Remove ALL stubs which might be of questionable origin.

svn path=/trunk/; revision=8369
This commit is contained in:
Eric Kohl 2004-02-25 14:25:11 +00:00
parent 5ed2e7cef1
commit 8b99b4ec5e
15 changed files with 597 additions and 3461 deletions

View file

@ -1,191 +1,93 @@
; $Id: advapi32.def,v 1.11 2003/09/12 17:51:46 vizzini Exp $ ; $Id: advapi32.def,v 1.12 2004/02/25 14:25:10 ekohl Exp $
; ;
; advapi32.def ; advapi32.def
; ;
; ReactOS Operating System ; ReactOS Operating System
; ;
; Some stack sizes are taken from Ander Norlander's .DEFs.
;
LIBRARY advapi32.dll LIBRARY advapi32.dll
EXPORTS EXPORTS
A_SHAFinal@8
A_SHAInit@4
A_SHAUpdate@12
AbortSystemShutdownA@4 AbortSystemShutdownA@4
AbortSystemShutdownW@4 AbortSystemShutdownW@4
AccessCheck@32 AccessCheck@32
AccessCheckByType@44
AccessCheckByTypeAndAuditAlarmA@64
AccessCheckByTypeAndAuditAlarmW@64
AccessCheckByTypeResultList@44
AccessCheckByTypeResultListAndAuditAlarmA@64
AccessCheckByTypeResultListAndAuditAlarmByHandleA@68
AccessCheckByTypeResultListAndAuditAlarmByHandleW@68
AccessCheckByTypeResultListAndAuditAlarmW@64
AccessCheckAndAuditAlarmA@44 AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW@44 AccessCheckAndAuditAlarmW@44
AddAccessAllowedAce@16 AddAccessAllowedAce@16
AddAccessAllowedAceEx@20 ;AddAccessAllowedAceEx@20
AddAccessAllowedObjectAce@28
AddAccessDeniedAce@16 AddAccessDeniedAce@16
AddAccessDeniedAceEx@20 ;AddAccessDeniedAceEx@20
AddAccessDeniedObjectAce@28
AddAce@20 AddAce@20
AddAuditAccessAce@24 AddAuditAccessAce@24
AddAuditAccessAceEx@28 ;AddAuditAccessAceEx@28
AddAuditAccessObjectAce@36
;@AddUsersToEncryptedFile
AdjustTokenGroups@24 AdjustTokenGroups@24
AdjustTokenPrivileges@24 AdjustTokenPrivileges@24
AllocateAndInitializeSid@44 AllocateAndInitializeSid@44
AllocateLocallyUniqueId@4 AllocateLocallyUniqueId@4
AreAllAccessesGranted@8 AreAllAccessesGranted@8
AreAnyAccessesGranted@8 AreAnyAccessesGranted@8
BackupEventLogA@8 ;BackupEventLogA@8
BackupEventLogW@8 ;BackupEventLogW@8
BuildExplicitAccessWithNameA@20 ;BuildAccessRequestA
BuildExplicitAccessWithNameW@20 ;BuildAccessRequestW
BuildImpersonateExplicitAccessWithNameA@24 ;BuildExplicitAccessWithNameA@20
BuildImpersonateExplicitAccessWithNameW@24 ;BuildExplicitAccessWithNameW@20
BuildImpersonateTrusteeA@8 ;BuildImpersonateExplicitAccessWithNameA@24
BuildImpersonateTrusteeW@8 ;BuildImpersonateExplicitAccessWithNameW@24
BuildSecurityDescriptorA@36 ;BuildImpersonateTrusteeA@8
BuildSecurityDescriptorW@36 ;BuildImpersonateTrusteeW@8
BuildTrusteeWithNameA@8 ;BuildSecurityDescriptorA@36
BuildTrusteeWithNameW@8 ;BuildSecurityDescriptorW@36
BuildTrusteeWithObjectsAndNameA@24 ;BuildTrusteeWithNameA@8
BuildTrusteeWithObjectsAndNameW@24 ;BuildTrusteeWithNameW@8
BuildTrusteeWithObjectsAndSidA@20 ;BuildTrusteeWithSidA@8
BuildTrusteeWithObjectsAndSidW@20 ;BuildTrusteeWithSidW@8
BuildTrusteeWithSidA@8
BuildTrusteeWithSidW@8
;CancelOverlappedAccess
ChangeServiceConfigA@44 ChangeServiceConfigA@44
ChangeServiceConfigW@44 ChangeServiceConfigW@44
ChangeServiceConfig2A@12 ;ClearEventLogA@8
ChangeServiceConfig2W@12 ;ClearEventLogW@8
CheckTokenMembership@12 ;CloseEventLog@4
ClearEventLogA@8
ClearEventLogW@8
;CloseCodeAuthzLevel
CloseEncryptedFileRaw@4
CloseEventLog@4
CloseServiceHandle@4 CloseServiceHandle@4
;@CloseTrace
;@CommandLineFromMsiDescriptor
;ComputeAccessTokenFromCodeAuthzLevel
;@ControlTraceA
;@ControlTraceW
ControlService@12 ControlService@12
;ConvertAccessToSecurityDescriptorA
;ConvertAccessToSecurityDescriptorW
;ConvertSDToStringSDRootDomainA
;ConvertSDToStringSDRootDomainW
;ConvertSecurityDescriptorToAccessA
;ConvertSecurityDescriptorToAccessNamedA
;ConvertSecurityDescriptorToAccessNamedW
;ConvertSecurityDescriptorToAccessW
;@ConvertSecurityDescriptorToStringSecurityDescriptorA
;@ConvertSecurityDescriptorToStringSecurityDescriptorW
;@ConvertSidToStringSidA
;@ConvertSidToStringSidW
;ConvertStringSDToSDDomainA
;ConvertStringSDToSDDomainW
;ConvertStringSDToSDRootDomainA
;ConvertStringSDToSDRootDomainW
;@ConvertStringSecurityDescriptorToSecurityDescriptorA
;@ConvertStringSecurityDescriptorToSecurityDescriptorW
;@ConvertStringSidToSidA
;@ConvertStringSidToSidW
ConvertToAutoInheritPrivateObjectSecurity@24
CopySid@12 CopySid@12
;CreateCodeAuthzLevel ;CreatePrivateObjectSecurity@24
CreatePrivateObjectSecurity@24
CreatePrivateObjectSecurityEx@32
CreatePrivateObjectSecurityWithMultipleInheritance@36
CreateProcessAsUserA@44 CreateProcessAsUserA@44
CreateProcessAsUserW@44 CreateProcessAsUserW@44
CreateProcessWithLogonW@44
CreateRestrictedToken@36
CreateServiceA@52 CreateServiceA@52
CreateServiceW@52 CreateServiceW@52
;@CreateTraceInstanceId ;CryptAcquireContextA@20
CreateWellKnownSid@16 ;CryptAcquireContextW@20
;@CredDeleteA ;CryptContextAddRef@12
;@CredDeleteW ;CryptCreateHash@20
;@CredEnumerateA ;CryptDecrypt@24
;@CredEnumerateW ;CryptDeriveKey@20
;@CredFree ;CryptDestroyHash@4
;@CredGetSessionTypes ;CryptDestroyKey@4
;@CredGetTargetInfoA ;CryptEncrypt@28
;@CredGetTargetInfoW ;CryptExportKey@24
;@CredIsMarshaledCredentialA ;CryptGenKey@16
;@CredIsMarshaledCredentialW ;CryptGenRandom@12
;@CredMarshalCredentialA ;CryptGetHashParam@20
;@CredMarshalCredentialW ;CryptGetKeyParam@20
;CredProfileLoaded ;CryptGetProvParam@20
;@CredReadA ;CryptGetUserKey@12
;@CredReadDomainCredentialsA ;CryptHashData@16
;@CredReadDomainCredentialsW ;CryptHashSessionKey@12
;@CredReadW ;CryptImportKey@24
;@CredRenameA ;CryptReleaseContext@8
;@CredRenameW ;CryptSetHashParam@16
;@CredUnmarshalCredentialA ;CryptSetKeyParam@16
;@CredUnmarshalCredentialW ;CryptSetProvParam@16
;@CredWriteA ;CryptSetProviderA@8
;@CredWriteDomainCredentialsA ;CryptSetProviderW@8
;@CredWriteDomainCredentialsW ;CryptSignHashA@24
;@CredWriteW ;CryptSignHashW@24
;CredpConvertCredential ;CryptVerifySignatureA@24
;CredpConvertTargetInfo ;CryptVerifySignatureW@24
;CredpDecodeCredential
;CredpEncodeCredential
CryptAcquireContextA@20
CryptAcquireContextW@20
CryptContextAddRef@12
CryptCreateHash@20
CryptDecrypt@24
CryptDeriveKey@20
CryptDestroyHash@4
CryptDestroyKey@4
CryptDuplicateHash@16
CryptDuplicateKey@16
CryptEncrypt@28
CryptEnumProviderTypesA@24
CryptEnumProviderTypesW@24
CryptEnumProvidersA@24
CryptEnumProvidersW@24
CryptExportKey@24
CryptGenKey@16
CryptGenRandom@12
CryptGetDefaultProviderA@20
CryptGetDefaultProviderW@20
CryptGetHashParam@20
CryptGetKeyParam@20
CryptGetProvParam@20
CryptGetUserKey@12
CryptHashData@16
CryptHashSessionKey@12
CryptImportKey@24
CryptReleaseContext@8
CryptSetHashParam@16
CryptSetKeyParam@16
CryptSetProvParam@16
CryptSetProviderA@8
CryptSetProviderW@8
CryptSetProviderExA@16
CryptSetProviderExW@16
CryptSignHashA@24
CryptSignHashW@24
CryptVerifySignatureA@24
CryptVerifySignatureW@24
DecryptFileA@8
DecryptFileW@8
DeleteAce@8 DeleteAce@8
DeleteService@4 DeleteService@4
DeregisterEventSource@4 ;DenyAccessRightsA
DestroyPrivateObjectSecurity@4 ;DenyAccessRightsW
;@DuplicateEncryptionInfoFile ;DeregisterEventSource@4
;DestroyPrivateObjectSecurity@4
DuplicateToken@12 DuplicateToken@12
DuplicateTokenEx@24 DuplicateTokenEx@24
;ElfBackupEventLogFileA@8 ;ElfBackupEventLogFileA@8
@ -207,78 +109,53 @@ DuplicateTokenEx@24
;ElfRegisterEventSourceW@12 ;ElfRegisterEventSourceW@12
;ElfReportEventA@48 ;ElfReportEventA@48
;ElfReportEventW@48 ;ElfReportEventW@48
;@EnableTrace
EncryptFileA@4
EncryptFileW@4
;EncryptedFileKeyInfo
;@EncryptionDisable
EnumDependentServicesA@24 EnumDependentServicesA@24
EnumDependentServicesW@24 EnumDependentServicesW@24
EnumServiceGroupW@36 EnumServiceGroupW@36
EnumServicesStatusA@32 EnumServicesStatusA@32
EnumServicesStatusExA@40
EnumServicesStatusExW@40
EnumServicesStatusW@32 EnumServicesStatusW@32
;@EnumerateTraceGuids
EqualDomainSid@12
EqualPrefixSid@8 EqualPrefixSid@8
EqualSid@8 EqualSid@8
FileEncryptionStatusA@8
FileEncryptionStatusW@8
FindFirstFreeAce@8 FindFirstFreeAce@8
;@FlushTraceA
;@FlushTraceW
;FreeEncryptedFileKeyInfo
;@FreeEncryptionCertificateHashList
FreeInheritedFromArray@12
FreeSid@4 FreeSid@4
;GetAccessPermissionsForObjectA
;GetAccessPermissionsForObjectW
GetAce@12 GetAce@12
GetAclInformation@16 GetAclInformation@16
GetAuditedPermissionsFromAclA@16 ;GetAuditedPermissionsFromAclA@16
GetAuditedPermissionsFromAclW@16 ;GetAuditedPermissionsFromAclW@16
GetCurrentHwProfileA@4 ;GetAuditedPermissionsFromSDA
GetCurrentHwProfileW@4 ;GetAuditedPermissionsFromSDW
GetEffectiveRightsFromAclA@12 ;GetCurrentHwProfileA@4
GetEffectiveRightsFromAclW@12 ;GetCurrentHwProfileW@4
GetEventLogInformation@20 ;GetEffectiveAccessRightsA
GetExplicitEntriesFromAclA@12 ;GetEffectiveAccessRightsW
GetExplicitEntriesFromAclW@12 ;GetEffectiveRightsFromAclA@12
GetFileSecurityA@20 ;GetEffectiveRightsFromAclW@12
GetFileSecurityW@20 ;GetEffectiveRightsFromSDA@12
;GetInformationCodeAuthzLevelW ;GetEffectiveRightsFromSDW@12
;GetInformationCodeAuthzPolicyW ;GetExplicitAccessRightsA
GetInheritanceSourceA@40 ;GetExplicitAccessRightsW
GetInheritanceSourceW@40 ;GetExplicitEntriesFromAclA@12
;GetExplicitEntriesFromAclW@12
;GetFileSecurityA@20
;GetFileSecurityW@20
GetKernelObjectSecurity@20 GetKernelObjectSecurity@20
GetLengthSid@4 GetLengthSid@4
;@GetLocalManagedApplicationData ;GetMultipleTrusteeA@4
;@GetLocalManagedApplications ;GetMultipleTrusteeOperationA@4
;@GetManagedApplicationCategories ;GetMultipleTrusteeOperationW@4
;@GetManagedApplications ;GetMultipleTrusteeW@4
GetMultipleTrusteeA@4 ;GetNamedSecurityInfoA@32
GetMultipleTrusteeOperationA@4 ;GetNamedSecurityInfoW@32
GetMultipleTrusteeOperationW@4 ;GetNumberOfEventLogRecords@8
GetMultipleTrusteeW@4 ;GetOldestEventLogRecord@8
GetNamedSecurityInfoA@32 ;GetPrivateObjectSecurity@20
;GetNamedSecurityInfoExA
;GetNamedSecurityInfoExW
GetNamedSecurityInfoW@32
GetNumberOfEventLogRecords@8
GetOldestEventLogRecord@8
;GetOverlappedAccessResults
GetPrivateObjectSecurity@20
GetSecurityDescriptorControl@12 GetSecurityDescriptorControl@12
GetSecurityDescriptorDacl@16 GetSecurityDescriptorDacl@16
GetSecurityDescriptorGroup@12 GetSecurityDescriptorGroup@12
GetSecurityDescriptorLength@4 GetSecurityDescriptorLength@4
GetSecurityDescriptorOwner@12 GetSecurityDescriptorOwner@12
GetSecurityDescriptorRMControl@8
GetSecurityDescriptorSacl@16 GetSecurityDescriptorSacl@16
GetSecurityInfo@32 ;GetSecurityInfo@32
GetSecurityInfoExA@36
GetSecurityInfoExW@36
GetServiceDisplayNameA@16 GetServiceDisplayNameA@16
GetServiceDisplayNameW@16 GetServiceDisplayNameW@16
GetServiceKeyNameA@16 GetServiceKeyNameA@16
@ -288,52 +165,33 @@ GetSidLengthRequired@4
GetSidSubAuthority@8 GetSidSubAuthority@8
GetSidSubAuthorityCount@4 GetSidSubAuthorityCount@4
GetTokenInformation@20 GetTokenInformation@20
;@GetTraceEnableFlags ;GetTrusteeNameA@4
;@GetTraceEnableLevel ;GetTrusteeNameW@4
;@GetTraceLoggerHandle ;GetTrusteeTypeA@4
GetTrusteeFormA@4 ;GetTrusteeTypeW@4
GetTrusteeFormW@4 ;GetUserNameA@8
GetTrusteeNameA@4 ;GetUserNameW@8
GetTrusteeNameW@4 ;GrantAccessRightsA@16
GetTrusteeTypeA@4 ;GrantAccessRightsW@16
GetTrusteeTypeW@4
GetUserNameA@8
GetUserNameW@8
GetWindowsAccountDomainSid@12
GrantAccessRightsA@16
GrantAccessRightsW@16
;I_ScGetCurrentGroupStateW@12 ;I_ScGetCurrentGroupStateW@12
;I_ScIsSecurityProcess
;I_ScPnPGetServiceName
;I_ScSendTSMessage
;I_ScSetServiceBitsA@20 ;I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW@20 ;I_ScSetServiceBitsW@20
;IdentifyCodeAuthzLevelW ;ImpersonateLoggedOnUser@4
ImpersonateAnonymousToken@4 ;ImpersonateNamedPipeClient@4
ImpersonateLoggedOnUser@4
ImpersonateNamedPipeClient@4
ImpersonateSelf@4 ImpersonateSelf@4
InitializeAcl@12 InitializeAcl@12
InitializeSecurityDescriptor@8 InitializeSecurityDescriptor@8
