Moved logon-related functions to a separate file.

Replaced WINBOOL by BOOL.

svn path=/trunk/; revision=7785
This commit is contained in:
Eric Kohl 2004-01-20 01:40:19 +00:00
parent cc650c435b
commit 526b9ea0bc
13 changed files with 471 additions and 458 deletions

View file

@ -1,4 +1,4 @@
# $Id: makefile,v 1.31 2004/01/11 20:46:05 navaraf Exp $
# $Id: makefile,v 1.32 2004/01/20 01:40:18 ekohl Exp $
PATH_TO_TOP = ../..
@ -6,49 +6,46 @@ TARGET_TYPE = dynlink
TARGET_NAME = advapi32
TARGET_CFLAGS = \
-Wall \
-Werror \
-fno-builtin
TARGET_CFLAGS = -Wall -Werror -fno-builtin
# TARGET_CFLAGS += -DUNICODE
TARGET_LFLAGS = -nostartfiles -nostdlib
TARGET_SDKLIBS = ntdll.a kernel32.a
# TARGET_CFLAGS = -DUNICODE
TARGET_BASE = 0x77DB0000
MISC_OBJECTS=\
misc/dllmain.o \
misc/shutdown.o \
MISC_OBJECTS = \
misc/dllmain.o \
misc/logon.o \
misc/shutdown.o \
misc/sysfunc.o \
misc/crstubs.o \
misc/aclstubs.o \
misc/stubs.o
REGISTRY_OBJECTS=\
REGISTRY_OBJECTS = \
reg/reg.o
SECURITY_OBJECTS=\
sec/ac.o \
sec/audit.o \
sec/lsa.o \
sec/misc.o \
sec/sec.o \
SECURITY_OBJECTS = \
sec/ac.o \
sec/audit.o \
sec/lsa.o \
sec/misc.o \
sec/sec.o \
sec/sid.o
SERVICE_OBJECTS=\
service/scm.o \
service/sctrl.o \
SERVICE_OBJECTS = \
service/scm.o \
service/sctrl.o \
service/undoc.o
TOKEN_OBJECTS=\
token/privilege.o \
TOKEN_OBJECTS = \
token/privilege.o \
token/token.o
TARGET_OBJECTS = \
$(MISC_OBJECTS) \
$(MISC_OBJECTS) \
$(REGISTRY_OBJECTS) \
$(SECURITY_OBJECTS) \
$(SERVICE_OBJECTS) \
@ -61,4 +58,3 @@ include $(PATH_TO_TOP)/rules.mak
include $(TOOLS_PATH)/helper.mk
include $(TOOLS_PATH)/depend.mk

View file

@ -233,14 +233,14 @@ DWORD STDCALL SetSecurityInfo(HANDLE handle,SE_OBJECT_TYPE ObjectType,SECURITY_I
/*
* @unimplemented
*/
DWORD STDCALL GetInheritanceSourceA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,WINBOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMA pInheritArray)
DWORD STDCALL GetInheritanceSourceA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMA pInheritArray)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetInheritanceSourceW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,WINBOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMW pInheritArray)
DWORD STDCALL GetInheritanceSourceW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMW pInheritArray)
{
return(FALSE);
}
@ -254,14 +254,14 @@ DWORD STDCALL FreeInheritedFromArray(PINHERITED_FROMW pInheritArray,USHORT AceCn
/*
* @unimplemented
*/
DWORD STDCALL TreeResetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,WINBOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
DWORD STDCALL TreeResetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL TreeResetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,WINBOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
DWORD STDCALL TreeResetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
{
return(FALSE);
}

