mshtml: Pass DispatchEx pointer instead of outer IUnknown to DispatchEx's vtbl functions.
[wine] / dlls / advapi32 / security.c
1 /*
2  * Copyright 1999, 2000 Juergen Schmied <juergen.schmied@debitel.net>
3  * Copyright 2003 CodeWeavers Inc. (Ulrich Czekalla)
4  * Copyright 2006 Robert Reif
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  *
20  */
21
22 #include <stdarg.h>
23 #include <string.h>
24
25 #include "ntstatus.h"
26 #define WIN32_NO_STATUS
27 #include "windef.h"
28 #include "winbase.h"
29 #include "winerror.h"
30 #include "winreg.h"
31 #include "winsafer.h"
32 #include "winternl.h"
33 #include "winioctl.h"
34 #include "ntsecapi.h"
35 #include "accctrl.h"
36 #include "sddl.h"
37 #include "winsvc.h"
38 #include "aclapi.h"
39 #include "objbase.h"
40 #include "iads.h"
41 #include "advapi32_misc.h"
42 #include "lmcons.h"
43
44 #include "wine/debug.h"
45 #include "wine/unicode.h"
46
47 WINE_DEFAULT_DEBUG_CHANNEL(advapi);
48
49 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes);
50 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
51     PACL pAcl, LPDWORD cBytes);
52 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl);
53 static BYTE ParseAceStringType(LPCWSTR* StringAcl);
54 static DWORD ParseAceStringRights(LPCWSTR* StringAcl);
55 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
56     LPCWSTR StringSecurityDescriptor,
57     SECURITY_DESCRIPTOR_RELATIVE* SecurityDescriptor,
58     LPDWORD cBytes);
59 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl);
60
61 typedef struct _ACEFLAG
62 {
63    LPCWSTR wstr;
64    DWORD value;
65 } ACEFLAG, *LPACEFLAG;
66
67 typedef struct _MAX_SID
68 {
69     /* same fields as struct _SID */
70     BYTE Revision;
71     BYTE SubAuthorityCount;
72     SID_IDENTIFIER_AUTHORITY IdentifierAuthority;
73     DWORD SubAuthority[SID_MAX_SUB_AUTHORITIES];
74 } MAX_SID;
75
76 typedef struct WELLKNOWNSID
77 {
78     WCHAR wstr[2];
79     WELL_KNOWN_SID_TYPE Type;
80     MAX_SID Sid;
81 } WELLKNOWNSID;
82
83 static const WELLKNOWNSID WellKnownSids[] =
84 {
85     { {0,0}, WinNullSid, { SID_REVISION, 1, { SECURITY_NULL_SID_AUTHORITY }, { SECURITY_NULL_RID } } },
86     { {'W','D'}, WinWorldSid, { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY }, { SECURITY_WORLD_RID } } },
87     { {0,0}, WinLocalSid, { SID_REVISION, 1, { SECURITY_LOCAL_SID_AUTHORITY }, { SECURITY_LOCAL_RID } } },
88     { {'C','O'}, WinCreatorOwnerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_RID } } },
89     { {'C','G'}, WinCreatorGroupSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_RID } } },
90     { {0,0}, WinCreatorOwnerServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_SERVER_RID } } },
91     { {0,0}, WinCreatorGroupServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_SERVER_RID } } },
92     { {0,0}, WinNtAuthoritySid, { SID_REVISION, 0, { SECURITY_NT_AUTHORITY }, { SECURITY_NULL_RID } } },
93     { {0,0}, WinDialupSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_DIALUP_RID } } },
94     { {'N','U'}, WinNetworkSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_RID } } },
95     { {0,0}, WinBatchSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BATCH_RID } } },
96     { {'I','U'}, WinInteractiveSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_INTERACTIVE_RID } } },
97     { {'S','U'}, WinServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_SERVICE_RID } } },
98     { {'A','N'}, WinAnonymousSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ANONYMOUS_LOGON_RID } } },
99     { {0,0}, WinProxySid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PROXY_RID } } },
100     { {'E','D'}, WinEnterpriseControllersSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ENTERPRISE_CONTROLLERS_RID } } },
101     { {'P','S'}, WinSelfSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PRINCIPAL_SELF_RID } } },
102     { {'A','U'}, WinAuthenticatedUserSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_AUTHENTICATED_USER_RID } } },
103     { {'R','C'}, WinRestrictedCodeSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_RESTRICTED_CODE_RID } } },
104     { {0,0}, WinTerminalServerSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_TERMINAL_SERVER_RID } } },
105     { {0,0}, WinRemoteLogonIdSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_REMOTE_LOGON_RID } } },
106     { {'S','Y'}, WinLocalSystemSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SYSTEM_RID } } },
107     { {'L','S'}, WinLocalServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SERVICE_RID } } },
108     { {'N','S'}, WinNetworkServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_SERVICE_RID } } },
109     { {0,0}, WinBuiltinDomainSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID } } },
110     { {'B','A'}, WinBuiltinAdministratorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS } } },
111     { {'B','U'}, WinBuiltinUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS } } },
112     { {'B','G'}, WinBuiltinGuestsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_GUESTS } } },
113     { {'P','U'}, WinBuiltinPowerUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_POWER_USERS } } },
114     { {'A','O'}, WinBuiltinAccountOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ACCOUNT_OPS } } },
115     { {'S','O'}, WinBuiltinSystemOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_SYSTEM_OPS } } },
116     { {'P','O'}, WinBuiltinPrintOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PRINT_OPS } } },
117     { {'B','O'}, WinBuiltinBackupOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_BACKUP_OPS } } },
118     { {'R','E'}, WinBuiltinReplicatorSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REPLICATOR } } },
119     { {'R','U'}, WinBuiltinPreWindows2000CompatibleAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PREW2KCOMPACCESS } } },
120     { {'R','D'}, WinBuiltinRemoteDesktopUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS } } },
121     { {'N','O'}, WinBuiltinNetworkConfigurationOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS } } },
122     { {0,0}, WinNTLMAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_NTLM_RID } } },
123     { {0,0}, WinDigestAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_DIGEST_RID } } },
124     { {0,0}, WinSChannelAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_SCHANNEL_RID } } },
125     { {0,0}, WinThisOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_THIS_ORGANIZATION_RID } } },
126     { {0,0}, WinOtherOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_OTHER_ORGANIZATION_RID } } },
127     { {0,0}, WinBuiltinIncomingForestTrustBuildersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS  } } },
128     { {0,0}, WinBuiltinPerfMonitoringUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_MONITORING_USERS } } },
129     { {0,0}, WinBuiltinPerfLoggingUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_LOGGING_USERS } } },
130     { {0,0}, WinBuiltinAuthorizationAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS } } },
131     { {0,0}, WinBuiltinTerminalServerLicenseServersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS } } },
132     { {0,0}, WinBuiltinDCOMUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_DCOM_USERS } } },
133     { {'L','W'}, WinLowLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_LOW_RID} } },
134     { {'M','E'}, WinMediumLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_MEDIUM_RID } } },
135     { {'H','I'}, WinHighLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_HIGH_RID } } },
136     { {'S','I'}, WinSystemLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_SYSTEM_RID } } },
137 };
138
139 /* these SIDs must be constructed as relative to some domain - only the RID is well-known */
140 typedef struct WELLKNOWNRID
141 {
142     WELL_KNOWN_SID_TYPE Type;
143     DWORD Rid;
144 } WELLKNOWNRID;
145
146 static const WELLKNOWNRID WellKnownRids[] = {
147     { WinAccountAdministratorSid,    DOMAIN_USER_RID_ADMIN },
148     { WinAccountGuestSid,            DOMAIN_USER_RID_GUEST },
149     { WinAccountKrbtgtSid,           DOMAIN_USER_RID_KRBTGT },
150     { WinAccountDomainAdminsSid,     DOMAIN_GROUP_RID_ADMINS },
151     { WinAccountDomainUsersSid,      DOMAIN_GROUP_RID_USERS },
152     { WinAccountDomainGuestsSid,     DOMAIN_GROUP_RID_GUESTS },
153     { WinAccountComputersSid,        DOMAIN_GROUP_RID_COMPUTERS },
154     { WinAccountControllersSid,      DOMAIN_GROUP_RID_CONTROLLERS },
155     { WinAccountCertAdminsSid,       DOMAIN_GROUP_RID_CERT_ADMINS },
156     { WinAccountSchemaAdminsSid,     DOMAIN_GROUP_RID_SCHEMA_ADMINS },
157     { WinAccountEnterpriseAdminsSid, DOMAIN_GROUP_RID_ENTERPRISE_ADMINS },
158     { WinAccountPolicyAdminsSid,     DOMAIN_GROUP_RID_POLICY_ADMINS },
159     { WinAccountRasAndIasServersSid, DOMAIN_ALIAS_RID_RAS_SERVERS },
160 };
161
162
163 static SID const sidWorld = { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY} , { SECURITY_WORLD_RID } };
164
165 typedef struct _AccountSid {
166     WELL_KNOWN_SID_TYPE type;
167     LPCWSTR account;
168     LPCWSTR domain;
169     SID_NAME_USE name_use;
170     LPCWSTR alias;
171 } AccountSid;
172
173 static const WCHAR Account_Operators[] = { 'A','c','c','o','u','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
174 static const WCHAR Administrator[] = {'A','d','m','i','n','i','s','t','r','a','t','o','r',0 };
175 static const WCHAR Administrators[] = { 'A','d','m','i','n','i','s','t','r','a','t','o','r','s',0 };
176 static const WCHAR ANONYMOUS_LOGON[] = { 'A','N','O','N','Y','M','O','U','S',' ','L','O','G','O','N',0 };
177 static const WCHAR Authenticated_Users[] = { 'A','u','t','h','e','n','t','i','c','a','t','e','d',' ','U','s','e','r','s',0 };
178 static const WCHAR Backup_Operators[] = { 'B','a','c','k','u','p',' ','O','p','e','r','a','t','o','r','s',0 };
179 static const WCHAR BATCH[] = { 'B','A','T','C','H',0 };
180 static const WCHAR Blank[] = { 0 };
181 static const WCHAR BUILTIN[] = { 'B','U','I','L','T','I','N',0 };
182 static const WCHAR Cert_Publishers[] = { 'C','e','r','t',' ','P','u','b','l','i','s','h','e','r','s',0 };
183 static const WCHAR CREATOR_GROUP[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',0 };
184 static const WCHAR CREATOR_GROUP_SERVER[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',' ','S','E','R','V','E','R',0 };
185 static const WCHAR CREATOR_OWNER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',0 };
186 static const WCHAR CREATOR_OWNER_SERVER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',' ','S','E','R','V','E','R',0 };
187 static const WCHAR CURRENT_USER[] = { 'C','U','R','R','E','N','T','_','U','S','E','R',0 };
188 static const WCHAR DIALUP[] = { 'D','I','A','L','U','P',0 };
189 static const WCHAR Digest_Authentication[] = { 'D','i','g','e','s','t',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
190 static const WCHAR DOMAIN[] = {'D','O','M','A','I','N',0};
191 static const WCHAR Domain_Admins[] = { 'D','o','m','a','i','n',' ','A','d','m','i','n','s',0 };
192 static const WCHAR Domain_Computers[] = { 'D','o','m','a','i','n',' ','C','o','m','p','u','t','e','r','s',0 };
193 static const WCHAR Domain_Controllers[] = { 'D','o','m','a','i','n',' ','C','o','n','t','r','o','l','l','e','r','s',0 };
194 static const WCHAR Domain_Guests[] = { 'D','o','m','a','i','n',' ','G','u','e','s','t','s',0 };
195 static const WCHAR Domain_Users[] = { 'D','o','m','a','i','n',' ','U','s','e','r','s',0 };
196 static const WCHAR Enterprise_Admins[] = { 'E','n','t','e','r','p','r','i','s','e',' ','A','d','m','i','n','s',0 };
197 static const WCHAR ENTERPRISE_DOMAIN_CONTROLLERS[] = { 'E','N','T','E','R','P','R','I','S','E',' ','D','O','M','A','I','N',' ','C','O','N','T','R','O','L','L','E','R','S',0 };
198 static const WCHAR Everyone[] = { 'E','v','e','r','y','o','n','e',0 };
199 static const WCHAR Group_Policy_Creator_Owners[] = { 'G','r','o','u','p',' ','P','o','l','i','c','y',' ','C','r','e','a','t','o','r',' ','O','w','n','e','r','s',0 };
200 static const WCHAR Guest[] = { 'G','u','e','s','t',0 };
201 static const WCHAR Guests[] = { 'G','u','e','s','t','s',0 };
202 static const WCHAR INTERACTIVE[] = { 'I','N','T','E','R','A','C','T','I','V','E',0 };
203 static const WCHAR LOCAL[] = { 'L','O','C','A','L',0 };
204 static const WCHAR LOCAL_SERVICE[] = { 'L','O','C','A','L',' ','S','E','R','V','I','C','E',0 };
205 static const WCHAR LOCAL_SERVICE2[] = { 'L','O','C','A','L','S','E','R','V','I','C','E',0 };
206 static const WCHAR NETWORK[] = { 'N','E','T','W','O','R','K',0 };
207 static const WCHAR Network_Configuration_Operators[] = { 'N','e','t','w','o','r','k',' ','C','o','n','f','i','g','u','r','a','t','i','o','n',' ','O','p','e','r','a','t','o','r','s',0 };
208 static const WCHAR NETWORK_SERVICE[] = { 'N','E','T','W','O','R','K',' ','S','E','R','V','I','C','E',0 };
209 static const WCHAR NETWORK_SERVICE2[] = { 'N','E','T','W','O','R','K','S','E','R','V','I','C','E',0 };
210 static const WCHAR NT_AUTHORITY[] = { 'N','T',' ','A','U','T','H','O','R','I','T','Y',0 };
211 static const WCHAR NT_Pseudo_Domain[] = { 'N','T',' ','P','s','e','u','d','o',' ','D','o','m','a','i','n',0 };
212 static const WCHAR NTML_Authentication[] = { 'N','T','M','L',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
213 static const WCHAR NULL_SID[] = { 'N','U','L','L',' ','S','I','D',0 };
214 static const WCHAR Other_Organization[] = { 'O','t','h','e','r',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
215 static const WCHAR Performance_Log_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','L','o','g',' ','U','s','e','r','s',0 };
216 static const WCHAR Performance_Monitor_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','M','o','n','i','t','o','r',' ','U','s','e','r','s',0 };
217 static const WCHAR Power_Users[] = { 'P','o','w','e','r',' ','U','s','e','r','s',0 };
218 static const WCHAR Pre_Windows_2000_Compatible_Access[] = { 'P','r','e','-','W','i','n','d','o','w','s',' ','2','0','0','0',' ','C','o','m','p','a','t','i','b','l','e',' ','A','c','c','e','s','s',0 };
219 static const WCHAR Print_Operators[] = { 'P','r','i','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
220 static const WCHAR PROXY[] = { 'P','R','O','X','Y',0 };
221 static const WCHAR RAS_and_IAS_Servers[] = { 'R','A','S',' ','a','n','d',' ','I','A','S',' ','S','e','r','v','e','r','s',0 };
222 static const WCHAR Remote_Desktop_Users[] = { 'R','e','m','o','t','e',' ','D','e','s','k','t','o','p',' ','U','s','e','r','s',0 };
223 static const WCHAR REMOTE_INTERACTIVE_LOGON[] = { 'R','E','M','O','T','E',' ','I','N','T','E','R','A','C','T','I','V','E',' ','L','O','G','O','N',0 };
224 static const WCHAR Replicators[] = { 'R','e','p','l','i','c','a','t','o','r','s',0 };
225 static const WCHAR RESTRICTED[] = { 'R','E','S','T','R','I','C','T','E','D',0 };
226 static const WCHAR SChannel_Authentication[] = { 'S','C','h','a','n','n','e','l',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
227 static const WCHAR Schema_Admins[] = { 'S','c','h','e','m','a',' ','A','d','m','i','n','s',0 };
228 static const WCHAR SELF[] = { 'S','E','L','F',0 };
229 static const WCHAR Server_Operators[] = { 'S','e','r','v','e','r',' ','O','p','e','r','a','t','o','r','s',0 };
230 static const WCHAR SERVICE[] = { 'S','E','R','V','I','C','E',0 };
231 static const WCHAR SYSTEM[] = { 'S','Y','S','T','E','M',0 };
232 static const WCHAR TERMINAL_SERVER_USER[] = { 'T','E','R','M','I','N','A','L',' ','S','E','R','V','E','R',' ','U','S','E','R',0 };
233 static const WCHAR This_Organization[] = { 'T','h','i','s',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
234 static const WCHAR Users[] = { 'U','s','e','r','s',0 };
235
236 static const AccountSid ACCOUNT_SIDS[] = {
237     { WinNullSid, NULL_SID, Blank, SidTypeWellKnownGroup },
238     { WinWorldSid, Everyone, Blank, SidTypeWellKnownGroup },
239     { WinLocalSid, LOCAL, Blank, SidTypeWellKnownGroup },
240     { WinCreatorOwnerSid, CREATOR_OWNER, Blank, SidTypeWellKnownGroup },
241     { WinCreatorGroupSid, CREATOR_GROUP, Blank, SidTypeWellKnownGroup },
242     { WinCreatorOwnerServerSid, CREATOR_OWNER_SERVER, Blank, SidTypeWellKnownGroup },
243     { WinCreatorGroupServerSid, CREATOR_GROUP_SERVER, Blank, SidTypeWellKnownGroup },
244     { WinNtAuthoritySid, NT_Pseudo_Domain, NT_Pseudo_Domain, SidTypeDomain },
245     { WinDialupSid, DIALUP, NT_AUTHORITY, SidTypeWellKnownGroup },
246     { WinNetworkSid, NETWORK, NT_AUTHORITY, SidTypeWellKnownGroup },
247     { WinBatchSid, BATCH, NT_AUTHORITY, SidTypeWellKnownGroup },
248     { WinInteractiveSid, INTERACTIVE, NT_AUTHORITY, SidTypeWellKnownGroup },
249     { WinServiceSid, SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
250     { WinAnonymousSid, ANONYMOUS_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
251     { WinProxySid, PROXY, NT_AUTHORITY, SidTypeWellKnownGroup },
252     { WinEnterpriseControllersSid, ENTERPRISE_DOMAIN_CONTROLLERS, NT_AUTHORITY, SidTypeWellKnownGroup },
253     { WinSelfSid, SELF, NT_AUTHORITY, SidTypeWellKnownGroup },
254     { WinAuthenticatedUserSid, Authenticated_Users, NT_AUTHORITY, SidTypeWellKnownGroup },
255     { WinRestrictedCodeSid, RESTRICTED, NT_AUTHORITY, SidTypeWellKnownGroup },
256     { WinTerminalServerSid, TERMINAL_SERVER_USER, NT_AUTHORITY, SidTypeWellKnownGroup },
257     { WinRemoteLogonIdSid, REMOTE_INTERACTIVE_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
258     { WinLocalSystemSid, SYSTEM, NT_AUTHORITY, SidTypeWellKnownGroup },
259     { WinLocalServiceSid, LOCAL_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup, LOCAL_SERVICE2 },
260     { WinNetworkServiceSid, NETWORK_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup , NETWORK_SERVICE2},
261     { WinBuiltinDomainSid, BUILTIN, BUILTIN, SidTypeDomain },
262     { WinBuiltinAdministratorsSid, Administrators, BUILTIN, SidTypeAlias },
263     { WinBuiltinUsersSid, Users, BUILTIN, SidTypeAlias },
264     { WinBuiltinGuestsSid, Guests, BUILTIN, SidTypeAlias },
265     { WinBuiltinPowerUsersSid, Power_Users, BUILTIN, SidTypeAlias },
266     { WinBuiltinAccountOperatorsSid, Account_Operators, BUILTIN, SidTypeAlias },
267     { WinBuiltinSystemOperatorsSid, Server_Operators, BUILTIN, SidTypeAlias },
268     { WinBuiltinPrintOperatorsSid, Print_Operators, BUILTIN, SidTypeAlias },
269     { WinBuiltinBackupOperatorsSid, Backup_Operators, BUILTIN, SidTypeAlias },
270     { WinBuiltinReplicatorSid, Replicators, BUILTIN, SidTypeAlias },
271     { WinBuiltinPreWindows2000CompatibleAccessSid, Pre_Windows_2000_Compatible_Access, BUILTIN, SidTypeAlias },
272     { WinBuiltinRemoteDesktopUsersSid, Remote_Desktop_Users, BUILTIN, SidTypeAlias },
273     { WinBuiltinNetworkConfigurationOperatorsSid, Network_Configuration_Operators, BUILTIN, SidTypeAlias },
274     { WinNTLMAuthenticationSid, NTML_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
275     { WinDigestAuthenticationSid, Digest_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
276     { WinSChannelAuthenticationSid, SChannel_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
277     { WinThisOrganizationSid, This_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
278     { WinOtherOrganizationSid, Other_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
279     { WinBuiltinPerfMonitoringUsersSid, Performance_Monitor_Users, BUILTIN, SidTypeAlias },
280     { WinBuiltinPerfLoggingUsersSid, Performance_Log_Users, BUILTIN, SidTypeAlias },
281 };
282 /*
283  * ACE access rights
284  */
285 static const WCHAR SDDL_READ_CONTROL[]     = {'R','C',0};
286 static const WCHAR SDDL_WRITE_DAC[]        = {'W','D',0};
287 static const WCHAR SDDL_WRITE_OWNER[]      = {'W','O',0};
288 static const WCHAR SDDL_STANDARD_DELETE[]  = {'S','D',0};
289
290 static const WCHAR SDDL_READ_PROPERTY[]    = {'R','P',0};
291 static const WCHAR SDDL_WRITE_PROPERTY[]   = {'W','P',0};
292 static const WCHAR SDDL_CREATE_CHILD[]     = {'C','C',0};
293 static const WCHAR SDDL_DELETE_CHILD[]     = {'D','C',0};
294 static const WCHAR SDDL_LIST_CHILDREN[]    = {'L','C',0};
295 static const WCHAR SDDL_SELF_WRITE[]       = {'S','W',0};
296 static const WCHAR SDDL_LIST_OBJECT[]      = {'L','O',0};
297 static const WCHAR SDDL_DELETE_TREE[]      = {'D','T',0};
298 static const WCHAR SDDL_CONTROL_ACCESS[]   = {'C','R',0};
299
300 static const WCHAR SDDL_FILE_ALL[]         = {'F','A',0};
301 static const WCHAR SDDL_FILE_READ[]        = {'F','R',0};
302 static const WCHAR SDDL_FILE_WRITE[]       = {'F','W',0};
303 static const WCHAR SDDL_FILE_EXECUTE[]     = {'F','X',0};
304
305 static const WCHAR SDDL_KEY_ALL[]          = {'K','A',0};
306 static const WCHAR SDDL_KEY_READ[]         = {'K','R',0};
307 static const WCHAR SDDL_KEY_WRITE[]        = {'K','W',0};
308 static const WCHAR SDDL_KEY_EXECUTE[]      = {'K','X',0};
309
310 static const WCHAR SDDL_GENERIC_ALL[]      = {'G','A',0};
311 static const WCHAR SDDL_GENERIC_READ[]     = {'G','R',0};
312 static const WCHAR SDDL_GENERIC_WRITE[]    = {'G','W',0};
313 static const WCHAR SDDL_GENERIC_EXECUTE[]  = {'G','X',0};
314
315 /*
316  * ACL flags
317  */
318 static const WCHAR SDDL_PROTECTED[]             = {'P',0};
319 static const WCHAR SDDL_AUTO_INHERIT_REQ[]      = {'A','R',0};
320 static const WCHAR SDDL_AUTO_INHERITED[]        = {'A','I',0};
321
322 /*
323  * ACE types
324  */
325 static const WCHAR SDDL_ACCESS_ALLOWED[]        = {'A',0};
326 static const WCHAR SDDL_ACCESS_DENIED[]         = {'D',0};
327 static const WCHAR SDDL_OBJECT_ACCESS_ALLOWED[] = {'O','A',0};
328 static const WCHAR SDDL_OBJECT_ACCESS_DENIED[]  = {'O','D',0};
329 static const WCHAR SDDL_AUDIT[]                 = {'A','U',0};
330 static const WCHAR SDDL_ALARM[]                 = {'A','L',0};
331 static const WCHAR SDDL_OBJECT_AUDIT[]          = {'O','U',0};
332 static const WCHAR SDDL_OBJECT_ALARMp[]         = {'O','L',0};
333
334 /*
335  * ACE flags
336  */
337 static const WCHAR SDDL_CONTAINER_INHERIT[]  = {'C','I',0};
338 static const WCHAR SDDL_OBJECT_INHERIT[]     = {'O','I',0};
339 static const WCHAR SDDL_NO_PROPAGATE[]       = {'N','P',0};
340 static const WCHAR SDDL_INHERIT_ONLY[]       = {'I','O',0};
341 static const WCHAR SDDL_INHERITED[]          = {'I','D',0};
342 static const WCHAR SDDL_AUDIT_SUCCESS[]      = {'S','A',0};
343 static const WCHAR SDDL_AUDIT_FAILURE[]      = {'F','A',0};
344
345 const char * debugstr_sid(PSID sid)
346 {
347     int auth = 0;
348     SID * psid = sid;
349
350     if (psid == NULL)
351         return "(null)";
352
353     auth = psid->IdentifierAuthority.Value[5] +
354            (psid->IdentifierAuthority.Value[4] << 8) +
355            (psid->IdentifierAuthority.Value[3] << 16) +
356            (psid->IdentifierAuthority.Value[2] << 24);
357
358     switch (psid->SubAuthorityCount) {
359     case 0:
360         return wine_dbg_sprintf("S-%d-%d", psid->Revision, auth);
361     case 1:
362         return wine_dbg_sprintf("S-%d-%d-%u", psid->Revision, auth,
363             psid->SubAuthority[0]);
364     case 2:
365         return wine_dbg_sprintf("S-%d-%d-%u-%u", psid->Revision, auth,
366             psid->SubAuthority[0], psid->SubAuthority[1]);
367     case 3:
368         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u", psid->Revision, auth,
369             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2]);
370     case 4:
371         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u", psid->Revision, auth,
372             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
373             psid->SubAuthority[3]);
374     case 5:
375         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u", psid->Revision, auth,
376             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
377             psid->SubAuthority[3], psid->SubAuthority[4]);
378     case 6:
379         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
380             psid->SubAuthority[3], psid->SubAuthority[1], psid->SubAuthority[2],
381             psid->SubAuthority[0], psid->SubAuthority[4], psid->SubAuthority[5]);
382     case 7:
383         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
384             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
385             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
386             psid->SubAuthority[6]);
387     case 8:
388         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
389             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
390             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
391             psid->SubAuthority[6], psid->SubAuthority[7]);
392     }
393     return "(too-big)";
394 }
395
396 /* set last error code from NT status and get the proper boolean return value */
397 /* used for functions that are a simple wrapper around the corresponding ntdll API */
398 static inline BOOL set_ntstatus( NTSTATUS status )
399 {
400     if (status) SetLastError( RtlNtStatusToDosError( status ));
401     return !status;
402 }
403
404 #define WINE_SIZE_OF_WORLD_ACCESS_ACL   (sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD))
405
406 static void GetWorldAccessACL(PACL pACL)
407 {
408     PACCESS_ALLOWED_ACE pACE = (PACCESS_ALLOWED_ACE) (pACL + 1);
409
410     pACL->AclRevision = ACL_REVISION;
411     pACL->Sbz1 = 0;
412     pACL->AclSize = WINE_SIZE_OF_WORLD_ACCESS_ACL;
413     pACL->AceCount = 1;
414     pACL->Sbz2 = 0;
415
416     pACE->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
417     pACE->Header.AceFlags = CONTAINER_INHERIT_ACE;
418     pACE->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD);
419     pACE->Mask = 0xf3ffffff; /* Everything except reserved bits */
420     memcpy(&pACE->SidStart, &sidWorld, sizeof(sidWorld));
421 }
422
423 /************************************************************
424  *                ADVAPI_IsLocalComputer
425  *
426  * Checks whether the server name indicates local machine.