InitializeSid@12 InitializeSid@12
InitiateSystemShutdownA@20 InitiateSystemShutdownA@20
InitiateSystemShutdownExA@24
InitiateSystemShutdownExW@24
InitiateSystemShutdownW@20 InitiateSystemShutdownW@20
;@InstallApplication ;IsAccessPermittedA@20
IsAccessPermittedA@20 ;IsAccessPermittedW@20
IsAccessPermittedW@20 ;IsTextUnicode@12
IsTextUnicode@12
IsTokenRestricted@4
IsTokenUntrusted@4
IsWellKnownSid@8
IsValidAcl@4 IsValidAcl@4
IsValidSecurityDescriptor@4 IsValidSecurityDescriptor@4
IsValidSid@4 IsValidSid@4
LockServiceDatabase@4 LockServiceDatabase@4
LogonUserA@24 LogonUserA@24
LogonUserExA@40
LogonUserExW@40
LogonUserW@24 LogonUserW@24
LookupAccountNameA@28 LookupAccountNameA@28
LookupAccountNameW@28 LookupAccountNameW@28
@ -345,84 +203,61 @@ LookupPrivilegeNameA@16
LookupPrivilegeNameW@16 LookupPrivilegeNameW@16
LookupPrivilegeValueA@12 LookupPrivilegeValueA@12
LookupPrivilegeValueW@12 LookupPrivilegeValueW@12
LookupSecurityDescriptorPartsA@28 ;LookupSecurityDescriptorPartsA@28
LookupSecurityDescriptorPartsW@28 ;LookupSecurityDescriptorPartsW@28
LsaAddAccountRights@16 ;LsaAddAccountRights@16
;LsaAddPrivilegesToAccount@8 ;LsaAddPrivilegesToAccount@8
;LsaClearAuditLog@4 ;LsaClearAuditLog@4
LsaClose@4 ;LsaClose@4
;LsaCreateAccount@16 ;LsaCreateAccount@16
;LsaCreateSecret@16 ;LsaCreateSecret@16
;LsaCreateTrustedDomain@16 ;LsaCreateTrustedDomain@16
LsaCreateTrustedDomainEx@20
;LsaDelete@4 ;LsaDelete@4
LsaDeleteTrustedDomain@8 ;LsaDeleteTrustedDomain@8
LsaEnumerateAccountRights@16 ;LsaEnumerateAccountRights@16
;LsaEnumerateAccounts@20 ;LsaEnumerateAccounts@20
LsaEnumerateAccountsWithUserRight@16 ;LsaEnumerateAccountsWithUserRight@16
;LsaEnumeratePrivileges@20 ;LsaEnumeratePrivileges@20
;LsaEnumeratePrivilegesOfAccount@8 ;LsaEnumeratePrivilegesOfAccount@8
LsaEnumerateTrustedDomains@20 ;LsaEnumerateTrustedDomains@20
LsaEnumerateTrustedDomainsEx@20 ;LsaFreeMemory@4
LsaFreeMemory@4
;LsaGetQuotasForAccount@8 ;LsaGetQuotasForAccount@8
;LsaGetRemoteUserName
;LsaGetSystemAccessAccount@8 ;LsaGetSystemAccessAccount@8
;LsaGetUserName@8 ;LsaGetUserName@8
;LsaICLookupNames@32 ;LsaICLookupNames@32
;LsaICLookupNamesWithCreds
;LsaICLookupSids@32 ;LsaICLookupSids@32
;LsaICLookupSidsWithCreds ;LsaLookupNames@20
LsaLookupNames@20
LsaLookupNames2@24
;LsaLookupPrivilegeDisplayName@16 ;LsaLookupPrivilegeDisplayName@16
;LsaLookupPrivilegeName@12 ;LsaLookupPrivilegeName@12
;LsaLookupPrivilegeValue@12 ;LsaLookupPrivilegeValue@12
LsaLookupSids@20 ;LsaLookupSids@20
LsaNtStatusToWinError@4 ;LsaNtStatusToWinError@4
;LsaOpenAccount@16 ;LsaOpenAccount@16
LsaOpenPolicy@16 ;LsaOpenPolicy@16
;LsaOpenPolicySce
;LsaOpenSecret@16 ;LsaOpenSecret@16
;LsaOpenTrustedDomain@16 ;LsaOpenTrustedDomain@16
LsaOpenTrustedDomainByName@16 ;LsaQueryInfoTrustedDomain
LsaQueryDomainInformationPolicy@12 ;LsaQueryInformationPolicy@12
LsaQueryForestTrustInformation@12
LsaQueryInformationPolicy@12
;LsaQueryInfoTrustedDomain@12
LsaQueryTrustedDomainInfoByName@16
;LsaQuerySecret@20 ;LsaQuerySecret@20
;LsaQuerySecurityObject@12 ;LsaQuerySecurityObject@12
LsaQueryTrustedDomainInfo@16 ;LsaQueryTrustedDomainInfo@16
LsaRemoveAccountRights@20 ;LsaRemoveAccountRights@20
;LsaRemovePrivilegesFromAccount@12 ;LsaRemovePrivilegesFromAccount@12
;LsaRetrievePrivateData@12 ;LsaRetrievePrivateData@12
LsaSetDomainInformationPolicy@12 ;LsaSetInformationPolicy@12
LsaSetInformationPolicy@12
;LsaSetInformationTrustedDomain@12 ;LsaSetInformationTrustedDomain@12
LsaSetForestTrustInformation@20
LsaSetTrustedDomainInfoByName@16
;LsaSetQuotasForAccount@8 ;LsaSetQuotasForAccount@8
;LsaSetSecret@12 ;LsaSetSecret@12
;LsaSetSecurityObject@12 ;LsaSetSecurityObject@12
;LsaSetSystemAccessAccount@8 ;LsaSetSystemAccessAccount@8
LsaSetTrustedDomainInformation@16 ;LsaSetTrustedDomainInformation@16
LsaStorePrivateData@12 ;LsaStorePrivateData@12
MakeAbsoluteSD@44 MakeAbsoluteSD@44
MakeSelfRelativeSD@12 MakeSelfRelativeSD@12
MapGenericMask@8 MapGenericMask@8
MD4Final@4 ;NTAccessMaskToProvAccessRights@12
MD4Init@4 ;NotifyBootConfigStatus@4
MD4Update@12 ;NotifyChangeEventLog@8
MD5Final@4
MD5Init@4
MD5Update@12
;@MSChapSrvChangePassword
;@MSChapSrvChangePassword2
MakeAbsoluteSD2@8
NTAccessMaskToProvAccessRights@12
NotifyBootConfigStatus@4
NotifyChangeEventLog@8
ObjectCloseAuditAlarmA@12 ObjectCloseAuditAlarmA@12
ObjectCloseAuditAlarmW@12 ObjectCloseAuditAlarmW@12
ObjectDeleteAuditAlarmA@12 ObjectDeleteAuditAlarmA@12
@ -431,44 +266,29 @@ ObjectOpenAuditAlarmA@48
ObjectOpenAuditAlarmW@48 ObjectOpenAuditAlarmW@48
ObjectPrivilegeAuditAlarmA@24 ObjectPrivilegeAuditAlarmA@24
ObjectPrivilegeAuditAlarmW@24 ObjectPrivilegeAuditAlarmW@24
OpenBackupEventLogA@8 ;OpenBackupEventLogA@8
OpenBackupEventLogW@8 ;OpenBackupEventLogW@8
OpenEncryptedFileRawA@12 ;OpenEventLogA@8
OpenEncryptedFileRawW@12 ;OpenEventLogW@8
OpenEventLogA@8
OpenEventLogW@8
OpenProcessToken@12 OpenProcessToken@12
OpenSCManagerA@12 OpenSCManagerA@12
OpenSCManagerW@12 OpenSCManagerW@12
OpenServiceA@12 OpenServiceA@12
OpenServiceW@12 OpenServiceW@12
OpenThreadToken@16 OpenThreadToken@16
;@OpenTraceA
;@OpenTraceW
PrivilegeCheck@12 PrivilegeCheck@12
PrivilegedServiceAuditAlarmA@20 PrivilegedServiceAuditAlarmA@20
PrivilegedServiceAuditAlarmW@20 PrivilegedServiceAuditAlarmW@20
;ProcessIdleTasks ;ProvAccessRightsToNTAccessMask
;@ProcessTrace
;@QueryAllTracesA
;@QueryAllTracesW
;@QueryRecoveryAgentsOnEncryptedFile
QueryServiceConfigA@16 QueryServiceConfigA@16
QueryServiceConfigW@16 QueryServiceConfigW@16
QueryServiceConfig2A@20
QueryServiceConfig2W@20
QueryServiceLockStatusA@16 QueryServiceLockStatusA@16
QueryServiceLockStatusW@16 QueryServiceLockStatusW@16
QueryServiceObjectSecurity@20 QueryServiceObjectSecurity@20
QueryServiceStatus@8 QueryServiceStatus@8
QueryServiceStatusEx@20 ;QueryWindows31FilesMigration@4
;@QueryTraceA ;ReadEventLogA@28
;@QueryTraceW ;ReadEventLogW@28
;@QueryUsersOnEncryptedFile
QueryWindows31FilesMigration@4
ReadEncryptedFileRaw@12
ReadEventLogA@28
ReadEventLogW@28
RegCloseKey@4 RegCloseKey@4
RegConnectRegistryA@12 RegConnectRegistryA@12
RegConnectRegistryW@12 RegConnectRegistryW@12
@ -480,7 +300,6 @@ RegDeleteKeyA@8
RegDeleteKeyW@8 RegDeleteKeyW@8
RegDeleteValueA@8 RegDeleteValueA@8
RegDeleteValueW@8 RegDeleteValueW@8
RegDisablePredefinedCache@0
RegEnumKeyA@16 RegEnumKeyA@16
RegEnumKeyExA@32 RegEnumKeyExA@32
RegEnumKeyExW@32 RegEnumKeyExW@32
@ -492,13 +311,10 @@ RegGetKeySecurity@16
RegLoadKeyA@12 RegLoadKeyA@12
RegLoadKeyW@12 RegLoadKeyW@12
RegNotifyChangeKeyValue@20 RegNotifyChangeKeyValue@20
RegOpenCurrentUser@8
RegOpenKeyA@12 RegOpenKeyA@12
RegOpenKeyExA@20 RegOpenKeyExA@20
RegOpenKeyExW@20 RegOpenKeyExW@20
RegOpenKeyW@12 RegOpenKeyW@12
RegOpenUserClassesRoot@16
RegOverridePredefKey@8
RegQueryInfoKeyA@48 RegQueryInfoKeyA@48
RegQueryInfoKeyW@48 RegQueryInfoKeyW@48
RegQueryMultipleValuesA@20 RegQueryMultipleValuesA@20
@ -512,8 +328,6 @@ RegReplaceKeyW@16
RegRestoreKeyA@12 RegRestoreKeyA@12
RegRestoreKeyW@12 RegRestoreKeyW@12
RegSaveKeyA@12 RegSaveKeyA@12
RegSaveKeyExA@16
RegSaveKeyExW@16
RegSaveKeyW@12 RegSaveKeyW@12
RegSetKeySecurity@12 RegSetKeySecurity@12
RegSetValueA@20 RegSetValueA@20
@ -522,82 +336,40 @@ RegSetValueExW@24
RegSetValueW@20 RegSetValueW@20
RegUnLoadKeyA@8 RegUnLoadKeyA@8
RegUnLoadKeyW@8 RegUnLoadKeyW@8
RegisterEventSourceA@8 ;RegisterEventSourceA@8
RegisterEventSourceW@8 ;RegisterEventSourceW@8
;RegisterIdleTask
RegisterServiceCtrlHandlerA@8 RegisterServiceCtrlHandlerA@8
RegisterServiceCtrlHandlerExA@12
RegisterServiceCtrlHandlerExW@12
RegisterServiceCtrlHandlerW@8 RegisterServiceCtrlHandlerW@8
;@RegisterTraceGuidsA ;ReplaceAllAccessRightsA
;@RegisterTraceGuidsW ;ReplaceAllAccessRightsW
;@RemoveTraceCallback ;ReportEventA@36
;@RemoveUsersFromEncryptedFile ;ReportEventW@36
ReportEventA@36
ReportEventW@36
RevertToSelf@0 RevertToSelf@0
RevokeExplicitAccessRightsA@16 ;RevokeExplicitAccessRightsA@16
RevokeExplicitAccessRightsW@16 ;RevokeExplicitAccessRightsW@16
;@SaferCloseLevel ;SetAccessRightsA@16
;@SaferComputeTokenFromLevel ;SetAccessRightsW@16
;@SaferCreateLevel
;@SaferGetLevelInformation
;@SaferGetPolicyInformation
;@SaferIdentifyLevel
;@SaferRecordEventLogEntry
;@SaferSetLevelInformation
;@SaferSetPolicyInformation
;SaferiChangeRegistryScope
;SaferiCompareTokenLevels
;@SaferiIsExecutableFileType
;SaferiPopulateDefaultsInRegistry
;SaferiRecordEventLogEntry
;SaferiReplaceProcessThreadTokens
;SaferiSearchMatchingHashRules
SetAccessRightsA@16
SetAccessRightsW@16
SetAclInformation@16 SetAclInformation@16
;SetEntriesInAccessListA ;SetEntriesInAclA@16
;SetEntriesInAccessListW ;SetEntriesInAclW@16
SetEntriesInAclA@16
SetEntriesInAclW@16
;SetEntriesInAuditListA
;SetEntriesInAuditListW
SetFileSecurityA@12
SetFileSecurityW@12
SetKernelObjectSecurity@12 SetKernelObjectSecurity@12
;SetInformationCodeAuthzLevelW ;SetNamedSecurityInfoA@28
;SetInformationCodeAuthzPolicyW ;SetNamedSecurityInfoW@28
SetNamedSecurityInfoA@28 ;SetPrivateObjectSecurity@20
;SetNamedSecurityInfoExA
;SetNamedSecurityInfoExW
SetNamedSecurityInfoW@28
SetPrivateObjectSecurity@20
SetPrivateObjectSecurityEx@24
SetSecurityDescriptorControl@12
SetSecurityDescriptorDacl@16 SetSecurityDescriptorDacl@16
SetSecurityDescriptorGroup@12 SetSecurityDescriptorGroup@12
SetSecurityDescriptorOwner@12 SetSecurityDescriptorOwner@12
SetSecurityDescriptorRMControl@8
SetSecurityDescriptorSacl@16 SetSecurityDescriptorSacl@16
SetSecurityInfo@28 ;SetSecurityInfo@28
;SetSecurityInfoExA
;SetSecurityInfoExW
SetServiceBits@16 SetServiceBits@16
SetServiceObjectSecurity@12 SetServiceObjectSecurity@12
SetServiceStatus@8 SetServiceStatus@8
SetThreadToken@8 SetThreadToken@8
SetTokenInformation@16 SetTokenInformation@16
;@SetTraceCallback
;@SetUserFileEncryptionKey
StartServiceA@12 StartServiceA@12
StartServiceCtrlDispatcherA@4 StartServiceCtrlDispatcherA@4
StartServiceCtrlDispatcherW@4 StartServiceCtrlDispatcherW@4
StartServiceW@12 StartServiceW@12
;@StartTraceA
;@StartTraceW
;@StopTraceA
;@StopTraceW
;SynchronizeWindows31FilesAndWindowsNTRegistry@16 ;SynchronizeWindows31FilesAndWindowsNTRegistry@16
SystemFunction001@12 SystemFunction001@12
SystemFunction002@12 SystemFunction002@12
@ -634,59 +406,5 @@ SystemFunction032@8
SystemFunction033@8 SystemFunction033@8
SystemFunction034@8 SystemFunction034@8
SystemFunction035@8 SystemFunction035@8
;SystemFunction036
;SystemFunction040
;SystemFunction041
;@TraceEvent
;@TraceEventInstance
;@TraceMessage
;@TraceMessageVa
TreeResetNamedSecurityInfoA@44
TreeResetNamedSecurityInfoW@44
;TrusteeAccessToObjectA
;TrusteeAccessToObjectW
;@UninstallApplication
UnlockServiceDatabase@4 UnlockServiceDatabase@4
;UnregisterIdleTask ; EOF
;@UnregisterTraceGuids
;@UpdateTraceA
;@UpdateTraceW
;WdmWmiServiceMain
;WmiCloseBlock
;WmiCloseTraceWithCursor
;WmiConvertTimestamp
;WmiDevInstToInstanceNameA
;WmiDevInstToInstanceNameW
;WmiEnumerateGuids
;WmiExecuteMethodA
;WmiExecuteMethodW
;WmiFileHandleToInstanceNameA
;WmiFileHandleToInstanceNameW
;WmiFreeBuffer
;WmiGetFirstTraceOffset
;WmiGetNextEvent
;WmiGetTraceHeader
;WmiMofEnumerateResourcesA
;WmiMofEnumerateResourcesW
;WmiNotificationRegistrationA
;WmiNotificationRegistrationW
;WmiOpenBlock
;WmiOpenTraceWithCursor
;WmiParseTraceEvent
;WmiQueryAllDataA
;WmiQueryAllDataMultipleA
;WmiQueryAllDataMultipleW
;WmiQueryAllDataW
;WmiQueryGuidInformation
;WmiQuerySingleInstanceA
;WmiQuerySingleInstanceMultipleA
;WmiQuerySingleInstanceMultipleW
;WmiQuerySingleInstanceW
;WmiReceiveNotificationsA
;WmiReceiveNotificationsW
;WmiSetSingleInstanceA
;WmiSetSingleInstanceW
;WmiSetSingleItemA
;WmiSetSingleItemW
Wow64Win32ApiEntry@12
WriteEncryptedFileRaw@12

