Added Se Stubs, Prototypes and Exports.

svn path=/trunk/; revision=10370
This commit is contained in:
Alex Ionescu 2004-08-03 19:20:39 +00:00
parent 01767fb5d8
commit c5a9f20753
8 changed files with 629 additions and 34 deletions

View file

@ -1,6 +1,6 @@
#ifndef _INCLUDE_DDK_SEFUNCS_H #ifndef _INCLUDE_DDK_SEFUNCS_H
#define _INCLUDE_DDK_SEFUNCS_H #define _INCLUDE_DDK_SEFUNCS_H
/* $Id: sefuncs.h,v 1.20 2003/02/15 22:29:45 ekohl Exp $ */ /* $Id: sefuncs.h,v 1.21 2004/08/03 19:20:38 ion Exp $ */
#ifdef __NTOSKRNL__ #ifdef __NTOSKRNL__
extern PACL EXPORTED SePublicDefaultDacl; extern PACL EXPORTED SePublicDefaultDacl;
@ -35,23 +35,97 @@ SeAssignSecurity(IN PSECURITY_DESCRIPTOR ParentDescriptor OPTIONAL,
IN PGENERIC_MAPPING GenericMapping, IN PGENERIC_MAPPING GenericMapping,
IN POOL_TYPE PoolType); IN POOL_TYPE PoolType);
BOOLEAN STDCALL NTSTATUS
SeAuditingFileEvents(IN BOOLEAN AccessGranted, STDCALL
IN PSECURITY_DESCRIPTOR SecurityDescriptor); SeAssignSecurityEx(
IN PSECURITY_DESCRIPTOR ParentDescriptor OPTIONAL,
IN PSECURITY_DESCRIPTOR ExplicitDescriptor OPTIONAL,
OUT PSECURITY_DESCRIPTOR *NewDescriptor,
IN GUID *ObjectType OPTIONAL,
IN BOOLEAN IsDirectoryObject,
IN ULONG AutoInheritFlags,
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
IN PGENERIC_MAPPING GenericMapping,
IN POOL_TYPE PoolType
);
VOID
STDCALL
SeAuditHardLinkCreation(
IN PUNICODE_STRING FileName,
IN PUNICODE_STRING LinkName,
IN BOOLEAN bSuccess
);
BOOLEAN
STDCALL
SeAuditingFileEvents(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor
);
BOOLEAN
STDCALL
SeAuditingFileEventsWithContext(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
);
BOOLEAN
STDCALL
SeAuditingHardLinkEvents(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor
);
BOOLEAN
STDCALL
SeAuditingHardLinkEventsWithContext(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
);
BOOLEAN
STDCALL
SeAuditingFileOrGlobalEvents(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext
);
NTSTATUS
STDCALL
SeCaptureSecurityDescriptor(
IN PSECURITY_DESCRIPTOR OriginalSecurityDescriptor,
IN KPROCESSOR_MODE CurrentMode,
IN POOL_TYPE PoolType,
IN BOOLEAN CaptureIfKernel,
OUT PSECURITY_DESCRIPTOR *CapturedSecurityDescriptor
);
BOOLEAN STDCALL
SeAuditingFileOrGlobalEvents(IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_SUBJECT_CONTEXT SubjectContext);
VOID STDCALL VOID STDCALL
SeCaptureSubjectContext(OUT PSECURITY_SUBJECT_CONTEXT SubjectContext); SeCaptureSubjectContext(OUT PSECURITY_SUBJECT_CONTEXT SubjectContext);
NTSTATUS STDCALL VOID
SeCreateAccessState(OUT PACCESS_STATE AccessState, STDCALL
IN PVOID AuxData, SeCloseObjectAuditAlarm(
IN ACCESS_MASK AccessMask, IN PVOID Object,
IN PGENERIC_MAPPING Mapping); IN HANDLE Handle,
IN BOOLEAN PerformAction
);
NTSTATUS
STDCALL
SeCreateAccessState(
PACCESS_STATE AccessState,
PVOID AuxData,
ACCESS_MASK Access,
PGENERIC_MAPPING GenericMapping
);
NTSTATUS STDCALL NTSTATUS STDCALL
SeCreateClientSecurity(IN struct _ETHREAD *Thread, SeCreateClientSecurity(IN struct _ETHREAD *Thread,
@ -59,6 +133,15 @@ SeCreateClientSecurity(IN struct _ETHREAD *Thread,
IN BOOLEAN RemoteClient, IN BOOLEAN RemoteClient,
OUT PSECURITY_CLIENT_CONTEXT ClientContext); OUT PSECURITY_CLIENT_CONTEXT ClientContext);
NTSTATUS
STDCALL
SeCreateClientSecurityFromSubjectContext(
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
IN PSECURITY_QUALITY_OF_SERVICE ClientSecurityQos,
IN BOOLEAN ServerIsRemote,
OUT PSECURITY_CLIENT_CONTEXT ClientContext
);
NTSTATUS STDCALL NTSTATUS STDCALL
SeDeassignSecurity(IN OUT PSECURITY_DESCRIPTOR* SecurityDescriptor); SeDeassignSecurity(IN OUT PSECURITY_DESCRIPTOR* SecurityDescriptor);
@ -69,6 +152,17 @@ VOID STDCALL
SeDeleteObjectAuditAlarm(IN PVOID Object, SeDeleteObjectAuditAlarm(IN PVOID Object,
IN HANDLE Handle); IN HANDLE Handle);
NTSTATUS
STDCALL
SeFilterToken(
IN PACCESS_TOKEN ExistingToken,
IN ULONG Flags,
IN PTOKEN_GROUPS SidsToDisable OPTIONAL,
IN PTOKEN_PRIVILEGES PrivilegesToDelete OPTIONAL,
IN PTOKEN_GROUPS RestrictedSids OPTIONAL,
OUT PACCESS_TOKEN * FilteredToken
);
VOID STDCALL VOID STDCALL
