diff --git a/reactos/include/ddk/fsfuncs.h b/reactos/include/ddk/fsfuncs.h index 148802ca222..7ccfc91b750 100644 --- a/reactos/include/ddk/fsfuncs.h +++ b/reactos/include/ddk/fsfuncs.h @@ -1,5 +1,6 @@ #ifndef __INCLUDE_DDK_FSFUNCS_H #define __INCLUDE_DDK_FSFUNCS_H +/* $Id: fsfuncs.h,v 1.2 1999/12/26 17:22:18 ea Exp $ */ VOID STDCALL FsRtlAddLargeMcbEntry ( diff --git a/reactos/include/ddk/rtl.h b/reactos/include/ddk/rtl.h index ef57a1ceff3..547813580c3 100644 --- a/reactos/include/ddk/rtl.h +++ b/reactos/include/ddk/rtl.h @@ -1,4 +1,4 @@ -/* $Id: rtl.h,v 1.21 1999/12/18 10:15:11 ea Exp $ +/* $Id: rtl.h,v 1.22 1999/12/26 17:22:18 ea Exp $ * */ @@ -367,6 +367,7 @@ RtlCreateRegistryKey ( ); NTSTATUS +STDCALL RtlCreateSecurityDescriptor ( PSECURITY_DESCRIPTOR SecurityDescriptor, ULONG Revision @@ -760,6 +761,7 @@ RtlLargeIntegerSubtract ( ); ULONG +STDCALL RtlLengthSecurityDescriptor ( PSECURITY_DESCRIPTOR SecurityDescriptor ); @@ -864,6 +866,7 @@ RtlRetrieveUshort ( ); NTSTATUS +STDCALL RtlSetDaclSecurityDescriptor ( PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN DaclPresent, @@ -1058,6 +1061,7 @@ RtlValidateHeap ( ); BOOLEAN +STDCALL RtlValidSecurityDescriptor ( PSECURITY_DESCRIPTOR SecurityDescriptor ); diff --git a/reactos/include/ddk/sefuncs.h b/reactos/include/ddk/sefuncs.h index f9d8ad4830d..f2a83f71eae 100644 --- a/reactos/include/ddk/sefuncs.h +++ b/reactos/include/ddk/sefuncs.h @@ -1,51 +1,21 @@ -NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, - ULONG Revision); - -BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor); - -ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor); - -NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, - BOOLEAN DaclPresent, - PACL Dacl, - BOOLEAN DaclDefaulted); - -NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, - PBOOLEAN DaclPresent, - PACL* Dacl, - PBOOLEAN DaclDefauted); - -NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, - PSID Owner, - BOOLEAN OwnerDefaulted); - -NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, - PSID* Owner, - PBOOLEAN OwnerDefaulted); - -NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, - PSID Group, - BOOLEAN GroupDefaulted); - -NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, - PSID* Group, - PBOOLEAN GroupDefaulted); - -ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount); - -NTSTATUS RtlInitializeSid(PSID Sid, - PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, - UCHAR SubAuthorityCount); - -PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority); - -BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2); - -NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD, - PSECURITY_DESCRIPTOR RelSD, - PULONG BufferLength); - -BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor, +#ifndef _INCLUDE_DDK_SEFUNCS_H +#define _INCLUDE_DDK_SEFUNCS_H +/* $Id: sefuncs.h,v 1.3 1999/12/26 17:22:18 ea Exp $ */ +NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, ULONG Revision); +BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor); +ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor); +NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN DaclPresent, PACL Dacl, BOOLEAN DaclDefaulted); +NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PBOOLEAN DaclPresent, PACL* Dacl, PBOOLEAN DaclDefauted); +NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Owner, BOOLEAN OwnerDefaulted); +NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Owner, PBOOLEAN OwnerDefaulted); +NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Group, BOOLEAN GroupDefaulted); +NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Group, PBOOLEAN GroupDefaulted); +ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount); +NTSTATUS STDCALL RtlInitializeSid (PSID