[FORMATTING]
[reactos.git] / reactos / ntoskrnl / se / sd.c
index fded835..0e0eadc 100644 (file)
@@ -38,79 +38,79 @@ SepInitSDs(VOID)
                                               sizeof(SECURITY_DESCRIPTOR), TAG_SD);
     if (SePublicDefaultSd == NULL)
         return FALSE;
-    
+
     RtlCreateSecurityDescriptor(SePublicDefaultSd,
                                 SECURITY_DESCRIPTOR_REVISION);
     RtlSetDaclSecurityDescriptor(SePublicDefaultSd,
                                  TRUE,
                                  SePublicDefaultDacl,
                                  FALSE);
-    
+
     /* Create PublicDefaultUnrestrictedSd */
     SePublicDefaultUnrestrictedSd = ExAllocatePoolWithTag(PagedPool,
                                                           sizeof(SECURITY_DESCRIPTOR), TAG_SD);
     if (SePublicDefaultUnrestrictedSd == NULL)
         return FALSE;
-    
+
     RtlCreateSecurityDescriptor(SePublicDefaultUnrestrictedSd,
                                 SECURITY_DESCRIPTOR_REVISION);
     RtlSetDaclSecurityDescriptor(SePublicDefaultUnrestrictedSd,
                                  TRUE,
                                  SePublicDefaultUnrestrictedDacl,
                                  FALSE);
-    
+
     /* Create PublicOpenSd */
     SePublicOpenSd = ExAllocatePoolWithTag(PagedPool,
                                            sizeof(SECURITY_DESCRIPTOR), TAG_SD);
     if (SePublicOpenSd == NULL)
         return FALSE;
-    
+
     RtlCreateSecurityDescriptor(SePublicOpenSd,
                                 SECURITY_DESCRIPTOR_REVISION);
     RtlSetDaclSecurityDescriptor(SePublicOpenSd,
                                  TRUE,
                                  SePublicOpenDacl,
                                  FALSE);
-    
+
     /* Create PublicOpenUnrestrictedSd */
     SePublicOpenUnrestrictedSd = ExAllocatePoolWithTag(PagedPool,
                                                        sizeof(SECURITY_DESCRIPTOR), TAG_SD);
     if (SePublicOpenUnrestrictedSd == NULL)
         return FALSE;
-    
+
     RtlCreateSecurityDescriptor(SePublicOpenUnrestrictedSd,
                                 SECURITY_DESCRIPTOR_REVISION);
     RtlSetDaclSecurityDescriptor(SePublicOpenUnrestrictedSd,
                                  TRUE,
                                  SePublicOpenUnrestrictedDacl,
                                  FALSE);
-    
+
     /* Create SystemDefaultSd */
     SeSystemDefaultSd = ExAllocatePoolWithTag(PagedPool,
                                               sizeof(SECURITY_DESCRIPTOR), TAG_SD);
     if (SeSystemDefaultSd == NULL)
         return FALSE;
-    
+
     RtlCreateSecurityDescriptor(SeSystemDefaultSd,
                                 SECURITY_DESCRIPTOR_REVISION);
     RtlSetDaclSecurityDescriptor(SeSystemDefaultSd,
                                  TRUE,
                                  SeSystemDefaultDacl,
                                  FALSE);
-    
+
     /* Create UnrestrictedSd */
     SeUnrestrictedSd = ExAllocatePoolWithTag(PagedPool,
                                              sizeof(SECURITY_DESCRIPTOR), TAG_SD);
     if (SeUnrestrictedSd == NULL)
         return FALSE;
-    
+
     RtlCreateSecurityDescriptor(SeUnrestrictedSd,
                                 SECURITY_DESCRIPTOR_REVISION);
     RtlSetDaclSecurityDescriptor(SeUnrestrictedSd,
                                  TRUE,
                                  SeUnrestrictedDacl,
                                  FALSE);
-    
+
     return TRUE;
 }
 
@@ -125,14 +125,14 @@ SeSetWorldSecurityDescriptor(SECURITY_INFORMATION SecurityInformation,
     ULONG SdSize;
     NTSTATUS Status;
     PISECURITY_DESCRIPTOR_RELATIVE SdRel = (PISECURITY_DESCRIPTOR_RELATIVE)SecurityDescriptor;
-    
+
     DPRINT("SeSetWorldSecurityDescriptor() called\n");
-    
+
     if (SecurityInformation == 0)
     {
         return STATUS_ACCESS_DENIED;
     }
-    
+
     /* calculate the minimum size of the buffer */
     SidSize = RtlLengthSid(SeWorldSid);
     SdSize = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
@@ -144,24 +144,24 @@ SeSetWorldSecurityDescriptor(SECURITY_INFORMATION SecurityInformation,
     {
         SdSize += sizeof(ACL) + sizeof(ACE) + SidSize;
     }
-    
+
     if (*BufferLength < SdSize)
     {
         *BufferLength = SdSize;
         return STATUS_BUFFER_TOO_SMALL;
     }
-    
+
     *BufferLength = SdSize;
-    
+
     Status = RtlCreateSecurityDescriptorRelative(SdRel,
                                                  SECURITY_DESCRIPTOR_REVISION);
     if (!NT_SUCCESS(Status))
     {
         return Status;
     }
-    
+
     Current = (ULONG_PTR)(SdRel + 1);
-    
+
     if (SecurityInformation & OWNER_SECURITY_INFORMATION)
     {
         RtlCopyMemory((PVOID)Current,
@@ -170,7 +170,7 @@ SeSetWorldSecurityDescriptor(SECURITY_INFORMATION SecurityInformation,
         SdRel->Owner = (ULONG)((ULONG_PTR)Current - (ULONG_PTR)SdRel);
         Current += SidSize;
     }
-    
+
     if (SecurityInformation & GROUP_SECURITY_INFORMATION)
     {
         RtlCopyMemory((PVOID)Current,
@@ -179,33 +179,33 @@ SeSetWorldSecurityDescriptor(SECURITY_INFORMATION SecurityInformation,
         SdRel->Group = (ULONG)((ULONG_PTR)Current - (ULONG_PTR)SdRel);
         Current += SidSize;
     }
-    
+
     if (SecurityInformation & DACL_SECURITY_INFORMATION)
     {
         PACL Dacl = (PACL)Current;
         SdRel->Control |= SE_DACL_PRESENT;
-        
+
         Status = RtlCreateAcl(Dacl,
                               sizeof(ACL) + sizeof(ACE) + SidSize,
                               ACL_REVISION);
         if (!NT_SUCCESS(Status))
             return Status;
-        
+
         Status = RtlAddAccessAllowedAce(Dacl,
