Remove ALL stubs which might be of questionable origin.

svn path=/trunk/; revision=8369
This commit is contained in:
Eric Kohl 2004-02-25 14:25:11 +00:00
parent 5ed2e7cef1
commit 8b99b4ec5e
15 changed files with 597 additions and 3461 deletions

View file

@ -1,191 +1,93 @@
; $Id: advapi32.def,v 1.11 2003/09/12 17:51:46 vizzini Exp $
; $Id: advapi32.def,v 1.12 2004/02/25 14:25:10 ekohl Exp $
;
; advapi32.def
;
; ReactOS Operating System
;
; Some stack sizes are taken from Ander Norlander's .DEFs.
;
LIBRARY advapi32.dll
EXPORTS
A_SHAFinal@8
A_SHAInit@4
A_SHAUpdate@12
AbortSystemShutdownA@4
AbortSystemShutdownW@4
AccessCheck@32
AccessCheckByType@44
AccessCheckByTypeAndAuditAlarmA@64
AccessCheckByTypeAndAuditAlarmW@64
AccessCheckByTypeResultList@44
AccessCheckByTypeResultListAndAuditAlarmA@64
AccessCheckByTypeResultListAndAuditAlarmByHandleA@68
AccessCheckByTypeResultListAndAuditAlarmByHandleW@68
AccessCheckByTypeResultListAndAuditAlarmW@64
AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW@44
AddAccessAllowedAce@16
AddAccessAllowedAceEx@20
AddAccessAllowedObjectAce@28
;AddAccessAllowedAceEx@20
AddAccessDeniedAce@16
AddAccessDeniedAceEx@20
AddAccessDeniedObjectAce@28
;AddAccessDeniedAceEx@20
AddAce@20
AddAuditAccessAce@24
AddAuditAccessAceEx@28
AddAuditAccessObjectAce@36
;@AddUsersToEncryptedFile
;AddAuditAccessAceEx@28
AdjustTokenGroups@24
AdjustTokenPrivileges@24
AllocateAndInitializeSid@44
AllocateLocallyUniqueId@4
AreAllAccessesGranted@8
AreAnyAccessesGranted@8
BackupEventLogA@8
BackupEventLogW@8
BuildExplicitAccessWithNameA@20
BuildExplicitAccessWithNameW@20
BuildImpersonateExplicitAccessWithNameA@24
BuildImpersonateExplicitAccessWithNameW@24
BuildImpersonateTrusteeA@8
BuildImpersonateTrusteeW@8
BuildSecurityDescriptorA@36
BuildSecurityDescriptorW@36
BuildTrusteeWithNameA@8
BuildTrusteeWithNameW@8
BuildTrusteeWithObjectsAndNameA@24
BuildTrusteeWithObjectsAndNameW@24
BuildTrusteeWithObjectsAndSidA@20
BuildTrusteeWithObjectsAndSidW@20
BuildTrusteeWithSidA@8
BuildTrusteeWithSidW@8
;CancelOverlappedAccess
;BackupEventLogA@8
;BackupEventLogW@8
;BuildAccessRequestA
;BuildAccessRequestW
;BuildExplicitAccessWithNameA@20
;BuildExplicitAccessWithNameW@20
;BuildImpersonateExplicitAccessWithNameA@24
;BuildImpersonateExplicitAccessWithNameW@24
;BuildImpersonateTrusteeA@8
;BuildImpersonateTrusteeW@8
;BuildSecurityDescriptorA@36
;BuildSecurityDescriptorW@36
;BuildTrusteeWithNameA@8
;BuildTrusteeWithNameW@8
;BuildTrusteeWithSidA@8
;BuildTrusteeWithSidW@8
ChangeServiceConfigA@44
ChangeServiceConfigW@44
ChangeServiceConfig2A@12
ChangeServiceConfig2W@12
CheckTokenMembership@12
ClearEventLogA@8
ClearEventLogW@8
;CloseCodeAuthzLevel
CloseEncryptedFileRaw@4
CloseEventLog@4
;ClearEventLogA@8
;ClearEventLogW@8
;CloseEventLog@4
CloseServiceHandle@4
;@CloseTrace
;@CommandLineFromMsiDescriptor
;ComputeAccessTokenFromCodeAuthzLevel
;@ControlTraceA
;@ControlTraceW
ControlService@12
;ConvertAccessToSecurityDescriptorA
;ConvertAccessToSecurityDescriptorW
;ConvertSDToStringSDRootDomainA
;ConvertSDToStringSDRootDomainW
;ConvertSecurityDescriptorToAccessA
;ConvertSecurityDescriptorToAccessNamedA
;ConvertSecurityDescriptorToAccessNamedW
;ConvertSecurityDescriptorToAccessW
;@ConvertSecurityDescriptorToStringSecurityDescriptorA
;@ConvertSecurityDescriptorToStringSecurityDescriptorW
;@ConvertSidToStringSidA
;@ConvertSidToStringSidW
;ConvertStringSDToSDDomainA
;ConvertStringSDToSDDomainW
;ConvertStringSDToSDRootDomainA
;ConvertStringSDToSDRootDomainW
;@ConvertStringSecurityDescriptorToSecurityDescriptorA
;@ConvertStringSecurityDescriptorToSecurityDescriptorW
;@ConvertStringSidToSidA
;@ConvertStringSidToSidW
ConvertToAutoInheritPrivateObjectSecurity@24
CopySid@12
;CreateCodeAuthzLevel
CreatePrivateObjectSecurity@24
CreatePrivateObjectSecurityEx@32
CreatePrivateObjectSecurityWithMultipleInheritance@36
;CreatePrivateObjectSecurity@24
CreateProcessAsUserA@44
CreateProcessAsUserW@44
CreateProcessWithLogonW@44
CreateRestrictedToken@36
CreateServiceA@52
CreateServiceW@52
;@CreateTraceInstanceId
CreateWellKnownSid@16
;@CredDeleteA
;@CredDeleteW
;@CredEnumerateA
;@CredEnumerateW
;@CredFree
;@CredGetSessionTypes
;@CredGetTargetInfoA
;@CredGetTargetInfoW
;@CredIsMarshaledCredentialA
;@CredIsMarshaledCredentialW
;@CredMarshalCredentialA
;@CredMarshalCredentialW
;CredProfileLoaded
;@CredReadA
;@CredReadDomainCredentialsA
;@CredReadDomainCredentialsW
;@CredReadW
;@CredRenameA
;@CredRenameW
;@CredUnmarshalCredentialA
;@CredUnmarshalCredentialW
;@CredWriteA
;@CredWriteDomainCredentialsA
;@CredWriteDomainCredentialsW
;@CredWriteW
;CredpConvertCredential
;CredpConvertTargetInfo
;CredpDecodeCredential
;CredpEncodeCredential
CryptAcquireContextA@20
CryptAcquireContextW@20
CryptContextAddRef@12
CryptCreateHash@20
CryptDecrypt@24
CryptDeriveKey@20
CryptDestroyHash@4
CryptDestroyKey@4
CryptDuplicateHash@16
CryptDuplicateKey@16
CryptEncrypt@28
CryptEnumProviderTypesA@24
CryptEnumProviderTypesW@24
CryptEnumProvidersA@24
CryptEnumProvidersW@24
CryptExportKey@24
CryptGenKey@16
CryptGenRandom@12
CryptGetDefaultProviderA@20
CryptGetDefaultProviderW@20
CryptGetHashParam@20
CryptGetKeyParam@20
CryptGetProvParam@20
CryptGetUserKey@12
CryptHashData@16
CryptHashSessionKey@12
CryptImportKey@24
CryptReleaseContext@8
CryptSetHashParam@16
CryptSetKeyParam@16
CryptSetProvParam@16
CryptSetProviderA@8
CryptSetProviderW@8
CryptSetProviderExA@16
CryptSetProviderExW@16
CryptSignHashA@24
CryptSignHashW@24
CryptVerifySignatureA@24
CryptVerifySignatureW@24
DecryptFileA@8
DecryptFileW@8
;CryptAcquireContextA@20
;CryptAcquireContextW@20
;CryptContextAddRef@12
;CryptCreateHash@20
;CryptDecrypt@24
;CryptDeriveKey@20
;CryptDestroyHash@4
;CryptDestroyKey@4
;CryptEncrypt@28
;CryptExportKey@24
;CryptGenKey@16
;CryptGenRandom@12
;CryptGetHashParam@20
;CryptGetKeyParam@20
;CryptGetProvParam@20
;CryptGetUserKey@12
;CryptHashData@16
;CryptHashSessionKey@12
;CryptImportKey@24
;CryptReleaseContext@8
;CryptSetHashParam@16
;CryptSetKeyParam@16
;CryptSetProvParam@16
;CryptSetProviderA@8
;CryptSetProviderW@8
;CryptSignHashA@24
;CryptSignHashW@24
;CryptVerifySignatureA@24
;CryptVerifySignatureW@24
DeleteAce@8
DeleteService@4
DeregisterEventSource@4
DestroyPrivateObjectSecurity@4
;@DuplicateEncryptionInfoFile
;DenyAccessRightsA
;DenyAccessRightsW
;DeregisterEventSource@4
;DestroyPrivateObjectSecurity@4
DuplicateToken@12
DuplicateTokenEx@24
;ElfBackupEventLogFileA@8
@ -207,78 +109,53 @@ DuplicateTokenEx@24
;ElfRegisterEventSourceW@12
;ElfReportEventA@48
;ElfReportEventW@48
;@EnableTrace
EncryptFileA@4
EncryptFileW@4
;EncryptedFileKeyInfo
;@EncryptionDisable
EnumDependentServicesA@24
EnumDependentServicesW@24
EnumServiceGroupW@36
EnumServicesStatusA@32
EnumServicesStatusExA@40
EnumServicesStatusExW@40
EnumServicesStatusW@32
;@EnumerateTraceGuids
EqualDomainSid@12
EqualPrefixSid@8
EqualSid@8
FileEncryptionStatusA@8
FileEncryptionStatusW@8
FindFirstFreeAce@8
;@FlushTraceA
;@FlushTraceW
;FreeEncryptedFileKeyInfo
;@FreeEncryptionCertificateHashList
FreeInheritedFromArray@12
FreeSid@4
;GetAccessPermissionsForObjectA
;GetAccessPermissionsForObjectW
GetAce@12
GetAclInformation@16
GetAuditedPermissionsFromAclA@16
GetAuditedPermissionsFromAclW@16
GetCurrentHwProfileA@4
GetCurrentHwProfileW@4
GetEffectiveRightsFromAclA@12
GetEffectiveRightsFromAclW@12
GetEventLogInformation@20
GetExplicitEntriesFromAclA@12
GetExplicitEntriesFromAclW@12
GetFileSecurityA@20
GetFileSecurityW@20
;GetInformationCodeAuthzLevelW
;GetInformationCodeAuthzPolicyW
GetInheritanceSourceA@40
GetInheritanceSourceW@40
;GetAuditedPermissionsFromAclA@16
;GetAuditedPermissionsFromAclW@16
;GetAuditedPermissionsFromSDA
;GetAuditedPermissionsFromSDW
;GetCurrentHwProfileA@4
;GetCurrentHwProfileW@4
;GetEffectiveAccessRightsA
;GetEffectiveAccessRightsW
;GetEffectiveRightsFromAclA@12
;GetEffectiveRightsFromAclW@12
;GetEffectiveRightsFromSDA@12
;GetEffectiveRightsFromSDW@12
;GetExplicitAccessRightsA
;GetExplicitAccessRightsW
;GetExplicitEntriesFromAclA@12
;GetExplicitEntriesFromAclW@12
;GetFileSecurityA@20
;GetFileSecurityW@20
GetKernelObjectSecurity@20
GetLengthSid@4
;@GetLocalManagedApplicationData
;@GetLocalManagedApplications
;@GetManagedApplicationCategories
;@GetManagedApplications
GetMultipleTrusteeA@4
GetMultipleTrusteeOperationA@4
GetMultipleTrusteeOperationW@4
GetMultipleTrusteeW@4
GetNamedSecurityInfoA@32
;GetNamedSecurityInfoExA
;GetNamedSecurityInfoExW
GetNamedSecurityInfoW@32
GetNumberOfEventLogRecords@8
GetOldestEventLogRecord@8
;GetOverlappedAccessResults
GetPrivateObjectSecurity@20
;GetMultipleTrusteeA@4
;GetMultipleTrusteeOperationA@4
;GetMultipleTrusteeOperationW@4
;GetMultipleTrusteeW@4
;GetNamedSecurityInfoA@32
;GetNamedSecurityInfoW@32
;GetNumberOfEventLogRecords@8
;GetOldestEventLogRecord@8
;GetPrivateObjectSecurity@20
GetSecurityDescriptorControl@12
GetSecurityDescriptorDacl@16
GetSecurityDescriptorGroup@12
GetSecurityDescriptorLength@4
GetSecurityDescriptorOwner@12
GetSecurityDescriptorRMControl@8
GetSecurityDescriptorSacl@16
GetSecurityInfo@32
GetSecurityInfoExA@36
GetSecurityInfoExW@36
;GetSecurityInfo@32
GetServiceDisplayNameA@16
GetServiceDisplayNameW@16
GetServiceKeyNameA@16
@ -288,52 +165,33 @@ GetSidLengthRequired@4
GetSidSubAuthority@8
GetSidSubAuthorityCount@4
GetTokenInformation@20
;@GetTraceEnableFlags
;@GetTraceEnableLevel
;@GetTraceLoggerHandle
GetTrusteeFormA@4
GetTrusteeFormW@4
GetTrusteeNameA@4
GetTrusteeNameW@4
GetTrusteeTypeA@4
GetTrusteeTypeW@4
GetUserNameA@8
GetUserNameW@8
