mirror of
https://github.com/reactos/reactos.git
synced 2024-12-28 10:04:49 +00:00
strip whitespace from end of lines
svn path=/trunk/; revision=15165
This commit is contained in:
parent
e4be245882
commit
eace72f07c
18 changed files with 150 additions and 150 deletions
|
@ -25,7 +25,7 @@ RtlFirstFreeAce(PACL Acl,
|
|||
PACE Current;
|
||||
PVOID AclEnd;
|
||||
ULONG i;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Current = (PACE)(Acl + 1);
|
||||
|
@ -71,7 +71,7 @@ RtlGetAce(PACL Acl,
|
|||
PACE *Ace)
|
||||
{
|
||||
ULONG i;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
*Ace = (PACE)(Acl + 1);
|
||||
|
@ -114,7 +114,7 @@ RtlpAddKnownAce (PACL Acl,
|
|||
ULONG Type)
|
||||
{
|
||||
PACE Ace;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (!RtlValidSid(Sid))
|
||||
|
@ -164,7 +164,7 @@ RtlAddAccessAllowedAce (IN OUT PACL Acl,
|
|||
IN PSID Sid)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return RtlpAddKnownAce (Acl,
|
||||
Revision,
|
||||
0,
|
||||
|
@ -185,7 +185,7 @@ RtlAddAccessAllowedAceEx (IN OUT PACL Acl,
|
|||
IN PSID Sid)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return RtlpAddKnownAce (Acl,
|
||||
Revision,
|
||||
Flags,
|
||||
|
@ -205,7 +205,7 @@ RtlAddAccessDeniedAce (PACL Acl,
|
|||
PSID Sid)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return RtlpAddKnownAce (Acl,
|
||||
Revision,
|
||||
0,
|
||||
|
@ -226,7 +226,7 @@ RtlAddAccessDeniedAceEx (IN OUT PACL Acl,
|
|||
IN PSID Sid)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return RtlpAddKnownAce (Acl,
|
||||
Revision,
|
||||
Flags,
|
||||
|
@ -272,7 +272,7 @@ RtlAddAce(PACL Acl,
|
|||
ULONG i;
|
||||
PACE Current;
|
||||
ULONG j;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||
|
@ -354,7 +354,7 @@ RtlAddAuditAccessAce(PACL Acl,
|
|||
{
|
||||
PACE Ace;
|
||||
ULONG Flags = 0;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (Success != FALSE)
|
||||
|
@ -425,7 +425,7 @@ RtlAddAuditAccessAceEx(PACL Acl,
|
|||
BOOLEAN Failure)
|
||||
{
|
||||
PACE Ace;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (Success != FALSE)
|
||||
|
@ -513,7 +513,7 @@ RtlDeleteAce(PACL Acl,
|
|||
{
|
||||
PACE Ace;
|
||||
PACE Current;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||
|
@ -557,7 +557,7 @@ RtlCreateAcl(PACL Acl,
|
|||
ULONG AclRevision)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (AclSize < 8)
|
||||
{
|
||||
return(STATUS_BUFFER_TOO_SMALL);
|
||||
|
@ -595,7 +595,7 @@ RtlQueryInformationAcl(PACL Acl,
|
|||
ACL_INFORMATION_CLASS InformationClass)
|
||||
{
|
||||
PACE Ace;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||
|
@ -664,7 +664,7 @@ RtlSetInformationAcl(PACL Acl,
|
|||
ACL_INFORMATION_CLASS InformationClass)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||
Acl->AclRevision > MAX_ACL_REVISION)
|
||||
{
|
||||
|
@ -707,7 +707,7 @@ RtlValidAcl (PACL Acl)
|
|||
{
|
||||
PACE Ace;
|
||||
USHORT Size;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Size = ROUND_UP(Acl->AclSize, 4);
|
||||
|
|
|
@ -155,8 +155,8 @@ RtlExpandEnvironmentStrings_U(PWSTR Environment,
|
|||
}
|
||||
else
|
||||
{
|
||||
/* Process environment variable. */
|
||||
|
||||
/* Process environment variable. */
|
||||
|
||||
VariableEnd = SourceBuffer + 1;
|
||||
Tail = SourceLength - 1;
|
||||
while (*VariableEnd != L'%' && Tail != 0)
|
||||
|
@ -167,7 +167,7 @@ RtlExpandEnvironmentStrings_U(PWSTR Environment,
|
|||
|
||||
if (Tail != 0)
|
||||
{
|
||||
Variable.MaximumLength =
|
||||
Variable.MaximumLength =
|
||||
Variable.Length = (VariableEnd - (SourceBuffer + 1)) * sizeof(WCHAR);
|
||||
Variable.Buffer = SourceBuffer + 1;
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
|
||||
/*
|
||||
* Partially taken from WINE, original copyright:
|
||||
*
|
||||
*
|
||||
* Copyright 2000 Alexandre Julliard
|
||||
*/
|
||||
|
||||
|
@ -862,7 +862,7 @@ RtlMapSecurityErrorToNtStatus(
|
|||
* RtlNtStatusToDosErrorNoTeb
|
||||
*
|
||||
* DESCRIPTION
|
||||
* Convert an Executive status ID into a DOS error number
|
||||
* Convert an Executive status ID into a DOS error number
|
||||
* (winerror.h).