View file

@ -1,191 +1,89 @@
; $Id: advapi32.edf,v 1.27 2003/10/12 09:39:44 hbirr Exp $ ; $Id: advapi32.edf,v 1.28 2004/02/25 14:25:10 ekohl Exp $
; ;
; advapi32.edf ; advapi32.edf
; ;
; ReactOS Operating System ; ReactOS Operating System
; ;
; Some stack sizes are taken from Ander Norlander's .DEFs.
;
LIBRARY advapi32.dll LIBRARY advapi32.dll
EXPORTS EXPORTS
A_SHAFinal=A_SHAFinal@8
A_SHAInit=A_SHAInit@4
A_SHAUpdate=A_SHAUpdate@12
AbortSystemShutdownA=AbortSystemShutdownA@4 AbortSystemShutdownA=AbortSystemShutdownA@4
AbortSystemShutdownW=AbortSystemShutdownW@4 AbortSystemShutdownW=AbortSystemShutdownW@4
AccessCheck=AccessCheck@32 AccessCheck=AccessCheck@32
AccessCheckAndAuditAlarmA=AccessCheckAndAuditAlarmA@44 AccessCheckAndAuditAlarmA=AccessCheckAndAuditAlarmA@44
AccessCheckAndAuditAlarmW=AccessCheckAndAuditAlarmW@44 AccessCheckAndAuditAlarmW=AccessCheckAndAuditAlarmW@44
AccessCheckByType=AccessCheckByType@44
AccessCheckByTypeAndAuditAlarmA=AccessCheckByTypeAndAuditAlarmA@64
AccessCheckByTypeAndAuditAlarmW=AccessCheckByTypeAndAuditAlarmW@64
AccessCheckByTypeResultList=AccessCheckByTypeResultList@44
AccessCheckByTypeResultListAndAuditAlarmA=AccessCheckByTypeResultListAndAuditAlarmA@64
AccessCheckByTypeResultListAndAuditAlarmByHandleA=AccessCheckByTypeResultListAndAuditAlarmByHandleA@68
AccessCheckByTypeResultListAndAuditAlarmByHandleW=AccessCheckByTypeResultListAndAuditAlarmByHandleW@68
AccessCheckByTypeResultListAndAuditAlarmW=AccessCheckByTypeResultListAndAuditAlarmW@64
AddAccessAllowedAce=AddAccessAllowedAce@16 AddAccessAllowedAce=AddAccessAllowedAce@16
AddAccessAllowedAceEx=AddAccessAllowedAceEx@20
AddAccessAllowedObjectAce=AddAccessAllowedObjectAce@28
AddAccessDeniedAce=AddAccessDeniedAce@16 AddAccessDeniedAce=AddAccessDeniedAce@16
AddAccessDeniedAceEx=AddAccessDeniedAceEx@20
AddAccessDeniedObjectAce=AddAccessDeniedObjectAce@28
AddAce=AddAce@20 AddAce=AddAce@20
AddAuditAccessAce=AddAuditAccessAce@24 AddAuditAccessAce=AddAuditAccessAce@24
AddAuditAccessAceEx=AddAuditAccessAceEx@28
AddAuditAccessObjectAce=AddAuditAccessObjectAce@36
;AddUsersToEncryptedFile
AdjustTokenGroups=AdjustTokenGroups@24 AdjustTokenGroups=AdjustTokenGroups@24
AdjustTokenPrivileges=AdjustTokenPrivileges@24 AdjustTokenPrivileges=AdjustTokenPrivileges@24
AllocateAndInitializeSid=AllocateAndInitializeSid@44 AllocateAndInitializeSid=AllocateAndInitializeSid@44
AllocateLocallyUniqueId=AllocateLocallyUniqueId@4 AllocateLocallyUniqueId=AllocateLocallyUniqueId@4
AreAllAccessesGranted=AreAllAccessesGranted@8 AreAllAccessesGranted=AreAllAccessesGranted@8
AreAnyAccessesGranted=AreAnyAccessesGranted@8 AreAnyAccessesGranted=AreAnyAccessesGranted@8
BackupEventLogA=BackupEventLogA@8 ;BackupEventLogA=BackupEventLogA@8
BackupEventLogW=BackupEventLogW@8 ;BackupEventLogW=BackupEventLogW@8
BuildExplicitAccessWithNameA=BuildExplicitAccessWithNameA@20 ;BuildAccessRequestA
BuildExplicitAccessWithNameW=BuildExplicitAccessWithNameW@20 ;BuildAccessRequestW
BuildImpersonateExplicitAccessWithNameA=BuildImpersonateExplicitAccessWithNameA@24 ;BuildExplicitAccessWithNameA=BuildExplicitAccessWithNameA@20
BuildImpersonateExplicitAccessWithNameW=BuildImpersonateExplicitAccessWithNameW@24 ;BuildExplicitAccessWithNameW=BuildExplicitAccessWithNameW@20
BuildImpersonateTrusteeA=BuildImpersonateTrusteeA@8 ;BuildImpersonateExplicitAccessWithNameA=BuildImpersonateExplicitAccessWithNameA@24
BuildImpersonateTrusteeW=BuildImpersonateTrusteeW@8 ;BuildImpersonateExplicitAccessWithNameW=BuildImpersonateExplicitAccessWithNameW@24
BuildSecurityDescriptorA=BuildSecurityDescriptorA@36 ;BuildImpersonateTrusteeA=BuildImpersonateTrusteeA@8
BuildSecurityDescriptorW=BuildSecurityDescriptorW@36 ;BuildImpersonateTrusteeW=BuildImpersonateTrusteeW@8
BuildTrusteeWithNameA=BuildTrusteeWithNameA@8 ;BuildSecurityDescriptorA=BuildSecurityDescriptorA@36
BuildTrusteeWithNameW=BuildTrusteeWithNameW@8 ;BuildSecurityDescriptorW=BuildSecurityDescriptorW@36
BuildTrusteeWithObjectsAndNameA=BuildTrusteeWithObjectsAndNameA@24 ;BuildTrusteeWithNameA=BuildTrusteeWithNameA@8
BuildTrusteeWithObjectsAndNameW=BuildTrusteeWithObjectsAndNameW@24 ;BuildTrusteeWithNameW=BuildTrusteeWithNameW@8
BuildTrusteeWithObjectsAndSidA=BuildTrusteeWithObjectsAndSidA@20 ;BuildTrusteeWithSidA=BuildTrusteeWithSidA@8
BuildTrusteeWithObjectsAndSidW=BuildTrusteeWithObjectsAndSidA@20 ;BuildTrusteeWithSidW=BuildTrusteeWithSidW@8
BuildTrusteeWithSidA=BuildTrusteeWithSidA@8
BuildTrusteeWithSidW=BuildTrusteeWithSidW@8
;CancelOverlappedAccess
ChangeServiceConfigA=ChangeServiceConfigA@44 ChangeServiceConfigA=ChangeServiceConfigA@44
ChangeServiceConfigW=ChangeServiceConfigW@44 ChangeServiceConfigW=ChangeServiceConfigW@44
ChangeServiceConfig2A=ChangeServiceConfig2A@12 ;ClearEventLogA=ClearEventLogA@8
ChangeServiceConfig2W=ChangeServiceConfig2W@12 ;ClearEventLogW=ClearEventLogW@8
CheckTokenMembership=CheckTokenMembership@12 ;CloseEventLog=CloseEventLog@4
ClearEventLogA=ClearEventLogA@8
ClearEventLogW=ClearEventLogW@8
;CloseCodeAuthzLevel
CloseEncryptedFileRaw=CloseEncryptedFileRaw@4
CloseEventLog=CloseEventLog@4
CloseServiceHandle=CloseServiceHandle@4 CloseServiceHandle=CloseServiceHandle@4
;CloseTrace
;CommandLineFromMsiDescriptor
;ComputeAccessTokenFromCodeAuthzLevel
;ControlTraceA
;ControlTraceW
ControlService=ControlService@12 ControlService=ControlService@12
;ConvertAccessToSecurityDescriptorA
;ConvertAccessToSecurityDescriptorW
;ConvertSDToStringSDRootDomainA
;ConvertSDToStringSDRootDomainW
;ConvertSecurityDescriptorToAccessA
;ConvertSecurityDescriptorToAccessNamedA
;ConvertSecurityDescriptorToAccessNamedW
;ConvertSecurityDescriptorToAccessW
;ConvertSecurityDescriptorToStringSecurityDescriptorA
;ConvertSecurityDescriptorToStringSecurityDescriptorW
;ConvertSidToStringSidA
;ConvertSidToStringSidW
;ConvertStringSDToSDDomainA
;ConvertStringSDToSDDomainW
;ConvertStringSDToSDRootDomainA
;ConvertStringSDToSDRootDomainW
;ConvertStringSecurityDescriptorToSecurityDescriptorA
;ConvertStringSecurityDescriptorToSecurityDescriptorW
;ConvertStringSidToSidA
;ConvertStringSidToSidW
ConvertToAutoInheritPrivateObjectSecurity=ConvertToAutoInheritPrivateObjectSecurity@24
CopySid=CopySid@12 CopySid=CopySid@12
;CreateCodeAuthzLevel ;CreatePrivateObjectSecurity=CreatePrivateObjectSecurity@24
CreatePrivateObjectSecurity=CreatePrivateObjectSecurity@24
CreatePrivateObjectSecurityEx=CreatePrivateObjectSecurityEx@32
CreatePrivateObjectSecurityWithMultipleInheritance=CreatePrivateObjectSecurityWithMultipleInheritance@36
CreateProcessAsUserA=CreateProcessAsUserA@44 CreateProcessAsUserA=CreateProcessAsUserA@44
CreateProcessAsUserW=CreateProcessAsUserW@44 CreateProcessAsUserW=CreateProcessAsUserW@44
CreateProcessWithLogonW=CreateProcessWithLogonW@44
CreateRestrictedToken=CreateRestrictedToken@36
CreateServiceA=CreateServiceA@52 CreateServiceA=CreateServiceA@52
CreateServiceW=CreateServiceW@52 CreateServiceW=CreateServiceW@52
;CreateTraceInstanceId ;CryptAcquireContextA=CryptAcquireContextA@20
CreateWellKnownSid=CreateWellKnownSid@16 ;CryptAcquireContextW=CryptAcquireContextW@20
;CredDeleteA ;CryptCreateHash=CryptCreateHash@20
;CredDeleteW ;CryptDecrypt=CryptDecrypt@24
;CredEnumerateA ;CryptDeriveKey=CryptDeriveKey@20
;CredEnumerateW ;CryptDestroyHash=CryptDestroyHash@4
;CredFree ;CryptDestroyKey=CryptDestroyKey@4
;CredGetSessionTypes ;CryptEncrypt=CryptEncrypt@28
;CredGetTargetInfoA ;CryptExportKey=CryptExportKey@24
;CredGetTargetInfoW ;CryptGenKey=CryptGenKey@16
;CredIsMarshaledCredentialA ;CryptGenRandom=CryptGenRandom@12
;CredIsMarshaledCredentialW ;CryptGetHashParam=CryptGetHashParam@20
;CredMarshalCredentialA ;CryptGetKeyParam=CryptGetKeyParam@20
;CredMarshalCredentialW ;CryptGetProvParam=CryptGetProvParam@20
;CredProfileLoaded ;CryptGetUserKey=CryptGetUserKey@12
;CredReadA ;CryptHashData=CryptHashData@16
;CredReadDomainCredentialsA ;CryptHashSessionKey=CryptHashSessionKey@12
;CredReadDomainCredentialsW ;CryptImportKey=CryptImportKey@24
;CredReadW ;CryptReleaseContext=CryptReleaseContext@8
;CredRenameA ;CryptSetHashParam=CryptSetHashParam@16
;CredRenameW ;CryptSetKeyParam=CryptSetKeyParam@16
;CredUnmarshalCredentialA ;CryptSetProvParam=CryptSetProvParam@16
;CredUnmarshalCredentialW ;CryptSetProviderA=CryptSetProviderA@8
;CredWriteA ;CryptSetProviderW=CryptSetProviderW@8
;CredWriteDomainCredentialsA ;CryptSignHashA=CryptSignHashA@24
;CredWriteDomainCredentialsW ;CryptSignHashW=CryptSignHashW@24
;CredWriteW ;CryptVerifySignatureA=CryptVerifySignatureA@24
;CredpConvertCredential ;CryptVerifySignatureW=CryptVerifySignatureW@24
;CredpConvertTargetInfo
;CredpDecodeCredential
;CredpEncodeCredential
CryptAcquireContextA=CryptAcquireContextA@20
CryptAcquireContextW=CryptAcquireContextW@20
CryptContextAddRef=CryptContextAddRef@12
CryptCreateHash=CryptCreateHash@20
CryptDecrypt=CryptDecrypt@24
CryptDeriveKey=CryptDeriveKey@20
CryptDestroyHash=CryptDestroyHash@4
CryptDestroyKey=CryptDestroyKey@4
CryptDuplicateHash=CryptDuplicateHash@16
CryptDuplicateKey=CryptDuplicateKey@16
CryptEncrypt=CryptEncrypt@28
CryptEnumProviderTypesA=CryptEnumProviderTypesA@24
CryptEnumProviderTypesW=CryptEnumProviderTypesW@24
CryptEnumProvidersA=CryptEnumProvidersA@24
CryptEnumProvidersW=CryptEnumProvidersW@24
CryptExportKey=CryptExportKey@24
CryptGenKey=CryptGenKey@16
CryptGenRandom=CryptGenRandom@12
CryptGetDefaultProviderA=CryptGetDefaultProviderA@20
CryptGetDefaultProviderW=CryptGetDefaultProviderW@20
CryptGetHashParam=CryptGetHashParam@20
CryptGetKeyParam=CryptGetKeyParam@20
CryptGetProvParam=CryptGetProvParam@20
CryptGetUserKey=CryptGetUserKey@12
CryptHashData=CryptHashData@16
CryptHashSessionKey=CryptHashSessionKey@12
CryptImportKey=CryptImportKey@24
CryptReleaseContext=CryptReleaseContext@8
CryptSetHashParam=CryptSetHashParam@16
CryptSetKeyParam=CryptSetKeyParam@16
CryptSetProvParam=CryptSetProvParam@16
CryptSetProviderA=CryptSetProviderA@8
CryptSetProviderW=CryptSetProviderW@8
CryptSetProviderExA=CryptSetProviderExA@16
CryptSetProviderExW=CryptSetProviderExW@16
CryptSignHashA=CryptSignHashA@24
CryptSignHashW=CryptSignHashW@24
CryptVerifySignatureA=CryptVerifySignatureA@24
CryptVerifySignatureW=CryptVerifySignatureW@24
DecryptFileA=DecryptFileA@8
DecryptFileW=DecryptFileW@8
DeleteAce=DeleteAce@8 DeleteAce=DeleteAce@8
DeleteService=DeleteService@4 DeleteService=DeleteService@4
DeregisterEventSource=DeregisterEventSource@4 ;DenyAccessRightsA
DestroyPrivateObjectSecurity=DestroyPrivateObjectSecurity@4 ;DenyAccessRightsW
;DuplicateEncryptionInfoFile ;DeregisterEventSource=DeregisterEventSource@4
;DestroyPrivateObjectSecurity=DestroyPrivateObjectSecurity@4
DuplicateToken=DuplicateToken@12 DuplicateToken=DuplicateToken@12
DuplicateTokenEx=DuplicateTokenEx@24 DuplicateTokenEx=DuplicateTokenEx@24
;ElfBackupEventLogFileA=ElfBackupEventLogFileA@8 ;ElfBackupEventLogFileA=ElfBackupEventLogFileA@8
@ -207,78 +105,53 @@ DuplicateTokenEx=DuplicateTokenEx@24
;ElfRegisterEventSourceW=ElfRegisterEventSourceW@12 ;ElfRegisterEventSourceW=ElfRegisterEventSourceW@12
;ElfReportEventA=ElfReportEventA@48 ;ElfReportEventA=ElfReportEventA@48
;ElfReportEventW=ElfReportEventW@48 ;ElfReportEventW=ElfReportEventW@48
;EnableTrace
EncryptFileA=EncryptFileA@4
EncryptFileW=EncryptFileW@4
;EncryptedFileKeyInfo
;EncryptionDisable
EnumDependentServicesA=EnumDependentServicesA@24 EnumDependentServicesA=EnumDependentServicesA@24
EnumDependentServicesW=EnumDependentServicesW@24 EnumDependentServicesW=EnumDependentServicesW@24
EnumServiceGroupW=EnumServiceGroupW@36 EnumServiceGroupW=EnumServiceGroupW@36
EnumServicesStatusA=EnumServicesStatusA@32 EnumServicesStatusA=EnumServicesStatusA@32
EnumServicesStatusExA=EnumServicesStatusExA@40
EnumServicesStatusExW=EnumServicesStatusExW@40
EnumServicesStatusW=EnumServicesStatusW@32 EnumServicesStatusW=EnumServicesStatusW@32
;EnumerateTraceGuids
EqualDomainSid=EqualDomainSid@12
EqualPrefixSid=EqualPrefixSid@8 EqualPrefixSid=EqualPrefixSid@8
EqualSid=EqualSid@8 EqualSid=EqualSid@8
FileEncryptionStatusA=FileEncryptionStatusA@8
FileEncryptionStatusW=FileEncryptionStatusW@8
FindFirstFreeAce=FindFirstFreeAce@8 FindFirstFreeAce=FindFirstFreeAce@8
;FlushTraceA
;FlushTraceW
;FreeEncryptedFileKeyInfo
;FreeEncryptionCertificateHashList
FreeInheritedFromArray=FreeInheritedFromArray@12
FreeSid=FreeSid@4 FreeSid=FreeSid@4
;GetAccessPermissionsForObjectA