                                         ACL_REVISION,
                                         GENERIC_ALL,
                                         SeWorldSid);
         if (!NT_SUCCESS(Status))
             return Status;
-        
+
         SdRel->Dacl = (ULONG)((ULONG_PTR)Current - (ULONG_PTR)SdRel);
     }
-    
+
     if (SecurityInformation & SACL_SECURITY_INFORMATION)
     {
         /* FIXME - SdRel->Control |= SE_SACL_PRESENT; */
     }
-    
+
     return STATUS_SUCCESS;
 }
 
@@ -221,37 +221,39 @@ SepCaptureSecurityQualityOfService(IN POBJECT_ATTRIBUTES ObjectAttributes  OPTIO
 {
     PSECURITY_QUALITY_OF_SERVICE CapturedQos;
     NTSTATUS Status = STATUS_SUCCESS;
-    
+
     PAGED_CODE();
-    
+
     ASSERT(CapturedSecurityQualityOfService);
     ASSERT(Present);
-    
-    if(ObjectAttributes != NULL)
+
+    if (ObjectAttributes != NULL)
     {
-        if(AccessMode != KernelMode)
+        if (AccessMode != KernelMode)
         {
             SECURITY_QUALITY_OF_SERVICE SafeQos;
-            
+
             _SEH2_TRY
             {
                 ProbeForRead(ObjectAttributes,
                              sizeof(OBJECT_ATTRIBUTES),
                              sizeof(ULONG));
-                if(ObjectAttributes->Length == sizeof(OBJECT_ATTRIBUTES))
+                if (ObjectAttributes->Length == sizeof(OBJECT_ATTRIBUTES))
                 {
-                    if(ObjectAttributes->SecurityQualityOfService != NULL)
+                    if (ObjectAttributes->SecurityQualityOfService != NULL)
                     {
                         ProbeForRead(ObjectAttributes->SecurityQualityOfService,
                                      sizeof(SECURITY_QUALITY_OF_SERVICE),
                                      sizeof(ULONG));
                         
-                        if(((PSECURITY_QUALITY_OF_SERVICE)ObjectAttributes->SecurityQualityOfService)->Length ==
-                           sizeof(SECURITY_QUALITY_OF_SERVICE))
+                        if (((PSECURITY_QUALITY_OF_SERVICE)ObjectAttributes->SecurityQualityOfService)->Length ==
+                            sizeof(SECURITY_QUALITY_OF_SERVICE))
                         {
-                            /* don't allocate memory here because ExAllocate should bugcheck
-                             the system if it's buggy, SEH would catch that! So make a local
-                             copy of the qos structure.*/
+                            /*
+                             * Don't allocate memory here because ExAllocate should bugcheck
+                             * the system if it's buggy, SEH would catch that! So make a local
+                             * copy of the qos structure.
+                             */
                             RtlCopyMemory(&SafeQos,
                                           ObjectAttributes->SecurityQualityOfService,
                                           sizeof(SECURITY_QUALITY_OF_SERVICE));
@@ -278,14 +280,14 @@ SepCaptureSecurityQualityOfService(IN POBJECT_ATTRIBUTES ObjectAttributes  OPTIO
                 Status = _SEH2_GetExceptionCode();
             }
             _SEH2_END;
-            
-            if(NT_SUCCESS(Status))
+
+            if (NT_SUCCESS(Status))
             {
-                if(*Present)
+                if (*Present)
                 {
                     CapturedQos = ExAllocatePool(PoolType,
                                                  sizeof(SECURITY_QUALITY_OF_SERVICE));
-                    if(CapturedQos != NULL)
+                    if (CapturedQos != NULL)
                     {
                         RtlCopyMemory(CapturedQos,
                                       &SafeQos,
@@ -305,18 +307,18 @@ SepCaptureSecurityQualityOfService(IN POBJECT_ATTRIBUTES ObjectAttributes  OPTIO
         }
         else
         {
-            if(ObjectAttributes->Length == sizeof(OBJECT_ATTRIBUTES))
+            if (ObjectAttributes->Length == sizeof(OBJECT_ATTRIBUTES))
             {
-                if(CaptureIfKernel)
+                if (CaptureIfKernel)
                 {
-                    if(ObjectAttributes->SecurityQualityOfService != NULL)
+                    if (ObjectAttributes->SecurityQualityOfService != NULL)
                     {
-                        if(((PSECURITY_QUALITY_OF_SERVICE)ObjectAttributes->SecurityQualityOfService)->Length ==
-                           sizeof(SECURITY_QUALITY_OF_SERVICE))
+                        if (((PSECURITY_QUALITY_OF_SERVICE)ObjectAttributes->SecurityQualityOfService)->Length ==
+                            sizeof(SECURITY_QUALITY_OF_SERVICE))
                         {
                             CapturedQos = ExAllocatePool(PoolType,
                                                          sizeof(SECURITY_QUALITY_OF_SERVICE));
-                            if(CapturedQos != NULL)
+                            if (CapturedQos != NULL)
                             {
                                 RtlCopyMemory(CapturedQos,
                                               ObjectAttributes->SecurityQualityOfService,
@@ -357,7 +359,7 @@ SepCaptureSecurityQualityOfService(IN POBJECT_ATTRIBUTES ObjectAttributes  OPTIO
         *CapturedSecurityQualityOfService = NULL;
         *Present = FALSE;
     }
-    
+
     return Status;
 }
 
@@ -369,9 +371,9 @@ SepReleaseSecurityQualityOfService(IN PSECURITY_QUALITY_OF_SERVICE CapturedSecur
                                    IN BOOLEAN CaptureIfKernel)
 {
     PAGED_CODE();
-    
-    if(CapturedSecurityQualityOfService != NULL &&
-       (AccessMode != KernelMode || CaptureIfKernel))
+
+    if (CapturedSecurityQualityOfService != NULL &&
+        (AccessMode != KernelMode || CaptureIfKernel))