SeFreePrivileges(IN PPRIVILEGE_SET Privileges); SeFreePrivileges(IN PPRIVILEGE_SET Privileges);
@ -76,12 +170,20 @@ VOID STDCALL
SeImpersonateClient(IN PSECURITY_CLIENT_CONTEXT ClientContext, SeImpersonateClient(IN PSECURITY_CLIENT_CONTEXT ClientContext,
IN struct _ETHREAD *ServerThread OPTIONAL); IN struct _ETHREAD *ServerThread OPTIONAL);
NTSTATUS
STDCALL
SeImpersonateClientEx(
IN PSECURITY_CLIENT_CONTEXT ClientContext,
IN struct _ETHREAD *ServerThread OPTIONAL
);
VOID STDCALL VOID STDCALL
SeLockSubjectContext(IN PSECURITY_SUBJECT_CONTEXT SubjectContext); SeLockSubjectContext(IN PSECURITY_SUBJECT_CONTEXT SubjectContext);
NTSTATUS STDCALL NTSTATUS STDCALL
SeMarkLogonSessionForTerminationNotification(IN PLUID LogonId); SeMarkLogonSessionForTerminationNotification(IN PLUID LogonId);
VOID STDCALL VOID STDCALL
SeOpenObjectAuditAlarm(IN PUNICODE_STRING ObjectTypeName, SeOpenObjectAuditAlarm(IN PUNICODE_STRING ObjectTypeName,
IN PVOID Object OPTIONAL, IN PVOID Object OPTIONAL,
@ -109,19 +211,54 @@ SePrivilegeCheck(IN OUT PPRIVILEGE_SET RequiredPrivileges,
IN PSECURITY_SUBJECT_CONTEXT SubjectContext, IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
IN KPROCESSOR_MODE AccessMode); IN KPROCESSOR_MODE AccessMode);
VOID
STDCALL
SePrivilegeObjectAuditAlarm(
IN HANDLE Handle,
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
IN ACCESS_MASK DesiredAccess,
IN PPRIVILEGE_SET Privileges,
IN BOOLEAN AccessGranted,
IN KPROCESSOR_MODE CurrentMode
);
NTSTATUS STDCALL NTSTATUS STDCALL
SeQueryAuthenticationIdToken(IN PACCESS_TOKEN Token, SeQueryAuthenticationIdToken(IN PACCESS_TOKEN Token,
OUT PLUID LogonId); OUT PLUID LogonId);
NTSTATUS
STDCALL
SeQueryInformationToken(
IN PACCESS_TOKEN Token,
IN TOKEN_INFORMATION_CLASS TokenInformationClass,
OUT PVOID *TokenInformation
);
NTSTATUS STDCALL NTSTATUS STDCALL
SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation, SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
OUT PSECURITY_DESCRIPTOR SecurityDescriptor, OUT PSECURITY_DESCRIPTOR SecurityDescriptor,
IN OUT PULONG Length, IN OUT PULONG Length,
IN PSECURITY_DESCRIPTOR *ObjectsSecurityDescriptor); IN PSECURITY_DESCRIPTOR *ObjectsSecurityDescriptor);
NTSTATUS
STDCALL
SeQuerySessionIdToken(
IN PACCESS_TOKEN,
IN PULONG pSessionId
);
NTSTATUS STDCALL NTSTATUS STDCALL
SeRegisterLogonSessionTerminatedRoutine(IN PSE_LOGON_SESSION_TERMINATED_ROUTINE CallbackRoutine); SeRegisterLogonSessionTerminatedRoutine(IN PSE_LOGON_SESSION_TERMINATED_ROUTINE CallbackRoutine);
NTSTATUS
STDCALL
SeReleaseSecurityDescriptor(
IN PSECURITY_DESCRIPTOR CapturedSecurityDescriptor,
IN KPROCESSOR_MODE CurrentMode,
IN BOOLEAN CaptureIfKernelMode
);
VOID STDCALL VOID STDCALL
SeReleaseSubjectContext(IN PSECURITY_SUBJECT_CONTEXT SubjectContext); SeReleaseSubjectContext(IN PSECURITY_SUBJECT_CONTEXT SubjectContext);
@ -137,6 +274,18 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
IN POOL_TYPE PoolType, IN POOL_TYPE PoolType,
IN PGENERIC_MAPPING GenericMapping); IN PGENERIC_MAPPING GenericMapping);
NTSTATUS
STDCALL
SeSetSecurityDescriptorInfoEx(
IN PVOID Object OPTIONAL,
IN PSECURITY_INFORMATION SecurityInformation,
IN PSECURITY_DESCRIPTOR ModificationDescriptor,
IN OUT PSECURITY_DESCRIPTOR *ObjectsSecurityDescriptor,
IN ULONG AutoInheritFlags,
IN POOL_TYPE PoolType,
IN PGENERIC_MAPPING GenericMapping
);
BOOLEAN STDCALL BOOLEAN STDCALL
SeSinglePrivilegeCheck(IN LUID PrivilegeValue, SeSinglePrivilegeCheck(IN LUID PrivilegeValue,
IN KPROCESSOR_MODE PreviousMode); IN KPROCESSOR_MODE PreviousMode);
@ -144,6 +293,24 @@ SeSinglePrivilegeCheck(IN LUID PrivilegeValue,
SECURITY_IMPERSONATION_LEVEL STDCALL SECURITY_IMPERSONATION_LEVEL STDCALL
SeTokenImpersonationLevel(IN PACCESS_TOKEN Token); SeTokenImpersonationLevel(IN PACCESS_TOKEN Token);
BOOLEAN
STDCALL
SeTokenIsAdmin(
IN PACCESS_TOKEN Token
);
BOOLEAN
STDCALL
SeTokenIsRestricted(
IN PACCESS_TOKEN Token
);
BOOLEAN
STDCALL
SeTokenIsWriteRestricted(
IN PACCESS_TOKEN Token
);
TOKEN_TYPE STDCALL TOKEN_TYPE STDCALL
SeTokenType(IN PACCESS_TOKEN Token); SeTokenType(IN PACCESS_TOKEN Token);