GetWindowsAccountDomainSid@12
GrantAccessRightsA@16
GrantAccessRightsW@16
;GetTrusteeNameA@4
;GetTrusteeNameW@4
;GetTrusteeTypeA@4
;GetTrusteeTypeW@4
;GetUserNameA@8
;GetUserNameW@8
;GrantAccessRightsA@16
;GrantAccessRightsW@16
;I_ScGetCurrentGroupStateW@12
;I_ScIsSecurityProcess
;I_ScPnPGetServiceName
;I_ScSendTSMessage
;I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW@20
;IdentifyCodeAuthzLevelW
ImpersonateAnonymousToken@4
ImpersonateLoggedOnUser@4
ImpersonateNamedPipeClient@4
;ImpersonateLoggedOnUser@4
;ImpersonateNamedPipeClient@4
ImpersonateSelf@4
InitializeAcl@12
InitializeSecurityDescriptor@8
InitializeSid@12
InitiateSystemShutdownA@20
InitiateSystemShutdownExA@24
InitiateSystemShutdownExW@24
InitiateSystemShutdownW@20
;@InstallApplication
IsAccessPermittedA@20
IsAccessPermittedW@20
IsTextUnicode@12
IsTokenRestricted@4
IsTokenUntrusted@4
IsWellKnownSid@8
;IsAccessPermittedA@20
;IsAccessPermittedW@20
;IsTextUnicode@12
IsValidAcl@4
IsValidSecurityDescriptor@4
IsValidSid@4
LockServiceDatabase@4
LogonUserA@24
LogonUserExA@40
LogonUserExW@40
LogonUserW@24
LookupAccountNameA@28
LookupAccountNameW@28
@ -345,84 +203,61 @@ LookupPrivilegeNameA@16
LookupPrivilegeNameW@16
LookupPrivilegeValueA@12
LookupPrivilegeValueW@12
LookupSecurityDescriptorPartsA@28
LookupSecurityDescriptorPartsW@28
LsaAddAccountRights@16
;LookupSecurityDescriptorPartsA@28
;LookupSecurityDescriptorPartsW@28
;LsaAddAccountRights@16
;LsaAddPrivilegesToAccount@8
;LsaClearAuditLog@4
LsaClose@4
;LsaClose@4
;LsaCreateAccount@16
;LsaCreateSecret@16
;LsaCreateTrustedDomain@16
LsaCreateTrustedDomainEx@20
;LsaDelete@4
LsaDeleteTrustedDomain@8
LsaEnumerateAccountRights@16
;LsaDeleteTrustedDomain@8
;LsaEnumerateAccountRights@16
;LsaEnumerateAccounts@20
LsaEnumerateAccountsWithUserRight@16
;LsaEnumerateAccountsWithUserRight@16
;LsaEnumeratePrivileges@20
;LsaEnumeratePrivilegesOfAccount@8
LsaEnumerateTrustedDomains@20
LsaEnumerateTrustedDomainsEx@20
LsaFreeMemory@4
;LsaEnumerateTrustedDomains@20
;LsaFreeMemory@4
;LsaGetQuotasForAccount@8
;LsaGetRemoteUserName
;LsaGetSystemAccessAccount@8
;LsaGetUserName@8
;LsaICLookupNames@32
;LsaICLookupNamesWithCreds
;LsaICLookupSids@32
;LsaICLookupSidsWithCreds
LsaLookupNames@20
LsaLookupNames2@24
;LsaLookupNames@20
;LsaLookupPrivilegeDisplayName@16
;LsaLookupPrivilegeName@12
;LsaLookupPrivilegeValue@12
LsaLookupSids@20
LsaNtStatusToWinError@4
;LsaLookupSids@20
;LsaNtStatusToWinError@4
;LsaOpenAccount@16
LsaOpenPolicy@16
;LsaOpenPolicySce
;LsaOpenPolicy@16
;LsaOpenSecret@16
;LsaOpenTrustedDomain@16
LsaOpenTrustedDomainByName@16
LsaQueryDomainInformationPolicy@12
LsaQueryForestTrustInformation@12
LsaQueryInformationPolicy@12
;LsaQueryInfoTrustedDomain@12
LsaQueryTrustedDomainInfoByName@16
;LsaQueryInfoTrustedDomain
;LsaQueryInformationPolicy@12
;LsaQuerySecret@20
;LsaQuerySecurityObject@12
LsaQueryTrustedDomainInfo@16
LsaRemoveAccountRights@20
;LsaQueryTrustedDomainInfo@16
;LsaRemoveAccountRights@20
;LsaRemovePrivilegesFromAccount@12
;LsaRetrievePrivateData@12
LsaSetDomainInformationPolicy@12
LsaSetInformationPolicy@12
;LsaSetInformationPolicy@12
;LsaSetInformationTrustedDomain@12
LsaSetForestTrustInformation@20
LsaSetTrustedDomainInfoByName@16
;LsaSetQuotasForAccount@8
;LsaSetSecret@12
;LsaSetSecurityObject@12
;LsaSetSystemAccessAccount@8
LsaSetTrustedDomainInformation@16
LsaStorePrivateData@12
;LsaSetTrustedDomainInformation@16
;LsaStorePrivateData@12
MakeAbsoluteSD@44
MakeSelfRelativeSD@12
MapGenericMask@8
MD4Final@4
MD4Init@4
MD4Update@12
MD5Final@4
MD5Init@4
MD5Update@12
;@MSChapSrvChangePassword
;@MSChapSrvChangePassword2
MakeAbsoluteSD2@8
NTAccessMaskToProvAccessRights@12
NotifyBootConfigStatus@4
NotifyChangeEventLog@8
;NTAccessMaskToProvAccessRights@12
;NotifyBootConfigStatus@4
;NotifyChangeEventLog@8
ObjectCloseAuditAlarmA@12
ObjectCloseAuditAlarmW@12
ObjectDeleteAuditAlarmA@12
@ -431,44 +266,29 @@ ObjectOpenAuditAlarmA@48
ObjectOpenAuditAlarmW@48
ObjectPrivilegeAuditAlarmA@24
ObjectPrivilegeAuditAlarmW@24
OpenBackupEventLogA@8
OpenBackupEventLogW@8
OpenEncryptedFileRawA@12
OpenEncryptedFileRawW@12
OpenEventLogA@8
OpenEventLogW@8
;OpenBackupEventLogA@8
;OpenBackupEventLogW@8
;OpenEventLogA@8
;OpenEventLogW@8
OpenProcessToken@12
OpenSCManagerA@12
OpenSCManagerW@12
OpenServiceA@12
OpenServiceW@12
OpenThreadToken@16
;@OpenTraceA
;@OpenTraceW
PrivilegeCheck@12
PrivilegedServiceAuditAlarmA@20
PrivilegedServiceAuditAlarmW@20
;ProcessIdleTasks
;@ProcessTrace
;@QueryAllTracesA
;@QueryAllTracesW
;@QueryRecoveryAgentsOnEncryptedFile
;ProvAccessRightsToNTAccessMask
QueryServiceConfigA@16
QueryServiceConfigW@16
QueryServiceConfig2A@20
QueryServiceConfig2W@20
QueryServiceLockStatusA@16
QueryServiceLockStatusW@16
QueryServiceObjectSecurity@20
QueryServiceStatus@8
QueryServiceStatusEx@20
;@QueryTraceA
;@QueryTraceW
;@QueryUsersOnEncryptedFile
QueryWindows31FilesMigration@4
ReadEncryptedFileRaw@12
ReadEventLogA@28
ReadEventLogW@28
;QueryWindows31FilesMigration@4
;ReadEventLogA@28
;ReadEventLogW@28
RegCloseKey@4
RegConnectRegistryA@12
RegConnectRegistryW@12
@ -480,7 +300,6 @@ RegDeleteKeyA@8
RegDeleteKeyW@8
RegDeleteValueA@8
RegDeleteValueW@8
RegDisablePredefinedCache@0
RegEnumKeyA@16
RegEnumKeyExA@32
RegEnumKeyExW@32
@ -492,13 +311,10 @@ RegGetKeySecurity@16
RegLoadKeyA@12
RegLoadKeyW@12
RegNotifyChangeKeyValue@20
RegOpenCurrentUser@8
RegOpenKeyA@12
RegOpenKeyExA@20
RegOpenKeyExW@20
RegOpenKeyW@12
RegOpenUserClassesRoot@16
RegOverridePredefKey@8
RegQueryInfoKeyA@48
RegQueryInfoKeyW@48
RegQueryMultipleValuesA@20
@ -512,8 +328,6 @@ RegReplaceKeyW@16
RegRestoreKeyA@12
RegRestoreKeyW@12
RegSaveKeyA@12
RegSaveKeyExA@16
RegSaveKeyExW@16
RegSaveKeyW@12
RegSetKeySecurity@12
RegSetValueA@20
@ -522,82 +336,40 @@ RegSetValueExW@24
RegSetValueW@20
RegUnLoadKeyA@8
RegUnLoadKeyW@8
RegisterEventSourceA@8
RegisterEventSourceW@8
;RegisterIdleTask
;RegisterEventSourceA@8
;RegisterEventSourceW@8
RegisterServiceCtrlHandlerA@8
RegisterServiceCtrlHandlerExA@12
RegisterServiceCtrlHandlerExW@12
RegisterServiceCtrlHandlerW@8
;@RegisterTraceGuidsA
;@RegisterTraceGuidsW
;@RemoveTraceCallback
;@RemoveUsersFromEncryptedFile
ReportEventA@36
ReportEventW@36
;ReplaceAllAccessRightsA
;ReplaceAllAccessRightsW
;ReportEventA@36
;ReportEventW@36
RevertToSelf@0
RevokeExplicitAccessRightsA@16
RevokeExplicitAccessRightsW@16
;@SaferCloseLevel
;@SaferComputeTokenFromLevel
;@SaferCreateLevel
;@SaferGetLevelInformation
;@SaferGetPolicyInformation
;@SaferIdentifyLevel
;@SaferRecordEventLogEntry
;@SaferSetLevelInformation
;@SaferSetPolicyInformation
;SaferiChangeRegistryScope
;SaferiCompareTokenLevels
;@SaferiIsExecutableFileType
;SaferiPopulateDefaultsInRegistry
;SaferiRecordEventLogEntry
;SaferiReplaceProcessThreadTokens
;SaferiSearchMatchingHashRules
SetAccessRightsA@16
SetAccessRightsW@16
;RevokeExplicitAccessRightsA@16
;RevokeExplicitAccessRightsW@16
;SetAccessRightsA@16
;SetAccessRightsW@16
SetAclInformation@16
;SetEntriesInAccessListA
;SetEntriesInAccessListW
SetEntriesInAclA@16
SetEntriesInAclW@16
;SetEntriesInAuditListA
;SetEntriesInAuditListW
SetFileSecurityA@12
SetFileSecurityW@12
;SetEntriesInAclA@16
;SetEntriesInAclW@16
SetKernelObjectSecurity@12
;SetInformationCodeAuthzLevelW
;SetInformationCodeAuthzPolicyW
SetNamedSecurityInfoA@28
;SetNamedSecurityInfoExA
;SetNamedSecurityInfoExW
SetNamedSecurityInfoW@28
SetPrivateObjectSecurity@20
SetPrivateObjectSecurityEx@24
SetSecurityDescriptorControl@12
;SetNamedSecurityInfoA@28
;SetNamedSecurityInfoW@28
;SetPrivateObjectSecurity@20
SetSecurityDescriptorDacl@16
SetSecurityDescriptorGroup@12
SetSecurityDescriptorOwner@12
SetSecurityDescriptorRMControl@8
SetSecurityDescriptorSacl@16
SetSecurityInfo@28
;SetSecurityInfoExA
;SetSecurityInfoExW
;SetSecurityInfo@28
SetServiceBits@16
SetServiceObjectSecurity@12
SetServiceStatus@8
SetThreadToken@8
SetTokenInformation@16
;@SetTraceCallback
;@SetUserFileEncryptionKey
StartServiceA@12
StartServiceCtrlDispatcherA@4
StartServiceCtrlDispatcherW@4
StartServiceW@12
;@StartTraceA
;@StartTraceW
;@StopTraceA
;@StopTraceW
;SynchronizeWindows31FilesAndWindowsNTRegistry@16
SystemFunction001@12
SystemFunction002@12
@ -634,59 +406,5 @@ SystemFunction032@8
SystemFunction033@8
SystemFunction034@8
SystemFunction035@8
;SystemFunction036
;SystemFunction040
;SystemFunction041
;@TraceEvent
;@TraceEventInstance
;@TraceMessage
;@TraceMessageVa
TreeResetNamedSecurityInfoA@44
TreeResetNamedSecurityInfoW@44
;TrusteeAccessToObjectA
;TrusteeAccessToObjectW
;@UninstallApplication
UnlockServiceDatabase@4
;UnregisterIdleTask
;@UnregisterTraceGuids
;@UpdateTraceA
;@UpdateTraceW
;WdmWmiServiceMain
;WmiCloseBlock
;WmiCloseTraceWithCursor
;WmiConvertTimestamp
;WmiDevInstToInstanceNameA
;WmiDevInstToInstanceNameW
;WmiEnumerateGuids
;WmiExecuteMethodA
;WmiExecuteMethodW
;WmiFileHandleToInstanceNameA
;WmiFileHandleToInstanceNameW
;WmiFreeBuffer
;WmiGetFirstTraceOffset
;WmiGetNextEvent
;WmiGetTraceHeader
;WmiMofEnumerateResourcesA
;WmiMofEnumerateResourcesW
;WmiNotificationRegistrationA
;WmiNotificationRegistrationW
;WmiOpenBlock
;WmiOpenTraceWithCursor
;WmiParseTraceEvent
;WmiQueryAllDataA
;WmiQueryAllDataMultipleA
;WmiQueryAllDataMultipleW
;WmiQueryAllDataW
;WmiQueryGuidInformation
;WmiQuerySingleInstanceA
;WmiQuerySingleInstanceMultipleA
;WmiQuerySingleInstanceMultipleW
;WmiQuerySingleInstanceW
;WmiReceiveNotificationsA
;WmiReceiveNotificationsW
;WmiSetSingleInstanceA
;WmiSetSingleInstanceW
;WmiSetSingleItemA
;WmiSetSingleItemW
Wow64Win32ApiEntry@12
WriteEncryptedFileRaw@12
; EOF