427  */
428 BOOL ADVAPI_IsLocalComputer(LPCWSTR ServerName)
429 {
430     DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
431     BOOL Result;
432     LPWSTR buf;
433
434     if (!ServerName || !ServerName[0])
435         return TRUE;
436
437     buf = HeapAlloc(GetProcessHeap(), 0, dwSize * sizeof(WCHAR));
438     Result = GetComputerNameW(buf,  &dwSize);
439     if (Result && (ServerName[0] == '\\') && (ServerName[1] == '\\'))
440         ServerName += 2;
441     Result = Result && !lstrcmpW(ServerName, buf);
442     HeapFree(GetProcessHeap(), 0, buf);
443
444     return Result;
445 }
446
447 /************************************************************
448  *                ADVAPI_GetComputerSid
449  *
450  * Reads the computer SID from the registry.
451  */
452 BOOL ADVAPI_GetComputerSid(PSID sid)
453 {
454     HKEY key;
455     LONG ret;
456     BOOL retval = FALSE;
457     static const WCHAR Account[] = { 'S','E','C','U','R','I','T','Y','\\','S','A','M','\\','D','o','m','a','i','n','s','\\','A','c','c','o','u','n','t',0 };
458     static const WCHAR V[] = { 'V',0 };
459
460     if ((ret = RegOpenKeyExW(HKEY_LOCAL_MACHINE, Account, 0,
461         KEY_READ, &key)) == ERROR_SUCCESS)
462     {
463         DWORD size = 0;
464         ret = RegQueryValueExW(key, V, NULL, NULL, NULL, &size);
465         if (ret == ERROR_MORE_DATA || ret == ERROR_SUCCESS)
466         {
467             BYTE * data = HeapAlloc(GetProcessHeap(), 0, size);
468             if (data)
469             {
470                 if ((ret = RegQueryValueExW(key, V, NULL, NULL,
471                      data, &size)) == ERROR_SUCCESS)
472                 {
473                     /* the SID is in the last 24 bytes of the binary data */
474                     CopyMemory(sid, &data[size-24], 24);
475                     retval = TRUE;
476                 }
477                 HeapFree(GetProcessHeap(), 0, data);
478             }
479         }
480         RegCloseKey(key);
481     }
482
483     if(retval == TRUE) return retval;
484
485     /* create a new random SID */
486     if (RegCreateKeyExW(HKEY_LOCAL_MACHINE, Account,
487         0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL) == ERROR_SUCCESS)
488     {
489         PSID new_sid;
490         SID_IDENTIFIER_AUTHORITY identifierAuthority = {SECURITY_NT_AUTHORITY};
491         DWORD id[3];
492
493         if (RtlGenRandom(id, sizeof(id)))
494         {
495             if (AllocateAndInitializeSid(&identifierAuthority, 4, SECURITY_NT_NON_UNIQUE, id[0], id[1], id[2], 0, 0, 0, 0, &new_sid))
496             {
497                 if (RegSetValueExW(key, V, 0, REG_BINARY, new_sid, GetLengthSid(new_sid)) == ERROR_SUCCESS)
498                     retval = CopySid(GetLengthSid(new_sid), sid, new_sid);
499
500                 FreeSid(new_sid);
501             }
502         }
503         RegCloseKey(key);
504     }
505
506     return retval;
507 }
508
509 /*      ##############################
510         ######  TOKEN FUNCTIONS ######
511         ##############################
512 */
513
514 /******************************************************************************
515  * OpenProcessToken                     [ADVAPI32.@]
516  * Opens the access token associated with a process handle.
517  *
518  * PARAMS
519  *   ProcessHandle [I] Handle to process
520  *   DesiredAccess [I] Desired access to process
521  *   TokenHandle   [O] Pointer to handle of open access token
522  *
523  * RETURNS
524  *  Success: TRUE. TokenHandle contains the access token.
525  *  Failure: FALSE.
526  *
527  * NOTES
528  *  See NtOpenProcessToken.
529  */
530 BOOL WINAPI
531 OpenProcessToken( HANDLE ProcessHandle, DWORD DesiredAccess,
532                   HANDLE *TokenHandle )
533 {
534         return set_ntstatus(NtOpenProcessToken( ProcessHandle, DesiredAccess, TokenHandle ));
535 }
536
537 /******************************************************************************
538  * OpenThreadToken [ADVAPI32.@]
539  *
540  * Opens the access token associated with a thread handle.
541  *
542  * PARAMS
543  *   ThreadHandle  [I] Handle to process
544  *   DesiredAccess [I] Desired access to the thread
545  *   OpenAsSelf    [I] ???
546  *   TokenHandle   [O] Destination for the token handle
547  *
548  * RETURNS
549  *  Success: TRUE. TokenHandle contains the access token.
550  *  Failure: FALSE.
551  *
552  * NOTES
553  *  See NtOpenThreadToken.
554  */
555 BOOL WINAPI
556 OpenThreadToken( HANDLE ThreadHandle, DWORD DesiredAccess,
557                  BOOL OpenAsSelf, HANDLE *TokenHandle)
558 {
559         return set_ntstatus( NtOpenThreadToken(ThreadHandle, DesiredAccess, OpenAsSelf, TokenHandle));
560 }
561
562 BOOL WINAPI
563 AdjustTokenGroups( HANDLE TokenHandle, BOOL ResetToDefault, PTOKEN_GROUPS NewState,
564                    DWORD BufferLength, PTOKEN_GROUPS PreviousState, PDWORD ReturnLength )
565 {
566     return set_ntstatus( NtAdjustGroupsToken(TokenHandle, ResetToDefault, NewState, BufferLength,
567                                              PreviousState, ReturnLength));
568 }
569
570 /******************************************************************************
571  * AdjustTokenPrivileges [ADVAPI32.@]
572  *
573  * Adjust the privileges of an open token handle.
574  * 
575  * PARAMS
576  *  TokenHandle          [I]   Handle from OpenProcessToken() or OpenThreadToken() 
577  *  DisableAllPrivileges [I]   TRUE=Remove all privileges, FALSE=Use NewState
578  *  NewState             [I]   Desired new privileges of the token
579  *  BufferLength         [I]   Length of NewState
580  *  PreviousState        [O]   Destination for the previous state
581  *  ReturnLength         [I/O] Size of PreviousState
582  *
583  *
584  * RETURNS
585  *  Success: TRUE. Privileges are set to NewState and PreviousState is updated.
586  *  Failure: FALSE.
587  *
588  * NOTES
589  *  See NtAdjustPrivilegesToken.
590  */
591 BOOL WINAPI
592 AdjustTokenPrivileges( HANDLE TokenHandle, BOOL DisableAllPrivileges,
593                        PTOKEN_PRIVILEGES NewState, DWORD BufferLength,
594                        PTOKEN_PRIVILEGES PreviousState, PDWORD ReturnLength )
595 {
596     NTSTATUS status;
597
598     TRACE("\n");
599     
600     status = NtAdjustPrivilegesToken(TokenHandle, DisableAllPrivileges,
601                                                      NewState, BufferLength, PreviousState,
602                                                      ReturnLength);
603     SetLastError( RtlNtStatusToDosError( status ));
604     if ((status == STATUS_SUCCESS) || (status == STATUS_NOT_ALL_ASSIGNED))
605         return TRUE;
606     else
607         return FALSE;
608 }
609
610 /******************************************************************************
611  * CheckTokenMembership [ADVAPI32.@]
612  *
613  * Determine if an access token is a member of a SID.
614  * 
615  * PARAMS
616  *   TokenHandle [I] Handle from OpenProcessToken() or OpenThreadToken()
617  *   SidToCheck  [I] SID that possibly contains the token
618  *   IsMember    [O] Destination for result.
619  *
620  * RETURNS
621  *  Success: TRUE. IsMember is TRUE if TokenHandle is a member, FALSE otherwise.
622  *  Failure: FALSE.
623  */
624 BOOL WINAPI
625 CheckTokenMembership( HANDLE token, PSID sid_to_check,
626                       PBOOL is_member )
627 {
628     PTOKEN_GROUPS token_groups = NULL;
629     HANDLE thread_token = NULL;
630     DWORD size, i;
631     BOOL ret;
632
633     TRACE("(%p %s %p)\n", token, debugstr_sid(sid_to_check), is_member);
634
635     *is_member = FALSE;
636
637     if (!token)
638     {
639         if (!OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, TRUE, &thread_token))
640         {
641             HANDLE process_token;
642             ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE, &process_token);
643             if (!ret)
644                 goto exit;
645             ret = DuplicateTokenEx(process_token, TOKEN_QUERY,
646                 NULL, SecurityImpersonation, TokenImpersonation,
647                 &thread_token);
648             CloseHandle(process_token);
649             if (!ret)
650                 goto exit;
651         }
652         token = thread_token;
653     }
654
655     ret = GetTokenInformation(token, TokenGroups, NULL, 0, &size);
656     if (!ret && GetLastError() != ERROR_INSUFFICIENT_BUFFER)
657         goto exit;
658
659     token_groups = HeapAlloc(GetProcessHeap(), 0, size);
660     if (!token_groups)
661     {
662         ret = FALSE;
663         goto exit;
664     }
665
666     ret = GetTokenInformation(token, TokenGroups, token_groups, size, &size);
667     if (!ret)
668         goto exit;
669
670     for (i = 0; i < token_groups->GroupCount; i++)
671     {
672         TRACE("Groups[%d]: {0x%x, %s}\n", i,
673             token_groups->Groups[i].Attributes,
674             debugstr_sid(token_groups->Groups[i].Sid));
675         if ((token_groups->Groups[i].Attributes & SE_GROUP_ENABLED) &&
676             EqualSid(sid_to_check, token_groups->Groups[i].Sid))
677         {
678             *is_member = TRUE;
679             TRACE("sid enabled and found in token\n");
680             break;
681         }
682     }
683
684 exit:
685     HeapFree(GetProcessHeap(), 0, token_groups);
686     if (thread_token != NULL) CloseHandle(thread_token);
687
688     return ret;
689 }
690
691 /******************************************************************************
692  * GetTokenInformation [ADVAPI32.@]
693  *
694  * Get a type of information about an access token.
695  *
696  * PARAMS
697  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
698  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
699  *   tokeninfo       [O] Destination for token information
700  *   tokeninfolength [I] Length of tokeninfo
701  *   retlen          [O] Destination for returned token information length
702  *
703  * RETURNS
704  *  Success: TRUE. tokeninfo contains retlen bytes of token information
705  *  Failure: FALSE.
706  *
707  * NOTES
708  *  See NtQueryInformationToken.
709  */
710 BOOL WINAPI
711 GetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
712                      LPVOID tokeninfo, DWORD tokeninfolength, LPDWORD retlen )
713 {
714     TRACE("(%p, %s, %p, %d, %p):\n",
715           token,
716           (tokeninfoclass == TokenUser) ? "TokenUser" :
717           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
718           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
719           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
720           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
721           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
722           (tokeninfoclass == TokenSource) ? "TokenSource" :
723           (tokeninfoclass == TokenType) ? "TokenType" :
724           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
725           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
726           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
727           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
728           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
729           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
730           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
731           "Unknown",
732           tokeninfo, tokeninfolength, retlen);
733     return set_ntstatus( NtQueryInformationToken( token, tokeninfoclass, tokeninfo,
734                                                   tokeninfolength, retlen));
735 }
736
737 /******************************************************************************
738  * SetTokenInformation [ADVAPI32.@]
739  *
740  * Set information for an access token.
741  *
742  * PARAMS
743  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
744  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
745  *   tokeninfo       [I] Token information to set
746  *   tokeninfolength [I] Length of tokeninfo
747  *
748  * RETURNS
749  *  Success: TRUE. The information for the token is set to tokeninfo.
750  *  Failure: FALSE.
751  */
752 BOOL WINAPI
753 SetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
754                      LPVOID tokeninfo, DWORD tokeninfolength )
755 {
756     TRACE("(%p, %s, %p, %d): stub\n",
757           token,
758           (tokeninfoclass == TokenUser) ? "TokenUser" :
759           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
760           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
761           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
762           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
763           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
764           (tokeninfoclass == TokenSource) ? "TokenSource" :
765           (tokeninfoclass == TokenType) ? "TokenType" :
766           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
767           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
768           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
769           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
770           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
771           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
772           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
773           "Unknown",
774           tokeninfo, tokeninfolength);
775
776     return set_ntstatus( NtSetInformationToken( token, tokeninfoclass, tokeninfo, tokeninfolength ));
777 }
778
779 /*************************************************************************
780  * SetThreadToken [ADVAPI32.@]
781  *
782  * Assigns an 'impersonation token' to a thread so it can assume the
783  * security privileges of another thread or process.  Can also remove
784  * a previously assigned token. 
785  *
786  * PARAMS
787  *   thread          [O] Handle to thread to set the token for
788  *   token           [I] Token to set
789  *
790  * RETURNS
791  *  Success: TRUE. The threads access token is set to token
792  *  Failure: FALSE.
793  *
794  * NOTES
795  *  Only supported on NT or higher. On Win9X this function does nothing.
796  *  See SetTokenInformation.
797  */
798 BOOL WINAPI SetThreadToken(PHANDLE thread, HANDLE token)
799 {
800     return set_ntstatus( NtSetInformationThread( thread ? *thread : GetCurrentThread(),
801                                                  ThreadImpersonationToken, &token, sizeof token ));
802 }
803
804 /*************************************************************************
805  * CreateRestrictedToken [ADVAPI32.@]
806  *
807  * Create a new more restricted token from an existing token.
808  *
809  * PARAMS
810  *   baseToken       [I] Token to base the new restricted token on
811  *   flags           [I] Options
812  *   nDisableSids    [I] Length of disableSids array
813  *   disableSids     [I] Array of SIDs to disable in the new token
814  *   nDeletePrivs    [I] Length of deletePrivs array
815  *   deletePrivs     [I] Array of privileges to delete in the new token
816  *   nRestrictSids   [I] Length of restrictSids array
817  *   restrictSids    [I] Array of SIDs to restrict in the new token
818  *   newToken        [O] Address where the new token is stored
819  *
820  * RETURNS
821  *  Success: TRUE
822  *  Failure: FALSE
823  */
824 BOOL WINAPI CreateRestrictedToken(
825     HANDLE baseToken,
826     DWORD flags,
827     DWORD nDisableSids,
828     PSID_AND_ATTRIBUTES disableSids,
829     DWORD nDeletePrivs,
830     PLUID_AND_ATTRIBUTES deletePrivs,
831     DWORD nRestrictSids,
832     PSID_AND_ATTRIBUTES restrictSids,
833     PHANDLE newToken)
834 {
835     FIXME("(%p, 0x%x, %u, %p, %u, %p, %u, %p, %p): stub\n",
836           baseToken, flags, nDisableSids, disableSids,
837           nDeletePrivs, deletePrivs,
838           nRestrictSids, restrictSids,
839           newToken);
840     SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
841     return FALSE;
842 }
843
844 /*      ##############################
845         ######  SID FUNCTIONS   ######
846         ##############################
847 */
848
849 /******************************************************************************
850  * AllocateAndInitializeSid [ADVAPI32.@]
851  *
852  * PARAMS
853  *   pIdentifierAuthority []
854  *   nSubAuthorityCount   []
855  *   nSubAuthority0       []
856  *   nSubAuthority1       []
857  *   nSubAuthority2       []
858  *   nSubAuthority3       []
859  *   nSubAuthority4       []
860  *   nSubAuthority5       []
861  *   nSubAuthority6       []
862  *   nSubAuthority7       []
863  *   pSid                 []
864  */
865 BOOL WINAPI
866 AllocateAndInitializeSid( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
867                           BYTE nSubAuthorityCount,
868                           DWORD nSubAuthority0, DWORD nSubAuthority1,
869                           DWORD nSubAuthority2, DWORD nSubAuthority3,
870                           DWORD nSubAuthority4, DWORD nSubAuthority5,
871                           DWORD nSubAuthority6, DWORD nSubAuthority7,
872                           PSID *pSid )
873 {
874     return set_ntstatus( RtlAllocateAndInitializeSid(
875                              pIdentifierAuthority, nSubAuthorityCount,
876                              nSubAuthority0, nSubAuthority1, nSubAuthority2, nSubAuthority3,
877                              nSubAuthority4, nSubAuthority5, nSubAuthority6, nSubAuthority7,
878                              pSid ));
879 }
880
881 /******************************************************************************
882  * FreeSid [ADVAPI32.@]
883  *
884  * PARAMS
885  *   pSid []
886  */
887 PVOID WINAPI
888 FreeSid( PSID pSid )
889 {
890         RtlFreeSid(pSid);
891         return NULL; /* is documented like this */
892 }
893
894 /******************************************************************************
895  * CopySid [ADVAPI32.@]
896  *
897  * PARAMS
898  *   nDestinationSidLength []
899  *   pDestinationSid       []
900  *   pSourceSid            []
901  */
902 BOOL WINAPI
903 CopySid( DWORD nDestinationSidLength, PSID pDestinationSid, PSID pSourceSid )
904 {
905         return RtlCopySid(nDestinationSidLength, pDestinationSid, pSourceSid);
906 }
907
908 /******************************************************************************
909  * CreateWellKnownSid [ADVAPI32.@]
910  */
911 BOOL WINAPI
912 CreateWellKnownSid( WELL_KNOWN_SID_TYPE WellKnownSidType,
913                     PSID DomainSid,
914                     PSID pSid,
915                     DWORD* cbSid)
916 {
917     unsigned int i;
918     TRACE("(%d, %s, %p, %p)\n", WellKnownSidType, debugstr_sid(DomainSid), pSid, cbSid);
919
920     if (cbSid == NULL || (DomainSid && !IsValidSid(DomainSid)))
921     {
922         SetLastError(ERROR_INVALID_PARAMETER);
923         return FALSE;
924     }
925
926     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++) {
927         if (WellKnownSids[i].Type == WellKnownSidType) {
928             DWORD length = GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
929
930             if (*cbSid < length)
931             {
932                 *cbSid = length;
933                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
934                 return FALSE;
935             }
936             if (!pSid)
937             {
938                 SetLastError(ERROR_INVALID_PARAMETER);
939                 return FALSE;
940             }
941             CopyMemory(pSid, &WellKnownSids[i].Sid.Revision, length);
942             *cbSid = length;
943             return TRUE;
944         }
945     }
946
947     if (DomainSid == NULL || *GetSidSubAuthorityCount(DomainSid) == SID_MAX_SUB_AUTHORITIES)
948     {
949         SetLastError(ERROR_INVALID_PARAMETER);
950         return FALSE;
951     }
952
953     for (i = 0; i < sizeof(WellKnownRids)/sizeof(WellKnownRids[0]); i++)
954         if (WellKnownRids[i].Type == WellKnownSidType) {
955             UCHAR domain_subauth = *GetSidSubAuthorityCount(DomainSid);
956             DWORD domain_sid_length = GetSidLengthRequired(domain_subauth);
957             DWORD output_sid_length = GetSidLengthRequired(domain_subauth + 1);
958
959             if (*cbSid < output_sid_length)
960             {
961                 *cbSid = output_sid_length;
962                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
963                 return FALSE;
964             }
965             if (!pSid)
966             {
967                 SetLastError(ERROR_INVALID_PARAMETER);
968                 return FALSE;
969             }
970             CopyMemory(pSid, DomainSid, domain_sid_length);
971             (*GetSidSubAuthorityCount(pSid))++;
972             (*GetSidSubAuthority(pSid, domain_subauth)) = WellKnownRids[i].Rid;
973             *cbSid = output_sid_length;
974             return TRUE;
975         }
976
977     SetLastError(ERROR_INVALID_PARAMETER);
978     return FALSE;
979 }
980
981 /******************************************************************************
982  * IsWellKnownSid [ADVAPI32.@]
983  */
984 BOOL WINAPI
985 IsWellKnownSid( PSID pSid, WELL_KNOWN_SID_TYPE WellKnownSidType )
986 {
987     unsigned int i;
988     TRACE("(%s, %d)\n", debugstr_sid(pSid), WellKnownSidType);
989
990     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
991         if (WellKnownSids[i].Type == WellKnownSidType)
992             if (EqualSid(pSid, (PSID)&(WellKnownSids[i].Sid.Revision)))
993                 return TRUE;
994
995     return FALSE;
996 }
997
998 BOOL WINAPI
999 IsTokenRestricted( HANDLE TokenHandle )
1000 {
1001     TOKEN_GROUPS *groups;
1002     DWORD size;
1003     NTSTATUS status;
1004     BOOL restricted;
1005
1006     TRACE("(%p)\n", TokenHandle);
1007  
1008     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, NULL, 0, &size);
1009     if (status != STATUS_BUFFER_TOO_SMALL)
1010         return FALSE;
1011  
1012     groups = HeapAlloc(GetProcessHeap(), 0, size);
1013     if (!groups)
1014     {
1015         SetLastError(ERROR_OUTOFMEMORY);
1016         return FALSE;
1017     }
1018  
1019     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, groups, size, &size);
1020     if (status != STATUS_SUCCESS)
1021     {
1022         HeapFree(GetProcessHeap(), 0, groups);
1023         return set_ntstatus(status);
1024     }
1025  
1026     if (groups->GroupCount)
1027         restricted = TRUE;
1028     else
1029         restricted = FALSE;
1030      
1031     HeapFree(GetProcessHeap(), 0, groups);
1032  
1033     return restricted;
1034 }
1035
1036 /******************************************************************************
1037  * IsValidSid [ADVAPI32.@]
1038  *
1039  * PARAMS
1040  *   pSid []
1041  */
1042 BOOL WINAPI
1043 IsValidSid( PSID pSid )
1044 {
1045         return RtlValidSid( pSid );
1046 }
1047
1048 /******************************************************************************
1049  * EqualSid [ADVAPI32.@]
1050  *
1051  * PARAMS
1052  *   pSid1 []
1053  *   pSid2 []
1054  */
1055 BOOL WINAPI
1056 EqualSid( PSID pSid1, PSID pSid2 )
1057 {
1058         BOOL ret = RtlEqualSid( pSid1, pSid2 );
1059         SetLastError(ERROR_SUCCESS);
1060         return ret;
1061 }
1062
1063 /******************************************************************************
1064  * EqualPrefixSid [ADVAPI32.@]
1065  */
1066 BOOL WINAPI EqualPrefixSid (PSID pSid1, PSID pSid2)
1067 {
1068         return RtlEqualPrefixSid(pSid1, pSid2);
1069 }
1070
1071 /******************************************************************************
1072  * GetSidLengthRequired [ADVAPI32.@]
1073  *
1074  * PARAMS
1075  *   nSubAuthorityCount []
1076  */
1077 DWORD WINAPI
1078 GetSidLengthRequired( BYTE nSubAuthorityCount )
1079 {
1080         return RtlLengthRequiredSid(nSubAuthorityCount);
1081 }
1082
1083 /******************************************************************************
1084  * InitializeSid [ADVAPI32.@]
1085  *
1086  * PARAMS
1087  *   pIdentifierAuthority []
1088  */
1089 BOOL WINAPI
1090 InitializeSid (
1091         PSID pSid,
1092         PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
1093         BYTE nSubAuthorityCount)
1094 {
1095         return RtlInitializeSid(pSid, pIdentifierAuthority, nSubAuthorityCount);
1096 }
1097
1098 DWORD WINAPI
1099 GetEffectiveRightsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pAccessRights )
1100 {
1101     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1102
1103     *pAccessRights = STANDARD_RIGHTS_ALL | SPECIFIC_RIGHTS_ALL;
1104     return 0;
1105 }
1106
1107 DWORD WINAPI
1108 GetEffectiveRightsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pAccessRights )
1109 {
1110     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1111
1112     return 1;
1113 }
1114
1115 /******************************************************************************
1116  * GetSidIdentifierAuthority [ADVAPI32.@]
1117  *
1118  * PARAMS
1119  *   pSid []
1120  */
1121 PSID_IDENTIFIER_AUTHORITY WINAPI
1122 GetSidIdentifierAuthority( PSID pSid )
1123 {
1124         return RtlIdentifierAuthoritySid(pSid);
1125 }
1126
1127 /******************************************************************************
1128  * GetSidSubAuthority [ADVAPI32.@]
1129  *
1130  * PARAMS
1131  *   pSid          []
1132  *   nSubAuthority []
1133  */
1134 PDWORD WINAPI
1135 GetSidSubAuthority( PSID pSid, DWORD nSubAuthority )
1136 {
1137         SetLastError(ERROR_SUCCESS);
1138         return RtlSubAuthoritySid(pSid, nSubAuthority);
1139 }
1140
1141 /******************************************************************************
1142  * GetSidSubAuthorityCount [ADVAPI32.@]
1143  *
1144  * PARAMS
1145  *   pSid []
1146  */
1147 PUCHAR WINAPI
1148 GetSidSubAuthorityCount (PSID pSid)
1149 {
1150         SetLastError(ERROR_SUCCESS);
1151         return RtlSubAuthorityCountSid(pSid);
1152 }
1153
1154 /******************************************************************************
1155  * GetLengthSid [ADVAPI32.@]
1156  *
1157  * PARAMS
1158  *   pSid []
1159  */
1160 DWORD WINAPI
1161 GetLengthSid (PSID pSid)
1162 {
1163         return RtlLengthSid(pSid);
1164 }
1165
1166 /*      ##############################################
1167         ######  SECURITY DESCRIPTOR FUNCTIONS   ######
1168         ##############################################
1169 */
1170
1171  /****************************************************************************** 
1172  * BuildSecurityDescriptorA [ADVAPI32.@]
1173  *
1174  * Builds a SD from 
1175  *
1176  * PARAMS
1177  *  pOwner                [I]
1178  *  pGroup                [I]
1179  *  cCountOfAccessEntries [I]
1180  *  pListOfAccessEntries  [I]
1181  *  cCountOfAuditEntries  [I]
1182  *  pListofAuditEntries   [I]
1183  *  pOldSD                [I]
1184  *  lpdwBufferLength      [I/O]
1185  *  pNewSD                [O]
1186  *
1187  * RETURNS
1188  *  Success: ERROR_SUCCESS
1189  *  Failure: nonzero error code from Winerror.h
1190  */
1191 DWORD WINAPI BuildSecurityDescriptorA(
1192     IN PTRUSTEEA pOwner,
1193     IN PTRUSTEEA pGroup,
1194     IN ULONG cCountOfAccessEntries,
1195     IN PEXPLICIT_ACCESSA pListOfAccessEntries,
1196     IN ULONG cCountOfAuditEntries,
1197     IN PEXPLICIT_ACCESSA pListofAuditEntries,
1198     IN PSECURITY_DESCRIPTOR pOldSD,
1199     IN OUT PULONG lpdwBufferLength,
1200     OUT PSECURITY_DESCRIPTOR* pNewSD)
1201
1202     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1203           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1204           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1205  
1206     return ERROR_CALL_NOT_IMPLEMENTED;
1207
1208  
1209 /******************************************************************************
1210  * BuildSecurityDescriptorW [ADVAPI32.@]
1211  *
1212  * See BuildSecurityDescriptorA.
