mirror of
https://github.com/reactos/reactos.git
synced 2024-12-29 02:25:17 +00:00
strip whitespace from end of lines
svn path=/trunk/; revision=15165
This commit is contained in:
parent
e4be245882
commit
eace72f07c
18 changed files with 150 additions and 150 deletions
|
@ -25,7 +25,7 @@ RtlFirstFreeAce(PACL Acl,
|
||||||
PACE Current;
|
PACE Current;
|
||||||
PVOID AclEnd;
|
PVOID AclEnd;
|
||||||
ULONG i;
|
ULONG i;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Current = (PACE)(Acl + 1);
|
Current = (PACE)(Acl + 1);
|
||||||
|
@ -71,7 +71,7 @@ RtlGetAce(PACL Acl,
|
||||||
PACE *Ace)
|
PACE *Ace)
|
||||||
{
|
{
|
||||||
ULONG i;
|
ULONG i;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
*Ace = (PACE)(Acl + 1);
|
*Ace = (PACE)(Acl + 1);
|
||||||
|
@ -114,7 +114,7 @@ RtlpAddKnownAce (PACL Acl,
|
||||||
ULONG Type)
|
ULONG Type)
|
||||||
{
|
{
|
||||||
PACE Ace;
|
PACE Ace;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (!RtlValidSid(Sid))
|
if (!RtlValidSid(Sid))
|
||||||
|
@ -164,7 +164,7 @@ RtlAddAccessAllowedAce (IN OUT PACL Acl,
|
||||||
IN PSID Sid)
|
IN PSID Sid)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return RtlpAddKnownAce (Acl,
|
return RtlpAddKnownAce (Acl,
|
||||||
Revision,
|
Revision,
|
||||||
0,
|
0,
|
||||||
|
@ -185,7 +185,7 @@ RtlAddAccessAllowedAceEx (IN OUT PACL Acl,
|
||||||
IN PSID Sid)
|
IN PSID Sid)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return RtlpAddKnownAce (Acl,
|
return RtlpAddKnownAce (Acl,
|
||||||
Revision,
|
Revision,
|
||||||
Flags,
|
Flags,
|
||||||
|
@ -205,7 +205,7 @@ RtlAddAccessDeniedAce (PACL Acl,
|
||||||
PSID Sid)
|
PSID Sid)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return RtlpAddKnownAce (Acl,
|
return RtlpAddKnownAce (Acl,
|
||||||
Revision,
|
Revision,
|
||||||
0,
|
0,
|
||||||
|
@ -226,7 +226,7 @@ RtlAddAccessDeniedAceEx (IN OUT PACL Acl,
|
||||||
IN PSID Sid)
|
IN PSID Sid)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return RtlpAddKnownAce (Acl,
|
return RtlpAddKnownAce (Acl,
|
||||||
Revision,
|
Revision,
|
||||||
Flags,
|
Flags,
|
||||||
|
@ -272,7 +272,7 @@ RtlAddAce(PACL Acl,
|
||||||
ULONG i;
|
ULONG i;
|
||||||
PACE Current;
|
PACE Current;
|
||||||
ULONG j;
|
ULONG j;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||||
|
@ -354,7 +354,7 @@ RtlAddAuditAccessAce(PACL Acl,
|
||||||
{
|
{
|
||||||
PACE Ace;
|
PACE Ace;
|
||||||
ULONG Flags = 0;
|
ULONG Flags = 0;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Success != FALSE)
|
if (Success != FALSE)
|
||||||
|
@ -425,7 +425,7 @@ RtlAddAuditAccessAceEx(PACL Acl,
|
||||||
BOOLEAN Failure)
|
BOOLEAN Failure)
|
||||||
{
|
{
|
||||||
PACE Ace;
|
PACE Ace;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Success != FALSE)
|
if (Success != FALSE)
|
||||||
|
@ -513,7 +513,7 @@ RtlDeleteAce(PACL Acl,
|
||||||
{
|
{
|
||||||
PACE Ace;
|
PACE Ace;
|
||||||
PACE Current;
|
PACE Current;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||||
|
@ -557,7 +557,7 @@ RtlCreateAcl(PACL Acl,
|
||||||
ULONG AclRevision)
|
ULONG AclRevision)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (AclSize < 8)
|
if (AclSize < 8)
|
||||||
{
|
{
|
||||||
return(STATUS_BUFFER_TOO_SMALL);
|
return(STATUS_BUFFER_TOO_SMALL);
|
||||||
|
@ -595,7 +595,7 @@ RtlQueryInformationAcl(PACL Acl,
|
||||||
ACL_INFORMATION_CLASS InformationClass)
|
ACL_INFORMATION_CLASS InformationClass)
|
||||||
{
|
{
|
||||||
PACE Ace;
|
PACE Ace;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||||
|
@ -664,7 +664,7 @@ RtlSetInformationAcl(PACL Acl,
|
||||||
ACL_INFORMATION_CLASS InformationClass)
|
ACL_INFORMATION_CLASS InformationClass)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
if (Acl->AclRevision < MIN_ACL_REVISION ||
|
||||||
Acl->AclRevision > MAX_ACL_REVISION)
|
Acl->AclRevision > MAX_ACL_REVISION)
|
||||||
{
|
{
|
||||||
|
@ -707,7 +707,7 @@ RtlValidAcl (PACL Acl)
|
||||||
{
|
{
|
||||||
PACE Ace;
|
PACE Ace;
|
||||||
USHORT Size;
|
USHORT Size;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Size = ROUND_UP(Acl->AclSize, 4);
|
Size = ROUND_UP(Acl->AclSize, 4);
|
||||||
|
|
|
@ -155,8 +155,8 @@ RtlExpandEnvironmentStrings_U(PWSTR Environment,
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
/* Process environment variable. */
|
/* Process environment variable. */
|
||||||
|
|
||||||
VariableEnd = SourceBuffer + 1;
|
VariableEnd = SourceBuffer + 1;
|
||||||
Tail = SourceLength - 1;
|
Tail = SourceLength - 1;
|
||||||
while (*VariableEnd != L'%' && Tail != 0)
|
while (*VariableEnd != L'%' && Tail != 0)
|
||||||
|
@ -167,7 +167,7 @@ RtlExpandEnvironmentStrings_U(PWSTR Environment,
|
||||||
|
|
||||||
if (Tail != 0)
|
if (Tail != 0)
|
||||||
{
|
{
|
||||||
Variable.MaximumLength =
|
Variable.MaximumLength =
|
||||||
Variable.Length = (VariableEnd - (SourceBuffer + 1)) * sizeof(WCHAR);
|
Variable.Length = (VariableEnd - (SourceBuffer + 1)) * sizeof(WCHAR);
|
||||||
Variable.Buffer = SourceBuffer + 1;
|
Variable.Buffer = SourceBuffer + 1;
|
||||||
|
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Partially taken from WINE, original copyright:
|
* Partially taken from WINE, original copyright:
|
||||||
*
|
*
|
||||||
* Copyright 2000 Alexandre Julliard
|
* Copyright 2000 Alexandre Julliard
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
@ -862,7 +862,7 @@ RtlMapSecurityErrorToNtStatus(
|
||||||
* RtlNtStatusToDosErrorNoTeb
|
* RtlNtStatusToDosErrorNoTeb
|
||||||
*
|
*
|
||||||
* DESCRIPTION
|
* DESCRIPTION
|
||||||
* Convert an Executive status ID into a DOS error number
|
* Convert an Executive status ID into a DOS error number
|
||||||
* (winerror.h).
|
* (winerror.h).