View file

@ -3,7 +3,7 @@
/*
* @unimplemented
*/
WINBOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer,
BOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer,
LPCSTR pszProvider, DWORD dwProvType,
DWORD dwFlags)
{
@ -12,7 +12,7 @@ WINBOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer,
BOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer,
LPCWSTR pszProvider, DWORD dwProvType, DWORD dwFlags)
{
return(FALSE);
@ -20,21 +20,21 @@ WINBOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGenRandom (HCRYPTPROV hProv, DWORD dwLen, BYTE *pbBuffer)
BOOL STDCALL CryptGenRandom (HCRYPTPROV hProv, DWORD dwLen, BYTE *pbBuffer)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptContextAddRef (HCRYPTPROV hProv, DWORD *pdwReserved, DWORD dwFlags)
BOOL STDCALL CryptContextAddRef (HCRYPTPROV hProv, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey,
BOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey,
DWORD dwFlags, HCRYPTHASH *phHash)
{
return(FALSE);
@ -42,7 +42,7 @@ WINBOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final,
BOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen)
{
return(FALSE);
@ -50,7 +50,7 @@ WINBOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBaseData,
BOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBaseData,
DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
@ -58,28 +58,28 @@ WINBOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBase
/*
* @unimplemented
*/
WINBOOL STDCALL CryptDestroyHash (HCRYPTHASH hHash)
BOOL STDCALL CryptDestroyHash (HCRYPTHASH hHash)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptDestroyKey (HCRYPTKEY hKey)
BOOL STDCALL CryptDestroyKey (HCRYPTKEY hKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptDuplicateKey (HCRYPTKEY hKey, DWORD *pdwReserved, DWORD dwFlags, HCRYPTKEY *phKey)
BOOL STDCALL CryptDuplicateKey (HCRYPTKEY hKey, DWORD *pdwReserved, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved,
BOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved,
DWORD dwFlags, HCRYPTHASH *phHash)
{
return(FALSE);
@ -87,7 +87,7 @@ WINBOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final,
BOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen, DWORD dwBufLen)
{
return(FALSE);
@ -95,7 +95,7 @@ WINBOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved,
BOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
@ -103,7 +103,7 @@ WINBOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved,
BOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
@ -111,7 +111,7 @@ WINBOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved,
BOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPSTR pszTypeName, DWORD *pcbTypeName)
{
return(FALSE);
@ -119,7 +119,7 @@ WINBOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved,
BOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszTypeName, DWORD *pcbTypeName)
{
return(FALSE);
@ -127,7 +127,7 @@ WINBOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobType,
BOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobType,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen)
{
return(FALSE);
@ -135,14 +135,14 @@ WINBOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobT
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGenKey (HCRYPTPROV hProv, ALG_ID Algid, DWORD dwFlags, HCRYPTKEY *phKey)
BOOL STDCALL CryptGenKey (HCRYPTPROV hProv, ALG_ID Algid, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData,
BOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
@ -150,7 +150,7 @@ WINBOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData,
BOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
@ -158,7 +158,7 @@ WINBOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData,
BOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
@ -166,7 +166,7 @@ WINBOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved,
BOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved,
DWORD dwFlags, LPSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
@ -174,7 +174,7 @@ WINBOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved,
BOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved,
DWORD dwFlags, LPWSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
@ -182,28 +182,28 @@ WINBOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptGetUserKey (HCRYPTPROV hProv, DWORD dwKeySpec, HCRYPTKEY *phUserKey)
BOOL STDCALL CryptGetUserKey (HCRYPTPROV hProv, DWORD dwKeySpec, HCRYPTKEY *phUserKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptHashData (HCRYPTHASH hHash, BYTE *pbData, DWORD dwDataLen, DWORD dwFlags)
BOOL STDCALL CryptHashData (HCRYPTHASH hHash, BYTE *pbData, DWORD dwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptHashSessionKey (HCRYPTHASH hHash, HCRYPTKEY hKey, DWORD dwFlags)
BOOL STDCALL CryptHashSessionKey (HCRYPTHASH hHash, HCRYPTKEY hKey, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen,
BOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen,
HCRYPTKEY hPubKey, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
@ -211,14 +211,14 @@ WINBOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen,
/*
* @unimplemented
*/
WINBOOL STDCALL CryptReleaseContext (HCRYPTPROV hProv, DWORD dwFlags)
BOOL STDCALL CryptReleaseContext (HCRYPTPROV hProv, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescription,
BOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescription,
DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen)
{
return(FALSE);
@ -226,7 +226,7 @@ WINBOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescr
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDescription,
BOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDescription,
DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen)
{
return(FALSE);
@ -234,56 +234,56 @@ WINBOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDesc
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
BOOL STDCALL CryptSetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
BOOL STDCALL CryptSetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSetProviderA (LPCSTR pszProvName, DWORD dwProvType)
BOOL STDCALL CryptSetProviderA (LPCSTR pszProvName, DWORD dwProvType)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSetProviderW (LPCWSTR pszProvName, DWORD dwProvType)
BOOL STDCALL CryptSetProviderW (LPCWSTR pszProvName, DWORD dwProvType)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSetProviderExA (LPCSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
BOOL STDCALL CryptSetProviderExA (LPCSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSetProviderExW (LPCWSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
BOOL STDCALL CryptSetProviderExW (LPCWSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptSetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
BOOL STDCALL CryptSetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
BOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
HCRYPTKEY hPubKey, LPCSTR sDescription, DWORD dwFlags)
{
return(FALSE);
@ -291,7 +291,7 @@ WINBOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWOR
/*
* @unimplemented
*/
WINBOOL STDCALL CryptVerifySignatureW (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
BOOL STDCALL CryptVerifySignatureW (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
HCRYPTKEY hPubKey, LPCWSTR sDescription, DWORD dwFlags)
{
return(FALSE);

View file

@ -0,0 +1,164 @@
/* $Id: logon.c,v 1.1 2004/01/20 01:40:18 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
* FILE: lib/advapi32/misc/logon.c
* PURPOSE: Logon functions
* PROGRAMMER: Eric Kohl
*/
#include <windows.h>
#define NTOS_MODE_USER
#include <ntos.h>
/* FUNCTIONS ***************************************************************/
/*
* @unimplemented
*/
BOOL STDCALL
CreateProcessAsUserA (HANDLE hToken,
LPCSTR lpApplicationName,
LPSTR lpCommandLine,
LPSECURITY_ATTRIBUTES lpProcessAttributes,
LPSECURITY_ATTRIBUTES lpThreadAttributes,
BOOL bInheritHandles,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCSTR lpCurrentDirectory,
LPSTARTUPINFOA lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation)
{
/* redirect call to CreateProcess() as long as we don't support user logins */
return CreateProcessA (lpApplicationName,
lpCommandLine,
lpProcessAttributes,
lpThreadAttributes,
bInheritHandles,
dwCreationFlags,
lpEnvironment,
lpCurrentDirectory,
lpStartupInfo,
lpProcessInformation);
}
/*
* @unimplemented
*/
BOOL STDCALL
CreateProcessAsUserW (HANDLE hToken,
LPCWSTR lpApplicationName,
LPWSTR lpCommandLine,
LPSECURITY_ATTRIBUTES lpProcessAttributes,
LPSECURITY_ATTRIBUTES lpThreadAttributes,
BOOL bInheritHandles,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCWSTR lpCurrentDirectory,
LPSTARTUPINFOW lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation)
{
/* redirect call to CreateProcess() as long as we don't support user logins */
return CreateProcessW (lpApplicationName,
lpCommandLine,
lpProcessAttributes,
lpThreadAttributes,
bInheritHandles,
dwCreationFlags,
lpEnvironment,
lpCurrentDirectory,
lpStartupInfo,
lpProcessInformation);
}
/*
* @unimplemented
*/
BOOL STDCALL
CreateProcessWithLogonW (LPCWSTR lpUsername,
LPCWSTR lpDomain,
LPCWSTR lpPassword,
DWORD dwLogonFlags,
LPCWSTR lpApplicationName,
LPWSTR lpCommandLine,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCWSTR lpCurrentDirectory,
LPSTARTUPINFOW lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserA (LPCSTR lpszUsername,
LPCSTR lpszDomain,
LPCSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken)
{
return FALSE;
}
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserW (LPCWSTR lpszUsername,
LPCWSTR lpszDomain,
LPCWSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken)
{
return FALSE;
}
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserExA (LPCSTR lpszUsername,
LPCSTR lpszDomain,
LPCSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken,
PSID *ppLogonSid,
PVOID *ppProfileBuffer,
LPDWORD pdwProfileLength,
PQUOTA_LIMITS pQuotaLimits)
{
return FALSE;
}
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserExW (LPCWSTR lpszUsername,
LPCWSTR lpszDomain,
LPCWSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken,
PSID *ppLogonSid,
PVOID *ppProfileBuffer,
LPDWORD pdwProfileLength,
PQUOTA_LIMITS pQuotaLimits)
{
return FALSE;
}
/* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: shutdown.c,v 1.10 2003/07/10 15:05:55 chorns Exp $
/* $Id: shutdown.c,v 1.11 2004/01/20 01:40:18 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -22,8 +22,7 @@
*
* @unimplemented
*/
WINBOOL
STDCALL
BOOL STDCALL
AbortSystemShutdownW(LPCWSTR lpMachineName)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
@ -36,8 +35,7 @@ AbortSystemShutdownW(LPCWSTR lpMachineName)
*
* @unimplemented
*/
BOOL
STDCALL
BOOL STDCALL
AbortSystemShutdownA(LPCSTR lpMachineName)
{
ANSI_STRING MachineNameA;
@ -64,8 +62,7 @@ AbortSystemShutdownA(LPCSTR lpMachineName)
*
* @unimplemented
*/
BOOL
STDCALL
BOOL STDCALL
InitiateSystemShutdownW(
LPWSTR lpMachineName,
LPWSTR lpMessage,

