Some missing __stdcall declarations added in headers and in code.

svn path=/trunk/; revision=903
This commit is contained in:
Emanuele Aliberti 1999-12-26 17:22:19 +00:00
parent 6b50f46c2f
commit ea5959a772
11 changed files with 84 additions and 97 deletions

View file

@ -1,5 +1,6 @@
#ifndef __INCLUDE_DDK_FSFUNCS_H
#define __INCLUDE_DDK_FSFUNCS_H
/* $Id: fsfuncs.h,v 1.2 1999/12/26 17:22:18 ea Exp $ */
VOID
STDCALL
FsRtlAddLargeMcbEntry (

View file

@ -1,4 +1,4 @@
/* $Id: rtl.h,v 1.21 1999/12/18 10:15:11 ea Exp $
/* $Id: rtl.h,v 1.22 1999/12/26 17:22:18 ea Exp $
*
*/
@ -367,6 +367,7 @@ RtlCreateRegistryKey (
);
NTSTATUS
STDCALL
RtlCreateSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor,
ULONG Revision
@ -760,6 +761,7 @@ RtlLargeIntegerSubtract (
);
ULONG
STDCALL
RtlLengthSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor
);
@ -864,6 +866,7 @@ RtlRetrieveUshort (
);
NTSTATUS
STDCALL
RtlSetDaclSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor,
BOOLEAN DaclPresent,
@ -1058,6 +1061,7 @@ RtlValidateHeap (
);
BOOLEAN
STDCALL
RtlValidSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor
);

View file

@ -1,51 +1,21 @@
NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
ULONG Revision);
BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor);
ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor);
NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
BOOLEAN DaclPresent,
PACL Dacl,
BOOLEAN DaclDefaulted);
NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PBOOLEAN DaclPresent,
PACL* Dacl,
PBOOLEAN DaclDefauted);
NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Owner,
BOOLEAN OwnerDefaulted);
NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Owner,
PBOOLEAN OwnerDefaulted);
NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Group,
BOOLEAN GroupDefaulted);
NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Group,
PBOOLEAN GroupDefaulted);
ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount);
NTSTATUS RtlInitializeSid(PSID Sid,
PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
UCHAR SubAuthorityCount);
PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority);
BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2);
NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
PSECURITY_DESCRIPTOR RelSD,
PULONG BufferLength);
BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
#ifndef _INCLUDE_DDK_SEFUNCS_H
#define _INCLUDE_DDK_SEFUNCS_H
/* $Id: sefuncs.h,v 1.3 1999/12/26 17:22:18 ea Exp $ */
NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, ULONG Revision);
BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor);
ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor);
NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN DaclPresent, PACL Dacl, BOOLEAN DaclDefaulted);
NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PBOOLEAN DaclPresent, PACL* Dacl, PBOOLEAN DaclDefauted);
NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Owner, BOOLEAN OwnerDefaulted);
NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Owner, PBOOLEAN OwnerDefaulted);
NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Group, BOOLEAN GroupDefaulted);
NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Group, PBOOLEAN GroupDefaulted);
ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount);
NTSTATUS STDCALL RtlInitializeSid (PSID Sid, PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, UCHAR SubAuthorityCount);
PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority);
BOOLEAN STDCALL RtlEqualSid(PSID Sid1, PSID Sid2);
NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD, PSECURITY_DESCRIPTOR RelSD, PULONG BufferLength);
BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
IN BOOLEAN SubjectContextLocked,
IN ACCESS_MASK DesiredAccess,
@ -55,19 +25,14 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN KPROCESSOR_MODE AccessMode,
OUT PACCESS_MODE GrantedAccess,
OUT PNTSTATUS AccessStatus);
NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
NTSTATUS STDCALL SeAssignSecurity (PSECURITY_DESCRIPTOR ParentDescriptor,
PSECURITY_DESCRIPTOR ExplicitDescriptor,
BOOLEAN IsDirectoryObject,
PSECURITY_SUBJECT_CONTEXT SubjectContext,
PGENERIC_MAPPING GenericMapping,
POOL_TYPE PoolType);
NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor);
BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
KPROCESSOR_MODE PreviousMode);
ULONG RtlLengthSid(PSID Sid);
NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest);
NTSTATUS STDCALL SeDeassignSecurity (PSECURITY_DESCRIPTOR* SecurityDescriptor);
BOOLEAN STDCALL SeSinglePrivilegeCheck (LUID PrivilegeValue, KPROCESSOR_MODE PreviousMode);
ULONG STDCALL RtlLengthSid (PSID Sid);
NTSTATUS STDCALL RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest);
#endif /* ndef _INCLUDE_DDK_SEFUNCS_H */