|
||||||
*
|
*
|
||||||
* ARGUMENTS
|
* ARGUMENTS
|
||||||
|
@ -924,7 +924,7 @@ RtlNtStatusToDosErrorNoTeb(IN NTSTATUS Status)
|
||||||
* RtlNtStatusToDosError
|
* RtlNtStatusToDosError
|
||||||
*
|
*
|
||||||
* DESCRIPTION
|
* DESCRIPTION
|
||||||
* Convert an Executive status ID into a DOS error number
|
* Convert an Executive status ID into a DOS error number
|
||||||
* (winerror.h).
|
* (winerror.h).
|
||||||
*
|
*
|
||||||
* ARGUMENTS
|
* ARGUMENTS
|
||||||
|
@ -958,17 +958,17 @@ RtlNtStatusToDosError(IN NTSTATUS Status)
|
||||||
* DESCRIPTION
|
* DESCRIPTION
|
||||||
* Convert an Executive status ID into a POSIX error number
|
* Convert an Executive status ID into a POSIX error number
|
||||||
* (errno.h).
|
* (errno.h).
|
||||||
*
|
*
|
||||||
* NOTE
|
* NOTE
|
||||||
* Not present in the legacy WNT (a ReactOS extension to support
|
* Not present in the legacy WNT (a ReactOS extension to support
|
||||||
* the POSIX+ subsystem).
|
* the POSIX+ subsystem).
|
||||||
*
|
*
|
||||||
* ARGUMENTS
|
* ARGUMENTS
|
||||||
* Status The Executive status ID to convert.
|
* Status The Executive status ID to convert.
|
||||||
*
|
*
|
||||||
* RETURN VALUE
|
* RETURN VALUE
|
||||||
* errno as in errno.h
|
* errno as in errno.h
|
||||||
*
|
*
|
||||||
* REVISIONS
|
* REVISIONS
|
||||||
* 1999-11-30 ea
|
* 1999-11-30 ea
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -32,8 +32,8 @@ RtlpCaptureContext(PCONTEXT Context);
|
||||||
NTSTATUS
|
NTSTATUS
|
||||||
STDCALL
|
STDCALL
|
||||||
RtlDispatchException(
|
RtlDispatchException(
|
||||||
PEXCEPTION_RECORD pExcptRec,
|
PEXCEPTION_RECORD pExcptRec,
|
||||||
CONTEXT * pContext
|
CONTEXT * pContext
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
UNIMPLEMENTED;
|
UNIMPLEMENTED;
|
||||||
|
@ -69,7 +69,7 @@ RtlRaiseException(PEXCEPTION_RECORD ExceptionRecord)
|
||||||
|
|
||||||
Status = ZwRaiseException(ExceptionRecord, &Context, TRUE);
|
Status = ZwRaiseException(ExceptionRecord, &Context, TRUE);
|
||||||
RtlRaiseException(ExceptionRecord);
|
RtlRaiseException(ExceptionRecord);
|
||||||
RtlRaiseStatus(Status);
|
RtlRaiseStatus(Status);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -352,7 +352,7 @@ static inline BOOLEAN HEAP_Decommit( SUBHEAP *subheap, PVOID ptr, ULONG flags )
|
||||||
subheap->heap );
|
subheap->heap );
|
||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
subheap->commitSize -= decommitsize;
|
subheap->commitSize -= decommitsize;
|
||||||
return TRUE;
|
return TRUE;
|
||||||
}
|
}
|
||||||
|
@ -1077,12 +1077,12 @@ RtlCreateHeap(ULONG flags,
|
||||||
|
|
||||||
/* link it into the per-process heap list */
|
/* link it into the per-process heap list */
|
||||||
RtlEnterCriticalSection (&RtlpProcessHeapsListLock);
|
RtlEnterCriticalSection (&RtlpProcessHeapsListLock);
|
||||||
|
|
||||||
heapPtr = subheap->heap;
|
heapPtr = subheap->heap;
|
||||||
heapPtr->next = (HEAP*)NtCurrentPeb()->ProcessHeaps;
|
heapPtr->next = (HEAP*)NtCurrentPeb()->ProcessHeaps;
|
||||||
NtCurrentPeb()->ProcessHeaps = (HANDLE)heapPtr;
|
NtCurrentPeb()->ProcessHeaps = (HANDLE)heapPtr;
|
||||||
NtCurrentPeb()->NumberOfHeaps++;
|
NtCurrentPeb()->NumberOfHeaps++;
|
||||||
|
|
||||||
RtlLeaveCriticalSection (&RtlpProcessHeapsListLock);
|
RtlLeaveCriticalSection (&RtlpProcessHeapsListLock);
|
||||||
|
|
||||||
return (HANDLE)subheap;
|
return (HANDLE)subheap;
|
||||||
|
@ -1095,7 +1095,7 @@ RtlCreateHeap(ULONG flags,
|
||||||
* FALSE: Failure
|
* FALSE: Failure
|
||||||
*
|
*
|
||||||
* @implemented
|
* @implemented
|
||||||
*
|
*
|
||||||
* RETURNS
|
* RETURNS
|
||||||
* Success: A NULL HANDLE, if heap is NULL or it was destroyed
|
* Success: A NULL HANDLE, if heap is NULL or it was destroyed
|
||||||
* Failure: The Heap handle, if heap is the process heap.
|
* Failure: The Heap handle, if heap is the process heap.
|
||||||
|
@ -1112,17 +1112,17 @@ RtlDestroyHeap(HANDLE heap) /* [in] Handle of heap */
|
||||||
if (!heapPtr)
|
if (!heapPtr)
|
||||||
return heap;
|
return heap;
|
||||||
|
|
||||||
if (heap == NtCurrentPeb()->ProcessHeap)
|
if (heap == NtCurrentPeb()->ProcessHeap)
|
||||||
return heap; /* cannot delete the main process heap */
|
return heap; /* cannot delete the main process heap */
|
||||||
|
|
||||||
/* remove it from the per-process list */
|
/* remove it from the per-process list */
|
||||||
RtlEnterCriticalSection (&RtlpProcessHeapsListLock);
|
RtlEnterCriticalSection (&RtlpProcessHeapsListLock);
|
||||||
|
|
||||||
pptr = (HEAP**)&NtCurrentPeb()->ProcessHeaps;
|
pptr = (HEAP**)&NtCurrentPeb()->ProcessHeaps;
|
||||||
while (*pptr && *pptr != heapPtr) pptr = &(*pptr)->next;
|
while (*pptr && *pptr != heapPtr) pptr = &(*pptr)->next;
|
||||||
if (*pptr) *pptr = (*pptr)->next;
|
if (*pptr) *pptr = (*pptr)->next;
|
||||||
NtCurrentPeb()->NumberOfHeaps--;
|
NtCurrentPeb()->NumberOfHeaps--;
|
||||||
|
|
||||||
RtlLeaveCriticalSection (&RtlpProcessHeapsListLock);
|
RtlLeaveCriticalSection (&RtlpProcessHeapsListLock);
|
||||||
|
|
||||||
RtlDeleteCriticalSection( &heapPtr->critSection );
|
RtlDeleteCriticalSection( &heapPtr->critSection );
|
||||||
|
@ -1715,7 +1715,7 @@ RtlEnumProcessHeaps(PHEAP_ENUMERATION_ROUTINE HeapEnumerationRoutine,
|
||||||
{
|
{
|
||||||
NTSTATUS Status = STATUS_SUCCESS;
|
NTSTATUS Status = STATUS_SUCCESS;
|
||||||
HEAP** pptr;
|
HEAP** pptr;
|
||||||
|
|
||||||
RtlEnterCriticalSection(&RtlpProcessHeapsListLock);
|
RtlEnterCriticalSection(&RtlpProcessHeapsListLock);
|
||||||
|
|
||||||