1213  */
1214 DWORD WINAPI BuildSecurityDescriptorW(
1215     IN PTRUSTEEW pOwner,
1216     IN PTRUSTEEW pGroup,
1217     IN ULONG cCountOfAccessEntries,
1218     IN PEXPLICIT_ACCESSW pListOfAccessEntries,
1219     IN ULONG cCountOfAuditEntries,
1220     IN PEXPLICIT_ACCESSW pListofAuditEntries,
1221     IN PSECURITY_DESCRIPTOR pOldSD,
1222     IN OUT PULONG lpdwBufferLength,
1223     OUT PSECURITY_DESCRIPTOR* pNewSD)
1224
1225     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1226           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1227           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1228  
1229     return ERROR_CALL_NOT_IMPLEMENTED;
1230
1231
1232 /******************************************************************************
1233  * InitializeSecurityDescriptor [ADVAPI32.@]
1234  *
1235  * PARAMS
1236  *   pDescr   []
1237  *   revision []
1238  */
1239 BOOL WINAPI
1240 InitializeSecurityDescriptor( PSECURITY_DESCRIPTOR pDescr, DWORD revision )
1241 {
1242         return set_ntstatus( RtlCreateSecurityDescriptor(pDescr, revision ));
1243 }
1244
1245
1246 /******************************************************************************
1247  * MakeAbsoluteSD [ADVAPI32.@]
1248  */
1249 BOOL WINAPI MakeAbsoluteSD (
1250         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1251         OUT PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1252         OUT LPDWORD lpdwAbsoluteSecurityDescriptorSize,
1253         OUT PACL pDacl,
1254         OUT LPDWORD lpdwDaclSize,
1255         OUT PACL pSacl,
1256         OUT LPDWORD lpdwSaclSize,
1257         OUT PSID pOwner,
1258         OUT LPDWORD lpdwOwnerSize,
1259         OUT PSID pPrimaryGroup,
1260         OUT LPDWORD lpdwPrimaryGroupSize)
1261 {
1262     return set_ntstatus( RtlSelfRelativeToAbsoluteSD(pSelfRelativeSecurityDescriptor,
1263                                                      pAbsoluteSecurityDescriptor,
1264                                                      lpdwAbsoluteSecurityDescriptorSize,
1265                                                      pDacl, lpdwDaclSize, pSacl, lpdwSaclSize,
1266                                                      pOwner, lpdwOwnerSize,
1267                                                      pPrimaryGroup, lpdwPrimaryGroupSize));
1268 }
1269
1270 /******************************************************************************
1271  * GetKernelObjectSecurity [ADVAPI32.@]
1272  */
1273 BOOL WINAPI GetKernelObjectSecurity(
1274         HANDLE Handle,
1275         SECURITY_INFORMATION RequestedInformation,
1276         PSECURITY_DESCRIPTOR pSecurityDescriptor,
1277         DWORD nLength,
1278         LPDWORD lpnLengthNeeded )
1279 {
1280     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", Handle, RequestedInformation,
1281           pSecurityDescriptor, nLength, lpnLengthNeeded);
1282
1283     return set_ntstatus( NtQuerySecurityObject(Handle, RequestedInformation, pSecurityDescriptor,
1284                                                nLength, lpnLengthNeeded ));
1285 }
1286
1287 /******************************************************************************
1288  * GetPrivateObjectSecurity [ADVAPI32.@]
1289  */
1290 BOOL WINAPI GetPrivateObjectSecurity(
1291         PSECURITY_DESCRIPTOR ObjectDescriptor,
1292         SECURITY_INFORMATION SecurityInformation,
1293         PSECURITY_DESCRIPTOR ResultantDescriptor,
1294         DWORD DescriptorLength,
1295         PDWORD ReturnLength )
1296 {
1297     SECURITY_DESCRIPTOR desc;
1298     BOOL defaulted, present;
1299     PACL pacl;
1300     PSID psid;
1301
1302     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", ObjectDescriptor, SecurityInformation,
1303           ResultantDescriptor, DescriptorLength, ReturnLength);
1304
1305     if (!InitializeSecurityDescriptor(&desc, SECURITY_DESCRIPTOR_REVISION))
1306         return FALSE;
1307
1308     if (SecurityInformation & OWNER_SECURITY_INFORMATION)
1309     {
1310         if (!GetSecurityDescriptorOwner(ObjectDescriptor, &psid, &defaulted))
1311             return FALSE;
1312         SetSecurityDescriptorOwner(&desc, psid, defaulted);
1313     }
1314
1315     if (SecurityInformation & GROUP_SECURITY_INFORMATION)
1316     {
1317         if (!GetSecurityDescriptorGroup(ObjectDescriptor, &psid, &defaulted))
1318             return FALSE;
1319         SetSecurityDescriptorGroup(&desc, psid, defaulted);
1320     }
1321
1322     if (SecurityInformation & DACL_SECURITY_INFORMATION)
1323     {
1324         if (!GetSecurityDescriptorDacl(ObjectDescriptor, &present, &pacl, &defaulted))
1325             return FALSE;
1326         SetSecurityDescriptorDacl(&desc, present, pacl, defaulted);
1327     }
1328
1329     if (SecurityInformation & SACL_SECURITY_INFORMATION)
1330     {
1331         if (!GetSecurityDescriptorSacl(ObjectDescriptor, &present, &pacl, &defaulted))
1332             return FALSE;
1333         SetSecurityDescriptorSacl(&desc, present, pacl, defaulted);
1334     }
1335
1336     *ReturnLength = DescriptorLength;
1337     return MakeSelfRelativeSD(&desc, ResultantDescriptor, ReturnLength);
1338 }
1339
1340 /******************************************************************************
1341  * GetSecurityDescriptorLength [ADVAPI32.@]
1342  */
1343 DWORD WINAPI GetSecurityDescriptorLength( PSECURITY_DESCRIPTOR pDescr)
1344 {
1345         return RtlLengthSecurityDescriptor(pDescr);
1346 }
1347
1348 /******************************************************************************
1349  * GetSecurityDescriptorOwner [ADVAPI32.@]
1350  *
1351  * PARAMS
1352  *   pOwner            []
1353  *   lpbOwnerDefaulted []
1354  */
1355 BOOL WINAPI
1356 GetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pDescr, PSID *pOwner,
1357                             LPBOOL lpbOwnerDefaulted )
1358 {
1359     BOOLEAN defaulted;
1360     BOOL ret = set_ntstatus( RtlGetOwnerSecurityDescriptor( pDescr, pOwner, &defaulted ));
1361     *lpbOwnerDefaulted = defaulted;
1362     return ret;
1363 }
1364
1365 /******************************************************************************
1366  * SetSecurityDescriptorOwner [ADVAPI32.@]
1367  *
1368  * PARAMS
1369  */
1370 BOOL WINAPI SetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1371                                    PSID pOwner, BOOL bOwnerDefaulted)
1372 {
1373     return set_ntstatus( RtlSetOwnerSecurityDescriptor(pSecurityDescriptor, pOwner, bOwnerDefaulted));
1374 }
1375 /******************************************************************************
1376  * GetSecurityDescriptorGroup                   [ADVAPI32.@]
1377  */
1378 BOOL WINAPI GetSecurityDescriptorGroup(
1379         PSECURITY_DESCRIPTOR SecurityDescriptor,
1380         PSID *Group,
1381         LPBOOL GroupDefaulted)
1382 {
1383     BOOLEAN defaulted;
1384     BOOL ret = set_ntstatus( RtlGetGroupSecurityDescriptor(SecurityDescriptor, Group, &defaulted ));
1385     *GroupDefaulted = defaulted;
1386     return ret;
1387 }
1388 /******************************************************************************
1389  * SetSecurityDescriptorGroup [ADVAPI32.@]
1390  */
1391 BOOL WINAPI SetSecurityDescriptorGroup ( PSECURITY_DESCRIPTOR SecurityDescriptor,
1392                                            PSID Group, BOOL GroupDefaulted)
1393 {
1394     return set_ntstatus( RtlSetGroupSecurityDescriptor( SecurityDescriptor, Group, GroupDefaulted));
1395 }
1396
1397 /******************************************************************************
1398  * IsValidSecurityDescriptor [ADVAPI32.@]
1399  *
1400  * PARAMS
1401  *   lpsecdesc []
1402  */
1403 BOOL WINAPI
1404 IsValidSecurityDescriptor( PSECURITY_DESCRIPTOR SecurityDescriptor )
1405 {
1406     return set_ntstatus( RtlValidSecurityDescriptor(SecurityDescriptor));
1407 }
1408
1409 /******************************************************************************
1410  *  GetSecurityDescriptorDacl                   [ADVAPI32.@]
1411  */
1412 BOOL WINAPI GetSecurityDescriptorDacl(
1413         IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
1414         OUT LPBOOL lpbDaclPresent,
1415         OUT PACL *pDacl,
1416         OUT LPBOOL lpbDaclDefaulted)
1417 {
1418     BOOLEAN present, defaulted;
1419     BOOL ret = set_ntstatus( RtlGetDaclSecurityDescriptor(pSecurityDescriptor, &present, pDacl, &defaulted));
1420     *lpbDaclPresent = present;
1421     *lpbDaclDefaulted = defaulted;
1422     return ret;
1423 }
1424
1425 /******************************************************************************
1426  *  SetSecurityDescriptorDacl                   [ADVAPI32.@]
1427  */
1428 BOOL WINAPI
1429 SetSecurityDescriptorDacl (
1430         PSECURITY_DESCRIPTOR lpsd,
1431         BOOL daclpresent,
1432         PACL dacl,
1433         BOOL dacldefaulted )
1434 {
1435     return set_ntstatus( RtlSetDaclSecurityDescriptor (lpsd, daclpresent, dacl, dacldefaulted ) );
1436 }
1437 /******************************************************************************
1438  *  GetSecurityDescriptorSacl                   [ADVAPI32.@]
1439  */
1440 BOOL WINAPI GetSecurityDescriptorSacl(
1441         IN PSECURITY_DESCRIPTOR lpsd,
1442         OUT LPBOOL lpbSaclPresent,
1443         OUT PACL *pSacl,
1444         OUT LPBOOL lpbSaclDefaulted)
1445 {
1446     BOOLEAN present, defaulted;
1447     BOOL ret = set_ntstatus( RtlGetSaclSecurityDescriptor(lpsd, &present, pSacl, &defaulted) );
1448     *lpbSaclPresent = present;
1449     *lpbSaclDefaulted = defaulted;
1450     return ret;
1451 }
1452
1453 /**************************************************************************
1454  * SetSecurityDescriptorSacl                    [ADVAPI32.@]
1455  */
1456 BOOL WINAPI SetSecurityDescriptorSacl (
1457         PSECURITY_DESCRIPTOR lpsd,
1458         BOOL saclpresent,
1459         PACL lpsacl,
1460         BOOL sacldefaulted)
1461 {
1462     return set_ntstatus (RtlSetSaclSecurityDescriptor(lpsd, saclpresent, lpsacl, sacldefaulted));
1463 }
1464 /******************************************************************************
1465  * MakeSelfRelativeSD [ADVAPI32.@]
1466  *
1467  * PARAMS
1468  *   lpabssecdesc  []
1469  *   lpselfsecdesc []
1470  *   lpbuflen      []
1471  */
1472 BOOL WINAPI
1473 MakeSelfRelativeSD(
1474         IN PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1475         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1476         IN OUT LPDWORD lpdwBufferLength)
1477 {
1478     return set_ntstatus( RtlMakeSelfRelativeSD( pAbsoluteSecurityDescriptor,
1479                                                 pSelfRelativeSecurityDescriptor, lpdwBufferLength));
1480 }
1481
1482 /******************************************************************************
1483  * GetSecurityDescriptorControl                 [ADVAPI32.@]
1484  */
1485
1486 BOOL WINAPI GetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR  pSecurityDescriptor,
1487                  PSECURITY_DESCRIPTOR_CONTROL pControl, LPDWORD lpdwRevision)
1488 {
1489     return set_ntstatus( RtlGetControlSecurityDescriptor(pSecurityDescriptor,pControl,lpdwRevision));
1490 }
1491
1492 /******************************************************************************
1493  * SetSecurityDescriptorControl                 [ADVAPI32.@]
1494  */
1495 BOOL WINAPI SetSecurityDescriptorControl( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1496   SECURITY_DESCRIPTOR_CONTROL ControlBitsOfInterest,
1497   SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet )
1498 {
1499     return set_ntstatus( RtlSetControlSecurityDescriptor(
1500         pSecurityDescriptor, ControlBitsOfInterest, ControlBitsToSet ) );
1501 }
1502
1503 /*      ##############################
1504         ######  ACL FUNCTIONS   ######
1505         ##############################
1506 */
1507
1508 /*************************************************************************
1509  * InitializeAcl [ADVAPI32.@]
1510  */
1511 BOOL WINAPI InitializeAcl(PACL acl, DWORD size, DWORD rev)
1512 {
1513     return set_ntstatus( RtlCreateAcl(acl, size, rev));
1514 }
1515
1516 BOOL WINAPI ImpersonateNamedPipeClient( HANDLE hNamedPipe )
1517 {
1518     IO_STATUS_BLOCK io_block;
1519
1520     TRACE("(%p)\n", hNamedPipe);
1521
1522     return set_ntstatus( NtFsControlFile(hNamedPipe, NULL, NULL, NULL,
1523                          &io_block, FSCTL_PIPE_IMPERSONATE, NULL, 0, NULL, 0) );
1524 }
1525
1526 /******************************************************************************
1527  *  AddAccessAllowedAce [ADVAPI32.@]
1528  */
1529 BOOL WINAPI AddAccessAllowedAce(
1530         IN OUT PACL pAcl,
1531         IN DWORD dwAceRevision,
1532         IN DWORD AccessMask,
1533         IN PSID pSid)
1534 {
1535     return set_ntstatus(RtlAddAccessAllowedAce(pAcl, dwAceRevision, AccessMask, pSid));
1536 }
1537
1538 /******************************************************************************
1539  *  AddAccessAllowedAceEx [ADVAPI32.@]
1540  */
1541 BOOL WINAPI AddAccessAllowedAceEx(
1542         IN OUT PACL pAcl,
1543         IN DWORD dwAceRevision,
1544         IN DWORD AceFlags,
1545         IN DWORD AccessMask,
1546         IN PSID pSid)
1547 {
1548     return set_ntstatus(RtlAddAccessAllowedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1549 }
1550
1551 /******************************************************************************
1552  *  AddAccessDeniedAce [ADVAPI32.@]
1553  */
1554 BOOL WINAPI AddAccessDeniedAce(
1555         IN OUT PACL pAcl,
1556         IN DWORD dwAceRevision,
1557         IN DWORD AccessMask,
1558         IN PSID pSid)
1559 {
1560     return set_ntstatus(RtlAddAccessDeniedAce(pAcl, dwAceRevision, AccessMask, pSid));
1561 }
1562
1563 /******************************************************************************
1564  *  AddAccessDeniedAceEx [ADVAPI32.@]
1565  */
1566 BOOL WINAPI AddAccessDeniedAceEx(
1567         IN OUT PACL pAcl,
1568         IN DWORD dwAceRevision,
1569         IN DWORD AceFlags,
1570         IN DWORD AccessMask,
1571         IN PSID pSid)
1572 {
1573     return set_ntstatus(RtlAddAccessDeniedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1574 }
1575
1576 /******************************************************************************
1577  *  AddAce [ADVAPI32.@]
1578  */
1579 BOOL WINAPI AddAce(
1580         IN OUT PACL pAcl,
1581         IN DWORD dwAceRevision,
1582         IN DWORD dwStartingAceIndex,
1583         LPVOID pAceList,
1584         DWORD nAceListLength)
1585 {
1586     return set_ntstatus(RtlAddAce(pAcl, dwAceRevision, dwStartingAceIndex, pAceList, nAceListLength));
1587 }
1588
1589 /******************************************************************************
1590  * DeleteAce [ADVAPI32.@]
1591  */
1592 BOOL WINAPI DeleteAce(PACL pAcl, DWORD dwAceIndex)
1593 {
1594     return set_ntstatus(RtlDeleteAce(pAcl, dwAceIndex));
1595 }
1596
1597 /******************************************************************************
1598  *  FindFirstFreeAce [ADVAPI32.@]
1599  */
1600 BOOL WINAPI FindFirstFreeAce(IN PACL pAcl, LPVOID * pAce)
1601 {
1602         return RtlFirstFreeAce(pAcl, (PACE_HEADER *)pAce);
1603 }
1604
1605 /******************************************************************************
1606  * GetAce [ADVAPI32.@]
1607  */
1608 BOOL WINAPI GetAce(PACL pAcl,DWORD dwAceIndex,LPVOID *pAce )
1609 {
1610     return set_ntstatus(RtlGetAce(pAcl, dwAceIndex, pAce));
1611 }
1612
1613 /******************************************************************************
1614  * GetAclInformation [ADVAPI32.@]
1615  */
1616 BOOL WINAPI GetAclInformation(
1617   PACL pAcl,
1618   LPVOID pAclInformation,
1619   DWORD nAclInformationLength,
1620   ACL_INFORMATION_CLASS dwAclInformationClass)
1621 {
1622     return set_ntstatus(RtlQueryInformationAcl(pAcl, pAclInformation,
1623                                                nAclInformationLength, dwAclInformationClass));
1624 }
1625
1626 /******************************************************************************
1627  *  IsValidAcl [ADVAPI32.@]
1628  */
1629 BOOL WINAPI IsValidAcl(IN PACL pAcl)
1630 {
1631         return RtlValidAcl(pAcl);
1632 }
1633
1634 /*      ##############################
1635         ######  MISC FUNCTIONS  ######
1636         ##############################
1637 */
1638
1639 /******************************************************************************
1640  * AllocateLocallyUniqueId [ADVAPI32.@]
1641  *
1642  * PARAMS
1643  *   lpLuid []
1644  */
1645 BOOL WINAPI AllocateLocallyUniqueId( PLUID lpLuid )
1646 {
1647     return set_ntstatus(NtAllocateLocallyUniqueId(lpLuid));
1648 }
1649
1650 static const WCHAR SE_CREATE_TOKEN_NAME_W[] =
1651  { 'S','e','C','r','e','a','t','e','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1652 static const WCHAR SE_ASSIGNPRIMARYTOKEN_NAME_W[] =
1653  { 'S','e','A','s','s','i','g','n','P','r','i','m','a','r','y','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1654 static const WCHAR SE_LOCK_MEMORY_NAME_W[] =
1655  { 'S','e','L','o','c','k','M','e','m','o','r','y','P','r','i','v','i','l','e','g','e',0 };
1656 static const WCHAR SE_INCREASE_QUOTA_NAME_W[] =
1657  { 'S','e','I','n','c','r','e','a','s','e','Q','u','o','t','a','P','r','i','v','i','l','e','g','e',0 };
1658 static const WCHAR SE_MACHINE_ACCOUNT_NAME_W[] =
1659  { 'S','e','M','a','c','h','i','n','e','A','c','c','o','u','n','t','P','r','i','v','i','l','e','g','e',0 };
1660 static const WCHAR SE_TCB_NAME_W[] =
1661  { 'S','e','T','c','b','P','r','i','v','i','l','e','g','e',0 };
1662 static const WCHAR SE_SECURITY_NAME_W[] =
1663  { 'S','e','S','e','c','u','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1664 static const WCHAR SE_TAKE_OWNERSHIP_NAME_W[] =
1665  { 'S','e','T','a','k','e','O','w','n','e','r','s','h','i','p','P','r','i','v','i','l','e','g','e',0 };
1666 static const WCHAR SE_LOAD_DRIVER_NAME_W[] =
1667  { 'S','e','L','o','a','d','D','r','i','v','e','r','P','r','i','v','i','l','e','g','e',0 };
1668 static const WCHAR SE_SYSTEM_PROFILE_NAME_W[] =
1669  { 'S','e','S','y','s','t','e','m','P','r','o','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1670 static const WCHAR SE_SYSTEMTIME_NAME_W[] =
1671  { 'S','e','S','y','s','t','e','m','t','i','m','e','P','r','i','v','i','l','e','g','e',0 };
1672 static const WCHAR SE_PROF_SINGLE_PROCESS_NAME_W[] =
1673  { 'S','e','P','r','o','f','i','l','e','S','i','n','g','l','e','P','r','o','c','e','s','s','P','r','i','v','i','l','e','g','e',0 };
1674 static const WCHAR SE_INC_BASE_PRIORITY_NAME_W[] =
1675  { 'S','e','I','n','c','r','e','a','s','e','B','a','s','e','P','r','i','o','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1676 static const WCHAR SE_CREATE_PAGEFILE_NAME_W[] =
1677  { 'S','e','C','r','e','a','t','e','P','a','g','e','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1678 static const WCHAR SE_CREATE_PERMANENT_NAME_W[] =
1679  { 'S','e','C','r','e','a','t','e','P','e','r','m','a','n','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1680 static const WCHAR SE_BACKUP_NAME_W[] =
1681  { 'S','e','B','a','c','k','u','p','P','r','i','v','i','l','e','g','e',0 };
1682 static const WCHAR SE_RESTORE_NAME_W[] =
1683  { 'S','e','R','e','s','t','o','r','e','P','r','i','v','i','l','e','g','e',0 };
1684 static const WCHAR SE_SHUTDOWN_NAME_W[] =
1685  { 'S','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1686 static const WCHAR SE_DEBUG_NAME_W[] =
1687  { 'S','e','D','e','b','u','g','P','r','i','v','i','l','e','g','e',0 };
1688 static const WCHAR SE_AUDIT_NAME_W[] =
1689  { 'S','e','A','u','d','i','t','P','r','i','v','i','l','e','g','e',0 };
1690 static const WCHAR SE_SYSTEM_ENVIRONMENT_NAME_W[] =
1691  { 'S','e','S','y','s','t','e','m','E','n','v','i','r','o','n','m','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1692 static const WCHAR SE_CHANGE_NOTIFY_NAME_W[] =
1693  { 'S','e','C','h','a','n','g','e','N','o','t','i','f','y','P','r','i','v','i','l','e','g','e',0 };
1694 static const WCHAR SE_REMOTE_SHUTDOWN_NAME_W[] =
1695  { 'S','e','R','e','m','o','t','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1696 static const WCHAR SE_UNDOCK_NAME_W[] =
1697  { 'S','e','U','n','d','o','c','k','P','r','i','v','i','l','e','g','e',0 };
1698 static const WCHAR SE_SYNC_AGENT_NAME_W[] =
1699  { 'S','e','S','y','n','c','A','g','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1700 static const WCHAR SE_ENABLE_DELEGATION_NAME_W[] =
1701  { 'S','e','E','n','a','b','l','e','D','e','l','e','g','a','t','i','o','n','P','r','i','v','i','l','e','g','e',0 };
1702 static const WCHAR SE_MANAGE_VOLUME_NAME_W[] =
1703  { 'S','e','M','a','n','a','g','e','V','o','l','u','m','e','P','r','i','v','i','l','e','g','e',0 };
1704 static const WCHAR SE_IMPERSONATE_NAME_W[] =
1705  { 'S','e','I','m','p','e','r','s','o','n','a','t','e','P','r','i','v','i','l','e','g','e',0 };
1706 static const WCHAR SE_CREATE_GLOBAL_NAME_W[] =
1707  { 'S','e','C','r','e','a','t','e','G','l','o','b','a','l','P','r','i','v','i','l','e','g','e',0 };
1708
1709 static const WCHAR * const WellKnownPrivNames[SE_MAX_WELL_KNOWN_PRIVILEGE + 1] =
1710 {
1711     NULL,
1712     NULL,
1713     SE_CREATE_TOKEN_NAME_W,
1714     SE_ASSIGNPRIMARYTOKEN_NAME_W,
1715     SE_LOCK_MEMORY_NAME_W,
1716     SE_INCREASE_QUOTA_NAME_W,
1717     SE_MACHINE_ACCOUNT_NAME_W,
1718     SE_TCB_NAME_W,
1719     SE_SECURITY_NAME_W,
1720     SE_TAKE_OWNERSHIP_NAME_W,
1721     SE_LOAD_DRIVER_NAME_W,
1722     SE_SYSTEM_PROFILE_NAME_W,
1723     SE_SYSTEMTIME_NAME_W,
1724     SE_PROF_SINGLE_PROCESS_NAME_W,
1725     SE_INC_BASE_PRIORITY_NAME_W,
1726     SE_CREATE_PAGEFILE_NAME_W,
1727     SE_CREATE_PERMANENT_NAME_W,
1728     SE_BACKUP_NAME_W,
1729     SE_RESTORE_NAME_W,
1730     SE_SHUTDOWN_NAME_W,
1731     SE_DEBUG_NAME_W,
1732     SE_AUDIT_NAME_W,
1733     SE_SYSTEM_ENVIRONMENT_NAME_W,
1734     SE_CHANGE_NOTIFY_NAME_W,
1735     SE_REMOTE_SHUTDOWN_NAME_W,
1736     SE_UNDOCK_NAME_W,
1737     SE_SYNC_AGENT_NAME_W,
1738     SE_ENABLE_DELEGATION_NAME_W,
1739     SE_MANAGE_VOLUME_NAME_W,
1740     SE_IMPERSONATE_NAME_W,
1741     SE_CREATE_GLOBAL_NAME_W,
1742 };
1743
1744 /******************************************************************************
1745  * LookupPrivilegeValueW                        [ADVAPI32.@]
1746  *
1747  * See LookupPrivilegeValueA.
1748  */
1749 BOOL WINAPI
1750 LookupPrivilegeValueW( LPCWSTR lpSystemName, LPCWSTR lpName, PLUID lpLuid )
1751 {
1752     UINT i;
1753
1754     TRACE("%s,%s,%p\n",debugstr_w(lpSystemName), debugstr_w(lpName), lpLuid);
1755
1756     if (!ADVAPI_IsLocalComputer(lpSystemName))
1757     {
1758         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1759         return FALSE;
1760     }
1761     if (!lpName)
1762     {
1763         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1764         return FALSE;
1765     }
1766     for( i=SE_MIN_WELL_KNOWN_PRIVILEGE; i<=SE_MAX_WELL_KNOWN_PRIVILEGE; i++ )
1767     {
1768         if( !WellKnownPrivNames[i] )
1769             continue;
1770         if( strcmpiW( WellKnownPrivNames[i], lpName) )
1771             continue;
1772         lpLuid->LowPart = i;
1773         lpLuid->HighPart = 0;
1774         TRACE( "%s -> %08x-%08x\n",debugstr_w( lpSystemName ),
1775                lpLuid->HighPart, lpLuid->LowPart );
1776         return TRUE;
1777     }
1778     SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1779     return FALSE;
1780 }
1781
1782 /******************************************************************************
1783  * LookupPrivilegeValueA                        [ADVAPI32.@]
1784  *
1785  * Retrieves LUID used on a system to represent the privilege name.
1786  *
1787  * PARAMS
1788  *  lpSystemName [I] Name of the system
1789  *  lpName       [I] Name of the privilege
1790  *  lpLuid       [O] Destination for the resulting LUID
1791  *
1792  * RETURNS
1793  *  Success: TRUE. lpLuid contains the requested LUID.
1794  *  Failure: FALSE.
1795  */
1796 BOOL WINAPI
1797 LookupPrivilegeValueA( LPCSTR lpSystemName, LPCSTR lpName, PLUID lpLuid )
1798 {
1799     UNICODE_STRING lpSystemNameW;
1800     UNICODE_STRING lpNameW;
1801     BOOL ret;
1802
1803     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1804     RtlCreateUnicodeStringFromAsciiz(&lpNameW,lpName);
1805     ret = LookupPrivilegeValueW(lpSystemNameW.Buffer, lpNameW.Buffer, lpLuid);
1806     RtlFreeUnicodeString(&lpNameW);
1807     RtlFreeUnicodeString(&lpSystemNameW);
1808     return ret;
1809 }
1810
1811 BOOL WINAPI LookupPrivilegeDisplayNameA( LPCSTR lpSystemName, LPCSTR lpName, LPSTR lpDisplayName,
1812                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1813 {
1814     FIXME("%s %s %s %p %p - stub\n", debugstr_a(lpSystemName), debugstr_a(lpName),
1815           debugstr_a(lpDisplayName), cchDisplayName, lpLanguageId);
1816
1817     return FALSE;
1818 }
1819
1820 BOOL WINAPI LookupPrivilegeDisplayNameW( LPCWSTR lpSystemName, LPCWSTR lpName, LPWSTR lpDisplayName,
1821                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1822 {
1823     FIXME("%s %s %s %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpName),
1824           debugstr_w(lpDisplayName), cchDisplayName, lpLanguageId);
1825
1826     return FALSE;
1827 }
1828
1829 /******************************************************************************
1830  * LookupPrivilegeNameA                 [ADVAPI32.@]
1831  *
1832  * See LookupPrivilegeNameW.
