push 9758e6fe7ae8fbab538c98c718d6619029bb3457
[wine/hacks.git] / dlls / advapi32 / security.c
blob95b7a7b2bd61224e4a7480ceefb0e807641f8e8a
1 /*
2 * Copyright 1999, 2000 Juergen Schmied <juergen.schmied@debitel.net>
3 * Copyright 2003 CodeWeavers Inc. (Ulrich Czekalla)
4 * Copyright 2006 Robert Reif
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
22 #include <stdarg.h>
23 #include <string.h>
25 #include "ntstatus.h"
26 #define WIN32_NO_STATUS
27 #include "windef.h"
28 #include "winbase.h"
29 #include "winerror.h"
30 #include "winreg.h"
31 #include "winternl.h"
32 #include "winioctl.h"
33 #include "ntsecapi.h"
34 #include "accctrl.h"
35 #include "sddl.h"
36 #include "winsvc.h"
37 #include "aclapi.h"
38 #include "objbase.h"
39 #include "iads.h"
40 #include "advapi32_misc.h"
42 #include "wine/debug.h"
43 #include "wine/unicode.h"
45 WINE_DEFAULT_DEBUG_CHANNEL(advapi);
47 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes);
48 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags,
49 PACL pAcl, LPDWORD cBytes);
50 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl);
51 static BYTE ParseAceStringType(LPCWSTR* StringAcl);
52 static DWORD ParseAceStringRights(LPCWSTR* StringAcl);
53 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
54 LPCWSTR StringSecurityDescriptor,
55 SECURITY_DESCRIPTOR* SecurityDescriptor,
56 LPDWORD cBytes);
57 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl);
59 typedef struct _ACEFLAG
61 LPCWSTR wstr;
62 DWORD value;
63 } ACEFLAG, *LPACEFLAG;
65 typedef struct _MAX_SID
67 /* same fields as struct _SID */
68 BYTE Revision;
69 BYTE SubAuthorityCount;
70 SID_IDENTIFIER_AUTHORITY IdentifierAuthority;
71 DWORD SubAuthority[SID_MAX_SUB_AUTHORITIES];
72 } MAX_SID;
74 typedef struct WELLKNOWNSID
76 WCHAR wstr[2];
77 WELL_KNOWN_SID_TYPE Type;
78 MAX_SID Sid;
79 } WELLKNOWNSID;
81 static const WELLKNOWNSID WellKnownSids[] =
83 { {0,0}, WinNullSid, { SID_REVISION, 1, { SECURITY_NULL_SID_AUTHORITY }, { SECURITY_NULL_RID } } },
84 { {'W','D'}, WinWorldSid, { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY }, { SECURITY_WORLD_RID } } },
85 { {0,0}, WinLocalSid, { SID_REVISION, 1, { SECURITY_LOCAL_SID_AUTHORITY }, { SECURITY_LOCAL_RID } } },
86 { {'C','O'}, WinCreatorOwnerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_RID } } },
87 { {'C','G'}, WinCreatorGroupSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_RID } } },
88 { {0,0}, WinCreatorOwnerServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_SERVER_RID } } },
89 { {0,0}, WinCreatorGroupServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_SERVER_RID } } },
90 { {0,0}, WinNtAuthoritySid, { SID_REVISION, 0, { SECURITY_NT_AUTHORITY }, { SECURITY_NULL_RID } } },
91 { {0,0}, WinDialupSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_DIALUP_RID } } },
92 { {'N','U'}, WinNetworkSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_RID } } },
93 { {0,0}, WinBatchSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BATCH_RID } } },
94 { {'I','U'}, WinInteractiveSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_INTERACTIVE_RID } } },
95 { {'S','U'}, WinServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_SERVICE_RID } } },
96 { {'A','N'}, WinAnonymousSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ANONYMOUS_LOGON_RID } } },
97 { {0,0}, WinProxySid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PROXY_RID } } },
98 { {'E','D'}, WinEnterpriseControllersSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ENTERPRISE_CONTROLLERS_RID } } },
99 { {'P','S'}, WinSelfSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PRINCIPAL_SELF_RID } } },
100 { {'A','U'}, WinAuthenticatedUserSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_AUTHENTICATED_USER_RID } } },
101 { {'R','C'}, WinRestrictedCodeSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_RESTRICTED_CODE_RID } } },
102 { {0,0}, WinTerminalServerSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_TERMINAL_SERVER_RID } } },
103 { {0,0}, WinRemoteLogonIdSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_REMOTE_LOGON_RID } } },
104 { {'S','Y'}, WinLocalSystemSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SYSTEM_RID } } },
105 { {'L','S'}, WinLocalServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SERVICE_RID } } },
106 { {'N','S'}, WinNetworkServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_SERVICE_RID } } },
107 { {0,0}, WinBuiltinDomainSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID } } },
108 { {'B','A'}, WinBuiltinAdministratorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS } } },
109 { {'B','U'}, WinBuiltinUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS } } },
110 { {'B','G'}, WinBuiltinGuestsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_GUESTS } } },
111 { {'P','U'}, WinBuiltinPowerUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_POWER_USERS } } },
112 { {'A','O'}, WinBuiltinAccountOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ACCOUNT_OPS } } },
113 { {'S','O'}, WinBuiltinSystemOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_SYSTEM_OPS } } },
114 { {'P','O'}, WinBuiltinPrintOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PRINT_OPS } } },
115 { {'B','O'}, WinBuiltinBackupOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_BACKUP_OPS } } },
116 { {'R','E'}, WinBuiltinReplicatorSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REPLICATOR } } },
117 { {'R','U'}, WinBuiltinPreWindows2000CompatibleAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PREW2KCOMPACCESS } } },
118 { {'R','D'}, WinBuiltinRemoteDesktopUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS } } },
119 { {'N','O'}, WinBuiltinNetworkConfigurationOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS } } },
120 { {0,0}, WinNTLMAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_NTLM_RID } } },
121 { {0,0}, WinDigestAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_DIGEST_RID } } },
122 { {0,0}, WinSChannelAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_SCHANNEL_RID } } },
123 { {0,0}, WinThisOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_THIS_ORGANIZATION_RID } } },
124 { {0,0}, WinOtherOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_OTHER_ORGANIZATION_RID } } },
125 { {0,0}, WinBuiltinIncomingForestTrustBuildersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS } } },
126 { {0,0}, WinBuiltinPerfMonitoringUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_MONITORING_USERS } } },
127 { {0,0}, WinBuiltinPerfLoggingUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_LOGGING_USERS } } },
128 { {0,0}, WinBuiltinAuthorizationAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS } } },
129 { {0,0}, WinBuiltinTerminalServerLicenseServersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS } } },
130 { {0,0}, WinBuiltinDCOMUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_DCOM_USERS } } },
133 /* these SIDs must be constructed as relative to some domain - only the RID is well-known */
134 typedef struct WELLKNOWNRID
136 WELL_KNOWN_SID_TYPE Type;
137 DWORD Rid;
138 } WELLKNOWNRID;
140 static const WELLKNOWNRID WellKnownRids[] = {
141 { WinAccountAdministratorSid, DOMAIN_USER_RID_ADMIN },
142 { WinAccountGuestSid, DOMAIN_USER_RID_GUEST },
143 { WinAccountKrbtgtSid, DOMAIN_USER_RID_KRBTGT },
144 { WinAccountDomainAdminsSid, DOMAIN_GROUP_RID_ADMINS },
145 { WinAccountDomainUsersSid, DOMAIN_GROUP_RID_USERS },
146 { WinAccountDomainGuestsSid, DOMAIN_GROUP_RID_GUESTS },
147 { WinAccountComputersSid, DOMAIN_GROUP_RID_COMPUTERS },
148 { WinAccountControllersSid, DOMAIN_GROUP_RID_CONTROLLERS },
149 { WinAccountCertAdminsSid, DOMAIN_GROUP_RID_CERT_ADMINS },
150 { WinAccountSchemaAdminsSid, DOMAIN_GROUP_RID_SCHEMA_ADMINS },
151 { WinAccountEnterpriseAdminsSid, DOMAIN_GROUP_RID_ENTERPRISE_ADMINS },
152 { WinAccountPolicyAdminsSid, DOMAIN_GROUP_RID_POLICY_ADMINS },
153 { WinAccountRasAndIasServersSid, DOMAIN_ALIAS_RID_RAS_SERVERS },
157 static SID const sidWorld = { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY} , { SECURITY_WORLD_RID } };
159 typedef struct _AccountSid {
160 WELL_KNOWN_SID_TYPE type;
161 LPCWSTR account;
162 LPCWSTR domain;
163 SID_NAME_USE name_use;
164 } AccountSid;
166 static const WCHAR Account_Operators[] = { 'A','c','c','o','u','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
167 static const WCHAR Administrator[] = {'A','d','m','i','n','i','s','t','r','a','t','o','r',0 };
168 static const WCHAR Administrators[] = { 'A','d','m','i','n','i','s','t','r','a','t','o','r','s',0 };
169 static const WCHAR ANONYMOUS_LOGON[] = { 'A','N','O','N','Y','M','O','U','S',' ','L','O','G','O','N',0 };
170 static const WCHAR Authenticated_Users[] = { 'A','u','t','h','e','n','t','i','c','a','t','e','d',' ','U','s','e','r','s',0 };
171 static const WCHAR Backup_Operators[] = { 'B','a','c','k','u','p',' ','O','p','e','r','a','t','o','r','s',0 };
172 static const WCHAR BATCH[] = { 'B','A','T','C','H',0 };
173 static const WCHAR Blank[] = { 0 };
174 static const WCHAR BUILTIN[] = { 'B','U','I','L','T','I','N',0 };
175 static const WCHAR Cert_Publishers[] = { 'C','e','r','t',' ','P','u','b','l','i','s','h','e','r','s',0 };
176 static const WCHAR CREATOR_GROUP[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',0 };
177 static const WCHAR CREATOR_GROUP_SERVER[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',' ','S','E','R','V','E','R',0 };
178 static const WCHAR CREATOR_OWNER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',0 };
179 static const WCHAR CREATOR_OWNER_SERVER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',' ','S','E','R','V','E','R',0 };
180 static const WCHAR DIALUP[] = { 'D','I','A','L','U','P',0 };
181 static const WCHAR Digest_Authentication[] = { 'D','i','g','e','s','t',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
182 static const WCHAR DOMAIN[] = {'D','O','M','A','I','N',0};
183 static const WCHAR Domain_Admins[] = { 'D','o','m','a','i','n',' ','A','d','m','i','n','s',0 };
184 static const WCHAR Domain_Computers[] = { 'D','o','m','a','i','n',' ','C','o','m','p','u','t','e','r','s',0 };
185 static const WCHAR Domain_Controllers[] = { 'D','o','m','a','i','n',' ','C','o','n','t','r','o','l','l','e','r','s',0 };
186 static const WCHAR Domain_Guests[] = { 'D','o','m','a','i','n',' ','G','u','e','s','t','s',0 };
187 static const WCHAR Domain_Users[] = { 'D','o','m','a','i','n',' ','U','s','e','r','s',0 };
188 static const WCHAR Enterprise_Admins[] = { 'E','n','t','e','r','p','r','i','s','e',' ','A','d','m','i','n','s',0 };
189 static const WCHAR ENTERPRISE_DOMAIN_CONTROLLERS[] = { 'E','N','T','E','R','P','R','I','S','E',' ','D','O','M','A','I','N',' ','C','O','N','T','R','O','L','L','E','R','S',0 };
190 static const WCHAR Everyone[] = { 'E','v','e','r','y','o','n','e',0 };
191 static const WCHAR Group_Policy_Creator_Owners[] = { 'G','r','o','u','p',' ','P','o','l','i','c','y',' ','C','r','e','a','t','o','r',' ','O','w','n','e','r','s',0 };
192 static const WCHAR Guest[] = { 'G','u','e','s','t',0 };
193 static const WCHAR Guests[] = { 'G','u','e','s','t','s',0 };
194 static const WCHAR INTERACTIVE[] = { 'I','N','T','E','R','A','C','T','I','V','E',0 };
195 static const WCHAR LOCAL[] = { 'L','O','C','A','L',0 };
196 static const WCHAR LOCAL_SERVICE[] = { 'L','O','C','A','L',' ','S','E','R','V','I','C','E',0 };
197 static const WCHAR NETWORK[] = { 'N','E','T','W','O','R','K',0 };
198 static const WCHAR Network_Configuration_Operators[] = { 'N','e','t','w','o','r','k',' ','C','o','n','f','i','g','u','r','a','t','i','o','n',' ','O','p','e','r','a','t','o','r','s',0 };
199 static const WCHAR NETWORK_SERVICE[] = { 'N','E','T','W','O','R','K',' ','S','E','R','V','I','C','E',0 };
200 static const WCHAR NT_AUTHORITY[] = { 'N','T',' ','A','U','T','H','O','R','I','T','Y',0 };
201 static const WCHAR NT_Pseudo_Domain[] = { 'N','T',' ','P','s','e','u','d','o',' ','D','o','m','a','i','n',0 };
202 static const WCHAR NTML_Authentication[] = { 'N','T','M','L',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
203 static const WCHAR NULL_SID[] = { 'N','U','L','L',' ','S','I','D',0 };
204 static const WCHAR Other_Organization[] = { 'O','t','h','e','r',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
205 static const WCHAR Performance_Log_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','L','o','g',' ','U','s','e','r','s',0 };
206 static const WCHAR Performance_Monitor_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','M','o','n','i','t','o','r',' ','U','s','e','r','s',0 };
207 static const WCHAR Power_Users[] = { 'P','o','w','e','r',' ','U','s','e','r','s',0 };
208 static const WCHAR Pre_Windows_2000_Compatible_Access[] = { 'P','r','e','-','W','i','n','d','o','w','s',' ','2','0','0','0',' ','C','o','m','p','a','t','i','b','l','e',' ','A','c','c','e','s','s',0 };
209 static const WCHAR Print_Operators[] = { 'P','r','i','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
210 static const WCHAR PROXY[] = { 'P','R','O','X','Y',0 };
211 static const WCHAR RAS_and_IAS_Servers[] = { 'R','A','S',' ','a','n','d',' ','I','A','S',' ','S','e','r','v','e','r','s',0 };
212 static const WCHAR Remote_Desktop_Users[] = { 'R','e','m','o','t','e',' ','D','e','s','k','t','o','p',' ','U','s','e','r','s',0 };
213 static const WCHAR REMOTE_INTERACTIVE_LOGON[] = { 'R','E','M','O','T','E',' ','I','N','T','E','R','A','C','T','I','V','E',' ','L','O','G','O','N',0 };
214 static const WCHAR Replicators[] = { 'R','e','p','l','i','c','a','t','o','r','s',0 };
215 static const WCHAR RESTRICTED[] = { 'R','E','S','T','R','I','C','T','E','D',0 };
216 static const WCHAR SChannel_Authentication[] = { 'S','C','h','a','n','n','e','l',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
217 static const WCHAR Schema_Admins[] = { 'S','c','h','e','m','a',' ','A','d','m','i','n','s',0 };
218 static const WCHAR SELF[] = { 'S','E','L','F',0 };
219 static const WCHAR Server_Operators[] = { 'S','e','r','v','e','r',' ','O','p','e','r','a','t','o','r','s',0 };
220 static const WCHAR SERVICE[] = { 'S','E','R','V','I','C','E',0 };
221 static const WCHAR SYSTEM[] = { 'S','Y','S','T','E','M',0 };
222 static const WCHAR TERMINAL_SERVER_USER[] = { 'T','E','R','M','I','N','A','L',' ','S','E','R','V','E','R',' ','U','S','E','R',0 };
223 static const WCHAR This_Organization[] = { 'T','h','i','s',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
224 static const WCHAR Users[] = { 'U','s','e','r','s',0 };
226 static const AccountSid ACCOUNT_SIDS[] = {
227 { WinNullSid, NULL_SID, Blank, SidTypeWellKnownGroup },
228 { WinWorldSid, Everyone, Blank, SidTypeWellKnownGroup },
229 { WinLocalSid, LOCAL, Blank, SidTypeWellKnownGroup },
230 { WinCreatorOwnerSid, CREATOR_OWNER, Blank, SidTypeWellKnownGroup },
231 { WinCreatorGroupSid, CREATOR_GROUP, Blank, SidTypeWellKnownGroup },
232 { WinCreatorOwnerServerSid, CREATOR_OWNER_SERVER, Blank, SidTypeWellKnownGroup },
233 { WinCreatorGroupServerSid, CREATOR_GROUP_SERVER, Blank, SidTypeWellKnownGroup },
234 { WinNtAuthoritySid, NT_Pseudo_Domain, NT_Pseudo_Domain, SidTypeDomain },
235 { WinDialupSid, DIALUP, NT_AUTHORITY, SidTypeWellKnownGroup },
236 { WinNetworkSid, NETWORK, NT_AUTHORITY, SidTypeWellKnownGroup },
237 { WinBatchSid, BATCH, NT_AUTHORITY, SidTypeWellKnownGroup },
238 { WinInteractiveSid, INTERACTIVE, NT_AUTHORITY, SidTypeWellKnownGroup },
239 { WinServiceSid, SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
240 { WinAnonymousSid, ANONYMOUS_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
241 { WinProxySid, PROXY, NT_AUTHORITY, SidTypeWellKnownGroup },
242 { WinEnterpriseControllersSid, ENTERPRISE_DOMAIN_CONTROLLERS, NT_AUTHORITY, SidTypeWellKnownGroup },
243 { WinSelfSid, SELF, NT_AUTHORITY, SidTypeWellKnownGroup },
244 { WinAuthenticatedUserSid, Authenticated_Users, NT_AUTHORITY, SidTypeWellKnownGroup },
245 { WinRestrictedCodeSid, RESTRICTED, NT_AUTHORITY, SidTypeWellKnownGroup },
246 { WinTerminalServerSid, TERMINAL_SERVER_USER, NT_AUTHORITY, SidTypeWellKnownGroup },
247 { WinRemoteLogonIdSid, REMOTE_INTERACTIVE_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
248 { WinLocalSystemSid, SYSTEM, NT_AUTHORITY, SidTypeWellKnownGroup },
249 { WinLocalServiceSid, LOCAL_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
250 { WinNetworkServiceSid, NETWORK_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
251 { WinBuiltinDomainSid, BUILTIN, BUILTIN, SidTypeDomain },
252 { WinBuiltinAdministratorsSid, Administrators, BUILTIN, SidTypeAlias },
253 { WinBuiltinUsersSid, Users, BUILTIN, SidTypeAlias },
254 { WinBuiltinGuestsSid, Guests, BUILTIN, SidTypeAlias },
255 { WinBuiltinPowerUsersSid, Power_Users, BUILTIN, SidTypeAlias },
256 { WinBuiltinAccountOperatorsSid, Account_Operators, BUILTIN, SidTypeAlias },
257 { WinBuiltinSystemOperatorsSid, Server_Operators, BUILTIN, SidTypeAlias },
258 { WinBuiltinPrintOperatorsSid, Print_Operators, BUILTIN, SidTypeAlias },
259 { WinBuiltinBackupOperatorsSid, Backup_Operators, BUILTIN, SidTypeAlias },
260 { WinBuiltinReplicatorSid, Replicators, BUILTIN, SidTypeAlias },
261 { WinBuiltinPreWindows2000CompatibleAccessSid, Pre_Windows_2000_Compatible_Access, BUILTIN, SidTypeAlias },
262 { WinBuiltinRemoteDesktopUsersSid, Remote_Desktop_Users, BUILTIN, SidTypeAlias },
263 { WinBuiltinNetworkConfigurationOperatorsSid, Network_Configuration_Operators, BUILTIN, SidTypeAlias },
264 { WinNTLMAuthenticationSid, NTML_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
265 { WinDigestAuthenticationSid, Digest_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
266 { WinSChannelAuthenticationSid, SChannel_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
267 { WinThisOrganizationSid, This_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
268 { WinOtherOrganizationSid, Other_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
269 { WinBuiltinPerfMonitoringUsersSid, Performance_Monitor_Users, BUILTIN, SidTypeAlias },
270 { WinBuiltinPerfLoggingUsersSid, Performance_Log_Users, BUILTIN, SidTypeAlias },
273 * ACE access rights
275 static const WCHAR SDDL_READ_CONTROL[] = {'R','C',0};
276 static const WCHAR SDDL_WRITE_DAC[] = {'W','D',0};
277 static const WCHAR SDDL_WRITE_OWNER[] = {'W','O',0};
278 static const WCHAR SDDL_STANDARD_DELETE[] = {'S','D',0};
280 static const WCHAR SDDL_READ_PROPERTY[] = {'R','P',0};
281 static const WCHAR SDDL_WRITE_PROPERTY[] = {'W','P',0};
282 static const WCHAR SDDL_CREATE_CHILD[] = {'C','C',0};
283 static const WCHAR SDDL_DELETE_CHILD[] = {'D','C',0};
284 static const WCHAR SDDL_LIST_CHILDREN[] = {'L','C',0};
285 static const WCHAR SDDL_SELF_WRITE[] = {'S','W',0};
286 static const WCHAR SDDL_LIST_OBJECT[] = {'L','O',0};
287 static const WCHAR SDDL_DELETE_TREE[] = {'D','T',0};
288 static const WCHAR SDDL_CONTROL_ACCESS[] = {'C','R',0};
290 static const WCHAR SDDL_FILE_ALL[] = {'F','A',0};
291 static const WCHAR SDDL_FILE_READ[] = {'F','R',0};
292 static const WCHAR SDDL_FILE_WRITE[] = {'F','W',0};
293 static const WCHAR SDDL_FILE_EXECUTE[] = {'F','X',0};
295 static const WCHAR SDDL_KEY_ALL[] = {'K','A',0};
296 static const WCHAR SDDL_KEY_READ[] = {'K','R',0};
297 static const WCHAR SDDL_KEY_WRITE[] = {'K','W',0};
298 static const WCHAR SDDL_KEY_EXECUTE[] = {'K','X',0};
300 static const WCHAR SDDL_GENERIC_ALL[] = {'G','A',0};
301 static const WCHAR SDDL_GENERIC_READ[] = {'G','R',0};
302 static const WCHAR SDDL_GENERIC_WRITE[] = {'G','W',0};
303 static const WCHAR SDDL_GENERIC_EXECUTE[] = {'G','X',0};
306 * ACL flags
308 static const WCHAR SDDL_PROTECTED[] = {'P',0};
309 static const WCHAR SDDL_AUTO_INHERIT_REQ[] = {'A','R',0};
310 static const WCHAR SDDL_AUTO_INHERITED[] = {'A','I',0};
313 * ACE types
315 static const WCHAR SDDL_ACCESS_ALLOWED[] = {'A',0};
316 static const WCHAR SDDL_ACCESS_DENIED[] = {'D',0};
317 static const WCHAR SDDL_OBJECT_ACCESS_ALLOWED[] = {'O','A',0};
318 static const WCHAR SDDL_OBJECT_ACCESS_DENIED[] = {'O','D',0};
319 static const WCHAR SDDL_AUDIT[] = {'A','U',0};
320 static const WCHAR SDDL_ALARM[] = {'A','L',0};
321 static const WCHAR SDDL_OBJECT_AUDIT[] = {'O','U',0};
322 static const WCHAR SDDL_OBJECT_ALARMp[] = {'O','L',0};
325 * ACE flags
327 static const WCHAR SDDL_CONTAINER_INHERIT[] = {'C','I',0};
328 static const WCHAR SDDL_OBJECT_INHERIT[] = {'O','I',0};
329 static const WCHAR SDDL_NO_PROPAGATE[] = {'N','P',0};
330 static const WCHAR SDDL_INHERIT_ONLY[] = {'I','O',0};
331 static const WCHAR SDDL_INHERITED[] = {'I','D',0};
332 static const WCHAR SDDL_AUDIT_SUCCESS[] = {'S','A',0};
333 static const WCHAR SDDL_AUDIT_FAILURE[] = {'F','A',0};
335 const char * debugstr_sid(PSID sid)
337 int auth = 0;
338 SID * psid = (SID *)sid;
340 if (psid == NULL)
341 return "(null)";
343 auth = psid->IdentifierAuthority.Value[5] +
344 (psid->IdentifierAuthority.Value[4] << 8) +
345 (psid->IdentifierAuthority.Value[3] << 16) +
346 (psid->IdentifierAuthority.Value[2] << 24);
348 switch (psid->SubAuthorityCount) {
349 case 0:
350 return wine_dbg_sprintf("S-%d-%d", psid->Revision, auth);
351 case 1:
352 return wine_dbg_sprintf("S-%d-%d-%u", psid->Revision, auth,
353 psid->SubAuthority[0]);
354 case 2:
355 return wine_dbg_sprintf("S-%d-%d-%u-%u", psid->Revision, auth,
356 psid->SubAuthority[0], psid->SubAuthority[1]);
357 case 3:
358 return wine_dbg_sprintf("S-%d-%d-%u-%u-%u", psid->Revision, auth,
359 psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2]);
360 case 4:
361 return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u", psid->Revision, auth,
362 psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
363 psid->SubAuthority[3]);
364 case 5:
365 return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u", psid->Revision, auth,
366 psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
367 psid->SubAuthority[3], psid->SubAuthority[4]);
368 case 6:
369 return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
370 psid->SubAuthority[3], psid->SubAuthority[1], psid->SubAuthority[2],
371 psid->SubAuthority[0], psid->SubAuthority[4], psid->SubAuthority[5]);
372 case 7:
373 return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
374 psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
375 psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
376 psid->SubAuthority[6]);
377 case 8:
378 return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
379 psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
380 psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
381 psid->SubAuthority[6], psid->SubAuthority[7]);
383 return "(too-big)";
386 /* set last error code from NT status and get the proper boolean return value */
387 /* used for functions that are a simple wrapper around the corresponding ntdll API */
388 static inline BOOL set_ntstatus( NTSTATUS status )
390 if (status) SetLastError( RtlNtStatusToDosError( status ));
391 return !status;
394 #define WINE_SIZE_OF_WORLD_ACCESS_ACL (sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD))
396 static void GetWorldAccessACL(PACL pACL)
398 PACCESS_ALLOWED_ACE pACE = (PACCESS_ALLOWED_ACE) (pACL + 1);
400 pACL->AclRevision = ACL_REVISION;
401 pACL->Sbz1 = 0;
402 pACL->AclSize = WINE_SIZE_OF_WORLD_ACCESS_ACL;
403 pACL->AceCount = 1;
404 pACL->Sbz2 = 0;
406 pACE->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
407 pACE->Header.AceFlags = CONTAINER_INHERIT_ACE;
408 pACE->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD);
409 pACE->Mask = 0xf3ffffff; /* Everything except reserved bits */
410 memcpy(&pACE->SidStart, &sidWorld, sizeof(sidWorld));
413 /************************************************************
414 * ADVAPI_IsLocalComputer
416 * Checks whether the server name indicates local machine.
