Some missing __stdcall declarations added in headers and in code.

svn path=/trunk/; revision=903
This commit is contained in:
Emanuele Aliberti 1999-12-26 17:22:19 +00:00
parent 6b50f46c2f
commit ea5959a772
11 changed files with 84 additions and 97 deletions

View file

@ -1,5 +1,6 @@
#ifndef __INCLUDE_DDK_FSFUNCS_H #ifndef __INCLUDE_DDK_FSFUNCS_H
#define __INCLUDE_DDK_FSFUNCS_H #define __INCLUDE_DDK_FSFUNCS_H
/* $Id: fsfuncs.h,v 1.2 1999/12/26 17:22:18 ea Exp $ */
VOID VOID
STDCALL STDCALL
FsRtlAddLargeMcbEntry ( FsRtlAddLargeMcbEntry (

View file

@ -1,4 +1,4 @@
/* $Id: rtl.h,v 1.21 1999/12/18 10:15:11 ea Exp $ /* $Id: rtl.h,v 1.22 1999/12/26 17:22:18 ea Exp $
* *
*/ */
@ -367,6 +367,7 @@ RtlCreateRegistryKey (
); );
NTSTATUS NTSTATUS
STDCALL
RtlCreateSecurityDescriptor ( RtlCreateSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor, PSECURITY_DESCRIPTOR SecurityDescriptor,
ULONG Revision ULONG Revision
@ -760,6 +761,7 @@ RtlLargeIntegerSubtract (
); );
ULONG ULONG
STDCALL
RtlLengthSecurityDescriptor ( RtlLengthSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor PSECURITY_DESCRIPTOR SecurityDescriptor
); );
@ -864,6 +866,7 @@ RtlRetrieveUshort (
); );
NTSTATUS NTSTATUS
STDCALL
RtlSetDaclSecurityDescriptor ( RtlSetDaclSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor, PSECURITY_DESCRIPTOR SecurityDescriptor,
BOOLEAN DaclPresent, BOOLEAN DaclPresent,
@ -1058,6 +1061,7 @@ RtlValidateHeap (
); );
BOOLEAN BOOLEAN
STDCALL
RtlValidSecurityDescriptor ( RtlValidSecurityDescriptor (
PSECURITY_DESCRIPTOR SecurityDescriptor PSECURITY_DESCRIPTOR SecurityDescriptor
); );

View file

@ -1,51 +1,21 @@
NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, #ifndef _INCLUDE_DDK_SEFUNCS_H
ULONG Revision); #define _INCLUDE_DDK_SEFUNCS_H
/* $Id: sefuncs.h,v 1.3 1999/12/26 17:22:18 ea Exp $ */
BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor); NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, ULONG Revision);
BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor);
ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor); ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor);
NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN DaclPresent, PACL Dacl, BOOLEAN DaclDefaulted);
NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PBOOLEAN DaclPresent, PACL* Dacl, PBOOLEAN DaclDefauted);
BOOLEAN DaclPresent, NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Owner, BOOLEAN OwnerDefaulted);
PACL Dacl, NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Owner, PBOOLEAN OwnerDefaulted);
BOOLEAN DaclDefaulted); NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID Group, BOOLEAN GroupDefaulted);
NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor, PSID* Group, PBOOLEAN GroupDefaulted);
NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount);
PBOOLEAN DaclPresent, NTSTATUS STDCALL RtlInitializeSid (PSID Sid, PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, UCHAR SubAuthorityCount);
PACL* Dacl, PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority);
PBOOLEAN DaclDefauted); BOOLEAN STDCALL RtlEqualSid(PSID Sid1, PSID Sid2);
NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD, PSECURITY_DESCRIPTOR RelSD, PULONG BufferLength);
NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Owner,
BOOLEAN OwnerDefaulted);
NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Owner,
PBOOLEAN OwnerDefaulted);
NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Group,
BOOLEAN GroupDefaulted);
NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Group,
PBOOLEAN GroupDefaulted);
ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount);
NTSTATUS RtlInitializeSid(PSID Sid,
PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
UCHAR SubAuthorityCount);
PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority);
BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2);
NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
PSECURITY_DESCRIPTOR RelSD,
PULONG BufferLength);
BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext, IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
IN BOOLEAN SubjectContextLocked, IN BOOLEAN SubjectContextLocked,
IN ACCESS_MASK DesiredAccess, IN ACCESS_MASK DesiredAccess,
@ -55,19 +25,14 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN KPROCESSOR_MODE AccessMode, IN KPROCESSOR_MODE AccessMode,
OUT PACCESS_MODE GrantedAccess, OUT PACCESS_MODE GrantedAccess,
OUT PNTSTATUS AccessStatus); OUT PNTSTATUS AccessStatus);
NTSTATUS STDCALL SeAssignSecurity (PSECURITY_DESCRIPTOR ParentDescriptor,
NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
PSECURITY_DESCRIPTOR ExplicitDescriptor, PSECURITY_DESCRIPTOR ExplicitDescriptor,
BOOLEAN IsDirectoryObject, BOOLEAN IsDirectoryObject,
PSECURITY_SUBJECT_CONTEXT SubjectContext, PSECURITY_SUBJECT_CONTEXT SubjectContext,
PGENERIC_MAPPING GenericMapping, PGENERIC_MAPPING GenericMapping,
POOL_TYPE PoolType); POOL_TYPE PoolType);
NTSTATUS STDCALL SeDeassignSecurity (PSECURITY_DESCRIPTOR* SecurityDescriptor);
NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor); BOOLEAN STDCALL SeSinglePrivilegeCheck (LUID PrivilegeValue, KPROCESSOR_MODE PreviousMode);
ULONG STDCALL RtlLengthSid (PSID Sid);
BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue, NTSTATUS STDCALL RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest);
KPROCESSOR_MODE PreviousMode); #endif /* ndef _INCLUDE_DDK_SEFUNCS_H */
ULONG RtlLengthSid(PSID Sid);
NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest);