     {
         ExFreePool(CapturedSecurityQualityOfService);
     }
@@ -398,44 +400,48 @@ SeCaptureSecurityDescriptor(IN PSECURITY_DESCRIPTOR _OriginalSecurityDescriptor,
     ULONG SaclSize = 0, DaclSize = 0;
     ULONG DescriptorSize = 0;
     NTSTATUS Status;
-    
-    if(OriginalSecurityDescriptor != NULL)
+
+    if (OriginalSecurityDescriptor != NULL)
     {
-        if(CurrentMode != KernelMode)
+        if (CurrentMode != KernelMode)
         {
             RtlZeroMemory(&DescriptorCopy, sizeof(DescriptorCopy));
-            
+
             _SEH2_TRY
             {
-                /* first only probe and copy until the control field of the descriptor
-                 to determine whether it's a self-relative descriptor */
+                /*
+                 * First only probe and copy until the control field of the descriptor
+                 * to determine whether it's a self-relative descriptor
+                 */
                 DescriptorSize = FIELD_OFFSET(SECURITY_DESCRIPTOR,
                                               Owner);
                 ProbeForRead(OriginalSecurityDescriptor,
                              DescriptorSize,
                              sizeof(ULONG));
-                
-                if(OriginalSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
+
+                if (OriginalSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
                 {
                     _SEH2_YIELD(return STATUS_UNKNOWN_REVISION);
                 }
-                
-                /* make a copy on the stack */
+
+                /* Make a copy on the stack */
                 DescriptorCopy.Revision = OriginalSecurityDescriptor->Revision;
                 DescriptorCopy.Sbz1 = OriginalSecurityDescriptor->Sbz1;
                 DescriptorCopy.Control = OriginalSecurityDescriptor->Control;
                 DescriptorSize = ((DescriptorCopy.Control & SE_SELF_RELATIVE) ?
                                   sizeof(SECURITY_DESCRIPTOR_RELATIVE) : sizeof(SECURITY_DESCRIPTOR));
-                
-                /* probe and copy the entire security descriptor structure. The SIDs
-                 and ACLs will be probed and copied later though */
+
+                /*
+                 * Probe and copy the entire security descriptor structure. The SIDs
+                 * and ACLs will be probed and copied later though
+                 */
                 ProbeForRead(OriginalSecurityDescriptor,
                              DescriptorSize,
                              sizeof(ULONG));
-                if(DescriptorCopy.Control & SE_SELF_RELATIVE)
+                if (DescriptorCopy.Control & SE_SELF_RELATIVE)
                 {
                     PISECURITY_DESCRIPTOR_RELATIVE RelSD = (PISECURITY_DESCRIPTOR_RELATIVE)OriginalSecurityDescriptor;
-                    
+
                     DescriptorCopy.Owner = (PSID)RelSD->Owner;
                     DescriptorCopy.Group = (PSID)RelSD->Group;
                     DescriptorCopy.Sacl = (PACL)RelSD->Sacl;
@@ -456,33 +462,33 @@ SeCaptureSecurityDescriptor(IN PSECURITY_DESCRIPTOR _OriginalSecurityDescriptor,
             }
             _SEH2_END;
         }
-        else if(!CaptureIfKernel)
+        else if (!CaptureIfKernel)
         {
-            if(OriginalSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
+            if (OriginalSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
             {
                 return STATUS_UNKNOWN_REVISION;
             }
-            
+
             *CapturedSecurityDescriptor = OriginalSecurityDescriptor;
             return STATUS_SUCCESS;
         }
         else
         {
-            if(OriginalSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
+            if (OriginalSecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
             {
                 return STATUS_UNKNOWN_REVISION;
             }
-            
-            /* make a copy on the stack */
+
+            /* Make a copy on the stack */
             DescriptorCopy.Revision = OriginalSecurityDescriptor->Revision;
             DescriptorCopy.Sbz1 = OriginalSecurityDescriptor->Sbz1;
             DescriptorCopy.Control = OriginalSecurityDescriptor->Control;
             DescriptorSize = ((DescriptorCopy.Control & SE_SELF_RELATIVE) ?
                               sizeof(SECURITY_DESCRIPTOR_RELATIVE) : sizeof(SECURITY_DESCRIPTOR));
-            if(DescriptorCopy.Control & SE_SELF_RELATIVE)
+            if (DescriptorCopy.Control & SE_SELF_RELATIVE)
             {
                 PISECURITY_DESCRIPTOR_RELATIVE RelSD = (PISECURITY_DESCRIPTOR_RELATIVE)OriginalSecurityDescriptor;
-                
+
                 DescriptorCopy.Owner = (PSID)RelSD->Owner;
                 DescriptorCopy.Group = (PSID)RelSD->Group;
                 DescriptorCopy.Sacl = (PACL)RelSD->Sacl;
@@ -496,32 +502,34 @@ SeCaptureSecurityDescriptor(IN PSECURITY_DESCRIPTOR _OriginalSecurityDescriptor,
                 DescriptorCopy.Dacl = OriginalSecurityDescriptor->Dacl;
             }
         }
-        
-        if(DescriptorCopy.Control & SE_SELF_RELATIVE)
+
+        if (DescriptorCopy.Control & SE_SELF_RELATIVE)
         {
-            /* in case we're dealing with a self-relative descriptor, do a basic convert
-             to an absolute descriptor. We do this so we can simply access the data
-             using the pointers without calculating them again. */
+            /*
+             * In case we're dealing with a self-relative descriptor, do a basic convert
+             * to an absolute descriptor. We do this so we can simply access the data
+             * using the pointers without calculating them again.