418 BOOL ADVAPI_IsLocalComputer(LPCWSTR ServerName)
420 DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
421 BOOL Result;
422 LPWSTR buf;
424 if (!ServerName || !ServerName[0])
425 return TRUE;
427 buf = HeapAlloc(GetProcessHeap(), 0, dwSize * sizeof(WCHAR));
428 Result = GetComputerNameW(buf, &dwSize);
429 if (Result && (ServerName[0] == '\\') && (ServerName[1] == '\\'))
430 ServerName += 2;
431 Result = Result && !lstrcmpW(ServerName, buf);
432 HeapFree(GetProcessHeap(), 0, buf);
434 return Result;
437 /************************************************************
438 * ADVAPI_GetComputerSid
440 * Reads the computer SID from the registry.
442 BOOL ADVAPI_GetComputerSid(PSID sid)
444 HKEY key;
445 LONG ret;
446 BOOL retval = FALSE;
447 static const WCHAR Account[] = { 'S','E','C','U','R','I','T','Y','\\','S','A','M','\\','D','o','m','a','i','n','s','\\','A','c','c','o','u','n','t',0 };
448 static const WCHAR V[] = { 'V',0 };
450 if ((ret = RegOpenKeyExW(HKEY_LOCAL_MACHINE, Account, 0,
451 KEY_READ, &key)) == ERROR_SUCCESS)
453 DWORD size = 0;
454 ret = RegQueryValueExW(key, V, NULL, NULL, NULL, &size);
455 if (ret == ERROR_MORE_DATA || ret == ERROR_SUCCESS)
457 BYTE * data = HeapAlloc(GetProcessHeap(), 0, size);
458 if (data)
460 if ((ret = RegQueryValueExW(key, V, NULL, NULL,
461 data, &size)) == ERROR_SUCCESS)
463 /* the SID is in the last 24 bytes of the binary data */
464 CopyMemory(sid, &data[size-24], 24);
465 retval = TRUE;
467 HeapFree(GetProcessHeap(), 0, data);
470 RegCloseKey(key);
473 if(retval == TRUE) return retval;
475 /* create a new random SID */
476 if (RegCreateKeyExW(HKEY_LOCAL_MACHINE, Account,
477 0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL) == ERROR_SUCCESS)
479 PSID new_sid;
480 SID_IDENTIFIER_AUTHORITY identifierAuthority = {SECURITY_NT_AUTHORITY};
481 DWORD id[3];
483 if (RtlGenRandom(id, sizeof(id)))
485 if (AllocateAndInitializeSid(&identifierAuthority, 4, SECURITY_NT_NON_UNIQUE, id[0], id[1], id[2], 0, 0, 0, 0, &new_sid))
487 if (RegSetValueExW(key, V, 0, REG_BINARY, new_sid, GetLengthSid(new_sid)) == ERROR_SUCCESS)
488 retval = CopySid(GetLengthSid(new_sid), sid, new_sid);
490 FreeSid(new_sid);
493 RegCloseKey(key);
496 return retval;
499 /* ##############################
500 ###### TOKEN FUNCTIONS ######
501 ##############################
504 /******************************************************************************
505 * OpenProcessToken [ADVAPI32.@]
506 * Opens the access token associated with a process handle.
508 * PARAMS
509 * ProcessHandle [I] Handle to process
510 * DesiredAccess [I] Desired access to process
511 * TokenHandle [O] Pointer to handle of open access token
513 * RETURNS
514 * Success: TRUE. TokenHandle contains the access token.
515 * Failure: FALSE.
517 * NOTES
518 * See NtOpenProcessToken.
520 BOOL WINAPI
521 OpenProcessToken( HANDLE ProcessHandle, DWORD DesiredAccess,
522 HANDLE *TokenHandle )
524 return set_ntstatus(NtOpenProcessToken( ProcessHandle, DesiredAccess, TokenHandle ));
527 /******************************************************************************
528 * OpenThreadToken [ADVAPI32.@]
530 * Opens the access token associated with a thread handle.
532 * PARAMS
533 * ThreadHandle [I] Handle to process
534 * DesiredAccess [I] Desired access to the thread
535 * OpenAsSelf [I] ???
536 * TokenHandle [O] Destination for the token handle
538 * RETURNS
539 * Success: TRUE. TokenHandle contains the access token.
540 * Failure: FALSE.
542 * NOTES
543 * See NtOpenThreadToken.
545 BOOL WINAPI
546 OpenThreadToken( HANDLE ThreadHandle, DWORD DesiredAccess,
547 BOOL OpenAsSelf, HANDLE *TokenHandle)
549 return set_ntstatus( NtOpenThreadToken(ThreadHandle, DesiredAccess, OpenAsSelf, TokenHandle));
552 BOOL WINAPI
553 AdjustTokenGroups( HANDLE TokenHandle, BOOL ResetToDefault, PTOKEN_GROUPS NewState,
554 DWORD BufferLength, PTOKEN_GROUPS PreviousState, PDWORD ReturnLength )
556 return set_ntstatus( NtAdjustGroupsToken(TokenHandle, ResetToDefault, NewState, BufferLength,
557 PreviousState, ReturnLength));
560 /******************************************************************************
561 * AdjustTokenPrivileges [ADVAPI32.@]
563 * Adjust the privileges of an open token handle.
565 * PARAMS
566 * TokenHandle [I] Handle from OpenProcessToken() or OpenThreadToken()
567 * DisableAllPrivileges [I] TRUE=Remove all privileges, FALSE=Use NewState
568 * NewState [I] Desired new privileges of the token
569 * BufferLength [I] Length of NewState
570 * PreviousState [O] Destination for the previous state
571 * ReturnLength [I/O] Size of PreviousState
574 * RETURNS
575 * Success: TRUE. Privileges are set to NewState and PreviousState is updated.
576 * Failure: FALSE.
578 * NOTES
579 * See NtAdjustPrivilegesToken.
581 BOOL WINAPI
582 AdjustTokenPrivileges( HANDLE TokenHandle, BOOL DisableAllPrivileges,
583 PTOKEN_PRIVILEGES NewState, DWORD BufferLength,
584 PTOKEN_PRIVILEGES PreviousState, PDWORD ReturnLength )
586 NTSTATUS status;
588 TRACE("\n");
590 status = NtAdjustPrivilegesToken(TokenHandle, DisableAllPrivileges,
591 NewState, BufferLength, PreviousState,
592 ReturnLength);
593 SetLastError( RtlNtStatusToDosError( status ));
594 if ((status == STATUS_SUCCESS) || (status == STATUS_NOT_ALL_ASSIGNED))
595 return TRUE;
596 else
597 return FALSE;
600 /******************************************************************************
601 * CheckTokenMembership [ADVAPI32.@]
603 * Determine if an access token is a member of a SID.
605 * PARAMS
606 * TokenHandle [I] Handle from OpenProcessToken() or OpenThreadToken()
607 * SidToCheck [I] SID that possibly contains the token
608 * IsMember [O] Destination for result.
610 * RETURNS
611 * Success: TRUE. IsMember is TRUE if TokenHandle is a member, FALSE otherwise.
612 * Failure: FALSE.
614 BOOL WINAPI
615 CheckTokenMembership( HANDLE TokenHandle, PSID SidToCheck,
616 PBOOL IsMember )
618 FIXME("(%p %p %p) stub!\n", TokenHandle, SidToCheck, IsMember);
620 *IsMember = TRUE;
621 return(TRUE);
624 /******************************************************************************
625 * GetTokenInformation [ADVAPI32.@]
627 * Get a type of information about an access token.
629 * PARAMS
630 * token [I] Handle from OpenProcessToken() or OpenThreadToken()
631 * tokeninfoclass [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
632 * tokeninfo [O] Destination for token information
633 * tokeninfolength [I] Length of tokeninfo
634 * retlen [O] Destination for returned token information length
636 * RETURNS
637 * Success: TRUE. tokeninfo contains retlen bytes of token information
638 * Failure: FALSE.
640 * NOTES
641 * See NtQueryInformationToken.
643 BOOL WINAPI
644 GetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
645 LPVOID tokeninfo, DWORD tokeninfolength, LPDWORD retlen )
647 TRACE("(%p, %s, %p, %d, %p):\n",
648 token,
649 (tokeninfoclass == TokenUser) ? "TokenUser" :
650 (tokeninfoclass == TokenGroups) ? "TokenGroups" :
651 (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
652 (tokeninfoclass == TokenOwner) ? "TokenOwner" :
653 (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
654 (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
655 (tokeninfoclass == TokenSource) ? "TokenSource" :
656 (tokeninfoclass == TokenType) ? "TokenType" :
657 (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
658 (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
659 (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
660 (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
661 (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
662 (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
663 (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
664 "Unknown",
665 tokeninfo, tokeninfolength, retlen);
666 return set_ntstatus( NtQueryInformationToken( token, tokeninfoclass, tokeninfo,
667 tokeninfolength, retlen));
670 /******************************************************************************
671 * SetTokenInformation [ADVAPI32.@]
673 * Set information for an access token.
675 * PARAMS
676 * token [I] Handle from OpenProcessToken() or OpenThreadToken()
677 * tokeninfoclass [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
678 * tokeninfo [I] Token information to set
679 * tokeninfolength [I] Length of tokeninfo
681 * RETURNS
682 * Success: TRUE. The information for the token is set to tokeninfo.
683 * Failure: FALSE.
685 BOOL WINAPI
686 SetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
687 LPVOID tokeninfo, DWORD tokeninfolength )
689 TRACE("(%p, %s, %p, %d): stub\n",
690 token,
691 (tokeninfoclass == TokenUser) ? "TokenUser" :
692 (tokeninfoclass == TokenGroups) ? "TokenGroups" :
693 (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
694 (tokeninfoclass == TokenOwner) ? "TokenOwner" :
695 (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
696 (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
697 (tokeninfoclass == TokenSource) ? "TokenSource" :
698 (tokeninfoclass == TokenType) ? "TokenType" :
699 (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
700 (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
701 (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
702 (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
703 (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
704 (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
705 (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
706 "Unknown",
707 tokeninfo, tokeninfolength);
709 return set_ntstatus( NtSetInformationToken( token, tokeninfoclass, tokeninfo, tokeninfolength ));
712 /*************************************************************************
713 * SetThreadToken [ADVAPI32.@]
715 * Assigns an 'impersonation token' to a thread so it can assume the
716 * security privileges of another thread or process. Can also remove
717 * a previously assigned token.
719 * PARAMS
720 * thread [O] Handle to thread to set the token for
721 * token [I] Token to set
723 * RETURNS
724 * Success: TRUE. The threads access token is set to token
725 * Failure: FALSE.
727 * NOTES
728 * Only supported on NT or higher. On Win9X this function does nothing.
729 * See SetTokenInformation.
731 BOOL WINAPI SetThreadToken(PHANDLE thread, HANDLE token)
733 return set_ntstatus( NtSetInformationThread( thread ? *thread : GetCurrentThread(),
734 ThreadImpersonationToken, &token, sizeof token ));
737 /*************************************************************************
738 * CreateRestrictedToken [ADVAPI32.@]
740 * Create a new more restricted token from an existing token.
742 * PARAMS
743 * baseToken [I] Token to base the new restricted token on
744 * flags [I] Options
745 * nDisableSids [I] Length of disableSids array
746 * disableSids [I] Array of SIDs to disable in the new token
747 * nDeletePrivs [I] Length of deletePrivs array
748 * deletePrivs [I] Array of privileges to delete in the new token
749 * nRestrictSids [I] Length of restrictSids array
750 * restrictSids [I] Array of SIDs to restrict in the new token
751 * newToken [O] Address where the new token is stored
753 * RETURNS
754 * Success: TRUE
755 * Failure: FALSE
757 BOOL WINAPI CreateRestrictedToken(
758 HANDLE baseToken,
759 DWORD flags,
760 DWORD nDisableSids,
761 PSID_AND_ATTRIBUTES disableSids,
762 DWORD nDeletePrivs,
763 PLUID_AND_ATTRIBUTES deletePrivs,
764 DWORD nRestrictSids,
765 PSID_AND_ATTRIBUTES restrictSids,
766 PHANDLE newToken)
768 FIXME("(%p, 0x%x, %u, %p, %u, %p, %u, %p, %p): stub\n",
769 baseToken, flags, nDisableSids, disableSids,
770 nDeletePrivs, deletePrivs,
771 nRestrictSids, restrictSids,
772 newToken);
773 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
774 return FALSE;
777 /* ##############################
778 ###### SID FUNCTIONS ######
779 ##############################
782 /******************************************************************************
783 * AllocateAndInitializeSid [ADVAPI32.@]
785 * PARAMS
786 * pIdentifierAuthority []
787 * nSubAuthorityCount []
788 * nSubAuthority0 []
789 * nSubAuthority1 []
790 * nSubAuthority2 []
791 * nSubAuthority3 []
792 * nSubAuthority4 []
793 * nSubAuthority5 []
794 * nSubAuthority6 []
795 * nSubAuthority7 []
796 * pSid []
798 BOOL WINAPI
799 AllocateAndInitializeSid( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
800 BYTE nSubAuthorityCount,
801 DWORD nSubAuthority0, DWORD nSubAuthority1,
802 DWORD nSubAuthority2, DWORD nSubAuthority3,
803 DWORD nSubAuthority4, DWORD nSubAuthority5,
804 DWORD nSubAuthority6, DWORD nSubAuthority7,
805 PSID *pSid )
807 return set_ntstatus( RtlAllocateAndInitializeSid(
808 pIdentifierAuthority, nSubAuthorityCount,
809 nSubAuthority0, nSubAuthority1, nSubAuthority2, nSubAuthority3,
810 nSubAuthority4, nSubAuthority5, nSubAuthority6, nSubAuthority7,
811 pSid ));
814 /******************************************************************************
815 * FreeSid [ADVAPI32.@]
817 * PARAMS
818 * pSid []
820 PVOID WINAPI
821 FreeSid( PSID pSid )
823 RtlFreeSid(pSid);
824 return NULL; /* is documented like this */
827 /******************************************************************************
828 * CopySid [ADVAPI32.@]
830 * PARAMS
831 * nDestinationSidLength []
832 * pDestinationSid []
833 * pSourceSid []
835 BOOL WINAPI
836 CopySid( DWORD nDestinationSidLength, PSID pDestinationSid, PSID pSourceSid )
838 return RtlCopySid(nDestinationSidLength, pDestinationSid, pSourceSid);
841 /******************************************************************************
842 * CreateWellKnownSid [ADVAPI32.@]
844 BOOL WINAPI
845 CreateWellKnownSid( WELL_KNOWN_SID_TYPE WellKnownSidType,
846 PSID DomainSid,
847 PSID pSid,
848 DWORD* cbSid)
850 unsigned int i;
851 TRACE("(%d, %s, %p, %p)\n", WellKnownSidType, debugstr_sid(DomainSid), pSid, cbSid);
853 if (cbSid == NULL || pSid == NULL || (DomainSid && !IsValidSid(DomainSid))) {
854 SetLastError(ERROR_INVALID_PARAMETER);
855 return FALSE;
858 for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++) {
859 if (WellKnownSids[i].Type == WellKnownSidType) {
860 DWORD length = GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
862 if (*cbSid < length) {
863 SetLastError(ERROR_INSUFFICIENT_BUFFER);
864 return FALSE;
867 CopyMemory(pSid, &WellKnownSids[i].Sid.Revision, length);
868 *cbSid = length;
869 return TRUE;
873 if (DomainSid == NULL || *GetSidSubAuthorityCount(DomainSid) == SID_MAX_SUB_AUTHORITIES)
875 SetLastError(ERROR_INVALID_PARAMETER);
876 return FALSE;
879 for (i = 0; i < sizeof(WellKnownRids)/sizeof(WellKnownRids[0]); i++)
880 if (WellKnownRids[i].Type == WellKnownSidType) {
881 UCHAR domain_subauth = *GetSidSubAuthorityCount(DomainSid);
882 DWORD domain_sid_length = GetSidLengthRequired(domain_subauth);
883 DWORD output_sid_length = GetSidLengthRequired(domain_subauth + 1);
885 if (*cbSid < output_sid_length) {
886 SetLastError(ERROR_INSUFFICIENT_BUFFER);
887 return FALSE;
890 CopyMemory(pSid, DomainSid, domain_sid_length);
891 (*GetSidSubAuthorityCount(pSid))++;
892 (*GetSidSubAuthority(pSid, domain_subauth)) = WellKnownRids[i].Rid;
893 *cbSid = output_sid_length;
894 return TRUE;
897 SetLastError(ERROR_INVALID_PARAMETER);
898 return FALSE;
901 /******************************************************************************
902 * IsWellKnownSid [ADVAPI32.@]
904 BOOL WINAPI
905 IsWellKnownSid( PSID pSid, WELL_KNOWN_SID_TYPE WellKnownSidType )
907 unsigned int i;
908 TRACE("(%s, %d)\n", debugstr_sid(pSid), WellKnownSidType);
910 for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
911 if (WellKnownSids[i].Type == WellKnownSidType)
912 if (EqualSid(pSid, (PSID)&(WellKnownSids[i].Sid.Revision)))
913 return TRUE;
915 return FALSE;
918 BOOL WINAPI
919 IsTokenRestricted( HANDLE TokenHandle )
921 TOKEN_GROUPS *groups;
922 DWORD size;
923 NTSTATUS status;
924 BOOL restricted;
926 TRACE("(%p)\n", TokenHandle);
928 status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, NULL, 0, &size);
929 if (status != STATUS_BUFFER_TOO_SMALL)
930 return FALSE;
932 groups = HeapAlloc(GetProcessHeap(), 0, size);
933 if (!groups)
935 SetLastError(ERROR_OUTOFMEMORY);
936 return FALSE;
939 status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, groups, size, &size);
940 if (status != STATUS_SUCCESS)
942 HeapFree(GetProcessHeap(), 0, groups);
943 return set_ntstatus(status);
946 if (groups->GroupCount)
947 restricted = TRUE;
948 else
949 restricted = FALSE;
951 HeapFree(GetProcessHeap(), 0, groups);
953 return restricted;
956 /******************************************************************************
957 * IsValidSid [ADVAPI32.@]
959 * PARAMS
960 * pSid []
962 BOOL WINAPI
963 IsValidSid( PSID pSid )
965 return RtlValidSid( pSid );
968 /******************************************************************************
969 * EqualSid [ADVAPI32.@]
971 * PARAMS
972 * pSid1 []
973 * pSid2 []
975 BOOL WINAPI
976 EqualSid( PSID pSid1, PSID pSid2 )
978 return RtlEqualSid( pSid1, pSid2 );
981 /******************************************************************************
982 * EqualPrefixSid [ADVAPI32.@]
984 BOOL WINAPI EqualPrefixSid (PSID pSid1, PSID pSid2)
986 return RtlEqualPrefixSid(pSid1, pSid2);
989 /******************************************************************************
990 * GetSidLengthRequired [ADVAPI32.@]
992 * PARAMS
993 * nSubAuthorityCount []
995 DWORD WINAPI
996 GetSidLengthRequired( BYTE nSubAuthorityCount )
998 return RtlLengthRequiredSid(nSubAuthorityCount);
1001 /******************************************************************************
1002 * InitializeSid [ADVAPI32.@]
1004 * PARAMS
1005 * pIdentifierAuthority []
1007 BOOL WINAPI
1008 InitializeSid (
1009 PSID pSid,
1010 PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
1011 BYTE nSubAuthorityCount)
1013 return RtlInitializeSid(pSid, pIdentifierAuthority, nSubAuthorityCount);
1016 DWORD WINAPI
1017 GetEffectiveRightsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pAccessRights )
1019 FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1021 return 1;
1024 DWORD WINAPI
1025 GetEffectiveRightsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pAccessRights )
1027 FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1029 return 1;
1032 /******************************************************************************
1033 * GetSidIdentifierAuthority [ADVAPI32.@]
1035 * PARAMS
1036 * pSid []
1038 PSID_IDENTIFIER_AUTHORITY WINAPI
1039 GetSidIdentifierAuthority( PSID pSid )
1041 return RtlIdentifierAuthoritySid(pSid);
1044 /******************************************************************************
1045 * GetSidSubAuthority [ADVAPI32.@]
1047 * PARAMS
1048 * pSid []
1049 * nSubAuthority []
1051 PDWORD WINAPI
1052 GetSidSubAuthority( PSID pSid, DWORD nSubAuthority )
1054 return RtlSubAuthoritySid(pSid, nSubAuthority);
1057 /******************************************************************************
1058 * GetSidSubAuthorityCount [ADVAPI32.@]
1060 * PARAMS
1061 * pSid []
1063 PUCHAR WINAPI
1064 GetSidSubAuthorityCount (PSID pSid)
1066 return RtlSubAuthorityCountSid(pSid);
1069 /******************************************************************************
1070 * GetLengthSid [ADVAPI32.@]
1072 * PARAMS
1073 * pSid []
1075 DWORD WINAPI
1076 GetLengthSid (PSID pSid)
1078 return RtlLengthSid(pSid);
1081 /* ##############################################
1082 ###### SECURITY DESCRIPTOR FUNCTIONS ######
1083 ##############################################
1086 /******************************************************************************
1087 * BuildSecurityDescriptorA [ADVAPI32.@]
1089 * Builds a SD from
1091 * PARAMS
1092 * pOwner [I]
1093 * pGroup [I]
1094 * cCountOfAccessEntries [I]
1095 * pListOfAccessEntries [I]
1096 * cCountOfAuditEntries [I]
1097 * pListofAuditEntries [I]
1098 * pOldSD [I]
1099 * lpdwBufferLength [I/O]
1100 * pNewSD [O]
1102 * RETURNS
1103 * Success: ERROR_SUCCESS
1104 * Failure: nonzero error code from Winerror.h
1106 DWORD WINAPI BuildSecurityDescriptorA(
1107 IN PTRUSTEEA pOwner,
1108 IN PTRUSTEEA pGroup,
1109 IN ULONG cCountOfAccessEntries,
1110 IN PEXPLICIT_ACCESSA pListOfAccessEntries,
1111 IN ULONG cCountOfAuditEntries,
1112 IN PEXPLICIT_ACCESSA pListofAuditEntries,
1113 IN PSECURITY_DESCRIPTOR pOldSD,
1114 IN OUT PULONG lpdwBufferLength,
1115 OUT PSECURITY_DESCRIPTOR* pNewSD)
1117 FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1118 cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1119 pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1121 return ERROR_CALL_NOT_IMPLEMENTED;
1124 /******************************************************************************
1125 * BuildSecurityDescriptorW [ADVAPI32.@]
1127 * See BuildSecurityDescriptorA.
