Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
1d36d129
Commit
1d36d129
authored
Dec 22, 2004
by
Alexandre Julliard
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fixed prototypes of a couple of ntdll functions.
Replaced the CallWin32ToNt macro by a proper function. PBOOL cannot be cast to PBOOLEAN, we need to use an intermediate variable.
parent
ba8200bf
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
81 additions
and
61 deletions
+81
-61
security.c
dlls/advapi32/security.c
+75
-55
sec.c
dlls/ntdll/sec.c
+4
-4
winternl.h
include/winternl.h
+2
-2
No files found.
dlls/advapi32/security.c
View file @
1d36d129
...
...
@@ -92,13 +92,13 @@ static const WCHAR SDDL_INHERITED[] = {'I','D',0};
static
const
WCHAR
SDDL_AUDIT_SUCCESS
[]
=
{
'S'
,
'A'
,
0
};
static
const
WCHAR
SDDL_AUDIT_FAILURE
[]
=
{
'F'
,
'A'
,
0
};
#define CallWin32ToNt(func) \
{ NTSTATUS ret; \
ret = (func); \
if (ret !=STATUS_SUCCESS) \
{ SetLastError (RtlNtStatusToDosError(ret)); return FALSE; } \
return TRUE; \
}
/* set last error code from NT status and get the proper boolean return value */
/* used for functions that are a simple wrapper around the corresponding ntdll API */
static
inline
BOOL
set_ntstatus
(
NTSTATUS
status
)
{
if
(
status
)
SetLastError
(
RtlNtStatusToDosError
(
status
));
return
!
status
;
}
static
void
dumpLsaAttributes
(
PLSA_OBJECT_ATTRIBUTES
oa
)
{
...
...
@@ -176,7 +176,7 @@ BOOL WINAPI
OpenProcessToken
(
HANDLE
ProcessHandle
,
DWORD
DesiredAccess
,
HANDLE
*
TokenHandle
)
{
CallWin32ToNt
(
NtOpenProcessToken
(
ProcessHandle
,
DesiredAccess
,
TokenHandle
));
return
set_ntstatus
(
NtOpenProcessToken
(
ProcessHandle
,
DesiredAccess
,
TokenHandle
));
}
/******************************************************************************
...
...
@@ -201,15 +201,15 @@ BOOL WINAPI
OpenThreadToken
(
HANDLE
ThreadHandle
,
DWORD
DesiredAccess
,
BOOL
OpenAsSelf
,
HANDLE
*
TokenHandle
)
{
CallWin32ToNt
(
NtOpenThreadToken
(
ThreadHandle
,
DesiredAccess
,
OpenAsSelf
,
TokenHandle
));
return
set_ntstatus
(
NtOpenThreadToken
(
ThreadHandle
,
DesiredAccess
,
OpenAsSelf
,
TokenHandle
));
}
BOOL
WINAPI
AdjustTokenGroups
(
HANDLE
TokenHandle
,
BOOL
ResetToDefault
,
PTOKEN_GROUPS
NewState
,
DWORD
BufferLength
,
PTOKEN_GROUPS
PreviousState
,
PDWORD
ReturnLength
)
{
CallWin32ToNt
(
NtAdjustGroupsToken
(
TokenHandle
,
ResetToDefault
,
NewState
,
BufferLength
,
PreviousState
,
ReturnLength
));
return
set_ntstatus
(
NtAdjustGroupsToken
(
TokenHandle
,
ResetToDefault
,
NewState
,
BufferLength
,
PreviousState
,
ReturnLength
));
}
/******************************************************************************
...
...
@@ -238,7 +238,9 @@ AdjustTokenPrivileges( HANDLE TokenHandle, BOOL DisableAllPrivileges,
LPVOID
NewState
,
DWORD
BufferLength
,
LPVOID
PreviousState
,
LPDWORD
ReturnLength
)
{
CallWin32ToNt
(
NtAdjustPrivilegesToken
(
TokenHandle
,
DisableAllPrivileges
,
NewState
,
BufferLength
,
PreviousState
,
ReturnLength
));
return
set_ntstatus
(
NtAdjustPrivilegesToken
(
TokenHandle
,
DisableAllPrivileges
,
NewState
,
BufferLength
,
PreviousState
,
ReturnLength
));
}
/******************************************************************************
...