|
||||
*
|
||||
* ARGUMENTS
|
||||
|
@ -924,7 +924,7 @@ RtlNtStatusToDosErrorNoTeb(IN NTSTATUS Status)
|
|||
* RtlNtStatusToDosError
|
||||
*
|
||||
* DESCRIPTION
|
||||
* Convert an Executive status ID into a DOS error number
|
||||
* Convert an Executive status ID into a DOS error number
|
||||
* (winerror.h).
|
||||
*
|
||||
* ARGUMENTS
|
||||
|
@ -958,17 +958,17 @@ RtlNtStatusToDosError(IN NTSTATUS Status)
|
|||
* DESCRIPTION
|
||||
* Convert an Executive status ID into a POSIX error number
|
||||
* (errno.h).
|
||||
*
|
||||
*
|
||||
* NOTE
|
||||
* Not present in the legacy WNT (a ReactOS extension to support
|
||||
* the POSIX+ subsystem).
|
||||
*
|
||||
*
|
||||
* ARGUMENTS
|
||||
* Status The Executive status ID to convert.
|
||||
*
|
||||
* RETURN VALUE
|
||||
* errno as in errno.h
|
||||
*
|
||||
*
|
||||
* REVISIONS
|
||||
* 1999-11-30 ea
|
||||
*/
|
||||
|
|
|
@ -32,8 +32,8 @@ RtlpCaptureContext(PCONTEXT Context);
|
|||
NTSTATUS
|
||||
STDCALL
|
||||
RtlDispatchException(
|
||||
PEXCEPTION_RECORD pExcptRec,
|
||||
CONTEXT * pContext
|
||||
PEXCEPTION_RECORD pExcptRec,
|
||||
CONTEXT * pContext
|
||||
)
|
||||
{
|
||||
UNIMPLEMENTED;
|
||||
|
@ -69,7 +69,7 @@ RtlRaiseException(PEXCEPTION_RECORD ExceptionRecord)
|
|||
|
||||
Status = ZwRaiseException(ExceptionRecord, &Context, TRUE);
|
||||
RtlRaiseException(ExceptionRecord);
|
||||
RtlRaiseStatus(Status);
|
||||
RtlRaiseStatus(Status);
|
||||
}
|
||||
|
||||
|
||||
|
|
|
@ -352,7 +352,7 @@ static inline BOOLEAN HEAP_Decommit( SUBHEAP *subheap, PVOID ptr, ULONG flags )
|
|||
subheap->heap );
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
subheap->commitSize -= decommitsize;
|
||||
return TRUE;
|
||||
}
|
||||
|
@ -1077,12 +1077,12 @@ RtlCreateHeap(ULONG flags,
|
|||
|
||||
/* link it into the per-process heap list */
|
||||
RtlEnterCriticalSection (&RtlpProcessHeapsListLock);
|
||||
|
||||
|
||||
heapPtr = subheap->heap;
|
||||
heapPtr->next = (HEAP*)NtCurrentPeb()->ProcessHeaps;
|
||||
NtCurrentPeb()->ProcessHeaps = (HANDLE)heapPtr;
|
||||
NtCurrentPeb()->NumberOfHeaps++;
|
||||
|
||||
|
||||
RtlLeaveCriticalSection (&RtlpProcessHeapsListLock);
|
||||
|
||||
return (HANDLE)subheap;
|
||||
|
@ -1095,7 +1095,7 @@ RtlCreateHeap(ULONG flags,
|
|||
* FALSE: Failure
|
||||
*
|
||||
* @implemented
|
||||
*
|
||||
*
|
||||
* RETURNS
|
||||
* Success: A NULL HANDLE, if heap is NULL or it was destroyed
|
||||
* Failure: The Heap handle, if heap is the process heap.
