx and AddAuditAccessAceEx.

- Add GetCurrentHwProfileW stub.

svn path=/trunk/; revision=10840
This commit is contained in:
Eric Kohl 2004-09-13 12:14:55 +00:00
parent 00443884ee
commit 44e5201910
4 changed files with 110 additions and 14 deletions

View file

@ -1,4 +1,4 @@
; $Id: advapi32.def,v 1.21 2004/08/23 21:16:25 gvg Exp $ ; $Id: advapi32.def,v 1.22 2004/09/13 12:14:55 ekohl Exp $
; ;
; advapi32.def ; advapi32.def
; ;
@ -12,12 +12,12 @@ AccessCheck@32
AccessCheckAndAuditAlarmA@44 AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW@44 AccessCheckAndAuditAlarmW@44
AddAccessAllowedAce@16 AddAccessAllowedAce@16
;AddAccessAllowedAceEx@20 AddAccessAllowedAceEx@20
AddAccessDeniedAce@16 AddAccessDeniedAce@16
;AddAccessDeniedAceEx@20 AddAccessDeniedAceEx@20
AddAce@20 AddAce@20
AddAuditAccessAce@24 AddAuditAccessAce@24
;AddAuditAccessAceEx@28 AddAuditAccessAceEx@28
AdjustTokenGroups@24 AdjustTokenGroups@24
AdjustTokenPrivileges@24 AdjustTokenPrivileges@24
AllocateAndInitializeSid@44 AllocateAndInitializeSid@44
@ -127,7 +127,7 @@ GetAclInformation@16
;GetAuditedPermissionsFromSDA ;GetAuditedPermissionsFromSDA
;GetAuditedPermissionsFromSDW ;GetAuditedPermissionsFromSDW
GetCurrentHwProfileA@4 GetCurrentHwProfileA@4
;GetCurrentHwProfileW@4 GetCurrentHwProfileW@4
;GetEffectiveAccessRightsA ;GetEffectiveAccessRightsA
;GetEffectiveAccessRightsW ;GetEffectiveAccessRightsW
;GetEffectiveRightsFromAclA@12 ;GetEffectiveRightsFromAclA@12
@ -179,7 +179,7 @@ GetUserNameW@8
;I_ScSetServiceBitsA@20 ;I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW@20 ;I_ScSetServiceBitsW@20
ImpersonateLoggedOnUser@4 ImpersonateLoggedOnUser@4
;ImpersonateNamedPipeClient@4 ImpersonateNamedPipeClient@4
ImpersonateSelf@4 ImpersonateSelf@4
InitializeAcl@12 InitializeAcl@12
InitializeSecurityDescriptor@8 InitializeSecurityDescriptor@8

View file

@ -1,4 +1,4 @@
; $Id: advapi32.edf,v 1.41 2004/08/23 21:16:25 gvg Exp $ ; $Id: advapi32.edf,v 1.42 2004/09/13 12:14:55 ekohl Exp $
; ;
; advapi32.edf ; advapi32.edf
; ;
@ -12,9 +12,12 @@ AccessCheck=AccessCheck@32
AccessCheckAndAuditAlarmA=AccessCheckAndAuditAlarmA@44 AccessCheckAndAuditAlarmA=AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW=AccessCheckAndAuditAlarmW@44 AccessCheckAndAuditAlarmW=AccessCheckAndAuditAlarmW@44
AddAccessAllowedAce=AddAccessAllowedAce@16 AddAccessAllowedAce=AddAccessAllowedAce@16
AddAccessAllowedAceEx=AddAccessAllowedAceEx@20
AddAccessDeniedAce=AddAccessDeniedAce@16 AddAccessDeniedAce=AddAccessDeniedAce@16
AddAccessDeniedAceEx=AddAccessDeniedAceEx@20
AddAce=AddAce@20 AddAce=AddAce@20
AddAuditAccessAce=AddAuditAccessAce@24 AddAuditAccessAce=AddAuditAccessAce@24
AddAuditAccessAceEx=AddAuditAccessAceEx@28
AdjustTokenGroups=AdjustTokenGroups@24 AdjustTokenGroups=AdjustTokenGroups@24
AdjustTokenPrivileges=AdjustTokenPrivileges@24 AdjustTokenPrivileges=AdjustTokenPrivileges@24
AllocateAndInitializeSid=AllocateAndInitializeSid@44 AllocateAndInitializeSid=AllocateAndInitializeSid@44
@ -123,7 +126,7 @@ GetAclInformation=GetAclInformation@16
;GetAuditedPermissionsFromSDA ;GetAuditedPermissionsFromSDA
;GetAuditedPermissionsFromSDW ;GetAuditedPermissionsFromSDW
GetCurrentHwProfileA=GetCurrentHwProfileA@4 GetCurrentHwProfileA=GetCurrentHwProfileA@4
;GetCurrentHwProfileW=GetCurrentHwProfileW@4 GetCurrentHwProfileW=GetCurrentHwProfileW@4
;GetEffectiveAccessRightsA ;GetEffectiveAccessRightsA
;GetEffectiveAccessRightsW ;GetEffectiveAccessRightsW
;GetEffectiveRightsFromAclA=GetEffectiveRightsFromAclA@12 ;GetEffectiveRightsFromAclA=GetEffectiveRightsFromAclA@12
@ -175,7 +178,7 @@ GetUserNameW=GetUserNameW@8
;I_ScSetServiceBitsA=I_ScSetServiceBitsA@20 ;I_ScSetServiceBitsA=I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW=I_ScSetServiceBitsW@20 ;I_ScSetServiceBitsW=I_ScSetServiceBitsW@20
ImpersonateLoggedOnUser=ImpersonateLoggedOnUser@4 ImpersonateLoggedOnUser=ImpersonateLoggedOnUser@4
;ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4 ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4
ImpersonateSelf=ImpersonateSelf@4 ImpersonateSelf=ImpersonateSelf@4
InitializeAcl=InitializeAcl@12 InitializeAcl=InitializeAcl@12
InitializeSecurityDescriptor=InitializeSecurityDescriptor@8 InitializeSecurityDescriptor=InitializeSecurityDescriptor@8