for (pptr = (HEAP**)&NtCurrentPeb()->ProcessHeaps; *pptr; pptr = &(*pptr)->next)
|
for (pptr = (HEAP**)&NtCurrentPeb()->ProcessHeaps; *pptr; pptr = &(*pptr)->next)
|
||||||
|
@ -1744,7 +1744,7 @@ RtlGetProcessHeaps(ULONG HeapCount,
|
||||||
RtlEnterCriticalSection(&RtlpProcessHeapsListLock);
|
RtlEnterCriticalSection(&RtlpProcessHeapsListLock);
|
||||||
|
|
||||||
Result = NtCurrentPeb()->NumberOfHeaps;
|
Result = NtCurrentPeb()->NumberOfHeaps;
|
||||||
|
|
||||||
if (NtCurrentPeb()->NumberOfHeaps <= HeapCount)
|
if (NtCurrentPeb()->NumberOfHeaps <= HeapCount)
|
||||||
{
|
{
|
||||||
int i = 0;
|
int i = 0;
|
||||||
|
|
|
@ -98,7 +98,7 @@ RtlpDispatchException(IN PEXCEPTION_RECORD ExceptionRecord,
|
||||||
#endif /* NDEBUG */
|
#endif /* NDEBUG */
|
||||||
|
|
||||||
RegistrationFrame = SehpGetExceptionList();
|
RegistrationFrame = SehpGetExceptionList();
|
||||||
|
|
||||||
DPRINT("RegistrationFrame is 0x%X\n", RegistrationFrame);
|
DPRINT("RegistrationFrame is 0x%X\n", RegistrationFrame);
|
||||||
|
|
||||||
while ((ULONG_PTR)RegistrationFrame != -1)
|
while ((ULONG_PTR)RegistrationFrame != -1)
|
||||||
|
@ -125,7 +125,7 @@ RtlpDispatchException(IN PEXCEPTION_RECORD ExceptionRecord,
|
||||||
ExceptionRecord->ExceptionFlags |= EXCEPTION_STACK_INVALID;
|
ExceptionRecord->ExceptionFlags |= EXCEPTION_STACK_INVALID;
|
||||||
return ExceptionContinueExecution;
|
return ExceptionContinueExecution;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Make sure stack is DWORD aligned
|
// Make sure stack is DWORD aligned
|
||||||
if ((ULONG_PTR)RegistrationFrame & 3)
|
if ((ULONG_PTR)RegistrationFrame & 3)
|
||||||
{
|
{
|
||||||
|
@ -223,14 +223,14 @@ RtlpDispatchException(IN PEXCEPTION_RECORD ExceptionRecord,
|
||||||
|
|
||||||
RegistrationFrame = RegistrationFrame->prev; // Go to previous frame
|
RegistrationFrame = RegistrationFrame->prev; // Go to previous frame
|
||||||
}
|
}
|
||||||
|
|
||||||
/* No exception handler will handle this exception */
|
/* No exception handler will handle this exception */
|
||||||
|
|
||||||
DPRINT("RtlpDispatchException(): Return ExceptionContinueExecution\n");
|
DPRINT("RtlpDispatchException(): Return ExceptionContinueExecution\n");
|
||||||
|
|
||||||
ExceptionRecord->ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
ExceptionRecord->ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||||
|
|
||||||
return ExceptionContinueExecution;
|
return ExceptionContinueExecution;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -245,7 +245,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
{
|
{
|
||||||
PEXCEPTION_REGISTRATION ERHead;
|
PEXCEPTION_REGISTRATION ERHead;
|
||||||
PEXCEPTION_RECORD pExceptRec;
|
PEXCEPTION_RECORD pExceptRec;
|
||||||
EXCEPTION_RECORD TempER;
|
EXCEPTION_RECORD TempER;
|
||||||
CONTEXT Context;
|
CONTEXT Context;
|
||||||
|
|
||||||
DPRINT("RtlUnwind(). RegistrationFrame 0x%X\n", RegistrationFrame);
|
DPRINT("RtlUnwind(). RegistrationFrame 0x%X\n", RegistrationFrame);
|
||||||
|
@ -255,7 +255,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
#endif /* NDEBUG */
|
#endif /* NDEBUG */
|
||||||
|
|
||||||
ERHead = SehpGetExceptionList();
|
ERHead = SehpGetExceptionList();
|
||||||
|
|
||||||
DPRINT("ERHead is 0x%X\n", ERHead);
|
DPRINT("ERHead is 0x%X\n", ERHead);
|
||||||
|
|
||||||
if (ExceptionRecord == NULL) // The normal case
|
if (ExceptionRecord == NULL) // The normal case
|
||||||
|
@ -302,12 +302,12 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
|
|
||||||
Context.Esp += 0x10;
|
Context.Esp += 0x10;
|
||||||
Context.Eax = EaxValue;
|
Context.Eax = EaxValue;
|
||||||
|
|
||||||
// Begin traversing the list of EXCEPTION_REGISTRATION
|
// Begin traversing the list of EXCEPTION_REGISTRATION
|
||||||
while ((ULONG_PTR)ERHead != -1 && ERHead != RegistrationFrame)
|
while ((ULONG_PTR)ERHead != -1 && ERHead != RegistrationFrame)
|
||||||
{
|
{
|
||||||
EXCEPTION_RECORD er2;
|
EXCEPTION_RECORD er2;
|
||||||
|
|
||||||
DPRINT("ERHead 0x%X\n", ERHead);
|
DPRINT("ERHead 0x%X\n", ERHead);
|
||||||
|
|
||||||
// If there's an exception frame, but it's lower on the stack
|
// If there's an exception frame, but it's lower on the stack
|
||||||
|
@ -320,11 +320,11 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
er2.ExceptionRecord = pExceptRec;
|
er2.ExceptionRecord = pExceptRec;
|
||||||
er2.NumberParameters = 0;
|
er2.NumberParameters = 0;
|
||||||
er2.ExceptionCode = STATUS_INVALID_UNWIND_TARGET;
|
er2.ExceptionCode = STATUS_INVALID_UNWIND_TARGET;
|
||||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||||
|
|
||||||
RtlRaiseException(&er2);
|
RtlRaiseException(&er2);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if 0
|
#if 0
|
||||||
Stack = ERHead + sizeof(EXCEPTION_REGISTRATION);
|
Stack = ERHead + sizeof(EXCEPTION_REGISTRATION);
|
||||||
if ( (Teb->Tib.StackBase <= (PVOID)ERHead ) // Make sure that ERHead
|
if ( (Teb->Tib.StackBase <= (PVOID)ERHead ) // Make sure that ERHead
|
||||||
|
@ -337,7 +337,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
PEXCEPTION_REGISTRATION NewERHead;
|
PEXCEPTION_REGISTRATION NewERHead;
|
||||||
PEXCEPTION_REGISTRATION pCurrExceptReg;
|
PEXCEPTION_REGISTRATION pCurrExceptReg;
|
||||||
EXCEPTION_DISPOSITION ReturnValue;
|
EXCEPTION_DISPOSITION ReturnValue;
|
||||||
|
|
||||||
DPRINT("Executing handler at 0x%X for unwind\n", ERHead->handler);
|
DPRINT("Executing handler at 0x%X for unwind\n", ERHead->handler);
|
||||||
|
|
||||||
ReturnValue = RtlpExecuteHandlerForUnwind(