View file

@ -1,4 +1,4 @@
; $Id: ntoskrnl.edf,v 1.172 2004/07/17 05:13:05 ion Exp $ ; $Id: ntoskrnl.edf,v 1.173 2004/08/03 19:20:39 ion Exp $
; ;
; reactos/ntoskrnl/ntoskrnl.def ; reactos/ntoskrnl/ntoskrnl.def
; ;
@ -966,41 +966,55 @@ RtlxOemStringToUnicodeSize=RtlxOemStringToUnicodeSize@4
RtlxUnicodeStringToAnsiSize=RtlxUnicodeStringToAnsiSize@4 RtlxUnicodeStringToAnsiSize=RtlxUnicodeStringToAnsiSize@4
RtlxUnicodeStringToOemSize=RtlxUnicodeStringToOemSize@4 RtlxUnicodeStringToOemSize=RtlxUnicodeStringToOemSize@4
SeAccessCheck=SeAccessCheck@40 SeAccessCheck=SeAccessCheck@40
;SeAppendPrivileges=SeAppendPrivileges@8 SeAppendPrivileges=SeAppendPrivileges@8
SeAssignSecurity=SeAssignSecurity@28 SeAssignSecurity=SeAssignSecurity@28
;SeAuditingFileEvents=SeAuditingFileEvents@8 SeAssignSecurityEx=SeAssignSecurityEx@36
;SeAuditingFileOrGlobalEvents=SeAuditingFileOrGlobalEvents@18 SeAuditHardLinkCreation=SeAuditHardLinkCreation@12
;SeCaptureSecurityDescriptor=SeCaptureSecurityDescriptor@20 SeAuditingFileEvents=SeAuditingFileEvents@8
SeAuditingFileEventsWithContext=SeAuditingFileEventsWithContext@12
SeAuditingFileOrGlobalEvents=SeAuditingFileOrGlobalEvents@12
SeAuditingHardLinkEvents=SeAuditingHardLinkEvents@8
SeAuditingHardLinkEventsWithContext=SeAuditingHardLinkEventsWithContext@12
SeCaptureSecurityDescriptor=SeCaptureSecurityDescriptor@20
SeCaptureSubjectContext=SeCaptureSubjectContext@4 SeCaptureSubjectContext=SeCaptureSubjectContext@4
;SeCloseObjectAuditAlarm=SeCloseObjectAuditAlarm@12 SeCloseObjectAuditAlarm=SeCloseObjectAuditAlarm@12
;SeCreateAccessState=SeCreateAccessState@16 SeCreateAccessState=SeCreateAccessState@16
SeCreateClientSecurity=SeCreateClientSecurity@16 SeCreateClientSecurity=SeCreateClientSecurity@16
SeCreateClientSecurityFromSubjectContext=SeCreateClientSecurityFromSubjectContext@16
SeDeassignSecurity=SeDeassignSecurity@4 SeDeassignSecurity=SeDeassignSecurity@4
;SeDeleteAccessState=SeDeleteAccessState@4 SeDeleteAccessState=SeDeleteAccessState@4
SeDeleteObjectAuditAlarm=SeDeleteObjectAuditAlarm@8 SeDeleteObjectAuditAlarm=SeDeleteObjectAuditAlarm@8
SeExports DATA SeExports DATA
;SeFreePrivileges=SeFreePrivileges@4 SeFilterToken=SeFilterToken@24
SeFreePrivileges=SeFreePrivileges@4
SeImpersonateClient=SeImpersonateClient@8 SeImpersonateClient=SeImpersonateClient@8
SeImpersonateClientEx=SeImpersonateClientEx@8
SeLockSubjectContext=SeLockSubjectContext@4 SeLockSubjectContext=SeLockSubjectContext@4
;SeMarkLogonSessionForTerminationNotification=SeMarkLogonSessionForTerminationNotification@4 SeMarkLogonSessionForTerminationNotification=SeMarkLogonSessionForTerminationNotification@4