1833  */
1834 BOOL WINAPI
1835 LookupPrivilegeNameA( LPCSTR lpSystemName, PLUID lpLuid, LPSTR lpName,
1836  LPDWORD cchName)
1837 {
1838     UNICODE_STRING lpSystemNameW;
1839     BOOL ret;
1840     DWORD wLen = 0;
1841
1842     TRACE("%s %p %p %p\n", debugstr_a(lpSystemName), lpLuid, lpName, cchName);
1843
1844     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1845     ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, NULL, &wLen);
1846     if (!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
1847     {
1848         LPWSTR lpNameW = HeapAlloc(GetProcessHeap(), 0, wLen * sizeof(WCHAR));
1849
1850         ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, lpNameW,
1851          &wLen);
1852         if (ret)
1853         {
1854             /* Windows crashes if cchName is NULL, so will I */
1855             unsigned int len = WideCharToMultiByte(CP_ACP, 0, lpNameW, -1, lpName,
1856              *cchName, NULL, NULL);
1857
1858             if (len == 0)
1859             {
1860                 /* WideCharToMultiByte failed */
1861                 ret = FALSE;
1862             }
1863             else if (len > *cchName)
1864             {
1865                 *cchName = len;
1866                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
1867                 ret = FALSE;
1868             }
1869             else
1870             {
1871                 /* WideCharToMultiByte succeeded, output length needs to be
1872                  * length not including NULL terminator
1873                  */
1874                 *cchName = len - 1;
1875             }
1876         }
1877         HeapFree(GetProcessHeap(), 0, lpNameW);
1878     }
1879     RtlFreeUnicodeString(&lpSystemNameW);
1880     return ret;
1881 }
1882
1883 /******************************************************************************
1884  * LookupPrivilegeNameW                 [ADVAPI32.@]
1885  *
1886  * Retrieves the privilege name referred to by the LUID lpLuid.
1887  *
1888  * PARAMS
1889  *  lpSystemName [I]   Name of the system
1890  *  lpLuid       [I]   Privilege value
1891  *  lpName       [O]   Name of the privilege
1892  *  cchName      [I/O] Number of characters in lpName.
1893  *
1894  * RETURNS
1895  *  Success: TRUE. lpName contains the name of the privilege whose value is
1896  *  *lpLuid.
1897  *  Failure: FALSE.
1898  *
1899  * REMARKS
1900  *  Only well-known privilege names (those defined in winnt.h) can be retrieved
1901  *  using this function.
1902  *  If the length of lpName is too small, on return *cchName will contain the
1903  *  number of WCHARs needed to contain the privilege, including the NULL
1904  *  terminator, and GetLastError will return ERROR_INSUFFICIENT_BUFFER.
1905  *  On success, *cchName will contain the number of characters stored in
1906  *  lpName, NOT including the NULL terminator.
1907  */
1908 BOOL WINAPI
1909 LookupPrivilegeNameW( LPCWSTR lpSystemName, PLUID lpLuid, LPWSTR lpName,
1910  LPDWORD cchName)
1911 {
1912     size_t privNameLen;
1913
1914     TRACE("%s,%p,%p,%p\n",debugstr_w(lpSystemName), lpLuid, lpName, cchName);
1915
1916     if (!ADVAPI_IsLocalComputer(lpSystemName))
1917     {
1918         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1919         return FALSE;
1920     }
1921     if (lpLuid->HighPart || (lpLuid->LowPart < SE_MIN_WELL_KNOWN_PRIVILEGE ||
1922      lpLuid->LowPart > SE_MAX_WELL_KNOWN_PRIVILEGE))
1923     {
1924         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1925         return FALSE;
1926     }
1927     privNameLen = strlenW(WellKnownPrivNames[lpLuid->LowPart]);
1928     /* Windows crashes if cchName is NULL, so will I */
1929     if (*cchName <= privNameLen)
1930     {
1931         *cchName = privNameLen + 1;
1932         SetLastError(ERROR_INSUFFICIENT_BUFFER);
1933         return FALSE;
1934     }
1935     else
1936     {
1937         strcpyW(lpName, WellKnownPrivNames[lpLuid->LowPart]);
1938         *cchName = privNameLen;
1939         return TRUE;
1940     }
1941 }
1942
1943 /******************************************************************************
1944  * GetFileSecurityA [ADVAPI32.@]
1945  *
1946  * Obtains Specified information about the security of a file or directory.
1947  *
1948  * PARAMS
1949  *  lpFileName           [I] Name of the file to get info for
1950  *  RequestedInformation [I] SE_ flags from "winnt.h"
1951  *  pSecurityDescriptor  [O] Destination for security information
1952  *  nLength              [I] Length of pSecurityDescriptor
1953  *  lpnLengthNeeded      [O] Destination for length of returned security information
1954  *
1955  * RETURNS
1956  *  Success: TRUE. pSecurityDescriptor contains the requested information.
1957  *  Failure: FALSE. lpnLengthNeeded contains the required space to return the info. 
1958  *
1959  * NOTES
1960  *  The information returned is constrained by the callers access rights and
1961  *  privileges.
1962  */
1963 BOOL WINAPI
1964 GetFileSecurityA( LPCSTR lpFileName,
1965                     SECURITY_INFORMATION RequestedInformation,
1966                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1967                     DWORD nLength, LPDWORD lpnLengthNeeded )
1968 {
1969     DWORD len;
1970     BOOL r;
1971     LPWSTR name = NULL;
1972
1973     if( lpFileName )
1974     {
1975         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
1976         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
1977         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
1978     }
1979
1980     r = GetFileSecurityW( name, RequestedInformation, pSecurityDescriptor,
1981                           nLength, lpnLengthNeeded );
1982     HeapFree( GetProcessHeap(), 0, name );
1983
1984     return r;
1985 }
1986
1987 /******************************************************************************
1988  * GetFileSecurityW [ADVAPI32.@]
1989  *
1990  * See GetFileSecurityA.
1991  */
1992 BOOL WINAPI
1993 GetFileSecurityW( LPCWSTR lpFileName,
1994                     SECURITY_INFORMATION RequestedInformation,
1995                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1996                     DWORD nLength, LPDWORD lpnLengthNeeded )
1997 {
1998     HANDLE hfile;
1999     NTSTATUS status;
2000     DWORD access = 0;
2001
2002     TRACE("(%s,%d,%p,%d,%p)\n", debugstr_w(lpFileName),
2003           RequestedInformation, pSecurityDescriptor,
2004           nLength, lpnLengthNeeded);
2005
2006     if (RequestedInformation & (OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
2007                                 DACL_SECURITY_INFORMATION))
2008         access |= READ_CONTROL;
2009     if (RequestedInformation & SACL_SECURITY_INFORMATION)
2010         access |= ACCESS_SYSTEM_SECURITY;
2011
2012     hfile = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2013                          NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0 );
2014     if ( hfile == INVALID_HANDLE_VALUE )
2015         return FALSE;
2016
2017     status = NtQuerySecurityObject( hfile, RequestedInformation, pSecurityDescriptor,
2018                                     nLength, lpnLengthNeeded );
2019     CloseHandle( hfile );
2020     return set_ntstatus( status );
2021 }
2022
2023
2024 /******************************************************************************
2025  * LookupAccountSidA [ADVAPI32.@]
2026  */
2027 BOOL WINAPI
2028 LookupAccountSidA(
2029         IN LPCSTR system,
2030         IN PSID sid,
2031         OUT LPSTR account,
2032         IN OUT LPDWORD accountSize,
2033         OUT LPSTR domain,
2034         IN OUT LPDWORD domainSize,
2035         OUT PSID_NAME_USE name_use )
2036 {
2037     DWORD len;
2038     BOOL r;
2039     LPWSTR systemW = NULL;
2040     LPWSTR accountW = NULL;
2041     LPWSTR domainW = NULL;
2042     DWORD accountSizeW = *accountSize;
2043     DWORD domainSizeW = *domainSize;
2044
2045     if (system) {
2046         len = MultiByteToWideChar( CP_ACP, 0, system, -1, NULL, 0 );
2047         systemW = HeapAlloc( GetProcessHeap(), 0, len * sizeof(WCHAR) );
2048         MultiByteToWideChar( CP_ACP, 0, system, -1, systemW, len );
2049     }
2050     if (account)
2051         accountW = HeapAlloc( GetProcessHeap(), 0, accountSizeW * sizeof(WCHAR) );
2052     if (domain)
2053         domainW = HeapAlloc( GetProcessHeap(), 0, domainSizeW * sizeof(WCHAR) );
2054
2055     r = LookupAccountSidW( systemW, sid, accountW, &accountSizeW, domainW, &domainSizeW, name_use );
2056
2057     if (r) {
2058         if (accountW && *accountSize) {
2059             len = WideCharToMultiByte( CP_ACP, 0, accountW, -1, NULL, 0, NULL, NULL );
2060             WideCharToMultiByte( CP_ACP, 0, accountW, -1, account, len, NULL, NULL );
2061             *accountSize = len;
2062         } else
2063             *accountSize = accountSizeW + 1;
2064
2065         if (domainW && *domainSize) {
2066             len = WideCharToMultiByte( CP_ACP, 0, domainW, -1, NULL, 0, NULL, NULL );
2067             WideCharToMultiByte( CP_ACP, 0, domainW, -1, domain, len, NULL, NULL );
2068             *domainSize = len;
2069         } else
2070             *domainSize = domainSizeW + 1;
2071     }
2072     else
2073     {
2074         *accountSize = accountSizeW + 1;
2075         *domainSize = domainSizeW + 1;
2076     }
2077
2078     HeapFree( GetProcessHeap(), 0, systemW );
2079     HeapFree( GetProcessHeap(), 0, accountW );
2080     HeapFree( GetProcessHeap(), 0, domainW );
2081
2082     return r;
2083 }
2084
2085 /******************************************************************************
2086  * LookupAccountSidW [ADVAPI32.@]
2087  *
2088  * PARAMS
2089  *   system      []
2090  *   sid         []
2091  *   account     []
2092  *   accountSize []
2093  *   domain      []
2094  *   domainSize  []
2095  *   name_use    []
2096  */
2097
2098 BOOL WINAPI
2099 LookupAccountSidW(
2100         IN LPCWSTR system,
2101         IN PSID sid,
2102         OUT LPWSTR account,
2103         IN OUT LPDWORD accountSize,
2104         OUT LPWSTR domain,
2105         IN OUT LPDWORD domainSize,
2106         OUT PSID_NAME_USE name_use )
2107 {
2108     unsigned int i, j;
2109     const WCHAR * ac = NULL;
2110     const WCHAR * dm = NULL;
2111     SID_NAME_USE use = 0;
2112     LPWSTR computer_name = NULL;
2113     LPWSTR account_name = NULL;
2114
2115     TRACE("(%s,sid=%s,%p,%p(%u),%p,%p(%u),%p)\n",
2116           debugstr_w(system),debugstr_sid(sid),
2117           account,accountSize,accountSize?*accountSize:0,
2118           domain,domainSize,domainSize?*domainSize:0,
2119           name_use);
2120
2121     if (!ADVAPI_IsLocalComputer(system)) {
2122         FIXME("Only local computer supported!\n");
2123         SetLastError(RPC_S_SERVER_UNAVAILABLE);
2124         return FALSE;
2125     }
2126
2127     /* check the well known SIDs first */
2128     for (i = 0; i <= 60; i++) {
2129         if (IsWellKnownSid(sid, i)) {
2130             for (j = 0; j < (sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0])); j++) {
2131                 if (ACCOUNT_SIDS[j].type == i) {
2132                     ac = ACCOUNT_SIDS[j].account;
2133                     dm = ACCOUNT_SIDS[j].domain;
2134                     use = ACCOUNT_SIDS[j].name_use;
2135                 }
2136             }
2137             break;
2138         }
2139     }
2140
2141     if (dm == NULL) {
2142         MAX_SID local;
2143
2144         /* check for the local computer next */
2145         if (ADVAPI_GetComputerSid(&local)) {
2146             DWORD size = MAX_COMPUTERNAME_LENGTH + 1;
2147             BOOL result;
2148
2149             computer_name = HeapAlloc(GetProcessHeap(), 0, size * sizeof(WCHAR));
2150             result = GetComputerNameW(computer_name,  &size);
2151
2152             if (result) {
2153                 if (EqualSid(sid, &local)) {
2154                     dm = computer_name;
2155                     ac = Blank;
2156                     use = 3;
2157                 } else {
2158                     local.SubAuthorityCount++;
2159
2160                     if (EqualPrefixSid(sid, &local)) {
2161                         dm = computer_name;
2162                         use = 1;
2163                         switch (((MAX_SID *)sid)->SubAuthority[4]) {
2164                         case DOMAIN_USER_RID_ADMIN:
2165                             ac = Administrator;
2166                             break;
2167                         case DOMAIN_USER_RID_GUEST:
2168                             ac = Guest;
2169                             break;
2170                         case DOMAIN_GROUP_RID_ADMINS:
2171                             ac = Domain_Admins;
2172                             break;
2173                         case DOMAIN_GROUP_RID_USERS:
2174                             ac = Domain_Users;
2175                             break;
2176                         case DOMAIN_GROUP_RID_GUESTS:
2177                             ac = Domain_Guests;
2178                             break;
2179                         case DOMAIN_GROUP_RID_COMPUTERS:
2180                             ac = Domain_Computers;
2181                             break;
2182                         case DOMAIN_GROUP_RID_CONTROLLERS:
2183                             ac = Domain_Controllers;
2184                             break;
2185                         case DOMAIN_GROUP_RID_CERT_ADMINS:
2186                             ac = Cert_Publishers;
2187                             break;
2188                         case DOMAIN_GROUP_RID_SCHEMA_ADMINS:
2189                             ac = Schema_Admins;
2190                             break;
2191                         case DOMAIN_GROUP_RID_ENTERPRISE_ADMINS:
2192                             ac = Enterprise_Admins;
2193                             break;
2194                         case DOMAIN_GROUP_RID_POLICY_ADMINS:
2195                             ac = Group_Policy_Creator_Owners;
2196                             break;
2197                         case DOMAIN_ALIAS_RID_RAS_SERVERS:
2198                             ac = RAS_and_IAS_Servers;
2199                             break;
2200                         case 1000:      /* first user account */
2201                             size = UNLEN + 1;
2202                             account_name = HeapAlloc(
2203                                 GetProcessHeap(), 0, size * sizeof(WCHAR));
2204                             if (GetUserNameW(account_name, &size))
2205                                 ac = account_name;
2206                             else
2207                                 dm = NULL;
2208
2209                             break;
2210                         default:
2211                             dm = NULL;
2212                             break;
2213                         }
2214                     }
2215                 }
2216             }
2217         }
2218     }
2219
2220     if (dm) {
2221         DWORD ac_len = lstrlenW(ac);
2222         DWORD dm_len = lstrlenW(dm);
2223         BOOL status = TRUE;
2224
2225         if (*accountSize > ac_len) {
2226             if (account)
2227                 lstrcpyW(account, ac);
2228         }
2229         if (*domainSize > dm_len) {
2230             if (domain)
2231                 lstrcpyW(domain, dm);
2232         }
2233         if ((*accountSize && *accountSize < ac_len) ||
2234             (!account && !*accountSize && ac_len)   ||
2235             (*domainSize && *domainSize < dm_len)   ||
2236             (!domain && !*domainSize && dm_len))
2237         {
2238             SetLastError(ERROR_INSUFFICIENT_BUFFER);
2239             status = FALSE;
2240         }
2241         if (*domainSize)
2242             *domainSize = dm_len;
2243         else
2244             *domainSize = dm_len + 1;
2245         if (*accountSize)
2246             *accountSize = ac_len;
2247         else
2248             *accountSize = ac_len + 1;
2249
2250         HeapFree(GetProcessHeap(), 0, account_name);
2251         HeapFree(GetProcessHeap(), 0, computer_name);
2252         if (status) *name_use = use;
2253         return status;
2254     }
2255
2256     HeapFree(GetProcessHeap(), 0, account_name);
2257     HeapFree(GetProcessHeap(), 0, computer_name);
2258     SetLastError(ERROR_NONE_MAPPED);
2259     return FALSE;
2260 }
2261
2262 /******************************************************************************
2263  * SetFileSecurityA [ADVAPI32.@]
2264  *
2265  * See SetFileSecurityW.
2266  */
2267 BOOL WINAPI SetFileSecurityA( LPCSTR lpFileName,
2268                                 SECURITY_INFORMATION RequestedInformation,
2269                                 PSECURITY_DESCRIPTOR pSecurityDescriptor)
2270 {
2271     DWORD len;
2272     BOOL r;
2273     LPWSTR name = NULL;
2274
2275     if( lpFileName )
2276     {
2277         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
2278         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
2279         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
2280     }
2281
2282     r = SetFileSecurityW( name, RequestedInformation, pSecurityDescriptor );
2283     HeapFree( GetProcessHeap(), 0, name );
2284
2285     return r;
2286 }
2287
2288 /******************************************************************************
2289  * SetFileSecurityW [ADVAPI32.@]
2290  *
2291  * Sets the security of a file or directory.
2292  *
2293  * PARAMS
2294  *   lpFileName           []
2295  *   RequestedInformation []
2296  *   pSecurityDescriptor  []
2297  *
2298  * RETURNS
2299  *  Success: TRUE.
2300  *  Failure: FALSE.
2301  */
2302 BOOL WINAPI
2303 SetFileSecurityW( LPCWSTR lpFileName,
2304                     SECURITY_INFORMATION RequestedInformation,
2305                     PSECURITY_DESCRIPTOR pSecurityDescriptor )
2306 {
2307     HANDLE file;
2308     DWORD access = 0;
2309     NTSTATUS status;
2310
2311     TRACE("(%s, 0x%x, %p)\n", debugstr_w(lpFileName), RequestedInformation,
2312           pSecurityDescriptor );
2313
2314     if (RequestedInformation & OWNER_SECURITY_INFORMATION ||
2315         RequestedInformation & GROUP_SECURITY_INFORMATION)
2316         access |= WRITE_OWNER;
2317     if (RequestedInformation & SACL_SECURITY_INFORMATION)
2318         access |= ACCESS_SYSTEM_SECURITY;
2319     if (RequestedInformation & DACL_SECURITY_INFORMATION)
2320         access |= WRITE_DAC;
2321
2322     file = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2323                         NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL );
2324     if (file == INVALID_HANDLE_VALUE)
2325         return FALSE;
2326
2327     status = NtSetSecurityObject( file, RequestedInformation, pSecurityDescriptor );
2328     CloseHandle( file );
2329     return set_ntstatus( status );
2330 }
2331
2332 /******************************************************************************
2333  * QueryWindows31FilesMigration [ADVAPI32.@]
2334  *
2335  * PARAMS
2336  *   x1 []
2337  */
2338 BOOL WINAPI
2339 QueryWindows31FilesMigration( DWORD x1 )
2340 {
2341         FIXME("(%d):stub\n",x1);
2342         return TRUE;
2343 }
2344
2345 /******************************************************************************
2346  * SynchronizeWindows31FilesAndWindowsNTRegistry [ADVAPI32.@]
2347  *
2348  * PARAMS
2349  *   x1 []
2350  *   x2 []
2351  *   x3 []
2352  *   x4 []
2353  */
2354 BOOL WINAPI
2355 SynchronizeWindows31FilesAndWindowsNTRegistry( DWORD x1, DWORD x2, DWORD x3,
2356                                                DWORD x4 )
2357 {
2358         FIXME("(0x%08x,0x%08x,0x%08x,0x%08x):stub\n",x1,x2,x3,x4);
2359         return TRUE;
2360 }
2361
2362 /******************************************************************************
2363  * NotifyBootConfigStatus [ADVAPI32.@]
2364  *
2365  * PARAMS
2366  *   x1 []
2367  */
2368 BOOL WINAPI
2369 NotifyBootConfigStatus( BOOL x1 )
2370 {
2371         FIXME("(0x%08d):stub\n",x1);
2372         return 1;
2373 }
2374
2375 /******************************************************************************
2376  * RevertToSelf [ADVAPI32.@]
2377  *
2378  * Ends the impersonation of a user.
2379  *
2380  * PARAMS
2381  *   void []
2382  *
2383  * RETURNS
2384  *  Success: TRUE.
2385  *  Failure: FALSE.
2386  */
2387 BOOL WINAPI
2388 RevertToSelf( void )
2389 {
2390     HANDLE Token = NULL;
2391     return set_ntstatus( NtSetInformationThread( GetCurrentThread(),
2392         ThreadImpersonationToken, &Token, sizeof(Token) ) );
2393 }
2394
2395 /******************************************************************************
2396  * ImpersonateSelf [ADVAPI32.@]
2397  *
2398  * Makes an impersonation token that represents the process user and assigns
2399  * to the current thread.
2400  *
2401  * PARAMS
2402  *  ImpersonationLevel [I] Level at which to impersonate.
2403  *
2404  * RETURNS
2405  *  Success: TRUE.
2406  *  Failure: FALSE.
2407  */
2408 BOOL WINAPI
2409 ImpersonateSelf(SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
2410 {
2411     return set_ntstatus( RtlImpersonateSelf( ImpersonationLevel ) );
2412 }
2413
2414 /******************************************************************************
2415  * ImpersonateLoggedOnUser [ADVAPI32.@]
2416  */
2417 BOOL WINAPI ImpersonateLoggedOnUser(HANDLE hToken)
2418 {
2419     DWORD size;
2420     NTSTATUS Status;
2421     HANDLE ImpersonationToken;
2422     TOKEN_TYPE Type;
2423     static BOOL warn = TRUE;
2424
2425     if (warn)
2426     {
2427         FIXME( "(%p)\n", hToken );
2428         warn = FALSE;
2429     }
2430     if (!GetTokenInformation( hToken, TokenType, &Type,
2431                               sizeof(TOKEN_TYPE), &size ))
2432         return FALSE;
2433
2434     if (Type == TokenPrimary)
2435     {
2436         OBJECT_ATTRIBUTES ObjectAttributes;
2437
2438         InitializeObjectAttributes( &ObjectAttributes, NULL, 0, NULL, NULL );
2439
2440         Status = NtDuplicateToken( hToken,
2441                                    TOKEN_IMPERSONATE | TOKEN_QUERY,
2442                                    &ObjectAttributes,
2443                                    SecurityImpersonation,
2444                                    TokenImpersonation,
2445                                    &ImpersonationToken );
2446         if (Status != STATUS_SUCCESS)
2447         {
2448             ERR( "NtDuplicateToken failed with error 0x%08x\n", Status );
2449             SetLastError( RtlNtStatusToDosError( Status ) );
2450             return FALSE;
2451         }
2452     }
2453     else
2454         ImpersonationToken = hToken;
2455
2456     Status = NtSetInformationThread( GetCurrentThread(),
2457                                      ThreadImpersonationToken,
2458                                      &ImpersonationToken,
2459                                      sizeof(ImpersonationToken) );
2460
2461     if (Type == TokenPrimary)
2462         NtClose( ImpersonationToken );
2463
2464     if (Status != STATUS_SUCCESS)
2465     {
2466         ERR( "NtSetInformationThread failed with error 0x%08x\n", Status );
2467         SetLastError( RtlNtStatusToDosError( Status ) );
2468         return FALSE;
2469     }
2470
2471     return TRUE;
2472 }
2473
2474 /******************************************************************************
2475  * AccessCheck [ADVAPI32.@]
2476  */
2477 BOOL WINAPI
2478 AccessCheck(
2479         PSECURITY_DESCRIPTOR SecurityDescriptor,
2480         HANDLE ClientToken,
2481         DWORD DesiredAccess,
2482         PGENERIC_MAPPING GenericMapping,
2483         PPRIVILEGE_SET PrivilegeSet,
2484         LPDWORD PrivilegeSetLength,
2485         LPDWORD GrantedAccess,
2486         LPBOOL AccessStatus)
2487 {
2488     NTSTATUS access_status;
2489     BOOL ret = set_ntstatus( NtAccessCheck(SecurityDescriptor, ClientToken, DesiredAccess,
2490                                            GenericMapping, PrivilegeSet, PrivilegeSetLength,
2491                                            GrantedAccess, &access_status) );
2492     if (ret) *AccessStatus = set_ntstatus( access_status );
2493     return ret;
2494 }
2495
2496
2497 /******************************************************************************
2498  * AccessCheckByType [ADVAPI32.@]
2499  */
2500 BOOL WINAPI AccessCheckByType(
2501     PSECURITY_DESCRIPTOR pSecurityDescriptor, 
2502     PSID PrincipalSelfSid,
2503     HANDLE ClientToken, 
2504     DWORD DesiredAccess, 
2505     POBJECT_TYPE_LIST ObjectTypeList,
2506     DWORD ObjectTypeListLength,
2507     PGENERIC_MAPPING GenericMapping,
2508     PPRIVILEGE_SET PrivilegeSet,
2509     LPDWORD PrivilegeSetLength, 
2510     LPDWORD GrantedAccess,
2511     LPBOOL AccessStatus)
2512 {
2513         FIXME("stub\n");
2514
2515         *AccessStatus = TRUE;
2516
2517         return !*AccessStatus;
2518 }
2519
2520 /******************************************************************************
2521  * MapGenericMask [ADVAPI32.@]
2522  *
2523  * Maps generic access rights into specific access rights according to the
2524  * supplied mapping.
2525  *
2526  * PARAMS
2527  *  AccessMask     [I/O] Access rights.
2528  *  GenericMapping [I] The mapping between generic and specific rights.
2529  *
2530  * RETURNS
2531  *  Nothing.