|
ReturnValue = RtlpExecuteHandlerForUnwind(
|
||||||
|
@ -346,7 +346,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
&Context,
|
&Context,
|
||||||
&NewERHead,
|
&NewERHead,
|
||||||
ERHead->handler);
|
ERHead->handler);
|
||||||
|
|
||||||
DPRINT("Handler at 0x%X returned 0x%X\n", ERHead->handler, ReturnValue);
|
DPRINT("Handler at 0x%X returned 0x%X\n", ERHead->handler, ReturnValue);
|
||||||
|
|
||||||
if (ReturnValue != ExceptionContinueSearch)
|
if (ReturnValue != ExceptionContinueSearch)
|
||||||
|
@ -358,8 +358,8 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
er2.ExceptionRecord = pExceptRec;
|
er2.ExceptionRecord = pExceptRec;
|
||||||
er2.NumberParameters = 0;
|
er2.NumberParameters = 0;
|
||||||
er2.ExceptionCode = STATUS_INVALID_DISPOSITION;
|
er2.ExceptionCode = STATUS_INVALID_DISPOSITION;
|
||||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||||
|
|
||||||
RtlRaiseException(&er2);
|
RtlRaiseException(&er2);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
|
@ -367,7 +367,7 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
ERHead = NewERHead;
|
ERHead = NewERHead;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pCurrExceptReg = ERHead;
|
pCurrExceptReg = ERHead;
|
||||||
ERHead = ERHead->prev;
|
ERHead = ERHead->prev;
|
||||||
|
|
||||||
|
@ -386,8 +386,8 @@ RtlUnwind(PEXCEPTION_REGISTRATION RegistrationFrame,
|
||||||
er2.ExceptionRecord = pExceptRec;
|
er2.ExceptionRecord = pExceptRec;
|
||||||
er2.NumberParameters = 0;
|
er2.NumberParameters = 0;
|
||||||
er2.ExceptionCode = STATUS_BAD_STACK;
|
er2.ExceptionCode = STATUS_BAD_STACK;
|
||||||
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
er2.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
|
||||||
|
|
||||||
RtlRaiseException(&er2);
|
RtlRaiseException(&er2);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -23,7 +23,7 @@ RtlCopyLuid(PLUID LuidDest,
|
||||||
PLUID LuidSrc)
|
PLUID LuidSrc)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
LuidDest->LowPart = LuidSrc->LowPart;
|
LuidDest->LowPart = LuidSrc->LowPart;
|
||||||
LuidDest->HighPart = LuidSrc->HighPart;
|
LuidDest->HighPart = LuidSrc->HighPart;
|
||||||
}
|
}
|
||||||
|
@ -38,7 +38,7 @@ RtlCopyLuidAndAttributesArray(ULONG Count,
|
||||||
PLUID_AND_ATTRIBUTES Dest)
|
PLUID_AND_ATTRIBUTES Dest)
|
||||||
{
|
{
|
||||||
ULONG i;
|
ULONG i;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
for (i = 0; i < Count; i++)
|
for (i = 0; i < Count; i++)
|
||||||
|
@ -58,7 +58,7 @@ RtlEqualLuid(PLUID Luid1,
|
||||||
PLUID Luid2)
|
PLUID Luid2)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return (Luid1->LowPart == Luid2->LowPart &&
|
return (Luid1->LowPart == Luid2->LowPart &&
|
||||||
Luid1->HighPart == Luid2->HighPart);
|
Luid1->HighPart == Luid2->HighPart);
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
|
|
||||||
/* $Id$
|
/* $Id$
|
||||||
*
|
*
|
||||||
* COPYRIGHT: See COPYING in the top level directory
|
* COPYRIGHT: See COPYING in the top level directory
|
||||||
* PROJECT: ReactOS kernel
|
* PROJECT: ReactOS kernel
|
||||||
* FILE: lib/rtl/mem.c
|
* FILE: lib/rtl/mem.c
|
||||||
|
|
|
@ -158,8 +158,8 @@ RtlIpv4StringToAddressExA(
|
||||||
NTSTATUS
|
NTSTATUS
|
||||||
STDCALL
|
STDCALL
|
||||||
RtlIpv4StringToAddressW(
|
RtlIpv4StringToAddressW(
|
||||||
IN LPWSTR IpString,
|
IN LPWSTR IpString,
|
||||||
IN ULONG Base,
|
IN ULONG Base,
|
||||||
OUT PVOID PtrToIpAddr,
|
OUT PVOID PtrToIpAddr,
|
||||||
OUT ULONG IpAddr
|
OUT ULONG IpAddr
|
||||||
)
|
)
|
||||||
|
|
|
@ -30,13 +30,13 @@ RtlpMapFile(PUNICODE_STRING ImageFileName,
|
||||||
OBJECT_ATTRIBUTES ObjectAttributes;
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
||||||
PSECURITY_DESCRIPTOR SecurityDescriptor = NULL;
|
PSECURITY_DESCRIPTOR SecurityDescriptor = NULL;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
hFile = NULL;
|
hFile = NULL;
|
||||||
|
|
||||||
RtlDeNormalizeProcessParams (Ppb);
|
RtlDeNormalizeProcessParams (Ppb);
|
||||||
|
|
||||||
// DbgPrint("ImagePathName %x\n", Ppb->ImagePathName.Buffer);
|
// DbgPrint("ImagePathName %x\n", Ppb->ImagePathName.Buffer);
|
||||||
|
|
||||||
InitializeObjectAttributes(&ObjectAttributes,
|
InitializeObjectAttributes(&ObjectAttributes,
|
||||||
ImageFileName,
|
ImageFileName,
|
||||||
Attributes & (OBJ_CASE_INSENSITIVE | OBJ_INHERIT),
|
Attributes & (OBJ_CASE_INSENSITIVE | OBJ_INHERIT),
|
||||||
|
@ -44,7 +44,7 @@ RtlpMapFile(PUNICODE_STRING ImageFileName,
|
||||||
SecurityDescriptor);
|
SecurityDescriptor);
|
||||||
|
|
||||||
RtlNormalizeProcessParams (Ppb);
|
RtlNormalizeProcessParams (Ppb);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Try to open the executable
|
* Try to open the executable
|
||||||
*/
|
*/
|
||||||
|
@ -195,7 +195,7 @@ static NTSTATUS KlInitPeb (HANDLE ProcessHandle,
|
||||||
* - The first thread is created suspended, so it needs a manual resume!!!
|
* - The first thread is created suspended, so it needs a manual resume!!!
|
||||||
* - If ParentProcess is NULL, current process is used
|
* - If ParentProcess is NULL, current process is used
|
||||||
* - ProcessParameters must be normalized
|
* - ProcessParameters must be normalized
|
||||||
* - Attributes are object attribute flags used when opening the ImageFileName.
|
* - Attributes are object attribute flags used when opening the ImageFileName.
|
||||||
* Valid flags are OBJ_INHERIT and OBJ_CASE_INSENSITIVE.
|
* Valid flags are OBJ_INHERIT and OBJ_CASE_INSENSITIVE.