View file

@ -1,4 +1,5 @@
/* /* $Id: setypes.h,v 1.3 1999/12/26 17:22:18 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory for details * COPYRIGHT: See COPYING in the top level directory for details
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
* FILE: include/ddk/setypes.h * FILE: include/ddk/setypes.h
@ -198,7 +199,7 @@ typedef struct _SECURITY_DESCRIPTOR {
PACL Dacl; PACL Dacl;
} SECURITY_DESCRIPTOR, *PSECURITY_DESCRIPTOR; } SECURITY_DESCRIPTOR, *PSECURITY_DESCRIPTOR;
BOOLEAN RtlValidSid(PSID Sid); BOOLEAN STDCALL RtlValidSid (PSID Sid);
/* /*
* from ntoskrnl/se/token.c: * from ntoskrnl/se/token.c:

View file

@ -1,4 +1,4 @@
# $Id: makefile_rex,v 1.42 1999/12/26 16:36:44 ea Exp $ # $Id: makefile_rex,v 1.43 1999/12/26 17:22:18 ea Exp $
# #
# ReactOS Operating System # ReactOS Operating System
# #
@ -59,8 +59,6 @@ FS_OBJECTS = fs/mcb.o fs/util.o
SE_OBJECTS = se/semgr.o se/acl.o se/sid.o se/sd.o se/token.o se/luid.o SE_OBJECTS = se/semgr.o se/acl.o se/sid.o se/sd.o se/token.o se/luid.o
SE_OBJECTS = se/semgr.o
CM_OBJECTS = cm/registry.o CM_OBJECTS = cm/registry.o
DBG_OBJECTS = dbg/brkpoint.o dbg/errinfo.o dbg/print.o DBG_OBJECTS = dbg/brkpoint.o dbg/errinfo.o dbg/print.o

View file

@ -1,4 +1,5 @@
/* /* $Id: acl.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
* PURPOSE: Security manager * PURPOSE: Security manager
@ -196,3 +197,6 @@ NTSTATUS RtlCreateAcl(PACL Acl, ULONG AclSize, ULONG AclRevision)
Acl->Sbz2 = 0; Acl->Sbz2 = 0;
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
/* EOF */

View file

@ -1,8 +1,9 @@
/* /* $Id: luid.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
* PURPOSE: Security manager * PURPOSE: Security manager
* FILE: kernel/se/semgr.c * FILE: ntoskrnl/se/luid.c
* PROGRAMER: ? * PROGRAMER: ?
* REVISION HISTORY: * REVISION HISTORY:
* 26/07/98: Added stubs for security functions * 26/07/98: Added stubs for security functions