View file

@ -1,8 +1,8 @@
/* $Id: hwprofiles.c,v 1.3 2004/08/15 17:03:14 chorns Exp $ /* $Id: hwprofiles.c,v 1.4 2004/09/13 12:13:35 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
* FILE: lib/advapi32/misc/sysfun.c * FILE: lib/advapi32/misc/hwprofiles.c
* PURPOSE: advapi32.dll Hardware Functions * PURPOSE: advapi32.dll Hardware Functions
* PROGRAMMER: Steven Edwards * PROGRAMMER: Steven Edwards
* UPDATE HISTORY: * UPDATE HISTORY:
@ -28,5 +28,13 @@ BOOL STDCALL
GetCurrentHwProfileA(LPHW_PROFILE_INFOA pInfo) GetCurrentHwProfileA(LPHW_PROFILE_INFOA pInfo)
{ {
DPRINT("GetCurrentHwProfileA stub\n"); DPRINT("GetCurrentHwProfileA stub\n");
return 1; return TRUE;
}
BOOL STDCALL
GetCurrentHwProfileW(LPHW_PROFILE_INFOW pInfo)
{
DPRINT("GetCurrentHwProfileW stub\n");
return TRUE;
} }

View file

@ -1,4 +1,4 @@
/* $Id: ac.c,v 1.10 2004/08/15 17:03:15 chorns Exp $ /* $Id: ac.c,v 1.11 2004/09/13 12:14:11 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -136,6 +136,33 @@ AddAccessAllowedAce (
} }
/*
* @implemented
*/
BOOL STDCALL
AddAccessAllowedAceEx(PACL pAcl,
DWORD dwAceRevision,
DWORD AceFlags,
DWORD AccessMask,
PSID pSid)
{
NTSTATUS Status;
Status = RtlAddAccessAllowedAceEx(pAcl,
dwAceRevision,
AceFlags,
AccessMask,
pSid);
if (!NT_SUCCESS(Status))
{
SetLastError(RtlNtStatusToDosError(Status));
return FALSE;
}
return TRUE;
}
/* /*
* @implemented * @implemented
*/ */
@ -164,6 +191,33 @@ AddAccessDeniedAce (
} }
/*
* @implemented
*/
BOOL STDCALL
AddAccessDeniedAceEx(PACL pAcl,
DWORD dwAceRevision,
DWORD AceFlags,
DWORD AccessMask,
PSID pSid)
{
NTSTATUS Status;
Status = RtlAddAccessDeniedAceEx(pAcl,
dwAceRevision,
AceFlags,
AccessMask,
pSid);
if (!NT_SUCCESS(Status))
{
SetLastError(RtlNtStatusToDosError(Status));
return FALSE;
}
return TRUE;
}
/* /*
* @implemented * @implemented
*/ */
@ -226,6 +280,37 @@ AddAuditAccessAce (
} }
/*
* @implemented
*/
BOOL STDCALL
AddAuditAccessAceEx(PACL pAcl,
DWORD dwAceRevision,
DWORD AceFlags,
DWORD dwAccessMask,
PSID pSid,
BOOL bAuditSuccess,
BOOL bAuditFailure)
{
NTSTATUS Status;
Status = RtlAddAuditAccessAceEx(pAcl,
dwAceRevision,
AceFlags,
dwAccessMask,
pSid,
bAuditSuccess,
bAuditFailure);
if (!NT_SUCCESS(Status))
{
SetLastError(RtlNtStatusToDosError(Status));
return FALSE;
}
return TRUE;
}
/* /*
* @implemented * @implemented
*/ */