mirror of
https://github.com/reactos/reactos.git
synced 2024-06-29 01:12:06 +00:00
Added Se Stubs, Prototypes and Exports.
svn path=/trunk/; revision=10370
This commit is contained in:
parent
01767fb5d8
commit
c5a9f20753
|
@ -1,6 +1,6 @@
|
|||
#ifndef _INCLUDE_DDK_SEFUNCS_H
|
||||
#define _INCLUDE_DDK_SEFUNCS_H
|
||||
/* $Id: sefuncs.h,v 1.20 2003/02/15 22:29:45 ekohl Exp $ */
|
||||
/* $Id: sefuncs.h,v 1.21 2004/08/03 19:20:38 ion Exp $ */
|
||||
|
||||
#ifdef __NTOSKRNL__
|
||||
extern PACL EXPORTED SePublicDefaultDacl;
|
||||
|
@ -35,23 +35,97 @@ SeAssignSecurity(IN PSECURITY_DESCRIPTOR ParentDescriptor OPTIONAL,
|
|||
IN PGENERIC_MAPPING GenericMapping,
|
||||
IN POOL_TYPE PoolType);
|
||||
|
||||
BOOLEAN STDCALL
|
||||
SeAuditingFileEvents(IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor);
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeAssignSecurityEx(
|
||||
IN PSECURITY_DESCRIPTOR ParentDescriptor OPTIONAL,
|
||||
IN PSECURITY_DESCRIPTOR ExplicitDescriptor OPTIONAL,
|
||||
OUT PSECURITY_DESCRIPTOR *NewDescriptor,
|
||||
IN GUID *ObjectType OPTIONAL,
|
||||
IN BOOLEAN IsDirectoryObject,
|
||||
IN ULONG AutoInheritFlags,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||
IN PGENERIC_MAPPING GenericMapping,
|
||||
IN POOL_TYPE PoolType
|
||||
);
|
||||
|
||||
|
||||
VOID
|
||||
STDCALL
|
||||
SeAuditHardLinkCreation(
|
||||
IN PUNICODE_STRING FileName,
|
||||
IN PUNICODE_STRING LinkName,
|
||||
IN BOOLEAN bSuccess
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingFileEvents(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingFileEventsWithContext(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingHardLinkEvents(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingHardLinkEventsWithContext(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingFileOrGlobalEvents(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext
|
||||
);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeCaptureSecurityDescriptor(
|
||||
IN PSECURITY_DESCRIPTOR OriginalSecurityDescriptor,
|
||||
IN KPROCESSOR_MODE CurrentMode,
|
||||
IN POOL_TYPE PoolType,
|
||||
IN BOOLEAN CaptureIfKernel,
|
||||
OUT PSECURITY_DESCRIPTOR *CapturedSecurityDescriptor
|
||||
);
|
||||
|
||||
BOOLEAN STDCALL
|
||||
SeAuditingFileOrGlobalEvents(IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext);
|
||||
|
||||
VOID STDCALL
|
||||
SeCaptureSubjectContext(OUT PSECURITY_SUBJECT_CONTEXT SubjectContext);
|
||||
|
||||
NTSTATUS STDCALL
|
||||
SeCreateAccessState(OUT PACCESS_STATE AccessState,
|
||||
IN PVOID AuxData,
|
||||
IN ACCESS_MASK AccessMask,
|
||||
IN PGENERIC_MAPPING Mapping);
|
||||
VOID
|
||||
STDCALL
|
||||
SeCloseObjectAuditAlarm(
|
||||
IN PVOID Object,
|
||||
IN HANDLE Handle,
|
||||
IN BOOLEAN PerformAction
|
||||
);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeCreateAccessState(
|
||||
PACCESS_STATE AccessState,
|
||||
PVOID AuxData,
|
||||
ACCESS_MASK Access,
|
||||
PGENERIC_MAPPING GenericMapping
|
||||
);
|
||||
|
||||
NTSTATUS STDCALL
|
||||
SeCreateClientSecurity(IN struct _ETHREAD *Thread,