View file

@ -1,4 +1,5 @@
/* /* $Id: sd.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
* PURPOSE: Security manager * PURPOSE: Security manager
@ -16,7 +17,7 @@
/* FUNCTIONS ***************************************************************/ /* FUNCTIONS ***************************************************************/
NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlCreateSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
ULONG Revision) ULONG Revision)
{ {
if (Revision != 1) if (Revision != 1)
@ -33,7 +34,7 @@ NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor) ULONG STDCALL RtlLengthSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor)
{ {
PSID Owner; PSID Owner;
PSID Group; PSID Group;
@ -87,7 +88,7 @@ ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
return(Length); return(Length);
} }
NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlGetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PBOOLEAN DaclPresent, PBOOLEAN DaclPresent,
PACL* Dacl, PACL* Dacl,
PBOOLEAN DaclDefaulted) PBOOLEAN DaclDefaulted)
@ -129,7 +130,7 @@ NTSTATUS RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlSetDaclSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
BOOLEAN DaclPresent, BOOLEAN DaclPresent,
PACL Dacl, PACL Dacl,
BOOLEAN DaclDefaulted) BOOLEAN DaclDefaulted)
@ -157,12 +158,12 @@ NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor) BOOLEAN STDCALL RtlValidSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor)
{ {
UNIMPLEMENTED; UNIMPLEMENTED;
} }
NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlSetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Owner, PSID Owner,
BOOLEAN OwnerDefaulted) BOOLEAN OwnerDefaulted)
{ {
@ -183,7 +184,7 @@ NTSTATUS RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlGetOwnerSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Owner, PSID* Owner,
PBOOLEAN OwnerDefaulted) PBOOLEAN OwnerDefaulted)
{ {
@ -218,7 +219,7 @@ NTSTATUS RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlSetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID Group, PSID Group,
BOOLEAN GroupDefaulted) BOOLEAN GroupDefaulted)
{ {
@ -239,7 +240,7 @@ NTSTATUS RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor, NTSTATUS STDCALL RtlGetGroupSecurityDescriptor (PSECURITY_DESCRIPTOR SecurityDescriptor,
PSID* Group, PSID* Group,
PBOOLEAN GroupDefaulted) PBOOLEAN GroupDefaulted)
{ {
@ -274,7 +275,7 @@ NTSTATUS RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD, NTSTATUS STDCALL RtlAbsoluteToSelfRelativeSD (PSECURITY_DESCRIPTOR AbsSD,
PSECURITY_DESCRIPTOR RelSD, PSECURITY_DESCRIPTOR RelSD,
PULONG BufferLength) PULONG BufferLength)
{ {
@ -284,3 +285,6 @@ NTSTATUS RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
} }
UNIMPLEMENTED; UNIMPLEMENTED;
} }
/* EOF */

View file

@ -1,4 +1,5 @@
/* /* $Id: semgr.c,v 1.13 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
* PURPOSE: Security manager * PURPOSE: Security manager
@ -199,12 +200,12 @@ NtDeleteObjectAuditAlarm (
UNIMPLEMENTED; UNIMPLEMENTED;
} }
VOID SeReleaseSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext) VOID STDCALL SeReleaseSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext)
{ {
} }
VOID SeCaptureSubjectContext(PSECURITY_SUBJECT_CONTEXT SubjectContext) VOID STDCALL SeCaptureSubjectContext (PSECURITY_SUBJECT_CONTEXT SubjectContext)
{ {
PEPROCESS Process; PEPROCESS Process;
ULONG a; ULONG a;
@ -276,7 +277,7 @@ BOOLEAN SepPrivilegeCheck(PACCESS_TOKEN Token,
return(FALSE); return(FALSE);
} }
BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges, BOOLEAN STDCALL SePrivilegeCheck(PPRIVILEGE_SET Privileges,
PSECURITY_SUBJECT_CONTEXT SubjectContext, PSECURITY_SUBJECT_CONTEXT SubjectContext,
KPROCESSOR_MODE PreviousMode) KPROCESSOR_MODE PreviousMode)
{ {
@ -302,7 +303,7 @@ BOOLEAN SePrivilegeCheck(PPRIVILEGE_SET Privileges,
PreviousMode)); PreviousMode));
} }
BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue, BOOLEAN STDCALL SeSinglePrivilegeCheck(LUID PrivilegeValue,
KPROCESSOR_MODE PreviousMode) KPROCESSOR_MODE PreviousMode)
{ {
SECURITY_SUBJECT_CONTEXT SubjectContext; SECURITY_SUBJECT_CONTEXT SubjectContext;
@ -330,12 +331,12 @@ BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
return(r); return(r);
} }
NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor) NTSTATUS STDCALL SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor)
{ {
UNIMPLEMENTED; UNIMPLEMENTED;
} }
NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor, NTSTATUS STDCALL SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
PSECURITY_DESCRIPTOR ExplicitDescriptor, PSECURITY_DESCRIPTOR ExplicitDescriptor,
BOOLEAN IsDirectoryObject, BOOLEAN IsDirectoryObject,
PSECURITY_SUBJECT_CONTEXT SubjectContext, PSECURITY_SUBJECT_CONTEXT SubjectContext,
@ -345,7 +346,7 @@ NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
UNIMPLEMENTED; UNIMPLEMENTED;
} }
BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor, BOOLEAN STDCALL SeAccessCheck (IN PSECURITY_DESCRIPTOR SecurityDescriptor,
IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext, IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
IN BOOLEAN SubjectContextLocked, IN BOOLEAN SubjectContextLocked,
IN ACCESS_MASK DesiredAccess, IN ACCESS_MASK DesiredAccess,
@ -436,3 +437,4 @@ BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
} }
/* EOF */