+             */
             DescriptorCopy.Control &= ~SE_SELF_RELATIVE;
-            if(DescriptorCopy.Owner != NULL)
+            if (DescriptorCopy.Owner != NULL)
             {
                 DescriptorCopy.Owner = (PSID)((ULONG_PTR)OriginalSecurityDescriptor + (ULONG_PTR)DescriptorCopy.Owner);
             }
-            if(DescriptorCopy.Group != NULL)
+            if (DescriptorCopy.Group != NULL)
             {
                 DescriptorCopy.Group = (PSID)((ULONG_PTR)OriginalSecurityDescriptor + (ULONG_PTR)DescriptorCopy.Group);
             }
-            if(DescriptorCopy.Dacl != NULL)
+            if (DescriptorCopy.Dacl != NULL)
             {
                 DescriptorCopy.Dacl = (PACL)((ULONG_PTR)OriginalSecurityDescriptor + (ULONG_PTR)DescriptorCopy.Dacl);
             }
-            if(DescriptorCopy.Sacl != NULL)
+            if (DescriptorCopy.Sacl != NULL)
             {
                 DescriptorCopy.Sacl = (PACL)((ULONG_PTR)OriginalSecurityDescriptor + (ULONG_PTR)DescriptorCopy.Sacl);
             }
         }
-        
-        /* determine the size of the SIDs */
+
+        /* Determine the size of the SIDs */
 #define DetermineSIDSize(SidType)                                              \
 do {                                                                       \
 if(DescriptorCopy.SidType != NULL)                                         \
@@ -530,7 +538,7 @@ SID *SidType = (SID*)DescriptorCopy.SidType;                             \
 \
 if(CurrentMode != KernelMode)                                            \
 {                                                                        \
-/* securely access the buffers! */                                     \
+/* Securely access the buffers! */                                     \
 _SEH2_TRY                                                               \
 {                                                                      \
 SidType##SAC = ProbeForReadUchar(&SidType->SubAuthorityCount);       \
@@ -555,13 +563,13 @@ DescriptorSize += ROUND_UP(SidType##Size, sizeof(ULONG));              \
 }                                                                        \
 }                                                                          \
 } while(0)
-        
+
         DetermineSIDSize(Owner);
         DetermineSIDSize(Group);
-        
+
 #undef DetermineSIDSize
-        
-        /* determine the size of the ACLs */
+
+        /* Determine the size of the ACLs */
 #define DetermineACLSize(AclType, AclFlag)                                     \
 do {                                                                       \
 if((DescriptorCopy.Control & SE_##AclFlag##_PRESENT) &&                    \
@@ -571,7 +579,7 @@ PACL AclType = (PACL)DescriptorCopy.AclType;                             \
 \
 if(CurrentMode != KernelMode)                                            \
 {                                                                        \
-/* securely access the buffers! */                                     \
+/* Securely access the buffers! */                                     \
 _SEH2_TRY                                                               \
 {                                                                      \
 AclType##Size = ProbeForReadUshort(&AclType->AclSize);               \
@@ -598,33 +606,37 @@ else                                                                       \
 DescriptorCopy.AclType = NULL;                                           \
 }                                                                          \
 } while(0)
-        
+
         DetermineACLSize(Sacl, SACL);
         DetermineACLSize(Dacl, DACL);
-        
+
 #undef DetermineACLSize
-        
-        /* allocate enough memory to store a complete copy of a self-relative
-         security descriptor */
+
+        /*
+         * Allocate enough memory to store a complete copy of a self-relative
+         * security descriptor
+         */
         NewDescriptor = ExAllocatePoolWithTag(PoolType,
                                               DescriptorSize,
                                               TAG_SD);
-        if(NewDescriptor != NULL)
+        if (NewDescriptor != NULL)
         {
             ULONG_PTR Offset = sizeof(SECURITY_DESCRIPTOR);
-            
+
             RtlZeroMemory(NewDescriptor, DescriptorSize);
             NewDescriptor->Revision = DescriptorCopy.Revision;
             NewDescriptor->Sbz1 = DescriptorCopy.Sbz1;
             NewDescriptor->Control = DescriptorCopy.Control | SE_SELF_RELATIVE;
-            
+
             _SEH2_TRY
             {
-                /* setup the offsets and copy the SIDs and ACLs to the new
-                 self-relative security descriptor. Probing the pointers is not
-                 neccessary anymore as we did that when collecting the sizes!
-                 Make sure to validate the SIDs and ACLs *again* as they could have
-                 been modified in the meanwhile! */
+                /*
+                 * Setup the offsets and copy the SIDs and ACLs to the new
+                 * self-relative security descriptor. Probing the pointers is not
+                 * neccessary anymore as we did that when collecting the sizes!
+                 * Make sure to validate the SIDs and ACLs *again* as they could have
+                 * been modified in the meanwhile!
+                 */
 #define CopySID(Type)                                                          \
 do {                                                                   \
 if(DescriptorCopy.Type != NULL)                                        \
@@ -642,12 +654,12 @@ RtlRaiseStatus(STATUS_INVALID_SID);                                \
 Offset += ROUND_UP(Type##Size, sizeof(ULONG));                       \
 }                                                                      \
 } while(0)
-                
+
                 CopySID(Owner);
                 CopySID(Group);
-                
+
 #undef CopySID
-                
+
 #define CopyACL(Type)                                                          \
 do {                                                                   \
 if(DescriptorCopy.Type != NULL)                                        \
@@ -665,25 +677,26 @@ RtlRaiseStatus(STATUS_INVALID_ACL);                                \
 Offset += ROUND_UP(Type##Size, sizeof(ULONG));                       \
 }                                                                      \
 } while(0)
-                
+
                 CopyACL(Sacl);
                 CopyACL(Dacl);
-                
+
 #undef CopyACL
             }
             _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
             {
-                /* we failed to copy the data to the new descriptor */
+                /* We failed to copy the data to the new descriptor */
                 ExFreePool(NewDescriptor);
                 _SEH2_YIELD(return _SEH2_GetExceptionCode());
             }
             _SEH2_END;
-            
-            /* we're finally done! copy the pointer to the captured descriptor to
-             to the caller */
+
+            /*
+             * We're finally done!