...
@@ -305,7 +307,8 @@ GetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
(
tokeninfoclass
==
TokenSandBoxInert
)
?
"TokenSandBoxInert"
:
"Unknown"
,
tokeninfo
,
tokeninfolength
,
retlen
);
CallWin32ToNt
(
NtQueryInformationToken
(
token
,
tokeninfoclass
,
tokeninfo
,
tokeninfolength
,
retlen
));
return
set_ntstatus
(
NtQueryInformationToken
(
token
,
tokeninfoclass
,
tokeninfo
,
tokeninfolength
,
retlen
));
}
/******************************************************************************
...
...
@@ -347,7 +350,7 @@ SetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
"Unknown"
,
tokeninfo
,
tokeninfolength
);
CallWin32ToNt
(
NtSetInformationToken
(
token
,
tokeninfoclass
,
tokeninfo
,
tokeninfolength
));
return
set_ntstatus
(
NtSetInformationToken
(
token
,
tokeninfoclass
,
tokeninfo
,
tokeninfolength
));
}
/*************************************************************************
...
...
@@ -371,8 +374,8 @@ SetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
*/
BOOL
WINAPI
SetThreadToken
(
PHANDLE
thread
,
HANDLE
token
)
{
CallWin32ToNt
(
NtSetInformationThread
(
thread
?
*
thread
:
GetCurrentThread
(),
ThreadImpersonationToken
,
&
token
,
sizeof
token
));
return
set_ntstatus
(
NtSetInformationThread
(
thread
?
*
thread
:
GetCurrentThread
(),
ThreadImpersonationToken
,
&
token
,
sizeof
token
));
}
/* ##############################
...
...
@@ -405,11 +408,11 @@ AllocateAndInitializeSid( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
DWORD
nSubAuthority6
,
DWORD
nSubAuthority7
,
PSID
*
pSid
)
{
return
RtlAllocateAndInitializeSid
(
pIdentifierAuthority
,
nSubAuthorityCount
,
nSubAuthority0
,
nSubAuthority1
,
nSubAuthority2
,
nSubAuthority3
,
nSubAuthority4
,
nSubAuthority5
,
nSubAuthority6
,
nSubAuthority7
,
pSid
);
return
set_ntstatus
(
RtlAllocateAndInitializeSid
(
pIdentifierAuthority
,
nSubAuthorityCount
,
nSubAuthority0
,
nSubAuthority1
,
nSubAuthority2
,
nSubAuthority3
,
nSubAuthority4
,
nSubAuthority5
,
nSubAuthority6
,
nSubAuthority7
,
pSid
)
);
}
/******************************************************************************
...
...
@@ -579,7 +582,7 @@ GetLengthSid (PSID pSid)
BOOL
WINAPI
InitializeSecurityDescriptor
(
PSECURITY_DESCRIPTOR
pDescr
,
DWORD
revision
)
{
CallWin32ToNt
(
RtlCreateSecurityDescriptor
(
pDescr
,
revision
));
return
set_ntstatus
(
RtlCreateSecurityDescriptor
(
pDescr
,
revision
));
}
...
...
@@ -599,10 +602,12 @@ BOOL WINAPI MakeAbsoluteSD (
OUT
PSID
pPrimaryGroup
,
OUT
LPDWORD
lpdwPrimaryGroupSize
)
{
CallWin32ToNt
(
RtlSelfRelativeToAbsoluteSD
(
pSelfRelativeSecurityDescriptor
,
pAbsoluteSecurityDescriptor
,
lpdwAbsoluteSecurityDescriptorSize
,
pDacl
,
lpdwDaclSize
,
pSacl
,
lpdwSaclSize
,
pOwner
,
lpdwOwnerSize
,
pPrimaryGroup
,
lpdwPrimaryGroupSize
));
return
set_ntstatus
(
RtlSelfRelativeToAbsoluteSD
(
pSelfRelativeSecurityDescriptor
,
pAbsoluteSecurityDescriptor
,
lpdwAbsoluteSecurityDescriptorSize
,
pDacl
,
lpdwDaclSize
,
pSacl
,
lpdwSaclSize
,
pOwner
,
lpdwOwnerSize
,
pPrimaryGroup
,
lpdwPrimaryGroupSize
));
}
...