|
||||
|
@ -59,6 +133,15 @@ SeCreateClientSecurity(IN struct _ETHREAD *Thread,
|
|||
IN BOOLEAN RemoteClient,
|
||||
OUT PSECURITY_CLIENT_CONTEXT ClientContext);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeCreateClientSecurityFromSubjectContext(
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||
IN PSECURITY_QUALITY_OF_SERVICE ClientSecurityQos,
|
||||
IN BOOLEAN ServerIsRemote,
|
||||
OUT PSECURITY_CLIENT_CONTEXT ClientContext
|
||||
);
|
||||
|
||||
NTSTATUS STDCALL
|
||||
SeDeassignSecurity(IN OUT PSECURITY_DESCRIPTOR* SecurityDescriptor);
|
||||
|
||||
|
@ -69,6 +152,17 @@ VOID STDCALL
|
|||
SeDeleteObjectAuditAlarm(IN PVOID Object,
|
||||
IN HANDLE Handle);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeFilterToken(
|
||||
IN PACCESS_TOKEN ExistingToken,
|
||||
IN ULONG Flags,
|
||||
IN PTOKEN_GROUPS SidsToDisable OPTIONAL,
|
||||
IN PTOKEN_PRIVILEGES PrivilegesToDelete OPTIONAL,
|
||||
IN PTOKEN_GROUPS RestrictedSids OPTIONAL,
|
||||
OUT PACCESS_TOKEN * FilteredToken
|
||||
);
|
||||
|
||||
VOID STDCALL
|
||||
SeFreePrivileges(IN PPRIVILEGE_SET Privileges);
|
||||
|
||||
|
@ -76,12 +170,20 @@ VOID STDCALL
|
|||
SeImpersonateClient(IN PSECURITY_CLIENT_CONTEXT ClientContext,
|
||||
IN struct _ETHREAD *ServerThread OPTIONAL);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeImpersonateClientEx(
|
||||
IN PSECURITY_CLIENT_CONTEXT ClientContext,
|
||||
IN struct _ETHREAD *ServerThread OPTIONAL
|
||||
);
|
||||
|
||||
VOID STDCALL
|
||||
SeLockSubjectContext(IN PSECURITY_SUBJECT_CONTEXT SubjectContext);
|
||||
|
||||
NTSTATUS STDCALL
|
||||
SeMarkLogonSessionForTerminationNotification(IN PLUID LogonId);
|
||||
|
||||
|
||||
VOID STDCALL
|
||||
SeOpenObjectAuditAlarm(IN PUNICODE_STRING ObjectTypeName,
|
||||
IN PVOID Object OPTIONAL,
|
||||
|
@ -109,19 +211,54 @@ SePrivilegeCheck(IN OUT PPRIVILEGE_SET RequiredPrivileges,
|
|||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||
IN KPROCESSOR_MODE AccessMode);
|
||||
|
||||
VOID
|
||||
STDCALL
|
||||
SePrivilegeObjectAuditAlarm(
|
||||
IN HANDLE Handle,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||
IN ACCESS_MASK DesiredAccess,
|
||||
IN PPRIVILEGE_SET Privileges,
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN KPROCESSOR_MODE CurrentMode
|
||||
);
|
||||
|
||||
NTSTATUS STDCALL
|
||||
SeQueryAuthenticationIdToken(IN PACCESS_TOKEN Token,
|
||||
OUT PLUID LogonId);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeQueryInformationToken(
|
||||
IN PACCESS_TOKEN Token,
|
||||
IN TOKEN_INFORMATION_CLASS TokenInformationClass,
|
||||
OUT PVOID *TokenInformation
|
||||
);
|
||||
|
||||
NTSTATUS STDCALL
|
||||
SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
|
||||
OUT PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN OUT PULONG Length,
|
||||
IN PSECURITY_DESCRIPTOR *ObjectsSecurityDescriptor);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeQuerySessionIdToken(
|
||||
IN PACCESS_TOKEN,
|
||||
IN PULONG pSessionId
|
||||
);
|
||||
|
||||
|
||||
NTSTATUS STDCALL
|
||||