View file

@ -10,7 +10,7 @@
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
DeregisterEventSource (
HANDLE hEventLog
@ -48,7 +48,7 @@ RegisterEventSourceW (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ReportEventA (
HANDLE hEventLog,
@ -68,7 +68,7 @@ ReportEventA (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ReportEventW (
HANDLE hEventLog,
@ -88,7 +88,7 @@ ReportEventW (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
SetFileSecurityW (
LPCWSTR lpFileName,
@ -102,7 +102,7 @@ SetFileSecurityW (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ChangeServiceConfig2A(
SC_HANDLE hService,
@ -116,7 +116,7 @@ ChangeServiceConfig2A(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
QueryServiceConfig2A(
SC_HANDLE hService,
@ -146,7 +146,7 @@ RegisterServiceCtrlHandlerExA(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ChangeServiceConfig2W(
SC_HANDLE hService,
@ -160,7 +160,7 @@ ChangeServiceConfig2W(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
QueryServiceConfig2W(
SC_HANDLE hService,
@ -190,7 +190,7 @@ RegisterServiceCtrlHandlerExW(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AddAccessAllowedAceEx (
PACL pAcl,
@ -206,7 +206,7 @@ AddAccessAllowedAceEx (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AddAccessAllowedObjectAce (
PACL pAcl,
@ -224,7 +224,7 @@ AddAccessAllowedObjectAce (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AddAccessDeniedAceEx (
PACL pAcl,
@ -240,7 +240,7 @@ AddAccessDeniedAceEx (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AddAccessDeniedObjectAce (
PACL pAcl,
@ -258,7 +258,7 @@ AddAccessDeniedObjectAce (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AddAuditAccessAceEx(
PACL pAcl,
@ -266,8 +266,8 @@ AddAuditAccessAceEx(
DWORD AceFlags,
DWORD dwAccessMask,
PSID pSid,
WINBOOL bAuditSuccess,
WINBOOL bAuditFailure
BOOL bAuditSuccess,
BOOL bAuditFailure
)
{
return(FALSE);
@ -276,7 +276,7 @@ AddAuditAccessAceEx(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AddAuditAccessObjectAce (
PACL pAcl,
@ -286,8 +286,8 @@ AddAuditAccessObjectAce (
GUID *ObjectTypeGuid,
GUID *InheritedObjectTypeGuid,
PSID pSid,
WINBOOL bAuditSuccess,
WINBOOL bAuditFailure
BOOL bAuditSuccess,
BOOL bAuditFailure
)
{
return(FALSE);
@ -296,12 +296,12 @@ AddAuditAccessObjectAce (
/*
* @unimplemented
*/
WINBOOL
BOOL
APIENTRY
CheckTokenMembership(
HANDLE TokenHandle,
PSID SidToCheck,
PWINBOOL IsMember
PBOOL IsMember
)
{
return(FALSE);
@ -321,7 +321,7 @@ CloseEncryptedFileRaw(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
CloseEventLog (
HANDLE hEventLog
@ -333,14 +333,14 @@ CloseEventLog (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ConvertToAutoInheritPrivateObjectSecurity(
PSECURITY_DESCRIPTOR ParentDescriptor,
PSECURITY_DESCRIPTOR CurrentSecurityDescriptor,
PSECURITY_DESCRIPTOR *NewSecurityDescriptor,
GUID *ObjectType,
WINBOOL IsDirectoryObject,
BOOL IsDirectoryObject,
PGENERIC_MAPPING GenericMapping
)
{
@ -350,13 +350,13 @@ ConvertToAutoInheritPrivateObjectSecurity(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
CreatePrivateObjectSecurity (
PSECURITY_DESCRIPTOR ParentDescriptor,
PSECURITY_DESCRIPTOR CreatorDescriptor,
PSECURITY_DESCRIPTOR * NewDescriptor,
WINBOOL IsDirectoryObject,
BOOL IsDirectoryObject,
HANDLE Token,
PGENERIC_MAPPING GenericMapping
)
@ -367,14 +367,14 @@ CreatePrivateObjectSecurity (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
CreatePrivateObjectSecurityEx (
PSECURITY_DESCRIPTOR ParentDescriptor,
PSECURITY_DESCRIPTOR CreatorDescriptor,
PSECURITY_DESCRIPTOR * NewDescriptor,
GUID *ObjectType,
WINBOOL IsContainerObject,
BOOL IsContainerObject,
ULONG AutoInheritFlags,
HANDLE Token,
PGENERIC_MAPPING GenericMapping
@ -386,7 +386,7 @@ CreatePrivateObjectSecurityEx (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
CreatePrivateObjectSecurityWithMultipleInheritance (
PSECURITY_DESCRIPTOR ParentDescriptor,
@ -394,7 +394,7 @@ CreatePrivateObjectSecurityWithMultipleInheritance (
PSECURITY_DESCRIPTOR * NewDescriptor,
GUID **ObjectTypes,
ULONG GuidCount,
WINBOOL IsContainerObject,
BOOL IsContainerObject,
ULONG AutoInheritFlags,
HANDLE Token,
PGENERIC_MAPPING GenericMapping
@ -403,32 +403,11 @@ CreatePrivateObjectSecurityWithMultipleInheritance (
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL
STDCALL
CreateProcessWithLogonW(
LPCWSTR lpUsername,
LPCWSTR lpDomain,
LPCWSTR lpPassword,
DWORD dwLogonFlags,
LPCWSTR lpApplicationName,
LPWSTR lpCommandLine,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCWSTR lpCurrentDirectory,
LPSTARTUPINFOW lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation
)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL
BOOL
APIENTRY
CreateRestrictedToken(
HANDLE ExistingTokenHandle,
@ -448,7 +427,7 @@ CreateRestrictedToken(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
CreateWellKnownSid(
WELL_KNOWN_SID_TYPE WellKnownSidType,
@ -463,7 +442,7 @@ CreateWellKnownSid(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
DestroyPrivateObjectSecurity (
PSECURITY_DESCRIPTOR * ObjectDescriptor
@ -475,12 +454,12 @@ DestroyPrivateObjectSecurity (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
