mirror of
https://github.com/reactos/reactos.git
synced 2024-12-29 02:25:17 +00:00
Some missing __stdcall declarations added in headers and in code.
svn path=/trunk/; revision=903
This commit is contained in:
parent
6b50f46c2f
commit
ea5959a772
11 changed files with 84 additions and 97 deletions
|
@ -1,5 +1,6 @@
|
||||||
#ifndef __INCLUDE_DDK_FSFUNCS_H
|
#ifndef __INCLUDE_DDK_FSFUNCS_H
|
||||||
#define __INCLUDE_DDK_FSFUNCS_H
|
#define __INCLUDE_DDK_FSFUNCS_H
|
||||||
|
/* $Id: fsfuncs.h,v 1.2 1999/12/26 17:22:18 ea Exp $ */
|
||||||
VOID
|
VOID
|
||||||
STDCALL
|
STDCALL
|
||||||
FsRtlAddLargeMcbEntry (
|
FsRtlAddLargeMcbEntry (
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $Id: rtl.h,v 1.21 1999/12/18 10:15:11 ea Exp $
|
/* $Id: rtl.h,v 1.22 1999/12/26 17:22:18 ea Exp $
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
@ -367,6 +367,7 @@ RtlCreateRegistryKey (
|
||||||
);
|
);
|
||||||
|
|
||||||
NTSTATUS
|
NTSTATUS
|
||||||
|
STDCALL
|
||||||
RtlCreateSecurityDescriptor (
|
RtlCreateSecurityDescriptor (
|
||||||
PSECURITY_DESCRIPTOR SecurityDescriptor,
|
PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
ULONG Revision
|
ULONG Revision
|
||||||
|
@ -760,6 +761,7 @@ RtlLargeIntegerSubtract (
|
||||||
);
|
);
|
||||||
|
|
||||||
ULONG
|
ULONG
|
||||||
|
STDCALL
|
||||||
RtlLengthSecurityDescriptor (
|
RtlLengthSecurityDescriptor (
|
||||||
PSECURITY_DESCRIPTOR SecurityDescriptor
|
PSECURITY_DESCRIPTOR SecurityDescriptor
|
||||||
);
|
);
|
||||||
|
@ -864,6 +866,7 @@ RtlRetrieveUshort (
|
||||||
);
|
);
|
||||||
|
|
||||||
NTSTATUS
|
NTSTATUS
|
||||||
|
STDCALL
|
||||||
RtlSetDaclSecurityDescriptor (
|
RtlSetDaclSecurityDescriptor (
|
||||||
PSECURITY_DESCRIPTOR SecurityDescriptor,
|
PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
BOOLEAN DaclPresent,
|
BOOLEAN DaclPresent,
|
||||||
|
@ -1058,6 +1061,7 @@ RtlValidateHeap (
|
||||||
);
|
);
|
||||||
|
|
||||||
BOOLEAN
|
BOOLEAN
|
||||||
|
STDCALL
|
||||||
RtlValidSecurityDescriptor (
|
RtlValidSecurityDescriptor (
|
||||||
PSECURITY_DESCRIPTOR SecurityDescriptor
|
PSECURITY_DESCRIPTOR SecurityDescriptor
|
||||||
);
|
);
|
||||||
|
|
|
@ -1,51 +1,21 @@
|
||||||
NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
#ifndef _INCLUDE_DDK_SEFUNCS_H
|
||||||
ULONG Revision);
|
#define _INCLUDE_DDK_SEFUNCS_H
|
||||||
|
/* $Id: sefuncs.h,v 1.3 1999/12/26 17:22:18 ea Exp $ */
|
||||||
BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor);
|
NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, ULONG Revision);
|
||||||
|
BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor);
|
||||||
ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor);
|
ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor);
|
||||||
|
NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN DaclPresent, PACL Dacl, BOOLEAN DaclDefaulted);
|
||||||
NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PBOOLEAN DaclPresent, PACL* Dacl, PBOOLEAN DaclDefauted);
|
||||||
BOOLEAN DaclPresent,
|
NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Owner, BOOLEAN OwnerDefaulted);
|
||||||
PACL Dacl,
|
NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Owner, PBOOLEAN OwnerDefaulted);
|
||||||
BOOLEAN DaclDefaulted);
|
NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Group, BOOLEAN GroupDefaulted);
|
||||||
|
NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Group, PBOOLEAN GroupDefaulted);
|
||||||
NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount);
|
||||||
PBOOLEAN DaclPresent,
|
NTSTATUS STDCALL RtlInitializeSid (PSID Sid, PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, UCHAR SubAuthorityCount);
|
||||||
PACL* Dacl,
|
PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority);
|
||||||
PBOOLEAN DaclDefauted);
|
BOOLEAN STDCALL RtlEqualSid(PSID Sid1, PSID Sid2);