;GetAccessPermissionsForObjectW
GetAce=GetAce@12 GetAce=GetAce@12
GetAclInformation=GetAclInformation@16 GetAclInformation=GetAclInformation@16
GetAuditedPermissionsFromAclA=GetAuditedPermissionsFromAclA@16 ;GetAuditedPermissionsFromAclA=GetAuditedPermissionsFromAclA@16
GetAuditedPermissionsFromAclW=GetAuditedPermissionsFromAclW@16 ;GetAuditedPermissionsFromAclW=GetAuditedPermissionsFromAclW@16
GetCurrentHwProfileA=GetCurrentHwProfileA@4 ;GetAuditedPermissionsFromSDA
GetCurrentHwProfileW=GetCurrentHwProfileW@4 ;GetAuditedPermissionsFromSDW
GetEffectiveRightsFromAclA=GetEffectiveRightsFromAclA@12 ;GetCurrentHwProfileA=GetCurrentHwProfileA@4
GetEffectiveRightsFromAclW=GetEffectiveRightsFromAclW@12 ;GetCurrentHwProfileW=GetCurrentHwProfileW@4
GetEventLogInformation=GetEventLogInformation@20 ;GetEffectiveAccessRightsA
GetExplicitEntriesFromAclA=GetExplicitEntriesFromAclA@12 ;GetEffectiveAccessRightsW
GetExplicitEntriesFromAclW=GetExplicitEntriesFromAclW@12 ;GetEffectiveRightsFromAclA=GetEffectiveRightsFromAclA@12
GetFileSecurityA=GetFileSecurityA@20 ;GetEffectiveRightsFromAclW=GetEffectiveRightsFromAclW@12
GetFileSecurityW=GetFileSecurityW@20 ;GetEffectiveRightsFromSDA
;GetInformationCodeAuthzLevelW ;GetEffectiveRightsFromSDW
;GetInformationCodeAuthzPolicyW ;GetExplicitAccessRightsA
GetInheritanceSourceA=GetInheritanceSourceA@40 ;GetExplicitAccessRightsW
GetInheritanceSourceW=GetInheritanceSourceW@40 ;GetExplicitEntriesFromAclA=GetExplicitEntriesFromAclA@12
;GetExplicitEntriesFromAclW=GetExplicitEntriesFromAclW@12
;GetFileSecurityA=GetFileSecurityA@20
;GetFileSecurityW=GetFileSecurityW@20
GetKernelObjectSecurity=GetKernelObjectSecurity@20 GetKernelObjectSecurity=GetKernelObjectSecurity@20
GetLengthSid=GetLengthSid@4 GetLengthSid=GetLengthSid@4
;GetLocalManagedApplicationData ;GetMultipleTrusteeA=GetMultipleTrusteeA@4
;GetLocalManagedApplications ;GetMultipleTrusteeOperationA=GetMultipleTrusteeOperationA@4
;GetManagedApplicationCategories ;GetMultipleTrusteeOperationW=GetMultipleTrusteeOperationW@4
;GetManagedApplications ;GetMultipleTrusteeW=GetMultipleTrusteeW@4
GetMultipleTrusteeA=GetMultipleTrusteeA@4 ;GetNamedSecurityInfoA=GetNamedSecurityInfoA@32
GetMultipleTrusteeOperationA=GetMultipleTrusteeOperationA@4 ;GetNamedSecurityInfoW=GetNamedSecurityInfoW@32
GetMultipleTrusteeOperationW=GetMultipleTrusteeOperationW@4 ;GetNumberOfEventLogRecords=GetNumberOfEventLogRecords@8
GetMultipleTrusteeW=GetMultipleTrusteeW@4 ;GetOldestEventLogRecord=GetOldestEventLogRecord@8
GetNamedSecurityInfoA=GetNamedSecurityInfoA@32 ;GetPrivateObjectSecurity=GetPrivateObjectSecurity@20
;GetNamedSecurityInfoExA
;GetNamedSecurityInfoExW
GetNamedSecurityInfoW=GetNamedSecurityInfoW@32
GetNumberOfEventLogRecords=GetNumberOfEventLogRecords@8
GetOldestEventLogRecord=GetOldestEventLogRecord@8
;GetOverlappedAccessResults
GetPrivateObjectSecurity=GetPrivateObjectSecurity@20
GetSecurityDescriptorControl=GetSecurityDescriptorControl@12 GetSecurityDescriptorControl=GetSecurityDescriptorControl@12
GetSecurityDescriptorDacl=GetSecurityDescriptorDacl@16 GetSecurityDescriptorDacl=GetSecurityDescriptorDacl@16
GetSecurityDescriptorGroup=GetSecurityDescriptorGroup@12 GetSecurityDescriptorGroup=GetSecurityDescriptorGroup@12
GetSecurityDescriptorLength=GetSecurityDescriptorLength@4 GetSecurityDescriptorLength=GetSecurityDescriptorLength@4
GetSecurityDescriptorOwner=GetSecurityDescriptorOwner@12 GetSecurityDescriptorOwner=GetSecurityDescriptorOwner@12
GetSecurityDescriptorRMControl=GetSecurityDescriptorRMControl@8
GetSecurityDescriptorSacl=GetSecurityDescriptorSacl@16 GetSecurityDescriptorSacl=GetSecurityDescriptorSacl@16
GetSecurityInfo=GetSecurityInfo@32 ;GetSecurityInfo=GetSecurityInfo@32
GetSecurityInfoExA=GetSecurityInfoExA@36
GetSecurityInfoExW=GetSecurityInfoExW@36
GetServiceDisplayNameA=GetServiceDisplayNameA@16 GetServiceDisplayNameA=GetServiceDisplayNameA@16
GetServiceDisplayNameW=GetServiceDisplayNameW@16 GetServiceDisplayNameW=GetServiceDisplayNameW@16
GetServiceKeyNameA=GetServiceKeyNameA@16 GetServiceKeyNameA=GetServiceKeyNameA@16
@ -288,140 +161,99 @@ GetSidLengthRequired=GetSidLengthRequired@4
GetSidSubAuthority=GetSidSubAuthority@8 GetSidSubAuthority=GetSidSubAuthority@8
GetSidSubAuthorityCount=GetSidSubAuthorityCount@4 GetSidSubAuthorityCount=GetSidSubAuthorityCount@4
GetTokenInformation=GetTokenInformation@20 GetTokenInformation=GetTokenInformation@20
GetTrusteeFormA=GetTrusteeFormA@4 ;GetTrusteeNameA=GetTrusteeNameA@4
GetTrusteeFormW=GetTrusteeFormW@4 ;GetTrusteeNameW=GetTrusteeNameW@4
GetTrusteeNameA=GetTrusteeNameA@4 ;GetTrusteeTypeA=GetTrusteeTypeA@4
GetTrusteeNameW=GetTrusteeNameW@4 ;GetTrusteeTypeW=GetTrusteeTypeW@4
GetTrusteeTypeA=GetTrusteeTypeA@4 ;GetUserNameA=GetUserNameA@8
GetTrusteeTypeW=GetTrusteeTypeW@4 ;GetUserNameW=GetUserNameW@8
GetUserNameA=GetUserNameA@8
GetUserNameW=GetUserNameW@8
GetWindowsAccountDomainSid=GetWindowsAccountDomainSid@12
;GrantAccessRightsA=GrantAccessRightsA@16 ;GrantAccessRightsA=GrantAccessRightsA@16
;GrantAccessRightsW=GrantAccessRightsW@16 ;GrantAccessRightsW=GrantAccessRightsW@16
;I_ScGetCurrentGroupStateW=I_ScGetCurrentGroupStateW@12 ;I_ScGetCurrentGroupStateW=I_ScGetCurrentGroupStateW@12
;I_ScIsSecurityProcess
;I_ScPnPGetServiceName
;I_ScSendTSMessage
;I_ScSetServiceBitsA=I_ScSetServiceBitsA@20 ;I_ScSetServiceBitsA=I_ScSetServiceBitsA@20
;I_ScSetServiceBitsW=I_ScSetServiceBitsW@20 ;I_ScSetServiceBitsW=I_ScSetServiceBitsW@20
;IdentifyCodeAuthzLevelW ;ImpersonateLoggedOnUser=ImpersonateLoggedOnUser@4
ImpersonateAnonymousToken=ImpersonateAnonymousToken@4 ;ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4
ImpersonateLoggedOnUser=ImpersonateLoggedOnUser@4
ImpersonateNamedPipeClient=ImpersonateNamedPipeClient@4
ImpersonateSelf=ImpersonateSelf@4 ImpersonateSelf=ImpersonateSelf@4
InitializeAcl=InitializeAcl@12 InitializeAcl=InitializeAcl@12
InitializeSecurityDescriptor=InitializeSecurityDescriptor@8 InitializeSecurityDescriptor=InitializeSecurityDescriptor@8
InitializeSid=InitializeSid@12 InitializeSid=InitializeSid@12
InitiateSystemShutdownA=InitiateSystemShutdownA@20 InitiateSystemShutdownA=InitiateSystemShutdownA@20
InitiateSystemShutdownExA=InitiateSystemShutdownExA@24
InitiateSystemShutdownExW=InitiateSystemShutdownExW@24
InitiateSystemShutdownW=InitiateSystemShutdownW@20 InitiateSystemShutdownW=InitiateSystemShutdownW@20
;InstallApplication
;IsAccessPermittedA=IsAccessPermittedA@20 ;IsAccessPermittedA=IsAccessPermittedA@20
;IsAccessPermittedW=IsAccessPermittedW@20 ;IsAccessPermittedW=IsAccessPermittedW@20
IsTextUnicode=IsTextUnicode@12 ;IsTextUnicode=IsTextUnicode@12
IsTokenRestricted=IsTokenRestricted@4
IsTokenUntrusted=IsTokenUntrusted@4
IsWellKnownSid=IsWellKnownSid@8
IsValidAcl=IsValidAcl@4 IsValidAcl=IsValidAcl@4
IsValidSecurityDescriptor=IsValidSecurityDescriptor@4 IsValidSecurityDescriptor=IsValidSecurityDescriptor@4
IsValidSid=IsValidSid@4 IsValidSid=IsValidSid@4
LockServiceDatabase=LockServiceDatabase@4 LockServiceDatabase=LockServiceDatabase@4
LogonUserA=LogonUserA@24 LogonUserA=LogonUserA@24
LogonUserExA=LogonUserExA@40
LogonUserExW=LogonUserExW@40
LogonUserW=LogonUserW@24 LogonUserW=LogonUserW@24
LookupAccountNameA=LookupAccountNameA@28 ;LookupAccountNameA=LookupAccountNameA@28
LookupAccountNameW=LookupAccountNameW@28 ;LookupAccountNameW=LookupAccountNameW@28
LookupAccountSidA=LookupAccountSidA@28 ;LookupAccountSidA=LookupAccountSidA@28
LookupAccountSidW=LookupAccountSidW@28 ;LookupAccountSidW=LookupAccountSidW@28
LookupPrivilegeDisplayNameA=LookupPrivilegeDisplayNameA@20 LookupPrivilegeDisplayNameA=LookupPrivilegeDisplayNameA@20
LookupPrivilegeDisplayNameW=LookupPrivilegeDisplayNameW@20 LookupPrivilegeDisplayNameW=LookupPrivilegeDisplayNameW@20
LookupPrivilegeNameA=LookupPrivilegeNameA@16 LookupPrivilegeNameA=LookupPrivilegeNameA@16
LookupPrivilegeNameW=LookupPrivilegeNameW@16 LookupPrivilegeNameW=LookupPrivilegeNameW@16
LookupPrivilegeValueA=LookupPrivilegeValueA@12 LookupPrivilegeValueA=LookupPrivilegeValueA@12
LookupPrivilegeValueW=LookupPrivilegeValueW@12 LookupPrivilegeValueW=LookupPrivilegeValueW@12
LookupSecurityDescriptorPartsA=LookupSecurityDescriptorPartsA@28 ;LookupSecurityDescriptorPartsA=LookupSecurityDescriptorPartsA@28
LookupSecurityDescriptorPartsW=LookupSecurityDescriptorPartsW@28 ;LookupSecurityDescriptorPartsW=LookupSecurityDescriptorPartsW@28
LsaAddAccountRights=LsaAddAccountRights@16 ;LsaAddAccountRights=LsaAddAccountRights@16
;LsaAddPrivilegesToAccount@8 ;LsaAddPrivilegesToAccount@8
;LsaClearAuditLog@4 ;LsaClearAuditLog@4
LsaClose=LsaClose@4 ;LsaClose=LsaClose@4
;LsaCreateAccount@16 ;LsaCreateAccount@16
;LsaCreateSecret@16 ;LsaCreateSecret@16
;LsaCreateTrustedDomain@16 ;LsaCreateTrustedDomain@16
LsaCreateTrustedDomainEx=LsaCreateTrustedDomainEx@20
;LsaDelete@4 ;LsaDelete@4
LsaDeleteTrustedDomain=LsaDeleteTrustedDomain@8 ;LsaDeleteTrustedDomain=LsaDeleteTrustedDomain@8
LsaEnumerateAccountRights=LsaEnumerateAccountRights@16 ;LsaEnumerateAccountRights=LsaEnumerateAccountRights@16
;LsaEnumerateAccounts@20 ;LsaEnumerateAccounts@20
LsaEnumerateAccountsWithUserRight=LsaEnumerateAccountsWithUserRight@16 ;LsaEnumerateAccountsWithUserRight=LsaEnumerateAccountsWithUserRight@16
;LsaEnumeratePrivileges@20 ;LsaEnumeratePrivileges@20
;LsaEnumeratePrivilegesOfAccount@8 ;LsaEnumeratePrivilegesOfAccount@8
LsaEnumerateTrustedDomains=LsaEnumerateTrustedDomains@20 ;LsaEnumerateTrustedDomains=LsaEnumerateTrustedDomains@20
LsaEnumerateTrustedDomainsEx=LsaEnumerateTrustedDomainsEx@20 ;LsaFreeMemory=LsaFreeMemory@4
LsaFreeMemory=LsaFreeMemory@4
;LsaGetQuotasForAccount@8 ;LsaGetQuotasForAccount@8
;LsaGetRemoteUserName
;LsaGetSystemAccessAccount@8 ;LsaGetSystemAccessAccount@8
;LsaGetUserName@8 ;LsaGetUserName@8
;LsaICLookupNames@32 ;LsaICLookupNames@32
;LsaICLookupNamesWithCreds
;LsaICLookupSids@32 ;LsaICLookupSids@32
;LsaICLookupSidsWithCreds ;LsaLookupNames=LsaLookupNames@20
LsaLookupNames=LsaLookupNames@20
LsaLookupNames2=LsaLookupNames2@24
;LsaLookupPrivilegeDisplayName@16 ;LsaLookupPrivilegeDisplayName@16
;LsaLookupPrivilegeName@12 ;LsaLookupPrivilegeName@12
;LsaLookupPrivilegeValue@12 ;LsaLookupPrivilegeValue@12
LsaLookupSids=LsaLookupSids@20 ;LsaLookupSids=LsaLookupSids@20
;LsaNtStatusToWinError
;LsaOpenAccount@16 ;LsaOpenAccount@16
LsaOpenPolicy=LsaOpenPolicy@16 ;LsaOpenPolicy=LsaOpenPolicy@16
;LsaOpenPolicySce
;LsaOpenSecret@16 ;LsaOpenSecret@16
;LsaOpenTrustedDomain@16 ;LsaOpenTrustedDomain@16
LsaOpenTrustedDomainByName=LsaOpenTrustedDomainByName@16 ;LsaQueryInfoTrustedDomain
LsaQueryDomainInformationPolicy=LsaQueryDomainInformationPolicy@12 ;LsaQueryInformationPolicy=LsaQueryInformationPolicy@12
LsaQueryForestTrustInformation=LsaQueryForestTrustInformation@12
LsaQueryInformationPolicy=LsaQueryInformationPolicy@12
;LsaQueryInfoTrustedDomain@12
LsaQueryTrustedDomainInfoByName=LsaQueryTrustedDomainInfoByName@16
;LsaQuerySecret@20 ;LsaQuerySecret@20
;LsaQuerySecurityObject@12 ;LsaQuerySecurityObject@12
LsaQueryTrustedDomainInfo=LsaQueryTrustedDomainInfo@16 ;LsaQueryTrustedDomainInfo=LsaQueryTrustedDomainInfo@16
LsaRemoveAccountRights=LsaRemoveAccountRights@20 ;LsaRemoveAccountRights=LsaRemoveAccountRights@20
;LsaRemovePrivilegesFromAccount@12 ;LsaRemovePrivilegesFromAccount@12
;LsaRetrievePrivateData@12 ;LsaRetrievePrivateData@12
LsaSetDomainInformationPolicy=LsaSetDomainInformationPolicy@12 ;LsaSetInformationPolicy=LsaSetInformationPolicy@12
LsaSetInformationPolicy=LsaSetInformationPolicy@12
;LsaSetInformationTrustedDomain@12 ;LsaSetInformationTrustedDomain@12
LsaSetForestTrustInformation=LsaSetForestTrustInformation@20
LsaSetTrustedDomainInfoByName=LsaSetTrustedDomainInfoByName@16
;LsaSetQuotasForAccount@8 ;LsaSetQuotasForAccount@8
;LsaSetSecret@12 ;LsaSetSecret@12
;LsaSetSecurityObject@12 ;LsaSetSecurityObject@12
;LsaSetSystemAccessAccount@8 ;LsaSetSystemAccessAccount@8
LsaSetTrustedDomainInformation=LsaSetTrustedDomainInformation@16 ;LsaSetTrustedDomainInformation=LsaSetTrustedDomainInformation@16
LsaStorePrivateData=LsaStorePrivateData@12 ;LsaStorePrivateData=LsaStorePrivateData@12
LsaNtStatusToWinError=NTDLL.RtlNtStatusToDosError
MakeAbsoluteSD=MakeAbsoluteSD@44 MakeAbsoluteSD=MakeAbsoluteSD@44
MakeSelfRelativeSD=MakeSelfRelativeSD@12 MakeSelfRelativeSD=MakeSelfRelativeSD@12
MapGenericMask=MapGenericMask@8 MapGenericMask=MapGenericMask@8