|
||||
|
@ -1112,17 +1112,17 @@ RtlDestroyHeap(HANDLE heap) /* [in] Handle of heap */
|
|||
if (!heapPtr)
|
||||
return heap;
|
||||
|
||||
if (heap == NtCurrentPeb()->ProcessHeap)
|
||||
if (heap == NtCurrentPeb()->ProcessHeap)
|
||||
return heap; /* cannot delete the main process heap */
|
||||
|
||||
|
||||
/* remove it from the per-process list */
|
||||
RtlEnterCriticalSection (&RtlpProcessHeapsListLock);
|
||||
|
||||
|
||||
pptr = (HEAP**)&NtCurrentPeb()->ProcessHeaps;
|
||||
while (*pptr && *pptr != heapPtr) pptr = &(*pptr)->next;
|
||||
if (*pptr) *pptr = (*pptr)->next;
|
||||
NtCurrentPeb()->NumberOfHeaps--;
|
||||
|
||||
|
||||
RtlLeaveCriticalSection (&RtlpProcessHeapsListLock);
|
||||
|
||||
RtlDeleteCriticalSection( &heapPtr->critSection );
|
||||
|
@ -1715,7 +1715,7 @@ RtlEnumProcessHeaps(PHEAP_ENUMERATION_ROUTINE HeapEnumerationRoutine,
|
|||
{
|
||||
NTSTATUS Status = STATUS_SUCCESS;
|
||||
HEAP** pptr;
|
||||
|
||||
|
||||
RtlEnterCriticalSection(&RtlpProcessHeapsListLock);
|
||||
|
||||
for (pptr = (HEAP**)&NtCurrentPeb()->ProcessHeaps; *pptr; pptr = &(*pptr)->next)
|
||||
|
@ -1744,7 +1744,7 @@ RtlGetProcessHeaps(ULONG HeapCount,
|
|||
RtlEnterCriticalSection(&RtlpProcessHeapsListLock);
|
||||
|
||||
Result = NtCurrentPeb()->NumberOfHeaps;
|
||||
|
||||
|
||||
if (NtCurrentPeb()->NumberOfHeaps <= HeapCount)
|
||||
{
|
||||
int i = 0;
|
||||
|
|
|
@ -98,7 +98,7 @@ RtlpDispatchException(IN PEXCEPTION_RECORD ExceptionRecord,
|
|||
#endif /* NDEBUG */
|
||||
|
||||
RegistrationFrame = SehpGetExceptionList();
|
||||
|
||||
|
||||
DPRINT("RegistrationFrame is 0x%X\n", RegistrationFrame);
|
||||
|
||||
while ((ULONG_PTR)RegistrationFrame != -1)
|
||||
|
@ -125,7 +125,7 @@ RtlpDispatchException(IN PEXCEPTION_RECORD ExceptionRecord,
|
|||
ExceptionRecord->ExceptionFlags |= EXCEPTION_STACK_INVALID;
|
||||
return ExceptionContinueExecution;
|
||||
}
|
||||
|
||||
|
||||
// Make sure stack is DWORD aligned
|
||||
if ((ULONG_PTR)RegistrationFrame & 3)
|
||||
{
|
||||
|
@ -223,14 +223,14 @@ RtlpDispatchException(IN PEXCEPTION_RECORD ExceptionRecord,
|
|||
|
||||
RegistrationFrame = RegistrationFrame->prev; // Go to previous frame
|
||||
}
|
||||
|
||||
|
||||
/* No exception handler will handle this exception */
|
||||
|
||||
DPRINT("RtlpDispatchException(): Return ExceptionContinueExecution\n");
|
||||
|
||||
ExceptionRecord->ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||
|
||||
return ExceptionContinueExecution;
|
||||
return ExceptionContinueExecution;
|
||||
}
|
||||
|
||||
|
||||
|
@ -245,7 +245,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
{
|
||||
PEXCEPTION_REGISTRATION ERHead;
|
||||
PEXCEPTION_RECORD pExceptRec;
|
||||
EXCEPTION_RECORD TempER;
|
||||
EXCEPTION_RECORD TempER;
|
||||
CONTEXT Context;
|
||||
|
||||
DPRINT("RtlUnwind(). RegistrationFrame 0x%X\n", RegistrationFrame);
|
||||
|
@ -255,7 +255,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
#endif /* NDEBUG */
|
||||
|
||||
ERHead = SehpGetExceptionList();
|
||||
|
||||
|
||||
DPRINT("ERHead is 0x%X\n", ERHead);
|
||||
|
||||
if (ExceptionRecord == NULL) // The normal case
|
||||
|
@ -302,12 +302,12 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
|
||||
Context.Esp += 0x10;
|
||||
Context.Eax = EaxValue;
|
||||
|
||||
|
||||
// Begin traversing the list of EXCEPTION_REGISTRATION
|
||||
while ((ULONG_PTR)ERHead != -1 && ERHead != RegistrationFrame)
|
||||
{
|
||||
EXCEPTION_RECORD er2;
|
||||
|
||||
|
||||
DPRINT("ERHead 0x%X\n", ERHead);
|
||||
|
||||
// If there's an exception frame, but it's lower on the stack
|
||||
|
@ -320,11 +320,11 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
er2.ExceptionRecord = pExceptRec;
|
||||
er2.NumberParameters = 0;
|
||||
er2.ExceptionCode = STATUS_INVALID_UNWIND_TARGET;
|
||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||
|
||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||
|
||||
RtlRaiseException(&er2);
|
||||
}
|
||||
|
||||
|
||||
#if 0
|
||||
Stack = ERHead + sizeof(EXCEPTION_REGISTRATION);