|
||||||
|
NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD, PSECURITY_DESCRIPTOR RelSD, PULONG BufferLength);
|
||||||
NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PSID Owner,
|
|
||||||
BOOLEAN OwnerDefaulted);
|
|
||||||
|
|
||||||
NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|
||||||
PSID* Owner,
|
|
||||||
PBOOLEAN OwnerDefaulted);
|
|
||||||
|
|
||||||
NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|
||||||
PSID Group,
|
|
||||||
BOOLEAN GroupDefaulted);
|
|
||||||
|
|
||||||
NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|
||||||
PSID* Group,
|
|
||||||
PBOOLEAN GroupDefaulted);
|
|
||||||
|
|
||||||
ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount);
|
|
||||||
|
|
||||||
NTSTATUS RtlInitializeSid(PSID Sid,
|
|
||||||
PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
|
|
||||||
UCHAR SubAuthorityCount);
|
|
||||||
|
|
||||||
PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority);
|
|
||||||
|
|
||||||
BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2);
|
|
||||||
|
|
||||||
NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
|
||||||
PSECURITY_DESCRIPTOR RelSD,
|
|
||||||
PULONG BufferLength);
|
|
||||||
|
|
||||||
BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|
||||||
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
|
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
|
||||||
IN BOOLEAN SubjectContextLocked,
|
IN BOOLEAN SubjectContextLocked,
|
||||||
IN ACCESS_MASK DesiredAccess,
|
IN ACCESS_MASK DesiredAccess,
|
||||||
|
@ -55,19 +25,14 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
IN KPROCESSOR_MODE AccessMode,
|
IN KPROCESSOR_MODE AccessMode,
|
||||||
OUT PACCESS_MODE GrantedAccess,
|
OUT PACCESS_MODE GrantedAccess,
|
||||||
OUT PNTSTATUS AccessStatus);
|
OUT PNTSTATUS AccessStatus);
|
||||||
|
NTSTATUS STDCALL SeAssignSecurity (PSECURITY_DESCRIPTOR ParentDescriptor,
|
||||||
NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
|
|
||||||
PSECURITY_DESCRIPTOR ExplicitDescriptor,
|
PSECURITY_DESCRIPTOR ExplicitDescriptor,
|
||||||
BOOLEAN IsDirectoryObject,
|
BOOLEAN IsDirectoryObject,
|
||||||
PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||||
PGENERIC_MAPPING GenericMapping,
|
PGENERIC_MAPPING GenericMapping,
|
||||||
POOL_TYPE PoolType);
|
POOL_TYPE PoolType);
|
||||||
|
NTSTATUS STDCALL SeDeassignSecurity (PSECURITY_DESCRIPTOR* SecurityDescriptor);
|
||||||
NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor);
|
BOOLEAN STDCALL SeSinglePrivilegeCheck (LUID PrivilegeValue, KPROCESSOR_MODE PreviousMode);
|
||||||
|
ULONG STDCALL RtlLengthSid (PSID Sid);
|
||||||
BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
|
NTSTATUS STDCALL RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest);
|
||||||
KPROCESSOR_MODE PreviousMode);
|
#endif /* ndef _INCLUDE_DDK_SEFUNCS_H */
|
||||||
|
|
||||||
|
|
||||||
ULONG RtlLengthSid(PSID Sid);
|
|
||||||
NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest);
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
/*
|
/* $Id: setypes.h,v 1.3 1999/12/26 17:22:18 ea Exp $
|
||||||
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory for details
|
* COPYRIGHT: See COPYING in the top level directory for details
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* FILE: include/ddk/setypes.h
|
* FILE: include/ddk/setypes.h
|
||||||
|
@ -198,7 +199,7 @@ typedef struct _SECURITY_DESCRIPTOR {
|
||||||
PACL Dacl;
|
PACL Dacl;
|
||||||
} SECURITY_DESCRIPTOR, *PSECURITY_DESCRIPTOR;
|
} SECURITY_DESCRIPTOR, *PSECURITY_DESCRIPTOR;
|
||||||
|
|
||||||
BOOLEAN RtlValidSid(PSID Sid);
|
BOOLEAN STDCALL RtlValidSid (PSID Sid);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* from ntoskrnl/se/token.c:
|
* from ntoskrnl/se/token.c:
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# $Id: makefile_rex,v 1.42 1999/12/26 16:36:44 ea Exp $
|
# $Id: makefile_rex,v 1.43 1999/12/26 17:22:18 ea Exp $
|
||||||
#
|
#
|
||||||
# ReactOS Operating System
|
# ReactOS Operating System
|
||||||
#
|
#
|
||||||
|
@ -59,8 +59,6 @@ FS_OBJECTS = fs/mcb.o fs/util.o
|
||||||
|
|
||||||
SE_OBJECTS = se/semgr.o se/acl.o se/sid.o se/sd.o se/token.o se/luid.o
|
SE_OBJECTS = se/semgr.o se/acl.o se/sid.o se/sd.o se/token.o se/luid.o
|
||||||
|
|
||||||
SE_OBJECTS = se/semgr.o
|
|
||||||
|
|
||||||
CM_OBJECTS = cm/registry.o
|
CM_OBJECTS = cm/registry.o
|
||||||
|
|
||||||
DBG_OBJECTS = dbg/brkpoint.o dbg/errinfo.o dbg/print.o
|
DBG_OBJECTS = dbg/brkpoint.o dbg/errinfo.o dbg/print.o
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
/*
|
/* $Id: acl.c,v 1.2 1999/12/26 17:22:19 ea Exp $
|
||||||
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory
|
* COPYRIGHT: See COPYING in the top level directory
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* PURPOSE: Security manager
|
* PURPOSE: Security manager
|
||||||
|
@ -196,3 +197,6 @@ NTSTATUS RtlCreateAcl(PACL Acl, ULONG AclSize, ULONG AclRevision)
|
||||||
Acl->Sbz2 = 0;
|
Acl->Sbz2 = 0;
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* EOF */
|
||||||
|
|
|
@ -1,8 +1,9 @@
|
||||||
/*
|
/* $Id: luid.c,v 1.2 1999/12/26 17:22:19 ea Exp $
|
||||||
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory
|
* COPYRIGHT: See COPYING in the top level directory
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* PURPOSE: Security manager
|
* PURPOSE: Security manager
|
||||||
* FILE: kernel/se/semgr.c
|
* FILE: ntoskrnl/se/luid.c
|
||||||
* PROGRAMER: ?
|
* PROGRAMER: ?
|
||||||
* REVISION HISTORY:
|
* REVISION HISTORY:
|
||||||
* 26/07/98: Added stubs for security functions
|
* 26/07/98: Added stubs for security functions
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
/*
|
/* $Id: sd.c,v 1.2 1999/12/26 17:22:19 ea Exp $
|
||||||
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory
|
* COPYRIGHT: See COPYING in the top level directory
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* PURPOSE: Security manager
|
* PURPOSE: Security manager
|
||||||
|
@ -16,7 +17,7 @@
|
||||||
|
|
||||||
/* FUNCTIONS ***************************************************************/
|
/* FUNCTIONS ***************************************************************/
|
||||||
|
|
||||||
NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
ULONG Revision)
|
ULONG Revision)
|
||||||
{
|
{
|
||||||
if (Revision != 1)
|
if (Revision != 1)
|
||||||
|
@ -33,7 +34,7 @@ NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor)
|
||||||
{
|
{
|
||||||
PSID Owner;
|
PSID Owner;
|
||||||
PSID Group;
|
PSID Group;
|
||||||
|
@ -87,7 +88,7 @@ ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
||||||
return(Length);
|
return(Length);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PBOOLEAN DaclPresent,
|
PBOOLEAN DaclPresent,
|
||||||
PACL* Dacl,
|
PACL* Dacl,
|
||||||
PBOOLEAN DaclDefaulted)
|
PBOOLEAN DaclDefaulted)
|
||||||
|
@ -129,7 +130,7 @@ NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
BOOLEAN DaclPresent,
|
BOOLEAN DaclPresent,
|
||||||
PACL Dacl,
|
PACL Dacl,
|
||||||
BOOLEAN DaclDefaulted)
|
BOOLEAN DaclDefaulted)
|
||||||
|
@ -157,12 +158,12 @@ NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor)
|
||||||
{
|
{
|
||||||
UNIMPLEMENTED;
|
UNIMPLEMENTED;
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PSID Owner,
|
PSID Owner,
|
||||||
BOOLEAN OwnerDefaulted)
|
BOOLEAN OwnerDefaulted)
|
||||||
{
|
{
|
||||||
|
@ -183,7 +184,7 @@ NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PSID* Owner,
|
PSID* Owner,
|
||||||
PBOOLEAN OwnerDefaulted)
|
PBOOLEAN OwnerDefaulted)
|
||||||
{
|
{
|
||||||
|