SeRegisterLogonSessionTerminatedRoutine(IN PSE_LOGON_SESSION_TERMINATED_ROUTINE CallbackRoutine);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeReleaseSecurityDescriptor(
|
||||
IN PSECURITY_DESCRIPTOR CapturedSecurityDescriptor,
|
||||
IN KPROCESSOR_MODE CurrentMode,
|
||||
IN BOOLEAN CaptureIfKernelMode
|
||||
);
|
||||
|
||||
VOID STDCALL
|
||||
SeReleaseSubjectContext(IN PSECURITY_SUBJECT_CONTEXT SubjectContext);
|
||||
|
||||
|
@ -137,6 +274,18 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
|
|||
IN POOL_TYPE PoolType,
|
||||
IN PGENERIC_MAPPING GenericMapping);
|
||||
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeSetSecurityDescriptorInfoEx(
|
||||
IN PVOID Object OPTIONAL,
|
||||
IN PSECURITY_INFORMATION SecurityInformation,
|
||||
IN PSECURITY_DESCRIPTOR ModificationDescriptor,
|
||||
IN OUT PSECURITY_DESCRIPTOR *ObjectsSecurityDescriptor,
|
||||
IN ULONG AutoInheritFlags,
|
||||
IN POOL_TYPE PoolType,
|
||||
IN PGENERIC_MAPPING GenericMapping
|
||||
);
|
||||
|
||||
BOOLEAN STDCALL
|
||||
SeSinglePrivilegeCheck(IN LUID PrivilegeValue,
|
||||
IN KPROCESSOR_MODE PreviousMode);
|
||||
|
@ -144,6 +293,24 @@ SeSinglePrivilegeCheck(IN LUID PrivilegeValue,
|
|||
SECURITY_IMPERSONATION_LEVEL STDCALL
|
||||
SeTokenImpersonationLevel(IN PACCESS_TOKEN Token);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeTokenIsAdmin(
|
||||
IN PACCESS_TOKEN Token
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeTokenIsRestricted(
|
||||
IN PACCESS_TOKEN Token
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeTokenIsWriteRestricted(
|
||||
IN PACCESS_TOKEN Token
|
||||
);
|
||||
|
||||
TOKEN_TYPE STDCALL
|
||||
SeTokenType(IN PACCESS_TOKEN Token);
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
; $Id: ntoskrnl.edf,v 1.172 2004/07/17 05:13:05 ion Exp $
|
||||
; $Id: ntoskrnl.edf,v 1.173 2004/08/03 19:20:39 ion Exp $
|
||||
;
|
||||
; reactos/ntoskrnl/ntoskrnl.def
|
||||
;
|
||||
|
@ -966,41 +966,55 @@ RtlxOemStringToUnicodeSize=RtlxOemStringToUnicodeSize@4
|
|||
RtlxUnicodeStringToAnsiSize=RtlxUnicodeStringToAnsiSize@4
|
||||
RtlxUnicodeStringToOemSize=RtlxUnicodeStringToOemSize@4
|
||||
SeAccessCheck=SeAccessCheck@40
|
||||
;SeAppendPrivileges=SeAppendPrivileges@8
|
||||
SeAppendPrivileges=SeAppendPrivileges@8
|
||||
SeAssignSecurity=SeAssignSecurity@28
|
||||
;SeAuditingFileEvents=SeAuditingFileEvents@8
|
||||
;SeAuditingFileOrGlobalEvents=SeAuditingFileOrGlobalEvents@18
|
||||
;SeCaptureSecurityDescriptor=SeCaptureSecurityDescriptor@20
|
||||
SeAssignSecurityEx=SeAssignSecurityEx@36
|
||||
SeAuditHardLinkCreation=SeAuditHardLinkCreation@12
|
||||
SeAuditingFileEvents=SeAuditingFileEvents@8
|
||||
SeAuditingFileEventsWithContext=SeAuditingFileEventsWithContext@12
|
||||
SeAuditingFileOrGlobalEvents=SeAuditingFileOrGlobalEvents@12
|
||||
SeAuditingHardLinkEvents=SeAuditingHardLinkEvents@8
|
||||
SeAuditingHardLinkEventsWithContext=SeAuditingHardLinkEventsWithContext@12
|
||||
SeCaptureSecurityDescriptor=SeCaptureSecurityDescriptor@20
|
||||
SeCaptureSubjectContext=SeCaptureSubjectContext@4
|
||||
;SeCloseObjectAuditAlarm=SeCloseObjectAuditAlarm@12