...
@@ -625,7 +630,10 @@ BOOL WINAPI
GetSecurityDescriptorOwner
(
PSECURITY_DESCRIPTOR
pDescr
,
PSID
*
pOwner
,
LPBOOL
lpbOwnerDefaulted
)
{
CallWin32ToNt
(
RtlGetOwnerSecurityDescriptor
(
pDescr
,
pOwner
,
(
PBOOLEAN
)
lpbOwnerDefaulted
));
BOOLEAN
defaulted
;
BOOL
ret
=
set_ntstatus
(
RtlGetOwnerSecurityDescriptor
(
pDescr
,
pOwner
,
&
defaulted
));
*
lpbOwnerDefaulted
=
defaulted
;
return
ret
;
}
/******************************************************************************
...
...
@@ -636,7 +644,7 @@ GetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pDescr, PSID *pOwner,
BOOL
WINAPI
SetSecurityDescriptorOwner
(
PSECURITY_DESCRIPTOR
pSecurityDescriptor
,
PSID
pOwner
,
BOOL
bOwnerDefaulted
)
{
CallWin32ToNt
(
RtlSetOwnerSecurityDescriptor
(
pSecurityDescriptor
,
pOwner
,
bOwnerDefaulted
));
return
set_ntstatus
(
RtlSetOwnerSecurityDescriptor
(
pSecurityDescriptor
,
pOwner
,
bOwnerDefaulted
));
}
/******************************************************************************
* GetSecurityDescriptorGroup [ADVAPI32.@]
...
...
@@ -646,7 +654,10 @@ BOOL WINAPI GetSecurityDescriptorGroup(
PSID
*
Group
,
LPBOOL
GroupDefaulted
)
{
CallWin32ToNt
(
RtlGetGroupSecurityDescriptor
(
SecurityDescriptor
,
Group
,
(
PBOOLEAN
)
GroupDefaulted
));
BOOLEAN
defaulted
;
BOOL
ret
=
set_ntstatus
(
RtlGetGroupSecurityDescriptor
(
SecurityDescriptor
,
Group
,
&
defaulted
));
*
GroupDefaulted
=
defaulted
;
return
ret
;
}
/******************************************************************************
* SetSecurityDescriptorGroup [ADVAPI32.@]
...
...
@@ -654,7 +665,7 @@ BOOL WINAPI GetSecurityDescriptorGroup(
BOOL
WINAPI
SetSecurityDescriptorGroup
(
PSECURITY_DESCRIPTOR
SecurityDescriptor
,
PSID
Group
,
BOOL
GroupDefaulted
)
{
CallWin32ToNt
(
RtlSetGroupSecurityDescriptor
(
SecurityDescriptor
,
Group
,
GroupDefaulted
));
return
set_ntstatus
(
RtlSetGroupSecurityDescriptor
(
SecurityDescriptor
,
Group
,
GroupDefaulted
));
}
/******************************************************************************
...
...
@@ -666,7 +677,7 @@ BOOL WINAPI SetSecurityDescriptorGroup ( PSECURITY_DESCRIPTOR SecurityDescriptor
BOOL
WINAPI
IsValidSecurityDescriptor
(
PSECURITY_DESCRIPTOR
SecurityDescriptor
)
{
CallWin32ToNt
(
RtlValidSecurityDescriptor
(
SecurityDescriptor
));
return
set_ntstatus
(
RtlValidSecurityDescriptor
(
SecurityDescriptor
));
}
/******************************************************************************
...
...
