From 526b9ea0bc785484011ed56fbe08913c593cf83c Mon Sep 17 00:00:00 2001 From: Eric Kohl Date: Tue, 20 Jan 2004 01:40:19 +0000 Subject: [PATCH] Moved logon-related functions to a separate file. Replaced WINBOOL by BOOL. svn path=/trunk/; revision=7785 --- reactos/lib/advapi32/makefile | 44 ++-- reactos/lib/advapi32/misc/aclstubs.c | 8 +- reactos/lib/advapi32/misc/crstubs.c | 78 +++---- reactos/lib/advapi32/misc/logon.c | 164 ++++++++++++++ reactos/lib/advapi32/misc/shutdown.c | 11 +- reactos/lib/advapi32/misc/stubs.c | 312 +++++++-------------------- reactos/lib/advapi32/sec/ac.c | 28 +-- reactos/lib/advapi32/sec/lsa.c | 8 +- reactos/lib/advapi32/sec/misc.c | 8 +- reactos/lib/advapi32/sec/sec.c | 10 +- reactos/lib/advapi32/sec/sid.c | 20 +- reactos/lib/advapi32/service/sctrl.c | 4 +- reactos/lib/advapi32/token/token.c | 234 ++++++++++---------- 13 files changed, 471 insertions(+), 458 deletions(-) create mode 100644 reactos/lib/advapi32/misc/logon.c diff --git a/reactos/lib/advapi32/makefile b/reactos/lib/advapi32/makefile index cdda88404f6..670cc47bbfd 100644 --- a/reactos/lib/advapi32/makefile +++ b/reactos/lib/advapi32/makefile @@ -1,4 +1,4 @@ -# $Id: makefile,v 1.31 2004/01/11 20:46:05 navaraf Exp $ +# $Id: makefile,v 1.32 2004/01/20 01:40:18 ekohl Exp $ PATH_TO_TOP = ../.. @@ -6,49 +6,46 @@ TARGET_TYPE = dynlink TARGET_NAME = advapi32 -TARGET_CFLAGS = \ - -Wall \ - -Werror \ - -fno-builtin +TARGET_CFLAGS = -Wall -Werror -fno-builtin +# TARGET_CFLAGS += -DUNICODE TARGET_LFLAGS = -nostartfiles -nostdlib TARGET_SDKLIBS = ntdll.a kernel32.a -# TARGET_CFLAGS = -DUNICODE - TARGET_BASE = 0x77DB0000 -MISC_OBJECTS=\ - misc/dllmain.o \ - misc/shutdown.o \ +MISC_OBJECTS = \ + misc/dllmain.o \ + misc/logon.o \ + misc/shutdown.o \ misc/sysfunc.o \ misc/crstubs.o \ misc/aclstubs.o \ misc/stubs.o -REGISTRY_OBJECTS=\ +REGISTRY_OBJECTS = \ reg/reg.o -SECURITY_OBJECTS=\ - sec/ac.o \ - sec/audit.o \ - sec/lsa.o \ - sec/misc.o \ - sec/sec.o \ +SECURITY_OBJECTS = \ + sec/ac.o \ + sec/audit.o \ + sec/lsa.o \ + sec/misc.o \ + sec/sec.o \ sec/sid.o -SERVICE_OBJECTS=\ - service/scm.o \ - service/sctrl.o \ +SERVICE_OBJECTS = \ + service/scm.o \ + service/sctrl.o \ service/undoc.o -TOKEN_OBJECTS=\ - token/privilege.o \ +TOKEN_OBJECTS = \ + token/privilege.o \ token/token.o TARGET_OBJECTS = \ - $(MISC_OBJECTS) \ + $(MISC_OBJECTS) \ $(REGISTRY_OBJECTS) \ $(SECURITY_OBJECTS) \ $(SERVICE_OBJECTS) \ @@ -61,4 +58,3 @@ include $(PATH_TO_TOP)/rules.mak include $(TOOLS_PATH)/helper.mk include $(TOOLS_PATH)/depend.mk - diff --git a/reactos/lib/advapi32/misc/aclstubs.c b/reactos/lib/advapi32/misc/aclstubs.c index 216e8fe5196..74ca49a7bc2 100644 --- a/reactos/lib/advapi32/misc/aclstubs.c +++ b/reactos/lib/advapi32/misc/aclstubs.c @@ -233,14 +233,14 @@ DWORD STDCALL SetSecurityInfo(HANDLE handle,SE_OBJECT_TYPE ObjectType,SECURITY_I /* * @unimplemented */ -DWORD STDCALL GetInheritanceSourceA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,WINBOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMA pInheritArray) +DWORD STDCALL GetInheritanceSourceA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMA pInheritArray) { return(FALSE); } /* * @unimplemented */ -DWORD STDCALL GetInheritanceSourceW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,WINBOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMW pInheritArray) +DWORD STDCALL GetInheritanceSourceW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMW pInheritArray) { return(FALSE); } @@ -254,14 +254,14 @@ DWORD STDCALL FreeInheritedFromArray(PINHERITED_FROMW pInheritArray,USHORT AceCn /* * @unimplemented */ -DWORD STDCALL TreeResetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,WINBOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args) +DWORD STDCALL TreeResetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args) { return(FALSE); } /* * @unimplemented */ -DWORD STDCALL TreeResetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,WINBOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args) +DWORD STDCALL TreeResetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args) { return(FALSE); } diff --git a/reactos/lib/advapi32/misc/crstubs.c b/reactos/lib/advapi32/misc/crstubs.c index 5614d724c2c..e990938c8e8 100644 --- a/reactos/lib/advapi32/misc/crstubs.c +++ b/reactos/lib/advapi32/misc/crstubs.c @@ -3,7 +3,7 @@ /* * @unimplemented */ -WINBOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer, +BOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer, LPCSTR pszProvider, DWORD dwProvType, DWORD dwFlags) { @@ -12,7 +12,7 @@ WINBOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer, /* * @unimplemented */ -WINBOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer, +BOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer, LPCWSTR pszProvider, DWORD dwProvType, DWORD dwFlags) { return(FALSE); @@ -20,21 +20,21 @@ WINBOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer, /* * @unimplemented */ -WINBOOL STDCALL CryptGenRandom (HCRYPTPROV hProv, DWORD dwLen, BYTE *pbBuffer) +BOOL STDCALL CryptGenRandom (HCRYPTPROV hProv, DWORD dwLen, BYTE *pbBuffer) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptContextAddRef (HCRYPTPROV hProv, DWORD *pdwReserved, DWORD dwFlags) +BOOL STDCALL CryptContextAddRef (HCRYPTPROV hProv, DWORD *pdwReserved, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey, +BOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey, DWORD dwFlags, HCRYPTHASH *phHash) { return(FALSE); @@ -42,7 +42,7 @@ WINBOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey, /* * @unimplemented */ -WINBOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final, +BOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final, DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen) { return(FALSE); @@ -50,7 +50,7 @@ WINBOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final, /* * @unimplemented */ -WINBOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBaseData, +BOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBaseData, DWORD dwFlags, HCRYPTKEY *phKey) { return(FALSE); @@ -58,28 +58,28 @@ WINBOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBase /* * @unimplemented */ -WINBOOL STDCALL CryptDestroyHash (HCRYPTHASH hHash) +BOOL STDCALL CryptDestroyHash (HCRYPTHASH hHash) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptDestroyKey (HCRYPTKEY hKey) +BOOL STDCALL CryptDestroyKey (HCRYPTKEY hKey) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptDuplicateKey (HCRYPTKEY hKey, DWORD *pdwReserved, DWORD dwFlags, HCRYPTKEY *phKey) +BOOL STDCALL CryptDuplicateKey (HCRYPTKEY hKey, DWORD *pdwReserved, DWORD dwFlags, HCRYPTKEY *phKey) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved, +BOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved, DWORD dwFlags, HCRYPTHASH *phHash) { return(FALSE); @@ -87,7 +87,7 @@ WINBOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved, /* * @unimplemented */ -WINBOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final, +BOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final, DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen, DWORD dwBufLen) { return(FALSE); @@ -95,7 +95,7 @@ WINBOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, WINBOOL Final, /* * @unimplemented */ -WINBOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved, +BOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPSTR pszProvName, DWORD *pcbProvName) { return(FALSE); @@ -103,7 +103,7 @@ WINBOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved, /* * @unimplemented */ -WINBOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved, +BOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszProvName, DWORD *pcbProvName) { return(FALSE); @@ -111,7 +111,7 @@ WINBOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved, /* * @unimplemented */ -WINBOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved, +BOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPSTR pszTypeName, DWORD *pcbTypeName) { return(FALSE); @@ -119,7 +119,7 @@ WINBOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved, /* * @unimplemented */ -WINBOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved, +BOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszTypeName, DWORD *pcbTypeName) { return(FALSE); @@ -127,7 +127,7 @@ WINBOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved, /* * @unimplemented */ -WINBOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobType, +BOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobType, DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen) { return(FALSE); @@ -135,14 +135,14 @@ WINBOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobT /* * @unimplemented */ -WINBOOL STDCALL CryptGenKey (HCRYPTPROV hProv, ALG_ID Algid, DWORD dwFlags, HCRYPTKEY *phKey) +BOOL STDCALL CryptGenKey (HCRYPTPROV hProv, ALG_ID Algid, DWORD dwFlags, HCRYPTKEY *phKey) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, +BOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD *pdwDataLen, DWORD dwFlags) { return(FALSE); @@ -150,7 +150,7 @@ WINBOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, /* * @unimplemented */ -WINBOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, +BOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD *pdwDataLen, DWORD dwFlags) { return(FALSE); @@ -158,7 +158,7 @@ WINBOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData /* * @unimplemented */ -WINBOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, +BOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD *pdwDataLen, DWORD dwFlags) { return(FALSE); @@ -166,7 +166,7 @@ WINBOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData /* * @unimplemented */ -WINBOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved, +BOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags, LPSTR pszProvName, DWORD *pcbProvName) { return(FALSE); @@ -174,7 +174,7 @@ WINBOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved, /* * @unimplemented */ -WINBOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved, +BOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags, LPWSTR pszProvName, DWORD *pcbProvName) { return(FALSE); @@ -182,28 +182,28 @@ WINBOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved, /* * @unimplemented */ -WINBOOL STDCALL CryptGetUserKey (HCRYPTPROV hProv, DWORD dwKeySpec, HCRYPTKEY *phUserKey) +BOOL STDCALL CryptGetUserKey (HCRYPTPROV hProv, DWORD dwKeySpec, HCRYPTKEY *phUserKey) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptHashData (HCRYPTHASH hHash, BYTE *pbData, DWORD dwDataLen, DWORD dwFlags) +BOOL STDCALL CryptHashData (HCRYPTHASH hHash, BYTE *pbData, DWORD dwDataLen, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptHashSessionKey (HCRYPTHASH hHash, HCRYPTKEY hKey, DWORD dwFlags) +BOOL STDCALL CryptHashSessionKey (HCRYPTHASH hHash, HCRYPTKEY hKey, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen, +BOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen, HCRYPTKEY hPubKey, DWORD dwFlags, HCRYPTKEY *phKey) { return(FALSE); @@ -211,14 +211,14 @@ WINBOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen, /* * @unimplemented */ -WINBOOL STDCALL CryptReleaseContext (HCRYPTPROV hProv, DWORD dwFlags) +BOOL STDCALL CryptReleaseContext (HCRYPTPROV hProv, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescription, +BOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescription, DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen) { return(FALSE); @@ -226,7 +226,7 @@ WINBOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescr /* * @unimplemented */ -WINBOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDescription, +BOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDescription, DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen) { return(FALSE); @@ -234,56 +234,56 @@ WINBOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDesc /* * @unimplemented */ -WINBOOL STDCALL CryptSetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD dwFlags) +BOOL STDCALL CryptSetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptSetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD dwFlags) +BOOL STDCALL CryptSetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptSetProviderA (LPCSTR pszProvName, DWORD dwProvType) +BOOL STDCALL CryptSetProviderA (LPCSTR pszProvName, DWORD dwProvType) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptSetProviderW (LPCWSTR pszProvName, DWORD dwProvType) +BOOL STDCALL CryptSetProviderW (LPCWSTR pszProvName, DWORD dwProvType) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptSetProviderExA (LPCSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags) +BOOL STDCALL CryptSetProviderExA (LPCSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptSetProviderExW (LPCWSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags) +BOOL STDCALL CryptSetProviderExW (LPCWSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptSetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD dwFlags) +BOOL STDCALL CryptSetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD dwFlags) { return(FALSE); } /* * @unimplemented */ -WINBOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen, +BOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen, HCRYPTKEY hPubKey, LPCSTR sDescription, DWORD dwFlags) { return(FALSE); @@ -291,7 +291,7 @@ WINBOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWOR /* * @unimplemented */ -WINBOOL STDCALL CryptVerifySignatureW (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen, +BOOL STDCALL CryptVerifySignatureW (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen, HCRYPTKEY hPubKey, LPCWSTR sDescription, DWORD dwFlags) { return(FALSE); diff --git a/reactos/lib/advapi32/misc/logon.c b/reactos/lib/advapi32/misc/logon.c new file mode 100644 index 00000000000..de550d079c8 --- /dev/null +++ b/reactos/lib/advapi32/misc/logon.c @@ -0,0 +1,164 @@ +/* $Id: logon.c,v 1.1 2004/01/20 01:40:18 ekohl Exp $ + * + * COPYRIGHT: See COPYING in the top level directory + * PROJECT: ReactOS system libraries + * FILE: lib/advapi32/misc/logon.c + * PURPOSE: Logon functions + * PROGRAMMER: Eric Kohl + */ + +#include + +#define NTOS_MODE_USER +#include + +/* FUNCTIONS ***************************************************************/ + +/* + * @unimplemented + */ +BOOL STDCALL +CreateProcessAsUserA (HANDLE hToken, + LPCSTR lpApplicationName, + LPSTR lpCommandLine, + LPSECURITY_ATTRIBUTES lpProcessAttributes, + LPSECURITY_ATTRIBUTES lpThreadAttributes, + BOOL bInheritHandles, + DWORD dwCreationFlags, + LPVOID lpEnvironment, + LPCSTR lpCurrentDirectory, + LPSTARTUPINFOA lpStartupInfo, + LPPROCESS_INFORMATION lpProcessInformation) +{ + /* redirect call to CreateProcess() as long as we don't support user logins */ + return CreateProcessA (lpApplicationName, + lpCommandLine, + lpProcessAttributes, + lpThreadAttributes, + bInheritHandles, + dwCreationFlags, + lpEnvironment, + lpCurrentDirectory, + lpStartupInfo, + lpProcessInformation); +} + + +/* + * @unimplemented + */ +BOOL STDCALL +CreateProcessAsUserW (HANDLE hToken, + LPCWSTR lpApplicationName, + LPWSTR lpCommandLine, + LPSECURITY_ATTRIBUTES lpProcessAttributes, + LPSECURITY_ATTRIBUTES lpThreadAttributes, + BOOL bInheritHandles, + DWORD dwCreationFlags, + LPVOID lpEnvironment, + LPCWSTR lpCurrentDirectory, + LPSTARTUPINFOW lpStartupInfo, + LPPROCESS_INFORMATION lpProcessInformation) +{ + /* redirect call to CreateProcess() as long as we don't support user logins */ + return CreateProcessW (lpApplicationName, + lpCommandLine, + lpProcessAttributes, + lpThreadAttributes, + bInheritHandles, + dwCreationFlags, + lpEnvironment, + lpCurrentDirectory, + lpStartupInfo, + lpProcessInformation); +} + + +/* + * @unimplemented + */ +BOOL STDCALL +CreateProcessWithLogonW (LPCWSTR lpUsername, + LPCWSTR lpDomain, + LPCWSTR lpPassword, + DWORD dwLogonFlags, + LPCWSTR lpApplicationName, + LPWSTR lpCommandLine, + DWORD dwCreationFlags, + LPVOID lpEnvironment, + LPCWSTR lpCurrentDirectory, + LPSTARTUPINFOW lpStartupInfo, + LPPROCESS_INFORMATION lpProcessInformation) +{ + return(FALSE); +} + + +/* + * @unimplemented + */ +BOOL STDCALL +LogonUserA (LPCSTR lpszUsername, + LPCSTR lpszDomain, + LPCSTR lpszPassword, + DWORD dwLogonType, + DWORD dwLogonProvider, + PHANDLE phToken) +{ + return FALSE; +} + + +/* + * @unimplemented + */ +BOOL STDCALL +LogonUserW (LPCWSTR lpszUsername, + LPCWSTR lpszDomain, + LPCWSTR lpszPassword, + DWORD dwLogonType, + DWORD dwLogonProvider, + PHANDLE phToken) +{ + return FALSE; +} + + +/* + * @unimplemented + */ +BOOL STDCALL +LogonUserExA (LPCSTR lpszUsername, + LPCSTR lpszDomain, + LPCSTR lpszPassword, + DWORD dwLogonType, + DWORD dwLogonProvider, + PHANDLE phToken, + PSID *ppLogonSid, + PVOID *ppProfileBuffer, + LPDWORD pdwProfileLength, + PQUOTA_LIMITS pQuotaLimits) +{ + return FALSE; +} + + +/* + * @unimplemented + */ +BOOL STDCALL +LogonUserExW (LPCWSTR lpszUsername, + LPCWSTR lpszDomain, + LPCWSTR lpszPassword, + DWORD dwLogonType, + DWORD dwLogonProvider, + PHANDLE phToken, + PSID *ppLogonSid, + PVOID *ppProfileBuffer, + LPDWORD pdwProfileLength, + PQUOTA_LIMITS pQuotaLimits) +{ + return FALSE; +} + +/* EOF */ diff --git a/reactos/lib/advapi32/misc/shutdown.c b/reactos/lib/advapi32/misc/shutdown.c index 844aeb915f3..d87b088b19d 100644 --- a/reactos/lib/advapi32/misc/shutdown.c +++ b/reactos/lib/advapi32/misc/shutdown.c @@ -1,4 +1,4 @@ -/* $Id: shutdown.c,v 1.10 2003/07/10 15:05:55 chorns Exp $ +/* $Id: shutdown.c,v 1.11 2004/01/20 01:40:18 ekohl Exp $ * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS system libraries @@ -22,8 +22,7 @@ * * @unimplemented */ -WINBOOL -STDCALL +BOOL STDCALL AbortSystemShutdownW(LPCWSTR lpMachineName) { SetLastError(ERROR_CALL_NOT_IMPLEMENTED); @@ -36,8 +35,7 @@ AbortSystemShutdownW(LPCWSTR lpMachineName) * * @unimplemented */ -BOOL -STDCALL +BOOL STDCALL AbortSystemShutdownA(LPCSTR lpMachineName) { ANSI_STRING MachineNameA; @@ -64,8 +62,7 @@ AbortSystemShutdownA(LPCSTR lpMachineName) * * @unimplemented */ -BOOL -STDCALL +BOOL STDCALL InitiateSystemShutdownW( LPWSTR lpMachineName, LPWSTR lpMessage, diff --git a/reactos/lib/advapi32/misc/stubs.c b/reactos/lib/advapi32/misc/stubs.c index dac98f977ae..ec9c467ed3a 100644 --- a/reactos/lib/advapi32/misc/stubs.c +++ b/reactos/lib/advapi32/misc/stubs.c @@ -10,7 +10,7 @@ /* * @unimplemented */ -WINBOOL +BOOL STDCALL DeregisterEventSource ( HANDLE hEventLog @@ -48,7 +48,7 @@ RegisterEventSourceW ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ReportEventA ( HANDLE hEventLog, @@ -68,7 +68,7 @@ ReportEventA ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ReportEventW ( HANDLE hEventLog, @@ -88,7 +88,7 @@ ReportEventW ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL SetFileSecurityW ( LPCWSTR lpFileName, @@ -102,7 +102,7 @@ SetFileSecurityW ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ChangeServiceConfig2A( SC_HANDLE hService, @@ -116,7 +116,7 @@ ChangeServiceConfig2A( /* * @unimplemented */ -WINBOOL +BOOL STDCALL QueryServiceConfig2A( SC_HANDLE hService, @@ -146,7 +146,7 @@ RegisterServiceCtrlHandlerExA( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ChangeServiceConfig2W( SC_HANDLE hService, @@ -160,7 +160,7 @@ ChangeServiceConfig2W( /* * @unimplemented */ -WINBOOL +BOOL STDCALL QueryServiceConfig2W( SC_HANDLE hService, @@ -190,7 +190,7 @@ RegisterServiceCtrlHandlerExW( /* * @unimplemented */ -WINBOOL +BOOL STDCALL AddAccessAllowedAceEx ( PACL pAcl, @@ -206,7 +206,7 @@ AddAccessAllowedAceEx ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL AddAccessAllowedObjectAce ( PACL pAcl, @@ -224,7 +224,7 @@ AddAccessAllowedObjectAce ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL AddAccessDeniedAceEx ( PACL pAcl, @@ -240,7 +240,7 @@ AddAccessDeniedAceEx ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL AddAccessDeniedObjectAce ( PACL pAcl, @@ -258,7 +258,7 @@ AddAccessDeniedObjectAce ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL AddAuditAccessAceEx( PACL pAcl, @@ -266,8 +266,8 @@ AddAuditAccessAceEx( DWORD AceFlags, DWORD dwAccessMask, PSID pSid, - WINBOOL bAuditSuccess, - WINBOOL bAuditFailure + BOOL bAuditSuccess, + BOOL bAuditFailure ) { return(FALSE); @@ -276,7 +276,7 @@ AddAuditAccessAceEx( /* * @unimplemented */ -WINBOOL +BOOL STDCALL AddAuditAccessObjectAce ( PACL pAcl, @@ -286,8 +286,8 @@ AddAuditAccessObjectAce ( GUID *ObjectTypeGuid, GUID *InheritedObjectTypeGuid, PSID pSid, - WINBOOL bAuditSuccess, - WINBOOL bAuditFailure + BOOL bAuditSuccess, + BOOL bAuditFailure ) { return(FALSE); @@ -296,12 +296,12 @@ AddAuditAccessObjectAce ( /* * @unimplemented */ -WINBOOL +BOOL APIENTRY CheckTokenMembership( HANDLE TokenHandle, PSID SidToCheck, - PWINBOOL IsMember + PBOOL IsMember ) { return(FALSE); @@ -321,7 +321,7 @@ CloseEncryptedFileRaw( /* * @unimplemented */ -WINBOOL +BOOL STDCALL CloseEventLog ( HANDLE hEventLog @@ -333,14 +333,14 @@ CloseEventLog ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ConvertToAutoInheritPrivateObjectSecurity( PSECURITY_DESCRIPTOR ParentDescriptor, PSECURITY_DESCRIPTOR CurrentSecurityDescriptor, PSECURITY_DESCRIPTOR *NewSecurityDescriptor, GUID *ObjectType, - WINBOOL IsDirectoryObject, + BOOL IsDirectoryObject, PGENERIC_MAPPING GenericMapping ) { @@ -350,13 +350,13 @@ ConvertToAutoInheritPrivateObjectSecurity( /* * @unimplemented */ -WINBOOL +BOOL STDCALL CreatePrivateObjectSecurity ( PSECURITY_DESCRIPTOR ParentDescriptor, PSECURITY_DESCRIPTOR CreatorDescriptor, PSECURITY_DESCRIPTOR * NewDescriptor, - WINBOOL IsDirectoryObject, + BOOL IsDirectoryObject, HANDLE Token, PGENERIC_MAPPING GenericMapping ) @@ -367,14 +367,14 @@ CreatePrivateObjectSecurity ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL CreatePrivateObjectSecurityEx ( PSECURITY_DESCRIPTOR ParentDescriptor, PSECURITY_DESCRIPTOR CreatorDescriptor, PSECURITY_DESCRIPTOR * NewDescriptor, GUID *ObjectType, - WINBOOL IsContainerObject, + BOOL IsContainerObject, ULONG AutoInheritFlags, HANDLE Token, PGENERIC_MAPPING GenericMapping @@ -386,7 +386,7 @@ CreatePrivateObjectSecurityEx ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL CreatePrivateObjectSecurityWithMultipleInheritance ( PSECURITY_DESCRIPTOR ParentDescriptor, @@ -394,7 +394,7 @@ CreatePrivateObjectSecurityWithMultipleInheritance ( PSECURITY_DESCRIPTOR * NewDescriptor, GUID **ObjectTypes, ULONG GuidCount, - WINBOOL IsContainerObject, + BOOL IsContainerObject, ULONG AutoInheritFlags, HANDLE Token, PGENERIC_MAPPING GenericMapping @@ -403,32 +403,11 @@ CreatePrivateObjectSecurityWithMultipleInheritance ( return(FALSE); } -/* - * @unimplemented - */ -WINBOOL -STDCALL -CreateProcessWithLogonW( - LPCWSTR lpUsername, - LPCWSTR lpDomain, - LPCWSTR lpPassword, - DWORD dwLogonFlags, - LPCWSTR lpApplicationName, - LPWSTR lpCommandLine, - DWORD dwCreationFlags, - LPVOID lpEnvironment, - LPCWSTR lpCurrentDirectory, - LPSTARTUPINFOW lpStartupInfo, - LPPROCESS_INFORMATION lpProcessInformation - ) -{ - return(FALSE); -} /* * @unimplemented */ -WINBOOL +BOOL APIENTRY CreateRestrictedToken( HANDLE ExistingTokenHandle, @@ -448,7 +427,7 @@ CreateRestrictedToken( /* * @unimplemented */ -WINBOOL +BOOL STDCALL CreateWellKnownSid( WELL_KNOWN_SID_TYPE WellKnownSidType, @@ -463,7 +442,7 @@ CreateWellKnownSid( /* * @unimplemented */ -WINBOOL +BOOL STDCALL DestroyPrivateObjectSecurity ( PSECURITY_DESCRIPTOR * ObjectDescriptor @@ -475,12 +454,12 @@ DestroyPrivateObjectSecurity ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL EqualDomainSid( PSID pSid1, PSID pSid2, - WINBOOL *pfEqual + BOOL *pfEqual ) { return(FALSE); @@ -489,7 +468,7 @@ EqualDomainSid( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetEventLogInformation ( HANDLE hEventLog, @@ -505,7 +484,7 @@ GetEventLogInformation ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetNumberOfEventLogRecords ( HANDLE hEventLog, @@ -518,7 +497,7 @@ GetNumberOfEventLogRecords ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetOldestEventLogRecord ( HANDLE hEventLog, @@ -531,7 +510,7 @@ GetOldestEventLogRecord ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetPrivateObjectSecurity ( PSECURITY_DESCRIPTOR ObjectDescriptor, @@ -560,7 +539,7 @@ GetSecurityDescriptorRMControl( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetWindowsAccountDomainSid( PSID pSid, @@ -574,7 +553,7 @@ GetWindowsAccountDomainSid( /* * @unimplemented */ -WINBOOL +BOOL APIENTRY ImpersonateAnonymousToken( HANDLE ThreadHandle @@ -586,7 +565,7 @@ ImpersonateAnonymousToken( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ImpersonateNamedPipeClient( HANDLE hNamedPipe @@ -598,7 +577,7 @@ ImpersonateNamedPipeClient( /* * @unimplemented */ -WINBOOL +BOOL STDCALL IsTextUnicode( CONST VOID* lpBuffer, @@ -612,7 +591,7 @@ IsTextUnicode( /* * @unimplemented */ -WINBOOL +BOOL STDCALL IsTokenRestricted( HANDLE TokenHandle @@ -624,7 +603,7 @@ IsTokenRestricted( /* * @unimplemented */ -WINBOOL +BOOL STDCALL IsTokenUntrusted( HANDLE TokenHandle @@ -636,7 +615,7 @@ IsTokenUntrusted( /* * @unimplemented */ -WINBOOL +BOOL STDCALL IsWellKnownSid ( PSID pSid, @@ -649,7 +628,7 @@ IsWellKnownSid ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL MakeAbsoluteSD2 ( PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor, @@ -662,7 +641,7 @@ MakeAbsoluteSD2 ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL NotifyChangeEventLog( HANDLE hEventLog, @@ -703,7 +682,7 @@ WriteEncryptedFileRaw( /* * @unimplemented */ -WINBOOL +BOOL STDCALL SetPrivateObjectSecurity ( SECURITY_INFORMATION SecurityInformation, @@ -719,7 +698,7 @@ SetPrivateObjectSecurity ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL SetPrivateObjectSecurityEx ( SECURITY_INFORMATION SecurityInformation, @@ -736,7 +715,7 @@ SetPrivateObjectSecurityEx ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL SetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR pSecurityDescriptor, @@ -763,7 +742,7 @@ SetSecurityDescriptorRMControl( /* * @unimplemented */ -WINBOOL +BOOL STDCALL BackupEventLogA ( HANDLE hEventLog, @@ -776,7 +755,7 @@ BackupEventLogA ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ClearEventLogA ( HANDLE hEventLog, @@ -786,36 +765,11 @@ ClearEventLogA ( return(FALSE); } -/* - * @unimplemented - */ -WINBOOL -STDCALL -CreateProcessAsUserA ( - HANDLE hToken, - LPCSTR lpApplicationName, - LPSTR lpCommandLine, - LPSECURITY_ATTRIBUTES lpProcessAttributes, - LPSECURITY_ATTRIBUTES lpThreadAttributes, - WINBOOL bInheritHandles, - DWORD dwCreationFlags, - LPVOID lpEnvironment, - LPCSTR lpCurrentDirectory, - LPSTARTUPINFOA lpStartupInfo, - LPPROCESS_INFORMATION lpProcessInformation - ) -{ - /* redirect call to CreateProcess() as long as we don't support user logins */ - return CreateProcessA(lpApplicationName, lpCommandLine, lpProcessAttributes, - lpThreadAttributes, bInheritHandles, dwCreationFlags, - lpEnvironment, lpCurrentDirectory, lpStartupInfo, - lpProcessInformation); -} /* * @unimplemented */ -WINBOOL +BOOL STDCALL DecryptFileA( LPCSTR lpFileName, @@ -828,7 +782,7 @@ DecryptFileA( /* * @unimplemented */ -WINBOOL +BOOL STDCALL EncryptFileA( LPCSTR lpFileName @@ -840,7 +794,7 @@ EncryptFileA( /* * @unimplemented */ -WINBOOL +BOOL STDCALL FileEncryptionStatusA( LPCSTR lpFileName, @@ -853,7 +807,7 @@ FileEncryptionStatusA( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetCurrentHwProfileA ( LPHW_PROFILE_INFOA lpHwProfileInfo @@ -865,44 +819,6 @@ GetCurrentHwProfileA ( return(TRUE); } -/* - * @unimplemented - */ -WINBOOL -STDCALL -LogonUserA ( - LPCSTR lpszUsername, - LPCSTR lpszDomain, - LPCSTR lpszPassword, - DWORD dwLogonType, - DWORD dwLogonProvider, - PHANDLE phToken - ) -{ - return(FALSE); -} - -/* - * @unimplemented - */ -WINBOOL -STDCALL -LogonUserExA ( - LPCSTR lpszUsername, - LPCSTR lpszDomain, - LPCSTR lpszPassword, - DWORD dwLogonType, - DWORD dwLogonProvider, - PHANDLE phToken , - PSID *ppLogonSid , - PVOID *ppProfileBuffer , - LPDWORD pdwProfileLength , - PQUOTA_LIMITS pQuotaLimits - ) -{ - return(FALSE); -} - /* * @unimplemented */ @@ -946,7 +862,7 @@ OpenEventLogA ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ReadEventLogA ( HANDLE hEventLog, @@ -964,7 +880,7 @@ ReadEventLogA ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL BackupEventLogW ( HANDLE hEventLog, @@ -977,7 +893,7 @@ BackupEventLogW ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ClearEventLogW ( HANDLE hEventLog, @@ -990,33 +906,7 @@ ClearEventLogW ( /* * @unimplemented */ -WINBOOL -STDCALL -CreateProcessAsUserW ( - HANDLE hToken, - LPCWSTR lpApplicationName, - LPWSTR lpCommandLine, - LPSECURITY_ATTRIBUTES lpProcessAttributes, - LPSECURITY_ATTRIBUTES lpThreadAttributes, - WINBOOL bInheritHandles, - DWORD dwCreationFlags, - LPVOID lpEnvironment, - LPCWSTR lpCurrentDirectory, - LPSTARTUPINFOW lpStartupInfo, - LPPROCESS_INFORMATION lpProcessInformation - ) -{ - /* redirect call to CreateProcess() as long as we don't support user logins */ - return CreateProcessW(lpApplicationName, lpCommandLine, lpProcessAttributes, - lpThreadAttributes, bInheritHandles, dwCreationFlags, - lpEnvironment, lpCurrentDirectory, lpStartupInfo, - lpProcessInformation); -} - -/* - * @unimplemented - */ -WINBOOL +BOOL STDCALL DecryptFileW( LPCWSTR lpFileName, @@ -1029,7 +919,7 @@ DecryptFileW( /* * @unimplemented */ -WINBOOL +BOOL STDCALL EncryptFileW( LPCWSTR lpFileName @@ -1041,7 +931,7 @@ EncryptFileW( /* * @unimplemented */ -WINBOOL +BOOL STDCALL FileEncryptionStatusW( LPCWSTR lpFileName, @@ -1054,7 +944,7 @@ FileEncryptionStatusW( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetCurrentHwProfileW ( LPHW_PROFILE_INFOW lpHwProfileInfo @@ -1063,44 +953,6 @@ GetCurrentHwProfileW ( return(FALSE); } -/* - * @unimplemented - */ -WINBOOL -STDCALL -LogonUserW ( - LPCWSTR lpszUsername, - LPCWSTR lpszDomain, - LPCWSTR lpszPassword, - DWORD dwLogonType, - DWORD dwLogonProvider, - PHANDLE phToken - ) -{ - return(FALSE); -} - -/* - * @unimplemented - */ -WINBOOL -STDCALL -LogonUserExW ( - LPCWSTR lpszUsername, - LPCWSTR lpszDomain, - LPCWSTR lpszPassword, - DWORD dwLogonType, - DWORD dwLogonProvider, - PHANDLE phToken , - PSID *ppLogonSid , - PVOID *ppProfileBuffer , - LPDWORD pdwProfileLength , - PQUOTA_LIMITS pQuotaLimits - ) -{ - return(FALSE); -} - /* * @unimplemented */ @@ -1144,7 +996,7 @@ OpenEventLogW ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL ReadEventLogW ( HANDLE hEventLog, @@ -1162,7 +1014,7 @@ ReadEventLogW ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL InitiateSystemShutdownExA(LPSTR lpMachineName,LPSTR lpMessage,DWORD dwTimeout,BOOL bForceAppsClosed,BOOL bRebootAfterShutdown,DWORD dwReason) { @@ -1172,7 +1024,7 @@ InitiateSystemShutdownExA(LPSTR lpMachineName,LPSTR lpMessage,DWORD dwTimeout,BO /* * @unimplemented */ -WINBOOL +BOOL STDCALL InitiateSystemShutdownExW(LPWSTR lpMachineName,LPWSTR lpMessage,DWORD dwTimeout,BOOL bForceAppsClosed,BOOL bRebootAfterShutdown,DWORD dwReason) { @@ -1182,9 +1034,9 @@ InitiateSystemShutdownExW(LPWSTR lpMachineName,LPWSTR lpMessage,DWORD dwTimeout, /* * @unimplemented */ -WINBOOL +BOOL STDCALL -NotifyBootConfigStatus(WINBOOL BootAcceptable) +NotifyBootConfigStatus(BOOL BootAcceptable) { return(FALSE); } @@ -1262,7 +1114,7 @@ Wow64Win32ApiEntry (DWORD dwFuncNumber,DWORD dwFlag,DWORD dwRes) /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByType( PSECURITY_DESCRIPTOR pSecurityDescriptor, @@ -1284,7 +1136,7 @@ LPBOOL AccessStatus /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByTypeResultList( PSECURITY_DESCRIPTOR pSecurityDescriptor, @@ -1306,7 +1158,7 @@ LPDWORD AccessStatusList /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByTypeAndAuditAlarmA( LPCSTR SubsystemName, @@ -1321,7 +1173,7 @@ DWORD Flags, POBJECT_TYPE_LIST ObjectTypeList, DWORD ObjectTypeListLength, PGENERIC_MAPPING GenericMapping, -WINBOOL ObjectCreation, +BOOL ObjectCreation, LPDWORD GrantedAccess, LPBOOL AccessStatus, LPBOOL pfGenerateOnClose @@ -1333,7 +1185,7 @@ LPBOOL pfGenerateOnClose /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByTypeAndAuditAlarmW( LPCWSTR SubsystemName, @@ -1348,7 +1200,7 @@ DWORD Flags, POBJECT_TYPE_LIST ObjectTypeList, DWORD ObjectTypeListLength, PGENERIC_MAPPING GenericMapping, -WINBOOL ObjectCreation, +BOOL ObjectCreation, LPDWORD GrantedAccess, LPBOOL AccessStatus, LPBOOL pfGenerateOnClose @@ -1360,7 +1212,7 @@ LPBOOL pfGenerateOnClose /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByTypeResultListAndAuditAlarmA( LPCSTR SubsystemName, @@ -1375,7 +1227,7 @@ DWORD Flags, POBJECT_TYPE_LIST ObjectTypeList, DWORD ObjectTypeListLength, PGENERIC_MAPPING GenericMapping, -WINBOOL ObjectCreation, +BOOL ObjectCreation, LPDWORD GrantedAccess, LPDWORD AccessStatusList, LPBOOL pfGenerateOnClose @@ -1387,7 +1239,7 @@ LPBOOL pfGenerateOnClose /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByTypeResultListAndAuditAlarmW( LPCWSTR SubsystemName, @@ -1402,7 +1254,7 @@ DWORD Flags, POBJECT_TYPE_LIST ObjectTypeList, DWORD ObjectTypeListLength, PGENERIC_MAPPING GenericMapping, -WINBOOL ObjectCreation, +BOOL ObjectCreation, LPDWORD GrantedAccess, LPDWORD AccessStatusList, LPBOOL pfGenerateOnClose @@ -1414,7 +1266,7 @@ LPBOOL pfGenerateOnClose /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByTypeResultListAndAuditAlarmByHandleA( LPCSTR SubsystemName, @@ -1430,7 +1282,7 @@ DWORD Flags, POBJECT_TYPE_LIST ObjectTypeList, DWORD ObjectTypeListLength, PGENERIC_MAPPING GenericMapping, -WINBOOL ObjectCreation, +BOOL ObjectCreation, LPDWORD GrantedAccess, LPDWORD AccessStatusList, LPBOOL pfGenerateOnClose @@ -1442,7 +1294,7 @@ LPBOOL pfGenerateOnClose /* * @unimplemented */ -WINBOOL +BOOL STDCALL AccessCheckByTypeResultListAndAuditAlarmByHandleW( LPCWSTR SubsystemName, @@ -1458,7 +1310,7 @@ DWORD Flags, POBJECT_TYPE_LIST ObjectTypeList, DWORD ObjectTypeListLength, PGENERIC_MAPPING GenericMapping, -WINBOOL ObjectCreation, +BOOL ObjectCreation, LPDWORD GrantedAccess, LPDWORD AccessStatusList, LPBOOL pfGenerateOnClose diff --git a/reactos/lib/advapi32/sec/ac.c b/reactos/lib/advapi32/sec/ac.c index 62d88240e88..da2ea070f14 100644 --- a/reactos/lib/advapi32/sec/ac.c +++ b/reactos/lib/advapi32/sec/ac.c @@ -1,4 +1,4 @@ -/* $Id: ac.c,v 1.7 2003/07/10 15:05:55 chorns Exp $ +/* $Id: ac.c,v 1.8 2004/01/20 01:40:18 ekohl Exp $ * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS system libraries @@ -16,7 +16,7 @@ /* * @implemented */ -WINBOOL +BOOL STDCALL GetAclInformation ( PACL pAcl, @@ -126,7 +126,7 @@ GetExplicitEntriesFromAclW ( /* * @implemented */ -WINBOOL +BOOL STDCALL InitializeAcl ( PACL pAcl, @@ -152,7 +152,7 @@ InitializeAcl ( /* * @implemented */ -WINBOOL +BOOL STDCALL IsValidAcl ( PACL pAcl @@ -165,7 +165,7 @@ IsValidAcl ( /* * @implemented */ -WINBOOL +BOOL STDCALL SetAclInformation ( PACL pAcl, @@ -226,7 +226,7 @@ SetEntriesInAclW ( /* * @implemented */ -WINBOOL +BOOL STDCALL AddAccessAllowedAce ( PACL pAcl, @@ -254,7 +254,7 @@ AddAccessAllowedAce ( /* * @implemented */ -WINBOOL +BOOL STDCALL AddAccessDeniedAce ( PACL pAcl, @@ -282,7 +282,7 @@ AddAccessDeniedAce ( /* * @implemented */ -WINBOOL +BOOL STDCALL AddAce ( PACL pAcl, @@ -312,15 +312,15 @@ AddAce ( /* * @implemented */ -WINBOOL +BOOL STDCALL AddAuditAccessAce ( PACL pAcl, DWORD dwAceRevision, DWORD dwAccessMask, PSID pSid, - WINBOOL bAuditSuccess, - WINBOOL bAuditFailure + BOOL bAuditSuccess, + BOOL bAuditFailure ) { NTSTATUS Status; @@ -344,7 +344,7 @@ AddAuditAccessAce ( /* * @implemented */ -WINBOOL +BOOL STDCALL DeleteAce ( PACL pAcl, @@ -368,7 +368,7 @@ DeleteAce ( /* * @implemented */ -WINBOOL +BOOL STDCALL FindFirstFreeAce ( PACL pAcl, @@ -383,7 +383,7 @@ FindFirstFreeAce ( /* * @implemented */ -WINBOOL +BOOL STDCALL GetAce ( PACL pAcl, diff --git a/reactos/lib/advapi32/sec/lsa.c b/reactos/lib/advapi32/sec/lsa.c index 72f1a1d38e4..9240ee6a36a 100644 --- a/reactos/lib/advapi32/sec/lsa.c +++ b/reactos/lib/advapi32/sec/lsa.c @@ -1,4 +1,4 @@ -/* $Id: lsa.c,v 1.6 2003/09/08 09:56:56 weiden Exp $ +/* $Id: lsa.c,v 1.7 2004/01/20 01:40:19 ekohl Exp $ * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS system libraries @@ -10,9 +10,11 @@ * 19990515 EA stubs * 20030202 KJK compressed stubs */ + #include #include #include + /* * @unimplemented */ @@ -289,7 +291,7 @@ STDCALL LsaRemoveAccountRights( LSA_HANDLE PolicyHandle, PSID AccountSid, - WINBOOL AllRights, + BOOL AllRights, PLSA_UNICODE_STRING UserRights, ULONG CountOfRights ) @@ -348,7 +350,7 @@ LsaSetForestTrustInformation( LSA_HANDLE PolicyHandle, PLSA_UNICODE_STRING TrustedDomainName, PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo, - WINBOOL CheckOnly, + BOOL CheckOnly, PLSA_FOREST_TRUST_COLLISION_INFORMATION * CollisionInfo ) { diff --git a/reactos/lib/advapi32/sec/misc.c b/reactos/lib/advapi32/sec/misc.c index 3731e134a39..223e05136f4 100644 --- a/reactos/lib/advapi32/sec/misc.c +++ b/reactos/lib/advapi32/sec/misc.c @@ -9,7 +9,7 @@ /* * @implemented */ -WINBOOL STDCALL +BOOL STDCALL AreAllAccessesGranted(DWORD GrantedAccess, DWORD DesiredAccess) { @@ -21,7 +21,7 @@ AreAllAccessesGranted(DWORD GrantedAccess, /* * @implemented */ -WINBOOL STDCALL +BOOL STDCALL AreAnyAccessesGranted(DWORD GrantedAccess, DWORD DesiredAccess) { @@ -33,7 +33,7 @@ AreAnyAccessesGranted(DWORD GrantedAccess, /* * @implemented */ -WINBOOL STDCALL +BOOL STDCALL GetKernelObjectSecurity(HANDLE Handle, SECURITY_INFORMATION RequestedInformation, PSECURITY_DESCRIPTOR pSecurityDescriptor, @@ -93,7 +93,7 @@ MapGenericMask(PDWORD AccessMask, /* * @unimplemented */ -WINBOOL +BOOL STDCALL ImpersonateLoggedOnUser(HANDLE hToken) { diff --git a/reactos/lib/advapi32/sec/sec.c b/reactos/lib/advapi32/sec/sec.c index ba22fc6dee1..74a935d35cc 100644 --- a/reactos/lib/advapi32/sec/sec.c +++ b/reactos/lib/advapi32/sec/sec.c @@ -227,7 +227,7 @@ IsValidSecurityDescriptor ( /* * @implemented */ -WINBOOL +BOOL STDCALL MakeAbsoluteSD ( PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor, @@ -269,7 +269,7 @@ MakeAbsoluteSD ( /* * @implemented */ -WINBOOL +BOOL STDCALL MakeSelfRelativeSD ( PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor, @@ -423,7 +423,7 @@ GetUserNameW(LPWSTR lpBuffer, LPDWORD nSize) /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetFileSecurityA ( LPCSTR lpFileName, @@ -440,7 +440,7 @@ GetFileSecurityA ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL GetFileSecurityW ( LPCWSTR lpFileName, @@ -457,7 +457,7 @@ GetFileSecurityW ( /* * @unimplemented */ -WINBOOL +BOOL STDCALL SetFileSecurityA ( LPCSTR lpFileName, diff --git a/reactos/lib/advapi32/sec/sid.c b/reactos/lib/advapi32/sec/sid.c index 502ffe8b8cd..7193a18f4f6 100644 --- a/reactos/lib/advapi32/sec/sid.c +++ b/reactos/lib/advapi32/sec/sid.c @@ -1,4 +1,4 @@ -/* $Id: sid.c,v 1.8 2003/07/10 15:05:55 chorns Exp $ +/* $Id: sid.c,v 1.9 2004/01/20 01:40:19 ekohl Exp $ * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS system libraries @@ -99,7 +99,7 @@ CopySid ( /* * @implemented */ -WINBOOL +BOOL STDCALL EqualPrefixSid ( PSID pSid1, @@ -112,7 +112,7 @@ EqualPrefixSid ( /* * @implemented */ -WINBOOL +BOOL STDCALL EqualSid ( PSID pSid1, @@ -205,7 +205,7 @@ GetSidSubAuthorityCount ( /* * @implemented */ -WINBOOL +BOOL STDCALL InitializeSid ( PSID Sid, @@ -231,17 +231,17 @@ InitializeSid ( /* * @implemented */ -WINBOOL STDCALL +BOOL STDCALL IsValidSid(PSID pSid) { - return((WINBOOL)RtlValidSid(pSid)); + return((BOOL)RtlValidSid(pSid)); } /* * @unimplemented */ -WINBOOL STDCALL +BOOL STDCALL LookupAccountNameA(LPCSTR lpSystemName, LPCSTR lpAccountName, PSID Sid, @@ -257,7 +257,7 @@ LookupAccountNameA(LPCSTR lpSystemName, /* * @unimplemented */ -WINBOOL STDCALL +BOOL STDCALL LookupAccountNameW(LPCWSTR lpSystemName, LPCWSTR lpAccountName, PSID Sid, @@ -273,7 +273,7 @@ LookupAccountNameW(LPCWSTR lpSystemName, /* * @unimplemented */ -WINBOOL STDCALL +BOOL STDCALL LookupAccountSidA(LPCSTR lpSystemName, PSID Sid, LPSTR Name, @@ -289,7 +289,7 @@ LookupAccountSidA(LPCSTR lpSystemName, /* * @unimplemented */ -WINBOOL STDCALL +BOOL STDCALL LookupAccountSidW(LPCWSTR lpSystemName, PSID Sid, LPWSTR Name, diff --git a/reactos/lib/advapi32/service/sctrl.c b/reactos/lib/advapi32/service/sctrl.c index 60c4826a428..e14b7f7c68d 100644 --- a/reactos/lib/advapi32/service/sctrl.c +++ b/reactos/lib/advapi32/service/sctrl.c @@ -1,4 +1,4 @@ -/* $Id: sctrl.c,v 1.12 2003/08/28 13:38:23 gvg Exp $ +/* $Id: sctrl.c,v 1.13 2004/01/20 01:40:19 ekohl Exp $ * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS system libraries @@ -222,7 +222,7 @@ SetServiceBits(SERVICE_STATUS_HANDLE hServiceStatus, * * @unimplemented */ -WINBOOL STDCALL +BOOL STDCALL SetServiceObjectSecurity(SC_HANDLE hService, SECURITY_INFORMATION dwSecurityInformation, PSECURITY_DESCRIPTOR lpSecurityDescriptor) diff --git a/reactos/lib/advapi32/token/token.c b/reactos/lib/advapi32/token/token.c index 1a7d85cac71..316fdbcae07 100644 --- a/reactos/lib/advapi32/token/token.c +++ b/reactos/lib/advapi32/token/token.c @@ -1,4 +1,5 @@ -/* +/* $Id: token.c,v 1.8 2004/01/20 01:40:19 ekohl Exp $ + * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS system libraries * FILE: lib/advapi32/token/token.c @@ -15,11 +16,10 @@ /* * @implemented */ -WINBOOL -STDCALL +BOOL STDCALL AdjustTokenGroups ( HANDLE TokenHandle, - WINBOOL ResetToDefault, + BOOL ResetToDefault, PTOKEN_GROUPS NewState, DWORD BufferLength, PTOKEN_GROUPS PreviousState, @@ -40,11 +40,10 @@ AdjustTokenGroups ( /* * @implemented */ -WINBOOL -STDCALL +BOOL STDCALL AdjustTokenPrivileges ( HANDLE TokenHandle, - WINBOOL DisableAllPrivileges, + BOOL DisableAllPrivileges, PTOKEN_PRIVILEGES NewState, DWORD BufferLength, PTOKEN_PRIVILEGES PreviousState, @@ -64,8 +63,7 @@ AdjustTokenPrivileges ( /* * @implemented */ -WINBOOL -STDCALL +BOOL STDCALL GetTokenInformation ( HANDLE TokenHandle, TOKEN_INFORMATION_CLASS TokenInformationClass, @@ -88,8 +86,7 @@ GetTokenInformation ( /* * @implemented */ -WINBOOL -STDCALL +BOOL STDCALL SetTokenInformation ( HANDLE TokenHandle, TOKEN_INFORMATION_CLASS TokenInformationClass, @@ -111,163 +108,168 @@ SetTokenInformation ( /* * @implemented */ -WINBOOL -STDCALL -AccessCheck ( - PSECURITY_DESCRIPTOR pSecurityDescriptor, +BOOL STDCALL +AccessCheck (PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess, PGENERIC_MAPPING GenericMapping, PPRIVILEGE_SET PrivilegeSet, LPDWORD PrivilegeSetLength, LPDWORD GrantedAccess, - LPBOOL AccessStatus - ) + LPBOOL AccessStatus) { - NTSTATUS errCode; - errCode = NtAccessCheck( pSecurityDescriptor, - ClientToken, - DesiredAccess, - GenericMapping, - PrivilegeSet, - (PULONG)PrivilegeSetLength, - (PULONG)GrantedAccess, - (PBOOLEAN)AccessStatus); - if ( !NT_SUCCESS(errCode) ) { - SetLastError(RtlNtStatusToDosError(errCode)); - return FALSE; - } - return TRUE; + NTSTATUS Status; + + Status = NtAccessCheck (pSecurityDescriptor, + ClientToken, + DesiredAccess, + GenericMapping, + PrivilegeSet, + (PULONG)PrivilegeSetLength, + (PULONG)GrantedAccess, + (PBOOLEAN)AccessStatus); + if (!NT_SUCCESS (Status)) + { + SetLastError (RtlNtStatusToDosError (Status)); + return FALSE; + } + + return TRUE; } /* * @implemented */ -WINBOOL -STDCALL -OpenProcessToken ( - HANDLE ProcessHandle, +BOOL STDCALL +OpenProcessToken (HANDLE ProcessHandle, DWORD DesiredAccess, - PHANDLE TokenHandle - ) + PHANDLE TokenHandle) { - NTSTATUS errCode; - errCode = NtOpenProcessToken(ProcessHandle,DesiredAccess,TokenHandle); - if ( !NT_SUCCESS(errCode) ) { - SetLastError(RtlNtStatusToDosError(errCode)); - return FALSE; - } - return TRUE; + NTSTATUS Status; + + Status = NtOpenProcessToken (ProcessHandle, + DesiredAccess, + TokenHandle); + if (!NT_SUCCESS (Status)) + { + SetLastError (RtlNtStatusToDosError (Status)); + return FALSE; + } + + return TRUE; } /* * @implemented */ -WINBOOL -STDCALL -OpenThreadToken ( - HANDLE ThreadHandle, +BOOL STDCALL +OpenThreadToken (HANDLE ThreadHandle, DWORD DesiredAccess, - WINBOOL OpenAsSelf, - PHANDLE TokenHandle - ) + BOOL OpenAsSelf, + PHANDLE TokenHandle) { - NTSTATUS errCode; - errCode = NtOpenThreadToken(ThreadHandle,DesiredAccess,OpenAsSelf,TokenHandle); - if ( !NT_SUCCESS(errCode) ) { - SetLastError(RtlNtStatusToDosError(errCode)); - return FALSE; - } - return TRUE; + NTSTATUS Status; + + Status = NtOpenThreadToken (ThreadHandle, + DesiredAccess, + OpenAsSelf, + TokenHandle); + if (!NT_SUCCESS(Status)) + { + SetLastError (RtlNtStatusToDosError (Status)); + return FALSE; + } + + return TRUE; } /* * @implemented */ -WINBOOL -STDCALL -SetThreadToken ( - PHANDLE ThreadHandle, - HANDLE TokenHandle - ) +BOOL STDCALL +SetThreadToken (PHANDLE ThreadHandle, + HANDLE TokenHandle) { - NTSTATUS errCode; - HANDLE hThread = NtCurrentThread(); - if ( ThreadHandle != NULL ) - hThread = ThreadHandle; - errCode = NtSetInformationThread(hThread,ThreadImpersonationToken,TokenHandle,sizeof(HANDLE)); - if ( !NT_SUCCESS(errCode) ) { - SetLastError(RtlNtStatusToDosError(errCode)); - return FALSE; - } - return TRUE; + NTSTATUS Status; + HANDLE hThread; + + hThread = NtCurrentThread(); + if (ThreadHandle != NULL) + hThread = ThreadHandle; + + Status = NtSetInformationThread (hThread, + ThreadImpersonationToken, + TokenHandle, + sizeof(HANDLE)); + if (!NT_SUCCESS(Status)) + { + SetLastError (RtlNtStatusToDosError (Status)); + return FALSE; + } + + return TRUE; } /* * @implemented */ -WINBOOL -STDCALL -DuplicateTokenEx ( - HANDLE ExistingTokenHandle, +BOOL STDCALL +DuplicateTokenEx (HANDLE ExistingTokenHandle, DWORD dwDesiredAccess, LPSECURITY_ATTRIBUTES lpTokenAttributes, SECURITY_IMPERSONATION_LEVEL ImpersonationLevel, TOKEN_TYPE TokenType, - PHANDLE DuplicateTokenHandle - ) + PHANDLE DuplicateTokenHandle) { - NTSTATUS errCode; - HANDLE NewToken; + OBJECT_ATTRIBUTES ObjectAttributes; + HANDLE NewToken; + NTSTATUS Status; - OBJECT_ATTRIBUTES ObjectAttributes; - + ObjectAttributes.Length = sizeof(OBJECT_ATTRIBUTES); + ObjectAttributes.RootDirectory = NULL; + ObjectAttributes.ObjectName = NULL; + ObjectAttributes.Attributes = 0; + if (lpTokenAttributes->bInheritHandle) + { + ObjectAttributes.Attributes |= OBJ_INHERIT; + } + ObjectAttributes.SecurityDescriptor = lpTokenAttributes->lpSecurityDescriptor; + ObjectAttributes.SecurityQualityOfService = NULL; - ObjectAttributes.Length = sizeof(OBJECT_ATTRIBUTES); - ObjectAttributes.RootDirectory = NULL; - ObjectAttributes.ObjectName = NULL; - ObjectAttributes.Attributes = 0; - if ( lpTokenAttributes->bInheritHandle ) - ObjectAttributes.Attributes |= OBJ_INHERIT; + Status = NtDuplicateToken (ExistingTokenHandle, + dwDesiredAccess, + &ObjectAttributes, + ImpersonationLevel, + TokenType, + &NewToken); + if (!NT_SUCCESS(Status)) + { + SetLastError(RtlNtStatusToDosError(Status)); + return FALSE; + } - ObjectAttributes.SecurityDescriptor = lpTokenAttributes->lpSecurityDescriptor; - ObjectAttributes.SecurityQualityOfService = NULL; - - errCode = NtDuplicateToken( ExistingTokenHandle, dwDesiredAccess, - &ObjectAttributes, ImpersonationLevel, - TokenType, &NewToken ); - - if ( !NT_SUCCESS(errCode) ) { - SetLastError(RtlNtStatusToDosError(errCode)); - return FALSE; - } - return TRUE; + return TRUE; } /* * @implemented */ -WINBOOL -STDCALL -DuplicateToken ( - HANDLE ExistingTokenHandle, +BOOL STDCALL +DuplicateToken (HANDLE ExistingTokenHandle, SECURITY_IMPERSONATION_LEVEL ImpersonationLevel, - PHANDLE DuplicateTokenHandle - ) + PHANDLE DuplicateTokenHandle) { - return DuplicateTokenEx ( - ExistingTokenHandle, - TOKEN_DUPLICATE|TOKEN_IMPERSONATE|TOKEN_QUERY, - NULL, - ImpersonationLevel, - TokenImpersonation, - DuplicateTokenHandle - ); + return DuplicateTokenEx (ExistingTokenHandle, + TOKEN_DUPLICATE|TOKEN_IMPERSONATE|TOKEN_QUERY, + NULL, + ImpersonationLevel, + TokenImpersonation, + DuplicateTokenHandle); } /* EOF */