EqualDomainSid(
PSID pSid1,
PSID pSid2,
WINBOOL *pfEqual
BOOL *pfEqual
)
{
return(FALSE);
@ -489,7 +468,7 @@ EqualDomainSid(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetEventLogInformation (
HANDLE hEventLog,
@ -505,7 +484,7 @@ GetEventLogInformation (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetNumberOfEventLogRecords (
HANDLE hEventLog,
@ -518,7 +497,7 @@ GetNumberOfEventLogRecords (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetOldestEventLogRecord (
HANDLE hEventLog,
@ -531,7 +510,7 @@ GetOldestEventLogRecord (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetPrivateObjectSecurity (
PSECURITY_DESCRIPTOR ObjectDescriptor,
@ -560,7 +539,7 @@ GetSecurityDescriptorRMControl(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetWindowsAccountDomainSid(
PSID pSid,
@ -574,7 +553,7 @@ GetWindowsAccountDomainSid(
/*
* @unimplemented
*/
WINBOOL
BOOL
APIENTRY
ImpersonateAnonymousToken(
HANDLE ThreadHandle
@ -586,7 +565,7 @@ ImpersonateAnonymousToken(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ImpersonateNamedPipeClient(
HANDLE hNamedPipe
@ -598,7 +577,7 @@ ImpersonateNamedPipeClient(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
IsTextUnicode(
CONST VOID* lpBuffer,
@ -612,7 +591,7 @@ IsTextUnicode(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
IsTokenRestricted(
HANDLE TokenHandle
@ -624,7 +603,7 @@ IsTokenRestricted(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
IsTokenUntrusted(
HANDLE TokenHandle
@ -636,7 +615,7 @@ IsTokenUntrusted(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
IsWellKnownSid (
PSID pSid,
@ -649,7 +628,7 @@ IsWellKnownSid (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
MakeAbsoluteSD2 (
PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
@ -662,7 +641,7 @@ MakeAbsoluteSD2 (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
NotifyChangeEventLog(
HANDLE hEventLog,
@ -703,7 +682,7 @@ WriteEncryptedFileRaw(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
SetPrivateObjectSecurity (
SECURITY_INFORMATION SecurityInformation,
@ -719,7 +698,7 @@ SetPrivateObjectSecurity (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
SetPrivateObjectSecurityEx (
SECURITY_INFORMATION SecurityInformation,
@ -736,7 +715,7 @@ SetPrivateObjectSecurityEx (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
SetSecurityDescriptorControl (
PSECURITY_DESCRIPTOR pSecurityDescriptor,
@ -763,7 +742,7 @@ SetSecurityDescriptorRMControl(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
BackupEventLogA (
HANDLE hEventLog,
@ -776,7 +755,7 @@ BackupEventLogA (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ClearEventLogA (
HANDLE hEventLog,
@ -786,36 +765,11 @@ ClearEventLogA (
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL
STDCALL
CreateProcessAsUserA (
HANDLE hToken,
LPCSTR lpApplicationName,
LPSTR lpCommandLine,
LPSECURITY_ATTRIBUTES lpProcessAttributes,
LPSECURITY_ATTRIBUTES lpThreadAttributes,
WINBOOL bInheritHandles,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCSTR lpCurrentDirectory,
LPSTARTUPINFOA lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation
)
{
/* redirect call to CreateProcess() as long as we don't support user logins */
return CreateProcessA(lpApplicationName, lpCommandLine, lpProcessAttributes,
lpThreadAttributes, bInheritHandles, dwCreationFlags,
lpEnvironment, lpCurrentDirectory, lpStartupInfo,
lpProcessInformation);
}
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
DecryptFileA(
LPCSTR lpFileName,
@ -828,7 +782,7 @@ DecryptFileA(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
EncryptFileA(
LPCSTR lpFileName
@ -840,7 +794,7 @@ EncryptFileA(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
FileEncryptionStatusA(
LPCSTR lpFileName,
@ -853,7 +807,7 @@ FileEncryptionStatusA(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetCurrentHwProfileA (
LPHW_PROFILE_INFOA lpHwProfileInfo
@ -865,44 +819,6 @@ GetCurrentHwProfileA (
return(TRUE);
}
/*
* @unimplemented
*/
WINBOOL
STDCALL
LogonUserA (
LPCSTR lpszUsername,
LPCSTR lpszDomain,
LPCSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken
)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL
STDCALL
LogonUserExA (
LPCSTR lpszUsername,
LPCSTR lpszDomain,
LPCSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken ,
PSID *ppLogonSid ,
PVOID *ppProfileBuffer ,
LPDWORD pdwProfileLength ,
PQUOTA_LIMITS pQuotaLimits
)
{
return(FALSE);
}
/*
* @unimplemented
*/
@ -946,7 +862,7 @@ OpenEventLogA (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ReadEventLogA (
HANDLE hEventLog,
@ -964,7 +880,7 @@ ReadEventLogA (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
BackupEventLogW (
HANDLE hEventLog,
@ -977,7 +893,7 @@ BackupEventLogW (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ClearEventLogW (
HANDLE hEventLog,
@ -990,33 +906,7 @@ ClearEventLogW (
/*
* @unimplemented
*/
WINBOOL
STDCALL
CreateProcessAsUserW (
HANDLE hToken,
LPCWSTR lpApplicationName,
LPWSTR lpCommandLine,
LPSECURITY_ATTRIBUTES lpProcessAttributes,
LPSECURITY_ATTRIBUTES lpThreadAttributes,
WINBOOL bInheritHandles,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCWSTR lpCurrentDirectory,