View file

@ -1,191 +1,89 @@
; $Id: advapi32.edf,v 1.27 2003/10/12 09:39:44 hbirr Exp $
; $Id: advapi32.edf,v 1.28 2004/02/25 14:25:10 ekohl Exp $
;
; advapi32.edf
;
; ReactOS Operating System
;
; Some stack sizes are taken from Ander Norlander's .DEFs.
;
LIBRARY advapi32.dll
EXPORTS
A_SHAFinal=A_SHAFinal@8
A_SHAInit=A_SHAInit@4
A_SHAUpdate=A_SHAUpdate@12
AbortSystemShutdownA=AbortSystemShutdownA@4
AbortSystemShutdownW=AbortSystemShutdownW@4
AccessCheck=AccessCheck@32
AccessCheckAndAuditAlarmA=AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW=AccessCheckAndAuditAlarmW@44
AccessCheckByType=AccessCheckByType@44
AccessCheckByTypeAndAuditAlarmA=AccessCheckByTypeAndAuditAlarmA@64
AccessCheckByTypeAndAuditAlarmW=AccessCheckByTypeAndAuditAlarmW@64
AccessCheckByTypeResultList=AccessCheckByTypeResultList@44
AccessCheckByTypeResultListAndAuditAlarmA=AccessCheckByTypeResultListAndAuditAlarmA@64
AccessCheckByTypeResultListAndAuditAlarmByHandleA=AccessCheckByTypeResultListAndAuditAlarmByHandleA@68
AccessCheckByTypeResultListAndAuditAlarmByHandleW=AccessCheckByTypeResultListAndAuditAlarmByHandleW@68
AccessCheckByTypeResultListAndAuditAlarmW=AccessCheckByTypeResultListAndAuditAlarmW@64
AddAccessAllowedAce=AddAccessAllowedAce@16
AddAccessAllowedAceEx=AddAccessAllowedAceEx@20
AddAccessAllowedObjectAce=AddAccessAllowedObjectAce@28
AddAccessDeniedAce=AddAccessDeniedAce@16
AddAccessDeniedAceEx=AddAccessDeniedAceEx@20
AddAccessDeniedObjectAce=AddAccessDeniedObjectAce@28
AddAce=AddAce@20
AddAuditAccessAce=AddAuditAccessAce@24
AddAuditAccessAceEx=AddAuditAccessAceEx@28
AddAuditAccessObjectAce=AddAuditAccessObjectAce@36
;AddUsersToEncryptedFile
AdjustTokenGroups=AdjustTokenGroups@24
AdjustTokenPrivileges=AdjustTokenPrivileges@24
AllocateAndInitializeSid=AllocateAndInitializeSid@44
AllocateLocallyUniqueId=AllocateLocallyUniqueId@4
AreAllAccessesGranted=AreAllAccessesGranted@8
AreAnyAccessesGranted=AreAnyAccessesGranted@8
BackupEventLogA=BackupEventLogA@8
BackupEventLogW=BackupEventLogW@8
BuildExplicitAccessWithNameA=BuildExplicitAccessWithNameA@20
BuildExplicitAccessWithNameW=BuildExplicitAccessWithNameW@20
BuildImpersonateExplicitAccessWithNameA=BuildImpersonateExplicitAccessWithNameA@24
BuildImpersonateExplicitAccessWithNameW=BuildImpersonateExplicitAccessWithNameW@24
BuildImpersonateTrusteeA=BuildImpersonateTrusteeA@8
BuildImpersonateTrusteeW=BuildImpersonateTrusteeW@8
BuildSecurityDescriptorA=BuildSecurityDescriptorA@36
BuildSecurityDescriptorW=BuildSecurityDescriptorW@36
BuildTrusteeWithNameA=BuildTrusteeWithNameA@8
BuildTrusteeWithNameW=BuildTrusteeWithNameW@8
BuildTrusteeWithObjectsAndNameA=BuildTrusteeWithObjectsAndNameA@24
BuildTrusteeWithObjectsAndNameW=BuildTrusteeWithObjectsAndNameW@24
BuildTrusteeWithObjectsAndSidA=BuildTrusteeWithObjectsAndSidA@20
BuildTrusteeWithObjectsAndSidW=BuildTrusteeWithObjectsAndSidA@20
BuildTrusteeWithSidA=BuildTrusteeWithSidA@8
BuildTrusteeWithSidW=BuildTrusteeWithSidW@8
;CancelOverlappedAccess
;BackupEventLogA=BackupEventLogA@8
;BackupEventLogW=BackupEventLogW@8
;BuildAccessRequestA
;BuildAccessRequestW
;BuildExplicitAccessWithNameA=BuildExplicitAccessWithNameA@20
;BuildExplicitAccessWithNameW=BuildExplicitAccessWithNameW@20
;BuildImpersonateExplicitAccessWithNameA=BuildImpersonateExplicitAccessWithNameA@24
;BuildImpersonateExplicitAccessWithNameW=BuildImpersonateExplicitAccessWithNameW@24
;BuildImpersonateTrusteeA=BuildImpersonateTrusteeA@8
;BuildImpersonateTrusteeW=BuildImpersonateTrusteeW@8
;BuildSecurityDescriptorA=BuildSecurityDescriptorA@36
;BuildSecurityDescriptorW=BuildSecurityDescriptorW@36
;BuildTrusteeWithNameA=BuildTrusteeWithNameA@8
;BuildTrusteeWithNameW=BuildTrusteeWithNameW@8
;BuildTrusteeWithSidA=BuildTrusteeWithSidA@8
;BuildTrusteeWithSidW=BuildTrusteeWithSidW@8
ChangeServiceConfigA=ChangeServiceConfigA@44
ChangeServiceConfigW=ChangeServiceConfigW@44
ChangeServiceConfig2A=ChangeServiceConfig2A@12
ChangeServiceConfig2W=ChangeServiceConfig2W@12
CheckTokenMembership=CheckTokenMembership@12
ClearEventLogA=ClearEventLogA@8
ClearEventLogW=ClearEventLogW@8
;CloseCodeAuthzLevel
CloseEncryptedFileRaw=CloseEncryptedFileRaw@4
CloseEventLog=CloseEventLog@4
;ClearEventLogA=ClearEventLogA@8
;ClearEventLogW=ClearEventLogW@8
;CloseEventLog=CloseEventLog@4
CloseServiceHandle=CloseServiceHandle@4
;CloseTrace
;CommandLineFromMsiDescriptor
;ComputeAccessTokenFromCodeAuthzLevel
;ControlTraceA
;ControlTraceW
ControlService=ControlService@12
;ConvertAccessToSecurityDescriptorA
;ConvertAccessToSecurityDescriptorW
;ConvertSDToStringSDRootDomainA
;ConvertSDToStringSDRootDomainW
;ConvertSecurityDescriptorToAccessA
;ConvertSecurityDescriptorToAccessNamedA
;ConvertSecurityDescriptorToAccessNamedW
;ConvertSecurityDescriptorToAccessW
;ConvertSecurityDescriptorToStringSecurityDescriptorA
;ConvertSecurityDescriptorToStringSecurityDescriptorW
;ConvertSidToStringSidA
;ConvertSidToStringSidW
;ConvertStringSDToSDDomainA
;ConvertStringSDToSDDomainW
;ConvertStringSDToSDRootDomainA
;ConvertStringSDToSDRootDomainW
;ConvertStringSecurityDescriptorToSecurityDescriptorA
;ConvertStringSecurityDescriptorToSecurityDescriptorW
;ConvertStringSidToSidA
;ConvertStringSidToSidW
ConvertToAutoInheritPrivateObjectSecurity=ConvertToAutoInheritPrivateObjectSecurity@24
CopySid=CopySid@12
;CreateCodeAuthzLevel
CreatePrivateObjectSecurity=CreatePrivateObjectSecurity@24
CreatePrivateObjectSecurityEx=CreatePrivateObjectSecurityEx@32
CreatePrivateObjectSecurityWithMultipleInheritance=CreatePrivateObjectSecurityWithMultipleInheritance@36
;CreatePrivateObjectSecurity=CreatePrivateObjectSecurity@24
CreateProcessAsUserA=CreateProcessAsUserA@44
CreateProcessAsUserW=CreateProcessAsUserW@44
CreateProcessWithLogonW=CreateProcessWithLogonW@44
CreateRestrictedToken=CreateRestrictedToken@36
CreateServiceA=CreateServiceA@52
CreateServiceW=CreateServiceW@52
;CreateTraceInstanceId
CreateWellKnownSid=CreateWellKnownSid@16
;CredDeleteA
;CredDeleteW
;CredEnumerateA
;CredEnumerateW
;CredFree
;CredGetSessionTypes
;CredGetTargetInfoA
;CredGetTargetInfoW
;CredIsMarshaledCredentialA
;CredIsMarshaledCredentialW
;CredMarshalCredentialA
;CredMarshalCredentialW
;CredProfileLoaded
;CredReadA
;CredReadDomainCredentialsA
;CredReadDomainCredentialsW
;CredReadW
;CredRenameA
;CredRenameW
;CredUnmarshalCredentialA
;CredUnmarshalCredentialW
;CredWriteA
;CredWriteDomainCredentialsA
;CredWriteDomainCredentialsW
;CredWriteW
;CredpConvertCredential
;CredpConvertTargetInfo
;CredpDecodeCredential
;CredpEncodeCredential
CryptAcquireContextA=CryptAcquireContextA@20
CryptAcquireContextW=CryptAcquireContextW@20
CryptContextAddRef=CryptContextAddRef@12
CryptCreateHash=CryptCreateHash@20
CryptDecrypt=CryptDecrypt@24
CryptDeriveKey=CryptDeriveKey@20
CryptDestroyHash=CryptDestroyHash@4
CryptDestroyKey=CryptDestroyKey@4
CryptDuplicateHash=CryptDuplicateHash@16
CryptDuplicateKey=CryptDuplicateKey@16
CryptEncrypt=CryptEncrypt@28
CryptEnumProviderTypesA=CryptEnumProviderTypesA@24
CryptEnumProviderTypesW=CryptEnumProviderTypesW@24
CryptEnumProvidersA=CryptEnumProvidersA@24
CryptEnumProvidersW=CryptEnumProvidersW@24
CryptExportKey=CryptExportKey@24
CryptGenKey=CryptGenKey@16
CryptGenRandom=CryptGenRandom@12
CryptGetDefaultProviderA=CryptGetDefaultProviderA@20
CryptGetDefaultProviderW=CryptGetDefaultProviderW@20
CryptGetHashParam=CryptGetHashParam@20
CryptGetKeyParam=CryptGetKeyParam@20
CryptGetProvParam=CryptGetProvParam@20
CryptGetUserKey=CryptGetUserKey@12
CryptHashData=CryptHashData@16
CryptHashSessionKey=CryptHashSessionKey@12
CryptImportKey=CryptImportKey@24
CryptReleaseContext=CryptReleaseContext@8
CryptSetHashParam=CryptSetHashParam@16
CryptSetKeyParam=CryptSetKeyParam@16
CryptSetProvParam=CryptSetProvParam@16
CryptSetProviderA=CryptSetProviderA@8
CryptSetProviderW=CryptSetProviderW@8
CryptSetProviderExA=CryptSetProviderExA@16
CryptSetProviderExW=CryptSetProviderExW@16
CryptSignHashA=CryptSignHashA@24
CryptSignHashW=CryptSignHashW@24
CryptVerifySignatureA=CryptVerifySignatureA@24
CryptVerifySignatureW=CryptVerifySignatureW@24
DecryptFileA=DecryptFileA@8
DecryptFileW=DecryptFileW@8
;CryptAcquireContextA=CryptAcquireContextA@20
;CryptAcquireContextW=CryptAcquireContextW@20
;CryptCreateHash=CryptCreateHash@20
;CryptDecrypt=CryptDecrypt@24
;CryptDeriveKey=CryptDeriveKey@20
;CryptDestroyHash=CryptDestroyHash@4
;CryptDestroyKey=CryptDestroyKey@4
;CryptEncrypt=CryptEncrypt@28
;CryptExportKey=CryptExportKey@24
;CryptGenKey=CryptGenKey@16
;CryptGenRandom=CryptGenRandom@12
;CryptGetHashParam=CryptGetHashParam@20
;CryptGetKeyParam=CryptGetKeyParam@20
;CryptGetProvParam=CryptGetProvParam@20
;CryptGetUserKey=CryptGetUserKey@12
;CryptHashData=CryptHashData@16
;CryptHashSessionKey=CryptHashSessionKey@12
;CryptImportKey=CryptImportKey@24
;CryptReleaseContext=CryptReleaseContext@8
;CryptSetHashParam=CryptSetHashParam@16
;CryptSetKeyParam=CryptSetKeyParam@16
;CryptSetProvParam=CryptSetProvParam@16
;CryptSetProviderA=CryptSetProviderA@8
;CryptSetProviderW=CryptSetProviderW@8
;CryptSignHashA=CryptSignHashA@24
;CryptSignHashW=CryptSignHashW@24
;CryptVerifySignatureA=CryptVerifySignatureA@24
;CryptVerifySignatureW=CryptVerifySignatureW@24
DeleteAce=DeleteAce@8
DeleteService=DeleteService@4
DeregisterEventSource=DeregisterEventSource@4
DestroyPrivateObjectSecurity=DestroyPrivateObjectSecurity@4
;DuplicateEncryptionInfoFile
;DenyAccessRightsA
;DenyAccessRightsW
;DeregisterEventSource=DeregisterEventSource@4
;DestroyPrivateObjectSecurity=DestroyPrivateObjectSecurity@4
DuplicateToken=DuplicateToken@12
DuplicateTokenEx=DuplicateTokenEx@24
;ElfBackupEventLogFileA=ElfBackupEventLogFileA@8
@ -207,78 +105,53 @@ DuplicateTokenEx=DuplicateTokenEx@24
;ElfRegisterEventSourceW=ElfRegisterEventSourceW@12
;ElfReportEventA=ElfReportEventA@48
;ElfReportEventW=ElfReportEventW@48
;EnableTrace
