[lsalib]
authorEric Kohl <eric.kohl@reactos.org>
Sun, 27 Dec 2009 19:46:13 +0000 (19:46 +0000)
committerEric Kohl <eric.kohl@reactos.org>
Sun, 27 Dec 2009 19:46:13 +0000 (19:46 +0000)
Fix indentation. No code changes.

svn path=/trunk/; revision=44776

reactos/lib/lsalib/lsa.c

index 9ac411c..a166309 100644 (file)
@@ -28,97 +28,99 @@ extern HANDLE Secur32Heap;
 NTSTATUS WINAPI
 LsaDeregisterLogonProcess(HANDLE LsaHandle)
 {
-   LSASS_REQUEST Request;
-   LSASS_REPLY Reply;
-   NTSTATUS Status;
-
-   Request.Header.u1.s1.DataLength = 0;
-   Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
-   Request.Type = LSASS_REQUEST_DEREGISTER_LOGON_PROCESS;
-   Status = NtRequestWaitReplyPort(LsaHandle,
-                                  &Request.Header,
-                                  &Reply.Header);
-   if (!NT_SUCCESS(Status))
-     {
-       return(Status);
-     }
-
-   if (!NT_SUCCESS(Reply.Status))
-     {
-       return(Reply.Status);
-     }
-
-   return(Status);
+    LSASS_REQUEST Request;
+    LSASS_REPLY Reply;
+    NTSTATUS Status;
+
+    Request.Header.u1.s1.DataLength = 0;
+    Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
+    Request.Type = LSASS_REQUEST_DEREGISTER_LOGON_PROCESS;
+    Status = NtRequestWaitReplyPort(LsaHandle,
+                                    &Request.Header,
+                                    &Reply.Header);
+    if (!NT_SUCCESS(Status))
+    {
+        return Status;
+    }
+
+    if (!NT_SUCCESS(Reply.Status))
+    {
+        return Reply.Status;
+    }
+
+    return Status;
 }
 
+
 /*
  * @unimplemented
  */
 NTSTATUS WINAPI
 LsaConnectUntrusted(PHANDLE LsaHandle)
 {
-  UNIMPLEMENTED;
-  return STATUS_UNSUCCESSFUL;
+    UNIMPLEMENTED;
+    return STATUS_UNSUCCESSFUL;
 }
 
