- Timestamp:
- Oct 3, 2000, 7:41:43 PM (25 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/advapi32/ADVAPI32.CPP
r4404 r4410 1 /* $Id: ADVAPI32.CPP,v 1.1 5 2000-10-03 05:52:30 birdExp $ */1 /* $Id: ADVAPI32.CPP,v 1.16 2000-10-03 17:41:43 sandervl Exp $ */ 2 2 3 3 /* … … 42 42 //#define DEBUG_LOCAL 1 43 43 44 #define PTOKEN_GROUPS LPVOID45 #define ACL_INFORMATION_CLASS DWORD46 47 /*48 * Watcom C/C++ messed things up...49 */50 #ifdef __WATCOM__51 extern "C"52 {53 BOOL WIN32API SetTokenInformation(HANDLE hToken,54 TOKEN_INFORMATION_CLASS tic,55 LPVOID lpvInformation,56 DWORD cbInformation);57 BOOL WIN32API GetUserNameA( /*PLF Wed 98-02-11 13:33:39*/58 LPTSTR lpBuffer, /* address of name buffer */59 LPDWORD lpcchBuffer); /* address of size of name buffer */60 61 BOOL WIN32API GetUserNameW( /*KSO Thu 21.05.1998 */62 LPWSTR lpBuffer,63 LPDWORD lpccBuffer64 );65 66 BOOL WIN32API AbortSystemShutdownA(LPTSTR lpMachineName);67 BOOL WIN32API AbortSystemShutdownW(LPWSTR lpMachineName);68 BOOL WIN32API AccessCheckAndAuditAlarmA(LPCSTR SubsystemName,69 LPVOID HandleId,70 LPTSTR ObjectTypeName,71 LPTSTR ObjectName,72 PSECURITY_DESCRIPTOR SecurityDescriptor,73 DWORD DesiredAccess,74 PGENERIC_MAPPING GenericMapping,75 BOOL ObjectCreation,76 LPDWORD GrantedAccess,77 LPBOOL AccessStatus,78 LPBOOL pfGenerateOnClose);79 BOOL WIN32API AccessCheckAndAuditAlarmW(LPCWSTR SubsystemName,80 LPVOID HandleId,81 LPWSTR ObjectTypeName,82 LPWSTR ObjectName,83 PSECURITY_DESCRIPTOR SecurityDescriptor,84 DWORD DesiredAccess,85 PGENERIC_MAPPING GenericMapping,86 BOOL ObjectCreation,87 LPDWORD GrantedAccess,88 LPBOOL AccessStatus,89 LPBOOL pfGenerateOnClose);90 BOOL WIN32API AddAccessAllowedAce(PACL pAcl,91 DWORD dwAceRevision,92 DWORD AccessMask,93 PSID pSid);94 BOOL WIN32API AddAccessDeniedAce(PACL pAcl,95 DWORD dwAceRevision,96 DWORD AccessMask,97 PSID pSid);98 BOOL WIN32API AddAce(PACL pAcl,99 DWORD dwAceRevision,100 DWORD dwStartingAceIndex,101 LPVOID pAceList,102 DWORD nAceListLength);103 BOOL WIN32API AddAuditAccessAce(PACL pAcl,104 DWORD dwAceRevision,105 DWORD dwAccessMask,106 PSID pSid,107 BOOL bAuditSuccess,108 BOOL bAuditFailure);109 BOOL WIN32API AdjustTokenGroups(HANDLE TokenHandle,110 BOOL ResetToDefault,111 PTOKEN_GROUPS NewState,112 DWORD BufferLength,113 PTOKEN_GROUPS PreviousState,114 LPDWORD ReturnLength);115 BOOL WIN32API AllocateLocallyUniqueId(PLUID Luid);116 BOOL WIN32API AreAllAccessesGranted(DWORD GrantedAccess,117 DWORD DesiredAccess);118 BOOL WIN32API AreAnyAccessesGranted(DWORD GrantedAccess,119 DWORD DesiredAccess);120 BOOL WIN32API CreatePrivateObjectSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,121 PSECURITY_DESCRIPTOR CreatorDescriptor,122 PSECURITY_DESCRIPTOR *NewDescriptor,123 BOOL IsDirectoryObject,124 HANDLE Token,125 PGENERIC_MAPPING GenericMapping);126 BOOL WIN32API CreateProcessAsUserA(HANDLE hToken,127 LPCSTR lpApplicationName,128 LPTSTR lpCommandLine,129 LPSECURITY_ATTRIBUTES lpProcessAttributes,130 LPSECURITY_ATTRIBUTES lpThreadAttributes,131 BOOL bInheritHandles,132 DWORD dwCreationFlags,133 LPVOID lpEnvironment,134 LPCSTR lpCurrentDirectory,135 LPSTARTUPINFOA lpStartupInfo,136 LPPROCESS_INFORMATION lpProcessInformation);137 BOOL WIN32API CreateProcessAsUserW(HANDLE hToken,138 LPCWSTR lpApplicationName,139 LPWSTR lpCommandLine,140 