|
||||
if ( (Teb->Tib.StackBase <= (PVOID)ERHead ) // Make sure that ERHead
|
||||
|
@ -337,7 +337,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
PEXCEPTION_REGISTRATION NewERHead;
|
||||
PEXCEPTION_REGISTRATION pCurrExceptReg;
|
||||
EXCEPTION_DISPOSITION ReturnValue;
|
||||
|
||||
|
||||
DPRINT("Executing handler at 0x%X for unwind\n", ERHead->handler);
|
||||
|
||||
ReturnValue = RtlpExecuteHandlerForUnwind(
|
||||
|
@ -346,7 +346,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
&Context,
|
||||
&NewERHead,
|
||||
ERHead->handler);
|
||||
|
||||
|
||||
DPRINT("Handler at 0x%X returned 0x%X\n", ERHead->handler, ReturnValue);
|
||||
|
||||
if (ReturnValue != ExceptionContinueSearch)
|
||||
|
@ -358,8 +358,8 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
er2.ExceptionRecord = pExceptRec;
|
||||
er2.NumberParameters = 0;
|
||||
er2.ExceptionCode = STATUS_INVALID_DISPOSITION;
|
||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||
|
||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||
|
||||
RtlRaiseException(&er2);
|
||||
}
|
||||
else
|
||||
|
@ -367,7 +367,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
ERHead = NewERHead;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
pCurrExceptReg = ERHead;
|
||||
ERHead = ERHead->prev;
|
||||
|
||||
|
@ -386,8 +386,8 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
|||
er2.ExceptionRecord = pExceptRec;
|
||||
er2.NumberParameters = 0;
|
||||
er2.ExceptionCode = STATUS_BAD_STACK;
|
||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||
|
||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||
|
||||
RtlRaiseException(&er2);
|
||||
}
|
||||
}
|
||||
|
|
|
@ -23,7 +23,7 @@ RtlCopyLuid(PLUID LuidDest,
|
|||
PLUID LuidSrc)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
LuidDest->LowPart = LuidSrc->LowPart;
|
||||
LuidDest->HighPart = LuidSrc->HighPart;
|
||||
}
|
||||
|
@ -38,7 +38,7 @@ RtlCopyLuidAndAttributesArray(ULONG Count,
|
|||
PLUID_AND_ATTRIBUTES Dest)
|
||||
{
|
||||
ULONG i;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
for (i = 0; i < Count; i++)
|
||||
|
@ -58,7 +58,7 @@ RtlEqualLuid(PLUID Luid1,
|
|||
PLUID Luid2)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return (Luid1->LowPart == Luid2->LowPart &&
|
||||
Luid1->HighPart == Luid2->HighPart);
|
||||
}
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
|
||||
/* $Id$
|
||||
*
|
||||
*
|
||||
* COPYRIGHT: See COPYING in the top level directory
|
||||
* PROJECT: ReactOS kernel
|
||||
* FILE: lib/rtl/mem.c
|
||||
|
|
|
@ -158,8 +158,8 @@ RtlIpv4StringToAddressExA(
|
|||
NTSTATUS
|
||||
STDCALL
|
||||
RtlIpv4StringToAddressW(
|
||||
IN LPWSTR IpString,
|
||||
IN ULONG Base,
|
||||
IN LPWSTR IpString,
|
||||
IN ULONG Base,
|
||||
OUT PVOID PtrToIpAddr,
|
||||
OUT ULONG IpAddr
|
||||
)
|
||||
|
|
|
@ -30,13 +30,13 @@ RtlpMapFile(PUNICODE_STRING ImageFileName,
|
|||
OBJECT_ATTRIBUTES ObjectAttributes;
|
||||
PSECURITY_DESCRIPTOR SecurityDescriptor = NULL;
|
||||
NTSTATUS Status;
|
||||
|
||||
|
||||
hFile = NULL;
|
||||
|
||||
RtlDeNormalizeProcessParams (Ppb);
|
||||
|
||||
// DbgPrint("ImagePathName %x\n", Ppb->ImagePathName.Buffer);
|
||||
|
||||
|
||||
InitializeObjectAttributes(&ObjectAttributes,
|
||||
ImageFileName,
|
||||
Attributes & (OBJ_CASE_INSENSITIVE | OBJ_INHERIT),
|
||||
|
@ -44,7 +44,7 @@ RtlpMapFile(PUNICODE_STRING ImageFileName,
|
|||
SecurityDescriptor);
|
||||
|
||||
RtlNormalizeProcessParams (Ppb);
|
||||
|
||||
|
||||
/*
|
||||
* Try to open the executable
|
||||
*/
|
||||
|
@ -195,7 +195,7 @@ static NTSTATUS KlInitPeb (HANDLE ProcessHandle,
|
|||
* - The first thread is created suspended, so it needs a manual resume!!!
|
||||
* - If ParentProcess is NULL, current process is used
|
||||
* - ProcessParameters must be normalized
|
||||
* - Attributes are object attribute flags used when opening the ImageFileName.
|
||||
* - Attributes are object attribute flags used when opening the ImageFileName.
|
||||
* Valid flags are OBJ_INHERIT and OBJ_CASE_INSENSITIVE.