|
||||
;SeCreateAccessState=SeCreateAccessState@16
|
||||
SeCloseObjectAuditAlarm=SeCloseObjectAuditAlarm@12
|
||||
SeCreateAccessState=SeCreateAccessState@16
|
||||
SeCreateClientSecurity=SeCreateClientSecurity@16
|
||||
SeCreateClientSecurityFromSubjectContext=SeCreateClientSecurityFromSubjectContext@16
|
||||
SeDeassignSecurity=SeDeassignSecurity@4
|
||||
;SeDeleteAccessState=SeDeleteAccessState@4
|
||||
SeDeleteAccessState=SeDeleteAccessState@4
|
||||
SeDeleteObjectAuditAlarm=SeDeleteObjectAuditAlarm@8
|
||||
SeExports DATA
|
||||
;SeFreePrivileges=SeFreePrivileges@4
|
||||
SeFilterToken=SeFilterToken@24
|
||||
SeFreePrivileges=SeFreePrivileges@4
|
||||
SeImpersonateClient=SeImpersonateClient@8
|
||||
SeImpersonateClientEx=SeImpersonateClientEx@8
|
||||
SeLockSubjectContext=SeLockSubjectContext@4
|
||||
;SeMarkLogonSessionForTerminationNotification=SeMarkLogonSessionForTerminationNotification@4
|
||||
SeMarkLogonSessionForTerminationNotification=SeMarkLogonSessionForTerminationNotification@4
|
||||
SeOpenObjectAuditAlarm=SeOpenObjectAuditAlarm@36
|
||||
SeOpenObjectForDeleteAuditAlarm=SeOpenObjectForDeleteAuditAlarm@36
|
||||
SePrivilegeCheck=SePrivilegeCheck@12
|
||||
;SePrivilegeObjectAuditAlarm=SePrivilegeObjectAuditAlarm@24
|
||||
SePrivilegeObjectAuditAlarm=SePrivilegeObjectAuditAlarm@24
|
||||
SePublicDefaultDacl DATA
|
||||
SeQueryAuthenticationIdToken=SeQueryAuthenticationIdToken@8
|
||||
SeQueryInformationToken=SeQueryInformationToken@12
|
||||
SeQuerySecurityDescriptorInfo=SeQuerySecurityDescriptorInfo@16
|
||||
;SeRegisterLogonSessionTerminatedRoutine=SeRegisterLogonSessionTerminatedRoutine@4
|
||||
;SeReleaseSecurityDescriptor=SeReleaseSecurityDescriptor@12
|
||||
SeQuerySessionIdToken=SeQuerySessionIdToken@8
|
||||
SeRegisterLogonSessionTerminatedRoutine=SeRegisterLogonSessionTerminatedRoutine@4
|
||||
SeReleaseSecurityDescriptor=SeReleaseSecurityDescriptor@12
|
||||
SeReleaseSubjectContext=SeReleaseSubjectContext@4
|
||||
;SeSetAccessStateGenericMapping=SeSetAccessStateGenericMapping@8
|
||||
SeSetAccessStateGenericMapping=SeSetAccessStateGenericMapping@8
|
||||
SeSetSecurityDescriptorInfo=SeSetSecurityDescriptorInfo@24
|
||||
SeSetSecurityDescriptorInfoEx=SeSetSecurityDescriptorInfoEx@28
|
||||
SeSinglePrivilegeCheck=SeSinglePrivilegeCheck@12
|
||||
SeSystemDefaultDacl DATA
|
||||
SeTokenImpersonationLevel=SeTokenImpersonationLevel@4
|
||||
SeTokenType=SeTokenType@4
|
||||
SeTokenIsAdmin=SeTokenIsAdmin@4
|
||||
SeTokenIsRestricted=SeTokenIsRestricted@4
|
||||
SeTokenIsWriteRestricted=SeTokenIsWriteRestricted@4
|
||||
SeUnlockSubjectContext=SeUnlockSubjectContext@4
|
||||
;SeUnregisterLogonSessionTerminatedRoutine=SeUnregisterLogonSessionTerminatedRoutine@4
|
||||
SeUnregisterLogonSessionTerminatedRoutine=SeUnregisterLogonSessionTerminatedRoutine@4
|
||||
SeValidSecurityDescriptor=SeValidSecurityDescriptor@8
|
||||
WRITE_REGISTER_UCHAR=WRITE_REGISTER_UCHAR@8
|
||||
WRITE_REGISTER_ULONG=WRITE_REGISTER_ULONG@8
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $Id: access.c,v 1.4 2003/07/11 01:23:16 royce Exp $
