Author: ekohl
Date: Sun Dec 27 20:46:13 2009
New Revision: 44776
URL:
http://svn.reactos.org/svn/reactos?rev=44776&view=rev
Log:
[lsalib]
Fix indentation. No code changes.
Modified:
trunk/reactos/lib/lsalib/lsa.c
Modified: trunk/reactos/lib/lsalib/lsa.c
URL:
http://svn.reactos.org/svn/reactos/trunk/reactos/lib/lsalib/lsa.c?rev=44776…
==============================================================================
--- trunk/reactos/lib/lsalib/lsa.c [iso-8859-1] (original)
+++ trunk/reactos/lib/lsalib/lsa.c [iso-8859-1] Sun Dec 27 20:46:13 2009
@@ -28,28 +28,29 @@
NTSTATUS WINAPI
LsaDeregisterLogonProcess(HANDLE LsaHandle)
{
- LSASS_REQUEST Request;
- LSASS_REPLY Reply;
- NTSTATUS Status;
-
- Request.Header.u1.s1.DataLength = 0;
- Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
- Request.Type = LSASS_REQUEST_DEREGISTER_LOGON_PROCESS;
- Status = NtRequestWaitReplyPort(LsaHandle,
- &Request.Header,
- &Reply.Header);
- if (!NT_SUCCESS(Status))
- {
- return(Status);
- }
-
- if (!NT_SUCCESS(Reply.Status))
- {
- return(Reply.Status);
- }
-
- return(Status);
-}
+ LSASS_REQUEST Request;
+ LSASS_REPLY Reply;
+ NTSTATUS Status;
+
+ Request.Header.u1.s1.DataLength = 0;
+ Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
+ Request.Type = LSASS_REQUEST_DEREGISTER_LOGON_PROCESS;
+ Status = NtRequestWaitReplyPort(LsaHandle,
+ &Request.Header,
+ &Reply.Header);
+ if (!NT_SUCCESS(Status))
+ {
+ return Status;
+ }
+
+ if (!NT_SUCCESS(Reply.Status))
+ {
+ return Reply.Status;
+ }
+
+ return Status;
+}
+
/*
* @unimplemented
@@ -57,68 +58,69 @@
NTSTATUS WINAPI
LsaConnectUntrusted(PHANDLE LsaHandle)
{
- UNIMPLEMENTED;
- return STATUS_UNSUCCESSFUL;
-}
+ UNIMPLEMENTED;
+ return STATUS_UNSUCCESSFUL;
+}
+
/*
* @implemented
*/
NTSTATUS WINAPI
LsaCallAuthenticationPackage(HANDLE LsaHandle,
- ULONG AuthenticationPackage,
- PVOID ProtocolSubmitBuffer,
- ULONG SubmitBufferLength,
- PVOID* ProtocolReturnBuffer,
- PULONG ReturnBufferLength,
- PNTSTATUS ProtocolStatus)
-{
- PLSASS_REQUEST Request;
- PLSASS_REPLY Reply;
- LSASS_REQUEST RawRequest;
- LSASS_REPLY RawReply;
- NTSTATUS Status;
- ULONG OutBufferSize;
-
- Request = (PLSASS_REQUEST)&RawRequest;
- Reply = (PLSASS_REPLY)&RawReply;
-
- Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + SubmitBufferLength -
- sizeof(PORT_MESSAGE);
- Request->Header.u1.s1.TotalLength =
- Request->Header.u1.s1.DataLength + sizeof(PORT_MESSAGE);
- Request->Type = LSASS_REQUEST_CALL_AUTHENTICATION_PACKAGE;
- Request->d.CallAuthenticationPackageRequest.AuthenticationPackage =
- AuthenticationPackage;
- Request->d.CallAuthenticationPackageRequest.InBufferLength =
- SubmitBufferLength;
- memcpy(Request->d.CallAuthenticationPackageRequest.InBuffer,
- ProtocolSubmitBuffer,
- SubmitBufferLength);
-
- Status = NtRequestWaitReplyPort(LsaHandle,
- &Request->Header,
- &Reply->Header);
- if (!NT_SUCCESS(Status))
- {
- return(Status);
- }
-
- if (!NT_SUCCESS(Reply->Status))
- {
- return(Reply->Status);
- }
-
- OutBufferSize = Reply->d.CallAuthenticationPackageReply.OutBufferLength;
- *ProtocolReturnBuffer = RtlAllocateHeap(Secur32Heap,
- 0,
- OutBufferSize);
- *ReturnBufferLength = OutBufferSize;
- memcpy(*ProtocolReturnBuffer,
- Reply->d.CallAuthenticationPackageReply.OutBuffer,
- *ReturnBufferLength);
-
- return(Status);
+ ULONG AuthenticationPackage,
+ PVOID ProtocolSubmitBuffer,
+ ULONG SubmitBufferLength,
+ PVOID *ProtocolReturnBuffer,
+ PULONG ReturnBufferLength,
+ PNTSTATUS ProtocolStatus)
+{
+ PLSASS_REQUEST Request;
+ PLSASS_REPLY Reply;
+ LSASS_REQUEST RawRequest;
+ LSASS_REPLY RawReply;
+ NTSTATUS Status;
+ ULONG OutBufferSize;
+
+ Request = (PLSASS_REQUEST)&RawRequest;
+ Reply = (PLSASS_REPLY)&RawReply;
+
+ Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + SubmitBufferLength -
+ sizeof(PORT_MESSAGE);
+ Request->Header.u1.s1.TotalLength =
+ Request->Header.u1.s1.DataLength + sizeof(PORT_MESSAGE);
+ Request->Type = LSASS_REQUEST_CALL_AUTHENTICATION_PACKAGE;
+ Request->d.CallAuthenticationPackageRequest.AuthenticationPackage =
+ AuthenticationPackage;
+ Request->d.CallAuthenticationPackageRequest.InBufferLength =
+ SubmitBufferLength;
+ memcpy(Request->d.CallAuthenticationPackageRequest.InBuffer,
+ ProtocolSubmitBuffer,
+ SubmitBufferLength);
+
+ Status = NtRequestWaitReplyPort(LsaHandle,
+ &Request->Header,
+ &Reply->Header);
+ if (!NT_SUCCESS(Status))
+ {
+ return Status;
+ }
+
+ if (!NT_SUCCESS(Reply->Status))
+ {
+ return Reply->Status;
+ }
+
+ OutBufferSize = Reply->d.CallAuthenticationPackageReply.OutBufferLength;
+ *ProtocolReturnBuffer = RtlAllocateHeap(Secur32Heap,
+ 0,
+ OutBufferSize);
+ *ReturnBufferLength = OutBufferSize;
+ memcpy(*ProtocolReturnBuffer,
+ Reply->d.CallAuthenticationPackageReply.OutBuffer,
+ *ReturnBufferLength);
+
+ return Status;
}
@@ -128,7 +130,7 @@
NTSTATUS WINAPI
LsaFreeReturnBuffer(PVOID Buffer)
{
- return(RtlFreeHeap(Secur32Heap, 0, Buffer));
+ return RtlFreeHeap(Secur32Heap, 0, Buffer);
}
@@ -137,36 +139,37 @@
*/
NTSTATUS WINAPI
LsaLookupAuthenticationPackage(HANDLE LsaHandle,
- PLSA_STRING PackageName,
- PULONG AuthenticationPackage)
-{
- NTSTATUS Status;
- PLSASS_REQUEST Request;
- LSASS_REQUEST RawRequest;
- LSASS_REPLY Reply;
-
- Request = (PLSASS_REQUEST)&RawRequest;
- Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + PackageName->Length
-
- sizeof(PORT_MESSAGE);
- Request->Header.u1.s1.TotalLength = Request->Header.u1.s1.DataLength +
- sizeof(PORT_MESSAGE);
- Request->Type = LSASS_REQUEST_LOOKUP_AUTHENTICATION_PACKAGE;
-
- Status = NtRequestWaitReplyPort(LsaHandle,
- &Request->Header,
- &Reply.Header);
- if (!NT_SUCCESS(Status))
- {
- return(Status);
- }
- if (!NT_SUCCESS(Reply.Status))
- {
- return(Reply.Status);
- }
-
- *AuthenticationPackage = Reply.d.LookupAuthenticationPackageReply.Package;
-
- return(Reply.Status);
+ PLSA_STRING PackageName,
+ PULONG AuthenticationPackage)
+{
+ NTSTATUS Status;
+ PLSASS_REQUEST Request;
+ LSASS_REQUEST RawRequest;
+ LSASS_REPLY Reply;
+
+ Request = (PLSASS_REQUEST)&RawRequest;
+ Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + PackageName->Length
-
+ sizeof(PORT_MESSAGE);
+ Request->Header.u1.s1.TotalLength = Request->Header.u1.s1.DataLength +
+ sizeof(PORT_MESSAGE);
+ Request->Type = LSASS_REQUEST_LOOKUP_AUTHENTICATION_PACKAGE;
+
+ Status = NtRequestWaitReplyPort(LsaHandle,
+ &Request->Header,
+ &Reply.Header);
+ if (!NT_SUCCESS(Status))
+ {
+ return Status;
+ }
+
+ if (!NT_SUCCESS(Reply.Status))
+ {
+ return Reply.Status;
+ }
+
+ *AuthenticationPackage = Reply.d.LookupAuthenticationPackageReply.Package;
+
+ return Reply.Status;
}
@@ -175,102 +178,102 @@
*/
NTSTATUS WINAPI
LsaLogonUser(HANDLE LsaHandle,
- PLSA_STRING OriginName,
- SECURITY_LOGON_TYPE LogonType,
- ULONG AuthenticationPackage,
- PVOID AuthenticationInformation,
- ULONG AuthenticationInformationLength,
- PTOKEN_GROUPS LocalGroups,
- PTOKEN_SOURCE SourceContext,
- PVOID* ProfileBuffer,
- PULONG ProfileBufferLength,
- PLUID LogonId,
- PHANDLE Token,
- PQUOTA_LIMITS Quotas,
- PNTSTATUS SubStatus)
-{
- ULONG RequestLength;
- ULONG CurrentLength;
- PLSASS_REQUEST Request;
- LSASS_REQUEST RawMessage;
- PLSASS_REPLY Reply;
- LSASS_REPLY RawReply;
- NTSTATUS Status;
-
- RequestLength = sizeof(LSASS_REQUEST) - sizeof(PORT_MESSAGE);
- RequestLength = RequestLength + (OriginName->Length * sizeof(WCHAR));
- RequestLength = RequestLength + AuthenticationInformationLength;
- RequestLength = RequestLength +
- (LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
-
- CurrentLength = 0;
- Request = (PLSASS_REQUEST)&RawMessage;
-
- Request->d.LogonUserRequest.OriginNameLength = OriginName->Length;
- Request->d.LogonUserRequest.OriginName = (PWSTR)&RawMessage + CurrentLength;
- memcpy((PWSTR)&RawMessage + CurrentLength,
- OriginName->Buffer,
- OriginName->Length * sizeof(WCHAR));
- CurrentLength = CurrentLength + (OriginName->Length * sizeof(WCHAR));
-
- Request->d.LogonUserRequest.LogonType = LogonType;
-
- Request->d.LogonUserRequest.AuthenticationPackage =
- AuthenticationPackage;
-
- Request->d.LogonUserRequest.AuthenticationInformation =
- (PVOID)((ULONG_PTR)&RawMessage + CurrentLength);
- Request->d.LogonUserRequest.AuthenticationInformationLength =
- AuthenticationInformationLength;
- memcpy((PVOID)((ULONG_PTR)&RawMessage + CurrentLength),
- AuthenticationInformation,
- AuthenticationInformationLength);
- CurrentLength = CurrentLength + AuthenticationInformationLength;
-
- Request->d.LogonUserRequest.LocalGroupsCount = LocalGroups->GroupCount;
- Request->d.LogonUserRequest.LocalGroups =
- (PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength;
- memcpy((PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength,
- LocalGroups->Groups,
- LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
-
- Request->d.LogonUserRequest.SourceContext = *SourceContext;
-
- Request->Type = LSASS_REQUEST_LOGON_USER;
- Request->Header.u1.s1.DataLength = RequestLength - sizeof(PORT_MESSAGE);
- Request->Header.u1.s1.TotalLength = RequestLength + sizeof(PORT_MESSAGE);
-
- Reply = (PLSASS_REPLY)&RawReply;
-
- Status = NtRequestWaitReplyPort(LsaHandle,
- &Request->Header,
- &Reply->Header);
- if (!NT_SUCCESS(Status))
- {
- return(Status);
- }
-
- *SubStatus = Reply->d.LogonUserReply.SubStatus;
-
- if (!NT_SUCCESS(Reply->Status))
- {
- return(Status);
- }
-
- *ProfileBuffer = RtlAllocateHeap(Secur32Heap,
- 0,
- Reply->d.LogonUserReply.ProfileBufferLength);
- memcpy(*ProfileBuffer,
- (PVOID)((ULONG)Reply->d.LogonUserReply.Data +
- (ULONG)Reply->d.LogonUserReply.ProfileBuffer),
- Reply->d.LogonUserReply.ProfileBufferLength);
- *LogonId = Reply->d.LogonUserReply.LogonId;
- *Token = Reply->d.LogonUserReply.Token;
- memcpy(Quotas,
- &Reply->d.LogonUserReply.Quotas,
- sizeof(Reply->d.LogonUserReply.Quotas));
-
- return(Status);
+ PLSA_STRING OriginName,
+ SECURITY_LOGON_TYPE LogonType,
+ ULONG AuthenticationPackage,
+ PVOID AuthenticationInformation,
+ ULONG AuthenticationInformationLength,
+ PTOKEN_GROUPS LocalGroups,
+ PTOKEN_SOURCE SourceContext,
+ PVOID *ProfileBuffer,
+ PULONG ProfileBufferLength,
+ PLUID LogonId,
+ PHANDLE Token,
+ PQUOTA_LIMITS Quotas,
+ PNTSTATUS SubStatus)
+{
+ ULONG RequestLength;
+ ULONG CurrentLength;
+ PLSASS_REQUEST Request;
+ LSASS_REQUEST RawMessage;
+ PLSASS_REPLY Reply;
+ LSASS_REPLY RawReply;
+ NTSTATUS Status;
+
+ RequestLength = sizeof(LSASS_REQUEST) - sizeof(PORT_MESSAGE);
+ RequestLength = RequestLength + (OriginName->Length * sizeof(WCHAR));
+ RequestLength = RequestLength + AuthenticationInformationLength;
+ RequestLength = RequestLength +
+ (LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
+
+ CurrentLength = 0;
+ Request = (PLSASS_REQUEST)&RawMessage;
+
+ Request->d.LogonUserRequest.OriginNameLength = OriginName->Length;
+ Request->d.LogonUserRequest.OriginName = (PWSTR)&RawMessage + CurrentLength;
+ memcpy((PWSTR)&RawMessage + CurrentLength,
+ OriginName->Buffer,
+ OriginName->Length * sizeof(WCHAR));
+ CurrentLength = CurrentLength + (OriginName->Length * sizeof(WCHAR));
+
+ Request->d.LogonUserRequest.LogonType = LogonType;
+
+ Request->d.LogonUserRequest.AuthenticationPackage =
+ AuthenticationPackage;
+
+ Request->d.LogonUserRequest.AuthenticationInformation =
+ (PVOID)((ULONG_PTR)&RawMessage + CurrentLength);
+ Request->d.LogonUserRequest.AuthenticationInformationLength =
+ AuthenticationInformationLength;
+ memcpy((PVOID)((ULONG_PTR)&RawMessage + CurrentLength),
+ AuthenticationInformation,
+ AuthenticationInformationLength);
+ CurrentLength = CurrentLength + AuthenticationInformationLength;
+
+ Request->d.LogonUserRequest.LocalGroupsCount = LocalGroups->GroupCount;
+ Request->d.LogonUserRequest.LocalGroups =
+ (PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength;
+ memcpy((PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength,
+ LocalGroups->Groups,
+ LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
+
+ Request->d.LogonUserRequest.SourceContext = *SourceContext;
+
+ Request->Type = LSASS_REQUEST_LOGON_USER;
+ Request->Header.u1.s1.DataLength = RequestLength - sizeof(PORT_MESSAGE);
+ Request->Header.u1.s1.TotalLength = RequestLength + sizeof(PORT_MESSAGE);
+
+ Reply = (PLSASS_REPLY)&RawReply;
+
+ Status = NtRequestWaitReplyPort(LsaHandle,
+ &Request->Header,
+ &Reply->Header);
+ if (!NT_SUCCESS(Status))
+ {
+ return Status;
+ }
+
+ *SubStatus = Reply->d.LogonUserReply.SubStatus;
+
+ if (!NT_SUCCESS(Reply->Status))
+ {
+ return Status;
+ }
+
+ *ProfileBuffer = RtlAllocateHeap(Secur32Heap,
+ 0,
+ Reply->d.LogonUserReply.ProfileBufferLength);
+ memcpy(*ProfileBuffer,
+ (PVOID)((ULONG)Reply->d.LogonUserReply.Data +
+ (ULONG)Reply->d.LogonUserReply.ProfileBuffer),
+ Reply->d.LogonUserReply.ProfileBufferLength);
+ *LogonId = Reply->d.LogonUserReply.LogonId;
+ *Token = Reply->d.LogonUserReply.Token;
+ memcpy(Quotas,
+ &Reply->d.LogonUserReply.Quotas,
+ sizeof(Reply->d.LogonUserReply.Quotas));
+
+ return Status;
}
@@ -279,113 +282,109 @@
*/
NTSTATUS WINAPI
LsaRegisterLogonProcess(PLSA_STRING LsaLogonProcessName,
- PHANDLE Handle,
- PLSA_OPERATIONAL_MODE OperationalMode)
-{
- UNICODE_STRING Portname = RTL_CONSTANT_STRING(L"\\SeLsaCommandPort");
- ULONG ConnectInfoLength;
- NTSTATUS Status;
- LSASS_REQUEST Request;
- LSASS_REPLY Reply;
-
- ConnectInfoLength = 0;
- Status = NtConnectPort(Handle,
- &Portname,
- NULL,
- NULL,
- NULL,
- NULL,
- NULL,
- &ConnectInfoLength);
- if (!NT_SUCCESS(Status))
- {
- return(Status);
- }
-
- Request.Type = LSASS_REQUEST_REGISTER_LOGON_PROCESS;
- Request.Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) -
- sizeof(PORT_MESSAGE);
- Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
-
- Request.d.RegisterLogonProcessRequest.Length = LsaLogonProcessName->Length;
- memcpy(Request.d.RegisterLogonProcessRequest.LogonProcessNameBuffer,
- LsaLogonProcessName->Buffer,
- Request.d.RegisterLogonProcessRequest.Length);
-
- Status = NtRequestWaitReplyPort(*Handle,
- &Request.Header,
- &Reply.Header);
- if (!NT_SUCCESS(Status))
- {
- NtClose(*Handle);
- *Handle = NULL;
- return(Status);
- }
-
- if (!NT_SUCCESS(Reply.Status))
- {
- NtClose(*Handle);
- *Handle = NULL;
- return(Status);
- }
-
- *OperationalMode = Reply.d.RegisterLogonProcessReply.OperationalMode;
-
- return(Reply.Status);
-}
+ PHANDLE Handle,
+ PLSA_OPERATIONAL_MODE OperationalMode)
+{
+ UNICODE_STRING Portname = RTL_CONSTANT_STRING(L"\\SeLsaCommandPort");
+ ULONG ConnectInfoLength;
+ NTSTATUS Status;
+ LSASS_REQUEST Request;
+ LSASS_REPLY Reply;
+
+ ConnectInfoLength = 0;
+ Status = NtConnectPort(Handle,
+ &Portname,
+ NULL,
+ NULL,
+ NULL,
+ NULL,
+ NULL,
+ &ConnectInfoLength);
+ if (!NT_SUCCESS(Status))
+ {
+ return Status;
+ }
+
+ Request.Type = LSASS_REQUEST_REGISTER_LOGON_PROCESS;
+ Request.Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) -
+ sizeof(PORT_MESSAGE);
+ Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
+
+ Request.d.RegisterLogonProcessRequest.Length = LsaLogonProcessName->Length;
+ memcpy(Request.d.RegisterLogonProcessRequest.LogonProcessNameBuffer,
+ LsaLogonProcessName->Buffer,
+ Request.d.RegisterLogonProcessRequest.Length);
+
+ Status = NtRequestWaitReplyPort(*Handle,
+ &Request.Header,
+ &Reply.Header);
+ if (!NT_SUCCESS(Status))
+ {
+ NtClose(*Handle);
+ *Handle = NULL;
+ return Status;
+ }
+
+ if (!NT_SUCCESS(Reply.Status))
+ {
+ NtClose(*Handle);
+ *Handle = NULL;
+ return Status;
+ }
+
+ *OperationalMode = Reply.d.RegisterLogonProcessReply.OperationalMode;
+
+ return Reply.Status;
+}
+
/*
* @unimplemented
*/
NTSTATUS
WINAPI
-LsaEnumerateLogonSessions(
-PULONG LogonSessionCount,
-PLUID * LogonSessionList
-)
-{
- UNIMPLEMENTED;
- return FALSE;
-}
+LsaEnumerateLogonSessions(PULONG LogonSessionCount,
+ PLUID *LogonSessionList)
+{
+ UNIMPLEMENTED;
+ return FALSE;
+}
+
/*
* @unimplemented
*/
NTSTATUS
WINAPI
-LsaGetLogonSessionData(
-PLUID LogonId,
-PSECURITY_LOGON_SESSION_DATA * ppLogonSessionData
-)
-{
- UNIMPLEMENTED;
- return FALSE;
-}
+LsaGetLogonSessionData(PLUID LogonId,
+ PSECURITY_LOGON_SESSION_DATA *ppLogonSessionData)
+{
+ UNIMPLEMENTED;
+ return FALSE;
+}
+
/*
* @unimplemented
*/
NTSTATUS
WINAPI
-LsaRegisterPolicyChangeNotification(
-POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
-HANDLE NotificationEventHandle
-)
-{
- UNIMPLEMENTED;
- return FALSE;
-}
+LsaRegisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS
InformationClass,
+ HANDLE NotificationEventHandle)
+{
+ UNIMPLEMENTED;
+ return FALSE;
+}
+
/*
* @unimplemented
*/
NTSTATUS
WINAPI
-LsaUnregisterPolicyChangeNotification(
-POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
-HANDLE NotificationEventHandle
-)
-{
- UNIMPLEMENTED;
- return FALSE;
-}
+LsaUnregisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS
InformationClass,
+ HANDLE NotificationEventHandle)
+{
+ UNIMPLEMENTED;
+ return FALSE;
+}