|
||||||
*
|
*
|
||||||
* -Gunnar
|
* -Gunnar
|
||||||
|
@ -221,9 +221,9 @@ RtlCreateUserProcess(
|
||||||
SECTION_IMAGE_INFORMATION Sii;
|
SECTION_IMAGE_INFORMATION Sii;
|
||||||
ULONG ResultLength;
|
ULONG ResultLength;
|
||||||
PVOID ImageBaseAddress;
|
PVOID ImageBaseAddress;
|
||||||
|
|
||||||
DPRINT("RtlCreateUserProcess\n");
|
DPRINT("RtlCreateUserProcess\n");
|
||||||
|
|
||||||
Status = RtlpMapFile(ImageFileName,
|
Status = RtlpMapFile(ImageFileName,
|
||||||
ProcessParameters,
|
ProcessParameters,
|
||||||
Attributes,
|
Attributes,
|
||||||
|
@ -250,7 +250,7 @@ RtlCreateUserProcess(
|
||||||
ZwClose(hSection);
|
ZwClose(hSection);
|
||||||
return(Status);
|
return(Status);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Get some information about the process
|
* Get some information about the process
|
||||||
*/
|
*/
|
||||||
|
@ -298,7 +298,7 @@ RtlCreateUserProcess(
|
||||||
);
|
);
|
||||||
|
|
||||||
ZwClose(hSection);
|
ZwClose(hSection);
|
||||||
|
|
||||||
if (!NT_SUCCESS(Status))
|
if (!NT_SUCCESS(Status))
|
||||||
{
|
{
|
||||||
DPRINT("Failed to create thread\n");
|
DPRINT("Failed to create thread\n");
|
||||||
|
|
|
@ -88,7 +88,7 @@ RtlRandom (IN OUT PULONG Seed)
|
||||||
ULONG Rand;
|
ULONG Rand;
|
||||||
int Pos;
|
int Pos;
|
||||||
ULONG Result;
|
ULONG Result;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Rand = (*Seed * 0x7fffffed + 0x7fffffc3) % 0x7fffffff;
|
Rand = (*Seed * 0x7fffffed + 0x7fffffc3) % 0x7fffffff;
|
||||||
|
|
|
@ -55,7 +55,7 @@ RtlpGetRegistryHandle(ULONG RelativeTo,
|
||||||
DPRINT("ZwDuplicateObject() failed! Status: 0x%x\n", Status);
|
DPRINT("ZwDuplicateObject() failed! Status: 0x%x\n", Status);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
return(Status);
|
return(Status);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -163,7 +163,7 @@ RtlCheckRegistryKey(IN ULONG RelativeTo,
|
||||||
{
|
{
|
||||||
HANDLE KeyHandle;
|
HANDLE KeyHandle;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||||
|
@ -188,7 +188,7 @@ RtlCreateRegistryKey(IN ULONG RelativeTo,
|
||||||
{
|
{
|
||||||
HANDLE KeyHandle;
|
HANDLE KeyHandle;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||||
|
@ -215,7 +215,7 @@ RtlDeleteRegistryValue(IN ULONG RelativeTo,
|
||||||
HANDLE KeyHandle;
|
HANDLE KeyHandle;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
UNICODE_STRING Name;
|
UNICODE_STRING Name;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||||
|
@ -249,7 +249,7 @@ RtlFormatCurrentUserKeyPath (OUT PUNICODE_STRING KeyPath)
|
||||||
ULONG Length;
|
ULONG Length;
|
||||||
UNICODE_STRING SidString;
|
UNICODE_STRING SidString;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
DPRINT ("RtlFormatCurrentUserKeyPath() called\n");
|
DPRINT ("RtlFormatCurrentUserKeyPath() called\n");
|
||||||
|
@ -334,7 +334,7 @@ RtlOpenCurrentUser(IN ACCESS_MASK DesiredAccess,
|
||||||
OBJECT_ATTRIBUTES ObjectAttributes;
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
||||||
UNICODE_STRING KeyPath;
|
UNICODE_STRING KeyPath;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Status = RtlFormatCurrentUserKeyPath(&KeyPath);
|
Status = RtlFormatCurrentUserKeyPath(&KeyPath);
|
||||||
|
@ -398,7 +398,7 @@ RtlQueryRegistryValues(IN ULONG RelativeTo,
|
||||||
PWSTR ValueName;
|
PWSTR ValueName;
|
||||||
UNICODE_STRING EnvValue;
|
UNICODE_STRING EnvValue;
|
||||||
UNICODE_STRING EnvExpandedValue;
|
UNICODE_STRING EnvExpandedValue;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
DPRINT("RtlQueryRegistryValues() called\n");
|
DPRINT("RtlQueryRegistryValues() called\n");
|
||||||
|
@ -471,7 +471,7 @@ RtlQueryRegistryValues(IN ULONG RelativeTo,
|
||||||
Status = STATUS_OBJECT_NAME_NOT_FOUND;
|
Status = STATUS_OBJECT_NAME_NOT_FOUND;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (QueryEntry->DefaultType == REG_SZ)
|
if (QueryEntry->DefaultType == REG_SZ)
|
||||||
{
|
{
|
||||||
PUNICODE_STRING ValueString;
|
PUNICODE_STRING ValueString;
|
||||||
|
@ -888,7 +888,7 @@ RtlWriteRegistryValue(IN ULONG RelativeTo,
|
||||||
HANDLE KeyHandle;
|
HANDLE KeyHandle;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
UNICODE_STRING Name;
|
UNICODE_STRING Name;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Status = RtlpGetRegistryHandle(RelativeTo,
|
Status = RtlpGetRegistryHandle(RelativeTo,
|
||||||
|
|
|
@ -90,17 +90,17 @@ RtlpQuerySecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
{
|
{
|
||||||
*OwnerLength = ((*Owner != NULL) ? ROUND_UP(RtlLengthSid(*Owner), 4) : 0);
|
*OwnerLength = ((*Owner != NULL) ? ROUND_UP(RtlLengthSid(*Owner), 4) : 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (Group != NULL)
|
if (Group != NULL)
|
||||||
{
|
{
|
||||||
*GroupLength = ((*Group != NULL) ? ROUND_UP(RtlLengthSid(*Group), 4) : 0);
|
*GroupLength = ((*Group != NULL) ? ROUND_UP(RtlLengthSid(*Group), 4) : 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (Dacl != NULL)
|
if (Dacl != NULL)
|
||||||
{
|
{
|
||||||
*DaclLength = ((*Dacl != NULL) ? ROUND_UP((*Dacl)->AclSize, 4) : 0);
|
*DaclLength = ((*Dacl != NULL) ? ROUND_UP((*Dacl)->AclSize, 4) : 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (Sacl != NULL)
|
if (Sacl != NULL)
|
||||||
{
|
{
|
||||||
*SaclLength = ((*Sacl != NULL) ? ROUND_UP((*Sacl)->AclSize, 4) : 0);
|
*SaclLength = ((*Sacl != NULL) ? ROUND_UP((*Sacl)->AclSize, 4) : 0);
|
||||||
|
@ -138,7 +138,7 @@ RtlCreateSecurityDescriptorRelative (PSECURITY_DESCRIPTOR_RELATIVE SecurityDescr
|
||||||
ULONG Revision)
|
ULONG Revision)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -165,9 +165,9 @@ RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
||||||
PSID Owner, Group;
|
PSID Owner, Group;
|
||||||
PACL Sacl, Dacl;
|
PACL Sacl, Dacl;
|
||||||
ULONG Length = sizeof(SECURITY_DESCRIPTOR);
|
ULONG Length = sizeof(SECURITY_DESCRIPTOR);
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
RtlpQuerySecurityDescriptorPointers(SecurityDescriptor,
|
RtlpQuerySecurityDescriptorPointers(SecurityDescriptor,
|
||||||
&Owner,