SeOpenObjectAuditAlarm=SeOpenObjectAuditAlarm@36 SeOpenObjectAuditAlarm=SeOpenObjectAuditAlarm@36
SeOpenObjectForDeleteAuditAlarm=SeOpenObjectForDeleteAuditAlarm@36 SeOpenObjectForDeleteAuditAlarm=SeOpenObjectForDeleteAuditAlarm@36
SePrivilegeCheck=SePrivilegeCheck@12 SePrivilegeCheck=SePrivilegeCheck@12
;SePrivilegeObjectAuditAlarm=SePrivilegeObjectAuditAlarm@24 SePrivilegeObjectAuditAlarm=SePrivilegeObjectAuditAlarm@24
SePublicDefaultDacl DATA SePublicDefaultDacl DATA
SeQueryAuthenticationIdToken=SeQueryAuthenticationIdToken@8 SeQueryAuthenticationIdToken=SeQueryAuthenticationIdToken@8
SeQueryInformationToken=SeQueryInformationToken@12
SeQuerySecurityDescriptorInfo=SeQuerySecurityDescriptorInfo@16 SeQuerySecurityDescriptorInfo=SeQuerySecurityDescriptorInfo@16
;SeRegisterLogonSessionTerminatedRoutine=SeRegisterLogonSessionTerminatedRoutine@4 SeQuerySessionIdToken=SeQuerySessionIdToken@8
;SeReleaseSecurityDescriptor=SeReleaseSecurityDescriptor@12 SeRegisterLogonSessionTerminatedRoutine=SeRegisterLogonSessionTerminatedRoutine@4
SeReleaseSecurityDescriptor=SeReleaseSecurityDescriptor@12
SeReleaseSubjectContext=SeReleaseSubjectContext@4 SeReleaseSubjectContext=SeReleaseSubjectContext@4
;SeSetAccessStateGenericMapping=SeSetAccessStateGenericMapping@8 SeSetAccessStateGenericMapping=SeSetAccessStateGenericMapping@8
SeSetSecurityDescriptorInfo=SeSetSecurityDescriptorInfo@24 SeSetSecurityDescriptorInfo=SeSetSecurityDescriptorInfo@24
SeSetSecurityDescriptorInfoEx=SeSetSecurityDescriptorInfoEx@28
SeSinglePrivilegeCheck=SeSinglePrivilegeCheck@12 SeSinglePrivilegeCheck=SeSinglePrivilegeCheck@12
SeSystemDefaultDacl DATA SeSystemDefaultDacl DATA
SeTokenImpersonationLevel=SeTokenImpersonationLevel@4 SeTokenImpersonationLevel=SeTokenImpersonationLevel@4
SeTokenType=SeTokenType@4 SeTokenType=SeTokenType@4
SeTokenIsAdmin=SeTokenIsAdmin@4
SeTokenIsRestricted=SeTokenIsRestricted@4
SeTokenIsWriteRestricted=SeTokenIsWriteRestricted@4
SeUnlockSubjectContext=SeUnlockSubjectContext@4 SeUnlockSubjectContext=SeUnlockSubjectContext@4
;SeUnregisterLogonSessionTerminatedRoutine=SeUnregisterLogonSessionTerminatedRoutine@4 SeUnregisterLogonSessionTerminatedRoutine=SeUnregisterLogonSessionTerminatedRoutine@4
SeValidSecurityDescriptor=SeValidSecurityDescriptor@8 SeValidSecurityDescriptor=SeValidSecurityDescriptor@8
WRITE_REGISTER_UCHAR=WRITE_REGISTER_UCHAR@8 WRITE_REGISTER_UCHAR=WRITE_REGISTER_UCHAR@8
WRITE_REGISTER_ULONG=WRITE_REGISTER_ULONG@8 WRITE_REGISTER_ULONG=WRITE_REGISTER_ULONG@8