+             * Copy the pointer to the captured descriptor to to the caller.
+             */
             *CapturedSecurityDescriptor = NewDescriptor;
             return STATUS_SUCCESS;
-
         }
         else
         {
@@ -692,10 +705,10 @@ Offset += ROUND_UP(Type##Size, sizeof(ULONG));                       \
     }
     else
     {
-        /* nothing to do... */
+        /* Nothing to do... */
         *CapturedSecurityDescriptor = NULL;
     }
-    
+
     return Status;
 }
 
@@ -721,9 +734,9 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
     ULONG Control = 0;
     ULONG_PTR Current;
     ULONG SdLength;
-    
+
     RelSD = (PISECURITY_DESCRIPTOR_RELATIVE)SecurityDescriptor;
-    
+
     if (*ObjectsSecurityDescriptor == NULL)
     {
         if (*Length < sizeof(SECURITY_DESCRIPTOR_RELATIVE))
@@ -731,15 +744,15 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
             *Length = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
             return STATUS_BUFFER_TOO_SMALL;
         }
-        
+
         *Length = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
         RtlCreateSecurityDescriptorRelative(RelSD,
                                             SECURITY_DESCRIPTOR_REVISION);
         return STATUS_SUCCESS;
     }
-    
+
     ObjectSd = *ObjectsSecurityDescriptor;
-    
+
     /* Calculate the required security descriptor length */
     Control = SE_SELF_RELATIVE;
     if ((*SecurityInformation & OWNER_SECURITY_INFORMATION) &&
@@ -749,7 +762,7 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
         OwnerLength = ROUND_UP(RtlLengthSid(Owner), 4);
         Control |= (ObjectSd->Control & SE_OWNER_DEFAULTED);
     }
-    
+
     if ((*SecurityInformation & GROUP_SECURITY_INFORMATION) &&
         (ObjectSd->Group != NULL))
     {
@@ -757,7 +770,7 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
         GroupLength = ROUND_UP(RtlLengthSid(Group), 4);
         Control |= (ObjectSd->Control & SE_GROUP_DEFAULTED);
     }
-    
+
     if ((*SecurityInformation & DACL_SECURITY_INFORMATION) &&
         (ObjectSd->Control & SE_DACL_PRESENT))
     {
@@ -766,9 +779,10 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
             Dacl = (PACL)((ULONG_PTR)ObjectSd->Dacl + (ULONG_PTR)ObjectSd);
             DaclLength = ROUND_UP((ULONG)Dacl->AclSize, 4);
         }
+
         Control |= (ObjectSd->Control & (SE_DACL_DEFAULTED | SE_DACL_PRESENT));
     }
-    
+
     if ((*SecurityInformation & SACL_SECURITY_INFORMATION) &&
         (ObjectSd->Control & SE_SACL_PRESENT))
     {
@@ -777,9 +791,10 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
             Sacl = (PACL)((ULONG_PTR)ObjectSd->Sacl + (ULONG_PTR)ObjectSd);
             SaclLength = ROUND_UP(Sacl->AclSize, 4);
         }
+
         Control |= (ObjectSd->Control & (SE_SACL_DEFAULTED | SE_SACL_PRESENT));
     }
-    
+
     SdLength = OwnerLength + GroupLength + DaclLength +
     SaclLength + sizeof(SECURITY_DESCRIPTOR_RELATIVE);
     if (*Length < SdLength)
@@ -787,14 +802,14 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
         *Length = SdLength;
         return STATUS_BUFFER_TOO_SMALL;
     }
-    
+
     /* Build the new security descrtiptor */
     RtlCreateSecurityDescriptorRelative(RelSD,
                                         SECURITY_DESCRIPTOR_REVISION);
     RelSD->Control = (USHORT)Control;
-    
+
     Current = (ULONG_PTR)(RelSD + 1);
-    
+
     if (OwnerLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -803,7 +818,7 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
         RelSD->Owner = (ULONG)(Current - (ULONG_PTR)SecurityDescriptor);
         Current += OwnerLength;
     }
-    
+
     if (GroupLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -812,7 +827,7 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
         RelSD->Group = (ULONG)(Current - (ULONG_PTR)SecurityDescriptor);
         Current += GroupLength;
     }
-    
+
     if (DaclLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -821,7 +836,7 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
         RelSD->Dacl = (ULONG)(Current - (ULONG_PTR)SecurityDescriptor);
         Current += DaclLength;
     }
-    
+
     if (SaclLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -830,9 +845,9 @@ SeQuerySecurityDescriptorInfo(IN PSECURITY_INFORMATION SecurityInformation,
         RelSD->Sacl = (ULONG)(Current - (ULONG_PTR)SecurityDescriptor);
         Current += SaclLength;
     }
-    
+
     *Length = SdLength;
-    
+
     return STATUS_SUCCESS;
 }
 
@@ -846,18 +861,20 @@ SeReleaseSecurityDescriptor(IN PSECURITY_DESCRIPTOR CapturedSecurityDescriptor,
                             IN BOOLEAN CaptureIfKernelMode)
 {
     PAGED_CODE();
-    
-    /* WARNING! You need to call this function with the same value for CurrentMode
-     and CaptureIfKernelMode that you previously passed to
-     SeCaptureSecurityDescriptor() in order to avoid memory leaks! */
-    if(CapturedSecurityDescriptor != NULL &&
-       (CurrentMode != KernelMode ||
-        (CurrentMode == KernelMode && CaptureIfKernelMode)))
-    {
-        /* only delete the descriptor when SeCaptureSecurityDescriptor() allocated one! */
+
+    /*
+     * WARNING! You need to call this function with the same value for CurrentMode
+     * and CaptureIfKernelMode that you previously passed to
+     * SeCaptureSecurityDescriptor() in order to avoid memory leaks!