View file

@ -1,4 +1,5 @@
/*
/* $Id: setypes.h,v 1.3 1999/12/26 17:22:18 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory for details
* PROJECT: ReactOS kernel
* FILE: include/ddk/setypes.h
@ -198,7 +199,7 @@ typedef struct _SECURITY_DESCRIPTOR {
PACL Dacl;
} SECURITY_DESCRIPTOR, *PSECURITY_DESCRIPTOR;
BOOLEAN RtlValidSid(PSID Sid);
BOOLEAN STDCALL RtlValidSid (PSID Sid);
/*
* from ntoskrnl/se/token.c:

View file

@ -1,4 +1,4 @@
# $Id: makefile_rex,v 1.42 1999/12/26 16:36:44 ea Exp $
# $Id: makefile_rex,v 1.43 1999/12/26 17:22:18 ea Exp $
#
# ReactOS Operating System
#
@ -59,8 +59,6 @@ FS_OBJECTS = fs/mcb.o fs/util.o
SE_OBJECTS = se/semgr.o se/acl.o se/sid.o se/sd.o se/token.o se/luid.o
SE_OBJECTS = se/semgr.o
CM_OBJECTS = cm/registry.o
DBG_OBJECTS = dbg/brkpoint.o dbg/errinfo.o dbg/print.o

View file

@ -1,4 +1,5 @@
/*
/* $Id: acl.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel
* PURPOSE: Security manager
@ -196,3 +197,6 @@ NTSTATUS RtlCreateAcl(PACL Acl, ULONG AclSize, ULONG AclRevision)
Acl->Sbz2 = 0;
return(STATUS_SUCCESS);
}
/* EOF */

View file

@ -1,8 +1,9 @@
/*
/* $Id: luid.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel
* PURPOSE: Security manager
* FILE: kernel/se/semgr.c
* FILE: ntoskrnl/se/luid.c
* PROGRAMER: ?
* REVISION HISTORY:
* 26/07/98: Added stubs for security functions

View file

@ -1,4 +1,5 @@
/*
/* $Id: sd.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel
* PURPOSE: Security manager
@ -16,7 +17,7 @@
/* FUNCTIONS ***************************************************************/
NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
ULONG Revision)
{
if (Revision != 1)
@ -33,7 +34,7 @@ NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS);
}
ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor)
{
PSID Owner;
PSID Group;
@ -87,7 +88,7 @@ ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
return(Length);
}
NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PBOOLEAN DaclPresent,
PACL* Dacl,
PBOOLEAN DaclDefaulted)
@ -129,7 +130,7 @@ NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS);
}
NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
BOOLEAN DaclPresent,
PACL Dacl,
BOOLEAN DaclDefaulted)
@ -157,12 +158,12 @@ NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS);
}
BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor)
{
UNIMPLEMENTED;
}
NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Owner,
BOOLEAN OwnerDefaulted)
{
@ -183,7 +184,7 @@ NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS);
}
NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Owner,
PBOOLEAN OwnerDefaulted)
{
@ -218,7 +219,7 @@ NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS);
}
NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Group,
BOOLEAN GroupDefaulted)
{
@ -239,7 +240,7 @@ NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS);
}
NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Group,
PBOOLEAN GroupDefaulted)
{
@ -274,7 +275,7 @@ NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS);
}
NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD,
PSECURITY_DESCRIPTOR RelSD,
PULONG BufferLength)
{
@ -284,3 +285,6 @@ NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
}
UNIMPLEMENTED;
}
/* EOF */