View file

@ -1,4 +1,4 @@
/* $Id: access.c,v 1.4 2003/07/11 01:23:16 royce Exp $ /* $Id: access.c,v 1.5 2004/08/03 19:20:39 ion Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
@ -13,6 +13,8 @@
#include <ddk/ntddk.h> #include <ddk/ntddk.h>
#define NDEBUG
#include <internal/debug.h>
/* FUNCTIONS ***************************************************************/ /* FUNCTIONS ***************************************************************/
@ -66,4 +68,45 @@ RtlMapGenericMask (
*AccessMask &= 0x0FFFFFFF; *AccessMask &= 0x0FFFFFFF;
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeCreateAccessState(
PACCESS_STATE AccessState,
PVOID AuxData,
ACCESS_MASK Access,
PGENERIC_MAPPING GenericMapping
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
VOID
STDCALL
SeDeleteAccessState(
IN PACCESS_STATE AccessState
)
{
UNIMPLEMENTED;
}
/*
* @unimplemented
*/
VOID
STDCALL
SeSetAccessStateGenericMapping(
PACCESS_STATE AccessState,
PGENERIC_MAPPING GenericMapping
)
{
UNIMPLEMENTED;
}
/* EOF */ /* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: audit.c,v 1.4 2004/05/20 12:42:11 ekohl Exp $ /* $Id: audit.c,v 1.5 2004/08/03 19:20:39 ion Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
@ -101,6 +101,107 @@ NtPrivilegeObjectAuditAlarm(IN PUNICODE_STRING SubsystemName,
} }
/*
* @unimplemented
*/
VOID
STDCALL
SeAuditHardLinkCreation(
IN PUNICODE_STRING FileName,
IN PUNICODE_STRING LinkName,
IN BOOLEAN bSuccess
)
{
UNIMPLEMENTED;
}
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeAuditingFileEvents(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor
)
{
UNIMPLEMENTED;
return FALSE;
}
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeAuditingFileEventsWithContext(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
)
{
UNIMPLEMENTED;
return FALSE;
}
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeAuditingHardLinkEvents(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor
)
{
UNIMPLEMENTED;
return FALSE;
}
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeAuditingHardLinkEventsWithContext(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
)
{
UNIMPLEMENTED;
return FALSE;
}
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeAuditingFileOrGlobalEvents(
IN BOOLEAN AccessGranted,
IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext
)
{
UNIMPLEMENTED;
return FALSE;
}
/*
* @unimplemented
*/
VOID
STDCALL
SeCloseObjectAuditAlarm(
IN PVOID Object,
IN HANDLE Handle,
IN BOOLEAN PerformAction
)
{
UNIMPLEMENTED;
}
/* /*
* @unimplemented * @unimplemented
*/ */
@ -147,4 +248,21 @@ SeOpenObjectForDeleteAuditAlarm(IN PUNICODE_STRING ObjectTypeName,
UNIMPLEMENTED; UNIMPLEMENTED;
} }
/*
* @unimplemented
*/
VOID
STDCALL
SePrivilegeObjectAuditAlarm(
IN HANDLE Handle,
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
IN ACCESS_MASK DesiredAccess,
IN PPRIVILEGE_SET Privileges,
IN BOOLEAN AccessGranted,
IN KPROCESSOR_MODE CurrentMode
)
{
UNIMPLEMENTED;
}
/* EOF */ /* EOF */