|
||||
/* $Id: access.c,v 1.5 2004/08/03 19:20:39 ion Exp $
|
||||
*
|
||||
* COPYRIGHT: See COPYING in the top level directory
|
||||
* PROJECT: ReactOS kernel
|
||||
|
@ -13,6 +13,8 @@
|
|||
|
||||
#include <ddk/ntddk.h>
|
||||
|
||||
#define NDEBUG
|
||||
#include <internal/debug.h>
|
||||
|
||||
/* FUNCTIONS ***************************************************************/
|
||||
|
||||
|
@ -66,4 +68,45 @@ RtlMapGenericMask (
|
|||
*AccessMask &= 0x0FFFFFFF;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeCreateAccessState(
|
||||
PACCESS_STATE AccessState,
|
||||
PVOID AuxData,
|
||||
ACCESS_MASK Access,
|
||||
PGENERIC_MAPPING GenericMapping
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
VOID
|
||||
STDCALL
|
||||
SeDeleteAccessState(
|
||||
IN PACCESS_STATE AccessState
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
VOID
|
||||
STDCALL
|
||||
SeSetAccessStateGenericMapping(
|
||||
PACCESS_STATE AccessState,
|
||||
PGENERIC_MAPPING GenericMapping
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
/* EOF */
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $Id: audit.c,v 1.4 2004/05/20 12:42:11 ekohl Exp $
|
||||
/* $Id: audit.c,v 1.5 2004/08/03 19:20:39 ion Exp $
|
||||
*
|
||||
* COPYRIGHT: See COPYING in the top level directory
|
||||
* PROJECT: ReactOS kernel
|
||||
|
@ -101,6 +101,107 @@ NtPrivilegeObjectAuditAlarm(IN PUNICODE_STRING SubsystemName,
|
|||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
VOID
|
||||
STDCALL
|
||||
SeAuditHardLinkCreation(
|
||||
IN PUNICODE_STRING FileName,
|
||||
IN PUNICODE_STRING LinkName,
|
||||
IN BOOLEAN bSuccess
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingFileEvents(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingFileEventsWithContext(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingHardLinkEvents(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingHardLinkEventsWithContext(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeAuditingFileOrGlobalEvents(
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
VOID
|
||||
STDCALL
|
||||
SeCloseObjectAuditAlarm(
|
||||
IN PVOID Object,
|
||||
IN HANDLE Handle,
|
||||
IN BOOLEAN PerformAction
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
|
@ -147,4 +248,21 @@ SeOpenObjectForDeleteAuditAlarm(IN PUNICODE_STRING ObjectTypeName,
|
|||
UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
VOID
|
||||
STDCALL
|
||||
SePrivilegeObjectAuditAlarm(
|
||||
IN HANDLE Handle,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||
IN ACCESS_MASK DesiredAccess,
|
||||
IN PPRIVILEGE_SET Privileges,
|
||||
IN BOOLEAN AccessGranted,
|
||||
IN KPROCESSOR_MODE CurrentMode
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
/* EOF */
|
||||
|
|
|
@ -1,7 +1,11 @@
|
|||
/* $Id: lsa.c,v 1.3 2002/09/08 10:23:43 chorns Exp $
|
||||
/* $Id: lsa.c,v 1.4 2004/08/03 19:20:39 ion Exp $
|
||||
*/
|
||||
#include <ddk/ntddk.h>
|
||||
|
||||
#define NDEBUG
|
||||
#include <internal/debug.h>
|
||||
|
||||
|
||||
/* LsaCallAuthenticationPackage@28 */
|
||||
