This commit was generated by cvs2svn to compensate for changes in r52,
[reactos.git] / reactos / ntoskrnl / se / semgr.c
1 /*
2 * COPYRIGHT: See COPYING in the top level directory
3 * PROJECT: ReactOS kernel
4 * PURPOSE: Security manager
5 * FILE: kernel/se/semgr.c
6 * PROGRAMER: ?
7 * REVISION HISTORY:
8 * 26/07/98: Added stubs for security functions
9 */
10
11 /* INCLUDES *****************************************************************/
12
13 #include <ddk/ntddk.h>
14
15 #include <internal/debug.h>
16
17 /* FUNCTIONS ***************************************************************/
18
19 NTSTATUS STDCALL NtQueryInformationToken(VOID)
20 {
21 }
22
23 NTSTATUS STDCALL NtQuerySecurityObject(VOID)
24 {
25 }
26
27 NTSTATUS STDCALL NtSetSecurityObject(VOID)
28 {
29 }
30
31 NTSTATUS STDCALL NtSetInformationToken(VOID)
32 {
33 }
34
35 NTSTATUS STDCALL NtPrivilegeCheck(VOID)
36 {
37 }
38
39 NTSTATUS STDCALL NtPrivilegedServiceAuditAlarm(VOID)
40 {
41 }
42
43 NTSTATUS STDCALL NtPrivilegeObjectAuditAlarm(VOID)
44 {
45 }
46
47 NTSTATUS STDCALL NtOpenObjectAuditAlarm(VOID)
48 {
49 }
50
51 NTSTATUS STDCALL NtOpenProcessToken(VOID)
52 {
53 }
54
55 NTSTATUS STDCALL NtOpenThreadToken(VOID)
56 {
57 }
58
59 NTSTATUS STDCALL NtDuplicateToken(VOID)
60 {
61 }
62
63 NTSTATUS STDCALL NtImpersonateClientOfPort(VOID)
64 {
65 }
66
67 NTSTATUS STDCALL NtImpersonateThread(VOID)
68 {
69 }
70
71 NTSTATUS STDCALL NtCreateToken(VOID)
72 {
73 }
74
75 NTSTATUS STDCALL NtDeleteObjectAuditAlarm(VOID)
76 {
77 }
78
79
80 NTSTATUS
81 STDCALL
82 NtAllocateLocallyUniqueId(
83 OUT PVOID LocallyUniqueId
84 )
85 {
86 }
87
88 NTSTATUS
89 STDCALL
90 ZwAllocateLocallyUniqueId(
91 OUT PVOID LocallyUniqueId
92 )
93 {
94 }
95
96 NTSTATUS STDCALL NtAccessCheckAndAuditAlarm(VOID)
97 {
98 }
99
100 NTSTATUS STDCALL NtAdjustGroupsToken(VOID)
101 {
102 }
103
104 NTSTATUS STDCALL NtAdjustPrivilegesToken(VOID)
105 {
106 }
107
108 NTSTATUS STDCALL NtAllocateUuids(VOID)
109 {
110 }
111
112 NTSTATUS STDCALL NtCloseObjectAuditAlarm(VOID)
113 {
114 }
115
116 NTSTATUS
117 STDCALL
118 NtAccessCheck(
119 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
120 IN HANDLE ClientToken,
121 IN ULONG DesiredAcces,
122 IN PGENERIC_MAPPING GenericMapping,
123 OUT PRIVILEGE_SET PrivilegeSet,
124 OUT PULONG ReturnLength,
125 OUT PULONG GrantedAccess,
126 OUT PULONG AccessStatus
127 )
128 {
129 }
130
131 NTSTATUS
132 STDCALL
133 ZwAccessCheck(
134 IN PSECURITY_DESCRIPTOR SecurityDescriptor,
135 IN HANDLE ClientToken,
136 IN ULONG DesiredAcces,
137 IN PGENERIC_MAPPING GenericMapping,
138 OUT PRIVILEGE_SET PrivilegeSet,
139 OUT PULONG ReturnLength,
140 OUT PULONG GrantedAccess,
141 OUT PULONG AccessStatus
142 )
143 {
144 }
145
146 NTSTATUS RtlCreateSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
147 ULONG Revision)
148 {
149 UNIMPLEMENTED;
150 }
151
152 ULONG RtlLengthSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
153 {
154 UNIMPLEMENTED;
155 }
156
157 NTSTATUS RtlSetDaclSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,
158 BOOLEAN DaclPresent,
159 PACL Dacl,
160 BOOLEAN DaclDefaulted)
161 {
162 UNIMPLEMENTED;
163 }
164
165 BOOLEAN RtlValidSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor)
166 {
167 UNIMPLEMENTED;
168 }
169
170 BOOLEAN SeSinglePrivilegeCheck(LUID PrivilegeValue,
171 KPROCESSOR_MODE PreviousMode)
172 {
173 UNIMPLEMENTED;
174 }
175
176 NTSTATUS SeDeassignSecurity(PSECURITY_DESCRIPTOR* SecurityDescriptor)
177 {
178 UNIMPLEMENTED;
179 }
180
181 NTSTATUS SeAssignSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,
182 PSECURITY_DESCRIPTOR ExplicitDescriptor,
183 BOOLEAN IsDirectoryObject,
184 PSECURITY_SUBJECT_CONTEXT SubjectContext,
185 PGENERIC_MAPPING GenericMapping,
186 POOL_TYPE PoolType)
187 {
188 UNIMPLEMENTED;
189 }
190
191 BOOLEAN SeAccessCheck(IN PSECURITY_DESCRIPTOR SecurityDescriptor,
192 IN PSECURITY_DESCRIPTOR_CONTEXT SubjectSecurityContext,
193 IN BOOLEAN SubjectContextLocked,
194 IN ACCESS_MASK DesiredAccess,
195 IN ACCESS_MASK PreviouslyGrantedAccess,
196 OUT PPRIVILEGE_SET* Privileges,
197 IN PGENERIC_MAPPING GenericMapping,
198 IN KPROCESSOR_MODE AccessMode,
199 OUT PACCESS_MODE GrantedAccess,
200 OUT PNTSTATUS AccessStatus)
201 /*
202 * FUNCTION: Determines whether the requested access rights can be granted
203 * to an object protected by a security descriptor and an object owner
204 * ARGUMENTS:
205 * SecurityDescriptor = Security descriptor protected the object
206 * SubjectSecurityContext = Subject's captured security context
207 * SubjectContextLocked = Indicates the user's subject context is locked
208 * DesiredAccess = Access rights the caller is trying to acquire
209 * PreviouslyGrantedAccess = Specified the access rights already granted
210 * Priveleges = ?
211 * GenericMapping = Generic mapping associated with the object
212 * AccessMode = Access mode used for the check
213 * GrantedAccess (OUT) = On return specifies the access granted
214 * AccessStatus (OUT) = Status indicating why access was denied
215 * RETURNS: If access was granted, returns TRUE
216 */
217 {
218 UNIMPLEMENTED;
219 }
220
221