LPSECURITY_ATTRIBUTES lpProcessAttributes,141 LPSECURITY_ATTRIBUTES lpThreadAttributes,142 BOOL bInheritHandles,143 DWORD dwCreationFlags,144 LPVOID lpEnvironment,145 LPCWSTR lpCurrentDirectory,146 LPSTARTUPINFOA lpStartupInfo,147 LPPROCESS_INFORMATION lpProcessInformation);148 BOOL WIN32API DeleteAce(PACL pAcl,149 DWORD dwAceIndex);150 BOOL WIN32API DestroyPrivateObjectSecurity(PSECURITY_DESCRIPTOR *ObjectDescriptor);151 BOOL WIN32API DuplicateToken(HANDLE ExistingTokenHandle,152 SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,153 PHANDLE DuplicateTokenHandle);154 BOOL WIN32API FindFirstFreeAce(PACL pAcl,155 LPVOID *pAce);156 BOOL WIN32API GetAce(PACL pAcl,157 DWORD dwAceIndex,158 LPVOID *pAce);159 BOOL WIN32API GetAclInformation(PACL pAcl,160 LPVOID pAclInformation,161 DWORD nAclInformationLength,162 ACL_INFORMATION_CLASS dwAclInformationClass);163 BOOL WIN32API GetKernelObjectSecurity(HANDLE Handle,164 SECURITY_INFORMATION RequestedInformation,165 PSECURITY_DESCRIPTOR pSecurityDescriptor,166 DWORD nLength,167 LPDWORD lpnLengthNeeded);168 BOOL WIN32API GetPrivateObjectSecurity(PSECURITY_DESCRIPTOR ObjectDescriptor,169 SECURITY_INFORMATION SecurityInformation,170 PSECURITY_DESCRIPTOR ResultantDescriptor,171 DWORD DescriptorLength,172 LPDWORD ReturnLength);173 BOOL WIN32API ImpersonateLoggedOnUser(HANDLE hToken);174 BOOL WIN32API ImpersonateNamedPipeClient(HANDLE hNamedPipe);175 BOOL WIN32API InitiateSystemShutdownA(LPTSTR lpMachineName,176 LPTSTR lpMessage,177 DWORD dwTimeout,178 BOOL bForceAppsClosed,179 BOOL bRebootAfterShutdown);180 BOOL WIN32API InitiateSystemShutdownW(LPWSTR lpMachineName,181 LPWSTR lpMessage,182 DWORD dwTimeout,183 BOOL bForceAppsClosed,184 BOOL bRebootAfterShutdown);185 DWORD WIN32API IsTextUnicode(CONST LPVOID lpBuffer,186 int cb,187 LPINT lpi);188 BOOL WIN32API IsValidAcl(PACL pAcl);189 BOOL WIN32API LogonUserA(LPTSTR lpszUsername,190 LPTSTR lpszDomain,191 LPTSTR lpszPassword,192 DWORD dwLogonType,193 DWORD dwLogonProvider,194 PHANDLE phToken);195 BOOL WIN32API LogonUserW(LPWSTR lpszUsername,196 LPWSTR lpszDomain,197 LPWSTR lpszPassword,198 DWORD dwLogonType,199 DWORD dwLogonProvider,200 PHANDLE phToken);201 BOOL WIN32API LookupAccountNameA(LPCSTR lpSystemName,202 LPCSTR lpAccountName,203 PSID Sid,204 LPDWORD cbSid,205 LPTSTR ReferencedDomainName,206 LPDWORD cbReferencedDomainName,207 PSID_NAME_USE peUse);208 BOOL WIN32API LookupAccountNameW(LPCWSTR lpSystemName,209 LPCWSTR lpAccountName,210 PSID Sid,211 LPDWORD cbSid,212 LPWSTR ReferencedDomainName,213 LPDWORD cbReferencedDomainName,214 PSID_NAME_USE peUse);215 BOOL WIN32API LookupPrivilegeDisplayNameA(LPCSTR lpSystemName,216 LPCSTR lpName,217 LPTSTR lpDisplayName,218 LPDWORD cbDisplayName,219 LPDWORD lpLanguageId);220 BOOL WIN32API LookupPrivilegeDisplayNameW(LPCWSTR lpSystemName,221 LPCWSTR lpName,222 LPWSTR lpDisplayName,223 LPDWORD cbDisplayName,224 LPDWORD lpLanguageId);225 BOOL WIN32API LookupPrivilegeNameA(LPCSTR lpSystemName,226 PLUID lpLuid,227 LPTSTR lpName,228 LPDWORD cbName);229 BOOL WIN32API LookupPrivilegeNameW(LPCWSTR lpSystemName,230 PLUID lpLuid,231 LPWSTR lpName,232 LPDWORD cbName);233 BOOL WIN32API MakeAbsoluteSD(PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,234 PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,235 LPDWORD