* PROJECT: ReactOS system libraries
* PURPOSE: Boot Data implementation
* FILE: lib/rtl/bootdata.c
- * PROGRAMMERS:
+ * PROGRAMMERS:
*/
/* INCLUDES *****************************************************************/
static SID_IDENTIFIER_AUTHORITY LocalSystemAuthority = {SECURITY_NT_AUTHORITY};
static NTSTATUS
-RtlpSysVolCreateSecurityDescriptor(OUT PSECURITY_DESCRIPTOR *SecurityDescriptor,
+RtlpSysVolCreateSecurityDescriptor(OUT PISECURITY_DESCRIPTOR *SecurityDescriptor,
OUT PSID *SystemSid)
{
PSECURITY_DESCRIPTOR AbsSD = NULL;
/* allocate and initialize the security descriptor */
AbsSD = RtlpAllocateMemory(sizeof(SECURITY_DESCRIPTOR),
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
if (AbsSD == NULL)
{
Status = STATUS_NO_MEMORY;
DaclSize = sizeof(ACL) + sizeof(ACE) +
RtlLengthSid(LocalSystemSid);
Dacl = RtlpAllocateMemory(DaclSize,
- TAG('S', 'e', 'A', 'c'));
+ 'cAeS');
if (Dacl == NULL)
{
Status = STATUS_NO_MEMORY;
if (Dacl != NULL)
{
RtlpFreeMemory(Dacl,
- TAG('S', 'e', 'A', 'c'));
+ 'cAeS');
}
if (AbsSD != NULL)
{
RtlpFreeMemory(AbsSD,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
}
}
/* allocate enough memory for the security descriptor */
RelSD = RtlpAllocateMemory(DescriptorSize,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
if (RelSD == NULL)
{
Status = STATUS_NO_MEMORY;
ASSERT(AbsSDSize > DescriptorSize);
AbsSD = RtlpAllocateMemory(DescriptorSize,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
if (AbsSD == NULL)
{
Status = STATUS_NO_MEMORY;
/* allocate enough memory for the new self-relative descriptor */
NewRelSD = RtlpAllocateMemory(RelSDSize,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
if (NewRelSD == NULL)
{
Status = STATUS_NO_MEMORY;
if (RelSD != NULL)
{
RtlpFreeMemory(RelSD,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
}
if (NewRelSD != NULL)
{
RtlpFreeMemory(NewRelSD,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
}
#ifdef _WIN64
if (AbsSDAllocated)
{
RtlpFreeMemory(AbsSD,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
}
#endif
AddSep = TRUE;
PathLen += sizeof(WCHAR);
}
-
+
/* allocate the new string */
NewPath.MaximumLength = (USHORT)PathLen + sizeof(WCHAR);
NewPath.Buffer = RtlpAllocateStringMemory(NewPath.MaximumLength,
ASSERT(SecurityDescriptor->Dacl != NULL);
RtlpFreeMemory(SecurityDescriptor->Dacl,
- TAG('S', 'e', 'A', 'c'));
+ 'cAeS');
RtlpFreeMemory(SecurityDescriptor,
- TAG('S', 'e', 'S', 'd'));
+ 'dSeS');
RtlFreeSid(SystemSid);
}
return Status;
}
+/*
+* @unimplemented
+*/
+NTSTATUS
+NTAPI
+RtlCreateBootStatusDataFile(VOID)
+{
+ UNIMPLEMENTED;
+ return STATUS_NOT_IMPLEMENTED;
+}
+
/*
* @unimplemented
*/
NTSTATUS
NTAPI
RtlLockBootStatusData(
- HANDLE Filehandle
+ OUT PHANDLE Filehandle
)
{
UNIMPLEMENTED;
NTSTATUS
NTAPI
RtlUnlockBootStatusData(
- HANDLE Filehandle
+ IN HANDLE Filehandle
)
{
UNIMPLEMENTED;