View file

@ -1,4 +1,5 @@
/*
/* $Id: semgr.c,v 1.13 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel
* PURPOSE: Security manager
@ -199,12 +200,12 @@ NtDeleteObjectAuditAlarm (
UNIMPLEMENTED;
}
VOID SeReleaseSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext)
VOID STDCALL SeReleaseSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext)
{
}
VOID SeCaptureSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext)
VOID STDCALL SeCaptureSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext)
{
PEPROCESS Process;
ULONG a;
@ -276,7 +277,7 @@ BOOLEAN SepPrivilegeCheck(PACCESS_TOKEN Token,
return(FALSE);
}
BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges,
BOOLEAN STDCALL SePrivilegeCheck(PPRIVILEGE_SET Privileges,
PSECURITY_SUBJECT_CONTEXT SubjectContext,
KPROCESSOR_MODE PreviousMode)
{
@ -302,7 +303,7 @@ BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges,
PreviousMode));
}
BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
BOOLEAN STDCALL SeSinglePrivilegeCheck(LUID PrivilegeValue,
KPROCESSOR_MODE PreviousMode)
{
SECURITY_SUBJECT_CONTEXT SubjectContext;
@ -330,12 +331,12 @@ BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
return(r);
}
NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor)
NTSTATUS STDCALL SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor)
{
UNIMPLEMENTED;
}
NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
NTSTATUS STDCALL SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
PSECURITY_DESCRIPTOR ExplicitDescriptor,
BOOLEAN IsDirectoryObject,
PSECURITY_SUBJECT_CONTEXT SubjectContext,
@ -345,7 +346,7 @@ NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
UNIMPLEMENTED;
}
BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
IN BOOLEAN SubjectContextLocked,
IN ACCESS_MASK DesiredAccess,
@ -436,3 +437,4 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
}
/* EOF */

View file

@ -1,4 +1,5 @@
/*
/* $Id: sid.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel
* PURPOSE: Security manager
@ -16,7 +17,7 @@
/* FUNCTIONS ***************************************************************/
BOOLEAN RtlValidSid(PSID Sid)
BOOLEAN STDCALL RtlValidSid (PSID Sid)
{
if ((Sid->Revision & 0xf) != 1)
{
@ -29,12 +30,12 @@ BOOLEAN RtlValidSid(PSID Sid)
return(TRUE);
}
ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount)
ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount)
{
return(sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG));
}
NTSTATUS RtlInitializeSid(PSID Sid,
NTSTATUS STDCALL RtlInitializeSid (PSID Sid,
PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
UCHAR SubAuthorityCount)
{
@ -45,17 +46,17 @@ NTSTATUS RtlInitializeSid(PSID Sid,
return(STATUS_SUCCESS);
}
PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority)
PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority)
{
return(&Sid->SubAuthority[SubAuthority]);
}
PUCHAR RtlSubAuthorityCountSid(PSID Sid)
PUCHAR STDCALL RtlSubAuthorityCountSid (PSID Sid)
{
return(&Sid->SubAuthorityCount);
}
BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2)
BOOLEAN STDCALL RtlEqualSid (PSID Sid1, PSID Sid2)
{
if (Sid1->Revision != Sid2->Revision)
{
@ -73,13 +74,13 @@ BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2)
return(TRUE);
}
ULONG RtlLengthSid(PSID Sid)
ULONG STDCALL RtlLengthSid (PSID Sid)
{
return(sizeof(SID) + (Sid->SubAuthorityCount-1)*4);
}
NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest)
NTSTATUS STDCALL RtlCopySid (ULONG BufferLength, PSID Src, PSID Dest)
{
if (BufferLength < RtlLengthSid(Src))
{
@ -88,3 +89,6 @@ NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest)
memmove(Dest, Src, RtlLengthSid(Src));
return(STATUS_SUCCESS);
}
/* EOF */

View file

@ -1,4 +1,5 @@
/*
/* $Id: token.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel
* PURPOSE: Security manager
@ -118,3 +119,5 @@ NTSTATUS STDCALL NtCreateToken(OUT PHANDLE TokenHandle,
UNIMPLEMENTED;
}
/* EOF */