EncryptFileA=EncryptFileA@4
EncryptFileW=EncryptFileW@4
;EncryptedFileKeyInfo
;EncryptionDisable
EnumDependentServicesA=EnumDependentServicesA@24
EnumDependentServicesW=EnumDependentServicesW@24
EnumServiceGroupW=EnumServiceGroupW@36
EnumServicesStatusA=EnumServicesStatusA@32
EnumServicesStatusExA=EnumServicesStatusExA@40
EnumServicesStatusExW=EnumServicesStatusExW@40
EnumServicesStatusW=EnumServicesStatusW@32
;EnumerateTraceGuids
EqualDomainSid=EqualDomainSid@12
EqualPrefixSid=EqualPrefixSid@8
EqualSid=EqualSid@8
FileEncryptionStatusA=FileEncryptionStatusA@8
FileEncryptionStatusW=FileEncryptionStatusW@8
FindFirstFreeAce=FindFirstFreeAce@8
;FlushTraceA
;FlushTraceW
;FreeEncryptedFileKeyInfo
;FreeEncryptionCertificateHashList
FreeInheritedFromArray=FreeInheritedFromArray@12
FreeSid=FreeSid@4
;GetAccessPermissionsForObjectA
;GetAccessPermissionsForObjectW
GetAce=GetAce@12
GetAclInformation=GetAclInformation@16
GetAuditedPermissionsFromAclA=GetAuditedPermissionsFromAclA@16
GetAuditedPermissionsFromAclW=GetAuditedPermissionsFromAclW@16
GetCurrentHwProfileA=GetCurrentHwProfileA@4
GetCurrentHwProfileW=GetCurrentHwProfileW@4
GetEffectiveRightsFromAclA=GetEffectiveRightsFromAclA@12
GetEffectiveRightsFromAclW=GetEffectiveRightsFromAclW@12
GetEventLogInformation=GetEventLogInformation@20
GetExplicitEntriesFromAclA=GetExplicitEntriesFromAclA@12
GetExplicitEntriesFromAclW=GetExplicitEntriesFromAclW@12
GetFileSecurityA=GetFileSecurityA@20
GetFileSecurityW=GetFileSecurityW@20
;GetInformationCodeAuthzLevelW
;GetInformationCodeAuthzPolicyW
GetInheritanceSourceA=GetInheritanceSourceA@40
GetInheritanceSourceW=GetInheritanceSourceW@40
;GetAuditedPermissionsFromAclA=GetAuditedPermissionsFromAclA@16
;GetAuditedPermissionsFromAclW=GetAuditedPermissionsFromAclW@16
;GetAuditedPermissionsFromSDA
;GetAuditedPermissionsFromSDW
;GetCurrentHwProfileA=GetCurrentHwProfileA@4
;GetCurrentHwProfileW=GetCurrentHwProfileW@4
;GetEffectiveAccessRightsA
;GetEffectiveAccessRightsW
;GetEffectiveRightsFromAclA=GetEffectiveRightsFromAclA@12
;GetEffectiveRightsFromAclW=GetEffectiveRightsFromAclW@12
;GetEffectiveRightsFromSDA
;GetEffectiveRightsFromSDW
;GetExplicitAccessRightsA
;GetExplicitAccessRightsW
;GetExplicitEntriesFromAclA=GetExplicitEntriesFromAclA@12
;GetExplicitEntriesFromAclW=GetExplicitEntriesFromAclW@12
;GetFileSecurityA=GetFileSecurityA@20
;GetFileSecurityW=GetFileSecurityW@20
GetKernelObjectSecurity=GetKernelObjectSecurity@20
GetLengthSid=GetLengthSid@4
;GetLocalManagedApplicationData
;GetLocalManagedApplications
;GetManagedApplicationCategories
;GetManagedApplications
GetMultipleTrusteeA=GetMultipleTrusteeA@4
GetMultipleTrusteeOperationA=GetMultipleTrusteeOperationA@4
GetMultipleTrusteeOperationW=GetMultipleTrusteeOperationW@4
GetMultipleTrusteeW=GetMultipleTrusteeW@4
GetNamedSecurityInfoA=GetNamedSecurityInfoA@32
;GetNamedSecurityInfoExA
;GetNamedSecurityInfoExW
GetNamedSecurityInfoW=GetNamedSecurityInfoW@32
GetNumberOfEventLogRecords=GetNumberOfEventLogRecords@8
GetOldestEventLogRecord=GetOldestEventLogRecord@8
;GetOverlappedAccessResults
GetPrivateObjectSecurity=GetPrivateObjectSecurity@20
;GetMultipleTrusteeA=GetMultipleTrusteeA@4
;GetMultipleTrusteeOperationA=GetMultipleTrusteeOperationA@4
;GetMultipleTrusteeOperationW=GetMultipleTrusteeOperationW@4
;GetMultipleTrusteeW=GetMultipleTrusteeW@4
;GetNamedSecurityInfoA=GetNamedSecurityInfoA@32
;GetNamedSecurityInfoW=GetNamedSecurityInfoW@32
;GetNumberOfEventLogRecords=GetNumberOfEventLogRecords@8
;GetOldestEventLogRecord=GetOldestEventLogRecord@8
;GetPrivateObjectSecurity=GetPrivateObjectSecurity@20
GetSecurityDescriptorControl=GetSecurityDescriptorControl@12
GetSecurityDescriptorDacl=GetSecurityDescriptorDacl@16
GetSecurityDescriptorGroup=GetSecurityDescriptorGroup@12
GetSecurityDescriptorLength=GetSecurityDescriptorLength@4
GetSecurityDescriptorOwner=GetSecurityDescriptorOwner@12
GetSecurityDescriptorRMControl=GetSecurityDescriptorRMControl@8
GetSecurityDescriptorSacl=GetSecurityDescriptorSacl@16
GetSecurityInfo=GetSecurityInfo@32
GetSecurityInfoExA=GetSecurityInfoExA@36
GetSecurityInfoExW=GetSecurityInfoExW@36
;GetSecurityInfo=GetSecurityInfo@32
GetServiceDisplayNameA=GetServiceDisplayNameA@16
GetServiceDisplayNameW=GetServiceDisplayNameW@16
GetServiceKeyNameA=GetServiceKeyNameA@16
@ -288,140 +161,99 @@ GetSidLengthRequired=GetSidLengthRequired@4
GetSidSubAuthority=GetSidSubAuthority@8
GetSidSubAuthorityCount=GetSidSubAuthorityCount@4
GetTokenInformation=GetTokenInformation@20
GetTrusteeFormA=GetTrusteeFormA@4
GetTrusteeFormW=GetTrusteeFormW@4
GetTrusteeNameA=GetTrusteeNameA@4
GetTrusteeNameW=GetTrusteeNameW@4
GetTrusteeTypeA=GetTrusteeTypeA@4
GetTrusteeTypeW=GetTrusteeTypeW@4
GetUserNameA=GetUserNameA@8
GetUserNameW=GetUserNameW@8
GetWindowsAccountDomainSid=GetWindowsAccountDomainSid@12
;GetTrusteeNameA=GetTrusteeNameA@4
;GetTrusteeNameW=GetTrusteeNameW@4
;GetTrusteeTypeA=GetTrusteeTypeA@4
;GetTrusteeTypeW=GetTrusteeTypeW@4
;GetUserNameA=GetUserNameA@8
;GetUserNameW=GetUserNameW@8
;GrantAccessRightsA=GrantAccessRightsA@16
;GrantAccessRightsW=GrantAccessRightsW@16
;I_ScGetCurrentGroupStateW=I_ScGetCurrentGroupStateW@12
;I_ScIsSecurityProcess
;I_ScPnPGetServiceName
;I_ScSendTSMessage
;I_ScSetServiceBitsA=I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW=I_ScSetServiceBitsW@20
;IdentifyCodeAuthzLevelW
ImpersonateAnonymousToken=ImpersonateAnonymousToken@4
ImpersonateLoggedOnUser=ImpersonateLoggedOnUser@4
ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4
;ImpersonateLoggedOnUser=ImpersonateLoggedOnUser@4
;ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4
ImpersonateSelf=ImpersonateSelf@4
InitializeAcl=InitializeAcl@12
InitializeSecurityDescriptor=InitializeSecurityDescriptor@8
InitializeSid=InitializeSid@12
InitiateSystemShutdownA=InitiateSystemShutdownA@20
InitiateSystemShutdownExA=InitiateSystemShutdownExA@24
InitiateSystemShutdownExW=InitiateSystemShutdownExW@24
InitiateSystemShutdownW=InitiateSystemShutdownW@20
;InstallApplication
;IsAccessPermittedA=IsAccessPermittedA@20
;IsAccessPermittedW=IsAccessPermittedW@20
IsTextUnicode=IsTextUnicode@12
IsTokenRestricted=IsTokenRestricted@4
IsTokenUntrusted=IsTokenUntrusted@4
IsWellKnownSid=IsWellKnownSid@8
;IsTextUnicode=IsTextUnicode@12
IsValidAcl=IsValidAcl@4
IsValidSecurityDescriptor=IsValidSecurityDescriptor@4
IsValidSid=IsValidSid@4
LockServiceDatabase=LockServiceDatabase@4
LogonUserA=LogonUserA@24
LogonUserExA=LogonUserExA@40
LogonUserExW=LogonUserExW@40
LogonUserW=LogonUserW@24
LookupAccountNameA=LookupAccountNameA@28
LookupAccountNameW=LookupAccountNameW@28
LookupAccountSidA=LookupAccountSidA@28
LookupAccountSidW=LookupAccountSidW@28
;LookupAccountNameA=LookupAccountNameA@28
;LookupAccountNameW=LookupAccountNameW@28
;LookupAccountSidA=LookupAccountSidA@28
;LookupAccountSidW=LookupAccountSidW@28
LookupPrivilegeDisplayNameA=LookupPrivilegeDisplayNameA@20
LookupPrivilegeDisplayNameW=LookupPrivilegeDisplayNameW@20
LookupPrivilegeNameA=LookupPrivilegeNameA@16
LookupPrivilegeNameW=LookupPrivilegeNameW@16
LookupPrivilegeValueA=LookupPrivilegeValueA@12
LookupPrivilegeValueW=LookupPrivilegeValueW@12
LookupSecurityDescriptorPartsA=LookupSecurityDescriptorPartsA@28
LookupSecurityDescriptorPartsW=LookupSecurityDescriptorPartsW@28
LsaAddAccountRights=LsaAddAccountRights@16
;LookupSecurityDescriptorPartsA=LookupSecurityDescriptorPartsA@28
;LookupSecurityDescriptorPartsW=LookupSecurityDescriptorPartsW@28
;LsaAddAccountRights=LsaAddAccountRights@16
;LsaAddPrivilegesToAccount@8
;LsaClearAuditLog@4
LsaClose=LsaClose@4
;LsaClose=LsaClose@4
;LsaCreateAccount@16
;LsaCreateSecret@16
;LsaCreateTrustedDomain@16
LsaCreateTrustedDomainEx=LsaCreateTrustedDomainEx@20
;LsaDelete@4
LsaDeleteTrustedDomain=LsaDeleteTrustedDomain@8
LsaEnumerateAccountRights=LsaEnumerateAccountRights@16
;LsaDeleteTrustedDomain=LsaDeleteTrustedDomain@8
;LsaEnumerateAccountRights=LsaEnumerateAccountRights@16
;LsaEnumerateAccounts@20
LsaEnumerateAccountsWithUserRight=LsaEnumerateAccountsWithUserRight@16
;LsaEnumerateAccountsWithUserRight=LsaEnumerateAccountsWithUserRight@16
;LsaEnumeratePrivileges@20
;LsaEnumeratePrivilegesOfAccount@8
LsaEnumerateTrustedDomains=LsaEnumerateTrustedDomains@20
LsaEnumerateTrustedDomainsEx=LsaEnumerateTrustedDomainsEx@20
LsaFreeMemory=LsaFreeMemory@4
;LsaEnumerateTrustedDomains=LsaEnumerateTrustedDomains@20
;LsaFreeMemory=LsaFreeMemory@4
;LsaGetQuotasForAccount@8
;LsaGetRemoteUserName
;LsaGetSystemAccessAccount@8
;LsaGetUserName@8
;LsaICLookupNames@32
;LsaICLookupNamesWithCreds
;LsaICLookupSids@32
;LsaICLookupSidsWithCreds
LsaLookupNames=LsaLookupNames@20
LsaLookupNames2=LsaLookupNames2@24
;LsaLookupNames=LsaLookupNames@20
;LsaLookupPrivilegeDisplayName@16
;LsaLookupPrivilegeName@12
;LsaLookupPrivilegeValue@12
LsaLookupSids=LsaLookupSids@20
;LsaLookupSids=LsaLookupSids@20
;LsaNtStatusToWinError
;LsaOpenAccount@16
LsaOpenPolicy=LsaOpenPolicy@16
;LsaOpenPolicySce
;LsaOpenPolicy=LsaOpenPolicy@16
;LsaOpenSecret@16
;LsaOpenTrustedDomain@16
LsaOpenTrustedDomainByName=LsaOpenTrustedDomainByName@16
LsaQueryDomainInformationPolicy=LsaQueryDomainInformationPolicy@12
LsaQueryForestTrustInformation=LsaQueryForestTrustInformation@12
LsaQueryInformationPolicy=LsaQueryInformationPolicy@12
;LsaQueryInfoTrustedDomain@12
LsaQueryTrustedDomainInfoByName=LsaQueryTrustedDomainInfoByName@16
;LsaQueryInfoTrustedDomain
;LsaQueryInformationPolicy=LsaQueryInformationPolicy@12
;LsaQuerySecret@20
;LsaQuerySecurityObject@12
LsaQueryTrustedDomainInfo=LsaQueryTrustedDomainInfo@16
LsaRemoveAccountRights=LsaRemoveAccountRights@20
;LsaQueryTrustedDomainInfo=LsaQueryTrustedDomainInfo@16
;LsaRemoveAccountRights=LsaRemoveAccountRights@20
;LsaRemovePrivilegesFromAccount@12
;LsaRetrievePrivateData@12
LsaSetDomainInformationPolicy=LsaSetDomainInformationPolicy@12