|
||||
*
|
||||
* -Gunnar
|
||||
|
@ -221,9 +221,9 @@ RtlCreateUserProcess(
|
|||
SECTION_IMAGE_INFORMATION Sii;
|
||||
ULONG ResultLength;
|
||||
PVOID ImageBaseAddress;
|
||||
|
||||
|
||||
DPRINT("RtlCreateUserProcess\n");
|
||||
|
||||
|
||||
Status = RtlpMapFile(ImageFileName,
|
||||
ProcessParameters,
|
||||
Attributes,
|
||||
|
@ -250,7 +250,7 @@ RtlCreateUserProcess(
|
|||
ZwClose(hSection);
|
||||
return(Status);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Get some information about the process
|
||||
*/
|
||||
|
@ -298,7 +298,7 @@ RtlCreateUserProcess(
|
|||
);
|
||||
|
||||
ZwClose(hSection);
|
||||
|
||||
|
||||
if (!NT_SUCCESS(Status))
|
||||
{
|
||||
DPRINT("Failed to create thread\n");
|
||||
|
|
|
@ -88,7 +88,7 @@ RtlRandom (IN OUT PULONG Seed)
|
|||
ULONG Rand;
|
||||
int Pos;
|
||||
ULONG Result;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Rand = (*Seed * 0x7fffffed + 0x7fffffc3) % 0x7fffffff;
|
||||
|
|
|
@ -55,7 +55,7 @@ RtlpGetRegistryHandle(ULONG RelativeTo,
|
|||
DPRINT("ZwDuplicateObject() failed! Status: 0x%x\n", Status);
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
return(Status);
|
||||
}
|
||||
|
||||
|
@ -163,7 +163,7 @@ RtlCheckRegistryKey(IN ULONG RelativeTo,
|
|||
{
|
||||
HANDLE KeyHandle;
|
||||
NTSTATUS Status;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||
|
@ -188,7 +188,7 @@ RtlCreateRegistryKey(IN ULONG RelativeTo,
|
|||
{
|
||||
HANDLE KeyHandle;
|
||||
NTSTATUS Status;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||
|
@ -215,7 +215,7 @@ RtlDeleteRegistryValue(IN ULONG RelativeTo,
|
|||
HANDLE KeyHandle;
|
||||
NTSTATUS Status;
|
||||
UNICODE_STRING Name;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||
|
@ -249,7 +249,7 @@ RtlFormatCurrentUserKeyPath (OUT PUNICODE_STRING KeyPath)
|
|||
ULONG Length;
|
||||
UNICODE_STRING SidString;
|
||||
NTSTATUS Status;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
DPRINT ("RtlFormatCurrentUserKeyPath() called\n");
|
||||
|
@ -334,7 +334,7 @@ RtlOpenCurrentUser(IN ACCESS_MASK DesiredAccess,
|
|||
OBJECT_ATTRIBUTES ObjectAttributes;
|
||||
UNICODE_STRING KeyPath;
|
||||
NTSTATUS Status;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Status = RtlFormatCurrentUserKeyPath(&KeyPath);
|
||||
|
@ -398,7 +398,7 @@ RtlQueryRegistryValues(IN ULONG RelativeTo,
|
|||
PWSTR ValueName;
|
||||
UNICODE_STRING EnvValue;
|
||||
UNICODE_STRING EnvExpandedValue;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
DPRINT("RtlQueryRegistryValues() called\n");
|
||||
|
@ -471,7 +471,7 @@ RtlQueryRegistryValues(IN ULONG RelativeTo,
|
|||
Status = STATUS_OBJECT_NAME_NOT_FOUND;
|
||||
break;
|
||||
}
|
||||
|
||||
|
||||
if (QueryEntry->DefaultType == REG_SZ)
|
||||
{
|
||||
PUNICODE_STRING ValueString;
|
||||
|
@ -888,7 +888,7 @@ RtlWriteRegistryValue(IN ULONG RelativeTo,
|
|||
HANDLE KeyHandle;
|
||||
NTSTATUS Status;
|
||||
UNICODE_STRING Name;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||
|
|
|
@ -90,17 +90,17 @@ RtlpQuerySecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
{
|
||||
*OwnerLength = ((*Owner != NULL) ? ROUND_UP(RtlLengthSid(*Owner), 4) : 0);
|
||||
}
|
||||
|
||||
|
||||
if (Group != NULL)
|
||||
{
|
||||
*GroupLength = ((*Group != NULL) ? ROUND_UP(RtlLengthSid(*Group), 4) : 0);
|
||||
}
|
||||
|
||||
|
||||
if (Dacl != NULL)
|
||||
{
|
||||
*DaclLength = ((*Dacl != NULL) ? ROUND_UP((*Dacl)->AclSize, 4) : 0);
|
||||
}
|
||||
|
||||
|
||||
if (Sacl != NULL)
|
||||
{
|
||||
*SaclLength = ((*Sacl != NULL) ? ROUND_UP((*Sacl)->AclSize, 4) : 0);
|
||||
|
@ -138,7 +138,7 @@ RtlCreateSecurityDescriptorRelative (PSECURITY_DESCRIPTOR_RELATIVE SecurityDescr
|
|||
ULONG Revision)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -165,9 +165,9 @@ RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
|||
PSID Owner, Group;
|
||||
PACL Sacl, Dacl;
|
||||
ULONG Length = sizeof(SECURITY_DESCRIPTOR);
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
RtlpQuerySecurityDescriptorPointers(SecurityDescriptor,
|
||||
&Owner,
|
||||
&Group,
|
||||
|
