migrate substitution keywords to SVN
[reactos.git] / reactos / ntoskrnl / se / audit.c
1 /* $Id$
2 *
3 * COPYRIGHT: See COPYING in the top level directory
4 * PROJECT: ReactOS kernel
5 * PURPOSE: Audit functions
6 * FILE: kernel/se/audit.c
7 * PROGRAMER: Eric Kohl (ekohl@rz-online.de)
8 * REVISION HISTORY:
9 * 20/07/2003: Created
10 */
11
12 /* INCLUDES *****************************************************************/
13
14 #include <ntoskrnl.h>
15 #include <internal/debug.h>
16
17
18 /* FUNCTIONS ****************************************************************/
19
20 NTSTATUS STDCALL
21 NtAccessCheckAndAuditAlarm(IN PUNICODE_STRING SubsystemName,
22 IN PHANDLE ObjectHandle,
23 IN PUNICODE_STRING ObjectTypeName,
24 IN PUNICODE_STRING ObjectName,
25 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
26 IN ACCESS_MASK DesiredAccess,
27 IN PGENERIC_MAPPING GenericMapping,
28 IN BOOLEAN ObjectCreation,
29 OUT PACCESS_MASK GrantedAccess,
30 OUT PNTSTATUS AccessStatus,
31 OUT PBOOLEAN GenerateOnClose
32 )
33 {
34 UNIMPLEMENTED;
35 return(STATUS_NOT_IMPLEMENTED);
36 }
37
38
39 NTSTATUS STDCALL
40 NtCloseObjectAuditAlarm(IN PUNICODE_STRING SubsystemName,
41 IN PVOID HandleId,
42 IN BOOLEAN GenerateOnClose)
43 {
44 UNIMPLEMENTED;
45 return(STATUS_NOT_IMPLEMENTED);
46 }
47
48
49 NTSTATUS STDCALL
50 NtDeleteObjectAuditAlarm(IN PUNICODE_STRING SubsystemName,
51 IN PVOID HandleId,
52 IN BOOLEAN GenerateOnClose)
53 {
54 UNIMPLEMENTED;
55 return(STATUS_NOT_IMPLEMENTED);
56 }
57
58
59 NTSTATUS STDCALL
60 NtOpenObjectAuditAlarm(IN PUNICODE_STRING SubsystemName,
61 IN PVOID HandleId,
62 IN PUNICODE_STRING ObjectTypeName,
63 IN PUNICODE_STRING ObjectName,
64 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
65 IN HANDLE ClientToken,
66 IN ULONG DesiredAccess,
67 IN ULONG GrantedAccess,
68 IN PPRIVILEGE_SET Privileges,
69 IN BOOLEAN ObjectCreation,
70 IN BOOLEAN AccessGranted,
71 OUT PBOOLEAN GenerateOnClose)
72 {
73 UNIMPLEMENTED;
74 return(STATUS_NOT_IMPLEMENTED);
75 }
76
77
78 NTSTATUS STDCALL
79 NtPrivilegedServiceAuditAlarm(IN PUNICODE_STRING SubsystemName,
80 IN PUNICODE_STRING ServiceName,
81 IN HANDLE ClientToken,
82 IN PPRIVILEGE_SET Privileges,
83 IN BOOLEAN AccessGranted)
84 {
85 UNIMPLEMENTED;
86 return(STATUS_NOT_IMPLEMENTED);
87 }
88
89
90 NTSTATUS STDCALL
91 NtPrivilegeObjectAuditAlarm(IN PUNICODE_STRING SubsystemName,
92 IN PVOID HandleId,
93 IN HANDLE ClientToken,
94 IN ULONG DesiredAccess,
95 IN PPRIVILEGE_SET Privileges,
96 IN BOOLEAN AccessGranted)
97 {
98 UNIMPLEMENTED;
99 return(STATUS_NOT_IMPLEMENTED);
100 }
101
102
103 /*
104 * @unimplemented
105 */
106 VOID
107 STDCALL
108 SeAuditHardLinkCreation(
109 IN PUNICODE_STRING FileName,
110 IN PUNICODE_STRING LinkName,
111 IN BOOLEAN bSuccess
112 )
113 {
114 UNIMPLEMENTED;
115 }
116
117 /*
118 * @unimplemented
119 */
120 BOOLEAN
121 STDCALL
122 SeAuditingFileEvents(