+
 /*
  * @implemented
  */
 NTSTATUS WINAPI
 LsaCallAuthenticationPackage(HANDLE LsaHandle,
-                            ULONG AuthenticationPackage,
-                            PVOID ProtocolSubmitBuffer,
-                            ULONG SubmitBufferLength,
-                            PVOID* ProtocolReturnBuffer,
-                            PULONG ReturnBufferLength,
-                            PNTSTATUS ProtocolStatus)
+                             ULONG AuthenticationPackage,
+                             PVOID ProtocolSubmitBuffer,
+                             ULONG SubmitBufferLength,
+                             PVOID *ProtocolReturnBuffer,
+                             PULONG ReturnBufferLength,
+                             PNTSTATUS ProtocolStatus)
 {
-   PLSASS_REQUEST Request;
-   PLSASS_REPLY Reply;
-   LSASS_REQUEST RawRequest;
-   LSASS_REPLY RawReply;
-   NTSTATUS Status;
-   ULONG OutBufferSize;
-
-   Request = (PLSASS_REQUEST)&RawRequest;
-   Reply = (PLSASS_REPLY)&RawReply;
-
-   Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + SubmitBufferLength -
-     sizeof(PORT_MESSAGE);
-   Request->Header.u1.s1.TotalLength =
-     Request->Header.u1.s1.DataLength + sizeof(PORT_MESSAGE);
-   Request->Type = LSASS_REQUEST_CALL_AUTHENTICATION_PACKAGE;
-   Request->d.CallAuthenticationPackageRequest.AuthenticationPackage =
-     AuthenticationPackage;
-   Request->d.CallAuthenticationPackageRequest.InBufferLength =
-     SubmitBufferLength;
-   memcpy(Request->d.CallAuthenticationPackageRequest.InBuffer,
-         ProtocolSubmitBuffer,
-         SubmitBufferLength);
-
-   Status = NtRequestWaitReplyPort(LsaHandle,
-                                  &Request->Header,
-                                  &Reply->Header);
-   if (!NT_SUCCESS(Status))
-     {
-       return(Status);
-     }
-
-   if (!NT_SUCCESS(Reply->Status))
-     {
-       return(Reply->Status);
-     }
-
-   OutBufferSize = Reply->d.CallAuthenticationPackageReply.OutBufferLength;
-   *ProtocolReturnBuffer = RtlAllocateHeap(Secur32Heap,
-                                          0,
-                                          OutBufferSize);
-   *ReturnBufferLength = OutBufferSize;
-   memcpy(*ProtocolReturnBuffer,
-         Reply->d.CallAuthenticationPackageReply.OutBuffer,
-         *ReturnBufferLength);
-
-   return(Status);
+    PLSASS_REQUEST Request;
+    PLSASS_REPLY Reply;
+    LSASS_REQUEST RawRequest;
+    LSASS_REPLY RawReply;
+    NTSTATUS Status;
+    ULONG OutBufferSize;
+
+    Request = (PLSASS_REQUEST)&RawRequest;
+    Reply = (PLSASS_REPLY)&RawReply;
+
+    Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + SubmitBufferLength -
+        sizeof(PORT_MESSAGE);
+    Request->Header.u1.s1.TotalLength =
+        Request->Header.u1.s1.DataLength + sizeof(PORT_MESSAGE);
+    Request->Type = LSASS_REQUEST_CALL_AUTHENTICATION_PACKAGE;
+    Request->d.CallAuthenticationPackageRequest.AuthenticationPackage =
+        AuthenticationPackage;
+    Request->d.CallAuthenticationPackageRequest.InBufferLength =
+        SubmitBufferLength;
+    memcpy(Request->d.CallAuthenticationPackageRequest.InBuffer,
+           ProtocolSubmitBuffer,
+           SubmitBufferLength);
+
+    Status = NtRequestWaitReplyPort(LsaHandle,
+                                    &Request->Header,
+                                    &Reply->Header);
+    if (!NT_SUCCESS(Status))
+    {
+        return Status;
+    }
+
+    if (!NT_SUCCESS(Reply->Status))
+    {
+        return Reply->Status;
+    }
+
+    OutBufferSize = Reply->d.CallAuthenticationPackageReply.OutBufferLength;
+    *ProtocolReturnBuffer = RtlAllocateHeap(Secur32Heap,
+                                            0,
+                                            OutBufferSize);
+    *ReturnBufferLength = OutBufferSize;
+    memcpy(*ProtocolReturnBuffer,
+           Reply->d.CallAuthenticationPackageReply.OutBuffer,
+           *ReturnBufferLength);
+
+    return Status;
 }
 
 
@@ -128,7 +130,7 @@ LsaCallAuthenticationPackage(HANDLE LsaHandle,
 NTSTATUS WINAPI
 LsaFreeReturnBuffer(PVOID Buffer)
 {
-   return(RtlFreeHeap(Secur32Heap, 0, Buffer));
+    return RtlFreeHeap(Secur32Heap, 0, Buffer);
 }
 