|
&Owner,
|
||||||
&Group,
|
&Group,
|
||||||
|
@ -208,7 +208,7 @@ RtlGetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PBOOLEAN DaclDefaulted)
|
PBOOLEAN DaclDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -243,7 +243,7 @@ RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
BOOLEAN DaclDefaulted)
|
BOOLEAN DaclDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -281,14 +281,14 @@ RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
|
||||||
{
|
{
|
||||||
PSID Owner, Group;
|
PSID Owner, Group;
|
||||||
PACL Sacl, Dacl;
|
PACL Sacl, Dacl;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
|
|
||||||
RtlpQuerySecurityDescriptorPointers(SecurityDescriptor,
|
RtlpQuerySecurityDescriptorPointers(SecurityDescriptor,
|
||||||
&Owner,
|
&Owner,
|
||||||
&Group,
|
&Group,
|
||||||
|
@ -316,7 +316,7 @@ RtlSetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
BOOLEAN OwnerDefaulted)
|
BOOLEAN OwnerDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -348,7 +348,7 @@ RtlGetOwnerSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PBOOLEAN OwnerDefaulted)
|
PBOOLEAN OwnerDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -375,7 +375,7 @@ RtlSetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
BOOLEAN GroupDefaulted)
|
BOOLEAN GroupDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -406,7 +406,7 @@ RtlGetGroupSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PBOOLEAN GroupDefaulted)
|
PBOOLEAN GroupDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -442,7 +442,7 @@ RtlMakeSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
||||||
ULONG DaclLength;
|
ULONG DaclLength;
|
||||||
ULONG TotalLength;
|
ULONG TotalLength;
|
||||||
ULONG_PTR Current;
|
ULONG_PTR Current;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
RtlpQuerySecurityDescriptor(AbsSD,
|
RtlpQuerySecurityDescriptor(AbsSD,
|
||||||
|
@ -467,7 +467,7 @@ RtlMakeSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
||||||
RelSD->Revision = AbsSD->Revision;
|
RelSD->Revision = AbsSD->Revision;
|
||||||
RelSD->Sbz1 = AbsSD->Sbz1;
|
RelSD->Sbz1 = AbsSD->Sbz1;
|
||||||
RelSD->Control = AbsSD->Control | SE_SELF_RELATIVE;
|
RelSD->Control = AbsSD->Control | SE_SELF_RELATIVE;
|
||||||
|
|
||||||
Current = (ULONG_PTR)(RelSD + 1);
|
Current = (ULONG_PTR)(RelSD + 1);
|
||||||
|
|
||||||
if (SaclLength != 0)
|
if (SaclLength != 0)
|
||||||
|
@ -518,7 +518,7 @@ RtlAbsoluteToSelfRelativeSD(PSECURITY_DESCRIPTOR AbsSD,
|
||||||
PULONG BufferLength)
|
PULONG BufferLength)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (AbsSD->Control & SE_SELF_RELATIVE)
|
if (AbsSD->Control & SE_SELF_RELATIVE)
|
||||||
{
|
{
|
||||||
return STATUS_BAD_DESCRIPTOR_FORMAT;
|
return STATUS_BAD_DESCRIPTOR_FORMAT;
|
||||||
|
@ -537,7 +537,7 @@ RtlGetControlSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PULONG Revision)
|
PULONG Revision)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
*Revision = SecurityDescriptor->Revision;
|
*Revision = SecurityDescriptor->Revision;
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
|
@ -560,7 +560,7 @@ RtlSetControlSecurityDescriptor(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
IN SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet)
|
IN SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -586,7 +586,7 @@ RtlGetSaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PBOOLEAN SaclDefaulted)
|
PBOOLEAN SaclDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -621,7 +621,7 @@ RtlSetSaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
BOOLEAN SaclDefaulted)
|
BOOLEAN SaclDefaulted)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
{
|
{
|
||||||
return STATUS_UNKNOWN_REVISION;
|
return STATUS_UNKNOWN_REVISION;
|
||||||
|
@ -675,7 +675,7 @@ RtlSelfRelativeToAbsoluteSD(PSECURITY_DESCRIPTOR_RELATIVE RelSD,
|
||||||
PSID pGroup;
|
PSID pGroup;
|
||||||
PACL pDacl;
|
PACL pDacl;
|
||||||
PACL pSacl;
|
PACL pSacl;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (RelSD->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (RelSD->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
|
@ -749,7 +749,7 @@ RtlValidRelativeSecurityDescriptor(IN PSECURITY_DESCRIPTOR_RELATIVE SecurityDesc
|
||||||
IN SECURITY_INFORMATION RequiredInformation)
|
IN SECURITY_INFORMATION RequiredInformation)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SecurityDescriptorLength < sizeof(SECURITY_DESCRIPTOR_RELATIVE) ||
|
if (SecurityDescriptorLength < sizeof(SECURITY_DESCRIPTOR_RELATIVE) ||
|
||||||
SecurityDescriptorInput->Revision != SECURITY_DESCRIPTOR_REVISION1 ||
|
SecurityDescriptorInput->Revision != SECURITY_DESCRIPTOR_REVISION1 ||
|
||||||
!(SecurityDescriptorInput->Control & SE_SELF_RELATIVE))
|
!(SecurityDescriptorInput->Control & SE_SELF_RELATIVE))
|
||||||
|
@ -821,7 +821,7 @@ RtlGetSecurityDescriptorRMControl(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PUCHAR RMControl)
|
PUCHAR RMControl)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (!(SecurityDescriptor->Control & SE_RM_CONTROL_VALID))
|
if (!(SecurityDescriptor->Control & SE_RM_CONTROL_VALID))
|
||||||
{
|
{
|
||||||
*RMControl = 0;
|
*RMControl = 0;
|
||||||
|
@ -842,7 +842,7 @@ RtlSetSecurityDescriptorRMControl(PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
PUCHAR RMControl)
|
PUCHAR RMControl)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (RMControl == NULL)
|
if (RMControl == NULL)
|
||||||
{
|
{
|
||||||
SecurityDescriptor->Control &= ~SE_RM_CONTROL_VALID;
|
SecurityDescriptor->Control &= ~SE_RM_CONTROL_VALID;
|
||||||
|
@ -865,7 +865,7 @@ RtlSetAttributesSecurityDescriptor(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
|
||||||
OUT PULONG Revision)
|
OUT PULONG Revision)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
*Revision = SecurityDescriptor->Revision;
|
*Revision = SecurityDescriptor->Revision;
|
||||||
|
|
||||||
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
|
||||||
|
|
|
@ -30,7 +30,7 @@ RtlImpersonateSelf(IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