Sid, PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, UCHAR SubAuthorityCount); +PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority); +BOOLEAN STDCALL RtlEqualSid(PSID Sid1, PSID Sid2); +NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD, PSECURITY_DESCRIPTOR RelSD, PULONG BufferLength); +BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor, IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext, IN BOOLEAN SubjectContextLocked, IN ACCESS_MASK DesiredAccess, @@ -55,19 +25,14 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor, IN KPROCESSOR_MODE AccessMode, OUT PACCESS_MODE GrantedAccess, OUT PNTSTATUS AccessStatus); - -NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor, +NTSTATUS STDCALL SeAssignSecurity (PSECURITY_DESCRIPTOR ParentDescriptor, PSECURITY_DESCRIPTOR ExplicitDescriptor, BOOLEAN IsDirectoryObject, PSECURITY_SUBJECT_CONTEXT SubjectContext, PGENERIC_MAPPING GenericMapping, POOL_TYPE PoolType); - -NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor); - -BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue, - KPROCESSOR_MODE PreviousMode); - - -ULONG RtlLengthSid(PSID Sid); -NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest); +NTSTATUS STDCALL SeDeassignSecurity (PSECURITY_DESCRIPTOR* SecurityDescriptor); +BOOLEAN STDCALL SeSinglePrivilegeCheck (LUID PrivilegeValue, KPROCESSOR_MODE PreviousMode); +ULONG STDCALL RtlLengthSid (PSID Sid); +NTSTATUS STDCALL RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest); +#endif /* ndef _INCLUDE_DDK_SEFUNCS_H */ diff --git a/reactos/include/ddk/setypes.h b/reactos/include/ddk/setypes.h index ad8fb7a324b..881f92e9846 100644 --- a/reactos/include/ddk/setypes.h +++ b/reactos/include/ddk/setypes.h @@ -1,4 +1,5 @@ -/* +/* $Id: setypes.h,v 1.3 1999/12/26 17:22:18 ea Exp $ + * * COPYRIGHT: See COPYING in the top level directory for details * PROJECT: ReactOS kernel * FILE: include/ddk/setypes.h @@ -198,7 +199,7 @@ typedef struct _SECURITY_DESCRIPTOR { PACL Dacl; } SECURITY_DESCRIPTOR, *PSECURITY_DESCRIPTOR; -BOOLEAN RtlValidSid(PSID Sid); +BOOLEAN STDCALL RtlValidSid (PSID Sid); /* * from ntoskrnl/se/token.c: diff --git a/reactos/ntoskrnl/makefile_rex b/reactos/ntoskrnl/makefile_rex index aef45c1500b..61a91529fc5 100644 --- a/reactos/ntoskrnl/makefile_rex +++ b/reactos/ntoskrnl/makefile_rex @@ -1,4 +1,4 @@ -# $Id: makefile_rex,v 1.42 1999/12/26 16:36:44 ea Exp $ +# $Id: makefile_rex,v 1.43 1999/12/26 17:22:18 ea Exp $ # # ReactOS Operating System # @@ -59,8 +59,6 @@ FS_OBJECTS = fs/mcb.o fs/util.o SE_OBJECTS = se/semgr.o se/acl.o se/sid.o se/sd.o se/token.o se/luid.o -SE_OBJECTS = se/semgr.o - CM_OBJECTS = cm/registry.o DBG_OBJECTS = dbg/brkpoint.o dbg/errinfo.o dbg/print.o diff --git a/reactos/ntoskrnl/se/acl.c b/reactos/ntoskrnl/se/acl.c index 9e5bdc70dee..b0e75699755 100644 --- a/reactos/ntoskrnl/se/acl.c +++ b/reactos/ntoskrnl/se/acl.c @@ -1,4 +1,5 @@ -/* +/* $Id: acl.c,v 1.2 1999/12/26 17:22:19 ea Exp $ + * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS kernel * PURPOSE: Security manager @@ -196,3 +197,6 @@ NTSTATUS RtlCreateAcl(PACL Acl, ULONG AclSize, ULONG AclRevision) Acl->Sbz2 = 0; return(STATUS_SUCCESS); } + + +/* EOF */ diff --git a/reactos/ntoskrnl/se/luid.c b/reactos/ntoskrnl/se/luid.c index dde4325bbbc..b0136efeada 100644 --- a/reactos/ntoskrnl/se/luid.c +++ b/reactos/ntoskrnl/se/luid.c @@ -1,8 +1,9 @@ -/* +/* $Id: luid.c,v 1.2 1999/12/26 17:22:19 ea Exp $ + * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS kernel * PURPOSE: Security manager - * FILE: kernel/se/semgr.c + * FILE: ntoskrnl/se/luid.c * PROGRAMER: ? * REVISION HISTORY: * 26/07/98: Added stubs for security functions diff --git a/reactos/ntoskrnl/se/sd.c b/reactos/ntoskrnl/se/sd.c index 229991c3c8d..5c6887379e5 100644 --- a/reactos/ntoskrnl/se/sd.c +++ b/reactos/ntoskrnl/se/sd.c @@ -1,4 +1,5 @@ -/* +/* $Id: sd.c,v 1.2 1999/12/26 17:22:19 ea Exp $ + * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS kernel * PURPOSE: Security manager @@ -16,7 +17,7 @@ /* FUNCTIONS ***************************************************************/ -NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, +NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, ULONG Revision) { if (Revision != 1) @@ -33,7 +34,7 @@ NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, return(STATUS_SUCCESS); } -ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor) +ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor) { PSID Owner; PSID Group; @@ -87,7 +88,7 @@ ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor) return(Length); } -NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, +NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PBOOLEAN DaclPresent, PACL* Dacl, PBOOLEAN DaclDefaulted) @@ -129,7 +130,7 @@ NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, return(STATUS_SUCCESS); } -NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, +NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN DaclPresent, PACL Dacl, BOOLEAN DaclDefaulted) @@ -157,12 +158,12 @@ NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, return(STATUS_SUCCESS); } -BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor) +BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor) { UNIMPLEMENTED; } -NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, +NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Owner, BOOLEAN OwnerDefaulted) { @@ -183,7 +184,7 @@ NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, return(STATUS_SUCCESS); } -NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, +NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Owner, PBOOLEAN OwnerDefaulted) { @@ -218,7 +219,7 @@ NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, return(STATUS_SUCCESS); } -NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, +NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Group, BOOLEAN GroupDefaulted) { @@ -239,7 +240,7 @@ NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, return(STATUS_SUCCESS); } -NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, +NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Group, PBOOLEAN GroupDefaulted) { @@ -274,7 +275,7 @@ NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, return(STATUS_SUCCESS); } -NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD, +NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD, PSECURITY_DESCRIPTOR RelSD, PULONG BufferLength) { @@ -284,3 +285,6 @@ NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD, } UNIMPLEMENTED; } + + +/* EOF */ diff --git a/reactos/ntoskrnl/se/semgr.c b/reactos/ntoskrnl/se/semgr.c index daeda548b55..db5c501469c 100644 --- a/reactos/ntoskrnl/se/semgr.c +++ b/reactos/ntoskrnl/se/semgr.c @@ -1,4 +1,5 @@ -/* +/* $Id: semgr.c,v 1.13 1999/12/26 17:22:19 ea Exp $ + * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS kernel * PURPOSE: Security manager @@ -199,12 +200,12 @@ NtDeleteObjectAuditAlarm ( UNIMPLEMENTED; } -VOID SeReleaseSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext) +VOID STDCALL SeReleaseSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext) { } -VOID SeCaptureSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext) +VOID STDCALL SeCaptureSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext) { PEPROCESS Process; ULONG a; @@ -276,7 +277,7 @@ BOOLEAN SepPrivilegeCheck(PACCESS_TOKEN Token, return(FALSE); } -BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges, +BOOLEAN STDCALL SePrivilegeCheck(PPRIVILEGE_SET Privileges, PSECURITY_SUBJECT_CONTEXT SubjectContext, KPROCESSOR_MODE PreviousMode) { @@ -302,7 +303,7 @@ BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges, PreviousMode)); } -BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue, +BOOLEAN STDCALL SeSinglePrivilegeCheck(LUID PrivilegeValue, KPROCESSOR_MODE PreviousMode) { SECURITY_SUBJECT_CONTEXT SubjectContext; @@ -330,12 +331,12 @@ BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue, return(r); } -NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor) +NTSTATUS STDCALL SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor) { UNIMPLEMENTED; } -NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor, +NTSTATUS STDCALL SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor, PSECURITY_DESCRIPTOR ExplicitDescriptor, BOOLEAN IsDirectoryObject, PSECURITY_SUBJECT_CONTEXT SubjectContext, @@ -345,7 +346,7 @@ NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor, UNIMPLEMENTED; } -BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor, +BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor, IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext, IN BOOLEAN SubjectContextLocked, IN ACCESS_MASK DesiredAccess, @@ -436,3 +437,4 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor, } +/* EOF */ diff --git a/reactos/ntoskrnl/se/sid.c b/reactos/ntoskrnl/se/sid.c index 2f09824d434..56bf65a0c8e 100644 --- a/reactos/ntoskrnl/se/sid.c +++ b/reactos/ntoskrnl/se/sid.c @@ -1,4 +1,5 @@ -/* +/* $Id: sid.c,v 1.2 1999/12/26 17:22:19 ea Exp $ + * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS kernel * PURPOSE: Security manager @@ -16,7 +17,7 @@ /* FUNCTIONS ***************************************************************/ -BOOLEAN RtlValidSid(PSID Sid) +BOOLEAN STDCALL RtlValidSid (PSID Sid) { if ((Sid->Revision & 0xf) != 1) { @@ -29,12 +30,12 @@ BOOLEAN RtlValidSid(PSID Sid) return(TRUE); } -ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount) +ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount) { return(sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG)); } -NTSTATUS RtlInitializeSid(PSID Sid, +NTSTATUS STDCALL RtlInitializeSid (PSID Sid, PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, UCHAR SubAuthorityCount) { @@ -45,17 +46,17 @@ NTSTATUS RtlInitializeSid(PSID Sid, return(STATUS_SUCCESS); } -PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority) +PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority) { return(&Sid->SubAuthority[SubAuthority]); } -PUCHAR RtlSubAuthorityCountSid(PSID Sid) +PUCHAR STDCALL RtlSubAuthorityCountSid (PSID Sid) { return(&Sid->SubAuthorityCount); } -BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2) +BOOLEAN STDCALL RtlEqualSid (PSID Sid1, PSID Sid2) { if (Sid1->Revision != Sid2->Revision) { @@ -73,13 +74,13 @@ BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2) return(TRUE); } -ULONG RtlLengthSid(PSID Sid) +ULONG STDCALL RtlLengthSid (PSID Sid) { return(sizeof(SID) + (Sid->SubAuthorityCount-1)*4); } -NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest) +NTSTATUS STDCALL RtlCopySid (ULONG BufferLength, PSID Src, PSID Dest) { if (BufferLength < RtlLengthSid(Src)) { @@ -88,3 +89,6 @@ NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest) memmove(Dest, Src, RtlLengthSid(Src)); return(STATUS_SUCCESS); } + + +/* EOF */ diff --git a/reactos/ntoskrnl/se/token.c b/reactos/ntoskrnl/se/token.c index d99f6639131..a4e85d6ef3e 100644 --- a/reactos/ntoskrnl/se/token.c +++ b/reactos/ntoskrnl/se/token.c @@ -1,4 +1,5 @@ -/* +/* $Id: token.c,v 1.2 1999/12/26 17:22:19 ea Exp $ + * * COPYRIGHT: See COPYING in the top level directory * PROJECT: ReactOS kernel * PURPOSE: Security manager @@ -118,3 +119,5 @@ NTSTATUS STDCALL NtCreateToken(OUT PHANDLE TokenHandle, UNIMPLEMENTED; } + +/* EOF */