LPSTARTUPINFOW lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation
)
{
/* redirect call to CreateProcess() as long as we don't support user logins */
return CreateProcessW(lpApplicationName, lpCommandLine, lpProcessAttributes,
lpThreadAttributes, bInheritHandles, dwCreationFlags,
lpEnvironment, lpCurrentDirectory, lpStartupInfo,
lpProcessInformation);
}
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
DecryptFileW(
LPCWSTR lpFileName,
@ -1029,7 +919,7 @@ DecryptFileW(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
EncryptFileW(
LPCWSTR lpFileName
@ -1041,7 +931,7 @@ EncryptFileW(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
FileEncryptionStatusW(
LPCWSTR lpFileName,
@ -1054,7 +944,7 @@ FileEncryptionStatusW(
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetCurrentHwProfileW (
LPHW_PROFILE_INFOW lpHwProfileInfo
@ -1063,44 +953,6 @@ GetCurrentHwProfileW (
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL
STDCALL
LogonUserW (
LPCWSTR lpszUsername,
LPCWSTR lpszDomain,
LPCWSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken
)
{
return(FALSE);
}
/*
* @unimplemented
*/
WINBOOL
STDCALL
LogonUserExW (
LPCWSTR lpszUsername,
LPCWSTR lpszDomain,
LPCWSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken ,
PSID *ppLogonSid ,
PVOID *ppProfileBuffer ,
LPDWORD pdwProfileLength ,
PQUOTA_LIMITS pQuotaLimits
)
{
return(FALSE);
}
/*
* @unimplemented
*/
@ -1144,7 +996,7 @@ OpenEventLogW (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ReadEventLogW (
HANDLE hEventLog,
@ -1162,7 +1014,7 @@ ReadEventLogW (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
InitiateSystemShutdownExA(LPSTR lpMachineName,LPSTR lpMessage,DWORD dwTimeout,BOOL bForceAppsClosed,BOOL bRebootAfterShutdown,DWORD dwReason)
{
@ -1172,7 +1024,7 @@ InitiateSystemShutdownExA(LPSTR lpMachineName,LPSTR lpMessage,DWORD dwTimeout,BO
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
InitiateSystemShutdownExW(LPWSTR lpMachineName,LPWSTR lpMessage,DWORD dwTimeout,BOOL bForceAppsClosed,BOOL bRebootAfterShutdown,DWORD dwReason)
{
@ -1182,9 +1034,9 @@ InitiateSystemShutdownExW(LPWSTR lpMachineName,LPWSTR lpMessage,DWORD dwTimeout,
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
NotifyBootConfigStatus(WINBOOL BootAcceptable)
NotifyBootConfigStatus(BOOL BootAcceptable)
{
return(FALSE);
}
@ -1262,7 +1114,7 @@ Wow64Win32ApiEntry (DWORD dwFuncNumber,DWORD dwFlag,DWORD dwRes)
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByType(
PSECURITY_DESCRIPTOR pSecurityDescriptor,
@ -1284,7 +1136,7 @@ LPBOOL AccessStatus
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByTypeResultList(
PSECURITY_DESCRIPTOR pSecurityDescriptor,
@ -1306,7 +1158,7 @@ LPDWORD AccessStatusList
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByTypeAndAuditAlarmA(
LPCSTR SubsystemName,
@ -1321,7 +1173,7 @@ DWORD Flags,
POBJECT_TYPE_LIST ObjectTypeList,
DWORD ObjectTypeListLength,
PGENERIC_MAPPING GenericMapping,
WINBOOL ObjectCreation,
BOOL ObjectCreation,
LPDWORD GrantedAccess,
LPBOOL AccessStatus,
LPBOOL pfGenerateOnClose
@ -1333,7 +1185,7 @@ LPBOOL pfGenerateOnClose
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByTypeAndAuditAlarmW(
LPCWSTR SubsystemName,
@ -1348,7 +1200,7 @@ DWORD Flags,
POBJECT_TYPE_LIST ObjectTypeList,
DWORD ObjectTypeListLength,
PGENERIC_MAPPING GenericMapping,
WINBOOL ObjectCreation,
BOOL ObjectCreation,
LPDWORD GrantedAccess,
LPBOOL AccessStatus,
LPBOOL pfGenerateOnClose
@ -1360,7 +1212,7 @@ LPBOOL pfGenerateOnClose
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByTypeResultListAndAuditAlarmA(
LPCSTR SubsystemName,
@ -1375,7 +1227,7 @@ DWORD Flags,
POBJECT_TYPE_LIST ObjectTypeList,
DWORD ObjectTypeListLength,
PGENERIC_MAPPING GenericMapping,
WINBOOL ObjectCreation,
BOOL ObjectCreation,
LPDWORD GrantedAccess,
LPDWORD AccessStatusList,
LPBOOL pfGenerateOnClose
@ -1387,7 +1239,7 @@ LPBOOL pfGenerateOnClose
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByTypeResultListAndAuditAlarmW(
LPCWSTR SubsystemName,
@ -1402,7 +1254,7 @@ DWORD Flags,
POBJECT_TYPE_LIST ObjectTypeList,
DWORD ObjectTypeListLength,
PGENERIC_MAPPING GenericMapping,
WINBOOL ObjectCreation,
BOOL ObjectCreation,
LPDWORD GrantedAccess,
LPDWORD AccessStatusList,
LPBOOL pfGenerateOnClose
@ -1414,7 +1266,7 @@ LPBOOL pfGenerateOnClose
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByTypeResultListAndAuditAlarmByHandleA(
LPCSTR SubsystemName,
@ -1430,7 +1282,7 @@ DWORD Flags,
POBJECT_TYPE_LIST ObjectTypeList,
DWORD ObjectTypeListLength,
PGENERIC_MAPPING GenericMapping,
WINBOOL ObjectCreation,
BOOL ObjectCreation,
LPDWORD GrantedAccess,
LPDWORD AccessStatusList,
LPBOOL pfGenerateOnClose
@ -1442,7 +1294,7 @@ LPBOOL pfGenerateOnClose
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
AccessCheckByTypeResultListAndAuditAlarmByHandleW(
LPCWSTR SubsystemName,
@ -1458,7 +1310,7 @@ DWORD Flags,
POBJECT_TYPE_LIST ObjectTypeList,
DWORD ObjectTypeListLength,
PGENERIC_MAPPING GenericMapping,
WINBOOL ObjectCreation,
BOOL ObjectCreation,
LPDWORD GrantedAccess,
LPDWORD AccessStatusList,
LPBOOL pfGenerateOnClose