|
||||||
SECURITY_QUALITY_OF_SERVICE Sqos;
|
SECURITY_QUALITY_OF_SERVICE Sqos;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Status = NtOpenProcessToken(NtCurrentProcess(),
|
Status = NtOpenProcessToken(NtCurrentProcess(),
|
||||||
TOKEN_DUPLICATE,
|
TOKEN_DUPLICATE,
|
||||||
&ProcessToken);
|
&ProcessToken);
|
||||||
|
@ -39,12 +39,12 @@ RtlImpersonateSelf(IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
|
||||||
DPRINT1("NtOpenProcessToken() failed (Status %lx)\n", Status);
|
DPRINT1("NtOpenProcessToken() failed (Status %lx)\n", Status);
|
||||||
return(Status);
|
return(Status);
|
||||||
}
|
}
|
||||||
|
|
||||||
Sqos.Length = sizeof(SECURITY_QUALITY_OF_SERVICE);
|
Sqos.Length = sizeof(SECURITY_QUALITY_OF_SERVICE);
|
||||||
Sqos.ImpersonationLevel = ImpersonationLevel;
|
Sqos.ImpersonationLevel = ImpersonationLevel;
|
||||||
Sqos.ContextTrackingMode = 0;
|
Sqos.ContextTrackingMode = 0;
|
||||||
Sqos.EffectiveOnly = FALSE;
|
Sqos.EffectiveOnly = FALSE;
|
||||||
|
|
||||||
InitializeObjectAttributes(
|
InitializeObjectAttributes(
|
||||||
&ObjAttr,
|
&ObjAttr,
|
||||||
NULL,
|
NULL,
|
||||||
|
@ -52,9 +52,9 @@ RtlImpersonateSelf(IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
|
||||||
NULL,
|
NULL,
|
||||||
NULL
|
NULL
|
||||||
);
|
);
|
||||||
|
|
||||||
ObjAttr.SecurityQualityOfService = &Sqos;
|
ObjAttr.SecurityQualityOfService = &Sqos;
|
||||||
|
|
||||||
Status = NtDuplicateToken(ProcessToken,
|
Status = NtDuplicateToken(ProcessToken,
|
||||||
TOKEN_IMPERSONATE,
|
TOKEN_IMPERSONATE,
|
||||||
&ObjAttr,
|
&ObjAttr,
|
||||||
|
@ -98,7 +98,7 @@ RtlAdjustPrivilege(IN ULONG Privilege,
|
||||||
ULONG ReturnLength;
|
ULONG ReturnLength;
|
||||||
HANDLE TokenHandle;
|
HANDLE TokenHandle;
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
DPRINT ("RtlAdjustPrivilege() called\n");
|
DPRINT ("RtlAdjustPrivilege() called\n");
|
||||||
|
|
|
@ -22,9 +22,9 @@ BOOLEAN STDCALL
|
||||||
RtlValidSid(IN PSID Sid_)
|
RtlValidSid(IN PSID Sid_)
|
||||||
{
|
{
|
||||||
PISID Sid = Sid_;
|
PISID Sid = Sid_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if ((Sid->Revision != SID_REVISION) ||
|
if ((Sid->Revision != SID_REVISION) ||
|
||||||
(Sid->SubAuthorityCount > SID_MAX_SUB_AUTHORITIES))
|
(Sid->SubAuthorityCount > SID_MAX_SUB_AUTHORITIES))
|
||||||
{
|
{
|
||||||
|
@ -42,7 +42,7 @@ ULONG STDCALL
|
||||||
RtlLengthRequiredSid(IN UCHAR SubAuthorityCount)
|
RtlLengthRequiredSid(IN UCHAR SubAuthorityCount)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return (sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG));
|
return (sizeof(SID) + (SubAuthorityCount - 1) * sizeof(ULONG));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -56,9 +56,9 @@ RtlInitializeSid(IN PSID Sid_,
|
||||||
IN UCHAR SubAuthorityCount)
|
IN UCHAR SubAuthorityCount)
|
||||||
{
|
{
|
||||||
PISID Sid = Sid_;
|
PISID Sid = Sid_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Sid->Revision = SID_REVISION;
|
Sid->Revision = SID_REVISION;
|
||||||
Sid->SubAuthorityCount = SubAuthorityCount;
|
Sid->SubAuthorityCount = SubAuthorityCount;
|
||||||
memcpy(&Sid->IdentifierAuthority,
|
memcpy(&Sid->IdentifierAuthority,
|
||||||
|
@ -77,9 +77,9 @@ RtlSubAuthoritySid(IN PSID Sid_,
|
||||||
IN ULONG SubAuthority)
|
IN ULONG SubAuthority)
|
||||||
{
|
{
|
||||||
PISID Sid = Sid_;
|
PISID Sid = Sid_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return &Sid->SubAuthority[SubAuthority];
|
return &Sid->SubAuthority[SubAuthority];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -91,9 +91,9 @@ PUCHAR STDCALL
|
||||||
RtlSubAuthorityCountSid(IN PSID Sid_)
|
RtlSubAuthorityCountSid(IN PSID Sid_)
|
||||||
{
|
{
|
||||||
PISID Sid = Sid_;
|
PISID Sid = Sid_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return &Sid->SubAuthorityCount;
|
return &Sid->SubAuthorityCount;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -107,9 +107,9 @@ RtlEqualSid(IN PSID Sid1_,
|
||||||
{
|
{
|
||||||
PISID Sid1 = Sid1_;
|
PISID Sid1 = Sid1_;
|
||||||
PISID Sid2 = Sid2_;
|
PISID Sid2 = Sid2_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (Sid1->Revision != Sid2->Revision)
|
if (Sid1->Revision != Sid2->Revision)
|
||||||
{
|
{
|
||||||
return(FALSE);
|
return(FALSE);
|
||||||
|
@ -133,9 +133,9 @@ ULONG STDCALL
|
||||||
RtlLengthSid(IN PSID Sid_)
|
RtlLengthSid(IN PSID Sid_)
|
||||||
{
|
{
|
||||||
PISID Sid = Sid_;
|
PISID Sid = Sid_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return (sizeof(SID) + (Sid->SubAuthorityCount-1) * sizeof(ULONG));
|
return (sizeof(SID) + (Sid->SubAuthorityCount-1) * sizeof(ULONG));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -149,7 +149,7 @@ RtlCopySid(ULONG BufferLength,
|
||||||
PSID Src)
|
PSID Src)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (BufferLength < RtlLengthSid(Src))
|
if (BufferLength < RtlLengthSid(Src))
|
||||||
{
|
{
|
||||||
return STATUS_UNSUCCESSFUL;
|
return STATUS_UNSUCCESSFUL;
|
||||||
|
@ -178,7 +178,7 @@ RtlCopySidAndAttributesArray(ULONG Count,
|
||||||
ULONG SidLength;
|
ULONG SidLength;
|
||||||
ULONG Length;
|
ULONG Length;
|
||||||
ULONG i;
|
ULONG i;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Length = SidAreaSize;
|
Length = SidAreaSize;
|
||||||
|
@ -211,9 +211,9 @@ PSID_IDENTIFIER_AUTHORITY STDCALL
|
||||||
RtlIdentifierAuthoritySid(IN PSID Sid_)
|
RtlIdentifierAuthoritySid(IN PSID Sid_)
|
||||||
{
|
{
|
||||||
PISID Sid = Sid_;
|
PISID Sid = Sid_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return &Sid->IdentifierAuthority;
|
return &Sid->IdentifierAuthority;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -235,7 +235,7 @@ RtlAllocateAndInitializeSid(PSID_IDENTIFIER_AUTHORITY IdentifierAuthority,
|
||||||
PSID *Sid)
|
PSID *Sid)
|
||||||
{
|
{
|
||||||
PISID pSid;
|
PISID pSid;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (SubAuthorityCount > 8)
|
if (SubAuthorityCount > 8)
|
||||||
|
@ -293,7 +293,7 @@ PVOID STDCALL
|
||||||
RtlFreeSid(IN PSID Sid)
|