@@ -678,8 +689,11 @@ BOOL WINAPI GetSecurityDescriptorDacl(
OUT
PACL
*
pDacl
,
OUT
LPBOOL
lpbDaclDefaulted
)
{
CallWin32ToNt
(
RtlGetDaclSecurityDescriptor
(
pSecurityDescriptor
,
(
PBOOLEAN
)
lpbDaclPresent
,
pDacl
,
(
PBOOLEAN
)
lpbDaclDefaulted
));
BOOLEAN
present
,
defaulted
;
BOOL
ret
=
set_ntstatus
(
RtlGetDaclSecurityDescriptor
(
pSecurityDescriptor
,
&
present
,
pDacl
,
&
defaulted
));
*
lpbDaclPresent
=
present
;
*
lpbDaclDefaulted
=
defaulted
;
return
ret
;
}
/******************************************************************************
...
...
@@ -692,7 +706,7 @@ SetSecurityDescriptorDacl (
PACL
dacl
,
BOOL
dacldefaulted
)
{
CallWin32ToNt
(
RtlSetDaclSecurityDescriptor
(
lpsd
,
daclpresent
,
dacl
,
dacldefaulted
)
);
return
set_ntstatus
(
RtlSetDaclSecurityDescriptor
(
lpsd
,
daclpresent
,
dacl
,
dacldefaulted
)
);
}
/******************************************************************************
* GetSecurityDescriptorSacl [ADVAPI32.@]
...
...
@@ -703,8 +717,11 @@ BOOL WINAPI GetSecurityDescriptorSacl(
OUT
PACL
*
pSacl
,
OUT
LPBOOL
lpbSaclDefaulted
)
{
CallWin32ToNt
(
RtlGetSaclSecurityDescriptor
(
lpsd
,
(
PBOOLEAN
)
lpbSaclPresent
,
pSacl
,
(
PBOOLEAN
)
lpbSaclDefaulted
));
BOOLEAN
present
,
defaulted
;
BOOL
ret
=
set_ntstatus
(
RtlGetSaclSecurityDescriptor
(
lpsd
,
&
present
,
pSacl
,
&
defaulted
)
);
*
lpbSaclPresent
=
present
;
*
lpbSaclDefaulted
=
defaulted
;
return
ret
;
}
/**************************************************************************
...
...
@@ -716,7 +733,7 @@ BOOL WINAPI SetSecurityDescriptorSacl (
PACL
lpsacl
,
BOOL
sacldefaulted
)
{
CallWin32ToNt
(
RtlSetSaclSecurityDescriptor
(
lpsd
,
saclpresent
,
lpsacl
,
sacldefaulted
));
return
set_ntstatus
(
RtlSetSaclSecurityDescriptor
(
lpsd
,
saclpresent
,
lpsacl
,
sacldefaulted
));
}
/******************************************************************************
* MakeSelfRelativeSD [ADVAPI32.@]
...
...
@@ -732,7 +749,8 @@ MakeSelfRelativeSD(
IN
PSECURITY_DESCRIPTOR
pSelfRelativeSecurityDescriptor
,
IN
OUT
LPDWORD
lpdwBufferLength
)
{
CallWin32ToNt
(
RtlMakeSelfRelativeSD
(
pAbsoluteSecurityDescriptor
,
pSelfRelativeSecurityDescriptor
,
lpdwBufferLength
));
return
set_ntstatus
(
RtlMakeSelfRelativeSD
(
pAbsoluteSecurityDescriptor
,
pSelfRelativeSecurityDescriptor
,
lpdwBufferLength
));
}
/******************************************************************************
...
...
@@ -742,7 +760,7 @@ MakeSelfRelativeSD(
BOOL
WINAPI
GetSecurityDescriptorControl
(
PSECURITY_DESCRIPTOR
pSecurityDescriptor
,
PSECURITY_DESCRIPTOR_CONTROL
pControl
,
LPDWORD
lpdwRevision
)
{
CallWin32ToNt
(
RtlGetControlSecurityDescriptor
(
pSecurityDescriptor
,
pControl
,
lpdwRevision
));
return
set_ntstatus
(
RtlGetControlSecurityDescriptor
(
pSecurityDescriptor
,
pControl
,
lpdwRevision
));
}
/* ##############################
...