View file

@ -1,4 +1,4 @@
/* $Id: ac.c,v 1.7 2003/07/10 15:05:55 chorns Exp $
/* $Id: ac.c,v 1.8 2004/01/20 01:40:18 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -16,7 +16,7 @@
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
GetAclInformation (
PACL pAcl,
@ -126,7 +126,7 @@ GetExplicitEntriesFromAclW (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
InitializeAcl (
PACL pAcl,
@ -152,7 +152,7 @@ InitializeAcl (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
IsValidAcl (
PACL pAcl
@ -165,7 +165,7 @@ IsValidAcl (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
SetAclInformation (
PACL pAcl,
@ -226,7 +226,7 @@ SetEntriesInAclW (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
AddAccessAllowedAce (
PACL pAcl,
@ -254,7 +254,7 @@ AddAccessAllowedAce (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
AddAccessDeniedAce (
PACL pAcl,
@ -282,7 +282,7 @@ AddAccessDeniedAce (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
AddAce (
PACL pAcl,
@ -312,15 +312,15 @@ AddAce (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
AddAuditAccessAce (
PACL pAcl,
DWORD dwAceRevision,
DWORD dwAccessMask,
PSID pSid,
WINBOOL bAuditSuccess,
WINBOOL bAuditFailure
BOOL bAuditSuccess,
BOOL bAuditFailure
)
{
NTSTATUS Status;
@ -344,7 +344,7 @@ AddAuditAccessAce (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
DeleteAce (
PACL pAcl,
@ -368,7 +368,7 @@ DeleteAce (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
FindFirstFreeAce (
PACL pAcl,
@ -383,7 +383,7 @@ FindFirstFreeAce (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
GetAce (
PACL pAcl,

View file

@ -1,4 +1,4 @@
/* $Id: lsa.c,v 1.6 2003/09/08 09:56:56 weiden Exp $
/* $Id: lsa.c,v 1.7 2004/01/20 01:40:19 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -10,9 +10,11 @@
* 19990515 EA stubs
* 20030202 KJK compressed stubs
*/
#include <windows.h>
#include <ddk/ntddk.h>
#include <ntsecapi.h>
/*
* @unimplemented
*/
@ -289,7 +291,7 @@ STDCALL
LsaRemoveAccountRights(
LSA_HANDLE PolicyHandle,
PSID AccountSid,
WINBOOL AllRights,
BOOL AllRights,
PLSA_UNICODE_STRING UserRights,
ULONG CountOfRights
)
@ -348,7 +350,7 @@ LsaSetForestTrustInformation(
LSA_HANDLE PolicyHandle,
PLSA_UNICODE_STRING TrustedDomainName,
PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo,
WINBOOL CheckOnly,
BOOL CheckOnly,
PLSA_FOREST_TRUST_COLLISION_INFORMATION * CollisionInfo
)
{

View file

@ -9,7 +9,7 @@
/*
* @implemented
*/
WINBOOL STDCALL
BOOL STDCALL
AreAllAccessesGranted(DWORD GrantedAccess,
DWORD DesiredAccess)
{
@ -21,7 +21,7 @@ AreAllAccessesGranted(DWORD GrantedAccess,
/*
* @implemented
*/
WINBOOL STDCALL
BOOL STDCALL
AreAnyAccessesGranted(DWORD GrantedAccess,
DWORD DesiredAccess)
{
@ -33,7 +33,7 @@ AreAnyAccessesGranted(DWORD GrantedAccess,
/*
* @implemented
*/
WINBOOL STDCALL
BOOL STDCALL
GetKernelObjectSecurity(HANDLE Handle,
SECURITY_INFORMATION RequestedInformation,
PSECURITY_DESCRIPTOR pSecurityDescriptor,
@ -93,7 +93,7 @@ MapGenericMask(PDWORD AccessMask,
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
ImpersonateLoggedOnUser(HANDLE hToken)
{