 
@@ -137,36 +139,37 @@ LsaFreeReturnBuffer(PVOID Buffer)
  */
 NTSTATUS WINAPI
 LsaLookupAuthenticationPackage(HANDLE LsaHandle,
-                              PLSA_STRING PackageName,
-                              PULONG AuthenticationPackage)
+                               PLSA_STRING PackageName,
+                               PULONG AuthenticationPackage)
 {
-   NTSTATUS Status;
-   PLSASS_REQUEST Request;
-   LSASS_REQUEST RawRequest;
-   LSASS_REPLY Reply;
-
-   Request = (PLSASS_REQUEST)&RawRequest;
-   Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + PackageName->Length -
-     sizeof(PORT_MESSAGE);
-   Request->Header.u1.s1.TotalLength = Request->Header.u1.s1.DataLength +
-     sizeof(PORT_MESSAGE);
-   Request->Type = LSASS_REQUEST_LOOKUP_AUTHENTICATION_PACKAGE;
-
-   Status = NtRequestWaitReplyPort(LsaHandle,
-                         &Request->Header,
-                         &Reply.Header);
-   if (!NT_SUCCESS(Status))
-     {
-       return(Status);
-     }
-   if (!NT_SUCCESS(Reply.Status))
-     {
-       return(Reply.Status);
-     }
-
-   *AuthenticationPackage = Reply.d.LookupAuthenticationPackageReply.Package;
-
-   return(Reply.Status);
+    NTSTATUS Status;
+    PLSASS_REQUEST Request;
+    LSASS_REQUEST RawRequest;
+    LSASS_REPLY Reply;
+
+    Request = (PLSASS_REQUEST)&RawRequest;
+    Request->Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) + PackageName->Length -
+        sizeof(PORT_MESSAGE);
+    Request->Header.u1.s1.TotalLength = Request->Header.u1.s1.DataLength +
+        sizeof(PORT_MESSAGE);
+    Request->Type = LSASS_REQUEST_LOOKUP_AUTHENTICATION_PACKAGE;
+
+    Status = NtRequestWaitReplyPort(LsaHandle,
+                                    &Request->Header,
+                                    &Reply.Header);
+    if (!NT_SUCCESS(Status))
+    {
+        return Status;
+    }
+
+    if (!NT_SUCCESS(Reply.Status))
+    {
+        return Reply.Status;
+    }
+
+    *AuthenticationPackage = Reply.d.LookupAuthenticationPackageReply.Package;
+
+    return Reply.Status;
 }
 
