Ignore:
Timestamp:
Feb 13, 2003, 6:16:50 PM (23 years ago)
Author:
sandervl
Message:

Forward RtlZero/Move/FillMemory to ntdll

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/kernel32/wprocess.cpp

    r9800 r9802  
    1 /* $Id: wprocess.cpp,v 1.179 2003-02-13 15:30:53 sandervl Exp $ */
     1/* $Id: wprocess.cpp,v 1.180 2003-02-13 17:16:50 sandervl Exp $ */
    22
    33/*
     
    4949#include "directory.h"
    5050
     51#include <win\ntddk.h>
     52
    5153#define DBG_LOCALLOG    DBG_wprocess
    5254#include "dbglocal.h"
     
    8789static VMutex    threadListMutex;
    8890
    89 //TODO: This should not be here: (need to rearrange NTDLL; kernel32 can't depend on ntdll)
    90 static BOOLEAN (* WINAPI NTDLL_RtlAllocateAndInitializeSid) ( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
    91                                                               BYTE nSubAuthorityCount,
    92                                                               DWORD nSubAuthority0,
    93                                                               DWORD nSubAuthority1,
    94                                                               DWORD nSubAuthority2,
    95                                                               DWORD nSubAuthority3,
    96                                                               DWORD nSubAuthority4,
    97                                                               DWORD nSubAuthority5,
    98                                                               DWORD nSubAuthority6,
    99                                                               DWORD nSubAuthority7,
    100                                                               PSID *pSid);
    101 static HINSTANCE hInstNTDll = 0;
    10291
    10392//******************************************************************************
     
    310299
    311300    //Initialize thread security objects (TODO: Not complete)
    312     if(hInstNTDll == 0) {
    313         hInstNTDll = LoadLibraryA("NTDLL.DLL");
    314         *(ULONG *)&NTDLL_RtlAllocateAndInitializeSid = (ULONG)GetProcAddress(hInstNTDll, "RtlAllocateAndInitializeSid");
    315         if(NTDLL_RtlAllocateAndInitializeSid == NULL) {
    316             DebugInt3();
    317         }
    318     }
    319301    SID_IDENTIFIER_AUTHORITY sidIdAuth = {0};
    320302    winteb->o.odin.threadinfo.dwType = SECTYPE_PROCESS | SECTYPE_INITIALIZED;
    321303
    322     if (NULL != NTDLL_RtlAllocateAndInitializeSid) {
    323         NTDLL_RtlAllocateAndInitializeSid(&sidIdAuth, 1, 0, 0, 0, 0, 0, 0, 0, 0, &winteb->o.odin.threadinfo.SidUser.User.Sid);
    324     }
    325     else DebugInt3();
     304    RtlAllocateAndInitializeSid(&sidIdAuth, 1, 0, 0, 0, 0, 0, 0, 0, 0, &winteb->o.odin.threadinfo.SidUser.User.Sid);
    326305
    327306    winteb->o.odin.threadinfo.SidUser.User.Attributes = 0; //?????????
     
    330309    winteb->o.odin.threadinfo.pTokenGroups->GroupCount = 1;
    331310
    332     if (NULL != NTDLL_RtlAllocateAndInitializeSid) {
    333          NTDLL_RtlAllocateAndInitializeSid(&sidIdAuth, 1, 0, 0, 0, 0, 0, 0, 0, 0, &winteb->o.odin.threadinfo.PrimaryGroup.PrimaryGroup);
    334     }
    335     else DebugInt3();
     311    RtlAllocateAndInitializeSid(&sidIdAuth, 1, 0, 0, 0, 0, 0, 0, 0, 0, &winteb->o.odin.threadinfo.PrimaryGroup.PrimaryGroup);
    336312
    337313    winteb->o.odin.threadinfo.pTokenGroups->Groups[0].Sid = winteb->o.odin.threadinfo.PrimaryGroup.PrimaryGroup;
Note: See TracChangeset for help on using the changeset viewer.