MD4Final=MD4Final@4
MD4Init=MD4Init@4
MD4Update=MD4Update@12
MD5Final=MD5Final@4
MD5Init=MD5Init@4
MD5Update=MD5Update@12
;MSChapSrvChangePassword
;MSChapSrvChangePassword2
MakeAbsoluteSD2=MakeAbsoluteSD2@8
;NTAccessMaskToProvAccessRights=NTAccessMaskToProvAccessRights@12 ;NTAccessMaskToProvAccessRights=NTAccessMaskToProvAccessRights@12
NotifyBootConfigStatus=NotifyBootConfigStatus@4 ;NotifyBootConfigStatus=NotifyBootConfigStatus@4
NotifyChangeEventLog=NotifyChangeEventLog@8 ;NotifyChangeEventLog=NotifyChangeEventLog@8
;OpenBackupEventLogA
;OpenBackupEventLogW
ObjectCloseAuditAlarmA=ObjectCloseAuditAlarmA@12 ObjectCloseAuditAlarmA=ObjectCloseAuditAlarmA@12
ObjectCloseAuditAlarmW=ObjectCloseAuditAlarmW@12 ObjectCloseAuditAlarmW=ObjectCloseAuditAlarmW@12
ObjectDeleteAuditAlarmA=ObjectDeleteAuditAlarmA@12 ObjectDeleteAuditAlarmA=ObjectDeleteAuditAlarmA@12
@ -430,44 +262,30 @@ ObjectOpenAuditAlarmA=ObjectOpenAuditAlarmA@48
ObjectOpenAuditAlarmW=ObjectOpenAuditAlarmW@48 ObjectOpenAuditAlarmW=ObjectOpenAuditAlarmW@48
ObjectPrivilegeAuditAlarmA=ObjectPrivilegeAuditAlarmA@24 ObjectPrivilegeAuditAlarmA=ObjectPrivilegeAuditAlarmA@24
ObjectPrivilegeAuditAlarmW=ObjectPrivilegeAuditAlarmW@24 ObjectPrivilegeAuditAlarmW=ObjectPrivilegeAuditAlarmW@24
OpenBackupEventLogA=OpenBackupEventLogA@8 ;OpenBackupEventLogA=OpenBackupEventLogA@8
OpenBackupEventLogW=OpenBackupEventLogW@8 ;OpenBackupEventLogW=OpenBackupEventLogW@8
OpenEncryptedFileRawA=OpenEncryptedFileRawA@12 ;OpenEventLogA=OpenEventLogA@8
OpenEncryptedFileRawW=OpenEncryptedFileRawW@12 ;OpenEventLogW=OpenEventLogW@8
OpenEventLogA=OpenEventLogA@8
OpenEventLogW=OpenEventLogW@8
OpenProcessToken=OpenProcessToken@12 OpenProcessToken=OpenProcessToken@12
OpenSCManagerA=OpenSCManagerA@12 OpenSCManagerA=OpenSCManagerA@12
OpenSCManagerW=OpenSCManagerW@12 OpenSCManagerW=OpenSCManagerW@12
OpenServiceA=OpenServiceA@12 OpenServiceA=OpenServiceA@12
OpenServiceW=OpenServiceW@12 OpenServiceW=OpenServiceW@12
OpenThreadToken=OpenThreadToken@16 OpenThreadToken=OpenThreadToken@16
;OpenTraceA
;OpenTraceW
PrivilegeCheck=PrivilegeCheck@12 PrivilegeCheck=PrivilegeCheck@12
PrivilegedServiceAuditAlarmA=PrivilegedServiceAuditAlarmA@20 PrivilegedServiceAuditAlarmA=PrivilegedServiceAuditAlarmA@20
PrivilegedServiceAuditAlarmW=PrivilegedServiceAuditAlarmW@20 PrivilegedServiceAuditAlarmW=PrivilegedServiceAuditAlarmW@20
;ProcessIdleTasks ;ProvAccessRightsToNTAccessMask
;ProcessTrace
;QueryAllTracesA
;QueryAllTracesW
;QueryRecoveryAgentsOnEncryptedFile
QueryServiceConfigA=QueryServiceConfigA@16 QueryServiceConfigA=QueryServiceConfigA@16
QueryServiceConfigW=QueryServiceConfigW@16 QueryServiceConfigW=QueryServiceConfigW@16
QueryServiceConfig2A=QueryServiceConfig2A@20
QueryServiceConfig2W=QueryServiceConfig2W@20
QueryServiceLockStatusA=QueryServiceLockStatusA@16 QueryServiceLockStatusA=QueryServiceLockStatusA@16
QueryServiceLockStatusW=QueryServiceLockStatusW@16 QueryServiceLockStatusW=QueryServiceLockStatusW@16
QueryServiceObjectSecurity=QueryServiceObjectSecurity@20 QueryServiceObjectSecurity=QueryServiceObjectSecurity@20
QueryServiceStatus=QueryServiceStatus@8 QueryServiceStatus=QueryServiceStatus@8
QueryServiceStatusEx=QueryServiceStatusEx@20 QueryServiceStatusEx=QueryServiceStatusEx@20
;QueryTraceA ;QueryWindows31FilesMigration=QueryWindows31FilesMigration@4
;QueryTraceW ;ReadEventLogA=ReadEventLogA@28
;QueryUsersOnEncryptedFile ;ReadEventLogW=ReadEventLogW@28
QueryWindows31FilesMigration=QueryWindows31FilesMigration@4
ReadEncryptedFileRaw=ReadEncryptedFileRaw@12
ReadEventLogA=ReadEventLogA@28
ReadEventLogW=ReadEventLogW@28
RegCloseKey=RegCloseKey@4 RegCloseKey=RegCloseKey@4
RegConnectRegistryA=RegConnectRegistryA@12 RegConnectRegistryA=RegConnectRegistryA@12
RegConnectRegistryW=RegConnectRegistryW@12 RegConnectRegistryW=RegConnectRegistryW@12
@ -479,7 +297,6 @@ RegDeleteKeyA=RegDeleteKeyA@8
RegDeleteKeyW=RegDeleteKeyW@8 RegDeleteKeyW=RegDeleteKeyW@8
RegDeleteValueA=RegDeleteValueA@8 RegDeleteValueA=RegDeleteValueA@8
RegDeleteValueW=RegDeleteValueW@8 RegDeleteValueW=RegDeleteValueW@8
RegDisablePredefinedCache=RegDisablePredefinedCache@0
RegEnumKeyA=RegEnumKeyA@16 RegEnumKeyA=RegEnumKeyA@16
RegEnumKeyExA=RegEnumKeyExA@32 RegEnumKeyExA=RegEnumKeyExA@32
RegEnumKeyExW=RegEnumKeyExW@32 RegEnumKeyExW=RegEnumKeyExW@32
@ -491,13 +308,10 @@ RegGetKeySecurity=RegGetKeySecurity@16
RegLoadKeyA=RegLoadKeyA@12 RegLoadKeyA=RegLoadKeyA@12
RegLoadKeyW=RegLoadKeyW@12 RegLoadKeyW=RegLoadKeyW@12
RegNotifyChangeKeyValue=RegNotifyChangeKeyValue@20 RegNotifyChangeKeyValue=RegNotifyChangeKeyValue@20
RegOpenCurrentUser=RegOpenCurrentUser@8
RegOpenKeyA=RegOpenKeyA@12 RegOpenKeyA=RegOpenKeyA@12
RegOpenKeyExA=RegOpenKeyExA@20 RegOpenKeyExA=RegOpenKeyExA@20
RegOpenKeyExW=RegOpenKeyExW@20 RegOpenKeyExW=RegOpenKeyExW@20
RegOpenKeyW=RegOpenKeyW@12 RegOpenKeyW=RegOpenKeyW@12
RegOpenUserClassesRoot=RegOpenUserClassesRoot@16
RegOverridePredefKey=RegOverridePredefKey@8
RegQueryInfoKeyA=RegQueryInfoKeyA@48 RegQueryInfoKeyA=RegQueryInfoKeyA@48
RegQueryInfoKeyW=RegQueryInfoKeyW@48 RegQueryInfoKeyW=RegQueryInfoKeyW@48
RegQueryMultipleValuesA=RegQueryMultipleValuesA@20 RegQueryMultipleValuesA=RegQueryMultipleValuesA@20
@ -511,8 +325,6 @@ RegReplaceKeyW=RegReplaceKeyW@16
RegRestoreKeyA=RegRestoreKeyA@12 RegRestoreKeyA=RegRestoreKeyA@12
RegRestoreKeyW=RegRestoreKeyW@12 RegRestoreKeyW=RegRestoreKeyW@12
RegSaveKeyA=RegSaveKeyA@12 RegSaveKeyA=RegSaveKeyA@12
RegSaveKeyExA=RegSaveKeyExA@16
RegSaveKeyExW=RegSaveKeyExW@16
RegSaveKeyW=RegSaveKeyW@12 RegSaveKeyW=RegSaveKeyW@12
RegSetKeySecurity=RegSetKeySecurity@12 RegSetKeySecurity=RegSetKeySecurity@12
RegSetValueA=RegSetValueA@20 RegSetValueA=RegSetValueA@20
@ -521,83 +333,43 @@ RegSetValueExW=RegSetValueExW@24
RegSetValueW=RegSetValueW@20 RegSetValueW=RegSetValueW@20
RegUnLoadKeyA=RegUnLoadKeyA@8 RegUnLoadKeyA=RegUnLoadKeyA@8
RegUnLoadKeyW=RegUnLoadKeyW@8 RegUnLoadKeyW=RegUnLoadKeyW@8
RegisterEventSourceA=RegisterEventSourceA@8 ;RegisterEventSourceA=RegisterEventSourceA@8
RegisterEventSourceW=RegisterEventSourceW@8 ;RegisterEventSourceW=RegisterEventSourceW@8
;RegisterIdleTask
RegisterServiceCtrlHandlerA=RegisterServiceCtrlHandlerA@8 RegisterServiceCtrlHandlerA=RegisterServiceCtrlHandlerA@8
RegisterServiceCtrlHandlerExA=RegisterServiceCtrlHandlerExA@12
RegisterServiceCtrlHandlerExW=RegisterServiceCtrlHandlerExW@12
RegisterServiceCtrlHandlerW=RegisterServiceCtrlHandlerW@8 RegisterServiceCtrlHandlerW=RegisterServiceCtrlHandlerW@8
;RegisterTraceGuidsA ;ReplaceAllAccessRightsA
;RegisterTraceGuidsW ;ReplaceAllAccessRightsW
;RemoveTraceCallback ;ReportEventA=ReportEventA@36
;RemoveUsersFromEncryptedFile ;ReportEventW=ReportEventW@36
ReportEventA=ReportEventA@36
ReportEventW=ReportEventW@36
RevertToSelf=RevertToSelf@0 RevertToSelf=RevertToSelf@0
;RevokeExplicitAccessRightsA=RevokeExplicitAccessRightsA@16 ;RevokeExplicitAccessRightsA=RevokeExplicitAccessRightsA@16
;RevokeExplicitAccessRightsW=RevokeExplicitAccessRightsW@16 ;RevokeExplicitAccessRightsW=RevokeExplicitAccessRightsW@16
;SaferCloseLevel
;SaferComputeTokenFromLevel
;SaferCreateLevel
;SaferGetLevelInformation
;SaferGetPolicyInformation
;SaferIdentifyLevel
;SaferRecordEventLogEntry
;SaferSetLevelInformation
;SaferSetPolicyInformation
;SaferiChangeRegistryScope
;SaferiCompareTokenLevels
;SaferiIsExecutableFileType
;SaferiPopulateDefaultsInRegistry
;SaferiRecordEventLogEntry
;SaferiReplaceProcessThreadTokens
;SaferiSearchMatchingHashRules
;SetAccessRightsA=SetAccessRightsA@16 ;SetAccessRightsA=SetAccessRightsA@16
;SetAccessRightsW=SetAccessRightsW@16 ;SetAccessRightsW=SetAccessRightsW@16
SetAclInformation=SetAclInformation@16 SetAclInformation=SetAclInformation@16
;SetEntriesInAccessListA ;SetEntriesInAclA=SetEntriesInAclA@16
;SetEntriesInAccessListW ;SetEntriesInAclW=SetEntriesInAclW@16
SetEntriesInAclA=SetEntriesInAclA@16 ;SetFileSecurityA=SetFileSecurityA@12
SetEntriesInAclW=SetEntriesInAclW@16 ;SetFileSecurityW=SetFileSecurityW@12
;SetEntriesInAuditListA
;SetEntriesInAuditListW
SetFileSecurityA=SetFileSecurityA@12
SetFileSecurityW=SetFileSecurityW@12
SetKernelObjectSecurity=SetKernelObjectSecurity@12 SetKernelObjectSecurity=SetKernelObjectSecurity@12
;SetInformationCodeAuthzLevelW ;SetNamedSecurityInfoA=SetNamedSecurityInfoA@28
;SetInformationCodeAuthzPolicyW ;SetNamedSecurityInfoW=SetNamedSecurityInfoW@28
SetNamedSecurityInfoA=SetNamedSecurityInfoA@28 ;SetPrivateObjectSecurity=SetPrivateObjectSecurity@20
;SetNamedSecurityInfoExA
;SetNamedSecurityInfoExW
SetNamedSecurityInfoW=SetNamedSecurityInfoW@28
SetPrivateObjectSecurity=SetPrivateObjectSecurity@20
SetPrivateObjectSecurityEx=SetPrivateObjectSecurityEx@24
SetSecurityDescriptorControl=SetSecurityDescriptorControl@12
SetSecurityDescriptorDacl=SetSecurityDescriptorDacl@16 SetSecurityDescriptorDacl=SetSecurityDescriptorDacl@16
SetSecurityDescriptorGroup=SetSecurityDescriptorGroup@12 SetSecurityDescriptorGroup=SetSecurityDescriptorGroup@12
SetSecurityDescriptorOwner=SetSecurityDescriptorOwner@12 SetSecurityDescriptorOwner=SetSecurityDescriptorOwner@12
SetSecurityDescriptorRMControl=SetSecurityDescriptorRMControl@8
SetSecurityDescriptorSacl=SetSecurityDescriptorSacl@16 SetSecurityDescriptorSacl=SetSecurityDescriptorSacl@16
SetSecurityInfo=SetSecurityInfo@28 ;SetSecurityInfo=SetSecurityInfo@28
;SetSecurityInfoExA
;SetSecurityInfoExW
SetServiceBits=SetServiceBits@16 SetServiceBits=SetServiceBits@16
SetServiceObjectSecurity=SetServiceObjectSecurity@12 SetServiceObjectSecurity=SetServiceObjectSecurity@12
SetServiceStatus=SetServiceStatus@8 SetServiceStatus=SetServiceStatus@8
SetThreadToken=SetThreadToken@8 SetThreadToken=SetThreadToken@8
SetTokenInformation=SetTokenInformation@16 SetTokenInformation=SetTokenInformation@16
;SetTraceCallback
;SetUserFileEncryptionKey
StartServiceA=StartServiceA@12 StartServiceA=StartServiceA@12
StartServiceCtrlDispatcherA=StartServiceCtrlDispatcherA@4 StartServiceCtrlDispatcherA=StartServiceCtrlDispatcherA@4
StartServiceCtrlDispatcherW=StartServiceCtrlDispatcherW@4 StartServiceCtrlDispatcherW=StartServiceCtrlDispatcherW@4
StartServiceW=StartServiceW@12 StartServiceW=StartServiceW@12
;StartTraceA ;SynchronizeWindows31FilesAndWindowsNTRegistry=SynchronizeWindows31FilesAndWindowsNTRegistry@16
;StartTraceW
;StopTraceA
;StopTraceW
SynchronizeWindows31FilesAndWindowsNTRegistry=SynchronizeWindows31FilesAndWindowsNTRegistry@16
SystemFunction001=SystemFunction001@12 SystemFunction001=SystemFunction001@12
SystemFunction002=SystemFunction002@12 SystemFunction002=SystemFunction002@12
SystemFunction003=SystemFunction003@8 SystemFunction003=SystemFunction003@8
@ -633,60 +405,5 @@ SystemFunction032=SystemFunction032@8
SystemFunction033=SystemFunction033@8 SystemFunction033=SystemFunction033@8
SystemFunction034=SystemFunction034@8 SystemFunction034=SystemFunction034@8
SystemFunction035=SystemFunction035@8 SystemFunction035=SystemFunction035@8
;SystemFunction036
;SystemFunction040
;SystemFunction041
;TraceEvent
;TraceEventInstance
;TraceMessage
;TraceMessageVa
TreeResetNamedSecurityInfoA=TreeResetNamedSecurityInfoA@44
TreeResetNamedSecurityInfoW=TreeResetNamedSecurityInfoW@44
;TrusteeAccessToObjectA
;TrusteeAccessToObjectW
;UninstallApplication
UnlockServiceDatabase=UnlockServiceDatabase@4 UnlockServiceDatabase=UnlockServiceDatabase@4
;UnregisterIdleTask ; EOF
;UnregisterTraceGuids
;UpdateTraceA
;UpdateTraceW
;WdmWmiServiceMain
;WmiCloseBlock
;WmiCloseTraceWithCursor
;WmiConvertTimestamp
;WmiDevInstToInstanceNameA
;WmiDevInstToInstanceNameW
;WmiEnumerateGuids
;WmiExecuteMethodA
;WmiExecuteMethodW
;WmiFileHandleToInstanceNameA
;WmiFileHandleToInstanceNameW
;WmiFreeBuffer
;WmiGetFirstTraceOffset
;WmiGetNextEvent
;WmiGetTraceHeader
;WmiMofEnumerateResourcesA
;WmiMofEnumerateResourcesW
;WmiNotificationRegistrationA
;WmiNotificationRegistrationW
;WmiOpenBlock
;WmiOpenTraceWithCursor
;WmiParseTraceEvent
;WmiQueryAllDataA
;WmiQueryAllDataMultipleA
;WmiQueryAllDataMultipleW
;WmiQueryAllDataW
;WmiQueryGuidInformation
;WmiQuerySingleInstanceA
;WmiQuerySingleInstanceMultipleA
;WmiQuerySingleInstanceMultipleW
;WmiQuerySingleInstanceW
;WmiReceiveNotificationsA
;WmiReceiveNotificationsW
;WmiSetSingleInstanceA
;WmiSetSingleInstanceW
;WmiSetSingleItemA
;WmiSetSingleItemW
Wow64Win32ApiEntry=Wow64Win32ApiEntry@12
WriteEncryptedFileRaw=WriteEncryptedFileRaw@12

