- Timestamp:
- Feb 21, 2002, 11:52:43 PM (24 years ago)
- Location:
- trunk/src
- Files:
-
- 2 added
- 1 deleted
- 7 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/NTDLL/ntdll.def
r7253 r7983 1 ; $Id: ntdll.def,v 1.4 1 2001-10-29 02:26:38 birdExp $1 ; $Id: ntdll.def,v 1.42 2002-02-21 22:52:42 sandervl Exp $ 2 2 3 3 ; … … 64 64 ; NlsMbOemCodePageTag @53 65 65 NtAcceptConnectPort = _NtAcceptConnectPort@24 @54 66 ; NtAccessCheck@5566 NtAccessCheck = _NtAccessCheck@32 @55 67 67 ; NtAccessCheckAndAuditAlarm @56 68 68 ; NtAddAtom @57 … … 244 244 ; NtSetLowWaitHighEventPair @231 245 245 ; NtSetLowWaitHighThread @232 246 ; NtSetSecurityObject@233246 NtSetSecurityObject = _NtSetSecurityObject@12 @233 247 247 ; NtSetSystemEnvironmentValue @234 248 248 ; NtSetSystemInformation @235 … … 430 430 ; RtlGetCallersAddress @414 431 431 ; RtlGetCompressionWorkSpaceSize @415 432 ; RtlGetControlSecurityDescriptor@416432 RtlGetControlSecurityDescriptor = _RtlGetControlSecurityDescriptor@12 @416 433 433 ; RtlGetCurrentDirectory_U @417 434 434 RtlGetDaclSecurityDescriptor = _RtlGetDaclSecurityDescriptor@16 @418 … … 449 449 ; RtlImageRvaToSection @433 450 450 ; RtlImageRvaToVa @434 451 ; RtlImpersonateSelf@435451 RtlImpersonateSelf = _RtlImpersonateSelf@4 @435 452 452 RtlInitAnsiString = _RtlInitAnsiString@8 @436 453 453 ; RtlInitCodePageTable @437 … … 490 490 ; RtlLookupAtomInAtomTable @474 491 491 ; RtlLookupElementGenericTable @475 492 ; RtlMakeSelfRelativeSD@476492 RtlMakeSelfRelativeSD = _RtlMakeSelfRelativeSD@12 @476 493 493 ; RtlMapGenericMask @477 494 494 RtlMoveMemory = _RtlMoveMemory@12 @478 -
trunk/src/NTDLL/rtl.cpp
r6372 r7983 1 /* $Id: rtl.cpp,v 1.1 3 2001-07-20 15:39:47sandervl Exp $ */1 /* $Id: rtl.cpp,v 1.14 2002-02-21 22:52:42 sandervl Exp $ */ 2 2 3 3 /* … … 29 29 #include "stackframe.h" 30 30 #include "ntddk.h" 31 #include "imagehlp.h"32 31 #include "winreg.h" 33 32 #include "heapstring.h" … … 334 333 * FIXME: prototype guessed 335 334 */ 336 BOOLEAN WINAPI RtlDestroyHeap(HANDLE Heap)335 HANDLE WINAPI RtlDestroyHeap( HANDLE Heap ) 337 336 { 338 337 dprintf(("NTDLL: RtlDestroyHeap(%08xh)\n", … … 505 504 506 505 507 /******************************************************************************508 * RtlEnlargedIntegerMultiply [NTDLL.341]509 * Note: This even works, since gcc returns 64bit values in eax/edx just like510 * the caller expects. However... The relay code won't grok this I think.511 *512 * @@@PH: Parameters are unknown513 */514 /* longlong in VAC++ ? */515 516 extern INT WINAPI RtlEnlargedIntegerMultiply(INT factor1,517 INT factor2);518 519 506 520 507 /****************************************************************************** 521 508 * RtlFormatCurrentUserKeyPath [NTDLL.371] 522 509 */ 523 DWORD WINAPI RtlFormatCurrentUserKeyPath(PUNICODE_STRING pustrKeyPath)510 NTSTATUS WINAPI RtlFormatCurrentUserKeyPath(IN OUT PUNICODE_STRING pustrKeyPath) 524 511 { 525 512 dprintf(("NTDLL: RtlFormatCurrentUserKeyPath(%08xh) not correctly implemented.\n", -
trunk/src/NTDLL/rtlstr.c
r7254 r7983 606 606 * including the terminating NULL. 607 607 */ 608 UINT WINAPI RtlOemStringToUnicodeSize( PSTRING str)608 UINT WINAPI RtlOemStringToUnicodeSize( const STRING *str ) 609 609 { 610 610 DWORD ret = MultiByteToWideChar( CP_OEMCP, 0, str->Buffer, str->Length, NULL, 0 ); … … 619 619 * including the terminating NULL. 620 620 */ 621 DWORD WINAPI RtlAnsiStringToUnicodeSize( PSTRING str)621 DWORD WINAPI RtlAnsiStringToUnicodeSize( const STRING *str ) 622 622 { 623 623 DWORD ret = MultiByteToWideChar( CP_ACP, 0, str->Buffer, str->Length, NULL, 0 ); -