 
@@ -175,102 +178,102 @@ LsaLookupAuthenticationPackage(HANDLE LsaHandle,
  */
 NTSTATUS WINAPI
 LsaLogonUser(HANDLE LsaHandle,
-            PLSA_STRING OriginName,
-            SECURITY_LOGON_TYPE LogonType,
-            ULONG AuthenticationPackage,
-            PVOID AuthenticationInformation,
-            ULONG AuthenticationInformationLength,
-            PTOKEN_GROUPS LocalGroups,
-            PTOKEN_SOURCE SourceContext,
-            PVOID* ProfileBuffer,
-            PULONG ProfileBufferLength,
-            PLUID LogonId,
-            PHANDLE Token,
-            PQUOTA_LIMITS Quotas,
-            PNTSTATUS SubStatus)
+             PLSA_STRING OriginName,
+             SECURITY_LOGON_TYPE LogonType,
+             ULONG AuthenticationPackage,
+             PVOID AuthenticationInformation,
+             ULONG AuthenticationInformationLength,
+             PTOKEN_GROUPS LocalGroups,
+             PTOKEN_SOURCE SourceContext,
+             PVOID *ProfileBuffer,
+             PULONG ProfileBufferLength,
+             PLUID LogonId,
+             PHANDLE Token,
+             PQUOTA_LIMITS Quotas,
+             PNTSTATUS SubStatus)
 {
-   ULONG RequestLength;
-   ULONG CurrentLength;
-   PLSASS_REQUEST Request;
-   LSASS_REQUEST RawMessage;
-   PLSASS_REPLY Reply;
-   LSASS_REPLY RawReply;
-   NTSTATUS Status;
-
-   RequestLength = sizeof(LSASS_REQUEST) - sizeof(PORT_MESSAGE);
-   RequestLength = RequestLength + (OriginName->Length * sizeof(WCHAR));
-   RequestLength = RequestLength + AuthenticationInformationLength;
-   RequestLength = RequestLength +
-     (LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
-
-   CurrentLength = 0;
-   Request = (PLSASS_REQUEST)&RawMessage;
-
-   Request->d.LogonUserRequest.OriginNameLength = OriginName->Length;
-   Request->d.LogonUserRequest.OriginName = (PWSTR)&RawMessage + CurrentLength;
-   memcpy((PWSTR)&RawMessage + CurrentLength,
-         OriginName->Buffer,
-         OriginName->Length * sizeof(WCHAR));
-   CurrentLength = CurrentLength + (OriginName->Length * sizeof(WCHAR));
-
-   Request->d.LogonUserRequest.LogonType = LogonType;
-
-   Request->d.LogonUserRequest.AuthenticationPackage =
-     AuthenticationPackage;
-
-   Request->d.LogonUserRequest.AuthenticationInformation =
-     (PVOID)((ULONG_PTR)&RawMessage + CurrentLength);
-   Request->d.LogonUserRequest.AuthenticationInformationLength =
-     AuthenticationInformationLength;
-   memcpy((PVOID)((ULONG_PTR)&RawMessage + CurrentLength),
-         AuthenticationInformation,
-         AuthenticationInformationLength);
-   CurrentLength = CurrentLength + AuthenticationInformationLength;
-
-   Request->d.LogonUserRequest.LocalGroupsCount = LocalGroups->GroupCount;
-   Request->d.LogonUserRequest.LocalGroups =
-     (PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength;
-   memcpy((PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength,
-         LocalGroups->Groups,
-         LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
-
-   Request->d.LogonUserRequest.SourceContext = *SourceContext;
-
-   Request->Type = LSASS_REQUEST_LOGON_USER;
-   Request->Header.u1.s1.DataLength = RequestLength - sizeof(PORT_MESSAGE);
-   Request->Header.u1.s1.TotalLength = RequestLength + sizeof(PORT_MESSAGE);
-
-   Reply = (PLSASS_REPLY)&RawReply;
-
-   Status = NtRequestWaitReplyPort(LsaHandle,
-                                  &Request->Header,
-                                  &Reply->Header);
-   if (!NT_SUCCESS(Status))
-     {
-       return(Status);
-     }
-
-   *SubStatus = Reply->d.LogonUserReply.SubStatus;
-
-   if (!NT_SUCCESS(Reply->Status))
-     {
-       return(Status);
-     }
-
-   *ProfileBuffer = RtlAllocateHeap(Secur32Heap,
-                                   0,
-                                 Reply->d.LogonUserReply.ProfileBufferLength);
-   memcpy(*ProfileBuffer,
-         (PVOID)((ULONG)Reply->d.LogonUserReply.Data +
-                 (ULONG)Reply->d.LogonUserReply.ProfileBuffer),
-         Reply->d.LogonUserReply.ProfileBufferLength);
-   *LogonId = Reply->d.LogonUserReply.LogonId;
-   *Token = Reply->d.LogonUserReply.Token;
-   memcpy(Quotas,
-         &Reply->d.LogonUserReply.Quotas,
-         sizeof(Reply->d.LogonUserReply.Quotas));
-
-   return(Status);
+    ULONG RequestLength;
+    ULONG CurrentLength;
+    PLSASS_REQUEST Request;
+    LSASS_REQUEST RawMessage;
+    PLSASS_REPLY Reply;
+    LSASS_REPLY RawReply;
+    NTSTATUS Status;
+
+    RequestLength = sizeof(LSASS_REQUEST) - sizeof(PORT_MESSAGE);
+    RequestLength = RequestLength + (OriginName->Length * sizeof(WCHAR));
+    RequestLength = RequestLength + AuthenticationInformationLength;
+    RequestLength = RequestLength +
+        (LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
+
+    CurrentLength = 0;
+    Request = (PLSASS_REQUEST)&RawMessage;
+
+    Request->d.LogonUserRequest.OriginNameLength = OriginName->Length;
+    Request->d.LogonUserRequest.OriginName = (PWSTR)&RawMessage + CurrentLength;
+    memcpy((PWSTR)&RawMessage + CurrentLength,
+           OriginName->Buffer,
+           OriginName->Length * sizeof(WCHAR));
+    CurrentLength = CurrentLength + (OriginName->Length * sizeof(WCHAR));
+
+    Request->d.LogonUserRequest.LogonType = LogonType;
+
+    Request->d.LogonUserRequest.AuthenticationPackage =
+        AuthenticationPackage;
+
+    Request->d.LogonUserRequest.AuthenticationInformation =
+        (PVOID)((ULONG_PTR)&RawMessage + CurrentLength);
+    Request->d.LogonUserRequest.AuthenticationInformationLength =
+        AuthenticationInformationLength;
+    memcpy((PVOID)((ULONG_PTR)&RawMessage + CurrentLength),
+           AuthenticationInformation,
+           AuthenticationInformationLength);
+    CurrentLength = CurrentLength + AuthenticationInformationLength;
+
+    Request->d.LogonUserRequest.LocalGroupsCount = LocalGroups->GroupCount;
+    Request->d.LogonUserRequest.LocalGroups =
+        (PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength;
+    memcpy((PSID_AND_ATTRIBUTES)&RawMessage + CurrentLength,
+           LocalGroups->Groups,
+           LocalGroups->GroupCount * sizeof(SID_AND_ATTRIBUTES));
+
+    Request->d.LogonUserRequest.SourceContext = *SourceContext;
+
+    Request->Type = LSASS_REQUEST_LOGON_USER;
+    Request->Header.u1.s1.DataLength = RequestLength - sizeof(PORT_MESSAGE);
+    Request->Header.u1.s1.TotalLength = RequestLength + sizeof(PORT_MESSAGE);
+
+    Reply = (PLSASS_REPLY)&RawReply;
+
+    Status = NtRequestWaitReplyPort(LsaHandle,
+                                   &Request->Header,
+                                   &Reply->Header);
+    if (!NT_SUCCESS(Status))
+    {
+        return Status;
+    }
+
+    *SubStatus = Reply->d.LogonUserReply.SubStatus;
+
+    if (!NT_SUCCESS(Reply->Status))
+    {
+        return Status;
+    }
+
+    *ProfileBuffer = RtlAllocateHeap(Secur32Heap,
+                                     0,
+                                     Reply->d.LogonUserReply.ProfileBufferLength);
+    memcpy(*ProfileBuffer,
+           (PVOID)((ULONG)Reply->d.LogonUserReply.Data +
+                   (ULONG)Reply->d.LogonUserReply.ProfileBuffer),
+           Reply->d.LogonUserReply.ProfileBufferLength);
+    *LogonId = Reply->d.LogonUserReply.LogonId;
+    *Token = Reply->d.LogonUserReply.Token;
+    memcpy(Quotas,
+           &Reply->d.LogonUserReply.Quotas,
+           sizeof(Reply->d.LogonUserReply.Quotas));
+
+    return Status;
 }
 
 
@@ -279,113 +282,109 @@ LsaLogonUser(HANDLE LsaHandle,
  */
 NTSTATUS WINAPI
 LsaRegisterLogonProcess(PLSA_STRING LsaLogonProcessName,
-                       PHANDLE Handle,
-                       PLSA_OPERATIONAL_MODE OperationalMode)
+                        PHANDLE Handle,
+                        PLSA_OPERATIONAL_MODE OperationalMode)
 {
-   UNICODE_STRING Portname = RTL_CONSTANT_STRING(L"\\SeLsaCommandPort");
-   ULONG ConnectInfoLength;
-   NTSTATUS Status;
-   LSASS_REQUEST Request;
-   LSASS_REPLY Reply;
-
-   ConnectInfoLength = 0;
-   Status = NtConnectPort(Handle,
-                         &Portname,
-                         NULL,
-                         NULL,
-                         NULL,
-                         NULL,
-                         NULL,
-                         &ConnectInfoLength);
-   if (!NT_SUCCESS(Status))
-     {
-       return(Status);
-     }
-
-   Request.Type = LSASS_REQUEST_REGISTER_LOGON_PROCESS;
-   Request.Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) -
-     sizeof(PORT_MESSAGE);
-   Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
-
-   Request.d.RegisterLogonProcessRequest.Length = LsaLogonProcessName->Length;
-   memcpy(Request.d.RegisterLogonProcessRequest.LogonProcessNameBuffer,
-         LsaLogonProcessName->Buffer,
-         Request.d.RegisterLogonProcessRequest.Length);
-
-   Status = NtRequestWaitReplyPort(*Handle,
-                                  &Request.Header,
-                                  &Reply.Header);
-   if (!NT_SUCCESS(Status))
-     {
-       NtClose(*Handle);
-       *Handle = NULL;
-       return(Status);
-     }
-
-   if (!NT_SUCCESS(Reply.Status))
-     {
-       NtClose(*Handle);
-       *Handle = NULL;
-       return(Status);
-     }
-
-   *OperationalMode = Reply.d.RegisterLogonProcessReply.OperationalMode;
-
-   return(Reply.Status);
+    UNICODE_STRING Portname = RTL_CONSTANT_STRING(L"\\SeLsaCommandPort");
+    ULONG ConnectInfoLength;
+    NTSTATUS Status;
+    LSASS_REQUEST Request;
+    LSASS_REPLY Reply;
+
+    ConnectInfoLength = 0;
+    Status = NtConnectPort(Handle,
+                           &Portname,
+                           NULL,
+                           NULL,
+                           NULL,
+                           NULL,
+                           NULL,
+                           &ConnectInfoLength);
+    if (!NT_SUCCESS(Status))
+    {
+        return Status;
+    }
+
+    Request.Type = LSASS_REQUEST_REGISTER_LOGON_PROCESS;
+    Request.Header.u1.s1.DataLength = sizeof(LSASS_REQUEST) -
+        sizeof(PORT_MESSAGE);
+    Request.Header.u1.s1.TotalLength = sizeof(LSASS_REQUEST);
+
+    Request.d.RegisterLogonProcessRequest.Length = LsaLogonProcessName->Length;
+    memcpy(Request.d.RegisterLogonProcessRequest.LogonProcessNameBuffer,
+           LsaLogonProcessName->Buffer,
+           Request.d.RegisterLogonProcessRequest.Length);
+
+    Status = NtRequestWaitReplyPort(*Handle,
+                                    &Request.Header,
+                                    &Reply.Header);
+    if (!NT_SUCCESS(Status))
+    {
+        NtClose(*Handle);
+        *Handle = NULL;
+        return Status;
+    }
+
+    if (!NT_SUCCESS(Reply.Status))
+    {
+        NtClose(*Handle);
+        *Handle = NULL;
+        return Status;
+    }
+
+    *OperationalMode = Reply.d.RegisterLogonProcessReply.OperationalMode;
+
+    return Reply.Status;
 }
 
+
 /*
  * @unimplemented
  */
 NTSTATUS
 WINAPI
-LsaEnumerateLogonSessions(
-PULONG LogonSessionCount,
-PLUID * LogonSessionList
-)
+LsaEnumerateLogonSessions(PULONG LogonSessionCount,
+                          PLUID *LogonSessionList)
 {
-  UNIMPLEMENTED;
-  return FALSE;
+    UNIMPLEMENTED;
+    return FALSE;
 }
 
+
 /*
  * @unimplemented
  */
 NTSTATUS
 WINAPI
-LsaGetLogonSessionData(
-PLUID LogonId,
-PSECURITY_LOGON_SESSION_DATA * ppLogonSessionData
-)
+LsaGetLogonSessionData(PLUID LogonId,
+                       PSECURITY_LOGON_SESSION_DATA *ppLogonSessionData)
 {
-  UNIMPLEMENTED;
-  return FALSE;
+    UNIMPLEMENTED;
+    return FALSE;
 }
 
+
 /*
  * @unimplemented
  */
 NTSTATUS
 WINAPI
-LsaRegisterPolicyChangeNotification(
-POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
-HANDLE NotificationEventHandle
-)
+LsaRegisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
+                                    HANDLE NotificationEventHandle)
 {
-  UNIMPLEMENTED;
-  return FALSE;
+    UNIMPLEMENTED;
+    return FALSE;
 }
 
+
 /*
  * @unimplemented
  */
 NTSTATUS
 WINAPI
-LsaUnregisterPolicyChangeNotification(
-POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
-HANDLE NotificationEventHandle
-)
+LsaUnregisterPolicyChangeNotification(POLICY_NOTIFICATION_INFORMATION_CLASS InformationClass,
+                                      HANDLE NotificationEventHandle)
 {
-  UNIMPLEMENTED;
-  return FALSE;
+    UNIMPLEMENTED;
+    return FALSE;
 }