1129 DWORD WINAPI BuildSecurityDescriptorW(
1130 IN PTRUSTEEW pOwner,
1131 IN PTRUSTEEW pGroup,
1132 IN ULONG cCountOfAccessEntries,
1133 IN PEXPLICIT_ACCESSW pListOfAccessEntries,
1134 IN ULONG cCountOfAuditEntries,
1135 IN PEXPLICIT_ACCESSW pListofAuditEntries,
1136 IN PSECURITY_DESCRIPTOR pOldSD,
1137 IN OUT PULONG lpdwBufferLength,
1138 OUT PSECURITY_DESCRIPTOR* pNewSD)
1140 FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1141 cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1142 pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1144 return ERROR_CALL_NOT_IMPLEMENTED;
1147 /******************************************************************************
1148 * InitializeSecurityDescriptor [ADVAPI32.@]
1150 * PARAMS
1151 * pDescr []
1152 * revision []
1154 BOOL WINAPI
1155 InitializeSecurityDescriptor( PSECURITY_DESCRIPTOR pDescr, DWORD revision )
1157 return set_ntstatus( RtlCreateSecurityDescriptor(pDescr, revision ));
1161 /******************************************************************************
1162 * MakeAbsoluteSD [ADVAPI32.@]
1164 BOOL WINAPI MakeAbsoluteSD (
1165 IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1166 OUT PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1167 OUT LPDWORD lpdwAbsoluteSecurityDescriptorSize,
1168 OUT PACL pDacl,
1169 OUT LPDWORD lpdwDaclSize,
1170 OUT PACL pSacl,
1171 OUT LPDWORD lpdwSaclSize,
1172 OUT PSID pOwner,
1173 OUT LPDWORD lpdwOwnerSize,
1174 OUT PSID pPrimaryGroup,
1175 OUT LPDWORD lpdwPrimaryGroupSize)
1177 return set_ntstatus( RtlSelfRelativeToAbsoluteSD(pSelfRelativeSecurityDescriptor,
1178 pAbsoluteSecurityDescriptor,
1179 lpdwAbsoluteSecurityDescriptorSize,
1180 pDacl, lpdwDaclSize, pSacl, lpdwSaclSize,
1181 pOwner, lpdwOwnerSize,
1182 pPrimaryGroup, lpdwPrimaryGroupSize));
1185 /******************************************************************************
1186 * GetKernelObjectSecurity [ADVAPI32.@]
1188 BOOL WINAPI GetKernelObjectSecurity(
1189 HANDLE Handle,
1190 SECURITY_INFORMATION RequestedInformation,
1191 PSECURITY_DESCRIPTOR pSecurityDescriptor,
1192 DWORD nLength,
1193 LPDWORD lpnLengthNeeded )
1195 TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", Handle, RequestedInformation,
1196 pSecurityDescriptor, nLength, lpnLengthNeeded);
1198 return set_ntstatus( NtQuerySecurityObject(Handle, RequestedInformation, pSecurityDescriptor,
1199 nLength, lpnLengthNeeded ));
1202 /******************************************************************************
1203 * GetPrivateObjectSecurity [ADVAPI32.@]
1205 BOOL WINAPI GetPrivateObjectSecurity(
1206 PSECURITY_DESCRIPTOR ObjectDescriptor,
1207 SECURITY_INFORMATION SecurityInformation,
1208 PSECURITY_DESCRIPTOR ResultantDescriptor,
1209 DWORD DescriptorLength,
1210 PDWORD ReturnLength )
1212 SECURITY_DESCRIPTOR desc;
1213 BOOL defaulted, present;
1214 PACL pacl;
1215 PSID psid;
1217 TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", ObjectDescriptor, SecurityInformation,
1218 ResultantDescriptor, DescriptorLength, ReturnLength);
1220 if (!InitializeSecurityDescriptor(&desc, SECURITY_DESCRIPTOR_REVISION))
1221 return FALSE;
1223 if (SecurityInformation & OWNER_SECURITY_INFORMATION)
1225 if (!GetSecurityDescriptorOwner(ObjectDescriptor, &psid, &defaulted))
1226 return FALSE;
1227 SetSecurityDescriptorOwner(&desc, psid, defaulted);
1230 if (SecurityInformation & GROUP_SECURITY_INFORMATION)
1232 if (!GetSecurityDescriptorGroup(ObjectDescriptor, &psid, &defaulted))
1233 return FALSE;
1234 SetSecurityDescriptorGroup(&desc, psid, defaulted);
1237 if (SecurityInformation & DACL_SECURITY_INFORMATION)
1239 if (!GetSecurityDescriptorDacl(ObjectDescriptor, &present, &pacl, &defaulted))
1240 return FALSE;
1241 SetSecurityDescriptorDacl(&desc, present, pacl, defaulted);
1244 if (SecurityInformation & SACL_SECURITY_INFORMATION)
1246 if (!GetSecurityDescriptorSacl(ObjectDescriptor, &present, &pacl, &defaulted))
1247 return FALSE;
1248 SetSecurityDescriptorSacl(&desc, present, pacl, defaulted);
1251 *ReturnLength = DescriptorLength;
1252 return MakeSelfRelativeSD(&desc, ResultantDescriptor, ReturnLength);
1255 /******************************************************************************
1256 * GetSecurityDescriptorLength [ADVAPI32.@]
1258 DWORD WINAPI GetSecurityDescriptorLength( PSECURITY_DESCRIPTOR pDescr)
1260 return RtlLengthSecurityDescriptor(pDescr);
1263 /******************************************************************************
1264 * GetSecurityDescriptorOwner [ADVAPI32.@]
1266 * PARAMS
1267 * pOwner []
1268 * lpbOwnerDefaulted []
1270 BOOL WINAPI
1271 GetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pDescr, PSID *pOwner,
1272 LPBOOL lpbOwnerDefaulted )
1274 BOOLEAN defaulted;
1275 BOOL ret = set_ntstatus( RtlGetOwnerSecurityDescriptor( pDescr, pOwner, &defaulted ));
1276 *lpbOwnerDefaulted = defaulted;
1277 return ret;
1280 /******************************************************************************
1281 * SetSecurityDescriptorOwner [ADVAPI32.@]
1283 * PARAMS
1285 BOOL WINAPI SetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1286 PSID pOwner, BOOL bOwnerDefaulted)
1288 return set_ntstatus( RtlSetOwnerSecurityDescriptor(pSecurityDescriptor, pOwner, bOwnerDefaulted));
1290 /******************************************************************************
1291 * GetSecurityDescriptorGroup [ADVAPI32.@]
1293 BOOL WINAPI GetSecurityDescriptorGroup(
1294 PSECURITY_DESCRIPTOR SecurityDescriptor,
1295 PSID *Group,
1296 LPBOOL GroupDefaulted)
1298 BOOLEAN defaulted;
1299 BOOL ret = set_ntstatus( RtlGetGroupSecurityDescriptor(SecurityDescriptor, Group, &defaulted ));
1300 *GroupDefaulted = defaulted;
1301 return ret;
1303 /******************************************************************************
1304 * SetSecurityDescriptorGroup [ADVAPI32.@]
1306 BOOL WINAPI SetSecurityDescriptorGroup ( PSECURITY_DESCRIPTOR SecurityDescriptor,
1307 PSID Group, BOOL GroupDefaulted)
1309 return set_ntstatus( RtlSetGroupSecurityDescriptor( SecurityDescriptor, Group, GroupDefaulted));
1312 /******************************************************************************
1313 * IsValidSecurityDescriptor [ADVAPI32.@]
1315 * PARAMS
1316 * lpsecdesc []
1318 BOOL WINAPI
1319 IsValidSecurityDescriptor( PSECURITY_DESCRIPTOR SecurityDescriptor )
1321 return set_ntstatus( RtlValidSecurityDescriptor(SecurityDescriptor));
1324 /******************************************************************************
1325 * GetSecurityDescriptorDacl [ADVAPI32.@]
1327 BOOL WINAPI GetSecurityDescriptorDacl(
1328 IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
1329 OUT LPBOOL lpbDaclPresent,
1330 OUT PACL *pDacl,
1331 OUT LPBOOL lpbDaclDefaulted)
1333 BOOLEAN present, defaulted;
1334 BOOL ret = set_ntstatus( RtlGetDaclSecurityDescriptor(pSecurityDescriptor, &present, pDacl, &defaulted));
1335 *lpbDaclPresent = present;
1336 *lpbDaclDefaulted = defaulted;
1337 return ret;
1340 /******************************************************************************
1341 * SetSecurityDescriptorDacl [ADVAPI32.@]
1343 BOOL WINAPI
1344 SetSecurityDescriptorDacl (
1345 PSECURITY_DESCRIPTOR lpsd,
1346 BOOL daclpresent,
1347 PACL dacl,
1348 BOOL dacldefaulted )
1350 return set_ntstatus( RtlSetDaclSecurityDescriptor (lpsd, daclpresent, dacl, dacldefaulted ) );
1352 /******************************************************************************
1353 * GetSecurityDescriptorSacl [ADVAPI32.@]
1355 BOOL WINAPI GetSecurityDescriptorSacl(
1356 IN PSECURITY_DESCRIPTOR lpsd,
1357 OUT LPBOOL lpbSaclPresent,
1358 OUT PACL *pSacl,
1359 OUT LPBOOL lpbSaclDefaulted)
1361 BOOLEAN present, defaulted;
1362 BOOL ret = set_ntstatus( RtlGetSaclSecurityDescriptor(lpsd, &present, pSacl, &defaulted) );
1363 *lpbSaclPresent = present;
1364 *lpbSaclDefaulted = defaulted;
1365 return ret;
1368 /**************************************************************************
1369 * SetSecurityDescriptorSacl [ADVAPI32.@]
1371 BOOL WINAPI SetSecurityDescriptorSacl (
1372 PSECURITY_DESCRIPTOR lpsd,
1373 BOOL saclpresent,
1374 PACL lpsacl,
1375 BOOL sacldefaulted)
1377 return set_ntstatus (RtlSetSaclSecurityDescriptor(lpsd, saclpresent, lpsacl, sacldefaulted));
1379 /******************************************************************************
1380 * MakeSelfRelativeSD [ADVAPI32.@]
1382 * PARAMS
1383 * lpabssecdesc []
1384 * lpselfsecdesc []
1385 * lpbuflen []
1387 BOOL WINAPI
1388 MakeSelfRelativeSD(
1389 IN PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1390 IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1391 IN OUT LPDWORD lpdwBufferLength)
1393 return set_ntstatus( RtlMakeSelfRelativeSD( pAbsoluteSecurityDescriptor,
1394 pSelfRelativeSecurityDescriptor, lpdwBufferLength));
1397 /******************************************************************************
1398 * GetSecurityDescriptorControl [ADVAPI32.@]
1401 BOOL WINAPI GetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1402 PSECURITY_DESCRIPTOR_CONTROL pControl, LPDWORD lpdwRevision)
1404 return set_ntstatus( RtlGetControlSecurityDescriptor(pSecurityDescriptor,pControl,lpdwRevision));
1407 /******************************************************************************
1408 * SetSecurityDescriptorControl [ADVAPI32.@]
1410 BOOL WINAPI SetSecurityDescriptorControl( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1411 SECURITY_DESCRIPTOR_CONTROL ControlBitsOfInterest,
1412 SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet )
1414 return set_ntstatus( RtlSetControlSecurityDescriptor(
1415 pSecurityDescriptor, ControlBitsOfInterest, ControlBitsToSet ) );
1418 /* ##############################
1419 ###### ACL FUNCTIONS ######
1420 ##############################
1423 /*************************************************************************
1424 * InitializeAcl [ADVAPI32.@]
1426 BOOL WINAPI InitializeAcl(PACL acl, DWORD size, DWORD rev)
1428 return set_ntstatus( RtlCreateAcl(acl, size, rev));
1431 BOOL WINAPI ImpersonateNamedPipeClient( HANDLE hNamedPipe )
1433 IO_STATUS_BLOCK io_block;
1435 TRACE("(%p)\n", hNamedPipe);
1437 return set_ntstatus( NtFsControlFile(hNamedPipe, NULL, NULL, NULL,
1438 &io_block, FSCTL_PIPE_IMPERSONATE, NULL, 0, NULL, 0) );
1441 /******************************************************************************
1442 * AddAccessAllowedAce [ADVAPI32.@]
1444 BOOL WINAPI AddAccessAllowedAce(
1445 IN OUT PACL pAcl,
1446 IN DWORD dwAceRevision,
1447 IN DWORD AccessMask,
1448 IN PSID pSid)
1450 return set_ntstatus(RtlAddAccessAllowedAce(pAcl, dwAceRevision, AccessMask, pSid));
1453 /******************************************************************************
1454 * AddAccessAllowedAceEx [ADVAPI32.@]
1456 BOOL WINAPI AddAccessAllowedAceEx(
1457 IN OUT PACL pAcl,
1458 IN DWORD dwAceRevision,
1459 IN DWORD AceFlags,
1460 IN DWORD AccessMask,
1461 IN PSID pSid)
1463 return set_ntstatus(RtlAddAccessAllowedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1466 /******************************************************************************
1467 * AddAccessDeniedAce [ADVAPI32.@]
1469 BOOL WINAPI AddAccessDeniedAce(
1470 IN OUT PACL pAcl,
1471 IN DWORD dwAceRevision,
1472 IN DWORD AccessMask,
1473 IN PSID pSid)
1475 return set_ntstatus(RtlAddAccessDeniedAce(pAcl, dwAceRevision, AccessMask, pSid));
1478 /******************************************************************************
1479 * AddAccessDeniedAceEx [ADVAPI32.@]
1481 BOOL WINAPI AddAccessDeniedAceEx(
1482 IN OUT PACL pAcl,
1483 IN DWORD dwAceRevision,
1484 IN DWORD AceFlags,
1485 IN DWORD AccessMask,
1486 IN PSID pSid)
1488 return set_ntstatus(RtlAddAccessDeniedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1491 /******************************************************************************
1492 * AddAce [ADVAPI32.@]
1494 BOOL WINAPI AddAce(
1495 IN OUT PACL pAcl,
1496 IN DWORD dwAceRevision,
1497 IN DWORD dwStartingAceIndex,
1498 LPVOID pAceList,
1499 DWORD nAceListLength)
1501 return set_ntstatus(RtlAddAce(pAcl, dwAceRevision, dwStartingAceIndex, pAceList, nAceListLength));
1504 /******************************************************************************
1505 * DeleteAce [ADVAPI32.@]
1507 BOOL WINAPI DeleteAce(PACL pAcl, DWORD dwAceIndex)
1509 return set_ntstatus(RtlDeleteAce(pAcl, dwAceIndex));
1512 /******************************************************************************
1513 * FindFirstFreeAce [ADVAPI32.@]
1515 BOOL WINAPI FindFirstFreeAce(IN PACL pAcl, LPVOID * pAce)
1517 return RtlFirstFreeAce(pAcl, (PACE_HEADER *)pAce);
1520 /******************************************************************************
1521 * GetAce [ADVAPI32.@]
1523 BOOL WINAPI GetAce(PACL pAcl,DWORD dwAceIndex,LPVOID *pAce )
1525 return set_ntstatus(RtlGetAce(pAcl, dwAceIndex, pAce));
1528 /******************************************************************************
1529 * GetAclInformation [ADVAPI32.@]
1531 BOOL WINAPI GetAclInformation(
1532 PACL pAcl,
1533 LPVOID pAclInformation,
1534 DWORD nAclInformationLength,
1535 ACL_INFORMATION_CLASS dwAclInformationClass)
1537 return set_ntstatus(RtlQueryInformationAcl(pAcl, pAclInformation,
1538 nAclInformationLength, dwAclInformationClass));
1541 /******************************************************************************
1542 * IsValidAcl [ADVAPI32.@]
1544 BOOL WINAPI IsValidAcl(IN PACL pAcl)
1546 return RtlValidAcl(pAcl);
1549 /* ##############################
1550 ###### MISC FUNCTIONS ######
1551 ##############################
1554 /******************************************************************************
1555 * AllocateLocallyUniqueId [ADVAPI32.@]
1557 * PARAMS
1558 * lpLuid []
1560 BOOL WINAPI AllocateLocallyUniqueId( PLUID lpLuid )
1562 return set_ntstatus(NtAllocateLocallyUniqueId(lpLuid));
1565 static const WCHAR SE_CREATE_TOKEN_NAME_W[] =
1566 { 'S','e','C','r','e','a','t','e','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1567 static const WCHAR SE_ASSIGNPRIMARYTOKEN_NAME_W[] =
1568 { 'S','e','A','s','s','i','g','n','P','r','i','m','a','r','y','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1569 static const WCHAR SE_LOCK_MEMORY_NAME_W[] =
1570 { 'S','e','L','o','c','k','M','e','m','o','r','y','P','r','i','v','i','l','e','g','e',0 };
1571 static const WCHAR SE_INCREASE_QUOTA_NAME_W[] =
1572 { 'S','e','I','n','c','r','e','a','s','e','Q','u','o','t','a','P','r','i','v','i','l','e','g','e',0 };
1573 static const WCHAR SE_MACHINE_ACCOUNT_NAME_W[] =
1574 { 'S','e','M','a','c','h','i','n','e','A','c','c','o','u','n','t','P','r','i','v','i','l','e','g','e',0 };
1575 static const WCHAR SE_TCB_NAME_W[] =
1576 { 'S','e','T','c','b','P','r','i','v','i','l','e','g','e',0 };
1577 static const WCHAR SE_SECURITY_NAME_W[] =
1578 { 'S','e','S','e','c','u','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1579 static const WCHAR SE_TAKE_OWNERSHIP_NAME_W[] =
1580 { 'S','e','T','a','k','e','O','w','n','e','r','s','h','i','p','P','r','i','v','i','l','e','g','e',0 };
1581 static const WCHAR SE_LOAD_DRIVER_NAME_W[] =
1582 { 'S','e','L','o','a','d','D','r','i','v','e','r','P','r','i','v','i','l','e','g','e',0 };
1583 static const WCHAR SE_SYSTEM_PROFILE_NAME_W[] =
1584 { 'S','e','S','y','s','t','e','m','P','r','o','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1585 static const WCHAR SE_SYSTEMTIME_NAME_W[] =
1586 { 'S','e','S','y','s','t','e','m','t','i','m','e','P','r','i','v','i','l','e','g','e',0 };
1587 static const WCHAR SE_PROF_SINGLE_PROCESS_NAME_W[] =
1588 { 'S','e','P','r','o','f','i','l','e','S','i','n','g','l','e','P','r','o','c','e','s','s','P','r','i','v','i','l','e','g','e',0 };
1589 static const WCHAR SE_INC_BASE_PRIORITY_NAME_W[] =
1590 { 'S','e','I','n','c','r','e','a','s','e','B','a','s','e','P','r','i','o','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1591 static const WCHAR SE_CREATE_PAGEFILE_NAME_W[] =
1592 { 'S','e','C','r','e','a','t','e','P','a','g','e','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1593 static const WCHAR SE_CREATE_PERMANENT_NAME_W[] =
1594 { 'S','e','C','r','e','a','t','e','P','e','r','m','a','n','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1595 static const WCHAR SE_BACKUP_NAME_W[] =
1596 { 'S','e','B','a','c','k','u','p','P','r','i','v','i','l','e','g','e',0 };
1597 static const WCHAR SE_RESTORE_NAME_W[] =
1598 { 'S','e','R','e','s','t','o','r','e','P','r','i','v','i','l','e','g','e',0 };
1599 static const WCHAR SE_SHUTDOWN_NAME_W[] =
1600 { 'S','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1601 static const WCHAR SE_DEBUG_NAME_W[] =
1602 { 'S','e','D','e','b','u','g','P','r','i','v','i','l','e','g','e',0 };
1603 static const WCHAR SE_AUDIT_NAME_W[] =
1604 { 'S','e','A','u','d','i','t','P','r','i','v','i','l','e','g','e',0 };
1605 static const WCHAR SE_SYSTEM_ENVIRONMENT_NAME_W[] =
1606 { 'S','e','S','y','s','t','e','m','E','n','v','i','r','o','n','m','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1607 static const WCHAR SE_CHANGE_NOTIFY_NAME_W[] =
1608 { 'S','e','C','h','a','n','g','e','N','o','t','i','f','y','P','r','i','v','i','l','e','g','e',0 };
1609 static const WCHAR SE_REMOTE_SHUTDOWN_NAME_W[] =
1610 { 'S','e','R','e','m','o','t','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1611 static const WCHAR SE_UNDOCK_NAME_W[] =
1612 { 'S','e','U','n','d','o','c','k','P','r','i','v','i','l','e','g','e',0 };
1613 static const WCHAR SE_SYNC_AGENT_NAME_W[] =
1614 { 'S','e','S','y','n','c','A','g','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1615 static const WCHAR SE_ENABLE_DELEGATION_NAME_W[] =
1616 { 'S','e','E','n','a','b','l','e','D','e','l','e','g','a','t','i','o','n','P','r','i','v','i','l','e','g','e',0 };
1617 static const WCHAR SE_MANAGE_VOLUME_NAME_W[] =
1618 { 'S','e','M','a','n','a','g','e','V','o','l','u','m','e','P','r','i','v','i','l','e','g','e',0 };
1619 static const WCHAR SE_IMPERSONATE_NAME_W[] =
1620 { 'S','e','I','m','p','e','r','s','o','n','a','t','e','P','r','i','v','i','l','e','g','e',0 };
1621 static const WCHAR SE_CREATE_GLOBAL_NAME_W[] =
1622 { 'S','e','C','r','e','a','t','e','G','l','o','b','a','l','P','r','i','v','i','l','e','g','e',0 };
1624 static const WCHAR * const WellKnownPrivNames[SE_MAX_WELL_KNOWN_PRIVILEGE + 1] =
1626 NULL,
1627 NULL,
1628 SE_CREATE_TOKEN_NAME_W,
1629 SE_ASSIGNPRIMARYTOKEN_NAME_W,
1630 SE_LOCK_MEMORY_NAME_W,
1631 SE_INCREASE_QUOTA_NAME_W,
1632 SE_MACHINE_ACCOUNT_NAME_W,
1633 SE_TCB_NAME_W,
1634 SE_SECURITY_NAME_W,
1635 SE_TAKE_OWNERSHIP_NAME_W,
1636 SE_LOAD_DRIVER_NAME_W,
1637 SE_SYSTEM_PROFILE_NAME_W,
1638 SE_SYSTEMTIME_NAME_W,
1639 SE_PROF_SINGLE_PROCESS_NAME_W,
1640 SE_INC_BASE_PRIORITY_NAME_W,
1641 SE_CREATE_PAGEFILE_NAME_W,
1642 SE_CREATE_PERMANENT_NAME_W,
1643 SE_BACKUP_NAME_W,
1644 SE_RESTORE_NAME_W,
1645 SE_SHUTDOWN_NAME_W,
1646 SE_DEBUG_NAME_W,
1647 SE_AUDIT_NAME_W,
1648 SE_SYSTEM_ENVIRONMENT_NAME_W,
1649 SE_CHANGE_NOTIFY_NAME_W,
1650 SE_REMOTE_SHUTDOWN_NAME_W,
1651 SE_UNDOCK_NAME_W,
1652 SE_SYNC_AGENT_NAME_W,
1653 SE_ENABLE_DELEGATION_NAME_W,
1654 SE_MANAGE_VOLUME_NAME_W,
1655 SE_IMPERSONATE_NAME_W,
1656 SE_CREATE_GLOBAL_NAME_W,
1659 /******************************************************************************
1660 * LookupPrivilegeValueW [ADVAPI32.@]
1662 * See LookupPrivilegeValueA.