NTSTATUS STDCALL LsaCallAuthenticationPackage (
|
||||
DWORD Unknown0,
|
||||
|
@ -79,5 +83,44 @@ NTSTATUS STDCALL LsaRegisterLogonProcess (
|
|||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeMarkLogonSessionForTerminationNotification(
|
||||
IN PLUID LogonId
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeRegisterLogonSessionTerminatedRoutine(
|
||||
IN PSE_LOGON_SESSION_TERMINATED_ROUTINE CallbackRoutine
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeUnregisterLogonSessionTerminatedRoutine(
|
||||
IN PSE_LOGON_SESSION_TERMINATED_ROUTINE CallbackRoutine
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
|
||||
/* EOF */
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $Id: sd.c,v 1.17 2004/07/31 12:21:19 ekohl Exp $
|
||||
/* $Id: sd.c,v 1.18 2004/08/03 19:20:39 ion Exp $
|
||||
*
|
||||
* COPYRIGHT: See COPYING in the top level directory
|
||||
* PROJECT: ReactOS kernel
|
||||
|
@ -111,6 +111,22 @@ SepInitSDs(VOID)
|
|||
return TRUE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeCaptureSecurityDescriptor(
|
||||
IN PSECURITY_DESCRIPTOR OriginalSecurityDescriptor,
|
||||
IN KPROCESSOR_MODE CurrentMode,
|
||||
IN POOL_TYPE PoolType,
|
||||
IN BOOLEAN CaptureIfKernel,
|
||||
OUT PSECURITY_DESCRIPTOR *CapturedSecurityDescriptor
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @implemented
|
||||
|
@ -247,6 +263,20 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
|
|||
return STATUS_SUCCESS;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeReleaseSecurityDescriptor(
|
||||
IN PSECURITY_DESCRIPTOR CapturedSecurityDescriptor,
|
||||
IN KPROCESSOR_MODE CurrentMode,
|
||||
IN BOOLEAN CaptureIfKernelMode
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
|
@ -263,6 +293,25 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
|
|||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeSetSecurityDescriptorInfoEx(
|
||||
IN PVOID Object OPTIONAL,
|
||||
IN PSECURITY_INFORMATION SecurityInformation,
|
||||
IN PSECURITY_DESCRIPTOR ModificationDescriptor,
|
||||
IN OUT PSECURITY_DESCRIPTOR *ObjectsSecurityDescriptor,
|
||||
IN ULONG AutoInheritFlags,
|
||||
IN POOL_TYPE PoolType,
|
||||
IN PGENERIC_MAPPING GenericMapping
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @implemented
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $Id: semgr.c,v 1.38 2004/08/03 13:58:56 ekohl Exp $
|
||||
/* $Id: semgr.c,v 1.39 2004/08/03 19:20:39 ion Exp $
|
||||
*
|
||||
* COPYRIGHT: See COPYING in the top level directory
|
||||
* PROJECT: ReactOS kernel
|
||||
|
@ -286,6 +286,26 @@ SeDeassignSecurity(PSECURITY_DESCRIPTOR *SecurityDescriptor)
|
|||
return STATUS_SUCCESS;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeAssignSecurityEx(
|
||||
IN PSECURITY_DESCRIPTOR ParentDescriptor OPTIONAL,
|
||||
IN PSECURITY_DESCRIPTOR ExplicitDescriptor OPTIONAL,
|
||||
OUT PSECURITY_DESCRIPTOR *NewDescriptor,
|
||||
IN GUID *ObjectType OPTIONAL,
|
||||
IN BOOLEAN IsDirectoryObject,
|
||||
IN ULONG AutoInheritFlags,
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||
IN PGENERIC_MAPPING GenericMapping,
|
||||