View file

@ -1,4 +1,4 @@
# $Id: makefile,v 1.32 2004/01/20 01:40:18 ekohl Exp $ # $Id: makefile,v 1.33 2004/02/25 14:25:10 ekohl Exp $
PATH_TO_TOP = ../.. PATH_TO_TOP = ../..
@ -19,10 +19,7 @@ MISC_OBJECTS = \
misc/dllmain.o \ misc/dllmain.o \
misc/logon.o \ misc/logon.o \
misc/shutdown.o \ misc/shutdown.o \
misc/sysfunc.o \ misc/sysfunc.o
misc/crstubs.o \
misc/aclstubs.o \
misc/stubs.o
REGISTRY_OBJECTS = \ REGISTRY_OBJECTS = \
reg/reg.o reg/reg.o
@ -30,7 +27,6 @@ REGISTRY_OBJECTS = \
SECURITY_OBJECTS = \ SECURITY_OBJECTS = \
sec/ac.o \ sec/ac.o \
sec/audit.o \ sec/audit.o \
sec/lsa.o \
sec/misc.o \ sec/misc.o \
sec/sec.o \ sec/sec.o \
sec/sid.o sec/sid.o

View file

@ -1,319 +0,0 @@
#include <windows.h>
#include <accctrl.h>
#include <aclapi.h>
/*
* @unimplemented
*/
VOID STDCALL BuildExplicitAccessWithNameA(PEXPLICIT_ACCESS_A pExplicitAccess,LPSTR pTrusteeName,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildExplicitAccessWithNameW(PEXPLICIT_ACCESS_W pExplicitAccess,LPWSTR pTrusteeName,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
DWORD STDCALL BuildSecurityDescriptorA(PTRUSTEE_A pOwner,PTRUSTEE_A pGroup,ULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_A pListOfAccessEntries,
ULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_A pListOfAuditEntries,PSECURITY_DESCRIPTOR pOldSD,PULONG pSizeNewSD,PSECURITY_DESCRIPTOR* pNewSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL BuildSecurityDescriptorW(PTRUSTEE_W pOwner,PTRUSTEE_W pGroup,ULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_W pListOfAccessEntries,
ULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_W pListOfAuditEntries,PSECURITY_DESCRIPTOR pOldSD,PULONG pSizeNewSD,PSECURITY_DESCRIPTOR* pNewSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithNameA(PTRUSTEE_A pTrustee,LPSTR pName)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithNameW(PTRUSTEE_W pTrustee,LPWSTR pName)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndNameA(PTRUSTEE_A pTrustee,POBJECTS_AND_NAME_A pObjName,SE_OBJECT_TYPE ObjectType,
LPSTR ObjectTypeName,LPSTR InheritedObjectTypeName,LPSTR Name)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndNameW(PTRUSTEE_W pTrustee,POBJECTS_AND_NAME_W pObjName,SE_OBJECT_TYPE ObjectType,
LPWSTR ObjectTypeName,LPWSTR InheritedObjectTypeName,LPWSTR Name)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndSidA(PTRUSTEE_A pTrustee,POBJECTS_AND_SID pObjSid,GUID* pObjectGuid,GUID* pInheritedObjectGuid,PSID pSid)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithObjectsAndSidW(PTRUSTEE_W pTrustee,POBJECTS_AND_SID pObjSid,GUID* pObjectGuid,GUID* pInheritedObjectGuid,PSID pSid)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithSidA(PTRUSTEE_A pTrustee,PSID pSid)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildTrusteeWithSidW(PTRUSTEE_W pTrustee,PSID pSid)
{
}
/*
* @unimplemented
*/
DWORD STDCALL GetAuditedPermissionsFromAclA(PACL pacl,PTRUSTEE_A pTrustee,PACCESS_MASK pSuccessfulAuditedRights,PACCESS_MASK pFailedAuditRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetAuditedPermissionsFromAclW(PACL pacl,PTRUSTEE_W pTrustee,PACCESS_MASK pSuccessfulAuditedRights,PACCESS_MASK pFailedAuditRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetEffectiveRightsFromAclA(PACL pacl,PTRUSTEE_A pTrustee,PACCESS_MASK pAccessRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetEffectiveRightsFromAclW(PACL pacl,PTRUSTEE_W pTrustee,PACCESS_MASK pAccessRights)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetExplicitEntriesFromAclA(PACL pacl,PULONG pcCountOfExplicitEntries,PEXPLICIT_ACCESS_A* pListOfExplicitEntries)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetExplicitEntriesFromAclW(PACL pacl,PULONG pcCountOfExplicitEntries,PEXPLICIT_ACCESS_W* pListOfExplicitEntries)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,
PSID* ppsidOwner,PSID* ppsidGroup,PACL* ppDacl,PACL* ppSacl,PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,
PSID* ppsidOwner,PSID* ppsidGroup,PACL* ppDacl,PACL* ppSacl,PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_FORM STDCALL GetTrusteeFormA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_FORM STDCALL GetTrusteeFormW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
LPSTR STDCALL GetTrusteeNameA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
LPWSTR STDCALL GetTrusteeNameW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_TYPE STDCALL GetTrusteeTypeA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
TRUSTEE_TYPE STDCALL GetTrusteeTypeW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL LookupSecurityDescriptorPartsA(PTRUSTEE_A* pOwner,PTRUSTEE_A* pGroup,PULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_A* pListOfAccessEntries,
PULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_A* pListOfAuditEntries,PSECURITY_DESCRIPTOR pSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL LookupSecurityDescriptorPartsW(PTRUSTEE_W* pOwner,PTRUSTEE_W* pGroup,PULONG cCountOfAccessEntries,PEXPLICIT_ACCESS_W* pListOfAccessEntries,
PULONG cCountOfAuditEntries,PEXPLICIT_ACCESS_W* pListOfAuditEntries,PSECURITY_DESCRIPTOR pSD)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetEntriesInAclA(ULONG cCountOfExplicitEntries,PEXPLICIT_ACCESS_A pListOfExplicitEntries,PACL OldAcl,PACL* NewAcl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetEntriesInAclW(ULONG cCountOfExplicitEntries,PEXPLICIT_ACCESS_W pListOfExplicitEntries,PACL OldAcl,PACL* NewAcl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL SetSecurityInfo(HANDLE handle,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetInheritanceSourceA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMA pInheritArray)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL GetInheritanceSourceW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo, BOOL Container,GUID ** pObjectClassGuids ,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray OPTIONAL,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROMW pInheritArray)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL FreeInheritedFromArray(PINHERITED_FROMW pInheritArray,USHORT AceCnt,PFN_OBJECT_MGR_FUNCTS pfnArray)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL TreeResetNamedSecurityInfoA(LPSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
{
return(FALSE);
}
/*
* @unimplemented
*/
DWORD STDCALL TreeResetNamedSecurityInfoW(LPWSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args)
{
return(FALSE);
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateExplicitAccessWithNameA(PEXPLICIT_ACCESS_A pExplicitAccess,LPSTR pTrusteeName,PTRUSTEE_A pTrustee,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateExplicitAccessWithNameW(PEXPLICIT_ACCESS_W pExplicitAccess,LPWSTR pTrusteeName,PTRUSTEE_W pTrustee,DWORD AccessPermissions,ACCESS_MODE AccessMode,DWORD Inheritance)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateTrusteeA(PTRUSTEE_A pTrustee,PTRUSTEE_A pImpersonateTrustee)
{
}
/*
* @unimplemented
*/
VOID STDCALL BuildImpersonateTrusteeW(PTRUSTEE_W pTrustee,PTRUSTEE_W pImpersonateTrustee)
{
}
/*
* @unimplemented
*/
MULTIPLE_TRUSTEE_OPERATION STDCALL GetMultipleTrusteeOperationA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
MULTIPLE_TRUSTEE_OPERATION STDCALL GetMultipleTrusteeOperationW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
PTRUSTEE_A STDCALL GetMultipleTrusteeA(PTRUSTEE_A pTrustee)
{
return(FALSE);
}
/*
* @unimplemented
*/
PTRUSTEE_W STDCALL GetMultipleTrusteeW(PTRUSTEE_W pTrustee)
{
return(FALSE);
}