View file

@ -1,4 +1,5 @@
/* /* $Id: sid.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
* PURPOSE: Security manager * PURPOSE: Security manager
@ -16,7 +17,7 @@
/* FUNCTIONS ***************************************************************/ /* FUNCTIONS ***************************************************************/
BOOLEAN RtlValidSid(PSID Sid) BOOLEAN STDCALL RtlValidSid (PSID Sid)
{ {
if ((Sid->Revision & 0xf) != 1) if ((Sid->Revision & 0xf) != 1)
{ {
@ -29,12 +30,12 @@ BOOLEAN RtlValidSid(PSID Sid)
return(TRUE); return(TRUE);
} }
ULONG RtlLengthRequiredSid(UCHAR SubAuthorityCount) ULONG STDCALL RtlLengthRequiredSid (UCHAR SubAuthorityCount)
{ {
return(sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG)); return(sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG));
} }
NTSTATUS RtlInitializeSid(PSID Sid, NTSTATUS STDCALL RtlInitializeSid (PSID Sid,
PSID_IDENTIFIER_AUTHORITY IdentifierAuthority, PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
UCHAR SubAuthorityCount) UCHAR SubAuthorityCount)
{ {
@ -45,17 +46,17 @@ NTSTATUS RtlInitializeSid(PSID Sid,
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
PULONG RtlSubAuthoritySid(PSID Sid, ULONG SubAuthority) PULONG STDCALL RtlSubAuthoritySid (PSID Sid, ULONG SubAuthority)
{ {
return(&Sid->SubAuthority[SubAuthority]); return(&Sid->SubAuthority[SubAuthority]);
} }
PUCHAR RtlSubAuthorityCountSid(PSID Sid) PUCHAR STDCALL RtlSubAuthorityCountSid (PSID Sid)
{ {
return(&Sid->SubAuthorityCount); return(&Sid->SubAuthorityCount);
} }
BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2) BOOLEAN STDCALL RtlEqualSid (PSID Sid1, PSID Sid2)
{ {
if (Sid1->Revision != Sid2->Revision) if (Sid1->Revision != Sid2->Revision)
{ {
@ -73,13 +74,13 @@ BOOLEAN RtlEqualSid(PSID Sid1, PSID Sid2)
return(TRUE); return(TRUE);
} }
ULONG RtlLengthSid(PSID Sid) ULONG STDCALL RtlLengthSid (PSID Sid)
{ {
return(sizeof(SID) + (Sid->SubAuthorityCount-1)*4); return(sizeof(SID) + (Sid->SubAuthorityCount-1)*4);
} }
NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest) NTSTATUS STDCALL RtlCopySid (ULONG BufferLength, PSID Src, PSID Dest)
{ {
if (BufferLength < RtlLengthSid(Src)) if (BufferLength < RtlLengthSid(Src))
{ {
@ -88,3 +89,6 @@ NTSTATUS RtlCopySid(ULONG BufferLength, PSID Src, PSID Dest)
memmove(Dest, Src, RtlLengthSid(Src)); memmove(Dest, Src, RtlLengthSid(Src));
return(STATUS_SUCCESS); return(STATUS_SUCCESS);
} }
/* EOF */

View file

@ -1,4 +1,5 @@
/* /* $Id: token.c,v 1.2 1999/12/26 17:22:19 ea Exp $
*
* COPYRIGHT: See COPYING in the top level directory * COPYRIGHT: See COPYING in the top level directory
* PROJECT: ReactOS kernel * PROJECT: ReactOS kernel
* PURPOSE: Security manager * PURPOSE: Security manager
@ -118,3 +119,5 @@ NTSTATUS STDCALL NtCreateToken(OUT PHANDLE TokenHandle,
UNIMPLEMENTED; UNIMPLEMENTED;
} }
/* EOF */