2532  */
2533 VOID WINAPI MapGenericMask( PDWORD AccessMask, PGENERIC_MAPPING GenericMapping )
2534 {
2535     RtlMapGenericMask( AccessMask, GenericMapping );
2536 }
2537
2538 /*************************************************************************
2539  * SetKernelObjectSecurity [ADVAPI32.@]
2540  */
2541 BOOL WINAPI SetKernelObjectSecurity (
2542         IN HANDLE Handle,
2543         IN SECURITY_INFORMATION SecurityInformation,
2544         IN PSECURITY_DESCRIPTOR SecurityDescriptor )
2545 {
2546     return set_ntstatus (NtSetSecurityObject (Handle, SecurityInformation, SecurityDescriptor));
2547 }
2548
2549
2550 /******************************************************************************
2551  *  AddAuditAccessAce [ADVAPI32.@]
2552  */
2553 BOOL WINAPI AddAuditAccessAce(
2554     IN OUT PACL pAcl, 
2555     IN DWORD dwAceRevision, 
2556     IN DWORD dwAccessMask, 
2557     IN PSID pSid, 
2558     IN BOOL bAuditSuccess, 
2559     IN BOOL bAuditFailure) 
2560 {
2561     return set_ntstatus( RtlAddAuditAccessAce(pAcl, dwAceRevision, dwAccessMask, pSid, 
2562                                               bAuditSuccess, bAuditFailure) ); 
2563 }
2564
2565 /******************************************************************************
2566  *  AddAuditAccessAce [ADVAPI32.@]
2567  */
2568 BOOL WINAPI AddAuditAccessAceEx(
2569     IN OUT PACL pAcl,
2570     IN DWORD dwAceRevision,
2571     IN DWORD dwAceFlags,
2572     IN DWORD dwAccessMask,
2573     IN PSID pSid,
2574     IN BOOL bAuditSuccess,
2575     IN BOOL bAuditFailure)
2576 {
2577     return set_ntstatus( RtlAddAuditAccessAceEx(pAcl, dwAceRevision, dwAceFlags, dwAccessMask, pSid,
2578                                               bAuditSuccess, bAuditFailure) );
2579 }
2580
2581 /******************************************************************************
2582  * LookupAccountNameA [ADVAPI32.@]
2583  */
2584 BOOL WINAPI
2585 LookupAccountNameA(
2586         IN LPCSTR system,
2587         IN LPCSTR account,
2588         OUT PSID sid,
2589         OUT LPDWORD cbSid,
2590         LPSTR ReferencedDomainName,
2591         IN OUT LPDWORD cbReferencedDomainName,
2592         OUT PSID_NAME_USE name_use )
2593 {
2594     BOOL ret;
2595     UNICODE_STRING lpSystemW;
2596     UNICODE_STRING lpAccountW;
2597     LPWSTR lpReferencedDomainNameW = NULL;
2598
2599     RtlCreateUnicodeStringFromAsciiz(&lpSystemW, system);
2600     RtlCreateUnicodeStringFromAsciiz(&lpAccountW, account);
2601
2602     if (ReferencedDomainName)
2603         lpReferencedDomainNameW = HeapAlloc(GetProcessHeap(), 0, *cbReferencedDomainName * sizeof(WCHAR));
2604
2605     ret = LookupAccountNameW(lpSystemW.Buffer, lpAccountW.Buffer, sid, cbSid, lpReferencedDomainNameW,
2606         cbReferencedDomainName, name_use);
2607
2608     if (ret && lpReferencedDomainNameW)
2609     {
2610         WideCharToMultiByte(CP_ACP, 0, lpReferencedDomainNameW, -1,
2611             ReferencedDomainName, *cbReferencedDomainName+1, NULL, NULL);
2612     }
2613
2614     RtlFreeUnicodeString(&lpSystemW);
2615     RtlFreeUnicodeString(&lpAccountW);
2616     HeapFree(GetProcessHeap(), 0, lpReferencedDomainNameW);
2617
2618     return ret;
2619 }
2620
2621 /******************************************************************************
2622  * lookup_user_account_name
2623  */
2624 static BOOL lookup_user_account_name(PSID Sid, PDWORD cbSid, LPWSTR ReferencedDomainName,
2625                                      LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2626 {
2627     char buffer[sizeof(TOKEN_USER) + sizeof(SID) + sizeof(DWORD)*SID_MAX_SUB_AUTHORITIES];
2628     DWORD len = sizeof(buffer);
2629     HANDLE token;
2630     BOOL ret;
2631     PSID pSid;
2632     WCHAR domainName[MAX_COMPUTERNAME_LENGTH + 1];
2633     DWORD nameLen;
2634
2635     if (!OpenThreadToken(GetCurrentThread(), TOKEN_READ, TRUE, &token))
2636     {
2637         if (GetLastError() != ERROR_NO_TOKEN) return FALSE;
2638         if (!OpenProcessToken(GetCurrentProcess(), TOKEN_READ, &token)) return FALSE;
2639     }
2640
2641     ret = GetTokenInformation(token, TokenUser, buffer, len, &len);
2642     CloseHandle( token );
2643
2644     if (!ret) return FALSE;
2645
2646     pSid = ((TOKEN_USER *)buffer)->User.Sid;
2647
2648     if (Sid != NULL && (*cbSid >= GetLengthSid(pSid)))
2649        CopySid(*cbSid, Sid, pSid);
2650     if (*cbSid < GetLengthSid(pSid))
2651     {
2652        SetLastError(ERROR_INSUFFICIENT_BUFFER);
2653        ret = FALSE;
2654     }
2655     *cbSid = GetLengthSid(pSid);
2656
2657     nameLen = MAX_COMPUTERNAME_LENGTH + 1;
2658     if (!GetComputerNameW(domainName, &nameLen))
2659     {
2660         domainName[0] = 0;
2661         nameLen = 0;
2662     }
2663     if (*cchReferencedDomainName <= nameLen || !ret)
2664     {
2665         SetLastError(ERROR_INSUFFICIENT_BUFFER);
2666         nameLen += 1;
2667         ret = FALSE;
2668     }
2669     else if (ReferencedDomainName)
2670         strcpyW(ReferencedDomainName, domainName);
2671
2672     *cchReferencedDomainName = nameLen;
2673
2674     if (ret)
2675         *peUse = SidTypeUser;
2676
2677     return ret;
2678 }
2679
2680 /******************************************************************************
2681  * lookup_computer_account_name
2682  */
2683 static BOOL lookup_computer_account_name(PSID Sid, PDWORD cbSid, LPWSTR ReferencedDomainName,
2684                                          LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2685 {
2686     MAX_SID local;
2687     BOOL ret;
2688     WCHAR domainName[MAX_COMPUTERNAME_LENGTH + 1];
2689     DWORD nameLen;
2690
2691     if ((ret = ADVAPI_GetComputerSid(&local)))
2692     {
2693         if (Sid != NULL && (*cbSid >= GetLengthSid(&local)))
2694            CopySid(*cbSid, Sid, &local);
2695         if (*cbSid < GetLengthSid(&local))
2696         {
2697            SetLastError(ERROR_INSUFFICIENT_BUFFER);
2698            ret = FALSE;
2699         }
2700         *cbSid = GetLengthSid(&local);
2701     }
2702
2703     nameLen = MAX_COMPUTERNAME_LENGTH + 1;
2704     if (!GetComputerNameW(domainName, &nameLen))
2705     {
2706         domainName[0] = 0;
2707         nameLen = 0;
2708     }
2709     if (*cchReferencedDomainName <= nameLen || !ret)
2710     {
2711         SetLastError(ERROR_INSUFFICIENT_BUFFER);
2712         nameLen += 1;
2713         ret = FALSE;
2714     }
2715     else if (ReferencedDomainName)
2716         strcpyW(ReferencedDomainName, domainName);
2717
2718     *cchReferencedDomainName = nameLen;
2719
2720     if (ret)
2721         *peUse = SidTypeDomain;
2722
2723     return ret;
2724 }
2725
2726 static void split_domain_account( const LSA_UNICODE_STRING *str, LSA_UNICODE_STRING *account,
2727                                   LSA_UNICODE_STRING *domain )
2728 {
2729     WCHAR *p = str->Buffer + str->Length / sizeof(WCHAR) - 1;
2730
2731     while (p > str->Buffer && *p != '\\') p--;
2732
2733     if (*p == '\\')
2734     {
2735         domain->Buffer = str->Buffer;
2736         domain->Length = (p - str->Buffer) * sizeof(WCHAR);
2737
2738         account->Buffer = p + 1;
2739         account->Length = str->Length - ((p - str->Buffer + 1) * sizeof(WCHAR));
2740     }
2741     else
2742     {
2743         domain->Buffer = NULL;
2744         domain->Length = 0;
2745
2746         account->Buffer = str->Buffer;
2747         account->Length = str->Length;
2748     }
2749 }
2750
2751 static BOOL match_domain( ULONG idx, const LSA_UNICODE_STRING *domain )
2752 {
2753     ULONG len = strlenW( ACCOUNT_SIDS[idx].domain );
2754
2755     if (len == domain->Length / sizeof(WCHAR) && !strncmpiW( domain->Buffer, ACCOUNT_SIDS[idx].domain, len ))
2756         return TRUE;
2757
2758     return FALSE;
2759 }
2760
2761 static BOOL match_account( ULONG idx, const LSA_UNICODE_STRING *account )
2762 {
2763     ULONG len = strlenW( ACCOUNT_SIDS[idx].account );
2764
2765     if (len == account->Length / sizeof(WCHAR) && !strncmpiW( account->Buffer, ACCOUNT_SIDS[idx].account, len ))
2766         return TRUE;
2767
2768     if (ACCOUNT_SIDS[idx].alias)
2769     {
2770         len = strlenW( ACCOUNT_SIDS[idx].alias );
2771         if (len == account->Length / sizeof(WCHAR) && !strncmpiW( account->Buffer, ACCOUNT_SIDS[idx].alias, len ))
2772             return TRUE;
2773     }
2774     return FALSE;
2775 }
2776
2777 /*
2778  * Helper function for LookupAccountNameW
2779  */
2780 BOOL lookup_local_wellknown_name( const LSA_UNICODE_STRING *account_and_domain,
2781                                   PSID Sid, LPDWORD cbSid,
2782                                   LPWSTR ReferencedDomainName,
2783                                   LPDWORD cchReferencedDomainName,
2784                                   PSID_NAME_USE peUse, BOOL *handled )
2785 {
2786     PSID pSid;
2787     LSA_UNICODE_STRING account, domain;
2788     BOOL ret = TRUE;
2789     ULONG i;
2790
2791     *handled = FALSE;
2792     split_domain_account( account_and_domain, &account, &domain );
2793
2794     for (i = 0; i < sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0]); i++)
2795     {
2796         /* check domain first */
2797         if (domain.Buffer && !match_domain( i, &domain )) continue;
2798
2799         if (match_account( i, &account ))
2800         {
2801             DWORD len, sidLen = SECURITY_MAX_SID_SIZE;
2802
2803             if (!(pSid = HeapAlloc( GetProcessHeap(), 0, sidLen ))) return FALSE;
2804
2805             if ((ret = CreateWellKnownSid( ACCOUNT_SIDS[i].type, NULL, pSid, &sidLen )))
2806             {
2807                 if (*cbSid < sidLen)
2808                 {
2809                     SetLastError(ERROR_INSUFFICIENT_BUFFER);
2810                     ret = FALSE;
2811                 }
2812                 else if (Sid)
2813                 {
2814                     CopySid(*cbSid, Sid, pSid);
2815                 }
2816                 *cbSid = sidLen;
2817             }
2818
2819             len = strlenW( ACCOUNT_SIDS[i].domain );
2820             if (*cchReferencedDomainName <= len || !ret)
2821             {
2822                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
2823                 len++;
2824                 ret = FALSE;
2825             }
2826             else if (ReferencedDomainName)
2827             {
2828                 strcpyW( ReferencedDomainName, ACCOUNT_SIDS[i].domain );
2829             }
2830
2831             *cchReferencedDomainName = len;
2832             if (ret)
2833                 *peUse = ACCOUNT_SIDS[i].name_use;
2834
2835             HeapFree(GetProcessHeap(), 0, pSid);
2836             *handled = TRUE;
2837             return ret;
2838         }
2839     }
2840     return ret;
2841 }
2842
2843 BOOL lookup_local_user_name( const LSA_UNICODE_STRING *account_and_domain,
2844                              PSID Sid, LPDWORD cbSid,
2845                              LPWSTR ReferencedDomainName,
2846                              LPDWORD cchReferencedDomainName,
2847                              PSID_NAME_USE peUse, BOOL *handled )
2848 {
2849     DWORD nameLen;
2850     LPWSTR userName = NULL;
2851     LSA_UNICODE_STRING account, domain;
2852     BOOL ret = TRUE;
2853
2854     *handled = FALSE;
2855     split_domain_account( account_and_domain, &account, &domain );
2856
2857     /* Let the current Unix user id masquerade as first Windows user account */
2858
2859     nameLen = UNLEN + 1;
2860     if (!(userName = HeapAlloc( GetProcessHeap(), 0, nameLen * sizeof(WCHAR) ))) return FALSE;
2861
2862     if (domain.Buffer)
2863     {
2864         /* check to make sure this account is on this computer */
2865         if (GetComputerNameW( userName, &nameLen ) &&
2866             (domain.Length / sizeof(WCHAR) != nameLen || strncmpW( domain.Buffer, userName, nameLen )))
2867         {
2868             SetLastError(ERROR_NONE_MAPPED);
2869             ret = FALSE;
2870         }
2871         nameLen = UNLEN + 1;
2872     }
2873
2874     if (GetUserNameW( userName, &nameLen ) &&
2875         account.Length / sizeof(WCHAR) == nameLen - 1 && !strncmpW( account.Buffer, userName, nameLen - 1 ))
2876     {
2877             ret = lookup_user_account_name( Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse );
2878             *handled = TRUE;
2879     }
2880     else
2881     {
2882         nameLen = UNLEN + 1;
2883         if (GetComputerNameW( userName, &nameLen ) &&
2884             account.Length / sizeof(WCHAR) == nameLen && !strncmpW( account.Buffer, userName , nameLen ))
2885         {
2886             ret = lookup_computer_account_name( Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse );
2887             *handled = TRUE;
2888         }
2889     }
2890
2891     HeapFree(GetProcessHeap(), 0, userName);
2892     return ret;
2893 }
2894
2895 /******************************************************************************
2896  * LookupAccountNameW [ADVAPI32.@]
2897  */
2898 BOOL WINAPI LookupAccountNameW( LPCWSTR lpSystemName, LPCWSTR lpAccountName, PSID Sid,
2899                                 LPDWORD cbSid, LPWSTR ReferencedDomainName,
2900                                 LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2901 {
2902     BOOL ret, handled;
2903     LSA_UNICODE_STRING account;
2904
2905     TRACE("%s %s %p %p %p %p %p\n", debugstr_w(lpSystemName), debugstr_w(lpAccountName),
2906           Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse);
2907
2908     if (!ADVAPI_IsLocalComputer( lpSystemName ))
2909     {
2910         FIXME("remote computer not supported\n");
2911         SetLastError( RPC_S_SERVER_UNAVAILABLE );
2912         return FALSE;
2913     }
2914
2915     if (!lpAccountName || !strcmpW( lpAccountName, Blank ))
2916     {
2917         lpAccountName = BUILTIN;
2918     }
2919
2920     RtlInitUnicodeString( &account, lpAccountName );
2921
2922     /* Check well known SIDs first */
2923     ret = lookup_local_wellknown_name( &account, Sid, cbSid, ReferencedDomainName,
2924                                        cchReferencedDomainName, peUse, &handled );
2925     if (handled)
2926         return ret;
2927
2928     /* Check user names */
2929     ret = lookup_local_user_name( &account, Sid, cbSid, ReferencedDomainName,
2930                                   cchReferencedDomainName, peUse, &handled);
2931     if (handled)
2932         return ret;
2933
2934     SetLastError( ERROR_NONE_MAPPED );
2935     return FALSE;
2936 }
2937
2938 /******************************************************************************
2939  * PrivilegeCheck [ADVAPI32.@]
2940  */
2941 BOOL WINAPI PrivilegeCheck( HANDLE ClientToken, PPRIVILEGE_SET RequiredPrivileges, LPBOOL pfResult)
2942 {
2943     BOOL ret;
2944     BOOLEAN Result;
2945
2946     TRACE("%p %p %p\n", ClientToken, RequiredPrivileges, pfResult);
2947
2948     ret = set_ntstatus (NtPrivilegeCheck (ClientToken, RequiredPrivileges, &Result));
2949     if (ret)
2950         *pfResult = Result;
2951     return ret;
2952 }
2953
2954 /******************************************************************************
2955  * AccessCheckAndAuditAlarmA [ADVAPI32.@]
2956  */
2957 BOOL WINAPI AccessCheckAndAuditAlarmA(LPCSTR Subsystem, LPVOID HandleId, LPSTR ObjectTypeName,
2958   LPSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2959   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2960   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2961 {
2962         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_a(Subsystem),
2963                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName),
2964                 SecurityDescriptor, DesiredAccess, GenericMapping,
2965                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2966         return TRUE;
2967 }
2968
2969 /******************************************************************************
2970  * AccessCheckAndAuditAlarmW [ADVAPI32.@]
2971  */
2972 BOOL WINAPI AccessCheckAndAuditAlarmW(LPCWSTR Subsystem, LPVOID HandleId, LPWSTR ObjectTypeName,
2973   LPWSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2974   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2975   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2976 {
2977         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_w(Subsystem),
2978                 HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName),
2979                 SecurityDescriptor, DesiredAccess, GenericMapping,
2980                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2981         return TRUE;
2982 }
2983
2984 BOOL WINAPI ObjectCloseAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2985 {
2986     FIXME("stub (%s,%p,%x)\n", debugstr_a(SubsystemName), HandleId, GenerateOnClose);
2987
2988     return TRUE;
2989 }
2990
2991 BOOL WINAPI ObjectCloseAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2992 {
2993     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2994
2995     return TRUE;
2996 }
2997
2998 BOOL WINAPI ObjectDeleteAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2999 {
3000     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
3001
3002     return TRUE;
3003 }
3004
3005 BOOL WINAPI ObjectOpenAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, LPSTR ObjectTypeName,
3006   LPSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
3007   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
3008   LPBOOL GenerateOnClose)
3009 {
3010         FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_a(SubsystemName),
3011                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName), pSecurityDescriptor,
3012         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
3013         GenerateOnClose);
3014
3015     return TRUE;
3016 }
3017
3018 BOOL WINAPI ObjectOpenAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, LPWSTR ObjectTypeName,
3019   LPWSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
3020   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
3021   LPBOOL GenerateOnClose)
3022 {
3023     FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_w(SubsystemName),
3024         HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName), pSecurityDescriptor,
3025         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
3026         GenerateOnClose);
3027
3028     return TRUE;
3029 }
3030
3031 BOOL WINAPI ObjectPrivilegeAuditAlarmA( LPCSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
3032   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3033 {
3034     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_a(SubsystemName), HandleId, ClientToken,
3035           DesiredAccess, Privileges, AccessGranted);
3036
3037     return TRUE;
3038 }
3039
3040 BOOL WINAPI ObjectPrivilegeAuditAlarmW( LPCWSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
3041   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3042 {
3043     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_w(SubsystemName), HandleId, ClientToken,
3044           DesiredAccess, Privileges, AccessGranted);
3045
3046     return TRUE;
3047 }
3048
3049 BOOL WINAPI PrivilegedServiceAuditAlarmA( LPCSTR SubsystemName, LPCSTR ServiceName, HANDLE ClientToken,
3050                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3051 {
3052     FIXME("stub (%s,%s,%p,%p,%x)\n", debugstr_a(SubsystemName), debugstr_a(ServiceName),
3053           ClientToken, Privileges, AccessGranted);
3054
3055     return TRUE;
3056 }
3057
3058 BOOL WINAPI PrivilegedServiceAuditAlarmW( LPCWSTR SubsystemName, LPCWSTR ServiceName, HANDLE ClientToken,
3059                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3060 {
3061     FIXME("stub %s,%s,%p,%p,%x)\n", debugstr_w(SubsystemName), debugstr_w(ServiceName),
3062           ClientToken, Privileges, AccessGranted);
3063
3064     return TRUE;
3065 }
3066
3067 /******************************************************************************
3068  * GetSecurityInfo [ADVAPI32.@]
3069  *
3070  * Retrieves a copy of the security descriptor associated with an object.
3071  *
3072  * PARAMS
3073  *  hObject              [I] A handle for the object.
3074  *  ObjectType           [I] The type of object.
3075  *  SecurityInfo         [I] A bitmask indicating what info to retrieve.
3076  *  ppsidOwner           [O] If non-null, receives a pointer to the owner SID.
3077  *  ppsidGroup           [O] If non-null, receives a pointer to the group SID.
3078  *  ppDacl               [O] If non-null, receives a pointer to the DACL.
3079  *  ppSacl               [O] If non-null, receives a pointer to the SACL.
3080  *  ppSecurityDescriptor [O] Receives a pointer to the security descriptor,
3081  *                           which must be freed with LocalFree.
3082  *
3083  * RETURNS
3084  *  ERROR_SUCCESS if all's well, and a WIN32 error code otherwise.
3085  */
3086 DWORD WINAPI GetSecurityInfo(
3087     HANDLE hObject, SE_OBJECT_TYPE ObjectType,
3088     SECURITY_INFORMATION SecurityInfo, PSID *ppsidOwner,
3089     PSID *ppsidGroup, PACL *ppDacl, PACL *ppSacl,
3090     PSECURITY_DESCRIPTOR *ppSecurityDescriptor
3091 )
3092 {
3093     PSECURITY_DESCRIPTOR sd;
3094     NTSTATUS status;
3095     ULONG n1, n2;
3096     BOOL present, defaulted;
3097
3098     status = NtQuerySecurityObject(hObject, SecurityInfo, NULL, 0, &n1);
3099     if (status != STATUS_BUFFER_TOO_SMALL && status != STATUS_SUCCESS)
3100         return RtlNtStatusToDosError(status);
3101
3102     sd = LocalAlloc(0, n1);
3103     if (!sd)
3104         return ERROR_NOT_ENOUGH_MEMORY;
3105
3106     status = NtQuerySecurityObject(hObject, SecurityInfo, sd, n1, &n2);
3107     if (status != STATUS_SUCCESS)
3108     {
3109         LocalFree(sd);
3110         return RtlNtStatusToDosError(status);
3111     }
3112
3113     if (ppsidOwner)
3114     {
3115         *ppsidOwner = NULL;
3116         GetSecurityDescriptorOwner(sd, ppsidOwner, &defaulted);
3117     }
3118     if (ppsidGroup)
3119     {
3120         *ppsidGroup = NULL;
3121         GetSecurityDescriptorGroup(sd, ppsidGroup, &defaulted);
3122     }
3123     if (ppDacl)
3124     {
3125         *ppDacl = NULL;
3126         GetSecurityDescriptorDacl(sd, &present, ppDacl, &defaulted);
3127     }
3128     if (ppSacl)
3129     {
3130         *ppSacl = NULL;
3131         GetSecurityDescriptorSacl(sd, &present, ppSacl, &defaulted);
3132     }
3133     if (ppSecurityDescriptor)
3134         *ppSecurityDescriptor = sd;
3135
3136     /* The security descriptor (sd) cannot be freed if ppSecurityDescriptor is
3137      * NULL, because native happily returns the SIDs and ACLs that are requested
3138      * in this case.