View file

@ -1,298 +0,0 @@
#include <windows.h>
#include <wincrypt.h>
/*
* @unimplemented
*/
BOOL STDCALL CryptAcquireContextA(HCRYPTPROV *phProv, LPCSTR pszContainer,
LPCSTR pszProvider, DWORD dwProvType,
DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer,
LPCWSTR pszProvider, DWORD dwProvType, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGenRandom (HCRYPTPROV hProv, DWORD dwLen, BYTE *pbBuffer)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptContextAddRef (HCRYPTPROV hProv, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey,
DWORD dwFlags, HCRYPTHASH *phHash)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBaseData,
DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDestroyHash (HCRYPTHASH hHash)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDestroyKey (HCRYPTKEY hKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDuplicateKey (HCRYPTKEY hKey, DWORD *pdwReserved, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved,
DWORD dwFlags, HCRYPTHASH *phHash)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen, DWORD dwBufLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPSTR pszTypeName, DWORD *pcbTypeName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved,
DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszTypeName, DWORD *pcbTypeName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobType,
DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGenKey (HCRYPTPROV hProv, ALG_ID Algid, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData,
DWORD *pdwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved,
DWORD dwFlags, LPSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved,
DWORD dwFlags, LPWSTR pszProvName, DWORD *pcbProvName)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptGetUserKey (HCRYPTPROV hProv, DWORD dwKeySpec, HCRYPTKEY *phUserKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptHashData (HCRYPTHASH hHash, BYTE *pbData, DWORD dwDataLen, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptHashSessionKey (HCRYPTHASH hHash, HCRYPTKEY hKey, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptImportKey (HCRYPTPROV hProv, BYTE *pbData, DWORD dwDataLen,
HCRYPTKEY hPubKey, DWORD dwFlags, HCRYPTKEY *phKey)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptReleaseContext (HCRYPTPROV hProv, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescription,
DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDescription,
DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderA (LPCSTR pszProvName, DWORD dwProvType)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderW (LPCWSTR pszProvName, DWORD dwProvType)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderExA (LPCSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProviderExW (LPCWSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptSetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptVerifySignatureA (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
HCRYPTKEY hPubKey, LPCSTR sDescription, DWORD dwFlags)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL CryptVerifySignatureW (HCRYPTHASH hHash, BYTE *pbSignature, DWORD dwSigLen,
HCRYPTKEY hPubKey, LPCWSTR sDescription, DWORD dwFlags)
{
return(FALSE);
}

View file

@ -1,4 +1,4 @@
/* $Id: logon.c,v 1.3 2004/01/23 10:35:52 ekohl Exp $ /* $Id: logon.c,v 1.4 2004/02/25 14:25:10 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -124,26 +124,6 @@ CreateProcessAsUserW (HANDLE hToken,
} }
/*
* @unimplemented
*/
BOOL STDCALL
CreateProcessWithLogonW (LPCWSTR lpUsername,
LPCWSTR lpDomain,
LPCWSTR lpPassword,
DWORD dwLogonFlags,
LPCWSTR lpApplicationName,
LPWSTR lpCommandLine,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCWSTR lpCurrentDirectory,
LPSTARTUPINFOW lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation)
{
return FALSE;
}
/* /*
* @unimplemented * @unimplemented
*/ */
@ -393,42 +373,4 @@ LogonUserW (LPCWSTR lpszUsername,
return TRUE; return TRUE;
} }
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserExA (LPCSTR lpszUsername,
LPCSTR lpszDomain,
LPCSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken,
PSID *ppLogonSid,
PVOID *ppProfileBuffer,
LPDWORD pdwProfileLength,
PQUOTA_LIMITS pQuotaLimits)
{
return FALSE;
}
/*
* @unimplemented
*/
BOOL STDCALL
LogonUserExW (LPCWSTR lpszUsername,
LPCWSTR lpszDomain,
LPCWSTR lpszPassword,
DWORD dwLogonType,
DWORD dwLogonProvider,
PHANDLE phToken,
PSID *ppLogonSid,
PVOID *ppProfileBuffer,
LPDWORD pdwProfileLength,
PQUOTA_LIMITS pQuotaLimits)
{
return FALSE;
}
/* EOF */ /* EOF */

File diff suppressed because it is too large Load diff

View file

@ -1,4 +1,4 @@
/* $Id: reg.c,v 1.43 2004/02/22 14:26:07 ekohl Exp $ /* $Id: reg.c,v 1.44 2004/02/25 14:25:10 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -191,7 +191,6 @@ OpenClassesRootKey (PHANDLE KeyHandle)
&Attributes); &Attributes);
} }
#undef NDEBUG
static NTSTATUS static NTSTATUS
OpenLocalMachineKey (PHANDLE KeyHandle) OpenLocalMachineKey (PHANDLE KeyHandle)
@ -215,7 +214,6 @@ OpenLocalMachineKey (PHANDLE KeyHandle)
return Status; return Status;
} }
#define NDEBUG
static NTSTATUS static NTSTATUS
OpenUsersKey (PHANDLE KeyHandle) OpenUsersKey (PHANDLE KeyHandle)
@ -1608,7 +1606,6 @@ RegNotifyChangeKeyValue (HKEY hKey,
} }
/************************************************************************ /************************************************************************
* RegOpenKeyA * RegOpenKeyA
* *
@ -2535,9 +2532,120 @@ RegReplaceKeyW (HKEY hKey,
LPCWSTR lpNewFile, LPCWSTR lpNewFile,
LPCWSTR lpOldFile) LPCWSTR lpOldFile)
{ {
UNIMPLEMENTED; OBJECT_ATTRIBUTES KeyObjectAttributes;
SetLastError(ERROR_CALL_NOT_IMPLEMENTED); OBJECT_ATTRIBUTES NewObjectAttributes;
return ERROR_CALL_NOT_IMPLEMENTED; OBJECT_ATTRIBUTES OldObjectAttributes;
UNICODE_STRING SubKeyName;
UNICODE_STRING NewFileName;
UNICODE_STRING OldFileName;
BOOLEAN CloseRealKey;
HANDLE RealKeyHandle;
HANDLE KeyHandle;
LONG ErrorCode;
NTSTATUS Status;
if (hKey == HKEY_PERFORMANCE_DATA)
{
return ERROR_INVALID_HANDLE;
}
Status = MapDefaultKey (&KeyHandle,
hKey);
if (!NT_SUCCESS(Status))
{
ErrorCode = RtlNtStatusToDosError (Status);
SetLastError (ErrorCode);
return ErrorCode;
}
/* Open the real key */
if (lpSubKey != NULL && *lpSubKey != (WCHAR)0)
{
RtlInitUnicodeString (&SubKeyName,
(PWSTR)lpSubKey);
InitializeObjectAttributes (&KeyObjectAttributes,
&SubKeyName,
OBJ_CASE_INSENSITIVE,
KeyHandle,
NULL);
Status = NtOpenKey (&RealKeyHandle,
KEY_ALL_ACCESS,
&KeyObjectAttributes);
if (!NT_SUCCESS(Status))
{
ErrorCode = RtlNtStatusToDosError (Status);
SetLastError (ErrorCode);
return ErrorCode;
}
CloseRealKey = TRUE;
}
else
{
RealKeyHandle = KeyHandle;
CloseRealKey = FALSE;
}
/* Convert new file name */
if (!RtlDosPathNameToNtPathName_U ((LPWSTR)lpNewFile,
&NewFileName,
NULL,
NULL))
{
if (CloseRealKey)
{
NtClose (RealKeyHandle);
}
SetLastError (ERROR_INVALID_PARAMETER);
return ERROR_INVALID_PARAMETER;
}
InitializeObjectAttributes (&NewObjectAttributes,
&NewFileName,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
/* Convert old file name */
if (!RtlDosPathNameToNtPathName_U ((LPWSTR)lpOldFile,
&OldFileName,
NULL,
NULL))
{
RtlFreeUnicodeString (&NewFileName);
if (CloseRealKey)
{
NtClose (RealKeyHandle);
}
SetLastError (ERROR_INVALID_PARAMETER);
return ERROR_INVALID_PARAMETER;
}
InitializeObjectAttributes (&OldObjectAttributes,
&OldFileName,
OBJ_CASE_INSENSITIVE,
NULL,
NULL);
Status = NtReplaceKey (&NewObjectAttributes,
RealKeyHandle,
&OldObjectAttributes);
RtlFreeUnicodeString (&OldFileName);
RtlFreeUnicodeString (&NewFileName);
if (CloseRealKey)
{
NtClose (RealKeyHandle);
}
if (!NT_SUCCESS(Status))
{
ErrorCode = RtlNtStatusToDosError (Status);
SetLastError (ErrorCode);
return ErrorCode;
}
return ERROR_SUCCESS;
} }
@ -2695,7 +2803,7 @@ RegSaveKeyW (HKEY hKey,
return ErrorCode; return ErrorCode;
} }
if (!RtlDosPathNameToNtPathName_U ((LPWSTR)lpFile, if (!RtlDosPathNameToNtPathName_U ((PWSTR)lpFile,
&FileName, &FileName,
NULL, NULL,
NULL)) NULL))
@ -2820,7 +2928,7 @@ RegSetValueExA (HKEY hKey,
strlen(lpValueName) != 0) strlen(lpValueName) != 0)
{ {
RtlCreateUnicodeStringFromAsciiz (&ValueName, RtlCreateUnicodeStringFromAsciiz (&ValueName,
(LPSTR)lpValueName); (PSTR)lpValueName);
pValueName = (LPWSTR)ValueName.Buffer; pValueName = (LPWSTR)ValueName.Buffer;
} }
else else
@ -2834,7 +2942,7 @@ RegSetValueExA (HKEY hKey,
{ {
RtlInitAnsiString (&AnsiString, RtlInitAnsiString (&AnsiString,
NULL); NULL);
AnsiString.Buffer = (LPSTR)lpData; AnsiString.Buffer = (PSTR)lpData;
AnsiString.Length = cbData; AnsiString.Length = cbData;
AnsiString.MaximumLength = cbData; AnsiString.MaximumLength = cbData;
RtlAnsiStringToUnicodeString (&Data, RtlAnsiStringToUnicodeString (&Data,

View file

@ -1,4 +1,4 @@
/* $Id: ac.c,v 1.8 2004/01/20 01:40:18 ekohl Exp $ /* $Id: ac.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -41,88 +41,6 @@ GetAclInformation (
} }
#if 0
DWORD
WINAPI
GetAuditedPermissionsFromAclA (
IN PACL pacl,
IN PTRUSTEE_A pTrustee,
OUT PACCESS_MASK pSuccessfulAuditedRights,
OUT PACCESS_MASK pFailedAuditRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetAuditedPermissionsFromAclW (
IN PACL pacl,
IN PTRUSTEE_W pTrustee,
OUT PACCESS_MASK pSuccessfulAuditedRights,
OUT PACCESS_MASK pFailedAuditRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetEffectiveRightsFromAclA (
IN PACL pacl,
IN PTRUSTEE_A pTrustee,
OUT PACCESS_MASK pAccessRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetEffectiveRightsFromAclW (
IN PACL pacl,
IN PTRUSTEE_W pTrustee,
OUT PACCESS_MASK pAccessRights
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetExplicitEntriesFromAclA (
IN PACL pacl,
OUT PULONG pcCountOfExplicitEntries,
OUT PEXPLICIT_ACCESS_A * pListOfExplicitEntries
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
GetExplicitEntriesFromAclW (
IN PACL pacl,
OUT PULONG pcCountOfExplicitEntries,
OUT PEXPLICIT_ACCESS_W * pListOfExplicitEntries
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
#endif
/* /*
* @implemented * @implemented
*/ */
@ -190,37 +108,6 @@ SetAclInformation (
} }
#if 0
DWORD
WINAPI
SetEntriesInAclA (
IN ULONG cCountOfExplicitEntries,
IN PEXPLICIT_ACCESS_A pListOfExplicitEntries,
IN PACL OldAcl,
OUT PACL * NewAcl
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
DWORD
WINAPI
SetEntriesInAclW (
IN ULONG cCountOfExplicitEntries,
IN PEXPLICIT_ACCESS_W pListOfExplicitEntries,
IN PACL OldAcl,
OUT PACL * NewAcl
)
{
SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
return 0;
}
#endif
/* --- ACE --- */ /* --- ACE --- */
/* /*

View file

@ -1,4 +1,4 @@
/* $Id: lsa.c,v 1.8 2004/02/14 23:13:58 sedwards Exp $ /* $Id: lsa.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -28,9 +28,11 @@
* *
* @unimplemented * @unimplemented
*/ */
NTSTATUS NTSTATUS STDCALL
STDCALL LsaOpenPolicy (PLSA_UNICODE_STRING lsaucs,
LsaOpenPolicy(PLSA_UNICODE_STRING lsaucs,PLSA_OBJECT_ATTRIBUTES lsaoa,ACCESS_MASK access,PLSA_HANDLE lsah) PLSA_OBJECT_ATTRIBUTES lsaoa,
ACCESS_MASK access,
PLSA_HANDLE lsah)
{ {
DPRINT1("LsaOpenPolicy - stub\n"); DPRINT1("LsaOpenPolicy - stub\n");
return STATUS_SUCCESS; return STATUS_SUCCESS;
@ -39,8 +41,6 @@ LsaOpenPolicy(PLSA_UNICODE_STRING lsaucs,PLSA_OBJECT_ATTRIBUTES lsaoa,ACCESS_MAS
/* /*
* @unimplemented * @unimplemented
*/ */
#define SID_REVISION (1) /* Current revision - winnt.h */
NTSTATUS NTSTATUS
STDCALL STDCALL
LsaQueryInformationPolicy(LSA_HANDLE lsah,POLICY_INFORMATION_CLASS pic,PVOID* Buffer) LsaQueryInformationPolicy(LSA_HANDLE lsah,POLICY_INFORMATION_CLASS pic,PVOID* Buffer)
@ -130,8 +130,7 @@ LsaQueryInformationPolicy(LSA_HANDLE lsah,POLICY_INFORMATION_CLASS pic,PVOID* Bu
/* /*
* @implemented * @implemented
*/ */
NTSTATUS NTSTATUS STDCALL
STDCALL
LsaFreeMemory (PVOID pv) LsaFreeMemory (PVOID pv)
{ {
return RtlFreeHeap(RtlGetProcessHeap(), 0, pv); return RtlFreeHeap(RtlGetProcessHeap(), 0, pv);
@ -140,8 +139,7 @@ LsaFreeMemory(PVOID pv)
/* /*
* @unimplemented * @unimplemented
*/ */
NTSTATUS NTSTATUS STDCALL
STDCALL
LsaClose(LSA_HANDLE ObjectHandle) LsaClose(LSA_HANDLE ObjectHandle)
{ {
DPRINT1("(%p):LsaClose stub\n",ObjectHandle); DPRINT1("(%p):LsaClose stub\n",ObjectHandle);

View file

@ -1,4 +1,9 @@
/* /* $Id: misc.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries
* FILE: lib/advapi32/sec/misc.c
* PURPOSE: Miscellaneous security functions
*/ */
#define NTOS_MODE_USER #define NTOS_MODE_USER
@ -93,13 +98,13 @@ MapGenericMask(PDWORD AccessMask,
/* /*
* @unimplemented * @unimplemented
*/ */
BOOL BOOL STDCALL
STDCALL
ImpersonateLoggedOnUser(HANDLE hToken) ImpersonateLoggedOnUser(HANDLE hToken)
{ {
return FALSE; return FALSE;
} }
/* /*
* @implemented * @implemented
*/ */

View file

@ -1,20 +1,18 @@
/* /* $Id: sec.c,v 1.18 2004/02/25 14:25:11 ekohl Exp $
*
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
* FILE: lib/advapi32/sec/sec.c * FILE: lib/advapi32/sec/sec.c
* PURPOSE: Registry functions * PURPOSE: Security descriptor functions
* PROGRAMMER: Ariadne ( ariadne@xs4all.nl) * PROGRAMMER: Ariadne ( ariadne@xs4all.nl)
* Steven Edwards ( Steven_Ed4153@yahoo.com ) * Steven Edwards ( Steven_Ed4153@yahoo.com )
* Andrew Greenwood ( silverblade_uk@hotmail.com ) * Andrew Greenwood ( silverblade_uk@hotmail.com )
* UPDATE HISTORY: * UPDATE HISTORY:
* Created 01/11/98 * Created 01/11/98
* Added a few new stubs 6/27/03
* Added stubs for GetSecurityInfo/Ex 8/18/03
*/ */
#define NTOS_MODE_USER #define NTOS_MODE_USER
#include <windows.h> #include <windows.h>
// #include <accctrl.h>
#include <ntos.h> #include <ntos.h>
@ -399,130 +397,4 @@ SetSecurityDescriptorSacl (
return TRUE; return TRUE;
} }
/*
* @unimplemented
*/
BOOL STDCALL
GetUserNameA(LPSTR lpBuffer, LPDWORD nSize)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
GetUserNameW(LPWSTR lpBuffer, LPDWORD nSize)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL
STDCALL
GetFileSecurityA (
LPCSTR lpFileName,
SECURITY_INFORMATION RequestedInformation,
PSECURITY_DESCRIPTOR pSecurityDescriptor,
DWORD nLength,
LPDWORD lpnLengthNeeded
)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL
STDCALL
GetFileSecurityW (
LPCWSTR lpFileName,
SECURITY_INFORMATION RequestedInformation,
PSECURITY_DESCRIPTOR pSecurityDescriptor,
DWORD nLength,
LPDWORD lpnLengthNeeded
)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL
STDCALL
SetFileSecurityA (
LPCSTR lpFileName,
SECURITY_INFORMATION SecurityInformation,
PSECURITY_DESCRIPTOR pSecurityDescriptor
)
{
return(FALSE);
}
/*
* @unimplemented
*/
STDCALL DWORD GetSecurityInfo (
HANDLE handle,
UINT ObjectType, // SE_OBJECT_TYPE
SECURITY_INFORMATION SecurityInfo,
PSID *ppsidOwner,
PSID *ppsidGroup,
PACL *ppDacl,
PACL *ppSacl,
PSECURITY_DESCRIPTOR *ppSecurityDescriptor
)
{
return FALSE;
}
/*
* @unimplemented
*/
STDCALL DWORD GetSecurityInfoExA(
HANDLE hObject,
UINT ObjectType, // SE_OBJECT_TYPE
SECURITY_INFORMATION SecurityInfo,
LPCSTR lpProvider,
LPCSTR lpProperty,
VOID *ppAccessList, // PACTRL_ACCESS
VOID *ppAuditList, // PACTRL_AUDIT
LPCSTR *lppOwner,
LPCSTR *lppGroup
)
{
return FALSE;
}
/*
* @unimplemented
*/
STDCALL DWORD GetSecurityInfoExW(
HANDLE hObject,
UINT ObjectType, // SE_OBJECT_TYPE
SECURITY_INFORMATION SecurityInfo,
LPCWSTR lpProvider,
LPCWSTR lpProperty,
VOID *ppAccessList, // PACTRL_ACCESS
VOID *ppAuditList, // PACTRL_AUDIT
LPWSTR *lppOwner,
LPWSTR *lppGroup
)
{
return FALSE;
}
/* EOF */ /* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: sid.c,v 1.9 2004/01/20 01:40:19 ekohl Exp $ /* $Id: sid.c,v 1.10 2004/02/25 14:25:11 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -237,68 +237,4 @@ IsValidSid(PSID pSid)
return((BOOL)RtlValidSid(pSid)); return((BOOL)RtlValidSid(pSid));
} }
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountNameA(LPCSTR lpSystemName,
LPCSTR lpAccountName,
PSID Sid,
LPDWORD cbSid,
LPSTR DomainName,
LPDWORD cbDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountNameW(LPCWSTR lpSystemName,
LPCWSTR lpAccountName,
PSID Sid,
LPDWORD cbSid,
LPWSTR DomainName,
LPDWORD cbDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountSidA(LPCSTR lpSystemName,
PSID Sid,
LPSTR Name,
LPDWORD cbName,
LPSTR ReferencedDomainName,
LPDWORD cbReferencedDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL
LookupAccountSidW(LPCWSTR lpSystemName,
PSID Sid,
LPWSTR Name,
LPDWORD cbName,
LPWSTR ReferencedDomainName,
LPDWORD cbReferencedDomainName,
PSID_NAME_USE peUse)
{
return(FALSE);
}
/* EOF */ /* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: privilege.c,v 1.5 2003/07/20 15:16:32 ekohl Exp $ /* $Id: privilege.c,v 1.6 2004/02/25 14:25:11 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -14,174 +14,129 @@
/********************************************************************** /**********************************************************************
* LookupPrivilegeValueA EXPORTED * LookupPrivilegeValueA EXPORTED
* LookupPrivilegeValueW EXPORTED
* *
* @implemented * @implemented
*/ */
BOOL STDCALL LookupPrivilegeValueA ( BOOL STDCALL
LPCSTR lpSystemName, LookupPrivilegeValueA (LPCSTR lpSystemName,
LPCSTR lpName, LPCSTR lpName,
PLUID lpLuid PLUID lpLuid)
)
{ {
BOOL rv = FALSE; UNICODE_STRING SystemName;
DWORD le = ERROR_SUCCESS; UNICODE_STRING Name;
BOOL Result;
ANSI_STRING SystemNameA;
UNICODE_STRING SystemNameW;
ANSI_STRING NameA;
UNICODE_STRING NameW;
HANDLE ProcessHeap = GetProcessHeap ();
/* Remote system? */ /* Remote system? */
if (NULL != lpSystemName) if (lpSystemName != NULL)
{ {
RtlInitAnsiString ( RtlCreateUnicodeStringFromAsciiz (&SystemName,
& SystemNameA, (LPSTR)lpSystemName);
(LPSTR) lpSystemName
);
RtlAnsiStringToUnicodeString (
& SystemNameW,
& SystemNameA,
TRUE
);
} }
/* Check the privilege name is not NULL */ /* Check the privilege name is not NULL */
if (NULL != lpName) if (lpName == NULL)
{
RtlInitAnsiString (
& NameA,
(LPSTR) lpName
);
RtlAnsiStringToUnicodeString (
& NameW,
& NameA,
TRUE
);
}
else
{ {
SetLastError (ERROR_INVALID_PARAMETER); SetLastError (ERROR_INVALID_PARAMETER);
return (FALSE); return FALSE;
}
/*
* Forward the call to the UNICODE version
* of this API.
*/
if (FALSE == (rv = LookupPrivilegeValueW (
(lpSystemName ? SystemNameW.Buffer : NULL),
NameW.Buffer,
lpLuid
)
)
)
{
le = GetLastError ();
} }
RtlCreateUnicodeStringFromAsciiz (&Name,
(LPSTR)lpName);
Result = LookupPrivilegeValueW ((lpSystemName != NULL) ? SystemName.Buffer : NULL,
Name.Buffer,
lpLuid);
RtlFreeUnicodeString (&Name);
/* Remote system? */ /* Remote system? */
if (NULL != lpSystemName) if (lpSystemName != NULL)
{ {
RtlFreeHeap ( RtlFreeUnicodeString (&SystemName);
ProcessHeap,
0,
SystemNameW.Buffer
);
} }
/* Name */
RtlFreeHeap ( return Result;
ProcessHeap, }
0,
NameW.Buffer
); /**********************************************************************
/* * LookupPrivilegeValueW EXPORTED
* Set the last error, if any reported by *
* the UNICODE call. * @unimplemented
*/ */
if (ERROR_SUCCESS != le) BOOL STDCALL
{ LookupPrivilegeValueW (LPCWSTR lpSystemName,
SetLastError (le);
}
return (rv);
}
BOOL STDCALL LookupPrivilegeValueW (
LPCWSTR lpSystemName,
LPCWSTR lpName, LPCWSTR lpName,
PLUID lpLuid PLUID lpLuid)
)
{ {
SetLastError (ERROR_CALL_NOT_IMPLEMENTED); SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE); return FALSE;
} }
/********************************************************************** /**********************************************************************
* LookupPrivilegeDisplayNameA EXPORTED * LookupPrivilegeDisplayNameA EXPORTED
*
* @unimplemented
*/
BOOL STDCALL
LookupPrivilegeDisplayNameA (LPCSTR lpSystemName,
LPCSTR lpName,
LPSTR lpDisplayName,
LPDWORD cbDisplayName,
LPDWORD lpLanguageId)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return FALSE;
}
/**********************************************************************
* LookupPrivilegeDisplayNameW EXPORTED * LookupPrivilegeDisplayNameW EXPORTED
* *
* @unimplemented * @unimplemented
*/ */
BOOL STDCALL LookupPrivilegeDisplayNameA ( BOOL STDCALL
LPCSTR lpSystemName, LookupPrivilegeDisplayNameW (LPCWSTR lpSystemName,
LPCSTR lpName,
LPSTR lpDisplayName,
LPDWORD cbDisplayName,
LPDWORD lpLanguageId
)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL LookupPrivilegeDisplayNameW (
LPCWSTR lpSystemName,
LPCWSTR lpName, LPCWSTR lpName,
LPWSTR lpDisplayName, LPWSTR lpDisplayName,
LPDWORD cbDisplayName, LPDWORD cbDisplayName,
LPDWORD lpLanguageId LPDWORD lpLanguageId)
)
{ {
SetLastError (ERROR_CALL_NOT_IMPLEMENTED); SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE); return FALSE;
} }
/********************************************************************** /**********************************************************************
* LookupPrivilegeNameA EXPORTED * LookupPrivilegeNameA EXPORTED
*
* @unimplemented
*/
BOOL STDCALL
LookupPrivilegeNameA (LPCSTR lpSystemName,
PLUID lpLuid,
LPSTR lpName,
LPDWORD cbName)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return FALSE;
}
/**********************************************************************
* LookupPrivilegeNameW EXPORTED * LookupPrivilegeNameW EXPORTED
* *
* @unimplemented * @unimplemented
*/ */
BOOL STDCALL LookupPrivilegeNameA ( BOOL STDCALL
LPCSTR lpSystemName, LookupPrivilegeNameW (LPCWSTR lpSystemName,
PLUID lpLuid,
LPSTR lpName,
LPDWORD cbName
)
{
SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE);
}
/*
* @unimplemented
*/
BOOL STDCALL LookupPrivilegeNameW (
LPCWSTR lpSystemName,
PLUID lpLuid, PLUID lpLuid,
LPWSTR lpName, LPWSTR lpName,
LPDWORD cbName LPDWORD cbName)
)
{ {
SetLastError (ERROR_CALL_NOT_IMPLEMENTED); SetLastError (ERROR_CALL_NOT_IMPLEMENTED);
return (FALSE); return FALSE;
} }

View file

@ -1,4 +1,4 @@
/* $Id: token.c,v 1.8 2004/01/20 01:40:19 ekohl Exp $ /* $Id: token.c,v 1.9 2004/02/25 14:25:11 ekohl Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS system libraries * PROJECT: ReactOS system libraries
@ -17,22 +17,27 @@
* @implemented * @implemented
*/ */
BOOL STDCALL BOOL STDCALL
AdjustTokenGroups ( AdjustTokenGroups (HANDLE TokenHandle,
HANDLE TokenHandle,
BOOL ResetToDefault, BOOL ResetToDefault,
PTOKEN_GROUPS NewState, PTOKEN_GROUPS NewState,
DWORD BufferLength, DWORD BufferLength,
PTOKEN_GROUPS PreviousState, PTOKEN_GROUPS PreviousState,
PDWORD ReturnLength PDWORD ReturnLength)
)
{ {
NTSTATUS errCode; NTSTATUS Status;
errCode = NtAdjustGroupsToken(TokenHandle,ResetToDefault,NewState,
BufferLength, PreviousState, (PULONG)ReturnLength ); Status = NtAdjustGroupsToken (TokenHandle,
if ( !NT_SUCCESS(errCode) ) { ResetToDefault,
SetLastError(RtlNtStatusToDosError(errCode)); NewState,
BufferLength,
PreviousState,
(PULONG)ReturnLength);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE; return FALSE;
} }
return TRUE; return TRUE;
} }
@ -41,21 +46,27 @@ AdjustTokenGroups (
* @implemented * @implemented
*/ */
BOOL STDCALL BOOL STDCALL
AdjustTokenPrivileges ( AdjustTokenPrivileges (HANDLE TokenHandle,
HANDLE TokenHandle,
BOOL DisableAllPrivileges, BOOL DisableAllPrivileges,
PTOKEN_PRIVILEGES NewState, PTOKEN_PRIVILEGES NewState,
DWORD BufferLength, DWORD BufferLength,
PTOKEN_PRIVILEGES PreviousState, PTOKEN_PRIVILEGES PreviousState,
PDWORD ReturnLength PDWORD ReturnLength)
) {
{ NTSTATUS errCode; NTSTATUS Status;
errCode = NtAdjustPrivilegesToken(TokenHandle,DisableAllPrivileges,NewState,
BufferLength, PreviousState, (PULONG)ReturnLength ); Status = NtAdjustPrivilegesToken (TokenHandle,
if ( !NT_SUCCESS(errCode) ) { DisableAllPrivileges,
SetLastError(RtlNtStatusToDosError(errCode)); NewState,
BufferLength,
PreviousState,
(PULONG)ReturnLength);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE; return FALSE;
} }
return TRUE; return TRUE;
} }
@ -64,21 +75,25 @@ AdjustTokenPrivileges (
* @implemented * @implemented
*/ */
BOOL STDCALL BOOL STDCALL
GetTokenInformation ( GetTokenInformation (HANDLE TokenHandle,
HANDLE TokenHandle,
TOKEN_INFORMATION_CLASS TokenInformationClass, TOKEN_INFORMATION_CLASS TokenInformationClass,
LPVOID TokenInformation, LPVOID TokenInformation,
DWORD TokenInformationLength, DWORD TokenInformationLength,
PDWORD ReturnLength PDWORD ReturnLength)
)
{ {
NTSTATUS errCode; NTSTATUS Status;
errCode = NtQueryInformationToken(TokenHandle,TokenInformationClass,TokenInformation,
TokenInformationLength, (PULONG)ReturnLength); Status = NtQueryInformationToken (TokenHandle,
if ( !NT_SUCCESS(errCode) ) { TokenInformationClass,
SetLastError(RtlNtStatusToDosError(errCode)); TokenInformation,
TokenInformationLength,
(PULONG)ReturnLength);
if (!NT_SUCCESS (Status))
{
SetLastError (RtlNtStatusToDosError (Status));
return FALSE; return FALSE;
} }
return TRUE; return TRUE;
} }
@ -87,20 +102,23 @@ GetTokenInformation (
* @implemented * @implemented
*/ */
BOOL STDCALL BOOL STDCALL
SetTokenInformation ( SetTokenInformation (HANDLE TokenHandle,
HANDLE TokenHandle,
TOKEN_INFORMATION_CLASS TokenInformationClass, TOKEN_INFORMATION_CLASS TokenInformationClass,
LPVOID TokenInformation, LPVOID TokenInformation,
DWORD TokenInformationLength DWORD TokenInformationLength)
)
{ {
NTSTATUS errCode; NTSTATUS Status;
errCode = NtSetInformationToken(TokenHandle,TokenInformationClass,TokenInformation,
Status = NtSetInformationToken (TokenHandle,
TokenInformationClass,
TokenInformation,
TokenInformationLength); TokenInformationLength);
if ( !NT_SUCCESS(errCode) ) { if (!NT_SUCCESS (Status))
SetLastError(RtlNtStatusToDosError(errCode)); {
SetLastError (RtlNtStatusToDosError (Status));
return FALSE; return FALSE;
} }
return TRUE; return TRUE;
} }