@ -218,7 +219,7 @@ NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PSID Group,
|
PSID Group,
|
||||||
BOOLEAN GroupDefaulted)
|
BOOLEAN GroupDefaulted)
|
||||||
{
|
{
|
||||||
|
@ -239,7 +240,7 @@ NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PSID* Group,
|
PSID* Group,
|
||||||
PBOOLEAN GroupDefaulted)
|
PBOOLEAN GroupDefaulted)
|
||||||
{
|
{
|
||||||
|
@ -274,7 +275,7 @@ NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD,
|
||||||
PSECURITY_DESCRIPTOR RelSD,
|
PSECURITY_DESCRIPTOR RelSD,
|
||||||
PULONG BufferLength)
|
PULONG BufferLength)
|
||||||
{
|
{
|
||||||
|
@ -284,3 +285,6 @@ NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
||||||
}
|
}
|
||||||
UNIMPLEMENTED;
|
UNIMPLEMENTED;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* EOF */
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
/*
|
/* $Id: semgr.c,v 1.13 1999/12/26 17:22:19 ea Exp $
|
||||||
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory
|
* COPYRIGHT: See COPYING in the top level directory
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* PURPOSE: Security manager
|
* PURPOSE: Security manager
|
||||||
|
@ -199,12 +200,12 @@ NtDeleteObjectAuditAlarm (
|
||||||
UNIMPLEMENTED;
|
UNIMPLEMENTED;
|
||||||
}
|
}
|
||||||
|
|
||||||
VOID SeReleaseSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext)
|
VOID STDCALL SeReleaseSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext)
|
||||||
{
|
{
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
VOID SeCaptureSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext)
|
VOID STDCALL SeCaptureSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext)
|
||||||
{
|
{
|
||||||
PEPROCESS Process;
|
PEPROCESS Process;
|
||||||
ULONG a;
|
ULONG a;
|
||||||
|
@ -276,7 +277,7 @@ BOOLEAN SepPrivilegeCheck(PACCESS_TOKEN Token,
|
||||||
return(FALSE);
|
return(FALSE);
|
||||||
}
|
}
|
||||||
|
|
||||||
BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges,
|
BOOLEAN STDCALL SePrivilegeCheck(PPRIVILEGE_SET Privileges,
|
||||||
PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||||
KPROCESSOR_MODE PreviousMode)
|
KPROCESSOR_MODE PreviousMode)
|
||||||
{
|
{
|
||||||
|
@ -302,7 +303,7 @@ BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges,
|
||||||
PreviousMode));
|
PreviousMode));
|
||||||
}
|
}
|
||||||
|
|
||||||
BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
|
BOOLEAN STDCALL SeSinglePrivilegeCheck(LUID PrivilegeValue,
|
||||||
KPROCESSOR_MODE PreviousMode)
|
KPROCESSOR_MODE PreviousMode)
|
||||||
{
|
{
|
||||||
SECURITY_SUBJECT_CONTEXT SubjectContext;
|
SECURITY_SUBJECT_CONTEXT SubjectContext;
|
||||||
|
@ -330,12 +331,12 @@ BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
|
||||||
return(r);
|
return(r);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor)
|
NTSTATUS STDCALL SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor)
|
||||||
{
|
{
|
||||||
UNIMPLEMENTED;
|
UNIMPLEMENTED;
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
|
NTSTATUS STDCALL SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
|
||||||
PSECURITY_DESCRIPTOR ExplicitDescriptor,
|
PSECURITY_DESCRIPTOR ExplicitDescriptor,
|
||||||
BOOLEAN IsDirectoryObject,
|
BOOLEAN IsDirectoryObject,
|
||||||
PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
PSECURITY_SUBJECT_CONTEXT SubjectContext,
|
||||||
|
@ -345,7 +346,7 @@ NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
|
||||||
UNIMPLEMENTED;
|
UNIMPLEMENTED;
|
||||||
}
|
}
|
||||||
|
|
||||||
BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
|
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
|
||||||
IN BOOLEAN SubjectContextLocked,
|
IN BOOLEAN SubjectContextLocked,
|
||||||
IN ACCESS_MASK DesiredAccess,
|
IN ACCESS_MASK DesiredAccess,
|
||||||
|