3139      */
3140
3141     return ERROR_SUCCESS;
3142 }
3143
3144 /******************************************************************************
3145  * GetSecurityInfoExA [ADVAPI32.@]
3146  */
3147 DWORD WINAPI GetSecurityInfoExA(
3148         HANDLE hObject, SE_OBJECT_TYPE ObjectType,
3149         SECURITY_INFORMATION SecurityInfo, LPCSTR lpProvider,
3150         LPCSTR lpProperty, PACTRL_ACCESSA *ppAccessList,
3151         PACTRL_AUDITA *ppAuditList, LPSTR *lppOwner, LPSTR *lppGroup
3152 )
3153 {
3154   FIXME("stub!\n");
3155   return ERROR_BAD_PROVIDER;
3156 }
3157
3158 /******************************************************************************
3159  * GetSecurityInfoExW [ADVAPI32.@]
3160  */
3161 DWORD WINAPI GetSecurityInfoExW(
3162         HANDLE hObject, SE_OBJECT_TYPE ObjectType, 
3163         SECURITY_INFORMATION SecurityInfo, LPCWSTR lpProvider,
3164         LPCWSTR lpProperty, PACTRL_ACCESSW *ppAccessList, 
3165         PACTRL_AUDITW *ppAuditList, LPWSTR *lppOwner, LPWSTR *lppGroup
3166 )
3167 {
3168   FIXME("stub!\n");
3169   return ERROR_BAD_PROVIDER; 
3170 }
3171
3172 /******************************************************************************
3173  * BuildExplicitAccessWithNameA [ADVAPI32.@]
3174  */
3175 VOID WINAPI BuildExplicitAccessWithNameA( PEXPLICIT_ACCESSA pExplicitAccess,
3176                                           LPSTR pTrusteeName, DWORD AccessPermissions,
3177                                           ACCESS_MODE AccessMode, DWORD Inheritance )
3178 {
3179     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_a(pTrusteeName),
3180           AccessPermissions, AccessMode, Inheritance);
3181
3182     pExplicitAccess->grfAccessPermissions = AccessPermissions;
3183     pExplicitAccess->grfAccessMode = AccessMode;
3184     pExplicitAccess->grfInheritance = Inheritance;
3185
3186     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
3187     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3188     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
3189     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
3190     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
3191 }
3192
3193 /******************************************************************************
3194  * BuildExplicitAccessWithNameW [ADVAPI32.@]
3195  */
3196 VOID WINAPI BuildExplicitAccessWithNameW( PEXPLICIT_ACCESSW pExplicitAccess,
3197                                           LPWSTR pTrusteeName, DWORD AccessPermissions,
3198                                           ACCESS_MODE AccessMode, DWORD Inheritance )
3199 {
3200     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_w(pTrusteeName),
3201           AccessPermissions, AccessMode, Inheritance);
3202
3203     pExplicitAccess->grfAccessPermissions = AccessPermissions;
3204     pExplicitAccess->grfAccessMode = AccessMode;
3205     pExplicitAccess->grfInheritance = Inheritance;
3206
3207     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
3208     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3209     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
3210     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
3211     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
3212 }
3213
3214 /******************************************************************************
3215  * BuildTrusteeWithObjectsAndNameA [ADVAPI32.@]
3216  */
3217 VOID WINAPI BuildTrusteeWithObjectsAndNameA( PTRUSTEEA pTrustee, POBJECTS_AND_NAME_A pObjName,
3218                                              SE_OBJECT_TYPE ObjectType, LPSTR ObjectTypeName,
3219                                              LPSTR InheritedObjectTypeName, LPSTR Name )
3220 {
3221     DWORD ObjectsPresent = 0;
3222
3223     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
3224           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_a(Name));
3225
3226     /* Fill the OBJECTS_AND_NAME structure */
3227     pObjName->ObjectType = ObjectType;
3228     if (ObjectTypeName != NULL)
3229     {
3230         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3231     }
3232
3233     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
3234     if (InheritedObjectTypeName != NULL)
3235     {
3236         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3237     }
3238
3239     pObjName->ObjectsPresent = ObjectsPresent;
3240     pObjName->ptstrName = Name;
3241
3242     /* Fill the TRUSTEE structure */
3243     pTrustee->pMultipleTrustee = NULL;
3244     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3245     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
3246     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3247     pTrustee->ptstrName = (LPSTR)pObjName;
3248 }
3249
3250 /******************************************************************************
3251  * BuildTrusteeWithObjectsAndNameW [ADVAPI32.@]
3252  */
3253 VOID WINAPI BuildTrusteeWithObjectsAndNameW( PTRUSTEEW pTrustee, POBJECTS_AND_NAME_W pObjName,
3254                                              SE_OBJECT_TYPE ObjectType, LPWSTR ObjectTypeName,
3255                                              LPWSTR InheritedObjectTypeName, LPWSTR Name )
3256 {
3257     DWORD ObjectsPresent = 0;
3258
3259     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
3260           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_w(Name));
3261
3262     /* Fill the OBJECTS_AND_NAME structure */
3263     pObjName->ObjectType = ObjectType;
3264     if (ObjectTypeName != NULL)
3265     {
3266         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3267     }
3268
3269     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
3270     if (InheritedObjectTypeName != NULL)
3271     {
3272         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3273     }
3274
3275     pObjName->ObjectsPresent = ObjectsPresent;
3276     pObjName->ptstrName = Name;
3277
3278     /* Fill the TRUSTEE structure */
3279     pTrustee->pMultipleTrustee = NULL;
3280     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3281     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
3282     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3283     pTrustee->ptstrName = (LPWSTR)pObjName;
3284 }
3285
3286 /******************************************************************************
3287  * BuildTrusteeWithObjectsAndSidA [ADVAPI32.@]
3288  */
3289 VOID WINAPI BuildTrusteeWithObjectsAndSidA( PTRUSTEEA pTrustee, POBJECTS_AND_SID pObjSid,
3290                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
3291 {
3292     DWORD ObjectsPresent = 0;
3293
3294     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
3295
3296     /* Fill the OBJECTS_AND_SID structure */
3297     if (pObjectGuid != NULL)
3298     {
3299         pObjSid->ObjectTypeGuid = *pObjectGuid;
3300         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3301     }
3302     else
3303     {
3304         ZeroMemory(&pObjSid->ObjectTypeGuid,
3305                    sizeof(GUID));
3306     }
3307
3308     if (pInheritedObjectGuid != NULL)
3309     {
3310         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
3311         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3312     }
3313     else
3314     {
3315         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
3316                    sizeof(GUID));
3317     }
3318
3319     pObjSid->ObjectsPresent = ObjectsPresent;
3320     pObjSid->pSid = pSid;
3321
3322     /* Fill the TRUSTEE structure */
3323     pTrustee->pMultipleTrustee = NULL;
3324     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3325     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
3326     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3327     pTrustee->ptstrName = (LPSTR) pObjSid;
3328 }
3329
3330 /******************************************************************************
3331  * BuildTrusteeWithObjectsAndSidW [ADVAPI32.@]
3332  */
3333 VOID WINAPI BuildTrusteeWithObjectsAndSidW( PTRUSTEEW pTrustee, POBJECTS_AND_SID pObjSid,
3334                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
3335 {
3336     DWORD ObjectsPresent = 0;
3337
3338     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
3339
3340     /* Fill the OBJECTS_AND_SID structure */
3341     if (pObjectGuid != NULL)
3342     {
3343         pObjSid->ObjectTypeGuid = *pObjectGuid;
3344         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3345     }
3346     else
3347     {
3348         ZeroMemory(&pObjSid->ObjectTypeGuid,
3349                    sizeof(GUID));
3350     }
3351
3352     if (pInheritedObjectGuid != NULL)
3353     {
3354         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
3355         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3356     }
3357     else
3358     {
3359         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
3360                    sizeof(GUID));
3361     }
3362
3363     pObjSid->ObjectsPresent = ObjectsPresent;
3364     pObjSid->pSid = pSid;
3365
3366     /* Fill the TRUSTEE structure */
3367     pTrustee->pMultipleTrustee = NULL;
3368     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3369     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
3370     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3371     pTrustee->ptstrName = (LPWSTR) pObjSid;
3372 }
3373
3374 /******************************************************************************
3375  * BuildTrusteeWithSidA [ADVAPI32.@]
3376  */
3377 VOID WINAPI BuildTrusteeWithSidA(PTRUSTEEA pTrustee, PSID pSid)
3378 {
3379     TRACE("%p %p\n", pTrustee, pSid);
3380
3381     pTrustee->pMultipleTrustee = NULL;
3382     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3383     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
3384     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3385     pTrustee->ptstrName = pSid;
3386 }
3387
3388 /******************************************************************************
3389  * BuildTrusteeWithSidW [ADVAPI32.@]
3390  */
3391 VOID WINAPI BuildTrusteeWithSidW(PTRUSTEEW pTrustee, PSID pSid)
3392 {
3393     TRACE("%p %p\n", pTrustee, pSid);
3394
3395     pTrustee->pMultipleTrustee = NULL;
3396     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3397     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
3398     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3399     pTrustee->ptstrName = pSid;
3400 }
3401
3402 /******************************************************************************
3403  * BuildTrusteeWithNameA [ADVAPI32.@]
3404  */
3405 VOID WINAPI BuildTrusteeWithNameA(PTRUSTEEA pTrustee, LPSTR name)
3406 {
3407     TRACE("%p %s\n", pTrustee, debugstr_a(name) );
3408
3409     pTrustee->pMultipleTrustee = NULL;
3410     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3411     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
3412     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3413     pTrustee->ptstrName = name;
3414 }
3415
3416 /******************************************************************************
3417  * BuildTrusteeWithNameW [ADVAPI32.@]
3418  */
3419 VOID WINAPI BuildTrusteeWithNameW(PTRUSTEEW pTrustee, LPWSTR name)
3420 {
3421     TRACE("%p %s\n", pTrustee, debugstr_w(name) );
3422
3423     pTrustee->pMultipleTrustee = NULL;
3424     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3425     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
3426     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3427     pTrustee->ptstrName = name;
3428 }
3429
3430 /****************************************************************************** 
3431  * GetTrusteeFormA [ADVAPI32.@] 
3432  */ 
3433 TRUSTEE_FORM WINAPI GetTrusteeFormA(PTRUSTEEA pTrustee) 
3434 {  
3435     TRACE("(%p)\n", pTrustee); 
3436   
3437     if (!pTrustee) 
3438         return TRUSTEE_BAD_FORM; 
3439   
3440     return pTrustee->TrusteeForm; 
3441 }  
3442   
3443 /****************************************************************************** 
3444  * GetTrusteeFormW [ADVAPI32.@] 
3445  */ 
3446 TRUSTEE_FORM WINAPI GetTrusteeFormW(PTRUSTEEW pTrustee) 
3447 {  
3448     TRACE("(%p)\n", pTrustee); 
3449   
3450     if (!pTrustee) 
3451         return TRUSTEE_BAD_FORM; 
3452   
3453     return pTrustee->TrusteeForm; 
3454 }  
3455   
3456 /****************************************************************************** 
3457  * GetTrusteeNameA [ADVAPI32.@] 
3458  */ 
3459 LPSTR WINAPI GetTrusteeNameA(PTRUSTEEA pTrustee) 
3460 {  
3461     TRACE("(%p)\n", pTrustee); 
3462   
3463     if (!pTrustee) 
3464         return NULL; 
3465   
3466     return pTrustee->ptstrName; 
3467 }  
3468   
3469 /****************************************************************************** 
3470  * GetTrusteeNameW [ADVAPI32.@] 
3471  */ 
3472 LPWSTR WINAPI GetTrusteeNameW(PTRUSTEEW pTrustee) 
3473 {  
3474     TRACE("(%p)\n", pTrustee); 
3475   
3476     if (!pTrustee) 
3477         return NULL; 
3478   
3479     return pTrustee->ptstrName; 
3480 }  
3481   
3482 /****************************************************************************** 
3483  * GetTrusteeTypeA [ADVAPI32.@] 
3484  */ 
3485 TRUSTEE_TYPE WINAPI GetTrusteeTypeA(PTRUSTEEA pTrustee) 
3486 {  
3487     TRACE("(%p)\n", pTrustee); 
3488   
3489     if (!pTrustee) 
3490         return TRUSTEE_IS_UNKNOWN; 
3491   
3492     return pTrustee->TrusteeType; 
3493 }  
3494   
3495 /****************************************************************************** 
3496  * GetTrusteeTypeW [ADVAPI32.@] 
3497  */ 
3498 TRUSTEE_TYPE WINAPI GetTrusteeTypeW(PTRUSTEEW pTrustee) 
3499 {  
3500     TRACE("(%p)\n", pTrustee); 
3501   
3502     if (!pTrustee) 
3503         return TRUSTEE_IS_UNKNOWN; 
3504   
3505     return pTrustee->TrusteeType; 
3506
3507  
3508 BOOL WINAPI SetAclInformation( PACL pAcl, LPVOID pAclInformation,
3509                                DWORD nAclInformationLength,
3510                                ACL_INFORMATION_CLASS dwAclInformationClass )
3511 {
3512     FIXME("%p %p 0x%08x 0x%08x - stub\n", pAcl, pAclInformation,
3513           nAclInformationLength, dwAclInformationClass);
3514
3515     return TRUE;
3516 }
3517
3518 /******************************************************************************
3519  * SetEntriesInAclA [ADVAPI32.@]
3520  */
3521 DWORD WINAPI SetEntriesInAclA( ULONG count, PEXPLICIT_ACCESSA pEntries,
3522                                PACL OldAcl, PACL* NewAcl )
3523 {
3524     FIXME("%d %p %p %p\n",count,pEntries,OldAcl,NewAcl);
3525     if (NewAcl)
3526          *NewAcl = NULL;
3527     return ERROR_SUCCESS;
3528 }
3529
3530 /******************************************************************************
3531  * SetEntriesInAclW [ADVAPI32.@]
3532  */
3533 DWORD WINAPI SetEntriesInAclW( ULONG count, PEXPLICIT_ACCESSW pEntries,
3534                                PACL OldAcl, PACL* NewAcl )
3535 {
3536     ULONG i;
3537     PSID *ppsid;
3538     DWORD ret = ERROR_SUCCESS;
3539     DWORD acl_size = sizeof(ACL);
3540     NTSTATUS status;
3541
3542     TRACE("%d %p %p %p\n", count, pEntries, OldAcl, NewAcl);
3543
3544     *NewAcl = NULL;
3545
3546     if (!count && !OldAcl)
3547         return ERROR_SUCCESS;
3548
3549     /* allocate array of maximum sized sids allowed */
3550     ppsid = HeapAlloc(GetProcessHeap(), 0, count * (sizeof(SID *) + FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES])));
3551     if (!ppsid)
3552         return ERROR_OUTOFMEMORY;
3553
3554     for (i = 0; i < count; i++)
3555     {
3556         ppsid[i] = (char *)&ppsid[count] + i * FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3557
3558         TRACE("[%d]:\n\tgrfAccessPermissions = 0x%x\n\tgrfAccessMode = %d\n\tgrfInheritance = 0x%x\n\t"
3559               "Trustee.pMultipleTrustee = %p\n\tMultipleTrusteeOperation = %d\n\tTrusteeForm = %d\n\t"
3560               "Trustee.TrusteeType = %d\n\tptstrName = %p\n", i,
3561               pEntries[i].grfAccessPermissions, pEntries[i].grfAccessMode, pEntries[i].grfInheritance,
3562               pEntries[i].Trustee.pMultipleTrustee, pEntries[i].Trustee.MultipleTrusteeOperation,
3563               pEntries[i].Trustee.TrusteeForm, pEntries[i].Trustee.TrusteeType,
3564               pEntries[i].Trustee.ptstrName);
3565
3566         if (pEntries[i].Trustee.MultipleTrusteeOperation == TRUSTEE_IS_IMPERSONATE)
3567         {
3568             WARN("bad multiple trustee operation %d for trustee %d\n", pEntries[i].Trustee.MultipleTrusteeOperation, i);
3569             ret = ERROR_INVALID_PARAMETER;
3570             goto exit;
3571         }
3572
3573         switch (pEntries[i].Trustee.TrusteeForm)
3574         {
3575         case TRUSTEE_IS_SID:
3576             if (!CopySid(FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]),
3577                          ppsid[i], pEntries[i].Trustee.ptstrName))
3578             {
3579                 WARN("bad sid %p for trustee %d\n", pEntries[i].Trustee.ptstrName, i);
3580                 ret = ERROR_INVALID_PARAMETER;
3581                 goto exit;
3582             }
3583             break;
3584         case TRUSTEE_IS_NAME:
3585         {
3586             DWORD sid_size = FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3587             DWORD domain_size = MAX_COMPUTERNAME_LENGTH + 1;
3588             SID_NAME_USE use;
3589             if (!strcmpW( pEntries[i].Trustee.ptstrName, CURRENT_USER ))
3590             {
3591                 if (!lookup_user_account_name( ppsid[i], &sid_size, NULL, &domain_size, &use ))
3592                 {
3593                     ret = GetLastError();
3594                     goto exit;
3595                 }
3596             }
3597             else if (!LookupAccountNameW(NULL, pEntries[i].Trustee.ptstrName, ppsid[i], &sid_size, NULL, &domain_size, &use))
3598             {
3599                 WARN("bad user name %s for trustee %d\n", debugstr_w(pEntries[i].Trustee.ptstrName), i);
3600                 ret = ERROR_INVALID_PARAMETER;
3601                 goto exit;
3602             }
3603             break;
3604         }
3605         case TRUSTEE_IS_OBJECTS_AND_SID:
3606             FIXME("TRUSTEE_IS_OBJECTS_AND_SID unimplemented\n");
3607             break;
3608         case TRUSTEE_IS_OBJECTS_AND_NAME:
3609             FIXME("TRUSTEE_IS_OBJECTS_AND_NAME unimplemented\n");
3610             break;
3611         default:
3612             WARN("bad trustee form %d for trustee %d\n", pEntries[i].Trustee.TrusteeForm, i);
3613             ret = ERROR_INVALID_PARAMETER;
3614             goto exit;
3615         }
3616
3617         /* Note: we overestimate the ACL size here as a tradeoff between
3618          * instructions (simplicity) and memory */
3619         switch (pEntries[i].grfAccessMode)
3620         {
3621         case GRANT_ACCESS:
3622         case SET_ACCESS:
3623             acl_size += FIELD_OFFSET(ACCESS_ALLOWED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3624             break;
3625         case DENY_ACCESS:
3626             acl_size += FIELD_OFFSET(ACCESS_DENIED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3627             break;
3628         case SET_AUDIT_SUCCESS:
3629         case SET_AUDIT_FAILURE:
3630             acl_size += FIELD_OFFSET(SYSTEM_AUDIT_ACE, SidStart) + GetLengthSid(ppsid[i]);
3631             break;
3632         case REVOKE_ACCESS:
3633             break;
3634         default:
3635             WARN("bad access mode %d for trustee %d\n", pEntries[i].grfAccessMode, i);
3636             ret = ERROR_INVALID_PARAMETER;
3637             goto exit;
3638         }
3639     }
3640
3641     if (OldAcl)
3642     {
3643         ACL_SIZE_INFORMATION size_info;
3644
3645         status = RtlQueryInformationAcl(OldAcl, &size_info, sizeof(size_info), AclSizeInformation);
3646         if (status != STATUS_SUCCESS)
3647         {
3648             ret = RtlNtStatusToDosError(status);
3649             goto exit;
3650         }
3651         acl_size += size_info.AclBytesInUse - sizeof(ACL);
3652     }
3653
3654     *NewAcl = LocalAlloc(0, acl_size);
3655     if (!*NewAcl)
3656     {
3657         ret = ERROR_OUTOFMEMORY;
3658         goto exit;
3659     }
3660
3661     status = RtlCreateAcl( *NewAcl, acl_size, ACL_REVISION );
3662     if (status != STATUS_SUCCESS)
3663     {
3664         ret = RtlNtStatusToDosError(status);
3665         goto exit;
3666     }
3667
3668     for (i = 0; i < count; i++)
3669     {
3670         switch (pEntries[i].grfAccessMode)
3671         {
3672         case GRANT_ACCESS:
3673             status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3674                                               pEntries[i].grfInheritance,
3675                                               pEntries[i].grfAccessPermissions,
3676                                               ppsid[i]);
3677             break;
3678         case SET_ACCESS:
3679         {
3680             ULONG j;
3681             BOOL add = TRUE;
3682             if (OldAcl)
3683             {
3684                 for (j = 0; ; j++)
3685                 {
3686                     const ACE_HEADER *existing_ace_header;
3687                     status = RtlGetAce(OldAcl, j, (LPVOID *)&existing_ace_header);
3688                     if (status != STATUS_SUCCESS)
3689                         break;
3690                     if (pEntries[i].grfAccessMode == SET_ACCESS &&
3691                         existing_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3692                         EqualSid(ppsid[i], &((ACCESS_ALLOWED_ACE *)existing_ace_header)->SidStart))
3693                     {
3694                         add = FALSE;
3695                         break;
3696                     }
3697                 }
3698             }
3699             if (add)
3700                 status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3701                                                   pEntries[i].grfInheritance,
3702                                                   pEntries[i].grfAccessPermissions,
3703                                                   ppsid[i]);
3704             break;
3705         }
3706         case DENY_ACCESS:
3707             status = RtlAddAccessDeniedAceEx(*NewAcl, ACL_REVISION,
3708                                              pEntries[i].grfInheritance,
3709                                              pEntries[i].grfAccessPermissions,
3710                                              ppsid[i]);
3711             break;
3712         case SET_AUDIT_SUCCESS:
3713             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3714                                             pEntries[i].grfInheritance,
3715                                             pEntries[i].grfAccessPermissions,
3716                                             ppsid[i], TRUE, FALSE);
3717             break;
3718         case SET_AUDIT_FAILURE:
3719             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3720                                             pEntries[i].grfInheritance,
3721                                             pEntries[i].grfAccessPermissions,
3722                                             ppsid[i], FALSE, TRUE);
3723             break;
3724         default:
3725             FIXME("unhandled access mode %d\n", pEntries[i].grfAccessMode);
3726         }
3727     }
3728
3729     if (OldAcl)
3730     {
3731         for (i = 0; ; i++)
3732         {
3733             BOOL add = TRUE;
3734             ULONG j;
3735             const ACE_HEADER *old_ace_header;
3736             status = RtlGetAce(OldAcl, i, (LPVOID *)&old_ace_header);
3737             if (status != STATUS_SUCCESS) break;
3738             for (j = 0; j < count; j++)
3739             {
3740                 if (pEntries[j].grfAccessMode == SET_ACCESS &&
3741                     old_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3742                     EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3743                 {
3744                     status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION, pEntries[j].grfInheritance, pEntries[j].grfAccessPermissions, ppsid[j]);
3745                     add = FALSE;
3746                     break;
3747                 }
3748                 else if (pEntries[j].grfAccessMode == REVOKE_ACCESS)
3749                 {
3750                     switch (old_ace_header->AceType)
3751                     {
3752                     case ACCESS_ALLOWED_ACE_TYPE:
3753                         if (EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3754                             add = FALSE;
3755                         break;
3756                     case ACCESS_DENIED_ACE_TYPE:
3757                         if (EqualSid(ppsid[j], &((ACCESS_DENIED_ACE *)old_ace_header)->SidStart))
3758                             add = FALSE;
3759                         break;
3760                     case SYSTEM_AUDIT_ACE_TYPE:
3761                         if (EqualSid(ppsid[j], &((SYSTEM_AUDIT_ACE *)old_ace_header)->SidStart))
3762                             add = FALSE;
3763                         break;
3764                     case SYSTEM_ALARM_ACE_TYPE:
3765                         if (EqualSid(ppsid[j], &((SYSTEM_ALARM_ACE *)old_ace_header)->SidStart))
3766                             add = FALSE;
3767                         break;
3768                     default:
3769                         FIXME("unhandled ace type %d\n", old_ace_header->AceType);
3770                     }
3771
3772                     if (!add)
3773                         break;
3774                 }
3775             }
3776             if (add)
3777                 status = RtlAddAce(*NewAcl, ACL_REVISION, 1, (PACE_HEADER)old_ace_header, old_ace_header->AceSize);
3778             if (status != STATUS_SUCCESS)
3779             {
3780                 WARN("RtlAddAce failed with error 0x%08x\n", status);
3781                 ret = RtlNtStatusToDosError(status);
3782                 break;
3783             }
3784         }
3785     }
3786
3787 exit:
3788     HeapFree(GetProcessHeap(), 0, ppsid);
3789     return ret;
3790 }
3791
3792 /******************************************************************************
3793  * SetNamedSecurityInfoA [ADVAPI32.@]
3794  */
3795 DWORD WINAPI SetNamedSecurityInfoA(LPSTR pObjectName,
3796         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3797         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3798 {
3799     DWORD len;
3800     LPWSTR wstr = NULL;
3801     DWORD r;
3802
3803     TRACE("%s %d %d %p %p %p %p\n", debugstr_a(pObjectName), ObjectType,
3804            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3805
3806     if( pObjectName )
3807     {
3808         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
3809         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
3810         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
3811     }
3812
3813     r = SetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, psidOwner,
3814                            psidGroup, pDacl, pSacl );
3815
3816     HeapFree( GetProcessHeap(), 0, wstr );
3817
3818     return r;
3819 }
3820
3821 BOOL WINAPI SetPrivateObjectSecurity( SECURITY_INFORMATION SecurityInformation,
3822     PSECURITY_DESCRIPTOR ModificationDescriptor,
3823     PSECURITY_DESCRIPTOR* ObjectsSecurityDescriptor,
3824     PGENERIC_MAPPING GenericMapping,
3825     HANDLE Token )
3826 {
3827     FIXME("0x%08x %p %p %p %p - stub\n", SecurityInformation, ModificationDescriptor,
3828           ObjectsSecurityDescriptor, GenericMapping, Token);
3829
3830     return TRUE;
3831 }
3832
3833 BOOL WINAPI AreAllAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3834 {
3835     return RtlAreAllAccessesGranted( GrantedAccess, DesiredAccess );
3836 }
3837
3838 /******************************************************************************
3839  * AreAnyAccessesGranted [ADVAPI32.@]
3840  *
3841  * Determines whether or not any of a set of specified access permissions have
3842  * been granted or not.
3843  *
3844  * PARAMS
3845  *   GrantedAccess [I] The permissions that have been granted.
3846  *   DesiredAccess [I] The permissions that you want to have.
3847  *
3848  * RETURNS
3849  *   Nonzero if any of the permissions have been granted, zero if none of the
3850  *   permissions have been granted.