...
@@ -755,7 +773,7 @@ BOOL WINAPI GetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR pSecurityDescri
*/
BOOL
WINAPI
InitializeAcl
(
PACL
acl
,
DWORD
size
,
DWORD
rev
)
{
CallWin32ToNt
(
RtlCreateAcl
(
acl
,
size
,
rev
));
return
set_ntstatus
(
RtlCreateAcl
(
acl
,
size
,
rev
));
}
/******************************************************************************
...
...
@@ -767,7 +785,7 @@ BOOL WINAPI AddAccessAllowedAce(
IN
DWORD
AccessMask
,
IN
PSID
pSid
)
{
CallWin32ToNt
(
RtlAddAccessAllowedAce
(
pAcl
,
dwAceRevision
,
AccessMask
,
pSid
));
return
set_ntstatus
(
RtlAddAccessAllowedAce
(
pAcl
,
dwAceRevision
,
AccessMask
,
pSid
));
}
/******************************************************************************
...
...
@@ -780,7 +798,7 @@ BOOL WINAPI AddAccessAllowedAceEx(
IN
DWORD
AccessMask
,
IN
PSID
pSid
)
{
CallWin32ToNt
(
RtlAddAccessAllowedAceEx
(
pAcl
,
dwAceRevision
,
AceFlags
,
AccessMask
,
pSid
));
return
set_ntstatus
(
RtlAddAccessAllowedAceEx
(
pAcl
,
dwAceRevision
,
AceFlags
,
AccessMask
,
pSid
));
}
/******************************************************************************
...
...
@@ -792,7 +810,7 @@ BOOL WINAPI AddAccessDeniedAce(
IN
DWORD
AccessMask
,
IN
PSID
pSid
)
{
CallWin32ToNt
(
RtlAddAccessDeniedAce
(
pAcl
,
dwAceRevision
,
AccessMask
,
pSid
));
return
set_ntstatus
(
RtlAddAccessDeniedAce
(
pAcl
,
dwAceRevision
,
AccessMask
,
pSid
));
}
/******************************************************************************
...
...
@@ -805,7 +823,7 @@ BOOL WINAPI AddAccessDeniedAceEx(
IN
DWORD
AccessMask
,
IN
PSID
pSid
)
{
CallWin32ToNt
(
RtlAddAccessDeniedAceEx
(
pAcl
,
dwAceRevision
,
AceFlags
,
AccessMask
,
pSid
));
return
set_ntstatus
(
RtlAddAccessDeniedAceEx
(
pAcl
,
dwAceRevision
,
AceFlags
,
AccessMask
,
pSid
));
}
/******************************************************************************
...
...
@@ -818,7 +836,7 @@ BOOL WINAPI AddAce(
LPVOID
pAceList
,
DWORD
nAceListLength
)
{
CallWin32ToNt
(
RtlAddAce
(
pAcl
,
dwAceRevision
,
dwStartingAceIndex
,
pAceList
,
nAceListLength
));
return
set_ntstatus
(
RtlAddAce
(
pAcl
,
dwAceRevision
,
dwStartingAceIndex
,
pAceList
,
nAceListLength
));
}
/******************************************************************************
...
...
@@ -826,7 +844,7 @@ BOOL WINAPI AddAce(
*/
BOOL
WINAPI
DeleteAce
(
PACL
pAcl
,
DWORD
dwAceIndex
)
{
CallWin32ToNt
(
RtlDeleteAce
(
pAcl
,
dwAceIndex
));
return
set_ntstatus
(
RtlDeleteAce
(
pAcl
,
dwAceIndex
));
}
/******************************************************************************
...
...
@@ -842,7 +860,7 @@ BOOL WINAPI FindFirstFreeAce(IN PACL pAcl, LPVOID * pAce)
*/
BOOL
WINAPI
GetAce
(
PACL
pAcl
,
DWORD
dwAceIndex
,
LPVOID
*
pAce
)
{
CallWin32ToNt
(
RtlGetAce
(
pAcl
,
dwAceIndex
,
pAce
));
return
set_ntstatus
(
RtlGetAce
(
pAcl
,
dwAceIndex
,
pAce
));
}
/******************************************************************************
...