@ -436,3 +437,4 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* EOF */
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
/*
|
/* $Id: sid.c,v 1.2 1999/12/26 17:22:19 ea Exp $
|
||||||
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory
|
* COPYRIGHT: See COPYING in the top level directory
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* PURPOSE: Security manager
|
* PURPOSE: Security manager
|
||||||
|
@ -16,7 +17,7 @@
|
||||||
|
|
||||||
/* FUNCTIONS ***************************************************************/
|
/* FUNCTIONS ***************************************************************/
|
||||||
|
|
||||||
BOOLEAN RtlValidSid(PSID Sid)
|
BOOLEAN STDCALL RtlValidSid (PSID Sid)
|
||||||
{
|
{
|
||||||
if ((Sid->Revision & 0xf) != 1)
|
if ((Sid->Revision & 0xf) != 1)
|
||||||
{
|
{
|
||||||
|
@ -29,12 +30,12 @@ BOOLEAN RtlValidSid(PSID Sid)
|
||||||
return(TRUE);
|
return(TRUE);
|
||||||
}
|
}
|
||||||
|
|
||||||
ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount)
|
ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount)
|
||||||
{
|
{
|
||||||
return(sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG));
|
return(sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG));
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS RtlInitializeSid(PSID Sid,
|
NTSTATUS STDCALL RtlInitializeSid (PSID Sid,
|
||||||
PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
|
PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
|
||||||
UCHAR SubAuthorityCount)
|
UCHAR SubAuthorityCount)
|
||||||
{
|
{
|
||||||
|
@ -45,17 +46,17 @@ NTSTATUS RtlInitializeSid(PSID Sid,
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority)
|
PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority)
|
||||||
{
|
{
|
||||||
return(&Sid->SubAuthority[SubAuthority]);
|
return(&Sid->SubAuthority[SubAuthority]);
|
||||||
}
|
}
|
||||||
|
|
||||||
PUCHAR RtlSubAuthorityCountSid(PSID Sid)
|
PUCHAR STDCALL RtlSubAuthorityCountSid (PSID Sid)
|
||||||
{
|
{
|
||||||
return(&Sid->SubAuthorityCount);
|
return(&Sid->SubAuthorityCount);
|
||||||
}
|
}
|
||||||
|
|
||||||
BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2)
|
BOOLEAN STDCALL RtlEqualSid (PSID Sid1, PSID Sid2)
|
||||||
{
|
{
|
||||||
if (Sid1->Revision != Sid2->Revision)
|
if (Sid1->Revision != Sid2->Revision)
|
||||||
{
|
{
|
||||||
|
@ -73,13 +74,13 @@ BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2)
|
||||||
return(TRUE);
|
return(TRUE);
|
||||||
}
|
}
|
||||||
|
|
||||||
ULONG RtlLengthSid(PSID Sid)
|
ULONG STDCALL RtlLengthSid (PSID Sid)
|
||||||
{
|
{
|
||||||
return(sizeof(SID) + (Sid->SubAuthorityCount-1)*4);
|
return(sizeof(SID) + (Sid->SubAuthorityCount-1)*4);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest)
|
NTSTATUS STDCALL RtlCopySid (ULONG BufferLength, PSID Src, PSID Dest)
|
||||||
{
|
{
|
||||||
if (BufferLength < RtlLengthSid(Src))
|
if (BufferLength < RtlLengthSid(Src))
|
||||||
{
|
{
|
||||||
|
@ -88,3 +89,6 @@ NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest)
|
||||||
memmove(Dest, Src, RtlLengthSid(Src));
|
memmove(Dest, Src, RtlLengthSid(Src));
|
||||||
return(STATUS_SUCCESS);
|
return(STATUS_SUCCESS);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* EOF */
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
/*
|
/* $Id: token.c,v 1.2 1999/12/26 17:22:19 ea Exp $
|
||||||
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory
|
* COPYRIGHT: See COPYING in the top level directory
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* PURPOSE: Security manager
|
* PURPOSE: Security manager
|
||||||
|
@ -118,3 +119,5 @@ NTSTATUS STDCALL NtCreateToken(OUT PHANDLE TokenHandle,
|
||||||
UNIMPLEMENTED;
|
UNIMPLEMENTED;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* EOF */
|
||||||
|
|
Loading…
Reference in a new issue