3851  */
3852
3853 BOOL WINAPI AreAnyAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3854 {
3855     return RtlAreAnyAccessesGranted( GrantedAccess, DesiredAccess );
3856 }
3857
3858 /******************************************************************************
3859  * SetNamedSecurityInfoW [ADVAPI32.@]
3860  */
3861 DWORD WINAPI SetNamedSecurityInfoW(LPWSTR pObjectName,
3862         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3863         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3864 {
3865     FIXME("%s %d %d %p %p %p %p\n", debugstr_w(pObjectName), ObjectType,
3866            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3867     return ERROR_SUCCESS;
3868 }
3869
3870 /******************************************************************************
3871  * GetExplicitEntriesFromAclA [ADVAPI32.@]
3872  */
3873 DWORD WINAPI GetExplicitEntriesFromAclA( PACL pacl, PULONG pcCountOfExplicitEntries,
3874         PEXPLICIT_ACCESSA* pListOfExplicitEntries)
3875 {
3876     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3877     return ERROR_CALL_NOT_IMPLEMENTED;
3878 }
3879
3880 /******************************************************************************
3881  * GetExplicitEntriesFromAclW [ADVAPI32.@]
3882  */
3883 DWORD WINAPI GetExplicitEntriesFromAclW( PACL pacl, PULONG pcCountOfExplicitEntries,
3884         PEXPLICIT_ACCESSW* pListOfExplicitEntries)
3885 {
3886     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3887     return ERROR_CALL_NOT_IMPLEMENTED;
3888 }
3889
3890 /******************************************************************************
3891  * GetAuditedPermissionsFromAclA [ADVAPI32.@]
3892  */
3893 DWORD WINAPI GetAuditedPermissionsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3894         PACCESS_MASK pFailedAuditRights)
3895 {
3896     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3897     return ERROR_CALL_NOT_IMPLEMENTED;
3898
3899 }
3900
3901 /******************************************************************************
3902  * GetAuditedPermissionsFromAclW [ADVAPI32.@]
3903  */
3904 DWORD WINAPI GetAuditedPermissionsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3905         PACCESS_MASK pFailedAuditRights)
3906 {
3907     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3908     return ERROR_CALL_NOT_IMPLEMENTED;
3909
3910 }
3911
3912 /******************************************************************************
3913  * ParseAclStringFlags
3914  */
3915 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl)
3916 {
3917     DWORD flags = 0;
3918     LPCWSTR szAcl = *StringAcl;
3919
3920     while (*szAcl != '(')
3921     {
3922         if (*szAcl == 'P')
3923         {
3924             flags |= SE_DACL_PROTECTED;
3925         }
3926         else if (*szAcl == 'A')
3927         {
3928             szAcl++;
3929             if (*szAcl == 'R')
3930                 flags |= SE_DACL_AUTO_INHERIT_REQ;
3931             else if (*szAcl == 'I')
3932                 flags |= SE_DACL_AUTO_INHERITED;
3933         }
3934         szAcl++;
3935     }
3936
3937     *StringAcl = szAcl;
3938     return flags;
3939 }
3940
3941 /******************************************************************************
3942  * ParseAceStringType
3943  */
3944 static const ACEFLAG AceType[] =
3945 {
3946     { SDDL_ALARM,          SYSTEM_ALARM_ACE_TYPE },
3947     { SDDL_AUDIT,          SYSTEM_AUDIT_ACE_TYPE },
3948     { SDDL_ACCESS_ALLOWED, ACCESS_ALLOWED_ACE_TYPE },
3949     { SDDL_ACCESS_DENIED,  ACCESS_DENIED_ACE_TYPE },
3950     /*
3951     { SDDL_OBJECT_ACCESS_ALLOWED, ACCESS_ALLOWED_OBJECT_ACE_TYPE },
3952     { SDDL_OBJECT_ACCESS_DENIED,  ACCESS_DENIED_OBJECT_ACE_TYPE },
3953     { SDDL_OBJECT_ALARM,          SYSTEM_ALARM_OBJECT_ACE_TYPE },
3954     { SDDL_OBJECT_AUDIT,          SYSTEM_AUDIT_OBJECT_ACE_TYPE },
3955     */
3956     { NULL, 0 },
3957 };
3958
3959 static BYTE ParseAceStringType(LPCWSTR* StringAcl)
3960 {
3961     UINT len = 0;
3962     LPCWSTR szAcl = *StringAcl;
3963     const ACEFLAG *lpaf = AceType;
3964
3965     while (*szAcl == ' ')
3966         szAcl++;
3967
3968     while (lpaf->wstr &&
3969         (len = strlenW(lpaf->wstr)) &&
3970         strncmpW(lpaf->wstr, szAcl, len))
3971         lpaf++;
3972
3973     if (!lpaf->wstr)
3974         return 0;
3975
3976     *StringAcl = szAcl + len;
3977     return lpaf->value;
3978 }
3979
3980
3981 /******************************************************************************
3982  * ParseAceStringFlags
3983  */
3984 static const ACEFLAG AceFlags[] =
3985 {
3986     { SDDL_CONTAINER_INHERIT, CONTAINER_INHERIT_ACE },
3987     { SDDL_AUDIT_FAILURE,     FAILED_ACCESS_ACE_FLAG },
3988     { SDDL_INHERITED,         INHERITED_ACE },
3989     { SDDL_INHERIT_ONLY,      INHERIT_ONLY_ACE },
3990     { SDDL_NO_PROPAGATE,      NO_PROPAGATE_INHERIT_ACE },
3991     { SDDL_OBJECT_INHERIT,    OBJECT_INHERIT_ACE },
3992     { SDDL_AUDIT_SUCCESS,     SUCCESSFUL_ACCESS_ACE_FLAG },
3993     { NULL, 0 },
3994 };
3995
3996 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl)
3997 {
3998     UINT len = 0;
3999     BYTE flags = 0;
4000     LPCWSTR szAcl = *StringAcl;
4001
4002     while (*szAcl == ' ')
4003         szAcl++;
4004
4005     while (*szAcl != ';')
4006     {
4007         const ACEFLAG *lpaf = AceFlags;
4008
4009         while (lpaf->wstr &&
4010                (len = strlenW(lpaf->wstr)) &&
4011                strncmpW(lpaf->wstr, szAcl, len))
4012             lpaf++;
4013
4014         if (!lpaf->wstr)
4015             return 0;
4016
4017         flags |= lpaf->value;
4018         szAcl += len;
4019     }
4020
4021     *StringAcl = szAcl;
4022     return flags;
4023 }
4024
4025
4026 /******************************************************************************
4027  * ParseAceStringRights
4028  */
4029 static const ACEFLAG AceRights[] =
4030 {
4031     { SDDL_GENERIC_ALL,     GENERIC_ALL },
4032     { SDDL_GENERIC_READ,    GENERIC_READ },
4033     { SDDL_GENERIC_WRITE,   GENERIC_WRITE },
4034     { SDDL_GENERIC_EXECUTE, GENERIC_EXECUTE },
4035
4036     { SDDL_READ_CONTROL,    READ_CONTROL },
4037     { SDDL_STANDARD_DELETE, DELETE },
4038     { SDDL_WRITE_DAC,       WRITE_DAC },
4039     { SDDL_WRITE_OWNER,     WRITE_OWNER },
4040
4041     { SDDL_READ_PROPERTY,   ADS_RIGHT_DS_READ_PROP},
4042     { SDDL_WRITE_PROPERTY,  ADS_RIGHT_DS_WRITE_PROP},
4043     { SDDL_CREATE_CHILD,    ADS_RIGHT_DS_CREATE_CHILD},
4044     { SDDL_DELETE_CHILD,    ADS_RIGHT_DS_DELETE_CHILD},
4045     { SDDL_LIST_CHILDREN,   ADS_RIGHT_ACTRL_DS_LIST},
4046     { SDDL_SELF_WRITE,      ADS_RIGHT_DS_SELF},
4047     { SDDL_LIST_OBJECT,     ADS_RIGHT_DS_LIST_OBJECT},
4048     { SDDL_DELETE_TREE,     ADS_RIGHT_DS_DELETE_TREE},
4049     { SDDL_CONTROL_ACCESS,  ADS_RIGHT_DS_CONTROL_ACCESS},
4050
4051     { SDDL_FILE_ALL,        FILE_ALL_ACCESS },
4052     { SDDL_FILE_READ,       FILE_GENERIC_READ },
4053     { SDDL_FILE_WRITE,      FILE_GENERIC_WRITE },
4054     { SDDL_FILE_EXECUTE,    FILE_GENERIC_EXECUTE },
4055
4056     { SDDL_KEY_ALL,         KEY_ALL_ACCESS },
4057     { SDDL_KEY_READ,        KEY_READ },
4058     { SDDL_KEY_WRITE,       KEY_WRITE },
4059     { SDDL_KEY_EXECUTE,     KEY_EXECUTE },
4060     { NULL, 0 },
4061 };
4062
4063 static DWORD ParseAceStringRights(LPCWSTR* StringAcl)
4064 {
4065     UINT len = 0;
4066     DWORD rights = 0;
4067     LPCWSTR szAcl = *StringAcl;
4068
4069     while (*szAcl == ' ')
4070         szAcl++;
4071
4072     if ((*szAcl == '0') && (*(szAcl + 1) == 'x'))
4073     {
4074         LPCWSTR p = szAcl;
4075
4076         while (*p && *p != ';')
4077             p++;
4078
4079         if (p - szAcl <= 10 /* 8 hex digits + "0x" */ )
4080         {
4081             rights = strtoulW(szAcl, NULL, 16);
4082             szAcl = p;
4083         }
4084         else
4085             WARN("Invalid rights string format: %s\n", debugstr_wn(szAcl, p - szAcl));
4086     }
4087     else
4088     {
4089         while (*szAcl != ';')
4090         {
4091             const ACEFLAG *lpaf = AceRights;
4092
4093             while (lpaf->wstr &&
4094                (len = strlenW(lpaf->wstr)) &&
4095                strncmpW(lpaf->wstr, szAcl, len))
4096             {
4097                lpaf++;
4098             }
4099
4100             if (!lpaf->wstr)
4101                 return 0;
4102
4103             rights |= lpaf->value;
4104             szAcl += len;
4105         }
4106     }
4107
4108     *StringAcl = szAcl;
4109     return rights;
4110 }
4111
4112
4113 /******************************************************************************
4114  * ParseStringAclToAcl
4115  * 
4116  * dacl_flags(string_ace1)(string_ace2)... (string_acen) 
4117  */
4118 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
4119     PACL pAcl, LPDWORD cBytes)
4120 {
4121     DWORD val;
4122     DWORD sidlen;
4123     DWORD length = sizeof(ACL);
4124     DWORD acesize = 0;
4125     DWORD acecount = 0;
4126     PACCESS_ALLOWED_ACE pAce = NULL; /* pointer to current ACE */
4127     DWORD error = ERROR_INVALID_ACL;
4128
4129     TRACE("%s\n", debugstr_w(StringAcl));
4130
4131     if (!StringAcl)
4132         return FALSE;
4133
4134     if (pAcl) /* pAce is only useful if we're setting values */
4135         pAce = (PACCESS_ALLOWED_ACE) (pAcl + 1);
4136
4137     /* Parse ACL flags */
4138     *lpdwFlags = ParseAclStringFlags(&StringAcl);
4139
4140     /* Parse ACE */
4141     while (*StringAcl == '(')
4142     {
4143         StringAcl++;
4144
4145         /* Parse ACE type */
4146         val = ParseAceStringType(&StringAcl);
4147         if (pAce)
4148             pAce->Header.AceType = (BYTE) val;
4149         if (*StringAcl != ';')
4150         {
4151             error = RPC_S_INVALID_STRING_UUID;
4152             goto lerr;
4153         }
4154         StringAcl++;
4155
4156         /* Parse ACE flags */
4157         val = ParseAceStringFlags(&StringAcl);
4158         if (pAce)
4159             pAce->Header.AceFlags = (BYTE) val;
4160         if (*StringAcl != ';')
4161             goto lerr;
4162         StringAcl++;
4163
4164         /* Parse ACE rights */
4165         val = ParseAceStringRights(&StringAcl);
4166         if (pAce)
4167             pAce->Mask = val;
4168         if (*StringAcl != ';')
4169             goto lerr;
4170         StringAcl++;
4171
4172         /* Parse ACE object guid */
4173         while (*StringAcl == ' ')
4174             StringAcl++;
4175         if (*StringAcl != ';')
4176         {
4177             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
4178             goto lerr;
4179         }
4180         StringAcl++;
4181
4182         /* Parse ACE inherit object guid */
4183         while (*StringAcl == ' ')
4184             StringAcl++;
4185         if (*StringAcl != ';')
4186         {
4187             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
4188             goto lerr;
4189         }
4190         StringAcl++;
4191
4192         /* Parse ACE account sid */
4193         if (ParseStringSidToSid(StringAcl, pAce ? &pAce->SidStart : NULL, &sidlen))
4194         {
4195             while (*StringAcl && *StringAcl != ')')
4196                 StringAcl++;
4197         }
4198
4199         if (*StringAcl != ')')
4200             goto lerr;
4201         StringAcl++;
4202
4203         acesize = sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD) + sidlen;
4204         length += acesize;
4205         if (pAce)
4206         {
4207             pAce->Header.AceSize = acesize;
4208             pAce = (PACCESS_ALLOWED_ACE)((LPBYTE)pAce + acesize);
4209         }
4210         acecount++;
4211     }
4212
4213     *cBytes = length;
4214
4215     if (length > 0xffff)
4216     {
4217         ERR("ACL too large\n");
4218         goto lerr;
4219     }
4220
4221     if (pAcl)
4222     {
4223         pAcl->AclRevision = ACL_REVISION;
4224         pAcl->Sbz1 = 0;
4225         pAcl->AclSize = length;
4226         pAcl->AceCount = acecount++;
4227         pAcl->Sbz2 = 0;
4228     }
4229     return TRUE;
4230
4231 lerr:
4232     SetLastError(error);
4233     WARN("Invalid ACE string format\n");
4234     return FALSE;
4235 }
4236
4237
4238 /******************************************************************************
4239  * ParseStringSecurityDescriptorToSecurityDescriptor
4240  */
4241 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
4242     LPCWSTR StringSecurityDescriptor,
4243     SECURITY_DESCRIPTOR_RELATIVE* SecurityDescriptor,
4244     LPDWORD cBytes)
4245 {
4246     BOOL bret = FALSE;
4247     WCHAR toktype;
4248     WCHAR tok[MAX_PATH];
4249     LPCWSTR lptoken;
4250     LPBYTE lpNext = NULL;
4251     DWORD len;
4252
4253     *cBytes = sizeof(SECURITY_DESCRIPTOR);
4254
4255     if (SecurityDescriptor)
4256         lpNext = (LPBYTE)(SecurityDescriptor + 1);
4257
4258     while (*StringSecurityDescriptor == ' ')
4259         StringSecurityDescriptor++;
4260
4261     while (*StringSecurityDescriptor)
4262     {
4263         toktype = *StringSecurityDescriptor;
4264
4265         /* Expect char identifier followed by ':' */
4266         StringSecurityDescriptor++;
4267         if (*StringSecurityDescriptor != ':')
4268         {
4269             SetLastError(ERROR_INVALID_PARAMETER);
4270             goto lend;
4271         }
4272         StringSecurityDescriptor++;
4273
4274         /* Extract token */
4275         lptoken = StringSecurityDescriptor;
4276         while (*lptoken && *lptoken != ':')
4277             lptoken++;
4278
4279         if (*lptoken)
4280             lptoken--;
4281
4282         len = lptoken - StringSecurityDescriptor;
4283         memcpy( tok, StringSecurityDescriptor, len * sizeof(WCHAR) );
4284         tok[len] = 0;
4285
4286         switch (toktype)
4287         {
4288             case 'O':
4289             {
4290                 DWORD bytes;
4291
4292                 if (!ParseStringSidToSid(tok, lpNext, &bytes))
4293                     goto lend;
4294
4295                 if (SecurityDescriptor)
4296                 {
4297                     SecurityDescriptor->Owner = lpNext - (LPBYTE)SecurityDescriptor;
4298                     lpNext += bytes; /* Advance to next token */
4299                 }
4300
4301                 *cBytes += bytes;
4302
4303                 break;
4304             }
4305
4306             case 'G':
4307             {
4308                 DWORD bytes;
4309
4310                 if (!ParseStringSidToSid(tok, lpNext, &bytes))
4311                     goto lend;
4312
4313                 if (SecurityDescriptor)
4314                 {
4315                     SecurityDescriptor->Group = lpNext - (LPBYTE)SecurityDescriptor;
4316                     lpNext += bytes; /* Advance to next token */
4317                 }
4318
4319                 *cBytes += bytes;
4320
4321                 break;
4322             }
4323
4324             case 'D':
4325             {
4326                 DWORD flags;
4327                 DWORD bytes;
4328
4329                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
4330                     goto lend;
4331
4332                 if (SecurityDescriptor)
4333                 {
4334                     SecurityDescriptor->Control |= SE_DACL_PRESENT | flags;
4335                     SecurityDescriptor->Dacl = lpNext - (LPBYTE)SecurityDescriptor;
4336                     lpNext += bytes; /* Advance to next token */
4337                 }
4338
4339                 *cBytes += bytes;
4340
4341                 break;
4342             }
4343
4344             case 'S':
4345             {
4346                 DWORD flags;
4347                 DWORD bytes;
4348
4349                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
4350                     goto lend;
4351
4352                 if (SecurityDescriptor)
4353                 {
4354                     SecurityDescriptor->Control |= SE_SACL_PRESENT | flags;
4355                     SecurityDescriptor->Sacl = lpNext - (LPBYTE)SecurityDescriptor;
4356                     lpNext += bytes; /* Advance to next token */
4357                 }
4358
4359                 *cBytes += bytes;
4360
4361                 break;
4362             }
4363
4364             default:
4365                 FIXME("Unknown token\n");
4366                 SetLastError(ERROR_INVALID_PARAMETER);
4367                 goto lend;
4368         }
4369
4370         StringSecurityDescriptor = lptoken;
4371     }
4372
4373     bret = TRUE;
4374
4375 lend:
4376     return bret;
4377 }
4378
4379 /******************************************************************************
4380  * ConvertStringSecurityDescriptorToSecurityDescriptorA [ADVAPI32.@]
4381  */
4382 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorA(
4383         LPCSTR StringSecurityDescriptor,
4384         DWORD StringSDRevision,
4385         PSECURITY_DESCRIPTOR* SecurityDescriptor,
4386         PULONG SecurityDescriptorSize)
4387 {
4388     UINT len;
4389     BOOL ret = FALSE;
4390     LPWSTR StringSecurityDescriptorW;
4391
4392     len = MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, NULL, 0);
4393     StringSecurityDescriptorW = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
4394
4395     if (StringSecurityDescriptorW)
4396     {
4397         MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, StringSecurityDescriptorW, len);
4398
4399         ret = ConvertStringSecurityDescriptorToSecurityDescriptorW(StringSecurityDescriptorW,
4400                                                                    StringSDRevision, SecurityDescriptor,
4401                                                                    SecurityDescriptorSize);
4402         HeapFree(GetProcessHeap(), 0, StringSecurityDescriptorW);
4403     }
4404
4405     return ret;
4406 }
4407
4408 /******************************************************************************
4409  * ConvertStringSecurityDescriptorToSecurityDescriptorW [ADVAPI32.@]
4410  */
4411 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorW(
4412         LPCWSTR StringSecurityDescriptor,
4413         DWORD StringSDRevision,
4414         PSECURITY_DESCRIPTOR* SecurityDescriptor,
4415         PULONG SecurityDescriptorSize)
4416 {
4417     DWORD cBytes;
4418     SECURITY_DESCRIPTOR* psd;
4419     BOOL bret = FALSE;
4420
4421     TRACE("%s\n", debugstr_w(StringSecurityDescriptor));
4422
4423     if (GetVersion() & 0x80000000)
4424     {
4425         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4426         goto lend;
4427     }
4428     else if (!StringSecurityDescriptor || !SecurityDescriptor)
4429     {
4430         SetLastError(ERROR_INVALID_PARAMETER);
4431         goto lend;
4432     }
4433     else if (StringSDRevision != SID_REVISION)
4434     {
4435         SetLastError(ERROR_UNKNOWN_REVISION);
4436         goto lend;
4437     }
4438
4439     /* Compute security descriptor length */
4440     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
4441         NULL, &cBytes))
4442         goto lend;
4443
4444     psd = *SecurityDescriptor = LocalAlloc(GMEM_ZEROINIT, cBytes);
4445     if (!psd) goto lend;
4446
4447     psd->Revision = SID_REVISION;
4448     psd->Control |= SE_SELF_RELATIVE;
4449
4450     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
4451              (SECURITY_DESCRIPTOR_RELATIVE *)psd, &cBytes))
4452     {
4453         LocalFree(psd);
4454         goto lend;
4455     }
4456
4457     if (SecurityDescriptorSize)
4458         *SecurityDescriptorSize = cBytes;
4459
4460     bret = TRUE;
4461  
4462 lend:
4463     TRACE(" ret=%d\n", bret);
4464     return bret;
4465 }
4466
4467 static void DumpString(LPCWSTR string, int cch, WCHAR **pwptr, ULONG *plen)
4468 {
4469     if (cch == -1)
4470         cch = strlenW(string);
4471
4472     if (plen)
4473         *plen += cch;
4474
4475     if (pwptr)
4476     {
4477         memcpy(*pwptr, string, sizeof(WCHAR)*cch);
4478         *pwptr += cch;
4479     }
4480 }
4481
4482 static BOOL DumpSidNumeric(PSID psid, WCHAR **pwptr, ULONG *plen)
4483 {
4484     DWORD i;
4485     WCHAR fmt[] = { 'S','-','%','u','-','%','d',0 };
4486     WCHAR subauthfmt[] = { '-','%','u',0 };
4487     WCHAR buf[26];
4488     SID *pisid = psid;
4489
4490     if( !IsValidSid( psid ) || pisid->Revision != SDDL_REVISION)
4491     {
4492         SetLastError(ERROR_INVALID_SID);
4493         return FALSE;
4494     }
4495
4496     if (pisid->IdentifierAuthority.Value[0] ||
4497      pisid->IdentifierAuthority.Value[1])
4498     {
4499         FIXME("not matching MS' bugs\n");
4500         SetLastError(ERROR_INVALID_SID);
4501         return FALSE;
4502     }
4503
4504     sprintfW( buf, fmt, pisid->Revision,
4505         MAKELONG(
4506             MAKEWORD( pisid->IdentifierAuthority.Value[5],
4507                     pisid->IdentifierAuthority.Value[4] ),
4508             MAKEWORD( pisid->IdentifierAuthority.Value[3],
4509                     pisid->IdentifierAuthority.Value[2] )
4510         ) );
4511     DumpString(buf, -1, pwptr, plen);
4512
4513     for( i=0; i<pisid->SubAuthorityCount; i++ )
4514     {
4515         sprintfW( buf, subauthfmt, pisid->SubAuthority[i] );
4516         DumpString(buf, -1, pwptr, plen);
4517     }
4518     return TRUE;
4519 }
4520
4521 static BOOL DumpSid(PSID psid, WCHAR **pwptr, ULONG *plen)
4522 {
4523     size_t i;
4524     for (i = 0; i < sizeof(WellKnownSids) / sizeof(WellKnownSids[0]); i++)
4525     {
4526         if (WellKnownSids[i].wstr[0] && EqualSid(psid, (PSID)&(WellKnownSids[i].Sid.Revision)))
4527         {
4528             DumpString(WellKnownSids[i].wstr, 2, pwptr, plen);
4529             return TRUE;
4530         }
4531     }
4532
4533     return DumpSidNumeric(psid, pwptr, plen);
4534 }
4535
4536 static const LPCWSTR AceRightBitNames[32] = {
4537         SDDL_CREATE_CHILD,        /*  0 */
4538         SDDL_DELETE_CHILD,
4539         SDDL_LIST_CHILDREN,
4540         SDDL_SELF_WRITE,
4541         SDDL_READ_PROPERTY,       /*  4 */
4542         SDDL_WRITE_PROPERTY,
4543         SDDL_DELETE_TREE,
4544         SDDL_LIST_OBJECT,
4545         SDDL_CONTROL_ACCESS,      /*  8 */
4546         NULL,
4547         NULL,
4548         NULL,
4549         NULL,                     /* 12 */
4550         NULL,
4551         NULL,
4552         NULL,
4553         SDDL_STANDARD_DELETE,     /* 16 */
4554         SDDL_READ_CONTROL,
4555         SDDL_WRITE_DAC,
4556         SDDL_WRITE_OWNER,
4557         NULL,                     /* 20 */
4558         NULL,
4559         NULL,
4560         NULL,
4561         NULL,                     /* 24 */
4562         NULL,
4563         NULL,
4564         NULL,
4565         SDDL_GENERIC_ALL,         /* 28 */
4566         SDDL_GENERIC_EXECUTE,
4567         SDDL_GENERIC_WRITE,
4568         SDDL_GENERIC_READ
4569 };
4570
4571 static void DumpRights(DWORD mask, WCHAR **pwptr, ULONG *plen)
4572 {
4573     static const WCHAR fmtW[] = {'0','x','%','x',0};
4574     WCHAR buf[15];
4575     size_t i;
4576
4577     if (mask == 0)
4578         return;
4579
4580     /* first check if the right have name */
4581     for (i = 0; i < sizeof(AceRights)/sizeof(AceRights[0]); i++)
4582     {
4583         if (AceRights[i].wstr == NULL)
4584             break;
4585         if (mask == AceRights[i].value)
4586         {
4587             DumpString(AceRights[i].wstr, -1, pwptr, plen);
4588             return;
4589         }
4590     }
4591
4592     /* then check if it can be built from bit names */
4593     for (i = 0; i < 32; i++)
4594     {
4595         if ((mask & (1 << i)) && (AceRightBitNames[i] == NULL))
4596         {
4597             /* can't be built from bit names */
4598             sprintfW(buf, fmtW, mask);
4599             DumpString(buf, -1, pwptr, plen);
4600             return;
4601         }
4602     }
4603
4604     /* build from bit names */
4605     for (i = 0; i < 32; i++)
4606         if (mask & (1 << i))
4607             DumpString(AceRightBitNames[i], -1, pwptr, plen);
4608 }
4609
4610 static BOOL DumpAce(LPVOID pace, WCHAR **pwptr, ULONG *plen)
4611 {
4612     ACCESS_ALLOWED_ACE *piace; /* all the supported ACEs have the same memory layout */
4613     static const WCHAR openbr = '(';
4614     static const WCHAR closebr = ')';
4615     static const WCHAR semicolon = ';';
4616
4617     if (((PACE_HEADER)pace)->AceType > SYSTEM_ALARM_ACE_TYPE || ((PACE_HEADER)pace)->AceSize < sizeof(ACCESS_ALLOWED_ACE))
4618     {
4619         SetLastError(ERROR_INVALID_ACL);
4620         return FALSE;
4621     }
4622
4623     piace = pace;
4624     DumpString(&openbr, 1, pwptr, plen);
4625     switch (piace->Header.AceType)
4626     {
4627         case ACCESS_ALLOWED_ACE_TYPE:
4628             DumpString(SDDL_ACCESS_ALLOWED, -1, pwptr, plen);
4629             break;
4630         case ACCESS_DENIED_ACE_TYPE:
4631             DumpString(SDDL_ACCESS_DENIED, -1, pwptr, plen);
4632             break;
4633         case SYSTEM_AUDIT_ACE_TYPE:
4634             DumpString(SDDL_AUDIT, -1, pwptr, plen);
4635             break;
4636         case SYSTEM_ALARM_ACE_TYPE:
4637             DumpString(SDDL_ALARM, -1, pwptr, plen);
4638             break;
4639     }
4640     DumpString(&semicolon, 1, pwptr, plen);
4641
4642     if (piace->Header.AceFlags & OBJECT_INHERIT_ACE)
4643         DumpString(SDDL_OBJECT_INHERIT, -1, pwptr, plen);
4644     if (piace->Header.AceFlags & CONTAINER_INHERIT_ACE)
4645         DumpString(SDDL_CONTAINER_INHERIT, -1, pwptr, plen);
4646     if (piace->Header.AceFlags & NO_PROPAGATE_INHERIT_ACE)
4647         DumpString(SDDL_NO_PROPAGATE, -1, pwptr, plen);
4648     if (piace->Header.AceFlags & INHERIT_ONLY_ACE)
4649         DumpString(SDDL_INHERIT_ONLY, -1, pwptr, plen);
4650     if (piace->Header.AceFlags & INHERITED_ACE)
4651         DumpString(SDDL_INHERITED, -1, pwptr, plen);
4652     if (piace->Header.AceFlags & SUCCESSFUL_ACCESS_ACE_FLAG)
4653         DumpString(SDDL_AUDIT_SUCCESS, -1, pwptr, plen);
4654     if (piace->Header.AceFlags & FAILED_ACCESS_ACE_FLAG)
4655         DumpString(SDDL_AUDIT_FAILURE, -1, pwptr, plen);
4656     DumpString(&semicolon, 1, pwptr, plen);
4657     DumpRights(piace->Mask, pwptr, plen);
4658     DumpString(&semicolon, 1, pwptr, plen);
4659     /* objects not supported */
4660     DumpString(&semicolon, 1, pwptr, plen);
4661     /* objects not supported */
4662     DumpString(&semicolon, 1, pwptr, plen);
4663     if (!DumpSid(&piace->SidStart, pwptr, plen))
4664         return FALSE;
4665     DumpString(&closebr, 1, pwptr, plen);
4666     return TRUE;
4667 }
4668
4669 static BOOL DumpAcl(PACL pacl, WCHAR **pwptr, ULONG *plen, BOOL protected, BOOL autoInheritReq, BOOL autoInherited)
4670 {
4671     WORD count;
4672     int i;
4673
4674     if (protected)
4675         DumpString(SDDL_PROTECTED, -1, pwptr, plen);
4676     if (autoInheritReq)
4677         DumpString(SDDL_AUTO_INHERIT_REQ, -1, pwptr, plen);
4678     if (autoInherited)
4679         DumpString(SDDL_AUTO_INHERITED, -1, pwptr, plen);
4680
4681     if (pacl == NULL)
4682         return TRUE;
4683
4684     if (!IsValidAcl(pacl))
4685         return FALSE;
4686
4687     count = pacl->AceCount;
4688     for (i = 0; i < count; i++)
4689     {
4690         LPVOID ace;
4691         if (!GetAce(pacl, i, &ace))
4692             return FALSE;
4693         if (!DumpAce(ace, pwptr, plen))
4694             return FALSE;
4695     }
4696
4697     return TRUE;
4698 }
4699
4700 static BOOL DumpOwner(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4701 {
4702     static const WCHAR prefix[] = {'O',':',0};
4703     BOOL bDefaulted;
4704     PSID psid;
4705
4706     if (!GetSecurityDescriptorOwner(SecurityDescriptor, &psid, &bDefaulted))
4707         return FALSE;
4708
4709     if (psid == NULL)
4710         return TRUE;
4711
4712     DumpString(prefix, -1, pwptr, plen);
4713     if (!DumpSid(psid, pwptr, plen))
4714         return FALSE;
4715     return TRUE;
4716 }
4717
4718 static BOOL DumpGroup(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4719 {
4720     static const WCHAR prefix[] = {'G',':',0};
4721     BOOL bDefaulted;
4722     PSID psid;
4723
4724     if (!GetSecurityDescriptorGroup(SecurityDescriptor, &psid, &bDefaulted))
4725         return FALSE;
4726
4727     if (psid == NULL)
4728         return TRUE;
4729
4730     DumpString(prefix, -1, pwptr, plen);
4731     if (!DumpSid(psid, pwptr, plen))
4732         return FALSE;
4733     return TRUE;
4734 }
4735
4736 static BOOL DumpDacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4737 {
4738     static const WCHAR dacl[] = {'D',':',0};
4739     SECURITY_DESCRIPTOR_CONTROL control;
4740     BOOL present, defaulted;
4741     DWORD revision;
4742     PACL pacl;
4743
4744     if (!GetSecurityDescriptorDacl(SecurityDescriptor, &present, &pacl, &defaulted))
4745         return FALSE;
4746
4747     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4748         return FALSE;
4749
4750     if (!present)
4751         return TRUE;
4752
4753     DumpString(dacl, 2, pwptr, plen);
4754     if (!DumpAcl(pacl, pwptr, plen, control & SE_DACL_PROTECTED, control & SE_DACL_AUTO_INHERIT_REQ, control & SE_DACL_AUTO_INHERITED))
4755         return FALSE;
4756     return TRUE;
4757 }
4758
4759 static BOOL DumpSacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4760 {
4761     static const WCHAR sacl[] = {'S',':',0};
4762     SECURITY_DESCRIPTOR_CONTROL control;
4763     BOOL present, defaulted;
4764     DWORD revision;
4765     PACL pacl;
4766
4767     if (!GetSecurityDescriptorSacl(SecurityDescriptor, &present, &pacl, &defaulted))
4768         return FALSE;
4769
4770     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4771         return FALSE;
4772
4773     if (!present)
4774         return TRUE;
4775
4776     DumpString(sacl, 2, pwptr, plen);
4777     if (!DumpAcl(pacl, pwptr, plen, control & SE_SACL_PROTECTED, control & SE_SACL_AUTO_INHERIT_REQ, control & SE_SACL_AUTO_INHERITED))
4778         return FALSE;
4779     return TRUE;
4780 }
4781
4782 /******************************************************************************
4783  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4784  */
4785 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorW(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION RequestedInformation, LPWSTR *OutputString, PULONG OutputLen)
4786 {
4787     ULONG len;
4788     WCHAR *wptr, *wstr;
4789
4790     if (SDRevision != SDDL_REVISION_1)
4791     {
4792         ERR("Pogram requested unknown SDDL revision %d\n", SDRevision);
4793         SetLastError(ERROR_UNKNOWN_REVISION);
4794         return FALSE;
4795     }
4796
4797     len = 0;
4798     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4799         if (!DumpOwner(SecurityDescriptor, NULL, &len))
4800             return FALSE;
4801     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4802         if (!DumpGroup(SecurityDescriptor, NULL, &len))
4803             return FALSE;
4804     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4805         if (!DumpDacl(SecurityDescriptor, NULL, &len))
4806             return FALSE;
4807     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4808         if (!DumpSacl(SecurityDescriptor, NULL, &len))
4809             return FALSE;
4810
4811     wstr = wptr = LocalAlloc(0, (len + 1)*sizeof(WCHAR));
4812     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4813         if (!DumpOwner(SecurityDescriptor, &wptr, NULL))
4814             return FALSE;
4815     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4816         if (!DumpGroup(SecurityDescriptor, &wptr, NULL))
4817             return FALSE;
4818     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4819         if (!DumpDacl(SecurityDescriptor, &wptr, NULL))
4820             return FALSE;
4821     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4822         if (!DumpSacl(SecurityDescriptor, &wptr, NULL))
4823             return FALSE;
4824     *wptr = 0;
4825
4826     TRACE("ret: %s, %d\n", wine_dbgstr_w(wstr), len);
4827     *OutputString = wstr;
4828     if (OutputLen)
4829         *OutputLen = strlenW(*OutputString)+1;
4830     return TRUE;
4831 }
4832
4833 /******************************************************************************
4834  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4835  */
4836 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorA(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION Information, LPSTR *OutputString, PULONG OutputLen)
4837 {
4838     LPWSTR wstr;
4839     ULONG len;
4840     if (ConvertSecurityDescriptorToStringSecurityDescriptorW(SecurityDescriptor, SDRevision, Information, &wstr, &len))
4841     {
4842         int lenA;
4843
4844         lenA = WideCharToMultiByte(CP_ACP, 0, wstr, len, NULL, 0, NULL, NULL);
4845         *OutputString = HeapAlloc(GetProcessHeap(), 0, lenA);
4846         WideCharToMultiByte(CP_ACP, 0, wstr, len, *OutputString, lenA, NULL, NULL);
4847         LocalFree(wstr);
4848
4849         if (OutputLen != NULL)
4850             *OutputLen = lenA;
4851         return TRUE;
4852     }
4853     else
4854     {
4855         *OutputString = NULL;
4856         if (OutputLen)
4857             *OutputLen = 0;
4858         return FALSE;
4859     }
4860 }
4861
4862 /******************************************************************************
4863  * ConvertStringSidToSidW [ADVAPI32.@]
4864  */
4865 BOOL WINAPI ConvertStringSidToSidW(LPCWSTR StringSid, PSID* Sid)
4866 {
4867     BOOL bret = FALSE;
4868     DWORD cBytes;
4869
4870     TRACE("%s, %p\n", debugstr_w(StringSid), Sid);
4871     if (GetVersion() & 0x80000000)
4872         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4873     else if (!StringSid || !Sid)
4874         SetLastError(ERROR_INVALID_PARAMETER);
4875     else if (ParseStringSidToSid(StringSid, NULL, &cBytes))
4876     {
4877         PSID pSid = *Sid = LocalAlloc(0, cBytes);
4878
4879         bret = ParseStringSidToSid(StringSid, pSid, &cBytes);
4880         if (!bret)
4881             LocalFree(*Sid); 
4882     }
4883     return bret;
4884 }
4885
4886 /******************************************************************************
4887  * ConvertStringSidToSidA [ADVAPI32.@]
4888  */
4889 BOOL WINAPI ConvertStringSidToSidA(LPCSTR StringSid, PSID* Sid)
4890 {
4891     BOOL bret = FALSE;
4892
4893     TRACE("%s, %p\n", debugstr_a(StringSid), Sid);
4894     if (GetVersion() & 0x80000000)
4895         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4896     else if (!StringSid || !Sid)
4897         SetLastError(ERROR_INVALID_PARAMETER);
4898     else
4899     {
4900         UINT len = MultiByteToWideChar(CP_ACP, 0, StringSid, -1, NULL, 0);
4901         LPWSTR wStringSid = HeapAlloc(GetProcessHeap(), 0,
4902          len * sizeof(WCHAR));
4903
4904         MultiByteToWideChar(CP_ACP, 0, StringSid, -1, wStringSid, len);
4905         bret = ConvertStringSidToSidW(wStringSid, Sid);
4906         HeapFree(GetProcessHeap(), 0, wStringSid);
4907     }
4908     return bret;
4909 }
4910
4911 /******************************************************************************
4912  * ConvertSidToStringSidW [ADVAPI32.@]
4913  *
4914  *  format of SID string is:
4915  *    S-<count>-<auth>-<subauth1>-<subauth2>-<subauth3>...