1664 BOOL WINAPI
1665 LookupPrivilegeValueW( LPCWSTR lpSystemName, LPCWSTR lpName, PLUID lpLuid )
1667 UINT i;
1669 TRACE("%s,%s,%p\n",debugstr_w(lpSystemName), debugstr_w(lpName), lpLuid);
1671 if (!ADVAPI_IsLocalComputer(lpSystemName))
1673 SetLastError(RPC_S_SERVER_UNAVAILABLE);
1674 return FALSE;
1676 if (!lpName)
1678 SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1679 return FALSE;
1681 for( i=SE_MIN_WELL_KNOWN_PRIVILEGE; i<SE_MAX_WELL_KNOWN_PRIVILEGE; i++ )
1683 if( !WellKnownPrivNames[i] )
1684 continue;
1685 if( strcmpiW( WellKnownPrivNames[i], lpName) )
1686 continue;
1687 lpLuid->LowPart = i;
1688 lpLuid->HighPart = 0;
1689 TRACE( "%s -> %08x-%08x\n",debugstr_w( lpSystemName ),
1690 lpLuid->HighPart, lpLuid->LowPart );
1691 return TRUE;
1693 SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1694 return FALSE;
1697 /******************************************************************************
1698 * LookupPrivilegeValueA [ADVAPI32.@]
1700 * Retrieves LUID used on a system to represent the privilege name.
1702 * PARAMS
1703 * lpSystemName [I] Name of the system
1704 * lpName [I] Name of the privilege
1705 * lpLuid [O] Destination for the resulting LUID
1707 * RETURNS
1708 * Success: TRUE. lpLuid contains the requested LUID.
1709 * Failure: FALSE.
1711 BOOL WINAPI
1712 LookupPrivilegeValueA( LPCSTR lpSystemName, LPCSTR lpName, PLUID lpLuid )
1714 UNICODE_STRING lpSystemNameW;
1715 UNICODE_STRING lpNameW;
1716 BOOL ret;
1718 RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1719 RtlCreateUnicodeStringFromAsciiz(&lpNameW,lpName);
1720 ret = LookupPrivilegeValueW(lpSystemNameW.Buffer, lpNameW.Buffer, lpLuid);
1721 RtlFreeUnicodeString(&lpNameW);
1722 RtlFreeUnicodeString(&lpSystemNameW);
1723 return ret;
1726 BOOL WINAPI LookupPrivilegeDisplayNameA( LPCSTR lpSystemName, LPCSTR lpName, LPSTR lpDisplayName,
1727 LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1729 FIXME("%s %s %s %p %p - stub\n", debugstr_a(lpSystemName), debugstr_a(lpName),
1730 debugstr_a(lpDisplayName), cchDisplayName, lpLanguageId);
1732 return FALSE;
1735 BOOL WINAPI LookupPrivilegeDisplayNameW( LPCWSTR lpSystemName, LPCWSTR lpName, LPWSTR lpDisplayName,
1736 LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1738 FIXME("%s %s %s %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpName),
1739 debugstr_w(lpDisplayName), cchDisplayName, lpLanguageId);
1741 return FALSE;
1744 /******************************************************************************
1745 * LookupPrivilegeNameA [ADVAPI32.@]
1747 * See LookupPrivilegeNameW.
1749 BOOL WINAPI
1750 LookupPrivilegeNameA( LPCSTR lpSystemName, PLUID lpLuid, LPSTR lpName,
1751 LPDWORD cchName)
1753 UNICODE_STRING lpSystemNameW;
1754 BOOL ret;
1755 DWORD wLen = 0;
1757 TRACE("%s %p %p %p\n", debugstr_a(lpSystemName), lpLuid, lpName, cchName);
1759 RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1760 ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, NULL, &wLen);
1761 if (!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
1763 LPWSTR lpNameW = HeapAlloc(GetProcessHeap(), 0, wLen * sizeof(WCHAR));
1765 ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, lpNameW,
1766 &wLen);
1767 if (ret)
1769 /* Windows crashes if cchName is NULL, so will I */
1770 unsigned int len = WideCharToMultiByte(CP_ACP, 0, lpNameW, -1, lpName,
1771 *cchName, NULL, NULL);
1773 if (len == 0)
1775 /* WideCharToMultiByte failed */
1776 ret = FALSE;
1778 else if (len > *cchName)
1780 *cchName = len;
1781 SetLastError(ERROR_INSUFFICIENT_BUFFER);
1782 ret = FALSE;
1784 else
1786 /* WideCharToMultiByte succeeded, output length needs to be
1787 * length not including NULL terminator
1789 *cchName = len - 1;
1792 HeapFree(GetProcessHeap(), 0, lpNameW);
1794 RtlFreeUnicodeString(&lpSystemNameW);
1795 return ret;
1798 /******************************************************************************
1799 * LookupPrivilegeNameW [ADVAPI32.@]
1801 * Retrieves the privilege name referred to by the LUID lpLuid.
1803 * PARAMS
1804 * lpSystemName [I] Name of the system
1805 * lpLuid [I] Privilege value
1806 * lpName [O] Name of the privilege
1807 * cchName [I/O] Number of characters in lpName.
1809 * RETURNS
1810 * Success: TRUE. lpName contains the name of the privilege whose value is
1811 * *lpLuid.
1812 * Failure: FALSE.
1814 * REMARKS
1815 * Only well-known privilege names (those defined in winnt.h) can be retrieved
1816 * using this function.
1817 * If the length of lpName is too small, on return *cchName will contain the
1818 * number of WCHARs needed to contain the privilege, including the NULL
1819 * terminator, and GetLastError will return ERROR_INSUFFICIENT_BUFFER.
1820 * On success, *cchName will contain the number of characters stored in
1821 * lpName, NOT including the NULL terminator.
1823 BOOL WINAPI
1824 LookupPrivilegeNameW( LPCWSTR lpSystemName, PLUID lpLuid, LPWSTR lpName,
1825 LPDWORD cchName)
1827 size_t privNameLen;
1829 TRACE("%s,%p,%p,%p\n",debugstr_w(lpSystemName), lpLuid, lpName, cchName);
1831 if (!ADVAPI_IsLocalComputer(lpSystemName))
1833 SetLastError(RPC_S_SERVER_UNAVAILABLE);
1834 return FALSE;
1836 if (lpLuid->HighPart || (lpLuid->LowPart < SE_MIN_WELL_KNOWN_PRIVILEGE ||
1837 lpLuid->LowPart > SE_MAX_WELL_KNOWN_PRIVILEGE))
1839 SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1840 return FALSE;
1842 privNameLen = strlenW(WellKnownPrivNames[lpLuid->LowPart]);
1843 /* Windows crashes if cchName is NULL, so will I */
1844 if (*cchName <= privNameLen)
1846 *cchName = privNameLen + 1;
1847 SetLastError(ERROR_INSUFFICIENT_BUFFER);
1848 return FALSE;
1850 else
1852 strcpyW(lpName, WellKnownPrivNames[lpLuid->LowPart]);
1853 *cchName = privNameLen;
1854 return TRUE;
1858 /******************************************************************************
1859 * GetFileSecurityA [ADVAPI32.@]
1861 * Obtains Specified information about the security of a file or directory.
1863 * PARAMS
1864 * lpFileName [I] Name of the file to get info for
1865 * RequestedInformation [I] SE_ flags from "winnt.h"
1866 * pSecurityDescriptor [O] Destination for security information
1867 * nLength [I] Length of pSecurityDescriptor
1868 * lpnLengthNeeded [O] Destination for length of returned security information
1870 * RETURNS
1871 * Success: TRUE. pSecurityDescriptor contains the requested information.
1872 * Failure: FALSE. lpnLengthNeeded contains the required space to return the info.
1874 * NOTES
1875 * The information returned is constrained by the callers access rights and
1876 * privileges.
1878 BOOL WINAPI
1879 GetFileSecurityA( LPCSTR lpFileName,
1880 SECURITY_INFORMATION RequestedInformation,
1881 PSECURITY_DESCRIPTOR pSecurityDescriptor,
1882 DWORD nLength, LPDWORD lpnLengthNeeded )
1884 DWORD len;
1885 BOOL r;
1886 LPWSTR name = NULL;
1888 if( lpFileName )
1890 len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
1891 name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
1892 MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
1895 r = GetFileSecurityW( name, RequestedInformation, pSecurityDescriptor,
1896 nLength, lpnLengthNeeded );
1897 HeapFree( GetProcessHeap(), 0, name );
1899 return r;
1902 /******************************************************************************
1903 * GetFileSecurityW [ADVAPI32.@]
1905 * See GetFileSecurityA.
1907 BOOL WINAPI
1908 GetFileSecurityW( LPCWSTR lpFileName,
1909 SECURITY_INFORMATION RequestedInformation,
1910 PSECURITY_DESCRIPTOR pSecurityDescriptor,
1911 DWORD nLength, LPDWORD lpnLengthNeeded )
1913 HANDLE hfile;
1914 NTSTATUS status;
1915 DWORD access = 0;
1917 if (RequestedInformation & (OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
1918 DACL_SECURITY_INFORMATION))
1919 access |= READ_CONTROL;
1920 if (RequestedInformation & SACL_SECURITY_INFORMATION)
1921 access |= ACCESS_SYSTEM_SECURITY;
1923 hfile = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
1924 NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0 );
1925 if ( hfile == INVALID_HANDLE_VALUE )
1926 return FALSE;
1928 status = NtQuerySecurityObject( hfile, RequestedInformation, pSecurityDescriptor,
1929 nLength, lpnLengthNeeded );
1930 CloseHandle( hfile );
1931 return set_ntstatus( status );
1935 /******************************************************************************
1936 * LookupAccountSidA [ADVAPI32.@]
1938 BOOL WINAPI
1939 LookupAccountSidA(
1940 IN LPCSTR system,
1941 IN PSID sid,
1942 OUT LPSTR account,
1943 IN OUT LPDWORD accountSize,
1944 OUT LPSTR domain,
1945 IN OUT LPDWORD domainSize,
1946 OUT PSID_NAME_USE name_use )
1948 DWORD len;
1949 BOOL r;
1950 LPWSTR systemW = NULL;
1951 LPWSTR accountW = NULL;
1952 LPWSTR domainW = NULL;
1953 DWORD accountSizeW = *accountSize;
1954 DWORD domainSizeW = *domainSize;
1956 TRACE("(%s,sid=%s,%p,%p(%u),%p,%p(%u),%p)\n",
1957 debugstr_a(system),debugstr_sid(sid),
1958 account,accountSize,accountSize?*accountSize:0,
1959 domain,domainSize,domainSize?*domainSize:0,
1960 name_use);
1962 if (system) {
1963 len = MultiByteToWideChar( CP_ACP, 0, system, -1, NULL, 0 );
1964 systemW = HeapAlloc( GetProcessHeap(), 0, len * sizeof(WCHAR) );
1965 MultiByteToWideChar( CP_ACP, 0, system, -1, systemW, len );
1967 if (account)
1968 accountW = HeapAlloc( GetProcessHeap(), 0, accountSizeW * sizeof(WCHAR) );
1969 if (domain)
1970 domainW = HeapAlloc( GetProcessHeap(), 0, domainSizeW * sizeof(WCHAR) );
1972 r = LookupAccountSidW( systemW, sid, accountW, &accountSizeW, domainW, &domainSizeW, name_use );
1974 if (r) {
1975 if (accountW && *accountSize) {
1976 len = WideCharToMultiByte( CP_ACP, 0, accountW, -1, NULL, 0, NULL, NULL );
1977 WideCharToMultiByte( CP_ACP, 0, accountW, -1, account, len, NULL, NULL );
1978 *accountSize = len;
1979 } else
1980 *accountSize = accountSizeW + 1;
1982 if (domainW && *domainSize) {
1983 len = WideCharToMultiByte( CP_ACP, 0, domainW, -1, NULL, 0, NULL, NULL );
1984 WideCharToMultiByte( CP_ACP, 0, domainW, -1, domain, len, NULL, NULL );
1985 *domainSize = len;
1986 } else
1987 *domainSize = domainSizeW + 1;
1990 HeapFree( GetProcessHeap(), 0, systemW );
1991 HeapFree( GetProcessHeap(), 0, accountW );
1992 HeapFree( GetProcessHeap(), 0, domainW );
1994 return r;
1997 /******************************************************************************
1998 * LookupAccountSidW [ADVAPI32.@]
2000 * PARAMS
2001 * system []
2002 * sid []
2003 * account []
2004 * accountSize []
2005 * domain []
2006 * domainSize []
2007 * name_use []
2010 BOOL WINAPI
2011 LookupAccountSidW(
2012 IN LPCWSTR system,
2013 IN PSID sid,
2014 OUT LPWSTR account,
2015 IN OUT LPDWORD accountSize,
2016 OUT LPWSTR domain,
2017 IN OUT LPDWORD domainSize,
2018 OUT PSID_NAME_USE name_use )
2020 unsigned int i, j;
2021 const WCHAR * ac = NULL;
2022 const WCHAR * dm = NULL;
2023 SID_NAME_USE use = 0;
2024 LPWSTR computer_name = NULL;
2026 TRACE("(%s,sid=%s,%p,%p(%u),%p,%p(%u),%p)\n",
2027 debugstr_w(system),debugstr_sid(sid),
2028 account,accountSize,accountSize?*accountSize:0,
2029 domain,domainSize,domainSize?*domainSize:0,
2030 name_use);
2032 if (!ADVAPI_IsLocalComputer(system)) {
2033 FIXME("Only local computer supported!\n");
2034 SetLastError(ERROR_NONE_MAPPED);
2035 return FALSE;
2038 /* check the well known SIDs first */
2039 for (i = 0; i <= 60; i++) {
2040 if (IsWellKnownSid(sid, i)) {
2041 for (j = 0; j < (sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0])); j++) {
2042 if (ACCOUNT_SIDS[j].type == i) {
2043 ac = ACCOUNT_SIDS[j].account;
2044 dm = ACCOUNT_SIDS[j].domain;
2045 use = ACCOUNT_SIDS[j].name_use;
2048 break;
2052 if (dm == NULL) {
2053 MAX_SID local;
2055 /* check for the local computer next */
2056 if (ADVAPI_GetComputerSid(&local)) {
2057 DWORD size = MAX_COMPUTERNAME_LENGTH + 1;
2058 BOOL result;
2060 computer_name = HeapAlloc(GetProcessHeap(), 0, size * sizeof(WCHAR));
2061 result = GetComputerNameW(computer_name, &size);
2063 if (result) {
2064 if (EqualSid(sid, &local)) {
2065 dm = computer_name;
2066 ac = Blank;
2067 use = 3;
2068 } else {
2069 local.SubAuthorityCount++;
2071 if (EqualPrefixSid(sid, &local)) {
2072 dm = computer_name;
2073 use = 1;
2074 switch (((MAX_SID *)sid)->SubAuthority[4]) {
2075 case DOMAIN_USER_RID_ADMIN:
2076 ac = Administrator;
2077 break;
2078 case DOMAIN_USER_RID_GUEST:
2079 ac = Guest;
2080 break;
2081 case DOMAIN_GROUP_RID_ADMINS:
2082 ac = Domain_Admins;
2083 break;
2084 case DOMAIN_GROUP_RID_USERS:
2085 ac = Domain_Users;
2086 break;
2087 case DOMAIN_GROUP_RID_GUESTS:
2088 ac = Domain_Guests;
2089 break;
2090 case DOMAIN_GROUP_RID_COMPUTERS:
2091 ac = Domain_Computers;
2092 break;
2093 case DOMAIN_GROUP_RID_CONTROLLERS:
2094 ac = Domain_Controllers;
2095 break;
2096 case DOMAIN_GROUP_RID_CERT_ADMINS:
2097 ac = Cert_Publishers;
2098 break;
2099 case DOMAIN_GROUP_RID_SCHEMA_ADMINS:
2100 ac = Schema_Admins;
2101 break;
2102 case DOMAIN_GROUP_RID_ENTERPRISE_ADMINS:
2103 ac = Enterprise_Admins;
2104 break;
2105 case DOMAIN_GROUP_RID_POLICY_ADMINS:
2106 ac = Group_Policy_Creator_Owners;
2107 break;
2108 case DOMAIN_ALIAS_RID_RAS_SERVERS:
2109 ac = RAS_and_IAS_Servers;
2110 break;
2111 default:
2112 dm = NULL;
2113 break;
2121 if (dm) {
2122 DWORD ac_len = lstrlenW(ac);
2123 DWORD dm_len = lstrlenW(dm);
2124 BOOL status = TRUE;
2126 if (*accountSize > ac_len) {
2127 if (account)
2128 lstrcpyW(account, ac);
2130 if (*domainSize > dm_len) {
2131 if (domain)
2132 lstrcpyW(domain, dm);
2134 if (((*accountSize != 0) && (*accountSize < ac_len)) ||
2135 ((*domainSize != 0) && (*domainSize < dm_len))) {
2136 SetLastError(ERROR_INSUFFICIENT_BUFFER);
2137 status = FALSE;
2139 if (*domainSize)
2140 *domainSize = dm_len;
2141 else
2142 *domainSize = dm_len + 1;
2143 if (*accountSize)
2144 *accountSize = ac_len;
2145 else
2146 *accountSize = ac_len + 1;
2147 *name_use = use;
2148 HeapFree(GetProcessHeap(), 0, computer_name);
2149 return status;
2152 HeapFree(GetProcessHeap(), 0, computer_name);
2153 SetLastError(ERROR_NONE_MAPPED);
2154 return FALSE;
2157 /******************************************************************************
2158 * SetFileSecurityA [ADVAPI32.@]
2160 * See SetFileSecurityW.
2162 BOOL WINAPI SetFileSecurityA( LPCSTR lpFileName,
2163 SECURITY_INFORMATION RequestedInformation,
2164 PSECURITY_DESCRIPTOR pSecurityDescriptor)
2166 DWORD len;
2167 BOOL r;
2168 LPWSTR name = NULL;
2170 if( lpFileName )
2172 len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
2173 name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
2174 MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
2177 r = SetFileSecurityW( name, RequestedInformation, pSecurityDescriptor );
2178 HeapFree( GetProcessHeap(), 0, name );
2180 return r;
2183 /******************************************************************************
2184 * SetFileSecurityW [ADVAPI32.@]
2186 * Sets the security of a file or directory.
2188 * PARAMS
2189 * lpFileName []
2190 * RequestedInformation []
2191 * pSecurityDescriptor []
2193 * RETURNS
2194 * Success: TRUE.
2195 * Failure: FALSE.