@ -208,7 +208,7 @@ RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
PBOOLEAN DaclDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -243,7 +243,7 @@ RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
BOOLEAN DaclDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -281,14 +281,14 @@ RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
|||
{
|
||||
PSID Owner, Group;
|
||||
PACL Sacl, Dacl;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
||||
RtlpQuerySecurityDescriptorPointers(SecurityDescriptor,
|
||||
&Owner,
|
||||
&Group,
|
||||
|
@ -316,7 +316,7 @@ RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
BOOLEAN OwnerDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -348,7 +348,7 @@ RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
PBOOLEAN OwnerDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -375,7 +375,7 @@ RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
BOOLEAN GroupDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -406,7 +406,7 @@ RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
PBOOLEAN GroupDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -442,7 +442,7 @@ RtlMakeSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
|||
ULONG DaclLength;
|
||||
ULONG TotalLength;
|
||||
ULONG_PTR Current;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
RtlpQuerySecurityDescriptor(AbsSD,
|
||||
|
@ -467,7 +467,7 @@ RtlMakeSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
|||
RelSD->Revision = AbsSD->Revision;
|
||||
RelSD->Sbz1 = AbsSD->Sbz1;
|
||||
RelSD->Control = AbsSD->Control | SE_SELF_RELATIVE;
|
||||
|
||||
|
||||
Current = (ULONG_PTR)(RelSD + 1);
|
||||
|
||||
if (SaclLength != 0)
|
||||
|
@ -518,7 +518,7 @@ RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
|||
PULONG BufferLength)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (AbsSD->Control & SE_SELF_RELATIVE)
|
||||
{
|
||||
return STATUS_BAD_DESCRIPTOR_FORMAT;
|
||||
|
@ -537,7 +537,7 @@ RtlGetControlSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
PULONG Revision)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
*Revision = SecurityDescriptor->Revision;
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
|
@ -560,7 +560,7 @@ RtlSetControlSecurityDescriptor(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
IN SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -586,7 +586,7 @@ RtlGetSaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
PBOOLEAN SaclDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -621,7 +621,7 @@ RtlSetSaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
BOOLEAN SaclDefaulted)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
{
|
||||
return STATUS_UNKNOWN_REVISION;
|
||||
|
@ -675,7 +675,7 @@ RtlSelfRelativeToAbsoluteSD(PSECURITY_DESCRIPTOR_RELATIVE RelSD,
|
|||
PSID pGroup;
|
||||
PACL pDacl;
|
||||
PACL pSacl;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (RelSD->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
|
@ -749,7 +749,7 @@ RtlValidRelativeSecurityDescriptor(IN PSECURITY_DESCRIPTOR_RELATIVE SecurityDesc
|
|||
IN SECURITY_INFORMATION RequiredInformation)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (SecurityDescriptorLength < sizeof(SECURITY_DESCRIPTOR_RELATIVE) ||
|
||||
SecurityDescriptorInput->Revision != SECURITY_DESCRIPTOR_REVISION1 ||
|
||||
!(SecurityDescriptorInput->Control & SE_SELF_RELATIVE))
|
||||
|
@ -821,7 +821,7 @@ RtlGetSecurityDescriptorRMControl(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
PUCHAR RMControl)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (!(SecurityDescriptor->Control & SE_RM_CONTROL_VALID))
|
||||
{
|
||||
*RMControl = 0;
|
||||
|
@ -842,7 +842,7 @@ RtlSetSecurityDescriptorRMControl(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
PUCHAR RMControl)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (RMControl == NULL)
|
||||
{
|
||||
SecurityDescriptor->Control &= ~SE_RM_CONTROL_VALID;
|
||||
|
@ -865,7 +865,7 @@ RtlSetAttributesSecurityDescriptor(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
|||