4916  *  where
4917  *    <rev> is the revision of the SID encoded as decimal
4918  *    <auth> is the identifier authority encoded as hex
4919  *    <subauthN> is the subauthority id encoded as decimal
4920  */
4921 BOOL WINAPI ConvertSidToStringSidW( PSID pSid, LPWSTR *pstr )
4922 {
4923     DWORD len = 0;
4924     LPWSTR wstr, wptr;
4925
4926     TRACE("%p %p\n", pSid, pstr );
4927
4928     len = 0;
4929     if (!DumpSidNumeric(pSid, NULL, &len))
4930         return FALSE;
4931     wstr = wptr = LocalAlloc(0, (len+1) * sizeof(WCHAR));
4932     DumpSidNumeric(pSid, &wptr, NULL);
4933     *wptr = 0;
4934
4935     *pstr = wstr;
4936     return TRUE;
4937 }
4938
4939 /******************************************************************************
4940  * ConvertSidToStringSidA [ADVAPI32.@]
4941  */
4942 BOOL WINAPI ConvertSidToStringSidA(PSID pSid, LPSTR *pstr)
4943 {
4944     LPWSTR wstr = NULL;
4945     LPSTR str;
4946     UINT len;
4947
4948     TRACE("%p %p\n", pSid, pstr );
4949
4950     if( !ConvertSidToStringSidW( pSid, &wstr ) )
4951         return FALSE;
4952
4953     len = WideCharToMultiByte( CP_ACP, 0, wstr, -1, NULL, 0, NULL, NULL );
4954     str = LocalAlloc( 0, len );
4955     WideCharToMultiByte( CP_ACP, 0, wstr, -1, str, len, NULL, NULL );
4956     LocalFree( wstr );
4957
4958     *pstr = str;
4959
4960     return TRUE;
4961 }
4962
4963 BOOL WINAPI ConvertToAutoInheritPrivateObjectSecurity(
4964         PSECURITY_DESCRIPTOR pdesc,
4965         PSECURITY_DESCRIPTOR cdesc,
4966         PSECURITY_DESCRIPTOR* ndesc,
4967         GUID* objtype,
4968         BOOL isdir,
4969         PGENERIC_MAPPING genmap )
4970 {
4971     FIXME("%p %p %p %p %d %p - stub\n", pdesc, cdesc, ndesc, objtype, isdir, genmap);
4972
4973     return FALSE;
4974 }
4975
4976 BOOL WINAPI CreatePrivateObjectSecurity(
4977         PSECURITY_DESCRIPTOR ParentDescriptor,
4978         PSECURITY_DESCRIPTOR CreatorDescriptor,
4979         PSECURITY_DESCRIPTOR* NewDescriptor,
4980         BOOL IsDirectoryObject,
4981         HANDLE Token,
4982         PGENERIC_MAPPING GenericMapping )
4983 {
4984     FIXME("%p %p %p %d %p %p - stub\n", ParentDescriptor, CreatorDescriptor,
4985           NewDescriptor, IsDirectoryObject, Token, GenericMapping);
4986
4987     return FALSE;
4988 }
4989
4990 BOOL WINAPI DestroyPrivateObjectSecurity( PSECURITY_DESCRIPTOR* ObjectDescriptor )
4991 {
4992     FIXME("%p - stub\n", ObjectDescriptor);
4993
4994     return TRUE;
4995 }
4996
4997 BOOL WINAPI CreateProcessAsUserA(
4998         HANDLE hToken,
4999         LPCSTR lpApplicationName,
5000         LPSTR lpCommandLine,
5001         LPSECURITY_ATTRIBUTES lpProcessAttributes,
5002         LPSECURITY_ATTRIBUTES lpThreadAttributes,
5003         BOOL bInheritHandles,
5004         DWORD dwCreationFlags,
5005         LPVOID lpEnvironment,
5006         LPCSTR lpCurrentDirectory,
5007         LPSTARTUPINFOA lpStartupInfo,
5008         LPPROCESS_INFORMATION lpProcessInformation )
5009 {
5010     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - stub\n", hToken, debugstr_a(lpApplicationName),
5011           debugstr_a(lpCommandLine), lpProcessAttributes, lpThreadAttributes, bInheritHandles,
5012           dwCreationFlags, lpEnvironment, debugstr_a(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
5013
5014     return FALSE;
5015 }
5016
5017 BOOL WINAPI CreateProcessAsUserW(
5018         HANDLE hToken,
5019         LPCWSTR lpApplicationName,
5020         LPWSTR lpCommandLine,
5021         LPSECURITY_ATTRIBUTES lpProcessAttributes,
5022         LPSECURITY_ATTRIBUTES lpThreadAttributes,
5023         BOOL bInheritHandles,
5024         DWORD dwCreationFlags,
5025         LPVOID lpEnvironment,
5026         LPCWSTR lpCurrentDirectory,
5027         LPSTARTUPINFOW lpStartupInfo,
5028         LPPROCESS_INFORMATION lpProcessInformation )
5029 {
5030     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - semi- stub\n", hToken, 
5031           debugstr_w(lpApplicationName), debugstr_w(lpCommandLine), lpProcessAttributes,
5032           lpThreadAttributes, bInheritHandles, dwCreationFlags, lpEnvironment, 
5033           debugstr_w(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
5034
5035     /* We should create the process with a suspended main thread */
5036     if (!CreateProcessW (lpApplicationName,
5037                          lpCommandLine,
5038                          lpProcessAttributes,
5039                          lpThreadAttributes,
5040                          bInheritHandles,
5041                          dwCreationFlags, /* CREATE_SUSPENDED */
5042                          lpEnvironment,
5043                          lpCurrentDirectory,
5044                          lpStartupInfo,
5045                          lpProcessInformation))
5046     {
5047       return FALSE;
5048     }
5049
5050     return TRUE;
5051 }
5052
5053 /******************************************************************************
5054  * CreateProcessWithLogonW
5055  */
5056 BOOL WINAPI CreateProcessWithLogonW( LPCWSTR lpUsername, LPCWSTR lpDomain, LPCWSTR lpPassword, DWORD dwLogonFlags,
5057     LPCWSTR lpApplicationName, LPWSTR lpCommandLine, DWORD dwCreationFlags, LPVOID lpEnvironment,
5058     LPCWSTR lpCurrentDirectory, LPSTARTUPINFOW lpStartupInfo, LPPROCESS_INFORMATION lpProcessInformation )
5059 {
5060     FIXME("%s %s %s 0x%08x %s %s 0x%08x %p %s %p %p stub\n", debugstr_w(lpUsername), debugstr_w(lpDomain),
5061     debugstr_w(lpPassword), dwLogonFlags, debugstr_w(lpApplicationName),
5062     debugstr_w(lpCommandLine), dwCreationFlags, lpEnvironment, debugstr_w(lpCurrentDirectory),
5063     lpStartupInfo, lpProcessInformation);
5064
5065     return FALSE;
5066 }
5067
5068 /******************************************************************************
5069  * DuplicateTokenEx [ADVAPI32.@]
5070  */
5071 BOOL WINAPI DuplicateTokenEx(
5072         HANDLE ExistingTokenHandle, DWORD dwDesiredAccess,
5073         LPSECURITY_ATTRIBUTES lpTokenAttributes,
5074         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
5075         TOKEN_TYPE TokenType,
5076         PHANDLE DuplicateTokenHandle )
5077 {
5078     OBJECT_ATTRIBUTES ObjectAttributes;
5079
5080     TRACE("%p 0x%08x 0x%08x 0x%08x %p\n", ExistingTokenHandle, dwDesiredAccess,
5081           ImpersonationLevel, TokenType, DuplicateTokenHandle);
5082
5083     InitializeObjectAttributes(
5084         &ObjectAttributes,
5085         NULL,
5086         (lpTokenAttributes && lpTokenAttributes->bInheritHandle) ? OBJ_INHERIT : 0,
5087         NULL,
5088         lpTokenAttributes ? lpTokenAttributes->lpSecurityDescriptor : NULL );
5089
5090     return set_ntstatus( NtDuplicateToken( ExistingTokenHandle,
5091                                            dwDesiredAccess,
5092                                            &ObjectAttributes,
5093                                            ImpersonationLevel,
5094                                            TokenType,
5095                                            DuplicateTokenHandle ) );
5096 }
5097
5098 BOOL WINAPI DuplicateToken(
5099         HANDLE ExistingTokenHandle,
5100         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
5101         PHANDLE DuplicateTokenHandle )
5102 {
5103     return DuplicateTokenEx( ExistingTokenHandle, TOKEN_IMPERSONATE | TOKEN_QUERY,
5104                              NULL, ImpersonationLevel, TokenImpersonation,
5105                              DuplicateTokenHandle );
5106 }
5107
5108 /******************************************************************************
5109  * ComputeStringSidSize
5110  */
5111 static DWORD ComputeStringSidSize(LPCWSTR StringSid)
5112 {
5113     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I(-S)+ */
5114     {
5115         int ctok = 0;
5116         while (*StringSid)
5117         {
5118             if (*StringSid == '-')
5119                 ctok++;
5120             StringSid++;
5121         }
5122
5123         if (ctok >= 3)
5124             return GetSidLengthRequired(ctok - 2);
5125     }
5126     else /* String constant format  - Only available in winxp and above */
5127     {
5128         unsigned int i;
5129
5130         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
5131             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
5132                 return GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
5133     }
5134
5135     return GetSidLengthRequired(0);
5136 }
5137
5138 /******************************************************************************
5139  * ParseStringSidToSid
5140  */
5141 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes)
5142 {
5143     BOOL bret = FALSE;
5144     SID* pisid=pSid;
5145
5146     TRACE("%s, %p, %p\n", debugstr_w(StringSid), pSid, cBytes);
5147     if (!StringSid)
5148     {
5149         SetLastError(ERROR_INVALID_PARAMETER);
5150         TRACE("StringSid is NULL, returning FALSE\n");
5151         return FALSE;
5152     }
5153
5154     while (*StringSid == ' ')
5155         StringSid++;
5156
5157     *cBytes = ComputeStringSidSize(StringSid);
5158     if (!pisid) /* Simply compute the size */
5159     {
5160         TRACE("only size requested, returning TRUE\n");
5161         return TRUE;
5162     }
5163
5164     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I-S-S */
5165     {
5166         DWORD i = 0, identAuth;
5167         DWORD csubauth = ((*cBytes - GetSidLengthRequired(0)) / sizeof(DWORD));
5168
5169         StringSid += 2; /* Advance to Revision */
5170         pisid->Revision = atoiW(StringSid);
5171
5172         if (pisid->Revision != SDDL_REVISION)
5173         {
5174             TRACE("Revision %d is unknown\n", pisid->Revision);
5175             goto lend; /* ERROR_INVALID_SID */
5176         }
5177         if (csubauth == 0)
5178         {
5179             TRACE("SubAuthorityCount is 0\n");
5180             goto lend; /* ERROR_INVALID_SID */
5181         }
5182
5183         pisid->SubAuthorityCount = csubauth;
5184
5185         /* Advance to identifier authority */
5186         while (*StringSid && *StringSid != '-')
5187             StringSid++;
5188         if (*StringSid == '-')
5189             StringSid++;
5190
5191         /* MS' implementation can't handle values greater than 2^32 - 1, so
5192          * we don't either; assume most significant bytes are always 0
5193          */
5194         pisid->IdentifierAuthority.Value[0] = 0;
5195         pisid->IdentifierAuthority.Value[1] = 0;
5196         identAuth = atoiW(StringSid);
5197         pisid->IdentifierAuthority.Value[5] = identAuth & 0xff;
5198         pisid->IdentifierAuthority.Value[4] = (identAuth & 0xff00) >> 8;
5199         pisid->IdentifierAuthority.Value[3] = (identAuth & 0xff0000) >> 16;
5200         pisid->IdentifierAuthority.Value[2] = (identAuth & 0xff000000) >> 24;
5201
5202         /* Advance to first sub authority */
5203         while (*StringSid && *StringSid != '-')
5204             StringSid++;
5205         if (*StringSid == '-')
5206             StringSid++;
5207
5208         while (*StringSid)
5209         {
5210             pisid->SubAuthority[i++] = atoiW(StringSid);
5211
5212             while (*StringSid && *StringSid != '-')
5213                 StringSid++;
5214             if (*StringSid == '-')
5215                 StringSid++;
5216         }
5217
5218         if (i != pisid->SubAuthorityCount)
5219             goto lend; /* ERROR_INVALID_SID */
5220
5221         bret = TRUE;
5222     }
5223     else /* String constant format  - Only available in winxp and above */
5224     {
5225         unsigned int i;
5226         pisid->Revision = SDDL_REVISION;
5227
5228         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
5229             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
5230             {
5231                 DWORD j;
5232                 pisid->SubAuthorityCount = WellKnownSids[i].Sid.SubAuthorityCount;
5233                 pisid->IdentifierAuthority = WellKnownSids[i].Sid.IdentifierAuthority;
5234                 for (j = 0; j < WellKnownSids[i].Sid.SubAuthorityCount; j++)
5235                     pisid->SubAuthority[j] = WellKnownSids[i].Sid.SubAuthority[j];
5236                 bret = TRUE;
5237             }
5238
5239         if (!bret)
5240             FIXME("String constant not supported: %s\n", debugstr_wn(StringSid, 2));
5241     }
5242
5243 lend:
5244     if (!bret)
5245         SetLastError(ERROR_INVALID_SID);
5246
5247     TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
5248     return bret;
5249 }
5250
5251 /******************************************************************************
5252  * GetNamedSecurityInfoA [ADVAPI32.@]
5253  */
5254 DWORD WINAPI GetNamedSecurityInfoA(LPSTR pObjectName,
5255         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
5256         PSID* ppsidOwner, PSID* ppsidGroup, PACL* ppDacl, PACL* ppSacl,
5257         PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
5258 {
5259     DWORD len;
5260     LPWSTR wstr = NULL;
5261     DWORD r;
5262
5263     TRACE("%s %d %d %p %p %p %p %p\n", pObjectName, ObjectType, SecurityInfo,
5264         ppsidOwner, ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor);
5265
5266     if( pObjectName )
5267     {
5268         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
5269         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
5270         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
5271     }
5272
5273     r = GetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, ppsidOwner,
5274                            ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor );
5275
5276     HeapFree( GetProcessHeap(), 0, wstr );
5277
5278     return r;
5279 }
5280
5281 /******************************************************************************
5282  * GetNamedSecurityInfoW [ADVAPI32.@]
5283  */
5284 DWORD WINAPI GetNamedSecurityInfoW( LPWSTR name, SE_OBJECT_TYPE type,
5285     SECURITY_INFORMATION info, PSID* owner, PSID* group, PACL* dacl,
5286     PACL* sacl, PSECURITY_DESCRIPTOR* descriptor )
5287 {
5288     DWORD needed, offset;
5289     SECURITY_DESCRIPTOR_RELATIVE *relative = NULL;
5290     BYTE *buffer;
5291
5292     TRACE( "%s %d %d %p %p %p %p %p\n", debugstr_w(name), type, info, owner,
5293            group, dacl, sacl, descriptor );
5294
5295     /* A NULL descriptor is allowed if any one of the other pointers is not NULL */
5296     if (!name || !(owner||group||dacl||sacl||descriptor) ) return ERROR_INVALID_PARAMETER;
5297
5298     /* If no descriptor, we have to check that there's a pointer for the requested information */
5299     if( !descriptor && (
5300         ((info & OWNER_SECURITY_INFORMATION) && !owner)
5301     ||  ((info & GROUP_SECURITY_INFORMATION) && !group)
5302     ||  ((info & DACL_SECURITY_INFORMATION)  && !dacl)
5303     ||  ((info & SACL_SECURITY_INFORMATION)  && !sacl)  ))
5304         return ERROR_INVALID_PARAMETER;
5305
5306     needed = !descriptor ? 0 : sizeof(SECURITY_DESCRIPTOR_RELATIVE);
5307     if (info & OWNER_SECURITY_INFORMATION)
5308         needed += sizeof(sidWorld);
5309     if (info & GROUP_SECURITY_INFORMATION)
5310         needed += sizeof(sidWorld);
5311     if (info & DACL_SECURITY_INFORMATION)
5312         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5313     if (info & SACL_SECURITY_INFORMATION)
5314         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5315
5316     if(descriptor)
5317     {
5318         /* must be freed by caller */
5319         *descriptor = HeapAlloc( GetProcessHeap(), 0, needed );
5320         if (!*descriptor) return ERROR_NOT_ENOUGH_MEMORY;
5321
5322         if (!InitializeSecurityDescriptor( *descriptor, SECURITY_DESCRIPTOR_REVISION ))
5323         {
5324             HeapFree( GetProcessHeap(), 0, *descriptor );
5325             return ERROR_INVALID_SECURITY_DESCR;
5326         }
5327
5328         relative = *descriptor;
5329         relative->Control |= SE_SELF_RELATIVE;
5330
5331         buffer = (BYTE *)relative;
5332         offset = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
5333     }
5334     else
5335     {
5336         buffer = HeapAlloc( GetProcessHeap(), 0, needed );
5337         if (!buffer) return ERROR_NOT_ENOUGH_MEMORY;
5338         offset = 0;
5339     }
5340
5341     if (info & OWNER_SECURITY_INFORMATION)
5342     {
5343         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
5344         if(relative)
5345             relative->Owner = offset;
5346         if (owner)
5347             *owner = buffer + offset;
5348         offset += sizeof(sidWorld);
5349     }
5350     if (info & GROUP_SECURITY_INFORMATION)
5351     {
5352         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
5353         if(relative)
5354             relative->Group = offset;
5355         if (group)
5356             *group = buffer + offset;
5357         offset += sizeof(sidWorld);
5358     }
5359     if (info & DACL_SECURITY_INFORMATION)
5360     {
5361         GetWorldAccessACL( (PACL)(buffer + offset) );
5362         if(relative)
5363         {
5364             relative->Control |= SE_DACL_PRESENT;
5365             relative->Dacl = offset;
5366         }
5367         if (dacl)
5368             *dacl = (PACL)(buffer + offset);
5369         offset += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5370     }
5371     if (info & SACL_SECURITY_INFORMATION)
5372     {
5373         GetWorldAccessACL( (PACL)(buffer + offset) );
5374         if(relative)
5375         {
5376             relative->Control |= SE_SACL_PRESENT;
5377             relative->Sacl = offset;
5378         }
5379         if (sacl)
5380             *sacl = (PACL)(buffer + offset);
5381     }
5382
5383     return ERROR_SUCCESS;
5384 }
5385
5386 /******************************************************************************
5387  * DecryptFileW [ADVAPI32.@]
5388  */
5389 BOOL WINAPI DecryptFileW(LPCWSTR lpFileName, DWORD dwReserved)
5390 {
5391     FIXME("%s %08x\n", debugstr_w(lpFileName), dwReserved);
5392     return TRUE;
5393 }
5394
5395 /******************************************************************************
5396  * DecryptFileA [ADVAPI32.@]
5397  */
5398 BOOL WINAPI DecryptFileA(LPCSTR lpFileName, DWORD dwReserved)
5399 {
5400     FIXME("%s %08x\n", debugstr_a(lpFileName), dwReserved);
5401     return TRUE;
5402 }
5403
5404 /******************************************************************************
5405  * EncryptFileW [ADVAPI32.@]
5406  */
5407 BOOL WINAPI EncryptFileW(LPCWSTR lpFileName)
5408 {
5409     FIXME("%s\n", debugstr_w(lpFileName));
5410     return TRUE;
5411 }
5412
5413 /******************************************************************************
5414  * EncryptFileA [ADVAPI32.@]
5415  */
5416 BOOL WINAPI EncryptFileA(LPCSTR lpFileName)
5417 {
5418     FIXME("%s\n", debugstr_a(lpFileName));
5419     return TRUE;
5420 }
5421
5422 /******************************************************************************
5423  * FileEncryptionStatusW [ADVAPI32.@]
5424  */
5425 BOOL WINAPI FileEncryptionStatusW(LPCWSTR lpFileName, LPDWORD lpStatus)
5426 {
5427     FIXME("(%s %p): stub\n", debugstr_w(lpFileName), lpStatus);
5428     if (!lpStatus)
5429         return FALSE;
5430     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
5431     return TRUE;
5432 }
5433
5434 /******************************************************************************
5435  * FileEncryptionStatusA [ADVAPI32.@]
5436  */
5437 BOOL WINAPI FileEncryptionStatusA(LPCSTR lpFileName, LPDWORD lpStatus)
5438 {
5439     FIXME("(%s %p): stub\n", debugstr_a(lpFileName), lpStatus);
5440     if (!lpStatus)
5441         return FALSE;
5442     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
5443     return TRUE;
5444 }
5445
5446 /******************************************************************************
5447  * SetSecurityInfo [ADVAPI32.@]
5448  */
5449 DWORD WINAPI SetSecurityInfo(HANDLE handle, SE_OBJECT_TYPE ObjectType, 
5450                       SECURITY_INFORMATION SecurityInfo, PSID psidOwner,
5451                       PSID psidGroup, PACL pDacl, PACL pSacl) {
5452     FIXME("stub\n");
5453     return ERROR_SUCCESS;
5454 }
5455
5456 /******************************************************************************
5457  * SaferCreateLevel   [ADVAPI32.@]
5458  */
5459 BOOL WINAPI SaferCreateLevel(DWORD ScopeId, DWORD LevelId, DWORD OpenFlags,
5460                              SAFER_LEVEL_HANDLE* LevelHandle, LPVOID lpReserved)
5461 {
5462     FIXME("(%u, %x, %u, %p, %p) stub\n", ScopeId, LevelId, OpenFlags, LevelHandle, lpReserved);
5463
5464     *LevelHandle = (SAFER_LEVEL_HANDLE)0xdeadbeef;
5465     return TRUE;
5466 }
5467
5468 /******************************************************************************
5469  * SaferComputeTokenFromLevel   [ADVAPI32.@]
5470  */
5471 BOOL WINAPI SaferComputeTokenFromLevel(SAFER_LEVEL_HANDLE handle, HANDLE token, PHANDLE access_token,
5472                                        DWORD flags, LPVOID reserved)
5473 {
5474     FIXME("(%p, %p, %p, %x, %p) stub\n", handle, token, access_token, flags, reserved);
5475
5476     *access_token = (HANDLE)0xdeadbeef;
5477     return TRUE;
5478 }
5479
5480 /******************************************************************************
5481  * SaferCloseLevel   [ADVAPI32.@]
5482  */
5483 BOOL WINAPI SaferCloseLevel(SAFER_LEVEL_HANDLE handle)
5484 {
5485     FIXME("(%p) stub\n", handle);
5486     return TRUE;
5487 }
5488
5489 DWORD WINAPI TreeResetNamedSecurityInfoW( LPWSTR pObjectName,
5490                 SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
5491                 PSID pOwner, PSID pGroup, PACL pDacl, PACL pSacl,
5492                 BOOL KeepExplicit, FN_PROGRESS fnProgress,
5493                 PROG_INVOKE_SETTING ProgressInvokeSetting, PVOID Args)
5494 {
5495     FIXME("(%s, %i, %i, %p, %p, %p, %p, %i, %p, %i, %p  Stub\n",
5496         debugstr_w(pObjectName), ObjectType, SecurityInfo, pOwner, pGroup,
5497         pDacl, pSacl, KeepExplicit, fnProgress, ProgressInvokeSetting, Args);
5498
5499     return ERROR_SUCCESS;
5500 }
5501
5502 /******************************************************************************
5503  * SaferGetPolicyInformation   [ADVAPI32.@]
5504  */
5505 BOOL WINAPI SaferGetPolicyInformation(DWORD scope, SAFER_POLICY_INFO_CLASS class, DWORD size,
5506                                       PVOID buffer, PDWORD required, LPVOID lpReserved)
5507 {
5508     FIXME("(%u %u %u %p %p %p) stub\n", scope, class, size, buffer, required, lpReserved);
5509     return FALSE;
5510 }