123 IN BOOLEAN AccessGranted,
124 IN PSECURITY_DESCRIPTOR SecurityDescriptor
125 )
126 {
127 UNIMPLEMENTED;
128 return FALSE;
129 }
130
131 /*
132 * @unimplemented
133 */
134 BOOLEAN
135 STDCALL
136 SeAuditingFileEventsWithContext(
137 IN BOOLEAN AccessGranted,
138 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
139 IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
140 )
141 {
142 UNIMPLEMENTED;
143 return FALSE;
144 }
145
146 /*
147 * @unimplemented
148 */
149 BOOLEAN
150 STDCALL
151 SeAuditingHardLinkEvents(
152 IN BOOLEAN AccessGranted,
153 IN PSECURITY_DESCRIPTOR SecurityDescriptor
154 )
155 {
156 UNIMPLEMENTED;
157 return FALSE;
158 }
159
160 /*
161 * @unimplemented
162 */
163 BOOLEAN
164 STDCALL
165 SeAuditingHardLinkEventsWithContext(
166 IN BOOLEAN AccessGranted,
167 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
168 IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext OPTIONAL
169 )
170 {
171 UNIMPLEMENTED;
172 return FALSE;
173 }
174
175 /*
176 * @unimplemented
177 */
178 BOOLEAN
179 STDCALL
180 SeAuditingFileOrGlobalEvents(
181 IN BOOLEAN AccessGranted,
182 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
183 IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext
184 )
185 {
186 UNIMPLEMENTED;
187 return FALSE;
188 }
189
190 /*
191 * @unimplemented
192 */
193 VOID
194 STDCALL
195 SeCloseObjectAuditAlarm(
196 IN PVOID Object,
197 IN HANDLE Handle,
198 IN BOOLEAN PerformAction
199 )
200 {
201 UNIMPLEMENTED;
202 }
203
204 /*
205 * @unimplemented
206 */
207 VOID STDCALL
208 SeDeleteObjectAuditAlarm(IN PVOID Object,
209 IN HANDLE Handle)
210 {
211 UNIMPLEMENTED;
212 }
213
214
215 /*
216 * @unimplemented
217 */
218 VOID STDCALL
219 SeOpenObjectAuditAlarm(IN PUNICODE_STRING ObjectTypeName,
220 IN PVOID Object OPTIONAL,
221 IN PUNICODE_STRING AbsoluteObjectName OPTIONAL,
222 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
223 IN PACCESS_STATE AccessState,
224 IN BOOLEAN ObjectCreated,
225 IN BOOLEAN AccessGranted,
226 IN KPROCESSOR_MODE AccessMode,
227 OUT PBOOLEAN GenerateOnClose)
228 {
229 UNIMPLEMENTED;
230 }
231
232
233 /*
234 * @unimplemented
235 */
236 VOID STDCALL
237 SeOpenObjectForDeleteAuditAlarm(IN PUNICODE_STRING ObjectTypeName,
238 IN PVOID Object OPTIONAL,
239 IN PUNICODE_STRING AbsoluteObjectName OPTIONAL,
240 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
241 IN PACCESS_STATE AccessState,
242 IN BOOLEAN ObjectCreated,
243 IN BOOLEAN AccessGranted,
244 IN KPROCESSOR_MODE AccessMode,
245 OUT PBOOLEAN GenerateOnClose)
246 {
247 UNIMPLEMENTED;
248 }
249
250 /*
251 * @unimplemented
252 */
253 VOID
254 STDCALL
255 SePrivilegeObjectAuditAlarm(
256 IN HANDLE Handle,
257 IN PSECURITY_SUBJECT_CONTEXT SubjectContext,
258 IN ACCESS_MASK DesiredAccess,
259 IN PPRIVILEGE_SET Privileges,
260 IN BOOLEAN AccessGranted,
261 IN KPROCESSOR_MODE CurrentMode
262 )
263 {
264 UNIMPLEMENTED;
265 }
266
267 /* EOF */