trunk/src/NTDLL/sec.cpp
r5568 r7983 1 /* $Id: sec.cpp,v 1. 8 2001-04-22 10:38:59sandervl Exp $ */1 /* $Id: sec.cpp,v 1.9 2002-02-21 22:52:43 sandervl Exp $ */ 2 2 3 3 /* … … 26 26 #include "ntdll.h" 27 27 28 #include <debugtools.h> 28 29 29 30 ODINDEBUGCHANNEL(NTDLL-SEC) … … 807 808 } 808 809 810 811 /****************************************************************************** 812 * RtlImpersonateSelf [NTDLL.@] 813 */ 814 BOOL WINAPI 815 RtlImpersonateSelf(SECURITY_IMPERSONATION_LEVEL ImpersonationLevel) 816 { 817 FIXME("(%08x), stub\n", ImpersonationLevel); 818 return TRUE; 819 } 820 821 /****************************************************************************** 822 * NtAccessCheck [NTDLL.@] 823 */ 824 NTSTATUS WINAPI 825 NtAccessCheck( 826 IN PSECURITY_DESCRIPTOR SecurityDescriptor, 827 IN HANDLE ClientToken, 828 IN ACCESS_MASK DesiredAccess, 829 IN PGENERIC_MAPPING GenericMapping, 830 OUT PPRIVILEGE_SET PrivilegeSet, 831 OUT PULONG ReturnLength, 832 OUT PULONG GrantedAccess, 833 OUT PBOOLEAN AccessStatus) 834 { 835 FIXME("(%p, %04x, %08lx, %p, %p, %p, %p, %p), stub\n", 836 SecurityDescriptor, ClientToken, DesiredAccess, GenericMapping, 837 PrivilegeSet, ReturnLength, GrantedAccess, AccessStatus); 838 *AccessStatus = TRUE; 839 return STATUS_SUCCESS; 840 } 841 842 /****************************************************************************** 843 * NtSetSecurityObject [NTDLL.@] 844 */ 845 NTSTATUS WINAPI 846 NtSetSecurityObject( 847 IN HANDLE Handle, 848 IN SECURITY_INFORMATION SecurityInformation, 849 IN PSECURITY_DESCRIPTOR SecurityDescriptor) 850 { 851 FIXME("0x%08x 0x%08lx %p\n", Handle, SecurityInformation, SecurityDescriptor); 852 return STATUS_SUCCESS; 853 } 854 855 /****************************************************************************** 856 * RtlGetControlSecurityDescriptor (NTDLL.@) 857 */ 858 859 NTSTATUS WINAPI RtlGetControlSecurityDescriptor( 860 PSECURITY_DESCRIPTOR pSecurityDescriptor, 861 PSECURITY_DESCRIPTOR_CONTROL pControl, 862 LPDWORD lpdwRevision) 863 { 864 FIXME("(%p,%p,%p),stub!\n",pSecurityDescriptor,pControl,lpdwRevision); 865 return STATUS_SUCCESS; 866 } 867 868 /************************************************************************** 869 * RtlMakeSelfRelativeSD [NTDLL.@] 870 */ 871 NTSTATUS WINAPI RtlMakeSelfRelativeSD( 872 IN PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor, 873 IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor, 874 IN OUT LPDWORD lpdwBufferLength) 875 { 876 FIXME("(%p,%p,%p(%lu))\n", pAbsoluteSecurityDescriptor, 877 pSelfRelativeSecurityDescriptor, lpdwBufferLength,*lpdwBufferLength); 878 return STATUS_SUCCESS; 879 } -
trunk/src/advapi32/ADVAPI32.CPP
r6510 r7983 1 /* $Id: ADVAPI32.CPP,v 1. 19 2001-08-10 19:31:19sandervl Exp $ */1 /* $Id: ADVAPI32.CPP,v 1.20 2002-02-21 22:51:58 sandervl Exp $ */ 2 2 3 3 /* … … 1005 1005 1006 1006 1007 /*****************************************************************************1008 * Name : LookupAccountNameA1009 * Purpose : The LookupAccountName function accepts the name of a system and1010 * an account as input. It retrieves a security identifier (SID)1011 * for the account and the name of the domain on which the account was found.1012 * Parameters: LPCSTR lpSystemName address of string for system name1013 * LPCSTR lpAccountName address of string for account name1014 * PSID Sid address of security identifier1015 * LPDWORD cbSid address of size of security