2197 BOOL WINAPI
2198 SetFileSecurityW( LPCWSTR lpFileName,
2199 SECURITY_INFORMATION RequestedInformation,
2200 PSECURITY_DESCRIPTOR pSecurityDescriptor )
2202 HANDLE file;
2203 DWORD access = 0;
2204 NTSTATUS status;
2206 TRACE("(%s, 0x%x, %p)\n", debugstr_w(lpFileName), RequestedInformation,
2207 pSecurityDescriptor );
2209 if (RequestedInformation & OWNER_SECURITY_INFORMATION ||
2210 RequestedInformation & GROUP_SECURITY_INFORMATION)
2211 access |= WRITE_OWNER;
2212 if (RequestedInformation & SACL_SECURITY_INFORMATION)
2213 access |= ACCESS_SYSTEM_SECURITY;
2214 if (RequestedInformation & DACL_SECURITY_INFORMATION)
2215 access |= WRITE_DAC;
2217 file = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2218 NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL );
2219 if (file == INVALID_HANDLE_VALUE)
2220 return FALSE;
2222 status = NtSetSecurityObject( file, RequestedInformation, pSecurityDescriptor );
2223 CloseHandle( file );
2224 return set_ntstatus( status );
2227 /******************************************************************************
2228 * QueryWindows31FilesMigration [ADVAPI32.@]
2230 * PARAMS
2231 * x1 []
2233 BOOL WINAPI
2234 QueryWindows31FilesMigration( DWORD x1 )
2236 FIXME("(%d):stub\n",x1);
2237 return TRUE;
2240 /******************************************************************************
2241 * SynchronizeWindows31FilesAndWindowsNTRegistry [ADVAPI32.@]
2243 * PARAMS
2244 * x1 []
2245 * x2 []
2246 * x3 []
2247 * x4 []
2249 BOOL WINAPI
2250 SynchronizeWindows31FilesAndWindowsNTRegistry( DWORD x1, DWORD x2, DWORD x3,
2251 DWORD x4 )
2253 FIXME("(0x%08x,0x%08x,0x%08x,0x%08x):stub\n",x1,x2,x3,x4);
2254 return TRUE;
2257 /******************************************************************************
2258 * NotifyBootConfigStatus [ADVAPI32.@]
2260 * PARAMS
2261 * x1 []
2263 BOOL WINAPI
2264 NotifyBootConfigStatus( BOOL x1 )
2266 FIXME("(0x%08d):stub\n",x1);
2267 return 1;
2270 /******************************************************************************
2271 * RevertToSelf [ADVAPI32.@]
2273 * Ends the impersonation of a user.
2275 * PARAMS
2276 * void []
2278 * RETURNS
2279 * Success: TRUE.
2280 * Failure: FALSE.
2282 BOOL WINAPI
2283 RevertToSelf( void )
2285 HANDLE Token = NULL;
2286 return set_ntstatus( NtSetInformationThread( GetCurrentThread(),
2287 ThreadImpersonationToken, &Token, sizeof(Token) ) );
2290 /******************************************************************************
2291 * ImpersonateSelf [ADVAPI32.@]
2293 * Makes an impersonation token that represents the process user and assigns
2294 * to the current thread.
2296 * PARAMS
2297 * ImpersonationLevel [I] Level at which to impersonate.
2299 * RETURNS
2300 * Success: TRUE.
2301 * Failure: FALSE.
2303 BOOL WINAPI
2304 ImpersonateSelf(SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
2306 return set_ntstatus( RtlImpersonateSelf( ImpersonationLevel ) );
2309 /******************************************************************************
2310 * ImpersonateLoggedOnUser [ADVAPI32.@]
2312 BOOL WINAPI ImpersonateLoggedOnUser(HANDLE hToken)
2314 DWORD size;
2315 NTSTATUS Status;
2316 HANDLE ImpersonationToken;
2317 TOKEN_TYPE Type;
2319 FIXME( "(%p)\n", hToken );
2321 if (!GetTokenInformation( hToken, TokenType, &Type,
2322 sizeof(TOKEN_TYPE), &size ))
2323 return FALSE;
2325 if (Type == TokenPrimary)
2327 OBJECT_ATTRIBUTES ObjectAttributes;
2329 InitializeObjectAttributes( &ObjectAttributes, NULL, 0, NULL, NULL );
2331 Status = NtDuplicateToken( hToken,
2332 TOKEN_IMPERSONATE | TOKEN_QUERY,
2333 &ObjectAttributes,
2334 SecurityImpersonation,
2335 TokenImpersonation,
2336 &ImpersonationToken );
2337 if (Status != STATUS_SUCCESS)
2339 ERR( "NtDuplicateToken failed with error 0x%08x\n", Status );
2340 SetLastError( RtlNtStatusToDosError( Status ) );
2341 return FALSE;
2344 else
2345 ImpersonationToken = hToken;
2347 Status = NtSetInformationThread( GetCurrentThread(),
2348 ThreadImpersonationToken,
2349 &ImpersonationToken,
2350 sizeof(ImpersonationToken) );
2352 if (Type == TokenPrimary)
2353 NtClose( ImpersonationToken );
2355 if (Status != STATUS_SUCCESS)
2357 ERR( "NtSetInformationThread failed with error 0x%08x\n", Status );
2358 SetLastError( RtlNtStatusToDosError( Status ) );
2359 return FALSE;
2362 return TRUE;
2365 /******************************************************************************
2366 * AccessCheck [ADVAPI32.@]
2368 BOOL WINAPI
2369 AccessCheck(
2370 PSECURITY_DESCRIPTOR SecurityDescriptor,
2371 HANDLE ClientToken,
2372 DWORD DesiredAccess,
2373 PGENERIC_MAPPING GenericMapping,
2374 PPRIVILEGE_SET PrivilegeSet,
2375 LPDWORD PrivilegeSetLength,
2376 LPDWORD GrantedAccess,
2377 LPBOOL AccessStatus)
2379 NTSTATUS access_status;
2380 BOOL ret = set_ntstatus( NtAccessCheck(SecurityDescriptor, ClientToken, DesiredAccess,
2381 GenericMapping, PrivilegeSet, PrivilegeSetLength,
2382 GrantedAccess, &access_status) );
2383 if (ret) *AccessStatus = set_ntstatus( access_status );
2384 return ret;
2388 /******************************************************************************
2389 * AccessCheckByType [ADVAPI32.@]
2391 BOOL WINAPI AccessCheckByType(
2392 PSECURITY_DESCRIPTOR pSecurityDescriptor,
2393 PSID PrincipalSelfSid,
2394 HANDLE ClientToken,
2395 DWORD DesiredAccess,
2396 POBJECT_TYPE_LIST ObjectTypeList,
2397 DWORD ObjectTypeListLength,
2398 PGENERIC_MAPPING GenericMapping,
2399 PPRIVILEGE_SET PrivilegeSet,
2400 LPDWORD PrivilegeSetLength,
2401 LPDWORD GrantedAccess,
2402 LPBOOL AccessStatus)
2404 FIXME("stub\n");
2406 *AccessStatus = TRUE;
2408 return !*AccessStatus;
2411 /******************************************************************************
2412 * MapGenericMask [ADVAPI32.@]
2414 * Maps generic access rights into specific access rights according to the
2415 * supplied mapping.
2417 * PARAMS
2418 * AccessMask [I/O] Access rights.
2419 * GenericMapping [I] The mapping between generic and specific rights.
2421 * RETURNS
2422 * Nothing.
2424 VOID WINAPI MapGenericMask( PDWORD AccessMask, PGENERIC_MAPPING GenericMapping )
2426 RtlMapGenericMask( AccessMask, GenericMapping );
2429 /*************************************************************************
2430 * SetKernelObjectSecurity [ADVAPI32.@]
2432 BOOL WINAPI SetKernelObjectSecurity (
2433 IN HANDLE Handle,
2434 IN SECURITY_INFORMATION SecurityInformation,
2435 IN PSECURITY_DESCRIPTOR SecurityDescriptor )
2437 return set_ntstatus (NtSetSecurityObject (Handle, SecurityInformation, SecurityDescriptor));
2441 /******************************************************************************
2442 * AddAuditAccessAce [ADVAPI32.@]
2444 BOOL WINAPI AddAuditAccessAce(
2445 IN OUT PACL pAcl,
2446 IN DWORD dwAceRevision,
2447 IN DWORD dwAccessMask,
2448 IN PSID pSid,
2449 IN BOOL bAuditSuccess,
2450 IN BOOL bAuditFailure)
2452 return set_ntstatus( RtlAddAuditAccessAce(pAcl, dwAceRevision, dwAccessMask, pSid,
2453 bAuditSuccess, bAuditFailure) );
2456 /******************************************************************************
2457 * AddAuditAccessAce [ADVAPI32.@]
2459 BOOL WINAPI AddAuditAccessAceEx(
2460 IN OUT PACL pAcl,
2461 IN DWORD dwAceRevision,
2462 IN DWORD dwAceFlags,
2463 IN DWORD dwAccessMask,
2464 IN PSID pSid,
2465 IN BOOL bAuditSuccess,
2466 IN BOOL bAuditFailure)
2468 return set_ntstatus( RtlAddAuditAccessAceEx(pAcl, dwAceRevision, dwAceFlags, dwAccessMask, pSid,
2469 bAuditSuccess, bAuditFailure) );
2472 /******************************************************************************
2473 * LookupAccountNameA [ADVAPI32.@]
2475 BOOL WINAPI
2476 LookupAccountNameA(
2477 IN LPCSTR system,
2478 IN LPCSTR account,
2479 OUT PSID sid,
2480 OUT LPDWORD cbSid,
2481 LPSTR ReferencedDomainName,
2482 IN OUT LPDWORD cbReferencedDomainName,
2483 OUT PSID_NAME_USE name_use )
2485 BOOL ret;
2486 UNICODE_STRING lpSystemW;
2487 UNICODE_STRING lpAccountW;
2488 LPWSTR lpReferencedDomainNameW = NULL;
2490 RtlCreateUnicodeStringFromAsciiz(&lpSystemW, system);
2491 RtlCreateUnicodeStringFromAsciiz(&lpAccountW, account);
2493 if (ReferencedDomainName)
2494 lpReferencedDomainNameW = HeapAlloc(GetProcessHeap(), 0, *cbReferencedDomainName * sizeof(WCHAR));
2496 ret = LookupAccountNameW(lpSystemW.Buffer, lpAccountW.Buffer, sid, cbSid, lpReferencedDomainNameW,
2497 cbReferencedDomainName, name_use);
2499 if (ret && lpReferencedDomainNameW)
2501 WideCharToMultiByte(CP_ACP, 0, lpReferencedDomainNameW, *cbReferencedDomainName,
2502 ReferencedDomainName, *cbReferencedDomainName, NULL, NULL);
2505 RtlFreeUnicodeString(&lpSystemW);
2506 RtlFreeUnicodeString(&lpAccountW);
2507 HeapFree(GetProcessHeap(), 0, lpReferencedDomainNameW);
2509 return ret;
2512 /******************************************************************************
2513 * LookupAccountNameW [ADVAPI32.@]
2515 BOOL WINAPI LookupAccountNameW( LPCWSTR lpSystemName, LPCWSTR lpAccountName, PSID Sid,
2516 LPDWORD cbSid, LPWSTR ReferencedDomainName,
2517 LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2519 /* Default implementation: Always return a default SID */
2520 SID_IDENTIFIER_AUTHORITY identifierAuthority = {SECURITY_NT_AUTHORITY};
2521 BOOL ret;
2522 PSID pSid;
2523 static const WCHAR dm[] = {'D','O','M','A','I','N',0};
2524 unsigned int i;
2526 FIXME("%s %s %p %p %p %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpAccountName),
2527 Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse);
2529 for (i = 0; i < (sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0])); i++)
2531 if (!strcmpW(lpAccountName, ACCOUNT_SIDS[i].account))
2533 if (*cchReferencedDomainName)
2534 *ReferencedDomainName = '\0';
2535 *cchReferencedDomainName = 0;
2536 *peUse = SidTypeWellKnownGroup;
2537 return CreateWellKnownSid(ACCOUNT_SIDS[i].type, NULL, Sid, cbSid);
2541 ret = AllocateAndInitializeSid(&identifierAuthority,
2543 SECURITY_BUILTIN_DOMAIN_RID,
2544 DOMAIN_ALIAS_RID_ADMINS,
2545 0, 0, 0, 0, 0, 0,
2546 &pSid);
2548 if (!ret)
2549 return FALSE;
2551 if (!RtlValidSid(pSid))
2553 FreeSid(pSid);
2554 return FALSE;
2557 if (Sid != NULL && (*cbSid >= GetLengthSid(pSid)))
2558 CopySid(*cbSid, Sid, pSid);
2559 if (*cbSid < GetLengthSid(pSid))
2561 SetLastError(ERROR_INSUFFICIENT_BUFFER);
2562 ret = FALSE;
2564 *cbSid = GetLengthSid(pSid);
2566 if (ReferencedDomainName != NULL && (*cchReferencedDomainName > strlenW(dm)))
2567 strcpyW(ReferencedDomainName, dm);
2569 if (*cchReferencedDomainName <= strlenW(dm))
2571 SetLastError(ERROR_INSUFFICIENT_BUFFER);
2572 ret = FALSE;
2575 *cchReferencedDomainName = strlenW(dm)+1;
2577 FreeSid(pSid);
2579 return ret;
2582 /******************************************************************************
2583 * PrivilegeCheck [ADVAPI32.@]
2585 BOOL WINAPI PrivilegeCheck( HANDLE ClientToken, PPRIVILEGE_SET RequiredPrivileges, LPBOOL pfResult)
2587 BOOL ret;
2588 BOOLEAN Result;
2590 TRACE("%p %p %p\n", ClientToken, RequiredPrivileges, pfResult);
2592 ret = set_ntstatus (NtPrivilegeCheck (ClientToken, RequiredPrivileges, &Result));
2593 if (ret)
2594 *pfResult = Result;
2595 return ret;
2598 /******************************************************************************
2599 * AccessCheckAndAuditAlarmA [ADVAPI32.@]
2601 BOOL WINAPI AccessCheckAndAuditAlarmA(LPCSTR Subsystem, LPVOID HandleId, LPSTR ObjectTypeName,
2602 LPSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2603 PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2604 LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2606 FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_a(Subsystem),
2607 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName),
2608 SecurityDescriptor, DesiredAccess, GenericMapping,
2609 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2610 return TRUE;
2613 /******************************************************************************
2614 * AccessCheckAndAuditAlarmW [ADVAPI32.@]
2616 BOOL WINAPI AccessCheckAndAuditAlarmW(LPCWSTR Subsystem, LPVOID HandleId, LPWSTR ObjectTypeName,
2617 LPWSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2618 PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2619 LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2621 FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_w(Subsystem),
2622 HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName),
2623 SecurityDescriptor, DesiredAccess, GenericMapping,
2624 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2625 return TRUE;
2628 BOOL WINAPI ObjectCloseAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2630 FIXME("stub (%s,%p,%x)\n", debugstr_a(SubsystemName), HandleId, GenerateOnClose);
2632 return TRUE;
2635 BOOL WINAPI ObjectCloseAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2637 FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2639 return TRUE;
2642 BOOL WINAPI ObjectDeleteAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2644 FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2646 return TRUE;
2649 BOOL WINAPI ObjectOpenAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, LPSTR ObjectTypeName,
2650 LPSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
2651 DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
2652 LPBOOL GenerateOnClose)
2654 FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_a(SubsystemName),
2655 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName), pSecurityDescriptor,
2656 ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
2657 GenerateOnClose);
2659 return TRUE;
2662 BOOL WINAPI ObjectOpenAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, LPWSTR ObjectTypeName,
2663 LPWSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
2664 DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
2665 LPBOOL GenerateOnClose)
2667 FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_w(SubsystemName),
2668 HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName), pSecurityDescriptor,
2669 ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
2670 GenerateOnClose);
2672 return TRUE;
2675 BOOL WINAPI ObjectPrivilegeAuditAlarmA( LPCSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
2676 DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2678 FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_a(SubsystemName), HandleId, ClientToken,
2679 DesiredAccess, Privileges, AccessGranted);
2681 return TRUE;
2684 BOOL WINAPI ObjectPrivilegeAuditAlarmW( LPCWSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
2685 DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2687 FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_w(SubsystemName), HandleId, ClientToken,
2688 DesiredAccess, Privileges, AccessGranted);
2690 return TRUE;
2693 BOOL WINAPI PrivilegedServiceAuditAlarmA( LPCSTR SubsystemName, LPCSTR ServiceName, HANDLE ClientToken,
2694 PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2696 FIXME("stub (%s,%s,%p,%p,%x)\n", debugstr_a(SubsystemName), debugstr_a(ServiceName),
2697 ClientToken, Privileges, AccessGranted);
2699 return TRUE;
2702 BOOL WINAPI PrivilegedServiceAuditAlarmW( LPCWSTR SubsystemName, LPCWSTR ServiceName, HANDLE ClientToken,
2703 PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2705 FIXME("stub %s,%s,%p,%p,%x)\n", debugstr_w(SubsystemName), debugstr_w(ServiceName),
2706 ClientToken, Privileges, AccessGranted);
2708 return TRUE;
2711 /******************************************************************************
2712 * GetSecurityInfo [ADVAPI32.@]
2714 DWORD WINAPI GetSecurityInfo(
2715 HANDLE hObject, SE_OBJECT_TYPE ObjectType,
2716 SECURITY_INFORMATION SecurityInfo, PSID *ppsidOwner,
2717 PSID *ppsidGroup, PACL *ppDacl, PACL *ppSacl,
2718 PSECURITY_DESCRIPTOR *ppSecurityDescriptor
2721 FIXME("stub!\n");
2722 return ERROR_BAD_PROVIDER;
2725 /******************************************************************************
2726 * GetSecurityInfoExW [ADVAPI32.@]
2728 DWORD WINAPI GetSecurityInfoExW(
2729 HANDLE hObject, SE_OBJECT_TYPE ObjectType,
2730 SECURITY_INFORMATION SecurityInfo, LPCWSTR lpProvider,
2731 LPCWSTR lpProperty, PACTRL_ACCESSW *ppAccessList,
2732 PACTRL_AUDITW *ppAuditList, LPWSTR *lppOwner, LPWSTR *lppGroup
2735 FIXME("stub!\n");
2736 return ERROR_BAD_PROVIDER;
2739 /******************************************************************************
2740 * BuildExplicitAccessWithNameA [ADVAPI32.@]
2742 VOID WINAPI BuildExplicitAccessWithNameA( PEXPLICIT_ACCESSA pExplicitAccess,
2743 LPSTR pTrusteeName, DWORD AccessPermissions,
2744 ACCESS_MODE AccessMode, DWORD Inheritance )
2746 TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_a(pTrusteeName),
2747 AccessPermissions, AccessMode, Inheritance);
2749 pExplicitAccess->grfAccessPermissions = AccessPermissions;
2750 pExplicitAccess->grfAccessMode = AccessMode;
2751 pExplicitAccess->grfInheritance = Inheritance;
2753 pExplicitAccess->Trustee.pMultipleTrustee = NULL;
2754 pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2755 pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
2756 pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
2757 pExplicitAccess->Trustee.ptstrName = pTrusteeName;
2760 /******************************************************************************
2761 * BuildExplicitAccessWithNameW [ADVAPI32.@]
2763 VOID WINAPI BuildExplicitAccessWithNameW( PEXPLICIT_ACCESSW pExplicitAccess,
2764 LPWSTR pTrusteeName, DWORD AccessPermissions,
2765 ACCESS_MODE AccessMode, DWORD Inheritance )
2767 TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_w(pTrusteeName),
2768 AccessPermissions, AccessMode, Inheritance);
2770 pExplicitAccess->grfAccessPermissions = AccessPermissions;
2771 pExplicitAccess->grfAccessMode = AccessMode;
2772 pExplicitAccess->grfInheritance = Inheritance;
2774 pExplicitAccess->Trustee.pMultipleTrustee = NULL;
2775 pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2776 pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
2777 pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
2778 pExplicitAccess->Trustee.ptstrName = pTrusteeName;
2781 /******************************************************************************
2782 * BuildTrusteeWithObjectsAndNameA [ADVAPI32.@]
2784 VOID WINAPI BuildTrusteeWithObjectsAndNameA( PTRUSTEEA pTrustee, POBJECTS_AND_NAME_A pObjName,
2785 SE_OBJECT_TYPE ObjectType, LPSTR ObjectTypeName,
2786 LPSTR InheritedObjectTypeName, LPSTR Name )
2788 DWORD ObjectsPresent = 0;