...
@@ -854,8 +872,8 @@ BOOL WINAPI GetAclInformation(
DWORD
nAclInformationLength
,
ACL_INFORMATION_CLASS
dwAclInformationClass
)
{
CallWin32ToNt
(
RtlQueryInformationAcl
(
pAcl
,
pAclInformation
,
nAclInformationLength
,
dwAclInformationClass
));
return
set_ntstatus
(
RtlQueryInformationAcl
(
pAcl
,
pAclInformation
,
nAclInformationLength
,
dwAclInformationClass
));
}
/******************************************************************************
...
...
@@ -879,7 +897,7 @@ BOOL WINAPI IsValidAcl(IN PACL pAcl)
*/
BOOL
WINAPI
AllocateLocallyUniqueId
(
PLUID
lpLuid
)
{
CallWin32ToNt
(
NtAllocateLocallyUniqueId
(
lpLuid
));
return
set_ntstatus
(
NtAllocateLocallyUniqueId
(
lpLuid
));
}
static
const
WCHAR
SE_CREATE_TOKEN_NAME_W
[]
=
...
...
@@ -1598,8 +1616,6 @@ BOOL WINAPI ImpersonateLoggedOnUser(HANDLE hToken)
/******************************************************************************
* AccessCheck [ADVAPI32.@]
*
* FIXME check cast LPBOOL to PBOOLEAN
*/
BOOL
WINAPI
AccessCheck
(
...
...
@@ -1612,8 +1628,12 @@ AccessCheck(
LPDWORD
GrantedAccess
,
LPBOOL
AccessStatus
)
{
CallWin32ToNt
(
NtAccessCheck
(
SecurityDescriptor
,
ClientToken
,
DesiredAccess
,
GenericMapping
,
PrivilegeSet
,
PrivilegeSetLength
,
GrantedAccess
,
(
PBOOLEAN
)
AccessStatus
));
NTSTATUS
access_status
;
BOOL
ret
=
set_ntstatus
(
NtAccessCheck
(
SecurityDescriptor
,
ClientToken
,
DesiredAccess
,
GenericMapping
,
PrivilegeSet
,
PrivilegeSetLength
,
GrantedAccess
,
&
access_status
)
);
if
(
ret
)
*
AccessStatus
=
set_ntstatus
(
access_status
);
return
ret
;
}
...
...
@@ -1649,7 +1669,7 @@ BOOL WINAPI SetKernelObjectSecurity (
IN
SECURITY_INFORMATION
SecurityInformation
,
IN
PSECURITY_DESCRIPTOR
SecurityDescriptor
)
{
CallWin32ToNt
(
NtSetSecurityObject
(
Handle
,
SecurityInformation
,
SecurityDescriptor
));
return
set_ntstatus
(
NtSetSecurityObject
(
Handle
,
SecurityInformation
,
SecurityDescriptor
));
}
...
...
dlls/ntdll/sec.c
View file @
1d36d129
...
...
@@ -61,7 +61,7 @@ static WINE_EXCEPTION_FILTER(page_fault)
* RtlAllocateAndInitializeSid [NTDLL.@]
*
*/
BOOLEAN
WINAPI
RtlAllocateAndInitializeSid
(
NTSTATUS
WINAPI
RtlAllocateAndInitializeSid
(
PSID_IDENTIFIER_AUTHORITY
pIdentifierAuthority
,
BYTE
nSubAuthorityCount
,
DWORD
nSubAuthority0
,
DWORD
nSubAuthority1
,
...
...
@@ -78,7 +78,7 @@ BOOLEAN WINAPI RtlAllocateAndInitializeSid (
if
(
!