+     */
+    if (CapturedSecurityDescriptor != NULL &&
+        (CurrentMode != KernelMode ||
+         (CurrentMode == KernelMode && CaptureIfKernelMode)))
+    {
+        /* Only delete the descriptor when SeCaptureSecurityDescriptor() allocated one! */
         ExFreePoolWithTag(CapturedSecurityDescriptor, TAG_SD);
     }
-    
+
     return STATUS_SUCCESS;
 }
 
@@ -886,26 +903,28 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
     ULONG Control = 0;
     ULONG_PTR Current;
     SECURITY_INFORMATION SecurityInformation;
-    
+
     ObjectSd = *ObjectsSecurityDescriptor;
-    
+
+    /* The object does not have a security descriptor. */
     if (!ObjectSd)
-        return STATUS_NO_SECURITY_ON_OBJECT; // The object does not have a security descriptor.
-    
+        return STATUS_NO_SECURITY_ON_OBJECT;
+
     SecurityInformation = *_SecurityInformation;
-    
+
     /* Get owner and owner size */
     if (SecurityInformation & OWNER_SECURITY_INFORMATION)
     {
         if (SecurityDescriptor->Owner != NULL)
         {
-            if( SecurityDescriptor->Control & SE_SELF_RELATIVE )
+            if (SecurityDescriptor->Control & SE_SELF_RELATIVE)
                 Owner = (PSID)((ULONG_PTR)SecurityDescriptor->Owner +
                                (ULONG_PTR)SecurityDescriptor);
             else
                 Owner = (PSID)SecurityDescriptor->Owner;
             OwnerLength = ROUND_UP(RtlLengthSid(Owner), 4);
         }
+
         Control |= (SecurityDescriptor->Control & SE_OWNER_DEFAULTED);
     }
     else
@@ -915,6 +934,7 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
             Owner = (PSID)((ULONG_PTR)ObjectSd->Owner + (ULONG_PTR)ObjectSd);
             OwnerLength = ROUND_UP(RtlLengthSid(Owner), 4);
         }
+
         Control |= (ObjectSd->Control & SE_OWNER_DEFAULTED);
     }
     
@@ -930,6 +950,7 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
                 Group = (PSID)SecurityDescriptor->Group;
             GroupLength = ROUND_UP(RtlLengthSid(Group), 4);
         }
+
         Control |= (SecurityDescriptor->Control & SE_GROUP_DEFAULTED);
     }
     else
@@ -939,9 +960,10 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
             Group = (PSID)((ULONG_PTR)ObjectSd->Group + (ULONG_PTR)ObjectSd);
             GroupLength = ROUND_UP(RtlLengthSid(Group), 4);
         }
+
         Control |= (ObjectSd->Control & SE_GROUP_DEFAULTED);
     }
-    
+
     /* Get DACL and DACL size */
     if (SecurityInformation & DACL_SECURITY_INFORMATION)
     {
@@ -953,9 +975,10 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
                               (ULONG_PTR)SecurityDescriptor);
             else
                 Dacl = (PACL)SecurityDescriptor->Dacl;
-            
+
             DaclLength = ROUND_UP((ULONG)Dacl->AclSize, 4);
         }
+
         Control |= (SecurityDescriptor->Control & (SE_DACL_DEFAULTED | SE_DACL_PRESENT));
     }
     else
@@ -966,6 +989,7 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
             Dacl = (PACL)((ULONG_PTR)ObjectSd->Dacl + (ULONG_PTR)ObjectSd);
             DaclLength = ROUND_UP((ULONG)Dacl->AclSize, 4);
         }
+
         Control |= (ObjectSd->Control & (SE_DACL_DEFAULTED | SE_DACL_PRESENT));
     }
     
@@ -982,6 +1006,7 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
                 Sacl = (PACL)SecurityDescriptor->Sacl;
             SaclLength = ROUND_UP((ULONG)Sacl->AclSize, 4);
         }
+
         Control |= (SecurityDescriptor->Control & (SE_SACL_DEFAULTED | SE_SACL_PRESENT));
     }
     else
@@ -992,9 +1017,10 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
             Sacl = (PACL)((ULONG_PTR)ObjectSd->Sacl + (ULONG_PTR)ObjectSd);
             SaclLength = ROUND_UP((ULONG)Sacl->AclSize, 4);
         }
+
         Control |= (ObjectSd->Control & (SE_SACL_DEFAULTED | SE_SACL_PRESENT));
     }
-    
+
     NewSd = ExAllocatePool(NonPagedPool,
                            sizeof(SECURITY_DESCRIPTOR) + OwnerLength + GroupLength +
                            DaclLength + SaclLength);
@@ -1003,14 +1029,15 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
         ObDereferenceObject(Object);
         return STATUS_INSUFFICIENT_RESOURCES;
     }
-    
+
     RtlCreateSecurityDescriptor(NewSd,
                                 SECURITY_DESCRIPTOR_REVISION1);
+
     /* We always build a self-relative descriptor */
     NewSd->Control = (USHORT)Control | SE_SELF_RELATIVE;
-    
+
     Current = (ULONG_PTR)NewSd + sizeof(SECURITY_DESCRIPTOR);
-    
+
     if (OwnerLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -1019,7 +1046,7 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
         NewSd->Owner = (PSID)(Current - (ULONG_PTR)NewSd);
         Current += OwnerLength;
     }
-    
+
     if (GroupLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -1028,7 +1055,7 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
         NewSd->Group = (PSID)(Current - (ULONG_PTR)NewSd);
         Current += GroupLength;
     }
-    
+
     if (DaclLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -1037,7 +1064,7 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
         NewSd->Dacl = (PACL)(Current - (ULONG_PTR)NewSd);
         Current += DaclLength;
     }
-    
+
     if (SaclLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -1045,8 +1072,8 @@ SeSetSecurityDescriptorInfo(IN PVOID Object OPTIONAL,
                       SaclLength);
         NewSd->Sacl = (PACL)(Current - (ULONG_PTR)NewSd);
         Current += SaclLength;
-    }    
-    
+    }
+
     *ObjectsSecurityDescriptor = NewSd;
     return STATUS_SUCCESS;
 }
@@ -1065,12 +1092,13 @@ SeSetSecurityDescriptorInfoEx(IN PVOID Object OPTIONAL,
                               IN PGENERIC_MAPPING GenericMapping)
 {
     PISECURITY_DESCRIPTOR ObjectSd = *ObjectsSecurityDescriptor;
-    
+
+    /* The object does not have a security descriptor. */
     if (!ObjectSd)
-        return STATUS_NO_SECURITY_ON_OBJECT; // The object does not have a security descriptor.