View file

@ -227,7 +227,7 @@ IsValidSecurityDescriptor (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
MakeAbsoluteSD (
PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
@ -269,7 +269,7 @@ MakeAbsoluteSD (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
MakeSelfRelativeSD (
PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
@ -423,7 +423,7 @@ GetUserNameW(LPWSTR lpBuffer, LPDWORD nSize)
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetFileSecurityA (
LPCSTR lpFileName,
@ -440,7 +440,7 @@ GetFileSecurityA (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
GetFileSecurityW (
LPCWSTR lpFileName,
@ -457,7 +457,7 @@ GetFileSecurityW (
/*
* @unimplemented
*/
WINBOOL
BOOL
STDCALL
SetFileSecurityA (
LPCSTR lpFileName,

View file

@ -1,4 +1,4 @@
/* $Id: sid.c,v 1.8 2003/07/10 15:05:55 chorns Exp $
/* $Id: sid.c,v 1.9 2004/01/20 01:40:19 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -99,7 +99,7 @@ CopySid (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
EqualPrefixSid (
PSID pSid1,
@ -112,7 +112,7 @@ EqualPrefixSid (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
EqualSid (
PSID pSid1,
@ -205,7 +205,7 @@ GetSidSubAuthorityCount (
/*
* @implemented
*/
WINBOOL
BOOL
STDCALL
InitializeSid (
PSID Sid,
@ -231,17 +231,17 @@ InitializeSid (
/*
* @implemented
*/
WINBOOL STDCALL
BOOL STDCALL
IsValidSid(PSID pSid)
{
return((WINBOOL)RtlValidSid(pSid));
return((BOOL)RtlValidSid(pSid));
}
/*
* @unimplemented
*/
WINBOOL STDCALL
BOOL STDCALL
LookupAccountNameA(LPCSTR lpSystemName,
LPCSTR lpAccountName,
PSID Sid,
@ -257,7 +257,7 @@ LookupAccountNameA(LPCSTR lpSystemName,
/*
* @unimplemented
*/
WINBOOL STDCALL
BOOL STDCALL
LookupAccountNameW(LPCWSTR lpSystemName,
LPCWSTR lpAccountName,
PSID Sid,
@ -273,7 +273,7 @@ LookupAccountNameW(LPCWSTR lpSystemName,
/*
* @unimplemented
*/
WINBOOL STDCALL
BOOL STDCALL
LookupAccountSidA(LPCSTR lpSystemName,
PSID Sid,
LPSTR Name,
@ -289,7 +289,7 @@ LookupAccountSidA(LPCSTR lpSystemName,
/*
* @unimplemented
*/
WINBOOL STDCALL
BOOL STDCALL
LookupAccountSidW(LPCWSTR lpSystemName,
PSID Sid,
LPWSTR Name,

View file

@ -1,4 +1,4 @@
/* $Id: sctrl.c,v 1.12 2003/08/28 13:38:23 gvg Exp $
/* $Id: sctrl.c,v 1.13 2004/01/20 01:40:19 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -222,7 +222,7 @@ SetServiceBits(SERVICE_STATUS_HANDLE hServiceStatus,
*
* @unimplemented
*/
WINBOOL STDCALL
BOOL STDCALL
SetServiceObjectSecurity(SC_HANDLE hService,
SECURITY_INFORMATION dwSecurityInformation,
PSECURITY_DESCRIPTOR lpSecurityDescriptor)