RtlFreeSid(IN PSID Sid)
|
||||||
{
|
{
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
ExFreePool(Sid);
|
ExFreePool(Sid);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
@ -308,9 +308,9 @@ RtlEqualPrefixSid(IN PSID Sid1_,
|
||||||
{
|
{
|
||||||
PISID Sid1 = Sid1_;
|
PISID Sid1 = Sid1_;
|
||||||
PISID Sid2 = Sid2_;
|
PISID Sid2 = Sid2_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
return(Sid1->SubAuthorityCount == Sid2->SubAuthorityCount &&
|
return(Sid1->SubAuthorityCount == Sid2->SubAuthorityCount &&
|
||||||
!RtlCompareMemory(Sid1, Sid2,
|
!RtlCompareMemory(Sid1, Sid2,
|
||||||
(Sid1->SubAuthorityCount - 1) * sizeof(DWORD) + 8));
|
(Sid1->SubAuthorityCount - 1) * sizeof(DWORD) + 8));
|
||||||
|
@ -330,7 +330,7 @@ RtlConvertSidToUnicodeString(PUNICODE_STRING String,
|
||||||
ULONG Length;
|
ULONG Length;
|
||||||
ULONG i;
|
ULONG i;
|
||||||
PISID Sid = Sid_;
|
PISID Sid = Sid_;
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
if (RtlValidSid (Sid) == FALSE)
|
if (RtlValidSid (Sid) == FALSE)
|
||||||
|
|
|
@ -43,7 +43,7 @@ NTSTATUS STDCALL RtlCreateUserThread
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
OBJECT_ATTRIBUTES oaThreadAttribs;
|
OBJECT_ATTRIBUTES oaThreadAttribs;
|
||||||
|
|
||||||
InitializeObjectAttributes
|
InitializeObjectAttributes
|
||||||
(
|
(
|
||||||
&oaThreadAttribs,
|
&oaThreadAttribs,
|
||||||
|
@ -52,7 +52,7 @@ NTSTATUS STDCALL RtlCreateUserThread
|
||||||
NULL,
|
NULL,
|
||||||
SecurityDescriptor
|
SecurityDescriptor
|
||||||
);
|
);
|
||||||
|
|
||||||
return RtlRosCreateUserThread
|
return RtlRosCreateUserThread
|
||||||
(
|
(
|
||||||
ProcessHandle,
|
ProcessHandle,
|
||||||
|
|
|
@ -30,7 +30,7 @@ RtlQueryTimeZoneInformation(PTIME_ZONE_INFORMATION TimeZoneInformation)
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
DPRINT("RtlQueryTimeZoneInformation()\n");
|
DPRINT("RtlQueryTimeZoneInformation()\n");
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
RtlZeroMemory(QueryTable,
|
RtlZeroMemory(QueryTable,
|
||||||
|
@ -92,7 +92,7 @@ RtlSetTimeZoneInformation(PTIME_ZONE_INFORMATION TimeZoneInformation)
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
DPRINT("RtlSetTimeZoneInformation()\n");
|
DPRINT("RtlSetTimeZoneInformation()\n");
|
||||||
|
|
||||||
PAGED_CODE_RTL();
|
PAGED_CODE_RTL();
|
||||||
|
|
||||||
Status = RtlWriteRegistryValue(RTL_REGISTRY_CONTROL,
|
Status = RtlWriteRegistryValue(RTL_REGISTRY_CONTROL,
|
||||||
|
|
|
@ -726,7 +726,7 @@ RtlInt64ToUnicodeString (
|
||||||
ANSI_STRING AnsiString;
|
ANSI_STRING AnsiString;
|
||||||
CHAR Buffer[33];
|
CHAR Buffer[33];
|
||||||
NTSTATUS Status;
|
NTSTATUS Status;
|
||||||
|
|
||||||
LargeInt.QuadPart = Value;
|
LargeInt.QuadPart = Value;
|
||||||
|
|
||||||
Status = RtlLargeIntegerToChar (&LargeInt,
|
Status = RtlLargeIntegerToChar (&LargeInt,
|
||||||
|
@ -975,7 +975,7 @@ RtlUnicodeStringToOemSize(
|
||||||
/*
|
/*
|
||||||
* @implemented
|
* @implemented
|
||||||
*
|
*
|
||||||
|
|
||||||
* NOTES
|
* NOTES
|
||||||
* See RtlpUnicodeStringToAnsiString
|
* See RtlpUnicodeStringToAnsiString
|
||||||
*/
|
*/
|
||||||
|
@ -1060,7 +1060,7 @@ RtlpUnicodeStringToAnsiString(
|
||||||
* @implemented
|
* @implemented
|
||||||
*
|
*
|
||||||
* NOTES
|
* NOTES
|
||||||
* See RtlpOemStringToUnicodeString
|
* See RtlpOemStringToUnicodeString
|
||||||
*/
|
*/
|
||||||
NTSTATUS
|
NTSTATUS
|
||||||
STDCALL
|
STDCALL
|
||||||
|
@ -1431,23 +1431,23 @@ RtlEqualDomainName (
|
||||||
OEM_STRING OemString1;
|
OEM_STRING OemString1;
|
||||||
OEM_STRING OemString2;
|
OEM_STRING OemString2;
|
||||||
BOOLEAN Result;
|
BOOLEAN Result;
|
||||||
|
|
||||||
RtlUpcaseUnicodeStringToOemString (&OemString1,
|
RtlUpcaseUnicodeStringToOemString (&OemString1,
|
||||||
DomainName1,
|
DomainName1,
|
||||||
TRUE);
|
TRUE);
|
||||||
RtlUpcaseUnicodeStringToOemString (&OemString2,
|
RtlUpcaseUnicodeStringToOemString (&OemString2,
|
||||||
DomainName2,
|
DomainName2,
|
||||||
TRUE);
|
TRUE);
|
||||||
|
|
||||||
Result = RtlEqualString (&OemString1,
|
Result = RtlEqualString (&OemString1,
|
||||||
&OemString2,
|
&OemString2,
|
||||||
FALSE);
|
FALSE);
|
||||||
|
|
||||||
RtlFreeOemString (&OemString1);
|
RtlFreeOemString (&OemString1);
|
||||||
RtlFreeOemString (&OemString2);
|
RtlFreeOemString (&OemString2);
|
||||||
|
|
||||||
return Result;
|
return Result;
|
||||||
|
|
||||||
}
|
}
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
@ -2015,7 +2015,7 @@ RtlUpcaseUnicodeStringToOemString (
|
||||||
* private
|
* private
|
||||||
*
|
*
|
||||||
* NOTES
|
* NOTES
|
||||||
* Oem string is allways nullterminated
|
* Oem string is allways nullterminated
|
||||||
* It performs a partial copy if oem is too small.
|
* It performs a partial copy if oem is too small.
|
||||||
*/
|
*/
|
||||||
NTSTATUS
|
NTSTATUS
|
||||||
|
@ -2372,7 +2372,7 @@ RtlDowncaseUnicodeString(
|
||||||
*
|
*
|
||||||
* NOTES
|
* NOTES
|
||||||
* Dest is never '\0' terminated because it may be equal to src, and src
|
* Dest is never '\0' terminated because it may be equal to src, and src
|
||||||
* might not be '\0' terminated.
|
* might not be '\0' terminated.
|
||||||
* Dest->Length is only set upon success.
|
* Dest->Length is only set upon success.
|
||||||
*/
|
*/
|
||||||
NTSTATUS
|
NTSTATUS
|
||||||
|
@ -2666,8 +2666,8 @@ RtlDuplicateUnicodeString(
|
||||||
DestinationString,
|
DestinationString,
|
||||||
NonPagedPool);
|
NonPagedPool);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* @implemented
|
* @implemented
|
||||||
*/
|
*/
|
||||||
|
@ -2720,7 +2720,7 @@ RtlValidateUnicodeString(IN ULONG Flags,
|
||||||
{
|
{
|
||||||
/* currently no flags are supported! */
|
/* currently no flags are supported! */
|
||||||
ASSERT(Flags == 0);
|
ASSERT(Flags == 0);
|
||||||
|
|
||||||
if ((Flags == 0) &&
|
if ((Flags == 0) &&
|
||||||
((UnicodeString == NULL) ||
|
((UnicodeString == NULL) ||
|
||||||
((UnicodeString->Length != 0) &&
|
((UnicodeString->Length != 0) &&
|
||||||
|
|
Loading…
Reference in a new issue