2 * Implementation of the Local Security Authority API
4 * Copyright 1999 Juergen Schmied
5 * Copyright 2002 Andriy Palamarchuk
6 * Copyright 2004 Mike McCormack
7 * Copyright 2005 Hans Leidekker
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
27 #define WIN32_NO_STATUS
33 #include "advapi32_misc.h"
35 #include "wine/debug.h"
36 #include "wine/unicode.h"
38 WINE_DEFAULT_DEBUG_CHANNEL(advapi
);
40 #define ADVAPI_ForceLocalComputer(ServerName, FailureCode) \
41 if (!ADVAPI_IsLocalComputer(ServerName)) \
43 FIXME("Action Implemented for local computer only. " \
44 "Requested for server %s\n", debugstr_w(ServerName)); \
48 static void dumpLsaAttributes(const LSA_OBJECT_ATTRIBUTES
*oa
)
52 TRACE("\n\tlength=%u, rootdir=%p, objectname=%s\n\tattr=0x%08x, sid=%s qos=%p\n",
53 oa
->Length
, oa
->RootDirectory
,
54 oa
->ObjectName
?debugstr_w(oa
->ObjectName
->Buffer
):"null",
55 oa
->Attributes
, debugstr_sid(oa
->SecurityDescriptor
),
56 oa
->SecurityQualityOfService
);
60 static void* ADVAPI_GetDomainName(unsigned sz
, unsigned ofs
)
67 static const WCHAR wVNETSUP
[] = {
68 'S','y','s','t','e','m','\\',
69 'C','u','r','r','e','n','t','C','o','n','t','r','o','l','S','e','t','\\',
70 'S','e','r','v','i','c','e','s','\\',
71 'V','x','D','\\','V','N','E','T','S','U','P','\0'};
73 ret
= RegOpenKeyExW(HKEY_LOCAL_MACHINE
, wVNETSUP
, 0, KEY_READ
, &key
);
74 if (ret
== ERROR_SUCCESS
)
77 static const WCHAR wg
[] = { 'W','o','r','k','g','r','o','u','p',0 };
79 ret
= RegQueryValueExW(key
, wg
, NULL
, NULL
, NULL
, &size
);
80 if (ret
== ERROR_MORE_DATA
|| ret
== ERROR_SUCCESS
)
82 ptr
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sz
+ size
);
83 if (!ptr
) return NULL
;
84 ustr
= (UNICODE_STRING
*)(ptr
+ ofs
);
85 ustr
->MaximumLength
= size
;
86 ustr
->Buffer
= (WCHAR
*)(ptr
+ sz
);
87 ret
= RegQueryValueExW(key
, wg
, NULL
, NULL
, (LPBYTE
)ustr
->Buffer
, &size
);
88 if (ret
!= ERROR_SUCCESS
)
90 HeapFree(GetProcessHeap(), 0, ptr
);
93 else ustr
->Length
= size
- sizeof(WCHAR
);
99 static const WCHAR wDomain
[] = {'D','O','M','A','I','N','\0'};
100 ptr
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
,
101 sz
+ sizeof(wDomain
));
102 if (!ptr
) return NULL
;
103 ustr
= (UNICODE_STRING
*)(ptr
+ ofs
);
104 ustr
->MaximumLength
= sizeof(wDomain
);
105 ustr
->Buffer
= (WCHAR
*)(ptr
+ sz
);
106 ustr
->Length
= sizeof(wDomain
) - sizeof(WCHAR
);
107 memcpy(ustr
->Buffer
, wDomain
, sizeof(wDomain
));
112 /******************************************************************************
113 * LsaAddAccountRights [ADVAPI32.@]
116 NTSTATUS WINAPI
LsaAddAccountRights(
119 PLSA_UNICODE_STRING rights
,
122 FIXME("(%p,%p,%p,0x%08x) stub\n", policy
, sid
, rights
, count
);
123 return STATUS_OBJECT_NAME_NOT_FOUND
;
126 /******************************************************************************
127 * LsaClose [ADVAPI32.@]
129 * Closes a handle to a Policy or TrustedDomain.
132 * ObjectHandle [I] Handle to a Policy or TrustedDomain.
135 * Success: STATUS_SUCCESS.
136 * Failure: NTSTATUS code.
138 NTSTATUS WINAPI
LsaClose(IN LSA_HANDLE ObjectHandle
)
140 FIXME("(%p) stub\n", ObjectHandle
);
141 return STATUS_SUCCESS
;
144 /******************************************************************************
145 * LsaCreateTrustedDomainEx [ADVAPI32.@]
148 NTSTATUS WINAPI
LsaCreateTrustedDomainEx(
150 PTRUSTED_DOMAIN_INFORMATION_EX domain_info
,
151 PTRUSTED_DOMAIN_AUTH_INFORMATION auth_info
,
155 FIXME("(%p,%p,%p,0x%08x,%p) stub\n", policy
, domain_info
, auth_info
,
157 return STATUS_SUCCESS
;
160 /******************************************************************************
161 * LsaDeleteTrustedDomain [ADVAPI32.@]
164 NTSTATUS WINAPI
LsaDeleteTrustedDomain(LSA_HANDLE policy
, PSID sid
)
166 FIXME("(%p,%p) stub\n", policy
, sid
);
167 return STATUS_SUCCESS
;
170 /******************************************************************************
171 * LsaEnumerateAccountRights [ADVAPI32.@]
174 NTSTATUS WINAPI
LsaEnumerateAccountRights(
177 PLSA_UNICODE_STRING
*rights
,
180 FIXME("(%p,%p,%p,%p) stub\n", policy
, sid
, rights
, count
);
183 return STATUS_OBJECT_NAME_NOT_FOUND
;
186 /******************************************************************************
187 * LsaEnumerateAccountsWithUserRight [ADVAPI32.@]
190 NTSTATUS WINAPI
LsaEnumerateAccountsWithUserRight(
192 PLSA_UNICODE_STRING rights
,
196 FIXME("(%p,%p,%p,%p) stub\n", policy
, rights
, buffer
, count
);
197 return STATUS_NO_MORE_ENTRIES
;
200 /******************************************************************************
201 * LsaEnumerateTrustedDomains [ADVAPI32.@]
203 * Returns the names and SIDs of trusted domains.
206 * PolicyHandle [I] Handle to a Policy object.
207 * EnumerationContext [I] Pointer to an enumeration handle.
208 * Buffer [O] Contains the names and SIDs of trusted domains.
209 * PreferredMaximumLength[I] Preferred maximum size in bytes of Buffer.
210 * CountReturned [O] Number of elements in Buffer.
213 * Success: STATUS_SUCCESS,
214 * STATUS_MORE_ENTRIES,
215 * STATUS_NO_MORE_ENTRIES
216 * Failure: NTSTATUS code.
219 * LsaEnumerateTrustedDomains can be called multiple times to enumerate
220 * all trusted domains.
222 NTSTATUS WINAPI
LsaEnumerateTrustedDomains(
223 IN LSA_HANDLE PolicyHandle
,
224 IN PLSA_ENUMERATION_HANDLE EnumerationContext
,
226 IN ULONG PreferredMaximumLength
,
227 OUT PULONG CountReturned
)
229 FIXME("(%p,%p,%p,0x%08x,%p) stub\n", PolicyHandle
, EnumerationContext
,
230 Buffer
, PreferredMaximumLength
, CountReturned
);
232 if (CountReturned
) *CountReturned
= 0;
233 return STATUS_SUCCESS
;
236 /******************************************************************************
237 * LsaEnumerateTrustedDomainsEx [ADVAPI32.@]
240 NTSTATUS WINAPI
LsaEnumerateTrustedDomainsEx(
242 PLSA_ENUMERATION_HANDLE context
,
247 FIXME("(%p,%p,%p,0x%08x,%p) stub\n", policy
, context
, buffer
, length
, count
);
249 if (count
) *count
= 0;
250 return STATUS_SUCCESS
;
253 /******************************************************************************
254 * LsaFreeMemory [ADVAPI32.@]
256 * Frees memory allocated by a LSA function.
259 * Buffer [I] Memory buffer to free.
262 * Success: STATUS_SUCCESS.
263 * Failure: NTSTATUS code.
265 NTSTATUS WINAPI
LsaFreeMemory(IN PVOID Buffer
)
267 TRACE("(%p)\n", Buffer
);
269 HeapFree(GetProcessHeap(), 0, Buffer
);
270 return STATUS_SUCCESS
;
273 /******************************************************************************
274 * LsaLookupNames [ADVAPI32.@]
276 * Returns the SIDs of an array of user, group, or local group names.
279 * PolicyHandle [I] Handle to a Policy object.
280 * Count [I] Number of names in Names.
281 * Names [I] Array of names to lookup.
282 * ReferencedDomains [O] Array of domains where the names were found.
283 * Sids [O] Array of SIDs corresponding to Names.
286 * Success: STATUS_SUCCESS,
287 * STATUS_SOME_NOT_MAPPED
288 * Failure: STATUS_NONE_MAPPED or NTSTATUS code.
290 NTSTATUS WINAPI
LsaLookupNames(
291 IN LSA_HANDLE PolicyHandle
,
293 IN PLSA_UNICODE_STRING Names
,
294 OUT PLSA_REFERENCED_DOMAIN_LIST
* ReferencedDomains
,
295 OUT PLSA_TRANSLATED_SID
* Sids
)
297 FIXME("(%p,0x%08x,%p,%p,%p) stub\n", PolicyHandle
, Count
, Names
,
298 ReferencedDomains
, Sids
);
300 return STATUS_NONE_MAPPED
;
303 static BOOL
lookup_name( LSA_UNICODE_STRING
*name
, SID
*sid
, DWORD
*sid_size
, WCHAR
*domain
,
304 DWORD
*domain_size
, SID_NAME_USE
*use
, BOOL
*handled
)
308 ret
= lookup_local_wellknown_name( name
, sid
, sid_size
, domain
, domain_size
, use
, handled
);
310 ret
= lookup_local_user_name( name
, sid
, sid_size
, domain
, domain_size
, use
, handled
);
315 static INT
build_domain(PLSA_REFERENCED_DOMAIN_LIST currentList
, PLSA_UNICODE_STRING domain
)
318 ULONG sid_size
= 0,domain_size
= 0;
319 BOOL handled
= FALSE
;
322 for (count
= 0; count
< currentList
->Entries
; count
++)
324 if ((currentList
->Domains
[count
].Name
.Length
== domain
->Length
) &&
325 (strncmpiW(currentList
->Domains
[count
].Name
.Buffer
,domain
->Buffer
,(domain
->Length
/ sizeof(WCHAR
))) == 0))
327 HeapFree(GetProcessHeap(),0,domain
->Buffer
);
332 if (currentList
->Entries
> 0)
333 currentList
->Domains
= HeapReAlloc(GetProcessHeap(),0,currentList
->Domains
, (currentList
->Entries
+ 1) * sizeof(LSA_TRUST_INFORMATION
));
335 currentList
->Domains
= HeapAlloc(GetProcessHeap(),0,sizeof(LSA_TRUST_INFORMATION
));
337 currentList
->Domains
[currentList
->Entries
].Name
= *domain
;
339 lookup_name( domain
, NULL
, &sid_size
, NULL
, &domain_size
, &use
, &handled
);
341 currentList
->Domains
[currentList
->Entries
].Sid
= HeapAlloc(GetProcessHeap(),0,sid_size
);
342 lookup_name( domain
, currentList
->Domains
[currentList
->Entries
].Sid
, &sid_size
, NULL
, &domain_size
, &use
, &handled
);
344 currentList
->Entries
++;
345 return currentList
->Entries
-1;
348 /******************************************************************************
349 * LsaLookupNames2 [ADVAPI32.@]
352 NTSTATUS WINAPI
LsaLookupNames2( LSA_HANDLE policy
, ULONG flags
, ULONG count
,
353 PLSA_UNICODE_STRING names
, PLSA_REFERENCED_DOMAIN_LIST
*domains
,
354 PLSA_TRANSLATED_SID2
*sids
)
356 ULONG i
, sid_size_total
= 0, domain_size_max
= 0, size
;
357 ULONG sid_size
, domain_size
, mapped
;
358 BOOL handled
= FALSE
;
362 TRACE("(%p,0x%08x,0x%08x,%p,%p,%p)\n", policy
, flags
, count
, names
, domains
, sids
);
365 for (i
= 0; i
< count
; i
++)
368 sid_size
= domain_size
= 0;
369 lookup_name( &names
[i
], NULL
, &sid_size
, NULL
, &domain_size
, &use
, &handled
);
372 sid_size_total
+= sid_size
;
375 if (domain_size
> domain_size_max
)
376 domain_size_max
= domain_size
;
381 TRACE("mapped %u out of %u\n", mapped
, count
);
383 size
= sizeof(LSA_TRANSLATED_SID2
) * count
+ sid_size_total
;
384 if (!(*sids
= HeapAlloc( GetProcessHeap(), 0, size
) )) return STATUS_NO_MEMORY
;
386 sid
= (SID
*)(*sids
+ count
);
388 if (!(*domains
= HeapAlloc( GetProcessHeap(), 0, sizeof(LSA_REFERENCED_DOMAIN_LIST
) )))
390 HeapFree( GetProcessHeap(), 0, *sids
);
391 return STATUS_NO_MEMORY
;
393 (*domains
)->Entries
= 0;
394 (*domains
)->Domains
= NULL
;
396 for (i
= 0; i
< count
; i
++)
398 LSA_UNICODE_STRING domain
;
400 domain
.Length
= domain_size_max
*sizeof(WCHAR
);
401 domain
.MaximumLength
= domain_size_max
*sizeof(WCHAR
);
402 domain
.Buffer
= HeapAlloc(GetProcessHeap(),0,domain
.Length
);
404 (*sids
)[i
].Use
= SidTypeUnknown
;
405 (*sids
)[i
].DomainIndex
= -1;
406 (*sids
)[i
].Flags
= 0;
409 sid_size
= sid_size_total
;
410 domain_size
= domain_size_max
;
411 lookup_name( &names
[i
], sid
, &sid_size
, domain
.Buffer
, &domain_size
, &use
, &handled
);
414 (*sids
)[i
].Sid
= sid
;
415 (*sids
)[i
].Use
= use
;
417 sid
= (SID
*)((char *)sid
+ sid_size
);
418 sid_size_total
-= sid_size
;
421 domain
.Length
= domain_size
* sizeof(WCHAR
);
422 (*sids
)[i
].DomainIndex
= build_domain(*domains
, &domain
);
425 HeapFree(GetProcessHeap(),0,domain
.Buffer
);
428 HeapFree(GetProcessHeap(),0,domain
.Buffer
);
431 if (mapped
== count
) return STATUS_SUCCESS
;
432 if (mapped
> 0 && mapped
< count
) return STATUS_SOME_NOT_MAPPED
;
433 return STATUS_NONE_MAPPED
;
436 /******************************************************************************
437 * LsaLookupSids [ADVAPI32.@]
439 * Looks up the names that correspond to an array of SIDs.
442 * PolicyHandle [I] Handle to a Policy object.
443 * Count [I] Number of SIDs in the Sids array.
444 * Sids [I] Array of SIDs to lookup.
445 * ReferencedDomains [O] Array of domains where the sids were found.
446 * Names [O] Array of names corresponding to Sids.
449 * Success: STATUS_SUCCESS,
450 * STATUS_SOME_NOT_MAPPED
451 * Failure: STATUS_NONE_MAPPED or NTSTATUS code.
453 NTSTATUS WINAPI
LsaLookupSids(
454 IN LSA_HANDLE PolicyHandle
,
457 OUT PLSA_REFERENCED_DOMAIN_LIST
*ReferencedDomains
,
458 OUT PLSA_TRANSLATED_NAME
*Names
)
460 ULONG i
, mapped
, size
;
461 ULONG name_size
, domain_size
;
464 TRACE("(%p,%u,%p,%p,%p) stub\n", PolicyHandle
, Count
, Sids
,
465 ReferencedDomains
, Names
);
467 size
= sizeof(LSA_TRANSLATED_NAME
) * Count
;
468 if (!(*Names
= HeapAlloc( GetProcessHeap(), 0, size
) )) return STATUS_NO_MEMORY
;
469 if (!(*ReferencedDomains
= HeapAlloc( GetProcessHeap(), 0, sizeof(LSA_REFERENCED_DOMAIN_LIST
)) ))
471 HeapFree( GetProcessHeap(), 0, *Names
);
472 return STATUS_NO_MEMORY
;
474 (*ReferencedDomains
)->Entries
= 0;
475 (*ReferencedDomains
)->Domains
= NULL
;
478 for (i
= 0; i
< Count
; i
++)
480 name_size
= domain_size
= 0;
481 (*Names
)[i
].Use
= SidTypeUnknown
;
482 (*Names
)[i
].DomainIndex
= -1;
483 (*Names
)[i
].Name
.Length
= 0;
484 (*Names
)[i
].Name
.MaximumLength
= 0;
485 (*Names
)[i
].Name
.Buffer
= NULL
;
487 if (!LookupAccountSidW(NULL
, Sids
[i
], NULL
, &name_size
, NULL
, &domain_size
, &use
) &&
488 GetLastError() == ERROR_INSUFFICIENT_BUFFER
)
490 LSA_UNICODE_STRING domain
;
496 domain
.Length
= (domain_size
- 1) * sizeof(WCHAR
);
497 domain
.MaximumLength
= domain_size
*sizeof(WCHAR
);
498 domain
.Buffer
= HeapAlloc(GetProcessHeap(),0,domain
.MaximumLength
);
503 domain
.MaximumLength
= 0;
504 domain
.Buffer
= NULL
;
507 (*Names
)[i
].Name
.Length
= (name_size
- 1) * sizeof(WCHAR
);
508 (*Names
)[i
].Name
.MaximumLength
= name_size
* sizeof(WCHAR
);
509 (*Names
)[i
].Name
.Buffer
= HeapAlloc(GetProcessHeap(), 0, name_size
* sizeof(WCHAR
));
510 LookupAccountSidW(NULL
, Sids
[i
], (*Names
)[i
].Name
.Buffer
, &name_size
, domain
.Buffer
, &domain_size
, &use
);
511 (*Names
)[i
].Use
= use
;
514 (*Names
)[i
].DomainIndex
= build_domain(*ReferencedDomains
, &domain
);
517 TRACE("mapped %u out of %u\n",mapped
,Count
);
519 if (mapped
== Count
) return STATUS_SUCCESS
;
520 if (mapped
) return STATUS_SOME_NOT_MAPPED
;
521 return STATUS_NONE_MAPPED
;
524 /******************************************************************************
525 * LsaNtStatusToWinError [ADVAPI32.@]
527 * Converts an LSA NTSTATUS code to a Windows error code.
530 * Status [I] NTSTATUS code.
533 * Success: Corresponding Windows error code.
534 * Failure: ERROR_MR_MID_NOT_FOUND.
536 ULONG WINAPI
LsaNtStatusToWinError(NTSTATUS Status
)
538 return RtlNtStatusToDosError(Status
);
541 /******************************************************************************
542 * LsaOpenPolicy [ADVAPI32.@]
544 * Opens a handle to the Policy object on a local or remote system.
547 * SystemName [I] Name of the target system.
548 * ObjectAttributes [I] Connection attributes.
549 * DesiredAccess [I] Requested access rights.
550 * PolicyHandle [I/O] Handle to the Policy object.
553 * Success: STATUS_SUCCESS.
554 * Failure: NTSTATUS code.
557 * Set SystemName to NULL to open the local Policy object.
559 NTSTATUS WINAPI
LsaOpenPolicy(
560 IN PLSA_UNICODE_STRING SystemName
,
561 IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes
,
562 IN ACCESS_MASK DesiredAccess
,
563 IN OUT PLSA_HANDLE PolicyHandle
)
565 FIXME("(%s,%p,0x%08x,%p) stub\n",
566 SystemName
?debugstr_w(SystemName
->Buffer
):"(null)",
567 ObjectAttributes
, DesiredAccess
, PolicyHandle
);
569 ADVAPI_ForceLocalComputer(SystemName
? SystemName
->Buffer
: NULL
,
570 STATUS_ACCESS_VIOLATION
);
571 dumpLsaAttributes(ObjectAttributes
);
573 if(PolicyHandle
) *PolicyHandle
= (LSA_HANDLE
)0xcafe;
574 return STATUS_SUCCESS
;
577 /******************************************************************************
578 * LsaOpenTrustedDomainByName [ADVAPI32.@]
581 NTSTATUS WINAPI
LsaOpenTrustedDomainByName(
583 PLSA_UNICODE_STRING name
,
587 FIXME("(%p,%p,0x%08x,%p) stub\n", policy
, name
, access
, handle
);
588 return STATUS_OBJECT_NAME_NOT_FOUND
;
591 /******************************************************************************
592 * LsaQueryInformationPolicy [ADVAPI32.@]
594 * Returns information about a Policy object.
597 * PolicyHandle [I] Handle to a Policy object.
598 * InformationClass [I] Type of information to retrieve.
599 * Buffer [O] Pointer to the requested information.
602 * Success: STATUS_SUCCESS.
603 * Failure: NTSTATUS code.
605 NTSTATUS WINAPI
LsaQueryInformationPolicy(
606 IN LSA_HANDLE PolicyHandle
,
607 IN POLICY_INFORMATION_CLASS InformationClass
,
610 TRACE("(%p,0x%08x,%p)\n", PolicyHandle
, InformationClass
, Buffer
);
612 if(!Buffer
) return STATUS_INVALID_PARAMETER
;
613 switch (InformationClass
)
615 case PolicyAuditEventsInformation
: /* 2 */
617 PPOLICY_AUDIT_EVENTS_INFO p
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
,
618 sizeof(POLICY_AUDIT_EVENTS_INFO
));
619 p
->AuditingMode
= FALSE
; /* no auditing */
623 case PolicyPrimaryDomainInformation
: /* 3 */
625 /* Only the domain name is valid for the local computer.
626 * All other fields are zero.
628 PPOLICY_PRIMARY_DOMAIN_INFO pinfo
;
630 pinfo
= ADVAPI_GetDomainName(sizeof(*pinfo
), offsetof(POLICY_PRIMARY_DOMAIN_INFO
, Name
));
632 TRACE("setting domain to %s\n", debugstr_w(pinfo
->Name
.Buffer
));
637 case PolicyAccountDomainInformation
: /* 5 */
641 POLICY_ACCOUNT_DOMAIN_INFO info
;
644 WCHAR domain
[MAX_COMPUTERNAME_LENGTH
+ 1];
647 DWORD dwSize
= MAX_COMPUTERNAME_LENGTH
+ 1;
648 struct di
* xdi
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sizeof(*xdi
));
650 xdi
->info
.DomainName
.MaximumLength
= dwSize
* sizeof(WCHAR
);
651 xdi
->info
.DomainName
.Buffer
= xdi
->domain
;
652 if (GetComputerNameW(xdi
->info
.DomainName
.Buffer
, &dwSize
))
653 xdi
->info
.DomainName
.Length
= dwSize
* sizeof(WCHAR
);
655 TRACE("setting name to %s\n", debugstr_w(xdi
->info
.DomainName
.Buffer
));
657 xdi
->info
.DomainSid
= &xdi
->sid
;
659 if (!ADVAPI_GetComputerSid(&xdi
->sid
))
661 HeapFree(GetProcessHeap(), 0, xdi
);
663 WARN("Computer SID not found\n");
665 return STATUS_UNSUCCESSFUL
;
668 TRACE("setting SID to %s\n", debugstr_sid(&xdi
->sid
));
673 case PolicyDnsDomainInformation
: /* 12 (0xc) */
675 /* Only the domain name is valid for the local computer.
676 * All other fields are zero.
678 PPOLICY_DNS_DOMAIN_INFO pinfo
;
680 pinfo
= ADVAPI_GetDomainName(sizeof(*pinfo
), offsetof(POLICY_DNS_DOMAIN_INFO
, Name
));
682 TRACE("setting domain to %s\n", debugstr_w(pinfo
->Name
.Buffer
));
687 case PolicyAuditLogInformation
:
688 case PolicyPdAccountInformation
:
689 case PolicyLsaServerRoleInformation
:
690 case PolicyReplicaSourceInformation
:
691 case PolicyDefaultQuotaInformation
:
692 case PolicyModificationInformation
:
693 case PolicyAuditFullSetInformation
:
694 case PolicyAuditFullQueryInformation
:
696 FIXME("category %d not implemented\n", InformationClass
);
697 return STATUS_UNSUCCESSFUL
;
700 return STATUS_SUCCESS
;
703 /******************************************************************************
704 * LsaQueryTrustedDomainInfo [ADVAPI32.@]
707 NTSTATUS WINAPI
LsaQueryTrustedDomainInfo(
710 TRUSTED_INFORMATION_CLASS
class,
713 FIXME("(%p,%p,%d,%p) stub\n", policy
, sid
, class, buffer
);
714 return STATUS_OBJECT_NAME_NOT_FOUND
;
717 /******************************************************************************
718 * LsaQueryTrustedDomainInfoByName [ADVAPI32.@]
721 NTSTATUS WINAPI
LsaQueryTrustedDomainInfoByName(
723 PLSA_UNICODE_STRING name
,
724 TRUSTED_INFORMATION_CLASS
class,
727 FIXME("(%p,%p,%d,%p) stub\n", policy
, name
, class, buffer
);
728 return STATUS_OBJECT_NAME_NOT_FOUND
;
731 /******************************************************************************
732 * LsaRegisterPolicyChangeNotification [ADVAPI32.@]
735 NTSTATUS WINAPI
LsaRegisterPolicyChangeNotification(
736 POLICY_NOTIFICATION_INFORMATION_CLASS
class,
739 FIXME("(%d,%p) stub\n", class, event
);
740 return STATUS_UNSUCCESSFUL
;
743 /******************************************************************************
744 * LsaRemoveAccountRights [ADVAPI32.@]
747 NTSTATUS WINAPI
LsaRemoveAccountRights(
751 PLSA_UNICODE_STRING rights
,
754 FIXME("(%p,%p,%d,%p,0x%08x) stub\n", policy
, sid
, all
, rights
, count
);
755 return STATUS_SUCCESS
;
758 /******************************************************************************
759 * LsaRetrievePrivateData [ADVAPI32.@]
761 * Retrieves data stored by LsaStorePrivateData.
764 * PolicyHandle [I] Handle to a Policy object.
765 * KeyName [I] Name of the key where the data is stored.
766 * PrivateData [O] Pointer to the private data.
769 * Success: STATUS_SUCCESS.
770 * Failure: STATUS_OBJECT_NAME_NOT_FOUND or NTSTATUS code.
772 NTSTATUS WINAPI
LsaRetrievePrivateData(
773 IN LSA_HANDLE PolicyHandle
,
774 IN PLSA_UNICODE_STRING KeyName
,
775 OUT PLSA_UNICODE_STRING
* PrivateData
)
777 FIXME("(%p,%p,%p) stub\n", PolicyHandle
, KeyName
, PrivateData
);
778 return STATUS_OBJECT_NAME_NOT_FOUND
;
781 /******************************************************************************
782 * LsaSetInformationPolicy [ADVAPI32.@]
784 * Modifies information in a Policy object.
787 * PolicyHandle [I] Handle to a Policy object.
788 * InformationClass [I] Type of information to set.
789 * Buffer [I] Pointer to the information to set.
792 * Success: STATUS_SUCCESS.
793 * Failure: NTSTATUS code.
795 NTSTATUS WINAPI
LsaSetInformationPolicy(
796 IN LSA_HANDLE PolicyHandle
,
797 IN POLICY_INFORMATION_CLASS InformationClass
,
800 FIXME("(%p,0x%08x,%p) stub\n", PolicyHandle
, InformationClass
, Buffer
);
802 return STATUS_UNSUCCESSFUL
;
805 /******************************************************************************
806 * LsaSetSecret [ADVAPI32.@]
808 * Set old and new values on a secret handle
811 * SecretHandle [I] Handle to a secret object.
812 * EncryptedCurrentValue [I] Pointer to encrypted new value, can be NULL
813 * EncryptedOldValue [I] Pointer to encrypted old value, can be NULL
816 * Success: STATUS_SUCCESS
817 * Failure: NTSTATUS code.
819 NTSTATUS WINAPI
LsaSetSecret(
820 IN LSA_HANDLE SecretHandle
,
821 IN PLSA_UNICODE_STRING EncryptedCurrentValue
,
822 IN PLSA_UNICODE_STRING EncryptedOldValue
)
824 FIXME("(%p,%p,%p) stub\n", SecretHandle
, EncryptedCurrentValue
,
826 return STATUS_SUCCESS
;
829 /******************************************************************************
830 * LsaSetTrustedDomainInfoByName [ADVAPI32.@]
833 NTSTATUS WINAPI
LsaSetTrustedDomainInfoByName(
835 PLSA_UNICODE_STRING name
,
836 TRUSTED_INFORMATION_CLASS
class,
839 FIXME("(%p,%p,%d,%p) stub\n", policy
, name
, class, buffer
);
840 return STATUS_SUCCESS
;
843 /******************************************************************************
844 * LsaSetTrustedDomainInformation [ADVAPI32.@]
847 NTSTATUS WINAPI
LsaSetTrustedDomainInformation(
850 TRUSTED_INFORMATION_CLASS
class,
853 FIXME("(%p,%p,%d,%p) stub\n", policy
, sid
, class, buffer
);
854 return STATUS_SUCCESS
;
857 /******************************************************************************
858 * LsaStorePrivateData [ADVAPI32.@]
860 * Stores or deletes a Policy object's data under the specified reg key.
863 * PolicyHandle [I] Handle to a Policy object.
864 * KeyName [I] Name of the key where the data will be stored.
865 * PrivateData [O] Pointer to the private data.
868 * Success: STATUS_SUCCESS.
869 * Failure: STATUS_OBJECT_NAME_NOT_FOUND or NTSTATUS code.
871 NTSTATUS WINAPI
LsaStorePrivateData(
872 IN LSA_HANDLE PolicyHandle
,
873 IN PLSA_UNICODE_STRING KeyName
,
874 IN PLSA_UNICODE_STRING PrivateData
)
876 FIXME("(%p,%p,%p) stub\n", PolicyHandle
, KeyName
, PrivateData
);
877 return STATUS_OBJECT_NAME_NOT_FOUND
;
880 /******************************************************************************
881 * LsaUnregisterPolicyChangeNotification [ADVAPI32.@]
884 NTSTATUS WINAPI
LsaUnregisterPolicyChangeNotification(
885 POLICY_NOTIFICATION_INFORMATION_CLASS
class,
888 FIXME("(%d,%p) stub\n", class, event
);
889 return STATUS_SUCCESS
;