View file

@ -1,7 +1,11 @@
/* $Id: lsa.c,v 1.3 2002/09/08 10:23:43 chorns Exp $ /* $Id: lsa.c,v 1.4 2004/08/03 19:20:39 ion Exp $
*/ */
#include <ddk/ntddk.h> #include <ddk/ntddk.h>
#define NDEBUG
#include <internal/debug.h>
/* LsaCallAuthenticationPackage@28 */ /* LsaCallAuthenticationPackage@28 */
NTSTATUS STDCALL LsaCallAuthenticationPackage ( NTSTATUS STDCALL LsaCallAuthenticationPackage (
DWORD Unknown0, DWORD Unknown0,
@ -79,5 +83,44 @@ NTSTATUS STDCALL LsaRegisterLogonProcess (
return STATUS_NOT_IMPLEMENTED; return STATUS_NOT_IMPLEMENTED;
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeMarkLogonSessionForTerminationNotification(
IN PLUID LogonId
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeRegisterLogonSessionTerminatedRoutine(
IN PSE_LOGON_SESSION_TERMINATED_ROUTINE CallbackRoutine
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeUnregisterLogonSessionTerminatedRoutine(
IN PSE_LOGON_SESSION_TERMINATED_ROUTINE CallbackRoutine
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/* EOF */ /* EOF */

View file

@ -1,4 +1,4 @@
/* $Id: sd.c,v 1.17 2004/07/31 12:21:19 ekohl Exp $ /* $Id: sd.c,v 1.18 2004/08/03 19:20:39 ion Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
@ -111,6 +111,22 @@ SepInitSDs(VOID)
return TRUE; return TRUE;
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeCaptureSecurityDescriptor(
IN PSECURITY_DESCRIPTOR OriginalSecurityDescriptor,
IN KPROCESSOR_MODE CurrentMode,
IN POOL_TYPE PoolType,
IN BOOLEAN CaptureIfKernel,
OUT PSECURITY_DESCRIPTOR *CapturedSecurityDescriptor
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/* /*
* @implemented * @implemented
@ -247,6 +263,20 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
return STATUS_SUCCESS; return STATUS_SUCCESS;
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeReleaseSecurityDescriptor(
IN PSECURITY_DESCRIPTOR CapturedSecurityDescriptor,
IN KPROCESSOR_MODE CurrentMode,
IN BOOLEAN CaptureIfKernelMode
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/* /*
* @unimplemented * @unimplemented
@ -263,6 +293,25 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
return STATUS_NOT_IMPLEMENTED; return STATUS_NOT_IMPLEMENTED;
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeSetSecurityDescriptorInfoEx(
IN PVOID Object OPTIONAL,
IN PSECURITY_INFORMATION SecurityInformation,
IN PSECURITY_DESCRIPTOR ModificationDescriptor,
IN OUT PSECURITY_DESCRIPTOR *ObjectsSecurityDescriptor,
IN ULONG AutoInheritFlags,
IN POOL_TYPE PoolType,
IN PGENERIC_MAPPING GenericMapping
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/* /*
* @implemented * @implemented