View file

@ -1,4 +1,5 @@
/*
/* $Id: token.c,v 1.8 2004/01/20 01:40:19 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
* FILE: lib/advapi32/token/token.c
@ -15,11 +16,10 @@
/*
* @implemented
*/
WINBOOL
STDCALL
BOOL STDCALL
AdjustTokenGroups (
HANDLE TokenHandle,
WINBOOL ResetToDefault,
BOOL ResetToDefault,
PTOKEN_GROUPS NewState,
DWORD BufferLength,
PTOKEN_GROUPS PreviousState,
@ -40,11 +40,10 @@ AdjustTokenGroups (
/*
* @implemented
*/
WINBOOL
STDCALL
BOOL STDCALL
AdjustTokenPrivileges (
HANDLE TokenHandle,
WINBOOL DisableAllPrivileges,
BOOL DisableAllPrivileges,
PTOKEN_PRIVILEGES NewState,
DWORD BufferLength,
PTOKEN_PRIVILEGES PreviousState,
@ -64,8 +63,7 @@ AdjustTokenPrivileges (
/*
* @implemented
*/
WINBOOL
STDCALL
BOOL STDCALL
GetTokenInformation (
HANDLE TokenHandle,
TOKEN_INFORMATION_CLASS TokenInformationClass,
@ -88,8 +86,7 @@ GetTokenInformation (
/*
* @implemented
*/
WINBOOL
STDCALL
BOOL STDCALL
SetTokenInformation (
HANDLE TokenHandle,
TOKEN_INFORMATION_CLASS TokenInformationClass,
@ -111,163 +108,168 @@ SetTokenInformation (
/*
* @implemented
*/
WINBOOL
STDCALL
AccessCheck (
PSECURITY_DESCRIPTOR pSecurityDescriptor,
BOOL STDCALL
AccessCheck (PSECURITY_DESCRIPTOR pSecurityDescriptor,
HANDLE ClientToken,
DWORD DesiredAccess,
PGENERIC_MAPPING GenericMapping,
PPRIVILEGE_SET PrivilegeSet,
LPDWORD PrivilegeSetLength,
LPDWORD GrantedAccess,
LPBOOL AccessStatus
)
LPBOOL AccessStatus)
{
NTSTATUS errCode;
errCode = NtAccessCheck( pSecurityDescriptor,
ClientToken,
DesiredAccess,
GenericMapping,
PrivilegeSet,
(PULONG)PrivilegeSetLength,
(PULONG)GrantedAccess,
(PBOOLEAN)AccessStatus);
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
NTSTATUS Status;
Status = NtAccessCheck (pSecurityDescriptor,
ClientToken,
DesiredAccess,
GenericMapping,
PrivilegeSet,
(PULONG)PrivilegeSetLength,
(PULONG)GrantedAccess,
(PBOOLEAN)AccessStatus);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}
/*
* @implemented
*/
WINBOOL
STDCALL
OpenProcessToken (
HANDLE ProcessHandle,
BOOL STDCALL
OpenProcessToken (HANDLE ProcessHandle,
DWORD DesiredAccess,
PHANDLE TokenHandle
)
PHANDLE TokenHandle)
{
NTSTATUS errCode;
errCode = NtOpenProcessToken(ProcessHandle,DesiredAccess,TokenHandle);
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
NTSTATUS Status;
Status = NtOpenProcessToken (ProcessHandle,
DesiredAccess,
TokenHandle);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}
/*
* @implemented
*/
WINBOOL
STDCALL
OpenThreadToken (
HANDLE ThreadHandle,
BOOL STDCALL
OpenThreadToken (HANDLE ThreadHandle,
DWORD DesiredAccess,
WINBOOL OpenAsSelf,
PHANDLE TokenHandle
)
BOOL OpenAsSelf,
PHANDLE TokenHandle)
{
NTSTATUS errCode;
errCode = NtOpenThreadToken(ThreadHandle,DesiredAccess,OpenAsSelf,TokenHandle);
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
NTSTATUS Status;
Status = NtOpenThreadToken (ThreadHandle,
DesiredAccess,
OpenAsSelf,
TokenHandle);
if (!NT_SUCCESS(Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}
/*
* @implemented
*/
WINBOOL
STDCALL
SetThreadToken (
PHANDLE ThreadHandle,
HANDLE TokenHandle
)
BOOL STDCALL
SetThreadToken (PHANDLE ThreadHandle,
HANDLE TokenHandle)
{
NTSTATUS errCode;
HANDLE hThread = NtCurrentThread();
if ( ThreadHandle != NULL )
hThread = ThreadHandle;
errCode = NtSetInformationThread(hThread,ThreadImpersonationToken,TokenHandle,sizeof(HANDLE));
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
NTSTATUS Status;
HANDLE hThread;
hThread = NtCurrentThread();
if (ThreadHandle != NULL)
hThread = ThreadHandle;
Status = NtSetInformationThread (hThread,
ThreadImpersonationToken,
TokenHandle,
sizeof(HANDLE));
if (!NT_SUCCESS(Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}
/*
* @implemented
*/
WINBOOL
STDCALL
DuplicateTokenEx (
HANDLE ExistingTokenHandle,
BOOL STDCALL
DuplicateTokenEx (HANDLE ExistingTokenHandle,
DWORD dwDesiredAccess,
LPSECURITY_ATTRIBUTES lpTokenAttributes,
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
TOKEN_TYPE TokenType,
PHANDLE DuplicateTokenHandle
)
PHANDLE DuplicateTokenHandle)
{
NTSTATUS errCode;
HANDLE NewToken;
OBJECT_ATTRIBUTES ObjectAttributes;
HANDLE NewToken;
NTSTATUS Status;
OBJECT_ATTRIBUTES ObjectAttributes;
ObjectAttributes.Length = sizeof(OBJECT_ATTRIBUTES);
ObjectAttributes.RootDirectory = NULL;
ObjectAttributes.ObjectName = NULL;
ObjectAttributes.Attributes = 0;
if (lpTokenAttributes->bInheritHandle)
{
ObjectAttributes.Attributes |= OBJ_INHERIT;
}
ObjectAttributes.SecurityDescriptor = lpTokenAttributes->lpSecurityDescriptor;
ObjectAttributes.SecurityQualityOfService = NULL;
ObjectAttributes.Length = sizeof(OBJECT_ATTRIBUTES);
ObjectAttributes.RootDirectory = NULL;
ObjectAttributes.ObjectName = NULL;
ObjectAttributes.Attributes = 0;
if ( lpTokenAttributes->bInheritHandle )
ObjectAttributes.Attributes |= OBJ_INHERIT;
Status = NtDuplicateToken (ExistingTokenHandle,
dwDesiredAccess,
&ObjectAttributes,
ImpersonationLevel,
TokenType,
&NewToken);
if (!NT_SUCCESS(Status))
{
SetLastError(RtlNtStatusToDosError(Status));
return FALSE;
}
ObjectAttributes.SecurityDescriptor = lpTokenAttributes->lpSecurityDescriptor;
ObjectAttributes.SecurityQualityOfService = NULL;
errCode = NtDuplicateToken( ExistingTokenHandle, dwDesiredAccess,
&ObjectAttributes, ImpersonationLevel,
TokenType, &NewToken );
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
return TRUE;
}
/*
* @implemented
*/
WINBOOL
STDCALL
DuplicateToken (
HANDLE ExistingTokenHandle,
BOOL STDCALL
DuplicateToken (HANDLE ExistingTokenHandle,
SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
PHANDLE DuplicateTokenHandle
)
PHANDLE DuplicateTokenHandle)
{
return DuplicateTokenEx (
ExistingTokenHandle,
TOKEN_DUPLICATE|TOKEN_IMPERSONATE|TOKEN_QUERY,
NULL,
ImpersonationLevel,
TokenImpersonation,
DuplicateTokenHandle
);
return DuplicateTokenEx (ExistingTokenHandle,
TOKEN_DUPLICATE|TOKEN_IMPERSONATE|TOKEN_QUERY,
NULL,
ImpersonationLevel,
TokenImpersonation,
DuplicateTokenHandle);
}
/* EOF */