lpdwAbsoluteSecurityDescriptorSize,236 PACL pDacl,237 LPDWORD lpdwDaclSize,238 PACL pSacl,239 LPDWORD lpdwSaclSize,240 PSID pOwner,241 LPDWORD lpdwOwnerSize,242 PSID pPrimaryGroup,243 LPDWORD lpdwPrimaryGroupSize);244 VOID WIN32API MapGenericMask(LPDWORD AccessMask,245 PGENERIC_MAPPING GenericMapping);246 BOOL WIN32API ObjectCloseAuditAlarmA(LPCSTR SubsystemName,247 LPVOID HandleId,248 BOOL GenerateOnClose);249 BOOL WIN32API ObjectCloseAuditAlarmW(LPCWSTR SubsystemName,250 LPVOID HandleId,251 BOOL GenerateOnClose);252 BOOL WIN32API ObjectOpenAuditAlarmA(LPCSTR SubsystemName,253 LPVOID HandleId,254 LPTSTR ObjectTypeName,255 LPTSTR ObjectName,256 PSECURITY_DESCRIPTOR pSecurityDescriptor,257 HANDLE ClientToken,258 DWORD DesiredAccess,259 DWORD GrantedAccess,260 PPRIVILEGE_SET Privileges,261 BOOL ObjectCreation,262 BOOL AccessGranted,263 LPBOOL GenerateOnClose);264 BOOL WIN32API ObjectOpenAuditAlarmW(LPCWSTR SubsystemName,265 LPVOID HandleId,266 LPWSTR ObjectTypeName,267 LPWSTR ObjectName,268 PSECURITY_DESCRIPTOR pSecurityDescriptor,269 HANDLE ClientToken,270 DWORD DesiredAccess,271 DWORD GrantedAccess,272 PPRIVILEGE_SET Privileges,273 BOOL ObjectCreation,274 BOOL AccessGranted,275 LPBOOL GenerateOnClose);276 BOOL WIN32API ObjectPrivilegeAuditAlarmA(LPCSTR lpszSubsystem,277 LPVOID lpvHandleId,278 HANDLE hClientToken,279 DWORD dwDesiredAccess,280 PPRIVILEGE_SET pps,281 BOOL fAccessGranted);282 BOOL WIN32API ObjectPrivilegeAuditAlarmW(LPCWSTR lpszSubsystem,283 LPVOID lpvHandleId,284 HANDLE hClientToken,285 DWORD dwDesiredAccess,286 PPRIVILEGE_SET pps,287 BOOL fAccessGranted);288 BOOL WIN32API PrivilegeCheck(HANDLE hClientToken,289 PPRIVILEGE_SET pps,290 LPBOOL lpfResult);291 BOOL WIN32API PrivilegedServiceAuditAlarmA(LPCSTR lpszSubsystem,292 LPCSTR lpszService,293 HANDLE hClientToken,294 PPRIVILEGE_SET pps,295 BOOL fAccessGranted);296 BOOL WIN32API PrivilegedServiceAuditAlarmW(LPCWSTR lpszSubsystem,297 LPCWSTR lpszService,298 HANDLE hClientToken,299 PPRIVILEGE_SET pps,300 BOOL fAccessGranted);301 BOOL WIN32API SetAclInformation(PACL pAcl,302 LPVOID lpvAclInfo,303 DWORD cbAclInfo,304 ACL_INFORMATION_CLASS aclic);305 BOOL WIN32API SetKernelObjectSecurity(HANDLE hObject,306 SECURITY_INFORMATION si,307 PSECURITY_DESCRIPTOR psd);308 BOOL WIN32API SetPrivateObjectSecurity(SECURITY_INFORMATION si,309 PSECURITY_DESCRIPTOR psdSource,310 PSECURITY_DESCRIPTOR *lppsdTarget,311 PGENERIC_MAPPING pgm,312 HANDLE hClientToken);313 }314 #endif //__WATCOM__315 44 316 45 /***************************************************************************** … … 332 61 *****************************************************************************/ 333 62 334 #define TOKEN_INFORMATION_CLASS DWORD335 63 BOOL WIN32API SetTokenInformation(HANDLE hToken, 336 64 TOKEN_INFORMATION_CLASS tic, … … 1454 1182 *****************************************************************************/ 1455 1183 1456 #define PSID_NAME_USE LPVOID1457 1184 BOOL WIN32API LookupAccountNameA(LPCSTR lpSystemName, 1458 1185 LPCSTR lpAccountName, … … 2096 1823 *****************************************************************************/ 2097 1824 2098 #define ACL_INFORMATION_CLASS DWORD2099 1825 BOOL WIN32API SetAclInformation(PACL pAcl, 2100 1826 LPVOID lpvAclInfo,
Note:
See TracChangeset
for help on using the changeset viewer.