View file

@ -1,4 +1,4 @@
/* $Id: semgr.c,v 1.38 2004/08/03 13:58:56 ekohl Exp $ /* $Id: semgr.c,v 1.39 2004/08/03 19:20:39 ion Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
@ -286,6 +286,26 @@ SeDeassignSecurity(PSECURITY_DESCRIPTOR *SecurityDescriptor)
return STATUS_SUCCESS; return STATUS_SUCCESS;
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeAssignSecurityEx(
IN PSECURITY_DESCRIPTOR ParentDescriptor OPTIONAL,
IN PSECURITY_DESCRIPTOR ExplicitDescriptor OPTIONAL,
OUT PSECURITY_DESCRIPTOR *NewDescriptor,
IN GUID *ObjectType OPTIONAL,
IN BOOLEAN IsDirectoryObject,
IN ULONG AutoInheritFlags,
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
IN PGENERIC_MAPPING GenericMapping,
IN POOL_TYPE PoolType
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/* /*
* FUNCTION: Creates a security descriptor for a new object. * FUNCTION: Creates a security descriptor for a new object.

View file

@ -1,4 +1,4 @@
/* $Id: token.c,v 1.37 2004/07/13 08:43:35 ekohl Exp $ /* $Id: token.c,v 1.38 2004/08/03 19:20:39 ion Exp $
* *
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
@ -294,6 +294,19 @@ SepInitializeNewProcess(struct _EPROCESS* NewProcess,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeAppendPrivileges(
PACCESS_STATE AccessState,
PPRIVILEGE_SET Privileges
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
NTSTATUS SeCopyClientToken(PACCESS_TOKEN Token, NTSTATUS SeCopyClientToken(PACCESS_TOKEN Token,
SECURITY_IMPERSONATION_LEVEL Level, SECURITY_IMPERSONATION_LEVEL Level,
@ -410,6 +423,66 @@ SeCreateClientSecurity(IN struct _ETHREAD *Thread,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeCreateClientSecurityFromSubjectContext(
IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
IN PSECURITY_QUALITY_OF_SERVICE ClientSecurityQos,
IN BOOLEAN ServerIsRemote,
OUT PSECURITY_CLIENT_CONTEXT ClientContext
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeFilterToken(
IN PACCESS_TOKEN ExistingToken,
IN ULONG Flags,
IN PTOKEN_GROUPS SidsToDisable OPTIONAL,
IN PTOKEN_PRIVILEGES PrivilegesToDelete OPTIONAL,
IN PTOKEN_GROUPS RestrictedSids OPTIONAL,
OUT PACCESS_TOKEN * FilteredToken
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
VOID
STDCALL
SeFreePrivileges(
IN PPRIVILEGE_SET Privileges
)
{
UNIMPLEMENTED;
}
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeImpersonateClientEx(
IN PSECURITY_CLIENT_CONTEXT ClientContext,
IN PETHREAD ServerThread OPTIONAL
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/* /*
* @implemented * @implemented
@ -741,6 +814,35 @@ NtQueryInformationToken(IN HANDLE TokenHandle,
return(Status); return(Status);
} }
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeQueryInformationToken(
IN PACCESS_TOKEN Token,
IN TOKEN_INFORMATION_CLASS TokenInformationClass,
OUT PVOID *TokenInformation
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/*
* @unimplemented
*/
NTSTATUS
STDCALL
SeQuerySessionIdToken(
IN PACCESS_TOKEN Token,
IN PULONG pSessionId
)
{
UNIMPLEMENTED;
return STATUS_NOT_IMPLEMENTED;
}
/* /*
* NtSetTokenInformation: Partly implemented. * NtSetTokenInformation: Partly implemented.
* Unimplemented: * Unimplemented:
@ -1559,5 +1661,44 @@ SeTokenType(IN PACCESS_TOKEN Token)
} }
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeTokenIsAdmin(
IN PACCESS_TOKEN Token
)
{
UNIMPLEMENTED;
return FALSE;
}
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeTokenIsRestricted(
IN PACCESS_TOKEN Token
)
{
UNIMPLEMENTED;
return FALSE;
}
/*
* @unimplemented
*/
BOOLEAN
STDCALL
SeTokenIsWriteRestricted(
IN PACCESS_TOKEN Token
)
{
UNIMPLEMENTED;
return FALSE;
}
/* EOF */ /* EOF */