identifier1016 * LPTSTR ReferencedDomainName address of string for referenced domain1017 * LPDWORD cbReferencedDomainName address of size of domain string1018 * PSID_NAME_USE peUse address of SID-type indicator1019 * Variables :1020 * Result :1021 * Remark :1022 * Status : UNTESTED STUB1023 *1024 * Author : Patrick Haller [Tue, 1998/06/16 23:00]1025 *****************************************************************************/1026 1027 BOOL WIN32API LookupAccountNameA(LPCSTR lpSystemName,1028 LPCSTR lpAccountName,1029 PSID Sid,1030 LPDWORD cbSid,1031 LPTSTR ReferencedDomainName,1032 LPDWORD cbReferencedDomainName,1033 PSID_NAME_USE peUse)1034 {1035 dprintf(("ADVAPI32: LookupAccountNameA(%s,%s,%08xh,%08xh,%s,%08xh,%08xh) not implemented.\n",1036 lpSystemName,1037 lpAccountName,1038 Sid,1039 cbSid,1040 ReferencedDomainName,1041 cbReferencedDomainName,1042 peUse));1043 1044 return (FALSE); /* signal failure */1045 }1046 1047 1007 1048 1008 /***************************************************************************** … … 1681 1641 1682 1642 1683 /*****************************************************************************1684 * Name : SetKernelObjectSecurity1685 * Purpose : The SetKernelObjectSecurity function sets the security of a kernel1686 * object. For example, this can be a process, thread, or event.1687 * Parameters: HANDLE hObject handle of object1688 * SECURITY_INFORMATION si type of information to set1689 * PSECURITY_DESCRIPTOR psd address of security descriptor1690 * Variables :1691 * Result :1692 * Remark :1693 * Status : UNTESTED STUB1694 *1695 * Author : Patrick Haller [Tue, 1998/06/16 23:00]1696 *****************************************************************************/1697 1698 BOOL WIN32API SetKernelObjectSecurity(HANDLE hObject,1699 SECURITY_INFORMATION si,1700 PSECURITY_DESCRIPTOR psd)1701 {1702 dprintf(("ADVAPI32: SetKernelObjectSecurity(%08xh,%08xh,%08xh) not implemented.\n",1703 hObject,1704 si,1705 psd));1706 1707 return (FALSE); /* signal failure */1708 }1709 1710 1643 1711 1644 /***************************************************************************** -
trunk/src/advapi32/lsa.cpp
r4400 r7983 1 /* $Id: lsa.cpp,v 1. 6 2000-10-03 05:38:09 birdExp $ */1 /* $Id: lsa.cpp,v 1.7 2002-02-21 22:51:59 sandervl Exp $ */ 2 2 3 3 /* … … 284 284 ULONG CountOfRights); 285 285 286 NTSTATUS WIN32API LsaClose(LSA_HANDLE hLsaObject);287 286 288 287 NTSTATUS WIN32API LsaCreateTrustedDomainEx(LSA_HANDLE PolicyHandle, … … 317 316 PULONG CountReturned); 318 317 319 NTSTATUS WIN32API LsaFreeMemory(PVOID Buffer);320 318 321 319 NTSTATUS WIN32API LsaLookupNames(LSA_HANDLE PolicyHandle, … … 325 323 PLSA_TRANSLATED_SID* Sids); 326 324 327 NTSTATUS WIN32API LsaLookupSids(LSA_HANDLE PolicyHandle,328 ULONG Count,329 PSID* Sids,330 PLSA_REFERENCED_DOMAIN_LIST* ReferencedDomains,331 PLSA_TRANSLATED_NAME* Names);332 325 333 326 ULONG WIN32API LsaNtStatusToWinError(NTSTATUS Status); … … 343 336 PLSA_HANDLE TrustedDomainHandle); 344 337 345 NTSTATUS WIN32API LsaQueryInformationPolicy(LSA_HANDLE PolicyHandle,346 POLICY_INFORMATION_CLASS InformationClass,347 PVOID * Buffer);348 338 349 339 NTSTATUS WIN32API LsaQueryTrustedDomainInfo(LSA_HANDLE PolicyHandle, … … 420 410 421 411 422 /*****************************************************************************423 * Name : LsaClose424 * Purpose : The LsaClose function closes a handle to an LSA policy object.425 * Parameters: LSA_HANDLE ObjectHandle426 * Variables :427 * Result : NTSTATUS428 * Remark :429 * Status : UNTESTED STUB430 *431 * Author : Patrick Haller [Thu, 1999/11/04 23:00]432 *****************************************************************************/433 434 ODINFUNCTION1(NTSTATUS,LsaClose,LSA_HANDLE,hLsaObject)435 {436 dprintf(("ADVAPI32:Lsa: LsaClose not implemented.