(
*
pSid
=
RtlAllocateHeap
(
GetProcessHeap
(),
0
,
RtlLengthRequiredSid
(
nSubAuthorityCount
))))
return
FALSE
;
return
STATUS_NO_MEMORY
;
((
SID
*
)
*
pSid
)
->
Revision
=
SID_REVISION
;
...
...
@@ -1147,12 +1147,12 @@ NtAccessCheck(
OUT
PPRIVILEGE_SET
PrivilegeSet
,
OUT
PULONG
ReturnLength
,
OUT
PULONG
GrantedAccess
,
OUT
PBOOLEAN
AccessStatus
)
OUT
NTSTATUS
*
AccessStatus
)
{
FIXME
(
"(%p, %p, %08lx, %p, %p, %p, %p, %p), stub
\n
"
,
SecurityDescriptor
,
ClientToken
,
DesiredAccess
,
GenericMapping
,
PrivilegeSet
,
ReturnLength
,
GrantedAccess
,
AccessStatus
);
*
AccessStatus
=
TRUE
;
*
AccessStatus
=
STATUS_SUCCESS
;
return
STATUS_SUCCESS
;
}
...
...
include/winternl.h
View file @
1d36d129
...
...
@@ -1339,7 +1339,7 @@ void WINAPI LdrInitializeThunk(HANDLE,ULONG,ULONG,ULONG);
NTSTATUS
WINAPI
LdrLoadDll
(
LPCWSTR
,
DWORD
,
const
UNICODE_STRING
*
,
HMODULE
*
);
void
WINAPI
LdrShutdownProcess
(
void
);
void
WINAPI
LdrShutdownThread
(
void
);
NTSTATUS
WINAPI
NtAccessCheck
(
PSECURITY_DESCRIPTOR
,
HANDLE
,
ACCESS_MASK
,
PGENERIC_MAPPING
,
PPRIVILEGE_SET
,
PULONG
,
PULONG
,
PBOOLEAN
);
NTSTATUS
WINAPI
NtAccessCheck
(
PSECURITY_DESCRIPTOR
,
HANDLE
,
ACCESS_MASK
,
PGENERIC_MAPPING
,
PPRIVILEGE_SET
,
PULONG
,
PULONG
,
NTSTATUS
*
);
NTSTATUS
WINAPI
NtAdjustGroupsToken
(
HANDLE
,
BOOLEAN
,
PTOKEN_GROUPS
,
ULONG
,
PTOKEN_GROUPS
,
PULONG
);
NTSTATUS
WINAPI
NtAdjustPrivilegesToken
(
HANDLE
,
BOOLEAN
,
PTOKEN_PRIVILEGES
,
DWORD
,
PTOKEN_PRIVILEGES
,
PDWORD
);
NTSTATUS
WINAPI
NtAlertThread
(
HANDLE
ThreadHandle
);
...
...
@@ -1464,7 +1464,7 @@ NTSTATUS WINAPI RtlAddAccessDeniedAce(PACL,DWORD,DWORD,PSID);
NTSTATUS
WINAPI
RtlAddAccessDeniedAceEx
(
PACL
,
DWORD
,
DWORD
,
DWORD
,
PSID
);
PVOID
WINAPI
RtlAddVectoredExceptionHandler
(
ULONG
,
PVECTORED_EXCEPTION_HANDLER
);
DWORD
WINAPI
RtlAdjustPrivilege
(
DWORD
,
DWORD
,
DWORD
,
DWORD
);
BOOLEAN
WINAPI
RtlAllocateAndInitializeSid
(
PSID_IDENTIFIER_AUTHORITY
,
BYTE
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
PSID
*
);
NTSTATUS
WINAPI
RtlAllocateAndInitializeSid
(
PSID_IDENTIFIER_AUTHORITY
,
BYTE
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
DWORD
,
PSID
*
);
RTL_HANDLE
*
WINAPI
RtlAllocateHandle
(
RTL_HANDLE_TABLE
*
,
ULONG
*
);
PVOID
WINAPI
RtlAllocateHeap
(
HANDLE
,
ULONG
,
ULONG
);
DWORD
WINAPI
RtlAnsiStringToUnicodeSize
(
const
STRING
*
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment