Author: ekohl
Date: Fri Sep 21 17:19:54 2012
New Revision: 57358
URL:
http://svn.reactos.org/svn/reactos?rev=57358&view=rev
Log:
[ADVAPI32]
- Implement LsaClearAuditLog.
- Sort functions, update function headers and trace-messages.
Modified:
trunk/reactos/dll/win32/advapi32/advapi32.spec
trunk/reactos/dll/win32/advapi32/sec/lsa.c
trunk/reactos/include/psdk/ntsecapi.h
Modified: trunk/reactos/dll/win32/advapi32/advapi32.spec
URL:
http://svn.reactos.org/svn/reactos/trunk/reactos/dll/win32/advapi32/advapi3…
==============================================================================
--- trunk/reactos/dll/win32/advapi32/advapi32.spec [iso-8859-1] (original)
+++ trunk/reactos/dll/win32/advapi32/advapi32.spec [iso-8859-1] Fri Sep 21 17:19:54 2012
@@ -346,7 +346,7 @@
@ stub LookupSecurityDescriptorPartsW
@ stdcall LsaAddAccountRights(ptr ptr ptr long)
@ stdcall LsaAddPrivilegesToAccount(ptr ptr)
-@ stub LsaClearAuditLog
+@ stdcall LsaClearAuditLog(ptr)
@ stdcall LsaClose(ptr)
@ stdcall LsaCreateAccount(ptr ptr long ptr)
@ stdcall LsaCreateSecret(ptr ptr long ptr)
Modified: trunk/reactos/dll/win32/advapi32/sec/lsa.c
URL:
http://svn.reactos.org/svn/reactos/trunk/reactos/dll/win32/advapi32/sec/lsa…
==============================================================================
--- trunk/reactos/dll/win32/advapi32/sec/lsa.c [iso-8859-1] (original)
+++ trunk/reactos/dll/win32/advapi32/sec/lsa.c [iso-8859-1] Fri Sep 21 17:19:54 2012
@@ -10,11 +10,15 @@
* 20030202 KJK compressed stubs
*
*/
+
#include <advapi32.h>
+
WINE_DEFAULT_DEBUG_CHANNEL(advapi);
-static BOOL LsapIsLocalComputer(PLSA_UNICODE_STRING ServerName)
+static
+BOOL
+LsapIsLocalComputer(PLSA_UNICODE_STRING ServerName)
{
DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
BOOL Result;
@@ -34,7 +38,8 @@
}
-handle_t __RPC_USER
+handle_t
+__RPC_USER
PLSAPR_SERVER_NAME_bind(PLSAPR_SERVER_NAME pszSystemName)
{
handle_t hBinding = NULL;
@@ -73,7 +78,8 @@
}
-void __RPC_USER
+void
+__RPC_USER
PLSAPR_SERVER_NAME_unbind(PLSAPR_SERVER_NAME pszSystemName,
handle_t hBinding)
{
@@ -86,56 +92,6 @@
{
TRACE("RpcBindingFree returned 0x%x\n", status);
}
-}
-
-
-/*
- * @implemented
- */
-NTSTATUS
-WINAPI
-LsaClose(IN LSA_HANDLE ObjectHandle)
-{
- NTSTATUS Status;
-
- TRACE("LsaClose(0x%p) called\n", ObjectHandle);
-
- RpcTryExcept
- {
- Status = LsarClose((PLSAPR_HANDLE)&ObjectHandle);
- }
- RpcExcept(EXCEPTION_EXECUTE_HANDLER)
- {
- Status = I_RpcMapWin32Status(RpcExceptionCode());
- }
- RpcEndExcept;
-
- return Status;
-}
-
-
-/*
- * @implemented
- */
-NTSTATUS
-WINAPI
-LsaDelete(IN LSA_HANDLE ObjectHandle)
-{
- NTSTATUS Status;
-
- TRACE("LsaDelete(0x%p) called\n", ObjectHandle);
-
- RpcTryExcept
- {
- Status = LsarDelete((LSAPR_HANDLE)ObjectHandle);
- }
- RpcExcept(EXCEPTION_EXECUTE_HANDLER)
- {
- Status = I_RpcMapWin32Status(RpcExceptionCode());
- }
- RpcEndExcept;
-
- return Status;
}
@@ -207,6 +163,56 @@
* @implemented
*/
NTSTATUS
+NTAPI
+LsaClearAuditLog(IN LSA_HANDLE PolicyHandle)
+{
+ NTSTATUS Status;
+
+ TRACE("LsaClearAuditLog(%p)\n", PolicyHandle);
+
+ RpcTryExcept
+ {
+ Status = LsarClearAuditLog((LSAPR_HANDLE)PolicyHandle);
+ }
+ RpcExcept(EXCEPTION_EXECUTE_HANDLER)
+ {
+ Status = I_RpcMapWin32Status(RpcExceptionCode());
+ }
+ RpcEndExcept;
+
+ return Status;
+}
+
+
+/*
+ * @implemented
+ */
+NTSTATUS
+WINAPI
+LsaClose(IN LSA_HANDLE ObjectHandle)
+{
+ NTSTATUS Status;
+
+ TRACE("LsaClose(%p) called\n", ObjectHandle);
+
+ RpcTryExcept
+ {
+ Status = LsarClose((PLSAPR_HANDLE)&ObjectHandle);
+ }
+ RpcExcept(EXCEPTION_EXECUTE_HANDLER)
+ {
+ Status = I_RpcMapWin32Status(RpcExceptionCode());
+ }
+ RpcEndExcept;
+
+ return Status;
+}
+
+
+/*
+ * @implemented
+ */
+NTSTATUS
WINAPI
LsaCreateAccount(IN LSA_HANDLE PolicyHandle,
IN PSID AccountSid,
@@ -215,7 +221,7 @@
{
NTSTATUS Status;
- TRACE("LsaCreateAccount(%p %p 0x%08x %p)\n",
+ TRACE("LsaCreateAccount(%p %p 0x%08lx %p)\n",
PolicyHandle, AccountSid, DesiredAccess, AccountHandle);
RpcTryExcept
@@ -279,8 +285,8 @@
{
NTSTATUS Status;
- TRACE("(%p,%p,0x%08x,%p)\n", PolicyHandle, TrustedDomainInformation,
- DesiredAccess, TrustedDomainHandle);
+ TRACE("LsaCreateTrustedDomain(%p %p 0x%08lx %p)\n",
+ PolicyHandle, TrustedDomainInformation, DesiredAccess, TrustedDomainHandle);
RpcTryExcept
{
@@ -304,14 +310,14 @@
*/
NTSTATUS
WINAPI
-LsaCreateTrustedDomainEx(
- LSA_HANDLE PolicyHandle,
- PTRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation,
- PTRUSTED_DOMAIN_AUTH_INFORMATION AuthenticationInformation,
- ACCESS_MASK DesiredAccess,
- PLSA_HANDLE TrustedDomainHandle)
-{
- FIXME("(%p,%p,%p,0x%08x,%p) stub\n", PolicyHandle,
TrustedDomainInformation, AuthenticationInformation,
+LsaCreateTrustedDomainEx(IN LSA_HANDLE PolicyHandle,
+ IN PTRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation,
+ IN PTRUSTED_DOMAIN_AUTH_INFORMATION AuthenticationInformation,
+ IN ACCESS_MASK DesiredAccess,
+ OUT PLSA_HANDLE TrustedDomainHandle)
+{
+ FIXME("LsaCreateTrustedDomainEx(%p %p %p 0x%08lx %p) stub\n",
+ PolicyHandle, TrustedDomainInformation, AuthenticationInformation,
DesiredAccess, TrustedDomainHandle);
return STATUS_SUCCESS;
}
@@ -322,12 +328,38 @@
*/
NTSTATUS
WINAPI
+LsaDelete(IN LSA_HANDLE ObjectHandle)
+{
+ NTSTATUS Status;
+
+ TRACE("LsaDelete(%p)\n", ObjectHandle);
+
+ RpcTryExcept
+ {
+ Status = LsarDelete((LSAPR_HANDLE)ObjectHandle);
+ }
+ RpcExcept(EXCEPTION_EXECUTE_HANDLER)
+ {
+ Status = I_RpcMapWin32Status(RpcExceptionCode());
+ }
+ RpcEndExcept;
+
+ return Status;
+}
+
+
+/*
+ * @implemented
+ */
+NTSTATUS
+WINAPI
LsaDeleteTrustedDomain(IN LSA_HANDLE PolicyHandle,
IN PSID TrustedDomainSid)
{
NTSTATUS Status;
- TRACE("(%p,%p)\n", PolicyHandle, TrustedDomainSid);
+ TRACE("LsaDeleteTrustedDomain(%p %p)\n",
+ PolicyHandle, TrustedDomainSid);
RpcTryExcept
{
@@ -357,7 +389,8 @@
LSAPR_USER_RIGHT_SET UserRightsSet;
NTSTATUS Status;
- TRACE("(%p,%p,%p,%p) stub\n", PolicyHandle, AccountSid, UserRights,
CountOfRights);
+ TRACE("LsaEnumerateAccountRights(%p %p %p %p)\n",
+ PolicyHandle, AccountSid, UserRights, CountOfRights);
UserRightsSet.Entries = 0;
UserRightsSet.UserRights = NULL;
@@ -391,13 +424,13 @@
*/
NTSTATUS
WINAPI
-LsaEnumerateAccountsWithUserRight(
- LSA_HANDLE PolicyHandle,
- OPTIONAL PLSA_UNICODE_STRING UserRights,
- PVOID *EnumerationBuffer,
- PULONG CountReturned)
-{
- FIXME("(%p,%p,%p,%p) stub\n", PolicyHandle, UserRights, EnumerationBuffer,
CountReturned);
+LsaEnumerateAccountsWithUserRight(IN LSA_HANDLE PolicyHandle,
+ IN PLSA_UNICODE_STRING UserRight OPTIONAL,
+ OUT PVOID *Buffer,
+ OUT PULONG CountReturned)
+{
+ FIXME("LsaEnumerateAccountsWithUserRight(%p %p %p %p) stub\n",
+ PolicyHandle, UserRight, Buffer, CountReturned);
return STATUS_NO_MORE_ENTRIES;
}
@@ -412,7 +445,8 @@
{
NTSTATUS Status;
- TRACE("(%p,%p) stub\n", AccountHandle, Privileges);
+ TRACE("LsaEnumeratePrivilegesOfAccount(%p %p)\n",
+ AccountHandle, Privileges);
RpcTryExcept
{
@@ -434,15 +468,15 @@
*/
NTSTATUS
WINAPI
-LsaEnumerateTrustedDomains(
- LSA_HANDLE PolicyHandle,
- PLSA_ENUMERATION_HANDLE EnumerationContext,
- PVOID *Buffer,
- ULONG PreferedMaximumLength,
- PULONG CountReturned)
-{
- FIXME("(%p,%p,%p,0x%08x,%p) stub\n", PolicyHandle, EnumerationContext,
- Buffer, PreferedMaximumLength, CountReturned);
+LsaEnumerateTrustedDomains(IN LSA_HANDLE PolicyHandle,
+ IN OUT PLSA_ENUMERATION_HANDLE EnumerationContext,
+ OUT PVOID *Buffer,
+ IN ULONG PreferedMaximumLength,
+ OUT PULONG CountReturned)
+{
+ FIXME("LsaEnumerateTrustedDomains(%p %p %p %lu %p) stub\n",
+ PolicyHandle, EnumerationContext, Buffer,
+ PreferedMaximumLength, CountReturned);
if (CountReturned) *CountReturned = 0;
return STATUS_SUCCESS;
@@ -453,15 +487,16 @@
*/
NTSTATUS
WINAPI
-LsaEnumerateTrustedDomainsEx(
- LSA_HANDLE PolicyHandle,
- PLSA_ENUMERATION_HANDLE EnumerationContext,
- PVOID *Buffer,
- ULONG PreferedMaximumLength,
- PULONG CountReturned)
-{
- FIXME("(%p,%p,%p,0x%08x,%p) stub\n", PolicyHandle, EnumerationContext,
Buffer,
- PreferedMaximumLength, CountReturned);
+LsaEnumerateTrustedDomainsEx(IN LSA_HANDLE PolicyHandle,
+ IN OUT PLSA_ENUMERATION_HANDLE EnumerationContext,
+ OUT PVOID *Buffer,
+ IN ULONG PreferedMaximumLength,
+ OUT PULONG CountReturned)
+{
+ FIXME("LsaEnumerateTrustedDomainsEx(%p %p %p %lu %p) stub\n",
+ PolicyHandle, EnumerationContext, Buffer,
+ PreferedMaximumLength, CountReturned);
+
if (CountReturned) *CountReturned = 0;
return STATUS_SUCCESS;
}
@@ -474,7 +509,7 @@
WINAPI
LsaFreeMemory(IN PVOID Buffer)
{
- TRACE("(%p)\n", Buffer);
+ TRACE("LsaFreeMemory(%p)\n", Buffer);
return RtlFreeHeap(RtlGetProcessHeap(), 0, Buffer);
}
@@ -489,7 +524,8 @@
{
NTSTATUS Status;
- TRACE("(%p,%p)\n", AccountHandle, SystemAccess);
+ TRACE("LsaGetSystemAccessAccount(%p %p)\n",
+ AccountHandle, SystemAccess);
RpcTryExcept
{
@@ -503,6 +539,20 @@
RpcEndExcept;
return Status;
+}
+
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaGetUserName(PUNICODE_STRING *UserName,
+ PUNICODE_STRING *DomainName)
+{
+ FIXME("LsaGetUserName(%p %p) stub\n",
+ UserName, DomainName);
+ return STATUS_NOT_IMPLEMENTED;
}
@@ -521,8 +571,8 @@
ULONG MappedCount = 0;
NTSTATUS Status;
- TRACE("(%p,0x%08x,%p,%p,%p)\n", PolicyHandle, Count, Names,
- ReferencedDomains, Sids);
+ TRACE("LsaLookupNames(%p %lu %p %p %p)\n",
+ PolicyHandle, Count, Names, ReferencedDomains, Sids);
if (ReferencedDomains == NULL || Sids == NULL)
return STATUS_INVALID_PARAMETER;
@@ -573,8 +623,8 @@
ULONG MappedCount = 0;
NTSTATUS Status;
- TRACE("(%p,0x%08x,0x%08x,%p,%p,%p) stub\n", PolicyHandle, Flags,
- Count, Names, ReferencedDomains, Sids);
+ TRACE("LsaLookupNames2(%p 0x%08x %lu %p %p %p)\n",
+ PolicyHandle, Flags, Count, Names, ReferencedDomains, Sids);
if (ReferencedDomains == NULL || Sids == NULL)
return STATUS_INVALID_PARAMETER;
@@ -623,7 +673,8 @@
PRPC_UNICODE_STRING NameBuffer = NULL;
NTSTATUS Status;
- TRACE("(%p,%p,%p)\n", PolicyHandle, Value, Name);
+ TRACE("LsaLookupPrivilegeName(%p %p %p)\n",
+ PolicyHandle, Value, Name);
RpcTryExcept
{
@@ -658,7 +709,8 @@
LUID Luid;
NTSTATUS Status;
- TRACE("(%p,%p,%p)\n", PolicyHandle, Name, Value);
+ TRACE("LsaLookupPrivilegeValue(%p %p %p)\n",
+ PolicyHandle, Name, Value);
RpcTryExcept
{
@@ -694,8 +746,8 @@
ULONG MappedCount = 0;
NTSTATUS Status;
- TRACE("(%p,%u,%p,%p,%p)\n", PolicyHandle, Count, Sids,
- ReferencedDomains, Names);
+ TRACE("LsaLookupSids(%p %lu %p %p %p)\n",
+ PolicyHandle, Count, Sids, ReferencedDomains, Names);
if (Count == 0)
return STATUS_INVALID_PARAMETER;
@@ -747,7 +799,7 @@
WINAPI
LsaNtStatusToWinError(IN NTSTATUS Status)
{
- TRACE("(%lx)\n", Status);
+ TRACE("LsaNtStatusToWinError(0x%lx)\n", Status);
return RtlNtStatusToDosError(Status);
}
@@ -764,7 +816,8 @@
{
NTSTATUS Status;
- TRACE("(%p,%p,0x%08lx,%p)\n", PolicyHandle, AccountSid, DesiredAccess,
AccountHandle);
+ TRACE("LsaOpenAccount(%p %p 0x%08lx %p)\n",
+ PolicyHandle, AccountSid, DesiredAccess, AccountHandle);
RpcTryExcept
{
@@ -796,14 +849,14 @@
*/
NTSTATUS
WINAPI
-LsaOpenPolicy(IN PLSA_UNICODE_STRING SystemName,
+LsaOpenPolicy(IN PLSA_UNICODE_STRING SystemName OPTIONAL,
IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes,
IN ACCESS_MASK DesiredAccess,
OUT PLSA_HANDLE PolicyHandle)
{
NTSTATUS Status;
- TRACE("LsaOpenPolicy (%s,%p,0x%08x,%p)\n",
+ TRACE("LsaOpenPolicy(%s %p 0x%08lx %p)\n",
SystemName ? debugstr_w(SystemName->Buffer) : "(null)",
ObjectAttributes, DesiredAccess, PolicyHandle);
@@ -841,7 +894,7 @@
{
NTSTATUS Status;
- TRACE("LsaOpenSecret(%p %p 0x%08x %p)\n",
+ TRACE("LsaOpenSecret(%p %p 0x%08lx %p)\n",
PolicyHandle, SecretName, DesiredAccess, SecretHandle);
RpcTryExcept
@@ -877,8 +930,8 @@
{
NTSTATUS Status;
- TRACE("(%p,%p,0x%08x,%p)\n", PolicyHandle, TrustedDomainName,
- DesiredAccess, TrustedDomainHandle);
+ TRACE("LsaOpenTrustedDomainByName(%p %p 0x%08lx %p)\n",
+ PolicyHandle, TrustedDomainName, DesiredAccess, TrustedDomainHandle);
RpcTryExcept
{
@@ -902,12 +955,12 @@
*/
NTSTATUS
WINAPI
-LsaQueryDomainInformationPolicy(
- LSA_HANDLE PolicyHandle,
- POLICY_DOMAIN_INFORMATION_CLASS InformationClass,
- PVOID *Buffer)
-{
- FIXME("(%p,0x%08x,%p)\n", PolicyHandle, InformationClass, Buffer);
+LsaQueryDomainInformationPolicy(IN LSA_HANDLE PolicyHandle,
+ IN POLICY_DOMAIN_INFORMATION_CLASS InformationClass,
+ OUT PVOID *Buffer)
+{
+ FIXME("LsaQueryDomainInformationPolicy(%p %lu %p) stub\n",
+ PolicyHandle, InformationClass, Buffer);
return STATUS_NOT_IMPLEMENTED;
}
@@ -917,12 +970,27 @@
*/
NTSTATUS
WINAPI
-LsaQueryForestTrustInformation(
- LSA_HANDLE PolicyHandle,
- PLSA_UNICODE_STRING TrustedDomainName,
- PLSA_FOREST_TRUST_INFORMATION * ForestTrustInfo)
-{
- FIXME("(%p,%p,%p) stub\n", PolicyHandle, TrustedDomainName,
ForestTrustInfo);
+LsaQueryForestTrustInformation(IN LSA_HANDLE PolicyHandle,
+ IN PLSA_UNICODE_STRING TrustedDomainName,
+ OUT PLSA_FOREST_TRUST_INFORMATION *ForestTrustInfo)
+{
+ FIXME("LsaQueryForestTrustInformation(%p %p %p) stub\n",
+ PolicyHandle, TrustedDomainName, ForestTrustInfo);
+ return STATUS_NOT_IMPLEMENTED;
+}
+
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaQueryInfoTrustedDomain(IN LSA_HANDLE TrustedDomainHandle,
+ IN TRUSTED_INFORMATION_CLASS InformationClass,
+ OUT PVOID *Buffer)
+{
+ FIXME("LsaQueryInfoTrustedDomain(%p %d %p) stub\n",
+ TrustedDomainHandle, InformationClass, Buffer);
return STATUS_NOT_IMPLEMENTED;
}
@@ -939,7 +1007,8 @@
PLSAPR_POLICY_INFORMATION PolicyInformation = NULL;
NTSTATUS Status;
- TRACE("(%p,0x%08x,%p)\n", PolicyHandle, InformationClass, Buffer);
+ TRACE("LsaQueryInformationPolicy(%p %d %p)\n",
+ PolicyHandle, InformationClass, Buffer);
RpcTryExcept
{
@@ -980,6 +1049,10 @@
PLSA_UNICODE_STRING DecryptedOldValue = NULL;
SIZE_T BufferSize;
NTSTATUS Status;
+
+ TRACE("LsaQuerySecret(%p %p %p %p %p)\n",
+ SecretHandle, CurrentValue, CurrentValueSetTime,
+ OldValue, OldValueSetTime);
RpcTryExcept
{
@@ -1087,13 +1160,13 @@
*/
NTSTATUS
WINAPI
-LsaQueryTrustedDomainInfo(
- LSA_HANDLE PolicyHandle,
- PSID TrustedDomainSid,
- TRUSTED_INFORMATION_CLASS InformationClass,
- PVOID *Buffer)
-{
- FIXME("(%p,%p,%d,%p) stub\n", PolicyHandle, TrustedDomainSid,
InformationClass, Buffer);
+LsaQueryTrustedDomainInfo(IN LSA_HANDLE PolicyHandle,
+ IN PSID TrustedDomainSid,
+ IN TRUSTED_INFORMATION_CLASS InformationClass,
+ OUT PVOID *Buffer)
+{
+ FIXME("LsaQueryTrustedDomainInfo(%p %p %d %p) stub\n",
+ PolicyHandle, TrustedDomainSid, InformationClass, Buffer);
return STATUS_OBJECT_NAME_NOT_FOUND;
}
@@ -1110,7 +1183,8 @@
{
NTSTATUS Status;
- TRACE("(%p,%p,%d,%p)\n", PolicyHandle, TrustedDomainName, InformationClass,
Buffer);
+ TRACE("LsaQueryTrustedDomainInfoByName(%p %p %d %p)\n",
+ PolicyHandle, TrustedDomainName, InformationClass, Buffer);
if (InformationClass == TrustedDomainAuthInformationInternal ||
InformationClass == TrustedDomainFullInformationInternal)
@@ -1130,6 +1204,20 @@
RpcEndExcept;
return Status;
+}
+
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaRegisterPolicyChangeNotification(IN POLICY_NOTIFICATION_INFORMATION_CLASS
InformationClass,
+ IN HANDLE NotificationEventHandle)
+{
+ FIXME("LsaRegisterPolicyChangeNotification(%d %p) stub\n",
+ InformationClass, NotificationEventHandle);
+ return STATUS_UNSUCCESSFUL;
}
@@ -1146,7 +1234,7 @@
{
LSAPR_USER_RIGHT_SET UserRightSet;
- TRACE("LsaRemoveAccountRights(%p %p %d %p 0x%08x) stub\n",
+ TRACE("LsaRemoveAccountRights(%p %p %d %p %lu)\n",
PolicyHandle, AccountSid, AllRights, UserRights, CountOfRights);
UserRightSet.Entries = CountOfRights;
@@ -1174,27 +1262,45 @@
*/
NTSTATUS
WINAPI
-LsaRetrievePrivateData(
- LSA_HANDLE PolicyHandle,
- PLSA_UNICODE_STRING KeyName,
- PLSA_UNICODE_STRING *PrivateData)
-{
- FIXME("(%p,%p,%p) stub\n", PolicyHandle, KeyName, PrivateData);
+LsaRetrievePrivateData(IN LSA_HANDLE PolicyHandle,
+ IN PLSA_UNICODE_STRING KeyName,
+ OUT PLSA_UNICODE_STRING *PrivateData)
+{
+ FIXME("LsaRetrievePrivateData(%p %p %p) stub\n",
+ PolicyHandle, KeyName, PrivateData);
return STATUS_OBJECT_NAME_NOT_FOUND;
}
-/*
- * @unimplemented
- */
-NTSTATUS
-WINAPI
-LsaSetDomainInformationPolicy(
- LSA_HANDLE PolicyHandle,
- POLICY_DOMAIN_INFORMATION_CLASS InformationClass,
- PVOID Buffer)
-{
- FIXME("(%p,0x%08x,%p) stub\n", PolicyHandle, InformationClass, Buffer);
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaSetDomainInformationPolicy(IN LSA_HANDLE PolicyHandle,
+ IN POLICY_DOMAIN_INFORMATION_CLASS InformationClass,
+ IN PVOID Buffer OPTIONAL)
+{
+ FIXME("LsaSetDomainInformationPolicy(%p %d %p) stub\n",
+ PolicyHandle, InformationClass, Buffer);
return STATUS_UNSUCCESSFUL;
+}
+
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaSetForestTrustInformation(IN LSA_HANDLE PolicyHandle,
+ IN PLSA_UNICODE_STRING TrustedDomainName,
+ IN PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo,
+ IN BOOL CheckOnly,
+ OUT PLSA_FOREST_TRUST_COLLISION_INFORMATION *CollisionInfo)
+{
+ FIXME("LsaSetForestTrustInformation(%p %p %p %d %p) stub\n",
+ PolicyHandle, TrustedDomainName, ForestTrustInfo, CheckOnly, CollisionInfo);
+ return STATUS_NOT_IMPLEMENTED;
}
@@ -1209,7 +1315,7 @@
{
NTSTATUS Status;
- TRACE("LsaSetInformationPolicy(%p 0x%08x %p)\n",
+ TRACE("LsaSetInformationPolicy(%p %d %p)\n",
PolicyHandle, InformationClass, Buffer);
RpcTryExcept
@@ -1242,7 +1348,7 @@
SIZE_T BufferSize;
NTSTATUS Status;
- TRACE("LsaSetSecret(%p,%p,%p)\n",
+ TRACE("LsaSetSecret(%p %p %p)\n",
SecretHandle, EncryptedCurrentValue, EncryptedOldValue);
if (CurrentValue != NULL)
@@ -1335,108 +1441,59 @@
*/
NTSTATUS
WINAPI
-LsaSetForestTrustInformation(
- LSA_HANDLE PolicyHandle,
- PLSA_UNICODE_STRING TrustedDomainName,
- PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo,
- BOOL CheckOnly,
- PLSA_FOREST_TRUST_COLLISION_INFORMATION *CollisionInfo)
-{
- FIXME("(%p,%p,%p,%d,%p) stub\n", PolicyHandle, TrustedDomainName,
ForestTrustInfo, CheckOnly, CollisionInfo);
- return STATUS_NOT_IMPLEMENTED;
-}
-
-/*
- * @unimplemented
- */
-NTSTATUS
-WINAPI
-LsaSetTrustedDomainInfoByName(
- LSA_HANDLE PolicyHandle,
- PLSA_UNICODE_STRING TrustedDomainName,
- TRUSTED_INFORMATION_CLASS InformationClass,
- PVOID Buffer)
-{
- FIXME("(%p,%p,%d,%p) stub\n", PolicyHandle, TrustedDomainName,
InformationClass, Buffer);
+LsaSetTrustedDomainInfoByName(IN LSA_HANDLE PolicyHandle,
+ IN PLSA_UNICODE_STRING TrustedDomainName,
+ IN TRUSTED_INFORMATION_CLASS InformationClass,
+ IN PVOID Buffer)
+{
+ FIXME("LsaSetTrustedDomainInfoByName(%p %p %d %p) stub\n",
+ PolicyHandle, TrustedDomainName, InformationClass, Buffer);
return STATUS_SUCCESS;
}
-/*
- * @unimplemented
- */
-NTSTATUS WINAPI LsaRegisterPolicyChangeNotification(
- POLICY_NOTIFICATION_INFORMATION_CLASS class,
- HANDLE event)
-{
- FIXME("(%d,%p) stub\n", class, event);
- return STATUS_UNSUCCESSFUL;
-}
-
-/*
- * @unimplemented
- */
-NTSTATUS
-WINAPI
-LsaSetTrustedDomainInformation(
- LSA_HANDLE PolicyHandle,
- PSID TrustedDomainSid,
- TRUSTED_INFORMATION_CLASS InformationClass,