LsaSetInformationPolicy=LsaSetInformationPolicy@12
;LsaSetInformationPolicy=LsaSetInformationPolicy@12
;LsaSetInformationTrustedDomain@12
LsaSetForestTrustInformation=LsaSetForestTrustInformation@20
LsaSetTrustedDomainInfoByName=LsaSetTrustedDomainInfoByName@16
;LsaSetQuotasForAccount@8
;LsaSetSecret@12
;LsaSetSecurityObject@12
;LsaSetSystemAccessAccount@8
LsaSetTrustedDomainInformation=LsaSetTrustedDomainInformation@16
LsaStorePrivateData=LsaStorePrivateData@12
LsaNtStatusToWinError=NTDLL.RtlNtStatusToDosError
;LsaSetTrustedDomainInformation=LsaSetTrustedDomainInformation@16
;LsaStorePrivateData=LsaStorePrivateData@12
MakeAbsoluteSD=MakeAbsoluteSD@44
MakeSelfRelativeSD=MakeSelfRelativeSD@12
MapGenericMask=MapGenericMask@8
MD4Final=MD4Final@4
MD4Init=MD4Init@4
MD4Update=MD4Update@12
MD5Final=MD5Final@4
MD5Init=MD5Init@4
MD5Update=MD5Update@12
;MSChapSrvChangePassword
;MSChapSrvChangePassword2
MakeAbsoluteSD2=MakeAbsoluteSD2@8
;NTAccessMaskToProvAccessRights=NTAccessMaskToProvAccessRights@12
NotifyBootConfigStatus=NotifyBootConfigStatus@4
NotifyChangeEventLog=NotifyChangeEventLog@8
;OpenBackupEventLogA
;OpenBackupEventLogW
;NotifyBootConfigStatus=NotifyBootConfigStatus@4
;NotifyChangeEventLog=NotifyChangeEventLog@8
ObjectCloseAuditAlarmA=ObjectCloseAuditAlarmA@12
ObjectCloseAuditAlarmW=ObjectCloseAuditAlarmW@12
ObjectDeleteAuditAlarmA=ObjectDeleteAuditAlarmA@12
@ -430,44 +262,30 @@ ObjectOpenAuditAlarmA=ObjectOpenAuditAlarmA@48
ObjectOpenAuditAlarmW=ObjectOpenAuditAlarmW@48
ObjectPrivilegeAuditAlarmA=ObjectPrivilegeAuditAlarmA@24
ObjectPrivilegeAuditAlarmW=ObjectPrivilegeAuditAlarmW@24
OpenBackupEventLogA=OpenBackupEventLogA@8
OpenBackupEventLogW=OpenBackupEventLogW@8
OpenEncryptedFileRawA=OpenEncryptedFileRawA@12
OpenEncryptedFileRawW=OpenEncryptedFileRawW@12
OpenEventLogA=OpenEventLogA@8
OpenEventLogW=OpenEventLogW@8
;OpenBackupEventLogA=OpenBackupEventLogA@8
;OpenBackupEventLogW=OpenBackupEventLogW@8
;OpenEventLogA=OpenEventLogA@8
;OpenEventLogW=OpenEventLogW@8
OpenProcessToken=OpenProcessToken@12
OpenSCManagerA=OpenSCManagerA@12
OpenSCManagerW=OpenSCManagerW@12
OpenServiceA=OpenServiceA@12
OpenServiceW=OpenServiceW@12
OpenThreadToken=OpenThreadToken@16
;OpenTraceA
;OpenTraceW
PrivilegeCheck=PrivilegeCheck@12
PrivilegedServiceAuditAlarmA=PrivilegedServiceAuditAlarmA@20
PrivilegedServiceAuditAlarmW=PrivilegedServiceAuditAlarmW@20
;ProcessIdleTasks
;ProcessTrace
;QueryAllTracesA
;QueryAllTracesW
;QueryRecoveryAgentsOnEncryptedFile
;ProvAccessRightsToNTAccessMask
QueryServiceConfigA=QueryServiceConfigA@16
QueryServiceConfigW=QueryServiceConfigW@16
QueryServiceConfig2A=QueryServiceConfig2A@20
QueryServiceConfig2W=QueryServiceConfig2W@20
QueryServiceLockStatusA=QueryServiceLockStatusA@16
QueryServiceLockStatusW=QueryServiceLockStatusW@16
QueryServiceObjectSecurity=QueryServiceObjectSecurity@20
QueryServiceStatus=QueryServiceStatus@8
QueryServiceStatusEx=QueryServiceStatusEx@20
;QueryTraceA
;QueryTraceW
;QueryUsersOnEncryptedFile
QueryWindows31FilesMigration=QueryWindows31FilesMigration@4
ReadEncryptedFileRaw=ReadEncryptedFileRaw@12
ReadEventLogA=ReadEventLogA@28
ReadEventLogW=ReadEventLogW@28
;QueryWindows31FilesMigration=QueryWindows31FilesMigration@4
;ReadEventLogA=ReadEventLogA@28
;ReadEventLogW=ReadEventLogW@28
RegCloseKey=RegCloseKey@4
RegConnectRegistryA=RegConnectRegistryA@12
RegConnectRegistryW=RegConnectRegistryW@12
@ -479,7 +297,6 @@ RegDeleteKeyA=RegDeleteKeyA@8
RegDeleteKeyW=RegDeleteKeyW@8
RegDeleteValueA=RegDeleteValueA@8
RegDeleteValueW=RegDeleteValueW@8
RegDisablePredefinedCache=RegDisablePredefinedCache@0
RegEnumKeyA=RegEnumKeyA@16
RegEnumKeyExA=RegEnumKeyExA@32
RegEnumKeyExW=RegEnumKeyExW@32
@ -491,13 +308,10 @@ RegGetKeySecurity=RegGetKeySecurity@16
RegLoadKeyA=RegLoadKeyA@12
RegLoadKeyW=RegLoadKeyW@12
RegNotifyChangeKeyValue=RegNotifyChangeKeyValue@20
RegOpenCurrentUser=RegOpenCurrentUser@8
RegOpenKeyA=RegOpenKeyA@12
RegOpenKeyExA=RegOpenKeyExA@20
RegOpenKeyExW=RegOpenKeyExW@20
RegOpenKeyW=RegOpenKeyW@12
RegOpenUserClassesRoot=RegOpenUserClassesRoot@16
RegOverridePredefKey=RegOverridePredefKey@8
RegQueryInfoKeyA=RegQueryInfoKeyA@48
RegQueryInfoKeyW=RegQueryInfoKeyW@48
RegQueryMultipleValuesA=RegQueryMultipleValuesA@20
@ -511,8 +325,6 @@ RegReplaceKeyW=RegReplaceKeyW@16
RegRestoreKeyA=RegRestoreKeyA@12
RegRestoreKeyW=RegRestoreKeyW@12
RegSaveKeyA=RegSaveKeyA@12
RegSaveKeyExA=RegSaveKeyExA@16
RegSaveKeyExW=RegSaveKeyExW@16
RegSaveKeyW=RegSaveKeyW@12
RegSetKeySecurity=RegSetKeySecurity@12
RegSetValueA=RegSetValueA@20
@ -521,83 +333,43 @@ RegSetValueExW=RegSetValueExW@24
RegSetValueW=RegSetValueW@20
RegUnLoadKeyA=RegUnLoadKeyA@8
RegUnLoadKeyW=RegUnLoadKeyW@8
RegisterEventSourceA=RegisterEventSourceA@8
RegisterEventSourceW=RegisterEventSourceW@8
;RegisterIdleTask
;RegisterEventSourceA=RegisterEventSourceA@8
;RegisterEventSourceW=RegisterEventSourceW@8
RegisterServiceCtrlHandlerA=RegisterServiceCtrlHandlerA@8
RegisterServiceCtrlHandlerExA=RegisterServiceCtrlHandlerExA@12
RegisterServiceCtrlHandlerExW=RegisterServiceCtrlHandlerExW@12
RegisterServiceCtrlHandlerW=RegisterServiceCtrlHandlerW@8
;RegisterTraceGuidsA
;RegisterTraceGuidsW
;RemoveTraceCallback
;RemoveUsersFromEncryptedFile
ReportEventA=ReportEventA@36
ReportEventW=ReportEventW@36
;ReplaceAllAccessRightsA
;ReplaceAllAccessRightsW
;ReportEventA=ReportEventA@36
;ReportEventW=ReportEventW@36
RevertToSelf=RevertToSelf@0
;RevokeExplicitAccessRightsA=RevokeExplicitAccessRightsA@16
;RevokeExplicitAccessRightsW=RevokeExplicitAccessRightsW@16
;SaferCloseLevel
;SaferComputeTokenFromLevel
;SaferCreateLevel
;SaferGetLevelInformation
;SaferGetPolicyInformation
;SaferIdentifyLevel
;SaferRecordEventLogEntry
;SaferSetLevelInformation
;SaferSetPolicyInformation
;SaferiChangeRegistryScope
;SaferiCompareTokenLevels
;SaferiIsExecutableFileType
;SaferiPopulateDefaultsInRegistry
;SaferiRecordEventLogEntry
;SaferiReplaceProcessThreadTokens
;SaferiSearchMatchingHashRules
;SetAccessRightsA=SetAccessRightsA@16
;SetAccessRightsW=SetAccessRightsW@16
SetAclInformation=SetAclInformation@16
;SetEntriesInAccessListA
;SetEntriesInAccessListW
SetEntriesInAclA=SetEntriesInAclA@16
SetEntriesInAclW=SetEntriesInAclW@16
;SetEntriesInAuditListA
;SetEntriesInAuditListW
SetFileSecurityA=SetFileSecurityA@12
SetFileSecurityW=SetFileSecurityW@12
;SetEntriesInAclA=SetEntriesInAclA@16
;SetEntriesInAclW=SetEntriesInAclW@16
;SetFileSecurityA=SetFileSecurityA@12
;SetFileSecurityW=SetFileSecurityW@12
SetKernelObjectSecurity=SetKernelObjectSecurity@12
;SetInformationCodeAuthzLevelW
;SetInformationCodeAuthzPolicyW
SetNamedSecurityInfoA=SetNamedSecurityInfoA@28
;SetNamedSecurityInfoExA
;SetNamedSecurityInfoExW
SetNamedSecurityInfoW=SetNamedSecurityInfoW@28
SetPrivateObjectSecurity=SetPrivateObjectSecurity@20
SetPrivateObjectSecurityEx=SetPrivateObjectSecurityEx@24
SetSecurityDescriptorControl=SetSecurityDescriptorControl@12
;SetNamedSecurityInfoA=SetNamedSecurityInfoA@28
;SetNamedSecurityInfoW=SetNamedSecurityInfoW@28
;SetPrivateObjectSecurity=SetPrivateObjectSecurity@20
SetSecurityDescriptorDacl=SetSecurityDescriptorDacl@16
SetSecurityDescriptorGroup=SetSecurityDescriptorGroup@12
SetSecurityDescriptorOwner=SetSecurityDescriptorOwner@12
SetSecurityDescriptorRMControl=SetSecurityDescriptorRMControl@8
SetSecurityDescriptorSacl=SetSecurityDescriptorSacl@16
SetSecurityInfo=SetSecurityInfo@28
;SetSecurityInfoExA
;SetSecurityInfoExW
;SetSecurityInfo=SetSecurityInfo@28
SetServiceBits=SetServiceBits@16
SetServiceObjectSecurity=SetServiceObjectSecurity@12
SetServiceStatus=SetServiceStatus@8
SetThreadToken=SetThreadToken@8
SetTokenInformation=SetTokenInformation@16
;SetTraceCallback
;SetUserFileEncryptionKey
StartServiceA=StartServiceA@12
StartServiceCtrlDispatcherA=StartServiceCtrlDispatcherA@4
StartServiceCtrlDispatcherW=StartServiceCtrlDispatcherW@4
StartServiceW=StartServiceW@12
;StartTraceA
;StartTraceW
;StopTraceA
;StopTraceW
SynchronizeWindows31FilesAndWindowsNTRegistry=SynchronizeWindows31FilesAndWindowsNTRegistry@16
;SynchronizeWindows31FilesAndWindowsNTRegistry=SynchronizeWindows31FilesAndWindowsNTRegistry@16
SystemFunction001=SystemFunction001@12
SystemFunction002=SystemFunction002@12
SystemFunction003=SystemFunction003@8
@ -633,60 +405,5 @@ SystemFunction032=SystemFunction032@8
SystemFunction033=SystemFunction033@8
SystemFunction034=SystemFunction034@8
SystemFunction035=SystemFunction035@8
;SystemFunction036
;SystemFunction040
;SystemFunction041
;TraceEvent
;TraceEventInstance
;TraceMessage
;TraceMessageVa
TreeResetNamedSecurityInfoA=TreeResetNamedSecurityInfoA@44
TreeResetNamedSecurityInfoW=TreeResetNamedSecurityInfoW@44
;TrusteeAccessToObjectA
;TrusteeAccessToObjectW
;UninstallApplication
UnlockServiceDatabase=UnlockServiceDatabase@4
;UnregisterIdleTask
;UnregisterTraceGuids
;UpdateTraceA
;UpdateTraceW
;WdmWmiServiceMain
;WmiCloseBlock
;WmiCloseTraceWithCursor
;WmiConvertTimestamp
;WmiDevInstToInstanceNameA
;WmiDevInstToInstanceNameW
;WmiEnumerateGuids
;WmiExecuteMethodA
;WmiExecuteMethodW
;WmiFileHandleToInstanceNameA
;WmiFileHandleToInstanceNameW
;WmiFreeBuffer
;WmiGetFirstTraceOffset
;WmiGetNextEvent
;WmiGetTraceHeader
;WmiMofEnumerateResourcesA
;WmiMofEnumerateResourcesW
;WmiNotificationRegistrationA
;WmiNotificationRegistrationW
;WmiOpenBlock
;WmiOpenTraceWithCursor
;WmiParseTraceEvent
;WmiQueryAllDataA
;WmiQueryAllDataMultipleA
;WmiQueryAllDataMultipleW
;WmiQueryAllDataW
;WmiQueryGuidInformation
;WmiQuerySingleInstanceA
;WmiQuerySingleInstanceMultipleA
;WmiQuerySingleInstanceMultipleW
;WmiQuerySingleInstanceW
;WmiReceiveNotificationsA
;WmiReceiveNotificationsW
;WmiSetSingleInstanceA
;WmiSetSingleInstanceW
;WmiSetSingleItemA
;WmiSetSingleItemW
Wow64Win32ApiEntry=Wow64Win32ApiEntry@12
WriteEncryptedFileRaw=WriteEncryptedFileRaw@12
; EOF

View file

@ -1,4 +1,4 @@
# $Id: makefile,v 1.32 2004/01/20 01:40:18 ekohl Exp $
# $Id: makefile,v 1.33 2004/02/25 14:25:10 ekohl Exp $
PATH_TO_TOP = ../..
@ -19,10 +19,7 @@ MISC_OBJECTS = \
misc/dllmain.o \
misc/logon.o \
misc/shutdown.o \
misc/sysfunc.o \
misc/crstubs.o \
misc/aclstubs.o \
misc/stubs.o
misc/sysfunc.o
REGISTRY_OBJECTS = \
reg/reg.o
@ -30,7 +27,6 @@ REGISTRY_OBJECTS = \
SECURITY_OBJECTS = \
sec/ac.o \
sec/audit.o \
sec/lsa.o \
sec/misc.o \
sec/sec.o \
sec/sid.o

View file

@ -1,319 +0,0 @@
#include <windows.h>
#include <accctrl.h>
#include <aclapi.h>
/*
* @unimplemented
*/
VOID STDCALL BuildExplicitAccessWithNameA(PEXPLICIT_ACCESS_A pExplicitAccess,LPSTR pTrusteeName,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildExplicitAccessWithNameW(PEXPLICIT_ACCESS_W pExplicitAccess,LPWSTR pTrusteeName,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
DWORD STDCALL BuildSecurityDescriptorA(PTRUSTEE_A pOwner,PTRUSTEE_A pGroup,ULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_A pListOfAccessEntries,
ULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_A pListOfAuditEntries,PSECURITY_DESCRIPTOR pOldSD,PULONG pSizeNewSD,PSECURITY_DESCRIPTOR* pNewSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL BuildSecurityDescriptorW(PTRUSTEE_W pOwner,PTRUSTEE_W pGroup,ULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_W pListOfAccessEntries,
ULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_W pListOfAuditEntries,PSECURITY_DESCRIPTOR pOldSD,PULONG pSizeNewSD,PSECURITY_DESCRIPTOR* pNewSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithNameA(PTRUSTEE_A pTrustee,LPSTR pName)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithNameW(PTRUSTEE_W pTrustee,LPWSTR pName)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndNameA(PTRUSTEE_A pTrustee,POBJECTS_AND_NAME_A pObjName,SE_OBJECT_TYPE ObjectType,
LPSTR ObjectTypeName,LPSTR InheritedObjectTypeName,LPSTR Name)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndNameW(PTRUSTEE_W pTrustee,POBJECTS_AND_NAME_W pObjName,SE_OBJECT_TYPE ObjectType,
LPWSTR ObjectTypeName,LPWSTR InheritedObjectTypeName,LPWSTR Name)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndSidA(PTRUSTEE_A pTrustee,POBJECTS_AND_SID pObjSid,GUID* pObjectGuid,GUID* pInheritedObjectGuid,PSID pSid)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndSidW(PTRUSTEE_W pTrustee,POBJECTS_AND_SID pObjSid,GUID* pObjectGuid,GUID* pInheritedObjectGuid,PSID pSid)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithSidA(PTRUSTEE_A pTrustee,PSID pSid)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithSidW(PTRUSTEE_W pTrustee,PSID pSid)
{
}
/*
* @unimplemented
*/
DWORD STDCALL GetAuditedPermissionsFromAclA(PACL pacl,PTRUSTEE_A pTrustee,PACCESS_MASK pSuccessfulAuditedRights,PACCESS_MASK pFailedAuditRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetAuditedPermissionsFromAclW(PACL pacl,PTRUSTEE_W pTrustee,PACCESS_MASK pSuccessfulAuditedRights,PACCESS_MASK pFailedAuditRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetEffectiveRightsFromAclA(PACL pacl,PTRUSTEE_A pTrustee,PACCESS_MASK pAccessRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetEffectiveRightsFromAclW(PACL pacl,PTRUSTEE_W pTrustee,PACCESS_MASK pAccessRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetExplicitEntriesFromAclA(PACL pacl,PULONG pcCountOfExplicitEntries,PEXPLICIT_ACCESS_A* pListOfExplicitEntries)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetExplicitEntriesFromAclW(PACL pacl,PULONG pcCountOfExplicitEntries,PEXPLICIT_ACCESS_W* pListOfExplicitEntries)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,
PSID* ppsidOwner,PSID* ppsidGroup,PACL* ppDacl,PACL* ppSacl,PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,
PSID* ppsidOwner,PSID* ppsidGroup,PACL* ppDacl,PACL* ppSacl,PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_FORM STDCALL GetTrusteeFormA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_FORM STDCALL GetTrusteeFormW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
LPSTR STDCALL GetTrusteeNameA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
LPWSTR STDCALL GetTrusteeNameW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_TYPE STDCALL GetTrusteeTypeA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_TYPE STDCALL GetTrusteeTypeW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL LookupSecurityDescriptorPartsA(PTRUSTEE_A* pOwner,PTRUSTEE_A* pGroup,PULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_A* pListOfAccessEntries,
PULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_A* pListOfAuditEntries,PSECURITY_DESCRIPTOR pSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL LookupSecurityDescriptorPartsW(PTRUSTEE_W* pOwner,PTRUSTEE_W* pGroup,PULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_W* pListOfAccessEntries,
PULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_W* pListOfAuditEntries,PSECURITY_DESCRIPTOR pSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetEntriesInAclA(ULONG cCountOfExplicitEntries,PEXPLICIT_ACCESS_A pListOfExplicitEntries,PACL OldAcl,PACL* NewAcl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetEntriesInAclW(ULONG cCountOfExplicitEntries,PEXPLICIT_ACCESS_W pListOfExplicitEntries,PACL OldAcl,PACL* NewAcl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetSecurityInfo(HANDLE handle,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetInheritanceSourceA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMA pInheritArray)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetInheritanceSourceW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMW pInheritArray)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL FreeInheritedFromArray(PINHERITED_FROMW pInheritArray,USHORT AceCnt,PFN_OBJECT_MGR_FUNCTS pfnArray)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL TreeResetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL TreeResetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
{
return(FALSE);
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateExplicitAccessWithNameA(PEXPLICIT_ACCESS_A pExplicitAccess,LPSTR pTrusteeName,PTRUSTEE_A pTrustee,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateExplicitAccessWithNameW(PEXPLICIT_ACCESS_W pExplicitAccess,LPWSTR pTrusteeName,PTRUSTEE_W pTrustee,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateTrusteeA(PTRUSTEE_A pTrustee,PTRUSTEE_A pImpersonateTrustee)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateTrusteeW(PTRUSTEE_W pTrustee,PTRUSTEE_W pImpersonateTrustee)
{
}
/*
* @unimplemented
*/
MULTIPLE_TRUSTEE_OPERATION STDCALL GetMultipleTrusteeOperationA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
MULTIPLE_TRUSTEE_OPERATION STDCALL GetMultipleTrusteeOperationW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
PTRUSTEE_A STDCALL GetMultipleTrusteeA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
PTRUSTEE_W STDCALL GetMultipleTrusteeW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}

View file

@ -1,298 +0,0 @@
#include <windows.h>
#include <wincrypt.h>
/*
* @unimplemented
*/
BOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer,
LPCSTR pszProvider, DWORD dwProvType,
DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer,
LPCWSTR pszProvider, DWORD dwProvType, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGenRandom (HCRYPTPROV hProv, DWORD dwLen, BYTE *pbBuffer)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptContextAddRef (HCRYPTPROV hProv, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey,
DWORD dwFlags, HCRYPTHASH *phHash)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBaseData,
DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDestroyHash (HCRYPTHASH hHash)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDestroyKey (HCRYPTKEY hKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDuplicateKey (HCRYPTKEY hKey, DWORD *pdwReserved, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved,
DWORD dwFlags, HCRYPTHASH *phHash)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen, DWORD dwBufLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPSTR pszTypeName, DWORD *pcbTypeName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszTypeName, DWORD *pcbTypeName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobType,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGenKey (HCRYPTPROV hProv, ALG_ID Algid, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved,
DWORD dwFlags, LPSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved,
DWORD dwFlags, LPWSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetUserKey (HCRYPTPROV hProv, DWORD dwKeySpec, HCRYPTKEY *phUserKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptHashData (HCRYPTHASH hHash, BYTE *pbData, DWORD dwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptHashSessionKey (HCRYPTHASH hHash, HCRYPTKEY hKey, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen,
HCRYPTKEY hPubKey, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptReleaseContext (HCRYPTPROV hProv, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescription,
DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDescription,
DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderA (LPCSTR pszProvName, DWORD dwProvType)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderW (LPCWSTR pszProvName, DWORD dwProvType)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderExA (LPCSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderExW (LPCWSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
HCRYPTKEY hPubKey, LPCSTR sDescription, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptVerifySignatureW (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
HCRYPTKEY hPubKey, LPCWSTR sDescription, DWORD dwFlags)
{
return(FALSE);
}

View file

@ -1,4 +1,4 @@
/* $Id: logon.c,v 1.3 2004/01/23 10:35:52 ekohl Exp $
/* $Id: logon.c,v 1.4 2004/02/25 14:25:10 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -124,26 +124,6 @@ CreateProcessAsUserW (HANDLE hToken,
}
/*
* @unimplemented
*/
BOOL STDCALL
CreateProcessWithLogonW (LPCWSTR lpUsername,
LPCWSTR lpDomain,
LPCWSTR lpPassword,
DWORD dwLogonFlags,
LPCWSTR lpApplicationName,
LPWSTR lpCommandLine,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCWSTR lpCurrentDirectory,
LPSTARTUPINFOW lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation)
{
return FALSE;
}
/*
* @unimplemented
*/
@ -393,42 +373,4 @@ LogonUserW (LPCWSTR lpszUsername,
return TRUE;
}
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserExA (LPCSTR lpszUsername,
LPCSTR lpszDomain,
LPCSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken,
PSID *ppLogonSid,
PVOID *ppProfileBuffer,
LPDWORD pdwProfileLength,
PQUOTA_LIMITS pQuotaLimits)
{
return FALSE;
}
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserExW (LPCWSTR lpszUsername,
LPCWSTR lpszDomain,
LPCWSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken,
PSID *ppLogonSid,
PVOID *ppProfileBuffer,
LPDWORD pdwProfileLength,
PQUOTA_LIMITS pQuotaLimits)
{
return FALSE;
}
/* EOF */

File diff suppressed because it is too large Load diff

View file

@ -1,4 +1,4 @@
/* $Id: reg.c,v 1.43 2004/02/22 14:26:07 ekohl Exp $
/* $Id: reg.c,v 1.44 2004/02/25 14:25:10 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -191,7 +191,6 @@ OpenClassesRootKey (PHANDLE KeyHandle)
&Attributes);
}
#undef NDEBUG
static NTSTATUS
OpenLocalMachineKey (PHANDLE KeyHandle)
@ -215,7 +214,6 @@ OpenLocalMachineKey (PHANDLE KeyHandle)
return Status;
}
#define NDEBUG
static NTSTATUS
OpenUsersKey (PHANDLE KeyHandle)
@ -1608,7 +1606,6 @@ RegNotifyChangeKeyValue (HKEY hKey,
}
/************************************************************************
* RegOpenKeyA
*
@ -2535,9 +2532,120 @@ RegReplaceKeyW (HKEY hKey,
LPCWSTR lpNewFile,
LPCWSTR lpOldFile)
{
UNIMPLEMENTED;
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return ERROR_CALL_NOT_IMPLEMENTED;
OBJECT_ATTRIBUTES KeyObjectAttributes;
OBJECT_ATTRIBUTES NewObjectAttributes;
OBJECT_ATTRIBUTES OldObjectAttributes;
UNICODE_STRING SubKeyName;
UNICODE_STRING NewFileName;
UNICODE_STRING OldFileName;
BOOLEAN CloseRealKey;
HANDLE RealKeyHandle;
HANDLE KeyHandle;
LONG ErrorCode;
NTSTATUS Status;
if (hKey == HKEY_PERFORMANCE_DATA)
{
return ERROR_INVALID_HANDLE;
}
Status = MapDefaultKey (&KeyHandle,
hKey);
if (!NT_SUCCESS(Status))
{
ErrorCode = RtlNtStatusToDosError (Status);
SetLastError (ErrorCode);
return ErrorCode;
}
/* Open the real key */
if (lpSubKey != NULL && *lpSubKey != (WCHAR)0)
{
RtlInitUnicodeString (&SubKeyName,
(PWSTR)lpSubKey);
InitializeObjectAttributes (&KeyObjectAttributes,
&SubKeyName,
OBJ_CASE_INSENSITIVE,
KeyHandle,
NULL);
Status = NtOpenKey (&RealKeyHandle,
KEY_ALL_ACCESS,
&KeyObjectAttributes);
if (!NT_SUCCESS(Status))
{
ErrorCode = RtlNtStatusToDosError (Status);
SetLastError (ErrorCode);
return ErrorCode;
}
CloseRealKey = TRUE;
}
else
{
RealKeyHandle = KeyHandle;
CloseRealKey = FALSE;
}
/* Convert new file name */
if (!RtlDosPathNameToNtPathName_U ((LPWSTR)lpNewFile,
&NewFileName,
NULL,
NULL))
{
if (CloseRealKey)
{
NtClose (RealKeyHandle);
}
SetLastError (ERROR_INVALID_PARAMETER);
return ERROR_INVALID_PARAMETER;
}
InitializeObjectAttributes (&NewObjectAttributes,
&NewFileName,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
/* Convert old file name */
if (!RtlDosPathNameToNtPathName_U ((LPWSTR)lpOldFile,
&OldFileName,
NULL,
NULL))
{
RtlFreeUnicodeString (&NewFileName);
if (CloseRealKey)
{
NtClose (RealKeyHandle);
}
SetLastError (ERROR_INVALID_PARAMETER);
return ERROR_INVALID_PARAMETER;
}
InitializeObjectAttributes (&OldObjectAttributes,
&OldFileName,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtReplaceKey (&NewObjectAttributes,
RealKeyHandle,
&OldObjectAttributes);
RtlFreeUnicodeString (&OldFileName);
RtlFreeUnicodeString (&NewFileName);
if (CloseRealKey)
{
NtClose (RealKeyHandle);
}
if (!NT_SUCCESS(Status))
{
ErrorCode = RtlNtStatusToDosError (Status);
SetLastError (ErrorCode);
return ErrorCode;
}
return ERROR_SUCCESS;
}
@ -2649,9 +2757,9 @@ RegRestoreKeyW (HKEY hKey,
* @implemented
*/
LONG STDCALL
RegSaveKeyA(HKEY hKey,
LPCSTR lpFile,
LPSECURITY_ATTRIBUTES lpSecurityAttributes)
RegSaveKeyA (HKEY hKey,
LPCSTR lpFile,
LPSECURITY_ATTRIBUTES lpSecurityAttributes)
{
UNICODE_STRING FileName;
LONG ErrorCode;
@ -2695,7 +2803,7 @@ RegSaveKeyW (HKEY hKey,
return ErrorCode;
}
if (!RtlDosPathNameToNtPathName_U ((LPWSTR)lpFile,
if (!RtlDosPathNameToNtPathName_U ((PWSTR)lpFile,
&FileName,
NULL,
NULL))
@ -2820,7 +2928,7 @@ RegSetValueExA (HKEY hKey,
strlen(lpValueName) != 0)
{
RtlCreateUnicodeStringFromAsciiz (&ValueName,
(LPSTR)lpValueName);
(PSTR)lpValueName);
pValueName = (LPWSTR)ValueName.Buffer;
}
else
@ -2834,7 +2942,7 @@ RegSetValueExA (HKEY hKey,
{
RtlInitAnsiString (&AnsiString,
NULL);
AnsiString.Buffer = (LPSTR)lpData;
AnsiString.Buffer = (PSTR)lpData;
AnsiString.Length = cbData;
AnsiString.MaximumLength = cbData;
RtlAnsiStringToUnicodeString (&Data,
@ -3091,7 +3199,7 @@ RegUnLoadKeyA (HKEY hKey,
* @implemented
*/
LONG STDCALL
RegUnLoadKeyW (HKEY hKey,
RegUnLoadKeyW (HKEY hKey,
LPCWSTR lpSubKey)
{
OBJECT_ATTRIBUTES ObjectAttributes;

View file

@ -1,4 +1,4 @@
/* $Id: ac.c,v 1.8 2004/01/20 01:40:18 ekohl Exp $
/* $Id: ac.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -41,88 +41,6 @@ GetAclInformation (
}
#if 0
DWORD
WINAPI
GetAuditedPermissionsFromAclA (
IN PACL pacl,
IN PTRUSTEE_A pTrustee,
OUT PACCESS_MASK pSuccessfulAuditedRights,
OUT PACCESS_MASK pFailedAuditRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetAuditedPermissionsFromAclW (
IN PACL pacl,
IN PTRUSTEE_W pTrustee,
OUT PACCESS_MASK pSuccessfulAuditedRights,
OUT PACCESS_MASK pFailedAuditRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetEffectiveRightsFromAclA (
IN PACL pacl,
IN PTRUSTEE_A pTrustee,
OUT PACCESS_MASK pAccessRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetEffectiveRightsFromAclW (
IN PACL pacl,
IN PTRUSTEE_W pTrustee,
OUT PACCESS_MASK pAccessRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetExplicitEntriesFromAclA (
IN PACL pacl,
OUT PULONG pcCountOfExplicitEntries,
OUT PEXPLICIT_ACCESS_A * pListOfExplicitEntries
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetExplicitEntriesFromAclW (
IN PACL pacl,
OUT PULONG pcCountOfExplicitEntries,
OUT PEXPLICIT_ACCESS_W * pListOfExplicitEntries
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
#endif
/*
* @implemented
*/
@ -190,37 +108,6 @@ SetAclInformation (
}
#if 0
DWORD
WINAPI
SetEntriesInAclA (
IN ULONG cCountOfExplicitEntries,
IN PEXPLICIT_ACCESS_A pListOfExplicitEntries,
IN PACL OldAcl,
OUT PACL * NewAcl
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
SetEntriesInAclW (
IN ULONG cCountOfExplicitEntries,
IN PEXPLICIT_ACCESS_W pListOfExplicitEntries,
IN PACL OldAcl,
OUT PACL * NewAcl
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
#endif
/* --- ACE --- */
/*

View file

@ -1,4 +1,4 @@
/* $Id: lsa.c,v 1.8 2004/02/14 23:13:58 sedwards Exp $
/* $Id: lsa.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -28,19 +28,19 @@
*
* @unimplemented
*/
NTSTATUS
STDCALL
LsaOpenPolicy(PLSA_UNICODE_STRING lsaucs,PLSA_OBJECT_ATTRIBUTES lsaoa,ACCESS_MASK access,PLSA_HANDLE lsah)
NTSTATUS STDCALL
LsaOpenPolicy (PLSA_UNICODE_STRING lsaucs,
PLSA_OBJECT_ATTRIBUTES lsaoa,
ACCESS_MASK access,
PLSA_HANDLE lsah)
{
DPRINT1("LsaOpenPolicy - stub\n");
return STATUS_SUCCESS;
DPRINT1("LsaOpenPolicy - stub\n");
return STATUS_SUCCESS;
}
/*
* @unimplemented
*/
#define SID_REVISION (1) /* Current revision - winnt.h */
NTSTATUS
STDCALL
LsaQueryInformationPolicy(LSA_HANDLE lsah,POLICY_INFORMATION_CLASS pic,PVOID* Buffer)
@ -130,18 +130,16 @@ LsaQueryInformationPolicy(LSA_HANDLE lsah,POLICY_INFORMATION_CLASS pic,PVOID* Bu
/*
* @implemented
*/
NTSTATUS
STDCALL
LsaFreeMemory(PVOID pv)
NTSTATUS STDCALL
LsaFreeMemory (PVOID pv)
{
return RtlFreeHeap(RtlGetProcessHeap(), 0, pv);
return RtlFreeHeap(RtlGetProcessHeap(), 0, pv);
}
/*
* @unimplemented
*/
NTSTATUS
STDCALL
NTSTATUS STDCALL
LsaClose(LSA_HANDLE ObjectHandle)
{
DPRINT1("(%p):LsaClose stub\n",ObjectHandle);

View file

@ -1,4 +1,9 @@
/*
/* $Id: misc.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
* FILE: lib/advapi32/sec/misc.c
* PURPOSE: Miscellaneous security functions
*/
#define NTOS_MODE_USER
@ -93,13 +98,13 @@ MapGenericMask(PDWORD AccessMask,
/*
* @unimplemented
*/
BOOL
STDCALL
BOOL STDCALL
ImpersonateLoggedOnUser(HANDLE hToken)
{
return FALSE;
return FALSE;
}
/*
* @implemented
*/

View file

@ -1,20 +1,18 @@
/*
/* $Id: sec.c,v 1.18 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
* FILE: lib/advapi32/sec/sec.c
* PURPOSE: Registry functions
* PURPOSE: Security descriptor functions
* PROGRAMMER: Ariadne ( ariadne@xs4all.nl)
* Steven Edwards ( Steven_Ed4153@yahoo.com )
* Steven Edwards ( Steven_Ed4153@yahoo.com )
* Andrew Greenwood ( silverblade_uk@hotmail.com )
* UPDATE HISTORY:
* Created 01/11/98
* Added a few new stubs 6/27/03
* Added stubs for GetSecurityInfo/Ex 8/18/03
*/
#define NTOS_MODE_USER
#include <windows.h>
// #include <accctrl.h>
#include <ntos.h>
@ -399,130 +397,4 @@ SetSecurityDescriptorSacl (
return TRUE;
}
/*
* @unimplemented
*/
BOOL STDCALL
GetUserNameA(LPSTR lpBuffer, LPDWORD nSize)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
GetUserNameW(LPWSTR lpBuffer, LPDWORD nSize)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL
STDCALL
GetFileSecurityA (
LPCSTR lpFileName,
SECURITY_INFORMATION RequestedInformation,
PSECURITY_DESCRIPTOR pSecurityDescriptor,
DWORD nLength,
LPDWORD lpnLengthNeeded
)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL
STDCALL
GetFileSecurityW (
LPCWSTR lpFileName,
SECURITY_INFORMATION RequestedInformation,
PSECURITY_DESCRIPTOR pSecurityDescriptor,
DWORD nLength,
LPDWORD lpnLengthNeeded
)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL
STDCALL
SetFileSecurityA (
LPCSTR lpFileName,
SECURITY_INFORMATION SecurityInformation,
PSECURITY_DESCRIPTOR pSecurityDescriptor
)
{
return(FALSE);
}
/*
* @unimplemented
*/
STDCALL DWORD GetSecurityInfo (
HANDLE handle,
UINT ObjectType, // SE_OBJECT_TYPE
SECURITY_INFORMATION SecurityInfo,
PSID *ppsidOwner,
PSID *ppsidGroup,
PACL *ppDacl,
PACL *ppSacl,
PSECURITY_DESCRIPTOR *ppSecurityDescriptor
)
{
return FALSE;
}
/*
* @unimplemented
*/
STDCALL DWORD GetSecurityInfoExA(
HANDLE hObject,
UINT ObjectType, // SE_OBJECT_TYPE
SECURITY_INFORMATION SecurityInfo,
LPCSTR lpProvider,
LPCSTR lpProperty,
VOID *ppAccessList, // PACTRL_ACCESS
VOID *ppAuditList, // PACTRL_AUDIT
LPCSTR *lppOwner,
LPCSTR *lppGroup
)
{
return FALSE;
}
/*
* @unimplemented
*/
STDCALL DWORD GetSecurityInfoExW(
HANDLE hObject,
UINT ObjectType, // SE_OBJECT_TYPE
SECURITY_INFORMATION SecurityInfo,
LPCWSTR lpProvider,
LPCWSTR lpProperty,
VOID *ppAccessList, // PACTRL_ACCESS
VOID *ppAuditList, // PACTRL_AUDIT
LPWSTR *lppOwner,
LPWSTR *lppGroup
)
{
return FALSE;
}
/* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: sid.c,v 1.9 2004/01/20 01:40:19 ekohl Exp $
/* $Id: sid.c,v 1.10 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -237,68 +237,4 @@ IsValidSid(PSID pSid)
return((BOOL)RtlValidSid(pSid));
}
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountNameA(LPCSTR lpSystemName,
LPCSTR lpAccountName,
PSID Sid,
LPDWORD cbSid,
LPSTR DomainName,
LPDWORD cbDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountNameW(LPCWSTR lpSystemName,
LPCWSTR lpAccountName,
PSID Sid,
LPDWORD cbSid,
LPWSTR DomainName,
LPDWORD cbDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountSidA(LPCSTR lpSystemName,
PSID Sid,
LPSTR Name,
LPDWORD cbName,
LPSTR ReferencedDomainName,
LPDWORD cbReferencedDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountSidW(LPCWSTR lpSystemName,
PSID Sid,
LPWSTR Name,
LPDWORD cbName,
LPWSTR ReferencedDomainName,
LPDWORD cbReferencedDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: privilege.c,v 1.5 2003/07/20 15:16:32 ekohl Exp $
/* $Id: privilege.c,v 1.6 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -14,174 +14,129 @@
/**********************************************************************
* LookupPrivilegeValueA EXPORTED
* LookupPrivilegeValueW EXPORTED
*
* @implemented
*/
BOOL STDCALL LookupPrivilegeValueA (
LPCSTR lpSystemName,
LPCSTR lpName,
PLUID lpLuid
)
BOOL STDCALL
LookupPrivilegeValueA (LPCSTR lpSystemName,
LPCSTR lpName,
PLUID lpLuid)
{
BOOL rv = FALSE;
DWORD le = ERROR_SUCCESS;
UNICODE_STRING SystemName;
UNICODE_STRING Name;
BOOL Result;
ANSI_STRING SystemNameA;
UNICODE_STRING SystemNameW;
ANSI_STRING NameA;
UNICODE_STRING NameW;
/* Remote system? */
if (lpSystemName != NULL)
{
RtlCreateUnicodeStringFromAsciiz (&SystemName,
(LPSTR)lpSystemName);
}
HANDLE ProcessHeap = GetProcessHeap ();
/* Check the privilege name is not NULL */
if (lpName == NULL)
{
SetLastError (ERROR_INVALID_PARAMETER);
return FALSE;
}
RtlCreateUnicodeStringFromAsciiz (&Name,
(LPSTR)lpName);
/* Remote system? */
if (NULL != lpSystemName)
{
RtlInitAnsiString (
& SystemNameA,
(LPSTR) lpSystemName
);
RtlAnsiStringToUnicodeString (
& SystemNameW,
& SystemNameA,
TRUE
);
}
/* Check the privilege name is not NULL */
if (NULL != lpName)
{
RtlInitAnsiString (
& NameA,
(LPSTR) lpName
);
RtlAnsiStringToUnicodeString (
& NameW,
& NameA,
TRUE
);
}
else
{
SetLastError (ERROR_INVALID_PARAMETER);
return (FALSE);
}
/*
* Forward the call to the UNICODE version
* of this API.
*/
if (FALSE == (rv = LookupPrivilegeValueW (
(lpSystemName ? SystemNameW.Buffer : NULL),
NameW.Buffer,
lpLuid
)
)
)
{
le = GetLastError ();
}
/* Remote system? */
if (NULL != lpSystemName)
{
RtlFreeHeap (
ProcessHeap,
0,
SystemNameW.Buffer
);
}
/* Name */
RtlFreeHeap (
ProcessHeap,
0,
NameW.Buffer
);
/*
* Set the last error, if any reported by
* the UNICODE call.
*/
if (ERROR_SUCCESS != le)
{
SetLastError (le);
}
return (rv);
Result = LookupPrivilegeValueW ((lpSystemName != NULL) ? SystemName.Buffer : NULL,
Name.Buffer,
lpLuid);
RtlFreeUnicodeString (&Name);
/* Remote system? */
if (lpSystemName != NULL)
{
RtlFreeUnicodeString (&SystemName);
}
return Result;
}
BOOL STDCALL LookupPrivilegeValueW (
LPCWSTR lpSystemName,
LPCWSTR lpName,
PLUID lpLuid
)
/**********************************************************************
* LookupPrivilegeValueW EXPORTED
*
* @unimplemented
*/
BOOL STDCALL
LookupPrivilegeValueW (LPCWSTR lpSystemName,
LPCWSTR lpName,
PLUID lpLuid)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE);
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return FALSE;
}
/**********************************************************************
* LookupPrivilegeDisplayNameA EXPORTED
*
* @unimplemented
*/
BOOL STDCALL
LookupPrivilegeDisplayNameA (LPCSTR lpSystemName,
LPCSTR lpName,
LPSTR lpDisplayName,
LPDWORD cbDisplayName,
LPDWORD lpLanguageId)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return FALSE;
}
/**********************************************************************
* LookupPrivilegeDisplayNameW EXPORTED
*
* @unimplemented
*/
BOOL STDCALL LookupPrivilegeDisplayNameA (
LPCSTR lpSystemName,
LPCSTR lpName,
LPSTR lpDisplayName,
LPDWORD cbDisplayName,
LPDWORD lpLanguageId
)
BOOL STDCALL
LookupPrivilegeDisplayNameW (LPCWSTR lpSystemName,
LPCWSTR lpName,
LPWSTR lpDisplayName,
LPDWORD cbDisplayName,
LPDWORD lpLanguageId)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL LookupPrivilegeDisplayNameW (
LPCWSTR lpSystemName,
LPCWSTR lpName,
LPWSTR lpDisplayName,
LPDWORD cbDisplayName,
LPDWORD lpLanguageId
)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE);
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return FALSE;
}
/**********************************************************************
* LookupPrivilegeNameA EXPORTED
*
* @unimplemented
*/
BOOL STDCALL
LookupPrivilegeNameA (LPCSTR lpSystemName,
PLUID lpLuid,
LPSTR lpName,
LPDWORD cbName)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return FALSE;
}
/**********************************************************************
* LookupPrivilegeNameW EXPORTED
*
* @unimplemented
*/
BOOL STDCALL LookupPrivilegeNameA (
LPCSTR lpSystemName,
PLUID lpLuid,
LPSTR lpName,
LPDWORD cbName
)
BOOL STDCALL
LookupPrivilegeNameW (LPCWSTR lpSystemName,
PLUID lpLuid,
LPWSTR lpName,
LPDWORD cbName)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL LookupPrivilegeNameW (
LPCWSTR lpSystemName,
PLUID lpLuid,
LPWSTR lpName,
LPDWORD cbName
)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE);
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return FALSE;
}

View file

@ -1,4 +1,4 @@
/* $Id: token.c,v 1.8 2004/01/20 01:40:19 ekohl Exp $
/* $Id: token.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
@ -17,23 +17,28 @@
* @implemented
*/
BOOL STDCALL
AdjustTokenGroups (
HANDLE TokenHandle,
AdjustTokenGroups (HANDLE TokenHandle,
BOOL ResetToDefault,
PTOKEN_GROUPS NewState,
DWORD BufferLength,
PTOKEN_GROUPS PreviousState,
PDWORD ReturnLength
)
PDWORD ReturnLength)
{
NTSTATUS errCode;
errCode = NtAdjustGroupsToken(TokenHandle,ResetToDefault,NewState,
BufferLength, PreviousState, (PULONG)ReturnLength );
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
NTSTATUS Status;
Status = NtAdjustGroupsToken (TokenHandle,
ResetToDefault,
NewState,
BufferLength,
PreviousState,
(PULONG)ReturnLength);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}
@ -41,22 +46,28 @@ AdjustTokenGroups (
* @implemented
*/
BOOL STDCALL
AdjustTokenPrivileges (
HANDLE TokenHandle,
AdjustTokenPrivileges (HANDLE TokenHandle,
BOOL DisableAllPrivileges,
PTOKEN_PRIVILEGES NewState,
DWORD BufferLength,
PTOKEN_PRIVILEGES PreviousState,
PDWORD ReturnLength
)
{ NTSTATUS errCode;
errCode = NtAdjustPrivilegesToken(TokenHandle,DisableAllPrivileges,NewState,
BufferLength, PreviousState, (PULONG)ReturnLength );
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
PDWORD ReturnLength)
{
NTSTATUS Status;
Status = NtAdjustPrivilegesToken (TokenHandle,
DisableAllPrivileges,
NewState,
BufferLength,
PreviousState,
(PULONG)ReturnLength);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}
@ -64,22 +75,26 @@ AdjustTokenPrivileges (
* @implemented
*/
BOOL STDCALL
GetTokenInformation (
HANDLE TokenHandle,
GetTokenInformation (HANDLE TokenHandle,
TOKEN_INFORMATION_CLASS TokenInformationClass,
LPVOID TokenInformation,
DWORD TokenInformationLength,
PDWORD ReturnLength
)
PDWORD ReturnLength)
{
NTSTATUS errCode;
errCode = NtQueryInformationToken(TokenHandle,TokenInformationClass,TokenInformation,
TokenInformationLength, (PULONG)ReturnLength);
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
NTSTATUS Status;
Status = NtQueryInformationToken (TokenHandle,
TokenInformationClass,
TokenInformation,
TokenInformationLength,
(PULONG)ReturnLength);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}
@ -87,21 +102,24 @@ GetTokenInformation (
* @implemented
*/
BOOL STDCALL
SetTokenInformation (
HANDLE TokenHandle,
SetTokenInformation (HANDLE TokenHandle,
TOKEN_INFORMATION_CLASS TokenInformationClass,
LPVOID TokenInformation,
DWORD TokenInformationLength
)
DWORD TokenInformationLength)
{
NTSTATUS errCode;
errCode = NtSetInformationToken(TokenHandle,TokenInformationClass,TokenInformation,
TokenInformationLength);
if ( !NT_SUCCESS(errCode) ) {
SetLastError(RtlNtStatusToDosError(errCode));
return FALSE;
}
return TRUE;
NTSTATUS Status;
Status = NtSetInformationToken (TokenHandle,
TokenInformationClass,
TokenInformation,
TokenInformationLength);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE;
}
return TRUE;
}