2790 TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
2791 ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_a(Name));
2793 /* Fill the OBJECTS_AND_NAME structure */
2794 pObjName->ObjectType = ObjectType;
2795 if (ObjectTypeName != NULL)
2797 ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2800 pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
2801 if (InheritedObjectTypeName != NULL)
2803 ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2806 pObjName->ObjectsPresent = ObjectsPresent;
2807 pObjName->ptstrName = Name;
2809 /* Fill the TRUSTEE structure */
2810 pTrustee->pMultipleTrustee = NULL;
2811 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2812 pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
2813 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2814 pTrustee->ptstrName = (LPSTR)pObjName;
2817 /******************************************************************************
2818 * BuildTrusteeWithObjectsAndNameW [ADVAPI32.@]
2820 VOID WINAPI BuildTrusteeWithObjectsAndNameW( PTRUSTEEW pTrustee, POBJECTS_AND_NAME_W pObjName,
2821 SE_OBJECT_TYPE ObjectType, LPWSTR ObjectTypeName,
2822 LPWSTR InheritedObjectTypeName, LPWSTR Name )
2824 DWORD ObjectsPresent = 0;
2826 TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
2827 ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_w(Name));
2829 /* Fill the OBJECTS_AND_NAME structure */
2830 pObjName->ObjectType = ObjectType;
2831 if (ObjectTypeName != NULL)
2833 ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2836 pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
2837 if (InheritedObjectTypeName != NULL)
2839 ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2842 pObjName->ObjectsPresent = ObjectsPresent;
2843 pObjName->ptstrName = Name;
2845 /* Fill the TRUSTEE structure */
2846 pTrustee->pMultipleTrustee = NULL;
2847 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2848 pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
2849 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2850 pTrustee->ptstrName = (LPWSTR)pObjName;
2853 /******************************************************************************
2854 * BuildTrusteeWithObjectsAndSidA [ADVAPI32.@]
2856 VOID WINAPI BuildTrusteeWithObjectsAndSidA( PTRUSTEEA pTrustee, POBJECTS_AND_SID pObjSid,
2857 GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
2859 DWORD ObjectsPresent = 0;
2861 TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
2863 /* Fill the OBJECTS_AND_SID structure */
2864 if (pObjectGuid != NULL)
2866 pObjSid->ObjectTypeGuid = *pObjectGuid;
2867 ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2869 else
2871 ZeroMemory(&pObjSid->ObjectTypeGuid,
2872 sizeof(GUID));
2875 if (pInheritedObjectGuid != NULL)
2877 pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
2878 ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2880 else
2882 ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
2883 sizeof(GUID));
2886 pObjSid->ObjectsPresent = ObjectsPresent;
2887 pObjSid->pSid = pSid;
2889 /* Fill the TRUSTEE structure */
2890 pTrustee->pMultipleTrustee = NULL;
2891 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2892 pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
2893 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2894 pTrustee->ptstrName = (LPSTR) pObjSid;
2897 /******************************************************************************
2898 * BuildTrusteeWithObjectsAndSidW [ADVAPI32.@]
2900 VOID WINAPI BuildTrusteeWithObjectsAndSidW( PTRUSTEEW pTrustee, POBJECTS_AND_SID pObjSid,
2901 GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
2903 DWORD ObjectsPresent = 0;
2905 TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
2907 /* Fill the OBJECTS_AND_SID structure */
2908 if (pObjectGuid != NULL)
2910 pObjSid->ObjectTypeGuid = *pObjectGuid;
2911 ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2913 else
2915 ZeroMemory(&pObjSid->ObjectTypeGuid,
2916 sizeof(GUID));
2919 if (pInheritedObjectGuid != NULL)
2921 pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
2922 ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2924 else
2926 ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
2927 sizeof(GUID));
2930 pObjSid->ObjectsPresent = ObjectsPresent;
2931 pObjSid->pSid = pSid;
2933 /* Fill the TRUSTEE structure */
2934 pTrustee->pMultipleTrustee = NULL;
2935 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2936 pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
2937 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2938 pTrustee->ptstrName = (LPWSTR) pObjSid;
2941 /******************************************************************************
2942 * BuildTrusteeWithSidA [ADVAPI32.@]
2944 VOID WINAPI BuildTrusteeWithSidA(PTRUSTEEA pTrustee, PSID pSid)
2946 TRACE("%p %p\n", pTrustee, pSid);
2948 pTrustee->pMultipleTrustee = NULL;
2949 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2950 pTrustee->TrusteeForm = TRUSTEE_IS_SID;
2951 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2952 pTrustee->ptstrName = (LPSTR) pSid;
2955 /******************************************************************************
2956 * BuildTrusteeWithSidW [ADVAPI32.@]
2958 VOID WINAPI BuildTrusteeWithSidW(PTRUSTEEW pTrustee, PSID pSid)
2960 TRACE("%p %p\n", pTrustee, pSid);
2962 pTrustee->pMultipleTrustee = NULL;
2963 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2964 pTrustee->TrusteeForm = TRUSTEE_IS_SID;
2965 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2966 pTrustee->ptstrName = (LPWSTR) pSid;
2969 /******************************************************************************
2970 * BuildTrusteeWithNameA [ADVAPI32.@]
2972 VOID WINAPI BuildTrusteeWithNameA(PTRUSTEEA pTrustee, LPSTR name)
2974 TRACE("%p %s\n", pTrustee, debugstr_a(name) );
2976 pTrustee->pMultipleTrustee = NULL;
2977 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2978 pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
2979 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2980 pTrustee->ptstrName = name;
2983 /******************************************************************************
2984 * BuildTrusteeWithNameW [ADVAPI32.@]
2986 VOID WINAPI BuildTrusteeWithNameW(PTRUSTEEW pTrustee, LPWSTR name)
2988 TRACE("%p %s\n", pTrustee, debugstr_w(name) );
2990 pTrustee->pMultipleTrustee = NULL;
2991 pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2992 pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
2993 pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2994 pTrustee->ptstrName = name;
2997 /******************************************************************************
2998 * GetTrusteeFormA [ADVAPI32.@]
3000 TRUSTEE_FORM WINAPI GetTrusteeFormA(PTRUSTEEA pTrustee)
3002 TRACE("(%p)\n", pTrustee);
3004 if (!pTrustee)
3005 return TRUSTEE_BAD_FORM;
3007 return pTrustee->TrusteeForm;
3010 /******************************************************************************
3011 * GetTrusteeFormW [ADVAPI32.@]
3013 TRUSTEE_FORM WINAPI GetTrusteeFormW(PTRUSTEEW pTrustee)
3015 TRACE("(%p)\n", pTrustee);
3017 if (!pTrustee)
3018 return TRUSTEE_BAD_FORM;
3020 return pTrustee->TrusteeForm;
3023 /******************************************************************************
3024 * GetTrusteeNameA [ADVAPI32.@]
3026 LPSTR WINAPI GetTrusteeNameA(PTRUSTEEA pTrustee)
3028 TRACE("(%p)\n", pTrustee);
3030 if (!pTrustee)
3031 return NULL;
3033 return pTrustee->ptstrName;
3036 /******************************************************************************
3037 * GetTrusteeNameW [ADVAPI32.@]
3039 LPWSTR WINAPI GetTrusteeNameW(PTRUSTEEW pTrustee)
3041 TRACE("(%p)\n", pTrustee);
3043 if (!pTrustee)
3044 return NULL;
3046 return pTrustee->ptstrName;
3049 /******************************************************************************
3050 * GetTrusteeTypeA [ADVAPI32.@]
3052 TRUSTEE_TYPE WINAPI GetTrusteeTypeA(PTRUSTEEA pTrustee)
3054 TRACE("(%p)\n", pTrustee);
3056 if (!pTrustee)
3057 return TRUSTEE_IS_UNKNOWN;
3059 return pTrustee->TrusteeType;
3062 /******************************************************************************
3063 * GetTrusteeTypeW [ADVAPI32.@]
3065 TRUSTEE_TYPE WINAPI GetTrusteeTypeW(PTRUSTEEW pTrustee)
3067 TRACE("(%p)\n", pTrustee);
3069 if (!pTrustee)
3070 return TRUSTEE_IS_UNKNOWN;
3072 return pTrustee->TrusteeType;
3075 BOOL WINAPI SetAclInformation( PACL pAcl, LPVOID pAclInformation,
3076 DWORD nAclInformationLength,
3077 ACL_INFORMATION_CLASS dwAclInformationClass )
3079 FIXME("%p %p 0x%08x 0x%08x - stub\n", pAcl, pAclInformation,
3080 nAclInformationLength, dwAclInformationClass);
3082 return TRUE;
3085 /******************************************************************************
3086 * SetEntriesInAclA [ADVAPI32.@]
3088 DWORD WINAPI SetEntriesInAclA( ULONG count, PEXPLICIT_ACCESSA pEntries,
3089 PACL OldAcl, PACL* NewAcl )
3091 FIXME("%d %p %p %p\n",count,pEntries,OldAcl,NewAcl);
3092 *NewAcl = NULL;
3093 return ERROR_SUCCESS;
3096 /******************************************************************************
3097 * SetEntriesInAclW [ADVAPI32.@]
3099 DWORD WINAPI SetEntriesInAclW( ULONG count, PEXPLICIT_ACCESSW pEntries,
3100 PACL OldAcl, PACL* NewAcl )
3102 ULONG i;
3103 PSID *ppsid;
3104 DWORD ret = ERROR_SUCCESS;
3105 DWORD acl_size = sizeof(ACL);
3106 NTSTATUS status;
3108 TRACE("%d %p %p %p\n", count, pEntries, OldAcl, NewAcl);
3110 *NewAcl = NULL;
3112 if (!count && !OldAcl)
3113 return ERROR_SUCCESS;
3115 /* allocate array of maximum sized sids allowed */
3116 ppsid = HeapAlloc(GetProcessHeap(), 0, count * (sizeof(SID *) + FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES])));
3117 if (!ppsid)
3118 return ERROR_OUTOFMEMORY;
3120 for (i = 0; i < count; i++)
3122 ppsid[i] = (char *)&ppsid[count] + i * FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3124 TRACE("[%d]:\n\tgrfAccessPermissions = 0x%x\n\tgrfAccessMode = %d\n\tgrfInheritance = 0x%x\n\t"
3125 "Trustee.pMultipleTrustee = %p\n\tMultipleTrusteeOperation = %d\n\tTrusteeForm = %d\n\t"
3126 "Trustee.TrusteeType = %d\n\tptstrName = %p\n", i,
3127 pEntries[i].grfAccessPermissions, pEntries[i].grfAccessMode, pEntries[i].grfInheritance,
3128 pEntries[i].Trustee.pMultipleTrustee, pEntries[i].Trustee.MultipleTrusteeOperation,
3129 pEntries[i].Trustee.TrusteeForm, pEntries[i].Trustee.TrusteeType,
3130 pEntries[i].Trustee.ptstrName);
3132 if (pEntries[i].Trustee.MultipleTrusteeOperation != NO_MULTIPLE_TRUSTEE)
3134 WARN("bad multiple trustee operation %d for trustee %d\n", pEntries[i].Trustee.MultipleTrusteeOperation, i);
3135 ret = ERROR_INVALID_PARAMETER;
3136 goto exit;
3139 switch (pEntries[i].Trustee.TrusteeForm)
3141 case TRUSTEE_IS_SID:
3142 if (!CopySid(FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]),
3143 ppsid[i], pEntries[i].Trustee.ptstrName))
3145 WARN("bad sid %p for trustee %d\n", pEntries[i].Trustee.ptstrName, i);
3146 ret = ERROR_INVALID_PARAMETER;
3147 goto exit;
3149 break;
3150 case TRUSTEE_IS_NAME:
3152 DWORD sid_size = FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3153 DWORD domain_size = 0;
3154 SID_NAME_USE use;
3155 if (!LookupAccountNameW(NULL, pEntries[i].Trustee.ptstrName, ppsid[i], &sid_size, NULL, &domain_size, &use))
3157 WARN("bad user name %s for trustee %d\n", debugstr_w(pEntries[i].Trustee.ptstrName), i);
3158 ret = ERROR_INVALID_PARAMETER;
3159 goto exit;
3161 break;
3163 case TRUSTEE_IS_OBJECTS_AND_SID:
3164 FIXME("TRUSTEE_IS_OBJECTS_AND_SID unimplemented\n");
3165 break;
3166 case TRUSTEE_IS_OBJECTS_AND_NAME:
3167 FIXME("TRUSTEE_IS_OBJECTS_AND_NAME unimplemented\n");
3168 break;
3169 default:
3170 WARN("bad trustee form %d for trustee %d\n", pEntries[i].Trustee.TrusteeForm, i);
3171 ret = ERROR_INVALID_PARAMETER;
3172 goto exit;
3175 /* Note: we overestimate the ACL size here as a tradeoff between
3176 * instructions (simplicity) and memory */
3177 switch (pEntries[i].grfAccessMode)
3179 case GRANT_ACCESS:
3180 case SET_ACCESS:
3181 acl_size += FIELD_OFFSET(ACCESS_ALLOWED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3182 break;
3183 case DENY_ACCESS:
3184 acl_size += FIELD_OFFSET(ACCESS_DENIED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3185 break;
3186 case SET_AUDIT_SUCCESS:
3187 case SET_AUDIT_FAILURE:
3188 acl_size += FIELD_OFFSET(SYSTEM_AUDIT_ACE, SidStart) + GetLengthSid(ppsid[i]);
3189 break;
3190 case REVOKE_ACCESS:
3191 break;
3192 default:
3193 WARN("bad access mode %d for trustee %d\n", pEntries[i].grfAccessMode, i);
3194 ret = ERROR_INVALID_PARAMETER;
3195 goto exit;
3199 if (OldAcl)
3201 ACL_SIZE_INFORMATION size_info;
3203 status = RtlQueryInformationAcl(OldAcl, &size_info, sizeof(size_info), AclSizeInformation);
3204 if (status != STATUS_SUCCESS)
3206 ret = RtlNtStatusToDosError(status);
3207 goto exit;
3209 acl_size += size_info.AclBytesInUse - sizeof(ACL);
3212 *NewAcl = LocalAlloc(0, acl_size);
3213 if (!*NewAcl)
3215 ret = ERROR_OUTOFMEMORY;
3216 goto exit;
3219 status = RtlCreateAcl( *NewAcl, acl_size, ACL_REVISION );
3220 if (status != STATUS_SUCCESS)
3222 ret = RtlNtStatusToDosError(status);
3223 goto exit;
3226 for (i = 0; i < count; i++)
3228 switch (pEntries[i].grfAccessMode)
3230 case GRANT_ACCESS:
3231 status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3232 pEntries[i].grfInheritance,
3233 pEntries[i].grfAccessPermissions,
3234 ppsid[i]);
3235 break;
3236 case SET_ACCESS:
3238 ULONG j;
3239 BOOL add = TRUE;
3240 if (OldAcl)
3242 for (j = 0; ; j++)
3244 const ACE_HEADER *existing_ace_header;
3245 status = RtlGetAce(OldAcl, j, (LPVOID *)&existing_ace_header);
3246 if (status != STATUS_SUCCESS)
3247 break;
3248 if (pEntries[i].grfAccessMode == SET_ACCESS &&
3249 existing_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3250 EqualSid(ppsid[i], &((ACCESS_ALLOWED_ACE *)existing_ace_header)->SidStart))
3252 add = FALSE;
3253 break;
3257 if (add)
3258 status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3259 pEntries[i].grfInheritance,
3260 pEntries[i].grfAccessPermissions,
3261 ppsid[i]);
3262 break;
3264 case DENY_ACCESS:
3265 status = RtlAddAccessDeniedAceEx(*NewAcl, ACL_REVISION,
3266 pEntries[i].grfInheritance,
3267 pEntries[i].grfAccessPermissions,
3268 ppsid[i]);
3269 break;
3270 case SET_AUDIT_SUCCESS:
3271 status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3272 pEntries[i].grfInheritance,
3273 pEntries[i].grfAccessPermissions,
3274 ppsid[i], TRUE, FALSE);
3275 break;
3276 case SET_AUDIT_FAILURE:
3277 status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3278 pEntries[i].grfInheritance,
3279 pEntries[i].grfAccessPermissions,
3280 ppsid[i], FALSE, TRUE);
3281 break;
3282 default:
3283 FIXME("unhandled access mode %d\n", pEntries[i].grfAccessMode);
3287 if (OldAcl)
3289 for (i = 0; ; i++)
3291 BOOL add = TRUE;
3292 ULONG j;
3293 const ACE_HEADER *old_ace_header;
3294 status = RtlGetAce(OldAcl, i, (LPVOID *)&old_ace_header);
3295 if (status != STATUS_SUCCESS) break;
3296 for (j = 0; j < count; j++)
3298 if (pEntries[j].grfAccessMode == SET_ACCESS &&
3299 old_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3300 EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3302 status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION, pEntries[j].grfInheritance, pEntries[j].grfAccessPermissions, ppsid[j]);
3303 add = FALSE;
3304 break;
3306 else if (pEntries[j].grfAccessMode == REVOKE_ACCESS)
3308 switch (old_ace_header->AceType)
3310 case ACCESS_ALLOWED_ACE_TYPE:
3311 if (EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3312 add = FALSE;
3313 break;
3314 case ACCESS_DENIED_ACE_TYPE:
3315 if (EqualSid(ppsid[j], &((ACCESS_DENIED_ACE *)old_ace_header)->SidStart))
3316 add = FALSE;
3317 break;
3318 case SYSTEM_AUDIT_ACE_TYPE:
3319 if (EqualSid(ppsid[j], &((SYSTEM_AUDIT_ACE *)old_ace_header)->SidStart))
3320 add = FALSE;
3321 break;
3322 case SYSTEM_ALARM_ACE_TYPE:
3323 if (EqualSid(ppsid[j], &((SYSTEM_ALARM_ACE *)old_ace_header)->SidStart))
3324 add = FALSE;
3325 break;
3326 default:
3327 FIXME("unhandled ace type %d\n", old_ace_header->AceType);
3330 if (!add)
3331 break;
3334 if (add)
3335 status = RtlAddAce(*NewAcl, ACL_REVISION, 1, (PACE_HEADER)old_ace_header, old_ace_header->AceSize);
3336 if (status != STATUS_SUCCESS)
3338 WARN("RtlAddAce failed with error 0x%08x\n", status);
3339 ret = RtlNtStatusToDosError(status);
3340 break;
3345 exit:
3346 HeapFree(GetProcessHeap(), 0, ppsid);
3347 return ret;
3350 /******************************************************************************
3351 * SetNamedSecurityInfoA [ADVAPI32.@]
3353 DWORD WINAPI SetNamedSecurityInfoA(LPSTR pObjectName,
3354 SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3355 PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3357 DWORD len;
3358 LPWSTR wstr = NULL;
3359 DWORD r;
3361 TRACE("%s %d %d %p %p %p %p\n", debugstr_a(pObjectName), ObjectType,
3362 SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3364 if( pObjectName )
3366 len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
3367 wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
3368 MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
3371 r = SetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, psidOwner,
3372 psidGroup, pDacl, pSacl );
3374 HeapFree( GetProcessHeap(), 0, wstr );
3376 return r;
3379 BOOL WINAPI SetPrivateObjectSecurity( SECURITY_INFORMATION SecurityInformation,
3380 PSECURITY_DESCRIPTOR ModificationDescriptor,
3381 PSECURITY_DESCRIPTOR* ObjectsSecurityDescriptor,
3382 PGENERIC_MAPPING GenericMapping,
3383 HANDLE Token )
3385 FIXME("0x%08x %p %p %p %p - stub\n", SecurityInformation, ModificationDescriptor,
3386 ObjectsSecurityDescriptor, GenericMapping, Token);
3388 return TRUE;
3391 BOOL WINAPI AreAllAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3393 return RtlAreAllAccessesGranted( GrantedAccess, DesiredAccess );
3396 /******************************************************************************
3397 * AreAnyAccessesGranted [ADVAPI32.@]
3399 * Determines whether or not any of a set of specified access permissions have
3400 * been granted or not.
3402 * PARAMS
3403 * GrantedAccess [I] The permissions that have been granted.
3404 * DesiredAccess [I] The permissions that you want to have.
3406 * RETURNS
3407 * Nonzero if any of the permissions have been granted, zero if none of the
3408 * permissions have been granted.
3411 BOOL WINAPI AreAnyAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3413 return RtlAreAnyAccessesGranted( GrantedAccess, DesiredAccess );
3416 /******************************************************************************
3417 * SetNamedSecurityInfoW [ADVAPI32.@]
3419 DWORD WINAPI SetNamedSecurityInfoW(LPWSTR pObjectName,
3420 SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3421 PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3423 FIXME("%s %d %d %p %p %p %p\n", debugstr_w(pObjectName), ObjectType,
3424 SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3425 return ERROR_SUCCESS;
3428 /******************************************************************************
3429 * GetExplicitEntriesFromAclA [ADVAPI32.@]
3431 DWORD WINAPI GetExplicitEntriesFromAclA( PACL pacl, PULONG pcCountOfExplicitEntries,
3432 PEXPLICIT_ACCESSA* pListOfExplicitEntries)
3434 FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3435 return ERROR_CALL_NOT_IMPLEMENTED;
3438 /******************************************************************************
3439 * GetExplicitEntriesFromAclW [ADVAPI32.@]
3441 DWORD WINAPI GetExplicitEntriesFromAclW( PACL pacl, PULONG pcCountOfExplicitEntries,
3442 PEXPLICIT_ACCESSW* pListOfExplicitEntries)
3444 FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3445 return ERROR_CALL_NOT_IMPLEMENTED;
3448 /******************************************************************************
3449 * GetAuditedPermissionsFromAclA [ADVAPI32.@]
3451 DWORD WINAPI GetAuditedPermissionsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3452 PACCESS_MASK pFailedAuditRights)
3454 FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3455 return ERROR_CALL_NOT_IMPLEMENTED;
3459 /******************************************************************************
3460 * GetAuditedPermissionsFromAclW [ADVAPI32.@]
3462 DWORD WINAPI GetAuditedPermissionsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3463 PACCESS_MASK pFailedAuditRights)
3465 FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3466 return ERROR_CALL_NOT_IMPLEMENTED;
3470 /******************************************************************************
3471 * ParseAclStringFlags
3473 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl)
3475 DWORD flags = 0;
3476 LPCWSTR szAcl = *StringAcl;
3478 while (*szAcl != '(')
3480 if (*szAcl == 'P')
3482 flags |= SE_DACL_PROTECTED;
3484 else if (*szAcl == 'A')
3486 szAcl++;
3487 if (*szAcl == 'R')
3488 flags |= SE_DACL_AUTO_INHERIT_REQ;
3489 else if (*szAcl == 'I')
3490 flags |= SE_DACL_AUTO_INHERITED;
3492 szAcl++;
3495 *StringAcl = szAcl;
3496 return flags;
3499 /******************************************************************************
3500 * ParseAceStringType
3502 static const ACEFLAG AceType[] =
3504 { SDDL_ALARM, SYSTEM_ALARM_ACE_TYPE },
3505 { SDDL_AUDIT, SYSTEM_AUDIT_ACE_TYPE },
3506 { SDDL_ACCESS_ALLOWED, ACCESS_ALLOWED_ACE_TYPE },
3507 { SDDL_ACCESS_DENIED, ACCESS_DENIED_ACE_TYPE },
3509 { SDDL_OBJECT_ACCESS_ALLOWED, ACCESS_ALLOWED_OBJECT_ACE_TYPE },
3510 { SDDL_OBJECT_ACCESS_DENIED, ACCESS_DENIED_OBJECT_ACE_TYPE },
3511 { SDDL_OBJECT_ALARM, SYSTEM_ALARM_OBJECT_ACE_TYPE },
3512 { SDDL_OBJECT_AUDIT, SYSTEM_AUDIT_OBJECT_ACE_TYPE },
3514 { NULL, 0 },
3517 static BYTE ParseAceStringType(LPCWSTR* StringAcl)
3519 UINT len = 0;
3520 LPCWSTR szAcl = *StringAcl;
3521 const ACEFLAG *lpaf = AceType;
3523 while (lpaf->wstr &&
3524 (len = strlenW(lpaf->wstr)) &&
3525 strncmpW(lpaf->wstr, szAcl, len))
3526 lpaf++;
3528 if (!lpaf->wstr)
3529 return 0;
3531 *StringAcl += len;
3532 return lpaf->value;
3536 /******************************************************************************
3537 * ParseAceStringFlags
3539 static const ACEFLAG AceFlags[] =
3541 { SDDL_CONTAINER_INHERIT, CONTAINER_INHERIT_ACE },
3542 { SDDL_AUDIT_FAILURE, FAILED_ACCESS_ACE_FLAG },
3543 { SDDL_INHERITED, INHERITED_ACE },
3544 { SDDL_INHERIT_ONLY, INHERIT_ONLY_ACE },
3545 { SDDL_NO_PROPAGATE, NO_PROPAGATE_INHERIT_ACE },
3546 { SDDL_OBJECT_INHERIT, OBJECT_INHERIT_ACE },
3547 { SDDL_AUDIT_SUCCESS, SUCCESSFUL_ACCESS_ACE_FLAG },
3548 { NULL, 0 },
3551 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl)
3553 UINT len = 0;
3554 BYTE flags = 0;
3555 LPCWSTR szAcl = *StringAcl;
3557 while (*szAcl != ';')
3559 const ACEFLAG *lpaf = AceFlags;
3561 while (lpaf->wstr &&
3562 (len = strlenW(lpaf->wstr)) &&
3563 strncmpW(lpaf->wstr, szAcl, len))
3564 lpaf++;
3566 if (!lpaf->wstr)
3567 return 0;
3569 flags |= lpaf->value;
3570 szAcl += len;
3573 *StringAcl = szAcl;
3574 return flags;
3578 /******************************************************************************
3579 * ParseAceStringRights
3581 static const ACEFLAG AceRights[] =
3583 { SDDL_GENERIC_ALL, GENERIC_ALL },
3584 { SDDL_GENERIC_READ, GENERIC_READ },
3585 { SDDL_GENERIC_WRITE, GENERIC_WRITE },
3586 { SDDL_GENERIC_EXECUTE, GENERIC_EXECUTE },
3588 { SDDL_READ_CONTROL, READ_CONTROL },
3589 { SDDL_STANDARD_DELETE, DELETE },
3590 { SDDL_WRITE_DAC, WRITE_DAC },
3591 { SDDL_WRITE_OWNER, WRITE_OWNER },
3593 { SDDL_READ_PROPERTY, ADS_RIGHT_DS_READ_PROP},
3594 { SDDL_WRITE_PROPERTY, ADS_RIGHT_DS_WRITE_PROP},
3595 { SDDL_CREATE_CHILD, ADS_RIGHT_DS_CREATE_CHILD},
3596 { SDDL_DELETE_CHILD, ADS_RIGHT_DS_DELETE_CHILD},
3597 { SDDL_LIST_CHILDREN, ADS_RIGHT_ACTRL_DS_LIST},
3598 { SDDL_SELF_WRITE, ADS_RIGHT_DS_SELF},
3599 { SDDL_LIST_OBJECT, ADS_RIGHT_DS_LIST_OBJECT},
3600 { SDDL_DELETE_TREE, ADS_RIGHT_DS_DELETE_TREE},
3601 { SDDL_CONTROL_ACCESS, ADS_RIGHT_DS_CONTROL_ACCESS},
3603 { SDDL_FILE_ALL, FILE_ALL_ACCESS },
3604 { SDDL_FILE_READ, FILE_GENERIC_READ },
3605 { SDDL_FILE_WRITE, FILE_GENERIC_WRITE },
3606 { SDDL_FILE_EXECUTE, FILE_GENERIC_EXECUTE },
3608 { SDDL_KEY_ALL, KEY_ALL_ACCESS },
3609 { SDDL_KEY_READ, KEY_READ },
3610 { SDDL_KEY_WRITE, KEY_WRITE },
3611 { SDDL_KEY_EXECUTE, KEY_EXECUTE },
3612 { NULL, 0 },
3615 static DWORD ParseAceStringRights(LPCWSTR* StringAcl)
3617 UINT len = 0;
3618 DWORD rights = 0;
3619 LPCWSTR szAcl = *StringAcl;
3621 if ((*szAcl == '0') && (*(szAcl + 1) == 'x'))
3623 LPCWSTR p = szAcl;
3625 while (*p && *p != ';')
3626 p++;
3628 if (p - szAcl <= 10 /* 8 hex digits + "0x" */ )
3630 rights = strtoulW(szAcl, NULL, 16);
3631 szAcl = p;
3633 else
3634 WARN("Invalid rights string format: %s\n", debugstr_wn(szAcl, p - szAcl));
3636 else
3638 while (*szAcl != ';')
3640 const ACEFLAG *lpaf = AceRights;
3642 while (lpaf->wstr &&
3643 (len = strlenW(lpaf->wstr)) &&
3644 strncmpW(lpaf->wstr, szAcl, len))
3646 lpaf++;
3649 if (!lpaf->wstr)
3650 return 0;
3652 rights |= lpaf->value;
3653 szAcl += len;
3657 *StringAcl = szAcl;
3658 return rights;
3662 /******************************************************************************
3663 * ParseStringAclToAcl
3665 * dacl_flags(string_ace1)(string_ace2)... (string_acen)
3667 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags,
3668 PACL pAcl, LPDWORD cBytes)
3670 DWORD val;
3671 DWORD sidlen;
3672 DWORD length = sizeof(ACL);
3673 DWORD acesize = 0;
3674 DWORD acecount = 0;
3675 PACCESS_ALLOWED_ACE pAce = NULL; /* pointer to current ACE */
3677 TRACE("%s\n", debugstr_w(StringAcl));
3679 if (!StringAcl)
3680 return FALSE;
3682 if (pAcl) /* pAce is only useful if we're setting values */
3683 pAce = (PACCESS_ALLOWED_ACE) (pAcl + 1);
3685 /* Parse ACL flags */
3686 *lpdwFlags = ParseAclStringFlags(&StringAcl);
3688 /* Parse ACE */
3689 while (*StringAcl == '(')
3691 StringAcl++;
3693 /* Parse ACE type */
3694 val = ParseAceStringType(&StringAcl);
3695 if (pAce)
3696 pAce->Header.AceType = (BYTE) val;
3697 if (*StringAcl != ';')
3698 goto lerr;
3699 StringAcl++;
3701 /* Parse ACE flags */
3702 val = ParseAceStringFlags(&StringAcl);
3703 if (pAce)
3704 pAce->Header.AceFlags = (BYTE) val;
3705 if (*StringAcl != ';')
3706 goto lerr;
3707 StringAcl++;
3709 /* Parse ACE rights */
3710 val = ParseAceStringRights(&StringAcl);
3711 if (pAce)
3712 pAce->Mask = val;
3713 if (*StringAcl != ';')
3714 goto lerr;
3715 StringAcl++;
3717 /* Parse ACE object guid */
3718 if (*StringAcl != ';')
3720 FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
3721 goto lerr;
3723 StringAcl++;
3725 /* Parse ACE inherit object guid */
3726 if (*StringAcl != ';')
3728 FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
3729 goto lerr;
3731 StringAcl++;
3733 /* Parse ACE account sid */
3734 if (ParseStringSidToSid(StringAcl, pAce ? (PSID)&pAce->SidStart : NULL, &sidlen))
3736 while (*StringAcl && *StringAcl != ')')
3737 StringAcl++;
3740 if (*StringAcl != ')')
3741 goto lerr;
3742 StringAcl++;
3744 acesize = sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD) + sidlen;
3745 length += acesize;
3746 if (pAce)
3748 pAce->Header.AceSize = acesize;
3749 pAce = (PACCESS_ALLOWED_ACE)((LPBYTE)pAce + acesize);
3751 acecount++;
3754 *cBytes = length;
3756 if (length > 0xffff)
3758 ERR("ACL too large\n");
3759 goto lerr;
3762 if (pAcl)
3764 pAcl->AclRevision = ACL_REVISION;
3765 pAcl->Sbz1 = 0;
3766 pAcl->AclSize = length;
3767 pAcl->AceCount = acecount++;
3768 pAcl->Sbz2 = 0;
3770 return TRUE;
3772 lerr:
3773 WARN("Invalid ACE string format\n");
3774 return FALSE;
3778 /******************************************************************************
3779 * ParseStringSecurityDescriptorToSecurityDescriptor
3781 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
3782 LPCWSTR StringSecurityDescriptor,
3783 SECURITY_DESCRIPTOR* SecurityDescriptor,
3784 LPDWORD cBytes)
3786 BOOL bret = FALSE;
3787 WCHAR toktype;
3788 WCHAR tok[MAX_PATH];
3789 LPCWSTR lptoken;
3790 LPBYTE lpNext = NULL;
3791 DWORD len;
3793 *cBytes = sizeof(SECURITY_DESCRIPTOR);
3795 if (SecurityDescriptor)
3796 lpNext = ((LPBYTE) SecurityDescriptor) + sizeof(SECURITY_DESCRIPTOR);
3798 while (*StringSecurityDescriptor)
3800 toktype = *StringSecurityDescriptor;
3802 /* Expect char identifier followed by ':' */
3803 StringSecurityDescriptor++;
3804 if (*StringSecurityDescriptor != ':')
3806 SetLastError(ERROR_INVALID_PARAMETER);
3807 goto lend;
3809 StringSecurityDescriptor++;
3811 /* Extract token */
3812 lptoken = StringSecurityDescriptor;
3813 while (*lptoken && *lptoken != ':')
3814 lptoken++;
3816 if (*lptoken)
3817 lptoken--;
3819 len = lptoken - StringSecurityDescriptor;
3820 memcpy( tok, StringSecurityDescriptor, len * sizeof(WCHAR) );
3821 tok[len] = 0;
3823 switch (toktype)
3825 case 'O':
3827 DWORD bytes;
3829 if (!ParseStringSidToSid(tok, (PSID)lpNext, &bytes))
3830 goto lend;
3832 if (SecurityDescriptor)
3834 SecurityDescriptor->Owner = (PSID)(lpNext - (LPBYTE)SecurityDescriptor);
3835 lpNext += bytes; /* Advance to next token */
3838 *cBytes += bytes;
3840 break;
3843 case 'G':
3845 DWORD bytes;
3847 if (!ParseStringSidToSid(tok, (PSID)lpNext, &bytes))
3848 goto lend;
3850 if (SecurityDescriptor)
3852 SecurityDescriptor->Group = (PSID)(lpNext - (LPBYTE)SecurityDescriptor);
3853 lpNext += bytes; /* Advance to next token */
3856 *cBytes += bytes;
3858 break;
3861 case 'D':
3863 DWORD flags;
3864 DWORD bytes;
3866 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
3867 goto lend;
3869 if (SecurityDescriptor)
3871 SecurityDescriptor->Control |= SE_DACL_PRESENT | flags;
3872 SecurityDescriptor->Dacl = (PACL)(lpNext - (LPBYTE)SecurityDescriptor);
3873 lpNext += bytes; /* Advance to next token */
3876 *cBytes += bytes;
3878 break;
3881 case 'S':
3883 DWORD flags;
3884 DWORD bytes;
3886 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
3887 goto lend;
3889 if (SecurityDescriptor)
3891 SecurityDescriptor->Control |= SE_SACL_PRESENT | flags;
3892 SecurityDescriptor->Sacl = (PACL)(lpNext - (LPBYTE)SecurityDescriptor);
3893 lpNext += bytes; /* Advance to next token */
3896 *cBytes += bytes;
3898 break;
3901 default:
3902 FIXME("Unknown token\n");
3903 SetLastError(ERROR_INVALID_PARAMETER);
3904 goto lend;
3907 StringSecurityDescriptor = lptoken;
3910 bret = TRUE;
3912 lend:
3913 return bret;
3916 /******************************************************************************
3917 * ConvertStringSecurityDescriptorToSecurityDescriptorA [ADVAPI32.@]
3919 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorA(
3920 LPCSTR StringSecurityDescriptor,
3921 DWORD StringSDRevision,
3922 PSECURITY_DESCRIPTOR* SecurityDescriptor,
3923 PULONG SecurityDescriptorSize)
3925 UINT len;
3926 BOOL ret = FALSE;
3927 LPWSTR StringSecurityDescriptorW;
3929 len = MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, NULL, 0);
3930 StringSecurityDescriptorW = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
3932 if (StringSecurityDescriptorW)
3934 MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, StringSecurityDescriptorW, len);
3936 ret = ConvertStringSecurityDescriptorToSecurityDescriptorW(StringSecurityDescriptorW,
3937 StringSDRevision, SecurityDescriptor,
3938 SecurityDescriptorSize);
3939 HeapFree(GetProcessHeap(), 0, StringSecurityDescriptorW);
3942 return ret;
3945 /******************************************************************************
3946 * ConvertStringSecurityDescriptorToSecurityDescriptorW [ADVAPI32.@]
3948 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorW(
3949 LPCWSTR StringSecurityDescriptor,
3950 DWORD StringSDRevision,
3951 PSECURITY_DESCRIPTOR* SecurityDescriptor,
3952 PULONG SecurityDescriptorSize)
3954 DWORD cBytes;
3955 SECURITY_DESCRIPTOR* psd;
3956 BOOL bret = FALSE;
3958 TRACE("%s\n", debugstr_w(StringSecurityDescriptor));
3960 if (GetVersion() & 0x80000000)
3962 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
3963 goto lend;
3965 else if (StringSDRevision != SID_REVISION)
3967 SetLastError(ERROR_UNKNOWN_REVISION);
3968 goto lend;
3971 /* Compute security descriptor length */
3972 if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
3973 NULL, &cBytes))
3974 goto lend;
3976 psd = *SecurityDescriptor = (SECURITY_DESCRIPTOR*) LocalAlloc(
3977 GMEM_ZEROINIT, cBytes);
3978 if (!psd) goto lend;
3980 psd->Revision = SID_REVISION;
3981 psd->Control |= SE_SELF_RELATIVE;
3983 if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
3984 psd, &cBytes))
3986 LocalFree(psd);
3987 goto lend;
3990 if (SecurityDescriptorSize)
3991 *SecurityDescriptorSize = cBytes;
3993 bret = TRUE;
3995 lend:
3996 TRACE(" ret=%d\n", bret);
3997 return bret;
4000 static void DumpString(LPCWSTR string, int cch, WCHAR **pwptr, ULONG *plen)
4002 if (cch == -1)
4003 cch = strlenW(string);
4005 if (plen)
4006 *plen += cch;
4008 if (pwptr)
4010 memcpy(*pwptr, string, sizeof(WCHAR)*cch);
4011 *pwptr += cch;
4015 static BOOL DumpSidNumeric(PSID psid, WCHAR **pwptr, ULONG *plen)
4017 DWORD i;
4018 WCHAR fmt[] = { 'S','-','%','u','-','%','d',0 };
4019 WCHAR subauthfmt[] = { '-','%','u',0 };
4020 WCHAR buf[26];
4021 SID *pisid = psid;
4023 if( !IsValidSid( psid ) || pisid->Revision != SDDL_REVISION)
4025 SetLastError(ERROR_INVALID_SID);
4026 return FALSE;
4029 if (pisid->IdentifierAuthority.Value[0] ||
4030 pisid->IdentifierAuthority.Value[1])
4032 FIXME("not matching MS' bugs\n");
4033 SetLastError(ERROR_INVALID_SID);
4034 return FALSE;
4037 sprintfW( buf, fmt, pisid->Revision,
4038 MAKELONG(
4039 MAKEWORD( pisid->IdentifierAuthority.Value[5],
4040 pisid->IdentifierAuthority.Value[4] ),
4041 MAKEWORD( pisid->IdentifierAuthority.Value[3],
4042 pisid->IdentifierAuthority.Value[2] )
4043 ) );
4044 DumpString(buf, -1, pwptr, plen);
4046 for( i=0; i<pisid->SubAuthorityCount; i++ )
4048 sprintfW( buf, subauthfmt, pisid->SubAuthority[i] );
4049 DumpString(buf, -1, pwptr, plen);
4051 return TRUE;
4054 static BOOL DumpSid(PSID psid, WCHAR **pwptr, ULONG *plen)
4056 size_t i;
4057 for (i = 0; i < sizeof(WellKnownSids) / sizeof(WellKnownSids[0]); i++)
4059 if (WellKnownSids[i].wstr[0] && EqualSid(psid, (PSID)&(WellKnownSids[i].Sid.Revision)))
4061 DumpString(WellKnownSids[i].wstr, 2, pwptr, plen);
4062 return TRUE;
4066 return DumpSidNumeric(psid, pwptr, plen);
4069 static const LPCWSTR AceRightBitNames[32] = {
4070 SDDL_CREATE_CHILD, /* 0 */
4071 SDDL_DELETE_CHILD,
4072 SDDL_LIST_CHILDREN,
4073 SDDL_SELF_WRITE,
4074 SDDL_READ_PROPERTY, /* 4 */
4075 SDDL_WRITE_PROPERTY,
4076 SDDL_DELETE_TREE,
4077 SDDL_LIST_OBJECT,
4078 SDDL_CONTROL_ACCESS, /* 8 */
4079 NULL,
4080 NULL,
4081 NULL,
4082 NULL, /* 12 */
4083 NULL,
4084 NULL,
4085 NULL,
4086 SDDL_STANDARD_DELETE, /* 16 */
4087 SDDL_READ_CONTROL,
4088 SDDL_WRITE_DAC,
4089 SDDL_WRITE_OWNER,
4090 NULL, /* 20 */
4091 NULL,
4092 NULL,
4093 NULL,
4094 NULL, /* 24 */
4095 NULL,
4096 NULL,
4097 NULL,
4098 SDDL_GENERIC_ALL, /* 28 */
4099 SDDL_GENERIC_EXECUTE,
4100 SDDL_GENERIC_WRITE,
4101 SDDL_GENERIC_READ
4104 static void DumpRights(DWORD mask, WCHAR **pwptr, ULONG *plen)
4106 static const WCHAR fmtW[] = {'0','x','%','x',0};
4107 WCHAR buf[15];
4108 size_t i;
4110 if (mask == 0)
4111 return;
4113 /* first check if the right have name */
4114 for (i = 0; i < sizeof(AceRights)/sizeof(AceRights[0]); i++)
4116 if (AceRights[i].wstr == NULL)
4117 break;
4118 if (mask == AceRights[i].value)
4120 DumpString(AceRights[i].wstr, -1, pwptr, plen);
4121 return;
4125 /* then check if it can be built from bit names */
4126 for (i = 0; i < 32; i++)
4128 if ((mask & (1 << i)) && (AceRightBitNames[i] == NULL))
4130 /* can't be built from bit names */
4131 sprintfW(buf, fmtW, mask);
4132 DumpString(buf, -1, pwptr, plen);
4133 return;
4137 /* build from bit names */
4138 for (i = 0; i < 32; i++)
4139 if (mask & (1 << i))
4140 DumpString(AceRightBitNames[i], -1, pwptr, plen);
4143 static BOOL DumpAce(LPVOID pace, WCHAR **pwptr, ULONG *plen)
4145 ACCESS_ALLOWED_ACE *piace; /* all the supported ACEs have the same memory layout */
4146 static const WCHAR openbr = '(';
4147 static const WCHAR closebr = ')';
4148 static const WCHAR semicolon = ';';
4150 if (((PACE_HEADER)pace)->AceType > SYSTEM_ALARM_ACE_TYPE || ((PACE_HEADER)pace)->AceSize < sizeof(ACCESS_ALLOWED_ACE))
4152 SetLastError(ERROR_INVALID_ACL);
4153 return FALSE;
4156 piace = (ACCESS_ALLOWED_ACE *)pace;
4157 DumpString(&openbr, 1, pwptr, plen);
4158 switch (piace->Header.AceType)
4160 case ACCESS_ALLOWED_ACE_TYPE:
4161 DumpString(SDDL_ACCESS_ALLOWED, -1, pwptr, plen);
4162 break;
4163 case ACCESS_DENIED_ACE_TYPE:
4164 DumpString(SDDL_ACCESS_DENIED, -1, pwptr, plen);
4165 break;
4166 case SYSTEM_AUDIT_ACE_TYPE:
4167 DumpString(SDDL_AUDIT, -1, pwptr, plen);
4168 break;
4169 case SYSTEM_ALARM_ACE_TYPE:
4170 DumpString(SDDL_ALARM, -1, pwptr, plen);
4171 break;
4173 DumpString(&semicolon, 1, pwptr, plen);
4175 if (piace->Header.AceFlags & OBJECT_INHERIT_ACE)
4176 DumpString(SDDL_OBJECT_INHERIT, -1, pwptr, plen);
4177 if (piace->Header.AceFlags & CONTAINER_INHERIT_ACE)
4178 DumpString(SDDL_CONTAINER_INHERIT, -1, pwptr, plen);
4179 if (piace->Header.AceFlags & NO_PROPAGATE_INHERIT_ACE)
4180 DumpString(SDDL_NO_PROPAGATE, -1, pwptr, plen);
4181 if (piace->Header.AceFlags & INHERIT_ONLY_ACE)
4182 DumpString(SDDL_INHERIT_ONLY, -1, pwptr, plen);
4183 if (piace->Header.AceFlags & INHERITED_ACE)
4184 DumpString(SDDL_INHERITED, -1, pwptr, plen);
4185 if (piace->Header.AceFlags & SUCCESSFUL_ACCESS_ACE_FLAG)
4186 DumpString(SDDL_AUDIT_SUCCESS, -1, pwptr, plen);
4187 if (piace->Header.AceFlags & FAILED_ACCESS_ACE_FLAG)
4188 DumpString(SDDL_AUDIT_FAILURE, -1, pwptr, plen);
4189 DumpString(&semicolon, 1, pwptr, plen);
4190 DumpRights(piace->Mask, pwptr, plen);
4191 DumpString(&semicolon, 1, pwptr, plen);
4192 /* objects not supported */
4193 DumpString(&semicolon, 1, pwptr, plen);
4194 /* objects not supported */
4195 DumpString(&semicolon, 1, pwptr, plen);
4196 if (!DumpSid((PSID)&piace->SidStart, pwptr, plen))
4197 return FALSE;
4198 DumpString(&closebr, 1, pwptr, plen);
4199 return TRUE;
4202 static BOOL DumpAcl(PACL pacl, WCHAR **pwptr, ULONG *plen, BOOL protected, BOOL autoInheritReq, BOOL autoInherited)
4204 WORD count;
4205 int i;
4207 if (protected)
4208 DumpString(SDDL_PROTECTED, -1, pwptr, plen);
4209 if (autoInheritReq)
4210 DumpString(SDDL_AUTO_INHERIT_REQ, -1, pwptr, plen);
4211 if (autoInherited)
4212 DumpString(SDDL_AUTO_INHERITED, -1, pwptr, plen);
4214 if (pacl == NULL)
4215 return TRUE;
4217 if (!IsValidAcl(pacl))
4218 return FALSE;
4220 count = pacl->AceCount;
4221 for (i = 0; i < count; i++)
4223 LPVOID ace;
4224 if (!GetAce(pacl, i, &ace))
4225 return FALSE;
4226 if (!DumpAce(ace, pwptr, plen))
4227 return FALSE;
4230 return TRUE;
4233 static BOOL DumpOwner(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4235 static const WCHAR prefix[] = {'O',':',0};
4236 BOOL bDefaulted;
4237 PSID psid;
4239 if (!GetSecurityDescriptorOwner(SecurityDescriptor, &psid, &bDefaulted))
4240 return FALSE;
4242 if (psid == NULL)
4243 return TRUE;
4245 DumpString(prefix, -1, pwptr, plen);
4246 if (!DumpSid(psid, pwptr, plen))
4247 return FALSE;
4248 return TRUE;
4251 static BOOL DumpGroup(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4253 static const WCHAR prefix[] = {'G',':',0};
4254 BOOL bDefaulted;
4255 PSID psid;
4257 if (!GetSecurityDescriptorGroup(SecurityDescriptor, &psid, &bDefaulted))
4258 return FALSE;
4260 if (psid == NULL)
4261 return TRUE;
4263 DumpString(prefix, -1, pwptr, plen);
4264 if (!DumpSid(psid, pwptr, plen))
4265 return FALSE;
4266 return TRUE;
4269 static BOOL DumpDacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4271 static const WCHAR dacl[] = {'D',':',0};
4272 SECURITY_DESCRIPTOR_CONTROL control;
4273 BOOL present, defaulted;
4274 DWORD revision;
4275 PACL pacl;
4277 if (!GetSecurityDescriptorDacl(SecurityDescriptor, &present, &pacl, &defaulted))
4278 return FALSE;
4280 if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4281 return FALSE;
4283 if (!present)
4284 return TRUE;
4286 DumpString(dacl, 2, pwptr, plen);
4287 if (!DumpAcl(pacl, pwptr, plen, control & SE_DACL_PROTECTED, control & SE_DACL_AUTO_INHERIT_REQ, control & SE_DACL_AUTO_INHERITED))
4288 return FALSE;
4289 return TRUE;
4292 static BOOL DumpSacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4294 static const WCHAR sacl[] = {'S',':',0};
4295 SECURITY_DESCRIPTOR_CONTROL control;
4296 BOOL present, defaulted;
4297 DWORD revision;
4298 PACL pacl;
4300 if (!GetSecurityDescriptorSacl(SecurityDescriptor, &present, &pacl, &defaulted))
4301 return FALSE;
4303 if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4304 return FALSE;
4306 if (!present)
4307 return TRUE;
4309 DumpString(sacl, 2, pwptr, plen);
4310 if (!DumpAcl(pacl, pwptr, plen, control & SE_SACL_PROTECTED, control & SE_SACL_AUTO_INHERIT_REQ, control & SE_SACL_AUTO_INHERITED))
4311 return FALSE;
4312 return TRUE;
4315 /******************************************************************************
4316 * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4318 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorW(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION RequestedInformation, LPWSTR *OutputString, PULONG OutputLen)
4320 ULONG len;
4321 WCHAR *wptr, *wstr;
4323 if (SDRevision != SDDL_REVISION_1)
4325 ERR("Pogram requested unknown SDDL revision %d\n", SDRevision);
4326 SetLastError(ERROR_UNKNOWN_REVISION);
4327 return FALSE;
4330 len = 0;
4331 if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4332 if (!DumpOwner(SecurityDescriptor, NULL, &len))
4333 return FALSE;
4334 if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4335 if (!DumpGroup(SecurityDescriptor, NULL, &len))
4336 return FALSE;
4337 if (RequestedInformation & DACL_SECURITY_INFORMATION)
4338 if (!DumpDacl(SecurityDescriptor, NULL, &len))
4339 return FALSE;
4340 if (RequestedInformation & SACL_SECURITY_INFORMATION)
4341 if (!DumpSacl(SecurityDescriptor, NULL, &len))
4342 return FALSE;
4344 wstr = wptr = LocalAlloc(0, (len + 1)*sizeof(WCHAR));
4345 if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4346 if (!DumpOwner(SecurityDescriptor, &wptr, NULL))
4347 return FALSE;
4348 if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4349 if (!DumpGroup(SecurityDescriptor, &wptr, NULL))
4350 return FALSE;
4351 if (RequestedInformation & DACL_SECURITY_INFORMATION)
4352 if (!DumpDacl(SecurityDescriptor, &wptr, NULL))
4353 return FALSE;
4354 if (RequestedInformation & SACL_SECURITY_INFORMATION)
4355 if (!DumpSacl(SecurityDescriptor, &wptr, NULL))
4356 return FALSE;
4357 *wptr = 0;
4359 TRACE("ret: %s, %d\n", wine_dbgstr_w(wstr), len);
4360 *OutputString = wstr;
4361 if (OutputLen)
4362 *OutputLen = strlenW(*OutputString)+1;
4363 return TRUE;
4366 /******************************************************************************
4367 * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4369 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorA(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION Information, LPSTR *OutputString, PULONG OutputLen)
4371 LPWSTR wstr;
4372 ULONG len;
4373 if (ConvertSecurityDescriptorToStringSecurityDescriptorW(SecurityDescriptor, SDRevision, Information, &wstr, &len))
4375 int lenA;
4377 lenA = WideCharToMultiByte(CP_ACP, 0, wstr, len, NULL, 0, NULL, NULL);
4378 *OutputString = HeapAlloc(GetProcessHeap(), 0, lenA);
4379 WideCharToMultiByte(CP_ACP, 0, wstr, len, *OutputString, lenA, NULL, NULL);
4380 LocalFree(wstr);
4382 if (OutputLen != NULL)
4383 *OutputLen = lenA;
4384 return TRUE;
4386 else
4388 *OutputString = NULL;
4389 if (OutputLen)
4390 *OutputLen = 0;
4391 return FALSE;
4395 /******************************************************************************
4396 * ConvertStringSidToSidW [ADVAPI32.@]
4398 BOOL WINAPI ConvertStringSidToSidW(LPCWSTR StringSid, PSID* Sid)
4400 BOOL bret = FALSE;
4401 DWORD cBytes;
4403 TRACE("%s, %p\n", debugstr_w(StringSid), Sid);
4404 if (GetVersion() & 0x80000000)
4405 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4406 else if (!StringSid || !Sid)
4407 SetLastError(ERROR_INVALID_PARAMETER);
4408 else if (ParseStringSidToSid(StringSid, NULL, &cBytes))
4410 PSID pSid = *Sid = LocalAlloc(0, cBytes);
4412 bret = ParseStringSidToSid(StringSid, pSid, &cBytes);
4413 if (!bret)
4414 LocalFree(*Sid);
4416 TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
4417 return bret;
4420 /******************************************************************************
4421 * ConvertStringSidToSidA [ADVAPI32.@]
4423 BOOL WINAPI ConvertStringSidToSidA(LPCSTR StringSid, PSID* Sid)
4425 BOOL bret = FALSE;
4427 TRACE("%s, %p\n", debugstr_a(StringSid), Sid);
4428 if (GetVersion() & 0x80000000)
4429 SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4430 else if (!StringSid || !Sid)
4431 SetLastError(ERROR_INVALID_PARAMETER);
4432 else
4434 UINT len = MultiByteToWideChar(CP_ACP, 0, StringSid, -1, NULL, 0);
4435 LPWSTR wStringSid = HeapAlloc(GetProcessHeap(), 0,
4436 len * sizeof(WCHAR));
4438 MultiByteToWideChar(CP_ACP, 0, StringSid, -1, wStringSid, len);
4439 bret = ConvertStringSidToSidW(wStringSid, Sid);
4440 HeapFree(GetProcessHeap(), 0, wStringSid);
4442 TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
4443 return bret;
4446 /******************************************************************************
4447 * ConvertSidToStringSidW [ADVAPI32.@]
4449 * format of SID string is:
4450 * S-<count>-<auth>-<subauth1>-<subauth2>-<subauth3>...
4451 * where
4452 * <rev> is the revision of the SID encoded as decimal
4453 * <auth> is the identifier authority encoded as hex
4454 * <subauthN> is the subauthority id encoded as decimal
4456 BOOL WINAPI ConvertSidToStringSidW( PSID pSid, LPWSTR *pstr )
4458 DWORD len = 0;
4459 LPWSTR wstr, wptr;
4461 TRACE("%p %p\n", pSid, pstr );
4463 len = 0;
4464 if (!DumpSidNumeric(pSid, NULL, &len))
4465 return FALSE;
4466 wstr = wptr = LocalAlloc(0, (len+1) * sizeof(WCHAR));
4467 DumpSidNumeric(pSid, &wptr, NULL);
4468 *wptr = 0;
4470 *pstr = wstr;
4471 return TRUE;
4474 /******************************************************************************
4475 * ConvertSidToStringSidA [ADVAPI32.@]
4477 BOOL WINAPI ConvertSidToStringSidA(PSID pSid, LPSTR *pstr)
4479 LPWSTR wstr = NULL;
4480 LPSTR str;
4481 UINT len;
4483 TRACE("%p %p\n", pSid, pstr );
4485 if( !ConvertSidToStringSidW( pSid, &wstr ) )
4486 return FALSE;
4488 len = WideCharToMultiByte( CP_ACP, 0, wstr, -1, NULL, 0, NULL, NULL );
4489 str = LocalAlloc( 0, len );
4490 WideCharToMultiByte( CP_ACP, 0, wstr, -1, str, len, NULL, NULL );
4491 LocalFree( wstr );
4493 *pstr = str;
4495 return TRUE;
4498 BOOL WINAPI CreatePrivateObjectSecurity(
4499 PSECURITY_DESCRIPTOR ParentDescriptor,
4500 PSECURITY_DESCRIPTOR CreatorDescriptor,
4501 PSECURITY_DESCRIPTOR* NewDescriptor,
4502 BOOL IsDirectoryObject,
4503 HANDLE Token,
4504 PGENERIC_MAPPING GenericMapping )
4506 FIXME("%p %p %p %d %p %p - stub\n", ParentDescriptor, CreatorDescriptor,
4507 NewDescriptor, IsDirectoryObject, Token, GenericMapping);
4509 return FALSE;
4512 BOOL WINAPI DestroyPrivateObjectSecurity( PSECURITY_DESCRIPTOR* ObjectDescriptor )
4514 FIXME("%p - stub\n", ObjectDescriptor);
4516 return TRUE;
4519 BOOL WINAPI CreateProcessAsUserA(
4520 HANDLE hToken,
4521 LPCSTR lpApplicationName,
4522 LPSTR lpCommandLine,
4523 LPSECURITY_ATTRIBUTES lpProcessAttributes,
4524 LPSECURITY_ATTRIBUTES lpThreadAttributes,
4525 BOOL bInheritHandles,
4526 DWORD dwCreationFlags,
4527 LPVOID lpEnvironment,
4528 LPCSTR lpCurrentDirectory,
4529 LPSTARTUPINFOA lpStartupInfo,
4530 LPPROCESS_INFORMATION lpProcessInformation )
4532 FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - stub\n", hToken, debugstr_a(lpApplicationName),
4533 debugstr_a(lpCommandLine), lpProcessAttributes, lpThreadAttributes, bInheritHandles,
4534 dwCreationFlags, lpEnvironment, debugstr_a(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
4536 return FALSE;
4539 BOOL WINAPI CreateProcessAsUserW(
4540 HANDLE hToken,
4541 LPCWSTR lpApplicationName,
4542 LPWSTR lpCommandLine,
4543 LPSECURITY_ATTRIBUTES lpProcessAttributes,
4544 LPSECURITY_ATTRIBUTES lpThreadAttributes,
4545 BOOL bInheritHandles,
4546 DWORD dwCreationFlags,
4547 LPVOID lpEnvironment,
4548 LPCWSTR lpCurrentDirectory,
4549 LPSTARTUPINFOW lpStartupInfo,
4550 LPPROCESS_INFORMATION lpProcessInformation )
4552 FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - semi- stub\n", hToken,
4553 debugstr_w(lpApplicationName), debugstr_w(lpCommandLine), lpProcessAttributes,
4554 lpThreadAttributes, bInheritHandles, dwCreationFlags, lpEnvironment,
4555 debugstr_w(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
4557 /* We should create the process with a suspended main thread */
4558 if (!CreateProcessW (lpApplicationName,
4559 lpCommandLine,
4560 lpProcessAttributes,
4561 lpThreadAttributes,
4562 bInheritHandles,
4563 dwCreationFlags, /* CREATE_SUSPENDED */
4564 lpEnvironment,
4565 lpCurrentDirectory,
4566 lpStartupInfo,
4567 lpProcessInformation))
4569 return FALSE;
4572 return TRUE;
4575 /******************************************************************************
4576 * CreateProcessWithLogonW
4578 BOOL WINAPI CreateProcessWithLogonW( LPCWSTR lpUsername, LPCWSTR lpDomain, LPCWSTR lpPassword, DWORD dwLogonFlags,
4579 LPCWSTR lpApplicationName, LPWSTR lpCommandLine, DWORD dwCreationFlags, LPVOID lpEnvironment,
4580 LPCWSTR lpCurrentDirectory, LPSTARTUPINFOW lpStartupInfo, LPPROCESS_INFORMATION lpProcessInformation )
4582 FIXME("%s %s %s 0x%08x %s %s 0x%08x %p %s %p %p stub\n", debugstr_w(lpUsername), debugstr_w(lpDomain),
4583 debugstr_w(lpPassword), dwLogonFlags, debugstr_w(lpApplicationName),
4584 debugstr_w(lpCommandLine), dwCreationFlags, lpEnvironment, debugstr_w(lpCurrentDirectory),
4585 lpStartupInfo, lpProcessInformation);
4587 return FALSE;
4590 /******************************************************************************
4591 * DuplicateTokenEx [ADVAPI32.@]
4593 BOOL WINAPI DuplicateTokenEx(
4594 HANDLE ExistingTokenHandle, DWORD dwDesiredAccess,
4595 LPSECURITY_ATTRIBUTES lpTokenAttributes,
4596 SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
4597 TOKEN_TYPE TokenType,
4598 PHANDLE DuplicateTokenHandle )
4600 OBJECT_ATTRIBUTES ObjectAttributes;
4602 TRACE("%p 0x%08x 0x%08x 0x%08x %p\n", ExistingTokenHandle, dwDesiredAccess,
4603 ImpersonationLevel, TokenType, DuplicateTokenHandle);
4605 InitializeObjectAttributes(
4606 &ObjectAttributes,
4607 NULL,
4608 (lpTokenAttributes && lpTokenAttributes->bInheritHandle) ? OBJ_INHERIT : 0,
4609 NULL,
4610 lpTokenAttributes ? lpTokenAttributes->lpSecurityDescriptor : NULL );
4612 return set_ntstatus( NtDuplicateToken( ExistingTokenHandle,
4613 dwDesiredAccess,
4614 &ObjectAttributes,
4615 ImpersonationLevel,
4616 TokenType,
4617 DuplicateTokenHandle ) );
4620 BOOL WINAPI DuplicateToken(
4621 HANDLE ExistingTokenHandle,
4622 SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
4623 PHANDLE DuplicateTokenHandle )
4625 return DuplicateTokenEx( ExistingTokenHandle, TOKEN_IMPERSONATE | TOKEN_QUERY,
4626 NULL, ImpersonationLevel, TokenImpersonation,
4627 DuplicateTokenHandle );
4630 /******************************************************************************
4631 * ComputeStringSidSize
4633 static DWORD ComputeStringSidSize(LPCWSTR StringSid)
4635 if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I(-S)+ */
4637 int ctok = 0;
4638 while (*StringSid)
4640 if (*StringSid == '-')
4641 ctok++;
4642 StringSid++;
4645 if (ctok >= 3)
4646 return GetSidLengthRequired(ctok - 2);
4648 else /* String constant format - Only available in winxp and above */
4650 unsigned int i;
4652 for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
4653 if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
4654 return GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
4657 return GetSidLengthRequired(0);
4660 /******************************************************************************
4661 * ParseStringSidToSid
4663 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes)
4665 BOOL bret = FALSE;
4666 SID* pisid=pSid;
4668 TRACE("%s, %p, %p\n", debugstr_w(StringSid), pSid, cBytes);
4669 if (!StringSid)
4671 SetLastError(ERROR_INVALID_PARAMETER);
4672 TRACE("StringSid is NULL, returning FALSE\n");
4673 return FALSE;
4676 *cBytes = ComputeStringSidSize(StringSid);
4677 if (!pisid) /* Simply compute the size */
4679 TRACE("only size requested, returning TRUE\n");
4680 return TRUE;
4683 if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I-S-S */
4685 DWORD i = 0, identAuth;
4686 DWORD csubauth = ((*cBytes - GetSidLengthRequired(0)) / sizeof(DWORD));
4688 StringSid += 2; /* Advance to Revision */
4689 pisid->Revision = atoiW(StringSid);
4691 if (pisid->Revision != SDDL_REVISION)
4693 TRACE("Revision %d is unknown\n", pisid->Revision);
4694 goto lend; /* ERROR_INVALID_SID */
4696 if (csubauth == 0)
4698 TRACE("SubAuthorityCount is 0\n");
4699 goto lend; /* ERROR_INVALID_SID */
4702 pisid->SubAuthorityCount = csubauth;
4704 /* Advance to identifier authority */
4705 while (*StringSid && *StringSid != '-')
4706 StringSid++;
4707 if (*StringSid == '-')
4708 StringSid++;
4710 /* MS' implementation can't handle values greater than 2^32 - 1, so
4711 * we don't either; assume most significant bytes are always 0
4713 pisid->IdentifierAuthority.Value[0] = 0;
4714 pisid->IdentifierAuthority.Value[1] = 0;
4715 identAuth = atoiW(StringSid);
4716 pisid->IdentifierAuthority.Value[5] = identAuth & 0xff;
4717 pisid->IdentifierAuthority.Value[4] = (identAuth & 0xff00) >> 8;
4718 pisid->IdentifierAuthority.Value[3] = (identAuth & 0xff0000) >> 16;
4719 pisid->IdentifierAuthority.Value[2] = (identAuth & 0xff000000) >> 24;
4721 /* Advance to first sub authority */
4722 while (*StringSid && *StringSid != '-')
4723 StringSid++;
4724 if (*StringSid == '-')
4725 StringSid++;
4727 while (*StringSid)
4729 pisid->SubAuthority[i++] = atoiW(StringSid);
4731 while (*StringSid && *StringSid != '-')
4732 StringSid++;
4733 if (*StringSid == '-')
4734 StringSid++;
4737 if (i != pisid->SubAuthorityCount)
4738 goto lend; /* ERROR_INVALID_SID */
4740 bret = TRUE;
4742 else /* String constant format - Only available in winxp and above */
4744 unsigned int i;
4745 pisid->Revision = SDDL_REVISION;
4747 for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
4748 if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
4750 DWORD j;
4751 pisid->SubAuthorityCount = WellKnownSids[i].Sid.SubAuthorityCount;
4752 pisid->IdentifierAuthority = WellKnownSids[i].Sid.IdentifierAuthority;
4753 for (j = 0; j < WellKnownSids[i].Sid.SubAuthorityCount; j++)
4754 pisid->SubAuthority[j] = WellKnownSids[i].Sid.SubAuthority[j];
4755 bret = TRUE;
4758 if (!bret)
4759 FIXME("String constant not supported: %s\n", debugstr_wn(StringSid, 2));
4762 lend:
4763 if (!bret)
4764 SetLastError(ERROR_INVALID_SID);
4766 TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
4767 return bret;
4770 /******************************************************************************
4771 * GetNamedSecurityInfoA [ADVAPI32.@]
4773 DWORD WINAPI GetNamedSecurityInfoA(LPSTR pObjectName,
4774 SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
4775 PSID* ppsidOwner, PSID* ppsidGroup, PACL* ppDacl, PACL* ppSacl,
4776 PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
4778 DWORD len;
4779 LPWSTR wstr = NULL;
4780 DWORD r;
4782 TRACE("%s %d %d %p %p %p %p %p\n", pObjectName, ObjectType, SecurityInfo,
4783 ppsidOwner, ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor);
4785 if( pObjectName )
4787 len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
4788 wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
4789 MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
4792 r = GetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, ppsidOwner,
4793 ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor );
4795 HeapFree( GetProcessHeap(), 0, wstr );
4797 return r;
4800 /******************************************************************************
4801 * GetNamedSecurityInfoW [ADVAPI32.@]
4803 DWORD WINAPI GetNamedSecurityInfoW( LPWSTR name, SE_OBJECT_TYPE type,
4804 SECURITY_INFORMATION info, PSID* owner, PSID* group, PACL* dacl,
4805 PACL* sacl, PSECURITY_DESCRIPTOR* descriptor )
4807 DWORD needed, offset;
4808 SECURITY_DESCRIPTOR_RELATIVE *relative;
4809 BYTE *buffer;
4811 TRACE( "%s %d %d %p %p %p %p %p\n", debugstr_w(name), type, info, owner,
4812 group, dacl, sacl, descriptor );
4814 if (!name || !descriptor) return ERROR_INVALID_PARAMETER;
4816 needed = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
4817 if (info & OWNER_SECURITY_INFORMATION)
4818 needed += sizeof(sidWorld);
4819 if (info & GROUP_SECURITY_INFORMATION)
4820 needed += sizeof(sidWorld);
4821 if (info & DACL_SECURITY_INFORMATION)
4822 needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
4823 if (info & SACL_SECURITY_INFORMATION)
4824 needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
4826 /* must be freed by caller */
4827 *descriptor = HeapAlloc( GetProcessHeap(), 0, needed );
4828 if (!*descriptor) return ERROR_NOT_ENOUGH_MEMORY;
4830 if (!InitializeSecurityDescriptor( *descriptor, SECURITY_DESCRIPTOR_REVISION ))
4832 HeapFree( GetProcessHeap(), 0, *descriptor );
4833 return ERROR_INVALID_SECURITY_DESCR;
4836 relative = (SECURITY_DESCRIPTOR_RELATIVE *)*descriptor;
4837 relative->Control |= SE_SELF_RELATIVE;
4838 buffer = (BYTE *)relative;
4839 offset = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
4841 if (info & OWNER_SECURITY_INFORMATION)
4843 memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
4844 relative->Owner = offset;
4845 if (owner)
4846 *owner = buffer + offset;
4847 offset += sizeof(sidWorld);
4849 if (info & GROUP_SECURITY_INFORMATION)
4851 memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
4852 relative->Group = offset;
4853 if (group)
4854 *group = buffer + offset;
4855 offset += sizeof(sidWorld);
4857 if (info & DACL_SECURITY_INFORMATION)
4859 relative->Control |= SE_DACL_PRESENT;
4860 GetWorldAccessACL( (PACL)(buffer + offset) );
4861 relative->Dacl = offset;
4862 if (dacl)
4863 *dacl = (PACL)(buffer + offset);
4864 offset += WINE_SIZE_OF_WORLD_ACCESS_ACL;
4866 if (info & SACL_SECURITY_INFORMATION)
4868 relative->Control |= SE_SACL_PRESENT;
4869 GetWorldAccessACL( (PACL)(buffer + offset) );
4870 relative->Sacl = offset;
4871 if (sacl)
4872 *sacl = (PACL)(buffer + offset);
4874 return ERROR_SUCCESS;
4877 /******************************************************************************
4878 * DecryptFileW [ADVAPI32.@]
4880 BOOL WINAPI DecryptFileW(LPCWSTR lpFileName, DWORD dwReserved)
4882 FIXME("%s %08x\n", debugstr_w(lpFileName), dwReserved);
4883 return TRUE;
4886 /******************************************************************************
4887 * DecryptFileA [ADVAPI32.@]
4889 BOOL WINAPI DecryptFileA(LPCSTR lpFileName, DWORD dwReserved)
4891 FIXME("%s %08x\n", debugstr_a(lpFileName), dwReserved);
4892 return TRUE;
4895 /******************************************************************************
4896 * EncryptFileW [ADVAPI32.@]
4898 BOOL WINAPI EncryptFileW(LPCWSTR lpFileName)
4900 FIXME("%s\n", debugstr_w(lpFileName));
4901 return TRUE;
4904 /******************************************************************************
4905 * EncryptFileA [ADVAPI32.@]
4907 BOOL WINAPI EncryptFileA(LPCSTR lpFileName)
4909 FIXME("%s\n", debugstr_a(lpFileName));
4910 return TRUE;
4913 /******************************************************************************
4914 * FileEncryptionStatusW [ADVAPI32.@]
4916 BOOL WINAPI FileEncryptionStatusW(LPCWSTR lpFileName, LPDWORD lpStatus)
4918 FIXME("(%s %p): stub\n", debugstr_w(lpFileName), lpStatus);
4919 if (!lpStatus)
4920 return FALSE;
4921 *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
4922 return TRUE;
4925 /******************************************************************************
4926 * FileEncryptionStatusA [ADVAPI32.@]
4928 BOOL WINAPI FileEncryptionStatusA(LPCSTR lpFileName, LPDWORD lpStatus)
4930 FIXME("(%s %p): stub\n", debugstr_a(lpFileName), lpStatus);
4931 if (!lpStatus)
4932 return FALSE;
4933 *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
4934 return TRUE;
4937 /******************************************************************************
4938 * SetSecurityInfo [ADVAPI32.@]
4940 DWORD WINAPI SetSecurityInfo(HANDLE handle, SE_OBJECT_TYPE ObjectType,
4941 SECURITY_INFORMATION SecurityInfo, PSID psidOwner,
4942 PSID psidGroup, PACL pDacl, PACL pSacl) {
4943 FIXME("stub\n");
4944 return ERROR_SUCCESS;