\n"));437 return 0;438 }439 412 440 413 … … 608 581 609 582 610 /*****************************************************************************611 * Name : LsaFreeMemory612 * Purpose : The LsaFreeMemory function frees memory allocated for613 * an output buffer by an LSA function call. LSA functions that614 * return variable-length output buffers always allocate the615 * buffer on behalf of the caller. The caller must free this616 * memory by passing the returned buffer pointer to617 * LsaFreeMemory when the memory is no longer required.618 * Parameters: PVOID Buffer619 * Variables :620 * Result : NTSTATUS621 * Remark :622 * Status : UNTESTED STUB623 *624 * Author : Patrick Haller [Thu, 1999/11/04 23:00]625 *****************************************************************************/626 627 ODINFUNCTION1(NTSTATUS, LsaFreeMemory,628 PVOID, Buffer)629 {630 dprintf(("ADVAPI32:Lsa: LsaFreeMemory not implemented.\n"));631 return 0;632 }633 583 634 584 … … 663 613 664 614 665 /*****************************************************************************666 * Name : LsaLookupSids667 * Purpose : The LsaLookupSids function looks up the names668 * that corresponding to an array of SIDs. If a name can669 * not be mapped to a SID, LsaLookupSids converts670 * the SID to character form.671 * Parameters: LSA_HANDLE PolicyHandle,672 * ULONG Count673 * PSID *Sids674 * PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains675 * PLSA_TRANSLATED_NAME *Names676 * Variables :677 * Result : NTSTATUS678 * Remark :679 * Status : UNTESTED STUB680 *681 * Author : Patrick Haller [Thu, 1999/11/04 23:00]682 *****************************************************************************/683 684 ODINFUNCTION5(NTSTATUS, LsaLookupSids,685 LSA_HANDLE, PolicyHandle,686 ULONG, Count,687 PSID*, Sids,688 PLSA_REFERENCED_DOMAIN_LIST*,ReferencedDomains,689 PLSA_TRANSLATED_NAME*, Names)690 {691 dprintf(("ADVAPI32:Lsa: LsaLookupNames not implemented.\n"));692 return 0;693 }694 615 695 616 … … 745 666 } 746 667 747 748 /*****************************************************************************749 * Name : LsaQueryInformationPolicy750 * Purpose : The LsaQueryInformationPolicy function751 * retrieves information about an LSA policy object.752 * Parameters: LSA_HANDLE PolicyHandle,753 * POLICY_INFORMATION_CLASS InformationClass,754 * PVOID *Buffer755 * Variables :756 * Result : NTSTATUS757 * Remark :758 * Status : UNTESTED STUB759 *760 * Author : Patrick Haller [Thu, 1999/11/04 23:00]761 *****************************************************************************/762 763 ODINFUNCTION3(NTSTATUS, LsaQueryInformationPolicy,764 LSA_HANDLE, PolicyHandle,765 POLICY_INFORMATION_CLASS, InformationClass,766 PVOID *, Buffer)767 {768 dprintf(("ADVAPI32:Lsa: LsaQueryInformationPolicy not implemented.\n"));769 return 0;770 }771 668 772 669 -
trunk/src/advapi32/makefile
r7842 r7983 1 # $Id: makefile,v 1. 29 2002-02-08 14:13:16sandervl Exp $1 # $Id: makefile,v 1.30 2002-02-21 22:52:00 sandervl Exp $ 2 2 3 3 # … … 22 22 $(OBJDIR)\lsa.obj \ 23 23 $(OBJDIR)\security.obj \ 24 $(OBJDIR)\security_odin.obj \ 24 25 $(OBJDIR)\systemfunction.obj \ 25 26 $(OBJDIR)\service.obj \
Note:
See TracChangeset
for help on using the changeset viewer.