IN POOL_TYPE PoolType
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* FUNCTION: Creates a security descriptor for a new object.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $Id: token.c,v 1.37 2004/07/13 08:43:35 ekohl Exp $
|
||||
/* $Id: token.c,v 1.38 2004/08/03 19:20:39 ion Exp $
|
||||
*
|
||||
* COPYRIGHT: See COPYING in the top level directory
|
||||
* PROJECT: ReactOS kernel
|
||||
|
@ -294,6 +294,19 @@ SepInitializeNewProcess(struct _EPROCESS* NewProcess,
|
|||
return(STATUS_SUCCESS);
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeAppendPrivileges(
|
||||
PACCESS_STATE AccessState,
|
||||
PPRIVILEGE_SET Privileges
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
NTSTATUS SeCopyClientToken(PACCESS_TOKEN Token,
|
||||
SECURITY_IMPERSONATION_LEVEL Level,
|
||||
|
@ -410,6 +423,66 @@ SeCreateClientSecurity(IN struct _ETHREAD *Thread,
|
|||
return(STATUS_SUCCESS);
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeCreateClientSecurityFromSubjectContext(
|
||||
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||
IN PSECURITY_QUALITY_OF_SERVICE ClientSecurityQos,
|
||||
IN BOOLEAN ServerIsRemote,
|
||||
OUT PSECURITY_CLIENT_CONTEXT ClientContext
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeFilterToken(
|
||||
IN PACCESS_TOKEN ExistingToken,
|
||||
IN ULONG Flags,
|
||||
IN PTOKEN_GROUPS SidsToDisable OPTIONAL,
|
||||
IN PTOKEN_PRIVILEGES PrivilegesToDelete OPTIONAL,
|
||||
IN PTOKEN_GROUPS RestrictedSids OPTIONAL,
|
||||
OUT PACCESS_TOKEN * FilteredToken
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
VOID
|
||||
STDCALL
|
||||
SeFreePrivileges(
|
||||
IN PPRIVILEGE_SET Privileges
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeImpersonateClientEx(
|
||||
IN PSECURITY_CLIENT_CONTEXT ClientContext,
|
||||
IN PETHREAD ServerThread OPTIONAL
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @implemented
|
||||
|
@ -741,6 +814,35 @@ NtQueryInformationToken(IN HANDLE TokenHandle,
|
|||
return(Status);
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeQueryInformationToken(
|
||||
IN PACCESS_TOKEN Token,
|
||||
IN TOKEN_INFORMATION_CLASS TokenInformationClass,
|
||||
OUT PVOID *TokenInformation
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
SeQuerySessionIdToken(
|
||||
IN PACCESS_TOKEN Token,
|
||||
IN PULONG pSessionId
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return STATUS_NOT_IMPLEMENTED;
|
||||
}
|
||||
|
||||
/*
|
||||
* NtSetTokenInformation: Partly implemented.
|
||||
* Unimplemented:
|
||||
|
@ -1559,5 +1661,44 @@ SeTokenType(IN PACCESS_TOKEN Token)
|
|||
}
|
||||
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeTokenIsAdmin(
|
||||
IN PACCESS_TOKEN Token
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeTokenIsRestricted(
|
||||
IN PACCESS_TOKEN Token
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
* @unimplemented
|
||||
*/
|
||||
BOOLEAN
|
||||
STDCALL
|
||||
SeTokenIsWriteRestricted(
|
||||
IN PACCESS_TOKEN Token
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
/* EOF */
|
||||
|
|
Loading…
Reference in a new issue