- PVOID Buffer)
-{
- FIXME("(%p,%p,%d,%p) stub\n", PolicyHandle, TrustedDomainSid,
InformationClass, Buffer);
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaSetTrustedDomainInformation(IN LSA_HANDLE PolicyHandle,
+ IN PSID TrustedDomainSid,
+ IN TRUSTED_INFORMATION_CLASS InformationClass,
+ IN PVOID Buffer)
+{
+ FIXME("LsaSetTrustedDomainInformation(%p %p %d %p) stub\n",
+ PolicyHandle, TrustedDomainSid, InformationClass, Buffer);
return STATUS_SUCCESS;
}
-/*
- * @unimplemented
- */
-NTSTATUS
-WINAPI
-LsaStorePrivateData(
- LSA_HANDLE PolicyHandle,
- PLSA_UNICODE_STRING KeyName,
- PLSA_UNICODE_STRING PrivateData)
-{
- FIXME("(%p,%p,%p) stub\n", PolicyHandle, KeyName, PrivateData);
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaStorePrivateData(IN LSA_HANDLE PolicyHandle,
+ IN PLSA_UNICODE_STRING KeyName,
+ IN PLSA_UNICODE_STRING PrivateData OPTIONAL)
+{
+ FIXME("LsaStorePrivateData(%p %p %p) stub\n",
+ PolicyHandle, KeyName, PrivateData);
return STATUS_OBJECT_NAME_NOT_FOUND;
}
-/*
- * @unimplemented
- */
-NTSTATUS WINAPI LsaUnregisterPolicyChangeNotification(
- POLICY_NOTIFICATION_INFORMATION_CLASS class,
- HANDLE event)
-{
- FIXME("(%d,%p) stub\n", class, event);
+
+/*
+ * @unimplemented
+ */
+NTSTATUS
+WINAPI
+LsaUnregisterPolicyChangeNotification(IN POLICY_NOTIFICATION_INFORMATION_CLASS
InformationClass,
+ IN HANDLE NotificationEventHandle)
+{
+ FIXME("(%d %p) stub\n",
+ InformationClass, NotificationEventHandle);
return STATUS_SUCCESS;
}
-/*
- * @unimplemented
- */
-NTSTATUS
-WINAPI
-LsaGetUserName(
- PUNICODE_STRING *UserName,
- PUNICODE_STRING *DomainName)
-{
- FIXME("(%p,%p) stub\n", UserName, DomainName);
- return STATUS_NOT_IMPLEMENTED;
-}
-
-/*
- * @unimplemented
- */
-NTSTATUS
-WINAPI
-LsaQueryInfoTrustedDomain (DWORD Unknonw0,
- DWORD Unknonw1,
- DWORD Unknonw2)
-{
- FIXME("(%d,%d,%d) stub\n", Unknonw0, Unknonw1, Unknonw2);
- return STATUS_NOT_IMPLEMENTED;
-}
-
-
/* EOF */
Modified: trunk/reactos/include/psdk/ntsecapi.h
URL:
http://svn.reactos.org/svn/reactos/trunk/reactos/include/psdk/ntsecapi.h?re…
==============================================================================
--- trunk/reactos/include/psdk/ntsecapi.h [iso-8859-1] (original)
+++ trunk/reactos/include/psdk/ntsecapi.h [iso-8859-1] Fri Sep 21 17:19:54 2012
@@ -676,6 +676,7 @@
NTSTATUS NTAPI LsaAddPrivilegesToAccount(LSA_HANDLE, PPRIVILEGE_SET);
NTSTATUS NTAPI LsaCallAuthenticationPackage(HANDLE,ULONG,PVOID,ULONG,PVOID*,
PULONG,PNTSTATUS);
+NTSTATUS NTAPI LsaClearAuditLog(LSA_HANDLE);
NTSTATUS NTAPI LsaClose(LSA_HANDLE);
NTSTATUS NTAPI LsaConnectUntrusted(PHANDLE);
NTSTATUS NTAPI LsaCreateAccount(LSA_HANDLE, PSID, ACCESS_MASK, PLSA_HANDLE);