OUT PULONG Revision)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
*Revision = SecurityDescriptor->Revision;
|
||||
|
||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||
|
|
|
@ -30,7 +30,7 @@ RtlImpersonateSelf(IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
|
|||
SECURITY_QUALITY_OF_SERVICE Sqos;
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
Status = NtOpenProcessToken(NtCurrentProcess(),
|
||||
TOKEN_DUPLICATE,
|
||||
&ProcessToken);
|
||||
|
@ -39,12 +39,12 @@ RtlImpersonateSelf(IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
|
|||
DPRINT1("NtOpenProcessToken() failed (Status %lx)\n", Status);
|
||||
return(Status);
|
||||
}
|
||||
|
||||
|
||||
Sqos.Length = sizeof(SECURITY_QUALITY_OF_SERVICE);
|
||||
Sqos.ImpersonationLevel = ImpersonationLevel;
|
||||
Sqos.ContextTrackingMode = 0;
|
||||
Sqos.EffectiveOnly = FALSE;
|
||||
|
||||
|
||||
InitializeObjectAttributes(
|
||||
&ObjAttr,
|
||||
NULL,
|
||||
|
@ -52,9 +52,9 @@ RtlImpersonateSelf(IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
|
|||
NULL,
|
||||
NULL
|
||||
);
|
||||
|
||||
|
||||
ObjAttr.SecurityQualityOfService = &Sqos;
|
||||
|
||||
|
||||
Status = NtDuplicateToken(ProcessToken,
|
||||
TOKEN_IMPERSONATE,
|
||||
&ObjAttr,
|
||||
|
@ -98,7 +98,7 @@ RtlAdjustPrivilege(IN ULONG Privilege,
|
|||
ULONG ReturnLength;
|
||||
HANDLE TokenHandle;
|
||||
NTSTATUS Status;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
DPRINT ("RtlAdjustPrivilege() called\n");
|
||||
|
|
|
@ -22,9 +22,9 @@ BOOLEAN STDCALL
|
|||
RtlValidSid(IN PSID Sid_)
|
||||
{
|
||||
PISID Sid = Sid_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if ((Sid->Revision != SID_REVISION) ||
|
||||
(Sid->SubAuthorityCount > SID_MAX_SUB_AUTHORITIES))
|
||||
{
|
||||
|
@ -42,7 +42,7 @@ ULONG STDCALL
|
|||
RtlLengthRequiredSid(IN UCHAR SubAuthorityCount)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return (sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG));
|
||||
}
|
||||
|
||||
|
@ -56,9 +56,9 @@ RtlInitializeSid(IN PSID Sid_,
|
|||
IN UCHAR SubAuthorityCount)
|
||||
{
|
||||
PISID Sid = Sid_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
Sid->Revision = SID_REVISION;
|
||||
Sid->SubAuthorityCount = SubAuthorityCount;
|
||||
memcpy(&Sid->IdentifierAuthority,
|
||||
|
@ -77,9 +77,9 @@ RtlSubAuthoritySid(IN PSID Sid_,
|
|||
IN ULONG SubAuthority)
|
||||
{
|
||||
PISID Sid = Sid_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return &Sid->SubAuthority[SubAuthority];
|
||||
}
|
||||
|
||||
|
@ -91,9 +91,9 @@ PUCHAR STDCALL
|
|||
RtlSubAuthorityCountSid(IN PSID Sid_)
|
||||
{
|
||||
PISID Sid = Sid_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return &Sid->SubAuthorityCount;
|
||||
}
|
||||
|
||||
|
@ -107,9 +107,9 @@ RtlEqualSid(IN PSID Sid1_,
|
|||
{
|
||||
PISID Sid1 = Sid1_;
|
||||
PISID Sid2 = Sid2_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (Sid1->Revision != Sid2->Revision)
|
||||
{
|
||||
return(FALSE);
|
||||
|
@ -133,9 +133,9 @@ ULONG STDCALL
|
|||
RtlLengthSid(IN PSID Sid_)
|
||||
{
|
||||
PISID Sid = Sid_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return (sizeof(SID) + (Sid->SubAuthorityCount-1) * sizeof(ULONG));
|
||||
}
|
||||
|
||||
|
@ -149,7 +149,7 @@ RtlCopySid(ULONG BufferLength,
|
|||
PSID Src)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
if (BufferLength < RtlLengthSid(Src))
|
||||
{
|
||||
return STATUS_UNSUCCESSFUL;
|
||||
|
@ -178,7 +178,7 @@ RtlCopySidAndAttributesArray(ULONG Count,
|
|||
ULONG SidLength;
|
||||
ULONG Length;
|
||||
ULONG i;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Length = SidAreaSize;
|
||||
|
@ -211,9 +211,9 @@ PSID_IDENTIFIER_AUTHORITY STDCALL
|
|||
RtlIdentifierAuthoritySid(IN PSID Sid_)
|
||||
{
|
||||
PISID Sid = Sid_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return &Sid->IdentifierAuthority;
|
||||
}
|
||||
|
||||
|
@ -235,7 +235,7 @@ RtlAllocateAndInitializeSid(PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
|
|||
PSID *Sid)
|
||||
{
|
||||
PISID pSid;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (SubAuthorityCount > 8)
|
||||
|
@ -293,7 +293,7 @@ PVOID STDCALL
|
|||
RtlFreeSid(IN PSID Sid)
|
||||
{
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
ExFreePool(Sid);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -308,9 +308,9 @@ RtlEqualPrefixSid(IN PSID Sid1_,
|
|||
{
|
||||
PISID Sid1 = Sid1_;
|
||||
PISID Sid2 = Sid2_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
|
||||
return(Sid1->SubAuthorityCount == Sid2->SubAuthorityCount &&
|
||||
!RtlCompareMemory(Sid1, Sid2,
|
||||
(Sid1->SubAuthorityCount - 1) * sizeof(DWORD) + 8));
|
||||
|
@ -330,7 +330,7 @@ RtlConvertSidToUnicodeString(PUNICODE_STRING String,
|
|||
ULONG Length;
|
||||
ULONG i;
|
||||
PISID Sid = Sid_;
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
if (RtlValidSid (Sid) == FALSE)
|
||||
|
|
|
@ -43,7 +43,7 @@ NTSTATUS STDCALL RtlCreateUserThread
|
|||
)
|
||||
{
|
||||
OBJECT_ATTRIBUTES oaThreadAttribs;
|
||||
|
||||
|
||||
InitializeObjectAttributes
|
||||
(
|
||||
&oaThreadAttribs,
|
||||
|
@ -52,7 +52,7 @@ NTSTATUS STDCALL RtlCreateUserThread
|
|||
NULL,
|
||||
SecurityDescriptor
|
||||
);
|
||||
|
||||
|
||||
return RtlRosCreateUserThread
|
||||
(
|
||||
ProcessHandle,
|
||||
|
|
|
@ -30,7 +30,7 @@ RtlQueryTimeZoneInformation(PTIME_ZONE_INFORMATION TimeZoneInformation)
|
|||
NTSTATUS Status;
|
||||
|
||||
DPRINT("RtlQueryTimeZoneInformation()\n");
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
RtlZeroMemory(QueryTable,
|
||||
|
@ -92,7 +92,7 @@ RtlSetTimeZoneInformation(PTIME_ZONE_INFORMATION TimeZoneInformation)
|
|||
NTSTATUS Status;
|
||||
|
||||
DPRINT("RtlSetTimeZoneInformation()\n");
|
||||
|
||||
|
||||
PAGED_CODE_RTL();
|
||||
|
||||
Status = RtlWriteRegistryValue(RTL_REGISTRY_CONTROL,
|
||||
|
|
|
@ -726,7 +726,7 @@ RtlInt64ToUnicodeString (
|
|||
ANSI_STRING AnsiString;
|
||||
CHAR Buffer[33];
|
||||
NTSTATUS Status;
|
||||
|
||||
|
||||
LargeInt.QuadPart = Value;
|
||||
|
||||
Status = RtlLargeIntegerToChar (&LargeInt,
|
||||
|
@ -975,7 +975,7 @@ RtlUnicodeStringToOemSize(
|
|||
/*
|
||||
* @implemented
|
||||
*
|
||||
|
||||
|
||||
* NOTES
|
||||
* See RtlpUnicodeStringToAnsiString
|
||||
*/
|
||||
|
@ -1060,7 +1060,7 @@ RtlpUnicodeStringToAnsiString(
|
|||
* @implemented
|
||||
*
|
||||
* NOTES
|
||||
* See RtlpOemStringToUnicodeString
|
||||
* See RtlpOemStringToUnicodeString
|
||||
*/
|
||||
NTSTATUS
|
||||
STDCALL
|
||||
|
@ -1431,23 +1431,23 @@ RtlEqualDomainName (
|
|||
OEM_STRING OemString1;
|
||||
OEM_STRING OemString2;
|
||||
BOOLEAN Result;
|
||||
|
||||
|
||||
RtlUpcaseUnicodeStringToOemString (&OemString1,
|
||||
DomainName1,
|
||||
TRUE);
|
||||
RtlUpcaseUnicodeStringToOemString (&OemString2,
|
||||
DomainName2,
|
||||
TRUE);
|
||||
|
||||
|
||||
Result = RtlEqualString (&OemString1,
|
||||
&OemString2,
|
||||
FALSE);
|
||||
|
||||
|
||||
RtlFreeOemString (&OemString1);
|
||||
RtlFreeOemString (&OemString2);
|
||||
|
||||
|
||||
return Result;
|
||||
|
||||
|
||||
}
|
||||
*/
|
||||
|
||||
|
@ -2015,7 +2015,7 @@ RtlUpcaseUnicodeStringToOemString (
|
|||
* private
|
||||
*
|
||||
* NOTES
|
||||
* Oem string is allways nullterminated
|
||||
* Oem string is allways nullterminated
|
||||
* It performs a partial copy if oem is too small.
|
||||
*/
|
||||
NTSTATUS
|
||||
|
@ -2372,7 +2372,7 @@ RtlDowncaseUnicodeString(
|
|||
*
|
||||
* NOTES
|
||||
* Dest is never '\0' terminated because it may be equal to src, and src
|
||||
* might not be '\0' terminated.
|
||||
* might not be '\0' terminated.
|
||||
* Dest->Length is only set upon success.
|
||||
*/
|
||||
NTSTATUS
|
||||
|
@ -2666,8 +2666,8 @@ RtlDuplicateUnicodeString(
|
|||
DestinationString,
|
||||
NonPagedPool);
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
/*
|
||||
* @implemented
|
||||
*/
|
||||
|
@ -2720,7 +2720,7 @@ RtlValidateUnicodeString(IN ULONG Flags,
|
|||
{
|
||||
/* currently no flags are supported! */
|
||||
ASSERT(Flags == 0);
|
||||
|
||||
|
||||
if ((Flags == 0) &&
|
||||
((UnicodeString == NULL) ||
|
||||
((UnicodeString->Length != 0) &&
|
||||
|
|
Loading…
Reference in a new issue