-    
-       UNIMPLEMENTED;
-       return STATUS_NOT_IMPLEMENTED;
+        return STATUS_NO_SECURITY_ON_OBJECT;
+
+    UNIMPLEMENTED;
+    return STATUS_NOT_IMPLEMENTED;
 }
 
 
@@ -1085,54 +1113,54 @@ SeValidSecurityDescriptor(IN ULONG Length,
     PISID Sid;
     PACL Acl;
     PISECURITY_DESCRIPTOR SecurityDescriptor = _SecurityDescriptor;
-    
+
     if (Length < SECURITY_DESCRIPTOR_MIN_LENGTH)
     {
         DPRINT1("Invalid Security Descriptor revision\n");
         return FALSE;
     }
-    
+
     if (SecurityDescriptor->Revision != SECURITY_DESCRIPTOR_REVISION1)
     {
         DPRINT1("Invalid Security Descriptor revision\n");
         return FALSE;
     }
-    
+
     if (!(SecurityDescriptor->Control & SE_SELF_RELATIVE))
     {
         DPRINT1("No self-relative Security Descriptor\n");
         return FALSE;
     }
-    
+
     SdLength = sizeof(SECURITY_DESCRIPTOR);
-    
+
     /* Check Owner SID */
     if (SecurityDescriptor->Owner == NULL)
     {
         DPRINT1("No Owner SID\n");
         return FALSE;
     }
-    
+
     if ((ULONG_PTR)SecurityDescriptor->Owner % sizeof(ULONG))
     {
         DPRINT1("Invalid Owner SID alignment\n");
         return FALSE;
     }
-    
+
     Sid = (PISID)((ULONG_PTR)SecurityDescriptor + (ULONG_PTR)SecurityDescriptor->Owner);
     if (Sid->Revision != SID_REVISION)
     {
         DPRINT1("Invalid Owner SID revision\n");
         return FALSE;
     }
-    
+
     SdLength += (sizeof(SID) + (Sid->SubAuthorityCount - 1) * sizeof(ULONG));
     if (Length < SdLength)
     {
         DPRINT1("Invalid Owner SID size\n");
         return FALSE;
     }
-    
+
     /* Check Group SID */
     if (SecurityDescriptor->Group != NULL)
     {
@@ -1141,14 +1169,14 @@ SeValidSecurityDescriptor(IN ULONG Length,
             DPRINT1("Invalid Group SID alignment\n");
             return FALSE;
         }
-        
+
         Sid = (PSID)((ULONG_PTR)SecurityDescriptor + (ULONG_PTR)SecurityDescriptor->Group);
         if (Sid->Revision != SID_REVISION)
         {
             DPRINT1("Invalid Group SID revision\n");
             return FALSE;
         }
-        
+
         SdLength += (sizeof(SID) + (Sid->SubAuthorityCount - 1) * sizeof(ULONG));
         if (Length < SdLength)
         {
@@ -1156,7 +1184,7 @@ SeValidSecurityDescriptor(IN ULONG Length,
             return FALSE;
         }
     }
-    
+
     /* Check DACL */
     if (SecurityDescriptor->Dacl != NULL)
     {
@@ -1165,7 +1193,7 @@ SeValidSecurityDescriptor(IN ULONG Length,
             DPRINT1("Invalid DACL alignment\n");
             return FALSE;
         }
-        
+
         Acl = (PACL)((ULONG_PTR)SecurityDescriptor + (ULONG_PTR)SecurityDescriptor->Dacl);
         if ((Acl->AclRevision < MIN_ACL_REVISION) &&
             (Acl->AclRevision > MAX_ACL_REVISION))
@@ -1173,7 +1201,7 @@ SeValidSecurityDescriptor(IN ULONG Length,
             DPRINT1("Invalid DACL revision\n");
             return FALSE;
         }
-        
+
         SdLength += Acl->AclSize;
         if (Length < SdLength)
         {
@@ -1181,7 +1209,7 @@ SeValidSecurityDescriptor(IN ULONG Length,
             return FALSE;
         }
     }
-    
+
     /* Check SACL */
     if (SecurityDescriptor->Sacl != NULL)
     {
@@ -1190,7 +1218,7 @@ SeValidSecurityDescriptor(IN ULONG Length,
             DPRINT1("Invalid SACL alignment\n");
             return FALSE;
         }
-        
+
         Acl = (PACL)((ULONG_PTR)SecurityDescriptor + (ULONG_PTR)SecurityDescriptor->Sacl);
         if ((Acl->AclRevision < MIN_ACL_REVISION) ||
             (Acl->AclRevision > MAX_ACL_REVISION))
@@ -1198,7 +1226,7 @@ SeValidSecurityDescriptor(IN ULONG Length,
             DPRINT1("Invalid SACL revision\n");
             return FALSE;
         }
-        
+
         SdLength += Acl->AclSize;
         if (Length < SdLength)
         {
@@ -1206,7 +1234,7 @@ SeValidSecurityDescriptor(IN ULONG Length,
             return FALSE;
         }
     }
-    
+
     return TRUE;
 }
 
@@ -1217,13 +1245,13 @@ NTSTATUS NTAPI
 SeDeassignSecurity(PSECURITY_DESCRIPTOR *SecurityDescriptor)
 {
     PAGED_CODE();
-    
+
     if (*SecurityDescriptor != NULL)
     {
         ExFreePool(*SecurityDescriptor);
         *SecurityDescriptor = NULL;
     }
-    
+
     return STATUS_SUCCESS;
 }
 
@@ -1273,12 +1301,12 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
     PSID Group = NULL;
     PACL Dacl = NULL;
     PACL Sacl = NULL;
-    
+
     PAGED_CODE();
-    
+
     /* Lock subject context */
     SeLockSubjectContext(SubjectContext);
-    
+
     if (SubjectContext->ClientToken != NULL)
     {
         Token = SubjectContext->ClientToken;
@@ -1287,18 +1315,16 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
     {
         Token = SubjectContext->PrimaryToken;
     }
-    
-    
+
     /* Inherit the Owner SID */
     if (ExplicitDescriptor != NULL && ExplicitDescriptor->Owner != NULL)
     {
         DPRINT("Use explicit owner sid!\n");
         Owner = ExplicitDescriptor->Owner;
-        
+
         if (ExplicitDescriptor->Control & SE_SELF_RELATIVE)
         {
             Owner = (PSID)(((ULONG_PTR)Owner) + (ULONG_PTR)ExplicitDescriptor);
-            
         }
     }
     else
@@ -1313,13 +1339,12 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
             DPRINT("Use default owner sid!\n");
             Owner = SeLocalSystemSid;
         }
-        
+
         Control |= SE_OWNER_DEFAULTED;
     }
-    
+
     OwnerLength = ROUND_UP(RtlLengthSid(Owner), 4);
-    
-    
+
     /* Inherit the Group SID */
     if (ExplicitDescriptor != NULL && ExplicitDescriptor->Group != NULL)
     {
@@ -1342,13 +1367,12 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
             DPRINT("Use default group sid!\n");
             Group = SeLocalSystemSid;
         }
-        
+
         Control |= SE_OWNER_DEFAULTED;
     }
-    
+
     GroupLength = ROUND_UP(RtlLengthSid(Group), 4);
-    
-    
+
     /* Inherit the DACL */
     if (ExplicitDescriptor != NULL &&
         (ExplicitDescriptor->Control & SE_DACL_PRESENT) &&
@@ -1360,7 +1384,7 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         {
             Dacl = (PACL)(((ULONG_PTR)Dacl) + (ULONG_PTR)ExplicitDescriptor);
         }
-        
+
         Control |= SE_DACL_PRESENT;
     }
     else if (ParentDescriptor != NULL &&
@@ -1373,6 +1397,7 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         {
             Dacl = (PACL)(((ULONG_PTR)Dacl) + (ULONG_PTR)ParentDescriptor);
         }
+
         Control |= (SE_DACL_PRESENT | SE_DACL_DEFAULTED);
     }
     else if (Token != NULL && Token->DefaultDacl != NULL)
@@ -1388,10 +1413,9 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         Dacl = NULL;
         Control |= (SE_DACL_PRESENT | SE_DACL_DEFAULTED);
     }
-    
+
     DaclLength = (Dacl != NULL) ? ROUND_UP(Dacl->AclSize, 4) : 0;
-    
-    
+
     /* Inherit the SACL */
     if (ExplicitDescriptor != NULL &&
         (ExplicitDescriptor->Control & SE_SACL_PRESENT) &&
@@ -1403,7 +1427,7 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         {
             Sacl = (PACL)(((ULONG_PTR)Sacl) + (ULONG_PTR)ExplicitDescriptor);
         }
-        
+
         Control |= SE_SACL_PRESENT;
     }
     else if (ParentDescriptor != NULL &&
@@ -1416,23 +1440,23 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         {
             Sacl = (PACL)(((ULONG_PTR)Sacl) + (ULONG_PTR)ParentDescriptor);
         }
+
         Control |= (SE_SACL_PRESENT | SE_SACL_DEFAULTED);
     }
-    
+
     SaclLength = (Sacl != NULL) ? ROUND_UP(Sacl->AclSize, 4) : 0;
-    
-    
+
     /* Allocate and initialize the new security descriptor */
     Length = sizeof(SECURITY_DESCRIPTOR) +
     OwnerLength + GroupLength + DaclLength + SaclLength;
-    
+
     DPRINT("L: sizeof(SECURITY_DESCRIPTOR) %d OwnerLength %d GroupLength %d DaclLength %d SaclLength %d\n",
            sizeof(SECURITY_DESCRIPTOR),
            OwnerLength,
            GroupLength,
            DaclLength,
            SaclLength);
-    
+
     Descriptor = ExAllocatePoolWithTag(PagedPool,
                                        Length,
                                        TAG_SD);
@@ -1442,15 +1466,15 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         /* FIXME: Unlock subject context */
         return STATUS_INSUFFICIENT_RESOURCES;
     }
-    
+
     RtlZeroMemory( Descriptor, Length );
     RtlCreateSecurityDescriptor(Descriptor,
                                 SECURITY_DESCRIPTOR_REVISION);
-    
+
     Descriptor->Control = (USHORT)Control | SE_SELF_RELATIVE;
-    
+
     Current = (ULONG_PTR)Descriptor + sizeof(SECURITY_DESCRIPTOR);
-    
+
     if (SaclLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -1459,7 +1483,7 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         Descriptor->Sacl = (PACL)((ULONG_PTR)Current - (ULONG_PTR)Descriptor);
         Current += SaclLength;
     }
-    
+
     if (DaclLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -1468,7 +1492,7 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         Descriptor->Dacl = (PACL)((ULONG_PTR)Current - (ULONG_PTR)Descriptor);
         Current += DaclLength;
     }
-    
+
     if (OwnerLength != 0)
     {
         RtlCopyMemory((PVOID)Current,
@@ -1479,8 +1503,10 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
         DPRINT("Owner of %x at %x\n", Descriptor, Descriptor->Owner);
     }
     else
+    {
         DPRINT("Owner of %x is zero length\n", Descriptor);
-    
+    }
+
     if (GroupLength != 0)
     {
         memmove((PVOID)Current,
@@ -1488,15 +1514,15 @@ SeAssignSecurity(PSECURITY_DESCRIPTOR _ParentDescriptor OPTIONAL,
                 GroupLength);
         Descriptor->Group = (PSID)((ULONG_PTR)Current - (ULONG_PTR)Descriptor);
     }
-    
+
     /* Unlock subject context */
     SeUnlockSubjectContext(SubjectContext);
-    
+
     *NewDescriptor = Descriptor;
-    
+
     DPRINT("Descrptor %x\n", Descriptor);
     ASSERT(RtlLengthSecurityDescriptor(Descriptor));
-    
+
     return STATUS_SUCCESS;
 }